1022 lines
27 KiB
C
1022 lines
27 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
* FreeRDP Test Server
|
|
*
|
|
* Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
* Copyright 2011 Vic Lee
|
|
* Copyright 2014 Norbert Federa <norbert.federa@thincast.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
|
|
#include <winpr/crt.h>
|
|
#include <winpr/assert.h>
|
|
#include <winpr/ssl.h>
|
|
#include <winpr/synch.h>
|
|
#include <winpr/file.h>
|
|
#include <winpr/string.h>
|
|
#include <winpr/path.h>
|
|
#include <winpr/winsock.h>
|
|
|
|
#include <freerdp/channels/wtsvc.h>
|
|
#include <freerdp/channels/channels.h>
|
|
|
|
#include <freerdp/constants.h>
|
|
#include <freerdp/server/rdpsnd.h>
|
|
|
|
#include "sf_audin.h"
|
|
#include "sf_rdpsnd.h"
|
|
#include "sf_encomsp.h"
|
|
|
|
#include "sfreerdp.h"
|
|
|
|
#include <freerdp/log.h>
|
|
#define TAG SERVER_TAG("sample")
|
|
|
|
#define SAMPLE_SERVER_USE_CLIENT_RESOLUTION 1
|
|
#define SAMPLE_SERVER_DEFAULT_WIDTH 1024
|
|
#define SAMPLE_SERVER_DEFAULT_HEIGHT 768
|
|
|
|
static char* test_pcap_file = NULL;
|
|
static BOOL test_dump_rfx_realtime = TRUE;
|
|
|
|
static BOOL test_peer_context_new(freerdp_peer* client, rdpContext* ctx)
|
|
{
|
|
testPeerContext* context = (testPeerContext*)ctx;
|
|
if (!(context->rfx_context = rfx_context_new_ex(TRUE, client->settings->ThreadingFlags)))
|
|
goto fail_rfx_context;
|
|
|
|
if (!rfx_context_reset(context->rfx_context, SAMPLE_SERVER_DEFAULT_WIDTH,
|
|
SAMPLE_SERVER_DEFAULT_HEIGHT))
|
|
goto fail_rfx_context;
|
|
|
|
context->rfx_context->mode = RLGR3;
|
|
rfx_context_set_pixel_format(context->rfx_context, PIXEL_FORMAT_RGB24);
|
|
|
|
if (!(context->nsc_context = nsc_context_new()))
|
|
goto fail_nsc_context;
|
|
|
|
if (!nsc_context_set_parameters(context->nsc_context, NSC_COLOR_FORMAT, PIXEL_FORMAT_RGB24))
|
|
goto fail_stream_new;
|
|
|
|
if (!(context->s = Stream_New(NULL, 65536)))
|
|
goto fail_stream_new;
|
|
|
|
context->icon_x = UINT32_MAX;
|
|
context->icon_y = UINT32_MAX;
|
|
context->vcm = WTSOpenServerA((LPSTR)client->context);
|
|
|
|
if (!context->vcm || context->vcm == INVALID_HANDLE_VALUE)
|
|
goto fail_open_server;
|
|
|
|
return TRUE;
|
|
fail_open_server:
|
|
context->vcm = NULL;
|
|
Stream_Free(context->s, TRUE);
|
|
context->s = NULL;
|
|
fail_stream_new:
|
|
nsc_context_free(context->nsc_context);
|
|
context->nsc_context = NULL;
|
|
fail_nsc_context:
|
|
rfx_context_free(context->rfx_context);
|
|
context->rfx_context = NULL;
|
|
fail_rfx_context:
|
|
return FALSE;
|
|
}
|
|
|
|
static void test_peer_context_free(freerdp_peer* client, rdpContext* ctx)
|
|
{
|
|
testPeerContext* context = (testPeerContext*)ctx;
|
|
WINPR_UNUSED(client);
|
|
|
|
if (context)
|
|
{
|
|
if (context->debug_channel_thread)
|
|
{
|
|
SetEvent(context->stopEvent);
|
|
WaitForSingleObject(context->debug_channel_thread, INFINITE);
|
|
CloseHandle(context->debug_channel_thread);
|
|
}
|
|
|
|
Stream_Free(context->s, TRUE);
|
|
free(context->icon_data);
|
|
free(context->bg_data);
|
|
rfx_context_free(context->rfx_context);
|
|
nsc_context_free(context->nsc_context);
|
|
|
|
if (context->debug_channel)
|
|
WTSVirtualChannelClose(context->debug_channel);
|
|
|
|
sf_peer_audin_uninit(context);
|
|
|
|
if (context->rdpsnd)
|
|
rdpsnd_server_context_free(context->rdpsnd);
|
|
|
|
if (context->encomsp)
|
|
encomsp_server_context_free(context->encomsp);
|
|
|
|
WTSCloseServer((HANDLE)context->vcm);
|
|
}
|
|
}
|
|
|
|
static BOOL test_peer_init(freerdp_peer* client)
|
|
{
|
|
client->ContextSize = sizeof(testPeerContext);
|
|
client->ContextNew = test_peer_context_new;
|
|
client->ContextFree = test_peer_context_free;
|
|
return freerdp_peer_context_new(client);
|
|
}
|
|
|
|
static wStream* test_peer_stream_init(testPeerContext* context)
|
|
{
|
|
Stream_Clear(context->s);
|
|
Stream_SetPosition(context->s, 0);
|
|
return context->s;
|
|
}
|
|
|
|
static void test_peer_begin_frame(freerdp_peer* client)
|
|
{
|
|
rdpUpdate* update = client->update;
|
|
SURFACE_FRAME_MARKER fm = { 0 };
|
|
testPeerContext* context = (testPeerContext*)client->context;
|
|
fm.frameAction = SURFACECMD_FRAMEACTION_BEGIN;
|
|
fm.frameId = context->frame_id;
|
|
update->SurfaceFrameMarker(update->context, &fm);
|
|
}
|
|
|
|
static void test_peer_end_frame(freerdp_peer* client)
|
|
{
|
|
rdpUpdate* update = client->update;
|
|
SURFACE_FRAME_MARKER fm = { 0 };
|
|
testPeerContext* context = (testPeerContext*)client->context;
|
|
fm.frameAction = SURFACECMD_FRAMEACTION_END;
|
|
fm.frameId = context->frame_id;
|
|
update->SurfaceFrameMarker(update->context, &fm);
|
|
context->frame_id++;
|
|
}
|
|
|
|
static BOOL test_peer_draw_background(freerdp_peer* client)
|
|
{
|
|
size_t size;
|
|
wStream* s;
|
|
RFX_RECT rect;
|
|
BYTE* rgb_data;
|
|
const rdpSettings* settings;
|
|
rdpUpdate* update = client->update;
|
|
SURFACE_BITS_COMMAND cmd = { 0 };
|
|
testPeerContext* context;
|
|
BOOL ret = FALSE;
|
|
|
|
WINPR_ASSERT(client);
|
|
context = (testPeerContext*)client->context;
|
|
WINPR_ASSERT(context);
|
|
|
|
settings = client->settings;
|
|
WINPR_ASSERT(settings);
|
|
|
|
if (!settings->RemoteFxCodec && !freerdp_settings_get_bool(settings, FreeRDP_NSCodec))
|
|
return FALSE;
|
|
|
|
WINPR_ASSERT(settings->DesktopWidth <= UINT16_MAX);
|
|
WINPR_ASSERT(settings->DesktopHeight <= UINT16_MAX);
|
|
|
|
s = test_peer_stream_init(context);
|
|
rect.x = 0;
|
|
rect.y = 0;
|
|
rect.width = (UINT16)settings->DesktopWidth;
|
|
rect.height = (UINT16)settings->DesktopHeight;
|
|
size = rect.width * rect.height * 3ULL;
|
|
|
|
if (!(rgb_data = malloc(size)))
|
|
{
|
|
WLog_ERR(TAG, "Problem allocating memory");
|
|
return FALSE;
|
|
}
|
|
|
|
memset(rgb_data, 0xA0, size);
|
|
|
|
if (settings->RemoteFxCodec)
|
|
{
|
|
WLog_DBG(TAG, "Using RemoteFX codec");
|
|
if (!rfx_compose_message(context->rfx_context, s, &rect, 1, rgb_data, rect.width,
|
|
rect.height, rect.width * 3))
|
|
{
|
|
goto out;
|
|
}
|
|
|
|
WINPR_ASSERT(settings->RemoteFxCodecId <= UINT16_MAX);
|
|
cmd.bmp.codecID = (UINT16)settings->RemoteFxCodecId;
|
|
cmd.cmdType = CMDTYPE_STREAM_SURFACE_BITS;
|
|
}
|
|
else
|
|
{
|
|
WLog_DBG(TAG, "Using NSCodec");
|
|
nsc_compose_message(context->nsc_context, s, rgb_data, rect.width, rect.height,
|
|
rect.width * 3ULL);
|
|
WINPR_ASSERT(settings->NSCodecId <= UINT16_MAX);
|
|
cmd.bmp.codecID = (UINT16)settings->NSCodecId;
|
|
cmd.cmdType = CMDTYPE_SET_SURFACE_BITS;
|
|
}
|
|
|
|
cmd.destLeft = 0;
|
|
cmd.destTop = 0;
|
|
cmd.destRight = rect.width;
|
|
cmd.destBottom = rect.height;
|
|
cmd.bmp.bpp = 32;
|
|
cmd.bmp.flags = 0;
|
|
cmd.bmp.width = rect.width;
|
|
cmd.bmp.height = rect.height;
|
|
WINPR_ASSERT(Stream_GetPosition(s) <= UINT32_MAX);
|
|
cmd.bmp.bitmapDataLength = (UINT32)Stream_GetPosition(s);
|
|
cmd.bmp.bitmapData = Stream_Buffer(s);
|
|
test_peer_begin_frame(client);
|
|
update->SurfaceBits(update->context, &cmd);
|
|
test_peer_end_frame(client);
|
|
ret = TRUE;
|
|
out:
|
|
free(rgb_data);
|
|
return ret;
|
|
}
|
|
|
|
static BOOL test_peer_load_icon(freerdp_peer* client)
|
|
{
|
|
testPeerContext* context = (testPeerContext*)client->context;
|
|
FILE* fp;
|
|
int i;
|
|
char line[50];
|
|
BYTE* rgb_data = NULL;
|
|
int c;
|
|
|
|
if (!client->settings->RemoteFxCodec &&
|
|
!freerdp_settings_get_bool(client->settings, FreeRDP_NSCodec))
|
|
{
|
|
WLog_ERR(TAG, "Client doesn't support RemoteFX or NSCodec");
|
|
return FALSE;
|
|
}
|
|
|
|
if ((fp = winpr_fopen("test_icon.ppm", "r")) == NULL)
|
|
{
|
|
WLog_ERR(TAG, "Unable to open test icon");
|
|
return FALSE;
|
|
}
|
|
|
|
/* P3 */
|
|
fgets(line, sizeof(line), fp);
|
|
/* Creater comment */
|
|
fgets(line, sizeof(line), fp);
|
|
/* width height */
|
|
fgets(line, sizeof(line), fp);
|
|
|
|
if (sscanf(line, "%hu %hu", &context->icon_width, &context->icon_height) < 2)
|
|
{
|
|
WLog_ERR(TAG, "Problem while extracting width/height from the icon file");
|
|
goto out_fail;
|
|
}
|
|
|
|
/* Max */
|
|
fgets(line, sizeof(line), fp);
|
|
|
|
if (!(rgb_data = calloc(context->icon_height, context->icon_width * 3)))
|
|
goto out_fail;
|
|
|
|
for (i = 0; i < context->icon_width * context->icon_height * 3; i++)
|
|
{
|
|
if (!fgets(line, sizeof(line), fp) || (sscanf(line, "%d", &c) != 1))
|
|
goto out_fail;
|
|
|
|
rgb_data[i] = (BYTE)c;
|
|
}
|
|
|
|
/* background with same size, which will be used to erase the icon from old position */
|
|
if (!(context->bg_data = calloc(context->icon_height, context->icon_width * 3)))
|
|
goto out_fail;
|
|
|
|
memset(context->bg_data, 0xA0, context->icon_width * context->icon_height * 3);
|
|
context->icon_data = rgb_data;
|
|
fclose(fp);
|
|
return TRUE;
|
|
out_fail:
|
|
free(rgb_data);
|
|
context->bg_data = NULL;
|
|
fclose(fp);
|
|
return FALSE;
|
|
}
|
|
|
|
static void test_peer_draw_icon(freerdp_peer* client, UINT32 x, UINT32 y)
|
|
{
|
|
wStream* s;
|
|
RFX_RECT rect;
|
|
rdpUpdate* update = client->update;
|
|
SURFACE_BITS_COMMAND cmd = { 0 };
|
|
testPeerContext* context;
|
|
|
|
WINPR_ASSERT(client);
|
|
context = (testPeerContext*)client->context;
|
|
WINPR_ASSERT(context);
|
|
WINPR_ASSERT(context->update);
|
|
|
|
if (client->update->dump_rfx)
|
|
return;
|
|
|
|
if (context->icon_width < 1 || !context->activated)
|
|
return;
|
|
|
|
test_peer_begin_frame(client);
|
|
rect.x = 0;
|
|
rect.y = 0;
|
|
rect.width = context->icon_width;
|
|
rect.height = context->icon_height;
|
|
|
|
if (client->settings->RemoteFxCodec)
|
|
{
|
|
WINPR_ASSERT(client->settings->RemoteFxCodecId <= UINT16_MAX);
|
|
cmd.bmp.codecID = (UINT16)client->settings->RemoteFxCodecId;
|
|
cmd.cmdType = CMDTYPE_STREAM_SURFACE_BITS;
|
|
}
|
|
else
|
|
{
|
|
WINPR_ASSERT(client->settings->NSCodecId <= UINT16_MAX);
|
|
cmd.bmp.codecID = (UINT16)client->settings->NSCodecId;
|
|
cmd.cmdType = CMDTYPE_SET_SURFACE_BITS;
|
|
}
|
|
|
|
if (context->icon_x != UINT32_MAX)
|
|
{
|
|
s = test_peer_stream_init(context);
|
|
|
|
if (client->settings->RemoteFxCodec)
|
|
rfx_compose_message(context->rfx_context, s, &rect, 1, context->bg_data, rect.width,
|
|
rect.height, rect.width * 3);
|
|
else
|
|
nsc_compose_message(context->nsc_context, s, context->bg_data, rect.width, rect.height,
|
|
rect.width * 3);
|
|
|
|
cmd.destLeft = context->icon_x;
|
|
cmd.destTop = context->icon_y;
|
|
cmd.destRight = context->icon_x + context->icon_width;
|
|
cmd.destBottom = context->icon_y + context->icon_height;
|
|
cmd.bmp.bpp = 32;
|
|
cmd.bmp.flags = 0;
|
|
cmd.bmp.width = context->icon_width;
|
|
cmd.bmp.height = context->icon_height;
|
|
cmd.bmp.bitmapDataLength = (UINT32)Stream_GetPosition(s);
|
|
cmd.bmp.bitmapData = Stream_Buffer(s);
|
|
update->SurfaceBits(update->context, &cmd);
|
|
}
|
|
|
|
s = test_peer_stream_init(context);
|
|
|
|
if (client->settings->RemoteFxCodec)
|
|
rfx_compose_message(context->rfx_context, s, &rect, 1, context->icon_data, rect.width,
|
|
rect.height, rect.width * 3);
|
|
else
|
|
nsc_compose_message(context->nsc_context, s, context->icon_data, rect.width, rect.height,
|
|
rect.width * 3);
|
|
|
|
cmd.destLeft = x;
|
|
cmd.destTop = y;
|
|
cmd.destRight = x + context->icon_width;
|
|
cmd.destBottom = y + context->icon_height;
|
|
cmd.bmp.bpp = 32;
|
|
cmd.bmp.width = context->icon_width;
|
|
cmd.bmp.height = context->icon_height;
|
|
cmd.bmp.bitmapDataLength = (UINT32)Stream_GetPosition(s);
|
|
cmd.bmp.bitmapData = Stream_Buffer(s);
|
|
update->SurfaceBits(update->context, &cmd);
|
|
context->icon_x = x;
|
|
context->icon_y = y;
|
|
test_peer_end_frame(client);
|
|
}
|
|
|
|
static BOOL test_sleep_tsdiff(UINT32* old_sec, UINT32* old_usec, UINT32 new_sec, UINT32 new_usec)
|
|
{
|
|
INT64 sec, usec;
|
|
|
|
if ((*old_sec == 0) && (*old_usec == 0))
|
|
{
|
|
*old_sec = new_sec;
|
|
*old_usec = new_usec;
|
|
return TRUE;
|
|
}
|
|
|
|
sec = new_sec - *old_sec;
|
|
usec = new_usec - *old_usec;
|
|
|
|
if ((sec < 0) || ((sec == 0) && (usec < 0)))
|
|
{
|
|
WLog_ERR(TAG, "Invalid time stamp detected.");
|
|
return FALSE;
|
|
}
|
|
|
|
*old_sec = new_sec;
|
|
*old_usec = new_usec;
|
|
|
|
while (usec < 0)
|
|
{
|
|
usec += 1000000;
|
|
sec--;
|
|
}
|
|
|
|
if (sec > 0)
|
|
Sleep((DWORD)sec * 1000);
|
|
|
|
if (usec > 0)
|
|
USleep((DWORD)usec);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_dump_rfx(freerdp_peer* client)
|
|
{
|
|
wStream* s;
|
|
UINT32 prev_seconds;
|
|
UINT32 prev_useconds;
|
|
rdpUpdate* update;
|
|
rdpPcap* pcap_rfx;
|
|
pcap_record record;
|
|
s = Stream_New(NULL, 512);
|
|
|
|
if (!s)
|
|
return FALSE;
|
|
|
|
update = client->update;
|
|
|
|
if (!(pcap_rfx = pcap_open(test_pcap_file, FALSE)))
|
|
return FALSE;
|
|
|
|
prev_seconds = prev_useconds = 0;
|
|
|
|
while (pcap_has_next_record(pcap_rfx))
|
|
{
|
|
if (!pcap_get_next_record_header(pcap_rfx, &record))
|
|
break;
|
|
|
|
if (!Stream_EnsureCapacity(s, record.length))
|
|
break;
|
|
|
|
record.data = Stream_Buffer(s);
|
|
pcap_get_next_record_content(pcap_rfx, &record);
|
|
Stream_SetPointer(s, Stream_Buffer(s) + Stream_Capacity(s));
|
|
|
|
if (test_dump_rfx_realtime &&
|
|
test_sleep_tsdiff(&prev_seconds, &prev_useconds, record.header.ts_sec,
|
|
record.header.ts_usec) == FALSE)
|
|
break;
|
|
|
|
update->SurfaceCommand(update->context, s);
|
|
|
|
if (client->CheckFileDescriptor(client) != TRUE)
|
|
break;
|
|
}
|
|
|
|
Stream_Free(s, TRUE);
|
|
pcap_close(pcap_rfx);
|
|
return TRUE;
|
|
}
|
|
|
|
static DWORD WINAPI tf_debug_channel_thread_func(LPVOID arg)
|
|
{
|
|
void* fd;
|
|
wStream* s;
|
|
void* buffer;
|
|
DWORD BytesReturned = 0;
|
|
ULONG written;
|
|
testPeerContext* context = (testPeerContext*)arg;
|
|
|
|
if (WTSVirtualChannelQuery(context->debug_channel, WTSVirtualFileHandle, &buffer,
|
|
&BytesReturned) == TRUE)
|
|
{
|
|
fd = *((void**)buffer);
|
|
WTSFreeMemory(buffer);
|
|
|
|
if (!(context->event = CreateWaitObjectEvent(NULL, TRUE, FALSE, fd)))
|
|
return 0;
|
|
}
|
|
|
|
s = Stream_New(NULL, 4096);
|
|
WTSVirtualChannelWrite(context->debug_channel, (PCHAR) "test1", 5, &written);
|
|
|
|
while (1)
|
|
{
|
|
WaitForSingleObject(context->event, INFINITE);
|
|
|
|
if (WaitForSingleObject(context->stopEvent, 0) == WAIT_OBJECT_0)
|
|
break;
|
|
|
|
Stream_SetPosition(s, 0);
|
|
|
|
if (WTSVirtualChannelRead(context->debug_channel, 0, (PCHAR)Stream_Buffer(s),
|
|
(ULONG)Stream_Capacity(s), &BytesReturned) == FALSE)
|
|
{
|
|
if (BytesReturned == 0)
|
|
break;
|
|
|
|
Stream_EnsureRemainingCapacity(s, BytesReturned);
|
|
|
|
if (WTSVirtualChannelRead(context->debug_channel, 0, (PCHAR)Stream_Buffer(s),
|
|
(ULONG)Stream_Capacity(s), &BytesReturned) == FALSE)
|
|
{
|
|
/* should not happen */
|
|
break;
|
|
}
|
|
}
|
|
|
|
Stream_SetPosition(s, BytesReturned);
|
|
WLog_DBG(TAG, "got %" PRIu32 " bytes", BytesReturned);
|
|
}
|
|
|
|
Stream_Free(s, TRUE);
|
|
return 0;
|
|
}
|
|
|
|
static BOOL tf_peer_post_connect(freerdp_peer* client)
|
|
{
|
|
testPeerContext* context = (testPeerContext*)client->context;
|
|
/**
|
|
* This callback is called when the entire connection sequence is done, i.e. we've received the
|
|
* Font List PDU from the client and sent out the Font Map PDU.
|
|
* The server may start sending graphics output and receiving keyboard/mouse input after this
|
|
* callback returns.
|
|
*/
|
|
WLog_DBG(TAG, "Client %s is activated (osMajorType %" PRIu32 " osMinorType %" PRIu32 ")",
|
|
client->local ? "(local)" : client->hostname, client->settings->OsMajorType,
|
|
client->settings->OsMinorType);
|
|
|
|
if (client->settings->AutoLogonEnabled)
|
|
{
|
|
WLog_DBG(TAG, " and wants to login automatically as %s\\%s",
|
|
client->settings->Domain ? client->settings->Domain : "",
|
|
client->settings->Username);
|
|
/* A real server may perform OS login here if NLA is not executed previously. */
|
|
}
|
|
|
|
WLog_DBG(TAG, "");
|
|
WLog_DBG(TAG, "Client requested desktop: %" PRIu32 "x%" PRIu32 "x%" PRIu32 "",
|
|
client->settings->DesktopWidth, client->settings->DesktopHeight,
|
|
client->settings->ColorDepth);
|
|
#if (SAMPLE_SERVER_USE_CLIENT_RESOLUTION == 1)
|
|
|
|
if (!rfx_context_reset(context->rfx_context, client->settings->DesktopWidth,
|
|
client->settings->DesktopHeight))
|
|
return FALSE;
|
|
|
|
WLog_DBG(TAG, "Using resolution requested by client.");
|
|
#else
|
|
client->settings->DesktopWidth = context->rfx_context->width;
|
|
client->settings->DesktopHeight = context->rfx_context->height;
|
|
WLog_DBG(TAG, "Resizing client to %" PRIu32 "x%" PRIu32 "", client->settings->DesktopWidth,
|
|
client->settings->DesktopHeight);
|
|
client->update->DesktopResize(client->update->context);
|
|
#endif
|
|
|
|
/* A real server should tag the peer as activated here and start sending updates in main loop.
|
|
*/
|
|
if (!test_peer_load_icon(client))
|
|
{
|
|
WLog_DBG(TAG, "Unable to load icon");
|
|
return FALSE;
|
|
}
|
|
|
|
if (WTSVirtualChannelManagerIsChannelJoined(context->vcm, "rdpdbg"))
|
|
{
|
|
context->debug_channel = WTSVirtualChannelOpen(context->vcm, WTS_CURRENT_SESSION, "rdpdbg");
|
|
|
|
if (context->debug_channel != NULL)
|
|
{
|
|
WLog_DBG(TAG, "Open channel rdpdbg.");
|
|
|
|
if (!(context->stopEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
|
|
{
|
|
WLog_ERR(TAG, "Failed to create stop event");
|
|
return FALSE;
|
|
}
|
|
|
|
if (!(context->debug_channel_thread =
|
|
CreateThread(NULL, 0, tf_debug_channel_thread_func, (void*)context, 0, NULL)))
|
|
{
|
|
WLog_ERR(TAG, "Failed to create debug channel thread");
|
|
CloseHandle(context->stopEvent);
|
|
context->stopEvent = NULL;
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (WTSVirtualChannelManagerIsChannelJoined(context->vcm, "rdpsnd"))
|
|
{
|
|
sf_peer_rdpsnd_init(context); /* Audio Output */
|
|
}
|
|
|
|
if (WTSVirtualChannelManagerIsChannelJoined(context->vcm, ENCOMSP_SVC_CHANNEL_NAME))
|
|
{
|
|
sf_peer_encomsp_init(context); /* Lync Multiparty */
|
|
}
|
|
|
|
/* Dynamic Virtual Channels */
|
|
sf_peer_audin_init(context); /* Audio Input */
|
|
/* Return FALSE here would stop the execution of the peer main loop. */
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_activate(freerdp_peer* client)
|
|
{
|
|
testPeerContext* context = (testPeerContext*)client->context;
|
|
context->activated = TRUE;
|
|
// client->settings->CompressionLevel = PACKET_COMPR_TYPE_8K;
|
|
// client->settings->CompressionLevel = PACKET_COMPR_TYPE_64K;
|
|
// client->settings->CompressionLevel = PACKET_COMPR_TYPE_RDP6;
|
|
client->settings->CompressionLevel = PACKET_COMPR_TYPE_RDP61;
|
|
|
|
if (test_pcap_file != NULL)
|
|
{
|
|
client->update->dump_rfx = TRUE;
|
|
|
|
if (!tf_peer_dump_rfx(client))
|
|
return FALSE;
|
|
}
|
|
else
|
|
test_peer_draw_background(client);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_synchronize_event(rdpInput* input, UINT32 flags)
|
|
{
|
|
WINPR_UNUSED(input);
|
|
WLog_DBG(TAG, "Client sent a synchronize event (flags:0x%" PRIX32 ")", flags);
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_keyboard_event(rdpInput* input, UINT16 flags, UINT16 code)
|
|
{
|
|
freerdp_peer* client = input->context->peer;
|
|
rdpUpdate* update = client->update;
|
|
testPeerContext* context = (testPeerContext*)input->context;
|
|
WLog_DBG(TAG, "Client sent a keyboard event (flags:0x%04" PRIX16 " code:0x%04" PRIX16 ")",
|
|
flags, code);
|
|
|
|
if ((flags & 0x4000) && code == 0x22) /* 'g' key */
|
|
{
|
|
if (client->settings->DesktopWidth != 800)
|
|
{
|
|
client->settings->DesktopWidth = 800;
|
|
client->settings->DesktopHeight = 600;
|
|
}
|
|
else
|
|
{
|
|
client->settings->DesktopWidth = SAMPLE_SERVER_DEFAULT_WIDTH;
|
|
client->settings->DesktopHeight = SAMPLE_SERVER_DEFAULT_HEIGHT;
|
|
}
|
|
|
|
if (!rfx_context_reset(context->rfx_context, client->settings->DesktopWidth,
|
|
client->settings->DesktopHeight))
|
|
return FALSE;
|
|
|
|
update->DesktopResize(update->context);
|
|
context->activated = FALSE;
|
|
}
|
|
else if ((flags & 0x4000) && code == 0x2E) /* 'c' key */
|
|
{
|
|
if (context->debug_channel)
|
|
{
|
|
ULONG written;
|
|
WTSVirtualChannelWrite(context->debug_channel, (PCHAR) "test2", 5, &written);
|
|
}
|
|
}
|
|
else if ((flags & 0x4000) && code == 0x2D) /* 'x' key */
|
|
{
|
|
client->Close(client);
|
|
}
|
|
else if ((flags & 0x4000) && code == 0x13) /* 'r' key */
|
|
{
|
|
context->audin_open = !context->audin_open;
|
|
}
|
|
else if ((flags & 0x4000) && code == 0x1F) /* 's' key */
|
|
{
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_unicode_keyboard_event(rdpInput* input, UINT16 flags, UINT16 code)
|
|
{
|
|
WINPR_UNUSED(input);
|
|
WLog_DBG(TAG,
|
|
"Client sent a unicode keyboard event (flags:0x%04" PRIX16 " code:0x%04" PRIX16 ")",
|
|
flags, code);
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_mouse_event(rdpInput* input, UINT16 flags, UINT16 x, UINT16 y)
|
|
{
|
|
WINPR_UNUSED(flags);
|
|
// WLog_DBG(TAG, "Client sent a mouse event (flags:0x%04"PRIX16" pos:%"PRIu16",%"PRIu16")",
|
|
// flags, x, y);
|
|
test_peer_draw_icon(input->context->peer, x + 10, y);
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_extended_mouse_event(rdpInput* input, UINT16 flags, UINT16 x, UINT16 y)
|
|
{
|
|
WINPR_UNUSED(flags);
|
|
// WLog_DBG(TAG, "Client sent an extended mouse event (flags:0x%04"PRIX16"
|
|
// pos:%"PRIu16",%"PRIu16")", flags, x, y);
|
|
test_peer_draw_icon(input->context->peer, x + 10, y);
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_refresh_rect(rdpContext* context, BYTE count, const RECTANGLE_16* areas)
|
|
{
|
|
BYTE i;
|
|
WINPR_UNUSED(context);
|
|
WLog_DBG(TAG, "Client requested to refresh:");
|
|
|
|
for (i = 0; i < count; i++)
|
|
{
|
|
WLog_DBG(TAG, " (%" PRIu16 ", %" PRIu16 ") (%" PRIu16 ", %" PRIu16 ")", areas[i].left,
|
|
areas[i].top, areas[i].right, areas[i].bottom);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL tf_peer_suppress_output(rdpContext* context, BYTE allow, const RECTANGLE_16* area)
|
|
{
|
|
WINPR_UNUSED(context);
|
|
|
|
if (allow > 0)
|
|
{
|
|
WLog_DBG(TAG,
|
|
"Client restore output (%" PRIu16 ", %" PRIu16 ") (%" PRIu16 ", %" PRIu16 ").",
|
|
area->left, area->top, area->right, area->bottom);
|
|
}
|
|
else
|
|
{
|
|
WLog_DBG(TAG, "Client minimized and suppress output.");
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static DWORD WINAPI test_peer_mainloop(LPVOID arg)
|
|
{
|
|
DWORD error = CHANNEL_RC_OK;
|
|
HANDLE handles[32];
|
|
DWORD count;
|
|
DWORD status;
|
|
testPeerContext* context;
|
|
freerdp_peer* client = (freerdp_peer*)arg;
|
|
|
|
if (!test_peer_init(client))
|
|
{
|
|
freerdp_peer_free(client);
|
|
return 0;
|
|
}
|
|
|
|
/* Initialize the real server settings here */
|
|
client->settings->CertificateFile = _strdup("server.crt");
|
|
client->settings->PrivateKeyFile = _strdup("server.key");
|
|
client->settings->RdpKeyFile = _strdup("server.key");
|
|
|
|
if (!client->settings->CertificateFile || !client->settings->PrivateKeyFile ||
|
|
!client->settings->RdpKeyFile)
|
|
{
|
|
WLog_ERR(TAG, "Memory allocation failed (strdup)");
|
|
freerdp_peer_free(client);
|
|
return 0;
|
|
}
|
|
|
|
client->settings->RdpSecurity = TRUE;
|
|
client->settings->TlsSecurity = TRUE;
|
|
client->settings->NlaSecurity = FALSE;
|
|
client->settings->EncryptionLevel = ENCRYPTION_LEVEL_CLIENT_COMPATIBLE;
|
|
/* client->settings->EncryptionLevel = ENCRYPTION_LEVEL_HIGH; */
|
|
/* client->settings->EncryptionLevel = ENCRYPTION_LEVEL_LOW; */
|
|
/* client->settings->EncryptionLevel = ENCRYPTION_LEVEL_FIPS; */
|
|
client->settings->RemoteFxCodec = TRUE;
|
|
freerdp_settings_set_bool(client->settings, FreeRDP_NSCodec, TRUE);
|
|
client->settings->ColorDepth = 32;
|
|
client->settings->SuppressOutput = TRUE;
|
|
client->settings->RefreshRect = TRUE;
|
|
client->PostConnect = tf_peer_post_connect;
|
|
client->Activate = tf_peer_activate;
|
|
client->input->SynchronizeEvent = tf_peer_synchronize_event;
|
|
client->input->KeyboardEvent = tf_peer_keyboard_event;
|
|
client->input->UnicodeKeyboardEvent = tf_peer_unicode_keyboard_event;
|
|
client->input->MouseEvent = tf_peer_mouse_event;
|
|
client->input->ExtendedMouseEvent = tf_peer_extended_mouse_event;
|
|
client->update->RefreshRect = tf_peer_refresh_rect;
|
|
client->update->SuppressOutput = tf_peer_suppress_output;
|
|
client->settings->MultifragMaxRequestSize = 0xFFFFFF; /* FIXME */
|
|
client->Initialize(client);
|
|
context = (testPeerContext*)client->context;
|
|
WLog_INFO(TAG, "We've got a client %s", client->local ? "(local)" : client->hostname);
|
|
|
|
while (error == CHANNEL_RC_OK)
|
|
{
|
|
count = 0;
|
|
{
|
|
DWORD tmp = client->GetEventHandles(client, &handles[count], 32 - count);
|
|
|
|
if (tmp == 0)
|
|
{
|
|
WLog_ERR(TAG, "Failed to get FreeRDP transport event handles");
|
|
break;
|
|
}
|
|
|
|
count += tmp;
|
|
}
|
|
handles[count++] = WTSVirtualChannelManagerGetEventHandle(context->vcm);
|
|
status = WaitForMultipleObjects(count, handles, FALSE, INFINITE);
|
|
|
|
if (status == WAIT_FAILED)
|
|
{
|
|
WLog_ERR(TAG, "WaitForMultipleObjects failed (errno: %d)", errno);
|
|
break;
|
|
}
|
|
|
|
if (client->CheckFileDescriptor(client) != TRUE)
|
|
break;
|
|
|
|
if (WTSVirtualChannelManagerCheckFileDescriptor(context->vcm) != TRUE)
|
|
break;
|
|
|
|
/* Handle dynamic virtual channel intializations */
|
|
if (WTSVirtualChannelManagerIsChannelJoined(context->vcm, "drdynvc"))
|
|
{
|
|
switch (WTSVirtualChannelManagerGetDrdynvcState(context->vcm))
|
|
{
|
|
case DRDYNVC_STATE_NONE:
|
|
break;
|
|
|
|
case DRDYNVC_STATE_INITIALIZED:
|
|
break;
|
|
|
|
case DRDYNVC_STATE_READY:
|
|
|
|
/* Here is the correct state to start dynamic virtual channels */
|
|
if (sf_peer_audin_running(context) != context->audin_open)
|
|
{
|
|
if (!sf_peer_audin_running(context))
|
|
sf_peer_audin_start(context);
|
|
else
|
|
sf_peer_audin_stop(context);
|
|
}
|
|
|
|
break;
|
|
|
|
case DRDYNVC_STATE_FAILED:
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
WLog_INFO(TAG, "Client %s disconnected.", client->local ? "(local)" : client->hostname);
|
|
client->Disconnect(client);
|
|
freerdp_peer_context_free(client);
|
|
freerdp_peer_free(client);
|
|
return error;
|
|
}
|
|
|
|
static BOOL test_peer_accepted(freerdp_listener* instance, freerdp_peer* client)
|
|
{
|
|
HANDLE hThread;
|
|
WINPR_UNUSED(instance);
|
|
|
|
if (!(hThread = CreateThread(NULL, 0, test_peer_mainloop, (void*)client, 0, NULL)))
|
|
return FALSE;
|
|
|
|
CloseHandle(hThread);
|
|
return TRUE;
|
|
}
|
|
|
|
static void test_server_mainloop(freerdp_listener* instance)
|
|
{
|
|
HANDLE handles[32];
|
|
DWORD count;
|
|
DWORD status;
|
|
|
|
while (1)
|
|
{
|
|
count = instance->GetEventHandles(instance, handles, 32);
|
|
|
|
if (0 == count)
|
|
{
|
|
WLog_ERR(TAG, "Failed to get FreeRDP event handles");
|
|
break;
|
|
}
|
|
|
|
status = WaitForMultipleObjects(count, handles, FALSE, INFINITE);
|
|
|
|
if (WAIT_FAILED == status)
|
|
{
|
|
WLog_ERR(TAG, "select failed");
|
|
break;
|
|
}
|
|
|
|
if (instance->CheckFileDescriptor(instance) != TRUE)
|
|
{
|
|
WLog_ERR(TAG, "Failed to check FreeRDP file descriptor");
|
|
break;
|
|
}
|
|
}
|
|
|
|
instance->Close(instance);
|
|
}
|
|
|
|
int main(int argc, char* argv[])
|
|
{
|
|
const char spcap[] = "--";
|
|
const char sfast[] = "--fast";
|
|
const char sport[] = "--port=";
|
|
const char slocal_only[] = "--local_only";
|
|
WSADATA wsaData;
|
|
freerdp_listener* instance;
|
|
char* file;
|
|
char name[MAX_PATH];
|
|
long port = 3389, i;
|
|
BOOL localOnly = FALSE;
|
|
errno = 0;
|
|
|
|
for (i = 1; i < argc; i++)
|
|
{
|
|
char* arg = argv[i];
|
|
|
|
if (strncmp(arg, sfast, sizeof(sfast)) == 0)
|
|
test_dump_rfx_realtime = FALSE;
|
|
else if (strncmp(arg, sport, sizeof(sport) - 1) == 0)
|
|
{
|
|
StrSep(&arg, "=");
|
|
|
|
if (!arg)
|
|
return -1;
|
|
|
|
port = strtol(arg, NULL, 10);
|
|
|
|
if ((port < 1) || (port > UINT16_MAX) || (errno != 0))
|
|
return -1;
|
|
}
|
|
else if (strncmp(arg, slocal_only, sizeof(slocal_only)) == 0)
|
|
localOnly = TRUE;
|
|
else if (strncmp(arg, spcap, sizeof(spcap)) == 0)
|
|
test_pcap_file = arg;
|
|
}
|
|
|
|
WTSRegisterWtsApiFunctionTable(FreeRDP_InitWtsApi());
|
|
winpr_InitializeSSL(WINPR_SSL_INIT_DEFAULT);
|
|
instance = freerdp_listener_new();
|
|
|
|
if (!instance)
|
|
return -1;
|
|
|
|
instance->PeerAccepted = test_peer_accepted;
|
|
|
|
if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
|
|
{
|
|
freerdp_listener_free(instance);
|
|
return -1;
|
|
}
|
|
|
|
/* Open the server socket and start listening. */
|
|
sprintf_s(name, sizeof(name), "tfreerdp-server.%ld", port);
|
|
file = GetKnownSubPath(KNOWN_PATH_TEMP, name);
|
|
|
|
if (!file)
|
|
{
|
|
freerdp_listener_free(instance);
|
|
WSACleanup();
|
|
return -1;
|
|
}
|
|
|
|
if ((localOnly || instance->Open(instance, NULL, (UINT16)port)) &&
|
|
instance->OpenLocal(instance, file))
|
|
{
|
|
/* Entering the server main loop. In a real server the listener can be run in its own
|
|
* thread. */
|
|
test_server_mainloop(instance);
|
|
}
|
|
|
|
free(file);
|
|
freerdp_listener_free(instance);
|
|
WSACleanup();
|
|
return 0;
|
|
}
|