Coverage Report

Created: 2025-06-16 06:41

/src/FreeRDP/libfreerdp/core/rdp.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Core
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 *
8
 * Licensed under the Apache License, Version 2.0 (the "License");
9
 * you may not use this file except in compliance with the License.
10
 * You may obtain a copy of the License at
11
 *
12
 *     http://www.apache.org/licenses/LICENSE-2.0
13
 *
14
 * Unless required by applicable law or agreed to in writing, software
15
 * distributed under the License is distributed on an "AS IS" BASIS,
16
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17
 * See the License for the specific language governing permissions and
18
 * limitations under the License.
19
 */
20
21
#include <freerdp/config.h>
22
23
#include "settings.h"
24
25
#include <winpr/crt.h>
26
#include <winpr/string.h>
27
#include <winpr/synch.h>
28
#include <winpr/assert.h>
29
#include <winpr/cast.h>
30
#include <winpr/json.h>
31
32
#include "rdp.h"
33
34
#include "state.h"
35
#include "info.h"
36
#include "utils.h"
37
#include "mcs.h"
38
#include "redirection.h"
39
40
#include <freerdp/codec/bulk.h>
41
#include <freerdp/crypto/per.h>
42
#include <freerdp/log.h>
43
#include <freerdp/buildflags.h>
44
45
18.5k
#define RDP_TAG FREERDP_TAG("core.rdp")
46
47
typedef struct
48
{
49
  const char* file;
50
  const char* fkt;
51
  size_t line;
52
  DWORD level;
53
} log_line_t;
54
55
static const char* DATA_PDU_TYPE_STRINGS[80] = {
56
  "?",
57
  "?",      /* 0x00 - 0x01 */
58
  "Update", /* 0x02 */
59
  "?",
60
  "?",
61
  "?",
62
  "?",
63
  "?",
64
  "?",
65
  "?",
66
  "?", /* 0x03 - 0x0A */
67
  "?",
68
  "?",
69
  "?",
70
  "?",
71
  "?",
72
  "?",
73
  "?",
74
  "?",
75
  "?",       /* 0x0B - 0x13 */
76
  "Control", /* 0x14 */
77
  "?",
78
  "?",
79
  "?",
80
  "?",
81
  "?",
82
  "?",       /* 0x15 - 0x1A */
83
  "Pointer", /* 0x1B */
84
  "Input",   /* 0x1C */
85
  "?",
86
  "?",                            /* 0x1D - 0x1E */
87
  "Synchronize",                  /* 0x1F */
88
  "?",                            /* 0x20 */
89
  "Refresh Rect",                 /* 0x21 */
90
  "Play Sound",                   /* 0x22 */
91
  "Suppress Output",              /* 0x23 */
92
  "Shutdown Request",             /* 0x24 */
93
  "Shutdown Denied",              /* 0x25 */
94
  "Save Session Info",            /* 0x26 */
95
  "Font List",                    /* 0x27 */
96
  "Font Map",                     /* 0x28 */
97
  "Set Keyboard Indicators",      /* 0x29 */
98
  "?",                            /* 0x2A */
99
  "Bitmap Cache Persistent List", /* 0x2B */
100
  "Bitmap Cache Error",           /* 0x2C */
101
  "Set Keyboard IME Status",      /* 0x2D */
102
  "Offscreen Cache Error",        /* 0x2E */
103
  "Set Error Info",               /* 0x2F */
104
  "Draw Nine Grid Error",         /* 0x30 */
105
  "Draw GDI+ Error",              /* 0x31 */
106
  "ARC Status",                   /* 0x32 */
107
  "?",
108
  "?",
109
  "?",              /* 0x33 - 0x35 */
110
  "Status Info",    /* 0x36 */
111
  "Monitor Layout", /* 0x37 */
112
  "FrameAcknowledge",
113
  "?",
114
  "?", /* 0x38 - 0x40 */
115
  "?",
116
  "?",
117
  "?",
118
  "?",
119
  "?",
120
  "?" /* 0x41 - 0x46 */
121
};
122
123
#define rdp_check_monitor_layout_pdu_state(rdp, expected) \
124
0
  rdp_check_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
125
126
static BOOL rdp_check_monitor_layout_pdu_state_(const rdpRdp* rdp, BOOL expected, const char* file,
127
                                                const char* fkt, size_t line)
128
0
{
129
0
  WINPR_ASSERT(rdp);
130
0
  if (expected != rdp->monitor_layout_pdu)
131
0
  {
132
0
    const DWORD log_level = WLOG_ERROR;
133
0
    if (WLog_IsLevelActive(rdp->log, log_level))
134
0
    {
135
0
      WLog_PrintMessage(rdp->log, WLOG_MESSAGE_TEXT, log_level, line, file, fkt,
136
0
                        "Expected rdp->monitor_layout_pdu == %s",
137
0
                        expected ? "TRUE" : "FALSE");
138
0
    }
139
0
    return FALSE;
140
0
  }
141
0
  return TRUE;
142
0
}
143
144
#define rdp_set_monitor_layout_pdu_state(rdp, expected) \
145
72
  rdp_set_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
146
static BOOL rdp_set_monitor_layout_pdu_state_(rdpRdp* rdp, BOOL value, const char* file,
147
                                              const char* fkt, size_t line)
148
72
{
149
150
72
  WINPR_ASSERT(rdp);
151
72
  if (value && (value == rdp->monitor_layout_pdu))
152
4
  {
153
4
    const DWORD log_level = WLOG_WARN;
154
4
    if (WLog_IsLevelActive(rdp->log, log_level))
155
4
    {
156
4
      WLog_PrintMessage(rdp->log, WLOG_MESSAGE_TEXT, log_level, line, file, fkt,
157
4
                        "rdp->monitor_layout_pdu == TRUE, expected FALSE");
158
4
    }
159
4
    return FALSE;
160
4
  }
161
68
  rdp->monitor_layout_pdu = value;
162
68
  return TRUE;
163
72
}
164
165
const char* data_pdu_type_to_string(UINT8 type)
166
523
{
167
523
  if (type >= ARRAYSIZE(DATA_PDU_TYPE_STRINGS))
168
47
    return "???";
169
476
  return DATA_PDU_TYPE_STRINGS[type];
170
523
}
171
172
static BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id);
173
static BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
174
                                           UINT16 channel_id);
175
static BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type,
176
                                        UINT32 share_id);
177
178
/**
179
 * @brief Read RDP Security Header.
180
 * msdn{cc240579}
181
 *
182
 * @param s stream
183
 * @param flags security flags
184
 *
185
 * @return \b TRUE for success, \b FALSE otherwise
186
 */
187
188
BOOL rdp_read_security_header(rdpRdp* rdp, wStream* s, UINT16* flags, UINT16* length)
189
19.6k
{
190
19.6k
  char buffer[256] = { 0 };
191
19.6k
  WINPR_ASSERT(s);
192
19.6k
  WINPR_ASSERT(flags);
193
19.6k
  WINPR_ASSERT(rdp);
194
195
  /* Basic Security Header */
196
19.6k
  if ((length && (*length < 4)))
197
18.5k
  {
198
18.5k
    WLog_Print(rdp->log, WLOG_WARN,
199
18.5k
               "invalid security header length, have %" PRIu16 ", must be >= 4", *length);
200
18.5k
    return FALSE;
201
18.5k
  }
202
1.08k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
203
2
    return FALSE;
204
205
1.08k
  *flags = Stream_Get_UINT16(s);                 /* flags */
206
1.08k
  const uint16_t flagsHi = Stream_Get_UINT16(s); /* flagsHi (unused) */
207
1.08k
  if ((*flags & SEC_FLAGSHI_VALID) != 0)
208
609
  {
209
609
    WLog_Print(rdp->log, WLOG_WARN,
210
609
               "[MS-RDPBCGR] 2.2.8.1.1.2.1 Basic (TS_SECURITY_HEADER) SEC_FLAGSHI_VALID field "
211
609
               "set: flagsHi=0x%04" PRIx16,
212
609
               flagsHi);
213
609
  }
214
1.08k
  WLog_Print(rdp->log, WLOG_TRACE, "%s",
215
1.08k
             rdp_security_flag_string(*flags, buffer, sizeof(buffer)));
216
1.08k
  if (length)
217
1.08k
    *length -= 4;
218
219
1.08k
  return TRUE;
220
1.08k
}
221
222
/**
223
 * Write RDP Security Header.
224
 * msdn{cc240579}
225
 * @param s stream
226
 * @param flags security flags
227
 *
228
 * @return \b TRUE for success, \b FALSE otherwise
229
 */
230
231
BOOL rdp_write_security_header(rdpRdp* rdp, wStream* s, UINT16 flags)
232
0
{
233
0
  char buffer[256] = { 0 };
234
0
  WINPR_ASSERT(s);
235
0
  WINPR_ASSERT(rdp);
236
237
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 4))
238
0
    return FALSE;
239
240
0
  WLog_Print(rdp->log, WLOG_TRACE, "%s", rdp_security_flag_string(flags, buffer, sizeof(buffer)));
241
  /* Basic Security Header */
242
0
  WINPR_ASSERT((flags & SEC_FLAGSHI_VALID) == 0); /* SEC_FLAGSHI_VALID is unsupported */
243
0
  Stream_Write_UINT16(s, flags); /* flags */
244
0
  Stream_Write_UINT16(s, 0);     /* flagsHi (unused) */
245
0
  return TRUE;
246
0
}
247
248
BOOL rdp_read_share_control_header(rdpRdp* rdp, wStream* s, UINT16* tpktLength,
249
                                   UINT16* remainingLength, UINT16* type, UINT16* channel_id)
250
18.5k
{
251
18.5k
  UINT16 len = 0;
252
18.5k
  UINT16 tmp = 0;
253
254
18.5k
  WINPR_ASSERT(rdp);
255
18.5k
  WINPR_ASSERT(s);
256
18.5k
  WINPR_ASSERT(type);
257
18.5k
  WINPR_ASSERT(channel_id);
258
259
18.5k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
260
6.67k
    return FALSE;
261
262
  /* Share Control Header */
263
11.8k
  Stream_Read_UINT16(s, len); /* totalLength */
264
265
  /* If length is 0x8000 then we actually got a flow control PDU that we should ignore
266
   http://msdn.microsoft.com/en-us/library/cc240576.aspx */
267
11.8k
  if (len == 0x8000)
268
150
  {
269
150
    if (!rdp_read_flow_control_pdu(rdp, s, type, channel_id))
270
12
      return FALSE;
271
138
    *channel_id = 0;
272
138
    if (tpktLength)
273
138
      *tpktLength = 8; /* Flow control PDU is 8 bytes */
274
138
    if (remainingLength)
275
138
      *remainingLength = 0;
276
277
138
    char buffer[128] = { 0 };
278
138
    WLog_Print(rdp->log, WLOG_DEBUG,
279
138
               "[Flow control PDU] type=%s, tpktLength=%" PRIuz ", remainingLength=%" PRIuz,
280
138
               pdu_type_to_str(*type, buffer, sizeof(buffer)), tpktLength ? *tpktLength : 0,
281
138
               remainingLength ? *remainingLength : 0);
282
138
    return TRUE;
283
150
  }
284
285
11.7k
  if (len < 4U)
286
6.23k
  {
287
6.23k
    WLog_Print(rdp->log, WLOG_ERROR,
288
6.23k
               "Invalid share control header, length is %" PRIu16 ", must be >4", len);
289
6.23k
    return FALSE;
290
6.23k
  }
291
292
5.48k
  if (tpktLength)
293
5.48k
    *tpktLength = len;
294
295
5.48k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
296
139
    return FALSE;
297
298
5.34k
  Stream_Read_UINT16(s, tmp); /* pduType */
299
5.34k
  *type = tmp & 0x0F;         /* type is in the 4 least significant bits */
300
301
5.34k
  size_t remLen = len - 4;
302
5.34k
  if (len > 5)
303
5.23k
  {
304
5.23k
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
305
52
      return FALSE;
306
307
5.17k
    Stream_Read_UINT16(s, *channel_id); /* pduSource */
308
5.17k
    remLen = len - 6;
309
5.17k
  }
310
111
  else
311
111
    *channel_id = 0; /* Windows XP can send such short DEACTIVATE_ALL PDUs. */
312
313
5.28k
  char buffer[128] = { 0 };
314
5.28k
  WLog_Print(rdp->log, WLOG_DEBUG, "type=%s, tpktLength=%" PRIuz ", remainingLength=%" PRIuz,
315
5.28k
             pdu_type_to_str(*type, buffer, sizeof(buffer)), len, remLen);
316
5.28k
  if (remainingLength)
317
5.28k
  {
318
5.28k
    WINPR_ASSERT(remLen <= UINT16_MAX);
319
5.28k
    *remainingLength = (UINT16)remLen;
320
5.28k
  }
321
5.28k
  return Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, remLen);
322
5.28k
}
323
324
BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
325
                                    UINT16 channel_id)
326
0
{
327
0
  WINPR_ASSERT(s);
328
0
  WINPR_ASSERT(rdp);
329
0
  if (length > UINT16_MAX)
330
0
    return FALSE;
331
332
0
  if (length < RDP_PACKET_HEADER_MAX_LENGTH)
333
0
    return FALSE;
334
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 6))
335
0
    return FALSE;
336
0
  length -= RDP_PACKET_HEADER_MAX_LENGTH;
337
  /* Share Control Header */
338
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, length));      /* totalLength */
339
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, type | 0x10)); /* pduType */
340
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, channel_id));  /* pduSource */
341
0
  return TRUE;
342
0
}
343
344
BOOL rdp_read_share_data_header(rdpRdp* rdp, wStream* s, UINT16* length, BYTE* type,
345
                                UINT32* shareId, BYTE* compressedType, UINT16* compressedLength)
346
29.2k
{
347
29.2k
  WINPR_ASSERT(s);
348
29.2k
  WINPR_ASSERT(rdp);
349
350
29.2k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
351
15.7k
    return FALSE;
352
353
  /* Share Data Header */
354
13.5k
  Stream_Read_UINT32(s, *shareId);          /* shareId (4 bytes) */
355
13.5k
  Stream_Seek_UINT8(s);                     /* pad1 (1 byte) */
356
13.5k
  Stream_Seek_UINT8(s);                     /* streamId (1 byte) */
357
13.5k
  Stream_Read_UINT16(s, *length);           /* uncompressedLength (2 bytes) */
358
13.5k
  Stream_Read_UINT8(s, *type);              /* pduType2, Data PDU Type (1 byte) */
359
13.5k
  Stream_Read_UINT8(s, *compressedType);    /* compressedType (1 byte) */
360
13.5k
  Stream_Read_UINT16(s, *compressedLength); /* compressedLength (2 bytes) */
361
13.5k
  return TRUE;
362
29.2k
}
363
364
BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type, UINT32 share_id)
365
0
{
366
0
  const size_t headerLen = RDP_PACKET_HEADER_MAX_LENGTH + RDP_SHARE_CONTROL_HEADER_LENGTH +
367
0
                           RDP_SHARE_DATA_HEADER_LENGTH;
368
369
0
  WINPR_ASSERT(s);
370
0
  WINPR_ASSERT(rdp);
371
0
  if (length > UINT16_MAX)
372
0
    return FALSE;
373
374
0
  if (length < headerLen)
375
0
    return FALSE;
376
0
  length -= headerLen;
377
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 12))
378
0
    return FALSE;
379
380
  /* Share Data Header */
381
0
  Stream_Write_UINT32(s, share_id);  /* shareId (4 bytes) */
382
0
  Stream_Write_UINT8(s, 0);          /* pad1 (1 byte) */
383
0
  Stream_Write_UINT8(s, STREAM_LOW); /* streamId (1 byte) */
384
0
  Stream_Write_UINT16(
385
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, length)); /* uncompressedLength (2 bytes) */
386
0
  Stream_Write_UINT8(s, type);       /* pduType2, Data PDU Type (1 byte) */
387
0
  Stream_Write_UINT8(s, 0);          /* compressedType (1 byte) */
388
0
  Stream_Write_UINT16(s, 0);         /* compressedLength (2 bytes) */
389
0
  return TRUE;
390
0
}
391
392
static BOOL rdp_security_stream_init(rdpRdp* rdp, wStream* s, BOOL sec_header, UINT16* sec_flags)
393
3.01k
{
394
3.01k
  WINPR_ASSERT(rdp);
395
3.01k
  WINPR_ASSERT(s);
396
3.01k
  WINPR_ASSERT(sec_flags);
397
398
3.01k
  if (rdp->do_crypt)
399
0
  {
400
0
    if (!Stream_SafeSeek(s, 12))
401
0
      return FALSE;
402
403
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
404
0
    {
405
0
      if (!Stream_SafeSeek(s, 4))
406
0
        return FALSE;
407
0
    }
408
409
0
    *sec_flags |= SEC_ENCRYPT;
410
411
0
    if (rdp->do_secure_checksum)
412
0
      *sec_flags |= SEC_SECURE_CHECKSUM;
413
0
  }
414
3.01k
  else if (*sec_flags != 0 || sec_header)
415
3.01k
  {
416
3.01k
    if (!Stream_SafeSeek(s, 4))
417
0
      return FALSE;
418
3.01k
  }
419
420
3.01k
  return TRUE;
421
3.01k
}
422
423
wStream* rdp_send_stream_init(rdpRdp* rdp, UINT16* sec_flags)
424
0
{
425
0
  wStream* s = NULL;
426
427
0
  WINPR_ASSERT(rdp);
428
0
  WINPR_ASSERT(rdp->transport);
429
430
0
  s = transport_send_stream_init(rdp->transport, 4096);
431
432
0
  if (!s)
433
0
    return NULL;
434
435
0
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
436
0
    goto fail;
437
438
0
  if (!rdp_security_stream_init(rdp, s, FALSE, sec_flags))
439
0
    goto fail;
440
441
0
  return s;
442
0
fail:
443
0
  Stream_Release(s);
444
0
  return NULL;
445
0
}
446
447
wStream* rdp_send_stream_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
448
0
{
449
0
  wStream* s = rdp_send_stream_init(rdp, sec_flags);
450
451
0
  if (!s)
452
0
    return NULL;
453
454
0
  if (!Stream_SafeSeek(s, RDP_SHARE_CONTROL_HEADER_LENGTH))
455
0
    goto fail;
456
457
0
  return s;
458
0
fail:
459
0
  Stream_Release(s);
460
0
  return NULL;
461
0
}
462
463
wStream* rdp_data_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
464
0
{
465
0
  wStream* s = rdp_send_stream_pdu_init(rdp, sec_flags);
466
467
0
  if (!s)
468
0
    return NULL;
469
470
0
  if (!Stream_SafeSeek(s, RDP_SHARE_DATA_HEADER_LENGTH))
471
0
    goto fail;
472
473
0
  return s;
474
0
fail:
475
0
  Stream_Release(s);
476
0
  return NULL;
477
0
}
478
479
BOOL rdp_set_error_info(rdpRdp* rdp, UINT32 errorInfo)
480
1.20k
{
481
1.20k
  WINPR_ASSERT(rdp);
482
483
1.20k
  rdp->errorInfo = errorInfo;
484
485
1.20k
  if (rdp->errorInfo != ERRINFO_SUCCESS)
486
1.19k
  {
487
1.19k
    rdpContext* context = rdp->context;
488
1.19k
    WINPR_ASSERT(context);
489
490
1.19k
    rdp_print_errinfo(rdp->errorInfo);
491
492
1.19k
    if (context)
493
1.19k
    {
494
1.19k
      freerdp_set_last_error_log(context, MAKE_FREERDP_ERROR(ERRINFO, errorInfo));
495
496
1.19k
      if (context->pubSub)
497
574
      {
498
574
        ErrorInfoEventArgs e = { 0 };
499
574
        EventArgsInit(&e, "freerdp");
500
574
        e.code = rdp->errorInfo;
501
574
        PubSub_OnErrorInfo(context->pubSub, context, &e);
502
574
      }
503
1.19k
    }
504
0
    else
505
0
      WLog_Print(rdp->log, WLOG_ERROR, "missing context=%p", context);
506
1.19k
  }
507
6
  else
508
6
  {
509
6
    freerdp_set_last_error_log(rdp->context, FREERDP_ERROR_SUCCESS);
510
6
  }
511
512
1.20k
  return TRUE;
513
1.20k
}
514
515
wStream* rdp_message_channel_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
516
3.01k
{
517
3.01k
  wStream* s = NULL;
518
519
3.01k
  WINPR_ASSERT(rdp);
520
521
3.01k
  s = transport_send_stream_init(rdp->transport, 4096);
522
523
3.01k
  if (!s)
524
0
    return NULL;
525
526
3.01k
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
527
0
    goto fail;
528
529
3.01k
  if (!rdp_security_stream_init(rdp, s, TRUE, sec_flags))
530
0
    goto fail;
531
532
3.01k
  return s;
533
0
fail:
534
0
  Stream_Release(s);
535
0
  return NULL;
536
3.01k
}
537
538
/**
539
 * Read an RDP packet header.
540
 * @param rdp rdp module
541
 * @param s stream
542
 * @param length RDP packet length
543
 * @param channelId channel id
544
 *
545
 * @return \b TRUE for success, \b FALSE otherwise
546
 */
547
548
BOOL rdp_read_header(rdpRdp* rdp, wStream* s, UINT16* length, UINT16* channelId)
549
55.6k
{
550
55.6k
  BYTE li = 0;
551
55.6k
  BYTE code = 0;
552
55.6k
  BYTE choice = 0;
553
55.6k
  UINT16 initiator = 0;
554
555
55.6k
  WINPR_ASSERT(rdp);
556
55.6k
  WINPR_ASSERT(rdp->settings);
557
55.6k
  WINPR_ASSERT(s);
558
55.6k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataRequest
559
55.6k
                                                    : DomainMCSPDU_SendDataIndication;
560
561
55.6k
  *channelId = 0; /* Initialize in case of early abort */
562
55.6k
  if (!tpkt_read_header(s, length))
563
24.9k
    return FALSE;
564
565
30.6k
  if (!tpdu_read_header(s, &code, &li, *length))
566
29.1k
    return FALSE;
567
568
1.48k
  if (code != X224_TPDU_DATA)
569
275
  {
570
275
    if (code == X224_TPDU_DISCONNECT_REQUEST)
571
158
    {
572
158
      WLog_Print(rdp->log, WLOG_WARN, "Received X224_TPDU_DISCONNECT_REQUEST, terminating");
573
158
      utils_abort_connect(rdp);
574
158
      return TRUE;
575
158
    }
576
577
117
    WLog_Print(rdp->log, WLOG_WARN,
578
117
               "Unexpected X224 TPDU type %s [%08" PRIx32 "] instead of %s",
579
117
               tpdu_type_to_string(code), code, tpdu_type_to_string(X224_TPDU_DATA));
580
117
    return FALSE;
581
275
  }
582
583
1.20k
  if (!per_read_choice(s, &choice))
584
4
    return FALSE;
585
586
1.20k
  const DomainMCSPDU domainMCSPDU = (DomainMCSPDU)(choice >> 2);
587
588
1.20k
  if (domainMCSPDU != MCSPDU)
589
1.08k
  {
590
1.08k
    if (domainMCSPDU != DomainMCSPDU_DisconnectProviderUltimatum)
591
50
    {
592
50
      WLog_Print(rdp->log, WLOG_WARN, "Received %s instead of %s",
593
50
                 mcs_domain_pdu_string(domainMCSPDU), mcs_domain_pdu_string(MCSPDU));
594
50
      return FALSE;
595
50
    }
596
1.08k
  }
597
598
1.15k
  MCSPDU = domainMCSPDU;
599
600
1.15k
  if (*length < 8U)
601
6
  {
602
6
    WLog_Print(rdp->log, WLOG_WARN, "TPDU invalid length, got %" PRIu16 ", expected at least 8",
603
6
               *length);
604
6
    return FALSE;
605
6
  }
606
607
1.14k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length - 8))
608
0
    return FALSE;
609
610
1.14k
  if (MCSPDU == DomainMCSPDU_DisconnectProviderUltimatum)
611
1.03k
  {
612
1.03k
    int reason = 0;
613
1.03k
    TerminateEventArgs e = { 0 };
614
615
1.03k
    if (!mcs_recv_disconnect_provider_ultimatum(rdp->mcs, s, &reason))
616
2
      return FALSE;
617
618
1.03k
    rdpContext* context = rdp->context;
619
1.03k
    WINPR_ASSERT(context);
620
1.03k
    context->disconnectUltimatum = reason;
621
622
1.03k
    if (rdp->errorInfo == ERRINFO_SUCCESS)
623
983
    {
624
      /**
625
       * Some servers like Windows Server 2008 R2 do not send the error info pdu
626
       * when the user logs off like they should. Map DisconnectProviderUltimatum
627
       * to a ERRINFO_LOGOFF_BY_USER when the errinfo code is ERRINFO_SUCCESS.
628
       */
629
983
      UINT32 errorInfo = ERRINFO_RPC_INITIATED_DISCONNECT;
630
983
      if (reason == Disconnect_Ultimatum_provider_initiated)
631
22
        errorInfo = ERRINFO_RPC_INITIATED_DISCONNECT;
632
961
      else if (reason == Disconnect_Ultimatum_user_requested)
633
36
        errorInfo = ERRINFO_LOGOFF_BY_USER;
634
635
983
      rdp_set_error_info(rdp, errorInfo);
636
983
    }
637
638
1.03k
    WLog_Print(rdp->log, WLOG_DEBUG, "DisconnectProviderUltimatum: reason: %d", reason);
639
1.03k
    utils_abort_connect(rdp);
640
1.03k
    EventArgsInit(&e, "freerdp");
641
1.03k
    e.code = 0;
642
1.03k
    PubSub_OnTerminate(rdp->pubSub, context, &e);
643
1.03k
    return TRUE;
644
1.03k
  }
645
646
111
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 5))
647
5
    return FALSE;
648
649
106
  if (!per_read_integer16(s, &initiator, MCS_BASE_CHANNEL_ID)) /* initiator (UserId) */
650
31
    return FALSE;
651
652
75
  if (!per_read_integer16(s, channelId, 0)) /* channelId */
653
0
    return FALSE;
654
655
75
  const uint8_t dataPriority = Stream_Get_UINT8(s); /* dataPriority + Segmentation (0x70) */
656
75
  WLog_Print(rdp->log, WLOG_TRACE, "dataPriority=%" PRIu8, dataPriority);
657
658
75
  if (!per_read_length(s, length)) /* userData (OCTET_STRING) */
659
7
    return FALSE;
660
661
68
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length))
662
23
    return FALSE;
663
664
45
  return TRUE;
665
68
}
666
667
/**
668
 * Write an RDP packet header.
669
 * @param rdp rdp module
670
 * @param s stream
671
 * @param length RDP packet length
672
 * @param channelId channel id
673
 *
674
 * @return \b TRUE for success, \b FALSE otherwise
675
 */
676
677
BOOL rdp_write_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 channelId, UINT16 sec_flags)
678
3.01k
{
679
3.01k
  WINPR_ASSERT(rdp);
680
3.01k
  WINPR_ASSERT(rdp->settings);
681
3.01k
  WINPR_ASSERT(s);
682
3.01k
  WINPR_ASSERT(length >= RDP_PACKET_HEADER_MAX_LENGTH);
683
3.01k
  if (length > UINT16_MAX)
684
0
    return FALSE;
685
686
3.01k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataIndication
687
3.01k
                                                    : DomainMCSPDU_SendDataRequest;
688
689
3.01k
  if ((sec_flags & SEC_ENCRYPT) && (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS))
690
0
  {
691
0
    const UINT16 body_length = (UINT16)length - RDP_PACKET_HEADER_MAX_LENGTH;
692
0
    const UINT16 pad = 8 - (body_length % 8);
693
694
0
    if (pad != 8)
695
0
      length += pad;
696
0
  }
697
698
3.01k
  if (!mcs_write_domain_mcspdu_header(s, MCSPDU, (UINT16)length, 0))
699
0
    return FALSE;
700
3.01k
  if (!per_write_integer16(s, rdp->mcs->userId, MCS_BASE_CHANNEL_ID)) /* initiator */
701
3.01k
    return FALSE;
702
0
  if (!per_write_integer16(s, channelId, 0)) /* channelId */
703
0
    return FALSE;
704
0
  if (!Stream_EnsureRemainingCapacity(s, 3))
705
0
    return FALSE;
706
0
  Stream_Write_UINT8(s, 0x70); /* dataPriority + segmentation */
707
  /*
708
   * We always encode length in two bytes, even though we could use
709
   * only one byte if length <= 0x7F. It is just easier that way,
710
   * because we can leave room for fixed-length header, store all
711
   * the data first and then store the header.
712
   */
713
0
  length = (length - RDP_PACKET_HEADER_MAX_LENGTH) | 0x8000;
714
0
  Stream_Write_UINT16_BE(
715
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, length)); /* userData (OCTET_STRING) */
716
0
  return TRUE;
717
0
}
718
719
static BOOL rdp_security_stream_out(rdpRdp* rdp, wStream* s, size_t length, UINT16 sec_flags,
720
                                    UINT32* pad)
721
0
{
722
0
  BOOL status = 0;
723
0
  WINPR_ASSERT(rdp);
724
0
  if (length > UINT16_MAX)
725
0
    return FALSE;
726
727
0
  *pad = 0;
728
729
0
  if (sec_flags != 0)
730
0
  {
731
0
    WINPR_ASSERT(sec_flags <= UINT16_MAX);
732
0
    if (!rdp_write_security_header(rdp, s, sec_flags))
733
0
      return FALSE;
734
735
0
    if (sec_flags & SEC_ENCRYPT)
736
0
    {
737
0
      if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
738
0
      {
739
0
        BYTE* data = Stream_PointerAs(s, BYTE) + 12;
740
0
        const size_t size = WINPR_ASSERTING_INT_CAST(size_t, (data - Stream_Buffer(s)));
741
0
        if (size > length)
742
0
          return FALSE;
743
744
0
        length -= size;
745
746
0
        Stream_Write_UINT16(s, 0x10); /* length */
747
0
        Stream_Write_UINT8(s, 0x1);   /* TSFIPS_VERSION 1*/
748
        /* handle padding */
749
0
        *pad = 8 - (length % 8);
750
751
0
        if (*pad == 8)
752
0
          *pad = 0;
753
754
0
        if (*pad)
755
0
          memset(data + length, 0, *pad);
756
757
0
        Stream_Write_UINT8(s, WINPR_ASSERTING_INT_CAST(uint8_t, *pad));
758
759
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
760
0
          return FALSE;
761
0
        if (!security_hmac_signature(data, length, Stream_Pointer(s), 8, rdp))
762
0
          return FALSE;
763
764
0
        Stream_Seek(s, 8);
765
0
        if (!security_fips_encrypt(data, length + *pad, rdp))
766
0
          return FALSE;
767
0
      }
768
0
      else
769
0
      {
770
0
        const BYTE* data = Stream_PointerAs(s, const BYTE) + 8;
771
0
        const size_t diff = Stream_GetPosition(s) + 8ULL;
772
0
        if (diff > length)
773
0
          return FALSE;
774
0
        length -= diff;
775
776
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
777
0
          return FALSE;
778
0
        if (sec_flags & SEC_SECURE_CHECKSUM)
779
0
          status = security_salted_mac_signature(rdp, data, (UINT32)length, TRUE,
780
0
                                                 Stream_Pointer(s), 8);
781
0
        else
782
0
          status = security_mac_signature(rdp, data, (UINT32)length,
783
0
                                          Stream_PointerAs(s, BYTE), 8);
784
785
0
        if (!status)
786
0
          return FALSE;
787
788
0
        Stream_Seek(s, 8);
789
790
0
        if (!security_encrypt(Stream_Pointer(s), length, rdp))
791
0
          return FALSE;
792
0
      }
793
0
    }
794
0
  }
795
796
0
  return TRUE;
797
0
}
798
799
static UINT32 rdp_get_sec_bytes(rdpRdp* rdp, UINT16 sec_flags)
800
0
{
801
0
  UINT32 sec_bytes = 0;
802
803
0
  if (sec_flags & SEC_ENCRYPT)
804
0
  {
805
0
    sec_bytes = 12;
806
807
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
808
0
      sec_bytes += 4;
809
0
  }
810
0
  else if (sec_flags != 0)
811
0
  {
812
0
    sec_bytes = 4;
813
0
  }
814
0
  else
815
0
  {
816
0
    sec_bytes = 0;
817
0
  }
818
819
0
  return sec_bytes;
820
0
}
821
822
/**
823
 * Send an RDP packet.
824
 * @param rdp RDP module
825
 * @param s stream
826
 * @param channel_id channel id
827
 */
828
829
BOOL rdp_send(rdpRdp* rdp, wStream* s, UINT16 channel_id, UINT16 sec_flags)
830
0
{
831
0
  BOOL rc = FALSE;
832
0
  UINT32 pad = 0;
833
0
  BOOL should_unlock = FALSE;
834
835
0
  if (!s)
836
0
    return FALSE;
837
838
0
  if (!rdp)
839
0
    goto fail;
840
841
0
  if (sec_flags & SEC_ENCRYPT)
842
0
  {
843
0
    if (!security_lock(rdp))
844
0
      goto fail;
845
0
    should_unlock = TRUE;
846
0
  }
847
848
0
  size_t length = Stream_GetPosition(s);
849
0
  Stream_SetPosition(s, 0);
850
0
  if (!rdp_write_header(rdp, s, length, channel_id, sec_flags))
851
0
    goto fail;
852
853
0
  if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
854
0
    goto fail;
855
856
0
  length += pad;
857
0
  Stream_SetPosition(s, length);
858
0
  Stream_SealLength(s);
859
860
0
  if (transport_write(rdp->transport, s) < 0)
861
0
    goto fail;
862
863
0
  rc = TRUE;
864
0
fail:
865
0
  if (should_unlock && !security_unlock(rdp))
866
0
    rc = FALSE;
867
0
  Stream_Release(s);
868
0
  return rc;
869
0
}
870
871
BOOL rdp_send_pdu(rdpRdp* rdp, wStream* s, UINT16 type, UINT16 channel_id, UINT16 sec_flags)
872
0
{
873
0
  BOOL rc = FALSE;
874
0
  UINT32 sec_bytes = 0;
875
0
  size_t sec_hold = 0;
876
0
  UINT32 pad = 0;
877
0
  BOOL should_unlock = FALSE;
878
879
0
  if (!s)
880
0
    return FALSE;
881
882
0
  if (!rdp)
883
0
    goto fail;
884
885
0
  if (sec_flags & SEC_ENCRYPT)
886
0
  {
887
0
    if (!security_lock(rdp))
888
0
      goto fail;
889
0
    should_unlock = TRUE;
890
0
  }
891
892
0
  size_t length = Stream_GetPosition(s);
893
0
  Stream_SetPosition(s, 0);
894
0
  if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID, sec_flags))
895
0
    goto fail;
896
0
  sec_bytes = rdp_get_sec_bytes(rdp, sec_flags);
897
0
  sec_hold = Stream_GetPosition(s);
898
0
  Stream_Seek(s, sec_bytes);
899
0
  if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, type, channel_id))
900
0
    goto fail;
901
0
  Stream_SetPosition(s, sec_hold);
902
903
0
  if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
904
0
    goto fail;
905
906
0
  length += pad;
907
0
  Stream_SetPosition(s, length);
908
0
  Stream_SealLength(s);
909
910
0
  if (transport_write(rdp->transport, s) < 0)
911
0
    goto fail;
912
913
0
  rc = TRUE;
914
0
fail:
915
0
  if (should_unlock && !security_unlock(rdp))
916
0
    rc = FALSE;
917
0
  return rc;
918
0
}
919
920
BOOL rdp_send_data_pdu(rdpRdp* rdp, wStream* s, BYTE type, UINT16 channel_id, UINT16 sec_flags)
921
0
{
922
0
  BOOL rc = FALSE;
923
0
  UINT32 sec_bytes = 0;
924
0
  size_t sec_hold = 0;
925
0
  UINT32 pad = 0;
926
0
  BOOL should_unlock = FALSE;
927
928
0
  if (!s)
929
0
    return FALSE;
930
931
0
  if (!rdp)
932
0
    goto fail;
933
934
0
  if (sec_flags & SEC_ENCRYPT)
935
0
  {
936
0
    if (!security_lock(rdp))
937
0
      goto fail;
938
0
    should_unlock = TRUE;
939
0
  }
940
941
0
  size_t length = Stream_GetPosition(s);
942
0
  Stream_SetPosition(s, 0);
943
0
  if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID, sec_flags))
944
0
    goto fail;
945
0
  sec_bytes = rdp_get_sec_bytes(rdp, sec_flags);
946
0
  sec_hold = Stream_GetPosition(s);
947
0
  Stream_Seek(s, sec_bytes);
948
0
  if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, PDU_TYPE_DATA, channel_id))
949
0
    goto fail;
950
0
  if (!rdp_write_share_data_header(rdp, s, length - sec_bytes, type, rdp->settings->ShareId))
951
0
    goto fail;
952
0
  Stream_SetPosition(s, sec_hold);
953
954
0
  if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
955
0
    goto fail;
956
957
0
  length += pad;
958
0
  Stream_SetPosition(s, length);
959
0
  Stream_SealLength(s);
960
0
  WLog_Print(rdp->log, WLOG_DEBUG,
961
0
             "sending data (type=0x%x size=%" PRIuz " channelId=%" PRIu16 ")", type,
962
0
             Stream_Length(s), channel_id);
963
964
0
  rdp->outPackets++;
965
0
  if (transport_write(rdp->transport, s) < 0)
966
0
    goto fail;
967
968
0
  rc = TRUE;
969
0
fail:
970
0
  if (should_unlock && !security_unlock(rdp))
971
0
    rc = FALSE;
972
0
  Stream_Release(s);
973
0
  return rc;
974
0
}
975
976
BOOL rdp_send_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 sec_flags)
977
3.01k
{
978
3.01k
  BOOL rc = FALSE;
979
3.01k
  UINT32 pad = 0;
980
3.01k
  BOOL should_unlock = FALSE;
981
982
3.01k
  WINPR_ASSERT(rdp);
983
3.01k
  WINPR_ASSERT(s);
984
985
3.01k
  if (sec_flags & SEC_ENCRYPT)
986
0
  {
987
0
    if (!security_lock(rdp))
988
0
      goto fail;
989
0
    should_unlock = TRUE;
990
0
  }
991
992
3.01k
  size_t length = Stream_GetPosition(s);
993
3.01k
  Stream_SetPosition(s, 0);
994
3.01k
  if (!rdp_write_header(rdp, s, length, rdp->mcs->messageChannelId, sec_flags))
995
3.01k
    goto fail;
996
997
0
  if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
998
0
    goto fail;
999
1000
0
  length += pad;
1001
0
  Stream_SetPosition(s, length);
1002
0
  Stream_SealLength(s);
1003
1004
0
  if (transport_write(rdp->transport, s) < 0)
1005
0
    goto fail;
1006
1007
0
  rc = TRUE;
1008
3.01k
fail:
1009
3.01k
  if (should_unlock && !security_unlock(rdp))
1010
0
    rc = FALSE;
1011
3.01k
  Stream_Release(s);
1012
3.01k
  return rc;
1013
0
}
1014
1015
static BOOL rdp_recv_server_shutdown_denied_pdu(WINPR_ATTR_UNUSED rdpRdp* rdp,
1016
                                                WINPR_ATTR_UNUSED wStream* s)
1017
4
{
1018
4
  return TRUE;
1019
4
}
1020
1021
static BOOL rdp_recv_server_set_keyboard_indicators_pdu(rdpRdp* rdp, wStream* s)
1022
103
{
1023
103
  WINPR_ASSERT(rdp);
1024
103
  WINPR_ASSERT(s);
1025
1026
103
  rdpContext* context = rdp->context;
1027
103
  WINPR_ASSERT(context);
1028
103
  WINPR_ASSERT(context->update);
1029
1030
103
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1031
1
    return FALSE;
1032
1033
102
  const uint16_t unitId = Stream_Get_UINT16(s); /* unitId (2 bytes) */
1034
102
  if (unitId != 0)
1035
96
  {
1036
96
    WLog_Print(rdp->log, WLOG_WARN,
1037
96
               "[MS-RDPBCGR] 2.2.8.2.1.1 Set Keyboard Indicators PDU Data "
1038
96
               "(TS_SET_KEYBOARD_INDICATORS_PDU)::unitId should be 0, is %" PRIu8,
1039
96
               unitId);
1040
96
  }
1041
102
  const UINT16 ledFlags = Stream_Get_UINT16(s); /* ledFlags (2 bytes) */
1042
102
  return IFCALLRESULT(TRUE, context->update->SetKeyboardIndicators, context, ledFlags);
1043
103
}
1044
1045
static BOOL rdp_recv_server_set_keyboard_ime_status_pdu(rdpRdp* rdp, wStream* s)
1046
26
{
1047
26
  if (!rdp || !rdp->input)
1048
0
    return FALSE;
1049
1050
26
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 10))
1051
1
    return FALSE;
1052
1053
25
  const uint16_t unitId = Stream_Get_UINT16(s); /* unitId (2 bytes) */
1054
25
  if (unitId != 0)
1055
22
  {
1056
22
    WLog_Print(rdp->log, WLOG_WARN,
1057
22
               "[MS-RDPBCGR] 2.2.8.2.2.1 Set Keyboard IME Status PDU Data "
1058
22
               "(TS_SET_KEYBOARD_IME_STATUS_PDU)::unitId should be 0, is %" PRIu8,
1059
22
               unitId);
1060
22
  }
1061
25
  const uint32_t imeState = Stream_Get_UINT32(s);    /* imeState (4 bytes) */
1062
25
  const uint32_t imeConvMode = Stream_Get_UINT32(s); /* imeConvMode (4 bytes) */
1063
25
  return IFCALLRESULT(TRUE, rdp->update->SetKeyboardImeStatus, rdp->context, unitId, imeState,
1064
26
                      imeConvMode);
1065
26
}
1066
1067
static BOOL rdp_recv_set_error_info_data_pdu(rdpRdp* rdp, wStream* s)
1068
218
{
1069
218
  UINT32 errorInfo = 0;
1070
1071
218
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1072
1
    return FALSE;
1073
1074
217
  Stream_Read_UINT32(s, errorInfo); /* errorInfo (4 bytes) */
1075
217
  return rdp_set_error_info(rdp, errorInfo);
1076
218
}
1077
1078
static BOOL rdp_recv_server_auto_reconnect_status_pdu(rdpRdp* rdp, wStream* s)
1079
20
{
1080
20
  UINT32 arcStatus = 0;
1081
1082
20
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1083
1
    return FALSE;
1084
1085
19
  Stream_Read_UINT32(s, arcStatus); /* arcStatus (4 bytes) */
1086
19
  WLog_Print(rdp->log, WLOG_WARN, "AutoReconnectStatus: 0x%08" PRIX32 "", arcStatus);
1087
19
  return TRUE;
1088
20
}
1089
1090
static BOOL rdp_recv_server_status_info_pdu(rdpRdp* rdp, wStream* s)
1091
11
{
1092
11
  UINT32 statusCode = 0;
1093
1094
11
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1095
1
    return FALSE;
1096
1097
10
  Stream_Read_UINT32(s, statusCode); /* statusCode (4 bytes) */
1098
1099
10
  if (rdp->update->ServerStatusInfo)
1100
0
    return rdp->update->ServerStatusInfo(rdp->context, statusCode);
1101
1102
10
  return TRUE;
1103
10
}
1104
1105
static BOOL rdp_recv_monitor_layout_pdu(rdpRdp* rdp, wStream* s)
1106
90
{
1107
90
  UINT32 monitorCount = 0;
1108
90
  MONITOR_DEF* monitorDefArray = NULL;
1109
90
  BOOL ret = TRUE;
1110
1111
90
  WINPR_ASSERT(rdp);
1112
90
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1113
1
    return FALSE;
1114
1115
89
  Stream_Read_UINT32(s, monitorCount); /* monitorCount (4 bytes) */
1116
1117
89
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(rdp->log, s, monitorCount, 20ull))
1118
17
    return FALSE;
1119
1120
72
  monitorDefArray = (MONITOR_DEF*)calloc(monitorCount, sizeof(MONITOR_DEF));
1121
1122
72
  if (!monitorDefArray)
1123
0
    return FALSE;
1124
1125
27.2k
  for (UINT32 index = 0; index < monitorCount; index++)
1126
27.1k
  {
1127
27.1k
    MONITOR_DEF* monitor = &monitorDefArray[index];
1128
27.1k
    Stream_Read_INT32(s, monitor->left);   /* left (4 bytes) */
1129
27.1k
    Stream_Read_INT32(s, monitor->top);    /* top (4 bytes) */
1130
27.1k
    Stream_Read_INT32(s, monitor->right);  /* right (4 bytes) */
1131
27.1k
    Stream_Read_INT32(s, monitor->bottom); /* bottom (4 bytes) */
1132
27.1k
    Stream_Read_UINT32(s, monitor->flags); /* flags (4 bytes) */
1133
27.1k
  }
1134
1135
72
  IFCALLRET(rdp->update->RemoteMonitors, ret, rdp->context, monitorCount, monitorDefArray);
1136
72
  free(monitorDefArray);
1137
72
  if (!ret)
1138
0
    return FALSE;
1139
72
  return rdp_set_monitor_layout_pdu_state(rdp, TRUE);
1140
72
}
1141
1142
state_run_t rdp_recv_data_pdu(rdpRdp* rdp, wStream* s)
1143
10.7k
{
1144
10.7k
  BYTE type = 0;
1145
10.7k
  wStream* cs = NULL;
1146
10.7k
  UINT16 length = 0;
1147
10.7k
  UINT32 shareId = 0;
1148
10.7k
  BYTE compressedType = 0;
1149
10.7k
  UINT16 compressedLength = 0;
1150
1151
10.7k
  WINPR_ASSERT(rdp);
1152
10.7k
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &shareId, &compressedType,
1153
10.7k
                                  &compressedLength))
1154
8.40k
  {
1155
8.40k
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_read_share_data_header() failed");
1156
8.40k
    return STATE_RUN_FAILED;
1157
8.40k
  }
1158
1159
2.33k
  cs = s;
1160
1161
2.33k
  if (compressedType & PACKET_COMPRESSED)
1162
300
  {
1163
300
    if (compressedLength < 18)
1164
16
    {
1165
16
      WLog_Print(rdp->log, WLOG_ERROR,
1166
16
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1167
16
                 compressedLength);
1168
16
      return STATE_RUN_FAILED;
1169
16
    }
1170
1171
284
    UINT32 DstSize = 0;
1172
284
    const BYTE* pDstData = NULL;
1173
284
    UINT16 SrcSize = compressedLength - 18;
1174
1175
284
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, SrcSize))
1176
109
    {
1177
109
      WLog_Print(rdp->log, WLOG_ERROR,
1178
109
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1179
109
                 compressedLength);
1180
109
      return STATE_RUN_FAILED;
1181
109
    }
1182
1183
175
    if (bulk_decompress(rdp->bulk, Stream_ConstPointer(s), SrcSize, &pDstData, &DstSize,
1184
175
                        compressedType))
1185
175
    {
1186
175
      cs = transport_take_from_pool(rdp->transport, DstSize);
1187
175
      if (!cs)
1188
175
      {
1189
175
        WLog_Print(rdp->log, WLOG_ERROR, "Couldn't take stream from pool");
1190
175
        return STATE_RUN_FAILED;
1191
175
      }
1192
1193
0
      Stream_SetPosition(cs, 0);
1194
0
      Stream_Write(cs, pDstData, DstSize);
1195
0
      Stream_SealLength(cs);
1196
0
      Stream_SetPosition(cs, 0);
1197
0
    }
1198
0
    else
1199
0
    {
1200
0
      WLog_Print(rdp->log, WLOG_ERROR, "bulk_decompress() failed");
1201
0
      return STATE_RUN_FAILED;
1202
0
    }
1203
1204
0
    Stream_Seek(s, SrcSize);
1205
0
  }
1206
1207
2.03k
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1208
2.03k
             data_pdu_type_to_string(type), type, length);
1209
1210
2.03k
  switch (type)
1211
2.03k
  {
1212
631
    case DATA_PDU_TYPE_UPDATE:
1213
631
      if (!update_recv(rdp->update, cs))
1214
618
      {
1215
618
        WLog_Print(rdp->log, WLOG_ERROR, "DATA_PDU_TYPE_UPDATE - update_recv() failed");
1216
618
        goto out_fail;
1217
618
      }
1218
1219
13
      break;
1220
1221
32
    case DATA_PDU_TYPE_CONTROL:
1222
32
      if (!rdp_recv_server_control_pdu(rdp, cs))
1223
28
      {
1224
28
        WLog_Print(rdp->log, WLOG_ERROR,
1225
28
                   "DATA_PDU_TYPE_CONTROL - rdp_recv_server_control_pdu() failed");
1226
28
        goto out_fail;
1227
28
      }
1228
1229
4
      break;
1230
1231
19
    case DATA_PDU_TYPE_POINTER:
1232
19
      if (!update_recv_pointer(rdp->update, cs))
1233
19
      {
1234
19
        WLog_Print(rdp->log, WLOG_ERROR,
1235
19
                   "DATA_PDU_TYPE_POINTER - update_recv_pointer() failed");
1236
19
        goto out_fail;
1237
19
      }
1238
1239
0
      break;
1240
1241
18
    case DATA_PDU_TYPE_SYNCHRONIZE:
1242
18
      if (!rdp_recv_server_synchronize_pdu(rdp, cs))
1243
8
      {
1244
8
        WLog_Print(rdp->log, WLOG_ERROR,
1245
8
                   "DATA_PDU_TYPE_SYNCHRONIZE - rdp_recv_synchronize_pdu() failed");
1246
8
        goto out_fail;
1247
8
      }
1248
1249
10
      break;
1250
1251
10
    case DATA_PDU_TYPE_PLAY_SOUND:
1252
9
      if (!update_recv_play_sound(rdp->update, cs))
1253
9
      {
1254
9
        WLog_Print(rdp->log, WLOG_ERROR,
1255
9
                   "DATA_PDU_TYPE_PLAY_SOUND - update_recv_play_sound() failed");
1256
9
        goto out_fail;
1257
9
      }
1258
1259
0
      break;
1260
1261
4
    case DATA_PDU_TYPE_SHUTDOWN_DENIED:
1262
4
      if (!rdp_recv_server_shutdown_denied_pdu(rdp, cs))
1263
0
      {
1264
0
        WLog_Print(
1265
0
            rdp->log, WLOG_ERROR,
1266
0
            "DATA_PDU_TYPE_SHUTDOWN_DENIED - rdp_recv_server_shutdown_denied_pdu() failed");
1267
0
        goto out_fail;
1268
0
      }
1269
1270
4
      break;
1271
1272
303
    case DATA_PDU_TYPE_SAVE_SESSION_INFO:
1273
303
      if (!rdp_recv_save_session_info(rdp, cs))
1274
267
      {
1275
267
        WLog_Print(rdp->log, WLOG_ERROR,
1276
267
                   "DATA_PDU_TYPE_SAVE_SESSION_INFO - rdp_recv_save_session_info() failed");
1277
267
        goto out_fail;
1278
267
      }
1279
1280
36
      break;
1281
1282
36
    case DATA_PDU_TYPE_FONT_MAP:
1283
28
      if (!rdp_recv_font_map_pdu(rdp, cs))
1284
0
      {
1285
0
        WLog_Print(rdp->log, WLOG_ERROR,
1286
0
                   "DATA_PDU_TYPE_FONT_MAP - rdp_recv_font_map_pdu() failed");
1287
0
        goto out_fail;
1288
0
      }
1289
1290
28
      break;
1291
1292
103
    case DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS:
1293
103
      if (!rdp_recv_server_set_keyboard_indicators_pdu(rdp, cs))
1294
1
      {
1295
1
        WLog_Print(rdp->log, WLOG_ERROR,
1296
1
                   "DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS - "
1297
1
                   "rdp_recv_server_set_keyboard_indicators_pdu() failed");
1298
1
        goto out_fail;
1299
1
      }
1300
1301
102
      break;
1302
1303
102
    case DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS:
1304
26
      if (!rdp_recv_server_set_keyboard_ime_status_pdu(rdp, cs))
1305
1
      {
1306
1
        WLog_Print(rdp->log, WLOG_ERROR,
1307
1
                   "DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS - "
1308
1
                   "rdp_recv_server_set_keyboard_ime_status_pdu() failed");
1309
1
        goto out_fail;
1310
1
      }
1311
1312
25
      break;
1313
1314
218
    case DATA_PDU_TYPE_SET_ERROR_INFO:
1315
218
      if (!rdp_recv_set_error_info_data_pdu(rdp, cs))
1316
1
      {
1317
1
        WLog_Print(
1318
1
            rdp->log, WLOG_ERROR,
1319
1
            "DATA_PDU_TYPE_SET_ERROR_INFO - rdp_recv_set_error_info_data_pdu() failed");
1320
1
        goto out_fail;
1321
1
      }
1322
1323
217
      break;
1324
1325
217
    case DATA_PDU_TYPE_ARC_STATUS:
1326
20
      if (!rdp_recv_server_auto_reconnect_status_pdu(rdp, cs))
1327
1
      {
1328
1
        WLog_Print(rdp->log, WLOG_ERROR,
1329
1
                   "DATA_PDU_TYPE_ARC_STATUS - "
1330
1
                   "rdp_recv_server_auto_reconnect_status_pdu() failed");
1331
1
        goto out_fail;
1332
1
      }
1333
1334
19
      break;
1335
1336
19
    case DATA_PDU_TYPE_STATUS_INFO:
1337
11
      if (!rdp_recv_server_status_info_pdu(rdp, cs))
1338
1
      {
1339
1
        WLog_Print(rdp->log, WLOG_ERROR,
1340
1
                   "DATA_PDU_TYPE_STATUS_INFO - rdp_recv_server_status_info_pdu() failed");
1341
1
        goto out_fail;
1342
1
      }
1343
1344
10
      break;
1345
1346
90
    case DATA_PDU_TYPE_MONITOR_LAYOUT:
1347
90
      if (!rdp_recv_monitor_layout_pdu(rdp, cs))
1348
22
      {
1349
22
        WLog_Print(rdp->log, WLOG_ERROR,
1350
22
                   "DATA_PDU_TYPE_MONITOR_LAYOUT - rdp_recv_monitor_layout_pdu() failed");
1351
22
        goto out_fail;
1352
22
      }
1353
1354
68
      break;
1355
1356
523
    default:
1357
523
      WLog_Print(rdp->log, WLOG_WARN,
1358
523
                 "[UNHANDLED] %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1359
523
                 data_pdu_type_to_string(type), type, length);
1360
523
      break;
1361
2.03k
  }
1362
1363
1.05k
  if (cs != s)
1364
0
    Stream_Release(cs);
1365
1366
1.05k
  return STATE_RUN_SUCCESS;
1367
976
out_fail:
1368
1369
976
  if (cs != s)
1370
0
    Stream_Release(cs);
1371
1372
976
  return STATE_RUN_FAILED;
1373
2.03k
}
1374
1375
state_run_t rdp_recv_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 securityFlags)
1376
18.5k
{
1377
18.5k
  WINPR_ASSERT(rdp);
1378
18.5k
  WINPR_ASSERT(s);
1379
1380
18.5k
  if (securityFlags & SEC_AUTODETECT_REQ)
1381
0
  {
1382
    /* Server Auto-Detect Request PDU */
1383
0
    return autodetect_recv_request_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1384
0
  }
1385
1386
18.5k
  if (securityFlags & SEC_AUTODETECT_RSP)
1387
0
  {
1388
    /* Client Auto-Detect Response PDU */
1389
0
    return autodetect_recv_response_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1390
0
  }
1391
1392
18.5k
  if (securityFlags & SEC_HEARTBEAT)
1393
0
  {
1394
    /* Heartbeat PDU */
1395
0
    return rdp_recv_heartbeat_packet(rdp, s);
1396
0
  }
1397
1398
18.5k
  if (securityFlags & SEC_TRANSPORT_REQ)
1399
0
  {
1400
0
    return multitransport_recv_request(rdp->multitransport, s);
1401
0
  }
1402
1403
18.5k
  if (securityFlags & SEC_TRANSPORT_RSP)
1404
0
  {
1405
0
    return multitransport_recv_response(rdp->multitransport, s);
1406
0
  }
1407
1408
18.5k
  if (securityFlags & SEC_LICENSE_PKT)
1409
0
  {
1410
0
    return license_recv(rdp->license, s);
1411
0
  }
1412
1413
18.5k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
1414
0
  {
1415
0
    return license_recv(rdp->license, s);
1416
0
  }
1417
1418
18.5k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
1419
0
  {
1420
0
    return license_recv(rdp->license, s);
1421
0
  }
1422
1423
18.5k
  return STATE_RUN_SUCCESS;
1424
18.5k
}
1425
1426
state_run_t rdp_recv_out_of_sequence_pdu(rdpRdp* rdp, wStream* s, UINT16 pduType, UINT16 length)
1427
9.57k
{
1428
9.57k
  state_run_t rc = STATE_RUN_FAILED;
1429
9.57k
  WINPR_ASSERT(rdp);
1430
1431
9.57k
  switch (pduType)
1432
9.57k
  {
1433
1.16k
    case PDU_TYPE_DATA:
1434
1.16k
      rc = rdp_recv_data_pdu(rdp, s);
1435
1.16k
      break;
1436
136
    case PDU_TYPE_SERVER_REDIRECTION:
1437
136
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1438
136
      break;
1439
1
    case PDU_TYPE_FLOW_RESPONSE:
1440
2
    case PDU_TYPE_FLOW_STOP:
1441
3
    case PDU_TYPE_FLOW_TEST:
1442
3
      rc = STATE_RUN_SUCCESS;
1443
3
      break;
1444
8.27k
    default:
1445
8.27k
    {
1446
8.27k
      char buffer1[256] = { 0 };
1447
8.27k
      char buffer2[256] = { 0 };
1448
1449
8.27k
      WLog_Print(rdp->log, WLOG_ERROR, "expected %s, got %s",
1450
8.27k
                 pdu_type_to_str(PDU_TYPE_DEMAND_ACTIVE, buffer1, sizeof(buffer1)),
1451
8.27k
                 pdu_type_to_str(pduType, buffer2, sizeof(buffer2)));
1452
8.27k
      rc = STATE_RUN_FAILED;
1453
8.27k
    }
1454
8.27k
    break;
1455
9.57k
  }
1456
1457
9.57k
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
1458
5.82k
    return STATE_RUN_FAILED;
1459
3.75k
  return rc;
1460
9.57k
}
1461
1462
BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id)
1463
150
{
1464
  /*
1465
   * Read flow control PDU - documented in FlowPDU section in T.128
1466
   * http://www.itu.int/rec/T-REC-T.128-199802-S/en
1467
   * The specification for the PDU has pad8bits listed BEFORE pduTypeFlow.
1468
   * However, so far pad8bits has always been observed to arrive AFTER pduTypeFlow.
1469
   * Switched the order of these two fields to match this observation.
1470
   */
1471
150
  UINT8 pduType = 0;
1472
1473
150
  WINPR_ASSERT(rdp);
1474
150
  WINPR_ASSERT(s);
1475
150
  WINPR_ASSERT(type);
1476
150
  WINPR_ASSERT(channel_id);
1477
1478
150
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 6))
1479
12
    return FALSE;
1480
138
  Stream_Read_UINT8(s, pduType); /* pduTypeFlow */
1481
138
  *type = pduType;
1482
138
  Stream_Seek_UINT8(s);               /* pad8bits */
1483
138
  Stream_Seek_UINT8(s);               /* flowIdentifier */
1484
138
  Stream_Seek_UINT8(s);               /* flowNumber */
1485
138
  Stream_Read_UINT16(s, *channel_id); /* pduSource */
1486
138
  return TRUE;
1487
150
}
1488
1489
/**
1490
 * Decrypt an RDP packet.
1491
 *
1492
 * @param rdp RDP module
1493
 * @param s stream
1494
 * @param pLength A pointer to the result variable, must not be NULL
1495
 * @param securityFlags the security flags to apply
1496
 *
1497
 * @return \b TRUE for success, \b FALSE otherwise
1498
 */
1499
1500
BOOL rdp_decrypt(rdpRdp* rdp, wStream* s, UINT16* pLength, UINT16 securityFlags)
1501
2.33k
{
1502
2.33k
  BOOL res = FALSE;
1503
2.33k
  BYTE cmac[8] = { 0 };
1504
2.33k
  BYTE wmac[8] = { 0 };
1505
2.33k
  BOOL status = FALSE;
1506
1507
2.33k
  WINPR_ASSERT(rdp);
1508
2.33k
  WINPR_ASSERT(rdp->settings);
1509
2.33k
  WINPR_ASSERT(s);
1510
2.33k
  WINPR_ASSERT(pLength);
1511
1512
2.33k
  if (!security_lock(rdp))
1513
0
    return FALSE;
1514
1515
2.33k
  INT32 length = *pLength;
1516
2.33k
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1517
2.33k
    return TRUE;
1518
1519
0
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1520
0
  {
1521
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
1522
0
      goto unlock;
1523
1524
0
    UINT16 len = 0;
1525
0
    Stream_Read_UINT16(s, len); /* 0x10 */
1526
0
    if (len != 0x10)
1527
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS length %" PRIu16 " != 0x10",
1528
0
                 len);
1529
1530
0
    UINT16 version = 0;
1531
0
    Stream_Read_UINT8(s, version); /* 0x1 */
1532
0
    if (version != 1)
1533
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS version %" PRIu16 " != 1",
1534
0
                 version);
1535
1536
0
    BYTE pad = 0;
1537
0
    Stream_Read_UINT8(s, pad);
1538
0
    const BYTE* sig = Stream_ConstPointer(s);
1539
0
    Stream_Seek(s, 8); /* signature */
1540
0
    length -= 12;
1541
0
    const INT32 padLength = length - pad;
1542
1543
0
    if ((length <= 0) || (padLength <= 0) || (padLength > UINT16_MAX))
1544
0
    {
1545
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid pad length %" PRId32, padLength);
1546
0
      goto unlock;
1547
0
    }
1548
1549
0
    if (!security_fips_decrypt(Stream_Pointer(s), (size_t)length, rdp))
1550
0
      goto unlock;
1551
1552
0
    if (!security_fips_check_signature(Stream_ConstPointer(s), (size_t)padLength, sig, 8, rdp))
1553
0
      goto unlock;
1554
1555
0
    Stream_SetLength(s, Stream_Length(s) - pad);
1556
0
    *pLength = (UINT16)padLength;
1557
0
  }
1558
0
  else
1559
0
  {
1560
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, sizeof(wmac)))
1561
0
      goto unlock;
1562
1563
0
    Stream_Read(s, wmac, sizeof(wmac));
1564
0
    length -= sizeof(wmac);
1565
1566
0
    if (length <= 0)
1567
0
    {
1568
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid length field");
1569
0
      goto unlock;
1570
0
    }
1571
1572
0
    if (!security_decrypt(Stream_PointerAs(s, BYTE), (size_t)length, rdp))
1573
0
      goto unlock;
1574
1575
0
    if (securityFlags & SEC_SECURE_CHECKSUM)
1576
0
      status = security_salted_mac_signature(rdp, Stream_ConstPointer(s), (UINT32)length,
1577
0
                                             FALSE, cmac, sizeof(cmac));
1578
0
    else
1579
0
      status = security_mac_signature(rdp, Stream_ConstPointer(s), (UINT32)length, cmac,
1580
0
                                      sizeof(cmac));
1581
1582
0
    if (!status)
1583
0
      goto unlock;
1584
1585
0
    if (memcmp(wmac, cmac, sizeof(wmac)) != 0)
1586
0
    {
1587
0
      WLog_Print(rdp->log, WLOG_ERROR, "WARNING: invalid packet signature");
1588
      /*
1589
       * Because Standard RDP Security is totally broken,
1590
       * and cannot protect against MITM, don't treat signature
1591
       * verification failure as critical. This at least enables
1592
       * us to work with broken RDP clients and servers that
1593
       * generate invalid signatures.
1594
       */
1595
      // return FALSE;
1596
0
    }
1597
1598
0
    *pLength = (UINT16)length;
1599
0
  }
1600
0
  res = TRUE;
1601
0
unlock:
1602
0
  if (!security_unlock(rdp))
1603
0
    return FALSE;
1604
0
  return res;
1605
0
}
1606
1607
const char* pdu_type_to_str(UINT16 pduType, char* buffer, size_t length)
1608
16.5k
{
1609
16.5k
  const char* str = NULL;
1610
16.5k
  switch (pduType)
1611
16.5k
  {
1612
8.36k
    case PDU_TYPE_DEMAND_ACTIVE:
1613
8.36k
      str = "PDU_TYPE_DEMAND_ACTIVE";
1614
8.36k
      break;
1615
50
    case PDU_TYPE_CONFIRM_ACTIVE:
1616
50
      str = "PDU_TYPE_CONFIRM_ACTIVE";
1617
50
      break;
1618
28
    case PDU_TYPE_DEACTIVATE_ALL:
1619
28
      str = "PDU_TYPE_DEACTIVATE_ALL";
1620
28
      break;
1621
0
    case PDU_TYPE_DATA:
1622
0
      str = "PDU_TYPE_DATA";
1623
0
      break;
1624
0
    case PDU_TYPE_SERVER_REDIRECTION:
1625
0
      str = "PDU_TYPE_SERVER_REDIRECTION";
1626
0
      break;
1627
0
    case PDU_TYPE_FLOW_TEST:
1628
0
      str = "PDU_TYPE_FLOW_TEST";
1629
0
      break;
1630
0
    case PDU_TYPE_FLOW_RESPONSE:
1631
0
      str = "PDU_TYPE_FLOW_RESPONSE";
1632
0
      break;
1633
0
    case PDU_TYPE_FLOW_STOP:
1634
0
      str = "PDU_TYPE_FLOW_STOP";
1635
0
      break;
1636
8.10k
    default:
1637
8.10k
      str = "PDU_TYPE_UNKNOWN";
1638
8.10k
      break;
1639
16.5k
  }
1640
1641
16.5k
  winpr_str_append(str, buffer, length, "");
1642
16.5k
  {
1643
16.5k
    char msg[32] = { 0 };
1644
16.5k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", pduType);
1645
16.5k
    winpr_str_append(msg, buffer, length, "");
1646
16.5k
  }
1647
16.5k
  return buffer;
1648
16.5k
}
1649
1650
/**
1651
 * Process an RDP packet.
1652
 * @param rdp RDP module
1653
 * @param s stream
1654
 */
1655
1656
static state_run_t rdp_recv_tpkt_pdu(rdpRdp* rdp, wStream* s)
1657
0
{
1658
0
  state_run_t rc = STATE_RUN_SUCCESS;
1659
0
  UINT16 length = 0;
1660
0
  UINT16 pduType = 0;
1661
0
  UINT16 pduSource = 0;
1662
0
  UINT16 channelId = 0;
1663
0
  UINT16 securityFlags = 0;
1664
1665
0
  WINPR_ASSERT(rdp);
1666
0
  WINPR_ASSERT(rdp->context);
1667
0
  WINPR_ASSERT(s);
1668
1669
0
  freerdp* instance = rdp->context->instance;
1670
0
  WINPR_ASSERT(instance);
1671
1672
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
1673
0
    return STATE_RUN_FAILED;
1674
1675
0
  if (freerdp_shall_disconnect_context(rdp->context))
1676
0
    return STATE_RUN_SUCCESS;
1677
1678
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1679
0
  {
1680
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1681
0
  }
1682
1683
0
  if (rdp->mcs->messageChannelId && (channelId == rdp->mcs->messageChannelId))
1684
0
  {
1685
0
    rdp->inPackets++;
1686
0
    return rdp_handle_message_channel(rdp, s, channelId, length);
1687
0
  }
1688
1689
0
  if (rdp->settings->UseRdpSecurityLayer)
1690
0
  {
1691
0
    if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
1692
0
      return STATE_RUN_FAILED;
1693
1694
0
    if (securityFlags & (SEC_ENCRYPT | SEC_REDIRECTION_PKT))
1695
0
    {
1696
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
1697
0
        return STATE_RUN_FAILED;
1698
0
    }
1699
1700
0
    if (securityFlags & SEC_REDIRECTION_PKT)
1701
0
    {
1702
      /*
1703
       * [MS-RDPBCGR] 2.2.13.2.1
1704
       *  - no share control header, nor the 2 byte pad
1705
       */
1706
0
      Stream_Rewind(s, 2);
1707
0
      rdp->inPackets++;
1708
1709
0
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1710
0
      goto out;
1711
0
    }
1712
0
  }
1713
1714
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
1715
0
  {
1716
0
    while (Stream_GetRemainingLength(s) > 3)
1717
0
    {
1718
0
      wStream subbuffer;
1719
0
      wStream* sub = NULL;
1720
0
      size_t diff = 0;
1721
0
      UINT16 remain = 0;
1722
1723
0
      if (!rdp_read_share_control_header(rdp, s, NULL, &remain, &pduType, &pduSource))
1724
0
        return STATE_RUN_FAILED;
1725
1726
0
      sub = Stream_StaticInit(&subbuffer, Stream_Pointer(s), remain);
1727
0
      if (!Stream_SafeSeek(s, remain))
1728
0
        return STATE_RUN_FAILED;
1729
1730
0
      rdp->settings->PduSource = pduSource;
1731
0
      rdp->inPackets++;
1732
1733
0
      switch (pduType)
1734
0
      {
1735
0
        case PDU_TYPE_DATA:
1736
0
          rc = rdp_recv_data_pdu(rdp, sub);
1737
0
          if (state_run_failed(rc))
1738
0
            return rc;
1739
0
          break;
1740
1741
0
        case PDU_TYPE_DEACTIVATE_ALL:
1742
0
          if (!rdp_recv_deactivate_all(rdp, sub))
1743
0
          {
1744
0
            WLog_Print(rdp->log, WLOG_ERROR,
1745
0
                       "rdp_recv_tpkt_pdu: rdp_recv_deactivate_all() fail");
1746
0
            return STATE_RUN_FAILED;
1747
0
          }
1748
1749
0
          break;
1750
1751
0
        case PDU_TYPE_SERVER_REDIRECTION:
1752
0
          return rdp_recv_enhanced_security_redirection_packet(rdp, sub);
1753
1754
0
        case PDU_TYPE_FLOW_RESPONSE:
1755
0
        case PDU_TYPE_FLOW_STOP:
1756
0
        case PDU_TYPE_FLOW_TEST:
1757
0
          WLog_Print(rdp->log, WLOG_DEBUG, "flow message 0x%04" PRIX16 "", pduType);
1758
          /* http://msdn.microsoft.com/en-us/library/cc240576.aspx */
1759
0
          if (!Stream_SafeSeek(sub, remain))
1760
0
            return STATE_RUN_FAILED;
1761
0
          break;
1762
1763
0
        default:
1764
0
        {
1765
0
          char buffer[256] = { 0 };
1766
0
          WLog_Print(rdp->log, WLOG_ERROR, "incorrect PDU type: %s",
1767
0
                     pdu_type_to_str(pduType, buffer, sizeof(buffer)));
1768
0
        }
1769
0
        break;
1770
0
      }
1771
1772
0
      diff = Stream_GetRemainingLength(sub);
1773
0
      if (diff > 0)
1774
0
      {
1775
0
        char buffer[256] = { 0 };
1776
0
        WLog_Print(rdp->log, WLOG_WARN,
1777
0
                   "pduType %s not properly parsed, %" PRIdz
1778
0
                   " bytes remaining unhandled. Skipping.",
1779
0
                   pdu_type_to_str(pduType, buffer, sizeof(buffer)), diff);
1780
0
      }
1781
0
    }
1782
0
  }
1783
0
  else
1784
0
  {
1785
0
    rdp->inPackets++;
1786
1787
0
    if (!freerdp_channel_process(instance, s, channelId, length))
1788
0
      return STATE_RUN_FAILED;
1789
0
  }
1790
1791
0
out:
1792
0
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
1793
0
    return STATE_RUN_FAILED;
1794
0
  return rc;
1795
0
}
1796
1797
static state_run_t rdp_recv_fastpath_pdu(rdpRdp* rdp, wStream* s)
1798
0
{
1799
0
  UINT16 length = 0;
1800
1801
0
  WINPR_ASSERT(rdp);
1802
0
  rdpFastPath* fastpath = rdp->fastpath;
1803
1804
0
  if (!fastpath_read_header_rdp(fastpath, s, &length))
1805
0
  {
1806
0
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_recv_fastpath_pdu: fastpath_read_header_rdp() fail");
1807
0
    return STATE_RUN_FAILED;
1808
0
  }
1809
1810
0
  if ((length == 0) || (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, length)))
1811
0
  {
1812
0
    WLog_Print(rdp->log, WLOG_ERROR, "incorrect FastPath PDU header length %" PRIu16 "",
1813
0
               length);
1814
0
    return STATE_RUN_FAILED;
1815
0
  }
1816
1817
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1818
0
  {
1819
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1820
0
  }
1821
1822
0
  if (!fastpath_decrypt(fastpath, s, &length))
1823
0
    return STATE_RUN_FAILED;
1824
1825
0
  return fastpath_recv_updates(rdp->fastpath, s);
1826
0
}
1827
1828
static state_run_t rdp_recv_pdu(rdpRdp* rdp, wStream* s)
1829
0
{
1830
0
  const int rc = tpkt_verify_header(s);
1831
0
  if (rc > 0)
1832
0
    return rdp_recv_tpkt_pdu(rdp, s);
1833
0
  else if (rc == 0)
1834
0
    return rdp_recv_fastpath_pdu(rdp, s);
1835
0
  else
1836
0
    return STATE_RUN_FAILED;
1837
0
}
1838
1839
static state_run_t rdp_handle_sc_flags(rdpRdp* rdp, wStream* s, UINT32 flag,
1840
                                       CONNECTION_STATE nextState)
1841
0
{
1842
0
  const UINT32 mask = FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
1843
0
                      FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU;
1844
0
  WINPR_ASSERT(rdp);
1845
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1846
0
  if (state_run_success(status))
1847
0
  {
1848
0
    const UINT32 flags = rdp->finalize_sc_pdus & mask;
1849
0
    if ((flags & flag) == flag)
1850
0
    {
1851
0
      if (!rdp_client_transition_to_state(rdp, nextState))
1852
0
        status = STATE_RUN_FAILED;
1853
0
      else
1854
0
        status = STATE_RUN_SUCCESS;
1855
0
    }
1856
0
    else
1857
0
    {
1858
0
      char flag_buffer[256] = { 0 };
1859
0
      char mask_buffer[256] = { 0 };
1860
0
      WLog_Print(rdp->log, WLOG_WARN,
1861
0
                 "[%s] unexpected server message, expected flag %s [have %s]",
1862
0
                 rdp_get_state_string(rdp),
1863
0
                 rdp_finalize_flags_to_str(flag, flag_buffer, sizeof(flag_buffer)),
1864
0
                 rdp_finalize_flags_to_str(flags, mask_buffer, sizeof(mask_buffer)));
1865
0
    }
1866
0
  }
1867
0
  return status;
1868
0
}
1869
1870
static state_run_t rdp_client_exchange_monitor_layout(rdpRdp* rdp, wStream* s)
1871
0
{
1872
0
  WINPR_ASSERT(rdp);
1873
1874
0
  if (!rdp_check_monitor_layout_pdu_state(rdp, FALSE))
1875
0
    return FALSE;
1876
1877
  /* We might receive unrelated messages from the server (channel traffic),
1878
   * so only proceed if some flag changed
1879
   */
1880
0
  const UINT32 old = rdp->finalize_sc_pdus;
1881
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1882
0
  const UINT32 now = rdp->finalize_sc_pdus;
1883
0
  const BOOL changed = (old != now) || rdp->monitor_layout_pdu;
1884
1885
  /* This PDU is optional, so if we received a finalize PDU continue there */
1886
0
  if (state_run_success(status) && changed)
1887
0
  {
1888
0
    if (!rdp->monitor_layout_pdu)
1889
0
    {
1890
0
      if (!rdp_finalize_is_flag_set(rdp, FINALIZE_SC_SYNCHRONIZE_PDU))
1891
0
        return STATE_RUN_FAILED;
1892
0
    }
1893
1894
0
    status = rdp_client_connect_finalize(rdp);
1895
0
    if (state_run_success(status) && !rdp->monitor_layout_pdu)
1896
0
      status = STATE_RUN_TRY_AGAIN;
1897
0
  }
1898
0
  return status;
1899
0
}
1900
1901
static state_run_t rdp_recv_callback_int(WINPR_ATTR_UNUSED rdpTransport* transport, wStream* s,
1902
                                         void* extra)
1903
9.57k
{
1904
9.57k
  state_run_t status = STATE_RUN_SUCCESS;
1905
9.57k
  rdpRdp* rdp = (rdpRdp*)extra;
1906
1907
9.57k
  WINPR_ASSERT(transport);
1908
9.57k
  WINPR_ASSERT(rdp);
1909
9.57k
  WINPR_ASSERT(s);
1910
1911
9.57k
  switch (rdp_get_state(rdp))
1912
9.57k
  {
1913
0
    case CONNECTION_STATE_NEGO:
1914
0
      if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1915
0
        status = STATE_RUN_FAILED;
1916
0
      else
1917
0
        status = STATE_RUN_CONTINUE;
1918
0
      break;
1919
0
    case CONNECTION_STATE_NLA:
1920
0
      if (nla_get_state(rdp->nla) < NLA_STATE_AUTH_INFO)
1921
0
      {
1922
0
        if (nla_recv_pdu(rdp->nla, s) < 1)
1923
0
        {
1924
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nla_recv_pdu() fail",
1925
0
                     rdp_get_state_string(rdp));
1926
0
          status = STATE_RUN_FAILED;
1927
0
        }
1928
0
      }
1929
0
      else if (nla_get_state(rdp->nla) == NLA_STATE_POST_NEGO)
1930
0
      {
1931
0
        nego_recv(rdp->transport, s, (void*)rdp->nego);
1932
1933
0
        if (!nego_update_settings_from_state(rdp->nego, rdp->settings))
1934
0
          return FALSE;
1935
1936
0
        if (nego_get_state(rdp->nego) != NEGO_STATE_FINAL)
1937
0
        {
1938
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nego_recv() fail",
1939
0
                     rdp_get_state_string(rdp));
1940
0
          status = STATE_RUN_FAILED;
1941
0
        }
1942
0
        else if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1943
0
          status = STATE_RUN_FAILED;
1944
0
      }
1945
1946
0
      if (state_run_success(status))
1947
0
      {
1948
0
        if (nla_get_state(rdp->nla) == NLA_STATE_AUTH_INFO)
1949
0
        {
1950
0
          transport_set_nla_mode(rdp->transport, FALSE);
1951
1952
0
          if (rdp->settings->VmConnectMode)
1953
0
          {
1954
0
            if (!nego_set_state(rdp->nego, NEGO_STATE_NLA))
1955
0
              status = STATE_RUN_FAILED;
1956
0
            else if (!nego_set_requested_protocols(rdp->nego,
1957
0
                                                   PROTOCOL_HYBRID | PROTOCOL_SSL))
1958
0
              status = STATE_RUN_FAILED;
1959
0
            else if (!nego_send_negotiation_request(rdp->nego))
1960
0
              status = STATE_RUN_FAILED;
1961
0
            else if (!nla_set_state(rdp->nla, NLA_STATE_POST_NEGO))
1962
0
              status = STATE_RUN_FAILED;
1963
0
          }
1964
0
          else
1965
0
          {
1966
0
            if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1967
0
              status = STATE_RUN_FAILED;
1968
0
          }
1969
0
        }
1970
0
      }
1971
0
      if (state_run_success(status))
1972
0
      {
1973
1974
0
        if (nla_get_state(rdp->nla) == NLA_STATE_FINAL)
1975
0
        {
1976
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1977
0
            status = STATE_RUN_FAILED;
1978
0
          else
1979
0
            status = STATE_RUN_CONTINUE;
1980
0
        }
1981
0
      }
1982
0
      break;
1983
1984
0
    case CONNECTION_STATE_AAD:
1985
0
      if (aad_recv(rdp->aad, s) < 1)
1986
0
      {
1987
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - aad_recv() fail", rdp_get_state_string(rdp));
1988
0
        status = STATE_RUN_FAILED;
1989
0
      }
1990
0
      if (state_run_success(status))
1991
0
      {
1992
0
        if (aad_get_state(rdp->aad) == AAD_STATE_FINAL)
1993
0
        {
1994
0
          transport_set_aad_mode(rdp->transport, FALSE);
1995
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1996
0
            status = STATE_RUN_FAILED;
1997
0
          else
1998
0
            status = STATE_RUN_CONTINUE;
1999
0
        }
2000
0
      }
2001
0
      break;
2002
2003
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
2004
0
      if (!mcs_client_begin(rdp->mcs))
2005
0
      {
2006
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - mcs_client_begin() fail",
2007
0
                   rdp_get_state_string(rdp));
2008
0
        status = STATE_RUN_FAILED;
2009
0
      }
2010
0
      else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_RESPONSE))
2011
0
        status = STATE_RUN_FAILED;
2012
0
      else if (Stream_GetRemainingLength(s) > 0)
2013
0
        status = STATE_RUN_CONTINUE;
2014
0
      break;
2015
2016
0
    case CONNECTION_STATE_MCS_CREATE_RESPONSE:
2017
0
      if (!mcs_recv_connect_response(rdp->mcs, s))
2018
0
      {
2019
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_connect_response failure");
2020
0
        status = STATE_RUN_FAILED;
2021
0
      }
2022
0
      else
2023
0
      {
2024
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ERECT_DOMAIN))
2025
0
          status = STATE_RUN_FAILED;
2026
0
        else if (!mcs_send_erect_domain_request(rdp->mcs))
2027
0
        {
2028
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_erect_domain_request failure");
2029
0
          status = STATE_RUN_FAILED;
2030
0
        }
2031
0
        else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ATTACH_USER))
2032
0
          status = STATE_RUN_FAILED;
2033
0
        else if (!mcs_send_attach_user_request(rdp->mcs))
2034
0
        {
2035
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_attach_user_request failure");
2036
0
          status = STATE_RUN_FAILED;
2037
0
        }
2038
0
        else if (!rdp_client_transition_to_state(rdp,
2039
0
                                                 CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM))
2040
0
          status = STATE_RUN_FAILED;
2041
0
      }
2042
0
      break;
2043
2044
0
    case CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM:
2045
0
      if (!mcs_recv_attach_user_confirm(rdp->mcs, s))
2046
0
      {
2047
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_attach_user_confirm failure");
2048
0
        status = STATE_RUN_FAILED;
2049
0
      }
2050
0
      else if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_SupportSkipChannelJoin))
2051
0
      {
2052
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST))
2053
0
          status = STATE_RUN_FAILED;
2054
0
        else if (!mcs_send_channel_join_request(rdp->mcs, rdp->mcs->userId))
2055
0
        {
2056
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_channel_join_request failure");
2057
0
          status = STATE_RUN_FAILED;
2058
0
        }
2059
0
        else if (!rdp_client_transition_to_state(
2060
0
                     rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE))
2061
0
          status = STATE_RUN_FAILED;
2062
0
      }
2063
0
      else
2064
0
      {
2065
        /* SKIP_CHANNELJOIN is active, consider channels to be joined */
2066
0
        if (!rdp_client_skip_mcs_channel_join(rdp))
2067
0
          status = STATE_RUN_FAILED;
2068
0
      }
2069
0
      break;
2070
2071
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE:
2072
0
      if (!rdp_client_connect_mcs_channel_join_confirm(rdp, s))
2073
0
      {
2074
0
        WLog_Print(rdp->log, WLOG_ERROR,
2075
0
                   "%s - "
2076
0
                   "rdp_client_connect_mcs_channel_join_confirm() fail",
2077
0
                   rdp_get_state_string(rdp));
2078
0
        status = STATE_RUN_FAILED;
2079
0
      }
2080
2081
0
      break;
2082
2083
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
2084
0
      if (!rdp_client_connect_auto_detect(rdp, s))
2085
0
      {
2086
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
2087
0
          status = STATE_RUN_FAILED;
2088
0
        else
2089
0
          status = STATE_RUN_TRY_AGAIN;
2090
0
      }
2091
0
      break;
2092
2093
0
    case CONNECTION_STATE_LICENSING:
2094
0
      status = rdp_client_connect_license(rdp, s);
2095
2096
0
      if (state_run_failed(status))
2097
0
      {
2098
0
        char buffer[64] = { 0 };
2099
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_client_connect_license() - %s",
2100
0
                   rdp_get_state_string(rdp),
2101
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2102
0
      }
2103
2104
0
      break;
2105
2106
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
2107
0
      if (!rdp_client_connect_auto_detect(rdp, s))
2108
0
      {
2109
0
        (void)rdp_client_transition_to_state(
2110
0
            rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
2111
0
        status = STATE_RUN_TRY_AGAIN;
2112
0
      }
2113
0
      break;
2114
2115
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
2116
0
      status = rdp_client_connect_demand_active(rdp, s);
2117
2118
0
      if (state_run_failed(status))
2119
0
      {
2120
0
        char buffer[64] = { 0 };
2121
0
        WLog_Print(rdp->log, WLOG_DEBUG,
2122
0
                   "%s - "
2123
0
                   "rdp_client_connect_demand_active() - %s",
2124
0
                   rdp_get_state_string(rdp),
2125
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2126
0
      }
2127
0
      else if (status == STATE_RUN_ACTIVE)
2128
0
      {
2129
0
        if (!rdp_client_transition_to_state(
2130
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
2131
0
          status = STATE_RUN_FAILED;
2132
0
        else
2133
0
          status = STATE_RUN_CONTINUE;
2134
0
      }
2135
0
      break;
2136
2137
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
2138
0
      status = rdp_client_exchange_monitor_layout(rdp, s);
2139
0
      break;
2140
2141
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
2142
0
      status = rdp_client_connect_confirm_active(rdp, s);
2143
0
      break;
2144
2145
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
2146
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_SYNCHRONIZE_PDU,
2147
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE);
2148
0
      break;
2149
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
2150
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_COOPERATE_PDU,
2151
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL);
2152
0
      break;
2153
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
2154
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_GRANTED_PDU,
2155
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP);
2156
0
      break;
2157
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
2158
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_FONT_MAP_PDU, CONNECTION_STATE_ACTIVE);
2159
0
      break;
2160
2161
0
    case CONNECTION_STATE_ACTIVE:
2162
0
      status = rdp_recv_pdu(rdp, s);
2163
2164
0
      if (state_run_failed(status))
2165
0
      {
2166
0
        char buffer[64] = { 0 };
2167
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_recv_pdu() - %s",
2168
0
                   rdp_get_state_string(rdp),
2169
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2170
0
      }
2171
0
      break;
2172
2173
9.57k
    default:
2174
9.57k
      WLog_Print(rdp->log, WLOG_ERROR, "%s state %d", rdp_get_state_string(rdp),
2175
9.57k
                 rdp_get_state(rdp));
2176
9.57k
      status = STATE_RUN_FAILED;
2177
9.57k
      break;
2178
9.57k
  }
2179
2180
9.57k
  if (state_run_failed(status))
2181
9.57k
  {
2182
9.57k
    char buffer[64] = { 0 };
2183
9.57k
    WLog_Print(rdp->log, WLOG_ERROR, "%s status %s", rdp_get_state_string(rdp),
2184
9.57k
               state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2185
9.57k
  }
2186
9.57k
  return status;
2187
9.57k
}
2188
2189
state_run_t rdp_recv_callback(rdpTransport* transport, wStream* s, void* extra)
2190
9.57k
{
2191
9.57k
  char buffer[64] = { 0 };
2192
9.57k
  state_run_t rc = STATE_RUN_FAILED;
2193
9.57k
  const size_t start = Stream_GetPosition(s);
2194
9.57k
  const rdpContext* context = transport_get_context(transport);
2195
2196
9.57k
  WINPR_ASSERT(context);
2197
9.57k
  do
2198
9.57k
  {
2199
9.57k
    const rdpRdp* rdp = context->rdp;
2200
9.57k
    WINPR_ASSERT(rdp);
2201
2202
9.57k
    if (rc == STATE_RUN_TRY_AGAIN)
2203
0
      Stream_SetPosition(s, start);
2204
2205
9.57k
    const char* old = rdp_get_state_string(rdp);
2206
9.57k
    const size_t orem = Stream_GetRemainingLength(s);
2207
9.57k
    rc = rdp_recv_callback_int(transport, s, extra);
2208
2209
9.57k
    const char* now = rdp_get_state_string(rdp);
2210
9.57k
    const size_t rem = Stream_GetRemainingLength(s);
2211
2212
9.57k
    WLog_Print(rdp->log, WLOG_TRACE,
2213
9.57k
               "(client)[%s -> %s] current return %s [feeding %" PRIuz " bytes, %" PRIuz
2214
9.57k
               " bytes not processed]",
2215
9.57k
               old, now, state_run_result_string(rc, buffer, sizeof(buffer)), orem, rem);
2216
9.57k
  } while ((rc == STATE_RUN_TRY_AGAIN) || (rc == STATE_RUN_CONTINUE));
2217
9.57k
  return rc;
2218
9.57k
}
2219
2220
BOOL rdp_send_channel_data(rdpRdp* rdp, UINT16 channelId, const BYTE* data, size_t size)
2221
0
{
2222
0
  return freerdp_channel_send(rdp, channelId, data, size);
2223
0
}
2224
2225
BOOL rdp_channel_send_packet(rdpRdp* rdp, UINT16 channelId, size_t totalSize, UINT32 flags,
2226
                             const BYTE* data, size_t chunkSize)
2227
0
{
2228
0
  return freerdp_channel_send_packet(rdp, channelId, totalSize, flags, data, chunkSize);
2229
0
}
2230
2231
BOOL rdp_send_error_info(rdpRdp* rdp)
2232
0
{
2233
0
  UINT16 sec_flags = 0;
2234
0
  wStream* s = NULL;
2235
0
  BOOL status = 0;
2236
2237
0
  if (rdp->errorInfo == ERRINFO_SUCCESS)
2238
0
    return TRUE;
2239
2240
0
  s = rdp_data_pdu_init(rdp, &sec_flags);
2241
2242
0
  if (!s)
2243
0
    return FALSE;
2244
2245
0
  Stream_Write_UINT32(s, rdp->errorInfo); /* error id (4 bytes) */
2246
0
  status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SET_ERROR_INFO, 0, sec_flags);
2247
0
  return status;
2248
0
}
2249
2250
int rdp_check_fds(rdpRdp* rdp)
2251
0
{
2252
0
  int status = 0;
2253
0
  rdpTsg* tsg = NULL;
2254
0
  rdpTransport* transport = NULL;
2255
2256
0
  WINPR_ASSERT(rdp);
2257
0
  transport = rdp->transport;
2258
2259
0
  tsg = transport_get_tsg(transport);
2260
0
  if (tsg)
2261
0
  {
2262
0
    if (!tsg_check_event_handles(tsg))
2263
0
    {
2264
0
      WLog_Print(rdp->log, WLOG_ERROR, "rdp_check_fds: tsg_check_event_handles()");
2265
0
      return -1;
2266
0
    }
2267
2268
0
    if (tsg_get_state(tsg) != TSG_STATE_PIPE_CREATED)
2269
0
      return 1;
2270
0
  }
2271
2272
0
  status = transport_check_fds(transport);
2273
2274
0
  if (status == 1)
2275
0
  {
2276
0
    if (!rdp_client_redirect(rdp)) /* session redirection */
2277
0
      return -1;
2278
0
  }
2279
2280
0
  if (status < 0)
2281
0
    WLog_Print(rdp->log, WLOG_DEBUG, "transport_check_fds() - %i", status);
2282
0
  else
2283
0
    status = freerdp_timer_poll(rdp->timer);
2284
2285
0
  return status;
2286
0
}
2287
2288
BOOL freerdp_get_stats(rdpRdp* rdp, UINT64* inBytes, UINT64* outBytes, UINT64* inPackets,
2289
                       UINT64* outPackets)
2290
0
{
2291
0
  if (!rdp)
2292
0
    return FALSE;
2293
2294
0
  if (inBytes)
2295
0
    *inBytes = rdp->inBytes;
2296
0
  if (outBytes)
2297
0
    *outBytes = rdp->outBytes;
2298
0
  if (inPackets)
2299
0
    *inPackets = rdp->inPackets;
2300
0
  if (outPackets)
2301
0
    *outPackets = rdp->outPackets;
2302
2303
0
  return TRUE;
2304
0
}
2305
2306
static bool rdp_new_common(rdpRdp* rdp)
2307
18.5k
{
2308
18.5k
  WINPR_ASSERT(rdp);
2309
2310
18.5k
  bool rc = false;
2311
18.5k
  rdp->transport = transport_new(rdp->context);
2312
18.5k
  if (!rdp->transport)
2313
0
    goto fail;
2314
2315
18.5k
  if (rdp->io)
2316
0
  {
2317
0
    if (!transport_set_io_callbacks(rdp->transport, rdp->io))
2318
0
      goto fail;
2319
0
  }
2320
2321
18.5k
  rdp->aad = aad_new(rdp->context, rdp->transport);
2322
18.5k
  if (!rdp->aad)
2323
0
    goto fail;
2324
2325
18.5k
  rdp->nego = nego_new(rdp->transport);
2326
18.5k
  if (!rdp->nego)
2327
0
    goto fail;
2328
2329
18.5k
  rdp->mcs = mcs_new(rdp->transport);
2330
18.5k
  if (!rdp->mcs)
2331
0
    goto fail;
2332
2333
18.5k
  rdp->license = license_new(rdp);
2334
18.5k
  if (!rdp->license)
2335
0
    goto fail;
2336
2337
18.5k
  rdp->fastpath = fastpath_new(rdp);
2338
18.5k
  if (!rdp->fastpath)
2339
0
    goto fail;
2340
2341
18.5k
  rc = true;
2342
18.5k
fail:
2343
18.5k
  return rc;
2344
18.5k
}
2345
2346
/**
2347
 * Instantiate new RDP module.
2348
 * @return new RDP module
2349
 */
2350
2351
rdpRdp* rdp_new(rdpContext* context)
2352
18.5k
{
2353
18.5k
  DWORD flags = 0;
2354
18.5k
  rdpRdp* rdp = (rdpRdp*)calloc(1, sizeof(rdpRdp));
2355
2356
18.5k
  if (!rdp)
2357
0
    return NULL;
2358
2359
18.5k
  rdp->log = WLog_Get(RDP_TAG);
2360
18.5k
  WINPR_ASSERT(rdp->log);
2361
2362
18.5k
  (void)_snprintf(rdp->log_context, sizeof(rdp->log_context), "%p", (void*)context);
2363
18.5k
  WLog_SetContext(rdp->log, NULL, rdp->log_context);
2364
2365
18.5k
  InitializeCriticalSection(&rdp->critical);
2366
18.5k
  rdp->context = context;
2367
18.5k
  WINPR_ASSERT(rdp->context);
2368
2369
18.5k
  if (context->ServerMode)
2370
8.96k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2371
2372
18.5k
  if (!context->settings)
2373
18.5k
  {
2374
18.5k
    context->settings = rdp->settings = freerdp_settings_new(flags);
2375
2376
18.5k
    if (!rdp->settings)
2377
0
      goto fail;
2378
18.5k
  }
2379
0
  else
2380
0
    rdp->settings = context->settings;
2381
2382
  /* Keep a backup copy of settings for later comparisons */
2383
18.5k
  if (!rdp_set_backup_settings(rdp))
2384
0
    goto fail;
2385
2386
18.5k
  rdp->settings->instance = context->instance;
2387
2388
18.5k
  context->settings = rdp->settings;
2389
18.5k
  if (context->instance)
2390
9.57k
    context->settings->instance = context->instance;
2391
8.96k
  else if (context->peer)
2392
8.96k
  {
2393
8.96k
    rdp->settings->instance = context->peer;
2394
2395
#if defined(WITH_FREERDP_DEPRECATED)
2396
    context->peer->settings = rdp->settings;
2397
#endif
2398
8.96k
  }
2399
2400
18.5k
  if (!rdp_new_common(rdp))
2401
0
    goto fail;
2402
2403
18.5k
  {
2404
18.5k
    const rdpTransportIo* io = transport_get_io_callbacks(rdp->transport);
2405
18.5k
    if (!io)
2406
0
      goto fail;
2407
18.5k
    rdp->io = calloc(1, sizeof(rdpTransportIo));
2408
18.5k
    if (!rdp->io)
2409
0
      goto fail;
2410
18.5k
    *rdp->io = *io;
2411
18.5k
  }
2412
2413
0
  rdp->input = input_new(rdp);
2414
2415
18.5k
  if (!rdp->input)
2416
0
    goto fail;
2417
2418
18.5k
  rdp->update = update_new(rdp);
2419
2420
18.5k
  if (!rdp->update)
2421
0
    goto fail;
2422
2423
18.5k
  rdp->redirection = redirection_new();
2424
2425
18.5k
  if (!rdp->redirection)
2426
0
    goto fail;
2427
2428
18.5k
  rdp->autodetect = autodetect_new(rdp->context);
2429
2430
18.5k
  if (!rdp->autodetect)
2431
0
    goto fail;
2432
2433
18.5k
  rdp->heartbeat = heartbeat_new();
2434
2435
18.5k
  if (!rdp->heartbeat)
2436
0
    goto fail;
2437
2438
18.5k
  rdp->multitransport = multitransport_new(rdp, INITIATE_REQUEST_PROTOCOL_UDPFECL |
2439
18.5k
                                                    INITIATE_REQUEST_PROTOCOL_UDPFECR);
2440
2441
18.5k
  if (!rdp->multitransport)
2442
0
    goto fail;
2443
2444
18.5k
  rdp->bulk = bulk_new(context);
2445
2446
18.5k
  if (!rdp->bulk)
2447
0
    goto fail;
2448
2449
18.5k
  rdp->pubSub = PubSub_New(TRUE);
2450
18.5k
  if (!rdp->pubSub)
2451
0
    goto fail;
2452
2453
18.5k
  rdp->abortEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
2454
18.5k
  if (!rdp->abortEvent)
2455
0
    goto fail;
2456
2457
18.5k
  rdp->timer = freerdp_timer_new(rdp);
2458
18.5k
  if (!rdp->timer)
2459
0
    goto fail;
2460
2461
18.5k
  return rdp;
2462
2463
0
fail:
2464
0
  WINPR_PRAGMA_DIAG_PUSH
2465
0
  WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
2466
0
  rdp_free(rdp);
2467
0
  WINPR_PRAGMA_DIAG_POP
2468
0
  return NULL;
2469
18.5k
}
2470
2471
static void rdp_reset_free(rdpRdp* rdp)
2472
18.5k
{
2473
18.5k
  WINPR_ASSERT(rdp);
2474
2475
18.5k
  (void)security_lock(rdp);
2476
18.5k
  rdp_free_rc4_decrypt_keys(rdp);
2477
18.5k
  rdp_free_rc4_encrypt_keys(rdp);
2478
2479
18.5k
  winpr_Cipher_Free(rdp->fips_encrypt);
2480
18.5k
  winpr_Cipher_Free(rdp->fips_decrypt);
2481
18.5k
  rdp->fips_encrypt = NULL;
2482
18.5k
  rdp->fips_decrypt = NULL;
2483
18.5k
  (void)security_unlock(rdp);
2484
2485
18.5k
  aad_free(rdp->aad);
2486
18.5k
  mcs_free(rdp->mcs);
2487
18.5k
  nego_free(rdp->nego);
2488
18.5k
  license_free(rdp->license);
2489
18.5k
  transport_free(rdp->transport);
2490
18.5k
  fastpath_free(rdp->fastpath);
2491
2492
18.5k
  rdp->aad = NULL;
2493
18.5k
  rdp->mcs = NULL;
2494
18.5k
  rdp->nego = NULL;
2495
18.5k
  rdp->license = NULL;
2496
18.5k
  rdp->transport = NULL;
2497
18.5k
  rdp->fastpath = NULL;
2498
18.5k
}
2499
2500
BOOL rdp_reset(rdpRdp* rdp)
2501
0
{
2502
0
  BOOL rc = TRUE;
2503
2504
0
  WINPR_ASSERT(rdp);
2505
2506
0
  rdpSettings* settings = rdp->settings;
2507
0
  WINPR_ASSERT(settings);
2508
2509
0
  bulk_reset(rdp->bulk);
2510
2511
0
  rdp_reset_free(rdp);
2512
2513
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, NULL, 0))
2514
0
    rc = FALSE;
2515
2516
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, NULL, 0))
2517
0
    rc = FALSE;
2518
2519
0
  if (!freerdp_settings_set_string(settings, FreeRDP_ClientAddress, NULL))
2520
0
    rc = FALSE;
2521
2522
0
  if (!rc)
2523
0
    goto fail;
2524
2525
0
  rc = rdp_new_common(rdp);
2526
0
  if (!rc)
2527
0
    goto fail;
2528
2529
0
  if (!transport_set_layer(rdp->transport, TRANSPORT_LAYER_TCP))
2530
0
    goto fail;
2531
2532
0
  rdp->errorInfo = 0;
2533
0
  rc = rdp_finalize_reset_flags(rdp, TRUE);
2534
2535
0
fail:
2536
0
  return rc;
2537
0
}
2538
2539
/**
2540
 * Free RDP module.
2541
 * @param rdp RDP module to be freed
2542
 */
2543
2544
void rdp_free(rdpRdp* rdp)
2545
18.5k
{
2546
18.5k
  if (rdp)
2547
18.5k
  {
2548
18.5k
    freerdp_timer_free(rdp->timer);
2549
18.5k
    rdp_reset_free(rdp);
2550
2551
18.5k
    freerdp_settings_free(rdp->settings);
2552
18.5k
    freerdp_settings_free(rdp->originalSettings);
2553
18.5k
    freerdp_settings_free(rdp->remoteSettings);
2554
2555
18.5k
    input_free(rdp->input);
2556
18.5k
    update_free(rdp->update);
2557
18.5k
    nla_free(rdp->nla);
2558
18.5k
    redirection_free(rdp->redirection);
2559
18.5k
    autodetect_free(rdp->autodetect);
2560
18.5k
    heartbeat_free(rdp->heartbeat);
2561
18.5k
    multitransport_free(rdp->multitransport);
2562
18.5k
    bulk_free(rdp->bulk);
2563
18.5k
    free(rdp->io);
2564
18.5k
    PubSub_Free(rdp->pubSub);
2565
18.5k
    if (rdp->abortEvent)
2566
18.5k
      (void)CloseHandle(rdp->abortEvent);
2567
18.5k
    aad_free(rdp->aad);
2568
18.5k
    WINPR_JSON_Delete(rdp->wellknown);
2569
18.5k
    DeleteCriticalSection(&rdp->critical);
2570
18.5k
    free(rdp);
2571
18.5k
  }
2572
18.5k
}
2573
2574
BOOL rdp_io_callback_set_event(rdpRdp* rdp, BOOL set)
2575
0
{
2576
0
  if (!rdp)
2577
0
    return FALSE;
2578
0
  return transport_io_callback_set_event(rdp->transport, set);
2579
0
}
2580
2581
const rdpTransportIo* rdp_get_io_callbacks(rdpRdp* rdp)
2582
0
{
2583
0
  if (!rdp)
2584
0
    return NULL;
2585
0
  return rdp->io;
2586
0
}
2587
2588
BOOL rdp_set_io_callbacks(rdpRdp* rdp, const rdpTransportIo* io_callbacks)
2589
0
{
2590
0
  if (!rdp)
2591
0
    return FALSE;
2592
0
  free(rdp->io);
2593
0
  rdp->io = NULL;
2594
0
  if (io_callbacks)
2595
0
  {
2596
0
    rdp->io = malloc(sizeof(rdpTransportIo));
2597
0
    if (!rdp->io)
2598
0
      return FALSE;
2599
0
    *rdp->io = *io_callbacks;
2600
0
    return transport_set_io_callbacks(rdp->transport, rdp->io);
2601
0
  }
2602
0
  return TRUE;
2603
0
}
2604
2605
BOOL rdp_set_io_callback_context(rdpRdp* rdp, void* usercontext)
2606
0
{
2607
0
  WINPR_ASSERT(rdp);
2608
0
  rdp->ioContext = usercontext;
2609
0
  return TRUE;
2610
0
}
2611
2612
void* rdp_get_io_callback_context(rdpRdp* rdp)
2613
0
{
2614
0
  WINPR_ASSERT(rdp);
2615
0
  return rdp->ioContext;
2616
0
}
2617
2618
const char* rdp_finalize_flags_to_str(UINT32 flags, char* buffer, size_t size)
2619
0
{
2620
0
  char number[32] = { 0 };
2621
0
  const UINT32 mask =
2622
0
      (uint32_t)~(FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
2623
0
                  FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU |
2624
0
                  FINALIZE_CS_SYNCHRONIZE_PDU | FINALIZE_CS_CONTROL_COOPERATE_PDU |
2625
0
                  FINALIZE_CS_CONTROL_REQUEST_PDU | FINALIZE_CS_PERSISTENT_KEY_LIST_PDU |
2626
0
                  FINALIZE_CS_FONT_LIST_PDU | FINALIZE_DEACTIVATE_REACTIVATE);
2627
2628
0
  if (flags & FINALIZE_SC_SYNCHRONIZE_PDU)
2629
0
    winpr_str_append("FINALIZE_SC_SYNCHRONIZE_PDU", buffer, size, "|");
2630
0
  if (flags & FINALIZE_SC_CONTROL_COOPERATE_PDU)
2631
0
    winpr_str_append("FINALIZE_SC_CONTROL_COOPERATE_PDU", buffer, size, "|");
2632
0
  if (flags & FINALIZE_SC_CONTROL_GRANTED_PDU)
2633
0
    winpr_str_append("FINALIZE_SC_CONTROL_GRANTED_PDU", buffer, size, "|");
2634
0
  if (flags & FINALIZE_SC_FONT_MAP_PDU)
2635
0
    winpr_str_append("FINALIZE_SC_FONT_MAP_PDU", buffer, size, "|");
2636
0
  if (flags & FINALIZE_CS_SYNCHRONIZE_PDU)
2637
0
    winpr_str_append("FINALIZE_CS_SYNCHRONIZE_PDU", buffer, size, "|");
2638
0
  if (flags & FINALIZE_CS_CONTROL_COOPERATE_PDU)
2639
0
    winpr_str_append("FINALIZE_CS_CONTROL_COOPERATE_PDU", buffer, size, "|");
2640
0
  if (flags & FINALIZE_CS_CONTROL_REQUEST_PDU)
2641
0
    winpr_str_append("FINALIZE_CS_CONTROL_REQUEST_PDU", buffer, size, "|");
2642
0
  if (flags & FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)
2643
0
    winpr_str_append("FINALIZE_CS_PERSISTENT_KEY_LIST_PDU", buffer, size, "|");
2644
0
  if (flags & FINALIZE_CS_FONT_LIST_PDU)
2645
0
    winpr_str_append("FINALIZE_CS_FONT_LIST_PDU", buffer, size, "|");
2646
0
  if (flags & FINALIZE_DEACTIVATE_REACTIVATE)
2647
0
    winpr_str_append("FINALIZE_DEACTIVATE_REACTIVATE", buffer, size, "|");
2648
0
  if (flags & mask)
2649
0
    winpr_str_append("UNKNOWN_FLAG", buffer, size, "|");
2650
0
  if (flags == 0)
2651
0
    winpr_str_append("NO_FLAG_SET", buffer, size, "|");
2652
0
  (void)_snprintf(number, sizeof(number), " [0x%08" PRIx32 "]", flags);
2653
0
  winpr_str_append(number, buffer, size, "");
2654
0
  return buffer;
2655
0
}
2656
2657
BOOL rdp_finalize_reset_flags(rdpRdp* rdp, BOOL clearAll)
2658
0
{
2659
0
  WINPR_ASSERT(rdp);
2660
0
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] reset finalize_sc_pdus", rdp_get_state_string(rdp));
2661
0
  if (clearAll)
2662
0
    rdp->finalize_sc_pdus = 0;
2663
0
  else
2664
0
    rdp->finalize_sc_pdus &= FINALIZE_DEACTIVATE_REACTIVATE;
2665
2666
0
  return rdp_set_monitor_layout_pdu_state(rdp, FALSE);
2667
0
}
2668
2669
BOOL rdp_finalize_set_flag(rdpRdp* rdp, UINT32 flag)
2670
9.71k
{
2671
9.71k
  char buffer[1024] = { 0 };
2672
2673
9.71k
  WINPR_ASSERT(rdp);
2674
2675
9.71k
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] received flag %s", rdp_get_state_string(rdp),
2676
9.71k
             rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
2677
9.71k
  rdp->finalize_sc_pdus |= flag;
2678
9.71k
  return TRUE;
2679
9.71k
}
2680
2681
BOOL rdp_finalize_is_flag_set(rdpRdp* rdp, UINT32 flag)
2682
0
{
2683
0
  WINPR_ASSERT(rdp);
2684
0
  return (rdp->finalize_sc_pdus & flag) == flag;
2685
0
}
2686
2687
BOOL rdp_reset_rc4_encrypt_keys(rdpRdp* rdp)
2688
0
{
2689
0
  WINPR_ASSERT(rdp);
2690
0
  rdp_free_rc4_encrypt_keys(rdp);
2691
0
  rdp->rc4_encrypt_key = winpr_RC4_New(rdp->encrypt_key, rdp->rc4_key_len);
2692
2693
0
  rdp->encrypt_use_count = 0;
2694
0
  return rdp->rc4_encrypt_key != NULL;
2695
0
}
2696
2697
void rdp_free_rc4_encrypt_keys(rdpRdp* rdp)
2698
18.5k
{
2699
18.5k
  WINPR_ASSERT(rdp);
2700
18.5k
  winpr_RC4_Free(rdp->rc4_encrypt_key);
2701
18.5k
  rdp->rc4_encrypt_key = NULL;
2702
18.5k
}
2703
2704
void rdp_free_rc4_decrypt_keys(rdpRdp* rdp)
2705
18.5k
{
2706
18.5k
  WINPR_ASSERT(rdp);
2707
18.5k
  winpr_RC4_Free(rdp->rc4_decrypt_key);
2708
18.5k
  rdp->rc4_decrypt_key = NULL;
2709
18.5k
}
2710
2711
BOOL rdp_reset_rc4_decrypt_keys(rdpRdp* rdp)
2712
0
{
2713
0
  WINPR_ASSERT(rdp);
2714
0
  rdp_free_rc4_decrypt_keys(rdp);
2715
0
  rdp->rc4_decrypt_key = winpr_RC4_New(rdp->decrypt_key, rdp->rc4_key_len);
2716
2717
0
  rdp->decrypt_use_count = 0;
2718
0
  return rdp->rc4_decrypt_key != NULL;
2719
0
}
2720
2721
const char* rdp_security_flag_string(UINT32 securityFlags, char* buffer, size_t size)
2722
10.6k
{
2723
10.6k
  if (securityFlags & SEC_EXCHANGE_PKT)
2724
1.70k
    winpr_str_append("SEC_EXCHANGE_PKT", buffer, size, "|");
2725
10.6k
  if (securityFlags & SEC_TRANSPORT_REQ)
2726
1.74k
    winpr_str_append("SEC_TRANSPORT_REQ", buffer, size, "|");
2727
10.6k
  if (securityFlags & SEC_TRANSPORT_RSP)
2728
1.90k
    winpr_str_append("SEC_TRANSPORT_RSP", buffer, size, "|");
2729
10.6k
  if (securityFlags & SEC_ENCRYPT)
2730
1.53k
    winpr_str_append("SEC_ENCRYPT", buffer, size, "|");
2731
10.6k
  if (securityFlags & SEC_RESET_SEQNO)
2732
1.27k
    winpr_str_append("SEC_RESET_SEQNO", buffer, size, "|");
2733
10.6k
  if (securityFlags & SEC_IGNORE_SEQNO)
2734
1.78k
    winpr_str_append("SEC_IGNORE_SEQNO", buffer, size, "|");
2735
10.6k
  if (securityFlags & SEC_INFO_PKT)
2736
1.48k
    winpr_str_append("SEC_INFO_PKT", buffer, size, "|");
2737
10.6k
  if (securityFlags & SEC_LICENSE_PKT)
2738
1.15k
    winpr_str_append("SEC_LICENSE_PKT", buffer, size, "|");
2739
10.6k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
2740
1.77k
    winpr_str_append("SEC_LICENSE_ENCRYPT_CS", buffer, size, "|");
2741
10.6k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
2742
1.77k
    winpr_str_append("SEC_LICENSE_ENCRYPT_SC", buffer, size, "|");
2743
10.6k
  if (securityFlags & SEC_REDIRECTION_PKT)
2744
7.02k
    winpr_str_append("SEC_REDIRECTION_PKT", buffer, size, "|");
2745
10.6k
  if (securityFlags & SEC_SECURE_CHECKSUM)
2746
1.88k
    winpr_str_append("SEC_SECURE_CHECKSUM", buffer, size, "|");
2747
10.6k
  if (securityFlags & SEC_AUTODETECT_REQ)
2748
1.41k
    winpr_str_append("SEC_AUTODETECT_REQ", buffer, size, "|");
2749
10.6k
  if (securityFlags & SEC_AUTODETECT_RSP)
2750
1.86k
    winpr_str_append("SEC_AUTODETECT_RSP", buffer, size, "|");
2751
10.6k
  if (securityFlags & SEC_HEARTBEAT)
2752
1.52k
    winpr_str_append("SEC_HEARTBEAT", buffer, size, "|");
2753
10.6k
  if (securityFlags & SEC_FLAGSHI_VALID)
2754
1.38k
    winpr_str_append("SEC_FLAGSHI_VALID", buffer, size, "|");
2755
10.6k
  {
2756
10.6k
    char msg[32] = { 0 };
2757
2758
10.6k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", securityFlags);
2759
10.6k
    winpr_str_append(msg, buffer, size, "");
2760
10.6k
  }
2761
10.6k
  return buffer;
2762
10.6k
}
2763
2764
static BOOL rdp_reset_remote_settings(rdpRdp* rdp)
2765
18.5k
{
2766
18.5k
  UINT32 flags = FREERDP_SETTINGS_REMOTE_MODE;
2767
18.5k
  WINPR_ASSERT(rdp);
2768
18.5k
  freerdp_settings_free(rdp->remoteSettings);
2769
2770
18.5k
  if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_ServerMode))
2771
9.57k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2772
18.5k
  rdp->remoteSettings = freerdp_settings_new(flags);
2773
18.5k
  return rdp->remoteSettings != NULL;
2774
18.5k
}
2775
2776
BOOL rdp_set_backup_settings(rdpRdp* rdp)
2777
18.5k
{
2778
18.5k
  WINPR_ASSERT(rdp);
2779
18.5k
  freerdp_settings_free(rdp->originalSettings);
2780
18.5k
  rdp->originalSettings = freerdp_settings_clone(rdp->settings);
2781
18.5k
  if (!rdp->originalSettings)
2782
0
    return FALSE;
2783
18.5k
  return rdp_reset_remote_settings(rdp);
2784
18.5k
}
2785
2786
BOOL rdp_reset_runtime_settings(rdpRdp* rdp)
2787
0
{
2788
0
  WINPR_ASSERT(rdp);
2789
0
  WINPR_ASSERT(rdp->context);
2790
2791
0
  freerdp_settings_free(rdp->settings);
2792
0
  rdp->context->settings = rdp->settings = freerdp_settings_clone(rdp->originalSettings);
2793
2794
0
  if (!rdp->settings)
2795
0
    return FALSE;
2796
0
  return rdp_reset_remote_settings(rdp);
2797
0
}
2798
2799
static BOOL starts_with(const char* tok, const char* val)
2800
7.06k
{
2801
7.06k
  const size_t len = strlen(val);
2802
7.06k
  if (strncmp(tok, val, len) != 0)
2803
7.02k
    return FALSE;
2804
46
  if (tok[len] != '=')
2805
8
    return FALSE;
2806
38
  return TRUE;
2807
46
}
2808
2809
static BOOL option_equals(const char* what, const char* val)
2810
112
{
2811
112
  return _stricmp(what, val) == 0;
2812
112
}
2813
2814
static BOOL parse_on_off_option(const char* value)
2815
38
{
2816
38
  WINPR_ASSERT(value);
2817
38
  const char* sep = strchr(value, '=');
2818
38
  if (!sep)
2819
0
    return TRUE;
2820
38
  if (option_equals("on", &sep[1]))
2821
1
    return TRUE;
2822
37
  if (option_equals("true", &sep[1]))
2823
0
    return TRUE;
2824
37
  if (option_equals("off", &sep[1]))
2825
37
    return FALSE;
2826
0
  if (option_equals("false", &sep[1]))
2827
0
    return FALSE;
2828
2829
0
  errno = 0;
2830
0
  long val = strtol(value, NULL, 0);
2831
0
  if (errno == 0)
2832
0
    return val == 0 ? FALSE : TRUE;
2833
2834
0
  return FALSE;
2835
0
}
2836
2837
7.64k
#define STR(x) #x
2838
2839
static BOOL option_is_runtime_checks(WINPR_ATTR_UNUSED wLog* log, const char* tok)
2840
182
{
2841
182
  const char* experimental[] = { STR(WITH_VERBOSE_WINPR_ASSERT) };
2842
363
  for (size_t x = 0; x < ARRAYSIZE(experimental); x++)
2843
182
  {
2844
182
    const char* opt = experimental[x];
2845
182
    if (starts_with(tok, opt))
2846
1
    {
2847
1
      return parse_on_off_option(tok);
2848
1
    }
2849
182
  }
2850
181
  return FALSE;
2851
182
}
2852
2853
static BOOL option_is_experimental(WINPR_ATTR_UNUSED wLog* log, const char* tok)
2854
182
{
2855
182
  const char* experimental[] = { STR(WITH_DSP_EXPERIMENTAL), STR(WITH_VAAPI) };
2856
543
  for (size_t x = 0; x < ARRAYSIZE(experimental); x++)
2857
363
  {
2858
363
    const char* opt = experimental[x];
2859
363
    if (starts_with(tok, opt))
2860
2
    {
2861
2
      return parse_on_off_option(tok);
2862
2
    }
2863
363
  }
2864
180
  return FALSE;
2865
182
}
2866
2867
static BOOL option_is_debug(wLog* log, const char* tok)
2868
182
{
2869
182
  WINPR_ASSERT(log);
2870
182
  const char* debug[] = { STR(WITH_DEBUG_ALL),
2871
182
                        STR(WITH_DEBUG_CERTIFICATE),
2872
182
                        STR(WITH_DEBUG_CAPABILITIES),
2873
182
                        STR(WITH_DEBUG_CHANNELS),
2874
182
                        STR(WITH_DEBUG_CLIPRDR),
2875
182
                        STR(WITH_DEBUG_CODECS),
2876
182
                        STR(WITH_DEBUG_RDPGFX),
2877
182
                        STR(WITH_DEBUG_DVC),
2878
182
                        STR(WITH_DEBUG_TSMF),
2879
182
                        STR(WITH_DEBUG_KBD),
2880
182
                        STR(WITH_DEBUG_LICENSE),
2881
182
                        STR(WITH_DEBUG_NEGO),
2882
182
                        STR(WITH_DEBUG_NLA),
2883
182
                        STR(WITH_DEBUG_TSG),
2884
182
                        STR(WITH_DEBUG_RAIL),
2885
182
                        STR(WITH_DEBUG_RDP),
2886
182
                        STR(WITH_DEBUG_RDPEI),
2887
182
                        STR(WITH_DEBUG_REDIR),
2888
182
                        STR(WITH_DEBUG_RDPDR),
2889
182
                        STR(WITH_DEBUG_RFX),
2890
182
                        STR(WITH_DEBUG_SCARD),
2891
182
                        STR(WITH_DEBUG_SND),
2892
182
                        STR(WITH_DEBUG_SVC),
2893
182
                        STR(WITH_DEBUG_TRANSPORT),
2894
182
                        STR(WITH_DEBUG_TIMEZONE),
2895
182
                        STR(WITH_DEBUG_WND),
2896
182
                        STR(WITH_DEBUG_X11_CLIPRDR),
2897
182
                        STR(WITH_DEBUG_X11_LOCAL_MOVESIZE),
2898
182
                        STR(WITH_DEBUG_X11),
2899
182
                        STR(WITH_DEBUG_XV),
2900
182
                        STR(WITH_DEBUG_RINGBUFFER),
2901
182
                        STR(WITH_DEBUG_SYMBOLS),
2902
182
                        STR(WITH_DEBUG_EVENTS),
2903
182
                        STR(WITH_DEBUG_MUTEX),
2904
182
                        STR(WITH_DEBUG_NTLM),
2905
182
                        STR(WITH_DEBUG_SDL_EVENTS),
2906
182
                        STR(WITH_DEBUG_SDL_KBD_EVENTS),
2907
182
                        STR(WITH_DEBUG_THREADS),
2908
182
                        STR(WITH_DEBUG_URBDRC) };
2909
2910
6.52k
  for (size_t x = 0; x < ARRAYSIZE(debug); x++)
2911
6.37k
  {
2912
6.37k
    const char* opt = debug[x];
2913
6.37k
    if (starts_with(tok, opt))
2914
35
      return parse_on_off_option(tok);
2915
6.37k
  }
2916
2917
147
  if (starts_with(tok, "WITH_DEBUG"))
2918
0
  {
2919
0
    WLog_Print(log, WLOG_WARN, "[BUG] Unmapped Debug-Build option '%s'.", tok);
2920
0
    return parse_on_off_option(tok);
2921
0
  }
2922
2923
147
  return FALSE;
2924
147
}
2925
2926
static void log_build_warn(rdpRdp* rdp, const char* what, const char* msg,
2927
                           BOOL (*cmp)(wLog* log, const char* tok))
2928
3
{
2929
3
  WINPR_ASSERT(rdp);
2930
3
  WINPR_PRAGMA_DIAG_PUSH
2931
3
  WINPR_PRAGMA_DIAG_IGNORED_OVERLENGTH_STRINGS
2932
2933
3
  size_t len = sizeof(FREERDP_BUILD_CONFIG);
2934
3
  char* list = calloc(len, sizeof(char));
2935
3
  char* config = _strdup(FREERDP_BUILD_CONFIG);
2936
3
  WINPR_PRAGMA_DIAG_POP
2937
2938
3
  if (config && list)
2939
3
  {
2940
3
    char* saveptr = NULL;
2941
3
    char* tok = strtok_s(config, " ", &saveptr);
2942
549
    while (tok)
2943
546
    {
2944
546
      if (cmp(rdp->log, tok))
2945
1
        winpr_str_append(tok, list, len, " ");
2946
2947
546
      tok = strtok_s(NULL, " ", &saveptr);
2948
546
    }
2949
3
  }
2950
3
  free(config);
2951
2952
3
  if (list)
2953
3
  {
2954
3
    if (strlen(list) > 0)
2955
1
    {
2956
1
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2957
1
      WLog_Print(rdp->log, WLOG_WARN, "This build is using [%s] build options:", what);
2958
2959
1
      char* saveptr = NULL;
2960
1
      char* tok = strtok_s(list, " ", &saveptr);
2961
2
      while (tok)
2962
1
      {
2963
1
        WLog_Print(rdp->log, WLOG_WARN, "* '%s'", tok);
2964
1
        tok = strtok_s(NULL, " ", &saveptr);
2965
1
      }
2966
1
      WLog_Print(rdp->log, WLOG_WARN, "");
2967
1
      WLog_Print(rdp->log, WLOG_WARN, "[%s] build options %s", what, msg);
2968
1
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2969
1
    }
2970
3
  }
2971
3
  free(list);
2972
3
}
2973
2974
#define print_first_line(log, firstLine, what) \
2975
0
  print_first_line_int((log), (firstLine), (what), __FILE__, __func__, __LINE__)
2976
static void print_first_line_int(wLog* log, log_line_t* firstLine, const char* what,
2977
                                 const char* file, const char* fkt, size_t line)
2978
0
{
2979
0
  WINPR_ASSERT(firstLine);
2980
0
  if (!firstLine->fkt)
2981
0
  {
2982
0
    const DWORD level = WLOG_WARN;
2983
0
    if (WLog_IsLevelActive(log, level))
2984
0
    {
2985
0
      WLog_PrintMessage(log, WLOG_MESSAGE_TEXT, level, line, file, fkt,
2986
0
                        "*************************************************");
2987
0
      WLog_PrintMessage(log, WLOG_MESSAGE_TEXT, level, line, file, fkt,
2988
0
                        "[SSL] {%s} build or configuration missing:", what);
2989
0
    }
2990
0
    firstLine->line = line;
2991
0
    firstLine->file = file;
2992
0
    firstLine->fkt = fkt;
2993
0
    firstLine->level = level;
2994
0
  }
2995
0
}
2996
2997
static void print_last_line(wLog* log, const log_line_t* firstLine)
2998
3
{
2999
3
  WINPR_ASSERT(firstLine);
3000
3
  if (firstLine->fkt)
3001
0
  {
3002
0
    if (WLog_IsLevelActive(log, firstLine->level))
3003
0
      WLog_PrintMessage(log, WLOG_MESSAGE_TEXT, firstLine->level, firstLine->line,
3004
0
                        firstLine->file, firstLine->fkt,
3005
0
                        "*************************************************");
3006
0
  }
3007
3
}
3008
3009
static void log_build_warn_cipher(rdpRdp* rdp, log_line_t* firstLine, WINPR_CIPHER_TYPE md,
3010
                                  const char* what)
3011
5
{
3012
5
  BOOL haveCipher = FALSE;
3013
3014
5
  char key[WINPR_CIPHER_MAX_KEY_LENGTH] = { 0 };
3015
5
  char iv[WINPR_CIPHER_MAX_IV_LENGTH] = { 0 };
3016
3017
  /* RC4 only exists in the compatibility functions winpr_RC4_*
3018
   * winpr_Cipher_* does not support that. */
3019
5
  if (md == WINPR_CIPHER_ARC4_128)
3020
1
  {
3021
1
    WINPR_RC4_CTX* enc = winpr_RC4_New(key, sizeof(key));
3022
1
    haveCipher = enc != NULL;
3023
1
    winpr_RC4_Free(enc);
3024
1
  }
3025
4
  else
3026
4
  {
3027
4
    WINPR_CIPHER_CTX* enc =
3028
4
        winpr_Cipher_NewEx(md, WINPR_ENCRYPT, key, sizeof(key), iv, sizeof(iv));
3029
4
    WINPR_CIPHER_CTX* dec =
3030
4
        winpr_Cipher_NewEx(md, WINPR_DECRYPT, key, sizeof(key), iv, sizeof(iv));
3031
4
    if (enc && dec)
3032
4
      haveCipher = TRUE;
3033
3034
4
    winpr_Cipher_Free(enc);
3035
4
    winpr_Cipher_Free(dec);
3036
4
  }
3037
3038
5
  if (!haveCipher)
3039
0
  {
3040
0
    print_first_line(rdp->log, firstLine, "Cipher");
3041
0
    WLog_Print(rdp->log, WLOG_WARN, "* %s: %s", winpr_cipher_type_to_string(md), what);
3042
0
  }
3043
5
}
3044
3045
static void log_build_warn_hmac(rdpRdp* rdp, log_line_t* firstLine, WINPR_MD_TYPE md,
3046
                                const char* what)
3047
2
{
3048
2
  BOOL haveHmacX = FALSE;
3049
2
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
3050
2
  if (hmac)
3051
2
  {
3052
    /* We need some key length, but there is no real limit here.
3053
     * just take the cipher maximum key length as we already have that available.
3054
     */
3055
2
    char key[WINPR_CIPHER_MAX_KEY_LENGTH] = { 0 };
3056
2
    haveHmacX = winpr_HMAC_Init(hmac, md, key, sizeof(key));
3057
2
  }
3058
2
  winpr_HMAC_Free(hmac);
3059
3060
2
  if (!haveHmacX)
3061
0
  {
3062
0
    print_first_line(rdp->log, firstLine, "HMAC");
3063
0
    WLog_Print(rdp->log, WLOG_WARN, " * %s: %s", winpr_md_type_to_string(md), what);
3064
0
  }
3065
2
}
3066
3067
static void log_build_warn_hash(rdpRdp* rdp, log_line_t* firstLine, WINPR_MD_TYPE md,
3068
                                const char* what)
3069
4
{
3070
4
  BOOL haveDigestX = FALSE;
3071
3072
4
  WINPR_DIGEST_CTX* digest = winpr_Digest_New();
3073
4
  if (digest)
3074
4
    haveDigestX = winpr_Digest_Init(digest, md);
3075
4
  winpr_Digest_Free(digest);
3076
3077
4
  if (!haveDigestX)
3078
0
  {
3079
0
    print_first_line(rdp->log, firstLine, "Digest");
3080
0
    WLog_Print(rdp->log, WLOG_WARN, " * %s: %s", winpr_md_type_to_string(md), what);
3081
0
  }
3082
4
}
3083
3084
static void log_build_warn_ssl(rdpRdp* rdp)
3085
1
{
3086
1
  WINPR_ASSERT(rdp);
3087
3088
1
  log_line_t firstHashLine = { 0 };
3089
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_MD4, "NTLM support not available");
3090
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_MD5,
3091
1
                      "NTLM, assistance files with encrypted passwords, autoreconnect cookies, "
3092
1
                      "licensing and RDP security will not work");
3093
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_SHA1,
3094
1
                      "assistance files with encrypted passwords, Kerberos, Smartcard Logon, RDP "
3095
1
                      "security support not available");
3096
1
  log_build_warn_hash(
3097
1
      rdp, &firstHashLine, WINPR_MD_SHA256,
3098
1
      "file clipboard, AAD gateway, NLA security and certificates might not work");
3099
1
  print_last_line(rdp->log, &firstHashLine);
3100
3101
1
  log_line_t firstHmacLine = { 0 };
3102
1
  log_build_warn_hmac(rdp, &firstHmacLine, WINPR_MD_MD5, "Autoreconnect cookie not supported");
3103
1
  log_build_warn_hmac(rdp, &firstHmacLine, WINPR_MD_SHA1, "RDP security not supported");
3104
1
  print_last_line(rdp->log, &firstHmacLine);
3105
3106
1
  log_line_t firstCipherLine = { 0 };
3107
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_ARC4_128,
3108
1
                        "assistance files with encrypted passwords, NTLM, RDP licensing and RDP "
3109
1
                        "security will not work");
3110
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_DES_EDE3_CBC,
3111
1
                        "RDP security FIPS mode will not work");
3112
1
  log_build_warn_cipher(
3113
1
      rdp, &firstCipherLine, WINPR_CIPHER_AES_128_CBC,
3114
1
      "assistance file encrypted LHTicket will not work and ARM gateway might not");
3115
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_AES_192_CBC,
3116
1
                        "ARM gateway might not work");
3117
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_AES_256_CBC,
3118
1
                        "ARM gateway might not work");
3119
1
  print_last_line(rdp->log, &firstCipherLine);
3120
1
}
3121
3122
void rdp_log_build_warnings(rdpRdp* rdp)
3123
8.96k
{
3124
8.96k
  static unsigned count = 0;
3125
3126
8.96k
  WINPR_ASSERT(rdp);
3127
  /* Since this function is called in context creation routines stop logging
3128
   * this issue repeatedly. This is required for proxy, which would otherwise
3129
   * spam the log with these. */
3130
8.96k
  if (count > 0)
3131
8.95k
    return;
3132
1
  count++;
3133
1
  log_build_warn(rdp, "experimental", "might crash the application", option_is_experimental);
3134
1
  log_build_warn(rdp, "debug", "might leak sensitive information (credentials, ...)",
3135
1
                 option_is_debug);
3136
1
  log_build_warn(rdp, "runtime-check", "might slow down the application",
3137
1
                 option_is_runtime_checks);
3138
1
  log_build_warn_ssl(rdp);
3139
1
}
3140
3141
size_t rdp_get_event_handles(rdpRdp* rdp, HANDLE* handles, uint32_t count)
3142
0
{
3143
0
  size_t nCount = transport_get_event_handles(rdp->transport, handles, count);
3144
3145
0
  if (nCount == 0)
3146
0
    return 0;
3147
3148
0
  if (count < nCount + 2UL)
3149
0
    return 0;
3150
3151
0
  handles[nCount++] = utils_get_abort_event(rdp);
3152
0
  handles[nCount++] = freerdp_timer_get_event(rdp->timer);
3153
0
  return nCount;
3154
0
}