admin of admins - 2015-06-28

Got what was wrong, had to fill it with zeros 32 bytes long. Just took a look into frerdp and possibly there is some bug, they create it with 16 bytes length (not 32 as I did to make it working because 16bytes failed) filled with zeros when protocol == rdp, not ssl and not nla.
But in my assumption, that is security risk to fill clients random key with zeros, than it is not random.
Pretty sure we should extract exponent and modulus from public key and encrypt own random key. I assume, Microsoft RDP server always uses RSA keys.
https://msdn.microsoft.com/en-us/library/cc240810.aspx

Well, will continue the tests...