Hi, nice! Anyway, the password protocol is pretty simple I would say. No password or empty are the same (so 0 bytes). You take the password and encrypt (without the NUL terminator) using given padding, algorithm and key. Technically you don't need a length due to the padding.
Regards, Frediano Il giorno ven 10 set 2021 alle ore 12:30 Andrey Af <public.irku...@gmail.com> ha scritto: > Hi, > About 11.5 - it is a section in the documentation (spice protocol). > I am trying to implement the server part on my project > (LinuxTerminalService ), > https://github.com/AndreyBarmaley/linux-terminal-service-manager > > I already have a working vnc and rdp protocols implemented, and I'm > going to add spice protocol.. > > 2021-09-10 10:06 GMT, Frediano Ziglio <fredd...@gmail.com>: > > Hi, > > there's no protocol 11.5. > > There's no data length markeR, password is zero terminated and encrypted, > > if you refer to the default password schema (no SASL). > > Can you explain what you are trying to do? > > > > Regards, > > Frediano > > > > > > Il giorno ven 10 set 2021 alle ore 06:51 Andrey Af > > <public.irku...@gmail.com> > > ha scritto: > > > >> Hi, > >> > >> For encrypted password, there is definitely no data length market? > >> For example, I don't need a password, authentication is verified by > >> another part of the code, how can I skip this? > >> > > >