20#include <freerdp/config.h>
24#include <winpr/assert.h>
25#include <winpr/cast.h>
27#include "activation.h"
30#define TAG FREERDP_TAG("core.activation")
32static BOOL rdp_recv_client_font_list_pdu(
wStream* s);
33static BOOL rdp_recv_client_persistent_key_list_pdu(
wStream* s);
34static BOOL rdp_send_server_font_map_pdu(rdpRdp* rdp);
36static BOOL rdp_write_synchronize_pdu(
wStream* s,
const rdpSettings* settings)
40 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 4))
42 Stream_Write_UINT16(s, SYNCMSGTYPE_SYNC);
43 Stream_Write_UINT16(s,
44 WINPR_ASSERTING_INT_CAST(uint16_t, PduSource));
48static BOOL rdp_recv_sync_pdu(rdpRdp* rdp,
wStream* s,
const char* what)
51 UINT16 targetUser = 0;
54 if (!Stream_CheckAndLogRequiredLengthEx(TAG, WLOG_WARN, s, 4, 1,
"%s(%s:%" PRIuz
") %s",
55 __func__, __FILE__, (
size_t)__LINE__, what))
57 Stream_Read_UINT16(s, msgType);
58 if (msgType != SYNCMSGTYPE_SYNC)
60 WLog_WARN(TAG,
"%s: Invalid messageType=0x%04" PRIx16
", expected 0x%04" PRIx16, what,
61 msgType, SYNCMSGTYPE_SYNC);
64 Stream_Read_UINT16(s, targetUser);
65 WLog_VRB(TAG,
"%s: targetUser=0x%04" PRIx16, what, targetUser);
69BOOL rdp_recv_server_synchronize_pdu(rdpRdp* rdp,
wStream* s)
71 if (!rdp_recv_sync_pdu(rdp, s,
"[MS-RDPBCGR] 2.2.1.19 Server Synchronize PDU"))
73 return rdp_finalize_set_flag(rdp, FINALIZE_SC_SYNCHRONIZE_PDU);
76BOOL rdp_send_server_synchronize_pdu(rdpRdp* rdp)
79 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
84 if (!rdp_write_synchronize_pdu(s, rdp->settings))
90 WINPR_ASSERT(rdp->mcs);
91 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SYNCHRONIZE, rdp->mcs->userId, sec_flags);
94BOOL rdp_recv_client_synchronize_pdu(rdpRdp* rdp,
wStream* s)
96 if (!rdp_recv_sync_pdu(rdp, s,
"[MS-RDPBCGR] 2.2.1.14 Client Synchronize PDU"))
98 return rdp_finalize_set_flag(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
101BOOL rdp_send_client_synchronize_pdu(rdpRdp* rdp)
103 UINT16 sec_flags = 0;
104 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
109 if (!rdp_write_synchronize_pdu(s, rdp->settings))
111 Stream_Free(s, TRUE);
115 WINPR_ASSERT(rdp->mcs);
116 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SYNCHRONIZE, rdp->mcs->userId, sec_flags);
119static BOOL rdp_recv_control_pdu(
wStream* s, UINT16* action, UINT16* grantId, UINT32* controlId)
122 WINPR_ASSERT(action);
123 WINPR_ASSERT(grantId);
124 WINPR_ASSERT(controlId);
126 if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
129 Stream_Read_UINT16(s, *action);
130 Stream_Read_UINT16(s, *grantId);
131 Stream_Read_UINT32(s, *controlId);
135static BOOL rdp_write_client_control_pdu(
wStream* s, UINT16 action, UINT16 grantId,
139 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 8))
141 Stream_Write_UINT16(s, action);
142 Stream_Write_UINT16(s, grantId);
143 Stream_Write_UINT32(s, controlId);
147BOOL rdp_recv_server_control_pdu(rdpRdp* rdp,
wStream* s)
151 UINT32 controlId = 0;
156 if (!rdp_recv_control_pdu(s, &action, &grantId, &controlId))
161 case CTRLACTION_COOPERATE:
162 return rdp_finalize_set_flag(rdp, FINALIZE_SC_CONTROL_COOPERATE_PDU);
164 case CTRLACTION_GRANTED_CONTROL:
165 rdp->resendFocus = TRUE;
166 return rdp_finalize_set_flag(rdp, FINALIZE_SC_CONTROL_GRANTED_PDU);
169 char buffer[128] = { 0 };
170 WLog_WARN(TAG,
"Unexpected control PDU %s",
171 rdp_ctrlaction_string(action, buffer,
sizeof(buffer)));
178BOOL rdp_send_server_control_cooperate_pdu(rdpRdp* rdp)
180 UINT16 sec_flags = 0;
181 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
184 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 8))
186 Stream_Free(s, TRUE);
189 Stream_Write_UINT16(s, CTRLACTION_COOPERATE);
190 Stream_Write_UINT16(s, 0);
191 Stream_Write_UINT32(s, 0);
193 WINPR_ASSERT(rdp->mcs);
194 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_CONTROL, rdp->mcs->userId, sec_flags);
197BOOL rdp_send_server_control_granted_pdu(rdpRdp* rdp)
199 UINT16 sec_flags = 0;
200 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
203 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 8))
205 Stream_Free(s, TRUE);
209 WINPR_ASSERT(rdp->mcs);
210 Stream_Write_UINT16(s, CTRLACTION_GRANTED_CONTROL);
211 Stream_Write_UINT16(s, rdp->mcs->userId);
212 Stream_Write_UINT32(s, 0x03EA);
213 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_CONTROL, rdp->mcs->userId, sec_flags);
216BOOL rdp_send_client_control_pdu(rdpRdp* rdp, UINT16 action)
219 UINT16 ControlId = 0;
223 case CTRLACTION_COOPERATE:
224 case CTRLACTION_REQUEST_CONTROL:
228 "Invalid client control PDU::action 0x%04" PRIx16
", not allowed by client",
233 UINT16 sec_flags = 0;
234 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
237 if (!rdp_write_client_control_pdu(s, action, GrantId, ControlId))
239 Stream_Free(s, TRUE);
243 WINPR_ASSERT(rdp->mcs);
244 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_CONTROL, rdp->mcs->userId, sec_flags);
247static BOOL rdp_write_client_persistent_key_list_pdu(
wStream* s,
253 if (!Stream_EnsureRemainingCapacity(s, 24))
256 Stream_Write_UINT16(s, info->numEntriesCache0);
257 Stream_Write_UINT16(s, info->numEntriesCache1);
258 Stream_Write_UINT16(s, info->numEntriesCache2);
259 Stream_Write_UINT16(s, info->numEntriesCache3);
260 Stream_Write_UINT16(s, info->numEntriesCache4);
261 Stream_Write_UINT16(s, info->totalEntriesCache0);
262 Stream_Write_UINT16(s, info->totalEntriesCache1);
263 Stream_Write_UINT16(s, info->totalEntriesCache2);
264 Stream_Write_UINT16(s, info->totalEntriesCache3);
265 Stream_Write_UINT16(s, info->totalEntriesCache4);
266 Stream_Write_UINT8(s, PERSIST_FIRST_PDU | PERSIST_LAST_PDU);
267 Stream_Write_UINT8(s, 0);
268 Stream_Write_UINT16(s, 0);
271 if (!Stream_EnsureRemainingCapacity(s, info->keyCount * 8ull))
274 for (UINT32 index = 0; index < info->keyCount; index++)
276 const UINT64 val = info->keyList[index];
277 Stream_Write_UINT64(s, val);
283static UINT16 rdp_load_persistent_key_list(rdpRdp* rdp, UINT64** pKeyList)
286 UINT64* keyList = NULL;
287 rdpPersistentCache* persistent = NULL;
288 rdpSettings* settings = rdp->settings;
295 if (!settings->BitmapCachePersistFile)
298 persistent = persistent_cache_new();
304 persistent_cache_open(persistent, settings->BitmapCachePersistFile, FALSE, 0);
309 const int count = persistent_cache_get_count(persistent);
310 if ((count < 0) || (count > UINT16_MAX))
313 keyCount = (UINT16)count;
314 keyList = (UINT64*)calloc(keyCount,
sizeof(UINT64));
319 for (
int index = 0; index < count; index++)
323 if (persistent_cache_read_entry(persistent, &cacheEntry) < 1)
326 keyList[index] = cacheEntry.key64;
331 persistent_cache_free(persistent);
334 persistent_cache_free(persistent);
339BOOL rdp_send_client_persistent_key_list_pdu(rdpRdp* rdp)
341 UINT16 keyMaxFrag = 2042;
342 UINT64* keyList = NULL;
345 rdpSettings* settings = rdp->settings;
346 UINT16 keyCount = rdp_load_persistent_key_list(rdp, &keyList);
348 WLog_DBG(TAG,
"Persistent Key List: TotalKeyCount: %" PRIu16
" MaxKeyFrag: %" PRIu16, keyCount,
357 if (keyCount > keyMaxFrag)
358 keyCount = keyMaxFrag;
360 WINPR_ASSERT(settings->BitmapCacheV2CellInfo[0].numEntries <= UINT16_MAX);
361 info.totalEntriesCache0 = (UINT16)settings->BitmapCacheV2CellInfo[0].numEntries;
363 WINPR_ASSERT(settings->BitmapCacheV2CellInfo[1].numEntries <= UINT16_MAX);
364 info.totalEntriesCache1 = (UINT16)settings->BitmapCacheV2CellInfo[1].numEntries;
366 WINPR_ASSERT(settings->BitmapCacheV2CellInfo[2].numEntries <= UINT16_MAX);
367 info.totalEntriesCache2 = (UINT16)settings->BitmapCacheV2CellInfo[2].numEntries;
369 WINPR_ASSERT(settings->BitmapCacheV2CellInfo[3].numEntries <= UINT16_MAX);
370 info.totalEntriesCache3 = (UINT16)settings->BitmapCacheV2CellInfo[3].numEntries;
372 WINPR_ASSERT(settings->BitmapCacheV2CellInfo[4].numEntries <= UINT16_MAX);
373 info.totalEntriesCache4 = (UINT16)settings->BitmapCacheV2CellInfo[4].numEntries;
375 info.numEntriesCache0 = MIN(keyCount, info.totalEntriesCache0);
376 keyCount -= info.numEntriesCache0;
377 info.numEntriesCache1 = MIN(keyCount, info.totalEntriesCache1);
378 keyCount -= info.numEntriesCache1;
379 info.numEntriesCache2 = MIN(keyCount, info.totalEntriesCache2);
380 keyCount -= info.numEntriesCache2;
381 info.numEntriesCache3 = MIN(keyCount, info.totalEntriesCache3);
382 keyCount -= info.numEntriesCache3;
383 info.numEntriesCache4 = MIN(keyCount, info.totalEntriesCache4);
385 info.totalEntriesCache0 = info.numEntriesCache0;
386 info.totalEntriesCache1 = info.numEntriesCache1;
387 info.totalEntriesCache2 = info.numEntriesCache2;
388 info.totalEntriesCache3 = info.numEntriesCache3;
389 info.totalEntriesCache4 = info.numEntriesCache4;
391 keyCount = info.totalEntriesCache0 + info.totalEntriesCache1 + info.totalEntriesCache2 +
392 info.totalEntriesCache3 + info.totalEntriesCache4;
394 info.keyCount = keyCount;
395 info.keyList = keyList;
397 WLog_DBG(TAG,
"persistentKeyList count: %" PRIu32, info.keyCount);
400 "numEntriesCache: [0]: %" PRIu16
" [1]: %" PRIu16
" [2]: %" PRIu16
" [3]: %" PRIu16
402 info.numEntriesCache0, info.numEntriesCache1, info.numEntriesCache2,
403 info.numEntriesCache3, info.numEntriesCache4);
406 "totalEntriesCache: [0]: %" PRIu16
" [1]: %" PRIu16
" [2]: %" PRIu16
" [3]: %" PRIu16
408 info.totalEntriesCache0, info.totalEntriesCache1, info.totalEntriesCache2,
409 info.totalEntriesCache3, info.totalEntriesCache4);
411 UINT16 sec_flags = 0;
412 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
420 if (!rdp_write_client_persistent_key_list_pdu(s, &info))
422 Stream_Free(s, TRUE);
427 WINPR_ASSERT(rdp->mcs);
430 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST, rdp->mcs->userId,
434BOOL rdp_recv_client_font_list_pdu(
wStream* s)
438 if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
441 return Stream_SafeSeek(s, 8);
444BOOL rdp_recv_client_persistent_key_list_pdu(
wStream* s)
454 if (!Stream_CheckAndLogRequiredLength(TAG, s, 21))
456 WLog_ERR(TAG,
"short TS_BITMAPCACHE_PERSISTENT_LIST_PDU, need 21 bytes, got %" PRIuz,
457 Stream_GetRemainingLength(s));
461 for (
size_t x = 0; x < 5; x++)
463 Stream_Read_UINT16(s, cache);
468 for (
size_t x = 0; x < 5; x++)
471 Stream_Read_UINT16(s, tmp);
478 "TS_BITMAPCACHE_PERSISTENT_LIST_PDU::totalEntriesCacheX exceeds 262144 entries");
482 Stream_Read_UINT8(s, flags);
483 if ((flags & ~(PERSIST_LAST_PDU | PERSIST_FIRST_PDU)) != 0)
486 "TS_BITMAPCACHE_PERSISTENT_LIST_PDU::bBitMask has an invalid value of 0x%02" PRIx8,
492 if (!Stream_SafeSeek(s, 3))
494 WLog_ERR(TAG,
"short TS_BITMAPCACHE_PERSISTENT_LIST_PDU, need 3 bytes, got %" PRIuz,
495 Stream_GetRemainingLength(s));
499 if (!Stream_SafeSeek(s, count *
sizeof(UINT64)))
502 "short TS_BITMAPCACHE_PERSISTENT_LIST_PDU, need %" PRIuz
" bytes, got %" PRIuz,
503 count *
sizeof(UINT64), Stream_GetRemainingLength(s));
509static BOOL rdp_write_client_font_list_pdu(
wStream* s, UINT16 flags)
513 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 8))
515 Stream_Write_UINT16(s, 0);
516 Stream_Write_UINT16(s, 0);
517 Stream_Write_UINT16(s, flags);
518 Stream_Write_UINT16(s, 50);
522BOOL rdp_send_client_font_list_pdu(rdpRdp* rdp, UINT16 flags)
524 UINT16 sec_flags = 0;
525 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
528 if (!rdp_write_client_font_list_pdu(s, flags))
530 Stream_Free(s, TRUE);
534 WINPR_ASSERT(rdp->mcs);
535 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_FONT_LIST, rdp->mcs->userId, sec_flags);
538BOOL rdp_recv_font_map_pdu(rdpRdp* rdp,
wStream* s)
540 UINT16 numberEntries = 0;
541 UINT16 totalNumEntries = 0;
543 UINT16 entrySize = 0;
546 WINPR_ASSERT(rdp->settings);
551 if (Stream_CheckAndLogRequiredLength(TAG, s, 8))
553 Stream_Read_UINT16(s, numberEntries);
554 if (numberEntries != 0)
557 "[MS-RDPBCGR] 2.2.1.22.1 Font Map PDU Data (TS_FONT_MAP_PDU)::numberEntries != 0 "
560 Stream_Read_UINT16(s, totalNumEntries);
561 if (totalNumEntries != 0)
564 "[MS-RDPBCGR] 2.2.1.22.1 Font Map PDU Data (TS_FONT_MAP_PDU)::totalNumEntries != "
567 Stream_Read_UINT16(s, mapFlags);
568 if (mapFlags != (FONTLIST_FIRST | FONTLIST_LAST))
571 "[MS-RDPBCGR] 2.2.1.22.1 Font Map PDU Data (TS_FONT_MAP_PDU)::mapFlags != 0x0003 "
572 "(FONTLIST_FIRST | FONTLIST_LAST) "
575 Stream_Read_UINT16(s, entrySize);
578 "[MS-RDPBCGR] 2.2.1.22.1 Font Map PDU Data (TS_FONT_MAP_PDU)::entrySize != 4 "
584 "[MS-RDPBCGR] 2.2.1.22.1 Font Map PDU Data (TS_FONT_MAP_PDU) paylaod size is "
587 return rdp_finalize_set_flag(rdp, FINALIZE_SC_FONT_MAP_PDU);
590BOOL rdp_send_server_font_map_pdu(rdpRdp* rdp)
592 UINT16 sec_flags = 0;
593 wStream* s = rdp_data_pdu_init(rdp, &sec_flags);
596 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 8))
598 Stream_Free(s, TRUE);
601 Stream_Write_UINT16(s, 0);
602 Stream_Write_UINT16(s, 0);
603 Stream_Write_UINT16(s, FONTLIST_FIRST | FONTLIST_LAST);
604 Stream_Write_UINT16(s, 4);
606 WINPR_ASSERT(rdp->mcs);
607 return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_FONT_MAP, rdp->mcs->userId, sec_flags);
610BOOL rdp_recv_deactivate_all(rdpRdp* rdp,
wStream* s)
612 UINT16 lengthSourceDescriptor = 0;
617 if (rdp_get_state(rdp) == CONNECTION_STATE_ACTIVE)
619 if (!rdp_finalize_set_flag(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
622 rdp->was_deactivated = TRUE;
632 WINPR_ASSERT(rdp->settings);
633 if (Stream_GetRemainingLength(s) > 0)
638 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
641 Stream_Read_UINT32(s, ShareId);
645 if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
648 Stream_Read_UINT16(s, lengthSourceDescriptor);
650 if (!Stream_CheckAndLogRequiredLength(TAG, s, lengthSourceDescriptor))
653 Stream_Seek(s, lengthSourceDescriptor);
657 return rdp_client_transition_to_state(rdp,
658 CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
661BOOL rdp_send_deactivate_all(rdpRdp* rdp)
663 UINT16 sec_flags = 0;
664 wStream* s = rdp_send_stream_pdu_init(rdp, &sec_flags);
670 if (!Stream_CheckAndLogRequiredCapacity(TAG, (s), 7))
673 WINPR_ASSERT(rdp->settings);
675 Stream_Write_UINT32(s, ShareId);
676 Stream_Write_UINT16(s, 1);
677 Stream_Write_UINT8(s, 0);
679 WINPR_ASSERT(rdp->mcs);
680 status = rdp_send_pdu(rdp, s, PDU_TYPE_DEACTIVATE_ALL, rdp->mcs->userId, sec_flags);
686BOOL rdp_server_accept_client_control_pdu(rdpRdp* rdp,
wStream* s)
690 UINT32 ControlId = 0;
691 const CONNECTION_STATE state = rdp_get_state(rdp);
696 if (!rdp_recv_control_pdu(s, &action, &GrantId, &ControlId))
702 case CTRLACTION_REQUEST_CONTROL:
703 if (!rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
705 char abuffer[128] = { 0 };
706 char buffer[1024] = { 0 };
708 "Received action=%s with GrantId=0x%04" PRIx16
", ControlId=0x%08" PRIx32
709 " in unexpected state %s [missing %s]",
710 rdp_ctrlaction_string(action, abuffer,
sizeof(abuffer)), GrantId,
711 ControlId, rdp_state_string(state),
712 rdp_finalize_flags_to_str(FINALIZE_CS_CONTROL_COOPERATE_PDU, buffer,
716 if ((GrantId != 0) || (ControlId != 0))
719 "Received CTRLACTION_COOPERATE with GrantId=0x%04" PRIx16
720 " != 0x00, ControlId=0x%08" PRIx32
" != 0x00",
724 return rdp_finalize_set_flag(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
725 case CTRLACTION_COOPERATE:
726 if (!rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
728 char abuffer[128] = { 0 };
729 char buffer[1024] = { 0 };
732 "Received action=%s with GrantId=0x%04" PRIx16
", ControlId=0x%08" PRIx32
733 " in unexpected state %s [missing %s]",
734 rdp_ctrlaction_string(action, abuffer,
sizeof(abuffer)), GrantId, ControlId,
735 rdp_state_string(state),
736 rdp_finalize_flags_to_str(FINALIZE_CS_SYNCHRONIZE_PDU, buffer,
sizeof(buffer)));
739 if ((GrantId != 0) || (ControlId != 0))
742 "Received CTRLACTION_COOPERATE with GrantId=0x%04" PRIx16
743 " != 0x00, ControlId=0x%08" PRIx32
" != 0x00",
747 return rdp_finalize_set_flag(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
750 char abuffer[128] = { 0 };
752 "Received unexpected action=%s with GrantId=0x%04" PRIx16
753 ", ControlId=0x%08" PRIx32,
754 rdp_ctrlaction_string(action, abuffer,
sizeof(abuffer)), GrantId, ControlId);
762BOOL rdp_server_accept_client_font_list_pdu(rdpRdp* rdp,
wStream* s)
767 if (!rdp_recv_client_font_list_pdu(s))
769 rdp_finalize_set_flag(rdp, FINALIZE_CS_FONT_LIST_PDU);
771 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP))
774 if (!rdp_send_server_font_map_pdu(rdp))
777 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
783BOOL rdp_server_accept_client_persistent_key_list_pdu(rdpRdp* rdp,
wStream* s)
788 if (!rdp_recv_client_persistent_key_list_pdu(s))
791 rdp_finalize_set_flag(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU);
796const char* rdp_ctrlaction_string(UINT16 action,
char* buffer,
size_t size)
798 const char* actstr = NULL;
801 case CTRLACTION_COOPERATE:
802 actstr =
"CTRLACTION_COOPERATE";
804 case CTRLACTION_DETACH:
805 actstr =
"CTRLACTION_DETACH";
807 case CTRLACTION_GRANTED_CONTROL:
808 actstr =
"CTRLACTION_GRANTED_CONTROL";
810 case CTRLACTION_REQUEST_CONTROL:
811 actstr =
"CTRLACTION_REQUEST_CONTROL";
814 actstr =
"CTRLACTION_UNKNOWN";
818 (void)_snprintf(buffer, size,
"%s [0x%04" PRIx16
"]", actstr, action);
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 param)
Sets a UINT32 settings value.