1
2
/*
* QEMU VNC display driver
ths
authored
18 years ago
3
*
4
5
* Copyright ( C ) 2006 Anthony Liguori < anthony @ codemonkey . ws >
* Copyright ( C ) 2006 Fabrice Bellard
6
* Copyright ( C ) 2009 Red Hat , Inc
ths
authored
18 years ago
7
*
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
* Permission is hereby granted , free of charge , to any person obtaining a copy
* of this software and associated documentation files ( the "Software" ), to deal
* in the Software without restriction , including without limitation the rights
* to use , copy , modify , merge , publish , distribute , sublicense , and / or sell
* copies of the Software , and to permit persons to whom the Software is
* furnished to do so , subject to the following conditions :
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software .
*
* THE SOFTWARE IS PROVIDED "AS IS" , WITHOUT WARRANTY OF ANY KIND , EXPRESS OR
* IMPLIED , INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY ,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT . IN NO EVENT SHALL
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM , DAMAGES OR OTHER
* LIABILITY , WHETHER IN AN ACTION OF CONTRACT , TORT OR OTHERWISE , ARISING FROM ,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE .
*/
27
# include "vnc.h"
28
# include "sysemu.h"
29
# include "qemu_socket.h"
30
# include "qemu-timer.h"
31
# include "acl.h"
32
33
34
35
# define VNC_REFRESH_INTERVAL ( 1000 / 30 )
# include "vnc_keysym.h"
ths
authored
18 years ago
36
37
# include "d3des.h"
38
39
40
41
42
43
# define count_bits ( c , v ) { \
for ( c = 0 ; v ; v >>= 1 ) \
{ \
c += v & 1 ; \
} \
}
ths
authored
18 years ago
44
45
46
static VncDisplay * vnc_display ; /* needed for info vnc */
47
static DisplayChangeListener * dcl ;
48
49
50
51
52
53
54
55
static char * addr_to_string ( const char * format ,
struct sockaddr_storage * sa ,
socklen_t salen ) {
char * addr ;
char host [ NI_MAXHOST ];
char serv [ NI_MAXSERV ];
int err ;
56
size_t addrlen ;
57
58
59
60
61
62
63
64
65
66
if (( err = getnameinfo (( struct sockaddr * ) sa , salen ,
host , sizeof ( host ),
serv , sizeof ( serv ),
NI_NUMERICHOST | NI_NUMERICSERV )) != 0 ) {
VNC_DEBUG ( "Cannot resolve address %d: %s \n " ,
err , gai_strerror ( err ));
return NULL ;
}
67
68
69
70
71
72
/* Enough for the existing format + the 2 vars we ' re
* subsituting in . */
addrlen = strlen ( format ) + strlen ( host ) + strlen ( serv );
addr = qemu_malloc ( addrlen + 1 );
snprintf ( addr , addrlen , format , host , serv );
addr [ addrlen ] = '\0' ;
73
74
75
76
return addr ;
}
77
78
char * vnc_socket_local_addr ( const char * format , int fd ) {
79
80
81
82
83
84
85
86
87
88
struct sockaddr_storage sa ;
socklen_t salen ;
salen = sizeof ( sa );
if ( getsockname ( fd , ( struct sockaddr * ) & sa , & salen ) < 0 )
return NULL ;
return addr_to_string ( format , & sa , salen );
}
89
90
char * vnc_socket_remote_addr ( const char * format , int fd ) {
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
struct sockaddr_storage sa ;
socklen_t salen ;
salen = sizeof ( sa );
if ( getpeername ( fd , ( struct sockaddr * ) & sa , & salen ) < 0 )
return NULL ;
return addr_to_string ( format , & sa , salen );
}
static const char * vnc_auth_name ( VncDisplay * vd ) {
switch ( vd -> auth ) {
case VNC_AUTH_INVALID :
return "invalid" ;
case VNC_AUTH_NONE :
return "none" ;
case VNC_AUTH_VNC :
return "vnc" ;
case VNC_AUTH_RA2 :
return "ra2" ;
case VNC_AUTH_RA2NE :
return "ra2ne" ;
case VNC_AUTH_TIGHT :
return "tight" ;
case VNC_AUTH_ULTRA :
return "ultra" ;
case VNC_AUTH_TLS :
return "tls" ;
case VNC_AUTH_VENCRYPT :
# ifdef CONFIG_VNC_TLS
switch ( vd -> subauth ) {
case VNC_AUTH_VENCRYPT_PLAIN :
return "vencrypt+plain" ;
case VNC_AUTH_VENCRYPT_TLSNONE :
return "vencrypt+tls+none" ;
case VNC_AUTH_VENCRYPT_TLSVNC :
return "vencrypt+tls+vnc" ;
case VNC_AUTH_VENCRYPT_TLSPLAIN :
return "vencrypt+tls+plain" ;
case VNC_AUTH_VENCRYPT_X509NONE :
return "vencrypt+x509+none" ;
case VNC_AUTH_VENCRYPT_X509VNC :
return "vencrypt+x509+vnc" ;
case VNC_AUTH_VENCRYPT_X509PLAIN :
return "vencrypt+x509+plain" ;
136
137
138
139
case VNC_AUTH_VENCRYPT_TLSSASL :
return "vencrypt+tls+sasl" ;
case VNC_AUTH_VENCRYPT_X509SASL :
return "vencrypt+x509+sasl" ;
140
141
142
143
144
145
default :
return "vencrypt" ;
}
# else
return "vencrypt" ;
# endif
146
case VNC_AUTH_SASL :
147
return "sasl" ;
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
}
return "unknown" ;
}
static void do_info_vnc_client ( Monitor * mon , VncState * client )
{
char * clientAddr =
vnc_socket_remote_addr ( " address: %s:%s \n " ,
client -> csock );
if ( ! clientAddr )
return ;
monitor_printf ( mon , "Client: \n " );
monitor_printf ( mon , "%s" , clientAddr );
free ( clientAddr );
163
164
165
# ifdef CONFIG_VNC_TLS
if ( client -> tls . session &&
166
167
client -> tls . dname )
monitor_printf ( mon , " x509 dname: %s \n " , client -> tls . dname );
168
else
169
monitor_printf ( mon , " x509 dname: none \n " );
170
171
172
# endif
# ifdef CONFIG_VNC_SASL
if ( client -> sasl . conn &&
173
174
client -> sasl . username )
monitor_printf ( mon , " username: %s \n " , client -> sasl . username );
175
else
176
monitor_printf ( mon , " username: none \n " );
177
# endif
178
179
}
180
void do_info_vnc ( Monitor * mon )
181
{
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
if ( vnc_display == NULL || vnc_display -> display == NULL ) {
monitor_printf ( mon , "Server: disabled \n " );
} else {
char * serverAddr = vnc_socket_local_addr ( " address: %s:%s \n " ,
vnc_display -> lsock );
if ( ! serverAddr )
return ;
monitor_printf ( mon , "Server: \n " );
monitor_printf ( mon , "%s" , serverAddr );
free ( serverAddr );
monitor_printf ( mon , " auth: %s \n " , vnc_auth_name ( vnc_display ));
if ( vnc_display -> clients ) {
VncState * client = vnc_display -> clients ;
while ( client ) {
do_info_vnc_client ( mon , client );
client = client -> next ;
}
} else {
monitor_printf ( mon , "Client: none \n " );
}
205
206
207
}
}
208
209
210
211
static inline uint32_t vnc_has_feature ( VncState * vs , int feature ) {
return ( vs -> features & ( 1 << feature ));
}
212
213
214
215
216
217
218
219
220
/* TODO
1 ) Get the queue working for IO .
2 ) there is some weirdness when using the - S option ( the screen is grey
and not totally invalidated
3 ) resolutions > 1024
*/
static void vnc_update_client ( void * opaque );
221
static void vnc_colordepth ( VncState * vs );
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
static inline void vnc_set_bit ( uint32_t * d , int k )
{
d [ k >> 5 ] |= 1 << ( k & 0x1f );
}
static inline void vnc_clear_bit ( uint32_t * d , int k )
{
d [ k >> 5 ] &= ~ ( 1 << ( k & 0x1f ));
}
static inline void vnc_set_bits ( uint32_t * d , int n , int nb_words )
{
int j ;
j = 0 ;
while ( n >= 32 ) {
d [ j ++ ] = - 1 ;
n -= 32 ;
}
ths
authored
18 years ago
242
if ( n > 0 )
243
244
245
246
247
248
249
250
251
252
d [ j ++ ] = ( 1 << n ) - 1 ;
while ( j < nb_words )
d [ j ++ ] = 0 ;
}
static inline int vnc_get_bit ( const uint32_t * d , int k )
{
return ( d [ k >> 5 ] >> ( k & 0x1f )) & 1 ;
}
ths
authored
18 years ago
253
static inline int vnc_and_bits ( const uint32_t * d1 , const uint32_t * d2 ,
254
255
256
257
258
259
260
261
262
263
int nb_words )
{
int i ;
for ( i = 0 ; i < nb_words ; i ++ ) {
if (( d1 [ i ] & d2 [ i ]) != 0 )
return 1 ;
}
return 0 ;
}
264
static void vnc_update ( VncState * vs , int x , int y , int w , int h )
265
{
266
struct VncSurface * s = & vs -> guest ;
267
268
269
270
int i ;
h += y ;
271
272
273
274
275
276
277
/* round x down to ensure the loop only spans one 16 - pixel block per ,
iteration . otherwise , if ( x % 16 ) != 0 , the last iteration may span
two 16 - pixel blocks but we only mark the first as dirty
*/
w += ( x % 16 );
x -= ( x % 16 );
278
279
280
281
x = MIN ( x , s -> ds -> width );
y = MIN ( y , s -> ds -> height );
w = MIN ( x + w , s -> ds -> width ) - x ;
h = MIN ( h , s -> ds -> height );
282
283
for (; y < h ; y ++ )
284
for ( i = 0 ; i < w ; i += 16 )
285
vnc_set_bit ( s -> dirty [ y ], ( x + i ) / 16 );
286
287
}
288
289
290
291
292
293
294
295
296
297
static void vnc_dpy_update ( DisplayState * ds , int x , int y , int w , int h )
{
VncDisplay * vd = ds -> opaque ;
VncState * vs = vd -> clients ;
while ( vs != NULL ) {
vnc_update ( vs , x , y , w , h );
vs = vs -> next ;
}
}
298
static void vnc_framebuffer_update ( VncState * vs , int x , int y , int w , int h ,
299
int32_t encoding )
300
301
302
303
304
305
306
307
308
{
vnc_write_u16 ( vs , x );
vnc_write_u16 ( vs , y );
vnc_write_u16 ( vs , w );
vnc_write_u16 ( vs , h );
vnc_write_s32 ( vs , encoding );
}
309
void buffer_reserve ( Buffer * buffer , size_t len )
310
311
{
if (( buffer -> capacity - buffer -> offset ) < len ) {
312
313
314
315
316
317
buffer -> capacity += ( len + 1024 );
buffer -> buffer = qemu_realloc ( buffer -> buffer , buffer -> capacity );
if ( buffer -> buffer == NULL ) {
fprintf ( stderr , "vnc: out of memory \n " );
exit ( 1 );
}
318
319
320
}
}
321
int buffer_empty ( Buffer * buffer )
322
323
324
325
{
return buffer -> offset == 0 ;
}
326
uint8_t * buffer_end ( Buffer * buffer )
327
328
329
330
{
return buffer -> buffer + buffer -> offset ;
}
331
void buffer_reset ( Buffer * buffer )
332
{
333
buffer -> offset = 0 ;
334
335
}
336
void buffer_append ( Buffer * buffer , const void * data , size_t len )
337
338
339
340
341
{
memcpy ( buffer -> buffer + buffer -> offset , data , len );
buffer -> offset += len ;
}
342
static void vnc_resize ( VncState * vs )
343
{
344
DisplayState * ds = vs -> ds ;
ths
authored
18 years ago
345
int size_changed ;
346
347
348
349
350
/* guest surface */
if ( ! vs -> guest . ds )
vs -> guest . ds = qemu_mallocz ( sizeof ( * vs -> guest . ds ));
if ( ds_get_bytes_per_pixel ( ds ) != vs -> guest . ds -> pf . bytes_per_pixel )
351
console_color_init ( ds );
352
vnc_colordepth ( vs );
353
354
355
size_changed = ds_get_width ( ds ) != vs -> guest . ds -> width ||
ds_get_height ( ds ) != vs -> guest . ds -> height ;
* ( vs -> guest . ds ) = * ( ds -> surface );
356
if ( size_changed ) {
357
if ( vs -> csock != - 1 && vnc_has_feature ( vs , VNC_FEATURE_RESIZE )) {
358
359
360
vnc_write_u8 ( vs , 0 ); /* msg id */
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 ); /* number of rects */
361
362
vnc_framebuffer_update ( vs , 0 , 0 , ds_get_width ( ds ), ds_get_height ( ds ),
VNC_ENCODING_DESKTOPRESIZE );
363
364
vnc_flush ( vs );
}
365
}
366
memset ( vs -> guest . dirty , 0xFF , sizeof ( vs -> guest . dirty ));
367
368
369
370
371
372
373
374
375
376
377
378
379
380
/* server surface */
if ( ! vs -> server . ds ) {
vs -> server . ds = default_allocator . create_displaysurface ( ds_get_width ( ds ),
ds_get_height ( ds ));
} else {
default_allocator . resize_displaysurface ( vs -> server . ds ,
ds_get_width ( ds ), ds_get_height ( ds ));
}
if ( vs -> server . ds -> data == NULL ) {
fprintf ( stderr , "vnc: memory allocation failed \n " );
exit ( 1 );
}
memset ( vs -> server . dirty , 0xFF , sizeof ( vs -> guest . dirty ));
381
382
}
383
384
385
386
387
388
389
390
391
392
static void vnc_dpy_resize ( DisplayState * ds )
{
VncDisplay * vd = ds -> opaque ;
VncState * vs = vd -> clients ;
while ( vs != NULL ) {
vnc_resize ( vs );
vs = vs -> next ;
}
}
393
394
395
396
397
398
399
400
401
/* fastest code */
static void vnc_write_pixels_copy ( VncState * vs , void * pixels , int size )
{
vnc_write ( vs , pixels , size );
}
/* slowest but generic code. */
static void vnc_convert_pixel ( VncState * vs , uint8_t * buf , uint32_t v )
{
402
403
uint8_t r , g , b ;
404
405
406
407
408
409
r = (((( v & vs -> server . ds -> pf . rmask ) >> vs -> server . ds -> pf . rshift ) << vs -> clientds . pf . rbits ) >>
vs -> server . ds -> pf . rbits );
g = (((( v & vs -> server . ds -> pf . gmask ) >> vs -> server . ds -> pf . gshift ) << vs -> clientds . pf . gbits ) >>
vs -> server . ds -> pf . gbits );
b = (((( v & vs -> server . ds -> pf . bmask ) >> vs -> server . ds -> pf . bshift ) << vs -> clientds . pf . bbits ) >>
vs -> server . ds -> pf . bbits );
410
411
412
413
v = ( r << vs -> clientds . pf . rshift ) |
( g << vs -> clientds . pf . gshift ) |
( b << vs -> clientds . pf . bshift );
switch ( vs -> clientds . pf . bytes_per_pixel ) {
414
415
416
417
case 1 :
buf [ 0 ] = v ;
break ;
case 2 :
418
if ( vs -> clientds . flags & QEMU_BIG_ENDIAN_FLAG ) {
419
420
421
422
423
424
425
426
427
buf [ 0 ] = v >> 8 ;
buf [ 1 ] = v ;
} else {
buf [ 1 ] = v >> 8 ;
buf [ 0 ] = v ;
}
break ;
default :
case 4 :
428
if ( vs -> clientds . flags & QEMU_BIG_ENDIAN_FLAG ) {
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
buf [ 0 ] = v >> 24 ;
buf [ 1 ] = v >> 16 ;
buf [ 2 ] = v >> 8 ;
buf [ 3 ] = v ;
} else {
buf [ 3 ] = v >> 24 ;
buf [ 2 ] = v >> 16 ;
buf [ 1 ] = v >> 8 ;
buf [ 0 ] = v ;
}
break ;
}
}
static void vnc_write_pixels_generic ( VncState * vs , void * pixels1 , int size )
{
uint8_t buf [ 4 ];
447
if ( vs -> server . ds -> pf . bytes_per_pixel == 4 ) {
448
449
450
451
452
uint32_t * pixels = pixels1 ;
int n , i ;
n = size >> 2 ;
for ( i = 0 ; i < n ; i ++ ) {
vnc_convert_pixel ( vs , buf , pixels [ i ]);
453
vnc_write ( vs , buf , vs -> clientds . pf . bytes_per_pixel );
454
}
455
} else if ( vs -> server . ds -> pf . bytes_per_pixel == 2 ) {
456
457
458
459
460
uint16_t * pixels = pixels1 ;
int n , i ;
n = size >> 1 ;
for ( i = 0 ; i < n ; i ++ ) {
vnc_convert_pixel ( vs , buf , pixels [ i ]);
461
vnc_write ( vs , buf , vs -> clientds . pf . bytes_per_pixel );
462
}
463
} else if ( vs -> server . ds -> pf . bytes_per_pixel == 1 ) {
464
465
466
467
468
uint8_t * pixels = pixels1 ;
int n , i ;
n = size ;
for ( i = 0 ; i < n ; i ++ ) {
vnc_convert_pixel ( vs , buf , pixels [ i ]);
469
vnc_write ( vs , buf , vs -> clientds . pf . bytes_per_pixel );
470
471
472
}
} else {
fprintf ( stderr , "vnc_write_pixels_generic: VncState color depth not supported \n " );
473
474
475
}
}
476
477
478
static void send_framebuffer_update_raw ( VncState * vs , int x , int y , int w , int h )
{
int i ;
ths
authored
17 years ago
479
uint8_t * row ;
480
481
row = vs -> server . ds -> data + y * ds_get_linesize ( vs -> ds ) + x * ds_get_bytes_per_pixel ( vs -> ds );
482
for ( i = 0 ; i < h ; i ++ ) {
483
484
vs -> write_pixels ( vs , row , w * ds_get_bytes_per_pixel ( vs -> ds ));
row += ds_get_linesize ( vs -> ds );
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
}
}
static void hextile_enc_cord ( uint8_t * ptr , int x , int y , int w , int h )
{
ptr [ 0 ] = (( x & 0x0F ) << 4 ) | ( y & 0x0F );
ptr [ 1 ] = ((( w - 1 ) & 0x0F ) << 4 ) | (( h - 1 ) & 0x0F );
}
# define BPP 8
# include "vnchextile.h"
# undef BPP
# define BPP 16
# include "vnchextile.h"
# undef BPP
# define BPP 32
# include "vnchextile.h"
# undef BPP
506
# define GENERIC
507
508
509
510
511
512
513
514
515
516
517
518
# define BPP 8
# include "vnchextile.h"
# undef BPP
# undef GENERIC
# define GENERIC
# define BPP 16
# include "vnchextile.h"
# undef BPP
# undef GENERIC
# define GENERIC
519
520
521
522
523
# define BPP 32
# include "vnchextile.h"
# undef BPP
# undef GENERIC
524
525
526
527
static void send_framebuffer_update_hextile ( VncState * vs , int x , int y , int w , int h )
{
int i , j ;
int has_fg , has_bg ;
528
uint8_t * last_fg , * last_bg ;
529
530
531
last_fg = ( uint8_t * ) qemu_malloc ( vs -> server . ds -> pf . bytes_per_pixel );
last_bg = ( uint8_t * ) qemu_malloc ( vs -> server . ds -> pf . bytes_per_pixel );
532
533
has_fg = has_bg = 0 ;
for ( j = y ; j < ( y + h ); j += 16 ) {
534
for ( i = x ; i < ( x + w ); i += 16 ) {
ths
authored
18 years ago
535
vs -> send_hextile_tile ( vs , i , j ,
536
MIN ( 16 , x + w - i ), MIN ( 16 , y + h - j ),
537
last_bg , last_fg , & has_bg , & has_fg );
538
}
539
}
540
541
542
free ( last_fg );
free ( last_bg );
543
544
}
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
static void vnc_zlib_init ( VncState * vs )
{
int i ;
for ( i = 0 ; i < ( sizeof ( vs -> zlib_stream ) / sizeof ( z_stream )); i ++ )
vs -> zlib_stream [ i ]. opaque = NULL ;
}
static void vnc_zlib_start ( VncState * vs )
{
buffer_reset ( & vs -> zlib );
// make the output buffer be the zlib buffer , so we can compress it later
vs -> zlib_tmp = vs -> output ;
vs -> output = vs -> zlib ;
}
static int vnc_zlib_stop ( VncState * vs , int stream_id )
{
z_streamp zstream = & vs -> zlib_stream [ stream_id ];
int previous_out ;
// switch back to normal output / zlib buffers
vs -> zlib = vs -> output ;
vs -> output = vs -> zlib_tmp ;
// compress the zlib buffer
// initialize the stream
// XXX need one stream per session
if ( zstream -> opaque != vs ) {
int err ;
VNC_DEBUG ( "VNC: initializing zlib stream %d \n " , stream_id );
VNC_DEBUG ( "VNC: opaque = %p | vs = %p \n " , zstream -> opaque , vs );
zstream -> zalloc = Z_NULL ;
zstream -> zfree = Z_NULL ;
err = deflateInit2 ( zstream , vs -> tight_compression , Z_DEFLATED , MAX_WBITS ,
MAX_MEM_LEVEL , Z_DEFAULT_STRATEGY );
if ( err != Z_OK ) {
fprintf ( stderr , "VNC: error initializing zlib \n " );
return - 1 ;
}
zstream -> opaque = vs ;
}
// XXX what to do if tight_compression changed in between ?
// reserve memory in output buffer
buffer_reserve ( & vs -> output , vs -> zlib . offset + 64 );
// set pointers
zstream -> next_in = vs -> zlib . buffer ;
zstream -> avail_in = vs -> zlib . offset ;
zstream -> next_out = vs -> output . buffer + vs -> output . offset ;
zstream -> avail_out = vs -> output . capacity - vs -> output . offset ;
zstream -> data_type = Z_BINARY ;
previous_out = zstream -> total_out ;
// start encoding
if ( deflate ( zstream , Z_SYNC_FLUSH ) != Z_OK ) {
fprintf ( stderr , "VNC: error during zlib compression \n " );
return - 1 ;
}
vs -> output . offset = vs -> output . capacity - zstream -> avail_out ;
return zstream -> total_out - previous_out ;
}
static void send_framebuffer_update_zlib ( VncState * vs , int x , int y , int w , int h )
{
int old_offset , new_offset , bytes_written ;
vnc_framebuffer_update ( vs , x , y , w , h , VNC_ENCODING_ZLIB );
// remember where we put in the follow - up size
old_offset = vs -> output . offset ;
vnc_write_s32 ( vs , 0 );
// compress the stream
vnc_zlib_start ( vs );
send_framebuffer_update_raw ( vs , x , y , w , h );
bytes_written = vnc_zlib_stop ( vs , 0 );
if ( bytes_written == - 1 )
return ;
// hack in the size
new_offset = vs -> output . offset ;
vs -> output . offset = old_offset ;
vnc_write_u32 ( vs , bytes_written );
vs -> output . offset = new_offset ;
}
641
642
static void send_framebuffer_update ( VncState * vs , int x , int y , int w , int h )
{
643
switch ( vs -> vnc_encoding ) {
644
645
646
647
648
649
650
651
652
653
654
case VNC_ENCODING_ZLIB :
send_framebuffer_update_zlib ( vs , x , y , w , h );
break ;
case VNC_ENCODING_HEXTILE :
vnc_framebuffer_update ( vs , x , y , w , h , VNC_ENCODING_HEXTILE );
send_framebuffer_update_hextile ( vs , x , y , w , h );
break ;
default :
vnc_framebuffer_update ( vs , x , y , w , h , VNC_ENCODING_RAW );
send_framebuffer_update_raw ( vs , x , y , w , h );
break ;
655
}
656
657
}
658
static void vnc_copy ( VncState * vs , int src_x , int src_y , int dst_x , int dst_y , int w , int h )
659
{
660
vs -> force_update = 1 ;
661
662
663
664
665
vnc_update_client ( vs );
vnc_write_u8 ( vs , 0 ); /* msg id */
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 ); /* number of rects */
666
vnc_framebuffer_update ( vs , dst_x , dst_y , w , h , VNC_ENCODING_COPYRECT );
667
668
669
670
671
vnc_write_u16 ( vs , src_x );
vnc_write_u16 ( vs , src_y );
vnc_flush ( vs );
}
672
673
674
675
676
677
678
679
680
681
682
683
684
static void vnc_dpy_copy ( DisplayState * ds , int src_x , int src_y , int dst_x , int dst_y , int w , int h )
{
VncDisplay * vd = ds -> opaque ;
VncState * vs = vd -> clients ;
while ( vs != NULL ) {
if ( vnc_has_feature ( vs , VNC_FEATURE_COPYRECT ))
vnc_copy ( vs , src_x , src_y , dst_x , dst_y , w , h );
else /* TODO */
vnc_update ( vs , dst_x , dst_y , w , h );
vs = vs -> next ;
}
}
685
686
static int find_and_clear_dirty_height ( struct VncSurface * s ,
int y , int last_x , int x )
687
688
689
{
int h ;
690
for ( h = 1 ; h < ( s -> ds -> height - y ) && h < 1 ; h ++ ) {
691
int tmp_x ;
692
if ( ! vnc_get_bit ( s -> dirty [ y + h ], last_x ))
693
694
break ;
for ( tmp_x = last_x ; tmp_x < x ; tmp_x ++ )
695
vnc_clear_bit ( s -> dirty [ y + h ], tmp_x );
696
697
698
699
700
701
702
703
704
}
return h ;
}
static void vnc_update_client ( void * opaque )
{
VncState * vs = opaque ;
if ( vs -> need_update && vs -> csock != - 1 ) {
705
int y ;
706
707
708
uint8_t * guest_row ;
uint8_t * server_row ;
int cmp_bytes = 16 * ds_get_bytes_per_pixel ( vs -> ds );
709
710
711
712
uint32_t width_mask [ VNC_DIRTY_WORDS ];
int n_rectangles ;
int saved_offset ;
int has_dirty = 0 ;
713
714
715
716
717
718
719
if ( vs -> output . offset && ! vs -> audio_cap && ! vs -> force_update ) {
/* kernel send buffers are full -> drop frames to throttle */
qemu_mod_timer ( vs -> timer , qemu_get_clock ( rt_clock ) + VNC_REFRESH_INTERVAL );
return ;
}
720
721
vga_hw_update ();
722
723
724
725
726
/*
* Walk through the guest dirty map .
* Check and copy modified bits from guest to server surface .
* Update server dirty map .
*/
727
vnc_set_bits ( width_mask , ( ds_get_width ( vs -> ds ) / 16 ), VNC_DIRTY_WORDS );
728
729
730
731
guest_row = vs -> guest . ds -> data ;
server_row = vs -> server . ds -> data ;
for ( y = 0 ; y < vs -> guest . ds -> height ; y ++ ) {
if ( vnc_and_bits ( vs -> guest . dirty [ y ], width_mask , VNC_DIRTY_WORDS )) {
732
int x ;
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
uint8_t * guest_ptr ;
uint8_t * server_ptr ;
guest_ptr = guest_row ;
server_ptr = server_row ;
for ( x = 0 ; x < vs -> guest . ds -> width ;
x += 16 , guest_ptr += cmp_bytes , server_ptr += cmp_bytes ) {
if ( ! vnc_get_bit ( vs -> guest . dirty [ y ], ( x / 16 )))
continue ;
vnc_clear_bit ( vs -> guest . dirty [ y ], ( x / 16 ));
if ( memcmp ( server_ptr , guest_ptr , cmp_bytes ) == 0 )
continue ;
memcpy ( server_ptr , guest_ptr , cmp_bytes );
vnc_set_bit ( vs -> server . dirty [ y ], ( x / 16 ));
has_dirty ++ ;
749
750
}
}
751
752
guest_row += ds_get_linesize ( vs -> ds );
server_row += ds_get_linesize ( vs -> ds );
753
754
}
755
if ( ! has_dirty && ! vs -> audio_cap && ! vs -> force_update ) {
756
757
758
759
qemu_mod_timer ( vs -> timer , qemu_get_clock ( rt_clock ) + VNC_REFRESH_INTERVAL );
return ;
}
760
761
762
763
764
765
/*
* Send screen updates to the vnc client using the server
* surface and server dirty map . guest surface updates
* happening in parallel don ' t disturb us , the next pass will
* send them to the client .
*/
766
767
768
769
770
771
n_rectangles = 0 ;
vnc_write_u8 ( vs , 0 ); /* msg id */
vnc_write_u8 ( vs , 0 );
saved_offset = vs -> output . offset ;
vnc_write_u16 ( vs , 0 );
772
for ( y = 0 ; y < vs -> server . ds -> height ; y ++ ) {
773
774
int x ;
int last_x = - 1 ;
775
776
for ( x = 0 ; x < vs -> server . ds -> width / 16 ; x ++ ) {
if ( vnc_get_bit ( vs -> server . dirty [ y ], x )) {
777
778
779
if ( last_x == - 1 ) {
last_x = x ;
}
780
vnc_clear_bit ( vs -> server . dirty [ y ], x );
781
782
} else {
if ( last_x != - 1 ) {
783
int h = find_and_clear_dirty_height ( & vs -> server , y , last_x , x );
784
785
786
787
788
789
790
send_framebuffer_update ( vs , last_x * 16 , y , ( x - last_x ) * 16 , h );
n_rectangles ++ ;
}
last_x = - 1 ;
}
}
if ( last_x != - 1 ) {
791
int h = find_and_clear_dirty_height ( & vs -> server , y , last_x , x );
792
793
794
795
796
797
798
send_framebuffer_update ( vs , last_x * 16 , y , ( x - last_x ) * 16 , h );
n_rectangles ++ ;
}
}
vs -> output . buffer [ saved_offset ] = ( n_rectangles >> 8 ) & 0xFF ;
vs -> output . buffer [ saved_offset + 1 ] = n_rectangles & 0xFF ;
vnc_flush ( vs );
799
vs -> force_update = 0 ;
800
801
802
}
803
804
if ( vs -> csock != - 1 ) {
qemu_mod_timer ( vs -> timer , qemu_get_clock ( rt_clock ) + VNC_REFRESH_INTERVAL );
805
806
807
808
}
}
malc
authored
16 years ago
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
/* audio */
static void audio_capture_notify ( void * opaque , audcnotification_e cmd )
{
VncState * vs = opaque ;
switch ( cmd ) {
case AUD_CNOTIFY_DISABLE :
vnc_write_u8 ( vs , 255 );
vnc_write_u8 ( vs , 1 );
vnc_write_u16 ( vs , 0 );
vnc_flush ( vs );
break ;
case AUD_CNOTIFY_ENABLE :
vnc_write_u8 ( vs , 255 );
vnc_write_u8 ( vs , 1 );
vnc_write_u16 ( vs , 1 );
vnc_flush ( vs );
break ;
}
}
static void audio_capture_destroy ( void * opaque )
{
}
static void audio_capture ( void * opaque , void * buf , int size )
{
VncState * vs = opaque ;
vnc_write_u8 ( vs , 255 );
vnc_write_u8 ( vs , 1 );
vnc_write_u16 ( vs , 2 );
vnc_write_u32 ( vs , size );
vnc_write ( vs , buf , size );
vnc_flush ( vs );
}
static void audio_add ( VncState * vs )
{
849
Monitor * mon = cur_mon ;
malc
authored
16 years ago
850
851
852
struct audio_capture_ops ops ;
if ( vs -> audio_cap ) {
853
monitor_printf ( mon , "audio already running \n " );
malc
authored
16 years ago
854
855
856
857
858
859
860
861
862
return ;
}
ops . notify = audio_capture_notify ;
ops . destroy = audio_capture_destroy ;
ops . capture = audio_capture ;
vs -> audio_cap = AUD_add_capture ( NULL , & vs -> as , & ops , vs );
if ( ! vs -> audio_cap ) {
863
monitor_printf ( mon , "Failed to add audio capture \n " );
malc
authored
16 years ago
864
865
866
867
868
869
870
871
872
873
874
}
}
static void audio_del ( VncState * vs )
{
if ( vs -> audio_cap ) {
AUD_del_capture ( vs -> audio_cap , vs );
vs -> audio_cap = NULL ;
}
}
875
876
int vnc_client_io_error ( VncState * vs , int ret , int last_errno )
877
878
{
if ( ret == 0 || ret == - 1 ) {
879
880
881
882
883
884
885
886
887
888
889
890
if ( ret == - 1 ) {
switch ( last_errno ) {
case EINTR :
case EAGAIN :
# ifdef _WIN32
case WSAEWOULDBLOCK :
# endif
return 0 ;
default :
break ;
}
}
891
892
893
894
VNC_DEBUG ( "Closing down client sock %d %d \n " , ret , ret < 0 ? last_errno : 0 );
qemu_set_fd_handler2 ( vs -> csock , NULL , NULL , NULL , NULL );
closesocket ( vs -> csock );
895
896
897
898
qemu_del_timer ( vs -> timer );
qemu_free_timer ( vs -> timer );
if ( vs -> input . buffer ) qemu_free ( vs -> input . buffer );
if ( vs -> output . buffer ) qemu_free ( vs -> output . buffer );
899
# ifdef CONFIG_VNC_TLS
900
vnc_tls_client_cleanup ( vs );
ths
authored
18 years ago
901
# endif /* CONFIG_VNC_TLS */
902
903
904
# ifdef CONFIG_VNC_SASL
vnc_sasl_client_cleanup ( vs );
# endif /* CONFIG_VNC_SASL */
malc
authored
16 years ago
905
audio_del ( vs );
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
VncState * p , * parent = NULL ;
for ( p = vs -> vd -> clients ; p != NULL ; p = p -> next ) {
if ( p == vs ) {
if ( parent )
parent -> next = p -> next ;
else
vs -> vd -> clients = p -> next ;
break ;
}
parent = p ;
}
if ( ! vs -> vd -> clients )
dcl -> idle = 1 ;
921
922
default_allocator . free_displaysurface ( vs -> server . ds );
qemu_free ( vs -> guest . ds );
923
qemu_free ( vs );
924
925
return 0 ;
926
927
928
929
}
return ret ;
}
930
931
void vnc_client_error ( VncState * vs )
932
{
933
vnc_client_io_error ( vs , - 1 , EINVAL );
934
935
}
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
/*
* Called to write a chunk of data to the client socket . The data may
* be the raw data , or may have already been encoded by SASL .
* The data will be written either straight onto the socket , or
* written via the GNUTLS wrappers , if TLS / SSL encryption is enabled
*
* NB , it is theoretically possible to have 2 layers of encryption ,
* both SASL , and this TLS layer . It is highly unlikely in practice
* though , since SASL encryption will typically be a no - op if TLS
* is active
*
* Returns the number of bytes written , which may be less than
* the requested ' datalen ' if the socket would block . Returns
* - 1 on error , and disconnects the client socket .
*/
long vnc_client_write_buf ( VncState * vs , const uint8_t * data , size_t datalen )
953
{
954
long ret ;
955
# ifdef CONFIG_VNC_TLS
956
if ( vs -> tls . session ) {
957
958
959
960
961
962
963
964
ret = gnutls_write ( vs -> tls . session , data , datalen );
if ( ret < 0 ) {
if ( ret == GNUTLS_E_AGAIN )
errno = EAGAIN ;
else
errno = EIO ;
ret = - 1 ;
}
ths
authored
18 years ago
965
966
} else
# endif /* CONFIG_VNC_TLS */
967
ret = send ( vs -> csock , data , datalen , 0 );
968
VNC_DEBUG ( "Wrote wire %p %zd -> %ld \n " , data , datalen , ret );
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
return vnc_client_io_error ( vs , ret , socket_error ());
}
/*
* Called to write buffered data to the client socket , when not
* using any SASL SSF encryption layers . Will write as much data
* as possible without blocking . If all buffered data is written ,
* will switch the FD poll () handler back to read monitoring .
*
* Returns the number of bytes written , which may be less than
* the buffered output data if the socket would block . Returns
* - 1 on error , and disconnects the client socket .
*/
static long vnc_client_write_plain ( VncState * vs )
{
long ret ;
# ifdef CONFIG_VNC_SASL
988
VNC_DEBUG ( "Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d \n " ,
989
990
991
992
993
994
995
996
997
998
999
1000
vs -> output . buffer , vs -> output . capacity , vs -> output . offset ,
vs -> sasl . waitWriteSSF );
if ( vs -> sasl . conn &&
vs -> sasl . runSSF &&
vs -> sasl . waitWriteSSF ) {
ret = vnc_client_write_buf ( vs , vs -> output . buffer , vs -> sasl . waitWriteSSF );
if ( ret )
vs -> sasl . waitWriteSSF -= ret ;
} else
# endif /* CONFIG_VNC_SASL */
ret = vnc_client_write_buf ( vs , vs -> output . buffer , vs -> output . offset );
1001
if ( ! ret )
1002
return 0 ;
1003
1004
1005
1006
1007
memmove ( vs -> output . buffer , vs -> output . buffer + ret , ( vs -> output . offset - ret ));
vs -> output . offset -= ret ;
if ( vs -> output . offset == 0 ) {
1008
qemu_set_fd_handler2 ( vs -> csock , NULL , vnc_client_read , NULL , vs );
1009
}
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
return ret ;
}
/*
* First function called whenever there is data to be written to
* the client socket . Will delegate actual work according to whether
* SASL SSF layers are enabled ( thus requiring encryption calls )
*/
void vnc_client_write ( void * opaque )
{
long ret ;
VncState * vs = opaque ;
# ifdef CONFIG_VNC_SASL
if ( vs -> sasl . conn &&
vs -> sasl . runSSF &&
! vs -> sasl . waitWriteSSF )
ret = vnc_client_write_sasl ( vs );
else
# endif /* CONFIG_VNC_SASL */
ret = vnc_client_write_plain ( vs );
1033
1034
}
1035
void vnc_read_when ( VncState * vs , VncReadEvent * func , size_t expecting )
1036
1037
1038
1039
1040
{
vs -> read_handler = func ;
vs -> read_handler_expect = expecting ;
}
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
/*
* Called to read a chunk of data from the client socket . The data may
* be the raw data , or may need to be further decoded by SASL .
* The data will be read either straight from to the socket , or
* read via the GNUTLS wrappers , if TLS / SSL encryption is enabled
*
* NB , it is theoretically possible to have 2 layers of encryption ,
* both SASL , and this TLS layer . It is highly unlikely in practice
* though , since SASL encryption will typically be a no - op if TLS
* is active
*
* Returns the number of bytes read , which may be less than
* the requested ' datalen ' if the socket would block . Returns
* - 1 on error , and disconnects the client socket .
*/
long vnc_client_read_buf ( VncState * vs , uint8_t * data , size_t datalen )
1058
{
1059
long ret ;
1060
# ifdef CONFIG_VNC_TLS
1061
if ( vs -> tls . session ) {
1062
1063
1064
1065
1066
1067
1068
1069
ret = gnutls_read ( vs -> tls . session , data , datalen );
if ( ret < 0 ) {
if ( ret == GNUTLS_E_AGAIN )
errno = EAGAIN ;
else
errno = EIO ;
ret = - 1 ;
}
ths
authored
18 years ago
1070
1071
} else
# endif /* CONFIG_VNC_TLS */
1072
ret = recv ( vs -> csock , data , datalen , 0 );
1073
VNC_DEBUG ( "Read wire %p %zd -> %ld \n " , data , datalen , ret );
1074
1075
return vnc_client_io_error ( vs , ret , socket_error ());
}
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
/*
* Called to read data from the client socket to the input buffer ,
* when not using any SASL SSF encryption layers . Will read as much
* data as possible without blocking .
*
* Returns the number of bytes read . Returns - 1 on error , and
* disconnects the client socket .
*/
static long vnc_client_read_plain ( VncState * vs )
{
int ret ;
1089
VNC_DEBUG ( "Read plain %p size %zd offset %zd \n " ,
1090
1091
1092
1093
1094
vs -> input . buffer , vs -> input . capacity , vs -> input . offset );
buffer_reserve ( & vs -> input , 4096 );
ret = vnc_client_read_buf ( vs , buffer_end ( & vs -> input ), 4096 );
if ( ! ret )
return 0 ;
1095
vs -> input . offset += ret ;
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
return ret ;
}
/*
* First function called whenever there is more data to be read from
* the client socket . Will delegate actual work according to whether
* SASL SSF layers are enabled ( thus requiring decryption calls )
*/
void vnc_client_read ( void * opaque )
{
VncState * vs = opaque ;
long ret ;
# ifdef CONFIG_VNC_SASL
if ( vs -> sasl . conn && vs -> sasl . runSSF )
ret = vnc_client_read_sasl ( vs );
else
# endif /* CONFIG_VNC_SASL */
ret = vnc_client_read_plain ( vs );
if ( ! ret )
1117
return ;
1118
1119
while ( vs -> read_handler && vs -> input . offset >= vs -> read_handler_expect ) {
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
size_t len = vs -> read_handler_expect ;
int ret ;
ret = vs -> read_handler ( vs , vs -> input . buffer , len );
if ( vs -> csock == - 1 )
return ;
if ( ! ret ) {
memmove ( vs -> input . buffer , vs -> input . buffer + len , ( vs -> input . offset - len ));
vs -> input . offset -= len ;
} else {
vs -> read_handler_expect = ret ;
}
1133
1134
1135
}
}
1136
void vnc_write ( VncState * vs , const void * data , size_t len )
1137
1138
1139
1140
{
buffer_reserve ( & vs -> output , len );
if ( buffer_empty ( & vs -> output )) {
1141
qemu_set_fd_handler2 ( vs -> csock , NULL , vnc_client_read , vnc_client_write , vs );
1142
1143
1144
1145
1146
}
buffer_append ( & vs -> output , data , len );
}
1147
void vnc_write_s32 ( VncState * vs , int32_t value )
1148
1149
1150
1151
{
vnc_write_u32 ( vs , * ( uint32_t * ) & value );
}
1152
void vnc_write_u32 ( VncState * vs , uint32_t value )
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
{
uint8_t buf [ 4 ];
buf [ 0 ] = ( value >> 24 ) & 0xFF ;
buf [ 1 ] = ( value >> 16 ) & 0xFF ;
buf [ 2 ] = ( value >> 8 ) & 0xFF ;
buf [ 3 ] = value & 0xFF ;
vnc_write ( vs , buf , 4 );
}
1164
void vnc_write_u16 ( VncState * vs , uint16_t value )
1165
{
1166
uint8_t buf [ 2 ];
1167
1168
1169
1170
1171
1172
1173
buf [ 0 ] = ( value >> 8 ) & 0xFF ;
buf [ 1 ] = value & 0xFF ;
vnc_write ( vs , buf , 2 );
}
1174
void vnc_write_u8 ( VncState * vs , uint8_t value )
1175
1176
1177
1178
{
vnc_write ( vs , ( char * ) & value , 1 );
}
1179
void vnc_flush ( VncState * vs )
1180
1181
{
if ( vs -> output . offset )
1182
vnc_client_write ( vs );
1183
1184
}
1185
uint8_t read_u8 ( uint8_t * data , size_t offset )
1186
1187
1188
1189
{
return data [ offset ];
}
1190
uint16_t read_u16 ( uint8_t * data , size_t offset )
1191
1192
1193
1194
{
return (( data [ offset ] & 0xFF ) << 8 ) | ( data [ offset + 1 ] & 0xFF );
}
1195
int32_t read_s32 ( uint8_t * data , size_t offset )
1196
1197
{
return ( int32_t )(( data [ offset ] << 24 ) | ( data [ offset + 1 ] << 16 ) |
1198
( data [ offset + 2 ] << 8 ) | data [ offset + 3 ]);
1199
1200
}
1201
uint32_t read_u32 ( uint8_t * data , size_t offset )
1202
1203
{
return (( data [ offset ] << 24 ) | ( data [ offset + 1 ] << 16 ) |
1204
( data [ offset + 2 ] << 8 ) | data [ offset + 3 ]);
1205
1206
}
ths
authored
17 years ago
1207
static void client_cut_text ( VncState * vs , size_t len , uint8_t * text )
1208
1209
1210
{
}
1211
1212
static void check_pointer_type_change ( VncState * vs , int absolute )
{
1213
if ( vnc_has_feature ( vs , VNC_FEATURE_POINTER_TYPE_CHANGE ) && vs -> absolute != absolute ) {
1214
1215
1216
1217
1218
vnc_write_u8 ( vs , 0 );
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 );
vnc_framebuffer_update ( vs , absolute , 0 ,
ds_get_width ( vs -> ds ), ds_get_height ( vs -> ds ),
1219
VNC_ENCODING_POINTER_TYPE_CHANGE );
1220
vnc_flush ( vs );
1221
1222
1223
1224
}
vs -> absolute = absolute ;
}
1225
1226
1227
1228
1229
1230
static void pointer_event ( VncState * vs , int button_mask , int x , int y )
{
int buttons = 0 ;
int dz = 0 ;
if ( button_mask & 0x01 )
1231
buttons |= MOUSE_EVENT_LBUTTON ;
1232
if ( button_mask & 0x02 )
1233
buttons |= MOUSE_EVENT_MBUTTON ;
1234
if ( button_mask & 0x04 )
1235
buttons |= MOUSE_EVENT_RBUTTON ;
1236
if ( button_mask & 0x08 )
1237
dz = - 1 ;
1238
if ( button_mask & 0x10 )
1239
dz = 1 ;
1240
1241
if ( vs -> absolute ) {
1242
1243
1244
kbd_mouse_event ( x * 0x7FFF / ( ds_get_width ( vs -> ds ) - 1 ),
y * 0x7FFF / ( ds_get_height ( vs -> ds ) - 1 ),
dz , buttons );
1245
} else if ( vnc_has_feature ( vs , VNC_FEATURE_POINTER_TYPE_CHANGE )) {
1246
1247
x -= 0x7FFF ;
y -= 0x7FFF ;
1248
1249
kbd_mouse_event ( x , y , dz , buttons );
1250
} else {
1251
1252
1253
1254
1255
1256
if ( vs -> last_x != - 1 )
kbd_mouse_event ( x - vs -> last_x ,
y - vs -> last_y ,
dz , buttons );
vs -> last_x = x ;
vs -> last_y = y ;
1257
}
1258
1259
check_pointer_type_change ( vs , kbd_mouse_is_absolute ());
1260
1261
}
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
static void reset_keys ( VncState * vs )
{
int i ;
for ( i = 0 ; i < 256 ; i ++ ) {
if ( vs -> modifiers_state [ i ]) {
if ( i & 0x80 )
kbd_put_keycode ( 0xe0 );
kbd_put_keycode ( i | 0x80 );
vs -> modifiers_state [ i ] = 0 ;
}
}
}
1275
1276
static void press_key ( VncState * vs , int keysym )
{
1277
1278
kbd_put_keycode ( keysym2scancode ( vs -> vd -> kbd_layout , keysym ) & 0x7f );
kbd_put_keycode ( keysym2scancode ( vs -> vd -> kbd_layout , keysym ) | 0x80 );
1279
1280
}
1281
static void do_key_event ( VncState * vs , int down , int keycode , int sym )
1282
{
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
/* QEMU console switch */
switch ( keycode ) {
case 0x2a : /* Left Shift */
case 0x36 : /* Right Shift */
case 0x1d : /* Left CTRL */
case 0x9d : /* Right CTRL */
case 0x38 : /* Left ALT */
case 0xb8 : /* Right ALT */
if ( down )
vs -> modifiers_state [ keycode ] = 1 ;
else
vs -> modifiers_state [ keycode ] = 0 ;
break ;
ths
authored
18 years ago
1296
case 0x02 ... 0x0a : /* '1' to '9' keys */
1297
1298
1299
1300
1301
1302
1303
if ( down && vs -> modifiers_state [ 0x1d ] && vs -> modifiers_state [ 0x38 ]) {
/* Reset the modifiers sent to the current console */
reset_keys ( vs );
console_select ( keycode - 0x02 );
return ;
}
break ;
1304
1305
case 0x3a : /* CapsLock */
case 0x45 : /* NumLock */
1306
1307
1308
1309
1310
if ( ! down )
vs -> modifiers_state [ keycode ] ^= 1 ;
break ;
}
1311
if ( keycode_is_keypad ( vs -> vd -> kbd_layout , keycode )) {
1312
1313
1314
1315
/* If the numlock state needs to change then simulate an additional
keypress before sending this one . This will happen if the user
toggles numlock away from the VNC window .
*/
1316
if ( keysym_is_numlock ( vs -> vd -> kbd_layout , sym & 0xFFFF )) {
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
if ( ! vs -> modifiers_state [ 0x45 ]) {
vs -> modifiers_state [ 0x45 ] = 1 ;
press_key ( vs , 0xff7f );
}
} else {
if ( vs -> modifiers_state [ 0x45 ]) {
vs -> modifiers_state [ 0x45 ] = 0 ;
press_key ( vs , 0xff7f );
}
}
1327
}
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
if ( is_graphic_console ()) {
if ( keycode & 0x80 )
kbd_put_keycode ( 0xe0 );
if ( down )
kbd_put_keycode ( keycode & 0x7f );
else
kbd_put_keycode ( keycode | 0x80 );
} else {
/* QEMU console emulation */
if ( down ) {
switch ( keycode ) {
case 0x2a : /* Left Shift */
case 0x36 : /* Right Shift */
case 0x1d : /* Left CTRL */
case 0x9d : /* Right CTRL */
case 0x38 : /* Left ALT */
case 0xb8 : /* Right ALT */
break ;
case 0xc8 :
kbd_put_keysym ( QEMU_KEY_UP );
break ;
case 0xd0 :
kbd_put_keysym ( QEMU_KEY_DOWN );
break ;
case 0xcb :
kbd_put_keysym ( QEMU_KEY_LEFT );
break ;
case 0xcd :
kbd_put_keysym ( QEMU_KEY_RIGHT );
break ;
case 0xd3 :
kbd_put_keysym ( QEMU_KEY_DELETE );
break ;
case 0xc7 :
kbd_put_keysym ( QEMU_KEY_HOME );
break ;
case 0xcf :
kbd_put_keysym ( QEMU_KEY_END );
break ;
case 0xc9 :
kbd_put_keysym ( QEMU_KEY_PAGEUP );
break ;
case 0xd1 :
kbd_put_keysym ( QEMU_KEY_PAGEDOWN );
break ;
default :
kbd_put_keysym ( sym );
break ;
}
}
}
1380
1381
}
1382
1383
static void key_event ( VncState * vs , int down , uint32_t sym )
{
1384
1385
int keycode ;
1386
if ( sym >= 'A' && sym <= 'Z' && is_graphic_console ())
1387
sym = sym - 'A' + 'a' ;
1388
1389
keycode = keysym2scancode ( vs -> vd -> kbd_layout , sym & 0xFFFF );
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
do_key_event ( vs , down , keycode , sym );
}
static void ext_key_event ( VncState * vs , int down ,
uint32_t sym , uint16_t keycode )
{
/* if the user specifies a keyboard layout, always use it */
if ( keyboard_layout )
key_event ( vs , down , sym );
else
do_key_event ( vs , down , keycode , sym );
1401
1402
}
1403
static void framebuffer_update_request ( VncState * vs , int incremental ,
1404
1405
int x_position , int y_position ,
int w , int h )
1406
{
1407
1408
1409
1410
1411
1412
1413
1414
if ( x_position > ds_get_width ( vs -> ds ))
x_position = ds_get_width ( vs -> ds );
if ( y_position > ds_get_height ( vs -> ds ))
y_position = ds_get_height ( vs -> ds );
if ( x_position + w >= ds_get_width ( vs -> ds ))
w = ds_get_width ( vs -> ds ) - x_position ;
if ( y_position + h >= ds_get_height ( vs -> ds ))
h = ds_get_height ( vs -> ds ) - y_position ;
ths
authored
18 years ago
1415
1416
1417
int i ;
vs -> need_update = 1 ;
1418
vs -> force_update = 1 ;
1419
if ( ! incremental ) {
1420
for ( i = 0 ; i < h ; i ++ ) {
1421
1422
1423
vnc_set_bits ( vs -> guest . dirty [ y_position + i ],
( ds_get_width ( vs -> ds ) / 16 ), VNC_DIRTY_WORDS );
vnc_set_bits ( vs -> server . dirty [ y_position + i ],
1424
( ds_get_width ( vs -> ds ) / 16 ), VNC_DIRTY_WORDS );
1425
}
1426
1427
1428
}
}
1429
1430
1431
1432
1433
static void send_ext_key_event_ack ( VncState * vs )
{
vnc_write_u8 ( vs , 0 );
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 );
1434
1435
vnc_framebuffer_update ( vs , 0 , 0 , ds_get_width ( vs -> ds ), ds_get_height ( vs -> ds ),
VNC_ENCODING_EXT_KEY_EVENT );
1436
1437
1438
vnc_flush ( vs );
}
malc
authored
16 years ago
1439
1440
1441
1442
1443
static void send_ext_audio_ack ( VncState * vs )
{
vnc_write_u8 ( vs , 0 );
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 );
1444
1445
vnc_framebuffer_update ( vs , 0 , 0 , ds_get_width ( vs -> ds ), ds_get_height ( vs -> ds ),
VNC_ENCODING_AUDIO );
malc
authored
16 years ago
1446
1447
1448
vnc_flush ( vs );
}
1449
1450
1451
static void set_encodings ( VncState * vs , int32_t * encodings , size_t n_encodings )
{
int i ;
1452
unsigned int enc = 0 ;
1453
1454
vnc_zlib_init ( vs );
1455
vs -> features = 0 ;
1456
1457
1458
vs -> vnc_encoding = 0 ;
vs -> tight_compression = 9 ;
vs -> tight_quality = 9 ;
1459
vs -> absolute = - 1 ;
1460
1461
for ( i = n_encodings - 1 ; i >= 0 ; i -- ) {
1462
1463
1464
enc = encodings [ i ];
switch ( enc ) {
case VNC_ENCODING_RAW :
1465
vs -> vnc_encoding = enc ;
1466
1467
break ;
case VNC_ENCODING_COPYRECT :
1468
vs -> features |= VNC_FEATURE_COPYRECT_MASK ;
1469
1470
1471
break ;
case VNC_ENCODING_HEXTILE :
vs -> features |= VNC_FEATURE_HEXTILE_MASK ;
1472
vs -> vnc_encoding = enc ;
1473
break ;
1474
1475
1476
1477
case VNC_ENCODING_ZLIB :
vs -> features |= VNC_FEATURE_ZLIB_MASK ;
vs -> vnc_encoding = enc ;
break ;
1478
1479
1480
1481
1482
1483
1484
case VNC_ENCODING_DESKTOPRESIZE :
vs -> features |= VNC_FEATURE_RESIZE_MASK ;
break ;
case VNC_ENCODING_POINTER_TYPE_CHANGE :
vs -> features |= VNC_FEATURE_POINTER_TYPE_CHANGE_MASK ;
break ;
case VNC_ENCODING_EXT_KEY_EVENT :
1485
1486
send_ext_key_event_ack ( vs );
break ;
1487
case VNC_ENCODING_AUDIO :
malc
authored
16 years ago
1488
1489
send_ext_audio_ack ( vs );
break ;
1490
1491
case VNC_ENCODING_WMVi :
vs -> features |= VNC_FEATURE_WMVI_MASK ;
1492
break ;
1493
1494
1495
1496
1497
1498
case VNC_ENCODING_COMPRESSLEVEL0 ... VNC_ENCODING_COMPRESSLEVEL0 + 9 :
vs -> tight_compression = ( enc & 0x0F );
break ;
case VNC_ENCODING_QUALITYLEVEL0 ... VNC_ENCODING_QUALITYLEVEL0 + 9 :
vs -> tight_quality = ( enc & 0x0F );
break ;
1499
1500
1501
1502
default :
VNC_DEBUG ( "Unknown encoding: %d (0x%.8x): %d \n " , i , enc , enc );
break ;
}
1503
}
1504
1505
check_pointer_type_change ( vs , kbd_mouse_is_absolute ());
1506
1507
}
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
static void set_pixel_conversion ( VncState * vs )
{
if (( vs -> clientds . flags & QEMU_BIG_ENDIAN_FLAG ) ==
( vs -> ds -> surface -> flags & QEMU_BIG_ENDIAN_FLAG ) &&
! memcmp ( & ( vs -> clientds . pf ), & ( vs -> ds -> surface -> pf ), sizeof ( PixelFormat ))) {
vs -> write_pixels = vnc_write_pixels_copy ;
switch ( vs -> ds -> surface -> pf . bits_per_pixel ) {
case 8 :
vs -> send_hextile_tile = send_hextile_tile_8 ;
break ;
case 16 :
vs -> send_hextile_tile = send_hextile_tile_16 ;
break ;
case 32 :
vs -> send_hextile_tile = send_hextile_tile_32 ;
break ;
}
} else {
vs -> write_pixels = vnc_write_pixels_generic ;
switch ( vs -> ds -> surface -> pf . bits_per_pixel ) {
case 8 :
vs -> send_hextile_tile = send_hextile_tile_generic_8 ;
break ;
case 16 :
vs -> send_hextile_tile = send_hextile_tile_generic_16 ;
break ;
case 32 :
vs -> send_hextile_tile = send_hextile_tile_generic_32 ;
break ;
}
}
}
1541
static void set_pixel_format ( VncState * vs ,
1542
1543
1544
1545
int bits_per_pixel , int depth ,
int big_endian_flag , int true_color_flag ,
int red_max , int green_max , int blue_max ,
int red_shift , int green_shift , int blue_shift )
1546
{
1547
if ( ! true_color_flag ) {
1548
vnc_client_error ( vs );
1549
1550
return ;
}
1551
1552
vs -> clientds = * ( vs -> guest . ds );
1553
vs -> clientds . pf . rmax = red_max ;
1554
count_bits ( vs -> clientds . pf . rbits , red_max );
1555
1556
1557
vs -> clientds . pf . rshift = red_shift ;
vs -> clientds . pf . rmask = red_max << red_shift ;
vs -> clientds . pf . gmax = green_max ;
1558
count_bits ( vs -> clientds . pf . gbits , green_max );
1559
1560
1561
vs -> clientds . pf . gshift = green_shift ;
vs -> clientds . pf . gmask = green_max << green_shift ;
vs -> clientds . pf . bmax = blue_max ;
1562
count_bits ( vs -> clientds . pf . bbits , blue_max );
1563
1564
1565
1566
1567
1568
1569
1570
vs -> clientds . pf . bshift = blue_shift ;
vs -> clientds . pf . bmask = blue_max << blue_shift ;
vs -> clientds . pf . bits_per_pixel = bits_per_pixel ;
vs -> clientds . pf . bytes_per_pixel = bits_per_pixel / 8 ;
vs -> clientds . pf . depth = bits_per_pixel == 32 ? 24 : bits_per_pixel ;
vs -> clientds . flags = big_endian_flag ? QEMU_BIG_ENDIAN_FLAG : 0x00 ;
set_pixel_conversion ( vs );
1571
1572
1573
1574
1575
vga_hw_invalidate ();
vga_hw_update ();
}
1576
1577
1578
static void pixel_format_message ( VncState * vs ) {
char pad [ 3 ] = { 0 , 0 , 0 };
1579
1580
vnc_write_u8 ( vs , vs -> ds -> surface -> pf . bits_per_pixel ); /* bits-per-pixel */
vnc_write_u8 ( vs , vs -> ds -> surface -> pf . depth ); /* depth */
1581
1582
1583
1584
1585
1586
1587
# ifdef WORDS_BIGENDIAN
vnc_write_u8 ( vs , 1 ); /* big-endian-flag */
# else
vnc_write_u8 ( vs , 0 ); /* big-endian-flag */
# endif
vnc_write_u8 ( vs , 1 ); /* true-color-flag */
1588
1589
1590
1591
1592
1593
1594
vnc_write_u16 ( vs , vs -> ds -> surface -> pf . rmax ); /* red-max */
vnc_write_u16 ( vs , vs -> ds -> surface -> pf . gmax ); /* green-max */
vnc_write_u16 ( vs , vs -> ds -> surface -> pf . bmax ); /* blue-max */
vnc_write_u8 ( vs , vs -> ds -> surface -> pf . rshift ); /* red-shift */
vnc_write_u8 ( vs , vs -> ds -> surface -> pf . gshift ); /* green-shift */
vnc_write_u8 ( vs , vs -> ds -> surface -> pf . bshift ); /* blue-shift */
if ( vs -> ds -> surface -> pf . bits_per_pixel == 32 )
1595
vs -> send_hextile_tile = send_hextile_tile_32 ;
1596
else if ( vs -> ds -> surface -> pf . bits_per_pixel == 16 )
1597
vs -> send_hextile_tile = send_hextile_tile_16 ;
1598
else if ( vs -> ds -> surface -> pf . bits_per_pixel == 8 )
1599
vs -> send_hextile_tile = send_hextile_tile_8 ;
1600
1601
vs -> clientds = * ( vs -> ds -> surface );
vs -> clientds . flags |= ~ QEMU_ALLOCATED_FLAG ;
1602
1603
1604
1605
1606
vs -> write_pixels = vnc_write_pixels_copy ;
vnc_write ( vs , pad , 3 ); /* padding */
}
1607
1608
1609
1610
1611
static void vnc_dpy_setdata ( DisplayState * ds )
{
/* We don't have to do anything */
}
1612
static void vnc_colordepth ( VncState * vs )
1613
{
1614
if ( vnc_has_feature ( vs , VNC_FEATURE_WMVI )) {
1615
1616
1617
1618
/* Sending a WMVi message to notify the client*/
vnc_write_u8 ( vs , 0 ); /* msg id */
vnc_write_u8 ( vs , 0 );
vnc_write_u16 ( vs , 1 ); /* number of rects */
1619
1620
vnc_framebuffer_update ( vs , 0 , 0 , ds_get_width ( vs -> ds ),
ds_get_height ( vs -> ds ), VNC_ENCODING_WMVi );
1621
1622
pixel_format_message ( vs );
vnc_flush ( vs );
1623
} else {
1624
set_pixel_conversion ( vs );
1625
1626
1627
}
}
ths
authored
17 years ago
1628
static int protocol_client_msg ( VncState * vs , uint8_t * data , size_t len )
1629
1630
1631
1632
1633
1634
{
int i ;
uint16_t limit ;
switch ( data [ 0 ]) {
case 0 :
1635
1636
1637
1638
1639
1640
1641
1642
1643
if ( len == 1 )
return 20 ;
set_pixel_format ( vs , read_u8 ( data , 4 ), read_u8 ( data , 5 ),
read_u8 ( data , 6 ), read_u8 ( data , 7 ),
read_u16 ( data , 8 ), read_u16 ( data , 10 ),
read_u16 ( data , 12 ), read_u8 ( data , 14 ),
read_u8 ( data , 15 ), read_u8 ( data , 16 ));
break ;
1644
case 2 :
1645
1646
if ( len == 1 )
return 4 ;
1647
1648
if ( len == 4 ) {
1649
1650
1651
1652
1653
limit = read_u16 ( data , 2 );
if ( limit > 0 )
return 4 + ( limit * 4 );
} else
limit = read_u16 ( data , 2 );
1654
1655
1656
1657
1658
for ( i = 0 ; i < limit ; i ++ ) {
int32_t val = read_s32 ( data , 4 + ( i * 4 ));
memcpy ( data + 4 + ( i * 4 ), & val , sizeof ( val ));
}
1659
1660
1661
set_encodings ( vs , ( int32_t * )( data + 4 ), limit );
break ;
1662
case 3 :
1663
1664
if ( len == 1 )
return 10 ;
1665
1666
1667
1668
1669
framebuffer_update_request ( vs ,
read_u8 ( data , 1 ), read_u16 ( data , 2 ), read_u16 ( data , 4 ),
read_u16 ( data , 6 ), read_u16 ( data , 8 ));
break ;
1670
case 4 :
1671
1672
if ( len == 1 )
return 8 ;
1673
1674
1675
key_event ( vs , read_u8 ( data , 1 ), read_u32 ( data , 4 ));
break ;
1676
case 5 :
1677
1678
if ( len == 1 )
return 6 ;
1679
1680
1681
pointer_event ( vs , read_u8 ( data , 1 ), read_u16 ( data , 2 ), read_u16 ( data , 4 ));
break ;
1682
case 6 :
1683
1684
if ( len == 1 )
return 8 ;
1685
1686
if ( len == 8 ) {
ths
authored
18 years ago
1687
1688
1689
1690
uint32_t dlen = read_u32 ( data , 4 );
if ( dlen > 0 )
return 8 + dlen ;
}
1691
1692
1693
client_cut_text ( vs , read_u32 ( data , 4 ), data + 8 );
break ;
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
case 255 :
if ( len == 1 )
return 2 ;
switch ( read_u8 ( data , 1 )) {
case 0 :
if ( len == 2 )
return 12 ;
ext_key_event ( vs , read_u16 ( data , 2 ),
read_u32 ( data , 4 ), read_u32 ( data , 8 ));
break ;
malc
authored
16 years ago
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
case 1 :
if ( len == 2 )
return 4 ;
switch ( read_u16 ( data , 2 )) {
case 0 :
audio_add ( vs );
break ;
case 1 :
audio_del ( vs );
break ;
case 2 :
if ( len == 4 )
return 10 ;
switch ( read_u8 ( data , 4 )) {
case 0 : vs -> as . fmt = AUD_FMT_U8 ; break ;
case 1 : vs -> as . fmt = AUD_FMT_S8 ; break ;
case 2 : vs -> as . fmt = AUD_FMT_U16 ; break ;
case 3 : vs -> as . fmt = AUD_FMT_S16 ; break ;
case 4 : vs -> as . fmt = AUD_FMT_U32 ; break ;
case 5 : vs -> as . fmt = AUD_FMT_S32 ; break ;
default :
printf ( "Invalid audio format %d \n " , read_u8 ( data , 4 ));
vnc_client_error ( vs );
break ;
}
vs -> as . nchannels = read_u8 ( data , 5 );
if ( vs -> as . nchannels != 1 && vs -> as . nchannels != 2 ) {
printf ( "Invalid audio channel coount %d \n " ,
read_u8 ( data , 5 ));
vnc_client_error ( vs );
break ;
}
vs -> as . freq = read_u32 ( data , 6 );
break ;
default :
printf ( "Invalid audio message %d \n " , read_u8 ( data , 4 ));
vnc_client_error ( vs );
break ;
}
break ;
1748
1749
1750
1751
1752
1753
default :
printf ( "Msg: %d \n " , read_u16 ( data , 0 ));
vnc_client_error ( vs );
break ;
}
break ;
1754
default :
1755
1756
1757
printf ( "Msg: %d \n " , data [ 0 ]);
vnc_client_error ( vs );
break ;
1758
}
ths
authored
18 years ago
1759
1760
1761
1762
1763
vnc_read_when ( vs , protocol_client_msg , 1 );
return 0 ;
}
ths
authored
17 years ago
1764
static int protocol_client_init ( VncState * vs , uint8_t * data , size_t len )
1765
{
ths
authored
18 years ago
1766
1767
char buf [ 1024 ];
int size ;
1768
1769
1770
vnc_write_u16 ( vs , ds_get_width ( vs -> ds ));
vnc_write_u16 ( vs , ds_get_height ( vs -> ds ));
1771
1772
pixel_format_message ( vs );
1773
ths
authored
18 years ago
1774
1775
1776
1777
1778
1779
1780
if ( qemu_name )
size = snprintf ( buf , sizeof ( buf ), "QEMU (%s)" , qemu_name );
else
size = snprintf ( buf , sizeof ( buf ), "QEMU" );
vnc_write_u32 ( vs , size );
vnc_write ( vs , buf , size );
1781
1782
1783
1784
1785
1786
1787
vnc_flush ( vs );
vnc_read_when ( vs , protocol_client_msg , 1 );
return 0 ;
}
1788
1789
1790
1791
1792
void start_client_init ( VncState * vs )
{
vnc_read_when ( vs , protocol_client_init , 1 );
}
ths
authored
18 years ago
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
static void make_challenge ( VncState * vs )
{
int i ;
srand ( time ( NULL ) + getpid () + getpid () * 987654 + rand ());
for ( i = 0 ; i < sizeof ( vs -> challenge ) ; i ++ )
vs -> challenge [ i ] = ( int ) ( 256 . 0 * rand () / ( RAND_MAX + 1 . 0 ));
}
ths
authored
17 years ago
1803
static int protocol_client_auth_vnc ( VncState * vs , uint8_t * data , size_t len )
ths
authored
18 years ago
1804
{
ths
authored
17 years ago
1805
unsigned char response [ VNC_AUTH_CHALLENGE_SIZE ];
ths
authored
18 years ago
1806
int i , j , pwlen ;
ths
authored
17 years ago
1807
unsigned char key [ 8 ];
ths
authored
18 years ago
1808
1809
if ( ! vs -> vd -> password || ! vs -> vd -> password [ 0 ]) {
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
VNC_DEBUG ( "No password configured on server" );
vnc_write_u32 ( vs , 1 ); /* Reject auth */
if ( vs -> minor >= 8 ) {
static const char err [] = "Authentication failed" ;
vnc_write_u32 ( vs , sizeof ( err ));
vnc_write ( vs , err , sizeof ( err ));
}
vnc_flush ( vs );
vnc_client_error ( vs );
return 0 ;
ths
authored
18 years ago
1820
1821
1822
1823
1824
}
memcpy ( response , vs -> challenge , VNC_AUTH_CHALLENGE_SIZE );
/* Calculate the expected challenge response */
1825
pwlen = strlen ( vs -> vd -> password );
ths
authored
18 years ago
1826
for ( i = 0 ; i < sizeof ( key ); i ++ )
1827
key [ i ] = i < pwlen ? vs -> vd -> password [ i ] : 0 ;
ths
authored
18 years ago
1828
1829
1830
1831
1832
1833
deskey ( key , EN0 );
for ( j = 0 ; j < VNC_AUTH_CHALLENGE_SIZE ; j += 8 )
des ( response + j , response + j );
/* Compare expected vs actual challenge response */
if ( memcmp ( response , data , VNC_AUTH_CHALLENGE_SIZE ) != 0 ) {
1834
1835
1836
1837
1838
1839
1840
1841
1842
VNC_DEBUG ( "Client challenge reponse did not match \n " );
vnc_write_u32 ( vs , 1 ); /* Reject auth */
if ( vs -> minor >= 8 ) {
static const char err [] = "Authentication failed" ;
vnc_write_u32 ( vs , sizeof ( err ));
vnc_write ( vs , err , sizeof ( err ));
}
vnc_flush ( vs );
vnc_client_error ( vs );
ths
authored
18 years ago
1843
} else {
1844
1845
1846
VNC_DEBUG ( "Accepting VNC challenge response \n " );
vnc_write_u32 ( vs , 0 ); /* Accept auth */
vnc_flush ( vs );
ths
authored
18 years ago
1847
1848
start_client_init ( vs );
ths
authored
18 years ago
1849
1850
1851
1852
}
return 0 ;
}
1853
void start_auth_vnc ( VncState * vs )
ths
authored
18 years ago
1854
1855
1856
1857
1858
1859
1860
{
make_challenge ( vs );
/* Send client a 'random' challenge */
vnc_write ( vs , vs -> challenge , sizeof ( vs -> challenge ));
vnc_flush ( vs );
vnc_read_when ( vs , protocol_client_auth_vnc , sizeof ( vs -> challenge ));
ths
authored
18 years ago
1861
1862
1863
}
ths
authored
17 years ago
1864
static int protocol_client_auth ( VncState * vs , uint8_t * data , size_t len )
ths
authored
18 years ago
1865
1866
1867
{
/* We only advertise 1 auth scheme at a time , so client
* must pick the one we sent . Verify this */
1868
if ( data [ 0 ] != vs -> vd -> auth ) { /* Reject auth */
1869
VNC_DEBUG ( "Reject auth %d because it didn't match advertized \n " , ( int ) data [ 0 ]);
ths
authored
18 years ago
1870
1871
1872
1873
1874
1875
1876
1877
1878
vnc_write_u32 ( vs , 1 );
if ( vs -> minor >= 8 ) {
static const char err [] = "Authentication failed" ;
vnc_write_u32 ( vs , sizeof ( err ));
vnc_write ( vs , err , sizeof ( err ));
}
vnc_client_error ( vs );
} else { /* Accept requested auth */
VNC_DEBUG ( "Client requested auth %d \n " , ( int ) data [ 0 ]);
1879
switch ( vs -> vd -> auth ) {
ths
authored
18 years ago
1880
1881
case VNC_AUTH_NONE :
VNC_DEBUG ( "Accept auth none \n " );
1882
1883
1884
1885
if ( vs -> minor >= 8 ) {
vnc_write_u32 ( vs , 0 ); /* Accept auth completion */
vnc_flush ( vs );
}
1886
start_client_init ( vs );
ths
authored
18 years ago
1887
1888
1889
1890
break ;
case VNC_AUTH_VNC :
VNC_DEBUG ( "Start VNC auth \n " );
1891
1892
start_auth_vnc ( vs );
break ;
ths
authored
18 years ago
1893
1894
# ifdef CONFIG_VNC_TLS
ths
authored
18 years ago
1895
1896
case VNC_AUTH_VENCRYPT :
VNC_DEBUG ( "Accept VeNCrypt auth \n " );;
1897
1898
start_auth_vencrypt ( vs );
break ;
ths
authored
18 years ago
1899
1900
# endif /* CONFIG_VNC_TLS */
1901
1902
1903
1904
1905
1906
1907
# ifdef CONFIG_VNC_SASL
case VNC_AUTH_SASL :
VNC_DEBUG ( "Accept SASL auth \n " );
start_auth_sasl ( vs );
break ;
# endif /* CONFIG_VNC_SASL */
ths
authored
18 years ago
1908
default : /* Should not be possible, but just in case */
1909
VNC_DEBUG ( "Reject auth %d server code bug \n " , vs -> vd -> auth );
ths
authored
18 years ago
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
vnc_write_u8 ( vs , 1 );
if ( vs -> minor >= 8 ) {
static const char err [] = "Authentication failed" ;
vnc_write_u32 ( vs , sizeof ( err ));
vnc_write ( vs , err , sizeof ( err ));
}
vnc_client_error ( vs );
}
}
return 0 ;
}
ths
authored
17 years ago
1922
static int protocol_version ( VncState * vs , uint8_t * version , size_t len )
1923
1924
1925
1926
1927
1928
{
char local [ 13 ];
memcpy ( local , version , 12 );
local [ 12 ] = 0 ;
ths
authored
18 years ago
1929
if ( sscanf ( local , "RFB %03d.%03d \n " , & vs -> major , & vs -> minor ) != 2 ) {
1930
1931
1932
VNC_DEBUG ( "Malformed protocol version %s \n " , local );
vnc_client_error ( vs );
return 0 ;
1933
}
ths
authored
18 years ago
1934
1935
VNC_DEBUG ( "Client request protocol version %d.%d \n " , vs -> major , vs -> minor );
if ( vs -> major != 3 ||
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
( vs -> minor != 3 &&
vs -> minor != 4 &&
vs -> minor != 5 &&
vs -> minor != 7 &&
vs -> minor != 8 )) {
VNC_DEBUG ( "Unsupported client version \n " );
vnc_write_u32 ( vs , VNC_AUTH_INVALID );
vnc_flush ( vs );
vnc_client_error ( vs );
return 0 ;
ths
authored
18 years ago
1946
}
ths
authored
17 years ago
1947
/* Some broken clients report v3 . 4 or v3 . 5 , which spec requires to be treated
ths
authored
18 years ago
1948
1949
* as equivalent to v3 . 3 by servers
*/
ths
authored
17 years ago
1950
if ( vs -> minor == 4 || vs -> minor == 5 )
1951
vs -> minor = 3 ;
ths
authored
18 years ago
1952
1953
if ( vs -> minor == 3 ) {
1954
if ( vs -> vd -> auth == VNC_AUTH_NONE ) {
ths
authored
18 years ago
1955
VNC_DEBUG ( "Tell client auth none \n " );
1956
vnc_write_u32 ( vs , vs -> vd -> auth );
ths
authored
18 years ago
1957
vnc_flush ( vs );
1958
start_client_init ( vs );
1959
} else if ( vs -> vd -> auth == VNC_AUTH_VNC ) {
ths
authored
18 years ago
1960
VNC_DEBUG ( "Tell client VNC auth \n " );
1961
vnc_write_u32 ( vs , vs -> vd -> auth );
ths
authored
18 years ago
1962
1963
1964
vnc_flush ( vs );
start_auth_vnc ( vs );
} else {
1965
VNC_DEBUG ( "Unsupported auth %d for protocol 3.3 \n " , vs -> vd -> auth );
ths
authored
18 years ago
1966
1967
1968
1969
1970
vnc_write_u32 ( vs , VNC_AUTH_INVALID );
vnc_flush ( vs );
vnc_client_error ( vs );
}
} else {
1971
1972
1973
1974
1975
VNC_DEBUG ( "Telling client we support auth %d \n " , vs -> vd -> auth );
vnc_write_u8 ( vs , 1 ); /* num auth */
vnc_write_u8 ( vs , vs -> vd -> auth );
vnc_read_when ( vs , protocol_client_auth , 1 );
vnc_flush ( vs );
ths
authored
18 years ago
1976
}
1977
1978
1979
1980
return 0 ;
}
1981
static void vnc_connect ( VncDisplay * vd , int csock )
1982
{
1983
1984
1985
1986
VncState * vs = qemu_mallocz ( sizeof ( VncState ));
vs -> csock = csock ;
VNC_DEBUG ( "New client on socket %d \n " , csock );
1987
dcl -> idle = 0 ;
1988
1989
socket_set_nonblock ( vs -> csock );
qemu_set_fd_handler2 ( vs -> csock , NULL , vnc_client_read , NULL , vs );
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
vs -> vd = vd ;
vs -> ds = vd -> ds ;
vs -> timer = qemu_new_timer ( rt_clock , vnc_update_client , vs );
vs -> last_x = - 1 ;
vs -> last_y = - 1 ;
vs -> as . freq = 44100 ;
vs -> as . nchannels = 2 ;
vs -> as . fmt = AUD_FMT_S16 ;
vs -> as . endianness = 0 ;
vnc_resize ( vs );
2003
2004
2005
2006
vnc_write ( vs , "RFB 003.008 \n " , 12 );
vnc_flush ( vs );
vnc_read_when ( vs , protocol_version , 12 );
vnc_update_client ( vs );
malc
authored
16 years ago
2007
reset_keys ( vs );
2008
2009
2010
vs -> next = vd -> clients ;
vd -> clients = vs ;
2011
2012
}
2013
2014
static void vnc_listen_read ( void * opaque )
{
2015
VncDisplay * vs = opaque ;
2016
2017
2018
struct sockaddr_in addr ;
socklen_t addrlen = sizeof ( addr );
2019
2020
2021
/* Catch-up */
vga_hw_update ();
2022
2023
2024
int csock = accept ( vs -> lsock , ( struct sockaddr * ) & addr , & addrlen );
if ( csock != - 1 ) {
vnc_connect ( vs , csock );
2025
2026
2027
}
}
ths
authored
18 years ago
2028
void vnc_display_init ( DisplayState * ds )
2029
{
2030
VncDisplay * vs ;
2031
2032
vs = qemu_mallocz ( sizeof ( VncState ));
2033
dcl = qemu_mallocz ( sizeof ( DisplayChangeListener ));
2034
2035
ds -> opaque = vs ;
2036
dcl -> idle = 1 ;
2037
vnc_display = vs ;
2038
2039
2040
2041
2042
vs -> lsock = - 1 ;
vs -> ds = ds ;
2043
if ( keyboard_layout )
2044
vs -> kbd_layout = init_keyboard_layout ( name2keysym , keyboard_layout );
2045
else
2046
vs -> kbd_layout = init_keyboard_layout ( name2keysym , "en-us" );
2047
2048
if ( ! vs -> kbd_layout )
2049
exit ( 1 );
2050
2051
dcl -> dpy_copy = vnc_dpy_copy ;
2052
2053
2054
2055
dcl -> dpy_update = vnc_dpy_update ;
dcl -> dpy_resize = vnc_dpy_resize ;
dcl -> dpy_setdata = vnc_dpy_setdata ;
register_displaychangelistener ( ds , dcl );
ths
authored
18 years ago
2056
2057
}
ths
authored
18 years ago
2058
ths
authored
18 years ago
2059
2060
void vnc_display_close ( DisplayState * ds )
{
2061
VncDisplay * vs = ds ? ( VncDisplay * ) ds -> opaque : vnc_display ;
ths
authored
18 years ago
2062
2063
2064
if ( ! vs )
return ;
ths
authored
18 years ago
2065
if ( vs -> display ) {
2066
2067
qemu_free ( vs -> display );
vs -> display = NULL ;
ths
authored
18 years ago
2068
2069
}
if ( vs -> lsock != - 1 ) {
2070
2071
2072
qemu_set_fd_handler2 ( vs -> lsock , NULL , NULL , NULL , NULL );
close ( vs -> lsock );
vs -> lsock = - 1 ;
ths
authored
18 years ago
2073
}
ths
authored
18 years ago
2074
vs -> auth = VNC_AUTH_INVALID ;
2075
# ifdef CONFIG_VNC_TLS
ths
authored
18 years ago
2076
vs -> subauth = VNC_AUTH_INVALID ;
2077
vs -> tls . x509verify = 0 ;
ths
authored
18 years ago
2078
# endif
ths
authored
18 years ago
2079
2080
2081
2082
}
int vnc_display_password ( DisplayState * ds , const char * password )
{
2083
VncDisplay * vs = ds ? ( VncDisplay * ) ds -> opaque : vnc_display ;
ths
authored
18 years ago
2084
2085
if ( vs -> password ) {
2086
2087
qemu_free ( vs -> password );
vs -> password = NULL ;
ths
authored
18 years ago
2088
2089
}
if ( password && password [ 0 ]) {
2090
2091
if ( ! ( vs -> password = qemu_strdup ( password )))
return - 1 ;
ths
authored
18 years ago
2092
2093
2094
}
return 0 ;
ths
authored
18 years ago
2095
2096
}
ths
authored
18 years ago
2097
int vnc_display_open ( DisplayState * ds , const char * display )
ths
authored
18 years ago
2098
{
2099
VncDisplay * vs = ds ? ( VncDisplay * ) ds -> opaque : vnc_display ;
ths
authored
18 years ago
2100
2101
const char * options ;
int password = 0 ;
2102
int reverse = 0 ;
2103
int to_port = 0 ;
2104
# ifdef CONFIG_VNC_TLS
ths
authored
18 years ago
2105
int tls = 0 , x509 = 0 ;
ths
authored
18 years ago
2106
# endif
2107
2108
2109
2110
# ifdef CONFIG_VNC_SASL
int sasl = 0 ;
int saslErr ;
# endif
2111
int acl = 0 ;
ths
authored
18 years ago
2112
2113
if ( ! vnc_display )
2114
return - 1 ;
ths
authored
18 years ago
2115
vnc_display_close ( ds );
ths
authored
18 years ago
2116
if ( strcmp ( display , "none" ) == 0 )
2117
return 0 ;
2118
ths
authored
18 years ago
2119
if ( ! ( vs -> display = strdup ( display )))
2120
return - 1 ;
ths
authored
18 years ago
2121
2122
2123
options = display ;
while (( options = strchr ( options , ',' ))) {
2124
2125
2126
2127
2128
2129
options ++ ;
if ( strncmp ( options , "password" , 8 ) == 0 ) {
password = 1 ; /* Require password auth */
} else if ( strncmp ( options , "reverse" , 7 ) == 0 ) {
reverse = 1 ;
} else if ( strncmp ( options , "to=" , 3 ) == 0 ) {
2130
to_port = atoi ( options + 3 ) + 5900 ;
2131
# ifdef CONFIG_VNC_SASL
2132
2133
} else if ( strncmp ( options , "sasl" , 4 ) == 0 ) {
sasl = 1 ; /* Require SASL auth */
2134
# endif
2135
# ifdef CONFIG_VNC_TLS
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
} else if ( strncmp ( options , "tls" , 3 ) == 0 ) {
tls = 1 ; /* Require TLS */
} else if ( strncmp ( options , "x509" , 4 ) == 0 ) {
char * start , * end ;
x509 = 1 ; /* Require x509 certificates */
if ( strncmp ( options , "x509verify" , 10 ) == 0 )
vs -> tls . x509verify = 1 ; /* ...and verify client certs */
/* Now check for ' x509 =/ some / path ' postfix
* and use that to setup x509 certificate / key paths */
start = strchr ( options , '=' );
end = strchr ( options , ',' );
if ( start && ( ! end || ( start < end ))) {
int len = end ? end - ( start + 1 ) : strlen ( start + 1 );
char * path = qemu_strndup ( start + 1 , len );
VNC_DEBUG ( "Trying certificate path '%s' \n " , path );
if ( vnc_tls_set_x509_creds_dir ( vs , path ) < 0 ) {
fprintf ( stderr , "Failed to find x509 certificates/keys in %s \n " , path );
qemu_free ( path );
qemu_free ( vs -> display );
vs -> display = NULL ;
return - 1 ;
}
qemu_free ( path );
} else {
fprintf ( stderr , "No certificate path provided \n " );
qemu_free ( vs -> display );
vs -> display = NULL ;
return - 1 ;
}
ths
authored
18 years ago
2167
# endif
2168
2169
2170
} else if ( strncmp ( options , "acl" , 3 ) == 0 ) {
acl = 1 ;
}
ths
authored
18 years ago
2171
2172
}
2173
2174
# ifdef CONFIG_VNC_TLS
if ( acl && x509 && vs -> tls . x509verify ) {
2175
2176
2177
2178
if ( ! ( vs -> tls . acl = qemu_acl_init ( "vnc.x509dname" ))) {
fprintf ( stderr , "Failed to create x509 dname ACL \n " );
exit ( 1 );
}
2179
2180
2181
2182
}
# endif
# ifdef CONFIG_VNC_SASL
if ( acl && sasl ) {
2183
2184
2185
2186
if ( ! ( vs -> sasl . acl = qemu_acl_init ( "vnc.username" ))) {
fprintf ( stderr , "Failed to create username ACL \n " );
exit ( 1 );
}
2187
2188
2189
}
# endif
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
/*
* Combinations we support here :
*
* - no - auth ( clear text , no auth )
* - password ( clear text , weak auth )
* - sasl ( encrypt , good auth * IF * using Kerberos via GSSAPI )
* - tls ( encrypt , weak anonymous creds , no auth )
* - tls + password ( encrypt , weak anonymous creds , weak auth )
* - tls + sasl ( encrypt , weak anonymous creds , good auth )
* - tls + x509 ( encrypt , good x509 creds , no auth )
* - tls + x509 + password ( encrypt , good x509 creds , weak auth )
* - tls + x509 + sasl ( encrypt , good x509 creds , good auth )
*
* NB1 . TLS is a stackable auth scheme .
* NB2 . the x509 schemes have option to validate a client cert dname
*/
ths
authored
18 years ago
2206
if ( password ) {
2207
# ifdef CONFIG_VNC_TLS
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
if ( tls ) {
vs -> auth = VNC_AUTH_VENCRYPT ;
if ( x509 ) {
VNC_DEBUG ( "Initializing VNC server with x509 password auth \n " );
vs -> subauth = VNC_AUTH_VENCRYPT_X509VNC ;
} else {
VNC_DEBUG ( "Initializing VNC server with TLS password auth \n " );
vs -> subauth = VNC_AUTH_VENCRYPT_TLSVNC ;
}
} else {
2218
# endif /* CONFIG_VNC_TLS */
2219
2220
VNC_DEBUG ( "Initializing VNC server with password auth \n " );
vs -> auth = VNC_AUTH_VNC ;
2221
# ifdef CONFIG_VNC_TLS
2222
2223
vs -> subauth = VNC_AUTH_INVALID ;
}
2224
2225
2226
2227
2228
2229
2230
# endif /* CONFIG_VNC_TLS */
# ifdef CONFIG_VNC_SASL
} else if ( sasl ) {
# ifdef CONFIG_VNC_TLS
if ( tls ) {
vs -> auth = VNC_AUTH_VENCRYPT ;
if ( x509 ) {
2231
VNC_DEBUG ( "Initializing VNC server with x509 SASL auth \n " );
2232
2233
vs -> subauth = VNC_AUTH_VENCRYPT_X509SASL ;
} else {
2234
VNC_DEBUG ( "Initializing VNC server with TLS SASL auth \n " );
2235
2236
2237
2238
vs -> subauth = VNC_AUTH_VENCRYPT_TLSSASL ;
}
} else {
# endif /* CONFIG_VNC_TLS */
2239
VNC_DEBUG ( "Initializing VNC server with SASL auth \n " );
2240
2241
2242
2243
2244
2245
vs -> auth = VNC_AUTH_SASL ;
# ifdef CONFIG_VNC_TLS
vs -> subauth = VNC_AUTH_INVALID ;
}
# endif /* CONFIG_VNC_TLS */
# endif /* CONFIG_VNC_SASL */
ths
authored
18 years ago
2246
} else {
2247
# ifdef CONFIG_VNC_TLS
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
if ( tls ) {
vs -> auth = VNC_AUTH_VENCRYPT ;
if ( x509 ) {
VNC_DEBUG ( "Initializing VNC server with x509 no auth \n " );
vs -> subauth = VNC_AUTH_VENCRYPT_X509NONE ;
} else {
VNC_DEBUG ( "Initializing VNC server with TLS no auth \n " );
vs -> subauth = VNC_AUTH_VENCRYPT_TLSNONE ;
}
} else {
ths
authored
18 years ago
2258
# endif
2259
2260
VNC_DEBUG ( "Initializing VNC server with no auth \n " );
vs -> auth = VNC_AUTH_NONE ;
2261
# ifdef CONFIG_VNC_TLS
2262
2263
vs -> subauth = VNC_AUTH_INVALID ;
}
ths
authored
18 years ago
2264
# endif
ths
authored
18 years ago
2265
}
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
# ifdef CONFIG_VNC_SASL
if (( saslErr = sasl_server_init ( NULL , "qemu" )) != SASL_OK ) {
fprintf ( stderr , "Failed to initialize SASL auth %s" ,
sasl_errstring ( saslErr , NULL , NULL ));
free ( vs -> display );
vs -> display = NULL ;
return - 1 ;
}
# endif
2277
if ( reverse ) {
2278
2279
2280
2281
2282
2283
/* connect to viewer */
if ( strncmp ( display , "unix:" , 5 ) == 0 )
vs -> lsock = unix_connect ( display + 5 );
else
vs -> lsock = inet_connect ( display , SOCK_STREAM );
if ( - 1 == vs -> lsock ) {
2284
2285
2286
2287
free ( vs -> display );
vs -> display = NULL ;
return - 1 ;
} else {
2288
int csock = vs -> lsock ;
2289
vs -> lsock = - 1 ;
2290
vnc_connect ( vs , csock );
2291
}
2292
return 0 ;
2293
2294
2295
2296
2297
2298
} else {
/* listen for connects */
char * dpy ;
dpy = qemu_malloc ( 256 );
if ( strncmp ( display , "unix:" , 5 ) == 0 ) {
2299
pstrcpy ( dpy , 256 , "unix:" );
2300
vs -> lsock = unix_listen ( display + 5 , dpy + 5 , 256 - 5 );
2301
2302
2303
2304
2305
} else {
vs -> lsock = inet_listen ( display , dpy , 256 , SOCK_STREAM , 5900 );
}
if ( - 1 == vs -> lsock ) {
free ( dpy );
2306
return - 1 ;
2307
2308
2309
2310
} else {
free ( vs -> display );
vs -> display = dpy ;
}
2311
}
2312
return qemu_set_fd_handler2 ( vs -> lsock , NULL , vnc_listen_read , NULL , vs );
2313
}