Coverage Report

Created: 2026-01-09 06:43

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/libfreerdp/common/assistance.c
Line
Count
Source
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * Remote Assistance
4
 *
5
 * Copyright 2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 *
7
 * Licensed under the Apache License, Version 2.0 (the "License");
8
 * you may not use this file except in compliance with the License.
9
 * You may obtain a copy of the License at
10
 *
11
 *     http://www.apache.org/licenses/LICENSE-2.0
12
 *
13
 * Unless required by applicable law or agreed to in writing, software
14
 * distributed under the License is distributed on an "AS IS" BASIS,
15
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16
 * See the License for the specific language governing permissions and
17
 * limitations under the License.
18
 */
19
20
#include <freerdp/config.h>
21
22
#include <errno.h>
23
24
#include <winpr/wtypes.h>
25
#include <winpr/collections.h>
26
#include <winpr/string.h>
27
#include <winpr/crt.h>
28
#include <winpr/crypto.h>
29
#include <winpr/print.h>
30
#include <winpr/windows.h>
31
#include <winpr/ssl.h>
32
#include <winpr/file.h>
33
34
#include <freerdp/log.h>
35
#include <freerdp/client/file.h>
36
#include <freerdp/client/cmdline.h>
37
38
#include <freerdp/assistance.h>
39
40
#include "../core/settings.h"
41
42
#define TAG FREERDP_TAG("common")
43
44
struct rdp_assistance_file
45
{
46
  UINT32 Type;
47
48
  char* Username;
49
  char* LHTicket;
50
  char* RCTicket;
51
  char* PassStub;
52
  UINT32 DtStart;
53
  UINT32 DtLength;
54
  BOOL LowSpeed;
55
  BOOL RCTicketEncrypted;
56
57
  char* ConnectionString1;
58
  char* ConnectionString2;
59
60
  BYTE* EncryptedPassStub;
61
  size_t EncryptedPassStubLength;
62
63
  BYTE* EncryptedLHTicket;
64
  size_t EncryptedLHTicketLength;
65
66
  wArrayList* MachineAddresses;
67
  wArrayList* MachinePorts;
68
  wArrayList* MachineUris;
69
70
  char* RASessionId;
71
  char* RASpecificParams;
72
  char* RASpecificParams2;
73
74
  char* filename;
75
  char* password;
76
};
77
78
static const char* strrstr(const char* haystack, size_t len, const char* needle)
79
3.49k
{
80
3.49k
  if (*needle == '\0')
81
0
    return haystack;
82
83
3.49k
  char* result = NULL;
84
3.49k
  for (;;)
85
11.0k
  {
86
11.0k
    char* p = strstr(haystack, needle);
87
11.0k
    if (p == NULL)
88
3.49k
      break;
89
7.59k
    if (p > haystack + len)
90
0
      return NULL;
91
92
7.59k
    result = p;
93
7.59k
    haystack = p + 1;
94
7.59k
  }
95
96
3.49k
  return result;
97
3.49k
}
98
99
static BOOL update_option(char** opt, const char* val, size_t len)
100
5.82k
{
101
5.82k
  WINPR_ASSERT(opt);
102
5.82k
  free(*opt);
103
5.82k
  *opt = NULL;
104
105
5.82k
  if (!val && (len != 0))
106
0
    return FALSE;
107
5.82k
  else if (!val && (len == 0))
108
4.40k
    return TRUE;
109
1.41k
  *opt = strndup(val, len);
110
1.41k
  return *opt != NULL;
111
5.82k
}
112
113
static BOOL update_name(rdpAssistanceFile* file, const char* name)
114
0
{
115
0
  WINPR_ASSERT(file);
116
117
0
  if (!name)
118
0
  {
119
0
    WLog_ERR(TAG, "ASSISTANCE file %s invalid name", name);
120
0
    return FALSE;
121
0
  }
122
123
0
  free(file->filename);
124
0
  file->filename = _strdup(name);
125
0
  return file->filename != NULL;
126
0
}
127
128
static BOOL update_password(rdpAssistanceFile* file, const char* password)
129
3.96k
{
130
3.96k
  WINPR_ASSERT(file);
131
3.96k
  free(file->password);
132
3.96k
  file->password = NULL;
133
3.96k
  if (!password)
134
1.98k
    return TRUE;
135
1.98k
  file->password = _strdup(password);
136
1.98k
  return file->password != NULL;
137
3.96k
}
138
139
static BOOL update_connectionstring2_nocopy(rdpAssistanceFile* file, char* str)
140
2.81k
{
141
2.81k
  WINPR_ASSERT(file);
142
2.81k
  free(file->ConnectionString2);
143
2.81k
  file->ConnectionString2 = NULL;
144
2.81k
  if (!str)
145
1.98k
    return TRUE;
146
837
  file->ConnectionString2 = str;
147
837
  return file->ConnectionString2 != NULL;
148
2.81k
}
149
150
static BOOL update_connectionstring2(rdpAssistanceFile* file, const char* str, size_t len)
151
2.64k
{
152
2.64k
  char* strc = NULL;
153
2.64k
  if (!str && (len != 0))
154
0
    return FALSE;
155
156
2.64k
  if (str && (len > 0))
157
668
  {
158
668
    strc = strndup(str, len);
159
668
    if (!strc)
160
0
      return FALSE;
161
668
  }
162
2.64k
  return update_connectionstring2_nocopy(file, strc);
163
2.64k
}
164
165
static BOOL update_connectionstring2_wchar(rdpAssistanceFile* file, const WCHAR* str, size_t len)
166
260
{
167
260
  char* strc = NULL;
168
169
260
  if (!str && (len != 0))
170
0
    return FALSE;
171
172
260
  if (str && (len > 0))
173
259
  {
174
259
    strc = ConvertWCharNToUtf8Alloc(str, len, NULL);
175
259
    if (!strc)
176
90
      return FALSE;
177
259
  }
178
170
  return update_connectionstring2_nocopy(file, strc);
179
260
}
180
181
/**
182
 * Password encryption in establishing a remote assistance session of type 1:
183
 * http://blogs.msdn.com/b/openspecification/archive/2011/10/31/password-encryption-in-establishing-a-remote-assistance-session-of-type-1.aspx
184
 *
185
 * Creation of PassStub for the Remote Assistance Ticket:
186
 * http://social.msdn.microsoft.com/Forums/en-US/6316c3f4-ea09-4343-a4a1-9cca46d70d28/creation-of-passstub-for-the-remote-assistance-ticket?forum=os_windowsprotocols
187
 */
188
189
/**
190
 * CryptDeriveKey Function:
191
 * http://msdn.microsoft.com/en-us/library/windows/desktop/aa379916/
192
 *
193
 * Let n be the required derived key length, in bytes.
194
 * The derived key is the first n bytes of the hash value after the hash computation
195
 * has been completed by CryptDeriveKey. If the hash is not a member of the SHA-2
196
 * family and the required key is for either 3DES or AES, the key is derived as follows:
197
 *
198
 * Form a 64-byte buffer by repeating the constant 0x36 64 times.
199
 * Let k be the length of the hash value that is represented by the input parameter hBaseData.
200
 * Set the first k bytes of the buffer to the result of an XOR operation of the first k bytes
201
 * of the buffer with the hash value that is represented by the input parameter hBaseData.
202
 *
203
 * Form a 64-byte buffer by repeating the constant 0x5C 64 times.
204
 * Set the first k bytes of the buffer to the result of an XOR operation of the first k bytes
205
 * of the buffer with the hash value that is represented by the input parameter hBaseData.
206
 *
207
 * Hash the result of step 1 by using the same hash algorithm as that used to compute the hash
208
 * value that is represented by the hBaseData parameter.
209
 *
210
 * Hash the result of step 2 by using the same hash algorithm as that used to compute the hash
211
 * value that is represented by the hBaseData parameter.
212
 *
213
 * Concatenate the result of step 3 with the result of step 4.
214
 * Use the first n bytes of the result of step 5 as the derived key.
215
 */
216
217
static BOOL freerdp_assistance_crypt_derive_key_sha1(const BYTE* hash, size_t hashLength, BYTE* key,
218
                                                     size_t keyLength)
219
470
{
220
470
  BOOL rc = FALSE;
221
470
  BYTE pad1[64] = { 0 };
222
470
  BYTE pad2[64] = { 0 };
223
224
470
  if (hashLength == 0)
225
0
    return FALSE;
226
227
470
  memset(pad1, 0x36, sizeof(pad1));
228
470
  memset(pad2, 0x5C, sizeof(pad2));
229
230
9.87k
  for (size_t i = 0; i < hashLength; i++)
231
9.40k
  {
232
9.40k
    pad1[i] ^= hash[i];
233
9.40k
    pad2[i] ^= hash[i];
234
9.40k
  }
235
236
470
  BYTE* buffer = (BYTE*)calloc(hashLength, 2);
237
238
470
  if (!buffer)
239
0
    goto fail;
240
241
470
  if (!winpr_Digest(WINPR_MD_SHA1, pad1, 64, buffer, hashLength))
242
0
    goto fail;
243
244
470
  if (!winpr_Digest(WINPR_MD_SHA1, pad2, 64, &buffer[hashLength], hashLength))
245
0
    goto fail;
246
247
470
  CopyMemory(key, buffer, keyLength);
248
470
  rc = TRUE;
249
470
fail:
250
470
  free(buffer);
251
470
  return rc;
252
470
}
253
254
static BOOL append_address_to_list(wArrayList* MachineAddresses, const char* str, size_t len)
255
539k
{
256
539k
  char* copy = NULL;
257
539k
  if (len > 0)
258
539k
    copy = strndup(str, len);
259
539k
  if (!copy)
260
27
    return FALSE;
261
262
539k
  const BOOL rc = ArrayList_Append(MachineAddresses, copy);
263
539k
  if (!rc)
264
0
    free(copy);
265
  // NOLINTNEXTLINE(clang-analyzer-unix.Malloc): ArrayList_Append takes ownership of copy
266
539k
  return rc;
267
539k
}
268
269
static BOOL append_address(rdpAssistanceFile* file, const char* host, const char* port)
270
538k
{
271
538k
  WINPR_ASSERT(file);
272
273
538k
  errno = 0;
274
538k
  unsigned long p = strtoul(port, NULL, 0);
275
276
538k
  if ((errno != 0) || (p == 0) || (p > UINT16_MAX))
277
134
  {
278
134
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: ConnectionString2 invalid port value %s",
279
134
             port);
280
134
    return FALSE;
281
134
  }
282
283
538k
  if (!append_address_to_list(file->MachineAddresses, host, host ? strlen(host) : 0))
284
27
    return FALSE;
285
538k
  return ArrayList_Append(file->MachinePorts, (void*)(uintptr_t)p);
286
538k
}
287
288
static BOOL freerdp_assistance_parse_address_list(rdpAssistanceFile* file, char* list)
289
493
{
290
493
  WINPR_ASSERT(file);
291
292
493
  WLog_DBG(TAG, "freerdp_assistance_parse_address_list list=%s", list);
293
294
493
  BOOL rc = FALSE;
295
296
493
  if (!list)
297
0
    return FALSE;
298
299
493
  char* strp = list;
300
493
  char* s = ";";
301
302
  // get the first token
303
493
  char* saveptr = NULL;
304
493
  char* token = strtok_s(strp, s, &saveptr);
305
306
  // walk through other tokens
307
538k
  while (token != NULL)
308
538k
  {
309
538k
    char* port = strchr(token, ':');
310
538k
    if (!port)
311
8
      goto out;
312
538k
    *port = '\0';
313
538k
    port++;
314
315
538k
    if (!append_address(file, token, port))
316
161
      goto out;
317
318
538k
    token = strtok_s(NULL, s, &saveptr);
319
538k
  }
320
324
  rc = TRUE;
321
493
out:
322
493
  return rc;
323
324
}
324
325
static BOOL freerdp_assistance_parse_connection_string1(rdpAssistanceFile* file)
326
630
{
327
630
  char* tokens[8] = { 0 };
328
630
  BOOL rc = FALSE;
329
330
630
  WINPR_ASSERT(file);
331
332
630
  if (!file->RCTicket)
333
30
    return FALSE;
334
335
  /**
336
   * <ProtocolVersion>,<protocolType>,<machineAddressList>,<assistantAccountPwd>,
337
   * <RASessionID>,<RASessionName>,<RASessionPwd>,<protocolSpecificParms>
338
   */
339
600
  char* str = _strdup(file->RCTicket);
340
341
600
  if (!str)
342
0
    goto error;
343
344
600
  {
345
600
    const size_t length = strlen(str);
346
347
600
    {
348
600
      int count = 1;
349
5.75M
      for (size_t i = 0; i < length; i++)
350
5.75M
      {
351
5.75M
        if (str[i] == ',')
352
1.44M
          count++;
353
5.75M
      }
354
355
600
      if (count != 8)
356
34
        goto error;
357
600
    }
358
359
566
    {
360
566
      size_t count = 0;
361
566
      tokens[count++] = str;
362
363
4.23M
      for (size_t i = 0; i < length; i++)
364
4.23M
      {
365
4.23M
        if (str[i] == ',')
366
3.96k
        {
367
3.96k
          str[i] = '\0';
368
3.96k
          tokens[count++] = &str[i + 1];
369
3.96k
        }
370
4.23M
      }
371
566
    }
372
566
  }
373
374
566
  if (strcmp(tokens[0], "65538") != 0)
375
65
    goto error;
376
377
501
  if (strcmp(tokens[1], "1") != 0)
378
1
    goto error;
379
380
500
  if (strcmp(tokens[3], "*") != 0)
381
3
    goto error;
382
383
497
  if (strcmp(tokens[5], "*") != 0)
384
3
    goto error;
385
386
494
  if (strcmp(tokens[6], "*") != 0)
387
1
    goto error;
388
389
493
  file->RASessionId = _strdup(tokens[4]);
390
391
493
  if (!file->RASessionId)
392
0
    goto error;
393
394
493
  file->RASpecificParams = _strdup(tokens[7]);
395
396
493
  if (!file->RASpecificParams)
397
0
    goto error;
398
399
493
  if (!freerdp_assistance_parse_address_list(file, tokens[2]))
400
169
    goto error;
401
402
324
  rc = TRUE;
403
600
error:
404
600
  free(str);
405
600
  return rc;
406
324
}
407
408
/**
409
 * Decrypted Connection String 2:
410
 *
411
 * <E>
412
 * <A KH="BNRjdu97DyczQSRuMRrDWoue+HA="
413
 * ID="+ULZ6ifjoCa6cGPMLQiGHRPwkg6VyJqGwxMnO6GcelwUh9a6/FBq3It5ADSndmLL"/> <C> <T ID="1" SID="0"> <L
414
 * P="49228" N="fe80::1032:53d9:5a01:909b%3"/> <L P="49229" N="fe80::3d8f:9b2d:6b4e:6aa%6"/> <L
415
 * P="49230" N="192.168.1.200"/> <L P="49231" N="169.254.6.170"/>
416
 * </T>
417
 * </C>
418
 * </E>
419
 */
420
421
static BOOL freerdp_assistance_parse_attr(const char** opt, size_t* plength, const char* key,
422
                                          const char* tag)
423
29.2k
{
424
29.2k
  WINPR_ASSERT(opt);
425
29.2k
  WINPR_ASSERT(plength);
426
29.2k
  WINPR_ASSERT(key);
427
428
29.2k
  *opt = NULL;
429
29.2k
  *plength = 0;
430
29.2k
  if (!tag)
431
0
    return FALSE;
432
433
29.2k
  char bkey[128] = { 0 };
434
29.2k
  const int rc = _snprintf(bkey, sizeof(bkey), "%s=\"", key);
435
29.2k
  WINPR_ASSERT(rc > 0);
436
29.2k
  WINPR_ASSERT((size_t)rc < sizeof(bkey));
437
29.2k
  if ((rc <= 0) || ((size_t)rc >= sizeof(bkey)))
438
0
    return FALSE;
439
440
29.2k
  char* p = strstr(tag, bkey);
441
29.2k
  if (!p)
442
22.1k
    return TRUE;
443
444
7.07k
  p += strlen(bkey);
445
7.07k
  char* q = strchr(p, '"');
446
447
7.07k
  if (!q)
448
91
  {
449
91
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: ConnectionString2 invalid field '%s=%s'",
450
91
             key, p);
451
91
    return FALSE;
452
91
  }
453
454
6.98k
  if (p > q)
455
0
  {
456
0
    WLog_ERR(TAG,
457
0
             "Failed to parse ASSISTANCE file: ConnectionString2 invalid field "
458
0
             "order for '%s'",
459
0
             key);
460
0
    return FALSE;
461
0
  }
462
6.98k
  const size_t length = WINPR_ASSERTING_INT_CAST(size_t, q - p);
463
6.98k
  *opt = p;
464
6.98k
  *plength = length;
465
466
6.98k
  return TRUE;
467
6.98k
}
468
469
static BOOL freerdp_assistance_parse_attr_str(char** opt, const char* key, const char* tag)
470
5.87k
{
471
5.87k
  const char* copt = NULL;
472
5.87k
  size_t size = 0;
473
5.87k
  if (!freerdp_assistance_parse_attr(&copt, &size, key, tag))
474
55
    return FALSE;
475
5.82k
  return update_option(opt, copt, size);
476
5.87k
}
477
478
static BOOL freerdp_assistance_parse_attr_bool(BOOL* opt, const char* key, const char* tag)
479
2.20k
{
480
2.20k
  const char* copt = NULL;
481
2.20k
  size_t size = 0;
482
483
2.20k
  WINPR_ASSERT(opt);
484
2.20k
  *opt = FALSE;
485
486
2.20k
  if (!freerdp_assistance_parse_attr(&copt, &size, key, tag))
487
2
    return FALSE;
488
2.20k
  if (size != 1)
489
2.19k
    return TRUE;
490
491
14
  *opt = (copt[0] == '1');
492
14
  return TRUE;
493
2.20k
}
494
495
static BOOL freerdp_assistance_parse_attr_uint32(UINT32* opt, const char* key, const char* tag)
496
13.8k
{
497
13.8k
  const char* copt = NULL;
498
13.8k
  size_t size = 0;
499
500
13.8k
  WINPR_ASSERT(opt);
501
13.8k
  *opt = 0;
502
503
13.8k
  if (!freerdp_assistance_parse_attr(&copt, &size, key, tag))
504
19
    return FALSE;
505
506
13.8k
  char buffer[64] = { 0 };
507
13.8k
  if ((!copt && (size > 0)) || (size >= sizeof(buffer)))
508
36
  {
509
36
    WLog_WARN(TAG, "Invalid UINT32 string '%s' [%" PRIuz "]", copt, size);
510
36
    return FALSE;
511
36
  }
512
513
13.7k
  if (size > 0)
514
1.02k
    strncpy(buffer, copt, size);
515
516
13.7k
  errno = 0;
517
13.7k
  unsigned long val = strtoul(buffer, NULL, 0);
518
519
13.7k
  if ((errno != 0) || (val > UINT32_MAX))
520
72
  {
521
72
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: Invalid value %s", buffer);
522
72
    return FALSE;
523
72
  }
524
525
13.7k
  *opt = (UINT32)val;
526
527
13.7k
  return TRUE;
528
13.7k
}
529
530
static char* freerdp_assistance_contains_element(char* input, size_t ilen, const char* key,
531
                                                 size_t* plen, char** pdata, size_t* pdlen)
532
127k
{
533
127k
  WINPR_ASSERT(input);
534
127k
  WINPR_ASSERT(key);
535
127k
  WINPR_ASSERT(plen);
536
537
127k
  char bkey[128] = { 0 };
538
127k
  const int rc = _snprintf(bkey, sizeof(bkey), "<%s", key);
539
127k
  WINPR_ASSERT(rc > 0);
540
127k
  WINPR_ASSERT((size_t)rc < sizeof(bkey));
541
127k
  if ((rc < 0) || ((size_t)rc >= sizeof(bkey)))
542
0
    return NULL;
543
544
127k
  char* tag = strstr(input, bkey);
545
127k
  if (!tag || (tag > input + ilen))
546
9.80k
    return NULL;
547
548
117k
  char* data = tag + strnlen(bkey, sizeof(bkey));
549
550
  /* Ensure there is a valid delimiter following our token */
551
117k
  switch (data[0])
552
117k
  {
553
3.00k
    case '>':
554
27.7k
    case '/':
555
70.4k
    case ' ':
556
72.6k
    case '\t':
557
72.6k
      break;
558
44.8k
    default:
559
44.8k
      WLog_ERR(TAG,
560
44.8k
               "Failed to parse ASSISTANCE file: ConnectionString2 missing delimiter after "
561
44.8k
               "field %s",
562
44.8k
               bkey);
563
44.8k
      return NULL;
564
117k
  }
565
566
72.6k
  char* start = strstr(tag, ">");
567
568
72.6k
  if (!start || (start > input + ilen))
569
5.73k
  {
570
5.73k
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: ConnectionString2 missing field %s", bkey);
571
5.73k
    return NULL;
572
5.73k
  }
573
574
66.8k
  const char* end = start;
575
66.8k
  const char* dend = start - 1;
576
66.8k
  if (*dend != '/')
577
3.49k
  {
578
3.49k
    char ekey[128] = { 0 };
579
3.49k
    const int erc = _snprintf(ekey, sizeof(ekey), "</%s>", key);
580
3.49k
    WINPR_ASSERT(erc > 0);
581
3.49k
    WINPR_ASSERT((size_t)erc < sizeof(ekey));
582
3.49k
    if ((erc <= 0) || ((size_t)erc >= sizeof(ekey)))
583
0
      return NULL;
584
6.98k
    const size_t offset = WINPR_ASSERTING_INT_CAST(size_t, start - tag);
585
6.98k
    dend = end = strrstr(start, ilen - offset, ekey);
586
6.98k
    if (end)
587
3.34k
      end += strnlen(ekey, sizeof(ekey));
588
6.98k
  }
589
590
66.8k
  if (!end)
591
144
  {
592
144
    WLog_ERR(TAG,
593
144
             "Failed to parse ASSISTANCE file: ConnectionString2 missing end tag for field %s",
594
144
             key);
595
144
    return NULL;
596
144
  }
597
66.7k
  if (plen)
598
66.7k
    *plen = WINPR_ASSERTING_INT_CAST(size_t, end - tag);
599
600
66.7k
  if (pdata)
601
66.0k
    *pdata = data;
602
66.7k
  if (pdlen)
603
66.0k
    *pdlen = WINPR_ASSERTING_INT_CAST(size_t, dend - data);
604
66.7k
  return tag;
605
66.7k
}
606
607
/**! \brief this function returns a XML element identified by \b key
608
 * The input string will be manipulated, so that the element found is '\0' terminated.
609
 *
610
 * This function can not find multiple elements on the same level as the input string is changed!
611
 */
612
static BOOL freerdp_assistance_consume_input_and_get_element(char* input, const char* key,
613
                                                             char** element, size_t* elen)
614
3.93k
{
615
3.93k
  WINPR_ASSERT(input);
616
3.93k
  WINPR_ASSERT(key);
617
3.93k
  WINPR_ASSERT(element);
618
3.93k
  WINPR_ASSERT(elen);
619
620
3.93k
  size_t len = 0;
621
3.93k
  size_t dlen = 0;
622
3.93k
  char* data = NULL;
623
3.93k
  char* tag = freerdp_assistance_contains_element(input, strlen(input), key, &len, &data, &dlen);
624
3.93k
  if (!tag)
625
896
    return FALSE;
626
627
3.03k
  char* end = data + dlen;
628
3.03k
  *tag = '\0';
629
3.03k
  *end = '\0';
630
3.03k
  *element = data;
631
3.03k
  *elen = dlen + 1;
632
3.03k
  return TRUE;
633
3.93k
}
634
635
static BOOL freerdp_assistance_get_element(char* input, size_t ilen, const char* key,
636
                                           char** element, size_t* elen)
637
122k
{
638
122k
  WINPR_ASSERT(input);
639
122k
  WINPR_ASSERT(key);
640
122k
  WINPR_ASSERT(element);
641
122k
  WINPR_ASSERT(elen);
642
643
122k
  size_t len = 0;
644
122k
  size_t dlen = 0;
645
122k
  char* data = NULL;
646
122k
  char* tag = freerdp_assistance_contains_element(input, ilen, key, &len, &data, &dlen);
647
122k
  if (!tag)
648
59.6k
    return FALSE;
649
650
63.0k
  if (tag + len > input + ilen)
651
0
    return FALSE;
652
653
63.0k
  char* end = tag + len;
654
63.0k
  *element = data;
655
63.0k
  *elen = WINPR_ASSERTING_INT_CAST(size_t, end - data + 1);
656
63.0k
  return TRUE;
657
63.0k
}
658
659
static BOOL freerdp_assistance_parse_all_elements_of(rdpAssistanceFile* file, char* data,
660
                                                     size_t len, const char* key,
661
                                                     BOOL (*fkt)(rdpAssistanceFile* file,
662
                                                                 char* data, size_t len))
663
59.9k
{
664
59.9k
  char* val = NULL;
665
59.9k
  size_t vlen = 0;
666
667
121k
  while (freerdp_assistance_get_element(data, len, key, &val, &vlen))
668
62.3k
  {
669
62.3k
    data = val + vlen;
670
62.3k
    len = strnlen(data, len);
671
62.3k
    if (vlen > 0)
672
62.3k
    {
673
62.3k
      val[vlen - 1] = '\0';
674
675
62.3k
      if (!fkt(file, val, vlen))
676
310
        return FALSE;
677
62.3k
    }
678
62.3k
  }
679
680
59.5k
  return TRUE;
681
59.9k
}
682
683
static BOOL freerdp_assistance_parse_all_elements_of_l(rdpAssistanceFile* file, char* data,
684
                                                       WINPR_ATTR_UNUSED size_t len)
685
3.03k
{
686
3.03k
  UINT32 p = 0;
687
3.03k
  const char* n = NULL;
688
3.03k
  const char* u = NULL;
689
3.03k
  size_t nlen = 0;
690
3.03k
  size_t ulen = 0;
691
3.03k
  if (!freerdp_assistance_parse_attr_uint32(&p, "P", data))
692
25
    return FALSE;
693
3.01k
  if (!freerdp_assistance_parse_attr(&n, &nlen, "N", data))
694
9
    return FALSE;
695
3.00k
  if (!freerdp_assistance_parse_attr(&u, &ulen, "U", data))
696
4
    return FALSE;
697
698
3.00k
  if (n && (nlen > 0))
699
672
  {
700
672
    if (!append_address_to_list(file->MachineAddresses, n, nlen))
701
0
      return FALSE;
702
672
    if (!ArrayList_Append(file->MachinePorts, (void*)(uintptr_t)p))
703
0
      return FALSE;
704
672
  }
705
3.00k
  if (u && (ulen > 0))
706
700
  {
707
700
    if (!append_address_to_list(file->MachineAddresses, u, ulen))
708
0
      return FALSE;
709
700
    if (!ArrayList_Append(file->MachinePorts, (void*)(uintptr_t)p))
710
0
      return FALSE;
711
700
  }
712
3.00k
  return TRUE;
713
3.00k
}
714
715
static BOOL freerdp_assistance_parse_all_elements_of_t(rdpAssistanceFile* file, char* data,
716
                                                       size_t len)
717
4.34k
{
718
4.34k
  UINT32 id = 0;
719
4.34k
  UINT32 sid = 0;
720
4.34k
  if (!freerdp_assistance_parse_attr_uint32(&id, "ID", data))
721
94
    return FALSE;
722
4.25k
  if (!freerdp_assistance_parse_attr_uint32(&sid, "SID", data))
723
4
    return FALSE;
724
4.24k
  WLog_DBG(TAG, "transport id=%" PRIu32 ", sid=%" PRIu32, id, sid);
725
4.24k
  return freerdp_assistance_parse_all_elements_of(file, data, len, "L",
726
4.24k
                                                  freerdp_assistance_parse_all_elements_of_l);
727
4.25k
}
728
729
static BOOL freerdp_assistance_parse_all_elements_of_c(rdpAssistanceFile* file, char* data,
730
                                                       size_t len)
731
55.0k
{
732
55.0k
  return freerdp_assistance_parse_all_elements_of(file, data, len, "T",
733
55.0k
                                                  freerdp_assistance_parse_all_elements_of_t);
734
55.0k
}
735
736
static BOOL freerdp_assistance_parse_find_elements_of_c(rdpAssistanceFile* file, char* data,
737
                                                        size_t len)
738
645
{
739
645
  return freerdp_assistance_parse_all_elements_of(file, data, len, "C",
740
645
                                                  freerdp_assistance_parse_all_elements_of_c);
741
645
}
742
743
static BOOL freerdp_assistance_parse_connection_string2(rdpAssistanceFile* file)
744
838
{
745
838
  BOOL rc = FALSE;
746
747
838
  WINPR_ASSERT(file);
748
749
838
  if (!file->ConnectionString2)
750
1
    return FALSE;
751
752
837
  char* str = _strdup(file->ConnectionString2);
753
837
  if (!str)
754
0
    goto out_fail;
755
756
837
  {
757
837
    char* e = NULL;
758
837
    size_t elen = 0;
759
837
    if (!freerdp_assistance_consume_input_and_get_element(str, "E", &e, &elen))
760
172
      goto out_fail;
761
762
665
    if (!e || (elen == 0))
763
0
      goto out_fail;
764
665
    {
765
665
      char* a = NULL;
766
665
      size_t alen = 0;
767
665
      if (!freerdp_assistance_get_element(e, elen, "A", &a, &alen))
768
20
        goto out_fail;
769
770
645
      if (!a || (alen == 0))
771
0
        goto out_fail;
772
773
645
      if (!freerdp_assistance_parse_find_elements_of_c(file, e, elen))
774
136
        goto out_fail;
775
776
      /* '\0' terminate the detected XML elements so
777
       * the parser can continue with terminated strings
778
       */
779
509
      a[alen] = '\0';
780
781
509
      if (!freerdp_assistance_parse_attr_str(&file->RASpecificParams, "KH", a))
782
39
        goto out_fail;
783
784
470
      if (!freerdp_assistance_parse_attr_str(&file->RASpecificParams2, "KH2", a))
785
6
        goto out_fail;
786
787
464
      if (!freerdp_assistance_parse_attr_str(&file->RASessionId, "ID", a))
788
5
        goto out_fail;
789
464
    }
790
464
  }
791
459
  rc = TRUE;
792
837
out_fail:
793
837
  free(str);
794
837
  return rc;
795
459
}
796
797
char* freerdp_assistance_construct_expert_blob(const char* name, const char* pass)
798
0
{
799
0
  if (!name || !pass)
800
0
    return NULL;
801
802
0
  const size_t nameLength = strlen(name) + strlen("NAME=");
803
0
  const size_t passLength = strlen(pass) + strlen("PASS=");
804
0
  const size_t size = nameLength + passLength + 64;
805
0
  char* ExpertBlob = (char*)calloc(1, size);
806
807
0
  if (!ExpertBlob)
808
0
    return NULL;
809
810
0
  (void)sprintf_s(ExpertBlob, size, "%" PRIuz ";NAME=%s%" PRIuz ";PASS=%s", nameLength, name,
811
0
                  passLength, pass);
812
0
  return ExpertBlob;
813
0
}
814
815
char* freerdp_assistance_generate_pass_stub(WINPR_ATTR_UNUSED DWORD flags)
816
0
{
817
0
  UINT32 nums[14] = { 0 };
818
0
  const char set1[64] = { 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M',
819
0
                        'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z',
820
0
                        'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm',
821
0
                        'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z',
822
0
                        '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '*', '_' };
823
0
  const char set2[12] = { '!', '@', '#', '$', '&', '^', '*', '(', ')', '-', '+', '=' };
824
0
  const char set3[10] = { '0', '1', '2', '3', '4', '5', '6', '7', '8', '9' };
825
0
  const char set4[26] = { 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M',
826
0
                        'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z' };
827
0
  const char set5[26] = { 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm',
828
0
                        'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z' };
829
0
  char* passStub = calloc(15, sizeof(char));
830
831
0
  if (!passStub)
832
0
    return NULL;
833
834
  /**
835
   * PassStub generation:
836
   *
837
   * Characters 0 and 5-13 are from the set A-Z a-z 0-9 * _
838
   * Character 1 is from the set !@#$&^*()-+=
839
   * Character 2 is from the set 0-9
840
   * Character 3 is from the set A-Z
841
   * Character 4 is from the set a-z
842
   *
843
   * Example: WB^6HsrIaFmEpi
844
   */
845
0
  winpr_RAND(nums, sizeof(nums));
846
0
  passStub[0] = set1[nums[0] % sizeof(set1)];   /* character 0 */
847
0
  passStub[1] = set2[nums[1] % sizeof(set2)];   /* character 1 */
848
0
  passStub[2] = set3[nums[2] % sizeof(set3)];   /* character 2 */
849
0
  passStub[3] = set4[nums[3] % sizeof(set4)];   /* character 3 */
850
0
  passStub[4] = set5[nums[4] % sizeof(set5)];   /* character 4 */
851
852
0
  for (size_t x = 5; x < ARRAYSIZE(nums); x++)
853
0
    passStub[x] = set1[nums[x] % sizeof(set1)]; /* character 5 - 13 */
854
0
  return passStub;
855
0
}
856
857
BYTE* freerdp_assistance_encrypt_pass_stub(const char* password, const char* passStub,
858
                                           size_t* pEncryptedSize)
859
324
{
860
324
  BOOL rc = 0;
861
324
  size_t cbPasswordW = 0;
862
324
  size_t cbPassStubW = 0;
863
324
  BYTE PasswordHash[WINPR_MD5_DIGEST_LENGTH] = { 0 };
864
324
  WINPR_RC4_CTX* rc4Ctx = NULL;
865
324
  BYTE* pbIn = NULL;
866
324
  BYTE* pbOut = NULL;
867
324
  BYTE* res = NULL;
868
324
  WCHAR* PasswordW = ConvertUtf8ToWCharAlloc(password, &cbPasswordW);
869
324
  WCHAR* PassStubW = ConvertUtf8ToWCharAlloc(passStub, &cbPassStubW);
870
871
324
  cbPasswordW = (cbPasswordW) * sizeof(WCHAR);
872
324
  cbPassStubW = (cbPassStubW) * sizeof(WCHAR);
873
324
  const size_t EncryptedSize = cbPassStubW + 4;
874
875
324
  if (!PasswordW || !PassStubW)
876
79
    goto fail;
877
878
245
  if (!winpr_Digest(WINPR_MD_MD5, (BYTE*)PasswordW, cbPasswordW, (BYTE*)PasswordHash,
879
245
                    sizeof(PasswordHash)))
880
0
    goto fail;
881
882
245
  pbIn = (BYTE*)calloc(1, EncryptedSize);
883
245
  pbOut = (BYTE*)calloc(1, EncryptedSize);
884
885
245
  if (!pbIn || !pbOut)
886
0
    goto fail;
887
888
245
  WINPR_ASSERT(cbPasswordW <= UINT32_MAX);
889
245
  winpr_Data_Write_UINT32(pbIn, (UINT32)cbPassStubW);
890
245
  CopyMemory(&pbIn[4], PassStubW, cbPassStubW);
891
245
  rc4Ctx = winpr_RC4_New(PasswordHash, sizeof(PasswordHash));
892
893
245
  if (!rc4Ctx)
894
0
  {
895
0
    WLog_ERR(TAG, "winpr_Cipher_New failure");
896
0
    goto fail;
897
0
  }
898
899
245
  rc = winpr_RC4_Update(rc4Ctx, EncryptedSize, pbIn, pbOut);
900
901
245
  if (!rc)
902
0
  {
903
0
    WLog_ERR(TAG, "winpr_Cipher_Update failure");
904
0
    goto fail;
905
0
  }
906
245
  res = pbOut;
907
324
fail:
908
324
  winpr_RC4_Free(rc4Ctx);
909
324
  free(PasswordW);
910
324
  free(PassStubW);
911
324
  free(pbIn);
912
324
  if (!res)
913
79
    free(pbOut);
914
245
  else
915
245
    *pEncryptedSize = EncryptedSize;
916
324
  return res;
917
245
}
918
919
static BOOL freerdp_assistance_decrypt2(rdpAssistanceFile* file)
920
470
{
921
470
  BOOL rc = FALSE;
922
470
  int status = 0;
923
470
  size_t cbPasswordW = 0;
924
470
  size_t cchOutW = 0;
925
470
  WINPR_CIPHER_CTX* aesDec = NULL;
926
470
  WCHAR* PasswordW = NULL;
927
470
  BYTE* pbIn = NULL;
928
470
  BYTE* pbOut = NULL;
929
470
  size_t cbOut = 0;
930
470
  size_t cbIn = 0;
931
470
  size_t cbFinal = 0;
932
470
  BYTE DerivedKey[WINPR_AES_BLOCK_SIZE] = { 0 };
933
470
  BYTE InitializationVector[WINPR_AES_BLOCK_SIZE] = { 0 };
934
470
  BYTE PasswordHash[WINPR_SHA1_DIGEST_LENGTH] = { 0 };
935
936
470
  WINPR_ASSERT(file);
937
938
470
  if (!file->password)
939
0
    return FALSE;
940
941
470
  PasswordW = ConvertUtf8ToWCharAlloc(file->password, &cbPasswordW);
942
470
  if (!PasswordW)
943
0
  {
944
0
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: Conversion from UCS2 to UTF8 failed");
945
0
    return FALSE;
946
0
  }
947
948
470
  cbPasswordW = (cbPasswordW) * sizeof(WCHAR);
949
950
470
  if (!winpr_Digest(WINPR_MD_SHA1, (BYTE*)PasswordW, cbPasswordW, PasswordHash,
951
470
                    sizeof(PasswordHash)))
952
0
    goto fail;
953
954
470
  if (!freerdp_assistance_crypt_derive_key_sha1(PasswordHash, sizeof(PasswordHash), DerivedKey,
955
470
                                                sizeof(DerivedKey)))
956
0
    goto fail;
957
958
470
  aesDec =
959
470
      winpr_Cipher_NewEx(WINPR_CIPHER_AES_128_CBC, WINPR_DECRYPT, DerivedKey, sizeof(DerivedKey),
960
470
                         InitializationVector, sizeof(InitializationVector));
961
962
470
  if (!aesDec)
963
0
    goto fail;
964
965
470
  cbOut = cbFinal = 0;
966
470
  cbIn = file->EncryptedLHTicketLength;
967
470
  pbIn = file->EncryptedLHTicket;
968
470
  pbOut = (BYTE*)calloc(1, cbIn + WINPR_AES_BLOCK_SIZE + 2);
969
970
470
  if (!pbOut)
971
0
    goto fail;
972
973
470
  if (!winpr_Cipher_Update(aesDec, pbIn, cbIn, pbOut, &cbOut))
974
0
    goto fail;
975
976
470
  if (!winpr_Cipher_Final(aesDec, pbOut + cbOut, &cbFinal))
977
210
  {
978
210
    WLog_ERR(TAG, "winpr_Cipher_Final failure");
979
210
    goto fail;
980
210
  }
981
982
260
  cbOut += cbFinal;
983
260
  cbFinal = 0;
984
985
260
  union
986
260
  {
987
260
    const WCHAR* wc;
988
260
    const BYTE* b;
989
260
  } cnv;
990
991
260
  cnv.b = pbOut;
992
260
  cchOutW = cbOut / sizeof(WCHAR);
993
994
260
  if (!update_connectionstring2_wchar(file, cnv.wc, cchOutW))
995
90
  {
996
90
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: Conversion from UCS2 to UTF8 failed");
997
90
    goto fail;
998
90
  }
999
1000
170
  if (!freerdp_assistance_parse_connection_string2(file))
1001
170
    goto fail;
1002
1003
0
  rc = TRUE;
1004
470
fail:
1005
470
  winpr_Cipher_Free(aesDec);
1006
470
  free(PasswordW);
1007
470
  free(pbOut);
1008
470
  WLog_DBG(TAG, "freerdp_assistance_parse_connection_string2: %d", status);
1009
470
  return rc;
1010
0
}
1011
1012
BYTE* freerdp_assistance_hex_string_to_bin(const void* raw, size_t* size)
1013
470
{
1014
470
  BYTE* buffer = NULL;
1015
470
  if (!raw || !size)
1016
0
    return NULL;
1017
470
  *size = 0;
1018
470
  const size_t length = strlen(raw);
1019
470
  buffer = calloc(length, sizeof(BYTE));
1020
470
  if (!buffer)
1021
0
    return NULL;
1022
470
  const size_t rc = winpr_HexStringToBinBuffer(raw, length, buffer, length);
1023
470
  if (rc == 0)
1024
1
  {
1025
1
    free(buffer);
1026
1
    return NULL;
1027
1
  }
1028
469
  *size = rc;
1029
469
  return buffer;
1030
470
}
1031
1032
char* freerdp_assistance_bin_to_hex_string(const void* raw, size_t size)
1033
0
{
1034
0
  return winpr_BinToHexString(raw, size, FALSE);
1035
0
}
1036
1037
static int freerdp_assistance_parse_uploadinfo(rdpAssistanceFile* file, char* uploadinfo,
1038
                                               size_t uploadinfosize)
1039
1.26k
{
1040
1.26k
  const char escalated[9] = { 'E', 's', 'c', 'a', 'l', 'a', 't', 'e', 'd' };
1041
1.26k
  const size_t esclen = sizeof(escalated);
1042
1.26k
  const char* typestr = NULL;
1043
1.26k
  size_t typelen = 0;
1044
1045
1.26k
  if (!uploadinfo || (uploadinfosize == 0))
1046
0
    return -1;
1047
1048
1.26k
  if (strnlen(uploadinfo, uploadinfosize) == uploadinfosize)
1049
0
  {
1050
0
    WLog_WARN(TAG, "UPLOADINFOR string is not '\0' terminated");
1051
0
    return -1;
1052
0
  }
1053
1054
1.26k
  if (!freerdp_assistance_parse_attr(&typestr, &typelen, "TYPE", uploadinfo))
1055
2
    return -1;
1056
1057
1.25k
  if ((typelen != esclen) || (strncmp(typestr, escalated, esclen) != 0))
1058
143
  {
1059
143
    WLog_ERR(TAG,
1060
143
             "Failed to parse ASSISTANCE file: Missing or invalid UPLOADINFO TYPE '%s' [%" PRIuz
1061
143
             "]",
1062
143
             typestr, typelen);
1063
143
    return -1;
1064
143
  }
1065
1066
1.11k
  char* uploaddata = NULL;
1067
1.11k
  size_t uploaddatasize = 0;
1068
1.11k
  if (!freerdp_assistance_consume_input_and_get_element(uploadinfo, "UPLOADDATA", &uploaddata,
1069
1.11k
                                                        &uploaddatasize))
1070
4
    return -1;
1071
1072
  /* Parse USERNAME */
1073
1.11k
  if (!freerdp_assistance_parse_attr_str(&file->Username, "USERNAME", uploaddata))
1074
2
    return -1;
1075
1076
  /* Parse LHTICKET */
1077
1.10k
  if (!freerdp_assistance_parse_attr_str(&file->LHTicket, "LHTICKET", uploaddata))
1078
1
    return -1;
1079
1080
  /* Parse RCTICKET */
1081
1.10k
  if (!freerdp_assistance_parse_attr_str(&file->RCTicket, "RCTICKET", uploaddata))
1082
1
    return -1;
1083
1084
  /* Parse RCTICKETENCRYPTED */
1085
1.10k
  if (!freerdp_assistance_parse_attr_bool(&file->RCTicketEncrypted, "RCTICKETENCRYPTED",
1086
1.10k
                                          uploaddata))
1087
1
    return -1;
1088
1089
  /* Parse PassStub */
1090
1.10k
  if (!freerdp_assistance_parse_attr_str(&file->PassStub, "PassStub", uploaddata))
1091
1
    return -1;
1092
1093
1.10k
  if (file->PassStub)
1094
282
  {
1095
282
    const char* amp = "&amp;";
1096
282
    char* passtub = strstr(file->PassStub, amp);
1097
565
    while (passtub)
1098
283
    {
1099
283
      const char* end = passtub + 5;
1100
283
      const size_t len = strlen(end);
1101
283
      memmove(&passtub[1], end, len + 1);
1102
283
      passtub = strstr(passtub, amp);
1103
283
    }
1104
282
  }
1105
1106
  /* Parse DtStart */
1107
1.10k
  if (!freerdp_assistance_parse_attr_uint32(&file->DtStart, "DtStart", uploaddata))
1108
2
    return -1;
1109
1110
  /* Parse DtLength */
1111
1.10k
  if (!freerdp_assistance_parse_attr_uint32(&file->DtLength, "DtLength", uploaddata))
1112
2
    return -1;
1113
1114
  /* Parse L (LowSpeed) */
1115
1.10k
  if (!freerdp_assistance_parse_attr_bool(&file->LowSpeed, "L", uploaddata))
1116
1
    return -1;
1117
1118
1.10k
  file->Type = (file->LHTicket) ? 2 : 1;
1119
1.10k
  int status = 0;
1120
1121
1.10k
  switch (file->Type)
1122
1.10k
  {
1123
470
    case 2:
1124
470
    {
1125
470
      file->EncryptedLHTicket = freerdp_assistance_hex_string_to_bin(
1126
470
          file->LHTicket, &file->EncryptedLHTicketLength);
1127
1128
470
      if (!freerdp_assistance_decrypt2(file))
1129
470
        status = -1;
1130
470
    }
1131
470
    break;
1132
1133
630
    case 1:
1134
630
    {
1135
630
      if (!freerdp_assistance_parse_connection_string1(file))
1136
306
        status = -1;
1137
630
    }
1138
630
    break;
1139
1140
0
    default:
1141
0
      return -1;
1142
1.10k
  }
1143
1144
1.10k
  if (status < 0)
1145
776
  {
1146
776
    WLog_ERR(TAG, "freerdp_assistance_parse_connection_string1 failure: %d", status);
1147
776
    return -1;
1148
776
  }
1149
1150
324
  file->EncryptedPassStub = freerdp_assistance_encrypt_pass_stub(file->password, file->PassStub,
1151
324
                                                                 &file->EncryptedPassStubLength);
1152
1153
324
  if (!file->EncryptedPassStub)
1154
79
    return -1;
1155
1156
245
  return 1;
1157
324
}
1158
1159
static int freerdp_assistance_parse_file_buffer_int(rdpAssistanceFile* file, char* buffer,
1160
                                                    size_t size, const char* password)
1161
1.98k
{
1162
1.98k
  WINPR_ASSERT(file);
1163
1.98k
  WINPR_ASSERT(buffer);
1164
1.98k
  WINPR_ASSERT(size > 0);
1165
1166
1.98k
  if (!update_password(file, password))
1167
0
    return -1;
1168
1169
1.98k
  char* uploadinfo = NULL;
1170
1.98k
  size_t uploadinfosize = 0;
1171
1.98k
  if (freerdp_assistance_consume_input_and_get_element(buffer, "UPLOADINFO", &uploadinfo,
1172
1.98k
                                                       &uploadinfosize))
1173
1.26k
    return freerdp_assistance_parse_uploadinfo(file, uploadinfo, uploadinfosize);
1174
1175
720
  size_t elen = 0;
1176
720
  const char* estr = freerdp_assistance_contains_element(buffer, size, "E", &elen, NULL, NULL);
1177
720
  if (!estr || (elen == 0))
1178
52
  {
1179
52
    WLog_ERR(TAG, "Failed to parse ASSISTANCE file: Neither UPLOADINFO nor <E> found");
1180
52
    return -1;
1181
52
  }
1182
668
  if (!update_connectionstring2(file, estr, elen))
1183
0
    return -1;
1184
1185
668
  if (!freerdp_assistance_parse_connection_string2(file))
1186
209
    return -1;
1187
1188
459
  return 1;
1189
668
}
1190
1191
int freerdp_assistance_parse_file_buffer(rdpAssistanceFile* file, const char* cbuffer, size_t size,
1192
                                         const char* password)
1193
1.98k
{
1194
1.98k
  WINPR_ASSERT(file);
1195
1.98k
  if (!password)
1196
0
  {
1197
0
    WLog_WARN(TAG, "empty password supplied");
1198
0
  }
1199
1200
1.98k
  if (!cbuffer || (size == 0))
1201
0
  {
1202
0
    WLog_WARN(TAG, "no data supplied [%p, %" PRIuz "]", cbuffer, size);
1203
0
    return -1;
1204
0
  }
1205
1206
1.98k
  char* abuffer = strndup(cbuffer, size);
1207
1.98k
  const size_t len = strnlen(cbuffer, size);
1208
1.98k
  if (len == size)
1209
0
    WLog_WARN(TAG, "Input data not '\0' terminated");
1210
1211
1.98k
  if (!abuffer)
1212
0
    return -1;
1213
1214
1.98k
  const int rc = freerdp_assistance_parse_file_buffer_int(file, abuffer, len + 1, password);
1215
1.98k
  free(abuffer);
1216
1.98k
  return rc;
1217
1.98k
}
1218
1219
int freerdp_assistance_parse_file(rdpAssistanceFile* file, const char* name, const char* password)
1220
0
{
1221
0
  int status = 0;
1222
0
  BYTE* buffer = NULL;
1223
0
  FILE* fp = NULL;
1224
0
  size_t readSize = 0;
1225
0
  union
1226
0
  {
1227
0
    INT64 i64;
1228
0
    size_t s;
1229
0
  } fileSize;
1230
1231
0
  if (!update_name(file, name))
1232
0
    return -1;
1233
1234
0
  fp = winpr_fopen(name, "r");
1235
1236
0
  if (!fp)
1237
0
  {
1238
0
    WLog_ERR(TAG, "Failed to open ASSISTANCE file %s ", name);
1239
0
    return -1;
1240
0
  }
1241
1242
0
  (void)_fseeki64(fp, 0, SEEK_END);
1243
0
  fileSize.i64 = _ftelli64(fp);
1244
0
  (void)_fseeki64(fp, 0, SEEK_SET);
1245
1246
0
  if (fileSize.i64 < 1)
1247
0
  {
1248
0
    WLog_ERR(TAG, "Failed to read ASSISTANCE file %s ", name);
1249
0
    (void)fclose(fp);
1250
0
    return -1;
1251
0
  }
1252
1253
0
  buffer = (BYTE*)malloc(fileSize.s + 2);
1254
1255
0
  if (!buffer)
1256
0
  {
1257
0
    (void)fclose(fp);
1258
0
    return -1;
1259
0
  }
1260
1261
0
  readSize = fread(buffer, fileSize.s, 1, fp);
1262
1263
0
  if (!readSize)
1264
0
  {
1265
0
    if (!ferror(fp))
1266
0
      readSize = fileSize.s;
1267
0
  }
1268
1269
0
  (void)fclose(fp);
1270
1271
0
  if (readSize < 1)
1272
0
  {
1273
0
    WLog_ERR(TAG, "Failed to read ASSISTANCE file %s ", name);
1274
0
    free(buffer);
1275
0
    buffer = NULL;
1276
0
    return -1;
1277
0
  }
1278
1279
0
  buffer[fileSize.s] = '\0';
1280
0
  buffer[fileSize.s + 1] = '\0';
1281
0
  status = freerdp_assistance_parse_file_buffer(file, (char*)buffer, fileSize.s, password);
1282
0
  free(buffer);
1283
0
  return status;
1284
0
}
1285
1286
BOOL freerdp_assistance_populate_settings_from_assistance_file(rdpAssistanceFile* file,
1287
                                                               rdpSettings* settings)
1288
0
{
1289
0
  if (!freerdp_settings_set_bool(settings, FreeRDP_RemoteAssistanceMode, TRUE))
1290
0
    return FALSE;
1291
1292
0
  if (!file->RASessionId || !file->MachineAddresses)
1293
0
    return FALSE;
1294
1295
0
  if (!freerdp_settings_set_string(settings, FreeRDP_RemoteAssistanceSessionId,
1296
0
                                   file->RASessionId))
1297
0
    return FALSE;
1298
1299
0
  if (file->RCTicket)
1300
0
  {
1301
0
    if (!freerdp_settings_set_string(settings, FreeRDP_RemoteAssistanceRCTicket,
1302
0
                                     file->RCTicket))
1303
0
      return FALSE;
1304
0
  }
1305
0
  else
1306
0
  {
1307
0
    if (!freerdp_settings_set_string(settings, FreeRDP_RemoteAssistanceRCTicket,
1308
0
                                     file->ConnectionString2))
1309
0
      return FALSE;
1310
0
  }
1311
1312
0
  if (file->PassStub)
1313
0
  {
1314
0
    if (!freerdp_settings_set_string(settings, FreeRDP_RemoteAssistancePassStub,
1315
0
                                     file->PassStub))
1316
0
      return FALSE;
1317
0
  }
1318
1319
0
  if (ArrayList_Count(file->MachineAddresses) < 1)
1320
0
    return FALSE;
1321
1322
0
  const char* addr = ArrayList_GetItem(file->MachineAddresses, 0);
1323
0
  if (!freerdp_settings_set_string(settings, FreeRDP_ServerHostname, addr))
1324
0
    return FALSE;
1325
1326
0
  if (!freerdp_settings_set_string(settings, FreeRDP_AssistanceFile, file->filename))
1327
0
    return FALSE;
1328
1329
0
  if (!freerdp_settings_set_string(settings, FreeRDP_RemoteAssistancePassword, file->password))
1330
0
    return FALSE;
1331
1332
0
  if (file->Username)
1333
0
  {
1334
0
    if (!freerdp_settings_set_string(settings, FreeRDP_Username, file->Username))
1335
0
      return FALSE;
1336
0
  }
1337
1338
0
  if (!freerdp_settings_set_bool(settings, FreeRDP_RemoteAssistanceMode, TRUE))
1339
0
    return FALSE;
1340
1341
0
  const size_t ports = ArrayList_Count(file->MachinePorts);
1342
0
  const size_t addresses = ArrayList_Count(file->MachineAddresses);
1343
0
  if (ports < 1)
1344
0
    return FALSE;
1345
0
  if (ports != addresses)
1346
0
    return FALSE;
1347
1348
0
  union
1349
0
  {
1350
0
    uintptr_t port;
1351
0
    void* data;
1352
0
  } cnv;
1353
0
  cnv.data = ArrayList_GetItem(file->MachinePorts, 0);
1354
0
  WINPR_ASSERT(cnv.port <= UINT32_MAX);
1355
0
  if (!freerdp_settings_set_uint32(settings, FreeRDP_ServerPort, (UINT32)cnv.port))
1356
0
    return FALSE;
1357
1358
0
  if (!freerdp_target_net_adresses_reset(settings, ports))
1359
0
    return FALSE;
1360
1361
0
  for (size_t x = 0; x < ports; x++)
1362
0
  {
1363
0
    cnv.data = ArrayList_GetItem(file->MachinePorts, x);
1364
0
    WINPR_ASSERT(cnv.port <= UINT32_MAX);
1365
0
    const UINT32 port = (UINT32)cnv.port;
1366
0
    if (!freerdp_settings_set_pointer_array(settings, FreeRDP_TargetNetPorts, x, &port))
1367
0
      return FALSE;
1368
0
  }
1369
0
  for (size_t i = 0; i < addresses; i++)
1370
0
  {
1371
0
    const char* maddr = ArrayList_GetItem(file->MachineAddresses, i);
1372
0
    if (!freerdp_settings_set_pointer_array(settings, FreeRDP_TargetNetAddresses, i, maddr))
1373
0
      return FALSE;
1374
0
  }
1375
1376
0
  return TRUE;
1377
0
}
1378
1379
static BOOL setup_string(wArrayList* list)
1380
3.96k
{
1381
3.96k
  WINPR_ASSERT(list);
1382
1383
3.96k
  wObject* obj = ArrayList_Object(list);
1384
3.96k
  if (!obj)
1385
0
    return FALSE;
1386
3.96k
  obj->fnObjectFree = free;
1387
  // obj->fnObjectNew = wwinpr_ObjectStringClone;
1388
3.96k
  return TRUE;
1389
3.96k
}
1390
1391
rdpAssistanceFile* freerdp_assistance_file_new(void)
1392
1.98k
{
1393
1.98k
  winpr_InitializeSSL(WINPR_SSL_INIT_DEFAULT);
1394
1.98k
  rdpAssistanceFile* file = calloc(1, sizeof(rdpAssistanceFile));
1395
1.98k
  if (!file)
1396
0
    return NULL;
1397
1398
1.98k
  file->MachineAddresses = ArrayList_New(FALSE);
1399
1.98k
  file->MachinePorts = ArrayList_New(FALSE);
1400
1.98k
  file->MachineUris = ArrayList_New(FALSE);
1401
1402
1.98k
  if (!file->MachineAddresses || !file->MachinePorts || !file->MachineUris)
1403
0
    goto fail;
1404
1405
1.98k
  if (!setup_string(file->MachineAddresses) || !setup_string(file->MachineUris))
1406
0
    goto fail;
1407
1408
1.98k
  return file;
1409
1410
0
fail:
1411
0
  WINPR_PRAGMA_DIAG_PUSH
1412
0
  WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
1413
0
  freerdp_assistance_file_free(file);
1414
0
  WINPR_PRAGMA_DIAG_POP
1415
0
  return NULL;
1416
1.98k
}
1417
1418
void freerdp_assistance_file_free(rdpAssistanceFile* file)
1419
1.98k
{
1420
1.98k
  if (!file)
1421
0
    return;
1422
1423
1.98k
  update_password(file, NULL);
1424
1.98k
  update_connectionstring2(file, NULL, 0);
1425
1.98k
  free(file->filename);
1426
1.98k
  free(file->Username);
1427
1.98k
  free(file->LHTicket);
1428
1.98k
  free(file->RCTicket);
1429
1.98k
  free(file->PassStub);
1430
1.98k
  free(file->ConnectionString1);
1431
1.98k
  free(file->EncryptedLHTicket);
1432
1.98k
  free(file->RASessionId);
1433
1.98k
  free(file->RASpecificParams);
1434
1.98k
  free(file->RASpecificParams2);
1435
1.98k
  free(file->EncryptedPassStub);
1436
1437
1.98k
  ArrayList_Free(file->MachineAddresses);
1438
1.98k
  ArrayList_Free(file->MachinePorts);
1439
1.98k
  ArrayList_Free(file->MachineUris);
1440
1.98k
  free(file);
1441
1.98k
}
1442
1443
void freerdp_assistance_print_file(rdpAssistanceFile* file, wLog* log, DWORD level)
1444
0
{
1445
0
  WINPR_ASSERT(file);
1446
1447
0
  WLog_Print(log, level, "Username: %s", file->Username);
1448
0
  WLog_Print(log, level, "LHTicket: %s", file->LHTicket);
1449
0
  WLog_Print(log, level, "RCTicket: %s", file->RCTicket);
1450
0
  WLog_Print(log, level, "RCTicketEncrypted: %" PRId32, file->RCTicketEncrypted);
1451
0
  WLog_Print(log, level, "PassStub: %s", file->PassStub);
1452
0
  WLog_Print(log, level, "DtStart: %" PRIu32, file->DtStart);
1453
0
  WLog_Print(log, level, "DtLength: %" PRIu32, file->DtLength);
1454
0
  WLog_Print(log, level, "LowSpeed: %" PRId32, file->LowSpeed);
1455
0
  WLog_Print(log, level, "RASessionId: %s", file->RASessionId);
1456
0
  WLog_Print(log, level, "RASpecificParams: %s", file->RASpecificParams);
1457
0
  WLog_Print(log, level, "RASpecificParams2: %s", file->RASpecificParams2);
1458
1459
0
  for (size_t x = 0; x < ArrayList_Count(file->MachineAddresses); x++)
1460
0
  {
1461
0
    UINT32 port = 0;
1462
0
    const char* uri = NULL;
1463
0
    const char* addr = ArrayList_GetItem(file->MachineAddresses, x);
1464
0
    if (x < ArrayList_Count(file->MachinePorts))
1465
0
    {
1466
0
      union
1467
0
      {
1468
0
        uintptr_t port;
1469
0
        void* data;
1470
0
      } cnv;
1471
0
      cnv.data = ArrayList_GetItem(file->MachinePorts, x);
1472
0
      WINPR_ASSERT(cnv.port <= UINT32_MAX);
1473
0
      port = (UINT32)cnv.port;
1474
0
    }
1475
0
    if (x < ArrayList_Count(file->MachineUris))
1476
0
      uri = ArrayList_GetItem(file->MachineUris, x);
1477
1478
0
    WLog_Print(log, level, "MachineAddress [%" PRIuz ": %s", x, addr);
1479
0
    WLog_Print(log, level, "MachinePort    [%" PRIuz ": %" PRIu32, x, port);
1480
0
    WLog_Print(log, level, "MachineURI     [%" PRIuz ": %s", x, uri);
1481
0
  }
1482
0
}
1483
1484
BOOL freerdp_assistance_get_encrypted_pass_stub(rdpAssistanceFile* file, const char** pwd,
1485
                                                size_t* size)
1486
0
{
1487
0
  if (!file || !pwd || !size)
1488
0
    return FALSE;
1489
1490
0
  *pwd = (const char*)file->EncryptedPassStub;
1491
0
  *size = file->EncryptedPassStubLength;
1492
0
  return TRUE;
1493
0
}
1494
1495
int freerdp_assistance_set_connection_string2(rdpAssistanceFile* file, const char* string,
1496
                                              const char* password)
1497
0
{
1498
0
  if (!file || !string || !password)
1499
0
    return -1;
1500
1501
0
  char* str = _strdup(string);
1502
0
  if (!str)
1503
0
    return -1;
1504
1505
0
  if (!update_connectionstring2_nocopy(file, str))
1506
0
    return -1;
1507
0
  if (!update_password(file, password))
1508
0
    return -1;
1509
0
  return freerdp_assistance_parse_connection_string2(file);
1510
0
}