/** * FreeRDP: A Remote Desktop Protocol Implementation * RDP Client Info * * Copyright 2011 Marc-Andre Moreau * Copyright 2015 Thincast Technologies GmbH * Copyright 2015 DI (FH) Martin Haimberger * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include "settings.h" #include #include #include #include #include #include #include "timezone.h" #include "info.h" #define TAG FREERDP_TAG("core.info") #define logonInfoV2Size (2 + 4 + 4 + 4 + 4) #define logonInfoV2ReservedSize 558 #define logonInfoV2TotalSize (logonInfoV2Size + logonInfoV2ReservedSize) static const char* INFO_TYPE_LOGON_STRINGS[4] = { "Logon Info V1", "Logon Info V2", "Logon Plain Notify", "Logon Extended Info" }; /* This define limits the length of the strings in the label field. */ #define MAX_LABEL_LENGTH 40 struct info_flags_t { UINT32 flag; const char* label; }; static const struct info_flags_t info_flags[] = { { INFO_MOUSE, "INFO_MOUSE" }, { INFO_DISABLECTRLALTDEL, "INFO_DISABLECTRLALTDEL" }, { INFO_AUTOLOGON, "INFO_AUTOLOGON" }, { INFO_UNICODE, "INFO_UNICODE" }, { INFO_MAXIMIZESHELL, "INFO_MAXIMIZESHELL" }, { INFO_LOGONNOTIFY, "INFO_LOGONNOTIFY" }, { INFO_COMPRESSION, "INFO_COMPRESSION" }, { INFO_ENABLEWINDOWSKEY, "INFO_ENABLEWINDOWSKEY" }, { INFO_REMOTECONSOLEAUDIO, "INFO_REMOTECONSOLEAUDIO" }, { INFO_FORCE_ENCRYPTED_CS_PDU, "INFO_FORCE_ENCRYPTED_CS_PDU" }, { INFO_RAIL, "INFO_RAIL" }, { INFO_LOGONERRORS, "INFO_LOGONERRORS" }, { INFO_MOUSE_HAS_WHEEL, "INFO_MOUSE_HAS_WHEEL" }, { INFO_PASSWORD_IS_SC_PIN, "INFO_PASSWORD_IS_SC_PIN" }, { INFO_NOAUDIOPLAYBACK, "INFO_NOAUDIOPLAYBACK" }, { INFO_USING_SAVED_CREDS, "INFO_USING_SAVED_CREDS" }, { INFO_AUDIOCAPTURE, "INFO_AUDIOCAPTURE" }, { INFO_VIDEO_DISABLE, "INFO_VIDEO_DISABLE" }, { INFO_HIDEF_RAIL_SUPPORTED, "INFO_HIDEF_RAIL_SUPPORTED" }, }; static BOOL rdp_read_info_null_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id, const char* what, UINT32 flags, wStream* s, size_t cbLen, size_t max) { const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE; if (!freerdp_settings_set_string(settings, id, NULL)) return FALSE; if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLen))) return FALSE; if (cbLen > 0) { if ((cbLen > max) || (unicode && ((cbLen % 2) != 0))) { WLog_ERR(TAG, "protocol error: %s has invalid value: %" PRIuz "", what, cbLen); return FALSE; } if (unicode) { const WCHAR* domain = Stream_PointerAs(s, WCHAR); if (!freerdp_settings_set_string_from_utf16N(settings, id, domain, cbLen / sizeof(WCHAR))) { WLog_ERR(TAG, "protocol error: no data to read for %s [expected %" PRIuz "]", what, cbLen); return FALSE; } } else { const char* domain = Stream_ConstPointer(s); if (!freerdp_settings_set_string_len(settings, id, domain, cbLen)) return FALSE; } } Stream_Seek(s, cbLen); return TRUE; } static char* rdp_info_package_flags_description(UINT32 flags) { char* result = NULL; size_t maximum_size = 1 + MAX_LABEL_LENGTH * ARRAYSIZE(info_flags); result = calloc(maximum_size, sizeof(char)); if (!result) return 0; for (size_t i = 0; i < ARRAYSIZE(info_flags); i++) { const struct info_flags_t* cur = &info_flags[i]; if (cur->flag & flags) { winpr_str_append(cur->label, result, maximum_size, "|"); } } return result; } static BOOL rdp_compute_client_auto_reconnect_cookie(rdpRdp* rdp) { BYTE ClientRandom[CLIENT_RANDOM_LENGTH] = { 0 }; BYTE AutoReconnectRandom[32] = { 0 }; ARC_SC_PRIVATE_PACKET* serverCookie = NULL; ARC_CS_PRIVATE_PACKET* clientCookie = NULL; WINPR_ASSERT(rdp); rdpSettings* settings = rdp->settings; WINPR_ASSERT(settings); serverCookie = settings->ServerAutoReconnectCookie; clientCookie = settings->ClientAutoReconnectCookie; clientCookie->cbLen = 28; clientCookie->version = serverCookie->version; clientCookie->logonId = serverCookie->logonId; ZeroMemory(clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier)); CopyMemory(AutoReconnectRandom, serverCookie->arcRandomBits, sizeof(serverCookie->arcRandomBits)); if (settings->SelectedProtocol == PROTOCOL_RDP) CopyMemory(ClientRandom, settings->ClientRandom, settings->ClientRandomLength); /* SecurityVerifier = HMAC_MD5(AutoReconnectRandom, ClientRandom) */ if (!winpr_HMAC(WINPR_MD_MD5, AutoReconnectRandom, 16, ClientRandom, sizeof(ClientRandom), clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier))) return FALSE; return TRUE; } /** * Read Server Auto Reconnect Cookie (ARC_SC_PRIVATE_PACKET). * msdn{cc240540} */ static BOOL rdp_read_server_auto_reconnect_cookie(rdpRdp* rdp, wStream* s, logon_info_ex* info) { BYTE* p = NULL; ARC_SC_PRIVATE_PACKET* autoReconnectCookie = NULL; rdpSettings* settings = rdp->settings; autoReconnectCookie = settings->ServerAutoReconnectCookie; if (!Stream_CheckAndLogRequiredLength(TAG, s, 28)) return FALSE; Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */ if (autoReconnectCookie->cbLen != 28) { WLog_ERR(TAG, "ServerAutoReconnectCookie.cbLen != 28"); return FALSE; } Stream_Read_UINT32(s, autoReconnectCookie->version); /* Version (4 bytes) */ Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */ Stream_Read(s, autoReconnectCookie->arcRandomBits, 16); /* ArcRandomBits (16 bytes) */ p = autoReconnectCookie->arcRandomBits; WLog_DBG(TAG, "ServerAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32 " SecurityVerifier: " "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "" "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "", autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]); info->LogonId = autoReconnectCookie->logonId; CopyMemory(info->ArcRandomBits, p, 16); if ((settings->PrintReconnectCookie)) { char* base64 = NULL; base64 = crypto_base64_encode((BYTE*)autoReconnectCookie, sizeof(ARC_SC_PRIVATE_PACKET)); WLog_INFO(TAG, "Reconnect-cookie: %s", base64); free(base64); } return TRUE; } /** * Read Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET). * msdn{cc240541} */ static BOOL rdp_read_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s) { ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL; rdpSettings* settings = rdp->settings; autoReconnectCookie = settings->ClientAutoReconnectCookie; if (!Stream_CheckAndLogRequiredLength(TAG, s, 28)) return FALSE; Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */ Stream_Read_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */ Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */ Stream_Read(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier */ return TRUE; } /** * Write Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET). * msdn{cc240541} */ static BOOL rdp_write_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s) { BYTE* p = NULL; ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL; rdpSettings* settings = NULL; WINPR_ASSERT(rdp); settings = rdp->settings; WINPR_ASSERT(settings); autoReconnectCookie = settings->ClientAutoReconnectCookie; WINPR_ASSERT(autoReconnectCookie); p = autoReconnectCookie->securityVerifier; WINPR_ASSERT(p); WLog_DBG(TAG, "ClientAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32 " ArcRandomBits: " "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "" "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "", autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]); if (!Stream_EnsureRemainingCapacity(s, 12ull + 16ull)) return FALSE; Stream_Write_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */ Stream_Write_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */ Stream_Write_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */ Stream_Write(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier (16 bytes) */ return TRUE; } /* * Get the cbClientAddress size limit * see [MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet (TS_EXTENDED_INFO_PACKET) */ static size_t rdp_get_client_address_max_size(const rdpRdp* rdp) { UINT32 version = 0; rdpSettings* settings = NULL; WINPR_ASSERT(rdp); settings = rdp->settings; WINPR_ASSERT(settings); version = freerdp_settings_get_uint32(settings, FreeRDP_RdpVersion); if (version < RDP_VERSION_10_0) return 64; return 80; } /** * Read Extended Info Packet (TS_EXTENDED_INFO_PACKET). * msdn{cc240476} */ static BOOL rdp_read_extended_info_packet(rdpRdp* rdp, wStream* s) { UINT16 clientAddressFamily = 0; UINT16 cbClientAddress = 0; UINT16 cbClientDir = 0; UINT16 cbAutoReconnectLen = 0; WINPR_ASSERT(rdp); rdpSettings* settings = rdp->settings; WINPR_ASSERT(settings); if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; Stream_Read_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */ Stream_Read_UINT16(s, cbClientAddress); /* cbClientAddress (2 bytes) */ settings->IPv6Enabled = (clientAddressFamily == ADDRESS_FAMILY_INET6 ? TRUE : FALSE); if (!rdp_read_info_null_string(settings, FreeRDP_ClientAddress, "cbClientAddress", INFO_UNICODE, s, cbClientAddress, rdp_get_client_address_max_size(rdp))) return FALSE; if (!Stream_CheckAndLogRequiredLength(TAG, s, 2)) return FALSE; Stream_Read_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */ /* cbClientDir is the size in bytes of the character data in the clientDir field. * This size includes the length of the mandatory null terminator. * The maximum allowed value is 512 bytes. * Note: Although according to [MS-RDPBCGR 2.2.1.11.1.1.1] the null terminator * is mandatory the Microsoft Android client (starting with version 8.1.31.44) * sets cbClientDir to 0. */ if (!rdp_read_info_null_string(settings, FreeRDP_ClientDir, "cbClientDir", INFO_UNICODE, s, cbClientDir, 512)) return FALSE; /** * down below all fields are optional but if one field is not present, * then all of the subsequent fields also MUST NOT be present. */ /* optional: clientTimeZone (172 bytes) */ if (Stream_GetRemainingLength(s) == 0) goto end; if (!rdp_read_client_time_zone(s, settings)) return FALSE; /* optional: clientSessionId (4 bytes), should be set to 0 */ if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; Stream_Read_UINT32(s, settings->ClientSessionId); /* optional: performanceFlags (4 bytes) */ if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; Stream_Read_UINT32(s, settings->PerformanceFlags); freerdp_performance_flags_split(settings); /* optional: cbAutoReconnectLen (2 bytes) */ if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_CheckAndLogRequiredLength(TAG, s, 2)) return FALSE; Stream_Read_UINT16(s, cbAutoReconnectLen); /* optional: autoReconnectCookie (28 bytes) */ /* must be present if cbAutoReconnectLen is > 0 */ if (cbAutoReconnectLen > 0) { if (!rdp_read_client_auto_reconnect_cookie(rdp, s)) return FALSE; } /* skip reserved1 and reserved2 fields */ if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_SafeSeek(s, 2)) return FALSE; if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_SafeSeek(s, 2)) return FALSE; if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_CheckAndLogRequiredLength(TAG, s, 2)) return FALSE; if (freerdp_settings_get_bool(settings, FreeRDP_SupportDynamicTimeZone)) { UINT16 cbDynamicDSTTimeZoneKeyName = 0; Stream_Read_UINT16(s, cbDynamicDSTTimeZoneKeyName); if (!rdp_read_info_null_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName, "cbDynamicDSTTimeZoneKeyName", INFO_UNICODE, s, cbDynamicDSTTimeZoneKeyName, 254)) return FALSE; if (Stream_GetRemainingLength(s) == 0) goto end; if (!Stream_CheckAndLogRequiredLength(TAG, s, 2)) return FALSE; UINT16 DynamicDaylightTimeDisabled = 0; Stream_Read_UINT16(s, DynamicDaylightTimeDisabled); if (DynamicDaylightTimeDisabled > 1) { WLog_WARN(TAG, "[MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet " "(TS_EXTENDED_INFO_PACKET)::dynamicDaylightTimeDisabled value %" PRIu16 " not allowed in [0,1]", settings->DynamicDaylightTimeDisabled); return FALSE; } if (!freerdp_settings_set_bool(settings, FreeRDP_DynamicDaylightTimeDisabled, DynamicDaylightTimeDisabled != 0)) return FALSE; DEBUG_TIMEZONE("DynamicTimeZone=%s [%s]", freerdp_settings_get_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName), freerdp_settings_get_bool(settings, FreeRDP_DynamicDaylightTimeDisabled) ? "no-DST" : "DST"); } end: return TRUE; } /** * Write Extended Info Packet (TS_EXTENDED_INFO_PACKET). * msdn{cc240476} */ static BOOL rdp_write_extended_info_packet(rdpRdp* rdp, wStream* s) { BOOL ret = FALSE; size_t cbClientAddress = 0; const size_t cbClientAddressMax = rdp_get_client_address_max_size(rdp); WCHAR* clientDir = NULL; size_t cbClientDir = 0; const size_t cbClientDirMax = 512; UINT16 cbAutoReconnectCookie = 0; WINPR_ASSERT(rdp); rdpSettings* settings = rdp->settings; WINPR_ASSERT(settings); UINT16 clientAddressFamily = ADDRESS_FAMILY_INET; if (settings->ConnectChildSession) clientAddressFamily = 0x0000; else if (settings->IPv6Enabled) clientAddressFamily = ADDRESS_FAMILY_INET6; WCHAR* clientAddress = ConvertUtf8ToWCharAlloc(settings->ClientAddress, &cbClientAddress); if (cbClientAddress > (UINT16_MAX / sizeof(WCHAR))) { WLog_ERR(TAG, "cbClientAddress > UINT16_MAX"); goto fail; } if (cbClientAddress > 0) { cbClientAddress = (UINT16)(cbClientAddress + 1) * sizeof(WCHAR); if (cbClientAddress > cbClientAddressMax) { WLog_WARN(TAG, "the client address %s [%" PRIuz "] exceeds the limit of %" PRIuz ", truncating.", settings->ClientAddress, cbClientAddress, cbClientAddressMax); clientAddress[(cbClientAddressMax / sizeof(WCHAR)) - 1] = '\0'; cbClientAddress = cbClientAddressMax; } } clientDir = ConvertUtf8ToWCharAlloc(settings->ClientDir, &cbClientDir); if (cbClientDir > (UINT16_MAX / sizeof(WCHAR))) { WLog_ERR(TAG, "cbClientDir > UINT16_MAX"); goto fail; } if (cbClientDir > 0) { cbClientDir = (UINT16)(cbClientDir + 1) * sizeof(WCHAR); if (cbClientDir > cbClientDirMax) { WLog_WARN(TAG, "the client dir %s [%" PRIuz "] exceeds the limit of %" PRIuz ", truncating.", settings->ClientDir, cbClientDir, cbClientDirMax); clientDir[(cbClientDirMax / sizeof(WCHAR)) - 1] = '\0'; cbClientDir = cbClientDirMax; } } if (settings->ServerAutoReconnectCookie->cbLen > UINT16_MAX) { WLog_ERR(TAG, "ServerAutoreconnectCookie::cbLen > UINT16_MAX"); goto fail; } cbAutoReconnectCookie = (UINT16)settings->ServerAutoReconnectCookie->cbLen; if (!Stream_EnsureRemainingCapacity(s, 4ull + cbClientAddress + 2ull + cbClientDir)) goto fail; Stream_Write_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */ Stream_Write_UINT16(s, cbClientAddress); /* cbClientAddress (2 bytes) */ Stream_Write(s, clientAddress, cbClientAddress); /* clientAddress */ Stream_Write_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */ Stream_Write(s, clientDir, cbClientDir); /* clientDir */ if (!rdp_write_client_time_zone(s, settings)) /* clientTimeZone (172 bytes) */ goto fail; if (!Stream_EnsureRemainingCapacity(s, 10ull)) goto fail; /* clientSessionId (4 bytes), should be set to 0 */ Stream_Write_UINT32(s, settings->ClientSessionId); freerdp_performance_flags_make(settings); Stream_Write_UINT32(s, settings->PerformanceFlags); /* performanceFlags (4 bytes) */ Stream_Write_UINT16(s, cbAutoReconnectCookie); /* cbAutoReconnectCookie (2 bytes) */ if (cbAutoReconnectCookie > 0) { if (!rdp_compute_client_auto_reconnect_cookie(rdp)) goto fail; if (!rdp_write_client_auto_reconnect_cookie(rdp, s)) /* autoReconnectCookie */ goto fail; } if (freerdp_settings_get_bool(settings, FreeRDP_SupportDynamicTimeZone)) { if (!Stream_EnsureRemainingCapacity(s, 8 + 254 * sizeof(WCHAR))) goto fail; Stream_Write_UINT16(s, 0); /* reserved1 (2 bytes) */ Stream_Write_UINT16(s, 0); /* reserved2 (2 bytes) */ size_t rlen = 0; const char* tz = freerdp_settings_get_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName); if (tz) rlen = strnlen(tz, 254); Stream_Write_UINT16(s, (UINT16)rlen * sizeof(WCHAR)); if (Stream_Write_UTF16_String_From_UTF8(s, rlen, tz, rlen, FALSE) < 0) goto fail; Stream_Write_UINT16(s, settings->DynamicDaylightTimeDisabled ? 0x01 : 0x00); } ret = TRUE; fail: free(clientAddress); free(clientDir); return ret; } static BOOL rdp_read_info_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id, UINT32 flags, wStream* s, size_t cbLenNonNull, size_t max) { union { char c; WCHAR w; BYTE b[2]; } terminator; const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE; const size_t nullSize = unicode ? sizeof(WCHAR) : sizeof(CHAR); if (!freerdp_settings_set_string(settings, id, NULL)) return FALSE; if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLenNonNull + nullSize))) return FALSE; if (cbLenNonNull > 0) { /* cbDomain is the size in bytes of the character data in the Domain field. * This size excludes (!) the length of the mandatory null terminator. * Maximum value including the mandatory null terminator: 512 */ if ((cbLenNonNull % 2) || (cbLenNonNull > (max - nullSize))) { WLog_ERR(TAG, "protocol error: invalid value: %" PRIuz "", cbLenNonNull); return FALSE; } if (unicode) { const WCHAR* domain = Stream_PointerAs(s, WCHAR); if (!freerdp_settings_set_string_from_utf16N(settings, id, domain, cbLenNonNull / sizeof(WCHAR))) return FALSE; } else { const char* domain = Stream_PointerAs(s, char); if (!freerdp_settings_set_string_len(settings, id, domain, cbLenNonNull)) return FALSE; } } Stream_Seek(s, cbLenNonNull); terminator.w = L'\0'; Stream_Read(s, terminator.b, nullSize); if (terminator.w != L'\0') { WLog_ERR(TAG, "protocol error: Domain must be null terminated"); (void)freerdp_settings_set_string(settings, id, NULL); return FALSE; } return TRUE; } /** * Read Info Packet (TS_INFO_PACKET). * msdn{cc240475} */ static BOOL rdp_read_info_packet(rdpRdp* rdp, wStream* s, UINT16 tpktlength) { BOOL smallsize = FALSE; UINT32 flags = 0; UINT16 cbDomain = 0; UINT16 cbUserName = 0; UINT16 cbPassword = 0; UINT16 cbAlternateShell = 0; UINT16 cbWorkingDir = 0; UINT32 CompressionLevel = 0; rdpSettings* settings = rdp->settings; if (!Stream_CheckAndLogRequiredLength(TAG, s, 18)) return FALSE; Stream_Read_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes ) */ Stream_Read_UINT32(s, flags); /* flags (4 bytes) */ settings->AudioCapture = ((flags & INFO_AUDIOCAPTURE) ? TRUE : FALSE); settings->AudioPlayback = ((flags & INFO_NOAUDIOPLAYBACK) ? FALSE : TRUE); settings->AutoLogonEnabled = ((flags & INFO_AUTOLOGON) ? TRUE : FALSE); settings->RemoteApplicationMode = ((flags & INFO_RAIL) ? TRUE : FALSE); settings->HiDefRemoteApp = ((flags & INFO_HIDEF_RAIL_SUPPORTED) ? TRUE : FALSE); settings->RemoteConsoleAudio = ((flags & INFO_REMOTECONSOLEAUDIO) ? TRUE : FALSE); settings->CompressionEnabled = ((flags & INFO_COMPRESSION) ? TRUE : FALSE); settings->LogonNotify = ((flags & INFO_LOGONNOTIFY) ? TRUE : FALSE); settings->MouseHasWheel = ((flags & INFO_MOUSE_HAS_WHEEL) ? TRUE : FALSE); settings->DisableCtrlAltDel = ((flags & INFO_DISABLECTRLALTDEL) ? TRUE : FALSE); settings->ForceEncryptedCsPdu = ((flags & INFO_FORCE_ENCRYPTED_CS_PDU) ? TRUE : FALSE); settings->PasswordIsSmartcardPin = ((flags & INFO_PASSWORD_IS_SC_PIN) ? TRUE : FALSE); if (flags & INFO_COMPRESSION) { CompressionLevel = ((flags & 0x00001E00) >> 9); settings->CompressionLevel = CompressionLevel; } else { settings->CompressionLevel = 0; } /* RDP 4 and 5 have smaller credential limits */ if (settings->RdpVersion < RDP_VERSION_5_PLUS) smallsize = TRUE; Stream_Read_UINT16(s, cbDomain); /* cbDomain (2 bytes) */ Stream_Read_UINT16(s, cbUserName); /* cbUserName (2 bytes) */ Stream_Read_UINT16(s, cbPassword); /* cbPassword (2 bytes) */ Stream_Read_UINT16(s, cbAlternateShell); /* cbAlternateShell (2 bytes) */ Stream_Read_UINT16(s, cbWorkingDir); /* cbWorkingDir (2 bytes) */ if (!rdp_read_info_string(settings, FreeRDP_Domain, flags, s, cbDomain, smallsize ? 52 : 512)) return FALSE; if (!rdp_read_info_string(settings, FreeRDP_Username, flags, s, cbUserName, smallsize ? 44 : 512)) return FALSE; if (!rdp_read_info_string(settings, FreeRDP_Password, flags, s, cbPassword, smallsize ? 32 : 512)) return FALSE; if (!rdp_read_info_string(settings, FreeRDP_AlternateShell, flags, s, cbAlternateShell, 512)) return FALSE; if (!rdp_read_info_string(settings, FreeRDP_ShellWorkingDirectory, flags, s, cbWorkingDir, 512)) return FALSE; if (settings->RdpVersion >= RDP_VERSION_5_PLUS) { if (!rdp_read_extended_info_packet(rdp, s)) /* extraInfo */ return FALSE; } const size_t xrem = Stream_GetRemainingLength(s); if (!tpkt_ensure_stream_consumed(s, tpktlength)) Stream_Seek(s, xrem); return TRUE; } /** * Write Info Packet (TS_INFO_PACKET). * msdn{cc240475} */ static BOOL rdp_write_info_packet(rdpRdp* rdp, wStream* s) { BOOL ret = FALSE; UINT32 flags = 0; WCHAR* domainW = NULL; size_t cbDomain = 0; WCHAR* userNameW = NULL; size_t cbUserName = 0; WCHAR* passwordW = NULL; size_t cbPassword = 0; WCHAR* alternateShellW = NULL; size_t cbAlternateShell = 0; WCHAR* workingDirW = NULL; size_t cbWorkingDir = 0; BOOL usedPasswordCookie = FALSE; rdpSettings* settings = NULL; WINPR_ASSERT(rdp); settings = rdp->settings; WINPR_ASSERT(settings); flags = INFO_MOUSE | INFO_UNICODE | INFO_LOGONERRORS | INFO_MAXIMIZESHELL | INFO_ENABLEWINDOWSKEY | INFO_DISABLECTRLALTDEL | INFO_MOUSE_HAS_WHEEL | INFO_FORCE_ENCRYPTED_CS_PDU; if (settings->SmartcardLogon) { flags |= INFO_AUTOLOGON; flags |= INFO_PASSWORD_IS_SC_PIN; } if (settings->AudioCapture) flags |= INFO_AUDIOCAPTURE; if (!settings->AudioPlayback) flags |= INFO_NOAUDIOPLAYBACK; if (settings->VideoDisable) flags |= INFO_VIDEO_DISABLE; if (settings->AutoLogonEnabled) flags |= INFO_AUTOLOGON; if (settings->RemoteApplicationMode) { if (settings->HiDefRemoteApp) flags |= INFO_HIDEF_RAIL_SUPPORTED; flags |= INFO_RAIL; } if (settings->RemoteConsoleAudio) flags |= INFO_REMOTECONSOLEAUDIO; if (settings->CompressionEnabled) { flags |= INFO_COMPRESSION; flags |= ((settings->CompressionLevel << 9) & 0x00001E00); } if (settings->LogonNotify) flags |= INFO_LOGONNOTIFY; if (settings->PasswordIsSmartcardPin) flags |= INFO_PASSWORD_IS_SC_PIN; { char* flags_description = rdp_info_package_flags_description(flags); if (flags_description) { WLog_DBG(TAG, "Client Info Packet Flags = %s", flags_description); free(flags_description); } } domainW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Domain, &cbDomain); if (cbDomain > UINT16_MAX / sizeof(WCHAR)) { WLog_ERR(TAG, "cbDomain > UINT16_MAX"); goto fail; } cbDomain *= sizeof(WCHAR); /* user name provided by the expert for connecting to the novice computer */ userNameW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Username, &cbUserName); if (cbUserName > UINT16_MAX / sizeof(WCHAR)) { WLog_ERR(TAG, "cbUserName > UINT16_MAX"); goto fail; } cbUserName *= sizeof(WCHAR); const char* pin = "*"; if (!settings->RemoteAssistanceMode) { /* Ignore redirection password if we´re using smartcard and have the pin as password */ if (((flags & INFO_PASSWORD_IS_SC_PIN) == 0) && settings->RedirectionPassword && (settings->RedirectionPasswordLength > 0)) { union { BYTE* bp; WCHAR* wp; } ptrconv; if (settings->RedirectionPasswordLength > UINT16_MAX) { WLog_ERR(TAG, "RedirectionPasswordLength > UINT16_MAX"); goto fail; } usedPasswordCookie = TRUE; ptrconv.bp = settings->RedirectionPassword; passwordW = ptrconv.wp; cbPassword = (UINT16)settings->RedirectionPasswordLength; } else pin = freerdp_settings_get_string(settings, FreeRDP_Password); } if (!usedPasswordCookie && pin) { passwordW = ConvertUtf8ToWCharAlloc(pin, &cbPassword); if (cbPassword > UINT16_MAX / sizeof(WCHAR)) { WLog_ERR(TAG, "cbPassword > UINT16_MAX"); goto fail; } cbPassword = (UINT16)cbPassword * sizeof(WCHAR); } const char* altShell = NULL; if (!settings->RemoteAssistanceMode) altShell = freerdp_settings_get_string(settings, FreeRDP_AlternateShell); else if (settings->RemoteAssistancePassStub) altShell = "*"; /* This field MUST be filled with "*" */ else altShell = freerdp_settings_get_string(settings, FreeRDP_RemoteAssistancePassword); if (altShell && strlen(altShell) > 0) { alternateShellW = ConvertUtf8ToWCharAlloc(altShell, &cbAlternateShell); if (!alternateShellW) { WLog_ERR(TAG, "alternateShellW == NULL"); goto fail; } if (cbAlternateShell > (UINT16_MAX / sizeof(WCHAR))) { WLog_ERR(TAG, "cbAlternateShell > UINT16_MAX"); goto fail; } cbAlternateShell = (UINT16)cbAlternateShell * sizeof(WCHAR); } FreeRDP_Settings_Keys_String inputId = FreeRDP_RemoteAssistanceSessionId; if (!freerdp_settings_get_bool(settings, FreeRDP_RemoteAssistanceMode)) inputId = FreeRDP_ShellWorkingDirectory; workingDirW = freerdp_settings_get_string_as_utf16(settings, inputId, &cbWorkingDir); if (cbWorkingDir > (UINT16_MAX / sizeof(WCHAR))) { WLog_ERR(TAG, "cbWorkingDir > UINT16_MAX"); goto fail; } cbWorkingDir = (UINT16)cbWorkingDir * sizeof(WCHAR); if (!Stream_EnsureRemainingCapacity(s, 18ull + cbDomain + cbUserName + cbPassword + cbAlternateShell + cbWorkingDir + 5 * sizeof(WCHAR))) goto fail; Stream_Write_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes) */ Stream_Write_UINT32(s, flags); /* flags (4 bytes) */ Stream_Write_UINT16(s, (UINT16)cbDomain); /* cbDomain (2 bytes) */ Stream_Write_UINT16(s, (UINT16)cbUserName); /* cbUserName (2 bytes) */ Stream_Write_UINT16(s, (UINT16)cbPassword); /* cbPassword (2 bytes) */ Stream_Write_UINT16(s, (UINT16)cbAlternateShell); /* cbAlternateShell (2 bytes) */ Stream_Write_UINT16(s, (UINT16)cbWorkingDir); /* cbWorkingDir (2 bytes) */ Stream_Write(s, domainW, cbDomain); /* the mandatory null terminator */ Stream_Write_UINT16(s, 0); Stream_Write(s, userNameW, cbUserName); /* the mandatory null terminator */ Stream_Write_UINT16(s, 0); Stream_Write(s, passwordW, cbPassword); /* the mandatory null terminator */ Stream_Write_UINT16(s, 0); Stream_Write(s, alternateShellW, cbAlternateShell); /* the mandatory null terminator */ Stream_Write_UINT16(s, 0); Stream_Write(s, workingDirW, cbWorkingDir); /* the mandatory null terminator */ Stream_Write_UINT16(s, 0); ret = TRUE; fail: free(domainW); free(userNameW); free(alternateShellW); free(workingDirW); if (!usedPasswordCookie) free(passwordW); if (!ret) return FALSE; if (settings->RdpVersion >= RDP_VERSION_5_PLUS) ret = rdp_write_extended_info_packet(rdp, s); /* extraInfo */ return ret; } /** * Read Client Info PDU (CLIENT_INFO_PDU). * msdn{cc240474} * @param rdp RDP module * @param s stream */ BOOL rdp_recv_client_info(rdpRdp* rdp, wStream* s) { UINT16 length = 0; UINT16 channelId = 0; UINT16 securityFlags = 0; WINPR_ASSERT(rdp_get_state(rdp) == CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE); if (!rdp_read_header(rdp, s, &length, &channelId)) return FALSE; if (!rdp_read_security_header(rdp, s, &securityFlags, &length)) return FALSE; if ((securityFlags & SEC_INFO_PKT) == 0) return FALSE; if (rdp->settings->UseRdpSecurityLayer) { if (securityFlags & SEC_REDIRECTION_PKT) { WLog_ERR(TAG, "Error: SEC_REDIRECTION_PKT unsupported"); return FALSE; } if (securityFlags & SEC_ENCRYPT) { if (!rdp_decrypt(rdp, s, &length, securityFlags)) return FALSE; } } return rdp_read_info_packet(rdp, s, length); } /** * Send Client Info PDU (CLIENT_INFO_PDU). * msdn{cc240474} * @param rdp RDP module */ BOOL rdp_send_client_info(rdpRdp* rdp) { wStream* s = NULL; WINPR_ASSERT(rdp); rdp->sec_flags |= SEC_INFO_PKT; s = rdp_send_stream_init(rdp); if (!s) { WLog_ERR(TAG, "Stream_New failed!"); return FALSE; } if (!rdp_write_info_packet(rdp, s)) { Stream_Release(s); return FALSE; } return rdp_send(rdp, s, MCS_GLOBAL_CHANNEL_ID); } static void rdp_free_logon_info(logon_info* info) { if (!info) return; free(info->domain); free(info->username); const logon_info empty = { 0 }; *info = empty; } static BOOL rdp_info_read_string(const char* what, wStream* s, size_t size, size_t max, BOOL skipMax, char** dst) { WINPR_ASSERT(dst); *dst = NULL; if (size == 0) { if (skipMax) return Stream_SafeSeek(s, max); return TRUE; } if (((size % sizeof(WCHAR)) != 0) || (size > max)) { WLog_ERR(TAG, "protocol error: invalid %s value: %" PRIu32 "", what, size); return FALSE; } const WCHAR* str = Stream_ConstPointer(s); if (!Stream_SafeSeek(s, skipMax ? max : size)) return FALSE; if (str[size / sizeof(WCHAR) - 1]) { WLog_ERR(TAG, "protocol error: %s must be null terminated", what); return FALSE; } size_t len = 0; char* rc = ConvertWCharNToUtf8Alloc(str, size / sizeof(WCHAR), &len); if (!rc) { WLog_ERR(TAG, "failed to convert the %s string", what); free(rc); return FALSE; } *dst = rc; return TRUE; } static BOOL rdp_recv_logon_info_v1(rdpRdp* rdp, wStream* s, logon_info* info) { UINT32 cbDomain = 0; UINT32 cbUserName = 0; WINPR_UNUSED(rdp); WINPR_ASSERT(info); if (!Stream_CheckAndLogRequiredLength(TAG, s, 576)) return FALSE; Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */ /* cbDomain is the size of the Unicode character data (including the mandatory * null terminator) in bytes present in the fixed-length (52 bytes) Domain field */ if (!rdp_info_read_string("Domain", s, cbDomain, 52, TRUE, &info->domain)) goto fail; Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */ /* cbUserName is the size of the Unicode character data (including the mandatory * null terminator) in bytes present in the fixed-length (512 bytes) UserName field. */ if (!rdp_info_read_string("UserName", s, cbUserName, 512, TRUE, &info->username)) goto fail; Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */ WLog_DBG(TAG, "LogonInfoV1: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]", info->sessionId, info->username, info->domain); return TRUE; fail: return FALSE; } static BOOL rdp_recv_logon_info_v2(rdpRdp* rdp, wStream* s, logon_info* info) { UINT16 Version = 0; UINT32 Size = 0; UINT32 cbDomain = 0; UINT32 cbUserName = 0; WINPR_ASSERT(rdp); WINPR_ASSERT(s); WINPR_ASSERT(info); WINPR_UNUSED(rdp); if (!Stream_CheckAndLogRequiredLength(TAG, s, logonInfoV2TotalSize)) return FALSE; Stream_Read_UINT16(s, Version); /* Version (2 bytes) */ if (Version != SAVE_SESSION_PDU_VERSION_ONE) { WLog_WARN(TAG, "LogonInfoV2::Version expected %" PRIu16 " bytes, got %" PRIu16, SAVE_SESSION_PDU_VERSION_ONE, Version); return FALSE; } Stream_Read_UINT32(s, Size); /* Size (4 bytes) */ /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2) * should be logonInfoV2TotalSize * but even MS server 2019 sends logonInfoV2Size */ if (Size != logonInfoV2TotalSize) { if (Size != logonInfoV2Size) { WLog_WARN(TAG, "LogonInfoV2::Size expected %" PRIu32 " bytes, got %" PRIu32, logonInfoV2TotalSize, Size); return FALSE; } } Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */ Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */ Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */ Stream_Seek(s, logonInfoV2ReservedSize); /* pad (558 bytes) */ /* cbDomain is the size in bytes of the Unicode character data in the Domain field. * The size of the mandatory null terminator is include in this value. * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume * that the maximum value is 52 bytes, according to the fixed size of the * Domain field in the Logon Info Version 1 (TS_LOGON_INFO) structure. */ if (!rdp_info_read_string("Domain", s, cbDomain, 52, FALSE, &info->domain)) goto fail; /* cbUserName is the size in bytes of the Unicode character data in the UserName field. * The size of the mandatory null terminator is include in this value. * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume * that the maximum value is 512 bytes, according to the fixed size of the * Username field in the Logon Info Version 1 (TS_LOGON_INFO) structure. */ if (!rdp_info_read_string("UserName", s, cbUserName, 512, FALSE, &info->username)) goto fail; /* We´ve seen undocumented padding with windows 11 here. * unless it has actual data in it ignore it. * if there is unexpected data, print a warning and dump the contents */ const size_t rem = Stream_GetRemainingLength(s); if (rem > 0) { BOOL warn = FALSE; const char* str = Stream_ConstPointer(s); for (size_t x = 0; x < rem; x++) { if (str[x] != '\0') warn = TRUE; } if (warn) { WLog_WARN(TAG, "unexpected padding of %" PRIuz " bytes, data not '\0'", rem); winpr_HexDump(TAG, WLOG_TRACE, str, rem); } if (!Stream_SafeSeek(s, rem)) goto fail; } WLog_DBG(TAG, "LogonInfoV2: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]", info->sessionId, info->username, info->domain); return TRUE; fail: return FALSE; } static BOOL rdp_recv_logon_plain_notify(rdpRdp* rdp, wStream* s) { WINPR_UNUSED(rdp); if (!Stream_CheckAndLogRequiredLength(TAG, s, 576)) return FALSE; Stream_Seek(s, 576); /* pad (576 bytes) */ WLog_DBG(TAG, "LogonPlainNotify"); return TRUE; } static BOOL rdp_recv_logon_error_info(rdpRdp* rdp, wStream* s, logon_info_ex* info) { freerdp* instance = NULL; UINT32 errorNotificationType = 0; UINT32 errorNotificationData = 0; WINPR_ASSERT(rdp); WINPR_ASSERT(rdp->context); WINPR_ASSERT(s); WINPR_ASSERT(info); instance = rdp->context->instance; WINPR_ASSERT(instance); if (!Stream_CheckAndLogRequiredLength(TAG, s, 8)) return FALSE; Stream_Read_UINT32(s, errorNotificationType); /* errorNotificationType (4 bytes) */ Stream_Read_UINT32(s, errorNotificationData); /* errorNotificationData (4 bytes) */ WLog_DBG(TAG, "LogonErrorInfo: Data: 0x%08" PRIX32 " Type: 0x%08" PRIX32 "", errorNotificationData, errorNotificationType); IFCALL(instance->LogonErrorInfo, instance, errorNotificationData, errorNotificationType); info->ErrorNotificationType = errorNotificationType; info->ErrorNotificationData = errorNotificationData; return TRUE; } static BOOL rdp_recv_logon_info_extended(rdpRdp* rdp, wStream* s, logon_info_ex* info) { UINT32 cbFieldData = 0; UINT32 fieldsPresent = 0; UINT16 Length = 0; WINPR_ASSERT(rdp); WINPR_ASSERT(s); WINPR_ASSERT(info); if (!Stream_CheckAndLogRequiredLength(TAG, s, 6)) { WLog_WARN(TAG, "received short logon info extended, need 6 bytes, got %" PRIuz, Stream_GetRemainingLength(s)); return FALSE; } Stream_Read_UINT16(s, Length); /* Length (2 bytes) */ Stream_Read_UINT32(s, fieldsPresent); /* fieldsPresent (4 bytes) */ if ((Length < 6) || (!Stream_CheckAndLogRequiredLength(TAG, s, (Length - 6U)))) { WLog_WARN(TAG, "received short logon info extended, need %" PRIu16 " - 6 bytes, got %" PRIuz, Length, Stream_GetRemainingLength(s)); return FALSE; } WLog_DBG(TAG, "LogonInfoExtended: fieldsPresent: 0x%08" PRIX32 "", fieldsPresent); /* logonFields */ if (fieldsPresent & LOGON_EX_AUTORECONNECTCOOKIE) { if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; info->haveCookie = TRUE; Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */ if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData)) return FALSE; if (!rdp_read_server_auto_reconnect_cookie(rdp, s, info)) return FALSE; } if (fieldsPresent & LOGON_EX_LOGONERRORS) { info->haveErrorInfo = TRUE; if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */ if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData)) return FALSE; if (!rdp_recv_logon_error_info(rdp, s, info)) return FALSE; } if (!Stream_CheckAndLogRequiredLength(TAG, s, 570)) return FALSE; Stream_Seek(s, 570); /* pad (570 bytes) */ return TRUE; } BOOL rdp_recv_save_session_info(rdpRdp* rdp, wStream* s) { UINT32 infoType = 0; BOOL status = 0; logon_info logonInfo = { 0 }; logon_info_ex logonInfoEx = { 0 }; rdpContext* context = rdp->context; rdpUpdate* update = rdp->context->update; if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) return FALSE; Stream_Read_UINT32(s, infoType); /* infoType (4 bytes) */ switch (infoType) { case INFO_TYPE_LOGON: status = rdp_recv_logon_info_v1(rdp, s, &logonInfo); if (status && update->SaveSessionInfo) status = update->SaveSessionInfo(context, infoType, &logonInfo); rdp_free_logon_info(&logonInfo); break; case INFO_TYPE_LOGON_LONG: status = rdp_recv_logon_info_v2(rdp, s, &logonInfo); if (status && update->SaveSessionInfo) status = update->SaveSessionInfo(context, infoType, &logonInfo); rdp_free_logon_info(&logonInfo); break; case INFO_TYPE_LOGON_PLAIN_NOTIFY: status = rdp_recv_logon_plain_notify(rdp, s); if (status && update->SaveSessionInfo) status = update->SaveSessionInfo(context, infoType, NULL); break; case INFO_TYPE_LOGON_EXTENDED_INF: status = rdp_recv_logon_info_extended(rdp, s, &logonInfoEx); if (status && update->SaveSessionInfo) status = update->SaveSessionInfo(context, infoType, &logonInfoEx); break; default: WLog_ERR(TAG, "Unhandled saveSessionInfo type 0x%" PRIx32 "", infoType); status = TRUE; break; } if (!status) { WLog_DBG(TAG, "SaveSessionInfo error: infoType: %s (%" PRIu32 ")", infoType < 4 ? INFO_TYPE_LOGON_STRINGS[infoType % 4] : "Unknown", infoType); } return status; } static BOOL rdp_write_logon_info_v1(wStream* s, logon_info* info) { const size_t charLen = 52 / sizeof(WCHAR); const size_t userCharLen = 512 / sizeof(WCHAR); size_t sz = 4 + 52 + 4 + 512 + 4; if (!Stream_EnsureRemainingCapacity(s, sz)) return FALSE; /* domain */ { WINPR_ASSERT(info); if (!info->domain || !info->username) return FALSE; const size_t len = strnlen(info->domain, charLen + 1); if (len > charLen) return FALSE; const size_t wlen = len * sizeof(WCHAR); if (wlen > UINT32_MAX) return FALSE; Stream_Write_UINT32(s, (UINT32)wlen); if (Stream_Write_UTF16_String_From_UTF8(s, charLen, info->domain, len, TRUE) < 0) return FALSE; } /* username */ { const size_t len = strnlen(info->username, userCharLen + 1); if (len > userCharLen) return FALSE; const size_t wlen = len * sizeof(WCHAR); if (wlen > UINT32_MAX) return FALSE; Stream_Write_UINT32(s, (UINT32)wlen); if (Stream_Write_UTF16_String_From_UTF8(s, userCharLen, info->username, len, TRUE) < 0) return FALSE; } /* sessionId */ Stream_Write_UINT32(s, info->sessionId); return TRUE; } static BOOL rdp_write_logon_info_v2(wStream* s, logon_info* info) { size_t domainLen = 0; size_t usernameLen = 0; if (!Stream_EnsureRemainingCapacity(s, logonInfoV2TotalSize)) return FALSE; Stream_Write_UINT16(s, SAVE_SESSION_PDU_VERSION_ONE); /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2) * should be logonInfoV2TotalSize * but even MS server 2019 sends logonInfoV2Size */ Stream_Write_UINT32(s, logonInfoV2Size); Stream_Write_UINT32(s, info->sessionId); domainLen = strnlen(info->domain, UINT32_MAX); if (domainLen >= UINT32_MAX / sizeof(WCHAR)) return FALSE; Stream_Write_UINT32(s, (UINT32)(domainLen + 1) * sizeof(WCHAR)); usernameLen = strnlen(info->username, UINT32_MAX); if (usernameLen >= UINT32_MAX / sizeof(WCHAR)) return FALSE; Stream_Write_UINT32(s, (UINT32)(usernameLen + 1) * sizeof(WCHAR)); Stream_Seek(s, logonInfoV2ReservedSize); if (Stream_Write_UTF16_String_From_UTF8(s, domainLen + 1, info->domain, domainLen, TRUE) < 0) return FALSE; if (Stream_Write_UTF16_String_From_UTF8(s, usernameLen + 1, info->username, usernameLen, TRUE) < 0) return FALSE; return TRUE; } static BOOL rdp_write_logon_info_plain(wStream* s) { if (!Stream_EnsureRemainingCapacity(s, 576)) return FALSE; Stream_Seek(s, 576); return TRUE; } static BOOL rdp_write_logon_info_ex(wStream* s, logon_info_ex* info) { UINT32 FieldsPresent = 0; UINT16 Size = 2 + 4 + 570; if (info->haveCookie) { FieldsPresent |= LOGON_EX_AUTORECONNECTCOOKIE; Size += 28; } if (info->haveErrorInfo) { FieldsPresent |= LOGON_EX_LOGONERRORS; Size += 8; } if (!Stream_EnsureRemainingCapacity(s, Size)) return FALSE; Stream_Write_UINT16(s, Size); Stream_Write_UINT32(s, FieldsPresent); if (info->haveCookie) { Stream_Write_UINT32(s, 28); /* cbFieldData (4 bytes) */ Stream_Write_UINT32(s, 28); /* cbLen (4 bytes) */ Stream_Write_UINT32(s, AUTO_RECONNECT_VERSION_1); /* Version (4 bytes) */ Stream_Write_UINT32(s, info->LogonId); /* LogonId (4 bytes) */ Stream_Write(s, info->ArcRandomBits, 16); /* ArcRandomBits (16 bytes) */ } if (info->haveErrorInfo) { Stream_Write_UINT32(s, 8); /* cbFieldData (4 bytes) */ Stream_Write_UINT32(s, info->ErrorNotificationType); /* ErrorNotificationType (4 bytes) */ Stream_Write_UINT32(s, info->ErrorNotificationData); /* ErrorNotificationData (4 bytes) */ } Stream_Seek(s, 570); return TRUE; } BOOL rdp_send_save_session_info(rdpContext* context, UINT32 type, void* data) { wStream* s = NULL; BOOL status = 0; rdpRdp* rdp = context->rdp; s = rdp_data_pdu_init(rdp); if (!s) return FALSE; Stream_Write_UINT32(s, type); switch (type) { case INFO_TYPE_LOGON: status = rdp_write_logon_info_v1(s, (logon_info*)data); break; case INFO_TYPE_LOGON_LONG: status = rdp_write_logon_info_v2(s, (logon_info*)data); break; case INFO_TYPE_LOGON_PLAIN_NOTIFY: status = rdp_write_logon_info_plain(s); break; case INFO_TYPE_LOGON_EXTENDED_INF: status = rdp_write_logon_info_ex(s, (logon_info_ex*)data); break; default: WLog_ERR(TAG, "saveSessionInfo type 0x%" PRIx32 " not handled", type); status = FALSE; break; } if (status) status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SAVE_SESSION_INFO, rdp->mcs->userId); else Stream_Release(s); return status; } BOOL rdp_send_server_status_info(rdpContext* context, UINT32 status) { wStream* s = NULL; rdpRdp* rdp = context->rdp; s = rdp_data_pdu_init(rdp); if (!s) return FALSE; Stream_Write_UINT32(s, status); return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_STATUS_INFO, rdp->mcs->userId); }