609d177412
Before this change if short write (send) occured, we were trying to resend without updating length variable, so we were trying to send too much and the following undefined data were causing the other side to terminate connection.
411 lines
9.2 KiB
C
411 lines
9.2 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Client
|
|
* Network Transport Layer
|
|
*
|
|
* Copyright 2011 Vic Lee
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <freerdp/utils/sleep.h>
|
|
#include <freerdp/utils/stream.h>
|
|
#include <freerdp/utils/memory.h>
|
|
#include <freerdp/utils/hexdump.h>
|
|
|
|
#include <time.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
|
|
#ifndef _WIN32
|
|
#include <netdb.h>
|
|
#include <sys/socket.h>
|
|
#endif
|
|
|
|
#include "tpkt.h"
|
|
#include "fastpath.h"
|
|
#include "credssp.h"
|
|
#include "transport.h"
|
|
|
|
#define BUFFER_SIZE 16384
|
|
|
|
STREAM* transport_recv_stream_init(rdpTransport* transport, int size)
|
|
{
|
|
STREAM* s = transport->recv_stream;
|
|
stream_check_size(s, size);
|
|
stream_set_pos(s, 0);
|
|
return s;
|
|
}
|
|
|
|
STREAM* transport_send_stream_init(rdpTransport* transport, int size)
|
|
{
|
|
STREAM* s = transport->send_stream;
|
|
stream_check_size(s, size);
|
|
stream_set_pos(s, 0);
|
|
return s;
|
|
}
|
|
|
|
boolean transport_connect(rdpTransport* transport, const char* hostname, uint16 port)
|
|
{
|
|
return tcp_connect(transport->tcp, hostname, port);
|
|
}
|
|
|
|
void transport_attach(rdpTransport* transport, int sockfd)
|
|
{
|
|
transport->tcp->sockfd = sockfd;
|
|
}
|
|
|
|
boolean transport_disconnect(rdpTransport* transport)
|
|
{
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
|
tls_disconnect(transport->tls);
|
|
return tcp_disconnect(transport->tcp);
|
|
}
|
|
|
|
boolean transport_connect_rdp(rdpTransport* transport)
|
|
{
|
|
/* RDP encryption */
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean transport_connect_tls(rdpTransport* transport)
|
|
{
|
|
if (transport->tls == NULL)
|
|
transport->tls = tls_new();
|
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
|
transport->tls->sockfd = transport->tcp->sockfd;
|
|
|
|
if (tls_connect(transport->tls) != true)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean transport_connect_nla(rdpTransport* transport)
|
|
{
|
|
if (transport->tls == NULL)
|
|
transport->tls = tls_new();
|
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
|
transport->tls->sockfd = transport->tcp->sockfd;
|
|
|
|
if (tls_connect(transport->tls) != true)
|
|
return false;
|
|
|
|
/* Network Level Authentication */
|
|
|
|
if (transport->settings->authentication != true)
|
|
return true;
|
|
|
|
if (transport->credssp == NULL)
|
|
transport->credssp = credssp_new(transport);
|
|
|
|
if (credssp_authenticate(transport->credssp) < 0)
|
|
{
|
|
printf("Authentication failure, check credentials.\n"
|
|
"If credentials are valid, the NTLMSSP implementation may be to blame.\n");
|
|
|
|
credssp_free(transport->credssp);
|
|
return false;
|
|
}
|
|
|
|
credssp_free(transport->credssp);
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean transport_accept_rdp(rdpTransport* transport)
|
|
{
|
|
/* RDP encryption */
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean transport_accept_tls(rdpTransport* transport)
|
|
{
|
|
if (transport->tls == NULL)
|
|
transport->tls = tls_new();
|
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
|
transport->tls->sockfd = transport->tcp->sockfd;
|
|
|
|
if (tls_accept(transport->tls, transport->settings->cert_file, transport->settings->privatekey_file) != true)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean transport_accept_nla(rdpTransport* transport)
|
|
{
|
|
if (transport->tls == NULL)
|
|
transport->tls = tls_new();
|
|
|
|
transport->layer = TRANSPORT_LAYER_TLS;
|
|
transport->tls->sockfd = transport->tcp->sockfd;
|
|
|
|
if (tls_accept(transport->tls, transport->settings->cert_file, transport->settings->privatekey_file) != true)
|
|
return false;
|
|
|
|
/* Network Level Authentication */
|
|
|
|
if (transport->settings->authentication != true)
|
|
return true;
|
|
|
|
/* Blocking here until NLA is complete */
|
|
|
|
return true;
|
|
}
|
|
|
|
int transport_read(rdpTransport* transport, STREAM* s)
|
|
{
|
|
int status = -1;
|
|
|
|
while (true)
|
|
{
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
|
status = tls_read(transport->tls, stream_get_tail(s), stream_get_left(s));
|
|
else if (transport->layer == TRANSPORT_LAYER_TCP)
|
|
status = tcp_read(transport->tcp, stream_get_tail(s), stream_get_left(s));
|
|
|
|
if (status == 0 && transport->blocking)
|
|
{
|
|
freerdp_usleep(transport->usleep_interval);
|
|
continue;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
#ifdef WITH_DEBUG_TRANSPORT
|
|
if (status > 0)
|
|
{
|
|
printf("Local < Remote\n");
|
|
freerdp_hexdump(s->data, status);
|
|
}
|
|
#endif
|
|
|
|
return status;
|
|
}
|
|
|
|
static int transport_read_nonblocking(rdpTransport* transport)
|
|
{
|
|
int status;
|
|
|
|
stream_check_size(transport->recv_buffer, 4096);
|
|
status = transport_read(transport, transport->recv_buffer);
|
|
|
|
if (status <= 0)
|
|
return status;
|
|
|
|
stream_seek(transport->recv_buffer, status);
|
|
|
|
return status;
|
|
}
|
|
|
|
int transport_write(rdpTransport* transport, STREAM* s)
|
|
{
|
|
int status = -1;
|
|
int length;
|
|
|
|
length = stream_get_length(s);
|
|
stream_set_pos(s, 0);
|
|
|
|
#ifdef WITH_DEBUG_TRANSPORT
|
|
if (length > 0)
|
|
{
|
|
printf("Local > Remote\n");
|
|
freerdp_hexdump(s->data, length);
|
|
}
|
|
#endif
|
|
|
|
while (length > 0)
|
|
{
|
|
if (transport->layer == TRANSPORT_LAYER_TLS)
|
|
status = tls_write(transport->tls, stream_get_tail(s), length);
|
|
else if (transport->layer == TRANSPORT_LAYER_TCP)
|
|
status = tcp_write(transport->tcp, stream_get_tail(s), length);
|
|
|
|
if (status < 0)
|
|
break; /* error occurred */
|
|
|
|
if (status == 0)
|
|
{
|
|
/* blocking while sending */
|
|
freerdp_usleep(transport->usleep_interval);
|
|
|
|
/* when sending is blocked in nonblocking mode, the receiving buffer should be checked */
|
|
if (!transport->blocking)
|
|
{
|
|
/* and in case we do have buffered some data, we set the event so next loop will get it */
|
|
if (transport_read_nonblocking(transport) > 0)
|
|
wait_obj_set(transport->recv_event);
|
|
}
|
|
}
|
|
|
|
length -= status;
|
|
stream_seek(s, status);
|
|
}
|
|
|
|
if (status < 0)
|
|
{
|
|
/* A write error indicates that the peer has dropped the connection */
|
|
transport->layer = TRANSPORT_LAYER_CLOSED;
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
void transport_get_fds(rdpTransport* transport, void** rfds, int* rcount)
|
|
{
|
|
rfds[*rcount] = (void*)(long)(transport->tcp->sockfd);
|
|
(*rcount)++;
|
|
wait_obj_get_fds(transport->recv_event, rfds, rcount);
|
|
}
|
|
|
|
int transport_check_fds(rdpTransport* transport)
|
|
{
|
|
int pos;
|
|
int status;
|
|
uint16 length;
|
|
STREAM* received;
|
|
|
|
wait_obj_clear(transport->recv_event);
|
|
|
|
status = transport_read_nonblocking(transport);
|
|
|
|
if (status < 0)
|
|
return status;
|
|
|
|
while ((pos = stream_get_pos(transport->recv_buffer)) > 0)
|
|
{
|
|
stream_set_pos(transport->recv_buffer, 0);
|
|
if (tpkt_verify_header(transport->recv_buffer)) /* TPKT */
|
|
{
|
|
/* Ensure the TPKT header is available. */
|
|
if (pos <= 4)
|
|
{
|
|
stream_set_pos(transport->recv_buffer, pos);
|
|
return 0;
|
|
}
|
|
length = tpkt_read_header(transport->recv_buffer);
|
|
}
|
|
else /* Fast Path */
|
|
{
|
|
/* Ensure the Fast Path header is available. */
|
|
if (pos <= 2)
|
|
{
|
|
stream_set_pos(transport->recv_buffer, pos);
|
|
return 0;
|
|
}
|
|
length = fastpath_read_header(NULL, transport->recv_buffer);
|
|
}
|
|
|
|
if (length == 0)
|
|
{
|
|
printf("transport_check_fds: protocol error, not a TPKT or Fast Path header.\n");
|
|
freerdp_hexdump(stream_get_head(transport->recv_buffer), pos);
|
|
return -1;
|
|
}
|
|
|
|
if (pos < length)
|
|
{
|
|
stream_set_pos(transport->recv_buffer, pos);
|
|
return 0; /* Packet is not yet completely received. */
|
|
}
|
|
|
|
/*
|
|
* A complete packet has been received. In case there are trailing data
|
|
* for the next packet, we copy it to the new receive buffer.
|
|
*/
|
|
received = transport->recv_buffer;
|
|
transport->recv_buffer = stream_new(BUFFER_SIZE);
|
|
|
|
if (pos > length)
|
|
{
|
|
stream_set_pos(received, length);
|
|
stream_check_size(transport->recv_buffer, pos - length);
|
|
stream_copy(transport->recv_buffer, received, pos - length);
|
|
}
|
|
|
|
stream_set_pos(received, length);
|
|
stream_seal(received);
|
|
stream_set_pos(received, 0);
|
|
|
|
if (transport->recv_callback(transport, received, transport->recv_extra) == false)
|
|
status = -1;
|
|
|
|
stream_free(received);
|
|
|
|
if (status < 0)
|
|
return status;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
boolean transport_set_blocking_mode(rdpTransport* transport, boolean blocking)
|
|
{
|
|
transport->blocking = blocking;
|
|
return tcp_set_blocking_mode(transport->tcp, blocking);
|
|
}
|
|
|
|
rdpTransport* transport_new(rdpSettings* settings)
|
|
{
|
|
rdpTransport* transport;
|
|
|
|
transport = (rdpTransport*) xzalloc(sizeof(rdpTransport));
|
|
|
|
if (transport != NULL)
|
|
{
|
|
transport->tcp = tcp_new(settings);
|
|
transport->settings = settings;
|
|
|
|
/* a small 0.1ms delay when transport is blocking. */
|
|
transport->usleep_interval = 100;
|
|
|
|
/* receive buffer for non-blocking read. */
|
|
transport->recv_buffer = stream_new(BUFFER_SIZE);
|
|
transport->recv_event = wait_obj_new();
|
|
|
|
/* buffers for blocking read/write */
|
|
transport->recv_stream = stream_new(BUFFER_SIZE);
|
|
transport->send_stream = stream_new(BUFFER_SIZE);
|
|
|
|
transport->blocking = true;
|
|
|
|
transport->layer = TRANSPORT_LAYER_TCP;
|
|
}
|
|
|
|
return transport;
|
|
}
|
|
|
|
void transport_free(rdpTransport* transport)
|
|
{
|
|
if (transport != NULL)
|
|
{
|
|
stream_free(transport->recv_buffer);
|
|
stream_free(transport->recv_stream);
|
|
stream_free(transport->send_stream);
|
|
wait_obj_free(transport->recv_event);
|
|
if (transport->tls)
|
|
tls_free(transport->tls);
|
|
tcp_free(transport->tcp);
|
|
xfree(transport);
|
|
}
|
|
}
|