Coverage Report

Created: 2024-05-20 06:11

/src/FreeRDP/libfreerdp/core/info.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Client Info
4
 *
5
 * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 * Copyright 2015 Thincast Technologies GmbH
7
 * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
8
 *
9
 * Licensed under the Apache License, Version 2.0 (the "License");
10
 * you may not use this file except in compliance with the License.
11
 * You may obtain a copy of the License at
12
 *
13
 *     http://www.apache.org/licenses/LICENSE-2.0
14
 *
15
 * Unless required by applicable law or agreed to in writing, software
16
 * distributed under the License is distributed on an "AS IS" BASIS,
17
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18
 * See the License for the specific language governing permissions and
19
 * limitations under the License.
20
 */
21
22
#include <freerdp/config.h>
23
24
#include "settings.h"
25
26
#include <winpr/crt.h>
27
#include <winpr/assert.h>
28
29
#include <freerdp/crypto/crypto.h>
30
#include <freerdp/log.h>
31
#include <freerdp/session.h>
32
#include <stdio.h>
33
34
#include "timezone.h"
35
36
#include "info.h"
37
38
39
#define TAG FREERDP_TAG("core.info")
39
40
242
#define logonInfoV2Size (2 + 4 + 4 + 4 + 4)
41
179
#define logonInfoV2ReservedSize 558
42
121
#define logonInfoV2TotalSize (logonInfoV2Size + logonInfoV2ReservedSize)
43
44
static const char* const INFO_TYPE_LOGON_STRINGS[4] = { "Logon Info V1", "Logon Info V2",
45
                                                      "Logon Plain Notify",
46
                                                      "Logon Extended Info" };
47
48
/* This define limits the length of the strings in the label field. */
49
0
#define MAX_LABEL_LENGTH 40
50
struct info_flags_t
51
{
52
  UINT32 flag;
53
  const char* label;
54
};
55
56
static const struct info_flags_t info_flags[] = {
57
  { INFO_MOUSE, "INFO_MOUSE" },
58
  { INFO_DISABLECTRLALTDEL, "INFO_DISABLECTRLALTDEL" },
59
  { INFO_AUTOLOGON, "INFO_AUTOLOGON" },
60
  { INFO_UNICODE, "INFO_UNICODE" },
61
  { INFO_MAXIMIZESHELL, "INFO_MAXIMIZESHELL" },
62
  { INFO_LOGONNOTIFY, "INFO_LOGONNOTIFY" },
63
  { INFO_COMPRESSION, "INFO_COMPRESSION" },
64
  { INFO_ENABLEWINDOWSKEY, "INFO_ENABLEWINDOWSKEY" },
65
  { INFO_REMOTECONSOLEAUDIO, "INFO_REMOTECONSOLEAUDIO" },
66
  { INFO_FORCE_ENCRYPTED_CS_PDU, "INFO_FORCE_ENCRYPTED_CS_PDU" },
67
  { INFO_RAIL, "INFO_RAIL" },
68
  { INFO_LOGONERRORS, "INFO_LOGONERRORS" },
69
  { INFO_MOUSE_HAS_WHEEL, "INFO_MOUSE_HAS_WHEEL" },
70
  { INFO_PASSWORD_IS_SC_PIN, "INFO_PASSWORD_IS_SC_PIN" },
71
  { INFO_NOAUDIOPLAYBACK, "INFO_NOAUDIOPLAYBACK" },
72
  { INFO_USING_SAVED_CREDS, "INFO_USING_SAVED_CREDS" },
73
  { INFO_AUDIOCAPTURE, "INFO_AUDIOCAPTURE" },
74
  { INFO_VIDEO_DISABLE, "INFO_VIDEO_DISABLE" },
75
  { INFO_HIDEF_RAIL_SUPPORTED, "INFO_HIDEF_RAIL_SUPPORTED" },
76
};
77
78
static BOOL rdp_read_info_null_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id,
79
                                      const char* what, UINT32 flags, wStream* s, size_t cbLen,
80
                                      size_t max)
81
2.51k
{
82
2.51k
  const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE;
83
84
2.51k
  if (!freerdp_settings_set_string(settings, id, NULL))
85
0
    return FALSE;
86
87
2.51k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLen)))
88
196
    return FALSE;
89
90
2.32k
  if (cbLen > 0)
91
325
  {
92
325
    if ((cbLen > max) || (unicode && ((cbLen % 2) != 0)))
93
208
    {
94
208
      WLog_ERR(TAG, "protocol error: %s has invalid value: %" PRIuz "", what, cbLen);
95
208
      return FALSE;
96
208
    }
97
98
117
    if (unicode)
99
117
    {
100
117
      const WCHAR* domain = Stream_PointerAs(s, WCHAR);
101
117
      if (!freerdp_settings_set_string_from_utf16N(settings, id, domain,
102
117
                                                   cbLen / sizeof(WCHAR)))
103
16
      {
104
16
        WLog_ERR(TAG, "protocol error: no data to read for %s [expected %" PRIuz "]", what,
105
16
                 cbLen);
106
16
        return FALSE;
107
16
      }
108
117
    }
109
0
    else
110
0
    {
111
0
      const char* domain = Stream_ConstPointer(s);
112
0
      if (!freerdp_settings_set_string_len(settings, id, domain, cbLen))
113
0
        return FALSE;
114
0
    }
115
117
  }
116
2.09k
  Stream_Seek(s, cbLen);
117
118
2.09k
  return TRUE;
119
2.32k
}
120
121
static char* rdp_info_package_flags_description(UINT32 flags)
122
0
{
123
0
  char* result = NULL;
124
0
  size_t maximum_size = 1 + MAX_LABEL_LENGTH * ARRAYSIZE(info_flags);
125
126
0
  result = calloc(maximum_size, sizeof(char));
127
128
0
  if (!result)
129
0
    return 0;
130
131
0
  for (size_t i = 0; i < ARRAYSIZE(info_flags); i++)
132
0
  {
133
0
    const struct info_flags_t* cur = &info_flags[i];
134
0
    if (cur->flag & flags)
135
0
    {
136
0
      winpr_str_append(cur->label, result, maximum_size, "|");
137
0
    }
138
0
  }
139
140
0
  return result;
141
0
}
142
143
static BOOL rdp_compute_client_auto_reconnect_cookie(rdpRdp* rdp)
144
0
{
145
0
  BYTE ClientRandom[CLIENT_RANDOM_LENGTH] = { 0 };
146
0
  BYTE AutoReconnectRandom[32] = { 0 };
147
0
  ARC_SC_PRIVATE_PACKET* serverCookie = NULL;
148
0
  ARC_CS_PRIVATE_PACKET* clientCookie = NULL;
149
150
0
  WINPR_ASSERT(rdp);
151
0
  rdpSettings* settings = rdp->settings;
152
0
  WINPR_ASSERT(settings);
153
154
0
  serverCookie = settings->ServerAutoReconnectCookie;
155
0
  clientCookie = settings->ClientAutoReconnectCookie;
156
0
  clientCookie->cbLen = 28;
157
0
  clientCookie->version = serverCookie->version;
158
0
  clientCookie->logonId = serverCookie->logonId;
159
0
  ZeroMemory(clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier));
160
0
  CopyMemory(AutoReconnectRandom, serverCookie->arcRandomBits,
161
0
             sizeof(serverCookie->arcRandomBits));
162
163
0
  if (settings->SelectedProtocol == PROTOCOL_RDP)
164
0
    CopyMemory(ClientRandom, settings->ClientRandom, settings->ClientRandomLength);
165
166
  /* SecurityVerifier = HMAC_MD5(AutoReconnectRandom, ClientRandom) */
167
168
0
  if (!winpr_HMAC(WINPR_MD_MD5, AutoReconnectRandom, 16, ClientRandom, sizeof(ClientRandom),
169
0
                  clientCookie->securityVerifier, sizeof(clientCookie->securityVerifier)))
170
0
    return FALSE;
171
172
0
  return TRUE;
173
0
}
174
175
/**
176
 * Read Server Auto Reconnect Cookie (ARC_SC_PRIVATE_PACKET).
177
 * msdn{cc240540}
178
 */
179
180
static BOOL rdp_read_server_auto_reconnect_cookie(rdpRdp* rdp, wStream* s, logon_info_ex* info)
181
73
{
182
73
  BYTE* p = NULL;
183
73
  ARC_SC_PRIVATE_PACKET* autoReconnectCookie = NULL;
184
73
  rdpSettings* settings = rdp->settings;
185
73
  autoReconnectCookie = settings->ServerAutoReconnectCookie;
186
187
73
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
188
1
    return FALSE;
189
190
72
  Stream_Read_UINT32(s, autoReconnectCookie->cbLen); /* cbLen (4 bytes) */
191
192
72
  if (autoReconnectCookie->cbLen != 28)
193
49
  {
194
49
    WLog_ERR(TAG, "ServerAutoReconnectCookie.cbLen != 28");
195
49
    return FALSE;
196
49
  }
197
198
23
  Stream_Read_UINT32(s, autoReconnectCookie->version);    /* Version (4 bytes) */
199
23
  Stream_Read_UINT32(s, autoReconnectCookie->logonId);    /* LogonId (4 bytes) */
200
23
  Stream_Read(s, autoReconnectCookie->arcRandomBits, 16); /* ArcRandomBits (16 bytes) */
201
23
  p = autoReconnectCookie->arcRandomBits;
202
23
  WLog_DBG(TAG,
203
23
           "ServerAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32
204
23
           " SecurityVerifier: "
205
23
           "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
206
23
           "%02" PRIX8 ""
207
23
           "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
208
23
           "%02" PRIX8 "",
209
23
           autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
210
23
           p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
211
23
  info->LogonId = autoReconnectCookie->logonId;
212
23
  CopyMemory(info->ArcRandomBits, p, 16);
213
214
23
  if ((settings->PrintReconnectCookie))
215
0
  {
216
0
    char* base64 = NULL;
217
0
    base64 = crypto_base64_encode((BYTE*)autoReconnectCookie, sizeof(ARC_SC_PRIVATE_PACKET));
218
0
    WLog_INFO(TAG, "Reconnect-cookie: %s", base64);
219
0
    free(base64);
220
0
  }
221
222
23
  return TRUE;
223
72
}
224
225
/**
226
 * Read Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).
227
 * msdn{cc240541}
228
 */
229
230
static BOOL rdp_read_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
231
495
{
232
495
  ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL;
233
495
  rdpSettings* settings = rdp->settings;
234
495
  autoReconnectCookie = settings->ClientAutoReconnectCookie;
235
236
495
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
237
28
    return FALSE;
238
239
467
  Stream_Read_UINT32(s, autoReconnectCookie->cbLen);         /* cbLen (4 bytes) */
240
467
  Stream_Read_UINT32(s, autoReconnectCookie->version);       /* version (4 bytes) */
241
467
  Stream_Read_UINT32(s, autoReconnectCookie->logonId);       /* LogonId (4 bytes) */
242
467
  Stream_Read(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier */
243
467
  return TRUE;
244
495
}
245
246
/**
247
 * Write Client Auto Reconnect Cookie (ARC_CS_PRIVATE_PACKET).
248
 * msdn{cc240541}
249
 */
250
251
static BOOL rdp_write_client_auto_reconnect_cookie(rdpRdp* rdp, wStream* s)
252
0
{
253
0
  BYTE* p = NULL;
254
0
  ARC_CS_PRIVATE_PACKET* autoReconnectCookie = NULL;
255
0
  rdpSettings* settings = NULL;
256
257
0
  WINPR_ASSERT(rdp);
258
259
0
  settings = rdp->settings;
260
0
  WINPR_ASSERT(settings);
261
262
0
  autoReconnectCookie = settings->ClientAutoReconnectCookie;
263
0
  WINPR_ASSERT(autoReconnectCookie);
264
265
0
  p = autoReconnectCookie->securityVerifier;
266
0
  WINPR_ASSERT(p);
267
268
0
  WLog_DBG(TAG,
269
0
           "ClientAutoReconnectCookie: Version: %" PRIu32 " LogonId: %" PRIu32 " ArcRandomBits: "
270
0
           "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
271
0
           "%02" PRIX8 ""
272
0
           "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "%02" PRIX8
273
0
           "%02" PRIX8 "",
274
0
           autoReconnectCookie->version, autoReconnectCookie->logonId, p[0], p[1], p[2], p[3],
275
0
           p[4], p[5], p[6], p[7], p[8], p[9], p[10], p[11], p[12], p[13], p[14], p[15]);
276
0
  if (!Stream_EnsureRemainingCapacity(s, 12ull + 16ull))
277
0
    return FALSE;
278
0
  Stream_Write_UINT32(s, autoReconnectCookie->cbLen);         /* cbLen (4 bytes) */
279
0
  Stream_Write_UINT32(s, autoReconnectCookie->version);       /* version (4 bytes) */
280
0
  Stream_Write_UINT32(s, autoReconnectCookie->logonId);       /* LogonId (4 bytes) */
281
0
  Stream_Write(s, autoReconnectCookie->securityVerifier, 16); /* SecurityVerifier (16 bytes) */
282
0
  return TRUE;
283
0
}
284
285
/*
286
 * Get the cbClientAddress size limit
287
 * see [MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet (TS_EXTENDED_INFO_PACKET)
288
 */
289
290
static size_t rdp_get_client_address_max_size(const rdpRdp* rdp)
291
922
{
292
922
  UINT32 version = 0;
293
922
  rdpSettings* settings = NULL;
294
295
922
  WINPR_ASSERT(rdp);
296
297
922
  settings = rdp->settings;
298
922
  WINPR_ASSERT(settings);
299
300
922
  version = freerdp_settings_get_uint32(settings, FreeRDP_RdpVersion);
301
922
  if (version < RDP_VERSION_10_0)
302
0
    return 64;
303
922
  return 80;
304
922
}
305
306
/**
307
 * Read Extended Info Packet (TS_EXTENDED_INFO_PACKET).
308
 * msdn{cc240476}
309
 */
310
311
static BOOL rdp_read_extended_info_packet(rdpRdp* rdp, wStream* s)
312
926
{
313
926
  UINT16 clientAddressFamily = 0;
314
926
  UINT16 cbClientAddress = 0;
315
926
  UINT16 cbClientDir = 0;
316
926
  UINT16 cbAutoReconnectLen = 0;
317
318
926
  WINPR_ASSERT(rdp);
319
320
926
  rdpSettings* settings = rdp->settings;
321
926
  WINPR_ASSERT(settings);
322
323
926
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
324
4
    return FALSE;
325
326
922
  Stream_Read_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
327
922
  Stream_Read_UINT16(s, cbClientAddress);     /* cbClientAddress (2 bytes) */
328
329
922
  settings->IPv6Enabled = (clientAddressFamily == ADDRESS_FAMILY_INET6 ? TRUE : FALSE);
330
331
922
  if (!rdp_read_info_null_string(settings, FreeRDP_ClientAddress, "cbClientAddress", INFO_UNICODE,
332
922
                                 s, cbClientAddress, rdp_get_client_address_max_size(rdp)))
333
49
    return FALSE;
334
335
873
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
336
6
    return FALSE;
337
338
867
  Stream_Read_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */
339
340
  /* cbClientDir is the size in bytes of the character data in the clientDir field.
341
   * This size includes the length of the mandatory null terminator.
342
   * The maximum allowed value is 512 bytes.
343
   * Note: Although according to [MS-RDPBCGR 2.2.1.11.1.1.1] the null terminator
344
   * is mandatory the Microsoft Android client (starting with version 8.1.31.44)
345
   * sets cbClientDir to 0.
346
   */
347
348
867
  if (!rdp_read_info_null_string(settings, FreeRDP_ClientDir, "cbClientDir", INFO_UNICODE, s,
349
867
                                 cbClientDir, 512))
350
29
    return FALSE;
351
352
  /**
353
   * down below all fields are optional but if one field is not present,
354
   * then all of the subsequent fields also MUST NOT be present.
355
   */
356
357
  /* optional: clientTimeZone (172 bytes) */
358
838
  if (Stream_GetRemainingLength(s) == 0)
359
8
    goto end;
360
361
830
  if (!rdp_read_client_time_zone(s, settings))
362
40
    return FALSE;
363
364
  /* optional: clientSessionId (4 bytes), should be set to 0 */
365
790
  if (Stream_GetRemainingLength(s) == 0)
366
2
    goto end;
367
788
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
368
5
    return FALSE;
369
370
783
  Stream_Read_UINT32(s, settings->ClientSessionId);
371
372
  /* optional: performanceFlags (4 bytes) */
373
783
  if (Stream_GetRemainingLength(s) == 0)
374
2
    goto end;
375
376
781
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
377
4
    return FALSE;
378
379
777
  Stream_Read_UINT32(s, settings->PerformanceFlags);
380
777
  freerdp_performance_flags_split(settings);
381
382
  /* optional: cbAutoReconnectLen (2 bytes) */
383
777
  if (Stream_GetRemainingLength(s) == 0)
384
2
    goto end;
385
386
775
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
387
2
    return FALSE;
388
389
773
  Stream_Read_UINT16(s, cbAutoReconnectLen);
390
391
  /* optional: autoReconnectCookie (28 bytes) */
392
  /* must be present if cbAutoReconnectLen is > 0 */
393
773
  if (cbAutoReconnectLen > 0)
394
495
  {
395
495
    if (!rdp_read_client_auto_reconnect_cookie(rdp, s))
396
28
      return FALSE;
397
495
  }
398
399
  /* skip reserved1 and reserved2 fields */
400
745
  if (Stream_GetRemainingLength(s) == 0)
401
4
    goto end;
402
403
741
  if (!Stream_SafeSeek(s, 2))
404
4
    return FALSE;
405
406
737
  if (Stream_GetRemainingLength(s) == 0)
407
2
    goto end;
408
409
735
  if (!Stream_SafeSeek(s, 2))
410
3
    return FALSE;
411
412
732
  if (Stream_GetRemainingLength(s) == 0)
413
2
    goto end;
414
415
730
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
416
2
    return FALSE;
417
728
  {
418
728
    UINT16 cbDynamicDSTTimeZoneKeyName = 0;
419
420
728
    Stream_Read_UINT16(s, cbDynamicDSTTimeZoneKeyName);
421
422
728
    if (!rdp_read_info_null_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName,
423
728
                                   "cbDynamicDSTTimeZoneKeyName", INFO_UNICODE, s,
424
728
                                   cbDynamicDSTTimeZoneKeyName, 254))
425
342
      return FALSE;
426
427
386
    if (Stream_GetRemainingLength(s) == 0)
428
5
      goto end;
429
430
381
    if (!Stream_CheckAndLogRequiredLength(TAG, s, 2))
431
3
      return FALSE;
432
378
    UINT16 DynamicDaylightTimeDisabled = 0;
433
378
    Stream_Read_UINT16(s, DynamicDaylightTimeDisabled);
434
378
    if (DynamicDaylightTimeDisabled > 1)
435
122
    {
436
122
      WLog_WARN(TAG,
437
122
                "[MS-RDPBCGR] 2.2.1.11.1.1.1 Extended Info Packet "
438
122
                "(TS_EXTENDED_INFO_PACKET)::dynamicDaylightTimeDisabled value %" PRIu16
439
122
                " not allowed in [0,1]",
440
122
                settings->DynamicDaylightTimeDisabled);
441
122
      return FALSE;
442
122
    }
443
256
    if (!freerdp_settings_set_bool(settings, FreeRDP_DynamicDaylightTimeDisabled,
444
256
                                   DynamicDaylightTimeDisabled != 0))
445
0
      return FALSE;
446
256
  }
447
448
283
end:
449
283
  return TRUE;
450
256
}
451
452
/**
453
 * Write Extended Info Packet (TS_EXTENDED_INFO_PACKET).
454
 * msdn{cc240476}
455
 */
456
457
static BOOL rdp_write_extended_info_packet(rdpRdp* rdp, wStream* s)
458
0
{
459
0
  BOOL ret = FALSE;
460
0
  size_t cbClientAddress = 0;
461
0
  const size_t cbClientAddressMax = rdp_get_client_address_max_size(rdp);
462
0
  WCHAR* clientDir = NULL;
463
0
  size_t cbClientDir = 0;
464
0
  const size_t cbClientDirMax = 512;
465
0
  UINT16 cbAutoReconnectCookie = 0;
466
467
0
  WINPR_ASSERT(rdp);
468
469
0
  rdpSettings* settings = rdp->settings;
470
0
  WINPR_ASSERT(settings);
471
472
0
  UINT16 clientAddressFamily = ADDRESS_FAMILY_INET;
473
0
  if (settings->ConnectChildSession)
474
0
    clientAddressFamily = 0x0000;
475
0
  else if (settings->IPv6Enabled)
476
0
    clientAddressFamily = ADDRESS_FAMILY_INET6;
477
478
0
  WCHAR* clientAddress = ConvertUtf8ToWCharAlloc(settings->ClientAddress, &cbClientAddress);
479
480
0
  if (cbClientAddress > (UINT16_MAX / sizeof(WCHAR)))
481
0
  {
482
0
    WLog_ERR(TAG, "cbClientAddress > UINT16_MAX");
483
0
    goto fail;
484
0
  }
485
486
0
  if (cbClientAddress > 0)
487
0
  {
488
0
    cbClientAddress = (UINT16)(cbClientAddress + 1) * sizeof(WCHAR);
489
0
    if (cbClientAddress > cbClientAddressMax)
490
0
    {
491
0
      WLog_WARN(TAG,
492
0
                "the client address %s [%" PRIuz "] exceeds the limit of %" PRIuz
493
0
                ", truncating.",
494
0
                settings->ClientAddress, cbClientAddress, cbClientAddressMax);
495
496
0
      clientAddress[(cbClientAddressMax / sizeof(WCHAR)) - 1] = '\0';
497
0
      cbClientAddress = cbClientAddressMax;
498
0
    }
499
0
  }
500
501
0
  clientDir = ConvertUtf8ToWCharAlloc(settings->ClientDir, &cbClientDir);
502
0
  if (cbClientDir > (UINT16_MAX / sizeof(WCHAR)))
503
0
  {
504
0
    WLog_ERR(TAG, "cbClientDir > UINT16_MAX");
505
0
    goto fail;
506
0
  }
507
508
0
  if (cbClientDir > 0)
509
0
  {
510
0
    cbClientDir = (UINT16)(cbClientDir + 1) * sizeof(WCHAR);
511
0
    if (cbClientDir > cbClientDirMax)
512
0
    {
513
0
      WLog_WARN(TAG,
514
0
                "the client dir %s [%" PRIuz "] exceeds the limit of %" PRIuz ", truncating.",
515
0
                settings->ClientDir, cbClientDir, cbClientDirMax);
516
517
0
      clientDir[(cbClientDirMax / sizeof(WCHAR)) - 1] = '\0';
518
0
      cbClientDir = cbClientDirMax;
519
0
    }
520
0
  }
521
522
0
  if (settings->ServerAutoReconnectCookie->cbLen > UINT16_MAX)
523
0
  {
524
0
    WLog_ERR(TAG, "ServerAutoreconnectCookie::cbLen > UINT16_MAX");
525
0
    goto fail;
526
0
  }
527
528
0
  cbAutoReconnectCookie = (UINT16)settings->ServerAutoReconnectCookie->cbLen;
529
530
0
  if (!Stream_EnsureRemainingCapacity(s, 4ull + cbClientAddress + 2ull + cbClientDir))
531
0
    goto fail;
532
533
0
  Stream_Write_UINT16(s, clientAddressFamily); /* clientAddressFamily (2 bytes) */
534
0
  Stream_Write_UINT16(s, cbClientAddress);     /* cbClientAddress (2 bytes) */
535
536
0
  Stream_Write(s, clientAddress, cbClientAddress); /* clientAddress */
537
538
0
  Stream_Write_UINT16(s, cbClientDir); /* cbClientDir (2 bytes) */
539
540
0
  Stream_Write(s, clientDir, cbClientDir); /* clientDir */
541
542
0
  if (!rdp_write_client_time_zone(s, settings)) /* clientTimeZone (172 bytes) */
543
0
    goto fail;
544
545
0
  if (!Stream_EnsureRemainingCapacity(s, 10ull))
546
0
    goto fail;
547
548
0
  Stream_Write_UINT32(
549
0
      s, settings->ClientSessionId); /* clientSessionId (4 bytes), should be set to 0 */
550
0
  freerdp_performance_flags_make(settings);
551
0
  Stream_Write_UINT32(s, settings->PerformanceFlags); /* performanceFlags (4 bytes) */
552
0
  Stream_Write_UINT16(s, cbAutoReconnectCookie);      /* cbAutoReconnectCookie (2 bytes) */
553
554
0
  if (cbAutoReconnectCookie > 0)
555
0
  {
556
0
    if (!rdp_compute_client_auto_reconnect_cookie(rdp))
557
0
      goto fail;
558
0
    if (!rdp_write_client_auto_reconnect_cookie(rdp, s)) /* autoReconnectCookie */
559
0
      goto fail;
560
561
0
    if (!Stream_EnsureRemainingCapacity(s, 4ull))
562
0
      goto fail;
563
0
    Stream_Write_UINT16(s, 0); /* reserved1 (2 bytes) */
564
0
    Stream_Write_UINT16(s, 0); /* reserved2 (2 bytes) */
565
0
  }
566
567
0
  if (freerdp_settings_get_bool(settings, FreeRDP_SupportDynamicTimeZone))
568
0
  {
569
0
    if (!Stream_EnsureRemainingCapacity(s, 10 + 254 * sizeof(WCHAR)))
570
0
      goto fail;
571
572
    /* skip reserved1 and reserved2 fields */
573
0
    Stream_Seek(s, 4);
574
575
0
    size_t rlen = 0;
576
0
    const char* tz = freerdp_settings_get_string(settings, FreeRDP_DynamicDSTTimeZoneKeyName);
577
0
    if (tz)
578
0
      rlen = strnlen(tz, 254);
579
0
    Stream_Write_UINT16(s, (UINT16)rlen * sizeof(WCHAR));
580
0
    if (Stream_Write_UTF16_String_From_UTF8(s, rlen, tz, rlen, FALSE) < 0)
581
0
      goto fail;
582
0
    Stream_Write_UINT16(s, settings->DynamicDaylightTimeDisabled ? 0x01 : 0x00);
583
0
  }
584
585
0
  ret = TRUE;
586
0
fail:
587
0
  free(clientAddress);
588
0
  free(clientDir);
589
0
  return ret;
590
0
}
591
592
static BOOL rdp_read_info_string(rdpSettings* settings, FreeRDP_Settings_Keys_String id,
593
                                 UINT32 flags, wStream* s, size_t cbLenNonNull, size_t max)
594
5.09k
{
595
5.09k
  union
596
5.09k
  {
597
5.09k
    char c;
598
5.09k
    WCHAR w;
599
5.09k
    BYTE b[2];
600
5.09k
  } terminator;
601
602
5.09k
  const BOOL unicode = (flags & INFO_UNICODE) ? TRUE : FALSE;
603
5.09k
  const size_t nullSize = unicode ? sizeof(WCHAR) : sizeof(CHAR);
604
605
5.09k
  if (!freerdp_settings_set_string(settings, id, NULL))
606
0
    return FALSE;
607
608
5.09k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, (size_t)(cbLenNonNull + nullSize)))
609
50
    return FALSE;
610
611
5.04k
  if (cbLenNonNull > 0)
612
308
  {
613
    /* cbDomain is the size in bytes of the character data in the Domain field.
614
     * This size excludes (!) the length of the mandatory null terminator.
615
     * Maximum value including the mandatory null terminator: 512
616
     */
617
308
    if ((cbLenNonNull % 2) || (cbLenNonNull > (max - nullSize)))
618
41
    {
619
41
      WLog_ERR(TAG, "protocol error: invalid value: %" PRIuz "", cbLenNonNull);
620
41
      return FALSE;
621
41
    }
622
623
267
    if (unicode)
624
221
    {
625
221
      const WCHAR* domain = Stream_PointerAs(s, WCHAR);
626
221
      if (!freerdp_settings_set_string_from_utf16N(settings, id, domain,
627
221
                                                   cbLenNonNull / sizeof(WCHAR)))
628
39
        return FALSE;
629
221
    }
630
46
    else
631
46
    {
632
46
      const char* domain = Stream_PointerAs(s, char);
633
46
      if (!freerdp_settings_set_string_len(settings, id, domain, cbLenNonNull))
634
0
        return FALSE;
635
46
    }
636
267
  }
637
638
4.96k
  Stream_Seek(s, cbLenNonNull);
639
640
4.96k
  terminator.w = L'\0';
641
4.96k
  Stream_Read(s, terminator.b, nullSize);
642
643
4.96k
  if (terminator.w != L'\0')
644
169
  {
645
169
    WLog_ERR(TAG, "protocol error: Domain must be null terminated");
646
169
    freerdp_settings_set_string(settings, id, NULL);
647
169
    return FALSE;
648
169
  }
649
650
4.79k
  return TRUE;
651
4.96k
}
652
653
/**
654
 * Read Info Packet (TS_INFO_PACKET).
655
 * msdn{cc240475}
656
 */
657
658
static BOOL rdp_read_info_packet(rdpRdp* rdp, wStream* s, UINT16 tpktlength)
659
1.23k
{
660
1.23k
  BOOL smallsize = FALSE;
661
1.23k
  UINT32 flags = 0;
662
1.23k
  UINT16 cbDomain = 0;
663
1.23k
  UINT16 cbUserName = 0;
664
1.23k
  UINT16 cbPassword = 0;
665
1.23k
  UINT16 cbAlternateShell = 0;
666
1.23k
  UINT16 cbWorkingDir = 0;
667
1.23k
  UINT32 CompressionLevel = 0;
668
1.23k
  rdpSettings* settings = rdp->settings;
669
670
1.23k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 18))
671
5
    return FALSE;
672
673
1.22k
  Stream_Read_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes ) */
674
1.22k
  Stream_Read_UINT32(s, flags);                      /* flags (4 bytes) */
675
1.22k
  settings->AudioCapture = ((flags & INFO_AUDIOCAPTURE) ? TRUE : FALSE);
676
1.22k
  settings->AudioPlayback = ((flags & INFO_NOAUDIOPLAYBACK) ? FALSE : TRUE);
677
1.22k
  settings->AutoLogonEnabled = ((flags & INFO_AUTOLOGON) ? TRUE : FALSE);
678
1.22k
  settings->RemoteApplicationMode = ((flags & INFO_RAIL) ? TRUE : FALSE);
679
1.22k
  settings->HiDefRemoteApp = ((flags & INFO_HIDEF_RAIL_SUPPORTED) ? TRUE : FALSE);
680
1.22k
  settings->RemoteConsoleAudio = ((flags & INFO_REMOTECONSOLEAUDIO) ? TRUE : FALSE);
681
1.22k
  settings->CompressionEnabled = ((flags & INFO_COMPRESSION) ? TRUE : FALSE);
682
1.22k
  settings->LogonNotify = ((flags & INFO_LOGONNOTIFY) ? TRUE : FALSE);
683
1.22k
  settings->MouseHasWheel = ((flags & INFO_MOUSE_HAS_WHEEL) ? TRUE : FALSE);
684
1.22k
  settings->DisableCtrlAltDel = ((flags & INFO_DISABLECTRLALTDEL) ? TRUE : FALSE);
685
1.22k
  settings->ForceEncryptedCsPdu = ((flags & INFO_FORCE_ENCRYPTED_CS_PDU) ? TRUE : FALSE);
686
1.22k
  settings->PasswordIsSmartcardPin = ((flags & INFO_PASSWORD_IS_SC_PIN) ? TRUE : FALSE);
687
688
1.22k
  if (flags & INFO_COMPRESSION)
689
222
  {
690
222
    CompressionLevel = ((flags & 0x00001E00) >> 9);
691
222
    settings->CompressionLevel = CompressionLevel;
692
222
  }
693
1.00k
  else
694
1.00k
  {
695
1.00k
    settings->CompressionLevel = 0;
696
1.00k
  }
697
698
  /* RDP 4 and 5 have smaller credential limits */
699
1.22k
  if (settings->RdpVersion < RDP_VERSION_5_PLUS)
700
0
    smallsize = TRUE;
701
702
1.22k
  Stream_Read_UINT16(s, cbDomain);         /* cbDomain (2 bytes) */
703
1.22k
  Stream_Read_UINT16(s, cbUserName);       /* cbUserName (2 bytes) */
704
1.22k
  Stream_Read_UINT16(s, cbPassword);       /* cbPassword (2 bytes) */
705
1.22k
  Stream_Read_UINT16(s, cbAlternateShell); /* cbAlternateShell (2 bytes) */
706
1.22k
  Stream_Read_UINT16(s, cbWorkingDir);     /* cbWorkingDir (2 bytes) */
707
708
1.22k
  if (!rdp_read_info_string(settings, FreeRDP_Domain, flags, s, cbDomain, smallsize ? 52 : 512))
709
212
    return FALSE;
710
711
1.01k
  if (!rdp_read_info_string(settings, FreeRDP_Username, flags, s, cbUserName,
712
1.01k
                            smallsize ? 44 : 512))
713
44
    return FALSE;
714
715
969
  if (!rdp_read_info_string(settings, FreeRDP_Password, flags, s, cbPassword,
716
969
                            smallsize ? 32 : 512))
717
16
    return FALSE;
718
719
953
  if (!rdp_read_info_string(settings, FreeRDP_AlternateShell, flags, s, cbAlternateShell, 512))
720
19
    return FALSE;
721
722
934
  if (!rdp_read_info_string(settings, FreeRDP_ShellWorkingDirectory, flags, s, cbWorkingDir, 512))
723
8
    return FALSE;
724
725
926
  if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
726
926
  {
727
926
    if (!rdp_read_extended_info_packet(rdp, s)) /* extraInfo */
728
643
      return FALSE;
729
926
  }
730
731
283
  const size_t xrem = Stream_GetRemainingLength(s);
732
283
  if (!tpkt_ensure_stream_consumed(s, tpktlength))
733
254
    Stream_Seek(s, xrem);
734
283
  return TRUE;
735
926
}
736
737
/**
738
 * Write Info Packet (TS_INFO_PACKET).
739
 * msdn{cc240475}
740
 */
741
742
static BOOL rdp_write_info_packet(rdpRdp* rdp, wStream* s)
743
0
{
744
0
  BOOL ret = FALSE;
745
0
  UINT32 flags = 0;
746
0
  WCHAR* domainW = NULL;
747
0
  size_t cbDomain = 0;
748
0
  WCHAR* userNameW = NULL;
749
0
  size_t cbUserName = 0;
750
0
  WCHAR* passwordW = NULL;
751
0
  size_t cbPassword = 0;
752
0
  WCHAR* alternateShellW = NULL;
753
0
  size_t cbAlternateShell = 0;
754
0
  WCHAR* workingDirW = NULL;
755
0
  size_t cbWorkingDir = 0;
756
0
  BOOL usedPasswordCookie = FALSE;
757
0
  rdpSettings* settings = NULL;
758
759
0
  WINPR_ASSERT(rdp);
760
0
  settings = rdp->settings;
761
0
  WINPR_ASSERT(settings);
762
763
0
  flags = INFO_MOUSE | INFO_UNICODE | INFO_LOGONERRORS | INFO_MAXIMIZESHELL |
764
0
          INFO_ENABLEWINDOWSKEY | INFO_DISABLECTRLALTDEL | INFO_MOUSE_HAS_WHEEL |
765
0
          INFO_FORCE_ENCRYPTED_CS_PDU;
766
767
0
  if (settings->SmartcardLogon)
768
0
  {
769
0
    flags |= INFO_AUTOLOGON;
770
0
    flags |= INFO_PASSWORD_IS_SC_PIN;
771
0
  }
772
773
0
  if (settings->AudioCapture)
774
0
    flags |= INFO_AUDIOCAPTURE;
775
776
0
  if (!settings->AudioPlayback)
777
0
    flags |= INFO_NOAUDIOPLAYBACK;
778
779
0
  if (settings->VideoDisable)
780
0
    flags |= INFO_VIDEO_DISABLE;
781
782
0
  if (settings->AutoLogonEnabled)
783
0
    flags |= INFO_AUTOLOGON;
784
785
0
  if (settings->RemoteApplicationMode)
786
0
  {
787
0
    if (settings->HiDefRemoteApp)
788
0
      flags |= INFO_HIDEF_RAIL_SUPPORTED;
789
790
0
    flags |= INFO_RAIL;
791
0
  }
792
793
0
  if (settings->RemoteConsoleAudio)
794
0
    flags |= INFO_REMOTECONSOLEAUDIO;
795
796
0
  if (settings->CompressionEnabled)
797
0
  {
798
0
    flags |= INFO_COMPRESSION;
799
0
    flags |= ((settings->CompressionLevel << 9) & 0x00001E00);
800
0
  }
801
802
0
  if (settings->LogonNotify)
803
0
    flags |= INFO_LOGONNOTIFY;
804
805
0
  if (settings->PasswordIsSmartcardPin)
806
0
    flags |= INFO_PASSWORD_IS_SC_PIN;
807
808
0
  {
809
0
    char* flags_description = rdp_info_package_flags_description(flags);
810
811
0
    if (flags_description)
812
0
    {
813
0
      WLog_DBG(TAG, "Client Info Packet Flags = %s", flags_description);
814
0
      free(flags_description);
815
0
    }
816
0
  }
817
818
0
  domainW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Domain, &cbDomain);
819
0
  if (cbDomain > UINT16_MAX / sizeof(WCHAR))
820
0
  {
821
0
    WLog_ERR(TAG, "cbDomain > UINT16_MAX");
822
0
    goto fail;
823
0
  }
824
0
  cbDomain *= sizeof(WCHAR);
825
826
  /* user name provided by the expert for connecting to the novice computer */
827
0
  userNameW = freerdp_settings_get_string_as_utf16(settings, FreeRDP_Username, &cbUserName);
828
0
  if (cbUserName > UINT16_MAX / sizeof(WCHAR))
829
0
  {
830
0
    WLog_ERR(TAG, "cbUserName > UINT16_MAX");
831
0
    goto fail;
832
0
  }
833
0
  cbUserName *= sizeof(WCHAR);
834
835
0
  const char* pin = "*";
836
0
  if (!settings->RemoteAssistanceMode)
837
0
  {
838
    /* Ignore redirection password if we´re using smartcard and have the pin as password */
839
0
    if (((flags & INFO_PASSWORD_IS_SC_PIN) == 0) && settings->RedirectionPassword &&
840
0
        (settings->RedirectionPasswordLength > 0))
841
0
    {
842
0
      union
843
0
      {
844
0
        BYTE* bp;
845
0
        WCHAR* wp;
846
0
      } ptrconv;
847
848
0
      if (settings->RedirectionPasswordLength > UINT16_MAX)
849
0
      {
850
0
        WLog_ERR(TAG, "RedirectionPasswordLength > UINT16_MAX");
851
0
        goto fail;
852
0
      }
853
0
      usedPasswordCookie = TRUE;
854
855
0
      ptrconv.bp = settings->RedirectionPassword;
856
0
      passwordW = ptrconv.wp;
857
0
      cbPassword = (UINT16)settings->RedirectionPasswordLength;
858
0
    }
859
0
    else
860
0
      pin = freerdp_settings_get_string(settings, FreeRDP_Password);
861
0
  }
862
863
0
  if (!usedPasswordCookie && pin)
864
0
  {
865
0
    passwordW = ConvertUtf8ToWCharAlloc(pin, &cbPassword);
866
0
    if (cbPassword > UINT16_MAX / sizeof(WCHAR))
867
0
    {
868
0
      WLog_ERR(TAG, "cbPassword > UINT16_MAX");
869
0
      goto fail;
870
0
    }
871
0
    cbPassword = (UINT16)cbPassword * sizeof(WCHAR);
872
0
  }
873
874
0
  const char* altShell = NULL;
875
0
  if (!settings->RemoteAssistanceMode)
876
0
    altShell = freerdp_settings_get_string(settings, FreeRDP_AlternateShell);
877
0
  else if (settings->RemoteAssistancePassStub)
878
0
    altShell = "*"; /* This field MUST be filled with "*" */
879
0
  else
880
0
    altShell = freerdp_settings_get_string(settings, FreeRDP_RemoteAssistancePassword);
881
882
0
  if (altShell && strlen(altShell) > 0)
883
0
  {
884
0
    alternateShellW = ConvertUtf8ToWCharAlloc(altShell, &cbAlternateShell);
885
0
    if (!alternateShellW)
886
0
    {
887
0
      WLog_ERR(TAG, "alternateShellW == NULL");
888
0
      goto fail;
889
0
    }
890
0
    if (cbAlternateShell > (UINT16_MAX / sizeof(WCHAR)))
891
0
    {
892
0
      WLog_ERR(TAG, "cbAlternateShell > UINT16_MAX");
893
0
      goto fail;
894
0
    }
895
0
    cbAlternateShell = (UINT16)cbAlternateShell * sizeof(WCHAR);
896
0
  }
897
898
0
  FreeRDP_Settings_Keys_String inputId = FreeRDP_RemoteAssistanceSessionId;
899
0
  if (!freerdp_settings_get_bool(settings, FreeRDP_RemoteAssistanceMode))
900
0
    inputId = FreeRDP_ShellWorkingDirectory;
901
902
0
  workingDirW = freerdp_settings_get_string_as_utf16(settings, inputId, &cbWorkingDir);
903
0
  if (cbWorkingDir > (UINT16_MAX / sizeof(WCHAR)))
904
0
  {
905
0
    WLog_ERR(TAG, "cbWorkingDir > UINT16_MAX");
906
0
    goto fail;
907
0
  }
908
0
  cbWorkingDir = (UINT16)cbWorkingDir * sizeof(WCHAR);
909
910
0
  if (!Stream_EnsureRemainingCapacity(s, 18ull + cbDomain + cbUserName + cbPassword +
911
0
                                             cbAlternateShell + cbWorkingDir + 5 * sizeof(WCHAR)))
912
0
    goto fail;
913
914
0
  Stream_Write_UINT32(s, settings->KeyboardCodePage); /* CodePage (4 bytes) */
915
0
  Stream_Write_UINT32(s, flags);                      /* flags (4 bytes) */
916
0
  Stream_Write_UINT16(s, (UINT32)cbDomain);           /* cbDomain (2 bytes) */
917
0
  Stream_Write_UINT16(s, (UINT32)cbUserName);         /* cbUserName (2 bytes) */
918
0
  Stream_Write_UINT16(s, (UINT32)cbPassword);         /* cbPassword (2 bytes) */
919
0
  Stream_Write_UINT16(s, (UINT32)cbAlternateShell);   /* cbAlternateShell (2 bytes) */
920
0
  Stream_Write_UINT16(s, (UINT32)cbWorkingDir);       /* cbWorkingDir (2 bytes) */
921
922
0
  Stream_Write(s, domainW, cbDomain);
923
924
  /* the mandatory null terminator */
925
0
  Stream_Write_UINT16(s, 0);
926
927
0
  Stream_Write(s, userNameW, cbUserName);
928
929
  /* the mandatory null terminator */
930
0
  Stream_Write_UINT16(s, 0);
931
932
0
  Stream_Write(s, passwordW, cbPassword);
933
934
  /* the mandatory null terminator */
935
0
  Stream_Write_UINT16(s, 0);
936
937
0
  Stream_Write(s, alternateShellW, cbAlternateShell);
938
939
  /* the mandatory null terminator */
940
0
  Stream_Write_UINT16(s, 0);
941
942
0
  Stream_Write(s, workingDirW, cbWorkingDir);
943
944
  /* the mandatory null terminator */
945
0
  Stream_Write_UINT16(s, 0);
946
0
  ret = TRUE;
947
0
fail:
948
0
  free(domainW);
949
0
  free(userNameW);
950
0
  free(alternateShellW);
951
0
  free(workingDirW);
952
953
0
  if (!usedPasswordCookie)
954
0
    free(passwordW);
955
956
0
  if (!ret)
957
0
    return FALSE;
958
959
0
  if (settings->RdpVersion >= RDP_VERSION_5_PLUS)
960
0
    ret = rdp_write_extended_info_packet(rdp, s); /* extraInfo */
961
962
0
  return ret;
963
0
}
964
965
/**
966
 * Read Client Info PDU (CLIENT_INFO_PDU).
967
 * msdn{cc240474}
968
 * @param rdp RDP module
969
 * @param s stream
970
 */
971
972
BOOL rdp_recv_client_info(rdpRdp* rdp, wStream* s)
973
14.9k
{
974
14.9k
  UINT16 length = 0;
975
14.9k
  UINT16 channelId = 0;
976
14.9k
  UINT16 securityFlags = 0;
977
978
14.9k
  WINPR_ASSERT(rdp_get_state(rdp) == CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE);
979
980
14.9k
  if (!rdp_read_header(rdp, s, &length, &channelId))
981
13.7k
    return FALSE;
982
983
1.25k
  if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
984
7
    return FALSE;
985
986
1.24k
  if ((securityFlags & SEC_INFO_PKT) == 0)
987
13
    return FALSE;
988
989
1.23k
  if (rdp->settings->UseRdpSecurityLayer)
990
0
  {
991
0
    if (securityFlags & SEC_REDIRECTION_PKT)
992
0
    {
993
0
      WLog_ERR(TAG, "Error: SEC_REDIRECTION_PKT unsupported");
994
0
      return FALSE;
995
0
    }
996
997
0
    if (securityFlags & SEC_ENCRYPT)
998
0
    {
999
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
1000
0
        return FALSE;
1001
0
    }
1002
0
  }
1003
1004
1.23k
  return rdp_read_info_packet(rdp, s, length);
1005
1.23k
}
1006
1007
/**
1008
 * Send Client Info PDU (CLIENT_INFO_PDU).
1009
 * msdn{cc240474}
1010
 * @param rdp RDP module
1011
 */
1012
1013
BOOL rdp_send_client_info(rdpRdp* rdp)
1014
0
{
1015
0
  wStream* s = NULL;
1016
0
  WINPR_ASSERT(rdp);
1017
0
  rdp->sec_flags |= SEC_INFO_PKT;
1018
0
  s = rdp_send_stream_init(rdp);
1019
1020
0
  if (!s)
1021
0
  {
1022
0
    WLog_ERR(TAG, "Stream_New failed!");
1023
0
    return FALSE;
1024
0
  }
1025
1026
0
  if (!rdp_write_info_packet(rdp, s))
1027
0
  {
1028
0
    Stream_Release(s);
1029
0
    return FALSE;
1030
0
  }
1031
0
  return rdp_send(rdp, s, MCS_GLOBAL_CHANNEL_ID);
1032
0
}
1033
1034
static void rdp_free_logon_info(logon_info* info)
1035
1.39k
{
1036
1.39k
  if (!info)
1037
0
    return;
1038
1.39k
  free(info->domain);
1039
1.39k
  free(info->username);
1040
1041
1.39k
  const logon_info empty = { 0 };
1042
1.39k
  *info = empty;
1043
1.39k
}
1044
1045
static BOOL rdp_info_read_string(const char* what, wStream* s, size_t size, size_t max,
1046
                                 BOOL skipMax, char** dst)
1047
1.97k
{
1048
1.97k
  WINPR_ASSERT(dst);
1049
1.97k
  *dst = NULL;
1050
1051
1.97k
  if (size == 0)
1052
1.65k
  {
1053
1.65k
    if (skipMax)
1054
1.55k
      return Stream_SafeSeek(s, max);
1055
98
    return TRUE;
1056
1.65k
  }
1057
1058
327
  if (((size % sizeof(WCHAR)) != 0) || (size > max))
1059
287
  {
1060
287
    WLog_ERR(TAG, "protocol error: invalid %s value: %" PRIu32 "", what, size);
1061
287
    return FALSE;
1062
287
  }
1063
1064
40
  const WCHAR* str = Stream_ConstPointer(s);
1065
40
  if (!Stream_SafeSeek(s, skipMax ? max : size))
1066
3
    return FALSE;
1067
1068
37
  if (str[size / sizeof(WCHAR) - 1])
1069
7
  {
1070
7
    WLog_ERR(TAG, "protocol error: %s must be null terminated", what);
1071
7
    return FALSE;
1072
7
  }
1073
1074
30
  size_t len = 0;
1075
30
  char* rc = ConvertWCharNToUtf8Alloc(str, size / sizeof(WCHAR), &len);
1076
30
  if (!rc)
1077
2
  {
1078
2
    WLog_ERR(TAG, "failed to convert the %s string", what);
1079
2
    free(rc);
1080
2
    return FALSE;
1081
2
  }
1082
1083
28
  *dst = rc;
1084
28
  return TRUE;
1085
30
}
1086
1087
static BOOL rdp_recv_logon_info_v1(rdpRdp* rdp, wStream* s, logon_info* info)
1088
1.22k
{
1089
1.22k
  UINT32 cbDomain = 0;
1090
1.22k
  UINT32 cbUserName = 0;
1091
1092
1.22k
  WINPR_UNUSED(rdp);
1093
1.22k
  WINPR_ASSERT(info);
1094
1095
1.22k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
1096
225
    return FALSE;
1097
1098
997
  Stream_Read_UINT32(s, cbDomain); /* cbDomain (4 bytes) */
1099
1100
  /* cbDomain is the size of the Unicode character data (including the mandatory
1101
   * null terminator) in bytes present in the fixed-length (52 bytes) Domain field
1102
   */
1103
997
  if (!rdp_info_read_string("Domain", s, cbDomain, 52, TRUE, &info->domain))
1104
127
    goto fail;
1105
1106
870
  Stream_Read_UINT32(s, cbUserName); /* cbUserName (4 bytes) */
1107
1108
  /* cbUserName is the size of the Unicode character data (including the mandatory
1109
   * null terminator) in bytes present in the fixed-length (512 bytes) UserName field.
1110
   */
1111
870
  if (!rdp_info_read_string("UserName", s, cbUserName, 512, TRUE, &info->username))
1112
161
    goto fail;
1113
1114
709
  Stream_Read_UINT32(s, info->sessionId); /* SessionId (4 bytes) */
1115
709
  WLog_DBG(TAG, "LogonInfoV1: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
1116
709
           info->sessionId, info->username, info->domain);
1117
709
  return TRUE;
1118
288
fail:
1119
288
  return FALSE;
1120
870
}
1121
1122
static BOOL rdp_recv_logon_info_v2(rdpRdp* rdp, wStream* s, logon_info* info)
1123
171
{
1124
171
  UINT16 Version = 0;
1125
171
  UINT32 Size = 0;
1126
171
  UINT32 cbDomain = 0;
1127
171
  UINT32 cbUserName = 0;
1128
1129
171
  WINPR_ASSERT(rdp);
1130
171
  WINPR_ASSERT(s);
1131
171
  WINPR_ASSERT(info);
1132
1133
171
  WINPR_UNUSED(rdp);
1134
1135
171
  if (!Stream_CheckAndLogRequiredLength(TAG, s, logonInfoV2TotalSize))
1136
14
    return FALSE;
1137
1138
157
  Stream_Read_UINT16(s, Version); /* Version (2 bytes) */
1139
157
  if (Version != SAVE_SESSION_PDU_VERSION_ONE)
1140
36
  {
1141
36
    WLog_WARN(TAG, "LogonInfoV2::Version expected %" PRIu16 " bytes, got %" PRIu16,
1142
36
              SAVE_SESSION_PDU_VERSION_ONE, Version);
1143
36
    return FALSE;
1144
36
  }
1145
1146
121
  Stream_Read_UINT32(s, Size); /* Size (4 bytes) */
1147
1148
  /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
1149
   * should be logonInfoV2TotalSize
1150
   * but even MS server 2019 sends logonInfoV2Size
1151
   */
1152
121
  if (Size != logonInfoV2TotalSize)
1153
121
  {
1154
121
    if (Size != logonInfoV2Size)
1155
63
    {
1156
63
      WLog_WARN(TAG, "LogonInfoV2::Size expected %" PRIu32 " bytes, got %" PRIu32,
1157
63
                logonInfoV2TotalSize, Size);
1158
63
      return FALSE;
1159
63
    }
1160
121
  }
1161
1162
58
  Stream_Read_UINT32(s, info->sessionId);  /* SessionId (4 bytes) */
1163
58
  Stream_Read_UINT32(s, cbDomain);         /* cbDomain (4 bytes) */
1164
58
  Stream_Read_UINT32(s, cbUserName);       /* cbUserName (4 bytes) */
1165
58
  Stream_Seek(s, logonInfoV2ReservedSize); /* pad (558 bytes) */
1166
1167
  /* cbDomain is the size in bytes of the Unicode character data in the Domain field.
1168
   * The size of the mandatory null terminator is include in this value.
1169
   * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
1170
   *       that the maximum value is 52 bytes, according to the fixed size of the
1171
   *       Domain field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
1172
   */
1173
58
  if (!rdp_info_read_string("Domain", s, cbDomain, 52, FALSE, &info->domain))
1174
6
    goto fail;
1175
1176
  /* cbUserName is the size in bytes of the Unicode character data in the UserName field.
1177
   * The size of the mandatory null terminator is include in this value.
1178
   * Note: Since MS-RDPBCGR 2.2.10.1.1.2 does not mention any size limits we assume
1179
   *       that the maximum value is 512 bytes, according to the fixed size of the
1180
   *       Username field in the Logon Info Version 1 (TS_LOGON_INFO) structure.
1181
   */
1182
52
  if (!rdp_info_read_string("UserName", s, cbUserName, 512, FALSE, &info->username))
1183
5
    goto fail;
1184
1185
  /* We´ve seen undocumented padding with windows 11 here.
1186
   * unless it has actual data in it ignore it.
1187
   * if there is unexpected data, print a warning and dump the contents
1188
   */
1189
47
  const size_t rem = Stream_GetRemainingLength(s);
1190
47
  if (rem > 0)
1191
45
  {
1192
45
    BOOL warn = FALSE;
1193
45
    const char* str = Stream_ConstPointer(s);
1194
4.26M
    for (size_t x = 0; x < rem; x++)
1195
4.26M
    {
1196
4.26M
      if (str[x] != '\0')
1197
2.95M
        warn = TRUE;
1198
4.26M
    }
1199
45
    if (warn)
1200
39
    {
1201
39
      WLog_WARN(TAG, "unexpected padding of %" PRIuz " bytes, data not '\0'", rem);
1202
39
      winpr_HexDump(TAG, WLOG_TRACE, str, rem);
1203
39
    }
1204
1205
45
    if (!Stream_SafeSeek(s, rem))
1206
0
      goto fail;
1207
45
  }
1208
1209
47
  WLog_DBG(TAG, "LogonInfoV2: SessionId: 0x%08" PRIX32 " UserName: [%s] Domain: [%s]",
1210
47
           info->sessionId, info->username, info->domain);
1211
47
  return TRUE;
1212
11
fail:
1213
11
  return FALSE;
1214
47
}
1215
1216
static BOOL rdp_recv_logon_plain_notify(rdpRdp* rdp, wStream* s)
1217
12
{
1218
12
  WINPR_UNUSED(rdp);
1219
12
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 576))
1220
5
    return FALSE;
1221
1222
7
  Stream_Seek(s, 576); /* pad (576 bytes) */
1223
7
  WLog_DBG(TAG, "LogonPlainNotify");
1224
7
  return TRUE;
1225
12
}
1226
1227
static BOOL rdp_recv_logon_error_info(rdpRdp* rdp, wStream* s, logon_info_ex* info)
1228
115
{
1229
115
  freerdp* instance = NULL;
1230
115
  UINT32 errorNotificationType = 0;
1231
115
  UINT32 errorNotificationData = 0;
1232
1233
115
  WINPR_ASSERT(rdp);
1234
115
  WINPR_ASSERT(rdp->context);
1235
115
  WINPR_ASSERT(s);
1236
115
  WINPR_ASSERT(info);
1237
1238
115
  instance = rdp->context->instance;
1239
115
  WINPR_ASSERT(instance);
1240
1241
115
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
1242
2
    return FALSE;
1243
1244
113
  Stream_Read_UINT32(s, errorNotificationType); /* errorNotificationType (4 bytes) */
1245
113
  Stream_Read_UINT32(s, errorNotificationData); /* errorNotificationData (4 bytes) */
1246
113
  WLog_DBG(TAG, "LogonErrorInfo: Data: 0x%08" PRIX32 " Type: 0x%08" PRIX32 "",
1247
113
           errorNotificationData, errorNotificationType);
1248
113
  IFCALL(instance->LogonErrorInfo, instance, errorNotificationData, errorNotificationType);
1249
113
  info->ErrorNotificationType = errorNotificationType;
1250
113
  info->ErrorNotificationData = errorNotificationData;
1251
113
  return TRUE;
1252
115
}
1253
1254
static BOOL rdp_recv_logon_info_extended(rdpRdp* rdp, wStream* s, logon_info_ex* info)
1255
213
{
1256
213
  UINT32 cbFieldData = 0;
1257
213
  UINT32 fieldsPresent = 0;
1258
213
  UINT16 Length = 0;
1259
1260
213
  WINPR_ASSERT(rdp);
1261
213
  WINPR_ASSERT(s);
1262
213
  WINPR_ASSERT(info);
1263
1264
213
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 6))
1265
2
  {
1266
2
    WLog_WARN(TAG, "received short logon info extended, need 6 bytes, got %" PRIuz,
1267
2
              Stream_GetRemainingLength(s));
1268
2
    return FALSE;
1269
2
  }
1270
1271
211
  Stream_Read_UINT16(s, Length);        /* Length (2 bytes) */
1272
211
  Stream_Read_UINT32(s, fieldsPresent); /* fieldsPresent (4 bytes) */
1273
1274
211
  if ((Length < 6) || (!Stream_CheckAndLogRequiredLength(TAG, s, (Length - 6U))))
1275
19
  {
1276
19
    WLog_WARN(TAG,
1277
19
              "received short logon info extended, need %" PRIu16 " - 6 bytes, got %" PRIuz,
1278
19
              Length, Stream_GetRemainingLength(s));
1279
19
    return FALSE;
1280
19
  }
1281
1282
192
  WLog_DBG(TAG, "LogonInfoExtended: fieldsPresent: 0x%08" PRIX32 "", fieldsPresent);
1283
1284
  /* logonFields */
1285
1286
192
  if (fieldsPresent & LOGON_EX_AUTORECONNECTCOOKIE)
1287
81
  {
1288
81
    if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
1289
1
      return FALSE;
1290
1291
80
    info->haveCookie = TRUE;
1292
80
    Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
1293
1294
80
    if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
1295
7
      return FALSE;
1296
1297
73
    if (!rdp_read_server_auto_reconnect_cookie(rdp, s, info))
1298
50
      return FALSE;
1299
73
  }
1300
1301
134
  if (fieldsPresent & LOGON_EX_LOGONERRORS)
1302
119
  {
1303
119
    info->haveErrorInfo = TRUE;
1304
1305
119
    if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
1306
1
      return FALSE;
1307
1308
118
    Stream_Read_UINT32(s, cbFieldData); /* cbFieldData (4 bytes) */
1309
1310
118
    if (!Stream_CheckAndLogRequiredLength(TAG, s, cbFieldData))
1311
3
      return FALSE;
1312
1313
115
    if (!rdp_recv_logon_error_info(rdp, s, info))
1314
2
      return FALSE;
1315
115
  }
1316
1317
128
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 570))
1318
62
    return FALSE;
1319
1320
66
  Stream_Seek(s, 570); /* pad (570 bytes) */
1321
66
  return TRUE;
1322
128
}
1323
1324
BOOL rdp_recv_save_session_info(rdpRdp* rdp, wStream* s)
1325
8.28k
{
1326
8.28k
  UINT32 infoType = 0;
1327
8.28k
  BOOL status = 0;
1328
8.28k
  logon_info logonInfo = { 0 };
1329
8.28k
  logon_info_ex logonInfoEx = { 0 };
1330
8.28k
  rdpContext* context = rdp->context;
1331
8.28k
  rdpUpdate* update = rdp->context->update;
1332
1333
8.28k
  if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
1334
4.51k
    return FALSE;
1335
1336
3.77k
  Stream_Read_UINT32(s, infoType); /* infoType (4 bytes) */
1337
1338
3.77k
  switch (infoType)
1339
3.77k
  {
1340
1.22k
    case INFO_TYPE_LOGON:
1341
1.22k
      status = rdp_recv_logon_info_v1(rdp, s, &logonInfo);
1342
1343
1.22k
      if (status && update->SaveSessionInfo)
1344
0
        status = update->SaveSessionInfo(context, infoType, &logonInfo);
1345
1346
1.22k
      rdp_free_logon_info(&logonInfo);
1347
1.22k
      break;
1348
1349
171
    case INFO_TYPE_LOGON_LONG:
1350
171
      status = rdp_recv_logon_info_v2(rdp, s, &logonInfo);
1351
1352
171
      if (status && update->SaveSessionInfo)
1353
0
        status = update->SaveSessionInfo(context, infoType, &logonInfo);
1354
1355
171
      rdp_free_logon_info(&logonInfo);
1356
171
      break;
1357
1358
12
    case INFO_TYPE_LOGON_PLAIN_NOTIFY:
1359
12
      status = rdp_recv_logon_plain_notify(rdp, s);
1360
1361
12
      if (status && update->SaveSessionInfo)
1362
0
        status = update->SaveSessionInfo(context, infoType, NULL);
1363
1364
12
      break;
1365
1366
213
    case INFO_TYPE_LOGON_EXTENDED_INF:
1367
213
      status = rdp_recv_logon_info_extended(rdp, s, &logonInfoEx);
1368
1369
213
      if (status && update->SaveSessionInfo)
1370
0
        status = update->SaveSessionInfo(context, infoType, &logonInfoEx);
1371
1372
213
      break;
1373
1374
2.15k
    default:
1375
2.15k
      WLog_ERR(TAG, "Unhandled saveSessionInfo type 0x%" PRIx32 "", infoType);
1376
2.15k
      status = TRUE;
1377
2.15k
      break;
1378
3.77k
  }
1379
1380
3.77k
  if (!status)
1381
789
  {
1382
789
    WLog_DBG(TAG, "SaveSessionInfo error: infoType: %s (%" PRIu32 ")",
1383
789
             infoType < 4 ? INFO_TYPE_LOGON_STRINGS[infoType % 4] : "Unknown", infoType);
1384
789
  }
1385
1386
3.77k
  return status;
1387
3.77k
}
1388
1389
static BOOL rdp_write_logon_info_v1(wStream* s, logon_info* info)
1390
0
{
1391
0
  const size_t charLen = 52 / sizeof(WCHAR);
1392
0
  const size_t userCharLen = 512 / sizeof(WCHAR);
1393
1394
0
  size_t sz = 4 + 52 + 4 + 512 + 4;
1395
0
  size_t len = 0;
1396
1397
0
  if (!Stream_EnsureRemainingCapacity(s, sz))
1398
0
    return FALSE;
1399
1400
  /* domain */
1401
0
  WINPR_ASSERT(info);
1402
0
  if (!info->domain || !info->username)
1403
0
    return FALSE;
1404
1405
0
  len = strnlen(info->domain, charLen + 1);
1406
0
  if (len > charLen)
1407
0
    return FALSE;
1408
1409
0
  Stream_Write_UINT32(s, len * sizeof(WCHAR));
1410
0
  if (Stream_Write_UTF16_String_From_UTF8(s, charLen, info->domain, len, TRUE) < 0)
1411
0
    return FALSE;
1412
1413
  /* username */
1414
0
  len = strnlen(info->username, userCharLen + 1);
1415
0
  if (len > userCharLen)
1416
0
    return FALSE;
1417
1418
0
  Stream_Write_UINT32(s, len * sizeof(WCHAR));
1419
0
  if (Stream_Write_UTF16_String_From_UTF8(s, userCharLen, info->username, len, TRUE) < 0)
1420
0
    return FALSE;
1421
1422
  /* sessionId */
1423
0
  Stream_Write_UINT32(s, info->sessionId);
1424
0
  return TRUE;
1425
0
}
1426
1427
static BOOL rdp_write_logon_info_v2(wStream* s, logon_info* info)
1428
0
{
1429
0
  size_t domainLen = 0;
1430
0
  size_t usernameLen = 0;
1431
1432
0
  if (!Stream_EnsureRemainingCapacity(s, logonInfoV2TotalSize))
1433
0
    return FALSE;
1434
1435
0
  Stream_Write_UINT16(s, SAVE_SESSION_PDU_VERSION_ONE);
1436
  /* [MS-RDPBCGR] 2.2.10.1.1.2 Logon Info Version 2 (TS_LOGON_INFO_VERSION_2)
1437
   * should be logonInfoV2TotalSize
1438
   * but even MS server 2019 sends logonInfoV2Size
1439
   */
1440
0
  Stream_Write_UINT32(s, logonInfoV2Size);
1441
0
  Stream_Write_UINT32(s, info->sessionId);
1442
0
  domainLen = strnlen(info->domain, UINT32_MAX);
1443
0
  if (domainLen >= UINT32_MAX / sizeof(WCHAR))
1444
0
    return FALSE;
1445
0
  Stream_Write_UINT32(s, (UINT32)(domainLen + 1) * sizeof(WCHAR));
1446
0
  usernameLen = strnlen(info->username, UINT32_MAX);
1447
0
  if (usernameLen >= UINT32_MAX / sizeof(WCHAR))
1448
0
    return FALSE;
1449
0
  Stream_Write_UINT32(s, (UINT32)(usernameLen + 1) * sizeof(WCHAR));
1450
0
  Stream_Seek(s, logonInfoV2ReservedSize);
1451
0
  if (Stream_Write_UTF16_String_From_UTF8(s, domainLen + 1, info->domain, domainLen, TRUE) < 0)
1452
0
    return FALSE;
1453
0
  if (Stream_Write_UTF16_String_From_UTF8(s, usernameLen + 1, info->username, usernameLen, TRUE) <
1454
0
      0)
1455
0
    return FALSE;
1456
0
  return TRUE;
1457
0
}
1458
1459
static BOOL rdp_write_logon_info_plain(wStream* s)
1460
0
{
1461
0
  if (!Stream_EnsureRemainingCapacity(s, 576))
1462
0
    return FALSE;
1463
1464
0
  Stream_Seek(s, 576);
1465
0
  return TRUE;
1466
0
}
1467
1468
static BOOL rdp_write_logon_info_ex(wStream* s, logon_info_ex* info)
1469
0
{
1470
0
  UINT32 FieldsPresent = 0;
1471
0
  UINT16 Size = 2 + 4 + 570;
1472
1473
0
  if (info->haveCookie)
1474
0
  {
1475
0
    FieldsPresent |= LOGON_EX_AUTORECONNECTCOOKIE;
1476
0
    Size += 28;
1477
0
  }
1478
1479
0
  if (info->haveErrorInfo)
1480
0
  {
1481
0
    FieldsPresent |= LOGON_EX_LOGONERRORS;
1482
0
    Size += 8;
1483
0
  }
1484
1485
0
  if (!Stream_EnsureRemainingCapacity(s, Size))
1486
0
    return FALSE;
1487
1488
0
  Stream_Write_UINT16(s, Size);
1489
0
  Stream_Write_UINT32(s, FieldsPresent);
1490
1491
0
  if (info->haveCookie)
1492
0
  {
1493
0
    Stream_Write_UINT32(s, 28);                       /* cbFieldData (4 bytes) */
1494
0
    Stream_Write_UINT32(s, 28);                       /* cbLen (4 bytes) */
1495
0
    Stream_Write_UINT32(s, AUTO_RECONNECT_VERSION_1); /* Version (4 bytes) */
1496
0
    Stream_Write_UINT32(s, info->LogonId);            /* LogonId (4 bytes) */
1497
0
    Stream_Write(s, info->ArcRandomBits, 16);         /* ArcRandomBits (16 bytes) */
1498
0
  }
1499
1500
0
  if (info->haveErrorInfo)
1501
0
  {
1502
0
    Stream_Write_UINT32(s, 8);                           /* cbFieldData (4 bytes) */
1503
0
    Stream_Write_UINT32(s, info->ErrorNotificationType); /* ErrorNotificationType (4 bytes) */
1504
0
    Stream_Write_UINT32(s, info->ErrorNotificationData); /* ErrorNotificationData (4 bytes) */
1505
0
  }
1506
1507
0
  Stream_Seek(s, 570);
1508
0
  return TRUE;
1509
0
}
1510
1511
BOOL rdp_send_save_session_info(rdpContext* context, UINT32 type, void* data)
1512
0
{
1513
0
  wStream* s = NULL;
1514
0
  BOOL status = 0;
1515
0
  rdpRdp* rdp = context->rdp;
1516
0
  s = rdp_data_pdu_init(rdp);
1517
1518
0
  if (!s)
1519
0
    return FALSE;
1520
1521
0
  Stream_Write_UINT32(s, type);
1522
1523
0
  switch (type)
1524
0
  {
1525
0
    case INFO_TYPE_LOGON:
1526
0
      status = rdp_write_logon_info_v1(s, (logon_info*)data);
1527
0
      break;
1528
1529
0
    case INFO_TYPE_LOGON_LONG:
1530
0
      status = rdp_write_logon_info_v2(s, (logon_info*)data);
1531
0
      break;
1532
1533
0
    case INFO_TYPE_LOGON_PLAIN_NOTIFY:
1534
0
      status = rdp_write_logon_info_plain(s);
1535
0
      break;
1536
1537
0
    case INFO_TYPE_LOGON_EXTENDED_INF:
1538
0
      status = rdp_write_logon_info_ex(s, (logon_info_ex*)data);
1539
0
      break;
1540
1541
0
    default:
1542
0
      WLog_ERR(TAG, "saveSessionInfo type 0x%" PRIx32 " not handled", type);
1543
0
      status = FALSE;
1544
0
      break;
1545
0
  }
1546
1547
0
  if (status)
1548
0
    status = rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_SAVE_SESSION_INFO, rdp->mcs->userId);
1549
0
  else
1550
0
    Stream_Release(s);
1551
1552
0
  return status;
1553
0
}
1554
1555
BOOL rdp_send_server_status_info(rdpContext* context, UINT32 status)
1556
0
{
1557
0
  wStream* s = NULL;
1558
0
  rdpRdp* rdp = context->rdp;
1559
0
  s = rdp_data_pdu_init(rdp);
1560
1561
0
  if (!s)
1562
0
    return FALSE;
1563
1564
0
  Stream_Write_UINT32(s, status);
1565
0
  return rdp_send_data_pdu(rdp, s, DATA_PDU_TYPE_STATUS_INFO, rdp->mcs->userId);
1566
0
}