Blame view

vnc.c 66.8 KB
bellard authored
1
2
/*
 * QEMU VNC display driver
3
 *
bellard authored
4
5
 * Copyright (C) 2006 Anthony Liguori <anthony@codemonkey.ws>
 * Copyright (C) 2006 Fabrice Bellard
6
 * Copyright (C) 2009 Red Hat, Inc
7
 *
bellard authored
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in
 * all copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 * THE SOFTWARE.
 */
27
#include "vnc.h"
pbrook authored
28
#include "sysemu.h"
bellard authored
29
#include "qemu_socket.h"
pbrook authored
30
#include "qemu-timer.h"
31
#include "acl.h"
bellard authored
32
33
34
35

#define VNC_REFRESH_INTERVAL (1000 / 30)

#include "vnc_keysym.h"
36
37
#include "d3des.h"
38
39
40
41
42
43
#define count_bits(c, v) { \
    for (c = 0; v; v >>= 1) \
    { \
        c += v & 1; \
    } \
}
44
bellard authored
45
46
static VncDisplay *vnc_display; /* needed for info vnc */
47
static DisplayChangeListener *dcl;
48
49
50
51
52
53
54
55
static char *addr_to_string(const char *format,
                            struct sockaddr_storage *sa,
                            socklen_t salen) {
    char *addr;
    char host[NI_MAXHOST];
    char serv[NI_MAXSERV];
    int err;
56
    size_t addrlen;
57
58
59
60
61
62
63
64
65
66

    if ((err = getnameinfo((struct sockaddr *)sa, salen,
                           host, sizeof(host),
                           serv, sizeof(serv),
                           NI_NUMERICHOST | NI_NUMERICSERV)) != 0) {
        VNC_DEBUG("Cannot resolve address %d: %s\n",
                  err, gai_strerror(err));
        return NULL;
    }
67
68
69
70
71
72
    /* Enough for the existing format + the 2 vars we're
     * subsituting in. */
    addrlen = strlen(format) + strlen(host) + strlen(serv);
    addr = qemu_malloc(addrlen + 1);
    snprintf(addr, addrlen, format, host, serv);
    addr[addrlen] = '\0';
73
74
75
76

    return addr;
}
77
78

char *vnc_socket_local_addr(const char *format, int fd) {
79
80
81
82
83
84
85
86
87
88
    struct sockaddr_storage sa;
    socklen_t salen;

    salen = sizeof(sa);
    if (getsockname(fd, (struct sockaddr*)&sa, &salen) < 0)
        return NULL;

    return addr_to_string(format, &sa, salen);
}
89
90

char *vnc_socket_remote_addr(const char *format, int fd) {
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
    struct sockaddr_storage sa;
    socklen_t salen;

    salen = sizeof(sa);
    if (getpeername(fd, (struct sockaddr*)&sa, &salen) < 0)
        return NULL;

    return addr_to_string(format, &sa, salen);
}

static const char *vnc_auth_name(VncDisplay *vd) {
    switch (vd->auth) {
    case VNC_AUTH_INVALID:
        return "invalid";
    case VNC_AUTH_NONE:
        return "none";
    case VNC_AUTH_VNC:
        return "vnc";
    case VNC_AUTH_RA2:
        return "ra2";
    case VNC_AUTH_RA2NE:
        return "ra2ne";
    case VNC_AUTH_TIGHT:
        return "tight";
    case VNC_AUTH_ULTRA:
        return "ultra";
    case VNC_AUTH_TLS:
        return "tls";
    case VNC_AUTH_VENCRYPT:
#ifdef CONFIG_VNC_TLS
        switch (vd->subauth) {
        case VNC_AUTH_VENCRYPT_PLAIN:
            return "vencrypt+plain";
        case VNC_AUTH_VENCRYPT_TLSNONE:
            return "vencrypt+tls+none";
        case VNC_AUTH_VENCRYPT_TLSVNC:
            return "vencrypt+tls+vnc";
        case VNC_AUTH_VENCRYPT_TLSPLAIN:
            return "vencrypt+tls+plain";
        case VNC_AUTH_VENCRYPT_X509NONE:
            return "vencrypt+x509+none";
        case VNC_AUTH_VENCRYPT_X509VNC:
            return "vencrypt+x509+vnc";
        case VNC_AUTH_VENCRYPT_X509PLAIN:
            return "vencrypt+x509+plain";
136
137
138
139
        case VNC_AUTH_VENCRYPT_TLSSASL:
            return "vencrypt+tls+sasl";
        case VNC_AUTH_VENCRYPT_X509SASL:
            return "vencrypt+x509+sasl";
140
141
142
143
144
145
        default:
            return "vencrypt";
        }
#else
        return "vencrypt";
#endif
146
    case VNC_AUTH_SASL:
147
        return "sasl";
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
    }
    return "unknown";
}

static void do_info_vnc_client(Monitor *mon, VncState *client)
{
    char *clientAddr =
        vnc_socket_remote_addr("     address: %s:%s\n",
                               client->csock);
    if (!clientAddr)
        return;

    monitor_printf(mon, "Client:\n");
    monitor_printf(mon, "%s", clientAddr);
    free(clientAddr);
163
164
165

#ifdef CONFIG_VNC_TLS
    if (client->tls.session &&
166
167
        client->tls.dname)
        monitor_printf(mon, "  x509 dname: %s\n", client->tls.dname);
168
    else
169
        monitor_printf(mon, "  x509 dname: none\n");
170
171
172
#endif
#ifdef CONFIG_VNC_SASL
    if (client->sasl.conn &&
173
174
        client->sasl.username)
        monitor_printf(mon, "    username: %s\n", client->sasl.username);
175
    else
176
        monitor_printf(mon, "    username: none\n");
177
#endif
178
179
}
180
void do_info_vnc(Monitor *mon)
181
{
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
    if (vnc_display == NULL || vnc_display->display == NULL) {
        monitor_printf(mon, "Server: disabled\n");
    } else {
        char *serverAddr = vnc_socket_local_addr("     address: %s:%s\n",
                                                 vnc_display->lsock);

        if (!serverAddr)
            return;

        monitor_printf(mon, "Server:\n");
        monitor_printf(mon, "%s", serverAddr);
        free(serverAddr);
        monitor_printf(mon, "        auth: %s\n", vnc_auth_name(vnc_display));

        if (vnc_display->clients) {
            VncState *client = vnc_display->clients;
            while (client) {
                do_info_vnc_client(mon, client);
                client = client->next;
            }
        } else {
            monitor_printf(mon, "Client: none\n");
        }
205
206
207
    }
}
208
209
210
211
static inline uint32_t vnc_has_feature(VncState *vs, int feature) {
    return (vs->features & (1 << feature));
}
bellard authored
212
213
214
215
216
217
218
219
220
/* TODO
   1) Get the queue working for IO.
   2) there is some weirdness when using the -S option (the screen is grey
      and not totally invalidated
   3) resolutions > 1024
*/

static void vnc_update_client(void *opaque);
221
static void vnc_colordepth(VncState *vs);
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
static inline void vnc_set_bit(uint32_t *d, int k)
{
    d[k >> 5] |= 1 << (k & 0x1f);
}

static inline void vnc_clear_bit(uint32_t *d, int k)
{
    d[k >> 5] &= ~(1 << (k & 0x1f));
}

static inline void vnc_set_bits(uint32_t *d, int n, int nb_words)
{
    int j;

    j = 0;
    while (n >= 32) {
        d[j++] = -1;
        n -= 32;
    }
242
    if (n > 0)
243
244
245
246
247
248
249
250
251
252
        d[j++] = (1 << n) - 1;
    while (j < nb_words)
        d[j++] = 0;
}

static inline int vnc_get_bit(const uint32_t *d, int k)
{
    return (d[k >> 5] >> (k & 0x1f)) & 1;
}
253
static inline int vnc_and_bits(const uint32_t *d1, const uint32_t *d2,
254
255
256
257
258
259
260
261
262
263
                               int nb_words)
{
    int i;
    for(i = 0; i < nb_words; i++) {
        if ((d1[i] & d2[i]) != 0)
            return 1;
    }
    return 0;
}
264
static void vnc_update(VncState *vs, int x, int y, int w, int h)
bellard authored
265
{
266
    struct VncSurface *s = &vs->guest;
bellard authored
267
268
269
270
    int i;

    h += y;
271
272
273
274
275
276
277
    /* round x down to ensure the loop only spans one 16-pixel block per,
       iteration.  otherwise, if (x % 16) != 0, the last iteration may span
       two 16-pixel blocks but we only mark the first as dirty
    */
    w += (x % 16);
    x -= (x % 16);
278
279
280
281
    x = MIN(x, s->ds->width);
    y = MIN(y, s->ds->height);
    w = MIN(x + w, s->ds->width) - x;
    h = MIN(h, s->ds->height);
282
bellard authored
283
    for (; y < h; y++)
284
        for (i = 0; i < w; i += 16)
285
            vnc_set_bit(s->dirty[y], (x + i) / 16);
bellard authored
286
287
}
288
289
290
291
292
293
294
295
296
297
static void vnc_dpy_update(DisplayState *ds, int x, int y, int w, int h)
{
    VncDisplay *vd = ds->opaque;
    VncState *vs = vd->clients;
    while (vs != NULL) {
        vnc_update(vs, x, y, w, h);
        vs = vs->next;
    }
}
bellard authored
298
static void vnc_framebuffer_update(VncState *vs, int x, int y, int w, int h,
299
                                   int32_t encoding)
bellard authored
300
301
302
303
304
305
306
307
308
{
    vnc_write_u16(vs, x);
    vnc_write_u16(vs, y);
    vnc_write_u16(vs, w);
    vnc_write_u16(vs, h);

    vnc_write_s32(vs, encoding);
}
309
void buffer_reserve(Buffer *buffer, size_t len)
310
311
{
    if ((buffer->capacity - buffer->offset) < len) {
312
313
314
315
316
317
        buffer->capacity += (len + 1024);
        buffer->buffer = qemu_realloc(buffer->buffer, buffer->capacity);
        if (buffer->buffer == NULL) {
            fprintf(stderr, "vnc: out of memory\n");
            exit(1);
        }
318
319
320
    }
}
321
int buffer_empty(Buffer *buffer)
322
323
324
325
{
    return buffer->offset == 0;
}
326
uint8_t *buffer_end(Buffer *buffer)
327
328
329
330
{
    return buffer->buffer + buffer->offset;
}
331
void buffer_reset(Buffer *buffer)
332
{
333
        buffer->offset = 0;
334
335
}
336
void buffer_append(Buffer *buffer, const void *data, size_t len)
337
338
339
340
341
{
    memcpy(buffer->buffer + buffer->offset, data, len);
    buffer->offset += len;
}
342
static void vnc_resize(VncState *vs)
bellard authored
343
{
344
    DisplayState *ds = vs->ds;
345
    int size_changed;
bellard authored
346
347
348
349
350
    /* guest surface */
    if (!vs->guest.ds)
        vs->guest.ds = qemu_mallocz(sizeof(*vs->guest.ds));
    if (ds_get_bytes_per_pixel(ds) != vs->guest.ds->pf.bytes_per_pixel)
351
        console_color_init(ds);
352
    vnc_colordepth(vs);
353
354
355
    size_changed = ds_get_width(ds) != vs->guest.ds->width ||
                   ds_get_height(ds) != vs->guest.ds->height;
    *(vs->guest.ds) = *(ds->surface);
356
    if (size_changed) {
357
        if (vs->csock != -1 && vnc_has_feature(vs, VNC_FEATURE_RESIZE)) {
358
359
360
            vnc_write_u8(vs, 0);  /* msg id */
            vnc_write_u8(vs, 0);
            vnc_write_u16(vs, 1); /* number of rects */
361
362
            vnc_framebuffer_update(vs, 0, 0, ds_get_width(ds), ds_get_height(ds),
                                   VNC_ENCODING_DESKTOPRESIZE);
363
364
            vnc_flush(vs);
        }
bellard authored
365
    }
366
    memset(vs->guest.dirty, 0xFF, sizeof(vs->guest.dirty));
367
368
369
370
371
372
373
374
375
376
377
378
379
380
    /* server surface */
    if (!vs->server.ds) {
        vs->server.ds = default_allocator.create_displaysurface(ds_get_width(ds),
                                                                ds_get_height(ds));
    } else {
        default_allocator.resize_displaysurface(vs->server.ds,
                                                ds_get_width(ds), ds_get_height(ds));
    }
    if (vs->server.ds->data == NULL) {
        fprintf(stderr, "vnc: memory allocation failed\n");
        exit(1);
    }
    memset(vs->server.dirty, 0xFF, sizeof(vs->guest.dirty));
bellard authored
381
382
}
383
384
385
386
387
388
389
390
391
392
static void vnc_dpy_resize(DisplayState *ds)
{
    VncDisplay *vd = ds->opaque;
    VncState *vs = vd->clients;
    while (vs != NULL) {
        vnc_resize(vs);
        vs = vs->next;
    }
}
393
394
395
396
397
398
399
400
401
/* fastest code */
static void vnc_write_pixels_copy(VncState *vs, void *pixels, int size)
{
    vnc_write(vs, pixels, size);
}

/* slowest but generic code. */
static void vnc_convert_pixel(VncState *vs, uint8_t *buf, uint32_t v)
{
402
403
    uint8_t r, g, b;
404
405
406
407
408
409
    r = ((((v & vs->server.ds->pf.rmask) >> vs->server.ds->pf.rshift) << vs->clientds.pf.rbits) >>
        vs->server.ds->pf.rbits);
    g = ((((v & vs->server.ds->pf.gmask) >> vs->server.ds->pf.gshift) << vs->clientds.pf.gbits) >>
        vs->server.ds->pf.gbits);
    b = ((((v & vs->server.ds->pf.bmask) >> vs->server.ds->pf.bshift) << vs->clientds.pf.bbits) >>
        vs->server.ds->pf.bbits);
410
411
412
413
    v = (r << vs->clientds.pf.rshift) |
        (g << vs->clientds.pf.gshift) |
        (b << vs->clientds.pf.bshift);
    switch(vs->clientds.pf.bytes_per_pixel) {
414
415
416
417
    case 1:
        buf[0] = v;
        break;
    case 2:
418
        if (vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) {
419
420
421
422
423
424
425
426
427
            buf[0] = v >> 8;
            buf[1] = v;
        } else {
            buf[1] = v >> 8;
            buf[0] = v;
        }
        break;
    default:
    case 4:
428
        if (vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) {
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
            buf[0] = v >> 24;
            buf[1] = v >> 16;
            buf[2] = v >> 8;
            buf[3] = v;
        } else {
            buf[3] = v >> 24;
            buf[2] = v >> 16;
            buf[1] = v >> 8;
            buf[0] = v;
        }
        break;
    }
}

static void vnc_write_pixels_generic(VncState *vs, void *pixels1, int size)
{
    uint8_t buf[4];
447
    if (vs->server.ds->pf.bytes_per_pixel == 4) {
448
449
450
451
452
        uint32_t *pixels = pixels1;
        int n, i;
        n = size >> 2;
        for(i = 0; i < n; i++) {
            vnc_convert_pixel(vs, buf, pixels[i]);
453
            vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
454
        }
455
    } else if (vs->server.ds->pf.bytes_per_pixel == 2) {
456
457
458
459
460
        uint16_t *pixels = pixels1;
        int n, i;
        n = size >> 1;
        for(i = 0; i < n; i++) {
            vnc_convert_pixel(vs, buf, pixels[i]);
461
            vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
462
        }
463
    } else if (vs->server.ds->pf.bytes_per_pixel == 1) {
464
465
466
467
468
        uint8_t *pixels = pixels1;
        int n, i;
        n = size;
        for(i = 0; i < n; i++) {
            vnc_convert_pixel(vs, buf, pixels[i]);
469
            vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
470
471
472
        }
    } else {
        fprintf(stderr, "vnc_write_pixels_generic: VncState color depth not supported\n");
473
474
475
    }
}
bellard authored
476
477
478
static void send_framebuffer_update_raw(VncState *vs, int x, int y, int w, int h)
{
    int i;
479
    uint8_t *row;
bellard authored
480
481
    row = vs->server.ds->data + y * ds_get_linesize(vs->ds) + x * ds_get_bytes_per_pixel(vs->ds);
bellard authored
482
    for (i = 0; i < h; i++) {
483
484
        vs->write_pixels(vs, row, w * ds_get_bytes_per_pixel(vs->ds));
        row += ds_get_linesize(vs->ds);
bellard authored
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
    }
}

static void hextile_enc_cord(uint8_t *ptr, int x, int y, int w, int h)
{
    ptr[0] = ((x & 0x0F) << 4) | (y & 0x0F);
    ptr[1] = (((w - 1) & 0x0F) << 4) | ((h - 1) & 0x0F);
}

#define BPP 8
#include "vnchextile.h"
#undef BPP

#define BPP 16
#include "vnchextile.h"
#undef BPP

#define BPP 32
#include "vnchextile.h"
#undef BPP
506
#define GENERIC
507
508
509
510
511
512
513
514
515
516
517
518
#define BPP 8
#include "vnchextile.h"
#undef BPP
#undef GENERIC

#define GENERIC
#define BPP 16
#include "vnchextile.h"
#undef BPP
#undef GENERIC

#define GENERIC
519
520
521
522
523
#define BPP 32
#include "vnchextile.h"
#undef BPP
#undef GENERIC
bellard authored
524
525
526
527
static void send_framebuffer_update_hextile(VncState *vs, int x, int y, int w, int h)
{
    int i, j;
    int has_fg, has_bg;
528
    uint8_t *last_fg, *last_bg;
bellard authored
529
530
531
    last_fg = (uint8_t *) qemu_malloc(vs->server.ds->pf.bytes_per_pixel);
    last_bg = (uint8_t *) qemu_malloc(vs->server.ds->pf.bytes_per_pixel);
bellard authored
532
533
    has_fg = has_bg = 0;
    for (j = y; j < (y + h); j += 16) {
534
        for (i = x; i < (x + w); i += 16) {
535
            vs->send_hextile_tile(vs, i, j,
536
                                  MIN(16, x + w - i), MIN(16, y + h - j),
537
                                  last_bg, last_fg, &has_bg, &has_fg);
538
        }
bellard authored
539
    }
540
541
542
    free(last_fg);
    free(last_bg);
bellard authored
543
544
}
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
static void vnc_zlib_init(VncState *vs)
{
    int i;
    for (i=0; i<(sizeof(vs->zlib_stream) / sizeof(z_stream)); i++)
        vs->zlib_stream[i].opaque = NULL;
}

static void vnc_zlib_start(VncState *vs)
{
    buffer_reset(&vs->zlib);

    // make the output buffer be the zlib buffer, so we can compress it later
    vs->zlib_tmp = vs->output;
    vs->output = vs->zlib;
}

static int vnc_zlib_stop(VncState *vs, int stream_id)
{
    z_streamp zstream = &vs->zlib_stream[stream_id];
    int previous_out;

    // switch back to normal output/zlib buffers
    vs->zlib = vs->output;
    vs->output = vs->zlib_tmp;

    // compress the zlib buffer

    // initialize the stream
    // XXX need one stream per session
    if (zstream->opaque != vs) {
        int err;

        VNC_DEBUG("VNC: initializing zlib stream %d\n", stream_id);
        VNC_DEBUG("VNC: opaque = %p | vs = %p\n", zstream->opaque, vs);
        zstream->zalloc = Z_NULL;
        zstream->zfree = Z_NULL;

        err = deflateInit2(zstream, vs->tight_compression, Z_DEFLATED, MAX_WBITS,
                           MAX_MEM_LEVEL, Z_DEFAULT_STRATEGY);

        if (err != Z_OK) {
            fprintf(stderr, "VNC: error initializing zlib\n");
            return -1;
        }

        zstream->opaque = vs;
    }

    // XXX what to do if tight_compression changed in between?

    // reserve memory in output buffer
    buffer_reserve(&vs->output, vs->zlib.offset + 64);

    // set pointers
    zstream->next_in = vs->zlib.buffer;
    zstream->avail_in = vs->zlib.offset;
    zstream->next_out = vs->output.buffer + vs->output.offset;
    zstream->avail_out = vs->output.capacity - vs->output.offset;
    zstream->data_type = Z_BINARY;
    previous_out = zstream->total_out;

    // start encoding
    if (deflate(zstream, Z_SYNC_FLUSH) != Z_OK) {
        fprintf(stderr, "VNC: error during zlib compression\n");
        return -1;
    }

    vs->output.offset = vs->output.capacity - zstream->avail_out;
    return zstream->total_out - previous_out;
}

static void send_framebuffer_update_zlib(VncState *vs, int x, int y, int w, int h)
{
    int old_offset, new_offset, bytes_written;

    vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_ZLIB);

    // remember where we put in the follow-up size
    old_offset = vs->output.offset;
    vnc_write_s32(vs, 0);

    // compress the stream
    vnc_zlib_start(vs);
    send_framebuffer_update_raw(vs, x, y, w, h);
    bytes_written = vnc_zlib_stop(vs, 0);

    if (bytes_written == -1)
        return;

    // hack in the size
    new_offset = vs->output.offset;
    vs->output.offset = old_offset;
    vnc_write_u32(vs, bytes_written);
    vs->output.offset = new_offset;
}
bellard authored
641
642
static void send_framebuffer_update(VncState *vs, int x, int y, int w, int h)
{
643
    switch(vs->vnc_encoding) {
644
645
646
647
648
649
650
651
652
653
654
        case VNC_ENCODING_ZLIB:
            send_framebuffer_update_zlib(vs, x, y, w, h);
            break;
        case VNC_ENCODING_HEXTILE:
            vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_HEXTILE);
            send_framebuffer_update_hextile(vs, x, y, w, h);
            break;
        default:
            vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_RAW);
            send_framebuffer_update_raw(vs, x, y, w, h);
            break;
655
    }
bellard authored
656
657
}
658
static void vnc_copy(VncState *vs, int src_x, int src_y, int dst_x, int dst_y, int w, int h)
bellard authored
659
{
660
    vs->force_update = 1;
bellard authored
661
662
663
664
665
    vnc_update_client(vs);

    vnc_write_u8(vs, 0);  /* msg id */
    vnc_write_u8(vs, 0);
    vnc_write_u16(vs, 1); /* number of rects */
666
    vnc_framebuffer_update(vs, dst_x, dst_y, w, h, VNC_ENCODING_COPYRECT);
bellard authored
667
668
669
670
671
    vnc_write_u16(vs, src_x);
    vnc_write_u16(vs, src_y);
    vnc_flush(vs);
}
672
673
674
675
676
677
678
679
680
681
682
683
684
static void vnc_dpy_copy(DisplayState *ds, int src_x, int src_y, int dst_x, int dst_y, int w, int h)
{
    VncDisplay *vd = ds->opaque;
    VncState *vs = vd->clients;
    while (vs != NULL) {
        if (vnc_has_feature(vs, VNC_FEATURE_COPYRECT))
            vnc_copy(vs, src_x, src_y, dst_x, dst_y, w, h);
        else /* TODO */
            vnc_update(vs, dst_x, dst_y, w, h);
        vs = vs->next;
    }
}
685
686
static int find_and_clear_dirty_height(struct VncSurface *s,
                                       int y, int last_x, int x)
bellard authored
687
688
689
{
    int h;
690
    for (h = 1; h < (s->ds->height - y) && h < 1; h++) {
691
        int tmp_x;
692
        if (!vnc_get_bit(s->dirty[y + h], last_x))
693
694
            break;
        for (tmp_x = last_x; tmp_x < x; tmp_x++)
695
            vnc_clear_bit(s->dirty[y + h], tmp_x);
bellard authored
696
697
698
699
700
701
702
703
704
    }

    return h;
}

static void vnc_update_client(void *opaque)
{
    VncState *vs = opaque;
    if (vs->need_update && vs->csock != -1) {
705
        int y;
706
707
708
        uint8_t *guest_row;
        uint8_t *server_row;
        int cmp_bytes = 16 * ds_get_bytes_per_pixel(vs->ds);
709
710
711
712
        uint32_t width_mask[VNC_DIRTY_WORDS];
        int n_rectangles;
        int saved_offset;
        int has_dirty = 0;
bellard authored
713
714
715
716
717
718
719
        if (vs->output.offset && !vs->audio_cap && !vs->force_update) {
            /* kernel send buffers are full -> drop frames to throttle */
            qemu_mod_timer(vs->timer, qemu_get_clock(rt_clock) + VNC_REFRESH_INTERVAL);
            return;
        }
720
721
        vga_hw_update();
722
723
724
725
726
        /*
         * Walk through the guest dirty map.
         * Check and copy modified bits from guest to server surface.
         * Update server dirty map.
         */
727
        vnc_set_bits(width_mask, (ds_get_width(vs->ds) / 16), VNC_DIRTY_WORDS);
728
729
730
731
        guest_row  = vs->guest.ds->data;
        server_row = vs->server.ds->data;
        for (y = 0; y < vs->guest.ds->height; y++) {
            if (vnc_and_bits(vs->guest.dirty[y], width_mask, VNC_DIRTY_WORDS)) {
732
                int x;
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
                uint8_t *guest_ptr;
                uint8_t *server_ptr;

                guest_ptr  = guest_row;
                server_ptr = server_row;

                for (x = 0; x < vs->guest.ds->width;
                     x += 16, guest_ptr += cmp_bytes, server_ptr += cmp_bytes) {
                    if (!vnc_get_bit(vs->guest.dirty[y], (x / 16)))
                        continue;
                    vnc_clear_bit(vs->guest.dirty[y], (x / 16));
                    if (memcmp(server_ptr, guest_ptr, cmp_bytes) == 0)
                        continue;
                    memcpy(server_ptr, guest_ptr, cmp_bytes);
                    vnc_set_bit(vs->server.dirty[y], (x / 16));
                    has_dirty++;
749
750
                }
            }
751
752
            guest_row  += ds_get_linesize(vs->ds);
            server_row += ds_get_linesize(vs->ds);
753
754
        }
755
        if (!has_dirty && !vs->audio_cap && !vs->force_update) {
756
757
758
759
            qemu_mod_timer(vs->timer, qemu_get_clock(rt_clock) + VNC_REFRESH_INTERVAL);
            return;
        }
760
761
762
763
764
765
        /*
         * Send screen updates to the vnc client using the server
         * surface and server dirty map.  guest surface updates
         * happening in parallel don't disturb us, the next pass will
         * send them to the client.
         */
766
767
768
769
770
771
        n_rectangles = 0;
        vnc_write_u8(vs, 0);  /* msg id */
        vnc_write_u8(vs, 0);
        saved_offset = vs->output.offset;
        vnc_write_u16(vs, 0);
772
        for (y = 0; y < vs->server.ds->height; y++) {
773
774
            int x;
            int last_x = -1;
775
776
            for (x = 0; x < vs->server.ds->width / 16; x++) {
                if (vnc_get_bit(vs->server.dirty[y], x)) {
777
778
779
                    if (last_x == -1) {
                        last_x = x;
                    }
780
                    vnc_clear_bit(vs->server.dirty[y], x);
781
782
                } else {
                    if (last_x != -1) {
783
                        int h = find_and_clear_dirty_height(&vs->server, y, last_x, x);
784
785
786
787
788
789
790
                        send_framebuffer_update(vs, last_x * 16, y, (x - last_x) * 16, h);
                        n_rectangles++;
                    }
                    last_x = -1;
                }
            }
            if (last_x != -1) {
791
                int h = find_and_clear_dirty_height(&vs->server, y, last_x, x);
792
793
794
795
796
797
798
                send_framebuffer_update(vs, last_x * 16, y, (x - last_x) * 16, h);
                n_rectangles++;
            }
        }
        vs->output.buffer[saved_offset] = (n_rectangles >> 8) & 0xFF;
        vs->output.buffer[saved_offset + 1] = n_rectangles & 0xFF;
        vnc_flush(vs);
799
        vs->force_update = 0;
bellard authored
800
801
802

    }
803
804
    if (vs->csock != -1) {
        qemu_mod_timer(vs->timer, qemu_get_clock(rt_clock) + VNC_REFRESH_INTERVAL);
bellard authored
805
806
807
808
    }

}
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
/* audio */
static void audio_capture_notify(void *opaque, audcnotification_e cmd)
{
    VncState *vs = opaque;

    switch (cmd) {
    case AUD_CNOTIFY_DISABLE:
        vnc_write_u8(vs, 255);
        vnc_write_u8(vs, 1);
        vnc_write_u16(vs, 0);
        vnc_flush(vs);
        break;

    case AUD_CNOTIFY_ENABLE:
        vnc_write_u8(vs, 255);
        vnc_write_u8(vs, 1);
        vnc_write_u16(vs, 1);
        vnc_flush(vs);
        break;
    }
}

static void audio_capture_destroy(void *opaque)
{
}

static void audio_capture(void *opaque, void *buf, int size)
{
    VncState *vs = opaque;

    vnc_write_u8(vs, 255);
    vnc_write_u8(vs, 1);
    vnc_write_u16(vs, 2);
    vnc_write_u32(vs, size);
    vnc_write(vs, buf, size);
    vnc_flush(vs);
}

static void audio_add(VncState *vs)
{
849
    Monitor *mon = cur_mon;
850
851
852
    struct audio_capture_ops ops;

    if (vs->audio_cap) {
853
        monitor_printf(mon, "audio already running\n");
854
855
856
857
858
859
860
861
862
        return;
    }

    ops.notify = audio_capture_notify;
    ops.destroy = audio_capture_destroy;
    ops.capture = audio_capture;

    vs->audio_cap = AUD_add_capture(NULL, &vs->as, &ops, vs);
    if (!vs->audio_cap) {
863
        monitor_printf(mon, "Failed to add audio capture\n");
864
865
866
867
868
869
870
871
872
873
874
    }
}

static void audio_del(VncState *vs)
{
    if (vs->audio_cap) {
        AUD_del_capture(vs->audio_cap, vs);
        vs->audio_cap = NULL;
    }
}
875
876

int vnc_client_io_error(VncState *vs, int ret, int last_errno)
bellard authored
877
878
{
    if (ret == 0 || ret == -1) {
879
880
881
882
883
884
885
886
887
888
889
890
        if (ret == -1) {
            switch (last_errno) {
                case EINTR:
                case EAGAIN:
#ifdef _WIN32
                case WSAEWOULDBLOCK:
#endif
                    return 0;
                default:
                    break;
            }
        }
bellard authored
891
892
893
894
        VNC_DEBUG("Closing down client sock %d %d\n", ret, ret < 0 ? last_errno : 0);
        qemu_set_fd_handler2(vs->csock, NULL, NULL, NULL, NULL);
        closesocket(vs->csock);
895
896
897
898
        qemu_del_timer(vs->timer);
        qemu_free_timer(vs->timer);
        if (vs->input.buffer) qemu_free(vs->input.buffer);
        if (vs->output.buffer) qemu_free(vs->output.buffer);
899
#ifdef CONFIG_VNC_TLS
900
        vnc_tls_client_cleanup(vs);
901
#endif /* CONFIG_VNC_TLS */
902
903
904
#ifdef CONFIG_VNC_SASL
        vnc_sasl_client_cleanup(vs);
#endif /* CONFIG_VNC_SASL */
905
        audio_del(vs);
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920

        VncState *p, *parent = NULL;
        for (p = vs->vd->clients; p != NULL; p = p->next) {
            if (p == vs) {
                if (parent)
                    parent->next = p->next;
                else
                    vs->vd->clients = p->next;
                break;
            }
            parent = p;
        }
        if (!vs->vd->clients)
            dcl->idle = 1;
921
922
        default_allocator.free_displaysurface(vs->server.ds);
        qemu_free(vs->guest.ds);
923
        qemu_free(vs);
924
925
        return 0;
bellard authored
926
927
928
929
    }
    return ret;
}
930
931

void vnc_client_error(VncState *vs)
bellard authored
932
{
bellard authored
933
    vnc_client_io_error(vs, -1, EINVAL);
bellard authored
934
935
}
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952

/*
 * Called to write a chunk of data to the client socket. The data may
 * be the raw data, or may have already been encoded by SASL.
 * The data will be written either straight onto the socket, or
 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
 *
 * NB, it is theoretically possible to have 2 layers of encryption,
 * both SASL, and this TLS layer. It is highly unlikely in practice
 * though, since SASL encryption will typically be a no-op if TLS
 * is active
 *
 * Returns the number of bytes written, which may be less than
 * the requested 'datalen' if the socket would block. Returns
 * -1 on error, and disconnects the client socket.
 */
long vnc_client_write_buf(VncState *vs, const uint8_t *data, size_t datalen)
bellard authored
953
{
954
    long ret;
955
#ifdef CONFIG_VNC_TLS
956
    if (vs->tls.session) {
957
958
959
960
961
962
963
964
        ret = gnutls_write(vs->tls.session, data, datalen);
        if (ret < 0) {
            if (ret == GNUTLS_E_AGAIN)
                errno = EAGAIN;
            else
                errno = EIO;
            ret = -1;
        }
965
966
    } else
#endif /* CONFIG_VNC_TLS */
967
        ret = send(vs->csock, data, datalen, 0);
968
    VNC_DEBUG("Wrote wire %p %zd -> %ld\n", data, datalen, ret);
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
    return vnc_client_io_error(vs, ret, socket_error());
}


/*
 * Called to write buffered data to the client socket, when not
 * using any SASL SSF encryption layers. Will write as much data
 * as possible without blocking. If all buffered data is written,
 * will switch the FD poll() handler back to read monitoring.
 *
 * Returns the number of bytes written, which may be less than
 * the buffered output data if the socket would block. Returns
 * -1 on error, and disconnects the client socket.
 */
static long vnc_client_write_plain(VncState *vs)
{
    long ret;

#ifdef CONFIG_VNC_SASL
988
    VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n",
989
990
991
992
993
994
995
996
997
998
999
1000
              vs->output.buffer, vs->output.capacity, vs->output.offset,
              vs->sasl.waitWriteSSF);

    if (vs->sasl.conn &&
        vs->sasl.runSSF &&
        vs->sasl.waitWriteSSF) {
        ret = vnc_client_write_buf(vs, vs->output.buffer, vs->sasl.waitWriteSSF);
        if (ret)
            vs->sasl.waitWriteSSF -= ret;
    } else
#endif /* CONFIG_VNC_SASL */
        ret = vnc_client_write_buf(vs, vs->output.buffer, vs->output.offset);
bellard authored
1001
    if (!ret)
1002
        return 0;
bellard authored
1003
1004
1005
1006
1007

    memmove(vs->output.buffer, vs->output.buffer + ret, (vs->output.offset - ret));
    vs->output.offset -= ret;

    if (vs->output.offset == 0) {
1008
        qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, NULL, vs);
bellard authored
1009
    }
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032

    return ret;
}


/*
 * First function called whenever there is data to be written to
 * the client socket. Will delegate actual work according to whether
 * SASL SSF layers are enabled (thus requiring encryption calls)
 */
void vnc_client_write(void *opaque)
{
    long ret;
    VncState *vs = opaque;

#ifdef CONFIG_VNC_SASL
    if (vs->sasl.conn &&
        vs->sasl.runSSF &&
        !vs->sasl.waitWriteSSF)
        ret = vnc_client_write_sasl(vs);
    else
#endif /* CONFIG_VNC_SASL */
        ret = vnc_client_write_plain(vs);
bellard authored
1033
1034
}
1035
void vnc_read_when(VncState *vs, VncReadEvent *func, size_t expecting)
bellard authored
1036
1037
1038
1039
1040
{
    vs->read_handler = func;
    vs->read_handler_expect = expecting;
}
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057

/*
 * Called to read a chunk of data from the client socket. The data may
 * be the raw data, or may need to be further decoded by SASL.
 * The data will be read either straight from to the socket, or
 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
 *
 * NB, it is theoretically possible to have 2 layers of encryption,
 * both SASL, and this TLS layer. It is highly unlikely in practice
 * though, since SASL encryption will typically be a no-op if TLS
 * is active
 *
 * Returns the number of bytes read, which may be less than
 * the requested 'datalen' if the socket would block. Returns
 * -1 on error, and disconnects the client socket.
 */
long vnc_client_read_buf(VncState *vs, uint8_t *data, size_t datalen)
bellard authored
1058
{
1059
    long ret;
1060
#ifdef CONFIG_VNC_TLS
1061
    if (vs->tls.session) {
1062
1063
1064
1065
1066
1067
1068
1069
        ret = gnutls_read(vs->tls.session, data, datalen);
        if (ret < 0) {
            if (ret == GNUTLS_E_AGAIN)
                errno = EAGAIN;
            else
                errno = EIO;
            ret = -1;
        }
1070
1071
    } else
#endif /* CONFIG_VNC_TLS */
1072
        ret = recv(vs->csock, data, datalen, 0);
1073
    VNC_DEBUG("Read wire %p %zd -> %ld\n", data, datalen, ret);
1074
1075
    return vnc_client_io_error(vs, ret, socket_error());
}
bellard authored
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088

/*
 * Called to read data from the client socket to the input buffer,
 * when not using any SASL SSF encryption layers. Will read as much
 * data as possible without blocking.
 *
 * Returns the number of bytes read. Returns -1 on error, and
 * disconnects the client socket.
 */
static long vnc_client_read_plain(VncState *vs)
{
    int ret;
1089
    VNC_DEBUG("Read plain %p size %zd offset %zd\n",
1090
1091
1092
1093
1094
              vs->input.buffer, vs->input.capacity, vs->input.offset);
    buffer_reserve(&vs->input, 4096);
    ret = vnc_client_read_buf(vs, buffer_end(&vs->input), 4096);
    if (!ret)
        return 0;
bellard authored
1095
    vs->input.offset += ret;
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
    return ret;
}


/*
 * First function called whenever there is more data to be read from
 * the client socket. Will delegate actual work according to whether
 * SASL SSF layers are enabled (thus requiring decryption calls)
 */
void vnc_client_read(void *opaque)
{
    VncState *vs = opaque;
    long ret;

#ifdef CONFIG_VNC_SASL
    if (vs->sasl.conn && vs->sasl.runSSF)
        ret = vnc_client_read_sasl(vs);
    else
#endif /* CONFIG_VNC_SASL */
        ret = vnc_client_read_plain(vs);
    if (!ret)
1117
        return;
bellard authored
1118
1119

    while (vs->read_handler && vs->input.offset >= vs->read_handler_expect) {
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
        size_t len = vs->read_handler_expect;
        int ret;

        ret = vs->read_handler(vs, vs->input.buffer, len);
        if (vs->csock == -1)
            return;

        if (!ret) {
            memmove(vs->input.buffer, vs->input.buffer + len, (vs->input.offset - len));
            vs->input.offset -= len;
        } else {
            vs->read_handler_expect = ret;
        }
bellard authored
1133
1134
1135
    }
}
1136
void vnc_write(VncState *vs, const void *data, size_t len)
bellard authored
1137
1138
1139
1140
{
    buffer_reserve(&vs->output, len);

    if (buffer_empty(&vs->output)) {
1141
        qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, vnc_client_write, vs);
bellard authored
1142
1143
1144
1145
1146
    }

    buffer_append(&vs->output, data, len);
}
1147
void vnc_write_s32(VncState *vs, int32_t value)
bellard authored
1148
1149
1150
1151
{
    vnc_write_u32(vs, *(uint32_t *)&value);
}
1152
void vnc_write_u32(VncState *vs, uint32_t value)
bellard authored
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
{
    uint8_t buf[4];

    buf[0] = (value >> 24) & 0xFF;
    buf[1] = (value >> 16) & 0xFF;
    buf[2] = (value >>  8) & 0xFF;
    buf[3] = value & 0xFF;

    vnc_write(vs, buf, 4);
}
1164
void vnc_write_u16(VncState *vs, uint16_t value)
bellard authored
1165
{
1166
    uint8_t buf[2];
bellard authored
1167
1168
1169
1170
1171
1172
1173

    buf[0] = (value >> 8) & 0xFF;
    buf[1] = value & 0xFF;

    vnc_write(vs, buf, 2);
}
1174
void vnc_write_u8(VncState *vs, uint8_t value)
bellard authored
1175
1176
1177
1178
{
    vnc_write(vs, (char *)&value, 1);
}
1179
void vnc_flush(VncState *vs)
bellard authored
1180
1181
{
    if (vs->output.offset)
1182
        vnc_client_write(vs);
bellard authored
1183
1184
}
1185
uint8_t read_u8(uint8_t *data, size_t offset)
bellard authored
1186
1187
1188
1189
{
    return data[offset];
}
1190
uint16_t read_u16(uint8_t *data, size_t offset)
bellard authored
1191
1192
1193
1194
{
    return ((data[offset] & 0xFF) << 8) | (data[offset + 1] & 0xFF);
}
1195
int32_t read_s32(uint8_t *data, size_t offset)
bellard authored
1196
1197
{
    return (int32_t)((data[offset] << 24) | (data[offset + 1] << 16) |
1198
                     (data[offset + 2] << 8) | data[offset + 3]);
bellard authored
1199
1200
}
1201
uint32_t read_u32(uint8_t *data, size_t offset)
bellard authored
1202
1203
{
    return ((data[offset] << 24) | (data[offset + 1] << 16) |
1204
            (data[offset + 2] << 8) | data[offset + 3]);
bellard authored
1205
1206
}
1207
static void client_cut_text(VncState *vs, size_t len, uint8_t *text)
bellard authored
1208
1209
1210
{
}
1211
1212
static void check_pointer_type_change(VncState *vs, int absolute)
{
1213
    if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
1214
1215
1216
1217
1218
        vnc_write_u8(vs, 0);
        vnc_write_u8(vs, 0);
        vnc_write_u16(vs, 1);
        vnc_framebuffer_update(vs, absolute, 0,
                               ds_get_width(vs->ds), ds_get_height(vs->ds),
1219
                               VNC_ENCODING_POINTER_TYPE_CHANGE);
1220
        vnc_flush(vs);
1221
1222
1223
1224
    }
    vs->absolute = absolute;
}
bellard authored
1225
1226
1227
1228
1229
1230
static void pointer_event(VncState *vs, int button_mask, int x, int y)
{
    int buttons = 0;
    int dz = 0;

    if (button_mask & 0x01)
1231
        buttons |= MOUSE_EVENT_LBUTTON;
bellard authored
1232
    if (button_mask & 0x02)
1233
        buttons |= MOUSE_EVENT_MBUTTON;
bellard authored
1234
    if (button_mask & 0x04)
1235
        buttons |= MOUSE_EVENT_RBUTTON;
bellard authored
1236
    if (button_mask & 0x08)
1237
        dz = -1;
bellard authored
1238
    if (button_mask & 0x10)
1239
        dz = 1;
1240
1241

    if (vs->absolute) {
1242
1243
1244
        kbd_mouse_event(x * 0x7FFF / (ds_get_width(vs->ds) - 1),
                        y * 0x7FFF / (ds_get_height(vs->ds) - 1),
                        dz, buttons);
1245
    } else if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE)) {
1246
1247
        x -= 0x7FFF;
        y -= 0x7FFF;
bellard authored
1248
1249
        kbd_mouse_event(x, y, dz, buttons);
1250
    } else {
1251
1252
1253
1254
1255
1256
        if (vs->last_x != -1)
            kbd_mouse_event(x - vs->last_x,
                            y - vs->last_y,
                            dz, buttons);
        vs->last_x = x;
        vs->last_y = y;
bellard authored
1257
    }
1258
1259

    check_pointer_type_change(vs, kbd_mouse_is_absolute());
bellard authored
1260
1261
}
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
static void reset_keys(VncState *vs)
{
    int i;
    for(i = 0; i < 256; i++) {
        if (vs->modifiers_state[i]) {
            if (i & 0x80)
                kbd_put_keycode(0xe0);
            kbd_put_keycode(i | 0x80);
            vs->modifiers_state[i] = 0;
        }
    }
}
1275
1276
static void press_key(VncState *vs, int keysym)
{
1277
1278
    kbd_put_keycode(keysym2scancode(vs->vd->kbd_layout, keysym) & 0x7f);
    kbd_put_keycode(keysym2scancode(vs->vd->kbd_layout, keysym) | 0x80);
1279
1280
}
1281
static void do_key_event(VncState *vs, int down, int keycode, int sym)
bellard authored
1282
{
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
    /* QEMU console switch */
    switch(keycode) {
    case 0x2a:                          /* Left Shift */
    case 0x36:                          /* Right Shift */
    case 0x1d:                          /* Left CTRL */
    case 0x9d:                          /* Right CTRL */
    case 0x38:                          /* Left ALT */
    case 0xb8:                          /* Right ALT */
        if (down)
            vs->modifiers_state[keycode] = 1;
        else
            vs->modifiers_state[keycode] = 0;
        break;
1296
    case 0x02 ... 0x0a: /* '1' to '9' keys */
1297
1298
1299
1300
1301
1302
1303
        if (down && vs->modifiers_state[0x1d] && vs->modifiers_state[0x38]) {
            /* Reset the modifiers sent to the current console */
            reset_keys(vs);
            console_select(keycode - 0x02);
            return;
        }
        break;
1304
1305
    case 0x3a:                        /* CapsLock */
    case 0x45:                        /* NumLock */
1306
1307
1308
1309
1310
        if (!down)
            vs->modifiers_state[keycode] ^= 1;
        break;
    }
1311
    if (keycode_is_keypad(vs->vd->kbd_layout, keycode)) {
1312
1313
1314
1315
        /* If the numlock state needs to change then simulate an additional
           keypress before sending this one.  This will happen if the user
           toggles numlock away from the VNC window.
        */
1316
        if (keysym_is_numlock(vs->vd->kbd_layout, sym & 0xFFFF)) {
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
            if (!vs->modifiers_state[0x45]) {
                vs->modifiers_state[0x45] = 1;
                press_key(vs, 0xff7f);
            }
        } else {
            if (vs->modifiers_state[0x45]) {
                vs->modifiers_state[0x45] = 0;
                press_key(vs, 0xff7f);
            }
        }
1327
    }
bellard authored
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
    if (is_graphic_console()) {
        if (keycode & 0x80)
            kbd_put_keycode(0xe0);
        if (down)
            kbd_put_keycode(keycode & 0x7f);
        else
            kbd_put_keycode(keycode | 0x80);
    } else {
        /* QEMU console emulation */
        if (down) {
            switch (keycode) {
            case 0x2a:                          /* Left Shift */
            case 0x36:                          /* Right Shift */
            case 0x1d:                          /* Left CTRL */
            case 0x9d:                          /* Right CTRL */
            case 0x38:                          /* Left ALT */
            case 0xb8:                          /* Right ALT */
                break;
            case 0xc8:
                kbd_put_keysym(QEMU_KEY_UP);
                break;
            case 0xd0:
                kbd_put_keysym(QEMU_KEY_DOWN);
                break;
            case 0xcb:
                kbd_put_keysym(QEMU_KEY_LEFT);
                break;
            case 0xcd:
                kbd_put_keysym(QEMU_KEY_RIGHT);
                break;
            case 0xd3:
                kbd_put_keysym(QEMU_KEY_DELETE);
                break;
            case 0xc7:
                kbd_put_keysym(QEMU_KEY_HOME);
                break;
            case 0xcf:
                kbd_put_keysym(QEMU_KEY_END);
                break;
            case 0xc9:
                kbd_put_keysym(QEMU_KEY_PAGEUP);
                break;
            case 0xd1:
                kbd_put_keysym(QEMU_KEY_PAGEDOWN);
                break;
            default:
                kbd_put_keysym(sym);
                break;
            }
        }
    }
bellard authored
1380
1381
}
1382
1383
static void key_event(VncState *vs, int down, uint32_t sym)
{
1384
1385
    int keycode;
1386
    if (sym >= 'A' && sym <= 'Z' && is_graphic_console())
1387
        sym = sym - 'A' + 'a';
1388
1389
    keycode = keysym2scancode(vs->vd->kbd_layout, sym & 0xFFFF);
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
    do_key_event(vs, down, keycode, sym);
}

static void ext_key_event(VncState *vs, int down,
                          uint32_t sym, uint16_t keycode)
{
    /* if the user specifies a keyboard layout, always use it */
    if (keyboard_layout)
        key_event(vs, down, sym);
    else
        do_key_event(vs, down, keycode, sym);
1401
1402
}
bellard authored
1403
static void framebuffer_update_request(VncState *vs, int incremental,
1404
1405
                                       int x_position, int y_position,
                                       int w, int h)
bellard authored
1406
{
1407
1408
1409
1410
1411
1412
1413
1414
    if (x_position > ds_get_width(vs->ds))
        x_position = ds_get_width(vs->ds);
    if (y_position > ds_get_height(vs->ds))
        y_position = ds_get_height(vs->ds);
    if (x_position + w >= ds_get_width(vs->ds))
        w = ds_get_width(vs->ds)  - x_position;
    if (y_position + h >= ds_get_height(vs->ds))
        h = ds_get_height(vs->ds) - y_position;
1415
bellard authored
1416
1417
    int i;
    vs->need_update = 1;
1418
    vs->force_update = 1;
bellard authored
1419
    if (!incremental) {
1420
        for (i = 0; i < h; i++) {
1421
1422
1423
            vnc_set_bits(vs->guest.dirty[y_position + i],
                         (ds_get_width(vs->ds) / 16), VNC_DIRTY_WORDS);
            vnc_set_bits(vs->server.dirty[y_position + i],
1424
                         (ds_get_width(vs->ds) / 16), VNC_DIRTY_WORDS);
1425
        }
bellard authored
1426
1427
1428
    }
}
1429
1430
1431
1432
1433
static void send_ext_key_event_ack(VncState *vs)
{
    vnc_write_u8(vs, 0);
    vnc_write_u8(vs, 0);
    vnc_write_u16(vs, 1);
1434
1435
    vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds), ds_get_height(vs->ds),
                           VNC_ENCODING_EXT_KEY_EVENT);
1436
1437
1438
    vnc_flush(vs);
}
1439
1440
1441
1442
1443
static void send_ext_audio_ack(VncState *vs)
{
    vnc_write_u8(vs, 0);
    vnc_write_u8(vs, 0);
    vnc_write_u16(vs, 1);
1444
1445
    vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds), ds_get_height(vs->ds),
                           VNC_ENCODING_AUDIO);
1446
1447
1448
    vnc_flush(vs);
}
bellard authored
1449
1450
1451
static void set_encodings(VncState *vs, int32_t *encodings, size_t n_encodings)
{
    int i;
1452
    unsigned int enc = 0;
bellard authored
1453
1454
    vnc_zlib_init(vs);
1455
    vs->features = 0;
1456
1457
1458
    vs->vnc_encoding = 0;
    vs->tight_compression = 9;
    vs->tight_quality = 9;
1459
    vs->absolute = -1;
bellard authored
1460
1461

    for (i = n_encodings - 1; i >= 0; i--) {
1462
1463
1464
        enc = encodings[i];
        switch (enc) {
        case VNC_ENCODING_RAW:
1465
            vs->vnc_encoding = enc;
1466
1467
            break;
        case VNC_ENCODING_COPYRECT:
1468
            vs->features |= VNC_FEATURE_COPYRECT_MASK;
1469
1470
1471
            break;
        case VNC_ENCODING_HEXTILE:
            vs->features |= VNC_FEATURE_HEXTILE_MASK;
1472
            vs->vnc_encoding = enc;
1473
            break;
1474
1475
1476
1477
        case VNC_ENCODING_ZLIB:
            vs->features |= VNC_FEATURE_ZLIB_MASK;
            vs->vnc_encoding = enc;
            break;
1478
1479
1480
1481
1482
1483
1484
        case VNC_ENCODING_DESKTOPRESIZE:
            vs->features |= VNC_FEATURE_RESIZE_MASK;
            break;
        case VNC_ENCODING_POINTER_TYPE_CHANGE:
            vs->features |= VNC_FEATURE_POINTER_TYPE_CHANGE_MASK;
            break;
        case VNC_ENCODING_EXT_KEY_EVENT:
1485
1486
            send_ext_key_event_ack(vs);
            break;
1487
        case VNC_ENCODING_AUDIO:
1488
1489
            send_ext_audio_ack(vs);
            break;
1490
1491
        case VNC_ENCODING_WMVi:
            vs->features |= VNC_FEATURE_WMVI_MASK;
1492
            break;
1493
1494
1495
1496
1497
1498
        case VNC_ENCODING_COMPRESSLEVEL0 ... VNC_ENCODING_COMPRESSLEVEL0 + 9:
            vs->tight_compression = (enc & 0x0F);
            break;
        case VNC_ENCODING_QUALITYLEVEL0 ... VNC_ENCODING_QUALITYLEVEL0 + 9:
            vs->tight_quality = (enc & 0x0F);
            break;
1499
1500
1501
1502
        default:
            VNC_DEBUG("Unknown encoding: %d (0x%.8x): %d\n", i, enc, enc);
            break;
        }
bellard authored
1503
    }
1504
1505

    check_pointer_type_change(vs, kbd_mouse_is_absolute());
bellard authored
1506
1507
}
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
static void set_pixel_conversion(VncState *vs)
{
    if ((vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) ==
        (vs->ds->surface->flags & QEMU_BIG_ENDIAN_FLAG) && 
        !memcmp(&(vs->clientds.pf), &(vs->ds->surface->pf), sizeof(PixelFormat))) {
        vs->write_pixels = vnc_write_pixels_copy;
        switch (vs->ds->surface->pf.bits_per_pixel) {
            case 8:
                vs->send_hextile_tile = send_hextile_tile_8;
                break;
            case 16:
                vs->send_hextile_tile = send_hextile_tile_16;
                break;
            case 32:
                vs->send_hextile_tile = send_hextile_tile_32;
                break;
        }
    } else {
        vs->write_pixels = vnc_write_pixels_generic;
        switch (vs->ds->surface->pf.bits_per_pixel) {
            case 8:
                vs->send_hextile_tile = send_hextile_tile_generic_8;
                break;
            case 16:
                vs->send_hextile_tile = send_hextile_tile_generic_16;
                break;
            case 32:
                vs->send_hextile_tile = send_hextile_tile_generic_32;
                break;
        }
    }
}
bellard authored
1541
static void set_pixel_format(VncState *vs,
1542
1543
1544
1545
                             int bits_per_pixel, int depth,
                             int big_endian_flag, int true_color_flag,
                             int red_max, int green_max, int blue_max,
                             int red_shift, int green_shift, int blue_shift)
bellard authored
1546
{
1547
    if (!true_color_flag) {
1548
        vnc_client_error(vs);
1549
1550
        return;
    }
bellard authored
1551
1552
    vs->clientds = *(vs->guest.ds);
1553
    vs->clientds.pf.rmax = red_max;
1554
    count_bits(vs->clientds.pf.rbits, red_max);
1555
1556
1557
    vs->clientds.pf.rshift = red_shift;
    vs->clientds.pf.rmask = red_max << red_shift;
    vs->clientds.pf.gmax = green_max;
1558
    count_bits(vs->clientds.pf.gbits, green_max);
1559
1560
1561
    vs->clientds.pf.gshift = green_shift;
    vs->clientds.pf.gmask = green_max << green_shift;
    vs->clientds.pf.bmax = blue_max;
1562
    count_bits(vs->clientds.pf.bbits, blue_max);
1563
1564
1565
1566
1567
1568
1569
1570
    vs->clientds.pf.bshift = blue_shift;
    vs->clientds.pf.bmask = blue_max << blue_shift;
    vs->clientds.pf.bits_per_pixel = bits_per_pixel;
    vs->clientds.pf.bytes_per_pixel = bits_per_pixel / 8;
    vs->clientds.pf.depth = bits_per_pixel == 32 ? 24 : bits_per_pixel;
    vs->clientds.flags = big_endian_flag ? QEMU_BIG_ENDIAN_FLAG : 0x00;

    set_pixel_conversion(vs);
bellard authored
1571
1572
1573
1574
1575

    vga_hw_invalidate();
    vga_hw_update();
}
1576
1577
1578
static void pixel_format_message (VncState *vs) {
    char pad[3] = { 0, 0, 0 };
1579
1580
    vnc_write_u8(vs, vs->ds->surface->pf.bits_per_pixel); /* bits-per-pixel */
    vnc_write_u8(vs, vs->ds->surface->pf.depth); /* depth */
1581
1582
1583
1584
1585
1586
1587

#ifdef WORDS_BIGENDIAN
    vnc_write_u8(vs, 1);             /* big-endian-flag */
#else
    vnc_write_u8(vs, 0);             /* big-endian-flag */
#endif
    vnc_write_u8(vs, 1);             /* true-color-flag */
1588
1589
1590
1591
1592
1593
1594
    vnc_write_u16(vs, vs->ds->surface->pf.rmax);     /* red-max */
    vnc_write_u16(vs, vs->ds->surface->pf.gmax);     /* green-max */
    vnc_write_u16(vs, vs->ds->surface->pf.bmax);     /* blue-max */
    vnc_write_u8(vs, vs->ds->surface->pf.rshift);    /* red-shift */
    vnc_write_u8(vs, vs->ds->surface->pf.gshift);    /* green-shift */
    vnc_write_u8(vs, vs->ds->surface->pf.bshift);    /* blue-shift */
    if (vs->ds->surface->pf.bits_per_pixel == 32)
1595
        vs->send_hextile_tile = send_hextile_tile_32;
1596
    else if (vs->ds->surface->pf.bits_per_pixel == 16)
1597
        vs->send_hextile_tile = send_hextile_tile_16;
1598
    else if (vs->ds->surface->pf.bits_per_pixel == 8)
1599
        vs->send_hextile_tile = send_hextile_tile_8;
1600
1601
    vs->clientds = *(vs->ds->surface);
    vs->clientds.flags |= ~QEMU_ALLOCATED_FLAG;
1602
1603
1604
1605
1606
    vs->write_pixels = vnc_write_pixels_copy;

    vnc_write(vs, pad, 3);           /* padding */
}
1607
1608
1609
1610
1611
static void vnc_dpy_setdata(DisplayState *ds)
{
    /* We don't have to do anything */
}
1612
static void vnc_colordepth(VncState *vs)
1613
{
1614
    if (vnc_has_feature(vs, VNC_FEATURE_WMVI)) {
1615
1616
1617
1618
        /* Sending a WMVi message to notify the client*/
        vnc_write_u8(vs, 0);  /* msg id */
        vnc_write_u8(vs, 0);
        vnc_write_u16(vs, 1); /* number of rects */
1619
1620
        vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds), 
                               ds_get_height(vs->ds), VNC_ENCODING_WMVi);
1621
1622
        pixel_format_message(vs);
        vnc_flush(vs);
1623
    } else {
1624
        set_pixel_conversion(vs);
1625
1626
1627
    }
}
1628
static int protocol_client_msg(VncState *vs, uint8_t *data, size_t len)
bellard authored
1629
1630
1631
1632
1633
1634
{
    int i;
    uint16_t limit;

    switch (data[0]) {
    case 0:
1635
1636
1637
1638
1639
1640
1641
1642
1643
        if (len == 1)
            return 20;

        set_pixel_format(vs, read_u8(data, 4), read_u8(data, 5),
                         read_u8(data, 6), read_u8(data, 7),
                         read_u16(data, 8), read_u16(data, 10),
                         read_u16(data, 12), read_u8(data, 14),
                         read_u8(data, 15), read_u8(data, 16));
        break;
bellard authored
1644
    case 2:
1645
1646
        if (len == 1)
            return 4;
bellard authored
1647
1648
        if (len == 4) {
1649
1650
1651
1652
1653
            limit = read_u16(data, 2);
            if (limit > 0)
                return 4 + (limit * 4);
        } else
            limit = read_u16(data, 2);
bellard authored
1654
1655
1656
1657
1658
        for (i = 0; i < limit; i++) {
            int32_t val = read_s32(data, 4 + (i * 4));
            memcpy(data + 4 + (i * 4), &val, sizeof(val));
        }
bellard authored
1659
1660
1661
        set_encodings(vs, (int32_t *)(data + 4), limit);
        break;
bellard authored
1662
    case 3:
1663
1664
        if (len == 1)
            return 10;
bellard authored
1665
1666
1667
1668
1669
        framebuffer_update_request(vs,
                                   read_u8(data, 1), read_u16(data, 2), read_u16(data, 4),
                                   read_u16(data, 6), read_u16(data, 8));
        break;
bellard authored
1670
    case 4:
1671
1672
        if (len == 1)
            return 8;
bellard authored
1673
1674
1675
        key_event(vs, read_u8(data, 1), read_u32(data, 4));
        break;
bellard authored
1676
    case 5:
1677
1678
        if (len == 1)
            return 6;
bellard authored
1679
1680
1681
        pointer_event(vs, read_u8(data, 1), read_u16(data, 2), read_u16(data, 4));
        break;
bellard authored
1682
    case 6:
1683
1684
        if (len == 1)
            return 8;
bellard authored
1685
1686
        if (len == 8) {
1687
1688
1689
1690
            uint32_t dlen = read_u32(data, 4);
            if (dlen > 0)
                return 8 + dlen;
        }
bellard authored
1691
1692
1693
        client_cut_text(vs, read_u32(data, 4), data + 8);
        break;
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
    case 255:
        if (len == 1)
            return 2;

        switch (read_u8(data, 1)) {
        case 0:
            if (len == 2)
                return 12;

            ext_key_event(vs, read_u16(data, 2),
                          read_u32(data, 4), read_u32(data, 8));
            break;
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
        case 1:
            if (len == 2)
                return 4;

            switch (read_u16 (data, 2)) {
            case 0:
                audio_add(vs);
                break;
            case 1:
                audio_del(vs);
                break;
            case 2:
                if (len == 4)
                    return 10;
                switch (read_u8(data, 4)) {
                case 0: vs->as.fmt = AUD_FMT_U8; break;
                case 1: vs->as.fmt = AUD_FMT_S8; break;
                case 2: vs->as.fmt = AUD_FMT_U16; break;
                case 3: vs->as.fmt = AUD_FMT_S16; break;
                case 4: vs->as.fmt = AUD_FMT_U32; break;
                case 5: vs->as.fmt = AUD_FMT_S32; break;
                default:
                    printf("Invalid audio format %d\n", read_u8(data, 4));
                    vnc_client_error(vs);
                    break;
                }
                vs->as.nchannels = read_u8(data, 5);
                if (vs->as.nchannels != 1 && vs->as.nchannels != 2) {
                    printf("Invalid audio channel coount %d\n",
                           read_u8(data, 5));
                    vnc_client_error(vs);
                    break;
                }
                vs->as.freq = read_u32(data, 6);
                break;
            default:
                printf ("Invalid audio message %d\n", read_u8(data, 4));
                vnc_client_error(vs);
                break;
            }
            break;
1748
1749
1750
1751
1752
1753
        default:
            printf("Msg: %d\n", read_u16(data, 0));
            vnc_client_error(vs);
            break;
        }
        break;
bellard authored
1754
    default:
1755
1756
1757
        printf("Msg: %d\n", data[0]);
        vnc_client_error(vs);
        break;
bellard authored
1758
    }
1759
bellard authored
1760
1761
1762
1763
    vnc_read_when(vs, protocol_client_msg, 1);
    return 0;
}
1764
static int protocol_client_init(VncState *vs, uint8_t *data, size_t len)
bellard authored
1765
{
1766
1767
    char buf[1024];
    int size;
bellard authored
1768
1769
1770
    vnc_write_u16(vs, ds_get_width(vs->ds));
    vnc_write_u16(vs, ds_get_height(vs->ds));
bellard authored
1771
1772
    pixel_format_message(vs);
bellard authored
1773
1774
1775
1776
1777
1778
1779
1780
    if (qemu_name)
        size = snprintf(buf, sizeof(buf), "QEMU (%s)", qemu_name);
    else
        size = snprintf(buf, sizeof(buf), "QEMU");

    vnc_write_u32(vs, size);
    vnc_write(vs, buf, size);
bellard authored
1781
1782
1783
1784
1785
1786
1787
    vnc_flush(vs);

    vnc_read_when(vs, protocol_client_msg, 1);

    return 0;
}
1788
1789
1790
1791
1792
void start_client_init(VncState *vs)
{
    vnc_read_when(vs, protocol_client_init, 1);
}
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
static void make_challenge(VncState *vs)
{
    int i;

    srand(time(NULL)+getpid()+getpid()*987654+rand());

    for (i = 0 ; i < sizeof(vs->challenge) ; i++)
        vs->challenge[i] = (int) (256.0*rand()/(RAND_MAX+1.0));
}
1803
static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len)
1804
{
1805
    unsigned char response[VNC_AUTH_CHALLENGE_SIZE];
1806
    int i, j, pwlen;
1807
    unsigned char key[8];
1808
1809
    if (!vs->vd->password || !vs->vd->password[0]) {
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
        VNC_DEBUG("No password configured on server");
        vnc_write_u32(vs, 1); /* Reject auth */
        if (vs->minor >= 8) {
            static const char err[] = "Authentication failed";
            vnc_write_u32(vs, sizeof(err));
            vnc_write(vs, err, sizeof(err));
        }
        vnc_flush(vs);
        vnc_client_error(vs);
        return 0;
1820
1821
1822
1823
1824
    }

    memcpy(response, vs->challenge, VNC_AUTH_CHALLENGE_SIZE);

    /* Calculate the expected challenge response */
1825
    pwlen = strlen(vs->vd->password);
1826
    for (i=0; i<sizeof(key); i++)
1827
        key[i] = i<pwlen ? vs->vd->password[i] : 0;
1828
1829
1830
1831
1832
1833
    deskey(key, EN0);
    for (j = 0; j < VNC_AUTH_CHALLENGE_SIZE; j += 8)
        des(response+j, response+j);

    /* Compare expected vs actual challenge response */
    if (memcmp(response, data, VNC_AUTH_CHALLENGE_SIZE) != 0) {
1834
1835
1836
1837
1838
1839
1840
1841
1842
        VNC_DEBUG("Client challenge reponse did not match\n");
        vnc_write_u32(vs, 1); /* Reject auth */
        if (vs->minor >= 8) {
            static const char err[] = "Authentication failed";
            vnc_write_u32(vs, sizeof(err));
            vnc_write(vs, err, sizeof(err));
        }
        vnc_flush(vs);
        vnc_client_error(vs);
1843
    } else {
1844
1845
1846
        VNC_DEBUG("Accepting VNC challenge response\n");
        vnc_write_u32(vs, 0); /* Accept auth */
        vnc_flush(vs);
1847
1848
        start_client_init(vs);
1849
1850
1851
1852
    }
    return 0;
}
1853
void start_auth_vnc(VncState *vs)
1854
1855
1856
1857
1858
1859
1860
{
    make_challenge(vs);
    /* Send client a 'random' challenge */
    vnc_write(vs, vs->challenge, sizeof(vs->challenge));
    vnc_flush(vs);

    vnc_read_when(vs, protocol_client_auth_vnc, sizeof(vs->challenge));
1861
1862
1863
}
1864
static int protocol_client_auth(VncState *vs, uint8_t *data, size_t len)
1865
1866
1867
{
    /* We only advertise 1 auth scheme at a time, so client
     * must pick the one we sent. Verify this */
1868
    if (data[0] != vs->vd->auth) { /* Reject auth */
1869
       VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]);
1870
1871
1872
1873
1874
1875
1876
1877
1878
       vnc_write_u32(vs, 1);
       if (vs->minor >= 8) {
           static const char err[] = "Authentication failed";
           vnc_write_u32(vs, sizeof(err));
           vnc_write(vs, err, sizeof(err));
       }
       vnc_client_error(vs);
    } else { /* Accept requested auth */
       VNC_DEBUG("Client requested auth %d\n", (int)data[0]);
1879
       switch (vs->vd->auth) {
1880
1881
       case VNC_AUTH_NONE:
           VNC_DEBUG("Accept auth none\n");
1882
1883
1884
1885
           if (vs->minor >= 8) {
               vnc_write_u32(vs, 0); /* Accept auth completion */
               vnc_flush(vs);
           }
1886
           start_client_init(vs);
1887
1888
1889
1890
           break;

       case VNC_AUTH_VNC:
           VNC_DEBUG("Start VNC auth\n");
1891
1892
           start_auth_vnc(vs);
           break;
1893
1894
#ifdef CONFIG_VNC_TLS
1895
1896
       case VNC_AUTH_VENCRYPT:
           VNC_DEBUG("Accept VeNCrypt auth\n");;
1897
1898
           start_auth_vencrypt(vs);
           break;
1899
1900
#endif /* CONFIG_VNC_TLS */
1901
1902
1903
1904
1905
1906
1907
#ifdef CONFIG_VNC_SASL
       case VNC_AUTH_SASL:
           VNC_DEBUG("Accept SASL auth\n");
           start_auth_sasl(vs);
           break;
#endif /* CONFIG_VNC_SASL */
1908
       default: /* Should not be possible, but just in case */
1909
           VNC_DEBUG("Reject auth %d server code bug\n", vs->vd->auth);
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
           vnc_write_u8(vs, 1);
           if (vs->minor >= 8) {
               static const char err[] = "Authentication failed";
               vnc_write_u32(vs, sizeof(err));
               vnc_write(vs, err, sizeof(err));
           }
           vnc_client_error(vs);
       }
    }
    return 0;
}
1922
static int protocol_version(VncState *vs, uint8_t *version, size_t len)
bellard authored
1923
1924
1925
1926
1927
1928
{
    char local[13];

    memcpy(local, version, 12);
    local[12] = 0;
1929
    if (sscanf(local, "RFB %03d.%03d\n", &vs->major, &vs->minor) != 2) {
1930
1931
1932
        VNC_DEBUG("Malformed protocol version %s\n", local);
        vnc_client_error(vs);
        return 0;
bellard authored
1933
    }
1934
1935
    VNC_DEBUG("Client request protocol version %d.%d\n", vs->major, vs->minor);
    if (vs->major != 3 ||
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
        (vs->minor != 3 &&
         vs->minor != 4 &&
         vs->minor != 5 &&
         vs->minor != 7 &&
         vs->minor != 8)) {
        VNC_DEBUG("Unsupported client version\n");
        vnc_write_u32(vs, VNC_AUTH_INVALID);
        vnc_flush(vs);
        vnc_client_error(vs);
        return 0;
1946
    }
1947
    /* Some broken clients report v3.4 or v3.5, which spec requires to be treated
1948
1949
     * as equivalent to v3.3 by servers
     */
1950
    if (vs->minor == 4 || vs->minor == 5)
1951
        vs->minor = 3;
1952
1953

    if (vs->minor == 3) {
1954
        if (vs->vd->auth == VNC_AUTH_NONE) {
1955
            VNC_DEBUG("Tell client auth none\n");
1956
            vnc_write_u32(vs, vs->vd->auth);
1957
            vnc_flush(vs);
1958
            start_client_init(vs);
1959
       } else if (vs->vd->auth == VNC_AUTH_VNC) {
1960
            VNC_DEBUG("Tell client VNC auth\n");
1961
            vnc_write_u32(vs, vs->vd->auth);
1962
1963
1964
            vnc_flush(vs);
            start_auth_vnc(vs);
       } else {
1965
            VNC_DEBUG("Unsupported auth %d for protocol 3.3\n", vs->vd->auth);
1966
1967
1968
1969
1970
            vnc_write_u32(vs, VNC_AUTH_INVALID);
            vnc_flush(vs);
            vnc_client_error(vs);
       }
    } else {
1971
1972
1973
1974
1975
        VNC_DEBUG("Telling client we support auth %d\n", vs->vd->auth);
        vnc_write_u8(vs, 1); /* num auth */
        vnc_write_u8(vs, vs->vd->auth);
        vnc_read_when(vs, protocol_client_auth, 1);
        vnc_flush(vs);
1976
    }
bellard authored
1977
1978
1979
1980

    return 0;
}
1981
static void vnc_connect(VncDisplay *vd, int csock)
1982
{
1983
1984
1985
1986
    VncState *vs = qemu_mallocz(sizeof(VncState));
    vs->csock = csock;

    VNC_DEBUG("New client on socket %d\n", csock);
1987
    dcl->idle = 0;
1988
1989
    socket_set_nonblock(vs->csock);
    qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, NULL, vs);
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002

    vs->vd = vd;
    vs->ds = vd->ds;
    vs->timer = qemu_new_timer(rt_clock, vnc_update_client, vs);
    vs->last_x = -1;
    vs->last_y = -1;

    vs->as.freq = 44100;
    vs->as.nchannels = 2;
    vs->as.fmt = AUD_FMT_S16;
    vs->as.endianness = 0;

    vnc_resize(vs);
2003
2004
2005
2006
    vnc_write(vs, "RFB 003.008\n", 12);
    vnc_flush(vs);
    vnc_read_when(vs, protocol_version, 12);
    vnc_update_client(vs);
2007
    reset_keys(vs);
2008
2009
2010

    vs->next = vd->clients;
    vd->clients = vs;
2011
2012
}
bellard authored
2013
2014
static void vnc_listen_read(void *opaque)
{
2015
    VncDisplay *vs = opaque;
bellard authored
2016
2017
2018
    struct sockaddr_in addr;
    socklen_t addrlen = sizeof(addr);
2019
2020
2021
    /* Catch-up */
    vga_hw_update();
2022
2023
2024
    int csock = accept(vs->lsock, (struct sockaddr *)&addr, &addrlen);
    if (csock != -1) {
        vnc_connect(vs, csock);
bellard authored
2025
2026
2027
    }
}
2028
void vnc_display_init(DisplayState *ds)
bellard authored
2029
{
2030
    VncDisplay *vs;
bellard authored
2031
2032

    vs = qemu_mallocz(sizeof(VncState));
2033
    dcl = qemu_mallocz(sizeof(DisplayChangeListener));
bellard authored
2034
2035

    ds->opaque = vs;
2036
    dcl->idle = 1;
2037
    vnc_display = vs;
bellard authored
2038
2039
2040
2041
2042

    vs->lsock = -1;

    vs->ds = ds;
2043
    if (keyboard_layout)
2044
        vs->kbd_layout = init_keyboard_layout(name2keysym, keyboard_layout);
2045
    else
2046
        vs->kbd_layout = init_keyboard_layout(name2keysym, "en-us");
bellard authored
2047
2048

    if (!vs->kbd_layout)
2049
        exit(1);
bellard authored
2050
2051
    dcl->dpy_copy = vnc_dpy_copy;
2052
2053
2054
2055
    dcl->dpy_update = vnc_dpy_update;
    dcl->dpy_resize = vnc_dpy_resize;
    dcl->dpy_setdata = vnc_dpy_setdata;
    register_displaychangelistener(ds, dcl);
2056
2057
}
2058
2059
2060
void vnc_display_close(DisplayState *ds)
{
2061
    VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2062
2063
2064
    if (!vs)
        return;
2065
    if (vs->display) {
2066
2067
        qemu_free(vs->display);
        vs->display = NULL;
2068
2069
    }
    if (vs->lsock != -1) {
2070
2071
2072
        qemu_set_fd_handler2(vs->lsock, NULL, NULL, NULL, NULL);
        close(vs->lsock);
        vs->lsock = -1;
2073
    }
2074
    vs->auth = VNC_AUTH_INVALID;
2075
#ifdef CONFIG_VNC_TLS
2076
    vs->subauth = VNC_AUTH_INVALID;
2077
    vs->tls.x509verify = 0;
2078
#endif
2079
2080
2081
2082
}

int vnc_display_password(DisplayState *ds, const char *password)
{
2083
    VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2084
2085

    if (vs->password) {
2086
2087
        qemu_free(vs->password);
        vs->password = NULL;
2088
2089
    }
    if (password && password[0]) {
2090
2091
        if (!(vs->password = qemu_strdup(password)))
            return -1;
2092
2093
2094
    }

    return 0;
2095
2096
}
2097
int vnc_display_open(DisplayState *ds, const char *display)
2098
{
2099
    VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2100
2101
    const char *options;
    int password = 0;
2102
    int reverse = 0;
2103
    int to_port = 0;
2104
#ifdef CONFIG_VNC_TLS
2105
    int tls = 0, x509 = 0;
2106
#endif
2107
2108
2109
2110
#ifdef CONFIG_VNC_SASL
    int sasl = 0;
    int saslErr;
#endif
2111
    int acl = 0;
2112
2113
    if (!vnc_display)
2114
        return -1;
2115
    vnc_display_close(ds);
2116
    if (strcmp(display, "none") == 0)
2117
        return 0;
bellard authored
2118
2119
    if (!(vs->display = strdup(display)))
2120
        return -1;
2121
2122
2123

    options = display;
    while ((options = strchr(options, ','))) {
2124
2125
2126
2127
2128
2129
        options++;
        if (strncmp(options, "password", 8) == 0) {
            password = 1; /* Require password auth */
        } else if (strncmp(options, "reverse", 7) == 0) {
            reverse = 1;
        } else if (strncmp(options, "to=", 3) == 0) {
2130
            to_port = atoi(options+3) + 5900;
2131
#ifdef CONFIG_VNC_SASL
2132
2133
        } else if (strncmp(options, "sasl", 4) == 0) {
            sasl = 1; /* Require SASL auth */
2134
#endif
2135
#ifdef CONFIG_VNC_TLS
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
        } else if (strncmp(options, "tls", 3) == 0) {
            tls = 1; /* Require TLS */
        } else if (strncmp(options, "x509", 4) == 0) {
            char *start, *end;
            x509 = 1; /* Require x509 certificates */
            if (strncmp(options, "x509verify", 10) == 0)
                vs->tls.x509verify = 1; /* ...and verify client certs */

            /* Now check for 'x509=/some/path' postfix
             * and use that to setup x509 certificate/key paths */
            start = strchr(options, '=');
            end = strchr(options, ',');
            if (start && (!end || (start < end))) {
                int len = end ? end-(start+1) : strlen(start+1);
                char *path = qemu_strndup(start + 1, len);

                VNC_DEBUG("Trying certificate path '%s'\n", path);
                if (vnc_tls_set_x509_creds_dir(vs, path) < 0) {
                    fprintf(stderr, "Failed to find x509 certificates/keys in %s\n", path);
                    qemu_free(path);
                    qemu_free(vs->display);
                    vs->display = NULL;
                    return -1;
                }
                qemu_free(path);
            } else {
                fprintf(stderr, "No certificate path provided\n");
                qemu_free(vs->display);
                vs->display = NULL;
                return -1;
            }
2167
#endif
2168
2169
2170
        } else if (strncmp(options, "acl", 3) == 0) {
            acl = 1;
        }
2171
2172
    }
2173
2174
#ifdef CONFIG_VNC_TLS
    if (acl && x509 && vs->tls.x509verify) {
2175
2176
2177
2178
        if (!(vs->tls.acl = qemu_acl_init("vnc.x509dname"))) {
            fprintf(stderr, "Failed to create x509 dname ACL\n");
            exit(1);
        }
2179
2180
2181
2182
    }
#endif
#ifdef CONFIG_VNC_SASL
    if (acl && sasl) {
2183
2184
2185
2186
        if (!(vs->sasl.acl = qemu_acl_init("vnc.username"))) {
            fprintf(stderr, "Failed to create username ACL\n");
            exit(1);
        }
2187
2188
2189
    }
#endif
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
    /*
     * Combinations we support here:
     *
     *  - no-auth                (clear text, no auth)
     *  - password               (clear text, weak auth)
     *  - sasl                   (encrypt, good auth *IF* using Kerberos via GSSAPI)
     *  - tls                    (encrypt, weak anonymous creds, no auth)
     *  - tls + password         (encrypt, weak anonymous creds, weak auth)
     *  - tls + sasl             (encrypt, weak anonymous creds, good auth)
     *  - tls + x509             (encrypt, good x509 creds, no auth)
     *  - tls + x509 + password  (encrypt, good x509 creds, weak auth)
     *  - tls + x509 + sasl      (encrypt, good x509 creds, good auth)
     *
     * NB1. TLS is a stackable auth scheme.
     * NB2. the x509 schemes have option to validate a client cert dname
     */
2206
    if (password) {
2207
#ifdef CONFIG_VNC_TLS
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
        if (tls) {
            vs->auth = VNC_AUTH_VENCRYPT;
            if (x509) {
                VNC_DEBUG("Initializing VNC server with x509 password auth\n");
                vs->subauth = VNC_AUTH_VENCRYPT_X509VNC;
            } else {
                VNC_DEBUG("Initializing VNC server with TLS password auth\n");
                vs->subauth = VNC_AUTH_VENCRYPT_TLSVNC;
            }
        } else {
2218
#endif /* CONFIG_VNC_TLS */
2219
2220
            VNC_DEBUG("Initializing VNC server with password auth\n");
            vs->auth = VNC_AUTH_VNC;
2221
#ifdef CONFIG_VNC_TLS
2222
2223
            vs->subauth = VNC_AUTH_INVALID;
        }
2224
2225
2226
2227
2228
2229
2230
#endif /* CONFIG_VNC_TLS */
#ifdef CONFIG_VNC_SASL
    } else if (sasl) {
#ifdef CONFIG_VNC_TLS
        if (tls) {
            vs->auth = VNC_AUTH_VENCRYPT;
            if (x509) {
2231
                VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
2232
2233
                vs->subauth = VNC_AUTH_VENCRYPT_X509SASL;
            } else {
2234
                VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
2235
2236
2237
2238
                vs->subauth = VNC_AUTH_VENCRYPT_TLSSASL;
            }
        } else {
#endif /* CONFIG_VNC_TLS */
2239
            VNC_DEBUG("Initializing VNC server with SASL auth\n");
2240
2241
2242
2243
2244
2245
            vs->auth = VNC_AUTH_SASL;
#ifdef CONFIG_VNC_TLS
            vs->subauth = VNC_AUTH_INVALID;
        }
#endif /* CONFIG_VNC_TLS */
#endif /* CONFIG_VNC_SASL */
2246
    } else {
2247
#ifdef CONFIG_VNC_TLS
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
        if (tls) {
            vs->auth = VNC_AUTH_VENCRYPT;
            if (x509) {
                VNC_DEBUG("Initializing VNC server with x509 no auth\n");
                vs->subauth = VNC_AUTH_VENCRYPT_X509NONE;
            } else {
                VNC_DEBUG("Initializing VNC server with TLS no auth\n");
                vs->subauth = VNC_AUTH_VENCRYPT_TLSNONE;
            }
        } else {
2258
#endif
2259
2260
            VNC_DEBUG("Initializing VNC server with no auth\n");
            vs->auth = VNC_AUTH_NONE;
2261
#ifdef CONFIG_VNC_TLS
2262
2263
            vs->subauth = VNC_AUTH_INVALID;
        }
2264
#endif
2265
    }
bellard authored
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
#ifdef CONFIG_VNC_SASL
    if ((saslErr = sasl_server_init(NULL, "qemu")) != SASL_OK) {
        fprintf(stderr, "Failed to initialize SASL auth %s",
                sasl_errstring(saslErr, NULL, NULL));
        free(vs->display);
        vs->display = NULL;
        return -1;
    }
#endif
2277
    if (reverse) {
2278
2279
2280
2281
2282
2283
        /* connect to viewer */
        if (strncmp(display, "unix:", 5) == 0)
            vs->lsock = unix_connect(display+5);
        else
            vs->lsock = inet_connect(display, SOCK_STREAM);
        if (-1 == vs->lsock) {
2284
2285
2286
2287
            free(vs->display);
            vs->display = NULL;
            return -1;
        } else {
2288
            int csock = vs->lsock;
2289
            vs->lsock = -1;
2290
            vnc_connect(vs, csock);
2291
        }
2292
        return 0;
bellard authored
2293
2294
2295
2296
2297
2298
    } else {
        /* listen for connects */
        char *dpy;
        dpy = qemu_malloc(256);
        if (strncmp(display, "unix:", 5) == 0) {
blueswir1 authored
2299
            pstrcpy(dpy, 256, "unix:");
2300
            vs->lsock = unix_listen(display+5, dpy+5, 256-5);
2301
2302
2303
2304
2305
        } else {
            vs->lsock = inet_listen(display, dpy, 256, SOCK_STREAM, 5900);
        }
        if (-1 == vs->lsock) {
            free(dpy);
2306
            return -1;
2307
2308
2309
2310
        } else {
            free(vs->display);
            vs->display = dpy;
        }
bellard authored
2311
    }
2312
    return qemu_set_fd_handler2(vs->lsock, NULL, vnc_listen_read, NULL, vs);
bellard authored
2313
}