Coverage Report

Created: 2026-04-12 07:03

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/libfreerdp/core/gcc.c
Line
Count
Source
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * T.124 Generic Conference Control (GCC)
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2014 Norbert Federa <norbert.federa@thincast.com>
7
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
8
 * Copyright 2023 Armin Novak <anovak@thincast.com>
9
 * Copyright 2023 Thincast Technologies GmbH
10
 *
11
 * Licensed under the Apache License, Version 2.0 (the "License");
12
 * you may not use this file except in compliance with the License.
13
 * You may obtain a copy of the License at
14
 *
15
 *     http://www.apache.org/licenses/LICENSE-2.0
16
 *
17
 * Unless required by applicable law or agreed to in writing, software
18
 * distributed under the License is distributed on an "AS IS" BASIS,
19
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20
 * See the License for the specific language governing permissions and
21
 * limitations under the License.
22
 */
23
24
#include <freerdp/config.h>
25
26
#include "settings.h"
27
28
#include <winpr/crt.h>
29
#include <winpr/crypto.h>
30
#include <winpr/assert.h>
31
#include <winpr/cast.h>
32
33
#include <freerdp/log.h>
34
#include <freerdp/utils/string.h>
35
#include <freerdp/crypto/certificate.h>
36
37
#include "utils.h"
38
#include "gcc.h"
39
#include "nego.h"
40
41
#include "../crypto/certificate.h"
42
43
typedef enum
44
{
45
  HIGH_COLOR_4BPP = 0x04,
46
  HIGH_COLOR_8BPP = 0x08,
47
  HIGH_COLOR_15BPP = 0x0F,
48
  HIGH_COLOR_16BPP = 0x10,
49
  HIGH_COLOR_24BPP = 0x18,
50
} HIGH_COLOR_DEPTH;
51
52
static const char* HighColorToString(HIGH_COLOR_DEPTH color)
53
0
{
54
0
  switch (color)
55
0
  {
56
0
    case HIGH_COLOR_4BPP:
57
0
      return "HIGH_COLOR_4BPP";
58
0
    case HIGH_COLOR_8BPP:
59
0
      return "HIGH_COLOR_8BPP";
60
0
    case HIGH_COLOR_15BPP:
61
0
      return "HIGH_COLOR_15BPP";
62
0
    case HIGH_COLOR_16BPP:
63
0
      return "HIGH_COLOR_16BPP";
64
0
    case HIGH_COLOR_24BPP:
65
0
      return "HIGH_COLOR_24BPP";
66
0
    default:
67
0
      return "HIGH_COLOR_UNKNOWN";
68
0
  }
69
0
}
70
71
static HIGH_COLOR_DEPTH ColorDepthToHighColor(UINT32 bpp)
72
0
{
73
0
  switch (bpp)
74
0
  {
75
0
    case 4:
76
0
      return HIGH_COLOR_4BPP;
77
0
    case 8:
78
0
      return HIGH_COLOR_8BPP;
79
0
    case 15:
80
0
      return HIGH_COLOR_15BPP;
81
0
    case 16:
82
0
      return HIGH_COLOR_16BPP;
83
0
    default:
84
0
      return HIGH_COLOR_24BPP;
85
0
  }
86
0
}
87
88
static char* gcc_block_type_string(UINT16 type, char* buffer, size_t size);
89
static BOOL gcc_read_client_cluster_data(wStream* s, rdpMcs* mcs);
90
static BOOL gcc_read_client_core_data(wStream* s, rdpMcs* mcs);
91
static BOOL gcc_read_client_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length);
92
static BOOL gcc_read_server_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length);
93
static BOOL gcc_read_user_data_header(wLog* log, wStream* s, UINT16* type, UINT16* length);
94
static BOOL gcc_write_user_data_header(wStream* s, UINT16 type, UINT16 length);
95
96
static BOOL gcc_write_client_core_data(wStream* s, const rdpMcs* mcs);
97
static BOOL gcc_read_server_core_data(wStream* s, rdpMcs* mcs);
98
static BOOL gcc_write_server_core_data(wStream* s, rdpMcs* mcs);
99
static BOOL gcc_read_client_security_data(wStream* s, rdpMcs* mcs);
100
static BOOL gcc_write_client_security_data(wStream* s, const rdpMcs* mcs);
101
static BOOL gcc_read_server_security_data(wStream* s, rdpMcs* mcs);
102
static BOOL gcc_write_server_security_data(wStream* s, rdpMcs* mcs);
103
static BOOL gcc_read_client_network_data(wStream* s, rdpMcs* mcs);
104
static BOOL gcc_write_client_network_data(wStream* s, const rdpMcs* mcs);
105
static BOOL gcc_read_server_network_data(wStream* s, rdpMcs* mcs);
106
static BOOL gcc_write_server_network_data(wStream* s, const rdpMcs* mcs);
107
static BOOL gcc_write_client_cluster_data(wStream* s, const rdpMcs* mcs);
108
static BOOL gcc_read_client_monitor_data(wStream* s, rdpMcs* mcs);
109
static BOOL gcc_write_client_monitor_data(wStream* s, const rdpMcs* mcs);
110
static BOOL gcc_read_client_monitor_extended_data(wStream* s, rdpMcs* mcs);
111
static BOOL gcc_write_client_monitor_extended_data(wStream* s, const rdpMcs* mcs);
112
static BOOL gcc_read_client_message_channel_data(wStream* s, rdpMcs* mcs);
113
static BOOL gcc_write_client_message_channel_data(wStream* s, const rdpMcs* mcs);
114
static BOOL gcc_read_server_message_channel_data(wStream* s, rdpMcs* mcs);
115
static BOOL gcc_write_server_message_channel_data(wStream* s, const rdpMcs* mcs);
116
static BOOL gcc_read_client_multitransport_channel_data(wStream* s, rdpMcs* mcs);
117
static BOOL gcc_write_client_multitransport_channel_data(wStream* s, const rdpMcs* mcs);
118
static BOOL gcc_read_server_multitransport_channel_data(wStream* s, rdpMcs* mcs);
119
static BOOL gcc_write_server_multitransport_channel_data(wStream* s, const rdpMcs* mcs);
120
121
static rdpSettings* mcs_get_settings(rdpMcs* mcs)
122
13.4k
{
123
13.4k
  WINPR_ASSERT(mcs);
124
13.4k
  WINPR_ASSERT(mcs->context);
125
126
13.4k
  return mcs->context->settings;
127
13.4k
}
128
129
static const rdpSettings* mcs_get_const_settings(const rdpMcs* mcs)
130
0
{
131
0
  WINPR_ASSERT(mcs);
132
0
  WINPR_ASSERT(mcs->context);
133
134
0
  return mcs->context->settings;
135
0
}
136
137
static char* rdp_early_server_caps_string(UINT32 flags, char* buffer, size_t size)
138
5.67k
{
139
5.67k
  char msg[32] = WINPR_C_ARRAY_INIT;
140
5.67k
  const UINT32 mask = RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1 | RNS_UD_SC_DYNAMIC_DST_SUPPORTED |
141
5.67k
                      RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2 | RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED;
142
5.67k
  const UINT32 unknown = flags & (~mask);
143
144
5.67k
  if (flags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1)
145
0
    winpr_str_append("RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1", buffer, size, "|");
146
5.67k
  if (flags & RNS_UD_SC_DYNAMIC_DST_SUPPORTED)
147
0
    winpr_str_append("RNS_UD_SC_DYNAMIC_DST_SUPPORTED", buffer, size, "|");
148
5.67k
  if (flags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2)
149
0
    winpr_str_append("RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2", buffer, size, "|");
150
5.67k
  if (flags & RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED)
151
0
    winpr_str_append("RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED", buffer, size, "|");
152
153
5.67k
  if (unknown != 0)
154
5.67k
  {
155
5.67k
    (void)_snprintf(msg, sizeof(msg), "RNS_UD_SC_UNKNOWN[0x%08" PRIx32 "]", unknown);
156
5.67k
    winpr_str_append(msg, buffer, size, "|");
157
5.67k
  }
158
5.67k
  (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", flags);
159
5.67k
  winpr_str_append(msg, buffer, size, "|");
160
5.67k
  return buffer;
161
5.67k
}
162
163
static const char* rdp_early_client_caps_string(UINT32 flags, char* buffer, size_t size)
164
213
{
165
213
  char msg[32] = WINPR_C_ARRAY_INIT;
166
213
  const UINT32 mask = RNS_UD_CS_SUPPORT_ERRINFO_PDU | RNS_UD_CS_WANT_32BPP_SESSION |
167
213
                      RNS_UD_CS_SUPPORT_STATUSINFO_PDU | RNS_UD_CS_STRONG_ASYMMETRIC_KEYS |
168
213
                      RNS_UD_CS_RELATIVE_MOUSE_INPUT | RNS_UD_CS_VALID_CONNECTION_TYPE |
169
213
                      RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU |
170
213
                      RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT |
171
213
                      RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL | RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE |
172
213
                      RNS_UD_CS_SUPPORT_HEARTBEAT_PDU | RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN;
173
213
  const UINT32 unknown = flags & (~mask);
174
175
213
  if (flags & RNS_UD_CS_SUPPORT_ERRINFO_PDU)
176
0
    winpr_str_append("RNS_UD_CS_SUPPORT_ERRINFO_PDU", buffer, size, "|");
177
213
  if (flags & RNS_UD_CS_WANT_32BPP_SESSION)
178
0
    winpr_str_append("RNS_UD_CS_WANT_32BPP_SESSION", buffer, size, "|");
179
213
  if (flags & RNS_UD_CS_SUPPORT_STATUSINFO_PDU)
180
0
    winpr_str_append("RNS_UD_CS_SUPPORT_STATUSINFO_PDU", buffer, size, "|");
181
213
  if (flags & RNS_UD_CS_STRONG_ASYMMETRIC_KEYS)
182
0
    winpr_str_append("RNS_UD_CS_STRONG_ASYMMETRIC_KEYS", buffer, size, "|");
183
213
  if (flags & RNS_UD_CS_RELATIVE_MOUSE_INPUT)
184
0
    winpr_str_append("RNS_UD_CS_RELATIVE_MOUSE_INPUT", buffer, size, "|");
185
213
  if (flags & RNS_UD_CS_VALID_CONNECTION_TYPE)
186
0
    winpr_str_append("RNS_UD_CS_VALID_CONNECTION_TYPE", buffer, size, "|");
187
213
  if (flags & RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU)
188
0
    winpr_str_append("RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU", buffer, size, "|");
189
213
  if (flags & RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT)
190
0
    winpr_str_append("RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT", buffer, size, "|");
191
213
  if (flags & RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL)
192
0
    winpr_str_append("RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL", buffer, size, "|");
193
213
  if (flags & RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE)
194
0
    winpr_str_append("RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE", buffer, size, "|");
195
213
  if (flags & RNS_UD_CS_SUPPORT_HEARTBEAT_PDU)
196
0
    winpr_str_append("RNS_UD_CS_SUPPORT_HEARTBEAT_PDU", buffer, size, "|");
197
213
  if (flags & RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN)
198
0
    winpr_str_append("RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN", buffer, size, "|");
199
200
213
  if (unknown != 0)
201
213
  {
202
213
    (void)_snprintf(msg, sizeof(msg), "RNS_UD_CS_UNKNOWN[0x%08" PRIx32 "]", unknown);
203
213
    winpr_str_append(msg, buffer, size, "|");
204
213
  }
205
213
  (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", flags);
206
213
  winpr_str_append(msg, buffer, size, "|");
207
213
  return buffer;
208
213
}
209
210
static DWORD rdp_version_common(wLog* log, DWORD serverVersion, DWORD clientVersion)
211
10.5k
{
212
10.5k
  DWORD version = MIN(serverVersion, clientVersion);
213
214
10.5k
  switch (version)
215
10.5k
  {
216
358
    case RDP_VERSION_4:
217
506
    case RDP_VERSION_5_PLUS:
218
1.21k
    case RDP_VERSION_10_0:
219
1.47k
    case RDP_VERSION_10_1:
220
1.93k
    case RDP_VERSION_10_2:
221
2.86k
    case RDP_VERSION_10_3:
222
3.20k
    case RDP_VERSION_10_4:
223
3.95k
    case RDP_VERSION_10_5:
224
4.25k
    case RDP_VERSION_10_6:
225
4.57k
    case RDP_VERSION_10_7:
226
4.71k
    case RDP_VERSION_10_8:
227
5.23k
    case RDP_VERSION_10_9:
228
5.38k
    case RDP_VERSION_10_10:
229
5.42k
    case RDP_VERSION_10_11:
230
7.35k
    case RDP_VERSION_10_12:
231
7.35k
      return version;
232
233
3.17k
    default:
234
3.17k
      WLog_Print(log, WLOG_ERROR,
235
3.17k
                 "Invalid client [%" PRIu32 "] and server [%" PRIu32 "] versions",
236
3.17k
                 serverVersion, clientVersion);
237
3.17k
      return version;
238
10.5k
  }
239
10.5k
}
240
241
/**
242
 * T.124 GCC is defined in:
243
 *
244
 * http://www.itu.int/rec/T-REC-T.124-199802-S/en
245
 * ITU-T T.124 (02/98): Generic Conference Control
246
 */
247
248
/**
249
 * ConnectData ::= SEQUENCE
250
 * {
251
 *  t124Identifier  Key,
252
 *  connectPDU  OCTET_STRING
253
 * }
254
 *
255
 * Key ::= CHOICE
256
 * {
257
 *  object        OBJECT_IDENTIFIER,
258
 *  h221NonStandard     H221NonStandardIdentifier
259
 * }
260
 *
261
 * ConnectGCCPDU ::= CHOICE
262
 * {
263
 *  conferenceCreateRequest   ConferenceCreateRequest,
264
 *  conferenceCreateResponse  ConferenceCreateResponse,
265
 *  conferenceQueryRequest    ConferenceQueryRequest,
266
 *  conferenceQueryResponse   ConferenceQueryResponse,
267
 *  conferenceJoinRequest   ConferenceJoinRequest,
268
 *  conferenceJoinResponse    ConferenceJoinResponse,
269
 *  conferenceInviteRequest   ConferenceInviteRequest,
270
 *  conferenceInviteResponse  ConferenceInviteResponse,
271
 *  ...
272
 * }
273
 *
274
 * ConferenceCreateRequest ::= SEQUENCE
275
 * {
276
 *  conferenceName      ConferenceName,
277
 *  convenerPassword    Password OPTIONAL,
278
 *  password      Password OPTIONAL,
279
 *  lockedConference    BOOLEAN,
280
 *  listedConference    BOOLEAN,
281
 *  conductibleConference   BOOLEAN,
282
 *  terminationMethod   TerminationMethod,
283
 *  conductorPrivileges   SET OF Privilege OPTIONAL,
284
 *  conductedPrivileges   SET OF Privilege OPTIONAL,
285
 *  nonConductedPrivileges    SET OF Privilege OPTIONAL,
286
 *  conferenceDescription   TextString OPTIONAL,
287
 *  callerIdentifier    TextString OPTIONAL,
288
 *  userData      UserData OPTIONAL,
289
 *  ...,
290
 *  conferencePriority    ConferencePriority OPTIONAL,
291
 *  conferenceMode      ConferenceMode OPTIONAL
292
 * }
293
 *
294
 * ConferenceCreateResponse ::= SEQUENCE
295
 * {
296
 *  nodeID        UserID,
297
 *  tag       INTEGER,
298
 *  result        ENUMERATED
299
 *  {
300
 *    success       (0),
301
 *    userRejected      (1),
302
 *    resourcesNotAvailable   (2),
303
 *    rejectedForSymmetryBreaking (3),
304
 *    lockedConferenceNotSupported  (4)
305
 *  },
306
 *  userData      UserData OPTIONAL,
307
 *  ...
308
 * }
309
 *
310
 * ConferenceName ::= SEQUENCE
311
 * {
312
 *  numeric       SimpleNumericString
313
 *  text        SimpleTextString OPTIONAL,
314
 *  ...
315
 * }
316
 *
317
 * SimpleNumericString ::= NumericString (SIZE (1..255)) (FROM ("0123456789"))
318
 *
319
 * UserData ::= SET OF SEQUENCE
320
 * {
321
 *  key       Key,
322
 *  value       OCTET_STRING OPTIONAL
323
 * }
324
 *
325
 * H221NonStandardIdentifier ::= OCTET STRING (SIZE (4..255))
326
 *
327
 * UserID ::= DynamicChannelID
328
 *
329
 * ChannelID ::= INTEGER (1..65535)
330
 * StaticChannelID ::= INTEGER (1..1000)
331
 * DynamicChannelID ::= INTEGER (1001..65535)
332
 *
333
 */
334
335
/*
336
 * OID = 0.0.20.124.0.1
337
 * { itu-t(0) recommendation(0) t(20) t124(124) version(0) 1 }
338
 * v.1 of ITU-T Recommendation T.124 (Feb 1998): "Generic Conference Control"
339
 */
340
static const BYTE t124_02_98_oid[6] = { 0, 0, 20, 124, 0, 1 };
341
342
static const BYTE h221_cs_key[4] = { 'D', 'u', 'c', 'a' };
343
static const BYTE h221_sc_key[4] = { 'M', 'c', 'D', 'n' };
344
345
/**
346
 * Read a GCC Conference Create Request.
347
 * msdn{cc240836}
348
 *
349
 * @param s stream
350
 * @param mcs The MCS instance
351
 *
352
 * @return \b TRUE for success, \b FALSE otherwise
353
 */
354
355
BOOL gcc_read_conference_create_request(wStream* s, rdpMcs* mcs)
356
1.40k
{
357
1.40k
  UINT16 length = 0;
358
1.40k
  BYTE choice = 0;
359
1.40k
  BYTE number = 0;
360
1.40k
  BYTE selection = 0;
361
362
1.40k
  WINPR_ASSERT(s);
363
1.40k
  WINPR_ASSERT(mcs);
364
  /* ConnectData */
365
1.40k
  if (!per_read_choice(s, &choice))
366
2
    return FALSE;
367
368
1.40k
  if (!per_read_object_identifier(s, t124_02_98_oid))
369
14
    return FALSE;
370
371
  /* ConnectData::connectPDU (OCTET_STRING) */
372
1.38k
  if (!per_read_length(s, &length))
373
2
    return FALSE;
374
375
  /* ConnectGCCPDU */
376
1.38k
  if (!per_read_choice(s, &choice))
377
2
    return FALSE;
378
379
1.38k
  if (!per_read_selection(s, &selection))
380
2
    return FALSE;
381
382
  /* ConferenceCreateRequest::conferenceName */
383
1.38k
  if (!per_read_numeric_string(s, 1)) /* ConferenceName::numeric */
384
4
    return FALSE;
385
386
1.37k
  if (!per_read_padding(s, 1)) /* padding */
387
2
    return FALSE;
388
389
  /* UserData (SET OF SEQUENCE) */
390
1.37k
  if (!per_read_number_of_sets(s, &number) || number != 1) /* one set of UserData */
391
10
    return FALSE;
392
393
1.36k
  if (!per_read_choice(s, &choice) ||
394
1.36k
      choice != 0xC0) /* UserData::value present + select h221NonStandard (1) */
395
14
    return FALSE;
396
397
  /* h221NonStandard */
398
1.35k
  if (!per_read_octet_string(s, h221_cs_key, 4,
399
1.35k
                             4)) /* h221NonStandard, client-to-server H.221 key, "Duca" */
400
10
    return FALSE;
401
402
  /* userData::value (OCTET_STRING) */
403
1.34k
  if (!per_read_length(s, &length))
404
2
    return FALSE;
405
406
1.34k
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, length))
407
18
    return FALSE;
408
409
1.32k
  if (!gcc_read_client_data_blocks(s, mcs, length))
410
787
    return FALSE;
411
412
536
  return TRUE;
413
1.32k
}
414
415
/**
416
 * Write a GCC Conference Create Request.
417
 * msdn{cc240836}
418
 *
419
 * @param s stream
420
 * @param userData client data blocks
421
 *
422
 * @return \b TRUE for success, \b FALSE otherwise
423
 */
424
425
BOOL gcc_write_conference_create_request(wStream* s, wStream* userData)
426
0
{
427
0
  WINPR_ASSERT(s);
428
0
  WINPR_ASSERT(userData);
429
  /* ConnectData */
430
0
  if (!per_write_choice(s, 0)) /* From Key select object (0) of type OBJECT_IDENTIFIER */
431
0
    return FALSE;
432
0
  if (!per_write_object_identifier(s, t124_02_98_oid)) /* ITU-T T.124 (02/98) OBJECT_IDENTIFIER */
433
0
    return FALSE;
434
  /* ConnectData::connectPDU (OCTET_STRING) */
435
0
  const size_t pos = Stream_GetPosition(userData);
436
0
  WINPR_ASSERT(pos <= UINT16_MAX - 14);
437
0
  if (!per_write_length(s, (UINT16)pos + 14)) /* connectPDU length */
438
0
    return FALSE;
439
  /* ConnectGCCPDU */
440
0
  if (!per_write_choice(s, 0)) /* From ConnectGCCPDU select conferenceCreateRequest (0) of type
441
                                   ConferenceCreateRequest */
442
0
    return FALSE;
443
0
  if (!per_write_selection(s, 0x08)) /* select optional userData from ConferenceCreateRequest */
444
0
    return FALSE;
445
  /* ConferenceCreateRequest::conferenceName */
446
0
  if (!per_write_numeric_string(s, (BYTE*)"1", 1, 1)) /* ConferenceName::numeric */
447
0
    return FALSE;
448
0
  if (!per_write_padding(s, 1)) /* padding */
449
0
    return FALSE;
450
  /* UserData (SET OF SEQUENCE) */
451
0
  if (!per_write_number_of_sets(s, 1)) /* one set of UserData */
452
0
    return FALSE;
453
0
  if (!per_write_choice(s, 0xC0)) /* UserData::value present + select h221NonStandard (1) */
454
0
    return FALSE;
455
  /* h221NonStandard */
456
0
  if (!per_write_octet_string(s, h221_cs_key, 4,
457
0
                              4)) /* h221NonStandard, client-to-server H.221 key, "Duca" */
458
0
    return FALSE;
459
  /* userData::value (OCTET_STRING) */
460
0
  const size_t upos = Stream_GetPosition(userData);
461
0
  WINPR_ASSERT(upos <= UINT16_MAX);
462
0
  return per_write_octet_string(s, Stream_Buffer(userData), (UINT16)upos,
463
0
                                0); /* array of client data blocks */
464
0
}
465
466
BOOL gcc_read_conference_create_response(wStream* s, rdpMcs* mcs)
467
1.56k
{
468
1.56k
  UINT16 length = 0;
469
1.56k
  UINT32 tag = 0;
470
1.56k
  UINT16 nodeID = 0;
471
1.56k
  BYTE result = 0;
472
1.56k
  BYTE choice = 0;
473
1.56k
  BYTE number = 0;
474
1.56k
  WINPR_ASSERT(s);
475
1.56k
  WINPR_ASSERT(mcs);
476
  /* ConnectData */
477
1.56k
  if (!per_read_choice(s, &choice) || !per_read_object_identifier(s, t124_02_98_oid))
478
118
    return FALSE;
479
480
  /* ConnectData::connectPDU (OCTET_STRING) */
481
1.45k
  if (!per_read_length(s, &length))
482
2
    return FALSE;
483
484
  /* ConnectGCCPDU */
485
1.44k
  if (!per_read_choice(s, &choice))
486
3
    return FALSE;
487
488
  /* ConferenceCreateResponse::nodeID (UserID) */
489
1.44k
  if (!per_read_integer16(s, &nodeID, 1001))
490
5
    return FALSE;
491
492
  /* ConferenceCreateResponse::tag (INTEGER) */
493
1.44k
  if (!per_read_integer(s, &tag))
494
19
    return FALSE;
495
496
  /* ConferenceCreateResponse::result (ENUMERATED) */
497
1.42k
  if (!per_read_enumerated(s, &result, MCS_Result_enum_length))
498
20
    return FALSE;
499
500
  /* number of UserData sets */
501
1.40k
  if (!per_read_number_of_sets(s, &number))
502
2
    return FALSE;
503
504
  /* UserData::value present + select h221NonStandard (1) */
505
1.39k
  if (!per_read_choice(s, &choice))
506
2
    return FALSE;
507
508
  /* h221NonStandard */
509
1.39k
  if (!per_read_octet_string(s, h221_sc_key, 4,
510
1.39k
                             4)) /* h221NonStandard, server-to-client H.221 key, "McDn" */
511
95
    return FALSE;
512
513
  /* userData (OCTET_STRING) */
514
1.30k
  if (!per_read_length(s, &length))
515
2
    return FALSE;
516
517
1.30k
  if (!gcc_read_server_data_blocks(s, mcs, length))
518
1.17k
  {
519
1.17k
    WLog_Print(mcs->log, WLOG_ERROR,
520
1.17k
               "gcc_read_conference_create_response: gcc_read_server_data_blocks failed");
521
1.17k
    return FALSE;
522
1.17k
  }
523
524
126
  return TRUE;
525
1.30k
}
526
527
BOOL gcc_write_conference_create_response(wStream* s, wStream* userData)
528
0
{
529
0
  WINPR_ASSERT(s);
530
0
  WINPR_ASSERT(userData);
531
  /* ConnectData */
532
0
  if (!per_write_choice(s, 0))
533
0
    return FALSE;
534
0
  if (!per_write_object_identifier(s, t124_02_98_oid))
535
0
    return FALSE;
536
  /* ConnectData::connectPDU (OCTET_STRING) */
537
  /* This length MUST be ignored by the client according to [MS-RDPBCGR] */
538
0
  if (!per_write_length(s, 0x2A))
539
0
    return FALSE;
540
  /* ConnectGCCPDU */
541
0
  if (!per_write_choice(s, 0x14))
542
0
    return FALSE;
543
  /* ConferenceCreateResponse::nodeID (UserID) */
544
0
  if (!per_write_integer16(s, 0x79F3, 1001))
545
0
    return FALSE;
546
  /* ConferenceCreateResponse::tag (INTEGER) */
547
0
  if (!per_write_integer(s, 1))
548
0
    return FALSE;
549
  /* ConferenceCreateResponse::result (ENUMERATED) */
550
0
  if (!per_write_enumerated(s, 0, MCS_Result_enum_length))
551
0
    return FALSE;
552
  /* number of UserData sets */
553
0
  if (!per_write_number_of_sets(s, 1))
554
0
    return FALSE;
555
  /* UserData::value present + select h221NonStandard (1) */
556
0
  if (!per_write_choice(s, 0xC0))
557
0
    return FALSE;
558
  /* h221NonStandard */
559
0
  if (!per_write_octet_string(s, h221_sc_key, 4,
560
0
                              4)) /* h221NonStandard, server-to-client H.221 key, "McDn" */
561
0
    return FALSE;
562
  /* userData (OCTET_STRING) */
563
0
  const size_t pos = Stream_GetPosition(userData);
564
0
  WINPR_ASSERT(pos <= UINT16_MAX);
565
0
  return per_write_octet_string(s, Stream_Buffer(userData), (UINT16)pos,
566
0
                                0); /* array of server data blocks */
567
0
}
568
569
static BOOL gcc_read_client_unused1_data(wStream* s)
570
80
{
571
80
  return Stream_SafeSeek(s, 2);
572
80
}
573
574
BOOL gcc_read_client_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length)
575
1.32k
{
576
1.32k
  WINPR_ASSERT(s);
577
1.32k
  WINPR_ASSERT(mcs);
578
579
1.32k
  BOOL gotMultitransport = FALSE;
580
581
28.6k
  while (length > 0)
582
28.0k
  {
583
28.0k
    wStream sbuffer = WINPR_C_ARRAY_INIT;
584
28.0k
    UINT16 type = 0;
585
28.0k
    UINT16 blockLength = 0;
586
587
28.0k
    if (!gcc_read_user_data_header(mcs->log, s, &type, &blockLength))
588
188
      return FALSE;
589
590
27.9k
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, (size_t)(blockLength - 4)))
591
0
      return FALSE;
592
593
27.9k
    wStream* sub = Stream_StaticConstInit(&sbuffer, Stream_Pointer(s), blockLength - 4);
594
27.9k
    WINPR_ASSERT(sub);
595
596
27.9k
    Stream_Seek(s, blockLength - 4);
597
598
27.9k
    {
599
27.9k
      char buffer[64] = WINPR_C_ARRAY_INIT;
600
27.9k
      WLog_Print(mcs->log, WLOG_TRACE, "Processing block %s",
601
27.9k
                 gcc_block_type_string(type, buffer, sizeof(buffer)));
602
27.9k
    }
603
27.9k
    switch (type)
604
27.9k
    {
605
732
      case CS_CORE:
606
732
        if (!gcc_read_client_core_data(sub, mcs))
607
179
          return FALSE;
608
609
553
        break;
610
611
553
      case CS_SECURITY:
612
38
        if (!gcc_read_client_security_data(sub, mcs))
613
2
          return FALSE;
614
615
36
        break;
616
617
36
      case CS_NET:
618
19
        if (!gcc_read_client_network_data(sub, mcs))
619
14
          return FALSE;
620
621
5
        break;
622
623
88
      case CS_CLUSTER:
624
88
        if (!gcc_read_client_cluster_data(sub, mcs))
625
2
          return FALSE;
626
627
86
        break;
628
629
364
      case CS_MONITOR:
630
364
        if (!gcc_read_client_monitor_data(sub, mcs))
631
265
          return FALSE;
632
633
99
        break;
634
635
731
      case CS_MCS_MSGCHANNEL:
636
731
        if (!gcc_read_client_message_channel_data(sub, mcs))
637
2
          return FALSE;
638
639
729
        break;
640
641
729
      case CS_MONITOR_EX:
642
132
        if (!gcc_read_client_monitor_extended_data(sub, mcs))
643
130
          return FALSE;
644
645
2
        break;
646
647
80
      case CS_UNUSED1:
648
80
        if (!gcc_read_client_unused1_data(sub))
649
2
          return FALSE;
650
651
78
        break;
652
653
78
      case 0xC009:
654
325
      case CS_MULTITRANSPORT:
655
325
        gotMultitransport = TRUE;
656
325
        if (!gcc_read_client_multitransport_channel_data(sub, mcs))
657
3
          return FALSE;
658
659
322
        break;
660
661
25.3k
      default:
662
25.3k
        WLog_Print(mcs->log, WLOG_ERROR, "Unknown GCC client data block: 0x%04" PRIX16 "",
663
25.3k
                   type);
664
25.3k
        winpr_HexLogDump(mcs->log, WLOG_TRACE, Stream_Pointer(sub),
665
25.3k
                         Stream_GetRemainingLength(sub));
666
25.3k
        break;
667
27.9k
    }
668
669
27.3k
    const size_t rem = Stream_GetRemainingLength(sub);
670
27.3k
    if (rem > 0)
671
26.4k
    {
672
26.4k
      char buffer[128] = WINPR_C_ARRAY_INIT;
673
26.4k
      const size_t total = Stream_Length(sub);
674
26.4k
      WLog_Print(mcs->log, WLOG_ERROR,
675
26.4k
                 "Error parsing GCC client data block %s: Actual Offset: %" PRIuz
676
26.4k
                 " Expected Offset: %" PRIuz,
677
26.4k
                 gcc_block_type_string(type, buffer, sizeof(buffer)), total - rem, total);
678
26.4k
    }
679
680
27.3k
    if (blockLength > length)
681
424
    {
682
424
      char buffer[128] = WINPR_C_ARRAY_INIT;
683
424
      WLog_Print(mcs->log, WLOG_ERROR,
684
424
                 "Error parsing GCC client data block %s: got blockLength 0x%04" PRIx16
685
424
                 ", but only 0x%04" PRIx16 "remaining",
686
424
                 gcc_block_type_string(type, buffer, sizeof(buffer)), blockLength, length);
687
424
      length = 0;
688
424
    }
689
26.8k
    else
690
26.8k
      length -= blockLength;
691
27.3k
  }
692
693
536
  if (!gotMultitransport)
694
530
  {
695
530
    rdpSettings* settings = mcs_get_settings(mcs);
696
530
    if (!freerdp_settings_set_bool(settings, FreeRDP_SupportMultitransport, FALSE))
697
0
      return FALSE;
698
530
    if (!freerdp_settings_set_uint32(settings, FreeRDP_MultitransportFlags, 0))
699
0
      return FALSE;
700
530
  }
701
536
  return TRUE;
702
536
}
703
704
BOOL gcc_write_client_data_blocks(wStream* s, const rdpMcs* mcs)
705
0
{
706
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
707
708
0
  WINPR_ASSERT(s);
709
0
  WINPR_ASSERT(settings);
710
711
0
  if (!gcc_write_client_core_data(s, mcs) || !gcc_write_client_cluster_data(s, mcs) ||
712
0
      !gcc_write_client_security_data(s, mcs) || !gcc_write_client_network_data(s, mcs))
713
0
    return FALSE;
714
715
  /* extended client data supported */
716
717
0
  if (settings->NegotiationFlags & EXTENDED_CLIENT_DATA_SUPPORTED)
718
0
  {
719
0
    if (settings->UseMultimon && !settings->SpanMonitors)
720
0
    {
721
0
      if (!gcc_write_client_monitor_data(s, mcs) ||
722
0
          !gcc_write_client_monitor_extended_data(s, mcs))
723
0
        return FALSE;
724
0
    }
725
726
0
    if (!gcc_write_client_message_channel_data(s, mcs) ||
727
0
        !gcc_write_client_multitransport_channel_data(s, mcs))
728
0
      return FALSE;
729
0
  }
730
0
  else
731
0
  {
732
0
    if (settings->UseMultimon && !settings->SpanMonitors)
733
0
    {
734
0
      WLog_Print(mcs->log, WLOG_ERROR,
735
0
                 "WARNING: true multi monitor support was not advertised by server!");
736
737
0
      if (settings->ForceMultimon)
738
0
      {
739
0
        WLog_Print(mcs->log, WLOG_ERROR,
740
0
                   "Sending multi monitor information anyway (may break connectivity!)");
741
0
        if (!gcc_write_client_monitor_data(s, mcs) ||
742
0
            !gcc_write_client_monitor_extended_data(s, mcs))
743
0
          return FALSE;
744
0
      }
745
0
      else
746
0
      {
747
0
        WLog_Print(mcs->log, WLOG_ERROR,
748
0
                   "Use /multimon:force to force sending multi monitor information");
749
0
      }
750
0
    }
751
0
  }
752
0
  return TRUE;
753
0
}
754
755
char* gcc_block_type_string(UINT16 type, char* buffer, size_t size)
756
55.6k
{
757
55.6k
  switch (type)
758
55.6k
  {
759
724
    case CS_CORE:
760
724
      (void)_snprintf(buffer, size, "CS_CORE [0x%04" PRIx16 "]", type);
761
724
      break;
762
117
    case CS_SECURITY:
763
117
      (void)_snprintf(buffer, size, "CS_SECURITY [0x%04" PRIx16 "]", type);
764
117
      break;
765
57
    case CS_NET:
766
57
      (void)_snprintf(buffer, size, "CS_NET [0x%04" PRIx16 "]", type);
767
57
      break;
768
1.33k
    case CS_CLUSTER:
769
1.33k
      (void)_snprintf(buffer, size, "CS_CLUSTER [0x%04" PRIx16 "]", type);
770
1.33k
      break;
771
301
    case CS_MONITOR:
772
301
      (void)_snprintf(buffer, size, "CS_MONITOR [0x%04" PRIx16 "]", type);
773
301
      break;
774
1.19k
    case CS_MCS_MSGCHANNEL:
775
1.19k
      (void)_snprintf(buffer, size, "CS_MONITOR [0x%04" PRIx16 "]", type);
776
1.19k
      break;
777
343
    case CS_MONITOR_EX:
778
343
      (void)_snprintf(buffer, size, "CS_MONITOR_EX [0x%04" PRIx16 "]", type);
779
343
      break;
780
93
    case CS_UNUSED1:
781
93
      (void)_snprintf(buffer, size, "CS_UNUSED1 [0x%04" PRIx16 "]", type);
782
93
      break;
783
482
    case CS_MULTITRANSPORT:
784
482
      (void)_snprintf(buffer, size, "CS_MONITOR_EX [0x%04" PRIx16 "]", type);
785
482
      break;
786
3.41k
    case SC_CORE:
787
3.41k
      (void)_snprintf(buffer, size, "SC_CORE [0x%04" PRIx16 "]", type);
788
3.41k
      break;
789
79
    case SC_SECURITY:
790
79
      (void)_snprintf(buffer, size, "SC_SECURITY [0x%04" PRIx16 "]", type);
791
79
      break;
792
2.64k
    case SC_NET:
793
2.64k
      (void)_snprintf(buffer, size, "SC_NET [0x%04" PRIx16 "]", type);
794
2.64k
      break;
795
385
    case SC_MCS_MSGCHANNEL:
796
385
      (void)_snprintf(buffer, size, "SC_MCS_MSGCHANNEL [0x%04" PRIx16 "]", type);
797
385
      break;
798
570
    case SC_MULTITRANSPORT:
799
570
      (void)_snprintf(buffer, size, "SC_MULTITRANSPORT [0x%04" PRIx16 "]", type);
800
570
      break;
801
43.9k
    default:
802
43.9k
      (void)_snprintf(buffer, size, "UNKNOWN [0x%04" PRIx16 "]", type);
803
43.9k
      break;
804
55.6k
  }
805
55.6k
  return buffer;
806
55.6k
}
807
808
BOOL gcc_read_server_data_blocks(wStream* s, rdpMcs* mcs, UINT16 length)
809
1.30k
{
810
1.30k
  UINT16 type = 0;
811
1.30k
  UINT16 offset = 0;
812
1.30k
  UINT16 blockLength = 0;
813
1.30k
  BYTE* holdp = nullptr;
814
815
1.30k
  WINPR_ASSERT(s);
816
1.30k
  WINPR_ASSERT(mcs);
817
818
26.5k
  while (offset < length)
819
26.3k
  {
820
26.3k
    char buffer[64] = WINPR_C_ARRAY_INIT;
821
26.3k
    size_t rest = 0;
822
26.3k
    wStream subbuffer;
823
26.3k
    wStream* sub = nullptr;
824
825
26.3k
    if (!gcc_read_user_data_header(mcs->log, s, &type, &blockLength))
826
811
    {
827
811
      WLog_Print(mcs->log, WLOG_ERROR,
828
811
                 "gcc_read_server_data_blocks: gcc_read_user_data_header failed");
829
811
      return FALSE;
830
811
    }
831
25.5k
    holdp = Stream_Pointer(s);
832
25.5k
    sub = Stream_StaticInit(&subbuffer, holdp, blockLength - 4);
833
25.5k
    if (!Stream_SafeSeek(s, blockLength - 4))
834
0
    {
835
0
      WLog_Print(mcs->log, WLOG_ERROR, "gcc_read_server_data_blocks: stream too short");
836
0
      return FALSE;
837
0
    }
838
25.5k
    offset += blockLength;
839
840
25.5k
    switch (type)
841
25.5k
    {
842
9.80k
      case SC_CORE:
843
9.80k
        if (!gcc_read_server_core_data(sub, mcs))
844
3
        {
845
3
          WLog_Print(mcs->log, WLOG_ERROR,
846
3
                     "gcc_read_server_data_blocks: gcc_read_server_core_data failed");
847
3
          return FALSE;
848
3
        }
849
850
9.80k
        break;
851
852
9.80k
      case SC_SECURITY:
853
398
        if (!gcc_read_server_security_data(sub, mcs))
854
320
          return FALSE;
855
78
        break;
856
857
2.80k
      case SC_NET:
858
2.80k
        if (!gcc_read_server_network_data(sub, mcs))
859
36
        {
860
36
          WLog_Print(mcs->log, WLOG_ERROR,
861
36
                     "gcc_read_server_data_blocks: gcc_read_server_network_data failed");
862
36
          return FALSE;
863
36
        }
864
865
2.77k
        break;
866
867
2.77k
      case SC_MCS_MSGCHANNEL:
868
388
        if (!gcc_read_server_message_channel_data(sub, mcs))
869
2
        {
870
2
          WLog_Print(
871
2
              mcs->log, WLOG_ERROR,
872
2
              "gcc_read_server_data_blocks: gcc_read_server_message_channel_data failed");
873
2
          return FALSE;
874
2
        }
875
876
386
        break;
877
878
1.08k
      case SC_MULTITRANSPORT:
879
1.08k
        if (!gcc_read_server_multitransport_channel_data(sub, mcs))
880
2
        {
881
2
          WLog_Print(mcs->log, WLOG_ERROR,
882
2
                     "gcc_read_server_data_blocks: "
883
2
                     "gcc_read_server_multitransport_channel_data failed");
884
2
          return FALSE;
885
2
        }
886
887
1.08k
        break;
888
889
11.1k
      default:
890
11.1k
        WLog_Print(mcs->log, WLOG_ERROR, "gcc_read_server_data_blocks: ignoring type=%s",
891
11.1k
                   gcc_block_type_string(type, buffer, sizeof(buffer)));
892
11.1k
        winpr_HexLogDump(mcs->log, WLOG_TRACE, Stream_Pointer(sub),
893
11.1k
                         Stream_GetRemainingLength(sub));
894
11.1k
        break;
895
25.5k
    }
896
897
25.2k
    rest = Stream_GetRemainingLength(sub);
898
25.2k
    if (rest > 0)
899
17.7k
    {
900
17.7k
      WLog_Print(mcs->log, WLOG_WARN,
901
17.7k
                 "gcc_read_server_data_blocks: ignoring %" PRIuz " bytes with type=%s", rest,
902
17.7k
                 gcc_block_type_string(type, buffer, sizeof(buffer)));
903
17.7k
    }
904
25.2k
  }
905
906
126
  return TRUE;
907
1.30k
}
908
909
BOOL gcc_write_server_data_blocks(wStream* s, rdpMcs* mcs)
910
0
{
911
0
  WINPR_ASSERT(s);
912
0
  WINPR_ASSERT(mcs);
913
914
0
  if (!gcc_write_server_core_data(s, mcs) ||          /* serverCoreData */
915
0
      !gcc_write_server_network_data(s, mcs) ||       /* serverNetworkData */
916
0
      !gcc_write_server_security_data(s, mcs) ||      /* serverSecurityData */
917
0
      !gcc_write_server_message_channel_data(s, mcs)) /* serverMessageChannelData */
918
0
    return FALSE;
919
920
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
921
0
  WINPR_ASSERT(settings);
922
923
0
  if (settings->SupportMultitransport && (settings->MultitransportFlags != 0))
924
    /* serverMultitransportChannelData */
925
0
    return gcc_write_server_multitransport_channel_data(s, mcs);
926
927
0
  return TRUE;
928
0
}
929
930
BOOL gcc_read_user_data_header(wLog* log, wStream* s, UINT16* type, UINT16* length)
931
54.4k
{
932
54.4k
  WINPR_ASSERT(s);
933
54.4k
  if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 4))
934
373
    return FALSE;
935
936
54.1k
  Stream_Read_UINT16(s, *type);   /* type */
937
54.1k
  Stream_Read_UINT16(s, *length); /* length */
938
939
54.1k
  return !((*length < 4) ||
940
53.9k
           (!Stream_CheckAndLogRequiredLengthWLog(log, s, (size_t)(*length - 4))));
941
54.4k
}
942
943
/**
944
 * Write a user data header (TS_UD_HEADER).
945
 * msdn{cc240509}
946
 *
947
 * @param s stream
948
 * @param type data block type
949
 * @param length data block length
950
 *
951
 * @return \b TRUE for success, \b FALSE otherwise
952
 */
953
954
BOOL gcc_write_user_data_header(wStream* s, UINT16 type, UINT16 length)
955
0
{
956
957
0
  WINPR_ASSERT(s);
958
0
  if (!Stream_EnsureRemainingCapacity(s, 4 + length))
959
0
    return FALSE;
960
0
  Stream_Write_UINT16(s, type);   /* type */
961
0
  Stream_Write_UINT16(s, length); /* length */
962
0
  return TRUE;
963
0
}
964
965
static UINT32 filterAndLogEarlyServerCapabilityFlags(wLog* log, UINT32 flags)
966
9.80k
{
967
9.80k
  const UINT32 mask =
968
9.80k
      (RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1 | RNS_UD_SC_DYNAMIC_DST_SUPPORTED |
969
9.80k
       RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2 | RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED);
970
9.80k
  const UINT32 filtered = flags & mask;
971
9.80k
  const UINT32 unknown = flags & (~mask);
972
9.80k
  if (unknown != 0)
973
5.67k
  {
974
5.67k
    char buffer[256] = WINPR_C_ARRAY_INIT;
975
5.67k
    WLog_Print(log, WLOG_WARN,
976
5.67k
               "TS_UD_SC_CORE::EarlyCapabilityFlags [0x%08" PRIx32 " & 0x%08" PRIx32
977
5.67k
               " --> 0x%08" PRIx32 "] filtering %s, feature not implemented",
978
5.67k
               flags, ~mask, unknown,
979
5.67k
               rdp_early_server_caps_string(unknown, buffer, sizeof(buffer)));
980
5.67k
  }
981
9.80k
  return filtered;
982
9.80k
}
983
984
static UINT32 earlyServerCapsFromSettings(wLog* log, const rdpSettings* settings)
985
0
{
986
0
  UINT32 EarlyCapabilityFlags = 0;
987
988
0
  if (settings->SupportEdgeActionV1)
989
0
    EarlyCapabilityFlags |= RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1;
990
0
  if (settings->SupportDynamicTimeZone)
991
0
    EarlyCapabilityFlags |= RNS_UD_SC_DYNAMIC_DST_SUPPORTED;
992
0
  if (settings->SupportEdgeActionV2)
993
0
    EarlyCapabilityFlags |= RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2;
994
0
  if (settings->SupportSkipChannelJoin)
995
0
    EarlyCapabilityFlags |= RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED;
996
997
0
  return filterAndLogEarlyServerCapabilityFlags(log, EarlyCapabilityFlags);
998
0
}
999
1000
static UINT16 filterAndLogEarlyClientCapabilityFlags(wLog* log, UINT32 flags)
1001
553
{
1002
553
  const UINT32 mask =
1003
553
      (RNS_UD_CS_SUPPORT_ERRINFO_PDU | RNS_UD_CS_WANT_32BPP_SESSION |
1004
553
       RNS_UD_CS_SUPPORT_STATUSINFO_PDU | RNS_UD_CS_STRONG_ASYMMETRIC_KEYS |
1005
553
       RNS_UD_CS_RELATIVE_MOUSE_INPUT | RNS_UD_CS_VALID_CONNECTION_TYPE |
1006
553
       RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU | RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT |
1007
553
       RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL | RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE |
1008
553
       RNS_UD_CS_SUPPORT_HEARTBEAT_PDU | RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN);
1009
553
  const UINT32 filtered = flags & mask;
1010
553
  const UINT32 unknown = flags & ~mask;
1011
553
  if (unknown != 0)
1012
213
  {
1013
213
    char buffer[256] = WINPR_C_ARRAY_INIT;
1014
213
    WLog_Print(log, WLOG_WARN,
1015
213
               "(TS_UD_CS_CORE)::EarlyCapabilityFlags [0x%08" PRIx32 " & 0x%08" PRIx32
1016
213
               " --> 0x%08" PRIx32 "] filtering %s, feature not implemented",
1017
213
               flags, ~mask, unknown,
1018
213
               rdp_early_client_caps_string(unknown, buffer, sizeof(buffer)));
1019
213
  }
1020
1021
553
  WINPR_ASSERT(filtered <= UINT16_MAX);
1022
553
  return (UINT16)filtered;
1023
553
}
1024
1025
static UINT16 earlyClientCapsFromSettings(wLog* log, const rdpSettings* settings)
1026
0
{
1027
0
  UINT32 earlyCapabilityFlags = 0;
1028
1029
0
  WINPR_ASSERT(settings);
1030
0
  if (settings->SupportErrorInfoPdu)
1031
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_ERRINFO_PDU;
1032
1033
0
  if (freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth) == 32)
1034
0
    earlyCapabilityFlags |= RNS_UD_CS_WANT_32BPP_SESSION;
1035
1036
0
  if (settings->SupportStatusInfoPdu)
1037
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_STATUSINFO_PDU;
1038
1039
0
  if (settings->ConnectionType)
1040
0
    earlyCapabilityFlags |= RNS_UD_CS_VALID_CONNECTION_TYPE;
1041
1042
0
  if (settings->SupportMonitorLayoutPdu)
1043
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU;
1044
1045
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
1046
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT;
1047
1048
0
  if (settings->SupportGraphicsPipeline)
1049
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL;
1050
1051
0
  if (settings->SupportDynamicTimeZone)
1052
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE;
1053
1054
0
  if (settings->SupportHeartbeatPdu)
1055
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_HEARTBEAT_PDU;
1056
1057
0
  if (settings->SupportAsymetricKeys)
1058
0
    earlyCapabilityFlags |= RNS_UD_CS_STRONG_ASYMMETRIC_KEYS;
1059
1060
0
  if (settings->HasRelativeMouseEvent)
1061
0
    earlyCapabilityFlags |= RNS_UD_CS_RELATIVE_MOUSE_INPUT;
1062
1063
0
  if (settings->SupportSkipChannelJoin)
1064
0
    earlyCapabilityFlags |= RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN;
1065
1066
0
  return filterAndLogEarlyClientCapabilityFlags(log, earlyCapabilityFlags);
1067
0
}
1068
1069
static BOOL updateEarlyClientCaps(wLog* log, rdpSettings* settings, UINT32 earlyCapabilityFlags,
1070
                                  UINT32 connectionType)
1071
553
{
1072
553
  WINPR_ASSERT(settings);
1073
1074
553
  if (settings->SupportErrorInfoPdu)
1075
0
    settings->SupportErrorInfoPdu = (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_ERRINFO_PDU) != 0;
1076
1077
  /* RNS_UD_CS_WANT_32BPP_SESSION is already handled in gcc_read_client_core_data:
1078
   *
1079
   * it is evaluated in combination with highColorDepth and the server side
1080
   * settings to determine the session color depth to use.
1081
   */
1082
1083
553
  if (settings->SupportStatusInfoPdu)
1084
0
    settings->SupportStatusInfoPdu =
1085
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_STATUSINFO_PDU) != 0;
1086
1087
553
  if (settings->SupportAsymetricKeys)
1088
0
    settings->SupportAsymetricKeys =
1089
0
        (earlyCapabilityFlags & RNS_UD_CS_STRONG_ASYMMETRIC_KEYS) != 0;
1090
1091
553
  if (settings->HasRelativeMouseEvent)
1092
312
  {
1093
    /* [MS-RDPBCGR] 2.2.7.1.5 Pointer Capability Set (TS_POINTER_CAPABILITYSET)
1094
     * the flag must be ignored if the RDP version is < 0x00080011 */
1095
312
    if (settings->RdpVersion >= RDP_VERSION_10_12)
1096
190
    {
1097
190
      settings->HasRelativeMouseEvent =
1098
190
          (earlyCapabilityFlags & RNS_UD_CS_RELATIVE_MOUSE_INPUT) != 0;
1099
190
    }
1100
122
    else
1101
122
      settings->HasRelativeMouseEvent = FALSE;
1102
312
  }
1103
1104
553
  if (settings->NetworkAutoDetect)
1105
316
    settings->NetworkAutoDetect =
1106
316
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_NETCHAR_AUTODETECT) != 0;
1107
1108
553
  if (settings->SupportSkipChannelJoin)
1109
385
    settings->SupportSkipChannelJoin =
1110
385
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_SKIP_CHANNELJOIN) != 0;
1111
1112
553
  if (settings->SupportMonitorLayoutPdu)
1113
0
    settings->SupportMonitorLayoutPdu =
1114
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_MONITOR_LAYOUT_PDU) != 0;
1115
1116
553
  if (settings->SupportHeartbeatPdu)
1117
313
    settings->SupportHeartbeatPdu =
1118
313
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_HEARTBEAT_PDU) != 0;
1119
1120
553
  if (settings->SupportGraphicsPipeline)
1121
0
    settings->SupportGraphicsPipeline =
1122
0
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_DYNVC_GFX_PROTOCOL) != 0;
1123
1124
553
  if (settings->SupportDynamicTimeZone)
1125
321
    settings->SupportDynamicTimeZone =
1126
321
        (earlyCapabilityFlags & RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE) != 0;
1127
1128
553
  if ((earlyCapabilityFlags & RNS_UD_CS_VALID_CONNECTION_TYPE) == 0)
1129
480
    connectionType = 0;
1130
553
  settings->ConnectionType = connectionType;
1131
1132
553
  filterAndLogEarlyClientCapabilityFlags(log, earlyCapabilityFlags);
1133
553
  return TRUE;
1134
553
}
1135
1136
static BOOL updateEarlyServerCaps(wLog* log, rdpSettings* settings, UINT32 earlyCapabilityFlags,
1137
                                  WINPR_ATTR_UNUSED UINT32 connectionType)
1138
9.80k
{
1139
9.80k
  WINPR_ASSERT(settings);
1140
1141
9.80k
  settings->SupportEdgeActionV1 = (settings->SupportEdgeActionV1 &&
1142
0
                                   (earlyCapabilityFlags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V1));
1143
9.80k
  settings->SupportDynamicTimeZone = (settings->SupportDynamicTimeZone &&
1144
2.40k
                                      (earlyCapabilityFlags & RNS_UD_SC_DYNAMIC_DST_SUPPORTED));
1145
9.80k
  settings->SupportEdgeActionV2 = (settings->SupportEdgeActionV2 &&
1146
0
                                   (earlyCapabilityFlags & RNS_UD_SC_EDGE_ACTIONS_SUPPORTED_V2));
1147
9.80k
  settings->SupportSkipChannelJoin =
1148
9.80k
      (settings->SupportSkipChannelJoin &&
1149
2.60k
       (earlyCapabilityFlags & RNS_UD_SC_SKIP_CHANNELJOIN_SUPPORTED));
1150
1151
9.80k
  filterAndLogEarlyServerCapabilityFlags(log, earlyCapabilityFlags);
1152
9.80k
  return TRUE;
1153
9.80k
}
1154
1155
/**
1156
 * Read a client core data block (TS_UD_CS_CORE).
1157
 * msdn{cc240510}
1158
 * @param s stream
1159
 * @param mcs The MCS instance
1160
 *
1161
 * @return \b TRUE for success, \b FALSE otherwise
1162
 */
1163
1164
BOOL gcc_read_client_core_data(wStream* s, rdpMcs* mcs)
1165
732
{
1166
732
  char buffer[2048] = WINPR_C_ARRAY_INIT;
1167
732
  char strbuffer[130] = WINPR_C_ARRAY_INIT;
1168
732
  UINT32 version = 0;
1169
732
  BYTE connectionType = 0;
1170
732
  UINT32 clientColorDepth = 0;
1171
732
  UINT16 colorDepth = 0;
1172
732
  UINT16 postBeta2ColorDepth = 0;
1173
732
  UINT16 highColorDepth = 0;
1174
732
  UINT32 serverSelectedProtocol = 0;
1175
732
  rdpSettings* settings = mcs_get_settings(mcs);
1176
1177
732
  WINPR_ASSERT(s);
1178
732
  WINPR_ASSERT(settings);
1179
1180
  /* Length of all required fields, until imeFileName */
1181
732
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 128))
1182
4
    return FALSE;
1183
1184
728
  Stream_Read_UINT32(s, version); /* version (4 bytes) */
1185
728
  settings->RdpVersion = rdp_version_common(mcs->log, version, settings->RdpVersion);
1186
728
  Stream_Read_UINT16(s, settings->DesktopWidth);  /* DesktopWidth (2 bytes) */
1187
728
  Stream_Read_UINT16(s, settings->DesktopHeight); /* DesktopHeight (2 bytes) */
1188
728
  Stream_Read_UINT16(s, colorDepth);              /* ColorDepth (2 bytes) */
1189
728
  Stream_Seek_UINT16(s); /* SASSequence (Secure Access Sequence) (2 bytes) */
1190
728
  Stream_Read_UINT32(s, settings->KeyboardLayout); /* KeyboardLayout (4 bytes) */
1191
728
  Stream_Read_UINT32(s, settings->ClientBuild);    /* ClientBuild (4 bytes) */
1192
1193
  /* clientName (32 bytes, null-terminated unicode, truncated to 15 characters) */
1194
728
  if (Stream_Read_UTF16_String_As_UTF8_Buffer(s, 32 / sizeof(WCHAR), strbuffer,
1195
728
                                              ARRAYSIZE(strbuffer)) < 0)
1196
14
  {
1197
14
    WLog_Print(mcs->log, WLOG_ERROR, "failed to convert client host name");
1198
14
    return FALSE;
1199
14
  }
1200
1201
714
  if (!freerdp_settings_set_string(settings, FreeRDP_ClientHostname, strbuffer))
1202
0
    return FALSE;
1203
1204
714
  Stream_Read_UINT32(s, settings->KeyboardType);        /* KeyboardType (4 bytes) */
1205
714
  Stream_Read_UINT32(s, settings->KeyboardSubType);     /* KeyboardSubType (4 bytes) */
1206
714
  Stream_Read_UINT32(s, settings->KeyboardFunctionKey); /* KeyboardFunctionKey (4 bytes) */
1207
714
  Stream_Seek(s, 64);                                   /* imeFileName (64 bytes) */
1208
1209
  /**
1210
   * The following fields are all optional. If one field is present, all of the preceding
1211
   * fields MUST also be present. If one field is not present, all of the subsequent fields
1212
   * MUST NOT be present.
1213
   * We must check the bytes left before reading each field.
1214
   */
1215
1216
714
  do
1217
714
  {
1218
714
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1219
9
      break;
1220
1221
705
    Stream_Read_UINT16(s, postBeta2ColorDepth); /* postBeta2ColorDepth (2 bytes) */
1222
1223
705
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1224
23
      break;
1225
1226
682
    const UINT16 clientProductId = Stream_Get_UINT16(s); /* clientProductID (2 bytes) */
1227
1228
    /* [MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::clientProductId (optional)
1229
     * should be initialized to 1
1230
     */
1231
682
    if (clientProductId != 1)
1232
660
    {
1233
660
      WLog_Print(mcs->log, WLOG_WARN,
1234
660
                 "[MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::clientProductId "
1235
660
                 "(optional) expected 1, got %" PRIu32,
1236
660
                 clientProductId);
1237
660
    }
1238
1239
682
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1240
55
      break;
1241
1242
627
    const UINT32 serialNumber = Stream_Get_UINT32(s); /* serialNumber (4 bytes) */
1243
1244
    /* [MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::serialNumber (optional)
1245
     * should be initialized to 0
1246
     */
1247
627
    if (serialNumber != 0)
1248
570
    {
1249
570
      WLog_Print(mcs->log, WLOG_WARN,
1250
570
                 "[MS-RDPBCGR] 2.2.1.3.2 Client Core Data (TS_UD_CS_CORE)::serialNumber "
1251
570
                 "(optional) expected 0, got %" PRIu32,
1252
570
                 serialNumber);
1253
570
    }
1254
1255
627
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1256
34
      break;
1257
1258
593
    Stream_Read_UINT16(s, highColorDepth); /* highColorDepth (2 bytes) */
1259
1260
593
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1261
85
      break;
1262
1263
508
    Stream_Read_UINT16(s, settings->SupportedColorDepths); /* supportedColorDepths (2 bytes) */
1264
1265
508
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1266
22
      break;
1267
1268
486
    Stream_Read_UINT16(s, settings->EarlyCapabilityFlags); /* earlyCapabilityFlags (2 bytes) */
1269
1270
    /* clientDigProductId (64 bytes): Contains a value that uniquely identifies the client */
1271
486
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 64))
1272
25
      break;
1273
1274
461
    if (Stream_Read_UTF16_String_As_UTF8_Buffer(s, 64 / sizeof(WCHAR), strbuffer,
1275
461
                                                ARRAYSIZE(strbuffer)) < 0)
1276
9
    {
1277
9
      WLog_Print(mcs->log, WLOG_ERROR, "failed to convert the client product identifier");
1278
9
      return FALSE;
1279
9
    }
1280
1281
452
    if (!freerdp_settings_set_string(settings, FreeRDP_ClientProductId, strbuffer))
1282
0
      return FALSE;
1283
1284
452
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 1))
1285
3
      break;
1286
1287
449
    Stream_Read_UINT8(s, connectionType); /* connectionType (1 byte) */
1288
1289
449
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 1))
1290
2
      break;
1291
1292
447
    Stream_Seek_UINT8(s); /* pad1octet (1 byte) */
1293
1294
447
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1295
12
      break;
1296
1297
435
    Stream_Read_UINT32(s, serverSelectedProtocol); /* serverSelectedProtocol (4 bytes) */
1298
1299
435
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1300
2
      break;
1301
1302
433
    Stream_Read_UINT32(s, settings->DesktopPhysicalWidth); /* desktopPhysicalWidth (4 bytes) */
1303
1304
433
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1305
4
      break;
1306
1307
429
    Stream_Read_UINT32(s,
1308
429
                       settings->DesktopPhysicalHeight); /* desktopPhysicalHeight (4 bytes) */
1309
1310
429
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
1311
2
      break;
1312
1313
427
    Stream_Read_UINT16(s, settings->DesktopOrientation); /* desktopOrientation (2 bytes) */
1314
1315
427
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1316
5
      break;
1317
1318
422
    Stream_Read_UINT32(s, settings->DesktopScaleFactor); /* desktopScaleFactor (4 bytes) */
1319
1320
422
    if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1321
3
      break;
1322
1323
419
    Stream_Read_UINT32(s, settings->DeviceScaleFactor); /* deviceScaleFactor (4 bytes) */
1324
1325
419
    if (freerdp_settings_get_bool(settings, FreeRDP_TransportDumpReplay))
1326
419
      settings->SelectedProtocol = serverSelectedProtocol;
1327
0
    else if (settings->SelectedProtocol != serverSelectedProtocol)
1328
0
      return FALSE;
1329
419
  } while (0);
1330
1331
705
  if (highColorDepth > 0)
1332
534
  {
1333
534
    if (settings->EarlyCapabilityFlags & RNS_UD_CS_WANT_32BPP_SESSION)
1334
117
      clientColorDepth = 32;
1335
417
    else
1336
417
      clientColorDepth = highColorDepth;
1337
534
  }
1338
171
  else if (postBeta2ColorDepth > 0)
1339
111
  {
1340
111
    switch (postBeta2ColorDepth)
1341
111
    {
1342
3
      case RNS_UD_COLOR_4BPP:
1343
3
        clientColorDepth = 4;
1344
3
        break;
1345
1346
3
      case RNS_UD_COLOR_8BPP:
1347
3
        clientColorDepth = 8;
1348
3
        break;
1349
1350
3
      case RNS_UD_COLOR_16BPP_555:
1351
3
        clientColorDepth = 15;
1352
3
        break;
1353
1354
2
      case RNS_UD_COLOR_16BPP_565:
1355
2
        clientColorDepth = 16;
1356
2
        break;
1357
1358
2
      case RNS_UD_COLOR_24BPP:
1359
2
        clientColorDepth = 24;
1360
2
        break;
1361
1362
98
      default:
1363
98
        return FALSE;
1364
111
    }
1365
111
  }
1366
60
  else
1367
60
  {
1368
60
    switch (colorDepth)
1369
60
    {
1370
3
      case RNS_UD_COLOR_4BPP:
1371
3
        clientColorDepth = 4;
1372
3
        break;
1373
1374
3
      case RNS_UD_COLOR_8BPP:
1375
3
        clientColorDepth = 8;
1376
3
        break;
1377
1378
54
      default:
1379
54
        return FALSE;
1380
60
    }
1381
60
  }
1382
1383
  /*
1384
   * If we are in server mode, accept client's color depth only if
1385
   * it is smaller than ours. This is what Windows server does.
1386
   */
1387
553
  if ((clientColorDepth < freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth)) ||
1388
418
      !settings->ServerMode)
1389
553
  {
1390
553
    if (!freerdp_settings_set_uint32(settings, FreeRDP_ColorDepth, clientColorDepth))
1391
0
      return FALSE;
1392
553
  }
1393
1394
553
  WLog_Print(
1395
553
      mcs->log, WLOG_DEBUG, "Received EarlyCapabilityFlags=%s",
1396
553
      rdp_early_client_caps_string(settings->EarlyCapabilityFlags, buffer, sizeof(buffer)));
1397
1398
553
  return updateEarlyClientCaps(mcs->log, settings, settings->EarlyCapabilityFlags,
1399
553
                               connectionType);
1400
553
}
1401
1402
/**
1403
 * Write a client core data block (TS_UD_CS_CORE).
1404
 * msdn{cc240510}
1405
 * @param s The stream to write to
1406
 * @param mcs The MSC instance to get the data from
1407
 *
1408
 * @return \b TRUE for success, \b FALSE otherwise
1409
 */
1410
1411
BOOL gcc_write_client_core_data(wStream* s, const rdpMcs* mcs)
1412
0
{
1413
0
  char buffer[2048] = WINPR_C_ARRAY_INIT;
1414
0
  char dbuffer[2048] = WINPR_C_ARRAY_INIT;
1415
0
  BYTE connectionType = 0;
1416
0
  HIGH_COLOR_DEPTH highColorDepth = HIGH_COLOR_4BPP;
1417
1418
0
  UINT16 earlyCapabilityFlags = 0;
1419
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1420
1421
0
  WINPR_ASSERT(s);
1422
0
  WINPR_ASSERT(settings);
1423
1424
0
  const UINT16 SupportedColorDepths =
1425
0
      freerdp_settings_get_uint16(settings, FreeRDP_SupportedColorDepths);
1426
0
  const UINT32 ColorDepth = freerdp_settings_get_uint32(settings, FreeRDP_ColorDepth);
1427
1428
0
  if (!gcc_write_user_data_header(s, CS_CORE, 234))
1429
0
    return FALSE;
1430
1431
0
  Stream_Write_UINT32(s, settings->RdpVersion); /* Version */
1432
0
  Stream_Write_UINT16(
1433
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, settings->DesktopWidth)); /* DesktopWidth */
1434
0
  Stream_Write_UINT16(
1435
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, settings->DesktopHeight)); /* DesktopHeight */
1436
0
  Stream_Write_UINT16(s,
1437
0
                      RNS_UD_COLOR_8BPP); /* ColorDepth, ignored because of postBeta2ColorDepth */
1438
0
  Stream_Write_UINT16(s, RNS_UD_SAS_DEL); /* SASSequence (Secure Access Sequence) */
1439
0
  Stream_Write_UINT32(s, settings->KeyboardLayout); /* KeyboardLayout */
1440
0
  Stream_Write_UINT32(s, settings->ClientBuild);    /* ClientBuild */
1441
1442
0
  if (!Stream_EnsureRemainingCapacity(s, 32 + 12 + 64 + 8))
1443
0
    return FALSE;
1444
1445
  /* clientName (32 bytes, null-terminated unicode, truncated to 15 characters) */
1446
0
  size_t clientNameLength = 0;
1447
0
  WCHAR* clientName = ConvertUtf8ToWCharAlloc(settings->ClientHostname, &clientNameLength);
1448
0
  if (clientNameLength >= 16)
1449
0
  {
1450
0
    clientNameLength = 16;
1451
0
    clientName[clientNameLength - 1] = 0;
1452
0
  }
1453
1454
0
  Stream_Write(s, clientName, (clientNameLength * 2));
1455
0
  Stream_Zero(s, 32 - (clientNameLength * 2));
1456
0
  free(clientName);
1457
0
  Stream_Write_UINT32(s, settings->KeyboardType);        /* KeyboardType */
1458
0
  Stream_Write_UINT32(s, settings->KeyboardSubType);     /* KeyboardSubType */
1459
0
  Stream_Write_UINT32(s, settings->KeyboardFunctionKey); /* KeyboardFunctionKey */
1460
0
  Stream_Zero(s, 64);                                    /* imeFileName */
1461
0
  Stream_Write_UINT16(s, RNS_UD_COLOR_8BPP);             /* postBeta2ColorDepth */
1462
0
  Stream_Write_UINT16(s, 1);                             /* clientProductID */
1463
0
  Stream_Write_UINT32(s, 0); /* serialNumber (should be initialized to 0) */
1464
0
  highColorDepth = ColorDepthToHighColor(ColorDepth);
1465
0
  earlyCapabilityFlags = earlyClientCapsFromSettings(mcs->log, settings);
1466
1467
0
  WINPR_ASSERT(settings->ConnectionType <= UINT8_MAX);
1468
0
  connectionType = (UINT8)settings->ConnectionType;
1469
1470
0
  if (!Stream_EnsureRemainingCapacity(s, 6))
1471
0
    return FALSE;
1472
1473
0
  WLog_Print(
1474
0
      mcs->log, WLOG_DEBUG,
1475
0
      "Sending highColorDepth=%s, supportedColorDepths=%s, earlyCapabilityFlags=%s",
1476
0
      HighColorToString(highColorDepth),
1477
0
      freerdp_supported_color_depths_string(SupportedColorDepths, dbuffer, sizeof(dbuffer)),
1478
0
      rdp_early_client_caps_string(earlyCapabilityFlags, buffer, sizeof(buffer)));
1479
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, highColorDepth)); /* highColorDepth */
1480
0
  Stream_Write_UINT16(s, SupportedColorDepths); /* supportedColorDepths */
1481
0
  Stream_Write_UINT16(s, earlyCapabilityFlags); /* earlyCapabilityFlags */
1482
1483
0
  if (!Stream_EnsureRemainingCapacity(s, 64 + 24))
1484
0
    return FALSE;
1485
1486
  /* clientDigProductId (64 bytes, assume WCHAR, not \0 terminated */
1487
0
  const char* str = freerdp_settings_get_string(settings, FreeRDP_ClientProductId);
1488
0
  if (str)
1489
0
  {
1490
0
    if (Stream_Write_UTF16_String_From_UTF8(s, 32, str, strnlen(str, 32), TRUE) < 0)
1491
0
      return FALSE;
1492
0
  }
1493
0
  else
1494
0
    Stream_Zero(s, 32 * sizeof(WCHAR));
1495
1496
0
  Stream_Write_UINT8(s, connectionType);                   /* connectionType */
1497
0
  Stream_Write_UINT8(s, 0);                                /* pad1octet */
1498
0
  Stream_Write_UINT32(s, settings->SelectedProtocol);      /* serverSelectedProtocol */
1499
0
  Stream_Write_UINT32(s, settings->DesktopPhysicalWidth);  /* desktopPhysicalWidth */
1500
0
  Stream_Write_UINT32(s, settings->DesktopPhysicalHeight); /* desktopPhysicalHeight */
1501
0
  Stream_Write_UINT16(s, settings->DesktopOrientation);    /* desktopOrientation */
1502
0
  Stream_Write_UINT32(s, settings->DesktopScaleFactor);    /* desktopScaleFactor */
1503
0
  Stream_Write_UINT32(s, settings->DeviceScaleFactor);     /* deviceScaleFactor */
1504
0
  return TRUE;
1505
0
}
1506
1507
BOOL gcc_read_server_core_data(wStream* s, rdpMcs* mcs)
1508
9.80k
{
1509
9.80k
  UINT32 serverVersion = 0;
1510
9.80k
  rdpSettings* settings = mcs_get_settings(mcs);
1511
1512
9.80k
  WINPR_ASSERT(s);
1513
9.80k
  WINPR_ASSERT(settings);
1514
1515
9.80k
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1516
3
    return FALSE;
1517
1518
9.80k
  Stream_Read_UINT32(s, serverVersion); /* version */
1519
9.80k
  settings->RdpVersion = rdp_version_common(mcs->log, serverVersion, settings->RdpVersion);
1520
1521
9.80k
  if (Stream_GetRemainingLength(s) >= 4)
1522
1.63k
  {
1523
1.63k
    Stream_Read_UINT32(s, settings->RequestedProtocols); /* clientRequestedProtocols */
1524
1.63k
  }
1525
1526
9.80k
  if (Stream_GetRemainingLength(s) >= 4)
1527
1.61k
  {
1528
1.61k
    char buffer[2048] = WINPR_C_ARRAY_INIT;
1529
1530
1.61k
    Stream_Read_UINT32(s, settings->EarlyCapabilityFlags); /* earlyCapabilityFlags */
1531
1.61k
    WLog_Print(
1532
1.61k
        mcs->log, WLOG_DEBUG, "Received EarlyCapabilityFlags=%s",
1533
1.61k
        rdp_early_client_caps_string(settings->EarlyCapabilityFlags, buffer, sizeof(buffer)));
1534
1.61k
  }
1535
1536
9.80k
  return updateEarlyServerCaps(mcs->log, settings, settings->EarlyCapabilityFlags,
1537
9.80k
                               settings->ConnectionType);
1538
9.80k
}
1539
1540
/* TODO: This function modifies rdpMcs
1541
 * TODO:  Split this out of this function
1542
 */
1543
BOOL gcc_write_server_core_data(wStream* s, rdpMcs* mcs)
1544
0
{
1545
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1546
1547
0
  WINPR_ASSERT(s);
1548
0
  WINPR_ASSERT(settings);
1549
1550
0
  if (!gcc_write_user_data_header(s, SC_CORE, 16))
1551
0
    return FALSE;
1552
1553
0
  const UINT32 EarlyCapabilityFlags = earlyServerCapsFromSettings(mcs->log, settings);
1554
0
  Stream_Write_UINT32(s, settings->RdpVersion);         /* version (4 bytes) */
1555
0
  Stream_Write_UINT32(s, settings->RequestedProtocols); /* clientRequestedProtocols (4 bytes) */
1556
0
  Stream_Write_UINT32(s, EarlyCapabilityFlags);         /* earlyCapabilityFlags (4 bytes) */
1557
0
  return TRUE;
1558
0
}
1559
1560
/**
1561
 * Read a client security data block (TS_UD_CS_SEC).
1562
 * msdn{cc240511}
1563
 * @param s stream
1564
 * @param mcs MCS instance
1565
 *
1566
 * @return \b TRUE for success, \b FALSE otherwise
1567
 */
1568
1569
BOOL gcc_read_client_security_data(wStream* s, rdpMcs* mcs)
1570
38
{
1571
38
  rdpSettings* settings = mcs_get_settings(mcs);
1572
1573
38
  WINPR_ASSERT(s);
1574
38
  WINPR_ASSERT(settings);
1575
1576
38
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1577
2
    return FALSE;
1578
1579
36
  if (settings->UseRdpSecurityLayer)
1580
0
  {
1581
0
    Stream_Read_UINT32(s, settings->EncryptionMethods); /* encryptionMethods */
1582
1583
0
    if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1584
0
      Stream_Read_UINT32(s, settings->EncryptionMethods); /* extEncryptionMethods */
1585
0
    else
1586
0
      Stream_Seek(s, 4);
1587
0
  }
1588
36
  else
1589
36
  {
1590
36
    Stream_Seek(s, 8);
1591
36
  }
1592
1593
36
  return TRUE;
1594
38
}
1595
1596
/**
1597
 * Write a client security data block (TS_UD_CS_SEC).
1598
 * msdn{cc240511}
1599
 * @param s stream
1600
 * @param mcs The MCS instance
1601
 *
1602
 * @return \b TRUE for success, \b FALSE otherwise
1603
 */
1604
1605
BOOL gcc_write_client_security_data(wStream* s, const rdpMcs* mcs)
1606
0
{
1607
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1608
1609
0
  WINPR_ASSERT(s);
1610
0
  WINPR_ASSERT(settings);
1611
1612
0
  if (!gcc_write_user_data_header(s, CS_SECURITY, 12))
1613
0
    return FALSE;
1614
1615
0
  if (settings->UseRdpSecurityLayer)
1616
0
  {
1617
0
    Stream_Write_UINT32(s, settings->EncryptionMethods); /* encryptionMethods */
1618
0
    Stream_Write_UINT32(s, 0);                           /* extEncryptionMethods */
1619
0
  }
1620
0
  else
1621
0
  {
1622
    /* French locale, disable encryption */
1623
0
    Stream_Write_UINT32(s, 0);                           /* encryptionMethods */
1624
0
    Stream_Write_UINT32(s, settings->EncryptionMethods); /* extEncryptionMethods */
1625
0
  }
1626
0
  return TRUE;
1627
0
}
1628
1629
BOOL gcc_read_server_security_data(wStream* s, rdpMcs* mcs)
1630
398
{
1631
398
  BOOL validCryptoConfig = FALSE;
1632
398
  UINT32 EncryptionMethod = 0;
1633
398
  UINT32 EncryptionLevel = 0;
1634
398
  rdpSettings* settings = mcs_get_settings(mcs);
1635
1636
398
  WINPR_ASSERT(s);
1637
398
  WINPR_ASSERT(settings);
1638
1639
398
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1640
2
    return FALSE;
1641
1642
396
  Stream_Read_UINT32(s, EncryptionMethod); /* encryptionMethod */
1643
396
  Stream_Read_UINT32(s, EncryptionLevel);  /* encryptionLevel */
1644
1645
  /* Only accept valid/known encryption methods */
1646
396
  switch (EncryptionMethod)
1647
396
  {
1648
68
    case ENCRYPTION_METHOD_NONE:
1649
68
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: NONE");
1650
68
      break;
1651
1652
67
    case ENCRYPTION_METHOD_40BIT:
1653
67
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 40BIT");
1654
67
      break;
1655
1656
140
    case ENCRYPTION_METHOD_56BIT:
1657
140
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 56BIT");
1658
140
      break;
1659
1660
72
    case ENCRYPTION_METHOD_128BIT:
1661
72
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: 128BIT");
1662
72
      break;
1663
1664
45
    case ENCRYPTION_METHOD_FIPS:
1665
45
      WLog_Print(mcs->log, WLOG_DEBUG, "Server rdp encryption method: FIPS");
1666
45
      break;
1667
1668
4
    default:
1669
4
      WLog_Print(mcs->log, WLOG_ERROR, "Received unknown encryption method %08" PRIX32 "",
1670
4
                 EncryptionMethod);
1671
4
      return FALSE;
1672
396
  }
1673
1674
392
  if (settings->UseRdpSecurityLayer && !(settings->EncryptionMethods & EncryptionMethod))
1675
0
  {
1676
0
    WLog_Print(mcs->log, WLOG_WARN,
1677
0
               "Server uses non-advertised encryption method 0x%08" PRIX32 "",
1678
0
               EncryptionMethod);
1679
    /* FIXME: Should we return FALSE; in this case ?? */
1680
0
  }
1681
1682
392
  settings->EncryptionMethods = EncryptionMethod;
1683
392
  settings->EncryptionLevel = EncryptionLevel;
1684
  /* Verify encryption level/method combinations according to MS-RDPBCGR Section 5.3.2 */
1685
392
  switch (settings->EncryptionLevel)
1686
392
  {
1687
61
    case ENCRYPTION_LEVEL_NONE:
1688
61
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1689
59
      {
1690
59
        validCryptoConfig = TRUE;
1691
59
      }
1692
1693
61
      break;
1694
1695
22
    case ENCRYPTION_LEVEL_FIPS:
1696
22
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1697
19
      {
1698
19
        validCryptoConfig = TRUE;
1699
19
      }
1700
1701
22
      break;
1702
1703
89
    case ENCRYPTION_LEVEL_LOW:
1704
246
    case ENCRYPTION_LEVEL_HIGH:
1705
299
    case ENCRYPTION_LEVEL_CLIENT_COMPATIBLE:
1706
299
      if (settings->EncryptionMethods == ENCRYPTION_METHOD_40BIT ||
1707
233
          settings->EncryptionMethods == ENCRYPTION_METHOD_56BIT ||
1708
98
          settings->EncryptionMethods == ENCRYPTION_METHOD_128BIT ||
1709
28
          settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1710
295
      {
1711
295
        validCryptoConfig = TRUE;
1712
295
      }
1713
1714
299
      break;
1715
1716
10
    default:
1717
10
      WLog_Print(mcs->log, WLOG_ERROR, "Received unknown encryption level 0x%08" PRIX32 "",
1718
392
                 settings->EncryptionLevel);
1719
392
  }
1720
1721
392
  if (!validCryptoConfig)
1722
19
  {
1723
19
    WLog_Print(mcs->log, WLOG_ERROR,
1724
19
               "Received invalid cryptographic configuration (level=0x%08" PRIX32
1725
19
               " method=0x%08" PRIX32 ")",
1726
19
               settings->EncryptionLevel, settings->EncryptionMethods);
1727
19
    return FALSE;
1728
19
  }
1729
1730
373
  if (settings->EncryptionLevel == ENCRYPTION_LEVEL_NONE)
1731
59
  {
1732
    /* serverRandomLen and serverCertLen must not be present */
1733
59
    settings->UseRdpSecurityLayer = FALSE;
1734
59
    return TRUE;
1735
59
  }
1736
1737
314
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
1738
2
    return FALSE;
1739
1740
312
  Stream_Read_UINT32(s, settings->ServerRandomLength);      /* serverRandomLen */
1741
312
  Stream_Read_UINT32(s, settings->ServerCertificateLength); /* serverCertLen */
1742
1743
312
  if ((settings->ServerRandomLength == 0) || (settings->ServerCertificateLength == 0))
1744
6
  {
1745
6
    WLog_Print(mcs->log, WLOG_ERROR,
1746
6
               "Invalid ServerRandom (length=%" PRIu32 ") or ServerCertificate (length=%" PRIu32
1747
6
               ")",
1748
6
               settings->ServerRandomLength, settings->ServerCertificateLength);
1749
6
    return FALSE;
1750
6
  }
1751
1752
306
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, settings->ServerRandomLength))
1753
98
    return FALSE;
1754
1755
  /* serverRandom */
1756
208
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, nullptr,
1757
208
                                        settings->ServerRandomLength))
1758
0
    goto fail;
1759
1760
208
  Stream_Read(s, settings->ServerRandom, settings->ServerRandomLength);
1761
1762
208
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, settings->ServerCertificateLength))
1763
15
    goto fail;
1764
1765
  /* serverCertificate */
1766
193
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, nullptr,
1767
193
                                        settings->ServerCertificateLength))
1768
0
    goto fail;
1769
1770
193
  Stream_Read(s, settings->ServerCertificate, settings->ServerCertificateLength);
1771
1772
193
  {
1773
193
    const BYTE* data = settings->ServerCertificate;
1774
193
    const uint32_t length = settings->ServerCertificateLength;
1775
1776
193
    if (!freerdp_certificate_read_server_cert(settings->RdpServerCertificate, data, length))
1777
174
      goto fail;
1778
193
  }
1779
19
  return TRUE;
1780
189
fail:
1781
189
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, nullptr, 0))
1782
0
    WLog_Print(
1783
189
        mcs->log, WLOG_ERROR,
1784
189
        "freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, nullptr, 0) failed");
1785
189
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, nullptr, 0))
1786
0
    WLog_Print(mcs->log, WLOG_ERROR,
1787
189
               "freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, nullptr, "
1788
189
               "0) failed");
1789
189
  return FALSE;
1790
193
}
1791
1792
static BOOL gcc_update_server_random(rdpSettings* settings)
1793
0
{
1794
0
  const size_t length = 32;
1795
0
  WINPR_ASSERT(settings);
1796
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, nullptr, length))
1797
0
    return FALSE;
1798
0
  BYTE* data = freerdp_settings_get_pointer_writable(settings, FreeRDP_ServerRandom);
1799
0
  if (!data)
1800
0
    return FALSE;
1801
0
  return winpr_RAND(data, length) >= 0;
1802
0
}
1803
1804
/* TODO: This function does manipulate data in rdpMcs
1805
 * TODO: Split this out of this function
1806
 */
1807
BOOL gcc_write_server_security_data(wStream* s, rdpMcs* mcs)
1808
0
{
1809
0
  if (!gcc_update_server_random(mcs_get_settings(mcs)))
1810
0
    return FALSE;
1811
1812
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
1813
1814
0
  WINPR_ASSERT(s);
1815
0
  WINPR_ASSERT(settings);
1816
1817
0
  const size_t posHeader = Stream_GetPosition(s);
1818
0
  if (!gcc_write_user_data_header(s, SC_SECURITY, 12))
1819
0
    return FALSE;
1820
1821
0
  Stream_Write_UINT32(s, settings->EncryptionMethods); /* encryptionMethod */
1822
0
  Stream_Write_UINT32(s, settings->EncryptionLevel);   /* encryptionLevel */
1823
1824
0
  if (settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1825
0
    return TRUE;
1826
1827
0
  if (!Stream_EnsureRemainingCapacity(s, sizeof(UINT32) + settings->ServerRandomLength))
1828
0
    return FALSE;
1829
0
  Stream_Write_UINT32(s, settings->ServerRandomLength); /* serverRandomLen */
1830
0
  const size_t posCertLen = Stream_GetPosition(s);
1831
0
  Stream_Seek_UINT32(s); /* serverCertLen */
1832
0
  Stream_Write(s, settings->ServerRandom, settings->ServerRandomLength);
1833
1834
0
  const SSIZE_T len = freerdp_certificate_write_server_cert(
1835
0
      settings->RdpServerCertificate, CERT_TEMPORARILY_ISSUED | CERT_CHAIN_VERSION_1, s);
1836
0
  if (len < 0)
1837
0
    return FALSE;
1838
0
  const size_t end = Stream_GetPosition(s);
1839
1840
0
  WINPR_ASSERT(end >= posHeader);
1841
0
  const size_t diff = end - posHeader;
1842
0
  WINPR_ASSERT(diff <= UINT16_MAX);
1843
0
  if (!Stream_SetPosition(s, posHeader))
1844
0
    return FALSE;
1845
0
  if (!gcc_write_user_data_header(s, SC_SECURITY, (UINT16)diff))
1846
0
    return FALSE;
1847
0
  if (!Stream_SetPosition(s, posCertLen))
1848
0
    return FALSE;
1849
0
  WINPR_ASSERT(len <= UINT32_MAX);
1850
0
  Stream_Write_UINT32(s, (UINT32)len);
1851
0
  return Stream_SetPosition(s, end);
1852
0
}
1853
1854
/**
1855
 * Read a client network data block (TS_UD_CS_NET).
1856
 * msdn{cc240512}
1857
 *
1858
 * @param s stream
1859
 * @param mcs The MCS instance
1860
 *
1861
 * @return \b TRUE for success, \b FALSE otherwise
1862
 */
1863
1864
BOOL gcc_read_client_network_data(wStream* s, rdpMcs* mcs)
1865
19
{
1866
19
  WINPR_ASSERT(s);
1867
19
  WINPR_ASSERT(mcs);
1868
1869
19
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1870
2
    return FALSE;
1871
1872
17
  Stream_Read_UINT32(s, mcs->channelCount); /* channelCount */
1873
1874
17
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, mcs->channelCount, 12ull))
1875
2
    return FALSE;
1876
1877
15
  if (mcs->channelCount > CHANNEL_MAX_COUNT)
1878
0
  {
1879
0
    WLog_Print(mcs->log, WLOG_ERROR, "rdpMcs::channelCount %" PRIu32 " > maximum %d",
1880
0
               mcs->channelCount, CHANNEL_MAX_COUNT);
1881
0
    return FALSE;
1882
0
  }
1883
1884
  /* channelDefArray */
1885
78
  for (UINT32 i = 0; i < mcs->channelCount; i++)
1886
73
  {
1887
    /**
1888
     * CHANNEL_DEF
1889
     * - name: an 8-byte array containing a null-terminated collection
1890
     *   of seven ANSI characters that uniquely identify the channel.
1891
     * - options: a 32-bit, unsigned integer. Channel option flags
1892
     */
1893
73
    rdpMcsChannel* channel = &mcs->channels[i];
1894
73
    Stream_Read(s, channel->Name, CHANNEL_NAME_LEN + 1); /* name (8 bytes) */
1895
1896
73
    if (!memchr(channel->Name, 0, CHANNEL_NAME_LEN + 1))
1897
10
    {
1898
10
      WLog_Print(
1899
10
          mcs->log, WLOG_ERROR,
1900
10
          "protocol violation: received a static channel name with missing null-termination");
1901
10
      return FALSE;
1902
10
    }
1903
1904
63
    Stream_Read_UINT32(s, channel->options); /* options (4 bytes) */
1905
63
    channel->ChannelId = mcs->baseChannelId++;
1906
63
  }
1907
1908
5
  return TRUE;
1909
15
}
1910
1911
/**
1912
 * Write a client network data block (TS_UD_CS_NET).
1913
 * msdn{cc240512}
1914
 * @param s stream
1915
 * @param mcs The MCS to use
1916
 *
1917
 * @return \b TRUE for success, \b FALSE otherwise
1918
 */
1919
1920
BOOL gcc_write_client_network_data(wStream* s, const rdpMcs* mcs)
1921
0
{
1922
0
  WINPR_ASSERT(s);
1923
0
  WINPR_ASSERT(mcs);
1924
0
  if (mcs->channelCount > 0)
1925
0
  {
1926
0
    const size_t length = mcs->channelCount * 12 + 8;
1927
0
    WINPR_ASSERT(length <= UINT16_MAX);
1928
0
    if (!gcc_write_user_data_header(s, CS_NET, (UINT16)length))
1929
0
      return FALSE;
1930
0
    Stream_Write_UINT32(s, mcs->channelCount); /* channelCount */
1931
1932
    /* channelDefArray */
1933
0
    for (UINT32 i = 0; i < mcs->channelCount; i++)
1934
0
    {
1935
      /* CHANNEL_DEF */
1936
0
      rdpMcsChannel* channel = &mcs->channels[i];
1937
0
      Stream_Write(s, channel->Name, CHANNEL_NAME_LEN + 1); /* name (8 bytes) */
1938
0
      Stream_Write_UINT32(s, channel->options);             /* options (4 bytes) */
1939
0
    }
1940
0
  }
1941
0
  return TRUE;
1942
0
}
1943
1944
BOOL gcc_read_server_network_data(wStream* s, rdpMcs* mcs)
1945
2.80k
{
1946
2.80k
  UINT16 channelId = 0;
1947
2.80k
  UINT32 parsedChannelCount = 0;
1948
2.80k
  WINPR_ASSERT(s);
1949
2.80k
  WINPR_ASSERT(mcs);
1950
2.80k
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
1951
3
    return FALSE;
1952
1953
2.80k
  mcs->IOChannelId = Stream_Get_UINT16(s);            /* MCSChannelId */
1954
2.80k
  const uint16_t channelCount = Stream_Get_UINT16(s); /* channelCount */
1955
2.80k
  parsedChannelCount = channelCount;
1956
1957
2.80k
  if (channelCount != mcs->channelCount)
1958
1.70k
  {
1959
1.70k
    WLog_Print(mcs->log, WLOG_ERROR, "requested %" PRIu32 " channels, got %" PRIu16 " instead",
1960
1.70k
               mcs->channelCount, channelCount);
1961
1962
    /* we ensure that the response is not bigger than the request */
1963
1964
1.70k
    mcs->channelCount = channelCount;
1965
1.70k
  }
1966
1967
2.80k
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, channelCount, 2ull))
1968
28
    return FALSE;
1969
1970
2.77k
  if (mcs->channelMaxCount < parsedChannelCount)
1971
4
  {
1972
4
    WLog_Print(mcs->log, WLOG_ERROR,
1973
4
               "requested %" PRIu32 " channels > channelMaxCount %" PRIu16, mcs->channelCount,
1974
4
               mcs->channelMaxCount);
1975
4
    return FALSE;
1976
4
  }
1977
1978
7.08k
  for (UINT32 i = 0; i < parsedChannelCount; i++)
1979
4.31k
  {
1980
4.31k
    rdpMcsChannel* channel = &mcs->channels[i];
1981
4.31k
    Stream_Read_UINT16(s, channelId); /* channelId */
1982
4.31k
    channel->ChannelId = channelId;
1983
4.31k
  }
1984
1985
2.77k
  if (channelCount % 2 == 1)
1986
1.56k
    return Stream_SafeSeek(s, 2); /* padding */
1987
1988
1.20k
  return TRUE;
1989
2.77k
}
1990
1991
BOOL gcc_write_server_network_data(wStream* s, const rdpMcs* mcs)
1992
0
{
1993
0
  WINPR_ASSERT(s);
1994
0
  WINPR_ASSERT(mcs);
1995
0
  const size_t payloadLen =
1996
0
      8ull + mcs->channelCount * 2ull + (mcs->channelCount % 2 == 1 ? 2ull : 0ull);
1997
1998
0
  WINPR_ASSERT(payloadLen <= UINT16_MAX);
1999
0
  if (!gcc_write_user_data_header(s, SC_NET, (UINT16)payloadLen))
2000
0
    return FALSE;
2001
2002
0
  Stream_Write_UINT16(s, MCS_GLOBAL_CHANNEL_ID); /* MCSChannelId */
2003
0
  Stream_Write_UINT16(s,
2004
0
                      WINPR_ASSERTING_INT_CAST(uint16_t, mcs->channelCount)); /* channelCount */
2005
2006
0
  for (UINT32 i = 0; i < mcs->channelCount; i++)
2007
0
  {
2008
0
    const rdpMcsChannel* channel = &mcs->channels[i];
2009
0
    Stream_Write_UINT16(s, channel->ChannelId);
2010
0
  }
2011
2012
0
  if (mcs->channelCount % 2 == 1)
2013
0
    Stream_Write_UINT16(s, 0);
2014
2015
0
  return TRUE;
2016
0
}
2017
2018
/**
2019
 * Read a client cluster data block (TS_UD_CS_CLUSTER).
2020
 * msdn{cc240514}
2021
 * @param s stream
2022
 * @param mcs The MCS instance
2023
 *
2024
 * @return \b TRUE for success, \b FALSE otherwise
2025
 */
2026
2027
BOOL gcc_read_client_cluster_data(wStream* s, rdpMcs* mcs)
2028
88
{
2029
88
  char buffer[128] = WINPR_C_ARRAY_INIT;
2030
88
  UINT32 redirectedSessionId = 0;
2031
88
  rdpSettings* settings = mcs_get_settings(mcs);
2032
2033
88
  WINPR_ASSERT(s);
2034
88
  WINPR_ASSERT(settings);
2035
2036
88
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
2037
2
    return FALSE;
2038
2039
86
  Stream_Read_UINT32(s, settings->ClusterInfoFlags); /* flags */
2040
86
  Stream_Read_UINT32(s, redirectedSessionId);        /* redirectedSessionId */
2041
2042
86
  WLog_Print(mcs->log, WLOG_TRACE, "read ClusterInfoFlags=%s, RedirectedSessionId=0x%08" PRIx32,
2043
86
             rdp_cluster_info_flags_to_string(settings->ClusterInfoFlags, buffer, sizeof(buffer)),
2044
86
             redirectedSessionId);
2045
86
  if (settings->ClusterInfoFlags & REDIRECTED_SESSIONID_FIELD_VALID)
2046
43
    settings->RedirectedSessionId = redirectedSessionId;
2047
2048
86
  settings->ConsoleSession = (settings->ClusterInfoFlags & REDIRECTED_SESSIONID_FIELD_VALID) != 0;
2049
86
  settings->RedirectSmartCards = (settings->ClusterInfoFlags & REDIRECTED_SMARTCARD) != 0;
2050
2051
86
  if (Stream_GetRemainingLength(s) > 0)
2052
81
  {
2053
    /* The old Microsoft Mac RDP client can send a pad here */
2054
81
    Stream_Seek(s, Stream_GetRemainingLength(s));
2055
81
  }
2056
2057
86
  return TRUE;
2058
88
}
2059
2060
/**
2061
 * Write a client cluster data block (TS_UD_CS_CLUSTER).
2062
 * msdn{cc240514}
2063
 * @param s stream
2064
 * @param mcs The MCS instance
2065
 *
2066
 * @return \b TRUE for success, \b FALSE otherwise
2067
 */
2068
2069
BOOL gcc_write_client_cluster_data(wStream* s, const rdpMcs* mcs)
2070
0
{
2071
0
  char buffer[128] = WINPR_C_ARRAY_INIT;
2072
0
  UINT32 flags = 0;
2073
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2074
2075
0
  WINPR_ASSERT(s);
2076
0
  WINPR_ASSERT(settings);
2077
2078
0
  if (!gcc_write_user_data_header(s, CS_CLUSTER, 12))
2079
0
    return FALSE;
2080
0
  flags = settings->ClusterInfoFlags;
2081
2082
0
  if (settings->ConsoleSession || settings->RedirectedSessionId)
2083
0
    flags |= REDIRECTED_SESSIONID_FIELD_VALID;
2084
2085
0
  if (settings->RedirectSmartCards && settings->SmartcardLogon)
2086
0
    flags |= REDIRECTED_SMARTCARD;
2087
2088
0
  if (flags & REDIRECTION_SUPPORTED)
2089
0
  {
2090
    /* REDIRECTION_VERSION6 requires multitransport enabled.
2091
     * if we run without that use REDIRECTION_VERSION5 */
2092
0
    if (freerdp_settings_get_bool(settings, FreeRDP_SupportMultitransport))
2093
0
      flags |= (REDIRECTION_VERSION6 << 2);
2094
0
    else
2095
0
      flags |= (REDIRECTION_VERSION5 << 2);
2096
0
  }
2097
2098
0
  WLog_Print(mcs->log, WLOG_TRACE, "write ClusterInfoFlags=%s, RedirectedSessionId=0x%08" PRIx32,
2099
0
             rdp_cluster_info_flags_to_string(flags, buffer, sizeof(buffer)),
2100
0
             settings->RedirectedSessionId);
2101
0
  Stream_Write_UINT32(s, flags);                         /* flags */
2102
0
  Stream_Write_UINT32(s, settings->RedirectedSessionId); /* redirectedSessionID */
2103
0
  return TRUE;
2104
0
}
2105
2106
/**
2107
 * Read a client monitor data block (TS_UD_CS_MONITOR).
2108
 * msdn{dd305336}
2109
 * @param s stream
2110
 * @param mcs The MCS instance
2111
 *
2112
 * @return \b TRUE for success, \b FALSE otherwise
2113
 */
2114
2115
BOOL gcc_read_client_monitor_data(wStream* s, rdpMcs* mcs)
2116
364
{
2117
364
  UINT32 monitorCount = 0;
2118
364
  rdpSettings* settings = mcs_get_settings(mcs);
2119
2120
364
  WINPR_ASSERT(s);
2121
364
  WINPR_ASSERT(settings);
2122
2123
364
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 8))
2124
2
    return FALSE;
2125
2126
362
  Stream_Read_UINT32(s, settings->MonitorFlags); /* flags */
2127
362
  Stream_Read_UINT32(s, monitorCount);           /* monitorCount */
2128
2129
  /* 2.2.1.3.6 Client Monitor Data -
2130
   * monitorCount (4 bytes): A 32-bit, unsigned integer. The number of display
2131
   * monitor definitions in the monitorDefArray field (the maximum allowed is 16).
2132
   */
2133
362
  if (monitorCount > 16)
2134
69
  {
2135
69
    WLog_Print(mcs->log, WLOG_ERROR, "announced monitors(%" PRIu32 ") exceed the 16 limit",
2136
69
               monitorCount);
2137
69
    return FALSE;
2138
69
  }
2139
2140
293
  if (monitorCount > settings->MonitorDefArraySize)
2141
0
  {
2142
0
    WLog_Print(mcs->log, WLOG_ERROR,
2143
0
               "too many announced monitors(%" PRIu32 "), clamping to %" PRIu32 "",
2144
0
               monitorCount, settings->MonitorDefArraySize);
2145
0
    monitorCount = settings->MonitorDefArraySize;
2146
0
  }
2147
2148
293
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(mcs->log, s, monitorCount, 20))
2149
4
    return FALSE;
2150
2151
289
  settings->MonitorCount = monitorCount;
2152
2153
669
  for (UINT32 index = 0; index < monitorCount; index++)
2154
570
  {
2155
570
    rdpMonitor* current = &settings->MonitorDefArray[index];
2156
2157
570
    const INT32 left = Stream_Get_INT32(s);    /* left */
2158
570
    const INT32 top = Stream_Get_INT32(s);     /* top */
2159
570
    const INT32 right = Stream_Get_INT32(s);   /* right */
2160
570
    const INT32 bottom = Stream_Get_INT32(s);  /* bottom */
2161
570
    const UINT32 flags = Stream_Get_UINT32(s); /* flags */
2162
2163
570
    if ((1ll * left > right) || (1ll * top > bottom))
2164
179
    {
2165
179
      WLog_Print(mcs->log, WLOG_ERROR, "rdpMonitor::rect %dx%d-%dx%d invalid", left, top,
2166
179
                 right, bottom);
2167
179
      return FALSE;
2168
179
    }
2169
2170
391
    const INT64 w = 1ll * right - left;
2171
391
    const INT64 h = 1ll * bottom - top;
2172
391
    if ((w >= INT32_MAX) || (h >= INT32_MAX) || (w < 0) || (h < 0))
2173
11
    {
2174
11
      WLog_Print(mcs->log, WLOG_ERROR,
2175
11
                 "rdpMonitor::width/height %" PRId64 "/%" PRId64 " invalid", w, h);
2176
11
      return FALSE;
2177
11
    }
2178
2179
380
    current->x = left;
2180
380
    current->y = top;
2181
380
    current->width = WINPR_ASSERTING_INT_CAST(int32_t, w + 1);
2182
380
    current->height = WINPR_ASSERTING_INT_CAST(int32_t, h + 1);
2183
380
    current->is_primary = (flags & MONITOR_PRIMARY) != 0;
2184
380
  }
2185
2186
99
  return TRUE;
2187
289
}
2188
2189
/**
2190
 * Write a client monitor data block (TS_UD_CS_MONITOR).
2191
 * msdn{dd305336}
2192
 * @param s stream
2193
 * @param mcs The MCS to use
2194
 *
2195
 * @return \b TRUE for success, \b FALSE otherwise
2196
 */
2197
2198
BOOL gcc_write_client_monitor_data(wStream* s, const rdpMcs* mcs)
2199
0
{
2200
0
  INT32 baseX = 0;
2201
0
  INT32 baseY = 0;
2202
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2203
2204
0
  WINPR_ASSERT(s);
2205
0
  WINPR_ASSERT(settings);
2206
2207
0
  WLog_Print(mcs->log, WLOG_DEBUG, "MonitorCount=%" PRIu32, settings->MonitorCount);
2208
0
  if (settings->MonitorCount > 1)
2209
0
  {
2210
0
    const size_t len = (20 * settings->MonitorCount) + 12;
2211
0
    WINPR_ASSERT(len <= UINT16_MAX);
2212
0
    const UINT16 length = (UINT16)len;
2213
0
    if (!gcc_write_user_data_header(s, CS_MONITOR, length))
2214
0
      return FALSE;
2215
0
    Stream_Write_UINT32(s, settings->MonitorFlags); /* flags */
2216
0
    Stream_Write_UINT32(s, settings->MonitorCount); /* monitorCount */
2217
2218
    /* first pass to get the primary monitor coordinates (it is supposed to be
2219
     * in (0,0) */
2220
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2221
0
    {
2222
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2223
0
      if (current->is_primary)
2224
0
      {
2225
0
        baseX = current->x;
2226
0
        baseY = current->y;
2227
0
        break;
2228
0
      }
2229
0
    }
2230
2231
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2232
0
    {
2233
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2234
0
      const INT32 left = current->x - baseX;
2235
0
      const INT32 top = current->y - baseY;
2236
0
      const INT32 right = left + current->width - 1;
2237
0
      const INT32 bottom = top + current->height - 1;
2238
0
      const UINT32 flags = current->is_primary ? MONITOR_PRIMARY : 0;
2239
0
      WLog_Print(mcs->log, WLOG_DEBUG,
2240
0
                 "Monitor[%" PRIu32 "]: top=%" PRId32 ", left=%" PRId32 ", bottom=%" PRId32
2241
0
                 ", right=%" PRId32 ", flags=%" PRIu32,
2242
0
                 i, top, left, bottom, right, flags);
2243
0
      Stream_Write_INT32(s, left);   /* left */
2244
0
      Stream_Write_INT32(s, top);    /* top */
2245
0
      Stream_Write_INT32(s, right);  /* right */
2246
0
      Stream_Write_INT32(s, bottom); /* bottom */
2247
0
      Stream_Write_UINT32(s, flags); /* flags */
2248
0
    }
2249
0
  }
2250
0
  WLog_Print(mcs->log, WLOG_DEBUG, "FINISHED");
2251
0
  return TRUE;
2252
0
}
2253
2254
BOOL gcc_read_client_monitor_extended_data(wStream* s, rdpMcs* mcs)
2255
132
{
2256
132
  UINT32 monitorCount = 0;
2257
132
  UINT32 monitorAttributeSize = 0;
2258
132
  rdpSettings* settings = mcs_get_settings(mcs);
2259
2260
132
  WINPR_ASSERT(s);
2261
132
  WINPR_ASSERT(settings);
2262
2263
132
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 12))
2264
2
    return FALSE;
2265
2266
130
  Stream_Read_UINT32(s, settings->MonitorAttributeFlags); /* flags */
2267
130
  Stream_Read_UINT32(s, monitorAttributeSize);            /* monitorAttributeSize */
2268
130
  Stream_Read_UINT32(s, monitorCount);                    /* monitorCount */
2269
2270
130
  if (monitorAttributeSize != 20)
2271
93
  {
2272
93
    WLog_Print(mcs->log, WLOG_ERROR,
2273
93
               "TS_UD_CS_MONITOR_EX::monitorAttributeSize %" PRIu32 " != 20",
2274
93
               monitorAttributeSize);
2275
93
    return FALSE;
2276
93
  }
2277
2278
37
  if (!Stream_CheckAndLogRequiredCapacityOfSizeWLog(mcs->log, s, monitorCount,
2279
37
                                                    monitorAttributeSize))
2280
34
    return FALSE;
2281
2282
3
  if (settings->MonitorCount != monitorCount)
2283
1
  {
2284
1
    WLog_Print(mcs->log, WLOG_ERROR,
2285
1
               "(TS_UD_CS_MONITOR_EX)::monitorCount %" PRIu32 " != expected %" PRIu32,
2286
1
               monitorCount, settings->MonitorCount);
2287
1
    return FALSE;
2288
1
  }
2289
2290
2
  settings->HasMonitorAttributes = TRUE;
2291
2292
2
  for (UINT32 index = 0; index < monitorCount; index++)
2293
0
  {
2294
0
    rdpMonitor* current = &settings->MonitorDefArray[index];
2295
0
    Stream_Read_UINT32(s, current->attributes.physicalWidth);      /* physicalWidth */
2296
0
    Stream_Read_UINT32(s, current->attributes.physicalHeight);     /* physicalHeight */
2297
0
    Stream_Read_UINT32(s, current->attributes.orientation);        /* orientation */
2298
0
    Stream_Read_UINT32(s, current->attributes.desktopScaleFactor); /* desktopScaleFactor */
2299
0
    Stream_Read_UINT32(s, current->attributes.deviceScaleFactor);  /* deviceScaleFactor */
2300
0
  }
2301
2302
2
  return TRUE;
2303
3
}
2304
2305
BOOL gcc_write_client_monitor_extended_data(wStream* s, const rdpMcs* mcs)
2306
0
{
2307
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2308
2309
0
  WINPR_ASSERT(s);
2310
0
  WINPR_ASSERT(settings);
2311
2312
0
  if (settings->HasMonitorAttributes)
2313
0
  {
2314
0
    const size_t length = (20 * settings->MonitorCount) + 16;
2315
0
    WINPR_ASSERT(length <= UINT16_MAX);
2316
0
    if (!gcc_write_user_data_header(s, CS_MONITOR_EX, (UINT16)length))
2317
0
      return FALSE;
2318
0
    Stream_Write_UINT32(s, settings->MonitorAttributeFlags); /* flags */
2319
0
    Stream_Write_UINT32(s, 20);                              /* monitorAttributeSize */
2320
0
    Stream_Write_UINT32(s, settings->MonitorCount);          /* monitorCount */
2321
2322
0
    for (UINT32 i = 0; i < settings->MonitorCount; i++)
2323
0
    {
2324
0
      const rdpMonitor* current = &settings->MonitorDefArray[i];
2325
0
      Stream_Write_UINT32(s, current->attributes.physicalWidth);      /* physicalWidth */
2326
0
      Stream_Write_UINT32(s, current->attributes.physicalHeight);     /* physicalHeight */
2327
0
      Stream_Write_UINT32(s, current->attributes.orientation);        /* orientation */
2328
0
      Stream_Write_UINT32(s, current->attributes.desktopScaleFactor); /* desktopScaleFactor */
2329
0
      Stream_Write_UINT32(s, current->attributes.deviceScaleFactor);  /* deviceScaleFactor */
2330
0
    }
2331
0
  }
2332
0
  return TRUE;
2333
0
}
2334
2335
/**
2336
 * Read a client message channel data block (TS_UD_CS_MCS_MSGCHANNEL).
2337
 * msdn{jj217627}
2338
 * @param s stream
2339
 * @param mcs The MCS instance
2340
 *
2341
 * @return \b TRUE for success, \b FALSE otherwise
2342
 */
2343
2344
BOOL gcc_read_client_message_channel_data(wStream* s, rdpMcs* mcs)
2345
731
{
2346
731
  WINPR_ASSERT(s);
2347
731
  WINPR_ASSERT(mcs);
2348
2349
731
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2350
2
    return FALSE;
2351
2352
729
  Stream_Read_UINT32(s, mcs->flags);
2353
729
  mcs->messageChannelId = mcs->baseChannelId++;
2354
729
  return TRUE;
2355
731
}
2356
2357
/**
2358
 * Write a client message channel data block (TS_UD_CS_MCS_MSGCHANNEL).
2359
 * msdn{jj217627}
2360
 * @param s stream
2361
 * @param mcs The MCS instance
2362
 *
2363
 * @return \b TRUE for success, \b FALSE otherwise
2364
 */
2365
2366
BOOL gcc_write_client_message_channel_data(wStream* s, const rdpMcs* mcs)
2367
0
{
2368
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2369
2370
0
  WINPR_ASSERT(s);
2371
0
  WINPR_ASSERT(mcs);
2372
0
  WINPR_ASSERT(settings);
2373
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect) ||
2374
0
      settings->SupportHeartbeatPdu || settings->SupportMultitransport)
2375
0
  {
2376
0
    if (!gcc_write_user_data_header(s, CS_MCS_MSGCHANNEL, 8))
2377
0
      return FALSE;
2378
0
    Stream_Write_UINT32(s, mcs->flags); /* flags */
2379
0
  }
2380
0
  return TRUE;
2381
0
}
2382
2383
BOOL gcc_read_server_message_channel_data(wStream* s, rdpMcs* mcs)
2384
388
{
2385
388
  UINT16 MCSChannelId = 0;
2386
388
  WINPR_ASSERT(s);
2387
388
  WINPR_ASSERT(mcs);
2388
388
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 2))
2389
2
    return FALSE;
2390
2391
386
  Stream_Read_UINT16(s, MCSChannelId); /* MCSChannelId */
2392
  /* Save the MCS message channel id */
2393
386
  mcs->messageChannelId = MCSChannelId;
2394
386
  return TRUE;
2395
388
}
2396
2397
BOOL gcc_write_server_message_channel_data(wStream* s, const rdpMcs* mcs)
2398
0
{
2399
0
  WINPR_ASSERT(s);
2400
0
  WINPR_ASSERT(mcs);
2401
0
  if (mcs->messageChannelId == 0)
2402
0
    return TRUE;
2403
2404
0
  if (!gcc_write_user_data_header(s, SC_MCS_MSGCHANNEL, 6))
2405
0
    return FALSE;
2406
2407
0
  Stream_Write_UINT16(s, mcs->messageChannelId); /* mcsChannelId (2 bytes) */
2408
0
  return TRUE;
2409
0
}
2410
2411
/**
2412
 * Read a client multitransport channel data block (TS_UD_CS_MULTITRANSPORT).
2413
 * msdn{jj217498}
2414
 * @param s stream
2415
 * @param mcs The MCS instance
2416
 *
2417
 * @return \b TRUE for success, \b FALSE otherwise
2418
 */
2419
2420
BOOL gcc_read_client_multitransport_channel_data(wStream* s, rdpMcs* mcs)
2421
325
{
2422
325
  rdpSettings* settings = mcs_get_settings(mcs);
2423
2424
325
  WINPR_ASSERT(s);
2425
325
  WINPR_ASSERT(settings);
2426
2427
325
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2428
3
    return FALSE;
2429
2430
322
  UINT32 remoteFlags = 0;
2431
322
  Stream_Read_UINT32(s, remoteFlags);
2432
322
  settings->MultitransportFlags &= remoteFlags; /* merge local and remote flags */
2433
322
  return TRUE;
2434
325
}
2435
2436
/**
2437
 * Write a client multitransport channel data block (TS_UD_CS_MULTITRANSPORT).
2438
 * msdn{jj217498}
2439
 *
2440
 * @param s stream
2441
 * @param mcs The MCS instance
2442
 *
2443
 * @return \b TRUE for success, \b FALSE otherwise
2444
 */
2445
2446
BOOL gcc_write_client_multitransport_channel_data(wStream* s, const rdpMcs* mcs)
2447
0
{
2448
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2449
2450
0
  WINPR_ASSERT(s);
2451
0
  WINPR_ASSERT(settings);
2452
0
  if (!gcc_write_user_data_header(s, CS_MULTITRANSPORT, 8))
2453
0
    return FALSE;
2454
0
  Stream_Write_UINT32(s, settings->MultitransportFlags); /* flags */
2455
0
  return TRUE;
2456
0
}
2457
2458
BOOL gcc_read_server_multitransport_channel_data(wStream* s, rdpMcs* mcs)
2459
1.08k
{
2460
1.08k
  rdpSettings* settings = mcs_get_settings(mcs);
2461
1.08k
  UINT32 remoteFlags = 0;
2462
2463
1.08k
  WINPR_ASSERT(s);
2464
1.08k
  WINPR_ASSERT(settings);
2465
1.08k
  if (!Stream_CheckAndLogRequiredLengthWLog(mcs->log, s, 4))
2466
2
    return FALSE;
2467
2468
1.08k
  Stream_Read_UINT32(s, remoteFlags);
2469
1.08k
  settings->MultitransportFlags &= remoteFlags; /* merge with client setting */
2470
1.08k
  return TRUE;
2471
1.08k
}
2472
2473
BOOL gcc_write_server_multitransport_channel_data(wStream* s, const rdpMcs* mcs)
2474
0
{
2475
0
  const rdpSettings* settings = mcs_get_const_settings(mcs);
2476
2477
0
  WINPR_ASSERT(s);
2478
0
  WINPR_ASSERT(settings);
2479
2480
0
  if (!gcc_write_user_data_header(s, SC_MULTITRANSPORT, 8))
2481
0
    return FALSE;
2482
2483
0
  Stream_Write_UINT32(s, settings->MultitransportFlags); /* flags (4 bytes) */
2484
0
  return TRUE;
2485
0
}