23#include <freerdp/config.h>
25#include "../settings.h"
27#include <winpr/assert.h>
29#include <winpr/error.h>
30#include <winpr/print.h>
31#include <winpr/stream.h>
33#include <freerdp/log.h>
36#include "rpc_client.h"
39#include "../../crypto/opensslcompat.h"
41#define TAG FREERDP_TAG("core.gateway.tsg")
43#define TSG_CAPABILITY_TYPE_NAP 0x00000001
45#define TSG_PACKET_TYPE_HEADER 0x00004844
46#define TSG_PACKET_TYPE_VERSIONCAPS 0x00005643
47#define TSG_PACKET_TYPE_QUARCONFIGREQUEST 0x00005143
48#define TSG_PACKET_TYPE_QUARREQUEST 0x00005152
49#define TSG_PACKET_TYPE_RESPONSE 0x00005052
50#define TSG_PACKET_TYPE_QUARENC_RESPONSE 0x00004552
51#define TSG_PACKET_TYPE_CAPS_RESPONSE 0x00004350
52#define TSG_PACKET_TYPE_MSGREQUEST_PACKET 0x00004752
53#define TSG_PACKET_TYPE_MESSAGE_PACKET 0x00004750
54#define TSG_PACKET_TYPE_AUTH 0x00004054
55#define TSG_PACKET_TYPE_REAUTH 0x00005250
57typedef WCHAR* RESOURCENAME;
61 RESOURCENAME* resourceName;
62 UINT32 numResourceNames;
63 RESOURCENAME* alternateResourceNames;
64 UINT16 numAlternateResourceNames;
81 TSG_CAPABILITY_NAP tsgCapNap;
82} TSG_CAPABILITIES_UNION;
86 UINT32 capabilityType;
87 TSG_CAPABILITIES_UNION tsgPacket;
88} TSG_PACKET_CAPABILITIES;
92 TSG_PACKET_HEADER tsgHeader;
93 TSG_PACKET_CAPABILITIES tsgCaps;
94 UINT32 numCapabilities;
97 UINT16 quarantineCapabilities;
98} TSG_PACKET_VERSIONCAPS;
103} TSG_PACKET_QUARCONFIGREQUEST;
112} TSG_PACKET_QUARREQUEST;
116 BOOL enableAllRedirections;
117 BOOL disableAllRedirections;
118 BOOL driveRedirectionDisabled;
119 BOOL printerRedirectionDisabled;
120 BOOL portRedirectionDisabled;
122 BOOL clipboardRedirectionDisabled;
123 BOOL pnpRedirectionDisabled;
124} TSG_REDIRECTION_FLAGS;
130 const BYTE* responseData;
131 UINT32 responseDataLen;
132 TSG_REDIRECTION_FLAGS redirectionFlags;
133} TSG_PACKET_RESPONSE;
139 WCHAR* certChainData;
141 TSG_PACKET_VERSIONCAPS versionCaps;
142} TSG_PACKET_QUARENC_RESPONSE;
146 INT32 isDisplayMandatory;
147 INT32 isConsentMandatory;
150} TSG_PACKET_STRING_MESSAGE;
154 UINT64 tunnelContext;
155} TSG_PACKET_REAUTH_MESSAGE;
162} TSG_PACKET_MSG_RESPONSE;
166 TSG_PACKET_QUARENC_RESPONSE pktQuarEncResponse;
167 TSG_PACKET_MSG_RESPONSE pktConsentMessage;
168} TSG_PACKET_CAPS_RESPONSE;
172 UINT32 maxMessagesPerBatch;
173} TSG_PACKET_MSG_REQUEST;
177 TSG_PACKET_VERSIONCAPS tsgVersionCaps;
184 TSG_PACKET_VERSIONCAPS packetVersionCaps;
185 TSG_PACKET_AUTH packetAuth;
186} TSG_INITIAL_PACKET_TYPE_UNION;
190 UINT64 tunnelContext;
192 TSG_INITIAL_PACKET_TYPE_UNION tsgInitialPacket;
197 TSG_PACKET_HEADER packetHeader;
198 TSG_PACKET_VERSIONCAPS packetVersionCaps;
199 TSG_PACKET_QUARCONFIGREQUEST packetQuarConfigRequest;
200 TSG_PACKET_QUARREQUEST packetQuarRequest;
201 TSG_PACKET_RESPONSE packetResponse;
202 TSG_PACKET_QUARENC_RESPONSE packetQuarEncResponse;
203 TSG_PACKET_CAPS_RESPONSE packetCapsResponse;
204 TSG_PACKET_MSG_REQUEST packetMsgRequest;
205 TSG_PACKET_MSG_RESPONSE packetMsgResponse;
206 TSG_PACKET_AUTH packetAuth;
207 TSG_PACKET_REAUTH packetReauth;
208} TSG_PACKET_TYPE_UNION;
213 TSG_PACKET_TYPE_UNION tsgPacket;
226 rdpTransport* transport;
227 UINT64 ReauthTunnelContext;
233 TSG_PACKET_QUARENC_RESPONSE CapsResponse;
234 TSG_PACKET_QUARREQUEST QuarreQuest;
237static BOOL TsProxyReadPacketSTringMessage(wLog* log,
wStream* s, uint32_t* index,
238 TSG_PACKET_STRING_MESSAGE* msg);
239static BOOL tsg_stream_align(wLog* log,
wStream* s,
size_t align);
241static const char* tsg_caps_to_string(UINT32 caps,
char* buffer,
size_t len)
243 const UINT32 mask = ~(TSG_NAP_CAPABILITY_QUAR_SOH | TSG_NAP_CAPABILITY_IDLE_TIMEOUT |
244 TSG_MESSAGING_CAP_CONSENT_SIGN | TSG_MESSAGING_CAP_SERVICE_MSG |
245 TSG_MESSAGING_CAP_REAUTH);
246 const UINT32 val = caps & mask;
248 if ((caps & TSG_NAP_CAPABILITY_QUAR_SOH) != 0)
249 (
void)winpr_str_append(
"TSG_NAP_CAPABILITY_QUAR_SOH", buffer, len,
"|");
250 if ((caps & TSG_NAP_CAPABILITY_IDLE_TIMEOUT) != 0)
251 (void)winpr_str_append(
"TSG_NAP_CAPABILITY_IDLE_TIMEOUT", buffer, len,
"|");
252 if ((caps & TSG_MESSAGING_CAP_CONSENT_SIGN) != 0)
253 (
void)winpr_str_append(
"TSG_MESSAGING_CAP_CONSENT_SIGN", buffer, len,
"|");
254 if ((caps & TSG_MESSAGING_CAP_SERVICE_MSG) != 0)
255 (void)winpr_str_append(
"TSG_MESSAGING_CAP_SERVICE_MSG", buffer, len,
"|");
256 if ((caps & TSG_MESSAGING_CAP_REAUTH) != 0)
257 (
void)winpr_str_append(
"TSG_MESSAGING_CAP_REAUTH", buffer, len,
"|");
261 char number[32] = WINPR_C_ARRAY_INIT;
262 (void)_snprintf(number,
sizeof(number),
"TSG_UNKNOWN{0x%08" PRIx32
"}", val);
263 (void)winpr_str_append(number, buffer, len,
"|");
269static const char* tsg_packet_id_to_string(UINT32 packetId)
273 case TSG_PACKET_TYPE_HEADER:
274 return "TSG_PACKET_TYPE_HEADER";
275 case TSG_PACKET_TYPE_VERSIONCAPS:
276 return "TSG_PACKET_TYPE_VERSIONCAPS";
277 case TSG_PACKET_TYPE_QUARCONFIGREQUEST:
278 return "TSG_PACKET_TYPE_QUARCONFIGREQUEST";
279 case TSG_PACKET_TYPE_QUARREQUEST:
280 return "TSG_PACKET_TYPE_QUARREQUEST";
281 case TSG_PACKET_TYPE_RESPONSE:
282 return "TSG_PACKET_TYPE_RESPONSE";
283 case TSG_PACKET_TYPE_QUARENC_RESPONSE:
284 return "TSG_PACKET_TYPE_QUARENC_RESPONSE";
285 case TSG_CAPABILITY_TYPE_NAP:
286 return "TSG_CAPABILITY_TYPE_NAP";
287 case TSG_PACKET_TYPE_CAPS_RESPONSE:
288 return "TSG_PACKET_TYPE_CAPS_RESPONSE";
289 case TSG_PACKET_TYPE_MSGREQUEST_PACKET:
290 return "TSG_PACKET_TYPE_MSGREQUEST_PACKET";
291 case TSG_PACKET_TYPE_MESSAGE_PACKET:
292 return "TSG_PACKET_TYPE_MESSAGE_PACKET";
293 case TSG_PACKET_TYPE_AUTH:
294 return "TSG_PACKET_TYPE_AUTH";
295 case TSG_PACKET_TYPE_REAUTH:
296 return "TSG_PACKET_TYPE_REAUTH";
302static const char* tsg_component_id_to_string(UINT16 ComponentId,
char* buffer,
size_t bytelen)
304 const char* str =
nullptr;
312 ENTRY(TS_GATEWAY_TRANSPORT);
319 (void)_snprintf(buffer, bytelen,
"%s [0x%04" PRIx16
"]", str, ComponentId);
323static const char* tsg_state_to_string(TSG_STATE state)
327 case TSG_STATE_INITIAL:
328 return "TSG_STATE_INITIAL";
329 case TSG_STATE_CONNECTED:
330 return "TSG_STATE_CONNECTED";
331 case TSG_STATE_AUTHORIZED:
332 return "TSG_STATE_AUTHORIZED";
333 case TSG_STATE_CHANNEL_CREATED:
334 return "TSG_STATE_CHANNEL_CREATED";
335 case TSG_STATE_PIPE_CREATED:
336 return "TSG_STATE_PIPE_CREATED";
337 case TSG_STATE_TUNNEL_CLOSE_PENDING:
338 return "TSG_STATE_TUNNEL_CLOSE_PENDING";
339 case TSG_STATE_CHANNEL_CLOSE_PENDING:
340 return "TSG_STATE_CHANNEL_CLOSE_PENDING";
341 case TSG_STATE_FINAL:
342 return "TSG_STATE_FINAL";
344 return "TSG_STATE_UNKNOWN";
350 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 20))
353 WINPR_ASSERT(tunnelContext);
354 Stream_Read_UINT32(s, tunnelContext->ContextType);
355 Stream_Read(s, &tunnelContext->ContextUuid,
356 sizeof(tunnelContext->ContextUuid));
360static BOOL TsProxyWriteTunnelContext(WINPR_ATTR_UNUSED wLog* log,
wStream* s,
363 if (!Stream_EnsureRemainingCapacity(s, 20))
366 Stream_Write_UINT32(s, tunnelContext->ContextType);
367 Stream_Write(s, &tunnelContext->ContextUuid,
368 sizeof(tunnelContext->ContextUuid));
372static BOOL tsg_ndr_pointer_write(WINPR_ATTR_UNUSED wLog* log,
wStream* s, UINT32* index,
376 const UINT32 ndrPtr = 0x20000 + (*index) * 4;
380 if (!Stream_EnsureRemainingCapacity(s, 4))
385 Stream_Write_UINT32(s, ndrPtr);
386 (*index) = (*index) + 1;
389 Stream_Write_UINT32(s, 0);
393static BOOL tsg_ndr_pointer_read(wLog* log,
wStream* s, UINT32* index, UINT32* ptrval,
397 const UINT32 ndrPtr = 0x20000 + (*index) * 4;
401 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 4))
404 const DWORD val = Stream_Get_UINT32(s);
412 WLog_Print(log, WLOG_WARN,
"Read NDR pointer 0x%04" PRIx32
" but expected 0x%04" PRIx32,
414 if ((val & 0xFFFF0000) != (ndrPtr & 0xFFFF0000))
421 WLog_Print(log, WLOG_ERROR,
"NDR pointer == 0, but the field is required");
428static BOOL tsg_ndr_write_conformant_array(WINPR_ATTR_UNUSED wLog* log,
wStream* s,
429 const void* data,
size_t length)
431 const size_t pad = length % 4;
432 if ((length > UINT32_MAX) || !Stream_EnsureRemainingCapacity(s, 4ull + length))
435 Stream_Write_UINT32(s, WINPR_ASSERTING_INT_CAST(uint32_t, length));
436 Stream_Write(s, data, length);
438 Stream_Zero(s, 4 - pad);
443static BOOL tsg_ndr_write_string(WINPR_ATTR_UNUSED wLog* log,
wStream* s,
const WCHAR* str,
446 const size_t pad = (length % 2) *
sizeof(WCHAR);
447 if ((length > UINT32_MAX) ||
448 !Stream_EnsureRemainingCapacity(s, 12ull + length *
sizeof(WCHAR) + pad))
451 Stream_Write_UINT32(s, (UINT32)length);
452 Stream_Write_UINT32(s, 0);
453 Stream_Write_UINT32(s, (UINT32)length);
454 if (!Stream_Write_UTF16_String(s, str, length))
460static BOOL tsg_ndr_read_string(wLog* log,
wStream* s, WCHAR** str, UINT32 lengthInBytes)
464 UINT32 ActualCount = 0;
466 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 12))
469 Stream_Read_UINT32(s, MaxCount);
470 Stream_Read_UINT32(s, Offset);
471 Stream_Read_UINT32(s, ActualCount);
472 if (ActualCount > MaxCount)
474 WLog_Print(log, WLOG_ERROR,
475 "failed to read string, ActualCount (%" PRIu32
") > MaxCount (%" PRIu32
")",
476 ActualCount, MaxCount);
481 WLog_Print(log, WLOG_ERROR,
"Unsupported Offset (%" PRIu32
"), expected 0", Offset);
484 if (ActualCount > lengthInBytes /
sizeof(WCHAR))
486 WLog_Print(log, WLOG_ERROR,
487 "failed to read string, ActualCount (%" PRIu32
488 ") * sizeof(WCHAR) > lengthInBytes (%" PRIu32
")",
489 ActualCount, lengthInBytes);
493 *str = Stream_PointerAs(s, WCHAR);
495 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, ActualCount *
sizeof(WCHAR)))
497 Stream_Seek(s, ActualCount *
sizeof(WCHAR));
499 const size_t pad = (ActualCount % 2);
500 return Stream_SafeSeek(s, pad *
sizeof(WCHAR));
503static BOOL tsg_ndr_read_packet_header(wLog* log,
wStream* s, TSG_PACKET_HEADER* header)
505 const UINT32 ComponentId = TS_GATEWAY_TRANSPORT;
507 WINPR_ASSERT(header);
508 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 2,
sizeof(UINT16)))
510 Stream_Read_UINT16(s, header->ComponentId);
511 Stream_Read_UINT16(s, header->PacketId);
513 if (ComponentId != header->ComponentId)
515 char buffer[64] = WINPR_C_ARRAY_INIT;
516 char buffer2[64] = WINPR_C_ARRAY_INIT;
517 WLog_Print(log, WLOG_ERROR,
"Unexpected ComponentId: %s, Expected %s",
518 tsg_component_id_to_string(header->ComponentId, buffer,
sizeof(buffer)),
519 tsg_component_id_to_string(ComponentId, buffer2,
sizeof(buffer2)));
526static BOOL tsg_ndr_write_packet_header(WINPR_ATTR_UNUSED wLog* log,
wStream* s,
527 const TSG_PACKET_HEADER* header)
529 WINPR_ASSERT(header);
530 if (!Stream_EnsureRemainingCapacity(s, 2 *
sizeof(UINT16)))
532 Stream_Write_UINT16(s, header->ComponentId);
533 Stream_Write_UINT16(s, header->PacketId);
537static BOOL tsg_ndr_read_nap(wLog* log,
wStream* s, TSG_CAPABILITY_NAP* nap)
541 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 1,
sizeof(UINT32)))
543 Stream_Read_UINT32(s, nap->capabilities);
545 char buffer[256] = WINPR_C_ARRAY_INIT;
546 WLog_Print(log, WLOG_DEBUG,
"Received version caps %s",
547 tsg_caps_to_string(nap->capabilities, buffer,
sizeof(buffer)));
552static BOOL tsg_ndr_write_nap(wLog* log,
wStream* s,
const TSG_CAPABILITY_NAP* nap)
556 if (!Stream_EnsureRemainingCapacity(s, 1 *
sizeof(UINT32)))
560 char buffer[256] = WINPR_C_ARRAY_INIT;
561 WLog_Print(log, WLOG_DEBUG,
"Sending version caps %s",
562 tsg_caps_to_string(nap->capabilities, buffer,
sizeof(buffer)));
564 Stream_Write_UINT32(s, nap->capabilities);
568static BOOL tsg_ndr_read_tsg_caps(wLog* log,
wStream* s, TSG_PACKET_CAPABILITIES* caps)
570 UINT32 capabilityType = 0;
574 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 3,
sizeof(UINT32)))
576 Stream_Read_UINT32(s, count);
577 Stream_Read_UINT32(s, capabilityType);
578 Stream_Read_UINT32(s, caps->capabilityType);
579 if (capabilityType != caps->capabilityType)
581 WLog_Print(log, WLOG_ERROR,
582 "Inconsistent data, capabilityType 0x%08" PRIx32
" != 0x%08" PRIx32,
583 capabilityType, caps->capabilityType);
586 switch (caps->capabilityType)
588 case TSG_CAPABILITY_TYPE_NAP:
591 WLog_Print(log, WLOG_ERROR,
"Inconsistent data, capabilityType %s count=%" PRIu32,
592 tsg_packet_id_to_string(capabilityType), count);
595 return tsg_ndr_read_nap(log, s, &caps->tsgPacket.tsgCapNap);
597 WLog_Print(log, WLOG_ERROR,
598 "unknown TSG_PACKET_CAPABILITIES::capabilityType 0x%04" PRIx32
599 " [count=%" PRIu32
"]",
600 caps->capabilityType, count);
605static BOOL tsg_ndr_write_tsg_caps(wLog* log,
wStream* s,
const TSG_PACKET_CAPABILITIES* caps)
609 if (!Stream_EnsureRemainingCapacity(s, 2 *
sizeof(UINT32)))
611 Stream_Write_UINT32(s, caps->capabilityType);
612 Stream_Write_UINT32(s, caps->capabilityType);
614 switch (caps->capabilityType)
616 case TSG_CAPABILITY_TYPE_NAP:
617 return tsg_ndr_write_nap(log, s, &caps->tsgPacket.tsgCapNap);
619 WLog_Print(log, WLOG_ERROR,
620 "unknown TSG_PACKET_CAPABILITIES::capabilityType 0x%04" PRIx32,
621 caps->capabilityType);
626static BOOL tsg_ndr_read_version_caps(wLog* log,
wStream* s, UINT32* index,
627 TSG_PACKET_VERSIONCAPS* caps)
630 if (!tsg_ndr_read_packet_header(log, s, &caps->tsgHeader))
633 UINT32 TSGCapsPtr = 0;
634 if (!tsg_ndr_pointer_read(log, s, index, &TSGCapsPtr, TRUE))
637 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 10))
639 Stream_Read_UINT32(s, caps->numCapabilities);
640 Stream_Read_UINT16(s, caps->majorVersion);
641 Stream_Read_UINT16(s, caps->minorVersion);
642 Stream_Read_UINT16(s, caps->quarantineCapabilities);
644 if (!tsg_stream_align(log, s, 4))
647 if (caps->numCapabilities > 1)
649 WLog_ERR(TAG,
"TSG_PACKET_VERSIONCAPS::numCapabilities > 1 (%" PRIu32
"), not supported!",
650 caps->numCapabilities);
654 return tsg_ndr_read_tsg_caps(log, s, &caps->tsgCaps);
657static BOOL tsg_ndr_write_version_caps(wLog* log,
wStream* s, UINT32* index,
658 const TSG_PACKET_VERSIONCAPS* caps)
661 if (!tsg_ndr_write_packet_header(log, s, &caps->tsgHeader))
664 if (!tsg_ndr_pointer_write(log, s, index, 1))
667 if (!Stream_EnsureRemainingCapacity(s, 10))
670 if (caps->numCapabilities > 1)
672 WLog_ERR(TAG,
"TSG_PACKET_VERSIONCAPS::numCapabilities > 1 (%" PRIu32
"), not supported!",
673 caps->numCapabilities);
676 Stream_Write_UINT32(s, caps->numCapabilities);
677 Stream_Write_UINT16(s, caps->majorVersion);
678 Stream_Write_UINT16(s, caps->minorVersion);
679 Stream_Write_UINT16(s, caps->quarantineCapabilities);
682 Stream_Write_UINT16(s, 0x0000);
683 Stream_Write_UINT32(s, caps->numCapabilities);
684 return tsg_ndr_write_tsg_caps(log, s, &caps->tsgCaps);
687static BOOL tsg_ndr_read_quarenc_response(wLog* log,
wStream* s, UINT32* index,
688 TSG_PACKET_QUARENC_RESPONSE* quarenc)
690 WINPR_ASSERT(quarenc);
691 UINT32 CertChainDataPtr = 0;
692 UINT32 VersionCapsPtr = 0;
694 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 8))
696 Stream_Read_UINT32(s, quarenc->flags);
697 Stream_Read_UINT32(s, quarenc->certChainLen);
699 if (!tsg_ndr_pointer_read(log, s, index, &CertChainDataPtr, quarenc->certChainLen != 0))
702 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 1,
sizeof(quarenc->nonce)))
704 Stream_Read(s, &quarenc->nonce,
sizeof(quarenc->nonce));
706 return (tsg_ndr_pointer_read(log, s, index, &VersionCapsPtr, TRUE));
709static BOOL tsg_ndr_read_quarenc_data(wLog* log,
wStream* s, UINT32* index,
710 TSG_PACKET_QUARENC_RESPONSE* quarenc)
712 WINPR_ASSERT(quarenc);
714 if (quarenc->certChainLen > 0)
717 if (!tsg_ndr_read_string(log, s, &quarenc->certChainData,
718 quarenc->certChainLen *
sizeof(WCHAR)))
721 if (!tsg_stream_align(log, s, 4))
725 return tsg_ndr_read_version_caps(log, s, index, &quarenc->versionCaps);
728static BOOL tsg_ndr_write_auth(wLog* log,
wStream* s, UINT32* index,
const TSG_PACKET_AUTH* auth)
732 if (!tsg_ndr_write_version_caps(log, s, index, &auth->tsgVersionCaps))
735 if (!Stream_EnsureRemainingCapacity(s, 4))
738 Stream_Write_UINT32(s, auth->cookieLen);
739 if (!tsg_ndr_pointer_write(log, s, index, auth->cookieLen))
742 if (!Stream_EnsureRemainingCapacity(s, auth->cookieLen))
744 Stream_Write(s, auth->cookie, auth->cookieLen);
748static BOOL tsg_ndr_write_reauth(wLog* log,
wStream* s, UINT32* index,
749 const TSG_PACKET_REAUTH* auth)
753 if (!Stream_EnsureRemainingCapacity(s, 12))
756 Stream_Write_UINT64(s, auth->tunnelContext);
757 Stream_Write_UINT32(s, auth->packetId);
759 switch (auth->packetId)
761 case TSG_PACKET_TYPE_VERSIONCAPS:
762 return tsg_ndr_write_version_caps(log, s, index,
763 &auth->tsgInitialPacket.packetVersionCaps);
764 case TSG_PACKET_TYPE_AUTH:
765 return tsg_ndr_write_auth(log, s, index, &auth->tsgInitialPacket.packetAuth);
767 WLog_Print(log, WLOG_ERROR,
"unexpected packetId %s",
768 tsg_packet_id_to_string(auth->packetId));
773static BOOL tsg_ndr_read_packet_redirection_flags(wLog* log,
wStream* s,
774 TSG_REDIRECTION_FLAGS* redirectionFlags)
776 WINPR_ASSERT(redirectionFlags);
778 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 8,
sizeof(UINT32)))
781 redirectionFlags->enableAllRedirections =
783 redirectionFlags->disableAllRedirections =
785 redirectionFlags->driveRedirectionDisabled =
787 redirectionFlags->printerRedirectionDisabled =
789 redirectionFlags->portRedirectionDisabled =
791 redirectionFlags->reserved = Stream_Get_INT32(s);
792 redirectionFlags->clipboardRedirectionDisabled =
794 redirectionFlags->pnpRedirectionDisabled =
799WINPR_ATTR_FORMAT_ARG(3, 4)
800static BOOL tsg_print(
char** buffer,
size_t* len, WINPR_FORMAT_ARG const
char* fmt, ...)
803 va_list ap = WINPR_C_ARRAY_INIT;
804 if (!buffer || !len || !fmt)
807 rc = vsnprintf(*buffer, *len, fmt, ap);
809 if ((rc < 0) || ((
size_t)rc > *len))
812 *buffer += (size_t)rc;
816static BOOL tsg_packet_header_to_string(
char** buffer,
size_t* length,
817 const TSG_PACKET_HEADER* header)
819 WINPR_ASSERT(buffer);
820 WINPR_ASSERT(length);
821 WINPR_ASSERT(header);
823 return tsg_print(buffer, length,
824 "header { ComponentId=0x%04" PRIx16
", PacketId=0x%04" PRIx16
" }",
825 header->ComponentId, header->PacketId);
828static BOOL tsg_type_capability_nap_to_string(
char** buffer,
size_t* length,
829 const TSG_CAPABILITY_NAP* cur)
831 WINPR_ASSERT(buffer);
832 WINPR_ASSERT(length);
835 return tsg_print(buffer, length,
"%s { capabilities=0x%08" PRIx32
" }",
836 tsg_packet_id_to_string(TSG_CAPABILITY_TYPE_NAP), cur->capabilities);
839static BOOL tsg_packet_capabilities_to_string(
char** buffer,
size_t* length,
840 const TSG_PACKET_CAPABILITIES* caps, UINT32 numCaps)
842 WINPR_ASSERT(buffer);
843 WINPR_ASSERT(length);
846 if (!tsg_print(buffer, length,
"capabilities { "))
849 for (UINT32 x = 0; x < numCaps; x++)
851 const TSG_PACKET_CAPABILITIES* cur = &caps[x];
852 switch (cur->capabilityType)
854 case TSG_CAPABILITY_TYPE_NAP:
855 if (!tsg_type_capability_nap_to_string(buffer, length, &cur->tsgPacket.tsgCapNap))
859 if (!tsg_print(buffer, length,
"TSG_UNKNOWN_CAPABILITY"))
864 return tsg_print(buffer, length,
" }");
867static BOOL tsg_packet_versioncaps_to_string(
char** buffer,
size_t* length,
868 const TSG_PACKET_VERSIONCAPS* caps)
870 WINPR_ASSERT(buffer);
871 WINPR_ASSERT(length);
874 if (!tsg_print(buffer, length,
"versioncaps { "))
876 if (!tsg_packet_header_to_string(buffer, length, &caps->tsgHeader))
879 if (!tsg_print(buffer, length,
" "))
882 if (caps->numCapabilities > 1)
884 WLog_ERR(TAG,
"TSG_PACKET_VERSIONCAPS::numCapabilities > 1 (%" PRIu32
"), not supported!",
885 caps->numCapabilities);
889 if (!tsg_packet_capabilities_to_string(buffer, length, &caps->tsgCaps, caps->numCapabilities))
892 if (!tsg_print(buffer, length,
893 " numCapabilities=0x%08" PRIx32
", majorVersion=0x%04" PRIx16
894 ", minorVersion=0x%04" PRIx16
", quarantineCapabilities=0x%04" PRIx16,
895 caps->numCapabilities, caps->majorVersion, caps->minorVersion,
896 caps->quarantineCapabilities))
899 return tsg_print(buffer, length,
" }");
902static BOOL tsg_packet_quarconfigrequest_to_string(
char** buffer,
size_t* length,
903 const TSG_PACKET_QUARCONFIGREQUEST* caps)
905 WINPR_ASSERT(buffer);
906 WINPR_ASSERT(length);
909 if (!tsg_print(buffer, length,
"quarconfigrequest { "))
912 if (!tsg_print(buffer, length,
" "))
915 if (!tsg_print(buffer, length,
" flags=0x%08" PRIx32, caps->flags))
918 return tsg_print(buffer, length,
" }");
921static BOOL tsg_packet_quarrequest_to_string(
char** buffer,
size_t* length,
922 const TSG_PACKET_QUARREQUEST* caps)
925 char* name =
nullptr;
926 char* strdata =
nullptr;
928 WINPR_ASSERT(buffer);
929 WINPR_ASSERT(length);
932 if (!tsg_print(buffer, length,
"quarrequest { "))
935 if (!tsg_print(buffer, length,
" "))
938 if (caps->nameLength > 0)
940 if (caps->nameLength > INT_MAX)
942 name = ConvertWCharNToUtf8Alloc(caps->machineName, caps->nameLength,
nullptr);
947 strdata = winpr_BinToHexString(caps->data, caps->dataLen, TRUE);
948 if (strdata || (caps->dataLen == 0))
949 rc = tsg_print(buffer, length,
950 " flags=0x%08" PRIx32
", machineName=%s [%" PRIu32
"], data[%" PRIu32
"]=%s",
951 caps->flags, name, caps->nameLength, caps->dataLen, strdata);
957 return tsg_print(buffer, length,
" }");
960static const char* tsg_bool_to_string(BOOL val)
967static const char* tsg_redirection_flags_to_string(
char* buffer,
size_t size,
968 const TSG_REDIRECTION_FLAGS* flags)
970 WINPR_ASSERT(buffer || (size == 0));
975 "enableAllRedirections=%s, disableAllRedirections=%s, driveRedirectionDisabled=%s, "
976 "printerRedirectionDisabled=%s, portRedirectionDisabled=%s, reserved=%s, "
977 "clipboardRedirectionDisabled=%s, pnpRedirectionDisabled=%s",
978 tsg_bool_to_string(flags->enableAllRedirections),
979 tsg_bool_to_string(flags->disableAllRedirections),
980 tsg_bool_to_string(flags->driveRedirectionDisabled),
981 tsg_bool_to_string(flags->printerRedirectionDisabled),
982 tsg_bool_to_string(flags->portRedirectionDisabled), tsg_bool_to_string(flags->reserved),
983 tsg_bool_to_string(flags->clipboardRedirectionDisabled),
984 tsg_bool_to_string(flags->pnpRedirectionDisabled));
988static BOOL tsg_packet_response_to_string(
char** buffer,
size_t* length,
989 const TSG_PACKET_RESPONSE* caps)
992 char* strdata =
nullptr;
993 char tbuffer[8192] = WINPR_C_ARRAY_INIT;
995 WINPR_ASSERT(buffer);
996 WINPR_ASSERT(length);
999 if (!tsg_print(buffer, length,
"response { "))
1002 if (!tsg_print(buffer, length,
" "))
1005 strdata = winpr_BinToHexString(caps->responseData, caps->responseDataLen, TRUE);
1006 if (strdata || (caps->responseDataLen == 0))
1009 " flags=0x%08" PRIx32
", reserved=0x%08" PRIx32
", responseData[%" PRIu32
1010 "]=%s, redirectionFlags={ %s }",
1011 caps->flags, caps->reserved, caps->responseDataLen, strdata,
1012 tsg_redirection_flags_to_string(tbuffer, ARRAYSIZE(tbuffer), &caps->redirectionFlags));
1017 return tsg_print(buffer, length,
" }");
1020static BOOL tsg_packet_quarenc_response_to_string(
char** buffer,
size_t* length,
1021 const TSG_PACKET_QUARENC_RESPONSE* caps)
1024 char* strdata =
nullptr;
1025 RPC_CSTR uuid =
nullptr;
1026 char tbuffer[8192] = WINPR_C_ARRAY_INIT;
1027 size_t size = ARRAYSIZE(tbuffer);
1028 char* ptbuffer = tbuffer;
1030 WINPR_ASSERT(buffer);
1031 WINPR_ASSERT(length);
1034 if (!tsg_print(buffer, length,
"quarenc_response { "))
1037 if (!tsg_print(buffer, length,
" "))
1040 if (UuidToStringA(&caps->nonce, &uuid) != RPC_S_OK)
1043 if (caps->certChainLen > 0)
1045 if (caps->certChainLen > INT_MAX)
1047 strdata = ConvertWCharNToUtf8Alloc(caps->certChainData, caps->certChainLen,
nullptr);
1052 tsg_packet_versioncaps_to_string(&ptbuffer, &size, &caps->versionCaps);
1053 if (strdata || (caps->certChainLen == 0))
1055 tsg_print(buffer, length,
1056 " flags=0x%08" PRIx32
", certChain[%" PRIu32
"]=%s, nonce=%s, versionCaps=%s",
1057 caps->flags, caps->certChainLen, strdata, uuid, tbuffer);
1061 RpcStringFreeA(&uuid);
1065 return tsg_print(buffer, length,
" }");
1068static BOOL tsg_packet_message_response_to_string(
char** buffer,
size_t* length,
1069 const TSG_PACKET_MSG_RESPONSE* caps)
1071 WINPR_ASSERT(buffer);
1072 WINPR_ASSERT(length);
1075 if (!tsg_print(buffer, length,
"msg_response { "))
1078 if (!tsg_print(buffer, length,
1079 " msgID=0x%08" PRIx32
", msgType=0x%08" PRIx32
", isMsgPresent=%" PRId32,
1080 caps->msgID, caps->msgType, caps->isMsgPresent))
1083 return tsg_print(buffer, length,
" }");
1086static BOOL tsg_packet_caps_response_to_string(
char** buffer,
size_t* length,
1087 const TSG_PACKET_CAPS_RESPONSE* caps)
1089 WINPR_ASSERT(buffer);
1090 WINPR_ASSERT(length);
1093 if (!tsg_print(buffer, length,
"caps_response { "))
1096 if (!tsg_packet_quarenc_response_to_string(buffer, length, &caps->pktQuarEncResponse))
1099 if (!tsg_packet_message_response_to_string(buffer, length, &caps->pktConsentMessage))
1102 return tsg_print(buffer, length,
" }");
1105static BOOL tsg_packet_message_request_to_string(
char** buffer,
size_t* length,
1106 const TSG_PACKET_MSG_REQUEST* caps)
1108 WINPR_ASSERT(buffer);
1109 WINPR_ASSERT(length);
1112 if (!tsg_print(buffer, length,
"caps_message_request { "))
1115 if (!tsg_print(buffer, length,
" maxMessagesPerBatch=%" PRIu32, caps->maxMessagesPerBatch))
1118 return tsg_print(buffer, length,
" }");
1121static BOOL tsg_packet_auth_to_string(
char** buffer,
size_t* length,
const TSG_PACKET_AUTH* caps)
1124 char* strdata =
nullptr;
1125 WINPR_ASSERT(buffer);
1126 WINPR_ASSERT(length);
1129 if (!tsg_print(buffer, length,
"caps_message_request { "))
1132 if (!tsg_packet_versioncaps_to_string(buffer, length, &caps->tsgVersionCaps))
1135 strdata = winpr_BinToHexString(caps->cookie, caps->cookieLen, TRUE);
1136 if (strdata || (caps->cookieLen == 0))
1137 rc = tsg_print(buffer, length,
" cookie[%" PRIu32
"]=%s", caps->cookieLen, strdata);
1142 return tsg_print(buffer, length,
" }");
1145static BOOL tsg_packet_reauth_to_string(
char** buffer,
size_t* length,
1146 const TSG_PACKET_REAUTH* caps)
1149 WINPR_ASSERT(buffer);
1150 WINPR_ASSERT(length);
1153 if (!tsg_print(buffer, length,
"caps_message_request { "))
1156 if (!tsg_print(buffer, length,
" tunnelContext=0x%016" PRIx64
", packetId=%s [0x%08" PRIx32
"]",
1157 caps->tunnelContext, tsg_packet_id_to_string(caps->packetId), caps->packetId))
1160 switch (caps->packetId)
1162 case TSG_PACKET_TYPE_VERSIONCAPS:
1163 rc = tsg_packet_versioncaps_to_string(buffer, length,
1164 &caps->tsgInitialPacket.packetVersionCaps);
1166 case TSG_PACKET_TYPE_AUTH:
1167 rc = tsg_packet_auth_to_string(buffer, length, &caps->tsgInitialPacket.packetAuth);
1170 rc = tsg_print(buffer, length,
"TODO: Unhandled packet type %s [0x%08" PRIx32
"]",
1171 tsg_packet_id_to_string(caps->packetId), caps->packetId);
1178 return tsg_print(buffer, length,
" }");
1181static const char* tsg_packet_to_string(
const TSG_PACKET* packet)
1184 static char sbuffer[8193] = WINPR_C_ARRAY_INIT;
1185 char* buffer = sbuffer;
1187 if (!tsg_print(&buffer, &len,
"TSG_PACKET { packetId=%s [0x%08" PRIx32
"], ",
1188 tsg_packet_id_to_string(packet->packetId), packet->packetId))
1191 switch (packet->packetId)
1193 case TSG_PACKET_TYPE_HEADER:
1194 if (!tsg_packet_header_to_string(&buffer, &len, &packet->tsgPacket.packetHeader))
1197 case TSG_PACKET_TYPE_VERSIONCAPS:
1198 if (!tsg_packet_versioncaps_to_string(&buffer, &len,
1199 &packet->tsgPacket.packetVersionCaps))
1202 case TSG_PACKET_TYPE_QUARCONFIGREQUEST:
1203 if (!tsg_packet_quarconfigrequest_to_string(&buffer, &len,
1204 &packet->tsgPacket.packetQuarConfigRequest))
1207 case TSG_PACKET_TYPE_QUARREQUEST:
1208 if (!tsg_packet_quarrequest_to_string(&buffer, &len,
1209 &packet->tsgPacket.packetQuarRequest))
1212 case TSG_PACKET_TYPE_RESPONSE:
1213 if (!tsg_packet_response_to_string(&buffer, &len, &packet->tsgPacket.packetResponse))
1216 case TSG_PACKET_TYPE_QUARENC_RESPONSE:
1217 if (!tsg_packet_quarenc_response_to_string(&buffer, &len,
1218 &packet->tsgPacket.packetQuarEncResponse))
1221 case TSG_PACKET_TYPE_CAPS_RESPONSE:
1222 if (!tsg_packet_caps_response_to_string(&buffer, &len,
1223 &packet->tsgPacket.packetCapsResponse))
1226 case TSG_PACKET_TYPE_MSGREQUEST_PACKET:
1227 if (!tsg_packet_message_request_to_string(&buffer, &len,
1228 &packet->tsgPacket.packetMsgRequest))
1231 case TSG_PACKET_TYPE_MESSAGE_PACKET:
1232 if (!tsg_packet_message_response_to_string(&buffer, &len,
1233 &packet->tsgPacket.packetMsgResponse))
1236 case TSG_PACKET_TYPE_AUTH:
1237 if (!tsg_packet_auth_to_string(&buffer, &len, &packet->tsgPacket.packetAuth))
1240 case TSG_PACKET_TYPE_REAUTH:
1241 if (!tsg_packet_reauth_to_string(&buffer, &len, &packet->tsgPacket.packetReauth))
1245 if (!tsg_print(&buffer, &len,
"INVALID"))
1250 if (!tsg_print(&buffer, &len,
" }"))
1257static BOOL tsg_stream_align(wLog* log,
wStream* s,
size_t align)
1265 pos = Stream_GetPosition(s);
1267 if ((pos % align) != 0)
1268 offset = align - pos % align;
1270 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, offset))
1272 Stream_Seek(s, offset);
1276static BIO_METHOD* BIO_s_tsg(
void);
1313static int TsProxySendToServer(handle_t IDL_handle,
const byte pRpcMessage[], UINT32 count,
1314 const UINT32* lengths)
1317 rdpTsg* tsg =
nullptr;
1319 const byte* buffer1 =
nullptr;
1320 const byte* buffer2 =
nullptr;
1321 const byte* buffer3 =
nullptr;
1322 UINT32 buffer1Length = 0;
1323 UINT32 buffer2Length = 0;
1324 UINT32 buffer3Length = 0;
1325 UINT32 numBuffers = 0;
1326 UINT32 totalDataBytes = 0;
1327 tsg = (rdpTsg*)IDL_handle;
1328 buffer1Length = buffer2Length = buffer3Length = 0;
1333 buffer1 = &pRpcMessage[0];
1334 buffer1Length = lengths[0];
1335 totalDataBytes += lengths[0] + 4;
1341 buffer2 = &pRpcMessage[1];
1342 buffer2Length = lengths[1];
1343 totalDataBytes += lengths[1] + 4;
1349 buffer3 = &pRpcMessage[2];
1350 buffer3Length = lengths[2];
1351 totalDataBytes += lengths[2] + 4;
1354 length = 28ull + totalDataBytes;
1355 if (length > INT_MAX)
1357 s = Stream_New(
nullptr, length);
1361 WLog_Print(tsg->log, WLOG_ERROR,
"Stream_New failed!");
1366 if (!TsProxyWriteTunnelContext(tsg->log, s, &tsg->ChannelContext))
1368 Stream_Write_UINT32_BE(s, totalDataBytes);
1369 Stream_Write_UINT32_BE(s, numBuffers);
1371 if (buffer1Length > 0)
1372 Stream_Write_UINT32_BE(s, buffer1Length);
1374 if (buffer2Length > 0)
1375 Stream_Write_UINT32_BE(s, buffer2Length);
1377 if (buffer3Length > 0)
1378 Stream_Write_UINT32_BE(s, buffer3Length);
1380 if (buffer1Length > 0)
1381 Stream_Write(s, buffer1, buffer1Length);
1383 if (buffer2Length > 0)
1384 Stream_Write(s, buffer2, buffer2Length);
1386 if (buffer3Length > 0)
1387 Stream_Write(s, buffer3, buffer3Length);
1389 if (!rpc_client_write_call(tsg->rpc, s, TsProxySendToServerOpnum))
1394 Stream_Free(s, TRUE);
1409static BOOL TsProxyCreateTunnelWriteRequest(rdpTsg* tsg,
const TSG_PACKET* tsgPacket)
1415 rdpRpc* rpc =
nullptr;
1417 if (!tsg || !tsg->rpc)
1421 WLog_Print(tsg->log, WLOG_DEBUG,
"%s", tsg_packet_to_string(tsgPacket));
1422 s = Stream_New(
nullptr, 108);
1427 switch (tsgPacket->packetId)
1429 case TSG_PACKET_TYPE_VERSIONCAPS:
1432 const TSG_PACKET_VERSIONCAPS* packetVersionCaps =
1433 &tsgPacket->tsgPacket.packetVersionCaps;
1435 Stream_Write_UINT32(s, tsgPacket->packetId);
1436 Stream_Write_UINT32(s, tsgPacket->packetId);
1437 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
1440 if (!tsg_ndr_write_version_caps(tsg->log, s, &index, packetVersionCaps))
1450 Stream_Write_UINT8(s, 0x8A);
1451 Stream_Write_UINT8(s, 0xE3);
1452 Stream_Write_UINT8(s, 0x13);
1453 Stream_Write_UINT8(s, 0x71);
1454 Stream_Write_UINT8(s, 0x02);
1455 Stream_Write_UINT8(s, 0xF4);
1456 Stream_Write_UINT8(s, 0x36);
1457 Stream_Write_UINT8(s, 0x71);
1458 Stream_Write_UINT32(s, 0x00040001);
1459 Stream_Write_UINT32(s, 0x00000001);
1461 Stream_Write_UINT8(s, 2);
1462 Stream_Write_UINT8(s, 0x40);
1463 Stream_Write_UINT16(s, 0x0028);
1465 Stream_Write(s, &TSGU_UUID,
sizeof(
p_uuid_t));
1466 Stream_Write_UINT32(s, TSGU_SYNTAX_IF_VERSION);
1468 Stream_Write(s, &NDR_UUID,
sizeof(
p_uuid_t));
1469 Stream_Write_UINT32(s, NDR_SYNTAX_IF_VERSION);
1470 opnum = TsProxyCreateTunnelOpnum;
1474 case TSG_PACKET_TYPE_REAUTH:
1476 const TSG_PACKET_REAUTH* packetReauth = &tsgPacket->tsgPacket.packetReauth;
1478 Stream_Write_UINT32(s, tsgPacket->packetId);
1479 Stream_Write_UINT32(s, tsgPacket->packetId);
1480 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
1482 if (!tsg_ndr_write_reauth(tsg->log, s, &index, packetReauth))
1484 opnum = TsProxyCreateTunnelOpnum;
1489 WLog_Print(tsg->log, WLOG_WARN,
"unexpected packetId %s",
1490 tsg_packet_id_to_string(tsgPacket->packetId));
1498 return rpc_client_write_call(rpc, s, opnum);
1500 Stream_Free(s, TRUE);
1504static BOOL tsg_ndr_read_consent_message(wLog* log, rdpContext* context,
wStream* s, UINT32* index,
1505 BOOL isMessagePresent)
1507 TSG_PACKET_STRING_MESSAGE packetStringMessage = WINPR_C_ARRAY_INIT;
1509 WINPR_ASSERT(context);
1510 WINPR_ASSERT(index);
1512 if (!TsProxyReadPacketSTringMessage(log, s, index, &packetStringMessage))
1515 if (context->instance && isMessagePresent)
1517 return IFCALLRESULT(TRUE, context->instance->PresentGatewayMessage, context->instance,
1518 TSG_ASYNC_MESSAGE_CONSENT_MESSAGE ? GATEWAY_MESSAGE_CONSENT
1519 : TSG_ASYNC_MESSAGE_SERVICE_MESSAGE,
1520 packetStringMessage.isDisplayMandatory != 0,
1521 packetStringMessage.isConsentMandatory != 0,
1522 packetStringMessage.msgBytes, packetStringMessage.msgBuffer);
1531 if (!tsg_stream_align(log, s, 4))
1535 if (!TsProxyReadTunnelContext(log, s, tunnelContext))
1538 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 8))
1541 WINPR_ASSERT(tunnelId);
1542 Stream_Read_UINT32(s, *tunnelId);
1544 INT32 ReturnValue = 0;
1545 Stream_Read_INT32(s, ReturnValue);
1546 if (ReturnValue != NO_ERROR)
1547 WLog_WARN(TAG,
"ReturnValue=%s", NtStatus2Tag(ReturnValue));
1551static BOOL tsg_ndr_read_TSG_PACKET_MSG_RESPONSE_header(wLog* log,
wStream* s,
1552 TSG_PACKET_MSG_RESPONSE* pkt)
1555 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 16))
1558 Stream_Read_UINT32(s, pkt->msgID);
1559 Stream_Read_UINT32(s, pkt->msgType);
1560 Stream_Read_INT32(s, pkt->isMsgPresent);
1561 const uint32_t SwitchValue = Stream_Get_UINT32(s);
1563 if (pkt->msgType != SwitchValue)
1566 "[MS-TSGU] 2.2.9.2.1.9 TSG_PACKET_MSG_RESPONSE MsgType[0x%08" PRIx32
1567 "] != MessageSwitchValue [0x%08" PRIx32
"]",
1568 pkt->msgType, SwitchValue);
1575static BOOL tsg_ndr_read_TSG_PACKET_MSG_RESPONSE(wLog* log, rdpContext* context,
wStream* s,
1576 uint32_t* index, uint32_t MsgPtr,
1577 const TSG_PACKET_MSG_RESPONSE* pkg,
1578 uint64_t* reauthContext)
1584 WLog_Print(log, WLOG_DEBUG,
1585 "Message {0x%08" PRIx32
"} [%s]::isMsgPresent=%" PRId32
", MsgPtr=0x%08" PRIx32,
1586 pkg->msgType, tsg_packet_id_to_string(pkg->msgType), pkg->isMsgPresent, MsgPtr);
1590 switch (pkg->msgType)
1592 case TSG_ASYNC_MESSAGE_CONSENT_MESSAGE:
1593 case TSG_ASYNC_MESSAGE_SERVICE_MESSAGE:
1594 return tsg_ndr_read_consent_message(log, context, s, index, pkg->isMsgPresent);
1596 case TSG_ASYNC_MESSAGE_REAUTH:
1598 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 8))
1601 WINPR_ASSERT(reauthContext);
1602 const uint64_t val = Stream_Get_UINT64(s);
1603 if (pkg->isMsgPresent != 0)
1604 *reauthContext = val;
1609 WLog_Print(log, WLOG_ERROR,
"Unexpected Message Type: 0x%" PRIx32
"", pkg->msgType);
1614static BOOL tsg_ndr_read_caps_response(wLog* log, rdpContext* context,
wStream* s, UINT32* index,
1615 UINT32 PacketPtr, TSG_PACKET_CAPS_RESPONSE* caps,
1617 uint64_t* reauthContext)
1619 UINT32 PacketQuarResponsePtr = 0;
1621 WINPR_ASSERT(context);
1622 WINPR_ASSERT(index);
1624 WINPR_ASSERT(reauthContext);
1626 if (!tsg_ndr_pointer_read(log, s, index, &PacketQuarResponsePtr, TRUE))
1629 if (!tsg_ndr_read_quarenc_response(log, s, index, &caps->pktQuarEncResponse))
1634 TSG_PACKET_MSG_RESPONSE pkg = WINPR_C_ARRAY_INIT;
1637 if (!tsg_ndr_read_TSG_PACKET_MSG_RESPONSE_header(log, s, &pkg))
1640 if (!tsg_ndr_pointer_read(log, s, index, &MsgPtr, TRUE))
1643 if (!tsg_ndr_read_quarenc_data(log, s, index, &caps->pktQuarEncResponse))
1646 if (!tsg_ndr_read_TSG_PACKET_MSG_RESPONSE(log, context, s, index, MsgPtr, &pkg,
1651 return tsg_ndr_read_tunnel_context(log, s, tunnelContext, tunnelId);
1656static BOOL TsProxyCreateTunnelReadResponse(rdpTsg* tsg,
const RPC_PDU* pdu,
1661 TSG_PACKET packet = WINPR_C_ARRAY_INIT;
1662 UINT32 SwitchValue = 0;
1663 rdpContext* context =
nullptr;
1664 UINT32 PacketPtr = 0;
1667 WINPR_ASSERT(tsg->rpc);
1668 WINPR_ASSERT(tsg->rpc->transport);
1670 context = transport_get_context(tsg->rpc->transport);
1671 WINPR_ASSERT(context);
1676 if (!tsg_ndr_pointer_read(tsg->log, pdu->s, &index, &PacketPtr, TRUE))
1679 if (!Stream_CheckAndLogRequiredLengthWLog(tsg->log, pdu->s, 8))
1681 Stream_Read_UINT32(pdu->s, packet.packetId);
1682 Stream_Read_UINT32(pdu->s, SwitchValue);
1684 WLog_Print(tsg->log, WLOG_DEBUG,
"%s", tsg_packet_id_to_string(packet.packetId));
1686 if ((packet.packetId == TSG_PACKET_TYPE_CAPS_RESPONSE) &&
1687 (SwitchValue == TSG_PACKET_TYPE_CAPS_RESPONSE))
1689 if (!tsg_ndr_read_caps_response(tsg->log, context, pdu->s, &index, PacketPtr,
1690 &packet.tsgPacket.packetCapsResponse, tunnelContext,
1691 tunnelId, &tsg->ReauthTunnelContext))
1693 tsg->CapsResponse = packet.tsgPacket.packetCapsResponse.pktQuarEncResponse;
1695 else if ((packet.packetId == TSG_PACKET_TYPE_QUARENC_RESPONSE) &&
1696 (SwitchValue == TSG_PACKET_TYPE_QUARENC_RESPONSE))
1698 UINT32 PacketQuarResponsePtr = 0;
1700 if (!tsg_ndr_pointer_read(tsg->log, pdu->s, &index, &PacketQuarResponsePtr, TRUE))
1703 if (!tsg_ndr_read_quarenc_response(tsg->log, pdu->s, &index,
1704 &packet.tsgPacket.packetQuarEncResponse))
1707 if (!tsg_ndr_read_quarenc_data(tsg->log, pdu->s, &index,
1708 &packet.tsgPacket.packetQuarEncResponse))
1711 if (!tsg_ndr_read_tunnel_context(tsg->log, pdu->s, tunnelContext, tunnelId))
1714 tsg->CapsResponse = packet.tsgPacket.packetQuarEncResponse;
1718 WLog_Print(tsg->log, WLOG_ERROR,
1719 "Unexpected PacketId: 0x%08" PRIX32
", Expected TSG_PACKET_TYPE_CAPS_RESPONSE "
1720 "or TSG_PACKET_TYPE_QUARENC_RESPONSE",
1726 const size_t rem = Stream_GetRemainingLength(pdu->s);
1729 WLog_Print(tsg->log, WLOG_WARN,
"Partially parsed %s, %" PRIuz
" bytes remain",
1730 tsg_packet_id_to_string(packet.packetId), rem);
1750static BOOL TsProxyAuthorizeTunnelWriteRequest(rdpTsg* tsg,
CONTEXT_HANDLE* tunnelContext)
1752 if (!tsg || !tsg->rpc || !tunnelContext)
1755 rdpRpc* rpc = tsg->rpc;
1757 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxyAuthorizeTunnelWriteRequest");
1758 wStream* s = Stream_New(
nullptr, 1024 +
sizeof(WCHAR) * tsg->QuarreQuest.nameLength +
1759 tsg->QuarreQuest.dataLen);
1764 if (!TsProxyWriteTunnelContext(tsg->log, s, tunnelContext))
1766 Stream_Free(s, TRUE);
1772 Stream_Write_UINT32(s, TSG_PACKET_TYPE_QUARREQUEST);
1773 Stream_Write_UINT32(s, TSG_PACKET_TYPE_QUARREQUEST);
1774 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
1776 Stream_Write_UINT32(s, tsg->QuarreQuest.flags);
1777 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
1779 Stream_Write_UINT32(s, tsg->QuarreQuest.nameLength);
1780 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
1782 Stream_Write_UINT32(s, tsg->QuarreQuest.dataLen);
1784 if (!tsg_ndr_write_string(tsg->log, s, tsg->QuarreQuest.machineName,
1785 tsg->QuarreQuest.nameLength))
1788 if (!tsg_ndr_write_conformant_array(tsg->log, s, tsg->QuarreQuest.data,
1789 tsg->QuarreQuest.dataLen))
1792 Stream_SealLength(s);
1793 return rpc_client_write_call(rpc, s, TsProxyAuthorizeTunnelOpnum);
1795 Stream_Free(s, TRUE);
1799static UINT32 tsg_redir_to_flags(
const TSG_REDIRECTION_FLAGS* redirect)
1802 if (redirect->enableAllRedirections)
1803 flags |= HTTP_TUNNEL_REDIR_ENABLE_ALL;
1804 if (redirect->disableAllRedirections)
1805 flags |= HTTP_TUNNEL_REDIR_DISABLE_ALL;
1807 if (redirect->driveRedirectionDisabled)
1808 flags |= HTTP_TUNNEL_REDIR_DISABLE_DRIVE;
1809 if (redirect->printerRedirectionDisabled)
1810 flags |= HTTP_TUNNEL_REDIR_DISABLE_PRINTER;
1811 if (redirect->portRedirectionDisabled)
1812 flags |= HTTP_TUNNEL_REDIR_DISABLE_PORT;
1813 if (redirect->clipboardRedirectionDisabled)
1814 flags |= HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD;
1815 if (redirect->pnpRedirectionDisabled)
1816 flags |= HTTP_TUNNEL_REDIR_DISABLE_PNP;
1820static BOOL tsg_redirect_apply(rdpTsg* tsg,
const TSG_REDIRECTION_FLAGS* redirect)
1823 WINPR_ASSERT(redirect);
1825 rdpTransport* transport = tsg->transport;
1826 WINPR_ASSERT(transport);
1828 rdpContext* context = transport_get_context(transport);
1829 UINT32 redirFlags = tsg_redir_to_flags(redirect);
1830 return utils_apply_gateway_policy(tsg->log, context, redirFlags,
"TSG");
1833static BOOL tsg_ndr_read_timeout(wLog* log,
wStream* s,
size_t tlen)
1835 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 1,
sizeof(UINT32)))
1838 if (tlen <
sizeof(UINT32))
1840 WLog_Print(log, WLOG_ERROR,
"[IDLE_TIMEOUT] array element length %" PRIuz
", expected 4",
1845 const UINT32 idleTimeout = Stream_Get_UINT32(s);
1846 WLog_Print(log, WLOG_DEBUG,
"[IDLE_TIMEOUT] idleTimeout=%" PRIu32
": TODO: unused",
1851static BOOL tsg_ndr_read_sohr(wLog* log,
wStream* s, BOOL expected)
1853 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, s, 1,
sizeof(UINT32)))
1856 const UINT32 len = Stream_Get_UINT32(s);
1861 WLog_Print(log, WLOG_DEBUG,
"[SOH] len=%" PRIu32
": skipping", len);
1868 WLog_Print(log, WLOG_WARN,
"[SOH] len=%" PRIu32
": expected length > 0", len);
1871 WLog_Print(log, WLOG_DEBUG,
"[SOH] len=%" PRIu32
": TODO: unused", len);
1872 if (!Stream_SafeSeek(s, len))
1875 winpr_HexLogDump(log, WLOG_DEBUG, Stream_Pointer(s), len);
1879static BOOL tsg_ndr_read_packet_response_data(rdpTsg* tsg,
wStream* s,
1880 const TSG_PACKET_RESPONSE* response)
1884 if (!Stream_CheckAndLogRequiredCapacityOfSizeWLog(tsg->log, s, 1, 4))
1887 const uint32_t arrayMaxLen = Stream_Get_UINT32(s);
1888 const size_t rem = Stream_GetRemainingLength(s);
1889 if (arrayMaxLen != response->responseDataLen)
1891 WLog_Print(tsg->log, WLOG_ERROR,
1892 "2.2.9.2.1.5 TSG_PACKET_RESPONSE::responseDataLen=%" PRIu32
1893 " != NDR array len %" PRIu32,
1894 response->responseDataLen, arrayMaxLen);
1896 if (response->responseDataLen > 0)
1898 if (!Stream_CheckAndLogRequiredCapacityOfSizeWLog(tsg->log, s, 1, 4))
1901 if (tsg->CapsResponse.versionCaps.tsgCaps.capabilityType != TSG_CAPABILITY_TYPE_NAP)
1904 tsg->log, WLOG_ERROR,
1905 "2.2.9.2.1.5 TSG_PACKET_RESPONSE Negotiated Capabilities type is 0x%08" PRIx32
1906 ", expected TSG_CAPABILITY_TYPE_NAP[0x00000001]",
1907 tsg->CapsResponse.versionCaps.tsgCaps.capabilityType);
1910 const UINT32 mask = (TSG_NAP_CAPABILITY_QUAR_SOH | TSG_NAP_CAPABILITY_IDLE_TIMEOUT);
1912 (tsg->CapsResponse.versionCaps.tsgCaps.tsgPacket.tsgCapNap.capabilities & mask);
1913 if ((val == mask) && (tsg->QuarreQuest.dataLen > 0))
1915 if (!tsg_ndr_read_timeout(tsg->log, s, arrayMaxLen))
1917 if (!tsg_ndr_read_sohr(tsg->log, s, TRUE))
1920 else if ((val == TSG_NAP_CAPABILITY_QUAR_SOH) && (tsg->QuarreQuest.dataLen > 0))
1922 if (!tsg_ndr_read_sohr(tsg->log, s, TRUE))
1925 else if ((val & TSG_NAP_CAPABILITY_IDLE_TIMEOUT) != 0)
1927 if (!tsg_ndr_read_timeout(tsg->log, s, arrayMaxLen))
1929 if (!tsg_ndr_read_sohr(tsg->log, s, FALSE))
1935 tsg->log, WLOG_ERROR,
1936 "2.2.9.2.1.5 TSG_PACKET_RESPONSE::responseDataLen=%" PRIu32
1937 ", but neither TSG_NAP_CAPABILITY_QUAR_SOH nor "
1938 "TSG_NAP_CAPABILITY_IDLE_TIMEOUT are set, so expecting 0 (actually got %" PRIuz
")",
1939 response->responseDataLen, rem);
1945 char buffer[256] = WINPR_C_ARRAY_INIT;
1946 WLog_Print(tsg->log, WLOG_WARN,
1947 "2.2.9.2.1.5 TSG_PACKET_RESPONSE::responseDataLen=%" PRIu32
1948 ", but actually got %" PRIuz
" [flags=%s], ignoring.",
1949 response->responseDataLen, rem,
1951 tsg->CapsResponse.versionCaps.tsgCaps.tsgPacket.tsgCapNap.capabilities,
1952 buffer,
sizeof(buffer)));
1953 if (!Stream_SafeSeek(s, rem))
1958 const size_t trem = Stream_GetRemainingLength(s);
1961 WLog_Print(tsg->log, WLOG_WARN,
1962 "2.2.9.2.1.5 TSG_PACKET_RESPONSE %" PRIuz
" unhandled bytes remain", trem);
1968static BOOL TsProxyAuthorizeTunnelReadResponse(rdpTsg* tsg,
const RPC_PDU* pdu)
1971 UINT32 SwitchValue = 0;
1973 TSG_PACKET packet = WINPR_C_ARRAY_INIT;
1974 UINT32 PacketPtr = 0;
1975 UINT32 PacketResponseDataPtr = 0;
1980 wLog* log = tsg->log;
1983 if (!tsg_ndr_pointer_read(log, pdu->s, &index, &PacketPtr, TRUE))
1986 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, 8))
1988 Stream_Read_UINT32(pdu->s, packet.packetId);
1989 Stream_Read_UINT32(pdu->s, SwitchValue);
1991 WLog_Print(log, WLOG_DEBUG,
"%s", tsg_packet_id_to_string(packet.packetId));
1993 if (packet.packetId == E_PROXY_NAP_ACCESSDENIED)
1995 WLog_Print(log, WLOG_ERROR,
"status: E_PROXY_NAP_ACCESSDENIED (0x%08X)",
1996 E_PROXY_NAP_ACCESSDENIED);
1997 WLog_Print(log, WLOG_ERROR,
1998 "Ensure that the Gateway Connection Authorization Policy is correct");
2002 if ((packet.packetId != TSG_PACKET_TYPE_RESPONSE) || (SwitchValue != TSG_PACKET_TYPE_RESPONSE))
2004 WLog_Print(log, WLOG_ERROR,
2005 "Unexpected PacketId: 0x%08" PRIX32
", Expected TSG_PACKET_TYPE_RESPONSE",
2010 if (!tsg_ndr_pointer_read(log, pdu->s, &index,
nullptr, TRUE))
2013 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, 8))
2016 packet.tsgPacket.packetResponse.flags = Stream_Get_UINT32(pdu->s);
2017 if (packet.tsgPacket.packetResponse.flags != TSG_PACKET_TYPE_QUARREQUEST)
2019 WLog_Print(log, WLOG_ERROR,
2020 "Unexpected Packet Response flags: 0x%08" PRIX32
2021 ", Expected TSG_PACKET_TYPE_QUARREQUEST",
2022 packet.tsgPacket.packetResponse.flags);
2026 packet.tsgPacket.packetResponse.reserved = Stream_Get_UINT32(pdu->s);
2028 packet.tsgPacket.packetResponse.responseData =
nullptr;
2029 if (!tsg_ndr_pointer_read(log, pdu->s, &index, &PacketResponseDataPtr, FALSE))
2032 packet.tsgPacket.packetResponse.responseDataLen = Stream_Get_UINT32(pdu->s);
2033 if (packet.tsgPacket.packetResponse.responseDataLen > 24000)
2035 WLog_Print(log, WLOG_ERROR,
2036 "2.2.9.2.1.5 TSG_PACKET_RESPONSE::responseDataLen %" PRIu32
" > maximum(24000)",
2037 packet.tsgPacket.packetResponse.responseDataLen);
2040 if ((PacketResponseDataPtr == 0) && (packet.tsgPacket.packetResponse.responseDataLen != 0))
2042 WLog_Print(log, WLOG_ERROR,
2043 "2.2.9.2.1.5 TSG_PACKET_RESPONSE::responseDataLen %" PRIu32
2044 " but responseData = nullptr",
2045 packet.tsgPacket.packetResponse.responseDataLen);
2049 if (!tsg_ndr_read_packet_redirection_flags(log, pdu->s,
2050 &packet.tsgPacket.packetResponse.redirectionFlags))
2053 packet.tsgPacket.packetResponse.responseData = Stream_Pointer(pdu->s);
2054 if (!tsg_ndr_read_packet_response_data(tsg, pdu->s, &packet.tsgPacket.packetResponse))
2057 rc = tsg_redirect_apply(tsg, &packet.tsgPacket.packetResponse.redirectionFlags);
2074static BOOL TsProxyMakeTunnelCallWriteRequest(rdpTsg* tsg,
CONTEXT_HANDLE* tunnelContext,
2078 rdpRpc* rpc =
nullptr;
2080 if (!tsg || !tsg->rpc || !tunnelContext)
2084 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxyMakeTunnelCallWriteRequest");
2085 s = Stream_New(
nullptr, 40);
2092 if (!TsProxyWriteTunnelContext(tsg->log, s, tunnelContext))
2094 Stream_Write_UINT32(s, procId);
2096 Stream_Write_UINT32(s, TSG_PACKET_TYPE_MSGREQUEST_PACKET);
2097 Stream_Write_UINT32(s, TSG_PACKET_TYPE_MSGREQUEST_PACKET);
2098 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
2100 Stream_Write_UINT32(s, 0x00000001);
2101 return rpc_client_write_call(rpc, s, TsProxyMakeTunnelCallOpnum);
2103 Stream_Free(s, TRUE);
2107static BOOL TsProxyReadPacketSTringMessage(wLog* log,
wStream* s, uint32_t* index,
2108 TSG_PACKET_STRING_MESSAGE* msg)
2114 const TSG_PACKET_STRING_MESSAGE empty = WINPR_C_ARRAY_INIT;
2117 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 12))
2120 Stream_Read_INT32(s, msg->isDisplayMandatory);
2121 Stream_Read_INT32(s, msg->isConsentMandatory);
2122 Stream_Read_UINT32(s, msg->msgBytes);
2124 if (!tsg_ndr_pointer_read(log, s, index, &MsgPtr, msg->msgBytes != 0))
2127 if (msg->msgBytes > TSG_MESSAGING_MAX_MESSAGE_LENGTH)
2129 WLog_Print(log, WLOG_ERROR,
"Out of Spec Message Length %" PRIu32
"", msg->msgBytes);
2133 if (msg->msgBytes == 0)
2135 WLog_Print(log, WLOG_DEBUG,
"Empty message, skipping string read");
2139 return tsg_ndr_read_string(log, s, &msg->msgBuffer, msg->msgBytes);
2142static BOOL TsProxyMakeTunnelCallReadResponse(rdpTsg* tsg,
const RPC_PDU* pdu)
2146 TSG_PACKET packet = WINPR_C_ARRAY_INIT;
2147 rdpContext* context =
nullptr;
2148 TSG_PACKET_MSG_RESPONSE packetMsgResponse = WINPR_C_ARRAY_INIT;
2149 UINT32 PacketPtr = 0;
2150 UINT32 PacketMsgResponsePtr = 0;
2153 WINPR_ASSERT(tsg->rpc);
2155 context = transport_get_context(tsg->rpc->transport);
2156 WINPR_ASSERT(context);
2163 if (!Stream_CheckAndLogRequiredLengthWLog(tsg->log, pdu->s, 28))
2166 if (!tsg_ndr_pointer_read(tsg->log, pdu->s, &index, &PacketPtr, TRUE))
2169 Stream_Read_UINT32(pdu->s, packet.packetId);
2172 const uint32_t SwitchValue = Stream_Get_UINT32(pdu->s);
2173 WLog_Print(tsg->log, WLOG_DEBUG,
"%s", tsg_packet_id_to_string(packet.packetId));
2175 if ((packet.packetId != TSG_PACKET_TYPE_MESSAGE_PACKET) || (packet.packetId != SwitchValue))
2177 WLog_Print(tsg->log, WLOG_ERROR,
2178 "Unexpected PacketId: 0x%08" PRIX32
2179 ", Expected TSG_PACKET_TYPE_MESSAGE_PACKET",
2185 if (!tsg_ndr_pointer_read(tsg->log, pdu->s, &index, &PacketMsgResponsePtr, TRUE))
2188 if (!tsg_ndr_read_TSG_PACKET_MSG_RESPONSE_header(tsg->log, pdu->s, &packetMsgResponse))
2192 UINT32 MessagePtr = 0;
2193 if (!tsg_ndr_pointer_read(tsg->log, pdu->s, &index, &MessagePtr, TRUE))
2196 if (!tsg_ndr_read_TSG_PACKET_MSG_RESPONSE(tsg->log, context, pdu->s, &index, MessagePtr,
2197 &packetMsgResponse, &tsg->ReauthTunnelContext))
2217static BOOL TsProxyCreateChannelWriteRequest(rdpTsg* tsg,
CONTEXT_HANDLE* tunnelContext)
2220 WINPR_ASSERT(tunnelContext);
2222 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxyCreateChannelWriteRequest");
2224 if (!tsg->rpc || !tsg->Hostname)
2227 rdpRpc* rpc = tsg->rpc;
2228 const size_t count = _wcslen(tsg->Hostname) + 1;
2229 if (count > UINT32_MAX)
2232 wStream* s = Stream_New(
nullptr, 60 + count * 2);
2237 if (!TsProxyWriteTunnelContext(tsg->log, s, tunnelContext))
2243 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
2245 Stream_Write_UINT32(s, 0x00000001);
2246 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 0))
2250 Stream_Write_UINT16(s, 0x0000);
2251 Stream_Write_UINT16(s, 0x0000);
2253 Stream_Write_UINT16(s, 0x0003);
2254 Stream_Write_UINT16(s, tsg->Port);
2255 Stream_Write_UINT32(s, 0x00000001);
2258 if (!tsg_ndr_pointer_write(tsg->log, s, &index, 1))
2261 if (!tsg_ndr_write_string(tsg->log, s, tsg->Hostname, count))
2263 return rpc_client_write_call(rpc, s, TsProxyCreateChannelOpnum);
2266 Stream_Free(s, TRUE);
2270static BOOL TsProxyCreateChannelReadResponse(wLog* log,
const RPC_PDU* pdu,
2277 WINPR_ASSERT(channelId);
2279 WLog_Print(log, WLOG_DEBUG,
"TsProxyCreateChannelReadResponse");
2281 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, 28))
2285 if (!TsProxyReadTunnelContext(log, pdu->s, channelContext))
2287 if (!Stream_CheckAndLogRequiredLengthOfSizeWLog(log, pdu->s, 2,
sizeof(UINT32)))
2289 Stream_Read_UINT32(pdu->s, *channelId);
2290 Stream_Seek_UINT32(pdu->s);
2302static BOOL TsProxyCloseChannelWriteRequest(rdpTsg* tsg,
CONTEXT_HANDLE* context)
2305 WINPR_ASSERT(context);
2307 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxyCloseChannelWriteRequest");
2309 rdpRpc* rpc = tsg->rpc;
2312 wStream* s = Stream_New(
nullptr, 20);
2318 if (!TsProxyWriteTunnelContext(tsg->log, s, context))
2320 return rpc_client_write_call(rpc, s, TsProxyCloseChannelOpnum);
2322 Stream_Free(s, TRUE);
2329 WLog_Print(log, WLOG_DEBUG,
"TsProxyCloseChannelReadResponse");
2334 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, 24))
2338 if (!TsProxyReadTunnelContext(log, pdu->s, context))
2342 const size_t len =
sizeof(UINT32);
2343 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, len))
2345 Stream_Seek(pdu->s, len);
2358static BOOL TsProxyCloseTunnelWriteRequest(rdpTsg* tsg,
const CONTEXT_HANDLE* context)
2361 WINPR_ASSERT(context);
2363 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxyCloseTunnelWriteRequest");
2365 rdpRpc* rpc = tsg->rpc;
2368 wStream* s = Stream_New(
nullptr, 20);
2374 if (!TsProxyWriteTunnelContext(tsg->log, s, context))
2376 return rpc_client_write_call(rpc, s, TsProxyCloseTunnelOpnum);
2378 Stream_Free(s, TRUE);
2388 WINPR_ASSERT(context);
2390 WLog_Print(log, WLOG_DEBUG,
"TsProxyCloseTunnelReadResponse");
2392 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, 24))
2396 if (!TsProxyReadTunnelContext(log, pdu->s, context))
2399 const size_t len =
sizeof(UINT32);
2400 if (!Stream_CheckAndLogRequiredLengthWLog(log, pdu->s, len))
2402 Stream_Seek(pdu->s, len);
2417static BOOL TsProxySetupReceivePipeWriteRequest(rdpTsg* tsg,
const CONTEXT_HANDLE* channelContext)
2420 rdpRpc* rpc =
nullptr;
2421 WLog_Print(tsg->log, WLOG_DEBUG,
"TsProxySetupReceivePipeWriteRequest");
2424 WINPR_ASSERT(tsg->rpc);
2426 if (!channelContext)
2430 s = Stream_New(
nullptr, 20);
2436 if (!TsProxyWriteTunnelContext(tsg->log, s, channelContext))
2438 return rpc_client_write_call(rpc, s, TsProxySetupReceivePipeOpnum);
2440 Stream_Free(s, TRUE);
2444static BOOL tsg_transition_to_state(rdpTsg* tsg, TSG_STATE state)
2447 const char* oldState = tsg_state_to_string(tsg->state);
2448 const char* newState = tsg_state_to_string(state);
2450 WLog_Print(tsg->log, WLOG_DEBUG,
"%s -> %s", oldState, newState);
2451 return tsg_set_state(tsg, state);
2454static BOOL tsg_initialize_version_caps(
const rdpTsg* tsg,
2455 TSG_PACKET_VERSIONCAPS* packetVersionCaps)
2458 WINPR_ASSERT(packetVersionCaps);
2460 packetVersionCaps->tsgHeader.ComponentId = TS_GATEWAY_TRANSPORT;
2461 packetVersionCaps->tsgHeader.PacketId = TSG_PACKET_TYPE_VERSIONCAPS;
2462 packetVersionCaps->numCapabilities = 1;
2463 packetVersionCaps->majorVersion = 1;
2464 packetVersionCaps->minorVersion = 1;
2465 packetVersionCaps->quarantineCapabilities = 0;
2466 packetVersionCaps->tsgCaps.capabilityType = TSG_CAPABILITY_TYPE_NAP;
2476 packetVersionCaps->tsgCaps.tsgPacket.tsgCapNap.capabilities =
2477 TSG_NAP_CAPABILITY_IDLE_TIMEOUT | TSG_MESSAGING_CAP_CONSENT_SIGN |
2478 TSG_MESSAGING_CAP_SERVICE_MSG | TSG_MESSAGING_CAP_REAUTH;
2479 if (tsg->QuarreQuest.dataLen > 0)
2480 packetVersionCaps->tsgCaps.tsgPacket.tsgCapNap.capabilities |= TSG_NAP_CAPABILITY_QUAR_SOH;
2485static void resetCaps(rdpTsg* tsg)
2488 const TSG_PACKET_QUARENC_RESPONSE empty = WINPR_C_ARRAY_INIT;
2489 tsg->CapsResponse = empty;
2492BOOL tsg_proxy_begin(rdpTsg* tsg)
2494 TSG_PACKET tsgPacket = WINPR_C_ARRAY_INIT;
2498 tsgPacket.packetId = TSG_PACKET_TYPE_VERSIONCAPS;
2499 if (!tsg_initialize_version_caps(tsg, &tsgPacket.tsgPacket.packetVersionCaps) ||
2500 !TsProxyCreateTunnelWriteRequest(tsg, &tsgPacket))
2502 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCreateTunnel failure");
2503 tsg_transition_to_state(tsg, TSG_STATE_FINAL);
2509 return tsg_transition_to_state(tsg, TSG_STATE_INITIAL);
2512static BOOL tsg_proxy_reauth(rdpTsg* tsg)
2514 TSG_PACKET tsgPacket = WINPR_C_ARRAY_INIT;
2518 tsg->reauthSequence = TRUE;
2519 TSG_PACKET_REAUTH* packetReauth = &tsgPacket.tsgPacket.packetReauth;
2521 tsgPacket.packetId = TSG_PACKET_TYPE_REAUTH;
2522 packetReauth->tunnelContext = tsg->ReauthTunnelContext;
2523 packetReauth->packetId = TSG_PACKET_TYPE_VERSIONCAPS;
2525 if (!tsg_initialize_version_caps(tsg, &packetReauth->tsgInitialPacket.packetVersionCaps))
2528 if (!TsProxyCreateTunnelWriteRequest(tsg, &tsgPacket))
2530 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCreateTunnel failure");
2531 tsg_transition_to_state(tsg, TSG_STATE_FINAL);
2535 if (!TsProxyMakeTunnelCallWriteRequest(tsg, &tsg->TunnelContext,
2536 TSG_TUNNEL_CALL_ASYNC_MSG_REQUEST))
2538 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyMakeTunnelCall failure");
2539 tsg_transition_to_state(tsg, TSG_STATE_FINAL);
2544 return tsg_transition_to_state(tsg, TSG_STATE_INITIAL);
2547BOOL tsg_recv_pdu(rdpTsg* tsg,
const RPC_PDU* pdu)
2551 rdpRpc* rpc =
nullptr;
2555 WINPR_ASSERT(tsg->rpc);
2559 if (!(pdu->Flags & RPC_PDU_FLAG_STUB))
2561 const size_t len = 24;
2562 if (!Stream_CheckAndLogRequiredLengthWLog(tsg->log, pdu->s, len))
2564 Stream_Seek(pdu->s, len);
2567 const TSG_STATE oldState = tsg->state;
2570 case TSG_STATE_INITIAL:
2573 TunnelContext = (tsg->reauthSequence) ? &tsg->NewTunnelContext : &tsg->TunnelContext;
2575 if (!TsProxyCreateTunnelReadResponse(tsg, pdu, TunnelContext, &tsg->TunnelId))
2577 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCreateTunnelReadResponse failure");
2581 if (!tsg_transition_to_state(tsg, TSG_STATE_CONNECTED))
2584 if (!TsProxyAuthorizeTunnelWriteRequest(tsg, TunnelContext))
2586 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyAuthorizeTunnel failure");
2594 case TSG_STATE_CONNECTED:
2597 (tsg->reauthSequence) ? &tsg->NewTunnelContext : &tsg->TunnelContext;
2599 if (!TsProxyAuthorizeTunnelReadResponse(tsg, pdu))
2601 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyAuthorizeTunnelReadResponse failure");
2605 if (!tsg_transition_to_state(tsg, TSG_STATE_AUTHORIZED))
2608 if (!tsg->reauthSequence)
2610 if (!TsProxyMakeTunnelCallWriteRequest(tsg, TunnelContext,
2611 TSG_TUNNEL_CALL_ASYNC_MSG_REQUEST))
2613 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyMakeTunnelCall failure");
2618 if (!TsProxyCreateChannelWriteRequest(tsg, TunnelContext))
2620 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCreateChannel failure");
2628 case TSG_STATE_AUTHORIZED:
2629 call = rpc_client_call_find_by_id(rpc->client, pdu->CallId);
2634 if (call->OpNum == TsProxyMakeTunnelCallOpnum)
2636 if (!TsProxyMakeTunnelCallReadResponse(tsg, pdu))
2638 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyMakeTunnelCallReadResponse failure");
2644 else if (call->OpNum == TsProxyCreateChannelOpnum)
2648 if (!TsProxyCreateChannelReadResponse(tsg->log, pdu, &ChannelContext,
2651 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCreateChannelReadResponse failure");
2655 if (!tsg->reauthSequence)
2656 CopyMemory(&tsg->ChannelContext, &ChannelContext,
sizeof(
CONTEXT_HANDLE));
2658 CopyMemory(&tsg->NewChannelContext, &ChannelContext,
sizeof(
CONTEXT_HANDLE));
2660 if (!tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CREATED))
2663 if (!tsg->reauthSequence)
2665 if (!TsProxySetupReceivePipeWriteRequest(tsg, &tsg->ChannelContext))
2667 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxySetupReceivePipe failure");
2673 if (!TsProxyCloseChannelWriteRequest(tsg, &tsg->NewChannelContext))
2675 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseChannelWriteRequest failure");
2679 if (!TsProxyCloseTunnelWriteRequest(tsg, &tsg->NewTunnelContext))
2681 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseTunnelWriteRequest failure");
2686 rc = tsg_transition_to_state(tsg, TSG_STATE_PIPE_CREATED);
2687 tsg->reauthSequence = FALSE;
2691 WLog_Print(tsg->log, WLOG_ERROR,
2692 "TSG_STATE_AUTHORIZED unexpected OpNum: %" PRIu32
"\n", call->OpNum);
2697 case TSG_STATE_CHANNEL_CREATED:
2700 case TSG_STATE_PIPE_CREATED:
2701 call = rpc_client_call_find_by_id(rpc->client, pdu->CallId);
2706 if (call->OpNum == TsProxyMakeTunnelCallOpnum)
2708 if (!TsProxyMakeTunnelCallReadResponse(tsg, pdu))
2710 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyMakeTunnelCallReadResponse failure");
2716 if (tsg->ReauthTunnelContext)
2717 rc = tsg_proxy_reauth(tsg);
2719 else if (call->OpNum == TsProxyCloseChannelOpnum)
2723 if (!TsProxyCloseChannelReadResponse(tsg->log, pdu, &ChannelContext))
2725 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseChannelReadResponse failure");
2731 else if (call->OpNum == TsProxyCloseTunnelOpnum)
2735 if (!TsProxyCloseTunnelReadResponse(tsg->log, pdu, &TunnelContext))
2737 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseTunnelReadResponse failure");
2746 case TSG_STATE_TUNNEL_CLOSE_PENDING:
2750 if (!TsProxyCloseChannelReadResponse(tsg->log, pdu, &ChannelContext))
2752 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseChannelReadResponse failure");
2756 if (!tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CLOSE_PENDING))
2759 if (!TsProxyCloseChannelWriteRequest(tsg,
nullptr))
2761 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseChannelWriteRequest failure");
2765 if (!TsProxyMakeTunnelCallWriteRequest(tsg, &tsg->TunnelContext,
2766 TSG_TUNNEL_CANCEL_ASYNC_MSG_REQUEST))
2768 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyMakeTunnelCall failure");
2776 case TSG_STATE_CHANNEL_CLOSE_PENDING:
2780 if (!TsProxyCloseTunnelReadResponse(tsg->log, pdu, &TunnelContext))
2782 WLog_Print(tsg->log, WLOG_ERROR,
"TsProxyCloseTunnelReadResponse failure");
2786 rc = tsg_transition_to_state(tsg, TSG_STATE_FINAL);
2790 case TSG_STATE_FINAL:
2797 const size_t rem = Stream_GetRemainingLength(pdu->s);
2800 WLog_Print(tsg->log, WLOG_WARN,
"[%s] unparsed bytes: %" PRIuz,
2801 tsg_state_to_string(oldState), rem);
2807BOOL tsg_check_event_handles(rdpTsg* tsg)
2810 if (rpc_client_in_channel_recv(tsg->rpc) < 0)
2813 if (rpc_client_out_channel_recv(tsg->rpc) < 0)
2819DWORD tsg_get_event_handles(rdpTsg* tsg, HANDLE* events, DWORD count)
2822 rdpRpc* rpc = tsg->rpc;
2825 if (events && (nCount < count))
2827 events[nCount] = rpc->client->PipeEvent;
2833 if (connection->DefaultInChannel && connection->DefaultInChannel->common.tls)
2835 if (events && (nCount < count))
2837 BIO_get_event(connection->DefaultInChannel->common.tls->bio, &events[nCount]);
2844 if (connection->NonDefaultInChannel && connection->NonDefaultInChannel->common.tls)
2846 if (events && (nCount < count))
2848 BIO_get_event(connection->NonDefaultInChannel->common.tls->bio, &events[nCount]);
2855 if (connection->DefaultOutChannel && connection->DefaultOutChannel->common.tls)
2857 if (events && (nCount < count))
2859 BIO_get_event(connection->DefaultOutChannel->common.tls->bio, &events[nCount]);
2866 if (connection->NonDefaultOutChannel && connection->NonDefaultOutChannel->common.tls)
2868 if (events && (nCount < count))
2870 BIO_get_event(connection->NonDefaultOutChannel->common.tls->bio, &events[nCount]);
2880static BOOL tsg_set_hostname(rdpTsg* tsg,
const char* hostname)
2883 free(tsg->Hostname);
2884 tsg->Hostname = ConvertUtf8ToWCharAlloc(hostname,
nullptr);
2885 return tsg->Hostname !=
nullptr;
2888static BOOL tsg_set_machine_name(rdpTsg* tsg,
const char* machineName)
2892 free(tsg->QuarreQuest.machineName);
2893 tsg->QuarreQuest.machineName =
nullptr;
2894 tsg->QuarreQuest.nameLength = 0;
2899 tsg->QuarreQuest.machineName = ConvertUtf8ToWCharAlloc(machineName, &size);
2900 tsg->QuarreQuest.nameLength = WINPR_ASSERTING_INT_CAST(uint32_t, size + 1ull);
2901 return tsg->QuarreQuest.machineName && (size > 0);
2904BOOL tsg_connect(rdpTsg* tsg,
const char* hostname, UINT16 port, DWORD timeout)
2906 UINT64 looptimeout = timeout * 1000ULL;
2908 HANDLE events[MAXIMUM_WAIT_OBJECTS] = WINPR_C_ARRAY_INIT;
2912 rdpRpc* rpc = tsg->rpc;
2915 rdpTransport* transport = rpc->transport;
2916 rdpContext* context = transport_get_context(transport);
2917 WINPR_ASSERT(context);
2919 rdpSettings* settings = context->settings;
2921 freerdp_set_last_error(context, ERROR_SUCCESS);
2924 tsg->transport = transport;
2926 if (!settings->GatewayPort)
2927 settings->GatewayPort = 443;
2929 if (!tsg_set_hostname(tsg, hostname))
2932 if (!tsg_set_machine_name(tsg, settings->ComputerName))
2935 if (!rpc_connect(rpc, timeout))
2937 WLog_Print(tsg->log, WLOG_ERROR,
"rpc_connect error!");
2941 nCount = tsg_get_event_handles(tsg, events, ARRAYSIZE(events));
2946 while (tsg->state != TSG_STATE_PIPE_CREATED)
2948 const DWORD polltimeout = 250;
2949 DWORD status = WaitForMultipleObjects(nCount, events, FALSE, polltimeout);
2950 if (status == WAIT_TIMEOUT)
2954 if (looptimeout < polltimeout)
2956 looptimeout -= polltimeout;
2960 looptimeout = timeout * 1000ULL;
2962 if (!tsg_check_event_handles(tsg))
2964 WLog_Print(tsg->log, WLOG_ERROR,
"tsg_check failure");
2965 transport_set_layer(transport, TRANSPORT_LAYER_CLOSED);
2970 WLog_Print(tsg->log, WLOG_INFO,
"TS Gateway Connection Success");
2971 tsg->bio = BIO_new(BIO_s_tsg());
2976 BIO_set_data(tsg->bio, (
void*)tsg);
2980BOOL tsg_disconnect(rdpTsg* tsg)
3004 if (tsg->state != TSG_STATE_TUNNEL_CLOSE_PENDING)
3006 if (!TsProxyCloseChannelWriteRequest(tsg, &tsg->ChannelContext))
3009 return tsg_transition_to_state(tsg, TSG_STATE_CHANNEL_CLOSE_PENDING);
3026static int tsg_read(rdpTsg* tsg, BYTE* data,
size_t length)
3028 rdpRpc* rpc =
nullptr;
3036 if (transport_get_layer(rpc->transport) == TRANSPORT_LAYER_CLOSED)
3038 WLog_Print(tsg->log, WLOG_ERROR,
"tsg_read error: connection lost");
3044 status = rpc_client_receive_pipe_read(rpc->client, data, length);
3049 if (!status && !transport_get_blocking(rpc->transport))
3052 if (transport_get_layer(rpc->transport) == TRANSPORT_LAYER_CLOSED)
3054 WLog_Print(tsg->log, WLOG_ERROR,
"tsg_read error: connection lost");
3061 if (transport_get_blocking(rpc->transport))
3063 while (WaitForSingleObject(rpc->client->PipeEvent, 0) != WAIT_OBJECT_0)
3065 if (!tsg_check_event_handles(tsg))
3068 (void)WaitForSingleObject(rpc->client->PipeEvent, 100);
3071 }
while (transport_get_blocking(rpc->transport));
3076static int tsg_write(rdpTsg* tsg,
const BYTE* data, UINT32 length)
3080 if (!tsg || !data || !tsg->rpc || !tsg->rpc->transport)
3083 if (transport_get_layer(tsg->rpc->transport) == TRANSPORT_LAYER_CLOSED)
3085 WLog_Print(tsg->log, WLOG_ERROR,
"error, connection lost");
3089 status = TsProxySendToServer((handle_t)tsg, data, 1, &length);
3097rdpTsg* tsg_new(rdpTransport* transport)
3099 rdpTsg* tsg = (rdpTsg*)calloc(1,
sizeof(rdpTsg));
3103 tsg->log = WLog_Get(TAG);
3104 tsg->transport = transport;
3105 tsg->rpc = rpc_new(tsg->transport);
3116void tsg_free(rdpTsg* tsg)
3121 free(tsg->Hostname);
3122 free(tsg->QuarreQuest.machineName);
3123 free(tsg->QuarreQuest.data);
3128static int transport_bio_tsg_write(BIO* bio,
const char* buf,
int num)
3131 rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
3132 BIO_clear_flags(bio, BIO_FLAGS_WRITE);
3136 status = tsg_write(tsg, (
const BYTE*)buf, (UINT32)num);
3140 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
3143 else if (status == 0)
3145 BIO_set_flags(bio, BIO_FLAGS_WRITE);
3146 WSASetLastError(WSAEWOULDBLOCK);
3150 BIO_set_flags(bio, BIO_FLAGS_WRITE);
3153 return status >= 0 ? status : -1;
3156static int transport_bio_tsg_read(BIO* bio,
char* buf,
int size)
3159 rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
3161 if (!tsg || (size < 0))
3163 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
3167 BIO_clear_flags(bio, BIO_FLAGS_READ);
3168 status = tsg_read(tsg, (BYTE*)buf, (
size_t)size);
3172 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
3175 else if (status == 0)
3177 BIO_set_flags(bio, BIO_FLAGS_READ);
3178 WSASetLastError(WSAEWOULDBLOCK);
3182 BIO_set_flags(bio, BIO_FLAGS_READ);
3185 return status > 0 ? status : -1;
3188static int transport_bio_tsg_puts(BIO* bio,
const char* str)
3196static int transport_bio_tsg_gets(BIO* bio,
char* str,
int size)
3204static long transport_bio_tsg_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
3207 rdpTsg* tsg = (rdpTsg*)BIO_get_data(bio);
3209 RpcInChannel* inChannel = connection->DefaultInChannel;
3214 case BIO_CTRL_FLUSH:
3215 (void)BIO_flush(inChannel->common.tls->bio);
3216 (void)BIO_flush(outChannel->common.tls->bio);
3220 case BIO_C_GET_EVENT:
3223 *((HANDLE*)arg2) = tsg->rpc->client->PipeEvent;
3229 case BIO_C_SET_NONBLOCK:
3233 case BIO_C_READ_BLOCKED:
3235 BIO* cbio = outChannel->common.bio;
3236 status = BIO_read_blocked(cbio);
3240 case BIO_C_WRITE_BLOCKED:
3242 BIO* cbio = inChannel->common.bio;
3243 status = BIO_write_blocked(cbio);
3247 case BIO_C_WAIT_READ:
3249 int timeout = (int)arg1;
3250 BIO* cbio = outChannel->common.bio;
3252 if (BIO_read_blocked(cbio))
3253 return BIO_wait_read(cbio, timeout);
3254 else if (BIO_write_blocked(cbio))
3255 return BIO_wait_write(cbio, timeout);
3261 case BIO_C_WAIT_WRITE:
3263 int timeout = (int)arg1;
3264 BIO* cbio = inChannel->common.bio;
3266 if (BIO_write_blocked(cbio))
3267 status = BIO_wait_write(cbio, timeout);
3268 else if (BIO_read_blocked(cbio))
3269 status = BIO_wait_read(cbio, timeout);
3274#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3275 case BIO_CTRL_GET_KTLS_SEND:
3278 case BIO_CTRL_GET_KTLS_RECV:
3289static int transport_bio_tsg_new(BIO* bio)
3292 BIO_set_init(bio, 1);
3293 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
3297static int transport_bio_tsg_free(BIO* bio)
3304BIO_METHOD* BIO_s_tsg(
void)
3306 static BIO_METHOD* bio_methods =
nullptr;
3308 if (bio_methods ==
nullptr)
3310 if (!(bio_methods = BIO_meth_new(BIO_TYPE_TSG,
"TSGateway")))
3313 BIO_meth_set_write(bio_methods, transport_bio_tsg_write);
3314 BIO_meth_set_read(bio_methods, transport_bio_tsg_read);
3315 BIO_meth_set_puts(bio_methods, transport_bio_tsg_puts);
3316 BIO_meth_set_gets(bio_methods, transport_bio_tsg_gets);
3317 BIO_meth_set_ctrl(bio_methods, transport_bio_tsg_ctrl);
3318 BIO_meth_set_create(bio_methods, transport_bio_tsg_new);
3319 BIO_meth_set_destroy(bio_methods, transport_bio_tsg_free);
3325TSG_STATE tsg_get_state(rdpTsg* tsg)
3328 return TSG_STATE_INITIAL;
3333BIO* tsg_get_bio(rdpTsg* tsg)
3341BOOL tsg_set_state(rdpTsg* tsg, TSG_STATE state)