1 |
/* |
/* -*- c-basic-offset: 8 -*- |
2 |
rdesktop: A Remote Desktop Protocol client. |
rdesktop: A Remote Desktop Protocol client. |
3 |
Protocol services - RDP layer |
Protocol services - RDP layer |
4 |
Copyright (C) Matthew Chapman 1999-2001 |
Copyright (C) Matthew Chapman 1999-2002 |
5 |
|
|
6 |
This program is free software; you can redistribute it and/or modify |
This program is free software; you can redistribute it and/or modify |
7 |
it under the terms of the GNU General Public License as published by |
it under the terms of the GNU General Public License as published by |
20 |
|
|
21 |
#include "rdesktop.h" |
#include "rdesktop.h" |
22 |
|
|
23 |
extern uint16 mcs_userid; |
extern uint16 g_mcs_userid; |
24 |
extern char username[16]; |
extern char username[16]; |
25 |
extern BOOL bitmap_compression; |
extern BOOL bitmap_compression; |
26 |
extern BOOL orders; |
extern BOOL orders; |
27 |
extern BOOL encryption; |
extern BOOL encryption; |
28 |
extern BOOL desktop_save; |
extern BOOL desktop_save; |
29 |
|
extern BOOL use_rdp5; |
30 |
|
extern uint16 server_rdp_version; |
31 |
|
|
32 |
uint8 *next_packet; |
uint8 *next_packet; |
33 |
uint32 rdp_shareid; |
uint32 rdp_shareid; |
34 |
|
|
35 |
/* Initialise an RDP packet */ |
#if WITH_DEBUG |
36 |
static STREAM |
static uint32 packetno; |
37 |
rdp_init(int maxlen) |
#endif |
|
{ |
|
|
STREAM s; |
|
|
|
|
|
s = sec_init(encryption ? SEC_ENCRYPT : 0, maxlen + 6); |
|
|
s_push_layer(s, rdp_hdr, 6); |
|
|
|
|
|
return s; |
|
|
} |
|
|
|
|
|
/* Send an RDP packet */ |
|
|
static void |
|
|
rdp_send(STREAM s, uint8 pdu_type) |
|
|
{ |
|
|
uint16 length; |
|
|
|
|
|
s_pop_layer(s, rdp_hdr); |
|
|
length = s->end - s->p; |
|
|
|
|
|
out_uint16_le(s, length); |
|
|
out_uint16_le(s, (pdu_type | 0x10)); /* Version 1 */ |
|
|
out_uint16_le(s, (mcs_userid + 1001)); |
|
|
|
|
|
sec_send(s, encryption ? SEC_ENCRYPT : 0); |
|
|
} |
|
38 |
|
|
39 |
/* Receive an RDP packet */ |
/* Receive an RDP packet */ |
40 |
static STREAM |
static STREAM |
57 |
} |
} |
58 |
|
|
59 |
in_uint16_le(rdp_s, length); |
in_uint16_le(rdp_s, length); |
60 |
|
/* 32k packets are really 8, keepalive fix */ |
61 |
|
if (length == 0x8000) |
62 |
|
{ |
63 |
|
next_packet += 8; |
64 |
|
*type = 0; |
65 |
|
return rdp_s; |
66 |
|
} |
67 |
in_uint16_le(rdp_s, pdu_type); |
in_uint16_le(rdp_s, pdu_type); |
68 |
in_uint8s(rdp_s, 2); /* userid */ |
in_uint8s(rdp_s, 2); /* userid */ |
69 |
*type = pdu_type & 0xf; |
*type = pdu_type & 0xf; |
70 |
|
|
71 |
#if WITH_DEBUG |
#if WITH_DEBUG |
72 |
DEBUG(("RDP packet (type %x):\n", *type)); |
DEBUG(("RDP packet #%d, (type %x)\n", ++packetno, *type)); |
73 |
hexdump(next_packet, length); |
// hexdump(next_packet, length); |
74 |
#endif /* */ |
#endif /* */ |
75 |
|
|
76 |
next_packet += length; |
next_packet += length; |
100 |
|
|
101 |
out_uint16_le(s, length); |
out_uint16_le(s, length); |
102 |
out_uint16_le(s, (RDP_PDU_DATA | 0x10)); |
out_uint16_le(s, (RDP_PDU_DATA | 0x10)); |
103 |
out_uint16_le(s, (mcs_userid + 1001)); |
out_uint16_le(s, (g_mcs_userid + 1001)); |
104 |
|
|
105 |
out_uint32_le(s, rdp_shareid); |
out_uint32_le(s, rdp_shareid); |
106 |
out_uint8(s, 0); /* pad */ |
out_uint8(s, 0); /* pad */ |
107 |
out_uint8(s, 1); /* streamid */ |
out_uint8(s, 1); /* streamid */ |
108 |
out_uint16(s, (length - 14)); |
out_uint16_le(s, (length - 14)); |
109 |
out_uint8(s, data_pdu_type); |
out_uint8(s, data_pdu_type); |
110 |
out_uint8(s, 0); /* compress_type */ |
out_uint8(s, 0); /* compress_type */ |
111 |
out_uint16(s, 0); /* compress_len */ |
out_uint16(s, 0); /* compress_len */ |
140 |
int len_password = 2 * strlen(password); |
int len_password = 2 * strlen(password); |
141 |
int len_program = 2 * strlen(program); |
int len_program = 2 * strlen(program); |
142 |
int len_directory = 2 * strlen(directory); |
int len_directory = 2 * strlen(directory); |
143 |
uint32 sec_flags = encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) |
int len_ip = 2 * strlen("127.0.0.1"); |
144 |
: SEC_LOGON_INFO; |
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
145 |
|
int packetlen = 0; |
146 |
|
uint32 sec_flags = encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
147 |
STREAM s; |
STREAM s; |
148 |
|
|
149 |
s = sec_init(sec_flags, 18 + len_domain + len_user + len_password |
if (!use_rdp5 || 1 == server_rdp_version) |
150 |
+ len_program + len_directory + 10); |
{ |
151 |
|
DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); |
152 |
|
|
153 |
|
s = sec_init(sec_flags, 18 + len_domain + len_user + len_password |
154 |
|
+ len_program + len_directory + 10); |
155 |
|
|
156 |
|
out_uint32(s, 0); |
157 |
|
out_uint32_le(s, flags); |
158 |
|
out_uint16_le(s, len_domain); |
159 |
|
out_uint16_le(s, len_user); |
160 |
|
out_uint16_le(s, len_password); |
161 |
|
out_uint16_le(s, len_program); |
162 |
|
out_uint16_le(s, len_directory); |
163 |
|
rdp_out_unistr(s, domain, len_domain); |
164 |
|
rdp_out_unistr(s, user, len_user); |
165 |
|
rdp_out_unistr(s, password, len_password); |
166 |
|
rdp_out_unistr(s, program, len_program); |
167 |
|
rdp_out_unistr(s, directory, len_directory); |
168 |
|
} |
169 |
|
else |
170 |
|
{ |
171 |
|
flags |= RDP_LOGON_BLOB; |
172 |
|
DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); |
173 |
|
packetlen = 4 + // Unknown uint32 |
174 |
|
4 + // flags |
175 |
|
2 + // len_domain |
176 |
|
2 + // len_user |
177 |
|
(flags & RDP_LOGON_AUTO ? 2 : 0) + // len_password |
178 |
|
(flags & RDP_LOGON_BLOB ? 2 : 0) + // Length of BLOB |
179 |
|
2 + // len_program |
180 |
|
2 + // len_directory |
181 |
|
(0 < len_domain ? len_domain : 2) + // domain |
182 |
|
len_user + |
183 |
|
(flags & RDP_LOGON_AUTO ? len_password : 0) + |
184 |
|
0 + // We have no 512 byte BLOB. Perhaps we must? |
185 |
|
(flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + // After the BLOB is a unknown int16. If there is a BLOB, that is. |
186 |
|
(0 < len_program ? len_program : 2) + |
187 |
|
(0 < len_directory ? len_directory : 2) + |
188 |
|
2 + // Unknown (2) |
189 |
|
2 + // Client ip length |
190 |
|
len_ip + // Client ip |
191 |
|
2 + // DLL string length |
192 |
|
len_dll + // DLL string |
193 |
|
2 + // Unknown |
194 |
|
2 + // Unknown |
195 |
|
64 + // Time zone #0 |
196 |
|
2 + // Unknown |
197 |
|
64 + // Time zone #1 |
198 |
|
32; // Unknown |
199 |
|
|
200 |
|
s = sec_init(sec_flags, packetlen); |
201 |
|
DEBUG_RDP5(("Called sec_init with packetlen %d\n", packetlen)); |
202 |
|
|
203 |
|
out_uint32(s, 0); // Unknown |
204 |
|
out_uint32_le(s, flags); |
205 |
|
out_uint16_le(s, len_domain); |
206 |
|
out_uint16_le(s, len_user); |
207 |
|
if (flags & RDP_LOGON_AUTO) |
208 |
|
{ |
209 |
|
out_uint16_le(s, len_password); |
210 |
|
|
211 |
|
} |
212 |
|
if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) { |
213 |
|
out_uint16_le(s, 0); |
214 |
|
} |
215 |
|
out_uint16_le(s, len_program); |
216 |
|
out_uint16_le(s, len_directory); |
217 |
|
if (0 < len_domain) |
218 |
|
rdp_out_unistr(s, domain, len_domain); |
219 |
|
else |
220 |
|
out_uint16_le(s, 0); |
221 |
|
rdp_out_unistr(s, user, len_user); |
222 |
|
if (flags & RDP_LOGON_AUTO) |
223 |
|
{ |
224 |
|
rdp_out_unistr(s, password, len_password); |
225 |
|
} |
226 |
|
if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) { |
227 |
|
out_uint16_le(s, 0); |
228 |
|
} |
229 |
|
if (0 < len_program) { |
230 |
|
rdp_out_unistr(s, program, len_program); |
231 |
|
|
232 |
|
} else { |
233 |
|
out_uint16_le(s, 0); |
234 |
|
} |
235 |
|
if (0 < len_directory) { |
236 |
|
rdp_out_unistr(s, directory, len_directory); |
237 |
|
} else { |
238 |
|
out_uint16_le(s, 0); |
239 |
|
} |
240 |
|
out_uint16_le(s, 2); |
241 |
|
out_uint16_le(s, len_ip+2); // Length of client ip |
242 |
|
rdp_out_unistr(s, "127.0.0.1", len_ip); |
243 |
|
out_uint16_le(s, len_dll+2); |
244 |
|
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
245 |
|
out_uint16_le(s, 0xffc4); |
246 |
|
out_uint16_le(s, 0xffff); |
247 |
|
rdp_out_unistr(s, "GTB, normaltid", |
248 |
|
2*strlen("GTB, normaltid")); |
249 |
|
out_uint8s(s, 62-2*strlen("GTB, normaltid")); |
250 |
|
|
251 |
|
|
252 |
|
out_uint32_le(s, 0x0a0000); |
253 |
|
out_uint32_le(s, 0x050000); |
254 |
|
out_uint32_le(s, 3); |
255 |
|
out_uint32_le(s, 0); |
256 |
|
out_uint32_le(s, 0); |
257 |
|
|
258 |
|
rdp_out_unistr(s, "GTB, sommartid", |
259 |
|
2*strlen("GTB, sommartid")); |
260 |
|
out_uint8s(s, 62-2*strlen("GTB, sommartid")); |
261 |
|
|
262 |
|
out_uint32_le(s, 0x30000); |
263 |
|
out_uint32_le(s, 0x050000); |
264 |
|
out_uint32_le(s, 2); |
265 |
|
out_uint32(s, 0); |
266 |
|
out_uint32_le(s, 0xffffffc4); |
267 |
|
out_uint32_le(s, 0xfffffffe); |
268 |
|
out_uint32_le(s, 0x0f); |
269 |
|
out_uint32(s, 0); |
270 |
|
|
|
out_uint32(s, 0); |
|
|
out_uint32_le(s, flags); |
|
|
out_uint16_le(s, len_domain); |
|
|
out_uint16_le(s, len_user); |
|
|
out_uint16_le(s, len_password); |
|
|
out_uint16_le(s, len_program); |
|
|
out_uint16_le(s, len_directory); |
|
|
rdp_out_unistr(s, domain, len_domain); |
|
|
rdp_out_unistr(s, user, len_user); |
|
|
rdp_out_unistr(s, password, len_password); |
|
|
rdp_out_unistr(s, program, len_program); |
|
|
rdp_out_unistr(s, directory, len_directory); |
|
271 |
|
|
272 |
|
} |
273 |
s_mark_end(s); |
s_mark_end(s); |
274 |
sec_send(s, sec_flags); |
sec_send(s, sec_flags); |
275 |
} |
} |
292 |
|
|
293 |
/* Send a synchronisation PDU */ |
/* Send a synchronisation PDU */ |
294 |
static void |
static void |
295 |
rdp_send_synchronise() |
rdp_send_synchronise(void) |
296 |
{ |
{ |
297 |
STREAM s; |
STREAM s; |
298 |
|
|
307 |
|
|
308 |
/* Send a single input event */ |
/* Send a single input event */ |
309 |
void |
void |
310 |
rdp_send_input(uint32 time, uint16 message_type, uint16 device_flags, |
rdp_send_input(uint32 time, uint16 message_type, uint16 device_flags, uint16 param1, uint16 param2) |
|
uint16 param1, uint16 param2) |
|
311 |
{ |
{ |
312 |
STREAM s; |
STREAM s; |
313 |
|
|
355 |
out_uint16_le(s, 0x200); /* Protocol version */ |
out_uint16_le(s, 0x200); /* Protocol version */ |
356 |
out_uint16(s, 0); /* Pad */ |
out_uint16(s, 0); /* Pad */ |
357 |
out_uint16(s, 0); /* Compression types */ |
out_uint16(s, 0); /* Compression types */ |
358 |
out_uint16(s, 0); /* Pad */ |
out_uint16_le(s, use_rdp5 ? 0x40d : 0); |
359 |
|
/* Pad, according to T.128. 0x40d seems to |
360 |
|
trigger |
361 |
|
the server to start sending RDP5 packets. |
362 |
|
However, the value is 0x1d04 with W2KTSK and |
363 |
|
NT4MS. Hmm.. Anyway, thankyou, Microsoft, |
364 |
|
for sending such information in a padding |
365 |
|
field.. */ |
366 |
out_uint16(s, 0); /* Update capability */ |
out_uint16(s, 0); /* Update capability */ |
367 |
out_uint16(s, 0); /* Remote unshare capability */ |
out_uint16(s, 0); /* Remote unshare capability */ |
368 |
out_uint16(s, 0); /* Compression level */ |
out_uint16(s, 0); /* Compression level */ |
377 |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
378 |
|
|
379 |
out_uint16_le(s, 8); /* Preferred BPP */ |
out_uint16_le(s, 8); /* Preferred BPP */ |
380 |
out_uint16(s, 1); /* Receive 1 BPP */ |
out_uint16_le(s, 1); /* Receive 1 BPP */ |
381 |
out_uint16(s, 1); /* Receive 4 BPP */ |
out_uint16_le(s, 1); /* Receive 4 BPP */ |
382 |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
383 |
out_uint16_le(s, 800); /* Desktop width */ |
out_uint16_le(s, 800); /* Desktop width */ |
384 |
out_uint16_le(s, 600); /* Desktop height */ |
out_uint16_le(s, 600); /* Desktop height */ |
401 |
order_caps[0] = 1; /* dest blt */ |
order_caps[0] = 1; /* dest blt */ |
402 |
order_caps[1] = 1; /* pat blt */ |
order_caps[1] = 1; /* pat blt */ |
403 |
order_caps[2] = 1; /* screen blt */ |
order_caps[2] = 1; /* screen blt */ |
404 |
|
order_caps[3] = 1; /* required for memblt? */ |
405 |
order_caps[8] = 1; /* line */ |
order_caps[8] = 1; /* line */ |
406 |
order_caps[9] = 1; /* line */ |
order_caps[9] = 1; /* line */ |
407 |
order_caps[10] = 1; /* rect */ |
order_caps[10] = 1; /* rect */ |
423 |
out_uint8p(s, order_caps, 32); /* Orders supported */ |
out_uint8p(s, order_caps, 32); /* Orders supported */ |
424 |
out_uint16_le(s, 0x6a1); /* Text capability flags */ |
out_uint16_le(s, 0x6a1); /* Text capability flags */ |
425 |
out_uint8s(s, 6); /* Pad */ |
out_uint8s(s, 6); /* Pad */ |
426 |
out_uint32(s, desktop_save == False ? 0 : 0x38400); /* Desktop cache size */ |
out_uint32_le(s, desktop_save == False ? 0 : 0x38400); /* Desktop cache size */ |
427 |
out_uint32(s, 0); /* Unknown */ |
out_uint32(s, 0); /* Unknown */ |
428 |
out_uint32(s, 0x4e4); /* Unknown */ |
out_uint32_le(s, 0x4e4); /* Unknown */ |
429 |
} |
} |
430 |
|
|
431 |
/* Output bitmap cache capability set */ |
/* Output bitmap cache capability set */ |
525 |
0x02, 0x00, 0x00, 0x00 |
0x02, 0x00, 0x00, 0x00 |
526 |
}; |
}; |
527 |
|
|
528 |
/* Output unknown capability set */ |
/* Output unknown capability sets (number 13, 12, 14 and 16) */ |
529 |
static void |
static void |
530 |
rdp_out_unknown_caps(STREAM s) |
rdp_out_unknown_caps(STREAM s) |
531 |
{ |
{ |
535 |
out_uint8p(s, canned_caps, RDP_CAPLEN_UNKNOWN - 4); |
out_uint8p(s, canned_caps, RDP_CAPLEN_UNKNOWN - 4); |
536 |
} |
} |
537 |
|
|
538 |
|
#define RDP5_FLAG 0x0030 |
539 |
/* Send a confirm active PDU */ |
/* Send a confirm active PDU */ |
540 |
static void |
static void |
541 |
rdp_send_confirm_active() |
rdp_send_confirm_active(void) |
542 |
{ |
{ |
543 |
STREAM s; |
STREAM s; |
544 |
|
uint32 sec_flags = encryption ? (RDP5_FLAG | SEC_ENCRYPT) : RDP5_FLAG; |
545 |
uint16 caplen = |
uint16 caplen = |
546 |
RDP_CAPLEN_GENERAL + RDP_CAPLEN_BITMAP + RDP_CAPLEN_ORDER + |
RDP_CAPLEN_GENERAL + RDP_CAPLEN_BITMAP + RDP_CAPLEN_ORDER + |
547 |
RDP_CAPLEN_BMPCACHE + RDP_CAPLEN_COLCACHE + |
RDP_CAPLEN_BMPCACHE + RDP_CAPLEN_COLCACHE + |
548 |
RDP_CAPLEN_ACTIVATE + RDP_CAPLEN_CONTROL + |
RDP_CAPLEN_ACTIVATE + RDP_CAPLEN_CONTROL + |
549 |
RDP_CAPLEN_POINTER + RDP_CAPLEN_SHARE + RDP_CAPLEN_UNKNOWN |
RDP_CAPLEN_POINTER + RDP_CAPLEN_SHARE + RDP_CAPLEN_UNKNOWN + 4 /* w2k fix, why? */ ; |
|
+ 4 /* w2k fix, why? */ ; |
|
550 |
|
|
551 |
s = rdp_init(14 + caplen + sizeof(RDP_SOURCE)); |
s = sec_init(sec_flags, 6 + 14 + caplen + sizeof(RDP_SOURCE)); |
552 |
|
|
553 |
|
out_uint16_le(s, 2 + 14 + caplen + sizeof(RDP_SOURCE)); |
554 |
|
out_uint16_le(s, (RDP_PDU_CONFIRM_ACTIVE | 0x10)); /* Version 1 */ |
555 |
|
out_uint16_le(s, (g_mcs_userid + 1001)); |
556 |
|
|
557 |
out_uint32_le(s, rdp_shareid); |
out_uint32_le(s, rdp_shareid); |
558 |
out_uint16_le(s, 0x3ea); /* userid */ |
out_uint16_le(s, 0x3ea); /* userid */ |
575 |
rdp_out_unknown_caps(s); |
rdp_out_unknown_caps(s); |
576 |
|
|
577 |
s_mark_end(s); |
s_mark_end(s); |
578 |
rdp_send(s, RDP_PDU_CONFIRM_ACTIVE); |
sec_send(s, sec_flags); |
579 |
} |
} |
580 |
|
|
581 |
/* Respond to a demand active PDU */ |
/* Respond to a demand active PDU */ |
602 |
reset_order_state(); |
reset_order_state(); |
603 |
} |
} |
604 |
|
|
605 |
|
/* Process a null system pointer PDU */ |
606 |
|
void |
607 |
|
process_null_system_pointer_pdu(STREAM s) |
608 |
|
{ |
609 |
|
// FIXME: We should probably set another cursor here, |
610 |
|
// like the X window system base cursor or something. |
611 |
|
ui_set_cursor(cache_get_cursor(0)); |
612 |
|
} |
613 |
|
|
614 |
|
/* Process a colour pointer PDU */ |
615 |
|
void |
616 |
|
process_colour_pointer_pdu(STREAM s) |
617 |
|
{ |
618 |
|
uint16 x, y, width, height, cache_idx, masklen, datalen; |
619 |
|
uint8 *mask, *data; |
620 |
|
HCURSOR cursor; |
621 |
|
|
622 |
|
in_uint16_le(s, cache_idx); |
623 |
|
in_uint16_le(s, x); |
624 |
|
in_uint16_le(s, y); |
625 |
|
in_uint16_le(s, width); |
626 |
|
in_uint16_le(s, height); |
627 |
|
in_uint16_le(s, masklen); |
628 |
|
in_uint16_le(s, datalen); |
629 |
|
in_uint8p(s, data, datalen); |
630 |
|
in_uint8p(s, mask, masklen); |
631 |
|
cursor = ui_create_cursor(x, y, width, height, mask, data); |
632 |
|
ui_set_cursor(cursor); |
633 |
|
cache_put_cursor(cache_idx, cursor); |
634 |
|
} |
635 |
|
|
636 |
|
/* Process a cached pointer PDU */ |
637 |
|
void |
638 |
|
process_cached_pointer_pdu(STREAM s) |
639 |
|
{ |
640 |
|
uint16 cache_idx; |
641 |
|
|
642 |
|
in_uint16_le(s, cache_idx); |
643 |
|
ui_set_cursor(cache_get_cursor(cache_idx)); |
644 |
|
} |
645 |
|
|
646 |
|
|
647 |
/* Process a pointer PDU */ |
/* Process a pointer PDU */ |
648 |
static void |
static void |
649 |
process_pointer_pdu(STREAM s) |
process_pointer_pdu(STREAM s) |
650 |
{ |
{ |
651 |
uint16 message_type; |
uint16 message_type; |
652 |
uint16 x, y, width, height, cache_idx, masklen, datalen; |
uint16 x, y; |
|
uint8 *mask, *data; |
|
|
HCURSOR cursor; |
|
653 |
|
|
654 |
in_uint16_le(s, message_type); |
in_uint16_le(s, message_type); |
655 |
in_uint8s(s, 2); /* pad */ |
in_uint8s(s, 2); /* pad */ |
664 |
break; |
break; |
665 |
|
|
666 |
case RDP_POINTER_COLOR: |
case RDP_POINTER_COLOR: |
667 |
in_uint16_le(s, cache_idx); |
process_colour_pointer_pdu(s); |
|
in_uint16_le(s, x); |
|
|
in_uint16_le(s, y); |
|
|
in_uint16_le(s, width); |
|
|
in_uint16_le(s, height); |
|
|
in_uint16_le(s, masklen); |
|
|
in_uint16_le(s, datalen); |
|
|
in_uint8p(s, data, datalen); |
|
|
in_uint8p(s, mask, masklen); |
|
|
cursor = ui_create_cursor(x, y, width, height, mask, |
|
|
data); |
|
|
ui_set_cursor(cursor); |
|
|
cache_put_cursor(cache_idx, cursor); |
|
668 |
break; |
break; |
669 |
|
|
670 |
case RDP_POINTER_CACHED: |
case RDP_POINTER_CACHED: |
671 |
in_uint16_le(s, cache_idx); |
process_cached_pointer_pdu(s); |
|
ui_set_cursor(cache_get_cursor(cache_idx)); |
|
672 |
break; |
break; |
673 |
|
|
674 |
default: |
default: |
677 |
} |
} |
678 |
|
|
679 |
/* Process bitmap updates */ |
/* Process bitmap updates */ |
680 |
static void |
void |
681 |
process_bitmap_updates(STREAM s) |
process_bitmap_updates(STREAM s) |
682 |
{ |
{ |
683 |
uint16 num_updates; |
uint16 num_updates; |
684 |
uint16 left, top, right, bottom, width, height; |
uint16 left, top, right, bottom, width, height; |
685 |
uint16 cx, cy, bpp, compress, bufsize, size; |
uint16 cx, cy, bpp, Bpp, compress, bufsize, size; |
686 |
uint8 *data, *bmpdata; |
uint8 *data, *bmpdata; |
687 |
int i; |
int i; |
688 |
|
|
697 |
in_uint16_le(s, width); |
in_uint16_le(s, width); |
698 |
in_uint16_le(s, height); |
in_uint16_le(s, height); |
699 |
in_uint16_le(s, bpp); |
in_uint16_le(s, bpp); |
700 |
|
Bpp = (bpp + 7) / 8; |
701 |
in_uint16_le(s, compress); |
in_uint16_le(s, compress); |
702 |
in_uint16_le(s, bufsize); |
in_uint16_le(s, bufsize); |
703 |
|
|
704 |
cx = right - left + 1; |
cx = right - left + 1; |
705 |
cy = bottom - top + 1; |
cy = bottom - top + 1; |
706 |
|
|
707 |
DEBUG(("UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,cmp=%d)\n", |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
708 |
left, top, right, bottom, width, height, compress)); |
left, top, right, bottom, width, height, Bpp, compress)); |
709 |
|
|
710 |
if (!compress) |
if (!compress) |
711 |
{ |
{ |
712 |
int y; |
int y; |
713 |
bmpdata = xmalloc(width * height); |
bmpdata = (uint8*)xmalloc(width * height * Bpp); |
714 |
for (y = 0; y < height; y++) |
for (y = 0; y < height; y++) |
715 |
{ |
{ |
716 |
in_uint8a(s, |
in_uint8a(s, &bmpdata[(height - y - 1) * (width * Bpp)], |
717 |
&bmpdata[(height - y - 1) * width], |
width * Bpp); |
|
width); |
|
718 |
} |
} |
719 |
ui_paint_bitmap(left, top, cx, cy, width, height, |
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata); |
|
bmpdata); |
|
720 |
xfree(bmpdata); |
xfree(bmpdata); |
721 |
continue; |
continue; |
722 |
} |
} |
723 |
|
|
|
in_uint8s(s, 2); /* pad */ |
|
|
in_uint16_le(s, size); |
|
|
in_uint8s(s, 4); /* line_size, final_size */ |
|
|
in_uint8p(s, data, size); |
|
724 |
|
|
725 |
bmpdata = xmalloc(width * height); |
if (compress & 0x400) |
726 |
if (bitmap_decompress(bmpdata, width, height, data, size)) |
{ |
727 |
|
size = bufsize; |
728 |
|
} |
729 |
|
else |
730 |
|
{ |
731 |
|
in_uint8s(s, 2); /* pad */ |
732 |
|
in_uint16_le(s, size); |
733 |
|
in_uint8s(s, 4); /* line_size, final_size */ |
734 |
|
} |
735 |
|
in_uint8p(s, data, size); |
736 |
|
bmpdata = (uint8*)xmalloc(width * height * Bpp); |
737 |
|
if (bitmap_decompress(bmpdata, width, height, data, size, Bpp)) |
738 |
{ |
{ |
739 |
ui_paint_bitmap(left, top, cx, cy, width, height, |
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata); |
740 |
bmpdata); |
} |
741 |
|
else |
742 |
|
{ |
743 |
|
DEBUG_RDP5(("Failed to decompress data\n")); |
744 |
} |
} |
745 |
|
|
746 |
xfree(bmpdata); |
xfree(bmpdata); |
748 |
} |
} |
749 |
|
|
750 |
/* Process a palette update */ |
/* Process a palette update */ |
751 |
static void |
void |
752 |
process_palette(STREAM s) |
process_palette(STREAM s) |
753 |
{ |
{ |
754 |
HCOLOURMAP hmap; |
COLOURENTRY *entry; |
755 |
COLOURMAP map; |
COLOURMAP map; |
756 |
uint8 *colours; |
HCOLOURMAP hmap; |
757 |
|
int i; |
758 |
|
|
759 |
in_uint8s(s, 2); /* pad */ |
in_uint8s(s, 2); /* pad */ |
760 |
in_uint16_le(s, map.ncolours); |
in_uint16_le(s, map.ncolours); |
761 |
in_uint8s(s, 2); /* pad */ |
in_uint8s(s, 2); /* pad */ |
762 |
in_uint8p(s, colours, (map.ncolours * 3)); |
|
763 |
map.colours = (COLOURENTRY *) colours; |
map.colours = (COLOURENTRY*)xmalloc(3 * map.ncolours); |
764 |
|
|
765 |
|
DEBUG(("PALETTE(c=%d)\n", map.ncolours)); |
766 |
|
|
767 |
|
for (i = 0; i < map.ncolours; i++) |
768 |
|
{ |
769 |
|
entry = &map.colours[i]; |
770 |
|
in_uint8(s, entry->red); |
771 |
|
in_uint8(s, entry->green); |
772 |
|
in_uint8(s, entry->blue); |
773 |
|
} |
774 |
|
|
775 |
hmap = ui_create_colourmap(&map); |
hmap = ui_create_colourmap(&map); |
776 |
ui_set_colourmap(hmap); |
ui_set_colourmap(hmap); |
777 |
|
|
778 |
|
xfree(map.colours); |
779 |
} |
} |
780 |
|
|
781 |
/* Process an update PDU */ |
/* Process an update PDU */ |
782 |
static void |
static void |
783 |
process_update_pdu(STREAM s) |
process_update_pdu(STREAM s) |
784 |
{ |
{ |
785 |
uint16 update_type; |
uint16 update_type, count; |
786 |
|
|
787 |
in_uint16_le(s, update_type); |
in_uint16_le(s, update_type); |
788 |
|
|
789 |
switch (update_type) |
switch (update_type) |
790 |
{ |
{ |
791 |
case RDP_UPDATE_ORDERS: |
case RDP_UPDATE_ORDERS: |
792 |
process_orders(s); |
in_uint8s(s, 2); /* pad */ |
793 |
|
in_uint16_le(s, count); |
794 |
|
in_uint8s(s, 2); /* pad */ |
795 |
|
process_orders(s, count); |
796 |
break; |
break; |
797 |
|
|
798 |
case RDP_UPDATE_BITMAP: |
case RDP_UPDATE_BITMAP: |
837 |
break; |
break; |
838 |
|
|
839 |
case RDP_DATA_PDU_LOGON: |
case RDP_DATA_PDU_LOGON: |
840 |
|
DEBUG(("Received Logon PDU\n")); |
841 |
/* User logged on */ |
/* User logged on */ |
842 |
break; |
break; |
843 |
|
|
848 |
|
|
849 |
/* Process incoming packets */ |
/* Process incoming packets */ |
850 |
void |
void |
851 |
rdp_main_loop() |
rdp_main_loop(void) |
852 |
{ |
{ |
853 |
uint8 type; |
uint8 type; |
854 |
STREAM s; |
STREAM s; |
868 |
process_data_pdu(s); |
process_data_pdu(s); |
869 |
break; |
break; |
870 |
|
|
871 |
|
case 0: |
872 |
|
break; |
873 |
|
|
874 |
default: |
default: |
875 |
unimpl("PDU %d\n", type); |
unimpl("PDU %d\n", type); |
876 |
} |
} |
882 |
rdp_connect(char *server, uint32 flags, char *domain, char *password, |
rdp_connect(char *server, uint32 flags, char *domain, char *password, |
883 |
char *command, char *directory) |
char *command, char *directory) |
884 |
{ |
{ |
885 |
if (!sec_connect(server)) |
if (!sec_connect(server, username)) |
886 |
return False; |
return False; |
887 |
|
|
888 |
rdp_send_logon_info(flags, domain, username, password, |
rdp_send_logon_info(flags, domain, username, password, command, directory); |
|
command, directory); |
|
889 |
return True; |
return True; |
890 |
} |
} |
891 |
|
|
892 |
/* Disconnect from the RDP layer */ |
/* Disconnect from the RDP layer */ |
893 |
void |
void |
894 |
rdp_disconnect() |
rdp_disconnect(void) |
895 |
{ |
{ |
896 |
sec_disconnect(); |
sec_disconnect(); |
897 |
} |
} |