summaryrefslogtreecommitdiffstats
path: root/libfreerdp/core/info.c
diff options
context:
space:
mode:
Diffstat (limited to 'libfreerdp/core/info.c')
-rw-r--r--libfreerdp/core/info.c1558
1 files changed, 1558 insertions, 0 deletions
diff --git a/libfreerdp/core/info.c b/libfreerdp/core/info.c
new file mode 100644
index 0000000..0d8e90e
--- /dev/null
+++ b/libfreerdp/core/info.c
@@ -0,0 +1,1558 @@
+/**
+ * FreeRDP: A Remote Desktop Protocol Implementation
+ * RDP Client Info
+ *
+ * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
+ * Copyright 2015 Thincast Technologies GmbH
+ * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <freerdp/config.h>
+
+#include "settings.h"
+
+#include <winpr/crt.h>
+#include <winpr/assert.h>
+
+#include <freerdp/crypto/crypto.h>
+#include <freerdp/log.h>
+#include <freerdp/session.h>
+#include <stdio.h>
+
+#include "timezone.h"
+
+#include "info.h"
+
+#define TAG FREERDP_TAG("core.info")
+
+#define logonInfoV2Size (2 + 4 + 4 + 4 + 4)
+#define logonInfoV2ReservedSize 558
+#define logonInfoV2TotalSize (logonInfoV2Size + logonInfoV2ReservedSize)
+
+static const char* const INFO_TYPE_LOGON_STRINGS[4] = { "Logon Info V1", "Logon Info V2",
+ "Logon Plain Notify",
+ "Logon Extended Info" };
+
+/* This define limits the length of the strings in the label field. */
+#define MAX_LABEL_LENGTH 40
+struct info_flags_t
+{
+ UINT32 flag;
+ const char* label;
+};
+
+static const struct info_flags_t info_flags[] = {
+ { INFO_MOUSE, "INFO_MOUSE" },
+ { INFO_DISABLECTRLALTDEL, "INFO_DISABLECTRLALTDEL" },
+ { INFO_AUTOLOGON, "INFO_AUTOLOGON" },
+ { INFO_UNICODE, "INFO_UNICODE" },
+ { INFO_MAXIMIZESHELL, "INFO_MAXIMIZESHELL" },
+ { INFO_LOGONNOTIFY, "INFO_LOGONNOTIFY" },
+ { INFO_COMPRESSION, "INFO_COMPRESSION" },
+ { INFO_ENABLEWINDOWSKEY, "INFO_ENABLEWINDOWSKEY" },
+ { INFO_REMOTECONSOLEAUDIO, "INFO_REMOTECONSOLEAUDIO" },
+ { INFO_FORCE_ENCRYPTED_CS_PDU, "INFO_FORCE_ENCRYPTED_CS_PDU" },
+ { INFO_RAIL, "INFO_RAIL" },
+ { INFO_LOGONERRORS, "INFO_LOGONERRORS" },
+ { INFO_MOUSE_HAS_WHEEL, "INFO_MOUSE_HAS_WHEEL" },
+ { INFO_PASSWORD_IS_SC_PIN, "INFO_PASSWORD_IS_SC_PIN" },
+ { INFO_NOAUDIOPLAYBACK, "INFO_NOAUDIOPLAYBACK" },
+ { INFO_USING_SAVED_CREDS, "INFO_USING_SAVED_CREDS" },
+ { INFO_AUDIOCAPTURE, "INFO_AUDIOCAPTURE" },
+ { INFO_VIDEO_DISABLE, "INFO_VIDEO_DISABLE" },
+ { INFO_HIDEF_RAIL_SUPPORTED, "INFO_HIDEF_RAIL_SUPPORTED" },
+};
+
+static BOOL rdp_read_info_null_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id,
+ const char* what, UINT32 flags, wStream* s, size_t cbLen,
+ size_t max)
+{
+ const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE;
+
+ if (!freerdp_settings_set_string(settings, id, NULL))
+ return FALSE;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLen)))
+ return FALSE;
+
+ if (cbLen > 0)
+ {
+ if ((cbLen > max) || (unicode && ((cbLen % 2) != 0)))
+ {
+ WLog_ERR(TAG, "protocol error: %s has invalid value: %" PRIuz "", what, cbLen);
+ return FALSE;
+ }
+
+ if (unicode)
+ {
+ const WCHAR* domain = Stream_PointerAs(s, WCHAR);
+ if (!freerdp_settings_set_string_from_utf16N(settings, id, domain,
+ cbLen / sizeof(WCHAR)))
+ {
+ WLog_ERR(TAG, "protocol error: no data to read for %s [expected %" PRIuz "]", what,
+ cbLen);
+ return FALSE;
+ }
+ }
+ else
+ {
+ const char* domain = Stream_ConstPointer(s);
+ if (!freerdp_settings_set_string_len(settings, id, domain, cbLen))
+ return FALSE;
+ }
+ }
+ Stream_Seek(s, cbLen);
+
+ return TRUE;
+}
+
+static char* rdp_info_package_flags_description(UINT32 flags)
+{
+ char* result = NULL;
+ size_t maximum_size = 1 + MAX_LABEL_LENGTH * ARRAYSIZE(info_flags);
+
+ result = calloc(maximum_size, sizeof(char));
+
+ if (!result)
+ return 0;
+
+ for (size_t i = 0; i < ARRAYSIZE(info_flags); i++)
+ {
+ const struct info_flags_t* cur = &info_flags[i];
+ if (cur->flag & flags)
+ {
+ winpr_str_append(cur->label, result, maximum_size, "|");
+ }
+ }
+
+ return result;
+}
+
+static BOOL rdp_compute_client_auto_reconnect_cookie(rdpRdp* rdp)
+{
+ BYTE ClientRandom[CLIENT_RANDOM_LENGTH] = { 0 };
+ BYTE AutoReconnectRandom[32] = { 0 };
+ ARC_SC_PRIVATE_PACKET* serverCookie = NULL;
+ ARC_CS_PRIVATE_PACKET* clientCookie = NULL;
+
+ WINPR_ASSERT(rdp);
+ rdpSettings* settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ serverCookie = settings->ServerAutoReconnectCookie;
+ clientCookie = settings->ClientAutoReconnectCookie;
+ clientCookie->cbLen = 28;
+ clientCookie->version = serverCookie->version;
+ clientCookie->logonId = serverCookie->logonId;
+ ZeroMemory(clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier));
+ CopyMemory(AutoReconnectRandom, serverCookie->arcRandomBits,
+ sizeof(serverCookie->arcRandomBits));
+
+ if (settings->SelectedProtocol == PROTOCOL_RDP)
+ CopyMemory(ClientRandom, settings->ClientRandom, settings->ClientRandomLength);
+
+ /* SecurityVerifier = HMAC_MD5(AutoReconnectRandom, ClientRandom) */
+
+ if (!winpr_HMAC(WINPR_MD_MD5, AutoReconnectRandom, 16, ClientRandom, sizeof(ClientRandom),
+ clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier)))
+ return FALSE;
+
+ return TRUE;
+}
+
+/**
+ * Read Server Auto Reconnect Cookie (ARC_SC_PRIVATE_PACKET).
+ * msdn{cc240540}
+ */
+
+static BOOL rdp_read_server_auto_reconnect_cookie(rdpRdp* rdp, wStream* s, logon_info_ex* info)
+{
+ BYTE* p = NULL;
+ ARC_SC_PRIVATE_PACKET* autoReconnectCookie = NULL;
+ rdpSettings* settings = rdp->settings;
+ autoReconnectCookie = settings->ServerAutoReconnectCookie;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
+ return FALSE;
+
+ Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
+
+ if (autoReconnectCookie->cbLen != 28)
+ {
+ WLog_ERR(TAG, "ServerAutoReconnectCookie.cbLen != 28");
+ return FALSE;
+ }
+
+ Stream_Read_UINT32(s, autoReconnectCookie->version); /* Version (4 bytes) */
+ Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
+ Stream_Read(s, autoReconnectCookie->arcRandomBits, 16); /* ArcRandomBits (16 bytes) */
+ p = autoReconnectCookie->arcRandomBits;
+ WLog_DBG(TAG,
+ "ServerAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32
+ " SecurityVerifier: "
+ "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
+ "%02" PRIX8 ""
+ "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
+ "%02" PRIX8 "",
+ autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
+ p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
+ info->LogonId = autoReconnectCookie->logonId;
+ CopyMemory(info->ArcRandomBits, p, 16);
+
+ if ((settings->PrintReconnectCookie))
+ {
+ char* base64 = NULL;
+ base64 = crypto_base64_encode((BYTE*)autoReconnectCookie, sizeof(ARC_SC_PRIVATE_PACKET));
+ WLog_INFO(TAG, "Reconnect-cookie: %s", base64);
+ free(base64);
+ }
+
+ return TRUE;
+}
+
+/**
+ * Read Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).
+ * msdn{cc240541}
+ */
+
+static BOOL rdp_read_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
+{
+ ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL;
+ rdpSettings* settings = rdp->settings;
+ autoReconnectCookie = settings->ClientAutoReconnectCookie;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
+ return FALSE;
+
+ Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
+ Stream_Read_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */
+ Stream_Read_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
+ Stream_Read(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier */
+ return TRUE;
+}
+
+/**
+ * Write Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).
+ * msdn{cc240541}
+ */
+
+static BOOL rdp_write_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
+{
+ BYTE* p = NULL;
+ ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(rdp);
+
+ settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ autoReconnectCookie = settings->ClientAutoReconnectCookie;
+ WINPR_ASSERT(autoReconnectCookie);
+
+ p = autoReconnectCookie->securityVerifier;
+ WINPR_ASSERT(p);
+
+ WLog_DBG(TAG,
+ "ClientAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32 " ArcRandomBits: "
+ "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
+ "%02" PRIX8 ""
+ "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
+ "%02" PRIX8 "",
+ autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
+ p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
+ if (!Stream_EnsureRemainingCapacity(s, 12ull + 16ull))
+ return FALSE;
+ Stream_Write_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
+ Stream_Write_UINT32(s, autoReconnectCookie->version); /* version (4 bytes) */
+ Stream_Write_UINT32(s, autoReconnectCookie->logonId); /* LogonId (4 bytes) */
+ Stream_Write(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier (16 bytes) */
+ return TRUE;
+}
+
+/*
+ * Get the cbClientAddress size limit
+ * see [MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet (TS_EXTENDED_INFO_PACKET)
+ */
+
+static size_t rdp_get_client_address_max_size(const rdpRdp* rdp)
+{
+ UINT32 version = 0;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(rdp);
+
+ settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ version = freerdp_settings_get_uint32(settings, FreeRDP_RdpVersion);
+ if (version < RDP_VERSION_10_0)
+ return 64;
+ return 80;
+}
+
+/**
+ * Read Extended Info Packet (TS_EXTENDED_INFO_PACKET).
+ * msdn{cc240476}
+ */
+
+static BOOL rdp_read_extended_info_packet(rdpRdp* rdp, wStream* s)
+{
+ UINT16 clientAddressFamily = 0;
+ UINT16 cbClientAddress = 0;
+ UINT16 cbClientDir = 0;
+ UINT16 cbAutoReconnectLen = 0;
+
+ WINPR_ASSERT(rdp);
+
+ rdpSettings* settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ Stream_Read_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
+ Stream_Read_UINT16(s, cbClientAddress); /* cbClientAddress (2 bytes) */
+
+ settings->IPv6Enabled = (clientAddressFamily == ADDRESS_FAMILY_INET6 ? TRUE : FALSE);
+
+ if (!rdp_read_info_null_string(settings, FreeRDP_ClientAddress, "cbClientAddress", INFO_UNICODE,
+ s, cbClientAddress, rdp_get_client_address_max_size(rdp)))
+ return FALSE;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
+ return FALSE;
+
+ Stream_Read_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */
+
+ /* cbClientDir is the size in bytes of the character data in the clientDir field.
+ * This size includes the length of the mandatory null terminator.
+ * The maximum allowed value is 512 bytes.
+ * Note: Although according to [MS-RDPBCGR 2.2.1.11.1.1.1] the null terminator
+ * is mandatory the Microsoft Android client (starting with version 8.1.31.44)
+ * sets cbClientDir to 0.
+ */
+
+ if (!rdp_read_info_null_string(settings, FreeRDP_ClientDir, "cbClientDir", INFO_UNICODE, s,
+ cbClientDir, 512))
+ return FALSE;
+
+ /**
+ * down below all fields are optional but if one field is not present,
+ * then all of the subsequent fields also MUST NOT be present.
+ */
+
+ /* optional: clientTimeZone (172 bytes) */
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!rdp_read_client_time_zone(s, settings))
+ return FALSE;
+
+ /* optional: clientSessionId (4 bytes), should be set to 0 */
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ Stream_Read_UINT32(s, settings->ClientSessionId);
+
+ /* optional: performanceFlags (4 bytes) */
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ Stream_Read_UINT32(s, settings->PerformanceFlags);
+ freerdp_performance_flags_split(settings);
+
+ /* optional: cbAutoReconnectLen (2 bytes) */
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
+ return FALSE;
+
+ Stream_Read_UINT16(s, cbAutoReconnectLen);
+
+ /* optional: autoReconnectCookie (28 bytes) */
+ /* must be present if cbAutoReconnectLen is > 0 */
+ if (cbAutoReconnectLen > 0)
+ {
+ if (!rdp_read_client_auto_reconnect_cookie(rdp, s))
+ return FALSE;
+ }
+
+ /* skip reserved1 and reserved2 fields */
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_SafeSeek(s, 2))
+ return FALSE;
+
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_SafeSeek(s, 2))
+ return FALSE;
+
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
+ return FALSE;
+ {
+ UINT16 cbDynamicDSTTimeZoneKeyName = 0;
+
+ Stream_Read_UINT16(s, cbDynamicDSTTimeZoneKeyName);
+
+ if (!rdp_read_info_null_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName,
+ "cbDynamicDSTTimeZoneKeyName", INFO_UNICODE, s,
+ cbDynamicDSTTimeZoneKeyName, 254))
+ return FALSE;
+
+ if (Stream_GetRemainingLength(s) == 0)
+ goto end;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
+ return FALSE;
+ UINT16 DynamicDaylightTimeDisabled = 0;
+ Stream_Read_UINT16(s, DynamicDaylightTimeDisabled);
+ if (DynamicDaylightTimeDisabled > 1)
+ {
+ WLog_WARN(TAG,
+ "[MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet "
+ "(TS_EXTENDED_INFO_PACKET)::dynamicDaylightTimeDisabled value %" PRIu16
+ " not allowed in [0,1]",
+ settings->DynamicDaylightTimeDisabled);
+ return FALSE;
+ }
+ if (!freerdp_settings_set_bool(settings, FreeRDP_DynamicDaylightTimeDisabled,
+ DynamicDaylightTimeDisabled != 0))
+ return FALSE;
+ }
+
+end:
+ return TRUE;
+}
+
+/**
+ * Write Extended Info Packet (TS_EXTENDED_INFO_PACKET).
+ * msdn{cc240476}
+ */
+
+static BOOL rdp_write_extended_info_packet(rdpRdp* rdp, wStream* s)
+{
+ BOOL ret = FALSE;
+ size_t cbClientAddress = 0;
+ const size_t cbClientAddressMax = rdp_get_client_address_max_size(rdp);
+ WCHAR* clientDir = NULL;
+ size_t cbClientDir = 0;
+ const size_t cbClientDirMax = 512;
+ UINT16 cbAutoReconnectCookie = 0;
+
+ WINPR_ASSERT(rdp);
+
+ rdpSettings* settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ const UINT16 clientAddressFamily =
+ settings->IPv6Enabled ? ADDRESS_FAMILY_INET6 : ADDRESS_FAMILY_INET;
+ WCHAR* clientAddress = ConvertUtf8ToWCharAlloc(settings->ClientAddress, &cbClientAddress);
+
+ if (cbClientAddress > (UINT16_MAX / sizeof(WCHAR)))
+ {
+ WLog_ERR(TAG, "cbClientAddress > UINT16_MAX");
+ goto fail;
+ }
+
+ if (cbClientAddress > 0)
+ {
+ cbClientAddress = (UINT16)(cbClientAddress + 1) * sizeof(WCHAR);
+ if (cbClientAddress > cbClientAddressMax)
+ {
+ WLog_WARN(TAG,
+ "the client address %s [%" PRIuz "] exceeds the limit of %" PRIuz
+ ", truncating.",
+ settings->ClientAddress, cbClientAddress, cbClientAddressMax);
+
+ clientAddress[(cbClientAddressMax / sizeof(WCHAR)) - 1] = '\0';
+ cbClientAddress = cbClientAddressMax;
+ }
+ }
+
+ clientDir = ConvertUtf8ToWCharAlloc(settings->ClientDir, &cbClientDir);
+ if (cbClientDir > (UINT16_MAX / sizeof(WCHAR)))
+ {
+ WLog_ERR(TAG, "cbClientDir > UINT16_MAX");
+ goto fail;
+ }
+
+ if (cbClientDir > 0)
+ {
+ cbClientDir = (UINT16)(cbClientDir + 1) * sizeof(WCHAR);
+ if (cbClientDir > cbClientDirMax)
+ {
+ WLog_WARN(TAG,
+ "the client dir %s [%" PRIuz "] exceeds the limit of %" PRIuz ", truncating.",
+ settings->ClientDir, cbClientDir, cbClientDirMax);
+
+ clientDir[(cbClientDirMax / sizeof(WCHAR)) - 1] = '\0';
+ cbClientDir = cbClientDirMax;
+ }
+ }
+
+ if (settings->ServerAutoReconnectCookie->cbLen > UINT16_MAX)
+ {
+ WLog_ERR(TAG, "ServerAutoreconnectCookie::cbLen > UINT16_MAX");
+ goto fail;
+ }
+
+ cbAutoReconnectCookie = (UINT16)settings->ServerAutoReconnectCookie->cbLen;
+
+ if (!Stream_EnsureRemainingCapacity(s, 4ull + cbClientAddress + 2ull + cbClientDir))
+ goto fail;
+
+ Stream_Write_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
+ Stream_Write_UINT16(s, cbClientAddress); /* cbClientAddress (2 bytes) */
+
+ Stream_Write(s, clientAddress, cbClientAddress); /* clientAddress */
+
+ Stream_Write_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */
+
+ Stream_Write(s, clientDir, cbClientDir); /* clientDir */
+
+ if (!rdp_write_client_time_zone(s, settings)) /* clientTimeZone (172 bytes) */
+ goto fail;
+
+ if (!Stream_EnsureRemainingCapacity(s, 10ull))
+ goto fail;
+
+ Stream_Write_UINT32(
+ s, settings->ClientSessionId); /* clientSessionId (4 bytes), should be set to 0 */
+ freerdp_performance_flags_make(settings);
+ Stream_Write_UINT32(s, settings->PerformanceFlags); /* performanceFlags (4 bytes) */
+ Stream_Write_UINT16(s, cbAutoReconnectCookie); /* cbAutoReconnectCookie (2 bytes) */
+
+ if (cbAutoReconnectCookie > 0)
+ {
+ if (!rdp_compute_client_auto_reconnect_cookie(rdp))
+ goto fail;
+ if (!rdp_write_client_auto_reconnect_cookie(rdp, s)) /* autoReconnectCookie */
+ goto fail;
+
+ if (!Stream_EnsureRemainingCapacity(s, 4ull))
+ goto fail;
+ Stream_Write_UINT16(s, 0); /* reserved1 (2 bytes) */
+ Stream_Write_UINT16(s, 0); /* reserved2 (2 bytes) */
+ }
+
+ if (freerdp_settings_get_bool(settings, FreeRDP_SupportDynamicTimeZone))
+ {
+ if (!Stream_EnsureRemainingCapacity(s, 10 + 254 * sizeof(WCHAR)))
+ goto fail;
+
+ /* skip reserved1 and reserved2 fields */
+ Stream_Seek(s, 4);
+
+ size_t rlen = 0;
+ const char* tz = freerdp_settings_get_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName);
+ if (tz)
+ rlen = strnlen(tz, 254);
+ Stream_Write_UINT16(s, (UINT16)rlen * sizeof(WCHAR));
+ if (Stream_Write_UTF16_String_From_UTF8(s, rlen, tz, rlen, FALSE) < 0)
+ goto fail;
+ Stream_Write_UINT16(s, settings->DynamicDaylightTimeDisabled ? 0x01 : 0x00);
+ }
+
+ ret = TRUE;
+fail:
+ free(clientAddress);
+ free(clientDir);
+ return ret;
+}
+
+static BOOL rdp_read_info_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id,
+ UINT32 flags, wStream* s, size_t cbLenNonNull, size_t max)
+{
+ union
+ {
+ char c;
+ WCHAR w;
+ BYTE b[2];
+ } terminator;
+
+ const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE;
+ const size_t nullSize = unicode ? sizeof(WCHAR) : sizeof(CHAR);
+
+ if (!freerdp_settings_set_string(settings, id, NULL))
+ return FALSE;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLenNonNull + nullSize)))
+ return FALSE;
+
+ if (cbLenNonNull > 0)
+ {
+ /* cbDomain is the size in bytes of the character data in the Domain field.
+ * This size excludes (!) the length of the mandatory null terminator.
+ * Maximum value including the mandatory null terminator: 512
+ */
+ if ((cbLenNonNull % 2) || (cbLenNonNull > (max - nullSize)))
+ {
+ WLog_ERR(TAG, "protocol error: invalid value: %" PRIuz "", cbLenNonNull);
+ return FALSE;
+ }
+
+ if (unicode)
+ {
+ const WCHAR* domain = Stream_PointerAs(s, WCHAR);
+ if (!freerdp_settings_set_string_from_utf16N(settings, id, domain,
+ cbLenNonNull / sizeof(WCHAR)))
+ return FALSE;
+ }
+ else
+ {
+ const char* domain = Stream_PointerAs(s, char);
+ if (!freerdp_settings_set_string_len(settings, id, domain, cbLenNonNull))
+ return FALSE;
+ }
+ }
+
+ Stream_Seek(s, cbLenNonNull);
+
+ terminator.w = L'\0';
+ Stream_Read(s, terminator.b, nullSize);
+
+ if (terminator.w != L'\0')
+ {
+ WLog_ERR(TAG, "protocol error: Domain must be null terminated");
+ freerdp_settings_set_string(settings, id, NULL);
+ return FALSE;
+ }
+
+ return TRUE;
+}
+
+/**
+ * Read Info Packet (TS_INFO_PACKET).
+ * msdn{cc240475}
+ */
+
+static BOOL rdp_read_info_packet(rdpRdp* rdp, wStream* s, UINT16 tpktlength)
+{
+ BOOL smallsize = FALSE;
+ UINT32 flags = 0;
+ UINT16 cbDomain = 0;
+ UINT16 cbUserName = 0;
+ UINT16 cbPassword = 0;
+ UINT16 cbAlternateShell = 0;
+ UINT16 cbWorkingDir = 0;
+ UINT32 CompressionLevel = 0;
+ rdpSettings* settings = rdp->settings;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 18))
+ return FALSE;
+
+ Stream_Read_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes ) */
+ Stream_Read_UINT32(s, flags); /* flags (4 bytes) */
+ settings->AudioCapture = ((flags & INFO_AUDIOCAPTURE) ? TRUE : FALSE);
+ settings->AudioPlayback = ((flags & INFO_NOAUDIOPLAYBACK) ? FALSE : TRUE);
+ settings->AutoLogonEnabled = ((flags & INFO_AUTOLOGON) ? TRUE : FALSE);
+ settings->RemoteApplicationMode = ((flags & INFO_RAIL) ? TRUE : FALSE);
+ settings->HiDefRemoteApp = ((flags & INFO_HIDEF_RAIL_SUPPORTED) ? TRUE : FALSE);
+ settings->RemoteConsoleAudio = ((flags & INFO_REMOTECONSOLEAUDIO) ? TRUE : FALSE);
+ settings->CompressionEnabled = ((flags & INFO_COMPRESSION) ? TRUE : FALSE);
+ settings->LogonNotify = ((flags & INFO_LOGONNOTIFY) ? TRUE : FALSE);
+ settings->MouseHasWheel = ((flags & INFO_MOUSE_HAS_WHEEL) ? TRUE : FALSE);
+ settings->DisableCtrlAltDel = ((flags & INFO_DISABLECTRLALTDEL) ? TRUE : FALSE);
+ settings->ForceEncryptedCsPdu = ((flags & INFO_FORCE_ENCRYPTED_CS_PDU) ? TRUE : FALSE);
+ settings->PasswordIsSmartcardPin = ((flags & INFO_PASSWORD_IS_SC_PIN) ? TRUE : FALSE);
+
+ if (flags & INFO_COMPRESSION)
+ {
+ CompressionLevel = ((flags & 0x00001E00) >> 9);
+ settings->CompressionLevel = CompressionLevel;
+ }
+ else
+ {
+ settings->CompressionLevel = 0;
+ }
+
+ /* RDP 4 and 5 have smaller credential limits */
+ if (settings->RdpVersion < RDP_VERSION_5_PLUS)
+ smallsize = TRUE;
+
+ Stream_Read_UINT16(s, cbDomain); /* cbDomain (2 bytes) */
+ Stream_Read_UINT16(s, cbUserName); /* cbUserName (2 bytes) */
+ Stream_Read_UINT16(s, cbPassword); /* cbPassword (2 bytes) */
+ Stream_Read_UINT16(s, cbAlternateShell); /* cbAlternateShell (2 bytes) */
+ Stream_Read_UINT16(s, cbWorkingDir); /* cbWorkingDir (2 bytes) */
+
+ if (!rdp_read_info_string(settings, FreeRDP_Domain, flags, s, cbDomain, smallsize ? 52 : 512))
+ return FALSE;
+
+ if (!rdp_read_info_string(settings, FreeRDP_Username, flags, s, cbUserName,
+ smallsize ? 44 : 512))
+ return FALSE;
+
+ if (!rdp_read_info_string(settings, FreeRDP_Password, flags, s, cbPassword,
+ smallsize ? 32 : 512))
+ return FALSE;
+
+ if (!rdp_read_info_string(settings, FreeRDP_AlternateShell, flags, s, cbAlternateShell, 512))
+ return FALSE;
+
+ if (!rdp_read_info_string(settings, FreeRDP_ShellWorkingDirectory, flags, s, cbWorkingDir, 512))
+ return FALSE;
+
+ if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
+ {
+ if (!rdp_read_extended_info_packet(rdp, s)) /* extraInfo */
+ return FALSE;
+ }
+
+ const size_t xrem = Stream_GetRemainingLength(s);
+ if (!tpkt_ensure_stream_consumed(s, tpktlength))
+ Stream_Seek(s, xrem);
+ return TRUE;
+}
+
+/**
+ * Write Info Packet (TS_INFO_PACKET).
+ * msdn{cc240475}
+ */
+
+static BOOL rdp_write_info_packet(rdpRdp* rdp, wStream* s)
+{
+ BOOL ret = FALSE;
+ UINT32 flags = 0;
+ WCHAR* domainW = NULL;
+ size_t cbDomain = 0;
+ WCHAR* userNameW = NULL;
+ size_t cbUserName = 0;
+ WCHAR* passwordW = NULL;
+ size_t cbPassword = 0;
+ WCHAR* alternateShellW = NULL;
+ size_t cbAlternateShell = 0;
+ WCHAR* workingDirW = NULL;
+ size_t cbWorkingDir = 0;
+ BOOL usedPasswordCookie = FALSE;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(rdp);
+ settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ flags = INFO_MOUSE | INFO_UNICODE | INFO_LOGONERRORS | INFO_MAXIMIZESHELL |
+ INFO_ENABLEWINDOWSKEY | INFO_DISABLECTRLALTDEL | INFO_MOUSE_HAS_WHEEL |
+ INFO_FORCE_ENCRYPTED_CS_PDU;
+
+ if (settings->SmartcardLogon)
+ {
+ flags |= INFO_AUTOLOGON;
+ flags |= INFO_PASSWORD_IS_SC_PIN;
+ }
+
+ if (settings->AudioCapture)
+ flags |= INFO_AUDIOCAPTURE;
+
+ if (!settings->AudioPlayback)
+ flags |= INFO_NOAUDIOPLAYBACK;
+
+ if (settings->VideoDisable)
+ flags |= INFO_VIDEO_DISABLE;
+
+ if (settings->AutoLogonEnabled)
+ flags |= INFO_AUTOLOGON;
+
+ if (settings->RemoteApplicationMode)
+ {
+ if (settings->HiDefRemoteApp)
+ flags |= INFO_HIDEF_RAIL_SUPPORTED;
+
+ flags |= INFO_RAIL;
+ }
+
+ if (settings->RemoteConsoleAudio)
+ flags |= INFO_REMOTECONSOLEAUDIO;
+
+ if (settings->CompressionEnabled)
+ {
+ flags |= INFO_COMPRESSION;
+ flags |= ((settings->CompressionLevel << 9) & 0x00001E00);
+ }
+
+ if (settings->LogonNotify)
+ flags |= INFO_LOGONNOTIFY;
+
+ if (settings->PasswordIsSmartcardPin)
+ flags |= INFO_PASSWORD_IS_SC_PIN;
+
+ {
+ char* flags_description = rdp_info_package_flags_description(flags);
+
+ if (flags_description)
+ {
+ WLog_DBG(TAG, "Client Info Packet Flags = %s", flags_description);
+ free(flags_description);
+ }
+ }
+
+ domainW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Domain, &cbDomain);
+ if (cbDomain > UINT16_MAX / sizeof(WCHAR))
+ {
+ WLog_ERR(TAG, "cbDomain > UINT16_MAX");
+ goto fail;
+ }
+ cbDomain *= sizeof(WCHAR);
+
+ /* user name provided by the expert for connecting to the novice computer */
+ userNameW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Username, &cbUserName);
+ if (cbUserName > UINT16_MAX / sizeof(WCHAR))
+ {
+ WLog_ERR(TAG, "cbUserName > UINT16_MAX");
+ goto fail;
+ }
+ cbUserName *= sizeof(WCHAR);
+
+ const char* pin = "*";
+ if (!settings->RemoteAssistanceMode)
+ {
+ /* Ignore redirection password if we´re using smartcard and have the pin as password */
+ if (((flags & INFO_PASSWORD_IS_SC_PIN) == 0) && settings->RedirectionPassword &&
+ (settings->RedirectionPasswordLength > 0))
+ {
+ union
+ {
+ BYTE* bp;
+ WCHAR* wp;
+ } ptrconv;
+
+ if (settings->RedirectionPasswordLength > UINT16_MAX)
+ {
+ WLog_ERR(TAG, "RedirectionPasswordLength > UINT16_MAX");
+ goto fail;
+ }
+ usedPasswordCookie = TRUE;
+
+ ptrconv.bp = settings->RedirectionPassword;
+ passwordW = ptrconv.wp;
+ cbPassword = (UINT16)settings->RedirectionPasswordLength;
+ }
+ else
+ pin = freerdp_settings_get_string(settings, FreeRDP_Password);
+ }
+
+ if (!usedPasswordCookie && pin)
+ {
+ passwordW = ConvertUtf8ToWCharAlloc(pin, &cbPassword);
+ if (cbPassword > UINT16_MAX / sizeof(WCHAR))
+ {
+ WLog_ERR(TAG, "cbPassword > UINT16_MAX");
+ goto fail;
+ }
+ cbPassword = (UINT16)cbPassword * sizeof(WCHAR);
+ }
+
+ const char* altShell = NULL;
+ if (!settings->RemoteAssistanceMode)
+ altShell = freerdp_settings_get_string(settings, FreeRDP_AlternateShell);
+ else if (settings->RemoteAssistancePassStub)
+ altShell = "*"; /* This field MUST be filled with "*" */
+ else
+ altShell = freerdp_settings_get_string(settings, FreeRDP_RemoteAssistancePassword);
+
+ if (altShell && strlen(altShell) > 0)
+ {
+ alternateShellW = ConvertUtf8ToWCharAlloc(altShell, &cbAlternateShell);
+ if (!alternateShellW)
+ {
+ WLog_ERR(TAG, "alternateShellW == NULL");
+ goto fail;
+ }
+ if (cbAlternateShell > (UINT16_MAX / sizeof(WCHAR)))
+ {
+ WLog_ERR(TAG, "cbAlternateShell > UINT16_MAX");
+ goto fail;
+ }
+ cbAlternateShell = (UINT16)cbAlternateShell * sizeof(WCHAR);
+ }
+
+ FreeRDP_Settings_Keys_String inputId = FreeRDP_RemoteAssistanceSessionId;
+ if (!freerdp_settings_get_bool(settings, FreeRDP_RemoteAssistanceMode))
+ inputId = FreeRDP_ShellWorkingDirectory;
+
+ workingDirW = freerdp_settings_get_string_as_utf16(settings, inputId, &cbWorkingDir);
+ if (cbWorkingDir > (UINT16_MAX / sizeof(WCHAR)))
+ {
+ WLog_ERR(TAG, "cbWorkingDir > UINT16_MAX");
+ goto fail;
+ }
+ cbWorkingDir = (UINT16)cbWorkingDir * sizeof(WCHAR);
+
+ if (!Stream_EnsureRemainingCapacity(s, 18ull + cbDomain + cbUserName + cbPassword +
+ cbAlternateShell + cbWorkingDir + 5 * sizeof(WCHAR)))
+ goto fail;
+
+ Stream_Write_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes) */
+ Stream_Write_UINT32(s, flags); /* flags (4 bytes) */
+ Stream_Write_UINT16(s, (UINT32)cbDomain); /* cbDomain (2 bytes) */
+ Stream_Write_UINT16(s, (UINT32)cbUserName); /* cbUserName (2 bytes) */
+ Stream_Write_UINT16(s, (UINT32)cbPassword); /* cbPassword (2 bytes) */
+ Stream_Write_UINT16(s, (UINT32)cbAlternateShell); /* cbAlternateShell (2 bytes) */
+ Stream_Write_UINT16(s, (UINT32)cbWorkingDir); /* cbWorkingDir (2 bytes) */
+
+ Stream_Write(s, domainW, cbDomain);
+
+ /* the mandatory null terminator */
+ Stream_Write_UINT16(s, 0);
+
+ Stream_Write(s, userNameW, cbUserName);
+
+ /* the mandatory null terminator */
+ Stream_Write_UINT16(s, 0);
+
+ Stream_Write(s, passwordW, cbPassword);
+
+ /* the mandatory null terminator */
+ Stream_Write_UINT16(s, 0);
+
+ Stream_Write(s, alternateShellW, cbAlternateShell);
+
+ /* the mandatory null terminator */
+ Stream_Write_UINT16(s, 0);
+
+ Stream_Write(s, workingDirW, cbWorkingDir);
+
+ /* the mandatory null terminator */
+ Stream_Write_UINT16(s, 0);
+ ret = TRUE;
+fail:
+ free(domainW);
+ free(userNameW);
+ free(alternateShellW);
+ free(workingDirW);
+
+ if (!usedPasswordCookie)
+ free(passwordW);
+
+ if (!ret)
+ return FALSE;
+
+ if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
+ ret = rdp_write_extended_info_packet(rdp, s); /* extraInfo */
+
+ return ret;
+}
+
+/**
+ * Read Client Info PDU (CLIENT_INFO_PDU).
+ * msdn{cc240474}
+ * @param rdp RDP module
+ * @param s stream
+ */
+
+BOOL rdp_recv_client_info(rdpRdp* rdp, wStream* s)
+{
+ UINT16 length = 0;
+ UINT16 channelId = 0;
+ UINT16 securityFlags = 0;
+
+ WINPR_ASSERT(rdp_get_state(rdp) == CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE);
+
+ if (!rdp_read_header(rdp, s, &length, &channelId))
+ return FALSE;
+
+ if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
+ return FALSE;
+
+ if ((securityFlags & SEC_INFO_PKT) == 0)
+ return FALSE;
+
+ if (rdp->settings->UseRdpSecurityLayer)
+ {
+ if (securityFlags & SEC_REDIRECTION_PKT)
+ {
+ WLog_ERR(TAG, "Error: SEC_REDIRECTION_PKT unsupported");
+ return FALSE;
+ }
+
+ if (securityFlags & SEC_ENCRYPT)
+ {
+ if (!rdp_decrypt(rdp, s, &length, securityFlags))
+ return FALSE;
+ }
+ }
+
+ return rdp_read_info_packet(rdp, s, length);
+}
+
+/**
+ * Send Client Info PDU (CLIENT_INFO_PDU).
+ * msdn{cc240474}
+ * @param rdp RDP module
+ */
+
+BOOL rdp_send_client_info(rdpRdp* rdp)
+{
+ wStream* s = NULL;
+ WINPR_ASSERT(rdp);
+ rdp->sec_flags |= SEC_INFO_PKT;
+ s = rdp_send_stream_init(rdp);
+
+ if (!s)
+ {
+ WLog_ERR(TAG, "Stream_New failed!");
+ return FALSE;
+ }
+
+ if (!rdp_write_info_packet(rdp, s))
+ {
+ Stream_Release(s);
+ return FALSE;
+ }
+ return rdp_send(rdp, s, MCS_GLOBAL_CHANNEL_ID);
+}
+
+static void rdp_free_logon_info(logon_info* info)
+{
+ if (!info)
+ return;
+ free(info->domain);
+ free(info->username);
+
+ const logon_info empty = { 0 };
+ *info = empty;
+}
+
+static BOOL rdp_info_read_string(const char* what, wStream* s, size_t size, size_t max,
+ BOOL skipMax, char** dst)
+{
+ WINPR_ASSERT(dst);
+ *dst = NULL;
+
+ if (size == 0)
+ {
+ if (skipMax)
+ return Stream_SafeSeek(s, max);
+ return TRUE;
+ }
+
+ if (((size % sizeof(WCHAR)) != 0) || (size > max))
+ {
+ WLog_ERR(TAG, "protocol error: invalid %s value: %" PRIu32 "", what, size);
+ return FALSE;
+ }
+
+ const WCHAR* str = Stream_ConstPointer(s);
+ if (str[size / sizeof(WCHAR) - 1])
+ {
+ WLog_ERR(TAG, "protocol error: %s must be null terminated", what);
+ return FALSE;
+ }
+
+ if (!Stream_SafeSeek(s, skipMax ? max : size))
+ return FALSE;
+
+ size_t len = 0;
+ char* rc = ConvertWCharNToUtf8Alloc(str, size / sizeof(WCHAR), &len);
+ if (!rc)
+ {
+ WLog_ERR(TAG, "failed to convert the %s string", what);
+ free(rc);
+ return FALSE;
+ }
+
+ *dst = rc;
+ return TRUE;
+}
+
+static BOOL rdp_recv_logon_info_v1(rdpRdp* rdp, wStream* s, logon_info* info)
+{
+ UINT32 cbDomain = 0;
+ UINT32 cbUserName = 0;
+
+ WINPR_UNUSED(rdp);
+ WINPR_ASSERT(info);
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
+ return FALSE;
+
+ Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */
+
+ /* cbDomain is the size of the Unicode character data (including the mandatory
+ * null terminator) in bytes present in the fixed-length (52 bytes) Domain field
+ */
+ if (!rdp_info_read_string("Domain", s, cbDomain, 52, TRUE, &info->domain))
+ goto fail;
+
+ Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */
+
+ /* cbUserName is the size of the Unicode character data (including the mandatory
+ * null terminator) in bytes present in the fixed-length (512 bytes) UserName field.
+ */
+ if (!rdp_info_read_string("UserName", s, cbUserName, 512, TRUE, &info->username))
+ goto fail;
+
+ Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */
+ WLog_DBG(TAG, "LogonInfoV1: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
+ info->sessionId, info->username, info->domain);
+ return TRUE;
+fail:
+ return FALSE;
+}
+
+static BOOL rdp_recv_logon_info_v2(rdpRdp* rdp, wStream* s, logon_info* info)
+{
+ UINT16 Version = 0;
+ UINT32 Size = 0;
+ UINT32 cbDomain = 0;
+ UINT32 cbUserName = 0;
+
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(info);
+
+ WINPR_UNUSED(rdp);
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, logonInfoV2TotalSize))
+ return FALSE;
+
+ Stream_Read_UINT16(s, Version); /* Version (2 bytes) */
+ if (Version != SAVE_SESSION_PDU_VERSION_ONE)
+ {
+ WLog_WARN(TAG, "LogonInfoV2::Version expected %" PRIu16 " bytes, got %" PRIu16,
+ SAVE_SESSION_PDU_VERSION_ONE, Version);
+ return FALSE;
+ }
+
+ Stream_Read_UINT32(s, Size); /* Size (4 bytes) */
+
+ /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
+ * should be logonInfoV2TotalSize
+ * but even MS server 2019 sends logonInfoV2Size
+ */
+ if (Size != logonInfoV2TotalSize)
+ {
+ if (Size != logonInfoV2Size)
+ {
+ WLog_WARN(TAG, "LogonInfoV2::Size expected %" PRIu32 " bytes, got %" PRIu32,
+ logonInfoV2TotalSize, Size);
+ return FALSE;
+ }
+ }
+
+ Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */
+ Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */
+ Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */
+ Stream_Seek(s, logonInfoV2ReservedSize); /* pad (558 bytes) */
+
+ /* cbDomain is the size in bytes of the Unicode character data in the Domain field.
+ * The size of the mandatory null terminator is include in this value.
+ * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
+ * that the maximum value is 52 bytes, according to the fixed size of the
+ * Domain field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
+ */
+ if (!rdp_info_read_string("Domain", s, cbDomain, 52, FALSE, &info->domain))
+ goto fail;
+
+ /* cbUserName is the size in bytes of the Unicode character data in the UserName field.
+ * The size of the mandatory null terminator is include in this value.
+ * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
+ * that the maximum value is 512 bytes, according to the fixed size of the
+ * Username field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
+ */
+ if (!rdp_info_read_string("UserName", s, cbUserName, 512, FALSE, &info->username))
+ goto fail;
+
+ /* We´ve seen undocumented padding with windows 11 here.
+ * unless it has actual data in it ignore it.
+ * if there is unexpected data, print a warning and dump the contents
+ */
+ const size_t rem = Stream_GetRemainingLength(s);
+ if (rem > 0)
+ {
+ BOOL warn = FALSE;
+ const char* str = Stream_ConstPointer(s);
+ for (size_t x = 0; x < rem; x++)
+ {
+ if (str[x] != '\0')
+ warn = TRUE;
+ }
+ if (warn)
+ {
+ WLog_WARN(TAG, "unexpected padding of %" PRIuz " bytes, data not '\0'", rem);
+ winpr_HexDump(TAG, WLOG_TRACE, str, rem);
+ }
+
+ if (!Stream_SafeSeek(s, rem))
+ goto fail;
+ }
+
+ WLog_DBG(TAG, "LogonInfoV2: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
+ info->sessionId, info->username, info->domain);
+ return TRUE;
+fail:
+ return FALSE;
+}
+
+static BOOL rdp_recv_logon_plain_notify(rdpRdp* rdp, wStream* s)
+{
+ WINPR_UNUSED(rdp);
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
+ return FALSE;
+
+ Stream_Seek(s, 576); /* pad (576 bytes) */
+ WLog_DBG(TAG, "LogonPlainNotify");
+ return TRUE;
+}
+
+static BOOL rdp_recv_logon_error_info(rdpRdp* rdp, wStream* s, logon_info_ex* info)
+{
+ freerdp* instance = NULL;
+ UINT32 errorNotificationType = 0;
+ UINT32 errorNotificationData = 0;
+
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(rdp->context);
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(info);
+
+ instance = rdp->context->instance;
+ WINPR_ASSERT(instance);
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
+ return FALSE;
+
+ Stream_Read_UINT32(s, errorNotificationType); /* errorNotificationType (4 bytes) */
+ Stream_Read_UINT32(s, errorNotificationData); /* errorNotificationData (4 bytes) */
+ WLog_DBG(TAG, "LogonErrorInfo: Data: 0x%08" PRIX32 " Type: 0x%08" PRIX32 "",
+ errorNotificationData, errorNotificationType);
+ IFCALL(instance->LogonErrorInfo, instance, errorNotificationData, errorNotificationType);
+ info->ErrorNotificationType = errorNotificationType;
+ info->ErrorNotificationData = errorNotificationData;
+ return TRUE;
+}
+
+static BOOL rdp_recv_logon_info_extended(rdpRdp* rdp, wStream* s, logon_info_ex* info)
+{
+ UINT32 cbFieldData = 0;
+ UINT32 fieldsPresent = 0;
+ UINT16 Length = 0;
+
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(info);
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
+ {
+ WLog_WARN(TAG, "received short logon info extended, need 6 bytes, got %" PRIuz,
+ Stream_GetRemainingLength(s));
+ return FALSE;
+ }
+
+ Stream_Read_UINT16(s, Length); /* Length (2 bytes) */
+ Stream_Read_UINT32(s, fieldsPresent); /* fieldsPresent (4 bytes) */
+
+ if ((Length < 6) || (!Stream_CheckAndLogRequiredLength(TAG, s, (Length - 6U))))
+ {
+ WLog_WARN(TAG,
+ "received short logon info extended, need %" PRIu16 " - 6 bytes, got %" PRIuz,
+ Length, Stream_GetRemainingLength(s));
+ return FALSE;
+ }
+
+ WLog_DBG(TAG, "LogonInfoExtended: fieldsPresent: 0x%08" PRIX32 "", fieldsPresent);
+
+ /* logonFields */
+
+ if (fieldsPresent & LOGON_EX_AUTORECONNECTCOOKIE)
+ {
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ info->haveCookie = TRUE;
+ Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
+ return FALSE;
+
+ if (!rdp_read_server_auto_reconnect_cookie(rdp, s, info))
+ return FALSE;
+ }
+
+ if (fieldsPresent & LOGON_EX_LOGONERRORS)
+ {
+ info->haveErrorInfo = TRUE;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
+ return FALSE;
+
+ if (!rdp_recv_logon_error_info(rdp, s, info))
+ return FALSE;
+ }
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 570))
+ return FALSE;
+
+ Stream_Seek(s, 570); /* pad (570 bytes) */
+ return TRUE;
+}
+
+BOOL rdp_recv_save_session_info(rdpRdp* rdp, wStream* s)
+{
+ UINT32 infoType = 0;
+ BOOL status = 0;
+ logon_info logonInfo = { 0 };
+ logon_info_ex logonInfoEx = { 0 };
+ rdpContext* context = rdp->context;
+ rdpUpdate* update = rdp->context->update;
+
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return FALSE;
+
+ Stream_Read_UINT32(s, infoType); /* infoType (4 bytes) */
+
+ switch (infoType)
+ {
+ case INFO_TYPE_LOGON:
+ status = rdp_recv_logon_info_v1(rdp, s, &logonInfo);
+
+ if (status && update->SaveSessionInfo)
+ status = update->SaveSessionInfo(context, infoType, &logonInfo);
+
+ rdp_free_logon_info(&logonInfo);
+ break;
+
+ case INFO_TYPE_LOGON_LONG:
+ status = rdp_recv_logon_info_v2(rdp, s, &logonInfo);
+
+ if (status && update->SaveSessionInfo)
+ status = update->SaveSessionInfo(context, infoType, &logonInfo);
+
+ rdp_free_logon_info(&logonInfo);
+ break;
+
+ case INFO_TYPE_LOGON_PLAIN_NOTIFY:
+ status = rdp_recv_logon_plain_notify(rdp, s);
+
+ if (status && update->SaveSessionInfo)
+ status = update->SaveSessionInfo(context, infoType, NULL);
+
+ break;
+
+ case INFO_TYPE_LOGON_EXTENDED_INF:
+ status = rdp_recv_logon_info_extended(rdp, s, &logonInfoEx);
+
+ if (status && update->SaveSessionInfo)
+ status = update->SaveSessionInfo(context, infoType, &logonInfoEx);
+
+ break;
+
+ default:
+ WLog_ERR(TAG, "Unhandled saveSessionInfo type 0x%" PRIx32 "", infoType);
+ status = TRUE;
+ break;
+ }
+
+ if (!status)
+ {
+ WLog_DBG(TAG, "SaveSessionInfo error: infoType: %s (%" PRIu32 ")",
+ infoType < 4 ? INFO_TYPE_LOGON_STRINGS[infoType % 4] : "Unknown", infoType);
+ }
+
+ return status;
+}
+
+static BOOL rdp_write_logon_info_v1(wStream* s, logon_info* info)
+{
+ const size_t charLen = 52 / sizeof(WCHAR);
+ const size_t userCharLen = 512 / sizeof(WCHAR);
+
+ size_t sz = 4 + 52 + 4 + 512 + 4;
+ size_t len = 0;
+
+ if (!Stream_EnsureRemainingCapacity(s, sz))
+ return FALSE;
+
+ /* domain */
+ len = strnlen(info->domain, charLen + 1);
+ if (len > charLen)
+ return FALSE;
+
+ Stream_Write_UINT32(s, len * sizeof(WCHAR));
+ if (Stream_Write_UTF16_String_From_UTF8(s, charLen, info->domain, len, TRUE) < 0)
+ return FALSE;
+
+ /* username */
+ len = strnlen(info->username, userCharLen + 1);
+ if (len > userCharLen)
+ return FALSE;
+
+ Stream_Write_UINT32(s, len * sizeof(WCHAR));
+ if (Stream_Write_UTF16_String_From_UTF8(s, userCharLen, info->username, len, TRUE) < 0)
+ return FALSE;
+
+ /* sessionId */
+ Stream_Write_UINT32(s, info->sessionId);
+ return TRUE;
+}
+
+static BOOL rdp_write_logon_info_v2(wStream* s, logon_info* info)
+{
+ size_t domainLen = 0;
+ size_t usernameLen = 0;
+
+ if (!Stream_EnsureRemainingCapacity(s, logonInfoV2TotalSize))
+ return FALSE;
+
+ Stream_Write_UINT16(s, SAVE_SESSION_PDU_VERSION_ONE);
+ /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
+ * should be logonInfoV2TotalSize
+ * but even MS server 2019 sends logonInfoV2Size
+ */
+ Stream_Write_UINT32(s, logonInfoV2Size);
+ Stream_Write_UINT32(s, info->sessionId);
+ domainLen = strnlen(info->domain, UINT32_MAX);
+ if (domainLen >= UINT32_MAX / sizeof(WCHAR))
+ return FALSE;
+ Stream_Write_UINT32(s, (UINT32)(domainLen + 1) * sizeof(WCHAR));
+ usernameLen = strnlen(info->username, UINT32_MAX);
+ if (usernameLen >= UINT32_MAX / sizeof(WCHAR))
+ return FALSE;
+ Stream_Write_UINT32(s, (UINT32)(usernameLen + 1) * sizeof(WCHAR));
+ Stream_Seek(s, logonInfoV2ReservedSize);
+ if (Stream_Write_UTF16_String_From_UTF8(s, domainLen + 1, info->domain, domainLen, TRUE) < 0)
+ return FALSE;
+ if (Stream_Write_UTF16_String_From_UTF8(s, usernameLen + 1, info->username, usernameLen, TRUE) <
+ 0)
+ return FALSE;
+ return TRUE;
+}
+
+static BOOL rdp_write_logon_info_plain(wStream* s)
+{
+ if (!Stream_EnsureRemainingCapacity(s, 576))
+ return FALSE;
+
+ Stream_Seek(s, 576);
+ return TRUE;
+}
+
+static BOOL rdp_write_logon_info_ex(wStream* s, logon_info_ex* info)
+{
+ UINT32 FieldsPresent = 0;
+ UINT16 Size = 2 + 4 + 570;
+
+ if (info->haveCookie)
+ {
+ FieldsPresent |= LOGON_EX_AUTORECONNECTCOOKIE;
+ Size += 28;
+ }
+
+ if (info->haveErrorInfo)
+ {
+ FieldsPresent |= LOGON_EX_LOGONERRORS;
+ Size += 8;
+ }
+
+ if (!Stream_EnsureRemainingCapacity(s, Size))
+ return FALSE;
+
+ Stream_Write_UINT16(s, Size);
+ Stream_Write_UINT32(s, FieldsPresent);
+
+ if (info->haveCookie)
+ {
+ Stream_Write_UINT32(s, 28); /* cbFieldData (4 bytes) */
+ Stream_Write_UINT32(s, 28); /* cbLen (4 bytes) */
+ Stream_Write_UINT32(s, AUTO_RECONNECT_VERSION_1); /* Version (4 bytes) */
+ Stream_Write_UINT32(s, info->LogonId); /* LogonId (4 bytes) */
+ Stream_Write(s, info->ArcRandomBits, 16); /* ArcRandomBits (16 bytes) */
+ }
+
+ if (info->haveErrorInfo)
+ {
+ Stream_Write_UINT32(s, 8); /* cbFieldData (4 bytes) */
+ Stream_Write_UINT32(s, info->ErrorNotificationType); /* ErrorNotificationType (4 bytes) */
+ Stream_Write_UINT32(s, info->ErrorNotificationData); /* ErrorNotificationData (4 bytes) */
+ }
+
+ Stream_Seek(s, 570);
+ return TRUE;
+}
+
+BOOL rdp_send_save_session_info(rdpContext* context, UINT32 type, void* data)
+{
+ wStream* s = NULL;
+ BOOL status = 0;
+ rdpRdp* rdp = context->rdp;
+ s = rdp_data_pdu_init(rdp);
+
+ if (!s)
+ return FALSE;
+
+ Stream_Write_UINT32(s, type);
+
+ switch (type)
+ {
+ case INFO_TYPE_LOGON:
+ status = rdp_write_logon_info_v1(s, (logon_info*)data);
+ break;
+
+ case INFO_TYPE_LOGON_LONG:
+ status = rdp_write_logon_info_v2(s, (logon_info*)data);
+ break;
+
+ case INFO_TYPE_LOGON_PLAIN_NOTIFY:
+ status = rdp_write_logon_info_plain(s);
+ break;
+
+ case INFO_TYPE_LOGON_EXTENDED_INF:
+ status = rdp_write_logon_info_ex(s, (logon_info_ex*)data);
+ break;
+
+ default:
+ WLog_ERR(TAG, "saveSessionInfo type 0x%" PRIx32 " not handled", type);
+ status = FALSE;
+ break;
+ }
+
+ if (status)
+ status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SAVE_SESSION_INFO, rdp->mcs->userId);
+ else
+ Stream_Release(s);
+
+ return status;
+}
+
+BOOL rdp_send_server_status_info(rdpContext* context, UINT32 status)
+{
+ wStream* s = NULL;
+ rdpRdp* rdp = context->rdp;
+ s = rdp_data_pdu_init(rdp);
+
+ if (!s)
+ return FALSE;
+
+ Stream_Write_UINT32(s, status);
+ return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_STATUS_INFO, rdp->mcs->userId);
+}