Commit Graph

747 Commits

Author SHA1 Message Date
Norbert Federa
b224126cc7 Completed (almost) System Pointer Update (MS-RDPBCGR 2.2.9.1.1.4.3)
Todo:
- Windows client: wf_Pointer_SetNull and wf_Pointer_SetDefault are just skeletons like all the other wf_Pointer functions.
- DirectFB client: only df_Pointer_SetNull is implemented and tested
2012-02-24 13:44:23 +01:00
LittleJawa
3e919f7a40 Merge remote-tracking branch 'upstream/master' 2012-02-23 16:57:29 +01:00
LittleJawa
d304992eea Updating comments 2012-02-23 16:30:04 +01:00
LittleJawa
37b35b3558 First round of comments while reading the code. 2012-02-23 16:22:05 +01:00
Pawel Jakub Dawidek
d70cc2f4ea For salted checksums we need separate counters, as the
encrypt_use_count and decrypt_use_count counters are reset during key
regeneration and we need counters that are never reset.
2012-02-22 19:26:00 +01:00
Mads Kiilerich
1e46fae33e debug: remove extra newlines in debug messages 2012-02-21 23:22:01 +01:00
Marc-Andr Moreau
60aac7aea3 wfreerdp: fix windows compilation 2012-02-20 21:56:55 -08:00
Mads Kiilerich
165d39a290 libfreerdp-core: don't add sec_bytes in fastpath_send_input_pdu
fastpath_input_pdu_init already reserved space for fastpath_get_sec_bytes()
which thus already was included in stream_get_length() in
fastpath_send_input_pdu(). Adding sec_bytes again just added extra invalid (but
correctly hashed/encrypted) bytes to the PDU.
2012-02-20 21:03:31 +01:00
Mads Kiilerich
1500ab1cb0 libfreerdp-core: fastpath_send_input_pdu can handle fastpath PDUs up to 32k 2012-02-20 21:03:28 +01:00
Marc-André Moreau
2152db9eb4 libfreerdp-locale: move time zone detection code 2012-02-19 21:08:12 -05:00
Marc-André Moreau
a932835f44 libfreerdp-auth: resolve cyclic dependency with libfreerdp-core 2012-02-19 12:50:30 -05:00
Marc-André Moreau
4e6a2e3226 Merge pull request #441 from louyihua/master
Fix a compilation error under WIN32
2012-02-18 13:03:51 -08:00
louyihua
0684df1ae4 Fix a compilation error under WIN32. 2012-02-19 02:00:34 +08:00
Anthony Tong
542a472b2e libfreerdp-core: disable fp input if FIPS is negotiated 2012-02-18 08:49:20 -06:00
Marc-André Moreau
61da01973d libfreerdp-locale: rename from libfreerdp-kbd, will contain all localization code 2012-02-17 17:43:00 -05:00
Marc-André Moreau
8cab067498 libfreerdp-auth: move authentication code out of libfreerdp-core 2012-02-17 17:12:21 -05:00
Marc-André Moreau
b8882a8ad2 libfreerdp-crypto: taking crypto code out of libfreerdp-core 2012-02-17 00:58:30 -05:00
Marc-André Moreau
d29e37c20f libfreerdp-core: started parsing NTLM authenticate message 2012-02-17 00:07:16 -05:00
Marc-André Moreau
fee9ef06e0 libfreerdp-core: added server-side NTLMSSP negotiate and challenge messages 2012-02-16 23:11:59 -05:00
Marc-André Moreau
37e4729a9e libfreerdp-core: cleanup time zones 2012-02-16 21:38:32 -05:00
Marc-André Moreau
e1ef70ab5f libfreerdp-core: add full timezone redirection support 2012-02-16 20:50:14 -05:00
Marc-André Moreau
e08da86efd libfreerdp-core: add unix timezone identifier detection 2012-02-16 17:09:14 -05:00
Marc-André Moreau
15c17e04cf libfreerdp-core: added generated Time Zone Redirection table 2012-02-16 02:08:39 -05:00
Marc-André Moreau
6cca235ae6 libfreerdp-core: move timezone code from info.c to timezone.c 2012-02-16 01:53:58 -05:00
Marc-André Moreau
aa7b83ff1e libfreerdp-core: fix issue #436 2012-02-15 16:33:51 -05:00
Marc-André Moreau
5d7e55fe9d libfreerdp-core: fix timezone redirection 2012-02-15 16:28:47 -05:00
Bernhard Miklautz
ab057141b0 core: Fixed segfault when connecting with nla 2012-02-14 16:00:13 +01:00
Marc-André Moreau
4fe4cd35e3 libfreerdp-server: added server-side CredSSP stubs 2012-02-13 22:27:59 -05:00
Marc-André Moreau
1d3e3a466d libfreerdp-core: started server-side NLA 2012-02-13 21:49:41 -05:00
Marc-André Moreau
06330a7cb3 Merge branch 'master' of github.com:FreeRDP/FreeRDP 2012-02-13 17:51:56 -05:00
Marc-André Moreau
708ba9bd03 libfreerdp-core: expanded input API 2012-02-13 17:51:42 -05:00
Marc-André Moreau
e22023cc76 libfreerdp-cache: start NineGrid cache 2012-02-12 20:29:33 -05:00
Marc-André Moreau
233b0b6ef4 libfreerdp-gdi: add mem3blt support 2012-02-12 19:41:39 -05:00
Marc-André Moreau
f7a71079dd xfreerdp: reintroduce Polygon drawing 2012-02-12 17:14:59 -05:00
Pawel Jakub Dawidek
928dc74782 Remove tls->cert field, make tls_get_certificate() static and free certificate after use. 2012-02-12 19:08:16 +01:00
Marc-André Moreau
d37e6091b0 libfreerdp-core: verify TLS certificate with both TLS and NLA 2012-02-12 12:46:53 -05:00
Pawel Jakub Dawidek
3e464c3a7d Plug some resource leaks. 2012-02-12 18:09:09 +01:00
Pawel Jakub Dawidek
f74ea2f034 Write fingerprint to proper descriptor. 2012-02-12 18:09:03 +01:00
Pawel Jakub Dawidek
d2b82c4166 Advertise persistent bitmap cache only if it is enabled. 2012-02-11 15:11:10 +01:00
Pawel Jakub Dawidek
3aa804f176 Before asking for element from the PRIMARY_DRAWING_ORDER_FIELD_BYTES[] array, check if the array is big enough. 2012-02-11 14:33:54 +01:00
Pawel Jakub Dawidek
cb4668ca68 When acting as server, accepth client's color depth only if it is smaller than ours. This is what Windows server does. 2012-02-11 14:33:48 +01:00
Marc-André Moreau
5ae4d88c14 libfreerdp-core: don't call freerdp_context_free() from freerdp_free() 2012-02-10 15:50:29 -05:00
Jay Sorg
d51db08c5c libfreerdp-core: fix memory leaks and double free 2012-02-10 12:35:22 -08:00
Marc-André Moreau
6bddb08713 Merge pull request #415 from pjd/fixes
Advertise ENC_SALTED_CHECKSUM support.
2012-02-10 12:14:41 -08:00
Marc-André Moreau
79884c8b72 Revert "RDP6 compression"
This reverts commit 8302b724e1.
2012-02-10 15:06:58 -05:00
Pawel Jakub Dawidek
dd957c3097 Set ENC_SALTED_CHECKSUM flag when support for salted checksums is enabled. 2012-02-10 20:33:14 +01:00
Pawel Jakub Dawidek
957bad3d52 Rename secure_checksum settings field to salted_checksum (the same for --secure-checksum flag) to match ENC_SALTED_CHECKSUM flag's name. 2012-02-10 20:33:07 +01:00
cool
8302b724e1 RDP6 compression 2012-02-09 22:20:24 -11:00
Marc-André Moreau
caae69e980 libfreerdp-core: change source descriptor from MSTSC to FREERDP 2012-02-08 14:45:24 -05:00
Pawel Jakub Dawidek
e73a525ad5 Move the comment into correct place. 2012-02-08 12:47:22 +01:00
Pawel Jakub Dawidek
e9f89af8a5 The fastpath header can be two or three bytes long. Check also the latter case. 2012-02-08 12:03:39 +01:00
Marc-André Moreau
58e08a7726 Merge pull request #407 from hcgpalm/master
Fix info_packet misalignment
2012-02-07 20:27:16 -08:00
Marc-André Moreau
0975c0f07e libfreerdp-core: improve error checking in certificate validation 2012-02-07 22:16:57 -05:00
Otavio Salvador
986890b8b9 Merge pull request #404 from pjd/server_slow_path_input
Implement server-side support for slow-path Input Event PDU.
2012-02-07 05:01:53 -08:00
Pawel Jakub Dawidek
eb8c5c5f81 Implement server-side support for slow-path Input Event PDU. 2012-02-07 13:53:00 +01:00
Pawel Jakub Dawidek
1fa1331a54 Modify the UnicodeKeyboardEvent callback to also include flags argument.
According to the specification first two bytes contain keyboardFlags.
Those keyboardFlags are a bit different than in the regular (non-unicode)
Keyboard Event. There is no KBD_FLAGS_EXTENDED here and also when
key is pressed there is neither KBD_FLAGS_DOWN nor KBD_FLAGS_RELEASE flag
set. When key is released the KBD_FLAGS_RELEASE flag is set.
2012-02-07 12:22:01 +01:00
Pawel Jakub Dawidek
2ee9cc5e18 Simplify code by using per_read_length() instead of reimplementing it. 2012-02-07 11:16:47 +01:00
Pawel Jakub Dawidek
b75b5eb8a1 After DEACTIVATE ALL PDU server can send MCS Disconnect Provider Ultimatum PDU to disconnect.
Handle such condition and exit from xfreerdp gracefully (almost, exit status is still != 0).
2012-02-06 23:10:45 +01:00
Pawel Jakub Dawidek
d6592a17a9 Windows XP can send short (and non-standard) DEACTIVATE_ALL PDUs. Handle them properly. 2012-02-06 22:39:43 +01:00
Pawel Jakub Dawidek
4a950cedd7 Better packet length checking. 2012-02-06 22:39:33 +01:00
Christer Palm
ded92bc9cd Fix password field length 2012-02-06 01:27:21 +01:00
Marc-André Moreau
47de99062d libfreerdp-core: added --certificate-name option for explicitly specifying a certificate name 2012-02-04 15:16:41 -05:00
Marc-André Moreau
ffec1c2062 libfreerdp-core: improve and clarify certificate checking 2012-02-04 15:04:03 -05:00
Marc-André Moreau
4695faae38 libfreerdp-core: added check for certificate name against hostname 2012-02-04 02:21:39 -05:00
Pawel Jakub Dawidek
1619b43781 Fix problem where we check errno even for status == 0. This way when connection was properly terminated, but errno had EAGAIN value from before, we looped idenfiniately. 2012-02-03 14:44:45 +01:00
Pawel Jakub Dawidek
feb20edda7 Plug memory leak in case of an empty file and terminate string with '\0'. 2012-02-03 09:00:39 +01:00
Marc-André Moreau
9c81ff8022 libfreerdp-core: change certificate store directory name to match OpenSSL 2012-02-02 18:33:26 -05:00
Marc-André Moreau
521f956c00 libfreerdp-core: merging certificate.c with certstore.c 2012-02-02 18:20:17 -05:00
Marc-André Moreau
26d68997eb Merge branch 'master' of github.com:FreeRDP/FreeRDP 2012-02-02 17:36:16 -05:00
Marc-André Moreau
bae5de89e1 libfreerdp-utils: refactoring of certificate store 2012-02-02 17:36:07 -05:00
Pawel Jakub Dawidek
9d2ea6e937 According to specification bits from the first octet and bit 8 from the second octet (if there is more than one octet) shall not all be ones.
Before that change integer >= 0xFF80 was encoded into two bytes instead of three.
While here also add support for encoding integers into three bytes.
2012-02-02 22:46:23 +01:00
Pawel Jakub Dawidek
7c9bbcc8e1 Add missing two bytes for pad2Octets field in FASTPATH_UPDATETYPE_SYNCHRONIZE packet. 2012-02-02 17:54:36 +01:00
Marc-André Moreau
9e4d76648b libfreerdp-core: fix more memory leaks 2012-02-01 21:11:46 -05:00
Marc-André Moreau
b4e542ba46 libfreerdp-core: fix multiple memory leaks detected by valgrind 2012-02-01 18:42:20 -05:00
Norbert Federa
a3a4e9afa9 core: fixed segfault caused by double free of password_cookie blob 2012-02-01 17:58:06 +01:00
Martin Fleisz
c872b4ca80 Init update->SuppressOutput for clients too 2012-01-31 08:11:22 -08:00
Marc-André Moreau
bb61820bfb Merge pull request #380 from pjd/stream
Use stream API instead of accessing stream fields directly.
2012-01-31 04:44:58 -08:00
Pawel Jakub Dawidek
d733924df8 Use stream API instead of accessing stream fields directly.
This include use of stream_attach(), so 'size' is properly set.
2012-01-31 13:36:53 +01:00
Pawel Jakub Dawidek
d2860f3210 Use stream_attach() so that the 'size' field in the stream structure
is properly set. This allows to assert in stream API that we don't
try to access memory outside stream buffer.
2012-01-31 12:15:54 +01:00
Marc-André Moreau
413fc774c5 Merge pull request #378 from adambprotiviti/redir-pw-fix
Fixed RDS Farm Redirection
2012-01-30 22:55:37 -08:00
Adam Brand
873e904abd Final commit for fixing password issue; removed debug strings. 2012-01-30 20:54:29 -08:00
Adam Brand
927bc71780 Fixed issue with RDS farm redirection and passwords. 2012-01-30 20:49:27 -08:00
Adam Brand
e11dd6d588 Fixed some obvious things; still doesn't work. 2012-01-30 18:33:46 -08:00
Adam Brand
4aeb52aace First attempt at fixing the password issue; this segfaults unfortunately. 2012-01-30 17:54:46 -08:00
Marc-André Moreau
e33f21b958 libfreerdp-utils: extend file utils to do path detection 2012-01-30 17:47:55 -05:00
Marc-André Moreau
012825e3b6 libfreerdp-core: fix code style in gcc.c 2012-01-29 15:05:34 -05:00
Marc-André Moreau
bde353b635 libfreerdp-core: fix reconnection for non IP-based redirection 2012-01-29 14:49:54 -05:00
Marc-André Moreau
005ffa0bb0 wfreerdp: fix mingw64 cross-compilation (Felix Wolfheimer) 2012-01-29 11:11:13 -05:00
Pawel Jakub Dawidek
31529071fd Add glue that enables server-side support for Standard RDP Security. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
7207e945c3 - Ignore received encryption_method and encryption_level if we don't support encryption.
- Print a warning if we receive unregognized type.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
daf565dbd3 Add complete implementation of gcc_write_server_security_data() function
that implements server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
0a97242b3c Add rdp_server_establish_keys() function that is responsible for
establishing encryption keys for server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
76f36461ff Add a note why we are skipping 8 bytes. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
ee9739f490 Add API to load RSA key for Standard RDP Security in server mode. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f5033b1a7c - Don't fill client_random with 0x5e, we are going to fill it up with
random data in the next line.
- Use less magic numbers.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
86910c8401 Add missing decryption. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
d37cff01ed White-space fixes. 2012-01-25 17:15:44 +01:00
Pawel Jakub Dawidek
ac87b066fb Correct style. 2012-01-25 17:15:35 +01:00
Pawel Jakub Dawidek
31b6968263 Add a comment explaining why we always encode length in two bytes, eventhough we could use one byte sometimes. 2012-01-25 17:15:25 +01:00
Pawel Jakub Dawidek
61aa1dfb79 Add Standard RDP encryption suport for fastpath. Both input and output. 2012-01-25 17:15:17 +01:00