Coverage Report

Created: 2026-04-12 07:03

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/libfreerdp/core/rdp.c
Line
Count
Source
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Core
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 *
8
 * Licensed under the Apache License, Version 2.0 (the "License");
9
 * you may not use this file except in compliance with the License.
10
 * You may obtain a copy of the License at
11
 *
12
 *     http://www.apache.org/licenses/LICENSE-2.0
13
 *
14
 * Unless required by applicable law or agreed to in writing, software
15
 * distributed under the License is distributed on an "AS IS" BASIS,
16
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17
 * See the License for the specific language governing permissions and
18
 * limitations under the License.
19
 */
20
21
#include <freerdp/config.h>
22
23
#include "settings.h"
24
25
#include <winpr/crt.h>
26
#include <winpr/string.h>
27
#include <winpr/synch.h>
28
#include <winpr/assert.h>
29
#include <winpr/cast.h>
30
#include <winpr/json.h>
31
32
#include "rdp.h"
33
34
#include "state.h"
35
#include "info.h"
36
#include "utils.h"
37
#include "mcs.h"
38
#include "redirection.h"
39
40
#include <freerdp/codec/bulk.h>
41
#include <freerdp/crypto/per.h>
42
#include <freerdp/log.h>
43
#include <freerdp/buildflags.h>
44
45
17.7k
#define RDP_TAG FREERDP_TAG("core.rdp")
46
47
typedef struct
48
{
49
  const char* file;
50
  const char* fkt;
51
  size_t line;
52
  DWORD level;
53
} log_line_t;
54
55
static const char* DATA_PDU_TYPE_STRINGS[80] = {
56
  "?",
57
  "?",      /* 0x00 - 0x01 */
58
  "Update", /* 0x02 */
59
  "?",
60
  "?",
61
  "?",
62
  "?",
63
  "?",
64
  "?",
65
  "?",
66
  "?", /* 0x03 - 0x0A */
67
  "?",
68
  "?",
69
  "?",
70
  "?",
71
  "?",
72
  "?",
73
  "?",
74
  "?",
75
  "?",       /* 0x0B - 0x13 */
76
  "Control", /* 0x14 */
77
  "?",
78
  "?",
79
  "?",
80
  "?",
81
  "?",
82
  "?",       /* 0x15 - 0x1A */
83
  "Pointer", /* 0x1B */
84
  "Input",   /* 0x1C */
85
  "?",
86
  "?",                            /* 0x1D - 0x1E */
87
  "Synchronize",                  /* 0x1F */
88
  "?",                            /* 0x20 */
89
  "Refresh Rect",                 /* 0x21 */
90
  "Play Sound",                   /* 0x22 */
91
  "Suppress Output",              /* 0x23 */
92
  "Shutdown Request",             /* 0x24 */
93
  "Shutdown Denied",              /* 0x25 */
94
  "Save Session Info",            /* 0x26 */
95
  "Font List",                    /* 0x27 */
96
  "Font Map",                     /* 0x28 */
97
  "Set Keyboard Indicators",      /* 0x29 */
98
  "?",                            /* 0x2A */
99
  "Bitmap Cache Persistent List", /* 0x2B */
100
  "Bitmap Cache Error",           /* 0x2C */
101
  "Set Keyboard IME Status",      /* 0x2D */
102
  "Offscreen Cache Error",        /* 0x2E */
103
  "Set Error Info",               /* 0x2F */
104
  "Draw Nine Grid Error",         /* 0x30 */
105
  "Draw GDI+ Error",              /* 0x31 */
106
  "ARC Status",                   /* 0x32 */
107
  "?",
108
  "?",
109
  "?",              /* 0x33 - 0x35 */
110
  "Status Info",    /* 0x36 */
111
  "Monitor Layout", /* 0x37 */
112
  "FrameAcknowledge",
113
  "?",
114
  "?", /* 0x38 - 0x40 */
115
  "?",
116
  "?",
117
  "?",
118
  "?",
119
  "?",
120
  "?" /* 0x41 - 0x46 */
121
};
122
123
#define rdp_check_monitor_layout_pdu_state(rdp, expected) \
124
0
  rdp_check_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
125
126
static BOOL rdp_check_monitor_layout_pdu_state_(const rdpRdp* rdp, BOOL expected, const char* file,
127
                                                const char* fkt, size_t line)
128
0
{
129
0
  WINPR_ASSERT(rdp);
130
0
  if (expected != rdp->monitor_layout_pdu)
131
0
  {
132
0
    const DWORD log_level = WLOG_ERROR;
133
0
    if (WLog_IsLevelActive(rdp->log, log_level))
134
0
    {
135
0
      WLog_PrintTextMessage(rdp->log, log_level, line, file, fkt,
136
0
                            "Expected rdp->monitor_layout_pdu == %s",
137
0
                            expected ? "TRUE" : "FALSE");
138
0
    }
139
0
    return FALSE;
140
0
  }
141
0
  return TRUE;
142
0
}
143
144
#define rdp_set_monitor_layout_pdu_state(rdp, expected) \
145
66
  rdp_set_monitor_layout_pdu_state_(rdp, expected, __FILE__, __func__, __LINE__)
146
static BOOL rdp_set_monitor_layout_pdu_state_(rdpRdp* rdp, BOOL value, const char* file,
147
                                              const char* fkt, size_t line)
148
66
{
149
150
66
  WINPR_ASSERT(rdp);
151
66
  if (value && (value == rdp->monitor_layout_pdu))
152
1
  {
153
1
    const DWORD log_level = WLOG_WARN;
154
1
    if (WLog_IsLevelActive(rdp->log, log_level))
155
1
    {
156
1
      WLog_PrintTextMessage(rdp->log, log_level, line, file, fkt,
157
1
                            "rdp->monitor_layout_pdu == TRUE, expected FALSE");
158
1
    }
159
1
    return FALSE;
160
1
  }
161
65
  rdp->monitor_layout_pdu = value;
162
65
  return TRUE;
163
66
}
164
165
const char* data_pdu_type_to_string(UINT8 type)
166
443
{
167
443
  if (type >= ARRAYSIZE(DATA_PDU_TYPE_STRINGS))
168
94
    return "???";
169
349
  return DATA_PDU_TYPE_STRINGS[type];
170
443
}
171
172
static BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id);
173
static BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
174
                                           UINT16 channel_id);
175
static BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type,
176
                                        UINT32 share_id);
177
178
/**
179
 * @brief Read RDP Security Header.
180
 * msdn{cc240579}
181
 *
182
 * @param s stream
183
 * @param flags security flags
184
 *
185
 * @return \b TRUE for success, \b FALSE otherwise
186
 */
187
188
BOOL rdp_read_security_header(rdpRdp* rdp, wStream* s, UINT16* flags, UINT16* length)
189
18.7k
{
190
18.7k
  char buffer[256] = WINPR_C_ARRAY_INIT;
191
18.7k
  WINPR_ASSERT(s);
192
18.7k
  WINPR_ASSERT(flags);
193
18.7k
  WINPR_ASSERT(rdp);
194
195
  /* Basic Security Header */
196
18.7k
  if ((length && (*length < 4)))
197
17.7k
  {
198
17.7k
    WLog_Print(rdp->log, WLOG_WARN,
199
17.7k
               "invalid security header length, have %" PRIu16 ", must be >= 4", *length);
200
17.7k
    return FALSE;
201
17.7k
  }
202
985
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
203
2
    return FALSE;
204
205
983
  *flags = Stream_Get_UINT16(s);                 /* flags */
206
983
  const uint16_t flagsHi = Stream_Get_UINT16(s); /* flagsHi (unused) */
207
983
  if ((*flags & SEC_FLAGSHI_VALID) != 0)
208
520
  {
209
520
    WLog_Print(rdp->log, WLOG_WARN,
210
520
               "[MS-RDPBCGR] 2.2.8.1.1.2.1 Basic (TS_SECURITY_HEADER) SEC_FLAGSHI_VALID field "
211
520
               "set: flagsHi=0x%04" PRIx16,
212
520
               flagsHi);
213
520
  }
214
983
  WLog_Print(rdp->log, WLOG_TRACE, "%s",
215
983
             rdp_security_flag_string(*flags, buffer, sizeof(buffer)));
216
983
  if (length)
217
983
    *length -= 4;
218
219
983
  return TRUE;
220
985
}
221
222
/**
223
 * Write RDP Security Header.
224
 * msdn{cc240579}
225
 * @param s stream
226
 * @param flags security flags
227
 *
228
 * @return \b TRUE for success, \b FALSE otherwise
229
 */
230
231
BOOL rdp_write_security_header(rdpRdp* rdp, wStream* s, UINT16 flags)
232
0
{
233
0
  char buffer[256] = WINPR_C_ARRAY_INIT;
234
0
  WINPR_ASSERT(s);
235
0
  WINPR_ASSERT(rdp);
236
237
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 4))
238
0
    return FALSE;
239
240
0
  WLog_Print(rdp->log, WLOG_TRACE, "%s", rdp_security_flag_string(flags, buffer, sizeof(buffer)));
241
  /* Basic Security Header */
242
0
  WINPR_ASSERT((flags & SEC_FLAGSHI_VALID) == 0); /* SEC_FLAGSHI_VALID is unsupported */
243
0
  Stream_Write_UINT16(s, flags);                  /* flags */
244
0
  Stream_Write_UINT16(s, 0);                      /* flagsHi (unused) */
245
0
  return TRUE;
246
0
}
247
248
BOOL rdp_read_share_control_header(rdpRdp* rdp, wStream* s, UINT16* tpktLength,
249
                                   UINT16* remainingLength, UINT16* type, UINT16* channel_id)
250
17.7k
{
251
17.7k
  UINT16 len = 0;
252
17.7k
  UINT16 tmp = 0;
253
254
17.7k
  WINPR_ASSERT(rdp);
255
17.7k
  WINPR_ASSERT(s);
256
17.7k
  WINPR_ASSERT(type);
257
17.7k
  WINPR_ASSERT(channel_id);
258
259
17.7k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
260
6.38k
    return FALSE;
261
262
  /* Share Control Header */
263
11.3k
  Stream_Read_UINT16(s, len); /* totalLength */
264
265
  /* If length is 0x8000 then we actually got a flow control PDU that we should ignore
266
   http://msdn.microsoft.com/en-us/library/cc240576.aspx */
267
11.3k
  if (len == 0x8000)
268
89
  {
269
89
    if (!rdp_read_flow_control_pdu(rdp, s, type, channel_id))
270
9
      return FALSE;
271
80
    *channel_id = 0;
272
80
    if (tpktLength)
273
80
      *tpktLength = 8; /* Flow control PDU is 8 bytes */
274
80
    if (remainingLength)
275
80
      *remainingLength = 0;
276
277
80
    char buffer[128] = WINPR_C_ARRAY_INIT;
278
80
    WLog_Print(rdp->log, WLOG_DEBUG,
279
80
               "[Flow control PDU] type=%s, tpktLength=%" PRIu16 ", remainingLength=%" PRIu16,
280
80
               pdu_type_to_str(*type, buffer, sizeof(buffer)), tpktLength ? *tpktLength : 0u,
281
80
               remainingLength ? *remainingLength : 0u);
282
80
    return TRUE;
283
89
  }
284
285
11.2k
  if (len < 4U)
286
5.67k
  {
287
5.67k
    WLog_Print(rdp->log, WLOG_ERROR,
288
5.67k
               "Invalid share control header, length is %" PRIu16 ", must be >4", len);
289
5.67k
    return FALSE;
290
5.67k
  }
291
292
5.60k
  if (tpktLength)
293
5.60k
    *tpktLength = len;
294
295
5.60k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
296
160
    return FALSE;
297
298
5.44k
  Stream_Read_UINT16(s, tmp); /* pduType */
299
5.44k
  *type = tmp & 0x0F;         /* type is in the 4 least significant bits */
300
301
5.44k
  size_t remLen = len - 4;
302
5.44k
  if (len > 5)
303
5.26k
  {
304
5.26k
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 2))
305
63
      return FALSE;
306
307
5.19k
    Stream_Read_UINT16(s, *channel_id); /* pduSource */
308
5.19k
    remLen = len - 6;
309
5.19k
  }
310
184
  else
311
184
    *channel_id = 0; /* Windows XP can send such short DEACTIVATE_ALL PDUs. */
312
313
5.38k
  char buffer[128] = WINPR_C_ARRAY_INIT;
314
5.38k
  WLog_Print(rdp->log, WLOG_DEBUG, "type=%s, tpktLength=%" PRIu16 ", remainingLength=%" PRIuz,
315
5.38k
             pdu_type_to_str(*type, buffer, sizeof(buffer)), len, remLen);
316
5.38k
  if (remainingLength)
317
5.38k
  {
318
5.38k
    WINPR_ASSERT(remLen <= UINT16_MAX);
319
5.38k
    *remainingLength = (UINT16)remLen;
320
5.38k
  }
321
5.38k
  return Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, remLen);
322
5.44k
}
323
324
BOOL rdp_write_share_control_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 type,
325
                                    UINT16 channel_id)
326
0
{
327
0
  WINPR_ASSERT(s);
328
0
  WINPR_ASSERT(rdp);
329
0
  if (length > UINT16_MAX)
330
0
    return FALSE;
331
332
0
  if (length < RDP_PACKET_HEADER_MAX_LENGTH)
333
0
    return FALSE;
334
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 6))
335
0
    return FALSE;
336
0
  length -= RDP_PACKET_HEADER_MAX_LENGTH;
337
  /* Share Control Header */
338
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, length));      /* totalLength */
339
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, type | 0x10)); /* pduType */
340
0
  Stream_Write_UINT16(s, WINPR_ASSERTING_INT_CAST(uint16_t, channel_id));  /* pduSource */
341
0
  return TRUE;
342
0
}
343
344
BOOL rdp_read_share_data_header(rdpRdp* rdp, wStream* s, UINT16* length, BYTE* type,
345
                                UINT32* shareId, BYTE* compressedType, UINT16* compressedLength)
346
27.9k
{
347
27.9k
  WINPR_ASSERT(s);
348
27.9k
  WINPR_ASSERT(rdp);
349
350
27.9k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
351
15.3k
    return FALSE;
352
353
  /* Share Data Header */
354
12.6k
  Stream_Read_UINT32(s, *shareId);          /* shareId (4 bytes) */
355
12.6k
  Stream_Seek_UINT8(s);                     /* pad1 (1 byte) */
356
12.6k
  Stream_Seek_UINT8(s);                     /* streamId (1 byte) */
357
12.6k
  Stream_Read_UINT16(s, *length);           /* uncompressedLength (2 bytes) */
358
12.6k
  Stream_Read_UINT8(s, *type);              /* pduType2, Data PDU Type (1 byte) */
359
12.6k
  Stream_Read_UINT8(s, *compressedType);    /* compressedType (1 byte) */
360
12.6k
  Stream_Read_UINT16(s, *compressedLength); /* compressedLength (2 bytes) */
361
12.6k
  return TRUE;
362
27.9k
}
363
364
BOOL rdp_write_share_data_header(rdpRdp* rdp, wStream* s, size_t length, BYTE type, UINT32 share_id)
365
0
{
366
0
  const size_t headerLen = RDP_PACKET_HEADER_MAX_LENGTH + RDP_SHARE_CONTROL_HEADER_LENGTH +
367
0
                           RDP_SHARE_DATA_HEADER_LENGTH;
368
369
0
  WINPR_ASSERT(s);
370
0
  WINPR_ASSERT(rdp);
371
0
  if (length > UINT16_MAX)
372
0
    return FALSE;
373
374
0
  if (length < headerLen)
375
0
    return FALSE;
376
0
  length -= headerLen;
377
0
  if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, (s), 12))
378
0
    return FALSE;
379
380
  /* Share Data Header */
381
0
  Stream_Write_UINT32(s, share_id);  /* shareId (4 bytes) */
382
0
  Stream_Write_UINT8(s, 0);          /* pad1 (1 byte) */
383
0
  Stream_Write_UINT8(s, STREAM_LOW); /* streamId (1 byte) */
384
0
  Stream_Write_UINT16(
385
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, length)); /* uncompressedLength (2 bytes) */
386
0
  Stream_Write_UINT8(s, type);                        /* pduType2, Data PDU Type (1 byte) */
387
0
  Stream_Write_UINT8(s, 0);                           /* compressedType (1 byte) */
388
0
  Stream_Write_UINT16(s, 0);                          /* compressedLength (2 bytes) */
389
0
  return TRUE;
390
0
}
391
392
static BOOL rdp_security_stream_init(rdpRdp* rdp, wStream* s, BOOL sec_header, UINT16* sec_flags)
393
2.88k
{
394
2.88k
  WINPR_ASSERT(rdp);
395
2.88k
  WINPR_ASSERT(s);
396
2.88k
  WINPR_ASSERT(sec_flags);
397
398
2.88k
  if (rdp->do_crypt)
399
0
  {
400
0
    if (!Stream_SafeSeek(s, 12))
401
0
      return FALSE;
402
403
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
404
0
    {
405
0
      if (!Stream_SafeSeek(s, 4))
406
0
        return FALSE;
407
0
    }
408
409
0
    *sec_flags |= SEC_ENCRYPT;
410
411
0
    if (rdp->do_secure_checksum)
412
0
      *sec_flags |= SEC_SECURE_CHECKSUM;
413
0
  }
414
2.88k
  else if (*sec_flags != 0 || sec_header)
415
2.88k
  {
416
2.88k
    if (!Stream_SafeSeek(s, 4))
417
0
      return FALSE;
418
2.88k
  }
419
420
2.88k
  return TRUE;
421
2.88k
}
422
423
wStream* rdp_send_stream_init(rdpRdp* rdp, UINT16* sec_flags)
424
0
{
425
0
  wStream* s = nullptr;
426
427
0
  WINPR_ASSERT(rdp);
428
0
  WINPR_ASSERT(rdp->transport);
429
430
0
  s = transport_send_stream_init(rdp->transport, 4096);
431
432
0
  if (!s)
433
0
    return nullptr;
434
435
0
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
436
0
    goto fail;
437
438
0
  if (!rdp_security_stream_init(rdp, s, FALSE, sec_flags))
439
0
    goto fail;
440
441
0
  return s;
442
0
fail:
443
0
  Stream_Release(s);
444
0
  return nullptr;
445
0
}
446
447
wStream* rdp_send_stream_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
448
0
{
449
0
  wStream* s = rdp_send_stream_init(rdp, sec_flags);
450
451
0
  if (!s)
452
0
    return nullptr;
453
454
0
  if (!Stream_SafeSeek(s, RDP_SHARE_CONTROL_HEADER_LENGTH))
455
0
    goto fail;
456
457
0
  return s;
458
0
fail:
459
0
  Stream_Release(s);
460
0
  return nullptr;
461
0
}
462
463
wStream* rdp_data_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
464
0
{
465
0
  wStream* s = rdp_send_stream_pdu_init(rdp, sec_flags);
466
467
0
  if (!s)
468
0
    return nullptr;
469
470
0
  if (!Stream_SafeSeek(s, RDP_SHARE_DATA_HEADER_LENGTH))
471
0
    goto fail;
472
473
0
  return s;
474
0
fail:
475
0
  Stream_Release(s);
476
0
  return nullptr;
477
0
}
478
479
BOOL rdp_set_error_info(rdpRdp* rdp, UINT32 errorInfo)
480
1.06k
{
481
1.06k
  BOOL rc = TRUE;
482
1.06k
  WINPR_ASSERT(rdp);
483
484
1.06k
  rdp->errorInfo = errorInfo;
485
486
1.06k
  if (rdp->errorInfo != ERRINFO_SUCCESS)
487
1.05k
  {
488
1.05k
    rdpContext* context = rdp->context;
489
1.05k
    WINPR_ASSERT(context);
490
491
1.05k
    rdp_print_errinfo(rdp->errorInfo);
492
493
1.05k
    if (context)
494
1.05k
    {
495
1.05k
      freerdp_set_last_error_log(context, MAKE_FREERDP_ERROR(ERRINFO, errorInfo));
496
497
1.05k
      if (context->pubSub)
498
486
      {
499
486
        ErrorInfoEventArgs e = WINPR_C_ARRAY_INIT;
500
486
        EventArgsInit(&e, "freerdp");
501
486
        e.code = rdp->errorInfo;
502
486
        rc = PubSub_OnErrorInfo(context->pubSub, context, &e) >= 0;
503
486
      }
504
1.05k
    }
505
0
    else
506
0
      WLog_Print(rdp->log, WLOG_ERROR, "missing context=%p", (void*)context);
507
1.05k
  }
508
4
  else
509
4
  {
510
4
    freerdp_set_last_error_log(rdp->context, FREERDP_ERROR_SUCCESS);
511
4
  }
512
513
1.06k
  return rc;
514
1.06k
}
515
516
wStream* rdp_message_channel_pdu_init(rdpRdp* rdp, UINT16* sec_flags)
517
2.88k
{
518
2.88k
  wStream* s = nullptr;
519
520
2.88k
  WINPR_ASSERT(rdp);
521
522
2.88k
  s = transport_send_stream_init(rdp->transport, 4096);
523
524
2.88k
  if (!s)
525
0
    return nullptr;
526
527
2.88k
  if (!Stream_SafeSeek(s, RDP_PACKET_HEADER_MAX_LENGTH))
528
0
    goto fail;
529
530
2.88k
  if (!rdp_security_stream_init(rdp, s, TRUE, sec_flags))
531
0
    goto fail;
532
533
2.88k
  return s;
534
0
fail:
535
0
  Stream_Release(s);
536
0
  return nullptr;
537
2.88k
}
538
539
/**
540
 * Read an RDP packet header.
541
 * @param rdp rdp module
542
 * @param s stream
543
 * @param length RDP packet length
544
 * @param channelId channel id
545
 *
546
 * @return \b TRUE for success, \b FALSE otherwise
547
 */
548
549
BOOL rdp_read_header(rdpRdp* rdp, wStream* s, UINT16* length, UINT16* channelId)
550
53.2k
{
551
53.2k
  BYTE li = 0;
552
53.2k
  BYTE code = 0;
553
53.2k
  BYTE choice = 0;
554
53.2k
  UINT16 initiator = 0;
555
556
53.2k
  WINPR_ASSERT(rdp);
557
53.2k
  WINPR_ASSERT(rdp->settings);
558
53.2k
  WINPR_ASSERT(s);
559
53.2k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataRequest
560
53.2k
                                                    : DomainMCSPDU_SendDataIndication;
561
562
53.2k
  *channelId = 0; /* Initialize in case of early abort */
563
53.2k
  if (!tpkt_read_header(s, length))
564
23.6k
    return FALSE;
565
566
29.5k
  if (!tpdu_read_header(s, &code, &li, *length))
567
28.2k
    return FALSE;
568
569
1.35k
  if (code != X224_TPDU_DATA)
570
254
  {
571
254
    if (code == X224_TPDU_DISCONNECT_REQUEST)
572
166
    {
573
166
      WLog_Print(rdp->log, WLOG_WARN, "Received X224_TPDU_DISCONNECT_REQUEST, terminating");
574
166
      utils_abort_connect(rdp);
575
166
      return TRUE;
576
166
    }
577
578
88
    WLog_Print(rdp->log, WLOG_WARN,
579
88
               "Unexpected X224 TPDU type %s [%08" PRIx32 "] instead of %s",
580
88
               tpdu_type_to_string(code), code, tpdu_type_to_string(X224_TPDU_DATA));
581
88
    return FALSE;
582
254
  }
583
584
1.09k
  if (!per_read_choice(s, &choice))
585
5
    return FALSE;
586
587
1.09k
  const DomainMCSPDU domainMCSPDU = (DomainMCSPDU)(choice >> 2);
588
589
1.09k
  if (domainMCSPDU != MCSPDU)
590
991
  {
591
991
    if (domainMCSPDU != DomainMCSPDU_DisconnectProviderUltimatum)
592
72
    {
593
72
      WLog_Print(rdp->log, WLOG_WARN, "Received %s instead of %s",
594
72
                 mcs_domain_pdu_string(domainMCSPDU), mcs_domain_pdu_string(MCSPDU));
595
72
      return FALSE;
596
72
    }
597
991
  }
598
599
1.02k
  MCSPDU = domainMCSPDU;
600
601
1.02k
  if (*length < 8U)
602
8
  {
603
8
    WLog_Print(rdp->log, WLOG_WARN, "TPDU invalid length, got %" PRIu16 ", expected at least 8",
604
8
               *length);
605
8
    return FALSE;
606
8
  }
607
608
1.01k
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length - 8))
609
0
    return FALSE;
610
611
1.01k
  if (MCSPDU == DomainMCSPDU_DisconnectProviderUltimatum)
612
912
  {
613
912
    int reason = 0;
614
912
    TerminateEventArgs e = WINPR_C_ARRAY_INIT;
615
616
912
    if (!mcs_recv_disconnect_provider_ultimatum(rdp->mcs, s, &reason))
617
2
      return FALSE;
618
619
910
    rdpContext* context = rdp->context;
620
910
    WINPR_ASSERT(context);
621
910
    context->disconnectUltimatum = reason;
622
623
910
    if (rdp->errorInfo == ERRINFO_SUCCESS)
624
871
    {
625
      /**
626
       * Some servers like Windows Server 2008 R2 do not send the error info pdu
627
       * when the user logs off like they should. Map DisconnectProviderUltimatum
628
       * to a ERRINFO_LOGOFF_BY_USER when the errinfo code is ERRINFO_SUCCESS.
629
       */
630
871
      UINT32 errorInfo = ERRINFO_RPC_INITIATED_DISCONNECT;
631
871
      if (reason == Disconnect_Ultimatum_provider_initiated)
632
112
        errorInfo = ERRINFO_RPC_INITIATED_DISCONNECT;
633
759
      else if (reason == Disconnect_Ultimatum_user_requested)
634
64
        errorInfo = ERRINFO_LOGOFF_BY_USER;
635
636
871
      if (!rdp_set_error_info(rdp, errorInfo))
637
0
        return FALSE;
638
871
    }
639
640
910
    WLog_Print(rdp->log, WLOG_DEBUG, "DisconnectProviderUltimatum: reason: %d", reason);
641
910
    utils_abort_connect(rdp);
642
910
    EventArgsInit(&e, "freerdp");
643
910
    e.code = 0;
644
910
    return PubSub_OnTerminate(rdp->pubSub, context, &e) >= 0;
645
910
  }
646
647
100
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 5))
648
6
    return FALSE;
649
650
94
  if (!per_read_integer16(s, &initiator, MCS_BASE_CHANNEL_ID)) /* initiator (UserId) */
651
32
    return FALSE;
652
653
62
  if (!per_read_integer16(s, channelId, 0)) /* channelId */
654
0
    return FALSE;
655
656
62
  const uint8_t dataPriority = Stream_Get_UINT8(s); /* dataPriority + Segmentation (0x70) */
657
62
  WLog_Print(rdp->log, WLOG_TRACE, "dataPriority=%" PRIu8, dataPriority);
658
659
62
  if (!per_read_length(s, length)) /* userData (OCTET_STRING) */
660
4
    return FALSE;
661
662
58
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, *length))
663
17
    return FALSE;
664
665
41
  return TRUE;
666
58
}
667
668
/**
669
 * Write an RDP packet header.
670
 * @param rdp rdp module
671
 * @param s stream
672
 * @param length RDP packet length
673
 * @param channelId channel id
674
 *
675
 * @return \b TRUE for success, \b FALSE otherwise
676
 */
677
678
BOOL rdp_write_header(rdpRdp* rdp, wStream* s, size_t length, UINT16 channelId, UINT16 sec_flags)
679
2.88k
{
680
2.88k
  WINPR_ASSERT(rdp);
681
2.88k
  WINPR_ASSERT(rdp->settings);
682
2.88k
  WINPR_ASSERT(s);
683
2.88k
  WINPR_ASSERT(length >= RDP_PACKET_HEADER_MAX_LENGTH);
684
2.88k
  if (length > UINT16_MAX)
685
0
    return FALSE;
686
687
2.88k
  DomainMCSPDU MCSPDU = (rdp->settings->ServerMode) ? DomainMCSPDU_SendDataIndication
688
2.88k
                                                    : DomainMCSPDU_SendDataRequest;
689
690
2.88k
  if ((sec_flags & SEC_ENCRYPT) && (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS))
691
0
  {
692
0
    const UINT16 body_length = (UINT16)length - RDP_PACKET_HEADER_MAX_LENGTH;
693
0
    const UINT16 pad = 8 - (body_length % 8);
694
695
0
    if (pad != 8)
696
0
      length += pad;
697
0
  }
698
699
2.88k
  if (!mcs_write_domain_mcspdu_header(s, MCSPDU, (UINT16)length, 0))
700
0
    return FALSE;
701
2.88k
  if (!per_write_integer16(s, rdp->mcs->userId, MCS_BASE_CHANNEL_ID)) /* initiator */
702
2.88k
    return FALSE;
703
0
  if (!per_write_integer16(s, channelId, 0)) /* channelId */
704
0
    return FALSE;
705
0
  if (!Stream_EnsureRemainingCapacity(s, 3))
706
0
    return FALSE;
707
0
  Stream_Write_UINT8(s, 0x70); /* dataPriority + segmentation */
708
  /*
709
   * We always encode length in two bytes, even though we could use
710
   * only one byte if length <= 0x7F. It is just easier that way,
711
   * because we can leave room for fixed-length header, store all
712
   * the data first and then store the header.
713
   */
714
0
  length = (length - RDP_PACKET_HEADER_MAX_LENGTH) | 0x8000;
715
0
  Stream_Write_UINT16_BE(
716
0
      s, WINPR_ASSERTING_INT_CAST(uint16_t, length)); /* userData (OCTET_STRING) */
717
0
  return TRUE;
718
0
}
719
720
static BOOL rdp_security_stream_out(rdpRdp* rdp, wStream* s, size_t length, UINT16 sec_flags,
721
                                    UINT32* pad)
722
0
{
723
0
  BOOL status = 0;
724
0
  WINPR_ASSERT(rdp);
725
0
  if (length > UINT16_MAX)
726
0
    return FALSE;
727
728
0
  *pad = 0;
729
730
0
  if (sec_flags != 0)
731
0
  {
732
0
    WINPR_ASSERT(sec_flags <= UINT16_MAX);
733
0
    if (!rdp_write_security_header(rdp, s, sec_flags))
734
0
      return FALSE;
735
736
0
    if (sec_flags & SEC_ENCRYPT)
737
0
    {
738
0
      if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
739
0
      {
740
0
        BYTE* data = Stream_PointerAs(s, BYTE) + 12;
741
0
        const size_t size = WINPR_ASSERTING_INT_CAST(size_t, (data - Stream_Buffer(s)));
742
0
        if (size > length)
743
0
          return FALSE;
744
745
0
        length -= size;
746
747
0
        Stream_Write_UINT16(s, 0x10); /* length */
748
0
        Stream_Write_UINT8(s, 0x1);   /* TSFIPS_VERSION 1*/
749
        /* handle padding */
750
0
        *pad = 8 - (length % 8);
751
752
0
        if (*pad == 8)
753
0
          *pad = 0;
754
755
0
        if (*pad)
756
0
          memset(data + length, 0, *pad);
757
758
0
        Stream_Write_UINT8(s, WINPR_ASSERTING_INT_CAST(uint8_t, *pad));
759
760
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
761
0
          return FALSE;
762
0
        if (!security_hmac_signature(data, length, Stream_Pointer(s), 8, rdp))
763
0
          return FALSE;
764
765
0
        Stream_Seek(s, 8);
766
0
        if (!security_fips_encrypt(data, length + *pad, rdp))
767
0
          return FALSE;
768
0
      }
769
0
      else
770
0
      {
771
0
        const BYTE* data = Stream_PointerAs(s, const BYTE) + 8;
772
0
        const size_t diff = Stream_GetPosition(s) + 8ULL;
773
0
        if (diff > length)
774
0
          return FALSE;
775
0
        length -= diff;
776
777
0
        if (!Stream_CheckAndLogRequiredCapacityWLog(rdp->log, s, 8))
778
0
          return FALSE;
779
0
        if (sec_flags & SEC_SECURE_CHECKSUM)
780
0
          status = security_salted_mac_signature(rdp, data, (UINT32)length, TRUE,
781
0
                                                 Stream_Pointer(s), 8);
782
0
        else
783
0
          status = security_mac_signature(rdp, data, (UINT32)length,
784
0
                                          Stream_PointerAs(s, BYTE), 8);
785
786
0
        if (!status)
787
0
          return FALSE;
788
789
0
        Stream_Seek(s, 8);
790
791
0
        if (!security_encrypt(Stream_Pointer(s), length, rdp))
792
0
          return FALSE;
793
0
      }
794
0
    }
795
0
  }
796
797
0
  return TRUE;
798
0
}
799
800
static UINT32 rdp_get_sec_bytes(rdpRdp* rdp, UINT16 sec_flags)
801
0
{
802
0
  UINT32 sec_bytes = 0;
803
804
0
  if (sec_flags & SEC_ENCRYPT)
805
0
  {
806
0
    sec_bytes = 12;
807
808
0
    if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
809
0
      sec_bytes += 4;
810
0
  }
811
0
  else if (sec_flags != 0)
812
0
  {
813
0
    sec_bytes = 4;
814
0
  }
815
0
  else
816
0
  {
817
0
    sec_bytes = 0;
818
0
  }
819
820
0
  return sec_bytes;
821
0
}
822
823
BOOL rdp_send(rdpRdp* rdp, wStream* s, UINT16 channelId, UINT16 sec_flags)
824
0
{
825
0
  BOOL rc = FALSE;
826
0
  UINT32 pad = 0;
827
0
  BOOL should_unlock = FALSE;
828
829
0
  if (!s)
830
0
    return FALSE;
831
832
0
  if (!rdp)
833
0
    goto fail;
834
835
0
  if (sec_flags & SEC_ENCRYPT)
836
0
  {
837
0
    security_lock(rdp);
838
0
    should_unlock = TRUE;
839
0
  }
840
841
0
  {
842
0
    size_t length = Stream_GetPosition(s);
843
0
    Stream_ResetPosition(s);
844
0
    if (!rdp_write_header(rdp, s, length, channelId, sec_flags))
845
0
      goto fail;
846
847
0
    if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
848
0
      goto fail;
849
850
0
    length += pad;
851
0
    if (!Stream_SetPosition(s, length))
852
0
      goto fail;
853
0
    Stream_SealLength(s);
854
0
  }
855
856
0
  if (transport_write(rdp->transport, s) < 0)
857
0
    goto fail;
858
859
0
  rc = TRUE;
860
0
fail:
861
0
  if (should_unlock)
862
0
    security_unlock(rdp);
863
0
  Stream_Release(s);
864
0
  return rc;
865
0
}
866
867
BOOL rdp_send_pdu(rdpRdp* rdp, wStream* s, UINT16 type, UINT16 channel_id, UINT16 sec_flags)
868
0
{
869
0
  BOOL rc = FALSE;
870
0
  UINT32 sec_bytes = 0;
871
0
  size_t sec_hold = 0;
872
0
  UINT32 pad = 0;
873
0
  BOOL should_unlock = FALSE;
874
875
0
  if (!s)
876
0
    return FALSE;
877
878
0
  if (!rdp)
879
0
    goto fail;
880
881
0
  if (sec_flags & SEC_ENCRYPT)
882
0
  {
883
0
    security_lock(rdp);
884
0
    should_unlock = TRUE;
885
0
  }
886
887
0
  {
888
0
    size_t length = Stream_GetPosition(s);
889
0
    Stream_ResetPosition(s);
890
0
    if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID, sec_flags))
891
0
      goto fail;
892
0
    sec_bytes = rdp_get_sec_bytes(rdp, sec_flags);
893
0
    sec_hold = Stream_GetPosition(s);
894
0
    Stream_Seek(s, sec_bytes);
895
0
    if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, type, channel_id))
896
0
      goto fail;
897
0
    if (!Stream_SetPosition(s, sec_hold))
898
0
      goto fail;
899
900
0
    if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
901
0
      goto fail;
902
903
0
    length += pad;
904
0
    if (!Stream_SetPosition(s, length))
905
0
      goto fail;
906
0
    Stream_SealLength(s);
907
0
  }
908
909
0
  if (transport_write(rdp->transport, s) < 0)
910
0
    goto fail;
911
912
0
  rc = TRUE;
913
0
fail:
914
0
  if (should_unlock)
915
0
    security_unlock(rdp);
916
0
  return rc;
917
0
}
918
919
BOOL rdp_send_data_pdu(rdpRdp* rdp, wStream* s, BYTE type, UINT16 channel_id, UINT16 sec_flags)
920
0
{
921
0
  BOOL rc = FALSE;
922
0
  UINT32 sec_bytes = 0;
923
0
  size_t sec_hold = 0;
924
0
  UINT32 pad = 0;
925
0
  BOOL should_unlock = FALSE;
926
927
0
  if (!s)
928
0
    return FALSE;
929
930
0
  if (!rdp)
931
0
    goto fail;
932
933
0
  if (sec_flags & SEC_ENCRYPT)
934
0
  {
935
0
    security_lock(rdp);
936
0
    should_unlock = TRUE;
937
0
  }
938
939
0
  {
940
0
    size_t length = Stream_GetPosition(s);
941
0
    Stream_ResetPosition(s);
942
0
    if (!rdp_write_header(rdp, s, length, MCS_GLOBAL_CHANNEL_ID, sec_flags))
943
0
      goto fail;
944
0
    sec_bytes = rdp_get_sec_bytes(rdp, sec_flags);
945
0
    sec_hold = Stream_GetPosition(s);
946
0
    Stream_Seek(s, sec_bytes);
947
0
    if (!rdp_write_share_control_header(rdp, s, length - sec_bytes, PDU_TYPE_DATA, channel_id))
948
0
      goto fail;
949
0
    if (!rdp_write_share_data_header(rdp, s, length - sec_bytes, type, rdp->settings->ShareId))
950
0
      goto fail;
951
0
    if (!Stream_SetPosition(s, sec_hold))
952
0
      goto fail;
953
954
0
    if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
955
0
      goto fail;
956
957
0
    length += pad;
958
0
    if (!Stream_SetPosition(s, length))
959
0
      goto fail;
960
0
    Stream_SealLength(s);
961
0
  }
962
0
  WLog_Print(rdp->log, WLOG_DEBUG,
963
0
             "sending data (type=0x%x size=%" PRIuz " channelId=%" PRIu16 ")", type,
964
0
             Stream_Length(s), channel_id);
965
966
0
  rdp->outPackets++;
967
0
  if (transport_write(rdp->transport, s) < 0)
968
0
    goto fail;
969
970
0
  rc = TRUE;
971
0
fail:
972
0
  if (should_unlock)
973
0
    security_unlock(rdp);
974
0
  Stream_Release(s);
975
0
  return rc;
976
0
}
977
978
BOOL rdp_send_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 sec_flags)
979
2.88k
{
980
2.88k
  BOOL rc = FALSE;
981
2.88k
  UINT32 pad = 0;
982
2.88k
  BOOL should_unlock = FALSE;
983
984
2.88k
  WINPR_ASSERT(rdp);
985
2.88k
  WINPR_ASSERT(s);
986
987
2.88k
  if (sec_flags & SEC_ENCRYPT)
988
0
  {
989
0
    security_lock(rdp);
990
0
    should_unlock = TRUE;
991
0
  }
992
993
2.88k
  {
994
2.88k
    size_t length = Stream_GetPosition(s);
995
2.88k
    Stream_ResetPosition(s);
996
2.88k
    if (!rdp_write_header(rdp, s, length, rdp->mcs->messageChannelId, sec_flags))
997
2.88k
      goto fail;
998
999
0
    if (!rdp_security_stream_out(rdp, s, length, sec_flags, &pad))
1000
0
      goto fail;
1001
1002
0
    length += pad;
1003
0
    if (!Stream_SetPosition(s, length))
1004
0
      goto fail;
1005
0
  }
1006
0
  Stream_SealLength(s);
1007
1008
0
  if (transport_write(rdp->transport, s) < 0)
1009
0
    goto fail;
1010
1011
0
  rc = TRUE;
1012
2.88k
fail:
1013
2.88k
  if (should_unlock)
1014
0
    security_unlock(rdp);
1015
1016
2.88k
  Stream_Release(s);
1017
2.88k
  return rc;
1018
0
}
1019
1020
static BOOL rdp_recv_server_shutdown_denied_pdu(WINPR_ATTR_UNUSED rdpRdp* rdp,
1021
                                                WINPR_ATTR_UNUSED wStream* s)
1022
3
{
1023
3
  return TRUE;
1024
3
}
1025
1026
static BOOL rdp_recv_server_set_keyboard_indicators_pdu(rdpRdp* rdp, wStream* s)
1027
50
{
1028
50
  WINPR_ASSERT(rdp);
1029
50
  WINPR_ASSERT(s);
1030
1031
50
  rdpContext* context = rdp->context;
1032
50
  WINPR_ASSERT(context);
1033
50
  WINPR_ASSERT(context->update);
1034
1035
50
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1036
1
    return FALSE;
1037
1038
49
  const uint16_t unitId = Stream_Get_UINT16(s); /* unitId (2 bytes) */
1039
49
  if (unitId != 0)
1040
40
  {
1041
40
    WLog_Print(rdp->log, WLOG_WARN,
1042
40
               "[MS-RDPBCGR] 2.2.8.2.1.1 Set Keyboard Indicators PDU Data "
1043
40
               "(TS_SET_KEYBOARD_INDICATORS_PDU)::unitId should be 0, is %" PRIu16,
1044
40
               unitId);
1045
40
  }
1046
49
  const UINT16 ledFlags = Stream_Get_UINT16(s); /* ledFlags (2 bytes) */
1047
49
  return IFCALLRESULT(TRUE, context->update->SetKeyboardIndicators, context, ledFlags);
1048
50
}
1049
1050
static BOOL rdp_recv_server_set_keyboard_ime_status_pdu(rdpRdp* rdp, wStream* s)
1051
13
{
1052
13
  if (!rdp || !rdp->input)
1053
0
    return FALSE;
1054
1055
13
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 10))
1056
1
    return FALSE;
1057
1058
12
  const uint16_t unitId = Stream_Get_UINT16(s); /* unitId (2 bytes) */
1059
12
  if (unitId != 0)
1060
7
  {
1061
7
    WLog_Print(rdp->log, WLOG_WARN,
1062
7
               "[MS-RDPBCGR] 2.2.8.2.2.1 Set Keyboard IME Status PDU Data "
1063
7
               "(TS_SET_KEYBOARD_IME_STATUS_PDU)::unitId should be 0, is %" PRIu16,
1064
7
               unitId);
1065
7
  }
1066
12
  const uint32_t imeState = Stream_Get_UINT32(s);    /* imeState (4 bytes) */
1067
12
  const uint32_t imeConvMode = Stream_Get_UINT32(s); /* imeConvMode (4 bytes) */
1068
12
  return IFCALLRESULT(TRUE, rdp->update->SetKeyboardImeStatus, rdp->context, unitId, imeState,
1069
13
                      imeConvMode);
1070
13
}
1071
1072
static BOOL rdp_recv_set_error_info_data_pdu(rdpRdp* rdp, wStream* s)
1073
190
{
1074
190
  UINT32 errorInfo = 0;
1075
1076
190
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1077
1
    return FALSE;
1078
1079
189
  Stream_Read_UINT32(s, errorInfo); /* errorInfo (4 bytes) */
1080
189
  return rdp_set_error_info(rdp, errorInfo);
1081
190
}
1082
1083
static BOOL rdp_recv_server_auto_reconnect_status_pdu(rdpRdp* rdp, wStream* s)
1084
7
{
1085
7
  UINT32 arcStatus = 0;
1086
1087
7
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1088
1
    return FALSE;
1089
1090
6
  Stream_Read_UINT32(s, arcStatus); /* arcStatus (4 bytes) */
1091
6
  WLog_Print(rdp->log, WLOG_WARN, "AutoReconnectStatus: 0x%08" PRIX32 "", arcStatus);
1092
6
  return TRUE;
1093
7
}
1094
1095
static BOOL rdp_recv_server_status_info_pdu(rdpRdp* rdp, wStream* s)
1096
8
{
1097
8
  UINT32 statusCode = 0;
1098
1099
8
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1100
1
    return FALSE;
1101
1102
7
  Stream_Read_UINT32(s, statusCode); /* statusCode (4 bytes) */
1103
1104
7
  if (rdp->update->ServerStatusInfo)
1105
0
    return rdp->update->ServerStatusInfo(rdp->context, statusCode);
1106
1107
7
  return TRUE;
1108
7
}
1109
1110
static void log_monitor(size_t idx, const MONITOR_DEF* monitor, wLog* log, DWORD level)
1111
4.30k
{
1112
4.30k
  WINPR_ASSERT(monitor);
1113
1114
4.30k
  WLog_Print(log, level, "[%" PRIuz "] {%dx%d-%dx%d} [0x%08" PRIx32 "]", idx, monitor->left,
1115
4.30k
             monitor->top, monitor->right, monitor->bottom, monitor->flags);
1116
4.30k
}
1117
1118
static void log_monitor_configuration(wLog* log, const MONITOR_DEF* monitors, size_t count)
1119
66
{
1120
66
  const DWORD level = WLOG_DEBUG;
1121
66
  WLog_Print(log, level, "[BEGIN] RemoteMonitors[%" PRIuz "]", count);
1122
4.37k
  for (size_t x = 0; x < count; x++)
1123
4.30k
  {
1124
4.30k
    const MONITOR_DEF* monitor = &monitors[x];
1125
4.30k
    log_monitor(x, monitor, log, level);
1126
4.30k
  }
1127
66
  WLog_Print(log, level, "[END] RemoteMonitors[%" PRIuz "]", count);
1128
66
}
1129
1130
static BOOL rdp_recv_monitor_layout_pdu(rdpRdp* rdp, wStream* s)
1131
84
{
1132
84
  BOOL ret = TRUE;
1133
1134
84
  WINPR_ASSERT(rdp);
1135
84
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 4))
1136
1
    return FALSE;
1137
1138
83
  const UINT32 monitorCount = Stream_Get_UINT32(s); /* monitorCount (4 bytes) */
1139
1140
83
  if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(rdp->log, s, monitorCount, 20ull))
1141
17
    return FALSE;
1142
1143
66
  MONITOR_DEF* monitorDefArray = (MONITOR_DEF*)calloc(monitorCount, sizeof(MONITOR_DEF));
1144
1145
66
  if (!monitorDefArray)
1146
0
    return FALSE;
1147
1148
4.37k
  for (UINT32 index = 0; index < monitorCount; index++)
1149
4.30k
  {
1150
4.30k
    MONITOR_DEF* monitor = &monitorDefArray[index];
1151
4.30k
    Stream_Read_INT32(s, monitor->left);   /* left (4 bytes) */
1152
4.30k
    Stream_Read_INT32(s, monitor->top);    /* top (4 bytes) */
1153
4.30k
    Stream_Read_INT32(s, monitor->right);  /* right (4 bytes) */
1154
4.30k
    Stream_Read_INT32(s, monitor->bottom); /* bottom (4 bytes) */
1155
4.30k
    Stream_Read_UINT32(s, monitor->flags); /* flags (4 bytes) */
1156
4.30k
  }
1157
1158
66
  log_monitor_configuration(rdp->log, monitorDefArray, monitorCount);
1159
66
  IFCALLRET(rdp->update->RemoteMonitors, ret, rdp->context, monitorCount, monitorDefArray);
1160
66
  free(monitorDefArray);
1161
66
  if (!ret)
1162
0
    return FALSE;
1163
66
  return rdp_set_monitor_layout_pdu_state(rdp, TRUE);
1164
66
}
1165
1166
state_run_t rdp_recv_data_pdu(rdpRdp* rdp, wStream* s)
1167
10.1k
{
1168
10.1k
  BYTE type = 0;
1169
10.1k
  wStream* cs = nullptr;
1170
10.1k
  UINT16 length = 0;
1171
10.1k
  UINT32 shareId = 0;
1172
10.1k
  BYTE compressedType = 0;
1173
10.1k
  UINT16 compressedLength = 0;
1174
1175
10.1k
  WINPR_ASSERT(rdp);
1176
10.1k
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &shareId, &compressedType,
1177
10.1k
                                  &compressedLength))
1178
8.21k
  {
1179
8.21k
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_read_share_data_header() failed");
1180
8.21k
    return STATE_RUN_FAILED;
1181
8.21k
  }
1182
1183
1.97k
  cs = s;
1184
1185
1.97k
  if (compressedType & PACKET_COMPRESSED)
1186
270
  {
1187
270
    if (compressedLength < 18)
1188
24
    {
1189
24
      WLog_Print(rdp->log, WLOG_ERROR,
1190
24
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1191
24
                 compressedLength);
1192
24
      return STATE_RUN_FAILED;
1193
24
    }
1194
1195
246
    UINT32 DstSize = 0;
1196
246
    const BYTE* pDstData = nullptr;
1197
246
    UINT16 SrcSize = compressedLength - 18;
1198
1199
246
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, SrcSize))
1200
95
    {
1201
95
      WLog_Print(rdp->log, WLOG_ERROR,
1202
95
                 "bulk_decompress: not enough bytes for compressedLength %" PRIu16 "",
1203
95
                 compressedLength);
1204
95
      return STATE_RUN_FAILED;
1205
95
    }
1206
1207
151
    if (bulk_decompress(rdp->bulk, Stream_ConstPointer(s), SrcSize, &pDstData, &DstSize,
1208
151
                        compressedType))
1209
151
    {
1210
151
      cs = transport_take_from_pool(rdp->transport, DstSize);
1211
151
      if (!cs)
1212
151
      {
1213
151
        WLog_Print(rdp->log, WLOG_ERROR, "Couldn't take stream from pool");
1214
151
        return STATE_RUN_FAILED;
1215
151
      }
1216
1217
0
      Stream_ResetPosition(cs);
1218
0
      Stream_Write(cs, pDstData, DstSize);
1219
0
      Stream_SealLength(cs);
1220
0
      Stream_ResetPosition(cs);
1221
0
    }
1222
0
    else
1223
0
    {
1224
0
      WLog_Print(rdp->log, WLOG_ERROR, "bulk_decompress() failed");
1225
0
      return STATE_RUN_FAILED;
1226
0
    }
1227
1228
0
    Stream_Seek(s, SrcSize);
1229
0
  }
1230
1231
1.70k
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1232
1.70k
             data_pdu_type_to_string(type), type, length);
1233
1234
1.70k
  switch (type)
1235
1.70k
  {
1236
542
    case DATA_PDU_TYPE_UPDATE:
1237
542
      if (!update_recv(rdp->update, cs))
1238
530
      {
1239
530
        WLog_Print(rdp->log, WLOG_ERROR, "DATA_PDU_TYPE_UPDATE - update_recv() failed");
1240
530
        goto out_fail;
1241
530
      }
1242
1243
12
      break;
1244
1245
45
    case DATA_PDU_TYPE_CONTROL:
1246
45
      if (!rdp_recv_server_control_pdu(rdp, cs))
1247
39
      {
1248
39
        WLog_Print(rdp->log, WLOG_ERROR,
1249
39
                   "DATA_PDU_TYPE_CONTROL - rdp_recv_server_control_pdu() failed");
1250
39
        goto out_fail;
1251
39
      }
1252
1253
6
      break;
1254
1255
18
    case DATA_PDU_TYPE_POINTER:
1256
18
      if (!update_recv_pointer(rdp->update, cs))
1257
18
      {
1258
18
        WLog_Print(rdp->log, WLOG_ERROR,
1259
18
                   "DATA_PDU_TYPE_POINTER - update_recv_pointer() failed");
1260
18
        goto out_fail;
1261
18
      }
1262
1263
0
      break;
1264
1265
11
    case DATA_PDU_TYPE_SYNCHRONIZE:
1266
11
      if (!rdp_recv_server_synchronize_pdu(rdp, cs))
1267
6
      {
1268
6
        WLog_Print(rdp->log, WLOG_ERROR,
1269
6
                   "DATA_PDU_TYPE_SYNCHRONIZE - rdp_recv_synchronize_pdu() failed");
1270
6
        goto out_fail;
1271
6
      }
1272
1273
5
      break;
1274
1275
7
    case DATA_PDU_TYPE_PLAY_SOUND:
1276
7
      if (!update_recv_play_sound(rdp->update, cs))
1277
2
      {
1278
2
        WLog_Print(rdp->log, WLOG_ERROR,
1279
2
                   "DATA_PDU_TYPE_PLAY_SOUND - update_recv_play_sound() failed");
1280
2
        goto out_fail;
1281
2
      }
1282
1283
5
      break;
1284
1285
5
    case DATA_PDU_TYPE_SHUTDOWN_DENIED:
1286
3
      if (!rdp_recv_server_shutdown_denied_pdu(rdp, cs))
1287
0
      {
1288
0
        WLog_Print(
1289
0
            rdp->log, WLOG_ERROR,
1290
0
            "DATA_PDU_TYPE_SHUTDOWN_DENIED - rdp_recv_server_shutdown_denied_pdu() failed");
1291
0
        goto out_fail;
1292
0
      }
1293
1294
3
      break;
1295
1296
252
    case DATA_PDU_TYPE_SAVE_SESSION_INFO:
1297
252
      if (!rdp_recv_save_session_info(rdp, cs))
1298
221
      {
1299
221
        WLog_Print(rdp->log, WLOG_ERROR,
1300
221
                   "DATA_PDU_TYPE_SAVE_SESSION_INFO - rdp_recv_save_session_info() failed");
1301
221
        goto out_fail;
1302
221
      }
1303
1304
31
      break;
1305
1306
31
    case DATA_PDU_TYPE_FONT_MAP:
1307
29
      if (!rdp_recv_font_map_pdu(rdp, cs))
1308
0
      {
1309
0
        WLog_Print(rdp->log, WLOG_ERROR,
1310
0
                   "DATA_PDU_TYPE_FONT_MAP - rdp_recv_font_map_pdu() failed");
1311
0
        goto out_fail;
1312
0
      }
1313
1314
29
      break;
1315
1316
50
    case DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS:
1317
50
      if (!rdp_recv_server_set_keyboard_indicators_pdu(rdp, cs))
1318
1
      {
1319
1
        WLog_Print(rdp->log, WLOG_ERROR,
1320
1
                   "DATA_PDU_TYPE_SET_KEYBOARD_INDICATORS - "
1321
1
                   "rdp_recv_server_set_keyboard_indicators_pdu() failed");
1322
1
        goto out_fail;
1323
1
      }
1324
1325
49
      break;
1326
1327
49
    case DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS:
1328
13
      if (!rdp_recv_server_set_keyboard_ime_status_pdu(rdp, cs))
1329
1
      {
1330
1
        WLog_Print(rdp->log, WLOG_ERROR,
1331
1
                   "DATA_PDU_TYPE_SET_KEYBOARD_IME_STATUS - "
1332
1
                   "rdp_recv_server_set_keyboard_ime_status_pdu() failed");
1333
1
        goto out_fail;
1334
1
      }
1335
1336
12
      break;
1337
1338
190
    case DATA_PDU_TYPE_SET_ERROR_INFO:
1339
190
      if (!rdp_recv_set_error_info_data_pdu(rdp, cs))
1340
1
      {
1341
1
        WLog_Print(
1342
1
            rdp->log, WLOG_ERROR,
1343
1
            "DATA_PDU_TYPE_SET_ERROR_INFO - rdp_recv_set_error_info_data_pdu() failed");
1344
1
        goto out_fail;
1345
1
      }
1346
1347
189
      break;
1348
1349
189
    case DATA_PDU_TYPE_ARC_STATUS:
1350
7
      if (!rdp_recv_server_auto_reconnect_status_pdu(rdp, cs))
1351
1
      {
1352
1
        WLog_Print(rdp->log, WLOG_ERROR,
1353
1
                   "DATA_PDU_TYPE_ARC_STATUS - "
1354
1
                   "rdp_recv_server_auto_reconnect_status_pdu() failed");
1355
1
        goto out_fail;
1356
1
      }
1357
1358
6
      break;
1359
1360
8
    case DATA_PDU_TYPE_STATUS_INFO:
1361
8
      if (!rdp_recv_server_status_info_pdu(rdp, cs))
1362
1
      {
1363
1
        WLog_Print(rdp->log, WLOG_ERROR,
1364
1
                   "DATA_PDU_TYPE_STATUS_INFO - rdp_recv_server_status_info_pdu() failed");
1365
1
        goto out_fail;
1366
1
      }
1367
1368
7
      break;
1369
1370
84
    case DATA_PDU_TYPE_MONITOR_LAYOUT:
1371
84
      if (!rdp_recv_monitor_layout_pdu(rdp, cs))
1372
19
      {
1373
19
        WLog_Print(rdp->log, WLOG_ERROR,
1374
19
                   "DATA_PDU_TYPE_MONITOR_LAYOUT - rdp_recv_monitor_layout_pdu() failed");
1375
19
        goto out_fail;
1376
19
      }
1377
1378
65
      break;
1379
1380
443
    default:
1381
443
      WLog_Print(rdp->log, WLOG_WARN,
1382
443
                 "[UNHANDLED] %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
1383
443
                 data_pdu_type_to_string(type), type, length);
1384
443
      break;
1385
1.70k
  }
1386
1387
862
  if (cs != s)
1388
0
    Stream_Release(cs);
1389
1390
862
  return STATE_RUN_SUCCESS;
1391
840
out_fail:
1392
1393
840
  if (cs != s)
1394
0
    Stream_Release(cs);
1395
1396
840
  return STATE_RUN_FAILED;
1397
1.70k
}
1398
1399
state_run_t rdp_recv_message_channel_pdu(rdpRdp* rdp, wStream* s, UINT16 securityFlags)
1400
17.7k
{
1401
17.7k
  WINPR_ASSERT(rdp);
1402
17.7k
  WINPR_ASSERT(s);
1403
1404
17.7k
  if (securityFlags & SEC_AUTODETECT_REQ)
1405
0
  {
1406
    /* Server Auto-Detect Request PDU */
1407
0
    return autodetect_recv_request_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1408
0
  }
1409
1410
17.7k
  if (securityFlags & SEC_AUTODETECT_RSP)
1411
0
  {
1412
    /* Client Auto-Detect Response PDU */
1413
0
    return autodetect_recv_response_packet(rdp->autodetect, RDP_TRANSPORT_TCP, s);
1414
0
  }
1415
1416
17.7k
  if (securityFlags & SEC_HEARTBEAT)
1417
0
  {
1418
    /* Heartbeat PDU */
1419
0
    return rdp_recv_heartbeat_packet(rdp, s);
1420
0
  }
1421
1422
17.7k
  if (securityFlags & SEC_TRANSPORT_REQ)
1423
0
  {
1424
0
    return multitransport_recv_request(rdp->multitransport, s);
1425
0
  }
1426
1427
17.7k
  if (securityFlags & SEC_TRANSPORT_RSP)
1428
0
  {
1429
0
    return multitransport_recv_response(rdp->multitransport, s);
1430
0
  }
1431
1432
17.7k
  if (securityFlags & SEC_LICENSE_PKT)
1433
0
  {
1434
0
    return license_recv(rdp->license, s);
1435
0
  }
1436
1437
17.7k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
1438
0
  {
1439
0
    return license_recv(rdp->license, s);
1440
0
  }
1441
1442
17.7k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
1443
0
  {
1444
0
    return license_recv(rdp->license, s);
1445
0
  }
1446
1447
17.7k
  return STATE_RUN_SUCCESS;
1448
17.7k
}
1449
1450
state_run_t rdp_recv_out_of_sequence_pdu(rdpRdp* rdp, wStream* s, UINT16 pduType, UINT16 length)
1451
9.21k
{
1452
9.21k
  state_run_t rc = STATE_RUN_FAILED;
1453
9.21k
  WINPR_ASSERT(rdp);
1454
1455
9.21k
  switch (pduType)
1456
9.21k
  {
1457
976
    case PDU_TYPE_DATA:
1458
976
      rc = rdp_recv_data_pdu(rdp, s);
1459
976
      break;
1460
152
    case PDU_TYPE_SERVER_REDIRECTION:
1461
152
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1462
152
      break;
1463
2
    case PDU_TYPE_FLOW_RESPONSE:
1464
3
    case PDU_TYPE_FLOW_STOP:
1465
4
    case PDU_TYPE_FLOW_TEST:
1466
4
      rc = STATE_RUN_SUCCESS;
1467
4
      break;
1468
8.08k
    default:
1469
8.08k
    {
1470
8.08k
      char buffer1[256] = WINPR_C_ARRAY_INIT;
1471
8.08k
      char buffer2[256] = WINPR_C_ARRAY_INIT;
1472
1473
8.08k
      WLog_Print(rdp->log, WLOG_ERROR, "expected %s, got %s",
1474
8.08k
                 pdu_type_to_str(PDU_TYPE_DEMAND_ACTIVE, buffer1, sizeof(buffer1)),
1475
8.08k
                 pdu_type_to_str(pduType, buffer2, sizeof(buffer2)));
1476
8.08k
      rc = STATE_RUN_FAILED;
1477
8.08k
    }
1478
8.08k
    break;
1479
9.21k
  }
1480
1481
9.21k
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
1482
5.81k
    return STATE_RUN_FAILED;
1483
3.39k
  return rc;
1484
9.21k
}
1485
1486
BOOL rdp_read_flow_control_pdu(rdpRdp* rdp, wStream* s, UINT16* type, UINT16* channel_id)
1487
89
{
1488
  /*
1489
   * Read flow control PDU - documented in FlowPDU section in T.128
1490
   * http://www.itu.int/rec/T-REC-T.128-199802-S/en
1491
   * The specification for the PDU has pad8bits listed BEFORE pduTypeFlow.
1492
   * However, so far pad8bits has always been observed to arrive AFTER pduTypeFlow.
1493
   * Switched the order of these two fields to match this observation.
1494
   */
1495
89
  UINT8 pduType = 0;
1496
1497
89
  WINPR_ASSERT(rdp);
1498
89
  WINPR_ASSERT(s);
1499
89
  WINPR_ASSERT(type);
1500
89
  WINPR_ASSERT(channel_id);
1501
1502
89
  if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 6))
1503
9
    return FALSE;
1504
80
  Stream_Read_UINT8(s, pduType); /* pduTypeFlow */
1505
80
  *type = pduType;
1506
80
  Stream_Seek_UINT8(s);               /* pad8bits */
1507
80
  Stream_Seek_UINT8(s);               /* flowIdentifier */
1508
80
  Stream_Seek_UINT8(s);               /* flowNumber */
1509
80
  Stream_Read_UINT16(s, *channel_id); /* pduSource */
1510
80
  return TRUE;
1511
89
}
1512
1513
/**
1514
 * Decrypt an RDP packet.
1515
 *
1516
 * @param rdp RDP module
1517
 * @param s stream
1518
 * @param pLength A pointer to the result variable, must not be nullptr
1519
 * @param securityFlags the security flags to apply
1520
 *
1521
 * @return \b TRUE for success, \b FALSE otherwise
1522
 */
1523
1524
BOOL rdp_decrypt(rdpRdp* rdp, wStream* s, UINT16* pLength, UINT16 securityFlags)
1525
2.09k
{
1526
2.09k
  BOOL res = FALSE;
1527
2.09k
  BYTE cmac[8] = WINPR_C_ARRAY_INIT;
1528
2.09k
  BYTE wmac[8] = WINPR_C_ARRAY_INIT;
1529
2.09k
  BOOL status = FALSE;
1530
1531
2.09k
  WINPR_ASSERT(rdp);
1532
2.09k
  WINPR_ASSERT(rdp->settings);
1533
2.09k
  WINPR_ASSERT(s);
1534
2.09k
  WINPR_ASSERT(pLength);
1535
1536
2.09k
  security_lock(rdp);
1537
1538
2.09k
  INT32 length = *pLength;
1539
2.09k
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_NONE)
1540
2.09k
    return TRUE;
1541
1542
0
  if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1543
0
  {
1544
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, 12))
1545
0
      goto unlock;
1546
1547
0
    UINT16 len = 0;
1548
0
    Stream_Read_UINT16(s, len); /* 0x10 */
1549
0
    if (len != 0x10)
1550
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS length %" PRIu16 " != 0x10",
1551
0
                 len);
1552
1553
0
    UINT16 version = 0;
1554
0
    Stream_Read_UINT8(s, version); /* 0x1 */
1555
0
    if (version != 1)
1556
0
      WLog_Print(rdp->log, WLOG_WARN, "ENCRYPTION_METHOD_FIPS version %" PRIu16 " != 1",
1557
0
                 version);
1558
1559
0
    BYTE pad = 0;
1560
0
    Stream_Read_UINT8(s, pad);
1561
0
    const BYTE* sig = Stream_ConstPointer(s);
1562
0
    Stream_Seek(s, 8); /* signature */
1563
0
    length -= 12;
1564
0
    const INT32 padLength = length - pad;
1565
1566
0
    if ((length <= 0) || (padLength <= 0) || (padLength > UINT16_MAX))
1567
0
    {
1568
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid pad length %" PRId32, padLength);
1569
0
      goto unlock;
1570
0
    }
1571
1572
0
    if (!security_fips_decrypt(Stream_Pointer(s), (size_t)length, rdp))
1573
0
      goto unlock;
1574
1575
0
    if (!security_fips_check_signature(Stream_ConstPointer(s), (size_t)padLength, sig, 8, rdp))
1576
0
      goto unlock;
1577
1578
0
    if (!Stream_SetLength(s, Stream_Length(s) - pad))
1579
0
      goto unlock;
1580
1581
0
    *pLength = (UINT16)padLength;
1582
0
  }
1583
0
  else
1584
0
  {
1585
0
    if (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, sizeof(wmac)))
1586
0
      goto unlock;
1587
1588
0
    Stream_Read(s, wmac, sizeof(wmac));
1589
0
    length -= sizeof(wmac);
1590
1591
0
    if (length <= 0)
1592
0
    {
1593
0
      WLog_Print(rdp->log, WLOG_ERROR, "FATAL: invalid length field");
1594
0
      goto unlock;
1595
0
    }
1596
1597
0
    if (!security_decrypt(Stream_PointerAs(s, BYTE), (size_t)length, rdp))
1598
0
      goto unlock;
1599
1600
0
    if (securityFlags & SEC_SECURE_CHECKSUM)
1601
0
      status = security_salted_mac_signature(rdp, Stream_ConstPointer(s), (UINT32)length,
1602
0
                                             FALSE, cmac, sizeof(cmac));
1603
0
    else
1604
0
      status = security_mac_signature(rdp, Stream_ConstPointer(s), (UINT32)length, cmac,
1605
0
                                      sizeof(cmac));
1606
1607
0
    if (!status)
1608
0
      goto unlock;
1609
1610
0
    if (memcmp(wmac, cmac, sizeof(wmac)) != 0)
1611
0
    {
1612
0
      WLog_Print(rdp->log, WLOG_ERROR, "WARNING: invalid packet signature");
1613
      /*
1614
       * Because Standard RDP Security is totally broken,
1615
       * and cannot protect against MITM, don't treat signature
1616
       * verification failure as critical. This at least enables
1617
       * us to work with broken RDP clients and servers that
1618
       * generate invalid signatures.
1619
       */
1620
      // return FALSE;
1621
0
    }
1622
1623
0
    *pLength = (UINT16)length;
1624
0
  }
1625
0
  res = TRUE;
1626
0
unlock:
1627
0
  security_unlock(rdp);
1628
0
  return res;
1629
0
}
1630
1631
const char* pdu_type_to_str(UINT16 pduType, char* buffer, size_t length)
1632
16.1k
{
1633
16.1k
  const char* str = nullptr;
1634
16.1k
  switch (pduType)
1635
16.1k
  {
1636
8.27k
    case PDU_TYPE_DEMAND_ACTIVE:
1637
8.27k
      str = "PDU_TYPE_DEMAND_ACTIVE";
1638
8.27k
      break;
1639
47
    case PDU_TYPE_CONFIRM_ACTIVE:
1640
47
      str = "PDU_TYPE_CONFIRM_ACTIVE";
1641
47
      break;
1642
34
    case PDU_TYPE_DEACTIVATE_ALL:
1643
34
      str = "PDU_TYPE_DEACTIVATE_ALL";
1644
34
      break;
1645
0
    case PDU_TYPE_DATA:
1646
0
      str = "PDU_TYPE_DATA";
1647
0
      break;
1648
0
    case PDU_TYPE_SERVER_REDIRECTION:
1649
0
      str = "PDU_TYPE_SERVER_REDIRECTION";
1650
0
      break;
1651
0
    case PDU_TYPE_FLOW_TEST:
1652
0
      str = "PDU_TYPE_FLOW_TEST";
1653
0
      break;
1654
0
    case PDU_TYPE_FLOW_RESPONSE:
1655
0
      str = "PDU_TYPE_FLOW_RESPONSE";
1656
0
      break;
1657
0
    case PDU_TYPE_FLOW_STOP:
1658
0
      str = "PDU_TYPE_FLOW_STOP";
1659
0
      break;
1660
7.80k
    default:
1661
7.80k
      str = "PDU_TYPE_UNKNOWN";
1662
7.80k
      break;
1663
16.1k
  }
1664
1665
16.1k
  winpr_str_append(str, buffer, length, "");
1666
16.1k
  {
1667
16.1k
    char msg[32] = WINPR_C_ARRAY_INIT;
1668
16.1k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", pduType);
1669
16.1k
    winpr_str_append(msg, buffer, length, "");
1670
16.1k
  }
1671
16.1k
  return buffer;
1672
16.1k
}
1673
1674
/**
1675
 * Process an RDP packet.
1676
 * @param rdp RDP module
1677
 * @param s stream
1678
 */
1679
1680
static state_run_t rdp_recv_tpkt_pdu(rdpRdp* rdp, wStream* s)
1681
0
{
1682
0
  state_run_t rc = STATE_RUN_SUCCESS;
1683
0
  UINT16 length = 0;
1684
0
  UINT16 pduType = 0;
1685
0
  UINT16 pduSource = 0;
1686
0
  UINT16 channelId = 0;
1687
0
  UINT16 securityFlags = 0;
1688
1689
0
  WINPR_ASSERT(rdp);
1690
0
  WINPR_ASSERT(rdp->context);
1691
0
  WINPR_ASSERT(s);
1692
1693
0
  freerdp* instance = rdp->context->instance;
1694
0
  WINPR_ASSERT(instance);
1695
1696
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
1697
0
    return STATE_RUN_FAILED;
1698
1699
0
  if (freerdp_shall_disconnect_context(rdp->context))
1700
0
    return STATE_RUN_SUCCESS;
1701
1702
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1703
0
  {
1704
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1705
0
  }
1706
1707
0
  if (rdp->mcs->messageChannelId && (channelId == rdp->mcs->messageChannelId))
1708
0
  {
1709
0
    rdp->inPackets++;
1710
0
    return rdp_handle_message_channel(rdp, s, channelId, length);
1711
0
  }
1712
1713
0
  if (rdp->settings->UseRdpSecurityLayer)
1714
0
  {
1715
0
    if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
1716
0
      return STATE_RUN_FAILED;
1717
1718
0
    if (securityFlags & (SEC_ENCRYPT | SEC_REDIRECTION_PKT))
1719
0
    {
1720
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
1721
0
        return STATE_RUN_FAILED;
1722
0
    }
1723
1724
0
    if (securityFlags & SEC_REDIRECTION_PKT)
1725
0
    {
1726
      /*
1727
       * [MS-RDPBCGR] 2.2.13.2.1
1728
       *  - no share control header, nor the 2 byte pad
1729
       */
1730
0
      Stream_Rewind(s, 2);
1731
0
      rdp->inPackets++;
1732
1733
0
      rc = rdp_recv_enhanced_security_redirection_packet(rdp, s);
1734
0
      goto out;
1735
0
    }
1736
0
  }
1737
1738
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
1739
0
  {
1740
0
    while (Stream_GetRemainingLength(s) > 3)
1741
0
    {
1742
0
      wStream subbuffer;
1743
0
      wStream* sub = nullptr;
1744
0
      size_t diff = 0;
1745
0
      UINT16 remain = 0;
1746
1747
0
      if (!rdp_read_share_control_header(rdp, s, nullptr, &remain, &pduType, &pduSource))
1748
0
        return STATE_RUN_FAILED;
1749
1750
0
      sub = Stream_StaticInit(&subbuffer, Stream_Pointer(s), remain);
1751
0
      if (!Stream_SafeSeek(s, remain))
1752
0
        return STATE_RUN_FAILED;
1753
1754
0
      rdp->settings->PduSource = pduSource;
1755
0
      rdp->inPackets++;
1756
1757
0
      switch (pduType)
1758
0
      {
1759
0
        case PDU_TYPE_DATA:
1760
0
          rc = rdp_recv_data_pdu(rdp, sub);
1761
0
          if (state_run_failed(rc))
1762
0
            return rc;
1763
0
          break;
1764
1765
0
        case PDU_TYPE_DEACTIVATE_ALL:
1766
0
          if (!rdp_recv_deactivate_all(rdp, sub))
1767
0
          {
1768
0
            WLog_Print(rdp->log, WLOG_ERROR,
1769
0
                       "rdp_recv_tpkt_pdu: rdp_recv_deactivate_all() fail");
1770
0
            return STATE_RUN_FAILED;
1771
0
          }
1772
1773
0
          break;
1774
1775
0
        case PDU_TYPE_SERVER_REDIRECTION:
1776
0
          return rdp_recv_enhanced_security_redirection_packet(rdp, sub);
1777
1778
0
        case PDU_TYPE_FLOW_RESPONSE:
1779
0
        case PDU_TYPE_FLOW_STOP:
1780
0
        case PDU_TYPE_FLOW_TEST:
1781
0
          WLog_Print(rdp->log, WLOG_DEBUG, "flow message 0x%04" PRIX16 "", pduType);
1782
          /* http://msdn.microsoft.com/en-us/library/cc240576.aspx */
1783
0
          if (!Stream_SafeSeek(sub, remain))
1784
0
            return STATE_RUN_FAILED;
1785
0
          break;
1786
1787
0
        default:
1788
0
        {
1789
0
          char buffer[256] = WINPR_C_ARRAY_INIT;
1790
0
          WLog_Print(rdp->log, WLOG_ERROR, "incorrect PDU type: %s",
1791
0
                     pdu_type_to_str(pduType, buffer, sizeof(buffer)));
1792
0
        }
1793
0
        break;
1794
0
      }
1795
1796
0
      diff = Stream_GetRemainingLength(sub);
1797
0
      if (diff > 0)
1798
0
      {
1799
0
        char buffer[256] = WINPR_C_ARRAY_INIT;
1800
0
        WLog_Print(rdp->log, WLOG_WARN,
1801
0
                   "pduType %s not properly parsed, %" PRIuz
1802
0
                   " bytes remaining unhandled. Skipping.",
1803
0
                   pdu_type_to_str(pduType, buffer, sizeof(buffer)), diff);
1804
0
      }
1805
0
    }
1806
0
  }
1807
0
  else
1808
0
  {
1809
0
    rdp->inPackets++;
1810
1811
0
    if (!freerdp_channel_process(instance, s, channelId, length))
1812
0
      return STATE_RUN_FAILED;
1813
0
  }
1814
1815
0
out:
1816
0
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
1817
0
    return STATE_RUN_FAILED;
1818
0
  return rc;
1819
0
}
1820
1821
static state_run_t rdp_recv_fastpath_pdu(rdpRdp* rdp, wStream* s)
1822
0
{
1823
0
  UINT16 length = 0;
1824
1825
0
  WINPR_ASSERT(rdp);
1826
0
  rdpFastPath* fastpath = rdp->fastpath;
1827
1828
0
  if (!fastpath_read_header_rdp(fastpath, s, &length))
1829
0
  {
1830
0
    WLog_Print(rdp->log, WLOG_ERROR, "rdp_recv_fastpath_pdu: fastpath_read_header_rdp() fail");
1831
0
    return STATE_RUN_FAILED;
1832
0
  }
1833
1834
0
  if ((length == 0) || (!Stream_CheckAndLogRequiredLengthWLog(rdp->log, s, length)))
1835
0
  {
1836
0
    WLog_Print(rdp->log, WLOG_ERROR, "incorrect FastPath PDU header length %" PRIu16 "",
1837
0
               length);
1838
0
    return STATE_RUN_FAILED;
1839
0
  }
1840
1841
0
  if (rdp->autodetect->bandwidthMeasureStarted)
1842
0
  {
1843
0
    rdp->autodetect->bandwidthMeasureByteCount += length;
1844
0
  }
1845
1846
0
  if (!fastpath_decrypt(fastpath, s, &length))
1847
0
    return STATE_RUN_FAILED;
1848
1849
0
  return fastpath_recv_updates(rdp->fastpath, s);
1850
0
}
1851
1852
static state_run_t rdp_recv_pdu(rdpRdp* rdp, wStream* s)
1853
0
{
1854
0
  const int rc = tpkt_verify_header(s);
1855
0
  if (rc > 0)
1856
0
    return rdp_recv_tpkt_pdu(rdp, s);
1857
0
  else if (rc == 0)
1858
0
    return rdp_recv_fastpath_pdu(rdp, s);
1859
0
  else
1860
0
    return STATE_RUN_FAILED;
1861
0
}
1862
1863
static state_run_t rdp_handle_sc_flags(rdpRdp* rdp, wStream* s, UINT32 flag,
1864
                                       CONNECTION_STATE nextState)
1865
0
{
1866
0
  const UINT32 mask = FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
1867
0
                      FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU;
1868
0
  WINPR_ASSERT(rdp);
1869
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1870
0
  if (state_run_success(status))
1871
0
  {
1872
0
    const UINT32 flags = rdp->finalize_sc_pdus & mask;
1873
0
    if ((flags & flag) == flag)
1874
0
    {
1875
0
      if (!rdp_client_transition_to_state(rdp, nextState))
1876
0
        status = STATE_RUN_FAILED;
1877
0
      else
1878
0
        status = STATE_RUN_SUCCESS;
1879
0
    }
1880
0
    else
1881
0
    {
1882
0
      char flag_buffer[256] = WINPR_C_ARRAY_INIT;
1883
0
      char mask_buffer[256] = WINPR_C_ARRAY_INIT;
1884
0
      WLog_Print(rdp->log, WLOG_WARN,
1885
0
                 "[%s] unexpected server message, expected flag %s [have %s]",
1886
0
                 rdp_get_state_string(rdp),
1887
0
                 rdp_finalize_flags_to_str(flag, flag_buffer, sizeof(flag_buffer)),
1888
0
                 rdp_finalize_flags_to_str(flags, mask_buffer, sizeof(mask_buffer)));
1889
0
    }
1890
0
  }
1891
0
  return status;
1892
0
}
1893
1894
static state_run_t rdp_client_exchange_monitor_layout(rdpRdp* rdp, wStream* s)
1895
0
{
1896
0
  WINPR_ASSERT(rdp);
1897
1898
0
  if (!rdp_check_monitor_layout_pdu_state(rdp, FALSE))
1899
0
    return STATE_RUN_FAILED;
1900
1901
  /* We might receive unrelated messages from the server (channel traffic),
1902
   * so only proceed if some flag changed
1903
   */
1904
0
  const UINT32 old = rdp->finalize_sc_pdus;
1905
0
  state_run_t status = rdp_recv_pdu(rdp, s);
1906
0
  const UINT32 now = rdp->finalize_sc_pdus;
1907
0
  const BOOL changed = (old != now) || rdp->monitor_layout_pdu;
1908
1909
  /* This PDU is optional, so if we received a finalize PDU continue there */
1910
0
  if (state_run_success(status) && changed)
1911
0
  {
1912
0
    if (!rdp->monitor_layout_pdu)
1913
0
    {
1914
0
      if (!rdp_finalize_is_flag_set(rdp, FINALIZE_SC_SYNCHRONIZE_PDU))
1915
0
        return STATE_RUN_FAILED;
1916
0
    }
1917
1918
0
    status = rdp_client_connect_finalize(rdp);
1919
0
    if (state_run_success(status) && !rdp->monitor_layout_pdu)
1920
0
      status = STATE_RUN_TRY_AGAIN;
1921
0
  }
1922
0
  return status;
1923
0
}
1924
1925
static state_run_t rdp_recv_callback_int(WINPR_ATTR_UNUSED rdpTransport* transport, wStream* s,
1926
                                         void* extra)
1927
9.21k
{
1928
9.21k
  state_run_t status = STATE_RUN_SUCCESS;
1929
9.21k
  rdpRdp* rdp = (rdpRdp*)extra;
1930
1931
9.21k
  WINPR_ASSERT(transport);
1932
9.21k
  WINPR_ASSERT(rdp);
1933
9.21k
  WINPR_ASSERT(s);
1934
1935
9.21k
  switch (rdp_get_state(rdp))
1936
9.21k
  {
1937
0
    case CONNECTION_STATE_NEGO:
1938
0
      if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
1939
0
        status = STATE_RUN_FAILED;
1940
0
      else
1941
0
        status = STATE_RUN_CONTINUE;
1942
0
      break;
1943
0
    case CONNECTION_STATE_NLA:
1944
0
      if (nla_get_state(rdp->nla) < NLA_STATE_AUTH_INFO)
1945
0
      {
1946
0
        if (nla_recv_pdu(rdp->nla, s) < 1)
1947
0
        {
1948
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nla_recv_pdu() fail",
1949
0
                     rdp_get_state_string(rdp));
1950
0
          status = STATE_RUN_FAILED;
1951
0
        }
1952
0
      }
1953
0
      else if (nla_get_state(rdp->nla) == NLA_STATE_POST_NEGO)
1954
0
      {
1955
0
        if (nego_recv(rdp->transport, s, (void*)rdp->nego) < 0)
1956
0
          return STATE_RUN_FAILED;
1957
1958
0
        if (!nego_update_settings_from_state(rdp->nego, rdp->settings))
1959
0
          return STATE_RUN_FAILED;
1960
1961
0
        if (nego_get_state(rdp->nego) != NEGO_STATE_FINAL)
1962
0
        {
1963
0
          WLog_Print(rdp->log, WLOG_ERROR, "%s - nego_recv() fail",
1964
0
                     rdp_get_state_string(rdp));
1965
0
          status = STATE_RUN_FAILED;
1966
0
        }
1967
0
        else if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1968
0
          status = STATE_RUN_FAILED;
1969
0
      }
1970
1971
0
      if (state_run_success(status))
1972
0
      {
1973
0
        if (nla_get_state(rdp->nla) == NLA_STATE_AUTH_INFO)
1974
0
        {
1975
0
          transport_set_nla_mode(rdp->transport, FALSE);
1976
1977
0
          if (rdp->settings->VmConnectMode)
1978
0
          {
1979
0
            if (!nego_set_state(rdp->nego, NEGO_STATE_NLA))
1980
0
              status = STATE_RUN_FAILED;
1981
0
            else if (!nego_set_requested_protocols(rdp->nego,
1982
0
                                                   PROTOCOL_HYBRID | PROTOCOL_SSL))
1983
0
              status = STATE_RUN_FAILED;
1984
0
            else if (!nego_send_negotiation_request(rdp->nego))
1985
0
              status = STATE_RUN_FAILED;
1986
0
            else if (!nla_set_state(rdp->nla, NLA_STATE_POST_NEGO))
1987
0
              status = STATE_RUN_FAILED;
1988
0
          }
1989
0
          else
1990
0
          {
1991
0
            if (!nla_set_state(rdp->nla, NLA_STATE_FINAL))
1992
0
              status = STATE_RUN_FAILED;
1993
0
          }
1994
0
        }
1995
0
      }
1996
0
      if (state_run_success(status))
1997
0
      {
1998
1999
0
        if (nla_get_state(rdp->nla) == NLA_STATE_FINAL)
2000
0
        {
2001
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
2002
0
            status = STATE_RUN_FAILED;
2003
0
          else
2004
0
            status = STATE_RUN_CONTINUE;
2005
0
        }
2006
0
      }
2007
0
      break;
2008
2009
0
    case CONNECTION_STATE_AAD:
2010
0
      if (aad_recv(rdp->aad, s) < 1)
2011
0
      {
2012
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - aad_recv() fail", rdp_get_state_string(rdp));
2013
0
        status = STATE_RUN_FAILED;
2014
0
      }
2015
0
      if (state_run_success(status))
2016
0
      {
2017
0
        if (aad_get_state(rdp->aad) == AAD_STATE_FINAL)
2018
0
        {
2019
0
          transport_set_aad_mode(rdp->transport, FALSE);
2020
0
          if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
2021
0
            status = STATE_RUN_FAILED;
2022
0
          else
2023
0
            status = STATE_RUN_CONTINUE;
2024
0
        }
2025
0
      }
2026
0
      break;
2027
2028
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
2029
0
      if (!mcs_client_begin(rdp->mcs))
2030
0
      {
2031
0
        WLog_Print(rdp->log, WLOG_ERROR, "%s - mcs_client_begin() fail",
2032
0
                   rdp_get_state_string(rdp));
2033
0
        status = STATE_RUN_FAILED;
2034
0
      }
2035
0
      else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_RESPONSE))
2036
0
        status = STATE_RUN_FAILED;
2037
0
      else if (Stream_GetRemainingLength(s) > 0)
2038
0
        status = STATE_RUN_CONTINUE;
2039
0
      break;
2040
2041
0
    case CONNECTION_STATE_MCS_CREATE_RESPONSE:
2042
0
      if (!mcs_recv_connect_response(rdp->mcs, s))
2043
0
      {
2044
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_connect_response failure");
2045
0
        status = STATE_RUN_FAILED;
2046
0
      }
2047
0
      else
2048
0
      {
2049
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ERECT_DOMAIN))
2050
0
          status = STATE_RUN_FAILED;
2051
0
        else if (!mcs_send_erect_domain_request(rdp->mcs))
2052
0
        {
2053
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_erect_domain_request failure");
2054
0
          status = STATE_RUN_FAILED;
2055
0
        }
2056
0
        else if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_ATTACH_USER))
2057
0
          status = STATE_RUN_FAILED;
2058
0
        else if (!mcs_send_attach_user_request(rdp->mcs))
2059
0
        {
2060
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_attach_user_request failure");
2061
0
          status = STATE_RUN_FAILED;
2062
0
        }
2063
0
        else if (!rdp_client_transition_to_state(rdp,
2064
0
                                                 CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM))
2065
0
          status = STATE_RUN_FAILED;
2066
0
      }
2067
0
      break;
2068
2069
0
    case CONNECTION_STATE_MCS_ATTACH_USER_CONFIRM:
2070
0
      if (!mcs_recv_attach_user_confirm(rdp->mcs, s))
2071
0
      {
2072
0
        WLog_Print(rdp->log, WLOG_ERROR, "mcs_recv_attach_user_confirm failure");
2073
0
        status = STATE_RUN_FAILED;
2074
0
      }
2075
0
      else if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_SupportSkipChannelJoin))
2076
0
      {
2077
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST))
2078
0
          status = STATE_RUN_FAILED;
2079
0
        else if (!mcs_send_channel_join_request(rdp->mcs, rdp->mcs->userId))
2080
0
        {
2081
0
          WLog_Print(rdp->log, WLOG_ERROR, "mcs_send_channel_join_request failure");
2082
0
          status = STATE_RUN_FAILED;
2083
0
        }
2084
0
        else if (!rdp_client_transition_to_state(
2085
0
                     rdp, CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE))
2086
0
          status = STATE_RUN_FAILED;
2087
0
      }
2088
0
      else
2089
0
      {
2090
        /* SKIP_CHANNELJOIN is active, consider channels to be joined */
2091
0
        if (!rdp_client_skip_mcs_channel_join(rdp))
2092
0
          status = STATE_RUN_FAILED;
2093
0
      }
2094
0
      break;
2095
2096
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_RESPONSE:
2097
0
      if (!rdp_client_connect_mcs_channel_join_confirm(rdp, s))
2098
0
      {
2099
0
        WLog_Print(rdp->log, WLOG_ERROR,
2100
0
                   "%s - "
2101
0
                   "rdp_client_connect_mcs_channel_join_confirm() fail",
2102
0
                   rdp_get_state_string(rdp));
2103
0
        status = STATE_RUN_FAILED;
2104
0
      }
2105
2106
0
      break;
2107
2108
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
2109
0
      if (!rdp_client_connect_auto_detect(rdp, s, WLOG_DEBUG))
2110
0
      {
2111
0
        if (!rdp_client_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
2112
0
          status = STATE_RUN_FAILED;
2113
0
        else
2114
0
          status = STATE_RUN_TRY_AGAIN;
2115
0
      }
2116
0
      break;
2117
2118
0
    case CONNECTION_STATE_LICENSING:
2119
0
      status = rdp_client_connect_license(rdp, s);
2120
2121
0
      if (state_run_failed(status))
2122
0
      {
2123
0
        char buffer[64] = WINPR_C_ARRAY_INIT;
2124
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_client_connect_license() - %s",
2125
0
                   rdp_get_state_string(rdp),
2126
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2127
0
      }
2128
2129
0
      break;
2130
2131
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
2132
0
      if (!rdp_client_connect_auto_detect(rdp, s, WLOG_DEBUG))
2133
0
      {
2134
0
        if (!rdp_client_transition_to_state(
2135
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
2136
0
          status = STATE_RUN_FAILED;
2137
0
        else
2138
0
          status = STATE_RUN_TRY_AGAIN;
2139
0
      }
2140
0
      break;
2141
2142
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
2143
0
      status = rdp_client_connect_demand_active(rdp, s);
2144
2145
0
      if (state_run_failed(status))
2146
0
      {
2147
0
        char buffer[64] = WINPR_C_ARRAY_INIT;
2148
0
        WLog_Print(rdp->log, WLOG_DEBUG,
2149
0
                   "%s - "
2150
0
                   "rdp_client_connect_demand_active() - %s",
2151
0
                   rdp_get_state_string(rdp),
2152
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2153
0
      }
2154
0
      else if (status == STATE_RUN_ACTIVE)
2155
0
      {
2156
0
        if (!rdp_client_transition_to_state(
2157
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
2158
0
          status = STATE_RUN_FAILED;
2159
0
        else
2160
0
          status = STATE_RUN_CONTINUE;
2161
0
      }
2162
0
      break;
2163
2164
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
2165
0
      status = rdp_client_exchange_monitor_layout(rdp, s);
2166
0
      break;
2167
2168
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
2169
0
      status = rdp_client_connect_confirm_active(rdp, s);
2170
0
      break;
2171
2172
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
2173
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_SYNCHRONIZE_PDU,
2174
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE);
2175
0
      break;
2176
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
2177
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_COOPERATE_PDU,
2178
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL);
2179
0
      break;
2180
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
2181
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_CONTROL_GRANTED_PDU,
2182
0
                                   CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP);
2183
0
      break;
2184
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
2185
0
      status = rdp_handle_sc_flags(rdp, s, FINALIZE_SC_FONT_MAP_PDU, CONNECTION_STATE_ACTIVE);
2186
0
      break;
2187
2188
0
    case CONNECTION_STATE_ACTIVE:
2189
0
      status = rdp_recv_pdu(rdp, s);
2190
2191
0
      if (state_run_failed(status))
2192
0
      {
2193
0
        char buffer[64] = WINPR_C_ARRAY_INIT;
2194
0
        WLog_Print(rdp->log, WLOG_DEBUG, "%s - rdp_recv_pdu() - %s",
2195
0
                   rdp_get_state_string(rdp),
2196
0
                   state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2197
0
      }
2198
0
      break;
2199
2200
9.21k
    default:
2201
9.21k
      WLog_Print(rdp->log, WLOG_ERROR, "%s state %u", rdp_get_state_string(rdp),
2202
9.21k
                 rdp_get_state(rdp));
2203
9.21k
      status = STATE_RUN_FAILED;
2204
9.21k
      break;
2205
9.21k
  }
2206
2207
9.21k
  if (state_run_failed(status))
2208
9.21k
  {
2209
9.21k
    char buffer[64] = WINPR_C_ARRAY_INIT;
2210
9.21k
    WLog_Print(rdp->log, WLOG_ERROR, "%s status %s", rdp_get_state_string(rdp),
2211
9.21k
               state_run_result_string(status, buffer, ARRAYSIZE(buffer)));
2212
9.21k
  }
2213
9.21k
  return status;
2214
9.21k
}
2215
2216
state_run_t rdp_recv_callback(rdpTransport* transport, wStream* s, void* extra)
2217
9.21k
{
2218
9.21k
  char buffer[64] = WINPR_C_ARRAY_INIT;
2219
9.21k
  state_run_t rc = STATE_RUN_FAILED;
2220
9.21k
  const size_t start = Stream_GetPosition(s);
2221
9.21k
  const rdpContext* context = transport_get_context(transport);
2222
2223
9.21k
  WINPR_ASSERT(context);
2224
9.21k
  do
2225
9.21k
  {
2226
9.21k
    const rdpRdp* rdp = context->rdp;
2227
9.21k
    WINPR_ASSERT(rdp);
2228
2229
9.21k
    if (rc == STATE_RUN_TRY_AGAIN)
2230
0
    {
2231
0
      if (!Stream_SetPosition(s, start))
2232
0
        return STATE_RUN_FAILED;
2233
0
    }
2234
2235
9.21k
    const char* old = rdp_get_state_string(rdp);
2236
9.21k
    const size_t orem = Stream_GetRemainingLength(s);
2237
9.21k
    rc = rdp_recv_callback_int(transport, s, extra);
2238
2239
9.21k
    const char* now = rdp_get_state_string(rdp);
2240
9.21k
    const size_t rem = Stream_GetRemainingLength(s);
2241
2242
9.21k
    WLog_Print(rdp->log, WLOG_TRACE,
2243
9.21k
               "(client)[%s -> %s] current return %s [feeding %" PRIuz " bytes, %" PRIuz
2244
9.21k
               " bytes not processed]",
2245
9.21k
               old, now, state_run_result_string(rc, buffer, sizeof(buffer)), orem, rem);
2246
9.21k
  } while ((rc == STATE_RUN_TRY_AGAIN) || (rc == STATE_RUN_CONTINUE));
2247
9.21k
  return rc;
2248
9.21k
}
2249
2250
BOOL rdp_send_channel_data(rdpRdp* rdp, UINT16 channelId, const BYTE* data, size_t size)
2251
0
{
2252
0
  return freerdp_channel_send(rdp, channelId, data, size);
2253
0
}
2254
2255
BOOL rdp_channel_send_packet(rdpRdp* rdp, UINT16 channelId, size_t totalSize, UINT32 flags,
2256
                             const BYTE* data, size_t chunkSize)
2257
0
{
2258
0
  return freerdp_channel_send_packet(rdp, channelId, totalSize, flags, data, chunkSize);
2259
0
}
2260
2261
BOOL rdp_send_error_info(rdpRdp* rdp)
2262
0
{
2263
0
  UINT16 sec_flags = 0;
2264
0
  wStream* s = nullptr;
2265
0
  BOOL status = 0;
2266
2267
0
  if (rdp->errorInfo == ERRINFO_SUCCESS)
2268
0
    return TRUE;
2269
2270
0
  s = rdp_data_pdu_init(rdp, &sec_flags);
2271
2272
0
  if (!s)
2273
0
    return FALSE;
2274
2275
0
  Stream_Write_UINT32(s, rdp->errorInfo); /* error id (4 bytes) */
2276
0
  status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SET_ERROR_INFO, 0, sec_flags);
2277
0
  return status;
2278
0
}
2279
2280
int rdp_check_fds(rdpRdp* rdp)
2281
0
{
2282
0
  int status = 0;
2283
0
  rdpTsg* tsg = nullptr;
2284
0
  rdpTransport* transport = nullptr;
2285
2286
0
  WINPR_ASSERT(rdp);
2287
0
  transport = rdp->transport;
2288
2289
0
  tsg = transport_get_tsg(transport);
2290
0
  if (tsg)
2291
0
  {
2292
0
    if (!tsg_check_event_handles(tsg))
2293
0
    {
2294
0
      WLog_Print(rdp->log, WLOG_ERROR, "rdp_check_fds: tsg_check_event_handles()");
2295
0
      return -1;
2296
0
    }
2297
2298
0
    if (tsg_get_state(tsg) != TSG_STATE_PIPE_CREATED)
2299
0
      return 1;
2300
0
  }
2301
2302
0
  status = transport_check_fds(transport);
2303
2304
0
  if (status == 1)
2305
0
  {
2306
0
    if (!rdp_client_redirect(rdp)) /* session redirection */
2307
0
      return -1;
2308
0
  }
2309
2310
0
  if (status < 0)
2311
0
    WLog_Print(rdp->log, WLOG_DEBUG, "transport_check_fds() - %i", status);
2312
0
  else
2313
0
    status = freerdp_timer_poll(rdp->timer);
2314
2315
0
  return status;
2316
0
}
2317
2318
BOOL freerdp_get_stats(const rdpRdp* rdp, UINT64* inBytes, UINT64* outBytes, UINT64* inPackets,
2319
                       UINT64* outPackets)
2320
0
{
2321
0
  if (!rdp)
2322
0
    return FALSE;
2323
2324
0
  if (inBytes)
2325
0
    *inBytes = rdp->inBytes;
2326
0
  if (outBytes)
2327
0
    *outBytes = rdp->outBytes;
2328
0
  if (inPackets)
2329
0
    *inPackets = rdp->inPackets;
2330
0
  if (outPackets)
2331
0
    *outPackets = rdp->outPackets;
2332
2333
0
  return TRUE;
2334
0
}
2335
2336
static bool rdp_new_common(rdpRdp* rdp)
2337
17.7k
{
2338
17.7k
  WINPR_ASSERT(rdp);
2339
2340
17.7k
  bool rc = false;
2341
17.7k
  rdp->transport = transport_new(rdp->context);
2342
17.7k
  if (!rdp->transport)
2343
0
    goto fail;
2344
2345
17.7k
  if (rdp->io)
2346
0
  {
2347
0
    if (!transport_set_io_callbacks(rdp->transport, rdp->io))
2348
0
      goto fail;
2349
0
  }
2350
2351
17.7k
  rdp->aad = aad_new(rdp->context);
2352
17.7k
  if (!rdp->aad)
2353
0
    goto fail;
2354
2355
17.7k
  rdp->nego = nego_new(rdp->transport);
2356
17.7k
  if (!rdp->nego)
2357
0
    goto fail;
2358
2359
17.7k
  rdp->mcs = mcs_new(rdp->context);
2360
17.7k
  if (!rdp->mcs)
2361
0
    goto fail;
2362
2363
17.7k
  rdp->license = license_new(rdp);
2364
17.7k
  if (!rdp->license)
2365
0
    goto fail;
2366
2367
17.7k
  rdp->fastpath = fastpath_new(rdp);
2368
17.7k
  if (!rdp->fastpath)
2369
0
    goto fail;
2370
2371
17.7k
  rc = true;
2372
17.7k
fail:
2373
17.7k
  return rc;
2374
17.7k
}
2375
2376
/**
2377
 * Instantiate new RDP module.
2378
 * @return new RDP module
2379
 */
2380
2381
rdpRdp* rdp_new(rdpContext* context)
2382
17.7k
{
2383
17.7k
  DWORD flags = 0;
2384
17.7k
  rdpRdp* rdp = (rdpRdp*)calloc(1, sizeof(rdpRdp));
2385
2386
17.7k
  if (!rdp)
2387
0
    return nullptr;
2388
2389
17.7k
  rdp->log = WLog_Get(RDP_TAG);
2390
17.7k
  WINPR_ASSERT(rdp->log);
2391
2392
17.7k
  (void)_snprintf(rdp->log_context, sizeof(rdp->log_context), "%p", (void*)context);
2393
17.7k
  WLog_SetContext(rdp->log, nullptr, rdp->log_context);
2394
2395
17.7k
  InitializeCriticalSection(&rdp->critical);
2396
17.7k
  rdp->context = context;
2397
17.7k
  WINPR_ASSERT(rdp->context);
2398
2399
17.7k
  if (context->ServerMode)
2400
8.54k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2401
2402
17.7k
  if (!context->settings)
2403
17.7k
  {
2404
17.7k
    context->settings = rdp->settings = freerdp_settings_new(flags);
2405
2406
17.7k
    if (!rdp->settings)
2407
0
      goto fail;
2408
17.7k
  }
2409
0
  else
2410
0
    rdp->settings = context->settings;
2411
2412
  /* Keep a backup copy of settings for later comparisons */
2413
17.7k
  if (!rdp_set_backup_settings(rdp))
2414
0
    goto fail;
2415
2416
17.7k
  rdp->settings->instance = context->instance;
2417
2418
17.7k
  context->settings = rdp->settings;
2419
17.7k
  if (context->instance)
2420
9.21k
    context->settings->instance = context->instance;
2421
8.54k
  else if (context->peer)
2422
8.54k
  {
2423
8.54k
    rdp->settings->instance = context->peer;
2424
2425
#if defined(WITH_FREERDP_DEPRECATED)
2426
    context->peer->settings = rdp->settings;
2427
#endif
2428
8.54k
  }
2429
2430
17.7k
  if (!rdp_new_common(rdp))
2431
0
    goto fail;
2432
2433
17.7k
  {
2434
17.7k
    const rdpTransportIo* io = transport_get_io_callbacks(rdp->transport);
2435
17.7k
    if (!io)
2436
0
      goto fail;
2437
17.7k
    rdp->io = calloc(1, sizeof(rdpTransportIo));
2438
17.7k
    if (!rdp->io)
2439
0
      goto fail;
2440
17.7k
    *rdp->io = *io;
2441
17.7k
  }
2442
2443
0
  rdp->input = input_new(rdp);
2444
2445
17.7k
  if (!rdp->input)
2446
0
    goto fail;
2447
2448
17.7k
  rdp->update = update_new(rdp);
2449
2450
17.7k
  if (!rdp->update)
2451
0
    goto fail;
2452
2453
17.7k
  rdp->redirection = redirection_new();
2454
2455
17.7k
  if (!rdp->redirection)
2456
0
    goto fail;
2457
2458
17.7k
  rdp->autodetect = autodetect_new(rdp->context);
2459
2460
17.7k
  if (!rdp->autodetect)
2461
0
    goto fail;
2462
2463
17.7k
  rdp->heartbeat = heartbeat_new();
2464
2465
17.7k
  if (!rdp->heartbeat)
2466
0
    goto fail;
2467
2468
17.7k
  rdp->multitransport = multitransport_new(rdp, INITIATE_REQUEST_PROTOCOL_UDPFECL |
2469
17.7k
                                                    INITIATE_REQUEST_PROTOCOL_UDPFECR);
2470
2471
17.7k
  if (!rdp->multitransport)
2472
0
    goto fail;
2473
2474
17.7k
  rdp->bulk = bulk_new(context);
2475
2476
17.7k
  if (!rdp->bulk)
2477
0
    goto fail;
2478
2479
17.7k
  rdp->pubSub = PubSub_New(TRUE);
2480
17.7k
  if (!rdp->pubSub)
2481
0
    goto fail;
2482
2483
17.7k
  rdp->abortEvent = CreateEvent(nullptr, TRUE, FALSE, nullptr);
2484
17.7k
  if (!rdp->abortEvent)
2485
0
    goto fail;
2486
2487
17.7k
  rdp->timer = freerdp_timer_new(rdp);
2488
17.7k
  if (!rdp->timer)
2489
0
    goto fail;
2490
2491
17.7k
  return rdp;
2492
2493
0
fail:
2494
0
  WINPR_PRAGMA_DIAG_PUSH
2495
0
  WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
2496
0
  rdp_free(rdp);
2497
0
  WINPR_PRAGMA_DIAG_POP
2498
0
  return nullptr;
2499
17.7k
}
2500
2501
static void rdp_reset_free(rdpRdp* rdp)
2502
17.7k
{
2503
17.7k
  WINPR_ASSERT(rdp);
2504
2505
17.7k
  security_lock(rdp);
2506
17.7k
  rdp_free_rc4_decrypt_keys(rdp);
2507
17.7k
  rdp_free_rc4_encrypt_keys(rdp);
2508
2509
17.7k
  winpr_Cipher_Free(rdp->fips_encrypt);
2510
17.7k
  winpr_Cipher_Free(rdp->fips_decrypt);
2511
17.7k
  rdp->fips_encrypt = nullptr;
2512
17.7k
  rdp->fips_decrypt = nullptr;
2513
17.7k
  security_unlock(rdp);
2514
2515
17.7k
  aad_free(rdp->aad);
2516
17.7k
  mcs_free(rdp->mcs);
2517
17.7k
  nego_free(rdp->nego);
2518
17.7k
  license_free(rdp->license);
2519
17.7k
  transport_free(rdp->transport);
2520
17.7k
  fastpath_free(rdp->fastpath);
2521
2522
17.7k
  rdp->aad = nullptr;
2523
17.7k
  rdp->mcs = nullptr;
2524
17.7k
  rdp->nego = nullptr;
2525
17.7k
  rdp->license = nullptr;
2526
17.7k
  rdp->transport = nullptr;
2527
17.7k
  rdp->fastpath = nullptr;
2528
17.7k
}
2529
2530
BOOL rdp_reset(rdpRdp* rdp)
2531
0
{
2532
0
  BOOL rc = TRUE;
2533
2534
0
  WINPR_ASSERT(rdp);
2535
2536
0
  rdpSettings* settings = rdp->settings;
2537
0
  WINPR_ASSERT(settings);
2538
2539
0
  bulk_reset(rdp->bulk);
2540
2541
0
  rdp_reset_free(rdp);
2542
2543
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerRandom, nullptr, 0))
2544
0
    rc = FALSE;
2545
2546
0
  if (!freerdp_settings_set_pointer_len(settings, FreeRDP_ServerCertificate, nullptr, 0))
2547
0
    rc = FALSE;
2548
2549
0
  if (!freerdp_settings_set_string(settings, FreeRDP_ClientAddress, nullptr))
2550
0
    rc = FALSE;
2551
2552
0
  if (!rc)
2553
0
    goto fail;
2554
2555
0
  rc = rdp_new_common(rdp);
2556
0
  if (!rc)
2557
0
    goto fail;
2558
2559
0
  if (!transport_set_layer(rdp->transport, TRANSPORT_LAYER_TCP))
2560
0
    goto fail;
2561
2562
0
  rdp->errorInfo = 0;
2563
0
  rc = rdp_finalize_reset_flags(rdp, TRUE);
2564
2565
0
fail:
2566
0
  return rc;
2567
0
}
2568
2569
/**
2570
 * Free RDP module.
2571
 * @param rdp RDP module to be freed
2572
 */
2573
2574
void rdp_free(rdpRdp* rdp)
2575
17.7k
{
2576
17.7k
  if (rdp)
2577
17.7k
  {
2578
17.7k
    freerdp_timer_free(rdp->timer);
2579
17.7k
    rdp_reset_free(rdp);
2580
2581
17.7k
    freerdp_settings_free(rdp->settings);
2582
17.7k
    freerdp_settings_free(rdp->originalSettings);
2583
17.7k
    freerdp_settings_free(rdp->remoteSettings);
2584
2585
17.7k
    input_free(rdp->input);
2586
17.7k
    update_free(rdp->update);
2587
17.7k
    nla_free(rdp->nla);
2588
17.7k
    redirection_free(rdp->redirection);
2589
17.7k
    autodetect_free(rdp->autodetect);
2590
17.7k
    heartbeat_free(rdp->heartbeat);
2591
17.7k
    multitransport_free(rdp->multitransport);
2592
17.7k
    bulk_free(rdp->bulk);
2593
17.7k
    free(rdp->io);
2594
17.7k
    PubSub_Free(rdp->pubSub);
2595
17.7k
    if (rdp->abortEvent)
2596
17.7k
      (void)CloseHandle(rdp->abortEvent);
2597
17.7k
    aad_free(rdp->aad);
2598
17.7k
    WINPR_JSON_Delete(rdp->wellknown);
2599
17.7k
    DeleteCriticalSection(&rdp->critical);
2600
17.7k
    free(rdp);
2601
17.7k
  }
2602
17.7k
}
2603
2604
BOOL rdp_io_callback_set_event(rdpRdp* rdp, BOOL set)
2605
0
{
2606
0
  if (!rdp)
2607
0
    return FALSE;
2608
0
  return transport_io_callback_set_event(rdp->transport, set);
2609
0
}
2610
2611
const rdpTransportIo* rdp_get_io_callbacks(rdpRdp* rdp)
2612
0
{
2613
0
  if (!rdp)
2614
0
    return nullptr;
2615
0
  return rdp->io;
2616
0
}
2617
2618
BOOL rdp_set_io_callbacks(rdpRdp* rdp, const rdpTransportIo* io_callbacks)
2619
0
{
2620
0
  if (!rdp)
2621
0
    return FALSE;
2622
0
  free(rdp->io);
2623
0
  rdp->io = nullptr;
2624
0
  if (io_callbacks)
2625
0
  {
2626
0
    rdp->io = malloc(sizeof(rdpTransportIo));
2627
0
    if (!rdp->io)
2628
0
      return FALSE;
2629
0
    *rdp->io = *io_callbacks;
2630
0
    return transport_set_io_callbacks(rdp->transport, rdp->io);
2631
0
  }
2632
0
  return TRUE;
2633
0
}
2634
2635
BOOL rdp_set_io_callback_context(rdpRdp* rdp, void* usercontext)
2636
0
{
2637
0
  WINPR_ASSERT(rdp);
2638
0
  rdp->ioContext = usercontext;
2639
0
  return TRUE;
2640
0
}
2641
2642
void* rdp_get_io_callback_context(rdpRdp* rdp)
2643
0
{
2644
0
  WINPR_ASSERT(rdp);
2645
0
  return rdp->ioContext;
2646
0
}
2647
2648
const char* rdp_finalize_flags_to_str(UINT32 flags, char* buffer, size_t size)
2649
0
{
2650
0
  char number[32] = WINPR_C_ARRAY_INIT;
2651
0
  const UINT32 mask =
2652
0
      (uint32_t)~(FINALIZE_SC_SYNCHRONIZE_PDU | FINALIZE_SC_CONTROL_COOPERATE_PDU |
2653
0
                  FINALIZE_SC_CONTROL_GRANTED_PDU | FINALIZE_SC_FONT_MAP_PDU |
2654
0
                  FINALIZE_CS_SYNCHRONIZE_PDU | FINALIZE_CS_CONTROL_COOPERATE_PDU |
2655
0
                  FINALIZE_CS_CONTROL_REQUEST_PDU | FINALIZE_CS_PERSISTENT_KEY_LIST_PDU |
2656
0
                  FINALIZE_CS_FONT_LIST_PDU | FINALIZE_DEACTIVATE_REACTIVATE);
2657
2658
0
  if (flags & FINALIZE_SC_SYNCHRONIZE_PDU)
2659
0
    winpr_str_append("FINALIZE_SC_SYNCHRONIZE_PDU", buffer, size, "|");
2660
0
  if (flags & FINALIZE_SC_CONTROL_COOPERATE_PDU)
2661
0
    winpr_str_append("FINALIZE_SC_CONTROL_COOPERATE_PDU", buffer, size, "|");
2662
0
  if (flags & FINALIZE_SC_CONTROL_GRANTED_PDU)
2663
0
    winpr_str_append("FINALIZE_SC_CONTROL_GRANTED_PDU", buffer, size, "|");
2664
0
  if (flags & FINALIZE_SC_FONT_MAP_PDU)
2665
0
    winpr_str_append("FINALIZE_SC_FONT_MAP_PDU", buffer, size, "|");
2666
0
  if (flags & FINALIZE_CS_SYNCHRONIZE_PDU)
2667
0
    winpr_str_append("FINALIZE_CS_SYNCHRONIZE_PDU", buffer, size, "|");
2668
0
  if (flags & FINALIZE_CS_CONTROL_COOPERATE_PDU)
2669
0
    winpr_str_append("FINALIZE_CS_CONTROL_COOPERATE_PDU", buffer, size, "|");
2670
0
  if (flags & FINALIZE_CS_CONTROL_REQUEST_PDU)
2671
0
    winpr_str_append("FINALIZE_CS_CONTROL_REQUEST_PDU", buffer, size, "|");
2672
0
  if (flags & FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)
2673
0
    winpr_str_append("FINALIZE_CS_PERSISTENT_KEY_LIST_PDU", buffer, size, "|");
2674
0
  if (flags & FINALIZE_CS_FONT_LIST_PDU)
2675
0
    winpr_str_append("FINALIZE_CS_FONT_LIST_PDU", buffer, size, "|");
2676
0
  if (flags & FINALIZE_DEACTIVATE_REACTIVATE)
2677
0
    winpr_str_append("FINALIZE_DEACTIVATE_REACTIVATE", buffer, size, "|");
2678
0
  if (flags & mask)
2679
0
    winpr_str_append("UNKNOWN_FLAG", buffer, size, "|");
2680
0
  if (flags == 0)
2681
0
    winpr_str_append("NO_FLAG_SET", buffer, size, "|");
2682
0
  (void)_snprintf(number, sizeof(number), " [0x%08" PRIx32 "]", flags);
2683
0
  winpr_str_append(number, buffer, size, "");
2684
0
  return buffer;
2685
0
}
2686
2687
BOOL rdp_finalize_reset_flags(rdpRdp* rdp, BOOL clearAll)
2688
0
{
2689
0
  WINPR_ASSERT(rdp);
2690
0
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] reset finalize_sc_pdus", rdp_get_state_string(rdp));
2691
0
  if (clearAll)
2692
0
    rdp->finalize_sc_pdus = 0;
2693
0
  else
2694
0
    rdp->finalize_sc_pdus &= FINALIZE_DEACTIVATE_REACTIVATE;
2695
2696
0
  return rdp_set_monitor_layout_pdu_state(rdp, FALSE);
2697
0
}
2698
2699
BOOL rdp_finalize_set_flag(rdpRdp* rdp, UINT32 flag)
2700
9.38k
{
2701
9.38k
  char buffer[1024] = WINPR_C_ARRAY_INIT;
2702
2703
9.38k
  WINPR_ASSERT(rdp);
2704
2705
9.38k
  WLog_Print(rdp->log, WLOG_DEBUG, "[%s] received flag %s", rdp_get_state_string(rdp),
2706
9.38k
             rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
2707
9.38k
  rdp->finalize_sc_pdus |= flag;
2708
9.38k
  return TRUE;
2709
9.38k
}
2710
2711
BOOL rdp_finalize_is_flag_set(rdpRdp* rdp, UINT32 flag)
2712
0
{
2713
0
  WINPR_ASSERT(rdp);
2714
0
  return (rdp->finalize_sc_pdus & flag) == flag;
2715
0
}
2716
2717
BOOL rdp_reset_rc4_encrypt_keys(rdpRdp* rdp)
2718
0
{
2719
0
  WINPR_ASSERT(rdp);
2720
0
  rdp_free_rc4_encrypt_keys(rdp);
2721
0
  rdp->rc4_encrypt_key = winpr_RC4_New(rdp->encrypt_key, rdp->rc4_key_len);
2722
2723
0
  rdp->encrypt_use_count = 0;
2724
0
  return rdp->rc4_encrypt_key != nullptr;
2725
0
}
2726
2727
void rdp_free_rc4_encrypt_keys(rdpRdp* rdp)
2728
17.7k
{
2729
17.7k
  WINPR_ASSERT(rdp);
2730
17.7k
  winpr_RC4_Free(rdp->rc4_encrypt_key);
2731
17.7k
  rdp->rc4_encrypt_key = nullptr;
2732
17.7k
}
2733
2734
void rdp_free_rc4_decrypt_keys(rdpRdp* rdp)
2735
17.7k
{
2736
17.7k
  WINPR_ASSERT(rdp);
2737
17.7k
  winpr_RC4_Free(rdp->rc4_decrypt_key);
2738
17.7k
  rdp->rc4_decrypt_key = nullptr;
2739
17.7k
}
2740
2741
BOOL rdp_reset_rc4_decrypt_keys(rdpRdp* rdp)
2742
0
{
2743
0
  WINPR_ASSERT(rdp);
2744
0
  rdp_free_rc4_decrypt_keys(rdp);
2745
0
  rdp->rc4_decrypt_key = winpr_RC4_New(rdp->decrypt_key, rdp->rc4_key_len);
2746
2747
0
  rdp->decrypt_use_count = 0;
2748
0
  return rdp->rc4_decrypt_key != nullptr;
2749
0
}
2750
2751
const char* rdp_security_flag_string(UINT32 securityFlags, char* buffer, size_t size)
2752
10.5k
{
2753
10.5k
  if (securityFlags & SEC_EXCHANGE_PKT)
2754
1.63k
    winpr_str_append("SEC_EXCHANGE_PKT", buffer, size, "|");
2755
10.5k
  if (securityFlags & SEC_TRANSPORT_REQ)
2756
1.76k
    winpr_str_append("SEC_TRANSPORT_REQ", buffer, size, "|");
2757
10.5k
  if (securityFlags & SEC_TRANSPORT_RSP)
2758
1.61k
    winpr_str_append("SEC_TRANSPORT_RSP", buffer, size, "|");
2759
10.5k
  if (securityFlags & SEC_ENCRYPT)
2760
1.57k
    winpr_str_append("SEC_ENCRYPT", buffer, size, "|");
2761
10.5k
  if (securityFlags & SEC_RESET_SEQNO)
2762
1.10k
    winpr_str_append("SEC_RESET_SEQNO", buffer, size, "|");
2763
10.5k
  if (securityFlags & SEC_IGNORE_SEQNO)
2764
1.71k
    winpr_str_append("SEC_IGNORE_SEQNO", buffer, size, "|");
2765
10.5k
  if (securityFlags & SEC_INFO_PKT)
2766
1.30k
    winpr_str_append("SEC_INFO_PKT", buffer, size, "|");
2767
10.5k
  if (securityFlags & SEC_LICENSE_PKT)
2768
1.03k
    winpr_str_append("SEC_LICENSE_PKT", buffer, size, "|");
2769
10.5k
  if (securityFlags & SEC_LICENSE_ENCRYPT_CS)
2770
1.74k
    winpr_str_append("SEC_LICENSE_ENCRYPT_CS", buffer, size, "|");
2771
10.5k
  if (securityFlags & SEC_LICENSE_ENCRYPT_SC)
2772
1.74k
    winpr_str_append("SEC_LICENSE_ENCRYPT_SC", buffer, size, "|");
2773
10.5k
  if (securityFlags & SEC_REDIRECTION_PKT)
2774
6.82k
    winpr_str_append("SEC_REDIRECTION_PKT", buffer, size, "|");
2775
10.5k
  if (securityFlags & SEC_SECURE_CHECKSUM)
2776
1.55k
    winpr_str_append("SEC_SECURE_CHECKSUM", buffer, size, "|");
2777
10.5k
  if (securityFlags & SEC_AUTODETECT_REQ)
2778
1.23k
    winpr_str_append("SEC_AUTODETECT_REQ", buffer, size, "|");
2779
10.5k
  if (securityFlags & SEC_AUTODETECT_RSP)
2780
1.83k
    winpr_str_append("SEC_AUTODETECT_RSP", buffer, size, "|");
2781
10.5k
  if (securityFlags & SEC_HEARTBEAT)
2782
1.50k
    winpr_str_append("SEC_HEARTBEAT", buffer, size, "|");
2783
10.5k
  if (securityFlags & SEC_FLAGSHI_VALID)
2784
1.12k
    winpr_str_append("SEC_FLAGSHI_VALID", buffer, size, "|");
2785
10.5k
  {
2786
10.5k
    char msg[32] = WINPR_C_ARRAY_INIT;
2787
2788
10.5k
    (void)_snprintf(msg, sizeof(msg), "[0x%08" PRIx32 "]", securityFlags);
2789
10.5k
    winpr_str_append(msg, buffer, size, "");
2790
10.5k
  }
2791
10.5k
  return buffer;
2792
10.5k
}
2793
2794
static BOOL rdp_reset_remote_settings(rdpRdp* rdp)
2795
17.7k
{
2796
17.7k
  UINT32 flags = FREERDP_SETTINGS_REMOTE_MODE;
2797
17.7k
  WINPR_ASSERT(rdp);
2798
17.7k
  freerdp_settings_free(rdp->remoteSettings);
2799
2800
17.7k
  if (!freerdp_settings_get_bool(rdp->settings, FreeRDP_ServerMode))
2801
9.21k
    flags |= FREERDP_SETTINGS_SERVER_MODE;
2802
17.7k
  rdp->remoteSettings = freerdp_settings_new(flags);
2803
17.7k
  return rdp->remoteSettings != nullptr;
2804
17.7k
}
2805
2806
BOOL rdp_set_backup_settings(rdpRdp* rdp)
2807
17.7k
{
2808
17.7k
  WINPR_ASSERT(rdp);
2809
17.7k
  freerdp_settings_free(rdp->originalSettings);
2810
17.7k
  rdp->originalSettings = freerdp_settings_clone(rdp->settings);
2811
17.7k
  if (!rdp->originalSettings)
2812
0
    return FALSE;
2813
17.7k
  return rdp_reset_remote_settings(rdp);
2814
17.7k
}
2815
2816
BOOL rdp_reset_runtime_settings(rdpRdp* rdp)
2817
0
{
2818
0
  WINPR_ASSERT(rdp);
2819
0
  WINPR_ASSERT(rdp->context);
2820
2821
0
  freerdp_settings_free(rdp->settings);
2822
0
  rdp->context->settings = rdp->settings = freerdp_settings_clone(rdp->originalSettings);
2823
2824
0
  if (!rdp->settings)
2825
0
    return FALSE;
2826
0
  return rdp_reset_remote_settings(rdp);
2827
0
}
2828
2829
static BOOL starts_with(const char* tok, const char* val)
2830
8.06k
{
2831
8.06k
  const size_t len = strlen(val);
2832
8.06k
  if (strncmp(tok, val, len) != 0)
2833
8.01k
    return FALSE;
2834
49
  if (tok[len] != '=')
2835
10
    return FALSE;
2836
39
  return TRUE;
2837
49
}
2838
2839
static BOOL option_equals(const char* what, const char* val)
2840
115
{
2841
115
  return _stricmp(what, val) == 0;
2842
115
}
2843
2844
static BOOL parse_on_off_option(const char* value)
2845
39
{
2846
39
  WINPR_ASSERT(value);
2847
39
  const char* sep = strchr(value, '=');
2848
39
  if (!sep)
2849
0
    return TRUE;
2850
39
  if (option_equals("on", &sep[1]))
2851
1
    return TRUE;
2852
38
  if (option_equals("true", &sep[1]))
2853
0
    return TRUE;
2854
38
  if (option_equals("off", &sep[1]))
2855
38
    return FALSE;
2856
0
  if (option_equals("false", &sep[1]))
2857
0
    return FALSE;
2858
2859
0
  errno = 0;
2860
0
  long val = strtol(value, nullptr, 0);
2861
0
  if (errno == 0)
2862
0
    return (val != 0);
2863
2864
0
  return FALSE;
2865
0
}
2866
2867
8.51k
#define STR(x) #x
2868
2869
static BOOL option_is_runtime_checks(WINPR_ATTR_UNUSED wLog* log, const char* tok)
2870
185
{
2871
185
  const char* experimental[] = { STR(WITH_VERBOSE_WINPR_ASSERT) };
2872
369
  for (size_t x = 0; x < ARRAYSIZE(experimental); x++)
2873
185
  {
2874
185
    const char* opt = experimental[x];
2875
185
    if (starts_with(tok, opt))
2876
1
    {
2877
1
      return parse_on_off_option(tok);
2878
1
    }
2879
185
  }
2880
184
  return FALSE;
2881
185
}
2882
2883
static BOOL option_is_experimental(WINPR_ATTR_UNUSED wLog* log, const char* tok)
2884
185
{
2885
185
  const char* experimental[] = { STR(WITH_DSP_EXPERIMENTAL), STR(WITH_VAAPI),
2886
185
                               STR(WITH_GFX_AV1),          STR(WITH_VAAPI_H264_ENCODING),
2887
185
                               STR(WITH_MEDIACODEC),       STR(WITH_CLIENT_SDL2),
2888
185
                               STR(WITH_OPENCL),           STR(WITH_LIBRESSL),
2889
185
                               STR(WITH_MBEDTLS),          STR(WITH_MEDIA_FOUNDATION),
2890
185
                               STR(WITH_KRB5_HEIMDAL) };
2891
2.17k
  for (size_t x = 0; x < ARRAYSIZE(experimental); x++)
2892
1.99k
  {
2893
1.99k
    const char* opt = experimental[x];
2894
1.99k
    if (starts_with(tok, opt))
2895
7
    {
2896
7
      return parse_on_off_option(tok);
2897
7
    }
2898
1.99k
  }
2899
178
  return FALSE;
2900
185
}
2901
2902
static BOOL option_is_debug(wLog* log, const char* tok)
2903
185
{
2904
185
  WINPR_ASSERT(log);
2905
185
  const char* debug[] = {
2906
185
    STR(WITH_DEBUG_ALL),        STR(WITH_DEBUG_CERTIFICATE),    STR(WITH_DEBUG_CAPABILITIES),
2907
185
    STR(WITH_DEBUG_CHANNELS),   STR(WITH_DEBUG_CLIPRDR),        STR(WITH_DEBUG_CODECS),
2908
185
    STR(WITH_DEBUG_DVC),        STR(WITH_DEBUG_TSMF),           STR(WITH_DEBUG_KBD),
2909
185
    STR(WITH_DEBUG_LICENSE),    STR(WITH_DEBUG_NEGO),           STR(WITH_DEBUG_NLA),
2910
185
    STR(WITH_DEBUG_TSG),        STR(WITH_DEBUG_RAIL),           STR(WITH_DEBUG_RDP),
2911
185
    STR(WITH_DEBUG_RDPEI),      STR(WITH_DEBUG_REDIR),          STR(WITH_DEBUG_RDPDR),
2912
185
    STR(WITH_DEBUG_RFX),        STR(WITH_DEBUG_SCARD),          STR(WITH_DEBUG_SND),
2913
185
    STR(WITH_DEBUG_SVC),        STR(WITH_DEBUG_TRANSPORT),      STR(WITH_DEBUG_TIMEZONE),
2914
185
    STR(WITH_DEBUG_WND),        STR(WITH_DEBUG_RINGBUFFER),     STR(WITH_DEBUG_SYMBOLS),
2915
185
    STR(WITH_DEBUG_EVENTS),     STR(WITH_DEBUG_MUTEX),          STR(WITH_DEBUG_NTLM),
2916
185
    STR(WITH_DEBUG_SDL_EVENTS), STR(WITH_DEBUG_SDL_KBD_EVENTS), STR(WITH_DEBUG_THREADS),
2917
185
    STR(WITH_DEBUG_URBDRC)
2918
185
  };
2919
2920
5.88k
  for (size_t x = 0; x < ARRAYSIZE(debug); x++)
2921
5.73k
  {
2922
5.73k
    const char* opt = debug[x];
2923
5.73k
    if (starts_with(tok, opt))
2924
31
      return parse_on_off_option(tok);
2925
5.73k
  }
2926
2927
154
  if (starts_with(tok, "WITH_DEBUG"))
2928
0
  {
2929
0
    WLog_Print(log, WLOG_WARN, "[BUG] Unmapped Debug-Build option '%s'.", tok);
2930
0
    return parse_on_off_option(tok);
2931
0
  }
2932
2933
154
  return FALSE;
2934
154
}
2935
2936
static void log_build_warn(rdpRdp* rdp, const char* what, const char* msg,
2937
                           BOOL (*cmp)(wLog* log, const char* tok))
2938
3
{
2939
3
  WINPR_ASSERT(rdp);
2940
3
  WINPR_PRAGMA_DIAG_PUSH
2941
3
  WINPR_PRAGMA_DIAG_IGNORED_OVERLENGTH_STRINGS
2942
2943
3
  size_t len = sizeof(FREERDP_BUILD_CONFIG);
2944
3
  char* list = calloc(len, sizeof(char));
2945
3
  char* config = _strdup(FREERDP_BUILD_CONFIG);
2946
3
  WINPR_PRAGMA_DIAG_POP
2947
2948
3
  if (config && list)
2949
3
  {
2950
3
    char* saveptr = nullptr;
2951
3
    char* tok = strtok_s(config, " ", &saveptr);
2952
558
    while (tok)
2953
555
    {
2954
555
      if (cmp(rdp->log, tok))
2955
1
        winpr_str_append(tok, list, len, " ");
2956
2957
555
      tok = strtok_s(nullptr, " ", &saveptr);
2958
555
    }
2959
3
  }
2960
3
  free(config);
2961
2962
3
  if (list)
2963
3
  {
2964
3
    if (strlen(list) > 0)
2965
1
    {
2966
1
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2967
1
      WLog_Print(rdp->log, WLOG_WARN, "This build is using [%s] build options:", what);
2968
2969
1
      char* saveptr = nullptr;
2970
1
      char* tok = strtok_s(list, " ", &saveptr);
2971
2
      while (tok)
2972
1
      {
2973
1
        WLog_Print(rdp->log, WLOG_WARN, "* '%s'", tok);
2974
1
        tok = strtok_s(nullptr, " ", &saveptr);
2975
1
      }
2976
1
      WLog_Print(rdp->log, WLOG_WARN, "*");
2977
1
      WLog_Print(rdp->log, WLOG_WARN, "[%s] build options %s", what, msg);
2978
1
      WLog_Print(rdp->log, WLOG_WARN, "*************************************************");
2979
1
    }
2980
3
  }
2981
3
  free(list);
2982
3
}
2983
2984
#define print_first_line(log, firstLine, what) \
2985
0
  print_first_line_int((log), (firstLine), (what), __FILE__, __func__, __LINE__)
2986
static void print_first_line_int(wLog* log, log_line_t* firstLine, const char* what,
2987
                                 const char* file, const char* fkt, size_t line)
2988
0
{
2989
0
  WINPR_ASSERT(firstLine);
2990
0
  if (!firstLine->fkt)
2991
0
  {
2992
0
    const DWORD level = WLOG_WARN;
2993
0
    if (WLog_IsLevelActive(log, level))
2994
0
    {
2995
0
      WLog_PrintTextMessage(log, level, line, file, fkt,
2996
0
                            "*************************************************");
2997
0
      WLog_PrintTextMessage(log, level, line, file, fkt,
2998
0
                            "[SSL] {%s} build or configuration missing:", what);
2999
0
    }
3000
0
    firstLine->line = line;
3001
0
    firstLine->file = file;
3002
0
    firstLine->fkt = fkt;
3003
0
    firstLine->level = level;
3004
0
  }
3005
0
}
3006
3007
static void print_last_line(wLog* log, const log_line_t* firstLine)
3008
3
{
3009
3
  WINPR_ASSERT(firstLine);
3010
3
  if (firstLine->fkt)
3011
0
  {
3012
0
    if (WLog_IsLevelActive(log, firstLine->level))
3013
0
      WLog_PrintTextMessage(log, firstLine->level, firstLine->line, firstLine->file,
3014
0
                            firstLine->fkt,
3015
0
                            "*************************************************");
3016
0
  }
3017
3
}
3018
3019
static void log_build_warn_cipher(rdpRdp* rdp, log_line_t* firstLine, WINPR_CIPHER_TYPE md,
3020
                                  const char* what)
3021
5
{
3022
5
  BOOL haveCipher = FALSE;
3023
3024
5
  char key[WINPR_CIPHER_MAX_KEY_LENGTH] = WINPR_C_ARRAY_INIT;
3025
5
  char iv[WINPR_CIPHER_MAX_IV_LENGTH] = WINPR_C_ARRAY_INIT;
3026
3027
  /* RC4 only exists in the compatibility functions winpr_RC4_*
3028
   * winpr_Cipher_* does not support that. */
3029
5
  if (md == WINPR_CIPHER_ARC4_128)
3030
1
  {
3031
1
    WINPR_RC4_CTX* enc = winpr_RC4_New(key, sizeof(key));
3032
1
    haveCipher = enc != nullptr;
3033
1
    winpr_RC4_Free(enc);
3034
1
  }
3035
4
  else
3036
4
  {
3037
4
    WINPR_CIPHER_CTX* enc =
3038
4
        winpr_Cipher_NewEx(md, WINPR_ENCRYPT, key, sizeof(key), iv, sizeof(iv));
3039
4
    WINPR_CIPHER_CTX* dec =
3040
4
        winpr_Cipher_NewEx(md, WINPR_DECRYPT, key, sizeof(key), iv, sizeof(iv));
3041
4
    if (enc && dec)
3042
4
      haveCipher = TRUE;
3043
3044
4
    winpr_Cipher_Free(enc);
3045
4
    winpr_Cipher_Free(dec);
3046
4
  }
3047
3048
5
  if (!haveCipher)
3049
0
  {
3050
0
    print_first_line(rdp->log, firstLine, "Cipher");
3051
0
    WLog_Print(rdp->log, WLOG_WARN, "* %s: %s", winpr_cipher_type_to_string(md), what);
3052
0
  }
3053
5
}
3054
3055
static void log_build_warn_hmac(rdpRdp* rdp, log_line_t* firstLine, WINPR_MD_TYPE md,
3056
                                const char* what)
3057
2
{
3058
2
  BOOL haveHmacX = FALSE;
3059
2
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
3060
2
  if (hmac)
3061
2
  {
3062
    /* We need some key length, but there is no real limit here.
3063
     * just take the cipher maximum key length as we already have that available.
3064
     */
3065
2
    char key[WINPR_CIPHER_MAX_KEY_LENGTH] = WINPR_C_ARRAY_INIT;
3066
2
    haveHmacX = winpr_HMAC_Init(hmac, md, key, sizeof(key));
3067
2
  }
3068
2
  winpr_HMAC_Free(hmac);
3069
3070
2
  if (!haveHmacX)
3071
0
  {
3072
0
    print_first_line(rdp->log, firstLine, "HMAC");
3073
0
    WLog_Print(rdp->log, WLOG_WARN, " * %s: %s", winpr_md_type_to_string(md), what);
3074
0
  }
3075
2
}
3076
3077
static void log_build_warn_hash(rdpRdp* rdp, log_line_t* firstLine, WINPR_MD_TYPE md,
3078
                                const char* what)
3079
4
{
3080
4
  BOOL haveDigestX = FALSE;
3081
3082
4
  WINPR_DIGEST_CTX* digest = winpr_Digest_New();
3083
4
  if (digest)
3084
4
    haveDigestX = winpr_Digest_Init(digest, md);
3085
4
  winpr_Digest_Free(digest);
3086
3087
4
  if (!haveDigestX)
3088
0
  {
3089
0
    print_first_line(rdp->log, firstLine, "Digest");
3090
0
    WLog_Print(rdp->log, WLOG_WARN, " * %s: %s", winpr_md_type_to_string(md), what);
3091
0
  }
3092
4
}
3093
3094
static void log_build_warn_ssl(rdpRdp* rdp)
3095
1
{
3096
1
  WINPR_ASSERT(rdp);
3097
3098
1
  log_line_t firstHashLine = WINPR_C_ARRAY_INIT;
3099
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_MD4, "NTLM support not available");
3100
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_MD5,
3101
1
                      "NTLM, assistance files with encrypted passwords, autoreconnect cookies, "
3102
1
                      "licensing and RDP security will not work");
3103
1
  log_build_warn_hash(rdp, &firstHashLine, WINPR_MD_SHA1,
3104
1
                      "assistance files with encrypted passwords, Kerberos, Smartcard Logon, RDP "
3105
1
                      "security support not available");
3106
1
  log_build_warn_hash(
3107
1
      rdp, &firstHashLine, WINPR_MD_SHA256,
3108
1
      "file clipboard, AAD gateway, NLA security and certificates might not work");
3109
1
  print_last_line(rdp->log, &firstHashLine);
3110
3111
1
  log_line_t firstHmacLine = WINPR_C_ARRAY_INIT;
3112
1
  log_build_warn_hmac(rdp, &firstHmacLine, WINPR_MD_MD5, "Autoreconnect cookie not supported");
3113
1
  log_build_warn_hmac(rdp, &firstHmacLine, WINPR_MD_SHA1, "RDP security not supported");
3114
1
  print_last_line(rdp->log, &firstHmacLine);
3115
3116
1
  log_line_t firstCipherLine = WINPR_C_ARRAY_INIT;
3117
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_ARC4_128,
3118
1
                        "assistance files with encrypted passwords, NTLM, RDP licensing and RDP "
3119
1
                        "security will not work");
3120
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_DES_EDE3_CBC,
3121
1
                        "RDP security FIPS mode will not work");
3122
1
  log_build_warn_cipher(
3123
1
      rdp, &firstCipherLine, WINPR_CIPHER_AES_128_CBC,
3124
1
      "assistance file encrypted LHTicket will not work and ARM gateway might not");
3125
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_AES_192_CBC,
3126
1
                        "ARM gateway might not work");
3127
1
  log_build_warn_cipher(rdp, &firstCipherLine, WINPR_CIPHER_AES_256_CBC,
3128
1
                        "ARM gateway might not work");
3129
1
  print_last_line(rdp->log, &firstCipherLine);
3130
1
}
3131
3132
void rdp_log_build_warnings(rdpRdp* rdp)
3133
8.54k
{
3134
8.54k
  static unsigned count = 0;
3135
3136
8.54k
  WINPR_ASSERT(rdp);
3137
  /* Since this function is called in context creation routines stop logging
3138
   * this issue repeatedly. This is required for proxy, which would otherwise
3139
   * spam the log with these. */
3140
8.54k
  if (count > 0)
3141
8.54k
    return;
3142
1
  count++;
3143
1
  log_build_warn(rdp, "experimental", "might crash the application", option_is_experimental);
3144
1
  log_build_warn(rdp, "debug", "might leak sensitive information (credentials, ...)",
3145
1
                 option_is_debug);
3146
1
  log_build_warn(rdp, "runtime-check", "might slow down the application",
3147
1
                 option_is_runtime_checks);
3148
1
  log_build_warn_ssl(rdp);
3149
1
}
3150
3151
size_t rdp_get_event_handles(rdpRdp* rdp, HANDLE* handles, uint32_t count)
3152
0
{
3153
0
  size_t nCount = transport_get_event_handles(rdp->transport, handles, count);
3154
3155
0
  if (nCount == 0)
3156
0
    return 0;
3157
3158
0
  if (count < nCount + 2UL)
3159
0
    return 0;
3160
3161
0
  handles[nCount++] = utils_get_abort_event(rdp);
3162
0
  handles[nCount++] = freerdp_timer_get_event(rdp->timer);
3163
0
  return nCount;
3164
0
}