[Spice-devel] aSPICE/Opaque can now record audio

2014-03-12 Thread i iordanov
Hey guys, Following a suggestion by a developer, in order to enable audio recording on Android, I changed spice-gstaudio.c from: gchar *pipeline = g_strdup_printf("autoaudiosrc name=audiosrc ! queue ! audioconvert ! audioresample ! " "appsink caps=\"%s\

Re: [Spice-devel] [PATCH 8/9] Ask for unencrypted tickets if client supports it

2014-03-12 Thread Marc-André Lureau
- Original Message - > When the client advertises support for unencrypted tickets, the server > can instruct it it should send one. For now, this is restricted to > encrypted channels as we don't want to expose an unencrypted password over > a non-TLS channel. > Clients with unencrypted p

Re: [Spice-devel] [PATCH 7/9] Rename some TicketInfo fields

2014-03-12 Thread Marc-André Lureau
- Original Message - > Now that TicketInfo can contain a plain text ticket, having rsa_ or > encrypted_ as prefix to most members is not correct. > --- > server/reds-private.h | 9 ++--- > server/reds.c | 11 ++- > 2 files changed, 12 insertions(+), 8 deletions(-) >

Re: [Spice-devel] [PATCH 6/9] Add TicketInfo::encryption_type

2014-03-12 Thread Marc-André Lureau
ack - Original Message - > In preparation to encrypt the SPICE ticket with either RSA or as plain text > ticket, it's useful to know which one is expected in TicketInfo. > --- > server/reds-private.h | 1 + > server/reds.c | 3 ++- > 2 files changed, 3 insertions(+), 1 deletion(-)

Re: [Spice-devel] [PATCH 5/9] Add support for SpiceLinkReply::ticket_encryption

2014-03-12 Thread Marc-André Lureau
- Original Message - > Currently, SPICE tickets sent to the server are encrypted using a 1024 bit > public RSA key provided by the server. This key type/size is unfortunately > set in stone in the SPICE protocol as part of the SpiceLinkReply message, > and the key is sent by the server ea

Re: [Spice-devel] [PATCH 4/9] Move ticket decryption to helper function

2014-03-12 Thread Marc-André Lureau
ack - Original Message - > --- > server/reds.c | 23 +-- > 1 file changed, 17 insertions(+), 6 deletions(-) > > diff --git a/server/reds.c b/server/reds.c > index 19a3298..f45092b 100644 > --- a/server/reds.c > +++ b/server/reds.c > @@ -1843,15 +1843,11 @@ static void

Re: [Spice-devel] [PATCH 3/9] Move RSA key generation for ticket to a helper function

2014-03-12 Thread Marc-André Lureau
- Original Message - > --- > server/reds.c | 68 > +++ > 1 file changed, 41 insertions(+), 27 deletions(-) > > diff --git a/server/reds.c b/server/reds.c > index 1e169ad..19a3298 100644 > --- a/server/reds.c > +++ b/server/reds.c

Re: [Spice-devel] [PATCH 2/9] Introduce test_link_capability()

2014-03-12 Thread Marc-André Lureau
ack, Although my gusts tell me it's better to compose the test_capability() call with a new link_info_get_caps(), for 2 reasons: - use prefix by class/struct name - a get_caps() would nicely abstract that ugly caps= line. - Original Message - > This just hides a bit of pointer arithmet

Re: [Spice-devel] [PATCH 1/9] Fix test_capability() typo

2014-03-12 Thread Marc-André Lureau
ack, you could commit right away - Original Message - > It was spelt 'capabilty' > --- > server/red_channel.c | 14 +++--- > server/red_channel.h | 2 +- > server/reds.c| 4 ++-- > 3 files changed, 10 insertions(+), 10 deletions(-) > > diff --git a/server/red_channel.c

Re: [Spice-devel] [spice-protocol PATCH] Add SpiceLinkReply::ticket_encryption

2014-03-12 Thread Marc-André Lureau
- Original Message - > Currently, SPICE tickets sent to the server are encrypted using a 1024 bit > public RSA key provided by the server. This key type/size is unfortunately > set in stone in the SPICE protocol as part of the SpiceLinkReply message, > and the key is sent by the server ea

Re: [Spice-devel] [PATCH 8/9] Ask for unencrypted tickets if client supports it

2014-03-12 Thread Dietmar Maurer
>support for unencrypted tickets, the server can > instruct it it should send one. For now, this is restricted to encrypted > channels as > we don't want to expose an unencrypted password over a non-TLS channel. > Clients with unencrypted password support won't send these just yet as the > server

[Spice-devel] [PATCH 4/9] Move ticket decryption to helper function

2014-03-12 Thread Christophe Fergeau
--- server/reds.c | 23 +-- 1 file changed, 17 insertions(+), 6 deletions(-) diff --git a/server/reds.c b/server/reds.c index 19a3298..f45092b 100644 --- a/server/reds.c +++ b/server/reds.c @@ -1843,15 +1843,11 @@ static void reds_handle_link(RedLinkInfo *link) } } -st

[Spice-devel] [PATCH 7/9] Rename some TicketInfo fields

2014-03-12 Thread Christophe Fergeau
Now that TicketInfo can contain a plain text ticket, having rsa_ or encrypted_ as prefix to most members is not correct. --- server/reds-private.h | 9 ++--- server/reds.c | 11 ++- 2 files changed, 12 insertions(+), 8 deletions(-) diff --git a/server/reds-private.h b/server/

[Spice-devel] [PATCH 1/9] Fix test_capability() typo

2014-03-12 Thread Christophe Fergeau
It was spelt 'capabilty' --- server/red_channel.c | 14 +++--- server/red_channel.h | 2 +- server/reds.c| 4 ++-- 3 files changed, 10 insertions(+), 10 deletions(-) diff --git a/server/red_channel.c b/server/red_channel.c index b81deeb..4f85365 100644 --- a/server/red_channel.c

[Spice-devel] [PATCH 3/9] Move RSA key generation for ticket to a helper function

2014-03-12 Thread Christophe Fergeau
--- server/reds.c | 68 +++ 1 file changed, 41 insertions(+), 27 deletions(-) diff --git a/server/reds.c b/server/reds.c index 1e169ad..19a3298 100644 --- a/server/reds.c +++ b/server/reds.c @@ -1327,6 +1327,46 @@ static void reds_channel_in

[Spice-devel] [PATCH 8/9] Ask for unencrypted tickets if client supports it

2014-03-12 Thread Christophe Fergeau
When the client advertises support for unencrypted tickets, the server can instruct it it should send one. For now, this is restricted to encrypted channels as we don't want to expose an unencrypted password over a non-TLS channel. Clients with unencrypted password support won't send these just yet

[Spice-devel] [PATCH 0/9] Fix use of SPICE when fips mode is enabled

2014-03-12 Thread Christophe Fergeau
FIPS is some US-government security thing, which among other things cause the 1024 bit RSA encryption SPICE tries to use for its password not to work. This series is an attempt at solving this issue by allowing to encrypt the password using different methods. This series only adds a 'plain text' pa

[Spice-devel] [PATCH 9/9] Handle unencrypted tickets from clients

2014-03-12 Thread Christophe Fergeau
This commit adds the needed caps to let clients know the server can handle unencrypted tickets, and it adds support for receiving such tickets from clients. --- server/reds.c | 42 +- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/server/red

[Spice-devel] [PATCH 5/9] Add support for SpiceLinkReply::ticket_encryption

2014-03-12 Thread Christophe Fergeau
Currently, SPICE tickets sent to the server are encrypted using a 1024 bit public RSA key provided by the server. This key type/size is unfortunately set in stone in the SPICE protocol as part of the SpiceLinkReply message, and the key is sent by the server early in the link process (before the ser

[Spice-devel] [PATCH 2/9] Introduce test_link_capability()

2014-03-12 Thread Christophe Fergeau
This just hides a bit of pointer arithmetic away from reds_send_link_ack. This helper will be used in the next commits. --- server/reds.c | 14 +++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/server/reds.c b/server/reds.c index 0a28032..1e169ad 100644 --- a/server/red

[Spice-devel] [PATCH 6/9] Add TicketInfo::encryption_type

2014-03-12 Thread Christophe Fergeau
In preparation to encrypt the SPICE ticket with either RSA or as plain text ticket, it's useful to know which one is expected in TicketInfo. --- server/reds-private.h | 1 + server/reds.c | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/server/reds-private.h b/server/

[Spice-devel] [spice-protocol PATCH] Add SpiceLinkReply::ticket_encryption

2014-03-12 Thread Christophe Fergeau
Currently, SPICE tickets sent to the server are encrypted using a 1024 bit public RSA key provided by the server. This key type/size is unfortunately set in stone in the SPICE protocol as part of the SpiceLinkReply message, and the key is sent by the server early in the link process (before the ser

Re: [Spice-devel] [PATCH] migration: Don't assert() if MIGRATE_DATA comes before attaching the agent

2014-03-12 Thread Marc-André Lureau
On Wed, Mar 12, 2014 at 3:37 PM, Christophe Fergeau wrote: > Does this address your concerns? thanks, I would prefer someone else to review this patch, though... Alon? -- Marc-André Lureau ___ Spice-devel mailing list Spice-devel@lists.freedesktop.or

Re: [Spice-devel] [PATCH] migration: Don't assert() if MIGRATE_DATA comes before attaching the agent

2014-03-12 Thread Christophe Fergeau
Ping ? Does this address your concerns? On Tue, Feb 25, 2014 at 04:14:55PM +0100, Christophe Fergeau wrote: > Hey, > > On Mon, Feb 24, 2014 at 08:26:34PM +0100, Marc-André Lureau wrote: > > On Mon, Feb 24, 2014 at 6:44 PM, Christophe Fergeau > > wrote: > > > During seamless migration, after swi

Re: [Spice-devel] [spice-gtk] Fix TLS connections when both TLS/non-TLS port are given

2014-03-12 Thread Christophe Fergeau
On Wed, Mar 12, 2014 at 02:35:05PM +0100, Marc-André Lureau wrote: > > Regardless of that, refusing to connect when the client got passed TLS and > > non-TLS port if the server is not listening on a non-TLS port is a change > > of behaviour with earlier versions. And I would not be surprised this >

Re: [Spice-devel] [spice-gtk] Fix TLS connections when both TLS/non-TLS port are given

2014-03-12 Thread Marc-André Lureau
On Wed, Mar 12, 2014 at 2:30 PM, Christophe Fergeau wrote: > On Wed, Mar 12, 2014 at 02:18:04PM +0100, Marc-André Lureau wrote: >> On Wed, Mar 12, 2014 at 2:15 PM, Christophe Fergeau >> wrote: >> > On Tue, Mar 11, 2014 at 07:12:56PM +0100, Marc-André Lureau wrote: >> >> On Tue, Mar 11, 2014 at 6

Re: [Spice-devel] [spice-gtk] Fix TLS connections when both TLS/non-TLS port are given

2014-03-12 Thread Christophe Fergeau
On Wed, Mar 12, 2014 at 02:18:04PM +0100, Marc-André Lureau wrote: > On Wed, Mar 12, 2014 at 2:15 PM, Christophe Fergeau > wrote: > > On Tue, Mar 11, 2014 at 07:12:56PM +0100, Marc-André Lureau wrote: > >> On Tue, Mar 11, 2014 at 6:03 PM, Christophe Fergeau > >> wrote: > >> > When qemu only acc

[Spice-devel] [PATCH v2] Check RSA_generate_key_ex return value

2014-03-12 Thread Christophe Fergeau
This can fail in fips mode for example. If we ignore the failure, we'll get a crash: #0 0x7f38d63728a0 in BN_num_bits () from /lib64/libcrypto.so.10 #1 0x7f38d639661d in RSA_size () from /lib64/libcrypto.so.10 #2 0x7f38d7991762 in reds_handle_read_link_done () from /lib64/libspi

Re: [Spice-devel] [spice-gtk] Fix TLS connections when both TLS/non-TLS port are given

2014-03-12 Thread Marc-André Lureau
On Wed, Mar 12, 2014 at 2:15 PM, Christophe Fergeau wrote: > On Tue, Mar 11, 2014 at 07:12:56PM +0100, Marc-André Lureau wrote: >> On Tue, Mar 11, 2014 at 6:03 PM, Christophe Fergeau >> wrote: >> > When qemu only accepts TLS connections, but spice-gtk is given an URI with >> > both port and tls-

Re: [Spice-devel] [spice-gtk] Fix TLS connections when both TLS/non-TLS port are given

2014-03-12 Thread Christophe Fergeau
On Tue, Mar 11, 2014 at 07:12:56PM +0100, Marc-André Lureau wrote: > On Tue, Mar 11, 2014 at 6:03 PM, Christophe Fergeau > wrote: > > When qemu only accepts TLS connections, but spice-gtk is given an URI with > > both port and tls-port specified, spice_session_channel_open_host() is > > first att

Re: [Spice-devel] Question on Windows

2014-03-12 Thread Marc-André Lureau
Hi - Original Message - > Support, > The Linux magazine article mentioned your product. Normally when I need a > remote desktop, we use mstsc.exe. We have VPN connections that then allow > the mstsc connection. I was on your download page and I would like to know > for a Windows7 workstati

Re: [Spice-devel] Guest clipboard is not available.

2014-03-12 Thread bitozoid
FTR. On Mon, Mar 10, 2014 at 1:08 PM, Marc-André Lureau wrote: > > - Original Message - >> On Mon, Mar 10, 2014 at 11:44 AM, Marc-André Lureau >> wrote: >> > - Original Message - >> >> I have a Windows7 guest with KVM/Qemu on a Gentoo host with i3 window >> >> manager. I have ins

[Spice-devel] Question on Windows

2014-03-12 Thread Robert Willemin
Support, The Linux magazine article mentioned your product. Normally when I need a remote desktop, we use mstsc.exe. We have VPN connections that then allow the mstsc connection. I was on your download page and I would like to know for a Windows7 workstation on both ends, which downloads wou