Re: [Spice-devel] spice protocol 11.5 encrypted password

2021-09-19 Thread Frediano Ziglio
Hi, nice! Anyway, the password protocol is pretty simple I would say. No password or empty are the same (so 0 bytes). You take the password and encrypt (without the NUL terminator) using given padding, algorithm and key. Technically you don't need a length due to the padding. Regards, Fredian

Re: [Spice-devel] spice protocol 11.5 encrypted password

2021-09-10 Thread Andrey Af
Hi, About 11.5 - it is a section in the documentation (spice protocol). I am trying to implement the server part on my project (LinuxTerminalService ), https://github.com/AndreyBarmaley/linux-terminal-service-manager I already have a working vnc and rdp protocols implemented, and I'm going to add

Re: [Spice-devel] spice protocol 11.5 encrypted password

2021-09-10 Thread Frediano Ziglio
Hi, there's no protocol 11.5. There's no data length markeR, password is zero terminated and encrypted, if you refer to the default password schema (no SASL). Can you explain what you are trying to do? Regards, Frediano Il giorno ven 10 set 2021 alle ore 06:51 Andrey Af ha scritto: > Hi, >

[Spice-devel] spice protocol 11.5 encrypted password

2021-09-09 Thread Andrey Af
Hi, For encrypted password, there is definitely no data length market? For example, I don't need a password, authentication is verified by another part of the code, how can I skip this?