235 lines
5.7 KiB
C
235 lines
5.7 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
* RPC over HTTP (ncacn_http)
|
|
*
|
|
* Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "ncacn_http.h"
|
|
|
|
#include <winpr/crt.h>
|
|
#include <winpr/tchar.h>
|
|
#include <winpr/stream.h>
|
|
#include <winpr/dsparse.h>
|
|
#include <winpr/winhttp.h>
|
|
|
|
#define TAG FREERDP_TAG("core.gateway.ntlm")
|
|
|
|
wStream* rpc_ntlm_http_request(rdpRpc* rpc, HttpContext* http, const char* method, int contentLength, SecBuffer* ntlmToken)
|
|
{
|
|
wStream* s;
|
|
HttpRequest* request;
|
|
char* base64NtlmToken = NULL;
|
|
|
|
request = http_request_new();
|
|
|
|
if (ntlmToken)
|
|
base64NtlmToken = crypto_base64_encode(ntlmToken->pvBuffer, ntlmToken->cbBuffer);
|
|
|
|
http_request_set_method(request, method);
|
|
|
|
request->ContentLength = contentLength;
|
|
http_request_set_uri(request, http->URI);
|
|
|
|
if (base64NtlmToken)
|
|
{
|
|
http_request_set_auth_scheme(request, "NTLM");
|
|
http_request_set_auth_param(request, base64NtlmToken);
|
|
}
|
|
|
|
s = http_request_write(http, request);
|
|
http_request_free(request);
|
|
|
|
free(base64NtlmToken);
|
|
|
|
return s;
|
|
}
|
|
|
|
int rpc_ncacn_http_send_in_channel_request(rdpRpc* rpc, RpcInChannel* inChannel)
|
|
{
|
|
wStream* s;
|
|
int status;
|
|
int contentLength;
|
|
BOOL continueNeeded;
|
|
rdpNtlm* ntlm = inChannel->ntlm;
|
|
HttpContext* http = inChannel->http;
|
|
|
|
continueNeeded = ntlm_authenticate(ntlm);
|
|
|
|
contentLength = (continueNeeded) ? 0 : 0x40000000;
|
|
|
|
s = rpc_ntlm_http_request(rpc, http, "RPC_IN_DATA", contentLength, &ntlm->outputBuffer[0]);
|
|
|
|
if (!s)
|
|
return -1;
|
|
|
|
status = rpc_in_channel_write(inChannel, Stream_Buffer(s), Stream_Length(s));
|
|
|
|
Stream_Free(s, TRUE);
|
|
|
|
return (status > 0) ? 1 : -1;
|
|
}
|
|
|
|
int rpc_ncacn_http_recv_in_channel_response(rdpRpc* rpc, RpcInChannel* inChannel, HttpResponse* response)
|
|
{
|
|
char* token64 = NULL;
|
|
int ntlmTokenLength = 0;
|
|
BYTE* ntlmTokenData = NULL;
|
|
rdpNtlm* ntlm = inChannel->ntlm;
|
|
|
|
if (ListDictionary_Contains(response->Authenticates, "NTLM"))
|
|
{
|
|
token64 = ListDictionary_GetItemValue(response->Authenticates, "NTLM");
|
|
|
|
if (!token64)
|
|
return -1;
|
|
|
|
crypto_base64_decode(token64, strlen(token64), &ntlmTokenData, &ntlmTokenLength);
|
|
}
|
|
|
|
if (ntlmTokenData && ntlmTokenLength)
|
|
{
|
|
ntlm->inputBuffer[0].pvBuffer = ntlmTokenData;
|
|
ntlm->inputBuffer[0].cbBuffer = ntlmTokenLength;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int rpc_ncacn_http_ntlm_init(rdpRpc* rpc, RpcChannel* channel)
|
|
{
|
|
rdpTls* tls = channel->tls;
|
|
rdpNtlm* ntlm = channel->ntlm;
|
|
rdpContext* context = rpc->context;
|
|
rdpSettings* settings = rpc->settings;
|
|
freerdp* instance = context->instance;
|
|
|
|
if (!settings->GatewayPassword || !settings->GatewayUsername ||
|
|
!strlen(settings->GatewayPassword) || !strlen(settings->GatewayUsername))
|
|
{
|
|
if (instance->GatewayAuthenticate)
|
|
{
|
|
BOOL proceed = instance->GatewayAuthenticate(instance, &settings->GatewayUsername,
|
|
&settings->GatewayPassword, &settings->GatewayDomain);
|
|
|
|
if (!proceed)
|
|
{
|
|
freerdp_set_last_error(context, FREERDP_ERROR_CONNECT_CANCELLED);
|
|
return 0;
|
|
}
|
|
|
|
if (settings->GatewayUseSameCredentials)
|
|
{
|
|
if (settings->GatewayUsername)
|
|
{
|
|
free(settings->Username);
|
|
if (!(settings->Username = _strdup(settings->GatewayUsername)))
|
|
return -1;
|
|
}
|
|
if (settings->GatewayDomain)
|
|
{
|
|
free(settings->Domain);
|
|
if (!(settings->Domain = _strdup(settings->GatewayDomain)))
|
|
return -1;
|
|
}
|
|
if (settings->GatewayPassword)
|
|
{
|
|
free(settings->Password);
|
|
if (!(settings->Password = _strdup(settings->GatewayPassword)))
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ntlm_client_init(ntlm, TRUE, settings->GatewayUsername,
|
|
settings->GatewayDomain, settings->GatewayPassword, tls->Bindings))
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
if (!ntlm_client_make_spn(ntlm, _T("HTTP"), settings->GatewayHostname))
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
void rpc_ncacn_http_ntlm_uninit(rdpRpc* rpc, RpcChannel* channel)
|
|
{
|
|
ntlm_client_uninit(channel->ntlm);
|
|
ntlm_free(channel->ntlm);
|
|
channel->ntlm = NULL;
|
|
}
|
|
|
|
int rpc_ncacn_http_send_out_channel_request(rdpRpc* rpc, RpcOutChannel* outChannel, BOOL replacement)
|
|
{
|
|
wStream* s;
|
|
int status;
|
|
int contentLength;
|
|
BOOL continueNeeded;
|
|
rdpNtlm* ntlm = outChannel->ntlm;
|
|
HttpContext* http = outChannel->http;
|
|
|
|
continueNeeded = ntlm_authenticate(ntlm);
|
|
|
|
if (!replacement)
|
|
contentLength = (continueNeeded) ? 0 : 76;
|
|
else
|
|
contentLength = (continueNeeded) ? 0 : 120;
|
|
|
|
s = rpc_ntlm_http_request(rpc, http, "RPC_OUT_DATA", contentLength, &ntlm->outputBuffer[0]);
|
|
|
|
if (!s)
|
|
return -1;
|
|
|
|
status = rpc_out_channel_write(outChannel, Stream_Buffer(s), Stream_Length(s));
|
|
|
|
Stream_Free(s, TRUE);
|
|
|
|
return (status > 0) ? 1 : -1;
|
|
}
|
|
|
|
int rpc_ncacn_http_recv_out_channel_response(rdpRpc* rpc, RpcOutChannel* outChannel, HttpResponse* response)
|
|
{
|
|
char* token64 = NULL;
|
|
int ntlmTokenLength = 0;
|
|
BYTE* ntlmTokenData = NULL;
|
|
rdpNtlm* ntlm = outChannel->ntlm;
|
|
|
|
if (ListDictionary_Contains(response->Authenticates, "NTLM"))
|
|
{
|
|
token64 = ListDictionary_GetItemValue(response->Authenticates, "NTLM");
|
|
|
|
if (!token64)
|
|
return -1;
|
|
|
|
crypto_base64_decode(token64, strlen(token64), &ntlmTokenData, &ntlmTokenLength);
|
|
}
|
|
|
|
if (ntlmTokenData && ntlmTokenLength)
|
|
{
|
|
ntlm->inputBuffer[0].pvBuffer = ntlmTokenData;
|
|
ntlm->inputBuffer[0].cbBuffer = ntlmTokenLength;
|
|
}
|
|
|
|
return 1;
|
|
}
|