Accepting request 823049 from X11:RemoteDesktop
OBS-URL: https://build.opensuse.org/request/show/823049 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xrdp?expand=0&rev=37
This commit is contained in:
commit
2c8baf265e
3
xrdp-0.9.13.1.tar.gz
Normal file
3
xrdp-0.9.13.1.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:e90a15404c060c378a91b3b51899415122e801863b8a00e4ea42a106b184108c
|
||||||
|
size 1878031
|
16
xrdp-0.9.13.1.tar.gz.asc
Normal file
16
xrdp-0.9.13.1.tar.gz.asc
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
|
||||||
|
iQIzBAABCAAdFiEEGKuDipBxZ3RZFIcZA5k7QGXnGTsFAl764e4ACgkQA5k7QGXn
|
||||||
|
GTvL6g/+JGmCorupzV7CYN3ThrT8FZtOuYpm3cXQtkpvMMZb7LgzoCn96UWoVnnF
|
||||||
|
ldg3cdCvhDtf08Am619Uo1Qtet2Qk1w9ssdEChaz+dN/kw6BB88KtbehIaxEmsu7
|
||||||
|
G+NSIQxC6T7gOSEwxNL35gv55fJgmBIyptri592awqIM7Y46704mELoDaHeIu0Je
|
||||||
|
B5R9eTuL0Pi02gcWA/8XDnYY6yg1xlh23+Z+yXqKbpX+qltEpuKff+eIDhM1m/N2
|
||||||
|
Nd3/sHii9dvX3vXhdq2iH14sk4d701rJ6s+Qfw3iE7UcJLPwiIAIfepj3MU4bo8G
|
||||||
|
qwbQwrRHOCTRHlRV9DfQ2ZXqadP52w9D7ZQPE9Iqyk8UBJx3Gd1I8drg2iNBIkeK
|
||||||
|
w7sLfJmDdVgyMJjSbQ0CWMkTSzhIpdlRLeDdafusmLwLokpgVWPCeBEc2oW24A7B
|
||||||
|
gNysT3iur1vqYpx5PtgAf7eQ9/NqUKLS/nfVfvvCde0apXLgTUIUjOfR5fCkn6VA
|
||||||
|
OuqbysoYg+U99iQ/Yy4HWDO9msSf5V8ZoaMggxenbD9OQtJVgu8eaUqory+3jmQe
|
||||||
|
MNKUUtdFzy1DYTqkby8hN+ipL0jLA7DQWncx2+w9f0+Vh1t3uBP3z2YnzSORJXFX
|
||||||
|
P0CUtlQp0IJxBHqvuItVcOA5aPpErJNz45/UxVjk9btxGiU6feE=
|
||||||
|
=n35S
|
||||||
|
-----END PGP SIGNATURE-----
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:59fe6f32f17e7b86c132e069ee96b754f0555b1197e44e4d070e85591d0271ff
|
|
||||||
size 1865444
|
|
@ -1,16 +0,0 @@
|
|||||||
-----BEGIN PGP SIGNATURE-----
|
|
||||||
|
|
||||||
iQIzBAABCAAdFiEEYezqu/K7QOOjXfMKn3LNvAG/EOsFAl5obDYACgkQn3LNvAG/
|
|
||||||
EOtPBBAAghM5yYVTLoUU98wOCM8Gx8PQlDaHsWHz6FKzGIo1QgkUaZs4Ixe1CrEi
|
|
||||||
ZjInippgf0jSSve/7/KG1WSUDON3bfqSi6y4/wH/vOigy6fKsVUOcIxKtvtABWyR
|
|
||||||
iE/jZBt6hoTyHg5DU8jS9KZGHHWUFaPbkgr59FG1lJIjkrqgqRuwK58O3Vrh3zOX
|
|
||||||
q9fsHmZ0ZJp/KDUw23OB3yTj6H203SVylBHYQIsc/0EjTCYACU69Oib43pOaphy9
|
|
||||||
+9k+kolw86blHk1BY1S16iR3XlG6T/eYzGvRwsyBH9Rqu1nzBwDqACGZfEoZu+hR
|
|
||||||
G45sllpuG/VLxjP6JLwZZg56nskiKWlNnkicxGkKhhLANDDm9xf7jGsALaiOp89t
|
|
||||||
uwPGJhW7NfHxfNyIDyL+OopLHu0l0qg2O48ATofzqkqEhZicCE1orRXjmKdYrVd0
|
|
||||||
rBRVpVaHhU6HAM7qf5QgdmFpyV52aln1O7iaooOx9Axng+4AWagaLyox81k0NNCD
|
|
||||||
v7KCsDObuZJWrYa/PmxpxP+ZYRATLvYQjJGfDK6M9k36+jG2Eu9WIDT0ImYIvZ6H
|
|
||||||
qWSSqGv20fbmOCpV798NtTbaTPTMWv+XF0xRunU7kxkEJtKwNwPP53Z/ed01oACp
|
|
||||||
ZlqCHU/OBAqweVq2t9RkGLhIEq0gVR1BT2BCc1CvAEUkgMCf114=
|
|
||||||
=6+xK
|
|
||||||
-----END PGP SIGNATURE-----
|
|
@ -1,19 +1,19 @@
|
|||||||
Index: b/sesman/auth.h
|
Index: xrdp-0.9.13.1/sesman/auth.h
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/auth.h 2017-10-26 13:30:12.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/auth.h
|
||||||
+++ b/sesman/auth.h 2018-01-04 16:40:32.178890000 +0800
|
+++ xrdp-0.9.13.1/sesman/auth.h
|
||||||
@@ -106,4 +106,6 @@
|
@@ -106,4 +106,6 @@ auth_check_pwd_chg(const char *user);
|
||||||
int
|
int
|
||||||
auth_change_pwd(const char *user, const char *newpwd);
|
auth_change_pwd(const char *user, const char *newpwd);
|
||||||
|
|
||||||
+int
|
+int
|
||||||
+auth_change_pwd_pam(char* user, char* pass, char* newpwd);
|
+auth_change_pwd_pam(char* user, char* pass, char* newpwd);
|
||||||
#endif
|
#endif
|
||||||
Index: b/sesman/libscp/libscp_session.c
|
Index: xrdp-0.9.13.1/sesman/libscp/libscp_session.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/libscp/libscp_session.c 2017-10-26 13:30:12.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/libscp/libscp_session.c
|
||||||
+++ b/sesman/libscp/libscp_session.c 2018-01-04 16:40:32.178890000 +0800
|
+++ xrdp-0.9.13.1/sesman/libscp/libscp_session.c
|
||||||
@@ -75,6 +75,10 @@
|
@@ -75,6 +75,10 @@ scp_session_set_type(struct SCP_SESSION
|
||||||
s->type = SCP_GW_AUTHENTICATION;
|
s->type = SCP_GW_AUTHENTICATION;
|
||||||
break;
|
break;
|
||||||
|
|
||||||
@ -24,7 +24,7 @@ Index: b/sesman/libscp/libscp_session.c
|
|||||||
case SCP_SESSION_TYPE_MANAGE:
|
case SCP_SESSION_TYPE_MANAGE:
|
||||||
s->type = SCP_SESSION_TYPE_MANAGE;
|
s->type = SCP_SESSION_TYPE_MANAGE;
|
||||||
s->mng = (struct SCP_MNG_DATA *)g_malloc(sizeof(struct SCP_MNG_DATA), 1);
|
s->mng = (struct SCP_MNG_DATA *)g_malloc(sizeof(struct SCP_MNG_DATA), 1);
|
||||||
@@ -231,6 +235,32 @@
|
@@ -231,6 +235,32 @@ scp_session_set_password(struct SCP_SESS
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -57,10 +57,10 @@ Index: b/sesman/libscp/libscp_session.c
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
Index: b/sesman/libscp/libscp_types.h
|
Index: xrdp-0.9.13.1/sesman/libscp/libscp_types.h
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/libscp/libscp_types.h 2017-10-04 12:44:21.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/libscp/libscp_types.h
|
||||||
+++ b/sesman/libscp/libscp_types.h 2018-01-04 16:40:32.178890000 +0800
|
+++ xrdp-0.9.13.1/sesman/libscp/libscp_types.h
|
||||||
@@ -47,6 +47,7 @@
|
@@ -47,6 +47,7 @@
|
||||||
* XRDP sends this command to let sesman verify if the user is allowed
|
* XRDP sends this command to let sesman verify if the user is allowed
|
||||||
* to use the gateway */
|
* to use the gateway */
|
||||||
@ -69,7 +69,7 @@ Index: b/sesman/libscp/libscp_types.h
|
|||||||
|
|
||||||
#define SCP_ADDRESS_TYPE_IPV4 0x00
|
#define SCP_ADDRESS_TYPE_IPV4 0x00
|
||||||
#define SCP_ADDRESS_TYPE_IPV6 0x01
|
#define SCP_ADDRESS_TYPE_IPV6 0x01
|
||||||
@@ -77,6 +78,7 @@
|
@@ -81,6 +82,7 @@ struct SCP_SESSION
|
||||||
char locale[18];
|
char locale[18];
|
||||||
char* username;
|
char* username;
|
||||||
char* password;
|
char* password;
|
||||||
@ -77,41 +77,33 @@ Index: b/sesman/libscp/libscp_types.h
|
|||||||
char* hostname;
|
char* hostname;
|
||||||
tui8 addr_type;
|
tui8 addr_type;
|
||||||
tui32 ipv4addr;
|
tui32 ipv4addr;
|
||||||
Index: b/sesman/libscp/libscp_v0.c
|
Index: xrdp-0.9.13.1/sesman/libscp/libscp_v0.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/libscp/libscp_v0.c 2017-12-27 22:30:25.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/libscp/libscp_v0.c
|
||||||
+++ b/sesman/libscp/libscp_v0.c 2018-01-04 17:09:58.859805998 +0800
|
+++ xrdp-0.9.13.1/sesman/libscp/libscp_v0.c
|
||||||
@@ -329,9 +329,8 @@
|
@@ -383,9 +383,9 @@ scp_v0s_init_session(struct SCP_CONNECTI
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
- else if (code == SCP_GW_AUTHENTICATION)
|
- else if (code == SCP_GW_AUTHENTICATION)
|
||||||
+ else if (code == SCP_GW_AUTHENTICATION || code == SCP_GW_CHAUTHTOK)
|
+ else if (code == SCP_GW_AUTHENTICATION || code == SCP_GW_CHAUTHTOK)
|
||||||
{
|
{
|
||||||
- /* g_writeln("Command is SCP_GW_AUTHENTICATION"); */
|
|
||||||
session = scp_session_create();
|
|
||||||
|
|
||||||
if (0 == session)
|
|
||||||
@@ -341,7 +340,7 @@
|
|
||||||
}
|
|
||||||
|
|
||||||
scp_session_set_version(session, version);
|
|
||||||
- scp_session_set_type(session, SCP_GW_AUTHENTICATION);
|
- scp_session_set_type(session, SCP_GW_AUTHENTICATION);
|
||||||
+ scp_session_set_type(session, code);
|
+ scp_session_set_type(session, code);
|
||||||
/* reading username */
|
/* reading username */
|
||||||
in_uint16_be(c->in_s, sz);
|
if (!in_string16(c->in_s, buf, "username", __LINE__))
|
||||||
buf = g_new0(char, sz + 1);
|
{
|
||||||
@@ -358,6 +357,23 @@
|
@@ -399,6 +399,23 @@ scp_v0s_init_session(struct SCP_CONNECTI
|
||||||
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
||||||
}
|
}
|
||||||
g_free(buf);
|
|
||||||
|
|
||||||
+ if (code == SCP_GW_CHAUTHTOK)
|
+ if (code == SCP_GW_CHAUTHTOK)
|
||||||
+ {
|
+ {
|
||||||
+ /* reading new password */
|
+ /* reading new password */
|
||||||
+ in_uint16_be(c->in_s, sz);
|
+ if (!in_string16(c->in_s, buf, "passwd", __LINE__))
|
||||||
+ buf = g_new0(char, sz + 1);
|
+ {
|
||||||
+ in_uint8a(c->in_s, buf, sz);
|
+ return SCP_SERVER_STATE_SIZE_ERR;
|
||||||
+ buf[sz] = '\0';
|
+ }
|
||||||
+
|
+
|
||||||
+ if (0 != scp_session_set_newpass(session, buf))
|
+ if (0 != scp_session_set_newpass(session, buf))
|
||||||
+ {
|
+ {
|
||||||
@ -123,9 +115,9 @@ Index: b/sesman/libscp/libscp_v0.c
|
|||||||
+ }
|
+ }
|
||||||
+
|
+
|
||||||
/* reading password */
|
/* reading password */
|
||||||
in_uint16_be(c->in_s, sz);
|
if (!in_string16(c->in_s, buf, "passwd", __LINE__))
|
||||||
buf = g_new0(char, sz + 1);
|
{
|
||||||
@@ -435,12 +451,13 @@
|
@@ -530,12 +547,13 @@ scp_v0s_deny_connection(struct SCP_CONNE
|
||||||
|
|
||||||
/******************************************************************************/
|
/******************************************************************************/
|
||||||
enum SCP_SERVER_STATES_E
|
enum SCP_SERVER_STATES_E
|
||||||
@ -141,11 +133,11 @@ Index: b/sesman/libscp/libscp_v0.c
|
|||||||
out_uint16_be(c->out_s, value); /* reply code */
|
out_uint16_be(c->out_s, value); /* reply code */
|
||||||
out_uint16_be(c->out_s, 0); /* dummy data */
|
out_uint16_be(c->out_s, 0); /* dummy data */
|
||||||
s_mark_end(c->out_s);
|
s_mark_end(c->out_s);
|
||||||
Index: b/sesman/libscp/libscp_v0.h
|
Index: xrdp-0.9.13.1/sesman/libscp/libscp_v0.h
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/libscp/libscp_v0.h 2017-07-19 12:23:49.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/libscp/libscp_v0.h
|
||||||
+++ b/sesman/libscp/libscp_v0.h 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/sesman/libscp/libscp_v0.h
|
||||||
@@ -79,6 +79,6 @@
|
@@ -79,6 +79,6 @@ scp_v0s_deny_connection(struct SCP_CONNE
|
||||||
* @return
|
* @return
|
||||||
*/
|
*/
|
||||||
enum SCP_SERVER_STATES_E
|
enum SCP_SERVER_STATES_E
|
||||||
@ -153,11 +145,11 @@ Index: b/sesman/libscp/libscp_v0.h
|
|||||||
+scp_v0s_replyauthentication(struct SCP_CONNECTION* c, unsigned short int value, tui8 type);
|
+scp_v0s_replyauthentication(struct SCP_CONNECTION* c, unsigned short int value, tui8 type);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
Index: b/sesman/scp_v0.c
|
Index: xrdp-0.9.13.1/sesman/scp_v0.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/scp_v0.c 2017-10-26 13:30:12.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/scp_v0.c
|
||||||
+++ b/sesman/scp_v0.c 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/sesman/scp_v0.c
|
||||||
@@ -42,6 +42,13 @@
|
@@ -42,6 +42,13 @@ scp_v0_process(struct SCP_CONNECTION *c,
|
||||||
int errorcode = 0;
|
int errorcode = 0;
|
||||||
bool_t do_auth_end = 1;
|
bool_t do_auth_end = 1;
|
||||||
|
|
||||||
@ -171,7 +163,7 @@ Index: b/sesman/scp_v0.c
|
|||||||
data = auth_userpass(s->username, s->password, &errorcode);
|
data = auth_userpass(s->username, s->password, &errorcode);
|
||||||
|
|
||||||
if (s->type == SCP_GW_AUTHENTICATION)
|
if (s->type == SCP_GW_AUTHENTICATION)
|
||||||
@@ -53,14 +60,14 @@
|
@@ -53,14 +60,14 @@ scp_v0_process(struct SCP_CONNECTION *c,
|
||||||
if (1 == access_login_allowed(s->username))
|
if (1 == access_login_allowed(s->username))
|
||||||
{
|
{
|
||||||
/* the user is member of the correct groups. */
|
/* the user is member of the correct groups. */
|
||||||
@ -188,7 +180,7 @@ Index: b/sesman/scp_v0.c
|
|||||||
log_message(LOG_LEVEL_INFO, "Username okey but group problem for "
|
log_message(LOG_LEVEL_INFO, "Username okey but group problem for "
|
||||||
"user: %s", s->username);
|
"user: %s", s->username);
|
||||||
/* g_writeln("user password ok, but group problem"); */
|
/* g_writeln("user password ok, but group problem"); */
|
||||||
@@ -71,7 +78,7 @@
|
@@ -71,7 +78,7 @@ scp_v0_process(struct SCP_CONNECTION *c,
|
||||||
/* g_writeln("username or password error"); */
|
/* g_writeln("username or password error"); */
|
||||||
log_message(LOG_LEVEL_INFO, "Username or password error for user: %s",
|
log_message(LOG_LEVEL_INFO, "Username or password error for user: %s",
|
||||||
s->username);
|
s->username);
|
||||||
@ -197,11 +189,11 @@ Index: b/sesman/scp_v0.c
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else if (data)
|
else if (data)
|
||||||
Index: b/sesman/verify_user_pam.c
|
Index: xrdp-0.9.13.1/sesman/verify_user_pam.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/sesman/verify_user_pam.c 2017-11-27 09:42:43.000000000 +0800
|
--- xrdp-0.9.13.1.orig/sesman/verify_user_pam.c
|
||||||
+++ b/sesman/verify_user_pam.c 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/sesman/verify_user_pam.c
|
||||||
@@ -38,6 +38,7 @@
|
@@ -38,6 +38,7 @@ struct t_user_pass
|
||||||
{
|
{
|
||||||
char user[256];
|
char user[256];
|
||||||
char pass[256];
|
char pass[256];
|
||||||
@ -209,7 +201,7 @@ Index: b/sesman/verify_user_pam.c
|
|||||||
};
|
};
|
||||||
|
|
||||||
struct t_auth_info
|
struct t_auth_info
|
||||||
@@ -86,6 +87,55 @@
|
@@ -86,6 +87,55 @@ verify_pam_conv(int num_msg, const struc
|
||||||
}
|
}
|
||||||
|
|
||||||
/******************************************************************************/
|
/******************************************************************************/
|
||||||
@ -265,7 +257,7 @@ Index: b/sesman/verify_user_pam.c
|
|||||||
static void
|
static void
|
||||||
get_service_name(char *service_name)
|
get_service_name(char *service_name)
|
||||||
{
|
{
|
||||||
@@ -103,6 +153,52 @@
|
@@ -103,6 +153,52 @@ get_service_name(char *service_name)
|
||||||
}
|
}
|
||||||
|
|
||||||
/******************************************************************************/
|
/******************************************************************************/
|
||||||
@ -318,11 +310,11 @@ Index: b/sesman/verify_user_pam.c
|
|||||||
/* returns long, zero is no go
|
/* returns long, zero is no go
|
||||||
Stores the detailed error code in the errorcode variable*/
|
Stores the detailed error code in the errorcode variable*/
|
||||||
|
|
||||||
Index: b/xrdp/xrdp_login_wnd.c
|
Index: xrdp-0.9.13.1/xrdp/xrdp_login_wnd.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/xrdp/xrdp_login_wnd.c 2017-11-27 09:42:43.000000000 +0800
|
--- xrdp-0.9.13.1.orig/xrdp/xrdp_login_wnd.c
|
||||||
+++ b/xrdp/xrdp_login_wnd.c 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/xrdp/xrdp_login_wnd.c
|
||||||
@@ -187,7 +187,14 @@
|
@@ -187,7 +187,14 @@ xrdp_wm_cancel_clicked(struct xrdp_bitma
|
||||||
{
|
{
|
||||||
if (wnd->wm != 0)
|
if (wnd->wm != 0)
|
||||||
{
|
{
|
||||||
@ -338,7 +330,7 @@ Index: b/xrdp/xrdp_login_wnd.c
|
|||||||
{
|
{
|
||||||
g_set_wait_obj(wnd->wm->pro_layer->self_term_event);
|
g_set_wait_obj(wnd->wm->pro_layer->self_term_event);
|
||||||
}
|
}
|
||||||
@@ -245,7 +252,29 @@
|
@@ -245,7 +252,29 @@ xrdp_wm_ok_clicked(struct xrdp_bitmap *w
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@ -369,7 +361,7 @@ Index: b/xrdp/xrdp_login_wnd.c
|
|||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
@@ -545,6 +574,32 @@
|
@@ -545,6 +574,32 @@ xrdp_wm_login_notify(struct xrdp_bitmap
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -402,7 +394,7 @@ Index: b/xrdp/xrdp_login_wnd.c
|
|||||||
/******************************************************************************/
|
/******************************************************************************/
|
||||||
static int
|
static int
|
||||||
xrdp_wm_login_fill_in_combo(struct xrdp_wm *self, struct xrdp_bitmap *b)
|
xrdp_wm_login_fill_in_combo(struct xrdp_wm *self, struct xrdp_bitmap *b)
|
||||||
@@ -825,6 +880,103 @@
|
@@ -825,6 +880,103 @@ xrdp_login_wnd_create(struct xrdp_wm *se
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -506,11 +498,11 @@ Index: b/xrdp/xrdp_login_wnd.c
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Load configuration from xrdp.ini file
|
* Load configuration from xrdp.ini file
|
||||||
Index: b/xrdp/xrdp_mm.c
|
Index: xrdp-0.9.13.1/xrdp/xrdp_mm.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/xrdp/xrdp_mm.c 2017-12-27 22:30:26.000000000 +0800
|
--- xrdp-0.9.13.1.orig/xrdp/xrdp_mm.c
|
||||||
+++ b/xrdp/xrdp_mm.c 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/xrdp/xrdp_mm.c
|
||||||
@@ -1458,7 +1458,7 @@
|
@@ -1781,7 +1781,7 @@ xrdp_mm_sesman_data_in(struct trans *tra
|
||||||
/*********************************************************************/
|
/*********************************************************************/
|
||||||
/* return 0 on success */
|
/* return 0 on success */
|
||||||
static int
|
static int
|
||||||
@ -519,7 +511,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
{
|
{
|
||||||
int reply;
|
int reply;
|
||||||
int rec = 32+1; /* 32 is reserved for PAM failures this means connect failure */
|
int rec = 32+1; /* 32 is reserved for PAM failures this means connect failure */
|
||||||
@@ -1486,7 +1486,8 @@
|
@@ -1809,7 +1809,8 @@ access_control(char *username, char *pas
|
||||||
make_stream(out_s);
|
make_stream(out_s);
|
||||||
init_stream(out_s, 500);
|
init_stream(out_s, 500);
|
||||||
s_push_layer(out_s, channel_hdr, 8);
|
s_push_layer(out_s, channel_hdr, 8);
|
||||||
@ -529,7 +521,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
index = g_strlen(username);
|
index = g_strlen(username);
|
||||||
out_uint16_be(out_s, index);
|
out_uint16_be(out_s, index);
|
||||||
out_uint8a(out_s, username, index);
|
out_uint8a(out_s, username, index);
|
||||||
@@ -1494,6 +1495,14 @@
|
@@ -1817,6 +1818,14 @@ access_control(char *username, char *pas
|
||||||
index = g_strlen(password);
|
index = g_strlen(password);
|
||||||
out_uint16_be(out_s, index);
|
out_uint16_be(out_s, index);
|
||||||
out_uint8a(out_s, password, index);
|
out_uint8a(out_s, password, index);
|
||||||
@ -544,7 +536,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
s_mark_end(out_s);
|
s_mark_end(out_s);
|
||||||
s_pop_layer(out_s, channel_hdr);
|
s_pop_layer(out_s, channel_hdr);
|
||||||
out_uint32_be(out_s, 0); /* version */
|
out_uint32_be(out_s, 0); /* version */
|
||||||
@@ -1523,15 +1532,19 @@
|
@@ -1846,15 +1855,19 @@ access_control(char *username, char *pas
|
||||||
in_uint16_be(in_s, pAM_errorcode); /* this variable holds the PAM error code if the variable is >32 it is a "invented" code */
|
in_uint16_be(in_s, pAM_errorcode); /* this variable holds the PAM error code if the variable is >32 it is a "invented" code */
|
||||||
in_uint16_be(in_s, dummy);
|
in_uint16_be(in_s, dummy);
|
||||||
|
|
||||||
@ -568,7 +560,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -1849,7 +1862,7 @@
|
@@ -2172,7 +2185,7 @@ xrdp_mm_connect(struct xrdp_mm *self)
|
||||||
char port[8];
|
char port[8];
|
||||||
char chansrvport[256];
|
char chansrvport[256];
|
||||||
#ifndef USE_NOPAM
|
#ifndef USE_NOPAM
|
||||||
@ -577,7 +569,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
char pam_auth_sessionIP[256];
|
char pam_auth_sessionIP[256];
|
||||||
char pam_auth_password[256];
|
char pam_auth_password[256];
|
||||||
char pam_auth_username[256];
|
char pam_auth_username[256];
|
||||||
@@ -1889,7 +1902,7 @@
|
@@ -2212,7 +2225,7 @@ xrdp_mm_connect(struct xrdp_mm *self)
|
||||||
#ifndef USE_NOPAM
|
#ifndef USE_NOPAM
|
||||||
else if (g_strcasecmp(name, "pamusername") == 0)
|
else if (g_strcasecmp(name, "pamusername") == 0)
|
||||||
{
|
{
|
||||||
@ -586,7 +578,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
g_strncpy(pam_auth_username, value, 255);
|
g_strncpy(pam_auth_username, value, 255);
|
||||||
}
|
}
|
||||||
else if (g_strcasecmp(name, "pamsessionmng") == 0)
|
else if (g_strcasecmp(name, "pamsessionmng") == 0)
|
||||||
@@ -1917,45 +1930,56 @@
|
@@ -2240,45 +2253,56 @@ xrdp_mm_connect(struct xrdp_mm *self)
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef USE_NOPAM
|
#ifndef USE_NOPAM
|
||||||
@ -674,7 +666,7 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -2048,6 +2072,59 @@
|
@@ -2374,6 +2398,59 @@ xrdp_mm_connect(struct xrdp_mm *self)
|
||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -734,11 +726,11 @@ Index: b/xrdp/xrdp_mm.c
|
|||||||
/*****************************************************************************/
|
/*****************************************************************************/
|
||||||
int
|
int
|
||||||
xrdp_mm_get_wait_objs(struct xrdp_mm *self,
|
xrdp_mm_get_wait_objs(struct xrdp_mm *self,
|
||||||
Index: b/xrdp/xrdp_types.h
|
Index: xrdp-0.9.13.1/xrdp/xrdp_types.h
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/xrdp/xrdp_types.h 2017-07-19 12:23:49.000000000 +0800
|
--- xrdp-0.9.13.1.orig/xrdp/xrdp_types.h
|
||||||
+++ b/xrdp/xrdp_types.h 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/xrdp/xrdp_types.h
|
||||||
@@ -325,6 +325,7 @@
|
@@ -329,6 +329,7 @@ struct xrdp_wm
|
||||||
struct xrdp_cache* cache;
|
struct xrdp_cache* cache;
|
||||||
int palette[256];
|
int palette[256];
|
||||||
struct xrdp_bitmap* login_window;
|
struct xrdp_bitmap* login_window;
|
||||||
@ -746,11 +738,11 @@ Index: b/xrdp/xrdp_types.h
|
|||||||
/* generic colors */
|
/* generic colors */
|
||||||
int black;
|
int black;
|
||||||
int grey;
|
int grey;
|
||||||
Index: b/xrdp/xrdp_wm.c
|
Index: xrdp-0.9.13.1/xrdp/xrdp_wm.c
|
||||||
===================================================================
|
===================================================================
|
||||||
--- a/xrdp/xrdp_wm.c 2018-01-04 16:40:31.998709999 +0800
|
--- xrdp-0.9.13.1.orig/xrdp/xrdp_wm.c
|
||||||
+++ b/xrdp/xrdp_wm.c 2018-01-04 16:40:32.182893999 +0800
|
+++ xrdp-0.9.13.1/xrdp/xrdp_wm.c
|
||||||
@@ -1896,6 +1896,34 @@
|
@@ -1990,6 +1990,34 @@ xrdp_wm_login_mode_changed(struct xrdp_w
|
||||||
self->dragging = 0;
|
self->dragging = 0;
|
||||||
xrdp_wm_set_login_mode(self, 11);
|
xrdp_wm_set_login_mode(self, 11);
|
||||||
}
|
}
|
||||||
@ -785,7 +777,7 @@ Index: b/xrdp/xrdp_wm.c
|
|||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -1940,11 +1968,19 @@
|
@@ -2034,11 +2062,19 @@ xrdp_wm_log_wnd_notify(struct xrdp_bitma
|
||||||
xrdp_bitmap_invalidate(wm->screen, &rect);
|
xrdp_bitmap_invalidate(wm->screen, &rect);
|
||||||
|
|
||||||
/* if module is gone, reset the session when ok is clicked */
|
/* if module is gone, reset the session when ok is clicked */
|
||||||
@ -806,7 +798,7 @@ Index: b/xrdp/xrdp_wm.c
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -2006,6 +2042,9 @@
|
@@ -2100,6 +2136,9 @@ xrdp_wm_show_log(struct xrdp_wm *self)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
15
xrdp.changes
15
xrdp.changes
@ -1,3 +1,18 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jul 10 02:27:32 UTC 2020 - Yifan Jiang <yfjiang@suse.com>
|
||||||
|
|
||||||
|
- Update xrdp.keyring according to:
|
||||||
|
https://github.com/neutrinolabs/xrdp/issues/1627
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jul 2 07:07:16 UTC 2020 - Yifan Jiang <yfjiang@suse.com>
|
||||||
|
|
||||||
|
- Update to version 0.9.13.1
|
||||||
|
+ This is a security fix release that includes fixes for the
|
||||||
|
following local buffer overflow vulnerability (bsc#1173580):
|
||||||
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044
|
||||||
|
- Rebase xrdp-fate318398-change-expired-password.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Wed Jun 17 08:36:17 UTC 2020 - Dominique Leuenberger <dimstar@opensuse.org>
|
Wed Jun 17 08:36:17 UTC 2020 - Dominique Leuenberger <dimstar@opensuse.org>
|
||||||
|
|
||||||
|
204
xrdp.keyring
204
xrdp.keyring
@ -1,85 +1,125 @@
|
|||||||
pub 2048R/337B1F18 2016-09-19 [expires: 2018-09-19]
|
|
||||||
uid [ unknown] Idan Freiberg <speidy@gmail.com>
|
|
||||||
sub 2048R/F0F5E810 2016-09-19
|
|
||||||
|
|
||||||
pub 4096R/01BF10EB 2017-06-20 [expires: 2019-06-20]
|
|
||||||
uid [ unknown] Koichiro IWAO <meta@vmeta.jp>
|
|
||||||
sub 4096R/CCDE08AA 2017-06-20 [expires: 2019-06-20]
|
|
||||||
|
|
||||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||||
Version: GnuPG v2
|
|
||||||
|
|
||||||
mQENBFffatABCACyxGHiFciZU7ljj/vHgmuNOPzWKaVxvvhWnV9OZhg/CBcMqqIQ
|
mQINBFlIyz8BEADgClot1kNGKq9+Xe2lUrYGoCrfFINU040grerWZtXHH7kWK2Co
|
||||||
UPZyHG4mjWZ88TRgjHTP9rFgYPNa7Mdla4Up0nN0dYWfmlwNAXOzVILKuonn+XR/
|
Iubx+mTe/IgI7q2MvwujP7bSW5pp7zk0UvbNl64IWQIGTzLyTL2Mc9nFnsCA/tgz
|
||||||
pWv4H4ln0UywKDxHDw342F2Tqu7AkmqBE99woiHLdojhZfPGMt8w/9RjBqUXlWjF
|
I+XqnNAEnbOl6DSTsDDlqLRtXkdOiC+om1NiGCiTJ/QsWtCuIm59YgUacAYIQxnO
|
||||||
9oQIFd9R37uyjY54ADJv6gxUg1EelMnK33TEL8IfsK/f2mzS7KQLCu4HZtPyMNUa
|
H0A5vl148JxRJ7mcats9eZJlgGpvCRrPCOGFnsfZw/V6zhbW+uC9Ezf6KoQDHn0H
|
||||||
8n7irUYncrZTwu7/ouJ+v3w0i82Sw+Y4VnqYKkHjk5TwWmqq6EzSPUBtU3/wiUcj
|
wivqsIN6zZoo2tiZV9m9qv25i/vsQZmzW9IifSZaJT2xWb6k1g6FLFQMkfl1GiGV
|
||||||
xyxwednw9sI6TBOtlmMo1pFpWbX4oi0tJ4QZABEBAAG0IElkYW4gRnJlaWJlcmcg
|
XzSAsva/gnQctnE5neBWIBMx9uEeHK8N4woNZxd6boLgwH669NeLVpqQZotYdw31
|
||||||
PHNwZWlkeUBnbWFpbC5jb20+iQE/BBMBCAApAhsDBwsJCAcDAgEGFQgCCQoLBBYC
|
uAQ2gsF+yvRsLVa7t/BS0hKkUQbGMOy3JPM3SaRhd77KbCPetoI5S+cluJEhNYZ6
|
||||||
AwECHgECF4AFAlffbVcFCQPCpUAACgkQitMtBDN7HxhAWwf/YVDSawHMEPG/mMZP
|
QvYD7+O/Cth9SLZVrUEvZj9jaKWkFKB5uTV4FJ9AaXqgLWm4xANWz3d4UGbdabTH
|
||||||
xVVsrej/M6GitvxU1Fqan5pr5jTBsTz3zuJ8vi2lcPU07tSjixNbtYvXW5mK18BJ
|
FT5eitzb7Ua6zSrtRfpJdLUjlmi9UmwYkJR0glV6F19B83uT628NkPOr1+1JWNJY
|
||||||
9mYtrYnqXSQYoFG1lXPJaOxiv0hmGlQfkq9CJK0esGrmiq7gKBUDiGh7BDtURz7g
|
CrXR0WwCJ2IfgP5oZbKUm7vOxe/i477ZY+nx41Y6pT/nAzAbMQFtBawCMAWnUMgH
|
||||||
qqMuSWSGD6I4tV0qjh1D+4KnA1eYX8mtnKtxg0+gXub17/NNK4yNdIkD4gQ/oLYB
|
VUSuC8VB3A3MrvA1BSf+j58B77wdt5ftghHLrFBQX0L62+uCMot/zaK7cwARAQAB
|
||||||
P5FvvgaHhqWLJA4JcC+GwLT9BeavqreeK1QkcbMKosfCbNK+IwPisAtSwyAJ8AIt
|
tB1Lb2ljaGlybyBJV0FPIDxtZXRhQHZtZXRhLmpwPokCVwQTAQgAQQIbAwULCQgH
|
||||||
gT+q3LTr9ESt2eQkhtQhXV6l2BI9HkTYgImxMRBS8IeLV/kHK7IvFm4ZA50ICHpc
|
AgYVCAkKCwIEFgIDAQIeAQIXgAIZARYhBGHs6rvyu0Djo13zCp9yzbwBvxDrBQJd
|
||||||
3EINPbkBDQRX32rQAQgA0E+7rkf3U+cLyWJlGsC9+37cYliBgGjBglt+w95qDzyx
|
Ae40BQkLPfD1AAoJEJ9yzbwBvxDrSHcP/1XFoB82+MioWu0knmyhvXg/zL0T5GPb
|
||||||
Qs0lYeol4x+ApsgopyQWDqWlDhOc0UpqURz101nH7YvUyItFpg96lkc9xoilarXi
|
QaIilWGY+OgxoR1pmTKQtpmucfrbrSTuyUJlOnYR9AcfujRDRZuvOCk3VHpnWHsC
|
||||||
79zbRrEgtyLRIEjEOu84B3SYggVsGryMS1WMN52GAIXzNwZ07rWLVMY3gW3VOCby
|
R8f0diKemdLVtioKhCc65bD/NUzfxgjfexzZZEYQhXpbMrJw8yYCfFmC/wNKA7HS
|
||||||
erLjSWAo0nAbmU8KXPlzjQFsAwUaHeKS6EhY3ZFLlu6iJJG1Mu12vzOHhZ0NG2KP
|
zSH/xFiF9XV2MMFWrR5Whqkwq8L9EtzYQlMCxTHbsIsVi6BLYbv/IfNAQ55/2Tha
|
||||||
BhvURwibP9l5TJvqs6qqgaGR+bo1KXtB2NrgE9FXvlLcyNy/mUMeoooJtErC+ceh
|
XemJdf8qmBWPvFOtw1qWA4TTiTO6OsxEbmvLofPaBrVsyncoUsVXCFYhnbl6xoWn
|
||||||
rTuCisQmTN2k9/lhF/W5dpwV42nOEbx/Xj9ApQYUNwARAQABiQEfBBgBCAAJBQJX
|
VmgkQQEYEvEN1kZewv35nRptMX183myTh3WHRt0EZfDiwhMLGNpfLdEwQLJ1StHT
|
||||||
32rQAhsMAAoJEIrTLQQzex8YaF8H/1GLMz1vxCwfQN5f1qCKQIMXmPyxUxujjPX6
|
SmiMGtBYZfsOUKc+xtQSHWTEUrKf7eybNkG0/Ng/6nz3FEsWR3vFdJIxlpHNurkF
|
||||||
SaQ1AJ1n5hyXZQblA+rQpuSpXn4o7y2w4+Vytz6Z5sfF1lcX4WJPIaiskEzUKJu1
|
OAd9lq1DB6yhPOO8V5xCAqdjphAGLPggtq5wBWLUlEhVGcMUkGE7vOOfC5OKg9Hy
|
||||||
lP7Vqu3A1C9q8Qc2ixQrVwGHLC1kzJggYqn6UdYezYPYoDA0YlAEpVdPZ2ks8ERR
|
rJCU4bLIO4FUCNUq3pctnNM7Gypw1ghtsc8Jb/uPuMvF5FgK2vtOfbhU1UfClnG/
|
||||||
JpXlP/fvu3F8gR+1GeZCU77fncrpZhaxW9Qt189eHFKT1tVS0wkbg0Bfslx9SlPJ
|
k+YPWgGRRn77OzHZ0oYmZ+4DWqkCveW3/B7r2MPRr+uN52CZzp/GGtMUYqfBJxKE
|
||||||
zEWgPS2aqENxNOXl7ZLUyvfUp+yf1ZCBYJbWzXNfQkq5EBc3hvGTCwrxOn/HDGas
|
TO27T90fFaNM7Ve2JSif/vjzZbp+x0kFil8KSPRqC3Vuscl+GVO5kKQqqauND9ab
|
||||||
TCO7hF2ZpkgNUYyi1x9HW5CK4fO9jz6eg3iB7q1eXee6hQRnlHuZAg0EWUjLPwEQ
|
QQOnDtZMZVJPiQJXBBMBCABBAhsDBQsJCAcCBhUICQoLAgQWAgMBAh4BAheAAhkB
|
||||||
AOAKWi3WQ0Yqr35d7aVStgagKt8Ug1TTjSCt6tZm1ccfuRYrYKgi5vH6ZN78iAju
|
FiEEYezqu/K7QOOjXfMKn3LNvAG/EOsFAl1vGiMFCQfoteQACgkQn3LNvAG/EOsN
|
||||||
rYy/C6M/ttJbmmnvOTRS9s2XrghZAgZPMvJMvYxz2cWewID+2DMj5eqc0ASds6Xo
|
bxAAvf3/1tblREhPBAHwXjSOHuuAXGoted1Gb+v2uQzT0dDyhTOJ1I0GQz9HMyjl
|
||||||
NJOwMOWotG1eR06IL6ibU2IYKJMn9Cxa0K4ibn1iBRpwBghDGc4fQDm+XXjwnFEn
|
YZ0Ys5L3BKtpBkteWqlL4h4VL/w0ZNy7XwQIbtqQRdNIjx4i5EDj4kErnWcnOsXU
|
||||||
uZxq2z15kmWAam8JGs8I4YWex9nD9XrOFtb64L0TN/oqhAMefQfCK+qwg3rNmija
|
mZk2VsMV/ckAfmRNVofVNLaDrcsRRApFvZgPyryYgCGz8QoVOnW7GWRcX7a8lno7
|
||||||
2JlX2b2q/bmL++xBmbNb0iJ9JlolPbFZvqTWDoUsVAyR+XUaIZVfNICy9r+CdBy2
|
K+0nCctEAWcUGXuNruFhFEatj4MYH284xHHacl+IvVm9V2WdGmp+Wl6rxUqVkBUp
|
||||||
cTmd4FYgEzH24R4crw3jCg1nF3puguDAfrr014tWmpBmi1h3DfW4BDaCwX7K9Gwt
|
zT1+N5hrQ3lOtVxiyw9GjsxXR2pVSgqgC4MVG2spI8CsgQ8XUBGdPXpRducK5oCF
|
||||||
Vru38FLSEqRRBsYw7Lck8zdJpGF3vspsI962gjlL5yW4kSE1hnpC9gPv478K2H1I
|
B/i2SCq+o/GktgcUDdhn1WTWtrT0E7Xr9I3BGQRR4aiuP6/mP8gQtsXFCe0WlF1b
|
||||||
tlWtQS9mP2NopaQUoHm5NXgUn0BpeqAtabjEA1bPd3hQZt1ptMcVPl6K3NvtRrrN
|
q9S7Av97JZTV127cQn3EIav1Nyctu6kYBmM5jpiIC5xS/FGBYy9cOgVvWi/TXBbg
|
||||||
Ku1F+kl0tSOWaL1SbBiQlHSCVXoXX0Hze5Prbw2Q86vX7UlY0lgKtdHRbAInYh+A
|
eGuu3an2w7ECdsKlG+Q72C02CjBRAF1/g0PSo0CdBiHqSAPM676KGYvwAbTIABwS
|
||||||
/mhlspSbu87F7+Ljvtlj6fHjVjqlP+cDMBsxAW0FrAIwBadQyAdVRK4LxUHcDcyu
|
rg1QOpggYcImNX8d0nce13FwHMmqYhMWcmkY/w7bhGWlhtUcEoBNFOItuxFWvSwX
|
||||||
8DUFJ/6PnwHvvB23l+2CEcusUFBfQvrb64Iyi3/NortzABEBAAG0HUtvaWNoaXJv
|
El4D7Pq1aROSUMhxwQ4wguD9qhHstucojeUFLXh19Mo7p4z3Dc41e8sd083BALNB
|
||||||
IElXQU8gPG1ldGFAdm1ldGEuanA+iQJUBBMBCAA+FiEEYezqu/K7QOOjXfMKn3LN
|
GIf4WEHBSPXnVejCtTHDSsM0/rAJ3JDH4y3ChdsKsPmplzm0IEtvaWNoaXJvIEl3
|
||||||
vAG/EOsFAllIyz8CGwMFCQPCZwAFCwkIBwIGFQgJCgsCBBYCAwECHgECF4AACgkQ
|
YW8gPG1ldGFARnJlZUJTRC5vcmc+iQJUBBMBCAA+AhsDBQsJCAcCBhUKCQgLAgQW
|
||||||
n3LNvAG/EOvzaRAA2HIVDUtl4ieUsZ5kn7F4LlN2wxToLM4psHwBihst2eVdXKna
|
AgMBAh4BAheAFiEEYezqu/K7QOOjXfMKn3LNvAG/EOsFAl0B7jcFCQs98PUACgkQ
|
||||||
8gJ7jsPTaVfw7/WVT2rGToJ+erb/l25jvyaWrrTSkqGMBuNHh6z3JIw3kYKeWsLb
|
n3LNvAG/EOt0GBAA2o4uhB3x3WSt0qMpRdJDsPbnW0paQzMXzQ9Nxgq5YK3z+mXU
|
||||||
MfmSQjpZgkcxtgQjz5xmMaHpvx4+umynfFBh/o2Y3ej01wlt5euXl07SyWOp65Rd
|
EVqchxfVjM9F5HJI7uX8HHi2L6hBTRY72boKTXXhOqV3TRqzgwd2rl6nu89Q8PkV
|
||||||
X+XvvfU/mmTYy8UY/ecsQIC9Uai5az0LBP7/678Psbqb6GDORkoG8Xm6jBYTmAHk
|
yjPFZLFLEwIcyBpr2KfrFt1kdZeAxeeX7VsHn2N5fhMs6BYwNai2SKSXjMpWjeFW
|
||||||
nuSZ7nRR1gtFRm+caFUrxwTNWbGsggp9KL96TYFpbvku4fdSqVNFaYwh0+XFaLVp
|
CA3yGnJjEulfZ6H+J48xaO53QIZYmIqEf6xyKfC/Pu+Vhiw+RKhwM1CUUvSGF4P0
|
||||||
ZTveX+j8r9iS8F9TCvgIN9RydR91aJOMKdUYLGapRU8/WE3wwMKN0iML1kGDyjC3
|
XDJZC5XTcKy6IOTTLxXgKnMhUiCTfpl89PVzAZgs2OkrjmCqTQFevRmSnuFW1Oyu
|
||||||
79GiO3CXwZKFiWjf65vdhSvRo5Jo8jN20ECOWKgiciVCswwTvIlEogv9qVZUYMB0
|
aUj1MON/qaMHjMfaQlsWaDltrmWPD/KlM6ogN75yXpC0PgoZn9CvgJzaadOsuegm
|
||||||
P8pEHiMOKE6EQcmVtG/Cj2Ae9fqyh8hj/p7TSHQhAG9mFxIDintZfjQxwKHcuhV4
|
m3I4uo51fOgSqmVuTpeHuc0xlMl/MXbDrCylH/ti+LeMtaI2ZV4E06cahyawDtpu
|
||||||
nRwmkr0pV6BKxsgn0NFax9S+Ex+bEHhnaVpPgAxGCLnIkJyRAGM3Yih0PCK17ZXh
|
n4bbucObLKwUWEhHHfFTbeDDEYKaYvsWfKNBKf0ojEpn3osDy9eL3jBCucff6QW1
|
||||||
2EOqqCMN02g+U7MxHolljtKOBc/20eaQZjzNAr2bCnyAI0VsjX/b5BRTypMJuFib
|
SyeRabavvWn8LynBqlpPogvEcyeEoIhHsBLkkjPR+wyrcRT8knCtuwf6x5Pw5k1e
|
||||||
s3FI+ewnUsI9L5GFcopYWynI1jxtAO+uueETSArK4aqwYYqYMJC5aKg32RO5Ag0E
|
6OmjHHAD7BLdHU4uTSmTYZ/bx+EHi9WbgS2jqiZHuGZoIfuT+qdSnvMwOabxTHA2
|
||||||
WUjLPwEQAKZwKHT2gTcV/U2C+C0Qtmd6oSl5Kvnt9dcRBZLLOu+0gmxK1e3zX/4k
|
GX4j7aEpPl8ccdSGueCtOXocnsa+JV0Rb5w5Y9vb/5GvFu7Z5ItGkQkWpySJAlQE
|
||||||
SMt4xxk0Ocwhob7BJs891M+9h0+5hw532cwfWTKrgy5010hs17unoW5UR5fKuSDw
|
EwEIAD4CGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AWIQRh7Oq78rtA46Nd8wqf
|
||||||
wXKW4o1GjQcCYpyH07luKHuKL2o5Co8Iir3XQKT07ow67setsiaVGzAoLYuyZ3xi
|
cs28Ab8Q6wUCXW8aJgUJB+i15AAKCRCfcs28Ab8Q63rvEACMVIDmN68onoYy5fPR
|
||||||
cegq/fh8lJ1NAQ31SMAgabiVtx2j8us/Tv+5uT6X07MFASFkLUqOR8RHqkNnTgPZ
|
XKfzkLazBNuEgHIZX3svckhONNdde+3qGgO+xmUWK1K3Iu4JarKoJFAGgp3JjXFp
|
||||||
zJJS4AeHM3LJZxcZ1fxekK+irbu2qtXQryzj4vm4XfAjBuKQUAhW+PVfGNlu+V6D
|
RvltO3VRtN/NhHAYXaBkEsnIBvks3XAg9REdrGGlxzZJ7QCEKljdbWPwnFBb7zNS
|
||||||
7qpChcMZy3Qk/XIIBKhFjSROStlJ0lpJg1EXXiAeIi9EhGNw5VFE+037zB5GwYRA
|
EPkb1Xk7CNeZmlTgtXxGG9CTpS07WUM/swa5PZG7kWpxOWk5u8HMItS8PekWHWtH
|
||||||
lWaG/hpWSl43qyPGK5pH6EJQ0gHZ+//hWt25RgQqaIi8v8X7ChFLATGzzvLmbwO/
|
ExXTnMvjZwvxHX4feKOFbrungJdyZnRr880Xc8i3ZWKoHNIO3nF2s+gT0yq+gppJ
|
||||||
3nhBcjDXQO8FGjhW2MVLl2LA/PQYESaPKu5JujxrFEizX8kj5BGPubR4ueDxlPxd
|
nbuREf8BJbzOkNdup3rzNI/OJpkA54537xJYVeGt4dPokopRMy6bWQDJPzbCL2Ar
|
||||||
Xpd1eKVrWtQ7b42KAjD5Pa8ChKxYALHfk7J352cV1ycOnWzbhZECC+W+fDzPJqPm
|
g02sYkcTOYwpEjudN2luXZN2FaZslvhR1goz98lr7ucvBWF2ce5Izggie5OAe1Dw
|
||||||
7DBby4wD8c4BHscgacyAcwgVpYJ/tc3aAy0ptN3V8m6jAeaEYgRRvxbgUOmMQukM
|
eO9UlXf5UTEGySW9wmfC70/tUZi2UCtRrGidRTNqWsQVAq5VBQLLkJPu6eadg1OB
|
||||||
SN76GSav5IJVw1NG4rkFJFKkbJKqqNTAFadXBPpsXgwK0L+oDaVZABEBAAGJAjwE
|
FMawjLVrrs4o63AQSWHPlW4h1YrWttyqZGU2Hawew96GzJKZYciHXXlHTAwYUfrG
|
||||||
GAEIACYWIQRh7Oq78rtA46Nd8wqfcs28Ab8Q6wUCWUjLPwIbDAUJA8JnAAAKCRCf
|
2fKxM9DhcE3SHRsErVhaJaPk1T0ikz9JgLgjtepfxMqabbuxXzv9s9xegOzQST0s
|
||||||
cs28Ab8Q68NbEADXdfommHmQVmN7mmRLDNHeOmfllC3x8RVA5R5VM/MJcYgz5DWJ
|
ugOQlO6ZlrOSdUJQLim83g74gm+d5sffFPq5A+YCdaqJ3dsMw5nO1j3cY67vwLKq
|
||||||
s6madRCOu2Fncu9px+5RR+uOyq+XR6V111Nqg6yuGdwtADNRKrE4NI34TJrfBCGh
|
P1WF/FiEYwmcW7OFnf+VOs8J2LkCDQRZSMs/ARAApnAodPaBNxX9TYL4LRC2Z3qh
|
||||||
+tldAcbHefdHyk9VLPb0Cro856aLDUuc4i+DDfC3K3g0SUQ7AY9K/3sEc1dJiWYJ
|
KXkq+e311xEFkss677SCbErV7fNf/iRIy3jHGTQ5zCGhvsEmzz3Uz72HT7mHDnfZ
|
||||||
bdjZPXSKkSpETe4Geuptr3Dyy5Wfr+hsByT19a7Rtwpg+6+zqPs7DLJHGJ8ep7eK
|
zB9ZMquDLnTXSGzXu6ehblRHl8q5IPDBcpbijUaNBwJinIfTuW4oe4ovajkKjwiK
|
||||||
ainl2SU7WTBAOJGAaY600XLqRSFBGY85fck9O4JWlnhv+TlOm1EEZ+FWtpYzh74V
|
vddApPTujDrux62yJpUbMCgti7JnfGJx6Cr9+HyUnU0BDfVIwCBpuJW3HaPy6z9O
|
||||||
7UDMBVmZLwTRy9XnKVN6ag935nNWYTFfjO7by+CtIGpxSKdZYuGh3z8ALMZmRMgw
|
/7m5PpfTswUBIWQtSo5HxEeqQ2dOA9nMklLgB4czcslnFxnV/F6Qr6Ktu7aq1dCv
|
||||||
Xf+8zc1UzJaQGLNOHTSYFclO72PtmPBPkP9TmarcidgVGTRc4z1PAymE7YB22sBa
|
LOPi+bhd8CMG4pBQCFb49V8Y2W75XoPuqkKFwxnLdCT9cggEqEWNJE5K2UnSWkmD
|
||||||
4pb+2QX1qBjID1ahiXHJhH3jzoQTiqvtFhtx0pgPT1TtDhAtO1+oLMrqL1+X5ziw
|
URdeIB4iL0SEY3DlUUT7TfvMHkbBhECVZob+GlZKXjerI8YrmkfoQlDSAdn7/+Fa
|
||||||
XGdUVBFkfzT0Lkyg7fVVlNwmnhHt850YYm/8IbQiTvzEvu0Am9vh1AA0tv1trEoI
|
3blGBCpoiLy/xfsKEUsBMbPO8uZvA7/eeEFyMNdA7wUaOFbYxUuXYsD89BgRJo8q
|
||||||
fZOb67+7B0+WiwPg3M9TEDzX5x2G5TbZSNPyCg7QoyxZGEOHEqWXhgTqA1rZ69vf
|
7km6PGsUSLNfySPkEY+5tHi54PGU/F1el3V4pWta1DtvjYoCMPk9rwKErFgAsd+T
|
||||||
P4D/4BJaZUH6GdJR/cboPMxL8Xa7zyrgvKeLwNKLPC+lREwNpMjUrNz4vQ==
|
snfnZxXXJw6dbNuFkQIL5b58PM8mo+bsMFvLjAPxzgEexyBpzIBzCBWlgn+1zdoD
|
||||||
=IksA
|
LSm03dXybqMB5oRiBFG/FuBQ6YxC6QxI3voZJq/kglXDU0biuQUkUqRskqqo1MAV
|
||||||
|
p1cE+mxeDArQv6gNpVkAEQEAAYkCPAQYAQgAJgIbDBYhBGHs6rvyu0Djo13zCp9y
|
||||||
|
zbwBvxDrBQJdAe7QBQkLPfGRAAoJEJ9yzbwBvxDrzfIQAJhSO0gX1WSzWFrc+O/b
|
||||||
|
weMBico26c2FwV+T/7paObZNnv2hfaslWmclEpZrnwlzFHegtbIyOZ6lc11/pI/j
|
||||||
|
P0A6fIv6UsQgTKHJHZMQNZQJkqfdVzekUNXJaWlk/9RUq9Ozptb+Sc7WY91AU2+E
|
||||||
|
9ji4BRA0DE3DS+RX+iEZsvnWTrSyTW5CDRhxN2nyxg8oTMTuHz1lQim/1yUqZCRD
|
||||||
|
lpIPd9eapX1Rqfe3Y8tjvjefbH+05n3/B/Z0NozCPYhtl/Mx5bHZC3a0azQHTT4I
|
||||||
|
+J4ET0t1fIa+w6K5PQxlflplJvrnr6T5P4GSHjycDWEH/3Ushr9OYsKIN+b+q9AX
|
||||||
|
WdMtSBazK7Mhw+B+LcpDiQKoSxb1lXvEV3fqE1YMRIq3QgCtwLiMQb9mJAPQe3RI
|
||||||
|
QOB1INDcvhT+9QspCs275zjnnAvZPcEpFX5bbA6RAr/dnbh2hND5QyyMqTKWK206
|
||||||
|
KyP1gPSJ28pj/VsG97ty4+peoxY+QVFZCYyFjojwooAZZ7s64xG4ZIRr1IQc4RBS
|
||||||
|
ZhiHebVMr/IJDliRFrYma5ziG9lKbFBYJJuxOUSTsjHMcYxu8rkjvagcSYeWbitg
|
||||||
|
56dZhVO8cgy3kMhWYW89dYdIxlm2ULctg1SivX9ODaDdGFUa6Mrs+vzZ7IPAF1iM
|
||||||
|
9ZPAG95yLVXnvBPPnV1peEjwuQINBF7btjQBEAC0tVCy/QjP1Re4Baptnyvx89Ou
|
||||||
|
18ncQAEHZKxL5ay9CKbdJkaBIDF9bXPWCXUe+9gLF/e+P1+kmiX/L0Cjysm3Fzgl
|
||||||
|
A3OkVDGCz+Cusok9YeVk6Oxxf48deHqAfMG682SGFCRB13caP9sn148EsPFL9v78
|
||||||
|
g1TG/sNjzpTkgmPrbpAtgYcDsgiKOnyHUvLvHPKLEvfqw5/CxfQ2FuOk/1jKCT8s
|
||||||
|
L5oGmgBQkGdNpBcE89uuhXRvSUcPRI5RLRok9Oy7AH57a+ihLho5DPHKii5LbiSX
|
||||||
|
BYPHckqIMJUZMXstV4ZHODJN1fuw2Lwf5F6zeWRigvl272kfHpxxDuSkASbmS/3H
|
||||||
|
gJauvkWbjSVFthsL9PuDtsu5Ho2QSYpeA3f/rC7jOvpo9+Vx0MMpcCcGHXw5ael5
|
||||||
|
noyARJf2kbwOzReF2sOkhZkvvVj6OUiniN7tcProbwZUrVXmTEljEZefxiwM6tuy
|
||||||
|
n/hr0kLA1RPw/Ks/V9bRK5X2ty/t2IXJ9jNIQ8x7EoccanHmIoo8UfHxsp7L2CDP
|
||||||
|
g2vvFVW+6hijif4Xy+ZfMPpT4OJFFDnDiXW4Fp3lzKXDb2g5RkIEW//OxdXAFM8R
|
||||||
|
frZiIgMADuwrh+J0jm45L+uJhPuZuXPLRJJFdycKMApboTkq14jzUv1AxpX9oJj3
|
||||||
|
wRjjOupXjLi++DFdbwARAQABiQRyBBgBCAAmFiEEYezqu/K7QOOjXfMKn3LNvAG/
|
||||||
|
EOsFAl7btjQCGwIFCQHhM4ACQAkQn3LNvAG/EOvBdCAEGQEIAB0WIQQYq4OKkHFn
|
||||||
|
dFkUhxkDmTtAZecZOwUCXtu2NAAKCRADmTtAZecZO0bCD/9Re18ai5PdJwj7knI9
|
||||||
|
mXhW6c4n8GvyosbIJbY7tr81ULdzb0etgo5CdAx/D2rOg5VhNW6FsshE7kwXBqM2
|
||||||
|
skcgdqjCt7ibNOf/bRo357/M45tmq6vNjnkZj90T7nnISRuOV/v6fYUsQIwRFMqp
|
||||||
|
/pJbF86C8T45Z6PuhbaWKaSYIL0Jva/dg9TCodhqJE13yqRIM3gKUTkaVU8vOD5T
|
||||||
|
hQz++FQenOshR4/SJ+B+dFMP17E+xxEf61Tjz4u5GS2k1mBujqvUpwsBZkyH7xGI
|
||||||
|
UP02w/NtaGivtw7TlL7a7B1GESTmGn/Vtnx+vai4cHT5jcHSEjf7Dw94C7AtSJlp
|
||||||
|
iuuy698vlGW/GBWQ8KlaqVh9NGFWL6l1BinwK1/wT3seyxL7ABJKuXZQfMArxagy
|
||||||
|
8RWYUQsdYzQSUwQ+sAYSl6mpNaGMoaQLtzHSLhucH4ftIAKmPUmP5d0dedm8S7yt
|
||||||
|
xG7yHw8sIJh07kqN6ot+Ac6CVINK1q+buHf8uvWT5HF1wnglXa4q+NVnub/fYG5X
|
||||||
|
/NTOW2mSrZ05QPDmSUcYkKDCg63w0ntnJ7htGyqJRdeIYvd6OyGPoa5ZPORn1cMy
|
||||||
|
a/fN8RdVNc5YTogIrLA8+eppB+x3cV6XI66hCsq2gvIH+TbkTlcQW1uz5XlH+PGP
|
||||||
|
ucsL1rFnpyjPXMcAIKM/755KXMuZD/9RnuB85f4Yg5p/OpHPvf0pA626VPALvMAR
|
||||||
|
hM4jXbpOmk8hwX7J9BgV5T0bYZOpcMkpvFYFQPgGLfDgwGJJcse7Pgs11bnC4v6Z
|
||||||
|
AWainOa3aNQI+utK45Vy4/U/4hZhECfXMImaCJLQHzzVDLRD3oXmXjFYiUe00Ep6
|
||||||
|
HYmZdrThIiVWNEFo8SmnXl1pCXtF7VHFQOey+QDSBzr43dgPWHtp/1mwfWaeqIls
|
||||||
|
tGYhqSY1Ech5VLE8JP/hlBw9PRCjqfxUZd3IvMryEb4NVAPXQcmBozk9680rR6gE
|
||||||
|
On4sVdvzrRRUmXgDfty6Jyd0anCmD2uhirNGPiDh3oXQPQjIwEZUiY2ixrc/rEuO
|
||||||
|
CUwHpYGH2o/5oIn2T59e27F4LpMmOvP0lIg8IqVvOz2ZcZ/YiuSX56Fmg7FoPcV8
|
||||||
|
s6airXAYoJTdsxaLcx0IzggUbVQAqM58zgyTdc8dMO+5QDKyLJFsvqwX02dP/NVy
|
||||||
|
M83kGqVMPSvHHLVnduFkz8ihHsiNBDI0vS92c7kH1byz6AyLgmjMqO8i0qD1AT1G
|
||||||
|
BKg1AAcWFau3OerHShVkZWOH4jArdXABNHiuvklHa3CZpDj737eyffb21JCagMu9
|
||||||
|
yTXD7Z/Jr07R7ML4P2UWiMB6OppDOgpz2SAlU+0rUXsCPhRTGSkaQkrMbj2ZCe2j
|
||||||
|
AsS4Zp5tGw==
|
||||||
|
=Gas0
|
||||||
-----END PGP PUBLIC KEY BLOCK-----
|
-----END PGP PUBLIC KEY BLOCK-----
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
Name: xrdp
|
Name: xrdp
|
||||||
Version: 0.9.13
|
Version: 0.9.13.1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Remote desktop protocol (RDP) server
|
Summary: Remote desktop protocol (RDP) server
|
||||||
License: Apache-2.0 AND GPL-2.0-or-later
|
License: Apache-2.0 AND GPL-2.0-or-later
|
||||||
|
Loading…
x
Reference in New Issue
Block a user