21#include <freerdp/config.h>
26#include <winpr/assert.h>
29#include <winpr/path.h>
30#include <winpr/cmdline.h>
31#include <winpr/winsock.h>
33#include <freerdp/log.h>
34#include <freerdp/version.h>
36#include <winpr/tools/makecert.h>
39#include <sys/select.h>
45#define TAG SERVER_TAG("shadow")
47static const char bind_address[] =
"bind-address,";
49#define fail_at(arg, rc) fail_at_((arg), (rc), __FILE__, __func__, __LINE__)
53 const DWORD level = WLOG_ERROR;
54 wLog* log = WLog_Get(TAG);
55 if (WLog_IsLevelActive(log, level))
56 WLog_PrintTextMessage(log, level, line, file, fkt,
57 "Command line parsing failed at '%s' value '%s' [%d]", arg->Name,
63static int command_line_compare(
const void* pa,
const void* pb)
75 return strcmp(a->Name, b->Name);
79static int shadow_server_print_command_line_help(
int argc,
char** argv,
82 if ((argc < 1) || !largs || !argv)
86 char* path = winpr_GetConfigFilePath(TRUE,
"SAM");
87 printf(
"Usage: %s [options]\n", argv[0]);
89 printf(
"Notes: By default NLA security is active.\n");
90 printf(
"\tIn this mode a SAM database is required.\n");
91 printf(
"\tProvide one with /sam-file:<file with path>\n");
92 printf(
"\telse the default path %s is used.\n", path);
93 printf(
"\tIf there is no existing SAM file authentication for all users will fail.\n");
94 printf(
"\n\tIf authentication against PAM is desired, start with -sec-nla (requires "
96 "support for PAM)\n\n");
98 printf(
" /flag (enables flag)\n");
99 printf(
" /option:<value> (specifies option with value)\n");
100 printf(
" +toggle -toggle (enables or disables toggle, where '/' is a synonym of '+')\n");
109 while (arg->Name !=
nullptr)
127 if (arg->Flags & COMMAND_LINE_VALUE_FLAG)
130 printf(
"%-20s\n", arg->Name);
131 printf(
"\t%s\n", arg->Text);
133 else if ((arg->Flags & COMMAND_LINE_VALUE_REQUIRED) ||
134 (arg->Flags & COMMAND_LINE_VALUE_OPTIONAL))
140 const size_t length = (strlen(arg->Name) + strlen(arg->Format) + 2);
141 char* str = (
char*)calloc(length + 1,
sizeof(
char));
146 (void)sprintf_s(str, length + 1,
"%s:%s", arg->Name, arg->Format);
147 (void)printf(
"%-20s\n", str);
152 printf(
"%-20s\n", arg->Name);
155 printf(
"\t%s\n", arg->Text);
157 else if (arg->Flags & COMMAND_LINE_VALUE_BOOL)
159 const size_t length = strlen(arg->Name) + 32;
160 char* str = calloc(length + 1,
sizeof(
char));
165 (void)sprintf_s(str, length + 1,
"%s (default:%s)", arg->Name,
166 arg->Default ?
"on" :
"off");
167 (void)printf(
" %s", arg->Default ?
"-" :
"+");
168 (void)printf(
"%-20s\n", str);
169 (void)printf(
"\t%s\n", arg->Text);
173 }
while ((arg = CommandLineFindNextArgumentA(arg)) !=
nullptr);
181int shadow_server_command_line_status_print(rdpShadowServer* server,
int argc,
char** argv,
184 WINPR_UNUSED(server);
186 if (status == COMMAND_LINE_STATUS_PRINT_VERSION)
188 printf(
"FreeRDP version %s (git %s)\n", FREERDP_VERSION_FULL, FREERDP_GIT_REVISION);
189 return COMMAND_LINE_STATUS_PRINT_VERSION;
191 else if (status == COMMAND_LINE_STATUS_PRINT_BUILDCONFIG)
193 printf(
"%s\n", freerdp_get_build_config());
194 return COMMAND_LINE_STATUS_PRINT_BUILDCONFIG;
196 else if (status == COMMAND_LINE_STATUS_PRINT)
198 return COMMAND_LINE_STATUS_PRINT;
202 if (shadow_server_print_command_line_help(argc, argv, cargs) < 0)
205 return COMMAND_LINE_STATUS_PRINT_HELP;
211int shadow_server_parse_command_line(rdpShadowServer* server,
int argc,
char** argv,
217 rdpSettings* settings = server->settings;
219 if ((argc < 2) || !argv || !cargs)
222 CommandLineClearArgumentsA(cargs);
223 flags = COMMAND_LINE_SEPARATOR_COLON;
224 flags |= COMMAND_LINE_SIGIL_SLASH | COMMAND_LINE_SIGIL_PLUS_MINUS;
225 status = CommandLineParseArgumentsA(argc, argv, cargs, flags, server,
nullptr,
nullptr);
235 if (!(arg->Flags & COMMAND_LINE_ARGUMENT_PRESENT))
238 CommandLineSwitchStart(arg) CommandLineSwitchCase(arg,
"port")
240 long val = strtol(arg->Value,
nullptr, 0);
242 if ((errno != 0) || (val <= 0) || (val > UINT16_MAX))
243 return fail_at(arg, COMMAND_LINE_ERROR);
245 server->port = (DWORD)val;
247 CommandLineSwitchCase(arg,
"ipc-socket")
250 if (server->ipcSocket)
251 return fail_at(arg, COMMAND_LINE_ERROR);
252 server->ipcSocket = _strdup(arg->Value);
254 if (!server->ipcSocket)
255 return fail_at(arg, COMMAND_LINE_ERROR);
257 CommandLineSwitchCase(arg,
"bind-address")
260 size_t len = strlen(arg->Value) +
sizeof(bind_address);
262 if (server->ipcSocket)
263 return fail_at(arg, COMMAND_LINE_ERROR);
264 server->ipcSocket = calloc(len,
sizeof(CHAR));
266 if (!server->ipcSocket)
267 return fail_at(arg, COMMAND_LINE_ERROR);
269 rc = _snprintf(server->ipcSocket, len,
"%s%s", bind_address, arg->Value);
270 if ((rc < 0) || ((
size_t)rc != len - 1))
271 return fail_at(arg, COMMAND_LINE_ERROR);
273 CommandLineSwitchCase(arg,
"may-view")
275 server->mayView = arg->Value !=
nullptr;
277 CommandLineSwitchCase(arg,
"bitmap-compat")
279 server->SupportMultiRectBitmapUpdates = arg->Value ==
nullptr;
281 CommandLineSwitchCase(arg,
"may-interact")
283 server->mayInteract = arg->Value !=
nullptr;
285 CommandLineSwitchCase(arg,
"server-side-cursor")
287 server->ShowMouseCursor = arg->Value !=
nullptr;
289 CommandLineSwitchCase(arg,
"mouse-relative")
291 const BOOL val = arg->Value !=
nullptr;
294 return fail_at(arg, COMMAND_LINE_ERROR);
296 CommandLineSwitchCase(arg,
"max-connections")
299 unsigned long val = strtoul(arg->Value,
nullptr, 0);
301 if ((errno != 0) || (val > UINT32_MAX))
302 return fail_at(arg, COMMAND_LINE_ERROR);
303 server->maxClientsConnected = val;
305 CommandLineSwitchCase(arg,
"rect")
313 char* str = _strdup(arg->Value);
316 return fail_at(arg, COMMAND_LINE_ERROR);
319 p = strchr(p + 1,
',');
324 return fail_at(arg, COMMAND_LINE_ERROR);
329 p = strchr(p + 1,
',');
334 return fail_at(arg, COMMAND_LINE_ERROR);
339 p = strchr(p + 1,
',');
344 return fail_at(arg, COMMAND_LINE_ERROR);
349 x = strtol(tok[0],
nullptr, 0);
354 y = strtol(tok[1],
nullptr, 0);
359 w = strtol(tok[2],
nullptr, 0);
364 h = strtol(tok[3],
nullptr, 0);
372 if ((x < 0) || (y < 0) || (w < 1) || (h < 1) || (errno != 0))
373 return fail_at(arg, COMMAND_LINE_ERROR);
375 if ((x > UINT16_MAX) || (y > UINT16_MAX) || (x + w > UINT16_MAX) ||
376 (y + h > UINT16_MAX))
377 return fail_at(arg, COMMAND_LINE_ERROR);
378 server->subRect.left = (UINT16)x;
379 server->subRect.top = (UINT16)y;
380 server->subRect.right = (UINT16)(x + w);
381 server->subRect.bottom = (UINT16)(y + h);
382 server->shareSubRect = TRUE;
384 CommandLineSwitchCase(arg,
"auth")
386 server->authentication = arg->Value !=
nullptr;
388 CommandLineSwitchCase(arg,
"remote-guard")
391 arg->Value !=
nullptr))
392 return fail_at(arg, COMMAND_LINE_ERROR);
394 CommandLineSwitchCase(arg,
"restricted-admin")
397 arg->Value !=
nullptr))
398 return fail_at(arg, COMMAND_LINE_ERROR);
400 CommandLineSwitchCase(arg,
"vmconnect")
403 return fail_at(arg, COMMAND_LINE_ERROR);
405 CommandLineSwitchCase(arg,
"sec")
407 if (strcmp(
"rdp", arg->Value) == 0)
410 return fail_at(arg, COMMAND_LINE_ERROR);
412 return fail_at(arg, COMMAND_LINE_ERROR);
414 return fail_at(arg, COMMAND_LINE_ERROR);
416 return fail_at(arg, COMMAND_LINE_ERROR);
418 return fail_at(arg, COMMAND_LINE_ERROR);
420 else if (strcmp(
"tls", arg->Value) == 0)
423 return fail_at(arg, COMMAND_LINE_ERROR);
425 return fail_at(arg, COMMAND_LINE_ERROR);
427 return fail_at(arg, COMMAND_LINE_ERROR);
429 return fail_at(arg, COMMAND_LINE_ERROR);
431 else if (strcmp(
"nla", arg->Value) == 0)
434 return fail_at(arg, COMMAND_LINE_ERROR);
436 return fail_at(arg, COMMAND_LINE_ERROR);
438 return fail_at(arg, COMMAND_LINE_ERROR);
440 return fail_at(arg, COMMAND_LINE_ERROR);
442 else if (strcmp(
"ext", arg->Value) == 0)
445 return fail_at(arg, COMMAND_LINE_ERROR);
447 return fail_at(arg, COMMAND_LINE_ERROR);
449 return fail_at(arg, COMMAND_LINE_ERROR);
451 return fail_at(arg, COMMAND_LINE_ERROR);
455 WLog_ERR(TAG,
"unknown protocol security: %s", arg->Value);
456 return fail_at(arg, COMMAND_LINE_ERROR_UNEXPECTED_VALUE);
459 CommandLineSwitchCase(arg,
"sec-rdp")
462 return fail_at(arg, COMMAND_LINE_ERROR);
464 CommandLineSwitchCase(arg,
"sec-tls")
467 return fail_at(arg, COMMAND_LINE_ERROR);
469 CommandLineSwitchCase(arg,
"sec-nla")
472 return fail_at(arg, COMMAND_LINE_ERROR);
474 CommandLineSwitchCase(arg,
"sec-ext")
477 return fail_at(arg, COMMAND_LINE_ERROR);
479 CommandLineSwitchCase(arg,
"sam-file")
482 return fail_at(arg, COMMAND_LINE_ERROR);
484 CommandLineSwitchCase(arg,
"log-level")
486 wLog* root = WLog_GetRoot();
488 if (!WLog_SetStringLogLevel(root, arg->Value))
489 return fail_at(arg, COMMAND_LINE_ERROR);
491 CommandLineSwitchCase(arg,
"log-filters")
493 if (!WLog_AddStringLogFilters(arg->Value))
494 return fail_at(arg, COMMAND_LINE_ERROR);
496 CommandLineSwitchCase(arg,
"nsc")
499 return fail_at(arg, COMMAND_LINE_ERROR);
501 CommandLineSwitchCase(arg,
"rfx")
504 return fail_at(arg, COMMAND_LINE_ERROR);
506 CommandLineSwitchCase(arg,
"gfx")
509 arg->Value !=
nullptr))
510 return fail_at(arg, COMMAND_LINE_ERROR);
512 CommandLineSwitchCase(arg,
"gfx-progressive")
515 return fail_at(arg, COMMAND_LINE_ERROR);
517#if defined(WITH_GFX_AV1)
518 CommandLineSwitchCase(arg,
"gfx-av1")
520 BOOL parseFailed = FALSE;
526 char** args = CommandLineParseCommaSeparatedValues(arg->Value, &count);
527 WINPR_ASSERT(args || (count == 0));
528 for (
size_t x = 0; x < count; x++)
530 const char* cur = args[x];
531 if (strncmp(
"profile:", cur, 8) == 0)
533 const char* val = &cur[8];
534 if (strcmp(
"high", val) == 0)
536 else if (strcmp(
"low", val) == 0)
540 const unsigned long v = strtoul(val,
nullptr, 0);
541 if ((errno != 0) || (v >= UINT32_MAX))
547 profile = WINPR_ASSERTING_INT_CAST(UINT32, v);
550 else if (strcmp(
"off", cur) == 0)
560 CommandLineParserFree(args);
563 return fail_at(arg, COMMAND_LINE_ERROR);
565 return fail_at(arg, COMMAND_LINE_ERROR);
567 return fail_at(arg, COMMAND_LINE_ERROR);
570 CommandLineSwitchCase(arg,
"gfx-rfx")
573 return fail_at(arg, COMMAND_LINE_ERROR);
575 CommandLineSwitchCase(arg,
"gfx-planar")
578 return fail_at(arg, COMMAND_LINE_ERROR);
580 CommandLineSwitchCase(arg,
"gfx-avc420")
583 return fail_at(arg, COMMAND_LINE_ERROR);
585 CommandLineSwitchCase(arg,
"gfx-avc444")
588 return fail_at(arg, COMMAND_LINE_ERROR);
590 return fail_at(arg, COMMAND_LINE_ERROR);
592 CommandLineSwitchCase(arg,
"keytab")
595 return fail_at(arg, COMMAND_LINE_ERROR);
597 CommandLineSwitchCase(arg,
"ccache")
600 return fail_at(arg, COMMAND_LINE_ERROR);
602 CommandLineSwitchCase(arg,
"tls-secrets-file")
605 return fail_at(arg, COMMAND_LINE_ERROR);
607 CommandLineSwitchDefault(arg)
610 CommandLineSwitchEnd(arg)
611 }
while ((arg = CommandLineFindNextArgumentA(arg)) !=
nullptr);
613 arg = CommandLineFindArgumentA(cargs,
"monitors");
615 if (arg && (arg->Flags & COMMAND_LINE_ARGUMENT_PRESENT))
617 UINT32 numMonitors = 0;
619 numMonitors = shadow_enum_monitors(monitors, 16);
621 if (arg->Flags & COMMAND_LINE_VALUE_PRESENT)
624 long val = strtol(arg->Value,
nullptr, 0);
626 if ((val < 0) || (errno != 0) || ((UINT32)val >= numMonitors))
627 status = COMMAND_LINE_STATUS_PRINT;
629 server->selectedMonitor = (UINT32)val;
635 for (UINT32 index = 0; index < numMonitors; index++)
638 const INT64 width = monitor->right - monitor->left + 1;
639 const INT64 height = monitor->bottom - monitor->top + 1;
641 TAG,
" %s [%" PRIu32
"] %" PRId64
"x%" PRId64
"\t+%" PRId32
"+%" PRId32
"",
642 (monitor->flags == 1) ?
"*" :
" ", index, width, height, monitor->left,
646 status = COMMAND_LINE_STATUS_PRINT;
656 return COMMAND_LINE_ERROR;
662static DWORD WINAPI shadow_server_thread(LPVOID arg)
664 rdpShadowServer* server = (rdpShadowServer*)arg;
667 freerdp_listener* listener = server->listener;
668 if (shadow_subsystem_start(server->subsystem) < 0)
673 HANDLE events[MAXIMUM_WAIT_OBJECTS] = WINPR_C_ARRAY_INIT;
675 events[nCount++] = server->StopEvent;
676 nCount += listener->GetEventHandles(listener, &events[nCount], ARRAYSIZE(events) - nCount);
680 WLog_ERR(TAG,
"Failed to get FreeRDP file descriptor");
684 status = WaitForMultipleObjects(nCount, events, FALSE, INFINITE);
695 if (!listener->CheckFileDescriptor(listener))
697 WLog_ERR(TAG,
"Failed to check FreeRDP file descriptor");
711 listener->Close(listener);
712 shadow_subsystem_stop(server->subsystem);
716 if (shadow_client_boardcast_quit(server, 0))
718 while (ArrayList_Count(server->clients) > 0)
729static BOOL open_port(rdpShadowServer* server,
char* address)
732 char* modaddr = address;
736 if (modaddr[0] ==
'[')
738 char* end = strchr(address,
']');
741 WLog_ERR(TAG,
"Could not parse bind-address %s", address);
747 WLog_ERR(TAG,
"Excess data after IPv6 address: '%s'", end);
753 status = server->listener->Open(server->listener, modaddr, (UINT16)server->port);
758 "Problem creating TCP listener. (Port already used or insufficient permissions?)");
764int shadow_server_start(rdpShadowServer* server)
773 if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
777 (void)signal(SIGPIPE, SIG_IGN);
779 server->screen = shadow_screen_new(server);
783 WLog_ERR(TAG,
"screen_new failed");
787 server->capture = shadow_capture_new(server);
789 if (!server->capture)
791 WLog_ERR(TAG,
"capture_new failed");
801 ipc = server->ipcSocket && (strncmp(bind_address, server->ipcSocket,
802 strnlen(bind_address,
sizeof(bind_address))) != 0);
807 char** ptr = CommandLineParseCommaSeparatedValuesEx(
nullptr, server->ipcSocket, &count);
808 if (!ptr || (count <= 1))
810 if (server->ipcSocket ==
nullptr)
812 if (!open_port(server,
nullptr))
814 CommandLineParserFree(ptr);
820 CommandLineParserFree(ptr);
825 WINPR_ASSERT(ptr || (count == 0));
826 for (
size_t x = 1; x < count; x++)
828 BOOL success = open_port(server, ptr[x]);
831 CommandLineParserFree(ptr);
835 CommandLineParserFree(ptr);
839 status = server->listener->OpenLocal(server->listener, server->ipcSocket);
843 WLog_ERR(TAG,
"Problem creating local socket listener. (Port already used or "
844 "insufficient permissions?)");
849 if (!(server->thread =
850 CreateThread(
nullptr, 0, shadow_server_thread, (
void*)server, 0,
nullptr)))
858int shadow_server_stop(rdpShadowServer* server)
865 (void)SetEvent(server->StopEvent);
866 (void)WaitForSingleObject(server->thread, INFINITE);
867 (void)CloseHandle(server->thread);
868 server->thread =
nullptr;
869 if (server->listener && server->listener->Close)
870 server->listener->Close(server->listener);
875 shadow_screen_free(server->screen);
876 server->screen =
nullptr;
881 shadow_capture_free(server->capture);
882 server->capture =
nullptr;
889static int shadow_server_init_config_path(rdpShadowServer* server)
891 if (!server->ConfigPath)
897 if (!winpr_PathFileExists(configHome) && !winpr_PathMakePath(configHome,
nullptr))
899 WLog_ERR(TAG,
"Failed to create directory '%s'", configHome);
904 server->ConfigPath = configHome;
908 if (!server->ConfigPath)
915static BOOL shadow_server_create_certificate(rdpShadowServer* server,
const char* filepath)
918 char* makecert_argv[6] = {
"makecert",
"-rdp",
"-live",
"-silent",
"-y",
"5" };
920 WINPR_STATIC_ASSERT(ARRAYSIZE(makecert_argv) <= INT_MAX);
921 const size_t makecert_argc = ARRAYSIZE(makecert_argv);
923 MAKECERT_CONTEXT* makecert = makecert_context_new();
928 if (makecert_context_process(makecert, (
int)makecert_argc, makecert_argv) < 0)
931 if (makecert_context_set_output_file_name(makecert,
"shadow") != 1)
934 WINPR_ASSERT(server);
935 WINPR_ASSERT(filepath);
936 if (!winpr_PathFileExists(server->CertificateFile))
938 if (makecert_context_output_certificate_file(makecert, filepath) != 1)
942 if (!winpr_PathFileExists(server->PrivateKeyFile))
944 if (makecert_context_output_private_key_file(makecert, filepath) != 1)
949 makecert_context_free(makecert);
954static BOOL shadow_server_init_certificate(rdpShadowServer* server)
956 char* filepath =
nullptr;
959 WINPR_ASSERT(server);
961 if (!winpr_PathFileExists(server->ConfigPath) &&
962 !winpr_PathMakePath(server->ConfigPath,
nullptr))
964 WLog_ERR(TAG,
"Failed to create directory '%s'", server->ConfigPath);
968 if (!(filepath = GetCombinedPath(server->ConfigPath,
"shadow")))
971 if (!winpr_PathFileExists(filepath) && !winpr_PathMakePath(filepath,
nullptr))
973 if (!winpr_PathMakePath(filepath,
nullptr))
975 WLog_ERR(TAG,
"Failed to create directory '%s'", filepath);
980 server->CertificateFile = GetCombinedPath(filepath,
"shadow.crt");
981 server->PrivateKeyFile = GetCombinedPath(filepath,
"shadow.key");
983 if (!server->CertificateFile || !server->PrivateKeyFile)
986 if ((!winpr_PathFileExists(server->CertificateFile)) ||
987 (!winpr_PathFileExists(server->PrivateKeyFile)))
989 if (!shadow_server_create_certificate(server, filepath))
994 rdpSettings* settings = server->settings;
995 WINPR_ASSERT(settings);
998 rdpPrivateKey* key = freerdp_key_new_from_file_enc(server->PrivateKeyFile,
nullptr);
1005 rdpCertificate* cert = freerdp_certificate_new_from_file(server->CertificateFile);
1012 if (!freerdp_certificate_is_rdp_security_compatible(cert))
1029static BOOL shadow_server_check_peer_restrictions(freerdp_listener* listener)
1031 WINPR_ASSERT(listener);
1033 rdpShadowServer* server = (rdpShadowServer*)listener->info;
1034 WINPR_ASSERT(server);
1036 if (server->maxClientsConnected > 0)
1038 const size_t count = ArrayList_Count(server->clients);
1039 if (count >= server->maxClientsConnected)
1041 WLog_WARN(TAG,
"connection limit [%" PRIuz
"] reached, discarding client",
1042 server->maxClientsConnected);
1049int shadow_server_init(rdpShadowServer* server)
1052 if (!winpr_InitializeSSL(WINPR_SSL_INIT_DEFAULT))
1054 if (!WTSRegisterWtsApiFunctionTable(FreeRDP_InitWtsApi()))
1057 if (!(server->clients = ArrayList_New(TRUE)))
1060 if (!(server->StopEvent = CreateEvent(
nullptr, TRUE, FALSE,
nullptr)))
1063 if (!InitializeCriticalSectionAndSpinCount(&(server->lock), 4000))
1066 status = shadow_server_init_config_path(server);
1071 if (!shadow_server_init_certificate(server))
1074 server->listener = freerdp_listener_new();
1076 if (!server->listener)
1079 server->listener->info = (
void*)server;
1080 server->listener->CheckPeerAcceptRestrictions = shadow_server_check_peer_restrictions;
1081 server->listener->PeerAccepted = shadow_client_accepted;
1082 server->subsystem = shadow_subsystem_new();
1084 if (!server->subsystem)
1087 status = shadow_subsystem_init(server->subsystem, server);
1094 shadow_server_uninit(server);
1095 WLog_ERR(TAG,
"Failed to initialize shadow server");
1099int shadow_server_uninit(rdpShadowServer* server)
1104 shadow_server_stop(server);
1105 shadow_subsystem_uninit(server->subsystem);
1106 shadow_subsystem_free(server->subsystem);
1107 server->subsystem =
nullptr;
1108 freerdp_listener_free(server->listener);
1109 server->listener =
nullptr;
1110 free(server->CertificateFile);
1111 server->CertificateFile =
nullptr;
1112 free(server->PrivateKeyFile);
1113 server->PrivateKeyFile =
nullptr;
1114 free(server->ConfigPath);
1115 server->ConfigPath =
nullptr;
1116 DeleteCriticalSection(&(server->lock));
1117 (void)CloseHandle(server->StopEvent);
1118 server->StopEvent =
nullptr;
1119 ArrayList_Free(server->clients);
1120 server->clients =
nullptr;
1124rdpShadowServer* shadow_server_new(
void)
1126 rdpShadowServer* server =
nullptr;
1127 server = (rdpShadowServer*)calloc(1,
sizeof(rdpShadowServer));
1132 server->SupportMultiRectBitmapUpdates = TRUE;
1133 server->port = 3389;
1134 server->mayView = TRUE;
1135 server->mayInteract = TRUE;
1136 server->h264RateControlMode = H264_RATECONTROL_VBR;
1137 server->h264BitRate = 10000000;
1138 server->h264FrameRate = 30;
1140 server->authentication = TRUE;
1141#if defined(WITH_GFX_AV1)
1142 server->AV1BitRate = 500;
1143 server->AV1RateControlMode = FREERDP_AV1_VBR;
1149void shadow_server_free(rdpShadowServer* server)
1154 free(server->ipcSocket);
1155 server->ipcSocket =
nullptr;
1157 server->settings =
nullptr;
FREERDP_API rdpSettings * freerdp_settings_new(DWORD flags)
creates a new setting struct
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL val)
Sets a BOOL settings value.
WINPR_ATTR_NODISCARD FREERDP_API char * freerdp_settings_get_config_path(void)
return the configuration directory for the library
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 val)
Sets a UINT32 settings value.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_set_pointer_len(rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id, const void *data, size_t len)
Set a pointer to value data.
FREERDP_API void freerdp_settings_free(rdpSettings *settings)
Free a settings struct with all data in it.
#define FREERDP_SETTINGS_SERVER_MODE
WINPR_ATTR_NODISCARD FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_set_string(rdpSettings *settings, FreeRDP_Settings_Keys_String id, const char *val)
Sets a string settings value. The param is copied.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.