24#include <freerdp/config.h>
28#include <freerdp/license.h>
31#include <winpr/assert.h>
32#include <winpr/crypto.h>
33#include <winpr/shell.h>
34#include <winpr/path.h>
35#include <winpr/file.h>
37#include <freerdp/log.h>
39#include <freerdp/crypto/certificate.h>
43#include "../crypto/crypto.h"
44#include "../crypto/certificate.h"
46#define LICENSE_TAG FREERDP_TAG("core.license")
53#define PLATFORM_CHALLENGE_RESPONSE_VERSION 0x0100
56enum LicenseRequestType
58 LICENSE_REQUEST = 0x01,
59 PLATFORM_CHALLENGE = 0x02,
61 UPGRADE_LICENSE = 0x04,
63 NEW_LICENSE_REQUEST = 0x13,
64 PLATFORM_CHALLENGE_RESPONSE = 0x15,
75#define LICENSE_PREAMBLE_LENGTH 4
79#define SERVER_RANDOM_LENGTH 32
80#define MASTER_SECRET_LENGTH 48
81#define PREMASTER_SECRET_LENGTH 48
82#define SESSION_KEY_BLOB_LENGTH 48
83#define MAC_SALT_KEY_LENGTH 16
84#define LICENSING_ENCRYPTION_KEY_LENGTH 16
85#define HWID_PLATFORM_ID_LENGTH 4
93#define PREAMBLE_VERSION_3_0 0x03
95#define EXTENDED_ERROR_MSG_SUPPORTED 0x80
100 BB_ANY_BLOB = 0x0000,
101 BB_DATA_BLOB = 0x0001,
102 BB_RANDOM_BLOB = 0x0002,
103 BB_CERTIFICATE_BLOB = 0x0003,
104 BB_ERROR_BLOB = 0x0004,
105 BB_ENCRYPTED_DATA_BLOB = 0x0009,
106 BB_KEY_EXCHG_ALG_BLOB = 0x000D,
107 BB_SCOPE_BLOB = 0x000E,
108 BB_CLIENT_USER_NAME_BLOB = 0x000F,
109 BB_CLIENT_MACHINE_NAME_BLOB = 0x0010
114#define KEY_EXCHANGE_ALG_RSA 0x00000001
120 ERR_INVALID_SERVER_CERTIFICATE = 0x00000001,
121 ERR_NO_LICENSE = 0x00000002,
122 ERR_INVALID_MAC = 0x00000003,
123 ERR_INVALID_SCOPE = 0x00000004,
124 ERR_NO_LICENSE_SERVER = 0x00000006,
125 STATUS_VALID_CLIENT = 0x00000007,
126 ERR_INVALID_CLIENT = 0x00000008,
127 ERR_INVALID_PRODUCT_ID = 0x0000000B,
128 ERR_INVALID_MESSAGE_LENGTH = 0x0000000C
135 ST_TOTAL_ABORT = 0x00000001,
136 ST_NO_TRANSITION = 0x00000002,
137 ST_RESET_PHASE_TO_START = 0x00000003,
138 ST_RESEND_LAST_MESSAGE = 0x00000004
145 WIN32_PLATFORM_CHALLENGE_TYPE = 0x0100,
146 WIN16_PLATFORM_CHALLENGE_TYPE = 0x0200,
147 WINCE_PLATFORM_CHALLENGE_TYPE = 0x0300,
148 OTHER_PLATFORM_CHALLENGE_TYPE = 0xFF00
155 LICENSE_DETAIL_SIMPLE = 0x0001,
156 LICENSE_DETAIL_MODERATE = 0x0002,
157 LICENSE_DETAIL_DETAIL = 0x0003
175 CLIENT_OS_ID_WINNT_351 = 0x01000000,
176 CLIENT_OS_ID_WINNT_40 = 0x02000000,
177 CLIENT_OS_ID_WINNT_50 = 0x03000000,
178 CLIENT_OS_ID_WINNT_POST_52 = 0x04000000,
180 CLIENT_IMAGE_ID_MICROSOFT = 0x00010000,
181 CLIENT_IMAGE_ID_CITRIX = 0x00020000,
189 rdpCertificate* certificate;
190 BYTE HardwareId[HWID_LENGTH];
191 BYTE ClientRandom[CLIENT_RANDOM_LENGTH];
192 BYTE ServerRandom[SERVER_RANDOM_LENGTH];
193 BYTE MasterSecret[MASTER_SECRET_LENGTH];
194 BYTE PremasterSecret[PREMASTER_SECRET_LENGTH];
195 BYTE SessionKeyBlob[SESSION_KEY_BLOB_LENGTH];
196 BYTE MacSaltKey[MAC_SALT_KEY_LENGTH];
197 BYTE LicensingEncryptionKey[LICENSING_ENCRYPTION_KEY_LENGTH];
212 BYTE MACData[LICENSING_ENCRYPTION_KEY_LENGTH];
214 UINT32 PacketHeaderLength;
215 UINT32 PreferredKeyExchangeAlg;
218 UINT16 LicenseDetailLevel;
223static BOOL license_send_error_alert(rdpLicense* license, UINT32 dwErrorCode,
225static BOOL license_set_state(rdpLicense* license, LICENSE_STATE state);
226static const char* license_get_state_string(LICENSE_STATE state);
228static const char* license_preferred_key_exchange_alg_string(UINT32 alg,
char* buffer,
size_t size)
230 const char* name = NULL;
234 case KEY_EXCHANGE_ALG_RSA:
235 name =
"KEY_EXCHANGE_ALG_RSA";
238 name =
"KEY_EXCHANGE_ALG_UNKNOWN";
242 (void)_snprintf(buffer, size,
"%s [0x%08" PRIx32
"]", name, alg);
246static const char* license_request_type_string(UINT32 type)
250 case LICENSE_REQUEST:
251 return "LICENSE_REQUEST";
252 case PLATFORM_CHALLENGE:
253 return "PLATFORM_CHALLENGE";
255 return "NEW_LICENSE";
256 case UPGRADE_LICENSE:
257 return "UPGRADE_LICENSE";
259 return "LICENSE_INFO";
260 case NEW_LICENSE_REQUEST:
261 return "NEW_LICENSE_REQUEST";
262 case PLATFORM_CHALLENGE_RESPONSE:
263 return "PLATFORM_CHALLENGE_RESPONSE";
265 return "ERROR_ALERT";
267 return "LICENSE_REQUEST_TYPE_UNKNOWN";
271static const char* licencse_blob_type_string(UINT16 type)
276 return "BB_ANY_BLOB";
278 return "BB_DATA_BLOB";
280 return "BB_RANDOM_BLOB";
281 case BB_CERTIFICATE_BLOB:
282 return "BB_CERTIFICATE_BLOB";
284 return "BB_ERROR_BLOB";
285 case BB_ENCRYPTED_DATA_BLOB:
286 return "BB_ENCRYPTED_DATA_BLOB";
287 case BB_KEY_EXCHG_ALG_BLOB:
288 return "BB_KEY_EXCHG_ALG_BLOB";
290 return "BB_SCOPE_BLOB";
291 case BB_CLIENT_USER_NAME_BLOB:
292 return "BB_CLIENT_USER_NAME_BLOB";
293 case BB_CLIENT_MACHINE_NAME_BLOB:
294 return "BB_CLIENT_MACHINE_NAME_BLOB";
299static wStream* license_send_stream_init(rdpLicense* license, UINT16* sec_flags);
301static void license_generate_randoms(rdpLicense* license);
302static BOOL license_generate_keys(rdpLicense* license);
303static BOOL license_generate_hwid(rdpLicense* license);
304static BOOL license_encrypt_premaster_secret(rdpLicense* license);
310static LICENSE_BLOB* license_new_binary_blob(UINT16 type);
311static void license_free_binary_blob(
LICENSE_BLOB* blob);
312static BOOL license_read_binary_blob_data(wLog* log,
LICENSE_BLOB* blob, UINT16 type,
313 const void* data,
size_t length);
317static SCOPE_LIST* license_new_scope_list(
void);
318static BOOL license_scope_list_resize(
SCOPE_LIST* scopeList, UINT32 count);
319static void license_free_scope_list(
SCOPE_LIST* scopeList);
320static BOOL license_read_scope_list(wLog* log,
wStream* s,
SCOPE_LIST* scopeList);
321static BOOL license_write_scope_list(wLog* log,
wStream* s,
const SCOPE_LIST* scopeList);
323static BOOL license_read_license_request_packet(rdpLicense* license,
wStream* s);
324static BOOL license_write_license_request_packet(
const rdpLicense* license,
wStream* s);
326static BOOL license_read_platform_challenge_packet(rdpLicense* license,
wStream* s);
327static BOOL license_send_platform_challenge_packet(rdpLicense* license);
328static BOOL license_read_new_or_upgrade_license_packet(rdpLicense* license,
wStream* s);
329static BOOL license_read_error_alert_packet(rdpLicense* license,
wStream* s);
331static BOOL license_write_new_license_request_packet(
const rdpLicense* license,
wStream* s);
332static BOOL license_read_new_license_request_packet(rdpLicense* license,
wStream* s);
333static BOOL license_answer_license_request(rdpLicense* license);
335static BOOL license_send_platform_challenge_response(rdpLicense* license);
336static BOOL license_read_platform_challenge_response(rdpLicense* license);
338static BOOL license_read_client_platform_challenge_response(rdpLicense* license,
wStream* s);
339static BOOL license_write_client_platform_challenge_response(rdpLicense* license,
wStream* s);
341static BOOL license_write_server_upgrade_license(
const rdpLicense* license,
wStream* s);
343static BOOL license_send_license_info(rdpLicense* license,
const LICENSE_BLOB* calBlob,
344 const BYTE* signature,
size_t signature_length);
345static BOOL license_read_license_info(rdpLicense* license,
wStream* s);
346static state_run_t license_client_recv(rdpLicense* license,
wStream* s);
347static state_run_t license_server_recv(rdpLicense* license,
wStream* s);
349#define PLATFORMID (CLIENT_OS_ID_WINNT_POST_52 | CLIENT_IMAGE_ID_MICROSOFT)
351#ifdef WITH_DEBUG_LICENSE
353static const char* error_codes[] = {
"ERR_UNKNOWN",
354 "ERR_INVALID_SERVER_CERTIFICATE",
359 "ERR_NO_LICENSE_SERVER",
360 "STATUS_VALID_CLIENT",
361 "ERR_INVALID_CLIENT",
364 "ERR_INVALID_PRODUCT_ID",
365 "ERR_INVALID_MESSAGE_LENGTH" };
367static const char* state_transitions[] = {
"ST_UNKNOWN",
"ST_TOTAL_ABORT",
"ST_NO_TRANSITION",
368 "ST_RESET_PHASE_TO_START",
"ST_RESEND_LAST_MESSAGE" };
372 char* CompanyName = NULL;
373 char* ProductId = NULL;
375 WINPR_ASSERT(productInfo);
376 WINPR_ASSERT(productInfo->pbCompanyName);
377 WINPR_ASSERT(productInfo->pbProductId);
379 CompanyName = ConvertWCharNToUtf8Alloc((
const WCHAR*)productInfo->pbCompanyName,
380 productInfo->cbCompanyName /
sizeof(WCHAR), NULL);
381 ProductId = ConvertWCharNToUtf8Alloc((
const WCHAR*)productInfo->pbProductId,
382 productInfo->cbProductId /
sizeof(WCHAR), NULL);
383 WLog_Print(log, WLOG_INFO,
"ProductInfo:");
384 WLog_Print(log, WLOG_INFO,
"\tdwVersion: 0x%08" PRIX32
"", productInfo->dwVersion);
385 WLog_Print(log, WLOG_INFO,
"\tCompanyName: %s", CompanyName);
386 WLog_Print(log, WLOG_INFO,
"\tProductId: %s", ProductId);
391static void license_print_scope_list(wLog* log,
const SCOPE_LIST* scopeList)
393 WINPR_ASSERT(scopeList);
395 WLog_Print(log, WLOG_INFO,
"ScopeList (%" PRIu32
"):", scopeList->count);
397 for (UINT32 index = 0; index < scopeList->count; index++)
401 WINPR_ASSERT(scopeList->array);
402 scope = scopeList->array[index];
405 WLog_Print(log, WLOG_INFO,
"\t%s", (
const char*)scope->data);
410static const char licenseStore[] =
"licenses";
412static BOOL license_ensure_state(rdpLicense* license, LICENSE_STATE state, UINT32 msg)
414 const LICENSE_STATE cstate = license_get_state(license);
416 WINPR_ASSERT(license);
420 const char* scstate = license_get_state_string(cstate);
421 const char* sstate = license_get_state_string(state);
422 const char* where = license_request_type_string(msg);
424 WLog_Print(license->log, WLOG_WARN,
425 "Received [%s], but found invalid licensing state %s, expected %s", where,
432state_run_t license_recv(rdpLicense* license,
wStream* s)
434 WINPR_ASSERT(license);
435 WINPR_ASSERT(license->rdp);
436 WINPR_ASSERT(license->rdp->settings);
439 return license_server_recv(license, s);
441 return license_client_recv(license, s);
444static BOOL license_check_stream_length(wLog* log,
wStream* s, SSIZE_T expect,
const char* where)
446 const size_t remain = Stream_GetRemainingLength(s);
452 WLog_Print(log, WLOG_WARN,
"invalid %s, expected value %" PRIdz
" invalid", where, expect);
455 if (remain < (
size_t)expect)
457 WLog_Print(log, WLOG_WARN,
"short %s, expected %" PRIdz
" bytes, got %" PRIuz, where,
464static BOOL license_check_stream_capacity(wLog* log,
wStream* s,
size_t expect,
const char* where)
468 if (!Stream_CheckAndLogRequiredCapacityWLogEx(log, WLOG_WARN, s, expect, 1,
469 "%s(%s:%" PRIuz
") %s", __func__, __FILE__,
470 (
size_t)__LINE__, where))
476static BOOL computeCalHash(wLog* log,
const char* hostname,
char* hashStr,
size_t len)
478 WINPR_DIGEST_CTX* sha1 = NULL;
480 BYTE hash[20] = { 0 };
482 WINPR_ASSERT(hostname);
483 WINPR_ASSERT(hashStr);
485 if (len < 2 *
sizeof(hash) + 1)
488 if (!(sha1 = winpr_Digest_New()))
490 if (!winpr_Digest_Init(sha1, WINPR_MD_SHA1))
492 if (!winpr_Digest_Update(sha1, (
const BYTE*)hostname, strlen(hostname)))
494 if (!winpr_Digest_Final(sha1, hash,
sizeof(hash)))
497 for (
size_t i = 0; i <
sizeof(hash); i++, hashStr += 2)
498 (
void)sprintf_s(hashStr, 3,
"%.2x", hash[i]);
503 WLog_Print(log, WLOG_ERROR,
"failed to generate SHA1 of hostname '%s'", hostname);
504 winpr_Digest_Free(sha1);
508static BOOL saveCal(wLog* log,
const rdpSettings* settings,
const BYTE* data,
size_t length,
509 const char* hostname)
511 char hash[41] = { 0 };
513 char* licenseStorePath = NULL;
514 char filename[MAX_PATH] = { 0 };
515 char filenameNew[MAX_PATH] = { 0 };
516 char* filepath = NULL;
517 char* filepathNew = NULL;
524 WINPR_ASSERT(data || (length == 0));
525 WINPR_ASSERT(hostname);
527 if (!winpr_PathFileExists(path))
529 if (!winpr_PathMakePath(path, 0))
531 WLog_Print(log, WLOG_ERROR,
"error creating directory '%s'", path);
534 WLog_Print(log, WLOG_INFO,
"creating directory %s", path);
537 if (!(licenseStorePath = GetCombinedPath(path, licenseStore)))
539 WLog_Print(log, WLOG_ERROR,
"Failed to get license store path from '%s' + '%s'", path,
544 if (!winpr_PathFileExists(licenseStorePath))
546 if (!winpr_PathMakePath(licenseStorePath, 0))
548 WLog_Print(log, WLOG_ERROR,
"error creating directory '%s'", licenseStorePath);
551 WLog_Print(log, WLOG_INFO,
"creating directory %s", licenseStorePath);
554 if (!computeCalHash(log, hostname, hash,
sizeof(hash)))
556 (void)sprintf_s(filename,
sizeof(filename) - 1,
"%s.cal", hash);
557 (void)sprintf_s(filenameNew,
sizeof(filenameNew) - 1,
"%s.cal.new", hash);
559 if (!(filepath = GetCombinedPath(licenseStorePath, filename)))
561 WLog_Print(log, WLOG_ERROR,
"Failed to get license file path from '%s' + '%s'", path,
566 if (!(filepathNew = GetCombinedPath(licenseStorePath, filenameNew)))
568 WLog_Print(log, WLOG_ERROR,
"Failed to get license new file path from '%s' + '%s'", path,
573 fp = winpr_fopen(filepathNew,
"wb");
576 WLog_Print(log, WLOG_ERROR,
"Failed to open license file '%s'", filepathNew);
580 written = fwrite(data, length, 1, fp);
585 WLog_Print(log, WLOG_ERROR,
"Failed to write to license file '%s'", filepathNew);
586 winpr_DeleteFile(filepathNew);
590 ret = winpr_MoveFileEx(filepathNew, filepath, MOVEFILE_REPLACE_EXISTING);
592 WLog_Print(log, WLOG_ERROR,
"Failed to move license file '%s' to '%s'", filepathNew,
598 free(licenseStorePath);
602static BYTE* loadCalFile(wLog* log,
const rdpSettings* settings,
const char* hostname,
605 char* licenseStorePath = NULL;
606 char* calPath = NULL;
607 char calFilename[MAX_PATH] = { 0 };
608 char hash[41] = { 0 };
614 WINPR_ASSERT(settings);
615 WINPR_ASSERT(hostname);
616 WINPR_ASSERT(dataLen);
618 if (!computeCalHash(log, hostname, hash,
sizeof(hash)))
620 WLog_Print(log, WLOG_ERROR,
"loadCalFile: unable to compute hostname hash");
624 (void)sprintf_s(calFilename,
sizeof(calFilename) - 1,
"%s.cal", hash);
626 if (!(licenseStorePath = GetCombinedPath(
630 if (!(calPath = GetCombinedPath(licenseStorePath, calFilename)))
633 fp = winpr_fopen(calPath,
"rb");
637 if (_fseeki64(fp, 0, SEEK_END) != 0)
639 length = _ftelli64(fp);
640 if (_fseeki64(fp, 0, SEEK_SET) != 0)
645 ret = (BYTE*)malloc((
size_t)length);
649 status = fread(ret, (
size_t)length, 1, fp);
653 *dataLen = (size_t)length;
657 free(licenseStorePath);
667 free(licenseStorePath);
681static BOOL license_read_preamble(wLog* log,
wStream* s, BYTE* bMsgType, BYTE* flags,
684 WINPR_ASSERT(bMsgType);
686 WINPR_ASSERT(wMsgSize);
689 if (!license_check_stream_length(log, s, 4,
"license preamble"))
692 Stream_Read_UINT8(s, *bMsgType);
693 Stream_Read_UINT8(s, *flags);
694 Stream_Read_UINT16(s, *wMsgSize);
695 return license_check_stream_length(log, s, *wMsgSize - 4ll,
"license preamble::wMsgSize");
708static BOOL license_write_preamble(
wStream* s, BYTE bMsgType, BYTE flags, UINT16 wMsgSize)
710 if (!Stream_EnsureRemainingCapacity(s, 4))
714 Stream_Write_UINT8(s, bMsgType);
715 Stream_Write_UINT8(s, flags);
716 Stream_Write_UINT16(s, wMsgSize);
728wStream* license_send_stream_init(rdpLicense* license, UINT16* sec_flags)
730 WINPR_ASSERT(license);
731 WINPR_ASSERT(license->rdp);
732 WINPR_ASSERT(sec_flags);
734 const BOOL do_crypt = license->rdp->do_crypt;
736 *sec_flags = SEC_LICENSE_PKT;
748 *sec_flags |= SEC_LICENSE_ENCRYPT_CS;
749 license->rdp->do_crypt = license->rdp->do_crypt_license;
752 wStream* s = rdp_send_stream_init(license->rdp, sec_flags);
756 license->rdp->do_crypt = do_crypt;
757 license->PacketHeaderLength = (UINT16)Stream_GetPosition(s);
758 if (!Stream_SafeSeek(s, LICENSE_PREAMBLE_LENGTH))
774static BOOL license_send(rdpLicense* license,
wStream* s, BYTE type, UINT16 sec_flags)
776 WINPR_ASSERT(license);
777 WINPR_ASSERT(license->rdp);
779 rdpRdp* rdp = license->rdp;
780 WINPR_ASSERT(rdp->settings);
782 DEBUG_LICENSE(
"Sending %s Packet", license_request_type_string(type));
783 const size_t length = Stream_GetPosition(s);
784 WINPR_ASSERT(length >= license->PacketHeaderLength);
785 WINPR_ASSERT(length <= UINT16_MAX + license->PacketHeaderLength);
787 const UINT16 wMsgSize = (UINT16)(length - license->PacketHeaderLength);
788 Stream_SetPosition(s, license->PacketHeaderLength);
789 BYTE flags = PREAMBLE_VERSION_3_0;
796 if (!rdp->settings->ServerMode)
797 flags |= EXTENDED_ERROR_MSG_SUPPORTED;
799 if (!license_write_preamble(s, type, flags, wMsgSize))
805#ifdef WITH_DEBUG_LICENSE
806 WLog_Print(license->log, WLOG_DEBUG,
"Sending %s Packet, length %" PRIu16
"",
807 license_request_type_string(type), wMsgSize);
808 winpr_HexLogDump(license->log, WLOG_DEBUG, Stream_PointerAs(s,
char) - LICENSE_PREAMBLE_LENGTH,
811 Stream_SetPosition(s, length);
812 const BOOL ret = rdp_send(rdp, s, MCS_GLOBAL_CHANNEL_ID, sec_flags);
816BOOL license_write_server_upgrade_license(
const rdpLicense* license,
wStream* s)
818 WINPR_ASSERT(license);
820 if (!license_write_binary_blob(s, license->EncryptedLicenseInfo))
822 if (!license_check_stream_capacity(license->log, s,
sizeof(license->MACData),
823 "SERVER_UPGRADE_LICENSE::MACData"))
825 Stream_Write(s, license->MACData,
sizeof(license->MACData));
829static BOOL license_server_send_new_or_upgrade_license(rdpLicense* license, BOOL upgrade)
831 UINT16 sec_flags = 0;
832 wStream* s = license_send_stream_init(license, &sec_flags);
833 const BYTE type = upgrade ? UPGRADE_LICENSE : NEW_LICENSE;
838 if (!license_write_server_upgrade_license(license, s))
841 return license_send(license, s, type, sec_flags);
856static state_run_t license_client_recv_int(rdpLicense* license,
wStream* s)
861 const size_t length = Stream_GetRemainingLength(s);
863 WINPR_ASSERT(license);
865 if (!license_read_preamble(license->log, s, &bMsgType, &flags,
867 return STATE_RUN_FAILED;
869 DEBUG_LICENSE(
"Receiving %s Packet", license_request_type_string(bMsgType));
873 case LICENSE_REQUEST:
875 if (license_get_state(license) == LICENSE_STATE_INITIAL)
876 license_set_state(license, LICENSE_STATE_CONFIGURED);
878 if (!license_ensure_state(license, LICENSE_STATE_CONFIGURED, bMsgType))
879 return STATE_RUN_FAILED;
881 if (!license_read_license_request_packet(license, s))
882 return STATE_RUN_FAILED;
884 if (!license_answer_license_request(license))
885 return STATE_RUN_FAILED;
887 license_set_state(license, LICENSE_STATE_NEW_REQUEST);
890 case PLATFORM_CHALLENGE:
891 if (!license_ensure_state(license, LICENSE_STATE_NEW_REQUEST, bMsgType))
892 return STATE_RUN_FAILED;
894 if (!license_read_platform_challenge_packet(license, s))
895 return STATE_RUN_FAILED;
897 if (!license_send_platform_challenge_response(license))
898 return STATE_RUN_FAILED;
899 license_set_state(license, LICENSE_STATE_PLATFORM_CHALLENGE_RESPONSE);
903 case UPGRADE_LICENSE:
904 if (!license_ensure_state(license, LICENSE_STATE_PLATFORM_CHALLENGE_RESPONSE, bMsgType))
905 return STATE_RUN_FAILED;
906 if (!license_read_new_or_upgrade_license_packet(license, s))
907 return STATE_RUN_FAILED;
911 if (!license_read_error_alert_packet(license, s))
912 return STATE_RUN_FAILED;
916 WLog_Print(license->log, WLOG_ERROR,
"invalid bMsgType:%" PRIu8
"", bMsgType);
917 return STATE_RUN_FAILED;
920 if (!tpkt_ensure_stream_consumed(license->log, s, length))
921 return STATE_RUN_FAILED;
922 return STATE_RUN_SUCCESS;
925state_run_t license_client_recv(rdpLicense* license,
wStream* s)
927 state_run_t rc = license_client_recv_int(license, s);
928 if (state_run_failed(rc))
930 freerdp_set_last_error(license->rdp->context, ERROR_CTX_LICENSE_CLIENT_INVALID);
935state_run_t license_server_recv(rdpLicense* license,
wStream* s)
937 state_run_t rc = STATE_RUN_FAILED;
941 const size_t length = Stream_GetRemainingLength(s);
943 WINPR_ASSERT(license);
945 if (!license_read_preamble(license->log, s, &bMsgType, &flags,
949 DEBUG_LICENSE(
"Receiving %s Packet", license_request_type_string(bMsgType));
953 case NEW_LICENSE_REQUEST:
954 if (!license_ensure_state(license, LICENSE_STATE_REQUEST, bMsgType))
956 if (!license_read_new_license_request_packet(license, s))
959 if (!license_send_error_alert(license, ERR_INVALID_MAC, ST_TOTAL_ABORT,
962 if (!license_send_platform_challenge_packet(license))
964 license->update = FALSE;
965 if (!license_set_state(license, LICENSE_STATE_PLATFORM_CHALLENGE))
969 if (!license_ensure_state(license, LICENSE_STATE_REQUEST, bMsgType))
971 if (!license_read_license_info(license, s))
974 if (!license_send_platform_challenge_packet(license))
976 if (!license_set_state(license, LICENSE_STATE_PLATFORM_CHALLENGE))
978 license->update = TRUE;
981 case PLATFORM_CHALLENGE_RESPONSE:
982 if (!license_ensure_state(license, LICENSE_STATE_PLATFORM_CHALLENGE, bMsgType))
984 if (!license_read_client_platform_challenge_response(license, s))
990 if (license_send_error_alert(license, ERR_INVALID_CLIENT, ST_TOTAL_ABORT,
996 if (!license_server_send_new_or_upgrade_license(license, license->update))
999 license->type = LICENSE_TYPE_ISSUED;
1000 license_set_state(license, LICENSE_STATE_COMPLETED);
1002 rc = STATE_RUN_CONTINUE;
1007 if (!license_read_error_alert_packet(license, s))
1012 WLog_Print(license->log, WLOG_ERROR,
"invalid bMsgType:%" PRIu8
"", bMsgType);
1016 if (!tpkt_ensure_stream_consumed(license->log, s, length))
1019 if (!state_run_success(rc))
1020 rc = STATE_RUN_SUCCESS;
1023 if (state_run_failed(rc))
1025 if (flags & EXTENDED_ERROR_MSG_SUPPORTED)
1026 license_send_error_alert(license, ERR_INVALID_CLIENT, ST_TOTAL_ABORT, NULL);
1027 license_set_state(license, LICENSE_STATE_ABORTED);
1033void license_generate_randoms(rdpLicense* license)
1035 WINPR_ASSERT(license);
1037#ifdef LICENSE_NULL_CLIENT_RANDOM
1038 ZeroMemory(license->ClientRandom,
sizeof(license->ClientRandom));
1040 winpr_RAND(license->ClientRandom,
sizeof(license->ClientRandom));
1043 winpr_RAND(license->ServerRandom,
sizeof(license->ServerRandom));
1045#ifdef LICENSE_NULL_PREMASTER_SECRET
1046 ZeroMemory(license->PremasterSecret,
sizeof(license->PremasterSecret));
1048 winpr_RAND(license->PremasterSecret,
sizeof(license->PremasterSecret));
1057static BOOL license_generate_keys(rdpLicense* license)
1059 WINPR_ASSERT(license);
1063 !security_master_secret(license->PremasterSecret,
sizeof(license->PremasterSecret),
1064 license->ClientRandom,
sizeof(license->ClientRandom),
1065 license->ServerRandom,
sizeof(license->ServerRandom),
1066 license->MasterSecret,
sizeof(license->MasterSecret)) ||
1068 !security_session_key_blob(license->MasterSecret,
sizeof(license->MasterSecret),
1069 license->ClientRandom,
sizeof(license->ClientRandom),
1070 license->ServerRandom,
sizeof(license->ServerRandom),
1071 license->SessionKeyBlob,
sizeof(license->SessionKeyBlob)))
1075 security_mac_salt_key(license->SessionKeyBlob,
sizeof(license->SessionKeyBlob),
1076 license->ClientRandom,
sizeof(license->ClientRandom),
1077 license->ServerRandom,
sizeof(license->ServerRandom), license->MacSaltKey,
1078 sizeof(license->MacSaltKey));
1079 const BOOL ret = security_licensing_encryption_key(
1080 license->SessionKeyBlob,
sizeof(license->SessionKeyBlob), license->ClientRandom,
1081 sizeof(license->ClientRandom), license->ServerRandom,
sizeof(license->ServerRandom),
1082 license->LicensingEncryptionKey,
1083 sizeof(license->LicensingEncryptionKey));
1085#ifdef WITH_DEBUG_LICENSE
1086 WLog_Print(license->log, WLOG_DEBUG,
"ClientRandom:");
1087 winpr_HexLogDump(license->log, WLOG_DEBUG, license->ClientRandom,
1088 sizeof(license->ClientRandom));
1089 WLog_Print(license->log, WLOG_DEBUG,
"ServerRandom:");
1090 winpr_HexLogDump(license->log, WLOG_DEBUG, license->ServerRandom,
1091 sizeof(license->ServerRandom));
1092 WLog_Print(license->log, WLOG_DEBUG,
"PremasterSecret:");
1093 winpr_HexLogDump(license->log, WLOG_DEBUG, license->PremasterSecret,
1094 sizeof(license->PremasterSecret));
1095 WLog_Print(license->log, WLOG_DEBUG,
"MasterSecret:");
1096 winpr_HexLogDump(license->log, WLOG_DEBUG, license->MasterSecret,
1097 sizeof(license->MasterSecret));
1098 WLog_Print(license->log, WLOG_DEBUG,
"SessionKeyBlob:");
1099 winpr_HexLogDump(license->log, WLOG_DEBUG, license->SessionKeyBlob,
1100 sizeof(license->SessionKeyBlob));
1101 WLog_Print(license->log, WLOG_DEBUG,
"MacSaltKey:");
1102 winpr_HexLogDump(license->log, WLOG_DEBUG, license->MacSaltKey,
sizeof(license->MacSaltKey));
1103 WLog_Print(license->log, WLOG_DEBUG,
"LicensingEncryptionKey:");
1104 winpr_HexLogDump(license->log, WLOG_DEBUG, license->LicensingEncryptionKey,
1105 sizeof(license->LicensingEncryptionKey));
1115BOOL license_generate_hwid(rdpLicense* license)
1117 const BYTE* hashTarget = NULL;
1118 size_t targetLen = 0;
1119 BYTE macAddress[6] = { 0 };
1121 WINPR_ASSERT(license);
1122 WINPR_ASSERT(license->rdp);
1123 WINPR_ASSERT(license->rdp->settings);
1125 ZeroMemory(license->HardwareId,
sizeof(license->HardwareId));
1127 if (license->rdp->settings->OldLicenseBehaviour)
1129 hashTarget = macAddress;
1130 targetLen =
sizeof(macAddress);
1135 const char* hostname = license->rdp->settings->ClientHostname;
1136 wStream* s = Stream_StaticInit(&buffer, license->HardwareId, 4);
1137 Stream_Write_UINT32(s, license->PlatformId);
1139 hashTarget = (
const BYTE*)hostname;
1140 targetLen = hostname ? strlen(hostname) : 0;
1149 return winpr_Digest_Allow_FIPS(WINPR_MD_MD5, hashTarget, targetLen,
1150 &license->HardwareId[HWID_PLATFORM_ID_LENGTH],
1151 WINPR_MD5_DIGEST_LENGTH);
1154static BOOL license_get_server_rsa_public_key(rdpLicense* license)
1156 rdpSettings* settings = NULL;
1158 WINPR_ASSERT(license);
1159 WINPR_ASSERT(license->certificate);
1160 WINPR_ASSERT(license->rdp);
1162 settings = license->rdp->settings;
1163 WINPR_ASSERT(settings);
1165 if (license->ServerCertificate->length < 1)
1167 if (!freerdp_certificate_read_server_cert(license->certificate, settings->ServerCertificate,
1168 settings->ServerCertificateLength))
1175BOOL license_encrypt_premaster_secret(rdpLicense* license)
1177 WINPR_ASSERT(license);
1178 WINPR_ASSERT(license->certificate);
1180 if (!license_get_server_rsa_public_key(license))
1183 WINPR_ASSERT(license->EncryptedPremasterSecret);
1185 const rdpCertInfo* info = freerdp_certificate_get_info(license->certificate);
1188 WLog_Print(license->log, WLOG_ERROR,
"info=%p, license->certificate=%p", (
const void*)info,
1189 (
void*)license->certificate);
1193#ifdef WITH_DEBUG_LICENSE
1194 WLog_Print(license->log, WLOG_DEBUG,
"Modulus (%" PRIu32
" bits):", info->ModulusLength * 8);
1195 winpr_HexLogDump(license->log, WLOG_DEBUG, info->Modulus, info->ModulusLength);
1196 WLog_Print(license->log, WLOG_DEBUG,
"Exponent:");
1197 winpr_HexLogDump(license->log, WLOG_DEBUG, info->exponent,
sizeof(info->exponent));
1200 BYTE* EncryptedPremasterSecret = (BYTE*)calloc(1, info->ModulusLength);
1201 if (!EncryptedPremasterSecret)
1203 WLog_Print(license->log, WLOG_ERROR,
1204 "EncryptedPremasterSecret=%p, info->ModulusLength=%" PRIu32,
1205 (
const void*)EncryptedPremasterSecret, info->ModulusLength);
1209 license->EncryptedPremasterSecret->type = BB_RANDOM_BLOB;
1210 license->EncryptedPremasterSecret->length =
sizeof(license->PremasterSecret);
1211#ifndef LICENSE_NULL_PREMASTER_SECRET
1213 const SSIZE_T length =
1214 crypto_rsa_public_encrypt(license->PremasterSecret,
sizeof(license->PremasterSecret),
1215 info, EncryptedPremasterSecret, info->ModulusLength);
1216 if ((length < 0) || (length > UINT16_MAX))
1218 WLog_Print(license->log, WLOG_ERROR,
"RSA public encrypt length=%" PRIdz
" < 0 || > %d",
1219 length, UINT16_MAX);
1222 license->EncryptedPremasterSecret->length = (UINT16)length;
1225 license->EncryptedPremasterSecret->data = EncryptedPremasterSecret;
1229static BOOL license_rc4_with_licenseKey(
const rdpLicense* license,
const BYTE* input,
size_t len,
1232 WINPR_ASSERT(license);
1233 WINPR_ASSERT(input || (len == 0));
1234 WINPR_ASSERT(target);
1235 WINPR_ASSERT(len <= UINT16_MAX);
1237 WINPR_RC4_CTX* rc4 = winpr_RC4_New_Allow_FIPS(license->LicensingEncryptionKey,
1238 sizeof(license->LicensingEncryptionKey));
1241 WLog_Print(license->log, WLOG_ERROR,
"Failed to allocate RC4");
1245 BYTE* buffer = NULL;
1247 buffer = realloc(target->data, len);
1251 target->data = buffer;
1252 target->length = (UINT16)len;
1254 if (!winpr_RC4_Update(rc4, len, input, buffer))
1257 winpr_RC4_Free(rc4);
1261 WLog_Print(license->log, WLOG_ERROR,
"Failed to create/update RC4: len=%" PRIuz
", buffer=%p",
1262 len, (
const void*)buffer);
1263 winpr_RC4_Free(rc4);
1277static BOOL license_encrypt_and_MAC(rdpLicense* license,
const BYTE* input,
size_t len,
1280 WINPR_ASSERT(license);
1281 return license_rc4_with_licenseKey(license, input, len, target) &&
1282 security_mac_data(license->MacSaltKey,
sizeof(license->MacSaltKey), input, len, mac,
1297static BOOL license_decrypt_and_check_MAC(rdpLicense* license,
const BYTE* input,
size_t len,
1300 BYTE macData[
sizeof(license->MACData)] = { 0 };
1302 WINPR_ASSERT(license);
1303 WINPR_ASSERT(target);
1307 WLog_Print(license->log, WLOG_DEBUG,
"TransportDumpReplay active, skipping...");
1311 if (!license_rc4_with_licenseKey(license, input, len, target))
1314 if (!security_mac_data(license->MacSaltKey,
sizeof(license->MacSaltKey), target->data, len,
1315 macData,
sizeof(macData)))
1318 if (memcmp(packetMac, macData,
sizeof(macData)) != 0)
1320 WLog_Print(license->log, WLOG_ERROR,
"packetMac != expectedMac");
1335 WINPR_ASSERT(productInfo);
1337 if (!license_check_stream_length(log, s, 8,
"license product info::cbCompanyName"))
1340 Stream_Read_UINT32(s, productInfo->dwVersion);
1341 Stream_Read_UINT32(s, productInfo->cbCompanyName);
1344 if ((productInfo->cbCompanyName < 2) || (productInfo->cbCompanyName % 2 != 0))
1346 WLog_Print(log, WLOG_WARN,
"license product info invalid cbCompanyName %" PRIu32,
1347 productInfo->cbCompanyName);
1351 if (!license_check_stream_length(log, s, productInfo->cbCompanyName,
1352 "license product info::CompanyName"))
1355 productInfo->pbProductId = NULL;
1356 productInfo->pbCompanyName = (BYTE*)malloc(productInfo->cbCompanyName);
1357 if (!productInfo->pbCompanyName)
1359 Stream_Read(s, productInfo->pbCompanyName, productInfo->cbCompanyName);
1361 if (!license_check_stream_length(log, s, 4,
"license product info::cbProductId"))
1364 Stream_Read_UINT32(s, productInfo->cbProductId);
1366 if ((productInfo->cbProductId < 2) || (productInfo->cbProductId % 2 != 0))
1368 WLog_Print(log, WLOG_WARN,
"license product info invalid cbProductId %" PRIu32,
1369 productInfo->cbProductId);
1373 if (!license_check_stream_length(log, s, productInfo->cbProductId,
1374 "license product info::ProductId"))
1377 productInfo->pbProductId = (BYTE*)malloc(productInfo->cbProductId);
1378 if (!productInfo->pbProductId)
1380 Stream_Read(s, productInfo->pbProductId, productInfo->cbProductId);
1384 free(productInfo->pbCompanyName);
1385 free(productInfo->pbProductId);
1386 productInfo->pbCompanyName = NULL;
1387 productInfo->pbProductId = NULL;
1391static BOOL license_write_product_info(wLog* log,
wStream* s,
1394 WINPR_ASSERT(productInfo);
1396 if (!license_check_stream_capacity(log, s, 8,
"license product info::cbCompanyName"))
1399 Stream_Write_UINT32(s, productInfo->dwVersion);
1400 Stream_Write_UINT32(s, productInfo->cbCompanyName);
1403 if ((productInfo->cbCompanyName < 2) || (productInfo->cbCompanyName % 2 != 0) ||
1404 !productInfo->pbCompanyName)
1406 WLog_Print(log, WLOG_WARN,
"license product info invalid cbCompanyName %" PRIu32,
1407 productInfo->cbCompanyName);
1411 if (!license_check_stream_capacity(log, s, productInfo->cbCompanyName,
1412 "license product info::CompanyName"))
1415 Stream_Write(s, productInfo->pbCompanyName, productInfo->cbCompanyName);
1417 if (!license_check_stream_capacity(log, s, 4,
"license product info::cbProductId"))
1420 Stream_Write_UINT32(s, productInfo->cbProductId);
1422 if ((productInfo->cbProductId < 2) || (productInfo->cbProductId % 2 != 0) ||
1423 !productInfo->pbProductId)
1425 WLog_Print(log, WLOG_WARN,
"license product info invalid cbProductId %" PRIu32,
1426 productInfo->cbProductId);
1430 if (!license_check_stream_capacity(log, s, productInfo->cbProductId,
1431 "license product info::ProductId"))
1434 Stream_Write(s, productInfo->pbProductId, productInfo->cbProductId);
1463 free(productInfo->pbCompanyName);
1464 free(productInfo->pbProductId);
1469BOOL license_read_binary_blob_data(wLog* log,
LICENSE_BLOB* blob, UINT16 wBlobType,
1470 const void* data,
size_t length)
1473 WINPR_ASSERT(length <= UINT16_MAX);
1474 WINPR_ASSERT(data || (length == 0));
1476 blob->length = (UINT16)length;
1480 if ((blob->type != wBlobType) && (blob->type != BB_ANY_BLOB))
1482 WLog_Print(log, WLOG_ERROR,
"license binary blob::type expected %s, got %s",
1483 licencse_blob_type_string(wBlobType), licencse_blob_type_string(blob->type));
1490 if ((blob->type != BB_ANY_BLOB) && (blob->length == 0))
1492 WLog_Print(log, WLOG_DEBUG,
"license binary blob::type %s, length=0, skipping.",
1493 licencse_blob_type_string(blob->type));
1497 blob->type = wBlobType;
1499 if (blob->length > 0)
1500 blob->data = malloc(blob->length);
1503 WLog_Print(log, WLOG_ERROR,
"license binary blob::length=%" PRIu16
", blob::data=%p",
1504 blob->length, (
const void*)blob->data);
1507 memcpy(blob->data, data, blob->length);
1520 UINT16 wBlobType = 0;
1525 if (!license_check_stream_length(log, s, 4,
"license binary blob::type"))
1528 Stream_Read_UINT16(s, wBlobType);
1529 Stream_Read_UINT16(s, length);
1531 if (!license_check_stream_length(log, s, length,
"license binary blob::length"))
1534 if (!license_read_binary_blob_data(log, blob, wBlobType, Stream_Pointer(s), length))
1537 return Stream_SafeSeek(s, length);
1551 if (!Stream_EnsureRemainingCapacity(s, blob->length + 4))
1554 Stream_Write_UINT16(s, blob->type);
1555 Stream_Write_UINT16(s, blob->length);
1557 if (blob->length > 0)
1558 Stream_Write(s, blob->data, blob->length);
1562static BOOL license_write_encrypted_premaster_secret_blob(wLog* log,
wStream* s,
1564 UINT32 ModulusLength)
1566 const UINT32 length = ModulusLength + 8;
1569 WINPR_ASSERT(length <= UINT16_MAX);
1571 if (blob->length > ModulusLength)
1573 WLog_Print(log, WLOG_ERROR,
"invalid blob");
1577 if (!Stream_EnsureRemainingCapacity(s, length + 4))
1579 Stream_Write_UINT16(s, blob->type);
1580 Stream_Write_UINT16(s, (UINT16)length);
1582 if (blob->length > 0)
1583 Stream_Write(s, blob->data, blob->length);
1585 Stream_Zero(s, length - blob->length);
1589static BOOL license_read_encrypted_premaster_secret_blob(wLog* log,
wStream* s,
LICENSE_BLOB* blob,
1590 UINT32* ModulusLength)
1592 if (!license_read_binary_blob(log, s, blob))
1594 WINPR_ASSERT(ModulusLength);
1595 *ModulusLength = blob->length;
1637 UINT32 scopeCount = 0;
1639 WINPR_ASSERT(scopeList);
1641 if (!license_check_stream_length(log, s, 4,
"license scope list"))
1644 Stream_Read_UINT32(s, scopeCount);
1646 if (!license_check_stream_length(log, s, 4ll * scopeCount,
"license scope list::count"))
1649 if (!license_scope_list_resize(scopeList, scopeCount))
1652 for (UINT32 i = 0; i < scopeCount; i++)
1654 if (!license_read_binary_blob(log, s, scopeList->array[i]))
1661BOOL license_write_scope_list(wLog* log,
wStream* s,
const SCOPE_LIST* scopeList)
1663 WINPR_ASSERT(scopeList);
1665 if (!license_check_stream_capacity(log, s, 4,
"license scope list"))
1668 Stream_Write_UINT32(s, scopeList->count);
1670 if (!license_check_stream_capacity(log, s, scopeList->count * 4ull,
1671 "license scope list::count"))
1675 WINPR_ASSERT(scopeList->array || (scopeList->count == 0));
1676 for (UINT32 i = 0; i < scopeList->count; i++)
1680 if (!license_write_binary_blob(s, element))
1699BOOL license_scope_list_resize(
SCOPE_LIST* scopeList, UINT32 count)
1701 WINPR_ASSERT(scopeList);
1702 WINPR_ASSERT(scopeList->array || (scopeList->count == 0));
1704 for (UINT32 x = count; x < scopeList->count; x++)
1706 license_free_binary_blob(scopeList->array[x]);
1707 scopeList->array[x] = NULL;
1716 scopeList->array = tmp;
1720 free((
void*)scopeList->array);
1721 scopeList->array = NULL;
1724 for (UINT32 x = scopeList->count; x < count; x++)
1726 LICENSE_BLOB* blob = license_new_binary_blob(BB_SCOPE_BLOB);
1729 scopeList->count = x;
1732 scopeList->array[x] = blob;
1735 scopeList->count = count;
1745void license_free_scope_list(
SCOPE_LIST* scopeList)
1750 license_scope_list_resize(scopeList, 0);
1754BOOL license_send_license_info(rdpLicense* license,
const LICENSE_BLOB* calBlob,
1755 const BYTE* signature,
size_t signature_length)
1757 WINPR_ASSERT(calBlob);
1758 WINPR_ASSERT(signature);
1759 WINPR_ASSERT(license->certificate);
1761 const rdpCertInfo* info = freerdp_certificate_get_info(license->certificate);
1765 UINT16 sec_flags = 0;
1766 wStream* s = license_send_stream_init(license, &sec_flags);
1770 if (!license_check_stream_capacity(license->log, s, 8 +
sizeof(license->ClientRandom),
1771 "license info::ClientRandom"))
1774 Stream_Write_UINT32(s,
1775 license->PreferredKeyExchangeAlg);
1776 Stream_Write_UINT32(s, license->PlatformId);
1779 Stream_Write(s, license->ClientRandom,
sizeof(license->ClientRandom));
1782 if (!license_write_encrypted_premaster_secret_blob(
1783 license->log, s, license->EncryptedPremasterSecret, info->ModulusLength))
1787 if (!license_write_binary_blob(s, calBlob))
1791 if (!license_write_binary_blob(s, license->EncryptedHardwareId))
1795 if (!license_check_stream_capacity(license->log, s, signature_length,
"license info::MACData"))
1797 Stream_Write(s, signature, signature_length);
1799 return license_send(license, s, LICENSE_INFO, sec_flags);
1806static BOOL license_check_preferred_alg(rdpLicense* license, UINT32 PreferredKeyExchangeAlg,
1809 WINPR_ASSERT(license);
1810 WINPR_ASSERT(where);
1812 if (license->PreferredKeyExchangeAlg != PreferredKeyExchangeAlg)
1814 char buffer1[64] = { 0 };
1815 char buffer2[64] = { 0 };
1816 WLog_Print(license->log, WLOG_WARN,
"%s::PreferredKeyExchangeAlg, expected %s, got %s",
1818 license_preferred_key_exchange_alg_string(license->PreferredKeyExchangeAlg,
1819 buffer1,
sizeof(buffer1)),
1820 license_preferred_key_exchange_alg_string(PreferredKeyExchangeAlg, buffer2,
1827BOOL license_read_license_info(rdpLicense* license,
wStream* s)
1830 UINT32 PreferredKeyExchangeAlg = 0;
1832 WINPR_ASSERT(license);
1833 WINPR_ASSERT(license->certificate);
1835 const rdpCertInfo* info = freerdp_certificate_get_info(license->certificate);
1840 if (!license_check_stream_length(license->log, s, 8 +
sizeof(license->ClientRandom),
1844 Stream_Read_UINT32(s, PreferredKeyExchangeAlg);
1845 if (!license_check_preferred_alg(license, PreferredKeyExchangeAlg,
"license info"))
1847 Stream_Read_UINT32(s, license->PlatformId);
1850 Stream_Read(s, license->ClientRandom,
sizeof(license->ClientRandom));
1853 UINT32 ModulusLength = 0;
1854 if (!license_read_encrypted_premaster_secret_blob(
1855 license->log, s, license->EncryptedPremasterSecret, &ModulusLength))
1858 if (ModulusLength != info->ModulusLength)
1860 WLog_Print(license->log, WLOG_WARN,
1861 "EncryptedPremasterSecret,::ModulusLength[%" PRIu32
1862 "] != rdpCertInfo::ModulusLength[%" PRIu32
"]",
1863 ModulusLength, info->ModulusLength);
1867 if (!license_read_binary_blob(license->log, s, license->LicenseInfo))
1871 if (!license_read_binary_blob(license->log, s, license->EncryptedHardwareId))
1875 if (!license_check_stream_length(license->log, s,
sizeof(license->MACData),
1876 "license info::MACData"))
1878 Stream_Read(s, license->MACData,
sizeof(license->MACData));
1893BOOL license_read_license_request_packet(rdpLicense* license,
wStream* s)
1895 WINPR_ASSERT(license);
1898 if (!license_check_stream_length(license->log, s,
sizeof(license->ServerRandom),
1902 Stream_Read(s, license->ServerRandom,
sizeof(license->ServerRandom));
1905 if (!license_read_product_info(license->log, s, license->ProductInfo))
1909 if (!license_read_binary_blob(license->log, s, license->KeyExchangeList))
1913 if (!license_read_binary_blob(license->log, s, license->ServerCertificate))
1917 if (!license_read_scope_list(license->log, s, license->ScopeList))
1921 if (!freerdp_certificate_read_server_cert(license->certificate,
1922 license->ServerCertificate->data,
1923 license->ServerCertificate->length))
1926 if (!license_generate_keys(license) || !license_generate_hwid(license) ||
1927 !license_encrypt_premaster_secret(license))
1930#ifdef WITH_DEBUG_LICENSE
1931 WLog_Print(license->log, WLOG_DEBUG,
"ServerRandom:");
1932 winpr_HexLogDump(license->log, WLOG_DEBUG, license->ServerRandom,
1933 sizeof(license->ServerRandom));
1934 license_print_product_info(license->log, license->ProductInfo);
1935 license_print_scope_list(license->log, license->ScopeList);
1940BOOL license_write_license_request_packet(
const rdpLicense* license,
wStream* s)
1942 WINPR_ASSERT(license);
1945 if (!license_check_stream_capacity(license->log, s,
sizeof(license->ServerRandom),
1948 Stream_Write(s, license->ServerRandom,
sizeof(license->ServerRandom));
1951 if (!license_write_product_info(license->log, s, license->ProductInfo))
1955 if (!license_write_binary_blob(s, license->KeyExchangeList))
1959 if (!license_write_binary_blob(s, license->ServerCertificate))
1963 if (!license_write_scope_list(license->log, s, license->ScopeList))
1969static BOOL license_send_license_request_packet(rdpLicense* license)
1971 UINT16 sec_flags = 0;
1972 wStream* s = license_send_stream_init(license, &sec_flags);
1976 if (!license_write_license_request_packet(license, s))
1979 return license_send(license, s, LICENSE_REQUEST, sec_flags);
1993BOOL license_read_platform_challenge_packet(rdpLicense* license,
wStream* s)
1995 BYTE macData[LICENSING_ENCRYPTION_KEY_LENGTH] = { 0 };
1997 WINPR_ASSERT(license);
1999 DEBUG_LICENSE(
"Receiving Platform Challenge Packet");
2001 if (!license_check_stream_length(license->log, s, 4,
"license platform challenge"))
2006 Stream_Seek_UINT32(s);
2009 license->EncryptedPlatformChallenge->type = BB_ANY_BLOB;
2010 if (!license_read_binary_blob(license->log, s, license->EncryptedPlatformChallenge))
2012 license->EncryptedPlatformChallenge->type = BB_ENCRYPTED_DATA_BLOB;
2015 if (!license_check_stream_length(license->log, s,
sizeof(macData),
2016 "license platform challenge::MAC"))
2019 Stream_Read(s, macData,
sizeof(macData));
2020 if (!license_decrypt_and_check_MAC(license, license->EncryptedPlatformChallenge->data,
2021 license->EncryptedPlatformChallenge->length,
2022 license->PlatformChallenge, macData))
2025#ifdef WITH_DEBUG_LICENSE
2026 WLog_Print(license->log, WLOG_DEBUG,
"EncryptedPlatformChallenge:");
2027 winpr_HexLogDump(license->log, WLOG_DEBUG, license->EncryptedPlatformChallenge->data,
2028 license->EncryptedPlatformChallenge->length);
2029 WLog_Print(license->log, WLOG_DEBUG,
"PlatformChallenge:");
2030 winpr_HexLogDump(license->log, WLOG_DEBUG, license->PlatformChallenge->data,
2031 license->PlatformChallenge->length);
2032 WLog_Print(license->log, WLOG_DEBUG,
"MacData:");
2033 winpr_HexLogDump(license->log, WLOG_DEBUG, macData,
sizeof(macData));
2038BOOL license_send_error_alert(rdpLicense* license, UINT32 dwErrorCode, UINT32 dwStateTransition,
2041 UINT16 sec_flags = 0;
2042 wStream* s = license_send_stream_init(license, &sec_flags);
2047 if (!license_check_stream_capacity(license->log, s, 8,
"license error alert"))
2049 Stream_Write_UINT32(s, dwErrorCode);
2050 Stream_Write_UINT32(s, dwStateTransition);
2054 if (!license_write_binary_blob(s, info))
2058 return license_send(license, s, ERROR_ALERT, sec_flags);
2064BOOL license_send_platform_challenge_packet(rdpLicense* license)
2066 UINT16 sec_flags = 0;
2067 wStream* s = license_send_stream_init(license, &sec_flags);
2072 DEBUG_LICENSE(
"Receiving Platform Challenge Packet");
2074 if (!license_check_stream_capacity(license->log, s, 4,
"license platform challenge"))
2080 if (!license_write_binary_blob(s, license->EncryptedPlatformChallenge))
2084 if (!license_check_stream_length(license->log, s,
sizeof(license->MACData),
2085 "license platform challenge::MAC"))
2088 Stream_Write(s, license->MACData,
sizeof(license->MACData));
2090 return license_send(license, s, PLATFORM_CHALLENGE, sec_flags);
2096static BOOL license_read_encrypted_blob(
const rdpLicense* license,
wStream* s,
LICENSE_BLOB* target)
2098 UINT16 wBlobType = 0;
2099 UINT16 wBlobLen = 0;
2101 WINPR_ASSERT(license);
2102 WINPR_ASSERT(target);
2104 if (!license_check_stream_length(license->log, s, 4,
"license encrypted blob"))
2107 Stream_Read_UINT16(s, wBlobType);
2108 if (wBlobType != BB_ENCRYPTED_DATA_BLOB)
2111 license->log, WLOG_WARN,
2112 "expecting BB_ENCRYPTED_DATA_BLOB blob, probably a windows 2003 server, continuing...");
2115 Stream_Read_UINT16(s, wBlobLen);
2117 BYTE* encryptedData = Stream_Pointer(s);
2118 if (!Stream_SafeSeek(s, wBlobLen))
2120 WLog_Print(license->log, WLOG_WARN,
2121 "short license encrypted blob::length, expected %" PRIu16
" bytes, got %" PRIuz,
2122 wBlobLen, Stream_GetRemainingLength(s));
2126 return license_rc4_with_licenseKey(license, encryptedData, wBlobLen, target);
2136BOOL license_read_new_or_upgrade_license_packet(rdpLicense* license,
wStream* s)
2138 UINT32 os_major = 0;
2139 UINT32 os_minor = 0;
2141 UINT32 cbCompanyName = 0;
2142 UINT32 cbProductId = 0;
2143 UINT32 cbLicenseInfo = 0;
2145 wStream* licenseStream = NULL;
2147 BYTE computedMac[16] = { 0 };
2148 const BYTE* readMac = NULL;
2150 WINPR_ASSERT(license);
2152 DEBUG_LICENSE(
"Receiving Server New/Upgrade License Packet");
2154 LICENSE_BLOB* calBlob = license_new_binary_blob(BB_DATA_BLOB);
2159 if (!license_read_encrypted_blob(license, s, calBlob))
2163 readMac = Stream_Pointer(s);
2164 if (!Stream_SafeSeek(s,
sizeof(computedMac)))
2166 WLog_Print(license->log, WLOG_WARN,
2167 "short license new/upgrade, expected 16 bytes, got %" PRIuz,
2168 Stream_GetRemainingLength(s));
2172 if (!security_mac_data(license->MacSaltKey,
sizeof(license->MacSaltKey), calBlob->data,
2173 calBlob->length, computedMac,
sizeof(computedMac)))
2176 if (memcmp(computedMac, readMac,
sizeof(computedMac)) != 0)
2178 WLog_Print(license->log, WLOG_ERROR,
"new or upgrade license MAC mismatch");
2182 licenseStream = Stream_StaticConstInit(&sbuffer, calBlob->data, calBlob->length);
2185 WLog_Print(license->log, WLOG_ERROR,
2186 "license::blob::data=%p, license::blob::length=%" PRIu16,
2187 (
const void*)calBlob->data, calBlob->length);
2191 if (!license_check_stream_length(license->log, licenseStream, 8,
2192 "license new/upgrade::blob::version"))
2195 Stream_Read_UINT16(licenseStream, os_minor);
2196 Stream_Read_UINT16(licenseStream, os_major);
2198 WLog_Print(license->log, WLOG_DEBUG,
"Version: %" PRIu16
".%" PRIu16, os_major, os_minor);
2201 Stream_Read_UINT32(licenseStream, cbScope);
2202 if (!license_check_stream_length(license->log, licenseStream, cbScope,
2203 "license new/upgrade::blob::scope"))
2206#ifdef WITH_DEBUG_LICENSE
2207 WLog_Print(license->log, WLOG_DEBUG,
"Scope:");
2208 winpr_HexLogDump(license->log, WLOG_DEBUG, Stream_Pointer(licenseStream), cbScope);
2210 Stream_Seek(licenseStream, cbScope);
2213 if (!license_check_stream_length(license->log, licenseStream, 4,
2214 "license new/upgrade::blob::cbCompanyName"))
2217 Stream_Read_UINT32(licenseStream, cbCompanyName);
2218 if (!license_check_stream_length(license->log, licenseStream, cbCompanyName,
2219 "license new/upgrade::blob::CompanyName"))
2222#ifdef WITH_DEBUG_LICENSE
2223 WLog_Print(license->log, WLOG_DEBUG,
"Company name:");
2224 winpr_HexLogDump(license->log, WLOG_DEBUG, Stream_Pointer(licenseStream), cbCompanyName);
2226 Stream_Seek(licenseStream, cbCompanyName);
2229 if (!license_check_stream_length(license->log, licenseStream, 4,
2230 "license new/upgrade::blob::cbProductId"))
2233 Stream_Read_UINT32(licenseStream, cbProductId);
2235 if (!license_check_stream_length(license->log, licenseStream, cbProductId,
2236 "license new/upgrade::blob::ProductId"))
2239#ifdef WITH_DEBUG_LICENSE
2240 WLog_Print(license->log, WLOG_DEBUG,
"Product id:");
2241 winpr_HexLogDump(license->log, WLOG_DEBUG, Stream_Pointer(licenseStream), cbProductId);
2243 Stream_Seek(licenseStream, cbProductId);
2246 if (!license_check_stream_length(license->log, licenseStream, 4,
2247 "license new/upgrade::blob::cbLicenseInfo"))
2250 Stream_Read_UINT32(licenseStream, cbLicenseInfo);
2251 if (!license_check_stream_length(license->log, licenseStream, cbLicenseInfo,
2252 "license new/upgrade::blob::LicenseInfo"))
2255 license->type = LICENSE_TYPE_ISSUED;
2256 ret = license_set_state(license, LICENSE_STATE_COMPLETED);
2258 if (!license->rdp->settings->OldLicenseBehaviour)
2259 ret = saveCal(license->log, license->rdp->settings, Stream_Pointer(licenseStream),
2260 cbLicenseInfo, license->rdp->settings->ClientHostname);
2263 license_free_binary_blob(calBlob);
2274BOOL license_read_error_alert_packet(rdpLicense* license,
wStream* s)
2276 UINT32 dwErrorCode = 0;
2277 UINT32 dwStateTransition = 0;
2279 WINPR_ASSERT(license);
2280 WINPR_ASSERT(license->rdp);
2282 if (!license_check_stream_length(license->log, s, 8ul,
"error alert"))
2285 Stream_Read_UINT32(s, dwErrorCode);
2286 Stream_Read_UINT32(s, dwStateTransition);
2288 if (!license_read_binary_blob(license->log, s, license->ErrorInfo))
2291#ifdef WITH_DEBUG_LICENSE
2292 WLog_Print(license->log, WLOG_DEBUG,
"dwErrorCode: %s, dwStateTransition: %s",
2293 error_codes[dwErrorCode], state_transitions[dwStateTransition]);
2296 if (dwErrorCode == STATUS_VALID_CLIENT)
2298 license->type = LICENSE_TYPE_NONE;
2299 return license_set_state(license, LICENSE_STATE_COMPLETED);
2302 switch (dwStateTransition)
2304 case ST_TOTAL_ABORT:
2305 license_set_state(license, LICENSE_STATE_ABORTED);
2307 case ST_NO_TRANSITION:
2308 license_set_state(license, LICENSE_STATE_COMPLETED);
2310 case ST_RESET_PHASE_TO_START:
2311 license_set_state(license, LICENSE_STATE_CONFIGURED);
2313 case ST_RESEND_LAST_MESSAGE:
2329BOOL license_write_new_license_request_packet(
const rdpLicense* license,
wStream* s)
2331 WINPR_ASSERT(license);
2333 const rdpCertInfo* info = freerdp_certificate_get_info(license->certificate);
2337 if (!license_check_stream_capacity(license->log, s, 8 +
sizeof(license->ClientRandom),
2341 Stream_Write_UINT32(s,
2342 license->PreferredKeyExchangeAlg);
2343 Stream_Write_UINT32(s, license->PlatformId);
2344 Stream_Write(s, license->ClientRandom,
2345 sizeof(license->ClientRandom));
2348 !license_write_encrypted_premaster_secret_blob(
2349 license->log, s, license->EncryptedPremasterSecret, info->ModulusLength) ||
2351 !license_write_binary_blob(s, license->ClientUserName) ||
2353 !license_write_binary_blob(s, license->ClientMachineName))
2358#ifdef WITH_DEBUG_LICENSE
2359 WLog_Print(license->log, WLOG_DEBUG,
"PreferredKeyExchangeAlg: 0x%08" PRIX32
"",
2360 license->PreferredKeyExchangeAlg);
2361 WLog_Print(license->log, WLOG_DEBUG,
"ClientRandom:");
2362 winpr_HexLogDump(license->log, WLOG_DEBUG, license->ClientRandom,
2363 sizeof(license->ClientRandom));
2364 WLog_Print(license->log, WLOG_DEBUG,
"EncryptedPremasterSecret");
2365 winpr_HexLogDump(license->log, WLOG_DEBUG, license->EncryptedPremasterSecret->data,
2366 license->EncryptedPremasterSecret->length);
2367 WLog_Print(license->log, WLOG_DEBUG,
"ClientUserName (%" PRIu16
"): %s",
2368 license->ClientUserName->length, (
char*)license->ClientUserName->data);
2369 WLog_Print(license->log, WLOG_DEBUG,
"ClientMachineName (%" PRIu16
"): %s",
2370 license->ClientMachineName->length, (
char*)license->ClientMachineName->data);
2375BOOL license_read_new_license_request_packet(rdpLicense* license,
wStream* s)
2377 UINT32 PreferredKeyExchangeAlg = 0;
2379 WINPR_ASSERT(license);
2381 if (!license_check_stream_length(license->log, s, 8ull +
sizeof(license->ClientRandom),
2382 "new license request"))
2385 Stream_Read_UINT32(s, PreferredKeyExchangeAlg);
2386 if (!license_check_preferred_alg(license, PreferredKeyExchangeAlg,
"new license request"))
2389 Stream_Read_UINT32(s, license->PlatformId);
2390 Stream_Read(s, license->ClientRandom,
2391 sizeof(license->ClientRandom));
2394 UINT32 ModulusLength = 0;
2395 if (!license_read_encrypted_premaster_secret_blob(
2396 license->log, s, license->EncryptedPremasterSecret, &ModulusLength))
2399 const rdpCertInfo* info = freerdp_certificate_get_info(license->certificate);
2401 WLog_Print(license->log, WLOG_WARN,
2402 "Missing license certificate, skipping ModulusLength checks");
2403 else if (ModulusLength != info->ModulusLength)
2405 WLog_Print(license->log, WLOG_WARN,
2406 "EncryptedPremasterSecret expected to be %" PRIu32
" bytes, but read %" PRIu32
2408 info->ModulusLength, ModulusLength);
2413 if (!license_read_binary_blob(license->log, s, license->ClientUserName))
2416 if (!license_read_binary_blob(license->log, s, license->ClientMachineName))
2428BOOL license_answer_license_request(rdpLicense* license)
2430 UINT16 sec_flags = 0;
2432 BYTE* license_data = NULL;
2433 size_t license_size = 0;
2435 char* username = NULL;
2437 WINPR_ASSERT(license);
2438 WINPR_ASSERT(license->rdp);
2439 WINPR_ASSERT(license->rdp->settings);
2441 if (!license->rdp->settings->OldLicenseBehaviour)
2442 license_data = loadCalFile(license->log, license->rdp->settings,
2443 license->rdp->settings->ClientHostname, &license_size);
2448 BYTE signature[LICENSING_ENCRYPTION_KEY_LENGTH] = { 0 };
2450 DEBUG_LICENSE(
"Sending Saved License Packet");
2452 WINPR_ASSERT(license->EncryptedHardwareId);
2453 license->EncryptedHardwareId->type = BB_ENCRYPTED_DATA_BLOB;
2454 if (!license_encrypt_and_MAC(license, license->HardwareId,
sizeof(license->HardwareId),
2455 license->EncryptedHardwareId, signature,
sizeof(signature)))
2461 calBlob = license_new_binary_blob(BB_DATA_BLOB);
2467 calBlob->data = license_data;
2468 WINPR_ASSERT(license_size <= UINT16_MAX);
2469 calBlob->length = (UINT16)license_size;
2471 status = license_send_license_info(license, calBlob, signature,
sizeof(signature));
2472 license_free_binary_blob(calBlob);
2477 DEBUG_LICENSE(
"Sending New License Packet");
2479 s = license_send_stream_init(license, &sec_flags);
2482 if (license->rdp->settings->Username != NULL)
2483 username = license->rdp->settings->Username;
2485 username =
"username";
2488 WINPR_ASSERT(license->ClientUserName);
2489 const size_t len = strlen(username) + 1;
2490 WINPR_ASSERT(len <= UINT16_MAX);
2492 license->ClientUserName->data = (BYTE*)username;
2493 license->ClientUserName->length = (UINT16)len;
2497 WINPR_ASSERT(license->ClientMachineName);
2498 const size_t len = strlen(license->rdp->settings->ClientHostname) + 1;
2499 WINPR_ASSERT(len <= UINT16_MAX);
2501 license->ClientMachineName->data = (BYTE*)license->rdp->settings->ClientHostname;
2502 license->ClientMachineName->length = (UINT16)len;
2504 status = license_write_new_license_request_packet(license, s);
2506 WINPR_ASSERT(license->ClientUserName);
2507 license->ClientUserName->data = NULL;
2508 license->ClientUserName->length = 0;
2510 WINPR_ASSERT(license->ClientMachineName);
2511 license->ClientMachineName->data = NULL;
2512 license->ClientMachineName->length = 0;
2520 return license_send(license, s, NEW_LICENSE_REQUEST, sec_flags);
2529BOOL license_send_platform_challenge_response(rdpLicense* license)
2531 wStream* challengeRespData = NULL;
2532 BYTE* buffer = NULL;
2535 WINPR_ASSERT(license);
2536 WINPR_ASSERT(license->PlatformChallenge);
2537 WINPR_ASSERT(license->MacSaltKey);
2538 WINPR_ASSERT(license->EncryptedPlatformChallenge);
2539 WINPR_ASSERT(license->EncryptedHardwareId);
2541 DEBUG_LICENSE(
"Sending Platform Challenge Response Packet");
2543 license->EncryptedPlatformChallenge->type = BB_DATA_BLOB;
2546 challengeRespData = Stream_New(NULL, 8 + license->PlatformChallenge->length);
2547 if (!challengeRespData)
2549 Stream_Write_UINT16(challengeRespData, PLATFORM_CHALLENGE_RESPONSE_VERSION);
2550 Stream_Write_UINT16(challengeRespData, license->ClientType);
2551 Stream_Write_UINT16(challengeRespData, license->LicenseDetailLevel);
2552 Stream_Write_UINT16(challengeRespData, license->PlatformChallenge->length);
2553 Stream_Write(challengeRespData, license->PlatformChallenge->data,
2554 license->PlatformChallenge->length);
2555 Stream_SealLength(challengeRespData);
2558 const size_t length = Stream_Length(challengeRespData) +
sizeof(license->HardwareId);
2559 buffer = (BYTE*)malloc(length);
2562 Stream_Free(challengeRespData, TRUE);
2566 CopyMemory(buffer, Stream_Buffer(challengeRespData), Stream_Length(challengeRespData));
2567 CopyMemory(&buffer[Stream_Length(challengeRespData)], license->HardwareId,
2568 sizeof(license->HardwareId));
2569 status = security_mac_data(license->MacSaltKey,
sizeof(license->MacSaltKey), buffer, length,
2570 license->MACData,
sizeof(license->MACData));
2575 Stream_Free(challengeRespData, TRUE);
2579 license->EncryptedHardwareId->type = BB_ENCRYPTED_DATA_BLOB;
2580 if (!license_rc4_with_licenseKey(license, license->HardwareId,
sizeof(license->HardwareId),
2581 license->EncryptedHardwareId))
2583 Stream_Free(challengeRespData, TRUE);
2587 status = license_rc4_with_licenseKey(license, Stream_Buffer(challengeRespData),
2588 Stream_Length(challengeRespData),
2589 license->EncryptedPlatformChallengeResponse);
2590 Stream_Free(challengeRespData, TRUE);
2594#ifdef WITH_DEBUG_LICENSE
2595 WLog_Print(license->log, WLOG_DEBUG,
"LicensingEncryptionKey:");
2596 winpr_HexLogDump(license->log, WLOG_DEBUG, license->LicensingEncryptionKey, 16);
2597 WLog_Print(license->log, WLOG_DEBUG,
"HardwareId:");
2598 winpr_HexLogDump(license->log, WLOG_DEBUG, license->HardwareId,
sizeof(license->HardwareId));
2599 WLog_Print(license->log, WLOG_DEBUG,
"EncryptedHardwareId:");
2600 winpr_HexLogDump(license->log, WLOG_DEBUG, license->EncryptedHardwareId->data,
2601 license->EncryptedHardwareId->length);
2603 UINT16 sec_flags = 0;
2604 wStream* s = license_send_stream_init(license, &sec_flags);
2608 if (license_write_client_platform_challenge_response(license, s))
2609 return license_send(license, s, PLATFORM_CHALLENGE_RESPONSE, sec_flags);
2615BOOL license_read_platform_challenge_response(WINPR_ATTR_UNUSED rdpLicense* license)
2617 WINPR_ASSERT(license);
2618 WINPR_ASSERT(license->PlatformChallenge);
2619 WINPR_ASSERT(license->MacSaltKey);
2620 WINPR_ASSERT(license->EncryptedPlatformChallenge);
2621 WINPR_ASSERT(license->EncryptedHardwareId);
2623 DEBUG_LICENSE(
"Receiving Platform Challenge Response Packet");
2625#if defined(WITH_LICENSE_DECRYPT_CHALLENGE_RESPONSE)
2627 LICENSE_BLOB* dblob = license_new_binary_blob(BB_ANY_BLOB);
2632 UINT16 wVersion = 0;
2633 UINT16 cbChallenge = 0;
2634 const BYTE* pbChallenge = NULL;
2635 LICENSE_BLOB* blob = license->EncryptedPlatformChallengeResponse;
2637 if (!license_rc4_with_licenseKey(license, blob->data, blob->length, dblob))
2640 wStream* s = Stream_StaticConstInit(&sbuffer, dblob->data, dblob->length);
2641 if (!license_check_stream_length(s, 8,
"PLATFORM_CHALLENGE_RESPONSE_DATA"))
2644 Stream_Read_UINT16(s, wVersion);
2645 if (wVersion != PLATFORM_CHALLENGE_RESPONSE_VERSION)
2647 WLog_Print(license->log, WLOG_WARN,
2648 "Invalid PLATFORM_CHALLENGE_RESPONSE_DATA::wVersion 0x%04" PRIx16
2649 ", expected 0x04" PRIx16,
2650 wVersion, PLATFORM_CHALLENGE_RESPONSE_VERSION);
2653 Stream_Read_UINT16(s, license->ClientType);
2654 Stream_Read_UINT16(s, license->LicenseDetailLevel);
2655 Stream_Read_UINT16(s, cbChallenge);
2657 if (!license_check_stream_length(s, cbChallenge,
2658 "PLATFORM_CHALLENGE_RESPONSE_DATA::pbChallenge"))
2661 pbChallenge = Stream_Pointer(s);
2662 if (!license_read_binary_blob_data(license->PlatformChallengeResponse, BB_DATA_BLOB,
2663 pbChallenge, cbChallenge))
2665 if (!Stream_SafeSeek(s, cbChallenge))
2670 license_free_binary_blob(dblob);
2677BOOL license_write_client_platform_challenge_response(rdpLicense* license,
wStream* s)
2679 WINPR_ASSERT(license);
2681 if (!license_write_binary_blob(s, license->EncryptedPlatformChallengeResponse))
2683 if (!license_write_binary_blob(s, license->EncryptedHardwareId))
2685 if (!license_check_stream_capacity(license->log, s,
sizeof(license->MACData),
2686 "CLIENT_PLATFORM_CHALLENGE_RESPONSE::MACData"))
2688 Stream_Write(s, license->MACData,
sizeof(license->MACData));
2692BOOL license_read_client_platform_challenge_response(rdpLicense* license,
wStream* s)
2694 WINPR_ASSERT(license);
2696 if (!license_read_binary_blob(license->log, s, license->EncryptedPlatformChallengeResponse))
2698 if (!license_read_binary_blob(license->log, s, license->EncryptedHardwareId))
2700 if (!license_check_stream_length(license->log, s,
sizeof(license->MACData),
2701 "CLIENT_PLATFORM_CHALLENGE_RESPONSE::MACData"))
2703 Stream_Read(s, license->MACData,
sizeof(license->MACData));
2704 return license_read_platform_challenge_response(license);
2716BOOL license_send_valid_client_error_packet(rdpRdp* rdp)
2719 rdpLicense* license = rdp->license;
2720 WINPR_ASSERT(license);
2722 license->state = LICENSE_STATE_COMPLETED;
2723 license->type = LICENSE_TYPE_NONE;
2724 return license_send_error_alert(license, STATUS_VALID_CLIENT, ST_NO_TRANSITION,
2725 license->ErrorInfo);
2734rdpLicense* license_new(rdpRdp* rdp)
2738 rdpLicense* license = (rdpLicense*)calloc(1,
sizeof(rdpLicense));
2741 license->log = WLog_Get(LICENSE_TAG);
2742 WINPR_ASSERT(license->log);
2744 license->PlatformId = PLATFORMID;
2745 license->ClientType = OTHER_PLATFORM_CHALLENGE_TYPE;
2746 license->LicenseDetailLevel = LICENSE_DETAIL_DETAIL;
2747 license->PreferredKeyExchangeAlg = KEY_EXCHANGE_ALG_RSA;
2750 license_set_state(license, LICENSE_STATE_INITIAL);
2751 if (!(license->certificate = freerdp_certificate_new()))
2753 if (!(license->ProductInfo = license_new_product_info()))
2755 if (!(license->ErrorInfo = license_new_binary_blob(BB_ERROR_BLOB)))
2757 if (!(license->LicenseInfo = license_new_binary_blob(BB_DATA_BLOB)))
2759 if (!(license->KeyExchangeList = license_new_binary_blob(BB_KEY_EXCHG_ALG_BLOB)))
2761 if (!(license->ServerCertificate = license_new_binary_blob(BB_CERTIFICATE_BLOB)))
2763 if (!(license->ClientUserName = license_new_binary_blob(BB_CLIENT_USER_NAME_BLOB)))
2765 if (!(license->ClientMachineName = license_new_binary_blob(BB_CLIENT_MACHINE_NAME_BLOB)))
2767 if (!(license->PlatformChallenge = license_new_binary_blob(BB_ANY_BLOB)))
2769 if (!(license->PlatformChallengeResponse = license_new_binary_blob(BB_ANY_BLOB)))
2771 if (!(license->EncryptedPlatformChallenge = license_new_binary_blob(BB_ANY_BLOB)))
2773 if (!(license->EncryptedPlatformChallengeResponse =
2774 license_new_binary_blob(BB_ENCRYPTED_DATA_BLOB)))
2776 if (!(license->EncryptedPremasterSecret = license_new_binary_blob(BB_ANY_BLOB)))
2778 if (!(license->EncryptedHardwareId = license_new_binary_blob(BB_ENCRYPTED_DATA_BLOB)))
2780 if (!(license->EncryptedLicenseInfo = license_new_binary_blob(BB_ENCRYPTED_DATA_BLOB)))
2782 if (!(license->ScopeList = license_new_scope_list()))
2785 license_generate_randoms(license);
2790 WINPR_PRAGMA_DIAG_PUSH
2791 WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
2792 license_free(license);
2793 WINPR_PRAGMA_DIAG_POP
2802void license_free(rdpLicense* license)
2806 freerdp_certificate_free(license->certificate);
2807 license_free_product_info(license->ProductInfo);
2808 license_free_binary_blob(license->ErrorInfo);
2809 license_free_binary_blob(license->LicenseInfo);
2810 license_free_binary_blob(license->KeyExchangeList);
2811 license_free_binary_blob(license->ServerCertificate);
2812 license_free_binary_blob(license->ClientUserName);
2813 license_free_binary_blob(license->ClientMachineName);
2814 license_free_binary_blob(license->PlatformChallenge);
2815 license_free_binary_blob(license->PlatformChallengeResponse);
2816 license_free_binary_blob(license->EncryptedPlatformChallenge);
2817 license_free_binary_blob(license->EncryptedPlatformChallengeResponse);
2818 license_free_binary_blob(license->EncryptedPremasterSecret);
2819 license_free_binary_blob(license->EncryptedHardwareId);
2820 license_free_binary_blob(license->EncryptedLicenseInfo);
2821 license_free_scope_list(license->ScopeList);
2826LICENSE_STATE license_get_state(
const rdpLicense* license)
2828 WINPR_ASSERT(license);
2829 return license->state;
2832LICENSE_TYPE license_get_type(
const rdpLicense* license)
2834 WINPR_ASSERT(license);
2835 return license->type;
2838BOOL license_set_state(rdpLicense* license, LICENSE_STATE state)
2840 WINPR_ASSERT(license);
2841 license->state = state;
2844 case LICENSE_STATE_COMPLETED:
2846 case LICENSE_STATE_ABORTED:
2848 license->type = LICENSE_TYPE_INVALID;
2855const char* license_get_state_string(LICENSE_STATE state)
2859 case LICENSE_STATE_INITIAL:
2860 return "LICENSE_STATE_INITIAL";
2861 case LICENSE_STATE_CONFIGURED:
2862 return "LICENSE_STATE_CONFIGURED";
2863 case LICENSE_STATE_REQUEST:
2864 return "LICENSE_STATE_REQUEST";
2865 case LICENSE_STATE_NEW_REQUEST:
2866 return "LICENSE_STATE_NEW_REQUEST";
2867 case LICENSE_STATE_PLATFORM_CHALLENGE:
2868 return "LICENSE_STATE_PLATFORM_CHALLENGE";
2869 case LICENSE_STATE_PLATFORM_CHALLENGE_RESPONSE:
2870 return "LICENSE_STATE_PLATFORM_CHALLENGE_RESPONSE";
2871 case LICENSE_STATE_COMPLETED:
2872 return "LICENSE_STATE_COMPLETED";
2873 case LICENSE_STATE_ABORTED:
2874 return "LICENSE_STATE_ABORTED";
2876 return "LICENSE_STATE_UNKNOWN";
2880BOOL license_server_send_request(rdpLicense* license)
2882 if (!license_ensure_state(license, LICENSE_STATE_CONFIGURED, LICENSE_REQUEST))
2884 if (!license_send_license_request_packet(license))
2886 return license_set_state(license, LICENSE_STATE_REQUEST);
2889static BOOL license_set_string(wLog* log,
const char* what,
const char* value, BYTE** bdst,
2893 WINPR_ASSERT(value);
2895 WINPR_ASSERT(dstLen);
2905 *cnv.w = ConvertUtf8ToWCharAlloc(value, &len);
2906 if (!*cnv.w || (len > UINT32_MAX /
sizeof(WCHAR)))
2908 WLog_Print(log, WLOG_ERROR,
"license->ProductInfo: %s == %p || %" PRIuz
" > UINT32_MAX",
2909 what, (
void*)(*cnv.w), len);
2912 *dstLen = (UINT32)(len *
sizeof(WCHAR));
2916BOOL license_server_configure(rdpLicense* license)
2919 UINT32 algs[] = { KEY_EXCHANGE_ALG_RSA };
2921 WINPR_ASSERT(license);
2922 WINPR_ASSERT(license->rdp);
2924 const rdpSettings* settings = license->rdp->settings;
2926 const char* CompanyName =
2929 const char* ProductName =
2931 const UINT32 ProductVersion =
2933 const UINT32 issuerCount =
2937 const char** issuers = WINPR_REINTERPRET_CAST(ptr,
const void*,
const char**);
2939 WINPR_ASSERT(CompanyName);
2940 WINPR_ASSERT(ProductName);
2941 WINPR_ASSERT(ProductVersion > 0);
2942 WINPR_ASSERT(issuers || (issuerCount == 0));
2944 if (!license_ensure_state(license, LICENSE_STATE_INITIAL, LICENSE_REQUEST))
2947 license->ProductInfo->dwVersion = ProductVersion;
2948 if (!license_set_string(license->log,
"pbCompanyName", CompanyName,
2949 &license->ProductInfo->pbCompanyName,
2950 &license->ProductInfo->cbCompanyName))
2953 if (!license_set_string(license->log,
"pbProductId", ProductName,
2954 &license->ProductInfo->pbProductId, &license->ProductInfo->cbProductId))
2957 if (!license_read_binary_blob_data(license->log, license->KeyExchangeList,
2958 BB_KEY_EXCHG_ALG_BLOB, algs,
sizeof(algs)))
2961 if (!freerdp_certificate_read_server_cert(license->certificate, settings->ServerCertificate,
2962 settings->ServerCertificateLength))
2965 s = Stream_New(NULL, 1024);
2972 freerdp_certificate_write_server_cert(license->certificate, CERT_CHAIN_VERSION_2, s);
2974 r = license_read_binary_blob_data(license->log, license->ServerCertificate,
2975 BB_CERTIFICATE_BLOB, Stream_Buffer(s),
2976 Stream_GetPosition(s));
2978 Stream_Free(s, TRUE);
2983 if (!license_scope_list_resize(license->ScopeList, issuerCount))
2985 for (
size_t x = 0; x < issuerCount; x++)
2988 const char* name = issuers[x];
2989 const size_t length = strnlen(name, UINT16_MAX) + 1;
2990 if ((length == 0) || (length > UINT16_MAX))
2992 WLog_Print(license->log, WLOG_WARN,
2993 "Invalid issuer at position %" PRIuz
": length 0 < %" PRIuz
" <= %d"
2995 x, length, UINT16_MAX, name);
2998 if (!license_read_binary_blob_data(license->log, blob, BB_SCOPE_BLOB, name, length))
3002 return license_set_state(license, LICENSE_STATE_CONFIGURED);
3005rdpLicense* license_get(rdpContext* context)
3007 WINPR_ASSERT(context);
3008 WINPR_ASSERT(context->rdp);
3009 return context->rdp->license;
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API const void * freerdp_settings_get_pointer(const rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id)
Returns a immutable pointer settings value.
FREERDP_API const char * freerdp_settings_get_string(const rdpSettings *settings, FreeRDP_Settings_Keys_String id)
Returns a immutable string settings value.