1576 lines
43 KiB
C
1576 lines
43 KiB
C
/**
|
||
* FreeRDP: A Remote Desktop Protocol Implementation
|
||
* RDP Client Info
|
||
*
|
||
* Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
||
* Copyright 2015 Thincast Technologies GmbH
|
||
* Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
|
||
*
|
||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
* you may not use this file except in compliance with the License.
|
||
* You may obtain a copy of the License at
|
||
*
|
||
* http://www.apache.org/licenses/LICENSE-2.0
|
||
*
|
||
* Unless required by applicable law or agreed to in writing, software
|
||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
* See the License for the specific language governing permissions and
|
||
* limitations under the License.
|
||
*/
|
||
|
||
#include <freerdp/config.h>
|
||
|
||
#include <winpr/crt.h>
|
||
#include <winpr/assert.h>
|
||
|
||
#include <freerdp/crypto/crypto.h>
|
||
#include <freerdp/log.h>
|
||
#include <freerdp/session.h>
|
||
#include <stdio.h>
|
||
|
||
#include "timezone.h"
|
||
|
||
#include "info.h"
|
||
|
||
#define TAG FREERDP_TAG("core.info")
|
||
|
||
#define logonInfoV2Size (2 + 4 + 4 + 4 + 4)
|
||
#define logonInfoV2ReservedSize 558
|
||
#define logonInfoV2TotalSize (logonInfoV2Size + logonInfoV2ReservedSize)
|
||
|
||
static const char* const INFO_TYPE_LOGON_STRINGS[4] = { "Logon Info V1", "Logon Info V2",
|
||
"Logon Plain Notify",
|
||
"Logon Extended Info" };
|
||
|
||
/* This define limits the length of the strings in the label field. */
|
||
#define MAX_LABEL_LENGTH 40
|
||
struct info_flags_t
|
||
{
|
||
UINT32 flag;
|
||
const char* label;
|
||
};
|
||
|
||
static const struct info_flags_t info_flags[] = {
|
||
{ INFO_MOUSE, "INFO_MOUSE" },
|
||
{ INFO_DISABLECTRLALTDEL, "INFO_DISABLECTRLALTDEL" },
|
||
{ INFO_AUTOLOGON, "INFO_AUTOLOGON" },
|
||
{ INFO_UNICODE, "INFO_UNICODE" },
|
||
{ INFO_MAXIMIZESHELL, "INFO_MAXIMIZESHELL" },
|
||
{ INFO_LOGONNOTIFY, "INFO_LOGONNOTIFY" },
|
||
{ INFO_COMPRESSION, "INFO_COMPRESSION" },
|
||
{ INFO_ENABLEWINDOWSKEY, "INFO_ENABLEWINDOWSKEY" },
|
||
{ INFO_REMOTECONSOLEAUDIO, "INFO_REMOTECONSOLEAUDIO" },
|
||
{ INFO_FORCE_ENCRYPTED_CS_PDU, "INFO_FORCE_ENCRYPTED_CS_PDU" },
|
||
{ INFO_RAIL, "INFO_RAIL" },
|
||
{ INFO_LOGONERRORS, "INFO_LOGONERRORS" },
|
||
{ INFO_MOUSE_HAS_WHEEL, "INFO_MOUSE_HAS_WHEEL" },
|
||
{ INFO_PASSWORD_IS_SC_PIN, "INFO_PASSWORD_IS_SC_PIN" },
|
||
{ INFO_NOAUDIOPLAYBACK, "INFO_NOAUDIOPLAYBACK" },
|
||
{ INFO_USING_SAVED_CREDS, "INFO_USING_SAVED_CREDS" },
|
||
{ INFO_AUDIOCAPTURE, "INFO_AUDIOCAPTURE" },
|
||
{ INFO_VIDEO_DISABLE, "INFO_VIDEO_DISABLE" },
|
||
{ INFO_HIDEF_RAIL_SUPPORTED, "INFO_HIDEF_RAIL_SUPPORTED" },
|
||
};
|
||
|
||
static BOOL rdp_read_info_null_string(UINT32 flags, wStream* s, size_t cbLen, CHAR** dst,
|
||
size_t max)
|
||
{
|
||
CHAR* ret = NULL;
|
||
|
||
const BOOL unicode = flags & INFO_UNICODE;
|
||
const size_t nullSize = unicode ? sizeof(WCHAR) : sizeof(CHAR);
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLen)))
|
||
return FALSE;
|
||
|
||
if (cbLen > 0)
|
||
{
|
||
WCHAR domain[512 / sizeof(WCHAR) + sizeof(WCHAR)] = { 0 };
|
||
/* cbDomain is the size in bytes of the character data in the Domain field.
|
||
* This size excludes (!) the length of the mandatory null terminator.
|
||
* Maximum value including the mandatory null terminator: 512
|
||
*/
|
||
if ((cbLen % 2) || (cbLen > (max - nullSize)))
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid value: %" PRIuz "", cbLen);
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Read(s, domain, cbLen);
|
||
|
||
if (unicode)
|
||
{
|
||
if (ConvertFromUnicode(CP_UTF8, 0, domain, cbLen, &ret, 0, NULL, NULL) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert Domain string");
|
||
return FALSE;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ret = calloc(cbLen + 1, nullSize);
|
||
if (!ret)
|
||
return FALSE;
|
||
memcpy(ret, domain, cbLen);
|
||
}
|
||
}
|
||
|
||
free(*dst);
|
||
*dst = ret;
|
||
return TRUE;
|
||
}
|
||
|
||
static char* rdp_info_package_flags_description(UINT32 flags)
|
||
{
|
||
char* result;
|
||
size_t maximum_size = 1 + MAX_LABEL_LENGTH * ARRAYSIZE(info_flags);
|
||
size_t i;
|
||
|
||
result = calloc(maximum_size, sizeof(char));
|
||
|
||
if (!result)
|
||
return 0;
|
||
|
||
for (i = 0; i < ARRAYSIZE(info_flags); i++)
|
||
{
|
||
const struct info_flags_t* cur = &info_flags[i];
|
||
if (cur->flag & flags)
|
||
{
|
||
winpr_str_append(cur->label, result, maximum_size, "|");
|
||
}
|
||
}
|
||
|
||
return result;
|
||
}
|
||
|
||
static BOOL rdp_compute_client_auto_reconnect_cookie(rdpRdp* rdp)
|
||
{
|
||
BYTE ClientRandom[32];
|
||
BYTE AutoReconnectRandom[32];
|
||
ARC_SC_PRIVATE_PACKET* serverCookie;
|
||
ARC_CS_PRIVATE_PACKET* clientCookie;
|
||
rdpSettings* settings = rdp->settings;
|
||
serverCookie = settings->ServerAutoReconnectCookie;
|
||
clientCookie = settings->ClientAutoReconnectCookie;
|
||
clientCookie->cbLen = 28;
|
||
clientCookie->version = serverCookie->version;
|
||
clientCookie->logonId = serverCookie->logonId;
|
||
ZeroMemory(clientCookie->securityVerifier, 16);
|
||
ZeroMemory(AutoReconnectRandom, sizeof(AutoReconnectRandom));
|
||
CopyMemory(AutoReconnectRandom, serverCookie->arcRandomBits, 16);
|
||
ZeroMemory(ClientRandom, sizeof(ClientRandom));
|
||
|
||
if (settings->SelectedProtocol == PROTOCOL_RDP)
|
||
CopyMemory(ClientRandom, settings->ClientRandom, settings->ClientRandomLength);
|
||
|
||
/* SecurityVerifier = HMAC_MD5(AutoReconnectRandom, ClientRandom) */
|
||
|
||
if (!winpr_HMAC(WINPR_MD_MD5, AutoReconnectRandom, 16, ClientRandom, 32,
|
||
clientCookie->securityVerifier, 16))
|
||
return FALSE;
|
||
|
||
return TRUE;
|
||
}
|
||
|
||
/**
|
||
* Read Server Auto Reconnect Cookie (ARC_SC_PRIVATE_PACKET).\n
|
||
* @msdn{cc240540}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_read_server_auto_reconnect_cookie(rdpRdp* rdp, wStream* s, logon_info_ex* info)
|
||
{
|
||
BYTE* p;
|
||
ARC_SC_PRIVATE_PACKET* autoReconnectCookie;
|
||
rdpSettings* settings = rdp->settings;
|
||
autoReconnectCookie = settings->ServerAutoReconnectCookie;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
|
||
|
||
if (autoReconnectCookie->cbLen != 28)
|
||
{
|
||
WLog_ERR(TAG, "ServerAutoReconnectCookie.cbLen != 28");
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Read_UINT32(s, autoReconnectCookie->version); /* Version (4 bytes) */
|
||
Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
|
||
Stream_Read(s, autoReconnectCookie->arcRandomBits, 16); /* ArcRandomBits (16 bytes) */
|
||
p = autoReconnectCookie->arcRandomBits;
|
||
WLog_DBG(TAG,
|
||
"ServerAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32
|
||
" SecurityVerifier: "
|
||
"%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
|
||
"%02" PRIX8 ""
|
||
"%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
|
||
"%02" PRIX8 "",
|
||
autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
|
||
p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
|
||
info->LogonId = autoReconnectCookie->logonId;
|
||
CopyMemory(info->ArcRandomBits, p, 16);
|
||
|
||
if ((settings->PrintReconnectCookie))
|
||
{
|
||
char* base64;
|
||
base64 = crypto_base64_encode((BYTE*)autoReconnectCookie, sizeof(ARC_SC_PRIVATE_PACKET));
|
||
WLog_INFO(TAG, "Reconnect-cookie: %s", base64);
|
||
free(base64);
|
||
}
|
||
|
||
return TRUE;
|
||
}
|
||
|
||
/**
|
||
* Read Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).\n
|
||
* @msdn{cc240541}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_read_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
|
||
{
|
||
ARC_CS_PRIVATE_PACKET* autoReconnectCookie;
|
||
rdpSettings* settings = rdp->settings;
|
||
autoReconnectCookie = settings->ClientAutoReconnectCookie;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
|
||
Stream_Read_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */
|
||
Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
|
||
Stream_Read(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier */
|
||
return TRUE;
|
||
}
|
||
|
||
/**
|
||
* Write Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).\n
|
||
* @msdn{cc240541}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static void rdp_write_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
|
||
{
|
||
BYTE* p;
|
||
ARC_CS_PRIVATE_PACKET* autoReconnectCookie;
|
||
rdpSettings* settings = rdp->settings;
|
||
autoReconnectCookie = settings->ClientAutoReconnectCookie;
|
||
p = autoReconnectCookie->securityVerifier;
|
||
WLog_DBG(TAG,
|
||
"ClientAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32 " ArcRandomBits: "
|
||
"%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
|
||
"%02" PRIX8 ""
|
||
"%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
|
||
"%02" PRIX8 "",
|
||
autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
|
||
p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
|
||
Stream_Write_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
|
||
Stream_Write_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */
|
||
Stream_Write_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
|
||
Stream_Write(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier (16 bytes) */
|
||
}
|
||
|
||
/**
|
||
* Read Extended Info Packet (TS_EXTENDED_INFO_PACKET).\n
|
||
* @msdn{cc240476}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_read_extended_info_packet(rdpRdp* rdp, wStream* s)
|
||
{
|
||
UINT16 clientAddressFamily;
|
||
UINT16 cbClientAddress;
|
||
UINT16 cbClientDir;
|
||
UINT16 cbAutoReconnectLen;
|
||
rdpSettings* settings = rdp->settings;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
|
||
Stream_Read_UINT16(s, cbClientAddress); /* cbClientAddress (2 bytes) */
|
||
|
||
/* cbClientAddress is the size in bytes of the character data in the clientAddress field.
|
||
* This size includes the length of the mandatory null terminator.
|
||
* The maximum allowed value is 80 bytes
|
||
* Note: Although according to [MS-RDPBCGR 2.2.1.11.1.1.1] the null terminator
|
||
* is mandatory, connections via Microsoft's TS Gateway set cbClientAddress to 0.
|
||
*/
|
||
|
||
if ((cbClientAddress % 2) || cbClientAddress > 80)
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid cbClientAddress value: %" PRIu16 "",
|
||
cbClientAddress);
|
||
return FALSE;
|
||
}
|
||
|
||
settings->IPv6Enabled = (clientAddressFamily == ADDRESS_FAMILY_INET6 ? TRUE : FALSE);
|
||
|
||
if (!rdp_read_info_null_string(INFO_UNICODE, s, cbClientAddress, &settings->ClientAddress,
|
||
(settings->RdpVersion < RDP_VERSION_10_0) ? 64 : 80))
|
||
return FALSE;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */
|
||
|
||
/* cbClientDir is the size in bytes of the character data in the clientDir field.
|
||
* This size includes the length of the mandatory null terminator.
|
||
* The maximum allowed value is 512 bytes.
|
||
* Note: Although according to [MS-RDPBCGR 2.2.1.11.1.1.1] the null terminator
|
||
* is mandatory the Microsoft Android client (starting with version 8.1.31.44)
|
||
* sets cbClientDir to 0.
|
||
*/
|
||
|
||
if (!rdp_read_info_null_string(INFO_UNICODE, s, cbClientDir, &settings->ClientDir, 512))
|
||
return FALSE;
|
||
|
||
/**
|
||
* down below all fields are optional but if one field is not present,
|
||
* then all of the subsequent fields also MUST NOT be present.
|
||
*/
|
||
|
||
/* optional: clientTimeZone (172 bytes) */
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!rdp_read_client_time_zone(s, settings))
|
||
return FALSE;
|
||
|
||
/* optional: clientSessionId (4 bytes), should be set to 0 */
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, settings->ClientSessionId);
|
||
|
||
/* optional: performanceFlags (4 bytes) */
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, settings->PerformanceFlags);
|
||
freerdp_performance_flags_split(settings);
|
||
|
||
/* optional: cbAutoReconnectLen (2 bytes) */
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT16(s, cbAutoReconnectLen);
|
||
|
||
/* optional: autoReconnectCookie (28 bytes) */
|
||
/* must be present if cbAutoReconnectLen is > 0 */
|
||
if (cbAutoReconnectLen > 0)
|
||
{
|
||
if (!rdp_read_client_auto_reconnect_cookie(rdp, s))
|
||
return FALSE;
|
||
}
|
||
|
||
/* skip reserved1 and reserved2 fields */
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_SafeSeek(s, 2))
|
||
return FALSE;
|
||
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_SafeSeek(s, 2))
|
||
return FALSE;
|
||
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
|
||
return FALSE;
|
||
{
|
||
UINT16 cbDynamicDSTTimeZoneKeyName;
|
||
|
||
Stream_Read_UINT16(s, cbDynamicDSTTimeZoneKeyName);
|
||
|
||
if (!rdp_read_info_null_string(INFO_UNICODE, s, cbDynamicDSTTimeZoneKeyName,
|
||
&settings->DynamicDSTTimeZoneKeyName, 254))
|
||
return FALSE;
|
||
|
||
if (Stream_GetRemainingLength(s) == 0)
|
||
goto end;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
|
||
return FALSE;
|
||
Stream_Read_UINT16(s, settings->DynamicDaylightTimeDisabled);
|
||
if (settings->DynamicDaylightTimeDisabled > 1)
|
||
{
|
||
WLog_WARN(TAG,
|
||
"[MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet "
|
||
"(TS_EXTENDED_INFO_PACKET)::dynamicDaylightTimeDisabled value %" PRIu16
|
||
" not allowed in [0,1]",
|
||
settings->DynamicDaylightTimeDisabled);
|
||
return FALSE;
|
||
}
|
||
}
|
||
|
||
end:
|
||
return TRUE;
|
||
}
|
||
|
||
/**
|
||
* Write Extended Info Packet (TS_EXTENDED_INFO_PACKET).\n
|
||
* @msdn{cc240476}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_write_extended_info_packet(rdpRdp* rdp, wStream* s)
|
||
{
|
||
BOOL ret = FALSE;
|
||
int rc;
|
||
UINT16 clientAddressFamily;
|
||
WCHAR* clientAddress = NULL;
|
||
UINT16 cbClientAddress;
|
||
WCHAR* clientDir = NULL;
|
||
UINT16 cbClientDir;
|
||
UINT16 cbAutoReconnectCookie;
|
||
rdpSettings* settings;
|
||
if (!rdp || !rdp->settings || !s)
|
||
return FALSE;
|
||
settings = rdp->settings;
|
||
clientAddressFamily = settings->IPv6Enabled ? ADDRESS_FAMILY_INET6 : ADDRESS_FAMILY_INET;
|
||
rc = ConvertToUnicode(CP_UTF8, 0, settings->ClientAddress, -1, &clientAddress, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbClientAddress = (UINT16)rc * 2;
|
||
|
||
rc = ConvertToUnicode(CP_UTF8, 0, settings->ClientDir, -1, &clientDir, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbClientDir = (UINT16)rc * 2;
|
||
|
||
if (settings->ServerAutoReconnectCookie->cbLen > UINT16_MAX)
|
||
goto fail;
|
||
cbAutoReconnectCookie = (UINT16)settings->ServerAutoReconnectCookie->cbLen;
|
||
|
||
Stream_Write_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
|
||
Stream_Write_UINT16(s, cbClientAddress + 2); /* cbClientAddress (2 bytes) */
|
||
|
||
Stream_Write(s, clientAddress, cbClientAddress); /* clientAddress */
|
||
|
||
Stream_Write_UINT16(s, 0);
|
||
Stream_Write_UINT16(s, cbClientDir + 2); /* cbClientDir (2 bytes) */
|
||
|
||
Stream_Write(s, clientDir, cbClientDir); /* clientDir */
|
||
|
||
Stream_Write_UINT16(s, 0);
|
||
if (!rdp_write_client_time_zone(s, settings)) /* clientTimeZone (172 bytes) */
|
||
goto fail;
|
||
|
||
Stream_Write_UINT32(
|
||
s, settings->ClientSessionId); /* clientSessionId (4 bytes), should be set to 0 */
|
||
freerdp_performance_flags_make(settings);
|
||
Stream_Write_UINT32(s, settings->PerformanceFlags); /* performanceFlags (4 bytes) */
|
||
Stream_Write_UINT16(s, cbAutoReconnectCookie); /* cbAutoReconnectCookie (2 bytes) */
|
||
|
||
if (cbAutoReconnectCookie > 0)
|
||
{
|
||
if (!rdp_compute_client_auto_reconnect_cookie(rdp))
|
||
goto fail;
|
||
rdp_write_client_auto_reconnect_cookie(rdp, s); /* autoReconnectCookie */
|
||
Stream_Write_UINT16(s, 0); /* reserved1 (2 bytes) */
|
||
Stream_Write_UINT16(s, 0); /* reserved2 (2 bytes) */
|
||
}
|
||
|
||
if (settings->EarlyCapabilityFlags & RNS_UD_CS_SUPPORT_DYNAMIC_TIME_ZONE)
|
||
{
|
||
WCHAR DynamicDSTTimeZoneKeyName[254] = { 0 };
|
||
LPWSTR ptr = DynamicDSTTimeZoneKeyName;
|
||
|
||
if (!Stream_EnsureRemainingCapacity(s, 10 + sizeof(DynamicDSTTimeZoneKeyName)))
|
||
goto fail;
|
||
|
||
/* skip reserved1 and reserved2 fields */
|
||
Stream_Seek(s, 4);
|
||
|
||
rc = ConvertToUnicode(CP_UTF8, 0, settings->DynamicDSTTimeZoneKeyName, -1, &ptr,
|
||
ARRAYSIZE(DynamicDSTTimeZoneKeyName));
|
||
if (rc < 0)
|
||
goto fail;
|
||
Stream_Write_UINT16(s, (UINT16)rc);
|
||
Stream_Write_UTF16_String(s, ptr, (size_t)rc);
|
||
Stream_Write_UINT16(s, settings->DynamicDaylightTimeDisabled ? 0x01 : 0x00);
|
||
}
|
||
|
||
ret = TRUE;
|
||
fail:
|
||
free(clientAddress);
|
||
free(clientDir);
|
||
return ret;
|
||
}
|
||
|
||
static BOOL rdp_read_info_string(UINT32 flags, wStream* s, size_t cbLenNonNull, CHAR** dst,
|
||
size_t max)
|
||
{
|
||
union
|
||
{
|
||
char c;
|
||
WCHAR w;
|
||
BYTE b[2];
|
||
} terminator;
|
||
CHAR* ret = NULL;
|
||
|
||
const BOOL unicode = flags & INFO_UNICODE;
|
||
const size_t nullSize = unicode ? sizeof(WCHAR) : sizeof(CHAR);
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLenNonNull + nullSize)))
|
||
return FALSE;
|
||
|
||
if (cbLenNonNull > 0)
|
||
{
|
||
WCHAR domain[512 / sizeof(WCHAR) + sizeof(WCHAR)] = { 0 };
|
||
/* cbDomain is the size in bytes of the character data in the Domain field.
|
||
* This size excludes (!) the length of the mandatory null terminator.
|
||
* Maximum value including the mandatory null terminator: 512
|
||
*/
|
||
if ((cbLenNonNull % 2) || (cbLenNonNull > (max - nullSize)))
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid value: %" PRIuz "", cbLenNonNull);
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Read(s, domain, cbLenNonNull);
|
||
|
||
if (unicode)
|
||
{
|
||
if (ConvertFromUnicode(CP_UTF8, 0, domain, -1, &ret, 0, NULL, NULL) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert Domain string");
|
||
return FALSE;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ret = calloc(cbLenNonNull + 1, nullSize);
|
||
if (!ret)
|
||
return FALSE;
|
||
memcpy(ret, domain, cbLenNonNull);
|
||
}
|
||
}
|
||
|
||
terminator.w = L'\0';
|
||
Stream_Read(s, terminator.b, nullSize);
|
||
|
||
if (terminator.w != L'\0')
|
||
{
|
||
WLog_ERR(TAG, "protocol error: Domain must be null terminated");
|
||
free(ret);
|
||
return FALSE;
|
||
}
|
||
|
||
*dst = ret;
|
||
return TRUE;
|
||
}
|
||
|
||
/**
|
||
* Read Info Packet (TS_INFO_PACKET).\n
|
||
* @msdn{cc240475}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_read_info_packet(rdpRdp* rdp, wStream* s, UINT16 tpktlength)
|
||
{
|
||
BOOL smallsize = FALSE;
|
||
UINT32 flags;
|
||
UINT16 cbDomain;
|
||
UINT16 cbUserName;
|
||
UINT16 cbPassword;
|
||
UINT16 cbAlternateShell;
|
||
UINT16 cbWorkingDir;
|
||
UINT32 CompressionLevel;
|
||
rdpSettings* settings = rdp->settings;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 18))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes ) */
|
||
Stream_Read_UINT32(s, flags); /* flags (4 bytes) */
|
||
settings->AudioCapture = ((flags & INFO_AUDIOCAPTURE) ? TRUE : FALSE);
|
||
settings->AudioPlayback = ((flags & INFO_NOAUDIOPLAYBACK) ? FALSE : TRUE);
|
||
settings->AutoLogonEnabled = ((flags & INFO_AUTOLOGON) ? TRUE : FALSE);
|
||
settings->RemoteApplicationMode = ((flags & INFO_RAIL) ? TRUE : FALSE);
|
||
settings->HiDefRemoteApp = ((flags & INFO_HIDEF_RAIL_SUPPORTED) ? TRUE : FALSE);
|
||
settings->RemoteConsoleAudio = ((flags & INFO_REMOTECONSOLEAUDIO) ? TRUE : FALSE);
|
||
settings->CompressionEnabled = ((flags & INFO_COMPRESSION) ? TRUE : FALSE);
|
||
settings->LogonNotify = ((flags & INFO_LOGONNOTIFY) ? TRUE : FALSE);
|
||
settings->MouseHasWheel = ((flags & INFO_MOUSE_HAS_WHEEL) ? TRUE : FALSE);
|
||
settings->DisableCtrlAltDel = ((flags & INFO_DISABLECTRLALTDEL) ? TRUE : FALSE);
|
||
settings->ForceEncryptedCsPdu = ((flags & INFO_FORCE_ENCRYPTED_CS_PDU) ? TRUE : FALSE);
|
||
settings->PasswordIsSmartcardPin = ((flags & INFO_PASSWORD_IS_SC_PIN) ? TRUE : FALSE);
|
||
|
||
if (flags & INFO_COMPRESSION)
|
||
{
|
||
CompressionLevel = ((flags & 0x00001E00) >> 9);
|
||
settings->CompressionLevel = CompressionLevel;
|
||
}
|
||
|
||
/* RDP 4 and 5 have smaller credential limits */
|
||
if (settings->RdpVersion < RDP_VERSION_5_PLUS)
|
||
smallsize = TRUE;
|
||
|
||
Stream_Read_UINT16(s, cbDomain); /* cbDomain (2 bytes) */
|
||
Stream_Read_UINT16(s, cbUserName); /* cbUserName (2 bytes) */
|
||
Stream_Read_UINT16(s, cbPassword); /* cbPassword (2 bytes) */
|
||
Stream_Read_UINT16(s, cbAlternateShell); /* cbAlternateShell (2 bytes) */
|
||
Stream_Read_UINT16(s, cbWorkingDir); /* cbWorkingDir (2 bytes) */
|
||
|
||
if (!rdp_read_info_string(flags, s, cbDomain, &settings->Domain, smallsize ? 52 : 512))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_info_string(flags, s, cbUserName, &settings->Username, smallsize ? 44 : 512))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_info_string(flags, s, cbPassword, &settings->Password, smallsize ? 32 : 512))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_info_string(flags, s, cbAlternateShell, &settings->AlternateShell, 512))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_info_string(flags, s, cbWorkingDir, &settings->ShellWorkingDirectory, 512))
|
||
return FALSE;
|
||
|
||
if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
|
||
return rdp_read_extended_info_packet(rdp, s); /* extraInfo */
|
||
|
||
return tpkt_ensure_stream_consumed(s, tpktlength);
|
||
}
|
||
|
||
/**
|
||
* Write Info Packet (TS_INFO_PACKET).\n
|
||
* @msdn{cc240475}
|
||
* @param s stream
|
||
* @param settings settings
|
||
*/
|
||
|
||
static BOOL rdp_write_info_packet(rdpRdp* rdp, wStream* s)
|
||
{
|
||
BOOL ret = FALSE;
|
||
UINT32 flags;
|
||
WCHAR* domainW = NULL;
|
||
UINT16 cbDomain = 0;
|
||
WCHAR* userNameW = NULL;
|
||
UINT16 cbUserName = 0;
|
||
WCHAR* passwordW = NULL;
|
||
UINT16 cbPassword = 0;
|
||
WCHAR* alternateShellW = NULL;
|
||
UINT16 cbAlternateShell = 0;
|
||
WCHAR* workingDirW = NULL;
|
||
UINT16 cbWorkingDir = 0;
|
||
BOOL usedPasswordCookie = FALSE;
|
||
rdpSettings* settings;
|
||
|
||
if (!rdp || !s || !rdp->settings)
|
||
return FALSE;
|
||
|
||
settings = rdp->settings;
|
||
|
||
flags = INFO_MOUSE | INFO_UNICODE | INFO_LOGONERRORS | INFO_MAXIMIZESHELL |
|
||
INFO_ENABLEWINDOWSKEY | INFO_DISABLECTRLALTDEL | INFO_MOUSE_HAS_WHEEL |
|
||
INFO_FORCE_ENCRYPTED_CS_PDU;
|
||
|
||
if (settings->SmartcardLogon)
|
||
{
|
||
flags |= INFO_AUTOLOGON;
|
||
flags |= INFO_PASSWORD_IS_SC_PIN;
|
||
}
|
||
|
||
if (settings->AudioCapture)
|
||
flags |= INFO_AUDIOCAPTURE;
|
||
|
||
if (!settings->AudioPlayback)
|
||
flags |= INFO_NOAUDIOPLAYBACK;
|
||
|
||
if (settings->VideoDisable)
|
||
flags |= INFO_VIDEO_DISABLE;
|
||
|
||
if (settings->AutoLogonEnabled)
|
||
flags |= INFO_AUTOLOGON;
|
||
|
||
if (settings->RemoteApplicationMode)
|
||
{
|
||
if (settings->HiDefRemoteApp)
|
||
flags |= INFO_HIDEF_RAIL_SUPPORTED;
|
||
|
||
flags |= INFO_RAIL;
|
||
}
|
||
|
||
if (settings->RemoteConsoleAudio)
|
||
flags |= INFO_REMOTECONSOLEAUDIO;
|
||
|
||
if (settings->CompressionEnabled)
|
||
{
|
||
flags |= INFO_COMPRESSION;
|
||
flags |= ((settings->CompressionLevel << 9) & 0x00001E00);
|
||
}
|
||
|
||
if (settings->LogonNotify)
|
||
flags |= INFO_LOGONNOTIFY;
|
||
|
||
if (settings->PasswordIsSmartcardPin)
|
||
flags |= INFO_PASSWORD_IS_SC_PIN;
|
||
|
||
{
|
||
char* flags_description = rdp_info_package_flags_description(flags);
|
||
|
||
if (flags_description)
|
||
{
|
||
WLog_DBG(TAG, "Client Info Packet Flags = %s", flags_description);
|
||
free(flags_description);
|
||
}
|
||
}
|
||
|
||
if (settings->Domain)
|
||
{
|
||
const int rc = ConvertToUnicode(CP_UTF8, 0, settings->Domain, -1, &domainW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbDomain = (UINT16)rc * 2;
|
||
}
|
||
else
|
||
{
|
||
domainW = NULL;
|
||
cbDomain = 0;
|
||
}
|
||
|
||
/* excludes (!) the length of the mandatory null terminator */
|
||
cbDomain = cbDomain >= 2 ? cbDomain - 2 : cbDomain;
|
||
|
||
/* user name provided by the expert for connecting to the novice computer */
|
||
{
|
||
const int rc = ConvertToUnicode(CP_UTF8, 0, settings->Username, -1, &userNameW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbUserName = (UINT16)rc * 2;
|
||
}
|
||
/* excludes (!) the length of the mandatory null terminator */
|
||
cbUserName = cbUserName >= 2 ? cbUserName - 2 : cbUserName;
|
||
|
||
if (!settings->RemoteAssistanceMode)
|
||
{
|
||
/* Ignore redirection password if we´re using smartcard and have the pin as password */
|
||
if (((flags & INFO_PASSWORD_IS_SC_PIN) == 0) && settings->RedirectionPassword &&
|
||
(settings->RedirectionPasswordLength > 0))
|
||
{
|
||
union
|
||
{
|
||
BYTE* bp;
|
||
WCHAR* wp;
|
||
} ptrconv;
|
||
|
||
if (settings->RedirectionPasswordLength > UINT16_MAX)
|
||
goto fail;
|
||
usedPasswordCookie = TRUE;
|
||
|
||
ptrconv.bp = settings->RedirectionPassword;
|
||
passwordW = ptrconv.wp;
|
||
cbPassword = (UINT16)settings->RedirectionPasswordLength;
|
||
}
|
||
else
|
||
{
|
||
const int rc = ConvertToUnicode(CP_UTF8, 0, settings->Password, -1, &passwordW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbPassword = (UINT16)rc * 2;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
/* This field MUST be filled with "*" */
|
||
const int rc = ConvertToUnicode(CP_UTF8, 0, "*", -1, &passwordW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbPassword = (UINT16)rc * 2;
|
||
}
|
||
|
||
/* excludes (!) the length of the mandatory null terminator */
|
||
cbPassword = cbPassword >= 2 ? cbPassword - 2 : cbPassword;
|
||
|
||
if (!settings->RemoteAssistanceMode)
|
||
{
|
||
const int rc =
|
||
ConvertToUnicode(CP_UTF8, 0, settings->AlternateShell, -1, &alternateShellW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbAlternateShell = (UINT16)rc * 2;
|
||
}
|
||
else
|
||
{
|
||
int rc;
|
||
if (settings->RemoteAssistancePassStub)
|
||
{
|
||
/* This field MUST be filled with "*" */
|
||
rc = ConvertToUnicode(CP_UTF8, 0, "*", -1, &alternateShellW, 0);
|
||
}
|
||
else
|
||
{
|
||
/* This field must contain the remote assistance password */
|
||
rc = ConvertToUnicode(CP_UTF8, 0, settings->RemoteAssistancePassword, -1,
|
||
&alternateShellW, 0);
|
||
}
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbAlternateShell = (UINT16)rc * 2;
|
||
}
|
||
|
||
/* excludes (!) the length of the mandatory null terminator */
|
||
cbAlternateShell = cbAlternateShell >= 2 ? cbAlternateShell - 2 : cbAlternateShell;
|
||
|
||
if (!settings->RemoteAssistanceMode)
|
||
{
|
||
const int rc =
|
||
ConvertToUnicode(CP_UTF8, 0, settings->ShellWorkingDirectory, -1, &workingDirW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbWorkingDir = (UINT16)rc * 2;
|
||
}
|
||
else
|
||
{
|
||
/* Remote Assistance Session Id */
|
||
const int rc =
|
||
ConvertToUnicode(CP_UTF8, 0, settings->RemoteAssistanceSessionId, -1, &workingDirW, 0);
|
||
if ((rc < 0) || (rc > (UINT16_MAX / 2)))
|
||
goto fail;
|
||
cbWorkingDir = (UINT16)rc * 2;
|
||
}
|
||
|
||
/* excludes (!) the length of the mandatory null terminator */
|
||
cbWorkingDir = cbWorkingDir >= 2 ? cbWorkingDir - 2 : cbWorkingDir;
|
||
Stream_Write_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes) */
|
||
Stream_Write_UINT32(s, flags); /* flags (4 bytes) */
|
||
Stream_Write_UINT16(s, cbDomain); /* cbDomain (2 bytes) */
|
||
Stream_Write_UINT16(s, cbUserName); /* cbUserName (2 bytes) */
|
||
Stream_Write_UINT16(s, cbPassword); /* cbPassword (2 bytes) */
|
||
Stream_Write_UINT16(s, cbAlternateShell); /* cbAlternateShell (2 bytes) */
|
||
Stream_Write_UINT16(s, cbWorkingDir); /* cbWorkingDir (2 bytes) */
|
||
|
||
Stream_Write(s, domainW, cbDomain);
|
||
|
||
/* the mandatory null terminator */
|
||
Stream_Write_UINT16(s, 0);
|
||
|
||
Stream_Write(s, userNameW, cbUserName);
|
||
|
||
/* the mandatory null terminator */
|
||
Stream_Write_UINT16(s, 0);
|
||
|
||
Stream_Write(s, passwordW, cbPassword);
|
||
|
||
/* the mandatory null terminator */
|
||
Stream_Write_UINT16(s, 0);
|
||
|
||
Stream_Write(s, alternateShellW, cbAlternateShell);
|
||
|
||
/* the mandatory null terminator */
|
||
Stream_Write_UINT16(s, 0);
|
||
|
||
Stream_Write(s, workingDirW, cbWorkingDir);
|
||
|
||
/* the mandatory null terminator */
|
||
Stream_Write_UINT16(s, 0);
|
||
ret = TRUE;
|
||
fail:
|
||
free(domainW);
|
||
free(userNameW);
|
||
free(alternateShellW);
|
||
free(workingDirW);
|
||
|
||
if (!usedPasswordCookie)
|
||
free(passwordW);
|
||
|
||
if (!ret)
|
||
return FALSE;
|
||
|
||
if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
|
||
ret = rdp_write_extended_info_packet(rdp, s); /* extraInfo */
|
||
|
||
return ret;
|
||
}
|
||
|
||
/**
|
||
* Read Client Info PDU (CLIENT_INFO_PDU).\n
|
||
* @msdn{cc240474}
|
||
* @param rdp RDP module
|
||
* @param s stream
|
||
*/
|
||
|
||
BOOL rdp_recv_client_info(rdpRdp* rdp, wStream* s)
|
||
{
|
||
UINT16 length;
|
||
UINT16 channelId;
|
||
UINT16 securityFlags = 0;
|
||
|
||
if (!rdp_read_header(rdp, s, &length, &channelId))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_security_header(s, &securityFlags, &length))
|
||
return FALSE;
|
||
|
||
if ((securityFlags & SEC_INFO_PKT) == 0)
|
||
return FALSE;
|
||
|
||
if (rdp->settings->UseRdpSecurityLayer)
|
||
{
|
||
if (securityFlags & SEC_REDIRECTION_PKT)
|
||
{
|
||
WLog_ERR(TAG, "Error: SEC_REDIRECTION_PKT unsupported");
|
||
return FALSE;
|
||
}
|
||
|
||
if (securityFlags & SEC_ENCRYPT)
|
||
{
|
||
if (!rdp_decrypt(rdp, s, &length, securityFlags))
|
||
{
|
||
WLog_ERR(TAG, "rdp_decrypt failed");
|
||
return FALSE;
|
||
}
|
||
}
|
||
}
|
||
|
||
return rdp_read_info_packet(rdp, s, length);
|
||
}
|
||
|
||
/**
|
||
* Send Client Info PDU (CLIENT_INFO_PDU).\n
|
||
* @msdn{cc240474}
|
||
* @param rdp RDP module
|
||
*/
|
||
|
||
BOOL rdp_send_client_info(rdpRdp* rdp)
|
||
{
|
||
wStream* s;
|
||
rdp->sec_flags |= SEC_INFO_PKT;
|
||
s = rdp_send_stream_init(rdp);
|
||
|
||
if (!s)
|
||
{
|
||
WLog_ERR(TAG, "Stream_New failed!");
|
||
return FALSE;
|
||
}
|
||
|
||
rdp_write_info_packet(rdp, s);
|
||
return rdp_send(rdp, s, MCS_GLOBAL_CHANNEL_ID);
|
||
}
|
||
|
||
static BOOL rdp_recv_logon_info_v1(rdpRdp* rdp, wStream* s, logon_info* info)
|
||
{
|
||
UINT32 cbDomain;
|
||
UINT32 cbUserName;
|
||
union
|
||
{
|
||
BYTE* bp;
|
||
WCHAR* wp;
|
||
} ptrconv;
|
||
|
||
WINPR_UNUSED(rdp);
|
||
ZeroMemory(info, sizeof(*info));
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */
|
||
|
||
/* cbDomain is the size of the Unicode character data (including the mandatory
|
||
* null terminator) in bytes present in the fixed-length (52 bytes) Domain field
|
||
*/
|
||
if (cbDomain)
|
||
{
|
||
if ((cbDomain % 2) || cbDomain > 52)
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid cbDomain value: %" PRIu32 "", cbDomain);
|
||
goto fail;
|
||
}
|
||
|
||
ptrconv.bp = Stream_Pointer(s);
|
||
|
||
if (ptrconv.wp[cbDomain / 2 - 1])
|
||
{
|
||
WLog_ERR(TAG, "protocol error: Domain must be null terminated");
|
||
goto fail;
|
||
}
|
||
|
||
if (ConvertFromUnicode(CP_UTF8, 0, ptrconv.wp, -1, &info->domain, 0, NULL, FALSE) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert the Domain string");
|
||
goto fail;
|
||
}
|
||
}
|
||
|
||
Stream_Seek(s, 52); /* domain (52 bytes) */
|
||
Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */
|
||
|
||
/* cbUserName is the size of the Unicode character data (including the mandatory
|
||
* null terminator) in bytes present in the fixed-length (512 bytes) UserName field.
|
||
*/
|
||
if (cbUserName)
|
||
{
|
||
if ((cbUserName % 2) || cbUserName > 512)
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid cbUserName value: %" PRIu32 "", cbUserName);
|
||
goto fail;
|
||
}
|
||
|
||
ptrconv.bp = Stream_Pointer(s);
|
||
|
||
if (ptrconv.wp[cbUserName / 2 - 1])
|
||
{
|
||
WLog_ERR(TAG, "protocol error: UserName must be null terminated");
|
||
goto fail;
|
||
}
|
||
|
||
if (ConvertFromUnicode(CP_UTF8, 0, ptrconv.wp, -1, &info->username, 0, NULL, FALSE) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert the UserName string");
|
||
goto fail;
|
||
}
|
||
}
|
||
|
||
Stream_Seek(s, 512); /* userName (512 bytes) */
|
||
Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */
|
||
WLog_DBG(TAG, "LogonInfoV1: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
|
||
info->sessionId, info->username, info->domain);
|
||
return TRUE;
|
||
fail:
|
||
free(info->username);
|
||
info->username = NULL;
|
||
free(info->domain);
|
||
info->domain = NULL;
|
||
return FALSE;
|
||
}
|
||
|
||
static BOOL rdp_recv_logon_info_v2(rdpRdp* rdp, wStream* s, logon_info* info)
|
||
{
|
||
UINT16 Version;
|
||
UINT32 Size;
|
||
UINT32 cbDomain;
|
||
UINT32 cbUserName;
|
||
|
||
WINPR_ASSERT(rdp);
|
||
WINPR_ASSERT(s);
|
||
WINPR_ASSERT(info);
|
||
|
||
WINPR_UNUSED(rdp);
|
||
ZeroMemory(info, sizeof(*info));
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, logonInfoV2TotalSize))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT16(s, Version); /* Version (2 bytes) */
|
||
if (Version != SAVE_SESSION_PDU_VERSION_ONE)
|
||
{
|
||
WLog_WARN(TAG, "LogonInfoV2::Version expected %" PRIu16 " bytes, got %" PRIu16,
|
||
SAVE_SESSION_PDU_VERSION_ONE, Version);
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Read_UINT32(s, Size); /* Size (4 bytes) */
|
||
|
||
/* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
|
||
* should be logonInfoV2TotalSize
|
||
* but even MS server 2019 sends logonInfoV2Size
|
||
*/
|
||
if (Size != logonInfoV2TotalSize)
|
||
{
|
||
if (Size != logonInfoV2Size)
|
||
{
|
||
WLog_WARN(TAG, "LogonInfoV2::Size expected %" PRIu32 " bytes, got %" PRIu32,
|
||
logonInfoV2TotalSize, Size);
|
||
return FALSE;
|
||
}
|
||
else
|
||
{
|
||
WLog_WARN(TAG,
|
||
"[SERVER-BUG] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2) "
|
||
"Size expected %" PRIu32 " bytes, got %" PRIu32 ", ignoring",
|
||
logonInfoV2TotalSize, Size);
|
||
}
|
||
}
|
||
|
||
Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */
|
||
Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */
|
||
Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */
|
||
Stream_Seek(s, logonInfoV2ReservedSize); /* pad (558 bytes) */
|
||
|
||
/* cbDomain is the size in bytes of the Unicode character data in the Domain field.
|
||
* The size of the mandatory null terminator is include in this value.
|
||
* Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
|
||
* that the maximum value is 52 bytes, according to the fixed size of the
|
||
* Domain field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
|
||
*/
|
||
if (cbDomain)
|
||
{
|
||
WCHAR domain[26] = { 0 };
|
||
if ((cbDomain % 2) || (cbDomain > 52))
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid cbDomain value: %" PRIu32 "", cbDomain);
|
||
goto fail;
|
||
}
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)cbDomain))
|
||
goto fail;
|
||
|
||
memcpy(domain, Stream_Pointer(s), cbDomain);
|
||
Stream_Seek(s, cbDomain); /* domain */
|
||
|
||
if (domain[cbDomain / sizeof(WCHAR) - 1])
|
||
{
|
||
WLog_ERR(TAG, "protocol error: Domain field must be null terminated");
|
||
goto fail;
|
||
}
|
||
|
||
if (ConvertFromUnicode(CP_UTF8, 0, domain, -1, &info->domain, 0, NULL, FALSE) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert the Domain string");
|
||
goto fail;
|
||
}
|
||
}
|
||
|
||
/* cbUserName is the size in bytes of the Unicode character data in the UserName field.
|
||
* The size of the mandatory null terminator is include in this value.
|
||
* Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
|
||
* that the maximum value is 512 bytes, according to the fixed size of the
|
||
* Username field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
|
||
*/
|
||
if (cbUserName)
|
||
{
|
||
WCHAR user[256] = { 0 };
|
||
|
||
if ((cbUserName % 2) || cbUserName < 2 || cbUserName > 512)
|
||
{
|
||
WLog_ERR(TAG, "protocol error: invalid cbUserName value: %" PRIu32 "", cbUserName);
|
||
goto fail;
|
||
}
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)cbUserName))
|
||
goto fail;
|
||
|
||
memcpy(user, Stream_Pointer(s), cbUserName);
|
||
Stream_Seek(s, cbUserName); /* userName */
|
||
|
||
if (user[cbUserName / sizeof(WCHAR) - 1])
|
||
{
|
||
WLog_ERR(TAG, "protocol error: UserName field must be null terminated");
|
||
goto fail;
|
||
}
|
||
|
||
if (ConvertFromUnicode(CP_UTF8, 0, user, -1, &info->username, 0, NULL, FALSE) < 1)
|
||
{
|
||
WLog_ERR(TAG, "failed to convert the Domain string");
|
||
goto fail;
|
||
}
|
||
}
|
||
|
||
WLog_DBG(TAG, "LogonInfoV2: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
|
||
info->sessionId, info->username, info->domain);
|
||
return TRUE;
|
||
fail:
|
||
free(info->username);
|
||
info->username = NULL;
|
||
free(info->domain);
|
||
info->domain = NULL;
|
||
return FALSE;
|
||
}
|
||
|
||
static BOOL rdp_recv_logon_plain_notify(rdpRdp* rdp, wStream* s)
|
||
{
|
||
WINPR_UNUSED(rdp);
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
|
||
return FALSE;
|
||
|
||
Stream_Seek(s, 576); /* pad (576 bytes) */
|
||
WLog_DBG(TAG, "LogonPlainNotify");
|
||
return TRUE;
|
||
}
|
||
|
||
static BOOL rdp_recv_logon_error_info(rdpRdp* rdp, wStream* s, logon_info_ex* info)
|
||
{
|
||
freerdp* instance;
|
||
UINT32 errorNotificationType;
|
||
UINT32 errorNotificationData;
|
||
|
||
WINPR_ASSERT(rdp);
|
||
WINPR_ASSERT(rdp->context);
|
||
WINPR_ASSERT(s);
|
||
WINPR_ASSERT(info);
|
||
|
||
instance = rdp->context->instance;
|
||
WINPR_ASSERT(instance);
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, errorNotificationType); /* errorNotificationType (4 bytes) */
|
||
Stream_Read_UINT32(s, errorNotificationData); /* errorNotificationData (4 bytes) */
|
||
WLog_DBG(TAG, "LogonErrorInfo: Data: 0x%08" PRIX32 " Type: 0x%08" PRIX32 "",
|
||
errorNotificationData, errorNotificationType);
|
||
IFCALL(instance->LogonErrorInfo, instance, errorNotificationData, errorNotificationType);
|
||
info->ErrorNotificationType = errorNotificationType;
|
||
info->ErrorNotificationData = errorNotificationData;
|
||
return TRUE;
|
||
}
|
||
|
||
static BOOL rdp_recv_logon_info_extended(rdpRdp* rdp, wStream* s, logon_info_ex* info)
|
||
{
|
||
UINT32 cbFieldData;
|
||
UINT32 fieldsPresent;
|
||
UINT16 Length;
|
||
|
||
WINPR_ASSERT(rdp);
|
||
WINPR_ASSERT(s);
|
||
WINPR_ASSERT(info);
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
|
||
{
|
||
WLog_WARN(TAG, "received short logon info extended, need 6 bytes, got %" PRIuz,
|
||
Stream_GetRemainingLength(s));
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Read_UINT16(s, Length); /* Length (2 bytes) */
|
||
Stream_Read_UINT32(s, fieldsPresent); /* fieldsPresent (4 bytes) */
|
||
|
||
if ((Length < 6) || (!Stream_CheckAndLogRequiredLength(TAG, s, (Length - 6U))))
|
||
{
|
||
WLog_WARN(TAG,
|
||
"received short logon info extended, need %" PRIu16 " - 6 bytes, got %" PRIuz,
|
||
Length, Stream_GetRemainingLength(s));
|
||
return FALSE;
|
||
}
|
||
|
||
WLog_DBG(TAG, "LogonInfoExtended: fieldsPresent: 0x%08" PRIX32 "", fieldsPresent);
|
||
|
||
/* logonFields */
|
||
|
||
if (fieldsPresent & LOGON_EX_AUTORECONNECTCOOKIE)
|
||
{
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
info->haveCookie = TRUE;
|
||
Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
|
||
return FALSE;
|
||
|
||
if (!rdp_read_server_auto_reconnect_cookie(rdp, s, info))
|
||
return FALSE;
|
||
}
|
||
|
||
if (fieldsPresent & LOGON_EX_LOGONERRORS)
|
||
{
|
||
info->haveErrorInfo = TRUE;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
|
||
return FALSE;
|
||
|
||
if (!rdp_recv_logon_error_info(rdp, s, info))
|
||
return FALSE;
|
||
}
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 570))
|
||
return FALSE;
|
||
|
||
Stream_Seek(s, 570); /* pad (570 bytes) */
|
||
return TRUE;
|
||
}
|
||
|
||
BOOL rdp_recv_save_session_info(rdpRdp* rdp, wStream* s)
|
||
{
|
||
UINT32 infoType;
|
||
BOOL status;
|
||
logon_info logonInfo;
|
||
logon_info_ex logonInfoEx;
|
||
rdpContext* context = rdp->context;
|
||
rdpUpdate* update = rdp->context->update;
|
||
|
||
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
||
return FALSE;
|
||
|
||
Stream_Read_UINT32(s, infoType); /* infoType (4 bytes) */
|
||
|
||
switch (infoType)
|
||
{
|
||
case INFO_TYPE_LOGON:
|
||
ZeroMemory(&logonInfo, sizeof(logonInfo));
|
||
status = rdp_recv_logon_info_v1(rdp, s, &logonInfo);
|
||
|
||
if (status && update->SaveSessionInfo)
|
||
status = update->SaveSessionInfo(context, infoType, &logonInfo);
|
||
|
||
free(logonInfo.domain);
|
||
free(logonInfo.username);
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_LONG:
|
||
ZeroMemory(&logonInfo, sizeof(logonInfo));
|
||
status = rdp_recv_logon_info_v2(rdp, s, &logonInfo);
|
||
|
||
if (status && update->SaveSessionInfo)
|
||
status = update->SaveSessionInfo(context, infoType, &logonInfo);
|
||
|
||
free(logonInfo.domain);
|
||
free(logonInfo.username);
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_PLAIN_NOTIFY:
|
||
status = rdp_recv_logon_plain_notify(rdp, s);
|
||
|
||
if (status && update->SaveSessionInfo)
|
||
status = update->SaveSessionInfo(context, infoType, NULL);
|
||
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_EXTENDED_INF:
|
||
ZeroMemory(&logonInfoEx, sizeof(logonInfoEx));
|
||
status = rdp_recv_logon_info_extended(rdp, s, &logonInfoEx);
|
||
|
||
if (status && update->SaveSessionInfo)
|
||
status = update->SaveSessionInfo(context, infoType, &logonInfoEx);
|
||
|
||
break;
|
||
|
||
default:
|
||
WLog_ERR(TAG, "Unhandled saveSessionInfo type 0x%" PRIx32 "", infoType);
|
||
status = TRUE;
|
||
break;
|
||
}
|
||
|
||
if (!status)
|
||
{
|
||
WLog_DBG(TAG, "SaveSessionInfo error: infoType: %s (%" PRIu32 ")",
|
||
infoType < 4 ? INFO_TYPE_LOGON_STRINGS[infoType % 4] : "Unknown", infoType);
|
||
}
|
||
|
||
return status;
|
||
}
|
||
|
||
static BOOL rdp_write_logon_info_v1(wStream* s, logon_info* info)
|
||
{
|
||
size_t sz = 4 + 52 + 4 + 512 + 4;
|
||
int ilen;
|
||
UINT32 len;
|
||
WCHAR* wString = NULL;
|
||
|
||
if (!Stream_EnsureRemainingCapacity(s, sz))
|
||
return FALSE;
|
||
|
||
/* domain */
|
||
ilen = ConvertToUnicode(CP_UTF8, 0, info->domain, -1, &wString, 0);
|
||
|
||
if (ilen < 0)
|
||
return FALSE;
|
||
|
||
len = (UINT32)ilen * 2;
|
||
|
||
if (len > 52)
|
||
{
|
||
free(wString);
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Write_UINT32(s, len);
|
||
Stream_Write(s, wString, len);
|
||
Stream_Seek(s, 52 - len);
|
||
free(wString);
|
||
/* username */
|
||
wString = NULL;
|
||
ilen = ConvertToUnicode(CP_UTF8, 0, info->username, -1, &wString, 0);
|
||
|
||
if (ilen < 0)
|
||
return FALSE;
|
||
|
||
len = (UINT32)ilen * 2;
|
||
|
||
if (len > 512)
|
||
{
|
||
free(wString);
|
||
return FALSE;
|
||
}
|
||
|
||
Stream_Write_UINT32(s, len);
|
||
Stream_Write(s, wString, len);
|
||
Stream_Seek(s, 512 - len);
|
||
free(wString);
|
||
/* sessionId */
|
||
Stream_Write_UINT32(s, info->sessionId);
|
||
return TRUE;
|
||
}
|
||
|
||
static BOOL rdp_write_logon_info_v2(wStream* s, logon_info* info)
|
||
{
|
||
size_t domainLen, usernameLen;
|
||
int len;
|
||
WCHAR* wString = NULL;
|
||
|
||
if (!Stream_EnsureRemainingCapacity(s, logonInfoV2TotalSize))
|
||
return FALSE;
|
||
|
||
Stream_Write_UINT16(s, SAVE_SESSION_PDU_VERSION_ONE);
|
||
/* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
|
||
* should be logonInfoV2TotalSize
|
||
* but even MS server 2019 sends logonInfoV2Size
|
||
*/
|
||
Stream_Write_UINT32(s, logonInfoV2Size);
|
||
Stream_Write_UINT32(s, info->sessionId);
|
||
domainLen = strlen(info->domain);
|
||
if (domainLen > UINT32_MAX)
|
||
return FALSE;
|
||
Stream_Write_UINT32(s, (UINT32)(domainLen + 1) * 2);
|
||
usernameLen = strlen(info->username);
|
||
if (usernameLen > UINT32_MAX)
|
||
return FALSE;
|
||
Stream_Write_UINT32(s, (UINT32)(usernameLen + 1) * 2);
|
||
Stream_Seek(s, logonInfoV2ReservedSize);
|
||
len = ConvertToUnicode(CP_UTF8, 0, info->domain, -1, &wString, 0);
|
||
|
||
if (len < 0)
|
||
return FALSE;
|
||
|
||
Stream_Write(s, wString, (size_t)len * 2);
|
||
free(wString);
|
||
wString = NULL;
|
||
len = ConvertToUnicode(CP_UTF8, 0, info->username, -1, &wString, 0);
|
||
|
||
if (len < 0)
|
||
return FALSE;
|
||
|
||
Stream_Write(s, wString, (size_t)len * 2);
|
||
free(wString);
|
||
return TRUE;
|
||
}
|
||
|
||
static BOOL rdp_write_logon_info_plain(wStream* s)
|
||
{
|
||
if (!Stream_EnsureRemainingCapacity(s, 576))
|
||
return FALSE;
|
||
|
||
Stream_Seek(s, 576);
|
||
return TRUE;
|
||
}
|
||
|
||
static BOOL rdp_write_logon_info_ex(wStream* s, logon_info_ex* info)
|
||
{
|
||
UINT32 FieldsPresent = 0;
|
||
UINT16 Size = 2 + 4 + 570;
|
||
|
||
if (info->haveCookie)
|
||
{
|
||
FieldsPresent |= LOGON_EX_AUTORECONNECTCOOKIE;
|
||
Size += 28;
|
||
}
|
||
|
||
if (info->haveErrorInfo)
|
||
{
|
||
FieldsPresent |= LOGON_EX_LOGONERRORS;
|
||
Size += 8;
|
||
}
|
||
|
||
if (!Stream_EnsureRemainingCapacity(s, Size))
|
||
return FALSE;
|
||
|
||
Stream_Write_UINT16(s, Size);
|
||
Stream_Write_UINT32(s, FieldsPresent);
|
||
|
||
if (info->haveCookie)
|
||
{
|
||
Stream_Write_UINT32(s, 28); /* cbFieldData (4 bytes) */
|
||
Stream_Write_UINT32(s, 28); /* cbLen (4 bytes) */
|
||
Stream_Write_UINT32(s, AUTO_RECONNECT_VERSION_1); /* Version (4 bytes) */
|
||
Stream_Write_UINT32(s, info->LogonId); /* LogonId (4 bytes) */
|
||
Stream_Write(s, info->ArcRandomBits, 16); /* ArcRandomBits (16 bytes) */
|
||
}
|
||
|
||
if (info->haveErrorInfo)
|
||
{
|
||
Stream_Write_UINT32(s, 8); /* cbFieldData (4 bytes) */
|
||
Stream_Write_UINT32(s, info->ErrorNotificationType); /* ErrorNotificationType (4 bytes) */
|
||
Stream_Write_UINT32(s, info->ErrorNotificationData); /* ErrorNotificationData (4 bytes) */
|
||
}
|
||
|
||
Stream_Seek(s, 570);
|
||
return TRUE;
|
||
}
|
||
|
||
BOOL rdp_send_save_session_info(rdpContext* context, UINT32 type, void* data)
|
||
{
|
||
wStream* s;
|
||
BOOL status;
|
||
rdpRdp* rdp = context->rdp;
|
||
s = rdp_data_pdu_init(rdp);
|
||
|
||
if (!s)
|
||
return FALSE;
|
||
|
||
Stream_Write_UINT32(s, type);
|
||
|
||
switch (type)
|
||
{
|
||
case INFO_TYPE_LOGON:
|
||
status = rdp_write_logon_info_v1(s, (logon_info*)data);
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_LONG:
|
||
status = rdp_write_logon_info_v2(s, (logon_info*)data);
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_PLAIN_NOTIFY:
|
||
status = rdp_write_logon_info_plain(s);
|
||
break;
|
||
|
||
case INFO_TYPE_LOGON_EXTENDED_INF:
|
||
status = rdp_write_logon_info_ex(s, (logon_info_ex*)data);
|
||
break;
|
||
|
||
default:
|
||
WLog_ERR(TAG, "saveSessionInfo type 0x%" PRIx32 " not handled", type);
|
||
status = FALSE;
|
||
break;
|
||
}
|
||
|
||
if (status)
|
||
status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SAVE_SESSION_INFO, rdp->mcs->userId);
|
||
else
|
||
Stream_Release(s);
|
||
|
||
return status;
|
||
}
|
||
|
||
BOOL rdp_send_server_status_info(rdpContext* context, UINT32 status)
|
||
{
|
||
wStream* s;
|
||
rdpRdp* rdp = context->rdp;
|
||
s = rdp_data_pdu_init(rdp);
|
||
|
||
if (!s)
|
||
return FALSE;
|
||
|
||
Stream_Write_UINT32(s, status);
|
||
return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_STATUS_INFO, rdp->mcs->userId);
|
||
}
|