2011-07-03 05:50:11 +04:00
|
|
|
/**
|
2012-10-09 07:02:04 +04:00
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
2011-07-03 05:50:11 +04:00
|
|
|
* Network Transport Layer
|
|
|
|
*
|
|
|
|
* Copyright 2011 Vic Lee
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2012-08-15 01:09:01 +04:00
|
|
|
#ifdef HAVE_CONFIG_H
|
2011-08-03 05:34:23 +04:00
|
|
|
#include "config.h"
|
2012-08-15 01:09:01 +04:00
|
|
|
#endif
|
|
|
|
|
2013-09-05 15:44:12 +04:00
|
|
|
#include <assert.h>
|
2011-07-03 05:50:11 +04:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2012-08-15 01:09:01 +04:00
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
#include <winpr/crt.h>
|
2012-11-27 05:15:48 +04:00
|
|
|
#include <winpr/synch.h>
|
2012-12-14 09:25:48 +04:00
|
|
|
#include <winpr/print.h>
|
2014-02-05 20:54:42 +04:00
|
|
|
#include <winpr/stream.h>
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2012-12-14 09:25:48 +04:00
|
|
|
#include <freerdp/error.h>
|
2012-09-04 01:08:46 +04:00
|
|
|
#include <freerdp/utils/tcp.h>
|
2011-07-03 05:50:11 +04:00
|
|
|
|
2011-07-03 12:37:36 +04:00
|
|
|
#include <time.h>
|
|
|
|
#include <errno.h>
|
2011-07-03 11:53:55 +04:00
|
|
|
#include <fcntl.h>
|
|
|
|
|
2011-08-16 01:05:48 +04:00
|
|
|
#ifndef _WIN32
|
2011-08-16 23:35:29 +04:00
|
|
|
#include <netdb.h>
|
2011-08-16 01:05:48 +04:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
|
|
|
|
2011-07-03 14:30:43 +04:00
|
|
|
#include "tpkt.h"
|
2011-08-01 20:19:39 +04:00
|
|
|
#include "fastpath.h"
|
2011-07-03 06:59:07 +04:00
|
|
|
#include "transport.h"
|
2013-12-21 03:26:07 +04:00
|
|
|
#include "rdp.h"
|
2011-07-03 05:50:11 +04:00
|
|
|
|
2011-07-03 14:30:43 +04:00
|
|
|
#define BUFFER_SIZE 16384
|
|
|
|
|
2013-03-27 21:03:41 +04:00
|
|
|
static void* transport_client_thread(void* arg);
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
wStream* transport_send_stream_init(rdpTransport* transport, int size)
|
2011-07-10 23:34:43 +04:00
|
|
|
{
|
2013-05-16 02:05:40 +04:00
|
|
|
wStream* s;
|
|
|
|
|
|
|
|
s = StreamPool_Take(transport->ReceivePool, size);
|
|
|
|
|
2013-05-02 02:15:55 +04:00
|
|
|
Stream_EnsureCapacity(s, size);
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_SetPosition(s, 0);
|
2013-05-16 02:05:40 +04:00
|
|
|
|
2011-07-10 23:34:43 +04:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2011-08-18 19:15:28 +04:00
|
|
|
void transport_attach(rdpTransport* transport, int sockfd)
|
|
|
|
{
|
2013-07-21 06:34:05 +04:00
|
|
|
tcp_attach(transport->TcpIn, sockfd);
|
2012-12-13 00:55:42 +04:00
|
|
|
transport->SplitInputOutput = FALSE;
|
|
|
|
transport->TcpOut = transport->TcpIn;
|
2011-08-18 19:15:28 +04:00
|
|
|
}
|
|
|
|
|
2014-03-18 23:27:23 +04:00
|
|
|
void transport_stop(rdpTransport* transport)
|
|
|
|
{
|
|
|
|
if (transport->async)
|
|
|
|
{
|
|
|
|
if (transport->stopEvent)
|
|
|
|
{
|
|
|
|
SetEvent(transport->stopEvent);
|
|
|
|
WaitForSingleObject(transport->thread, INFINITE);
|
|
|
|
|
|
|
|
CloseHandle(transport->thread);
|
|
|
|
CloseHandle(transport->stopEvent);
|
|
|
|
|
|
|
|
transport->thread = NULL;
|
|
|
|
transport->stopEvent = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_disconnect(rdpTransport* transport)
|
2011-07-03 05:50:11 +04:00
|
|
|
{
|
2012-12-13 05:02:56 +04:00
|
|
|
BOOL status = TRUE;
|
|
|
|
|
2013-11-14 13:09:21 +04:00
|
|
|
if (!transport)
|
|
|
|
return FALSE;
|
|
|
|
|
2014-03-18 23:27:23 +04:00
|
|
|
transport_stop(transport);
|
|
|
|
|
2011-09-04 00:36:27 +04:00
|
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
2012-12-13 05:02:56 +04:00
|
|
|
status &= tls_disconnect(transport->TlsIn);
|
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if ((transport->layer == TRANSPORT_LAYER_TSG) || (transport->layer == TRANSPORT_LAYER_TSG_TLS))
|
2012-12-13 05:02:56 +04:00
|
|
|
{
|
2013-12-21 02:56:59 +04:00
|
|
|
status &= tsg_disconnect(transport->tsg);
|
2012-12-13 05:02:56 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
status &= tcp_disconnect(transport->TcpIn);
|
|
|
|
}
|
2012-02-12 21:46:53 +04:00
|
|
|
|
2012-12-13 05:02:56 +04:00
|
|
|
return status;
|
2011-07-03 05:50:11 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_connect_rdp(rdpTransport* transport)
|
2011-07-03 05:50:11 +04:00
|
|
|
{
|
2011-07-04 03:27:02 +04:00
|
|
|
/* RDP encryption */
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-04 03:27:02 +04:00
|
|
|
}
|
|
|
|
|
2013-10-11 23:27:22 +04:00
|
|
|
long transport_bio_tsg_callback(BIO* bio, int mode, const char* argp, int argi, long argl, long ret)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2013-10-11 14:12:50 +04:00
|
|
|
static int transport_bio_tsg_write(BIO* bio, const char* buf, int num)
|
|
|
|
{
|
2013-10-11 23:27:22 +04:00
|
|
|
int status;
|
|
|
|
rdpTsg* tsg;
|
|
|
|
|
|
|
|
tsg = (rdpTsg*) bio->ptr;
|
|
|
|
status = tsg_write(tsg, (BYTE*) buf, num);
|
|
|
|
|
2013-10-11 14:12:50 +04:00
|
|
|
BIO_clear_retry_flags(bio);
|
|
|
|
|
2013-12-21 02:56:59 +04:00
|
|
|
if (status == 0)
|
2013-10-11 23:27:22 +04:00
|
|
|
{
|
|
|
|
BIO_set_retry_write(bio);
|
|
|
|
}
|
|
|
|
|
2013-12-21 02:56:59 +04:00
|
|
|
return status < 0 ? 0 : num;
|
2013-10-11 14:12:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_read(BIO* bio, char* buf, int size)
|
|
|
|
{
|
2013-10-11 23:27:22 +04:00
|
|
|
int status;
|
|
|
|
rdpTsg* tsg;
|
|
|
|
|
|
|
|
tsg = (rdpTsg*) bio->ptr;
|
|
|
|
status = tsg_read(bio->ptr, (BYTE*) buf, size);
|
|
|
|
|
2013-10-11 14:12:50 +04:00
|
|
|
BIO_clear_retry_flags(bio);
|
|
|
|
|
2013-12-21 02:56:59 +04:00
|
|
|
if (status == 0)
|
2013-10-11 23:27:22 +04:00
|
|
|
{
|
|
|
|
BIO_set_retry_read(bio);
|
2013-12-21 02:56:59 +04:00
|
|
|
status = -1;
|
|
|
|
}
|
|
|
|
else if (status == -1)
|
|
|
|
{
|
|
|
|
status = 0;
|
2013-10-11 23:27:22 +04:00
|
|
|
}
|
|
|
|
|
2013-12-21 02:56:59 +04:00
|
|
|
return status >= 0 ? status : -1;
|
2013-10-11 14:12:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_puts(BIO* bio, const char* str)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_gets(BIO* bio, char* str, int size)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long transport_bio_tsg_ctrl(BIO* bio, int cmd, long arg1, void* arg2)
|
|
|
|
{
|
2013-10-29 04:20:18 +04:00
|
|
|
if (cmd == BIO_CTRL_FLUSH)
|
|
|
|
{
|
2013-10-24 22:13:41 +04:00
|
|
|
return 1;
|
|
|
|
}
|
2013-10-29 04:20:18 +04:00
|
|
|
|
2013-10-24 22:13:41 +04:00
|
|
|
return 0;
|
2013-10-11 14:12:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_new(BIO* bio)
|
|
|
|
{
|
|
|
|
bio->init = 1;
|
|
|
|
bio->num = 0;
|
|
|
|
bio->ptr = NULL;
|
|
|
|
bio->flags = 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_free(BIO* bio)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BIO_TYPE_TSG 65
|
|
|
|
|
|
|
|
static BIO_METHOD transport_bio_tsg_methods =
|
|
|
|
{
|
|
|
|
BIO_TYPE_TSG,
|
|
|
|
"TSGateway",
|
|
|
|
transport_bio_tsg_write,
|
|
|
|
transport_bio_tsg_read,
|
|
|
|
transport_bio_tsg_puts,
|
|
|
|
transport_bio_tsg_gets,
|
|
|
|
transport_bio_tsg_ctrl,
|
|
|
|
transport_bio_tsg_new,
|
|
|
|
transport_bio_tsg_free,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
BIO_METHOD* BIO_s_tsg(void)
|
|
|
|
{
|
|
|
|
return &transport_bio_tsg_methods;
|
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_connect_tls(rdpTransport* transport)
|
2011-07-04 03:27:02 +04:00
|
|
|
{
|
2012-11-15 08:21:00 +04:00
|
|
|
if (transport->layer == TRANSPORT_LAYER_TSG)
|
2013-10-11 14:12:50 +04:00
|
|
|
{
|
2013-10-24 22:13:41 +04:00
|
|
|
transport->TsgTls = tls_new(transport->settings);
|
2013-10-11 14:12:50 +04:00
|
|
|
|
2013-10-24 22:13:41 +04:00
|
|
|
transport->TsgTls->methods = BIO_s_tsg();
|
|
|
|
transport->TsgTls->tsg = (void*) transport->tsg;
|
2013-10-11 14:12:50 +04:00
|
|
|
|
2013-10-24 22:13:41 +04:00
|
|
|
transport->layer = TRANSPORT_LAYER_TSG_TLS;
|
2013-10-11 14:12:50 +04:00
|
|
|
|
2013-12-07 07:15:45 +04:00
|
|
|
transport->TsgTls->hostname = transport->settings->ServerHostname;
|
|
|
|
transport->TsgTls->port = transport->settings->ServerPort;
|
|
|
|
|
|
|
|
if (transport->TsgTls->port == 0)
|
|
|
|
transport->TsgTls->port = 3389;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_connect(transport->TsgTls))
|
2013-10-11 14:12:50 +04:00
|
|
|
{
|
|
|
|
if (!connectErrorCode)
|
|
|
|
connectErrorCode = TLSCONNECTERROR;
|
|
|
|
|
2013-10-24 22:13:41 +04:00
|
|
|
tls_free(transport->TsgTls);
|
|
|
|
transport->TsgTls = NULL;
|
2013-10-11 14:12:50 +04:00
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2012-11-15 08:21:00 +04:00
|
|
|
return TRUE;
|
2013-10-11 14:12:50 +04:00
|
|
|
}
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!transport->TlsIn)
|
2012-11-15 08:21:00 +04:00
|
|
|
transport->TlsIn = tls_new(transport->settings);
|
2011-07-04 03:27:02 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!transport->TlsOut)
|
2012-11-15 08:21:00 +04:00
|
|
|
transport->TlsOut = transport->TlsIn;
|
2011-07-04 03:27:02 +04:00
|
|
|
|
2012-11-15 08:21:00 +04:00
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
|
|
|
transport->TlsIn->sockfd = transport->TcpIn->sockfd;
|
|
|
|
|
2013-12-07 07:15:45 +04:00
|
|
|
transport->TlsIn->hostname = transport->settings->ServerHostname;
|
|
|
|
transport->TlsIn->port = transport->settings->ServerPort;
|
|
|
|
|
|
|
|
if (transport->TlsIn->port == 0)
|
|
|
|
transport->TlsIn->port = 3389;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_connect(transport->TlsIn))
|
2012-11-15 08:21:00 +04:00
|
|
|
{
|
|
|
|
if (!connectErrorCode)
|
|
|
|
connectErrorCode = TLSCONNECTERROR;
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2012-11-15 08:21:00 +04:00
|
|
|
tls_free(transport->TlsIn);
|
2013-03-27 21:03:41 +04:00
|
|
|
|
2012-12-20 14:45:21 +04:00
|
|
|
if (transport->TlsIn == transport->TlsOut)
|
|
|
|
transport->TlsIn = transport->TlsOut = NULL;
|
|
|
|
else
|
|
|
|
transport->TlsIn = NULL;
|
2012-05-22 00:01:24 +04:00
|
|
|
|
2012-11-15 08:21:00 +04:00
|
|
|
return FALSE;
|
2012-04-10 23:15:36 +04:00
|
|
|
}
|
2011-07-04 03:27:02 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-04 03:27:02 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_connect_nla(rdpTransport* transport)
|
2011-07-04 03:27:02 +04:00
|
|
|
{
|
2012-02-18 02:12:21 +04:00
|
|
|
freerdp* instance;
|
|
|
|
rdpSettings* settings;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
settings = transport->settings;
|
|
|
|
instance = (freerdp*) settings->instance;
|
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
if (!transport_connect_tls(transport))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-07-04 03:27:02 +04:00
|
|
|
|
|
|
|
/* Network Level Authentication */
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!settings->Authentication)
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-18 21:07:52 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->credssp)
|
2014-02-12 09:43:02 +04:00
|
|
|
{
|
2012-11-15 06:30:21 +04:00
|
|
|
transport->credssp = credssp_new(instance, transport, settings);
|
2011-07-07 21:37:48 +04:00
|
|
|
|
2014-02-12 09:43:02 +04:00
|
|
|
if (settings->AuthenticationServiceClass)
|
|
|
|
{
|
|
|
|
transport->credssp->ServicePrincipalName =
|
|
|
|
credssp_make_spn(settings->AuthenticationServiceClass, settings->ServerHostname);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-07 21:37:48 +04:00
|
|
|
if (credssp_authenticate(transport->credssp) < 0)
|
|
|
|
{
|
2013-01-10 20:19:57 +04:00
|
|
|
if (!connectErrorCode)
|
|
|
|
connectErrorCode = AUTHENTICATIONERROR;
|
2012-05-22 00:01:24 +04:00
|
|
|
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Authentication failure, check credentials.\n"
|
2011-07-07 21:37:48 +04:00
|
|
|
"If credentials are valid, the NTLMSSP implementation may be to blame.\n");
|
|
|
|
|
|
|
|
credssp_free(transport->credssp);
|
2013-07-01 21:24:19 +04:00
|
|
|
transport->credssp = NULL;
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-07-07 21:37:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
credssp_free(transport->credssp);
|
2013-11-08 02:37:58 +04:00
|
|
|
transport->credssp = NULL;
|
2011-07-07 21:37:48 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-03 05:50:11 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 11:01:37 +04:00
|
|
|
BOOL transport_tsg_connect(rdpTransport* transport, const char* hostname, UINT16 port)
|
2012-03-26 20:20:38 +04:00
|
|
|
{
|
2012-04-24 00:33:18 +04:00
|
|
|
rdpTsg* tsg = tsg_new(transport);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
|
|
|
tsg->transport = transport;
|
|
|
|
transport->tsg = tsg;
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->SplitInputOutput = TRUE;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsIn)
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn = tls_new(transport->settings);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn->sockfd = transport->TcpIn->sockfd;
|
2013-12-07 07:15:45 +04:00
|
|
|
transport->TlsIn->hostname = transport->settings->GatewayHostname;
|
|
|
|
transport->TlsIn->port = transport->settings->GatewayPort;
|
|
|
|
|
|
|
|
if (transport->TlsIn->port == 0)
|
|
|
|
transport->TlsIn->port = 443;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsOut)
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsOut = tls_new(transport->settings);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsOut->sockfd = transport->TcpOut->sockfd;
|
2013-12-07 07:15:45 +04:00
|
|
|
transport->TlsOut->hostname = transport->settings->GatewayHostname;
|
|
|
|
transport->TlsOut->port = transport->settings->GatewayPort;
|
|
|
|
|
|
|
|
if (transport->TlsOut->port == 0)
|
|
|
|
transport->TlsOut->port = 443;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_connect(transport->TlsIn))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_connect(transport->TlsOut))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
|
|
|
if (!tsg_connect(tsg, hostname, port))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2012-03-26 20:20:38 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 11:01:37 +04:00
|
|
|
BOOL transport_connect(rdpTransport* transport, const char* hostname, UINT16 port)
|
2012-03-26 20:20:38 +04:00
|
|
|
{
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL status = FALSE;
|
2012-03-26 20:20:38 +04:00
|
|
|
rdpSettings* settings = transport->settings;
|
|
|
|
|
2013-11-01 18:24:19 +04:00
|
|
|
transport->async = settings->AsyncTransport;
|
2013-03-27 21:03:41 +04:00
|
|
|
|
2013-07-03 23:07:12 +04:00
|
|
|
if (transport->settings->GatewayEnabled)
|
2012-03-26 20:20:38 +04:00
|
|
|
{
|
|
|
|
transport->layer = TRANSPORT_LAYER_TSG;
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TcpOut = tcp_new(settings);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2014-02-05 20:54:42 +04:00
|
|
|
status = tcp_connect(transport->TcpIn, settings->GatewayHostname, settings->GatewayPort);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
|
|
|
if (status)
|
2014-02-05 20:54:42 +04:00
|
|
|
status = tcp_connect(transport->TcpOut, settings->GatewayHostname, settings->GatewayPort);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
|
|
|
if (status)
|
|
|
|
status = transport_tsg_connect(transport, hostname, port);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2012-11-15 05:46:51 +04:00
|
|
|
status = tcp_connect(transport->TcpIn, hostname, port);
|
|
|
|
|
|
|
|
transport->SplitInputOutput = FALSE;
|
|
|
|
transport->TcpOut = transport->TcpIn;
|
2012-03-26 20:20:38 +04:00
|
|
|
}
|
|
|
|
|
2013-11-01 18:24:19 +04:00
|
|
|
if (status)
|
|
|
|
{
|
|
|
|
if (transport->async)
|
|
|
|
{
|
|
|
|
transport->stopEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
|
|
|
|
|
|
|
|
transport->thread = CreateThread(NULL, 0,
|
|
|
|
(LPTHREAD_START_ROUTINE) transport_client_thread, transport, 0, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-26 20:20:38 +04:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_accept_rdp(rdpTransport* transport)
|
2011-08-19 09:35:29 +04:00
|
|
|
{
|
|
|
|
/* RDP encryption */
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-19 09:35:29 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_accept_tls(rdpTransport* transport)
|
2011-08-19 09:35:29 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsIn)
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn = tls_new(transport->settings);
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsOut)
|
2012-12-13 00:55:42 +04:00
|
|
|
transport->TlsOut = transport->TlsIn;
|
|
|
|
|
2011-08-19 09:35:29 +04:00
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn->sockfd = transport->TcpIn->sockfd;
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_accept(transport->TlsIn, transport->settings->CertificateFile, transport->settings->PrivateKeyFile))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-19 09:35:29 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_accept_nla(rdpTransport* transport)
|
2011-08-19 09:35:29 +04:00
|
|
|
{
|
2012-02-18 02:12:21 +04:00
|
|
|
freerdp* instance;
|
|
|
|
rdpSettings* settings;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
settings = transport->settings;
|
|
|
|
instance = (freerdp*) settings->instance;
|
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsIn)
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn = tls_new(transport->settings);
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (!transport->TlsOut)
|
2013-01-16 15:58:37 +04:00
|
|
|
transport->TlsOut = transport->TlsIn;
|
|
|
|
|
2011-08-19 09:35:29 +04:00
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TlsIn->sockfd = transport->TcpIn->sockfd;
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!tls_accept(transport->TlsIn, transport->settings->CertificateFile, transport->settings->PrivateKeyFile))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-19 09:35:29 +04:00
|
|
|
|
|
|
|
/* Network Level Authentication */
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!settings->Authentication)
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (!transport->credssp)
|
2012-11-15 06:30:21 +04:00
|
|
|
transport->credssp = credssp_new(instance, transport, settings);
|
2012-02-14 07:27:59 +04:00
|
|
|
|
|
|
|
if (credssp_authenticate(transport->credssp) < 0)
|
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "client authentication failure\n");
|
2012-02-14 07:27:59 +04:00
|
|
|
credssp_free(transport->credssp);
|
2013-07-01 21:24:19 +04:00
|
|
|
transport->credssp = NULL;
|
2013-12-19 04:44:18 +04:00
|
|
|
|
|
|
|
tls_set_alert_code(transport->TlsIn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DESCRIPTION_ACCESS_DENIED);
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-02-14 07:27:59 +04:00
|
|
|
}
|
|
|
|
|
2012-09-16 23:30:11 +04:00
|
|
|
/* don't free credssp module yet, we need to copy the credentials from it first */
|
2011-08-19 09:35:29 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-19 09:35:29 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
BOOL nla_verify_header(wStream* s)
|
2011-07-03 05:50:11 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
if ((Stream_Pointer(s)[0] == 0x30) && (Stream_Pointer(s)[1] & 0x80))
|
2012-12-21 23:13:40 +04:00
|
|
|
return TRUE;
|
2011-07-04 06:11:14 +04:00
|
|
|
|
2012-12-21 23:13:40 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
2011-07-04 06:11:14 +04:00
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
UINT32 nla_read_header(wStream* s)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
|
|
|
UINT32 length = 0;
|
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (Stream_Pointer(s)[1] & 0x80)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
if ((Stream_Pointer(s)[1] & ~(0x80)) == 1)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
length = Stream_Pointer(s)[2];
|
2012-12-21 23:13:40 +04:00
|
|
|
length += 3;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, 3);
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
2013-11-08 00:14:59 +04:00
|
|
|
else if ((Stream_Pointer(s)[1] & ~(0x80)) == 2)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
length = (Stream_Pointer(s)[2] << 8) | Stream_Pointer(s)[3];
|
2012-12-21 23:13:40 +04:00
|
|
|
length += 4;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, 4);
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Error reading TSRequest!\n");
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
length = Stream_Pointer(s)[1];
|
2012-12-21 23:13:40 +04:00
|
|
|
length += 2;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, 2);
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return length;
|
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
UINT32 nla_header_length(wStream* s)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
|
|
|
UINT32 length = 0;
|
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
if (Stream_Pointer(s)[1] & 0x80)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 00:14:59 +04:00
|
|
|
if ((Stream_Pointer(s)[1] & ~(0x80)) == 1)
|
2012-12-21 23:13:40 +04:00
|
|
|
length = 3;
|
2013-11-08 00:14:59 +04:00
|
|
|
else if ((Stream_Pointer(s)[1] & ~(0x80)) == 2)
|
2012-12-21 23:13:40 +04:00
|
|
|
length = 4;
|
|
|
|
else
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Error reading TSRequest!\n");
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
length = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
return length;
|
|
|
|
}
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
int transport_read_layer(rdpTransport* transport, BYTE* data, int bytes)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
|
|
|
int read = 0;
|
|
|
|
int status = -1;
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
while (read < bytes)
|
|
|
|
{
|
|
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
|
|
|
status = tls_read(transport->TlsIn, data + read, bytes - read);
|
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TCP)
|
|
|
|
status = tcp_read(transport->TcpIn, data + read, bytes - read);
|
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TSG)
|
|
|
|
status = tsg_read(transport->tsg, data + read, bytes - read);
|
2013-10-26 01:29:46 +04:00
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TSG_TLS) {
|
2013-10-24 22:13:41 +04:00
|
|
|
status = tls_read(transport->TsgTls, data + read, bytes - read);
|
2013-10-26 01:29:46 +04:00
|
|
|
}
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
/* blocking means that we can't continue until this is read */
|
2012-12-13 08:52:23 +04:00
|
|
|
|
|
|
|
if (!transport->blocking)
|
2012-12-09 03:27:08 +04:00
|
|
|
return status;
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
if (status < 0)
|
2013-12-21 03:22:29 +04:00
|
|
|
{
|
|
|
|
/* A read error indicates that the peer has dropped the connection */
|
|
|
|
transport->layer = TRANSPORT_LAYER_CLOSED;
|
2012-12-09 03:27:08 +04:00
|
|
|
return status;
|
2013-12-21 03:22:29 +04:00
|
|
|
}
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
read += status;
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
if (status == 0)
|
|
|
|
{
|
2012-12-21 23:13:40 +04:00
|
|
|
/*
|
|
|
|
* instead of sleeping, we should wait timeout on the
|
|
|
|
* socket but this only happens on initial connection
|
|
|
|
*/
|
2012-12-22 00:49:02 +04:00
|
|
|
USleep(transport->SleepInterval);
|
2012-12-09 03:27:08 +04:00
|
|
|
}
|
|
|
|
}
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
return read;
|
2012-12-08 07:18:50 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
int transport_read(rdpTransport* transport, wStream* s)
|
2012-12-08 07:18:50 +04:00
|
|
|
{
|
|
|
|
int status;
|
2013-11-08 02:37:58 +04:00
|
|
|
int position;
|
2013-05-15 20:14:26 +04:00
|
|
|
int pduLength;
|
2013-11-08 02:37:58 +04:00
|
|
|
BYTE header[4];
|
2012-12-08 07:43:53 +04:00
|
|
|
int transport_status;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
position = 0;
|
2013-05-15 20:14:26 +04:00
|
|
|
pduLength = 0;
|
2012-12-08 07:43:53 +04:00
|
|
|
transport_status = 0;
|
2012-12-08 07:18:50 +04:00
|
|
|
|
2013-11-01 07:35:24 +04:00
|
|
|
if (!transport)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (!s)
|
|
|
|
return -1;
|
|
|
|
|
2012-12-08 07:18:50 +04:00
|
|
|
/* first check if we have header */
|
2013-11-08 02:37:58 +04:00
|
|
|
position = Stream_GetPosition(s);
|
2012-12-08 07:43:53 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (position < 4)
|
2011-08-01 18:21:06 +04:00
|
|
|
{
|
2013-11-08 02:37:58 +04:00
|
|
|
status = transport_read_layer(transport, Stream_Buffer(s) + position, 4 - position);
|
2012-12-08 07:43:53 +04:00
|
|
|
|
2012-12-08 07:18:50 +04:00
|
|
|
if (status < 0)
|
|
|
|
return status;
|
2012-12-08 07:43:53 +04:00
|
|
|
|
|
|
|
transport_status += status;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if ((status + position) < 4)
|
2012-12-08 07:43:53 +04:00
|
|
|
return transport_status;
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
position += status;
|
2011-08-01 18:21:06 +04:00
|
|
|
}
|
2012-12-08 07:43:53 +04:00
|
|
|
|
2013-11-08 22:57:41 +04:00
|
|
|
CopyMemory(header, Stream_Buffer(s), 4); /* peek at first 4 bytes */
|
2013-11-08 02:37:58 +04:00
|
|
|
|
2012-12-08 07:18:50 +04:00
|
|
|
/* if header is present, read in exactly one PDU */
|
2013-11-08 02:37:58 +04:00
|
|
|
if (header[0] == 0x03)
|
2011-08-03 05:34:23 +04:00
|
|
|
{
|
2012-12-21 23:13:40 +04:00
|
|
|
/* TPKT header */
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
pduLength = (header[2] << 8) | header[3];
|
2011-08-03 05:34:23 +04:00
|
|
|
}
|
2013-11-08 02:37:58 +04:00
|
|
|
else if (header[0] == 0x30)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
|
|
|
/* TSRequest (NLA) */
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (header[1] & 0x80)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 02:37:58 +04:00
|
|
|
if ((header[1] & ~(0x80)) == 1)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 02:37:58 +04:00
|
|
|
pduLength = header[2];
|
2013-05-15 20:14:26 +04:00
|
|
|
pduLength += 3;
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
2013-11-08 02:37:58 +04:00
|
|
|
else if ((header[1] & ~(0x80)) == 2)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2013-11-08 02:37:58 +04:00
|
|
|
pduLength = (header[2] << 8) | header[3];
|
2013-05-15 20:14:26 +04:00
|
|
|
pduLength += 4;
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Error reading TSRequest!\n");
|
2013-11-08 02:37:58 +04:00
|
|
|
return -1;
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-11-08 02:37:58 +04:00
|
|
|
pduLength = header[1];
|
2013-05-15 20:14:26 +04:00
|
|
|
pduLength += 2;
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
}
|
2012-12-08 07:18:50 +04:00
|
|
|
else
|
|
|
|
{
|
2012-12-21 23:13:40 +04:00
|
|
|
/* Fast-Path Header */
|
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (header[1] & 0x80)
|
|
|
|
pduLength = ((header[1] & 0x7F) << 8) | header[2];
|
2012-12-08 07:18:50 +04:00
|
|
|
else
|
2013-11-08 02:37:58 +04:00
|
|
|
pduLength = header[1];
|
2012-12-08 07:18:50 +04:00
|
|
|
}
|
2012-12-08 07:43:53 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
status = transport_read_layer(transport, Stream_Buffer(s) + position, pduLength - position);
|
2012-12-08 07:43:53 +04:00
|
|
|
|
2012-12-08 07:18:50 +04:00
|
|
|
if (status < 0)
|
|
|
|
return status;
|
2012-12-08 07:43:53 +04:00
|
|
|
|
|
|
|
transport_status += status;
|
|
|
|
|
2012-12-09 03:27:08 +04:00
|
|
|
#ifdef WITH_DEBUG_TRANSPORT
|
|
|
|
/* dump when whole PDU is read */
|
2013-11-08 02:37:58 +04:00
|
|
|
if (position + status >= pduLength)
|
2012-12-09 03:27:08 +04:00
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Local < Remote\n");
|
2013-05-15 20:14:26 +04:00
|
|
|
winpr_HexDump(Stream_Buffer(s), pduLength);
|
2012-12-09 03:27:08 +04:00
|
|
|
}
|
|
|
|
#endif
|
2012-12-13 08:52:23 +04:00
|
|
|
|
2013-11-08 02:37:58 +04:00
|
|
|
if (position + status >= pduLength)
|
2013-10-09 07:43:57 +04:00
|
|
|
{
|
2013-10-09 23:11:56 +04:00
|
|
|
WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), pduLength, WLOG_PACKET_INBOUND);
|
2013-10-09 07:43:57 +04:00
|
|
|
}
|
|
|
|
|
2012-12-08 07:43:53 +04:00
|
|
|
return transport_status;
|
2011-07-03 05:50:11 +04:00
|
|
|
}
|
|
|
|
|
2011-08-01 08:43:53 +04:00
|
|
|
static int transport_read_nonblocking(rdpTransport* transport)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
2012-12-22 00:49:02 +04:00
|
|
|
status = transport_read(transport, transport->ReceiveBuffer);
|
2011-08-01 08:43:53 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
|
|
|
return status;
|
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(transport->ReceiveBuffer, status);
|
2011-08-01 08:43:53 +04:00
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
int transport_write(rdpTransport* transport, wStream* s)
|
2011-07-03 14:30:43 +04:00
|
|
|
{
|
2011-08-01 11:04:07 +04:00
|
|
|
int length;
|
2013-05-15 20:14:26 +04:00
|
|
|
int status = -1;
|
2011-07-03 14:30:43 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
EnterCriticalSection(&(transport->WriteLock));
|
2013-05-16 02:05:40 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
length = Stream_GetPosition(s);
|
|
|
|
Stream_SetPosition(s, 0);
|
2011-08-03 05:34:23 +04:00
|
|
|
|
|
|
|
#ifdef WITH_DEBUG_TRANSPORT
|
|
|
|
if (length > 0)
|
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Local > Remote\n");
|
2013-05-15 20:14:26 +04:00
|
|
|
winpr_HexDump(Stream_Buffer(s), length);
|
2011-08-03 05:34:23 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-10-09 07:43:57 +04:00
|
|
|
if (length > 0)
|
|
|
|
{
|
2013-10-09 23:11:56 +04:00
|
|
|
WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), length, WLOG_PACKET_OUTBOUND);
|
2013-10-09 07:43:57 +04:00
|
|
|
}
|
|
|
|
|
2012-01-24 14:42:30 +04:00
|
|
|
while (length > 0)
|
2011-08-01 11:04:07 +04:00
|
|
|
{
|
|
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
2013-04-30 06:35:15 +04:00
|
|
|
status = tls_write(transport->TlsOut, Stream_Pointer(s), length);
|
2011-08-01 11:04:07 +04:00
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TCP)
|
2013-04-30 06:35:15 +04:00
|
|
|
status = tcp_write(transport->TcpOut, Stream_Pointer(s), length);
|
2012-03-26 20:20:38 +04:00
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TSG)
|
2013-04-30 06:35:15 +04:00
|
|
|
status = tsg_write(transport->tsg, Stream_Pointer(s), length);
|
2013-10-24 22:13:41 +04:00
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TSG_TLS)
|
|
|
|
status = tls_write(transport->TsgTls, Stream_Pointer(s), length);
|
2011-08-01 11:04:07 +04:00
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
break; /* error occurred */
|
|
|
|
|
|
|
|
if (status == 0)
|
|
|
|
{
|
2011-08-01 18:21:06 +04:00
|
|
|
/* when sending is blocked in nonblocking mode, the receiving buffer should be checked */
|
|
|
|
if (!transport->blocking)
|
2011-08-20 16:30:18 +04:00
|
|
|
{
|
|
|
|
/* and in case we do have buffered some data, we set the event so next loop will get it */
|
|
|
|
if (transport_read_nonblocking(transport) > 0)
|
2012-12-22 00:49:02 +04:00
|
|
|
SetEvent(transport->ReceiveEvent);
|
2011-08-20 16:30:18 +04:00
|
|
|
}
|
2012-12-21 12:23:50 +04:00
|
|
|
|
|
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
|
|
|
tls_wait_write(transport->TlsOut);
|
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TCP)
|
|
|
|
tcp_wait_write(transport->TcpOut);
|
2013-10-25 20:43:21 +04:00
|
|
|
else if (transport->layer == TRANSPORT_LAYER_TSG_TLS)
|
|
|
|
tls_wait_write(transport->TsgTls);
|
2012-12-21 12:23:50 +04:00
|
|
|
else
|
2012-12-22 00:49:02 +04:00
|
|
|
USleep(transport->SleepInterval);
|
2011-08-01 11:04:07 +04:00
|
|
|
}
|
|
|
|
|
2012-01-24 14:42:30 +04:00
|
|
|
length -= status;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, status);
|
2011-08-01 11:04:07 +04:00
|
|
|
}
|
2011-07-03 14:30:43 +04:00
|
|
|
|
2011-08-25 09:30:17 +04:00
|
|
|
if (status < 0)
|
|
|
|
{
|
|
|
|
/* A write error indicates that the peer has dropped the connection */
|
|
|
|
transport->layer = TRANSPORT_LAYER_CLOSED;
|
|
|
|
}
|
|
|
|
|
2013-05-16 02:05:40 +04:00
|
|
|
if (s->pool)
|
|
|
|
Stream_Release(s);
|
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
LeaveCriticalSection(&(transport->WriteLock));
|
2013-05-16 02:05:40 +04:00
|
|
|
|
2011-07-10 23:34:43 +04:00
|
|
|
return status;
|
2011-07-04 06:11:14 +04:00
|
|
|
}
|
|
|
|
|
2011-08-20 16:30:18 +04:00
|
|
|
void transport_get_fds(rdpTransport* transport, void** rfds, int* rcount)
|
|
|
|
{
|
2012-12-19 21:16:39 +04:00
|
|
|
void* pfd;
|
2012-11-27 05:15:48 +04:00
|
|
|
|
2012-09-18 01:44:06 +04:00
|
|
|
#ifdef _WIN32
|
2012-11-22 18:06:45 +04:00
|
|
|
rfds[*rcount] = transport->TcpIn->wsa_event;
|
2012-11-17 13:47:13 +04:00
|
|
|
(*rcount)++;
|
2012-11-22 18:06:45 +04:00
|
|
|
|
|
|
|
if (transport->SplitInputOutput)
|
|
|
|
{
|
|
|
|
rfds[*rcount] = transport->TcpOut->wsa_event;
|
|
|
|
(*rcount)++;
|
|
|
|
}
|
2012-09-18 01:44:06 +04:00
|
|
|
#else
|
2012-11-15 05:46:51 +04:00
|
|
|
rfds[*rcount] = (void*)(long)(transport->TcpIn->sockfd);
|
2011-08-20 16:30:18 +04:00
|
|
|
(*rcount)++;
|
2012-11-17 13:47:13 +04:00
|
|
|
|
|
|
|
if (transport->SplitInputOutput)
|
|
|
|
{
|
|
|
|
rfds[*rcount] = (void*)(long)(transport->TcpOut->sockfd);
|
|
|
|
(*rcount)++;
|
|
|
|
}
|
|
|
|
#endif
|
2012-11-27 05:15:48 +04:00
|
|
|
|
2012-12-22 00:49:02 +04:00
|
|
|
pfd = GetEventWaitObject(transport->ReceiveEvent);
|
2012-11-27 05:15:48 +04:00
|
|
|
|
2012-12-19 21:16:39 +04:00
|
|
|
if (pfd)
|
2012-11-27 05:15:48 +04:00
|
|
|
{
|
2012-12-19 21:16:39 +04:00
|
|
|
rfds[*rcount] = pfd;
|
2012-11-27 05:15:48 +04:00
|
|
|
(*rcount)++;
|
|
|
|
}
|
2013-03-28 04:06:10 +04:00
|
|
|
|
|
|
|
if (transport->GatewayEvent)
|
|
|
|
{
|
|
|
|
pfd = GetEventWaitObject(transport->GatewayEvent);
|
|
|
|
|
|
|
|
if (pfd)
|
|
|
|
{
|
|
|
|
rfds[*rcount] = pfd;
|
|
|
|
(*rcount)++;
|
|
|
|
}
|
|
|
|
}
|
2011-08-20 16:30:18 +04:00
|
|
|
}
|
|
|
|
|
2013-05-01 01:16:38 +04:00
|
|
|
void transport_get_read_handles(rdpTransport* transport, HANDLE* events, DWORD* count)
|
|
|
|
{
|
|
|
|
events[*count] = tcp_get_event_handle(transport->TcpIn);
|
|
|
|
(*count)++;
|
|
|
|
|
|
|
|
if (transport->SplitInputOutput)
|
|
|
|
{
|
|
|
|
events[*count] = tcp_get_event_handle(transport->TcpOut);
|
|
|
|
(*count)++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (transport->ReceiveEvent)
|
|
|
|
{
|
|
|
|
events[*count] = transport->ReceiveEvent;
|
|
|
|
(*count)++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (transport->GatewayEvent)
|
|
|
|
{
|
|
|
|
events[*count] = transport->GatewayEvent;
|
|
|
|
(*count)++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-04 01:25:56 +04:00
|
|
|
int transport_check_fds(rdpTransport* transport)
|
2011-07-03 05:50:11 +04:00
|
|
|
{
|
2011-08-01 08:43:53 +04:00
|
|
|
int pos;
|
|
|
|
int status;
|
2013-11-08 02:37:58 +04:00
|
|
|
int length;
|
2013-01-07 02:24:08 +04:00
|
|
|
int recv_status;
|
2013-03-21 23:19:33 +04:00
|
|
|
wStream* received;
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2013-11-01 07:35:24 +04:00
|
|
|
if (!transport)
|
|
|
|
return -1;
|
|
|
|
|
2012-10-01 22:08:13 +04:00
|
|
|
#ifdef _WIN32
|
2012-11-22 18:06:45 +04:00
|
|
|
WSAResetEvent(transport->TcpIn->wsa_event);
|
2012-10-01 22:08:13 +04:00
|
|
|
#endif
|
2012-12-22 00:49:02 +04:00
|
|
|
ResetEvent(transport->ReceiveEvent);
|
2011-08-20 16:30:18 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
/**
|
|
|
|
* Loop through and read all available PDUs. Since multiple
|
|
|
|
* PDUs can exist, it's important to deliver them all before
|
|
|
|
* returning. Otherwise we run the risk of having a thread
|
|
|
|
* wait for a socket to get signalled that data is available
|
|
|
|
* (which may never happen).
|
|
|
|
*/
|
|
|
|
for (;;)
|
2011-08-01 08:43:53 +04:00
|
|
|
{
|
2014-03-10 23:35:14 +04:00
|
|
|
status = transport_read_nonblocking(transport);
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (status <= 0)
|
|
|
|
return status;
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
while ((pos = Stream_GetPosition(transport->ReceiveBuffer)) > 0)
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2014-03-10 23:35:14 +04:00
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, 0);
|
2012-12-21 23:13:40 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (tpkt_verify_header(transport->ReceiveBuffer)) /* TPKT */
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2014-03-10 23:35:14 +04:00
|
|
|
/* Ensure the TPKT header is available. */
|
|
|
|
if (pos <= 4)
|
|
|
|
{
|
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
length = tpkt_read_header(transport->ReceiveBuffer);
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
2014-03-10 23:35:14 +04:00
|
|
|
else if (nla_verify_header(transport->ReceiveBuffer))
|
|
|
|
{
|
|
|
|
/* TSRequest */
|
2012-12-21 23:13:40 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
/* Ensure the TSRequest header is available. */
|
|
|
|
if (pos <= 4)
|
|
|
|
{
|
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
|
|
|
return 0;
|
|
|
|
}
|
2012-12-21 23:13:40 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
/* TSRequest header can be 2, 3 or 4 bytes long */
|
|
|
|
length = nla_header_length(transport->ReceiveBuffer);
|
|
|
|
|
|
|
|
if (pos < length)
|
|
|
|
{
|
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
length = nla_read_header(transport->ReceiveBuffer);
|
|
|
|
}
|
|
|
|
else /* Fast Path */
|
2012-12-21 23:13:40 +04:00
|
|
|
{
|
2014-03-10 23:35:14 +04:00
|
|
|
/* Ensure the Fast Path header is available. */
|
|
|
|
if (pos <= 2)
|
|
|
|
{
|
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fastpath header can be two or three bytes long. */
|
|
|
|
length = fastpath_header_length(transport->ReceiveBuffer);
|
|
|
|
|
|
|
|
if (pos < length)
|
|
|
|
{
|
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
length = fastpath_read_header(NULL, transport->ReceiveBuffer);
|
2012-12-21 23:13:40 +04:00
|
|
|
}
|
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (length == 0)
|
2011-08-23 11:36:03 +04:00
|
|
|
{
|
2014-03-10 23:35:14 +04:00
|
|
|
fprintf(stderr, "transport_check_fds: protocol error, not a TPKT or Fast Path header.\n");
|
|
|
|
winpr_HexDump(Stream_Buffer(transport->ReceiveBuffer), pos);
|
|
|
|
return -1;
|
2011-08-23 11:36:03 +04:00
|
|
|
}
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2012-02-08 14:50:29 +04:00
|
|
|
if (pos < length)
|
|
|
|
{
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_SetPosition(transport->ReceiveBuffer, pos);
|
2014-03-10 23:35:14 +04:00
|
|
|
return 0; /* Packet is not yet completely received. */
|
2012-02-08 14:50:29 +04:00
|
|
|
}
|
2012-11-15 05:46:51 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
received = transport->ReceiveBuffer;
|
|
|
|
transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
Stream_SetPosition(received, length);
|
|
|
|
Stream_SealLength(received);
|
|
|
|
Stream_SetPosition(received, 0);
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
/**
|
|
|
|
* status:
|
|
|
|
* -1: error
|
|
|
|
* 0: success
|
|
|
|
* 1: redirection
|
|
|
|
*/
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
recv_status = transport->ReceiveCallback(transport, received, transport->ReceiveExtra);
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (recv_status == 1)
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Last call to ReceiveCallback resulted in a session redirection,
|
|
|
|
* which means the current rdpTransport* transport pointer has been freed.
|
|
|
|
* Return 0 for success, the rest of this function is meant for non-redirected cases.
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
}
|
2012-04-09 21:28:33 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
Stream_Release(received);
|
2013-11-01 22:13:09 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (recv_status < 0)
|
|
|
|
status = -1;
|
2013-01-07 02:24:08 +04:00
|
|
|
|
2014-03-10 23:35:14 +04:00
|
|
|
if (status < 0)
|
|
|
|
return status;
|
2013-11-01 07:35:24 +04:00
|
|
|
}
|
2011-08-01 08:43:53 +04:00
|
|
|
}
|
|
|
|
|
2011-07-04 05:07:34 +04:00
|
|
|
return 0;
|
2011-07-03 05:50:11 +04:00
|
|
|
}
|
2011-07-03 23:34:15 +04:00
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
BOOL transport_set_blocking_mode(rdpTransport* transport, BOOL blocking)
|
2011-08-01 08:43:53 +04:00
|
|
|
{
|
2012-11-28 03:34:00 +04:00
|
|
|
BOOL status;
|
|
|
|
|
|
|
|
status = TRUE;
|
2011-08-01 08:43:53 +04:00
|
|
|
transport->blocking = blocking;
|
2012-11-28 03:34:00 +04:00
|
|
|
|
|
|
|
if (transport->SplitInputOutput)
|
|
|
|
{
|
|
|
|
status &= tcp_set_blocking_mode(transport->TcpIn, blocking);
|
|
|
|
status &= tcp_set_blocking_mode(transport->TcpOut, blocking);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
status &= tcp_set_blocking_mode(transport->TcpIn, blocking);
|
|
|
|
}
|
|
|
|
|
2013-10-26 03:17:36 +04:00
|
|
|
if (transport->layer == TRANSPORT_LAYER_TSG || transport->layer == TRANSPORT_LAYER_TSG_TLS)
|
2012-12-07 01:49:50 +04:00
|
|
|
{
|
|
|
|
tsg_set_blocking_mode(transport->tsg, blocking);
|
|
|
|
}
|
|
|
|
|
2012-11-28 03:34:00 +04:00
|
|
|
return status;
|
2011-08-01 08:43:53 +04:00
|
|
|
}
|
|
|
|
|
2013-03-27 21:03:41 +04:00
|
|
|
static void* transport_client_thread(void* arg)
|
|
|
|
{
|
|
|
|
DWORD status;
|
|
|
|
DWORD nCount;
|
2013-11-04 21:40:29 +04:00
|
|
|
HANDLE handles[8];
|
2013-03-27 21:03:41 +04:00
|
|
|
freerdp* instance;
|
2013-06-19 00:55:23 +04:00
|
|
|
rdpContext* context;
|
2013-03-27 21:03:41 +04:00
|
|
|
rdpTransport* transport;
|
|
|
|
|
|
|
|
transport = (rdpTransport*) arg;
|
2013-09-05 15:40:04 +04:00
|
|
|
assert(NULL != transport);
|
|
|
|
assert(NULL != transport->settings);
|
|
|
|
|
2013-03-27 21:03:41 +04:00
|
|
|
instance = (freerdp*) transport->settings->instance;
|
2013-09-05 15:40:04 +04:00
|
|
|
assert(NULL != instance);
|
|
|
|
|
2013-06-19 00:55:23 +04:00
|
|
|
context = instance->context;
|
2013-09-05 15:40:04 +04:00
|
|
|
assert(NULL != instance->context);
|
2013-11-04 21:40:29 +04:00
|
|
|
|
2013-11-05 00:52:29 +04:00
|
|
|
WLog_Print(transport->log, WLOG_DEBUG, "Starting transport thread");
|
|
|
|
|
2013-11-04 21:40:29 +04:00
|
|
|
nCount = 0;
|
|
|
|
handles[nCount++] = transport->stopEvent;
|
|
|
|
handles[nCount++] = transport->connectedEvent;
|
|
|
|
|
|
|
|
status = WaitForMultipleObjects(nCount, handles, FALSE, INFINITE);
|
|
|
|
|
2013-11-05 20:49:42 +04:00
|
|
|
if (WaitForSingleObject(transport->stopEvent, 0) == WAIT_OBJECT_0)
|
2013-11-04 21:40:29 +04:00
|
|
|
{
|
2013-11-05 00:52:29 +04:00
|
|
|
WLog_Print(transport->log, WLOG_DEBUG, "Terminating transport thread");
|
2013-11-04 21:40:29 +04:00
|
|
|
ExitThread(0);
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-03-27 21:03:41 +04:00
|
|
|
|
2013-11-05 00:52:29 +04:00
|
|
|
WLog_Print(transport->log, WLOG_DEBUG, "Asynchronous transport activated");
|
|
|
|
|
2013-03-27 21:03:41 +04:00
|
|
|
while (1)
|
|
|
|
{
|
2013-05-01 01:16:38 +04:00
|
|
|
nCount = 0;
|
2013-11-04 21:40:29 +04:00
|
|
|
handles[nCount++] = transport->stopEvent;
|
2013-05-01 02:25:18 +04:00
|
|
|
|
2013-11-04 21:40:29 +04:00
|
|
|
transport_get_read_handles(transport, (HANDLE*) &handles, &nCount);
|
2013-10-16 06:42:07 +04:00
|
|
|
|
2014-03-18 23:27:23 +04:00
|
|
|
status = WaitForMultipleObjects(nCount, handles, FALSE, INFINITE);
|
2013-12-21 03:22:29 +04:00
|
|
|
if (transport->layer == TRANSPORT_LAYER_CLOSED)
|
|
|
|
{
|
2013-12-21 03:26:07 +04:00
|
|
|
rdpRdp* rdp = (rdpRdp*) transport->rdp;
|
|
|
|
rdp_set_error_info(rdp, ERRINFO_PEER_DISCONNECTED);
|
2013-03-27 21:03:41 +04:00
|
|
|
break;
|
2013-12-21 03:22:29 +04:00
|
|
|
}
|
|
|
|
else if (status != WAIT_TIMEOUT)
|
|
|
|
{
|
|
|
|
if (WaitForSingleObject(transport->stopEvent, 0) == WAIT_OBJECT_0)
|
|
|
|
break;
|
2013-03-27 21:03:41 +04:00
|
|
|
|
2013-12-21 03:22:29 +04:00
|
|
|
if (!freerdp_check_fds(instance))
|
|
|
|
break;
|
|
|
|
}
|
2013-03-27 21:03:41 +04:00
|
|
|
}
|
|
|
|
|
2013-11-05 00:52:29 +04:00
|
|
|
WLog_Print(transport->log, WLOG_DEBUG, "Terminating transport thread");
|
|
|
|
|
2013-09-05 15:40:04 +04:00
|
|
|
ExitThread(0);
|
2013-03-27 21:03:41 +04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2011-07-07 21:37:48 +04:00
|
|
|
rdpTransport* transport_new(rdpSettings* settings)
|
2011-07-03 23:34:15 +04:00
|
|
|
{
|
2011-07-07 21:37:48 +04:00
|
|
|
rdpTransport* transport;
|
2011-07-03 23:34:15 +04:00
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
transport = (rdpTransport*) malloc(sizeof(rdpTransport));
|
2011-07-03 23:34:15 +04:00
|
|
|
|
2013-10-09 07:43:57 +04:00
|
|
|
if (transport)
|
2011-07-03 23:34:15 +04:00
|
|
|
{
|
2013-03-28 04:06:10 +04:00
|
|
|
ZeroMemory(transport, sizeof(rdpTransport));
|
|
|
|
|
2013-10-09 07:43:57 +04:00
|
|
|
WLog_Init();
|
|
|
|
transport->log = WLog_Get("com.freerdp.core.transport");
|
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
transport->TcpIn = tcp_new(settings);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2011-07-07 21:37:48 +04:00
|
|
|
transport->settings = settings;
|
2011-07-03 23:34:15 +04:00
|
|
|
|
|
|
|
/* a small 0.1ms delay when transport is blocking. */
|
2012-12-22 00:49:02 +04:00
|
|
|
transport->SleepInterval = 100;
|
2011-07-03 23:34:15 +04:00
|
|
|
|
2013-04-12 21:44:23 +04:00
|
|
|
transport->ReceivePool = StreamPool_New(TRUE, BUFFER_SIZE);
|
2013-01-26 02:52:37 +04:00
|
|
|
|
2011-07-03 23:34:15 +04:00
|
|
|
/* receive buffer for non-blocking read. */
|
2013-04-12 21:44:23 +04:00
|
|
|
transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
|
2012-12-22 00:49:02 +04:00
|
|
|
transport->ReceiveEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
|
2011-07-10 23:34:43 +04:00
|
|
|
|
2013-05-01 02:25:18 +04:00
|
|
|
transport->connectedEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
transport->blocking = TRUE;
|
2011-09-04 00:36:27 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
InitializeCriticalSectionAndSpinCount(&(transport->ReadLock), 4000);
|
|
|
|
InitializeCriticalSectionAndSpinCount(&(transport->WriteLock), 4000);
|
2013-05-16 02:05:40 +04:00
|
|
|
|
2011-09-04 00:36:27 +04:00
|
|
|
transport->layer = TRANSPORT_LAYER_TCP;
|
2011-07-03 23:34:15 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return transport;
|
|
|
|
}
|
|
|
|
|
2011-07-07 21:37:48 +04:00
|
|
|
void transport_free(rdpTransport* transport)
|
2011-07-03 23:34:15 +04:00
|
|
|
{
|
2013-10-09 07:43:57 +04:00
|
|
|
if (transport)
|
2011-07-03 23:34:15 +04:00
|
|
|
{
|
2014-03-18 23:27:23 +04:00
|
|
|
transport_stop(transport);
|
2013-11-12 18:04:26 +04:00
|
|
|
|
2013-02-15 05:39:56 +04:00
|
|
|
if (transport->ReceiveBuffer)
|
2013-04-13 01:05:42 +04:00
|
|
|
Stream_Release(transport->ReceiveBuffer);
|
|
|
|
|
2013-04-12 21:44:23 +04:00
|
|
|
StreamPool_Free(transport->ReceivePool);
|
2013-02-15 05:39:56 +04:00
|
|
|
|
2012-12-22 00:49:02 +04:00
|
|
|
CloseHandle(transport->ReceiveEvent);
|
2013-05-01 02:25:18 +04:00
|
|
|
CloseHandle(transport->connectedEvent);
|
|
|
|
|
2012-11-15 05:46:51 +04:00
|
|
|
if (transport->TlsIn)
|
|
|
|
tls_free(transport->TlsIn);
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2012-12-13 07:03:40 +04:00
|
|
|
if (transport->TlsOut != transport->TlsIn)
|
|
|
|
tls_free(transport->TlsOut);
|
|
|
|
|
2013-11-01 07:35:24 +04:00
|
|
|
transport->TlsIn = NULL;
|
|
|
|
transport->TlsOut = NULL;
|
|
|
|
|
|
|
|
if (transport->TcpIn)
|
|
|
|
tcp_free(transport->TcpIn);
|
2012-12-13 07:03:40 +04:00
|
|
|
|
|
|
|
if (transport->TcpOut != transport->TcpIn)
|
|
|
|
tcp_free(transport->TcpOut);
|
|
|
|
|
2013-11-01 07:35:24 +04:00
|
|
|
transport->TcpIn = NULL;
|
|
|
|
transport->TcpOut = NULL;
|
|
|
|
|
2012-04-24 00:33:18 +04:00
|
|
|
tsg_free(transport->tsg);
|
2013-11-01 07:35:24 +04:00
|
|
|
transport->tsg = NULL;
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2013-11-08 00:14:59 +04:00
|
|
|
DeleteCriticalSection(&(transport->ReadLock));
|
|
|
|
DeleteCriticalSection(&(transport->WriteLock));
|
2013-05-16 02:05:40 +04:00
|
|
|
|
2012-10-09 07:21:26 +04:00
|
|
|
free(transport);
|
2011-07-03 23:34:15 +04:00
|
|
|
}
|
|
|
|
}
|