Commit Graph

1581 Commits

Author SHA1 Message Date
Martin Fleisz
c872b4ca80 Init update->SuppressOutput for clients too 2012-01-31 08:11:22 -08:00
Otavio Salvador
fcff3b8275 Merge pull request #381 from pjd/bitmap
Each bitmap send by the server contains color depth. Even if we negotiated 8bpp server can send bitmap which has 16bpp.
2012-01-31 07:33:23 -08:00
Pawel Jakub Dawidek
19f99d66ba Each bitmap send by the server contains color depth. Even if we negotiated 8bpp server can send bitmap which has 16bpp.
Fix a crash using bpp to allocate image from the bitmap data instead of negotiated color depth.
2012-01-31 16:14:54 +01:00
Marc-André Moreau
bb61820bfb Merge pull request #380 from pjd/stream
Use stream API instead of accessing stream fields directly.
2012-01-31 04:44:58 -08:00
Marc-André Moreau
645c30361b Merge pull request #379 from pjd/certificate
Use stream_attach() so that the 'size' field in the stream structure is properly set.
2012-01-31 04:37:47 -08:00
Pawel Jakub Dawidek
d733924df8 Use stream API instead of accessing stream fields directly.
This include use of stream_attach(), so 'size' is properly set.
2012-01-31 13:36:53 +01:00
Pawel Jakub Dawidek
d2860f3210 Use stream_attach() so that the 'size' field in the stream structure
is properly set. This allows to assert in stream API that we don't
try to access memory outside stream buffer.
2012-01-31 12:15:54 +01:00
Marc-André Moreau
413fc774c5 Merge pull request #378 from adambprotiviti/redir-pw-fix
Fixed RDS Farm Redirection
2012-01-30 22:55:37 -08:00
Adam Brand
873e904abd Final commit for fixing password issue; removed debug strings. 2012-01-30 20:54:29 -08:00
Adam Brand
927bc71780 Fixed issue with RDS farm redirection and passwords. 2012-01-30 20:49:27 -08:00
Marc-André Moreau
5356e5a44e xfreerdp-server: adding xf_event.c and xf_input.c, refactoring 2012-01-30 21:35:15 -05:00
Adam Brand
e11dd6d588 Fixed some obvious things; still doesn't work. 2012-01-30 18:33:46 -08:00
Adam Brand
4aeb52aace First attempt at fixing the password issue; this segfaults unfortunately. 2012-01-30 17:54:46 -08:00
Marc-André Moreau
603e600bdb xfreerdp-server: add better path detection support for finding server keys 2012-01-30 20:35:33 -05:00
Marc-André Moreau
e33f21b958 libfreerdp-utils: extend file utils to do path detection 2012-01-30 17:47:55 -05:00
Marc-André Moreau
faae95185f libfreerdp-core: defined boolean as int on windows 2012-01-30 10:18:33 -05:00
Otavio Salvador
b4a89cee1e Merge pull request #376 from bmiklautz/w32typedef
Fix for issue #374.
2012-01-30 05:44:32 -08:00
Bernhard Miklautz
06c79294ca Fix for issue #374. 2012-01-30 12:05:50 +01:00
Marc-André Moreau
012825e3b6 libfreerdp-core: fix code style in gcc.c 2012-01-29 15:05:34 -05:00
Marc-André Moreau
bde353b635 libfreerdp-core: fix reconnection for non IP-based redirection 2012-01-29 14:49:54 -05:00
Marc-André Moreau
005ffa0bb0 wfreerdp: fix mingw64 cross-compilation (Felix Wolfheimer) 2012-01-29 11:11:13 -05:00
Marc-André Moreau
04039da49a Merge pull request #371 from bmiklautz/osxdisableffmpeg
build: make ffmpeg optional on os x
2012-01-26 18:22:15 -08:00
Bernhard Miklautz
a30a054df4 build: make ffmpeg optional on os x
FFMPEG isn't installed per default on os x so it should be optional
instead of suggested.
2012-01-27 02:32:06 +01:00
Marc-André Moreau
cec8c97a1d Merge pull request #370 from bmiklautz/buildfixes
build: raise an error if pkg is not found
2012-01-26 17:29:07 -08:00
Bernhard Miklautz
7af5599113 build: raise an error if pkg is not found
Changed FFmpeg, PCSC and PulseAudio cmake find to raise an error if
an required package was not found.
2012-01-27 02:13:08 +01:00
Marc-André Moreau
29c7c69521 Merge pull request #368 from pjd/crypto
Server-side Standard RDP Security support.
2012-01-25 08:30:16 -08:00
Pawel Jakub Dawidek
31529071fd Add glue that enables server-side support for Standard RDP Security. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
7207e945c3 - Ignore received encryption_method and encryption_level if we don't support encryption.
- Print a warning if we receive unregognized type.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
daf565dbd3 Add complete implementation of gcc_write_server_security_data() function
that implements server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
0a97242b3c Add rdp_server_establish_keys() function that is responsible for
establishing encryption keys for server-side Standard RDP Security.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
76f36461ff Add a note why we are skipping 8 bytes. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f49ea9853e Add fields to store RSA key for server-side Standard RDP Security. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
ee9739f490 Add API to load RSA key for Standard RDP Security in server mode. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
f5033b1a7c - Don't fill client_random with 0x5e, we are going to fill it up with
random data in the next line.
- Use less magic numbers.
2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
86910c8401 Add missing decryption. 2012-01-25 17:16:44 +01:00
Pawel Jakub Dawidek
d37cff01ed White-space fixes. 2012-01-25 17:15:44 +01:00
Pawel Jakub Dawidek
ac87b066fb Correct style. 2012-01-25 17:15:35 +01:00
Pawel Jakub Dawidek
31b6968263 Add a comment explaining why we always encode length in two bytes, eventhough we could use one byte sometimes. 2012-01-25 17:15:25 +01:00
Pawel Jakub Dawidek
61aa1dfb79 Add Standard RDP encryption suport for fastpath. Both input and output. 2012-01-25 17:15:17 +01:00
Pawel Jakub Dawidek
9c8a6bd8e9 Add some FASTPATH_INPUT_* enums. 2012-01-25 17:15:09 +01:00
Pawel Jakub Dawidek
68b9f65e87 Add --secure-checksum option that will enable usage of salted checksums
with Standard RDP encryption.
2012-01-25 17:14:58 +01:00
Pawel Jakub Dawidek
cea62dd9f6 Simplify code by using per_read_length() instead of reimplementing it. 2012-01-25 17:14:51 +01:00
Pawel Jakub Dawidek
af87360135 MCS data header might be 7 or 8 bytes long, depending on the length.
To reduce confusion a bit rename MCS_SEND_DATA_HEADER_LENGTH to
MCS_SEND_DATA_HEADER_MAX_LENGTH and also rename other defines that use
MCS_SEND_DATA_HEADER_MAX_LENGTH.
2012-01-25 17:14:44 +01:00
Pawel Jakub Dawidek
e2be360ec4 Add support for SEC_SECURE_CHECKSUM and FASTPATH_OUTPUT_SECURE_CHECKSUM flags. 2012-01-25 17:14:31 +01:00
Pawel Jakub Dawidek
4df52d7a42 Use rdp_read_security_header() to read security header. 2012-01-25 17:14:19 +01:00
Pawel Jakub Dawidek
b3a4be0298 We calculate checksum on plain text, so we must have already decrypt it, which means decrypt_use_count is off by one. Account for this. 2012-01-25 17:14:11 +01:00
Pawel Jakub Dawidek
207cb9b818 Fix typo: use & instead of | to check for flags. This fixes detection of requested protocols. 2012-01-25 17:13:53 +01:00
Marc-André Moreau
d5728b5ead Merge pull request #367 from jiten19/nscodec
nscodec final color bug fix
2012-01-25 08:02:06 -08:00
cool
d344a7e456 nscodec final color bug fix 2012-01-24 21:06:48 -11:00
Marc-André Moreau
38f38a371e Merge pull request #365 from pjd/transport
Handle short writes properly in transport_write().
2012-01-24 11:23:02 -08:00