MartinHaimberger
83b706c4be
Merge pull request #3092 from akallabeth/get_build_config
...
Added get_build_config functions.
2016-01-28 15:23:24 +01:00
David FORT
b6dd7bbb88
Check more Stream_EnsureCapacity results when writing capabilities
2016-01-28 15:12:26 +01:00
Hardening
a2aa56ee28
Merge pull request #3067 from akallabeth/reset_abort_event
...
Resetting abort event on freerdp_connect.
2016-01-28 14:28:51 +01:00
Armin Novak
035f127081
Added get_build_config functions.
2016-01-28 14:26:50 +01:00
Hardening
d458bc2e06
Merge pull request #3073 from davewheel/cert_key_in_memory
...
Allow to specify the raw content of crypto materials
2016-01-27 10:50:38 +01:00
Hardening
7af1ec85f0
Merge pull request #3083 from akallabeth/capability_set_fix
...
Fix #3081 , set client string encoding.
2016-01-27 10:45:54 +01:00
Armin Novak
974d2ef433
Fix #3081 , client string encoding.
2016-01-27 10:34:01 +01:00
Martin Fleisz
a9e4ba0118
Merge pull request #3069 from davewheel/4upstream-1
...
Improve monitor support
2016-01-27 10:18:30 +01:00
David FORT
708d0cb3c0
Check server and client capabilities
...
Most of the capabilities are sent by both the client and the server. But for some
the specs specify that they are only supposed to be only send by the server or the client.
This patch ensures this. Without this patch a malicious client can change server settings
and a malicious server can modify client settings.
2016-01-26 16:14:48 +01:00
Armin Novak
106479d6f2
Fixed clientNameLen initialization.
2016-01-26 09:34:22 +01:00
David FORT
137825ed9f
Stream_EnsureCapacity return value aren't checked in capabilities_write
2016-01-25 19:11:35 +01:00
Giovanni Panozzo
c5a4ce7893
Improve error logging after calling some BIO_ functions
2016-01-23 11:39:38 +01:00
Armin Novak
73ec3d6aca
Removed fixed size strings.
2016-01-21 15:45:21 +01:00
davewheel
d5b8585a39
Allow to specify the raw content of crypto materials
...
Sometime it's possible that your server application doesn't have access to files
(when running in a very restricted environment for example). This patch allows
to ship the private key and certificate as a string.
Sponsored by: Wheel Systems (http://www.wheelsystems.com )
2016-01-21 11:27:06 +01:00
davewheel
121a234866
Add better handling of monitors
...
This patch makes FreeRDP announce the support for monitor layout PDU. It also
adds support for servers to announce the monitors layout.
2016-01-20 16:56:04 +01:00
davewheel
ca9e908f3c
Fix a security issue in monitors packet handling
...
The number of announced monitors was not checked, so if a client was announcing
a big number, it could override other fields in settings and more...
2016-01-20 16:56:04 +01:00
Armin Novak
5542fef75d
Resetting abort event on freerdp_connect.
2016-01-18 10:08:12 +01:00
Roland Kaufmann
600d3c5ccb
Add option to disable pointer button mapping
...
In case the old behaviour of not reverse-mapping the mouse buttons is
desirable, a command-line option is added to disable the mapping. This
option is made experimental for the time being.
The default is to do the reverse mapping, as this is the intuitive
behaviour (the mouse then works as it would on the console).
2015-12-15 17:42:57 +01:00
Binyamin Sagal
23fea1615f
Fix horizontal scrolling direction and capability detection
2015-12-14 21:48:31 +02:00
Armin Novak
a5db7117c8
Implemented horizontal wheel support.
...
Horizontal mouse wheel input capabilities are now checked
and if available mouse buttons 6 and 7 are mapped to the
horizontal wheel for the X11 client.
2015-12-14 18:29:23 +01:00
Hardening
57fe581b16
Merge pull request #2824 from bjcollins/nla_auth_exit_code
...
Return FREERDP_ERROR_AUTHENTICATION_FAILED on an authentication failure
2015-12-08 22:46:29 +01:00
Nito Martinez
2d5c78849e
Fix formatting: else if in its own line and no brackets for single statements
2015-11-26 09:50:03 +01:00
Nito Martinez
89d8a68f4a
Disable setting socket options for preexisting socket like: keepalive and tcp_nodelay, these should be set extenally if needed. Do not close the socket if the clientaddress could not be set
2015-11-25 08:36:49 +01:00
Nito Martinez
428cbd802d
Fixes #2982 . The idea is to be able to create the socket externally and pass that socket FD to FreeRDP so that it can be used there.
...
The idea suggested is to use the following interface:
settings->ServerHostname = "|"
settings->ServerPort = SocketFD
2015-11-20 02:44:35 +01:00
Bernhard Miklautz
d73c4898c1
Add build-config.h
...
build-config.h should contain configure/compile time settings that are
relevant for projects that use FreeRDP.
For example the compiled in plugin search paths.
2015-11-09 15:54:22 +01:00
LookBehind
95fe9ecfab
Fix rdp_recv_logon_error_info
...
As https://msdn.microsoft.com/en-us/library/cc240641.aspx says - first is going errorNotificationType then errorNotificationData.
2015-10-20 18:05:09 +04:00
Marc-André Moreau
4ab373aced
xfreerdp: fix multiple egfx context support in X11 GFX
2015-10-13 14:49:30 -04:00
Marc-André Moreau
863939fd58
Merge pull request #2919 from realjiangms/fix_allow_empty_password
...
Sec/NLA: Support passwordless (blank password) login with NLA.
2015-10-13 10:40:28 -04:00
zihao.jiang
a7f4685c09
Sec/NLA: Support passwordless (blank password) login with NLA.
...
It was supported in freerdp 1.0.2 but not supported in lastest master.
We should take empty password if it is explicitly specified with /v option.
If a password is not specified, we could first try SAM file. If the user entry does not exist, prompt for password.
2015-10-10 01:48:41 +08:00
Sriram Raghunathan
1c1e215ed9
Remove warning: HANDLE event variable unused
2015-10-05 22:42:59 +05:30
Samuel Sieb
812e14af04
Don't fail the redirect if padding wasn't sent before disconnecting
2015-09-24 10:37:21 -07:00
Hardening
62da9d28c6
Merge pull request #2899 from awakecoding/master
...
Standard RDP security server redirection fix
2015-09-21 23:42:32 +02:00
Marc-André Moreau
a91506161d
libfreerdp-core: fix redirection with standard RDP security
2015-09-21 15:36:19 -04:00
Marc-André Moreau
d1cb3410de
Merge pull request #2896 from awakecoding/master
...
Win32 Gateway Fix, iOS TCP connection infinite loop fix
2015-09-18 11:57:01 -04:00
Marc-André Moreau
9c35b73fb6
libfreerdp-core: fix gateway connectivity on Windows
2015-09-17 14:32:40 -04:00
Martin Fleisz
affe82cae8
Merge pull request #2890 from realjiangms/shadow_fix_memory_leak
...
server: Fix several memory leak found while running valgrind on freerdp-shadow
2015-09-17 10:33:43 +02:00
zihao.jiang
f21749ac07
server: Fix several memory leak while running valgrind on freerdp-shadow
2015-09-17 01:02:22 +08:00
Marc-André Moreau
48c7a8dc1d
Merge pull request #2889 from dvincent-devolutions/gateway
...
Fix RDP8 gateway disconnections
2015-09-16 10:41:07 -04:00
Denis Vincent
3ea0fe0c01
Small corrections to BIO implementation.
2015-09-16 09:54:03 -04:00
bjcollins
ee3b39d70f
Remove unnecessary variable to keep track of nlaFailure, instead just set the NLA authentication error in the callback
...
where it is detected.
2015-09-15 14:17:13 -05:00
bjcollins
be47c6f782
Remove unused functions from initial code to handle NLA authentication failures.
2015-09-15 14:07:14 -05:00
bjcollins
7fbc7e45a7
Clean up NLA authentication failure handling code
...
1. Make use of freerdp_set_last_error to set authentication failure without the helper functions
2. Rename ssl callback function
3. Break out AuthenticationOnly exit handling from bad connect handling
2015-09-15 14:07:14 -05:00
bjcollins
32a1406dc4
Return FREERDP_ERROR_AUTHENTICATION_FAILED on an authentication failure
...
when using NLA with xfreerdp.
2015-09-15 14:07:14 -05:00
Marc-André Moreau
3f2915eb78
libfreerdp-core: alternative RDG BIO fix
2015-09-15 13:03:11 -04:00
Marc-André Moreau
12ce635b34
libfreerdp-core: fix code style
2015-09-15 10:37:57 -04:00
MartinHaimberger
2b2af6c9ea
Merge pull request #2886 from clangm/master
...
Fix Network Characteristics Autodetect [RDPBCGR 2.2.14]
2015-09-15 15:16:37 +02:00
Denis Vincent
6d55635ed0
libfreerdp-core: Gateway RDP8 BIO correction. Fixes connection losses.
2015-09-15 09:03:39 -04:00
MartinHaimberger
db2ce49a98
Merge pull request #2763 from akallabeth/nla_null_auth
...
Fixed server and client NLA state machine for NULL identity.
2015-09-15 14:53:55 +02:00
clangm
ac089f8a3f
Removed if statement that was causing network characteristics autodetect to not work
2015-09-11 15:01:31 -06:00
MartinHaimberger
d971116457
Merge pull request #2765 from akallabeth/connect_abort
...
Connect abort and unified TCP connect
2015-09-07 10:05:24 +02:00
Armin Novak
4d77f2a4c8
Fixed CreateProcess argument initialisation.
2015-09-05 18:55:08 +02:00
Armin Novak
91d318ba7b
Enable RFX for test connection, now required by sample server.
2015-09-05 17:00:27 +02:00
Armin Novak
f7a11a0ed8
Resetting abortEvent on disconnect to avoid race during connect.
2015-09-05 16:26:46 +02:00
Armin Novak
01496f474f
Fixed error handling for rdp_client_connect fail.
2015-09-05 16:26:29 +02:00
Armin Novak
7d8ab23877
WSAEvent fixes ported from realjiangms pull 2870.
2015-09-05 15:18:01 +02:00
Armin Novak
188fe4ed2b
Removed rdp disconnect, using unified abortEvent instead.
2015-09-05 14:57:30 +02:00
Armin Novak
3b8043264f
Resetting channel error on connect.
2015-09-03 13:46:17 +02:00
Bernhard Miklautz
1f13781fe1
Merge pull request #2855 from akallabeth/memleak_fixes
...
Memleak fixes
2015-08-31 09:50:21 +02:00
Armin Novak
893e7a35a8
Fixed broken cleanup code.
2015-08-31 09:13:15 +02:00
Bernhard Miklautz
05c02da742
settings: update settings/help to match
...
* wallpaper was off but help said "default: on"
* compression is on but help said "default: off"
Fixes #2853
2015-08-28 11:09:38 +02:00
Armin Novak
dd9d66a3e6
Fixed NONNULL argument warnings.
2015-08-28 10:59:48 +02:00
Armin Novak
07bba9b623
Fixed NONNULL argument warnings.
2015-08-28 10:58:20 +02:00
Armin Novak
c3a1f56f77
Resetting signals on freerdp_connect.
2015-08-27 15:53:37 +02:00
Armin Novak
fda56c0dbb
Added missing NULL pointer checks.
2015-08-27 15:33:06 +02:00
Armin Novak
7ebf4879f0
Fixed uninitialised events.
2015-08-27 15:33:06 +02:00
Armin Novak
4cfd7a48cd
Aborting transport layer now if requested.
2015-08-27 15:33:06 +02:00
Armin Novak
134a16d522
Fixed WSAEventSelect mode reset.
2015-08-27 15:33:06 +02:00
Armin Novak
1cbeb10074
Added unit test for freerdp_connect
...
* Tests connection to not existing host (timeout)
* Tests connection to not exising host with abort.
* Tests connection to sfreerdp-server on localhost.
2015-08-27 15:33:06 +02:00
Armin Novak
e6c23cb534
Implemented Async TCP connect with abort event
...
* Implemented unified freerdp_tcp_connect_timeout with connect abort.
* Implemented unified freerdp_tcp_connect_multi with connect abort.
* Added connect abort to freerdp_tcp_connect.
* Added freerdp_abort_connect and abortEvent.
2015-08-27 15:33:06 +02:00
Marc-André Moreau
223e0c7900
Merge pull request #2785 from MartinHaimberger/mh-channel-fix
...
Channel hardening and fixing
2015-08-27 09:24:10 -04:00
Martin Haimberger
52405a3e79
Remove WIN32ERROR type
...
All return values are UINT now.
2015-08-27 05:38:20 -07:00
Vic Lee
6f639c1e34
gcc: read and write desktop scale settings in core data.
2015-08-27 16:19:40 +08:00
Vic Lee
8394d8c677
gcc: read and write monitor extended data.
2015-08-27 15:26:37 +08:00
Martin Haimberger
420a86e1c7
Merge remote-tracking branch 'upstream/master' into mh-channel-fix
...
Conflicts:
channels/drdynvc/client/drdynvc_main.c
channels/rdpgfx/client/rdpgfx_main.c
client/X11/xf_gfx.c
2015-08-25 00:07:04 -07:00
Marc-André Moreau
d7329194fc
Merge branch 'master' of github.com:FreeRDP/FreeRDP
2015-08-04 11:55:38 -04:00
Martin Haimberger
2862109337
Merge remote-tracking branch 'upstream/master' into mh-channel-fix
...
Conflicts:
channels/smartcard/client/smartcard_main.c
channels/smartcard/client/smartcard_operations.c
2015-07-30 07:29:12 -07:00
Bernhard Miklautz
a22dc21c15
remdesk,encomps: misc fixes
...
* only free stream when an error occurs
* ignore unhanded messages instead of throwing an error
* fix memory leak in settings
2015-07-29 17:32:09 +02:00
Clive Stevens
99228ee254
Fix race condition in freerdp_channels_client_load
...
If g_pInterface is set to NULL outside the critical section in one thread
while another thread is in the critical section, the channel client context
allocated in the VirtualChannelEntry won't end up getting freed.
The channel client context is normally loaded from g_pInterface in
FreeRDP_VirtualChannelInit and stored in the pChannelInitData, then copied
from there onto the pChannelOpenData structure in FreeRDP_VirtualChannelOpen
and finally freed in freerdp_channels_free.
2015-07-29 14:26:33 +01:00
Marc-André Moreau
5cb06ecc68
Merge branch 'master' of github.com:FreeRDP/FreeRDP
2015-07-28 09:21:33 -04:00
Bernhard Miklautz
a342d40158
core/listner: fix possible problem in _free
2015-07-27 11:24:21 +02:00
Bernhard Miklautz
458d3b1593
transport: fix regression introduced with PR #2770
...
When the event is reset in transport_check_fds xfreerdp doesn't work and
consumes 100% CPU (see #2790 ). On windows this is require otherwise the
CPU consumption is 100% there.
This quick fix only resets the event on windows. It's a working approach
but definitely not the final solution.
2015-07-17 12:06:41 +02:00
Vic Lee
042cb250f3
Merge pull request #2770 from akallabeth/bio_event_reset
...
Resetting frontBio after read now.
2015-07-16 06:57:46 -07:00
Martin Haimberger
6ab0187d84
Merge remote-tracking branch 'upstream/master' into mh-channel
...
Conflicts:
channels/audin/client/oss/audin_oss.c
channels/drive/client/drive_main.c
channels/printer/client/printer_cups.c
channels/printer/client/printer_main.c
channels/rail/client/rail_main.c
channels/rdpgfx/client/rdpgfx_main.c
channels/rdpsnd/client/oss/rdpsnd_oss.c
channels/remdesk/client/remdesk_main.c
channels/remdesk/server/remdesk_main.c
channels/tsmf/client/tsmf_media.c
2015-07-15 01:57:07 -07:00
Martin Haimberger
b8c110d19b
introduced channel error reporting system
...
The rdpContext gets an event which will
get set if an error occoured in a channel.
If a thread or a void callback has to report an
error it will get signaled by this system.
2015-07-15 00:50:35 -07:00
Bernhard Miklautz
68e8569110
winpr/synch: remove the dependency on winsock.h
...
winsock.h pulls in a lot of defines and dependencies that are not
required and partially unwanted in winpr's core (for parts that are not
related to network). In order to get rid of this dependency and have an
independent defines for extended winpr functions the WINPR_FD_* defines
are used internally (and for exposed functions). Where required, like in
WSAEventSelect, the FD_* is mapped to WINPR_FD_*.
2015-07-14 11:39:41 +02:00
Armin Novak
098eda9873
Error checks for BIO_get_event
...
ResetEvent before reading data from transport BIO.
2015-07-09 12:20:22 +02:00
Armin Novak
18cea1c9ba
Replaced cbMaxSignature with cbSecurityTrailer
...
The token buffer size during authentication was constructed
from the wrong buffer size. These sizes are equal in case of
local account logins but differ with domain accounts.
2015-07-09 10:09:18 +02:00
Armin Novak
ecf6ffdcce
Fixed CompleteAuthToken return check.
2015-07-09 09:57:45 +02:00
Armin Novak
cb01e540ba
Fixed CompleteAuthToken return check.
2015-07-09 09:49:12 +02:00
Armin Novak
2fe5ecfc1b
Fixed wrong output in log messages.
2015-07-08 17:41:23 +02:00
Martin Fleisz
9a2d33af12
Fixed missing encrypt / decrypt success check.
...
The return of EncryptMessage and DecryptMessage was unchecked.
This lead to PLAINTEXT to be sent over the wire, a major security
issue.
2015-07-08 17:41:23 +02:00
Armin Novak
48ccf73a36
More SSPI logging.
2015-07-08 17:41:22 +02:00
Armin Novak
5b0ee9b7ab
Error checks and readable log messages.
2015-07-08 17:41:22 +02:00
Martin Fleisz
3b87cc0c07
Fixed server and client NLA state machine.
...
When using NULL credentials (current context)
the server state machine did not send back the
required authentication token.
On client side erroneous checks prevented sending
the appropriate public key.
2015-07-08 17:41:21 +02:00
Armin Novak
0120ee75ca
Resetting frontBio after read now.
2015-07-07 14:48:27 +02:00
Armin Novak
d18b0fbeb4
Handle API updated.
2015-07-03 09:52:52 +02:00
Hardening
ac93b26ba8
Merge pull request #2750 from realjiangms/fix_win32_wsaevent
...
Fix event created for WSAEventSelect
2015-07-02 09:26:13 +02:00
Armin Novak
3a9db563fd
NLA: Fixed length check.
2015-07-01 16:05:11 +02:00
Armin Novak
8479c824fd
Fixed handling of optional TSPasswordCreds field.
2015-07-01 15:30:38 +02:00
Armin Novak
6c0e1af4af
NLA decrypt credentials fixed.
2015-07-01 14:31:55 +02:00