/** * FreeRDP: A Remote Desktop Protocol Implementation * RDP Server Peer * * Copyright 2011 Vic Lee * Copyright 2014 DI (FH) Martin Haimberger * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifdef HAVE_CONFIG_H #include "config.h" #endif #include #include #include "info.h" #include "certificate.h" #include #include "rdp.h" #include "peer.h" #define TAG FREERDP_TAG("core.peer") static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name, UINT32 flags) { int length; UINT32 index; BOOL joined = FALSE; rdpMcsChannel* mcsChannel = NULL; rdpPeerChannel* peerChannel = NULL; rdpMcs* mcs = client->context->rdp->mcs; if (flags & WTS_CHANNEL_OPTION_DYNAMIC) return NULL; /* not yet supported */ length = strnlen(name, 9); if (length > 8) return NULL; /* SVC maximum name length is 8 */ for (index = 0; index < mcs->channelCount; index++) { mcsChannel = &(mcs->channels[index]); if (!mcsChannel->joined) continue; if (_strnicmp(name, mcsChannel->Name, length) == 0) { joined = TRUE; break; } } if (!joined) return NULL; /* channel is not joined */ peerChannel = (rdpPeerChannel*)mcsChannel->handle; if (peerChannel) { /* channel is already open */ return (HANDLE)peerChannel; } peerChannel = (rdpPeerChannel*)calloc(1, sizeof(rdpPeerChannel)); if (peerChannel) { peerChannel->index = index; peerChannel->client = client; peerChannel->channelFlags = flags; peerChannel->channelId = mcsChannel->ChannelId; peerChannel->mcsChannel = mcsChannel; mcsChannel->handle = (void*)peerChannel; } return (HANDLE)peerChannel; } static BOOL freerdp_peer_virtual_channel_close(freerdp_peer* client, HANDLE hChannel) { rdpMcsChannel* mcsChannel = NULL; rdpPeerChannel* peerChannel = NULL; if (!hChannel) return FALSE; peerChannel = (rdpPeerChannel*)hChannel; mcsChannel = peerChannel->mcsChannel; mcsChannel->handle = NULL; free(peerChannel); return TRUE; } static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel, const BYTE* buffer, UINT32 length) { wStream* s; UINT32 flags; UINT32 chunkSize; UINT32 maxChunkSize; UINT32 totalLength; rdpPeerChannel* peerChannel; rdpMcsChannel* mcsChannel; rdpRdp* rdp = client->context->rdp; if (!hChannel) return -1; peerChannel = (rdpPeerChannel*)hChannel; mcsChannel = peerChannel->mcsChannel; if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC) return -1; /* not yet supported */ maxChunkSize = rdp->settings->VirtualChannelChunkSize; totalLength = length; flags = CHANNEL_FLAG_FIRST; while (length > 0) { s = rdp_send_stream_init(rdp); if (!s) return -1; if (length > maxChunkSize) { chunkSize = rdp->settings->VirtualChannelChunkSize; } else { chunkSize = length; flags |= CHANNEL_FLAG_LAST; } if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL) flags |= CHANNEL_FLAG_SHOW_PROTOCOL; Stream_Write_UINT32(s, totalLength); Stream_Write_UINT32(s, flags); if (!Stream_EnsureRemainingCapacity(s, chunkSize)) { Stream_Release(s); return -1; } Stream_Write(s, buffer, chunkSize); if (!rdp_send(rdp, s, peerChannel->channelId)) return -1; buffer += chunkSize; length -= chunkSize; flags = 0; } return 1; } static void* freerdp_peer_virtual_channel_get_data(freerdp_peer* client, HANDLE hChannel) { rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; if (!hChannel) return NULL; return peerChannel->extra; } static int freerdp_peer_virtual_channel_set_data(freerdp_peer* client, HANDLE hChannel, void* data) { rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; if (!hChannel) return -1; peerChannel->extra = data; return 1; } static BOOL freerdp_peer_initialize(freerdp_peer* client) { rdpRdp* rdp = client->context->rdp; rdpSettings* settings = rdp->settings; settings->ServerMode = TRUE; settings->FrameAcknowledge = 0; settings->LocalConnection = client->local; if (settings->RdpKeyFile) { settings->RdpServerRsaKey = key_new(settings->RdpKeyFile); if (!settings->RdpServerRsaKey) { WLog_ERR(TAG, "invalid RDP key file %s", settings->RdpKeyFile); return FALSE; } } else if (settings->RdpKeyContent) { settings->RdpServerRsaKey = key_new_from_content(settings->RdpKeyContent, NULL); if (!settings->RdpServerRsaKey) { WLog_ERR(TAG, "invalid RDP key content"); return FALSE; } } return TRUE; } static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount) { rdpTransport* transport = client->context->rdp->transport; transport_get_fds(transport, rfds, rcount); return TRUE; } static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client) { HANDLE hEvent = NULL; rdpTransport* transport = client->context->rdp->transport; BIO_get_event(transport->frontBio, &hEvent); return hEvent; } static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count) { return transport_get_event_handles(client->context->rdp->transport, events, count); } static BOOL freerdp_peer_check_fds(freerdp_peer* peer) { int status; rdpRdp* rdp; rdp = peer->context->rdp; status = rdp_check_fds(rdp); if (status < 0) return FALSE; return TRUE; } static BOOL peer_recv_data_pdu(freerdp_peer* client, wStream* s, UINT16 totalLength) { BYTE type; UINT16 length; UINT32 share_id; BYTE compressed_type; UINT16 compressed_len; if (!rdp_read_share_data_header(s, &length, &type, &share_id, &compressed_type, &compressed_len)) return FALSE; #ifdef WITH_DEBUG_RDP WLog_DBG(TAG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "", data_pdu_type_to_string(type), type, length); #endif switch (type) { case DATA_PDU_TYPE_SYNCHRONIZE: if (!rdp_recv_client_synchronize_pdu(client->context->rdp, s)) return FALSE; break; case DATA_PDU_TYPE_CONTROL: if (!rdp_server_accept_client_control_pdu(client->context->rdp, s)) return FALSE; break; case DATA_PDU_TYPE_INPUT: if (!input_recv(client->context->rdp->input, s)) return FALSE; break; case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST: if (!rdp_server_accept_client_persistent_key_list_pdu(client->context->rdp, s)) return FALSE; break; case DATA_PDU_TYPE_FONT_LIST: if (!rdp_server_accept_client_font_list_pdu(client->context->rdp, s)) return FALSE; break; case DATA_PDU_TYPE_SHUTDOWN_REQUEST: mcs_send_disconnect_provider_ultimatum(client->context->rdp->mcs); return FALSE; case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE: if (Stream_GetRemainingLength(s) < 4) return FALSE; Stream_Read_UINT32(s, client->ack_frame_id); IFCALL(client->update->SurfaceFrameAcknowledge, client->update->context, client->ack_frame_id); break; case DATA_PDU_TYPE_REFRESH_RECT: if (!update_read_refresh_rect(client->update, s)) return FALSE; break; case DATA_PDU_TYPE_SUPPRESS_OUTPUT: if (!update_read_suppress_output(client->update, s)) return FALSE; break; default: WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type); break; } return TRUE; } static int peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s) { rdpRdp* rdp; UINT16 length; UINT16 pduType; UINT16 pduSource; UINT16 channelId; UINT16 securityFlags = 0; rdp = client->context->rdp; if (!rdp_read_header(rdp, s, &length, &channelId)) { WLog_ERR(TAG, "Incorrect RDP header."); return -1; } rdp->inPackets++; if (freerdp_shall_disconnect(rdp->instance)) return 0; if (rdp->settings->UseRdpSecurityLayer) { if (!rdp_read_security_header(s, &securityFlags, &length)) return -1; if (securityFlags & SEC_ENCRYPT) { if (!rdp_decrypt(rdp, s, &length, securityFlags)) { WLog_ERR(TAG, "rdp_decrypt failed"); return -1; } } } if (channelId == MCS_GLOBAL_CHANNEL_ID) { UINT16 pduLength, remain; if (!rdp_read_share_control_header(s, &pduLength, &remain, &pduType, &pduSource)) return -1; client->settings->PduSource = pduSource; WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType)); switch (pduType) { case PDU_TYPE_DATA: if (!peer_recv_data_pdu(client, s, pduLength)) return -1; break; case PDU_TYPE_CONFIRM_ACTIVE: if (!rdp_server_accept_confirm_active(rdp, s, pduLength)) return -1; break; case PDU_TYPE_FLOW_RESPONSE: case PDU_TYPE_FLOW_STOP: case PDU_TYPE_FLOW_TEST: if (!Stream_SafeSeek(s, remain)) return -1; break; default: WLog_ERR(TAG, "Client sent pduType %" PRIu16 "", pduType); return -1; } } else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId)) { if (!rdp->settings->UseRdpSecurityLayer) if (!rdp_read_security_header(s, &securityFlags, NULL)) return -1; return rdp_recv_message_channel_pdu(rdp, s, securityFlags); } else { if (!freerdp_channel_peer_process(client, s, channelId)) return -1; } if (!tpkt_ensure_stream_consumed(s, length)) return -1; return 0; } static int peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s) { rdpRdp* rdp; UINT16 length; rdpFastPath* fastpath; rdp = client->context->rdp; fastpath = rdp->fastpath; fastpath_read_header_rdp(fastpath, s, &length); if ((length == 0) || (length > Stream_GetRemainingLength(s))) { WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length); return -1; } if (fastpath->encryptionFlags & FASTPATH_OUTPUT_ENCRYPTED) { if (!rdp_decrypt(rdp, s, &length, (fastpath->encryptionFlags & FASTPATH_OUTPUT_SECURE_CHECKSUM) ? SEC_SECURE_CHECKSUM : 0)) return -1; } rdp->inPackets++; return fastpath_recv_inputs(fastpath, s); } static int peer_recv_pdu(freerdp_peer* client, wStream* s) { if (tpkt_verify_header(s)) return peer_recv_tpkt_pdu(client, s); else return peer_recv_fastpath_pdu(client, s); } static int peer_recv_callback(rdpTransport* transport, wStream* s, void* extra) { UINT32 SelectedProtocol; freerdp_peer* client = (freerdp_peer*)extra; rdpRdp* rdp = client->context->rdp; switch (rdp_get_state(rdp)) { case CONNECTION_STATE_INITIAL: if (!rdp_server_accept_nego(rdp, s)) { WLog_ERR(TAG, "%s: %s - rdp_server_accept_nego() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } SelectedProtocol = nego_get_selected_protocol(rdp->nego); client->settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE; client->settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE; client->settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE; if (SelectedProtocol & PROTOCOL_HYBRID) { SEC_WINNT_AUTH_IDENTITY* identity = nego_get_identity(rdp->nego); sspi_CopyAuthIdentity(&client->identity, identity); IFCALLRET(client->Logon, client->authenticated, client, &client->identity, TRUE); nego_free_nla(rdp->nego); } else { IFCALLRET(client->Logon, client->authenticated, client, &client->identity, FALSE); } break; case CONNECTION_STATE_NEGO: if (!rdp_server_accept_mcs_connect_initial(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_server_accept_mcs_connect_initial() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; case CONNECTION_STATE_MCS_CONNECT: if (!rdp_server_accept_mcs_erect_domain_request(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_server_accept_mcs_erect_domain_request() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; case CONNECTION_STATE_MCS_ERECT_DOMAIN: if (!rdp_server_accept_mcs_attach_user_request(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_server_accept_mcs_attach_user_request() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; case CONNECTION_STATE_MCS_ATTACH_USER: if (!rdp_server_accept_mcs_channel_join_request(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_server_accept_mcs_channel_join_request() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT: if (rdp->settings->UseRdpSecurityLayer) { if (!rdp_server_establish_keys(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_server_establish_keys() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } } rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE); if (Stream_GetRemainingLength(s) > 0) return peer_recv_callback(transport, s, extra); break; case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE: if (!rdp_recv_client_info(rdp, s)) { WLog_ERR(TAG, "%s: %s - " "rdp_recv_client_info() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING); return peer_recv_callback(transport, NULL, extra); case CONNECTION_STATE_LICENSING: { LicenseCallbackResult res; if (!client->LicenseCallback) { WLog_ERR(TAG, "%s: LicenseCallback has been removed, assuming " "licensing is ok (please fix your app)", __FUNCTION__); res = LICENSE_CB_COMPLETED; } else res = client->LicenseCallback(client, s); switch (res) { case LICENSE_CB_INTERNAL_ERROR: WLog_ERR(TAG, "%s: %s - callback internal " "error, aborting", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; case LICENSE_CB_ABORT: return -1; case LICENSE_CB_IN_PROGRESS: break; case LICENSE_CB_COMPLETED: rdp_server_transition_to_state(rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE); return peer_recv_callback(transport, NULL, extra); default: WLog_ERR(TAG, "%s: CONNECTION_STATE_LICENSING - unknown license callback " "result %d", __FUNCTION__, res); break; } break; } case CONNECTION_STATE_CAPABILITIES_EXCHANGE: if (!rdp->AwaitCapabilities) { if (client->Capabilities && !client->Capabilities(client)) return -1; if (!rdp_send_demand_active(rdp)) { WLog_ERR(TAG, "%s: %s - " "rdp_send_demand_active() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } rdp->AwaitCapabilities = TRUE; if (s) { if (peer_recv_pdu(client, s) < 0) { WLog_ERR(TAG, "%s: %s - " "peer_recv_pdu() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } } } else { /** * During reactivation sequence the client might sent some input or channel data * before receiving the Deactivate All PDU. We need to process them as usual. */ if (peer_recv_pdu(client, s) < 0) { WLog_ERR(TAG, "%s: %s - " "peer_recv_pdu() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } } break; case CONNECTION_STATE_FINALIZATION: if (peer_recv_pdu(client, s) < 0) { WLog_ERR(TAG, "%s: %s - peer_recv_pdu() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; case CONNECTION_STATE_ACTIVE: if (peer_recv_pdu(client, s) < 0) { WLog_ERR(TAG, "%s: %s - peer_recv_pdu() fail", __FUNCTION__, rdp_state_string(rdp_get_state(rdp))); return -1; } break; default: WLog_ERR(TAG, "%s state %d", rdp_state_string(rdp_get_state(rdp)), rdp_get_state(rdp)); return -1; } return 0; } static BOOL freerdp_peer_close(freerdp_peer* client) { UINT32 SelectedProtocol; /** if negotiation has failed, we're not MCS connected. So don't * send anything else, or some mstsc will consider that as an error */ SelectedProtocol = nego_get_selected_protocol(client->context->rdp->nego); if (SelectedProtocol & PROTOCOL_FAILED_NEGO) return TRUE; /** * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server * The server first sends the client a Deactivate All PDU followed by an * optional MCS Disconnect Provider Ultimatum PDU. */ if (!rdp_send_deactivate_all(client->context->rdp)) return FALSE; if (freerdp_settings_get_bool(client->settings, FreeRDP_SupportErrorInfoPdu)) { rdp_send_error_info(client->context->rdp); } return mcs_send_disconnect_provider_ultimatum(client->context->rdp->mcs); } static void freerdp_peer_disconnect(freerdp_peer* client) { rdpTransport* transport = client->context->rdp->transport; transport_disconnect(transport); } static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data, size_t size) { return rdp_send_channel_data(client->context->rdp, channelId, data, size); } static BOOL freerdp_peer_send_server_redirection_pdu( freerdp_peer* peer, UINT32 sessionId, const char* targetNetAddress, const char* routingToken, const char* userName, const char* domain, const char* password, const char* targetFQDN, const char* targetNetBiosName, DWORD tsvUrlLength, const BYTE* tsvUrl, UINT32 targetNetAddressesCount, const char** targetNetAddresses) { wStream* s = rdp_send_stream_pdu_init(peer->context->rdp); UINT16 length; UINT32 redirFlags; UINT32 targetNetAddressLength; UINT32 loadBalanceInfoLength; UINT32 userNameLength; UINT32 domainLength; UINT32 passwordLength; UINT32 targetFQDNLength; UINT32 targetNetBiosNameLength; UINT32 targetNetAddressesLength; UINT32* targetNetAddressesWLength; LPWSTR targetNetAddressW = NULL; LPWSTR userNameW = NULL; LPWSTR domainW = NULL; LPWSTR passwordW = NULL; LPWSTR targetFQDNW = NULL; LPWSTR targetNetBiosNameW = NULL; LPWSTR* targetNetAddressesW = NULL; length = 12; /* Flags (2) + length (2) + sessionId (4) + redirection flags (4) */ redirFlags = 0; if (targetNetAddress) { redirFlags |= LB_TARGET_NET_ADDRESS; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)targetNetAddress, -1, &targetNetAddressW, 0); targetNetAddressLength = (strlen(targetNetAddress) + 1) * sizeof(WCHAR); length += 4 + targetNetAddressLength; } if (routingToken) { redirFlags |= LB_LOAD_BALANCE_INFO; loadBalanceInfoLength = 13 + strlen(routingToken) + 2; /* Add routing token prefix and suffix */ length += 4 + loadBalanceInfoLength; } if (userName) { redirFlags |= LB_USERNAME; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)userName, -1, &userNameW, 0); userNameLength = (strlen(userName) + 1) * sizeof(WCHAR); length += 4 + userNameLength; } if (domain) { redirFlags |= LB_DOMAIN; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)domain, -1, &domainW, 0); domainLength = (strlen(domain) + 1) * sizeof(WCHAR); length += 4 + domainLength; } if (password) { redirFlags |= LB_PASSWORD; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)password, -1, &passwordW, 0); passwordLength = (strlen(password) + 1) * sizeof(WCHAR); length += 4 + passwordLength; } if (targetFQDN) { redirFlags |= LB_TARGET_FQDN; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)targetFQDN, -1, &targetFQDNW, 0); targetFQDNLength = (strlen(targetFQDN) + 1) * sizeof(WCHAR); length += 4 + targetFQDNLength; } if (targetNetBiosName) { redirFlags |= LB_TARGET_NETBIOS_NAME; ConvertToUnicode(CP_UTF8, 0, (LPCSTR)targetNetBiosName, -1, &targetNetBiosNameW, 0); targetNetBiosNameLength = (strlen(targetNetBiosName) + 1) * sizeof(WCHAR); length += 4 + targetNetBiosNameLength; } if (tsvUrl) { redirFlags |= LB_CLIENT_TSV_URL; length += 4 + tsvUrlLength; } if (targetNetAddresses) { UINT32 i; redirFlags |= LB_TARGET_NET_ADDRESSES; targetNetAddressesLength = 0; targetNetAddressesW = calloc(targetNetAddressesCount, sizeof(LPWSTR)); targetNetAddressesWLength = calloc(targetNetAddressesCount, sizeof(UINT32)); for (i = 0; i < targetNetAddressesCount; i++) { ConvertToUnicode(CP_UTF8, 0, (LPCSTR)targetNetAddresses[i], -1, &targetNetAddressesW[i], 0); targetNetAddressesWLength[i] = (strlen(targetNetAddresses[i]) + 1) * sizeof(WCHAR); targetNetAddressesLength += 4 + targetNetAddressesWLength[i]; } length += 4 + 4 + targetNetAddressesLength; } Stream_Write_UINT16(s, 0); Stream_Write_UINT16(s, SEC_REDIRECTION_PKT); Stream_Write_UINT16(s, length); if (!Stream_EnsureRemainingCapacity(s, length)) { WLog_ERR(TAG, "Stream_EnsureRemainingCapacity failed!"); goto fail; } if (sessionId) Stream_Write_UINT32(s, sessionId); else Stream_Write_UINT32(s, 0); Stream_Write_UINT32(s, redirFlags); if (redirFlags & LB_TARGET_NET_ADDRESS) { Stream_Write_UINT32(s, targetNetAddressLength); Stream_Write(s, targetNetAddressW, targetNetAddressLength); free(targetNetAddressW); } if (redirFlags & LB_LOAD_BALANCE_INFO) { Stream_Write_UINT32(s, loadBalanceInfoLength); Stream_Write(s, "Cookie: msts=", 13); Stream_Write(s, routingToken, strlen(routingToken)); Stream_Write_UINT8(s, 0x0d); Stream_Write_UINT8(s, 0x0a); } if (redirFlags & LB_USERNAME) { Stream_Write_UINT32(s, userNameLength); Stream_Write(s, userNameW, userNameLength); free(userNameW); } if (redirFlags & LB_DOMAIN) { Stream_Write_UINT32(s, domainLength); Stream_Write(s, domainW, domainLength); free(domainW); } if (redirFlags & LB_PASSWORD) { Stream_Write_UINT32(s, passwordLength); Stream_Write(s, passwordW, passwordLength); free(passwordW); } if (redirFlags & LB_TARGET_FQDN) { Stream_Write_UINT32(s, targetFQDNLength); Stream_Write(s, targetFQDNW, targetFQDNLength); free(targetFQDNW); } if (redirFlags & LB_TARGET_NETBIOS_NAME) { Stream_Write_UINT32(s, targetNetBiosNameLength); Stream_Write(s, targetNetBiosNameW, targetNetBiosNameLength); free(targetNetBiosNameW); } if (redirFlags & LB_CLIENT_TSV_URL) { Stream_Write_UINT32(s, tsvUrlLength); Stream_Write(s, tsvUrl, tsvUrlLength); } if (redirFlags & LB_TARGET_NET_ADDRESSES) { UINT32 i; Stream_Write_UINT32(s, targetNetAddressesLength); Stream_Write_UINT32(s, targetNetAddressesCount); for (i = 0; i < targetNetAddressesCount; i++) { Stream_Write_UINT32(s, targetNetAddressesWLength[i]); Stream_Write(s, targetNetAddressesW[i], targetNetAddressesWLength[i]); free(targetNetAddressesW[i]); } free(targetNetAddressesW); free(targetNetAddressesWLength); } Stream_Write_UINT8(s, 0); rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0); return TRUE; fail: free(targetNetAddressW); free(userNameW); free(domainW); free(passwordW); free(targetFQDNW); free(targetNetBiosNameW); free(targetNetAddressesWLength); if (targetNetAddressesCount > 0) { UINT32 i; for (i = 0; i < targetNetAddressesCount; i++) free(targetNetAddressesW[i]); free(targetNetAddressesW); } return FALSE; } static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer) { rdpTransport* transport = peer->context->rdp->transport; return transport_is_write_blocked(transport); } static int freerdp_peer_drain_output_buffer(freerdp_peer* peer) { rdpTransport* transport = peer->context->rdp->transport; return transport_drain_output_buffer(transport); } static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer) { return peer->context->rdp->transport->haveMoreBytesToRead; } static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, wStream* s) { rdpRdp* rdp = peer->context->rdp; if (!license_send_valid_client_error_packet(rdp)) { WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed"); return LICENSE_CB_ABORT; } return LICENSE_CB_COMPLETED; } BOOL freerdp_peer_context_new(freerdp_peer* client) { rdpRdp* rdp; rdpContext* context; BOOL ret = TRUE; if (!client) return FALSE; if (!(context = (rdpContext*)calloc(1, client->ContextSize))) goto fail_context; client->context = context; context->peer = client; context->ServerMode = TRUE; context->settings = client->settings; if (!(context->metrics = metrics_new(context))) goto fail_metrics; if (!(rdp = rdp_new(context))) goto fail_rdp; client->input = rdp->input; client->update = rdp->update; client->settings = rdp->settings; client->autodetect = rdp->autodetect; context->rdp = rdp; context->input = client->input; context->update = client->update; context->settings = client->settings; context->autodetect = client->autodetect; client->update->context = context; client->input->context = context; client->autodetect->context = context; update_register_server_callbacks(client->update); autodetect_register_server_callbacks(client->autodetect); if (!(context->errorDescription = calloc(1, 500))) { WLog_ERR(TAG, "calloc failed!"); goto fail_error_description; } if (!transport_attach(rdp->transport, client->sockfd)) goto fail_transport_attach; rdp->transport->ReceiveCallback = peer_recv_callback; rdp->transport->ReceiveExtra = client; transport_set_blocking_mode(rdp->transport, FALSE); client->IsWriteBlocked = freerdp_peer_is_write_blocked; client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; client->HasMoreToRead = freerdp_peer_has_more_to_read; client->LicenseCallback = freerdp_peer_nolicense; IFCALLRET(client->ContextNew, ret, client, client->context); if (ret) return TRUE; WLog_ERR(TAG, "ContextNew callback failed"); fail_transport_attach: free(context->errorDescription); fail_error_description: rdp_free(client->context->rdp); fail_rdp: metrics_free(context->metrics); fail_metrics: free(client->context); fail_context: client->context = NULL; WLog_ERR(TAG, "Failed to create new peer context"); return FALSE; } void freerdp_peer_context_free(freerdp_peer* client) { IFCALL(client->ContextFree, client, client->context); if (client->context) { free(client->context->errorDescription); client->context->errorDescription = NULL; rdp_free(client->context->rdp); client->context->rdp = NULL; metrics_free(client->context->metrics); client->context->metrics = NULL; free(client->context); client->context = NULL; } } static const char* os_major_type_to_string(UINT16 osMajorType) { switch (osMajorType) { case OSMAJORTYPE_UNSPECIFIED: return "Unspecified platform"; case OSMAJORTYPE_WINDOWS: return "Windows platform"; case OSMAJORTYPE_OS2: return "OS/2 platform"; case OSMAJORTYPE_MACINTOSH: return "Macintosh platform"; case OSMAJORTYPE_UNIX: return "UNIX platform"; case OSMAJORTYPE_IOS: return "iOS platform"; case OSMAJORTYPE_OSX: return "OS X platform"; case OSMAJORTYPE_ANDROID: return "Android platform"; case OSMAJORTYPE_CHROME_OS: return "Chrome OS platform"; } return "Unknown platform"; } const char* freerdp_peer_os_major_type_string(freerdp_peer* client) { rdpContext* context; UINT16 osMajorType; WINPR_ASSERT(client); context = client->context; WINPR_ASSERT(context); WINPR_ASSERT(context->settings); osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType); return os_major_type_to_string(osMajorType); } static const char* os_minor_type_to_string(UINT16 osMinorType) { switch (osMinorType) { case OSMINORTYPE_UNSPECIFIED: return "Unspecified version"; case OSMINORTYPE_WINDOWS_31X: return "Windows 3.1x"; case OSMINORTYPE_WINDOWS_95: return "Windows 95"; case OSMINORTYPE_WINDOWS_NT: return "Windows NT"; case OSMINORTYPE_OS2_V21: return "OS/2 2.1"; case OSMINORTYPE_POWER_PC: return "PowerPC"; case OSMINORTYPE_MACINTOSH: return "Macintosh"; case OSMINORTYPE_NATIVE_XSERVER: return "Native X Server"; case OSMINORTYPE_PSEUDO_XSERVER: return "Pseudo X Server"; case OSMINORTYPE_WINDOWS_RT: return "Windows RT"; } return "Unknown version"; } const char* freerdp_peer_os_minor_type_string(freerdp_peer* client) { rdpContext* context; UINT16 osMinorType; WINPR_ASSERT(client); context = client->context; WINPR_ASSERT(context); WINPR_ASSERT(context->settings); osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType); return os_minor_type_to_string(osMinorType); } freerdp_peer* freerdp_peer_new(int sockfd) { UINT32 option_value; socklen_t option_len; freerdp_peer* client; client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer)); if (!client) return NULL; option_value = TRUE; option_len = sizeof(option_value); setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len); if (client) { client->sockfd = sockfd; client->ContextSize = sizeof(rdpContext); client->Initialize = freerdp_peer_initialize; client->GetFileDescriptor = freerdp_peer_get_fds; client->GetEventHandle = freerdp_peer_get_event_handle; client->GetEventHandles = freerdp_peer_get_event_handles; client->CheckFileDescriptor = freerdp_peer_check_fds; client->Close = freerdp_peer_close; client->Disconnect = freerdp_peer_disconnect; client->SendChannelData = freerdp_peer_send_channel_data; client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu; client->IsWriteBlocked = freerdp_peer_is_write_blocked; client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; client->HasMoreToRead = freerdp_peer_has_more_to_read; client->VirtualChannelOpen = freerdp_peer_virtual_channel_open; client->VirtualChannelClose = freerdp_peer_virtual_channel_close; client->VirtualChannelWrite = freerdp_peer_virtual_channel_write; client->VirtualChannelRead = NULL; /* must be defined by server application */ client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data; client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data; } return client; } void freerdp_peer_free(freerdp_peer* client) { if (!client) return; free(client); }