18 |
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
19 |
*/ |
*/ |
20 |
|
|
21 |
|
#include <time.h> |
22 |
#include "rdesktop.h" |
#include "rdesktop.h" |
23 |
|
|
24 |
extern uint16 g_mcs_userid; |
extern uint16 g_mcs_userid; |
29 |
extern BOOL g_desktop_save; |
extern BOOL g_desktop_save; |
30 |
extern BOOL g_use_rdp5; |
extern BOOL g_use_rdp5; |
31 |
extern uint16 g_server_rdp_version; |
extern uint16 g_server_rdp_version; |
32 |
|
extern uint32 g_rdp5_performanceflags; |
33 |
extern int g_server_bpp; |
extern int g_server_bpp; |
34 |
|
extern int g_width; |
35 |
|
extern int g_height; |
36 |
|
|
37 |
uint8 *g_next_packet; |
uint8 *g_next_packet; |
38 |
uint32 g_rdp_shareid; |
uint32 g_rdp_shareid; |
135 |
s->p += len; |
s->p += len; |
136 |
} |
} |
137 |
|
|
138 |
|
/* Input a string in Unicode |
139 |
|
* |
140 |
|
* Returns str_len of string |
141 |
|
*/ |
142 |
|
int |
143 |
|
rdp_in_unistr(STREAM s, char *string, int uni_len) |
144 |
|
{ |
145 |
|
int i = 0; |
146 |
|
|
147 |
|
while (i < uni_len / 2) |
148 |
|
{ |
149 |
|
in_uint8a(s, &string[i++], 1); |
150 |
|
in_uint8s(s, 1); |
151 |
|
} |
152 |
|
|
153 |
|
return i - 1; |
154 |
|
} |
155 |
|
|
156 |
|
|
157 |
/* Parse a logon info packet */ |
/* Parse a logon info packet */ |
158 |
static void |
static void |
159 |
rdp_send_logon_info(uint32 flags, char *domain, char *user, |
rdp_send_logon_info(uint32 flags, char *domain, char *user, |
160 |
char *password, char *program, char *directory) |
char *password, char *program, char *directory) |
161 |
{ |
{ |
162 |
|
char *ipaddr = tcp_get_address(); |
163 |
int len_domain = 2 * strlen(domain); |
int len_domain = 2 * strlen(domain); |
164 |
int len_user = 2 * strlen(user); |
int len_user = 2 * strlen(user); |
165 |
int len_password = 2 * strlen(password); |
int len_password = 2 * strlen(password); |
166 |
int len_program = 2 * strlen(program); |
int len_program = 2 * strlen(program); |
167 |
int len_directory = 2 * strlen(directory); |
int len_directory = 2 * strlen(directory); |
168 |
int len_ip = 2 * strlen("127.0.0.1"); |
int len_ip = 2 * strlen(ipaddr); |
169 |
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
170 |
int packetlen = 0; |
int packetlen = 0; |
171 |
uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
172 |
STREAM s; |
STREAM s; |
173 |
|
time_t t = time(NULL); |
174 |
|
time_t tzone; |
175 |
|
|
176 |
|
#if 0 |
177 |
|
// enable rdp compression |
178 |
|
flags |= RDP_COMPRESSION; |
179 |
|
#endif |
180 |
|
|
181 |
if (!g_use_rdp5 || 1 == g_server_rdp_version) |
if (!g_use_rdp5 || 1 == g_server_rdp_version) |
182 |
{ |
{ |
202 |
{ |
{ |
203 |
flags |= RDP_LOGON_BLOB; |
flags |= RDP_LOGON_BLOB; |
204 |
DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); |
DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); |
205 |
packetlen = 4 + // Unknown uint32 |
packetlen = 4 + /* Unknown uint32 */ |
206 |
4 + // flags |
4 + /* flags */ |
207 |
2 + // len_domain |
2 + /* len_domain */ |
208 |
2 + // len_user |
2 + /* len_user */ |
209 |
(flags & RDP_LOGON_AUTO ? 2 : 0) + // len_password |
(flags & RDP_LOGON_AUTO ? 2 : 0) + /* len_password */ |
210 |
(flags & RDP_LOGON_BLOB ? 2 : 0) + // Length of BLOB |
(flags & RDP_LOGON_BLOB ? 2 : 0) + /* Length of BLOB */ |
211 |
2 + // len_program |
2 + /* len_program */ |
212 |
2 + // len_directory |
2 + /* len_directory */ |
213 |
(0 < len_domain ? len_domain : 2) + // domain |
(0 < len_domain ? len_domain : 2) + /* domain */ |
214 |
len_user + (flags & RDP_LOGON_AUTO ? len_password : 0) + 0 + // We have no 512 byte BLOB. Perhaps we must? |
len_user + (flags & RDP_LOGON_AUTO ? len_password : 0) + 0 + /* We have no 512 byte BLOB. Perhaps we must? */ |
215 |
(flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + // After the BLOB is a unknown int16. If there is a BLOB, that is. |
(flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + /* After the BLOB is a unknown int16. If there is a BLOB, that is. */ |
216 |
(0 < len_program ? len_program : 2) + (0 < len_directory ? len_directory : 2) + 2 + // Unknown (2) |
(0 < len_program ? len_program : 2) + (0 < len_directory ? len_directory : 2) + 2 + /* Unknown (2) */ |
217 |
2 + // Client ip length |
2 + /* Client ip length */ |
218 |
len_ip + // Client ip |
len_ip + /* Client ip */ |
219 |
2 + // DLL string length |
2 + /* DLL string length */ |
220 |
len_dll + // DLL string |
len_dll + /* DLL string */ |
221 |
2 + // Unknown |
2 + /* Unknown */ |
222 |
2 + // Unknown |
2 + /* Unknown */ |
223 |
64 + // Time zone #0 |
64 + /* Time zone #0 */ |
224 |
2 + // Unknown |
2 + /* Unknown */ |
225 |
64 + // Time zone #1 |
64 + /* Time zone #1 */ |
226 |
32; // Unknown |
32; /* Unknown */ |
227 |
|
|
228 |
s = sec_init(sec_flags, packetlen); |
s = sec_init(sec_flags, packetlen); |
229 |
DEBUG_RDP5(("Called sec_init with packetlen %d\n", packetlen)); |
DEBUG_RDP5(("Called sec_init with packetlen %d\n", packetlen)); |
230 |
|
|
231 |
out_uint32(s, 0); // Unknown |
out_uint32(s, 0); /* Unknown */ |
232 |
out_uint32_le(s, flags); |
out_uint32_le(s, flags); |
233 |
out_uint16_le(s, len_domain); |
out_uint16_le(s, len_domain); |
234 |
out_uint16_le(s, len_user); |
out_uint16_le(s, len_user); |
274 |
out_uint16_le(s, 0); |
out_uint16_le(s, 0); |
275 |
} |
} |
276 |
out_uint16_le(s, 2); |
out_uint16_le(s, 2); |
277 |
out_uint16_le(s, len_ip + 2); // Length of client ip |
out_uint16_le(s, len_ip + 2); /* Length of client ip */ |
278 |
rdp_out_unistr(s, "127.0.0.1", len_ip); |
rdp_out_unistr(s, ipaddr, len_ip); |
279 |
out_uint16_le(s, len_dll + 2); |
out_uint16_le(s, len_dll + 2); |
280 |
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
281 |
out_uint16_le(s, 0xffc4); |
|
282 |
out_uint16_le(s, 0xffff); |
tzone = (mktime(gmtime(&t)) - mktime(localtime(&t))) / 60; |
283 |
|
out_uint32_le(s, tzone); |
284 |
|
|
285 |
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); |
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); |
286 |
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); |
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); |
287 |
|
|
|
|
|
288 |
out_uint32_le(s, 0x0a0000); |
out_uint32_le(s, 0x0a0000); |
289 |
out_uint32_le(s, 0x050000); |
out_uint32_le(s, 0x050000); |
290 |
out_uint32_le(s, 3); |
out_uint32_le(s, 3); |
300 |
out_uint32(s, 0); |
out_uint32(s, 0); |
301 |
out_uint32_le(s, 0xffffffc4); |
out_uint32_le(s, 0xffffffc4); |
302 |
out_uint32_le(s, 0xfffffffe); |
out_uint32_le(s, 0xfffffffe); |
303 |
out_uint32_le(s, 0x0f); |
out_uint32_le(s, g_rdp5_performanceflags); |
304 |
out_uint32(s, 0); |
out_uint32(s, 0); |
305 |
|
|
306 |
|
|
370 |
s = rdp_init_data(8); |
s = rdp_init_data(8); |
371 |
|
|
372 |
out_uint16(s, 0); /* number of fonts */ |
out_uint16(s, 0); /* number of fonts */ |
373 |
out_uint16_le(s, 0x3e); /* unknown */ |
out_uint16_le(s, 0); /* pad? */ |
374 |
out_uint16_le(s, seq); /* unknown */ |
out_uint16_le(s, seq); /* unknown */ |
375 |
out_uint16_le(s, 0x32); /* entry size */ |
out_uint16_le(s, 0x32); /* entry size */ |
376 |
|
|
411 |
out_uint16_le(s, RDP_CAPSET_BITMAP); |
out_uint16_le(s, RDP_CAPSET_BITMAP); |
412 |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
413 |
|
|
414 |
out_uint16_le(s, 8); /* Preferred BPP */ |
out_uint16_le(s, g_server_bpp); /* Preferred BPP */ |
415 |
out_uint16_le(s, 1); /* Receive 1 BPP */ |
out_uint16_le(s, 1); /* Receive 1 BPP */ |
416 |
out_uint16_le(s, 1); /* Receive 4 BPP */ |
out_uint16_le(s, 1); /* Receive 4 BPP */ |
417 |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
418 |
out_uint16_le(s, 800); /* Desktop width */ |
out_uint16_le(s, 800); /* Desktop width */ |
419 |
out_uint16_le(s, 600); /* Desktop height */ |
out_uint16_le(s, 600); /* Desktop height */ |
420 |
out_uint16(s, 0); /* Pad */ |
out_uint16(s, 0); /* Pad */ |
421 |
out_uint16(s, 0); /* Allow resize */ |
out_uint16(s, 1); /* Allow resize */ |
422 |
out_uint16_le(s, g_bitmap_compression ? 1 : 0); /* Support compression */ |
out_uint16_le(s, g_bitmap_compression ? 1 : 0); /* Support compression */ |
423 |
out_uint16(s, 0); /* Unknown */ |
out_uint16(s, 0); /* Unknown */ |
424 |
out_uint16_le(s, 1); /* Unknown */ |
out_uint16_le(s, 1); /* Unknown */ |
615 |
sec_send(s, sec_flags); |
sec_send(s, sec_flags); |
616 |
} |
} |
617 |
|
|
618 |
|
/* Process a general capability set */ |
619 |
|
static void |
620 |
|
rdp_process_general_caps(STREAM s) |
621 |
|
{ |
622 |
|
uint16 pad2octetsB; /* rdp5 flags? */ |
623 |
|
|
624 |
|
in_uint8s(s, 10); |
625 |
|
in_uint16_le(s, pad2octetsB); |
626 |
|
|
627 |
|
if (!pad2octetsB) |
628 |
|
g_use_rdp5 = False; |
629 |
|
} |
630 |
|
|
631 |
|
/* Process a bitmap capability set */ |
632 |
|
static void |
633 |
|
rdp_process_bitmap_caps(STREAM s) |
634 |
|
{ |
635 |
|
uint16 width, height, bpp; |
636 |
|
|
637 |
|
in_uint16_le(s, bpp); |
638 |
|
in_uint8s(s, 6); |
639 |
|
|
640 |
|
in_uint16_le(s, width); |
641 |
|
in_uint16_le(s, height); |
642 |
|
|
643 |
|
DEBUG(("setting desktop size and bpp to: %dx%dx%d\n", width, height, bpp)); |
644 |
|
|
645 |
|
/* |
646 |
|
* The server may limit bpp and change the size of the desktop (for |
647 |
|
* example when shadowing another session). |
648 |
|
*/ |
649 |
|
g_server_bpp = bpp; |
650 |
|
g_width = width; |
651 |
|
g_height = height; |
652 |
|
|
653 |
|
ui_resize_window(); |
654 |
|
} |
655 |
|
|
656 |
/* Respond to a demand active PDU */ |
/* Respond to a demand active PDU */ |
657 |
static void |
static void |
658 |
process_demand_active(STREAM s) |
process_demand_active(STREAM s) |
659 |
{ |
{ |
660 |
uint8 type; |
int n; |
661 |
|
uint8 type, *next; |
662 |
|
uint16 len_src_descriptor, len_combined_caps, num_capsets, capset_type, capset_length; |
663 |
|
|
664 |
in_uint32_le(s, g_rdp_shareid); |
in_uint32_le(s, g_rdp_shareid); |
665 |
|
in_uint16_le(s, len_src_descriptor); |
666 |
|
in_uint16_le(s, len_combined_caps); |
667 |
|
in_uint8s(s, len_src_descriptor); |
668 |
|
|
669 |
|
in_uint16_le(s, num_capsets); |
670 |
|
in_uint8s(s, 2); /* pad */ |
671 |
|
|
672 |
|
DEBUG(("DEMAND_ACTIVE(id=0x%x,num_caps=%d)\n", g_rdp_shareid, num_capsets)); |
673 |
|
|
674 |
|
for (n = 0; n < num_capsets; n++) |
675 |
|
{ |
676 |
|
in_uint16_le(s, capset_type); |
677 |
|
in_uint16_le(s, capset_length); |
678 |
|
|
679 |
|
next = s->p + capset_length - 4; |
680 |
|
|
681 |
|
switch (capset_type) |
682 |
|
{ |
683 |
|
case RDP_CAPSET_GENERAL: |
684 |
|
rdp_process_general_caps(s); |
685 |
|
break; |
686 |
|
|
687 |
|
case RDP_CAPSET_BITMAP: |
688 |
|
rdp_process_bitmap_caps(s); |
689 |
|
break; |
690 |
|
} |
691 |
|
|
692 |
DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", g_rdp_shareid)); |
s->p = next; |
693 |
|
} |
694 |
|
|
695 |
rdp_send_confirm_active(); |
rdp_send_confirm_active(); |
696 |
rdp_send_synchronise(); |
rdp_send_synchronise(); |
699 |
rdp_recv(&type); /* RDP_PDU_SYNCHRONIZE */ |
rdp_recv(&type); /* RDP_PDU_SYNCHRONIZE */ |
700 |
rdp_recv(&type); /* RDP_CTL_COOPERATE */ |
rdp_recv(&type); /* RDP_CTL_COOPERATE */ |
701 |
rdp_recv(&type); /* RDP_CTL_GRANT_CONTROL */ |
rdp_recv(&type); /* RDP_CTL_GRANT_CONTROL */ |
702 |
rdp_send_input(0, RDP_INPUT_SYNCHRONIZE, 0, 0, 0); |
rdp_send_input(0, RDP_INPUT_SYNCHRONIZE, 0, ui_get_numlock_state(read_keyboard_state()), 0); |
703 |
rdp_send_fonts(1); |
|
704 |
rdp_send_fonts(2); |
if (g_use_rdp5) |
705 |
rdp_recv(&type); /* RDP_PDU_UNKNOWN 0x28 */ |
{ |
706 |
|
rdp_send_fonts(3); |
707 |
|
} |
708 |
|
else |
709 |
|
{ |
710 |
|
rdp_send_fonts(1); |
711 |
|
rdp_send_fonts(2); |
712 |
|
} |
713 |
|
|
714 |
|
rdp_recv(&type); /* RDP_PDU_UNKNOWN 0x28 (Fonts?) */ |
715 |
reset_order_state(); |
reset_order_state(); |
716 |
} |
} |
717 |
|
|
832 |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
833 |
left, top, right, bottom, width, height, Bpp, compress)); |
left, top, right, bottom, width, height, Bpp, compress)); |
834 |
|
|
|
/* Server may limit bpp - this is how we find out */ |
|
|
if (g_server_bpp != bpp) |
|
|
{ |
|
|
warning("Server limited colour depth to %d bits\n", bpp); |
|
|
g_server_bpp = bpp; |
|
|
} |
|
|
|
|
835 |
if (!compress) |
if (!compress) |
836 |
{ |
{ |
837 |
int y; |
int y; |
937 |
|
|
938 |
} |
} |
939 |
|
|
940 |
|
/* Process a disconnect PDU */ |
941 |
|
void |
942 |
|
process_disconnect_pdu(STREAM s, uint32 * ext_disc_reason) |
943 |
|
{ |
944 |
|
in_uint32_le(s, *ext_disc_reason); |
945 |
|
|
946 |
|
DEBUG(("Received disconnect PDU\n")); |
947 |
|
} |
948 |
|
|
949 |
/* Process data PDU */ |
/* Process data PDU */ |
950 |
static void |
static BOOL |
951 |
process_data_pdu(STREAM s) |
process_data_pdu(STREAM s, uint32 * ext_disc_reason) |
952 |
{ |
{ |
953 |
uint8 data_pdu_type; |
uint8 data_pdu_type; |
954 |
|
uint8 ctype; |
955 |
|
uint16 clen; |
956 |
|
int len; |
957 |
|
#if 0 |
958 |
|
int roff, rlen, ret; |
959 |
|
static struct stream ns; |
960 |
|
static signed char *dict = 0; |
961 |
|
#endif |
962 |
|
|
963 |
in_uint8s(s, 8); /* shareid, pad, streamid, length */ |
in_uint8s(s, 6); /* shareid, pad, streamid */ |
964 |
|
in_uint16(s, len); |
965 |
in_uint8(s, data_pdu_type); |
in_uint8(s, data_pdu_type); |
966 |
in_uint8s(s, 3); /* compress_type, compress_len */ |
in_uint8(s, ctype); |
967 |
|
in_uint16(s, clen); |
968 |
|
clen -= 18; |
969 |
|
|
970 |
|
#if 0 |
971 |
|
if (ctype & 0x20) |
972 |
|
{ |
973 |
|
if (!dict) |
974 |
|
{ |
975 |
|
dict = (signed char *) malloc(8200 * sizeof(signed char)); |
976 |
|
dict = (signed char *) memset(dict, 0, 8200 * sizeof(signed char)); |
977 |
|
} |
978 |
|
|
979 |
|
ret = decompress(s->p, clen, ctype, (signed char *) dict, &roff, &rlen); |
980 |
|
|
981 |
|
len -= 18; |
982 |
|
|
983 |
|
ns.data = xrealloc(ns.data, len); |
984 |
|
|
985 |
|
ns.data = (unsigned char *) memcpy(ns.data, (unsigned char *) (dict + roff), len); |
986 |
|
|
987 |
|
ns.size = len; |
988 |
|
ns.end = ns.data + ns.size; |
989 |
|
ns.p = ns.data; |
990 |
|
ns.rdp_hdr = ns.p; |
991 |
|
|
992 |
|
s = &ns; |
993 |
|
} |
994 |
|
#endif |
995 |
|
|
996 |
switch (data_pdu_type) |
switch (data_pdu_type) |
997 |
{ |
{ |
999 |
process_update_pdu(s); |
process_update_pdu(s); |
1000 |
break; |
break; |
1001 |
|
|
1002 |
|
case RDP_DATA_PDU_CONTROL: |
1003 |
|
DEBUG(("Received Control PDU\n")); |
1004 |
|
break; |
1005 |
|
|
1006 |
|
case RDP_DATA_PDU_SYNCHRONISE: |
1007 |
|
DEBUG(("Received Sync PDU\n")); |
1008 |
|
break; |
1009 |
|
|
1010 |
case RDP_DATA_PDU_POINTER: |
case RDP_DATA_PDU_POINTER: |
1011 |
process_pointer_pdu(s); |
process_pointer_pdu(s); |
1012 |
break; |
break; |
1021 |
break; |
break; |
1022 |
|
|
1023 |
case RDP_DATA_PDU_DISCONNECT: |
case RDP_DATA_PDU_DISCONNECT: |
1024 |
/* Normally received when user logs out or disconnects from a |
process_disconnect_pdu(s, ext_disc_reason); |
1025 |
console session on Windows XP and 2003 Server */ |
return True; |
|
DEBUG(("Received disconnect PDU\n")); |
|
|
break; |
|
1026 |
|
|
1027 |
default: |
default: |
1028 |
unimpl("data PDU %d\n", data_pdu_type); |
unimpl("data PDU %d\n", data_pdu_type); |
1029 |
} |
} |
1030 |
|
return False; |
1031 |
} |
} |
1032 |
|
|
1033 |
/* Process incoming packets */ |
/* Process incoming packets */ |
1034 |
BOOL |
void |
1035 |
rdp_main_loop(void) |
rdp_main_loop(BOOL * deactivated, uint32 * ext_disc_reason) |
1036 |
{ |
{ |
1037 |
uint8 type; |
uint8 type; |
1038 |
|
BOOL disc = False; /* True when a disconnect PDU was received */ |
1039 |
STREAM s; |
STREAM s; |
1040 |
|
|
1041 |
while ((s = rdp_recv(&type)) != NULL) |
while ((s = rdp_recv(&type)) != NULL) |
1044 |
{ |
{ |
1045 |
case RDP_PDU_DEMAND_ACTIVE: |
case RDP_PDU_DEMAND_ACTIVE: |
1046 |
process_demand_active(s); |
process_demand_active(s); |
1047 |
|
*deactivated = False; |
1048 |
break; |
break; |
1049 |
|
|
1050 |
case RDP_PDU_DEACTIVATE: |
case RDP_PDU_DEACTIVATE: |
1051 |
DEBUG(("RDP_PDU_DEACTIVATE\n")); |
DEBUG(("RDP_PDU_DEACTIVATE\n")); |
1052 |
/* We thought we could detect a clean |
*deactivated = True; |
|
shutdown of the session by this |
|
|
packet, but it seems Windows 2003 |
|
|
is sending us one of these when we |
|
|
reconnect to a disconnected session |
|
|
return True; */ |
|
1053 |
break; |
break; |
1054 |
|
|
1055 |
case RDP_PDU_DATA: |
case RDP_PDU_DATA: |
1056 |
process_data_pdu(s); |
disc = process_data_pdu(s, ext_disc_reason); |
1057 |
break; |
break; |
1058 |
|
|
1059 |
case 0: |
case 0: |
1062 |
default: |
default: |
1063 |
unimpl("PDU %d\n", type); |
unimpl("PDU %d\n", type); |
1064 |
} |
} |
1065 |
|
|
1066 |
|
if (disc) |
1067 |
|
{ |
1068 |
|
return; |
1069 |
|
} |
1070 |
} |
} |
1071 |
return True; |
return; |
|
/* We want to detect if we got a clean shutdown, but we |
|
|
can't. Se above. |
|
|
return False; */ |
|
1072 |
} |
} |
1073 |
|
|
1074 |
/* Establish a connection up to the RDP layer */ |
/* Establish a connection up to the RDP layer */ |