cool
8302b724e1
RDP6 compression
2012-02-09 22:20:24 -11:00
Marc-André Moreau
caae69e980
libfreerdp-core: change source descriptor from MSTSC to FREERDP
2012-02-08 14:45:24 -05:00
Pawel Jakub Dawidek
e73a525ad5
Move the comment into correct place.
2012-02-08 12:47:22 +01:00
Pawel Jakub Dawidek
e9f89af8a5
The fastpath header can be two or three bytes long. Check also the latter case.
2012-02-08 12:03:39 +01:00
Marc-André Moreau
58e08a7726
Merge pull request #407 from hcgpalm/master
...
Fix info_packet misalignment
2012-02-07 20:27:16 -08:00
Marc-André Moreau
0975c0f07e
libfreerdp-core: improve error checking in certificate validation
2012-02-07 22:16:57 -05:00
Otavio Salvador
986890b8b9
Merge pull request #404 from pjd/server_slow_path_input
...
Implement server-side support for slow-path Input Event PDU.
2012-02-07 05:01:53 -08:00
Pawel Jakub Dawidek
eb8c5c5f81
Implement server-side support for slow-path Input Event PDU.
2012-02-07 13:53:00 +01:00
Pawel Jakub Dawidek
1fa1331a54
Modify the UnicodeKeyboardEvent callback to also include flags argument.
...
According to the specification first two bytes contain keyboardFlags.
Those keyboardFlags are a bit different than in the regular (non-unicode)
Keyboard Event. There is no KBD_FLAGS_EXTENDED here and also when
key is pressed there is neither KBD_FLAGS_DOWN nor KBD_FLAGS_RELEASE flag
set. When key is released the KBD_FLAGS_RELEASE flag is set.
2012-02-07 12:22:01 +01:00
Pawel Jakub Dawidek
2ee9cc5e18
Simplify code by using per_read_length() instead of reimplementing it.
2012-02-07 11:16:47 +01:00
Pawel Jakub Dawidek
b75b5eb8a1
After DEACTIVATE ALL PDU server can send MCS Disconnect Provider Ultimatum PDU to disconnect.
...
Handle such condition and exit from xfreerdp gracefully (almost, exit status is still != 0).
2012-02-06 23:10:45 +01:00
Pawel Jakub Dawidek
d6592a17a9
Windows XP can send short (and non-standard) DEACTIVATE_ALL PDUs. Handle them properly.
2012-02-06 22:39:43 +01:00
Pawel Jakub Dawidek
4a950cedd7
Better packet length checking.
2012-02-06 22:39:33 +01:00
Christer Palm
ded92bc9cd
Fix password field length
2012-02-06 01:27:21 +01:00
Marc-André Moreau
47de99062d
libfreerdp-core: added --certificate-name option for explicitly specifying a certificate name
2012-02-04 15:16:41 -05:00
Marc-André Moreau
ffec1c2062
libfreerdp-core: improve and clarify certificate checking
2012-02-04 15:04:03 -05:00
Marc-André Moreau
4695faae38
libfreerdp-core: added check for certificate name against hostname
2012-02-04 02:21:39 -05:00
Pawel Jakub Dawidek
1619b43781
Fix problem where we check errno even for status == 0. This way when connection was properly terminated, but errno had EAGAIN value from before, we looped idenfiniately.
2012-02-03 14:44:45 +01:00
Pawel Jakub Dawidek
feb20edda7
Plug memory leak in case of an empty file and terminate string with '\0'.
2012-02-03 09:00:39 +01:00
Marc-André Moreau
9c81ff8022
libfreerdp-core: change certificate store directory name to match OpenSSL
2012-02-02 18:33:26 -05:00
Marc-André Moreau
521f956c00
libfreerdp-core: merging certificate.c with certstore.c
2012-02-02 18:20:17 -05:00
Marc-André Moreau
26d68997eb
Merge branch 'master' of github.com:FreeRDP/FreeRDP
2012-02-02 17:36:16 -05:00
Marc-André Moreau
bae5de89e1
libfreerdp-utils: refactoring of certificate store
2012-02-02 17:36:07 -05:00
Pawel Jakub Dawidek
9d2ea6e937
According to specification bits from the first octet and bit 8 from the second octet (if there is more than one octet) shall not all be ones.
...
Before that change integer >= 0xFF80 was encoded into two bytes instead of three.
While here also add support for encoding integers into three bytes.
2012-02-02 22:46:23 +01:00
Pawel Jakub Dawidek
7c9bbcc8e1
Add missing two bytes for pad2Octets field in FASTPATH_UPDATETYPE_SYNCHRONIZE packet.
2012-02-02 17:54:36 +01:00
Marc-André Moreau
9e4d76648b
libfreerdp-core: fix more memory leaks
2012-02-01 21:11:46 -05:00
Marc-André Moreau
b4e542ba46
libfreerdp-core: fix multiple memory leaks detected by valgrind
2012-02-01 18:42:20 -05:00
Norbert Federa
a3a4e9afa9
core: fixed segfault caused by double free of password_cookie blob
2012-02-01 17:58:06 +01:00
Martin Fleisz
c872b4ca80
Init update->SuppressOutput for clients too
2012-01-31 08:11:22 -08:00
Marc-André Moreau
bb61820bfb
Merge pull request #380 from pjd/stream
...
Use stream API instead of accessing stream fields directly.
2012-01-31 04:44:58 -08:00
Pawel Jakub Dawidek
d733924df8
Use stream API instead of accessing stream fields directly.
...
This include use of stream_attach(), so 'size' is properly set.
2012-01-31 13:36:53 +01:00
Pawel Jakub Dawidek
d2860f3210
Use stream_attach() so that the 'size' field in the stream structure
...
is properly set. This allows to assert in stream API that we don't
try to access memory outside stream buffer.
2012-01-31 12:15:54 +01:00
Marc-André Moreau
413fc774c5
Merge pull request #378 from adambprotiviti/redir-pw-fix
...
Fixed RDS Farm Redirection
2012-01-30 22:55:37 -08:00
Adam Brand
873e904abd
Final commit for fixing password issue; removed debug strings.
2012-01-30 20:54:29 -08:00
Adam Brand
927bc71780
Fixed issue with RDS farm redirection and passwords.
2012-01-30 20:49:27 -08:00
Adam Brand
e11dd6d588
Fixed some obvious things; still doesn't work.
2012-01-30 18:33:46 -08:00
Adam Brand
4aeb52aace
First attempt at fixing the password issue; this segfaults unfortunately.
2012-01-30 17:54:46 -08:00
Marc-André Moreau
e33f21b958
libfreerdp-utils: extend file utils to do path detection
2012-01-30 17:47:55 -05:00
Marc-André Moreau
012825e3b6
libfreerdp-core: fix code style in gcc.c
2012-01-29 15:05:34 -05:00
Marc-André Moreau
bde353b635
libfreerdp-core: fix reconnection for non IP-based redirection
2012-01-29 14:49:54 -05:00
Marc-André Moreau
005ffa0bb0
wfreerdp: fix mingw64 cross-compilation (Felix Wolfheimer)
2012-01-29 11:11:13 -05:00
Pawel Jakub Dawidek
31529071fd
Add glue that enables server-side support for Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
7207e945c3
- Ignore received encryption_method and encryption_level if we don't support encryption.
...
- Print a warning if we receive unregognized type.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
daf565dbd3
Add complete implementation of gcc_write_server_security_data() function
...
that implements server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
0a97242b3c
Add rdp_server_establish_keys() function that is responsible for
...
establishing encryption keys for server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
76f36461ff
Add a note why we are skipping 8 bytes.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
ee9739f490
Add API to load RSA key for Standard RDP Security in server mode.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f5033b1a7c
- Don't fill client_random with 0x5e, we are going to fill it up with
...
random data in the next line.
- Use less magic numbers.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
86910c8401
Add missing decryption.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
d37cff01ed
White-space fixes.
2012-01-25 17:15:44 +01:00