FreeRDP/libfreerdp/core/gateway/tsg.c

2788 lines
78 KiB
C
Raw Normal View History

/**
2012-10-09 07:02:04 +04:00
* FreeRDP: A Remote Desktop Protocol Implementation
* Terminal Server Gateway (TSG)
*
* Copyright 2012 Fujitsu Technology Solutions GmbH
* Copyright 2012 Dmitrij Jasnov <dmitrij.jasnov@ts.fujitsu.com>
* Copyright 2015 Thincast Technologies GmbH
* Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2022-02-16 13:20:38 +03:00
#include <freerdp/config.h>
#include <winpr/assert.h>
#include <winpr/crt.h>
2012-11-12 02:23:57 +04:00
#include <winpr/error.h>
2012-12-14 05:23:37 +04:00
#include <winpr/print.h>
#include <winpr/stream.h>
2014-08-19 20:26:39 +04:00
#include <freerdp/log.h>
#include "rpc_bind.h"
#include "rpc_client.h"
#include "tsg.h"
2016-11-21 19:28:54 +03:00
#include "../../crypto/opensslcompat.h"
#define TAG FREERDP_TAG("core.gateway.tsg")
#define TSG_CAPABILITY_TYPE_NAP 0x00000001
#define TSG_PACKET_TYPE_HEADER 0x00004844
#define TSG_PACKET_TYPE_VERSIONCAPS 0x00005643
#define TSG_PACKET_TYPE_QUARCONFIGREQUEST 0x00005143
#define TSG_PACKET_TYPE_QUARREQUEST 0x00005152
#define TSG_PACKET_TYPE_RESPONSE 0x00005052
#define TSG_PACKET_TYPE_QUARENC_RESPONSE 0x00004552
#define TSG_PACKET_TYPE_CAPS_RESPONSE 0x00004350
#define TSG_PACKET_TYPE_MSGREQUEST_PACKET 0x00004752
#define TSG_PACKET_TYPE_MESSAGE_PACKET 0x00004750
#define TSG_PACKET_TYPE_AUTH 0x00004054
#define TSG_PACKET_TYPE_REAUTH 0x00005250
2018-09-28 09:43:43 +03:00
typedef WCHAR* RESOURCENAME;
typedef struct
2018-09-28 09:43:43 +03:00
{
RESOURCENAME* resourceName;
UINT32 numResourceNames;
RESOURCENAME* alternateResourceNames;
UINT16 numAlternateResourceNames;
UINT32 Port;
} TSENDPOINTINFO, *PTSENDPOINTINFO;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT16 ComponentId;
UINT16 PacketId;
} TSG_PACKET_HEADER, *PTSG_PACKET_HEADER;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 capabilities;
} TSG_CAPABILITY_NAP, *PTSG_CAPABILITY_NAP;
typedef union
{
2018-09-28 09:43:43 +03:00
TSG_CAPABILITY_NAP tsgCapNap;
} TSG_CAPABILITIES_UNION, *PTSG_CAPABILITIES_UNION;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 capabilityType;
TSG_CAPABILITIES_UNION tsgPacket;
} TSG_PACKET_CAPABILITIES, *PTSG_PACKET_CAPABILITIES;
typedef struct
2018-09-28 09:43:43 +03:00
{
TSG_PACKET_HEADER tsgHeader;
PTSG_PACKET_CAPABILITIES tsgCaps;
UINT32 numCapabilities;
UINT16 majorVersion;
UINT16 minorVersion;
UINT16 quarantineCapabilities;
} TSG_PACKET_VERSIONCAPS, *PTSG_PACKET_VERSIONCAPS;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 flags;
} TSG_PACKET_QUARCONFIGREQUEST, *PTSG_PACKET_QUARCONFIGREQUEST;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 flags;
WCHAR* machineName;
UINT32 nameLength;
BYTE* data;
UINT32 dataLen;
} TSG_PACKET_QUARREQUEST, *PTSG_PACKET_QUARREQUEST;
typedef struct
2018-09-28 09:43:43 +03:00
{
BOOL enableAllRedirections;
BOOL disableAllRedirections;
BOOL driveRedirectionDisabled;
BOOL printerRedirectionDisabled;
BOOL portRedirectionDisabled;
BOOL reserved;
BOOL clipboardRedirectionDisabled;
BOOL pnpRedirectionDisabled;
} TSG_REDIRECTION_FLAGS, *PTSG_REDIRECTION_FLAGS;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 flags;
UINT32 reserved;
BYTE* responseData;
UINT32 responseDataLen;
TSG_REDIRECTION_FLAGS redirectionFlags;
2019-11-06 17:24:51 +03:00
} TSG_PACKET_RESPONSE, *PTSG_PACKET_RESPONSE;
2018-09-28 09:43:43 +03:00
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 flags;
UINT32 certChainLen;
WCHAR* certChainData;
GUID nonce;
PTSG_PACKET_VERSIONCAPS versionCaps;
} TSG_PACKET_QUARENC_RESPONSE, *PTSG_PACKET_QUARENC_RESPONSE;
typedef struct
2018-09-28 09:43:43 +03:00
{
INT32 isDisplayMandatory;
INT32 isConsentMandatory;
UINT32 msgBytes;
WCHAR* msgBuffer;
} TSG_PACKET_STRING_MESSAGE;
2018-09-28 09:43:43 +03:00
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT64 tunnelContext;
} TSG_PACKET_REAUTH_MESSAGE, *PTSG_PACKET_REAUTH_MESSAGE;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 msgID;
UINT32 msgType;
INT32 isMsgPresent;
} TSG_PACKET_MSG_RESPONSE, *PTSG_PACKET_MSG_RESPONSE;
typedef struct
2018-09-28 09:43:43 +03:00
{
TSG_PACKET_QUARENC_RESPONSE pktQuarEncResponse;
TSG_PACKET_MSG_RESPONSE pktConsentMessage;
} TSG_PACKET_CAPS_RESPONSE, *PTSG_PACKET_CAPS_RESPONSE;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 maxMessagesPerBatch;
} TSG_PACKET_MSG_REQUEST, *PTSG_PACKET_MSG_REQUEST;
typedef struct
2018-09-28 09:43:43 +03:00
{
TSG_PACKET_VERSIONCAPS tsgVersionCaps;
UINT32 cookieLen;
BYTE* cookie;
} TSG_PACKET_AUTH, *PTSG_PACKET_AUTH;
typedef union
{
2018-09-28 09:43:43 +03:00
PTSG_PACKET_VERSIONCAPS packetVersionCaps;
PTSG_PACKET_AUTH packetAuth;
} TSG_INITIAL_PACKET_TYPE_UNION, *PTSG_INITIAL_PACKET_TYPE_UNION;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT64 tunnelContext;
UINT32 packetId;
TSG_INITIAL_PACKET_TYPE_UNION tsgInitialPacket;
} TSG_PACKET_REAUTH, *PTSG_PACKET_REAUTH;
typedef union
{
2018-09-28 09:43:43 +03:00
PTSG_PACKET_HEADER packetHeader;
PTSG_PACKET_VERSIONCAPS packetVersionCaps;
PTSG_PACKET_QUARCONFIGREQUEST packetQuarConfigRequest;
PTSG_PACKET_QUARREQUEST packetQuarRequest;
PTSG_PACKET_RESPONSE packetResponse;
PTSG_PACKET_QUARENC_RESPONSE packetQuarEncResponse;
PTSG_PACKET_CAPS_RESPONSE packetCapsResponse;
PTSG_PACKET_MSG_REQUEST packetMsgRequest;
PTSG_PACKET_MSG_RESPONSE packetMsgResponse;
PTSG_PACKET_AUTH packetAuth;
PTSG_PACKET_REAUTH packetReauth;
} TSG_PACKET_TYPE_UNION;
typedef struct
2018-09-28 09:43:43 +03:00
{
UINT32 packetId;
TSG_PACKET_TYPE_UNION tsgPacket;
} TSG_PACKET, *PTSG_PACKET;
struct rdp_tsg
{
BIO* bio;
rdpRpc* rpc;
UINT16 Port;
LPWSTR Hostname;
LPWSTR MachineName;
TSG_STATE state;
UINT32 TunnelId;
UINT32 ChannelId;
BOOL reauthSequence;
rdpTransport* transport;
UINT64 ReauthTunnelContext;
CONTEXT_HANDLE TunnelContext;
CONTEXT_HANDLE ChannelContext;
CONTEXT_HANDLE NewTunnelContext;
CONTEXT_HANDLE NewChannelContext;
TSG_PACKET_REAUTH packetReauth;
TSG_PACKET_CAPABILITIES tsgCaps;
TSG_PACKET_VERSIONCAPS packetVersionCaps;
};
static const char* tsg_packet_id_to_string(UINT32 packetId)
{
switch (packetId)
{
case TSG_PACKET_TYPE_HEADER:
return "TSG_PACKET_TYPE_HEADER";
case TSG_PACKET_TYPE_VERSIONCAPS:
return "TSG_PACKET_TYPE_VERSIONCAPS";
case TSG_PACKET_TYPE_QUARCONFIGREQUEST:
return "TSG_PACKET_TYPE_QUARCONFIGREQUEST";
case TSG_PACKET_TYPE_QUARREQUEST:
return "TSG_PACKET_TYPE_QUARREQUEST";
case TSG_PACKET_TYPE_RESPONSE:
return "TSG_PACKET_TYPE_RESPONSE";
case TSG_PACKET_TYPE_QUARENC_RESPONSE:
return "TSG_PACKET_TYPE_QUARENC_RESPONSE";
case TSG_CAPABILITY_TYPE_NAP:
return "TSG_CAPABILITY_TYPE_NAP";
case TSG_PACKET_TYPE_CAPS_RESPONSE:
return "TSG_PACKET_TYPE_CAPS_RESPONSE";
case TSG_PACKET_TYPE_MSGREQUEST_PACKET:
return "TSG_PACKET_TYPE_MSGREQUEST_PACKET";
case TSG_PACKET_TYPE_MESSAGE_PACKET:
return "TSG_PACKET_TYPE_MESSAGE_PACKET";
case TSG_PACKET_TYPE_AUTH:
return "TSG_PACKET_TYPE_AUTH";
case TSG_PACKET_TYPE_REAUTH:
return "TSG_PACKET_TYPE_REAUTH";
default:
return "UNKNOWN";
}
}
static const char* tsg_state_to_string(TSG_STATE state)
{
switch (state)
{
case TSG_STATE_INITIAL:
return "TSG_STATE_INITIAL";
case TSG_STATE_CONNECTED:
return "TSG_STATE_CONNECTED";
case TSG_STATE_AUTHORIZED:
return "TSG_STATE_AUTHORIZED";
case TSG_STATE_CHANNEL_CREATED:
return "TSG_STATE_CHANNEL_CREATED";
case TSG_STATE_PIPE_CREATED:
return "TSG_STATE_PIPE_CREATED";
case TSG_STATE_TUNNEL_CLOSE_PENDING:
return "TSG_STATE_TUNNEL_CLOSE_PENDING";
case TSG_STATE_CHANNEL_CLOSE_PENDING:
return "TSG_STATE_CHANNEL_CLOSE_PENDING";
case TSG_STATE_FINAL:
return "TSG_STATE_FINAL";
default:
return "TSG_STATE_UNKNOWN";
}
}
WINPR_ATTR_FORMAT_ARG(3, 4)
static BOOL tsg_print(char** buffer, size_t* len, WINPR_FORMAT_ARG const char* fmt, ...)
{
int rc;
va_list ap;
if (!buffer || !len || !fmt)
return FALSE;
va_start(ap, fmt);
rc = vsnprintf(*buffer, *len, fmt, ap);
va_end(ap);
if ((rc < 0) || ((size_t)rc > *len))
return FALSE;
*len -= (size_t)rc;
*buffer += (size_t)rc;
return TRUE;
}
static BOOL tsg_packet_header_to_string(char** buffer, size_t* length,
const TSG_PACKET_HEADER* header)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(header);
return tsg_print(buffer, length,
"header { ComponentId=0x%04" PRIx16 ", PacketId=0x%04" PRIx16 " }",
header->ComponentId, header->PacketId);
}
static BOOL tsg_type_capability_nap_to_string(char** buffer, size_t* length,
const TSG_CAPABILITY_NAP* cur)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(cur);
return tsg_print(buffer, length, "%s { capabilities=0x%08" PRIx32 " }",
tsg_packet_id_to_string(TSG_CAPABILITY_TYPE_NAP), cur->capabilities);
}
static BOOL tsg_packet_capabilities_to_string(char** buffer, size_t* length,
const TSG_PACKET_CAPABILITIES* caps, UINT32 numCaps)
{
UINT32 x;
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "capabilities { "))
return FALSE;
for (x = 0; x < numCaps; x++)
{
const TSG_PACKET_CAPABILITIES* cur = &caps[x];
switch (cur->capabilityType)
{
case TSG_CAPABILITY_TYPE_NAP:
if (!tsg_type_capability_nap_to_string(buffer, length, &cur->tsgPacket.tsgCapNap))
return FALSE;
break;
default:
if (!tsg_print(buffer, length, "TSG_UNKNOWN_CAPABILITY"))
return FALSE;
break;
}
}
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_versioncaps_to_string(char** buffer, size_t* length,
const TSG_PACKET_VERSIONCAPS* caps)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "versioncaps { "))
return FALSE;
if (!tsg_packet_header_to_string(buffer, length, &caps->tsgHeader))
return FALSE;
if (!tsg_print(buffer, length, " "))
return FALSE;
if (!tsg_packet_capabilities_to_string(buffer, length, caps->tsgCaps, caps->numCapabilities))
return FALSE;
if (!tsg_print(buffer, length,
" numCapabilities=0x%08" PRIx32 ", majorVersion=0x%04" PRIx16
", minorVersion=0x%04" PRIx16 ", quarantineCapabilities=0x%04" PRIx16,
caps->numCapabilities, caps->majorVersion, caps->minorVersion,
caps->quarantineCapabilities))
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_quarconfigrequest_to_string(char** buffer, size_t* length,
const TSG_PACKET_QUARCONFIGREQUEST* caps)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "quarconfigrequest { "))
return FALSE;
if (!tsg_print(buffer, length, " "))
return FALSE;
if (!tsg_print(buffer, length, " flags=0x%08" PRIx32, caps->flags))
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_quarrequest_to_string(char** buffer, size_t* length,
const TSG_PACKET_QUARREQUEST* caps)
{
BOOL rc = FALSE;
char* name = NULL;
char* strdata = NULL;
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "quarrequest { "))
return FALSE;
if (!tsg_print(buffer, length, " "))
return FALSE;
if (caps->nameLength > 0)
{
if (caps->nameLength > INT_MAX)
return FALSE;
name = ConvertWCharNToUtf8Alloc(caps->machineName, caps->nameLength, NULL);
if (!name)
return FALSE;
}
strdata = winpr_BinToHexString(caps->data, caps->dataLen, TRUE);
if (strdata || (caps->dataLen == 0))
rc = tsg_print(buffer, length,
" flags=0x%08" PRIx32 ", machineName=%s [%" PRIu32 "], data[%" PRIu32 "]=%s",
caps->flags, name, caps->nameLength, caps->dataLen, strdata);
free(name);
free(strdata);
if (!rc)
return FALSE;
return tsg_print(buffer, length, " }");
}
static const char* tsg_bool_to_string(BOOL val)
{
if (val)
return "true";
return "false";
}
static const char* tsg_redirection_flags_to_string(char* buffer, size_t size,
const TSG_REDIRECTION_FLAGS* flags)
{
WINPR_ASSERT(buffer || (size == 0));
WINPR_ASSERT(flags);
_snprintf(buffer, size,
"enableAllRedirections=%s, disableAllRedirections=%s, driveRedirectionDisabled=%s, "
"printerRedirectionDisabled=%s, portRedirectionDisabled=%s, reserved=%s, "
"clipboardRedirectionDisabled=%s, pnpRedirectionDisabled=%s",
tsg_bool_to_string(flags->enableAllRedirections),
tsg_bool_to_string(flags->disableAllRedirections),
tsg_bool_to_string(flags->driveRedirectionDisabled),
tsg_bool_to_string(flags->printerRedirectionDisabled),
tsg_bool_to_string(flags->portRedirectionDisabled),
tsg_bool_to_string(flags->reserved),
tsg_bool_to_string(flags->clipboardRedirectionDisabled),
tsg_bool_to_string(flags->pnpRedirectionDisabled));
return buffer;
}
static BOOL tsg_packet_response_to_string(char** buffer, size_t* length,
const TSG_PACKET_RESPONSE* caps)
{
BOOL rc = FALSE;
char* strdata = NULL;
char tbuffer[8192] = { 0 };
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "response { "))
return FALSE;
if (!tsg_print(buffer, length, " "))
return FALSE;
strdata = winpr_BinToHexString(caps->responseData, caps->responseDataLen, TRUE);
if (strdata || (caps->responseDataLen == 0))
rc = tsg_print(
buffer, length,
" flags=0x%08" PRIx32 ", reserved=0x%08" PRIx32 ", responseData[%" PRIu32
"]=%s, redirectionFlags={ %s }",
caps->flags, caps->reserved, caps->responseDataLen, strdata,
tsg_redirection_flags_to_string(tbuffer, ARRAYSIZE(tbuffer), &caps->redirectionFlags));
free(strdata);
if (!rc)
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_quarenc_response_to_string(char** buffer, size_t* length,
const TSG_PACKET_QUARENC_RESPONSE* caps)
{
BOOL rc = FALSE;
char* strdata = NULL;
RPC_CSTR uuid;
char tbuffer[8192] = { 0 };
size_t size = ARRAYSIZE(tbuffer);
char* ptbuffer = tbuffer;
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "quarenc_response { "))
return FALSE;
if (!tsg_print(buffer, length, " "))
return FALSE;
if (caps->certChainLen > 0)
{
if (caps->certChainLen > INT_MAX)
return FALSE;
strdata = ConvertWCharNToUtf8Alloc(caps->certChainData, caps->certChainLen, NULL);
if (!strdata)
return FALSE;
}
tsg_packet_versioncaps_to_string(&ptbuffer, &size, caps->versionCaps);
UuidToStringA(&caps->nonce, &uuid);
if (strdata || (caps->certChainLen == 0))
rc =
tsg_print(buffer, length,
" flags=0x%08" PRIx32 ", certChain[%" PRIu32 "]=%s, nonce=%s, versionCaps=%s",
caps->flags, caps->certChainLen, strdata, uuid, tbuffer);
free(strdata);
free(uuid);
if (!rc)
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_message_response_to_string(char** buffer, size_t* length,
const TSG_PACKET_MSG_RESPONSE* caps)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "msg_response { "))
return FALSE;
if (!tsg_print(buffer, length,
" msgID=0x%08" PRIx32 ", msgType=0x%08" PRIx32 ", isMsgPresent=%" PRId32,
caps->msgID, caps->msgType, caps->isMsgPresent))
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_caps_response_to_string(char** buffer, size_t* length,
const TSG_PACKET_CAPS_RESPONSE* caps)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "caps_response { "))
return FALSE;
if (!tsg_packet_quarenc_response_to_string(buffer, length, &caps->pktQuarEncResponse))
return FALSE;
if (!tsg_packet_message_response_to_string(buffer, length, &caps->pktConsentMessage))
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_message_request_to_string(char** buffer, size_t* length,
const TSG_PACKET_MSG_REQUEST* caps)
{
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "caps_message_request { "))
return FALSE;
if (!tsg_print(buffer, length, " maxMessagesPerBatch=%" PRIu32, caps->maxMessagesPerBatch))
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_auth_to_string(char** buffer, size_t* length, const TSG_PACKET_AUTH* caps)
{
BOOL rc = FALSE;
char* strdata = NULL;
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "caps_message_request { "))
return FALSE;
if (!tsg_packet_versioncaps_to_string(buffer, length, &caps->tsgVersionCaps))
return FALSE;
strdata = winpr_BinToHexString(caps->cookie, caps->cookieLen, TRUE);
if (strdata || (caps->cookieLen == 0))
rc = tsg_print(buffer, length, " cookie[%" PRIu32 "]=%s", caps->cookieLen, strdata);
free(strdata);
if (!rc)
return FALSE;
return tsg_print(buffer, length, " }");
}
static BOOL tsg_packet_reauth_to_string(char** buffer, size_t* length,
const TSG_PACKET_REAUTH* caps)
{
BOOL rc = FALSE;
WINPR_ASSERT(buffer);
WINPR_ASSERT(length);
WINPR_ASSERT(caps);
if (!tsg_print(buffer, length, "caps_message_request { "))
return FALSE;
if (!tsg_print(buffer, length, " tunnelContext=0x%016" PRIx64 ", packetId=%s [0x%08" PRIx32 "]",
caps->tunnelContext, tsg_packet_id_to_string(caps->packetId), caps->packetId))
return FALSE;
switch (caps->packetId)
{
case TSG_PACKET_TYPE_VERSIONCAPS:
rc = tsg_packet_versioncaps_to_string(buffer, length,
caps->tsgInitialPacket.packetVersionCaps);
break;
case TSG_PACKET_TYPE_AUTH:
rc = tsg_packet_auth_to_string(buffer, length, caps->tsgInitialPacket.packetAuth);
break;
default:
rc = tsg_print(buffer, length, "TODO: Unhandled packet type %s [0x%08" PRIx32 "]",
tsg_packet_id_to_string(caps->packetId), caps->packetId);
break;
}
if (!rc)
return FALSE;
return tsg_print(buffer, length, " }");
}
static const char* tsg_packet_to_string(const TSG_PACKET* packet)
{
size_t len = 8192;
static char sbuffer[8193] = { 0 };
char* buffer = sbuffer;
if (!tsg_print(&buffer, &len, "TSG_PACKET { packetId=%s [0x%08" PRIx32 "], ",
tsg_packet_id_to_string(packet->packetId), packet->packetId))
goto fail;
switch (packet->packetId)
{
case TSG_PACKET_TYPE_HEADER:
if (!tsg_packet_header_to_string(&buffer, &len, packet->tsgPacket.packetHeader))
goto fail;
break;
case TSG_PACKET_TYPE_VERSIONCAPS:
if (!tsg_packet_versioncaps_to_string(&buffer, &len,
packet->tsgPacket.packetVersionCaps))
goto fail;
break;
case TSG_PACKET_TYPE_QUARCONFIGREQUEST:
if (!tsg_packet_quarconfigrequest_to_string(&buffer, &len,
packet->tsgPacket.packetQuarConfigRequest))
goto fail;
break;
case TSG_PACKET_TYPE_QUARREQUEST:
if (!tsg_packet_quarrequest_to_string(&buffer, &len,
packet->tsgPacket.packetQuarRequest))
goto fail;
break;
case TSG_PACKET_TYPE_RESPONSE:
if (!tsg_packet_response_to_string(&buffer, &len, packet->tsgPacket.packetResponse))
goto fail;
break;
case TSG_PACKET_TYPE_QUARENC_RESPONSE:
if (!tsg_packet_quarenc_response_to_string(&buffer, &len,
packet->tsgPacket.packetQuarEncResponse))
goto fail;
break;
case TSG_PACKET_TYPE_CAPS_RESPONSE:
if (!tsg_packet_caps_response_to_string(&buffer, &len,
packet->tsgPacket.packetCapsResponse))
goto fail;
break;
case TSG_PACKET_TYPE_MSGREQUEST_PACKET:
if (!tsg_packet_message_request_to_string(&buffer, &len,
packet->tsgPacket.packetMsgRequest))
goto fail;
break;
case TSG_PACKET_TYPE_MESSAGE_PACKET:
if (!tsg_packet_message_response_to_string(&buffer, &len,
packet->tsgPacket.packetMsgResponse))
goto fail;
break;
case TSG_PACKET_TYPE_AUTH:
if (!tsg_packet_auth_to_string(&buffer, &len, packet->tsgPacket.packetAuth))
goto fail;
break;
case TSG_PACKET_TYPE_REAUTH:
if (!tsg_packet_reauth_to_string(&buffer, &len, packet->tsgPacket.packetReauth))
goto fail;
break;
default:
if (!tsg_print(&buffer, &len, "INVALID"))
goto fail;
break;
}
if (!tsg_print(&buffer, &len, " }"))
goto fail;
fail:
return sbuffer;
}
2018-10-18 11:41:03 +03:00
static BOOL tsg_stream_align(wStream* s, size_t align)
2018-10-18 11:15:51 +03:00
{
size_t pos;
size_t offset = 0;
if (!s)
return FALSE;
pos = Stream_GetPosition(s);
2018-10-18 11:41:03 +03:00
if ((pos % align) != 0)
offset = align - pos % align;
2018-10-18 11:15:51 +03:00
return Stream_SafeSeek(s, offset);
}
2018-01-15 14:43:37 +03:00
static BIO_METHOD* BIO_s_tsg(void);
/**
* RPC Functions: http://msdn.microsoft.com/en-us/library/windows/desktop/aa378623/
* Remote Procedure Call: http://msdn.microsoft.com/en-us/library/windows/desktop/aa378651/
* RPC NDR Interface Reference: http://msdn.microsoft.com/en-us/library/windows/desktop/hh802752/
*/
/**
* call sequence with silent reauth:
*
* TsProxyCreateTunnelRequest()
* TsProxyCreateTunnelResponse(TunnelContext)
* TsProxyAuthorizeTunnelRequest(TunnelContext)
* TsProxyAuthorizeTunnelResponse()
* TsProxyMakeTunnelCallRequest(TunnelContext)
* TsProxyCreateChannelRequest(TunnelContext)
* TsProxyCreateChannelResponse(ChannelContext)
* TsProxySetupReceivePipeRequest(ChannelContext)
* TsProxySendToServerRequest(ChannelContext)
*
* ...
*
* TsProxyMakeTunnelCallResponse(reauth)
* TsProxyCreateTunnelRequest()
* TsProxyMakeTunnelCallRequest(TunnelContext)
* TsProxyCreateTunnelResponse(NewTunnelContext)
* TsProxyAuthorizeTunnelRequest(NewTunnelContext)
* TsProxyAuthorizeTunnelResponse()
* TsProxyCreateChannelRequest(NewTunnelContext)
* TsProxyCreateChannelResponse(NewChannelContext)
* TsProxyCloseChannelRequest(NewChannelContext)
* TsProxyCloseTunnelRequest(NewTunnelContext)
* TsProxyCloseChannelResponse(NullChannelContext)
* TsProxyCloseTunnelResponse(NullTunnelContext)
* TsProxySendToServerRequest(ChannelContext)
*/
2018-09-28 09:43:43 +03:00
static int TsProxySendToServer(handle_t IDL_handle, const byte pRpcMessage[], UINT32 count,
UINT32* lengths)
{
2012-12-14 05:23:37 +04:00
wStream* s;
2012-04-24 04:13:06 +04:00
rdpTsg* tsg;
size_t length;
2018-09-28 09:43:43 +03:00
const byte* buffer1 = NULL;
const byte* buffer2 = NULL;
const byte* buffer3 = NULL;
2012-10-09 11:26:39 +04:00
UINT32 buffer1Length;
UINT32 buffer2Length;
UINT32 buffer3Length;
UINT32 numBuffers = 0;
UINT32 totalDataBytes = 0;
2019-11-06 17:24:51 +03:00
tsg = (rdpTsg*)IDL_handle;
2012-04-24 04:13:06 +04:00
buffer1Length = buffer2Length = buffer3Length = 0;
if (count > 0)
{
numBuffers++;
buffer1 = &pRpcMessage[0];
buffer1Length = lengths[0];
totalDataBytes += lengths[0] + 4;
}
if (count > 1)
{
numBuffers++;
buffer2 = &pRpcMessage[1];
buffer2Length = lengths[1];
totalDataBytes += lengths[1] + 4;
}
if (count > 2)
{
numBuffers++;
buffer3 = &pRpcMessage[2];
buffer3Length = lengths[2];
totalDataBytes += lengths[2] + 4;
}
length = 28ull + totalDataBytes;
if (length > INT_MAX)
return -1;
2018-09-28 09:43:43 +03:00
s = Stream_New(NULL, length);
if (!s)
{
WLog_ERR(TAG, "Stream_New failed!");
return -1;
}
2017-02-20 16:12:39 +03:00
2012-04-24 04:13:06 +04:00
/* PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE_NR (20 bytes) */
2012-12-14 05:23:37 +04:00
Stream_Write(s, &tsg->ChannelContext.ContextType, 4); /* ContextType (4 bytes) */
Stream_Write(s, tsg->ChannelContext.ContextUuid, 16); /* ContextUuid (16 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32_BE(s, totalDataBytes); /* totalDataBytes (4 bytes) */
Stream_Write_UINT32_BE(s, numBuffers); /* numBuffers (4 bytes) */
2012-04-24 04:13:06 +04:00
if (buffer1Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write_UINT32_BE(s, buffer1Length); /* buffer1Length (4 bytes) */
2014-08-19 20:26:39 +04:00
2012-04-24 04:13:06 +04:00
if (buffer2Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write_UINT32_BE(s, buffer2Length); /* buffer2Length (4 bytes) */
2014-08-19 20:26:39 +04:00
2012-04-24 04:13:06 +04:00
if (buffer3Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write_UINT32_BE(s, buffer3Length); /* buffer3Length (4 bytes) */
2012-04-24 04:13:06 +04:00
if (buffer1Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write(s, buffer1, buffer1Length); /* buffer1 (variable) */
2014-08-19 20:26:39 +04:00
2012-04-24 04:13:06 +04:00
if (buffer2Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write(s, buffer2, buffer2Length); /* buffer2 (variable) */
2014-08-19 20:26:39 +04:00
2012-04-24 04:13:06 +04:00
if (buffer3Length > 0)
2012-12-14 05:23:37 +04:00
Stream_Write(s, buffer3, buffer3Length); /* buffer3 (variable) */
2012-04-24 04:13:06 +04:00
2018-09-28 09:43:43 +03:00
if (!rpc_client_write_call(tsg->rpc, s, TsProxySendToServerOpnum))
2012-04-24 04:13:06 +04:00
return -1;
return (int)length;
}
/**
* OpNum = 1
*
* HRESULT TsProxyCreateTunnel(
* [in, ref] PTSG_PACKET tsgPacket,
* [out, ref] PTSG_PACKET* tsgPacketResponse,
* [out] PTUNNEL_CONTEXT_HANDLE_SERIALIZE* tunnelContext,
* [out] unsigned long* tunnelId
* );
*/
static BOOL TsProxyCreateTunnelWriteRequest(rdpTsg* tsg, const PTSG_PACKET tsgPacket)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
BOOL write = TRUE;
UINT16 opnum = 0;
wStream* s;
rdpRpc* rpc;
if (!tsg || !tsg->rpc)
return FALSE;
rpc = tsg->rpc;
WLog_DBG(TAG, "%s", tsg_packet_to_string(tsgPacket));
2018-09-28 09:43:43 +03:00
s = Stream_New(NULL, 108);
2018-09-28 09:43:43 +03:00
if (!s)
return FALSE;
switch (tsgPacket->packetId)
{
2018-09-28 09:43:43 +03:00
case TSG_PACKET_TYPE_VERSIONCAPS:
2019-11-06 17:24:51 +03:00
{
PTSG_PACKET_VERSIONCAPS packetVersionCaps = tsgPacket->tsgPacket.packetVersionCaps;
PTSG_CAPABILITY_NAP tsgCapNap = &packetVersionCaps->tsgCaps->tsgPacket.tsgCapNap;
Stream_Write_UINT32(s, tsgPacket->packetId); /* PacketId (4 bytes) */
Stream_Write_UINT32(s, tsgPacket->packetId); /* SwitchValue (4 bytes) */
Stream_Write_UINT32(s, 0x00020000); /* PacketVersionCapsPtr (4 bytes) */
Stream_Write_UINT16(
s, packetVersionCaps->tsgHeader.ComponentId); /* ComponentId (2 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->tsgHeader.PacketId); /* PacketId (2 bytes) */
Stream_Write_UINT32(s, 0x00020004); /* TsgCapsPtr (4 bytes) */
Stream_Write_UINT32(s,
packetVersionCaps->numCapabilities); /* NumCapabilities (4 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->majorVersion); /* MajorVersion (2 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->minorVersion); /* MinorVersion (2 bytes) */
Stream_Write_UINT16(
s,
packetVersionCaps->quarantineCapabilities); /* QuarantineCapabilities (2 bytes) */
/* 4-byte alignment (30 + 2) */
Stream_Write_UINT16(s, 0x0000); /* pad (2 bytes) */
Stream_Write_UINT32(s, packetVersionCaps->numCapabilities); /* MaxCount (4 bytes) */
Stream_Write_UINT32(
s, packetVersionCaps->tsgCaps->capabilityType); /* CapabilityType (4 bytes) */
Stream_Write_UINT32(
s, packetVersionCaps->tsgCaps->capabilityType); /* SwitchValue (4 bytes) */
Stream_Write_UINT32(s, tsgCapNap->capabilities); /* capabilities (4 bytes) */
/**
* The following 60-byte structure is apparently undocumented,
* but parts of it can be matched to known C706 data structures.
*/
/*
* 8-byte constant (8A E3 13 71 02 F4 36 71) also observed here:
* http://lists.samba.org/archive/cifs-protocol/2010-July/001543.html
*/
Stream_Write_UINT8(s, 0x8A);
Stream_Write_UINT8(s, 0xE3);
Stream_Write_UINT8(s, 0x13);
Stream_Write_UINT8(s, 0x71);
Stream_Write_UINT8(s, 0x02);
Stream_Write_UINT8(s, 0xF4);
Stream_Write_UINT8(s, 0x36);
Stream_Write_UINT8(s, 0x71);
Stream_Write_UINT32(s, 0x00040001); /* 1.4 (version?) */
Stream_Write_UINT32(s, 0x00000001); /* 1 (element count?) */
/* p_cont_list_t */
Stream_Write_UINT8(s, 2); /* ncontext_elem */
Stream_Write_UINT8(s, 0x40); /* reserved1 */
Stream_Write_UINT16(s, 0x0028); /* reserved2 */
/* p_syntax_id_t */
Stream_Write(s, &TSGU_UUID, sizeof(p_uuid_t));
Stream_Write_UINT32(s, TSGU_SYNTAX_IF_VERSION);
/* p_syntax_id_t */
Stream_Write(s, &NDR_UUID, sizeof(p_uuid_t));
Stream_Write_UINT32(s, NDR_SYNTAX_IF_VERSION);
opnum = TsProxyCreateTunnelOpnum;
}
break;
2018-09-28 09:43:43 +03:00
case TSG_PACKET_TYPE_REAUTH:
2019-11-06 17:24:51 +03:00
{
PTSG_PACKET_REAUTH packetReauth = tsgPacket->tsgPacket.packetReauth;
PTSG_PACKET_VERSIONCAPS packetVersionCaps =
packetReauth->tsgInitialPacket.packetVersionCaps;
PTSG_CAPABILITY_NAP tsgCapNap = &packetVersionCaps->tsgCaps->tsgPacket.tsgCapNap;
Stream_Write_UINT32(s, tsgPacket->packetId); /* PacketId (4 bytes) */
Stream_Write_UINT32(s, tsgPacket->packetId); /* SwitchValue (4 bytes) */
Stream_Write_UINT32(s, 0x00020000); /* PacketReauthPtr (4 bytes) */
Stream_Write_UINT32(s, 0); /* ??? (4 bytes) */
Stream_Write_UINT64(s, packetReauth->tunnelContext); /* TunnelContext (8 bytes) */
Stream_Write_UINT32(s, TSG_PACKET_TYPE_VERSIONCAPS); /* PacketId (4 bytes) */
Stream_Write_UINT32(s, TSG_PACKET_TYPE_VERSIONCAPS); /* SwitchValue (4 bytes) */
Stream_Write_UINT32(s, 0x00020004); /* PacketVersionCapsPtr (4 bytes) */
Stream_Write_UINT16(
s, packetVersionCaps->tsgHeader.ComponentId); /* ComponentId (2 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->tsgHeader.PacketId); /* PacketId (2 bytes) */
Stream_Write_UINT32(s, 0x00020008); /* TsgCapsPtr (4 bytes) */
Stream_Write_UINT32(s,
packetVersionCaps->numCapabilities); /* NumCapabilities (4 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->majorVersion); /* MajorVersion (2 bytes) */
Stream_Write_UINT16(s, packetVersionCaps->minorVersion); /* MinorVersion (2 bytes) */
Stream_Write_UINT16(
s,
packetVersionCaps->quarantineCapabilities); /* QuarantineCapabilities (2 bytes) */
/* 4-byte alignment (30 + 2) */
Stream_Write_UINT16(s, 0x0000); /* pad (2 bytes) */
Stream_Write_UINT32(s, packetVersionCaps->numCapabilities); /* MaxCount (4 bytes) */
Stream_Write_UINT32(
s, packetVersionCaps->tsgCaps->capabilityType); /* CapabilityType (4 bytes) */
Stream_Write_UINT32(
s, packetVersionCaps->tsgCaps->capabilityType); /* SwitchValue (4 bytes) */
Stream_Write_UINT32(s, tsgCapNap->capabilities); /* capabilities (4 bytes) */
opnum = TsProxyCreateTunnelOpnum;
}
break;
2018-09-28 09:43:43 +03:00
default:
write = FALSE;
break;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
2018-09-28 09:43:43 +03:00
if (write)
return rpc_client_write_call(rpc, s, opnum);
2018-09-28 09:43:43 +03:00
Stream_Free(s, TRUE);
return rc;
}
static BOOL TsProxyCreateTunnelReadResponse(rdpTsg* tsg, RPC_PDU* pdu,
2019-11-06 17:24:51 +03:00
CONTEXT_HANDLE* tunnelContext, UINT32* tunnelId)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
UINT32 count;
UINT32 Pointer;
PTSG_PACKET packet;
UINT32 SwitchValue;
UINT32 MessageSwitchValue = 0;
UINT32 IsMessagePresent;
rdpContext* context;
2018-09-28 09:43:43 +03:00
PTSG_PACKET_CAPABILITIES tsgCaps = NULL;
PTSG_PACKET_VERSIONCAPS versionCaps = NULL;
TSG_PACKET_STRING_MESSAGE packetStringMessage;
2018-09-28 09:43:43 +03:00
PTSG_PACKET_CAPS_RESPONSE packetCapsResponse = NULL;
PTSG_PACKET_QUARENC_RESPONSE packetQuarEncResponse = NULL;
WINPR_ASSERT(tsg);
WINPR_ASSERT(tsg->rpc);
WINPR_ASSERT(tsg->rpc->transport);
context = transport_get_context(tsg->rpc->transport);
WINPR_ASSERT(context);
if (!pdu)
return FALSE;
2019-11-06 17:24:51 +03:00
packet = (PTSG_PACKET)calloc(1, sizeof(TSG_PACKET));
2014-08-19 20:26:39 +04:00
if (!packet)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 12))
2018-09-28 09:43:43 +03:00
goto fail;
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* PacketPtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, packet->packetId); /* PacketId (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, SwitchValue); /* SwitchValue (4 bytes) */
WLog_DBG(TAG, "%s", tsg_packet_id_to_string(packet->packetId));
2017-02-20 16:12:39 +03:00
if ((packet->packetId == TSG_PACKET_TYPE_CAPS_RESPONSE) &&
(SwitchValue == TSG_PACKET_TYPE_CAPS_RESPONSE))
{
2019-11-06 17:24:51 +03:00
packetCapsResponse = (PTSG_PACKET_CAPS_RESPONSE)calloc(1, sizeof(TSG_PACKET_CAPS_RESPONSE));
2014-08-19 20:26:39 +04:00
2015-01-13 21:50:46 +03:00
if (!packetCapsResponse)
2018-09-28 09:43:43 +03:00
goto fail;
2014-08-19 20:26:39 +04:00
packet->tsgPacket.packetCapsResponse = packetCapsResponse;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 32))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Seek_UINT32(pdu->s); /* PacketQuarResponsePtr (4 bytes) */
Stream_Read_UINT32(pdu->s,
2019-11-06 17:24:51 +03:00
packetCapsResponse->pktQuarEncResponse.flags); /* Flags (4 bytes) */
Stream_Read_UINT32(
pdu->s,
packetCapsResponse->pktQuarEncResponse.certChainLen); /* CertChainLength (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* CertChainDataPtr (4 bytes) */
Stream_Read(pdu->s, &packetCapsResponse->pktQuarEncResponse.nonce,
16); /* Nonce (16 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, Pointer); /* VersionCapsPtr (4 bytes) */
2012-12-14 05:23:37 +04:00
if ((Pointer == 0x0002000C) || (Pointer == 0x00020008))
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 16))
2018-09-28 09:43:43 +03:00
goto fail;
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* MsgId (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* MsgType (4 bytes) */
Stream_Read_UINT32(pdu->s, IsMessagePresent); /* IsMessagePresent (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, MessageSwitchValue); /* MessageSwitchValue (4 bytes) */
}
2012-12-14 05:23:37 +04:00
if (packetCapsResponse->pktQuarEncResponse.certChainLen > 0)
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 16))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, Pointer); /* MsgPtr (4 bytes): 0x00020014 */
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* MaxCount (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* Offset (4 bytes) */
Stream_Read_UINT32(pdu->s, count); /* ActualCount (4 bytes) */
2018-09-28 09:43:43 +03:00
/*
* CertChainData is a wide character string, and the count is
* given in characters excluding the null terminator, therefore:
2012-12-14 05:23:37 +04:00
* size = (count * 2)
*/
2018-09-28 09:43:43 +03:00
if (!Stream_SafeSeek(pdu->s, count * 2)) /* CertChainData */
goto fail;
/* 4-byte alignment */
2018-10-18 11:41:03 +03:00
if (!tsg_stream_align(pdu->s, 4))
2018-10-18 11:15:51 +03:00
goto fail;
}
else
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 4))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, Pointer); /* Ptr (4 bytes) */
}
2019-11-06 17:24:51 +03:00
versionCaps = (PTSG_PACKET_VERSIONCAPS)calloc(1, sizeof(TSG_PACKET_VERSIONCAPS));
2014-08-19 20:26:39 +04:00
2015-01-13 21:50:46 +03:00
if (!versionCaps)
2018-09-28 09:43:43 +03:00
goto fail;
2014-08-19 20:26:39 +04:00
packetCapsResponse->pktQuarEncResponse.versionCaps = versionCaps;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 18))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT16(pdu->s, versionCaps->tsgHeader.ComponentId); /* ComponentId (2 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT16(pdu->s, versionCaps->tsgHeader.PacketId); /* PacketId (2 bytes) */
if (versionCaps->tsgHeader.ComponentId != TS_GATEWAY_TRANSPORT)
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "Unexpected ComponentId: 0x%04" PRIX16 ", Expected TS_GATEWAY_TRANSPORT",
2017-02-20 16:12:39 +03:00
versionCaps->tsgHeader.ComponentId);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, Pointer); /* TsgCapsPtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, versionCaps->numCapabilities); /* NumCapabilities (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT16(pdu->s, versionCaps->majorVersion); /* MajorVersion (2 bytes) */
Stream_Read_UINT16(pdu->s, versionCaps->minorVersion); /* MinorVersion (2 bytes) */
Stream_Read_UINT16(
pdu->s, versionCaps->quarantineCapabilities); /* QuarantineCapabilities (2 bytes) */
2018-10-18 10:09:30 +03:00
2018-10-18 11:15:51 +03:00
/* 4-byte alignment */
2018-10-18 11:41:03 +03:00
if (!tsg_stream_align(pdu->s, 4))
2018-10-18 11:15:51 +03:00
goto fail;
2018-09-28 09:43:43 +03:00
2019-11-06 17:24:51 +03:00
tsgCaps = (PTSG_PACKET_CAPABILITIES)calloc(1, sizeof(TSG_PACKET_CAPABILITIES));
2014-08-19 20:26:39 +04:00
if (!tsgCaps)
2018-09-28 09:43:43 +03:00
goto fail;
versionCaps->tsgCaps = tsgCaps;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 16))
2018-09-28 09:43:43 +03:00
goto fail;
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* MaxCount (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, tsgCaps->capabilityType); /* CapabilityType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, SwitchValue); /* SwitchValue (4 bytes) */
2017-02-20 16:12:39 +03:00
if ((SwitchValue != TSG_CAPABILITY_TYPE_NAP) ||
(tsgCaps->capabilityType != TSG_CAPABILITY_TYPE_NAP))
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG,
"Unexpected CapabilityType: 0x%08" PRIX32 ", Expected TSG_CAPABILITY_TYPE_NAP",
2017-02-20 16:12:39 +03:00
tsgCaps->capabilityType);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s,
tsgCaps->tsgPacket.tsgCapNap.capabilities); /* Capabilities (4 bytes) */
switch (MessageSwitchValue)
{
case TSG_ASYNC_MESSAGE_CONSENT_MESSAGE:
case TSG_ASYNC_MESSAGE_SERVICE_MESSAGE:
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 16))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_INT32(pdu->s, packetStringMessage.isDisplayMandatory);
Stream_Read_INT32(pdu->s, packetStringMessage.isConsentMandatory);
Stream_Read_UINT32(pdu->s, packetStringMessage.msgBytes);
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, Pointer);
if (Pointer)
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 12))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Seek_UINT32(pdu->s); /* MaxCount (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* Offset (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* Length (4 bytes) */
}
if (packetStringMessage.msgBytes > TSG_MESSAGING_MAX_MESSAGE_LENGTH)
{
WLog_ERR(TAG, "Out of Spec Message Length %" PRIu32 "",
packetStringMessage.msgBytes);
2018-09-28 09:43:43 +03:00
goto fail;
}
2014-08-19 20:26:39 +04:00
packetStringMessage.msgBuffer = Stream_Pointer(pdu->s);
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, packetStringMessage.msgBytes))
2018-09-28 09:43:43 +03:00
goto fail;
if (context->instance)
{
rc = IFCALLRESULT(
TRUE, context->instance->PresentGatewayMessage, context->instance,
TSG_ASYNC_MESSAGE_CONSENT_MESSAGE ? GATEWAY_MESSAGE_CONSENT
: TSG_ASYNC_MESSAGE_SERVICE_MESSAGE,
packetStringMessage.isDisplayMandatory != 0,
packetStringMessage.isConsentMandatory != 0, packetStringMessage.msgBytes,
packetStringMessage.msgBuffer);
if (!rc)
goto fail;
}
2018-09-28 09:43:43 +03:00
Stream_Seek(pdu->s, packetStringMessage.msgBytes);
break;
2015-01-13 21:50:46 +03:00
case TSG_ASYNC_MESSAGE_REAUTH:
2019-11-06 17:24:51 +03:00
{
if (!tsg_stream_align(pdu->s, 8))
goto fail;
2018-10-18 11:41:03 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 8))
2019-11-06 17:24:51 +03:00
goto fail;
2018-09-28 09:43:43 +03:00
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT64(pdu->s); /* TunnelContext (8 bytes) */
}
break;
2015-01-13 21:50:46 +03:00
default:
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "Unexpected Message Type: 0x%" PRIX32 "", MessageSwitchValue);
2018-09-28 09:43:43 +03:00
goto fail;
}
2018-10-18 11:41:03 +03:00
if (!tsg_stream_align(pdu->s, 4))
2018-10-18 11:15:51 +03:00
goto fail;
/* TunnelContext (20 bytes) */
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 24))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, tunnelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read(pdu->s, tunnelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
Stream_Read_UINT32(pdu->s, *tunnelId); /* TunnelId (4 bytes) */
/* ReturnValue (4 bytes) */
}
2017-02-20 16:12:39 +03:00
else if ((packet->packetId == TSG_PACKET_TYPE_QUARENC_RESPONSE) &&
(SwitchValue == TSG_PACKET_TYPE_QUARENC_RESPONSE))
{
2019-11-06 17:24:51 +03:00
packetQuarEncResponse =
(PTSG_PACKET_QUARENC_RESPONSE)calloc(1, sizeof(TSG_PACKET_QUARENC_RESPONSE));
2014-08-19 20:26:39 +04:00
2015-01-13 21:50:46 +03:00
if (!packetQuarEncResponse)
2018-09-28 09:43:43 +03:00
goto fail;
2014-08-19 20:26:39 +04:00
packet->tsgPacket.packetQuarEncResponse = packetQuarEncResponse;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 32))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Seek_UINT32(pdu->s); /* PacketQuarResponsePtr (4 bytes) */
Stream_Read_UINT32(pdu->s, packetQuarEncResponse->flags); /* Flags (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s,
packetQuarEncResponse->certChainLen); /* CertChainLength (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* CertChainDataPtr (4 bytes) */
Stream_Read(pdu->s, &packetQuarEncResponse->nonce, 16); /* Nonce (16 bytes) */
if (packetQuarEncResponse->certChainLen > 0)
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 16))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, Pointer); /* Ptr (4 bytes): 0x0002000C */
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* MaxCount (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* Offset (4 bytes) */
Stream_Read_UINT32(pdu->s, count); /* ActualCount (4 bytes) */
2018-09-28 09:43:43 +03:00
/*
* CertChainData is a wide character string, and the count is
* given in characters excluding the null terminator, therefore:
2012-12-14 05:23:37 +04:00
* size = (count * 2)
*/
2018-09-28 09:43:43 +03:00
if (!Stream_SafeSeek(pdu->s, count * 2)) /* CertChainData */
goto fail;
/* 4-byte alignment */
2018-10-18 11:41:03 +03:00
if (!tsg_stream_align(pdu->s, 4))
2018-10-18 11:15:51 +03:00
goto fail;
}
else
{
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 4))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, Pointer); /* Ptr (4 bytes): 0x00020008 */
}
2019-11-06 17:24:51 +03:00
versionCaps = (PTSG_PACKET_VERSIONCAPS)calloc(1, sizeof(TSG_PACKET_VERSIONCAPS));
2014-08-19 20:26:39 +04:00
2015-01-13 21:50:46 +03:00
if (!versionCaps)
2018-09-28 09:43:43 +03:00
goto fail;
2014-08-19 20:26:39 +04:00
packetQuarEncResponse->versionCaps = versionCaps;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 18))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT16(pdu->s, versionCaps->tsgHeader.ComponentId); /* ComponentId (2 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT16(pdu->s, versionCaps->tsgHeader.PacketId); /* PacketId (2 bytes) */
if (versionCaps->tsgHeader.ComponentId != TS_GATEWAY_TRANSPORT)
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "Unexpected ComponentId: 0x%04" PRIX16 ", Expected TS_GATEWAY_TRANSPORT",
2017-02-20 16:12:39 +03:00
versionCaps->tsgHeader.ComponentId);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, Pointer); /* TsgCapsPtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, versionCaps->numCapabilities); /* NumCapabilities (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT16(pdu->s, versionCaps->majorVersion); /* MajorVersion (2 bytes) */
Stream_Read_UINT16(pdu->s, versionCaps->minorVersion); /* MinorVersion (2 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT16(
pdu->s, versionCaps->quarantineCapabilities); /* QuarantineCapabilities (2 bytes) */
2018-09-28 09:43:43 +03:00
2018-10-18 11:15:51 +03:00
/* 4-byte alignment */
2018-10-18 11:41:03 +03:00
if (!tsg_stream_align(pdu->s, 4))
2018-10-18 11:15:51 +03:00
goto fail;
2018-09-28 09:43:43 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 36))
2018-09-28 09:43:43 +03:00
goto fail;
/* Not sure exactly what this is */
2018-09-28 09:43:43 +03:00
Stream_Seek_UINT32(pdu->s); /* 0x00000001 (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* 0x00000001 (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* 0x00000001 (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* 0x00000002 (4 bytes) */
/* TunnelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, tunnelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read(pdu->s, tunnelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
}
else
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG,
"Unexpected PacketId: 0x%08" PRIX32 ", Expected TSG_PACKET_TYPE_CAPS_RESPONSE "
"or TSG_PACKET_TYPE_QUARENC_RESPONSE",
packet->packetId);
2018-09-28 09:43:43 +03:00
goto fail;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
free(packetQuarEncResponse);
free(packetCapsResponse);
free(versionCaps);
free(tsgCaps);
free(packet);
2018-09-28 09:43:43 +03:00
return rc;
}
/**
* OpNum = 2
*
* HRESULT TsProxyAuthorizeTunnel(
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
* [in, ref] PTSG_PACKET tsgPacket,
* [out, ref] PTSG_PACKET* tsgPacketResponse
* );
*
*/
static BOOL TsProxyAuthorizeTunnelWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* tunnelContext)
{
size_t pad;
2018-09-28 09:43:43 +03:00
wStream* s;
size_t count;
size_t offset;
2018-09-28 09:43:43 +03:00
rdpRpc* rpc;
if (!tsg || !tsg->rpc || !tunnelContext || !tsg->MachineName)
return FALSE;
count = _wcslen(tsg->MachineName) + 1;
if (count > UINT32_MAX)
return FALSE;
2018-09-28 09:43:43 +03:00
rpc = tsg->rpc;
WLog_DBG(TAG, "TsProxyAuthorizeTunnelWriteRequest");
2018-10-18 11:15:51 +03:00
s = Stream_New(NULL, 1024 + count * 2);
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
if (!s)
2015-01-13 21:50:46 +03:00
return FALSE;
/* TunnelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, tunnelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, &tunnelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
/* 4-byte alignment */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, TSG_PACKET_TYPE_QUARREQUEST); /* PacketId (4 bytes) */
Stream_Write_UINT32(s, TSG_PACKET_TYPE_QUARREQUEST); /* SwitchValue (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32(s, 0x00020000); /* PacketQuarRequestPtr (4 bytes) */
Stream_Write_UINT32(s, 0x00000000); /* Flags (4 bytes) */
Stream_Write_UINT32(s, 0x00020004); /* MachineNamePtr (4 bytes) */
Stream_Write_UINT32(s, (UINT32)count); /* NameLength (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32(s, 0x00020008); /* DataPtr (4 bytes) */
Stream_Write_UINT32(s, 0); /* DataLength (4 bytes) */
/* MachineName */
Stream_Write_UINT32(s, (UINT32)count); /* MaxCount (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32(s, 0); /* Offset (4 bytes) */
Stream_Write_UINT32(s, (UINT32)count); /* ActualCount (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UTF16_String(s, tsg->MachineName, count); /* Array */
/* 4-byte alignment */
2018-09-28 09:43:43 +03:00
offset = Stream_GetPosition(s);
pad = rpc_offset_align(&offset, 4);
2018-09-28 09:43:43 +03:00
Stream_Zero(s, pad);
Stream_Write_UINT32(s, 0x00000000); /* MaxCount (4 bytes) */
Stream_SealLength(s);
return rpc_client_write_call(rpc, s, TsProxyAuthorizeTunnelOpnum);
}
static BOOL TsProxyAuthorizeTunnelReadResponse(RPC_PDU* pdu)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
UINT32 Pointer;
UINT32 SizeValue;
UINT32 SwitchValue;
UINT32 idleTimeout;
2018-09-28 09:43:43 +03:00
PTSG_PACKET packet = NULL;
PTSG_PACKET_RESPONSE packetResponse = NULL;
if (!pdu)
return FALSE;
2019-11-06 17:24:51 +03:00
packet = (PTSG_PACKET)calloc(1, sizeof(TSG_PACKET));
2015-01-13 21:50:46 +03:00
if (!packet)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 68))
2018-09-28 09:43:43 +03:00
goto fail;
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* PacketPtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, packet->packetId); /* PacketId (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, SwitchValue); /* SwitchValue (4 bytes) */
WLog_DBG(TAG, "%s", tsg_packet_id_to_string(packet->packetId));
if (packet->packetId == E_PROXY_NAP_ACCESSDENIED)
{
2015-01-13 21:50:46 +03:00
WLog_ERR(TAG, "status: E_PROXY_NAP_ACCESSDENIED (0x%08X)", E_PROXY_NAP_ACCESSDENIED);
WLog_ERR(TAG, "Ensure that the Gateway Connection Authorization Policy is correct");
2018-09-28 09:43:43 +03:00
goto fail;
}
if ((packet->packetId != TSG_PACKET_TYPE_RESPONSE) || (SwitchValue != TSG_PACKET_TYPE_RESPONSE))
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "Unexpected PacketId: 0x%08" PRIX32 ", Expected TSG_PACKET_TYPE_RESPONSE",
2017-02-20 16:12:39 +03:00
packet->packetId);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
packetResponse = (PTSG_PACKET_RESPONSE)calloc(1, sizeof(TSG_PACKET_RESPONSE));
2015-01-13 21:50:46 +03:00
if (!packetResponse)
2018-09-28 09:43:43 +03:00
goto fail;
2015-01-13 21:50:46 +03:00
packet->tsgPacket.packetResponse = packetResponse;
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, Pointer); /* PacketResponsePtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, packetResponse->flags); /* Flags (4 bytes) */
if (packetResponse->flags != TSG_PACKET_TYPE_QUARREQUEST)
{
2017-02-20 16:12:39 +03:00
WLog_ERR(TAG,
2019-11-06 17:24:51 +03:00
"Unexpected Packet Response Flags: 0x%08" PRIX32
", Expected TSG_PACKET_TYPE_QUARREQUEST",
2017-02-20 16:12:39 +03:00
packetResponse->flags);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* Reserved (4 bytes) */
Stream_Read_UINT32(pdu->s, Pointer); /* ResponseDataPtr (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, packetResponse->responseDataLen); /* ResponseDataLength (4 bytes) */
Stream_Read_INT32(pdu->s, packetResponse->redirectionFlags
.enableAllRedirections); /* EnableAllRedirections (4 bytes) */
Stream_Read_INT32(pdu->s, packetResponse->redirectionFlags
.disableAllRedirections); /* DisableAllRedirections (4 bytes) */
Stream_Read_INT32(pdu->s,
packetResponse->redirectionFlags
.driveRedirectionDisabled); /* DriveRedirectionDisabled (4 bytes) */
Stream_Read_INT32(pdu->s,
packetResponse->redirectionFlags
.printerRedirectionDisabled); /* PrinterRedirectionDisabled (4 bytes) */
Stream_Read_INT32(pdu->s, packetResponse->redirectionFlags
.portRedirectionDisabled); /* PortRedirectionDisabled (4 bytes) */
Stream_Read_INT32(pdu->s, packetResponse->redirectionFlags.reserved); /* Reserved (4 bytes) */
Stream_Read_INT32(
2019-11-06 17:24:51 +03:00
pdu->s, packetResponse->redirectionFlags
.clipboardRedirectionDisabled); /* ClipboardRedirectionDisabled (4 bytes) */
Stream_Read_INT32(pdu->s, packetResponse->redirectionFlags
2022-06-23 08:57:38 +03:00
.pnpRedirectionDisabled); /* PnpRedirectionDisabled (4 bytes) */
Stream_Read_UINT32(pdu->s, SizeValue); /* (4 bytes) */
if (SizeValue != packetResponse->responseDataLen)
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "Unexpected size value: %" PRIu32 ", expected: %" PRIu32 "", SizeValue,
packetResponse->responseDataLen);
2018-09-28 09:43:43 +03:00
goto fail;
}
2017-02-20 16:12:39 +03:00
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, SizeValue))
2018-09-28 09:43:43 +03:00
goto fail;
if (SizeValue == 4)
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, idleTimeout);
else
2018-09-28 09:43:43 +03:00
Stream_Seek(pdu->s, SizeValue); /* ResponseData */
2017-02-20 16:12:39 +03:00
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
free(packetResponse);
free(packet);
2018-09-28 09:43:43 +03:00
return rc;
}
/**
* OpNum = 3
*
* HRESULT TsProxyMakeTunnelCall(
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
* [in] unsigned long procId,
* [in, ref] PTSG_PACKET tsgPacket,
* [out, ref] PTSG_PACKET* tsgPacketResponse
* );
*/
static BOOL TsProxyMakeTunnelCallWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* tunnelContext,
2019-11-06 17:24:51 +03:00
UINT32 procId)
{
2018-09-28 09:43:43 +03:00
wStream* s;
rdpRpc* rpc;
if (!tsg || !tsg->rpc || !tunnelContext)
return FALSE;
rpc = tsg->rpc;
WLog_DBG(TAG, "TsProxyMakeTunnelCallWriteRequest");
2018-09-28 09:43:43 +03:00
s = Stream_New(NULL, 40);
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
if (!s)
2015-01-13 21:50:46 +03:00
return FALSE;
/* TunnelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, tunnelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, tunnelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
Stream_Write_UINT32(s, procId); /* ProcId (4 bytes) */
/* 4-byte alignment */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, TSG_PACKET_TYPE_MSGREQUEST_PACKET); /* PacketId (4 bytes) */
Stream_Write_UINT32(s, TSG_PACKET_TYPE_MSGREQUEST_PACKET); /* SwitchValue (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32(s, 0x00020000); /* PacketMsgRequestPtr (4 bytes) */
Stream_Write_UINT32(s, 0x00000001); /* MaxMessagesPerBatch (4 bytes) */
2018-09-28 09:43:43 +03:00
return rpc_client_write_call(rpc, s, TsProxyMakeTunnelCallOpnum);
}
static BOOL TsProxyReadPacketSTringMessage(rdpTsg* tsg, wStream* s, TSG_PACKET_STRING_MESSAGE* msg)
{
UINT32 Pointer, ActualCount, MaxCount;
if (!tsg || !s || !msg)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, s, 32))
return FALSE;
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(s, Pointer); /* ConsentMessagePtr (4 bytes) */
Stream_Read_INT32(s, msg->isDisplayMandatory); /* IsDisplayMandatory (4 bytes) */
Stream_Read_INT32(s, msg->isConsentMandatory); /* IsConsentMandatory (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(s, msg->msgBytes); /* MsgBytes (4 bytes) */
Stream_Read_UINT32(s, Pointer); /* MsgPtr (4 bytes) */
Stream_Read_UINT32(s, MaxCount); /* MaxCount (4 bytes) */
Stream_Seek_UINT32(s); /* Offset (4 bytes) */
Stream_Read_UINT32(s, ActualCount); /* ActualCount (4 bytes) */
if (msg->msgBytes < ActualCount * 2)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, s, msg->msgBytes))
return FALSE;
msg->msgBuffer = Stream_Pointer(s);
Stream_Seek(s, msg->msgBytes);
return TRUE;
}
static BOOL TsProxyMakeTunnelCallReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
UINT32 Pointer;
UINT32 SwitchValue;
TSG_PACKET packet;
rdpContext* context;
char* messageText = NULL;
TSG_PACKET_MSG_RESPONSE packetMsgResponse = { 0 };
TSG_PACKET_STRING_MESSAGE packetStringMessage = { 0 };
TSG_PACKET_REAUTH_MESSAGE packetReauthMessage = { 0 };
WINPR_ASSERT(tsg);
WINPR_ASSERT(tsg->rpc);
context = transport_get_context(tsg->rpc->transport);
WINPR_ASSERT(context);
/* This is an asynchronous response */
if (!pdu)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 28))
2018-09-28 09:43:43 +03:00
goto fail;
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* PacketPtr (4 bytes) */
Stream_Read_UINT32(pdu->s, packet.packetId); /* PacketId (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, SwitchValue); /* SwitchValue (4 bytes) */
WLog_DBG(TAG, "%s", tsg_packet_id_to_string(packet.packetId));
if ((packet.packetId != TSG_PACKET_TYPE_MESSAGE_PACKET) ||
2017-02-20 16:12:39 +03:00
(SwitchValue != TSG_PACKET_TYPE_MESSAGE_PACKET))
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG,
"Unexpected PacketId: 0x%08" PRIX32 ", Expected TSG_PACKET_TYPE_MESSAGE_PACKET",
packet.packetId);
2018-09-28 09:43:43 +03:00
goto fail;
}
2019-11-06 17:24:51 +03:00
Stream_Read_UINT32(pdu->s, Pointer); /* PacketMsgResponsePtr (4 bytes) */
Stream_Read_UINT32(pdu->s, packetMsgResponse.msgID); /* MsgId (4 bytes) */
Stream_Read_UINT32(pdu->s, packetMsgResponse.msgType); /* MsgType (4 bytes) */
Stream_Read_INT32(pdu->s, packetMsgResponse.isMsgPresent); /* IsMsgPresent (4 bytes) */
2015-01-13 21:50:46 +03:00
/* 2.2.9.2.1.9 TSG_PACKET_MSG_RESPONSE: Ignore empty message body. */
if (!packetMsgResponse.isMsgPresent)
{
rc = TRUE;
2018-09-28 09:43:43 +03:00
goto fail;
}
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, SwitchValue); /* SwitchValue (4 bytes) */
switch (SwitchValue)
{
2014-08-19 20:26:39 +04:00
case TSG_ASYNC_MESSAGE_CONSENT_MESSAGE:
if (!TsProxyReadPacketSTringMessage(tsg, pdu->s, &packetStringMessage))
2018-09-28 09:43:43 +03:00
goto fail;
2015-01-13 21:50:46 +03:00
messageText = ConvertWCharNToUtf8Alloc(
packetStringMessage.msgBuffer, packetStringMessage.msgBytes / sizeof(WCHAR), NULL);
WLog_INFO(TAG, "Consent Message: %s", messageText);
2014-08-19 20:26:39 +04:00
free(messageText);
2015-01-13 21:50:46 +03:00
if (context->instance)
{
rc = IFCALLRESULT(TRUE, context->instance->PresentGatewayMessage, context->instance,
GATEWAY_MESSAGE_CONSENT,
packetStringMessage.isDisplayMandatory != 0,
packetStringMessage.isConsentMandatory != 0,
2019-11-06 17:24:51 +03:00
packetStringMessage.msgBytes, packetStringMessage.msgBuffer);
2022-04-28 11:49:42 +03:00
if (!rc)
goto fail;
}
2018-09-28 09:43:43 +03:00
break;
2018-09-28 09:43:43 +03:00
case TSG_ASYNC_MESSAGE_SERVICE_MESSAGE:
if (!TsProxyReadPacketSTringMessage(tsg, pdu->s, &packetStringMessage))
2018-09-28 09:43:43 +03:00
goto fail;
messageText = ConvertWCharNToUtf8Alloc(
packetStringMessage.msgBuffer, packetStringMessage.msgBytes / sizeof(WCHAR), NULL);
WLog_INFO(TAG, "Service Message: %s", messageText);
2014-08-19 20:26:39 +04:00
free(messageText);
if (context->instance)
{
rc = IFCALLRESULT(TRUE, context->instance->PresentGatewayMessage, context->instance,
GATEWAY_MESSAGE_SERVICE,
packetStringMessage.isDisplayMandatory != 0,
packetStringMessage.isConsentMandatory != 0,
2019-11-06 17:24:51 +03:00
packetStringMessage.msgBytes, packetStringMessage.msgBuffer);
2022-04-28 11:49:42 +03:00
if (!rc)
goto fail;
}
2014-08-19 20:26:39 +04:00
break;
2015-01-13 21:50:46 +03:00
2014-08-19 20:26:39 +04:00
case TSG_ASYNC_MESSAGE_REAUTH:
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 20))
2018-09-28 09:43:43 +03:00
goto fail;
Stream_Read_UINT32(pdu->s, Pointer); /* ReauthMessagePtr (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Seek_UINT32(pdu->s); /* alignment pad (4 bytes) */
Stream_Read_UINT64(pdu->s,
packetReauthMessage.tunnelContext); /* TunnelContext (8 bytes) */
Stream_Seek_UINT32(pdu->s); /* ReturnValue (4 bytes) */
tsg->ReauthTunnelContext = packetReauthMessage.tunnelContext;
2014-08-19 20:26:39 +04:00
break;
2015-01-13 21:50:46 +03:00
2014-08-19 20:26:39 +04:00
default:
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "unexpected message type: %" PRIu32 "", SwitchValue);
2018-09-28 09:43:43 +03:00
goto fail;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
return rc;
}
/**
* OpNum = 4
*
* HRESULT TsProxyCreateChannel(
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
* [in, ref] PTSENDPOINTINFO tsEndPointInfo,
* [out] PCHANNEL_CONTEXT_HANDLE_SERIALIZE* channelContext,
* [out] unsigned long* channelId
* );
*/
static BOOL TsProxyCreateChannelWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* tunnelContext)
{
2018-09-28 09:43:43 +03:00
size_t count;
wStream* s;
rdpRpc* rpc;
WLog_DBG(TAG, "TsProxyCreateChannelWriteRequest");
2014-08-19 20:26:39 +04:00
2018-09-28 09:43:43 +03:00
if (!tsg || !tsg->rpc || !tunnelContext || !tsg->Hostname)
return FALSE;
rpc = tsg->rpc;
count = _wcslen(tsg->Hostname) + 1;
if (count > UINT32_MAX)
return FALSE;
2018-09-28 09:43:43 +03:00
s = Stream_New(NULL, 60 + count * 2);
if (!s)
return FALSE;
/* TunnelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, tunnelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, tunnelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
/* TSENDPOINTINFO */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, 0x00020000); /* ResourceNamePtr (4 bytes) */
Stream_Write_UINT32(s, 0x00000001); /* NumResourceNames (4 bytes) */
Stream_Write_UINT32(s, 0x00000000); /* AlternateResourceNamesPtr (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT16(s, 0x0000); /* NumAlternateResourceNames (2 bytes) */
Stream_Write_UINT16(s, 0x0000); /* Pad (2 bytes) */
/* Port (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT16(s, 0x0003); /* ProtocolId (RDP = 3) (2 bytes) */
Stream_Write_UINT16(s, tsg->Port); /* PortNumber (0xD3D = 3389) (2 bytes) */
Stream_Write_UINT32(s, 0x00000001); /* NumResourceNames (4 bytes) */
Stream_Write_UINT32(s, 0x00020004); /* ResourceNamePtr (4 bytes) */
Stream_Write_UINT32(s, (UINT32)count); /* MaxCount (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write_UINT32(s, 0); /* Offset (4 bytes) */
Stream_Write_UINT32(s, (UINT32)count); /* ActualCount (4 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UTF16_String(s, tsg->Hostname, count); /* Array */
return rpc_client_write_call(rpc, s, TsProxyCreateChannelOpnum);
}
static BOOL TsProxyCreateChannelReadResponse(RPC_PDU* pdu, CONTEXT_HANDLE* channelContext,
UINT32* channelId)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
WLog_DBG(TAG, "TsProxyCreateChannelReadResponse");
if (!pdu)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 28))
2018-09-28 09:43:43 +03:00
goto fail;
/* ChannelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, channelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read(pdu->s, channelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
Stream_Read_UINT32(pdu->s, *channelId); /* ChannelId (4 bytes) */
Stream_Seek_UINT32(pdu->s); /* ReturnValue (4 bytes) */
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
return rc;
}
/**
* HRESULT TsProxyCloseChannel(
* [in, out] PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE* context
* );
*/
static BOOL TsProxyCloseChannelWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* context)
{
2018-09-28 09:43:43 +03:00
wStream* s;
rdpRpc* rpc;
WLog_DBG(TAG, "TsProxyCloseChannelWriteRequest");
2018-09-28 09:43:43 +03:00
if (!tsg || !tsg->rpc || !context)
2015-08-28 11:59:48 +03:00
return FALSE;
2018-09-28 09:43:43 +03:00
rpc = tsg->rpc;
s = Stream_New(NULL, 20);
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
if (!s)
2015-01-13 21:50:46 +03:00
return FALSE;
/* ChannelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Write_UINT32(s, context->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, context->ContextUuid, 16); /* ContextUuid (16 bytes) */
2018-09-28 09:43:43 +03:00
return rpc_client_write_call(rpc, s, TsProxyCloseChannelOpnum);
}
static BOOL TsProxyCloseChannelReadResponse(RPC_PDU* pdu, CONTEXT_HANDLE* context)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
WLog_DBG(TAG, "TsProxyCloseChannelReadResponse");
if (!pdu)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 24))
2018-09-28 09:43:43 +03:00
goto fail;
/* ChannelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, context->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read(pdu->s, context->ContextUuid, 16); /* ContextUuid (16 bytes) */
Stream_Seek_UINT32(pdu->s); /* ReturnValue (4 bytes) */
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
return rc;
}
/**
* HRESULT TsProxyCloseTunnel(
* [in, out] PTUNNEL_CONTEXT_HANDLE_SERIALIZE* context
* );
*/
static BOOL TsProxyCloseTunnelWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* context)
{
2018-09-28 09:43:43 +03:00
wStream* s;
rdpRpc* rpc;
WLog_DBG(TAG, "TsProxyCloseTunnelWriteRequest");
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
if (!tsg || !tsg->rpc || !context)
2015-01-13 21:50:46 +03:00
return FALSE;
2018-09-28 09:43:43 +03:00
rpc = tsg->rpc;
s = Stream_New(NULL, 20);
2018-09-28 09:43:43 +03:00
if (!s)
return FALSE;
2018-09-28 09:43:43 +03:00
/* TunnelContext (20 bytes) */
Stream_Write_UINT32(s, context->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, context->ContextUuid, 16); /* ContextUuid (16 bytes) */
2018-09-28 09:43:43 +03:00
return rpc_client_write_call(rpc, s, TsProxyCloseTunnelOpnum);
}
static BOOL TsProxyCloseTunnelReadResponse(RPC_PDU* pdu, CONTEXT_HANDLE* context)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
WLog_DBG(TAG, "TsProxyCloseTunnelReadResponse");
2018-09-28 09:43:43 +03:00
if (!pdu || !context)
return FALSE;
if (!Stream_CheckAndLogRequiredLength(TAG, pdu->s, 24))
2018-09-28 09:43:43 +03:00
goto fail;
/* TunnelContext (20 bytes) */
2018-09-28 09:43:43 +03:00
Stream_Read_UINT32(pdu->s, context->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Read(pdu->s, context->ContextUuid, 16); /* ContextUuid (16 bytes) */
Stream_Seek_UINT32(pdu->s); /* ReturnValue (4 bytes) */
2018-09-28 09:43:43 +03:00
rc = TRUE;
fail:
return rc;
}
/**
* OpNum = 8
*
* DWORD TsProxySetupReceivePipe(
* [in, max_is(32767)] byte pRpcMessage[]
* );
*/
static BOOL TsProxySetupReceivePipeWriteRequest(rdpTsg* tsg, CONTEXT_HANDLE* channelContext)
{
2018-09-28 09:43:43 +03:00
wStream* s;
rdpRpc* rpc;
WLog_DBG(TAG, "TsProxySetupReceivePipeWriteRequest");
2015-01-13 21:50:46 +03:00
2018-09-28 09:43:43 +03:00
if (!tsg || !tsg->rpc || !channelContext)
2015-01-13 21:50:46 +03:00
return FALSE;
2018-09-28 09:43:43 +03:00
rpc = tsg->rpc;
s = Stream_New(NULL, 20);
2018-09-28 09:43:43 +03:00
if (!s)
return FALSE;
2018-09-28 09:43:43 +03:00
/* ChannelContext (20 bytes) */
Stream_Write_UINT32(s, channelContext->ContextType); /* ContextType (4 bytes) */
2019-11-06 17:24:51 +03:00
Stream_Write(s, channelContext->ContextUuid, 16); /* ContextUuid (16 bytes) */
2018-09-28 09:43:43 +03:00
return rpc_client_write_call(rpc, s, TsProxySetupReceivePipeOpnum);
}
2018-09-28 09:43:43 +03:00
static BOOL tsg_transition_to_state(rdpTsg* tsg, TSG_STATE state)
{
const char* oldState = tsg_state_to_string(tsg->state);
const char* newState = tsg_state_to_string(state);
WLog_DBG(TAG, "%s -> %s", oldState, newState);
2018-09-28 09:43:43 +03:00
return tsg_set_state(tsg, state);
}
2018-09-28 09:43:43 +03:00
BOOL tsg_proxy_begin(rdpTsg* tsg)
{
TSG_PACKET tsgPacket = { 0 };
PTSG_CAPABILITY_NAP tsgCapNap;
PTSG_PACKET_VERSIONCAPS packetVersionCaps;
2018-09-28 09:43:43 +03:00
if (!tsg)
return FALSE;
packetVersionCaps = &tsg->packetVersionCaps;
packetVersionCaps->tsgCaps = &tsg->tsgCaps;
tsgCapNap = &tsg->tsgCaps.tsgPacket.tsgCapNap;
tsgPacket.packetId = TSG_PACKET_TYPE_VERSIONCAPS;
tsgPacket.tsgPacket.packetVersionCaps = packetVersionCaps;
packetVersionCaps->tsgHeader.ComponentId = TS_GATEWAY_TRANSPORT;
packetVersionCaps->tsgHeader.PacketId = TSG_PACKET_TYPE_VERSIONCAPS;
packetVersionCaps->numCapabilities = 1;
packetVersionCaps->majorVersion = 1;
packetVersionCaps->minorVersion = 1;
packetVersionCaps->quarantineCapabilities = 0;
packetVersionCaps->tsgCaps->capabilityType = TSG_CAPABILITY_TYPE_NAP;
/*
* Using reduced capabilities appears to trigger
* TSG_PACKET_TYPE_QUARENC_RESPONSE instead of TSG_PACKET_TYPE_CAPS_RESPONSE
*
* However, reduced capabilities may break connectivity with servers enforcing features, such as
2019-11-06 17:24:51 +03:00
* "Only allow connections from Remote Desktop Services clients that support RD Gateway
* messaging"
*/
2019-11-06 17:24:51 +03:00
tsgCapNap->capabilities = TSG_NAP_CAPABILITY_QUAR_SOH | TSG_NAP_CAPABILITY_IDLE_TIMEOUT |
TSG_MESSAGING_CAP_CONSENT_SIGN | TSG_MESSAGING_CAP_SERVICE_MSG |
TSG_MESSAGING_CAP_REAUTH;
if (!TsProxyCreateTunnelWriteRequest(tsg, &tsgPacket))
{
WLog_ERR(TAG, "TsProxyCreateTunnel failure");
2018-09-28 09:43:43 +03:00
tsg_transition_to_state(tsg, TSG_STATE_FINAL);
return FALSE;
}
2018-09-28 09:43:43 +03:00
return tsg_transition_to_state(tsg, TSG_STATE_INITIAL);
}
2018-09-28 09:43:43 +03:00
static BOOL tsg_proxy_reauth(rdpTsg* tsg)
{
TSG_PACKET tsgPacket = { 0 };
PTSG_PACKET_REAUTH packetReauth;
PTSG_PACKET_VERSIONCAPS packetVersionCaps;
2018-09-28 09:43:43 +03:00
if (!tsg)
return FALSE;
tsg->reauthSequence = TRUE;
packetReauth = &tsg->packetReauth;
packetVersionCaps = &tsg->packetVersionCaps;
2018-09-28 09:43:43 +03:00
if (!packetReauth || !packetVersionCaps)
return FALSE;
tsgPacket.packetId = TSG_PACKET_TYPE_REAUTH;
tsgPacket.tsgPacket.packetReauth = &tsg->packetReauth;
packetReauth->tunnelContext = tsg->ReauthTunnelContext;
packetReauth->packetId = TSG_PACKET_TYPE_VERSIONCAPS;
packetReauth->tsgInitialPacket.packetVersionCaps = packetVersionCaps;
if (!TsProxyCreateTunnelWriteRequest(tsg, &tsgPacket))
{
WLog_ERR(TAG, "TsProxyCreateTunnel failure");
2018-09-28 09:43:43 +03:00
tsg_transition_to_state(tsg, TSG_STATE_FINAL);
return FALSE;
}
2019-11-06 17:24:51 +03:00
if (!TsProxyMakeTunnelCallWriteRequest(tsg, &tsg->TunnelContext,
TSG_TUNNEL_CALL_ASYNC_MSG_REQUEST))
{
WLog_ERR(TAG, "TsProxyMakeTunnelCall failure");
2018-09-28 09:43:43 +03:00
tsg_transition_to_state(tsg, TSG_STATE_FINAL);
return FALSE;
}
2018-09-28 09:43:43 +03:00
return tsg_transition_to_state(tsg, TSG_STATE_INITIAL);
}
2018-09-28 09:43:43 +03:00
BOOL tsg_recv_pdu(rdpTsg* tsg, RPC_PDU* pdu)
{
2018-09-28 09:43:43 +03:00
BOOL rc = FALSE;
RpcClientCall* call;
2018-09-28 09:43:43 +03:00
rdpRpc* rpc;
if (!tsg || !tsg->rpc || !pdu)
return FALSE;
rpc = tsg->rpc;
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
{
if (!Stream_SafeSeek(pdu->s, 24))
return FALSE;
}
switch (tsg->state)
{
case TSG_STATE_INITIAL:
2019-11-06 17:24:51 +03:00
{
CONTEXT_HANDLE* TunnelContext;
TunnelContext = (tsg->reauthSequence) ? &tsg->NewTunnelContext : &tsg->TunnelContext;
2019-11-06 17:24:51 +03:00
if (!TsProxyCreateTunnelReadResponse(tsg, pdu, TunnelContext, &tsg->TunnelId))
{
WLog_ERR(TAG, "TsProxyCreateTunnelReadResponse failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
if (!tsg_transition_to_state(tsg, TSG_STATE_CONNECTED))
return FALSE;
2019-11-06 17:24:51 +03:00
if (!TsProxyAuthorizeTunnelWriteRequest(tsg, TunnelContext))
{
WLog_ERR(TAG, "TsProxyAuthorizeTunnel failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
rc = TRUE;
}
break;
2019-11-06 17:24:51 +03:00
case TSG_STATE_CONNECTED:
{
CONTEXT_HANDLE* TunnelContext;
TunnelContext = (tsg->reauthSequence) ? &tsg->NewTunnelContext : &tsg->TunnelContext;
if (!TsProxyAuthorizeTunnelReadResponse(pdu))
2019-11-06 17:24:51 +03:00
{
WLog_ERR(TAG, "TsProxyAuthorizeTunnelReadResponse failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
if (!tsg_transition_to_state(tsg, TSG_STATE_AUTHORIZED))
return FALSE;
2019-11-06 17:24:51 +03:00
if (!tsg->reauthSequence)
{
if (!TsProxyMakeTunnelCallWriteRequest(tsg, TunnelContext,
TSG_TUNNEL_CALL_ASYNC_MSG_REQUEST))
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "TsProxyMakeTunnelCall failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
2019-11-06 17:24:51 +03:00
}
2019-11-06 17:24:51 +03:00
if (!TsProxyCreateChannelWriteRequest(tsg, TunnelContext))
{
WLog_ERR(TAG, "TsProxyCreateChannel failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
rc = TRUE;
}
break;
case TSG_STATE_AUTHORIZED:
2018-09-27 17:23:01 +03:00
call = rpc_client_call_find_by_id(rpc->client, pdu->CallId);
if (!call)
2018-09-28 09:43:43 +03:00
return FALSE;
if (call->OpNum == TsProxyMakeTunnelCallOpnum)
{
if (!TsProxyMakeTunnelCallReadResponse(tsg, pdu))
{
WLog_ERR(TAG, "TsProxyMakeTunnelCallReadResponse failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
}
else if (call->OpNum == TsProxyCreateChannelOpnum)
{
CONTEXT_HANDLE ChannelContext;
if (!TsProxyCreateChannelReadResponse(pdu, &ChannelContext, &tsg->ChannelId))
{
WLog_ERR(TAG, "TsProxyCreateChannelReadResponse failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
if (!tsg->reauthSequence)
CopyMemory(&tsg->ChannelContext, &ChannelContext, sizeof(CONTEXT_HANDLE));
else
CopyMemory(&tsg->NewChannelContext, &ChannelContext, sizeof(CONTEXT_HANDLE));
2018-09-28 09:43:43 +03:00
if (!tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CREATED))
return FALSE;
if (!tsg->reauthSequence)
{
if (!TsProxySetupReceivePipeWriteRequest(tsg, &tsg->ChannelContext))
{
WLog_ERR(TAG, "TsProxySetupReceivePipe failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
}
else
{
if (!TsProxyCloseChannelWriteRequest(tsg, &tsg->NewChannelContext))
{
WLog_ERR(TAG, "TsProxyCloseChannelWriteRequest failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
if (!TsProxyCloseTunnelWriteRequest(tsg, &tsg->NewTunnelContext))
{
WLog_ERR(TAG, "TsProxyCloseTunnelWriteRequest failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
}
2018-09-28 09:43:43 +03:00
rc = tsg_transition_to_state(tsg, TSG_STATE_PIPE_CREATED);
tsg->reauthSequence = FALSE;
}
else
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "TSG_STATE_AUTHORIZED unexpected OpNum: %" PRIu32 "\n", call->OpNum);
}
break;
case TSG_STATE_CHANNEL_CREATED:
break;
case TSG_STATE_PIPE_CREATED:
2018-09-27 17:23:01 +03:00
call = rpc_client_call_find_by_id(rpc->client, pdu->CallId);
if (!call)
2018-09-28 09:43:43 +03:00
return FALSE;
if (call->OpNum == TsProxyMakeTunnelCallOpnum)
{
if (!TsProxyMakeTunnelCallReadResponse(tsg, pdu))
{
WLog_ERR(TAG, "TsProxyMakeTunnelCallReadResponse failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
2018-09-28 09:43:43 +03:00
if (tsg->ReauthTunnelContext)
rc = tsg_proxy_reauth(tsg);
}
else if (call->OpNum == TsProxyCloseChannelOpnum)
{
CONTEXT_HANDLE ChannelContext;
if (!TsProxyCloseChannelReadResponse(pdu, &ChannelContext))
{
WLog_ERR(TAG, "TsProxyCloseChannelReadResponse failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
}
else if (call->OpNum == TsProxyCloseTunnelOpnum)
{
CONTEXT_HANDLE TunnelContext;
if (!TsProxyCloseTunnelReadResponse(pdu, &TunnelContext))
{
WLog_ERR(TAG, "TsProxyCloseTunnelReadResponse failure");
2018-09-28 09:43:43 +03:00
return FALSE;
}
2018-09-28 09:43:43 +03:00
rc = TRUE;
}
break;
case TSG_STATE_TUNNEL_CLOSE_PENDING:
2019-11-06 17:24:51 +03:00
{
CONTEXT_HANDLE ChannelContext;
if (!TsProxyCloseChannelReadResponse(pdu, &ChannelContext))
2019-11-06 17:24:51 +03:00
{
WLog_ERR(TAG, "TsProxyCloseChannelReadResponse failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
if (!tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CLOSE_PENDING))
return FALSE;
2019-11-06 17:24:51 +03:00
if (!TsProxyCloseChannelWriteRequest(tsg, NULL))
{
WLog_ERR(TAG, "TsProxyCloseChannelWriteRequest failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
if (!TsProxyMakeTunnelCallWriteRequest(tsg, &tsg->TunnelContext,
TSG_TUNNEL_CANCEL_ASYNC_MSG_REQUEST))
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "TsProxyMakeTunnelCall failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
rc = TRUE;
}
break;
case TSG_STATE_CHANNEL_CLOSE_PENDING:
{
CONTEXT_HANDLE TunnelContext;
if (!TsProxyCloseTunnelReadResponse(pdu, &TunnelContext))
2019-11-06 17:24:51 +03:00
{
WLog_ERR(TAG, "TsProxyCloseTunnelReadResponse failure");
return FALSE;
}
2019-11-06 17:24:51 +03:00
rc = tsg_transition_to_state(tsg, TSG_STATE_FINAL);
}
break;
case TSG_STATE_FINAL:
break;
}
2018-09-28 09:43:43 +03:00
return rc;
}
2018-09-28 09:43:43 +03:00
BOOL tsg_check_event_handles(rdpTsg* tsg)
2015-02-02 19:50:56 +03:00
{
2018-10-18 11:15:51 +03:00
if (rpc_client_in_channel_recv(tsg->rpc) < 0)
2018-09-28 09:43:43 +03:00
return FALSE;
2018-10-18 11:15:51 +03:00
if (rpc_client_out_channel_recv(tsg->rpc) < 0)
2018-09-28 09:43:43 +03:00
return FALSE;
2015-02-02 19:50:56 +03:00
2018-09-28 09:43:43 +03:00
return TRUE;
2015-02-02 19:50:56 +03:00
}
DWORD tsg_get_event_handles(rdpTsg* tsg, HANDLE* events, DWORD count)
{
UINT32 nCount = 0;
rdpRpc* rpc = tsg->rpc;
RpcVirtualConnection* connection = rpc->VirtualConnection;
if (events && (nCount < count))
{
events[nCount] = rpc->client->PipeEvent;
nCount++;
}
else
return 0;
2018-09-27 17:05:14 +03:00
if (connection->DefaultInChannel && connection->DefaultInChannel->common.tls)
{
if (events && (nCount < count))
{
2018-09-27 17:05:14 +03:00
BIO_get_event(connection->DefaultInChannel->common.tls->bio, &events[nCount]);
nCount++;
}
else
return 0;
}
2018-09-27 17:05:14 +03:00
if (connection->NonDefaultInChannel && connection->NonDefaultInChannel->common.tls)
{
if (events && (nCount < count))
{
2018-09-27 17:05:14 +03:00
BIO_get_event(connection->NonDefaultInChannel->common.tls->bio, &events[nCount]);
nCount++;
}
else
return 0;
}
2018-09-27 17:05:14 +03:00
if (connection->DefaultOutChannel && connection->DefaultOutChannel->common.tls)
{
if (events && (nCount < count))
{
2018-09-27 17:05:14 +03:00
BIO_get_event(connection->DefaultOutChannel->common.tls->bio, &events[nCount]);
nCount++;
}
else
return 0;
}
2018-09-27 17:05:14 +03:00
if (connection->NonDefaultOutChannel && connection->NonDefaultOutChannel->common.tls)
{
if (events && (nCount < count))
{
2018-09-27 17:05:14 +03:00
BIO_get_event(connection->NonDefaultOutChannel->common.tls->bio, &events[nCount]);
nCount++;
}
else
return 0;
}
return nCount;
}
static BOOL tsg_set_hostname(rdpTsg* tsg, const char* hostname)
{
free(tsg->Hostname);
tsg->Hostname = ConvertUtf8ToWCharAlloc(hostname, NULL);
return tsg->Hostname != NULL;
}
static BOOL tsg_set_machine_name(rdpTsg* tsg, const char* machineName)
{
free(tsg->MachineName);
tsg->MachineName = ConvertUtf8ToWCharAlloc(machineName, NULL);
return tsg->MachineName != NULL;
}
BOOL tsg_connect(rdpTsg* tsg, const char* hostname, UINT16 port, DWORD timeout)
{
UINT64 looptimeout = timeout * 1000ULL;
DWORD nCount;
2021-08-25 12:14:35 +03:00
HANDLE events[MAXIMUM_WAIT_OBJECTS] = { 0 };
rdpRpc* rpc;
rdpContext* context;
rdpSettings* settings;
rdpTransport* transport;
WINPR_ASSERT(tsg);
rpc = tsg->rpc;
WINPR_ASSERT(rpc);
transport = rpc->transport;
context = transport_get_context(transport);
WINPR_ASSERT(context);
settings = context->settings;
tsg->Port = port;
tsg->transport = transport;
if (!settings->GatewayPort)
settings->GatewayPort = 443;
2018-09-28 09:43:43 +03:00
if (!tsg_set_hostname(tsg, hostname))
return FALSE;
if (!tsg_set_machine_name(tsg, settings->ComputerName))
return FALSE;
if (!rpc_connect(rpc, timeout))
{
WLog_ERR(TAG, "rpc_connect error!");
2015-02-03 01:16:32 +03:00
return FALSE;
}
2021-08-25 12:14:35 +03:00
nCount = tsg_get_event_handles(tsg, events, ARRAYSIZE(events));
if (nCount == 0)
return FALSE;
while (tsg->state != TSG_STATE_PIPE_CREATED)
{
const DWORD polltimeout = 250;
DWORD status = WaitForMultipleObjects(nCount, events, FALSE, polltimeout);
if (status == WAIT_TIMEOUT)
{
if (timeout > 0)
{
if (looptimeout < polltimeout)
return FALSE;
looptimeout -= polltimeout;
}
}
else
looptimeout = timeout * 1000ULL;
2018-09-28 09:43:43 +03:00
if (!tsg_check_event_handles(tsg))
2015-02-02 19:50:56 +03:00
{
WLog_ERR(TAG, "tsg_check failure");
2021-09-06 12:01:36 +03:00
transport_set_layer(transport, TRANSPORT_LAYER_CLOSED);
return FALSE;
2015-02-02 19:50:56 +03:00
}
}
2015-01-13 21:50:46 +03:00
2015-02-02 19:50:56 +03:00
WLog_INFO(TAG, "TS Gateway Connection Success");
tsg->bio = BIO_new(BIO_s_tsg());
if (!tsg->bio)
return FALSE;
2019-11-06 17:24:51 +03:00
BIO_set_data(tsg->bio, (void*)tsg);
return TRUE;
}
BOOL tsg_disconnect(rdpTsg* tsg)
{
/**
* Gateway Shutdown Phase
*
* Client Server
* | |
* |-------------TsProxyCloseChannel Request---------->|
* | |
* |<-------TsProxySetupReceivePipe Final Response-----|
* |<-----------TsProxyCloseChannel Response-----------|
* | |
* |----TsProxyMakeTunnelCall Request (cancel async)-->|
* | |
* |<---TsProxyMakeTunnelCall Response (call async)----|
* |<---TsProxyMakeTunnelCall Response (cancel async)--|
* | |
* |--------------TsProxyCloseTunnel Request---------->|
* |<-------------TsProxyCloseTunnel Response----------|
* | |
*/
2015-01-13 21:50:46 +03:00
if (!tsg)
return FALSE;
if (tsg->state != TSG_STATE_TUNNEL_CLOSE_PENDING)
{
if (!TsProxyCloseChannelWriteRequest(tsg, &tsg->ChannelContext))
return FALSE;
2018-09-28 09:43:43 +03:00
return tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CLOSE_PENDING);
}
return TRUE;
}
/**
2022-12-09 16:35:03 +03:00
* @brief Read data from TSG
*
* @param[in] tsg The TSG instance to read from
* @param[in] data A pointer to the data buffer
* @param[in] length length of data
*
* @return < 0 on error; 0 if not enough data is available (non blocking mode); > 0 bytes to read
*/
static int tsg_read(rdpTsg* tsg, BYTE* data, size_t length)
{
rdpRpc* rpc;
int status = 0;
2018-09-28 09:43:43 +03:00
if (!tsg || !data)
return -1;
rpc = tsg->rpc;
2021-09-06 12:01:36 +03:00
if (transport_get_layer(rpc->transport) == TRANSPORT_LAYER_CLOSED)
{
2015-01-13 21:50:46 +03:00
WLog_ERR(TAG, "tsg_read error: connection lost");
return -1;
}
2014-11-25 23:25:26 +03:00
do
{
status = rpc_client_receive_pipe_read(rpc->client, data, length);
2014-11-25 23:25:26 +03:00
if (status < 0)
return -1;
2014-11-25 23:25:26 +03:00
2021-09-06 12:01:36 +03:00
if (!status && !transport_get_blocking(rpc->transport))
return 0;
2021-09-06 12:01:36 +03:00
if (transport_get_layer(rpc->transport) == TRANSPORT_LAYER_CLOSED)
2014-11-25 23:25:26 +03:00
{
2015-01-13 21:50:46 +03:00
WLog_ERR(TAG, "tsg_read error: connection lost");
2014-11-25 23:25:26 +03:00
return -1;
}
if (status > 0)
break;
2021-09-06 12:01:36 +03:00
if (transport_get_blocking(rpc->transport))
2015-02-02 19:50:56 +03:00
{
while (WaitForSingleObject(rpc->client->PipeEvent, 0) != WAIT_OBJECT_0)
{
2018-09-28 09:43:43 +03:00
if (!tsg_check_event_handles(tsg))
2015-02-02 19:50:56 +03:00
return -1;
WaitForSingleObject(rpc->client->PipeEvent, 100);
}
}
2021-09-06 12:01:36 +03:00
} while (transport_get_blocking(rpc->transport));
return status;
}
2018-09-28 09:43:43 +03:00
static int tsg_write(rdpTsg* tsg, const BYTE* data, UINT32 length)
{
int status;
2018-09-28 09:43:43 +03:00
if (!tsg || !data || !tsg->rpc || !tsg->rpc->transport)
return -1;
2021-09-06 12:01:36 +03:00
if (transport_get_layer(tsg->rpc->transport) == TRANSPORT_LAYER_CLOSED)
{
2015-01-13 21:50:46 +03:00
WLog_ERR(TAG, "error, connection lost");
return -1;
}
2019-11-06 17:24:51 +03:00
status = TsProxySendToServer((handle_t)tsg, data, 1, &length);
2014-08-19 20:26:39 +04:00
if (status < 0)
return -1;
2014-08-19 20:26:39 +04:00
return (int)length;
}
rdpTsg* tsg_new(rdpTransport* transport)
{
rdpTsg* tsg;
2019-11-06 17:24:51 +03:00
tsg = (rdpTsg*)calloc(1, sizeof(rdpTsg));
if (!tsg)
return NULL;
tsg->transport = transport;
tsg->rpc = rpc_new(tsg->transport);
if (!tsg->rpc)
goto out_free;
return tsg;
out_free:
free(tsg);
return NULL;
}
void tsg_free(rdpTsg* tsg)
{
if (tsg)
{
2018-09-28 09:43:43 +03:00
rpc_free(tsg->rpc);
free(tsg->Hostname);
free(tsg->MachineName);
free(tsg);
}
}
static int transport_bio_tsg_write(BIO* bio, const char* buf, int num)
{
int status;
2019-11-06 17:24:51 +03:00
rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
BIO_clear_flags(bio, BIO_FLAGS_WRITE);
if (num < 0)
return -1;
status = tsg_write(tsg, (const BYTE*)buf, (UINT32)num);
if (status < 0)
{
BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
return -1;
}
else if (status == 0)
{
BIO_set_flags(bio, BIO_FLAGS_WRITE);
WSASetLastError(WSAEWOULDBLOCK);
}
else
{
BIO_set_flags(bio, BIO_FLAGS_WRITE);
}
return status >= 0 ? status : -1;
}
static int transport_bio_tsg_read(BIO* bio, char* buf, int size)
{
int status;
2019-11-06 17:24:51 +03:00
rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
2018-09-28 09:43:43 +03:00
if (!tsg || (size < 0))
{
BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
return -1;
}
BIO_clear_flags(bio, BIO_FLAGS_READ);
status = tsg_read(tsg, (BYTE*)buf, (size_t)size);
if (status < 0)
{
BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
return -1;
}
else if (status == 0)
{
BIO_set_flags(bio, BIO_FLAGS_READ);
WSASetLastError(WSAEWOULDBLOCK);
}
else
{
BIO_set_flags(bio, BIO_FLAGS_READ);
}
return status > 0 ? status : -1;
}
static int transport_bio_tsg_puts(BIO* bio, const char* str)
{
WINPR_UNUSED(bio);
WINPR_UNUSED(str);
return 1;
}
static int transport_bio_tsg_gets(BIO* bio, char* str, int size)
{
WINPR_UNUSED(bio);
WINPR_UNUSED(str);
WINPR_UNUSED(size);
return 1;
}
static long transport_bio_tsg_ctrl(BIO* bio, int cmd, long arg1, void* arg2)
{
long status = -1;
2019-11-06 17:24:51 +03:00
rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
RpcVirtualConnection* connection = tsg->rpc->VirtualConnection;
RpcInChannel* inChannel = connection->DefaultInChannel;
RpcOutChannel* outChannel = connection->DefaultOutChannel;
2018-09-28 09:43:43 +03:00
switch (cmd)
{
2018-09-28 09:43:43 +03:00
case BIO_CTRL_FLUSH:
(void)BIO_flush(inChannel->common.tls->bio);
(void)BIO_flush(outChannel->common.tls->bio);
status = 1;
2018-09-28 09:43:43 +03:00
break;
2018-09-28 09:43:43 +03:00
case BIO_C_GET_EVENT:
if (arg2)
{
2019-11-06 17:24:51 +03:00
*((HANDLE*)arg2) = tsg->rpc->client->PipeEvent;
2018-09-28 09:43:43 +03:00
status = 1;
}
2018-09-28 09:43:43 +03:00
break;
case BIO_C_SET_NONBLOCK:
status = 1;
2018-09-28 09:43:43 +03:00
break;
case BIO_C_READ_BLOCKED:
2019-11-06 17:24:51 +03:00
{
2021-07-29 11:07:04 +03:00
BIO* cbio = outChannel->common.bio;
status = BIO_read_blocked(cbio);
2019-11-06 17:24:51 +03:00
}
break;
2018-09-28 09:43:43 +03:00
case BIO_C_WRITE_BLOCKED:
2019-11-06 17:24:51 +03:00
{
2021-07-29 11:07:04 +03:00
BIO* cbio = inChannel->common.bio;
status = BIO_write_blocked(cbio);
2019-11-06 17:24:51 +03:00
}
break;
2018-09-28 09:43:43 +03:00
case BIO_C_WAIT_READ:
2019-11-06 17:24:51 +03:00
{
int timeout = (int)arg1;
2021-07-29 11:07:04 +03:00
BIO* cbio = outChannel->common.bio;
2018-09-28 09:43:43 +03:00
2021-07-29 11:07:04 +03:00
if (BIO_read_blocked(cbio))
return BIO_wait_read(cbio, timeout);
else if (BIO_write_blocked(cbio))
return BIO_wait_write(cbio, timeout);
2019-11-06 17:24:51 +03:00
else
status = 1;
}
break;
2018-09-28 09:43:43 +03:00
case BIO_C_WAIT_WRITE:
2019-11-06 17:24:51 +03:00
{
int timeout = (int)arg1;
2021-07-29 11:07:04 +03:00
BIO* cbio = inChannel->common.bio;
2018-09-28 09:43:43 +03:00
2021-07-29 11:07:04 +03:00
if (BIO_write_blocked(cbio))
status = BIO_wait_write(cbio, timeout);
else if (BIO_read_blocked(cbio))
status = BIO_wait_read(cbio, timeout);
2019-11-06 17:24:51 +03:00
else
status = 1;
}
break;
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
case BIO_CTRL_GET_KTLS_SEND:
status = 0;
break;
case BIO_CTRL_GET_KTLS_RECV:
status = 0;
break;
#endif
2018-09-28 09:43:43 +03:00
default:
break;
}
return status;
}
static int transport_bio_tsg_new(BIO* bio)
{
WINPR_ASSERT(bio);
2016-11-21 19:28:54 +03:00
BIO_set_init(bio, 1);
BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
return 1;
}
static int transport_bio_tsg_free(BIO* bio)
{
WINPR_ASSERT(bio);
WINPR_UNUSED(bio);
return 1;
}
BIO_METHOD* BIO_s_tsg(void)
{
2016-11-21 19:28:54 +03:00
static BIO_METHOD* bio_methods = NULL;
if (bio_methods == NULL)
{
if (!(bio_methods = BIO_meth_new(BIO_TYPE_TSG, "TSGateway")))
return NULL;
BIO_meth_set_write(bio_methods, transport_bio_tsg_write);
BIO_meth_set_read(bio_methods, transport_bio_tsg_read);
BIO_meth_set_puts(bio_methods, transport_bio_tsg_puts);
BIO_meth_set_gets(bio_methods, transport_bio_tsg_gets);
BIO_meth_set_ctrl(bio_methods, transport_bio_tsg_ctrl);
BIO_meth_set_create(bio_methods, transport_bio_tsg_new);
BIO_meth_set_destroy(bio_methods, transport_bio_tsg_free);
}
return bio_methods;
}
2018-09-28 09:43:43 +03:00
TSG_STATE tsg_get_state(rdpTsg* tsg)
{
if (!tsg)
return TSG_STATE_INITIAL;
return tsg->state;
}
BIO* tsg_get_bio(rdpTsg* tsg)
{
if (!tsg)
return NULL;
return tsg->bio;
}
BOOL tsg_set_state(rdpTsg* tsg, TSG_STATE state)
{
if (!tsg)
return FALSE;
tsg->state = state;
return TRUE;
}