Documentation ¶
Index ¶
Constants ¶
View Source
const ( TPDU_CONNECTION_REQUEST MessageType = 0xE0 TPDU_CONNECTION_CONFIRM = 0xD0 TPDU_DISCONNECT_REQUEST = 0x80 TPDU_DATA = 0xF0 TPDU_ERROR = 0x70 )
View Source
const ( TYPE_RDP_NEG_REQ NegotiationType = 0x01 TYPE_RDP_NEG_RSP = 0x02 TYPE_RDP_NEG_FAILURE = 0x03 )
View Source
const ( PROTOCOL_RDP uint32 = 0x00000000 PROTOCOL_SSL = 0x00000001 PROTOCOL_HYBRID = 0x00000002 PROTOCOL_HYBRID_EX = 0x00000008 )
View Source
const ( //The server requires that the client support Enhanced RDP Security (section 5.4) with either TLS 1.0, 1.1 or 1.2 (section 5.4.5.1) or CredSSP (section 5.4.5.2). If only CredSSP was requested then the server only supports TLS. SSL_REQUIRED_BY_SERVER = 0x00000001 //The server is configured to only use Standard RDP Security mechanisms (section 5.3) and does not support any External Security Protocols (section 5.4.5). SSL_NOT_ALLOWED_BY_SERVER = 0x00000002 //The server does not possess a valid authentication certificate and cannot initialize the External Security Protocol Provider (section 5.4.5). SSL_CERT_NOT_ON_SERVER = 0x00000003 //The list of requested security protocols is not consistent with the current security protocol in effect. This error is only possible when the Direct Approach (sections 5.4.2.2 and 1.3.1.2) is used and an External Security Protocol (section 5.4.5) is already being used. INCONSISTENT_FLAGS = 0x00000004 //The server requires that the client support Enhanced RDP Security (section 5.4) with CredSSP (section 5.4.5.2). HYBRID_REQUIRED_BY_SERVER = 0x00000005 //The server requires that the client support Enhanced RDP Security (section 5.4) with TLS 1.0, 1.1 or 1.2 (section 5.4.5.1) and certificate-based client authentication.<4> SSL_WITH_USER_AUTH_REQUIRED_BY_SERVER = 0x00000006 )
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type ClientConnectionRequestPDU ¶
type ClientConnectionRequestPDU struct { Len uint8 Code MessageType Padding1 uint16 Padding2 uint16 Padding3 uint8 Cookie []byte ProtocolNeg *Negotiation // contains filtered or unexported fields }
*
- X224 client connection request
- @param opt {object} component type options
- @see http://msdn.microsoft.com/en-us/library/cc240470.aspx
func NewClientConnectionRequestPDU ¶
func NewClientConnectionRequestPDU(cookie []byte, requestedProtocol uint32) *ClientConnectionRequestPDU
func (*ClientConnectionRequestPDU) Serialize ¶
func (x *ClientConnectionRequestPDU) Serialize() []byte
type DataHeader ¶
type DataHeader struct { Header uint8 `struc:"little"` MessageType MessageType `struc:"uint8"` Separator uint8 `struc:"little"` }
*
- Header of each data message from x224 layer
- @returns {type.Component}
func NewDataHeader ¶
func NewDataHeader() *DataHeader
type Negotiation ¶
type Negotiation struct { Type NegotiationType `struc:"byte"` Flag uint8 `struc:"uint8"` Length uint16 `struc:"little"` Result uint32 `struc:"little"` }
*
- Use to negotiate security layer of RDP stack
- In node-rdpjs only ssl is available
- @param opt {object} component type options
- @see request -> http://msdn.microsoft.com/en-us/library/cc240500.aspx
- @see response -> http://msdn.microsoft.com/en-us/library/cc240506.aspx
- @see failure ->http://msdn.microsoft.com/en-us/library/cc240507.aspx
func NewNegotiation ¶
func NewNegotiation() *Negotiation
type NegotiationType ¶
type NegotiationType byte
*
- Type of negotiation present in negotiation packet
type ServerConnectionConfirm ¶
type ServerConnectionConfirm struct { Len uint8 Code MessageType Padding1 uint16 Padding2 uint16 Padding3 uint8 ProtocolNeg *Negotiation }
*
- X224 Server connection confirm
- @param opt {object} component type options
- @see http://msdn.microsoft.com/en-us/library/cc240506.aspx
type X224 ¶
*
- Common X224 Automata
- @param presentation {Layer} presentation layer
func (*X224) SetRequestedProtocol ¶
Click to show internal directories.
Click to hide internal directories.