static uint8 sec_encrypt_update_key[16];
static uint8 sec_crypted_random[SEC_MODULUS_SIZE];
+RSA *privkey;
+
uint16 g_server_rdp_version = 0;
/*
{
int datalen;
+// DEBUG(("sending packet to channel %u\n", channel));
+
s_pop_layer(s, sec_hdr);
// if (!g_licence_issued || (flags & SEC_ENCRYPT))
out_uint32_le(s, flags);
if (sec_flags & SEC_LOGON_INFO)
{
printf("Received logon packet!\n");
+ rdp_get_logon_info(s);
+ }
+ if (sec_flags & SEC_CLIENT_RANDOM) {
+ uint32 length;
+
+ printf("Receiving the client random!\n");
+ in_uint32_le(s, length);
+ if (length != SEC_MODULUS_SIZE + SEC_PADDING_SIZE) {
+ error("Client random was wrong size, %u bytes\n", length);
+ }
+ in_uint8a(s, sec_crypted_random, SEC_MODULUS_SIZE);
+ in_uint8s(s, SEC_PADDING_SIZE);
+ if (!s_check_end(s)) {
+ error("Junk after client random\n");
+ }
}
}