2011-07-10 23:34:43 +04:00
|
|
|
/**
|
2012-10-09 07:02:04 +04:00
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
2011-07-10 23:34:43 +04:00
|
|
|
* RDP Core
|
|
|
|
*
|
|
|
|
* Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
2015-01-13 19:09:36 +03:00
|
|
|
* Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
|
2011-07-10 23:34:43 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2012-08-15 01:09:01 +04:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2012-11-22 04:22:41 +04:00
|
|
|
#include <winpr/crt.h>
|
|
|
|
|
2011-07-10 23:34:43 +04:00
|
|
|
#include "rdp.h"
|
|
|
|
|
2011-07-27 03:14:11 +04:00
|
|
|
#include "info.h"
|
|
|
|
#include "redirection.h"
|
|
|
|
|
2012-02-17 09:58:30 +04:00
|
|
|
#include <freerdp/crypto/per.h>
|
2014-09-12 16:36:29 +04:00
|
|
|
#include <freerdp/log.h>
|
|
|
|
|
|
|
|
#define TAG FREERDP_TAG("core.rdp")
|
2012-02-17 09:58:30 +04:00
|
|
|
|
2019-12-16 13:09:18 +03:00
|
|
|
const char* DATA_PDU_TYPE_STRINGS[80] = {
|
2019-11-06 17:24:51 +03:00
|
|
|
"?",
|
|
|
|
"?", /* 0x00 - 0x01 */
|
2018-07-18 16:16:50 +03:00
|
|
|
"Update", /* 0x02 */
|
2019-11-06 17:24:51 +03:00
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?", /* 0x03 - 0x0A */
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?", /* 0x0B - 0x13 */
|
2018-07-18 16:16:50 +03:00
|
|
|
"Control", /* 0x14 */
|
2019-11-06 17:24:51 +03:00
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?", /* 0x15 - 0x1A */
|
2018-07-18 16:16:50 +03:00
|
|
|
"Pointer", /* 0x1B */
|
2019-11-06 17:24:51 +03:00
|
|
|
"Input", /* 0x1C */
|
|
|
|
"?",
|
|
|
|
"?", /* 0x1D - 0x1E */
|
|
|
|
"Synchronize", /* 0x1F */
|
|
|
|
"?", /* 0x20 */
|
|
|
|
"Refresh Rect", /* 0x21 */
|
|
|
|
"Play Sound", /* 0x22 */
|
|
|
|
"Suppress Output", /* 0x23 */
|
|
|
|
"Shutdown Request", /* 0x24 */
|
|
|
|
"Shutdown Denied", /* 0x25 */
|
|
|
|
"Save Session Info", /* 0x26 */
|
|
|
|
"Font List", /* 0x27 */
|
|
|
|
"Font Map", /* 0x28 */
|
|
|
|
"Set Keyboard Indicators", /* 0x29 */
|
|
|
|
"?", /* 0x2A */
|
2018-07-18 16:16:50 +03:00
|
|
|
"Bitmap Cache Persistent List", /* 0x2B */
|
2019-11-06 17:24:51 +03:00
|
|
|
"Bitmap Cache Error", /* 0x2C */
|
|
|
|
"Set Keyboard IME Status", /* 0x2D */
|
|
|
|
"Offscreen Cache Error", /* 0x2E */
|
|
|
|
"Set Error Info", /* 0x2F */
|
|
|
|
"Draw Nine Grid Error", /* 0x30 */
|
|
|
|
"Draw GDI+ Error", /* 0x31 */
|
|
|
|
"ARC Status", /* 0x32 */
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?", /* 0x33 - 0x35 */
|
|
|
|
"Status Info", /* 0x36 */
|
2018-07-18 16:16:50 +03:00
|
|
|
"Monitor Layout", /* 0x37 */
|
2019-11-06 17:24:51 +03:00
|
|
|
"FrameAcknowledge",
|
|
|
|
"?",
|
|
|
|
"?", /* 0x38 - 0x40 */
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?",
|
|
|
|
"?" /* 0x41 - 0x46 */
|
2011-07-22 19:02:31 +04:00
|
|
|
};
|
|
|
|
|
2020-04-06 12:58:48 +03:00
|
|
|
static BOOL rdp_read_flow_control_pdu(wStream* s, UINT16* type, UINT16* channel_id);
|
2019-11-20 13:30:14 +03:00
|
|
|
static void rdp_write_share_control_header(wStream* s, UINT16 length, UINT16 type,
|
|
|
|
UINT16 channel_id);
|
|
|
|
static void rdp_write_share_data_header(wStream* s, UINT16 length, BYTE type, UINT32 share_id);
|
|
|
|
|
2011-07-11 23:58:39 +04:00
|
|
|
/**
|
|
|
|
* Read RDP Security Header.\n
|
|
|
|
* @msdn{cc240579}
|
|
|
|
* @param s stream
|
|
|
|
* @param flags security flags
|
|
|
|
*/
|
|
|
|
|
2017-05-29 11:50:22 +03:00
|
|
|
BOOL rdp_read_security_header(wStream* s, UINT16* flags, UINT16* length)
|
2011-07-11 23:58:39 +04:00
|
|
|
{
|
|
|
|
/* Basic Security Header */
|
2017-05-29 11:50:22 +03:00
|
|
|
if ((Stream_GetRemainingLength(s) < 4) || (length && (*length < 4)))
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read_UINT16(s, *flags); /* flags */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Seek(s, 2); /* flagsHi (unused) */
|
2017-05-29 11:50:22 +03:00
|
|
|
|
|
|
|
if (length)
|
|
|
|
*length -= 4;
|
|
|
|
|
2013-01-12 03:43:16 +04:00
|
|
|
return TRUE;
|
2011-07-11 23:58:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Write RDP Security Header.\n
|
|
|
|
* @msdn{cc240579}
|
|
|
|
* @param s stream
|
|
|
|
* @param flags security flags
|
|
|
|
*/
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
void rdp_write_security_header(wStream* s, UINT16 flags)
|
2011-07-10 23:34:43 +04:00
|
|
|
{
|
|
|
|
/* Basic Security Header */
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Write_UINT16(s, flags); /* flags */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT16(s, 0); /* flagsHi (unused) */
|
2011-07-10 23:34:43 +04:00
|
|
|
}
|
2011-07-12 02:46:36 +04:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
BOOL rdp_read_share_control_header(wStream* s, UINT16* tpktLength, UINT16* remainingLength,
|
|
|
|
UINT16* type, UINT16* channel_id)
|
2011-07-20 00:30:05 +04:00
|
|
|
{
|
2020-03-31 10:14:55 +03:00
|
|
|
UINT16 len;
|
2013-04-30 06:35:15 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 2)
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
|
|
|
|
2011-07-20 00:30:05 +04:00
|
|
|
/* Share Control Header */
|
2020-03-31 10:14:55 +03:00
|
|
|
Stream_Read_UINT16(s, len); /* totalLength */
|
|
|
|
|
2014-11-05 22:32:46 +03:00
|
|
|
/* If length is 0x8000 then we actually got a flow control PDU that we should ignore
|
|
|
|
http://msdn.microsoft.com/en-us/library/cc240576.aspx */
|
2020-03-31 10:14:55 +03:00
|
|
|
if (len == 0x8000)
|
2014-11-05 22:32:46 +03:00
|
|
|
{
|
2020-04-06 12:58:48 +03:00
|
|
|
if (!rdp_read_flow_control_pdu(s, type, channel_id))
|
2020-03-31 10:14:55 +03:00
|
|
|
return FALSE;
|
2014-11-17 02:05:12 +03:00
|
|
|
*channel_id = 0;
|
2020-04-06 14:01:20 +03:00
|
|
|
if (tpktLength)
|
|
|
|
*tpktLength = 8; /* Flow control PDU is 8 bytes */
|
|
|
|
if (remainingLength)
|
|
|
|
*remainingLength = 0;
|
2014-11-05 22:32:46 +03:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2020-06-17 09:41:21 +03:00
|
|
|
if ((len < 4U) || ((len - 2U) > Stream_GetRemainingLength(s)))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-02-07 01:31:41 +04:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
if (tpktLength)
|
|
|
|
*tpktLength = len;
|
|
|
|
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read_UINT16(s, *type); /* pduType */
|
2019-11-06 17:24:51 +03:00
|
|
|
*type &= 0x0F; /* type is in the 4 least significant bits */
|
2011-08-21 11:52:44 +04:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
if (len > 5)
|
|
|
|
{
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read_UINT16(s, *channel_id); /* pduSource */
|
2020-04-06 14:01:20 +03:00
|
|
|
if (remainingLength)
|
|
|
|
*remainingLength = len - 6;
|
|
|
|
}
|
2013-02-05 01:39:05 +04:00
|
|
|
else
|
2020-04-06 14:01:20 +03:00
|
|
|
{
|
2013-02-05 01:39:05 +04:00
|
|
|
*channel_id = 0; /* Windows XP can send such short DEACTIVATE_ALL PDUs. */
|
2020-04-06 14:01:20 +03:00
|
|
|
if (remainingLength)
|
|
|
|
*remainingLength = len - 4;
|
|
|
|
}
|
2012-02-07 01:34:16 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-20 00:30:05 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
void rdp_write_share_control_header(wStream* s, UINT16 length, UINT16 type, UINT16 channel_id)
|
2011-07-21 21:57:57 +04:00
|
|
|
{
|
2012-01-25 14:12:37 +04:00
|
|
|
length -= RDP_PACKET_HEADER_MAX_LENGTH;
|
2011-07-21 21:57:57 +04:00
|
|
|
/* Share Control Header */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT16(s, length); /* totalLength */
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Write_UINT16(s, type | 0x10); /* pduType */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT16(s, channel_id); /* pduSource */
|
2011-07-21 21:57:57 +04:00
|
|
|
}
|
|
|
|
|
2013-09-06 02:53:55 +04:00
|
|
|
BOOL rdp_read_share_data_header(wStream* s, UINT16* length, BYTE* type, UINT32* shareId,
|
2018-07-18 16:16:50 +03:00
|
|
|
BYTE* compressedType, UINT16* compressedLength)
|
2011-07-21 23:10:53 +04:00
|
|
|
{
|
2013-04-30 06:35:15 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 12)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-21 18:52:37 +04:00
|
|
|
|
2011-07-21 23:10:53 +04:00
|
|
|
/* Share Data Header */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT32(s, *shareId); /* shareId (4 bytes) */
|
|
|
|
Stream_Seek_UINT8(s); /* pad1 (1 byte) */
|
|
|
|
Stream_Seek_UINT8(s); /* streamId (1 byte) */
|
|
|
|
Stream_Read_UINT16(s, *length); /* uncompressedLength (2 bytes) */
|
|
|
|
Stream_Read_UINT8(s, *type); /* pduType2, Data PDU Type (1 byte) */
|
|
|
|
Stream_Read_UINT8(s, *compressedType); /* compressedType (1 byte) */
|
2014-03-10 21:15:10 +04:00
|
|
|
Stream_Read_UINT16(s, *compressedLength); /* compressedLength (2 bytes) */
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-21 23:10:53 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
void rdp_write_share_data_header(wStream* s, UINT16 length, BYTE type, UINT32 share_id)
|
2011-07-21 23:10:53 +04:00
|
|
|
{
|
2012-01-25 14:12:37 +04:00
|
|
|
length -= RDP_PACKET_HEADER_MAX_LENGTH;
|
2011-07-24 02:05:34 +04:00
|
|
|
length -= RDP_SHARE_CONTROL_HEADER_LENGTH;
|
|
|
|
length -= RDP_SHARE_DATA_HEADER_LENGTH;
|
2011-07-21 23:10:53 +04:00
|
|
|
/* Share Data Header */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT32(s, share_id); /* shareId (4 bytes) */
|
|
|
|
Stream_Write_UINT8(s, 0); /* pad1 (1 byte) */
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Write_UINT8(s, STREAM_LOW); /* streamId (1 byte) */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT16(s, length); /* uncompressedLength (2 bytes) */
|
|
|
|
Stream_Write_UINT8(s, type); /* pduType2, Data PDU Type (1 byte) */
|
|
|
|
Stream_Write_UINT8(s, 0); /* compressedType (1 byte) */
|
|
|
|
Stream_Write_UINT16(s, 0); /* compressedLength (2 bytes) */
|
2011-07-21 23:10:53 +04:00
|
|
|
}
|
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
static BOOL rdp_security_stream_init(rdpRdp* rdp, wStream* s, BOOL sec_header)
|
2011-09-13 10:40:27 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!rdp || !s)
|
|
|
|
return FALSE;
|
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
if (rdp->do_crypt)
|
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!Stream_SafeSeek(s, 12))
|
|
|
|
return FALSE;
|
2012-12-12 08:34:51 +04:00
|
|
|
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
|
2018-10-02 14:18:13 +03:00
|
|
|
{
|
|
|
|
if (!Stream_SafeSeek(s, 4))
|
|
|
|
return FALSE;
|
|
|
|
}
|
2012-12-12 08:34:51 +04:00
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
rdp->sec_flags |= SEC_ENCRYPT;
|
2012-12-12 08:34:51 +04:00
|
|
|
|
2012-01-25 19:06:31 +04:00
|
|
|
if (rdp->do_secure_checksum)
|
|
|
|
rdp->sec_flags |= SEC_SECURE_CHECKSUM;
|
2011-09-13 10:40:27 +04:00
|
|
|
}
|
2014-10-28 11:06:04 +03:00
|
|
|
else if (rdp->sec_flags != 0 || sec_header)
|
2011-09-13 10:40:27 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!Stream_SafeSeek(s, 4))
|
|
|
|
return FALSE;
|
2011-09-13 10:40:27 +04:00
|
|
|
}
|
2012-12-12 08:34:51 +04:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
return TRUE;
|
2013-05-15 23:54:33 +04:00
|
|
|
}
|
2011-07-12 04:46:03 +04:00
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
wStream* rdp_send_stream_init(rdpRdp* rdp)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
wStream* s = transport_send_stream_init(rdp->transport, 4096);
|
|
|
|
|
|
|
|
if (!s)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
if (!rdp_security_stream_init(rdp, s, FALSE))
|
|
|
|
goto fail;
|
|
|
|
|
2011-07-12 02:46:36 +04:00
|
|
|
return s;
|
2018-10-02 14:18:13 +03:00
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return NULL;
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
wStream* rdp_send_stream_pdu_init(rdpRdp* rdp)
|
2011-07-22 04:06:28 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
wStream* s = rdp_send_stream_init(rdp);
|
2011-07-22 04:06:28 +04:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!s)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!Stream_SafeSeek(s, RDP_SHARE_CONTROL_HEADER_LENGTH))
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
return s;
|
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return NULL;
|
2013-05-15 23:54:33 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
wStream* rdp_data_pdu_init(rdpRdp* rdp)
|
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
wStream* s = rdp_send_stream_pdu_init(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-14 11:14:23 +03:00
|
|
|
if (!s)
|
|
|
|
return NULL;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!Stream_SafeSeek(s, RDP_SHARE_DATA_HEADER_LENGTH))
|
|
|
|
goto fail;
|
|
|
|
|
2011-07-21 23:10:53 +04:00
|
|
|
return s;
|
2018-10-02 14:18:13 +03:00
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return NULL;
|
2011-07-21 23:10:53 +04:00
|
|
|
}
|
|
|
|
|
2013-11-15 08:05:29 +04:00
|
|
|
BOOL rdp_set_error_info(rdpRdp* rdp, UINT32 errorInfo)
|
|
|
|
{
|
|
|
|
rdp->errorInfo = errorInfo;
|
|
|
|
|
|
|
|
if (rdp->errorInfo != ERRINFO_SUCCESS)
|
|
|
|
{
|
2016-03-14 17:27:15 +03:00
|
|
|
rdpContext* context = rdp->context;
|
2013-11-15 08:05:29 +04:00
|
|
|
rdp_print_errinfo(rdp->errorInfo);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2016-03-14 17:27:15 +03:00
|
|
|
if (context)
|
|
|
|
{
|
2020-01-08 19:39:25 +03:00
|
|
|
freerdp_set_last_error_log(context, MAKE_FREERDP_ERROR(ERRINFO, errorInfo));
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2016-03-14 17:27:15 +03:00
|
|
|
if (context->pubSub)
|
|
|
|
{
|
|
|
|
ErrorInfoEventArgs e;
|
|
|
|
EventArgsInit(&e, "freerdp");
|
|
|
|
e.code = rdp->errorInfo;
|
|
|
|
PubSub_OnErrorInfo(context->pubSub, context, &e);
|
|
|
|
}
|
|
|
|
}
|
2020-01-08 19:51:00 +03:00
|
|
|
else
|
|
|
|
WLog_ERR(TAG, "%s missing context=%p", __FUNCTION__, context);
|
2013-11-15 08:05:29 +04:00
|
|
|
}
|
2014-03-21 21:45:43 +04:00
|
|
|
else
|
|
|
|
{
|
2020-01-08 19:39:25 +03:00
|
|
|
freerdp_set_last_error_log(rdp->context, FREERDP_ERROR_SUCCESS);
|
2014-03-21 21:45:43 +04:00
|
|
|
}
|
2013-11-15 08:05:29 +04:00
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2014-01-24 03:01:31 +04:00
|
|
|
wStream* rdp_message_channel_pdu_init(rdpRdp* rdp)
|
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
wStream* s = transport_send_stream_init(rdp->transport, 4096);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-26 19:09:47 +03:00
|
|
|
if (!s)
|
|
|
|
return NULL;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
if (!rdp_security_stream_init(rdp, s, TRUE))
|
|
|
|
goto fail;
|
|
|
|
|
2014-01-24 03:01:31 +04:00
|
|
|
return s;
|
2018-10-02 14:18:13 +03:00
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return NULL;
|
2014-01-24 03:01:31 +04:00
|
|
|
}
|
|
|
|
|
2011-08-20 12:43:29 +04:00
|
|
|
/**
|
|
|
|
* Read an RDP packet header.\n
|
|
|
|
* @param rdp rdp module
|
|
|
|
* @param s stream
|
|
|
|
* @param length RDP packet length
|
|
|
|
* @param channel_id channel id
|
|
|
|
*/
|
|
|
|
|
2013-07-20 02:24:56 +04:00
|
|
|
BOOL rdp_read_header(rdpRdp* rdp, wStream* s, UINT16* length, UINT16* channelId)
|
2011-08-20 12:43:29 +04:00
|
|
|
{
|
2014-09-21 04:19:59 +04:00
|
|
|
BYTE li;
|
2013-07-20 02:24:56 +04:00
|
|
|
BYTE byte;
|
2014-09-21 04:19:59 +04:00
|
|
|
BYTE code;
|
|
|
|
BYTE choice;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 initiator;
|
2011-08-20 12:43:29 +04:00
|
|
|
enum DomainMCSPDU MCSPDU;
|
2014-09-21 04:19:59 +04:00
|
|
|
enum DomainMCSPDU domainMCSPDU;
|
2019-11-06 17:24:51 +03:00
|
|
|
MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataRequest
|
|
|
|
: DomainMCSPDU_SendDataIndication;
|
2012-10-02 18:28:04 +04:00
|
|
|
|
2020-05-07 17:19:54 +03:00
|
|
|
*channelId = 0; /* Initialize in case of early abort */
|
2017-05-29 11:50:22 +03:00
|
|
|
if (!tpkt_read_header(s, length))
|
|
|
|
return FALSE;
|
2014-09-21 04:19:59 +04:00
|
|
|
|
2020-02-20 10:22:19 +03:00
|
|
|
if (!tpdu_read_header(s, &code, &li, *length))
|
2014-09-21 04:19:59 +04:00
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (code != X224_TPDU_DATA)
|
2012-10-02 18:28:04 +04:00
|
|
|
{
|
2014-09-21 04:19:59 +04:00
|
|
|
if (code == X224_TPDU_DISCONNECT_REQUEST)
|
|
|
|
{
|
2015-09-05 15:57:30 +03:00
|
|
|
freerdp_abort_connect(rdp->instance);
|
2014-09-21 04:19:59 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!per_read_choice(s, &choice))
|
|
|
|
return FALSE;
|
|
|
|
|
2018-07-18 16:16:50 +03:00
|
|
|
domainMCSPDU = (enum DomainMCSPDU)(choice >> 2);
|
2014-09-21 04:19:59 +04:00
|
|
|
|
|
|
|
if (domainMCSPDU != MCSPDU)
|
|
|
|
{
|
|
|
|
if (domainMCSPDU != DomainMCSPDU_DisconnectProviderUltimatum)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-10-02 18:28:04 +04:00
|
|
|
}
|
2012-02-07 01:31:41 +04:00
|
|
|
|
2014-09-21 04:19:59 +04:00
|
|
|
MCSPDU = domainMCSPDU;
|
|
|
|
|
2019-02-07 16:22:28 +03:00
|
|
|
if (*length < 8U)
|
2017-05-29 11:50:22 +03:00
|
|
|
return FALSE;
|
|
|
|
|
2019-02-07 16:22:28 +03:00
|
|
|
if ((*length - 8U) > Stream_GetRemainingLength(s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-02-07 01:37:18 +04:00
|
|
|
|
|
|
|
if (MCSPDU == DomainMCSPDU_DisconnectProviderUltimatum)
|
|
|
|
{
|
2013-11-15 08:05:29 +04:00
|
|
|
int reason = 0;
|
2013-06-19 00:55:23 +04:00
|
|
|
TerminateEventArgs e;
|
2014-04-02 16:17:39 +04:00
|
|
|
rdpContext* context;
|
2012-02-07 01:37:18 +04:00
|
|
|
|
2013-11-15 08:05:29 +04:00
|
|
|
if (!mcs_recv_disconnect_provider_ultimatum(rdp->mcs, s, &reason))
|
|
|
|
return FALSE;
|
|
|
|
|
2014-09-21 04:19:59 +04:00
|
|
|
if (!rdp->instance)
|
2014-04-02 16:17:39 +04:00
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
context = rdp->instance->context;
|
2018-09-19 17:36:39 +03:00
|
|
|
context->disconnectUltimatum = reason;
|
2014-04-02 16:17:39 +04:00
|
|
|
|
2013-11-15 08:05:29 +04:00
|
|
|
if (rdp->errorInfo == ERRINFO_SUCCESS)
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Some servers like Windows Server 2008 R2 do not send the error info pdu
|
|
|
|
* when the user logs off like they should. Map DisconnectProviderUltimatum
|
|
|
|
* to a ERRINFO_LOGOFF_BY_USER when the errinfo code is ERRINFO_SUCCESS.
|
|
|
|
*/
|
2018-09-19 17:36:39 +03:00
|
|
|
if (reason == Disconnect_Ultimatum_provider_initiated)
|
2013-11-15 08:41:46 +04:00
|
|
|
rdp_set_error_info(rdp, ERRINFO_RPC_INITIATED_DISCONNECT);
|
2018-09-19 17:36:39 +03:00
|
|
|
else if (reason == Disconnect_Ultimatum_user_requested)
|
2013-11-15 08:41:46 +04:00
|
|
|
rdp_set_error_info(rdp, ERRINFO_LOGOFF_BY_USER);
|
|
|
|
else
|
|
|
|
rdp_set_error_info(rdp, ERRINFO_RPC_INITIATED_DISCONNECT);
|
2013-11-15 08:05:29 +04:00
|
|
|
}
|
|
|
|
|
2016-02-04 13:39:57 +03:00
|
|
|
WLog_DBG(TAG, "DisconnectProviderUltimatum: reason: %d", reason);
|
2015-09-05 15:57:30 +03:00
|
|
|
freerdp_abort_connect(rdp->instance);
|
2013-06-19 00:55:23 +04:00
|
|
|
EventArgsInit(&e, "freerdp");
|
|
|
|
e.code = 0;
|
|
|
|
PubSub_OnTerminate(context->pubSub, context, &e);
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2012-02-07 01:37:18 +04:00
|
|
|
}
|
2011-08-20 12:43:29 +04:00
|
|
|
|
2013-04-30 19:26:33 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 5)
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
2013-05-15 23:54:33 +04:00
|
|
|
|
2017-05-29 11:50:22 +03:00
|
|
|
if (!per_read_integer16(s, &initiator, MCS_BASE_CHANNEL_ID)) /* initiator (UserId) */
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!per_read_integer16(s, channelId, 0)) /* channelId */
|
|
|
|
return FALSE;
|
|
|
|
|
2013-07-20 02:24:56 +04:00
|
|
|
Stream_Read_UINT8(s, byte); /* dataPriority + Segmentation (0x70) */
|
2011-08-25 00:54:32 +04:00
|
|
|
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!per_read_length(s, length)) /* userData (OCTET_STRING) */
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
2013-05-15 23:54:33 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
if (*length > Stream_GetRemainingLength(s))
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-20 12:43:29 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-08-20 12:43:29 +04:00
|
|
|
}
|
|
|
|
|
2011-07-12 09:16:59 +04:00
|
|
|
/**
|
|
|
|
* Write an RDP packet header.\n
|
|
|
|
* @param rdp rdp module
|
|
|
|
* @param s stream
|
|
|
|
* @param length RDP packet length
|
2011-08-03 08:34:55 +04:00
|
|
|
* @param channel_id channel id
|
2011-07-12 09:16:59 +04:00
|
|
|
*/
|
|
|
|
|
2013-07-20 02:24:56 +04:00
|
|
|
void rdp_write_header(rdpRdp* rdp, wStream* s, UINT16 length, UINT16 channelId)
|
2011-07-12 09:16:59 +04:00
|
|
|
{
|
2011-09-16 03:54:03 +04:00
|
|
|
int body_length;
|
2011-11-10 00:59:03 +04:00
|
|
|
enum DomainMCSPDU MCSPDU;
|
2019-11-06 17:24:51 +03:00
|
|
|
MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataIndication
|
|
|
|
: DomainMCSPDU_SendDataRequest;
|
2011-08-20 12:43:29 +04:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
if ((rdp->sec_flags & SEC_ENCRYPT) &&
|
|
|
|
(rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS))
|
2011-09-27 09:30:58 +04:00
|
|
|
{
|
2011-09-16 03:54:03 +04:00
|
|
|
int pad;
|
2012-01-25 14:12:37 +04:00
|
|
|
body_length = length - RDP_PACKET_HEADER_MAX_LENGTH - 16;
|
2011-09-16 03:54:03 +04:00
|
|
|
pad = 8 - (body_length % 8);
|
2012-12-12 08:34:51 +04:00
|
|
|
|
2011-09-16 03:54:03 +04:00
|
|
|
if (pad != 8)
|
|
|
|
length += pad;
|
|
|
|
}
|
|
|
|
|
2011-08-20 12:43:29 +04:00
|
|
|
mcs_write_domain_mcspdu_header(s, MCSPDU, length, 0);
|
2014-02-14 02:06:33 +04:00
|
|
|
per_write_integer16(s, rdp->mcs->userId, MCS_BASE_CHANNEL_ID); /* initiator */
|
2019-11-06 17:24:51 +03:00
|
|
|
per_write_integer16(s, channelId, 0); /* channelId */
|
|
|
|
Stream_Write_UINT8(s, 0x70); /* dataPriority + segmentation */
|
2012-01-25 19:25:22 +04:00
|
|
|
/*
|
2013-07-20 02:24:56 +04:00
|
|
|
* We always encode length in two bytes, even though we could use
|
2012-01-25 19:25:22 +04:00
|
|
|
* only one byte if length <= 0x7F. It is just easier that way,
|
|
|
|
* because we can leave room for fixed-length header, store all
|
|
|
|
* the data first and then store the header.
|
|
|
|
*/
|
2012-01-25 14:12:37 +04:00
|
|
|
length = (length - RDP_PACKET_HEADER_MAX_LENGTH) | 0x8000;
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Write_UINT16_BE(s, length); /* userData (OCTET_STRING) */
|
2011-07-12 09:16:59 +04:00
|
|
|
}
|
|
|
|
|
2018-07-18 16:16:50 +03:00
|
|
|
static BOOL rdp_security_stream_out(rdpRdp* rdp, wStream* s, int length, UINT32 sec_flags,
|
|
|
|
UINT32* pad)
|
2011-09-13 10:40:27 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
BYTE* data;
|
2015-04-01 12:11:37 +03:00
|
|
|
BOOL status;
|
2014-01-24 03:01:31 +04:00
|
|
|
sec_flags |= rdp->sec_flags;
|
2015-04-01 12:11:37 +03:00
|
|
|
*pad = 0;
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
if (sec_flags != 0)
|
|
|
|
{
|
|
|
|
rdp_write_security_header(s, sec_flags);
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
if (sec_flags & SEC_ENCRYPT)
|
|
|
|
{
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
|
2011-09-16 03:54:03 +04:00
|
|
|
{
|
2013-05-15 20:14:26 +04:00
|
|
|
data = Stream_Pointer(s) + 12;
|
|
|
|
length = length - (data - Stream_Buffer(s));
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Write_UINT16(s, 0x10); /* length */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Write_UINT8(s, 0x1); /* TSFIPS_VERSION 1*/
|
2011-09-16 03:54:03 +04:00
|
|
|
/* handle padding */
|
2015-04-01 12:11:37 +03:00
|
|
|
*pad = 8 - (length % 8);
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
if (*pad == 8)
|
2015-04-13 10:28:29 +03:00
|
|
|
*pad = 0;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
if (*pad)
|
2018-07-18 16:16:50 +03:00
|
|
|
memset(data + length, 0, *pad);
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
Stream_Write_UINT8(s, *pad);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
if (!security_hmac_signature(data, length, Stream_Pointer(s), rdp))
|
|
|
|
return FALSE;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, 8);
|
2015-04-01 12:11:37 +03:00
|
|
|
security_fips_encrypt(data, length + *pad, rdp);
|
2011-09-16 03:54:03 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-05-15 20:14:26 +04:00
|
|
|
data = Stream_Pointer(s) + 8;
|
|
|
|
length = length - (data - Stream_Buffer(s));
|
|
|
|
|
2012-01-24 18:58:30 +04:00
|
|
|
if (sec_flags & SEC_SECURE_CHECKSUM)
|
2019-11-06 17:24:51 +03:00
|
|
|
status =
|
|
|
|
security_salted_mac_signature(rdp, data, length, TRUE, Stream_Pointer(s));
|
2012-01-24 18:58:30 +04:00
|
|
|
else
|
2015-04-01 12:11:37 +03:00
|
|
|
status = security_mac_signature(rdp, data, length, Stream_Pointer(s));
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return FALSE;
|
2013-05-15 20:14:26 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, 8);
|
2015-04-07 22:06:53 +03:00
|
|
|
|
|
|
|
if (!security_encrypt(Stream_Pointer(s), length, rdp))
|
|
|
|
return FALSE;
|
2011-09-16 03:54:03 +04:00
|
|
|
}
|
2011-09-13 10:40:27 +04:00
|
|
|
}
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
rdp->sec_flags = 0;
|
|
|
|
}
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
return TRUE;
|
2011-09-13 10:40:27 +04:00
|
|
|
}
|
|
|
|
|
2014-10-28 11:06:04 +03:00
|
|
|
static UINT32 rdp_get_sec_bytes(rdpRdp* rdp, UINT16 sec_flags)
|
2011-09-13 10:40:27 +04:00
|
|
|
{
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 sec_bytes;
|
2011-09-13 10:40:27 +04:00
|
|
|
|
2011-09-24 10:09:29 +04:00
|
|
|
if (rdp->sec_flags & SEC_ENCRYPT)
|
|
|
|
{
|
2011-09-13 10:40:27 +04:00
|
|
|
sec_bytes = 12;
|
2012-01-14 01:20:36 +04:00
|
|
|
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
|
2011-09-16 03:54:03 +04:00
|
|
|
sec_bytes += 4;
|
2011-09-24 10:09:29 +04:00
|
|
|
}
|
2014-10-28 11:06:04 +03:00
|
|
|
else if (rdp->sec_flags != 0 || sec_flags != 0)
|
2012-01-14 01:20:36 +04:00
|
|
|
{
|
2011-09-13 10:40:27 +04:00
|
|
|
sec_bytes = 4;
|
2012-01-14 01:20:36 +04:00
|
|
|
}
|
2011-09-13 10:40:27 +04:00
|
|
|
else
|
2012-01-14 01:20:36 +04:00
|
|
|
{
|
2011-09-13 10:40:27 +04:00
|
|
|
sec_bytes = 0;
|
2012-01-14 01:20:36 +04:00
|
|
|
}
|
|
|
|
|
2011-09-13 10:40:27 +04:00
|
|
|
return sec_bytes;
|
|
|
|
}
|
|
|
|
|
2011-07-12 04:46:03 +04:00
|
|
|
/**
|
2014-09-12 16:36:29 +04:00
|
|
|
* Send an RDP packet.
|
2011-07-12 04:46:03 +04:00
|
|
|
* @param rdp RDP module
|
|
|
|
* @param s stream
|
2011-08-03 08:34:55 +04:00
|
|
|
* @param channel_id channel id
|
2011-07-12 04:46:03 +04:00
|
|
|
*/
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
BOOL rdp_send(rdpRdp* rdp, wStream* s, UINT16 channel_id)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
BOOL rc = FALSE;
|
2015-04-01 12:11:37 +03:00
|
|
|
UINT32 pad;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
2018-10-02 14:18:13 +03:00
|
|
|
|
|
|
|
if (!s)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!rdp)
|
|
|
|
goto fail;
|
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
length = Stream_GetPosition(s);
|
|
|
|
Stream_SetPosition(s, 0);
|
2011-08-03 08:34:55 +04:00
|
|
|
rdp_write_header(rdp, s, length, channel_id);
|
2015-04-01 12:11:37 +03:00
|
|
|
|
|
|
|
if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
length += pad;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_SetPosition(s, length);
|
2013-05-15 20:14:26 +04:00
|
|
|
Stream_SealLength(s);
|
2013-02-21 06:34:47 +04:00
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
if (transport_write(rdp->transport, s) < 0)
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2011-08-22 11:03:58 +04:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
rc = TRUE;
|
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return rc;
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
BOOL rdp_send_pdu(rdpRdp* rdp, wStream* s, UINT16 type, UINT16 channel_id)
|
2011-07-22 04:06:28 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 sec_bytes;
|
2017-12-11 12:25:21 +03:00
|
|
|
size_t sec_hold;
|
2015-04-01 12:11:37 +03:00
|
|
|
UINT32 pad;
|
2018-10-02 14:18:13 +03:00
|
|
|
|
|
|
|
if (!rdp || !s)
|
|
|
|
return FALSE;
|
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
length = Stream_GetPosition(s);
|
|
|
|
Stream_SetPosition(s, 0);
|
2011-08-03 08:34:55 +04:00
|
|
|
rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID);
|
2014-10-28 11:06:04 +03:00
|
|
|
sec_bytes = rdp_get_sec_bytes(rdp, 0);
|
2013-05-15 23:54:33 +04:00
|
|
|
sec_hold = Stream_GetPosition(s);
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, sec_bytes);
|
2012-01-16 00:16:32 +04:00
|
|
|
rdp_write_share_control_header(s, length - sec_bytes, type, channel_id);
|
2013-05-15 23:54:33 +04:00
|
|
|
Stream_SetPosition(s, sec_hold);
|
2015-04-01 12:11:37 +03:00
|
|
|
|
|
|
|
if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
length += pad;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_SetPosition(s, length);
|
2013-05-15 20:14:26 +04:00
|
|
|
Stream_SealLength(s);
|
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
if (transport_write(rdp->transport, s) < 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2011-08-22 11:03:58 +04:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-07-22 04:06:28 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
BOOL rdp_send_data_pdu(rdpRdp* rdp, wStream* s, BYTE type, UINT16 channel_id)
|
2011-07-21 23:10:53 +04:00
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
BOOL rc = FALSE;
|
2017-12-11 12:25:21 +03:00
|
|
|
size_t length;
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 sec_bytes;
|
2017-12-11 12:25:21 +03:00
|
|
|
size_t sec_hold;
|
2015-04-01 12:11:37 +03:00
|
|
|
UINT32 pad;
|
2018-10-02 14:18:13 +03:00
|
|
|
|
|
|
|
if (!s)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!rdp)
|
|
|
|
goto fail;
|
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
length = Stream_GetPosition(s);
|
|
|
|
Stream_SetPosition(s, 0);
|
2011-08-03 08:34:55 +04:00
|
|
|
rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID);
|
2014-10-28 11:06:04 +03:00
|
|
|
sec_bytes = rdp_get_sec_bytes(rdp, 0);
|
2013-05-15 23:54:33 +04:00
|
|
|
sec_hold = Stream_GetPosition(s);
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_Seek(s, sec_bytes);
|
2012-01-16 00:16:32 +04:00
|
|
|
rdp_write_share_control_header(s, length - sec_bytes, PDU_TYPE_DATA, channel_id);
|
2012-11-08 03:23:25 +04:00
|
|
|
rdp_write_share_data_header(s, length - sec_bytes, type, rdp->settings->ShareId);
|
2013-05-15 23:54:33 +04:00
|
|
|
Stream_SetPosition(s, sec_hold);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-04-01 12:11:37 +03:00
|
|
|
length += pad;
|
2014-01-24 03:01:31 +04:00
|
|
|
Stream_SetPosition(s, length);
|
|
|
|
Stream_SealLength(s);
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_DBG(TAG, "%s: sending data (type=0x%x size=%" PRIuz " channelId=%" PRIu16 ")",
|
|
|
|
__FUNCTION__, type, Stream_Length(s), channel_id);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2019-10-23 00:35:18 +03:00
|
|
|
rdp->outPackets++;
|
2014-01-24 03:01:31 +04:00
|
|
|
if (transport_write(rdp->transport, s) < 0)
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2014-01-24 03:01:31 +04:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
rc = TRUE;
|
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return rc;
|
2014-01-24 03:01:31 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOL rdp_send_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 sec_flags)
|
|
|
|
{
|
2018-10-02 14:18:13 +03:00
|
|
|
BOOL rc = FALSE;
|
2014-01-24 03:01:31 +04:00
|
|
|
UINT16 length;
|
2015-04-01 12:11:37 +03:00
|
|
|
UINT32 pad;
|
2018-10-02 14:18:13 +03:00
|
|
|
|
|
|
|
if (!s)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!rdp)
|
|
|
|
goto fail;
|
|
|
|
|
2014-01-24 03:01:31 +04:00
|
|
|
length = Stream_GetPosition(s);
|
|
|
|
Stream_SetPosition(s, 0);
|
2014-02-14 02:06:33 +04:00
|
|
|
rdp_write_header(rdp, s, length, rdp->mcs->messageChannelId);
|
2015-04-01 12:11:37 +03:00
|
|
|
|
|
|
|
if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2015-04-01 12:11:37 +03:00
|
|
|
|
|
|
|
length += pad;
|
2013-04-30 06:35:15 +04:00
|
|
|
Stream_SetPosition(s, length);
|
2013-05-15 20:14:26 +04:00
|
|
|
Stream_SealLength(s);
|
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
if (transport_write(rdp->transport, s) < 0)
|
2018-10-02 14:18:13 +03:00
|
|
|
goto fail;
|
2011-08-22 11:03:58 +04:00
|
|
|
|
2018-10-02 14:18:13 +03:00
|
|
|
rc = TRUE;
|
|
|
|
fail:
|
|
|
|
Stream_Release(s);
|
|
|
|
return rc;
|
2011-07-21 23:10:53 +04:00
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_server_shutdown_denied_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_server_set_keyboard_indicators_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
|
|
|
UINT16 unitId;
|
|
|
|
UINT16 ledFlags;
|
2014-09-30 20:18:29 +04:00
|
|
|
rdpContext* context = rdp->instance->context;
|
2014-01-12 07:54:08 +04:00
|
|
|
|
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
|
|
|
return FALSE;
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT16(s, unitId); /* unitId (2 bytes) */
|
2014-01-12 07:54:08 +04:00
|
|
|
Stream_Read_UINT16(s, ledFlags); /* ledFlags (2 bytes) */
|
2014-09-30 20:18:29 +04:00
|
|
|
IFCALL(context->update->SetKeyboardIndicators, context, ledFlags);
|
2014-01-12 07:54:08 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_server_set_keyboard_ime_status_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
|
|
|
UINT16 unitId;
|
|
|
|
UINT32 imeState;
|
|
|
|
UINT32 imeConvMode;
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
if (!rdp || !rdp->input)
|
|
|
|
return FALSE;
|
|
|
|
|
2014-01-12 07:54:08 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 10)
|
|
|
|
return FALSE;
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT16(s, unitId); /* unitId (2 bytes) */
|
|
|
|
Stream_Read_UINT32(s, imeState); /* imeState (4 bytes) */
|
2014-01-12 07:54:08 +04:00
|
|
|
Stream_Read_UINT32(s, imeConvMode); /* imeConvMode (4 bytes) */
|
2017-05-12 10:43:58 +03:00
|
|
|
IFCALL(rdp->update->SetKeyboardImeStatus, rdp->context, unitId, imeState, imeConvMode);
|
2014-01-12 07:54:08 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_set_error_info_data_pdu(rdpRdp* rdp, wStream* s)
|
2011-07-22 00:20:41 +04:00
|
|
|
{
|
2013-11-15 08:05:29 +04:00
|
|
|
UINT32 errorInfo;
|
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
2013-02-12 05:38:19 +04:00
|
|
|
|
2013-11-15 08:05:29 +04:00
|
|
|
Stream_Read_UINT32(s, errorInfo); /* errorInfo (4 bytes) */
|
2016-02-12 00:45:30 +03:00
|
|
|
return rdp_set_error_info(rdp, errorInfo);
|
2011-07-22 00:20:41 +04:00
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_server_auto_reconnect_status_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
|
|
|
UINT32 arcStatus;
|
|
|
|
|
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
Stream_Read_UINT32(s, arcStatus); /* arcStatus (4 bytes) */
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_WARN(TAG, "AutoReconnectStatus: 0x%08" PRIX32 "", arcStatus);
|
2014-01-12 07:54:08 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_server_status_info_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
|
|
|
UINT32 statusCode;
|
|
|
|
|
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
Stream_Read_UINT32(s, statusCode); /* statusCode (4 bytes) */
|
2019-01-29 12:33:06 +03:00
|
|
|
|
|
|
|
if (rdp->update->ServerStatusInfo)
|
|
|
|
return rdp->update->ServerStatusInfo(rdp->context, statusCode);
|
|
|
|
|
2014-01-12 07:54:08 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2017-05-12 10:43:58 +03:00
|
|
|
static BOOL rdp_recv_monitor_layout_pdu(rdpRdp* rdp, wStream* s)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
2014-02-11 07:12:13 +04:00
|
|
|
UINT32 index;
|
2014-01-12 07:54:08 +04:00
|
|
|
UINT32 monitorCount;
|
|
|
|
MONITOR_DEF* monitor;
|
|
|
|
MONITOR_DEF* monitorDefArray;
|
2016-01-20 18:54:15 +03:00
|
|
|
BOOL ret = TRUE;
|
2014-01-12 07:54:08 +04:00
|
|
|
|
|
|
|
if (Stream_GetRemainingLength(s) < 4)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
Stream_Read_UINT32(s, monitorCount); /* monitorCount (4 bytes) */
|
|
|
|
|
2016-01-20 18:54:15 +03:00
|
|
|
if ((Stream_GetRemainingLength(s) / 20) < monitorCount)
|
2014-01-12 07:54:08 +04:00
|
|
|
return FALSE;
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
monitorDefArray = (MONITOR_DEF*)calloc(monitorCount, sizeof(MONITOR_DEF));
|
2014-09-26 06:08:10 +04:00
|
|
|
|
|
|
|
if (!monitorDefArray)
|
|
|
|
return FALSE;
|
2014-01-12 07:54:08 +04:00
|
|
|
|
2016-01-20 18:54:15 +03:00
|
|
|
for (monitor = monitorDefArray, index = 0; index < monitorCount; index++, monitor++)
|
2014-01-12 07:54:08 +04:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT32(s, monitor->left); /* left (4 bytes) */
|
|
|
|
Stream_Read_UINT32(s, monitor->top); /* top (4 bytes) */
|
|
|
|
Stream_Read_UINT32(s, monitor->right); /* right (4 bytes) */
|
2014-01-12 07:54:08 +04:00
|
|
|
Stream_Read_UINT32(s, monitor->bottom); /* bottom (4 bytes) */
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT32(s, monitor->flags); /* flags (4 bytes) */
|
2014-01-12 07:54:08 +04:00
|
|
|
}
|
|
|
|
|
2016-01-20 18:54:15 +03:00
|
|
|
IFCALLRET(rdp->update->RemoteMonitors, ret, rdp->context, monitorCount, monitorDefArray);
|
2014-01-12 07:54:08 +04:00
|
|
|
free(monitorDefArray);
|
2016-01-20 18:54:15 +03:00
|
|
|
return ret;
|
2014-01-12 07:54:08 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
int rdp_recv_data_pdu(rdpRdp* rdp, wStream* s)
|
2011-07-22 00:20:41 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
BYTE type;
|
2013-04-30 19:26:33 +04:00
|
|
|
wStream* cs;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
2014-03-10 21:15:10 +04:00
|
|
|
UINT32 shareId;
|
|
|
|
BYTE compressedType;
|
|
|
|
UINT16 compressedLength;
|
2011-07-22 00:20:41 +04:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
if (!rdp_read_share_data_header(s, &length, &type, &shareId, &compressedType,
|
|
|
|
&compressedLength))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_read_share_data_header() failed");
|
2013-01-12 03:43:16 +04:00
|
|
|
return -1;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2011-07-22 00:20:41 +04:00
|
|
|
|
2013-04-30 19:26:33 +04:00
|
|
|
cs = s;
|
2012-03-01 07:37:02 +04:00
|
|
|
|
2014-03-10 21:15:10 +04:00
|
|
|
if (compressedType & PACKET_COMPRESSED)
|
2012-03-01 07:37:02 +04:00
|
|
|
{
|
2014-03-10 21:15:10 +04:00
|
|
|
UINT32 DstSize = 0;
|
|
|
|
BYTE* pDstData = NULL;
|
2020-03-10 12:52:28 +03:00
|
|
|
UINT16 SrcSize = compressedLength - 18;
|
2014-03-10 21:15:10 +04:00
|
|
|
|
2020-03-10 12:52:28 +03:00
|
|
|
if ((compressedLength < 18) || (Stream_GetRemainingLength(s) < SrcSize))
|
2013-02-02 01:43:20 +04:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
|
|
|
|
compressedLength);
|
2014-03-10 21:15:10 +04:00
|
|
|
return -1;
|
2013-02-02 01:43:20 +04:00
|
|
|
}
|
2013-04-30 19:26:33 +04:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
if (bulk_decompress(rdp->bulk, Stream_Pointer(s), SrcSize, &pDstData, &DstSize,
|
|
|
|
compressedType))
|
2012-03-01 07:37:02 +04:00
|
|
|
{
|
2015-03-23 19:25:23 +03:00
|
|
|
if (!(cs = StreamPool_Take(rdp->transport->ReceivePool, DstSize)))
|
2015-03-26 19:09:47 +03:00
|
|
|
{
|
2016-12-01 13:15:11 +03:00
|
|
|
WLog_ERR(TAG, "Couldn't take stream from pool");
|
2015-03-23 19:25:23 +03:00
|
|
|
return -1;
|
2015-03-26 19:09:47 +03:00
|
|
|
}
|
2013-04-30 19:26:33 +04:00
|
|
|
|
|
|
|
Stream_SetPosition(cs, 0);
|
2014-03-10 21:15:10 +04:00
|
|
|
Stream_Write(cs, pDstData, DstSize);
|
2013-04-30 19:26:33 +04:00
|
|
|
Stream_SealLength(cs);
|
|
|
|
Stream_SetPosition(cs, 0);
|
2012-03-01 07:37:02 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "bulk_decompress() failed");
|
2013-01-09 02:18:10 +04:00
|
|
|
return -1;
|
2012-03-01 07:37:02 +04:00
|
|
|
}
|
2013-04-30 19:26:33 +04:00
|
|
|
|
2014-03-10 21:15:10 +04:00
|
|
|
Stream_Seek(s, SrcSize);
|
2012-03-01 07:37:02 +04:00
|
|
|
}
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_DBG(TAG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
|
|
|
|
type < ARRAYSIZE(DATA_PDU_TYPE_STRINGS) ? DATA_PDU_TYPE_STRINGS[type] : "???", type,
|
|
|
|
length);
|
2011-07-22 00:20:41 +04:00
|
|
|
|
|
|
|
switch (type)
|
|
|
|
{
|
2011-07-23 00:19:08 +04:00
|
|
|
case DATA_PDU_TYPE_UPDATE:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!update_recv(rdp->update, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_UPDATE - update_recv() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_CONTROL:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!rdp_recv_server_control_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_CONTROL - rdp_recv_server_control_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_POINTER:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!update_recv_pointer(rdp->update, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_POINTER - update_recv_pointer() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SYNCHRONIZE:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!rdp_recv_synchronize_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_SYNCHRONIZE - rdp_recv_synchronize_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_PLAY_SOUND:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!update_recv_play_sound(rdp->update, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_PLAY_SOUND - update_recv_play_sound() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SHUTDOWN_DENIED:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_server_shutdown_denied_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(
|
|
|
|
TAG,
|
|
|
|
"DATA_PDU_TYPE_SHUTDOWN_DENIED - rdp_recv_server_shutdown_denied_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SAVE_SESSION_INFO:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!rdp_recv_save_session_info(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG,
|
|
|
|
"DATA_PDU_TYPE_SAVE_SESSION_INFO - rdp_recv_save_session_info() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_FONT_MAP:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!rdp_recv_font_map_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_FONT_MAP - rdp_recv_font_map_pdu() failed");
|
2015-05-06 17:23:37 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_server_set_keyboard_indicators_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS - "
|
|
|
|
"rdp_recv_server_set_keyboard_indicators_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_server_set_keyboard_ime_status_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS - "
|
|
|
|
"rdp_recv_server_set_keyboard_ime_status_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
2011-07-22 00:20:41 +04:00
|
|
|
case DATA_PDU_TYPE_SET_ERROR_INFO:
|
2013-04-30 19:26:33 +04:00
|
|
|
if (!rdp_recv_set_error_info_data_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(
|
|
|
|
TAG,
|
|
|
|
"DATA_PDU_TYPE_SET_ERROR_INFO - rdp_recv_set_error_info_data_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-22 00:20:41 +04:00
|
|
|
break;
|
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
case DATA_PDU_TYPE_ARC_STATUS:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_server_auto_reconnect_status_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "DATA_PDU_TYPE_ARC_STATUS - "
|
|
|
|
"rdp_recv_server_auto_reconnect_status_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_STATUS_INFO:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_server_status_info_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG,
|
|
|
|
"DATA_PDU_TYPE_STATUS_INFO - rdp_recv_server_status_info_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DATA_PDU_TYPE_MONITOR_LAYOUT:
|
2014-01-12 07:54:08 +04:00
|
|
|
if (!rdp_recv_monitor_layout_pdu(rdp, cs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG,
|
|
|
|
"DATA_PDU_TYPE_MONITOR_LAYOUT - rdp_recv_monitor_layout_pdu() failed");
|
2015-05-06 17:54:23 +03:00
|
|
|
goto out_fail;
|
2015-03-19 02:41:29 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-07-23 00:19:08 +04:00
|
|
|
break;
|
|
|
|
|
2011-07-22 00:20:41 +04:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2012-02-11 17:30:09 +04:00
|
|
|
|
2013-04-30 19:26:33 +04:00
|
|
|
if (cs != s)
|
|
|
|
Stream_Release(cs);
|
2012-03-01 07:37:02 +04:00
|
|
|
|
2013-01-09 02:18:10 +04:00
|
|
|
return 0;
|
2015-05-06 17:23:37 +03:00
|
|
|
out_fail:
|
2018-07-18 16:16:50 +03:00
|
|
|
|
|
|
|
if (cs != s)
|
|
|
|
Stream_Release(cs);
|
|
|
|
|
|
|
|
return -1;
|
2011-07-22 00:20:41 +04:00
|
|
|
}
|
|
|
|
|
2015-06-19 15:47:00 +03:00
|
|
|
int rdp_recv_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 securityFlags)
|
2014-01-24 03:01:31 +04:00
|
|
|
{
|
|
|
|
if (securityFlags & SEC_AUTODETECT_REQ)
|
|
|
|
{
|
|
|
|
/* Server Auto-Detect Request PDU */
|
2014-10-28 11:06:04 +03:00
|
|
|
return rdp_recv_autodetect_request_packet(rdp, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (securityFlags & SEC_AUTODETECT_RSP)
|
|
|
|
{
|
|
|
|
/* Client Auto-Detect Response PDU */
|
|
|
|
return rdp_recv_autodetect_response_packet(rdp, s);
|
2014-01-24 03:01:31 +04:00
|
|
|
}
|
|
|
|
|
2014-01-24 07:23:47 +04:00
|
|
|
if (securityFlags & SEC_HEARTBEAT)
|
|
|
|
{
|
|
|
|
/* Heartbeat PDU */
|
|
|
|
return rdp_recv_heartbeat_packet(rdp, s);
|
|
|
|
}
|
|
|
|
|
2014-01-24 03:01:31 +04:00
|
|
|
if (securityFlags & SEC_TRANSPORT_REQ)
|
|
|
|
{
|
|
|
|
/* Initiate Multitransport Request PDU */
|
|
|
|
return rdp_recv_multitransport_packet(rdp, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-11-05 00:52:29 +04:00
|
|
|
int rdp_recv_out_of_sequence_pdu(rdpRdp* rdp, wStream* s)
|
2011-09-03 05:34:51 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 type;
|
|
|
|
UINT16 length;
|
|
|
|
UINT16 channelId;
|
2011-09-03 05:34:51 +04:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
if (!rdp_read_share_control_header(s, &length, NULL, &type, &channelId))
|
2013-11-05 00:52:29 +04:00
|
|
|
return -1;
|
2011-09-03 05:34:51 +04:00
|
|
|
|
|
|
|
if (type == PDU_TYPE_DATA)
|
|
|
|
{
|
2013-11-05 00:52:29 +04:00
|
|
|
return rdp_recv_data_pdu(rdp, s);
|
2011-09-03 05:34:51 +04:00
|
|
|
}
|
|
|
|
else if (type == PDU_TYPE_SERVER_REDIRECTION)
|
|
|
|
{
|
2013-01-12 03:43:16 +04:00
|
|
|
return rdp_recv_enhanced_security_redirection_packet(rdp, s);
|
2011-09-03 05:34:51 +04:00
|
|
|
}
|
2019-11-06 17:24:51 +03:00
|
|
|
else if (type == PDU_TYPE_FLOW_RESPONSE || type == PDU_TYPE_FLOW_STOP ||
|
2018-07-18 16:16:50 +03:00
|
|
|
type == PDU_TYPE_FLOW_TEST)
|
2014-11-05 22:32:46 +03:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2011-09-03 05:34:51 +04:00
|
|
|
else
|
|
|
|
{
|
2013-11-05 00:52:29 +04:00
|
|
|
return -1;
|
2011-09-03 05:34:51 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-06 12:58:48 +03:00
|
|
|
BOOL rdp_read_flow_control_pdu(wStream* s, UINT16* type, UINT16* channel_id)
|
2014-11-05 22:32:46 +03:00
|
|
|
{
|
2014-11-08 01:58:58 +03:00
|
|
|
/*
|
|
|
|
* Read flow control PDU - documented in FlowPDU section in T.128
|
|
|
|
* http://www.itu.int/rec/T-REC-T.128-199802-S/en
|
|
|
|
* The specification for the PDU has pad8bits listed BEFORE pduTypeFlow.
|
|
|
|
* However, so far pad8bits has always been observed to arrive AFTER pduTypeFlow.
|
|
|
|
* Switched the order of these two fields to match this observation.
|
|
|
|
*/
|
2014-11-05 22:32:46 +03:00
|
|
|
UINT8 pduType;
|
2020-03-31 10:14:55 +03:00
|
|
|
if (!type)
|
|
|
|
return FALSE;
|
|
|
|
if (Stream_GetRemainingLength(s) < 6)
|
|
|
|
return FALSE;
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT8(s, pduType); /* pduTypeFlow */
|
2014-11-05 22:32:46 +03:00
|
|
|
*type = pduType;
|
2020-04-06 12:58:48 +03:00
|
|
|
Stream_Seek_UINT8(s); /* pad8bits */
|
|
|
|
Stream_Seek_UINT8(s); /* flowIdentifier */
|
|
|
|
Stream_Seek_UINT8(s); /* flowNumber */
|
|
|
|
Stream_Read_UINT16(s, *channel_id); /* pduSource */
|
2020-03-31 10:14:55 +03:00
|
|
|
return TRUE;
|
2014-11-05 22:32:46 +03:00
|
|
|
}
|
|
|
|
|
2011-09-05 22:02:52 +04:00
|
|
|
/**
|
|
|
|
* Decrypt an RDP packet.\n
|
|
|
|
* @param rdp RDP module
|
|
|
|
* @param s stream
|
|
|
|
* @param length int
|
|
|
|
*/
|
|
|
|
|
2020-03-09 23:54:34 +03:00
|
|
|
BOOL rdp_decrypt(rdpRdp* rdp, wStream* s, UINT16* pLength, UINT16 securityFlags)
|
2011-09-05 22:02:52 +04:00
|
|
|
{
|
2012-11-28 09:32:12 +04:00
|
|
|
BYTE cmac[8];
|
|
|
|
BYTE wmac[8];
|
2015-04-01 12:11:37 +03:00
|
|
|
BOOL status;
|
2020-03-09 23:54:34 +03:00
|
|
|
INT32 length;
|
2011-09-15 01:14:50 +04:00
|
|
|
|
2020-03-09 23:54:34 +03:00
|
|
|
if (!rdp || !s || !pLength)
|
2017-05-29 11:50:22 +03:00
|
|
|
return FALSE;
|
|
|
|
|
2020-03-09 23:54:34 +03:00
|
|
|
length = *pLength;
|
2012-11-08 08:29:24 +04:00
|
|
|
if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
|
2011-09-16 03:54:03 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 len;
|
|
|
|
BYTE version, pad;
|
2012-11-28 09:32:12 +04:00
|
|
|
BYTE* sig;
|
2017-05-29 11:50:22 +03:00
|
|
|
INT64 padLength;
|
2011-09-16 03:54:03 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
if (Stream_GetRemainingLength(s) < 12)
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
2013-01-17 03:01:10 +04:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Read_UINT16(s, len); /* 0x10 */
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read_UINT8(s, version); /* 0x1 */
|
|
|
|
Stream_Read_UINT8(s, pad);
|
2013-05-15 20:14:26 +04:00
|
|
|
sig = Stream_Pointer(s);
|
2019-11-06 17:24:51 +03:00
|
|
|
Stream_Seek(s, 8); /* signature */
|
2012-01-16 00:01:16 +04:00
|
|
|
length -= 12;
|
2017-05-29 11:50:22 +03:00
|
|
|
padLength = length - pad;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2017-05-29 11:50:22 +03:00
|
|
|
if ((length <= 0) || (padLength <= 0))
|
|
|
|
return FALSE;
|
2011-09-16 03:54:03 +04:00
|
|
|
|
2013-05-15 20:14:26 +04:00
|
|
|
if (!security_fips_decrypt(Stream_Pointer(s), length, rdp))
|
2011-09-16 03:54:03 +04:00
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "FATAL: cannot decrypt");
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE; /* TODO */
|
2011-09-16 03:54:03 +04:00
|
|
|
}
|
|
|
|
|
2013-05-15 20:14:26 +04:00
|
|
|
if (!security_fips_check_signature(Stream_Pointer(s), length - pad, sig, rdp))
|
2011-09-16 03:54:03 +04:00
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "FATAL: invalid packet signature");
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE; /* TODO */
|
2011-09-16 03:54:03 +04:00
|
|
|
}
|
|
|
|
|
2016-02-25 22:01:12 +03:00
|
|
|
Stream_SetLength(s, Stream_Length(s) - pad);
|
2020-03-09 23:54:34 +03:00
|
|
|
*pLength = padLength;
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-09-16 03:54:03 +04:00
|
|
|
}
|
|
|
|
|
2017-05-29 11:50:22 +03:00
|
|
|
if (Stream_GetRemainingLength(s) < sizeof(wmac))
|
2013-01-12 03:43:16 +04:00
|
|
|
return FALSE;
|
|
|
|
|
2013-05-09 00:09:16 +04:00
|
|
|
Stream_Read(s, wmac, sizeof(wmac));
|
2012-01-16 00:01:16 +04:00
|
|
|
length -= sizeof(wmac);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2017-05-29 11:50:22 +03:00
|
|
|
if (length <= 0)
|
|
|
|
return FALSE;
|
2013-05-15 20:14:26 +04:00
|
|
|
|
|
|
|
if (!security_decrypt(Stream_Pointer(s), length, rdp))
|
2013-03-05 11:08:03 +04:00
|
|
|
return FALSE;
|
2012-11-28 03:34:00 +04:00
|
|
|
|
2012-01-24 18:58:30 +04:00
|
|
|
if (securityFlags & SEC_SECURE_CHECKSUM)
|
2015-04-01 12:11:37 +03:00
|
|
|
status = security_salted_mac_signature(rdp, Stream_Pointer(s), length, FALSE, cmac);
|
2012-01-24 18:58:30 +04:00
|
|
|
else
|
2015-04-01 12:11:37 +03:00
|
|
|
status = security_mac_signature(rdp, Stream_Pointer(s), length, cmac);
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return FALSE;
|
2012-11-28 03:34:00 +04:00
|
|
|
|
2012-01-25 19:26:32 +04:00
|
|
|
if (memcmp(wmac, cmac, sizeof(wmac)) != 0)
|
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "WARNING: invalid packet signature");
|
2012-01-24 18:58:30 +04:00
|
|
|
/*
|
|
|
|
* Because Standard RDP Security is totally broken,
|
|
|
|
* and cannot protect against MITM, don't treat signature
|
|
|
|
* verification failure as critical. This at least enables
|
|
|
|
* us to work with broken RDP clients and servers that
|
|
|
|
* generate invalid signatures.
|
|
|
|
*/
|
2019-11-06 17:24:51 +03:00
|
|
|
// return FALSE;
|
2012-01-16 00:01:16 +04:00
|
|
|
}
|
2012-11-28 03:34:00 +04:00
|
|
|
|
2020-03-09 23:54:34 +03:00
|
|
|
*pLength = length;
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2011-09-05 22:02:52 +04:00
|
|
|
}
|
|
|
|
|
2020-03-05 13:18:43 +03:00
|
|
|
static const char* pdu_type_to_str(UINT16 pduType)
|
|
|
|
{
|
|
|
|
static char buffer[1024] = { 0 };
|
|
|
|
switch (pduType)
|
|
|
|
{
|
|
|
|
case PDU_TYPE_DEMAND_ACTIVE:
|
|
|
|
return "PDU_TYPE_DEMAND_ACTIVE";
|
|
|
|
case PDU_TYPE_CONFIRM_ACTIVE:
|
|
|
|
return "PDU_TYPE_CONFIRM_ACTIVE";
|
|
|
|
case PDU_TYPE_DEACTIVATE_ALL:
|
|
|
|
return "PDU_TYPE_DEACTIVATE_ALL";
|
|
|
|
case PDU_TYPE_DATA:
|
|
|
|
return "PDU_TYPE_DATA";
|
|
|
|
case PDU_TYPE_SERVER_REDIRECTION:
|
|
|
|
return "PDU_TYPE_SERVER_REDIRECTION";
|
|
|
|
case PDU_TYPE_FLOW_TEST:
|
|
|
|
return "PDU_TYPE_FLOW_TEST";
|
|
|
|
case PDU_TYPE_FLOW_RESPONSE:
|
|
|
|
return "PDU_TYPE_FLOW_RESPONSE";
|
|
|
|
case PDU_TYPE_FLOW_STOP:
|
|
|
|
return "PDU_TYPE_FLOW_STOP";
|
|
|
|
default:
|
|
|
|
_snprintf(buffer, sizeof(buffer), "UNKNOWN %04" PRIx16, pduType);
|
|
|
|
return buffer;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-12 04:46:03 +04:00
|
|
|
/**
|
2011-08-01 08:43:53 +04:00
|
|
|
* Process an RDP packet.\n
|
2011-07-12 04:46:03 +04:00
|
|
|
* @param rdp RDP module
|
2011-08-01 08:43:53 +04:00
|
|
|
* @param s stream
|
2011-07-12 04:46:03 +04:00
|
|
|
*/
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int rdp_recv_tpkt_pdu(rdpRdp* rdp, wStream* s)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
2020-02-20 10:22:19 +03:00
|
|
|
int rc = 0;
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
|
|
|
UINT16 pduType;
|
|
|
|
UINT16 pduSource;
|
2013-08-30 18:31:23 +04:00
|
|
|
UINT16 channelId = 0;
|
2016-12-02 12:46:43 +03:00
|
|
|
UINT16 securityFlags = 0;
|
2011-07-12 02:46:36 +04:00
|
|
|
|
2011-08-20 12:43:29 +04:00
|
|
|
if (!rdp_read_header(rdp, s, &length, &channelId))
|
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "Incorrect RDP header.");
|
2013-01-09 02:18:10 +04:00
|
|
|
return -1;
|
2011-07-20 00:30:05 +04:00
|
|
|
}
|
2011-08-08 07:59:28 +04:00
|
|
|
|
2015-09-05 15:57:30 +03:00
|
|
|
if (freerdp_shall_disconnect(rdp->instance))
|
2014-08-20 13:54:05 +04:00
|
|
|
return 0;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-11-07 11:18:49 +03:00
|
|
|
if (rdp->autodetect->bandwidthMeasureStarted)
|
|
|
|
{
|
|
|
|
rdp->autodetect->bandwidthMeasureByteCount += length;
|
|
|
|
}
|
|
|
|
|
Standard RDP Security Layer Levels/Method Overhaul
[MS-RDPBCGR] Section 5.3 describes the encryption level and method values for
standard RDP security.
Looking at the current usage of these values in the FreeRDP code gives me
reason to believe that there is a certain lack of understanding of how these
values should be handled.
The encryption level is only configured on the server side in the "Encryption
Level" setting found in the Remote Desktop Session Host Configuration RDP-Tcp
properties dialog and this value is never transferred from the client to the
server over the wire.
The possible options are "None", "Low", "Client Compatible", "High" and
"FIPS Compliant". The client receices this value in the Server Security Data
block (TS_UD_SC_SEC1), probably only for informational purposes and maybe to
give the client the possibility to verify if the server's decision for the
encryption method confirms to the server's encryption level.
The possible encryption methods are "NONE", "40BIT", "56BIT", "128BIT" and
"FIPS" and the RDP client advertises the ones it supports to the server in the
Client Security Data block (TS_UD_CS_SEC).
The server's configured encryption level value restricts the possible final
encryption method.
Something that I was not able to find in the documentation is the priority
level of the individual encryption methods based on which the server makes its
final method decision if there are several options.
My analysis with Windows Servers reveiled that the order is 128, 56, 40, FIPS.
The server only chooses FIPS if the level is "FIPS Comliant" or if it is the
only method advertised by the client.
Bottom line:
* FreeRDP's client side does not need to set settings->EncryptionLevel
(which was done quite frequently).
* FreeRDP's server side does not have to set the supported encryption methods
list in settings->EncryptionMethods
Changes in this commit:
Removed unnecessary/confusing changes of EncryptionLevel/Methods settings
Refactor settings->DisableEncryption
* This value actually means "Advanced RDP Encryption (NLA/TLS) is NOT used"
* The old name caused lots of confusion among developers
* Renamed it to "UseRdpSecurityLayer" (the compare logic stays untouched)
Any client's setting of settings->EncryptionMethods were annihilated
* All clients "want" to set all supported methods
* Some clients forgot 56bit because 56bit was not supported at the time the
code was written
* settings->EncryptionMethods was overwritten anyways in nego_connect()
* Removed all client side settings of settings->EncryptionMethods
The default is "None" (0)
* Changed nego_connect() to advertise all supported methods if
settings->EncryptionMethods is 0 (None)
* Added a commandline option /encryption-methods:comma separated list of the
values "40", "56", "128", "FIPS". E.g. /encryption-methods:56,128
* Print warning if server chooses non-advertised method
Verify received level and method in client's gcc_read_server_security_data
* Only accept valid/known encryption methods
* Verify encryption level/method combinations according to MS-RDPBCGR 5.3.2
Server implementations can now set settings->EncryptionLevel
* The default for settings->EncryptionLevel is 0 (None)
* nego_send_negotiation_response() changes it to ClientCompatible in that case
* default to ClientCompatible if the server implementation set an invalid level
Fix server's gcc_write_server_security_data
* Verify server encryption level value set by server implementations
* Choose rdp encryption method based on level and supported client methods
* Moved FIPS to the lowest priority (only used if other methods are possible)
Updated sample server
* Support RDP Security (RdpKeyFile was not set)
* Added commented sample code for setting the security level
2014-12-12 04:17:12 +03:00
|
|
|
if (rdp->settings->UseRdpSecurityLayer)
|
2011-09-05 22:02:52 +04:00
|
|
|
{
|
2017-05-29 11:50:22 +03:00
|
|
|
if (!rdp_read_security_header(s, &securityFlags, &length))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_recv_tpkt_pdu: rdp_read_security_header() fail");
|
2013-01-12 03:43:16 +04:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2012-11-28 09:32:12 +04:00
|
|
|
|
|
|
|
if (securityFlags & (SEC_ENCRYPT | SEC_REDIRECTION_PKT))
|
2011-09-05 22:02:52 +04:00
|
|
|
{
|
2020-03-09 23:54:34 +03:00
|
|
|
if (!rdp_decrypt(rdp, s, &length, securityFlags))
|
2011-09-05 22:02:52 +04:00
|
|
|
{
|
2015-02-15 22:54:10 +03:00
|
|
|
WLog_ERR(TAG, "rdp_decrypt failed");
|
2013-01-09 02:18:10 +04:00
|
|
|
return -1;
|
2011-09-05 22:02:52 +04:00
|
|
|
}
|
|
|
|
}
|
2012-11-28 09:32:12 +04:00
|
|
|
|
2012-01-24 18:57:06 +04:00
|
|
|
if (securityFlags & SEC_REDIRECTION_PKT)
|
2011-12-21 23:59:31 +04:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* [MS-RDPBCGR] 2.2.13.2.1
|
|
|
|
* - no share control header, nor the 2 byte pad
|
|
|
|
*/
|
2013-05-15 20:14:26 +04:00
|
|
|
Stream_Rewind(s, 2);
|
2019-10-28 14:46:18 +03:00
|
|
|
rdp->inPackets++;
|
2020-02-20 10:22:19 +03:00
|
|
|
|
|
|
|
rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
|
|
|
|
goto out;
|
2011-12-21 23:59:31 +04:00
|
|
|
}
|
2011-09-05 22:02:52 +04:00
|
|
|
}
|
|
|
|
|
2014-01-24 03:01:31 +04:00
|
|
|
if (channelId == MCS_GLOBAL_CHANNEL_ID)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
2013-04-30 06:35:15 +04:00
|
|
|
while (Stream_GetRemainingLength(s) > 3)
|
2012-03-09 05:47:01 +04:00
|
|
|
{
|
2020-04-06 12:22:18 +03:00
|
|
|
wStream sub;
|
2020-04-06 12:58:48 +03:00
|
|
|
size_t diff;
|
2020-04-06 14:01:20 +03:00
|
|
|
UINT16 remain;
|
2013-01-17 03:01:10 +04:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
if (!rdp_read_share_control_header(s, NULL, &remain, &pduType, &pduSource))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_recv_tpkt_pdu: rdp_read_share_control_header() fail");
|
2013-01-12 03:43:16 +04:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2020-04-06 12:58:48 +03:00
|
|
|
|
2020-04-06 14:01:20 +03:00
|
|
|
Stream_StaticInit(&sub, Stream_Pointer(s), remain);
|
|
|
|
if (!Stream_SafeSeek(s, remain))
|
2020-04-06 12:22:18 +03:00
|
|
|
return -1;
|
2013-01-17 03:01:10 +04:00
|
|
|
|
2012-11-08 03:23:25 +04:00
|
|
|
rdp->settings->PduSource = pduSource;
|
2019-10-28 14:46:18 +03:00
|
|
|
rdp->inPackets++;
|
2011-07-20 00:30:05 +04:00
|
|
|
|
2012-03-09 05:47:01 +04:00
|
|
|
switch (pduType)
|
|
|
|
{
|
|
|
|
case PDU_TYPE_DATA:
|
2020-04-06 12:22:18 +03:00
|
|
|
rc = rdp_recv_data_pdu(rdp, &sub);
|
2020-03-05 13:18:43 +03:00
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
2012-03-09 05:47:01 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PDU_TYPE_DEACTIVATE_ALL:
|
2020-04-06 12:22:18 +03:00
|
|
|
if (!rdp_recv_deactivate_all(rdp, &sub))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_recv_tpkt_pdu: rdp_recv_deactivate_all() fail");
|
2013-01-09 02:18:10 +04:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2012-03-09 05:47:01 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PDU_TYPE_SERVER_REDIRECTION:
|
2020-04-06 12:22:18 +03:00
|
|
|
return rdp_recv_enhanced_security_redirection_packet(rdp, &sub);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-11-05 22:32:46 +03:00
|
|
|
case PDU_TYPE_FLOW_RESPONSE:
|
|
|
|
case PDU_TYPE_FLOW_STOP:
|
|
|
|
case PDU_TYPE_FLOW_TEST:
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_DBG(TAG, "flow message 0x%04" PRIX16 "", pduType);
|
2020-03-05 13:18:43 +03:00
|
|
|
/* http://msdn.microsoft.com/en-us/library/cc240576.aspx */
|
2020-04-06 14:01:20 +03:00
|
|
|
if (!Stream_SafeSeek(&sub, remain))
|
2020-03-05 13:18:43 +03:00
|
|
|
return -1;
|
2014-11-05 22:32:46 +03:00
|
|
|
break;
|
2012-03-09 05:47:01 +04:00
|
|
|
|
|
|
|
default:
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "incorrect PDU type: 0x%04" PRIX16 "", pduType);
|
2012-03-09 05:47:01 +04:00
|
|
|
break;
|
|
|
|
}
|
2013-05-15 22:42:37 +04:00
|
|
|
|
2020-04-06 12:58:48 +03:00
|
|
|
diff = Stream_GetRemainingLength(&sub);
|
|
|
|
if (diff > 0)
|
2020-03-05 13:18:43 +03:00
|
|
|
{
|
|
|
|
WLog_WARN(TAG,
|
|
|
|
"pduType %s not properly parsed, %" PRIdz
|
|
|
|
" bytes remaining unhandled. Skipping.",
|
|
|
|
pdu_type_to_str(pduType), diff);
|
|
|
|
}
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
}
|
2020-03-05 13:18:43 +03:00
|
|
|
else if (rdp->mcs->messageChannelId && (channelId == rdp->mcs->messageChannelId))
|
2014-01-24 03:01:31 +04:00
|
|
|
{
|
2015-06-19 15:47:00 +03:00
|
|
|
if (!rdp->settings->UseRdpSecurityLayer)
|
2017-05-29 11:50:22 +03:00
|
|
|
if (!rdp_read_security_header(s, &securityFlags, NULL))
|
2015-06-19 15:47:00 +03:00
|
|
|
return -1;
|
2019-10-28 14:46:18 +03:00
|
|
|
rdp->inPackets++;
|
2020-02-20 10:22:19 +03:00
|
|
|
rc = rdp_recv_message_channel_pdu(rdp, s, securityFlags);
|
2014-01-24 03:01:31 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2019-10-28 14:46:18 +03:00
|
|
|
rdp->inPackets++;
|
|
|
|
|
2020-03-04 16:42:42 +03:00
|
|
|
if (!freerdp_channel_process(rdp->instance, s, channelId, length))
|
2014-01-24 03:01:31 +04:00
|
|
|
return -1;
|
|
|
|
}
|
2011-08-22 11:03:58 +04:00
|
|
|
|
2020-02-20 10:22:19 +03:00
|
|
|
out:
|
|
|
|
if (!tpkt_ensure_stream_consumed(s, length))
|
|
|
|
return -1;
|
|
|
|
return rc;
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int rdp_recv_fastpath_pdu(rdpRdp* rdp, wStream* s)
|
2011-08-09 12:40:58 +04:00
|
|
|
{
|
2012-10-09 11:01:37 +04:00
|
|
|
UINT16 length;
|
2011-09-27 09:30:58 +04:00
|
|
|
rdpFastPath* fastpath;
|
|
|
|
fastpath = rdp->fastpath;
|
2013-01-17 03:01:10 +04:00
|
|
|
|
2013-01-14 02:37:50 +04:00
|
|
|
if (!fastpath_read_header_rdp(fastpath, s, &length))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_recv_fastpath_pdu: fastpath_read_header_rdp() fail");
|
2013-01-14 02:37:50 +04:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2012-01-25 19:27:00 +04:00
|
|
|
|
2013-04-30 06:35:15 +04:00
|
|
|
if ((length == 0) || (length > Stream_GetRemainingLength(s)))
|
2011-08-13 12:37:03 +04:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
|
2013-01-09 02:18:10 +04:00
|
|
|
return -1;
|
2011-08-13 12:37:03 +04:00
|
|
|
}
|
2011-08-09 19:28:02 +04:00
|
|
|
|
2014-11-07 11:18:49 +03:00
|
|
|
if (rdp->autodetect->bandwidthMeasureStarted)
|
|
|
|
{
|
|
|
|
rdp->autodetect->bandwidthMeasureByteCount += length;
|
|
|
|
}
|
|
|
|
|
2011-09-27 09:30:58 +04:00
|
|
|
if (fastpath->encryptionFlags & FASTPATH_OUTPUT_ENCRYPTED)
|
2011-09-15 01:14:50 +04:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
UINT16 flags =
|
|
|
|
(fastpath->encryptionFlags & FASTPATH_OUTPUT_SECURE_CHECKSUM) ? SEC_SECURE_CHECKSUM : 0;
|
2013-01-17 03:01:10 +04:00
|
|
|
|
2020-03-09 23:54:34 +03:00
|
|
|
if (!rdp_decrypt(rdp, s, &length, flags))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2015-06-23 12:08:44 +03:00
|
|
|
WLog_ERR(TAG, "rdp_recv_fastpath_pdu: rdp_decrypt() fail");
|
2013-01-12 03:43:16 +04:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2011-09-15 01:14:50 +04:00
|
|
|
}
|
2011-08-09 12:40:58 +04:00
|
|
|
|
2011-08-23 09:05:58 +04:00
|
|
|
return fastpath_recv_updates(rdp->fastpath, s);
|
2011-08-09 12:40:58 +04:00
|
|
|
}
|
|
|
|
|
2013-03-21 23:19:33 +04:00
|
|
|
static int rdp_recv_pdu(rdpRdp* rdp, wStream* s)
|
2011-08-09 12:40:58 +04:00
|
|
|
{
|
|
|
|
if (tpkt_verify_header(s))
|
2011-08-23 08:58:10 +04:00
|
|
|
return rdp_recv_tpkt_pdu(rdp, s);
|
2011-08-09 12:40:58 +04:00
|
|
|
else
|
2011-08-23 08:58:10 +04:00
|
|
|
return rdp_recv_fastpath_pdu(rdp, s);
|
2011-08-09 12:40:58 +04:00
|
|
|
}
|
|
|
|
|
2015-02-15 22:54:10 +03:00
|
|
|
int rdp_recv_callback(rdpTransport* transport, wStream* s, void* extra)
|
2011-08-01 08:43:53 +04:00
|
|
|
{
|
2013-01-09 02:18:10 +04:00
|
|
|
int status = 0;
|
2019-11-06 17:24:51 +03:00
|
|
|
rdpRdp* rdp = (rdpRdp*)extra;
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2018-07-18 16:16:50 +03:00
|
|
|
/*
|
2014-01-30 07:53:32 +04:00
|
|
|
* At any point in the connection sequence between when all
|
|
|
|
* MCS channels have been joined and when the RDP connection
|
|
|
|
* enters the active state, an auto-detect PDU can be received
|
|
|
|
* on the MCS message channel.
|
|
|
|
*/
|
2015-02-15 22:54:10 +03:00
|
|
|
if ((rdp->state > CONNECTION_STATE_MCS_CHANNEL_JOIN) && (rdp->state < CONNECTION_STATE_ACTIVE))
|
2014-01-30 07:53:32 +04:00
|
|
|
{
|
|
|
|
if (rdp_client_connect_auto_detect(rdp, s))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
switch (rdp->state)
|
|
|
|
{
|
2015-02-16 00:04:59 +03:00
|
|
|
case CONNECTION_STATE_NLA:
|
2018-11-20 18:48:59 +03:00
|
|
|
if (nla_get_state(rdp->nla) < NLA_STATE_AUTH_INFO)
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2016-05-11 22:52:36 +03:00
|
|
|
if (nla_recv_pdu(rdp->nla, s) < 1)
|
|
|
|
{
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_ERR(TAG, "%s: %s - nla_recv_pdu() fail", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state));
|
2016-05-11 22:52:36 +03:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2018-11-20 18:48:59 +03:00
|
|
|
else if (nla_get_state(rdp->nla) == NLA_STATE_POST_NEGO)
|
2016-05-11 22:52:36 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
nego_recv(rdp->transport, s, (void*)rdp->nego);
|
2016-05-11 22:52:36 +03:00
|
|
|
|
2018-11-20 18:38:06 +03:00
|
|
|
if (nego_get_state(rdp->nego) != NEGO_STATE_FINAL)
|
2016-05-11 22:52:36 +03:00
|
|
|
{
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_ERR(TAG, "%s: %s - nego_recv() fail", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state));
|
2016-05-11 22:52:36 +03:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-11-20 18:48:59 +03:00
|
|
|
if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
|
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2015-02-16 00:04:59 +03:00
|
|
|
|
2018-11-20 18:48:59 +03:00
|
|
|
if (nla_get_state(rdp->nla) == NLA_STATE_AUTH_INFO)
|
2015-02-16 00:04:59 +03:00
|
|
|
{
|
|
|
|
transport_set_nla_mode(rdp->transport, FALSE);
|
|
|
|
|
2016-05-11 22:52:36 +03:00
|
|
|
if (rdp->settings->VmConnectMode)
|
|
|
|
{
|
2018-11-20 18:38:06 +03:00
|
|
|
if (!nego_set_state(rdp->nego, NEGO_STATE_NLA))
|
|
|
|
return -1;
|
|
|
|
|
2018-11-20 19:27:47 +03:00
|
|
|
if (!nego_set_requested_protocols(rdp->nego, PROTOCOL_HYBRID | PROTOCOL_SSL))
|
2018-11-20 18:38:06 +03:00
|
|
|
return -1;
|
|
|
|
|
2016-05-11 22:52:36 +03:00
|
|
|
nego_send_negotiation_request(rdp->nego);
|
2018-11-20 18:48:59 +03:00
|
|
|
|
|
|
|
if (!nla_set_state(rdp->nla, NLA_STATE_POST_NEGO))
|
|
|
|
return -1;
|
2016-05-11 22:52:36 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-11-20 18:48:59 +03:00
|
|
|
if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
|
|
|
|
return -1;
|
2016-05-11 22:52:36 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-20 18:48:59 +03:00
|
|
|
if (nla_get_state(rdp->nla) == NLA_STATE_FINAL)
|
2016-05-11 22:52:36 +03:00
|
|
|
{
|
2015-02-16 00:04:59 +03:00
|
|
|
nla_free(rdp->nla);
|
|
|
|
rdp->nla = NULL;
|
|
|
|
|
|
|
|
if (!mcs_client_begin(rdp->mcs))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_ERR(TAG, "%s: %s - mcs_client_begin() fail", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state));
|
2015-02-16 00:04:59 +03:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2015-02-16 00:04:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
2015-02-15 22:54:10 +03:00
|
|
|
case CONNECTION_STATE_MCS_CONNECT:
|
|
|
|
if (!mcs_recv_connect_response(rdp->mcs, s))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "mcs_recv_connect_response failure");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mcs_send_erect_domain_request(rdp->mcs))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "mcs_send_erect_domain_request failure");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mcs_send_attach_user_request(rdp->mcs))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "mcs_send_attach_user_request failure");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ATTACH_USER);
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_MCS_ATTACH_USER:
|
2015-02-15 22:54:10 +03:00
|
|
|
if (!mcs_recv_attach_user_confirm(rdp->mcs, s))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "mcs_recv_attach_user_confirm failure");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mcs_send_channel_join_request(rdp->mcs, rdp->mcs->userId))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "mcs_send_channel_join_request failure");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN);
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CONNECTION_STATE_MCS_CHANNEL_JOIN:
|
|
|
|
if (!rdp_client_connect_mcs_channel_join_confirm(rdp, s))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_ERR(TAG,
|
|
|
|
"%s: %s - "
|
|
|
|
"rdp_client_connect_mcs_channel_join_confirm() fail",
|
|
|
|
__FUNCTION__, rdp_server_connection_state_string(rdp->state));
|
2013-01-09 02:18:10 +04:00
|
|
|
status = -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_LICENSING:
|
2013-11-05 00:52:29 +04:00
|
|
|
status = rdp_client_connect_license(rdp, s);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-17 05:10:58 +03:00
|
|
|
if (status < 0)
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_DBG(TAG, "%s: %s - rdp_client_connect_license() - %i", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state), status);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
2013-07-18 23:18:59 +04:00
|
|
|
case CONNECTION_STATE_CAPABILITIES_EXCHANGE:
|
2013-11-05 00:52:29 +04:00
|
|
|
status = rdp_client_connect_demand_active(rdp, s);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-17 05:10:58 +03:00
|
|
|
if (status < 0)
|
2019-11-06 17:24:51 +03:00
|
|
|
WLog_DBG(TAG,
|
2020-02-21 11:17:00 +03:00
|
|
|
"%s: %s - "
|
2019-11-06 17:24:51 +03:00
|
|
|
"rdp_client_connect_demand_active() - %i",
|
2020-02-21 11:17:00 +03:00
|
|
|
__FUNCTION__, rdp_server_connection_state_string(rdp->state), status);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
2011-12-19 00:15:48 +04:00
|
|
|
case CONNECTION_STATE_FINALIZATION:
|
2013-01-09 02:18:10 +04:00
|
|
|
status = rdp_recv_pdu(rdp, s);
|
2013-07-19 01:15:10 +04:00
|
|
|
|
2013-01-09 02:18:10 +04:00
|
|
|
if ((status >= 0) && (rdp->finalize_sc_pdus == FINALIZE_SC_COMPLETE))
|
2014-09-12 01:04:32 +04:00
|
|
|
{
|
2017-12-19 11:38:24 +03:00
|
|
|
ActivatedEventArgs activatedEvent;
|
2018-07-18 16:16:50 +03:00
|
|
|
rdpContext* context = rdp->context;
|
2013-07-19 01:15:10 +04:00
|
|
|
rdp_client_transition_to_state(rdp, CONNECTION_STATE_ACTIVE);
|
2019-02-12 12:53:37 +03:00
|
|
|
EventArgsInit(&activatedEvent, "libfreerdp");
|
2017-12-19 11:38:24 +03:00
|
|
|
activatedEvent.firstActivation = !rdp->deactivation_reactivation;
|
|
|
|
PubSub_OnActivated(context->pubSub, context, &activatedEvent);
|
2014-09-12 01:04:32 +04:00
|
|
|
return 2;
|
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-17 05:10:58 +03:00
|
|
|
if (status < 0)
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_DBG(TAG, "%s: %s - rdp_recv_pdu() - %i", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state), status);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-12-19 00:15:48 +04:00
|
|
|
break;
|
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
case CONNECTION_STATE_ACTIVE:
|
2013-01-09 02:18:10 +04:00
|
|
|
status = rdp_recv_pdu(rdp, s);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-17 05:10:58 +03:00
|
|
|
if (status < 0)
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_DBG(TAG, "%s: %s - rdp_recv_pdu() - %i", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state), status);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2011-08-22 11:03:58 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2020-02-21 11:17:00 +03:00
|
|
|
WLog_ERR(TAG, "%s: %s state %d", __FUNCTION__,
|
|
|
|
rdp_server_connection_state_string(rdp->state), rdp->state);
|
2013-01-09 02:18:10 +04:00
|
|
|
status = -1;
|
|
|
|
break;
|
2011-08-22 11:03:58 +04:00
|
|
|
}
|
2011-08-01 08:43:53 +04:00
|
|
|
|
2013-01-09 02:18:10 +04:00
|
|
|
return status;
|
2011-08-01 08:43:53 +04:00
|
|
|
}
|
|
|
|
|
2020-03-04 16:42:42 +03:00
|
|
|
BOOL rdp_send_channel_data(rdpRdp* rdp, UINT16 channelId, const BYTE* data, size_t size)
|
2011-08-03 07:00:56 +04:00
|
|
|
{
|
2014-02-14 02:06:33 +04:00
|
|
|
return freerdp_channel_send(rdp, channelId, data, size);
|
2011-08-03 07:00:56 +04:00
|
|
|
}
|
|
|
|
|
2015-01-13 19:09:36 +03:00
|
|
|
BOOL rdp_send_error_info(rdpRdp* rdp)
|
|
|
|
{
|
|
|
|
wStream* s;
|
|
|
|
BOOL status;
|
|
|
|
|
|
|
|
if (rdp->errorInfo == ERRINFO_SUCCESS)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
s = rdp_data_pdu_init(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2016-02-12 00:45:30 +03:00
|
|
|
if (!s)
|
|
|
|
return FALSE;
|
2015-01-13 19:09:36 +03:00
|
|
|
|
|
|
|
Stream_Write_UINT32(s, rdp->errorInfo); /* error id (4 bytes) */
|
|
|
|
status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SET_ERROR_INFO, 0);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2011-08-01 08:43:53 +04:00
|
|
|
int rdp_check_fds(rdpRdp* rdp)
|
|
|
|
{
|
2013-11-01 22:13:09 +04:00
|
|
|
int status;
|
2015-02-02 19:50:56 +03:00
|
|
|
rdpTransport* transport = rdp->transport;
|
2014-04-29 00:44:52 +04:00
|
|
|
|
2015-02-02 19:50:56 +03:00
|
|
|
if (transport->tsg)
|
|
|
|
{
|
|
|
|
rdpTsg* tsg = transport->tsg;
|
|
|
|
|
2018-09-28 09:43:43 +03:00
|
|
|
if (!tsg_check_event_handles(tsg))
|
2015-05-02 06:26:08 +03:00
|
|
|
{
|
2018-09-28 09:43:43 +03:00
|
|
|
WLog_ERR(TAG, "rdp_check_fds: tsg_check_event_handles()");
|
2015-02-02 19:50:56 +03:00
|
|
|
return -1;
|
2015-03-17 05:10:58 +03:00
|
|
|
}
|
2015-02-02 19:50:56 +03:00
|
|
|
|
2018-09-28 09:43:43 +03:00
|
|
|
if (tsg_get_state(tsg) != TSG_STATE_PIPE_CREATED)
|
|
|
|
return 1;
|
2015-02-02 19:50:56 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
status = transport_check_fds(transport);
|
2014-04-29 00:44:52 +04:00
|
|
|
|
|
|
|
if (status == 1)
|
|
|
|
{
|
2019-08-12 13:33:06 +03:00
|
|
|
if (!rdp_client_redirect(rdp)) /* session redirection */
|
|
|
|
return -1;
|
2014-04-29 00:44:52 +04:00
|
|
|
}
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2015-03-17 05:10:58 +03:00
|
|
|
if (status < 0)
|
2015-03-19 02:41:29 +03:00
|
|
|
WLog_DBG(TAG, "transport_check_fds() - %i", status);
|
2014-04-29 00:44:52 +04:00
|
|
|
|
2013-11-01 22:13:09 +04:00
|
|
|
return status;
|
2011-08-01 08:43:53 +04:00
|
|
|
}
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
BOOL freerdp_get_stats(rdpRdp* rdp, UINT64* inBytes, UINT64* outBytes, UINT64* inPackets,
|
|
|
|
UINT64* outPackets)
|
2019-10-23 00:35:18 +03:00
|
|
|
{
|
|
|
|
if (!rdp)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (inBytes)
|
|
|
|
*inBytes = rdp->inBytes;
|
|
|
|
if (outBytes)
|
|
|
|
*outBytes = rdp->outBytes;
|
|
|
|
if (inPackets)
|
|
|
|
*inPackets = rdp->inPackets;
|
|
|
|
if (outPackets)
|
|
|
|
*outPackets = rdp->outPackets;
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2011-07-12 02:46:36 +04:00
|
|
|
/**
|
|
|
|
* Instantiate new RDP module.
|
|
|
|
* @return new RDP module
|
|
|
|
*/
|
|
|
|
|
2013-07-20 05:52:28 +04:00
|
|
|
rdpRdp* rdp_new(rdpContext* context)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
|
|
|
rdpRdp* rdp;
|
2013-10-13 02:20:25 +04:00
|
|
|
DWORD flags;
|
2014-04-10 23:07:53 +04:00
|
|
|
BOOL newSettings = FALSE;
|
2019-11-06 17:24:51 +03:00
|
|
|
rdp = (rdpRdp*)calloc(1, sizeof(rdpRdp));
|
2014-12-15 18:23:06 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp)
|
|
|
|
return NULL;
|
2011-07-12 02:46:36 +04:00
|
|
|
|
2020-05-11 09:50:15 +03:00
|
|
|
InitializeCriticalSection(&rdp->critical);
|
2014-04-10 23:07:53 +04:00
|
|
|
rdp->context = context;
|
|
|
|
rdp->instance = context->instance;
|
|
|
|
flags = 0;
|
2013-10-13 02:20:25 +04:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (context->ServerMode)
|
|
|
|
flags |= FREERDP_SETTINGS_SERVER_MODE;
|
2013-10-13 02:20:25 +04:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!context->settings)
|
|
|
|
{
|
|
|
|
context->settings = freerdp_settings_new(flags);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2013-10-13 06:58:09 +04:00
|
|
|
if (!context->settings)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
newSettings = TRUE;
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
rdp->settings = context->settings;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (context->instance)
|
2015-05-21 17:54:19 +03:00
|
|
|
{
|
|
|
|
rdp->settings->instance = context->instance;
|
2014-04-10 23:07:53 +04:00
|
|
|
context->instance->settings = rdp->settings;
|
2015-05-21 17:54:19 +03:00
|
|
|
}
|
|
|
|
else if (context->peer)
|
|
|
|
{
|
|
|
|
rdp->settings->instance = context->peer;
|
|
|
|
context->peer->settings = rdp->settings;
|
|
|
|
}
|
2014-04-10 23:07:53 +04:00
|
|
|
|
2014-12-15 18:23:06 +03:00
|
|
|
rdp->transport = transport_new(context);
|
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->transport)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->license = license_new(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->license)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->input = input_new(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->input)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->update = update_new(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->update)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->fastpath = fastpath_new(rdp);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->fastpath)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->nego = nego_new(rdp->transport);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->nego)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->mcs = mcs_new(rdp->transport);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->mcs)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->redirection = redirection_new();
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->redirection)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->autodetect = autodetect_new();
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->autodetect)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->heartbeat = heartbeat_new();
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->heartbeat)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->multitransport = multitransport_new();
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->multitransport)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
|
|
|
rdp->bulk = bulk_new(context);
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2014-04-10 23:07:53 +04:00
|
|
|
if (!rdp->bulk)
|
2020-05-11 09:50:15 +03:00
|
|
|
goto fail;
|
2014-04-10 23:07:53 +04:00
|
|
|
|
2011-07-12 02:46:36 +04:00
|
|
|
return rdp;
|
2018-07-18 16:16:50 +03:00
|
|
|
|
2020-05-11 09:50:15 +03:00
|
|
|
fail:
|
|
|
|
rdp_free(rdp);
|
2014-04-10 23:07:53 +04:00
|
|
|
return NULL;
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
|
2013-11-04 01:25:56 +04:00
|
|
|
void rdp_reset(rdpRdp* rdp)
|
|
|
|
{
|
2014-12-15 18:23:06 +03:00
|
|
|
rdpContext* context;
|
2013-11-04 01:25:56 +04:00
|
|
|
rdpSettings* settings;
|
2014-12-15 18:23:06 +03:00
|
|
|
context = rdp->context;
|
2013-11-04 01:25:56 +04:00
|
|
|
settings = rdp->settings;
|
2014-03-10 19:41:10 +04:00
|
|
|
bulk_reset(rdp->bulk);
|
|
|
|
|
2015-02-06 22:21:26 +03:00
|
|
|
if (rdp->rc4_decrypt_key)
|
|
|
|
{
|
2016-02-28 13:12:17 +03:00
|
|
|
winpr_RC4_Free(rdp->rc4_decrypt_key);
|
2015-02-06 22:21:26 +03:00
|
|
|
rdp->rc4_decrypt_key = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdp->rc4_encrypt_key)
|
|
|
|
{
|
2016-02-28 13:12:17 +03:00
|
|
|
winpr_RC4_Free(rdp->rc4_encrypt_key);
|
2015-02-06 22:21:26 +03:00
|
|
|
rdp->rc4_encrypt_key = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdp->fips_encrypt)
|
|
|
|
{
|
2016-02-28 01:28:49 +03:00
|
|
|
winpr_Cipher_Free(rdp->fips_encrypt);
|
2015-02-06 22:21:26 +03:00
|
|
|
rdp->fips_encrypt = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdp->fips_decrypt)
|
|
|
|
{
|
2016-02-28 01:28:49 +03:00
|
|
|
winpr_Cipher_Free(rdp->fips_decrypt);
|
2015-02-06 22:21:26 +03:00
|
|
|
rdp->fips_decrypt = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (settings->ServerRandom)
|
|
|
|
{
|
|
|
|
free(settings->ServerRandom);
|
|
|
|
settings->ServerRandom = NULL;
|
|
|
|
settings->ServerRandomLength = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (settings->ServerCertificate)
|
|
|
|
{
|
|
|
|
free(settings->ServerCertificate);
|
|
|
|
settings->ServerCertificate = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (settings->ClientAddress)
|
|
|
|
{
|
|
|
|
free(settings->ClientAddress);
|
|
|
|
settings->ClientAddress = NULL;
|
|
|
|
}
|
2013-11-04 01:25:56 +04:00
|
|
|
|
|
|
|
mcs_free(rdp->mcs);
|
|
|
|
nego_free(rdp->nego);
|
|
|
|
license_free(rdp->license);
|
|
|
|
transport_free(rdp->transport);
|
2019-10-02 11:21:48 +03:00
|
|
|
fastpath_free(rdp->fastpath);
|
2014-12-15 18:23:06 +03:00
|
|
|
rdp->transport = transport_new(context);
|
2013-11-04 01:25:56 +04:00
|
|
|
rdp->license = license_new(rdp);
|
|
|
|
rdp->nego = nego_new(rdp->transport);
|
|
|
|
rdp->mcs = mcs_new(rdp->transport);
|
2019-10-02 11:21:48 +03:00
|
|
|
rdp->fastpath = fastpath_new(rdp);
|
2013-11-04 01:25:56 +04:00
|
|
|
rdp->transport->layer = TRANSPORT_LAYER_TCP;
|
2015-01-12 15:47:04 +03:00
|
|
|
rdp->errorInfo = 0;
|
|
|
|
rdp->deactivation_reactivation = 0;
|
|
|
|
rdp->finalize_sc_pdus = 0;
|
2013-11-04 01:25:56 +04:00
|
|
|
}
|
|
|
|
|
2011-07-12 02:46:36 +04:00
|
|
|
/**
|
|
|
|
* Free RDP module.
|
2011-07-12 04:46:03 +04:00
|
|
|
* @param rdp RDP module to be freed
|
2011-07-12 02:46:36 +04:00
|
|
|
*/
|
|
|
|
|
|
|
|
void rdp_free(rdpRdp* rdp)
|
|
|
|
{
|
2013-11-01 22:13:09 +04:00
|
|
|
if (rdp)
|
2011-07-12 02:46:36 +04:00
|
|
|
{
|
2020-05-11 09:50:15 +03:00
|
|
|
DeleteCriticalSection(&rdp->critical);
|
2016-02-28 13:12:17 +03:00
|
|
|
winpr_RC4_Free(rdp->rc4_decrypt_key);
|
|
|
|
winpr_RC4_Free(rdp->rc4_encrypt_key);
|
2016-02-28 01:28:49 +03:00
|
|
|
winpr_Cipher_Free(rdp->fips_encrypt);
|
|
|
|
winpr_Cipher_Free(rdp->fips_decrypt);
|
2012-11-09 04:01:52 +04:00
|
|
|
freerdp_settings_free(rdp->settings);
|
2011-07-12 04:46:03 +04:00
|
|
|
transport_free(rdp->transport);
|
|
|
|
license_free(rdp->license);
|
2011-07-28 08:38:25 +04:00
|
|
|
input_free(rdp->input);
|
2011-07-27 02:32:14 +04:00
|
|
|
update_free(rdp->update);
|
2011-08-09 19:28:02 +04:00
|
|
|
fastpath_free(rdp->fastpath);
|
2011-08-25 09:45:43 +04:00
|
|
|
nego_free(rdp->nego);
|
2011-07-12 04:46:03 +04:00
|
|
|
mcs_free(rdp->mcs);
|
2015-02-16 00:04:59 +03:00
|
|
|
nla_free(rdp->nla);
|
2011-09-04 00:36:27 +04:00
|
|
|
redirection_free(rdp->redirection);
|
2014-01-24 03:01:31 +04:00
|
|
|
autodetect_free(rdp->autodetect);
|
2014-01-24 17:38:28 +04:00
|
|
|
heartbeat_free(rdp->heartbeat);
|
2014-01-24 03:01:31 +04:00
|
|
|
multitransport_free(rdp->multitransport);
|
2014-03-10 19:41:10 +04:00
|
|
|
bulk_free(rdp->bulk);
|
2012-10-09 07:21:26 +04:00
|
|
|
free(rdp);
|
2011-07-12 02:46:36 +04:00
|
|
|
}
|
|
|
|
}
|