FreeRDP
All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Modules Pages
fastpath.c
1
23#include <freerdp/config.h>
24
25#include "settings.h"
26
27#include <stdio.h>
28#include <stdlib.h>
29#include <string.h>
30
31#include <winpr/crt.h>
32#include <winpr/assert.h>
33#include <winpr/stream.h>
34
35#include <freerdp/api.h>
36#include <freerdp/log.h>
37#include <freerdp/crypto/per.h>
38
39#include "orders.h"
40#include "update.h"
41#include "surface.h"
42#include "fastpath.h"
43#include "rdp.h"
44
45#include "../cache/pointer.h"
46#include "../cache/palette.h"
47#include "../cache/bitmap.h"
48
49#define TAG FREERDP_TAG("core.fastpath")
50
51enum FASTPATH_INPUT_ENCRYPTION_FLAGS
52{
53 FASTPATH_INPUT_SECURE_CHECKSUM = 0x1,
54 FASTPATH_INPUT_ENCRYPTED = 0x2
55};
56
57enum FASTPATH_OUTPUT_ENCRYPTION_FLAGS
58{
59 FASTPATH_OUTPUT_SECURE_CHECKSUM = 0x1,
60 FASTPATH_OUTPUT_ENCRYPTED = 0x2
61};
62
63struct rdp_fastpath
64{
65 rdpRdp* rdp;
66 wStream* fs;
67 BYTE encryptionFlags;
68 BYTE numberEvents;
69 wStream* updateData;
70 int fragmentation;
71};
72
83static const char* const FASTPATH_UPDATETYPE_STRINGS[] = {
84 "Orders", /* 0x0 */
85 "Bitmap", /* 0x1 */
86 "Palette", /* 0x2 */
87 "Synchronize", /* 0x3 */
88 "Surface Commands", /* 0x4 */
89 "System Pointer Hidden", /* 0x5 */
90 "System Pointer Default", /* 0x6 */
91 "???", /* 0x7 */
92 "Pointer Position", /* 0x8 */
93 "Color Pointer", /* 0x9 */
94 "Cached Pointer", /* 0xA */
95 "New Pointer", /* 0xB */
96};
97
98static const char* fastpath_update_to_string(UINT8 update)
99{
100 if (update >= ARRAYSIZE(FASTPATH_UPDATETYPE_STRINGS))
101 return "UNKNOWN";
102
103 return FASTPATH_UPDATETYPE_STRINGS[update];
104}
105
106static BOOL fastpath_read_update_header(wStream* s, BYTE* updateCode, BYTE* fragmentation,
107 BYTE* compression)
108{
109 BYTE updateHeader = 0;
110
111 if (!s || !updateCode || !fragmentation || !compression)
112 return FALSE;
113
114 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
115 return FALSE;
116
117 Stream_Read_UINT8(s, updateHeader);
118 *updateCode = updateHeader & 0x0F;
119 *fragmentation = (updateHeader >> 4) & 0x03;
120 *compression = (updateHeader >> 6) & 0x03;
121 return TRUE;
122}
123
124static BOOL fastpath_write_update_header(wStream* s, const FASTPATH_UPDATE_HEADER* fpUpdateHeader)
125{
126 BYTE updateHeader = 0;
127 WINPR_ASSERT(fpUpdateHeader);
128
129 updateHeader |= fpUpdateHeader->updateCode & 0x0F;
130 updateHeader |= (fpUpdateHeader->fragmentation & 0x03) << 4;
131 updateHeader |= (fpUpdateHeader->compression & 0x03) << 6;
132
133 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 1))
134 return FALSE;
135 Stream_Write_UINT8(s, updateHeader);
136
137 if (fpUpdateHeader->compression)
138 {
139 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 1))
140 return FALSE;
141
142 Stream_Write_UINT8(s, fpUpdateHeader->compressionFlags);
143 }
144
145 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 2))
146 return FALSE;
147
148 Stream_Write_UINT16(s, fpUpdateHeader->size);
149 return TRUE;
150}
151
152static UINT32 fastpath_get_update_header_size(FASTPATH_UPDATE_HEADER* fpUpdateHeader)
153{
154 WINPR_ASSERT(fpUpdateHeader);
155 return (fpUpdateHeader->compression) ? 4 : 3;
156}
157
158static BOOL fastpath_write_update_pdu_header(wStream* s,
159 const FASTPATH_UPDATE_PDU_HEADER* fpUpdatePduHeader,
160 rdpRdp* rdp)
161{
162 BYTE fpOutputHeader = 0;
163 WINPR_ASSERT(fpUpdatePduHeader);
164 WINPR_ASSERT(rdp);
165
166 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 3))
167 return FALSE;
168
169 fpOutputHeader |= (fpUpdatePduHeader->action & 0x03);
170 fpOutputHeader |= (fpUpdatePduHeader->secFlags & 0x03) << 6;
171 Stream_Write_UINT8(s, fpOutputHeader); /* fpOutputHeader (1 byte) */
172 Stream_Write_UINT8(s, 0x80 | (fpUpdatePduHeader->length >> 8)); /* length1 */
173 Stream_Write_UINT8(s, fpUpdatePduHeader->length & 0xFF); /* length2 */
174
175 if (fpUpdatePduHeader->secFlags)
176 {
177 WINPR_ASSERT(rdp->settings);
178 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
179 {
180 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 4))
181 return FALSE;
182
183 Stream_Write(s, fpUpdatePduHeader->fipsInformation, 4);
184 }
185
186 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
187 return FALSE;
188
189 Stream_Write(s, fpUpdatePduHeader->dataSignature, 8);
190 }
191
192 return TRUE;
193}
194
195static UINT32 fastpath_get_update_pdu_header_size(FASTPATH_UPDATE_PDU_HEADER* fpUpdatePduHeader,
196 rdpRdp* rdp)
197{
198 UINT32 size = 3; /* fpUpdatePduHeader + length1 + length2 */
199
200 if (!fpUpdatePduHeader || !rdp)
201 return 0;
202
203 if (fpUpdatePduHeader->secFlags)
204 {
205 size += 8; /* dataSignature */
206
207 WINPR_ASSERT(rdp->settings);
208 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
209 size += 4; /* fipsInformation */
210 }
211
212 return size;
213}
214
215BOOL fastpath_read_header_rdp(rdpFastPath* fastpath, wStream* s, UINT16* length)
216{
217 BYTE header = 0;
218
219 if (!s || !length)
220 return FALSE;
221
222 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
223 return FALSE;
224
225 Stream_Read_UINT8(s, header);
226
227 if (fastpath)
228 {
229 fastpath->encryptionFlags = (header & 0xC0) >> 6;
230 fastpath->numberEvents = (header & 0x3C) >> 2;
231 }
232
233 if (!per_read_length(s, length))
234 return FALSE;
235
236 const size_t pos = Stream_GetPosition(s);
237 if (pos > *length)
238 return FALSE;
239
240 *length = *length - (UINT16)pos;
241 return TRUE;
242}
243
244static BOOL fastpath_recv_orders(rdpFastPath* fastpath, wStream* s)
245{
246 rdpUpdate* update = NULL;
247 UINT16 numberOrders = 0;
248
249 if (!fastpath || !fastpath->rdp || !s)
250 {
251 WLog_ERR(TAG, "Invalid arguments");
252 return FALSE;
253 }
254
255 update = fastpath->rdp->update;
256
257 if (!update)
258 {
259 WLog_ERR(TAG, "Invalid configuration");
260 return FALSE;
261 }
262
263 if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
264 return FALSE;
265
266 Stream_Read_UINT16(s, numberOrders); /* numberOrders (2 bytes) */
267
268 while (numberOrders > 0)
269 {
270 if (!update_recv_order(update, s))
271 return FALSE;
272
273 numberOrders--;
274 }
275
276 return TRUE;
277}
278
279static BOOL fastpath_recv_update_common(rdpFastPath* fastpath, wStream* s)
280{
281 BOOL rc = FALSE;
282 UINT16 updateType = 0;
283 rdpUpdate* update = NULL;
284 rdpContext* context = NULL;
285 BOOL defaultReturn = 0;
286
287 if (!fastpath || !s || !fastpath->rdp)
288 return FALSE;
289
290 update = fastpath->rdp->update;
291
292 if (!update || !update->context)
293 return FALSE;
294
295 context = update->context;
296
297 defaultReturn = freerdp_settings_get_bool(context->settings, FreeRDP_DeactivateClientDecoding);
298
299 if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
300 return FALSE;
301
302 Stream_Read_UINT16(s, updateType); /* updateType (2 bytes) */
303 switch (updateType)
304 {
305 case UPDATE_TYPE_BITMAP:
306 {
307 BITMAP_UPDATE* bitmap_update = update_read_bitmap_update(update, s);
308
309 if (!bitmap_update)
310 return FALSE;
311
312 rc = IFCALLRESULT(defaultReturn, update->BitmapUpdate, context, bitmap_update);
313 free_bitmap_update(context, bitmap_update);
314 }
315 break;
316
317 case UPDATE_TYPE_PALETTE:
318 {
319 PALETTE_UPDATE* palette_update = update_read_palette(update, s);
320
321 if (!palette_update)
322 return FALSE;
323
324 rc = IFCALLRESULT(defaultReturn, update->Palette, context, palette_update);
325 free_palette_update(context, palette_update);
326 }
327 break;
328
329 default:
330 break;
331 }
332
333 return rc;
334}
335
336static BOOL fastpath_recv_update_synchronize(WINPR_ATTR_UNUSED rdpFastPath* fastpath, wStream* s)
337{
338 /* server 2008 can send invalid synchronize packet with missing padding,
339 so don't return FALSE even if the packet is invalid */
340 WINPR_ASSERT(fastpath);
341 WINPR_ASSERT(s);
342
343 const size_t len = Stream_GetRemainingLength(s);
344 const size_t skip = MIN(2, len);
345 return Stream_SafeSeek(s, skip); /* size (2 bytes), MUST be set to zero */
346}
347
348static int fastpath_recv_update(rdpFastPath* fastpath, BYTE updateCode, wStream* s)
349{
350 BOOL rc = FALSE;
351 int status = 0;
352
353 if (!fastpath || !fastpath->rdp || !s)
354 return -1;
355
356 Stream_SealLength(s);
357 Stream_SetPosition(s, 0);
358
359 rdpUpdate* update = fastpath->rdp->update;
360
361 if (!update || !update->pointer || !update->context)
362 return -1;
363
364 rdpContext* context = update->context;
365 WINPR_ASSERT(context);
366
367 rdpPointerUpdate* pointer = update->pointer;
368 WINPR_ASSERT(pointer);
369
370#ifdef WITH_DEBUG_RDP
371 DEBUG_RDP(fastpath->rdp, "recv Fast-Path %s Update (0x%02" PRIX8 "), length:%" PRIuz "",
372 fastpath_update_to_string(updateCode), updateCode, Stream_GetRemainingLength(s));
373#endif
374
375 const BOOL defaultReturn =
376 freerdp_settings_get_bool(context->settings, FreeRDP_DeactivateClientDecoding);
377 switch (updateCode)
378 {
379 case FASTPATH_UPDATETYPE_ORDERS:
380 rc = fastpath_recv_orders(fastpath, s);
381 break;
382
383 case FASTPATH_UPDATETYPE_BITMAP:
384 case FASTPATH_UPDATETYPE_PALETTE:
385 rc = fastpath_recv_update_common(fastpath, s);
386 break;
387
388 case FASTPATH_UPDATETYPE_SYNCHRONIZE:
389 if (!fastpath_recv_update_synchronize(fastpath, s))
390 WLog_ERR(TAG, "fastpath_recv_update_synchronize failure but we continue");
391 else
392 rc = IFCALLRESULT(TRUE, update->Synchronize, context);
393
394 break;
395
396 case FASTPATH_UPDATETYPE_SURFCMDS:
397 status = update_recv_surfcmds(update, s);
398 rc = (status < 0) ? FALSE : TRUE;
399 break;
400
401 case FASTPATH_UPDATETYPE_PTR_NULL:
402 {
403 POINTER_SYSTEM_UPDATE pointer_system = { 0 };
404 pointer_system.type = SYSPTR_NULL;
405 rc = IFCALLRESULT(defaultReturn, pointer->PointerSystem, context, &pointer_system);
406 }
407 break;
408
409 case FASTPATH_UPDATETYPE_PTR_DEFAULT:
410 {
411 POINTER_SYSTEM_UPDATE pointer_system = { 0 };
412 pointer_system.type = SYSPTR_DEFAULT;
413 rc = IFCALLRESULT(defaultReturn, pointer->PointerSystem, context, &pointer_system);
414 }
415 break;
416
417 case FASTPATH_UPDATETYPE_PTR_POSITION:
418 {
419 POINTER_POSITION_UPDATE* pointer_position = update_read_pointer_position(update, s);
420
421 if (pointer_position)
422 {
423 rc = IFCALLRESULT(defaultReturn, pointer->PointerPosition, context,
424 pointer_position);
425 free_pointer_position_update(context, pointer_position);
426 }
427 }
428 break;
429
430 case FASTPATH_UPDATETYPE_COLOR:
431 {
432 POINTER_COLOR_UPDATE* pointer_color = update_read_pointer_color(update, s, 24);
433
434 if (pointer_color)
435 {
436 rc = IFCALLRESULT(defaultReturn, pointer->PointerColor, context, pointer_color);
437 free_pointer_color_update(context, pointer_color);
438 }
439 }
440 break;
441
442 case FASTPATH_UPDATETYPE_CACHED:
443 {
444 POINTER_CACHED_UPDATE* pointer_cached = update_read_pointer_cached(update, s);
445
446 if (pointer_cached)
447 {
448 rc = IFCALLRESULT(defaultReturn, pointer->PointerCached, context, pointer_cached);
449 free_pointer_cached_update(context, pointer_cached);
450 }
451 }
452 break;
453
454 case FASTPATH_UPDATETYPE_POINTER:
455 {
456 POINTER_NEW_UPDATE* pointer_new = update_read_pointer_new(update, s);
457
458 if (pointer_new)
459 {
460 rc = IFCALLRESULT(defaultReturn, pointer->PointerNew, context, pointer_new);
461 free_pointer_new_update(context, pointer_new);
462 }
463 }
464 break;
465
466 case FASTPATH_UPDATETYPE_LARGE_POINTER:
467 {
468 POINTER_LARGE_UPDATE* pointer_large = update_read_pointer_large(update, s);
469
470 if (pointer_large)
471 {
472 rc = IFCALLRESULT(defaultReturn, pointer->PointerLarge, context, pointer_large);
473 free_pointer_large_update(context, pointer_large);
474 }
475 }
476 break;
477 default:
478 break;
479 }
480
481 Stream_SetPosition(s, 0);
482 if (!rc)
483 {
484 WLog_ERR(TAG, "Fastpath update %s [%" PRIx8 "] failed, status %d",
485 fastpath_update_to_string(updateCode), updateCode, status);
486 return -1;
487 }
488
489 return status;
490}
491
492static int fastpath_recv_update_data(rdpFastPath* fastpath, wStream* s)
493{
494 int status = 0;
495 UINT16 size = 0;
496 BYTE updateCode = 0;
497 BYTE fragmentation = 0;
498 BYTE compression = 0;
499 BYTE compressionFlags = 0;
500 UINT32 DstSize = 0;
501 const BYTE* pDstData = NULL;
502
503 if (!fastpath || !s)
504 return -1;
505
506 rdpRdp* rdp = fastpath->rdp;
507
508 if (!rdp)
509 return -1;
510
511 rdpTransport* transport = rdp->transport;
512
513 if (!transport)
514 return -1;
515
516 if (!fastpath_read_update_header(s, &updateCode, &fragmentation, &compression))
517 return -1;
518
519 if (compression == FASTPATH_OUTPUT_COMPRESSION_USED)
520 {
521 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
522 return -1;
523
524 Stream_Read_UINT8(s, compressionFlags);
525 }
526 else
527 compressionFlags = 0;
528
529 if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
530 return -1;
531
532 Stream_Read_UINT16(s, size);
533
534 if (!Stream_CheckAndLogRequiredLength(TAG, s, size))
535 return -1;
536
537 const int bulkStatus =
538 bulk_decompress(rdp->bulk, Stream_Pointer(s), size, &pDstData, &DstSize, compressionFlags);
539 Stream_Seek(s, size);
540
541 if (bulkStatus < 0)
542 {
543 WLog_ERR(TAG, "bulk_decompress() failed");
544 return -1;
545 }
546
547 if (!Stream_EnsureRemainingCapacity(fastpath->updateData, DstSize))
548 return -1;
549
550 Stream_Write(fastpath->updateData, pDstData, DstSize);
551
552 if (fragmentation == FASTPATH_FRAGMENT_SINGLE)
553 {
554 if (fastpath->fragmentation != -1)
555 {
556 WLog_ERR(TAG, "Unexpected FASTPATH_FRAGMENT_SINGLE");
557 goto out_fail;
558 }
559
560 status = fastpath_recv_update(fastpath, updateCode, fastpath->updateData);
561
562 if (status < 0)
563 {
564 WLog_ERR(TAG, "fastpath_recv_update() - %i", status);
565 goto out_fail;
566 }
567 }
568 else
569 {
570 rdpContext* context = NULL;
571 const size_t totalSize = Stream_GetPosition(fastpath->updateData);
572
573 context = transport_get_context(transport);
574 WINPR_ASSERT(context);
575 WINPR_ASSERT(context->settings);
576
577 if (totalSize > context->settings->MultifragMaxRequestSize)
578 {
579 WLog_ERR(TAG, "Total size (%" PRIuz ") exceeds MultifragMaxRequestSize (%" PRIu32 ")",
580 totalSize, context->settings->MultifragMaxRequestSize);
581 goto out_fail;
582 }
583
584 if (fragmentation == FASTPATH_FRAGMENT_FIRST)
585 {
586 if (fastpath->fragmentation != -1)
587 {
588 WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_FIRST");
589 goto out_fail;
590 }
591
592 fastpath->fragmentation = FASTPATH_FRAGMENT_FIRST;
593 }
594 else if (fragmentation == FASTPATH_FRAGMENT_NEXT)
595 {
596 if ((fastpath->fragmentation != FASTPATH_FRAGMENT_FIRST) &&
597 (fastpath->fragmentation != FASTPATH_FRAGMENT_NEXT))
598 {
599 WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_NEXT");
600 goto out_fail;
601 }
602
603 fastpath->fragmentation = FASTPATH_FRAGMENT_NEXT;
604 }
605 else if (fragmentation == FASTPATH_FRAGMENT_LAST)
606 {
607 if ((fastpath->fragmentation != FASTPATH_FRAGMENT_FIRST) &&
608 (fastpath->fragmentation != FASTPATH_FRAGMENT_NEXT))
609 {
610 WLog_ERR(TAG, "fastpath_recv_update_data: Unexpected FASTPATH_FRAGMENT_LAST");
611 goto out_fail;
612 }
613
614 fastpath->fragmentation = -1;
615 status = fastpath_recv_update(fastpath, updateCode, fastpath->updateData);
616
617 if (status < 0)
618 {
619 WLog_ERR(TAG, "fastpath_recv_update_data: fastpath_recv_update() - %i", status);
620 goto out_fail;
621 }
622 }
623 }
624
625 return status;
626out_fail:
627 return -1;
628}
629
630state_run_t fastpath_recv_updates(rdpFastPath* fastpath, wStream* s)
631{
632 state_run_t rc = STATE_RUN_FAILED;
633
634 WINPR_ASSERT(s);
635 WINPR_ASSERT(fastpath);
636 WINPR_ASSERT(fastpath->rdp);
637
638 rdpUpdate* update = fastpath->rdp->update;
639 WINPR_ASSERT(update);
640
641 if (!update_begin_paint(update))
642 goto fail;
643
644 while (Stream_GetRemainingLength(s) >= 3)
645 {
646 if (fastpath_recv_update_data(fastpath, s) < 0)
647 {
648 WLog_ERR(TAG, "fastpath_recv_update_data() fail");
649 rc = STATE_RUN_FAILED;
650 goto fail;
651 }
652 }
653
654 rc = STATE_RUN_SUCCESS;
655fail:
656
657 if (!update_end_paint(update))
658 return STATE_RUN_FAILED;
659
660 return rc;
661}
662
663static BOOL fastpath_read_input_event_header(wStream* s, BYTE* eventFlags, BYTE* eventCode)
664{
665 BYTE eventHeader = 0;
666
667 WINPR_ASSERT(s);
668 WINPR_ASSERT(eventFlags);
669 WINPR_ASSERT(eventCode);
670
671 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
672 return FALSE;
673
674 Stream_Read_UINT8(s, eventHeader); /* eventHeader (1 byte) */
675 *eventFlags = (eventHeader & 0x1F);
676 *eventCode = (eventHeader >> 5);
677 return TRUE;
678}
679
680static BOOL fastpath_recv_input_event_scancode(rdpFastPath* fastpath, wStream* s, BYTE eventFlags)
681{
682 WINPR_ASSERT(fastpath);
683 WINPR_ASSERT(fastpath->rdp);
684 WINPR_ASSERT(fastpath->rdp->input);
685 WINPR_ASSERT(s);
686
687 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
688 return FALSE;
689
690 rdpInput* input = fastpath->rdp->input;
691
692 const UINT8 code = Stream_Get_UINT8(s); /* keyCode (1 byte) */
693
694 UINT16 flags = 0;
695 if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_RELEASE))
696 flags |= KBD_FLAGS_RELEASE;
697
698 if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_EXTENDED))
699 flags |= KBD_FLAGS_EXTENDED;
700
701 if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_PREFIX_E1))
702 flags |= KBD_FLAGS_EXTENDED1;
703
704 return IFCALLRESULT(TRUE, input->KeyboardEvent, input, flags, code);
705}
706
707static BOOL fastpath_recv_input_event_mouse(rdpFastPath* fastpath, wStream* s,
708 WINPR_ATTR_UNUSED BYTE eventFlags)
709{
710 rdpInput* input = NULL;
711 UINT16 pointerFlags = 0;
712 UINT16 xPos = 0;
713 UINT16 yPos = 0;
714 WINPR_ASSERT(fastpath);
715 WINPR_ASSERT(fastpath->rdp);
716 WINPR_ASSERT(fastpath->rdp->input);
717 WINPR_ASSERT(s);
718
719 if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
720 return FALSE;
721
722 input = fastpath->rdp->input;
723
724 Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
725 Stream_Read_UINT16(s, xPos); /* xPos (2 bytes) */
726 Stream_Read_UINT16(s, yPos); /* yPos (2 bytes) */
727 return IFCALLRESULT(TRUE, input->MouseEvent, input, pointerFlags, xPos, yPos);
728}
729
730static BOOL fastpath_recv_input_event_relmouse(rdpFastPath* fastpath, wStream* s,
731 WINPR_ATTR_UNUSED BYTE eventFlags)
732{
733 rdpInput* input = NULL;
734 UINT16 pointerFlags = 0;
735 INT16 xDelta = 0;
736 INT16 yDelta = 0;
737 WINPR_ASSERT(fastpath);
738 WINPR_ASSERT(fastpath->rdp);
739 WINPR_ASSERT(fastpath->rdp->context);
740 WINPR_ASSERT(fastpath->rdp->input);
741 WINPR_ASSERT(s);
742
743 if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
744 return FALSE;
745
746 input = fastpath->rdp->input;
747
748 Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
749 Stream_Read_INT16(s, xDelta); /* xDelta (2 bytes) */
750 Stream_Read_INT16(s, yDelta); /* yDelta (2 bytes) */
751
752 if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasRelativeMouseEvent))
753 {
754 WLog_ERR(TAG,
755 "Received relative mouse event(flags=0x%04" PRIx16 ", xPos=%" PRId16
756 ", yPos=%" PRId16 "), but we did not announce support for that",
757 pointerFlags, xDelta, yDelta);
758 return FALSE;
759 }
760
761 return IFCALLRESULT(TRUE, input->RelMouseEvent, input, pointerFlags, xDelta, yDelta);
762}
763
764static BOOL fastpath_recv_input_event_qoe(rdpFastPath* fastpath, wStream* s,
765 WINPR_ATTR_UNUSED BYTE eventFlags)
766{
767 WINPR_ASSERT(fastpath);
768 WINPR_ASSERT(fastpath->rdp);
769 WINPR_ASSERT(fastpath->rdp->context);
770 WINPR_ASSERT(fastpath->rdp->input);
771 WINPR_ASSERT(s);
772
773 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
774 return FALSE;
775
776 rdpInput* input = fastpath->rdp->input;
777
778 UINT32 timestampMS = 0;
779 Stream_Read_UINT32(s, timestampMS); /* timestamp (4 bytes) */
780
781 if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasQoeEvent))
782 {
783 WLog_ERR(TAG,
784 "Received qoe event(timestamp=%" PRIu32
785 "ms), but we did not announce support for that",
786 timestampMS);
787 return FALSE;
788 }
789
790 return IFCALLRESULT(TRUE, input->QoEEvent, input, timestampMS);
791}
792
793static BOOL fastpath_recv_input_event_mousex(rdpFastPath* fastpath, wStream* s,
794 WINPR_ATTR_UNUSED BYTE eventFlags)
795{
796 rdpInput* input = NULL;
797 UINT16 pointerFlags = 0;
798 UINT16 xPos = 0;
799 UINT16 yPos = 0;
800
801 WINPR_ASSERT(fastpath);
802 WINPR_ASSERT(fastpath->rdp);
803 WINPR_ASSERT(fastpath->rdp->context);
804 WINPR_ASSERT(fastpath->rdp->input);
805 WINPR_ASSERT(s);
806
807 if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
808 return FALSE;
809
810 input = fastpath->rdp->input;
811
812 Stream_Read_UINT16(s, pointerFlags); /* pointerFlags (2 bytes) */
813 Stream_Read_UINT16(s, xPos); /* xPos (2 bytes) */
814 Stream_Read_UINT16(s, yPos); /* yPos (2 bytes) */
815
816 if (!freerdp_settings_get_bool(input->context->settings, FreeRDP_HasExtendedMouseEvent))
817 {
818 WLog_ERR(TAG,
819 "Received extended mouse event(flags=0x%04" PRIx16 ", xPos=%" PRIu16
820 ", yPos=%" PRIu16 "), but we did not announce support for that",
821 pointerFlags, xPos, yPos);
822 return FALSE;
823 }
824
825 return IFCALLRESULT(TRUE, input->ExtendedMouseEvent, input, pointerFlags, xPos, yPos);
826}
827
828static BOOL fastpath_recv_input_event_sync(rdpFastPath* fastpath, WINPR_ATTR_UNUSED wStream* s,
829 BYTE eventFlags)
830{
831 rdpInput* input = NULL;
832
833 WINPR_ASSERT(fastpath);
834 WINPR_ASSERT(fastpath->rdp);
835 WINPR_ASSERT(fastpath->rdp->input);
836 WINPR_ASSERT(s);
837
838 input = fastpath->rdp->input;
839 return IFCALLRESULT(TRUE, input->SynchronizeEvent, input, eventFlags);
840}
841
842static BOOL fastpath_recv_input_event_unicode(rdpFastPath* fastpath, wStream* s, BYTE eventFlags)
843{
844 UINT16 unicodeCode = 0;
845 UINT16 flags = 0;
846
847 WINPR_ASSERT(fastpath);
848 WINPR_ASSERT(s);
849
850 if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
851 return FALSE;
852
853 Stream_Read_UINT16(s, unicodeCode); /* unicodeCode (2 bytes) */
854 flags = 0;
855
856 if ((eventFlags & FASTPATH_INPUT_KBDFLAGS_RELEASE))
857 flags |= KBD_FLAGS_RELEASE;
858
859 WINPR_ASSERT(fastpath->rdp);
860 WINPR_ASSERT(fastpath->rdp);
861 WINPR_ASSERT(fastpath->rdp->input);
862 return IFCALLRESULT(FALSE, fastpath->rdp->input->UnicodeKeyboardEvent, fastpath->rdp->input,
863 flags, unicodeCode);
864}
865
866static BOOL fastpath_recv_input_event(rdpFastPath* fastpath, wStream* s)
867{
868 BYTE eventFlags = 0;
869 BYTE eventCode = 0;
870
871 WINPR_ASSERT(fastpath);
872 WINPR_ASSERT(s);
873
874 if (!fastpath_read_input_event_header(s, &eventFlags, &eventCode))
875 return FALSE;
876
877 switch (eventCode)
878 {
879 case FASTPATH_INPUT_EVENT_SCANCODE:
880 if (!fastpath_recv_input_event_scancode(fastpath, s, eventFlags))
881 return FALSE;
882
883 break;
884
885 case FASTPATH_INPUT_EVENT_MOUSE:
886 if (!fastpath_recv_input_event_mouse(fastpath, s, eventFlags))
887 return FALSE;
888
889 break;
890
891 case FASTPATH_INPUT_EVENT_MOUSEX:
892 if (!fastpath_recv_input_event_mousex(fastpath, s, eventFlags))
893 return FALSE;
894
895 break;
896
897 case FASTPATH_INPUT_EVENT_SYNC:
898 if (!fastpath_recv_input_event_sync(fastpath, s, eventFlags))
899 return FALSE;
900
901 break;
902
903 case FASTPATH_INPUT_EVENT_UNICODE:
904 if (!fastpath_recv_input_event_unicode(fastpath, s, eventFlags))
905 return FALSE;
906
907 break;
908
909 case TS_FP_RELPOINTER_EVENT:
910 if (!fastpath_recv_input_event_relmouse(fastpath, s, eventFlags))
911 return FALSE;
912
913 break;
914
915 case TS_FP_QOETIMESTAMP_EVENT:
916 if (!fastpath_recv_input_event_qoe(fastpath, s, eventFlags))
917 return FALSE;
918 break;
919
920 default:
921 WLog_ERR(TAG, "Unknown eventCode %" PRIu8 "", eventCode);
922 break;
923 }
924
925 return TRUE;
926}
927
928state_run_t fastpath_recv_inputs(rdpFastPath* fastpath, wStream* s)
929{
930 WINPR_ASSERT(fastpath);
931 WINPR_ASSERT(s);
932
933 if (fastpath->numberEvents == 0)
934 {
939 if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
940 return STATE_RUN_FAILED;
941
942 Stream_Read_UINT8(s, fastpath->numberEvents); /* eventHeader (1 byte) */
943 }
944
945 for (BYTE i = 0; i < fastpath->numberEvents; i++)
946 {
947 if (!fastpath_recv_input_event(fastpath, s))
948 return STATE_RUN_FAILED;
949 }
950
951 return STATE_RUN_SUCCESS;
952}
953
954static UINT32 fastpath_get_sec_bytes(rdpRdp* rdp)
955{
956 UINT32 sec_bytes = 0;
957 sec_bytes = 0;
958
959 if (!rdp)
960 return 0;
961
962 if (rdp->do_crypt)
963 {
964 sec_bytes = 8;
965
966 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
967 sec_bytes += 4;
968 }
969
970 return sec_bytes;
971}
972
973wStream* fastpath_input_pdu_init_header(rdpFastPath* fastpath, UINT16* sec_flags)
974{
975 if (!fastpath || !fastpath->rdp)
976 return NULL;
977
978 rdpRdp* rdp = fastpath->rdp;
979 wStream* s = transport_send_stream_init(rdp->transport, 256);
980
981 if (!s)
982 return NULL;
983
984 Stream_Seek(s, 3); /* fpInputHeader, length1 and length2 */
985
986 if (rdp->do_crypt)
987 {
988 *sec_flags |= SEC_ENCRYPT;
989
990 if (rdp->do_secure_checksum)
991 *sec_flags |= SEC_SECURE_CHECKSUM;
992 }
993
994 Stream_Seek(s, fastpath_get_sec_bytes(rdp));
995 return s;
996}
997
998wStream* fastpath_input_pdu_init(rdpFastPath* fastpath, BYTE eventFlags, BYTE eventCode,
999 UINT16* sec_flags)
1000{
1001 wStream* s = NULL;
1002 s = fastpath_input_pdu_init_header(fastpath, sec_flags);
1003
1004 if (!s)
1005 return NULL;
1006
1007 WINPR_ASSERT(eventCode < 8);
1008 WINPR_ASSERT(eventFlags < 0x20);
1009 Stream_Write_UINT8(s, (UINT8)(eventFlags | (eventCode << 5))); /* eventHeader (1 byte) */
1010 return s;
1011}
1012
1013BOOL fastpath_send_multiple_input_pdu(rdpFastPath* fastpath, wStream* s, size_t iNumEvents,
1014 UINT16 sec_flags)
1015{
1016 BOOL rc = FALSE;
1017 BYTE eventHeader = 0;
1018 BOOL should_unlock = FALSE;
1019 rdpRdp* rdp = NULL;
1020
1021 WINPR_ASSERT(iNumEvents > 0);
1022 if (!s)
1023 return FALSE;
1024
1025 if (!fastpath)
1026 goto fail;
1027
1028 rdp = fastpath->rdp;
1029 WINPR_ASSERT(rdp);
1030
1031 CONNECTION_STATE state = rdp_get_state(rdp);
1032 if (!rdp_is_active_state(rdp))
1033 {
1034 WLog_WARN(TAG, "called before activation [%s]", rdp_state_string(state));
1035 goto fail;
1036 }
1037
1038 /*
1039 * A maximum of 15 events are allowed per request
1040 * if the optional numEvents field isn't used
1041 * see MS-RDPBCGR 2.2.8.1.2 for details
1042 */
1043 if (iNumEvents > 15)
1044 goto fail;
1045
1046 size_t length = Stream_GetPosition(s);
1047
1048 if (length >= (2 << 14))
1049 {
1050 WLog_ERR(TAG, "Maximum FastPath PDU length is 32767");
1051 goto fail;
1052 }
1053
1054 eventHeader = FASTPATH_INPUT_ACTION_FASTPATH;
1055 eventHeader |= (iNumEvents << 2); /* numberEvents */
1056
1057 if (sec_flags & SEC_ENCRYPT)
1058 eventHeader |= (FASTPATH_INPUT_ENCRYPTED << 6);
1059
1060 if (sec_flags & SEC_SECURE_CHECKSUM)
1061 eventHeader |= (FASTPATH_INPUT_SECURE_CHECKSUM << 6);
1062
1063 Stream_SetPosition(s, 0);
1064 Stream_Write_UINT8(s, eventHeader);
1065 /* Write length later, RDP encryption might add a padding */
1066 Stream_Seek(s, 2);
1067
1068 if (sec_flags & SEC_ENCRYPT)
1069 {
1070 if (!security_lock(rdp))
1071 goto fail;
1072 should_unlock = TRUE;
1073
1074 const size_t sec_bytes = fastpath_get_sec_bytes(fastpath->rdp);
1075 if (sec_bytes + 3ULL > length)
1076 goto fail;
1077
1078 BYTE* fpInputEvents = Stream_PointerAs(s, BYTE) + sec_bytes;
1079 const UINT16 fpInputEvents_length = (UINT16)(length - 3 - sec_bytes);
1080
1081 WINPR_ASSERT(rdp->settings);
1082 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1083 {
1084 BYTE pad = 0;
1085
1086 if ((pad = 8 - (fpInputEvents_length % 8)) == 8)
1087 pad = 0;
1088
1089 Stream_Write_UINT16(s, 0x10); /* length */
1090 Stream_Write_UINT8(s, 0x1); /* TSFIPS_VERSION 1*/
1091 Stream_Write_UINT8(s, pad); /* padding */
1092
1093 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
1094 goto fail;
1095
1096 if (!security_hmac_signature(fpInputEvents, fpInputEvents_length, Stream_Pointer(s), 8,
1097 rdp))
1098 goto fail;
1099
1100 if (pad)
1101 memset(fpInputEvents + fpInputEvents_length, 0, pad);
1102
1103 if (!security_fips_encrypt(fpInputEvents, fpInputEvents_length + pad, rdp))
1104 goto fail;
1105
1106 length += pad;
1107 }
1108 else
1109 {
1110 BOOL res = 0;
1111 if (!Stream_CheckAndLogRequiredCapacity(TAG, s, 8))
1112 goto fail;
1113 if (sec_flags & SEC_SECURE_CHECKSUM)
1114 res = security_salted_mac_signature(rdp, fpInputEvents, fpInputEvents_length, TRUE,
1115 Stream_Pointer(s), 8);
1116 else
1117 res = security_mac_signature(rdp, fpInputEvents, fpInputEvents_length,
1118 Stream_Pointer(s), 8);
1119
1120 if (!res || !security_encrypt(fpInputEvents, fpInputEvents_length, rdp))
1121 goto fail;
1122 }
1123 }
1124
1125 /*
1126 * We always encode length in two bytes, even though we could use
1127 * only one byte if length <= 0x7F. It is just easier that way,
1128 * because we can leave room for fixed-length header, store all
1129 * the data first and then store the header.
1130 */
1131 WINPR_ASSERT(length < UINT16_MAX);
1132 Stream_SetPosition(s, 1);
1133 Stream_Write_UINT16_BE(s, 0x8000 | (UINT16)length);
1134 Stream_SetPosition(s, length);
1135 Stream_SealLength(s);
1136
1137 if (transport_write(rdp->transport, s) < 0)
1138 goto fail;
1139
1140 rc = TRUE;
1141fail:
1142 if (should_unlock && !security_unlock(rdp))
1143 rc = FALSE;
1144 Stream_Release(s);
1145 return rc;
1146}
1147
1148BOOL fastpath_send_input_pdu(rdpFastPath* fastpath, wStream* s, UINT16 sec_flags)
1149{
1150 return fastpath_send_multiple_input_pdu(fastpath, s, 1, sec_flags);
1151}
1152
1153wStream* fastpath_update_pdu_init(rdpFastPath* fastpath)
1154{
1155 return transport_send_stream_init(fastpath->rdp->transport, FASTPATH_MAX_PACKET_SIZE);
1156}
1157
1158wStream* fastpath_update_pdu_init_new(WINPR_ATTR_UNUSED rdpFastPath* fastpath)
1159{
1160 wStream* s = NULL;
1161 s = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1162 return s;
1163}
1164
1165BOOL fastpath_send_update_pdu(rdpFastPath* fastpath, BYTE updateCode, wStream* s,
1166 BOOL skipCompression)
1167{
1168 BOOL status = TRUE;
1169 wStream* fs = NULL;
1170 rdpSettings* settings = NULL;
1171 rdpRdp* rdp = NULL;
1172 UINT32 fpHeaderSize = 6;
1173 UINT32 fpUpdatePduHeaderSize = 0;
1174 UINT32 fpUpdateHeaderSize = 0;
1175 FASTPATH_UPDATE_PDU_HEADER fpUpdatePduHeader = { 0 };
1176 FASTPATH_UPDATE_HEADER fpUpdateHeader = { 0 };
1177 UINT16 sec_flags = 0;
1178
1179 if (!fastpath || !fastpath->rdp || !fastpath->fs || !s)
1180 return FALSE;
1181
1182 rdp = fastpath->rdp;
1183 fs = fastpath->fs;
1184 settings = rdp->settings;
1185
1186 if (!settings)
1187 return FALSE;
1188
1189 UINT16 maxLength = FASTPATH_MAX_PACKET_SIZE - 20;
1190
1191 if (settings->CompressionEnabled && !skipCompression)
1192 {
1193 const UINT16 CompressionMaxSize = bulk_compression_max_size(rdp->bulk);
1194 maxLength = (maxLength < CompressionMaxSize) ? maxLength : CompressionMaxSize;
1195 maxLength -= 20;
1196 }
1197
1198 size_t totalLength = Stream_GetPosition(s);
1199 Stream_SetPosition(s, 0);
1200
1201 /* check if fast path output is possible */
1202 if (!settings->FastPathOutput)
1203 {
1204 WLog_ERR(TAG, "client does not support fast path output");
1205 return FALSE;
1206 }
1207
1208 /* check if the client's fast path pdu buffer is large enough */
1209 if (totalLength > settings->MultifragMaxRequestSize)
1210 {
1211 WLog_ERR(TAG,
1212 "fast path update size (%" PRIuz
1213 ") exceeds the client's maximum request size (%" PRIu32 ")",
1214 totalLength, settings->MultifragMaxRequestSize);
1215 return FALSE;
1216 }
1217
1218 if (rdp->do_crypt)
1219 {
1220 sec_flags |= SEC_ENCRYPT;
1221
1222 if (rdp->do_secure_checksum)
1223 sec_flags |= SEC_SECURE_CHECKSUM;
1224 }
1225
1226 for (int fragment = 0; (totalLength > 0) || (fragment == 0); fragment++)
1227 {
1228 UINT32 DstSize = 0;
1229 const BYTE* pDstData = NULL;
1230 UINT32 compressionFlags = 0;
1231 BYTE pad = 0;
1232 BYTE* pSignature = NULL;
1233 fpUpdatePduHeader.action = 0;
1234 fpUpdatePduHeader.secFlags = 0;
1235 fpUpdateHeader.compression = 0;
1236 fpUpdateHeader.compressionFlags = 0;
1237 fpUpdateHeader.updateCode = updateCode;
1238 fpUpdateHeader.size = (UINT16)(totalLength > maxLength) ? maxLength : (UINT16)totalLength;
1239 const BYTE* pSrcData = Stream_Pointer(s);
1240 UINT32 SrcSize = DstSize = fpUpdateHeader.size;
1241 BOOL should_unlock = FALSE;
1242
1243 if (sec_flags & SEC_ENCRYPT)
1244 fpUpdatePduHeader.secFlags |= FASTPATH_OUTPUT_ENCRYPTED;
1245
1246 if (sec_flags & SEC_SECURE_CHECKSUM)
1247 fpUpdatePduHeader.secFlags |= FASTPATH_OUTPUT_SECURE_CHECKSUM;
1248
1249 if (settings->CompressionEnabled && !skipCompression)
1250 {
1251 if (bulk_compress(rdp->bulk, pSrcData, SrcSize, &pDstData, &DstSize,
1252 &compressionFlags) >= 0)
1253 {
1254 if (compressionFlags)
1255 {
1256 WINPR_ASSERT(compressionFlags <= UINT8_MAX);
1257 fpUpdateHeader.compressionFlags = (UINT8)compressionFlags;
1258 fpUpdateHeader.compression = FASTPATH_OUTPUT_COMPRESSION_USED;
1259 }
1260 }
1261 }
1262
1263 if (!fpUpdateHeader.compression)
1264 {
1265 pDstData = Stream_Pointer(s);
1266 DstSize = fpUpdateHeader.size;
1267 }
1268
1269 if (DstSize > UINT16_MAX)
1270 return FALSE;
1271 fpUpdateHeader.size = (UINT16)DstSize;
1272 totalLength -= SrcSize;
1273
1274 if (totalLength == 0)
1275 fpUpdateHeader.fragmentation =
1276 (fragment == 0) ? FASTPATH_FRAGMENT_SINGLE : FASTPATH_FRAGMENT_LAST;
1277 else
1278 fpUpdateHeader.fragmentation =
1279 (fragment == 0) ? FASTPATH_FRAGMENT_FIRST : FASTPATH_FRAGMENT_NEXT;
1280
1281 fpUpdateHeaderSize = fastpath_get_update_header_size(&fpUpdateHeader);
1282 fpUpdatePduHeaderSize = fastpath_get_update_pdu_header_size(&fpUpdatePduHeader, rdp);
1283 fpHeaderSize = fpUpdateHeaderSize + fpUpdatePduHeaderSize;
1284
1285 if (sec_flags & SEC_ENCRYPT)
1286 {
1287 pSignature = Stream_Buffer(fs) + 3;
1288
1289 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1290 {
1291 pSignature += 4;
1292
1293 if ((pad = 8 - ((DstSize + fpUpdateHeaderSize) % 8)) == 8)
1294 pad = 0;
1295
1296 fpUpdatePduHeader.fipsInformation[0] = 0x10;
1297 fpUpdatePduHeader.fipsInformation[1] = 0x00;
1298 fpUpdatePduHeader.fipsInformation[2] = 0x01;
1299 fpUpdatePduHeader.fipsInformation[3] = pad;
1300 }
1301 }
1302
1303 const size_t len = fpUpdateHeader.size + fpHeaderSize + pad;
1304 if (len > UINT16_MAX)
1305 return FALSE;
1306
1307 fpUpdatePduHeader.length = (UINT16)len;
1308 Stream_SetPosition(fs, 0);
1309 if (!fastpath_write_update_pdu_header(fs, &fpUpdatePduHeader, rdp))
1310 return FALSE;
1311 if (!fastpath_write_update_header(fs, &fpUpdateHeader))
1312 return FALSE;
1313
1314 if (!Stream_CheckAndLogRequiredCapacity(TAG, (fs), (size_t)DstSize + pad))
1315 return FALSE;
1316 Stream_Write(fs, pDstData, DstSize);
1317
1318 if (pad)
1319 Stream_Zero(fs, pad);
1320
1321 BOOL res = FALSE;
1322 if (sec_flags & SEC_ENCRYPT)
1323 {
1324 if (!security_lock(rdp))
1325 return FALSE;
1326 should_unlock = TRUE;
1327 UINT32 dataSize = fpUpdateHeaderSize + DstSize + pad;
1328 BYTE* data = Stream_PointerAs(fs, BYTE) - dataSize;
1329
1330 if (rdp->settings->EncryptionMethods == ENCRYPTION_METHOD_FIPS)
1331 {
1332 // TODO: Ensure stream capacity
1333 if (!security_hmac_signature(data, dataSize - pad, pSignature, 8, rdp))
1334 goto unlock;
1335
1336 if (!security_fips_encrypt(data, dataSize, rdp))
1337 goto unlock;
1338 }
1339 else
1340 {
1341 // TODO: Ensure stream capacity
1342 if (sec_flags & SEC_SECURE_CHECKSUM)
1343 status =
1344 security_salted_mac_signature(rdp, data, dataSize, TRUE, pSignature, 8);
1345 else
1346 status = security_mac_signature(rdp, data, dataSize, pSignature, 8);
1347
1348 if (!status || !security_encrypt(data, dataSize, rdp))
1349 goto unlock;
1350 }
1351 }
1352 res = TRUE;
1353
1354 Stream_SealLength(fs);
1355
1356 if (transport_write(rdp->transport, fs) < 0)
1357 {
1358 status = FALSE;
1359 }
1360
1361 unlock:
1362 if (should_unlock && !security_unlock(rdp))
1363 return FALSE;
1364
1365 if (!res || !status)
1366 return FALSE;
1367
1368 Stream_Seek(s, SrcSize);
1369 }
1370
1371 return status;
1372}
1373
1374rdpFastPath* fastpath_new(rdpRdp* rdp)
1375{
1376 rdpFastPath* fastpath = NULL;
1377
1378 WINPR_ASSERT(rdp);
1379
1380 fastpath = (rdpFastPath*)calloc(1, sizeof(rdpFastPath));
1381
1382 if (!fastpath)
1383 return NULL;
1384
1385 fastpath->rdp = rdp;
1386 fastpath->fragmentation = -1;
1387 fastpath->fs = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1388 fastpath->updateData = Stream_New(NULL, FASTPATH_MAX_PACKET_SIZE);
1389
1390 if (!fastpath->fs || !fastpath->updateData)
1391 goto out_free;
1392
1393 return fastpath;
1394out_free:
1395 fastpath_free(fastpath);
1396 return NULL;
1397}
1398
1399void fastpath_free(rdpFastPath* fastpath)
1400{
1401 if (fastpath)
1402 {
1403 Stream_Free(fastpath->updateData, TRUE);
1404 Stream_Free(fastpath->fs, TRUE);
1405 free(fastpath);
1406 }
1407}
1408
1409BYTE fastpath_get_encryption_flags(rdpFastPath* fastpath)
1410{
1411 WINPR_ASSERT(fastpath);
1412 return fastpath->encryptionFlags;
1413}
1414
1415BOOL fastpath_decrypt(rdpFastPath* fastpath, wStream* s, UINT16* length)
1416{
1417 WINPR_ASSERT(fastpath);
1418 if (fastpath_get_encryption_flags(fastpath) & FASTPATH_OUTPUT_ENCRYPTED)
1419 {
1420 const UINT16 flags =
1421 (fastpath_get_encryption_flags(fastpath) & FASTPATH_OUTPUT_SECURE_CHECKSUM)
1422 ? SEC_SECURE_CHECKSUM
1423 : 0;
1424
1425 if (!rdp_decrypt(fastpath->rdp, s, length, flags))
1426 return FALSE;
1427 }
1428
1429 return TRUE;
1430}
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.