Coverage Report

Created: 2025-08-26 06:37

/src/FreeRDP/libfreerdp/core/fastpath.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * Fast Path
4
 *
5
 * Copyright 2011 Vic Lee
6
 * Copyright 2014 Norbert Federa <norbert.federa@thincast.com>
7
 * Copyright 2017 Armin Novak <armin.novak@thincast.com>
8
 * Copyright 2017 Thincast Technologies GmbH
9
 *
10
 * Licensed under the Apache License, Version 2.0 (the "License");
11
 * you may not use this file except in compliance with the License.
12
 * You may obtain a copy of the License at
13
 *
14
 *     http://www.apache.org/licenses/LICENSE-2.0
15
 *
16
 * Unless required by applicable law or agreed to in writing, software
17
 * distributed under the License is distributed on an "AS IS" BASIS,
18
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19
 * See the License for the specific language governing permissions and
20
 * limitations under the License.
21
 */
22
23
#include <freerdp/config.h>
24
25
#include "settings.h"
26
27
#include <stdio.h>
28
#include <stdlib.h>
29
#include <string.h>
30
31
#include <winpr/crt.h>
32
#include <winpr/assert.h>
33
#include <winpr/stream.h>
34
35
#include <freerdp/api.h>
36
#include <freerdp/log.h>
37
#include <freerdp/crypto/per.h>
38
39
#include "orders.h"
40
#include "update.h"
41
#include "surface.h"
42
#include "fastpath.h"
43
#include "rdp.h"
44
45
#include "../cache/pointer.h"
46
#include "../cache/palette.h"
47
#include "../cache/bitmap.h"
48
49
#define TAG FREERDP_TAG("core.fastpath")
50
51
enum FASTPATH_INPUT_ENCRYPTION_FLAGS
52
{
53
  FASTPATH_INPUT_SECURE_CHECKSUM = 0x1,
54
  FASTPATH_INPUT_ENCRYPTED = 0x2
55
};
56
57
enum FASTPATH_OUTPUT_ENCRYPTION_FLAGS
58
{
59
  FASTPATH_OUTPUT_SECURE_CHECKSUM = 0x1,
60
  FASTPATH_OUTPUT_ENCRYPTED = 0x2
61
};
62
63
struct rdp_fastpath
64
{
65
  rdpRdp* rdp;
66
  wStream* fs;
67
  BYTE encryptionFlags;
68
  BYTE numberEvents;
69
  wStream* updateData;
70
  int fragmentation;
71
};
72
73
/**
74
 * Fast-Path packet format is defined in [MS-RDPBCGR] 2.2.9.1.2, which revises
75
 * server output packets from the first byte with the goal of improving
76
 * bandwidth.
77
 *
78
 * Slow-Path packet always starts with TPKT header, which has the first
79
 * byte 0x03, while Fast-Path packet starts with 2 zero bits in the first
80
 * two less significant bits of the first byte.
81
 */
82
83
static const char* const FASTPATH_UPDATETYPE_STRINGS[] = {
84
  "Orders",                 /* 0x0 */
85
  "Bitmap",                 /* 0x1 */
86
  "Palette",                /* 0x2 */
87
  "Synchronize",            /* 0x3 */
88
  "Surface Commands",       /* 0x4 */
89
  "System Pointer Hidden",  /* 0x5 */
90
  "System Pointer Default", /* 0x6 */
91
  "???",                    /* 0x7 */
92
  "Pointer Position",       /* 0x8 */
93
  "Color Pointer",          /* 0x9 */
94
  "Cached Pointer",         /* 0xA */
95
  "New Pointer",            /* 0xB */
96
};
97
98
static const char* fastpath_update_to_string(UINT8 update)
99
10.1k
{
100
10.1k
  if (update >= ARRAYSIZE(FASTPATH_UPDATETYPE_STRINGS))
101
512
    return "UNKNOWN";
102
103
9.61k
  return FASTPATH_UPDATETYPE_STRINGS[update];
104
10.1k
}
105
106
static BOOL fastpath_read_update_header(wStream* s, BYTE* updateCode, BYTE* fragmentation,
107
                                        BYTE* compression)
108
35.2k
{
109
35.2k
  BYTE updateHeader = 0;
110
111
35.2k
  if (!s || !updateCode || !fragmentation || !compression)
112
0
    return FALSE;
113
114
35.2k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
115
0
    return FALSE;
116
117
35.2k
  Stream_Read_UINT8(s, updateHeader);
118
35.2k
  *updateCode = updateHeader & 0x0F;
119
35.2k
  *fragmentation = (updateHeader >> 4) & 0x03;
120
35.2k
  *compression = (updateHeader >> 6) & 0x03;
121
35.2k
  return TRUE;
122
35.2k
}
123
124
static BOOL fastpath_write_update_header(wStream* s, const FASTPATH_UPDATE_HEADER* fpUpdateHeader)
125
121
{
126
121
  BYTE updateHeader = 0;
127
121
  WINPR_ASSERT(fpUpdateHeader);
128
129
121
  updateHeader |= fpUpdateHeader->updateCode & 0x0F;
130
121
  updateHeader |= (fpUpdateHeader->fragmentation & 0x03) << 4;
131
121
  updateHeader |= (fpUpdateHeader->compression & 0x03) << 6;
132
133
121
  if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 1))
134
0
    return FALSE;
135
121
  Stream_Write_UINT8(s, updateHeader);
136
137
121
  if (fpUpdateHeader->compression)
138
0
  {
139
0
    if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 1))
140
0
      return FALSE;
141
142
0
    Stream_Write_UINT8(s, fpUpdateHeader->compressionFlags);
143
0
  }
144
145
121
  if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 2))
146
0
    return FALSE;
147
148
121
  Stream_Write_UINT16(s, fpUpdateHeader->size);
149
121
  return TRUE;
150
121
}
151
152
static UINT32 fastpath_get_update_header_size(FASTPATH_UPDATE_HEADER* fpUpdateHeader)
153
121
{
154
121
  WINPR_ASSERT(fpUpdateHeader);
155
121
  return (fpUpdateHeader->compression) ? 4 : 3;
156
121
}
157
158
static BOOL fastpath_write_update_pdu_header(wStream* s,
159
                                             const FASTPATH_UPDATE_PDU_HEADER* fpUpdatePduHeader,
160
                                             rdpRdp* rdp)
161
121
{
162
121
  BYTE fpOutputHeader = 0;
163
121
  WINPR_ASSERT(fpUpdatePduHeader);
164
121
  WINPR_ASSERT(rdp);
165
166
121
  if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 3))
167
0
    return FALSE;
168
169
121
  fpOutputHeader |= (fpUpdatePduHeader->action & 0x03);
170
121
  fpOutputHeader |= (fpUpdatePduHeader->secFlags & 0x03) << 6;
171
121
  Stream_Write_UINT8(s, fpOutputHeader);                          /* fpOutputHeader (1 byte) */
172
121
  Stream_Write_UINT8(s, 0x80 | (fpUpdatePduHeader->length >> 8)); /* length1 */
173
121
  Stream_Write_UINT8(s, fpUpdatePduHeader->length & 0xFF);        /* length2 */
174
175
121
  if (fpUpdatePduHeader->secFlags)
176
0
  {
177
0
    WINPR_ASSERT(rdp->settings);
178
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
179
0
    {
180
0
      if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 4))
181
0
        return FALSE;
182
183
0
      Stream_Write(s, fpUpdatePduHeader->fipsInformation, 4);
184
0
    }
185
186
0
    if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
187
0
      return FALSE;
188
189
0
    Stream_Write(s, fpUpdatePduHeader->dataSignature, 8);
190
0
  }
191
192
121
  return TRUE;
193
121
}
194
195
static UINT32 fastpath_get_update_pdu_header_size(FASTPATH_UPDATE_PDU_HEADER* fpUpdatePduHeader,
196
                                                  rdpRdp* rdp)
197
121
{
198
121
  UINT32 size = 3; /* fpUpdatePduHeader + length1 + length2 */
199
200
121
  if (!fpUpdatePduHeader || !rdp)
201
0
    return 0;
202
203
121
  if (fpUpdatePduHeader->secFlags)
204
0
  {
205
0
    size += 8; /* dataSignature */
206
207
0
    WINPR_ASSERT(rdp->settings);
208
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
209
0
      size += 4; /* fipsInformation */
210
0
  }
211
212
121
  return size;
213
121
}
214
215
BOOL fastpath_read_header_rdp(rdpFastPath* fastpath, wStream* s, UINT16* length)
216
18.3k
{
217
18.3k
  BYTE header = 0;
218
219
18.3k
  if (!s || !length)
220
0
    return FALSE;
221
222
18.3k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
223
5.68k
    return FALSE;
224
225
12.6k
  Stream_Read_UINT8(s, header);
226
227
12.6k
  if (fastpath)
228
12.6k
  {
229
12.6k
    fastpath->encryptionFlags = (header & 0xC0) >> 6;
230
12.6k
    fastpath->numberEvents = (header & 0x3C) >> 2;
231
12.6k
  }
232
233
12.6k
  if (!per_read_length(s, length))
234
222
    return FALSE;
235
236
12.4k
  const size_t pos = Stream_GetPosition(s);
237
12.4k
  if (pos > *length)
238
8.52k
    return FALSE;
239
240
3.89k
  *length = *length - (UINT16)pos;
241
3.89k
  return TRUE;
242
12.4k
}
243
244
static BOOL fastpath_recv_orders(rdpFastPath* fastpath, wStream* s)
245
11.8k
{
246
11.8k
  rdpUpdate* update = NULL;
247
11.8k
  UINT16 numberOrders = 0;
248
249
11.8k
  if (!fastpath || !fastpath->rdp || !s)
250
0
  {
251
0
    WLog_ERR(TAG, "Invalid arguments");
252
0
    return FALSE;
253
0
  }
254
255
11.8k
  update = fastpath->rdp->update;
256
257
11.8k
  if (!update)
258
0
  {
259
0
    WLog_ERR(TAG, "Invalid configuration");
260
0
    return FALSE;
261
0
  }
262
263
11.8k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
264
2.11k
    return FALSE;
265
266
9.77k
  Stream_Read_UINT16(s, numberOrders); /* numberOrders (2 bytes) */
267
268
744k
  while (numberOrders > 0)
269
737k
  {
270
737k
    if (!update_recv_order(update, s))
271
2.91k
      return FALSE;
272
273
734k
    numberOrders--;
274
734k
  }
275
276
6.86k
  return TRUE;
277
9.77k
}
278
279
static BOOL fastpath_recv_update_common(rdpFastPath* fastpath, wStream* s)
280
1.26k
{
281
1.26k
  BOOL rc = FALSE;
282
1.26k
  UINT16 updateType = 0;
283
1.26k
  rdpUpdate* update = NULL;
284
1.26k
  rdpContext* context = NULL;
285
1.26k
  BOOL defaultReturn = 0;
286
287
1.26k
  if (!fastpath || !s || !fastpath->rdp)
288
0
    return FALSE;
289
290
1.26k
  update = fastpath->rdp->update;
291
292
1.26k
  if (!update || !update->context)
293
0
    return FALSE;
294
295
1.26k
  context = update->context;
296
297
1.26k
  defaultReturn = freerdp_settings_get_bool(context->settings, FreeRDP_DeactivateClientDecoding);
298
299
1.26k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
300
758
    return FALSE;
301
302
511
  Stream_Read_UINT16(s, updateType); /* updateType (2 bytes) */
303
511
  switch (updateType)
304
511
  {
305
308
    case UPDATE_TYPE_BITMAP:
306
308
    {
307
308
      BITMAP_UPDATE* bitmap_update = update_read_bitmap_update(update, s);
308
309
308
      if (!bitmap_update)
310
169
        return FALSE;
311
312
139
      rc = IFCALLRESULT(defaultReturn, update->BitmapUpdate, context, bitmap_update);
313
139
      free_bitmap_update(context, bitmap_update);
314
139
    }
315
0
    break;
316
317
113
    case UPDATE_TYPE_PALETTE:
318
113
    {
319
113
      PALETTE_UPDATE* palette_update = update_read_palette(update, s);
320
321
113
      if (!palette_update)
322
78
        return FALSE;
323
324
35
      rc = IFCALLRESULT(defaultReturn, update->Palette, context, palette_update);
325
35
      free_palette_update(context, palette_update);
326
35
    }
327
0
    break;
328
329
90
    default:
330
90
      break;
331
511
  }
332
333
264
  return rc;
334
511
}
335
336
static BOOL fastpath_recv_update_synchronize(WINPR_ATTR_UNUSED rdpFastPath* fastpath, wStream* s)
337
4.07k
{
338
  /* server 2008 can send invalid synchronize packet with missing padding,
339
    so don't return FALSE even if the packet is invalid */
340
4.07k
  WINPR_ASSERT(fastpath);
341
4.07k
  WINPR_ASSERT(s);
342
343
4.07k
  const size_t len = Stream_GetRemainingLength(s);
344
4.07k
  const size_t skip = MIN(2, len);
345
4.07k
  return Stream_SafeSeek(s, skip); /* size (2 bytes), MUST be set to zero */
346
4.07k
}
347
348
static int fastpath_recv_update(rdpFastPath* fastpath, BYTE updateCode, wStream* s)
349
24.0k
{
350
24.0k
  BOOL rc = FALSE;
351
24.0k
  int status = 0;
352
353
24.0k
  if (!fastpath || !fastpath->rdp || !s)
354
0
    return -1;
355
356
24.0k
  Stream_SealLength(s);
357
24.0k
  Stream_SetPosition(s, 0);
358
359
24.0k
  rdpUpdate* update = fastpath->rdp->update;
360
361
24.0k
  if (!update || !update->pointer || !update->context)
362
0
    return -1;
363
364
24.0k
  rdpContext* context = update->context;
365
24.0k
  WINPR_ASSERT(context);
366
367
24.0k
  rdpPointerUpdate* pointer = update->pointer;
368
24.0k
  WINPR_ASSERT(pointer);
369
370
#ifdef WITH_DEBUG_RDP
371
  DEBUG_RDP(fastpath->rdp, "recv Fast-Path %s Update (0x%02" PRIX8 "), length:%" PRIuz "",
372
            fastpath_update_to_string(updateCode), updateCode, Stream_GetRemainingLength(s));
373
#endif
374
375
24.0k
  const BOOL defaultReturn =
376
24.0k
      freerdp_settings_get_bool(context->settings, FreeRDP_DeactivateClientDecoding);
377
24.0k
  switch (updateCode)
378
24.0k
  {
379
11.8k
    case FASTPATH_UPDATETYPE_ORDERS:
380
11.8k
      rc = fastpath_recv_orders(fastpath, s);
381
11.8k
      break;
382
383
1.04k
    case FASTPATH_UPDATETYPE_BITMAP:
384
1.26k
    case FASTPATH_UPDATETYPE_PALETTE:
385
1.26k
      rc = fastpath_recv_update_common(fastpath, s);
386
1.26k
      break;
387
388
4.07k
    case FASTPATH_UPDATETYPE_SYNCHRONIZE:
389
4.07k
      if (!fastpath_recv_update_synchronize(fastpath, s))
390
0
        WLog_ERR(TAG, "fastpath_recv_update_synchronize failure but we continue");
391
4.07k
      else
392
4.07k
        rc = IFCALLRESULT(TRUE, update->Synchronize, context);
393
394
4.07k
      break;
395
396
5.35k
    case FASTPATH_UPDATETYPE_SURFCMDS:
397
5.35k
      status = update_recv_surfcmds(update, s);
398
5.35k
      rc = (status < 0) ? FALSE : TRUE;
399
5.35k
      break;
400
401
65
    case FASTPATH_UPDATETYPE_PTR_NULL:
402
65
    {
403
65
      POINTER_SYSTEM_UPDATE pointer_system = { 0 };
404
65
      pointer_system.type = SYSPTR_NULL;
405
65
      rc = IFCALLRESULT(defaultReturn, pointer->PointerSystem, context, &pointer_system);
406
65
    }
407
65
    break;
408
409
96
    case FASTPATH_UPDATETYPE_PTR_DEFAULT:
410
96
    {
411
96
      POINTER_SYSTEM_UPDATE pointer_system = { 0 };
412
96
      pointer_system.type = SYSPTR_DEFAULT;
413
96
      rc = IFCALLRESULT(defaultReturn, pointer->PointerSystem, context, &pointer_system);
414
96
    }
415
96
    break;
416
417
133
    case FASTPATH_UPDATETYPE_PTR_POSITION:
418
133
    {
419
133
      POINTER_POSITION_UPDATE* pointer_position = update_read_pointer_position(update, s);
420
421
133
      if (pointer_position)
422
89
      {
423
89
        rc = IFCALLRESULT(defaultReturn, pointer->PointerPosition, context,
424
89
                          pointer_position);
425
89
        free_pointer_position_update(context, pointer_position);
426
89
      }
427
133
    }
428
133
    break;
429
430
259
    case FASTPATH_UPDATETYPE_COLOR:
431
259
    {
432
259
      POINTER_COLOR_UPDATE* pointer_color = update_read_pointer_color(update, s, 24);
433
434
259
      if (pointer_color)
435
117
      {
436
117
        rc = IFCALLRESULT(defaultReturn, pointer->PointerColor, context, pointer_color);
437
117
        free_pointer_color_update(context, pointer_color);
438
117
      }
439
259
    }
440
259
    break;
441
442
183
    case FASTPATH_UPDATETYPE_CACHED:
443
183
    {
444
183
      POINTER_CACHED_UPDATE* pointer_cached = update_read_pointer_cached(update, s);
445
446
183
      if (pointer_cached)
447
54
      {
448
54
        rc = IFCALLRESULT(defaultReturn, pointer->PointerCached, context, pointer_cached);
449
54
        free_pointer_cached_update(context, pointer_cached);
450
54
      }
451
183
    }
452
183
    break;
453
454
134
    case FASTPATH_UPDATETYPE_POINTER:
455
134
    {
456
134
      POINTER_NEW_UPDATE* pointer_new = update_read_pointer_new(update, s);
457
458
134
      if (pointer_new)
459
21
      {
460
21
        rc = IFCALLRESULT(defaultReturn, pointer->PointerNew, context, pointer_new);
461
21
        free_pointer_new_update(context, pointer_new);
462
21
      }
463
134
    }
464
134
    break;
465
466
462
    case FASTPATH_UPDATETYPE_LARGE_POINTER:
467
462
    {
468
462
      POINTER_LARGE_UPDATE* pointer_large = update_read_pointer_large(update, s);
469
470
462
      if (pointer_large)
471
134
      {
472
134
        rc = IFCALLRESULT(defaultReturn, pointer->PointerLarge, context, pointer_large);
473
134
        free_pointer_large_update(context, pointer_large);
474
134
      }
475
462
    }
476
462
    break;
477
83
    default:
478
83
      break;
479
24.0k
  }
480
481
24.0k
  Stream_SetPosition(s, 0);
482
24.0k
  if (!rc)
483
10.1k
  {
484
10.1k
    WLog_ERR(TAG, "Fastpath update %s [%" PRIx8 "] failed, status %d",
485
10.1k
             fastpath_update_to_string(updateCode), updateCode, status);
486
10.1k
    return -1;
487
10.1k
  }
488
489
13.8k
  return status;
490
24.0k
}
491
492
static int fastpath_recv_update_data(rdpFastPath* fastpath, wStream* s)
493
35.2k
{
494
35.2k
  int status = 0;
495
35.2k
  UINT16 size = 0;
496
35.2k
  BYTE updateCode = 0;
497
35.2k
  BYTE fragmentation = 0;
498
35.2k
  BYTE compression = 0;
499
35.2k
  BYTE compressionFlags = 0;
500
35.2k
  UINT32 DstSize = 0;
501
35.2k
  const BYTE* pDstData = NULL;
502
503
35.2k
  if (!fastpath || !s)
504
0
    return -1;
505
506
35.2k
  rdpRdp* rdp = fastpath->rdp;
507
508
35.2k
  if (!rdp)
509
0
    return -1;
510
511
35.2k
  rdpTransport* transport = rdp->transport;
512
513
35.2k
  if (!transport)
514
0
    return -1;
515
516
35.2k
  if (!fastpath_read_update_header(s, &updateCode, &fragmentation, &compression))
517
0
    return -1;
518
519
35.2k
  if (compression == FASTPATH_OUTPUT_COMPRESSION_USED)
520
13.6k
  {
521
13.6k
    if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
522
0
      return -1;
523
524
13.6k
    Stream_Read_UINT8(s, compressionFlags);
525
13.6k
  }
526
21.6k
  else
527
21.6k
    compressionFlags = 0;
528
529
35.2k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
530
20
    return -1;
531
532
35.2k
  Stream_Read_UINT16(s, size);
533
534
35.2k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, size))
535
5.82k
    return -1;
536
537
29.4k
  const int bulkStatus =
538
29.4k
      bulk_decompress(rdp->bulk, Stream_Pointer(s), size, &pDstData, &DstSize, compressionFlags);
539
29.4k
  Stream_Seek(s, size);
540
541
29.4k
  if (bulkStatus < 0)
542
1.28k
  {
543
1.28k
    WLog_ERR(TAG, "bulk_decompress() failed");
544
1.28k
    return -1;
545
1.28k
  }
546
547
28.1k
  if (!Stream_EnsureRemainingCapacity(fastpath->updateData, DstSize))
548
0
    return -1;
549
550
28.1k
  Stream_Write(fastpath->updateData, pDstData, DstSize);
551
552
28.1k
  if (fragmentation == FASTPATH_FRAGMENT_SINGLE)
553
22.4k
  {
554
22.4k
    if (fastpath->fragmentation != -1)
555
29
    {
556
29
      WLog_ERR(TAG, "Unexpected FASTPATH_FRAGMENT_SINGLE");
557
29
      goto out_fail;
558
29
    }
559
560
22.3k
    status = fastpath_recv_update(fastpath, updateCode, fastpath->updateData);
561
562
22.3k
    if (status < 0)
563
10.1k
    {
564
10.1k
      WLog_ERR(TAG, "fastpath_recv_update() - %i", status);
565
10.1k
      goto out_fail;
566
10.1k
    }
567
22.3k
  }
568
5.73k
  else
569
5.73k
  {
570
5.73k
    rdpContext* context = NULL;
571
5.73k
    const size_t totalSize = Stream_GetPosition(fastpath->updateData);
572
573
5.73k
    context = transport_get_context(transport);
574
5.73k
    WINPR_ASSERT(context);
575
5.73k
    WINPR_ASSERT(context->settings);
576
577
5.73k
    if (totalSize > context->settings->MultifragMaxRequestSize)
578
212
    {
579
212
      WLog_ERR(TAG, "Total size (%" PRIuz ") exceeds MultifragMaxRequestSize (%" PRIu32 ")",
580
212
               totalSize, context->settings->MultifragMaxRequestSize);
581
212
      goto out_fail;
582
212
    }
583
584
5.51k
    if (fragmentation == FASTPATH_FRAGMENT_FIRST)
585
1.86k
    {
586
1.86k
      if (fastpath->fragmentation != -1)
587
30
      {
588
30
        WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_FIRST");
589
30
        goto out_fail;
590
30
      }
591
592
1.83k
      fastpath->fragmentation = FASTPATH_FRAGMENT_FIRST;
593
1.83k
    }
594
3.65k
    else if (fragmentation == FASTPATH_FRAGMENT_NEXT)
595
1.93k
    {
596
1.93k
      if ((fastpath->fragmentation != FASTPATH_FRAGMENT_FIRST) &&
597
1.93k
          (fastpath->fragmentation != FASTPATH_FRAGMENT_NEXT))
598
229
      {
599
229
        WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_NEXT");
600
229
        goto out_fail;
601
229
      }
602
603
1.70k
      fastpath->fragmentation = FASTPATH_FRAGMENT_NEXT;
604
1.70k
    }
605
1.72k
    else if (fragmentation == FASTPATH_FRAGMENT_LAST)
606
1.72k
    {
607
1.72k
      if ((fastpath->fragmentation != FASTPATH_FRAGMENT_FIRST) &&
608
1.72k
          (fastpath->fragmentation != FASTPATH_FRAGMENT_NEXT))
609
107
      {
610
107
        WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_LAST");
611
107
        goto out_fail;
612
107
      }
613
614
1.61k
      fastpath->fragmentation = -1;
615
1.61k
      status = fastpath_recv_update(fastpath, updateCode, fastpath->updateData);
616
617
1.61k
      if (status < 0)
618
10
      {
619
10
        WLog_ERR(TAG, "fastpath_recv_update_data: fastpath_recv_update() - %i", status);
620
10
        goto out_fail;
621
10
      }
622
1.61k
    }
623
5.51k
  }
624
625
17.4k
  return status;
626
10.7k
out_fail:
627
10.7k
  return -1;
628
28.1k
}
629
630
state_run_t fastpath_recv_updates(rdpFastPath* fastpath, wStream* s)
631
18.3k
{
632
18.3k
  state_run_t rc = STATE_RUN_FAILED;
633
634
18.3k
  WINPR_ASSERT(s);
635
18.3k
  WINPR_ASSERT(fastpath);
636
18.3k
  WINPR_ASSERT(fastpath->rdp);
637
638
18.3k
  rdpUpdate* update = fastpath->rdp->update;
639
18.3k
  WINPR_ASSERT(update);
640
641
18.3k
  if (!update_begin_paint(update))
642
0
    goto fail;
643
644
35.7k
  while (Stream_GetRemainingLength(s) >= 3)
645
35.2k
  {
646
35.2k
    if (fastpath_recv_update_data(fastpath, s) < 0)
647
17.8k
    {
648
17.8k
      WLog_ERR(TAG, "fastpath_recv_update_data() fail");
649
17.8k
      rc = STATE_RUN_FAILED;
650
17.8k
      goto fail;
651
17.8k
    }
652
35.2k
  }
653
654
460
  rc = STATE_RUN_SUCCESS;
655
18.3k
fail:
656
657
18.3k
  if (!update_end_paint(update))
658
0
    return STATE_RUN_FAILED;
659
660
18.3k
  return rc;
661
18.3k
}
662
663
static BOOL fastpath_read_input_event_header(wStream* s, BYTE* eventFlags, BYTE* eventCode)
664
88.2k
{
665
88.2k
  BYTE eventHeader = 0;
666
667
88.2k
  WINPR_ASSERT(s);
668
88.2k
  WINPR_ASSERT(eventFlags);
669
88.2k
  WINPR_ASSERT(eventCode);
670
671
88.2k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
672
933
    return FALSE;
673
674
87.2k
  Stream_Read_UINT8(s, eventHeader); /* eventHeader (1 byte) */
675
87.2k
  *eventFlags = (eventHeader & 0x1F);
676
87.2k
  *eventCode = (eventHeader >> 5);
677
87.2k
  return TRUE;
678
88.2k
}
679
680
static BOOL fastpath_recv_input_event_scancode(rdpFastPath* fastpath, wStream* s, BYTE eventFlags)
681
49.0k
{
682
49.0k
  WINPR_ASSERT(fastpath);
683
49.0k
  WINPR_ASSERT(fastpath->rdp);
684
49.0k
  WINPR_ASSERT(fastpath->rdp->input);
685
49.0k
  WINPR_ASSERT(s);
686
687
49.0k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
688
198
    return FALSE;
689
690
48.8k
  rdpInput* input = fastpath->rdp->input;
691
692
48.8k
  const UINT8 code = Stream_Get_UINT8(s); /* keyCode (1 byte) */
693
694
48.8k
  UINT16 flags = 0;
695
48.8k
  if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_RELEASE))
696
7.82k
    flags |= KBD_FLAGS_RELEASE;
697
698
48.8k
  if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_EXTENDED))
699
19.8k
    flags |= KBD_FLAGS_EXTENDED;
700
701
48.8k
  if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_PREFIX_E1))
702
7.05k
    flags |= KBD_FLAGS_EXTENDED1;
703
704
48.8k
  return IFCALLRESULT(TRUE, input->KeyboardEvent, input, flags, code);
705
49.0k
}
706
707
static BOOL fastpath_recv_input_event_mouse(rdpFastPath* fastpath, wStream* s,
708
                                            WINPR_ATTR_UNUSED BYTE eventFlags)
709
5.00k
{
710
5.00k
  rdpInput* input = NULL;
711
5.00k
  UINT16 pointerFlags = 0;
712
5.00k
  UINT16 xPos = 0;
713
5.00k
  UINT16 yPos = 0;
714
5.00k
  WINPR_ASSERT(fastpath);
715
5.00k
  WINPR_ASSERT(fastpath->rdp);
716
5.00k
  WINPR_ASSERT(fastpath->rdp->input);
717
5.00k
  WINPR_ASSERT(s);
718
719
5.00k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
720
218
    return FALSE;
721
722
4.78k
  input = fastpath->rdp->input;
723
724
4.78k
  Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
725
4.78k
  Stream_Read_UINT16(s, xPos);         /* xPos (2 bytes) */
726
4.78k
  Stream_Read_UINT16(s, yPos);         /* yPos (2 bytes) */
727
4.78k
  return IFCALLRESULT(TRUE, input->MouseEvent, input, pointerFlags, xPos, yPos);
728
5.00k
}
729
730
static BOOL fastpath_recv_input_event_relmouse(rdpFastPath* fastpath, wStream* s,
731
                                               WINPR_ATTR_UNUSED BYTE eventFlags)
732
4.75k
{
733
4.75k
  rdpInput* input = NULL;
734
4.75k
  UINT16 pointerFlags = 0;
735
4.75k
  INT16 xDelta = 0;
736
4.75k
  INT16 yDelta = 0;
737
4.75k
  WINPR_ASSERT(fastpath);
738
4.75k
  WINPR_ASSERT(fastpath->rdp);
739
4.75k
  WINPR_ASSERT(fastpath->rdp->context);
740
4.75k
  WINPR_ASSERT(fastpath->rdp->input);
741
4.75k
  WINPR_ASSERT(s);
742
743
4.75k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
744
95
    return FALSE;
745
746
4.66k
  input = fastpath->rdp->input;
747
748
4.66k
  Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
749
4.66k
  Stream_Read_INT16(s, xDelta);        /* xDelta (2 bytes) */
750
4.66k
  Stream_Read_INT16(s, yDelta);        /* yDelta (2 bytes) */
751
752
4.66k
  if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasRelativeMouseEvent))
753
0
  {
754
0
    WLog_ERR(TAG,
755
0
             "Received relative mouse event(flags=0x%04" PRIx16 ", xPos=%" PRId16
756
0
             ", yPos=%" PRId16 "), but we did not announce support for that",
757
0
             pointerFlags, xDelta, yDelta);
758
0
    return FALSE;
759
0
  }
760
761
4.66k
  return IFCALLRESULT(TRUE, input->RelMouseEvent, input, pointerFlags, xDelta, yDelta);
762
4.66k
}
763
764
static BOOL fastpath_recv_input_event_qoe(rdpFastPath* fastpath, wStream* s,
765
                                          WINPR_ATTR_UNUSED BYTE eventFlags)
766
2.98k
{
767
2.98k
  WINPR_ASSERT(fastpath);
768
2.98k
  WINPR_ASSERT(fastpath->rdp);
769
2.98k
  WINPR_ASSERT(fastpath->rdp->context);
770
2.98k
  WINPR_ASSERT(fastpath->rdp->input);
771
2.98k
  WINPR_ASSERT(s);
772
773
2.98k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
774
60
    return FALSE;
775
776
2.92k
  rdpInput* input = fastpath->rdp->input;
777
778
2.92k
  UINT32 timestampMS = 0;
779
2.92k
  Stream_Read_UINT32(s, timestampMS); /* timestamp (4 bytes) */
780
781
2.92k
  if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasQoeEvent))
782
0
  {
783
0
    WLog_ERR(TAG,
784
0
             "Received qoe event(timestamp=%" PRIu32
785
0
             "ms), but we did not announce support for that",
786
0
             timestampMS);
787
0
    return FALSE;
788
0
  }
789
790
2.92k
  return IFCALLRESULT(TRUE, input->QoEEvent, input, timestampMS);
791
2.92k
}
792
793
static BOOL fastpath_recv_input_event_mousex(rdpFastPath* fastpath, wStream* s,
794
                                             WINPR_ATTR_UNUSED BYTE eventFlags)
795
3.52k
{
796
3.52k
  rdpInput* input = NULL;
797
3.52k
  UINT16 pointerFlags = 0;
798
3.52k
  UINT16 xPos = 0;
799
3.52k
  UINT16 yPos = 0;
800
801
3.52k
  WINPR_ASSERT(fastpath);
802
3.52k
  WINPR_ASSERT(fastpath->rdp);
803
3.52k
  WINPR_ASSERT(fastpath->rdp->context);
804
3.52k
  WINPR_ASSERT(fastpath->rdp->input);
805
3.52k
  WINPR_ASSERT(s);
806
807
3.52k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
808
76
    return FALSE;
809
810
3.44k
  input = fastpath->rdp->input;
811
812
3.44k
  Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
813
3.44k
  Stream_Read_UINT16(s, xPos);         /* xPos (2 bytes) */
814
3.44k
  Stream_Read_UINT16(s, yPos);         /* yPos (2 bytes) */
815
816
3.44k
  if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasExtendedMouseEvent))
817
0
  {
818
0
    WLog_ERR(TAG,
819
0
             "Received extended mouse event(flags=0x%04" PRIx16 ", xPos=%" PRIu16
820
0
             ", yPos=%" PRIu16 "), but we did not announce support for that",
821
0
             pointerFlags, xPos, yPos);
822
0
    return FALSE;
823
0
  }
824
825
3.44k
  return IFCALLRESULT(TRUE, input->ExtendedMouseEvent, input, pointerFlags, xPos, yPos);
826
3.44k
}
827
828
static BOOL fastpath_recv_input_event_sync(rdpFastPath* fastpath, WINPR_ATTR_UNUSED wStream* s,
829
                                           BYTE eventFlags)
830
6.96k
{
831
6.96k
  rdpInput* input = NULL;
832
833
6.96k
  WINPR_ASSERT(fastpath);
834
6.96k
  WINPR_ASSERT(fastpath->rdp);
835
6.96k
  WINPR_ASSERT(fastpath->rdp->input);
836
6.96k
  WINPR_ASSERT(s);
837
838
6.96k
  input = fastpath->rdp->input;
839
6.96k
  return IFCALLRESULT(TRUE, input->SynchronizeEvent, input, eventFlags);
840
6.96k
}
841
842
static BOOL fastpath_recv_input_event_unicode(rdpFastPath* fastpath, wStream* s, BYTE eventFlags)
843
2.14k
{
844
2.14k
  UINT16 unicodeCode = 0;
845
2.14k
  UINT16 flags = 0;
846
847
2.14k
  WINPR_ASSERT(fastpath);
848
2.14k
  WINPR_ASSERT(s);
849
850
2.14k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
851
70
    return FALSE;
852
853
2.07k
  Stream_Read_UINT16(s, unicodeCode); /* unicodeCode (2 bytes) */
854
2.07k
  flags = 0;
855
856
2.07k
  if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_RELEASE))
857
1.50k
    flags |= KBD_FLAGS_RELEASE;
858
859
2.07k
  WINPR_ASSERT(fastpath->rdp);
860
2.07k
  WINPR_ASSERT(fastpath->rdp);
861
2.07k
  WINPR_ASSERT(fastpath->rdp->input);
862
2.07k
  return IFCALLRESULT(FALSE, fastpath->rdp->input->UnicodeKeyboardEvent, fastpath->rdp->input,
863
2.07k
                      flags, unicodeCode);
864
2.07k
}
865
866
static BOOL fastpath_recv_input_event(rdpFastPath* fastpath, wStream* s)
867
88.2k
{
868
88.2k
  BYTE eventFlags = 0;
869
88.2k
  BYTE eventCode = 0;
870
871
88.2k
  WINPR_ASSERT(fastpath);
872
88.2k
  WINPR_ASSERT(s);
873
874
88.2k
  if (!fastpath_read_input_event_header(s, &eventFlags, &eventCode))
875
933
    return FALSE;
876
877
87.2k
  switch (eventCode)
878
87.2k
  {
879
49.0k
    case FASTPATH_INPUT_EVENT_SCANCODE:
880
49.0k
      if (!fastpath_recv_input_event_scancode(fastpath, s, eventFlags))
881
198
        return FALSE;
882
883
48.8k
      break;
884
885
48.8k
    case FASTPATH_INPUT_EVENT_MOUSE:
886
5.00k
      if (!fastpath_recv_input_event_mouse(fastpath, s, eventFlags))
887
218
        return FALSE;
888
889
4.78k
      break;
890
891
4.78k
    case FASTPATH_INPUT_EVENT_MOUSEX:
892
3.52k
      if (!fastpath_recv_input_event_mousex(fastpath, s, eventFlags))
893
76
        return FALSE;
894
895
3.44k
      break;
896
897
6.96k
    case FASTPATH_INPUT_EVENT_SYNC:
898
6.96k
      if (!fastpath_recv_input_event_sync(fastpath, s, eventFlags))
899
0
        return FALSE;
900
901
6.96k
      break;
902
903
6.96k
    case FASTPATH_INPUT_EVENT_UNICODE:
904
2.14k
      if (!fastpath_recv_input_event_unicode(fastpath, s, eventFlags))
905
2.14k
        return FALSE;
906
907
0
      break;
908
909
4.75k
    case TS_FP_RELPOINTER_EVENT:
910
4.75k
      if (!fastpath_recv_input_event_relmouse(fastpath, s, eventFlags))
911
95
        return FALSE;
912
913
4.66k
      break;
914
915
4.66k
    case TS_FP_QOETIMESTAMP_EVENT:
916
2.98k
      if (!fastpath_recv_input_event_qoe(fastpath, s, eventFlags))
917
60
        return FALSE;
918
2.92k
      break;
919
920
12.8k
    default:
921
12.8k
      WLog_ERR(TAG, "Unknown eventCode %" PRIu8 "", eventCode);
922
12.8k
      break;
923
87.2k
  }
924
925
84.4k
  return TRUE;
926
87.2k
}
927
928
state_run_t fastpath_recv_inputs(rdpFastPath* fastpath, wStream* s)
929
18.3k
{
930
18.3k
  WINPR_ASSERT(fastpath);
931
18.3k
  WINPR_ASSERT(s);
932
933
18.3k
  if (fastpath->numberEvents == 0)
934
18.3k
  {
935
    /**
936
     * If numberEvents is not provided in fpInputHeader, it will be provided
937
     * as one additional byte here.
938
     */
939
18.3k
    if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
940
4.24k
      return STATE_RUN_FAILED;
941
942
14.0k
    Stream_Read_UINT8(s, fastpath->numberEvents); /* eventHeader (1 byte) */
943
14.0k
  }
944
945
98.5k
  for (BYTE i = 0; i < fastpath->numberEvents; i++)
946
88.2k
  {
947
88.2k
    if (!fastpath_recv_input_event(fastpath, s))
948
3.72k
      return STATE_RUN_FAILED;
949
88.2k
  }
950
951
10.3k
  return STATE_RUN_SUCCESS;
952
14.0k
}
953
954
static UINT32 fastpath_get_sec_bytes(rdpRdp* rdp)
955
0
{
956
0
  UINT32 sec_bytes = 0;
957
0
  sec_bytes = 0;
958
959
0
  if (!rdp)
960
0
    return 0;
961
962
0
  if (rdp->do_crypt)
963
0
  {
964
0
    sec_bytes = 8;
965
966
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
967
0
      sec_bytes += 4;
968
0
  }
969
970
0
  return sec_bytes;
971
0
}
972
973
wStream* fastpath_input_pdu_init_header(rdpFastPath* fastpath, UINT16* sec_flags)
974
0
{
975
0
  if (!fastpath || !fastpath->rdp)
976
0
    return NULL;
977
978
0
  rdpRdp* rdp = fastpath->rdp;
979
0
  wStream* s = transport_send_stream_init(rdp->transport, 256);
980
981
0
  if (!s)
982
0
    return NULL;
983
984
0
  Stream_Seek(s, 3); /* fpInputHeader, length1 and length2 */
985
986
0
  if (rdp->do_crypt)
987
0
  {
988
0
    *sec_flags |= SEC_ENCRYPT;
989
990
0
    if (rdp->do_secure_checksum)
991
0
      *sec_flags |= SEC_SECURE_CHECKSUM;
992
0
  }
993
994
0
  Stream_Seek(s, fastpath_get_sec_bytes(rdp));
995
0
  return s;
996
0
}
997
998
wStream* fastpath_input_pdu_init(rdpFastPath* fastpath, BYTE eventFlags, BYTE eventCode,
999
                                 UINT16* sec_flags)
1000
0
{
1001
0
  wStream* s = NULL;
1002
0
  s = fastpath_input_pdu_init_header(fastpath, sec_flags);
1003
1004
0
  if (!s)
1005
0
    return NULL;
1006
1007
0
  WINPR_ASSERT(eventCode < 8);
1008
0
  WINPR_ASSERT(eventFlags < 0x20);
1009
0
  Stream_Write_UINT8(s, (UINT8)(eventFlags | (eventCode << 5))); /* eventHeader (1 byte) */
1010
0
  return s;
1011
0
}
1012
1013
BOOL fastpath_send_multiple_input_pdu(rdpFastPath* fastpath, wStream* s, size_t iNumEvents,
1014
                                      UINT16 sec_flags)
1015
0
{
1016
0
  BOOL rc = FALSE;
1017
0
  BYTE eventHeader = 0;
1018
0
  BOOL should_unlock = FALSE;
1019
0
  rdpRdp* rdp = NULL;
1020
1021
0
  WINPR_ASSERT(iNumEvents > 0);
1022
0
  if (!s)
1023
0
    return FALSE;
1024
1025
0
  if (!fastpath)
1026
0
    goto fail;
1027
1028
0
  rdp = fastpath->rdp;
1029
0
  WINPR_ASSERT(rdp);
1030
1031
0
  CONNECTION_STATE state = rdp_get_state(rdp);
1032
0
  if (!rdp_is_active_state(rdp))
1033
0
  {
1034
0
    WLog_WARN(TAG, "called before activation [%s]", rdp_state_string(state));
1035
0
    goto fail;
1036
0
  }
1037
1038
  /*
1039
   *  A maximum of 15 events are allowed per request
1040
   *  if the optional numEvents field isn't used
1041
   *  see MS-RDPBCGR 2.2.8.1.2 for details
1042
   */
1043
0
  if (iNumEvents > 15)
1044
0
    goto fail;
1045
1046
0
  size_t length = Stream_GetPosition(s);
1047
1048
0
  if (length >= (2 << 14))
1049
0
  {
1050
0
    WLog_ERR(TAG, "Maximum FastPath PDU length is 32767");
1051
0
    goto fail;
1052
0
  }
1053
1054
0
  eventHeader = FASTPATH_INPUT_ACTION_FASTPATH;
1055
0
  eventHeader |= (iNumEvents << 2); /* numberEvents */
1056
1057
0
  if (sec_flags & SEC_ENCRYPT)
1058
0
    eventHeader |= (FASTPATH_INPUT_ENCRYPTED << 6);
1059
1060
0
  if (sec_flags & SEC_SECURE_CHECKSUM)
1061
0
    eventHeader |= (FASTPATH_INPUT_SECURE_CHECKSUM << 6);
1062
1063
0
  Stream_SetPosition(s, 0);
1064
0
  Stream_Write_UINT8(s, eventHeader);
1065
  /* Write length later, RDP encryption might add a padding */
1066
0
  Stream_Seek(s, 2);
1067
1068
0
  if (sec_flags & SEC_ENCRYPT)
1069
0
  {
1070
0
    if (!security_lock(rdp))
1071
0
      goto fail;
1072
0
    should_unlock = TRUE;
1073
1074
0
    const size_t sec_bytes = fastpath_get_sec_bytes(fastpath->rdp);
1075
0
    if (sec_bytes + 3ULL > length)
1076
0
      goto fail;
1077
1078
0
    BYTE* fpInputEvents = Stream_PointerAs(s, BYTE) + sec_bytes;
1079
0
    const UINT16 fpInputEvents_length = (UINT16)(length - 3 - sec_bytes);
1080
1081
0
    WINPR_ASSERT(rdp->settings);
1082
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1083
0
    {
1084
0
      BYTE pad = 0;
1085
1086
0
      if ((pad = 8 - (fpInputEvents_length % 8)) == 8)
1087
0
        pad = 0;
1088
1089
0
      Stream_Write_UINT16(s, 0x10); /* length */
1090
0
      Stream_Write_UINT8(s, 0x1);   /* TSFIPS_VERSION 1*/
1091
0
      Stream_Write_UINT8(s, pad);   /* padding */
1092
1093
0
      if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
1094
0
        goto fail;
1095
1096
0
      if (!security_hmac_signature(fpInputEvents, fpInputEvents_length, Stream_Pointer(s), 8,
1097
0
                                   rdp))
1098
0
        goto fail;
1099
1100
0
      if (pad)
1101
0
        memset(fpInputEvents + fpInputEvents_length, 0, pad);
1102
1103
0
      if (!security_fips_encrypt(fpInputEvents, fpInputEvents_length + pad, rdp))
1104
0
        goto fail;
1105
1106
0
      length += pad;
1107
0
    }
1108
0
    else
1109
0
    {
1110
0
      BOOL res = 0;
1111
0
      if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
1112
0
        goto fail;
1113
0
      if (sec_flags & SEC_SECURE_CHECKSUM)
1114
0
        res = security_salted_mac_signature(rdp, fpInputEvents, fpInputEvents_length, TRUE,
1115
0
                                            Stream_Pointer(s), 8);
1116
0
      else
1117
0
        res = security_mac_signature(rdp, fpInputEvents, fpInputEvents_length,
1118
0
                                     Stream_Pointer(s), 8);
1119
1120
0
      if (!res || !security_encrypt(fpInputEvents, fpInputEvents_length, rdp))
1121
0
        goto fail;
1122
0
    }
1123
0
  }
1124
1125
  /*
1126
   * We always encode length in two bytes, even though we could use
1127
   * only one byte if length <= 0x7F. It is just easier that way,
1128
   * because we can leave room for fixed-length header, store all
1129
   * the data first and then store the header.
1130
   */
1131
0
  WINPR_ASSERT(length < UINT16_MAX);
1132
0
  Stream_SetPosition(s, 1);
1133
0
  Stream_Write_UINT16_BE(s, 0x8000 | (UINT16)length);
1134
0
  Stream_SetPosition(s, length);
1135
0
  Stream_SealLength(s);
1136
1137
0
  if (transport_write(rdp->transport, s) < 0)
1138
0
    goto fail;
1139
1140
0
  rc = TRUE;
1141
0
fail:
1142
0
  if (should_unlock && !security_unlock(rdp))
1143
0
    rc = FALSE;
1144
0
  Stream_Release(s);
1145
0
  return rc;
1146
0
}
1147
1148
BOOL fastpath_send_input_pdu(rdpFastPath* fastpath, wStream* s, UINT16 sec_flags)
1149
0
{
1150
0
  return fastpath_send_multiple_input_pdu(fastpath, s, 1, sec_flags);
1151
0
}
1152
1153
wStream* fastpath_update_pdu_init(rdpFastPath* fastpath)
1154
2.80k
{
1155
2.80k
  return transport_send_stream_init(fastpath->rdp->transport, FASTPATH_MAX_PACKET_SIZE);
1156
2.80k
}
1157
1158
wStream* fastpath_update_pdu_init_new(WINPR_ATTR_UNUSED rdpFastPath* fastpath)
1159
9.79k
{
1160
9.79k
  wStream* s = NULL;
1161
9.79k
  s = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1162
9.79k
  return s;
1163
9.79k
}
1164
1165
BOOL fastpath_send_update_pdu(rdpFastPath* fastpath, BYTE updateCode, wStream* s,
1166
                              BOOL skipCompression)
1167
4.08k
{
1168
4.08k
  BOOL status = TRUE;
1169
4.08k
  wStream* fs = NULL;
1170
4.08k
  rdpSettings* settings = NULL;
1171
4.08k
  rdpRdp* rdp = NULL;
1172
4.08k
  UINT32 fpHeaderSize = 6;
1173
4.08k
  UINT32 fpUpdatePduHeaderSize = 0;
1174
4.08k
  UINT32 fpUpdateHeaderSize = 0;
1175
4.08k
  FASTPATH_UPDATE_PDU_HEADER fpUpdatePduHeader = { 0 };
1176
4.08k
  FASTPATH_UPDATE_HEADER fpUpdateHeader = { 0 };
1177
4.08k
  UINT16 sec_flags = 0;
1178
1179
4.08k
  if (!fastpath || !fastpath->rdp || !fastpath->fs || !s)
1180
0
    return FALSE;
1181
1182
4.08k
  rdp = fastpath->rdp;
1183
4.08k
  fs = fastpath->fs;
1184
4.08k
  settings = rdp->settings;
1185
1186
4.08k
  if (!settings)
1187
0
    return FALSE;
1188
1189
4.08k
  UINT16 maxLength = FASTPATH_MAX_PACKET_SIZE - 20;
1190
1191
4.08k
  if (settings->CompressionEnabled && !skipCompression)
1192
4.08k
  {
1193
4.08k
    const UINT16 CompressionMaxSize = bulk_compression_max_size(rdp->bulk);
1194
4.08k
    maxLength = (maxLength < CompressionMaxSize) ? maxLength : CompressionMaxSize;
1195
4.08k
    maxLength -= 20;
1196
4.08k
  }
1197
1198
4.08k
  size_t totalLength = Stream_GetPosition(s);
1199
4.08k
  Stream_SetPosition(s, 0);
1200
1201
  /* check if fast path output is possible */
1202
4.08k
  if (!settings->FastPathOutput)
1203
0
  {
1204
0
    WLog_ERR(TAG, "client does not support fast path output");
1205
0
    return FALSE;
1206
0
  }
1207
1208
  /* check if the client's fast path pdu buffer is large enough */
1209
4.08k
  if (totalLength > settings->MultifragMaxRequestSize)
1210
3.96k
  {
1211
3.96k
    WLog_ERR(TAG,
1212
3.96k
             "fast path update size (%" PRIuz
1213
3.96k
             ") exceeds the client's maximum request size (%" PRIu32 ")",
1214
3.96k
             totalLength, settings->MultifragMaxRequestSize);
1215
3.96k
    return FALSE;
1216
3.96k
  }
1217
1218
121
  if (rdp->do_crypt)
1219
0
  {
1220
0
    sec_flags |= SEC_ENCRYPT;
1221
1222
0
    if (rdp->do_secure_checksum)
1223
0
      sec_flags |= SEC_SECURE_CHECKSUM;
1224
0
  }
1225
1226
121
  for (int fragment = 0; (totalLength > 0) || (fragment == 0); fragment++)
1227
121
  {
1228
121
    UINT32 DstSize = 0;
1229
121
    const BYTE* pDstData = NULL;
1230
121
    UINT32 compressionFlags = 0;
1231
121
    BYTE pad = 0;
1232
121
    BYTE* pSignature = NULL;
1233
121
    fpUpdatePduHeader.action = 0;
1234
121
    fpUpdatePduHeader.secFlags = 0;
1235
121
    fpUpdateHeader.compression = 0;
1236
121
    fpUpdateHeader.compressionFlags = 0;
1237
121
    fpUpdateHeader.updateCode = updateCode;
1238
121
    fpUpdateHeader.size = (UINT16)(totalLength > maxLength) ? maxLength : (UINT16)totalLength;
1239
121
    const BYTE* pSrcData = Stream_Pointer(s);
1240
121
    UINT32 SrcSize = DstSize = fpUpdateHeader.size;
1241
121
    BOOL should_unlock = FALSE;
1242
1243
121
    if (sec_flags & SEC_ENCRYPT)
1244
0
      fpUpdatePduHeader.secFlags |= FASTPATH_OUTPUT_ENCRYPTED;
1245
1246
121
    if (sec_flags & SEC_SECURE_CHECKSUM)
1247
0
      fpUpdatePduHeader.secFlags |= FASTPATH_OUTPUT_SECURE_CHECKSUM;
1248
1249
121
    if (settings->CompressionEnabled && !skipCompression)
1250
121
    {
1251
121
      if (bulk_compress(rdp->bulk, pSrcData, SrcSize, &pDstData, &DstSize,
1252
121
                        &compressionFlags) >= 0)
1253
121
      {
1254
121
        if (compressionFlags)
1255
0
        {
1256
0
          WINPR_ASSERT(compressionFlags <= UINT8_MAX);
1257
0
          fpUpdateHeader.compressionFlags = (UINT8)compressionFlags;
1258
0
          fpUpdateHeader.compression = FASTPATH_OUTPUT_COMPRESSION_USED;
1259
0
        }
1260
121
      }
1261
121
    }
1262
1263
121
    if (!fpUpdateHeader.compression)
1264
121
    {
1265
121
      pDstData = Stream_Pointer(s);
1266
121
      DstSize = fpUpdateHeader.size;
1267
121
    }
1268
1269
121
    if (DstSize > UINT16_MAX)
1270
0
      return FALSE;
1271
121
    fpUpdateHeader.size = (UINT16)DstSize;
1272
121
    totalLength -= SrcSize;
1273
1274
121
    if (totalLength == 0)
1275
121
      fpUpdateHeader.fragmentation =
1276
121
          (fragment == 0) ? FASTPATH_FRAGMENT_SINGLE : FASTPATH_FRAGMENT_LAST;
1277
0
    else
1278
0
      fpUpdateHeader.fragmentation =
1279
0
          (fragment == 0) ? FASTPATH_FRAGMENT_FIRST : FASTPATH_FRAGMENT_NEXT;
1280
1281
121
    fpUpdateHeaderSize = fastpath_get_update_header_size(&fpUpdateHeader);
1282
121
    fpUpdatePduHeaderSize = fastpath_get_update_pdu_header_size(&fpUpdatePduHeader, rdp);
1283
121
    fpHeaderSize = fpUpdateHeaderSize + fpUpdatePduHeaderSize;
1284
1285
121
    if (sec_flags & SEC_ENCRYPT)
1286
0
    {
1287
0
      pSignature = Stream_Buffer(fs) + 3;
1288
1289
0
      if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1290
0
      {
1291
0
        pSignature += 4;
1292
1293
0
        if ((pad = 8 - ((DstSize + fpUpdateHeaderSize) % 8)) == 8)
1294
0
          pad = 0;
1295
1296
0
        fpUpdatePduHeader.fipsInformation[0] = 0x10;
1297
0
        fpUpdatePduHeader.fipsInformation[1] = 0x00;
1298
0
        fpUpdatePduHeader.fipsInformation[2] = 0x01;
1299
0
        fpUpdatePduHeader.fipsInformation[3] = pad;
1300
0
      }
1301
0
    }
1302
1303
121
    const size_t len = fpUpdateHeader.size + fpHeaderSize + pad;
1304
121
    if (len > UINT16_MAX)
1305
0
      return FALSE;
1306
1307
121
    fpUpdatePduHeader.length = (UINT16)len;
1308
121
    Stream_SetPosition(fs, 0);
1309
121
    if (!fastpath_write_update_pdu_header(fs, &fpUpdatePduHeader, rdp))
1310
0
      return FALSE;
1311
121
    if (!fastpath_write_update_header(fs, &fpUpdateHeader))
1312
0
      return FALSE;
1313
1314
121
    if (!Stream_CheckAndLogRequiredCapacity(TAG, (fs), (size_t)DstSize + pad))
1315
0
      return FALSE;
1316
121
    Stream_Write(fs, pDstData, DstSize);
1317
1318
121
    if (pad)
1319
0
      Stream_Zero(fs, pad);
1320
1321
121
    BOOL res = FALSE;
1322
121
    if (sec_flags & SEC_ENCRYPT)
1323
0
    {
1324
0
      if (!security_lock(rdp))
1325
0
        return FALSE;
1326
0
      should_unlock = TRUE;
1327
0
      UINT32 dataSize = fpUpdateHeaderSize + DstSize + pad;
1328
0
      BYTE* data = Stream_PointerAs(fs, BYTE) - dataSize;
1329
1330
0
      if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1331
0
      {
1332
        // TODO: Ensure stream capacity
1333
0
        if (!security_hmac_signature(data, dataSize - pad, pSignature, 8, rdp))
1334
0
          goto unlock;
1335
1336
0
        if (!security_fips_encrypt(data, dataSize, rdp))
1337
0
          goto unlock;
1338
0
      }
1339
0
      else
1340
0
      {
1341
        // TODO: Ensure stream capacity
1342
0
        if (sec_flags & SEC_SECURE_CHECKSUM)
1343
0
          status =
1344
0
              security_salted_mac_signature(rdp, data, dataSize, TRUE, pSignature, 8);
1345
0
        else
1346
0
          status = security_mac_signature(rdp, data, dataSize, pSignature, 8);
1347
1348
0
        if (!status || !security_encrypt(data, dataSize, rdp))
1349
0
          goto unlock;
1350
0
      }
1351
0
    }
1352
121
    res = TRUE;
1353
1354
121
    Stream_SealLength(fs);
1355
1356
121
    if (transport_write(rdp->transport, fs) < 0)
1357
121
    {
1358
121
      status = FALSE;
1359
121
    }
1360
1361
121
  unlock:
1362
121
    if (should_unlock && !security_unlock(rdp))
1363
0
      return FALSE;
1364
1365
121
    if (!res || !status)
1366
121
      return FALSE;
1367
1368
0
    Stream_Seek(s, SrcSize);
1369
0
  }
1370
1371
0
  return status;
1372
121
}
1373
1374
rdpFastPath* fastpath_new(rdpRdp* rdp)
1375
18.3k
{
1376
18.3k
  rdpFastPath* fastpath = NULL;
1377
1378
18.3k
  WINPR_ASSERT(rdp);
1379
1380
18.3k
  fastpath = (rdpFastPath*)calloc(1, sizeof(rdpFastPath));
1381
1382
18.3k
  if (!fastpath)
1383
0
    return NULL;
1384
1385
18.3k
  fastpath->rdp = rdp;
1386
18.3k
  fastpath->fragmentation = -1;
1387
18.3k
  fastpath->fs = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1388
18.3k
  fastpath->updateData = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1389
1390
18.3k
  if (!fastpath->fs || !fastpath->updateData)
1391
0
    goto out_free;
1392
1393
18.3k
  return fastpath;
1394
0
out_free:
1395
0
  fastpath_free(fastpath);
1396
0
  return NULL;
1397
18.3k
}
1398
1399
void fastpath_free(rdpFastPath* fastpath)
1400
18.3k
{
1401
18.3k
  if (fastpath)
1402
18.3k
  {
1403
18.3k
    Stream_Free(fastpath->updateData, TRUE);
1404
18.3k
    Stream_Free(fastpath->fs, TRUE);
1405
18.3k
    free(fastpath);
1406
18.3k
  }
1407
18.3k
}
1408
1409
BYTE fastpath_get_encryption_flags(rdpFastPath* fastpath)
1410
20.6k
{
1411
20.6k
  WINPR_ASSERT(fastpath);
1412
20.6k
  return fastpath->encryptionFlags;
1413
20.6k
}
1414
1415
BOOL fastpath_decrypt(rdpFastPath* fastpath, wStream* s, UINT16* length)
1416
18.3k
{
1417
18.3k
  WINPR_ASSERT(fastpath);
1418
18.3k
  if (fastpath_get_encryption_flags(fastpath) & FASTPATH_OUTPUT_ENCRYPTED)
1419
2.33k
  {
1420
2.33k
    const UINT16 flags =
1421
2.33k
        (fastpath_get_encryption_flags(fastpath) & FASTPATH_OUTPUT_SECURE_CHECKSUM)
1422
2.33k
            ? SEC_SECURE_CHECKSUM
1423
2.33k
            : 0;
1424
1425
2.33k
    if (!rdp_decrypt(fastpath->rdp, s, length, flags))
1426
0
      return FALSE;
1427
2.33k
  }
1428
1429
18.3k
  return TRUE;
1430
18.3k
}