640 |
*/ |
*/ |
641 |
|
|
642 |
in_uint32_le(s, cacert_len); |
in_uint32_le(s, cacert_len); |
643 |
|
DEBUG_RDP5(("CA Certificate length is %d\n", cacert_len)); |
644 |
cacert = d2i_X509(NULL, &(s->p), cacert_len); |
cacert = d2i_X509(NULL, &(s->p), cacert_len); |
645 |
/* Note: We don't need to move s->p here - d2i_X509 is |
/* Note: We don't need to move s->p here - d2i_X509 is |
646 |
"kind" enough to do it for us */ |
"kind" enough to do it for us */ |
661 |
*/ |
*/ |
662 |
|
|
663 |
in_uint32_le(s, cert_len); |
in_uint32_le(s, cert_len); |
664 |
|
DEBUG_RDP5(("Certificate length is %d\n", cert_len)); |
665 |
server_cert = d2i_X509(NULL, &(s->p), cert_len); |
server_cert = d2i_X509(NULL, &(s->p), cert_len); |
666 |
if (NULL == server_cert) |
if (NULL == server_cert) |
667 |
{ |
{ |
741 |
{ |
{ |
742 |
in_uint16_le(s, server_rdp_version); |
in_uint16_le(s, server_rdp_version); |
743 |
DEBUG_RDP5(("Server RDP version is %d\n", server_rdp_version)); |
DEBUG_RDP5(("Server RDP version is %d\n", server_rdp_version)); |
744 |
|
if (1 == server_rdp_version) |
745 |
|
use_rdp5 = 0; |
746 |
} |
} |
747 |
|
|
748 |
|
|
776 |
break; |
break; |
777 |
|
|
778 |
case SEC_TAG_SRV_3: |
case SEC_TAG_SRV_3: |
779 |
|
/* FIXME: We should parse this information and |
780 |
|
use it to map RDP5 channels to MCS |
781 |
|
channels */ |
782 |
break; |
break; |
783 |
|
|
784 |
case SEC_TAG_SRV_CRYPT: |
case SEC_TAG_SRV_CRYPT: |