2003-03-27 14:22:29 +01:00
|
|
|
/* -*- c-basic-offset: 8 -*-
|
2000-05-10 09:36:34 +02:00
|
|
|
rdesktop: A Remote Desktop Protocol client.
|
|
|
|
Protocol services - RDP layer
|
2011-04-13 13:13:04 +02:00
|
|
|
Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008
|
2011-04-13 10:55:42 +02:00
|
|
|
Copyright 2003-2011 Peter Astrand <astrand@cendio.se> for Cendio AB
|
2018-01-26 12:17:59 +01:00
|
|
|
Copyright 2011-2018 Henrik Andersson <hean01@cendio.se> for Cendio AB
|
2019-02-01 09:21:32 +01:00
|
|
|
Copyright 2016 Alexander Zakharov <uglym8gmail.com>
|
2017-10-13 13:34:02 +02:00
|
|
|
Copyright 2017 Karl Mikaelsson <derfian@cendio.se> for Cendio AB
|
2003-07-03 00:02:23 +02:00
|
|
|
|
2010-01-12 09:31:06 +01:00
|
|
|
This program is free software: you can redistribute it and/or modify
|
2000-05-10 09:36:34 +02:00
|
|
|
it under the terms of the GNU General Public License as published by
|
2010-01-12 09:31:06 +01:00
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
2000-05-10 09:36:34 +02:00
|
|
|
(at your option) any later version.
|
2003-07-03 00:02:23 +02:00
|
|
|
|
2000-05-10 09:36:34 +02:00
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
2003-07-03 00:02:23 +02:00
|
|
|
|
2000-05-10 09:36:34 +02:00
|
|
|
You should have received a copy of the GNU General Public License
|
2010-01-12 09:31:06 +01:00
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2000-05-10 09:36:34 +02:00
|
|
|
*/
|
|
|
|
|
2003-12-11 18:20:01 +01:00
|
|
|
#include <time.h>
|
2017-01-19 16:12:12 +01:00
|
|
|
#include <iconv.h>
|
|
|
|
|
2007-01-04 05:55:56 +01:00
|
|
|
#ifndef _WIN32
|
2005-03-13 14:18:48 +01:00
|
|
|
#include <errno.h>
|
|
|
|
#include <unistd.h>
|
2007-01-04 05:55:56 +01:00
|
|
|
#endif
|
2000-08-15 12:23:24 +02:00
|
|
|
#include "rdesktop.h"
|
2010-01-12 15:52:04 +01:00
|
|
|
#include "ssl.h"
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2005-03-13 14:18:48 +01:00
|
|
|
|
2003-05-30 23:59:56 +02:00
|
|
|
extern uint16 g_mcs_userid;
|
2008-09-26 13:40:54 +02:00
|
|
|
extern char *g_username;
|
2014-04-24 14:02:40 +02:00
|
|
|
extern char g_password[64];
|
2005-03-13 14:18:48 +01:00
|
|
|
extern char g_codepage[16];
|
2007-01-08 05:47:06 +01:00
|
|
|
extern RD_BOOL g_orders;
|
|
|
|
extern RD_BOOL g_encryption;
|
|
|
|
extern RD_BOOL g_desktop_save;
|
|
|
|
extern RD_BOOL g_polygon_ellipse_orders;
|
2012-06-15 07:16:20 +02:00
|
|
|
extern RDP_VERSION g_rdp_version;
|
2003-08-01 19:01:58 +02:00
|
|
|
extern uint16 g_server_rdp_version;
|
2004-03-15 15:49:12 +01:00
|
|
|
extern uint32 g_rdp5_performanceflags;
|
2006-01-24 13:40:24 +01:00
|
|
|
extern int g_server_depth;
|
2018-01-10 15:41:12 +01:00
|
|
|
extern uint32 g_requested_session_width;
|
|
|
|
extern uint32 g_requested_session_height;
|
2007-01-08 05:47:06 +01:00
|
|
|
extern RD_BOOL g_bitmap_cache;
|
|
|
|
extern RD_BOOL g_bitmap_cache_persist_enable;
|
|
|
|
extern RD_BOOL g_numlock_sync;
|
2010-01-20 10:59:47 +01:00
|
|
|
extern RD_BOOL g_pending_resize;
|
2018-01-22 17:46:36 +01:00
|
|
|
extern RD_BOOL g_pending_resize_defer;
|
|
|
|
extern struct timeval g_pending_resize_defer_timer;
|
2013-04-12 08:46:07 +02:00
|
|
|
extern RD_BOOL g_network_error;
|
2017-11-14 09:39:39 +01:00
|
|
|
extern time_t g_wait_for_deactivate_ts;
|
|
|
|
|
2018-02-13 16:04:20 +01:00
|
|
|
extern RD_BOOL g_dynamic_session_resize;
|
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
RD_BOOL g_exit_mainloop = False;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2003-08-01 19:01:58 +02:00
|
|
|
uint8 *g_next_packet;
|
|
|
|
uint32 g_rdp_shareid;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2004-04-30 08:18:08 +02:00
|
|
|
extern RDPCOMP g_mppc_dict;
|
2004-04-27 14:55:33 +02:00
|
|
|
|
2016-11-13 12:55:02 +01:00
|
|
|
extern uint32 vc_chunk_size;
|
|
|
|
|
2005-08-08 21:15:57 +02:00
|
|
|
/* Session Directory support */
|
2007-01-08 05:47:06 +01:00
|
|
|
extern RD_BOOL g_redirect;
|
2013-11-26 12:26:49 +01:00
|
|
|
extern char *g_redirect_server;
|
2013-11-26 12:40:45 +01:00
|
|
|
extern uint32 g_redirect_server_len;
|
2013-12-06 13:43:08 +01:00
|
|
|
extern char *g_redirect_domain;
|
|
|
|
extern uint32 g_redirect_domain_len;
|
2008-09-26 13:40:54 +02:00
|
|
|
extern char *g_redirect_username;
|
2013-12-06 08:54:51 +01:00
|
|
|
extern uint32 g_redirect_username_len;
|
2013-11-26 08:56:04 +01:00
|
|
|
extern uint8 *g_redirect_lb_info;
|
|
|
|
extern uint32 g_redirect_lb_info_len;
|
2013-11-28 12:59:05 +01:00
|
|
|
extern uint8 *g_redirect_cookie;
|
|
|
|
extern uint32 g_redirect_cookie_len;
|
2005-08-08 21:15:57 +02:00
|
|
|
extern uint32 g_redirect_flags;
|
2013-11-28 12:33:50 +01:00
|
|
|
extern uint32 g_redirect_session_id;
|
|
|
|
|
2005-08-08 21:15:57 +02:00
|
|
|
/* END Session Directory support */
|
|
|
|
|
2010-01-12 11:34:38 +01:00
|
|
|
extern uint32 g_reconnect_logonid;
|
|
|
|
extern char g_reconnect_random[16];
|
2013-04-12 08:46:07 +02:00
|
|
|
extern time_t g_reconnect_random_ts;
|
2010-01-12 16:00:49 +01:00
|
|
|
extern RD_BOOL g_has_reconnect_random;
|
2010-01-12 11:34:38 +01:00
|
|
|
extern uint8 g_client_random[SEC_RANDOM_SIZE];
|
2003-08-01 19:01:58 +02:00
|
|
|
static uint32 g_packetno;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2018-02-13 10:22:23 +01:00
|
|
|
extern RD_BOOL g_fullscreen;
|
2017-11-14 09:39:39 +01:00
|
|
|
|
|
|
|
/* holds the actual session size reported by server */
|
|
|
|
uint16 g_session_width;
|
|
|
|
uint16 g_session_height;
|
|
|
|
|
2017-09-29 16:29:00 +02:00
|
|
|
static void rdp_out_unistr(STREAM s, char *string, int len);
|
|
|
|
|
2018-01-26 12:50:06 +01:00
|
|
|
/* reads a TS_SHARECONTROLHEADER from stream, returns True of there is
|
|
|
|
a PDU available otherwise False */
|
|
|
|
static RD_BOOL
|
2018-10-29 15:50:44 +01:00
|
|
|
rdp_ts_in_share_control_header(STREAM s, uint8 * type, uint16 * length)
|
2018-01-26 12:50:06 +01:00
|
|
|
{
|
|
|
|
uint16 pdu_type;
|
|
|
|
uint16 pdu_source;
|
|
|
|
|
|
|
|
UNUSED(pdu_source);
|
|
|
|
|
|
|
|
in_uint16_le(s, *length); /* totalLength */
|
|
|
|
|
|
|
|
/* If the totalLength field equals 0x8000, then the Share
|
|
|
|
Control Header and any data that follows MAY be interpreted
|
|
|
|
as a T.128 FlowPDU as described in [T128] section 8.5 (the
|
|
|
|
ASN.1 structure definition is detailed in [T128] section
|
|
|
|
9.1) and MUST be ignored.
|
2018-10-29 15:50:44 +01:00
|
|
|
*/
|
2018-01-26 12:50:06 +01:00
|
|
|
if (*length == 0x8000)
|
|
|
|
{
|
|
|
|
/* skip over this message in stream */
|
|
|
|
g_next_packet += 8;
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_uint16_le(s, pdu_type); /* pduType */
|
2018-10-29 15:50:44 +01:00
|
|
|
in_uint16(s, pdu_source); /* pduSource */
|
2018-01-26 12:50:06 +01:00
|
|
|
|
|
|
|
*type = pdu_type & 0xf;
|
|
|
|
|
|
|
|
return True;
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Receive an RDP packet */
|
2001-01-06 04:47:04 +01:00
|
|
|
static STREAM
|
2002-07-18 18:38:31 +02:00
|
|
|
rdp_recv(uint8 * type)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2018-01-26 12:17:59 +01:00
|
|
|
RD_BOOL is_fastpath;
|
2000-08-15 12:23:24 +02:00
|
|
|
static STREAM rdp_s;
|
2018-01-26 12:50:06 +01:00
|
|
|
uint16 length;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2018-01-26 12:50:06 +01:00
|
|
|
while (1)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2018-01-26 12:50:06 +01:00
|
|
|
/* fill stream with data if needed for parsing a new packet */
|
|
|
|
if ((rdp_s == NULL) || (g_next_packet >= rdp_s->end) || (g_next_packet == NULL))
|
|
|
|
{
|
|
|
|
rdp_s = sec_recv(&is_fastpath);
|
|
|
|
if (rdp_s == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (is_fastpath == True)
|
|
|
|
{
|
|
|
|
/* process_ts_fp_updates moves g_next_packet */
|
|
|
|
process_ts_fp_updates(rdp_s);
|
|
|
|
continue;
|
|
|
|
}
|
2018-01-26 12:17:59 +01:00
|
|
|
|
2018-01-26 12:50:06 +01:00
|
|
|
g_next_packet = rdp_s->p;
|
|
|
|
}
|
|
|
|
else
|
2004-07-05 21:09:07 +02:00
|
|
|
{
|
2018-01-26 12:50:06 +01:00
|
|
|
rdp_s->p = g_next_packet;
|
2004-07-05 21:09:07 +02:00
|
|
|
}
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-26 12:50:06 +01:00
|
|
|
/* parse a TS_SHARECONTROLHEADER */
|
|
|
|
if (rdp_ts_in_share_control_header(rdp_s, type, &length) == False)
|
|
|
|
continue;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-26 12:50:06 +01:00
|
|
|
break;
|
2002-12-10 18:24:27 +01:00
|
|
|
}
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "rdp_recv(), RDP packet #%d, type 0x%x", ++g_packetno, *type);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2003-08-01 19:01:58 +02:00
|
|
|
g_next_packet += length;
|
2000-08-15 12:23:24 +02:00
|
|
|
return rdp_s;
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Initialise an RDP data packet */
|
2001-01-06 04:47:04 +01:00
|
|
|
static STREAM
|
|
|
|
rdp_init_data(int maxlen)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2003-07-28 23:41:12 +02:00
|
|
|
s = sec_init(g_encryption ? SEC_ENCRYPT : 0, maxlen + 18);
|
2000-08-15 12:23:24 +02:00
|
|
|
s_push_layer(s, rdp_hdr, 18);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
return s;
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send an RDP data packet */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_send_data(STREAM s, uint8 data_pdu_type)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
uint16 length;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_pop_layer(s, rdp_hdr);
|
2019-04-09 13:13:35 +02:00
|
|
|
length = s_remaining(s);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, length);
|
|
|
|
out_uint16_le(s, (RDP_PDU_DATA | 0x10));
|
2003-05-30 23:59:56 +02:00
|
|
|
out_uint16_le(s, (g_mcs_userid + 1001));
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2003-08-01 19:01:58 +02:00
|
|
|
out_uint32_le(s, g_rdp_shareid);
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint8(s, 0); /* pad */
|
|
|
|
out_uint8(s, 1); /* streamid */
|
2002-09-17 11:55:03 +02:00
|
|
|
out_uint16_le(s, (length - 14));
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint8(s, data_pdu_type);
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint8(s, 0); /* compress_type */
|
|
|
|
out_uint16(s, 0); /* compress_len */
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2003-07-28 23:41:12 +02:00
|
|
|
sec_send(s, g_encryption ? SEC_ENCRYPT : 0);
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2017-01-20 10:32:46 +01:00
|
|
|
/* Output a string in Unicode with mandatory null termination. If
|
|
|
|
string is NULL or len is 0, write an unicode null termination to
|
|
|
|
stream. */
|
2017-09-29 16:29:00 +02:00
|
|
|
static void
|
2017-01-20 10:32:46 +01:00
|
|
|
rdp_out_unistr_mandatory_null(STREAM s, char *string, int len)
|
|
|
|
{
|
2017-09-29 14:24:27 +02:00
|
|
|
/* LEGACY:
|
|
|
|
*
|
|
|
|
* Do not write new code that uses this function, use the ones defined
|
|
|
|
* in stream.h for writing utf16 strings to a stream.
|
|
|
|
*
|
|
|
|
*/
|
2017-01-20 10:32:46 +01:00
|
|
|
if (string && len > 0)
|
|
|
|
rdp_out_unistr(s, string, len);
|
|
|
|
else
|
|
|
|
out_uint16_le(s, 0);
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output a string in Unicode */
|
2017-09-29 16:29:00 +02:00
|
|
|
static void
|
2001-01-06 04:47:04 +01:00
|
|
|
rdp_out_unistr(STREAM s, char *string, int len)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2017-09-29 14:24:27 +02:00
|
|
|
/* LEGACY:
|
|
|
|
*
|
|
|
|
* Do not write new code that uses this function, use the ones defined
|
|
|
|
* in stream.h for writing utf16 strings to a stream.
|
|
|
|
*
|
|
|
|
*/
|
2017-01-19 16:12:12 +01:00
|
|
|
static iconv_t icv_local_to_utf16;
|
|
|
|
size_t ibl, obl;
|
|
|
|
char *pin, *pout;
|
2014-08-27 14:15:21 +02:00
|
|
|
|
2005-03-13 14:18:48 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
if (string == NULL || len == 0)
|
|
|
|
return;
|
2005-03-13 14:18:48 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
// if not already open
|
|
|
|
if (!icv_local_to_utf16)
|
2005-03-13 14:18:48 +01:00
|
|
|
{
|
2017-01-19 16:12:12 +01:00
|
|
|
icv_local_to_utf16 = iconv_open(WINDOWS_CODEPAGE, g_codepage);
|
|
|
|
if (icv_local_to_utf16 == (iconv_t) - 1)
|
2005-03-13 14:18:48 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error, "rdo_out_unistr(), iconv_open[%s -> %s] fail %p",
|
|
|
|
g_codepage, WINDOWS_CODEPAGE, icv_local_to_utf16);
|
2017-01-19 16:12:12 +01:00
|
|
|
abort();
|
2005-03-13 14:18:48 +01:00
|
|
|
}
|
2017-01-19 16:12:12 +01:00
|
|
|
}
|
2005-03-13 14:18:48 +01:00
|
|
|
|
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
ibl = strlen(string);
|
|
|
|
obl = len + 2;
|
|
|
|
pin = string;
|
|
|
|
pout = (char *) s->p;
|
2005-03-13 14:18:48 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
memset(pout, 0, len + 4);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
if (iconv(icv_local_to_utf16, (char **) &pin, &ibl, &pout, &obl) == (size_t) - 1)
|
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error, "rdp_out_unistr(), iconv(2) fail, errno %d", errno);
|
2017-01-19 16:12:12 +01:00
|
|
|
abort();
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
2017-01-19 16:12:12 +01:00
|
|
|
|
|
|
|
s->p += len + 2;
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2004-01-21 15:40:40 +01:00
|
|
|
/* Input a string in Unicode
|
|
|
|
*
|
|
|
|
* Returns str_len of string
|
|
|
|
*/
|
2013-12-06 13:43:08 +01:00
|
|
|
void
|
2013-12-12 15:01:58 +01:00
|
|
|
rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size)
|
2004-01-21 15:40:40 +01:00
|
|
|
{
|
2017-01-19 16:12:12 +01:00
|
|
|
static iconv_t icv_utf16_to_local;
|
|
|
|
size_t ibl, obl;
|
|
|
|
char *pin, *pout;
|
2013-12-06 13:43:08 +01:00
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
struct stream packet = *s;
|
|
|
|
|
|
|
|
if ((in_len < 0) || ((uint32)in_len >= (RD_UINT32_MAX / 2)))
|
|
|
|
{
|
|
|
|
logger(Protocol, Error, "rdp_in_unistr(), length of unicode data is out of bounds.");
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!s_check_rem(s, in_len))
|
|
|
|
{
|
2019-04-09 14:02:42 +02:00
|
|
|
rdp_protocol_error("consume of unicode data from stream would overrun", &packet);
|
2019-01-16 10:45:33 +01:00
|
|
|
}
|
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
// if not already open
|
|
|
|
if (!icv_utf16_to_local)
|
2005-03-13 14:18:48 +01:00
|
|
|
{
|
2017-01-19 16:12:12 +01:00
|
|
|
icv_utf16_to_local = iconv_open(g_codepage, WINDOWS_CODEPAGE);
|
|
|
|
if (icv_utf16_to_local == (iconv_t) - 1)
|
2005-03-13 14:18:48 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error, "rdp_in_unistr(), iconv_open[%s -> %s] fail %p",
|
|
|
|
WINDOWS_CODEPAGE, g_codepage, icv_utf16_to_local);
|
2017-01-19 16:12:12 +01:00
|
|
|
abort();
|
2005-03-13 14:18:48 +01:00
|
|
|
}
|
2017-01-19 16:12:12 +01:00
|
|
|
}
|
2005-03-13 14:18:48 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
/* Dynamic allocate of destination string if not provided */
|
|
|
|
if (*string == NULL)
|
|
|
|
{
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
*string = xmalloc(in_len * 2);
|
|
|
|
*str_size = in_len * 2;
|
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
ibl = in_len;
|
|
|
|
obl = *str_size - 1;
|
|
|
|
pin = (char *) s->p;
|
|
|
|
pout = *string;
|
2013-12-06 13:43:08 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
if (iconv(icv_utf16_to_local, (char **) &pin, &ibl, &pout, &obl) == (size_t) - 1)
|
2005-03-14 19:02:24 +01:00
|
|
|
{
|
2017-01-19 16:12:12 +01:00
|
|
|
if (errno == E2BIG)
|
2008-01-05 06:43:02 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
|
|
|
"rdp_in_unistr(), server sent an unexpectedly long string, truncating");
|
2008-01-05 06:43:02 +01:00
|
|
|
}
|
2017-01-19 16:12:12 +01:00
|
|
|
else
|
2005-03-14 19:02:24 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning, "rdp_in_unistr(), iconv fail, errno %d", errno);
|
2005-03-14 19:02:24 +01:00
|
|
|
|
2017-01-19 16:12:12 +01:00
|
|
|
free(*string);
|
|
|
|
*string = NULL;
|
|
|
|
*str_size = 0;
|
|
|
|
}
|
|
|
|
abort();
|
2005-03-14 19:02:24 +01:00
|
|
|
}
|
2017-01-19 16:12:12 +01:00
|
|
|
|
|
|
|
/* we must update the location of the current STREAM for future reads of s->p */
|
|
|
|
s->p += in_len;
|
|
|
|
|
|
|
|
*pout = 0;
|
|
|
|
|
|
|
|
if (*string)
|
|
|
|
*str_size = pout - *string;
|
2004-01-21 15:40:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-12-08 11:21:49 +01:00
|
|
|
/* Send a Client Info PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2017-12-08 11:21:49 +01:00
|
|
|
rdp_send_client_info_pdu(uint32 flags, char *domain, char *user,
|
|
|
|
char *password, char *program, char *directory)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2004-03-04 09:11:40 +01:00
|
|
|
char *ipaddr = tcp_get_address();
|
2013-11-28 15:46:14 +01:00
|
|
|
/* length of string in TS_INFO_PACKET excludes null terminator */
|
2001-01-06 04:12:10 +01:00
|
|
|
int len_domain = 2 * strlen(domain);
|
|
|
|
int len_user = 2 * strlen(user);
|
|
|
|
int len_password = 2 * strlen(password);
|
|
|
|
int len_program = 2 * strlen(program);
|
2000-08-15 12:23:24 +02:00
|
|
|
int len_directory = 2 * strlen(directory);
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2013-11-28 15:47:29 +01:00
|
|
|
/* length of strings in TS_EXTENDED_PACKET includes null terminator */
|
2013-11-28 15:46:14 +01:00
|
|
|
int len_ip = 2 * strlen(ipaddr) + 2;
|
|
|
|
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll") + 2;
|
|
|
|
|
2003-05-05 14:20:53 +02:00
|
|
|
int packetlen = 0;
|
2017-03-07 15:32:14 +01:00
|
|
|
uint32 sec_flags = g_encryption ? (SEC_INFO_PKT | SEC_ENCRYPT) : SEC_INFO_PKT;
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2003-12-11 18:20:01 +01:00
|
|
|
time_t t = time(NULL);
|
|
|
|
time_t tzone;
|
2010-01-12 11:34:38 +01:00
|
|
|
uint8 security_verifier[16];
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2012-06-15 07:16:20 +02:00
|
|
|
if (g_rdp_version == RDP_V4 || 1 == g_server_rdp_version)
|
2003-03-27 14:22:29 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "rdp_send_logon_info(), sending RDP4-style Logon packet");
|
2003-03-27 14:22:29 +01:00
|
|
|
|
|
|
|
s = sec_init(sec_flags, 18 + len_domain + len_user + len_password
|
|
|
|
+ len_program + len_directory + 10);
|
|
|
|
|
|
|
|
out_uint32(s, 0);
|
|
|
|
out_uint32_le(s, flags);
|
|
|
|
out_uint16_le(s, len_domain);
|
|
|
|
out_uint16_le(s, len_user);
|
|
|
|
out_uint16_le(s, len_password);
|
|
|
|
out_uint16_le(s, len_program);
|
|
|
|
out_uint16_le(s, len_directory);
|
2016-10-14 13:27:09 +02:00
|
|
|
|
2017-01-20 10:32:46 +01:00
|
|
|
rdp_out_unistr_mandatory_null(s, domain, len_domain);
|
|
|
|
rdp_out_unistr_mandatory_null(s, user, len_user);
|
|
|
|
rdp_out_unistr_mandatory_null(s, password, len_password);
|
|
|
|
rdp_out_unistr_mandatory_null(s, program, len_program);
|
|
|
|
rdp_out_unistr_mandatory_null(s, directory, len_directory);
|
2003-03-27 14:22:29 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2004-04-27 14:55:33 +02:00
|
|
|
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "rdp_send_logon_info(), sending RDP5-style Logon packet");
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2013-12-04 12:52:33 +01:00
|
|
|
if (g_redirect == True && g_redirect_cookie_len > 0)
|
2013-11-28 16:13:04 +01:00
|
|
|
{
|
2018-04-17 16:57:05 +02:00
|
|
|
flags &= ~RDP_INFO_PASSWORD_IS_SC_PIN;
|
2017-05-15 08:36:41 +02:00
|
|
|
flags |= RDP_INFO_AUTOLOGON;
|
2013-11-28 16:13:04 +01:00
|
|
|
len_password = g_redirect_cookie_len;
|
2017-10-28 23:24:23 +02:00
|
|
|
len_password -= 2; /* subtract 2 bytes which is added below */
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Debug,
|
|
|
|
"rdp_send_logon_info(), Using %d bytes redirect cookie as password",
|
|
|
|
g_redirect_cookie_len);
|
2013-11-28 16:13:04 +01:00
|
|
|
}
|
|
|
|
|
2013-11-28 15:47:29 +01:00
|
|
|
packetlen =
|
2013-11-28 15:46:14 +01:00
|
|
|
/* size of TS_INFO_PACKET */
|
|
|
|
4 + /* CodePage */
|
2003-10-31 21:34:26 +01:00
|
|
|
4 + /* flags */
|
2013-11-28 15:46:14 +01:00
|
|
|
2 + /* cbDomain */
|
|
|
|
2 + /* cbUserName */
|
|
|
|
2 + /* cbPassword */
|
|
|
|
2 + /* cbAlternateShell */
|
|
|
|
2 + /* cbWorkingDir */
|
2013-11-28 15:47:29 +01:00
|
|
|
2 + len_domain + /* Domain */
|
|
|
|
2 + len_user + /* UserName */
|
|
|
|
2 + len_password + /* Password */
|
|
|
|
2 + len_program + /* AlternateShell */
|
|
|
|
2 + len_directory + /* WorkingDir */
|
2013-11-28 15:46:14 +01:00
|
|
|
/* size of TS_EXTENDED_INFO_PACKET */
|
2017-10-28 23:24:23 +02:00
|
|
|
2 + /* clientAddressFamily */
|
|
|
|
2 + /* cbClientAddress */
|
2013-11-28 15:47:29 +01:00
|
|
|
len_ip + /* clientAddress */
|
|
|
|
2 + /* cbClientDir */
|
|
|
|
len_dll + /* clientDir */
|
2013-11-28 15:46:14 +01:00
|
|
|
/* size of TS_TIME_ZONE_INFORMATION */
|
2013-11-28 15:47:29 +01:00
|
|
|
4 + /* Bias, (UTC = local time + bias */
|
|
|
|
64 + /* StandardName, 32 unicode char array, Descriptive standard time on client */
|
|
|
|
16 + /* StandardDate */
|
|
|
|
4 + /* StandardBias */
|
|
|
|
64 + /* DaylightName, 32 unicode char array */
|
|
|
|
16 + /* DaylightDate */
|
|
|
|
4 + /* DaylightBias */
|
|
|
|
4 + /* clientSessionId */
|
|
|
|
4 + /* performanceFlags */
|
|
|
|
2 + /* cbAutoReconnectCookie, either 0 or 0x001c */
|
2013-11-28 15:46:14 +01:00
|
|
|
/* size of ARC_CS_PRIVATE_PACKET */
|
2013-11-28 15:47:29 +01:00
|
|
|
28; /* autoReconnectCookie */
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2003-06-06 12:47:34 +02:00
|
|
|
|
|
|
|
s = sec_init(sec_flags, packetlen);
|
2017-01-26 14:19:40 +01:00
|
|
|
|
|
|
|
logger(Protocol, Debug, "rdp_send_logon_info(), called sec_init with packetlen %d",
|
|
|
|
packetlen);
|
2003-05-05 14:20:53 +02:00
|
|
|
|
2013-11-28 15:46:14 +01:00
|
|
|
/* TS_INFO_PACKET */
|
|
|
|
out_uint32(s, 0); /* Code Page */
|
2003-03-27 14:22:29 +01:00
|
|
|
out_uint32_le(s, flags);
|
|
|
|
out_uint16_le(s, len_domain);
|
|
|
|
out_uint16_le(s, len_user);
|
2013-11-28 15:46:14 +01:00
|
|
|
out_uint16_le(s, len_password);
|
2003-03-27 14:22:29 +01:00
|
|
|
out_uint16_le(s, len_program);
|
|
|
|
out_uint16_le(s, len_directory);
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2017-01-20 10:32:46 +01:00
|
|
|
rdp_out_unistr_mandatory_null(s, domain, len_domain);
|
|
|
|
rdp_out_unistr_mandatory_null(s, user, len_user);
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2017-01-20 10:32:46 +01:00
|
|
|
if (g_redirect == True && 0 < g_redirect_cookie_len)
|
2013-11-28 16:13:04 +01:00
|
|
|
{
|
2019-04-10 16:29:35 +02:00
|
|
|
out_uint8a(s, g_redirect_cookie, g_redirect_cookie_len);
|
2013-11-28 16:13:04 +01:00
|
|
|
}
|
2013-11-28 15:46:14 +01:00
|
|
|
else
|
2017-01-20 10:32:46 +01:00
|
|
|
{
|
|
|
|
rdp_out_unistr_mandatory_null(s, password, len_password);
|
|
|
|
}
|
2013-11-28 15:46:14 +01:00
|
|
|
|
|
|
|
|
2017-01-20 10:32:46 +01:00
|
|
|
rdp_out_unistr_mandatory_null(s, program, len_program);
|
|
|
|
rdp_out_unistr_mandatory_null(s, directory, len_directory);
|
2013-11-28 15:46:14 +01:00
|
|
|
|
2010-01-11 14:11:19 +01:00
|
|
|
/* TS_EXTENDED_INFO_PACKET */
|
2013-11-28 15:47:29 +01:00
|
|
|
out_uint16_le(s, 2); /* clientAddressFamily = AF_INET */
|
2017-01-20 10:32:46 +01:00
|
|
|
out_uint16_le(s, len_ip); /* cbClientAddress */
|
|
|
|
rdp_out_unistr_mandatory_null(s, ipaddr, len_ip - 2); /* clientAddress */
|
2013-11-28 15:47:29 +01:00
|
|
|
out_uint16_le(s, len_dll); /* cbClientDir */
|
2017-01-20 10:32:46 +01:00
|
|
|
rdp_out_unistr_mandatory_null(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll - 2); /* clientDir */
|
2010-01-11 14:11:19 +01:00
|
|
|
|
|
|
|
/* TS_TIME_ZONE_INFORMATION */
|
2004-02-14 20:30:01 +01:00
|
|
|
tzone = (mktime(gmtime(&t)) - mktime(localtime(&t))) / 60;
|
|
|
|
out_uint32_le(s, tzone);
|
2003-06-06 12:47:34 +02:00
|
|
|
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid"));
|
|
|
|
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid"));
|
2003-03-27 14:22:29 +01:00
|
|
|
out_uint32_le(s, 0x0a0000);
|
|
|
|
out_uint32_le(s, 0x050000);
|
2003-05-05 14:20:53 +02:00
|
|
|
out_uint32_le(s, 3);
|
|
|
|
out_uint32_le(s, 0);
|
|
|
|
out_uint32_le(s, 0);
|
2003-06-06 12:47:34 +02:00
|
|
|
rdp_out_unistr(s, "GTB, sommartid", 2 * strlen("GTB, sommartid"));
|
|
|
|
out_uint8s(s, 62 - 2 * strlen("GTB, sommartid"));
|
2003-05-05 14:20:53 +02:00
|
|
|
out_uint32_le(s, 0x30000);
|
2003-03-27 14:22:29 +01:00
|
|
|
out_uint32_le(s, 0x050000);
|
|
|
|
out_uint32_le(s, 2);
|
2003-04-16 10:19:15 +02:00
|
|
|
out_uint32(s, 0);
|
2010-01-12 08:50:36 +01:00
|
|
|
out_uint32_le(s, 0xffffffc4); /* DaylightBias */
|
2010-01-11 14:11:19 +01:00
|
|
|
|
|
|
|
/* Rest of TS_EXTENDED_INFO_PACKET */
|
2013-11-28 15:47:29 +01:00
|
|
|
out_uint32_le(s, 0); /* clientSessionId (Ignored by server MUST be 0) */
|
2004-03-15 15:49:12 +01:00
|
|
|
out_uint32_le(s, g_rdp5_performanceflags);
|
2003-05-05 14:20:53 +02:00
|
|
|
|
2010-01-12 11:34:38 +01:00
|
|
|
/* Client Auto-Reconnect */
|
2010-01-12 16:00:49 +01:00
|
|
|
if (g_has_reconnect_random)
|
|
|
|
{
|
2018-10-29 15:50:44 +01:00
|
|
|
logger(Protocol, Debug,
|
|
|
|
"rdp_send_logon_info(), Sending auto-reconnect cookie.");
|
2010-01-12 16:00:49 +01:00
|
|
|
out_uint16_le(s, 28); /* cbAutoReconnectLen */
|
|
|
|
/* ARC_CS_PRIVATE_PACKET */
|
|
|
|
out_uint32_le(s, 28); /* cbLen */
|
|
|
|
out_uint32_le(s, 1); /* Version */
|
|
|
|
out_uint32_le(s, g_reconnect_logonid); /* LogonId */
|
2012-07-02 13:36:39 +02:00
|
|
|
rdssl_hmac_md5(g_reconnect_random, sizeof(g_reconnect_random),
|
2012-10-23 13:38:27 +02:00
|
|
|
g_client_random, SEC_RANDOM_SIZE, security_verifier);
|
2010-01-12 16:00:49 +01:00
|
|
|
out_uint8a(s, security_verifier, sizeof(security_verifier));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
out_uint16_le(s, 0); /* cbAutoReconnectLen */
|
|
|
|
}
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
}
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
2013-12-04 12:52:33 +01:00
|
|
|
|
|
|
|
/* clear the redirect flag */
|
|
|
|
g_redirect = False;
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
sec_send(s, sec_flags);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send a control PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_send_control(uint16 action)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s = rdp_init_data(8);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, action);
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16(s, 0); /* userid */
|
|
|
|
out_uint32(s, 0); /* control id */
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, RDP_DATA_PDU_CONTROL);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send a synchronisation PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2002-09-24 09:59:14 +02:00
|
|
|
rdp_send_synchronise(void)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s = rdp_init_data(4);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16_le(s, 1); /* type */
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, 1002);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, RDP_DATA_PDU_SYNCHRONISE);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send a single input event */
|
2001-01-06 04:47:04 +01:00
|
|
|
void
|
2002-07-30 09:18:48 +02:00
|
|
|
rdp_send_input(uint32 time, uint16 message_type, uint16 device_flags, uint16 param1, uint16 param2)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s = rdp_init_data(16);
|
2000-07-07 11:40:03 +02:00
|
|
|
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16_le(s, 1); /* number of events */
|
|
|
|
out_uint16(s, 0); /* pad */
|
2000-07-07 11:40:03 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint32_le(s, time);
|
|
|
|
out_uint16_le(s, message_type);
|
|
|
|
out_uint16_le(s, device_flags);
|
|
|
|
out_uint16_le(s, param1);
|
|
|
|
out_uint16_le(s, param2);
|
2000-07-07 11:40:03 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, RDP_DATA_PDU_INPUT);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2017-10-27 14:58:20 +02:00
|
|
|
/* Send a Suppress Output PDU */
|
2005-05-21 00:09:32 +02:00
|
|
|
void
|
2017-10-27 14:58:20 +02:00
|
|
|
rdp_send_suppress_output_pdu(enum RDP_SUPPRESS_STATUS allowupdates)
|
2005-05-21 00:09:32 +02:00
|
|
|
{
|
|
|
|
STREAM s;
|
2017-11-03 12:49:11 +01:00
|
|
|
static enum RDP_SUPPRESS_STATUS current_status = ALLOW_DISPLAY_UPDATES;
|
2005-05-31 20:49:05 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2017-10-27 14:58:20 +02:00
|
|
|
if (current_status == allowupdates)
|
2005-05-31 20:49:05 +02:00
|
|
|
return;
|
2005-05-21 00:09:32 +02:00
|
|
|
|
|
|
|
s = rdp_init_data(12);
|
|
|
|
|
2017-10-27 14:58:20 +02:00
|
|
|
out_uint8(s, allowupdates); /* allowDisplayUpdates */
|
|
|
|
out_uint8s(s, 3); /* pad3Octets */
|
2005-05-21 00:09:32 +02:00
|
|
|
|
2017-10-27 14:58:20 +02:00
|
|
|
switch (allowupdates)
|
2005-05-21 00:09:32 +02:00
|
|
|
{
|
2017-10-27 14:58:20 +02:00
|
|
|
case SUPPRESS_DISPLAY_UPDATES: /* shut the server up */
|
2005-05-21 00:09:32 +02:00
|
|
|
break;
|
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
case ALLOW_DISPLAY_UPDATES: /* receive data again */
|
2017-11-14 09:39:39 +01:00
|
|
|
out_uint16_le(s, 0); /* left */
|
|
|
|
out_uint16_le(s, 0); /* top */
|
|
|
|
out_uint16_le(s, g_session_width); /* right */
|
|
|
|
out_uint16_le(s, g_session_height); /* bottom */
|
2005-05-21 00:09:32 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, RDP_DATA_PDU_CLIENT_WINDOW_STATUS);
|
2017-10-27 14:58:20 +02:00
|
|
|
current_status = allowupdates;
|
2005-05-21 00:09:32 +02:00
|
|
|
}
|
|
|
|
|
2017-10-28 23:24:23 +02:00
|
|
|
/* Send persistent bitmap cache enumeration PDUs */
|
2004-06-27 19:51:54 +02:00
|
|
|
static void
|
|
|
|
rdp_enum_bmpcache2(void)
|
|
|
|
{
|
|
|
|
STREAM s;
|
2005-03-08 01:23:02 +01:00
|
|
|
HASH_KEY keylist[BMPCACHE2_NUM_PSTCELLS];
|
|
|
|
uint32 num_keys, offset, count, flags;
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
offset = 0;
|
2005-03-08 01:23:02 +01:00
|
|
|
num_keys = pstcache_enumerate(2, keylist);
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2005-03-08 01:23:02 +01:00
|
|
|
while (offset < num_keys)
|
2004-06-27 19:51:54 +02:00
|
|
|
{
|
2005-03-08 01:23:02 +01:00
|
|
|
count = MIN(num_keys - offset, 169);
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2005-03-08 01:23:02 +01:00
|
|
|
s = rdp_init_data(24 + count * sizeof(HASH_KEY));
|
2004-06-27 19:51:54 +02:00
|
|
|
|
|
|
|
flags = 0;
|
|
|
|
if (offset == 0)
|
|
|
|
flags |= PDU_FLAG_FIRST;
|
2005-03-08 01:23:02 +01:00
|
|
|
if (num_keys - offset <= 169)
|
2004-06-27 19:51:54 +02:00
|
|
|
flags |= PDU_FLAG_LAST;
|
|
|
|
|
|
|
|
/* header */
|
|
|
|
out_uint32_le(s, 0);
|
|
|
|
out_uint16_le(s, count);
|
|
|
|
out_uint16_le(s, 0);
|
|
|
|
out_uint16_le(s, 0);
|
|
|
|
out_uint16_le(s, 0);
|
|
|
|
out_uint16_le(s, 0);
|
2005-03-08 01:23:02 +01:00
|
|
|
out_uint16_le(s, num_keys);
|
2004-06-27 19:51:54 +02:00
|
|
|
out_uint32_le(s, 0);
|
|
|
|
out_uint32_le(s, flags);
|
|
|
|
|
|
|
|
/* list */
|
2005-03-08 01:23:02 +01:00
|
|
|
out_uint8a(s, keylist[offset], count * sizeof(HASH_KEY));
|
2004-06-27 19:51:54 +02:00
|
|
|
|
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, 0x2b);
|
|
|
|
|
|
|
|
offset += 169;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send an (empty) font information PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_send_fonts(uint16 seq)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s = rdp_init_data(8);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16(s, 0); /* number of fonts */
|
2004-04-26 15:48:39 +02:00
|
|
|
out_uint16_le(s, 0); /* pad? */
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, seq); /* unknown */
|
|
|
|
out_uint16_le(s, 0x32); /* entry size */
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
|
|
|
rdp_send_data(s, RDP_DATA_PDU_FONT2);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2017-10-12 11:27:45 +02:00
|
|
|
/* Output general capability set (TS_GENERAL_CAPABILITYSET) */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2017-10-12 11:27:45 +02:00
|
|
|
rdp_out_ts_general_capabilityset(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2017-10-12 11:27:45 +02:00
|
|
|
uint16 extraFlags = 0;
|
|
|
|
if (g_rdp_version >= RDP_V5)
|
|
|
|
{
|
|
|
|
extraFlags |= NO_BITMAP_COMPRESSION_HDR;
|
|
|
|
extraFlags |= AUTORECONNECT_SUPPORTED;
|
|
|
|
extraFlags |= LONG_CREDENTIALS_SUPPORTED;
|
|
|
|
extraFlags |= FASTPATH_OUTPUT_SUPPORTED;
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_GENERAL);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_GENERAL);
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, OSMAJORTYPE_WINDOWS); /* osMajorType */
|
2017-10-12 11:27:45 +02:00
|
|
|
out_uint16_le(s, OSMINORTYPE_WINDOWSNT); /* osMinorType */
|
|
|
|
out_uint16_le(s, TS_CAPS_PROTOCOLVERSION); /* protocolVersion (must be TS_CAPS_PROTOCOLVERSION) */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2OctetsA */
|
|
|
|
out_uint16_le(s, 0); /* generalCompressionTypes (must be 0) */
|
|
|
|
out_uint16_le(s, extraFlags); /* extraFlags */
|
|
|
|
out_uint16_le(s, 0); /* updateCapabilityFlag (must be 0) */
|
|
|
|
out_uint16_le(s, 0); /* remoteUnshareFlag (must be 0) */
|
|
|
|
out_uint16_le(s, 0); /* generalCompressionLevel (must be 0) */
|
|
|
|
out_uint8(s, 0); /* refreshRectSupport */
|
|
|
|
out_uint8(s, 0); /* suppressOutputSupport */
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output bitmap capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2017-10-12 12:50:18 +02:00
|
|
|
rdp_out_ts_bitmap_capabilityset(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2017-11-14 09:39:39 +01:00
|
|
|
logger(Protocol, Debug, "rdp_out_ts_bitmap_capabilityset(), %dx%d",
|
|
|
|
g_session_width, g_session_height);
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_BITMAP);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_BITMAP);
|
2017-10-12 12:50:18 +02:00
|
|
|
out_uint16_le(s, g_server_depth); /* preferredBitsPerPixel */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 1); /* receive1BitPerPixel (ignored, should be 1) */
|
|
|
|
out_uint16_le(s, 1); /* receive4BitPerPixel (ignored, should be 1) */
|
|
|
|
out_uint16_le(s, 1); /* receive8BitPerPixel (ignored, should be 1) */
|
2017-11-14 09:39:39 +01:00
|
|
|
out_uint16_le(s, g_session_width); /* desktopWidth */
|
|
|
|
out_uint16_le(s, g_session_height); /* desktopHeight */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2Octets */
|
|
|
|
out_uint16_le(s, 1); /* desktopResizeFlag */
|
|
|
|
out_uint16_le(s, 1); /* bitmapCompressionFlag (must be 1) */
|
|
|
|
out_uint8(s, 0); /* highColorFlags (ignored, should be 0) */
|
|
|
|
out_uint8(s, 0); /* drawingFlags */
|
|
|
|
out_uint16_le(s, 1); /* multipleRectangleSupport (must be 1) */
|
|
|
|
out_uint16_le(s, 0); /* pad2OctetsB */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output order capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2017-10-12 12:50:18 +02:00
|
|
|
rdp_out_ts_order_capabilityset(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
uint8 order_caps[32];
|
2017-10-12 12:50:18 +02:00
|
|
|
uint16 orderflags = 0;
|
|
|
|
uint32 cachesize = 0;
|
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
orderflags |= (NEGOTIATEORDERSUPPORT | ZEROBOUNDSDELTASSUPPORT); /* mandatory flags */
|
2017-10-12 12:50:18 +02:00
|
|
|
orderflags |= COLORINDEXSUPPORT;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2001-06-20 15:54:48 +02:00
|
|
|
memset(order_caps, 0, 32);
|
2017-10-12 12:50:18 +02:00
|
|
|
|
|
|
|
order_caps[TS_NEG_DSTBLT_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_PATBLT_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_SCRBLT_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_LINETO_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_MULTI_DRAWNINEGRID_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_POLYLINE_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_INDEX_INDEX] = 1;
|
|
|
|
|
|
|
|
if (g_bitmap_cache)
|
|
|
|
order_caps[TS_NEG_MEMBLT_INDEX] = 1;
|
|
|
|
|
|
|
|
if (g_desktop_save)
|
|
|
|
{
|
|
|
|
cachesize = 230400;
|
|
|
|
order_caps[TS_NEG_SAVEBITMAP_INDEX] = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_polygon_ellipse_orders)
|
|
|
|
{
|
|
|
|
order_caps[TS_NEG_POLYGON_SC_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_POLYGON_CB_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_ELLIPSE_SC_INDEX] = 1;
|
|
|
|
order_caps[TS_NEG_ELLIPSE_CB_INDEX] = 1;
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_ORDER);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_ORDER);
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint8s(s, 16); /* terminalDescriptor (ignored, should be 0) */
|
|
|
|
out_uint8s(s, 4); /* pad4OctetsA */
|
|
|
|
out_uint16_le(s, 1); /* desktopSaveXGranularity (ignored, assumed to be 1) */
|
|
|
|
out_uint16_le(s, 20); /* desktopSaveYGranularity (ignored, assumed to be 20) */
|
|
|
|
out_uint16_le(s, 0); /* Pad */
|
|
|
|
out_uint16_le(s, 1); /* maximumOrderLevel (ignored, should be 1) */
|
|
|
|
out_uint16_le(s, 0); /* numberFonts (ignored, should be 0) */
|
2017-10-12 12:50:18 +02:00
|
|
|
out_uint16_le(s, orderflags); /* orderFlags */
|
2019-04-10 16:29:35 +02:00
|
|
|
out_uint8a(s, order_caps, 32); /* orderSupport */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* textFlags (ignored) */
|
|
|
|
out_uint16_le(s, 0); /* orderSupportExFlags */
|
|
|
|
out_uint32_le(s, 0); /* pad4OctetsB */
|
2017-10-12 12:50:18 +02:00
|
|
|
out_uint32_le(s, cachesize); /* desktopSaveSize */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2OctetsC */
|
|
|
|
out_uint16_le(s, 0); /* pad2OctetsD */
|
|
|
|
out_uint16_le(s, 1252); /* textANSICodePage */
|
|
|
|
out_uint16_le(s, 0); /* pad2OctetsE */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output bitmap cache capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_bmpcache_caps(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2003-07-03 00:02:23 +02:00
|
|
|
int Bpp;
|
2018-01-29 13:24:15 +01:00
|
|
|
|
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_BMPCACHE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_BMPCACHE);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2006-01-24 13:40:24 +01:00
|
|
|
Bpp = (g_server_depth + 7) / 8; /* bytes per pixel */
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint8s(s, 24); /* unused */
|
|
|
|
out_uint16_le(s, 0x258); /* entries */
|
2003-07-03 00:02:23 +02:00
|
|
|
out_uint16_le(s, 0x100 * Bpp); /* max cell size */
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16_le(s, 0x12c); /* entries */
|
2003-07-03 00:02:23 +02:00
|
|
|
out_uint16_le(s, 0x400 * Bpp); /* max cell size */
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16_le(s, 0x106); /* entries */
|
2003-07-03 00:02:23 +02:00
|
|
|
out_uint16_le(s, 0x1000 * Bpp); /* max cell size */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
/* Output bitmap cache v2 capability set */
|
|
|
|
static void
|
|
|
|
rdp_out_bmpcache2_caps(STREAM s)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, RDP_CAPSET_BMPCACHE2);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_BMPCACHE2);
|
|
|
|
|
2004-06-29 18:22:41 +02:00
|
|
|
out_uint16_le(s, g_bitmap_cache_persist_enable ? 2 : 0); /* version */
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2005-04-18 01:14:20 +02:00
|
|
|
out_uint16_be(s, 3); /* number of caches in this set */
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2005-04-18 01:14:20 +02:00
|
|
|
/* max cell size for cache 0 is 16x16, 1 = 32x32, 2 = 64x64, etc */
|
2004-06-27 19:51:54 +02:00
|
|
|
out_uint32_le(s, BMPCACHE2_C0_CELLS);
|
|
|
|
out_uint32_le(s, BMPCACHE2_C1_CELLS);
|
|
|
|
if (pstcache_init(2))
|
|
|
|
{
|
|
|
|
out_uint32_le(s, BMPCACHE2_NUM_PSTCELLS | BMPCACHE2_FLAG_PERSIST);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
out_uint32_le(s, BMPCACHE2_C2_CELLS);
|
|
|
|
}
|
2004-07-12 23:07:39 +02:00
|
|
|
out_uint8s(s, 20); /* other bitmap caches not used */
|
2004-06-27 19:51:54 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output control capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_control_caps(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_CONTROL);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_CONTROL);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16(s, 0); /* Control capabilities */
|
|
|
|
out_uint16(s, 0); /* Remote detach */
|
|
|
|
out_uint16_le(s, 2); /* Control interest */
|
|
|
|
out_uint16_le(s, 2); /* Detach interest */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output activation capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_activate_caps(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_ACTIVATE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_ACTIVATE);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16(s, 0); /* Help key */
|
|
|
|
out_uint16(s, 0); /* Help index key */
|
|
|
|
out_uint16(s, 0); /* Extended help key */
|
|
|
|
out_uint16(s, 0); /* Window activate */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output pointer capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_pointer_caps(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_POINTER);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_POINTER);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16(s, 0); /* Colour pointer */
|
|
|
|
out_uint16_le(s, 20); /* Cache size */
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2009-10-25 22:36:17 +01:00
|
|
|
/* Output new pointer capability set */
|
|
|
|
static void
|
|
|
|
rdp_out_newpointer_caps(STREAM s)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, RDP_CAPSET_POINTER);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_NEWPOINTER);
|
|
|
|
|
|
|
|
out_uint16_le(s, 1); /* Colour pointer */
|
|
|
|
out_uint16_le(s, 20); /* Cache size */
|
|
|
|
out_uint16_le(s, 20); /* Cache size for new pointers */
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output share capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_share_caps(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_SHARE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_SHARE);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16(s, 0); /* userid */
|
|
|
|
out_uint16(s, 0); /* pad */
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Output colour cache capability set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
rdp_out_colcache_caps(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, RDP_CAPSET_COLCACHE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_COLCACHE);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, 6); /* cache size */
|
|
|
|
out_uint16(s, 0); /* pad */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2008-07-11 05:35:24 +02:00
|
|
|
/* Output brush cache capability set */
|
|
|
|
static void
|
|
|
|
rdp_out_brushcache_caps(STREAM s)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, RDP_CAPSET_BRUSHCACHE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_BRUSHCACHE);
|
|
|
|
out_uint32_le(s, 1); /* cache type */
|
|
|
|
}
|
|
|
|
|
2016-11-13 12:55:02 +01:00
|
|
|
/* 2.2.7.1.10 MS-RDPBCGR */
|
|
|
|
/* Output virtual channel capability set */
|
|
|
|
static void
|
|
|
|
rdp_out_virtchan_caps(STREAM s)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, RDP_CAPSET_VC);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_VC);
|
|
|
|
/* VCCAPS_COMPR_SC */
|
|
|
|
out_uint32_le(s, 0x00000001); /* compression flags */
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rdp_process_virtchan_caps(STREAM s)
|
|
|
|
{
|
|
|
|
uint32 flags, chunk_size;
|
|
|
|
|
|
|
|
in_uint32_le(s, flags);
|
|
|
|
in_uint32_le(s, chunk_size);
|
|
|
|
|
2019-04-10 11:10:56 +02:00
|
|
|
UNUSED(flags);
|
2016-11-13 12:55:02 +01:00
|
|
|
vc_chunk_size = chunk_size;
|
|
|
|
}
|
|
|
|
|
2017-10-13 13:34:02 +02:00
|
|
|
/* Output Input Capability Set */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2017-10-13 13:34:02 +02:00
|
|
|
rdp_out_ts_input_capabilityset(STREAM s)
|
2000-08-15 12:23:24 +02:00
|
|
|
{
|
2017-10-13 13:34:02 +02:00
|
|
|
uint16 inputflags = 0;
|
|
|
|
inputflags |= INPUT_FLAG_SCANCODES;
|
|
|
|
|
|
|
|
out_uint16_le(s, RDP_CAPSET_INPUT);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_INPUT);
|
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, inputflags); /* inputFlags */
|
|
|
|
out_uint16_le(s, 0); /* pad2OctetsA */
|
|
|
|
out_uint32_le(s, 0x409); /* keyboardLayout */
|
|
|
|
out_uint32_le(s, 0x4); /* keyboardType */
|
|
|
|
out_uint32_le(s, 0); /* keyboardSubtype */
|
|
|
|
out_uint32_le(s, 0xC); /* keyboardFunctionKey */
|
2017-10-13 13:34:02 +02:00
|
|
|
out_utf16s_padded(s, "", 64, 0); /* imeFileName */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Output Sound Capability Set */
|
|
|
|
static void
|
|
|
|
rdp_out_ts_sound_capabilityset(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 soundflags = SOUND_BEEPS_FLAG;
|
|
|
|
|
|
|
|
out_uint16_le(s, RDP_CAPSET_SOUND);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_SOUND);
|
|
|
|
|
|
|
|
out_uint16_le(s, soundflags); /* soundFlags */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2OctetsA */
|
2017-10-13 13:34:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Output Font Capability Set */
|
|
|
|
static void
|
|
|
|
rdp_out_ts_font_capabilityset(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 flags = FONTSUPPORT_FONTLIST;
|
|
|
|
|
|
|
|
out_uint16_le(s, RDP_CAPSET_FONT);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_FONT);
|
|
|
|
|
|
|
|
out_uint16_le(s, flags); /* fontSupportFlags */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2octets */
|
2017-10-13 13:34:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rdp_out_ts_cache_definition(STREAM s, uint16 entries, uint16 maxcellsize)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, entries);
|
|
|
|
out_uint16_le(s, maxcellsize);
|
|
|
|
}
|
2001-01-06 04:12:10 +01:00
|
|
|
|
2017-10-13 13:34:02 +02:00
|
|
|
/* Output Glyph Cache Capability Set */
|
|
|
|
static void
|
|
|
|
rdp_out_ts_glyphcache_capabilityset(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 supportlvl = GLYPH_SUPPORT_FULL;
|
|
|
|
uint32 fragcache = 0x01000100;
|
|
|
|
out_uint16_le(s, RDP_CAPSET_GLYPHCACHE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_GLYPHCACHE);
|
|
|
|
|
|
|
|
/* GlyphCache - 10 TS_CACHE_DEFINITION structures */
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 4);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 4);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 8);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 8);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 16);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 32);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 64);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 128);
|
|
|
|
rdp_out_ts_cache_definition(s, 254, 256);
|
|
|
|
rdp_out_ts_cache_definition(s, 64, 2048);
|
|
|
|
|
|
|
|
out_uint32_le(s, fragcache); /* FragCache */
|
|
|
|
out_uint16_le(s, supportlvl); /* GlyphSupportLevel */
|
2018-10-29 15:50:44 +01:00
|
|
|
out_uint16_le(s, 0); /* pad2octets */
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2017-10-13 14:35:48 +02:00
|
|
|
static void
|
|
|
|
rdp_out_ts_multifragmentupdate_capabilityset(STREAM s)
|
|
|
|
{
|
|
|
|
out_uint16_le(s, RDP_CAPSET_MULTIFRAGMENTUPDATE);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_MULTIFRAGMENTUPDATE);
|
|
|
|
out_uint32_le(s, RDESKTOP_FASTPATH_MULTIFRAGMENT_MAX_SIZE); /* MaxRequestSize */
|
|
|
|
}
|
|
|
|
|
2017-10-16 12:54:17 +02:00
|
|
|
static void
|
|
|
|
rdp_out_ts_large_pointer_capabilityset(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 flags = LARGE_POINTER_FLAG_96x96;
|
|
|
|
|
|
|
|
out_uint16_le(s, RDP_CAPSET_LARGE_POINTER);
|
|
|
|
out_uint16_le(s, RDP_CAPLEN_LARGE_POINTER);
|
|
|
|
out_uint16_le(s, flags); /* largePointerSupportFlags */
|
|
|
|
}
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
#define RDP5_FLAG 0x0030
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Send a confirm active PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
2002-09-24 09:59:14 +02:00
|
|
|
rdp_send_confirm_active(void)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
STREAM s;
|
2003-07-28 23:41:12 +02:00
|
|
|
uint32 sec_flags = g_encryption ? (RDP5_FLAG | SEC_ENCRYPT) : RDP5_FLAG;
|
2001-01-06 04:12:10 +01:00
|
|
|
uint16 caplen =
|
2017-10-13 14:34:01 +02:00
|
|
|
RDP_CAPLEN_GENERAL +
|
|
|
|
RDP_CAPLEN_BITMAP +
|
|
|
|
RDP_CAPLEN_ORDER +
|
2009-10-25 22:36:17 +01:00
|
|
|
RDP_CAPLEN_COLCACHE +
|
2017-10-13 14:34:01 +02:00
|
|
|
RDP_CAPLEN_ACTIVATE +
|
|
|
|
RDP_CAPLEN_CONTROL +
|
2009-10-25 22:36:17 +01:00
|
|
|
RDP_CAPLEN_SHARE +
|
2017-10-13 14:34:01 +02:00
|
|
|
RDP_CAPLEN_BRUSHCACHE +
|
|
|
|
RDP_CAPLEN_INPUT +
|
|
|
|
RDP_CAPLEN_FONT +
|
|
|
|
RDP_CAPLEN_SOUND +
|
|
|
|
RDP_CAPLEN_GLYPHCACHE +
|
2017-10-13 14:35:48 +02:00
|
|
|
RDP_CAPLEN_MULTIFRAGMENTUPDATE +
|
2016-11-13 12:55:02 +01:00
|
|
|
RDP_CAPLEN_LARGE_POINTER +
|
|
|
|
RDP_CAPLEN_VC + 4 /* w2k fix, sessionid */ ;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2012-06-15 07:16:20 +02:00
|
|
|
if (g_rdp_version >= RDP_V5)
|
2009-10-25 22:36:17 +01:00
|
|
|
{
|
|
|
|
caplen += RDP_CAPLEN_BMPCACHE2;
|
|
|
|
caplen += RDP_CAPLEN_NEWPOINTER;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
caplen += RDP_CAPLEN_BMPCACHE;
|
|
|
|
caplen += RDP_CAPLEN_POINTER;
|
|
|
|
}
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
s = sec_init(sec_flags, 6 + 14 + caplen + sizeof(RDP_SOURCE));
|
|
|
|
|
|
|
|
out_uint16_le(s, 2 + 14 + caplen + sizeof(RDP_SOURCE));
|
|
|
|
out_uint16_le(s, (RDP_PDU_CONFIRM_ACTIVE | 0x10)); /* Version 1 */
|
2003-05-30 23:59:56 +02:00
|
|
|
out_uint16_le(s, (g_mcs_userid + 1001));
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2003-08-01 19:01:58 +02:00
|
|
|
out_uint32_le(s, g_rdp_shareid);
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint16_le(s, 0x3ea); /* userid */
|
2000-08-15 12:23:24 +02:00
|
|
|
out_uint16_le(s, sizeof(RDP_SOURCE));
|
|
|
|
out_uint16_le(s, caplen);
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2019-04-10 16:29:35 +02:00
|
|
|
out_uint8a(s, RDP_SOURCE, sizeof(RDP_SOURCE));
|
2016-11-13 12:55:02 +01:00
|
|
|
out_uint16_le(s, 17); /* num_caps */
|
2001-01-06 04:12:10 +01:00
|
|
|
out_uint8s(s, 2); /* pad */
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2017-10-12 11:27:45 +02:00
|
|
|
rdp_out_ts_general_capabilityset(s);
|
2017-10-12 12:50:18 +02:00
|
|
|
rdp_out_ts_bitmap_capabilityset(s);
|
|
|
|
rdp_out_ts_order_capabilityset(s);
|
2012-06-15 07:16:20 +02:00
|
|
|
if (g_rdp_version >= RDP_V5)
|
2009-10-25 22:36:17 +01:00
|
|
|
{
|
|
|
|
rdp_out_bmpcache2_caps(s);
|
|
|
|
rdp_out_newpointer_caps(s);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rdp_out_bmpcache_caps(s);
|
|
|
|
rdp_out_pointer_caps(s);
|
|
|
|
}
|
2000-08-15 12:23:24 +02:00
|
|
|
rdp_out_colcache_caps(s);
|
|
|
|
rdp_out_activate_caps(s);
|
|
|
|
rdp_out_control_caps(s);
|
|
|
|
rdp_out_share_caps(s);
|
2008-07-11 05:35:24 +02:00
|
|
|
rdp_out_brushcache_caps(s);
|
2016-11-13 12:55:02 +01:00
|
|
|
rdp_out_virtchan_caps(s);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2017-10-13 13:34:02 +02:00
|
|
|
rdp_out_ts_input_capabilityset(s);
|
|
|
|
rdp_out_ts_sound_capabilityset(s);
|
|
|
|
rdp_out_ts_font_capabilityset(s);
|
|
|
|
rdp_out_ts_glyphcache_capabilityset(s);
|
2017-10-13 14:35:48 +02:00
|
|
|
rdp_out_ts_multifragmentupdate_capabilityset(s);
|
2017-10-16 12:54:17 +02:00
|
|
|
rdp_out_ts_large_pointer_capabilityset(s);
|
2004-07-12 23:07:39 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
s_mark_end(s);
|
2003-03-27 14:22:29 +01:00
|
|
|
sec_send(s, sec_flags);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
/* Process a general capability set */
|
|
|
|
static void
|
|
|
|
rdp_process_general_caps(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 pad2octetsB; /* rdp5 flags? */
|
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
in_uint8s(s, 10);
|
|
|
|
in_uint16_le(s, pad2octetsB);
|
|
|
|
|
|
|
|
if (!pad2octetsB)
|
2012-06-15 07:16:20 +02:00
|
|
|
g_rdp_version = RDP_V4;
|
2004-04-26 15:48:39 +02:00
|
|
|
}
|
|
|
|
|
2018-02-13 16:04:20 +01:00
|
|
|
static RD_BOOL g_first_bitmap_caps = True;
|
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
/* Process a bitmap capability set */
|
|
|
|
static void
|
|
|
|
rdp_process_bitmap_caps(STREAM s)
|
|
|
|
{
|
2018-02-13 16:04:20 +01:00
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
uint16 depth;
|
2004-04-26 15:48:39 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2006-01-24 13:40:24 +01:00
|
|
|
in_uint16_le(s, depth);
|
2004-04-26 15:48:39 +02:00
|
|
|
in_uint8s(s, 6);
|
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
in_uint16_le(s, g_session_width);
|
|
|
|
in_uint16_le(s, g_session_height);
|
2004-04-26 15:48:39 +02:00
|
|
|
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug,
|
2017-11-14 09:39:39 +01:00
|
|
|
"rdp_process_bitmap_caps(), setting desktop size and depth to: %dx%dx%d",
|
|
|
|
g_session_width, g_session_height, depth);
|
2004-04-26 15:48:39 +02:00
|
|
|
|
2018-02-13 16:04:20 +01:00
|
|
|
/* Detect if we can have dynamic session resize enabled, only once. */
|
|
|
|
if (g_first_bitmap_caps == True && !(g_session_width == g_requested_session_width
|
2018-10-29 15:50:44 +01:00
|
|
|
&& g_session_height == g_requested_session_height))
|
2018-02-13 16:04:20 +01:00
|
|
|
{
|
|
|
|
logger(Core, Notice, "Disabling dynamic session resize");
|
|
|
|
g_dynamic_session_resize = False;
|
|
|
|
}
|
|
|
|
g_first_bitmap_caps = False;
|
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
/*
|
2006-01-24 13:40:24 +01:00
|
|
|
* The server may limit depth and change the size of the desktop (for
|
2004-04-26 15:48:39 +02:00
|
|
|
* example when shadowing another session).
|
|
|
|
*/
|
2006-01-24 13:40:24 +01:00
|
|
|
if (g_server_depth != depth)
|
2004-06-04 17:01:36 +02:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Core, Verbose,
|
|
|
|
"Remote desktop does not support colour depth %d; falling back to %d",
|
|
|
|
g_server_depth, depth);
|
2006-01-24 13:40:24 +01:00
|
|
|
g_server_depth = depth;
|
2004-06-04 17:01:36 +02:00
|
|
|
}
|
2017-11-14 09:39:39 +01:00
|
|
|
|
2018-02-13 10:22:23 +01:00
|
|
|
/* Resize window size to match session size, except when we're in
|
|
|
|
fullscreen, where we want the window to always cover the entire
|
|
|
|
screen. */
|
|
|
|
|
|
|
|
if (g_fullscreen == True)
|
|
|
|
return;
|
|
|
|
|
2018-02-13 16:04:20 +01:00
|
|
|
/* If dynamic session resize is disabled, set window size hints to
|
|
|
|
fixed session size */
|
|
|
|
if (g_dynamic_session_resize == False)
|
|
|
|
{
|
|
|
|
ui_update_window_sizehints(g_session_width, g_session_height);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
ui_resize_window(g_session_width, g_session_height);
|
2004-04-26 15:48:39 +02:00
|
|
|
}
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
/* Process server capabilities */
|
2005-08-02 11:29:41 +02:00
|
|
|
static void
|
2004-06-27 19:51:54 +02:00
|
|
|
rdp_process_server_caps(STREAM s, uint16 length)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2004-04-26 15:48:39 +02:00
|
|
|
int n;
|
2004-06-27 19:51:54 +02:00
|
|
|
uint8 *next, *start;
|
|
|
|
uint16 ncapsets, capset_type, capset_length;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
start = s->p;
|
2004-04-26 15:48:39 +02:00
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
in_uint16_le(s, ncapsets);
|
2004-04-26 15:48:39 +02:00
|
|
|
in_uint8s(s, 2); /* pad */
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
for (n = 0; n < ncapsets; n++)
|
2004-04-16 00:03:24 +02:00
|
|
|
{
|
2004-06-27 19:51:54 +02:00
|
|
|
if (s->p > start + length)
|
|
|
|
return;
|
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
in_uint16_le(s, capset_type);
|
|
|
|
in_uint16_le(s, capset_length);
|
|
|
|
|
|
|
|
next = s->p + capset_length - 4;
|
|
|
|
|
|
|
|
switch (capset_type)
|
2004-04-16 00:03:24 +02:00
|
|
|
{
|
2004-04-26 15:48:39 +02:00
|
|
|
case RDP_CAPSET_GENERAL:
|
|
|
|
rdp_process_general_caps(s);
|
|
|
|
break;
|
2004-04-16 00:03:24 +02:00
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
case RDP_CAPSET_BITMAP:
|
|
|
|
rdp_process_bitmap_caps(s);
|
|
|
|
break;
|
2016-11-13 12:55:02 +01:00
|
|
|
case RDP_CAPSET_VC:
|
|
|
|
/* Parse only if we got VCChunkSize */
|
|
|
|
if (capset_length > 8) {
|
|
|
|
rdp_process_virtchan_caps(s);
|
|
|
|
}
|
|
|
|
break;
|
2004-04-26 15:48:39 +02:00
|
|
|
}
|
2004-04-16 00:03:24 +02:00
|
|
|
|
2004-04-26 15:48:39 +02:00
|
|
|
s->p = next;
|
|
|
|
}
|
2004-06-27 19:51:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Respond to a demand active PDU */
|
|
|
|
static void
|
|
|
|
process_demand_active(STREAM s)
|
|
|
|
{
|
|
|
|
uint8 type;
|
|
|
|
uint16 len_src_descriptor, len_combined_caps;
|
2019-01-16 10:45:33 +01:00
|
|
|
struct stream packet = *s;
|
2004-06-27 19:51:54 +02:00
|
|
|
|
2013-08-14 15:49:45 +02:00
|
|
|
/* at this point we need to ensure that we have ui created */
|
|
|
|
rd_create_ui();
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
in_uint32_le(s, g_rdp_shareid);
|
|
|
|
in_uint16_le(s, len_src_descriptor);
|
|
|
|
in_uint16_le(s, len_combined_caps);
|
2019-01-16 10:45:33 +01:00
|
|
|
|
|
|
|
if (!s_check_rem(s, len_src_descriptor))
|
|
|
|
{
|
2019-04-09 14:02:42 +02:00
|
|
|
rdp_protocol_error("consume of source descriptor from stream would overrun", &packet);
|
2019-01-16 10:45:33 +01:00
|
|
|
}
|
2004-06-27 19:51:54 +02:00
|
|
|
in_uint8s(s, len_src_descriptor);
|
|
|
|
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "process_demand_active(), shareid=0x%x", g_rdp_shareid);
|
|
|
|
|
2004-06-27 19:51:54 +02:00
|
|
|
rdp_process_server_caps(s, len_combined_caps);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
rdp_send_confirm_active();
|
|
|
|
rdp_send_synchronise();
|
|
|
|
rdp_send_control(RDP_CTL_COOPERATE);
|
|
|
|
rdp_send_control(RDP_CTL_REQUEST_CONTROL);
|
2001-06-20 15:54:48 +02:00
|
|
|
rdp_recv(&type); /* RDP_PDU_SYNCHRONIZE */
|
|
|
|
rdp_recv(&type); /* RDP_CTL_COOPERATE */
|
|
|
|
rdp_recv(&type); /* RDP_CTL_GRANT_CONTROL */
|
2006-04-07 16:41:34 +02:00
|
|
|
rdp_send_input(0, RDP_INPUT_SYNCHRONIZE, 0,
|
|
|
|
g_numlock_sync ? ui_get_numlock_state(read_keyboard_state()) : 0, 0);
|
2004-04-26 15:48:39 +02:00
|
|
|
|
2012-06-15 07:16:20 +02:00
|
|
|
if (g_rdp_version >= RDP_V5)
|
2004-04-26 15:48:39 +02:00
|
|
|
{
|
2004-06-27 19:51:54 +02:00
|
|
|
rdp_enum_bmpcache2();
|
2004-04-26 15:48:39 +02:00
|
|
|
rdp_send_fonts(3);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rdp_send_fonts(1);
|
|
|
|
rdp_send_fonts(2);
|
|
|
|
}
|
|
|
|
|
|
|
|
rdp_recv(&type); /* RDP_PDU_UNKNOWN 0x28 (Fonts?) */
|
2000-08-15 12:23:24 +02:00
|
|
|
reset_order_state();
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
/* Process a colour pointer PDU */
|
2009-10-25 22:36:17 +01:00
|
|
|
static void
|
|
|
|
process_colour_pointer_common(STREAM s, int bpp)
|
2003-03-27 14:22:29 +01:00
|
|
|
{
|
2017-10-26 04:22:35 +02:00
|
|
|
extern RD_BOOL g_local_cursor;
|
2009-10-25 22:36:17 +01:00
|
|
|
uint16 width, height, cache_idx, masklen, datalen;
|
2014-05-20 08:27:09 +02:00
|
|
|
uint16 x, y;
|
2010-01-07 19:52:26 +01:00
|
|
|
uint8 *mask;
|
|
|
|
uint8 *data;
|
2007-01-04 05:55:56 +01:00
|
|
|
RD_HCURSOR cursor;
|
2003-03-27 14:22:29 +01:00
|
|
|
|
|
|
|
in_uint16_le(s, cache_idx);
|
|
|
|
in_uint16_le(s, x);
|
|
|
|
in_uint16_le(s, y);
|
|
|
|
in_uint16_le(s, width);
|
|
|
|
in_uint16_le(s, height);
|
|
|
|
in_uint16_le(s, masklen);
|
|
|
|
in_uint16_le(s, datalen);
|
|
|
|
in_uint8p(s, data, datalen);
|
|
|
|
in_uint8p(s, mask, masklen);
|
2017-10-16 12:54:17 +02:00
|
|
|
|
|
|
|
logger(Protocol, Debug,
|
|
|
|
"process_colour_pointer_common(), new pointer %d with width %d and height %d",
|
|
|
|
cache_idx, width, height);
|
2014-05-20 08:27:09 +02:00
|
|
|
|
|
|
|
/* keep hotspot within cursor bounding box */
|
2009-10-25 22:36:17 +01:00
|
|
|
x = MIN(x, width - 1);
|
|
|
|
y = MIN(y, height - 1);
|
2018-10-29 15:50:44 +01:00
|
|
|
if (g_local_cursor)
|
|
|
|
return; /* don't bother creating a cursor we won't use */
|
2009-10-25 22:36:17 +01:00
|
|
|
cursor = ui_create_cursor(x, y, width, height, mask, data, bpp);
|
2003-03-27 14:22:29 +01:00
|
|
|
ui_set_cursor(cursor);
|
|
|
|
cache_put_cursor(cache_idx, cursor);
|
|
|
|
}
|
|
|
|
|
2009-10-25 22:36:17 +01:00
|
|
|
/* Process a colour pointer PDU */
|
|
|
|
void
|
|
|
|
process_colour_pointer_pdu(STREAM s)
|
|
|
|
{
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2009-10-25 22:36:17 +01:00
|
|
|
process_colour_pointer_common(s, 24);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Process a New Pointer PDU - these pointers have variable bit depth */
|
2010-01-07 19:52:26 +01:00
|
|
|
void
|
2009-10-25 22:36:17 +01:00
|
|
|
process_new_pointer_pdu(STREAM s)
|
|
|
|
{
|
|
|
|
int xor_bpp;
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2009-10-25 22:36:17 +01:00
|
|
|
|
|
|
|
in_uint16_le(s, xor_bpp);
|
|
|
|
process_colour_pointer_common(s, xor_bpp);
|
|
|
|
}
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
/* Process a cached pointer PDU */
|
|
|
|
void
|
|
|
|
process_cached_pointer_pdu(STREAM s)
|
|
|
|
{
|
|
|
|
uint16 cache_idx;
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
|
|
|
|
in_uint16_le(s, cache_idx);
|
|
|
|
ui_set_cursor(cache_get_cursor(cache_idx));
|
|
|
|
}
|
|
|
|
|
2003-10-22 12:55:11 +02:00
|
|
|
/* Process a system pointer PDU */
|
|
|
|
void
|
|
|
|
process_system_pointer_pdu(STREAM s)
|
|
|
|
{
|
2017-10-13 13:37:37 +02:00
|
|
|
uint32 system_pointer_type;
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2017-10-13 13:37:37 +02:00
|
|
|
in_uint32_le(s, system_pointer_type);
|
2003-10-22 12:55:11 +02:00
|
|
|
|
2017-10-13 13:37:37 +02:00
|
|
|
set_system_pointer(system_pointer_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set a given system pointer */
|
|
|
|
void
|
|
|
|
set_system_pointer(uint32 ptr)
|
|
|
|
{
|
|
|
|
switch (ptr)
|
2003-10-22 12:55:11 +02:00
|
|
|
{
|
2017-10-13 13:37:37 +02:00
|
|
|
case SYSPTR_NULL:
|
2003-10-22 12:55:11 +02:00
|
|
|
ui_set_null_cursor();
|
|
|
|
break;
|
2017-10-16 13:55:39 +02:00
|
|
|
case SYSPTR_DEFAULT:
|
|
|
|
ui_set_standard_cursor();
|
|
|
|
break;
|
2003-10-22 12:55:11 +02:00
|
|
|
default:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
2018-10-29 15:50:44 +01:00
|
|
|
"set_system_pointer(), unhandled pointer type 0x%x", ptr);
|
2003-10-22 12:55:11 +02:00
|
|
|
}
|
|
|
|
}
|
2003-03-27 14:22:29 +01:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Process a pointer PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
process_pointer_pdu(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
uint16 message_type;
|
2003-03-27 14:22:29 +01:00
|
|
|
uint16 x, y;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
in_uint16_le(s, message_type);
|
2001-01-06 04:12:10 +01:00
|
|
|
in_uint8s(s, 2); /* pad */
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
switch (message_type)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_POINTER_MOVE:
|
|
|
|
in_uint16_le(s, x);
|
|
|
|
in_uint16_le(s, y);
|
2019-04-04 14:58:15 +02:00
|
|
|
ui_move_pointer(x, y);
|
2000-08-15 12:23:24 +02:00
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2001-06-20 15:54:48 +02:00
|
|
|
case RDP_POINTER_COLOR:
|
2003-03-27 14:22:29 +01:00
|
|
|
process_colour_pointer_pdu(s);
|
2001-06-20 15:54:48 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case RDP_POINTER_CACHED:
|
2003-03-27 14:22:29 +01:00
|
|
|
process_cached_pointer_pdu(s);
|
2001-06-20 15:54:48 +02:00
|
|
|
break;
|
|
|
|
|
2003-10-22 12:55:11 +02:00
|
|
|
case RDP_POINTER_SYSTEM:
|
|
|
|
process_system_pointer_pdu(s);
|
|
|
|
break;
|
|
|
|
|
2009-10-25 22:36:17 +01:00
|
|
|
case RDP_POINTER_NEW:
|
|
|
|
process_new_pointer_pdu(s);
|
|
|
|
break;
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
default:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
|
|
|
"process_pointer_pdu(), unhandled message type 0x%x", message_type);
|
2000-08-15 12:23:24 +02:00
|
|
|
}
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
/* Process TS_BITMAP_DATA */
|
|
|
|
static void
|
|
|
|
process_bitmap_data(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
uint16 left, top, right, bottom, width, height;
|
2019-01-16 10:45:33 +01:00
|
|
|
uint16 cx, cy, bpp, Bpp, flags, bufsize, size;
|
2001-06-20 15:54:48 +02:00
|
|
|
uint8 *data, *bmpdata;
|
2019-01-16 10:45:33 +01:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
struct stream packet = *s;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
in_uint16_le(s, left); /* destLeft */
|
|
|
|
in_uint16_le(s, top); /* destTop */
|
|
|
|
in_uint16_le(s, right); /* destRight */
|
|
|
|
in_uint16_le(s, bottom); /* destBottom */
|
|
|
|
in_uint16_le(s, width); /* width */
|
|
|
|
in_uint16_le(s, height); /* height */
|
|
|
|
in_uint16_le(s, bpp); /*bitsPerPixel */
|
|
|
|
Bpp = (bpp + 7) / 8;
|
|
|
|
in_uint16_le(s, flags); /* flags */
|
|
|
|
in_uint16_le(s, bufsize); /* bitmapLength */
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
cx = right - left + 1;
|
|
|
|
cy = bottom - top + 1;
|
2003-03-27 14:22:29 +01:00
|
|
|
|
2019-01-16 10:45:33 +01:00
|
|
|
/* FIXME: There are a assumtion that we do not consider in
|
|
|
|
this code. The value of bpp is not passed to
|
|
|
|
ui_paint_bitmap() which relies on g_server_bpp for drawing
|
|
|
|
the bitmap data.
|
|
|
|
|
|
|
|
Does this means that we can sanity check bpp with g_server_bpp ?
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (Bpp == 0 || width == 0 || height == 0)
|
|
|
|
{
|
|
|
|
logger(Protocol, Warning, "%s(), [%d,%d,%d,%d], [%d,%d], bpp=%d, flags=%x", __func__,
|
|
|
|
left, top, right, bottom, width, height, bpp, flags);
|
|
|
|
rdp_protocol_error("TS_BITMAP_DATA, unsafe size of bitmap data received from server", &packet);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((RD_UINT32_MAX / Bpp) <= (width * height))
|
|
|
|
{
|
|
|
|
logger(Protocol, Warning, "%s(), [%d,%d,%d,%d], [%d,%d], bpp=%d, flags=%x", __func__,
|
|
|
|
left, top, right, bottom, width, height, bpp, flags);
|
|
|
|
rdp_protocol_error("TS_BITMAP_DATA, unsafe size of bitmap data received from server", &packet);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (flags == 0)
|
|
|
|
{
|
|
|
|
/* read uncompressed bitmap data */
|
|
|
|
int y;
|
2003-06-06 12:47:34 +02:00
|
|
|
bmpdata = (uint8 *) xmalloc(width * height * Bpp);
|
2019-01-16 10:45:33 +01:00
|
|
|
for (y = 0; y < height; y++)
|
2000-08-15 12:23:24 +02:00
|
|
|
{
|
2019-01-16 10:45:33 +01:00
|
|
|
in_uint8a(s, &bmpdata[(height - y - 1) * (width * Bpp)], width * Bpp);
|
2000-08-15 12:23:24 +02:00
|
|
|
}
|
2019-01-16 10:45:33 +01:00
|
|
|
|
|
|
|
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata);
|
2001-06-20 15:54:48 +02:00
|
|
|
xfree(bmpdata);
|
2019-01-16 10:45:33 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (flags & NO_BITMAP_COMPRESSION_HDR)
|
|
|
|
{
|
|
|
|
size = bufsize;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Read TS_CD_HEADER */
|
|
|
|
in_uint8s(s, 2); /* skip cbCompFirstRowSize (must be 0x0000) */
|
|
|
|
in_uint16_le(s, size); /* cbCompMainBodySize */
|
|
|
|
in_uint8s(s, 2); /* skip cbScanWidth */
|
|
|
|
in_uint8s(s, 2); /* skip cbUncompressedSize */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* read compressed bitmap data */
|
|
|
|
if (!s_check_rem(s, size))
|
|
|
|
{
|
2019-04-09 14:02:42 +02:00
|
|
|
rdp_protocol_error("consume of bitmap data from stream would overrun", &packet);
|
2019-01-16 10:45:33 +01:00
|
|
|
}
|
|
|
|
in_uint8p(s, data, size);
|
|
|
|
bmpdata = (uint8 *) xmalloc(width * height * Bpp);
|
|
|
|
if (bitmap_decompress(bmpdata, width, height, data, size, Bpp))
|
|
|
|
{
|
|
|
|
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
logger(Protocol, Warning, "%s(), failed to decompress bitmap", __func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
xfree(bmpdata);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Process TS_UPDATE_BITMAP_DATA */
|
|
|
|
void
|
|
|
|
process_bitmap_updates(STREAM s)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
uint16 num_updates;
|
|
|
|
|
|
|
|
in_uint16_le(s, num_updates); /* rectangles */
|
|
|
|
|
|
|
|
for (i = 0; i < num_updates; i++)
|
|
|
|
{
|
|
|
|
process_bitmap_data(s);
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
}
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Process a palette update */
|
2003-03-27 14:22:29 +01:00
|
|
|
void
|
2001-01-06 04:47:04 +01:00
|
|
|
process_palette(STREAM s)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2002-11-05 12:22:20 +01:00
|
|
|
COLOURENTRY *entry;
|
2000-08-15 12:23:24 +02:00
|
|
|
COLOURMAP map;
|
2007-01-04 05:55:56 +01:00
|
|
|
RD_HCOLOURMAP hmap;
|
2002-11-05 12:22:20 +01:00
|
|
|
int i;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2001-01-06 04:12:10 +01:00
|
|
|
in_uint8s(s, 2); /* pad */
|
|
|
|
in_uint16_le(s, map.ncolours);
|
|
|
|
in_uint8s(s, 2); /* pad */
|
2002-11-05 12:22:20 +01:00
|
|
|
|
2003-07-28 20:13:30 +02:00
|
|
|
map.colours = (COLOURENTRY *) xmalloc(sizeof(COLOURENTRY) * map.ncolours);
|
2002-11-05 12:22:20 +01:00
|
|
|
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Graphics, Debug, "process_palette(), colour count %d", map.ncolours);
|
2003-03-27 14:22:29 +01:00
|
|
|
|
2002-11-05 12:22:20 +01:00
|
|
|
for (i = 0; i < map.ncolours; i++)
|
|
|
|
{
|
|
|
|
entry = &map.colours[i];
|
|
|
|
in_uint8(s, entry->red);
|
|
|
|
in_uint8(s, entry->green);
|
|
|
|
in_uint8(s, entry->blue);
|
2002-11-18 16:31:19 +01:00
|
|
|
}
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
hmap = ui_create_colourmap(&map);
|
|
|
|
ui_set_colourmap(hmap);
|
2002-11-05 12:22:20 +01:00
|
|
|
|
|
|
|
xfree(map.colours);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Process an update PDU */
|
2001-01-06 04:47:04 +01:00
|
|
|
static void
|
|
|
|
process_update_pdu(STREAM s)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2003-03-27 14:22:29 +01:00
|
|
|
uint16 update_type, count;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
in_uint16_le(s, update_type);
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2004-06-16 05:08:55 +02:00
|
|
|
ui_begin_update();
|
2000-08-15 12:23:24 +02:00
|
|
|
switch (update_type)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_UPDATE_ORDERS:
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s(), RDP_UPDATE_ORDERS", __func__);
|
|
|
|
|
2003-03-27 14:22:29 +01:00
|
|
|
in_uint8s(s, 2); /* pad */
|
|
|
|
in_uint16_le(s, count);
|
|
|
|
in_uint8s(s, 2); /* pad */
|
|
|
|
process_orders(s, count);
|
2000-08-15 12:23:24 +02:00
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_UPDATE_BITMAP:
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s(), RDP_UPDATE_BITMAP", __func__);
|
2000-08-15 12:23:24 +02:00
|
|
|
process_bitmap_updates(s);
|
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_UPDATE_PALETTE:
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s(), RDP_UPDATE_PALETTE", __func__);
|
2000-08-15 12:23:24 +02:00
|
|
|
process_palette(s);
|
|
|
|
break;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_UPDATE_SYNCHRONIZE:
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s(), RDP_UPDATE_SYNCHRONIZE", __func__);
|
2000-08-15 12:23:24 +02:00
|
|
|
break;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
default:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning, "process_update_pdu(), unhandled update type %d",
|
|
|
|
update_type);
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
2004-06-16 05:08:55 +02:00
|
|
|
ui_end_update();
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
/* Process TS_LOGIN_INFO_EXTENDED data structure */
|
|
|
|
static void
|
|
|
|
process_ts_logon_info_extended(STREAM s)
|
2010-01-12 11:34:38 +01:00
|
|
|
{
|
2017-10-31 10:49:51 +01:00
|
|
|
uint32 fieldspresent;
|
|
|
|
uint32 len;
|
|
|
|
uint32 version;
|
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
in_uint8s(s, 2); /* Length */
|
|
|
|
in_uint32_le(s, fieldspresent);
|
|
|
|
if (fieldspresent & LOGON_EX_AUTORECONNECTCOOKIE)
|
2010-01-12 11:34:38 +01:00
|
|
|
{
|
2017-10-31 10:49:51 +01:00
|
|
|
/* TS_LOGON_INFO_FIELD */
|
|
|
|
in_uint8s(s, 4); /* cbFieldData */
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
/* ARC_SC_PRIVATE_PACKET */
|
|
|
|
in_uint32_le(s, len);
|
|
|
|
if (len != 28)
|
2010-01-12 11:34:38 +01:00
|
|
|
{
|
2017-10-31 10:49:51 +01:00
|
|
|
logger(Protocol, Error,
|
|
|
|
"process_ts_logon_info_extended(), invalid length in Auto-Reconnect packet");
|
|
|
|
return;
|
|
|
|
}
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
in_uint32_le(s, version);
|
|
|
|
if (version != 1)
|
|
|
|
{
|
|
|
|
logger(Protocol, Error,
|
|
|
|
"process_ts_logon_info_extended(), unsupported version of Auto-Reconnect packet");
|
|
|
|
return;
|
|
|
|
}
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
in_uint32_le(s, g_reconnect_logonid);
|
|
|
|
in_uint8a(s, g_reconnect_random, 16);
|
|
|
|
g_has_reconnect_random = True;
|
|
|
|
g_reconnect_random_ts = time(NULL);
|
|
|
|
logger(Protocol, Debug,
|
|
|
|
"process_ts_logon_info_extended(), saving Auto-Reconnect cookie, id=%u",
|
|
|
|
g_reconnect_logonid);
|
2018-01-22 17:46:36 +01:00
|
|
|
|
|
|
|
gettimeofday(&g_pending_resize_defer_timer, NULL);
|
2017-10-31 10:49:51 +01:00
|
|
|
}
|
|
|
|
}
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2017-10-31 10:49:51 +01:00
|
|
|
/* Process TS_SAVE_SESSION_INFO_PDU_DATA data structure */
|
|
|
|
void
|
|
|
|
process_pdu_logon(STREAM s)
|
|
|
|
{
|
|
|
|
uint32 infotype;
|
|
|
|
in_uint32_le(s, infotype);
|
2010-01-12 11:34:38 +01:00
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
switch (infotype)
|
2017-10-31 10:49:51 +01:00
|
|
|
{
|
2018-10-29 15:50:44 +01:00
|
|
|
case INFOTYPE_LOGON_PLAINNOTIFY: /* TS_PLAIN_NOTIFY */
|
|
|
|
logger(Protocol, Debug,
|
|
|
|
"process_pdu_logon(), Received TS_LOGIN_PLAIN_NOTIFY");
|
|
|
|
in_uint8s(s, 576); /* pad */
|
|
|
|
break;
|
2017-10-31 10:49:51 +01:00
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
case INFOTYPE_LOGON_EXTENDED_INF: /* TS_LOGON_INFO_EXTENDED */
|
|
|
|
logger(Protocol, Debug,
|
|
|
|
"process_pdu_logon(), Received TS_LOGIN_INFO_EXTENDED");
|
|
|
|
process_ts_logon_info_extended(s);
|
|
|
|
break;
|
2017-10-31 10:49:51 +01:00
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
default:
|
|
|
|
logger(Protocol, Warning,
|
|
|
|
"process_pdu_logon(), Unhandled login infotype %d", infotype);
|
2010-01-12 11:34:38 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-12-08 11:26:31 +01:00
|
|
|
/* Process a Set Error Info PDU */
|
|
|
|
static void
|
|
|
|
process_ts_set_error_info_pdu(STREAM s, uint32 * ext_disc_reason)
|
2004-04-20 09:01:21 +02:00
|
|
|
{
|
|
|
|
in_uint32_le(s, *ext_disc_reason);
|
|
|
|
|
2018-10-29 15:50:44 +01:00
|
|
|
logger(Protocol, Debug, "process_ts_set_error_info_pdu(), error info = %d",
|
|
|
|
*ext_disc_reason);
|
2004-04-20 09:01:21 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Process data PDU */
|
2007-01-08 05:47:06 +01:00
|
|
|
static RD_BOOL
|
2004-04-20 09:01:21 +02:00
|
|
|
process_data_pdu(STREAM s, uint32 * ext_disc_reason)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
uint8 data_pdu_type;
|
2004-03-04 09:11:40 +01:00
|
|
|
uint8 ctype;
|
|
|
|
uint16 clen;
|
2004-04-27 14:55:33 +02:00
|
|
|
uint32 len;
|
|
|
|
|
|
|
|
uint32 roff, rlen;
|
|
|
|
|
2004-04-30 08:18:08 +02:00
|
|
|
struct stream *ns = &(g_mppc_dict.ns);
|
2004-03-04 09:11:40 +01:00
|
|
|
|
|
|
|
in_uint8s(s, 6); /* shareid, pad, streamid */
|
2007-12-23 07:45:47 +01:00
|
|
|
in_uint16_le(s, len);
|
2000-08-15 12:23:24 +02:00
|
|
|
in_uint8(s, data_pdu_type);
|
2004-03-04 09:11:40 +01:00
|
|
|
in_uint8(s, ctype);
|
2007-12-23 07:45:47 +01:00
|
|
|
in_uint16_le(s, clen);
|
2004-03-04 09:11:40 +01:00
|
|
|
clen -= 18;
|
|
|
|
|
2004-04-27 14:55:33 +02:00
|
|
|
if (ctype & RDP_MPPC_COMPRESSED)
|
2004-03-04 09:11:40 +01:00
|
|
|
{
|
2004-09-12 00:57:42 +02:00
|
|
|
if (len > RDP_MPPC_DICT_SIZE)
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error,
|
|
|
|
"process_data_pdu(), error decompressed packet size exceeds max");
|
2004-04-27 14:55:33 +02:00
|
|
|
if (mppc_expand(s->p, clen, ctype, &roff, &rlen) == -1)
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error,
|
|
|
|
"process_data_pdu(), error while decompressing packet");
|
2004-03-04 09:11:40 +01:00
|
|
|
|
2005-03-15 12:25:50 +01:00
|
|
|
/* len -= 18; */
|
2004-03-04 09:11:40 +01:00
|
|
|
|
2004-04-27 14:55:33 +02:00
|
|
|
/* allocate memory and copy the uncompressed data into the temporary stream */
|
2004-06-16 00:45:12 +02:00
|
|
|
ns->data = (uint8 *) xrealloc(ns->data, rlen);
|
2004-03-04 09:11:40 +01:00
|
|
|
|
2004-04-30 08:18:08 +02:00
|
|
|
memcpy((ns->data), (unsigned char *) (g_mppc_dict.hist + roff), rlen);
|
2004-03-04 09:11:40 +01:00
|
|
|
|
2004-04-30 08:18:08 +02:00
|
|
|
ns->size = rlen;
|
2004-04-27 14:55:33 +02:00
|
|
|
ns->end = (ns->data + ns->size);
|
|
|
|
ns->p = ns->data;
|
|
|
|
ns->rdp_hdr = ns->p;
|
|
|
|
|
|
|
|
s = ns;
|
2004-03-04 09:11:40 +01:00
|
|
|
}
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
switch (data_pdu_type)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_DATA_PDU_UPDATE:
|
|
|
|
process_update_pdu(s);
|
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2004-04-20 09:01:21 +02:00
|
|
|
case RDP_DATA_PDU_CONTROL:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "process_data_pdu(), received Control PDU");
|
2004-04-20 09:01:21 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case RDP_DATA_PDU_SYNCHRONISE:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "process_data_pdu(), received Sync PDU");
|
2004-04-20 09:01:21 +02:00
|
|
|
break;
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_DATA_PDU_POINTER:
|
|
|
|
process_pointer_pdu(s);
|
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_DATA_PDU_BELL:
|
|
|
|
ui_bell();
|
|
|
|
break;
|
2000-05-10 09:36:34 +02:00
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
case RDP_DATA_PDU_LOGON:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug, "process_data_pdu(), received Logon PDU");
|
2000-08-15 12:23:24 +02:00
|
|
|
/* User logged on */
|
2010-01-12 11:34:38 +01:00
|
|
|
process_pdu_logon(s);
|
2000-08-15 12:23:24 +02:00
|
|
|
break;
|
2000-07-25 14:34:29 +02:00
|
|
|
|
2018-01-18 13:56:30 +01:00
|
|
|
case RDP_DATA_PDU_SET_ERROR_INFO:
|
2017-12-08 11:26:31 +01:00
|
|
|
process_ts_set_error_info_pdu(s, ext_disc_reason);
|
2006-06-14 10:59:03 +02:00
|
|
|
|
|
|
|
/* We used to return true and disconnect immediately here, but
|
|
|
|
* Windows Vista sends a disconnect PDU with reason 0 when
|
|
|
|
* reconnecting to a disconnected session, and MSTSC doesn't
|
|
|
|
* drop the connection. I think we should just save the status.
|
|
|
|
*/
|
|
|
|
break;
|
2003-10-29 05:18:00 +01:00
|
|
|
|
2014-05-20 16:34:45 +02:00
|
|
|
case RDP_DATA_PDU_AUTORECONNECT_STATUS:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
|
|
|
"process_data_pdu(), automatic reconnect using cookie, failed");
|
2014-02-19 09:57:51 +01:00
|
|
|
break;
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
default:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning, "process_data_pdu(), unhandled data PDU type %d",
|
|
|
|
data_pdu_type);
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
2004-04-20 09:01:21 +02:00
|
|
|
return False;
|
2000-05-10 09:36:34 +02:00
|
|
|
}
|
|
|
|
|
2005-08-08 21:15:57 +02:00
|
|
|
/* Process redirect PDU from Session Directory */
|
2007-01-08 05:47:06 +01:00
|
|
|
static RD_BOOL
|
2013-11-28 12:33:50 +01:00
|
|
|
process_redirect_pdu(STREAM s, RD_BOOL enhanced_redirect /*, uint32 * ext_disc_reason */ )
|
2005-08-08 21:15:57 +02:00
|
|
|
{
|
|
|
|
uint32 len;
|
2013-11-28 12:33:50 +01:00
|
|
|
uint16 redirect_identifier;
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
|
|
|
|
2013-12-06 13:43:08 +01:00
|
|
|
/* reset any previous redirection information */
|
2013-11-26 12:06:32 +01:00
|
|
|
g_redirect = True;
|
2013-12-06 13:43:08 +01:00
|
|
|
free(g_redirect_server);
|
|
|
|
free(g_redirect_username);
|
|
|
|
free(g_redirect_domain);
|
|
|
|
free(g_redirect_lb_info);
|
|
|
|
free(g_redirect_cookie);
|
|
|
|
|
|
|
|
g_redirect_server = NULL;
|
|
|
|
g_redirect_username = NULL;
|
|
|
|
g_redirect_domain = NULL;
|
|
|
|
g_redirect_lb_info = NULL;
|
|
|
|
g_redirect_cookie = NULL;
|
2013-11-26 12:06:32 +01:00
|
|
|
|
2005-08-08 21:15:57 +02:00
|
|
|
/* these 2 bytes are unknown, seem to be zeros */
|
|
|
|
in_uint8s(s, 2);
|
|
|
|
|
2013-11-28 12:33:50 +01:00
|
|
|
/* FIXME: Previous implementation only reads 4 bytes which has been working
|
|
|
|
but todays spec says something different. Investigate and retest
|
|
|
|
server redirection using WTS 2003 cluster.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (enhanced_redirect)
|
|
|
|
{
|
|
|
|
/* read identifier */
|
|
|
|
in_uint16_le(s, redirect_identifier);
|
|
|
|
if (redirect_identifier != 0x0400)
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Error, "unexpected data in server redirection packet");
|
2013-11-28 12:33:50 +01:00
|
|
|
|
|
|
|
/* FIXME: skip total length */
|
|
|
|
in_uint8s(s, 2);
|
|
|
|
|
|
|
|
/* read session_id */
|
|
|
|
in_uint32_le(s, g_redirect_session_id);
|
|
|
|
}
|
|
|
|
|
2005-08-08 21:15:57 +02:00
|
|
|
/* read connection flags */
|
|
|
|
in_uint32_le(s, g_redirect_flags);
|
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_TARGET_NET_ADDRESS)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
|
|
|
/* read length of ip string */
|
2013-12-06 13:43:08 +01:00
|
|
|
in_uint32_le(s, len);
|
2010-01-21 10:24:40 +01:00
|
|
|
|
|
|
|
/* read ip string */
|
2013-12-06 13:43:08 +01:00
|
|
|
rdp_in_unistr(s, len, &g_redirect_server, &g_redirect_server_len);
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_LOAD_BALANCE_INFO)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2013-11-26 08:56:04 +01:00
|
|
|
/* read length of load balance info blob */
|
|
|
|
in_uint32_le(s, g_redirect_lb_info_len);
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2013-11-26 08:56:04 +01:00
|
|
|
/* reallocate a loadbalance info blob */
|
|
|
|
if (g_redirect_lb_info != NULL)
|
|
|
|
free(g_redirect_lb_info);
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2013-11-26 08:56:04 +01:00
|
|
|
g_redirect_lb_info = xmalloc(g_redirect_lb_info_len);
|
|
|
|
|
|
|
|
/* read load balance info blob */
|
|
|
|
in_uint8p(s, g_redirect_lb_info, g_redirect_lb_info_len);
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_USERNAME)
|
2008-01-05 06:43:02 +01:00
|
|
|
{
|
2010-01-21 10:24:40 +01:00
|
|
|
/* read length of username string */
|
2013-12-06 13:43:08 +01:00
|
|
|
in_uint32_le(s, len);
|
2008-01-05 06:43:02 +01:00
|
|
|
|
2010-01-21 10:24:40 +01:00
|
|
|
/* read username string */
|
2013-12-06 13:43:08 +01:00
|
|
|
rdp_in_unistr(s, len, &g_redirect_username, &g_redirect_username_len);
|
2008-01-05 06:43:02 +01:00
|
|
|
}
|
2010-01-21 10:24:40 +01:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_DOMAIN)
|
2008-01-05 06:43:02 +01:00
|
|
|
{
|
2010-01-21 10:24:40 +01:00
|
|
|
/* read length of domain string */
|
|
|
|
in_uint32_le(s, len);
|
|
|
|
|
|
|
|
/* read domain string */
|
2013-12-06 13:43:08 +01:00
|
|
|
rdp_in_unistr(s, len, &g_redirect_domain, &g_redirect_domain_len);
|
2008-01-05 06:43:02 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_PASSWORD)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2013-11-28 12:59:05 +01:00
|
|
|
/* the information in this blob is either a password or a cookie that
|
|
|
|
should be passed though as blob and not parsed as a unicode string */
|
2013-11-28 15:47:29 +01:00
|
|
|
|
2013-11-28 12:59:05 +01:00
|
|
|
/* read blob length */
|
|
|
|
in_uint32_le(s, g_redirect_cookie_len);
|
|
|
|
|
|
|
|
/* reallocate cookie blob */
|
|
|
|
if (g_redirect_cookie != NULL)
|
|
|
|
free(g_redirect_cookie);
|
|
|
|
|
|
|
|
g_redirect_cookie = xmalloc(g_redirect_cookie_len);
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2013-11-28 12:59:05 +01:00
|
|
|
/* read cookie as is */
|
2019-01-30 11:00:23 +01:00
|
|
|
in_uint8a(s, g_redirect_cookie, g_redirect_cookie_len);
|
2017-05-15 08:36:41 +02:00
|
|
|
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Debug, "process_redirect_pdu(), Read %d bytes redirection cookie",
|
|
|
|
g_redirect_cookie_len);
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_DONTSTOREUSERNAME)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
2017-05-15 08:03:39 +02:00
|
|
|
"process_redirect_pdu(), unhandled LB_DONTSTOREUSERNAME set");
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_SMARTCARD_LOGON)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
2017-05-15 08:03:39 +02:00
|
|
|
"process_redirect_pdu(), unhandled LB_SMARTCARD_LOGON set");
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_NOREDIRECT)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2013-11-26 12:06:32 +01:00
|
|
|
/* By spec this is only for information and doesn't mean that an actual
|
|
|
|
redirect should be performed. How it should be used is not mentioned. */
|
|
|
|
g_redirect = False;
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_TARGET_FQDN)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2013-12-06 13:43:08 +01:00
|
|
|
in_uint32_le(s, len);
|
|
|
|
|
2017-10-28 23:24:23 +02:00
|
|
|
/* Let target FQDN replace target IP address */
|
2013-11-26 12:26:49 +01:00
|
|
|
if (g_redirect_server)
|
2013-12-06 13:43:08 +01:00
|
|
|
{
|
2013-11-26 12:26:49 +01:00
|
|
|
free(g_redirect_server);
|
2013-12-06 13:43:08 +01:00
|
|
|
g_redirect_server = NULL;
|
|
|
|
}
|
2013-12-12 15:01:58 +01:00
|
|
|
|
2017-10-28 23:24:23 +02:00
|
|
|
/* read FQDN string */
|
2013-12-06 13:43:08 +01:00
|
|
|
rdp_in_unistr(s, len, &g_redirect_server, &g_redirect_server_len);
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_TARGET_NETBIOS)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Warning, "process_redirect_pdu(), unhandled LB_TARGET_NETBIOS");
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
|
|
|
|
2017-05-15 08:03:39 +02:00
|
|
|
if (g_redirect_flags & LB_TARGET_NET_ADDRESSES)
|
2010-01-21 10:24:40 +01:00
|
|
|
{
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
2017-05-15 08:03:39 +02:00
|
|
|
"process_redirect_pdu(), unhandled LB_TARGET_NET_ADDRESSES");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_redirect_flags & LB_CLIENT_TSV_URL)
|
|
|
|
{
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Warning, "process_redirect_pdu(), unhandled LB_CLIENT_TSV_URL");
|
2017-05-15 08:03:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (g_redirect_flags & LB_SERVER_TSV_CAPABLE)
|
|
|
|
{
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Warning, "process_redirect_pdu(), unhandled LB_SERVER_TSV_URL");
|
2017-05-15 08:03:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (g_redirect_flags & LB_PASSWORD_IS_PK_ENCRYPTED)
|
|
|
|
{
|
|
|
|
logger(Protocol, Warning,
|
|
|
|
"process_redirect_pdu(), unhandled LB_PASSWORD_IS_PK_ENCRYPTED ");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_redirect_flags & LB_REDIRECTION_GUID)
|
|
|
|
{
|
2017-06-07 09:39:29 +02:00
|
|
|
logger(Protocol, Warning, "process_redirect_pdu(), unhandled LB_REDIRECTION_GUID ");
|
2017-05-15 08:03:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (g_redirect_flags & LB_TARGET_CERTIFICATE)
|
|
|
|
{
|
|
|
|
logger(Protocol, Warning,
|
|
|
|
"process_redirect_pdu(), unhandled LB_TARGET_CERTIFICATE");
|
2010-01-21 10:24:40 +01:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
return g_redirect;
|
2005-08-08 21:15:57 +02:00
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Process incoming packets */
|
2004-04-20 09:01:21 +02:00
|
|
|
void
|
2007-01-08 05:47:06 +01:00
|
|
|
rdp_main_loop(RD_BOOL * deactivated, uint32 * ext_disc_reason)
|
2000-05-10 09:36:34 +02:00
|
|
|
{
|
2017-11-14 09:39:39 +01:00
|
|
|
do
|
2010-01-20 10:59:47 +01:00
|
|
|
{
|
2017-11-14 09:39:39 +01:00
|
|
|
if (rdp_loop(deactivated, ext_disc_reason) == False)
|
2010-01-20 10:59:47 +01:00
|
|
|
{
|
2017-11-14 09:39:39 +01:00
|
|
|
g_exit_mainloop = True;
|
2010-01-20 10:59:47 +01:00
|
|
|
}
|
2018-10-29 15:50:44 +01:00
|
|
|
}
|
|
|
|
while (g_exit_mainloop == False);
|
2000-07-25 14:34:29 +02:00
|
|
|
}
|
|
|
|
|
2017-10-28 23:24:23 +02:00
|
|
|
/* used in uiports and rdp_main_loop, processes the RDP packets waiting */
|
2007-01-08 05:47:06 +01:00
|
|
|
RD_BOOL
|
|
|
|
rdp_loop(RD_BOOL * deactivated, uint32 * ext_disc_reason)
|
2004-06-16 05:08:55 +02:00
|
|
|
{
|
|
|
|
uint8 type;
|
2007-01-08 05:47:06 +01:00
|
|
|
RD_BOOL cont = True;
|
2004-06-16 05:08:55 +02:00
|
|
|
STREAM s;
|
|
|
|
|
2017-11-14 09:39:39 +01:00
|
|
|
while (g_exit_mainloop == False && cont)
|
2004-06-16 05:08:55 +02:00
|
|
|
{
|
|
|
|
s = rdp_recv(&type);
|
|
|
|
if (s == NULL)
|
|
|
|
return False;
|
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case RDP_PDU_DEMAND_ACTIVE:
|
|
|
|
process_demand_active(s);
|
|
|
|
*deactivated = False;
|
|
|
|
break;
|
|
|
|
case RDP_PDU_DEACTIVATE:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Debug,
|
|
|
|
"rdp_loop(), RDP_PDU_DEACTIVATE packet received");
|
2004-06-16 05:08:55 +02:00
|
|
|
*deactivated = True;
|
2017-11-14 09:39:39 +01:00
|
|
|
g_wait_for_deactivate_ts = 0;
|
2004-06-16 05:08:55 +02:00
|
|
|
break;
|
2005-08-08 21:15:57 +02:00
|
|
|
case RDP_PDU_REDIRECT:
|
2013-11-26 09:21:06 +01:00
|
|
|
case RDP_PDU_ENHANCED_REDIRECT:
|
2017-11-14 09:39:39 +01:00
|
|
|
if (process_redirect_pdu(s, !(type == RDP_PDU_REDIRECT)) == True)
|
|
|
|
{
|
|
|
|
g_exit_mainloop = True;
|
|
|
|
continue;
|
|
|
|
}
|
2013-11-26 09:21:06 +01:00
|
|
|
break;
|
2004-06-16 05:08:55 +02:00
|
|
|
case RDP_PDU_DATA:
|
2014-04-24 14:02:40 +02:00
|
|
|
/* If we got a data PDU, we don't need to keep the password in memory
|
|
|
|
anymore and therefor we should clear it for security reasons. */
|
|
|
|
if (g_password[0] != '\0')
|
|
|
|
memset(g_password, 0, sizeof(g_password));
|
|
|
|
|
2009-08-27 09:30:32 +02:00
|
|
|
process_data_pdu(s, ext_disc_reason);
|
2004-06-16 05:08:55 +02:00
|
|
|
break;
|
|
|
|
default:
|
2017-01-26 14:19:40 +01:00
|
|
|
logger(Protocol, Warning,
|
|
|
|
"rdp_loop(), unhandled PDU type %d received", type);
|
2004-06-16 05:08:55 +02:00
|
|
|
}
|
|
|
|
cont = g_next_packet < s->end;
|
|
|
|
}
|
|
|
|
return True;
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Establish a connection up to the RDP layer */
|
2007-01-08 05:47:06 +01:00
|
|
|
RD_BOOL
|
2001-01-06 04:47:04 +01:00
|
|
|
rdp_connect(char *server, uint32 flags, char *domain, char *password,
|
2010-01-07 21:01:58 +01:00
|
|
|
char *command, char *directory, RD_BOOL reconnect)
|
2000-07-25 14:34:29 +02:00
|
|
|
{
|
2014-08-18 09:47:07 +02:00
|
|
|
RD_BOOL deactivated = False;
|
|
|
|
uint32 ext_disc_reason = 0;
|
|
|
|
|
2012-11-15 12:21:01 +01:00
|
|
|
if (!sec_connect(server, g_username, domain, password, reconnect))
|
2005-08-08 21:15:57 +02:00
|
|
|
return False;
|
|
|
|
|
2017-12-08 11:21:49 +01:00
|
|
|
rdp_send_client_info_pdu(flags, domain, g_username, password, command, directory);
|
2012-06-15 07:16:20 +02:00
|
|
|
|
2014-08-18 09:47:07 +02:00
|
|
|
/* run RDP loop until first licence demand active PDU */
|
|
|
|
while (!g_rdp_shareid)
|
|
|
|
{
|
|
|
|
if (g_network_error)
|
|
|
|
return False;
|
2013-04-12 08:46:07 +02:00
|
|
|
|
2014-08-18 09:47:07 +02:00
|
|
|
if (!rdp_loop(&deactivated, &ext_disc_reason))
|
|
|
|
return False;
|
2014-08-27 14:19:59 +02:00
|
|
|
|
|
|
|
if (g_redirect)
|
|
|
|
return True;
|
2014-08-18 09:47:07 +02:00
|
|
|
}
|
2005-08-08 21:15:57 +02:00
|
|
|
return True;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Called during redirection to reset the state to support redirection */
|
|
|
|
void
|
|
|
|
rdp_reset_state(void)
|
|
|
|
{
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
2005-08-08 21:15:57 +02:00
|
|
|
g_next_packet = NULL; /* reset the packet information */
|
|
|
|
g_rdp_shareid = 0;
|
2018-01-29 13:55:25 +01:00
|
|
|
g_exit_mainloop = False;
|
2018-02-13 16:04:20 +01:00
|
|
|
g_first_bitmap_caps = True;
|
2005-08-08 21:15:57 +02:00
|
|
|
sec_reset_state();
|
|
|
|
}
|
|
|
|
|
2000-08-15 12:23:24 +02:00
|
|
|
/* Disconnect from the RDP layer */
|
2001-01-06 04:47:04 +01:00
|
|
|
void
|
2002-09-24 09:59:14 +02:00
|
|
|
rdp_disconnect(void)
|
2000-07-07 11:40:03 +02:00
|
|
|
{
|
2018-01-29 13:24:15 +01:00
|
|
|
logger(Protocol, Debug, "%s()", __func__);
|
2000-08-15 12:23:24 +02:00
|
|
|
sec_disconnect();
|
2000-07-07 11:40:03 +02:00
|
|
|
}
|
2019-01-16 10:45:33 +01:00
|
|
|
|
|
|
|
/* Abort rdesktop upon protocol error
|
|
|
|
|
|
|
|
A protocol error is defined as:
|
|
|
|
|
|
|
|
- A value is outside specified range for example;
|
|
|
|
bpp for a bitmap is not allowed to be greater than the
|
|
|
|
value 32 but is represented by a byte in protocol.
|
|
|
|
|
|
|
|
*/
|
|
|
|
void
|
2019-04-09 14:02:42 +02:00
|
|
|
_rdp_protocol_error(const char *file, int line, const char *func,
|
|
|
|
const char *message, STREAM s)
|
2019-01-16 10:45:33 +01:00
|
|
|
{
|
2019-04-09 14:02:42 +02:00
|
|
|
logger(Protocol, Error, "%s:%d: %s(), %s", file, line, func, message);
|
2019-01-16 10:45:33 +01:00
|
|
|
if (s)
|
2019-04-09 14:03:16 +02:00
|
|
|
hexdump(s->data, s_length(s));
|
2019-01-16 10:45:33 +01:00
|
|
|
exit(0);
|
|
|
|
}
|