Home | History | Annotate | Download | only in x11vnc

Lines Matching defs:server

57  * your VNC viewer or server to discard (or insert) this extra data.
64 * any-client <=> ultravnc_dsm_helper <--network--> ultravnc_dsm_helper(reverse mode) <=> any-server
66 * e.g. to connect a non-ultra-dsm-vnc viewer to a non-ultra-dsm-vnc server
133 " used as a server RSA keystore in this mode. If 'keyfile' does not\n"
135 " hash of it is shown) If 'keyfile' already exists the server key\n"
148 " (i.e. if you want to use it for a vnc server, not vnc viewer)\n"
167 " remotehost:port: host and port to connect to. (e.g. ultravnc server)\n"
733 * reverse mode, e.g. we help a vnc server instead of a viewer.
797 "UVNC Single Click server.\n", prog, n);
1164 fprintf(stderr, "checkserver_rsa: MD5 sum of server key: %s\n", str1);
1239 int server = reverse ? conn1 : conn2;
1247 /* alloc and read from server the 270 comprising the rsa public key: */
1252 n = read(server, rsabuf + len, SECUREVNC_RSA_PUBKEY_SIZE - len);
1268 fprintf(stderr, "securevnc_setup: One way to print out the SecureVNC Server key MD5 sum is:\n\n");
1272 fprintf(stderr, "securevnc_setup: ** WARNING: ULTRAVNC SERVER RSA KEY NOT VERIFIED. **\n");
1295 fprintf(stderr, "securevnc_setup: VERIFY_ERROR: SERVER RSA KEY DID NOT MATCH:\n");
1304 fprintf(stderr, "securevnc_setup: VERIFY SUCCESS: server rsa key matches the contents of:\n");
1308 fprintf(stderr, "securevnc_setup: Server rsa key stored in:\n");
1315 * read in the server flags. Note that SecureVNCPlugin sends these
1318 read(server, (char *) &b1, 1);
1319 read(server, (char *) &b2, 1);
1320 read(server, (char *) &b3, 1);
1321 read(server, (char *) &b4, 1);
1332 fprintf(stderr, "securevnc_setup: server uses AES cipher.\n");
1334 fprintf(stderr, "securevnc_setup: server uses ARC4 cipher.\n");
1341 fprintf(stderr, "securevnc_setup: server requires Client Auth signature.\n");
1374 n = read(server, (char *) buf, BSIZE);
1418 /* encrypt the session key with the server's public rsa key: */
1424 fprintf(stderr, "securevnc_setup: encrypted session key size: %d. sending to server.\n", n);
1426 /* send it to the server: */
1427 write(server, encrypted_keybuf, n);
1437 write(server, (char *)&zero, 1);
1439 write(server, (char *)&one, 1);
1441 write(server, (char *)&zero, 1);
1442 write(server, (char *)&zero, 1);
1444 write(server, (char *)&sig, 1);
1446 write(server, (char *)&zero, 1);
1470 * the server connection as well, and then he just forwards our
1472 * MITM's rsa public key, and so the real VNC server will notice
1482 fprintf(stderr, "securevnc_setup: fake VNC server and supplying VNC or Windows passwords, etc.\n");
1483 fprintf(stderr, "securevnc_setup: To increase security manually verify the Server RSA key's MD5\n");
1485 fprintf(stderr, "securevnc_setup: be used to verify the server in subsequent connections.\n");
1494 fprintf(stderr, "securevnc_setup: To increase security manually verify the Server RSA key's MD5\n");
1496 fprintf(stderr, "securevnc_setup: be used to verify the server in subsequent connections.\n");
1506 write(server, signature, nsig);
1629 BIO_printf(bio,"Server certificate\n");
1646 BIO_printf(bio,"Server public key is %d bit\n", EVP_PKEY_bits(pktmp));
1665 * Listens on incoming port for a client, then connects to remote server.
1673 struct sockaddr_in client, server;
1887 /* now connect to remote server: */
1888 memset(&server, 0, sizeof(server));
1889 server.sin_family = AF_INET;
1890 server.sin_port = htons(connect_port);
1892 if ((server.sin_addr.s_addr = inet_addr(connect_host)) == htonl(INADDR_NONE)) {
1897 server.sin_addr.s_addr = *(unsigned long *)hp->h_addr;
1906 if (connect(conn2, (struct sockaddr *)&server, (sizeof(server))) < 0) {
2009 /* encrypter: local-viewer -> remote-server */
2016 /* decrypter: remote-server -> local-viewer */