20#include <freerdp/config.h>
24#include <winpr/assert.h>
27#include <winpr/synch.h>
28#include <winpr/print.h>
29#include <winpr/stream.h>
30#include <winpr/winsock.h>
31#include <winpr/crypto.h>
33#include <freerdp/log.h>
34#include <freerdp/error.h>
35#include <freerdp/utils/ringbuffer.h>
37#include <openssl/bio.h>
44#include <sys/socket.h>
47#ifdef FREERDP_HAVE_VALGRIND_MEMCHECK_H
48#include <valgrind/memcheck.h>
58#include "childsession.h"
60#include "gateway/rdg.h"
61#include "gateway/wst.h"
62#include "gateway/arm.h"
64#define TAG FREERDP_TAG("core.transport")
66#define BUFFER_SIZE 16384
70 TRANSPORT_LAYER layer;
80 TransportRecv ReceiveCallback;
81 wStreamPool* ReceivePool;
82 HANDLE connectedEvent;
94 BOOL haveMoreBytesToRead;
105 void* userContextShadowPtr;
106} rdpTransportLayerInt;
108static const char* where2str(
int where,
char* ibuffer,
size_t ilen)
110 if (!ibuffer || (ilen < 2))
114 size_t len = ilen - 1;
115 char* buffer = &ibuffer[1];
116 if (where & SSL_CB_ALERT)
117 winpr_str_append(
"SSL_CB_ALERT", buffer, len,
"|");
118 if (where & SSL_ST_ACCEPT)
119 winpr_str_append(
"SSL_ST_ACCEPT", buffer, len,
"|");
120 if (where & SSL_ST_CONNECT)
121 winpr_str_append(
"SSL_ST_CONNECT", buffer, len,
"|");
122 if (where & SSL_CB_HANDSHAKE_DONE)
123 winpr_str_append(
"SSL_CB_HANDSHAKE_DONE", buffer, len,
"|");
124 if (where & SSL_CB_HANDSHAKE_START)
125 winpr_str_append(
"SSL_CB_HANDSHAKE_START", buffer, len,
"|");
126 if (where & SSL_CB_WRITE)
127 winpr_str_append(
"SSL_CB_WRITE", buffer, len,
"|");
128 if (where & SSL_CB_READ)
129 winpr_str_append(
"SSL_CB_READ", buffer, len,
"|");
130 if (where & SSL_CB_EXIT)
131 winpr_str_append(
"SSL_CB_EXIT", buffer, len,
"|");
132 if (where & SSL_CB_LOOP)
133 winpr_str_append(
"SSL_CB_LOOP", buffer, len,
"|");
135 char nr[32] = WINPR_C_ARRAY_INIT;
136 (void)_snprintf(nr,
sizeof(nr),
"]{0x%08" PRIx32
"}", (unsigned)where);
137 winpr_str_append(nr, buffer, len,
"");
141static void transport_ssl_cb(
const SSL* ssl,
int where,
int ret)
143 if (where & SSL_CB_ALERT)
145 char buffer[128] = WINPR_C_ARRAY_INIT;
146 rdpTransport* transport = (rdpTransport*)SSL_get_app_data(ssl);
147 WINPR_ASSERT(transport);
151 case (SSL3_AL_FATAL << 8) | SSL_AD_ACCESS_DENIED:
153 if (!freerdp_get_last_error(transport_get_context(transport)))
155 WLog_Print(transport->log, WLOG_ERROR,
"where=%s ACCESS DENIED",
156 where2str(where, buffer,
sizeof(buffer)));
157 freerdp_set_last_error_log(transport_get_context(transport),
158 FREERDP_ERROR_AUTHENTICATION_FAILED);
163 case (SSL3_AL_FATAL << 8) | SSL_AD_INTERNAL_ERROR:
165 WLog_Print(transport->log, WLOG_WARN,
"SSL error (where=%s, ret=%d [%s, %s])",
166 where2str(where, buffer,
sizeof(buffer)), ret,
167 SSL_alert_type_string_long(ret), SSL_alert_desc_string_long(ret));
169 if (transport->NlaMode)
171 if (!freerdp_get_last_error(transport_get_context(transport)))
175 kret = nla_get_error(transport->nla);
177 kret = FREERDP_ERROR_CONNECT_PASSWORD_CERTAINLY_EXPIRED;
178 freerdp_set_last_error_log(transport_get_context(transport), kret);
184 case (SSL3_AL_WARNING << 8) | SSL3_AD_CLOSE_NOTIFY:
185 WLog_Print(transport->log, WLOG_DEBUG,
"SSL warning (where=%s, ret=%d [%s, %s])",
186 where2str(where, buffer,
sizeof(buffer)), ret,
187 SSL_alert_type_string_long(ret), SSL_alert_desc_string_long(ret));
191 WLog_Print(transport->log, WLOG_WARN,
192 "Unhandled SSL error (where=%s, ret=%d [%s, %s])",
193 where2str(where, buffer,
sizeof(buffer)), ret,
194 SSL_alert_type_string_long(ret), SSL_alert_desc_string_long(ret));
200wStream* transport_send_stream_init(WINPR_ATTR_UNUSED rdpTransport* transport,
size_t size)
202 WINPR_ASSERT(transport);
204 return Stream_New(
nullptr, size);
207BOOL transport_attach(rdpTransport* transport,
int sockfd)
211 return IFCALLRESULT(FALSE, transport->io.TransportAttach, transport, sockfd);
214static BOOL transport_default_attach(rdpTransport* transport,
int sockfd)
216 BIO* socketBio =
nullptr;
217 BIO* bufferedBio =
nullptr;
218 const rdpSettings* settings =
nullptr;
219 rdpContext* context = transport_get_context(transport);
223 WLog_WARN(TAG,
"Running peer without socket (sockfd=%d)", sockfd);
227 settings = context->settings;
228 WINPR_ASSERT(settings);
232 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
235 socketBio = BIO_new(BIO_s_simple_socket());
241 bufferedBio = BIO_new(BIO_s_buffered_socket());
247 bufferedBio = BIO_push(bufferedBio, socketBio);
256 BIO_set_fd(socketBio, sockfd, BIO_CLOSE);
258 EnterCriticalSection(&(transport->ReadLock));
259 EnterCriticalSection(&(transport->WriteLock));
260 transport->frontBio = bufferedBio;
261 LeaveCriticalSection(&(transport->WriteLock));
262 LeaveCriticalSection(&(transport->ReadLock));
268 BIO_free_all(socketBio);
270 closesocket((SOCKET)sockfd);
275BOOL transport_connect_rdp(rdpTransport* transport)
280 switch (utils_authenticate(transport_get_context(transport)->instance, AUTH_RDP, FALSE))
284 case AUTH_NO_CREDENTIALS:
287 freerdp_set_last_error_if_not(transport_get_context(transport),
288 FREERDP_ERROR_CONNECT_CANCELLED);
295BOOL transport_connect_tls(rdpTransport* transport)
297 const rdpSettings* settings =
nullptr;
298 rdpContext* context = transport_get_context(transport);
300 settings = context->settings;
301 WINPR_ASSERT(settings);
304 if (settings->SelectedProtocol == PROTOCOL_SSL)
306 switch (utils_authenticate(context->instance, AUTH_TLS, FALSE))
310 case AUTH_NO_CREDENTIALS:
313 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_CANCELLED);
320 return IFCALLRESULT(FALSE, transport->io.TLSConnect, transport);
323static BOOL transport_default_connect_tls(rdpTransport* transport)
326 rdpTls* tls =
nullptr;
327 rdpContext* context =
nullptr;
328 rdpSettings* settings =
nullptr;
330 WINPR_ASSERT(transport);
332 context = transport_get_context(transport);
333 WINPR_ASSERT(context);
335 settings = context->settings;
336 WINPR_ASSERT(settings);
338 if (!(tls = freerdp_tls_new(context)))
341 transport->tls = tls;
343 if (transport->GatewayEnabled)
344 transport->layer = TRANSPORT_LAYER_TSG_TLS;
346 transport->layer = TRANSPORT_LAYER_TLS;
348 tls->hostname = settings->ServerHostname;
349 tls->serverName = settings->UserSpecifiedServerName;
350 tls->port = WINPR_ASSERTING_INT_CAST(int32_t, MIN(UINT16_MAX, settings->ServerPort));
355 tls->isGatewayTransport = FALSE;
356 tlsStatus = freerdp_tls_connect(tls, transport->frontBio);
362 freerdp_set_last_error_if_not(context, FREERDP_ERROR_TLS_CONNECT_FAILED);
366 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_CANCELLED);
372 transport->frontBio = tls->bio;
381 typedef void (*ssl_cb_t)(
const SSL* ssl,
int type,
int val);
382 ssl_cb_t fkt = transport_ssl_cb;
384 BIO_info_cb* bfkt = WINPR_FUNC_PTR_CAST(fkt, BIO_info_cb*);
385 BIO_callback_ctrl(tls->bio, BIO_CTRL_SET_CALLBACK, bfkt);
386 SSL_set_app_data(tls->ssl, transport);
388 if (!transport->frontBio)
390 WLog_Print(transport->log, WLOG_ERROR,
"unable to prepend a filtering TLS bio");
397BOOL transport_connect_nla(rdpTransport* transport, BOOL earlyUserAuth)
399 rdpContext* context =
nullptr;
400 rdpSettings* settings =
nullptr;
401 rdpRdp* rdp =
nullptr;
405 context = transport_get_context(transport);
406 WINPR_ASSERT(context);
408 settings = context->settings;
409 WINPR_ASSERT(settings);
414 if (!transport_connect_tls(transport))
417 if (!settings->Authentication)
421 rdp->nla = nla_new(context, transport);
426 nla_set_early_user_auth(rdp->nla, earlyUserAuth);
428 transport_set_nla_mode(transport, TRUE);
430 if (settings->AuthenticationServiceClass)
432 if (!nla_set_service_principal(rdp->nla, settings->AuthenticationServiceClass,
437 if (nla_client_begin(rdp->nla) < 0)
439 WLog_Print(transport->log, WLOG_ERROR,
"NLA begin failed");
441 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
443 transport_set_nla_mode(transport, FALSE);
447 return rdp_client_transition_to_state(rdp, CONNECTION_STATE_NLA);
450BOOL transport_connect_rdstls(rdpTransport* transport)
453 rdpRdstls* rdstls =
nullptr;
454 rdpContext* context =
nullptr;
456 WINPR_ASSERT(transport);
458 context = transport_get_context(transport);
459 WINPR_ASSERT(context);
461 if (!transport_connect_tls(transport))
464 rdstls = rdstls_new(context, transport);
468 transport_set_rdstls_mode(transport, TRUE);
470 if (rdstls_authenticate(rdstls) < 0)
472 WLog_Print(transport->log, WLOG_ERROR,
"RDSTLS authentication failed");
473 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
477 transport_set_rdstls_mode(transport, FALSE);
484BOOL transport_connect_aad(rdpTransport* transport)
486 rdpContext* context =
nullptr;
487 rdpSettings* settings =
nullptr;
488 rdpRdp* rdp =
nullptr;
492 context = transport_get_context(transport);
493 WINPR_ASSERT(context);
495 settings = context->settings;
496 WINPR_ASSERT(settings);
501 if (!transport_connect_tls(transport))
504 if (!settings->Authentication)
510 transport_set_aad_mode(transport, TRUE);
512 if (aad_client_begin(rdp->aad) < 0)
514 WLog_Print(transport->log, WLOG_ERROR,
"AAD begin failed");
516 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
518 transport_set_aad_mode(transport, FALSE);
522 return rdp_client_transition_to_state(rdp, CONNECTION_STATE_AAD);
525static BOOL transport_can_retry(
const rdpContext* context, BOOL status)
527 switch (freerdp_get_last_error(context))
529 case FREERDP_ERROR_CONNECT_TARGET_BOOTING:
536BOOL transport_connect(rdpTransport* transport,
const char* hostname, UINT16 port, DWORD timeout)
539 rdpSettings* settings =
nullptr;
540 rdpContext* context = transport_get_context(transport);
541 BOOL rpcFallback = 0;
543 WINPR_ASSERT(context);
544 WINPR_ASSERT(hostname);
546 settings = context->settings;
547 WINPR_ASSERT(settings);
549 rpcFallback = !settings->GatewayHttpTransport;
551 if (transport->GatewayEnabled)
553 if (settings->GatewayUrl)
555 WINPR_ASSERT(!transport->wst);
556 transport->wst = wst_new(context);
561 status = wst_connect(transport->wst, timeout);
565 transport->frontBio = wst_get_front_bio_and_take_ownership(transport->wst);
566 WINPR_ASSERT(transport->frontBio);
567 BIO_set_nonblock(transport->frontBio, 0);
568 transport->layer = TRANSPORT_LAYER_TSG;
573 wst_free(transport->wst);
574 transport->wst =
nullptr;
577 if (transport_can_retry(transport->context, status) && settings->GatewayHttpTransport)
579 WINPR_ASSERT(!transport->rdg);
580 transport->rdg = rdg_new(context);
585 status = rdg_connect(transport->rdg, timeout, &rpcFallback);
589 transport->frontBio = rdg_get_front_bio_and_take_ownership(transport->rdg);
590 WINPR_ASSERT(transport->frontBio);
591 BIO_set_nonblock(transport->frontBio, 0);
592 transport->layer = TRANSPORT_LAYER_TSG;
597 rdg_free(transport->rdg);
598 transport->rdg =
nullptr;
602 if (transport_can_retry(transport->context, status) && settings->GatewayRpcTransport &&
605 WINPR_ASSERT(!transport->tsg);
606 transport->tsg = tsg_new(transport);
612 freerdp_set_last_error_log(context, FREERDP_ERROR_SUCCESS);
613 status = tsg_connect(transport->tsg, hostname, port, timeout);
617 transport->frontBio = tsg_get_bio(transport->tsg);
618 transport->layer = TRANSPORT_LAYER_TSG;
623 tsg_free(transport->tsg);
624 transport->tsg =
nullptr;
631 const char* proxyHostname =
nullptr;
632 const char* proxyUsername =
nullptr;
633 const char* proxyPassword =
nullptr;
634 BOOL isProxyConnection =
635 proxy_prepare(settings, &proxyHostname, &peerPort, &proxyUsername, &proxyPassword);
638 if (isProxyConnection)
639 layer = transport_connect_layer(transport, proxyHostname, peerPort, timeout);
641 layer = transport_connect_layer(transport, hostname, port, timeout);
646 if (!transport_attach_layer(transport, layer))
648 transport_layer_free(layer);
652 if (isProxyConnection)
654 if (!proxy_connect(context, transport->frontBio, proxyUsername, proxyPassword, hostname,
665BOOL transport_connect_childsession(rdpTransport* transport)
667 WINPR_ASSERT(transport);
669 transport->frontBio = createChildSessionBio();
670 if (!transport->frontBio)
673 transport->layer = TRANSPORT_LAYER_TSG;
677BOOL transport_accept_rdp(rdpTransport* transport)
679 return transport !=
nullptr;
683BOOL transport_accept_tls(rdpTransport* transport)
687 return IFCALLRESULT(FALSE, transport->io.TLSAccept, transport);
690static BOOL transport_default_accept_tls(rdpTransport* transport)
692 rdpContext* context = transport_get_context(transport);
693 rdpSettings* settings =
nullptr;
695 WINPR_ASSERT(context);
697 settings = context->settings;
698 WINPR_ASSERT(settings);
701 transport->tls = freerdp_tls_new(context);
703 transport->layer = TRANSPORT_LAYER_TLS;
705 if (!freerdp_tls_accept(transport->tls, transport->frontBio, settings))
708 transport->frontBio = transport->tls->bio;
712BOOL transport_accept_nla(rdpTransport* transport)
714 rdpContext* context = transport_get_context(transport);
715 rdpSettings* settings =
nullptr;
717 WINPR_ASSERT(context);
719 settings = context->settings;
720 WINPR_ASSERT(settings);
722 if (!IFCALLRESULT(FALSE, transport->io.TLSAccept, transport))
727 if (!settings->Authentication)
732 transport->nla = nla_new(context, transport);
733 transport_set_nla_mode(transport, TRUE);
736 if (nla_authenticate(transport->nla) < 0)
738 WLog_Print(transport->log, WLOG_ERROR,
"client authentication failure");
739 transport_set_nla_mode(transport, FALSE);
740 nla_free(transport->nla);
741 transport->nla =
nullptr;
742 freerdp_tls_set_alert_code(transport->tls, TLS_ALERT_LEVEL_FATAL,
743 TLS_ALERT_DESCRIPTION_ACCESS_DENIED);
744 freerdp_tls_send_alert(transport->tls);
749 transport_set_nla_mode(transport, FALSE);
753BOOL transport_accept_rdstls(rdpTransport* transport)
756 rdpRdstls* rdstls =
nullptr;
757 rdpContext* context =
nullptr;
759 WINPR_ASSERT(transport);
761 context = transport_get_context(transport);
762 WINPR_ASSERT(context);
764 if (!IFCALLRESULT(FALSE, transport->io.TLSAccept, transport))
767 rdstls = rdstls_new(context, transport);
771 transport_set_rdstls_mode(transport, TRUE);
773 if (rdstls_authenticate(rdstls) < 0)
775 WLog_Print(transport->log, WLOG_ERROR,
"client authentication failure");
776 freerdp_tls_set_alert_code(transport->tls, TLS_ALERT_LEVEL_FATAL,
777 TLS_ALERT_DESCRIPTION_ACCESS_DENIED);
778 freerdp_tls_send_alert(transport->tls);
782 transport_set_rdstls_mode(transport, FALSE);
789#define WLog_ERR_BIO(transport, biofunc, bio) \
790 transport_bio_error_log(transport, biofunc, bio, __FILE__, __func__, __LINE__)
792static void transport_bio_error_log(rdpTransport* transport, LPCSTR biofunc,
793 WINPR_ATTR_UNUSED BIO* bio, LPCSTR file, LPCSTR func,
796 unsigned long sslerr = 0;
800 WINPR_ASSERT(transport);
805 if (level < WLog_GetLogLevel(transport->log))
808 if (ERR_peek_error() == 0)
810 char ebuffer[256] = WINPR_C_ARRAY_INIT;
813 WLog_PrintTextMessage(transport->log, level, line, file, func,
"%s retries exceeded",
816 WLog_PrintTextMessage(transport->log, level, line, file, func,
817 "%s returned a system error %d: %s", biofunc, saveerrno,
818 winpr_strerror(saveerrno, ebuffer,
sizeof(ebuffer)));
822 while ((sslerr = ERR_get_error()))
824 char buf[120] = WINPR_C_ARRAY_INIT;
826 ERR_error_string_n(sslerr, buf, 120);
827 WLog_PrintTextMessage(transport->log, level, line, file, func,
"%s returned an error: %s",
832static SSIZE_T transport_read_layer(rdpTransport* transport, BYTE* data,
size_t bytes)
835 rdpRdp* rdp =
nullptr;
836 rdpContext* context =
nullptr;
838 WINPR_ASSERT(transport);
840 context = transport_get_context(transport);
841 WINPR_ASSERT(context);
846 if (!transport->frontBio || (bytes > SSIZE_MAX))
848 transport->layer = TRANSPORT_LAYER_CLOSED;
849 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
853 while (read < (SSIZE_T)bytes)
855 const SSIZE_T tr = (SSIZE_T)bytes - read;
856 int r = (int)((tr > INT_MAX) ? INT_MAX : tr);
858 int status = BIO_read(transport->frontBio, data + read, r);
860 if (freerdp_shall_disconnect_context(context))
865 if (!transport->frontBio || !BIO_should_retry(transport->frontBio))
868 if (!transport->frontBio)
870 WLog_Print(transport->log, WLOG_ERROR,
"BIO_read: transport->frontBio null");
874 WLog_ERR_BIO(transport,
"BIO_read", transport->frontBio);
875 transport->layer = TRANSPORT_LAYER_CLOSED;
876 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
881 if (!transport->blocking)
886 if (BIO_wait_read(transport->frontBio, 100) < 0)
888 WLog_ERR_BIO(transport,
"BIO_wait_read", transport->frontBio);
895#ifdef FREERDP_HAVE_VALGRIND_MEMCHECK_H
896 VALGRIND_MAKE_MEM_DEFINED(data + read, bytes - read);
899 rdp->inBytes += WINPR_ASSERTING_INT_CAST(uint64_t, status);
919static SSIZE_T transport_read_layer_bytes(rdpTransport* transport,
wStream* s,
size_t toRead)
925 if (toRead > SSIZE_MAX)
928 status = IFCALLRESULT(-1, transport->io.ReadBytes, transport, Stream_Pointer(s), toRead);
933 Stream_Seek(s, (
size_t)status);
934 return status == (SSIZE_T)toRead ? 1 : 0;
949int transport_read_pdu(rdpTransport* transport,
wStream* s)
953 return IFCALLRESULT(-1, transport->io.ReadPdu, transport, s);
956static SSIZE_T parse_nla_mode_pdu(rdpTransport* transport,
wStream* stream)
958 SSIZE_T pduLength = 0;
959 wStream sbuffer = WINPR_C_ARRAY_INIT;
960 wStream* s = Stream_StaticConstInit(&sbuffer, Stream_Buffer(stream), Stream_Length(stream));
967 UINT8 typeEncoding = 0;
968 if (Stream_GetRemainingLength(s) < 1)
970 Stream_Read_UINT8(s, typeEncoding);
971 if (typeEncoding == 0x30)
974 UINT8 lengthEncoding = 0;
975 if (Stream_GetRemainingLength(s) < 1)
977 Stream_Read_UINT8(s, lengthEncoding);
978 if (lengthEncoding & 0x80)
980 if ((lengthEncoding & ~(0x80)) == 1)
983 if (Stream_GetRemainingLength(s) < 1)
985 Stream_Read_UINT8(s, length);
989 else if ((lengthEncoding & ~(0x80)) == 2)
993 if (Stream_GetRemainingLength(s) < 2)
995 Stream_Read_UINT16_BE(s, length);
1001 WLog_Print(transport->log, WLOG_ERROR,
"Error reading TSRequest!");
1007 pduLength = lengthEncoding;
1015static SSIZE_T parse_default_mode_pdu(rdpTransport* transport,
wStream* stream)
1017 SSIZE_T pduLength = 0;
1018 wStream sbuffer = WINPR_C_ARRAY_INIT;
1019 wStream* s = Stream_StaticConstInit(&sbuffer, Stream_Buffer(stream), Stream_Length(stream));
1022 if (Stream_GetRemainingLength(s) < 1)
1024 Stream_Read_UINT8(s, version);
1025 if (version == 0x03)
1029 if (Stream_GetRemainingLength(s) < 3)
1032 Stream_Read_UINT16_BE(s, length);
1036 if ((pduLength < 7) || (pduLength > 0xFFFF))
1038 WLog_Print(transport->log, WLOG_ERROR,
"tpkt - invalid pduLength: %" PRIdz, pduLength);
1046 if (Stream_GetRemainingLength(s) < 1)
1048 Stream_Read_UINT8(s, length1);
1052 if (Stream_GetRemainingLength(s) < 1)
1054 Stream_Read_UINT8(s, length2);
1055 pduLength = ((length1 & 0x7F) << 8) | length2;
1058 pduLength = length1;
1065 if (pduLength < 3 || pduLength > 0x8000)
1067 WLog_Print(transport->log, WLOG_ERROR,
"fast path - invalid pduLength: %" PRIdz,
1076SSIZE_T transport_parse_pdu(rdpTransport* transport,
wStream* s, BOOL* incomplete)
1078 SSIZE_T pduLength = 0;
1089 Stream_SealLength(s);
1090 if (transport->NlaMode)
1091 pduLength = parse_nla_mode_pdu(transport, s);
1092 else if (transport->RdstlsMode)
1093 pduLength = rdstls_parse_pdu(transport->log, s);
1095 pduLength = parse_default_mode_pdu(transport, s);
1100 const size_t len = Stream_Length(s);
1101 if (len > WINPR_ASSERTING_INT_CAST(
size_t, pduLength))
1105 *incomplete = len < WINPR_ASSERTING_INT_CAST(
size_t, pduLength);
1110static int transport_default_read_pdu(rdpTransport* transport,
wStream* s)
1112 BOOL incomplete = 0;
1114 size_t pduLength = 0;
1115 size_t position = 0;
1117 WINPR_ASSERT(transport);
1122 if (transport->AadMode)
1127 const SSIZE_T rc = transport_read_layer(transport, &c, 1);
1129 return (rc == 0) ? 0 : -1;
1130 if (!Stream_EnsureRemainingCapacity(s, 1))
1132 Stream_Write_UINT8(s, c);
1133 }
while (c !=
'\0');
1135 else if (transport->earlyUserAuth)
1137 if (!Stream_EnsureCapacity(s, 4))
1139 const SSIZE_T rc = transport_read_layer_bytes(transport, s, 4);
1141 return (rc == 0) ? 0 : -1;
1146 status = transport_parse_pdu(transport, s, &incomplete);
1147 while ((status == 0) && incomplete)
1149 if (!Stream_EnsureRemainingCapacity(s, 1))
1151 SSIZE_T rc = transport_read_layer_bytes(transport, s, 1);
1156 status = transport_parse_pdu(transport, s, &incomplete);
1162 pduLength = (size_t)status;
1165 if (!Stream_EnsureCapacity(s, pduLength))
1168 position = Stream_GetPosition(s);
1169 if (position > pduLength)
1171 else if (position < pduLength)
1173 status = transport_read_layer_bytes(transport, s, pduLength - position);
1176 if ((status < INT32_MIN) || (status > INT32_MAX))
1182 if (Stream_GetPosition(s) >= pduLength)
1183 WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), pduLength,
1184 WLOG_PACKET_INBOUND);
1187 Stream_SealLength(s);
1188 Stream_SetPosition(s, 0);
1189 const size_t len = Stream_Length(s);
1190 if (len > INT32_MAX)
1195int transport_write(rdpTransport* transport,
wStream* s)
1200 return IFCALLRESULT(-1, transport->io.WritePdu, transport, s);
1203static int transport_default_write(rdpTransport* transport,
wStream* s)
1206 rdpContext* context = transport_get_context(transport);
1208 WINPR_ASSERT(transport);
1209 WINPR_ASSERT(context);
1216 rdpRdp* rdp = context->rdp;
1220 EnterCriticalSection(&(transport->WriteLock));
1221 if (!transport->frontBio)
1225 size_t length = Stream_GetPosition(s);
1226 size_t writtenlength = length;
1227 Stream_SetPosition(s, 0);
1231 rdp->outBytes += length;
1232 WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), length, WLOG_PACKET_OUTBOUND);
1238 const int towrite = (length > INT32_MAX) ? INT32_MAX : (int)length;
1239 status = BIO_write(transport->frontBio, Stream_ConstPointer(s), towrite);
1247 if (!BIO_should_retry(transport->frontBio))
1249 WLog_ERR_BIO(transport,
"BIO_should_retry", transport->frontBio);
1254 if (!transport->blocking)
1256 WLog_ERR_BIO(transport,
"BIO_write", transport->frontBio);
1260 if (BIO_wait_write(transport->frontBio, 100) < 0)
1262 WLog_ERR_BIO(transport,
"BIO_wait_write", transport->frontBio);
1270 WINPR_ASSERT(context->settings);
1271 if (transport->blocking || context->settings->WaitForOutputBufferFlush)
1273 while (BIO_write_blocked(transport->frontBio))
1275 if (BIO_wait_write(transport->frontBio, 100) < 0)
1277 WLog_Print(transport->log, WLOG_ERROR,
"error when selecting for write");
1282 if (BIO_flush(transport->frontBio) < 1)
1284 WLog_Print(transport->log, WLOG_ERROR,
"error when flushing outputBuffer");
1291 const size_t ustatus = (size_t)status;
1292 if (ustatus > length)
1299 Stream_Seek(s, ustatus);
1302 transport->written += writtenlength;
1309 transport->layer = TRANSPORT_LAYER_CLOSED;
1310 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
1313 LeaveCriticalSection(&(transport->WriteLock));
1319BOOL transport_get_public_key(rdpTransport* transport,
const BYTE** data, DWORD* length)
1321 return IFCALLRESULT(FALSE, transport->io.GetPublicKey, transport, data, length);
1324static BOOL transport_default_get_public_key(rdpTransport* transport,
const BYTE** data,
1327 rdpTls* tls = transport_get_tls(transport);
1331 *data = tls->PublicKey;
1332 *length = tls->PublicKeyLength;
1337DWORD transport_get_event_handles(rdpTransport* transport, HANDLE* events, DWORD count)
1341 WINPR_ASSERT(transport);
1342 WINPR_ASSERT(events);
1343 WINPR_ASSERT(count > 0);
1349 WLog_Print(transport->log, WLOG_ERROR,
"provided handles array is too small");
1353 events[nCount++] = transport->rereadEvent;
1355 if (transport->useIoEvent)
1359 events[nCount++] = transport->ioEvent;
1363 if (!transport->GatewayEnabled)
1367 if (nCount >= count)
1369 WLog_Print(transport->log, WLOG_ERROR,
1370 "provided handles array is too small (count=%" PRIu32
" nCount=%" PRIu32
1376 if (transport->frontBio)
1378 if (BIO_get_event(transport->frontBio, &events[nCount]) != 1)
1380 WLog_Print(transport->log, WLOG_ERROR,
"error getting the frontBio handle");
1392 rdg_get_event_handles(transport->rdg, &events[nCount], count - nCount);
1399 else if (transport->tsg)
1402 tsg_get_event_handles(transport->tsg, &events[nCount], count - nCount);
1409 else if (transport->wst)
1412 wst_get_event_handles(transport->wst, &events[nCount], count - nCount);
1424#if defined(WITH_FREERDP_DEPRECATED)
1425void transport_get_fds(rdpTransport* transport,
void** rfds,
int* rcount)
1428 HANDLE events[MAXIMUM_WAIT_OBJECTS] = WINPR_C_ARRAY_INIT;
1430 WINPR_ASSERT(transport);
1432 WINPR_ASSERT(rcount);
1434 nCount = transport_get_event_handles(transport, events, ARRAYSIZE(events));
1435 *rcount = nCount + 1;
1437 for (DWORD index = 0; index < nCount; index++)
1439 rfds[index] = GetEventWaitObject(events[index]);
1442 rfds[nCount] = GetEventWaitObject(transport->rereadEvent);
1446BOOL transport_is_write_blocked(rdpTransport* transport)
1448 WINPR_ASSERT(transport);
1449 WINPR_ASSERT(transport->frontBio);
1450 return BIO_write_blocked(transport->frontBio) != 0;
1453int transport_drain_output_buffer(rdpTransport* transport)
1455 BOOL status = FALSE;
1457 WINPR_ASSERT(transport);
1458 WINPR_ASSERT(transport->frontBio);
1459 if (BIO_write_blocked(transport->frontBio))
1461 if (BIO_flush(transport->frontBio) < 1)
1464 const long rc = BIO_write_blocked(transport->frontBio);
1471int transport_check_fds(rdpTransport* transport)
1474 state_run_t recv_status = STATE_RUN_FAILED;
1476 rdpContext* context = transport_get_context(transport);
1478 WINPR_ASSERT(context);
1480 if (transport->layer == TRANSPORT_LAYER_CLOSED)
1482 WLog_Print(transport->log, WLOG_DEBUG,
"transport_check_fds: transport layer closed");
1483 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
1496 if ((status = transport_read_pdu(transport, transport->ReceiveBuffer)) <= 0)
1499 WLog_Print(transport->log, WLOG_DEBUG,
"transport_check_fds: transport_read_pdu() - %i",
1501 if (transport->haveMoreBytesToRead)
1503 transport->haveMoreBytesToRead = FALSE;
1504 (void)ResetEvent(transport->rereadEvent);
1509 received = transport->ReceiveBuffer;
1510 transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
1511 if (!transport->ReceiveBuffer)
1513 Stream_Release(received);
1523 WINPR_ASSERT(transport->ReceiveCallback);
1524 recv_status = transport->ReceiveCallback(transport, received, transport->ReceiveExtra);
1525 Stream_Release(received);
1527 if (state_run_failed(recv_status))
1529 char buffer[64] = WINPR_C_ARRAY_INIT;
1530 WLog_Print(transport->log, WLOG_ERROR,
1531 "transport_check_fds: transport->ReceiveCallback() - %s",
1532 state_run_result_string(recv_status, buffer, ARRAYSIZE(buffer)));
1539 if (!transport->haveMoreBytesToRead)
1541 transport->haveMoreBytesToRead = TRUE;
1542 (void)SetEvent(transport->rereadEvent);
1547BOOL transport_set_blocking_mode(rdpTransport* transport, BOOL blocking)
1549 WINPR_ASSERT(transport);
1551 return IFCALLRESULT(FALSE, transport->io.SetBlockingMode, transport, blocking);
1554static BOOL transport_default_set_blocking_mode(rdpTransport* transport, BOOL blocking)
1556 WINPR_ASSERT(transport);
1558 transport->blocking = blocking;
1560 if (transport->frontBio)
1562 if (!BIO_set_nonblock(transport->frontBio, !(blocking)))
1569rdpTransportLayer* transport_connect_layer(rdpTransport* transport,
const char* hostname,
int port,
1572 WINPR_ASSERT(transport);
1574 return IFCALLRESULT(
nullptr, transport->io.ConnectLayer, transport, hostname, port, timeout);
1577static rdpTransportLayer* transport_default_connect_layer(rdpTransport* transport,
1578 const char* hostname,
int port,
1581 rdpContext* context = transport_get_context(transport);
1582 WINPR_ASSERT(context);
1584 return freerdp_tcp_connect_layer(context, hostname, port, timeout);
1589 WINPR_ASSERT(transport);
1590 WINPR_ASSERT(layer);
1592 return IFCALLRESULT(FALSE, transport->io.AttachLayer, transport, layer);
1595static BOOL transport_default_attach_layer(rdpTransport* transport,
rdpTransportLayer* layer)
1597 BIO* layerBio = BIO_new(BIO_s_transport_layer());
1602 BIO* bufferedBio = BIO_new(BIO_s_buffered_socket());
1606 bufferedBio = BIO_push(bufferedBio, layerBio);
1611 BIO_set_data(layerBio, layer);
1613 transport->frontBio = bufferedBio;
1619 BIO_free_all(layerBio);
1624void transport_set_gateway_enabled(rdpTransport* transport, BOOL GatewayEnabled)
1626 WINPR_ASSERT(transport);
1627 transport->GatewayEnabled = GatewayEnabled;
1630void transport_set_nla_mode(rdpTransport* transport, BOOL NlaMode)
1632 WINPR_ASSERT(transport);
1633 transport->NlaMode = NlaMode;
1636void transport_set_rdstls_mode(rdpTransport* transport, BOOL RdstlsMode)
1638 WINPR_ASSERT(transport);
1639 transport->RdstlsMode = RdstlsMode;
1642void transport_set_aad_mode(rdpTransport* transport, BOOL AadMode)
1644 WINPR_ASSERT(transport);
1645 transport->AadMode = AadMode;
1648BOOL transport_disconnect(rdpTransport* transport)
1652 return IFCALLRESULT(FALSE, transport->io.TransportDisconnect, transport);
1655static BOOL transport_default_disconnect(rdpTransport* transport)
1662 EnterCriticalSection(&(transport->ReadLock));
1663 EnterCriticalSection(&(transport->WriteLock));
1666 freerdp_tls_free(transport->tls);
1667 transport->tls =
nullptr;
1671 if (transport->frontBio)
1672 BIO_free_all(transport->frontBio);
1677 tsg_free(transport->tsg);
1678 transport->tsg =
nullptr;
1683 rdg_free(transport->rdg);
1684 transport->rdg =
nullptr;
1689 wst_free(transport->wst);
1690 transport->wst =
nullptr;
1693 transport->frontBio =
nullptr;
1694 transport->layer = TRANSPORT_LAYER_TCP;
1695 transport->earlyUserAuth = FALSE;
1696 LeaveCriticalSection(&(transport->WriteLock));
1697 LeaveCriticalSection(&(transport->ReadLock));
1701rdpTransport* transport_new(rdpContext* context)
1703 rdpTransport* transport = (rdpTransport*)calloc(1,
sizeof(rdpTransport));
1705 WINPR_ASSERT(context);
1709 transport->log = WLog_Get(TAG);
1711 if (!transport->log)
1714 transport->context = context;
1715 transport->haveReadLock = InitializeCriticalSectionAndSpinCount(&(transport->ReadLock), 4000);
1716 transport->haveWriteLock = InitializeCriticalSectionAndSpinCount(&(transport->WriteLock), 4000);
1717 if (!transport->haveReadLock || !transport->haveWriteLock)
1720 transport->ReceivePool = StreamPool_New(TRUE, BUFFER_SIZE);
1722 if (!transport->ReceivePool)
1726 transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
1728 if (!transport->ReceiveBuffer)
1731 transport->connectedEvent = CreateEvent(
nullptr, TRUE, FALSE,
nullptr);
1733 if (!transport->connectedEvent || transport->connectedEvent == INVALID_HANDLE_VALUE)
1736 transport->rereadEvent = CreateEvent(
nullptr, TRUE, FALSE,
nullptr);
1738 if (!transport->rereadEvent || transport->rereadEvent == INVALID_HANDLE_VALUE)
1741 transport->ioEvent = CreateEvent(
nullptr, TRUE, FALSE,
nullptr);
1743 if (!transport->ioEvent || transport->ioEvent == INVALID_HANDLE_VALUE)
1746 transport->haveMoreBytesToRead = FALSE;
1747 transport->blocking = TRUE;
1748 transport->GatewayEnabled = FALSE;
1749 transport->layer = TRANSPORT_LAYER_TCP;
1752 transport->io.TCPConnect = freerdp_tcp_default_connect;
1753 transport->io.TLSConnect = transport_default_connect_tls;
1754 transport->io.TLSAccept = transport_default_accept_tls;
1755 transport->io.TransportAttach = transport_default_attach;
1756 transport->io.TransportDisconnect = transport_default_disconnect;
1757 transport->io.ReadPdu = transport_default_read_pdu;
1758 transport->io.WritePdu = transport_default_write;
1759 transport->io.ReadBytes = transport_read_layer;
1760 transport->io.GetPublicKey = transport_default_get_public_key;
1761 transport->io.SetBlockingMode = transport_default_set_blocking_mode;
1762 transport->io.ConnectLayer = transport_default_connect_layer;
1763 transport->io.AttachLayer = transport_default_attach_layer;
1767 WINPR_PRAGMA_DIAG_PUSH
1768 WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
1769 transport_free(transport);
1770 WINPR_PRAGMA_DIAG_POP
1774void transport_free(rdpTransport* transport)
1779 transport_disconnect(transport);
1781 if (transport->haveReadLock)
1782 EnterCriticalSection(&(transport->ReadLock));
1784 if (transport->ReceiveBuffer)
1785 Stream_Release(transport->ReceiveBuffer);
1787 if (transport->haveReadLock)
1788 LeaveCriticalSection(&(transport->ReadLock));
1790 if (transport->ReceivePool)
1791 (void)StreamPool_WaitForReturn(transport->ReceivePool, INFINITE);
1793 if (transport->haveReadLock)
1794 EnterCriticalSection(&(transport->ReadLock));
1796 if (transport->haveWriteLock)
1797 EnterCriticalSection(&(transport->WriteLock));
1799 nla_free(transport->nla);
1800 StreamPool_Free(transport->ReceivePool);
1801 (void)CloseHandle(transport->connectedEvent);
1802 (void)CloseHandle(transport->rereadEvent);
1803 (void)CloseHandle(transport->ioEvent);
1805 if (transport->haveReadLock)
1806 LeaveCriticalSection(&(transport->ReadLock));
1807 DeleteCriticalSection(&(transport->ReadLock));
1809 if (transport->haveWriteLock)
1810 LeaveCriticalSection(&(transport->WriteLock));
1811 DeleteCriticalSection(&(transport->WriteLock));
1815BOOL transport_set_io_callbacks(rdpTransport* transport,
const rdpTransportIo* io_callbacks)
1817 if (!transport || !io_callbacks)
1820 transport->io = *io_callbacks;
1824const rdpTransportIo* transport_get_io_callbacks(
const rdpTransport* transport)
1828 return &transport->io;
1831rdpContext* transport_get_context(rdpTransport* transport)
1833 WINPR_ASSERT(transport);
1834 return transport->context;
1837rdpTransport* freerdp_get_transport(rdpContext* context)
1839 WINPR_ASSERT(context);
1840 WINPR_ASSERT(context->rdp);
1841 return context->rdp->transport;
1844BOOL transport_set_nla(rdpTransport* transport, rdpNla* nla)
1846 WINPR_ASSERT(transport);
1847 nla_free(transport->nla);
1848 transport->nla = nla;
1852rdpNla* transport_get_nla(rdpTransport* transport)
1854 WINPR_ASSERT(transport);
1855 return transport->nla;
1858BOOL transport_set_tls(rdpTransport* transport, rdpTls* tls)
1860 WINPR_ASSERT(transport);
1861 freerdp_tls_free(transport->tls);
1862 transport->tls = tls;
1866rdpTls* transport_get_tls(rdpTransport* transport)
1868 WINPR_ASSERT(transport);
1869 return transport->tls;
1872BOOL transport_set_tsg(rdpTransport* transport, rdpTsg* tsg)
1874 WINPR_ASSERT(transport);
1875 tsg_free(transport->tsg);
1876 transport->tsg = tsg;
1880rdpTsg* transport_get_tsg(rdpTransport* transport)
1882 WINPR_ASSERT(transport);
1883 return transport->tsg;
1886wStream* transport_take_from_pool(rdpTransport* transport,
size_t size)
1888 WINPR_ASSERT(transport);
1889 if (!transport->frontBio)
1891 return StreamPool_Take(transport->ReceivePool, size);
1894UINT64 transport_get_bytes_sent(rdpTransport* transport, BOOL resetCount)
1897 WINPR_ASSERT(transport);
1898 rc = transport->written;
1900 transport->written = 0;
1904TRANSPORT_LAYER transport_get_layer(rdpTransport* transport)
1906 WINPR_ASSERT(transport);
1907 return transport->layer;
1910BOOL transport_set_layer(rdpTransport* transport, TRANSPORT_LAYER layer)
1912 WINPR_ASSERT(transport);
1913 transport->layer = layer;
1917BOOL transport_set_connected_event(rdpTransport* transport)
1919 WINPR_ASSERT(transport);
1920 return SetEvent(transport->connectedEvent);
1923BOOL transport_set_recv_callbacks(rdpTransport* transport, TransportRecv recv,
void* extra)
1925 WINPR_ASSERT(transport);
1926 transport->ReceiveCallback = recv;
1927 transport->ReceiveExtra = extra;
1931BOOL transport_get_blocking(
const rdpTransport* transport)
1933 WINPR_ASSERT(transport);
1934 return transport->blocking;
1937BOOL transport_set_blocking(rdpTransport* transport, BOOL blocking)
1939 WINPR_ASSERT(transport);
1940 transport->blocking = blocking;
1944BOOL transport_have_more_bytes_to_read(rdpTransport* transport)
1946 WINPR_ASSERT(transport);
1947 return transport->haveMoreBytesToRead;
1950int transport_tcp_connect(rdpTransport* transport,
const char* hostname,
int port, DWORD timeout)
1952 rdpContext* context = transport_get_context(transport);
1953 WINPR_ASSERT(context);
1954 WINPR_ASSERT(context->settings);
1955 return IFCALLRESULT(-1, transport->io.TCPConnect, context, context->settings, hostname, port,
1959HANDLE transport_get_front_bio(rdpTransport* transport)
1961 HANDLE hEvent =
nullptr;
1962 WINPR_ASSERT(transport);
1963 WINPR_ASSERT(transport->frontBio);
1965 BIO_get_event(transport->frontBio, &hEvent);
1969BOOL transport_io_callback_set_event(rdpTransport* transport, BOOL set)
1971 WINPR_ASSERT(transport);
1972 transport->useIoEvent = TRUE;
1974 return ResetEvent(transport->ioEvent);
1975 return SetEvent(transport->ioEvent);
1978void transport_set_early_user_auth_mode(rdpTransport* transport, BOOL EUAMode)
1980 WINPR_ASSERT(transport);
1981 transport->earlyUserAuth = EUAMode;
1982 WLog_Print(transport->log, WLOG_DEBUG,
"Early User Auth Mode: %s", EUAMode ?
"on" :
"off");
1985rdpTransportLayer* transport_layer_new(WINPR_ATTR_UNUSED rdpTransport* transport,
1988 rdpTransportLayerInt* layer = (rdpTransportLayerInt*)calloc(1,
sizeof(rdpTransportLayerInt));
1994 layer->userContextShadowPtr = calloc(1, contextSize);
1995 if (!layer->userContextShadowPtr)
2001 layer->pub.userContext = layer->userContextShadowPtr;
2008 rdpTransportLayerInt* intern = (rdpTransportLayerInt*)layer;
2012 if (intern->pub.Close)
2013 intern->pub.Close(intern->pub.userContext);
2014 free(intern->userContextShadowPtr);
2018static int transport_layer_bio_write(BIO* bio,
const char* buf,
int size)
2031 BIO_clear_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY);
2034 const int status = IFCALLRESULT(-1, layer->Write, layer->userContext, buf, size);
2036 if (status >= 0 && status < size)
2037 BIO_set_flags(bio, (BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY));
2042 BIO_set_flags(bio, (BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY));
2051static int transport_layer_bio_read(BIO* bio,
char* buf,
int size)
2064 BIO_clear_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY);
2066 const int status = IFCALLRESULT(-1, layer->Read, layer->userContext, buf, size);
2071 BIO_set_flags(bio, (BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY));
2080static int transport_layer_bio_puts(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
const char* str)
2085static int transport_layer_bio_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
2086 WINPR_ATTR_UNUSED
int size)
2091static long transport_layer_bio_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
2102 case BIO_C_GET_EVENT:
2103 *((HANDLE*)arg2) = IFCALLRESULT(
nullptr, layer->GetEvent, layer->userContext);
2107 case BIO_C_SET_NONBLOCK:
2111 case BIO_C_WAIT_READ:
2113 int timeout = (int)arg1;
2114 BOOL r = IFCALLRESULT(FALSE, layer->Wait, layer->userContext, FALSE,
2115 WINPR_ASSERTING_INT_CAST(uint32_t, timeout));
2127 case BIO_C_WAIT_WRITE:
2129 int timeout = (int)arg1;
2130 BOOL r = IFCALLRESULT(FALSE, layer->Wait, layer->userContext, TRUE,
2131 WINPR_ASSERTING_INT_CAST(uint32_t, timeout));
2143 case BIO_CTRL_GET_CLOSE:
2144 status = BIO_get_shutdown(bio);
2147 case BIO_CTRL_SET_CLOSE:
2148 BIO_set_shutdown(bio, (
int)arg1);
2152 case BIO_CTRL_FLUSH:
2165static int transport_layer_bio_new(BIO* bio)
2169 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
2170 BIO_set_init(bio, 1);
2174static int transport_layer_bio_free(BIO* bio)
2181 transport_layer_free(layer);
2183 BIO_set_data(bio,
nullptr);
2184 BIO_set_init(bio, 0);
2185 BIO_set_flags(bio, 0);
2190BIO_METHOD* BIO_s_transport_layer(
void)
2192 static BIO_METHOD* bio_methods =
nullptr;
2194 if (bio_methods ==
nullptr)
2196 if (!(bio_methods = BIO_meth_new(BIO_TYPE_SIMPLE,
"TransportLayer")))
2199 BIO_meth_set_write(bio_methods, transport_layer_bio_write);
2200 BIO_meth_set_read(bio_methods, transport_layer_bio_read);
2201 BIO_meth_set_puts(bio_methods, transport_layer_bio_puts);
2202 BIO_meth_set_gets(bio_methods, transport_layer_bio_gets);
2203 BIO_meth_set_ctrl(bio_methods, transport_layer_bio_ctrl);
2204 BIO_meth_set_create(bio_methods, transport_layer_bio_new);
2205 BIO_meth_set_destroy(bio_methods, transport_layer_bio_free);
WINPR_ATTR_NODISCARD FREERDP_API const char * freerdp_settings_get_server_name(const rdpSettings *settings)
A helper function to return the correct server name.