File holding the CA certificates for the host the client is connecting to
Images cache size. If 0, don't set.
Display color depth to set on new display channels. If 0, don't set.
A string array of effects to disable. The settings will be applied on new display channels. The following effets can be disabled "wallpaper", "font-smooth", "animation", and "all", which will disable all the effects. If NULL, don't apply changes.
If set to TRUE, the audio channels will be enabled for playback and recording.
If set to TRUE, the smartcard channel will be enabled and smartcard events will be forwarded to the guest
If set to TRUE, the usbredir channel will be enabled and USB devices can be redirected to the guest
Whether to enable gl-scanout (Unix only). Set to TRUE by default on EGL-enabled host, unless SPICE_DISABLE_GL_SCANOUT environment variable is set.
Glz window size. If 0, don't set.
URL of the SPICE host to connect to
TLS password to use
Port to connect to for unencrypted sessions
Version of the SPICE protocol to use
URI to the proxy server to use when doing network connection. of the form [:port] ]]>
Whether this connection is read-only mode.
A string array of channel types to be secured.
Whether to share the directory read-only.
Location of the shared directory
This property is used when one wants to simulate a smartcard with no hardware smartcard reader. If it's set to a NULL-terminated string array containing the names of 3 valid certificates, these will be used to simulate a smartcard in the guest See also spice_smartcard_manager_insert_card()
Path to the NSS certificate database containing the certificates to use to simulate a software smartcard
Port to connect to for TLS sessions
Path of the Unix socket to connect to
URI of the SPICE host to connect to. The URI is of the form spice://hostname?port=XXX or spice://hostname?tls_port=XXX
Username to use
#SpiceSessionVerify bit field indicating which parts of the peer certificate should be checked
CA certificates in PEM format. The text data can contain several CA certificates identified by:
-----BEGIN CERTIFICATE----- ... (CA certificate in base64 encoding) ... -----END CERTIFICATE-----