2 |
rdesktop: A Remote Desktop Protocol client. |
rdesktop: A Remote Desktop Protocol client. |
3 |
Protocol services - RDP layer |
Protocol services - RDP layer |
4 |
Copyright (C) Matthew Chapman 1999-2002 |
Copyright (C) Matthew Chapman 1999-2002 |
5 |
|
|
6 |
This program is free software; you can redistribute it and/or modify |
This program is free software; you can redistribute it and/or modify |
7 |
it under the terms of the GNU General Public License as published by |
it under the terms of the GNU General Public License as published by |
8 |
the Free Software Foundation; either version 2 of the License, or |
the Free Software Foundation; either version 2 of the License, or |
9 |
(at your option) any later version. |
(at your option) any later version. |
10 |
|
|
11 |
This program is distributed in the hope that it will be useful, |
This program is distributed in the hope that it will be useful, |
12 |
but WITHOUT ANY WARRANTY; without even the implied warranty of |
but WITHOUT ANY WARRANTY; without even the implied warranty of |
13 |
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
14 |
GNU General Public License for more details. |
GNU General Public License for more details. |
15 |
|
|
16 |
You should have received a copy of the GNU General Public License |
You should have received a copy of the GNU General Public License |
17 |
along with this program; if not, write to the Free Software |
along with this program; if not, write to the Free Software |
18 |
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
20 |
|
|
21 |
#include "rdesktop.h" |
#include "rdesktop.h" |
22 |
|
|
23 |
extern uint16 mcs_userid; |
extern uint16 g_mcs_userid; |
24 |
extern char username[16]; |
extern char g_username[16]; |
25 |
extern BOOL bitmap_compression; |
extern BOOL g_bitmap_compression; |
26 |
extern BOOL orders; |
extern BOOL g_orders; |
27 |
extern BOOL encryption; |
extern BOOL g_encryption; |
28 |
extern BOOL desktop_save; |
extern BOOL g_desktop_save; |
29 |
extern BOOL use_rdp5; |
extern BOOL g_use_rdp5; |
30 |
extern uint16 server_rdp_version; |
extern uint16 g_server_rdp_version; |
31 |
|
extern int g_server_bpp; |
32 |
|
|
33 |
uint8 *next_packet; |
uint8 *g_next_packet; |
34 |
uint32 rdp_shareid; |
uint32 g_rdp_shareid; |
35 |
|
|
36 |
#if WITH_DEBUG |
#if WITH_DEBUG |
37 |
static uint32 packetno; |
static uint32 g_packetno; |
38 |
#endif |
#endif |
39 |
|
|
40 |
/* Receive an RDP packet */ |
/* Receive an RDP packet */ |
44 |
static STREAM rdp_s; |
static STREAM rdp_s; |
45 |
uint16 length, pdu_type; |
uint16 length, pdu_type; |
46 |
|
|
47 |
if ((rdp_s == NULL) || (next_packet >= rdp_s->end)) |
if ((rdp_s == NULL) || (g_next_packet >= rdp_s->end)) |
48 |
{ |
{ |
49 |
rdp_s = sec_recv(); |
rdp_s = sec_recv(); |
50 |
if (rdp_s == NULL) |
if (rdp_s == NULL) |
51 |
return NULL; |
return NULL; |
52 |
|
|
53 |
next_packet = rdp_s->p; |
g_next_packet = rdp_s->p; |
54 |
} |
} |
55 |
else |
else |
56 |
{ |
{ |
57 |
rdp_s->p = next_packet; |
rdp_s->p = g_next_packet; |
58 |
} |
} |
59 |
|
|
60 |
in_uint16_le(rdp_s, length); |
in_uint16_le(rdp_s, length); |
61 |
/* 32k packets are really 8, keepalive fix */ |
/* 32k packets are really 8, keepalive fix */ |
62 |
if (length == 0x8000) |
if (length == 0x8000) |
63 |
{ |
{ |
64 |
next_packet += 8; |
g_next_packet += 8; |
65 |
*type = 0; |
*type = 0; |
66 |
return rdp_s; |
return rdp_s; |
67 |
} |
} |
70 |
*type = pdu_type & 0xf; |
*type = pdu_type & 0xf; |
71 |
|
|
72 |
#if WITH_DEBUG |
#if WITH_DEBUG |
73 |
DEBUG(("RDP packet #%d, (type %x)\n", ++packetno, *type)); |
DEBUG(("RDP packet #%d, (type %x)\n", ++g_packetno, *type)); |
74 |
// hexdump(next_packet, length); |
hexdump(g_next_packet, length); |
75 |
#endif /* */ |
#endif /* */ |
76 |
|
|
77 |
next_packet += length; |
g_next_packet += length; |
78 |
return rdp_s; |
return rdp_s; |
79 |
} |
} |
80 |
|
|
84 |
{ |
{ |
85 |
STREAM s; |
STREAM s; |
86 |
|
|
87 |
s = sec_init(encryption ? SEC_ENCRYPT : 0, maxlen + 18); |
s = sec_init(g_encryption ? SEC_ENCRYPT : 0, maxlen + 18); |
88 |
s_push_layer(s, rdp_hdr, 18); |
s_push_layer(s, rdp_hdr, 18); |
89 |
|
|
90 |
return s; |
return s; |
101 |
|
|
102 |
out_uint16_le(s, length); |
out_uint16_le(s, length); |
103 |
out_uint16_le(s, (RDP_PDU_DATA | 0x10)); |
out_uint16_le(s, (RDP_PDU_DATA | 0x10)); |
104 |
out_uint16_le(s, (mcs_userid + 1001)); |
out_uint16_le(s, (g_mcs_userid + 1001)); |
105 |
|
|
106 |
out_uint32_le(s, rdp_shareid); |
out_uint32_le(s, g_rdp_shareid); |
107 |
out_uint8(s, 0); /* pad */ |
out_uint8(s, 0); /* pad */ |
108 |
out_uint8(s, 1); /* streamid */ |
out_uint8(s, 1); /* streamid */ |
109 |
out_uint16_le(s, (length - 14)); |
out_uint16_le(s, (length - 14)); |
111 |
out_uint8(s, 0); /* compress_type */ |
out_uint8(s, 0); /* compress_type */ |
112 |
out_uint16(s, 0); /* compress_len */ |
out_uint16(s, 0); /* compress_len */ |
113 |
|
|
114 |
sec_send(s, encryption ? SEC_ENCRYPT : 0); |
sec_send(s, g_encryption ? SEC_ENCRYPT : 0); |
115 |
} |
} |
116 |
|
|
117 |
/* Output a string in Unicode */ |
/* Output a string in Unicode */ |
141 |
int len_password = 2 * strlen(password); |
int len_password = 2 * strlen(password); |
142 |
int len_program = 2 * strlen(program); |
int len_program = 2 * strlen(program); |
143 |
int len_directory = 2 * strlen(directory); |
int len_directory = 2 * strlen(directory); |
144 |
uint32 sec_flags = encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
int len_ip = 2 * strlen("127.0.0.1"); |
145 |
|
int len_dll = 2 * strlen("C:\\WINNT\\System32\\mstscax.dll"); |
146 |
|
int packetlen = 0; |
147 |
|
uint32 sec_flags = g_encryption ? (SEC_LOGON_INFO | SEC_ENCRYPT) : SEC_LOGON_INFO; |
148 |
STREAM s; |
STREAM s; |
149 |
|
|
150 |
if (!use_rdp5 || 1 == server_rdp_version) |
if (!g_use_rdp5 || 1 == g_server_rdp_version) |
151 |
{ |
{ |
152 |
DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); |
DEBUG_RDP5(("Sending RDP4-style Logon packet\n")); |
153 |
|
|
169 |
} |
} |
170 |
else |
else |
171 |
{ |
{ |
172 |
|
flags |= RDP_LOGON_BLOB; |
173 |
DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); |
DEBUG_RDP5(("Sending RDP5-style Logon packet\n")); |
174 |
s = sec_init(sec_flags, 12 + (flags & RDP_LOGON_AUTO ? 2 : 0) + 6 + (flags & RDP_LOGON_AUTO ? len_password : 0) + len_domain + len_user + 4 + len_program + len_directory + 30 + 2 + 60 + 32 + 20 + 32 + 20); /* Phew! */ |
packetlen = 4 + // Unknown uint32 |
175 |
|
4 + // flags |
176 |
|
2 + // len_domain |
177 |
|
2 + // len_user |
178 |
|
(flags & RDP_LOGON_AUTO ? 2 : 0) + // len_password |
179 |
|
(flags & RDP_LOGON_BLOB ? 2 : 0) + // Length of BLOB |
180 |
|
2 + // len_program |
181 |
|
2 + // len_directory |
182 |
|
(0 < len_domain ? len_domain : 2) + // domain |
183 |
|
len_user + (flags & RDP_LOGON_AUTO ? len_password : 0) + 0 + // We have no 512 byte BLOB. Perhaps we must? |
184 |
|
(flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO) ? 2 : 0) + // After the BLOB is a unknown int16. If there is a BLOB, that is. |
185 |
|
(0 < len_program ? len_program : 2) + (0 < len_directory ? len_directory : 2) + 2 + // Unknown (2) |
186 |
|
2 + // Client ip length |
187 |
|
len_ip + // Client ip |
188 |
|
2 + // DLL string length |
189 |
|
len_dll + // DLL string |
190 |
|
2 + // Unknown |
191 |
|
2 + // Unknown |
192 |
|
64 + // Time zone #0 |
193 |
|
2 + // Unknown |
194 |
|
64 + // Time zone #1 |
195 |
|
32; // Unknown |
196 |
|
|
197 |
out_uint32(s, 0); |
s = sec_init(sec_flags, packetlen); |
198 |
|
DEBUG_RDP5(("Called sec_init with packetlen %d\n", packetlen)); |
199 |
|
|
200 |
|
out_uint32(s, 0); // Unknown |
201 |
out_uint32_le(s, flags); |
out_uint32_le(s, flags); |
202 |
out_uint16_le(s, len_domain); |
out_uint16_le(s, len_domain); |
203 |
out_uint16_le(s, len_user); |
out_uint16_le(s, len_user); |
204 |
if (flags & RDP_LOGON_AUTO) |
if (flags & RDP_LOGON_AUTO) |
205 |
{ |
{ |
206 |
out_uint16_le(s, len_password); |
out_uint16_le(s, len_password); |
207 |
|
|
208 |
|
} |
209 |
|
if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) |
210 |
|
{ |
211 |
|
out_uint16_le(s, 0); |
212 |
} |
} |
|
out_uint16(s, 0); /* Seems to be length of a 512 byte blob with |
|
|
completely unknown data, but hopefully we'll do |
|
|
with a 0 length block as well */ |
|
213 |
out_uint16_le(s, len_program); |
out_uint16_le(s, len_program); |
214 |
out_uint16_le(s, len_directory); |
out_uint16_le(s, len_directory); |
215 |
rdp_out_unistr(s, domain, len_domain); |
if (0 < len_domain) |
216 |
|
rdp_out_unistr(s, domain, len_domain); |
217 |
|
else |
218 |
|
out_uint16_le(s, 0); |
219 |
|
rdp_out_unistr(s, user, len_user); |
220 |
if (flags & RDP_LOGON_AUTO) |
if (flags & RDP_LOGON_AUTO) |
221 |
{ |
{ |
222 |
rdp_out_unistr(s, password, len_password); |
rdp_out_unistr(s, password, len_password); |
223 |
} |
} |
224 |
rdp_out_unistr(s, user, len_user); |
if (flags & RDP_LOGON_BLOB && !(flags & RDP_LOGON_AUTO)) |
225 |
out_uint16(s, 0); |
{ |
226 |
out_uint16(s, 0); |
out_uint16_le(s, 0); |
227 |
|
} |
228 |
if (0 < len_program) |
if (0 < len_program) |
229 |
|
{ |
230 |
rdp_out_unistr(s, program, len_program); |
rdp_out_unistr(s, program, len_program); |
231 |
|
|
232 |
|
} |
233 |
|
else |
234 |
|
{ |
235 |
|
out_uint16_le(s, 0); |
236 |
|
} |
237 |
if (0 < len_directory) |
if (0 < len_directory) |
238 |
|
{ |
239 |
rdp_out_unistr(s, directory, len_directory); |
rdp_out_unistr(s, directory, len_directory); |
240 |
out_uint8s(s, 30); /* Some kind of client data - let's see if the server |
} |
241 |
handles zeros well.. */ |
else |
242 |
out_uint16_le(s, 60); |
{ |
243 |
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", 58); |
out_uint16_le(s, 0); |
244 |
out_uint32_be(s, 0x88ffffff); |
} |
245 |
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid") - 2); |
out_uint16_le(s, 2); |
246 |
out_uint8s(s, 30 - 2 * strlen("GTP, normaltid")); |
out_uint16_le(s, len_ip + 2); // Length of client ip |
247 |
|
rdp_out_unistr(s, "127.0.0.1", len_ip); |
248 |
|
out_uint16_le(s, len_dll + 2); |
249 |
|
rdp_out_unistr(s, "C:\\WINNT\\System32\\mstscax.dll", len_dll); |
250 |
|
out_uint16_le(s, 0xffc4); |
251 |
|
out_uint16_le(s, 0xffff); |
252 |
|
rdp_out_unistr(s, "GTB, normaltid", 2 * strlen("GTB, normaltid")); |
253 |
|
out_uint8s(s, 62 - 2 * strlen("GTB, normaltid")); |
254 |
|
|
255 |
|
|
256 |
out_uint32_le(s, 0x0a0000); |
out_uint32_le(s, 0x0a0000); |
257 |
out_uint32_le(s, 0x050000); |
out_uint32_le(s, 0x050000); |
258 |
out_uint32_le(s, 2); |
out_uint32_le(s, 3); |
259 |
out_uint32(s, 0); |
out_uint32_le(s, 0); |
260 |
out_uint32_le(s, 0xffffffc4); |
out_uint32_le(s, 0); |
|
out_uint32_le(s, 0xfffffffe); |
|
|
out_uint32_le(s, 0x0f); |
|
|
out_uint32(s, 0); |
|
261 |
|
|
262 |
rdp_out_unistr(s, "GTB, sommartid", 2 * strlen("GTB, sommartid") - 1); |
rdp_out_unistr(s, "GTB, sommartid", 2 * strlen("GTB, sommartid")); |
263 |
out_uint8s(s, 30 - 2 * strlen("GTP, sommartid")); |
out_uint8s(s, 62 - 2 * strlen("GTB, sommartid")); |
264 |
|
|
265 |
out_uint32_le(s, 0x030000); |
out_uint32_le(s, 0x30000); |
266 |
out_uint32_le(s, 0x050000); |
out_uint32_le(s, 0x050000); |
267 |
out_uint32_le(s, 2); |
out_uint32_le(s, 2); |
268 |
out_uint32(s, 0); |
out_uint32(s, 0); |
271 |
out_uint32_le(s, 0x0f); |
out_uint32_le(s, 0x0f); |
272 |
out_uint32(s, 0); |
out_uint32(s, 0); |
273 |
|
|
274 |
|
|
275 |
} |
} |
276 |
s_mark_end(s); |
s_mark_end(s); |
277 |
sec_send(s, sec_flags); |
sec_send(s, sec_flags); |
358 |
out_uint16_le(s, 0x200); /* Protocol version */ |
out_uint16_le(s, 0x200); /* Protocol version */ |
359 |
out_uint16(s, 0); /* Pad */ |
out_uint16(s, 0); /* Pad */ |
360 |
out_uint16(s, 0); /* Compression types */ |
out_uint16(s, 0); /* Compression types */ |
361 |
out_uint16_le(s, use_rdp5 ? 0x40d : 0); |
out_uint16_le(s, g_use_rdp5 ? 0x40d : 0); |
362 |
/* Pad, according to T.128. 0x40d seems to |
/* Pad, according to T.128. 0x40d seems to |
363 |
trigger |
trigger |
364 |
the server to start sending RDP5 packets. |
the server to start sending RDP5 packets. |
387 |
out_uint16_le(s, 600); /* Desktop height */ |
out_uint16_le(s, 600); /* Desktop height */ |
388 |
out_uint16(s, 0); /* Pad */ |
out_uint16(s, 0); /* Pad */ |
389 |
out_uint16(s, 0); /* Allow resize */ |
out_uint16(s, 0); /* Allow resize */ |
390 |
out_uint16_le(s, bitmap_compression ? 1 : 0); /* Support compression */ |
out_uint16_le(s, g_bitmap_compression ? 1 : 0); /* Support compression */ |
391 |
out_uint16(s, 0); /* Unknown */ |
out_uint16(s, 0); /* Unknown */ |
392 |
out_uint16_le(s, 1); /* Unknown */ |
out_uint16_le(s, 1); /* Unknown */ |
393 |
out_uint16(s, 0); /* Pad */ |
out_uint16(s, 0); /* Pad */ |
408 |
order_caps[8] = 1; /* line */ |
order_caps[8] = 1; /* line */ |
409 |
order_caps[9] = 1; /* line */ |
order_caps[9] = 1; /* line */ |
410 |
order_caps[10] = 1; /* rect */ |
order_caps[10] = 1; /* rect */ |
411 |
order_caps[11] = (desktop_save == False ? 0 : 1); /* desksave */ |
order_caps[11] = (g_desktop_save == False ? 0 : 1); /* desksave */ |
412 |
order_caps[13] = 1; /* memblt */ |
order_caps[13] = 1; /* memblt */ |
413 |
order_caps[14] = 1; /* triblt */ |
order_caps[14] = 1; /* triblt */ |
414 |
order_caps[22] = 1; /* polyline */ |
order_caps[22] = 1; /* polyline */ |
426 |
out_uint8p(s, order_caps, 32); /* Orders supported */ |
out_uint8p(s, order_caps, 32); /* Orders supported */ |
427 |
out_uint16_le(s, 0x6a1); /* Text capability flags */ |
out_uint16_le(s, 0x6a1); /* Text capability flags */ |
428 |
out_uint8s(s, 6); /* Pad */ |
out_uint8s(s, 6); /* Pad */ |
429 |
out_uint32_le(s, desktop_save == False ? 0 : 0x38400); /* Desktop cache size */ |
out_uint32_le(s, g_desktop_save == False ? 0 : 0x38400); /* Desktop cache size */ |
430 |
out_uint32(s, 0); /* Unknown */ |
out_uint32(s, 0); /* Unknown */ |
431 |
out_uint32_le(s, 0x4e4); /* Unknown */ |
out_uint32_le(s, 0x4e4); /* Unknown */ |
432 |
} |
} |
435 |
static void |
static void |
436 |
rdp_out_bmpcache_caps(STREAM s) |
rdp_out_bmpcache_caps(STREAM s) |
437 |
{ |
{ |
438 |
|
int Bpp; |
439 |
out_uint16_le(s, RDP_CAPSET_BMPCACHE); |
out_uint16_le(s, RDP_CAPSET_BMPCACHE); |
440 |
out_uint16_le(s, RDP_CAPLEN_BMPCACHE); |
out_uint16_le(s, RDP_CAPLEN_BMPCACHE); |
441 |
|
|
442 |
|
Bpp = (g_server_bpp + 7) / 8; |
443 |
out_uint8s(s, 24); /* unused */ |
out_uint8s(s, 24); /* unused */ |
444 |
out_uint16_le(s, 0x258); /* entries */ |
out_uint16_le(s, 0x258); /* entries */ |
445 |
out_uint16_le(s, 0x100); /* max cell size */ |
out_uint16_le(s, 0x100 * Bpp); /* max cell size */ |
446 |
out_uint16_le(s, 0x12c); /* entries */ |
out_uint16_le(s, 0x12c); /* entries */ |
447 |
out_uint16_le(s, 0x400); /* max cell size */ |
out_uint16_le(s, 0x400 * Bpp); /* max cell size */ |
448 |
out_uint16_le(s, 0x106); /* entries */ |
out_uint16_le(s, 0x106); /* entries */ |
449 |
out_uint16_le(s, 0x1000); /* max cell size */ |
out_uint16_le(s, 0x1000 * Bpp); /* max cell size */ |
450 |
} |
} |
451 |
|
|
452 |
/* Output control capability set */ |
/* Output control capability set */ |
546 |
rdp_send_confirm_active(void) |
rdp_send_confirm_active(void) |
547 |
{ |
{ |
548 |
STREAM s; |
STREAM s; |
549 |
uint32 sec_flags = encryption ? (RDP5_FLAG | SEC_ENCRYPT) : RDP5_FLAG; |
uint32 sec_flags = g_encryption ? (RDP5_FLAG | SEC_ENCRYPT) : RDP5_FLAG; |
550 |
uint16 caplen = |
uint16 caplen = |
551 |
RDP_CAPLEN_GENERAL + RDP_CAPLEN_BITMAP + RDP_CAPLEN_ORDER + |
RDP_CAPLEN_GENERAL + RDP_CAPLEN_BITMAP + RDP_CAPLEN_ORDER + |
552 |
RDP_CAPLEN_BMPCACHE + RDP_CAPLEN_COLCACHE + |
RDP_CAPLEN_BMPCACHE + RDP_CAPLEN_COLCACHE + |
557 |
|
|
558 |
out_uint16_le(s, 2 + 14 + caplen + sizeof(RDP_SOURCE)); |
out_uint16_le(s, 2 + 14 + caplen + sizeof(RDP_SOURCE)); |
559 |
out_uint16_le(s, (RDP_PDU_CONFIRM_ACTIVE | 0x10)); /* Version 1 */ |
out_uint16_le(s, (RDP_PDU_CONFIRM_ACTIVE | 0x10)); /* Version 1 */ |
560 |
out_uint16_le(s, (mcs_userid + 1001)); |
out_uint16_le(s, (g_mcs_userid + 1001)); |
561 |
|
|
562 |
out_uint32_le(s, rdp_shareid); |
out_uint32_le(s, g_rdp_shareid); |
563 |
out_uint16_le(s, 0x3ea); /* userid */ |
out_uint16_le(s, 0x3ea); /* userid */ |
564 |
out_uint16_le(s, sizeof(RDP_SOURCE)); |
out_uint16_le(s, sizeof(RDP_SOURCE)); |
565 |
out_uint16_le(s, caplen); |
out_uint16_le(s, caplen); |
589 |
{ |
{ |
590 |
uint8 type; |
uint8 type; |
591 |
|
|
592 |
in_uint32_le(s, rdp_shareid); |
in_uint32_le(s, g_rdp_shareid); |
593 |
|
|
594 |
DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", rdp_shareid)); |
DEBUG(("DEMAND_ACTIVE(id=0x%x)\n", g_rdp_shareid)); |
595 |
|
|
596 |
rdp_send_confirm_active(); |
rdp_send_confirm_active(); |
597 |
rdp_send_synchronise(); |
rdp_send_synchronise(); |
607 |
reset_order_state(); |
reset_order_state(); |
608 |
} |
} |
609 |
|
|
|
/* Process a null system pointer PDU */ |
|
|
void |
|
|
process_null_system_pointer_pdu(STREAM s) |
|
|
{ |
|
|
// FIXME: We should probably set another cursor here, |
|
|
// like the X window system base cursor or something. |
|
|
ui_set_cursor(cache_get_cursor(0)); |
|
|
} |
|
|
|
|
610 |
/* Process a colour pointer PDU */ |
/* Process a colour pointer PDU */ |
611 |
void |
void |
612 |
process_colour_pointer_pdu(STREAM s) |
process_colour_pointer_pdu(STREAM s) |
639 |
ui_set_cursor(cache_get_cursor(cache_idx)); |
ui_set_cursor(cache_get_cursor(cache_idx)); |
640 |
} |
} |
641 |
|
|
642 |
|
/* Process a system pointer PDU */ |
643 |
|
void |
644 |
|
process_system_pointer_pdu(STREAM s) |
645 |
|
{ |
646 |
|
uint16 system_pointer_type; |
647 |
|
|
648 |
|
in_uint16(s, system_pointer_type); |
649 |
|
switch (system_pointer_type) |
650 |
|
{ |
651 |
|
case RDP_NULL_POINTER: |
652 |
|
ui_set_null_cursor(); |
653 |
|
break; |
654 |
|
|
655 |
|
default: |
656 |
|
unimpl("System pointer message 0x%x\n", system_pointer_type); |
657 |
|
} |
658 |
|
} |
659 |
|
|
660 |
/* Process a pointer PDU */ |
/* Process a pointer PDU */ |
661 |
static void |
static void |
684 |
process_cached_pointer_pdu(s); |
process_cached_pointer_pdu(s); |
685 |
break; |
break; |
686 |
|
|
687 |
|
case RDP_POINTER_SYSTEM: |
688 |
|
process_system_pointer_pdu(s); |
689 |
|
break; |
690 |
|
|
691 |
default: |
default: |
692 |
DEBUG(("Pointer message 0x%x\n", message_type)); |
unimpl("Pointer message 0x%x\n", message_type); |
693 |
} |
} |
694 |
} |
} |
695 |
|
|
724 |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
DEBUG(("BITMAP_UPDATE(l=%d,t=%d,r=%d,b=%d,w=%d,h=%d,Bpp=%d,cmp=%d)\n", |
725 |
left, top, right, bottom, width, height, Bpp, compress)); |
left, top, right, bottom, width, height, Bpp, compress)); |
726 |
|
|
727 |
|
/* Server may limit bpp - this is how we find out */ |
728 |
|
if (g_server_bpp != bpp) { |
729 |
|
warning("Server limited colour depth to %d bits\n", bpp); |
730 |
|
g_server_bpp = bpp; |
731 |
|
} |
732 |
|
|
733 |
if (!compress) |
if (!compress) |
734 |
{ |
{ |
735 |
int y; |
int y; |
736 |
bmpdata = xmalloc(width * height * Bpp); |
bmpdata = (uint8 *) xmalloc(width * height * Bpp); |
737 |
for (y = 0; y < height; y++) |
for (y = 0; y < height; y++) |
738 |
{ |
{ |
739 |
in_uint8a(s, &bmpdata[(height - y - 1) * (width * Bpp)], |
in_uint8a(s, &bmpdata[(height - y - 1) * (width * Bpp)], |
756 |
in_uint8s(s, 4); /* line_size, final_size */ |
in_uint8s(s, 4); /* line_size, final_size */ |
757 |
} |
} |
758 |
in_uint8p(s, data, size); |
in_uint8p(s, data, size); |
759 |
bmpdata = xmalloc(width * height * Bpp); |
bmpdata = (uint8 *) xmalloc(width * height * Bpp); |
760 |
if (bitmap_decompress(bmpdata, width, height, data, size, Bpp)) |
if (bitmap_decompress(bmpdata, width, height, data, size, Bpp)) |
761 |
{ |
{ |
762 |
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata); |
ui_paint_bitmap(left, top, cx, cy, width, height, bmpdata); |
783 |
in_uint16_le(s, map.ncolours); |
in_uint16_le(s, map.ncolours); |
784 |
in_uint8s(s, 2); /* pad */ |
in_uint8s(s, 2); /* pad */ |
785 |
|
|
786 |
map.colours = xmalloc(3 * map.ncolours); |
map.colours = (COLOURENTRY *) xmalloc(sizeof(COLOURENTRY) * map.ncolours); |
787 |
|
|
788 |
DEBUG(("PALETTE(c=%d)\n", map.ncolours)); |
DEBUG(("PALETTE(c=%d)\n", map.ncolours)); |
789 |
|
|
870 |
} |
} |
871 |
|
|
872 |
/* Process incoming packets */ |
/* Process incoming packets */ |
873 |
void |
BOOL |
874 |
rdp_main_loop(void) |
rdp_main_loop(void) |
875 |
{ |
{ |
876 |
uint8 type; |
uint8 type; |
885 |
break; |
break; |
886 |
|
|
887 |
case RDP_PDU_DEACTIVATE: |
case RDP_PDU_DEACTIVATE: |
888 |
|
DEBUG(("RDP_PDU_DEACTIVATE\n")); |
889 |
|
/* We thought we could detect a clean |
890 |
|
shutdown of the session by this |
891 |
|
packet, but it seems Windows 2003 |
892 |
|
is sending us one of these when we |
893 |
|
reconnect to a disconnected session |
894 |
|
return True; */ |
895 |
break; |
break; |
896 |
|
|
897 |
case RDP_PDU_DATA: |
case RDP_PDU_DATA: |
905 |
unimpl("PDU %d\n", type); |
unimpl("PDU %d\n", type); |
906 |
} |
} |
907 |
} |
} |
908 |
|
return True; |
909 |
|
/* We want to detect if we got a clean shutdown, but we |
910 |
|
can't. Se above. |
911 |
|
return False; */ |
912 |
} |
} |
913 |
|
|
914 |
/* Establish a connection up to the RDP layer */ |
/* Establish a connection up to the RDP layer */ |
916 |
rdp_connect(char *server, uint32 flags, char *domain, char *password, |
rdp_connect(char *server, uint32 flags, char *domain, char *password, |
917 |
char *command, char *directory) |
char *command, char *directory) |
918 |
{ |
{ |
919 |
if (!sec_connect(server, username)) |
if (!sec_connect(server, g_username)) |
920 |
return False; |
return False; |
921 |
|
|
922 |
rdp_send_logon_info(flags, domain, username, password, command, directory); |
rdp_send_logon_info(flags, domain, g_username, password, command, directory); |
923 |
return True; |
return True; |
924 |
} |
} |
925 |
|
|