2012-03-26 10:45:01 +04:00
|
|
|
/**
|
2012-10-09 07:02:04 +04:00
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
2012-03-26 20:20:38 +04:00
|
|
|
* Terminal Server Gateway (TSG)
|
2012-03-26 10:45:01 +04:00
|
|
|
*
|
2012-03-26 20:20:38 +04:00
|
|
|
* Copyright 2012 Fujitsu Technology Solutions GmbH
|
|
|
|
* Copyright 2012 Dmitrij Jasnov <dmitrij.jasnov@ts.fujitsu.com>
|
2012-03-26 10:45:01 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2012-08-15 01:09:01 +04:00
|
|
|
#ifdef HAVE_CONFIG_H
|
2012-03-26 10:45:01 +04:00
|
|
|
#include "config.h"
|
2012-08-15 01:09:01 +04:00
|
|
|
#endif
|
2012-03-26 20:20:38 +04:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
#include <winpr/crt.h>
|
2012-05-05 02:32:34 +04:00
|
|
|
#include <winpr/ndr.h>
|
2012-11-12 02:23:57 +04:00
|
|
|
#include <winpr/error.h>
|
2012-12-14 05:23:37 +04:00
|
|
|
#include <winpr/print.h>
|
|
|
|
#include <winpr/stream.h>
|
2015-02-01 23:58:32 +03:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
#include <freerdp/log.h>
|
2015-02-01 23:58:32 +03:00
|
|
|
|
|
|
|
#include "rpc_bind.h"
|
2012-11-29 07:03:18 +04:00
|
|
|
#include "rpc_client.h"
|
2012-03-26 10:45:01 +04:00
|
|
|
#include "tsg.h"
|
|
|
|
|
2014-09-12 16:36:29 +04:00
|
|
|
#define TAG FREERDP_TAG("core.gateway.tsg")
|
2014-05-21 19:32:14 +04:00
|
|
|
|
2012-04-01 10:11:07 +04:00
|
|
|
/**
|
|
|
|
* RPC Functions: http://msdn.microsoft.com/en-us/library/windows/desktop/aa378623/
|
|
|
|
* Remote Procedure Call: http://msdn.microsoft.com/en-us/library/windows/desktop/aa378651/
|
|
|
|
* RPC NDR Interface Reference: http://msdn.microsoft.com/en-us/library/windows/desktop/hh802752/
|
|
|
|
*/
|
|
|
|
|
2012-10-09 11:26:39 +04:00
|
|
|
DWORD TsProxySendToServer(handle_t IDL_handle, byte pRpcMessage[], UINT32 count, UINT32* lengths)
|
2012-04-01 05:32:13 +04:00
|
|
|
{
|
2012-12-14 05:23:37 +04:00
|
|
|
wStream* s;
|
2012-04-24 04:13:06 +04:00
|
|
|
int status;
|
|
|
|
rdpTsg* tsg;
|
2012-12-14 05:23:37 +04:00
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
2012-10-31 11:43:21 +04:00
|
|
|
byte* buffer1 = NULL;
|
|
|
|
byte* buffer2 = NULL;
|
|
|
|
byte* buffer3 = NULL;
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 buffer1Length;
|
|
|
|
UINT32 buffer2Length;
|
|
|
|
UINT32 buffer3Length;
|
|
|
|
UINT32 numBuffers = 0;
|
|
|
|
UINT32 totalDataBytes = 0;
|
2015-02-01 23:58:32 +03:00
|
|
|
|
2012-04-24 04:13:06 +04:00
|
|
|
tsg = (rdpTsg*) IDL_handle;
|
|
|
|
buffer1Length = buffer2Length = buffer3Length = 0;
|
|
|
|
|
|
|
|
if (count > 0)
|
|
|
|
{
|
|
|
|
numBuffers++;
|
|
|
|
buffer1 = &pRpcMessage[0];
|
|
|
|
buffer1Length = lengths[0];
|
|
|
|
totalDataBytes += lengths[0] + 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count > 1)
|
|
|
|
{
|
|
|
|
numBuffers++;
|
|
|
|
buffer2 = &pRpcMessage[1];
|
|
|
|
buffer2Length = lengths[1];
|
|
|
|
totalDataBytes += lengths[1] + 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count > 2)
|
|
|
|
{
|
|
|
|
numBuffers++;
|
|
|
|
buffer3 = &pRpcMessage[2];
|
|
|
|
buffer3Length = lengths[2];
|
|
|
|
totalDataBytes += lengths[2] + 4;
|
|
|
|
}
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
length = 28 + totalDataBytes;
|
2014-05-21 19:32:14 +04:00
|
|
|
buffer = (BYTE*) calloc(1, length);
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!buffer)
|
|
|
|
return -1;
|
2012-12-14 05:23:37 +04:00
|
|
|
|
|
|
|
s = Stream_New(buffer, length);
|
2012-04-24 04:13:06 +04:00
|
|
|
/* PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE_NR (20 bytes) */
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write(s, &tsg->ChannelContext.ContextType, 4); /* ContextType (4 bytes) */
|
|
|
|
Stream_Write(s, tsg->ChannelContext.ContextUuid, 16); /* ContextUuid (16 bytes) */
|
|
|
|
Stream_Write_UINT32_BE(s, totalDataBytes); /* totalDataBytes (4 bytes) */
|
|
|
|
Stream_Write_UINT32_BE(s, numBuffers); /* numBuffers (4 bytes) */
|
2012-04-24 04:13:06 +04:00
|
|
|
|
|
|
|
if (buffer1Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write_UINT32_BE(s, buffer1Length); /* buffer1Length (4 bytes) */
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2012-04-24 04:13:06 +04:00
|
|
|
if (buffer2Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write_UINT32_BE(s, buffer2Length); /* buffer2Length (4 bytes) */
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2012-04-24 04:13:06 +04:00
|
|
|
if (buffer3Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write_UINT32_BE(s, buffer3Length); /* buffer3Length (4 bytes) */
|
2012-04-24 04:13:06 +04:00
|
|
|
|
|
|
|
if (buffer1Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write(s, buffer1, buffer1Length); /* buffer1 (variable) */
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2012-04-24 04:13:06 +04:00
|
|
|
if (buffer2Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write(s, buffer2, buffer2Length); /* buffer2 (variable) */
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2012-04-24 04:13:06 +04:00
|
|
|
if (buffer3Length > 0)
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Write(s, buffer3, buffer3Length); /* buffer3 (variable) */
|
2012-04-24 04:13:06 +04:00
|
|
|
|
2015-02-12 22:08:38 +03:00
|
|
|
Stream_SealLength(s);
|
|
|
|
status = rpc_client_write_call(tsg->rpc, Stream_Buffer(s), Stream_Length(s), TsProxySendToServerOpnum);
|
2012-12-14 05:23:37 +04:00
|
|
|
Stream_Free(s, TRUE);
|
2012-04-24 04:13:06 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "rpc_write failed!");
|
2012-04-24 04:13:06 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return length;
|
2012-04-01 05:32:13 +04:00
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxyCreateTunnelWriteRequest(rdpTsg* tsg)
|
2012-03-26 10:45:01 +04:00
|
|
|
{
|
2012-10-30 04:54:49 +04:00
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
2012-10-09 11:26:39 +04:00
|
|
|
UINT32 length;
|
2012-10-31 11:43:21 +04:00
|
|
|
UINT32 NapCapabilities;
|
2012-04-19 19:29:53 +04:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 11:43:21 +04:00
|
|
|
length = 108;
|
2012-10-30 04:54:49 +04:00
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-10-31 11:43:21 +04:00
|
|
|
*((UINT32*) &buffer[0]) = TSG_PACKET_TYPE_VERSIONCAPS; /* PacketId */
|
|
|
|
*((UINT32*) &buffer[4]) = TSG_PACKET_TYPE_VERSIONCAPS; /* SwitchValue */
|
|
|
|
*((UINT32*) &buffer[8]) = 0x00020000; /* PacketVersionCapsPtr */
|
|
|
|
*((UINT16*) &buffer[12]) = TS_GATEWAY_TRANSPORT; /* ComponentId */
|
|
|
|
*((UINT16*) &buffer[14]) = TSG_PACKET_TYPE_VERSIONCAPS; /* PacketId */
|
|
|
|
*((UINT32*) &buffer[16]) = 0x00020004; /* TsgCapsPtr */
|
|
|
|
*((UINT32*) &buffer[20]) = 0x00000001; /* NumCapabilities */
|
|
|
|
*((UINT16*) &buffer[24]) = 0x0001; /* MajorVersion */
|
|
|
|
*((UINT16*) &buffer[26]) = 0x0001; /* MinorVersion */
|
|
|
|
*((UINT16*) &buffer[28]) = 0x0000; /* QuarantineCapabilities */
|
|
|
|
/* 4-byte alignment (30 + 2) */
|
|
|
|
*((UINT16*) &buffer[30]) = 0x0000; /* 2-byte pad */
|
|
|
|
*((UINT32*) &buffer[32]) = 0x00000001; /* MaxCount */
|
|
|
|
*((UINT32*) &buffer[36]) = TSG_CAPABILITY_TYPE_NAP; /* CapabilityType */
|
|
|
|
*((UINT32*) &buffer[40]) = TSG_CAPABILITY_TYPE_NAP; /* SwitchValue */
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 11:43:21 +04:00
|
|
|
NapCapabilities =
|
2014-08-19 20:26:39 +04:00
|
|
|
TSG_NAP_CAPABILITY_QUAR_SOH |
|
|
|
|
TSG_NAP_CAPABILITY_IDLE_TIMEOUT |
|
|
|
|
TSG_MESSAGING_CAP_CONSENT_SIGN |
|
|
|
|
TSG_MESSAGING_CAP_SERVICE_MSG |
|
|
|
|
TSG_MESSAGING_CAP_REAUTH;
|
2012-11-09 11:31:22 +04:00
|
|
|
/*
|
2012-12-13 05:02:56 +04:00
|
|
|
* Alternate Code Path
|
2012-11-09 11:31:22 +04:00
|
|
|
*
|
2012-11-09 12:04:47 +04:00
|
|
|
* Using reduced capabilities appears to trigger
|
2012-11-09 11:31:22 +04:00
|
|
|
* TSG_PACKET_TYPE_QUARENC_RESPONSE instead of TSG_PACKET_TYPE_CAPS_RESPONSE
|
2013-01-09 21:05:34 +04:00
|
|
|
*
|
|
|
|
* However, reduced capabilities may break connectivity with servers enforcing features, such as
|
|
|
|
* "Only allow connections from Remote Desktop Services clients that support RD Gateway messaging"
|
2012-11-09 11:31:22 +04:00
|
|
|
*/
|
2015-01-15 00:49:21 +03:00
|
|
|
|
2012-10-31 11:43:21 +04:00
|
|
|
*((UINT32*) &buffer[44]) = NapCapabilities; /* capabilities */
|
2015-02-01 23:58:32 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* The following 60-byte structure is apparently undocumented,
|
|
|
|
* but parts of it can be matched to known C706 data structures.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* 8-byte constant (8A E3 13 71 02 F4 36 71) also observed here:
|
|
|
|
* http://lists.samba.org/archive/cifs-protocol/2010-July/001543.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
buffer[48] = 0x8A;
|
|
|
|
buffer[49] = 0xE3;
|
|
|
|
buffer[50] = 0x13;
|
|
|
|
buffer[51] = 0x71;
|
|
|
|
buffer[52] = 0x02;
|
|
|
|
buffer[53] = 0xF4;
|
|
|
|
buffer[54] = 0x36;
|
|
|
|
buffer[55] = 0x71;
|
|
|
|
|
|
|
|
*((UINT32*) &buffer[56]) = 0x00040001; /* 1.4 (version?) */
|
|
|
|
*((UINT32*) &buffer[60]) = 0x00000001; /* 1 (element count?) */
|
|
|
|
|
|
|
|
/* p_cont_list_t */
|
|
|
|
|
|
|
|
buffer[64] = 2; /* ncontext_elem */
|
|
|
|
buffer[65] = 0x40; /* reserved1 */
|
|
|
|
*((UINT16*) &buffer[66]) = 0x0028; /* reserved2 */
|
|
|
|
|
|
|
|
/* p_syntax_id_t */
|
|
|
|
|
|
|
|
CopyMemory(&buffer[68], &TSGU_UUID, sizeof(p_uuid_t));
|
|
|
|
*((UINT32*) &buffer[84]) = TSGU_SYNTAX_IF_VERSION;
|
|
|
|
|
|
|
|
/* p_syntax_id_t */
|
|
|
|
|
|
|
|
CopyMemory(&buffer[88], &NDR_UUID, sizeof(p_uuid_t));
|
|
|
|
*((UINT32*) &buffer[104]) = NDR_SYNTAX_IF_VERSION;
|
|
|
|
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyCreateTunnelOpnum);
|
2012-03-26 10:45:01 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
free(buffer);
|
2015-02-02 02:50:21 +03:00
|
|
|
|
2012-11-09 08:45:29 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyCreateTunnelReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 count;
|
|
|
|
UINT32 length;
|
|
|
|
UINT32 offset;
|
|
|
|
UINT32 Pointer;
|
|
|
|
PTSG_PACKET packet;
|
|
|
|
UINT32 SwitchValue;
|
2013-11-01 18:24:19 +04:00
|
|
|
UINT32 MessageSwitchValue = 0;
|
2013-10-18 00:51:04 +04:00
|
|
|
UINT32 IsMessagePresent;
|
|
|
|
UINT32 MsgBytes;
|
2012-11-09 08:45:29 +04:00
|
|
|
PTSG_PACKET_CAPABILITIES tsgCaps;
|
|
|
|
PTSG_PACKET_VERSIONCAPS versionCaps;
|
|
|
|
PTSG_PACKET_CAPS_RESPONSE packetCapsResponse;
|
2012-11-09 12:04:47 +04:00
|
|
|
PTSG_PACKET_QUARENC_RESPONSE packetQuarEncResponse;
|
2012-11-09 08:45:29 +04:00
|
|
|
|
2012-11-29 06:25:01 +04:00
|
|
|
if (!pdu)
|
2012-11-09 08:45:29 +04:00
|
|
|
return FALSE;
|
|
|
|
|
2012-12-13 00:55:42 +04:00
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
2012-11-09 08:45:29 +04:00
|
|
|
|
2012-12-08 02:41:12 +04:00
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
packet = (PTSG_PACKET) calloc(1, sizeof(TSG_PACKET));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!packet)
|
|
|
|
return FALSE;
|
2012-11-09 08:45:29 +04:00
|
|
|
|
2013-10-18 00:51:04 +04:00
|
|
|
offset = 4; // Skip Packet Pointer
|
2012-11-27 12:04:25 +04:00
|
|
|
packet->packetId = *((UINT32*) &buffer[offset]); /* PacketId */
|
|
|
|
SwitchValue = *((UINT32*) &buffer[offset + 4]); /* SwitchValue */
|
2012-11-09 08:45:29 +04:00
|
|
|
|
2012-11-09 12:04:47 +04:00
|
|
|
if ((packet->packetId == TSG_PACKET_TYPE_CAPS_RESPONSE) && (SwitchValue == TSG_PACKET_TYPE_CAPS_RESPONSE))
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
2014-05-21 19:32:14 +04:00
|
|
|
packetCapsResponse = (PTSG_PACKET_CAPS_RESPONSE) calloc(1, sizeof(TSG_PACKET_CAPS_RESPONSE));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
if (!packetCapsResponse)
|
2014-11-17 03:00:55 +03:00
|
|
|
{
|
|
|
|
free(packet);
|
2014-05-21 19:32:14 +04:00
|
|
|
return FALSE;
|
2014-11-17 03:00:55 +03:00
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packet->tsgPacket.packetCapsResponse = packetCapsResponse;
|
2012-11-09 12:04:47 +04:00
|
|
|
/* PacketQuarResponsePtr (4 bytes) */
|
2012-11-27 12:04:25 +04:00
|
|
|
packetCapsResponse->pktQuarEncResponse.flags = *((UINT32*) &buffer[offset + 12]); /* Flags */
|
|
|
|
packetCapsResponse->pktQuarEncResponse.certChainLen = *((UINT32*) &buffer[offset + 16]); /* CertChainLength */
|
2012-11-09 12:04:47 +04:00
|
|
|
/* CertChainDataPtr (4 bytes) */
|
2012-11-27 12:04:25 +04:00
|
|
|
CopyMemory(&packetCapsResponse->pktQuarEncResponse.nonce, &buffer[offset + 24], 16); /* Nonce */
|
|
|
|
offset += 40;
|
2013-10-18 00:51:04 +04:00
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* VersionCapsPtr */
|
2012-11-09 12:04:47 +04:00
|
|
|
offset += 4;
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
if ((Pointer == 0x0002000C) || (Pointer == 0x00020008))
|
2012-11-09 12:04:47 +04:00
|
|
|
{
|
2013-10-18 00:51:04 +04:00
|
|
|
offset += 4; /* MsgID */
|
|
|
|
offset += 4; /* MsgType */
|
|
|
|
IsMessagePresent = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
|
|
|
MessageSwitchValue = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
2012-11-09 12:04:47 +04:00
|
|
|
}
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
if (packetCapsResponse->pktQuarEncResponse.certChainLen > 0)
|
2012-11-17 03:30:53 +04:00
|
|
|
{
|
2013-10-18 00:51:04 +04:00
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* MsgPtr (4 bytes): 0x00020014 */
|
2012-11-17 03:30:53 +04:00
|
|
|
offset += 4;
|
|
|
|
offset += 4; /* MaxCount (4 bytes) */
|
|
|
|
offset += 4; /* Offset (4 bytes) */
|
|
|
|
count = *((UINT32*) &buffer[offset]); /* ActualCount (4 bytes) */
|
|
|
|
offset += 4;
|
|
|
|
/*
|
|
|
|
* CertChainData is a wide character string, and the count is
|
|
|
|
* given in characters excluding the null terminator, therefore:
|
2012-12-14 05:23:37 +04:00
|
|
|
* size = (count * 2)
|
2012-11-17 03:30:53 +04:00
|
|
|
*/
|
2012-11-27 13:05:41 +04:00
|
|
|
offset += (count * 2); /* CertChainData */
|
|
|
|
/* 4-byte alignment */
|
|
|
|
rpc_offset_align(&offset, 4);
|
2012-11-17 03:30:53 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* Ptr (4 bytes) */
|
|
|
|
offset += 4;
|
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
versionCaps = (PTSG_PACKET_VERSIONCAPS) calloc(1, sizeof(TSG_PACKET_VERSIONCAPS));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
if (!versionCaps)
|
2014-11-17 03:00:55 +03:00
|
|
|
{
|
|
|
|
free(packetCapsResponse);
|
|
|
|
free(packet);
|
2014-05-21 19:32:14 +04:00
|
|
|
return FALSE;
|
2014-11-17 03:00:55 +03:00
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packetCapsResponse->pktQuarEncResponse.versionCaps = versionCaps;
|
2012-11-09 12:04:47 +04:00
|
|
|
versionCaps->tsgHeader.ComponentId = *((UINT16*) &buffer[offset]); /* ComponentId */
|
|
|
|
versionCaps->tsgHeader.PacketId = *((UINT16*) &buffer[offset + 2]); /* PacketId */
|
|
|
|
offset += 4;
|
|
|
|
|
|
|
|
if (versionCaps->tsgHeader.ComponentId != TS_GATEWAY_TRANSPORT)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected ComponentId: 0x%04X, Expected TS_GATEWAY_TRANSPORT",
|
2014-09-12 16:36:29 +04:00
|
|
|
versionCaps->tsgHeader.ComponentId);
|
2013-08-30 16:19:50 +04:00
|
|
|
free(packetCapsResponse);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packet);
|
2012-11-09 12:04:47 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* TsgCapsPtr */
|
|
|
|
versionCaps->numCapabilities = *((UINT32*) &buffer[offset + 4]); /* NumCapabilities */
|
|
|
|
versionCaps->majorVersion = *((UINT16*) &buffer[offset + 8]); /* MajorVersion */
|
2013-10-18 00:51:04 +04:00
|
|
|
versionCaps->minorVersion = *((UINT16*) &buffer[offset + 10]); /* MinorVersion */
|
2012-11-09 12:04:47 +04:00
|
|
|
versionCaps->quarantineCapabilities = *((UINT16*) &buffer[offset + 12]); /* QuarantineCapabilities */
|
|
|
|
offset += 14;
|
|
|
|
/* 4-byte alignment */
|
|
|
|
rpc_offset_align(&offset, 4);
|
2014-05-21 19:32:14 +04:00
|
|
|
tsgCaps = (PTSG_PACKET_CAPABILITIES) calloc(1, sizeof(TSG_PACKET_CAPABILITIES));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!tsgCaps)
|
2014-11-17 03:00:55 +03:00
|
|
|
{
|
|
|
|
free(packetCapsResponse);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packet);
|
2014-05-21 19:32:14 +04:00
|
|
|
return FALSE;
|
2014-11-17 03:00:55 +03:00
|
|
|
}
|
2014-05-21 19:32:14 +04:00
|
|
|
|
2012-11-09 12:04:47 +04:00
|
|
|
versionCaps->tsgCaps = tsgCaps;
|
|
|
|
offset += 4; /* MaxCount (4 bytes) */
|
|
|
|
tsgCaps->capabilityType = *((UINT32*) &buffer[offset]); /* CapabilityType */
|
|
|
|
SwitchValue = *((UINT32*) &buffer[offset + 4]); /* SwitchValue */
|
|
|
|
offset += 8;
|
|
|
|
|
2013-02-02 02:52:19 +04:00
|
|
|
if ((SwitchValue != TSG_CAPABILITY_TYPE_NAP) || (tsgCaps->capabilityType != TSG_CAPABILITY_TYPE_NAP))
|
2012-11-09 12:04:47 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected CapabilityType: 0x%08X, Expected TSG_CAPABILITY_TYPE_NAP",
|
2014-09-12 16:36:29 +04:00
|
|
|
tsgCaps->capabilityType);
|
2013-08-28 18:29:12 +04:00
|
|
|
free(tsgCaps);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packetCapsResponse);
|
2013-08-30 16:19:50 +04:00
|
|
|
free(packet);
|
2012-11-09 12:04:47 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
tsgCaps->tsgPacket.tsgCapNap.capabilities = *((UINT32*) &buffer[offset]); /* Capabilities */
|
|
|
|
offset += 4;
|
|
|
|
|
2013-11-01 18:24:19 +04:00
|
|
|
switch (MessageSwitchValue)
|
2013-10-18 00:51:04 +04:00
|
|
|
{
|
|
|
|
case TSG_ASYNC_MESSAGE_CONSENT_MESSAGE:
|
|
|
|
case TSG_ASYNC_MESSAGE_SERVICE_MESSAGE:
|
|
|
|
offset += 4; // IsDisplayMandatory
|
|
|
|
offset += 4; // IsConsent Mandatory
|
|
|
|
MsgBytes = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
2013-11-01 05:12:06 +04:00
|
|
|
|
|
|
|
if (Pointer)
|
|
|
|
{
|
2013-10-18 00:51:04 +04:00
|
|
|
offset += 4; // MaxCount
|
|
|
|
offset += 8; // UnicodeString Offset, Length
|
|
|
|
}
|
2013-11-01 05:12:06 +04:00
|
|
|
|
|
|
|
if (MsgBytes > TSG_MESSAGING_MAX_MESSAGE_LENGTH)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Out of Spec Message Length %d", MsgBytes);
|
2014-04-26 09:44:28 +04:00
|
|
|
free(tsgCaps);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packetCapsResponse);
|
|
|
|
free(packet);
|
2013-10-18 00:51:04 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2013-10-18 00:51:04 +04:00
|
|
|
offset += MsgBytes;
|
|
|
|
break;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2013-10-18 00:51:04 +04:00
|
|
|
case TSG_ASYNC_MESSAGE_REAUTH:
|
|
|
|
rpc_offset_align(&offset, 8);
|
|
|
|
offset += 8; // UINT64 TunnelContext, not to be confused with
|
2014-08-19 20:26:39 +04:00
|
|
|
// the ContextHandle TunnelContext below.
|
2013-10-18 00:51:04 +04:00
|
|
|
break;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2013-10-18 00:51:04 +04:00
|
|
|
default:
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected Message Type: 0x%X", (int) MessageSwitchValue);
|
2014-04-26 08:05:52 +04:00
|
|
|
free(tsgCaps);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packetCapsResponse);
|
|
|
|
free(packet);
|
2013-10-18 00:51:04 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc_offset_align(&offset, 4);
|
2012-11-09 21:52:34 +04:00
|
|
|
/* TunnelContext (20 bytes) */
|
|
|
|
CopyMemory(&tsg->TunnelContext.ContextType, &buffer[offset], 4); /* ContextType */
|
|
|
|
CopyMemory(tsg->TunnelContext.ContextUuid, &buffer[offset + 4], 16); /* ContextUuid */
|
|
|
|
offset += 20;
|
2013-10-18 00:51:04 +04:00
|
|
|
// UINT32 TunnelId
|
|
|
|
// HRESULT ReturnValue
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-11-09 12:04:47 +04:00
|
|
|
free(tsgCaps);
|
|
|
|
free(versionCaps);
|
|
|
|
free(packetCapsResponse);
|
|
|
|
}
|
|
|
|
else if ((packet->packetId == TSG_PACKET_TYPE_QUARENC_RESPONSE) && (SwitchValue == TSG_PACKET_TYPE_QUARENC_RESPONSE))
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
2014-05-21 19:32:14 +04:00
|
|
|
packetQuarEncResponse = (PTSG_PACKET_QUARENC_RESPONSE) calloc(1, sizeof(TSG_PACKET_QUARENC_RESPONSE));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
if (!packetQuarEncResponse)
|
2014-11-17 03:08:38 +03:00
|
|
|
{
|
|
|
|
free(packet);
|
2014-05-21 19:32:14 +04:00
|
|
|
return FALSE;
|
2014-11-17 03:08:38 +03:00
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packet->tsgPacket.packetQuarEncResponse = packetQuarEncResponse;
|
2012-11-09 12:04:47 +04:00
|
|
|
/* PacketQuarResponsePtr (4 bytes) */
|
2012-11-27 12:04:25 +04:00
|
|
|
packetQuarEncResponse->flags = *((UINT32*) &buffer[offset + 12]); /* Flags */
|
|
|
|
packetQuarEncResponse->certChainLen = *((UINT32*) &buffer[offset + 16]); /* CertChainLength */
|
2012-11-09 12:04:47 +04:00
|
|
|
/* CertChainDataPtr (4 bytes) */
|
2012-11-27 12:04:25 +04:00
|
|
|
CopyMemory(&packetQuarEncResponse->nonce, &buffer[offset + 24], 16); /* Nonce */
|
|
|
|
offset += 40;
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2012-11-17 03:30:53 +04:00
|
|
|
if (packetQuarEncResponse->certChainLen > 0)
|
|
|
|
{
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* Ptr (4 bytes): 0x0002000C */
|
|
|
|
offset += 4;
|
|
|
|
offset += 4; /* MaxCount (4 bytes) */
|
|
|
|
offset += 4; /* Offset (4 bytes) */
|
|
|
|
count = *((UINT32*) &buffer[offset]); /* ActualCount (4 bytes) */
|
|
|
|
offset += 4;
|
|
|
|
/*
|
|
|
|
* CertChainData is a wide character string, and the count is
|
|
|
|
* given in characters excluding the null terminator, therefore:
|
2012-12-14 05:23:37 +04:00
|
|
|
* size = (count * 2)
|
2012-11-17 03:30:53 +04:00
|
|
|
*/
|
2012-11-27 13:05:41 +04:00
|
|
|
offset += (count * 2); /* CertChainData */
|
|
|
|
/* 4-byte alignment */
|
|
|
|
rpc_offset_align(&offset, 4);
|
2012-11-17 03:30:53 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* Ptr (4 bytes): 0x00020008 */
|
|
|
|
offset += 4;
|
|
|
|
}
|
2013-10-11 13:07:33 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
versionCaps = (PTSG_PACKET_VERSIONCAPS) calloc(1, sizeof(TSG_PACKET_VERSIONCAPS));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
if (!versionCaps)
|
2014-11-17 03:08:38 +03:00
|
|
|
{
|
|
|
|
free(packetQuarEncResponse);
|
|
|
|
free(packet);
|
2014-05-21 19:32:14 +04:00
|
|
|
return FALSE;
|
2014-11-17 03:08:38 +03:00
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packetQuarEncResponse->versionCaps = versionCaps;
|
2012-11-09 12:04:47 +04:00
|
|
|
versionCaps->tsgHeader.ComponentId = *((UINT16*) &buffer[offset]); /* ComponentId */
|
|
|
|
versionCaps->tsgHeader.PacketId = *((UINT16*) &buffer[offset + 2]); /* PacketId */
|
|
|
|
offset += 4;
|
|
|
|
|
|
|
|
if (versionCaps->tsgHeader.ComponentId != TS_GATEWAY_TRANSPORT)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected ComponentId: 0x%04X, Expected TS_GATEWAY_TRANSPORT",
|
2014-09-12 16:36:29 +04:00
|
|
|
versionCaps->tsgHeader.ComponentId);
|
2013-08-30 16:19:50 +04:00
|
|
|
free(versionCaps);
|
|
|
|
free(packetQuarEncResponse);
|
2013-08-29 17:30:22 +04:00
|
|
|
free(packet);
|
2012-11-09 12:04:47 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
Pointer = *((UINT32*) &buffer[offset]); /* TsgCapsPtr */
|
|
|
|
versionCaps->numCapabilities = *((UINT32*) &buffer[offset + 4]); /* NumCapabilities */
|
|
|
|
versionCaps->majorVersion = *((UINT16*) &buffer[offset + 8]); /* MajorVersion */
|
|
|
|
versionCaps->majorVersion = *((UINT16*) &buffer[offset + 10]); /* MinorVersion */
|
|
|
|
versionCaps->quarantineCapabilities = *((UINT16*) &buffer[offset + 12]); /* QuarantineCapabilities */
|
|
|
|
offset += 14;
|
|
|
|
/* 4-byte alignment */
|
|
|
|
rpc_offset_align(&offset, 4);
|
2012-11-09 08:45:29 +04:00
|
|
|
/* Not sure exactly what this is */
|
|
|
|
offset += 4; /* 0x00000001 (4 bytes) */
|
|
|
|
offset += 4; /* 0x00000001 (4 bytes) */
|
|
|
|
offset += 4; /* 0x00000001 (4 bytes) */
|
2012-11-09 12:04:47 +04:00
|
|
|
offset += 4; /* 0x00000002 (4 bytes) */
|
2012-11-09 21:52:34 +04:00
|
|
|
/* TunnelContext (20 bytes) */
|
|
|
|
CopyMemory(&tsg->TunnelContext.ContextType, &buffer[offset], 4); /* ContextType */
|
|
|
|
CopyMemory(tsg->TunnelContext.ContextUuid, &buffer[offset + 4], 16); /* ContextUuid */
|
|
|
|
offset += 20;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-11-09 12:12:54 +04:00
|
|
|
free(versionCaps);
|
|
|
|
free(packetQuarEncResponse);
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
2012-11-09 12:04:47 +04:00
|
|
|
else
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected PacketId: 0x%08X, Expected TSG_PACKET_TYPE_CAPS_RESPONSE "
|
2014-09-12 16:36:29 +04:00
|
|
|
"or TSG_PACKET_TYPE_QUARENC_RESPONSE", packet->packetId);
|
2013-08-29 17:30:22 +04:00
|
|
|
free(packet);
|
2012-11-09 08:45:29 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
free(packet);
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxyCreateTunnel(rdpTsg* tsg, PTSG_PACKET tsgPacket, PTSG_PACKET* tsgPacketResponse,
|
2015-02-02 16:19:07 +03:00
|
|
|
PTUNNEL_CONTEXT_HANDLE_SERIALIZE* tunnelContext, UINT32* tunnelId)
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* OpNum = 1
|
|
|
|
*
|
|
|
|
* HRESULT TsProxyCreateTunnel(
|
|
|
|
* [in, ref] PTSG_PACKET tsgPacket,
|
|
|
|
* [out, ref] PTSG_PACKET* tsgPacketResponse,
|
|
|
|
* [out] PTUNNEL_CONTEXT_HANDLE_SERIALIZE* tunnelContext,
|
|
|
|
* [out] unsigned long* tunnelId
|
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyCreateTunnel");
|
2012-11-09 08:45:29 +04:00
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
if (!TsProxyCreateTunnelWriteRequest(tsg))
|
2012-11-09 08:45:29 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-11-09 08:45:29 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
BOOL TsProxyAuthorizeTunnelWriteRequest(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext)
|
2012-10-30 04:54:49 +04:00
|
|
|
{
|
2012-10-31 17:22:32 +04:00
|
|
|
UINT32 pad;
|
2012-10-30 04:54:49 +04:00
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
2012-10-31 17:22:32 +04:00
|
|
|
UINT32 count;
|
2012-10-30 04:54:49 +04:00
|
|
|
UINT32 length;
|
2012-10-31 17:22:32 +04:00
|
|
|
UINT32 offset;
|
2012-12-14 05:23:37 +04:00
|
|
|
CONTEXT_HANDLE* handle;
|
2012-10-30 04:54:49 +04:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 17:22:32 +04:00
|
|
|
count = _wcslen(tsg->MachineName) + 1;
|
|
|
|
offset = 64 + (count * 2);
|
|
|
|
rpc_offset_align(&offset, 4);
|
|
|
|
offset += 4;
|
|
|
|
length = offset;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-11-09 21:52:34 +04:00
|
|
|
/* TunnelContext */
|
2012-12-14 05:23:37 +04:00
|
|
|
handle = (CONTEXT_HANDLE*) tunnelContext;
|
|
|
|
CopyMemory(&buffer[0], &handle->ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], handle->ContextUuid, 16); /* ContextUuid */
|
2012-10-31 17:22:32 +04:00
|
|
|
/* 4-byte alignment */
|
|
|
|
*((UINT32*) &buffer[20]) = TSG_PACKET_TYPE_QUARREQUEST; /* PacketId */
|
|
|
|
*((UINT32*) &buffer[24]) = TSG_PACKET_TYPE_QUARREQUEST; /* SwitchValue */
|
|
|
|
*((UINT32*) &buffer[28]) = 0x00020000; /* PacketQuarRequestPtr */
|
|
|
|
*((UINT32*) &buffer[32]) = 0x00000000; /* Flags */
|
|
|
|
*((UINT32*) &buffer[36]) = 0x00020004; /* MachineNamePtr */
|
|
|
|
*((UINT32*) &buffer[40]) = count; /* NameLength */
|
|
|
|
*((UINT32*) &buffer[44]) = 0x00020008; /* DataPtr */
|
|
|
|
*((UINT32*) &buffer[48]) = 0; /* DataLength */
|
|
|
|
/* MachineName */
|
|
|
|
*((UINT32*) &buffer[52]) = count; /* MaxCount */
|
|
|
|
*((UINT32*) &buffer[56]) = 0; /* Offset */
|
|
|
|
*((UINT32*) &buffer[60]) = count; /* ActualCount */
|
|
|
|
CopyMemory(&buffer[64], tsg->MachineName, count * 2); /* Array */
|
|
|
|
offset = 64 + (count * 2);
|
|
|
|
/* 4-byte alignment */
|
|
|
|
pad = rpc_offset_align(&offset, 4);
|
|
|
|
ZeroMemory(&buffer[offset - pad], pad);
|
|
|
|
*((UINT32*) &buffer[offset]) = 0x00000000; /* MaxCount */
|
|
|
|
offset += 4;
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyAuthorizeTunnelOpnum);
|
2012-03-26 10:45:01 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
free(buffer);
|
2012-11-09 11:31:22 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyAuthorizeTunnelReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
UINT32 offset;
|
|
|
|
UINT32 Pointer;
|
|
|
|
UINT32 SizeValue;
|
|
|
|
UINT32 SwitchValue;
|
2015-01-15 00:49:21 +03:00
|
|
|
UINT32 idleTimeout;
|
2012-11-09 11:31:22 +04:00
|
|
|
PTSG_PACKET packet;
|
|
|
|
PTSG_PACKET_RESPONSE packetResponse;
|
|
|
|
|
2012-11-29 06:25:01 +04:00
|
|
|
if (!pdu)
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
|
2012-12-13 00:55:42 +04:00
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-12-08 02:41:12 +04:00
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
packet = (PTSG_PACKET) calloc(1, sizeof(TSG_PACKET));
|
|
|
|
|
|
|
|
if (!packet)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-11-29 06:25:01 +04:00
|
|
|
offset = 4;
|
|
|
|
packet->packetId = *((UINT32*) &buffer[offset]); /* PacketId */
|
|
|
|
SwitchValue = *((UINT32*) &buffer[offset + 4]); /* SwitchValue */
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2014-03-04 20:39:39 +04:00
|
|
|
if (packet->packetId == E_PROXY_NAP_ACCESSDENIED)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "status: E_PROXY_NAP_ACCESSDENIED (0x%08X)", E_PROXY_NAP_ACCESSDENIED);
|
|
|
|
WLog_ERR(TAG, "Ensure that the Gateway Connection Authorization Policy is correct");
|
2014-04-26 08:05:52 +04:00
|
|
|
free(packet);
|
2014-03-04 20:39:39 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2013-02-02 02:52:19 +04:00
|
|
|
if ((packet->packetId != TSG_PACKET_TYPE_RESPONSE) || (SwitchValue != TSG_PACKET_TYPE_RESPONSE))
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected PacketId: 0x%08X, Expected TSG_PACKET_TYPE_RESPONSE",
|
2014-09-12 16:36:29 +04:00
|
|
|
packet->packetId);
|
2013-08-29 17:30:22 +04:00
|
|
|
free(packet);
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
packetResponse = (PTSG_PACKET_RESPONSE) calloc(1, sizeof(TSG_PACKET_RESPONSE));
|
|
|
|
|
|
|
|
if (!packetResponse)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-11-09 11:31:22 +04:00
|
|
|
packet->tsgPacket.packetResponse = packetResponse;
|
2012-11-29 06:25:01 +04:00
|
|
|
Pointer = *((UINT32*) &buffer[offset + 8]); /* PacketResponsePtr */
|
|
|
|
packetResponse->flags = *((UINT32*) &buffer[offset + 12]); /* Flags */
|
2012-11-09 11:31:22 +04:00
|
|
|
|
|
|
|
if (packetResponse->flags != TSG_PACKET_TYPE_QUARREQUEST)
|
2012-03-26 10:45:01 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected Packet Response Flags: 0x%08X, Expected TSG_PACKET_TYPE_QUARREQUEST",
|
2014-09-12 16:36:29 +04:00
|
|
|
packetResponse->flags);
|
2013-08-29 17:30:22 +04:00
|
|
|
free(packet);
|
|
|
|
free(packetResponse);
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
|
|
|
|
2012-11-09 11:31:22 +04:00
|
|
|
/* Reserved (4 bytes) */
|
2012-11-29 06:25:01 +04:00
|
|
|
Pointer = *((UINT32*) &buffer[offset + 20]); /* ResponseDataPtr */
|
|
|
|
packetResponse->responseDataLen = *((UINT32*) &buffer[offset + 24]); /* ResponseDataLength */
|
|
|
|
packetResponse->redirectionFlags.enableAllRedirections = *((UINT32*) &buffer[offset + 28]); /* EnableAllRedirections */
|
|
|
|
packetResponse->redirectionFlags.disableAllRedirections = *((UINT32*) &buffer[offset + 32]); /* DisableAllRedirections */
|
|
|
|
packetResponse->redirectionFlags.driveRedirectionDisabled = *((UINT32*) &buffer[offset + 36]); /* DriveRedirectionDisabled */
|
|
|
|
packetResponse->redirectionFlags.printerRedirectionDisabled = *((UINT32*) &buffer[offset + 40]); /* PrinterRedirectionDisabled */
|
|
|
|
packetResponse->redirectionFlags.portRedirectionDisabled = *((UINT32*) &buffer[offset + 44]); /* PortRedirectionDisabled */
|
|
|
|
packetResponse->redirectionFlags.reserved = *((UINT32*) &buffer[offset + 48]); /* Reserved */
|
|
|
|
packetResponse->redirectionFlags.clipboardRedirectionDisabled = *((UINT32*) &buffer[offset + 52]); /* ClipboardRedirectionDisabled */
|
|
|
|
packetResponse->redirectionFlags.pnpRedirectionDisabled = *((UINT32*) &buffer[offset + 56]); /* PnpRedirectionDisabled */
|
|
|
|
offset += 60;
|
2012-11-09 11:31:22 +04:00
|
|
|
SizeValue = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
|
|
|
|
|
|
|
if (SizeValue != packetResponse->responseDataLen)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected size value: %d, expected: %d",
|
2014-09-12 16:36:29 +04:00
|
|
|
SizeValue, packetResponse->responseDataLen);
|
2013-08-28 18:28:00 +04:00
|
|
|
free(packetResponse);
|
|
|
|
free(packet);
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
2015-01-15 00:49:21 +03:00
|
|
|
|
|
|
|
if (SizeValue == 4)
|
|
|
|
{
|
|
|
|
idleTimeout = *((UINT32*) &buffer[offset]);
|
|
|
|
offset += 4;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
offset += SizeValue; /* ResponseData */
|
|
|
|
}
|
|
|
|
|
2012-11-09 11:31:22 +04:00
|
|
|
free(packetResponse);
|
|
|
|
free(packet);
|
2015-01-15 00:49:21 +03:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxyAuthorizeTunnel(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
|
2015-02-02 16:19:07 +03:00
|
|
|
PTSG_PACKET tsgPacket, PTSG_PACKET* tsgPacketResponse)
|
2012-10-30 04:54:49 +04:00
|
|
|
{
|
2012-04-01 05:32:13 +04:00
|
|
|
/**
|
2012-11-09 11:31:22 +04:00
|
|
|
* OpNum = 2
|
2012-04-01 05:32:13 +04:00
|
|
|
*
|
2012-11-09 11:31:22 +04:00
|
|
|
* HRESULT TsProxyAuthorizeTunnel(
|
2012-04-01 05:32:13 +04:00
|
|
|
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
|
|
|
|
* [in, ref] PTSG_PACKET tsgPacket,
|
|
|
|
* [out, ref] PTSG_PACKET* tsgPacketResponse
|
|
|
|
* );
|
2012-11-09 11:31:22 +04:00
|
|
|
*
|
2012-04-01 05:32:13 +04:00
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyAuthorizeTunnel");
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
if (!TsProxyAuthorizeTunnelWriteRequest(tsg, tunnelContext))
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
BOOL TsProxyMakeTunnelCallWriteRequest(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext, unsigned long procId)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
2012-12-14 05:23:37 +04:00
|
|
|
CONTEXT_HANDLE* handle;
|
2012-11-09 11:31:22 +04:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 18:52:04 +04:00
|
|
|
length = 40;
|
2012-10-30 04:54:49 +04:00
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-11-09 21:52:34 +04:00
|
|
|
/* TunnelContext */
|
2012-12-14 05:23:37 +04:00
|
|
|
handle = (CONTEXT_HANDLE*) tunnelContext;
|
|
|
|
CopyMemory(&buffer[0], &handle->ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], handle->ContextUuid, 16); /* ContextUuid */
|
2012-12-13 21:40:46 +04:00
|
|
|
*((UINT32*) &buffer[20]) = procId; /* ProcId */
|
2012-10-31 18:52:04 +04:00
|
|
|
/* 4-byte alignment */
|
|
|
|
*((UINT32*) &buffer[24]) = TSG_PACKET_TYPE_MSGREQUEST_PACKET; /* PacketId */
|
|
|
|
*((UINT32*) &buffer[28]) = TSG_PACKET_TYPE_MSGREQUEST_PACKET; /* SwitchValue */
|
|
|
|
*((UINT32*) &buffer[32]) = 0x00020000; /* PacketMsgRequestPtr */
|
|
|
|
*((UINT32*) &buffer[36]) = 0x00000001; /* MaxMessagesPerBatch */
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyMakeTunnelCallOpnum);
|
2012-04-14 22:19:31 +04:00
|
|
|
|
2012-03-26 10:45:01 +04:00
|
|
|
if (status <= 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
free(buffer);
|
|
|
|
return TRUE;
|
|
|
|
}
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyMakeTunnelCallReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-10-30 04:54:49 +04:00
|
|
|
{
|
2013-09-02 17:06:25 +04:00
|
|
|
BOOL rc = TRUE;
|
2013-02-02 02:52:19 +04:00
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
UINT32 offset;
|
|
|
|
UINT32 Pointer;
|
|
|
|
UINT32 MaxCount;
|
|
|
|
UINT32 ActualCount;
|
|
|
|
UINT32 SwitchValue;
|
|
|
|
PTSG_PACKET packet;
|
2013-03-14 20:57:45 +04:00
|
|
|
char* messageText = NULL;
|
2013-02-02 02:52:19 +04:00
|
|
|
PTSG_PACKET_MSG_RESPONSE packetMsgResponse;
|
|
|
|
PTSG_PACKET_STRING_MESSAGE packetStringMessage = NULL;
|
|
|
|
PTSG_PACKET_REAUTH_MESSAGE packetReauthMessage = NULL;
|
|
|
|
|
|
|
|
/* This is an asynchronous response */
|
|
|
|
|
|
|
|
if (!pdu)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
|
|
|
|
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
packet = (PTSG_PACKET) calloc(1, sizeof(TSG_PACKET));
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!packet)
|
|
|
|
return FALSE;
|
2013-02-02 02:52:19 +04:00
|
|
|
|
|
|
|
offset = 4;
|
|
|
|
packet->packetId = *((UINT32*) &buffer[offset]); /* PacketId */
|
|
|
|
SwitchValue = *((UINT32*) &buffer[offset + 4]); /* SwitchValue */
|
|
|
|
|
|
|
|
if ((packet->packetId != TSG_PACKET_TYPE_MESSAGE_PACKET) || (SwitchValue != TSG_PACKET_TYPE_MESSAGE_PACKET))
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Unexpected PacketId: 0x%08X, Expected TSG_PACKET_TYPE_MESSAGE_PACKET",
|
2014-09-12 16:36:29 +04:00
|
|
|
packet->packetId);
|
2013-08-29 17:30:22 +04:00
|
|
|
free(packet);
|
2013-02-02 02:52:19 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
packetMsgResponse = (PTSG_PACKET_MSG_RESPONSE) calloc(1, sizeof(TSG_PACKET_MSG_RESPONSE));
|
|
|
|
|
|
|
|
if (!packetMsgResponse)
|
|
|
|
return FALSE;
|
|
|
|
|
2013-02-02 02:52:19 +04:00
|
|
|
packet->tsgPacket.packetMsgResponse = packetMsgResponse;
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 8]); /* PacketMsgResponsePtr */
|
|
|
|
packetMsgResponse->msgID = *((UINT32*) &buffer[offset + 12]); /* MsgId */
|
|
|
|
packetMsgResponse->msgType = *((UINT32*) &buffer[offset + 16]); /* MsgType */
|
|
|
|
packetMsgResponse->isMsgPresent = *((INT32*) &buffer[offset + 20]); /* IsMsgPresent */
|
|
|
|
SwitchValue = *((UINT32*) &buffer[offset + 24]); /* SwitchValue */
|
|
|
|
|
|
|
|
switch (SwitchValue)
|
|
|
|
{
|
2014-08-19 20:26:39 +04:00
|
|
|
case TSG_ASYNC_MESSAGE_CONSENT_MESSAGE:
|
2015-01-13 21:50:46 +03:00
|
|
|
packetStringMessage = (PTSG_PACKET_STRING_MESSAGE) calloc(1, sizeof(TSG_PACKET_STRING_MESSAGE));
|
|
|
|
|
|
|
|
if (!packetStringMessage)
|
|
|
|
return FALSE;
|
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packetMsgResponse->messagePacket.consentMessage = packetStringMessage;
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 28]); /* ConsentMessagePtr */
|
|
|
|
packetStringMessage->isDisplayMandatory = *((INT32*) &buffer[offset + 32]); /* IsDisplayMandatory */
|
|
|
|
packetStringMessage->isConsentMandatory = *((INT32*) &buffer[offset + 36]); /* IsConsentMandatory */
|
|
|
|
packetStringMessage->msgBytes = *((UINT32*) &buffer[offset + 40]); /* MsgBytes */
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 44]); /* MsgPtr */
|
|
|
|
MaxCount = *((UINT32*) &buffer[offset + 48]); /* MaxCount */
|
|
|
|
/* Offset */
|
|
|
|
ActualCount = *((UINT32*) &buffer[offset + 56]); /* ActualCount */
|
|
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*) &buffer[offset + 60], ActualCount, &messageText, 0, NULL, NULL);
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Consent Message: %s", messageText);
|
2014-08-19 20:26:39 +04:00
|
|
|
free(messageText);
|
|
|
|
break;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
case TSG_ASYNC_MESSAGE_SERVICE_MESSAGE:
|
2015-01-13 21:50:46 +03:00
|
|
|
packetStringMessage = (PTSG_PACKET_STRING_MESSAGE) calloc(1, sizeof(TSG_PACKET_STRING_MESSAGE));
|
|
|
|
|
|
|
|
if (!packetStringMessage)
|
|
|
|
return FALSE;
|
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packetMsgResponse->messagePacket.serviceMessage = packetStringMessage;
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 28]); /* ServiceMessagePtr */
|
|
|
|
packetStringMessage->isDisplayMandatory = *((INT32*) &buffer[offset + 32]); /* IsDisplayMandatory */
|
|
|
|
packetStringMessage->isConsentMandatory = *((INT32*) &buffer[offset + 36]); /* IsConsentMandatory */
|
|
|
|
packetStringMessage->msgBytes = *((UINT32*) &buffer[offset + 40]); /* MsgBytes */
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 44]); /* MsgPtr */
|
|
|
|
MaxCount = *((UINT32*) &buffer[offset + 48]); /* MaxCount */
|
|
|
|
/* Offset */
|
|
|
|
ActualCount = *((UINT32*) &buffer[offset + 56]); /* ActualCount */
|
|
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*) &buffer[offset + 60], ActualCount, &messageText, 0, NULL, NULL);
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "Service Message: %s", messageText);
|
2014-08-19 20:26:39 +04:00
|
|
|
free(messageText);
|
|
|
|
break;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
case TSG_ASYNC_MESSAGE_REAUTH:
|
2015-01-13 21:50:46 +03:00
|
|
|
packetReauthMessage = (PTSG_PACKET_REAUTH_MESSAGE) calloc(1, sizeof(TSG_PACKET_REAUTH_MESSAGE));
|
|
|
|
|
|
|
|
if (!packetReauthMessage)
|
|
|
|
return FALSE;
|
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
packetMsgResponse->messagePacket.reauthMessage = packetReauthMessage;
|
|
|
|
Pointer = *((UINT32*) &buffer[offset + 28]); /* ReauthMessagePtr */
|
|
|
|
break;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2014-08-19 20:26:39 +04:00
|
|
|
default:
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "unexpected message type: %d", SwitchValue);
|
2014-08-19 20:26:39 +04:00
|
|
|
rc = FALSE;
|
|
|
|
break;
|
2013-02-02 02:52:19 +04:00
|
|
|
}
|
|
|
|
|
2013-08-28 18:31:35 +04:00
|
|
|
if (packet)
|
2013-09-02 17:06:25 +04:00
|
|
|
{
|
|
|
|
if (packet->tsgPacket.packetMsgResponse)
|
|
|
|
{
|
|
|
|
if (packet->tsgPacket.packetMsgResponse->messagePacket.reauthMessage)
|
|
|
|
free(packet->tsgPacket.packetMsgResponse->messagePacket.reauthMessage);
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2013-09-02 17:06:25 +04:00
|
|
|
free(packet->tsgPacket.packetMsgResponse);
|
|
|
|
}
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2013-08-28 18:31:35 +04:00
|
|
|
free(packet);
|
2013-09-02 17:06:25 +04:00
|
|
|
}
|
2013-08-28 18:31:35 +04:00
|
|
|
|
2013-09-02 17:06:25 +04:00
|
|
|
return rc;
|
2012-11-09 11:31:22 +04:00
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxyMakeTunnelCall(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
|
2015-02-02 16:19:07 +03:00
|
|
|
UINT32 procId, PTSG_PACKET tsgPacket, PTSG_PACKET* tsgPacketResponse)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2012-04-01 05:32:13 +04:00
|
|
|
/**
|
2012-11-09 11:31:22 +04:00
|
|
|
* OpNum = 3
|
2012-04-01 05:32:13 +04:00
|
|
|
*
|
2012-11-09 11:31:22 +04:00
|
|
|
* HRESULT TsProxyMakeTunnelCall(
|
2012-04-01 05:32:13 +04:00
|
|
|
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
|
2012-11-09 11:31:22 +04:00
|
|
|
* [in] unsigned long procId,
|
|
|
|
* [in, ref] PTSG_PACKET tsgPacket,
|
|
|
|
* [out, ref] PTSG_PACKET* tsgPacketResponse
|
2012-04-01 05:32:13 +04:00
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyMakeTunnelCall");
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
if (!TsProxyMakeTunnelCallWriteRequest(tsg, tunnelContext, procId))
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
BOOL TsProxyCreateChannelWriteRequest(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
UINT32 count;
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
2012-12-14 05:23:37 +04:00
|
|
|
CONTEXT_HANDLE* handle;
|
2012-11-09 11:31:22 +04:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2012-10-31 20:34:52 +04:00
|
|
|
count = _wcslen(tsg->Hostname) + 1;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 20:34:52 +04:00
|
|
|
length = 60 + (count * 2);
|
2012-10-30 21:01:54 +04:00
|
|
|
buffer = (BYTE*) malloc(length);
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
2012-10-30 04:54:49 +04:00
|
|
|
|
2012-11-09 21:52:34 +04:00
|
|
|
/* TunnelContext */
|
2012-12-14 05:23:37 +04:00
|
|
|
handle = (CONTEXT_HANDLE*) tunnelContext;
|
|
|
|
CopyMemory(&buffer[0], &handle->ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], handle->ContextUuid, 16); /* ContextUuid */
|
2012-10-31 20:34:52 +04:00
|
|
|
/* TSENDPOINTINFO */
|
|
|
|
*((UINT32*) &buffer[20]) = 0x00020000; /* ResourceNamePtr */
|
|
|
|
*((UINT32*) &buffer[24]) = 0x00000001; /* NumResourceNames */
|
|
|
|
*((UINT32*) &buffer[28]) = 0x00000000; /* AlternateResourceNamesPtr */
|
2012-12-21 21:17:07 +04:00
|
|
|
*((UINT16*) &buffer[32]) = 0x0000; /* NumAlternateResourceNames */
|
|
|
|
*((UINT16*) &buffer[34]) = 0x0000; /* Pad (2 bytes) */
|
|
|
|
/* Port (4 bytes) */
|
|
|
|
*((UINT16*) &buffer[36]) = 0x0003; /* ProtocolId (RDP = 3) */
|
|
|
|
*((UINT16*) &buffer[38]) = tsg->Port; /* PortNumber (0xD3D = 3389) */
|
|
|
|
*((UINT32*) &buffer[40]) = 0x00000001; /* NumResourceNames */
|
2012-10-31 20:34:52 +04:00
|
|
|
*((UINT32*) &buffer[44]) = 0x00020004; /* ResourceNamePtr */
|
|
|
|
*((UINT32*) &buffer[48]) = count; /* MaxCount */
|
|
|
|
*((UINT32*) &buffer[52]) = 0; /* Offset */
|
|
|
|
*((UINT32*) &buffer[56]) = count; /* ActualCount */
|
|
|
|
CopyMemory(&buffer[60], tsg->Hostname, count * 2); /* Array */
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyCreateChannelOpnum);
|
2012-03-26 10:45:01 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2012-10-30 21:01:54 +04:00
|
|
|
free(buffer);
|
2012-11-09 11:31:22 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyCreateChannelReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
2012-12-08 02:41:12 +04:00
|
|
|
UINT32 offset;
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-11-29 06:25:01 +04:00
|
|
|
if (!pdu)
|
2012-10-09 10:31:28 +04:00
|
|
|
return FALSE;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2012-12-13 00:55:42 +04:00
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-12-08 02:41:12 +04:00
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
|
|
|
offset = 0;
|
2012-11-09 21:52:34 +04:00
|
|
|
/* ChannelContext (20 bytes) */
|
2012-12-08 02:41:12 +04:00
|
|
|
CopyMemory(&tsg->ChannelContext.ContextType, &buffer[offset], 4); /* ContextType (4 bytes) */
|
|
|
|
CopyMemory(tsg->ChannelContext.ContextUuid, &buffer[offset + 4], 16); /* ContextUuid (16 bytes) */
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxyCreateChannel(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext, PTSENDPOINTINFO tsEndPointInfo,
|
2015-02-02 16:19:07 +03:00
|
|
|
PCHANNEL_CONTEXT_HANDLE_SERIALIZE* channelContext, UINT32* channelId)
|
2012-10-30 04:54:49 +04:00
|
|
|
{
|
2012-04-01 05:32:13 +04:00
|
|
|
/**
|
2012-11-09 11:31:22 +04:00
|
|
|
* OpNum = 4
|
2012-04-01 05:32:13 +04:00
|
|
|
*
|
2012-11-09 11:31:22 +04:00
|
|
|
* HRESULT TsProxyCreateChannel(
|
|
|
|
* [in] PTUNNEL_CONTEXT_HANDLE_NOSERIALIZE tunnelContext,
|
|
|
|
* [in, ref] PTSENDPOINTINFO tsEndPointInfo,
|
|
|
|
* [out] PCHANNEL_CONTEXT_HANDLE_SERIALIZE* channelContext,
|
|
|
|
* [out] unsigned long* channelId
|
2012-04-01 05:32:13 +04:00
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyCreateChannel");
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-12-14 05:23:37 +04:00
|
|
|
if (!TsProxyCreateChannelWriteRequest(tsg, tunnelContext))
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
BOOL TsProxyCloseChannelWriteRequest(rdpTsg* tsg, PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE* context)
|
2012-11-09 23:35:21 +04:00
|
|
|
{
|
2012-12-13 21:40:46 +04:00
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
length = 20;
|
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
/* TunnelContext */
|
|
|
|
CopyMemory(&buffer[0], &tsg->ChannelContext.ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], tsg->ChannelContext.ContextUuid, 16); /* ContextUuid */
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyCloseChannelOpnum);
|
2012-12-13 21:40:46 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
free(buffer);
|
|
|
|
return TRUE;
|
2012-11-09 23:35:21 +04:00
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyCloseChannelReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-11-09 23:35:21 +04:00
|
|
|
{
|
2012-12-13 21:40:46 +04:00
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
UINT32 offset;
|
|
|
|
|
|
|
|
if (!pdu)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
|
|
|
|
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
|
|
|
offset = 0;
|
2015-02-02 01:55:24 +03:00
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
HRESULT TsProxyCloseChannel(rdpTsg* tsg, PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE* context)
|
|
|
|
{
|
2012-12-14 05:23:37 +04:00
|
|
|
/**
|
|
|
|
* HRESULT TsProxyCloseChannel(
|
|
|
|
* [in, out] PCHANNEL_CONTEXT_HANDLE_NOSERIALIZE* context
|
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyCloseChannel");
|
2012-12-13 21:40:46 +04:00
|
|
|
|
|
|
|
if (!TsProxyCloseChannelWriteRequest(tsg, context))
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-12-13 21:40:46 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL TsProxyCloseTunnelWriteRequest(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_SERIALIZE* context)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
length = 20;
|
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
/* TunnelContext */
|
|
|
|
CopyMemory(&buffer[0], &tsg->TunnelContext.ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], tsg->TunnelContext.ContextUuid, 16); /* ContextUuid */
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxyCloseTunnelOpnum);
|
2012-12-13 21:40:46 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
free(buffer);
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxyCloseTunnelReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-12-13 21:40:46 +04:00
|
|
|
{
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
UINT32 offset;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
if (!pdu)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
length = Stream_Length(pdu->s);
|
|
|
|
buffer = Stream_Buffer(pdu->s);
|
|
|
|
|
|
|
|
if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
|
|
|
|
buffer = &buffer[24];
|
|
|
|
|
|
|
|
offset = 0;
|
2015-02-02 01:55:24 +03:00
|
|
|
|
2012-12-13 21:40:46 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
HRESULT TsProxyCloseTunnel(rdpTsg* tsg, PTUNNEL_CONTEXT_HANDLE_SERIALIZE* context)
|
|
|
|
{
|
2012-12-14 05:23:37 +04:00
|
|
|
/**
|
|
|
|
* HRESULT TsProxyCloseTunnel(
|
|
|
|
* [in, out] PTUNNEL_CONTEXT_HANDLE_SERIALIZE* context
|
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxyCloseTunnel");
|
2012-12-13 21:40:46 +04:00
|
|
|
|
|
|
|
if (!TsProxyCloseTunnelWriteRequest(tsg, context))
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-12-13 21:40:46 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
2012-11-09 23:35:21 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOL TsProxySetupReceivePipeWriteRequest(rdpTsg* tsg)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
BYTE* buffer;
|
|
|
|
UINT32 length;
|
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2012-10-31 20:34:52 +04:00
|
|
|
length = 20;
|
2012-10-30 04:54:49 +04:00
|
|
|
buffer = (BYTE*) malloc(length);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!buffer)
|
|
|
|
return FALSE;
|
|
|
|
|
2012-11-09 21:52:34 +04:00
|
|
|
/* ChannelContext */
|
|
|
|
CopyMemory(&buffer[0], &tsg->ChannelContext.ContextType, 4); /* ContextType */
|
|
|
|
CopyMemory(&buffer[4], tsg->ChannelContext.ContextUuid, 16); /* ContextUuid */
|
2015-02-12 22:08:38 +03:00
|
|
|
status = rpc_client_write_call(rpc, buffer, length, TsProxySetupReceivePipeOpnum);
|
2012-03-26 10:45:01 +04:00
|
|
|
|
|
|
|
if (status <= 0)
|
2012-10-30 04:54:49 +04:00
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
free(buffer);
|
2012-11-09 11:31:22 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2013-03-13 23:43:44 +04:00
|
|
|
BOOL TsProxySetupReceivePipeReadResponse(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
BOOL TsProxySetupReceivePipe(handle_t IDL_handle, BYTE* pRpcMessage)
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
rdpTsg* tsg = (rdpTsg*) IDL_handle;
|
|
|
|
|
2012-11-09 11:31:22 +04:00
|
|
|
/**
|
|
|
|
* OpNum = 8
|
|
|
|
*
|
|
|
|
* DWORD TsProxySetupReceivePipe(
|
|
|
|
* [in, max_is(32767)] byte pRpcMessage[]
|
|
|
|
* );
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
WLog_DBG(TAG, "TsProxySetupReceivePipe");
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2012-11-09 23:35:21 +04:00
|
|
|
if (!TsProxySetupReceivePipeWriteRequest(tsg))
|
2012-11-09 11:31:22 +04:00
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error writing request");
|
2012-11-09 11:31:22 +04:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2012-10-30 04:54:49 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
int tsg_transition_to_state(rdpTsg* tsg, TSG_STATE state)
|
|
|
|
{
|
|
|
|
const char* str = "TSG_STATE_UNKNOWN";
|
|
|
|
|
2015-02-04 01:17:17 +03:00
|
|
|
switch (state)
|
2015-02-03 02:50:26 +03:00
|
|
|
{
|
|
|
|
case TSG_STATE_INITIAL:
|
|
|
|
str = "TSG_STATE_INITIAL";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_CONNECTED:
|
|
|
|
str = "TSG_STATE_CONNECTED";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_AUTHORIZED:
|
|
|
|
str = "TSG_STATE_AUTHORIZED";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_CHANNEL_CREATED:
|
|
|
|
str = "TSG_STATE_CHANNEL_CREATED";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_PIPE_CREATED:
|
|
|
|
str = "TSG_STATE_PIPE_CREATED";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_TUNNEL_CLOSE_PENDING:
|
|
|
|
str = "TSG_STATE_TUNNEL_CLOSE_PENDING";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_CHANNEL_CLOSE_PENDING:
|
|
|
|
str = "TSG_STATE_CHANNEL_CLOSE_PENDING";
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_FINAL:
|
|
|
|
str = "TSG_STATE_FINAL";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
tsg->state = state;
|
|
|
|
WLog_DBG(TAG, "%s", str);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
int tsg_recv_pdu(rdpTsg* tsg, RPC_PDU* pdu)
|
2012-10-30 04:54:49 +04:00
|
|
|
{
|
2015-02-03 02:50:26 +03:00
|
|
|
int status = -1;
|
2013-03-14 20:57:45 +04:00
|
|
|
RpcClientCall* call;
|
2012-10-30 04:54:49 +04:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
switch (tsg->state)
|
|
|
|
{
|
|
|
|
case TSG_STATE_INITIAL:
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (!TsProxyCreateTunnelReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCreateTunnelReadResponse failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_CONNECTED);
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (!TsProxyAuthorizeTunnel(tsg, &tsg->TunnelContext, NULL, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyAuthorizeTunnel failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2012-11-15 07:34:45 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
status = 1;
|
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_CONNECTED:
|
2013-03-13 23:43:44 +04:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (!TsProxyAuthorizeTunnelReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyAuthorizeTunnelReadResponse failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-03-13 23:43:44 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_AUTHORIZED);
|
2012-10-30 04:54:49 +04:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (!TsProxyMakeTunnelCall(tsg, &tsg->TunnelContext, TSG_TUNNEL_CALL_ASYNC_MSG_REQUEST, NULL, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyMakeTunnelCall failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-03-13 23:43:44 +04:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (!TsProxyCreateChannel(tsg, &tsg->TunnelContext, NULL, NULL, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCreateChannel failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-03-13 23:43:44 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
status = 1;
|
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
break;
|
2012-10-30 04:54:49 +04:00
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
case TSG_STATE_AUTHORIZED:
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
call = rpc_client_call_find_by_id(rpc, pdu->CallId);
|
2012-10-30 04:54:49 +04:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
if (call->OpNum == TsProxyMakeTunnelCallOpnum)
|
|
|
|
{
|
|
|
|
if (!TsProxyMakeTunnelCallReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyMakeTunnelCallReadResponse failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2015-02-03 02:50:26 +03:00
|
|
|
|
|
|
|
status = 1;
|
2015-02-02 01:55:24 +03:00
|
|
|
}
|
2015-02-02 16:19:07 +03:00
|
|
|
else if (call->OpNum == TsProxyCreateChannelOpnum)
|
2015-02-02 01:55:24 +03:00
|
|
|
{
|
2015-02-02 16:19:07 +03:00
|
|
|
if (!TsProxyCreateChannelReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCreateChannelReadResponse failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-12-18 21:59:53 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CREATED);
|
2013-03-14 20:57:45 +04:00
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
if (!TsProxySetupReceivePipe((handle_t) tsg, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxySetupReceivePipe failure");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-03-14 20:57:45 +04:00
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_PIPE_CREATED);
|
|
|
|
|
|
|
|
status = 1;
|
2015-02-02 16:19:07 +03:00
|
|
|
}
|
|
|
|
else
|
2015-02-02 01:55:24 +03:00
|
|
|
{
|
2015-02-02 16:19:07 +03:00
|
|
|
WLog_ERR(TAG, "TSG_STATE_AUTHORIZED unexpected OpNum: %d\n", call->OpNum);
|
2015-02-02 01:55:24 +03:00
|
|
|
}
|
2013-03-14 20:57:45 +04:00
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
break;
|
2015-02-02 01:55:24 +03:00
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
case TSG_STATE_CHANNEL_CREATED:
|
2015-02-02 01:55:24 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_PIPE_CREATED:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_TUNNEL_CLOSE_PENDING:
|
2015-02-02 16:19:07 +03:00
|
|
|
|
|
|
|
if (!TsProxyCloseChannelReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCloseChannelReadResponse failure");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CLOSE_PENDING);
|
2015-02-02 16:19:07 +03:00
|
|
|
|
|
|
|
if (!TsProxyCloseChannelWriteRequest(tsg, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCloseChannelWriteRequest failure");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!TsProxyMakeTunnelCall(tsg, &tsg->TunnelContext, TSG_TUNNEL_CANCEL_ASYNC_MSG_REQUEST, NULL, NULL))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyMakeTunnelCall failure");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
status = 1;
|
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_CHANNEL_CLOSE_PENDING:
|
2015-02-02 16:19:07 +03:00
|
|
|
|
|
|
|
if (!TsProxyCloseTunnelReadResponse(tsg, pdu))
|
|
|
|
{
|
|
|
|
WLog_ERR(TAG, "TsProxyCloseTunnelReadResponse failure");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
tsg_transition_to_state(tsg, TSG_STATE_FINAL);
|
|
|
|
|
|
|
|
status = 1;
|
2015-02-02 16:19:07 +03:00
|
|
|
|
2015-02-02 01:55:24 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case TSG_STATE_FINAL:
|
|
|
|
break;
|
2013-03-13 23:43:44 +04:00
|
|
|
}
|
|
|
|
|
2015-02-03 02:50:26 +03:00
|
|
|
return status;
|
2015-02-02 01:55:24 +03:00
|
|
|
}
|
2012-11-15 07:34:45 +04:00
|
|
|
|
2015-02-02 19:50:56 +03:00
|
|
|
int tsg_check(rdpTsg* tsg)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
2015-02-04 01:17:17 +03:00
|
|
|
status = rpc_client_in_channel_recv(tsg->rpc);
|
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
status = rpc_client_out_channel_recv(tsg->rpc);
|
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
return -1;
|
2015-02-02 19:50:56 +03:00
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2015-02-12 22:40:26 +03:00
|
|
|
BOOL tsg_set_hostname(rdpTsg* tsg, const char* hostname)
|
|
|
|
{
|
|
|
|
free(tsg->Hostname);
|
|
|
|
tsg->Hostname = NULL;
|
|
|
|
|
|
|
|
ConvertToUnicode(CP_UTF8, 0, hostname, -1, &tsg->Hostname, 0);
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL tsg_set_machine_name(rdpTsg* tsg, const char* machineName)
|
|
|
|
{
|
|
|
|
free(tsg->MachineName);
|
|
|
|
tsg->MachineName = NULL;
|
|
|
|
|
|
|
|
ConvertToUnicode(CP_UTF8, 0, machineName, -1, &tsg->MachineName, 0);
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2015-02-11 19:57:02 +03:00
|
|
|
BOOL tsg_connect(rdpTsg* tsg, const char* hostname, UINT16 port, int timeout)
|
2015-02-02 01:55:24 +03:00
|
|
|
{
|
2015-02-04 01:17:17 +03:00
|
|
|
HANDLE events[2];
|
2015-02-02 01:55:24 +03:00
|
|
|
rdpRpc* rpc = tsg->rpc;
|
2015-02-11 22:27:29 +03:00
|
|
|
RpcInChannel* inChannel;
|
|
|
|
RpcOutChannel* outChannel;
|
|
|
|
RpcVirtualConnection* connection;
|
2015-02-02 01:55:24 +03:00
|
|
|
rdpSettings* settings = rpc->settings;
|
2015-02-11 19:57:02 +03:00
|
|
|
rdpTransport* transport = rpc->transport;
|
|
|
|
|
2015-02-11 22:27:29 +03:00
|
|
|
tsg->Port = port;
|
|
|
|
tsg->transport = transport;
|
2015-02-11 19:57:02 +03:00
|
|
|
|
|
|
|
if (!settings->GatewayPort)
|
|
|
|
settings->GatewayPort = 443;
|
|
|
|
|
2015-02-12 22:40:26 +03:00
|
|
|
tsg_set_hostname(tsg, hostname);
|
|
|
|
tsg_set_machine_name(tsg, settings->ComputerName);
|
2012-11-09 11:31:22 +04:00
|
|
|
|
2015-02-12 22:40:26 +03:00
|
|
|
if (!rpc_connect(rpc, timeout))
|
2015-02-02 16:19:07 +03:00
|
|
|
{
|
2015-02-04 19:18:27 +03:00
|
|
|
WLog_ERR(TAG, "rpc_connect error!");
|
2015-02-03 01:16:32 +03:00
|
|
|
return FALSE;
|
2015-02-02 16:19:07 +03:00
|
|
|
}
|
|
|
|
|
2015-02-12 22:40:26 +03:00
|
|
|
connection = rpc->VirtualConnection;
|
|
|
|
inChannel = connection->DefaultInChannel;
|
|
|
|
outChannel = connection->DefaultOutChannel;
|
|
|
|
|
2015-02-11 22:27:29 +03:00
|
|
|
BIO_get_event(inChannel->tls->bio, &events[0]);
|
|
|
|
BIO_get_event(outChannel->tls->bio, &events[1]);
|
2015-02-02 01:55:24 +03:00
|
|
|
|
|
|
|
while (tsg->state != TSG_STATE_PIPE_CREATED)
|
|
|
|
{
|
2015-02-04 01:17:17 +03:00
|
|
|
WaitForMultipleObjects(2, events, FALSE, 100);
|
|
|
|
|
|
|
|
if (tsg_check(tsg) < 0)
|
2015-02-02 19:50:56 +03:00
|
|
|
{
|
2015-02-04 01:17:17 +03:00
|
|
|
WLog_ERR(TAG, "tsg_check failure");
|
2015-02-11 22:27:29 +03:00
|
|
|
transport->layer = TRANSPORT_LAYER_CLOSED;
|
2015-02-04 01:17:17 +03:00
|
|
|
return FALSE;
|
2015-02-02 19:50:56 +03:00
|
|
|
}
|
2015-02-02 01:55:24 +03:00
|
|
|
}
|
2015-01-13 21:50:46 +03:00
|
|
|
|
2015-02-02 19:50:56 +03:00
|
|
|
WLog_INFO(TAG, "TS Gateway Connection Success");
|
|
|
|
|
2015-01-28 21:46:17 +03:00
|
|
|
tsg->bio = BIO_new(BIO_s_tsg());
|
2015-02-11 22:27:29 +03:00
|
|
|
|
|
|
|
if (!tsg->bio)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
tsg->bio->ptr = (void*) tsg;
|
2015-01-28 21:46:17 +03:00
|
|
|
|
2015-02-14 18:14:13 +03:00
|
|
|
transport->bioIn = inChannel->bio;
|
|
|
|
transport->bioOut = outChannel->bio;
|
|
|
|
|
2015-02-11 22:27:29 +03:00
|
|
|
transport->GatewayEvent = rpc->client->PipeEvent;
|
2015-02-11 19:57:02 +03:00
|
|
|
|
2012-10-09 10:31:28 +04:00
|
|
|
return TRUE;
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
|
|
|
|
2012-12-13 05:02:56 +04:00
|
|
|
BOOL tsg_disconnect(rdpTsg* tsg)
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Gateway Shutdown Phase
|
|
|
|
*
|
|
|
|
* Client Server
|
|
|
|
* | |
|
|
|
|
* |-------------TsProxyCloseChannel Request---------->|
|
|
|
|
* | |
|
|
|
|
* |<-------TsProxySetupReceivePipe Final Response-----|
|
|
|
|
* |<-----------TsProxyCloseChannel Response-----------|
|
|
|
|
* | |
|
|
|
|
* |----TsProxyMakeTunnelCall Request (cancel async)-->|
|
|
|
|
* | |
|
|
|
|
* |<---TsProxyMakeTunnelCall Response (call async)----|
|
|
|
|
* |<---TsProxyMakeTunnelCall Response (cancel async)--|
|
|
|
|
* | |
|
|
|
|
* |--------------TsProxyCloseTunnel Request---------->|
|
|
|
|
* |<-------------TsProxyCloseTunnel Response----------|
|
|
|
|
* | |
|
|
|
|
*/
|
2015-01-13 21:50:46 +03:00
|
|
|
|
|
|
|
if (!tsg)
|
2013-10-11 13:07:33 +04:00
|
|
|
return FALSE;
|
2013-07-04 22:42:40 +04:00
|
|
|
|
2013-10-11 13:07:33 +04:00
|
|
|
if (tsg->state != TSG_STATE_TUNNEL_CLOSE_PENDING)
|
|
|
|
{
|
|
|
|
if (!TsProxyCloseChannel(tsg, NULL))
|
|
|
|
return FALSE;
|
2012-12-13 21:40:46 +04:00
|
|
|
|
2015-02-02 16:19:07 +03:00
|
|
|
tsg->state = TSG_STATE_CHANNEL_CLOSE_PENDING;
|
|
|
|
}
|
2012-12-13 21:40:46 +04:00
|
|
|
|
2012-12-13 05:02:56 +04:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2014-11-26 00:55:39 +03:00
|
|
|
/**
|
|
|
|
* @brief
|
|
|
|
*
|
|
|
|
* @param[in] tsg
|
|
|
|
* @param[in] data
|
|
|
|
* @param[in] length
|
|
|
|
* @return < 0 on error; 0 if not enough data is available (non blocking mode); > 0 bytes to read
|
|
|
|
*/
|
|
|
|
|
2012-10-09 11:26:39 +04:00
|
|
|
int tsg_read(rdpTsg* tsg, BYTE* data, UINT32 length)
|
2012-04-24 00:33:18 +04:00
|
|
|
{
|
2013-10-11 13:07:33 +04:00
|
|
|
rdpRpc* rpc;
|
2015-02-01 21:09:28 +03:00
|
|
|
int status = 0;
|
2013-07-04 22:42:40 +04:00
|
|
|
|
2015-01-13 21:50:46 +03:00
|
|
|
if (!tsg)
|
2013-10-11 13:07:33 +04:00
|
|
|
return -1;
|
2013-07-04 22:42:40 +04:00
|
|
|
|
2013-10-11 13:07:33 +04:00
|
|
|
rpc = tsg->rpc;
|
2012-04-24 00:33:18 +04:00
|
|
|
|
2013-12-21 03:22:29 +04:00
|
|
|
if (rpc->transport->layer == TRANSPORT_LAYER_CLOSED)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "tsg_read error: connection lost");
|
2013-12-21 03:22:29 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-11-25 23:25:26 +03:00
|
|
|
do
|
2014-05-21 19:32:14 +04:00
|
|
|
{
|
2015-02-01 21:09:28 +03:00
|
|
|
status = rpc_client_receive_pipe_read(rpc, data, (size_t) length);
|
2014-11-25 23:25:26 +03:00
|
|
|
|
2015-02-01 21:09:28 +03:00
|
|
|
if (status < 0)
|
|
|
|
return -1;
|
2014-11-25 23:25:26 +03:00
|
|
|
|
2015-02-02 19:50:56 +03:00
|
|
|
if (!status && !rpc->transport->blocking)
|
2014-05-21 19:32:14 +04:00
|
|
|
return 0;
|
2012-11-15 04:51:45 +04:00
|
|
|
|
2014-11-25 23:25:26 +03:00
|
|
|
if (rpc->transport->layer == TRANSPORT_LAYER_CLOSED)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "tsg_read error: connection lost");
|
2014-11-25 23:25:26 +03:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-02-01 21:09:28 +03:00
|
|
|
if (status > 0)
|
|
|
|
break;
|
2014-05-21 19:32:14 +04:00
|
|
|
|
2015-02-02 19:50:56 +03:00
|
|
|
if (rpc->transport->blocking)
|
|
|
|
{
|
|
|
|
while (WaitForSingleObject(rpc->client->PipeEvent, 0) != WAIT_OBJECT_0)
|
|
|
|
{
|
|
|
|
if (tsg_check(tsg) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
WaitForSingleObject(rpc->client->PipeEvent, 100);
|
|
|
|
}
|
|
|
|
}
|
2012-10-30 22:49:18 +04:00
|
|
|
}
|
2015-02-02 19:50:56 +03:00
|
|
|
while (rpc->transport->blocking);
|
2014-05-21 19:32:14 +04:00
|
|
|
|
2015-02-01 21:09:28 +03:00
|
|
|
return status;
|
2012-04-24 00:33:18 +04:00
|
|
|
}
|
|
|
|
|
2012-10-09 11:26:39 +04:00
|
|
|
int tsg_write(rdpTsg* tsg, BYTE* data, UINT32 length)
|
2012-03-26 10:45:01 +04:00
|
|
|
{
|
2014-05-21 19:32:14 +04:00
|
|
|
int status;
|
|
|
|
|
2013-12-21 03:24:29 +04:00
|
|
|
if (tsg->rpc->transport->layer == TRANSPORT_LAYER_CLOSED)
|
|
|
|
{
|
2015-01-13 21:50:46 +03:00
|
|
|
WLog_ERR(TAG, "error, connection lost");
|
2013-12-21 03:24:29 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
status = TsProxySendToServer((handle_t) tsg, data, 1, &length);
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (status < 0)
|
|
|
|
return -1;
|
2014-08-19 20:26:39 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
return length;
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
|
|
|
|
2012-04-24 00:33:18 +04:00
|
|
|
rdpTsg* tsg_new(rdpTransport* transport)
|
2012-03-26 10:45:01 +04:00
|
|
|
{
|
|
|
|
rdpTsg* tsg;
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
tsg = (rdpTsg*) calloc(1, sizeof(rdpTsg));
|
2014-05-30 22:53:10 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!tsg)
|
|
|
|
return NULL;
|
2012-03-26 10:45:01 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
tsg->transport = transport;
|
|
|
|
tsg->settings = transport->settings;
|
2015-02-01 21:09:28 +03:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
tsg->rpc = rpc_new(tsg->transport);
|
2014-05-30 22:53:10 +04:00
|
|
|
|
2014-05-21 19:32:14 +04:00
|
|
|
if (!tsg->rpc)
|
|
|
|
goto out_free;
|
2014-05-30 22:53:10 +04:00
|
|
|
|
2012-03-26 10:45:01 +04:00
|
|
|
return tsg;
|
2014-05-21 19:32:14 +04:00
|
|
|
out_free:
|
|
|
|
free(tsg);
|
|
|
|
return NULL;
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void tsg_free(rdpTsg* tsg)
|
|
|
|
{
|
2014-05-30 22:53:10 +04:00
|
|
|
if (tsg)
|
2012-04-24 00:33:18 +04:00
|
|
|
{
|
2015-01-28 21:46:17 +03:00
|
|
|
if (tsg->bio)
|
|
|
|
{
|
|
|
|
BIO_free(tsg->bio);
|
|
|
|
tsg->bio = NULL;
|
|
|
|
}
|
|
|
|
|
2015-02-01 21:09:28 +03:00
|
|
|
if (tsg->rpc)
|
|
|
|
{
|
|
|
|
rpc_free(tsg->rpc);
|
|
|
|
tsg->rpc = NULL;
|
|
|
|
}
|
|
|
|
|
2014-12-11 19:25:34 +03:00
|
|
|
free(tsg->Hostname);
|
2012-12-12 09:49:15 +04:00
|
|
|
free(tsg->MachineName);
|
2015-02-11 22:27:29 +03:00
|
|
|
|
2012-10-09 07:21:26 +04:00
|
|
|
free(tsg);
|
2012-04-24 00:33:18 +04:00
|
|
|
}
|
2012-03-26 10:45:01 +04:00
|
|
|
}
|
2015-01-28 22:54:03 +03:00
|
|
|
|
|
|
|
long transport_bio_tsg_callback(BIO* bio, int mode, const char* argp, int argi, long argl, long ret)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_write(BIO* bio, const char* buf, int num)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
rdpTsg* tsg = (rdpTsg*) bio->ptr;
|
2015-02-01 21:09:28 +03:00
|
|
|
|
2015-01-28 22:54:03 +03:00
|
|
|
BIO_clear_flags(bio, BIO_FLAGS_WRITE);
|
2015-02-01 21:09:28 +03:00
|
|
|
|
2015-01-28 22:54:03 +03:00
|
|
|
status = tsg_write(tsg, (BYTE*) buf, num);
|
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
{
|
|
|
|
BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
|
|
|
|
}
|
|
|
|
else if (status == 0)
|
|
|
|
{
|
|
|
|
BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
|
|
|
|
WSASetLastError(WSAEWOULDBLOCK);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_set_flags(bio, BIO_FLAGS_WRITE);
|
|
|
|
}
|
|
|
|
|
|
|
|
return status >= 0 ? status : -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_read(BIO* bio, char* buf, int size)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
rdpTsg* tsg = (rdpTsg*) bio->ptr;
|
2015-02-01 21:09:28 +03:00
|
|
|
|
2015-01-28 22:54:03 +03:00
|
|
|
BIO_clear_flags(bio, BIO_FLAGS_READ);
|
2015-02-01 21:09:28 +03:00
|
|
|
|
2015-01-28 22:54:03 +03:00
|
|
|
status = tsg_read(tsg, (BYTE*) buf, size);
|
|
|
|
|
|
|
|
if (status < 0)
|
|
|
|
{
|
|
|
|
BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
|
|
|
|
}
|
|
|
|
else if (status == 0)
|
|
|
|
{
|
|
|
|
BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
|
|
|
|
WSASetLastError(WSAEWOULDBLOCK);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_set_flags(bio, BIO_FLAGS_READ);
|
|
|
|
}
|
|
|
|
|
|
|
|
return status > 0 ? status : -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_puts(BIO* bio, const char* str)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_gets(BIO* bio, char* str, int size)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long transport_bio_tsg_ctrl(BIO* bio, int cmd, long arg1, void* arg2)
|
|
|
|
{
|
|
|
|
if (cmd == BIO_CTRL_FLUSH)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_new(BIO* bio)
|
|
|
|
{
|
|
|
|
bio->init = 1;
|
|
|
|
bio->num = 0;
|
|
|
|
bio->ptr = NULL;
|
|
|
|
bio->flags = BIO_FLAGS_SHOULD_RETRY;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int transport_bio_tsg_free(BIO* bio)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BIO_METHOD transport_bio_tsg_methods =
|
|
|
|
{
|
|
|
|
BIO_TYPE_TSG,
|
|
|
|
"TSGateway",
|
|
|
|
transport_bio_tsg_write,
|
|
|
|
transport_bio_tsg_read,
|
|
|
|
transport_bio_tsg_puts,
|
|
|
|
transport_bio_tsg_gets,
|
|
|
|
transport_bio_tsg_ctrl,
|
|
|
|
transport_bio_tsg_new,
|
|
|
|
transport_bio_tsg_free,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
BIO_METHOD* BIO_s_tsg(void)
|
|
|
|
{
|
|
|
|
return &transport_bio_tsg_methods;
|
|
|
|
}
|