2011-08-18 12:06:32 +04:00
|
|
|
/**
|
2012-10-09 07:02:04 +04:00
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
2011-08-18 12:06:32 +04:00
|
|
|
* RDP Server Peer
|
|
|
|
*
|
|
|
|
* Copyright 2011 Vic Lee
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2012-08-15 01:09:01 +04:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2012-11-22 04:22:41 +04:00
|
|
|
#include <winpr/crt.h>
|
|
|
|
|
2013-07-19 01:15:10 +04:00
|
|
|
#include "info.h"
|
2012-02-17 09:58:30 +04:00
|
|
|
#include "certificate.h"
|
2012-11-22 04:22:41 +04:00
|
|
|
|
2012-03-18 21:13:34 +04:00
|
|
|
#include <freerdp/utils/tcp.h>
|
2012-02-17 09:58:30 +04:00
|
|
|
|
2011-08-18 12:06:32 +04:00
|
|
|
#include "peer.h"
|
|
|
|
|
2013-09-06 02:53:55 +04:00
|
|
|
#ifdef WITH_DEBUG_RDP
|
|
|
|
extern const char* DATA_PDU_TYPE_STRINGS[80];
|
|
|
|
#endif
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
static BOOL freerdp_peer_initialize(freerdp_peer* client)
|
2011-08-18 12:06:32 +04:00
|
|
|
{
|
2014-07-18 05:15:22 +04:00
|
|
|
rdpRdp* rdp = client->context->rdp;
|
|
|
|
rdpSettings* settings = rdp->settings;
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2014-03-26 02:13:08 +04:00
|
|
|
settings->ServerMode = TRUE;
|
|
|
|
settings->FrameAcknowledge = 0;
|
|
|
|
settings->LocalConnection = client->local;
|
|
|
|
rdp->state = CONNECTION_STATE_INITIAL;
|
|
|
|
|
2014-07-18 05:15:22 +04:00
|
|
|
if (settings->RdpKeyFile)
|
2012-03-18 21:13:34 +04:00
|
|
|
{
|
2014-03-26 02:13:08 +04:00
|
|
|
settings->RdpServerRsaKey = key_new(settings->RdpKeyFile);
|
2014-07-18 05:15:22 +04:00
|
|
|
|
2014-03-26 02:13:08 +04:00
|
|
|
if (!settings->RdpServerRsaKey)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "%s: inavlid RDP key file %s\n", __FUNCTION__, settings->RdpKeyFile);
|
|
|
|
return FALSE;
|
|
|
|
}
|
2014-05-21 19:32:14 +04:00
|
|
|
|
2014-04-03 13:43:51 +04:00
|
|
|
if (settings->RdpServerRsaKey->ModulusLength > 256)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "%s: Key sizes > 2048 are currently not supported for RDP security.\n", __FUNCTION__);
|
|
|
|
fprintf(stderr, "%s: Set a different key file than %s\n", __FUNCTION__, settings->RdpKeyFile);
|
|
|
|
exit(1);
|
|
|
|
}
|
2012-01-25 19:45:21 +04:00
|
|
|
}
|
2011-08-18 19:15:28 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-18 12:06:32 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
|
2011-08-18 12:06:32 +04:00
|
|
|
{
|
2012-11-15 05:46:51 +04:00
|
|
|
rfds[*rcount] = (void*)(long)(client->context->rdp->transport->TcpIn->sockfd);
|
2011-08-18 12:06:32 +04:00
|
|
|
(*rcount)++;
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-18 12:06:32 +04:00
|
|
|
}
|
|
|
|
|
2013-07-21 06:34:05 +04:00
|
|
|
static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
|
|
|
|
{
|
|
|
|
return client->context->rdp->transport->TcpIn->event;
|
|
|
|
}
|
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
|
2011-08-18 12:06:32 +04:00
|
|
|
{
|
2011-08-18 19:15:28 +04:00
|
|
|
int status;
|
2012-03-18 21:13:34 +04:00
|
|
|
rdpRdp* rdp;
|
2011-08-18 19:15:28 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
rdp = peer->context->rdp;
|
2011-08-18 19:15:28 +04:00
|
|
|
|
|
|
|
status = rdp_check_fds(rdp);
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2011-08-18 19:15:28 +04:00
|
|
|
if (status < 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-18 19:15:28 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-18 12:06:32 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static BOOL peer_recv_data_pdu(freerdp_peer* client, wStream* s)
|
2011-08-21 18:52:37 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
BYTE type;
|
|
|
|
UINT16 length;
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 share_id;
|
2012-10-09 11:01:37 +04:00
|
|
|
BYTE compressed_type;
|
|
|
|
UINT16 compressed_len;
|
2011-08-21 18:52:37 +04:00
|
|
|
|
2011-09-08 09:17:58 +04:00
|
|
|
if (!rdp_read_share_data_header(s, &length, &type, &share_id, &compressed_type, &compressed_len))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-21 18:52:37 +04:00
|
|
|
|
2013-09-06 02:53:55 +04:00
|
|
|
#ifdef WITH_DEBUG_RDP
|
|
|
|
printf("recv %s Data PDU (0x%02X), length: %d\n",
|
|
|
|
type < ARRAYSIZE(DATA_PDU_TYPE_STRINGS) ? DATA_PDU_TYPE_STRINGS[type] : "???", type, length);
|
|
|
|
#endif
|
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case DATA_PDU_TYPE_SYNCHRONIZE:
|
2012-01-09 01:02:59 +04:00
|
|
|
if (!rdp_recv_client_synchronize_pdu(client->context->rdp, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-21 18:52:37 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_CONTROL:
|
2011-10-18 11:10:12 +04:00
|
|
|
if (!rdp_server_accept_client_control_pdu(client->context->rdp, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-21 19:20:37 +04:00
|
|
|
break;
|
|
|
|
|
2012-02-07 16:38:27 +04:00
|
|
|
case DATA_PDU_TYPE_INPUT:
|
|
|
|
if (!input_recv(client->context->rdp->input, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-02-07 16:38:27 +04:00
|
|
|
break;
|
|
|
|
|
2011-08-21 19:20:37 +04:00
|
|
|
case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
|
|
|
|
/* TODO: notify server bitmap cache data */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_FONT_LIST:
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2011-10-18 11:10:12 +04:00
|
|
|
if (!rdp_server_accept_client_font_list_pdu(client->context->rdp, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
break;
|
|
|
|
|
2011-08-26 14:14:34 +04:00
|
|
|
case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
|
2011-10-18 11:10:12 +04:00
|
|
|
mcs_send_disconnect_provider_ultimatum(client->context->rdp->mcs);
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-26 14:14:34 +04:00
|
|
|
|
2012-05-11 12:35:11 +04:00
|
|
|
case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
|
2013-07-20 02:24:56 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
2013-01-15 02:40:34 +04:00
|
|
|
return FALSE;
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read_UINT32(s, client->ack_frame_id);
|
2013-06-02 00:57:34 +04:00
|
|
|
IFCALL(client->update->SurfaceFrameAcknowledge, client->update->context, client->ack_frame_id);
|
2012-05-11 12:35:11 +04:00
|
|
|
break;
|
|
|
|
|
2012-05-26 17:34:09 +04:00
|
|
|
case DATA_PDU_TYPE_REFRESH_RECT:
|
|
|
|
if (!update_read_refresh_rect(client->update, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-05-26 17:34:09 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
|
|
|
|
if (!update_read_suppress_output(client->update, s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-05-26 17:34:09 +04:00
|
|
|
break;
|
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
default:
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Data PDU type %d\n", type);
|
2011-08-21 18:52:37 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
|
2011-08-21 18:52:37 +04:00
|
|
|
{
|
2012-03-18 21:13:34 +04:00
|
|
|
rdpRdp* rdp;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
|
|
|
UINT16 pduType;
|
|
|
|
UINT16 pduLength;
|
|
|
|
UINT16 pduSource;
|
|
|
|
UINT16 channelId;
|
|
|
|
UINT16 securityFlags;
|
2011-08-21 18:52:37 +04:00
|
|
|
|
2012-01-25 19:30:54 +04:00
|
|
|
rdp = client->context->rdp;
|
|
|
|
|
|
|
|
if (!rdp_read_header(rdp, s, &length, &channelId))
|
2011-08-21 18:52:37 +04:00
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Incorrect RDP header.\n");
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->DisableEncryption)
|
2012-01-25 19:30:54 +04:00
|
|
|
{
|
2013-01-15 02:40:34 +04:00
|
|
|
if (!rdp_read_security_header(s, &securityFlags))
|
|
|
|
return -1;
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2012-01-25 19:30:54 +04:00
|
|
|
if (securityFlags & SEC_ENCRYPT)
|
|
|
|
{
|
|
|
|
if (!rdp_decrypt(rdp, s, length - 4, securityFlags))
|
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "rdp_decrypt failed\n");
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2012-01-25 19:30:54 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
if (channelId != MCS_GLOBAL_CHANNEL_ID)
|
|
|
|
{
|
2013-07-20 02:24:56 +04:00
|
|
|
if (!freerdp_channel_peer_process(client, s, channelId))
|
2013-01-12 17:49:01 +04:00
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-11-19 11:33:49 +04:00
|
|
|
if (!rdp_read_share_control_header(s, &pduLength, &pduType, &pduSource))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
|
2012-11-08 03:23:25 +04:00
|
|
|
client->settings->PduSource = pduSource;
|
2011-11-19 11:33:49 +04:00
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
switch (pduType)
|
|
|
|
{
|
|
|
|
case PDU_TYPE_DATA:
|
2011-10-18 11:10:12 +04:00
|
|
|
if (!peer_recv_data_pdu(client, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case PDU_TYPE_CONFIRM_ACTIVE:
|
|
|
|
if (!rdp_server_accept_confirm_active(rdp, s))
|
|
|
|
return -1;
|
|
|
|
break;
|
|
|
|
|
2011-08-21 18:52:37 +04:00
|
|
|
default:
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Client sent pduType %d\n", pduType);
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-07 02:24:08 +04:00
|
|
|
return 0;
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
|
2011-08-21 18:52:37 +04:00
|
|
|
{
|
2011-09-27 09:30:58 +04:00
|
|
|
rdpRdp* rdp;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
2011-09-27 09:30:58 +04:00
|
|
|
rdpFastPath* fastpath;
|
|
|
|
|
2011-10-18 11:10:12 +04:00
|
|
|
rdp = client->context->rdp;
|
2011-09-27 09:30:58 +04:00
|
|
|
fastpath = rdp->fastpath;
|
2013-01-15 01:10:05 +04:00
|
|
|
|
|
|
|
fastpath_read_header_rdp(fastpath, s, &length);
|
2011-08-23 11:51:51 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
if ((length == 0) || (length > Stream_GetRemainingLength(s)))
|
2011-08-23 11:51:51 +04:00
|
|
|
{
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "incorrect FastPath PDU header length %d\n", length);
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-23 11:51:51 +04:00
|
|
|
}
|
|
|
|
|
2011-09-27 09:30:58 +04:00
|
|
|
if (fastpath->encryptionFlags & FASTPATH_OUTPUT_ENCRYPTED)
|
2011-09-15 01:14:50 +04:00
|
|
|
{
|
2013-01-15 02:40:34 +04:00
|
|
|
if (!rdp_decrypt(rdp, s, length, (fastpath->encryptionFlags & FASTPATH_OUTPUT_SECURE_CHECKSUM) ? SEC_SECURE_CHECKSUM : 0))
|
2013-01-12 17:49:01 +04:00
|
|
|
return -1;
|
2011-09-15 01:14:50 +04:00
|
|
|
}
|
|
|
|
|
2011-09-27 09:30:58 +04:00
|
|
|
return fastpath_recv_inputs(fastpath, s);
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int peer_recv_pdu(freerdp_peer* client, wStream* s)
|
2011-08-21 18:52:37 +04:00
|
|
|
{
|
|
|
|
if (tpkt_verify_header(s))
|
2011-10-18 11:10:12 +04:00
|
|
|
return peer_recv_tpkt_pdu(client, s);
|
2011-08-21 18:52:37 +04:00
|
|
|
else
|
2011-10-18 11:10:12 +04:00
|
|
|
return peer_recv_fastpath_pdu(client, s);
|
2011-08-21 18:52:37 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
|
2011-08-18 19:15:28 +04:00
|
|
|
{
|
2011-10-18 11:10:12 +04:00
|
|
|
freerdp_peer* client = (freerdp_peer*) extra;
|
2012-09-16 23:30:11 +04:00
|
|
|
rdpRdp* rdp = client->context->rdp;
|
2011-08-18 19:15:28 +04:00
|
|
|
|
2012-09-16 23:30:11 +04:00
|
|
|
switch (rdp->state)
|
2011-08-18 19:15:28 +04:00
|
|
|
{
|
|
|
|
case CONNECTION_STATE_INITIAL:
|
2012-09-16 23:30:11 +04:00
|
|
|
if (!rdp_server_accept_nego(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2012-09-16 23:30:11 +04:00
|
|
|
|
|
|
|
if (rdp->nego->selected_protocol & PROTOCOL_NLA)
|
|
|
|
{
|
|
|
|
sspi_CopyAuthIdentity(&client->identity, &(rdp->nego->transport->credssp->identity));
|
2012-10-09 10:31:28 +04:00
|
|
|
IFCALLRET(client->Logon, client->authenticated, client, &client->identity, TRUE);
|
2012-09-16 23:30:11 +04:00
|
|
|
credssp_free(rdp->nego->transport->credssp);
|
2013-07-01 21:24:19 +04:00
|
|
|
rdp->nego->transport->credssp = NULL;
|
2012-09-16 23:30:11 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2012-10-09 10:31:28 +04:00
|
|
|
IFCALLRET(client->Logon, client->authenticated, client, &client->identity, FALSE);
|
2012-09-16 23:30:11 +04:00
|
|
|
}
|
|
|
|
|
2011-08-19 13:39:37 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_NEGO:
|
2012-09-16 23:30:11 +04:00
|
|
|
if (!rdp_server_accept_mcs_connect_initial(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-19 22:03:48 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_MCS_CONNECT:
|
2012-09-16 23:30:11 +04:00
|
|
|
if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-19 22:03:48 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_MCS_ERECT_DOMAIN:
|
2012-09-16 23:30:11 +04:00
|
|
|
if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-20 10:05:03 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_MCS_ATTACH_USER:
|
2012-09-16 23:30:11 +04:00
|
|
|
if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-20 14:22:14 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->DisableEncryption)
|
2012-09-16 23:30:11 +04:00
|
|
|
{
|
2013-07-19 01:15:10 +04:00
|
|
|
if (!rdp_server_establish_keys(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2012-01-25 20:08:10 +04:00
|
|
|
}
|
|
|
|
|
2013-07-19 01:15:10 +04:00
|
|
|
rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE);
|
2014-03-26 02:13:08 +04:00
|
|
|
if (Stream_GetRemainingLength(s) > 0)
|
|
|
|
return peer_recv_callback(transport, s, extra);
|
2013-07-18 23:18:59 +04:00
|
|
|
break;
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
|
2013-07-19 01:15:10 +04:00
|
|
|
|
|
|
|
if (!rdp_recv_client_info(rdp, s))
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2013-07-18 01:46:58 +04:00
|
|
|
|
2013-07-19 01:15:10 +04:00
|
|
|
rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING);
|
2013-07-18 23:18:59 +04:00
|
|
|
return peer_recv_callback(transport, NULL, extra);
|
|
|
|
|
2011-08-21 11:52:44 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_LICENSING:
|
|
|
|
|
|
|
|
if (!license_send_valid_client_error_packet(rdp->license))
|
|
|
|
return FALSE;
|
|
|
|
|
2013-07-19 01:15:10 +04:00
|
|
|
rdp_server_transition_to_state(rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE);
|
2013-07-18 23:18:59 +04:00
|
|
|
return peer_recv_callback(transport, NULL, extra);
|
|
|
|
|
2013-07-18 01:46:58 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_CAPABILITIES_EXCHANGE:
|
|
|
|
|
2013-07-19 01:15:10 +04:00
|
|
|
if (!rdp->AwaitCapabilities)
|
2013-07-18 23:18:59 +04:00
|
|
|
{
|
|
|
|
IFCALL(client->Capabilities, client);
|
|
|
|
|
|
|
|
if (!rdp_send_demand_active(rdp))
|
|
|
|
return -1;
|
2013-07-19 01:15:10 +04:00
|
|
|
|
|
|
|
rdp->AwaitCapabilities = TRUE;
|
|
|
|
|
|
|
|
if (s)
|
|
|
|
{
|
|
|
|
if (peer_recv_pdu(client, s) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
2013-07-18 23:18:59 +04:00
|
|
|
}
|
|
|
|
else
|
2011-12-18 21:13:09 +04:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* During reactivation sequence the client might sent some input or channel data
|
|
|
|
* before receiving the Deactivate All PDU. We need to process them as usual.
|
|
|
|
*/
|
2013-07-18 23:18:59 +04:00
|
|
|
|
2013-07-20 02:24:56 +04:00
|
|
|
if (peer_recv_pdu(client, s) < 0)
|
|
|
|
return -1;
|
2011-12-18 21:13:09 +04:00
|
|
|
}
|
2013-07-18 23:18:59 +04:00
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_FINALIZATION:
|
|
|
|
if (peer_recv_pdu(client, s) < 0)
|
|
|
|
return -1;
|
2011-08-21 18:52:37 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_ACTIVE:
|
2013-01-15 01:10:05 +04:00
|
|
|
if (peer_recv_pdu(client, s) < 0)
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-19 05:54:43 +04:00
|
|
|
break;
|
2011-08-18 19:15:28 +04:00
|
|
|
|
|
|
|
default:
|
2013-03-29 02:06:34 +04:00
|
|
|
fprintf(stderr, "Invalid state %d\n", rdp->state);
|
2013-01-07 02:24:08 +04:00
|
|
|
return -1;
|
2011-08-18 19:15:28 +04:00
|
|
|
}
|
|
|
|
|
2013-01-07 02:24:08 +04:00
|
|
|
return 0;
|
2011-08-18 19:15:28 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 10:38:39 +04:00
|
|
|
static BOOL freerdp_peer_close(freerdp_peer* client)
|
2012-04-13 11:58:28 +04:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
|
|
|
|
* The server first sends the client a Deactivate All PDU followed by an
|
|
|
|
* optional MCS Disconnect Provider Ultimatum PDU.
|
|
|
|
*/
|
|
|
|
if (!rdp_send_deactivate_all(client->context->rdp))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2013-07-18 23:18:59 +04:00
|
|
|
|
2012-04-13 11:58:28 +04:00
|
|
|
return mcs_send_disconnect_provider_ultimatum(client->context->rdp->mcs);
|
|
|
|
}
|
|
|
|
|
2011-08-18 12:06:32 +04:00
|
|
|
static void freerdp_peer_disconnect(freerdp_peer* client)
|
|
|
|
{
|
2011-10-18 11:10:12 +04:00
|
|
|
transport_disconnect(client->context->rdp->transport);
|
|
|
|
}
|
|
|
|
|
2014-02-16 02:42:59 +04:00
|
|
|
static int freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, BYTE* data, int size)
|
2011-12-10 12:41:29 +04:00
|
|
|
{
|
|
|
|
return rdp_send_channel_data(client->context->rdp, channelId, data, size);
|
|
|
|
}
|
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
|
|
|
|
{
|
|
|
|
return tranport_is_write_blocked(peer->context->rdp->transport);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
|
|
|
|
{
|
|
|
|
|
|
|
|
rdpTransport *transport = peer->context->rdp->transport;
|
|
|
|
|
|
|
|
return tranport_drain_output_buffer(transport);
|
|
|
|
}
|
|
|
|
|
2011-10-18 11:10:12 +04:00
|
|
|
void freerdp_peer_context_new(freerdp_peer* client)
|
|
|
|
{
|
|
|
|
rdpRdp* rdp;
|
|
|
|
|
2014-07-12 03:30:40 +04:00
|
|
|
client->context = (rdpContext*) calloc(1, client->ContextSize);
|
2013-07-20 05:52:28 +04:00
|
|
|
|
2013-10-13 02:20:25 +04:00
|
|
|
client->context->ServerMode = TRUE;
|
|
|
|
|
2014-05-26 20:30:58 +04:00
|
|
|
client->context->metrics = metrics_new(client->context);
|
|
|
|
|
2013-07-20 05:52:28 +04:00
|
|
|
rdp = rdp_new(client->context);
|
|
|
|
|
2011-10-18 11:10:12 +04:00
|
|
|
client->input = rdp->input;
|
|
|
|
client->update = rdp->update;
|
|
|
|
client->settings = rdp->settings;
|
|
|
|
|
|
|
|
client->context->rdp = rdp;
|
|
|
|
client->context->peer = client;
|
2013-05-10 00:30:28 +04:00
|
|
|
client->context->input = client->input;
|
|
|
|
client->context->update = client->update;
|
|
|
|
client->context->settings = client->settings;
|
2011-10-18 11:10:12 +04:00
|
|
|
|
|
|
|
client->update->context = client->context;
|
|
|
|
client->input->context = client->context;
|
|
|
|
|
|
|
|
update_register_server_callbacks(client->update);
|
|
|
|
|
|
|
|
transport_attach(rdp->transport, client->sockfd);
|
2011-08-23 12:14:32 +04:00
|
|
|
|
2012-12-22 00:49:02 +04:00
|
|
|
rdp->transport->ReceiveCallback = peer_recv_callback;
|
|
|
|
rdp->transport->ReceiveExtra = client;
|
2012-10-09 10:31:28 +04:00
|
|
|
transport_set_blocking_mode(rdp->transport, FALSE);
|
2011-10-18 11:10:12 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
client->IsWriteBlocked = freerdp_peer_is_write_blocked;
|
|
|
|
client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
|
|
|
|
|
2011-10-18 11:10:12 +04:00
|
|
|
IFCALL(client->ContextNew, client, client->context);
|
|
|
|
}
|
|
|
|
|
|
|
|
void freerdp_peer_context_free(freerdp_peer* client)
|
|
|
|
{
|
|
|
|
IFCALL(client->ContextFree, client, client->context);
|
2014-06-03 16:54:56 +04:00
|
|
|
|
|
|
|
metrics_free(client->context->metrics);
|
2011-08-18 12:06:32 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
freerdp_peer* freerdp_peer_new(int sockfd)
|
|
|
|
{
|
|
|
|
freerdp_peer* client;
|
|
|
|
|
2014-05-26 20:30:58 +04:00
|
|
|
client = (freerdp_peer*) calloc(1, sizeof(freerdp_peer));
|
2011-08-18 12:06:32 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
freerdp_tcp_set_no_delay(sockfd, TRUE);
|
2012-03-18 21:13:34 +04:00
|
|
|
|
2013-07-21 06:34:05 +04:00
|
|
|
if (client)
|
2011-10-30 09:43:04 +04:00
|
|
|
{
|
|
|
|
client->sockfd = sockfd;
|
2013-06-14 05:34:46 +04:00
|
|
|
client->ContextSize = sizeof(rdpContext);
|
2011-10-30 09:43:04 +04:00
|
|
|
client->Initialize = freerdp_peer_initialize;
|
|
|
|
client->GetFileDescriptor = freerdp_peer_get_fds;
|
2013-07-21 06:34:05 +04:00
|
|
|
client->GetEventHandle = freerdp_peer_get_event_handle;
|
2011-10-30 09:43:04 +04:00
|
|
|
client->CheckFileDescriptor = freerdp_peer_check_fds;
|
2012-04-13 11:58:28 +04:00
|
|
|
client->Close = freerdp_peer_close;
|
2011-10-30 09:43:04 +04:00
|
|
|
client->Disconnect = freerdp_peer_disconnect;
|
2011-12-10 12:41:29 +04:00
|
|
|
client->SendChannelData = freerdp_peer_send_channel_data;
|
2014-05-21 19:32:14 +04:00
|
|
|
client->IsWriteBlocked = freerdp_peer_is_write_blocked;
|
|
|
|
client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
|
2011-10-30 09:43:04 +04:00
|
|
|
}
|
2011-08-18 12:06:32 +04:00
|
|
|
|
|
|
|
return client;
|
|
|
|
}
|
|
|
|
|
|
|
|
void freerdp_peer_free(freerdp_peer* client)
|
|
|
|
{
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!client)
|
|
|
|
return;
|
|
|
|
|
|
|
|
rdp_free(client->context->rdp);
|
|
|
|
free(client->context);
|
|
|
|
free(client);
|
2011-08-18 12:06:32 +04:00
|
|
|
}
|