if (use_count == 4096)
{
- sec_update(sec_encrypt_key, sec_encrypt_update_key);
- RC4_set_key(&rc4_encrypt_key, rc4_key_len, sec_encrypt_key);
+ sec_update(sec_decrypt_key, sec_decrypt_update_key);
+ RC4_set_key(&rc4_decrypt_key, rc4_key_len, sec_decrypt_key);
use_count = 0;
}
- RC4(&rc4_encrypt_key, length, data, data);
+ RC4(&rc4_decrypt_key, length, data, data);
use_count++;
}
if (use_count == 4096)
{
- sec_update(sec_decrypt_key, sec_decrypt_update_key);
- RC4_set_key(&rc4_decrypt_key, rc4_key_len, sec_decrypt_key);
+ sec_update(sec_encrypt_key, sec_encrypt_update_key);
+ RC4_set_key(&rc4_encrypt_key, rc4_key_len, sec_encrypt_key);
use_count = 0;
}
- RC4(&rc4_decrypt_key, length, data, data);
+ RC4(&rc4_encrypt_key, length, data, data);
use_count++;
}
{
printf("Received logon packet!\n");
rdp_get_logon_info(s);
+
+ // demand activity
+ {
+ STREAM s;
+
+ s = sec_init(g_encryption ? SEC_ENCRYPT : 0, 10);
+ out_uint16_le(s, 10);
+ out_uint16_le(s, (RDP_PDU_DEMAND_ACTIVE | 0x10));
+ out_uint16_le(s, 1001);
+
+ out_uint32_le(s, 0x103ea);
+ s_mark_end(s);
+ sec_send(s, g_encryption ? SEC_ENCRYPT : 0);
+ }
+
+ continue;
}
if (sec_flags & SEC_CLIENT_RANDOM) {
printf("\n");
// now we can generate the keys
- sec_generate_keys(inr + SEC_RANDOM_SIZE, cacert, 8);
+ sec_generate_keys(inr + SEC_RANDOM_SIZE, cacert, 1);
continue;
}
}