Commit Graph

1675 Commits

Author SHA1 Message Date
Marc-André Moreau
413fc774c5 Merge pull request #378 from adambprotiviti/redir-pw-fix
Fixed RDS Farm Redirection
2012-01-30 22:55:37 -08:00
Adam Brand
873e904abd Final commit for fixing password issue; removed debug strings. 2012-01-30 20:54:29 -08:00
Adam Brand
927bc71780 Fixed issue with RDS farm redirection and passwords. 2012-01-30 20:49:27 -08:00
Marc-André Moreau
589e9e1142 xfreerdp-server: add event queue 2012-01-30 22:46:02 -05:00
Marc-André Moreau
5356e5a44e xfreerdp-server: adding xf_event.c and xf_input.c, refactoring 2012-01-30 21:35:15 -05:00
Adam Brand
e11dd6d588 Fixed some obvious things; still doesn't work. 2012-01-30 18:33:46 -08:00
Adam Brand
4aeb52aace First attempt at fixing the password issue; this segfaults unfortunately. 2012-01-30 17:54:46 -08:00
Marc-André Moreau
603e600bdb xfreerdp-server: add better path detection support for finding server keys 2012-01-30 20:35:33 -05:00
Marc-André Moreau
e33f21b958 libfreerdp-utils: extend file utils to do path detection 2012-01-30 17:47:55 -05:00
Marc-André Moreau
faae95185f libfreerdp-core: defined boolean as int on windows 2012-01-30 10:18:33 -05:00
Otavio Salvador
b4a89cee1e Merge pull request #376 from bmiklautz/w32typedef
Fix for issue #374.
2012-01-30 05:44:32 -08:00
Bernhard Miklautz
06c79294ca Fix for issue #374. 2012-01-30 12:05:50 +01:00
Marc-André Moreau
012825e3b6 libfreerdp-core: fix code style in gcc.c 2012-01-29 15:05:34 -05:00
Marc-André Moreau
bde353b635 libfreerdp-core: fix reconnection for non IP-based redirection 2012-01-29 14:49:54 -05:00
Marc-André Moreau
005ffa0bb0 wfreerdp: fix mingw64 cross-compilation (Felix Wolfheimer) 2012-01-29 11:11:13 -05:00
Marc-André Moreau
04039da49a Merge pull request #371 from bmiklautz/osxdisableffmpeg
build: make ffmpeg optional on os x
2012-01-26 18:22:15 -08:00
Bernhard Miklautz
a30a054df4 build: make ffmpeg optional on os x
FFMPEG isn't installed per default on os x so it should be optional
instead of suggested.
2012-01-27 02:32:06 +01:00
Marc-André Moreau
cec8c97a1d Merge pull request #370 from bmiklautz/buildfixes
build: raise an error if pkg is not found
2012-01-26 17:29:07 -08:00
Bernhard Miklautz
7af5599113 build: raise an error if pkg is not found
Changed FFmpeg, PCSC and PulseAudio cmake find to raise an error if
an required package was not found.
2012-01-27 02:13:08 +01:00
Marc-André Moreau
29c7c69521 Merge pull request #368 from pjd/crypto
Server-side Standard RDP Security support.
2012-01-25 08:30:16 -08:00
Pawel Jakub Dawidek
31529071fd Add glue that enables server-side support for Standard RDP Security. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
7207e945c3 - Ignore received encryption_method and encryption_level if we don't support encryption.
- Print a warning if we receive unregognized type.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
daf565dbd3 Add complete implementation of gcc_write_server_security_data() function
that implements server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
0a97242b3c Add rdp_server_establish_keys() function that is responsible for
establishing encryption keys for server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
76f36461ff Add a note why we are skipping 8 bytes. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f49ea9853e Add fields to store RSA key for server-side Standard RDP Security. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
ee9739f490 Add API to load RSA key for Standard RDP Security in server mode. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f5033b1a7c - Don't fill client_random with 0x5e, we are going to fill it up with
random data in the next line.
- Use less magic numbers.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
86910c8401 Add missing decryption. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
d37cff01ed White-space fixes. 2012-01-25 17:15:44 +01:00
Pawel Jakub Dawidek
ac87b066fb Correct style. 2012-01-25 17:15:35 +01:00
Pawel Jakub Dawidek
31b6968263 Add a comment explaining why we always encode length in two bytes, eventhough we could use one byte sometimes. 2012-01-25 17:15:25 +01:00
Pawel Jakub Dawidek
61aa1dfb79 Add Standard RDP encryption suport for fastpath. Both input and output. 2012-01-25 17:15:17 +01:00
Pawel Jakub Dawidek
9c8a6bd8e9 Add some FASTPATH_INPUT_* enums. 2012-01-25 17:15:09 +01:00
Pawel Jakub Dawidek
68b9f65e87 Add --secure-checksum option that will enable usage of salted checksums
with Standard RDP encryption.
2012-01-25 17:14:58 +01:00
Pawel Jakub Dawidek
cea62dd9f6 Simplify code by using per_read_length() instead of reimplementing it. 2012-01-25 17:14:51 +01:00
Pawel Jakub Dawidek
af87360135 MCS data header might be 7 or 8 bytes long, depending on the length.
To reduce confusion a bit rename MCS_SEND_DATA_HEADER_LENGTH to
MCS_SEND_DATA_HEADER_MAX_LENGTH and also rename other defines that use
MCS_SEND_DATA_HEADER_MAX_LENGTH.
2012-01-25 17:14:44 +01:00
Pawel Jakub Dawidek
e2be360ec4 Add support for SEC_SECURE_CHECKSUM and FASTPATH_OUTPUT_SECURE_CHECKSUM flags. 2012-01-25 17:14:31 +01:00
Pawel Jakub Dawidek
4df52d7a42 Use rdp_read_security_header() to read security header. 2012-01-25 17:14:19 +01:00
Pawel Jakub Dawidek
b3a4be0298 We calculate checksum on plain text, so we must have already decrypt it, which means decrypt_use_count is off by one. Account for this. 2012-01-25 17:14:11 +01:00
Pawel Jakub Dawidek
207cb9b818 Fix typo: use & instead of | to check for flags. This fixes detection of requested protocols. 2012-01-25 17:13:53 +01:00
Marc-André Moreau
d5728b5ead Merge pull request #367 from jiten19/nscodec
nscodec final color bug fix
2012-01-25 08:02:06 -08:00
cool
d344a7e456 nscodec final color bug fix 2012-01-24 21:06:48 -11:00
Marc-André Moreau
38f38a371e Merge pull request #365 from pjd/transport
Handle short writes properly in transport_write().
2012-01-24 11:23:02 -08:00
Marc-André Moreau
e0cda2610f Merge pull request #364 from bmiklautz/enablerfxneon
build: Added option WITH_NEON
2012-01-24 11:22:41 -08:00
Pawel Jakub Dawidek
609d177412 Handle short writes properly in transport_write().
Before this change if short write (send) occured, we were trying to
resend without updating length variable, so we were trying to send
too much and the following undefined data were causing the other
side to terminate connection.
2012-01-24 11:46:35 +01:00
Bernhard Miklautz
e9f1de751b build: Added option WITH_NEON
Enables neon optimized rfx decoder
2012-01-24 09:04:02 +01:00
Marc-André Moreau
89253f027c Merge pull request #363 from pjd/crypto
rdp_client_establish_keys() simplifications.
2012-01-23 10:18:47 -08:00
Marc-André Moreau
d5211588e1 Merge pull request #362 from bmiklautz/buildsystemfixes
Build system fixes
2012-01-23 10:18:20 -08:00
Pawel Jakub Dawidek
8e91faf139 - Rename rdp_establish_keys() to rdp_client_establish_keys() as it is only
responsible for establishing keys on the client side.
- Simplify rdp_client_establish_keys() by using rdp_write_header() and
  rdp_write_security_header() function instead of reimplementing them
  and by using existing defines instead of magic values.
2012-01-23 18:23:52 +01:00