Coverage Report

Created: 2025-07-01 06:46

/src/FreeRDP/libfreerdp/core/gcc.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * T.124 Generic Conference Control (GCC)
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2014 Norbert Federa <norbert.federa@thincast.com>
7
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
8
 * Copyright 2023 Armin Novak <anovak@thincast.com>
9
 * Copyright 2023 Thincast Technologies GmbH
10
 *
11
 * Licensed under the Apache License, Version 2.0 (the "License");
12
 * you may not use this file except in compliance with the License.
13
 * You may obtain a copy of the License at
14
 *
15
 *     http://www.apache.org/licenses/LICENSE-2.0
16
 *
17
 * Unless required by applicable law or agreed to in writing, software
18
 * distributed under the License is distributed on an "AS IS" BASIS,
19
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20
 * See the License for the specific language governing permissions and
21
 * limitations under the License.
22
 */
23
24
#include <freerdp/config.h>
25
26
#include "settings.h"
27
28
#include <winpr/crt.h>
29
#include <winpr/crypto.h>
30
#include <winpr/assert.h>
31
#include <winpr/cast.h>
32
33
#include <freerdp/log.h>
34
#include <freerdp/utils/string.h>
35
#include <freerdp/crypto/certificate.h>
36
37
#include "utils.h"
38
#include "gcc.h"
39
#include "nego.h"
40
41
#include "../crypto/certificate.h"
42
43
typedef enum
44
{
45
  HIGH_COLOR_4BPP = 0x04,
46
  HIGH_COLOR_8BPP = 0x08,
47
  HIGH_COLOR_15BPP = 0x0F,
48
  HIGH_COLOR_16BPP = 0x10,
49
  HIGH_COLOR_24BPP = 0x18,
50
} HIGH_COLOR_DEPTH;
51
52
static const char* HighColorToString(HIGH_COLOR_DEPTH color)
53
0
{
54
0
  switch (color)
55
0
  {
56
0
    case HIGH_COLOR_4BPP:
57
0
      return "HIGH_COLOR_4BPP";
58
0
    case HIGH_COLOR_8BPP:
59
0
      return "HIGH_COLOR_8BPP";
60
0
    case HIGH_COLOR_15BPP:
61
0
      return "HIGH_COLOR_15BPP";
62
0
    case HIGH_COLOR_16BPP:
63
0
      return "HIGH_COLOR_16BPP";
64
0
    case HIGH_COLOR_24BPP:
65
0
      return "HIGH_COLOR_24BPP";
66
0
    default:
67
0
      return "HIGH_COLOR_UNKNOWN";
68
0
  }
69
0
}
70
71
static HIGH_COLOR_DEPTH ColorDepthToHighColor(UINT32 bpp)
72
0
{
73
0
  switch (bpp)
74
0
  {
75
0
    case 4:
76
0
      return HIGH_COLOR_4BPP;
77
0
    case 8:
78
0
      return HIGH_COLOR_8BPP;
79
0
    case 15:
80
0
      return HIGH_COLOR_15BPP;
81
0
    case 16:
82
0
      return HIGH_COLOR_16BPP;
83
0
    default:
84
0
      return HIGH_COLOR_24BPP;
85
0
  }
86
0
}
87
88
static char* gcc_block_type_string(UINT16 type, char* buffer, size_t size);
89
static BOOL gcc_read_client_cluster_data(wStream* s, rdpMcs* mcs);
90
static BOOL gcc_read_client_core_data(wStream* s, rdpMcs* mcs);
91
static BOOL gcc_read_client_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length);
92
static BOOL gcc_read_server_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length);
93
static BOOL gcc_read_user_data_header(wLog* log, wStream* s, UINT16* type, UINT16* length);
94
static BOOL gcc_write_user_data_header(wStream* s, UINT16 type, UINT16 length);
95
96
static BOOL gcc_write_client_core_data(wStream* s, const rdpMcs* mcs);
97
static BOOL gcc_read_server_core_data(wStream* s, rdpMcs* mcs);
98
static BOOL gcc_write_server_core_data(wStream* s, rdpMcs* mcs);
99
static BOOL gcc_read_client_security_data(wStream* s, rdpMcs* mcs);
100
static BOOL gcc_write_client_security_data(wStream* s, const rdpMcs* mcs);
101
static BOOL gcc_read_server_security_data(wStream* s, rdpMcs* mcs);
102
static BOOL gcc_write_server_security_data(wStream* s, rdpMcs* mcs);
103
static BOOL gcc_read_client_network_data(wStream* s, rdpMcs* mcs);
104
static BOOL gcc_write_client_network_data(wStream* s, const rdpMcs* mcs);
105
static BOOL gcc_read_server_network_data(wStream* s, rdpMcs* mcs);
106
static BOOL gcc_write_server_network_data(wStream* s, const rdpMcs* mcs);
107
static BOOL gcc_write_client_cluster_data(wStream* s, const rdpMcs* mcs);
108
static BOOL gcc_read_client_monitor_data(wStream* s, rdpMcs* mcs);
109
static BOOL gcc_write_client_monitor_data(wStream* s, const rdpMcs* mcs);
110
static BOOL gcc_read_client_monitor_extended_data(wStream* s, rdpMcs* mcs);
111
static BOOL gcc_write_client_monitor_extended_data(wStream* s, const rdpMcs* mcs);
112
static BOOL gcc_read_client_message_channel_data(wStream* s, rdpMcs* mcs);
113
static BOOL gcc_write_client_message_channel_data(wStream* s, const rdpMcs* mcs);
114
static BOOL gcc_read_server_message_channel_data(wStream* s, rdpMcs* mcs);
115
static BOOL gcc_write_server_message_channel_data(wStream* s, const rdpMcs* mcs);
116
static BOOL gcc_read_client_multitransport_channel_data(wStream* s, rdpMcs* mcs);
117
static BOOL gcc_write_client_multitransport_channel_data(wStream* s, const rdpMcs* mcs);
118
static BOOL gcc_read_server_multitransport_channel_data(wStream* s, rdpMcs* mcs);
119
static BOOL gcc_write_server_multitransport_channel_data(wStream* s, const rdpMcs* mcs);
120
121
static rdpSettings* mcs_get_settings(rdpMcs* mcs)
122
0
{
123
0
  WINPR_ASSERT(mcs);
124
125
0
  rdpContext* context = transport_get_context(mcs->transport);
126
0
  WINPR_ASSERT(context);
127
128
0
  return context->settings;
129
0
}
130
131
static const rdpSettings* mcs_get_const_settings(const rdpMcs* mcs)
132
0
{
133
0
  WINPR_ASSERT(mcs);
134
135
0
  const rdpContext* context = transport_get_context(mcs->transport);
136
0
  WINPR_ASSERT(context);
137
138
0
  return context->settings;
139
0
}
140
141
static char* rdp_early_server_caps_string(UINT32 flags, char* buffer, size_t size)
142
0
{
143
0
  char msg[32] = { 0 };
144
0
  const UINT32 mask = RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1 | RNS_UD_SC_DYNAMIC_DST_SUPPORTED |
145
0
                      RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2 | RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED;
146
0
  const UINT32 unknown = flags & (~mask);
147
148
0
  if (flags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1)
149
0
    winpr_str_append("RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1", buffer, size, "|");
150
0
  if (flags & RNS_UD_SC_DYNAMIC_DST_SUPPORTED)
151
0
    winpr_str_append("RNS_UD_SC_DYNAMIC_DST_SUPPORTED", buffer, size, "|");
152
0
  if (flags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2)
153
0
    winpr_str_append("RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2", buffer, size, "|");
154
0
  if (flags & RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED)
155
0
    winpr_str_append("RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED", buffer, size, "|");
156
157
0
  if (unknown != 0)
158
0
  {
159
0
    (void)_snprintf(msg, sizeof(msg), "RNS_UD_SC_UNKNOWN[0x%08" PRIx32 "]", unknown);
160
0
    winpr_str_append(msg, buffer, size, "|");
161
0
  }
162
0
  (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", flags);
163
0
  winpr_str_append(msg, buffer, size, "|");
164
0
  return buffer;
165
0
}
166
167
static const char* rdp_early_client_caps_string(UINT32 flags, char* buffer, size_t size)
168
0
{
169
0
  char msg[32] = { 0 };
170
0
  const UINT32 mask = RNS_UD_CS_SUPPORT_ERRINFO_PDU | RNS_UD_CS_WANT_32BPP_SESSION |
171
0
                      RNS_UD_CS_SUPPORT_STATUSINFO_PDU | RNS_UD_CS_STRONG_ASYMMETRIC_KEYS |
172
0
                      RNS_UD_CS_RELATIVE_MOUSE_INPUT | RNS_UD_CS_VALID_CONNECTION_TYPE |
173
0
                      RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU |
174
0
                      RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT |
175
0
                      RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL | RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE |
176
0
                      RNS_UD_CS_SUPPORT_HEARTBEAT_PDU | RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN;
177
0
  const UINT32 unknown = flags & (~mask);
178
179
0
  if (flags & RNS_UD_CS_SUPPORT_ERRINFO_PDU)
180
0
    winpr_str_append("RNS_UD_CS_SUPPORT_ERRINFO_PDU", buffer, size, "|");
181
0
  if (flags & RNS_UD_CS_WANT_32BPP_SESSION)
182
0
    winpr_str_append("RNS_UD_CS_WANT_32BPP_SESSION", buffer, size, "|");
183
0
  if (flags & RNS_UD_CS_SUPPORT_STATUSINFO_PDU)
184
0
    winpr_str_append("RNS_UD_CS_SUPPORT_STATUSINFO_PDU", buffer, size, "|");
185
0
  if (flags & RNS_UD_CS_STRONG_ASYMMETRIC_KEYS)
186
0
    winpr_str_append("RNS_UD_CS_STRONG_ASYMMETRIC_KEYS", buffer, size, "|");
187
0
  if (flags & RNS_UD_CS_RELATIVE_MOUSE_INPUT)
188
0
    winpr_str_append("RNS_UD_CS_RELATIVE_MOUSE_INPUT", buffer, size, "|");
189
0
  if (flags & RNS_UD_CS_VALID_CONNECTION_TYPE)
190
0
    winpr_str_append("RNS_UD_CS_VALID_CONNECTION_TYPE", buffer, size, "|");
191
0
  if (flags & RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU)
192
0
    winpr_str_append("RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU", buffer, size, "|");
193
0
  if (flags & RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT)
194
0
    winpr_str_append("RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT", buffer, size, "|");
195
0
  if (flags & RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL)
196
0
    winpr_str_append("RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL", buffer, size, "|");
197
0
  if (flags & RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE)
198
0
    winpr_str_append("RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE", buffer, size, "|");
199
0
  if (flags & RNS_UD_CS_SUPPORT_HEARTBEAT_PDU)
200
0
    winpr_str_append("RNS_UD_CS_SUPPORT_HEARTBEAT_PDU", buffer, size, "|");
201
0
  if (flags & RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN)
202
0
    winpr_str_append("RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN", buffer, size, "|");
203
204
0
  if (unknown != 0)
205
0
  {
206
0
    (void)_snprintf(msg, sizeof(msg), "RNS_UD_CS_UNKNOWN[0x%08" PRIx32 "]", unknown);
207
0
    winpr_str_append(msg, buffer, size, "|");
208
0
  }
209
0
  (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", flags);
210
0
  winpr_str_append(msg, buffer, size, "|");
211
0
  return buffer;
212
0
}
213
214
static DWORD rdp_version_common(wLog* log, DWORD serverVersion, DWORD clientVersion)
215
0
{
216
0
  DWORD version = MIN(serverVersion, clientVersion);
217
218
0
  switch (version)
219
0
  {
220
0
    case RDP_VERSION_4:
221
0
    case RDP_VERSION_5_PLUS:
222
0
    case RDP_VERSION_10_0:
223
0
    case RDP_VERSION_10_1:
224
0
    case RDP_VERSION_10_2:
225
0
    case RDP_VERSION_10_3:
226
0
    case RDP_VERSION_10_4:
227
0
    case RDP_VERSION_10_5:
228
0
    case RDP_VERSION_10_6:
229
0
    case RDP_VERSION_10_7:
230
0
    case RDP_VERSION_10_8:
231
0
    case RDP_VERSION_10_9:
232
0
    case RDP_VERSION_10_10:
233
0
    case RDP_VERSION_10_11:
234
0
    case RDP_VERSION_10_12:
235
0
      return version;
236
237
0
    default:
238
0
      WLog_Print(log, WLOG_ERROR,
239
0
                 "Invalid client [%" PRId32 "] and server [%" PRId32 "] versions",
240
0
                 serverVersion, clientVersion);
241
0
      return version;
242
0
  }
243
0
}
244
245
/**
246
 * T.124 GCC is defined in:
247
 *
248
 * http://www.itu.int/rec/T-REC-T.124-199802-S/en
249
 * ITU-T T.124 (02/98): Generic Conference Control
250
 */
251
252
/**
253
 * ConnectData ::= SEQUENCE
254
 * {
255
 *  t124Identifier  Key,
256
 *  connectPDU  OCTET_STRING
257
 * }
258
 *
259
 * Key ::= CHOICE
260
 * {
261
 *  object        OBJECT_IDENTIFIER,
262
 *  h221NonStandard     H221NonStandardIdentifier
263
 * }
264
 *
265
 * ConnectGCCPDU ::= CHOICE
266
 * {
267
 *  conferenceCreateRequest   ConferenceCreateRequest,
268
 *  conferenceCreateResponse  ConferenceCreateResponse,
269
 *  conferenceQueryRequest    ConferenceQueryRequest,
270
 *  conferenceQueryResponse   ConferenceQueryResponse,
271
 *  conferenceJoinRequest   ConferenceJoinRequest,
272
 *  conferenceJoinResponse    ConferenceJoinResponse,
273
 *  conferenceInviteRequest   ConferenceInviteRequest,
274
 *  conferenceInviteResponse  ConferenceInviteResponse,
275
 *  ...
276
 * }
277
 *
278
 * ConferenceCreateRequest ::= SEQUENCE
279
 * {
280
 *  conferenceName      ConferenceName,
281
 *  convenerPassword    Password OPTIONAL,
282
 *  password      Password OPTIONAL,
283
 *  lockedConference    BOOLEAN,
284
 *  listedConference    BOOLEAN,
285
 *  conductibleConference   BOOLEAN,
286
 *  terminationMethod   TerminationMethod,
287
 *  conductorPrivileges   SET OF Privilege OPTIONAL,
288
 *  conductedPrivileges   SET OF Privilege OPTIONAL,
289
 *  nonConductedPrivileges    SET OF Privilege OPTIONAL,
290
 *  conferenceDescription   TextString OPTIONAL,
291
 *  callerIdentifier    TextString OPTIONAL,
292
 *  userData      UserData OPTIONAL,
293
 *  ...,
294
 *  conferencePriority    ConferencePriority OPTIONAL,
295
 *  conferenceMode      ConferenceMode OPTIONAL
296
 * }
297
 *
298
 * ConferenceCreateResponse ::= SEQUENCE
299
 * {
300
 *  nodeID        UserID,
301
 *  tag       INTEGER,
302
 *  result        ENUMERATED
303
 *  {
304
 *    success       (0),
305
 *    userRejected      (1),
306
 *    resourcesNotAvailable   (2),
307
 *    rejectedForSymmetryBreaking (3),
308
 *    lockedConferenceNotSupported  (4)
309
 *  },
310
 *  userData      UserData OPTIONAL,
311
 *  ...
312
 * }
313
 *
314
 * ConferenceName ::= SEQUENCE
315
 * {
316
 *  numeric       SimpleNumericString
317
 *  text        SimpleTextString OPTIONAL,
318
 *  ...
319
 * }
320
 *
321
 * SimpleNumericString ::= NumericString (SIZE (1..255)) (FROM ("0123456789"))
322
 *
323
 * UserData ::= SET OF SEQUENCE
324
 * {
325
 *  key       Key,
326
 *  value       OCTET_STRING OPTIONAL
327
 * }
328
 *
329
 * H221NonStandardIdentifier ::= OCTET STRING (SIZE (4..255))
330
 *
331
 * UserID ::= DynamicChannelID
332
 *
333
 * ChannelID ::= INTEGER (1..65535)
334
 * StaticChannelID ::= INTEGER (1..1000)
335
 * DynamicChannelID ::= INTEGER (1001..65535)
336
 *
337
 */
338
339
/*
340
 * OID = 0.0.20.124.0.1
341
 * { itu-t(0) recommendation(0) t(20) t124(124) version(0) 1 }
342
 * v.1 of ITU-T Recommendation T.124 (Feb 1998): "Generic Conference Control"
343
 */
344
static const BYTE t124_02_98_oid[6] = { 0, 0, 20, 124, 0, 1 };
345
346
static const BYTE h221_cs_key[4] = "Duca";
347
static const BYTE h221_sc_key[4] = "McDn";
348
349
/**
350
 * Read a GCC Conference Create Request.
351
 * msdn{cc240836}
352
 *
353
 * @param s stream
354
 * @param mcs The MCS instance
355
 *
356
 * @return \b TRUE for success, \b FALSE otherwise
357
 */
358
359
BOOL gcc_read_conference_create_request(wStream* s, rdpMcs* mcs)
360
0
{
361
0
  UINT16 length = 0;
362
0
  BYTE choice = 0;
363
0
  BYTE number = 0;
364
0
  BYTE selection = 0;
365
366
0
  WINPR_ASSERT(s);
367
0
  WINPR_ASSERT(mcs);
368
  /* ConnectData */
369
0
  if (!per_read_choice(s, &choice))
370
0
    return FALSE;
371
372
0
  if (!per_read_object_identifier(s, t124_02_98_oid))
373
0
    return FALSE;
374
375
  /* ConnectData::connectPDU (OCTET_STRING) */
376
0
  if (!per_read_length(s, &length))
377
0
    return FALSE;
378
379
  /* ConnectGCCPDU */
380
0
  if (!per_read_choice(s, &choice))
381
0
    return FALSE;
382
383
0
  if (!per_read_selection(s, &selection))
384
0
    return FALSE;
385
386
  /* ConferenceCreateRequest::conferenceName */
387
0
  if (!per_read_numeric_string(s, 1)) /* ConferenceName::numeric */
388
0
    return FALSE;
389
390
0
  if (!per_read_padding(s, 1)) /* padding */
391
0
    return FALSE;
392
393
  /* UserData (SET OF SEQUENCE) */
394
0
  if (!per_read_number_of_sets(s, &number) || number != 1) /* one set of UserData */
395
0
    return FALSE;
396
397
0
  if (!per_read_choice(s, &choice) ||
398
0
      choice != 0xC0) /* UserData::value present + select h221NonStandard (1) */
399
0
    return FALSE;
400
401
  /* h221NonStandard */
402
0
  if (!per_read_octet_string(s, h221_cs_key, 4,
403
0
                             4)) /* h221NonStandard, client-to-server H.221 key, "Duca" */
404
0
    return FALSE;
405
406
  /* userData::value (OCTET_STRING) */
407
0
  if (!per_read_length(s, &length))
408
0
    return FALSE;
409
410
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, length))
411
0
    return FALSE;
412
413
0
  if (!gcc_read_client_data_blocks(s, mcs, length))
414
0
    return FALSE;
415
416
0
  return TRUE;
417
0
}
418
419
/**
420
 * Write a GCC Conference Create Request.
421
 * msdn{cc240836}
422
 *
423
 * @param s stream
424
 * @param userData client data blocks
425
 *
426
 * @return \b TRUE for success, \b FALSE otherwise
427
 */
428
429
BOOL gcc_write_conference_create_request(wStream* s, wStream* userData)
430
0
{
431
0
  WINPR_ASSERT(s);
432
0
  WINPR_ASSERT(userData);
433
  /* ConnectData */
434
0
  if (!per_write_choice(s, 0)) /* From Key select object (0) of type OBJECT_IDENTIFIER */
435
0
    return FALSE;
436
0
  if (!per_write_object_identifier(s, t124_02_98_oid)) /* ITU-T T.124 (02/98) OBJECT_IDENTIFIER */
437
0
    return FALSE;
438
  /* ConnectData::connectPDU (OCTET_STRING) */
439
0
  const size_t pos = Stream_GetPosition(userData);
440
0
  WINPR_ASSERT(pos <= UINT16_MAX - 14);
441
0
  if (!per_write_length(s, (UINT16)pos + 14)) /* connectPDU length */
442
0
    return FALSE;
443
  /* ConnectGCCPDU */
444
0
  if (!per_write_choice(s, 0)) /* From ConnectGCCPDU select conferenceCreateRequest (0) of type
445
                                   ConferenceCreateRequest */
446
0
    return FALSE;
447
0
  if (!per_write_selection(s, 0x08)) /* select optional userData from ConferenceCreateRequest */
448
0
    return FALSE;
449
  /* ConferenceCreateRequest::conferenceName */
450
0
  if (!per_write_numeric_string(s, (BYTE*)"1", 1, 1)) /* ConferenceName::numeric */
451
0
    return FALSE;
452
0
  if (!per_write_padding(s, 1)) /* padding */
453
0
    return FALSE;
454
  /* UserData (SET OF SEQUENCE) */
455
0
  if (!per_write_number_of_sets(s, 1)) /* one set of UserData */
456
0
    return FALSE;
457
0
  if (!per_write_choice(s, 0xC0)) /* UserData::value present + select h221NonStandard (1) */
458
0
    return FALSE;
459
  /* h221NonStandard */
460
0
  if (!per_write_octet_string(s, h221_cs_key, 4,
461
0
                              4)) /* h221NonStandard, client-to-server H.221 key, "Duca" */
462
0
    return FALSE;
463
  /* userData::value (OCTET_STRING) */
464
0
  const size_t upos = Stream_GetPosition(userData);
465
0
  WINPR_ASSERT(upos <= UINT16_MAX);
466
0
  return per_write_octet_string(s, Stream_Buffer(userData), (UINT16)upos,
467
0
                                0); /* array of client data blocks */
468
0
}
469
470
BOOL gcc_read_conference_create_response(wStream* s, rdpMcs* mcs)
471
0
{
472
0
  UINT16 length = 0;
473
0
  UINT32 tag = 0;
474
0
  UINT16 nodeID = 0;
475
0
  BYTE result = 0;
476
0
  BYTE choice = 0;
477
0
  BYTE number = 0;
478
0
  WINPR_ASSERT(s);
479
0
  WINPR_ASSERT(mcs);
480
  /* ConnectData */
481
0
  if (!per_read_choice(s, &choice) || !per_read_object_identifier(s, t124_02_98_oid))
482
0
    return FALSE;
483
484
  /* ConnectData::connectPDU (OCTET_STRING) */
485
0
  if (!per_read_length(s, &length))
486
0
    return FALSE;
487
488
  /* ConnectGCCPDU */
489
0
  if (!per_read_choice(s, &choice))
490
0
    return FALSE;
491
492
  /* ConferenceCreateResponse::nodeID (UserID) */
493
0
  if (!per_read_integer16(s, &nodeID, 1001))
494
0
    return FALSE;
495
496
  /* ConferenceCreateResponse::tag (INTEGER) */
497
0
  if (!per_read_integer(s, &tag))
498
0
    return FALSE;
499
500
  /* ConferenceCreateResponse::result (ENUMERATED) */
501
0
  if (!per_read_enumerated(s, &result, MCS_Result_enum_length))
502
0
    return FALSE;
503
504
  /* number of UserData sets */
505
0
  if (!per_read_number_of_sets(s, &number))
506
0
    return FALSE;
507
508
  /* UserData::value present + select h221NonStandard (1) */
509
0
  if (!per_read_choice(s, &choice))
510
0
    return FALSE;
511
512
  /* h221NonStandard */
513
0
  if (!per_read_octet_string(s, h221_sc_key, 4,
514
0
                             4)) /* h221NonStandard, server-to-client H.221 key, "McDn" */
515
0
    return FALSE;
516
517
  /* userData (OCTET_STRING) */
518
0
  if (!per_read_length(s, &length))
519
0
    return FALSE;
520
521
0
  if (!gcc_read_server_data_blocks(s, mcs, length))
522
0
  {
523
0
    WLog_Print(mcs->log, WLOG_ERROR,
524
0
               "gcc_read_conference_create_response: gcc_read_server_data_blocks failed");
525
0
    return FALSE;
526
0
  }
527
528
0
  return TRUE;
529
0
}
530
531
BOOL gcc_write_conference_create_response(wStream* s, wStream* userData)
532
0
{
533
0
  WINPR_ASSERT(s);
534
0
  WINPR_ASSERT(userData);
535
  /* ConnectData */
536
0
  if (!per_write_choice(s, 0))
537
0
    return FALSE;
538
0
  if (!per_write_object_identifier(s, t124_02_98_oid))
539
0
    return FALSE;
540
  /* ConnectData::connectPDU (OCTET_STRING) */
541
  /* This length MUST be ignored by the client according to [MS-RDPBCGR] */
542
0
  if (!per_write_length(s, 0x2A))
543
0
    return FALSE;
544
  /* ConnectGCCPDU */
545
0
  if (!per_write_choice(s, 0x14))
546
0
    return FALSE;
547
  /* ConferenceCreateResponse::nodeID (UserID) */
548
0
  if (!per_write_integer16(s, 0x79F3, 1001))
549
0
    return FALSE;
550
  /* ConferenceCreateResponse::tag (INTEGER) */
551
0
  if (!per_write_integer(s, 1))
552
0
    return FALSE;
553
  /* ConferenceCreateResponse::result (ENUMERATED) */
554
0
  if (!per_write_enumerated(s, 0, MCS_Result_enum_length))
555
0
    return FALSE;
556
  /* number of UserData sets */
557
0
  if (!per_write_number_of_sets(s, 1))
558
0
    return FALSE;
559
  /* UserData::value present + select h221NonStandard (1) */
560
0
  if (!per_write_choice(s, 0xC0))
561
0
    return FALSE;
562
  /* h221NonStandard */
563
0
  if (!per_write_octet_string(s, h221_sc_key, 4,
564
0
                              4)) /* h221NonStandard, server-to-client H.221 key, "McDn" */
565
0
    return FALSE;
566
  /* userData (OCTET_STRING) */
567
0
  const size_t pos = Stream_GetPosition(userData);
568
0
  WINPR_ASSERT(pos <= UINT16_MAX);
569
0
  return per_write_octet_string(s, Stream_Buffer(userData), (UINT16)pos,
570
0
                                0); /* array of server data blocks */
571
0
}
572
573
static BOOL gcc_read_client_unused1_data(wStream* s)
574
0
{
575
0
  return Stream_SafeSeek(s, 2);
576
0
}
577
578
BOOL gcc_read_client_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length)
579
0
{
580
0
  WINPR_ASSERT(s);
581
0
  WINPR_ASSERT(mcs);
582
583
0
  BOOL gotMultitransport = FALSE;
584
585
0
  while (length > 0)
586
0
  {
587
0
    wStream sbuffer = { 0 };
588
0
    UINT16 type = 0;
589
0
    UINT16 blockLength = 0;
590
591
0
    if (!gcc_read_user_data_header(mcs->log, s, &type, &blockLength))
592
0
      return FALSE;
593
594
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, (size_t)(blockLength - 4)))
595
0
      return FALSE;
596
597
0
    wStream* sub = Stream_StaticConstInit(&sbuffer, Stream_Pointer(s), blockLength - 4);
598
0
    WINPR_ASSERT(sub);
599
600
0
    Stream_Seek(s, blockLength - 4);
601
602
0
    {
603
0
      char buffer[64] = { 0 };
604
0
      WLog_Print(mcs->log, WLOG_TRACE, "Processing block %s",
605
0
                 gcc_block_type_string(type, buffer, sizeof(buffer)));
606
0
    }
607
0
    switch (type)
608
0
    {
609
0
      case CS_CORE:
610
0
        if (!gcc_read_client_core_data(sub, mcs))
611
0
          return FALSE;
612
613
0
        break;
614
615
0
      case CS_SECURITY:
616
0
        if (!gcc_read_client_security_data(sub, mcs))
617
0
          return FALSE;
618
619
0
        break;
620
621
0
      case CS_NET:
622
0
        if (!gcc_read_client_network_data(sub, mcs))
623
0
          return FALSE;
624
625
0
        break;
626
627
0
      case CS_CLUSTER:
628
0
        if (!gcc_read_client_cluster_data(sub, mcs))
629
0
          return FALSE;
630
631
0
        break;
632
633
0
      case CS_MONITOR:
634
0
        if (!gcc_read_client_monitor_data(sub, mcs))
635
0
          return FALSE;
636
637
0
        break;
638
639
0
      case CS_MCS_MSGCHANNEL:
640
0
        if (!gcc_read_client_message_channel_data(sub, mcs))
641
0
          return FALSE;
642
643
0
        break;
644
645
0
      case CS_MONITOR_EX:
646
0
        if (!gcc_read_client_monitor_extended_data(sub, mcs))
647
0
          return FALSE;
648
649
0
        break;
650
651
0
      case CS_UNUSED1:
652
0
        if (!gcc_read_client_unused1_data(sub))
653
0
          return FALSE;
654
655
0
        break;
656
657
0
      case 0xC009:
658
0
      case CS_MULTITRANSPORT:
659
0
        gotMultitransport = TRUE;
660
0
        if (!gcc_read_client_multitransport_channel_data(sub, mcs))
661
0
          return FALSE;
662
663
0
        break;
664
665
0
      default:
666
0
        WLog_Print(mcs->log, WLOG_ERROR, "Unknown GCC client data block: 0x%04" PRIX16 "",
667
0
                   type);
668
0
        winpr_HexLogDump(mcs->log, WLOG_TRACE, Stream_Pointer(sub),
669
0
                         Stream_GetRemainingLength(sub));
670
0
        break;
671
0
    }
672
673
0
    const size_t rem = Stream_GetRemainingLength(sub);
674
0
    if (rem > 0)
675
0
    {
676
0
      char buffer[128] = { 0 };
677
0
      const size_t total = Stream_Length(sub);
678
0
      WLog_Print(mcs->log, WLOG_ERROR,
679
0
                 "Error parsing GCC client data block %s: Actual Offset: %" PRIuz
680
0
                 " Expected Offset: %" PRIuz,
681
0
                 gcc_block_type_string(type, buffer, sizeof(buffer)), total - rem, total);
682
0
    }
683
684
0
    if (blockLength > length)
685
0
    {
686
0
      char buffer[128] = { 0 };
687
0
      WLog_Print(mcs->log, WLOG_ERROR,
688
0
                 "Error parsing GCC client data block %s: got blockLength 0x%04" PRIx16
689
0
                 ", but only 0x%04" PRIx16 "remaining",
690
0
                 gcc_block_type_string(type, buffer, sizeof(buffer)), blockLength, length);
691
0
      length = 0;
692
0
    }
693
0
    else
694
0
      length -= blockLength;
695
0
  }
696
697
0
  if (!gotMultitransport)
698
0
  {
699
0
    rdpSettings* settings = mcs_get_settings(mcs);
700
0
    if (!freerdp_settings_set_bool(settings, FreeRDP_SupportMultitransport, FALSE))
701
0
      return FALSE;
702
0
    if (!freerdp_settings_set_uint32(settings, FreeRDP_MultitransportFlags, 0))
703
0
      return FALSE;
704
0
  }
705
0
  return TRUE;
706
0
}
707
708
BOOL gcc_write_client_data_blocks(wStream* s, const rdpMcs* mcs)
709
0
{
710
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
711
712
0
  WINPR_ASSERT(s);
713
0
  WINPR_ASSERT(settings);
714
715
0
  if (!gcc_write_client_core_data(s, mcs) || !gcc_write_client_cluster_data(s, mcs) ||
716
0
      !gcc_write_client_security_data(s, mcs) || !gcc_write_client_network_data(s, mcs))
717
0
    return FALSE;
718
719
  /* extended client data supported */
720
721
0
  if (settings->NegotiationFlags & EXTENDED_CLIENT_DATA_SUPPORTED)
722
0
  {
723
0
    if (settings->UseMultimon && !settings->SpanMonitors)
724
0
    {
725
0
      if (!gcc_write_client_monitor_data(s, mcs) ||
726
0
          !gcc_write_client_monitor_extended_data(s, mcs))
727
0
        return FALSE;
728
0
    }
729
730
0
    if (!gcc_write_client_message_channel_data(s, mcs) ||
731
0
        !gcc_write_client_multitransport_channel_data(s, mcs))
732
0
      return FALSE;
733
0
  }
734
0
  else
735
0
  {
736
0
    if (settings->UseMultimon && !settings->SpanMonitors)
737
0
    {
738
0
      WLog_Print(mcs->log, WLOG_ERROR,
739
0
                 "WARNING: true multi monitor support was not advertised by server!");
740
741
0
      if (settings->ForceMultimon)
742
0
      {
743
0
        WLog_Print(mcs->log, WLOG_ERROR,
744
0
                   "Sending multi monitor information anyway (may break connectivity!)");
745
0
        if (!gcc_write_client_monitor_data(s, mcs) ||
746
0
            !gcc_write_client_monitor_extended_data(s, mcs))
747
0
          return FALSE;
748
0
      }
749
0
      else
750
0
      {
751
0
        WLog_Print(mcs->log, WLOG_ERROR,
752
0
                   "Use /multimon:force to force sending multi monitor information");
753
0
      }
754
0
    }
755
0
  }
756
0
  return TRUE;
757
0
}
758
759
char* gcc_block_type_string(UINT16 type, char* buffer, size_t size)
760
0
{
761
0
  switch (type)
762
0
  {
763
0
    case CS_CORE:
764
0
      (void)_snprintf(buffer, size, "CS_CORE [0x%04" PRIx16 "]", type);
765
0
      break;
766
0
    case CS_SECURITY:
767
0
      (void)_snprintf(buffer, size, "CS_SECURITY [0x%04" PRIx16 "]", type);
768
0
      break;
769
0
    case CS_NET:
770
0
      (void)_snprintf(buffer, size, "CS_NET [0x%04" PRIx16 "]", type);
771
0
      break;
772
0
    case CS_CLUSTER:
773
0
      (void)_snprintf(buffer, size, "CS_CLUSTER [0x%04" PRIx16 "]", type);
774
0
      break;
775
0
    case CS_MONITOR:
776
0
      (void)_snprintf(buffer, size, "CS_MONITOR [0x%04" PRIx16 "]", type);
777
0
      break;
778
0
    case CS_MCS_MSGCHANNEL:
779
0
      (void)_snprintf(buffer, size, "CS_MONITOR [0x%04" PRIx16 "]", type);
780
0
      break;
781
0
    case CS_MONITOR_EX:
782
0
      (void)_snprintf(buffer, size, "CS_MONITOR_EX [0x%04" PRIx16 "]", type);
783
0
      break;
784
0
    case CS_UNUSED1:
785
0
      (void)_snprintf(buffer, size, "CS_UNUSED1 [0x%04" PRIx16 "]", type);
786
0
      break;
787
0
    case CS_MULTITRANSPORT:
788
0
      (void)_snprintf(buffer, size, "CS_MONITOR_EX [0x%04" PRIx16 "]", type);
789
0
      break;
790
0
    case SC_CORE:
791
0
      (void)_snprintf(buffer, size, "SC_CORE [0x%04" PRIx16 "]", type);
792
0
      break;
793
0
    case SC_SECURITY:
794
0
      (void)_snprintf(buffer, size, "SC_SECURITY [0x%04" PRIx16 "]", type);
795
0
      break;
796
0
    case SC_NET:
797
0
      (void)_snprintf(buffer, size, "SC_NET [0x%04" PRIx16 "]", type);
798
0
      break;
799
0
    case SC_MCS_MSGCHANNEL:
800
0
      (void)_snprintf(buffer, size, "SC_MCS_MSGCHANNEL [0x%04" PRIx16 "]", type);
801
0
      break;
802
0
    case SC_MULTITRANSPORT:
803
0
      (void)_snprintf(buffer, size, "SC_MULTITRANSPORT [0x%04" PRIx16 "]", type);
804
0
      break;
805
0
    default:
806
0
      (void)_snprintf(buffer, size, "UNKNOWN [0x%04" PRIx16 "]", type);
807
0
      break;
808
0
  }
809
0
  return buffer;
810
0
}
811
812
BOOL gcc_read_server_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length)
813
0
{
814
0
  UINT16 type = 0;
815
0
  UINT16 offset = 0;
816
0
  UINT16 blockLength = 0;
817
0
  BYTE* holdp = NULL;
818
819
0
  WINPR_ASSERT(s);
820
0
  WINPR_ASSERT(mcs);
821
822
0
  while (offset < length)
823
0
  {
824
0
    char buffer[64] = { 0 };
825
0
    size_t rest = 0;
826
0
    wStream subbuffer;
827
0
    wStream* sub = NULL;
828
829
0
    if (!gcc_read_user_data_header(mcs->log, s, &type, &blockLength))
830
0
    {
831
0
      WLog_Print(mcs->log, WLOG_ERROR,
832
0
                 "gcc_read_server_data_blocks: gcc_read_user_data_header failed");
833
0
      return FALSE;
834
0
    }
835
0
    holdp = Stream_Pointer(s);
836
0
    sub = Stream_StaticInit(&subbuffer, holdp, blockLength - 4);
837
0
    if (!Stream_SafeSeek(s, blockLength - 4))
838
0
    {
839
0
      WLog_Print(mcs->log, WLOG_ERROR, "gcc_read_server_data_blocks: stream too short");
840
0
      return FALSE;
841
0
    }
842
0
    offset += blockLength;
843
844
0
    switch (type)
845
0
    {
846
0
      case SC_CORE:
847
0
        if (!gcc_read_server_core_data(sub, mcs))
848
0
        {
849
0
          WLog_Print(mcs->log, WLOG_ERROR,
850
0
                     "gcc_read_server_data_blocks: gcc_read_server_core_data failed");
851
0
          return FALSE;
852
0
        }
853
854
0
        break;
855
856
0
      case SC_SECURITY:
857
0
        if (!gcc_read_server_security_data(sub, mcs))
858
0
          return FALSE;
859
0
        break;
860
861
0
      case SC_NET:
862
0
        if (!gcc_read_server_network_data(sub, mcs))
863
0
        {
864
0
          WLog_Print(mcs->log, WLOG_ERROR,
865
0
                     "gcc_read_server_data_blocks: gcc_read_server_network_data failed");
866
0
          return FALSE;
867
0
        }
868
869
0
        break;
870
871
0
      case SC_MCS_MSGCHANNEL:
872
0
        if (!gcc_read_server_message_channel_data(sub, mcs))
873
0
        {
874
0
          WLog_Print(
875
0
              mcs->log, WLOG_ERROR,
876
0
              "gcc_read_server_data_blocks: gcc_read_server_message_channel_data failed");
877
0
          return FALSE;
878
0
        }
879
880
0
        break;
881
882
0
      case SC_MULTITRANSPORT:
883
0
        if (!gcc_read_server_multitransport_channel_data(sub, mcs))
884
0
        {
885
0
          WLog_Print(mcs->log, WLOG_ERROR,
886
0
                     "gcc_read_server_data_blocks: "
887
0
                     "gcc_read_server_multitransport_channel_data failed");
888
0
          return FALSE;
889
0
        }
890
891
0
        break;
892
893
0
      default:
894
0
        WLog_Print(mcs->log, WLOG_ERROR, "gcc_read_server_data_blocks: ignoring type=%s",
895
0
                   gcc_block_type_string(type, buffer, sizeof(buffer)));
896
0
        winpr_HexLogDump(mcs->log, WLOG_TRACE, Stream_Pointer(sub),
897
0
                         Stream_GetRemainingLength(sub));
898
0
        break;
899
0
    }
900
901
0
    rest = Stream_GetRemainingLength(sub);
902
0
    if (rest > 0)
903
0
    {
904
0
      WLog_Print(mcs->log, WLOG_WARN,
905
0
                 "gcc_read_server_data_blocks: ignoring %" PRIuz " bytes with type=%s", rest,
906
0
                 gcc_block_type_string(type, buffer, sizeof(buffer)));
907
0
    }
908
0
  }
909
910
0
  return TRUE;
911
0
}
912
913
BOOL gcc_write_server_data_blocks(wStream* s, rdpMcs* mcs)
914
0
{
915
0
  WINPR_ASSERT(s);
916
0
  WINPR_ASSERT(mcs);
917
918
0
  if (!gcc_write_server_core_data(s, mcs) ||          /* serverCoreData */
919
0
      !gcc_write_server_network_data(s, mcs) ||       /* serverNetworkData */
920
0
      !gcc_write_server_security_data(s, mcs) ||      /* serverSecurityData */
921
0
      !gcc_write_server_message_channel_data(s, mcs)) /* serverMessageChannelData */
922
0
    return FALSE;
923
924
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
925
0
  WINPR_ASSERT(settings);
926
927
0
  if (settings->SupportMultitransport && (settings->MultitransportFlags != 0))
928
    /* serverMultitransportChannelData */
929
0
    return gcc_write_server_multitransport_channel_data(s, mcs);
930
931
0
  return TRUE;
932
0
}
933
934
BOOL gcc_read_user_data_header(wLog* log, wStream* s, UINT16* type, UINT16* length)
935
0
{
936
0
  WINPR_ASSERT(s);
937
0
  if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 4))
938
0
    return FALSE;
939
940
0
  Stream_Read_UINT16(s, *type);   /* type */
941
0
  Stream_Read_UINT16(s, *length); /* length */
942
943
0
  if ((*length < 4) || (!Stream_CheckAndLogRequiredLengthWLog(log, s, (size_t)(*length - 4))))
944
0
    return FALSE;
945
946
0
  return TRUE;
947
0
}
948
949
/**
950
 * Write a user data header (TS_UD_HEADER).
951
 * msdn{cc240509}
952
 *
953
 * @param s stream
954
 * @param type data block type
955
 * @param length data block length
956
 *
957
 * @return \b TRUE for success, \b FALSE otherwise
958
 */
959
960
BOOL gcc_write_user_data_header(wStream* s, UINT16 type, UINT16 length)
961
0
{
962
963
0
  WINPR_ASSERT(s);
964
0
  if (!Stream_EnsureRemainingCapacity(s, 4 + length))
965
0
    return FALSE;
966
0
  Stream_Write_UINT16(s, type);   /* type */
967
0
  Stream_Write_UINT16(s, length); /* length */
968
0
  return TRUE;
969
0
}
970
971
static UINT32 filterAndLogEarlyServerCapabilityFlags(wLog* log, UINT32 flags)
972
0
{
973
0
  const UINT32 mask =
974
0
      (RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1 | RNS_UD_SC_DYNAMIC_DST_SUPPORTED |
975
0
       RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2 | RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED);
976
0
  const UINT32 filtered = flags & mask;
977
0
  const UINT32 unknown = flags & (~mask);
978
0
  if (unknown != 0)
979
0
  {
980
0
    char buffer[256] = { 0 };
981
0
    WLog_Print(log, WLOG_WARN,
982
0
               "TS_UD_SC_CORE::EarlyCapabilityFlags [0x%08" PRIx32 " & 0x%08" PRIx32
983
0
               " --> 0x%08" PRIx32 "] filtering %s, feature not implemented",
984
0
               flags, ~mask, unknown,
985
0
               rdp_early_server_caps_string(unknown, buffer, sizeof(buffer)));
986
0
  }
987
0
  return filtered;
988
0
}
989
990
static UINT32 earlyServerCapsFromSettings(wLog* log, const rdpSettings* settings)
991
0
{
992
0
  UINT32 EarlyCapabilityFlags = 0;
993
994
0
  if (settings->SupportEdgeActionV1)
995
0
    EarlyCapabilityFlags |= RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1;
996
0
  if (settings->SupportDynamicTimeZone)
997
0
    EarlyCapabilityFlags |= RNS_UD_SC_DYNAMIC_DST_SUPPORTED;
998
0
  if (settings->SupportEdgeActionV2)
999
0
    EarlyCapabilityFlags |= RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2;
1000
0
  if (settings->SupportSkipChannelJoin)
1001
0
    EarlyCapabilityFlags |= RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED;
1002
1003
0
  return filterAndLogEarlyServerCapabilityFlags(log, EarlyCapabilityFlags);
1004
0
}
1005
1006
static UINT16 filterAndLogEarlyClientCapabilityFlags(wLog* log, UINT32 flags)
1007
0
{
1008
0
  const UINT32 mask =
1009
0
      (RNS_UD_CS_SUPPORT_ERRINFO_PDU | RNS_UD_CS_WANT_32BPP_SESSION |
1010
0
       RNS_UD_CS_SUPPORT_STATUSINFO_PDU | RNS_UD_CS_STRONG_ASYMMETRIC_KEYS |
1011
0
       RNS_UD_CS_RELATIVE_MOUSE_INPUT | RNS_UD_CS_VALID_CONNECTION_TYPE |
1012
0
       RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU | RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT |
1013
0
       RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL | RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE |
1014
0
       RNS_UD_CS_SUPPORT_HEARTBEAT_PDU | RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN);
1015
0
  const UINT32 filtered = flags & mask;
1016
0
  const UINT32 unknown = flags & ~mask;
1017
0
  if (unknown != 0)
1018
0
  {
1019
0
    char buffer[256] = { 0 };
1020
0
    WLog_Print(log, WLOG_WARN,
1021
0
               "(TS_UD_CS_CORE)::EarlyCapabilityFlags [0x%08" PRIx32 " & 0x%08" PRIx32
1022
0
               " --> 0x%08" PRIx32 "] filtering %s, feature not implemented",
1023
0
               flags, ~mask, unknown,
1024
0
               rdp_early_client_caps_string(unknown, buffer, sizeof(buffer)));
1025
0
  }
1026
1027
0
  WINPR_ASSERT(filtered <= UINT16_MAX);
1028
0
  return (UINT16)filtered;
1029
0
}
1030
1031
static UINT16 earlyClientCapsFromSettings(wLog* log, const rdpSettings* settings)
1032
0
{
1033
0
  UINT32 earlyCapabilityFlags = 0;
1034
1035
0
  WINPR_ASSERT(settings);
1036
0
  if (settings->SupportErrorInfoPdu)
1037
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_ERRINFO_PDU;
1038
1039
0
  if (freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth) == 32)
1040
0
    earlyCapabilityFlags |= RNS_UD_CS_WANT_32BPP_SESSION;
1041
1042
0
  if (settings->SupportStatusInfoPdu)
1043
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_STATUSINFO_PDU;
1044
1045
0
  if (settings->ConnectionType)
1046
0
    earlyCapabilityFlags |= RNS_UD_CS_VALID_CONNECTION_TYPE;
1047
1048
0
  if (settings->SupportMonitorLayoutPdu)
1049
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU;
1050
1051
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
1052
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT;
1053
1054
0
  if (settings->SupportGraphicsPipeline)
1055
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL;
1056
1057
0
  if (settings->SupportDynamicTimeZone)
1058
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE;
1059
1060
0
  if (settings->SupportHeartbeatPdu)
1061
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_HEARTBEAT_PDU;
1062
1063
0
  if (settings->SupportAsymetricKeys)
1064
0
    earlyCapabilityFlags |= RNS_UD_CS_STRONG_ASYMMETRIC_KEYS;
1065
1066
0
  if (settings->HasRelativeMouseEvent)
1067
0
    earlyCapabilityFlags |= RNS_UD_CS_RELATIVE_MOUSE_INPUT;
1068
1069
0
  if (settings->SupportSkipChannelJoin)
1070
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN;
1071
1072
0
  return filterAndLogEarlyClientCapabilityFlags(log, earlyCapabilityFlags);
1073
0
}
1074
1075
static BOOL updateEarlyClientCaps(wLog* log, rdpSettings* settings, UINT32 earlyCapabilityFlags,
1076
                                  UINT32 connectionType)
1077
0
{
1078
0
  WINPR_ASSERT(settings);
1079
1080
0
  if (settings->SupportErrorInfoPdu)
1081
0
    settings->SupportErrorInfoPdu =
1082
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_ERRINFO_PDU) ? TRUE : FALSE;
1083
1084
  /* RNS_UD_CS_WANT_32BPP_SESSION is already handled in gcc_read_client_core_data:
1085
   *
1086
   * it is evaluated in combination with highColorDepth and the server side
1087
   * settings to determine the session color depth to use.
1088
   */
1089
1090
0
  if (settings->SupportStatusInfoPdu)
1091
0
    settings->SupportStatusInfoPdu =
1092
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_STATUSINFO_PDU) ? TRUE : FALSE;
1093
1094
0
  if (settings->SupportAsymetricKeys)
1095
0
    settings->SupportAsymetricKeys =
1096
0
        (earlyCapabilityFlags & RNS_UD_CS_STRONG_ASYMMETRIC_KEYS) ? TRUE : FALSE;
1097
1098
0
  if (settings->HasRelativeMouseEvent)
1099
0
  {
1100
    /* [MS-RDPBCGR] 2.2.7.1.5 Pointer Capability Set (TS_POINTER_CAPABILITYSET)
1101
     * the flag must be ignored if the RDP version is < 0x00080011 */
1102
0
    if (settings->RdpVersion >= RDP_VERSION_10_12)
1103
0
    {
1104
0
      settings->HasRelativeMouseEvent =
1105
0
          (earlyCapabilityFlags & RNS_UD_CS_RELATIVE_MOUSE_INPUT) ? TRUE : FALSE;
1106
0
    }
1107
0
    else
1108
0
      settings->HasRelativeMouseEvent = FALSE;
1109
0
  }
1110
1111
0
  if (settings->NetworkAutoDetect)
1112
0
    settings->NetworkAutoDetect =
1113
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT) ? TRUE : FALSE;
1114
1115
0
  if (settings->SupportSkipChannelJoin)
1116
0
    settings->SupportSkipChannelJoin =
1117
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN) ? TRUE : FALSE;
1118
1119
0
  if (settings->SupportMonitorLayoutPdu)
1120
0
    settings->SupportMonitorLayoutPdu =
1121
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU) ? TRUE : FALSE;
1122
1123
0
  if (settings->SupportHeartbeatPdu)
1124
0
    settings->SupportHeartbeatPdu =
1125
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_HEARTBEAT_PDU) ? TRUE : FALSE;
1126
1127
0
  if (settings->SupportGraphicsPipeline)
1128
0
    settings->SupportGraphicsPipeline =
1129
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL) ? TRUE : FALSE;
1130
1131
0
  if (settings->SupportDynamicTimeZone)
1132
0
    settings->SupportDynamicTimeZone =
1133
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE) ? TRUE : FALSE;
1134
1135
0
  if ((earlyCapabilityFlags & RNS_UD_CS_VALID_CONNECTION_TYPE) == 0)
1136
0
    connectionType = 0;
1137
0
  settings->ConnectionType = connectionType;
1138
1139
0
  filterAndLogEarlyClientCapabilityFlags(log, earlyCapabilityFlags);
1140
0
  return TRUE;
1141
0
}
1142
1143
static BOOL updateEarlyServerCaps(wLog* log, rdpSettings* settings, UINT32 earlyCapabilityFlags,
1144
                                  WINPR_ATTR_UNUSED UINT32 connectionType)
1145
0
{
1146
0
  WINPR_ASSERT(settings);
1147
1148
0
  settings->SupportEdgeActionV1 =
1149
0
      settings->SupportEdgeActionV1 &&
1150
0
              (earlyCapabilityFlags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1)
1151
0
          ? TRUE
1152
0
          : FALSE;
1153
0
  settings->SupportDynamicTimeZone =
1154
0
      settings->SupportDynamicTimeZone && (earlyCapabilityFlags & RNS_UD_SC_DYNAMIC_DST_SUPPORTED)
1155
0
          ? TRUE
1156
0
          : FALSE;
1157
0
  settings->SupportEdgeActionV2 =
1158
0
      settings->SupportEdgeActionV2 &&
1159
0
              (earlyCapabilityFlags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2)
1160
0
          ? TRUE
1161
0
          : FALSE;
1162
0
  settings->SupportSkipChannelJoin =
1163
0
      settings->SupportSkipChannelJoin &&
1164
0
              (earlyCapabilityFlags & RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED)
1165
0
          ? TRUE
1166
0
          : FALSE;
1167
1168
0
  filterAndLogEarlyServerCapabilityFlags(log, earlyCapabilityFlags);
1169
0
  return TRUE;
1170
0
}
1171
1172
/**
1173
 * Read a client core data block (TS_UD_CS_CORE).
1174
 * msdn{cc240510}
1175
 * @param s stream
1176
 * @param mcs The MCS instance
1177
 *
1178
 * @return \b TRUE for success, \b FALSE otherwise
1179
 */
1180
1181
BOOL gcc_read_client_core_data(wStream* s, rdpMcs* mcs)
1182
0
{
1183
0
  char buffer[2048] = { 0 };
1184
0
  char strbuffer[130] = { 0 };
1185
0
  UINT32 version = 0;
1186
0
  BYTE connectionType = 0;
1187
0
  UINT32 clientColorDepth = 0;
1188
0
  UINT16 colorDepth = 0;
1189
0
  UINT16 postBeta2ColorDepth = 0;
1190
0
  UINT16 highColorDepth = 0;
1191
0
  UINT32 serverSelectedProtocol = 0;
1192
0
  rdpSettings* settings = mcs_get_settings(mcs);
1193
1194
0
  WINPR_ASSERT(s);
1195
0
  WINPR_ASSERT(settings);
1196
1197
  /* Length of all required fields, until imeFileName */
1198
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 128))
1199
0
    return FALSE;
1200
1201
0
  Stream_Read_UINT32(s, version); /* version (4 bytes) */
1202
0
  settings->RdpVersion = rdp_version_common(mcs->log, version, settings->RdpVersion);
1203
0
  Stream_Read_UINT16(s, settings->DesktopWidth);  /* DesktopWidth (2 bytes) */
1204
0
  Stream_Read_UINT16(s, settings->DesktopHeight); /* DesktopHeight (2 bytes) */
1205
0
  Stream_Read_UINT16(s, colorDepth);              /* ColorDepth (2 bytes) */
1206
0
  Stream_Seek_UINT16(s); /* SASSequence (Secure Access Sequence) (2 bytes) */
1207
0
  Stream_Read_UINT32(s, settings->KeyboardLayout); /* KeyboardLayout (4 bytes) */
1208
0
  Stream_Read_UINT32(s, settings->ClientBuild);    /* ClientBuild (4 bytes) */
1209
1210
  /* clientName (32 bytes, null-terminated unicode, truncated to 15 characters) */
1211
0
  if (Stream_Read_UTF16_String_As_UTF8_Buffer(s, 32 / sizeof(WCHAR), strbuffer,
1212
0
                                              ARRAYSIZE(strbuffer)) < 0)
1213
0
  {
1214
0
    WLog_Print(mcs->log, WLOG_ERROR, "failed to convert client host name");
1215
0
    return FALSE;
1216
0
  }
1217
1218
0
  if (!freerdp_settings_set_string(settings, FreeRDP_ClientHostname, strbuffer))
1219
0
    return FALSE;
1220
1221
0
  Stream_Read_UINT32(s, settings->KeyboardType);        /* KeyboardType (4 bytes) */
1222
0
  Stream_Read_UINT32(s, settings->KeyboardSubType);     /* KeyboardSubType (4 bytes) */
1223
0
  Stream_Read_UINT32(s, settings->KeyboardFunctionKey); /* KeyboardFunctionKey (4 bytes) */
1224
0
  Stream_Seek(s, 64);                                   /* imeFileName (64 bytes) */
1225
1226
  /**
1227
   * The following fields are all optional. If one field is present, all of the preceding
1228
   * fields MUST also be present. If one field is not present, all of the subsequent fields
1229
   * MUST NOT be present.
1230
   * We must check the bytes left before reading each field.
1231
   */
1232
1233
0
  do
1234
0
  {
1235
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1236
0
      break;
1237
1238
0
    Stream_Read_UINT16(s, postBeta2ColorDepth); /* postBeta2ColorDepth (2 bytes) */
1239
1240
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1241
0
      break;
1242
1243
0
    const UINT16 clientProductId = Stream_Get_UINT16(s); /* clientProductID (2 bytes) */
1244
1245
    /* [MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::clientProductId (optional)
1246
     * should be initialized to 1
1247
     */
1248
0
    if (clientProductId != 1)
1249
0
    {
1250
0
      WLog_Print(mcs->log, WLOG_WARN,
1251
0
                 "[MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::clientProductId "
1252
0
                 "(optional) expected 1, got %" PRIu32,
1253
0
                 clientProductId);
1254
0
    }
1255
1256
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1257
0
      break;
1258
1259
0
    const UINT32 serialNumber = Stream_Get_UINT32(s); /* serialNumber (4 bytes) */
1260
1261
    /* [MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::serialNumber (optional)
1262
     * should be initialized to 0
1263
     */
1264
0
    if (serialNumber != 0)
1265
0
    {
1266
0
      WLog_Print(mcs->log, WLOG_WARN,
1267
0
                 "[MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::serialNumber "
1268
0
                 "(optional) expected 0, got %" PRIu32,
1269
0
                 serialNumber);
1270
0
    }
1271
1272
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1273
0
      break;
1274
1275
0
    Stream_Read_UINT16(s, highColorDepth); /* highColorDepth (2 bytes) */
1276
1277
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1278
0
      break;
1279
1280
0
    Stream_Read_UINT16(s, settings->SupportedColorDepths); /* supportedColorDepths (2 bytes) */
1281
1282
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1283
0
      break;
1284
1285
0
    Stream_Read_UINT16(s, settings->EarlyCapabilityFlags); /* earlyCapabilityFlags (2 bytes) */
1286
1287
    /* clientDigProductId (64 bytes): Contains a value that uniquely identifies the client */
1288
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 64))
1289
0
      break;
1290
1291
0
    if (Stream_Read_UTF16_String_As_UTF8_Buffer(s, 64 / sizeof(WCHAR), strbuffer,
1292
0
                                                ARRAYSIZE(strbuffer)) < 0)
1293
0
    {
1294
0
      WLog_Print(mcs->log, WLOG_ERROR, "failed to convert the client product identifier");
1295
0
      return FALSE;
1296
0
    }
1297
1298
0
    if (!freerdp_settings_set_string(settings, FreeRDP_ClientProductId, strbuffer))
1299
0
      return FALSE;
1300
1301
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 1))
1302
0
      break;
1303
1304
0
    Stream_Read_UINT8(s, connectionType); /* connectionType (1 byte) */
1305
1306
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 1))
1307
0
      break;
1308
1309
0
    Stream_Seek_UINT8(s); /* pad1octet (1 byte) */
1310
1311
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1312
0
      break;
1313
1314
0
    Stream_Read_UINT32(s, serverSelectedProtocol); /* serverSelectedProtocol (4 bytes) */
1315
1316
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1317
0
      break;
1318
1319
0
    Stream_Read_UINT32(s, settings->DesktopPhysicalWidth); /* desktopPhysicalWidth (4 bytes) */
1320
1321
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1322
0
      break;
1323
1324
0
    Stream_Read_UINT32(s,
1325
0
                       settings->DesktopPhysicalHeight); /* desktopPhysicalHeight (4 bytes) */
1326
1327
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1328
0
      break;
1329
1330
0
    Stream_Read_UINT16(s, settings->DesktopOrientation); /* desktopOrientation (2 bytes) */
1331
1332
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1333
0
      break;
1334
1335
0
    Stream_Read_UINT32(s, settings->DesktopScaleFactor); /* desktopScaleFactor (4 bytes) */
1336
1337
0
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1338
0
      break;
1339
1340
0
    Stream_Read_UINT32(s, settings->DeviceScaleFactor); /* deviceScaleFactor (4 bytes) */
1341
1342
0
    if (freerdp_settings_get_bool(settings, FreeRDP_TransportDumpReplay))
1343
0
      settings->SelectedProtocol = serverSelectedProtocol;
1344
0
    else if (settings->SelectedProtocol != serverSelectedProtocol)
1345
0
      return FALSE;
1346
0
  } while (0);
1347
1348
0
  if (highColorDepth > 0)
1349
0
  {
1350
0
    if (settings->EarlyCapabilityFlags & RNS_UD_CS_WANT_32BPP_SESSION)
1351
0
      clientColorDepth = 32;
1352
0
    else
1353
0
      clientColorDepth = highColorDepth;
1354
0
  }
1355
0
  else if (postBeta2ColorDepth > 0)
1356
0
  {
1357
0
    switch (postBeta2ColorDepth)
1358
0
    {
1359
0
      case RNS_UD_COLOR_4BPP:
1360
0
        clientColorDepth = 4;
1361
0
        break;
1362
1363
0
      case RNS_UD_COLOR_8BPP:
1364
0
        clientColorDepth = 8;
1365
0
        break;
1366
1367
0
      case RNS_UD_COLOR_16BPP_555:
1368
0
        clientColorDepth = 15;
1369
0
        break;
1370
1371
0
      case RNS_UD_COLOR_16BPP_565:
1372
0
        clientColorDepth = 16;
1373
0
        break;
1374
1375
0
      case RNS_UD_COLOR_24BPP:
1376
0
        clientColorDepth = 24;
1377
0
        break;
1378
1379
0
      default:
1380
0
        return FALSE;
1381
0
    }
1382
0
  }
1383
0
  else
1384
0
  {
1385
0
    switch (colorDepth)
1386
0
    {
1387
0
      case RNS_UD_COLOR_4BPP:
1388
0
        clientColorDepth = 4;
1389
0
        break;
1390
1391
0
      case RNS_UD_COLOR_8BPP:
1392
0
        clientColorDepth = 8;
1393
0
        break;
1394
1395
0
      default:
1396
0
        return FALSE;
1397
0
    }
1398
0
  }
1399
1400
  /*
1401
   * If we are in server mode, accept client's color depth only if
1402
   * it is smaller than ours. This is what Windows server does.
1403
   */
1404
0
  if ((clientColorDepth < freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth)) ||
1405
0
      !settings->ServerMode)
1406
0
  {
1407
0
    if (!freerdp_settings_set_uint32(settings, FreeRDP_ColorDepth, clientColorDepth))
1408
0
      return FALSE;
1409
0
  }
1410
1411
0
  WLog_Print(
1412
0
      mcs->log, WLOG_DEBUG, "Received EarlyCapabilityFlags=%s",
1413
0
      rdp_early_client_caps_string(settings->EarlyCapabilityFlags, buffer, sizeof(buffer)));
1414
1415
0
  return updateEarlyClientCaps(mcs->log, settings, settings->EarlyCapabilityFlags,
1416
0
                               connectionType);
1417
0
}
1418
1419
/**
1420
 * Write a client core data block (TS_UD_CS_CORE).
1421
 * msdn{cc240510}
1422
 * @param s The stream to write to
1423
 * @param mcs The MSC instance to get the data from
1424
 *
1425
 * @return \b TRUE for success, \b FALSE otherwise
1426
 */
1427
1428
BOOL gcc_write_client_core_data(wStream* s, const rdpMcs* mcs)
1429
0
{
1430
0
  char buffer[2048] = { 0 };
1431
0
  char dbuffer[2048] = { 0 };
1432
0
  BYTE connectionType = 0;
1433
0
  HIGH_COLOR_DEPTH highColorDepth = HIGH_COLOR_4BPP;
1434
1435
0
  UINT16 earlyCapabilityFlags = 0;
1436
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1437
1438
0
  WINPR_ASSERT(s);
1439
0
  WINPR_ASSERT(settings);
1440
1441
0
  const UINT16 SupportedColorDepths =
1442
0
      freerdp_settings_get_uint16(settings, FreeRDP_SupportedColorDepths);
1443
0
  const UINT32 ColorDepth = freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth);
1444
1445
0
  if (!gcc_write_user_data_header(s, CS_CORE, 234))
1446
0
    return FALSE;
1447
1448
0
  Stream_Write_UINT32(s, settings->RdpVersion); /* Version */
1449
0
  Stream_Write_UINT16(
1450
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, settings->DesktopWidth)); /* DesktopWidth */
1451
0
  Stream_Write_UINT16(
1452
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, settings->DesktopHeight)); /* DesktopHeight */
1453
0
  Stream_Write_UINT16(s,
1454
0
                      RNS_UD_COLOR_8BPP); /* ColorDepth, ignored because of postBeta2ColorDepth */
1455
0
  Stream_Write_UINT16(s, RNS_UD_SAS_DEL); /* SASSequence (Secure Access Sequence) */
1456
0
  Stream_Write_UINT32(s, settings->KeyboardLayout); /* KeyboardLayout */
1457
0
  Stream_Write_UINT32(s, settings->ClientBuild);    /* ClientBuild */
1458
1459
0
  if (!Stream_EnsureRemainingCapacity(s, 32 + 12 + 64 + 8))
1460
0
    return FALSE;
1461
1462
  /* clientName (32 bytes, null-terminated unicode, truncated to 15 characters) */
1463
0
  size_t clientNameLength = 0;
1464
0
  WCHAR* clientName = ConvertUtf8ToWCharAlloc(settings->ClientHostname, &clientNameLength);
1465
0
  if (clientNameLength >= 16)
1466
0
  {
1467
0
    clientNameLength = 16;
1468
0
    clientName[clientNameLength - 1] = 0;
1469
0
  }
1470
1471
0
  Stream_Write(s, clientName, (clientNameLength * 2));
1472
0
  Stream_Zero(s, 32 - (clientNameLength * 2));
1473
0
  free(clientName);
1474
0
  Stream_Write_UINT32(s, settings->KeyboardType);        /* KeyboardType */
1475
0
  Stream_Write_UINT32(s, settings->KeyboardSubType);     /* KeyboardSubType */
1476
0
  Stream_Write_UINT32(s, settings->KeyboardFunctionKey); /* KeyboardFunctionKey */
1477
0
  Stream_Zero(s, 64);                                    /* imeFileName */
1478
0
  Stream_Write_UINT16(s, RNS_UD_COLOR_8BPP);             /* postBeta2ColorDepth */
1479
0
  Stream_Write_UINT16(s, 1);                             /* clientProductID */
1480
0
  Stream_Write_UINT32(s, 0); /* serialNumber (should be initialized to 0) */
1481
0
  highColorDepth = ColorDepthToHighColor(ColorDepth);
1482
0
  earlyCapabilityFlags = earlyClientCapsFromSettings(mcs->log, settings);
1483
1484
0
  WINPR_ASSERT(settings->ConnectionType <= UINT8_MAX);
1485
0
  connectionType = (UINT8)settings->ConnectionType;
1486
1487
0
  if (!Stream_EnsureRemainingCapacity(s, 6))
1488
0
    return FALSE;
1489
1490
0
  WLog_Print(
1491
0
      mcs->log, WLOG_DEBUG,
1492
0
      "Sending highColorDepth=%s, supportedColorDepths=%s, earlyCapabilityFlags=%s",
1493
0
      HighColorToString(highColorDepth),
1494
0
      freerdp_supported_color_depths_string(SupportedColorDepths, dbuffer, sizeof(dbuffer)),
1495
0
      rdp_early_client_caps_string(earlyCapabilityFlags, buffer, sizeof(buffer)));
1496
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, highColorDepth)); /* highColorDepth */
1497
0
  Stream_Write_UINT16(s, SupportedColorDepths); /* supportedColorDepths */
1498
0
  Stream_Write_UINT16(s, earlyCapabilityFlags); /* earlyCapabilityFlags */
1499
1500
0
  if (!Stream_EnsureRemainingCapacity(s, 64 + 24))
1501
0
    return FALSE;
1502
1503
  /* clientDigProductId (64 bytes, assume WCHAR, not \0 terminated */
1504
0
  const char* str = freerdp_settings_get_string(settings, FreeRDP_ClientProductId);
1505
0
  if (str)
1506
0
  {
1507
0
    if (Stream_Write_UTF16_String_From_UTF8(s, 32, str, strnlen(str, 32), TRUE) < 0)
1508
0
      return FALSE;
1509
0
  }
1510
0
  else
1511
0
    Stream_Zero(s, 32 * sizeof(WCHAR));
1512
1513
0
  Stream_Write_UINT8(s, connectionType);                   /* connectionType */
1514
0
  Stream_Write_UINT8(s, 0);                                /* pad1octet */
1515
0
  Stream_Write_UINT32(s, settings->SelectedProtocol);      /* serverSelectedProtocol */
1516
0
  Stream_Write_UINT32(s, settings->DesktopPhysicalWidth);  /* desktopPhysicalWidth */
1517
0
  Stream_Write_UINT32(s, settings->DesktopPhysicalHeight); /* desktopPhysicalHeight */
1518
0
  Stream_Write_UINT16(s, settings->DesktopOrientation);    /* desktopOrientation */
1519
0
  Stream_Write_UINT32(s, settings->DesktopScaleFactor);    /* desktopScaleFactor */
1520
0
  Stream_Write_UINT32(s, settings->DeviceScaleFactor);     /* deviceScaleFactor */
1521
0
  return TRUE;
1522
0
}
1523
1524
BOOL gcc_read_server_core_data(wStream* s, rdpMcs* mcs)
1525
0
{
1526
0
  UINT32 serverVersion = 0;
1527
0
  rdpSettings* settings = mcs_get_settings(mcs);
1528
1529
0
  WINPR_ASSERT(s);
1530
0
  WINPR_ASSERT(settings);
1531
1532
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1533
0
    return FALSE;
1534
1535
0
  Stream_Read_UINT32(s, serverVersion); /* version */
1536
0
  settings->RdpVersion = rdp_version_common(mcs->log, serverVersion, settings->RdpVersion);
1537
1538
0
  if (Stream_GetRemainingLength(s) >= 4)
1539
0
  {
1540
0
    Stream_Read_UINT32(s, settings->RequestedProtocols); /* clientRequestedProtocols */
1541
0
  }
1542
1543
0
  if (Stream_GetRemainingLength(s) >= 4)
1544
0
  {
1545
0
    char buffer[2048] = { 0 };
1546
1547
0
    Stream_Read_UINT32(s, settings->EarlyCapabilityFlags); /* earlyCapabilityFlags */
1548
0
    WLog_Print(
1549
0
        mcs->log, WLOG_DEBUG, "Received EarlyCapabilityFlags=%s",
1550
0
        rdp_early_client_caps_string(settings->EarlyCapabilityFlags, buffer, sizeof(buffer)));
1551
0
  }
1552
1553
0
  return updateEarlyServerCaps(mcs->log, settings, settings->EarlyCapabilityFlags,
1554
0
                               settings->ConnectionType);
1555
0
}
1556
1557
/* TODO: This function modifies rdpMcs
1558
 * TODO:  Split this out of this function
1559
 */
1560
BOOL gcc_write_server_core_data(wStream* s, rdpMcs* mcs)
1561
0
{
1562
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1563
1564
0
  WINPR_ASSERT(s);
1565
0
  WINPR_ASSERT(settings);
1566
1567
0
  if (!gcc_write_user_data_header(s, SC_CORE, 16))
1568
0
    return FALSE;
1569
1570
0
  const UINT32 EarlyCapabilityFlags = earlyServerCapsFromSettings(mcs->log, settings);
1571
0
  Stream_Write_UINT32(s, settings->RdpVersion);         /* version (4 bytes) */
1572
0
  Stream_Write_UINT32(s, settings->RequestedProtocols); /* clientRequestedProtocols (4 bytes) */
1573
0
  Stream_Write_UINT32(s, EarlyCapabilityFlags);         /* earlyCapabilityFlags (4 bytes) */
1574
0
  return TRUE;
1575
0
}
1576
1577
/**
1578
 * Read a client security data block (TS_UD_CS_SEC).
1579
 * msdn{cc240511}
1580
 * @param s stream
1581
 * @param mcs MCS instance
1582
 *
1583
 * @return \b TRUE for success, \b FALSE otherwise
1584
 */
1585
1586
BOOL gcc_read_client_security_data(wStream* s, rdpMcs* mcs)
1587
0
{
1588
0
  rdpSettings* settings = mcs_get_settings(mcs);
1589
1590
0
  WINPR_ASSERT(s);
1591
0
  WINPR_ASSERT(settings);
1592
1593
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1594
0
    return FALSE;
1595
1596
0
  if (settings->UseRdpSecurityLayer)
1597
0
  {
1598
0
    Stream_Read_UINT32(s, settings->EncryptionMethods); /* encryptionMethods */
1599
1600
0
    if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1601
0
      Stream_Read_UINT32(s, settings->EncryptionMethods); /* extEncryptionMethods */
1602
0
    else
1603
0
      Stream_Seek(s, 4);
1604
0
  }
1605
0
  else
1606
0
  {
1607
0
    Stream_Seek(s, 8);
1608
0
  }
1609
1610
0
  return TRUE;
1611
0
}
1612
1613
/**
1614
 * Write a client security data block (TS_UD_CS_SEC).
1615
 * msdn{cc240511}
1616
 * @param s stream
1617
 * @param mcs The MCS instance
1618
 *
1619
 * @return \b TRUE for success, \b FALSE otherwise
1620
 */
1621
1622
BOOL gcc_write_client_security_data(wStream* s, const rdpMcs* mcs)
1623
0
{
1624
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1625
1626
0
  WINPR_ASSERT(s);
1627
0
  WINPR_ASSERT(settings);
1628
1629
0
  if (!gcc_write_user_data_header(s, CS_SECURITY, 12))
1630
0
    return FALSE;
1631
1632
0
  if (settings->UseRdpSecurityLayer)
1633
0
  {
1634
0
    Stream_Write_UINT32(s, settings->EncryptionMethods); /* encryptionMethods */
1635
0
    Stream_Write_UINT32(s, 0);                           /* extEncryptionMethods */
1636
0
  }
1637
0
  else
1638
0
  {
1639
    /* French locale, disable encryption */
1640
0
    Stream_Write_UINT32(s, 0);                           /* encryptionMethods */
1641
0
    Stream_Write_UINT32(s, settings->EncryptionMethods); /* extEncryptionMethods */
1642
0
  }
1643
0
  return TRUE;
1644
0
}
1645
1646
BOOL gcc_read_server_security_data(wStream* s, rdpMcs* mcs)
1647
0
{
1648
0
  BOOL validCryptoConfig = FALSE;
1649
0
  UINT32 EncryptionMethod = 0;
1650
0
  UINT32 EncryptionLevel = 0;
1651
0
  rdpSettings* settings = mcs_get_settings(mcs);
1652
1653
0
  WINPR_ASSERT(s);
1654
0
  WINPR_ASSERT(settings);
1655
1656
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1657
0
    return FALSE;
1658
1659
0
  Stream_Read_UINT32(s, EncryptionMethod); /* encryptionMethod */
1660
0
  Stream_Read_UINT32(s, EncryptionLevel);  /* encryptionLevel */
1661
1662
  /* Only accept valid/known encryption methods */
1663
0
  switch (EncryptionMethod)
1664
0
  {
1665
0
    case ENCRYPTION_METHOD_NONE:
1666
0
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: NONE");
1667
0
      break;
1668
1669
0
    case ENCRYPTION_METHOD_40BIT:
1670
0
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 40BIT");
1671
0
      break;
1672
1673
0
    case ENCRYPTION_METHOD_56BIT:
1674
0
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 56BIT");
1675
0
      break;
1676
1677
0
    case ENCRYPTION_METHOD_128BIT:
1678
0
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 128BIT");
1679
0
      break;
1680
1681
0
    case ENCRYPTION_METHOD_FIPS:
1682
0
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: FIPS");
1683
0
      break;
1684
1685
0
    default:
1686
0
      WLog_Print(mcs->log, WLOG_ERROR, "Received unknown encryption method %08" PRIX32 "",
1687
0
                 EncryptionMethod);
1688
0
      return FALSE;
1689
0
  }
1690
1691
0
  if (settings->UseRdpSecurityLayer && !(settings->EncryptionMethods & EncryptionMethod))
1692
0
  {
1693
0
    WLog_Print(mcs->log, WLOG_WARN,
1694
0
               "Server uses non-advertised encryption method 0x%08" PRIX32 "",
1695
0
               EncryptionMethod);
1696
    /* FIXME: Should we return FALSE; in this case ?? */
1697
0
  }
1698
1699
0
  settings->EncryptionMethods = EncryptionMethod;
1700
0
  settings->EncryptionLevel = EncryptionLevel;
1701
  /* Verify encryption level/method combinations according to MS-RDPBCGR Section 5.3.2 */
1702
0
  switch (settings->EncryptionLevel)
1703
0
  {
1704
0
    case ENCRYPTION_LEVEL_NONE:
1705
0
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1706
0
      {
1707
0
        validCryptoConfig = TRUE;
1708
0
      }
1709
1710
0
      break;
1711
1712
0
    case ENCRYPTION_LEVEL_FIPS:
1713
0
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1714
0
      {
1715
0
        validCryptoConfig = TRUE;
1716
0
      }
1717
1718
0
      break;
1719
1720
0
    case ENCRYPTION_LEVEL_LOW:
1721
0
    case ENCRYPTION_LEVEL_HIGH:
1722
0
    case ENCRYPTION_LEVEL_CLIENT_COMPATIBLE:
1723
0
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_40BIT ||
1724
0
          settings->EncryptionMethods == ENCRYPTION_METHOD_56BIT ||
1725
0
          settings->EncryptionMethods == ENCRYPTION_METHOD_128BIT ||
1726
0
          settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1727
0
      {
1728
0
        validCryptoConfig = TRUE;
1729
0
      }
1730
1731
0
      break;
1732
1733
0
    default:
1734
0
      WLog_Print(mcs->log, WLOG_ERROR, "Received unknown encryption level 0x%08" PRIX32 "",
1735
0
                 settings->EncryptionLevel);
1736
0
  }
1737
1738
0
  if (!validCryptoConfig)
1739
0
  {
1740
0
    WLog_Print(mcs->log, WLOG_ERROR,
1741
0
               "Received invalid cryptographic configuration (level=0x%08" PRIX32
1742
0
               " method=0x%08" PRIX32 ")",
1743
0
               settings->EncryptionLevel, settings->EncryptionMethods);
1744
0
    return FALSE;
1745
0
  }
1746
1747
0
  if (settings->EncryptionLevel == ENCRYPTION_LEVEL_NONE)
1748
0
  {
1749
    /* serverRandomLen and serverCertLen must not be present */
1750
0
    settings->UseRdpSecurityLayer = FALSE;
1751
0
    return TRUE;
1752
0
  }
1753
1754
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1755
0
    return FALSE;
1756
1757
0
  Stream_Read_UINT32(s, settings->ServerRandomLength);      /* serverRandomLen */
1758
0
  Stream_Read_UINT32(s, settings->ServerCertificateLength); /* serverCertLen */
1759
1760
0
  if ((settings->ServerRandomLength == 0) || (settings->ServerCertificateLength == 0))
1761
0
  {
1762
0
    WLog_Print(mcs->log, WLOG_ERROR,
1763
0
               "Invalid ServerRandom (length=%" PRIu32 ") or ServerCertificate (length=%" PRIu32
1764
0
               ")",
1765
0
               settings->ServerRandomLength, settings->ServerCertificateLength);
1766
0
    return FALSE;
1767
0
  }
1768
1769
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, settings->ServerRandomLength))
1770
0
    return FALSE;
1771
1772
  /* serverRandom */
1773
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, NULL,
1774
0
                                        settings->ServerRandomLength))
1775
0
    goto fail;
1776
1777
0
  Stream_Read(s, settings->ServerRandom, settings->ServerRandomLength);
1778
1779
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, settings->ServerCertificateLength))
1780
0
    goto fail;
1781
1782
  /* serverCertificate */
1783
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, NULL,
1784
0
                                        settings->ServerCertificateLength))
1785
0
    goto fail;
1786
1787
0
  Stream_Read(s, settings->ServerCertificate, settings->ServerCertificateLength);
1788
1789
0
  const BYTE* data = settings->ServerCertificate;
1790
0
  const uint32_t length = settings->ServerCertificateLength;
1791
1792
0
  if (!freerdp_certificate_read_server_cert(settings->RdpServerCertificate, data, length))
1793
0
    goto fail;
1794
1795
0
  return TRUE;
1796
0
fail:
1797
0
  (void)freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, NULL, 0);
1798
0
  (void)freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, NULL, 0);
1799
0
  return FALSE;
1800
0
}
1801
1802
static BOOL gcc_update_server_random(rdpSettings* settings)
1803
0
{
1804
0
  const size_t length = 32;
1805
0
  WINPR_ASSERT(settings);
1806
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, NULL, length))
1807
0
    return FALSE;
1808
0
  BYTE* data = freerdp_settings_get_pointer_writable(settings, FreeRDP_ServerRandom);
1809
0
  if (!data)
1810
0
    return FALSE;
1811
0
  winpr_RAND(data, length);
1812
0
  return TRUE;
1813
0
}
1814
1815
/* TODO: This function does manipulate data in rdpMcs
1816
 * TODO: Split this out of this function
1817
 */
1818
BOOL gcc_write_server_security_data(wStream* s, rdpMcs* mcs)
1819
0
{
1820
0
  if (!gcc_update_server_random(mcs_get_settings(mcs)))
1821
0
    return FALSE;
1822
1823
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1824
1825
0
  WINPR_ASSERT(s);
1826
0
  WINPR_ASSERT(settings);
1827
1828
0
  const size_t posHeader = Stream_GetPosition(s);
1829
0
  if (!gcc_write_user_data_header(s, SC_SECURITY, 12))
1830
0
    return FALSE;
1831
1832
0
  Stream_Write_UINT32(s, settings->EncryptionMethods); /* encryptionMethod */
1833
0
  Stream_Write_UINT32(s, settings->EncryptionLevel);   /* encryptionLevel */
1834
1835
0
  if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1836
0
    return TRUE;
1837
1838
0
  if (!Stream_EnsureRemainingCapacity(s, sizeof(UINT32) + settings->ServerRandomLength))
1839
0
    return FALSE;
1840
0
  Stream_Write_UINT32(s, settings->ServerRandomLength); /* serverRandomLen */
1841
0
  const size_t posCertLen = Stream_GetPosition(s);
1842
0
  Stream_Seek_UINT32(s); /* serverCertLen */
1843
0
  Stream_Write(s, settings->ServerRandom, settings->ServerRandomLength);
1844
1845
0
  const SSIZE_T len = freerdp_certificate_write_server_cert(
1846
0
      settings->RdpServerCertificate, CERT_TEMPORARILY_ISSUED | CERT_CHAIN_VERSION_1, s);
1847
0
  if (len < 0)
1848
0
    return FALSE;
1849
0
  const size_t end = Stream_GetPosition(s);
1850
1851
0
  WINPR_ASSERT(end >= posHeader);
1852
0
  const size_t diff = end - posHeader;
1853
0
  WINPR_ASSERT(diff <= UINT16_MAX);
1854
0
  Stream_SetPosition(s, posHeader);
1855
0
  if (!gcc_write_user_data_header(s, SC_SECURITY, (UINT16)diff))
1856
0
    return FALSE;
1857
0
  Stream_SetPosition(s, posCertLen);
1858
0
  WINPR_ASSERT(len <= UINT32_MAX);
1859
0
  Stream_Write_UINT32(s, (UINT32)len);
1860
0
  Stream_SetPosition(s, end);
1861
0
  return TRUE;
1862
0
}
1863
1864
/**
1865
 * Read a client network data block (TS_UD_CS_NET).
1866
 * msdn{cc240512}
1867
 *
1868
 * @param s stream
1869
 * @param mcs The MCS instance
1870
 *
1871
 * @return \b TRUE for success, \b FALSE otherwise
1872
 */
1873
1874
BOOL gcc_read_client_network_data(wStream* s, rdpMcs* mcs)
1875
0
{
1876
0
  WINPR_ASSERT(s);
1877
0
  WINPR_ASSERT(mcs);
1878
1879
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1880
0
    return FALSE;
1881
1882
0
  Stream_Read_UINT32(s, mcs->channelCount); /* channelCount */
1883
1884
0
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, mcs->channelCount, 12ull))
1885
0
    return FALSE;
1886
1887
0
  if (mcs->channelCount > CHANNEL_MAX_COUNT)
1888
0
  {
1889
0
    WLog_Print(mcs->log, WLOG_ERROR, "rdpMcs::channelCount %" PRIu32 " > maximum %" PRIu32,
1890
0
               mcs->channelCount, CHANNEL_MAX_COUNT);
1891
0
    return FALSE;
1892
0
  }
1893
1894
  /* channelDefArray */
1895
0
  for (UINT32 i = 0; i < mcs->channelCount; i++)
1896
0
  {
1897
    /**
1898
     * CHANNEL_DEF
1899
     * - name: an 8-byte array containing a null-terminated collection
1900
     *   of seven ANSI characters that uniquely identify the channel.
1901
     * - options: a 32-bit, unsigned integer. Channel option flags
1902
     */
1903
0
    rdpMcsChannel* channel = &mcs->channels[i];
1904
0
    Stream_Read(s, channel->Name, CHANNEL_NAME_LEN + 1); /* name (8 bytes) */
1905
1906
0
    if (!memchr(channel->Name, 0, CHANNEL_NAME_LEN + 1))
1907
0
    {
1908
0
      WLog_Print(
1909
0
          mcs->log, WLOG_ERROR,
1910
0
          "protocol violation: received a static channel name with missing null-termination");
1911
0
      return FALSE;
1912
0
    }
1913
1914
0
    Stream_Read_UINT32(s, channel->options); /* options (4 bytes) */
1915
0
    channel->ChannelId = mcs->baseChannelId++;
1916
0
  }
1917
1918
0
  return TRUE;
1919
0
}
1920
1921
/**
1922
 * Write a client network data block (TS_UD_CS_NET).
1923
 * msdn{cc240512}
1924
 * @param s stream
1925
 * @param mcs The MCS to use
1926
 *
1927
 * @return \b TRUE for success, \b FALSE otherwise
1928
 */
1929
1930
BOOL gcc_write_client_network_data(wStream* s, const rdpMcs* mcs)
1931
0
{
1932
0
  WINPR_ASSERT(s);
1933
0
  WINPR_ASSERT(mcs);
1934
0
  if (mcs->channelCount > 0)
1935
0
  {
1936
0
    const size_t length = mcs->channelCount * 12 + 8;
1937
0
    WINPR_ASSERT(length <= UINT16_MAX);
1938
0
    if (!gcc_write_user_data_header(s, CS_NET, (UINT16)length))
1939
0
      return FALSE;
1940
0
    Stream_Write_UINT32(s, mcs->channelCount); /* channelCount */
1941
1942
    /* channelDefArray */
1943
0
    for (UINT32 i = 0; i < mcs->channelCount; i++)
1944
0
    {
1945
      /* CHANNEL_DEF */
1946
0
      rdpMcsChannel* channel = &mcs->channels[i];
1947
0
      Stream_Write(s, channel->Name, CHANNEL_NAME_LEN + 1); /* name (8 bytes) */
1948
0
      Stream_Write_UINT32(s, channel->options);             /* options (4 bytes) */
1949
0
    }
1950
0
  }
1951
0
  return TRUE;
1952
0
}
1953
1954
BOOL gcc_read_server_network_data(wStream* s, rdpMcs* mcs)
1955
0
{
1956
0
  UINT16 channelId = 0;
1957
0
  UINT32 parsedChannelCount = 0;
1958
0
  WINPR_ASSERT(s);
1959
0
  WINPR_ASSERT(mcs);
1960
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1961
0
    return FALSE;
1962
1963
0
  mcs->IOChannelId = Stream_Get_UINT16(s);            /* MCSChannelId */
1964
0
  const uint16_t channelCount = Stream_Get_UINT16(s); /* channelCount */
1965
0
  parsedChannelCount = channelCount;
1966
1967
0
  if (channelCount != mcs->channelCount)
1968
0
  {
1969
0
    WLog_Print(mcs->log, WLOG_ERROR, "requested %" PRIu32 " channels, got %" PRIu16 " instead",
1970
0
               mcs->channelCount, channelCount);
1971
1972
    /* we ensure that the response is not bigger than the request */
1973
1974
0
    mcs->channelCount = channelCount;
1975
0
  }
1976
1977
0
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, channelCount, 2ull))
1978
0
    return FALSE;
1979
1980
0
  if (mcs->channelMaxCount < parsedChannelCount)
1981
0
  {
1982
0
    WLog_Print(mcs->log, WLOG_ERROR,
1983
0
               "requested %" PRIu32 " channels > channelMaxCount %" PRIu16, mcs->channelCount,
1984
0
               mcs->channelMaxCount);
1985
0
    return FALSE;
1986
0
  }
1987
1988
0
  for (UINT32 i = 0; i < parsedChannelCount; i++)
1989
0
  {
1990
0
    rdpMcsChannel* channel = &mcs->channels[i];
1991
0
    Stream_Read_UINT16(s, channelId); /* channelId */
1992
0
    channel->ChannelId = channelId;
1993
0
  }
1994
1995
0
  if (channelCount % 2 == 1)
1996
0
    return Stream_SafeSeek(s, 2); /* padding */
1997
1998
0
  return TRUE;
1999
0
}
2000
2001
BOOL gcc_write_server_network_data(wStream* s, const rdpMcs* mcs)
2002
0
{
2003
0
  WINPR_ASSERT(s);
2004
0
  WINPR_ASSERT(mcs);
2005
0
  const size_t payloadLen = 8 + mcs->channelCount * 2 + (mcs->channelCount % 2 == 1 ? 2 : 0);
2006
2007
0
  WINPR_ASSERT(payloadLen <= UINT16_MAX);
2008
0
  if (!gcc_write_user_data_header(s, SC_NET, (UINT16)payloadLen))
2009
0
    return FALSE;
2010
2011
0
  Stream_Write_UINT16(s, MCS_GLOBAL_CHANNEL_ID); /* MCSChannelId */
2012
0
  Stream_Write_UINT16(s,
2013
0
                      WINPR_ASSERTING_INT_CAST(uint16_t, mcs->channelCount)); /* channelCount */
2014
2015
0
  for (UINT32 i = 0; i < mcs->channelCount; i++)
2016
0
  {
2017
0
    const rdpMcsChannel* channel = &mcs->channels[i];
2018
0
    Stream_Write_UINT16(s, channel->ChannelId);
2019
0
  }
2020
2021
0
  if (mcs->channelCount % 2 == 1)
2022
0
    Stream_Write_UINT16(s, 0);
2023
2024
0
  return TRUE;
2025
0
}
2026
2027
/**
2028
 * Read a client cluster data block (TS_UD_CS_CLUSTER).
2029
 * msdn{cc240514}
2030
 * @param s stream
2031
 * @param mcs The MCS instance
2032
 *
2033
 * @return \b TRUE for success, \b FALSE otherwise
2034
 */
2035
2036
BOOL gcc_read_client_cluster_data(wStream* s, rdpMcs* mcs)
2037
0
{
2038
0
  char buffer[128] = { 0 };
2039
0
  UINT32 redirectedSessionId = 0;
2040
0
  rdpSettings* settings = mcs_get_settings(mcs);
2041
2042
0
  WINPR_ASSERT(s);
2043
0
  WINPR_ASSERT(settings);
2044
2045
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
2046
0
    return FALSE;
2047
2048
0
  Stream_Read_UINT32(s, settings->ClusterInfoFlags); /* flags */
2049
0
  Stream_Read_UINT32(s, redirectedSessionId);        /* redirectedSessionId */
2050
2051
0
  WLog_Print(mcs->log, WLOG_TRACE, "read ClusterInfoFlags=%s, RedirectedSessionId=0x%08" PRIx32,
2052
0
             rdp_cluster_info_flags_to_string(settings->ClusterInfoFlags, buffer, sizeof(buffer)),
2053
0
             redirectedSessionId);
2054
0
  if (settings->ClusterInfoFlags & REDIRECTED_SESSIONID_FIELD_VALID)
2055
0
    settings->RedirectedSessionId = redirectedSessionId;
2056
2057
0
  settings->ConsoleSession =
2058
0
      (settings->ClusterInfoFlags & REDIRECTED_SESSIONID_FIELD_VALID) ? TRUE : FALSE;
2059
0
  settings->RedirectSmartCards =
2060
0
      (settings->ClusterInfoFlags & REDIRECTED_SMARTCARD) ? TRUE : FALSE;
2061
2062
0
  if (Stream_GetRemainingLength(s) > 0)
2063
0
  {
2064
    /* The old Microsoft Mac RDP client can send a pad here */
2065
0
    Stream_Seek(s, Stream_GetRemainingLength(s));
2066
0
  }
2067
2068
0
  return TRUE;
2069
0
}
2070
2071
/**
2072
 * Write a client cluster data block (TS_UD_CS_CLUSTER).
2073
 * msdn{cc240514}
2074
 * @param s stream
2075
 * @param mcs The MCS instance
2076
 *
2077
 * @return \b TRUE for success, \b FALSE otherwise
2078
 */
2079
2080
BOOL gcc_write_client_cluster_data(wStream* s, const rdpMcs* mcs)
2081
0
{
2082
0
  char buffer[128] = { 0 };
2083
0
  UINT32 flags = 0;
2084
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2085
2086
0
  WINPR_ASSERT(s);
2087
0
  WINPR_ASSERT(settings);
2088
2089
0
  if (!gcc_write_user_data_header(s, CS_CLUSTER, 12))
2090
0
    return FALSE;
2091
0
  flags = settings->ClusterInfoFlags;
2092
2093
0
  if (settings->ConsoleSession || settings->RedirectedSessionId)
2094
0
    flags |= REDIRECTED_SESSIONID_FIELD_VALID;
2095
2096
0
  if (settings->RedirectSmartCards && settings->SmartcardLogon)
2097
0
    flags |= REDIRECTED_SMARTCARD;
2098
2099
0
  if (flags & REDIRECTION_SUPPORTED)
2100
0
  {
2101
    /* REDIRECTION_VERSION6 requires multitransport enabled.
2102
     * if we run without that use REDIRECTION_VERSION5 */
2103
0
    if (freerdp_settings_get_bool(settings, FreeRDP_SupportMultitransport))
2104
0
      flags |= (REDIRECTION_VERSION6 << 2);
2105
0
    else
2106
0
      flags |= (REDIRECTION_VERSION5 << 2);
2107
0
  }
2108
2109
0
  WLog_Print(mcs->log, WLOG_TRACE, "write ClusterInfoFlags=%s, RedirectedSessionId=0x%08" PRIx32,
2110
0
             rdp_cluster_info_flags_to_string(flags, buffer, sizeof(buffer)),
2111
0
             settings->RedirectedSessionId);
2112
0
  Stream_Write_UINT32(s, flags);                         /* flags */
2113
0
  Stream_Write_UINT32(s, settings->RedirectedSessionId); /* redirectedSessionID */
2114
0
  return TRUE;
2115
0
}
2116
2117
/**
2118
 * Read a client monitor data block (TS_UD_CS_MONITOR).
2119
 * msdn{dd305336}
2120
 * @param s stream
2121
 * @param mcs The MCS instance
2122
 *
2123
 * @return \b TRUE for success, \b FALSE otherwise
2124
 */
2125
2126
BOOL gcc_read_client_monitor_data(wStream* s, rdpMcs* mcs)
2127
0
{
2128
0
  UINT32 monitorCount = 0;
2129
0
  rdpSettings* settings = mcs_get_settings(mcs);
2130
2131
0
  WINPR_ASSERT(s);
2132
0
  WINPR_ASSERT(settings);
2133
2134
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
2135
0
    return FALSE;
2136
2137
0
  Stream_Read_UINT32(s, settings->MonitorFlags); /* flags */
2138
0
  Stream_Read_UINT32(s, monitorCount);           /* monitorCount */
2139
2140
  /* 2.2.1.3.6 Client Monitor Data -
2141
   * monitorCount (4 bytes): A 32-bit, unsigned integer. The number of display
2142
   * monitor definitions in the monitorDefArray field (the maximum allowed is 16).
2143
   */
2144
0
  if (monitorCount > 16)
2145
0
  {
2146
0
    WLog_Print(mcs->log, WLOG_ERROR, "announced monitors(%" PRIu32 ") exceed the 16 limit",
2147
0
               monitorCount);
2148
0
    return FALSE;
2149
0
  }
2150
2151
0
  if (monitorCount > settings->MonitorDefArraySize)
2152
0
  {
2153
0
    WLog_Print(mcs->log, WLOG_ERROR,
2154
0
               "too many announced monitors(%" PRIu32 "), clamping to %" PRIu32 "",
2155
0
               monitorCount, settings->MonitorDefArraySize);
2156
0
    monitorCount = settings->MonitorDefArraySize;
2157
0
  }
2158
2159
0
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, monitorCount, 20))
2160
0
    return FALSE;
2161
2162
0
  settings->MonitorCount = monitorCount;
2163
2164
0
  for (UINT32 index = 0; index < monitorCount; index++)
2165
0
  {
2166
0
    rdpMonitor* current = &settings->MonitorDefArray[index];
2167
2168
0
    const INT32 left = Stream_Get_INT32(s);    /* left */
2169
0
    const INT32 top = Stream_Get_INT32(s);     /* top */
2170
0
    const INT32 right = Stream_Get_INT32(s);   /* right */
2171
0
    const INT32 bottom = Stream_Get_INT32(s);  /* bottom */
2172
0
    const UINT32 flags = Stream_Get_UINT32(s); /* flags */
2173
2174
0
    if ((left > right) || (top > bottom))
2175
0
    {
2176
0
      WLog_Print(mcs->log, WLOG_ERROR, "rdpMonitor::rect %dx%d-%dx%d invalid", left, top,
2177
0
                 right, bottom);
2178
0
      return FALSE;
2179
0
    }
2180
2181
0
    const INT64 w = right - left;
2182
0
    const INT64 h = bottom - top;
2183
0
    if ((w >= INT32_MAX) || (h >= INT32_MAX) || (w < 0) || (h < 0))
2184
0
    {
2185
0
      WLog_Print(mcs->log, WLOG_ERROR,
2186
0
                 "rdpMonitor::width/height %" PRId64 "/%" PRId64 " invalid", w, h);
2187
0
      return FALSE;
2188
0
    }
2189
2190
0
    current->x = left;
2191
0
    current->y = top;
2192
0
    current->width = WINPR_ASSERTING_INT_CAST(int32_t, w + 1);
2193
0
    current->height = WINPR_ASSERTING_INT_CAST(int32_t, h + 1);
2194
0
    current->is_primary = (flags & MONITOR_PRIMARY) ? TRUE : FALSE;
2195
0
  }
2196
2197
0
  return TRUE;
2198
0
}
2199
2200
/**
2201
 * Write a client monitor data block (TS_UD_CS_MONITOR).
2202
 * msdn{dd305336}
2203
 * @param s stream
2204
 * @param mcs The MCS to use
2205
 *
2206
 * @return \b TRUE for success, \b FALSE otherwise
2207
 */
2208
2209
BOOL gcc_write_client_monitor_data(wStream* s, const rdpMcs* mcs)
2210
0
{
2211
0
  INT32 baseX = 0;
2212
0
  INT32 baseY = 0;
2213
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2214
2215
0
  WINPR_ASSERT(s);
2216
0
  WINPR_ASSERT(settings);
2217
2218
0
  WLog_Print(mcs->log, WLOG_DEBUG, "MonitorCount=%" PRIu32, settings->MonitorCount);
2219
0
  if (settings->MonitorCount > 1)
2220
0
  {
2221
0
    const size_t len = (20 * settings->MonitorCount) + 12;
2222
0
    WINPR_ASSERT(len <= UINT16_MAX);
2223
0
    const UINT16 length = (UINT16)len;
2224
0
    if (!gcc_write_user_data_header(s, CS_MONITOR, length))
2225
0
      return FALSE;
2226
0
    Stream_Write_UINT32(s, settings->MonitorFlags); /* flags */
2227
0
    Stream_Write_UINT32(s, settings->MonitorCount); /* monitorCount */
2228
2229
    /* first pass to get the primary monitor coordinates (it is supposed to be
2230
     * in (0,0) */
2231
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2232
0
    {
2233
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2234
0
      if (current->is_primary)
2235
0
      {
2236
0
        baseX = current->x;
2237
0
        baseY = current->y;
2238
0
        break;
2239
0
      }
2240
0
    }
2241
2242
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2243
0
    {
2244
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2245
0
      const INT32 left = current->x - baseX;
2246
0
      const INT32 top = current->y - baseY;
2247
0
      const INT32 right = left + current->width - 1;
2248
0
      const INT32 bottom = top + current->height - 1;
2249
0
      const UINT32 flags = current->is_primary ? MONITOR_PRIMARY : 0;
2250
0
      WLog_Print(mcs->log, WLOG_DEBUG,
2251
0
                 "Monitor[%" PRIu32 "]: top=%" PRId32 ", left=%" PRId32 ", bottom=%" PRId32
2252
0
                 ", right=%" PRId32 ", flags=%" PRIu32,
2253
0
                 i, top, left, bottom, right, flags);
2254
0
      Stream_Write_INT32(s, left);   /* left */
2255
0
      Stream_Write_INT32(s, top);    /* top */
2256
0
      Stream_Write_INT32(s, right);  /* right */
2257
0
      Stream_Write_INT32(s, bottom); /* bottom */
2258
0
      Stream_Write_UINT32(s, flags); /* flags */
2259
0
    }
2260
0
  }
2261
0
  WLog_Print(mcs->log, WLOG_DEBUG, "FINISHED");
2262
0
  return TRUE;
2263
0
}
2264
2265
BOOL gcc_read_client_monitor_extended_data(wStream* s, rdpMcs* mcs)
2266
0
{
2267
0
  UINT32 monitorCount = 0;
2268
0
  UINT32 monitorAttributeSize = 0;
2269
0
  rdpSettings* settings = mcs_get_settings(mcs);
2270
2271
0
  WINPR_ASSERT(s);
2272
0
  WINPR_ASSERT(settings);
2273
2274
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 12))
2275
0
    return FALSE;
2276
2277
0
  Stream_Read_UINT32(s, settings->MonitorAttributeFlags); /* flags */
2278
0
  Stream_Read_UINT32(s, monitorAttributeSize);            /* monitorAttributeSize */
2279
0
  Stream_Read_UINT32(s, monitorCount);                    /* monitorCount */
2280
2281
0
  if (monitorAttributeSize != 20)
2282
0
  {
2283
0
    WLog_Print(mcs->log, WLOG_ERROR,
2284
0
               "TS_UD_CS_MONITOR_EX::monitorAttributeSize %" PRIu32 " != 20",
2285
0
               monitorAttributeSize);
2286
0
    return FALSE;
2287
0
  }
2288
2289
0
  if (!Stream_CheckAndLogRequiredCapacityOfSizeWLog(mcs->log, s, monitorCount,
2290
0
                                                    monitorAttributeSize))
2291
0
    return FALSE;
2292
2293
0
  if (settings->MonitorCount != monitorCount)
2294
0
  {
2295
0
    WLog_Print(mcs->log, WLOG_ERROR,
2296
0
               "(TS_UD_CS_MONITOR_EX)::monitorCount %" PRIu32 " != expected %" PRIu32,
2297
0
               monitorCount, settings->MonitorCount);
2298
0
    return FALSE;
2299
0
  }
2300
2301
0
  settings->HasMonitorAttributes = TRUE;
2302
2303
0
  for (UINT32 index = 0; index < monitorCount; index++)
2304
0
  {
2305
0
    rdpMonitor* current = &settings->MonitorDefArray[index];
2306
0
    Stream_Read_UINT32(s, current->attributes.physicalWidth);      /* physicalWidth */
2307
0
    Stream_Read_UINT32(s, current->attributes.physicalHeight);     /* physicalHeight */
2308
0
    Stream_Read_UINT32(s, current->attributes.orientation);        /* orientation */
2309
0
    Stream_Read_UINT32(s, current->attributes.desktopScaleFactor); /* desktopScaleFactor */
2310
0
    Stream_Read_UINT32(s, current->attributes.deviceScaleFactor);  /* deviceScaleFactor */
2311
0
  }
2312
2313
0
  return TRUE;
2314
0
}
2315
2316
BOOL gcc_write_client_monitor_extended_data(wStream* s, const rdpMcs* mcs)
2317
0
{
2318
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2319
2320
0
  WINPR_ASSERT(s);
2321
0
  WINPR_ASSERT(settings);
2322
2323
0
  if (settings->HasMonitorAttributes)
2324
0
  {
2325
0
    const size_t length = (20 * settings->MonitorCount) + 16;
2326
0
    WINPR_ASSERT(length <= UINT16_MAX);
2327
0
    if (!gcc_write_user_data_header(s, CS_MONITOR_EX, (UINT16)length))
2328
0
      return FALSE;
2329
0
    Stream_Write_UINT32(s, settings->MonitorAttributeFlags); /* flags */
2330
0
    Stream_Write_UINT32(s, 20);                              /* monitorAttributeSize */
2331
0
    Stream_Write_UINT32(s, settings->MonitorCount);          /* monitorCount */
2332
2333
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2334
0
    {
2335
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2336
0
      Stream_Write_UINT32(s, current->attributes.physicalWidth);      /* physicalWidth */
2337
0
      Stream_Write_UINT32(s, current->attributes.physicalHeight);     /* physicalHeight */
2338
0
      Stream_Write_UINT32(s, current->attributes.orientation);        /* orientation */
2339
0
      Stream_Write_UINT32(s, current->attributes.desktopScaleFactor); /* desktopScaleFactor */
2340
0
      Stream_Write_UINT32(s, current->attributes.deviceScaleFactor);  /* deviceScaleFactor */
2341
0
    }
2342
0
  }
2343
0
  return TRUE;
2344
0
}
2345
2346
/**
2347
 * Read a client message channel data block (TS_UD_CS_MCS_MSGCHANNEL).
2348
 * msdn{jj217627}
2349
 * @param s stream
2350
 * @param mcs The MCS instance
2351
 *
2352
 * @return \b TRUE for success, \b FALSE otherwise
2353
 */
2354
2355
BOOL gcc_read_client_message_channel_data(wStream* s, rdpMcs* mcs)
2356
0
{
2357
0
  WINPR_ASSERT(s);
2358
0
  WINPR_ASSERT(mcs);
2359
2360
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2361
0
    return FALSE;
2362
2363
0
  Stream_Read_UINT32(s, mcs->flags);
2364
0
  mcs->messageChannelId = mcs->baseChannelId++;
2365
0
  return TRUE;
2366
0
}
2367
2368
/**
2369
 * Write a client message channel data block (TS_UD_CS_MCS_MSGCHANNEL).
2370
 * msdn{jj217627}
2371
 * @param s stream
2372
 * @param mcs The MCS instance
2373
 *
2374
 * @return \b TRUE for success, \b FALSE otherwise
2375
 */
2376
2377
BOOL gcc_write_client_message_channel_data(wStream* s, const rdpMcs* mcs)
2378
0
{
2379
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2380
2381
0
  WINPR_ASSERT(s);
2382
0
  WINPR_ASSERT(mcs);
2383
0
  WINPR_ASSERT(settings);
2384
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect) ||
2385
0
      settings->SupportHeartbeatPdu || settings->SupportMultitransport)
2386
0
  {
2387
0
    if (!gcc_write_user_data_header(s, CS_MCS_MSGCHANNEL, 8))
2388
0
      return FALSE;
2389
0
    Stream_Write_UINT32(s, mcs->flags); /* flags */
2390
0
  }
2391
0
  return TRUE;
2392
0
}
2393
2394
BOOL gcc_read_server_message_channel_data(wStream* s, rdpMcs* mcs)
2395
0
{
2396
0
  UINT16 MCSChannelId = 0;
2397
0
  WINPR_ASSERT(s);
2398
0
  WINPR_ASSERT(mcs);
2399
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
2400
0
    return FALSE;
2401
2402
0
  Stream_Read_UINT16(s, MCSChannelId); /* MCSChannelId */
2403
  /* Save the MCS message channel id */
2404
0
  mcs->messageChannelId = MCSChannelId;
2405
0
  return TRUE;
2406
0
}
2407
2408
BOOL gcc_write_server_message_channel_data(wStream* s, const rdpMcs* mcs)
2409
0
{
2410
0
  WINPR_ASSERT(s);
2411
0
  WINPR_ASSERT(mcs);
2412
0
  if (mcs->messageChannelId == 0)
2413
0
    return TRUE;
2414
2415
0
  if (!gcc_write_user_data_header(s, SC_MCS_MSGCHANNEL, 6))
2416
0
    return FALSE;
2417
2418
0
  Stream_Write_UINT16(s, mcs->messageChannelId); /* mcsChannelId (2 bytes) */
2419
0
  return TRUE;
2420
0
}
2421
2422
/**
2423
 * Read a client multitransport channel data block (TS_UD_CS_MULTITRANSPORT).
2424
 * msdn{jj217498}
2425
 * @param s stream
2426
 * @param mcs The MCS instance
2427
 *
2428
 * @return \b TRUE for success, \b FALSE otherwise
2429
 */
2430
2431
BOOL gcc_read_client_multitransport_channel_data(wStream* s, rdpMcs* mcs)
2432
0
{
2433
0
  rdpSettings* settings = mcs_get_settings(mcs);
2434
2435
0
  WINPR_ASSERT(s);
2436
0
  WINPR_ASSERT(settings);
2437
2438
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2439
0
    return FALSE;
2440
2441
0
  UINT32 remoteFlags = 0;
2442
0
  Stream_Read_UINT32(s, remoteFlags);
2443
0
  settings->MultitransportFlags &= remoteFlags; /* merge local and remote flags */
2444
0
  return TRUE;
2445
0
}
2446
2447
/**
2448
 * Write a client multitransport channel data block (TS_UD_CS_MULTITRANSPORT).
2449
 * msdn{jj217498}
2450
 *
2451
 * @param s stream
2452
 * @param mcs The MCS instance
2453
 *
2454
 * @return \b TRUE for success, \b FALSE otherwise
2455
 */
2456
2457
BOOL gcc_write_client_multitransport_channel_data(wStream* s, const rdpMcs* mcs)
2458
0
{
2459
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2460
2461
0
  WINPR_ASSERT(s);
2462
0
  WINPR_ASSERT(settings);
2463
0
  if (!gcc_write_user_data_header(s, CS_MULTITRANSPORT, 8))
2464
0
    return FALSE;
2465
0
  Stream_Write_UINT32(s, settings->MultitransportFlags); /* flags */
2466
0
  return TRUE;
2467
0
}
2468
2469
BOOL gcc_read_server_multitransport_channel_data(wStream* s, rdpMcs* mcs)
2470
0
{
2471
0
  rdpSettings* settings = mcs_get_settings(mcs);
2472
0
  UINT32 remoteFlags = 0;
2473
2474
0
  WINPR_ASSERT(s);
2475
0
  WINPR_ASSERT(settings);
2476
0
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2477
0
    return FALSE;
2478
2479
0
  Stream_Read_UINT32(s, remoteFlags);
2480
0
  settings->MultitransportFlags &= remoteFlags; /* merge with client setting */
2481
0
  return TRUE;
2482
0
}
2483
2484
BOOL gcc_write_server_multitransport_channel_data(wStream* s, const rdpMcs* mcs)
2485
0
{
2486
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2487
2488
0
  WINPR_ASSERT(s);
2489
0
  WINPR_ASSERT(settings);
2490
2491
0
  if (!gcc_write_user_data_header(s, SC_MULTITRANSPORT, 8))
2492
0
    return FALSE;
2493
2494
0
  Stream_Write_UINT32(s, settings->MultitransportFlags); /* flags (4 bytes) */
2495
0
  return TRUE;
2496
0
}