2019-09-07 16:51:07 +00:00
|
|
|
/*
|
2022-02-19 23:06:15 +00:00
|
|
|
* Copyright (c) 2019 - 2022 Andri Yngvason
|
2019-09-07 16:51:07 +00:00
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
|
|
|
|
* REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
|
|
* AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
|
|
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
|
|
* LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
|
|
* PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
#include "rfb-proto.h"
|
2019-08-27 21:49:28 +00:00
|
|
|
#include "vec.h"
|
2019-08-31 23:16:55 +00:00
|
|
|
#include "type-macros.h"
|
2019-10-07 17:39:54 +00:00
|
|
|
#include "fb.h"
|
2020-04-12 18:16:19 +00:00
|
|
|
#include "display.h"
|
2019-08-28 22:46:47 +00:00
|
|
|
#include "neatvnc.h"
|
2019-12-30 17:22:19 +00:00
|
|
|
#include "common.h"
|
2019-12-30 20:13:40 +00:00
|
|
|
#include "pixels.h"
|
2020-01-25 15:35:14 +00:00
|
|
|
#include "stream.h"
|
2019-12-31 10:13:21 +00:00
|
|
|
#include "config.h"
|
2020-04-01 22:53:22 +00:00
|
|
|
#include "usdt.h"
|
2021-12-09 22:48:31 +00:00
|
|
|
#include "encoder.h"
|
|
|
|
#include "tight.h"
|
2021-12-12 16:05:29 +00:00
|
|
|
#include "enc-util.h"
|
2022-02-06 15:43:45 +00:00
|
|
|
#include "cursor.h"
|
2022-07-09 17:15:35 +00:00
|
|
|
#include "logging.h"
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2022-06-25 15:38:38 +00:00
|
|
|
#include <stdio.h>
|
2019-08-12 20:49:23 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/queue.h>
|
2020-01-19 19:00:18 +00:00
|
|
|
#include <sys/param.h>
|
2019-08-12 20:49:23 +00:00
|
|
|
#include <assert.h>
|
2020-03-16 20:09:22 +00:00
|
|
|
#include <aml.h>
|
2019-08-12 20:49:23 +00:00
|
|
|
#include <libdrm/drm_fourcc.h>
|
2019-08-25 19:10:35 +00:00
|
|
|
#include <pixman.h>
|
2019-09-15 21:51:07 +00:00
|
|
|
#include <pthread.h>
|
2020-03-16 20:09:22 +00:00
|
|
|
#include <errno.h>
|
2020-04-04 22:23:04 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2021-03-17 07:37:06 +00:00
|
|
|
#include <sys/un.h>
|
2020-04-04 22:23:04 +00:00
|
|
|
#include <netdb.h>
|
2022-07-09 16:29:18 +00:00
|
|
|
#include <netinet/tcp.h>
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
#include <gnutls/gnutls.h>
|
|
|
|
#endif
|
|
|
|
|
2019-09-10 18:17:45 +00:00
|
|
|
#ifndef DRM_FORMAT_INVALID
|
|
|
|
#define DRM_FORMAT_INVALID 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef DRM_FORMAT_MOD_LINEAR
|
|
|
|
#define DRM_FORMAT_MOD_LINEAR DRM_FORMAT_MOD_NONE
|
|
|
|
#endif
|
|
|
|
|
2019-08-29 21:47:02 +00:00
|
|
|
#define DEFAULT_NAME "Neat VNC"
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2019-09-19 18:14:24 +00:00
|
|
|
#define EXPORT __attribute__((visibility("default")))
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2021-03-17 07:37:06 +00:00
|
|
|
enum addrtype {
|
|
|
|
ADDRTYPE_TCP,
|
|
|
|
ADDRTYPE_UNIX,
|
|
|
|
};
|
|
|
|
|
2020-09-26 21:40:11 +00:00
|
|
|
static int send_desktop_resize(struct nvnc_client* client, struct nvnc_fb* fb);
|
2020-11-29 18:17:30 +00:00
|
|
|
static int send_qemu_key_ext_frame(struct nvnc_client* client);
|
2021-12-24 16:29:37 +00:00
|
|
|
static enum rfb_encodings choose_frame_encoding(struct nvnc_client* client,
|
|
|
|
struct nvnc_fb*);
|
2020-09-27 12:37:00 +00:00
|
|
|
static enum tight_quality client_get_tight_quality(struct nvnc_client* client);
|
2022-04-14 16:56:41 +00:00
|
|
|
static void on_encode_frame_done(struct encoder*, struct rcbuf*, uint64_t pts);
|
2020-11-29 18:17:30 +00:00
|
|
|
static bool client_has_encoding(const struct nvnc_client* client,
|
|
|
|
enum rfb_encodings encoding);
|
2021-12-24 16:29:37 +00:00
|
|
|
static void process_fb_update_requests(struct nvnc_client* client);
|
2019-10-07 20:12:59 +00:00
|
|
|
|
2020-07-26 11:43:00 +00:00
|
|
|
#if defined(GIT_VERSION)
|
|
|
|
EXPORT const char nvnc_version[] = GIT_VERSION;
|
|
|
|
#elif defined(PROJECT_VERSION)
|
|
|
|
EXPORT const char nvnc_version[] = PROJECT_VERSION;
|
|
|
|
#else
|
|
|
|
EXPORT const char nvnc_version[] = "UNKNOWN";
|
|
|
|
#endif
|
|
|
|
|
2020-11-29 20:48:31 +00:00
|
|
|
extern const unsigned short code_map_qnum_to_linux[];
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
static uint64_t nvnc__htonll(uint64_t x)
|
|
|
|
{
|
|
|
|
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
|
2022-04-24 17:24:45 +00:00
|
|
|
return __builtin_bswap64(x);
|
2022-04-14 16:56:41 +00:00
|
|
|
#else
|
|
|
|
return x;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static void client_close(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "Closing client connection %p: ref %d", client,
|
|
|
|
client->ref);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2021-09-04 17:05:30 +00:00
|
|
|
nvnc_cleanup_fn cleanup = client->common.cleanup_fn;
|
|
|
|
if (cleanup)
|
|
|
|
cleanup(client->common.userdata);
|
|
|
|
|
2019-08-31 23:30:08 +00:00
|
|
|
nvnc_client_fn fn = client->cleanup_fn;
|
|
|
|
if (fn)
|
|
|
|
fn(client);
|
|
|
|
|
2021-08-29 14:41:57 +00:00
|
|
|
if (client->current_fb) {
|
|
|
|
nvnc_fb_release(client->current_fb);
|
|
|
|
nvnc_fb_unref(client->current_fb);
|
|
|
|
}
|
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
LIST_REMOVE(client, link);
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_destroy(client->net_stream);
|
2021-12-25 15:46:58 +00:00
|
|
|
if (client->encoder) {
|
|
|
|
client->server->n_damage_clients -=
|
|
|
|
!(client->encoder->impl->flags &
|
|
|
|
ENCODER_IMPL_FLAG_IGNORES_DAMAGE);
|
|
|
|
}
|
2021-12-09 22:48:31 +00:00
|
|
|
encoder_destroy(client->encoder);
|
2019-10-07 20:12:59 +00:00
|
|
|
pixman_region_fini(&client->damage);
|
2020-09-23 02:37:42 +00:00
|
|
|
free(client->cut_text.buffer);
|
2019-08-12 20:49:23 +00:00
|
|
|
free(client);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static inline void client_unref(struct nvnc_client* client)
|
2019-09-18 21:28:48 +00:00
|
|
|
{
|
2020-01-25 15:35:14 +00:00
|
|
|
assert(client->ref > 0);
|
|
|
|
|
2019-09-18 21:28:48 +00:00
|
|
|
if (--client->ref == 0)
|
|
|
|
client_close(client);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static inline void client_ref(struct nvnc_client* client)
|
2019-09-18 21:28:48 +00:00
|
|
|
{
|
|
|
|
++client->ref;
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static void close_after_write(void* userdata, enum stream_req_status status)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2020-01-25 15:35:14 +00:00
|
|
|
struct nvnc_client* client = userdata;
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_DEBUG, "close_after_write(%p): ref %d", client,
|
|
|
|
client->ref);
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_close(client->net_stream);
|
2019-09-18 21:28:48 +00:00
|
|
|
client_unref(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int handle_unsupported_version(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
char buffer[256];
|
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_ERROR;
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_error_reason* reason = (struct rfb_error_reason*)(buffer + 1);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
static const char reason_string[] = "Unsupported version\n";
|
|
|
|
|
|
|
|
buffer[0] = 0; /* Number of security types is 0 on error */
|
|
|
|
reason->length = htonl(strlen(reason_string));
|
2020-05-29 20:18:05 +00:00
|
|
|
strcpy(reason->message, reason_string);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
size_t len = 1 + sizeof(*reason) + strlen(reason_string);
|
|
|
|
stream_write(client->net_stream, buffer, len, close_after_write,
|
|
|
|
client);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_version_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
if (client->buffer_len - client->buffer_index < 12)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
char version_string[13];
|
|
|
|
memcpy(version_string, client->msg_buffer + client->buffer_index, 12);
|
|
|
|
version_string[12] = '\0';
|
|
|
|
|
|
|
|
if (strcmp(RFB_VERSION_MESSAGE, version_string) != 0)
|
|
|
|
return handle_unsupported_version(client);
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
struct rfb_security_types_msg security = { 0 };
|
|
|
|
security.n = 1;
|
|
|
|
security.types[0] = RFB_SECURITY_TYPE_NONE;
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
#ifdef ENABLE_TLS
|
2020-05-22 20:50:09 +00:00
|
|
|
if (client->server->auth_fn)
|
2020-01-25 15:35:14 +00:00
|
|
|
security.types[0] = RFB_SECURITY_TYPE_VENCRYPT;
|
|
|
|
#endif
|
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
stream_write(client->net_stream, &security, sizeof(security), NULL,
|
|
|
|
NULL);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_SECURITY;
|
|
|
|
return 12;
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:58:43 +00:00
|
|
|
static int security_handshake_failed(struct nvnc_client* client,
|
|
|
|
const char* reason_string)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
char buffer[256];
|
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_ERROR;
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
uint8_t* result = (uint8_t*)buffer;
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_error_reason* reason =
|
|
|
|
(struct rfb_error_reason*)(buffer + sizeof(*result));
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
*result = htonl(RFB_SECURITY_HANDSHAKE_FAILED);
|
|
|
|
reason->length = htonl(strlen(reason_string));
|
|
|
|
(void)strcmp(reason->message, reason_string);
|
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
size_t len = sizeof(*result) + sizeof(*reason) + strlen(reason_string);
|
|
|
|
stream_write(client->net_stream, buffer, len, close_after_write,
|
|
|
|
client);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static int security_handshake_ok(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
uint32_t result = htonl(RFB_SECURITY_HANDSHAKE_OK);
|
2020-01-25 15:52:44 +00:00
|
|
|
return stream_write(client->net_stream, &result, sizeof(result), NULL,
|
|
|
|
NULL);
|
2020-01-25 15:35:14 +00:00
|
|
|
}
|
|
|
|
|
2020-05-22 20:50:09 +00:00
|
|
|
#ifdef ENABLE_TLS
|
2020-01-25 15:35:14 +00:00
|
|
|
static int send_byte(struct nvnc_client* client, uint8_t value)
|
|
|
|
{
|
2020-01-25 15:52:44 +00:00
|
|
|
return stream_write(client->net_stream, &value, 1, NULL, NULL);
|
2020-01-25 15:35:14 +00:00
|
|
|
}
|
|
|
|
|
2020-01-25 16:04:04 +00:00
|
|
|
static int send_byte_and_close(struct nvnc_client* client, uint8_t value)
|
|
|
|
{
|
|
|
|
return stream_write(client->net_stream, &value, 1, close_after_write,
|
|
|
|
client);
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static int vencrypt_send_version(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct rfb_vencrypt_version_msg msg = {
|
|
|
|
.major = 0,
|
|
|
|
.minor = 2,
|
|
|
|
};
|
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
return stream_write(client->net_stream, &msg, sizeof(msg), NULL, NULL);
|
2020-01-25 15:35:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int on_vencrypt_version_message(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct rfb_vencrypt_version_msg* msg =
|
|
|
|
(struct rfb_vencrypt_version_msg*)&client->msg_buffer[client->buffer_index];
|
|
|
|
|
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (msg->major != 0 || msg->minor != 2) {
|
2020-01-25 15:58:43 +00:00
|
|
|
security_handshake_failed(client, "Unsupported VeNCrypt version");
|
2020-01-25 15:35:14 +00:00
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
send_byte(client, 0);
|
|
|
|
|
|
|
|
struct rfb_vencrypt_subtypes_msg result = { .n = 1, };
|
|
|
|
result.types[0] = htonl(RFB_VENCRYPT_X509_PLAIN);
|
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
stream_write(client->net_stream, &result, sizeof(result), NULL, NULL);
|
2020-01-25 15:35:14 +00:00
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_SUBTYPE;
|
|
|
|
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_vencrypt_subtype_message(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
uint32_t* msg = (uint32_t*)&client->msg_buffer[client->buffer_index];
|
|
|
|
|
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
enum rfb_vencrypt_subtype subtype = ntohl(*msg);
|
|
|
|
|
|
|
|
if (subtype != RFB_VENCRYPT_X509_PLAIN) {
|
2020-01-25 16:04:04 +00:00
|
|
|
client->state = VNC_CLIENT_STATE_ERROR;
|
|
|
|
send_byte_and_close(client, 0);
|
2020-01-25 15:35:14 +00:00
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
send_byte(client, 1);
|
|
|
|
|
|
|
|
if (stream_upgrade_to_tls(client->net_stream, client->server->tls_creds) < 0) {
|
2020-01-25 16:04:04 +00:00
|
|
|
client->state = VNC_CLIENT_STATE_ERROR;
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_PLAIN_AUTH;
|
|
|
|
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_vencrypt_plain_auth_message(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct nvnc* server = client->server;
|
|
|
|
|
|
|
|
struct rfb_vencrypt_plain_auth_msg* msg =
|
|
|
|
(void*)(client->msg_buffer + client->buffer_index);
|
|
|
|
|
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
uint32_t ulen = ntohl(msg->username_len);
|
|
|
|
uint32_t plen = ntohl(msg->password_len);
|
|
|
|
|
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg) + ulen + plen)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
char username[256];
|
|
|
|
char password[256];
|
|
|
|
|
|
|
|
memcpy(username, msg->text, MIN(ulen, sizeof(username) - 1));
|
|
|
|
memcpy(password, msg->text + ulen, MIN(plen, sizeof(password) - 1));
|
|
|
|
|
|
|
|
username[MIN(ulen, sizeof(username) - 1)] = '\0';
|
|
|
|
password[MIN(plen, sizeof(password) - 1)] = '\0';
|
|
|
|
|
|
|
|
if (server->auth_fn(username, password, server->auth_ud)) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "User \"%s\" authenticated", username);
|
2020-01-25 15:35:14 +00:00
|
|
|
security_handshake_ok(client);
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_INIT;
|
|
|
|
} else {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "User \"%s\" rejected", username);
|
2020-01-25 15:58:43 +00:00
|
|
|
security_handshake_failed(client, "Invalid username or password");
|
2020-01-25 15:35:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return sizeof(*msg) + ulen + plen;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_security_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
if (client->buffer_len - client->buffer_index < 1)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
uint8_t type = client->msg_buffer[client->buffer_index];
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
switch (type) {
|
|
|
|
case RFB_SECURITY_TYPE_NONE:
|
|
|
|
security_handshake_ok(client);
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_INIT;
|
|
|
|
break;
|
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
case RFB_SECURITY_TYPE_VENCRYPT:
|
|
|
|
vencrypt_send_version(client);
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_VERSION;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2020-01-25 15:58:43 +00:00
|
|
|
security_handshake_failed(client, "Unsupported security type");
|
2020-01-25 15:35:14 +00:00
|
|
|
break;
|
|
|
|
}
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
return sizeof(type);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static void disconnect_all_other_clients(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc_client* node;
|
2020-01-25 15:35:14 +00:00
|
|
|
struct nvnc_client* tmp;
|
|
|
|
|
|
|
|
LIST_FOREACH_SAFE (node, &client->server->clients, link, tmp)
|
|
|
|
if (node != client) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_DEBUG,
|
|
|
|
"disconnect other client %p (ref %d)",
|
|
|
|
node, node->ref);
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_close(node->net_stream);
|
|
|
|
client_unref(node);
|
|
|
|
}
|
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static void send_server_init_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc* server = client->server;
|
2020-04-12 18:16:19 +00:00
|
|
|
struct nvnc_display* display = server->display;
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-04-12 16:08:33 +00:00
|
|
|
size_t name_len = strlen(server->name);
|
2019-08-12 20:49:23 +00:00
|
|
|
size_t size = sizeof(struct rfb_server_init_msg) + name_len;
|
|
|
|
|
2020-04-12 18:16:19 +00:00
|
|
|
if (!display) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "Tried to send init message, but no display has been added");
|
2020-04-12 16:08:33 +00:00
|
|
|
goto close;
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2020-04-12 18:16:19 +00:00
|
|
|
if (!display->buffer) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "Tried to send init message, but no framebuffers have been set");
|
2020-04-12 18:16:19 +00:00
|
|
|
goto close;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t width = nvnc_fb_get_width(display->buffer);
|
|
|
|
uint16_t height = nvnc_fb_get_height(display->buffer);
|
|
|
|
uint32_t fourcc = nvnc_fb_get_fourcc_format(display->buffer);
|
2019-08-25 19:10:35 +00:00
|
|
|
|
2020-04-12 16:08:33 +00:00
|
|
|
struct rfb_server_init_msg* msg = calloc(1, size);
|
|
|
|
if (!msg)
|
|
|
|
goto close;
|
|
|
|
|
|
|
|
msg->width = htons(width);
|
|
|
|
msg->height = htons(height);
|
|
|
|
msg->name_length = htonl(name_len);
|
|
|
|
memcpy(msg->name_string, server->name, name_len);
|
|
|
|
|
|
|
|
int rc = rfb_pixfmt_from_fourcc(&msg->pixel_format, fourcc);
|
|
|
|
if (rc < 0)
|
|
|
|
goto pixfmt_failure;
|
2019-09-08 16:48:05 +00:00
|
|
|
|
2019-08-25 19:10:35 +00:00
|
|
|
msg->pixel_format.red_max = htons(msg->pixel_format.red_max);
|
|
|
|
msg->pixel_format.green_max = htons(msg->pixel_format.green_max);
|
|
|
|
msg->pixel_format.blue_max = htons(msg->pixel_format.blue_max);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
struct rcbuf* payload = rcbuf_new(msg, size);
|
2020-01-25 15:52:44 +00:00
|
|
|
stream_send(client->net_stream, payload, NULL, NULL);
|
2020-04-12 16:08:33 +00:00
|
|
|
|
2020-07-19 11:54:39 +00:00
|
|
|
client->known_width = width;
|
|
|
|
client->known_height = height;
|
2020-04-12 16:08:33 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
pixfmt_failure:
|
|
|
|
free(msg);
|
|
|
|
close:
|
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_init_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
if (client->buffer_len - client->buffer_index < 1)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
uint8_t shared_flag = client->msg_buffer[client->buffer_index];
|
2019-09-06 20:07:09 +00:00
|
|
|
if (!shared_flag)
|
2019-08-12 20:49:23 +00:00
|
|
|
disconnect_all_other_clients(client);
|
|
|
|
|
|
|
|
send_server_init_message(client);
|
|
|
|
|
2019-08-31 23:30:08 +00:00
|
|
|
nvnc_client_fn fn = client->server->new_client_fn;
|
|
|
|
if (fn)
|
|
|
|
fn(client);
|
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
client->state = VNC_CLIENT_STATE_READY;
|
|
|
|
return sizeof(shared_flag);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_set_pixel_format(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
if (client->buffer_len - client->buffer_index <
|
|
|
|
4 + sizeof(struct rfb_pixel_format))
|
2019-08-12 20:49:23 +00:00
|
|
|
return 0;
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_pixel_format* fmt =
|
|
|
|
(struct rfb_pixel_format*)(client->msg_buffer +
|
|
|
|
client->buffer_index + 4);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
if (!fmt->true_colour_flag) {
|
|
|
|
/* We don't really know what to do with color maps right now */
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_close(client->net_stream);
|
2019-09-18 21:28:48 +00:00
|
|
|
client_unref(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-08-25 19:10:35 +00:00
|
|
|
fmt->red_max = ntohs(fmt->red_max);
|
|
|
|
fmt->green_max = ntohs(fmt->green_max);
|
|
|
|
fmt->blue_max = ntohs(fmt->blue_max);
|
|
|
|
|
|
|
|
memcpy(&client->pixfmt, fmt, sizeof(client->pixfmt));
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-24 22:28:37 +00:00
|
|
|
client->has_pixfmt = true;
|
2019-08-25 19:10:35 +00:00
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
return 4 + sizeof(struct rfb_pixel_format);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_set_encodings(struct nvnc_client* client)
|
2019-08-12 23:33:06 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_client_set_encodings_msg* msg =
|
|
|
|
(struct rfb_client_set_encodings_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2020-01-19 19:16:27 +00:00
|
|
|
size_t n_encodings = MIN(MAX_ENCODINGS, ntohs(msg->n_encodings));
|
|
|
|
size_t n = 0;
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-12-23 09:33:29 +00:00
|
|
|
if (client->buffer_len - client->buffer_index <
|
|
|
|
sizeof(*msg) + n_encodings * 4)
|
|
|
|
return 0;
|
|
|
|
|
2020-01-19 19:16:27 +00:00
|
|
|
for (size_t i = 0; i < n_encodings; ++i) {
|
2019-10-08 18:12:57 +00:00
|
|
|
enum rfb_encodings encoding = htonl(msg->encodings[i]);
|
|
|
|
|
|
|
|
switch (encoding) {
|
2019-09-19 18:14:24 +00:00
|
|
|
case RFB_ENCODING_RAW:
|
|
|
|
case RFB_ENCODING_COPYRECT:
|
|
|
|
case RFB_ENCODING_RRE:
|
|
|
|
case RFB_ENCODING_HEXTILE:
|
2019-12-30 09:59:51 +00:00
|
|
|
case RFB_ENCODING_TIGHT:
|
2019-09-19 18:14:24 +00:00
|
|
|
case RFB_ENCODING_TRLE:
|
|
|
|
case RFB_ENCODING_ZRLE:
|
2021-12-24 16:29:37 +00:00
|
|
|
case RFB_ENCODING_OPEN_H264:
|
2019-09-19 18:14:24 +00:00
|
|
|
case RFB_ENCODING_CURSOR:
|
|
|
|
case RFB_ENCODING_DESKTOPSIZE:
|
2020-04-03 19:56:44 +00:00
|
|
|
case RFB_ENCODING_JPEG_HIGHQ:
|
|
|
|
case RFB_ENCODING_JPEG_LOWQ:
|
2020-11-29 17:35:06 +00:00
|
|
|
case RFB_ENCODING_QEMU_EXT_KEY_EVENT:
|
2022-04-14 16:56:41 +00:00
|
|
|
case RFB_ENCODING_PTS:
|
2019-10-08 18:12:57 +00:00
|
|
|
client->encodings[n++] = encoding;
|
2019-08-12 23:33:06 +00:00
|
|
|
}
|
2019-10-08 18:12:57 +00:00
|
|
|
}
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-09-19 18:14:24 +00:00
|
|
|
client->n_encodings = n;
|
2019-08-12 23:33:06 +00:00
|
|
|
|
|
|
|
return sizeof(*msg) + 4 * n_encodings;
|
|
|
|
}
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
static void on_encoder_push_done(struct encoder* encoder, struct rcbuf* payload,
|
|
|
|
uint64_t pts)
|
2021-12-24 16:29:37 +00:00
|
|
|
{
|
|
|
|
(void)payload;
|
2022-04-14 16:56:41 +00:00
|
|
|
(void)pts;
|
2021-12-24 16:29:37 +00:00
|
|
|
|
|
|
|
struct nvnc_client* client = encoder->userdata;
|
|
|
|
process_fb_update_requests(client);
|
|
|
|
}
|
|
|
|
|
2022-02-06 15:43:45 +00:00
|
|
|
static void send_cursor_update(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct nvnc* server = client->server;
|
|
|
|
|
|
|
|
struct vec payload;
|
|
|
|
vec_init(&payload, 4096);
|
|
|
|
|
|
|
|
struct rfb_server_fb_update_msg head = {
|
|
|
|
.type = RFB_SERVER_TO_CLIENT_FRAMEBUFFER_UPDATE,
|
|
|
|
.n_rects = htons(1),
|
|
|
|
};
|
|
|
|
|
|
|
|
vec_append(&payload, &head, sizeof(head));
|
|
|
|
|
|
|
|
int rc = cursor_encode(&payload, &client->pixfmt, server->cursor.buffer,
|
2022-02-19 23:06:15 +00:00
|
|
|
server->cursor.width, server->cursor.height,
|
|
|
|
server->cursor.hotspot_x, server->cursor.hotspot_y);
|
2022-02-06 15:43:45 +00:00
|
|
|
if (rc < 0) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Failed to send cursor to client");
|
2022-02-06 15:43:45 +00:00
|
|
|
vec_destroy(&payload);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
client->cursor_seq = server->cursor_seq;
|
|
|
|
|
|
|
|
stream_send(client->net_stream, rcbuf_new(payload.data, payload.len),
|
|
|
|
NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
static bool will_send_pts(const struct nvnc_client* client, uint64_t pts)
|
|
|
|
{
|
|
|
|
return pts != NVNC_NO_PTS && client_has_encoding(client, RFB_ENCODING_PTS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void send_pts_rect(struct nvnc_client* client, uint64_t pts)
|
|
|
|
{
|
|
|
|
if (!will_send_pts(client, pts))
|
|
|
|
return;
|
|
|
|
|
|
|
|
uint8_t buf[sizeof(struct rfb_server_fb_rect) + 8] = { 0 };
|
|
|
|
struct rfb_server_fb_rect* head = (struct rfb_server_fb_rect*)buf;
|
|
|
|
head->encoding = htonl(RFB_ENCODING_PTS);
|
|
|
|
uint64_t* msg_pts = (uint64_t*)&buf[sizeof(struct rfb_server_fb_rect)];
|
|
|
|
*msg_pts = nvnc__htonll(pts);
|
|
|
|
|
|
|
|
stream_write(client->net_stream, buf, sizeof(buf), NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2022-07-09 16:28:09 +00:00
|
|
|
static const char* encoding_to_string(enum rfb_encodings encoding)
|
|
|
|
{
|
|
|
|
switch (encoding) {
|
|
|
|
case RFB_ENCODING_RAW: return "raw";
|
|
|
|
case RFB_ENCODING_TIGHT: return "tight";
|
|
|
|
case RFB_ENCODING_ZRLE: return "zrle";
|
|
|
|
case RFB_ENCODING_OPEN_H264: return "open-h264";
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return "UNKNOWN";
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static void process_fb_update_requests(struct nvnc_client* client)
|
2019-10-07 20:12:59 +00:00
|
|
|
{
|
2020-09-26 21:40:11 +00:00
|
|
|
struct nvnc* server = client->server;
|
|
|
|
|
|
|
|
if (!server->display || !server->display->buffer)
|
2019-10-07 20:12:59 +00:00
|
|
|
return;
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
if (client->net_stream->state == STREAM_STATE_CLOSED)
|
2019-10-07 20:12:59 +00:00
|
|
|
return;
|
|
|
|
|
2019-10-12 17:29:08 +00:00
|
|
|
if (client->is_updating || client->n_pending_requests == 0)
|
2019-10-07 20:12:59 +00:00
|
|
|
return;
|
|
|
|
|
2020-09-26 21:40:11 +00:00
|
|
|
struct nvnc_fb* fb = client->server->display->buffer;
|
|
|
|
assert(fb);
|
|
|
|
|
2020-09-26 22:17:02 +00:00
|
|
|
if (!client->has_pixfmt) {
|
|
|
|
rfb_pixfmt_from_fourcc(&client->pixfmt, fb->fourcc_format);
|
|
|
|
client->has_pixfmt = true;
|
|
|
|
}
|
|
|
|
|
2020-09-26 21:40:11 +00:00
|
|
|
if (fb->width != client->known_width
|
2020-11-29 18:29:18 +00:00
|
|
|
|| fb->height != client->known_height) {
|
2020-09-26 21:40:11 +00:00
|
|
|
send_desktop_resize(client, fb);
|
|
|
|
|
2020-11-29 18:29:18 +00:00
|
|
|
if (--client->n_pending_requests <= 0)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-11-29 18:17:30 +00:00
|
|
|
if (server->key_code_fn && !client->is_qemu_key_ext_notified
|
|
|
|
&& client_has_encoding(client, RFB_ENCODING_QEMU_EXT_KEY_EVENT)) {
|
|
|
|
send_qemu_key_ext_frame(client);
|
|
|
|
client->is_qemu_key_ext_notified = true;
|
2020-11-29 18:29:18 +00:00
|
|
|
|
|
|
|
if (--client->n_pending_requests <= 0)
|
|
|
|
return;
|
2020-11-29 18:17:30 +00:00
|
|
|
}
|
|
|
|
|
2022-02-06 15:43:45 +00:00
|
|
|
if (server->cursor_seq != client->cursor_seq
|
|
|
|
&& client_has_encoding(client, RFB_ENCODING_CURSOR)) {
|
|
|
|
send_cursor_update(client);
|
|
|
|
|
|
|
|
if (--client->n_pending_requests <= 0)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!pixman_region_not_empty(&client->damage))
|
|
|
|
return;
|
|
|
|
|
2020-09-26 21:40:11 +00:00
|
|
|
DTRACE_PROBE1(neatvnc, update_fb_start, client);
|
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
enum rfb_encodings encoding = choose_frame_encoding(client, fb);
|
2021-12-09 22:48:31 +00:00
|
|
|
if (!client->encoder || encoding != encoder_get_type(client->encoder)) {
|
|
|
|
int width = server->display->buffer->width;
|
|
|
|
int height = server->display->buffer->height;
|
2021-12-25 15:46:58 +00:00
|
|
|
if (client->encoder) {
|
|
|
|
server->n_damage_clients -=
|
|
|
|
!(client->encoder->impl->flags &
|
|
|
|
ENCODER_IMPL_FLAG_IGNORES_DAMAGE);
|
|
|
|
}
|
2021-12-09 22:48:31 +00:00
|
|
|
encoder_destroy(client->encoder);
|
|
|
|
client->encoder = encoder_new(encoding, width, height);
|
|
|
|
if (!client->encoder) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Failed to allocate new encoder");
|
2021-12-24 16:29:37 +00:00
|
|
|
return;
|
2021-12-09 22:48:31 +00:00
|
|
|
}
|
2020-09-27 12:37:00 +00:00
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
if (encoder_get_kind(client->encoder) == ENCODER_KIND_PUSH_PULL)
|
|
|
|
{
|
|
|
|
client->encoder->on_done = on_encoder_push_done;
|
|
|
|
client->encoder->userdata = client;
|
|
|
|
}
|
2021-12-25 15:46:58 +00:00
|
|
|
|
|
|
|
server->n_damage_clients +=
|
|
|
|
!(client->encoder->impl->flags &
|
|
|
|
ENCODER_IMPL_FLAG_IGNORES_DAMAGE);
|
2022-07-09 16:28:09 +00:00
|
|
|
|
|
|
|
nvnc_log(NVNC_LOG_INFO, "Choosing %s encoding for client %p",
|
|
|
|
encoding_to_string(encoding), client);
|
2021-12-24 16:29:37 +00:00
|
|
|
}
|
2020-09-27 12:37:00 +00:00
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
enum encoder_kind kind = encoder_get_kind(client->encoder);
|
|
|
|
if (kind == ENCODER_KIND_PUSH_PULL) {
|
2022-04-14 16:56:41 +00:00
|
|
|
uint64_t pts = NVNC_NO_PTS;
|
|
|
|
struct rcbuf* buf = encoder_pull(client->encoder, &pts);
|
2021-12-24 16:29:37 +00:00
|
|
|
if (!buf)
|
|
|
|
return;
|
2020-09-27 12:37:00 +00:00
|
|
|
|
2022-06-26 13:54:15 +00:00
|
|
|
DTRACE_PROBE2(neatvnc, process_fb_update_requests__pull, client,
|
|
|
|
pts);
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
int n_rects = client->encoder->n_rects;
|
|
|
|
n_rects += will_send_pts(client, pts) ? 1 : 0;
|
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
struct rfb_server_fb_update_msg update_msg = {
|
|
|
|
.type = RFB_SERVER_TO_CLIENT_FRAMEBUFFER_UPDATE,
|
2022-04-14 16:56:41 +00:00
|
|
|
.n_rects = htons(n_rects),
|
2021-12-24 16:29:37 +00:00
|
|
|
};
|
|
|
|
stream_write(client->net_stream, &update_msg,
|
|
|
|
sizeof(update_msg), NULL, NULL);
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
send_pts_rect(client, pts);
|
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
stream_send(client->net_stream, buf, NULL, NULL);
|
|
|
|
pixman_region_clear(&client->damage);
|
|
|
|
--client->n_pending_requests;
|
|
|
|
} else if (kind == ENCODER_KIND_REGULAR) {
|
|
|
|
/* The client's damage is exchanged for an empty one */
|
|
|
|
struct pixman_region16 damage = client->damage;
|
|
|
|
pixman_region_init(&client->damage);
|
|
|
|
|
|
|
|
client->is_updating = true;
|
|
|
|
client->current_fb = fb;
|
|
|
|
nvnc_fb_hold(fb);
|
|
|
|
nvnc_fb_ref(fb);
|
|
|
|
|
|
|
|
client_ref(client);
|
|
|
|
|
|
|
|
int q = client_get_tight_quality(client);
|
|
|
|
encoder_set_tight_quality(client->encoder, q);
|
|
|
|
encoder_set_output_format(client->encoder, &client->pixfmt);
|
|
|
|
|
|
|
|
client->encoder->on_done = on_encode_frame_done;
|
|
|
|
client->encoder->userdata = client;
|
|
|
|
|
2022-06-26 13:54:15 +00:00
|
|
|
DTRACE_PROBE2(neatvnc, process_fb_update_requests__encode,
|
|
|
|
client, fb->pts);
|
|
|
|
|
2022-04-03 20:52:20 +00:00
|
|
|
if (encoder_encode(client->encoder, fb, &damage) >= 0) {
|
|
|
|
--client->n_pending_requests;
|
|
|
|
} else {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Failed to encode current frame");
|
2021-12-24 16:29:37 +00:00
|
|
|
client_unref(client);
|
|
|
|
client->is_updating = false;
|
|
|
|
assert(client->current_fb);
|
|
|
|
nvnc_fb_release(client->current_fb);
|
|
|
|
nvnc_fb_unref(client->current_fb);
|
|
|
|
client->current_fb = NULL;
|
|
|
|
}
|
2020-09-27 12:37:00 +00:00
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
pixman_region_fini(&damage);
|
|
|
|
} else {
|
|
|
|
abort();
|
2020-09-27 12:37:00 +00:00
|
|
|
}
|
2019-10-07 20:12:59 +00:00
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_fb_update_request(struct nvnc_client* client)
|
2019-08-12 23:33:06 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc* server = client->server;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_client_fb_update_req_msg* msg =
|
|
|
|
(struct rfb_client_fb_update_req_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-12-23 09:33:29 +00:00
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
2019-08-12 23:33:06 +00:00
|
|
|
int incremental = msg->incremental;
|
|
|
|
int x = ntohs(msg->x);
|
|
|
|
int y = ntohs(msg->y);
|
|
|
|
int width = ntohs(msg->width);
|
|
|
|
int height = ntohs(msg->height);
|
|
|
|
|
2019-10-07 20:12:59 +00:00
|
|
|
client->n_pending_requests++;
|
|
|
|
|
|
|
|
/* Note: The region sent from the client is ignored for incremental
|
|
|
|
* updates. This avoids superfluous complexity.
|
|
|
|
*/
|
2021-12-24 16:29:37 +00:00
|
|
|
if (!incremental) {
|
2019-10-20 22:13:51 +00:00
|
|
|
pixman_region_union_rect(&client->damage, &client->damage, x, y,
|
|
|
|
width, height);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
if (client->encoder)
|
|
|
|
encoder_request_key_frame(client->encoder);
|
|
|
|
}
|
|
|
|
|
2020-04-01 22:53:22 +00:00
|
|
|
DTRACE_PROBE1(neatvnc, update_fb_request, client);
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
nvnc_fb_req_fn fn = server->fb_req_fn;
|
|
|
|
if (fn)
|
2019-08-31 23:16:55 +00:00
|
|
|
fn(client, incremental, x, y, width, height);
|
2019-08-27 21:49:28 +00:00
|
|
|
|
2021-09-04 16:46:48 +00:00
|
|
|
process_fb_update_requests(client);
|
|
|
|
|
2019-08-12 23:33:06 +00:00
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_key_event(struct nvnc_client* client)
|
2019-08-12 23:33:06 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc* server = client->server;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_client_key_event_msg* msg =
|
|
|
|
(struct rfb_client_key_event_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-12-23 09:33:29 +00:00
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
2019-08-12 23:33:06 +00:00
|
|
|
int down_flag = msg->down_flag;
|
2019-08-28 22:46:47 +00:00
|
|
|
uint32_t keysym = ntohl(msg->key);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
nvnc_key_fn fn = server->key_fn;
|
|
|
|
if (fn)
|
2019-08-31 23:16:55 +00:00
|
|
|
fn(client, keysym, !!down_flag);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
2020-11-29 17:35:06 +00:00
|
|
|
static int on_client_qemu_key_event(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct nvnc* server = client->server;
|
|
|
|
|
|
|
|
struct rfb_client_qemu_key_event_msg* msg =
|
|
|
|
(struct rfb_client_qemu_key_event_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
|
|
|
|
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
int down_flag = msg->down_flag;
|
2020-11-29 20:48:31 +00:00
|
|
|
uint32_t xt_keycode = ntohl(msg->keycode);
|
|
|
|
|
|
|
|
uint32_t evdev_keycode = code_map_qnum_to_linux[xt_keycode];
|
|
|
|
if (!evdev_keycode)
|
|
|
|
evdev_keycode = xt_keycode;
|
2020-11-29 17:35:06 +00:00
|
|
|
|
|
|
|
nvnc_key_fn fn = server->key_code_fn;
|
|
|
|
if (fn)
|
2020-11-29 20:48:31 +00:00
|
|
|
fn(client, evdev_keycode, !!down_flag);
|
2020-11-29 17:35:06 +00:00
|
|
|
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_client_qemu_event(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
if (client->buffer_len - client->buffer_index < 2)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
enum rfb_client_to_server_qemu_msg_type subtype =
|
|
|
|
client->msg_buffer[client->buffer_index + 1];
|
|
|
|
|
|
|
|
switch (subtype) {
|
|
|
|
case RFB_CLIENT_TO_SERVER_QEMU_KEY_EVENT:
|
|
|
|
return on_client_qemu_key_event(client);
|
|
|
|
}
|
|
|
|
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "Got uninterpretable qemu message from client: %p (ref %d)",
|
2020-11-29 17:35:06 +00:00
|
|
|
client, client->ref);
|
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_pointer_event(struct nvnc_client* client)
|
2019-08-12 23:33:06 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc* server = client->server;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct rfb_client_pointer_event_msg* msg =
|
|
|
|
(struct rfb_client_pointer_event_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
2019-12-23 09:33:29 +00:00
|
|
|
if (client->buffer_len - client->buffer_index < sizeof(*msg))
|
|
|
|
return 0;
|
|
|
|
|
2019-08-12 23:33:06 +00:00
|
|
|
int button_mask = msg->button_mask;
|
|
|
|
uint16_t x = ntohs(msg->x);
|
|
|
|
uint16_t y = ntohs(msg->y);
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
nvnc_pointer_fn fn = server->pointer_fn;
|
|
|
|
if (fn)
|
2019-08-31 23:16:55 +00:00
|
|
|
fn(client, x, y, button_mask);
|
2019-08-12 23:33:06 +00:00
|
|
|
|
|
|
|
return sizeof(*msg);
|
|
|
|
}
|
|
|
|
|
2020-09-16 22:10:15 +00:00
|
|
|
EXPORT
|
|
|
|
void nvnc_send_cut_text(struct nvnc* server, const char* text, uint32_t len)
|
|
|
|
{
|
|
|
|
struct rfb_cut_text_msg msg;
|
|
|
|
|
|
|
|
msg.type = RFB_SERVER_TO_CLIENT_SERVER_CUT_TEXT;
|
|
|
|
msg.length = htonl(len);
|
|
|
|
|
|
|
|
struct nvnc_client* client;
|
|
|
|
LIST_FOREACH (client, &server->clients, link) {
|
|
|
|
stream_write(client->net_stream, &msg, sizeof(msg), NULL, NULL);
|
|
|
|
stream_write(client->net_stream, text, len, NULL, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_cut_text(struct nvnc_client* client)
|
2019-08-12 23:39:37 +00:00
|
|
|
{
|
2020-09-16 22:10:15 +00:00
|
|
|
struct nvnc* server = client->server;
|
2020-09-23 02:37:42 +00:00
|
|
|
nvnc_cut_text_fn fn = server->cut_text_fn;
|
2020-09-16 22:10:15 +00:00
|
|
|
struct rfb_cut_text_msg* msg =
|
|
|
|
(struct rfb_cut_text_msg*)(client->msg_buffer +
|
|
|
|
client->buffer_index);
|
2019-08-12 23:39:37 +00:00
|
|
|
|
2020-09-23 02:37:42 +00:00
|
|
|
size_t left_to_process = client->buffer_len - client->buffer_index;
|
|
|
|
|
|
|
|
if (left_to_process < sizeof(*msg))
|
2019-12-23 09:33:29 +00:00
|
|
|
return 0;
|
|
|
|
|
2019-08-12 23:39:37 +00:00
|
|
|
uint32_t length = ntohl(msg->length);
|
2020-09-23 02:37:42 +00:00
|
|
|
uint32_t max_length = MAX_CUT_TEXT_SIZE;
|
2019-08-12 23:39:37 +00:00
|
|
|
|
2020-09-16 22:10:15 +00:00
|
|
|
/* Messages greater than this size are unsupported */
|
2020-09-23 02:37:42 +00:00
|
|
|
if (length > max_length) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Copied text length (%d) is greater than max supported length (%d)",
|
2020-09-23 02:37:42 +00:00
|
|
|
length, max_length);
|
2020-09-16 22:10:15 +00:00
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-23 02:37:42 +00:00
|
|
|
size_t msg_size = sizeof(*msg) + length;
|
|
|
|
|
|
|
|
if (msg_size <= left_to_process) {
|
|
|
|
if (fn)
|
|
|
|
fn(server, msg->text, length);
|
|
|
|
|
|
|
|
return msg_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(!client->cut_text.buffer);
|
|
|
|
|
|
|
|
client->cut_text.buffer = malloc(length);
|
|
|
|
if (!client->cut_text.buffer) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "OOM: %m");
|
2020-09-23 02:37:42 +00:00
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
2020-09-18 23:15:57 +00:00
|
|
|
return 0;
|
2020-09-23 02:37:42 +00:00
|
|
|
}
|
2020-09-18 23:15:57 +00:00
|
|
|
|
2020-09-23 02:37:42 +00:00
|
|
|
size_t partial_size = left_to_process - sizeof(*msg);
|
|
|
|
|
|
|
|
memcpy(client->cut_text.buffer, msg->text, partial_size);
|
|
|
|
|
|
|
|
client->cut_text.length = length;
|
|
|
|
client->cut_text.index = partial_size;
|
|
|
|
|
|
|
|
return left_to_process;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void process_big_cut_text(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct nvnc* server = client->server;
|
2020-09-16 22:10:15 +00:00
|
|
|
nvnc_cut_text_fn fn = server->cut_text_fn;
|
2020-09-23 02:37:42 +00:00
|
|
|
|
|
|
|
assert(client->cut_text.length > client->cut_text.index);
|
|
|
|
|
|
|
|
void* start = client->cut_text.buffer + client->cut_text.index;
|
|
|
|
size_t space = client->cut_text.length - client->cut_text.index;
|
|
|
|
|
|
|
|
space = MIN(space, MSG_BUFFER_SIZE);
|
|
|
|
|
|
|
|
ssize_t n_read = stream_read(client->net_stream, start, space);
|
|
|
|
|
|
|
|
if (n_read == 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (n_read < 0) {
|
|
|
|
if (errno != EAGAIN) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "Client connection error: %p (ref %d)",
|
2020-09-23 02:37:42 +00:00
|
|
|
client, client->ref);
|
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
2020-09-16 22:10:15 +00:00
|
|
|
}
|
2019-08-12 23:39:37 +00:00
|
|
|
|
2020-09-23 02:37:42 +00:00
|
|
|
client->cut_text.index += n_read;
|
|
|
|
|
|
|
|
if (client->cut_text.index != client->cut_text.length)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (fn)
|
|
|
|
fn(server, client->cut_text.buffer, client->cut_text.length);
|
|
|
|
|
|
|
|
free(client->cut_text.buffer);
|
|
|
|
client->cut_text.buffer = NULL;
|
2019-08-12 23:39:37 +00:00
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int on_client_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
if (client->buffer_len - client->buffer_index < 1)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
enum rfb_client_to_server_msg_type type =
|
2019-10-20 22:13:51 +00:00
|
|
|
client->msg_buffer[client->buffer_index];
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case RFB_CLIENT_TO_SERVER_SET_PIXEL_FORMAT:
|
2019-08-12 22:11:41 +00:00
|
|
|
return on_client_set_pixel_format(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_SET_ENCODINGS:
|
2019-08-12 23:33:06 +00:00
|
|
|
return on_client_set_encodings(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_FRAMEBUFFER_UPDATE_REQUEST:
|
2019-08-12 23:33:06 +00:00
|
|
|
return on_client_fb_update_request(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_KEY_EVENT:
|
2019-08-12 23:33:06 +00:00
|
|
|
return on_client_key_event(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_POINTER_EVENT:
|
2019-08-12 23:33:06 +00:00
|
|
|
return on_client_pointer_event(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_CLIENT_CUT_TEXT:
|
2019-08-12 23:39:37 +00:00
|
|
|
return on_client_cut_text(client);
|
2020-11-29 17:35:06 +00:00
|
|
|
case RFB_CLIENT_TO_SERVER_QEMU:
|
|
|
|
return on_client_qemu_event(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "Got uninterpretable message from client: %p (ref %d)",
|
2020-01-25 15:35:14 +00:00
|
|
|
client, client->ref);
|
|
|
|
stream_close(client->net_stream);
|
2019-09-18 21:28:48 +00:00
|
|
|
client_unref(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
static int try_read_client_message(struct nvnc_client* client)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
|
|
|
switch (client->state) {
|
|
|
|
case VNC_CLIENT_STATE_ERROR:
|
2020-01-25 15:35:14 +00:00
|
|
|
return client->buffer_len - client->buffer_index;
|
2019-08-12 20:49:23 +00:00
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_VERSION:
|
|
|
|
return on_version_message(client);
|
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_SECURITY:
|
|
|
|
return on_security_message(client);
|
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_INIT:
|
|
|
|
return on_init_message(client);
|
2020-01-25 15:35:14 +00:00
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_VERSION:
|
|
|
|
return on_vencrypt_version_message(client);
|
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_SUBTYPE:
|
|
|
|
return on_vencrypt_subtype_message(client);
|
|
|
|
case VNC_CLIENT_STATE_WAITING_FOR_VENCRYPT_PLAIN_AUTH:
|
|
|
|
return on_vencrypt_plain_auth_message(client);
|
|
|
|
#endif
|
2019-08-12 20:49:23 +00:00
|
|
|
case VNC_CLIENT_STATE_READY:
|
|
|
|
return on_client_message(client);
|
|
|
|
}
|
|
|
|
|
|
|
|
abort();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static void on_client_event(struct stream* stream, enum stream_event event)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2020-01-25 15:35:14 +00:00
|
|
|
struct nvnc_client* client = stream->userdata;
|
|
|
|
|
2020-07-16 18:14:52 +00:00
|
|
|
assert(client->net_stream && client->net_stream == stream);
|
2020-01-25 15:35:14 +00:00
|
|
|
|
|
|
|
if (event == STREAM_EVENT_REMOTE_CLOSED) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "Client %p (%d) hung up", client, client->ref);
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_close(stream);
|
|
|
|
client_unref(client);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-09-23 02:37:42 +00:00
|
|
|
if (client->cut_text.buffer) {
|
|
|
|
process_big_cut_text(client);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-01-25 16:41:23 +00:00
|
|
|
assert(client->buffer_index == 0);
|
|
|
|
|
|
|
|
void* start = client->msg_buffer + client->buffer_len;
|
|
|
|
size_t space = MSG_BUFFER_SIZE - client->buffer_len;
|
|
|
|
ssize_t n_read = stream_read(stream, start, space);
|
2019-09-18 21:28:48 +00:00
|
|
|
|
2019-12-27 13:57:24 +00:00
|
|
|
if (n_read == 0)
|
2020-01-25 16:41:23 +00:00
|
|
|
return;
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2019-12-27 13:57:24 +00:00
|
|
|
if (n_read < 0) {
|
2020-01-25 15:35:14 +00:00
|
|
|
if (errno != EAGAIN) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "Client connection error: %p (ref %d)",
|
2020-01-25 15:35:14 +00:00
|
|
|
client, client->ref);
|
|
|
|
stream_close(stream);
|
|
|
|
client_unref(client);
|
|
|
|
}
|
|
|
|
|
2020-01-25 16:41:23 +00:00
|
|
|
return;
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
client->buffer_len += n_read;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
int rc = try_read_client_message(client);
|
|
|
|
if (rc == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
client->buffer_index += rc;
|
2020-01-25 15:35:14 +00:00
|
|
|
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
|
|
|
|
2019-08-12 22:11:41 +00:00
|
|
|
assert(client->buffer_index <= client->buffer_len);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
client->buffer_len -= client->buffer_index;
|
2020-09-18 23:15:57 +00:00
|
|
|
memmove(client->msg_buffer, client->msg_buffer + client->buffer_index,
|
|
|
|
client->buffer_len);
|
2019-08-12 20:49:23 +00:00
|
|
|
client->buffer_index = 0;
|
|
|
|
}
|
|
|
|
|
2020-03-16 20:09:22 +00:00
|
|
|
static void on_connection(void* obj)
|
2019-08-12 20:49:23 +00:00
|
|
|
{
|
2020-03-16 20:09:22 +00:00
|
|
|
struct nvnc* server = aml_get_userdata(obj);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc_client* client = calloc(1, sizeof(*client));
|
2019-08-12 20:49:23 +00:00
|
|
|
if (!client)
|
|
|
|
return;
|
|
|
|
|
2019-09-18 21:28:48 +00:00
|
|
|
client->ref = 1;
|
2019-08-12 20:49:23 +00:00
|
|
|
client->server = server;
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
int fd = accept(server->fd, NULL, 0);
|
2020-07-18 14:04:12 +00:00
|
|
|
if (fd < 0) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "Failed to accept a connection");
|
2020-01-25 15:35:14 +00:00
|
|
|
goto accept_failure;
|
2020-07-18 14:04:12 +00:00
|
|
|
}
|
2020-01-25 15:35:14 +00:00
|
|
|
|
2022-07-09 16:29:18 +00:00
|
|
|
int one = 1;
|
|
|
|
setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &one, sizeof(one));
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
client->net_stream = stream_new(fd, on_client_event, client);
|
2020-07-18 14:04:12 +00:00
|
|
|
if (!client->net_stream) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "OOM");
|
2020-01-25 15:35:14 +00:00
|
|
|
goto stream_failure;
|
2020-07-18 14:04:12 +00:00
|
|
|
}
|
2020-01-25 15:35:14 +00:00
|
|
|
|
2020-07-18 14:04:12 +00:00
|
|
|
if (!server->display->buffer) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "No display buffer has been set");
|
2020-07-18 14:04:12 +00:00
|
|
|
goto buffer_failure;
|
|
|
|
}
|
2019-09-01 18:40:11 +00:00
|
|
|
|
2019-10-07 20:12:59 +00:00
|
|
|
pixman_region_init(&client->damage);
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
struct rcbuf* payload = rcbuf_from_string(RFB_VERSION_MESSAGE);
|
2020-07-18 14:04:12 +00:00
|
|
|
if (!payload) {
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_WARNING, "OOM");
|
2020-01-25 15:35:14 +00:00
|
|
|
goto payload_failure;
|
2020-07-18 14:04:12 +00:00
|
|
|
}
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:52:44 +00:00
|
|
|
stream_send(client->net_stream, payload, NULL, NULL);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
|
|
|
LIST_INSERT_HEAD(&server->clients, client, link);
|
|
|
|
|
|
|
|
client->state = VNC_CLIENT_STATE_WAITING_FOR_VERSION;
|
|
|
|
|
2022-06-25 16:32:05 +00:00
|
|
|
nvnc_log(NVNC_LOG_INFO, "New client connection: %p (ref %d)", client, client->ref);
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
return;
|
2019-08-12 20:49:23 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
payload_failure:
|
2020-04-02 21:52:04 +00:00
|
|
|
pixman_region_fini(&client->damage);
|
2020-07-18 14:04:12 +00:00
|
|
|
buffer_failure:
|
2020-01-25 15:35:14 +00:00
|
|
|
stream_destroy(client->net_stream);
|
|
|
|
stream_failure:
|
|
|
|
close(fd);
|
|
|
|
accept_failure:
|
|
|
|
free(client);
|
2019-08-12 20:49:23 +00:00
|
|
|
}
|
2019-08-12 22:11:41 +00:00
|
|
|
|
2021-03-17 07:37:06 +00:00
|
|
|
static int bind_address_tcp(const char* name, int port)
|
2020-04-04 22:23:04 +00:00
|
|
|
{
|
|
|
|
struct addrinfo hints = {
|
|
|
|
.ai_socktype = SOCK_STREAM,
|
|
|
|
.ai_flags = AI_PASSIVE,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct addrinfo* result;
|
|
|
|
|
|
|
|
char service[256];
|
|
|
|
snprintf(service, sizeof(service), "%d", port);
|
|
|
|
|
|
|
|
int rc = getaddrinfo(name, service, &hints, &result);
|
|
|
|
if (rc != 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
int fd = -1;
|
|
|
|
|
|
|
|
for (struct addrinfo* p = result; p != NULL; p = p->ai_next) {
|
|
|
|
fd = socket(p->ai_family, p->ai_socktype, p->ai_protocol);
|
|
|
|
if (fd < 0)
|
|
|
|
continue;
|
|
|
|
|
2020-04-06 18:29:17 +00:00
|
|
|
int one = 1;
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(int)) < 0)
|
|
|
|
goto failure;
|
|
|
|
|
2020-04-04 22:23:04 +00:00
|
|
|
if (bind(fd, p->ai_addr, p->ai_addrlen) == 0)
|
|
|
|
break;
|
|
|
|
|
2020-04-06 18:29:17 +00:00
|
|
|
failure:
|
2020-04-04 22:23:04 +00:00
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(result);
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2021-03-17 07:37:06 +00:00
|
|
|
static int bind_address_unix(const char* name)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr = {
|
|
|
|
.sun_family = AF_UNIX,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (strlen(name) >= sizeof(addr.sun_path)) {
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
strcpy(addr.sun_path, name);
|
|
|
|
|
|
|
|
int fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) != 0) {
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bind_address(const char* name, uint16_t port, enum addrtype type)
|
|
|
|
{
|
|
|
|
switch (type) {
|
|
|
|
case ADDRTYPE_TCP:
|
|
|
|
return bind_address_tcp(name, port);
|
|
|
|
case ADDRTYPE_UNIX:
|
|
|
|
return bind_address_unix(name);
|
|
|
|
}
|
|
|
|
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "unknown socket address type");
|
2021-03-17 07:37:06 +00:00
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct nvnc* open_common(const char* address, uint16_t port, enum addrtype type)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
2022-07-09 17:15:35 +00:00
|
|
|
nvnc__log_init();
|
|
|
|
|
2020-03-21 17:27:30 +00:00
|
|
|
aml_require_workers(aml_get_default(), -1);
|
2020-03-16 20:09:22 +00:00
|
|
|
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc* self = calloc(1, sizeof(*self));
|
2019-08-28 22:46:47 +00:00
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
2020-04-12 16:08:33 +00:00
|
|
|
strcpy(self->name, DEFAULT_NAME);
|
2019-08-29 21:47:02 +00:00
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
LIST_INIT(&self->clients);
|
|
|
|
|
2021-03-17 07:37:06 +00:00
|
|
|
self->fd = bind_address(address, port, type);
|
2020-01-25 15:35:14 +00:00
|
|
|
if (self->fd < 0)
|
2021-03-17 07:37:06 +00:00
|
|
|
goto bind_failure;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
if (listen(self->fd, 16) < 0)
|
2021-03-17 07:37:06 +00:00
|
|
|
goto listen_failure;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2020-03-16 20:09:22 +00:00
|
|
|
self->poll_handle = aml_handler_new(self->fd, on_connection, self, NULL);
|
|
|
|
if (!self->poll_handle)
|
2021-03-17 07:37:06 +00:00
|
|
|
goto handle_failure;
|
2020-03-16 20:09:22 +00:00
|
|
|
|
|
|
|
if (aml_start(aml_get_default(), self->poll_handle) < 0)
|
2020-04-07 22:21:11 +00:00
|
|
|
goto poll_start_failure;
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
return self;
|
2020-01-25 15:35:14 +00:00
|
|
|
|
2020-04-07 22:21:11 +00:00
|
|
|
poll_start_failure:
|
2020-03-16 20:09:22 +00:00
|
|
|
aml_unref(self->poll_handle);
|
2021-03-17 07:37:06 +00:00
|
|
|
handle_failure:
|
|
|
|
listen_failure:
|
2020-01-25 15:35:14 +00:00
|
|
|
close(self->fd);
|
2021-03-17 07:37:06 +00:00
|
|
|
if (type == ADDRTYPE_UNIX) {
|
|
|
|
unlink(address);
|
|
|
|
}
|
|
|
|
bind_failure:
|
|
|
|
free(self);
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-03-17 07:37:06 +00:00
|
|
|
EXPORT
|
|
|
|
struct nvnc* nvnc_open(const char* address, uint16_t port)
|
|
|
|
{
|
|
|
|
return open_common(address, port, ADDRTYPE_TCP);
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT
|
|
|
|
struct nvnc* nvnc_open_unix(const char* address)
|
|
|
|
{
|
|
|
|
return open_common(address, 0, ADDRTYPE_UNIX);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unlink_fd_path(int fd)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
socklen_t addr_len = sizeof(addr);
|
|
|
|
|
|
|
|
if (getsockname(fd, (struct sockaddr*)&addr, &addr_len) == 0) {
|
|
|
|
if (addr.sun_family == AF_UNIX) {
|
|
|
|
unlink(addr.sun_path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_close(struct nvnc* self)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc_client* client;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2021-09-04 17:05:30 +00:00
|
|
|
nvnc_cleanup_fn cleanup = self->common.cleanup_fn;
|
|
|
|
if (cleanup)
|
|
|
|
cleanup(self->common.userdata);
|
|
|
|
|
2020-04-12 18:16:19 +00:00
|
|
|
if (self->display)
|
|
|
|
nvnc_display_unref(self->display);
|
2019-10-07 20:12:59 +00:00
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
struct nvnc_client* tmp;
|
|
|
|
LIST_FOREACH_SAFE (client, &self->clients, link, tmp)
|
2019-09-18 21:28:48 +00:00
|
|
|
client_unref(client);
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2020-03-16 20:09:22 +00:00
|
|
|
aml_stop(aml_get_default(), self->poll_handle);
|
2021-03-17 07:37:06 +00:00
|
|
|
unlink_fd_path(self->fd);
|
2020-01-25 15:35:14 +00:00
|
|
|
close(self->fd);
|
|
|
|
|
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
if (self->tls_creds) {
|
|
|
|
gnutls_certificate_free_credentials(self->tls_creds);
|
|
|
|
gnutls_global_deinit();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-03-16 20:09:22 +00:00
|
|
|
aml_unref(self->poll_handle);
|
2019-08-28 22:46:47 +00:00
|
|
|
free(self);
|
|
|
|
}
|
|
|
|
|
2020-01-25 15:35:14 +00:00
|
|
|
static void on_write_frame_done(void* userdata, enum stream_req_status status)
|
2019-09-06 19:26:18 +00:00
|
|
|
{
|
2020-01-25 15:35:14 +00:00
|
|
|
struct nvnc_client* client = userdata;
|
2019-12-23 12:10:58 +00:00
|
|
|
client->is_updating = false;
|
2021-08-29 14:41:57 +00:00
|
|
|
assert(client->current_fb);
|
|
|
|
nvnc_fb_release(client->current_fb);
|
|
|
|
nvnc_fb_unref(client->current_fb);
|
|
|
|
client->current_fb = NULL;
|
2021-08-29 18:22:25 +00:00
|
|
|
process_fb_update_requests(client);
|
2020-01-25 15:35:14 +00:00
|
|
|
client_unref(client);
|
2019-09-06 19:26:18 +00:00
|
|
|
}
|
|
|
|
|
2021-12-24 16:29:37 +00:00
|
|
|
static enum rfb_encodings choose_frame_encoding(struct nvnc_client* client,
|
|
|
|
struct nvnc_fb* fb)
|
2019-09-19 18:14:24 +00:00
|
|
|
{
|
2020-01-19 19:16:27 +00:00
|
|
|
for (size_t i = 0; i < client->n_encodings; ++i)
|
2019-09-19 18:14:24 +00:00
|
|
|
switch (client->encodings[i]) {
|
|
|
|
case RFB_ENCODING_RAW:
|
2019-12-30 09:59:51 +00:00
|
|
|
case RFB_ENCODING_TIGHT:
|
2019-09-19 18:14:24 +00:00
|
|
|
case RFB_ENCODING_ZRLE:
|
2021-12-24 16:29:37 +00:00
|
|
|
#ifdef ENABLE_OPEN_H264
|
|
|
|
case RFB_ENCODING_OPEN_H264:
|
|
|
|
// h264 is useless for sw frames
|
|
|
|
if (fb->type != NVNC_FB_GBM_BO)
|
|
|
|
break;
|
|
|
|
#endif
|
2019-09-19 18:14:24 +00:00
|
|
|
return client->encodings[i];
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-05-31 22:56:27 +00:00
|
|
|
return RFB_ENCODING_RAW;
|
2019-09-19 18:14:24 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 14:46:12 +00:00
|
|
|
static enum tight_quality client_get_tight_quality(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
if (client->pixfmt.bits_per_pixel != 16 &&
|
|
|
|
client->pixfmt.bits_per_pixel != 32)
|
|
|
|
return TIGHT_QUALITY_LOSSLESS;
|
|
|
|
|
|
|
|
for (size_t i = 0; i < client->n_encodings; ++i)
|
|
|
|
switch (client->encodings[i]) {
|
|
|
|
case RFB_ENCODING_JPEG_HIGHQ: return TIGHT_QUALITY_HIGH;
|
|
|
|
case RFB_ENCODING_JPEG_LOWQ: return TIGHT_QUALITY_LOW;
|
|
|
|
default:;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TIGHT_QUALITY_LOSSLESS;
|
|
|
|
}
|
|
|
|
|
2020-07-19 11:54:39 +00:00
|
|
|
static bool client_has_encoding(const struct nvnc_client* client,
|
|
|
|
enum rfb_encodings encoding)
|
|
|
|
{
|
|
|
|
for (size_t i = 0; i < client->n_encodings; ++i)
|
|
|
|
if (client->encodings[i] == encoding)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-12-12 16:05:29 +00:00
|
|
|
static void finish_fb_update(struct nvnc_client* client, struct rcbuf* payload,
|
2022-04-14 16:56:41 +00:00
|
|
|
int n_rects, uint64_t pts)
|
2019-09-15 21:51:07 +00:00
|
|
|
{
|
2020-04-04 12:33:18 +00:00
|
|
|
client_ref(client);
|
2020-01-25 15:35:14 +00:00
|
|
|
|
|
|
|
if (client->net_stream->state != STREAM_STATE_CLOSED) {
|
2022-06-26 13:54:15 +00:00
|
|
|
DTRACE_PROBE2(neatvnc, send_fb_start, client, pts);
|
2022-04-14 16:56:41 +00:00
|
|
|
n_rects += will_send_pts(client, pts) ? 1 : 0;
|
2021-12-12 16:05:29 +00:00
|
|
|
struct rfb_server_fb_update_msg update_msg = {
|
|
|
|
.type = RFB_SERVER_TO_CLIENT_FRAMEBUFFER_UPDATE,
|
|
|
|
.n_rects = htons(n_rects),
|
|
|
|
};
|
|
|
|
stream_write(client->net_stream, &update_msg,
|
|
|
|
sizeof(update_msg), NULL, NULL);
|
2022-04-14 16:56:41 +00:00
|
|
|
send_pts_rect(client, pts);
|
2021-12-09 22:48:31 +00:00
|
|
|
rcbuf_ref(payload);
|
2020-01-25 15:52:44 +00:00
|
|
|
stream_send(client->net_stream, payload, on_write_frame_done,
|
|
|
|
client);
|
2022-06-26 13:54:15 +00:00
|
|
|
DTRACE_PROBE2(neatvnc, send_fb_done, client, pts);
|
2020-01-25 15:35:14 +00:00
|
|
|
} else {
|
2019-12-23 12:10:58 +00:00
|
|
|
client->is_updating = false;
|
2021-08-29 14:41:57 +00:00
|
|
|
assert(client->current_fb);
|
|
|
|
nvnc_fb_release(client->current_fb);
|
|
|
|
nvnc_fb_unref(client->current_fb);
|
|
|
|
client->current_fb = NULL;
|
2021-08-29 18:22:25 +00:00
|
|
|
process_fb_update_requests(client);
|
2020-01-25 15:35:14 +00:00
|
|
|
client_unref(client);
|
|
|
|
}
|
2019-09-15 21:51:07 +00:00
|
|
|
|
2022-06-26 13:54:15 +00:00
|
|
|
DTRACE_PROBE2(neatvnc, update_fb_done, client, pts);
|
2020-09-26 22:29:02 +00:00
|
|
|
}
|
|
|
|
|
2022-04-14 16:56:41 +00:00
|
|
|
static void on_encode_frame_done(struct encoder* encoder, struct rcbuf* result,
|
|
|
|
uint64_t pts)
|
2020-09-27 12:37:00 +00:00
|
|
|
{
|
2021-12-09 22:48:31 +00:00
|
|
|
struct nvnc_client* client = encoder->userdata;
|
2022-06-29 11:36:05 +00:00
|
|
|
client->encoder->on_done = NULL;
|
|
|
|
client->encoder->userdata = NULL;
|
2022-04-14 16:56:41 +00:00
|
|
|
finish_fb_update(client, result, encoder->n_rects, pts);
|
2020-01-25 15:35:14 +00:00
|
|
|
client_unref(client);
|
2019-09-15 21:51:07 +00:00
|
|
|
}
|
|
|
|
|
2020-07-19 11:54:39 +00:00
|
|
|
static int send_desktop_resize(struct nvnc_client* client, struct nvnc_fb* fb)
|
|
|
|
{
|
|
|
|
if (!client_has_encoding(client, RFB_ENCODING_DESKTOPSIZE)) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Client does not support desktop resizing. Closing connection...");
|
2020-07-19 11:54:39 +00:00
|
|
|
stream_close(client->net_stream);
|
|
|
|
client_unref(client);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
client->known_width = fb->width;
|
|
|
|
client->known_height = fb->height;
|
|
|
|
|
2021-12-09 22:48:31 +00:00
|
|
|
encoder_resize(client->encoder, fb->width, fb->height);
|
2020-07-19 16:58:55 +00:00
|
|
|
|
2020-07-19 11:54:39 +00:00
|
|
|
pixman_region_union_rect(&client->damage, &client->damage, 0, 0,
|
|
|
|
fb->width, fb->height);
|
|
|
|
|
|
|
|
struct rfb_server_fb_update_msg head = {
|
|
|
|
.type = RFB_SERVER_TO_CLIENT_FRAMEBUFFER_UPDATE,
|
|
|
|
.n_rects = htons(1),
|
|
|
|
};
|
|
|
|
|
|
|
|
struct rfb_server_fb_rect rect = {
|
|
|
|
.encoding = htonl(RFB_ENCODING_DESKTOPSIZE),
|
|
|
|
.width = htons(fb->width),
|
|
|
|
.height = htons(fb->height),
|
|
|
|
};
|
|
|
|
|
|
|
|
stream_write(client->net_stream, &head, sizeof(head), NULL, NULL);
|
|
|
|
stream_write(client->net_stream, &rect, sizeof(rect), NULL, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-11-29 18:17:30 +00:00
|
|
|
static int send_qemu_key_ext_frame(struct nvnc_client* client)
|
|
|
|
{
|
|
|
|
struct rfb_server_fb_update_msg head = {
|
|
|
|
.type = RFB_SERVER_TO_CLIENT_FRAMEBUFFER_UPDATE,
|
|
|
|
.n_rects = htons(1),
|
|
|
|
};
|
|
|
|
|
|
|
|
struct rfb_server_fb_rect rect = {
|
|
|
|
.encoding = htonl(RFB_ENCODING_QEMU_EXT_KEY_EVENT),
|
|
|
|
};
|
|
|
|
|
|
|
|
stream_write(client->net_stream, &head, sizeof(head), NULL, NULL);
|
|
|
|
stream_write(client->net_stream, &rect, sizeof(rect), NULL, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-04-12 18:16:19 +00:00
|
|
|
void nvnc__damage_region(struct nvnc* self, const struct pixman_region16* damage)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc_client* client;
|
2019-08-28 22:46:47 +00:00
|
|
|
|
2020-04-07 22:21:11 +00:00
|
|
|
LIST_FOREACH(client, &self->clients, link)
|
|
|
|
if (client->net_stream->state != STREAM_STATE_CLOSED)
|
|
|
|
pixman_region_union(&client->damage, &client->damage,
|
|
|
|
(struct pixman_region16*)damage);
|
2021-08-29 18:22:25 +00:00
|
|
|
|
|
|
|
LIST_FOREACH(client, &self->clients, link)
|
|
|
|
process_fb_update_requests(client);
|
2020-04-07 22:21:11 +00:00
|
|
|
}
|
2019-08-28 22:46:47 +00:00
|
|
|
|
|
|
|
EXPORT
|
2021-09-04 17:05:30 +00:00
|
|
|
void nvnc_set_userdata(void* self, void* userdata, nvnc_cleanup_fn cleanup_fn)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
struct nvnc_common* common = self;
|
2019-08-31 23:16:55 +00:00
|
|
|
common->userdata = userdata;
|
2021-09-04 17:05:30 +00:00
|
|
|
common->cleanup_fn = cleanup_fn;
|
2019-08-28 22:46:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void* nvnc_get_userdata(const void* self)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
2019-10-20 22:13:51 +00:00
|
|
|
const struct nvnc_common* common = self;
|
2019-08-31 23:16:55 +00:00
|
|
|
return common->userdata;
|
2019-08-28 22:46:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_set_key_fn(struct nvnc* self, nvnc_key_fn fn)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
|
|
|
self->key_fn = fn;
|
|
|
|
}
|
|
|
|
|
2020-11-29 17:35:06 +00:00
|
|
|
EXPORT
|
|
|
|
void nvnc_set_key_code_fn(struct nvnc* self, nvnc_key_fn fn)
|
|
|
|
{
|
|
|
|
self->key_code_fn = fn;
|
|
|
|
}
|
|
|
|
|
2019-08-28 22:46:47 +00:00
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_set_pointer_fn(struct nvnc* self, nvnc_pointer_fn fn)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
|
|
|
self->pointer_fn = fn;
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_set_fb_req_fn(struct nvnc* self, nvnc_fb_req_fn fn)
|
2019-08-28 22:46:47 +00:00
|
|
|
{
|
|
|
|
self->fb_req_fn = fn;
|
|
|
|
}
|
|
|
|
|
2019-08-31 23:30:08 +00:00
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_set_new_client_fn(struct nvnc* self, nvnc_client_fn fn)
|
2019-08-31 23:30:08 +00:00
|
|
|
{
|
|
|
|
self->new_client_fn = fn;
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:21:11 +00:00
|
|
|
EXPORT
|
2020-04-12 18:16:19 +00:00
|
|
|
void nvnc_set_client_cleanup_fn(struct nvnc_client* self, nvnc_client_fn fn)
|
2020-04-07 22:21:11 +00:00
|
|
|
{
|
2020-04-12 18:16:19 +00:00
|
|
|
self->cleanup_fn = fn;
|
2020-04-07 22:21:11 +00:00
|
|
|
}
|
|
|
|
|
2020-09-16 22:10:15 +00:00
|
|
|
EXPORT
|
|
|
|
void nvnc_set_cut_text_receive_fn(struct nvnc* self, nvnc_cut_text_fn fn)
|
|
|
|
{
|
|
|
|
self->cut_text_fn = fn;
|
|
|
|
}
|
|
|
|
|
2019-08-31 23:30:08 +00:00
|
|
|
EXPORT
|
2020-04-12 18:16:19 +00:00
|
|
|
void nvnc_add_display(struct nvnc* self, struct nvnc_display* display)
|
2019-08-31 23:30:08 +00:00
|
|
|
{
|
2020-04-12 18:16:19 +00:00
|
|
|
if (self->display) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "Multiple displays are not implemented. Aborting!");
|
2020-04-12 18:16:19 +00:00
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
display->server = self;
|
|
|
|
self->display = display;
|
|
|
|
nvnc_display_ref(display);
|
2019-08-31 23:30:08 +00:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:21:11 +00:00
|
|
|
EXPORT
|
2020-04-12 18:16:19 +00:00
|
|
|
void nvnc_remove_display(struct nvnc* self, struct nvnc_display* display)
|
2020-04-07 22:21:11 +00:00
|
|
|
{
|
2020-04-12 18:16:19 +00:00
|
|
|
if (self->display != display)
|
|
|
|
return;
|
2020-04-07 22:21:11 +00:00
|
|
|
|
2020-04-12 18:16:19 +00:00
|
|
|
nvnc_display_unref(display);
|
|
|
|
self->display = NULL;
|
2020-04-07 22:21:11 +00:00
|
|
|
}
|
|
|
|
|
2019-08-31 23:16:55 +00:00
|
|
|
EXPORT
|
2020-04-12 18:16:19 +00:00
|
|
|
struct nvnc* nvnc_client_get_server(const struct nvnc_client* client)
|
2019-08-31 23:16:55 +00:00
|
|
|
{
|
|
|
|
return client->server;
|
|
|
|
}
|
|
|
|
|
2019-08-29 21:47:02 +00:00
|
|
|
EXPORT
|
2019-10-20 22:13:51 +00:00
|
|
|
void nvnc_set_name(struct nvnc* self, const char* name)
|
2019-08-29 21:47:02 +00:00
|
|
|
{
|
2020-04-12 16:08:33 +00:00
|
|
|
strncpy(self->name, name, sizeof(self->name));
|
|
|
|
self->name[sizeof(self->name) - 1] = '\0';
|
2019-08-12 22:11:41 +00:00
|
|
|
}
|
2020-01-25 15:35:14 +00:00
|
|
|
|
|
|
|
EXPORT
|
|
|
|
bool nvnc_has_auth(void)
|
|
|
|
{
|
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT
|
|
|
|
int nvnc_enable_auth(struct nvnc* self, const char* privkey_path,
|
|
|
|
const char* cert_path, nvnc_auth_fn auth_fn,
|
|
|
|
void* userdata)
|
|
|
|
{
|
|
|
|
#ifdef ENABLE_TLS
|
|
|
|
if (self->tls_creds)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Note: This is globally reference counted, so we don't need to worry
|
|
|
|
* about messing with other libraries.
|
|
|
|
*/
|
|
|
|
int rc = gnutls_global_init();
|
|
|
|
if (rc != GNUTLS_E_SUCCESS) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "GnuTLS: Failed to initialise: %s",
|
2020-01-25 15:35:14 +00:00
|
|
|
gnutls_strerror(rc));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = gnutls_certificate_allocate_credentials(&self->tls_creds);
|
|
|
|
if (rc != GNUTLS_E_SUCCESS) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "GnuTLS: Failed to allocate credentials: %s",
|
2020-01-25 15:35:14 +00:00
|
|
|
gnutls_strerror(rc));
|
|
|
|
goto cert_alloc_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = gnutls_certificate_set_x509_key_file(
|
|
|
|
self->tls_creds, cert_path, privkey_path, GNUTLS_X509_FMT_PEM);
|
|
|
|
if (rc != GNUTLS_E_SUCCESS) {
|
2022-06-25 15:38:38 +00:00
|
|
|
nvnc_log(NVNC_LOG_ERROR, "GnuTLS: Failed to load credentials: %s",
|
2020-01-25 15:35:14 +00:00
|
|
|
gnutls_strerror(rc));
|
|
|
|
goto cert_set_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
self->auth_fn = auth_fn;
|
|
|
|
self->auth_ud = userdata;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
cert_set_failure:
|
|
|
|
gnutls_certificate_free_credentials(self->tls_creds);
|
|
|
|
self->tls_creds = NULL;
|
|
|
|
cert_alloc_failure:
|
|
|
|
gnutls_global_deinit();
|
|
|
|
#endif
|
|
|
|
return -1;
|
|
|
|
}
|
2022-02-06 15:43:45 +00:00
|
|
|
|
|
|
|
EXPORT
|
2022-02-19 23:06:15 +00:00
|
|
|
void nvnc_set_cursor(struct nvnc* self, struct nvnc_fb* fb, uint16_t width,
|
2022-02-21 21:38:44 +00:00
|
|
|
uint16_t height, uint16_t hotspot_x, uint16_t hotspot_y,
|
|
|
|
bool is_damaged)
|
2022-02-06 15:43:45 +00:00
|
|
|
{
|
|
|
|
if (self->cursor.buffer) {
|
|
|
|
nvnc_fb_release(self->cursor.buffer);
|
|
|
|
nvnc_fb_unref(self->cursor.buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
self->cursor.buffer = fb;
|
2022-02-21 21:38:44 +00:00
|
|
|
|
2022-02-20 14:48:24 +00:00
|
|
|
if (fb) {
|
|
|
|
// TODO: Hash cursors to check if they actually changed?
|
|
|
|
nvnc_fb_ref(fb);
|
|
|
|
nvnc_fb_hold(fb);
|
|
|
|
|
|
|
|
self->cursor.width = width;
|
|
|
|
self->cursor.height = height;
|
|
|
|
self->cursor.hotspot_x = hotspot_x;
|
|
|
|
self->cursor.hotspot_y = hotspot_y;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
self->cursor.width = width;
|
|
|
|
self->cursor.height = height;
|
2022-02-19 23:06:15 +00:00
|
|
|
self->cursor.hotspot_x = 0;
|
|
|
|
self->cursor.hotspot_y = 0;
|
2022-02-06 15:43:45 +00:00
|
|
|
}
|
|
|
|
|
2022-02-21 21:38:44 +00:00
|
|
|
if (!is_damaged)
|
|
|
|
return;
|
|
|
|
|
2022-02-19 23:06:15 +00:00
|
|
|
self->cursor_seq++;
|
2022-02-06 15:43:45 +00:00
|
|
|
|
2022-02-19 23:06:15 +00:00
|
|
|
struct nvnc_client* client;
|
|
|
|
LIST_FOREACH(client, &self->clients, link)
|
|
|
|
process_fb_update_requests(client);
|
2022-02-06 15:43:45 +00:00
|
|
|
}
|