21#include <freerdp/config.h>
30#include <winpr/platform.h>
31#include <winpr/winsock.h>
41#include <sys/socket.h>
42#include <netinet/in.h>
43#include <netinet/tcp.h>
48#ifdef WINPR_HAVE_POLL_H
52#include <sys/select.h>
55#if defined(__FreeBSD__) || defined(__OpenBSD__)
57#define SOL_TCP IPPROTO_TCP
63#define SOL_TCP IPPROTO_TCP
66#define TCP_KEEPIDLE TCP_KEEPALIVE
72#include <winpr/windows.h>
76#define SHUT_RDWR SD_BOTH
77#define close(_fd) closesocket(_fd)
81#include <freerdp/log.h>
83#include <winpr/stream.h>
86#include "../crypto/opensslcompat.h"
88#if defined(HAVE_AF_VSOCK_H)
90#include <linux/vm_sockets.h>
93#define TAG FREERDP_TAG("core")
101} WINPR_BIO_SIMPLE_SOCKET;
103static int transport_bio_simple_init(BIO* bio, SOCKET socket,
int shutdown);
104static int transport_bio_simple_uninit(BIO* bio);
106static int transport_bio_simple_write(BIO* bio,
const char* buf,
int size)
110 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
115 BIO_clear_flags(bio, BIO_FLAGS_WRITE);
116 status = _send(ptr->socket, buf, size, 0);
120 error = WSAGetLastError();
122 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
123 (error == WSAEALREADY))
125 BIO_set_flags(bio, (BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY));
129 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
136static int transport_bio_simple_read(BIO* bio,
char* buf,
int size)
140 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
145 BIO_clear_flags(bio, BIO_FLAGS_READ);
146 (void)WSAResetEvent(ptr->hEvent);
147 status = _recv(ptr->socket, buf, size, 0);
156 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
160 error = WSAGetLastError();
162 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
163 (error == WSAEALREADY))
165 BIO_set_flags(bio, (BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY));
169 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
175static int transport_bio_simple_puts(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
const char* str)
180static int transport_bio_simple_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
181 WINPR_ATTR_UNUSED
int size)
186static long transport_bio_simple_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
189 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
193 case BIO_C_SET_SOCKET:
194 transport_bio_simple_uninit(bio);
195 transport_bio_simple_init(bio, (SOCKET)arg2, (
int)arg1);
197 case BIO_C_GET_SOCKET:
198 if (!BIO_get_init(bio) || !arg2)
201 *((SOCKET*)arg2) = ptr->socket;
203 case BIO_C_GET_EVENT:
204 if (!BIO_get_init(bio) || !arg2)
207 *((HANDLE*)arg2) = ptr->hEvent;
209 case BIO_C_SET_NONBLOCK:
213 flags = fcntl((
int)ptr->socket, F_GETFL);
219 (void)fcntl((
int)ptr->socket, F_SETFL, flags | O_NONBLOCK);
221 (
void)fcntl((
int)ptr->socket, F_SETFL, flags & ~(O_NONBLOCK));
228 case BIO_C_WAIT_READ:
230 int timeout = (int)arg1;
231 int sockfd = (int)ptr->socket;
232#ifdef WINPR_HAVE_POLL_H
233 struct pollfd pollset;
235 pollset.events = POLLIN;
240 status = poll(&pollset, 1, timeout);
241 }
while ((status < 0) && (errno == EINTR));
245 struct timeval tv = { 0 };
247 FD_SET(sockfd, &rset);
251 tv.tv_sec = timeout / 1000;
252 tv.tv_usec = (timeout % 1000) * 1000;
257 status = select(sockfd + 1, &rset, NULL, NULL, timeout ? &tv : NULL);
258 }
while ((status < 0) && (errno == EINTR));
267 case BIO_C_WAIT_WRITE:
269 int timeout = (int)arg1;
270 int sockfd = (int)ptr->socket;
271#ifdef WINPR_HAVE_POLL_H
272 struct pollfd pollset;
274 pollset.events = POLLOUT;
279 status = poll(&pollset, 1, timeout);
280 }
while ((status < 0) && (errno == EINTR));
284 struct timeval tv = { 0 };
286 FD_SET(sockfd, &rset);
290 tv.tv_sec = timeout / 1000;
291 tv.tv_usec = (timeout % 1000) * 1000;
296 status = select(sockfd + 1, NULL, &rset, NULL, timeout ? &tv : NULL);
297 }
while ((status < 0) && (errno == EINTR));
309 transport_bio_simple_uninit(bio);
310 transport_bio_simple_init(bio, (SOCKET) * ((
int*)arg2), (
int)arg1);
317 if (BIO_get_init(bio))
320 *((
int*)arg2) = (int)ptr->socket;
322 status = (int)ptr->socket;
327 case BIO_CTRL_GET_CLOSE:
328 status = BIO_get_shutdown(bio);
331 case BIO_CTRL_SET_CLOSE:
332 BIO_set_shutdown(bio, (
int)arg1);
349static int transport_bio_simple_init(BIO* bio, SOCKET socket,
int shutdown)
351 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
352 ptr->socket = socket;
353 BIO_set_shutdown(bio, shutdown);
354 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
355 BIO_set_init(bio, 1);
356 ptr->hEvent = WSACreateEvent();
362 if (WSAEventSelect(ptr->socket, ptr->hEvent, FD_READ | FD_ACCEPT | FD_CLOSE))
364 WLog_ERR(TAG,
"WSAEventSelect returned 0x%08X", WSAGetLastError());
371static int transport_bio_simple_uninit(BIO* bio)
373 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
375 if (BIO_get_shutdown(bio))
377 if (BIO_get_init(bio) && ptr)
379 _shutdown(ptr->socket, SD_BOTH);
380 closesocket(ptr->socket);
385 if (ptr && ptr->hEvent)
387 (void)CloseHandle(ptr->hEvent);
391 BIO_set_init(bio, 0);
392 BIO_set_flags(bio, 0);
396static int transport_bio_simple_new(BIO* bio)
398 WINPR_BIO_SIMPLE_SOCKET* ptr = NULL;
399 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
400 ptr = (WINPR_BIO_SIMPLE_SOCKET*)calloc(1,
sizeof(WINPR_BIO_SIMPLE_SOCKET));
405 BIO_set_data(bio, ptr);
409static int transport_bio_simple_free(BIO* bio)
411 WINPR_BIO_SIMPLE_SOCKET* ptr = NULL;
416 transport_bio_simple_uninit(bio);
417 ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
421 BIO_set_data(bio, NULL);
428BIO_METHOD* BIO_s_simple_socket(
void)
430 static BIO_METHOD* bio_methods = NULL;
432 if (bio_methods == NULL)
434 if (!(bio_methods = BIO_meth_new(BIO_TYPE_SIMPLE,
"SimpleSocket")))
437 BIO_meth_set_write(bio_methods, transport_bio_simple_write);
438 BIO_meth_set_read(bio_methods, transport_bio_simple_read);
439 BIO_meth_set_puts(bio_methods, transport_bio_simple_puts);
440 BIO_meth_set_gets(bio_methods, transport_bio_simple_gets);
441 BIO_meth_set_ctrl(bio_methods, transport_bio_simple_ctrl);
442 BIO_meth_set_create(bio_methods, transport_bio_simple_new);
443 BIO_meth_set_destroy(bio_methods, transport_bio_simple_free);
457} WINPR_BIO_BUFFERED_SOCKET;
459static int transport_bio_buffered_write(BIO* bio,
const char* buf,
int num)
463 size_t committedBytes = 0;
465 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
466 BIO* next_bio = NULL;
473 ptr->writeBlocked = FALSE;
474 BIO_clear_flags(bio, BIO_FLAGS_WRITE);
479 if (buf && (num > 0) && !ringbuffer_write(&ptr->xmitBuffer, (
const BYTE*)buf, (
size_t)num))
481 WLog_ERR(TAG,
"an error occurred when writing (num: %d)", num);
485 nchunks = ringbuffer_peek(&ptr->xmitBuffer, chunks, ringbuffer_used(&ptr->xmitBuffer));
486 next_bio = BIO_next(bio);
488 for (
int i = 0; i < nchunks; i++)
490 while (chunks[i].size)
494 const size_t wr = MIN(INT32_MAX, chunks[i].size);
495 const int status = BIO_write(next_bio, chunks[i].data, (
int)wr);
499 if (!BIO_should_retry(next_bio))
501 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
506 if (BIO_should_write(next_bio))
508 BIO_set_flags(bio, BIO_FLAGS_WRITE);
509 ptr->writeBlocked = TRUE;
515 committedBytes += (size_t)status;
516 chunks[i].size -= (size_t)status;
517 chunks[i].data += status;
523 ringbuffer_commit_read_bytes(&ptr->xmitBuffer, committedBytes);
527static int transport_bio_buffered_read(BIO* bio,
char* buf,
int size)
530 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
531 BIO* next_bio = BIO_next(bio);
532 ptr->readBlocked = FALSE;
533 BIO_clear_flags(bio, BIO_FLAGS_READ);
535 status = BIO_read(next_bio, buf, size);
539 if (!BIO_should_retry(next_bio))
541 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
545 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
547 if (BIO_should_read(next_bio))
549 BIO_set_flags(bio, BIO_FLAGS_READ);
550 ptr->readBlocked = TRUE;
559static int transport_bio_buffered_puts(WINPR_ATTR_UNUSED BIO* bio,
560 WINPR_ATTR_UNUSED
const char* str)
565static int transport_bio_buffered_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
566 WINPR_ATTR_UNUSED
int size)
571static long transport_bio_buffered_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
574 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
579 if (!ringbuffer_used(&ptr->xmitBuffer))
582 status = (transport_bio_buffered_write(bio, NULL, 0) >= 0) ? 1 : -1;
586 case BIO_CTRL_WPENDING:
587 status = WINPR_ASSERTING_INT_CAST(
long, ringbuffer_used(&ptr->xmitBuffer));
590 case BIO_CTRL_PENDING:
594 case BIO_C_READ_BLOCKED:
595 status = (int)ptr->readBlocked;
598 case BIO_C_WRITE_BLOCKED:
599 status = (int)ptr->writeBlocked;
603 status = BIO_ctrl(BIO_next(bio), cmd, arg1, arg2);
610static int transport_bio_buffered_new(BIO* bio)
612 WINPR_BIO_BUFFERED_SOCKET* ptr = NULL;
613 BIO_set_init(bio, 1);
614 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
615 ptr = (WINPR_BIO_BUFFERED_SOCKET*)calloc(1,
sizeof(WINPR_BIO_BUFFERED_SOCKET));
620 BIO_set_data(bio, (
void*)ptr);
622 if (!ringbuffer_init(&ptr->xmitBuffer, 0x10000))
631static int transport_bio_buffered_free(BIO* bio)
633 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
638 ringbuffer_destroy(&ptr->xmitBuffer);
643BIO_METHOD* BIO_s_buffered_socket(
void)
645 static BIO_METHOD* bio_methods = NULL;
647 if (bio_methods == NULL)
649 if (!(bio_methods = BIO_meth_new(BIO_TYPE_BUFFERED,
"BufferedSocket")))
652 BIO_meth_set_write(bio_methods, transport_bio_buffered_write);
653 BIO_meth_set_read(bio_methods, transport_bio_buffered_read);
654 BIO_meth_set_puts(bio_methods, transport_bio_buffered_puts);
655 BIO_meth_set_gets(bio_methods, transport_bio_buffered_gets);
656 BIO_meth_set_ctrl(bio_methods, transport_bio_buffered_ctrl);
657 BIO_meth_set_create(bio_methods, transport_bio_buffered_new);
658 BIO_meth_set_destroy(bio_methods, transport_bio_buffered_free);
664char* freerdp_tcp_address_to_string(
const struct sockaddr_storage* addr, BOOL* pIPv6)
666 char ipAddress[INET6_ADDRSTRLEN + 1] = { 0 };
667 const struct sockaddr_in6* sockaddr_ipv6 = (
const struct sockaddr_in6*)addr;
668 const struct sockaddr_in* sockaddr_ipv4 = (
const struct sockaddr_in*)addr;
675 switch (sockaddr_ipv4->sin_family)
678 if (!inet_ntop(sockaddr_ipv4->sin_family, &sockaddr_ipv4->sin_addr, ipAddress,
685 if (!inet_ntop(sockaddr_ipv6->sin6_family, &sockaddr_ipv6->sin6_addr, ipAddress,
692 (void)sprintf_s(ipAddress, ARRAYSIZE(ipAddress),
"127.0.0.1");
701 *pIPv6 = (sockaddr_ipv4->sin_family == AF_INET6);
704 return _strdup(ipAddress);
707static bool freerdp_tcp_get_ip_address(rdpSettings* settings,
int sockfd)
709 WINPR_ASSERT(settings);
711 struct sockaddr_storage saddr = { 0 };
712 socklen_t length =
sizeof(
struct sockaddr_storage);
718 if (getsockname(sockfd, (
struct sockaddr*)&saddr, &length) != 0)
720 settings->ClientAddress = freerdp_tcp_address_to_string(&saddr, &settings->IPv6Enabled);
721 return settings->ClientAddress != NULL;
724char* freerdp_tcp_get_peer_address(SOCKET sockfd)
726 struct sockaddr_storage saddr = { 0 };
727 socklen_t length =
sizeof(
struct sockaddr_storage);
729 if (getpeername((
int)sockfd, (
struct sockaddr*)&saddr, &length) != 0)
734 return freerdp_tcp_address_to_string(&saddr, NULL);
737static int freerdp_uds_connect(
const char* path)
742 struct sockaddr_un addr = { 0 };
743 sockfd = socket(AF_UNIX, SOCK_STREAM, 0);
747 WLog_ERR(TAG,
"socket");
751 addr.sun_family = AF_UNIX;
752 strncpy(addr.sun_path, path,
sizeof(addr.sun_path) - 1);
753 status = connect(sockfd, (
struct sockaddr*)&addr,
sizeof(addr));
757 WLog_ERR(TAG,
"connect");
768struct addrinfo* freerdp_tcp_resolve_host(
const char* hostname,
int port,
int ai_flags)
770 char* service = NULL;
773 struct addrinfo hints = { 0 };
774 struct addrinfo* result = NULL;
775 hints.ai_family = AF_UNSPEC;
776 hints.ai_socktype = SOCK_STREAM;
777 hints.ai_flags = ai_flags;
781 (void)sprintf_s(port_str,
sizeof(port_str) - 1,
"%d", port);
785 status = getaddrinfo(hostname, service, &hints, &result);
793static BOOL freerdp_tcp_is_hostname_resolvable(rdpContext* context,
const char* hostname)
795 struct addrinfo* result = freerdp_tcp_resolve_host(hostname, -1, 0);
799 freerdp_set_last_error_if_not(context, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
804 freerdp_set_last_error_log(context, 0);
805 freeaddrinfo(result);
809static BOOL freerdp_tcp_connect_timeout(rdpContext* context,
int sockfd,
struct sockaddr* addr,
810 socklen_t addrlen, UINT32 timeout)
813 HANDLE handles[2] = { 0 };
816 DWORD tout = (timeout > 0) ? timeout : INFINITE;
818 handles[count] = CreateEvent(NULL, TRUE, FALSE, NULL);
823 const int wsastatus = WSAEventSelect((SOCKET)sockfd, handles[count++],
824 FD_READ | FD_WRITE | FD_CONNECT | FD_CLOSE);
828 WLog_ERR(TAG,
"WSAEventSelect failed with %d", WSAGetLastError());
832 handles[count++] = utils_get_abort_event(context->rdp);
835 const int constatus =
836 _connect((SOCKET)sockfd, addr, WINPR_ASSERTING_INT_CAST(
int, addrlen));
839 const int estatus = WSAGetLastError();
854 const DWORD wstatus = WaitForMultipleObjects(count, handles, FALSE, tout);
855 if (WAIT_OBJECT_0 != wstatus)
861 socklen_t optlen =
sizeof(optval);
862 if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &optval, &optlen) < 0)
867 char ebuffer[256] = { 0 };
868 WLog_DBG(TAG,
"connect failed with error: %s [%" PRIu32
"]",
869 winpr_strerror(optval, ebuffer,
sizeof(ebuffer)), optval);
875 const int status = WSAEventSelect((SOCKET)sockfd, handles[0], 0);
878 WLog_ERR(TAG,
"WSAEventSelect failed with %d", WSAGetLastError());
883 if (_ioctlsocket((SOCKET)sockfd, FIONBIO, &arg) != 0)
888 (void)CloseHandle(handles[0]);
895 struct addrinfo* addr;
896 struct addrinfo* result;
899static void peer_free(t_peer* peer)
901 if (peer->s != INVALID_SOCKET)
902 closesocket(peer->s);
904 freeaddrinfo(peer->addr);
905 memset(peer, 0,
sizeof(t_peer));
906 peer->s = INVALID_SOCKET;
909static int freerdp_tcp_connect_multi(rdpContext* context,
char** hostnames,
const UINT32* ports,
910 UINT32 count, UINT16 port, WINPR_ATTR_UNUSED UINT32 timeout)
912 UINT32 sindex = count;
913 SOCKET sockfd = INVALID_SOCKET;
914 struct addrinfo* addr = NULL;
915 struct addrinfo* result = NULL;
917 HANDLE* events = (HANDLE*)calloc(count + 1,
sizeof(HANDLE));
918 t_peer* peers = (t_peer*)calloc(count,
sizeof(t_peer));
920 if (!peers || !events || (count < 1))
927 for (UINT32 index = 0; index < count; index++)
932 curPort = WINPR_ASSERTING_INT_CAST(
int, ports[index]);
934 result = freerdp_tcp_resolve_host(hostnames[index], curPort, 0);
941 if ((addr->ai_family == AF_INET6) && (addr->ai_next != 0))
943 while ((addr = addr->ai_next))
945 if (addr->ai_family == AF_INET)
953 peers[index].s = _socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
955 if (peers[index].s == INVALID_SOCKET)
957 freeaddrinfo(result);
961 peers[index].addr = addr;
962 peers[index].result = result;
965 for (UINT32 index = 0; index < count; index++)
967 sockfd = peers[index].s;
968 addr = peers[index].addr;
970 if ((sockfd == INVALID_SOCKET) || (!addr))
975 _connect(sockfd, addr->ai_addr, WINPR_ASSERTING_INT_CAST(
int, addr->ai_addrlen));
987 sockfd = peers[sindex].s;
988 peers[sindex].s = INVALID_SOCKET;
991 freerdp_set_last_error_log(context, FREERDP_ERROR_CONNECT_CANCELLED);
993 for (UINT32 index = 0; index < count; index++)
994 peer_free(&peers[index]);
1001BOOL freerdp_tcp_set_keep_alive_mode(
const rdpSettings* settings,
int sockfd)
1005 socklen_t optlen = 0;
1006 optval = keepalive ? 1 : 0;
1007 optlen =
sizeof(optval);
1009 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, (
void*)&optval, optlen) < 0)
1011 WLog_WARN(TAG,
"setsockopt() SOL_SOCKET, SO_KEEPALIVE");
1017 optlen =
sizeof(optval);
1019 if (setsockopt(sockfd, IPPROTO_TCP, TCP_KEEPIDLE, (
void*)&optval, optlen) < 0)
1021 WLog_WARN(TAG,
"setsockopt() IPPROTO_TCP, TCP_KEEPIDLE");
1031 optlen =
sizeof(optval);
1033 if (setsockopt(sockfd, SOL_TCP, TCP_KEEPCNT, (
void*)&optval, optlen) < 0)
1035 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_KEEPCNT");
1041 optlen =
sizeof(optval);
1043 if (setsockopt(sockfd, SOL_TCP, TCP_KEEPINTVL, (
void*)&optval, optlen) < 0)
1045 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_KEEPINTVL");
1050#if defined(__MACOSX__) || defined(__IOS__)
1052 optlen =
sizeof(optval);
1054 if (setsockopt(sockfd, SOL_SOCKET, SO_NOSIGPIPE, (
void*)&optval, optlen) < 0)
1056 WLog_WARN(TAG,
"setsockopt() SOL_SOCKET, SO_NOSIGPIPE");
1060#ifdef TCP_USER_TIMEOUT
1062 optlen =
sizeof(optval);
1064 if (setsockopt(sockfd, SOL_TCP, TCP_USER_TIMEOUT, (
void*)&optval, optlen) < 0)
1066 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_USER_TIMEOUT");
1073int freerdp_tcp_connect(rdpContext* context,
const char* hostname,
int port, DWORD timeout)
1075 rdpTransport* transport = NULL;
1076 if (!context || !context->rdp)
1078 transport = context->rdp->transport;
1081 return transport_tcp_connect(context->rdp->transport, hostname, port, timeout);
1084static struct addrinfo* reorder_addrinfo_by_preference(rdpContext* context,
struct addrinfo* addr)
1086 WINPR_ASSERT(context);
1089 const BOOL preferIPv6 =
1094 struct addrinfo* ipv6Head = NULL;
1095 struct addrinfo* ipv6Tail = NULL;
1096 struct addrinfo* otherHead = NULL;
1097 struct addrinfo* otherTail = NULL;
1102 struct addrinfo* next = addr->ai_next;
1103 addr->ai_next = NULL;
1105 if (addr->ai_family == AF_INET6)
1110 ipv6Tail->ai_next = addr;
1118 otherTail->ai_next = addr;
1126 ipv6Tail->ai_next = otherHead;
1128 return ipv6Head ? ipv6Head : otherHead;
1131static int get_next_addrinfo(rdpContext* context,
struct addrinfo* input,
struct addrinfo** result,
1134 WINPR_ASSERT(context);
1135 WINPR_ASSERT(result);
1137 struct addrinfo* addr = input;
1149 const int family = (IPvX == 4) ? AF_INET : AF_INET6;
1150 while (addr && (addr->ai_family != family))
1151 addr = addr->ai_next;
1166 freerdp_set_last_error_if_not(context, errorCode);
1171static int freerdp_vsock_connect(rdpContext* context,
const char* hostname,
int port)
1173#if defined(HAVE_AF_VSOCK_H)
1174 int sockfd = socket(AF_VSOCK, SOCK_STREAM, 0);
1177 char buffer[256] = { 0 };
1178 WLog_WARN(TAG,
"socket(AF_VSOCK, SOCK_STREAM, 0) failed with %s [%d]",
1179 winpr_strerror(errno, buffer,
sizeof(buffer)));
1180 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1184 struct sockaddr_vm addr = { 0 };
1186 addr.svm_family = AF_VSOCK;
1187 addr.svm_port = WINPR_ASSERTING_INT_CAST(typeof(addr.svm_port), port);
1191 unsigned long val = strtoul(hostname, &ptr, 10);
1192 if (errno || (val > UINT32_MAX))
1194 char ebuffer[256] = { 0 };
1195 WLog_ERR(TAG,
"could not extract port from '%s', value=%ul, error=%s", hostname, val,
1196 winpr_strerror(errno, ebuffer,
sizeof(ebuffer)));
1200 addr.svm_cid = WINPR_ASSERTING_INT_CAST(typeof(addr.svm_cid), val);
1201 if (addr.svm_cid == 2)
1203 addr.svm_flags = VMADDR_FLAG_TO_HOST;
1205 if ((connect(sockfd, (
struct sockaddr*)&addr,
sizeof(
struct sockaddr_vm))) == -1)
1207 WLog_ERR(TAG,
"failed to connect to %s", hostname);
1213 WLog_ERR(TAG,
"Compiled without AF_VSOCK, '%s' not supported", hostname);
1218static void log_connection_address(
const char* hostname,
struct addrinfo* addr)
1223 freerdp_tcp_address_to_string((
const struct sockaddr_storage*)addr->ai_addr, NULL);
1225 WLog_DBG(TAG,
"resolved %s: try to connect to %s", hostname, peerAddress);
1229static int freerdp_host_connect(rdpContext* context,
const char* hostname,
int port, DWORD timeout)
1232 struct addrinfo* addr = NULL;
1233 struct addrinfo* result = freerdp_tcp_resolve_host(hostname, port, 0);
1237 freerdp_set_last_error_if_not(context, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
1240 freerdp_set_last_error_log(context, 0);
1246 result = reorder_addrinfo_by_preference(context, result);
1248 const int rc = get_next_addrinfo(context, result, &addr, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
1254 sockfd = socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
1257 log_connection_address(hostname, addr);
1259 if (!freerdp_tcp_connect_timeout(context, sockfd, addr->ai_addr, addr->ai_addrlen,
1270 get_next_addrinfo(context, addr->ai_next, &addr, FREERDP_ERROR_CONNECT_FAILED);
1274 }
while (sockfd < 0);
1277 freeaddrinfo(result);
1281int freerdp_tcp_default_connect(rdpContext* context, rdpSettings* settings,
const char* hostname,
1282 int port, DWORD timeout)
1285 BOOL ipcSocket = FALSE;
1286 BOOL useExternalDefinedSocket = FALSE;
1290 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1295 if (hostname[0] ==
'/')
1298 if (hostname[0] ==
'|')
1299 useExternalDefinedSocket = TRUE;
1301 const char* vsock = utils_is_vsock(hostname);
1304 sockfd = freerdp_uds_connect(hostname);
1308 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1312 else if (useExternalDefinedSocket)
1315 sockfd = freerdp_vsock_connect(context, vsock, port);
1318 if (!settings->GatewayEnabled)
1320 if (!freerdp_tcp_is_hostname_resolvable(context, hostname) ||
1321 settings->RemoteAssistanceMode)
1323 if (settings->TargetNetAddressCount > 0)
1325 WINPR_ASSERT(port <= UINT16_MAX);
1326 sockfd = freerdp_tcp_connect_multi(
1327 context, settings->TargetNetAddresses, settings->TargetNetPorts,
1328 settings->TargetNetAddressCount, (UINT16)port, timeout);
1334 sockfd = freerdp_host_connect(context, hostname, port, timeout);
1339 if (!freerdp_tcp_get_ip_address(settings, sockfd))
1341 if (!useExternalDefinedSocket)
1344 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1346 WLog_ERR(TAG,
"Couldn't get socket ip address");
1351 if (!ipcSocket && !useExternalDefinedSocket)
1353 (void)freerdp_tcp_set_nodelay(WLog_Get(TAG), WLOG_ERROR, sockfd);
1358 socklen_t optlen =
sizeof(optval);
1359 if (getsockopt(sockfd, SOL_SOCKET, SO_RCVBUF, (
void*)&optval, &optlen) == 0)
1361 if (optval < (1024 * 32))
1364 optlen =
sizeof(optval);
1366 if (setsockopt(sockfd, SOL_SOCKET, SO_RCVBUF, (
void*)&optval, optlen) < 0)
1370 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1372 WLog_ERR(TAG,
"unable to set receive buffer len");
1378 if (!ipcSocket && !useExternalDefinedSocket)
1380 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
1384 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1386 WLog_ERR(TAG,
"Couldn't set keep alive mode.");
1391 if (WaitForSingleObject(utils_get_abort_event(context->rdp), 0) == WAIT_OBJECT_0)
1405typedef struct rdp_tcp_layer rdpTcpLayer;
1407static int freerdp_tcp_layer_read(
void* userContext,
void* data,
int bytes)
1411 if (!data || !bytes)
1414 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1416 (void)WSAResetEvent(tcpLayer->hEvent);
1417 const int status = _recv((SOCKET)tcpLayer->sockfd, data, bytes, 0);
1422 const int error = WSAGetLastError();
1424 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
1425 (error == WSAEALREADY))
1431static int freerdp_tcp_layer_write(
void* userContext,
const void* data,
int bytes)
1435 if (!data || !bytes)
1438 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1440 const int status = _send((SOCKET)tcpLayer->sockfd, data, bytes, 0);
1444 const int error = WSAGetLastError();
1446 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
1447 (error == WSAEALREADY))
1453static BOOL freerdp_tcp_layer_close(
void* userContext)
1458 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1460 if (tcpLayer->sockfd >= 0)
1461 closesocket((SOCKET)tcpLayer->sockfd);
1462 if (tcpLayer->hEvent)
1463 (void)CloseHandle(tcpLayer->hEvent);
1468static BOOL freerdp_tcp_layer_wait(
void* userContext, BOOL waitWrite, DWORD timeout)
1473 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1476 int sockfd = tcpLayer->sockfd;
1477#ifdef WINPR_HAVE_POLL_H
1478 struct pollfd pollset = { 0 };
1479 pollset.fd = sockfd;
1480 pollset.events = waitWrite ? POLLOUT : POLLIN;
1484 status = poll(&pollset, 1, (
int)timeout);
1485 }
while ((status < 0) && (errno == EINTR));
1488 fd_set rset = { 0 };
1489 struct timeval tv = { 0 };
1491 FD_SET(sockfd, &rset);
1495 tv.tv_sec = timeout / 1000;
1496 tv.tv_usec = (timeout % 1000) * 1000;
1502 status = select(sockfd + 1, NULL, &rset, NULL, timeout ? &tv : NULL);
1504 status = select(sockfd + 1, &rset, NULL, NULL, timeout ? &tv : NULL);
1505 }
while ((status < 0) && (errno == EINTR));
1512static HANDLE freerdp_tcp_layer_get_event(
void* userContext)
1517 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1519 return tcpLayer->hEvent;
1522rdpTransportLayer* freerdp_tcp_connect_layer(rdpContext* context,
const char* hostname,
int port,
1525 WINPR_ASSERT(context);
1527 const rdpSettings* settings = context->settings;
1528 WINPR_ASSERT(settings);
1531 rdpTcpLayer* tcpLayer = NULL;
1533 int sockfd = freerdp_tcp_connect(context, hostname, port, timeout);
1536 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
1539 layer = transport_layer_new(freerdp_get_transport(context),
sizeof(rdpTcpLayer));
1543 layer->Read = freerdp_tcp_layer_read;
1544 layer->Write = freerdp_tcp_layer_write;
1545 layer->Close = freerdp_tcp_layer_close;
1546 layer->Wait = freerdp_tcp_layer_wait;
1547 layer->GetEvent = freerdp_tcp_layer_get_event;
1549 tcpLayer = (rdpTcpLayer*)layer->userContext;
1550 WINPR_ASSERT(tcpLayer);
1552 tcpLayer->sockfd = -1;
1553 tcpLayer->hEvent = WSACreateEvent();
1554 if (!tcpLayer->hEvent)
1558 if (WSAEventSelect((SOCKET)sockfd, tcpLayer->hEvent, FD_READ | FD_ACCEPT | FD_CLOSE))
1560 WLog_ERR(TAG,
"WSAEventSelect returned 0x%08X", WSAGetLastError());
1564 tcpLayer->sockfd = sockfd;
1570 closesocket((SOCKET)sockfd);
1571 transport_layer_free(layer);
1575BOOL freerdp_tcp_set_nodelay(wLog* log, DWORD level,
int sockfd)
1580 socklen_t typelen =
sizeof(type);
1581 char* ptype = (
char*)&type;
1582 const int rc = getsockopt(sockfd, SOL_SOCKET, SO_TYPE, ptype, &typelen);
1585 char buffer[128] = { 0 };
1586 WLog_Print(log, level,
"can't get SOL_SOCKET|SO_TYPE (%s)",
1587 winpr_strerror(errno, buffer,
sizeof(buffer)));
1590 else if (type == SOCK_STREAM)
1592 int option_value = -1;
1593 const socklen_t option_len =
sizeof(option_value);
1595 setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (
void*)&option_value, option_len);
1600 char buffer[128] = { 0 };
1601 WLog_Print(log, level,
"can't set TCP_NODELAY (%s)",
1602 winpr_strerror(errno, buffer,
sizeof(buffer)));
1608 WLog_Print(log, level,
"Socket SOL_SOCKET|SO_TYPE %d unsupported", type);
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_set_string(rdpSettings *settings, FreeRDP_Settings_Keys_String id, const char *param)
Sets a string settings value. The param is copied.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
a piece of data in the ring buffer, exactly like a glibc iovec