|
|
|
@ -559,11 +559,6 @@ ReadSupportedSecurityType(rfbClient* client, uint32_t *result, rfbBool subAuth)
|
|
|
|
|
ReadReason(client);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
if (count>sizeof(tAuth))
|
|
|
|
|
{
|
|
|
|
|
rfbClientLog("%d security types are too many; maximum is %d\n", count, sizeof(tAuth));
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rfbClientLog("We have %d security types to read\n", count);
|
|
|
|
|
authScheme=0;
|
|
|
|
@ -573,7 +568,7 @@ ReadSupportedSecurityType(rfbClient* client, uint32_t *result, rfbBool subAuth)
|
|
|
|
|
if (!ReadFromRFBServer(client, (char *)&tAuth[loop], 1)) return FALSE;
|
|
|
|
|
rfbClientLog("%d) Received security type %d\n", loop, tAuth[loop]);
|
|
|
|
|
if (flag) continue;
|
|
|
|
|
if (tAuth[loop]==rfbVncAuth || tAuth[loop]==rfbNoAuth || tAuth[loop]==rfbMSLogon ||
|
|
|
|
|
if (tAuth[loop]==rfbVncAuth || tAuth[loop]==rfbNoAuth ||
|
|
|
|
|
tAuth[loop]==rfbARD ||
|
|
|
|
|
(!subAuth && (tAuth[loop]==rfbTLS || tAuth[loop]==rfbVeNCrypt)))
|
|
|
|
|
{
|
|
|
|
|