2 * QEMU VNC display driver
5 * Copyright (C) 2006 Fabrice Bellard
6 * Copyright (C) 2009 Red Hat, Inc
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
21 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
29 #include "qemu_socket.h"
30 #include "qemu-timer.h"
32 #include "qemu-objects.h"
34 #define VNC_REFRESH_INTERVAL_BASE 30
35 #define VNC_REFRESH_INTERVAL_INC 50
36 #define VNC_REFRESH_INTERVAL_MAX 2000
38 #include "vnc_keysym.h"
41 #define count_bits(c, v) { \
42 for (c = 0; v; v >>= 1) \
49 static VncDisplay *vnc_display; /* needed for info vnc */
50 static DisplayChangeListener *dcl;
52 static char *addr_to_string(const char *format,
53 struct sockaddr_storage *sa,
56 char host[NI_MAXHOST];
57 char serv[NI_MAXSERV];
61 if ((err = getnameinfo((struct sockaddr *)sa, salen,
64 NI_NUMERICHOST | NI_NUMERICSERV)) != 0) {
65 VNC_DEBUG("Cannot resolve address %d: %s\n",
66 err, gai_strerror(err));
70 /* Enough for the existing format + the 2 vars we're
72 addrlen = strlen(format) + strlen(host) + strlen(serv);
73 addr = qemu_malloc(addrlen + 1);
74 snprintf(addr, addrlen, format, host, serv);
81 char *vnc_socket_local_addr(const char *format, int fd) {
82 struct sockaddr_storage sa;
86 if (getsockname(fd, (struct sockaddr*)&sa, &salen) < 0)
89 return addr_to_string(format, &sa, salen);
92 char *vnc_socket_remote_addr(const char *format, int fd) {
93 struct sockaddr_storage sa;
97 if (getpeername(fd, (struct sockaddr*)&sa, &salen) < 0)
100 return addr_to_string(format, &sa, salen);
103 static QString *get_sock_family(const struct sockaddr_storage *sa)
107 switch (sa->ss_family)
120 return qstring_from_str(name);
123 static int put_addr_qdict(QDict *qdict, struct sockaddr_storage *sa,
126 char host[NI_MAXHOST];
127 char serv[NI_MAXSERV];
130 if ((err = getnameinfo((struct sockaddr *)sa, salen,
133 NI_NUMERICHOST | NI_NUMERICSERV)) != 0) {
134 VNC_DEBUG("Cannot resolve address %d: %s\n",
135 err, gai_strerror(err));
139 qdict_put(qdict, "host", qstring_from_str(host));
140 qdict_put(qdict, "service", qstring_from_str(serv));
141 qdict_put(qdict, "family", get_sock_family(sa));
146 static int vnc_server_addr_put(QDict *qdict, int fd)
148 struct sockaddr_storage sa;
152 if (getsockname(fd, (struct sockaddr*)&sa, &salen) < 0) {
156 return put_addr_qdict(qdict, &sa, salen);
159 static int vnc_qdict_remote_addr(QDict *qdict, int fd)
161 struct sockaddr_storage sa;
165 if (getpeername(fd, (struct sockaddr*)&sa, &salen) < 0) {
169 return put_addr_qdict(qdict, &sa, salen);
172 static const char *vnc_auth_name(VncDisplay *vd) {
174 case VNC_AUTH_INVALID:
190 case VNC_AUTH_VENCRYPT:
191 #ifdef CONFIG_VNC_TLS
192 switch (vd->subauth) {
193 case VNC_AUTH_VENCRYPT_PLAIN:
194 return "vencrypt+plain";
195 case VNC_AUTH_VENCRYPT_TLSNONE:
196 return "vencrypt+tls+none";
197 case VNC_AUTH_VENCRYPT_TLSVNC:
198 return "vencrypt+tls+vnc";
199 case VNC_AUTH_VENCRYPT_TLSPLAIN:
200 return "vencrypt+tls+plain";
201 case VNC_AUTH_VENCRYPT_X509NONE:
202 return "vencrypt+x509+none";
203 case VNC_AUTH_VENCRYPT_X509VNC:
204 return "vencrypt+x509+vnc";
205 case VNC_AUTH_VENCRYPT_X509PLAIN:
206 return "vencrypt+x509+plain";
207 case VNC_AUTH_VENCRYPT_TLSSASL:
208 return "vencrypt+tls+sasl";
209 case VNC_AUTH_VENCRYPT_X509SASL:
210 return "vencrypt+x509+sasl";
223 static int vnc_server_info_put(QDict *qdict)
225 if (vnc_server_addr_put(qdict, vnc_display->lsock) < 0) {
229 qdict_put(qdict, "auth", qstring_from_str(vnc_auth_name(vnc_display)));
233 static void vnc_client_cache_auth(VncState *client)
241 qdict = qobject_to_qdict(client->info);
243 #ifdef CONFIG_VNC_TLS
244 if (client->tls.session &&
246 qdict_put(qdict, "x509_dname", qstring_from_str(client->tls.dname));
249 #ifdef CONFIG_VNC_SASL
250 if (client->sasl.conn &&
251 client->sasl.username) {
252 qdict_put(qdict, "sasl_username",
253 qstring_from_str(client->sasl.username));
258 static void vnc_client_cache_addr(VncState *client)
263 if (vnc_qdict_remote_addr(qdict, client->csock) < 0) {
265 /* XXX: how to report the error? */
269 client->info = QOBJECT(qdict);
272 static void vnc_qmp_event(VncState *vs, MonitorEvent event)
281 server = qdict_new();
282 if (vnc_server_info_put(server) < 0) {
287 data = qobject_from_jsonf("{ 'client': %p, 'server': %p }",
288 vs->info, QOBJECT(server));
290 monitor_protocol_event(event, data);
292 qobject_incref(vs->info);
293 qobject_decref(data);
296 static void info_vnc_iter(QObject *obj, void *opaque)
299 Monitor *mon = opaque;
301 client = qobject_to_qdict(obj);
302 monitor_printf(mon, "Client:\n");
303 monitor_printf(mon, " address: %s:%s\n",
304 qdict_get_str(client, "host"),
305 qdict_get_str(client, "service"));
307 #ifdef CONFIG_VNC_TLS
308 monitor_printf(mon, " x509_dname: %s\n",
309 qdict_haskey(client, "x509_dname") ?
310 qdict_get_str(client, "x509_dname") : "none");
312 #ifdef CONFIG_VNC_SASL
313 monitor_printf(mon, " username: %s\n",
314 qdict_haskey(client, "sasl_username") ?
315 qdict_get_str(client, "sasl_username") : "none");
319 void do_info_vnc_print(Monitor *mon, const QObject *data)
324 server = qobject_to_qdict(data);
325 if (qdict_get_bool(server, "enabled") == 0) {
326 monitor_printf(mon, "Server: disabled\n");
330 monitor_printf(mon, "Server:\n");
331 monitor_printf(mon, " address: %s:%s\n",
332 qdict_get_str(server, "host"),
333 qdict_get_str(server, "service"));
334 monitor_printf(mon, " auth: %s\n", qdict_get_str(server, "auth"));
336 clients = qdict_get_qlist(server, "clients");
337 if (qlist_empty(clients)) {
338 monitor_printf(mon, "Client: none\n");
340 qlist_iter(clients, info_vnc_iter, mon);
345 * do_info_vnc(): Show VNC server information
347 * Return a QDict with server information. Connected clients are returned
348 * as a QList of QDicts.
350 * The main QDict contains the following:
352 * - "enabled": true or false
353 * - "host": server's IP address
354 * - "family": address family ("ipv4" or "ipv6")
355 * - "service": server's port number
356 * - "auth": authentication method
357 * - "clients": a QList of all connected clients
359 * Clients are described by a QDict, with the following information:
361 * - "host": client's IP address
362 * - "family": address family ("ipv4" or "ipv6")
363 * - "service": client's port number
364 * - "x509_dname": TLS dname (optional)
365 * - "sasl_username": SASL username (optional)
369 * { "enabled": true, "host": "0.0.0.0", "service": "50402", "auth": "vnc",
371 * "clients": [{ "host": "127.0.0.1", "service": "50401", "family": "ipv4" }]}
373 void do_info_vnc(Monitor *mon, QObject **ret_data)
375 if (vnc_display == NULL || vnc_display->display == NULL) {
376 *ret_data = qobject_from_jsonf("{ 'enabled': false }");
381 if (vnc_display->clients) {
382 VncState *client = vnc_display->clients;
385 /* incref so that it's not freed by upper layers */
386 qobject_incref(client->info);
387 qlist_append_obj(clist, client->info);
389 client = client->next;
393 *ret_data = qobject_from_jsonf("{ 'enabled': true, 'clients': %p }",
395 assert(*ret_data != NULL);
397 if (vnc_server_info_put(qobject_to_qdict(*ret_data)) < 0) {
398 qobject_decref(*ret_data);
404 static inline uint32_t vnc_has_feature(VncState *vs, int feature) {
405 return (vs->features & (1 << feature));
409 1) Get the queue working for IO.
410 2) there is some weirdness when using the -S option (the screen is grey
411 and not totally invalidated
412 3) resolutions > 1024
415 static int vnc_update_client(VncState *vs, int has_dirty);
416 static void vnc_disconnect_start(VncState *vs);
417 static void vnc_disconnect_finish(VncState *vs);
418 static void vnc_init_timer(VncDisplay *vd);
419 static void vnc_remove_timer(VncDisplay *vd);
421 static void vnc_colordepth(VncState *vs);
422 static void framebuffer_update_request(VncState *vs, int incremental,
423 int x_position, int y_position,
425 static void vnc_refresh(void *opaque);
426 static int vnc_refresh_server_surface(VncDisplay *vd);
428 static inline void vnc_set_bit(uint32_t *d, int k)
430 d[k >> 5] |= 1 << (k & 0x1f);
433 static inline void vnc_clear_bit(uint32_t *d, int k)
435 d[k >> 5] &= ~(1 << (k & 0x1f));
438 static inline void vnc_set_bits(uint32_t *d, int n, int nb_words)
448 d[j++] = (1 << n) - 1;
453 static inline int vnc_get_bit(const uint32_t *d, int k)
455 return (d[k >> 5] >> (k & 0x1f)) & 1;
458 static inline int vnc_and_bits(const uint32_t *d1, const uint32_t *d2,
462 for(i = 0; i < nb_words; i++) {
463 if ((d1[i] & d2[i]) != 0)
469 static void vnc_dpy_update(DisplayState *ds, int x, int y, int w, int h)
472 VncDisplay *vd = ds->opaque;
473 struct VncSurface *s = &vd->guest;
477 /* round x down to ensure the loop only spans one 16-pixel block per,
478 iteration. otherwise, if (x % 16) != 0, the last iteration may span
479 two 16-pixel blocks but we only mark the first as dirty
484 x = MIN(x, s->ds->width);
485 y = MIN(y, s->ds->height);
486 w = MIN(x + w, s->ds->width) - x;
487 h = MIN(h, s->ds->height);
490 for (i = 0; i < w; i += 16)
491 vnc_set_bit(s->dirty[y], (x + i) / 16);
494 static void vnc_framebuffer_update(VncState *vs, int x, int y, int w, int h,
497 vnc_write_u16(vs, x);
498 vnc_write_u16(vs, y);
499 vnc_write_u16(vs, w);
500 vnc_write_u16(vs, h);
502 vnc_write_s32(vs, encoding);
505 void buffer_reserve(Buffer *buffer, size_t len)
507 if ((buffer->capacity - buffer->offset) < len) {
508 buffer->capacity += (len + 1024);
509 buffer->buffer = qemu_realloc(buffer->buffer, buffer->capacity);
510 if (buffer->buffer == NULL) {
511 fprintf(stderr, "vnc: out of memory\n");
517 int buffer_empty(Buffer *buffer)
519 return buffer->offset == 0;
522 uint8_t *buffer_end(Buffer *buffer)
524 return buffer->buffer + buffer->offset;
527 void buffer_reset(Buffer *buffer)
532 void buffer_append(Buffer *buffer, const void *data, size_t len)
534 memcpy(buffer->buffer + buffer->offset, data, len);
535 buffer->offset += len;
538 static void vnc_dpy_resize(DisplayState *ds)
541 VncDisplay *vd = ds->opaque;
542 VncState *vs = vd->clients;
546 vd->server = qemu_mallocz(sizeof(*vd->server));
547 if (vd->server->data)
548 qemu_free(vd->server->data);
549 *(vd->server) = *(ds->surface);
550 vd->server->data = qemu_mallocz(vd->server->linesize *
555 vd->guest.ds = qemu_mallocz(sizeof(*vd->guest.ds));
556 if (ds_get_bytes_per_pixel(ds) != vd->guest.ds->pf.bytes_per_pixel)
557 console_color_init(ds);
558 size_changed = ds_get_width(ds) != vd->guest.ds->width ||
559 ds_get_height(ds) != vd->guest.ds->height;
560 *(vd->guest.ds) = *(ds->surface);
561 memset(vd->guest.dirty, 0xFF, sizeof(vd->guest.dirty));
566 if (vs->csock != -1 && vnc_has_feature(vs, VNC_FEATURE_RESIZE)) {
567 vnc_write_u8(vs, 0); /* msg id */
569 vnc_write_u16(vs, 1); /* number of rects */
570 vnc_framebuffer_update(vs, 0, 0, ds_get_width(ds), ds_get_height(ds),
571 VNC_ENCODING_DESKTOPRESIZE);
575 memset(vs->dirty, 0xFF, sizeof(vs->dirty));
581 static void vnc_write_pixels_copy(VncState *vs, void *pixels, int size)
583 vnc_write(vs, pixels, size);
586 /* slowest but generic code. */
587 static void vnc_convert_pixel(VncState *vs, uint8_t *buf, uint32_t v)
590 VncDisplay *vd = vs->vd;
592 r = ((((v & vd->server->pf.rmask) >> vd->server->pf.rshift) << vs->clientds.pf.rbits) >>
593 vd->server->pf.rbits);
594 g = ((((v & vd->server->pf.gmask) >> vd->server->pf.gshift) << vs->clientds.pf.gbits) >>
595 vd->server->pf.gbits);
596 b = ((((v & vd->server->pf.bmask) >> vd->server->pf.bshift) << vs->clientds.pf.bbits) >>
597 vd->server->pf.bbits);
598 v = (r << vs->clientds.pf.rshift) |
599 (g << vs->clientds.pf.gshift) |
600 (b << vs->clientds.pf.bshift);
601 switch(vs->clientds.pf.bytes_per_pixel) {
606 if (vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) {
616 if (vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) {
631 static void vnc_write_pixels_generic(VncState *vs, void *pixels1, int size)
634 VncDisplay *vd = vs->vd;
636 if (vd->server->pf.bytes_per_pixel == 4) {
637 uint32_t *pixels = pixels1;
640 for(i = 0; i < n; i++) {
641 vnc_convert_pixel(vs, buf, pixels[i]);
642 vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
644 } else if (vd->server->pf.bytes_per_pixel == 2) {
645 uint16_t *pixels = pixels1;
648 for(i = 0; i < n; i++) {
649 vnc_convert_pixel(vs, buf, pixels[i]);
650 vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
652 } else if (vd->server->pf.bytes_per_pixel == 1) {
653 uint8_t *pixels = pixels1;
656 for(i = 0; i < n; i++) {
657 vnc_convert_pixel(vs, buf, pixels[i]);
658 vnc_write(vs, buf, vs->clientds.pf.bytes_per_pixel);
661 fprintf(stderr, "vnc_write_pixels_generic: VncState color depth not supported\n");
665 static void send_framebuffer_update_raw(VncState *vs, int x, int y, int w, int h)
669 VncDisplay *vd = vs->vd;
671 row = vd->server->data + y * ds_get_linesize(vs->ds) + x * ds_get_bytes_per_pixel(vs->ds);
672 for (i = 0; i < h; i++) {
673 vs->write_pixels(vs, row, w * ds_get_bytes_per_pixel(vs->ds));
674 row += ds_get_linesize(vs->ds);
678 static void hextile_enc_cord(uint8_t *ptr, int x, int y, int w, int h)
680 ptr[0] = ((x & 0x0F) << 4) | (y & 0x0F);
681 ptr[1] = (((w - 1) & 0x0F) << 4) | ((h - 1) & 0x0F);
685 #include "vnchextile.h"
689 #include "vnchextile.h"
693 #include "vnchextile.h"
698 #include "vnchextile.h"
704 #include "vnchextile.h"
710 #include "vnchextile.h"
714 static void send_framebuffer_update_hextile(VncState *vs, int x, int y, int w, int h)
718 uint8_t *last_fg, *last_bg;
719 VncDisplay *vd = vs->vd;
721 last_fg = (uint8_t *) qemu_malloc(vd->server->pf.bytes_per_pixel);
722 last_bg = (uint8_t *) qemu_malloc(vd->server->pf.bytes_per_pixel);
724 for (j = y; j < (y + h); j += 16) {
725 for (i = x; i < (x + w); i += 16) {
726 vs->send_hextile_tile(vs, i, j,
727 MIN(16, x + w - i), MIN(16, y + h - j),
728 last_bg, last_fg, &has_bg, &has_fg);
736 #define ZALLOC_ALIGNMENT 16
738 static void *zalloc(void *x, unsigned items, unsigned size)
743 size = (size + ZALLOC_ALIGNMENT - 1) & ~(ZALLOC_ALIGNMENT - 1);
745 p = qemu_mallocz(size);
750 static void zfree(void *x, void *addr)
755 static void vnc_zlib_init(VncState *vs)
758 for (i=0; i<(sizeof(vs->zlib_stream) / sizeof(z_stream)); i++)
759 vs->zlib_stream[i].opaque = NULL;
762 static void vnc_zlib_start(VncState *vs)
764 buffer_reset(&vs->zlib);
766 // make the output buffer be the zlib buffer, so we can compress it later
767 vs->zlib_tmp = vs->output;
768 vs->output = vs->zlib;
771 static int vnc_zlib_stop(VncState *vs, int stream_id)
773 z_streamp zstream = &vs->zlib_stream[stream_id];
776 // switch back to normal output/zlib buffers
777 vs->zlib = vs->output;
778 vs->output = vs->zlib_tmp;
780 // compress the zlib buffer
782 // initialize the stream
783 // XXX need one stream per session
784 if (zstream->opaque != vs) {
787 VNC_DEBUG("VNC: initializing zlib stream %d\n", stream_id);
788 VNC_DEBUG("VNC: opaque = %p | vs = %p\n", zstream->opaque, vs);
789 zstream->zalloc = zalloc;
790 zstream->zfree = zfree;
792 err = deflateInit2(zstream, vs->tight_compression, Z_DEFLATED, MAX_WBITS,
793 MAX_MEM_LEVEL, Z_DEFAULT_STRATEGY);
796 fprintf(stderr, "VNC: error initializing zlib\n");
800 zstream->opaque = vs;
803 // XXX what to do if tight_compression changed in between?
805 // reserve memory in output buffer
806 buffer_reserve(&vs->output, vs->zlib.offset + 64);
809 zstream->next_in = vs->zlib.buffer;
810 zstream->avail_in = vs->zlib.offset;
811 zstream->next_out = vs->output.buffer + vs->output.offset;
812 zstream->avail_out = vs->output.capacity - vs->output.offset;
813 zstream->data_type = Z_BINARY;
814 previous_out = zstream->total_out;
817 if (deflate(zstream, Z_SYNC_FLUSH) != Z_OK) {
818 fprintf(stderr, "VNC: error during zlib compression\n");
822 vs->output.offset = vs->output.capacity - zstream->avail_out;
823 return zstream->total_out - previous_out;
826 static void send_framebuffer_update_zlib(VncState *vs, int x, int y, int w, int h)
828 int old_offset, new_offset, bytes_written;
830 vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_ZLIB);
832 // remember where we put in the follow-up size
833 old_offset = vs->output.offset;
834 vnc_write_s32(vs, 0);
836 // compress the stream
838 send_framebuffer_update_raw(vs, x, y, w, h);
839 bytes_written = vnc_zlib_stop(vs, 0);
841 if (bytes_written == -1)
845 new_offset = vs->output.offset;
846 vs->output.offset = old_offset;
847 vnc_write_u32(vs, bytes_written);
848 vs->output.offset = new_offset;
851 static void send_framebuffer_update(VncState *vs, int x, int y, int w, int h)
853 switch(vs->vnc_encoding) {
854 case VNC_ENCODING_ZLIB:
855 send_framebuffer_update_zlib(vs, x, y, w, h);
857 case VNC_ENCODING_HEXTILE:
858 vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_HEXTILE);
859 send_framebuffer_update_hextile(vs, x, y, w, h);
862 vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_RAW);
863 send_framebuffer_update_raw(vs, x, y, w, h);
868 static void vnc_copy(VncState *vs, int src_x, int src_y, int dst_x, int dst_y, int w, int h)
870 /* send bitblit op to the vnc client */
871 vnc_write_u8(vs, 0); /* msg id */
873 vnc_write_u16(vs, 1); /* number of rects */
874 vnc_framebuffer_update(vs, dst_x, dst_y, w, h, VNC_ENCODING_COPYRECT);
875 vnc_write_u16(vs, src_x);
876 vnc_write_u16(vs, src_y);
880 static void vnc_dpy_copy(DisplayState *ds, int src_x, int src_y, int dst_x, int dst_y, int w, int h)
882 VncDisplay *vd = ds->opaque;
886 int i,x,y,pitch,depth,inc,w_lim,s;
889 vnc_refresh_server_surface(vd);
890 for (vs = vd->clients; vs != NULL; vs = vn) {
892 if (vnc_has_feature(vs, VNC_FEATURE_COPYRECT)) {
893 vs->force_update = 1;
894 vnc_update_client(vs, 1);
895 /* vs might be free()ed here */
899 /* do bitblit op on the local surface too */
900 pitch = ds_get_linesize(vd->ds);
901 depth = ds_get_bytes_per_pixel(vd->ds);
902 src_row = vd->server->data + pitch * src_y + depth * src_x;
903 dst_row = vd->server->data + pitch * dst_y + depth * dst_x;
908 src_row += pitch * (h-1);
909 dst_row += pitch * (h-1);
914 w_lim = w - (16 - (dst_x % 16));
918 w_lim = w - (w_lim % 16);
919 for (i = 0; i < h; i++) {
920 for (x = 0; x <= w_lim;
921 x += s, src_row += cmp_bytes, dst_row += cmp_bytes) {
923 if ((s = w - w_lim) == 0)
926 s = (16 - (dst_x % 16));
931 cmp_bytes = s * depth;
932 if (memcmp(src_row, dst_row, cmp_bytes) == 0)
934 memmove(dst_row, src_row, cmp_bytes);
937 if (!vnc_has_feature(vs, VNC_FEATURE_COPYRECT))
938 vnc_set_bit(vs->dirty[y], ((x + dst_x) / 16));
942 src_row += pitch - w * depth;
943 dst_row += pitch - w * depth;
947 for (vs = vd->clients; vs != NULL; vs = vs->next) {
948 if (vnc_has_feature(vs, VNC_FEATURE_COPYRECT))
949 vnc_copy(vs, src_x, src_y, dst_x, dst_y, w, h);
953 static int find_and_clear_dirty_height(struct VncState *vs,
954 int y, int last_x, int x)
957 VncDisplay *vd = vs->vd;
959 for (h = 1; h < (vd->server->height - y); h++) {
961 if (!vnc_get_bit(vs->dirty[y + h], last_x))
963 for (tmp_x = last_x; tmp_x < x; tmp_x++)
964 vnc_clear_bit(vs->dirty[y + h], tmp_x);
970 static int vnc_update_client(VncState *vs, int has_dirty)
972 if (vs->need_update && vs->csock != -1) {
973 VncDisplay *vd = vs->vd;
978 if (vs->output.offset && !vs->audio_cap && !vs->force_update)
979 /* kernel send buffers are full -> drop frames to throttle */
982 if (!has_dirty && !vs->audio_cap && !vs->force_update)
986 * Send screen updates to the vnc client using the server
987 * surface and server dirty map. guest surface updates
988 * happening in parallel don't disturb us, the next pass will
989 * send them to the client.
992 vnc_write_u8(vs, 0); /* msg id */
994 saved_offset = vs->output.offset;
995 vnc_write_u16(vs, 0);
997 for (y = 0; y < vd->server->height; y++) {
1000 for (x = 0; x < vd->server->width / 16; x++) {
1001 if (vnc_get_bit(vs->dirty[y], x)) {
1005 vnc_clear_bit(vs->dirty[y], x);
1008 int h = find_and_clear_dirty_height(vs, y, last_x, x);
1009 send_framebuffer_update(vs, last_x * 16, y, (x - last_x) * 16, h);
1016 int h = find_and_clear_dirty_height(vs, y, last_x, x);
1017 send_framebuffer_update(vs, last_x * 16, y, (x - last_x) * 16, h);
1021 vs->output.buffer[saved_offset] = (n_rectangles >> 8) & 0xFF;
1022 vs->output.buffer[saved_offset + 1] = n_rectangles & 0xFF;
1024 vs->force_update = 0;
1025 return n_rectangles;
1028 if (vs->csock == -1)
1029 vnc_disconnect_finish(vs);
1035 static void audio_capture_notify(void *opaque, audcnotification_e cmd)
1037 VncState *vs = opaque;
1040 case AUD_CNOTIFY_DISABLE:
1041 vnc_write_u8(vs, 255);
1042 vnc_write_u8(vs, 1);
1043 vnc_write_u16(vs, 0);
1047 case AUD_CNOTIFY_ENABLE:
1048 vnc_write_u8(vs, 255);
1049 vnc_write_u8(vs, 1);
1050 vnc_write_u16(vs, 1);
1056 static void audio_capture_destroy(void *opaque)
1060 static void audio_capture(void *opaque, void *buf, int size)
1062 VncState *vs = opaque;
1064 vnc_write_u8(vs, 255);
1065 vnc_write_u8(vs, 1);
1066 vnc_write_u16(vs, 2);
1067 vnc_write_u32(vs, size);
1068 vnc_write(vs, buf, size);
1072 static void audio_add(VncState *vs)
1074 Monitor *mon = cur_mon;
1075 struct audio_capture_ops ops;
1077 if (vs->audio_cap) {
1078 monitor_printf(mon, "audio already running\n");
1082 ops.notify = audio_capture_notify;
1083 ops.destroy = audio_capture_destroy;
1084 ops.capture = audio_capture;
1086 vs->audio_cap = AUD_add_capture(&vs->as, &ops, vs);
1087 if (!vs->audio_cap) {
1088 monitor_printf(mon, "Failed to add audio capture\n");
1092 static void audio_del(VncState *vs)
1094 if (vs->audio_cap) {
1095 AUD_del_capture(vs->audio_cap, vs);
1096 vs->audio_cap = NULL;
1100 static void vnc_disconnect_start(VncState *vs)
1102 if (vs->csock == -1)
1104 qemu_set_fd_handler2(vs->csock, NULL, NULL, NULL, NULL);
1105 closesocket(vs->csock);
1109 static void vnc_disconnect_finish(VncState *vs)
1111 if (vs->input.buffer) {
1112 qemu_free(vs->input.buffer);
1113 vs->input.buffer = NULL;
1115 if (vs->output.buffer) {
1116 qemu_free(vs->output.buffer);
1117 vs->output.buffer = NULL;
1120 qobject_decref(vs->info);
1122 #ifdef CONFIG_VNC_TLS
1123 vnc_tls_client_cleanup(vs);
1124 #endif /* CONFIG_VNC_TLS */
1125 #ifdef CONFIG_VNC_SASL
1126 vnc_sasl_client_cleanup(vs);
1127 #endif /* CONFIG_VNC_SASL */
1130 VncState *p, *parent = NULL;
1131 for (p = vs->vd->clients; p != NULL; p = p->next) {
1134 parent->next = p->next;
1136 vs->vd->clients = p->next;
1141 if (!vs->vd->clients)
1144 vnc_remove_timer(vs->vd);
1148 int vnc_client_io_error(VncState *vs, int ret, int last_errno)
1150 if (ret == 0 || ret == -1) {
1152 switch (last_errno) {
1156 case WSAEWOULDBLOCK:
1164 VNC_DEBUG("Closing down client sock: ret %d, errno %d\n",
1165 ret, ret < 0 ? last_errno : 0);
1166 vnc_disconnect_start(vs);
1174 void vnc_client_error(VncState *vs)
1176 VNC_DEBUG("Closing down client sock: protocol error\n");
1177 vnc_disconnect_start(vs);
1182 * Called to write a chunk of data to the client socket. The data may
1183 * be the raw data, or may have already been encoded by SASL.
1184 * The data will be written either straight onto the socket, or
1185 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1187 * NB, it is theoretically possible to have 2 layers of encryption,
1188 * both SASL, and this TLS layer. It is highly unlikely in practice
1189 * though, since SASL encryption will typically be a no-op if TLS
1192 * Returns the number of bytes written, which may be less than
1193 * the requested 'datalen' if the socket would block. Returns
1194 * -1 on error, and disconnects the client socket.
1196 long vnc_client_write_buf(VncState *vs, const uint8_t *data, size_t datalen)
1199 #ifdef CONFIG_VNC_TLS
1200 if (vs->tls.session) {
1201 ret = gnutls_write(vs->tls.session, data, datalen);
1203 if (ret == GNUTLS_E_AGAIN)
1210 #endif /* CONFIG_VNC_TLS */
1211 ret = send(vs->csock, (const void *)data, datalen, 0);
1212 VNC_DEBUG("Wrote wire %p %zd -> %ld\n", data, datalen, ret);
1213 return vnc_client_io_error(vs, ret, socket_error());
1218 * Called to write buffered data to the client socket, when not
1219 * using any SASL SSF encryption layers. Will write as much data
1220 * as possible without blocking. If all buffered data is written,
1221 * will switch the FD poll() handler back to read monitoring.
1223 * Returns the number of bytes written, which may be less than
1224 * the buffered output data if the socket would block. Returns
1225 * -1 on error, and disconnects the client socket.
1227 static long vnc_client_write_plain(VncState *vs)
1231 #ifdef CONFIG_VNC_SASL
1232 VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n",
1233 vs->output.buffer, vs->output.capacity, vs->output.offset,
1234 vs->sasl.waitWriteSSF);
1236 if (vs->sasl.conn &&
1238 vs->sasl.waitWriteSSF) {
1239 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->sasl.waitWriteSSF);
1241 vs->sasl.waitWriteSSF -= ret;
1243 #endif /* CONFIG_VNC_SASL */
1244 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->output.offset);
1248 memmove(vs->output.buffer, vs->output.buffer + ret, (vs->output.offset - ret));
1249 vs->output.offset -= ret;
1251 if (vs->output.offset == 0) {
1252 qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, NULL, vs);
1260 * First function called whenever there is data to be written to
1261 * the client socket. Will delegate actual work according to whether
1262 * SASL SSF layers are enabled (thus requiring encryption calls)
1264 void vnc_client_write(void *opaque)
1267 VncState *vs = opaque;
1269 #ifdef CONFIG_VNC_SASL
1270 if (vs->sasl.conn &&
1272 !vs->sasl.waitWriteSSF)
1273 ret = vnc_client_write_sasl(vs);
1275 #endif /* CONFIG_VNC_SASL */
1276 ret = vnc_client_write_plain(vs);
1279 void vnc_read_when(VncState *vs, VncReadEvent *func, size_t expecting)
1281 vs->read_handler = func;
1282 vs->read_handler_expect = expecting;
1287 * Called to read a chunk of data from the client socket. The data may
1288 * be the raw data, or may need to be further decoded by SASL.
1289 * The data will be read either straight from to the socket, or
1290 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1292 * NB, it is theoretically possible to have 2 layers of encryption,
1293 * both SASL, and this TLS layer. It is highly unlikely in practice
1294 * though, since SASL encryption will typically be a no-op if TLS
1297 * Returns the number of bytes read, which may be less than
1298 * the requested 'datalen' if the socket would block. Returns
1299 * -1 on error, and disconnects the client socket.
1301 long vnc_client_read_buf(VncState *vs, uint8_t *data, size_t datalen)
1304 #ifdef CONFIG_VNC_TLS
1305 if (vs->tls.session) {
1306 ret = gnutls_read(vs->tls.session, data, datalen);
1308 if (ret == GNUTLS_E_AGAIN)
1315 #endif /* CONFIG_VNC_TLS */
1316 ret = recv(vs->csock, (void *)data, datalen, 0);
1317 VNC_DEBUG("Read wire %p %zd -> %ld\n", data, datalen, ret);
1318 return vnc_client_io_error(vs, ret, socket_error());
1323 * Called to read data from the client socket to the input buffer,
1324 * when not using any SASL SSF encryption layers. Will read as much
1325 * data as possible without blocking.
1327 * Returns the number of bytes read. Returns -1 on error, and
1328 * disconnects the client socket.
1330 static long vnc_client_read_plain(VncState *vs)
1333 VNC_DEBUG("Read plain %p size %zd offset %zd\n",
1334 vs->input.buffer, vs->input.capacity, vs->input.offset);
1335 buffer_reserve(&vs->input, 4096);
1336 ret = vnc_client_read_buf(vs, buffer_end(&vs->input), 4096);
1339 vs->input.offset += ret;
1345 * First function called whenever there is more data to be read from
1346 * the client socket. Will delegate actual work according to whether
1347 * SASL SSF layers are enabled (thus requiring decryption calls)
1349 void vnc_client_read(void *opaque)
1351 VncState *vs = opaque;
1354 #ifdef CONFIG_VNC_SASL
1355 if (vs->sasl.conn && vs->sasl.runSSF)
1356 ret = vnc_client_read_sasl(vs);
1358 #endif /* CONFIG_VNC_SASL */
1359 ret = vnc_client_read_plain(vs);
1361 if (vs->csock == -1)
1362 vnc_disconnect_finish(vs);
1366 while (vs->read_handler && vs->input.offset >= vs->read_handler_expect) {
1367 size_t len = vs->read_handler_expect;
1370 ret = vs->read_handler(vs, vs->input.buffer, len);
1371 if (vs->csock == -1) {
1372 vnc_disconnect_finish(vs);
1377 memmove(vs->input.buffer, vs->input.buffer + len, (vs->input.offset - len));
1378 vs->input.offset -= len;
1380 vs->read_handler_expect = ret;
1385 void vnc_write(VncState *vs, const void *data, size_t len)
1387 buffer_reserve(&vs->output, len);
1389 if (vs->csock != -1 && buffer_empty(&vs->output)) {
1390 qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, vnc_client_write, vs);
1393 buffer_append(&vs->output, data, len);
1396 void vnc_write_s32(VncState *vs, int32_t value)
1398 vnc_write_u32(vs, *(uint32_t *)&value);
1401 void vnc_write_u32(VncState *vs, uint32_t value)
1405 buf[0] = (value >> 24) & 0xFF;
1406 buf[1] = (value >> 16) & 0xFF;
1407 buf[2] = (value >> 8) & 0xFF;
1408 buf[3] = value & 0xFF;
1410 vnc_write(vs, buf, 4);
1413 void vnc_write_u16(VncState *vs, uint16_t value)
1417 buf[0] = (value >> 8) & 0xFF;
1418 buf[1] = value & 0xFF;
1420 vnc_write(vs, buf, 2);
1423 void vnc_write_u8(VncState *vs, uint8_t value)
1425 vnc_write(vs, (char *)&value, 1);
1428 void vnc_flush(VncState *vs)
1430 if (vs->csock != -1 && vs->output.offset)
1431 vnc_client_write(vs);
1434 uint8_t read_u8(uint8_t *data, size_t offset)
1436 return data[offset];
1439 uint16_t read_u16(uint8_t *data, size_t offset)
1441 return ((data[offset] & 0xFF) << 8) | (data[offset + 1] & 0xFF);
1444 int32_t read_s32(uint8_t *data, size_t offset)
1446 return (int32_t)((data[offset] << 24) | (data[offset + 1] << 16) |
1447 (data[offset + 2] << 8) | data[offset + 3]);
1450 uint32_t read_u32(uint8_t *data, size_t offset)
1452 return ((data[offset] << 24) | (data[offset + 1] << 16) |
1453 (data[offset + 2] << 8) | data[offset + 3]);
1456 static void client_cut_text(VncState *vs, size_t len, uint8_t *text)
1460 static void check_pointer_type_change(VncState *vs, int absolute)
1462 if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
1463 vnc_write_u8(vs, 0);
1464 vnc_write_u8(vs, 0);
1465 vnc_write_u16(vs, 1);
1466 vnc_framebuffer_update(vs, absolute, 0,
1467 ds_get_width(vs->ds), ds_get_height(vs->ds),
1468 VNC_ENCODING_POINTER_TYPE_CHANGE);
1471 vs->absolute = absolute;
1474 static void pointer_event(VncState *vs, int button_mask, int x, int y)
1479 if (button_mask & 0x01)
1480 buttons |= MOUSE_EVENT_LBUTTON;
1481 if (button_mask & 0x02)
1482 buttons |= MOUSE_EVENT_MBUTTON;
1483 if (button_mask & 0x04)
1484 buttons |= MOUSE_EVENT_RBUTTON;
1485 if (button_mask & 0x08)
1487 if (button_mask & 0x10)
1491 kbd_mouse_event(x * 0x7FFF / (ds_get_width(vs->ds) - 1),
1492 y * 0x7FFF / (ds_get_height(vs->ds) - 1),
1494 } else if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE)) {
1498 kbd_mouse_event(x, y, dz, buttons);
1500 if (vs->last_x != -1)
1501 kbd_mouse_event(x - vs->last_x,
1508 check_pointer_type_change(vs, kbd_mouse_is_absolute());
1511 static void reset_keys(VncState *vs)
1514 for(i = 0; i < 256; i++) {
1515 if (vs->modifiers_state[i]) {
1517 kbd_put_keycode(0xe0);
1518 kbd_put_keycode(i | 0x80);
1519 vs->modifiers_state[i] = 0;
1524 static void press_key(VncState *vs, int keysym)
1526 kbd_put_keycode(keysym2scancode(vs->vd->kbd_layout, keysym) & 0x7f);
1527 kbd_put_keycode(keysym2scancode(vs->vd->kbd_layout, keysym) | 0x80);
1530 static void do_key_event(VncState *vs, int down, int keycode, int sym)
1532 /* QEMU console switch */
1534 case 0x2a: /* Left Shift */
1535 case 0x36: /* Right Shift */
1536 case 0x1d: /* Left CTRL */
1537 case 0x9d: /* Right CTRL */
1538 case 0x38: /* Left ALT */
1539 case 0xb8: /* Right ALT */
1541 vs->modifiers_state[keycode] = 1;
1543 vs->modifiers_state[keycode] = 0;
1545 case 0x02 ... 0x0a: /* '1' to '9' keys */
1546 if (down && vs->modifiers_state[0x1d] && vs->modifiers_state[0x38]) {
1547 /* Reset the modifiers sent to the current console */
1549 console_select(keycode - 0x02);
1553 case 0x3a: /* CapsLock */
1554 case 0x45: /* NumLock */
1556 vs->modifiers_state[keycode] ^= 1;
1560 if (keycode_is_keypad(vs->vd->kbd_layout, keycode)) {
1561 /* If the numlock state needs to change then simulate an additional
1562 keypress before sending this one. This will happen if the user
1563 toggles numlock away from the VNC window.
1565 if (keysym_is_numlock(vs->vd->kbd_layout, sym & 0xFFFF)) {
1566 if (!vs->modifiers_state[0x45]) {
1567 vs->modifiers_state[0x45] = 1;
1568 press_key(vs, 0xff7f);
1571 if (vs->modifiers_state[0x45]) {
1572 vs->modifiers_state[0x45] = 0;
1573 press_key(vs, 0xff7f);
1578 if ((sym >= 'A' && sym <= 'Z') || (sym >= 'a' && sym <= 'z')) {
1579 /* If the capslock state needs to change then simulate an additional
1580 keypress before sending this one. This will happen if the user
1581 toggles capslock away from the VNC window.
1583 int uppercase = !!(sym >= 'A' && sym <= 'Z');
1584 int shift = !!(vs->modifiers_state[0x2a] | vs->modifiers_state[0x36]);
1585 int capslock = !!(vs->modifiers_state[0x3a]);
1587 if (uppercase == shift) {
1588 vs->modifiers_state[0x3a] = 0;
1589 press_key(vs, 0xffe5);
1592 if (uppercase != shift) {
1593 vs->modifiers_state[0x3a] = 1;
1594 press_key(vs, 0xffe5);
1599 if (is_graphic_console()) {
1601 kbd_put_keycode(0xe0);
1603 kbd_put_keycode(keycode & 0x7f);
1605 kbd_put_keycode(keycode | 0x80);
1607 /* QEMU console emulation */
1609 int numlock = vs->modifiers_state[0x45];
1611 case 0x2a: /* Left Shift */
1612 case 0x36: /* Right Shift */
1613 case 0x1d: /* Left CTRL */
1614 case 0x9d: /* Right CTRL */
1615 case 0x38: /* Left ALT */
1616 case 0xb8: /* Right ALT */
1619 kbd_put_keysym(QEMU_KEY_UP);
1622 kbd_put_keysym(QEMU_KEY_DOWN);
1625 kbd_put_keysym(QEMU_KEY_LEFT);
1628 kbd_put_keysym(QEMU_KEY_RIGHT);
1631 kbd_put_keysym(QEMU_KEY_DELETE);
1634 kbd_put_keysym(QEMU_KEY_HOME);
1637 kbd_put_keysym(QEMU_KEY_END);
1640 kbd_put_keysym(QEMU_KEY_PAGEUP);
1643 kbd_put_keysym(QEMU_KEY_PAGEDOWN);
1647 kbd_put_keysym(numlock ? '7' : QEMU_KEY_HOME);
1650 kbd_put_keysym(numlock ? '8' : QEMU_KEY_UP);
1653 kbd_put_keysym(numlock ? '9' : QEMU_KEY_PAGEUP);
1656 kbd_put_keysym(numlock ? '4' : QEMU_KEY_LEFT);
1659 kbd_put_keysym('5');
1662 kbd_put_keysym(numlock ? '6' : QEMU_KEY_RIGHT);
1665 kbd_put_keysym(numlock ? '1' : QEMU_KEY_END);
1668 kbd_put_keysym(numlock ? '2' : QEMU_KEY_DOWN);
1671 kbd_put_keysym(numlock ? '3' : QEMU_KEY_PAGEDOWN);
1674 kbd_put_keysym('0');
1677 kbd_put_keysym(numlock ? '.' : QEMU_KEY_DELETE);
1681 kbd_put_keysym('/');
1684 kbd_put_keysym('*');
1687 kbd_put_keysym('-');
1690 kbd_put_keysym('+');
1693 kbd_put_keysym('\n');
1697 kbd_put_keysym(sym);
1704 static void key_event(VncState *vs, int down, uint32_t sym)
1709 if (lsym >= 'A' && lsym <= 'Z' && is_graphic_console()) {
1710 lsym = lsym - 'A' + 'a';
1713 keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF);
1714 do_key_event(vs, down, keycode, sym);
1717 static void ext_key_event(VncState *vs, int down,
1718 uint32_t sym, uint16_t keycode)
1720 /* if the user specifies a keyboard layout, always use it */
1721 if (keyboard_layout)
1722 key_event(vs, down, sym);
1724 do_key_event(vs, down, keycode, sym);
1727 static void framebuffer_update_request(VncState *vs, int incremental,
1728 int x_position, int y_position,
1731 if (x_position > ds_get_width(vs->ds))
1732 x_position = ds_get_width(vs->ds);
1733 if (y_position > ds_get_height(vs->ds))
1734 y_position = ds_get_height(vs->ds);
1735 if (x_position + w >= ds_get_width(vs->ds))
1736 w = ds_get_width(vs->ds) - x_position;
1737 if (y_position + h >= ds_get_height(vs->ds))
1738 h = ds_get_height(vs->ds) - y_position;
1741 vs->need_update = 1;
1743 vs->force_update = 1;
1744 for (i = 0; i < h; i++) {
1745 vnc_set_bits(vs->dirty[y_position + i],
1746 (ds_get_width(vs->ds) / 16), VNC_DIRTY_WORDS);
1751 static void send_ext_key_event_ack(VncState *vs)
1753 vnc_write_u8(vs, 0);
1754 vnc_write_u8(vs, 0);
1755 vnc_write_u16(vs, 1);
1756 vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds), ds_get_height(vs->ds),
1757 VNC_ENCODING_EXT_KEY_EVENT);
1761 static void send_ext_audio_ack(VncState *vs)
1763 vnc_write_u8(vs, 0);
1764 vnc_write_u8(vs, 0);
1765 vnc_write_u16(vs, 1);
1766 vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds), ds_get_height(vs->ds),
1767 VNC_ENCODING_AUDIO);
1771 static void set_encodings(VncState *vs, int32_t *encodings, size_t n_encodings)
1774 unsigned int enc = 0;
1778 vs->vnc_encoding = 0;
1779 vs->tight_compression = 9;
1780 vs->tight_quality = 9;
1783 for (i = n_encodings - 1; i >= 0; i--) {
1786 case VNC_ENCODING_RAW:
1787 vs->vnc_encoding = enc;
1789 case VNC_ENCODING_COPYRECT:
1790 vs->features |= VNC_FEATURE_COPYRECT_MASK;
1792 case VNC_ENCODING_HEXTILE:
1793 vs->features |= VNC_FEATURE_HEXTILE_MASK;
1794 vs->vnc_encoding = enc;
1796 case VNC_ENCODING_ZLIB:
1797 vs->features |= VNC_FEATURE_ZLIB_MASK;
1798 vs->vnc_encoding = enc;
1800 case VNC_ENCODING_DESKTOPRESIZE:
1801 vs->features |= VNC_FEATURE_RESIZE_MASK;
1803 case VNC_ENCODING_POINTER_TYPE_CHANGE:
1804 vs->features |= VNC_FEATURE_POINTER_TYPE_CHANGE_MASK;
1806 case VNC_ENCODING_EXT_KEY_EVENT:
1807 send_ext_key_event_ack(vs);
1809 case VNC_ENCODING_AUDIO:
1810 send_ext_audio_ack(vs);
1812 case VNC_ENCODING_WMVi:
1813 vs->features |= VNC_FEATURE_WMVI_MASK;
1815 case VNC_ENCODING_COMPRESSLEVEL0 ... VNC_ENCODING_COMPRESSLEVEL0 + 9:
1816 vs->tight_compression = (enc & 0x0F);
1818 case VNC_ENCODING_QUALITYLEVEL0 ... VNC_ENCODING_QUALITYLEVEL0 + 9:
1819 vs->tight_quality = (enc & 0x0F);
1822 VNC_DEBUG("Unknown encoding: %d (0x%.8x): %d\n", i, enc, enc);
1827 check_pointer_type_change(vs, kbd_mouse_is_absolute());
1830 static void set_pixel_conversion(VncState *vs)
1832 if ((vs->clientds.flags & QEMU_BIG_ENDIAN_FLAG) ==
1833 (vs->ds->surface->flags & QEMU_BIG_ENDIAN_FLAG) &&
1834 !memcmp(&(vs->clientds.pf), &(vs->ds->surface->pf), sizeof(PixelFormat))) {
1835 vs->write_pixels = vnc_write_pixels_copy;
1836 switch (vs->ds->surface->pf.bits_per_pixel) {
1838 vs->send_hextile_tile = send_hextile_tile_8;
1841 vs->send_hextile_tile = send_hextile_tile_16;
1844 vs->send_hextile_tile = send_hextile_tile_32;
1848 vs->write_pixels = vnc_write_pixels_generic;
1849 switch (vs->ds->surface->pf.bits_per_pixel) {
1851 vs->send_hextile_tile = send_hextile_tile_generic_8;
1854 vs->send_hextile_tile = send_hextile_tile_generic_16;
1857 vs->send_hextile_tile = send_hextile_tile_generic_32;
1863 static void set_pixel_format(VncState *vs,
1864 int bits_per_pixel, int depth,
1865 int big_endian_flag, int true_color_flag,
1866 int red_max, int green_max, int blue_max,
1867 int red_shift, int green_shift, int blue_shift)
1869 if (!true_color_flag) {
1870 vnc_client_error(vs);
1874 vs->clientds = *(vs->vd->guest.ds);
1875 vs->clientds.pf.rmax = red_max;
1876 count_bits(vs->clientds.pf.rbits, red_max);
1877 vs->clientds.pf.rshift = red_shift;
1878 vs->clientds.pf.rmask = red_max << red_shift;
1879 vs->clientds.pf.gmax = green_max;
1880 count_bits(vs->clientds.pf.gbits, green_max);
1881 vs->clientds.pf.gshift = green_shift;
1882 vs->clientds.pf.gmask = green_max << green_shift;
1883 vs->clientds.pf.bmax = blue_max;
1884 count_bits(vs->clientds.pf.bbits, blue_max);
1885 vs->clientds.pf.bshift = blue_shift;
1886 vs->clientds.pf.bmask = blue_max << blue_shift;
1887 vs->clientds.pf.bits_per_pixel = bits_per_pixel;
1888 vs->clientds.pf.bytes_per_pixel = bits_per_pixel / 8;
1889 vs->clientds.pf.depth = bits_per_pixel == 32 ? 24 : bits_per_pixel;
1890 vs->clientds.flags = big_endian_flag ? QEMU_BIG_ENDIAN_FLAG : 0x00;
1892 set_pixel_conversion(vs);
1894 vga_hw_invalidate();
1898 static void pixel_format_message (VncState *vs) {
1899 char pad[3] = { 0, 0, 0 };
1901 vnc_write_u8(vs, vs->ds->surface->pf.bits_per_pixel); /* bits-per-pixel */
1902 vnc_write_u8(vs, vs->ds->surface->pf.depth); /* depth */
1904 #ifdef HOST_WORDS_BIGENDIAN
1905 vnc_write_u8(vs, 1); /* big-endian-flag */
1907 vnc_write_u8(vs, 0); /* big-endian-flag */
1909 vnc_write_u8(vs, 1); /* true-color-flag */
1910 vnc_write_u16(vs, vs->ds->surface->pf.rmax); /* red-max */
1911 vnc_write_u16(vs, vs->ds->surface->pf.gmax); /* green-max */
1912 vnc_write_u16(vs, vs->ds->surface->pf.bmax); /* blue-max */
1913 vnc_write_u8(vs, vs->ds->surface->pf.rshift); /* red-shift */
1914 vnc_write_u8(vs, vs->ds->surface->pf.gshift); /* green-shift */
1915 vnc_write_u8(vs, vs->ds->surface->pf.bshift); /* blue-shift */
1916 if (vs->ds->surface->pf.bits_per_pixel == 32)
1917 vs->send_hextile_tile = send_hextile_tile_32;
1918 else if (vs->ds->surface->pf.bits_per_pixel == 16)
1919 vs->send_hextile_tile = send_hextile_tile_16;
1920 else if (vs->ds->surface->pf.bits_per_pixel == 8)
1921 vs->send_hextile_tile = send_hextile_tile_8;
1922 vs->clientds = *(vs->ds->surface);
1923 vs->clientds.flags &= ~QEMU_ALLOCATED_FLAG;
1924 vs->write_pixels = vnc_write_pixels_copy;
1926 vnc_write(vs, pad, 3); /* padding */
1929 static void vnc_dpy_setdata(DisplayState *ds)
1931 /* We don't have to do anything */
1934 static void vnc_colordepth(VncState *vs)
1936 if (vnc_has_feature(vs, VNC_FEATURE_WMVI)) {
1937 /* Sending a WMVi message to notify the client*/
1938 vnc_write_u8(vs, 0); /* msg id */
1939 vnc_write_u8(vs, 0);
1940 vnc_write_u16(vs, 1); /* number of rects */
1941 vnc_framebuffer_update(vs, 0, 0, ds_get_width(vs->ds),
1942 ds_get_height(vs->ds), VNC_ENCODING_WMVi);
1943 pixel_format_message(vs);
1946 set_pixel_conversion(vs);
1950 static int protocol_client_msg(VncState *vs, uint8_t *data, size_t len)
1954 VncDisplay *vd = vs->vd;
1957 vd->timer_interval = VNC_REFRESH_INTERVAL_BASE;
1958 if (!qemu_timer_expired(vd->timer, qemu_get_clock(rt_clock) + vd->timer_interval))
1959 qemu_mod_timer(vd->timer, qemu_get_clock(rt_clock) + vd->timer_interval);
1967 set_pixel_format(vs, read_u8(data, 4), read_u8(data, 5),
1968 read_u8(data, 6), read_u8(data, 7),
1969 read_u16(data, 8), read_u16(data, 10),
1970 read_u16(data, 12), read_u8(data, 14),
1971 read_u8(data, 15), read_u8(data, 16));
1978 limit = read_u16(data, 2);
1980 return 4 + (limit * 4);
1982 limit = read_u16(data, 2);
1984 for (i = 0; i < limit; i++) {
1985 int32_t val = read_s32(data, 4 + (i * 4));
1986 memcpy(data + 4 + (i * 4), &val, sizeof(val));
1989 set_encodings(vs, (int32_t *)(data + 4), limit);
1995 framebuffer_update_request(vs,
1996 read_u8(data, 1), read_u16(data, 2), read_u16(data, 4),
1997 read_u16(data, 6), read_u16(data, 8));
2003 key_event(vs, read_u8(data, 1), read_u32(data, 4));
2009 pointer_event(vs, read_u8(data, 1), read_u16(data, 2), read_u16(data, 4));
2016 uint32_t dlen = read_u32(data, 4);
2021 client_cut_text(vs, read_u32(data, 4), data + 8);
2027 switch (read_u8(data, 1)) {
2032 ext_key_event(vs, read_u16(data, 2),
2033 read_u32(data, 4), read_u32(data, 8));
2039 switch (read_u16 (data, 2)) {
2049 switch (read_u8(data, 4)) {
2050 case 0: vs->as.fmt = AUD_FMT_U8; break;
2051 case 1: vs->as.fmt = AUD_FMT_S8; break;
2052 case 2: vs->as.fmt = AUD_FMT_U16; break;
2053 case 3: vs->as.fmt = AUD_FMT_S16; break;
2054 case 4: vs->as.fmt = AUD_FMT_U32; break;
2055 case 5: vs->as.fmt = AUD_FMT_S32; break;
2057 printf("Invalid audio format %d\n", read_u8(data, 4));
2058 vnc_client_error(vs);
2061 vs->as.nchannels = read_u8(data, 5);
2062 if (vs->as.nchannels != 1 && vs->as.nchannels != 2) {
2063 printf("Invalid audio channel coount %d\n",
2065 vnc_client_error(vs);
2068 vs->as.freq = read_u32(data, 6);
2071 printf ("Invalid audio message %d\n", read_u8(data, 4));
2072 vnc_client_error(vs);
2078 printf("Msg: %d\n", read_u16(data, 0));
2079 vnc_client_error(vs);
2084 printf("Msg: %d\n", data[0]);
2085 vnc_client_error(vs);
2089 vnc_read_when(vs, protocol_client_msg, 1);
2093 static int protocol_client_init(VncState *vs, uint8_t *data, size_t len)
2098 vnc_write_u16(vs, ds_get_width(vs->ds));
2099 vnc_write_u16(vs, ds_get_height(vs->ds));
2101 pixel_format_message(vs);
2104 size = snprintf(buf, sizeof(buf), "QEMU (%s)", qemu_name);
2106 size = snprintf(buf, sizeof(buf), "QEMU");
2108 vnc_write_u32(vs, size);
2109 vnc_write(vs, buf, size);
2112 vnc_client_cache_auth(vs);
2114 vnc_read_when(vs, protocol_client_msg, 1);
2119 void start_client_init(VncState *vs)
2121 vnc_read_when(vs, protocol_client_init, 1);
2124 static void make_challenge(VncState *vs)
2128 srand(time(NULL)+getpid()+getpid()*987654+rand());
2130 for (i = 0 ; i < sizeof(vs->challenge) ; i++)
2131 vs->challenge[i] = (int) (256.0*rand()/(RAND_MAX+1.0));
2134 static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len)
2136 unsigned char response[VNC_AUTH_CHALLENGE_SIZE];
2138 unsigned char key[8];
2140 if (!vs->vd->password || !vs->vd->password[0]) {
2141 VNC_DEBUG("No password configured on server");
2142 vnc_write_u32(vs, 1); /* Reject auth */
2143 if (vs->minor >= 8) {
2144 static const char err[] = "Authentication failed";
2145 vnc_write_u32(vs, sizeof(err));
2146 vnc_write(vs, err, sizeof(err));
2149 vnc_client_error(vs);
2153 memcpy(response, vs->challenge, VNC_AUTH_CHALLENGE_SIZE);
2155 /* Calculate the expected challenge response */
2156 pwlen = strlen(vs->vd->password);
2157 for (i=0; i<sizeof(key); i++)
2158 key[i] = i<pwlen ? vs->vd->password[i] : 0;
2160 for (j = 0; j < VNC_AUTH_CHALLENGE_SIZE; j += 8)
2161 des(response+j, response+j);
2163 /* Compare expected vs actual challenge response */
2164 if (memcmp(response, data, VNC_AUTH_CHALLENGE_SIZE) != 0) {
2165 VNC_DEBUG("Client challenge reponse did not match\n");
2166 vnc_write_u32(vs, 1); /* Reject auth */
2167 if (vs->minor >= 8) {
2168 static const char err[] = "Authentication failed";
2169 vnc_write_u32(vs, sizeof(err));
2170 vnc_write(vs, err, sizeof(err));
2173 vnc_client_error(vs);
2175 VNC_DEBUG("Accepting VNC challenge response\n");
2176 vnc_write_u32(vs, 0); /* Accept auth */
2179 start_client_init(vs);
2184 void start_auth_vnc(VncState *vs)
2187 /* Send client a 'random' challenge */
2188 vnc_write(vs, vs->challenge, sizeof(vs->challenge));
2191 vnc_read_when(vs, protocol_client_auth_vnc, sizeof(vs->challenge));
2195 static int protocol_client_auth(VncState *vs, uint8_t *data, size_t len)
2197 /* We only advertise 1 auth scheme at a time, so client
2198 * must pick the one we sent. Verify this */
2199 if (data[0] != vs->vd->auth) { /* Reject auth */
2200 VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]);
2201 vnc_write_u32(vs, 1);
2202 if (vs->minor >= 8) {
2203 static const char err[] = "Authentication failed";
2204 vnc_write_u32(vs, sizeof(err));
2205 vnc_write(vs, err, sizeof(err));
2207 vnc_client_error(vs);
2208 } else { /* Accept requested auth */
2209 VNC_DEBUG("Client requested auth %d\n", (int)data[0]);
2210 switch (vs->vd->auth) {
2212 VNC_DEBUG("Accept auth none\n");
2213 if (vs->minor >= 8) {
2214 vnc_write_u32(vs, 0); /* Accept auth completion */
2217 start_client_init(vs);
2221 VNC_DEBUG("Start VNC auth\n");
2225 #ifdef CONFIG_VNC_TLS
2226 case VNC_AUTH_VENCRYPT:
2227 VNC_DEBUG("Accept VeNCrypt auth\n");;
2228 start_auth_vencrypt(vs);
2230 #endif /* CONFIG_VNC_TLS */
2232 #ifdef CONFIG_VNC_SASL
2234 VNC_DEBUG("Accept SASL auth\n");
2235 start_auth_sasl(vs);
2237 #endif /* CONFIG_VNC_SASL */
2239 default: /* Should not be possible, but just in case */
2240 VNC_DEBUG("Reject auth %d server code bug\n", vs->vd->auth);
2241 vnc_write_u8(vs, 1);
2242 if (vs->minor >= 8) {
2243 static const char err[] = "Authentication failed";
2244 vnc_write_u32(vs, sizeof(err));
2245 vnc_write(vs, err, sizeof(err));
2247 vnc_client_error(vs);
2253 static int protocol_version(VncState *vs, uint8_t *version, size_t len)
2257 memcpy(local, version, 12);
2260 if (sscanf(local, "RFB %03d.%03d\n", &vs->major, &vs->minor) != 2) {
2261 VNC_DEBUG("Malformed protocol version %s\n", local);
2262 vnc_client_error(vs);
2265 VNC_DEBUG("Client request protocol version %d.%d\n", vs->major, vs->minor);
2266 if (vs->major != 3 ||
2272 VNC_DEBUG("Unsupported client version\n");
2273 vnc_write_u32(vs, VNC_AUTH_INVALID);
2275 vnc_client_error(vs);
2278 /* Some broken clients report v3.4 or v3.5, which spec requires to be treated
2279 * as equivalent to v3.3 by servers
2281 if (vs->minor == 4 || vs->minor == 5)
2284 if (vs->minor == 3) {
2285 if (vs->vd->auth == VNC_AUTH_NONE) {
2286 VNC_DEBUG("Tell client auth none\n");
2287 vnc_write_u32(vs, vs->vd->auth);
2289 start_client_init(vs);
2290 } else if (vs->vd->auth == VNC_AUTH_VNC) {
2291 VNC_DEBUG("Tell client VNC auth\n");
2292 vnc_write_u32(vs, vs->vd->auth);
2296 VNC_DEBUG("Unsupported auth %d for protocol 3.3\n", vs->vd->auth);
2297 vnc_write_u32(vs, VNC_AUTH_INVALID);
2299 vnc_client_error(vs);
2302 VNC_DEBUG("Telling client we support auth %d\n", vs->vd->auth);
2303 vnc_write_u8(vs, 1); /* num auth */
2304 vnc_write_u8(vs, vs->vd->auth);
2305 vnc_read_when(vs, protocol_client_auth, 1);
2312 static int vnc_refresh_server_surface(VncDisplay *vd)
2316 uint8_t *server_row;
2318 uint32_t width_mask[VNC_DIRTY_WORDS];
2319 VncState *vs = NULL;
2323 * Walk through the guest dirty map.
2324 * Check and copy modified bits from guest to server surface.
2325 * Update server dirty map.
2327 vnc_set_bits(width_mask, (ds_get_width(vd->ds) / 16), VNC_DIRTY_WORDS);
2328 cmp_bytes = 16 * ds_get_bytes_per_pixel(vd->ds);
2329 guest_row = vd->guest.ds->data;
2330 server_row = vd->server->data;
2331 for (y = 0; y < vd->guest.ds->height; y++) {
2332 if (vnc_and_bits(vd->guest.dirty[y], width_mask, VNC_DIRTY_WORDS)) {
2335 uint8_t *server_ptr;
2337 guest_ptr = guest_row;
2338 server_ptr = server_row;
2340 for (x = 0; x < vd->guest.ds->width;
2341 x += 16, guest_ptr += cmp_bytes, server_ptr += cmp_bytes) {
2342 if (!vnc_get_bit(vd->guest.dirty[y], (x / 16)))
2344 vnc_clear_bit(vd->guest.dirty[y], (x / 16));
2345 if (memcmp(server_ptr, guest_ptr, cmp_bytes) == 0)
2347 memcpy(server_ptr, guest_ptr, cmp_bytes);
2349 while (vs != NULL) {
2350 vnc_set_bit(vs->dirty[y], (x / 16));
2356 guest_row += ds_get_linesize(vd->ds);
2357 server_row += ds_get_linesize(vd->ds);
2362 static void vnc_refresh(void *opaque)
2364 VncDisplay *vd = opaque;
2365 VncState *vs = NULL;
2366 int has_dirty = 0, rects = 0;
2370 has_dirty = vnc_refresh_server_surface(vd);
2373 while (vs != NULL) {
2374 rects += vnc_update_client(vs, has_dirty);
2377 /* vd->timer could be NULL now if the last client disconnected,
2378 * in this case don't update the timer */
2379 if (vd->timer == NULL)
2382 if (has_dirty && rects) {
2383 vd->timer_interval /= 2;
2384 if (vd->timer_interval < VNC_REFRESH_INTERVAL_BASE)
2385 vd->timer_interval = VNC_REFRESH_INTERVAL_BASE;
2387 vd->timer_interval += VNC_REFRESH_INTERVAL_INC;
2388 if (vd->timer_interval > VNC_REFRESH_INTERVAL_MAX)
2389 vd->timer_interval = VNC_REFRESH_INTERVAL_MAX;
2391 qemu_mod_timer(vd->timer, qemu_get_clock(rt_clock) + vd->timer_interval);
2394 static void vnc_init_timer(VncDisplay *vd)
2396 vd->timer_interval = VNC_REFRESH_INTERVAL_BASE;
2397 if (vd->timer == NULL && vd->clients != NULL) {
2398 vd->timer = qemu_new_timer(rt_clock, vnc_refresh, vd);
2403 static void vnc_remove_timer(VncDisplay *vd)
2405 if (vd->timer != NULL && vd->clients == NULL) {
2406 qemu_del_timer(vd->timer);
2407 qemu_free_timer(vd->timer);
2412 static void vnc_connect(VncDisplay *vd, int csock)
2414 VncState *vs = qemu_mallocz(sizeof(VncState));
2417 VNC_DEBUG("New client on socket %d\n", csock);
2419 socket_set_nonblock(vs->csock);
2420 qemu_set_fd_handler2(vs->csock, NULL, vnc_client_read, NULL, vs);
2422 vnc_client_cache_addr(vs);
2423 vnc_qmp_event(vs, QEVENT_VNC_CONNECTED);
2430 vs->as.freq = 44100;
2431 vs->as.nchannels = 2;
2432 vs->as.fmt = AUD_FMT_S16;
2433 vs->as.endianness = 0;
2435 vs->next = vd->clients;
2440 vnc_write(vs, "RFB 003.008\n", 12);
2442 vnc_read_when(vs, protocol_version, 12);
2447 /* vs might be free()ed here */
2450 static void vnc_listen_read(void *opaque)
2452 VncDisplay *vs = opaque;
2453 struct sockaddr_in addr;
2454 socklen_t addrlen = sizeof(addr);
2459 int csock = qemu_accept(vs->lsock, (struct sockaddr *)&addr, &addrlen);
2461 vnc_connect(vs, csock);
2465 void vnc_display_init(DisplayState *ds)
2467 VncDisplay *vs = qemu_mallocz(sizeof(*vs));
2469 dcl = qemu_mallocz(sizeof(DisplayChangeListener));
2479 if (keyboard_layout)
2480 vs->kbd_layout = init_keyboard_layout(name2keysym, keyboard_layout);
2482 vs->kbd_layout = init_keyboard_layout(name2keysym, "en-us");
2484 if (!vs->kbd_layout)
2487 dcl->dpy_copy = vnc_dpy_copy;
2488 dcl->dpy_update = vnc_dpy_update;
2489 dcl->dpy_resize = vnc_dpy_resize;
2490 dcl->dpy_setdata = vnc_dpy_setdata;
2491 register_displaychangelistener(ds, dcl);
2495 void vnc_display_close(DisplayState *ds)
2497 VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2502 qemu_free(vs->display);
2505 if (vs->lsock != -1) {
2506 qemu_set_fd_handler2(vs->lsock, NULL, NULL, NULL, NULL);
2510 vs->auth = VNC_AUTH_INVALID;
2511 #ifdef CONFIG_VNC_TLS
2512 vs->subauth = VNC_AUTH_INVALID;
2513 vs->tls.x509verify = 0;
2517 int vnc_display_password(DisplayState *ds, const char *password)
2519 VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2526 qemu_free(vs->password);
2527 vs->password = NULL;
2529 if (password && password[0]) {
2530 if (!(vs->password = qemu_strdup(password)))
2532 if (vs->auth == VNC_AUTH_NONE) {
2533 vs->auth = VNC_AUTH_VNC;
2536 vs->auth = VNC_AUTH_NONE;
2542 char *vnc_display_local_addr(DisplayState *ds)
2544 VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2546 return vnc_socket_local_addr("%s:%s", vs->lsock);
2549 int vnc_display_open(DisplayState *ds, const char *display)
2551 VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display;
2552 const char *options;
2556 #ifdef CONFIG_VNC_TLS
2557 int tls = 0, x509 = 0;
2559 #ifdef CONFIG_VNC_SASL
2567 vnc_display_close(ds);
2568 if (strcmp(display, "none") == 0)
2571 if (!(vs->display = strdup(display)))
2575 while ((options = strchr(options, ','))) {
2577 if (strncmp(options, "password", 8) == 0) {
2578 password = 1; /* Require password auth */
2579 } else if (strncmp(options, "reverse", 7) == 0) {
2581 } else if (strncmp(options, "to=", 3) == 0) {
2582 to_port = atoi(options+3) + 5900;
2583 #ifdef CONFIG_VNC_SASL
2584 } else if (strncmp(options, "sasl", 4) == 0) {
2585 sasl = 1; /* Require SASL auth */
2587 #ifdef CONFIG_VNC_TLS
2588 } else if (strncmp(options, "tls", 3) == 0) {
2589 tls = 1; /* Require TLS */
2590 } else if (strncmp(options, "x509", 4) == 0) {
2592 x509 = 1; /* Require x509 certificates */
2593 if (strncmp(options, "x509verify", 10) == 0)
2594 vs->tls.x509verify = 1; /* ...and verify client certs */
2596 /* Now check for 'x509=/some/path' postfix
2597 * and use that to setup x509 certificate/key paths */
2598 start = strchr(options, '=');
2599 end = strchr(options, ',');
2600 if (start && (!end || (start < end))) {
2601 int len = end ? end-(start+1) : strlen(start+1);
2602 char *path = qemu_strndup(start + 1, len);
2604 VNC_DEBUG("Trying certificate path '%s'\n", path);
2605 if (vnc_tls_set_x509_creds_dir(vs, path) < 0) {
2606 fprintf(stderr, "Failed to find x509 certificates/keys in %s\n", path);
2608 qemu_free(vs->display);
2614 fprintf(stderr, "No certificate path provided\n");
2615 qemu_free(vs->display);
2620 } else if (strncmp(options, "acl", 3) == 0) {
2625 #ifdef CONFIG_VNC_TLS
2626 if (acl && x509 && vs->tls.x509verify) {
2627 if (!(vs->tls.acl = qemu_acl_init("vnc.x509dname"))) {
2628 fprintf(stderr, "Failed to create x509 dname ACL\n");
2633 #ifdef CONFIG_VNC_SASL
2635 if (!(vs->sasl.acl = qemu_acl_init("vnc.username"))) {
2636 fprintf(stderr, "Failed to create username ACL\n");
2643 * Combinations we support here:
2645 * - no-auth (clear text, no auth)
2646 * - password (clear text, weak auth)
2647 * - sasl (encrypt, good auth *IF* using Kerberos via GSSAPI)
2648 * - tls (encrypt, weak anonymous creds, no auth)
2649 * - tls + password (encrypt, weak anonymous creds, weak auth)
2650 * - tls + sasl (encrypt, weak anonymous creds, good auth)
2651 * - tls + x509 (encrypt, good x509 creds, no auth)
2652 * - tls + x509 + password (encrypt, good x509 creds, weak auth)
2653 * - tls + x509 + sasl (encrypt, good x509 creds, good auth)
2655 * NB1. TLS is a stackable auth scheme.
2656 * NB2. the x509 schemes have option to validate a client cert dname
2659 #ifdef CONFIG_VNC_TLS
2661 vs->auth = VNC_AUTH_VENCRYPT;
2663 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
2664 vs->subauth = VNC_AUTH_VENCRYPT_X509VNC;
2666 VNC_DEBUG("Initializing VNC server with TLS password auth\n");
2667 vs->subauth = VNC_AUTH_VENCRYPT_TLSVNC;
2670 #endif /* CONFIG_VNC_TLS */
2671 VNC_DEBUG("Initializing VNC server with password auth\n");
2672 vs->auth = VNC_AUTH_VNC;
2673 #ifdef CONFIG_VNC_TLS
2674 vs->subauth = VNC_AUTH_INVALID;
2676 #endif /* CONFIG_VNC_TLS */
2677 #ifdef CONFIG_VNC_SASL
2679 #ifdef CONFIG_VNC_TLS
2681 vs->auth = VNC_AUTH_VENCRYPT;
2683 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
2684 vs->subauth = VNC_AUTH_VENCRYPT_X509SASL;
2686 VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
2687 vs->subauth = VNC_AUTH_VENCRYPT_TLSSASL;
2690 #endif /* CONFIG_VNC_TLS */
2691 VNC_DEBUG("Initializing VNC server with SASL auth\n");
2692 vs->auth = VNC_AUTH_SASL;
2693 #ifdef CONFIG_VNC_TLS
2694 vs->subauth = VNC_AUTH_INVALID;
2696 #endif /* CONFIG_VNC_TLS */
2697 #endif /* CONFIG_VNC_SASL */
2699 #ifdef CONFIG_VNC_TLS
2701 vs->auth = VNC_AUTH_VENCRYPT;
2703 VNC_DEBUG("Initializing VNC server with x509 no auth\n");
2704 vs->subauth = VNC_AUTH_VENCRYPT_X509NONE;
2706 VNC_DEBUG("Initializing VNC server with TLS no auth\n");
2707 vs->subauth = VNC_AUTH_VENCRYPT_TLSNONE;
2711 VNC_DEBUG("Initializing VNC server with no auth\n");
2712 vs->auth = VNC_AUTH_NONE;
2713 #ifdef CONFIG_VNC_TLS
2714 vs->subauth = VNC_AUTH_INVALID;
2719 #ifdef CONFIG_VNC_SASL
2720 if ((saslErr = sasl_server_init(NULL, "qemu")) != SASL_OK) {
2721 fprintf(stderr, "Failed to initialize SASL auth %s",
2722 sasl_errstring(saslErr, NULL, NULL));
2730 /* connect to viewer */
2731 if (strncmp(display, "unix:", 5) == 0)
2732 vs->lsock = unix_connect(display+5);
2734 vs->lsock = inet_connect(display, SOCK_STREAM);
2735 if (-1 == vs->lsock) {
2740 int csock = vs->lsock;
2742 vnc_connect(vs, csock);
2747 /* listen for connects */
2749 dpy = qemu_malloc(256);
2750 if (strncmp(display, "unix:", 5) == 0) {
2751 pstrcpy(dpy, 256, "unix:");
2752 vs->lsock = unix_listen(display+5, dpy+5, 256-5);
2754 vs->lsock = inet_listen(display, dpy, 256, SOCK_STREAM, 5900);
2756 if (-1 == vs->lsock) {
2764 return qemu_set_fd_handler2(vs->lsock, NULL, vnc_listen_read, NULL, vs);