2019-05-17 15:32:54 +03:00
|
|
|
/**
|
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
|
|
* FreeRDP Proxy Server
|
|
|
|
*
|
|
|
|
* Copyright 2019 Mati Shabtay <matishabtay@gmail.com>
|
|
|
|
* Copyright 2019 Kobi Mizrachi <kmizrachi18@gmail.com>
|
|
|
|
* Copyright 2019 Idan Freiberg <speidy@gmail.com>
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <signal.h>
|
|
|
|
|
|
|
|
#include <freerdp/freerdp.h>
|
|
|
|
#include <freerdp/listener.h>
|
|
|
|
|
|
|
|
#include <winpr/crt.h>
|
|
|
|
#include <winpr/ssl.h>
|
|
|
|
#include <winpr/synch.h>
|
|
|
|
#include <winpr/string.h>
|
|
|
|
#include <winpr/path.h>
|
|
|
|
#include <winpr/winsock.h>
|
|
|
|
#include <winpr/thread.h>
|
|
|
|
|
|
|
|
#include <freerdp/channels/wtsvc.h>
|
|
|
|
#include <freerdp/channels/channels.h>
|
|
|
|
|
|
|
|
#include <freerdp/constants.h>
|
|
|
|
#include <freerdp/server/rdpsnd.h>
|
|
|
|
#include <freerdp/server/rdpgfx.h>
|
|
|
|
|
|
|
|
#include "pf_server.h"
|
|
|
|
#include "pf_log.h"
|
|
|
|
#include "pf_config.h"
|
|
|
|
#include "pf_client.h"
|
|
|
|
#include "pf_context.h"
|
|
|
|
#include "pf_input.h"
|
|
|
|
#include "pf_update.h"
|
2019-08-04 17:41:43 +03:00
|
|
|
#include "pf_channels.h"
|
2019-05-17 15:32:54 +03:00
|
|
|
#include "pf_rdpgfx.h"
|
2019-06-11 17:13:42 +03:00
|
|
|
#include "pf_disp.h"
|
2019-08-01 16:55:50 +03:00
|
|
|
#include "pf_channels.h"
|
2019-05-17 15:32:54 +03:00
|
|
|
|
|
|
|
#define TAG PROXY_TAG("server")
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
static BOOL pf_server_parse_target_from_routing_token(rdpContext* context,
|
2019-05-17 15:32:54 +03:00
|
|
|
char** target, DWORD* port)
|
|
|
|
{
|
|
|
|
#define TARGET_MAX (100)
|
|
|
|
#define ROUTING_TOKEN_PREFIX "Cookie: msts="
|
|
|
|
char* colon;
|
|
|
|
size_t len;
|
|
|
|
const size_t prefix_len = strlen(ROUTING_TOKEN_PREFIX);
|
|
|
|
DWORD routing_token_length;
|
2019-05-26 15:33:28 +03:00
|
|
|
const char* routing_token = freerdp_nego_get_routing_token(context, &routing_token_length);
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
if (routing_token == NULL)
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
2019-05-12 20:49:37 +03:00
|
|
|
/* no routing token */
|
|
|
|
return FALSE;
|
|
|
|
}
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
if ((routing_token_length <= prefix_len) || (routing_token_length >= TARGET_MAX))
|
|
|
|
{
|
2019-06-13 16:55:56 +03:00
|
|
|
WLog_ERR(TAG, "pf_server_parse_target_from_routing_token(): invalid routing token length: %"PRIu32"",
|
2019-05-12 20:49:37 +03:00
|
|
|
routing_token_length);
|
|
|
|
return FALSE;
|
|
|
|
}
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
len = routing_token_length - prefix_len;
|
|
|
|
*target = malloc(len + 1);
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
if (!(*target))
|
|
|
|
return FALSE;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
CopyMemory(*target, routing_token + prefix_len, len);
|
|
|
|
*(*target + len) = '\0';
|
|
|
|
colon = strchr(*target, ':');
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
if (colon)
|
|
|
|
{
|
|
|
|
/* port is specified */
|
|
|
|
unsigned long p = strtoul(colon + 1, NULL, 10);
|
|
|
|
|
|
|
|
if (p > USHRT_MAX)
|
2019-05-19 15:04:38 +03:00
|
|
|
{
|
|
|
|
free(*target);
|
2019-05-12 20:49:37 +03:00
|
|
|
return FALSE;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
*port = (DWORD)p;
|
|
|
|
*colon = '\0';
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
2019-05-12 20:49:37 +03:00
|
|
|
return TRUE;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
static BOOL pf_server_get_target_info(rdpContext* context, rdpSettings* settings,
|
|
|
|
proxyConfig* config)
|
|
|
|
{
|
2019-06-13 16:55:56 +03:00
|
|
|
WLog_INFO(TAG, "pf_server_get_target_info(): fetching target from %s",
|
|
|
|
config->UseLoadBalanceInfo ? "load-balance-info" : "config");
|
2019-05-26 15:33:28 +03:00
|
|
|
|
|
|
|
if (config->UseLoadBalanceInfo)
|
|
|
|
return pf_server_parse_target_from_routing_token(context, &settings->ServerHostname,
|
|
|
|
&settings->ServerPort);
|
|
|
|
|
|
|
|
/* use hardcoded target info from configuration */
|
|
|
|
if (!(settings->ServerHostname = _strdup(config->TargetHost)))
|
|
|
|
{
|
|
|
|
WLog_DBG(TAG, "pf_server_get_target_info(): strdup failed!");
|
|
|
|
return FALSE;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
settings->ServerPort = config->TargetPort > 0 ? 3389 : settings->ServerPort;
|
|
|
|
return TRUE;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Event callbacks */
|
|
|
|
/**
|
|
|
|
* This callback is called when the entire connection sequence is done (as
|
|
|
|
* described in MS-RDPBCGR section 1.3)
|
|
|
|
*
|
|
|
|
* The server may start sending graphics output and receiving keyboard/mouse
|
|
|
|
* input after this callback returns.
|
|
|
|
*/
|
|
|
|
static BOOL pf_server_post_connect(freerdp_peer* client)
|
|
|
|
{
|
|
|
|
pServerContext* ps;
|
2019-09-25 16:09:36 +03:00
|
|
|
pClientContext* pc;
|
|
|
|
rdpSettings* client_settings;
|
2019-05-17 15:32:54 +03:00
|
|
|
proxyData* pdata;
|
|
|
|
ps = (pServerContext*)client->context;
|
|
|
|
pdata = ps->pdata;
|
|
|
|
|
2019-10-22 16:06:05 +03:00
|
|
|
if (pdata->config->SessionCapture && !client->settings->SupportGraphicsPipeline)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Session capture feature is enabled, only accepting connections with GFX");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2019-09-08 18:10:50 +03:00
|
|
|
pc = pf_context_create_client_context(client->settings);
|
2019-06-13 16:56:21 +03:00
|
|
|
if (pc == NULL)
|
|
|
|
{
|
2019-09-08 18:10:50 +03:00
|
|
|
WLog_ERR(TAG, "pf_server_post_connect(): pf_context_create_client_context failed!");
|
2019-06-13 16:56:21 +03:00
|
|
|
return FALSE;
|
|
|
|
}
|
2019-05-26 15:33:28 +03:00
|
|
|
|
2019-09-25 16:09:36 +03:00
|
|
|
client_settings = pc->context.settings;
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
/* keep both sides of the connection in pdata */
|
2019-09-25 16:09:36 +03:00
|
|
|
pc->pdata = ps->pdata;
|
|
|
|
pdata->pc = pc;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-09-25 16:09:36 +03:00
|
|
|
if (!pf_server_get_target_info(client->context, client_settings, pdata->config))
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
2019-05-26 15:33:28 +03:00
|
|
|
WLog_ERR(TAG, "pf_server_post_connect(): pf_server_get_target_info failed!");
|
|
|
|
return FALSE;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
2019-05-26 15:33:28 +03:00
|
|
|
|
2019-09-25 16:09:36 +03:00
|
|
|
WLog_INFO(TAG, "pf_server_post_connect(): target == %s:%"PRIu16"",
|
|
|
|
client_settings->ServerHostname, client_settings->ServerPort);
|
2019-06-13 16:55:56 +03:00
|
|
|
|
2019-08-01 16:55:50 +03:00
|
|
|
if (!pf_server_channels_init(ps))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "pf_server_post_connect(): failed to initialize server's channels!");
|
|
|
|
return FALSE;
|
|
|
|
}
|
2019-05-17 15:32:54 +03:00
|
|
|
|
|
|
|
/* Start a proxy's client in it's own thread */
|
2019-07-16 16:13:12 +03:00
|
|
|
if (!(pdata->client_thread = CreateThread(NULL, 0, pf_client_start, pc, 0, NULL)))
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "CreateThread failed!");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2019-09-25 16:10:04 +03:00
|
|
|
pf_server_register_input_callbacks(client->input);
|
|
|
|
pf_server_register_update_callbacks(client->update);
|
2019-05-17 15:32:54 +03:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL pf_server_activate(freerdp_peer* client)
|
|
|
|
{
|
|
|
|
client->settings->CompressionLevel = PACKET_COMPR_TYPE_RDP8;
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2019-05-20 14:09:12 +03:00
|
|
|
static BOOL pf_server_adjust_monitor_layout(freerdp_peer* peer)
|
|
|
|
{
|
|
|
|
/* proxy as is, there's no need to do anything here */
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2019-05-17 15:32:54 +03:00
|
|
|
/**
|
|
|
|
* Handles an incoming client connection, to be run in it's own thread.
|
|
|
|
*
|
|
|
|
* arg is a pointer to a freerdp_peer representing the client.
|
|
|
|
*/
|
|
|
|
static DWORD WINAPI pf_server_handle_client(LPVOID arg)
|
|
|
|
{
|
|
|
|
HANDLE eventHandles[32];
|
|
|
|
HANDLE ChannelEvent;
|
|
|
|
DWORD eventCount;
|
|
|
|
DWORD tmp;
|
|
|
|
DWORD status;
|
|
|
|
pServerContext* ps;
|
|
|
|
rdpContext* pc;
|
|
|
|
proxyData* pdata;
|
|
|
|
proxyConfig* config;
|
2019-05-26 15:33:28 +03:00
|
|
|
freerdp_peer* client = (freerdp_peer*)arg;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-09-08 18:10:50 +03:00
|
|
|
if (!pf_context_init_server_context(client))
|
2019-05-26 15:33:28 +03:00
|
|
|
goto out_free_peer;
|
|
|
|
|
|
|
|
ps = (pServerContext*)client->context;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
if (!(pdata = ps->pdata = proxy_data_new()))
|
2019-05-12 20:48:51 +03:00
|
|
|
{
|
2019-05-26 15:33:28 +03:00
|
|
|
WLog_ERR(TAG, "pf_server_post_connect(): proxy_data_new failed!");
|
|
|
|
goto out_free_peer;
|
2019-05-12 20:48:51 +03:00
|
|
|
}
|
|
|
|
|
2019-09-08 18:10:50 +03:00
|
|
|
pdata->ps = ps;
|
|
|
|
config = pdata->config = client->ContextExtra;
|
|
|
|
|
2019-06-13 16:55:56 +03:00
|
|
|
/* currently not supporting GDI orders */
|
2019-06-04 17:33:48 +03:00
|
|
|
ZeroMemory(client->settings->OrderSupport, 32);
|
|
|
|
client->update->autoCalculateBitmapData = FALSE;
|
2019-09-08 18:10:50 +03:00
|
|
|
|
|
|
|
client->settings->SupportMonitorLayoutPdu = TRUE;
|
2019-05-17 15:32:54 +03:00
|
|
|
client->settings->SupportGraphicsPipeline = config->GFX;
|
|
|
|
client->settings->CertificateFile = _strdup("server.crt");
|
|
|
|
client->settings->PrivateKeyFile = _strdup("server.key");
|
|
|
|
client->settings->RdpKeyFile = _strdup("server.key");
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
if (!client->settings->CertificateFile || !client->settings->PrivateKeyFile ||
|
|
|
|
!client->settings->RdpKeyFile)
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Memory allocation failed (strdup)");
|
2019-05-26 15:33:28 +03:00
|
|
|
goto out_free_peer;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
|
2019-09-18 16:08:25 +03:00
|
|
|
client->settings->RdpSecurity = config->ServerRdpSecurity;
|
|
|
|
client->settings->TlsSecurity = config->ServerTlsSecurity;
|
|
|
|
client->settings->NlaSecurity = FALSE; /* currently NLA is not supported in proxy server */
|
2019-05-17 15:32:54 +03:00
|
|
|
client->settings->EncryptionLevel = ENCRYPTION_LEVEL_CLIENT_COMPATIBLE;
|
|
|
|
client->settings->ColorDepth = 32;
|
|
|
|
client->settings->SuppressOutput = TRUE;
|
|
|
|
client->settings->RefreshRect = TRUE;
|
2019-06-11 17:13:42 +03:00
|
|
|
client->settings->DesktopResize = TRUE;
|
2019-05-17 15:32:54 +03:00
|
|
|
client->PostConnect = pf_server_post_connect;
|
|
|
|
client->Activate = pf_server_activate;
|
2019-05-20 14:09:12 +03:00
|
|
|
client->AdjustMonitorsLayout = pf_server_adjust_monitor_layout;
|
2019-05-17 15:32:54 +03:00
|
|
|
client->settings->MultifragMaxRequestSize = 0xFFFFFF; /* FIXME */
|
|
|
|
client->Initialize(client);
|
2019-05-26 15:33:28 +03:00
|
|
|
WLog_INFO(TAG, "Client connected: %s", client->local ? "(local)" : client->hostname);
|
2019-05-17 15:32:54 +03:00
|
|
|
/* Main client event handling loop */
|
|
|
|
ChannelEvent = WTSVirtualChannelManagerGetEventHandle(ps->vcm);
|
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
eventCount = 0;
|
|
|
|
{
|
2019-05-26 15:33:28 +03:00
|
|
|
tmp = client->GetEventHandles(client, &eventHandles[eventCount], 32 - eventCount);
|
2019-05-17 15:32:54 +03:00
|
|
|
|
|
|
|
if (tmp == 0)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Failed to get FreeRDP transport event handles");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
eventCount += tmp;
|
|
|
|
}
|
|
|
|
eventHandles[eventCount++] = ChannelEvent;
|
2019-07-16 16:13:12 +03:00
|
|
|
eventHandles[eventCount++] = pdata->abort_event;
|
2019-05-17 15:32:54 +03:00
|
|
|
eventHandles[eventCount++] = WTSVirtualChannelManagerGetEventHandle(ps->vcm);
|
|
|
|
status = WaitForMultipleObjects(eventCount, eventHandles, FALSE, INFINITE);
|
|
|
|
|
|
|
|
if (status == WAIT_FAILED)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "WaitForMultipleObjects failed (errno: %d)", errno);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (client->CheckFileDescriptor(client) != TRUE)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (WaitForSingleObject(ChannelEvent, 0) == WAIT_OBJECT_0)
|
|
|
|
{
|
|
|
|
if (!WTSVirtualChannelManagerCheckFileDescriptor(ps->vcm))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "WTSVirtualChannelManagerCheckFileDescriptor failure");
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-16 16:13:12 +03:00
|
|
|
/* only disconnect after checking client's and vcm's file descriptors */
|
|
|
|
if (proxy_data_shall_disconnect(pdata))
|
|
|
|
{
|
|
|
|
WLog_INFO(TAG, "abort_event is set, closing connection with client %s", client->hostname);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-05-17 15:32:54 +03:00
|
|
|
switch (WTSVirtualChannelManagerGetDrdynvcState(ps->vcm))
|
|
|
|
{
|
2019-05-26 15:33:28 +03:00
|
|
|
/* Dynamic channel status may have been changed after processing */
|
|
|
|
case DRDYNVC_STATE_NONE:
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
/* Initialize drdynvc channel */
|
|
|
|
if (!WTSVirtualChannelManagerCheckFileDescriptor(ps->vcm))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Failed to initialize drdynvc channel");
|
|
|
|
goto fail;
|
|
|
|
}
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
break;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
case DRDYNVC_STATE_READY:
|
|
|
|
if (WaitForSingleObject(ps->dynvcReady, 0) == WAIT_TIMEOUT)
|
|
|
|
{
|
|
|
|
SetEvent(ps->dynvcReady);
|
|
|
|
}
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
break;
|
2019-05-17 15:32:54 +03:00
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
default:
|
|
|
|
break;
|
2019-05-17 15:32:54 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fail:
|
|
|
|
|
2019-05-28 16:10:04 +03:00
|
|
|
pc = (rdpContext*) pdata->pc;
|
2019-07-16 16:19:15 +03:00
|
|
|
WLog_INFO(TAG, "pf_server_handle_client(): starting shutdown of connection (client %s)", client->hostname);
|
|
|
|
WLog_INFO(TAG, "pf_server_handle_client(): stopping proxy's client");
|
2019-05-17 15:32:54 +03:00
|
|
|
freerdp_client_stop(pc);
|
2019-08-01 16:55:50 +03:00
|
|
|
WLog_INFO(TAG, "pf_server_handle_client(): freeing server's channels");
|
|
|
|
pf_server_channels_free(ps);
|
2019-07-16 16:19:15 +03:00
|
|
|
WLog_INFO(TAG, "pf_server_handle_client(): freeing proxy data");
|
2019-05-26 15:33:28 +03:00
|
|
|
proxy_data_free(pdata);
|
2019-05-17 15:32:54 +03:00
|
|
|
freerdp_client_context_free(pc);
|
2019-07-16 16:19:15 +03:00
|
|
|
client->Close(client);
|
2019-05-17 15:32:54 +03:00
|
|
|
client->Disconnect(client);
|
2019-05-26 15:33:28 +03:00
|
|
|
out_free_peer:
|
2019-05-17 15:32:54 +03:00
|
|
|
freerdp_peer_context_free(client);
|
|
|
|
freerdp_peer_free(client);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
static BOOL pf_server_client_connected(freerdp_listener* listener, freerdp_peer* client)
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
|
|
|
HANDLE hThread;
|
|
|
|
client->ContextExtra = listener->info;
|
|
|
|
|
2019-05-26 15:33:28 +03:00
|
|
|
if (!(hThread = CreateThread(NULL, 0, pf_server_handle_client, (void*)client, 0, NULL)))
|
2019-05-17 15:32:54 +03:00
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
CloseHandle(hThread);
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void pf_server_mainloop(freerdp_listener* listener)
|
|
|
|
{
|
|
|
|
HANDLE eventHandles[32];
|
|
|
|
DWORD eventCount;
|
|
|
|
DWORD status;
|
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
eventCount = listener->GetEventHandles(listener, eventHandles, 32);
|
|
|
|
|
|
|
|
if (0 == eventCount)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Failed to get FreeRDP event handles");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
status = WaitForMultipleObjects(eventCount, eventHandles, FALSE, INFINITE);
|
|
|
|
|
|
|
|
if (WAIT_FAILED == status)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "select failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listener->CheckFileDescriptor(listener) != TRUE)
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "Failed to check FreeRDP file descriptor");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
listener->Close(listener);
|
|
|
|
}
|
|
|
|
|
|
|
|
int pf_server_start(proxyConfig* config)
|
|
|
|
{
|
|
|
|
WSADATA wsaData;
|
|
|
|
freerdp_listener* listener = freerdp_listener_new();
|
|
|
|
|
|
|
|
if (!listener)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
WTSRegisterWtsApiFunctionTable(FreeRDP_InitWtsApi());
|
|
|
|
winpr_InitializeSSL(WINPR_SSL_INIT_DEFAULT);
|
|
|
|
listener->info = config;
|
|
|
|
listener->PeerAccepted = pf_server_client_connected;
|
|
|
|
|
|
|
|
if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
|
|
|
|
{
|
|
|
|
freerdp_listener_free(listener);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-09-08 18:13:41 +03:00
|
|
|
if (listener->Open(listener, config->Host, config->Port))
|
2019-05-17 15:32:54 +03:00
|
|
|
{
|
|
|
|
pf_server_mainloop(listener);
|
|
|
|
}
|
|
|
|
|
2019-09-11 14:14:43 +03:00
|
|
|
freerdp_listener_free(listener);
|
2019-05-17 15:32:54 +03:00
|
|
|
WSACleanup();
|
|
|
|
return 0;
|
|
|
|
}
|