29 |
extern BOOL g_desktop_save; |
extern BOOL g_desktop_save; |
30 |
extern BOOL g_use_rdp5; |
extern BOOL g_use_rdp5; |
31 |
extern uint16 g_server_rdp_version; |
extern uint16 g_server_rdp_version; |
32 |
|
extern uint32 g_rdp5_performanceflags; |
33 |
extern int g_server_bpp; |
extern int g_server_bpp; |
34 |
|
|
35 |
uint8 *g_next_packet; |
uint8 *g_next_packet; |
133 |
s->p += len; |
s->p += len; |
134 |
} |
} |
135 |
|
|
136 |
|
/* Input a string in Unicode |
137 |
|
* |
138 |
|
* Returns str_len of string |
139 |
|
*/ |
140 |
|
int |
141 |
|
rdp_in_unistr(STREAM s, char *string, int uni_len) |
142 |
|
{ |
143 |
|
int i = 0; |
144 |
|
|
145 |
|
while (i < uni_len / 2) |
146 |
|
{ |
147 |
|
in_uint8a(s, &string[i++], 1); |
148 |
|
in_uint8s(s, 1); |
149 |
|
} |
150 |
|
|
151 |
|
return i - 1; |
152 |
|
} |
153 |
|
|
154 |
|
|
155 |
/* Parse a logon info packet */ |
/* Parse a logon info packet */ |
156 |
static void |
static void |
157 |
rdp_send_logon_info(uint32 flags, char *domain, char *user, |
rdp_send_logon_info(uint32 flags, char *domain, char *user, |
158 |
char *password, char *program, char *directory) |
char *password, char *program, char *directory) |
159 |
{ |
{ |
160 |
|
char *ipaddr = tcp_get_address(); |
161 |
int len_domain = 2 * strlen(domain); |
int len_domain = 2 * strlen(domain); |
162 |
int len_user = 2 * strlen(user); |
int len_user = 2 * strlen(user); |
163 |
int len_password = 2 * strlen(password); |
int len_password = 2 * strlen(password); |
164 |
int len_program = 2 * strlen(program); |
int len_program = 2 * strlen(program); |
165 |
int len_directory = 2 * strlen(directory); |
int len_directory = 2 * strlen(directory); |
166 |
int len_ip = 2 * strlen("127.0.0.1"); |
int len_ip = 2 * strlen(ipaddr); |
167 |
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
168 |
int packetlen = 0; |
int packetlen = 0; |
169 |
uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
171 |
time_t t = time(NULL); |
time_t t = time(NULL); |
172 |
time_t tzone; |
time_t tzone; |
173 |
|
|
174 |
|
#if 0 |
175 |
|
// enable rdp compression |
176 |
|
flags |= RDP_COMPRESSION; |
177 |
|
#endif |
178 |
|
|
179 |
if (!g_use_rdp5 || 1 == g_server_rdp_version) |
if (!g_use_rdp5 || 1 == g_server_rdp_version) |
180 |
{ |
{ |
181 |
DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); |
DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); |
273 |
} |
} |
274 |
out_uint16_le(s, 2); |
out_uint16_le(s, 2); |
275 |
out_uint16_le(s, len_ip + 2); /* Length of client ip */ |
out_uint16_le(s, len_ip + 2); /* Length of client ip */ |
276 |
rdp_out_unistr(s, "127.0.0.1", len_ip); |
rdp_out_unistr(s, ipaddr, len_ip); |
277 |
out_uint16_le(s, len_dll + 2); |
out_uint16_le(s, len_dll + 2); |
278 |
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
279 |
|
|
280 |
tzone = (mktime(localtime(&t)) - mktime(gmtime(&t))) / 60; |
tzone = (mktime(gmtime(&t)) - mktime(localtime(&t))) / 60; |
281 |
out_uint16_le(s, tzone); |
out_uint32_le(s, tzone); |
|
out_uint16_le(s, 0x0000); |
|
282 |
|
|
283 |
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); |
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); |
284 |
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); |
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); |
285 |
|
|
|
|
|
286 |
out_uint32_le(s, 0x0a0000); |
out_uint32_le(s, 0x0a0000); |
287 |
out_uint32_le(s, 0x050000); |
out_uint32_le(s, 0x050000); |
288 |
out_uint32_le(s, 3); |
out_uint32_le(s, 3); |
298 |
out_uint32(s, 0); |
out_uint32(s, 0); |
299 |
out_uint32_le(s, 0xffffffc4); |
out_uint32_le(s, 0xffffffc4); |
300 |
out_uint32_le(s, 0xfffffffe); |
out_uint32_le(s, 0xfffffffe); |
301 |
out_uint32_le(s, 0x0f); |
out_uint32_le(s, g_rdp5_performanceflags); |
302 |
out_uint32(s, 0); |
out_uint32(s, 0); |
303 |
|
|
304 |
|
|
409 |
out_uint16_le(s, RDP_CAPSET_BITMAP); |
out_uint16_le(s, RDP_CAPSET_BITMAP); |
410 |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
out_uint16_le(s, RDP_CAPLEN_BITMAP); |
411 |
|
|
412 |
out_uint16_le(s, 8); /* Preferred BPP */ |
out_uint16_le(s, g_server_bpp); /* Preferred BPP */ |
413 |
out_uint16_le(s, 1); /* Receive 1 BPP */ |
out_uint16_le(s, 1); /* Receive 1 BPP */ |
414 |
out_uint16_le(s, 1); /* Receive 4 BPP */ |
out_uint16_le(s, 1); /* Receive 4 BPP */ |
415 |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
out_uint16_le(s, 1); /* Receive 8 BPP */ |
618 |
process_demand_active(STREAM s) |
process_demand_active(STREAM s) |
619 |
{ |
{ |
620 |
uint8 type; |
uint8 type; |
621 |
|
uint16 i; |
622 |
|
uint16 p_bpp; |
623 |
|
|
624 |
in_uint32_le(s, g_rdp_shareid); |
in_uint32_le(s, g_rdp_shareid); |
625 |
|
|
626 |
|
/* scan for prefered bpp */ |
627 |
|
while (s_check_rem(s, 6)) |
628 |
|
{ |
629 |
|
in_uint16_le(s, i); |
630 |
|
if (i == RDP_CAPSET_BITMAP) |
631 |
|
{ |
632 |
|
in_uint16_le(s, i); |
633 |
|
if (i == RDP_CAPLEN_BITMAP) |
634 |
|
{ |
635 |
|
in_uint16_le(s, p_bpp); |
636 |
|
if (p_bpp == 8 || p_bpp == 15 || p_bpp == 16 || p_bpp == 24) |
637 |
|
{ |
638 |
|
if (p_bpp < g_server_bpp) |
639 |
|
{ |
640 |
|
warning("Server limited colour depth to %d bits\n", p_bpp); |
641 |
|
g_server_bpp = p_bpp; |
642 |
|
} |
643 |
|
break; |
644 |
|
} |
645 |
|
} |
646 |
|
} |
647 |
|
} |
648 |
|
|
649 |
|
|
650 |
DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", g_rdp_shareid)); |
DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", g_rdp_shareid)); |
651 |
|
|
652 |
rdp_send_confirm_active(); |
rdp_send_confirm_active(); |
780 |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
781 |
left, top, right, bottom, width, height, Bpp, compress)); |
left, top, right, bottom, width, height, Bpp, compress)); |
782 |
|
|
|
/* Server may limit bpp - this is how we find out */ |
|
|
if (g_server_bpp != bpp) |
|
|
{ |
|
|
warning("Server limited colour depth to %d bits\n", bpp); |
|
|
g_server_bpp = bpp; |
|
|
} |
|
|
|
|
783 |
if (!compress) |
if (!compress) |
784 |
{ |
{ |
785 |
int y; |
int y; |
890 |
process_data_pdu(STREAM s) |
process_data_pdu(STREAM s) |
891 |
{ |
{ |
892 |
uint8 data_pdu_type; |
uint8 data_pdu_type; |
893 |
|
uint8 ctype; |
894 |
|
uint16 clen; |
895 |
|
int roff, rlen, len, ret; |
896 |
|
static struct stream ns; |
897 |
|
static signed char *dict = 0; |
898 |
|
|
899 |
in_uint8s(s, 8); /* shareid, pad, streamid, length */ |
in_uint8s(s, 6); /* shareid, pad, streamid */ |
900 |
|
in_uint16(s, len); |
901 |
in_uint8(s, data_pdu_type); |
in_uint8(s, data_pdu_type); |
902 |
in_uint8s(s, 3); /* compress_type, compress_len */ |
in_uint8(s, ctype); |
903 |
|
in_uint16(s, clen); |
904 |
|
clen -= 18; |
905 |
|
|
906 |
|
#if 0 |
907 |
|
if (ctype & 0x20) |
908 |
|
{ |
909 |
|
if (!dict) |
910 |
|
{ |
911 |
|
dict = (signed char *) malloc(8200 * sizeof(signed char)); |
912 |
|
dict = (signed char *) memset(dict, 0, 8200 * sizeof(signed char)); |
913 |
|
} |
914 |
|
|
915 |
|
ret = decompress(s->p, clen, ctype, (signed char *) dict, &roff, &rlen); |
916 |
|
|
917 |
|
len -= 18; |
918 |
|
|
919 |
|
ns.data = xrealloc(ns.data, len); |
920 |
|
|
921 |
|
ns.data = (unsigned char *) memcpy(ns.data, (unsigned char *) (dict + roff), len); |
922 |
|
|
923 |
|
ns.size = len; |
924 |
|
ns.end = ns.data + ns.size; |
925 |
|
ns.p = ns.data; |
926 |
|
ns.rdp_hdr = ns.p; |
927 |
|
|
928 |
|
s = &ns; |
929 |
|
} |
930 |
|
#endif |
931 |
|
|
932 |
switch (data_pdu_type) |
switch (data_pdu_type) |
933 |
{ |
{ |