#if WITH_DEBUG
DEBUG(("RDP packet #%d, (type %x, length %u)\n", ++g_packetno, *type, length));
- //hexdump(g_next_packet, length);
+ hexdump(g_next_packet, length);
#endif /* */
g_next_packet += length;
use_count = 0;
}
- printf("RC4-ing %u bytes with DECRYPT, uc=%u\n", length, use_count);
-
RC4(&rc4_decrypt_key, length, data, data);
use_count++;
}
if (/*g_encryption || !g_licence_issued*/ 1)
{
in_uint32_le(s, sec_flags);
- printf("sec_flags=%x\n", sec_flags);
if (sec_flags & SEC_ENCRYPT)
{
- printf("encrypt\n");
in_uint8s(s, 8); /* signature */
sec_decrypt(s->p, s->end - s->p);
}
{
uint8 tag;
in_uint8(s, tag);
- printf("SEC_LICENSE_NEG tag %x\n", tag);
if (tag == LICENCE_TAG_PRESENT) {
process_presented_license(s);
{
STREAM s;
- printf("Sending DEMAND_ACTIVE (0x%x bytes)\n", sizeof(demand_active));
s = sec_init(SEC_ENCRYPT, sizeof(demand_active));
out_uint8p(s, demand_active, sizeof(demand_active));
s_mark_end(s);
if (sec_flags & SEC_LOGON_INFO)
{
- printf("Received logon packet!\n");
rdp_get_logon_info(s);
// demand a license
uint8 inr[SEC_MODULUS_SIZE];
int i;
- printf("Receiving the client random!\n");
in_uint32_le(s, length);
if (length != SEC_MODULUS_SIZE + SEC_PADDING_SIZE) {
error("Client random was wrong size, %u bytes\n", length);