Coverage Report

Created: 2024-09-08 06:20

/src/FreeRDP/libfreerdp/core/rdp.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Core
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 *
8
 * Licensed under the Apache License, Version 2.0 (the "License");
9
 * you may not use this file except in compliance with the License.
10
 * You may obtain a copy of the License at
11
 *
12
 *     http://www.apache.org/licenses/LICENSE-2.0
13
 *
14
 * Unless required by applicable law or agreed to in writing, software
15
 * distributed under the License is distributed on an "AS IS" BASIS,
16
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17
 * See the License for the specific language governing permissions and
18
 * limitations under the License.
19
 */
20
21
#include <freerdp/config.h>
22
23
#include "settings.h"
24
25
#include <winpr/crt.h>
26
#include <winpr/string.h>
27
#include <winpr/synch.h>
28
#include <winpr/assert.h>
29
30
#include "rdp.h"
31
32
#include "state.h"
33
#include "info.h"
34
#include "utils.h"
35
#include "mcs.h"
36
#include "redirection.h"
37
38
#include <freerdp/codec/bulk.h>
39
#include <freerdp/crypto/per.h>
40
#include <freerdp/log.h>
41
#include <freerdp/buildflags.h>
42
43
13.2k
#define RDP_TAG FREERDP_TAG("core.rdp")
44
45
static const char* DATA_PDU_TYPE_STRINGS[80] = {
46
  "?",
47
  "?",      /* 0x00 - 0x01 */
48
  "Update", /* 0x02 */
49
  "?",
50
  "?",
51
  "?",
52
  "?",
53
  "?",
54
  "?",
55
  "?",
56
  "?", /* 0x03 - 0x0A */
57
  "?",
58
  "?",
59
  "?",
60
  "?",
61
  "?",
62
  "?",
63
  "?",
64
  "?",
65
  "?",       /* 0x0B - 0x13 */
66
  "Control", /* 0x14 */
67
  "?",
68
  "?",
69
  "?",
70
  "?",
71
  "?",
72
  "?",       /* 0x15 - 0x1A */
73
  "Pointer", /* 0x1B */
74
  "Input",   /* 0x1C */
75
  "?",
76
  "?",                            /* 0x1D - 0x1E */
77
  "Synchronize",                  /* 0x1F */
78
  "?",                            /* 0x20 */
79
  "Refresh Rect",                 /* 0x21 */
80
  "Play Sound",                   /* 0x22 */
81
  "Suppress Output",              /* 0x23 */
82
  "Shutdown Request",             /* 0x24 */
83
  "Shutdown Denied",              /* 0x25 */
84
  "Save Session Info",            /* 0x26 */
85
  "Font List",                    /* 0x27 */
86
  "Font Map",                     /* 0x28 */
87
  "Set Keyboard Indicators",      /* 0x29 */
88
  "?",                            /* 0x2A */
89
  "Bitmap Cache Persistent List", /* 0x2B */
90
  "Bitmap Cache Error",           /* 0x2C */
91
  "Set Keyboard IME Status",      /* 0x2D */
92
  "Offscreen Cache Error",        /* 0x2E */
93
  "Set Error Info",               /* 0x2F */
94
  "Draw Nine Grid Error",         /* 0x30 */
95
  "Draw GDI+ Error",              /* 0x31 */
96
  "ARC Status",                   /* 0x32 */
97
  "?",
98
  "?",
99
  "?",              /* 0x33 - 0x35 */
100
  "Status Info",    /* 0x36 */
101
  "Monitor Layout", /* 0x37 */
102
  "FrameAcknowledge",
103
  "?",
104
  "?", /* 0x38 - 0x40 */
105
  "?",
106
  "?",
107
  "?",
108
  "?",
109
  "?",
110
  "?" /* 0x41 - 0x46 */
111
};
112
113
#define rdp_check_monitor_layout_pdu_state(rdp, expected) \
114
0
  rdp_check_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
115
116
static BOOL rdp_check_monitor_layout_pdu_state_(const rdpRdp* rdp, BOOL expected, const char* file,
117
                                                const char* fkt, size_t line)
118
0
{
119
0
  WINPR_ASSERT(rdp);
120
0
  if (expected != rdp->monitor_layout_pdu)
121
0
  {
122
0
    const DWORD log_level = WLOG_ERROR;
123
0
    if (WLog_IsLevelActive(rdp->log, log_level))
124
0
    {
125
0
      WLog_PrintMessage(rdp->log, WLOG_MESSAGE_TEXT, log_level, line, file, fkt,
126
0
                        "Expected rdp->monitor_layout_pdu == %s",
127
0
                        expected ? "TRUE" : "FALSE");
128
0
    }
129
0
    return FALSE;
130
0
  }
131
0
  return TRUE;
132
0
}
133
134
#define rdp_set_monitor_layout_pdu_state(rdp, expected) \
135
56
  rdp_set_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
136
static BOOL rdp_set_monitor_layout_pdu_state_(rdpRdp* rdp, BOOL value, const char* file,
137
                                              const char* fkt, size_t line)
138
56
{
139
140
56
  WINPR_ASSERT(rdp);
141
56
  if (value && (value == rdp->monitor_layout_pdu))
142
2
  {
143
2
    const DWORD log_level = WLOG_WARN;
144
2
    if (WLog_IsLevelActive(rdp->log, log_level))
145
2
    {
146
2
      WLog_PrintMessage(rdp->log, WLOG_MESSAGE_TEXT, log_level, line, file, fkt,
147
2
                        "rdp->monitor_layout_pdu == %s, expected FALSE",
148
2
                        value ? "TRUE" : "FALSE");
149
2
    }
150
2
    return FALSE;
151
2
  }
152
54
  rdp->monitor_layout_pdu = value;
153
54
  return TRUE;
154
56
}
155
156
const char* data_pdu_type_to_string(UINT8 type)
157
1.25k
{
158
1.25k
  if (type >= ARRAYSIZE(DATA_PDU_TYPE_STRINGS))
159
375
    return "???";
160
881
  return DATA_PDU_TYPE_STRINGS[type];
161
1.25k
}
162
163
static BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id);
164
static BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
165
                                           UINT16 channel_id);
166
static BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type,
167
                                        UINT32 share_id);
168
169
/**
170
 * @brief Read RDP Security Header.
171
 * msdn{cc240579}
172
 *
173
 * @param s stream
174
 * @param flags security flags
175
 *
176
 * @return \b TRUE for success, \b FALSE otherwise
177
 */
178
179
BOOL rdp_read_security_header(rdpRdp* rdp, wStream* s, UINT16* flags, UINT16* length)
180
14.1k
{
181
14.1k
  char buffer[256] = { 0 };
182
14.1k
  WINPR_ASSERT(s);
183
14.1k
  WINPR_ASSERT(flags);
184
14.1k
  WINPR_ASSERT(rdp);
185
186
  /* Basic Security Header */
187
14.1k
  if ((length && (*length < 4)))
188
13.2k
  {
189
13.2k
    WLog_Print(rdp->log, WLOG_WARN,
190
13.2k
               "invalid security header length, have %" PRIu16 ", must be >= 4", *length);
191
13.2k
    return FALSE;
192
13.2k
  }
193
900
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
194
3
    return FALSE;
195
196
897
  Stream_Read_UINT16(s, *flags); /* flags */
197
897
  Stream_Seek(s, 2);             /* flagsHi (unused) */
198
897
  WLog_Print(rdp->log, WLOG_TRACE, "%s",
199
897
             rdp_security_flag_string(*flags, buffer, sizeof(buffer)));
200
897
  if (length)
201
897
    *length -= 4;
202
203
897
  return TRUE;
204
900
}
205
206
/**
207
 * Write RDP Security Header.
208
 * msdn{cc240579}
209
 * @param s stream
210
 * @param flags security flags
211
 *
212
 * @return \b TRUE for success, \b FALSE otherwise
213
 */
214
215
BOOL rdp_write_security_header(rdpRdp* rdp, wStream* s, UINT16 flags)
216
2.54k
{
217
2.54k
  char buffer[256] = { 0 };
218
2.54k
  WINPR_ASSERT(s);
219
2.54k
  WINPR_ASSERT(rdp);
220
221
2.54k
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 4))
222
0
    return FALSE;
223
224
2.54k
  WLog_Print(rdp->log, WLOG_TRACE, "%s", rdp_security_flag_string(flags, buffer, sizeof(buffer)));
225
  /* Basic Security Header */
226
2.54k
  Stream_Write_UINT16(s, flags); /* flags */
227
2.54k
  Stream_Write_UINT16(s, 0);     /* flagsHi (unused) */
228
2.54k
  return TRUE;
229
2.54k
}
230
231
BOOL rdp_read_share_control_header(rdpRdp* rdp, wStream* s, UINT16* tpktLength,
232
                                   UINT16* remainingLength, UINT16* type, UINT16* channel_id)
233
13.2k
{
234
13.2k
  UINT16 len = 0;
235
13.2k
  UINT16 tmp = 0;
236
237
13.2k
  WINPR_ASSERT(rdp);
238
13.2k
  WINPR_ASSERT(s);
239
13.2k
  WINPR_ASSERT(type);
240
13.2k
  WINPR_ASSERT(channel_id);
241
242
13.2k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
243
663
    return FALSE;
244
245
  /* Share Control Header */
246
12.6k
  Stream_Read_UINT16(s, len); /* totalLength */
247
248
  /* If length is 0x8000 then we actually got a flow control PDU that we should ignore
249
   http://msdn.microsoft.com/en-us/library/cc240576.aspx */
250
12.6k
  if (len == 0x8000)
251
122
  {
252
122
    if (!rdp_read_flow_control_pdu(rdp, s, type, channel_id))
253
20
      return FALSE;
254
102
    *channel_id = 0;
255
102
    if (tpktLength)
256
102
      *tpktLength = 8; /* Flow control PDU is 8 bytes */
257
102
    if (remainingLength)
258
102
      *remainingLength = 0;
259
260
102
    char buffer[128] = { 0 };
261
102
    WLog_Print(rdp->log, WLOG_DEBUG,
262
102
               "[Flow control PDU] type=%s, tpktLength=%" PRIuz ", remainingLength=%" PRIuz,
263
102
               pdu_type_to_str(*type, buffer, sizeof(buffer)), tpktLength ? *tpktLength : 0,
264
102
               remainingLength ? *remainingLength : 0);
265
102
    return TRUE;
266
122
  }
267
268
12.4k
  if (len < 4U)
269
6.99k
  {
270
6.99k
    WLog_Print(rdp->log, WLOG_ERROR,
271
6.99k
               "Invalid share control header, length is %" PRIu16 ", must be >4", len);
272
6.99k
    return FALSE;
273
6.99k
  }
274
275
5.49k
  if (tpktLength)
276
5.49k
    *tpktLength = len;
277
278
5.49k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
279
87
    return FALSE;
280
281
5.40k
  Stream_Read_UINT16(s, tmp); /* pduType */
282
5.40k
  *type = tmp & 0x0F;         /* type is in the 4 least significant bits */
283
284
5.40k
  size_t remLen = len - 4;
285
5.40k
  if (len > 5)
286
4.87k
  {
287
4.87k
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
288
46
      return FALSE;
289
290
4.82k
    Stream_Read_UINT16(s, *channel_id); /* pduSource */
291
4.82k
    remLen = len - 6;
292
4.82k
  }
293
528
  else
294
528
    *channel_id = 0; /* Windows XP can send such short DEACTIVATE_ALL PDUs. */
295
296
5.35k
  char buffer[128] = { 0 };
297
5.35k
  WLog_Print(rdp->log, WLOG_DEBUG, "type=%s, tpktLength=%" PRIuz ", remainingLength=%" PRIuz,
298
5.35k
             pdu_type_to_str(*type, buffer, sizeof(buffer)), len, remLen);
299
5.35k
  if (remainingLength)
300
5.35k
    *remainingLength = remLen;
301
5.35k
  return Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, remLen);
302
5.40k
}
303
304
BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
305
                                    UINT16 channel_id)
306
0
{
307
0
  WINPR_ASSERT(s);
308
0
  WINPR_ASSERT(rdp);
309
0
  if (length > UINT16_MAX)
310
0
    return FALSE;
311
312
0
  if (length < RDP_PACKET_HEADER_MAX_LENGTH)
313
0
    return FALSE;
314
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 6))
315
0
    return FALSE;
316
0
  length -= RDP_PACKET_HEADER_MAX_LENGTH;
317
  /* Share Control Header */
318
0
  Stream_Write_UINT16(s, length);      /* totalLength */
319
0
  Stream_Write_UINT16(s, type | 0x10); /* pduType */
320
0
  Stream_Write_UINT16(s, channel_id);  /* pduSource */
321
0
  return TRUE;
322
0
}
323
324
BOOL rdp_read_share_data_header(rdpRdp* rdp, wStream* s, UINT16* length, BYTE* type,
325
                                UINT32* shareId, BYTE* compressedType, UINT16* compressedLength)
326
22.3k
{
327
22.3k
  WINPR_ASSERT(s);
328
22.3k
  WINPR_ASSERT(rdp);
329
330
22.3k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
331
7.53k
    return FALSE;
332
333
  /* Share Data Header */
334
14.8k
  Stream_Read_UINT32(s, *shareId);          /* shareId (4 bytes) */
335
14.8k
  Stream_Seek_UINT8(s);                     /* pad1 (1 byte) */
336
14.8k
  Stream_Seek_UINT8(s);                     /* streamId (1 byte) */
337
14.8k
  Stream_Read_UINT16(s, *length);           /* uncompressedLength (2 bytes) */
338
14.8k
  Stream_Read_UINT8(s, *type);              /* pduType2, Data PDU Type (1 byte) */
339
14.8k
  Stream_Read_UINT8(s, *compressedType);    /* compressedType (1 byte) */
340
14.8k
  Stream_Read_UINT16(s, *compressedLength); /* compressedLength (2 bytes) */
341
14.8k
  return TRUE;
342
22.3k
}
343
344
BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type, UINT32 share_id)
345
0
{
346
0
  const size_t headerLen = RDP_PACKET_HEADER_MAX_LENGTH + RDP_SHARE_CONTROL_HEADER_LENGTH +
347
0
                           RDP_SHARE_DATA_HEADER_LENGTH;
348
349
0
  WINPR_ASSERT(s);
350
0
  WINPR_ASSERT(rdp);
351
0
  if (length > UINT16_MAX)
352
0
    return FALSE;
353
354
0
  if (length < headerLen)
355
0
    return FALSE;
356
0
  length -= headerLen;
357
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 12))
358
0
    return FALSE;
359
360
  /* Share Data Header */
361
0
  Stream_Write_UINT32(s, share_id);  /* shareId (4 bytes) */
362
0
  Stream_Write_UINT8(s, 0);          /* pad1 (1 byte) */
363
0
  Stream_Write_UINT8(s, STREAM_LOW); /* streamId (1 byte) */
364
0
  Stream_Write_UINT16(s, length);    /* uncompressedLength (2 bytes) */
365
0
  Stream_Write_UINT8(s, type);       /* pduType2, Data PDU Type (1 byte) */
366
0
  Stream_Write_UINT8(s, 0);          /* compressedType (1 byte) */
367
0
  Stream_Write_UINT16(s, 0);         /* compressedLength (2 bytes) */
368
0
  return TRUE;
369
0
}
370
371
static BOOL rdp_security_stream_init(rdpRdp* rdp, wStream* s, BOOL sec_header)
372
2.54k
{
373
2.54k
  WINPR_ASSERT(rdp);
374
2.54k
  WINPR_ASSERT(s);
375
376
2.54k
  if (rdp->do_crypt)
377
0
  {
378
0
    if (!Stream_SafeSeek(s, 12))
379
0
      return FALSE;
380
381
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
382
0
    {
383
0
      if (!Stream_SafeSeek(s, 4))
384
0
        return FALSE;
385
0
    }
386
387
0
    rdp->sec_flags |= SEC_ENCRYPT;
388
389
0
    if (rdp->do_secure_checksum)
390
0
      rdp->sec_flags |= SEC_SECURE_CHECKSUM;
391
0
  }
392
2.54k
  else if (rdp->sec_flags != 0 || sec_header)
393
2.54k
  {
394
2.54k
    if (!Stream_SafeSeek(s, 4))
395
0
      return FALSE;
396
2.54k
  }
397
398
2.54k
  return TRUE;
399
2.54k
}
400
401
wStream* rdp_send_stream_init(rdpRdp* rdp)
402
0
{
403
0
  wStream* s = NULL;
404
405
0
  WINPR_ASSERT(rdp);
406
0
  WINPR_ASSERT(rdp->transport);
407
408
0
  s = transport_send_stream_init(rdp->transport, 4096);
409
410
0
  if (!s)
411
0
    return NULL;
412
413
0
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
414
0
    goto fail;
415
416
0
  if (!rdp_security_stream_init(rdp, s, FALSE))
417
0
    goto fail;
418
419
0
  return s;
420
0
fail:
421
0
  Stream_Release(s);
422
0
  return NULL;
423
0
}
424
425
wStream* rdp_send_stream_pdu_init(rdpRdp* rdp)
426
0
{
427
0
  wStream* s = rdp_send_stream_init(rdp);
428
429
0
  if (!s)
430
0
    return NULL;
431
432
0
  if (!Stream_SafeSeek(s, RDP_SHARE_CONTROL_HEADER_LENGTH))
433
0
    goto fail;
434
435
0
  return s;
436
0
fail:
437
0
  Stream_Release(s);
438
0
  return NULL;
439
0
}
440
441
wStream* rdp_data_pdu_init(rdpRdp* rdp)
442
0
{
443
0
  wStream* s = rdp_send_stream_pdu_init(rdp);
444
445
0
  if (!s)
446
0
    return NULL;
447
448
0
  if (!Stream_SafeSeek(s, RDP_SHARE_DATA_HEADER_LENGTH))
449
0
    goto fail;
450
451
0
  return s;
452
0
fail:
453
0
  Stream_Release(s);
454
0
  return NULL;
455
0
}
456
457
BOOL rdp_set_error_info(rdpRdp* rdp, UINT32 errorInfo)
458
720
{
459
720
  WINPR_ASSERT(rdp);
460
461
720
  rdp->errorInfo = errorInfo;
462
463
720
  if (rdp->errorInfo != ERRINFO_SUCCESS)
464
704
  {
465
704
    rdpContext* context = rdp->context;
466
704
    WINPR_ASSERT(context);
467
468
704
    rdp_print_errinfo(rdp->errorInfo);
469
470
704
    if (context)
471
704
    {
472
704
      freerdp_set_last_error_log(context, MAKE_FREERDP_ERROR(ERRINFO, errorInfo));
473
474
704
      if (context->pubSub)
475
347
      {
476
347
        ErrorInfoEventArgs e = { 0 };
477
347
        EventArgsInit(&e, "freerdp");
478
347
        e.code = rdp->errorInfo;
479
347
        PubSub_OnErrorInfo(context->pubSub, context, &e);
480
347
      }
481
704
    }
482
0
    else
483
0
      WLog_Print(rdp->log, WLOG_ERROR, "missing context=%p", context);
484
704
  }
485
16
  else
486
16
  {
487
16
    freerdp_set_last_error_log(rdp->context, FREERDP_ERROR_SUCCESS);
488
16
  }
489
490
720
  return TRUE;
491
720
}
492
493
wStream* rdp_message_channel_pdu_init(rdpRdp* rdp)
494
2.54k
{
495
2.54k
  wStream* s = NULL;
496
497
2.54k
  WINPR_ASSERT(rdp);
498
499
2.54k
  s = transport_send_stream_init(rdp->transport, 4096);
500
501
2.54k
  if (!s)
502
0
    return NULL;
503
504
2.54k
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
505
0
    goto fail;
506
507
2.54k
  if (!rdp_security_stream_init(rdp, s, TRUE))
508
0
    goto fail;
509
510
2.54k
  return s;
511
0
fail:
512
0
  Stream_Release(s);
513
0
  return NULL;
514
2.54k
}
515
516
/**
517
 * Read an RDP packet header.
518
 * @param rdp rdp module
519
 * @param s stream
520
 * @param length RDP packet length
521
 * @param channelId channel id
522
 *
523
 * @return \b TRUE for success, \b FALSE otherwise
524
 */
525
526
BOOL rdp_read_header(rdpRdp* rdp, wStream* s, UINT16* length, UINT16* channelId)
527
39.8k
{
528
39.8k
  BYTE li = 0;
529
39.8k
  BYTE byte = 0;
530
39.8k
  BYTE code = 0;
531
39.8k
  BYTE choice = 0;
532
39.8k
  UINT16 initiator = 0;
533
534
39.8k
  WINPR_ASSERT(rdp);
535
39.8k
  WINPR_ASSERT(rdp->settings);
536
39.8k
  WINPR_ASSERT(s);
537
39.8k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataRequest
538
39.8k
                                                    : DomainMCSPDU_SendDataIndication;
539
540
39.8k
  *channelId = 0; /* Initialize in case of early abort */
541
39.8k
  if (!tpkt_read_header(s, length))
542
9.51k
    return FALSE;
543
544
30.2k
  if (!tpdu_read_header(s, &code, &li, *length))
545
28.8k
    return FALSE;
546
547
1.47k
  if (code != X224_TPDU_DATA)
548
730
  {
549
730
    if (code == X224_TPDU_DISCONNECT_REQUEST)
550
613
    {
551
613
      WLog_Print(rdp->log, WLOG_WARN, "Received X224_TPDU_DISCONNECT_REQUEST, terminating");
552
613
      utils_abort_connect(rdp);
553
613
      return TRUE;
554
613
    }
555
556
117
    WLog_Print(rdp->log, WLOG_WARN,
557
117
               "Unexpected X224 TPDU type %s [%08" PRIx32 "] instead of %s",
558
117
               tpdu_type_to_string(code), code, tpdu_type_to_string(X224_TPDU_DATA));
559
117
    return FALSE;
560
730
  }
561
562
746
  if (!per_read_choice(s, &choice))
563
5
    return FALSE;
564
565
741
  const DomainMCSPDU domainMCSPDU = (DomainMCSPDU)(choice >> 2);
566
567
741
  if (domainMCSPDU != MCSPDU)
568
594
  {
569
594
    if (domainMCSPDU != DomainMCSPDU_DisconnectProviderUltimatum)
570
57
    {
571
57
      WLog_Print(rdp->log, WLOG_WARN, "Received %s instead of %s",
572
57
                 mcs_domain_pdu_string(domainMCSPDU), mcs_domain_pdu_string(MCSPDU));
573
57
      return FALSE;
574
57
    }
575
594
  }
576
577
684
  MCSPDU = domainMCSPDU;
578
579
684
  if (*length < 8U)
580
12
  {
581
12
    WLog_Print(rdp->log, WLOG_WARN, "TPDU invalid length, got %" PRIu16 ", expected at least 8",
582
12
               *length);
583
12
    return FALSE;
584
12
  }
585
586
672
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length - 8))
587
0
    return FALSE;
588
589
672
  if (MCSPDU == DomainMCSPDU_DisconnectProviderUltimatum)
590
532
  {
591
532
    int reason = 0;
592
532
    TerminateEventArgs e = { 0 };
593
594
532
    if (!mcs_recv_disconnect_provider_ultimatum(rdp->mcs, s, &reason))
595
2
      return FALSE;
596
597
530
    rdpContext* context = rdp->context;
598
530
    WINPR_ASSERT(context);
599
530
    context->disconnectUltimatum = reason;
600
601
530
    if (rdp->errorInfo == ERRINFO_SUCCESS)
602
496
    {
603
      /**
604
       * Some servers like Windows Server 2008 R2 do not send the error info pdu
605
       * when the user logs off like they should. Map DisconnectProviderUltimatum
606
       * to a ERRINFO_LOGOFF_BY_USER when the errinfo code is ERRINFO_SUCCESS.
607
       */
608
496
      if (reason == Disconnect_Ultimatum_provider_initiated)
609
107
        rdp_set_error_info(rdp, ERRINFO_RPC_INITIATED_DISCONNECT);
610
389
      else if (reason == Disconnect_Ultimatum_user_requested)
611
41
        rdp_set_error_info(rdp, ERRINFO_LOGOFF_BY_USER);
612
348
      else
613
348
        rdp_set_error_info(rdp, ERRINFO_RPC_INITIATED_DISCONNECT);
614
496
    }
615
616
530
    WLog_Print(rdp->log, WLOG_DEBUG, "DisconnectProviderUltimatum: reason: %d", reason);
617
530
    utils_abort_connect(rdp);
618
530
    EventArgsInit(&e, "freerdp");
619
530
    e.code = 0;
620
530
    PubSub_OnTerminate(rdp->pubSub, context, &e);
621
530
    return TRUE;
622
530
  }
623
624
140
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 5))
625
3
    return FALSE;
626
627
137
  if (!per_read_integer16(s, &initiator, MCS_BASE_CHANNEL_ID)) /* initiator (UserId) */
628
26
    return FALSE;
629
630
111
  if (!per_read_integer16(s, channelId, 0)) /* channelId */
631
0
    return FALSE;
632
633
111
  Stream_Read_UINT8(s, byte); /* dataPriority + Segmentation (0x70) */
634
635
111
  if (!per_read_length(s, length)) /* userData (OCTET_STRING) */
636
13
    return FALSE;
637
638
98
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length))
639
28
    return FALSE;
640
641
70
  return TRUE;
642
98
}
643
644
/**
645
 * Write an RDP packet header.
646
 * @param rdp rdp module
647
 * @param s stream
648
 * @param length RDP packet length
649
 * @param channelId channel id
650
 *
651
 * @return \b TRUE for success, \b FALSE otherwise
652
 */
653
654
BOOL rdp_write_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 channelId)
655
2.54k
{
656
2.54k
  WINPR_ASSERT(rdp);
657
2.54k
  WINPR_ASSERT(rdp->settings);
658
2.54k
  WINPR_ASSERT(s);
659
2.54k
  WINPR_ASSERT(length >= RDP_PACKET_HEADER_MAX_LENGTH);
660
2.54k
  if (length > UINT16_MAX)
661
0
    return FALSE;
662
663
2.54k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataIndication
664
2.54k
                                                    : DomainMCSPDU_SendDataRequest;
665
666
2.54k
  if ((rdp->sec_flags & SEC_ENCRYPT) &&
667
2.54k
      (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS))
668
0
  {
669
0
    const UINT16 body_length = length - RDP_PACKET_HEADER_MAX_LENGTH;
670
0
    const UINT16 pad = 8 - (body_length % 8);
671
672
0
    if (pad != 8)
673
0
      length += pad;
674
0
  }
675
676
2.54k
  if (!mcs_write_domain_mcspdu_header(s, MCSPDU, length, 0))
677
0
    return FALSE;
678
2.54k
  if (!per_write_integer16(s, rdp->mcs->userId, MCS_BASE_CHANNEL_ID)) /* initiator */
679
0
    return FALSE;
680
2.54k
  if (!per_write_integer16(s, channelId, 0)) /* channelId */
681
0
    return FALSE;
682
2.54k
  if (!Stream_EnsureRemainingCapacity(s, 3))
683
0
    return FALSE;
684
2.54k
  Stream_Write_UINT8(s, 0x70); /* dataPriority + segmentation */
685
  /*
686
   * We always encode length in two bytes, even though we could use
687
   * only one byte if length <= 0x7F. It is just easier that way,
688
   * because we can leave room for fixed-length header, store all
689
   * the data first and then store the header.
690
   */
691
2.54k
  length = (length - RDP_PACKET_HEADER_MAX_LENGTH) | 0x8000;
692
2.54k
  Stream_Write_UINT16_BE(s, length); /* userData (OCTET_STRING) */
693
2.54k
  return TRUE;
694
2.54k
}
695
696
static BOOL rdp_security_stream_out(rdpRdp* rdp, wStream* s, size_t length, UINT32 sec_flags,
697
                                    UINT32* pad)
698
2.54k
{
699
2.54k
  BOOL status = 0;
700
2.54k
  WINPR_ASSERT(rdp);
701
2.54k
  if (length > UINT16_MAX)
702
0
    return FALSE;
703
704
2.54k
  sec_flags |= rdp->sec_flags;
705
2.54k
  *pad = 0;
706
707
2.54k
  if (sec_flags != 0)
708
2.54k
  {
709
2.54k
    if (!rdp_write_security_header(rdp, s, sec_flags))
710
0
      return FALSE;
711
712
2.54k
    if (sec_flags & SEC_ENCRYPT)
713
0
    {
714
0
      BOOL res = FALSE;
715
0
      if (!security_lock(rdp))
716
0
        return FALSE;
717
718
0
      if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
719
0
      {
720
0
        BYTE* data = Stream_PointerAs(s, BYTE) + 12;
721
0
        const size_t size = (data - Stream_Buffer(s));
722
0
        if (size > length)
723
0
          goto unlock;
724
725
0
        length -= size;
726
727
0
        Stream_Write_UINT16(s, 0x10); /* length */
728
0
        Stream_Write_UINT8(s, 0x1);   /* TSFIPS_VERSION 1*/
729
        /* handle padding */
730
0
        *pad = 8 - (length % 8);
731
732
0
        if (*pad == 8)
733
0
          *pad = 0;
734
735
0
        if (*pad)
736
0
          memset(data + length, 0, *pad);
737
738
0
        Stream_Write_UINT8(s, *pad);
739
740
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
741
0
          goto unlock;
742
0
        if (!security_hmac_signature(data, length, Stream_Pointer(s), 8, rdp))
743
0
          goto unlock;
744
745
0
        Stream_Seek(s, 8);
746
0
        if (!security_fips_encrypt(data, length + *pad, rdp))
747
0
          goto unlock;
748
0
      }
749
0
      else
750
0
      {
751
0
        const BYTE* data = Stream_PointerAs(s, const BYTE) + 8;
752
0
        const size_t diff = Stream_GetPosition(s) + 8ULL;
753
0
        if (diff > length)
754
0
          goto unlock;
755
0
        length -= diff;
756
757
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
758
0
          goto unlock;
759
0
        if (sec_flags & SEC_SECURE_CHECKSUM)
760
0
          status = security_salted_mac_signature(rdp, data, length, TRUE,
761
0
                                                 Stream_Pointer(s), 8);
762
0
        else
763
0
          status =
764
0
              security_mac_signature(rdp, data, length, Stream_PointerAs(s, BYTE), 8);
765
766
0
        if (!status)
767
0
          goto unlock;
768
769
0
        Stream_Seek(s, 8);
770
771
0
        if (!security_encrypt(Stream_Pointer(s), length, rdp))
772
0
          goto unlock;
773
0
      }
774
0
      res = TRUE;
775
776
0
    unlock:
777
778
0
      if (!security_unlock(rdp))
779
0
        return FALSE;
780
0
      if (!res)
781
0
        return FALSE;
782
0
    }
783
784
2.54k
    rdp->sec_flags = 0;
785
2.54k
  }
786
787
2.54k
  return TRUE;
788
2.54k
}
789
790
static UINT32 rdp_get_sec_bytes(rdpRdp* rdp, UINT16 sec_flags)
791
0
{
792
0
  UINT32 sec_bytes = 0;
793
794
0
  if (rdp->sec_flags & SEC_ENCRYPT)
795
0
  {
796
0
    sec_bytes = 12;
797
798
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
799
0
      sec_bytes += 4;
800
0
  }
801
0
  else if (rdp->sec_flags != 0 || sec_flags != 0)
802
0
  {
803
0
    sec_bytes = 4;
804
0
  }
805
0
  else
806
0
  {
807
0
    sec_bytes = 0;
808
0
  }
809
810
0
  return sec_bytes;
811
0
}
812
813
/**
814
 * Send an RDP packet.
815
 * @param rdp RDP module
816
 * @param s stream
817
 * @param channel_id channel id
818
 */
819
820
BOOL rdp_send(rdpRdp* rdp, wStream* s, UINT16 channel_id)
821
0
{
822
0
  BOOL rc = FALSE;
823
0
  UINT32 pad = 0;
824
825
0
  if (!s)
826
0
    return FALSE;
827
828
0
  if (!rdp)
829
0
    goto fail;
830
831
0
  size_t length = Stream_GetPosition(s);
832
0
  Stream_SetPosition(s, 0);
833
0
  if (!rdp_write_header(rdp, s, length, channel_id))
834
0
    goto fail;
835
836
0
  if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
837
0
    goto fail;
838
839
0
  length += pad;
840
0
  Stream_SetPosition(s, length);
841
0
  Stream_SealLength(s);
842
843
0
  if (transport_write(rdp->transport, s) < 0)
844
0
    goto fail;
845
846
0
  rc = TRUE;
847
0
fail:
848
0
  Stream_Release(s);
849
0
  return rc;
850
0
}
851
852
BOOL rdp_send_pdu(rdpRdp* rdp, wStream* s, UINT16 type, UINT16 channel_id)
853
0
{
854
0
  UINT32 sec_bytes = 0;
855
0
  size_t sec_hold = 0;
856
0
  UINT32 pad = 0;
857
858
0
  if (!rdp || !s)
859
0
    return FALSE;
860
861
0
  size_t length = Stream_GetPosition(s);
862
0
  Stream_SetPosition(s, 0);
863
0
  if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID))
864
0
    return FALSE;
865
0
  sec_bytes = rdp_get_sec_bytes(rdp, 0);
866
0
  sec_hold = Stream_GetPosition(s);
867
0
  Stream_Seek(s, sec_bytes);
868
0
  if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, type, channel_id))
869
0
    return FALSE;
870
0
  Stream_SetPosition(s, sec_hold);
871
872
0
  if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
873
0
    return FALSE;
874
875
0
  length += pad;
876
0
  Stream_SetPosition(s, length);
877
0
  Stream_SealLength(s);
878
879
0
  if (transport_write(rdp->transport, s) < 0)
880
0
    return FALSE;
881
882
0
  return TRUE;
883
0
}
884
885
BOOL rdp_send_data_pdu(rdpRdp* rdp, wStream* s, BYTE type, UINT16 channel_id)
886
0
{
887
0
  BOOL rc = FALSE;
888
0
  UINT32 sec_bytes = 0;
889
0
  size_t sec_hold = 0;
890
0
  UINT32 pad = 0;
891
892
0
  if (!s)
893
0
    return FALSE;
894
895
0
  if (!rdp)
896
0
    goto fail;
897
898
0
  size_t length = Stream_GetPosition(s);
899
0
  Stream_SetPosition(s, 0);
900
0
  if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID))
901
0
    goto fail;
902
0
  sec_bytes = rdp_get_sec_bytes(rdp, 0);
903
0
  sec_hold = Stream_GetPosition(s);
904
0
  Stream_Seek(s, sec_bytes);
905
0
  if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, PDU_TYPE_DATA, channel_id))
906
0
    goto fail;
907
0
  if (!rdp_write_share_data_header(rdp, s, length - sec_bytes, type, rdp->settings->ShareId))
908
0
    goto fail;
909
0
  Stream_SetPosition(s, sec_hold);
910
911
0
  if (!rdp_security_stream_out(rdp, s, length, 0, &pad))
912
0
    goto fail;
913
914
0
  length += pad;
915
0
  Stream_SetPosition(s, length);
916
0
  Stream_SealLength(s);
917
0
  WLog_Print(rdp->log, WLOG_DEBUG,
918
0
             "sending data (type=0x%x size=%" PRIuz " channelId=%" PRIu16 ")", type,
919
0
             Stream_Length(s), channel_id);
920
921
0
  rdp->outPackets++;
922
0
  if (transport_write(rdp->transport, s) < 0)
923
0
    goto fail;
924
925
0
  rc = TRUE;
926
0
fail:
927
0
  Stream_Release(s);
928
0
  return rc;
929
0
}
930
931
BOOL rdp_send_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 sec_flags)
932
2.54k
{
933
2.54k
  BOOL rc = FALSE;
934
2.54k
  UINT32 pad = 0;
935
936
2.54k
  WINPR_ASSERT(rdp);
937
2.54k
  WINPR_ASSERT(s);
938
939
2.54k
  size_t length = Stream_GetPosition(s);
940
2.54k
  Stream_SetPosition(s, 0);
941
2.54k
  if (!rdp_write_header(rdp, s, length, rdp->mcs->messageChannelId))
942
0
    goto fail;
943
944
2.54k
  if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
945
0
    goto fail;
946
947
2.54k
  length += pad;
948
2.54k
  Stream_SetPosition(s, length);
949
2.54k
  Stream_SealLength(s);
950
951
2.54k
  if (transport_write(rdp->transport, s) < 0)
952
2.54k
    goto fail;
953
954
0
  rc = TRUE;
955
2.54k
fail:
956
2.54k
  Stream_Release(s);
957
2.54k
  return rc;
958
0
}
959
960
static BOOL rdp_recv_server_shutdown_denied_pdu(rdpRdp* rdp, wStream* s)
961
9
{
962
9
  return TRUE;
963
9
}
964
965
static BOOL rdp_recv_server_set_keyboard_indicators_pdu(rdpRdp* rdp, wStream* s)
966
36
{
967
36
  UINT16 unitId = 0;
968
36
  UINT16 ledFlags = 0;
969
970
36
  WINPR_ASSERT(rdp);
971
36
  WINPR_ASSERT(s);
972
973
36
  rdpContext* context = rdp->context;
974
36
  WINPR_ASSERT(context);
975
36
  WINPR_ASSERT(context->update);
976
977
36
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
978
14
    return FALSE;
979
980
22
  Stream_Read_UINT16(s, unitId);   /* unitId (2 bytes) */
981
22
  Stream_Read_UINT16(s, ledFlags); /* ledFlags (2 bytes) */
982
22
  return IFCALLRESULT(TRUE, context->update->SetKeyboardIndicators, context, ledFlags);
983
36
}
984
985
static BOOL rdp_recv_server_set_keyboard_ime_status_pdu(rdpRdp* rdp, wStream* s)
986
110
{
987
110
  UINT16 unitId = 0;
988
110
  UINT32 imeState = 0;
989
110
  UINT32 imeConvMode = 0;
990
991
110
  if (!rdp || !rdp->input)
992
0
    return FALSE;
993
994
110
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 10))
995
62
    return FALSE;
996
997
48
  Stream_Read_UINT16(s, unitId);      /* unitId (2 bytes) */
998
48
  Stream_Read_UINT32(s, imeState);    /* imeState (4 bytes) */
999
48
  Stream_Read_UINT32(s, imeConvMode); /* imeConvMode (4 bytes) */
1000
48
  IFCALL(rdp->update->SetKeyboardImeStatus, rdp->context, unitId, imeState, imeConvMode);
1001
48
  return TRUE;
1002
110
}
1003
1004
static BOOL rdp_recv_set_error_info_data_pdu(rdpRdp* rdp, wStream* s)
1005
243
{
1006
243
  UINT32 errorInfo = 0;
1007
1008
243
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1009
19
    return FALSE;
1010
1011
224
  Stream_Read_UINT32(s, errorInfo); /* errorInfo (4 bytes) */
1012
224
  return rdp_set_error_info(rdp, errorInfo);
1013
243
}
1014
1015
static BOOL rdp_recv_server_auto_reconnect_status_pdu(rdpRdp* rdp, wStream* s)
1016
41
{
1017
41
  UINT32 arcStatus = 0;
1018
1019
41
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1020
19
    return FALSE;
1021
1022
22
  Stream_Read_UINT32(s, arcStatus); /* arcStatus (4 bytes) */
1023
22
  WLog_Print(rdp->log, WLOG_WARN, "AutoReconnectStatus: 0x%08" PRIX32 "", arcStatus);
1024
22
  return TRUE;
1025
41
}
1026
1027
static BOOL rdp_recv_server_status_info_pdu(rdpRdp* rdp, wStream* s)
1028
42
{
1029
42
  UINT32 statusCode = 0;
1030
1031
42
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1032
10
    return FALSE;
1033
1034
32
  Stream_Read_UINT32(s, statusCode); /* statusCode (4 bytes) */
1035
1036
32
  if (rdp->update->ServerStatusInfo)
1037
0
    return rdp->update->ServerStatusInfo(rdp->context, statusCode);
1038
1039
32
  return TRUE;
1040
32
}
1041
1042
static BOOL rdp_recv_monitor_layout_pdu(rdpRdp* rdp, wStream* s)
1043
92
{
1044
92
  UINT32 monitorCount = 0;
1045
92
  MONITOR_DEF* monitorDefArray = NULL;
1046
92
  BOOL ret = TRUE;
1047
1048
92
  WINPR_ASSERT(rdp);
1049
92
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1050
13
    return FALSE;
1051
1052
79
  Stream_Read_UINT32(s, monitorCount); /* monitorCount (4 bytes) */
1053
1054
79
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(rdp->log, s, monitorCount, 20ull))
1055
23
    return FALSE;
1056
1057
56
  monitorDefArray = (MONITOR_DEF*)calloc(monitorCount, sizeof(MONITOR_DEF));
1058
1059
56
  if (!monitorDefArray)
1060
0
    return FALSE;
1061
1062
78.3k
  for (UINT32 index = 0; index < monitorCount; index++)
1063
78.2k
  {
1064
78.2k
    MONITOR_DEF* monitor = &monitorDefArray[index];
1065
78.2k
    Stream_Read_INT32(s, monitor->left);   /* left (4 bytes) */
1066
78.2k
    Stream_Read_INT32(s, monitor->top);    /* top (4 bytes) */
1067
78.2k
    Stream_Read_INT32(s, monitor->right);  /* right (4 bytes) */
1068
78.2k
    Stream_Read_INT32(s, monitor->bottom); /* bottom (4 bytes) */
1069
78.2k
    Stream_Read_UINT32(s, monitor->flags); /* flags (4 bytes) */
1070
78.2k
  }
1071
1072
56
  IFCALLRET(rdp->update->RemoteMonitors, ret, rdp->context, monitorCount, monitorDefArray);
1073
56
  free(monitorDefArray);
1074
56
  if (!ret)
1075
0
    return FALSE;
1076
56
  return rdp_set_monitor_layout_pdu_state(rdp, TRUE);
1077
56
}
1078
1079
state_run_t rdp_recv_data_pdu(rdpRdp* rdp, wStream* s)
1080
9.12k
{
1081
9.12k
  BYTE type = 0;
1082
9.12k
  wStream* cs = NULL;
1083
9.12k
  UINT16 length = 0;
1084
9.12k
  UINT32 shareId = 0;
1085
9.12k
  BYTE compressedType = 0;
1086
9.12k
  UINT16 compressedLength = 0;
1087
1088
9.12k
  WINPR_ASSERT(rdp);
1089
9.12k
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &shareId, &compressedType,
1090
9.12k
                                  &compressedLength))
1091
5.89k
  {
1092
5.89k
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_read_share_data_header() failed");
1093
5.89k
    return STATE_RUN_FAILED;
1094
5.89k
  }
1095
1096
3.22k
  cs = s;
1097
1098
3.22k
  if (compressedType & PACKET_COMPRESSED)
1099
1.57k
  {
1100
1.57k
    if (compressedLength < 18)
1101
17
    {
1102
17
      WLog_Print(rdp->log, WLOG_ERROR,
1103
17
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1104
17
                 compressedLength);
1105
17
      return STATE_RUN_FAILED;
1106
17
    }
1107
1108
1.55k
    UINT32 DstSize = 0;
1109
1.55k
    const BYTE* pDstData = NULL;
1110
1.55k
    UINT16 SrcSize = compressedLength - 18;
1111
1112
1.55k
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, SrcSize))
1113
186
    {
1114
186
      WLog_Print(rdp->log, WLOG_ERROR,
1115
186
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1116
186
                 compressedLength);
1117
186
      return STATE_RUN_FAILED;
1118
186
    }
1119
1120
1.36k
    if (bulk_decompress(rdp->bulk, Stream_ConstPointer(s), SrcSize, &pDstData, &DstSize,
1121
1.36k
                        compressedType))
1122
1.36k
    {
1123
1.36k
      cs = transport_take_from_pool(rdp->transport, DstSize);
1124
1.36k
      if (!cs)
1125
0
      {
1126
0
        WLog_Print(rdp->log, WLOG_ERROR, "Couldn't take stream from pool");
1127
0
        return STATE_RUN_FAILED;
1128
0
      }
1129
1130
1.36k
      Stream_SetPosition(cs, 0);
1131
1.36k
      Stream_Write(cs, pDstData, DstSize);
1132
1.36k
      Stream_SealLength(cs);
1133
1.36k
      Stream_SetPosition(cs, 0);
1134
1.36k
    }
1135
0
    else
1136
0
    {
1137
0
      WLog_Print(rdp->log, WLOG_ERROR, "bulk_decompress() failed");
1138
0
      return STATE_RUN_FAILED;
1139
0
    }
1140
1141
1.36k
    Stream_Seek(s, SrcSize);
1142
1.36k
  }
1143
1144
3.02k
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1145
3.02k
             data_pdu_type_to_string(type), type, length);
1146
1147
3.02k
  switch (type)
1148
3.02k
  {
1149
596
    case DATA_PDU_TYPE_UPDATE:
1150
596
      if (!update_recv(rdp->update, cs))
1151
596
      {
1152
596
        WLog_Print(rdp->log, WLOG_ERROR, "DATA_PDU_TYPE_UPDATE - update_recv() failed");
1153
596
        goto out_fail;
1154
596
      }
1155
1156
0
      break;
1157
1158
61
    case DATA_PDU_TYPE_CONTROL:
1159
61
      if (!rdp_recv_server_control_pdu(rdp, cs))
1160
55
      {
1161
55
        WLog_Print(rdp->log, WLOG_ERROR,
1162
55
                   "DATA_PDU_TYPE_CONTROL - rdp_recv_server_control_pdu() failed");
1163
55
        goto out_fail;
1164
55
      }
1165
1166
6
      break;
1167
1168
92
    case DATA_PDU_TYPE_POINTER:
1169
92
      if (!update_recv_pointer(rdp->update, cs))
1170
92
      {
1171
92
        WLog_Print(rdp->log, WLOG_ERROR,
1172
92
                   "DATA_PDU_TYPE_POINTER - update_recv_pointer() failed");
1173
92
        goto out_fail;
1174
92
      }
1175
1176
0
      break;
1177
1178
28
    case DATA_PDU_TYPE_SYNCHRONIZE:
1179
28
      if (!rdp_recv_server_synchronize_pdu(rdp, cs))
1180
11
      {
1181
11
        WLog_Print(rdp->log, WLOG_ERROR,
1182
11
                   "DATA_PDU_TYPE_SYNCHRONIZE - rdp_recv_synchronize_pdu() failed");
1183
11
        goto out_fail;
1184
11
      }
1185
1186
17
      break;
1187
1188
25
    case DATA_PDU_TYPE_PLAY_SOUND:
1189
25
      if (!update_recv_play_sound(rdp->update, cs))
1190
25
      {
1191
25
        WLog_Print(rdp->log, WLOG_ERROR,
1192
25
                   "DATA_PDU_TYPE_PLAY_SOUND - update_recv_play_sound() failed");
1193
25
        goto out_fail;
1194
25
      }
1195
1196
0
      break;
1197
1198
9
    case DATA_PDU_TYPE_SHUTDOWN_DENIED:
1199
9
      if (!rdp_recv_server_shutdown_denied_pdu(rdp, cs))
1200
0
      {
1201
0
        WLog_Print(
1202
0
            rdp->log, WLOG_ERROR,
1203
0
            "DATA_PDU_TYPE_SHUTDOWN_DENIED - rdp_recv_server_shutdown_denied_pdu() failed");
1204
0
        goto out_fail;
1205
0
      }
1206
1207
9
      break;
1208
1209
313
    case DATA_PDU_TYPE_SAVE_SESSION_INFO:
1210
313
      if (!rdp_recv_save_session_info(rdp, cs))
1211
222
      {
1212
222
        WLog_Print(rdp->log, WLOG_ERROR,
1213
222
                   "DATA_PDU_TYPE_SAVE_SESSION_INFO - rdp_recv_save_session_info() failed");
1214
222
        goto out_fail;
1215
222
      }
1216
1217
91
      break;
1218
1219
91
    case DATA_PDU_TYPE_FONT_MAP:
1220
77
      if (!rdp_recv_font_map_pdu(rdp, cs))
1221
0
      {
1222
0
        WLog_Print(rdp->log, WLOG_ERROR,
1223
0
                   "DATA_PDU_TYPE_FONT_MAP - rdp_recv_font_map_pdu() failed");
1224
0
        goto out_fail;
1225
0
      }
1226
1227
77
      break;
1228
1229
77
    case DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS:
1230
36
      if (!rdp_recv_server_set_keyboard_indicators_pdu(rdp, cs))
1231
14
      {
1232
14
        WLog_Print(rdp->log, WLOG_ERROR,
1233
14
                   "DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS - "
1234
14
                   "rdp_recv_server_set_keyboard_indicators_pdu() failed");
1235
14
        goto out_fail;
1236
14
      }
1237
1238
22
      break;
1239
1240
110
    case DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS:
1241
110
      if (!rdp_recv_server_set_keyboard_ime_status_pdu(rdp, cs))
1242
62
      {
1243
62
        WLog_Print(rdp->log, WLOG_ERROR,
1244
62
                   "DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS - "
1245
62
                   "rdp_recv_server_set_keyboard_ime_status_pdu() failed");
1246
62
        goto out_fail;
1247
62
      }
1248
1249
48
      break;
1250
1251
243
    case DATA_PDU_TYPE_SET_ERROR_INFO:
1252
243
      if (!rdp_recv_set_error_info_data_pdu(rdp, cs))
1253
19
      {
1254
19
        WLog_Print(
1255
19
            rdp->log, WLOG_ERROR,
1256
19
            "DATA_PDU_TYPE_SET_ERROR_INFO - rdp_recv_set_error_info_data_pdu() failed");
1257
19
        goto out_fail;
1258
19
      }
1259
1260
224
      break;
1261
1262
224
    case DATA_PDU_TYPE_ARC_STATUS:
1263
41
      if (!rdp_recv_server_auto_reconnect_status_pdu(rdp, cs))
1264
19
      {
1265
19
        WLog_Print(rdp->log, WLOG_ERROR,
1266
19
                   "DATA_PDU_TYPE_ARC_STATUS - "
1267
19
                   "rdp_recv_server_auto_reconnect_status_pdu() failed");
1268
19
        goto out_fail;
1269
19
      }
1270
1271
22
      break;
1272
1273
42
    case DATA_PDU_TYPE_STATUS_INFO:
1274
42
      if (!rdp_recv_server_status_info_pdu(rdp, cs))
1275
10
      {
1276
10
        WLog_Print(rdp->log, WLOG_ERROR,
1277
10
                   "DATA_PDU_TYPE_STATUS_INFO - rdp_recv_server_status_info_pdu() failed");
1278
10
        goto out_fail;
1279
10
      }
1280
1281
32
      break;
1282
1283
92
    case DATA_PDU_TYPE_MONITOR_LAYOUT:
1284
92
      if (!rdp_recv_monitor_layout_pdu(rdp, cs))
1285
38
      {
1286
38
        WLog_Print(rdp->log, WLOG_ERROR,
1287
38
                   "DATA_PDU_TYPE_MONITOR_LAYOUT - rdp_recv_monitor_layout_pdu() failed");
1288
38
        goto out_fail;
1289
38
      }
1290
1291
54
      break;
1292
1293
1.25k
    default:
1294
1.25k
      WLog_Print(rdp->log, WLOG_WARN,
1295
1.25k
                 "[UNHANDLED] %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1296
1.25k
                 data_pdu_type_to_string(type), type, length);
1297
1.25k
      break;
1298
3.02k
  }
1299
1300
1.85k
  if (cs != s)
1301
847
    Stream_Release(cs);
1302
1303
1.85k
  return STATE_RUN_SUCCESS;
1304
1.16k
out_fail:
1305
1306
1.16k
  if (cs != s)
1307
520
    Stream_Release(cs);
1308
1309
1.16k
  return STATE_RUN_FAILED;
1310
3.02k
}
1311
1312
state_run_t rdp_recv_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 securityFlags)
1313
13.2k
{
1314
13.2k
  WINPR_ASSERT(rdp);
1315
13.2k
  WINPR_ASSERT(s);
1316
1317
13.2k
  if (securityFlags & SEC_AUTODETECT_REQ)
1318
0
  {
1319
    /* Server Auto-Detect Request PDU */
1320
0
    return autodetect_recv_request_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1321
0
  }
1322
1323
13.2k
  if (securityFlags & SEC_AUTODETECT_RSP)
1324
0
  {
1325
    /* Client Auto-Detect Response PDU */
1326
0
    return autodetect_recv_response_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1327
0
  }
1328
1329
13.2k
  if (securityFlags & SEC_HEARTBEAT)
1330
0
  {
1331
    /* Heartbeat PDU */
1332
0
    return rdp_recv_heartbeat_packet(rdp, s);
1333
0
  }
1334
1335
13.2k
  if (securityFlags & SEC_TRANSPORT_REQ)
1336
0
  {
1337
0
    return multitransport_recv_request(rdp->multitransport, s);
1338
0
  }
1339
1340
13.2k
  if (securityFlags & SEC_TRANSPORT_RSP)
1341
0
  {
1342
0
    return multitransport_recv_response(rdp->multitransport, s);
1343
0
  }
1344
1345
13.2k
  if (securityFlags & SEC_LICENSE_PKT)
1346
0
  {
1347
0
    return license_recv(rdp->license, s);
1348
0
  }
1349
1350
13.2k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
1351
0
  {
1352
0
    return license_recv(rdp->license, s);
1353
0
  }
1354
1355
13.2k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
1356
0
  {
1357
0
    return license_recv(rdp->license, s);
1358
0
  }
1359
1360
13.2k
  return STATE_RUN_SUCCESS;
1361
13.2k
}
1362
1363
state_run_t rdp_recv_out_of_sequence_pdu(rdpRdp* rdp, wStream* s, UINT16 pduType, UINT16 length)
1364
6.93k
{
1365
6.93k
  state_run_t rc = STATE_RUN_FAILED;
1366
6.93k
  WINPR_ASSERT(rdp);
1367
1368
6.93k
  switch (pduType)
1369
6.93k
  {
1370
2.18k
    case PDU_TYPE_DATA:
1371
2.18k
      rc = rdp_recv_data_pdu(rdp, s);
1372
2.18k
      break;
1373
104
    case PDU_TYPE_SERVER_REDIRECTION:
1374
104
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1375
104
      break;
1376
3
    case PDU_TYPE_FLOW_RESPONSE:
1377
4
    case PDU_TYPE_FLOW_STOP:
1378
5
    case PDU_TYPE_FLOW_TEST:
1379
5
      rc = STATE_RUN_SUCCESS;
1380
5
      break;
1381
4.63k
    default:
1382
4.63k
    {
1383
4.63k
      char buffer1[256] = { 0 };
1384
4.63k
      char buffer2[256] = { 0 };
1385
1386
4.63k
      WLog_Print(rdp->log, WLOG_ERROR, "expected %s, got %s",
1387
4.63k
                 pdu_type_to_str(PDU_TYPE_DEMAND_ACTIVE, buffer1, sizeof(buffer1)),
1388
4.63k
                 pdu_type_to_str(pduType, buffer2, sizeof(buffer2)));
1389
4.63k
      rc = STATE_RUN_FAILED;
1390
4.63k
    }
1391
4.63k
    break;
1392
6.93k
  }
1393
1394
6.93k
  if (!tpkt_ensure_stream_consumed(s, length))
1395
5.58k
    return STATE_RUN_FAILED;
1396
1.34k
  return rc;
1397
6.93k
}
1398
1399
BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id)
1400
122
{
1401
  /*
1402
   * Read flow control PDU - documented in FlowPDU section in T.128
1403
   * http://www.itu.int/rec/T-REC-T.128-199802-S/en
1404
   * The specification for the PDU has pad8bits listed BEFORE pduTypeFlow.
1405
   * However, so far pad8bits has always been observed to arrive AFTER pduTypeFlow.
1406
   * Switched the order of these two fields to match this observation.
1407
   */
1408
122
  UINT8 pduType = 0;
1409
1410
122
  WINPR_ASSERT(rdp);
1411
122
  WINPR_ASSERT(s);
1412
122
  WINPR_ASSERT(type);
1413
122
  WINPR_ASSERT(channel_id);
1414
1415
122
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 6))
1416
20
    return FALSE;
1417
102
  Stream_Read_UINT8(s, pduType); /* pduTypeFlow */
1418
102
  *type = pduType;
1419
102
  Stream_Seek_UINT8(s);               /* pad8bits */
1420
102
  Stream_Seek_UINT8(s);               /* flowIdentifier */
1421
102
  Stream_Seek_UINT8(s);               /* flowNumber */
1422
102
  Stream_Read_UINT16(s, *channel_id); /* pduSource */
1423
102
  return TRUE;
1424
122
}
1425
1426
/**
1427
 * Decrypt an RDP packet.
1428
 *
1429
 * @param rdp RDP module
1430
 * @param s stream
1431
 * @param pLength A pointer to the result variable, must not be NULL
1432
 * @param securityFlags the security flags to apply
1433
 *
1434
 * @return \b TRUE for success, \b FALSE otherwise
1435
 */
1436
1437
BOOL rdp_decrypt(rdpRdp* rdp, wStream* s, UINT16* pLength, UINT16 securityFlags)
1438
2.52k
{
1439
2.52k
  BOOL res = FALSE;
1440
2.52k
  BYTE cmac[8] = { 0 };
1441
2.52k
  BYTE wmac[8] = { 0 };
1442
2.52k
  BOOL status = FALSE;
1443
2.52k
  INT32 length = 0;
1444
1445
2.52k
  WINPR_ASSERT(rdp);
1446
2.52k
  WINPR_ASSERT(rdp->settings);
1447
2.52k
  WINPR_ASSERT(s);
1448
2.52k
  WINPR_ASSERT(pLength);
1449
1450
2.52k
  if (!security_lock(rdp))
1451
0
    return FALSE;
1452
1453
2.52k
  length = *pLength;
1454
2.52k
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1455
2.52k
    return TRUE;
1456
1457
0
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1458
0
  {
1459
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
1460
0
      goto unlock;
1461
1462
0
    UINT16 len = 0;
1463
0
    Stream_Read_UINT16(s, len); /* 0x10 */
1464
0
    if (len != 0x10)
1465
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS length %" PRIu16 " != 0x10",
1466
0
                 len);
1467
1468
0
    UINT16 version = 0;
1469
0
    Stream_Read_UINT8(s, version); /* 0x1 */
1470
0
    if (version != 1)
1471
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS version %" PRIu16 " != 1",
1472
0
                 version);
1473
1474
0
    BYTE pad = 0;
1475
0
    Stream_Read_UINT8(s, pad);
1476
0
    const BYTE* sig = Stream_ConstPointer(s);
1477
0
    Stream_Seek(s, 8); /* signature */
1478
0
    length -= 12;
1479
0
    const INT32 padLength = length - pad;
1480
1481
0
    if ((length <= 0) || (padLength <= 0) || (padLength > UINT16_MAX))
1482
0
    {
1483
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid pad length %" PRId32, padLength);
1484
0
      goto unlock;
1485
0
    }
1486
1487
0
    if (!security_fips_decrypt(Stream_Pointer(s), length, rdp))
1488
0
      goto unlock;
1489
1490
0
    if (!security_fips_check_signature(Stream_ConstPointer(s), length - pad, sig, 8, rdp))
1491
0
      goto unlock;
1492
1493
0
    Stream_SetLength(s, Stream_Length(s) - pad);
1494
0
    *pLength = (UINT16)padLength;
1495
0
  }
1496
0
  else
1497
0
  {
1498
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, sizeof(wmac)))
1499
0
      goto unlock;
1500
1501
0
    Stream_Read(s, wmac, sizeof(wmac));
1502
0
    length -= sizeof(wmac);
1503
1504
0
    if (length <= 0)
1505
0
    {
1506
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid length field");
1507
0
      goto unlock;
1508
0
    }
1509
1510
0
    if (!security_decrypt(Stream_PointerAs(s, BYTE), length, rdp))
1511
0
      goto unlock;
1512
1513
0
    if (securityFlags & SEC_SECURE_CHECKSUM)
1514
0
      status = security_salted_mac_signature(rdp, Stream_ConstPointer(s), length, FALSE, cmac,
1515
0
                                             sizeof(cmac));
1516
0
    else
1517
0
      status =
1518
0
          security_mac_signature(rdp, Stream_ConstPointer(s), length, cmac, sizeof(cmac));
1519
1520
0
    if (!status)
1521
0
      goto unlock;
1522
1523
0
    if (memcmp(wmac, cmac, sizeof(wmac)) != 0)
1524
0
    {
1525
0
      WLog_Print(rdp->log, WLOG_ERROR, "WARNING: invalid packet signature");
1526
      /*
1527
       * Because Standard RDP Security is totally broken,
1528
       * and cannot protect against MITM, don't treat signature
1529
       * verification failure as critical. This at least enables
1530
       * us to work with broken RDP clients and servers that
1531
       * generate invalid signatures.
1532
       */
1533
      // return FALSE;
1534
0
    }
1535
1536
0
    *pLength = length;
1537
0
  }
1538
0
  res = TRUE;
1539
0
unlock:
1540
0
  if (!security_unlock(rdp))
1541
0
    return FALSE;
1542
0
  return res;
1543
0
}
1544
1545
const char* pdu_type_to_str(UINT16 pduType, char* buffer, size_t length)
1546
9.26k
{
1547
9.26k
  const char* str = NULL;
1548
9.26k
  switch (pduType)
1549
9.26k
  {
1550
4.68k
    case PDU_TYPE_DEMAND_ACTIVE:
1551
4.68k
      str = "PDU_TYPE_DEMAND_ACTIVE";
1552
4.68k
      break;
1553
22
    case PDU_TYPE_CONFIRM_ACTIVE:
1554
22
      str = "PDU_TYPE_CONFIRM_ACTIVE";
1555
22
      break;
1556
40
    case PDU_TYPE_DEACTIVATE_ALL:
1557
40
      str = "PDU_TYPE_DEACTIVATE_ALL";
1558
40
      break;
1559
0
    case PDU_TYPE_DATA:
1560
0
      str = "PDU_TYPE_DATA";
1561
0
      break;
1562
0
    case PDU_TYPE_SERVER_REDIRECTION:
1563
0
      str = "PDU_TYPE_SERVER_REDIRECTION";
1564
0
      break;
1565
0
    case PDU_TYPE_FLOW_TEST:
1566
0
      str = "PDU_TYPE_FLOW_TEST";
1567
0
      break;
1568
0
    case PDU_TYPE_FLOW_RESPONSE:
1569
0
      str = "PDU_TYPE_FLOW_RESPONSE";
1570
0
      break;
1571
0
    case PDU_TYPE_FLOW_STOP:
1572
0
      str = "PDU_TYPE_FLOW_STOP";
1573
0
      break;
1574
4.52k
    default:
1575
4.52k
      str = "PDU_TYPE_UNKNOWN";
1576
4.52k
      break;
1577
9.26k
  }
1578
1579
9.26k
  winpr_str_append(str, buffer, length, "");
1580
9.26k
  {
1581
9.26k
    char msg[32] = { 0 };
1582
9.26k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", pduType);
1583
9.26k
    winpr_str_append(msg, buffer, length, "");
1584
9.26k
  }
1585
9.26k
  return buffer;
1586
9.26k
}
1587
1588
/**
1589
 * Process an RDP packet.
1590
 * @param rdp RDP module
1591
 * @param s stream
1592
 */
1593
1594
static state_run_t rdp_recv_tpkt_pdu(rdpRdp* rdp, wStream* s)
1595
0
{
1596
0
  state_run_t rc = STATE_RUN_SUCCESS;
1597
0
  UINT16 length = 0;
1598
0
  UINT16 pduType = 0;
1599
0
  UINT16 pduSource = 0;
1600
0
  UINT16 channelId = 0;
1601
0
  UINT16 securityFlags = 0;
1602
0
  freerdp* instance = NULL;
1603
1604
0
  WINPR_ASSERT(rdp);
1605
0
  WINPR_ASSERT(rdp->context);
1606
0
  WINPR_ASSERT(s);
1607
1608
0
  instance = rdp->context->instance;
1609
0
  WINPR_ASSERT(instance);
1610
1611
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
1612
0
    return STATE_RUN_FAILED;
1613
1614
0
  if (freerdp_shall_disconnect_context(rdp->context))
1615
0
    return STATE_RUN_SUCCESS;
1616
1617
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1618
0
  {
1619
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1620
0
  }
1621
1622
0
  if (rdp->settings->UseRdpSecurityLayer)
1623
0
  {
1624
0
    if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
1625
0
      return STATE_RUN_FAILED;
1626
1627
0
    if (securityFlags & (SEC_ENCRYPT | SEC_REDIRECTION_PKT))
1628
0
    {
1629
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
1630
0
        return STATE_RUN_FAILED;
1631
0
    }
1632
1633
0
    if (securityFlags & SEC_REDIRECTION_PKT)
1634
0
    {
1635
      /*
1636
       * [MS-RDPBCGR] 2.2.13.2.1
1637
       *  - no share control header, nor the 2 byte pad
1638
       */
1639
0
      Stream_Rewind(s, 2);
1640
0
      rdp->inPackets++;
1641
1642
0
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1643
0
      goto out;
1644
0
    }
1645
0
  }
1646
1647
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
1648
0
  {
1649
0
    while (Stream_GetRemainingLength(s) > 3)
1650
0
    {
1651
0
      wStream subbuffer;
1652
0
      wStream* sub = NULL;
1653
0
      size_t diff = 0;
1654
0
      UINT16 remain = 0;
1655
1656
0
      if (!rdp_read_share_control_header(rdp, s, NULL, &remain, &pduType, &pduSource))
1657
0
        return STATE_RUN_FAILED;
1658
1659
0
      sub = Stream_StaticInit(&subbuffer, Stream_Pointer(s), remain);
1660
0
      if (!Stream_SafeSeek(s, remain))
1661
0
        return STATE_RUN_FAILED;
1662
1663
0
      rdp->settings->PduSource = pduSource;
1664
0
      rdp->inPackets++;
1665
1666
0
      switch (pduType)
1667
0
      {
1668
0
        case PDU_TYPE_DATA:
1669
0
          rc = rdp_recv_data_pdu(rdp, sub);
1670
0
          if (state_run_failed(rc))
1671
0
            return rc;
1672
0
          break;
1673
1674
0
        case PDU_TYPE_DEACTIVATE_ALL:
1675
0
          if (!rdp_recv_deactivate_all(rdp, sub))
1676
0
          {
1677
0
            WLog_Print(rdp->log, WLOG_ERROR,
1678
0
                       "rdp_recv_tpkt_pdu: rdp_recv_deactivate_all() fail");
1679
0
            return STATE_RUN_FAILED;
1680
0
          }
1681
1682
0
          break;
1683
1684
0
        case PDU_TYPE_SERVER_REDIRECTION:
1685
0
          return rdp_recv_enhanced_security_redirection_packet(rdp, sub);
1686
1687
0
        case PDU_TYPE_FLOW_RESPONSE:
1688
0
        case PDU_TYPE_FLOW_STOP:
1689
0
        case PDU_TYPE_FLOW_TEST:
1690
0
          WLog_Print(rdp->log, WLOG_DEBUG, "flow message 0x%04" PRIX16 "", pduType);
1691
          /* http://msdn.microsoft.com/en-us/library/cc240576.aspx */
1692
0
          if (!Stream_SafeSeek(sub, remain))
1693
0
            return STATE_RUN_FAILED;
1694
0
          break;
1695
1696
0
        default:
1697
0
        {
1698
0
          char buffer[256] = { 0 };
1699
0
          WLog_Print(rdp->log, WLOG_ERROR, "incorrect PDU type: %s",
1700
0
                     pdu_type_to_str(pduType, buffer, sizeof(buffer)));
1701
0
        }
1702
0
        break;
1703
0
      }
1704
1705
0
      diff = Stream_GetRemainingLength(sub);
1706
0
      if (diff > 0)
1707
0
      {
1708
0
        char buffer[256] = { 0 };
1709
0
        WLog_Print(rdp->log, WLOG_WARN,
1710
0
                   "pduType %s not properly parsed, %" PRIdz
1711
0
                   " bytes remaining unhandled. Skipping.",
1712
0
                   pdu_type_to_str(pduType, buffer, sizeof(buffer)), diff);
1713
0
      }
1714
0
    }
1715
0
  }
1716
0
  else if (rdp->mcs->messageChannelId && (channelId == rdp->mcs->messageChannelId))
1717
0
  {
1718
0
    if (!rdp->settings->UseRdpSecurityLayer)
1719
0
      if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
1720
0
        return STATE_RUN_FAILED;
1721
0
    rdp->inPackets++;
1722
0
    rc = rdp_recv_message_channel_pdu(rdp, s, securityFlags);
1723
0
  }
1724
0
  else
1725
0
  {
1726
0
    rdp->inPackets++;
1727
1728
0
    if (!freerdp_channel_process(instance, s, channelId, length))
1729
0
      return STATE_RUN_FAILED;
1730
0
  }
1731
1732
0
out:
1733
0
  if (!tpkt_ensure_stream_consumed(s, length))
1734
0
    return STATE_RUN_FAILED;
1735
0
  return rc;
1736
0
}
1737
1738
static state_run_t rdp_recv_fastpath_pdu(rdpRdp* rdp, wStream* s)
1739
0
{
1740
0
  UINT16 length = 0;
1741
1742
0
  WINPR_ASSERT(rdp);
1743
0
  rdpFastPath* fastpath = rdp->fastpath;
1744
1745
0
  if (!fastpath_read_header_rdp(fastpath, s, &length))
1746
0
  {
1747
0
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_recv_fastpath_pdu: fastpath_read_header_rdp() fail");
1748
0
    return STATE_RUN_FAILED;
1749
0
  }
1750
1751
0
  if ((length == 0) || (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, length)))
1752
0
  {
1753
0
    WLog_Print(rdp->log, WLOG_ERROR, "incorrect FastPath PDU header length %" PRIu16 "",
1754
0
               length);
1755
0
    return STATE_RUN_FAILED;
1756
0
  }
1757
1758
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1759
0
  {
1760
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1761
0
  }
1762
1763
0
  if (!fastpath_decrypt(fastpath, s, &length))
1764
0
    return STATE_RUN_FAILED;
1765
1766
0
  return fastpath_recv_updates(rdp->fastpath, s);
1767
0
}
1768
1769
static state_run_t rdp_recv_pdu(rdpRdp* rdp, wStream* s)
1770
0
{
1771
0
  const int rc = tpkt_verify_header(s);
1772
0
  if (rc > 0)
1773
0
    return rdp_recv_tpkt_pdu(rdp, s);
1774
0
  else if (rc == 0)
1775
0
    return rdp_recv_fastpath_pdu(rdp, s);
1776
0
  else
1777
0
    return STATE_RUN_FAILED;
1778
0
}
1779
1780
static state_run_t rdp_handle_sc_flags(rdpRdp* rdp, wStream* s, UINT32 flag,
1781
                                       CONNECTION_STATE nextState)
1782
0
{
1783
0
  const UINT32 mask = FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
1784
0
                      FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU;
1785
0
  WINPR_ASSERT(rdp);
1786
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1787
0
  if (state_run_success(status))
1788
0
  {
1789
0
    const UINT32 flags = rdp->finalize_sc_pdus & mask;
1790
0
    if ((flags & flag) == flag)
1791
0
    {
1792
0
      if (!rdp_client_transition_to_state(rdp, nextState))
1793
0
        status = STATE_RUN_FAILED;
1794
0
      else
1795
0
        status = STATE_RUN_SUCCESS;
1796
0
    }
1797
0
    else
1798
0
    {
1799
0
      char flag_buffer[256] = { 0 };
1800
0
      char mask_buffer[256] = { 0 };
1801
0
      WLog_Print(rdp->log, WLOG_WARN,
1802
0
                 "[%s] unexpected server message, expected flag %s [have %s]",
1803
0
                 rdp_get_state_string(rdp),
1804
0
                 rdp_finalize_flags_to_str(flag, flag_buffer, sizeof(flag_buffer)),
1805
0
                 rdp_finalize_flags_to_str(flags, mask_buffer, sizeof(mask_buffer)));
1806
0
    }
1807
0
  }
1808
0
  return status;
1809
0
}
1810
1811
static state_run_t rdp_client_exchange_monitor_layout(rdpRdp* rdp, wStream* s)
1812
0
{
1813
0
  WINPR_ASSERT(rdp);
1814
1815
0
  if (!rdp_check_monitor_layout_pdu_state(rdp, FALSE))
1816
0
    return FALSE;
1817
1818
  /* We might receive unrelated messages from the server (channel traffic),
1819
   * so only proceed if some flag changed
1820
   */
1821
0
  const UINT32 old = rdp->finalize_sc_pdus;
1822
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1823
0
  const UINT32 now = rdp->finalize_sc_pdus;
1824
0
  const BOOL changed = (old != now) || rdp->monitor_layout_pdu;
1825
1826
  /* This PDU is optional, so if we received a finalize PDU continue there */
1827
0
  if (state_run_success(status) && changed)
1828
0
  {
1829
0
    if (!rdp->monitor_layout_pdu)
1830
0
    {
1831
0
      if (!rdp_finalize_is_flag_set(rdp, FINALIZE_SC_SYNCHRONIZE_PDU))
1832
0
        return STATE_RUN_FAILED;
1833
0
    }
1834
1835
0
    status = rdp_client_connect_finalize(rdp);
1836
0
    if (state_run_success(status) && !rdp->monitor_layout_pdu)
1837
0
      status = STATE_RUN_TRY_AGAIN;
1838
0
  }
1839
0
  return status;
1840
0
}
1841
1842
static state_run_t rdp_recv_callback_int(rdpTransport* transport, wStream* s, void* extra)
1843
6.93k
{
1844
6.93k
  state_run_t status = STATE_RUN_SUCCESS;
1845
6.93k
  rdpRdp* rdp = (rdpRdp*)extra;
1846
1847
6.93k
  WINPR_ASSERT(transport);
1848
6.93k
  WINPR_ASSERT(rdp);
1849
6.93k
  WINPR_ASSERT(s);
1850
1851
6.93k
  switch (rdp_get_state(rdp))
1852
6.93k
  {
1853
0
    case CONNECTION_STATE_NEGO:
1854
0
      if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1855
0
        status = STATE_RUN_FAILED;
1856
0
      else
1857
0
        status = STATE_RUN_CONTINUE;
1858
0
      break;
1859
0
    case CONNECTION_STATE_NLA:
1860
0
      if (nla_get_state(rdp->nla) < NLA_STATE_AUTH_INFO)
1861
0
      {
1862
0
        if (nla_recv_pdu(rdp->nla, s) < 1)
1863
0
        {
1864
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nla_recv_pdu() fail",
1865
0
                     rdp_get_state_string(rdp));
1866
0
          status = STATE_RUN_FAILED;
1867
0
        }
1868
0
      }
1869
0
      else if (nla_get_state(rdp->nla) == NLA_STATE_POST_NEGO)
1870
0
      {
1871
0
        nego_recv(rdp->transport, s, (void*)rdp->nego);
1872
1873
0
        if (!nego_update_settings_from_state(rdp->nego, rdp->settings))
1874
0
          return FALSE;
1875
1876
0
        if (nego_get_state(rdp->nego) != NEGO_STATE_FINAL)
1877
0
        {
1878
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nego_recv() fail",
1879
0
                     rdp_get_state_string(rdp));
1880
0
          status = STATE_RUN_FAILED;
1881
0
        }
1882
0
        else if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1883
0
          status = STATE_RUN_FAILED;
1884
0
      }
1885
1886
0
      if (state_run_success(status))
1887
0
      {
1888
0
        if (nla_get_state(rdp->nla) == NLA_STATE_AUTH_INFO)
1889
0
        {
1890
0
          transport_set_nla_mode(rdp->transport, FALSE);
1891
1892
0
          if (rdp->settings->VmConnectMode)
1893
0
          {
1894
0
            if (!nego_set_state(rdp->nego, NEGO_STATE_NLA))
1895
0
              status = STATE_RUN_FAILED;
1896
0
            else if (!nego_set_requested_protocols(rdp->nego,
1897
0
                                                   PROTOCOL_HYBRID | PROTOCOL_SSL))
1898
0
              status = STATE_RUN_FAILED;
1899
0
            else if (!nego_send_negotiation_request(rdp->nego))
1900
0
              status = STATE_RUN_FAILED;
1901
0
            else if (!nla_set_state(rdp->nla, NLA_STATE_POST_NEGO))
1902
0
              status = STATE_RUN_FAILED;
1903
0
          }
1904
0
          else
1905
0
          {
1906
0
            if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1907
0
              status = STATE_RUN_FAILED;
1908
0
          }
1909
0
        }
1910
0
      }
1911
0
      if (state_run_success(status))
1912
0
      {
1913
1914
0
        if (nla_get_state(rdp->nla) == NLA_STATE_FINAL)
1915
0
        {
1916
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1917
0
            status = STATE_RUN_FAILED;
1918
0
          else
1919
0
            status = STATE_RUN_CONTINUE;
1920
0
        }
1921
0
      }
1922
0
      break;
1923
1924
0
    case CONNECTION_STATE_AAD:
1925
0
      if (aad_recv(rdp->aad, s) < 1)
1926
0
      {
1927
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - aad_recv() fail", rdp_get_state_string(rdp));
1928
0
        status = STATE_RUN_FAILED;
1929
0
      }
1930
0
      if (state_run_success(status))
1931
0
      {
1932
0
        if (aad_get_state(rdp->aad) == AAD_STATE_FINAL)
1933
0
        {
1934
0
          transport_set_aad_mode(rdp->transport, FALSE);
1935
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1936
0
            status = STATE_RUN_FAILED;
1937
0
          else
1938
0
            status = STATE_RUN_CONTINUE;
1939
0
        }
1940
0
      }
1941
0
      break;
1942
1943
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
1944
0
      if (!mcs_client_begin(rdp->mcs))
1945
0
      {
1946
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - mcs_client_begin() fail",
1947
0
                   rdp_get_state_string(rdp));
1948
0
        status = STATE_RUN_FAILED;
1949
0
      }
1950
0
      else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_RESPONSE))
1951
0
        status = STATE_RUN_FAILED;
1952
0
      else if (Stream_GetRemainingLength(s) > 0)
1953
0
        status = STATE_RUN_CONTINUE;
1954
0
      break;
1955
1956
0
    case CONNECTION_STATE_MCS_CREATE_RESPONSE:
1957
0
      if (!mcs_recv_connect_response(rdp->mcs, s))
1958
0
      {
1959
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_connect_response failure");
1960
0
        status = STATE_RUN_FAILED;
1961
0
      }
1962
0
      else
1963
0
      {
1964
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ERECT_DOMAIN))
1965
0
          status = STATE_RUN_FAILED;
1966
0
        else if (!mcs_send_erect_domain_request(rdp->mcs))
1967
0
        {
1968
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_erect_domain_request failure");
1969
0
          status = STATE_RUN_FAILED;
1970
0
        }
1971
0
        else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ATTACH_USER))
1972
0
          status = STATE_RUN_FAILED;
1973
0
        else if (!mcs_send_attach_user_request(rdp->mcs))
1974
0
        {
1975
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_attach_user_request failure");
1976
0
          status = STATE_RUN_FAILED;
1977
0
        }
1978
0
        else if (!rdp_client_transition_to_state(rdp,
1979
0
                                                 CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM))
1980
0
          status = STATE_RUN_FAILED;
1981
0
      }
1982
0
      break;
1983
1984
0
    case CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM:
1985
0
      if (!mcs_recv_attach_user_confirm(rdp->mcs, s))
1986
0
      {
1987
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_attach_user_confirm failure");
1988
0
        status = STATE_RUN_FAILED;
1989
0
      }
1990
0
      else if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_SupportSkipChannelJoin))
1991
0
      {
1992
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST))
1993
0
          status = STATE_RUN_FAILED;
1994
0
        else if (!mcs_send_channel_join_request(rdp->mcs, rdp->mcs->userId))
1995
0
        {
1996
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_channel_join_request failure");
1997
0
          status = STATE_RUN_FAILED;
1998
0
        }
1999
0
        else if (!rdp_client_transition_to_state(
2000
0
                     rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE))
2001
0
          status = STATE_RUN_FAILED;
2002
0
      }
2003
0
      else
2004
0
      {
2005
        /* SKIP_CHANNELJOIN is active, consider channels to be joined */
2006
0
        if (!rdp_client_skip_mcs_channel_join(rdp))
2007
0
          status = STATE_RUN_FAILED;
2008
0
      }
2009
0
      break;
2010
2011
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE:
2012
0
      if (!rdp_client_connect_mcs_channel_join_confirm(rdp, s))
2013
0
      {
2014
0
        WLog_Print(rdp->log, WLOG_ERROR,
2015
0
                   "%s - "
2016
0
                   "rdp_client_connect_mcs_channel_join_confirm() fail",
2017
0
                   rdp_get_state_string(rdp));
2018
0
        status = STATE_RUN_FAILED;
2019
0
      }
2020
2021
0
      break;
2022
2023
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
2024
0
      if (!rdp_client_connect_auto_detect(rdp, s))
2025
0
      {
2026
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
2027
0
          status = STATE_RUN_FAILED;
2028
0
        else
2029
0
          status = STATE_RUN_TRY_AGAIN;
2030
0
      }
2031
0
      break;
2032
2033
0
    case CONNECTION_STATE_LICENSING:
2034
0
      status = rdp_client_connect_license(rdp, s);
2035
2036
0
      if (state_run_failed(status))
2037
0
      {
2038
0
        char buffer[64] = { 0 };
2039
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_client_connect_license() - %s",
2040
0
                   rdp_get_state_string(rdp),
2041
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2042
0
      }
2043
2044
0
      break;
2045
2046
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
2047
0
      if (!rdp_client_connect_auto_detect(rdp, s))
2048
0
      {
2049
0
        rdp_client_transition_to_state(
2050
0
            rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
2051
0
        status = STATE_RUN_TRY_AGAIN;
2052
0
      }
2053
0
      break;
2054
2055
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
2056
0
      status = rdp_client_connect_demand_active(rdp, s);
2057
2058
0
      if (state_run_failed(status))
2059
0
      {
2060
0
        char buffer[64] = { 0 };
2061
0
        WLog_Print(rdp->log, WLOG_DEBUG,
2062
0
                   "%s - "
2063
0
                   "rdp_client_connect_demand_active() - %s",
2064
0
                   rdp_get_state_string(rdp),
2065
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2066
0
      }
2067
0
      else if (status == STATE_RUN_ACTIVE)
2068
0
      {
2069
0
        if (!rdp_client_transition_to_state(
2070
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
2071
0
          status = STATE_RUN_FAILED;
2072
0
        else
2073
0
          status = STATE_RUN_CONTINUE;
2074
0
      }
2075
0
      break;
2076
2077
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
2078
0
      status = rdp_client_exchange_monitor_layout(rdp, s);
2079
0
      break;
2080
2081
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
2082
0
      status = rdp_client_connect_confirm_active(rdp, s);
2083
0
      break;
2084
2085
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
2086
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_SYNCHRONIZE_PDU,
2087
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE);
2088
0
      break;
2089
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
2090
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_COOPERATE_PDU,
2091
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL);
2092
0
      break;
2093
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
2094
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_GRANTED_PDU,
2095
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP);
2096
0
      break;
2097
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
2098
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_FONT_MAP_PDU, CONNECTION_STATE_ACTIVE);
2099
0
      break;
2100
2101
0
    case CONNECTION_STATE_ACTIVE:
2102
0
      status = rdp_recv_pdu(rdp, s);
2103
2104
0
      if (state_run_failed(status))
2105
0
      {
2106
0
        char buffer[64] = { 0 };
2107
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_recv_pdu() - %s",
2108
0
                   rdp_get_state_string(rdp),
2109
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2110
0
      }
2111
0
      break;
2112
2113
6.93k
    default:
2114
6.93k
      WLog_Print(rdp->log, WLOG_ERROR, "%s state %d", rdp_get_state_string(rdp),
2115
6.93k
                 rdp_get_state(rdp));
2116
6.93k
      status = STATE_RUN_FAILED;
2117
6.93k
      break;
2118
6.93k
  }
2119
2120
6.93k
  if (state_run_failed(status))
2121
6.93k
  {
2122
6.93k
    char buffer[64] = { 0 };
2123
6.93k
    WLog_Print(rdp->log, WLOG_ERROR, "%s status %s", rdp_get_state_string(rdp),
2124
6.93k
               state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2125
6.93k
  }
2126
6.93k
  return status;
2127
6.93k
}
2128
2129
state_run_t rdp_recv_callback(rdpTransport* transport, wStream* s, void* extra)
2130
6.93k
{
2131
6.93k
  char buffer[64] = { 0 };
2132
6.93k
  state_run_t rc = STATE_RUN_FAILED;
2133
6.93k
  const size_t start = Stream_GetPosition(s);
2134
6.93k
  const rdpContext* context = transport_get_context(transport);
2135
2136
6.93k
  WINPR_ASSERT(context);
2137
6.93k
  do
2138
6.93k
  {
2139
6.93k
    const rdpRdp* rdp = context->rdp;
2140
6.93k
    WINPR_ASSERT(rdp);
2141
2142
6.93k
    if (rc == STATE_RUN_TRY_AGAIN)
2143
0
      Stream_SetPosition(s, start);
2144
2145
6.93k
    const char* old = rdp_get_state_string(rdp);
2146
6.93k
    const size_t orem = Stream_GetRemainingLength(s);
2147
6.93k
    rc = rdp_recv_callback_int(transport, s, extra);
2148
2149
6.93k
    const char* now = rdp_get_state_string(rdp);
2150
6.93k
    const size_t rem = Stream_GetRemainingLength(s);
2151
2152
6.93k
    WLog_Print(rdp->log, WLOG_TRACE,
2153
6.93k
               "(client)[%s -> %s] current return %s [feeding %" PRIuz " bytes, %" PRIuz
2154
6.93k
               " bytes not processed]",
2155
6.93k
               old, now, state_run_result_string(rc, buffer, sizeof(buffer)), orem, rem);
2156
6.93k
  } while ((rc == STATE_RUN_TRY_AGAIN) || (rc == STATE_RUN_CONTINUE));
2157
6.93k
  return rc;
2158
6.93k
}
2159
2160
BOOL rdp_send_channel_data(rdpRdp* rdp, UINT16 channelId, const BYTE* data, size_t size)
2161
0
{
2162
0
  return freerdp_channel_send(rdp, channelId, data, size);
2163
0
}
2164
2165
BOOL rdp_channel_send_packet(rdpRdp* rdp, UINT16 channelId, size_t totalSize, UINT32 flags,
2166
                             const BYTE* data, size_t chunkSize)
2167
0
{
2168
0
  return freerdp_channel_send_packet(rdp, channelId, totalSize, flags, data, chunkSize);
2169
0
}
2170
2171
BOOL rdp_send_error_info(rdpRdp* rdp)
2172
0
{
2173
0
  wStream* s = NULL;
2174
0
  BOOL status = 0;
2175
2176
0
  if (rdp->errorInfo == ERRINFO_SUCCESS)
2177
0
    return TRUE;
2178
2179
0
  s = rdp_data_pdu_init(rdp);
2180
2181
0
  if (!s)
2182
0
    return FALSE;
2183
2184
0
  Stream_Write_UINT32(s, rdp->errorInfo); /* error id (4 bytes) */
2185
0
  status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SET_ERROR_INFO, 0);
2186
0
  return status;
2187
0
}
2188
2189
int rdp_check_fds(rdpRdp* rdp)
2190
0
{
2191
0
  int status = 0;
2192
0
  rdpTsg* tsg = NULL;
2193
0
  rdpTransport* transport = NULL;
2194
2195
0
  WINPR_ASSERT(rdp);
2196
0
  transport = rdp->transport;
2197
2198
0
  tsg = transport_get_tsg(transport);
2199
0
  if (tsg)
2200
0
  {
2201
0
    if (!tsg_check_event_handles(tsg))
2202
0
    {
2203
0
      WLog_Print(rdp->log, WLOG_ERROR, "rdp_check_fds: tsg_check_event_handles()");
2204
0
      return -1;
2205
0
    }
2206
2207
0
    if (tsg_get_state(tsg) != TSG_STATE_PIPE_CREATED)
2208
0
      return 1;
2209
0
  }
2210
2211
0
  status = transport_check_fds(transport);
2212
2213
0
  if (status == 1)
2214
0
  {
2215
0
    if (!rdp_client_redirect(rdp)) /* session redirection */
2216
0
      return -1;
2217
0
  }
2218
2219
0
  if (status < 0)
2220
0
    WLog_Print(rdp->log, WLOG_DEBUG, "transport_check_fds() - %i", status);
2221
2222
0
  return status;
2223
0
}
2224
2225
BOOL freerdp_get_stats(rdpRdp* rdp, UINT64* inBytes, UINT64* outBytes, UINT64* inPackets,
2226
                       UINT64* outPackets)
2227
0
{
2228
0
  if (!rdp)
2229
0
    return FALSE;
2230
2231
0
  if (inBytes)
2232
0
    *inBytes = rdp->inBytes;
2233
0
  if (outBytes)
2234
0
    *outBytes = rdp->outBytes;
2235
0
  if (inPackets)
2236
0
    *inPackets = rdp->inPackets;
2237
0
  if (outPackets)
2238
0
    *outPackets = rdp->outPackets;
2239
2240
0
  return TRUE;
2241
0
}
2242
2243
/**
2244
 * Instantiate new RDP module.
2245
 * @return new RDP module
2246
 */
2247
2248
rdpRdp* rdp_new(rdpContext* context)
2249
13.2k
{
2250
13.2k
  rdpRdp* rdp = NULL;
2251
13.2k
  DWORD flags = 0;
2252
13.2k
  rdp = (rdpRdp*)calloc(1, sizeof(rdpRdp));
2253
2254
13.2k
  if (!rdp)
2255
0
    return NULL;
2256
2257
13.2k
  rdp->log = WLog_Get(RDP_TAG);
2258
13.2k
  WINPR_ASSERT(rdp->log);
2259
2260
13.2k
  (void)_snprintf(rdp->log_context, sizeof(rdp->log_context), "%p", (void*)context);
2261
13.2k
  WLog_SetContext(rdp->log, NULL, rdp->log_context);
2262
2263
13.2k
  InitializeCriticalSection(&rdp->critical);
2264
13.2k
  rdp->context = context;
2265
13.2k
  WINPR_ASSERT(rdp->context);
2266
2267
13.2k
  if (context->ServerMode)
2268
6.33k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2269
2270
13.2k
  if (!context->settings)
2271
13.2k
  {
2272
13.2k
    context->settings = rdp->settings = freerdp_settings_new(flags);
2273
2274
13.2k
    if (!rdp->settings)
2275
0
      goto fail;
2276
13.2k
  }
2277
0
  else
2278
0
    rdp->settings = context->settings;
2279
2280
  /* Keep a backup copy of settings for later comparisons */
2281
13.2k
  if (!rdp_set_backup_settings(rdp))
2282
0
    goto fail;
2283
2284
13.2k
  rdp->settings->instance = context->instance;
2285
2286
13.2k
  context->settings = rdp->settings;
2287
13.2k
  if (context->instance)
2288
6.93k
    context->settings->instance = context->instance;
2289
6.33k
  else if (context->peer)
2290
6.33k
  {
2291
6.33k
    rdp->settings->instance = context->peer;
2292
2293
#if defined(WITH_FREERDP_DEPRECATED)
2294
    context->peer->settings = rdp->settings;
2295
#endif
2296
6.33k
  }
2297
2298
13.2k
  rdp->transport = transport_new(context);
2299
2300
13.2k
  if (!rdp->transport)
2301
0
    goto fail;
2302
2303
13.2k
  {
2304
13.2k
    const rdpTransportIo* io = transport_get_io_callbacks(rdp->transport);
2305
13.2k
    if (!io)
2306
0
      goto fail;
2307
13.2k
    rdp->io = calloc(1, sizeof(rdpTransportIo));
2308
13.2k
    if (!rdp->io)
2309
0
      goto fail;
2310
13.2k
    *rdp->io = *io;
2311
13.2k
  }
2312
2313
0
  rdp->aad = aad_new(context, rdp->transport);
2314
13.2k
  if (!rdp->aad)
2315
0
    goto fail;
2316
2317
13.2k
  rdp->license = license_new(rdp);
2318
2319
13.2k
  if (!rdp->license)
2320
0
    goto fail;
2321
2322
13.2k
  rdp->input = input_new(rdp);
2323
2324
13.2k
  if (!rdp->input)
2325
0
    goto fail;
2326
2327
13.2k
  rdp->update = update_new(rdp);
2328
2329
13.2k
  if (!rdp->update)
2330
0
    goto fail;
2331
2332
13.2k
  rdp->fastpath = fastpath_new(rdp);
2333
2334
13.2k
  if (!rdp->fastpath)
2335
0
    goto fail;
2336
2337
13.2k
  rdp->nego = nego_new(rdp->transport);
2338
2339
13.2k
  if (!rdp->nego)
2340
0
    goto fail;
2341
2342
13.2k
  rdp->mcs = mcs_new(rdp->transport);
2343
2344
13.2k
  if (!rdp->mcs)
2345
0
    goto fail;
2346
2347
13.2k
  rdp->redirection = redirection_new();
2348
2349
13.2k
  if (!rdp->redirection)
2350
0
    goto fail;
2351
2352
13.2k
  rdp->autodetect = autodetect_new(rdp->context);
2353
2354
13.2k
  if (!rdp->autodetect)
2355
0
    goto fail;
2356
2357
13.2k
  rdp->heartbeat = heartbeat_new();
2358
2359
13.2k
  if (!rdp->heartbeat)
2360
0
    goto fail;
2361
2362
13.2k
  rdp->multitransport = multitransport_new(rdp, INITIATE_REQUEST_PROTOCOL_UDPFECL |
2363
13.2k
                                                    INITIATE_REQUEST_PROTOCOL_UDPFECR);
2364
2365
13.2k
  if (!rdp->multitransport)
2366
0
    goto fail;
2367
2368
13.2k
  rdp->bulk = bulk_new(context);
2369
2370
13.2k
  if (!rdp->bulk)
2371
0
    goto fail;
2372
2373
13.2k
  rdp->pubSub = PubSub_New(TRUE);
2374
13.2k
  if (!rdp->pubSub)
2375
0
    goto fail;
2376
2377
13.2k
  rdp->abortEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
2378
13.2k
  if (!rdp->abortEvent)
2379
0
    goto fail;
2380
13.2k
  return rdp;
2381
2382
0
fail:
2383
0
  WINPR_PRAGMA_DIAG_PUSH
2384
0
  WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
2385
0
  rdp_free(rdp);
2386
0
  WINPR_PRAGMA_DIAG_POP
2387
0
  return NULL;
2388
13.2k
}
2389
2390
static void rdp_reset_free(rdpRdp* rdp)
2391
13.2k
{
2392
13.2k
  WINPR_ASSERT(rdp);
2393
2394
13.2k
  rdp_free_rc4_decrypt_keys(rdp);
2395
13.2k
  rdp_free_rc4_encrypt_keys(rdp);
2396
2397
13.2k
  winpr_Cipher_Free(rdp->fips_encrypt);
2398
13.2k
  winpr_Cipher_Free(rdp->fips_decrypt);
2399
13.2k
  rdp->fips_encrypt = NULL;
2400
13.2k
  rdp->fips_decrypt = NULL;
2401
2402
13.2k
  mcs_free(rdp->mcs);
2403
13.2k
  nego_free(rdp->nego);
2404
13.2k
  license_free(rdp->license);
2405
13.2k
  transport_free(rdp->transport);
2406
13.2k
  fastpath_free(rdp->fastpath);
2407
2408
13.2k
  rdp->mcs = NULL;
2409
13.2k
  rdp->nego = NULL;
2410
13.2k
  rdp->license = NULL;
2411
13.2k
  rdp->transport = NULL;
2412
13.2k
  rdp->fastpath = NULL;
2413
13.2k
}
2414
2415
BOOL rdp_reset(rdpRdp* rdp)
2416
0
{
2417
0
  BOOL rc = TRUE;
2418
0
  rdpContext* context = NULL;
2419
0
  rdpSettings* settings = NULL;
2420
2421
0
  WINPR_ASSERT(rdp);
2422
2423
0
  context = rdp->context;
2424
0
  WINPR_ASSERT(context);
2425
2426
0
  settings = rdp->settings;
2427
0
  WINPR_ASSERT(settings);
2428
2429
0
  bulk_reset(rdp->bulk);
2430
2431
0
  rdp_reset_free(rdp);
2432
2433
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, NULL, 0))
2434
0
    rc = FALSE;
2435
2436
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, NULL, 0))
2437
0
    rc = FALSE;
2438
2439
0
  if (!freerdp_settings_set_string(settings, FreeRDP_ClientAddress, NULL))
2440
0
    rc = FALSE;
2441
2442
0
  if (!rc)
2443
0
    goto fail;
2444
2445
0
  rc = FALSE;
2446
0
  rdp->transport = transport_new(context);
2447
0
  if (!rdp->transport)
2448
0
    goto fail;
2449
2450
0
  if (rdp->io)
2451
0
  {
2452
0
    if (!transport_set_io_callbacks(rdp->transport, rdp->io))
2453
0
      goto fail;
2454
0
  }
2455
2456
0
  aad_free(rdp->aad);
2457
0
  rdp->aad = aad_new(context, rdp->transport);
2458
0
  if (!rdp->aad)
2459
0
    goto fail;
2460
2461
0
  rdp->nego = nego_new(rdp->transport);
2462
0
  if (!rdp->nego)
2463
0
    goto fail;
2464
2465
0
  rdp->mcs = mcs_new(rdp->transport);
2466
0
  if (!rdp->mcs)
2467
0
    goto fail;
2468
2469
0
  if (!transport_set_layer(rdp->transport, TRANSPORT_LAYER_TCP))
2470
0
    goto fail;
2471
2472
0
  rdp->license = license_new(rdp);
2473
0
  if (!rdp->license)
2474
0
    goto fail;
2475
2476
0
  rdp->fastpath = fastpath_new(rdp);
2477
0
  if (!rdp->fastpath)
2478
0
    goto fail;
2479
2480
0
  rdp->errorInfo = 0;
2481
0
  rc = rdp_finalize_reset_flags(rdp, TRUE);
2482
2483
0
fail:
2484
0
  return rc;
2485
0
}
2486
2487
/**
2488
 * Free RDP module.
2489
 * @param rdp RDP module to be freed
2490
 */
2491
2492
void rdp_free(rdpRdp* rdp)
2493
13.2k
{
2494
13.2k
  if (rdp)
2495
13.2k
  {
2496
13.2k
    DeleteCriticalSection(&rdp->critical);
2497
13.2k
    rdp_reset_free(rdp);
2498
2499
13.2k
    freerdp_settings_free(rdp->settings);
2500
13.2k
    freerdp_settings_free(rdp->originalSettings);
2501
13.2k
    freerdp_settings_free(rdp->remoteSettings);
2502
2503
13.2k
    input_free(rdp->input);
2504
13.2k
    update_free(rdp->update);
2505
13.2k
    nla_free(rdp->nla);
2506
13.2k
    redirection_free(rdp->redirection);
2507
13.2k
    autodetect_free(rdp->autodetect);
2508
13.2k
    heartbeat_free(rdp->heartbeat);
2509
13.2k
    multitransport_free(rdp->multitransport);
2510
13.2k
    bulk_free(rdp->bulk);
2511
13.2k
    free(rdp->io);
2512
13.2k
    PubSub_Free(rdp->pubSub);
2513
13.2k
    if (rdp->abortEvent)
2514
13.2k
      CloseHandle(rdp->abortEvent);
2515
13.2k
    aad_free(rdp->aad);
2516
13.2k
    free(rdp);
2517
13.2k
  }
2518
13.2k
}
2519
2520
BOOL rdp_io_callback_set_event(rdpRdp* rdp, BOOL set)
2521
0
{
2522
0
  if (!rdp)
2523
0
    return FALSE;
2524
0
  return transport_io_callback_set_event(rdp->transport, set);
2525
0
}
2526
2527
const rdpTransportIo* rdp_get_io_callbacks(rdpRdp* rdp)
2528
0
{
2529
0
  if (!rdp)
2530
0
    return NULL;
2531
0
  return rdp->io;
2532
0
}
2533
2534
BOOL rdp_set_io_callbacks(rdpRdp* rdp, const rdpTransportIo* io_callbacks)
2535
0
{
2536
0
  if (!rdp)
2537
0
    return FALSE;
2538
0
  free(rdp->io);
2539
0
  rdp->io = NULL;
2540
0
  if (io_callbacks)
2541
0
  {
2542
0
    rdp->io = malloc(sizeof(rdpTransportIo));
2543
0
    if (!rdp->io)
2544
0
      return FALSE;
2545
0
    *rdp->io = *io_callbacks;
2546
0
    return transport_set_io_callbacks(rdp->transport, rdp->io);
2547
0
  }
2548
0
  return TRUE;
2549
0
}
2550
2551
BOOL rdp_set_io_callback_context(rdpRdp* rdp, void* usercontext)
2552
0
{
2553
0
  WINPR_ASSERT(rdp);
2554
0
  rdp->ioContext = usercontext;
2555
0
  return TRUE;
2556
0
}
2557
2558
void* rdp_get_io_callback_context(rdpRdp* rdp)
2559
0
{
2560
0
  WINPR_ASSERT(rdp);
2561
0
  return rdp->ioContext;
2562
0
}
2563
2564
const char* rdp_finalize_flags_to_str(UINT32 flags, char* buffer, size_t size)
2565
0
{
2566
0
  char number[32] = { 0 };
2567
0
  const UINT32 mask = ~(FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
2568
0
                        FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU |
2569
0
                        FINALIZE_CS_SYNCHRONIZE_PDU | FINALIZE_CS_CONTROL_COOPERATE_PDU |
2570
0
                        FINALIZE_CS_CONTROL_REQUEST_PDU | FINALIZE_CS_PERSISTENT_KEY_LIST_PDU |
2571
0
                        FINALIZE_CS_FONT_LIST_PDU | FINALIZE_DEACTIVATE_REACTIVATE);
2572
2573
0
  if (flags & FINALIZE_SC_SYNCHRONIZE_PDU)
2574
0
    winpr_str_append("FINALIZE_SC_SYNCHRONIZE_PDU", buffer, size, "|");
2575
0
  if (flags & FINALIZE_SC_CONTROL_COOPERATE_PDU)
2576
0
    winpr_str_append("FINALIZE_SC_CONTROL_COOPERATE_PDU", buffer, size, "|");
2577
0
  if (flags & FINALIZE_SC_CONTROL_GRANTED_PDU)
2578
0
    winpr_str_append("FINALIZE_SC_CONTROL_GRANTED_PDU", buffer, size, "|");
2579
0
  if (flags & FINALIZE_SC_FONT_MAP_PDU)
2580
0
    winpr_str_append("FINALIZE_SC_FONT_MAP_PDU", buffer, size, "|");
2581
0
  if (flags & FINALIZE_CS_SYNCHRONIZE_PDU)
2582
0
    winpr_str_append("FINALIZE_CS_SYNCHRONIZE_PDU", buffer, size, "|");
2583
0
  if (flags & FINALIZE_CS_CONTROL_COOPERATE_PDU)
2584
0
    winpr_str_append("FINALIZE_CS_CONTROL_COOPERATE_PDU", buffer, size, "|");
2585
0
  if (flags & FINALIZE_CS_CONTROL_REQUEST_PDU)
2586
0
    winpr_str_append("FINALIZE_CS_CONTROL_REQUEST_PDU", buffer, size, "|");
2587
0
  if (flags & FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)
2588
0
    winpr_str_append("FINALIZE_CS_PERSISTENT_KEY_LIST_PDU", buffer, size, "|");
2589
0
  if (flags & FINALIZE_CS_FONT_LIST_PDU)
2590
0
    winpr_str_append("FINALIZE_CS_FONT_LIST_PDU", buffer, size, "|");
2591
0
  if (flags & FINALIZE_DEACTIVATE_REACTIVATE)
2592
0
    winpr_str_append("FINALIZE_DEACTIVATE_REACTIVATE", buffer, size, "|");
2593
0
  if (flags & mask)
2594
0
    winpr_str_append("UNKNOWN_FLAG", buffer, size, "|");
2595
0
  if (flags == 0)
2596
0
    winpr_str_append("NO_FLAG_SET", buffer, size, "|");
2597
0
  (void)_snprintf(number, sizeof(number), " [0x%08" PRIx32 "]", flags);
2598
0
  winpr_str_append(number, buffer, size, "");
2599
0
  return buffer;
2600
0
}
2601
2602
BOOL rdp_finalize_reset_flags(rdpRdp* rdp, BOOL clearAll)
2603
0
{
2604
0
  WINPR_ASSERT(rdp);
2605
0
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] reset finalize_sc_pdus", rdp_get_state_string(rdp));
2606
0
  if (clearAll)
2607
0
    rdp->finalize_sc_pdus = 0;
2608
0
  else
2609
0
    rdp->finalize_sc_pdus &= FINALIZE_DEACTIVATE_REACTIVATE;
2610
2611
0
  return rdp_set_monitor_layout_pdu_state(rdp, FALSE);
2612
0
}
2613
2614
BOOL rdp_finalize_set_flag(rdpRdp* rdp, UINT32 flag)
2615
7.14k
{
2616
7.14k
  char buffer[1024] = { 0 };
2617
2618
7.14k
  WINPR_ASSERT(rdp);
2619
2620
7.14k
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] received flag %s", rdp_get_state_string(rdp),
2621
7.14k
             rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
2622
7.14k
  rdp->finalize_sc_pdus |= flag;
2623
7.14k
  return TRUE;
2624
7.14k
}
2625
2626
BOOL rdp_finalize_is_flag_set(rdpRdp* rdp, UINT32 flag)
2627
0
{
2628
0
  WINPR_ASSERT(rdp);
2629
0
  return (rdp->finalize_sc_pdus & flag) == flag;
2630
0
}
2631
2632
BOOL rdp_reset_rc4_encrypt_keys(rdpRdp* rdp)
2633
0
{
2634
0
  WINPR_ASSERT(rdp);
2635
0
  rdp_free_rc4_encrypt_keys(rdp);
2636
0
  rdp->rc4_encrypt_key = winpr_RC4_New(rdp->encrypt_key, rdp->rc4_key_len);
2637
2638
0
  rdp->encrypt_use_count = 0;
2639
0
  return rdp->rc4_encrypt_key != NULL;
2640
0
}
2641
2642
void rdp_free_rc4_encrypt_keys(rdpRdp* rdp)
2643
13.2k
{
2644
13.2k
  WINPR_ASSERT(rdp);
2645
13.2k
  winpr_RC4_Free(rdp->rc4_encrypt_key);
2646
13.2k
  rdp->rc4_encrypt_key = NULL;
2647
13.2k
}
2648
2649
void rdp_free_rc4_decrypt_keys(rdpRdp* rdp)
2650
13.2k
{
2651
13.2k
  WINPR_ASSERT(rdp);
2652
13.2k
  winpr_RC4_Free(rdp->rc4_decrypt_key);
2653
13.2k
  rdp->rc4_decrypt_key = NULL;
2654
13.2k
}
2655
2656
BOOL rdp_reset_rc4_decrypt_keys(rdpRdp* rdp)
2657
0
{
2658
0
  WINPR_ASSERT(rdp);
2659
0
  rdp_free_rc4_decrypt_keys(rdp);
2660
0
  rdp->rc4_decrypt_key = winpr_RC4_New(rdp->decrypt_key, rdp->rc4_key_len);
2661
2662
0
  rdp->decrypt_use_count = 0;
2663
0
  return rdp->rc4_decrypt_key != NULL;
2664
0
}
2665
2666
const char* rdp_security_flag_string(UINT32 securityFlags, char* buffer, size_t size)
2667
11.2k
{
2668
11.2k
  if (securityFlags & SEC_EXCHANGE_PKT)
2669
1.68k
    winpr_str_append("SEC_EXCHANGE_PKT", buffer, size, "|");
2670
11.2k
  if (securityFlags & SEC_TRANSPORT_REQ)
2671
2.52k
    winpr_str_append("SEC_TRANSPORT_REQ", buffer, size, "|");
2672
11.2k
  if (securityFlags & SEC_TRANSPORT_RSP)
2673
1.69k
    winpr_str_append("SEC_TRANSPORT_RSP", buffer, size, "|");
2674
11.2k
  if (securityFlags & SEC_ENCRYPT)
2675
1.45k
    winpr_str_append("SEC_ENCRYPT", buffer, size, "|");
2676
11.2k
  if (securityFlags & SEC_RESET_SEQNO)
2677
1.43k
    winpr_str_append("SEC_RESET_SEQNO", buffer, size, "|");
2678
11.2k
  if (securityFlags & SEC_IGNORE_SEQNO)
2679
1.63k
    winpr_str_append("SEC_IGNORE_SEQNO", buffer, size, "|");
2680
11.2k
  if (securityFlags & SEC_INFO_PKT)
2681
1.47k
    winpr_str_append("SEC_INFO_PKT", buffer, size, "|");
2682
11.2k
  if (securityFlags & SEC_LICENSE_PKT)
2683
1.11k
    winpr_str_append("SEC_LICENSE_PKT", buffer, size, "|");
2684
11.2k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
2685
2.29k
    winpr_str_append("SEC_LICENSE_ENCRYPT_CS", buffer, size, "|");
2686
11.2k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
2687
2.29k
    winpr_str_append("SEC_LICENSE_ENCRYPT_SC", buffer, size, "|");
2688
11.2k
  if (securityFlags & SEC_REDIRECTION_PKT)
2689
7.23k
    winpr_str_append("SEC_REDIRECTION_PKT", buffer, size, "|");
2690
11.2k
  if (securityFlags & SEC_SECURE_CHECKSUM)
2691
1.67k
    winpr_str_append("SEC_SECURE_CHECKSUM", buffer, size, "|");
2692
11.2k
  if (securityFlags & SEC_AUTODETECT_REQ)
2693
1.45k
    winpr_str_append("SEC_AUTODETECT_REQ", buffer, size, "|");
2694
11.2k
  if (securityFlags & SEC_AUTODETECT_RSP)
2695
1.56k
    winpr_str_append("SEC_AUTODETECT_RSP", buffer, size, "|");
2696
11.2k
  if (securityFlags & SEC_HEARTBEAT)
2697
1.40k
    winpr_str_append("SEC_HEARTBEAT", buffer, size, "|");
2698
11.2k
  if (securityFlags & SEC_FLAGSHI_VALID)
2699
1.11k
    winpr_str_append("SEC_FLAGSHI_VALID", buffer, size, "|");
2700
11.2k
  {
2701
11.2k
    char msg[32] = { 0 };
2702
2703
11.2k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", securityFlags);
2704
11.2k
    winpr_str_append(msg, buffer, size, "");
2705
11.2k
  }
2706
11.2k
  return buffer;
2707
11.2k
}
2708
2709
static BOOL rdp_reset_remote_settings(rdpRdp* rdp)
2710
13.2k
{
2711
13.2k
  UINT32 flags = FREERDP_SETTINGS_REMOTE_MODE;
2712
13.2k
  WINPR_ASSERT(rdp);
2713
13.2k
  freerdp_settings_free(rdp->remoteSettings);
2714
2715
13.2k
  if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_ServerMode))
2716
6.93k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2717
13.2k
  rdp->remoteSettings = freerdp_settings_new(flags);
2718
13.2k
  return rdp->remoteSettings != NULL;
2719
13.2k
}
2720
2721
BOOL rdp_set_backup_settings(rdpRdp* rdp)
2722
13.2k
{
2723
13.2k
  WINPR_ASSERT(rdp);
2724
13.2k
  freerdp_settings_free(rdp->originalSettings);
2725
13.2k
  rdp->originalSettings = freerdp_settings_clone(rdp->settings);
2726
13.2k
  if (!rdp->originalSettings)
2727
0
    return FALSE;
2728
13.2k
  return rdp_reset_remote_settings(rdp);
2729
13.2k
}
2730
2731
BOOL rdp_reset_runtime_settings(rdpRdp* rdp)
2732
0
{
2733
0
  WINPR_ASSERT(rdp);
2734
0
  WINPR_ASSERT(rdp->context);
2735
2736
0
  freerdp_settings_free(rdp->settings);
2737
0
  rdp->context->settings = rdp->settings = freerdp_settings_clone(rdp->originalSettings);
2738
2739
0
  if (!rdp->settings)
2740
0
    return FALSE;
2741
0
  return rdp_reset_remote_settings(rdp);
2742
0
}
2743
2744
static BOOL starts_with(const char* tok, const char* val)
2745
12.5k
{
2746
12.5k
  const size_t len = strlen(val);
2747
12.5k
  if (strncmp(tok, val, len) != 0)
2748
12.5k
    return FALSE;
2749
86
  if (tok[len] != '=')
2750
12
    return FALSE;
2751
74
  return TRUE;
2752
86
}
2753
2754
static BOOL option_equals(const char* what, const char* val)
2755
222
{
2756
222
  return _stricmp(what, val) == 0;
2757
222
}
2758
2759
static BOOL parse_on_off_option(const char* value)
2760
74
{
2761
74
  WINPR_ASSERT(value);
2762
74
  const char* sep = strchr(value, '=');
2763
74
  if (!sep)
2764
0
    return TRUE;
2765
74
  if (option_equals("on", &sep[1]))
2766
0
    return TRUE;
2767
74
  if (option_equals("true", &sep[1]))
2768
0
    return TRUE;
2769
74
  if (option_equals("off", &sep[1]))
2770
74
    return FALSE;
2771
0
  if (option_equals("false", &sep[1]))
2772
0
    return FALSE;
2773
2774
0
  errno = 0;
2775
0
  long val = strtol(value, NULL, 0);
2776
0
  if (errno == 0)
2777
0
    return val == 0 ? FALSE : TRUE;
2778
2779
0
  return FALSE;
2780
0
}
2781
2782
13.7k
#define STR(x) #x
2783
2784
static BOOL option_is_experimental(wLog* log, const char* tok)
2785
336
{
2786
336
  const char* experimental[] = { STR(WITH_DSP_EXPERIMENTAL), STR(WITH_VAAPI) };
2787
1.00k
  for (size_t x = 0; x < ARRAYSIZE(experimental); x++)
2788
670
  {
2789
670
    const char* opt = experimental[x];
2790
670
    if (starts_with(tok, opt))
2791
4
    {
2792
4
      return parse_on_off_option(tok);
2793
4
    }
2794
670
  }
2795
332
  return FALSE;
2796
336
}
2797
2798
static BOOL option_is_debug(wLog* log, const char* tok)
2799
336
{
2800
336
  WINPR_ASSERT(log);
2801
336
  const char* debug[] = { STR(WITH_DEBUG_ALL),
2802
336
                        STR(WITH_DEBUG_CERTIFICATE),
2803
336
                        STR(WITH_DEBUG_CAPABILITIES),
2804
336
                        STR(WITH_DEBUG_CHANNELS),
2805
336
                        STR(WITH_DEBUG_CLIPRDR),
2806
336
                        STR(WITH_DEBUG_CODECS),
2807
336
                        STR(WITH_DEBUG_RDPGFX),
2808
336
                        STR(WITH_DEBUG_DVC),
2809
336
                        STR(WITH_DEBUG_TSMF),
2810
336
                        STR(WITH_DEBUG_KBD),
2811
336
                        STR(WITH_DEBUG_LICENSE),
2812
336
                        STR(WITH_DEBUG_NEGO),
2813
336
                        STR(WITH_DEBUG_NLA),
2814
336
                        STR(WITH_DEBUG_TSG),
2815
336
                        STR(WITH_DEBUG_RAIL),
2816
336
                        STR(WITH_DEBUG_RDP),
2817
336
                        STR(WITH_DEBUG_RDPEI),
2818
336
                        STR(WITH_DEBUG_REDIR),
2819
336
                        STR(WITH_DEBUG_RDPDR),
2820
336
                        STR(WITH_DEBUG_RFX),
2821
336
                        STR(WITH_DEBUG_SCARD),
2822
336
                        STR(WITH_DEBUG_SND),
2823
336
                        STR(WITH_DEBUG_SVC),
2824
336
                        STR(WITH_DEBUG_TRANSPORT),
2825
336
                        STR(WITH_DEBUG_TIMEZONE),
2826
336
                        STR(WITH_DEBUG_WND),
2827
336
                        STR(WITH_DEBUG_X11_CLIPRDR),
2828
336
                        STR(WITH_DEBUG_X11_LOCAL_MOVESIZE),
2829
336
                        STR(WITH_DEBUG_X11),
2830
336
                        STR(WITH_DEBUG_XV),
2831
336
                        STR(WITH_DEBUG_RINGBUFFER),
2832
336
                        STR(WITH_DEBUG_SYMBOLS),
2833
336
                        STR(WITH_DEBUG_EVENTS),
2834
336
                        STR(WITH_DEBUG_MUTEX),
2835
336
                        STR(WITH_DEBUG_NTLM),
2836
336
                        STR(WITH_DEBUG_SDL_EVENTS),
2837
336
                        STR(WITH_DEBUG_SDL_KBD_EVENTS),
2838
336
                        STR(WITH_DEBUG_THREADS),
2839
336
                        STR(WITH_DEBUG_URBDRC) };
2840
2841
11.9k
  for (size_t x = 0; x < ARRAYSIZE(debug); x++)
2842
11.6k
  {
2843
11.6k
    const char* opt = debug[x];
2844
11.6k
    if (starts_with(tok, opt))
2845
70
      return parse_on_off_option(tok);
2846
11.6k
  }
2847
2848
266
  if (starts_with(tok, "WITH_DEBUG"))
2849
0
  {
2850
0
    WLog_Print(log, WLOG_WARN, "[BUG] Unmapped Debug-Build option '%s'.", tok);
2851
0
    return parse_on_off_option(tok);
2852
0
  }
2853
2854
266
  return FALSE;
2855
266
}
2856
2857
static void log_build_warn(rdpRdp* rdp, const char* what, const char* msg,
2858
                           BOOL (*cmp)(wLog* log, const char* tok))
2859
4
{
2860
4
  WINPR_ASSERT(rdp);
2861
4
  WINPR_PRAGMA_DIAG_PUSH
2862
4
  WINPR_PRAGMA_DIAG_IGNORED_OVERLENGTH_STRINGS
2863
2864
4
  size_t len = sizeof(FREERDP_BUILD_CONFIG);
2865
4
  char* list = calloc(len, sizeof(char));
2866
4
  char* config = _strdup(FREERDP_BUILD_CONFIG);
2867
4
  WINPR_PRAGMA_DIAG_POP
2868
2869
4
  if (config && list)
2870
4
  {
2871
4
    char* tok = strtok(config, " ");
2872
676
    while (tok)
2873
672
    {
2874
672
      if (cmp(rdp->log, tok))
2875
0
        winpr_str_append(tok, list, len, " ");
2876
2877
672
      tok = strtok(NULL, " ");
2878
672
    }
2879
4
  }
2880
4
  free(config);
2881
2882
4
  if (list)
2883
4
  {
2884
4
    if (strlen(list) > 0)
2885
0
    {
2886
0
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2887
0
      WLog_Print(rdp->log, WLOG_WARN, "This build is using [%s] build options:", what);
2888
0
      char* tok = strtok(list, " ");
2889
0
      while (tok)
2890
0
      {
2891
0
        WLog_Print(rdp->log, WLOG_WARN, "* '%s'", tok);
2892
0
        tok = strtok(NULL, " ");
2893
0
      }
2894
0
      WLog_Print(rdp->log, WLOG_WARN, "");
2895
0
      WLog_Print(rdp->log, WLOG_WARN, "[%s] build options %s", what, msg);
2896
0
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2897
0
    }
2898
4
  }
2899
4
  free(list);
2900
4
}
2901
2902
void rdp_log_build_warnings(rdpRdp* rdp)
2903
13.2k
{
2904
13.2k
  static unsigned count = 0;
2905
2906
13.2k
  WINPR_ASSERT(rdp);
2907
  /* Since this function is called in context creation routines stop logging
2908
   * this issue repetedly. This is required for proxy, which would otherwise
2909
   * spam the log with these. */
2910
13.2k
  if (count > 0)
2911
13.2k
    return;
2912
2
  count++;
2913
2
  log_build_warn(rdp, "experimental", "might crash the application", option_is_experimental);
2914
2
  log_build_warn(rdp, "debug", "might leak sensitive information (credentials, ...)",
2915
2
                 option_is_debug);
2916
2
}