/** * xrdp: A Remote Desktop Protocol server. * * Copyright (C) Jay Sorg 2004-2014 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * mcs layer which implements the Multipoint Communication Service protocol as * specified in [ITU-T T.125] */ #if defined(HAVE_CONFIG_H) #include #endif #include "libxrdp.h" #include "ms-rdpbcgr.h" #include "log.h" /* Forward references */ static int handle_non_tls_client_channel_join_requests(struct xrdp_mcs *self, struct stream *s, int *appid); /*****************************************************************************/ struct xrdp_mcs * xrdp_mcs_create(struct xrdp_sec *owner, struct trans *trans, struct stream *client_mcs_data, struct stream *server_mcs_data) { struct xrdp_mcs *self; self = (struct xrdp_mcs *)g_malloc(sizeof(struct xrdp_mcs), 1); self->sec_layer = owner; self->userid = 1; self->chanid = 1001; self->client_mcs_data = client_mcs_data; self->server_mcs_data = server_mcs_data; self->iso_layer = xrdp_iso_create(self, trans); self->channel_list = list_create(); return self; } /*****************************************************************************/ void xrdp_mcs_delete(struct xrdp_mcs *self) { struct mcs_channel_item *channel_item; int index; int count; if (self == 0) { return; } /* here we have to free the channel items and anything in them */ count = self->channel_list->count; for (index = count - 1; index >= 0; index--) { channel_item = (struct mcs_channel_item *) list_get_item(self->channel_list, index); g_free(channel_item); } list_delete(self->channel_list); xrdp_iso_delete(self->iso_layer); /* make sure we get null pointer exception if struct is used again. */ LOG_DEVEL(LOG_LEVEL_TRACE, "xrdp_mcs_delete processed"); g_memset(self, 0, sizeof(struct xrdp_mcs)) ; g_free(self); } /*****************************************************************************/ /* Send an [ITU-T T.125] DomainMCSPDU message with type ChannelJoinConfirm */ /* returns error = 1 ok = 0 */ static int xrdp_mcs_send_cjcf(struct xrdp_mcs *self, int userid, int chanid) { struct stream *s; make_stream(s); init_stream(s, 8192); if (xrdp_iso_init(self->iso_layer, s) != 0) { free_stream(s); LOG(LOG_LEVEL_ERROR, "xrdp_mcs_send_cjcf: xrdp_iso_init failed"); return 1; } /* The DomainMCSPDU choice index is a 6-bit int with the next bit as the bit field of the two optional fields in the struct (channelId, nonStandard) */ out_uint8(s, (MCS_CJCF << 2) | 0x02); /* DomainMCSPDU choice index, channelId field is present, nonStandard field is not present */ out_uint8(s, 0); /* result choice index 0 = rt-successful */ out_uint16_be(s, userid); /* initiator */ out_uint16_be(s, chanid); /* requested */ out_uint16_be(s, chanid); /* channelId (OPTIONAL) */ s_mark_end(s); LOG_DEVEL(LOG_LEVEL_TRACE, "Sending [ITU-T T.125] ChannelJoinConfirm " "result SUCCESS, initiator %d, requested %d, " "channelId %d", userid, chanid, chanid); if (xrdp_iso_send(self->iso_layer, s) != 0) { free_stream(s); LOG(LOG_LEVEL_ERROR, "Sening [ITU-T T.125] ChannelJoinConfirm failed"); return 1; } free_stream(s); return 0; } /*****************************************************************************/ /* Reads the header of a DomainMCSPDU and gets the appid * * @return 0 for success */ static int get_domain_mcs_pdu_header(struct xrdp_mcs *self, struct stream *s, int *appid) { int opcode; if (xrdp_iso_recv(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "xrdp_mcs_recv: xrdp_iso_recv failed"); return 1; } if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T T.125] DomainMCSPDU")) { return 1; } /* The DomainMCSPDU choice index is a 6-bit int with the 2 least significant bits of the byte as padding */ in_uint8(s, opcode); *appid = opcode >> 2; /* 2-bit padding */ LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DomainMCSPDU choice index %d", *appid); return 0; } /*****************************************************************************/ /* * Processes an [ITU-T T.125] DomainMCSPDU message. * * Note: DomainMCSPDU messages use the ALIGNED BASIC-PER (Packed Encoding Rules) * from [ITU-T X.691]. * * returns error */ int xrdp_mcs_recv(struct xrdp_mcs *self, struct stream *s, int *chan) { int appid; int len; if (get_domain_mcs_pdu_header(self, s, &appid) != 0) { return 1; } if (self->expecting_channel_join_requests) { if (handle_non_tls_client_channel_join_requests(self, s, &appid) != 0) { return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] completed"); self->expecting_channel_join_requests = 0; } if (appid == MCS_DPUM) /* Disconnect Provider Ultimatum */ { LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DisconnectProviderUltimatum"); LOG(LOG_LEVEL_DEBUG, "Received disconnection request"); return 1; } if (appid != MCS_SDRQ) { LOG(LOG_LEVEL_ERROR, "Received [ITU-T T.125] DomainMCSPDU " "choice index %d is unknown. Expected the DomainMCSPDU to " "contain the type SendDataRequest with index %d", appid, MCS_SDRQ); return 1; } if (!s_check_rem_and_log(s, 6, "Parsing [ITU-T T.125] SendDataRequest")) { return 1; } in_uint8s(s, 2); /* initiator */ in_uint16_be(s, *chan); /* channelId */ in_uint8s(s, 1); /* dataPriority (4-bits), segmentation (2-bits), padding (2-bits) */ in_uint8(s, len); /* userData Length (byte 1) */ if ((len & 0xC0) == 0x80) { /* From [ITU-T X.691] 11.9.3.7 encoding a length determinant if "n" is greater than 127 and less than 16K, then n is encoded using 2 bytes. The first byte will have the two highest order bits set to 1 and 0 (ie. len & 0xC0 == 0x80) and the length is encoded as remaining 14 bits of the two bytes (ie. len & 0x3fff). */ if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T T.125] SendDataRequest userData Length")) { return 1; } in_uint8s(s, 1); /* userData Length (byte 2) */ } else if ((len & 0xC0) == 0xC0) { /* From [ITU-T X.691] 11.9.3.8 encoding a length determinant if "n" is greater than 16K, then the list of items is fragmented with the length of the first fragment encoded using 1 byte. The two highest order bits are set to 1 and 1 (ie. len & 0xC0 == 0xC0) and the remaining 6 bits contain a multiplyer for 16K (ie. n = (len & 0x3f) * 0x3f) */ LOG(LOG_LEVEL_ERROR, "[ITU-T T.125] SendDataRequest with length greater " "than 16K is not supported. len 0x%2.2x", len); return 1; } LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] SendDataRequest " "initiator (ignored), channelId %d, dataPriority (ignored), " "segmentation (ignored), userData Length (ignored)", *chan); return 0; } /*****************************************************************************/ /** * Parse the identifier and length of a [ITU-T X.690] BER (Basic Encoding Rules) * structure header. * * @param self * @param s [in] - the stream to read from * @param tag_val [in] - the expected tag value * @param len [out] - the length of the structure * @returns error */ static int xrdp_mcs_ber_parse_header(struct xrdp_mcs *self, struct stream *s, int tag_val, int *len) { int tag; int l; int i; if (tag_val > 0xff) { if (!s_check_rem_and_log(s, 2, "Parsing [ITU-T X.690] Identifier")) { return 1; } in_uint16_be(s, tag); } else { if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T X.690] Identifier")) { return 1; } in_uint8(s, tag); } if (tag != tag_val) { LOG(LOG_LEVEL_ERROR, "Parsed [ITU-T X.690] Identifier: " "expected 0x%4.4x, actual 0x%4.4x", tag_val, tag); return 1; } if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T X.690] Length")) { return 1; } in_uint8(s, l); if (l & 0x80) { l = l & ~0x80; *len = 0; while (l > 0) { if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T X.690] Length")) { return 1; } in_uint8(s, i); *len = (*len << 8) | i; l--; } } else { *len = l; } LOG_DEVEL(LOG_LEVEL_TRACE, "Parsed BER header [ITU-T X.690] " "Identifier 0x%4.4x, Length %d", tag, *len); return 0; } /*****************************************************************************/ /* Parses a [ITU-T T.125] DomainParameters structure encoded using BER */ /* returns error */ static int xrdp_mcs_parse_domain_params(struct xrdp_mcs *self, struct stream *s) { int len; if (xrdp_mcs_ber_parse_header(self, s, MCS_TAG_DOMAIN_PARAMS, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] DomainParameters failed"); return 1; } if (len < 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] DomainParameters length field is " "invalid. Expected >= 0, actual %d", len); return 1; } if (!s_check_rem_and_log(s, len, "Parsing [ITU-T T.125] DomainParameters")) { return 1; } in_uint8s(s, len); /* skip all fields */ return !s_check_rem_and_log(s, 0, "Parsing [ITU-T T.125] DomainParameters"); } /*****************************************************************************/ /* Process a [ITU-T T.125] Connect-Initial message encoded using BER */ /* returns error */ static int xrdp_mcs_recv_connect_initial(struct xrdp_mcs *self) { int len; struct stream *s; s = libxrdp_force_read(self->iso_layer->trans); if (s == 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] Connect-Initial failed"); return 1; } if (xrdp_iso_recv(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] Connect-Initial failed"); return 1; } if (xrdp_mcs_ber_parse_header(self, s, MCS_CONNECT_INITIAL, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial failed"); return 1; } if (xrdp_mcs_ber_parse_header(self, s, BER_TAG_OCTET_STRING, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial callingDomainSelector failed"); return 1; } if (len < 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial callingDomainSelector length field is " "invalid. Expected >= 0, actual %d", len); return 1; } if (!s_check_rem_and_log(s, len, "Parsing [ITU-T T.125] Connect-Initial callingDomainSelector")) { return 1; } in_uint8s(s, len); /* [ITU-T T.125] Connect-Initial callingDomainSelector */ if (xrdp_mcs_ber_parse_header(self, s, BER_TAG_OCTET_STRING, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial calledDomainSelector failed"); return 1; } if (len < 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial calledDomainSelector length field is " "invalid. Expected >= 0, actual %d", len); return 1; } if (!s_check_rem_and_log(s, len, "Parsing [ITU-T T.125] Connect-Initial calledDomainSelector")) { return 1; } in_uint8s(s, len); /* [ITU-T T.125] Connect-Initial calledDomainSelector */ if (xrdp_mcs_ber_parse_header(self, s, BER_TAG_BOOLEAN, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial upwardFlag failed"); return 1; } if (len < 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial upwardFlag length field is " "invalid. Expected >= 0, actual %d", len); return 1; } if (!s_check_rem_and_log(s, len, "Parsing [ITU-T T.125] Connect-Initial upwardFlag")) { return 1; } in_uint8s(s, len); /* [ITU-T T.125] Connect-Initial upwardFlag */ /* [ITU-T T.125] Connect-Initial targetParameters */ if (xrdp_mcs_parse_domain_params(self, s) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial targetParameters failed"); return 1; } /* [ITU-T T.125] Connect-Initial minimumParameters */ if (xrdp_mcs_parse_domain_params(self, s) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial minimumParameters failed"); return 1; } /* [ITU-T T.125] Connect-Initial maximumParameters */ if (xrdp_mcs_parse_domain_params(self, s) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial maximumParameters failed"); return 1; } if (xrdp_mcs_ber_parse_header(self, s, BER_TAG_OCTET_STRING, &len) != 0) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial userData failed"); return 1; } /* mcs userData can not be zero length */ if ((len <= 0) || (len > 16 * 1024)) { LOG(LOG_LEVEL_ERROR, "Parsing [ITU-T T.125] Connect-Initial userData: invalid length. " "Expected min 1, max %d; Actual %d", 16 * 1024, len); return 1; } if (!s_check_rem_and_log(s, len, "Parsing [ITU-T T.125] Connect-Initial userData")) { return 1; } LOG_DEVEL(LOG_LEVEL_TRACE, "Received header [ITU-T T.125] Connect-Initial " "callingDomainSelector (ignored), calledDomainSelector (ignored), " "upwardFlag (ignored), targetParameters (ignored), " "minimumParameters (ignored), maximumParameters (ignored), " "userData (copied to client_mcs_data)"); /* make a copy of client mcs data */ init_stream(self->client_mcs_data, len); out_uint8a(self->client_mcs_data, s->p, len); /* [ITU-T T.125] Connect-Initial userData */ in_uint8s(s, len); s_mark_end(self->client_mcs_data); if (!s_check_end_and_log(s, "MCS protocol error [ITU-T T.125] Connect-Initial")) { return 1; } return 0; } /*****************************************************************************/ /* Processes a [ITU-T T.25] DomainMCSPDU with type ErectDomainRequest * * Note: a parsing example can be found in [MS-RDPBCGR] 4.1.5 * * returns error */ static int xrdp_mcs_recv_edrq(struct xrdp_mcs *self) { int opcode; struct stream *s; s = libxrdp_force_read(self->iso_layer->trans); if (s == 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] ErectDomainRequest failed"); return 1; } if (xrdp_iso_recv(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] ErectDomainRequest failed"); return 1; } if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T T.125] DomainMCSPDU")) { return 1; } /* The DomainMCSPDU choice index is a 6-bit int with the next bit as the bit field of the optional field in the struct */ in_uint8(s, opcode); if ((opcode >> 2) != MCS_EDRQ) { LOG(LOG_LEVEL_ERROR, "Parsed [ITU-T T.125] DomainMCSPDU choice index " "expected %d, received %d", MCS_EDRQ, (opcode >> 2)); return 1; } if (!s_check_rem_and_log(s, 4, "Parsing [ITU-T T.125] ErectDomainRequest")) { return 1; } in_uint8s(s, 2); /* subHeight */ in_uint8s(s, 2); /* subInterval */ LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DomainMCSPDU " "choice index %d (ErectDomainRequest)", (opcode >> 2)); LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] ErectDomainRequest " "subHeight (ignored), subInterval (ignored), " "nonStandard (%s)", (opcode & 2) ? "present" : "not present"); /* * [MS-RDPBCGR] 2.2.1.5 says that the mcsEDrq field is 5 bytes (which have * already been read into the opcode and previous fields), so the * nonStandard field should never be present. */ if (opcode & 2) /* ErectDomainRequest v3 nonStandard optional field is present? */ { if (!s_check_rem_and_log(s, 2, "Parsing [ITU-T T.125] ErectDomainRequest nonStandard")) { return 1; } in_uint16_be(s, self->userid); /* NonStandardParameter.key NonStandardParameter.data */ LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DomainMCSPDU " "choice index %d (ErectDomainRequest)", (opcode >> 2)); } if (!s_check_end_and_log(s, "MCS protocol error [ITU-T T.125] ErectDomainRequest")) { return 1; } return 0; } /*****************************************************************************/ /* Processes a [ITU-T T.25] DomainMCSPDU with type AttachUserRequest * * Note: a parsing example can be found in [MS-RDPBCGR] 4.1.6 * * returns error */ static int xrdp_mcs_recv_aurq(struct xrdp_mcs *self) { int opcode; struct stream *s; s = libxrdp_force_read(self->iso_layer->trans); if (s == 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] AttachUserRequest failed"); return 1; } if (xrdp_iso_recv(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.125] AttachUserRequest failed"); return 1; } if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T T.125] DomainMCSPDU")) { return 1; } /* The DomainMCSPDU choice index is a 6-bit int with the next bit as the bit field of the optional field in the struct */ in_uint8(s, opcode); if ((opcode >> 2) != MCS_AURQ) { LOG(LOG_LEVEL_ERROR, "Parsed [ITU-T T.125] DomainMCSPDU choice index " "expected %d, received %d", MCS_AURQ, (opcode >> 2)); return 1; } /* * [MS-RDPBCGR] 2.2.1.6 says that the mcsAUrq field is 1 bytes (which have * already been read into the opcode), so the nonStandard field should * never be present. */ if (opcode & 2) { if (!s_check_rem_and_log(s, 2, "Parsing [ITU-T T.125] AttachUserRequest nonStandard")) { return 1; } in_uint16_be(s, self->userid); /* NonStandardParameter.key NonStandardParameter.data */ } LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DomainMCSPDU " "choice index %d (AttachUserRequest)", (opcode >> 2)); LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] AttachUserRequest " "nonStandard (%s)", (opcode & 2) ? "present" : "not present"); if (!s_check_end_and_log(s, "MCS protocol error [ITU-T T.125] AttachUserRequest")) { return 1; } return 0; } /*****************************************************************************/ /* Send a [ITU-T T.125] DomainMCSPDU with type AttachUserConfirm. * * Note: a parsing example can be found in [MS-RDPBCGR] 4.1.7 * * returns error */ static int xrdp_mcs_send_aucf(struct xrdp_mcs *self) { struct stream *s; make_stream(s); init_stream(s, 8192); if (xrdp_iso_init(self->iso_layer, s) != 0) { free_stream(s); LOG(LOG_LEVEL_ERROR, "xrdp_mcs_send_aucf: xrdp_iso_init failed"); return 1; } out_uint8(s, ((MCS_AUCF << 2) | 2)); /* AttachUserConfirm optional field initiator is present */ out_uint8s(s, 1); /* result = 0 rt-successful */ out_uint16_be(s, self->userid); /* initiator */ s_mark_end(s); LOG_DEVEL(LOG_LEVEL_TRACE, "Sending [ITU-T T.125] DomainMCSPDU " "of type AttachUserConfirm: result SUCCESS, initiator %d", self->userid); if (xrdp_iso_send(self->iso_layer, s) != 0) { free_stream(s); LOG(LOG_LEVEL_ERROR, "Sending [ITU-T T.125] AttachUserConfirm failed"); return 1; } free_stream(s); return 0; } /*****************************************************************************/ /* Processes a [ITU-T T.25] DomainMCSPDU with type ChannelJoinRequest * * Note: a parsing example can be found in [MS-RDPBCGR] 4.1.8.1.1 * * returns error */ static int xrdp_mcs_recv_cjrq(struct xrdp_mcs *self, int *channel_id) { int opcode; struct stream *s; int initiator; s = libxrdp_force_read(self->iso_layer->trans); if (s == 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.25] ChannelJoinRequest failed"); return 1; } if (xrdp_iso_recv(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "Processing [ITU-T T.25] ChannelJoinRequest failed"); return 1; } if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T T.125] DomainMCSPDU")) { return 1; } in_uint8(s, opcode); LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] DomainMCSPDU " "choice index %d (ChannelJoinRequest)", (opcode >> 2)); if ((opcode >> 2) != MCS_CJRQ) { LOG(LOG_LEVEL_ERROR, "Parsed [ITU-T T.125] DomainMCSPDU choice index " "expected %d, received %d", MCS_CJRQ, (opcode >> 2)); return 1; } if (!s_check_rem_and_log(s, 4, "Parsing [ITU-T T.125] ChannelJoinRequest")) { return 1; } in_uint16_be(s, initiator); in_uint16_be(s, *channel_id); /* * [MS-RDPBCGR] 2.2.1.8 says that the mcsAUrq field is 5 bytes (which have * already been read into the opcode and other fields), so the nonStandard * field should never be present. */ if (opcode & 2) { if (!s_check_rem_and_log(s, 2, "Parsing [ITU-T T.125] ChannelJoinRequest nonStandard")) { return 1; } in_uint8s(s, 2); /* NonStandardParameter.key NonStandardParameter.data */ } LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] ChannelJoinRequest " "initiator %d, channelId %d, " "nonStandard (%s)", initiator, *channel_id, (opcode & 2) ? "present" : "not present"); if (!s_check_end_and_log(s, "MCS protocol error [ITU-T T.125] ChannelJoinRequest")) { return 1; } return 0; } /*****************************************************************************/ /* Write the identifier and length of a [ITU-T X.690] BER (Basic Encoding Rules) * structure header. * returns error */ static int xrdp_mcs_ber_out_header(struct xrdp_mcs *self, struct stream *s, int tag_val, int len) { if (tag_val > 0xff) { out_uint16_be(s, tag_val); } else { out_uint8(s, tag_val); } if (len >= 0x80) { out_uint8(s, 0x82); out_uint16_be(s, len); } else { out_uint8(s, len); } LOG_DEVEL(LOG_LEVEL_TRACE, "Adding header [ITU-T X.690] Identifier %d, Length %d", tag_val, len); return 0; } /*****************************************************************************/ /* returns error */ static int xrdp_mcs_ber_out_int8(struct xrdp_mcs *self, struct stream *s, int value) { xrdp_mcs_ber_out_header(self, s, BER_TAG_INTEGER, 1); out_uint8(s, value); return 0; } #if 0 /* not used */ /*****************************************************************************/ /* returns error */ static int xrdp_mcs_ber_out_int16(struct xrdp_mcs *self, struct stream *s, int value) { xrdp_mcs_ber_out_header(self, s, BER_TAG_INTEGER, 2); out_uint8(s, (value >> 8)); out_uint8(s, value); return 0; } #endif /*****************************************************************************/ /* returns error */ static int xrdp_mcs_ber_out_int24(struct xrdp_mcs *self, struct stream *s, int value) { xrdp_mcs_ber_out_header(self, s, BER_TAG_INTEGER, 3); out_uint8(s, (value >> 16)); out_uint8(s, (value >> 8)); out_uint8(s, value); return 0; } /*****************************************************************************/ /* returns error */ static int xrdp_mcs_out_domain_params(struct xrdp_mcs *self, struct stream *s, int max_channels, int max_users, int max_tokens, int max_pdu_size) { xrdp_mcs_ber_out_header(self, s, MCS_TAG_DOMAIN_PARAMS, 26); xrdp_mcs_ber_out_int8(self, s, max_channels); xrdp_mcs_ber_out_int8(self, s, max_users); xrdp_mcs_ber_out_int8(self, s, max_tokens); xrdp_mcs_ber_out_int8(self, s, 1); /* numPriorities */ xrdp_mcs_ber_out_int8(self, s, 0); /* minThroughput */ xrdp_mcs_ber_out_int8(self, s, 1); /* maxHeight */ xrdp_mcs_ber_out_int24(self, s, max_pdu_size); xrdp_mcs_ber_out_int8(self, s, 2); /* protocolVersion */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [ITU-T T.125] DomainParameters " "maxChannelIds %d, maxUserIds %d, maxTokenIds %d, numPriorities 1, " "minThroughput 0 B/s, maxHeight 1, maxMCSPDUsize %d, " "protocolVersion 2", max_channels, max_users, max_tokens, max_pdu_size); return 0; } /*****************************************************************************/ /* Write an [ITU-T T.124] ConnectData (ALIGNED variant of BASIC-PER) message * with ConnectGCCPDU, ConferenceCreateResponse, * and [MS-RDPBCGR] Server Data Blocks as user data. */ static int xrdp_mcs_out_gcc_data(struct xrdp_sec *self) { struct stream *s; int num_channels_even; int num_channels; int index; int channel; int gcc_size; char *gcc_size_ptr; char *ud_ptr; int header_length = 0; int server_cert_len = 0; int public_key_blob_len = 0; int key_len = 0; int bit_len = 0; int data_len = 0; int modulus_len = 0; num_channels = self->mcs_layer->channel_list->count; num_channels_even = num_channels + (num_channels & 1); s = &(self->server_mcs_data); init_stream(s, 8192); /* [ITU-T T.124] ConnectData (ALIGNED variant of BASIC-PER) */ out_uint16_be(s, 5); /* = 0x00 0x05 */ /* t124Identifier choice index = 0 (object) */ /* object length = 5 */ out_uint16_be(s, 0x14); /* t124Identifier.object = ??? (0x00 0x14 0x7c 0x00 0x01) */ out_uint8(s, 0x7c); out_uint16_be(s, 1); /* -- */ out_uint8(s, 0x2a); /* connectPDU length = 42 */ /* connectPDU octet string of type ConnectGCCPDU (unknown where this octet string is defined to be of type ConnectGCCPDU) */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [ITU-T T.124] ConnectData " "t124Identifier.object 0x00 0x14 0x7c 0x00 0x01, connectPDU length %d", 0x2a); /* [ITU-T T.124] ConnectGCCPDU (ALIGNED variant of BASIC-PER) */ out_uint8(s, 0x14); /* ConnectGCCPDU choice index 1 = ConferenceCreateResponse with userData present */ /* [ITU-T T.124] ConferenceCreateResponse (ALIGNED variant of BASIC-PER) */ out_uint8(s, 0x76); /* nodeID = 31219 - 1001 (PER offset for min value) = 30218 (big-endian 0x760a) */ out_uint8(s, 0x0a); out_uint8(s, 1); /* tag length */ out_uint8(s, 1); /* tag */ out_uint8(s, 0); /* result = 0 (success) */ out_uint16_le(s, 0xc001); /* userData set count = 1 (0x01), userData.isPresent = 0x80 (yes) | userData.key choice index = 0x40 (1 = h221NonStandard) */ out_uint8(s, 0); /* userData.key.h221NonStandard length = 4 - 4 (PER offset for min value) (H221NonStandardIdentifier is an octet string SIZE (4..255)) = 0 */ /* [ITU-T H.221] H221NonStandardIdentifier uses country codes and manufactuer codes from [ITU-T T.35]. Unknown why these values are used, maybe this is just copied from the [MS-RDPBCGR] 4.1.4 example which uses the value "McDn" */ out_uint8(s, 0x4d); /* M */ out_uint8(s, 0x63); /* c */ out_uint8(s, 0x44); /* D */ out_uint8(s, 0x6e); /* n */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [ITU-T T.124] ConferenceCreateResponse " "nodeID %d, result SUCCESS", 0x760a + 1001); /* ConferenceCreateResponse.userData.key.value (octet string) */ /* GCC Response Total Length - 2 bytes , set later */ gcc_size_ptr = s->p; /* RDPGCCUserDataResponseLength */ out_uint8s(s, 2); ud_ptr = s->p; /* User Data */ /* [MS-RDPBCGR] TS_UD_HEADER */ out_uint16_le(s, SEC_TAG_SRV_INFO); /* type */ if (self->mcs_layer->iso_layer->rdpNegData) { out_uint16_le(s, 12); /* length */ } else { out_uint16_le(s, 8); /* length */ } /* [MS-RDPBCGR] TS_UD_SC_CORE */ out_uint8(s, 4); /* version (0x00080004 = rdp5, 0x00080001 = rdp4) */ out_uint8(s, 0); out_uint8(s, 8); out_uint8(s, 0); /* version (last byte) */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct header [MS-RDPBCGR] TS_UD_HEADER " "type 0x%4.4x, length %d", SEC_TAG_SRV_INFO, self->mcs_layer->iso_layer->rdpNegData ? 12 : 8); LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_CORE " " version 0x%8.8x", 0x00080004); if (self->mcs_layer->iso_layer->rdpNegData) { /* RequestedProtocol */ out_uint32_le(s, self->mcs_layer->iso_layer->requestedProtocol); /* clientRequestedProtocols */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_CORE " " clientRequestedProtocols 0x%8.8x", self->mcs_layer->iso_layer->requestedProtocol); } /* [MS-RDPBCGR] TS_UD_HEADER */ out_uint16_le(s, SEC_TAG_SRV_CHANNELS); /* type */ out_uint16_le(s, 8 + (num_channels_even * 2)); /* length */ /* [MS-RDPBCGR] TS_UD_SC_NET */ out_uint16_le(s, MCS_GLOBAL_CHANNEL); /* 1003, 0x03eb main channel (MCSChannelId) */ out_uint16_le(s, num_channels); /* number of other channels (channelCount) */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct header [MS-RDPBCGR] TS_UD_HEADER " "type 0x%4.4x, length %d", SEC_TAG_SRV_CHANNELS, 8 + (num_channels_even * 2)); LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_NET " "MCSChannelId %d, channelCount %d", MCS_GLOBAL_CHANNEL, num_channels); for (index = 0; index < num_channels_even; index++) { if (index < num_channels) { channel = MCS_GLOBAL_CHANNEL + (index + 1); out_uint16_le(s, channel); /* channelIdArray[index] (channel allocated) */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_NET channelIdArray[%d] " "channelId %d", index, channel); } else { out_uint16_le(s, 0); /* padding or channelIdArray[index] (channel not allocated) */ } } if (self->rsa_key_bytes == 64 || self->rsa_key_bytes == 256) { if (self->rsa_key_bytes == 64) { header_length = 0x00ec; /* length = 236 */ server_cert_len = 0xb8; /* serverCertLen (184 bytes) */ public_key_blob_len = 0x005c; /* wPublicKeyBlobLen (92 bytes) */ key_len = 0x0048; /* keylen (72 bytes = (bitlen / 8) modulus + 8 padding) */ bit_len = 512; /* bitlen = 512 */ data_len = 63; /* datalen (63 = (bitlen / 8) - 1) */ modulus_len = 64; } else /* if (self->rsa_key_bytes == 256) */ { header_length = 0x01ac; /* length = 428 */ server_cert_len = 0x178; /* serverCertLen (376 bytes) */ public_key_blob_len = 0x011c; /* wPublicKeyBlobLen (284 bytes) */ key_len = 0x0108; /* keylen (264 bytes = (bitlen / 8) modulus + 8 padding) */ bit_len = 2048; /* bitlen = 2048 */ data_len = 255; /* datalen (255 = (bitlen / 8) - 1) */ modulus_len = 256; } LOG(LOG_LEVEL_DEBUG, "using %d bit RSA key", bit_len); /* [MS-RDPBCGR] TS_UD_HEADER */ out_uint16_le(s, SEC_TAG_SRV_CRYPT); /* type */ out_uint16_le(s, header_length); /* length */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct header [MS-RDPBCGR] TS_UD_HEADER " "type 0x%4.4x, length %d", SEC_TAG_SRV_CRYPT, header_length); /* [MS-RDPBCGR] TS_UD_SC_SEC1 */ out_uint32_le(s, self->crypt_method); /* encryptionMethod */ out_uint32_le(s, self->crypt_level); /* encryptionLevel */ out_uint32_le(s, 32); /* serverRandomLen */ out_uint32_le(s, server_cert_len); /* serverCertLen */ out_uint8a(s, self->server_random, 32); /* serverRandom */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_SEC1 " "encryptionMethod 0x%8.8x, encryptionLevel 0x%8.8x, " "serverRandomLen 32, serverCertLen %d, serverRandom (omitted), ", self->crypt_method, self->crypt_level, server_cert_len); /* (field serverCertificate) [MS-RDPBCGR] SERVER_CERTIFICATE */ /* HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ */ /* TermService\Parameters\Certificate */ out_uint32_le(s, 1); /* dwVersion (1 = PROPRIETARYSERVERCERTIFICATE) */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] SERVER_CERTIFICATE " "dwVersion.certChainVersion 1 (CERT_CHAIN_VERSION_1), " "dwVersion.t 0 (permanent)"); /* [MS-RDPBCGR] PROPRIETARYSERVERCERTIFICATE */ out_uint32_le(s, 1); /* dwSigAlgId (1 = RSA) */ out_uint32_le(s, 1); /* dwKeyAlgId (1 = RSA) */ out_uint16_le(s, SEC_TAG_PUBKEY); /* wPublicKeyBlobType (BB_RSA_KEY_BLOB) */ out_uint16_le(s, public_key_blob_len); /* wPublicKeyBlobLen */ /* (field PublicKeyBlob) [MS-RDPBCGR] RSA_PUBLIC_KEY */ out_uint32_le(s, SEC_RSA_MAGIC); /* magic (0x31415352 'RSA1') */ out_uint32_le(s, key_len); /* keylen */ out_uint32_le(s, bit_len); /* bitlen */ out_uint32_le(s, data_len); /* datalen */ out_uint8a(s, self->pub_exp, 4); /* pubExp */ out_uint8a(s, self->pub_mod, modulus_len); /* modulus */ out_uint8s(s, 8); /* modulus zero padding */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] RSA_PUBLIC_KEY " "magic 0x%8.8x, keylen %d, bitlen %d, datalen %d, " "pubExp , modulus , ", SEC_RSA_MAGIC, key_len, bit_len, data_len); out_uint16_le(s, SEC_TAG_KEYSIG); /* wSignatureBlobType (0x0008 RSA) */ out_uint16_le(s, 72); /* wSignatureBlobLen */ out_uint8a(s, self->pub_sig, 64); /* SignatureBlob */ out_uint8s(s, 8); /* modulus zero padding */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] PROPRIETARYSERVERCERTIFICATE " "dwKeyAlgId 1, " "wPublicKeyBlobType 0x%4.4x, " "wPublicKeyBlobLen %d, PublicKeyBlob " "wSignatureBlobType 0x%4.4x, " "wSignatureBlobLen %d, " "SignatureBlob ", SEC_TAG_PUBKEY, public_key_blob_len, SEC_TAG_KEYSIG, 72); } else if (self->rsa_key_bytes == 0) /* no security */ { LOG(LOG_LEVEL_DEBUG, "using no security"); /* [MS-RDPBCGR] TS_UD_HEADER */ out_uint16_le(s, SEC_TAG_SRV_CRYPT); /* type*/ out_uint16_le(s, 12); /* length */ /* [MS-RDPBCGR] TS_UD_SC_SEC1 */ out_uint32_le(s, self->crypt_method); /* encryptionMethod */ out_uint32_le(s, self->crypt_level); /* encryptionLevel */ LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct header [MS-RDPBCGR] TS_UD_HEADER " "type 0x%4.4x, length %d", SEC_TAG_SRV_CRYPT, 12); LOG_DEVEL(LOG_LEVEL_TRACE, "Adding struct [MS-RDPBCGR] TS_UD_SC_SEC1 " "encryptionMethod 0x%8.8x, encryptionMethod 0x%8.8x", self->crypt_method, self->crypt_level); } else { LOG(LOG_LEVEL_WARNING, "Unsupported xrdp_sec.rsa_key_bytes value: %d, the client " "will not be sent a [MS-RDPBCGR] TS_UD_SC_SEC1 message.", self->rsa_key_bytes); } s_mark_end(s); gcc_size = (int)(s->end - ud_ptr) | 0x8000; gcc_size_ptr[0] = gcc_size >> 8; gcc_size_ptr[1] = gcc_size; return 0; } /*****************************************************************************/ /* Send an [ITU-T T.125] Connect-Response message. * * Note: the xrdp_mcs_out_gcc_data() function must be called (to populate the * xrdp_mcs.server_mcs_data stream) before this method is called. * * returns error */ static int xrdp_mcs_send_connect_response(struct xrdp_mcs *self) { int data_len; struct stream *s; make_stream(s); init_stream(s, 8192); data_len = (int) (self->server_mcs_data->end - self->server_mcs_data->data); xrdp_iso_init(self->iso_layer, s); //TODO: we should calculate the whole length include MCS_CONNECT_RESPONSE xrdp_mcs_ber_out_header(self, s, MCS_CONNECT_RESPONSE, data_len > 0x80 ? data_len + 38 : data_len + 36); xrdp_mcs_ber_out_header(self, s, BER_TAG_RESULT, 1); out_uint8(s, 0); /* result choice index 0 = rt-successful */ xrdp_mcs_ber_out_header(self, s, BER_TAG_INTEGER, 1); out_uint8(s, 0); /* calledConnectId */ xrdp_mcs_out_domain_params(self, s, 22, 3, 0, 0xfff8); xrdp_mcs_ber_out_header(self, s, BER_TAG_OCTET_STRING, data_len); /* mcs data */ out_uint8a(s, self->server_mcs_data->data, data_len); s_mark_end(s); LOG_DEVEL(LOG_LEVEL_TRACE, "Sending [ITU-T T.125] Connect-Response " "result SUCCESS, calledConnectId 0, " "domainParameters (see xrdp_mcs_out_domain_params() trace logs), " "userData (see xrdp_mcs_out_gcc_data() trace logs and " "hex dump below)"); LOG_DEVEL_HEXDUMP(LOG_LEVEL_TRACE, "[ITU-T T.125] Connect-Response userData", self->server_mcs_data->data, data_len); if (xrdp_iso_send(self->iso_layer, s) != 0) { free_stream(s); LOG(LOG_LEVEL_ERROR, "Sending [ITU-T T.125] Connect-Response failed"); return 1; } free_stream(s); return 0; } /*****************************************************************************/ /* Handle all client channel join requests for a non-TLS connection * * @param self MCS structure * @param s Input stream * @param[in,out] appid Type of the MCS PDU whose header has just been read. * @return 0 for success * * For non-TLS connections, the channel join MCS PDUs are followed by * another MCS PDU. This not the case for TLS connections. * * Called when an MCS PDU header has been read, but the PDU has not * been processed. * * If the PDU is a channel join request, it is processed, and the next * PDU header is read. When we've exhausted all the channel join requests, * the type of the next PDU is passed back to the caller for the caller * to process. * * In order to cater for older clients which may not conform exactly to * the specification, we simply take all the join requests which come in, * and respond to them. * * See :- * - https://github.com/neutrinolabs/xrdp/issues/2166 * - [MS-RDPBCGR] 3.2.5.3.8 and 3.2.5.3.8 */ static int handle_non_tls_client_channel_join_requests(struct xrdp_mcs *self, struct stream *s, int *appid) { int rv = 0; while (*appid == MCS_CJRQ) { int userid; int chanid; if (!s_check_rem_and_log(s, 4, "Parsing [ITU-T T.125] " "ChannelJoinRequest")) { rv = 1; break; } in_uint16_be(s, userid); in_uint16_be(s, chanid); LOG_DEVEL(LOG_LEVEL_TRACE, "Received [ITU-T T.125] ChannelJoinRequest " "initiator 0x%4.4x, channelId 0x%4.4x", userid, chanid); if (xrdp_mcs_send_cjcf(self, userid, chanid) != 0) { LOG(LOG_LEVEL_WARNING, "[ITU-T T.125] Channel join sequence: failed"); } /* Get the next PDU header */ s = libxrdp_force_read(self->iso_layer->trans); if (s == 0) { LOG(LOG_LEVEL_ERROR, "xrdp_mcs_recv: libxrdp_force_read failed"); rv = 1; break; } if (get_domain_mcs_pdu_header(self, s, appid) != 0) { rv = 1; break; } } return rv; } /*****************************************************************************/ /* Handle all client channel join requests for a TLS connection * * @param self MCS structure * @return 0 for success * * When were are about to negotiate a TLS connection, it is important that * we agree on the exact number of client join request / client join confirm * PDUs, so that we get the TLS 'client hello' message exactly when * expected. * * See [MS-RDPBCGR] 3.2.5.3.8 and 3.2.5.3.8 */ static int handle_tls_client_channel_join_requests(struct xrdp_mcs *self) { int index; int rv = 0; static const char *tag = "[MCS Connection Sequence (TLS)]"; /* * Expect a channel join request PDU for each of the static virtual * channels, plus the user channel (self->chanid) and the I/O channel * (MCS_GLOBAL_CHANNEL) */ for (index = 0; index < self->channel_list->count + 2; index++) { int channel_id; LOG(LOG_LEVEL_DEBUG, "%s receive channel join request", tag); if (xrdp_mcs_recv_cjrq(self, &channel_id) != 0) { LOG(LOG_LEVEL_ERROR, "%s receive channel join request failed", tag); rv = 1; break; } LOG(LOG_LEVEL_DEBUG, "%s send channel join confirm", tag); if (xrdp_mcs_send_cjcf(self, self->userid, channel_id) != 0) { LOG(LOG_LEVEL_ERROR, "%s send channel join confirm failed", tag); rv = 1; break; } } return rv; } /*****************************************************************************/ /* Process and send the MCS messages for the RDP Connection Sequence * [MS-RDPBCGR] 1.3.1.1 * * returns error */ int xrdp_mcs_incoming(struct xrdp_mcs *self) { LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] receive connection request"); if (xrdp_mcs_recv_connect_initial(self) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] receive connection request failed"); return 1; } /* in xrdp_sec.c */ if (xrdp_sec_process_mcs_data(self->sec_layer) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] Connect Initial PDU with GCC Conference Create Request failed"); return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] construct connection response"); if (xrdp_mcs_out_gcc_data(self->sec_layer) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] construct connection response failed"); return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] send connection response"); if (xrdp_mcs_send_connect_response(self) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] send connection response failed"); return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] receive erect domain request"); if (xrdp_mcs_recv_edrq(self) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] receive erect domain request failed"); return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] receive attach user request"); if (xrdp_mcs_recv_aurq(self) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] receive attach user request failed"); return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence] send attach user confirm"); if (xrdp_mcs_send_aucf(self) != 0) { LOG(LOG_LEVEL_ERROR, "[MCS Connection Sequence] send attach user confirm failed"); return 1; } if (self->iso_layer->selectedProtocol > PROTOCOL_RDP) { /* TLS connection. Client and server have to agree on MCS channel * join messages, and these have to be processed before the TLS * client hello */ if (handle_tls_client_channel_join_requests(self) != 0) { return 1; } LOG(LOG_LEVEL_DEBUG, "[MCS Connection Sequence (TLS)] completed"); } else { /* Non-TLS connection - channel joins handled in MCS PDU * processing loop */ self->expecting_channel_join_requests = 1; } return 0; } /*****************************************************************************/ /* returns error */ int xrdp_mcs_init(struct xrdp_mcs *self, struct stream *s) { xrdp_iso_init(self->iso_layer, s); s_push_layer(s, mcs_hdr, 8); return 0; } /*****************************************************************************/ /* returns error */ /* Inform the callback that an mcs packet has been sent. This is needed so the module can send any high priority mcs packets like audio. */ static int xrdp_mcs_call_callback(struct xrdp_mcs *self) { int rv; struct xrdp_session *session; rv = 0; /* if there is a callback, call it here */ session = self->sec_layer->rdp_layer->session; if (session != 0) { if (session->callback != 0) { if (session->check_for_app_input) { /* in xrdp_wm.c */ rv = session->callback(session->id, 0x5556, 0, 0, 0, 0); } } else { LOG_DEVEL(LOG_LEVEL_WARNING, "session->callback is NULL"); } } else { LOG_DEVEL(LOG_LEVEL_WARNING, "session is NULL"); } return rv; } /*****************************************************************************/ /* Send a [ITU-T T.125] SendDataIndication message * returns error */ int xrdp_mcs_send(struct xrdp_mcs *self, struct stream *s, int chan) { int len; char *lp; //static int max_len = 0; s_pop_layer(s, mcs_hdr); len = (s->end - s->p) - 8; if (len > 8192 * 2) { LOG(LOG_LEVEL_WARNING, "xrdp_mcs_send: stream size too big: %d bytes", len); } /* The DomainMCSPDU choice index is a 6-bit int with the 2 least significant bits of the byte as padding */ out_uint8(s, MCS_SDIN << 2); /* DomainMCSPDU choice index */ out_uint16_be(s, self->userid); /* initiator */ out_uint16_be(s, chan); /* channelId */ out_uint8(s, 0x70); /* dataPriority (upper 2 bits), segmentation (next 2 bits), padding (4 bits) */ if (len >= 128) { len = len | 0x8000; out_uint16_be(s, len); /* userData length */ } else { out_uint8(s, len); /* userData length */ /* move everything up one byte */ lp = s->p; while (lp < s->end) { lp[0] = lp[1]; lp++; } s->end--; } LOG_DEVEL(LOG_LEVEL_TRACE, "Adding header [ITU-T T.125] SendDataIndication " "initiator %d, channelId %d, dataPriority %d, segmentation 0x0, " "userData length %d", self->userid, chan, 0x70 >> 6, (0x70 >> 4) & 0x03); if (xrdp_iso_send(self->iso_layer, s) != 0) { LOG(LOG_LEVEL_ERROR, "xrdp_mcs_send: xrdp_iso_send failed"); return 1; } /* todo, do we need to call this for every mcs packet, maybe every 5 or so */ if (chan == MCS_GLOBAL_CHANNEL) { xrdp_mcs_call_callback(self); } return 0; } /** * Internal help function to close the socket * @param self */ static void close_rdp_socket(struct xrdp_mcs *self) { if (self->iso_layer != 0) { if (self->iso_layer->trans != 0) { trans_shutdown_tls_mode(self->iso_layer->trans); g_tcp_close(self->iso_layer->trans->sck); self->iso_layer->trans->sck = -1; LOG_DEVEL(LOG_LEVEL_DEBUG, "xrdp_mcs_disconnect - socket closed"); return; } } LOG_DEVEL(LOG_LEVEL_WARNING, "Failed to close socket"); } /*****************************************************************************/ /* returns error */ int xrdp_mcs_disconnect(struct xrdp_mcs *self) { struct stream *s; make_stream(s); init_stream(s, 8192); if (xrdp_iso_init(self->iso_layer, s) != 0) { free_stream(s); close_rdp_socket(self); LOG(LOG_LEVEL_ERROR, "xrdp_mcs_disconnect: xrdp_iso_init failed"); return 1; } out_uint8(s, (MCS_DPUM << 2) | 1); out_uint8(s, 0x80); /* reason (upper 3 bits) (4 = rn-channel-purged)*/ s_mark_end(s); LOG_DEVEL(LOG_LEVEL_TRACE, "Sending [ITU T.125] DisconnectProviderUltimatum " "reason %d", 0x80 >> 5); if (xrdp_iso_send(self->iso_layer, s) != 0) { free_stream(s); close_rdp_socket(self); LOG(LOG_LEVEL_ERROR, "Sending [ITU T.125] DisconnectProviderUltimatum failed"); return 1; } free_stream(s); close_rdp_socket(self); return 0; }