2016-04-16 20:50:23 +02:00
|
|
|
/****************************************************************************
|
2021-12-31 09:22:11 +01:00
|
|
|
* drivers/video/vnc/vnc_negotiate.c
|
2016-04-16 20:50:23 +02:00
|
|
|
*
|
2021-02-05 11:12:53 +01:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2016-04-16 20:50:23 +02:00
|
|
|
*
|
2021-02-05 11:12:53 +01:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2016-04-16 20:50:23 +02:00
|
|
|
*
|
2021-02-05 11:12:53 +01:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2016-04-16 20:50:23 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2016-04-16 23:59:00 +02:00
|
|
|
#include <assert.h>
|
2016-04-23 17:06:39 +02:00
|
|
|
|
|
|
|
#if defined(CONFIG_VNCSERVER_DEBUG) && !defined(CONFIG_DEBUG_GRAPHICS)
|
2016-06-11 22:14:08 +02:00
|
|
|
# undef CONFIG_DEBUG_ERROR
|
|
|
|
# undef CONFIG_DEBUG_WARN
|
2016-06-11 19:50:18 +02:00
|
|
|
# undef CONFIG_DEBUG_INFO
|
2019-03-17 18:34:45 +01:00
|
|
|
# undef CONFIG_DEBUG_GRAPHICS_ERROR
|
|
|
|
# undef CONFIG_DEBUG_GRAPHICS_WARN
|
|
|
|
# undef CONFIG_DEBUG_GRAPHICS_INFO
|
|
|
|
# define CONFIG_DEBUG_ERROR 1
|
|
|
|
# define CONFIG_DEBUG_WARN 1
|
|
|
|
# define CONFIG_DEBUG_INFO 1
|
|
|
|
# define CONFIG_DEBUG_GRAPHICS 1
|
|
|
|
# define CONFIG_DEBUG_GRAPHICS_ERROR 1
|
|
|
|
# define CONFIG_DEBUG_GRAPHICS_WARN 1
|
|
|
|
# define CONFIG_DEBUG_GRAPHICS_INFO 1
|
2016-04-23 17:06:39 +02:00
|
|
|
#endif
|
2016-04-16 23:59:00 +02:00
|
|
|
#include <debug.h>
|
2016-04-16 20:50:23 +02:00
|
|
|
|
2016-04-19 14:59:33 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
|
|
|
# include <sys/time.h>
|
|
|
|
#endif
|
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
#include <nuttx/video/fb.h>
|
2016-04-16 20:50:23 +02:00
|
|
|
#include <nuttx/video/rfb.h>
|
|
|
|
|
|
|
|
#include "vnc_server.h"
|
|
|
|
|
2016-04-16 21:06:39 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(CONFIG_VNCSERVER_PROTO3p3)
|
|
|
|
static const char g_vncproto[] = RFB_PROTOCOL_VERSION_3p3;
|
|
|
|
#elif defined(CONFIG_VNCSERVER_PROTO3p8)
|
|
|
|
static const char g_vncproto[] = RFB_PROTOCOL_VERSION_3p8;
|
2016-04-19 16:33:16 +02:00
|
|
|
static const char g_nosecurity[] = "No security types are supported";
|
2016-04-16 21:06:39 +02:00
|
|
|
#endif
|
2016-04-21 01:47:47 +02:00
|
|
|
static const char g_vncname[] = CONFIG_VNCSERVER_NAME;
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-04-16 20:50:23 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: vnc_negotiate
|
|
|
|
*
|
|
|
|
* Description:
|
2018-09-14 14:55:45 +02:00
|
|
|
* Perform the VNC initialization sequence after the client has successfully
|
2016-04-16 20:50:23 +02:00
|
|
|
* connected to the server. Negotiate security, framebuffer and color
|
|
|
|
* properties.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2016-04-17 16:20:14 +02:00
|
|
|
* session - An instance of the session structure.
|
2016-04-16 20:50:23 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns zero (OK) on success; a negated errno value on failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int vnc_negotiate(FAR struct vnc_session_s *session)
|
|
|
|
{
|
2016-04-19 16:33:16 +02:00
|
|
|
#ifdef CONFIG_VNCSERVER_PROTO3p3
|
2016-04-16 23:59:00 +02:00
|
|
|
FAR struct rfb_sectype_s *sectype;
|
2016-04-19 16:33:16 +02:00
|
|
|
#else /* ifdef CONFIG_VNCSERVER_PROTO3p8 */
|
|
|
|
FAR struct rfb_supported_sectypes_s *sectypes;
|
|
|
|
FAR struct rfb_selected_sectype_s *sectype;
|
|
|
|
FAR struct rfb_sectype_result_s *secresult;
|
|
|
|
FAR struct rfb_sectype_fail_s *secfail;
|
|
|
|
#endif
|
2016-04-16 23:59:00 +02:00
|
|
|
FAR struct rfb_serverinit_s *serverinit;
|
|
|
|
FAR struct rfb_pixelfmt_s *pixelfmt;
|
|
|
|
FAR struct rfb_setpixelformat_s *setformat;
|
2016-04-21 01:01:48 +02:00
|
|
|
FAR struct rfb_setencodings_s *encodings;
|
2016-04-16 23:59:00 +02:00
|
|
|
ssize_t nsent;
|
2016-04-16 21:06:39 +02:00
|
|
|
ssize_t nrecvd;
|
|
|
|
size_t len;
|
2021-12-31 14:43:33 +01:00
|
|
|
int ret;
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-04-19 14:59:33 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
/* Set a receive timeout so that we don't hang if the client does not
|
|
|
|
* respond according to RFB 3.3 protocol.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tv.tv_sec = 5;
|
|
|
|
tv.tv_usec = 0;
|
2017-09-30 16:18:08 +02:00
|
|
|
|
2016-04-19 14:59:33 +02:00
|
|
|
ret = psock_setsockopt(&session->connect, SOL_SOCKET, SO_RCVTIMEO,
|
|
|
|
&tv, sizeof(struct timeval));
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-09-30 16:18:08 +02:00
|
|
|
gerr("ERROR: Failed to set receive timeout: %d\n", ret);
|
|
|
|
return ret;
|
2016-04-19 14:59:33 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
/* Inform the client of the VNC protocol version */
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send protocol version: %s\n", g_vncproto);
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-16 21:06:39 +02:00
|
|
|
len = strlen(g_vncproto);
|
2016-04-16 23:59:00 +02:00
|
|
|
nsent = psock_send(&session->connect, g_vncproto, len, 0);
|
|
|
|
if (nsent < 0)
|
2016-04-16 21:06:39 +02:00
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send ProtocolVersion failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-16 21:06:39 +02:00
|
|
|
}
|
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
DEBUGASSERT(nsent == len);
|
|
|
|
|
|
|
|
/* Receive the echo of the protocol string */
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Receive echo from VNC client\n");
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-17 16:20:14 +02:00
|
|
|
nrecvd = psock_recv(&session->connect, session->inbuf, len, 0);
|
2016-04-17 17:17:37 +02:00
|
|
|
if (nrecvd < 0)
|
2016-04-16 21:06:39 +02:00
|
|
|
{
|
2018-01-31 00:23:10 +01:00
|
|
|
gerr("ERROR: Receive protocol confirmation failed: %d\n", (int)nrecvd);
|
|
|
|
return (int)nrecvd;
|
2016-04-16 21:06:39 +02:00
|
|
|
}
|
2016-04-23 18:57:28 +02:00
|
|
|
else if (nrecvd == 0)
|
|
|
|
{
|
2016-06-12 19:11:57 +02:00
|
|
|
gwarn("WARNING: Connection closed\n");
|
2016-04-23 18:57:28 +02:00
|
|
|
return -ECONNABORTED;
|
|
|
|
}
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
DEBUGASSERT(nrecvd == len);
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-04-19 16:33:16 +02:00
|
|
|
#ifdef CONFIG_VNCSERVER_PROTO3p3
|
|
|
|
/* Version 3.3: The server decides the security type and sends a single
|
|
|
|
* word containing the security type: Tell the client that we won't use
|
|
|
|
* any stinkin' security.
|
2016-04-16 23:59:00 +02:00
|
|
|
*/
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send SecurityType\n");
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-17 16:20:14 +02:00
|
|
|
sectype = (FAR struct rfb_sectype_s *)session->outbuf;
|
2016-04-16 23:59:00 +02:00
|
|
|
rfb_putbe32(sectype->type, RFB_SECTYPE_NONE);
|
|
|
|
|
|
|
|
nsent = psock_send(&session->connect, sectype,
|
|
|
|
sizeof(struct rfb_sectype_s), 0);
|
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send Security failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(nsent == sizeof(struct rfb_sectype_s));
|
|
|
|
|
2016-04-19 16:33:16 +02:00
|
|
|
#else /* ifdef CONFIG_VNCSERVER_PROTO3p8 */
|
|
|
|
/* Version 3.8: Offer the client a choice of security -- where None is the
|
|
|
|
* only option offered.
|
|
|
|
*/
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send SupportedSecurityTypes\n");
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
sectypes = (FAR struct rfb_supported_sectypes_s *)session->outbuf;
|
|
|
|
sectypes->ntypes = 1;
|
|
|
|
sectypes->type[0] = RFB_SECTYPE_NONE;
|
|
|
|
|
|
|
|
nsent = psock_send(&session->connect, sectypes,
|
|
|
|
SIZEOF_RFB_SUPPORTED_SECTYPES_S(1), 0);
|
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send SupportedSecurityTypes failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-19 16:33:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(nsent == SIZEOF_RFB_SUPPORTED_SECTYPES_S(1));
|
|
|
|
|
|
|
|
/* If the server listed at least one valid security type supported by the
|
|
|
|
* client, the client sends back a single byte indicating which security
|
|
|
|
* type is to be used on the connection.
|
|
|
|
*/
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Receive SecurityType\n");
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
sectype = (FAR struct rfb_selected_sectype_s *)session->inbuf;
|
|
|
|
|
|
|
|
nrecvd = psock_recv(&session->connect, sectype,
|
|
|
|
sizeof(struct rfb_selected_sectype_s), 0);
|
|
|
|
if (nrecvd < 0)
|
|
|
|
{
|
2018-01-31 00:23:10 +01:00
|
|
|
gerr("ERROR: Receive SecurityType failed: %d\n", (int)nrecvd);
|
|
|
|
return (int)nrecvd;
|
2016-04-19 16:33:16 +02:00
|
|
|
}
|
2016-04-23 18:57:28 +02:00
|
|
|
else if (nrecvd == 0)
|
|
|
|
{
|
2016-06-12 19:11:57 +02:00
|
|
|
gwarn("WARNING: Connection closed\n");
|
2016-04-23 18:57:28 +02:00
|
|
|
return -ECONNABORTED;
|
|
|
|
}
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
DEBUGASSERT(nrecvd == sizeof(struct rfb_selected_sectype_s));
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send SecurityResult\n");
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
secresult = (FAR struct rfb_sectype_result_s *)session->outbuf;
|
|
|
|
|
|
|
|
if (sectype->type != RFB_SECTYPE_NONE)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: Received unsupported SecurityType: %d\n", sectype->type);
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
/* REVISIT: Should send the reason string here */
|
|
|
|
|
|
|
|
rfb_putbe32(secresult->result, RFB_SECTYPE_FAIL);
|
|
|
|
|
|
|
|
nsent = psock_send(&session->connect, secresult,
|
|
|
|
sizeof(struct rfb_sectype_result_s), 0);
|
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send SecurityResult failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-19 16:33:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(nsent == sizeof(struct rfb_sectype_result_s));
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send failure reason\n");
|
2016-04-19 16:33:16 +02:00
|
|
|
|
|
|
|
secfail = (FAR struct rfb_sectype_fail_s *)session->outbuf;
|
|
|
|
len = strlen(g_nosecurity);
|
|
|
|
rfb_putbe32(secfail->len, len);
|
|
|
|
memcpy(secfail->str, g_nosecurity, len);
|
|
|
|
|
|
|
|
nsent = psock_send(&session->connect, secfail,
|
|
|
|
SIZEOF_RFB_SECTYPE_FAIL_S(len), 0);
|
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send failure reason failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-19 16:33:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(nsent == SIZEOF_RFB_SECTYPE_FAIL_S(len));
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
rfb_putbe32(secresult->result, RFB_SECTYPE_SUCCESS);
|
|
|
|
|
|
|
|
nsent = psock_send(&session->connect, secresult,
|
|
|
|
sizeof(struct rfb_sectype_result_s), 0);
|
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send SecurityResult failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-19 16:33:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(nsent == sizeof(struct rfb_sectype_result_s));
|
|
|
|
#endif
|
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
/* Receive the ClientInit message
|
|
|
|
*
|
2023-09-18 10:31:07 +02:00
|
|
|
* "Once the client and server are sure that they're happy to talk to one
|
2016-04-16 23:59:00 +02:00
|
|
|
* another using the agreed security type, the protocol passes to the
|
2018-07-09 02:24:45 +02:00
|
|
|
* initialization phase. The client sends a ClientInit message followed
|
2016-04-16 23:59:00 +02:00
|
|
|
* by the server sending a ServerInit message."
|
|
|
|
*
|
|
|
|
* In this implementation, the sharing flag is ignored.
|
|
|
|
*/
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Receive ClientInit\n");
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-17 16:20:14 +02:00
|
|
|
nrecvd = psock_recv(&session->connect, session->inbuf,
|
2016-04-16 23:59:00 +02:00
|
|
|
sizeof(struct rfb_clientinit_s), 0);
|
|
|
|
if (nrecvd < 0)
|
|
|
|
{
|
2018-01-31 00:23:10 +01:00
|
|
|
gerr("ERROR: Receive ClientInit failed: %d\n", (int)nrecvd);
|
|
|
|
return (int)nrecvd;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
2016-04-23 18:57:28 +02:00
|
|
|
else if (nrecvd == 0)
|
|
|
|
{
|
2016-06-12 19:11:57 +02:00
|
|
|
gwarn("WARNING: Connection closed\n");
|
2016-04-23 18:57:28 +02:00
|
|
|
return -ECONNABORTED;
|
|
|
|
}
|
2016-04-16 23:59:00 +02:00
|
|
|
|
|
|
|
DEBUGASSERT(nrecvd == sizeof(struct rfb_clientinit_s));
|
|
|
|
|
2016-04-19 02:55:36 +02:00
|
|
|
/* Send the ServerInit message
|
2016-04-16 23:59:00 +02:00
|
|
|
*
|
|
|
|
* "After receiving the ClientInit message, the server sends a ServerInit
|
2023-09-18 10:31:07 +02:00
|
|
|
* message. This tells the client the width and height of the server's
|
2021-02-05 09:05:48 +01:00
|
|
|
* framebuffer, its pixel format and the name associated with the
|
|
|
|
* desktop:"
|
2016-04-19 18:10:59 +02:00
|
|
|
*
|
|
|
|
* RealVNC client supports this resolutions:
|
2021-02-05 09:05:48 +01:00
|
|
|
* Full (all available colors) - Max resolution of the platform
|
|
|
|
* (TrueColor)
|
2016-04-19 18:10:59 +02:00
|
|
|
* Medium (256 colors) - 256 colors (Paletted)
|
|
|
|
* Low (64 colors) - RGB8 2:2:2 (default, TrueColor)
|
|
|
|
* Very Low (8 colors) - RGB3 1:1:1 (TrueColor)
|
2016-04-16 23:59:00 +02:00
|
|
|
*/
|
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Send ServerInit\n");
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-17 16:20:14 +02:00
|
|
|
serverinit = (FAR struct rfb_serverinit_s *)session->outbuf;
|
2016-04-16 23:59:00 +02:00
|
|
|
|
|
|
|
rfb_putbe16(serverinit->width, CONFIG_VNCSERVER_SCREENWIDTH);
|
|
|
|
rfb_putbe16(serverinit->height, CONFIG_VNCSERVER_SCREENHEIGHT);
|
|
|
|
|
|
|
|
pixelfmt = &serverinit->format;
|
2016-04-19 17:11:14 +02:00
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
pixelfmt->bpp = RFB_BITSPERPIXEL;
|
|
|
|
pixelfmt->depth = RFB_PIXELDEPTH;
|
|
|
|
pixelfmt->bigendian = 0;
|
|
|
|
pixelfmt->truecolor = RFB_TRUECOLOR;
|
|
|
|
|
|
|
|
rfb_putbe16(pixelfmt->rmax, RFB_RMAX);
|
|
|
|
rfb_putbe16(pixelfmt->gmax, RFB_GMAX);
|
|
|
|
rfb_putbe16(pixelfmt->bmax, RFB_BMAX);
|
|
|
|
|
|
|
|
pixelfmt->rshift = RFB_RSHIFT;
|
|
|
|
pixelfmt->gshift = RFB_GSHIFT;
|
|
|
|
pixelfmt->bshift = RFB_BSHIFT;
|
|
|
|
|
2016-04-21 01:47:47 +02:00
|
|
|
len = strlen(g_vncname);
|
|
|
|
rfb_putbe32(serverinit->namelen, len);
|
|
|
|
memcpy(serverinit->name, g_vncname, len);
|
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
nsent = psock_send(&session->connect, serverinit,
|
2016-04-21 01:47:47 +02:00
|
|
|
SIZEOF_RFB_SERVERINIT_S(len), 0);
|
2016-04-16 23:59:00 +02:00
|
|
|
if (nsent < 0)
|
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
gerr("ERROR: Send ServerInit failed: %d\n", (int)nsent);
|
|
|
|
return (int)nsent;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
|
2016-04-21 01:47:47 +02:00
|
|
|
DEBUGASSERT(nsent == SIZEOF_RFB_SERVERINIT_S(len));
|
2016-04-16 23:59:00 +02:00
|
|
|
|
|
|
|
/* We now expect to receive the SetPixelFormat message from the client.
|
|
|
|
* This may override some of our framebuffer settings.
|
|
|
|
*/
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Receive SetPixelFormat\n");
|
2016-04-19 02:55:36 +02:00
|
|
|
|
2016-04-17 16:20:14 +02:00
|
|
|
setformat = (FAR struct rfb_setpixelformat_s *)session->inbuf;
|
2016-04-16 21:06:39 +02:00
|
|
|
|
2016-04-16 23:59:00 +02:00
|
|
|
nrecvd = psock_recv(&session->connect, setformat,
|
|
|
|
sizeof(struct rfb_setpixelformat_s), 0);
|
|
|
|
if (nrecvd < 0)
|
|
|
|
{
|
2018-01-31 00:23:10 +01:00
|
|
|
gerr("ERROR: Receive SetPixelFormat failed: %d\n", (int)nrecvd);
|
|
|
|
return (int)nrecvd;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
2016-04-23 18:57:28 +02:00
|
|
|
else if (nrecvd == 0)
|
|
|
|
{
|
2016-06-12 19:11:57 +02:00
|
|
|
gwarn("WARNING: Connection closed\n");
|
2016-04-23 18:57:28 +02:00
|
|
|
return -ECONNABORTED;
|
|
|
|
}
|
2016-04-16 23:59:00 +02:00
|
|
|
else if (nrecvd != sizeof(struct rfb_setpixelformat_s))
|
|
|
|
{
|
|
|
|
/* Must not be a SetPixelFormat message? */
|
|
|
|
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: SetFormat wrong size: %d\n", (int)nrecvd);
|
2016-04-16 23:59:00 +02:00
|
|
|
return -EPROTO;
|
|
|
|
}
|
|
|
|
else if (setformat->msgtype != RFB_SETPIXELFMT_MSG)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: Not a SetPixelFormat message: %d\n",
|
2016-04-21 16:16:33 +02:00
|
|
|
(int)setformat->msgtype);
|
2016-04-16 23:59:00 +02:00
|
|
|
return -EPROTO;
|
|
|
|
}
|
|
|
|
|
2016-04-21 16:16:33 +02:00
|
|
|
/* Instantiate the client pixel format, verifying that the client request
|
|
|
|
* format is one that we can handle.
|
2016-04-20 17:47:02 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
ret = vnc_client_pixelformat(session, &setformat->format);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* We do not support this pixel format */
|
|
|
|
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: PixelFormat not supported\n");
|
2016-04-20 17:47:02 +02:00
|
|
|
return ret;
|
|
|
|
}
|
2016-04-16 23:59:00 +02:00
|
|
|
|
2016-04-21 01:01:48 +02:00
|
|
|
/* Receive supported encoding types from client. */
|
2016-04-20 17:47:02 +02:00
|
|
|
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Receive encoding types\n");
|
2016-04-16 23:59:00 +02:00
|
|
|
|
2016-04-21 01:01:48 +02:00
|
|
|
encodings = (FAR struct rfb_setencodings_s *)session->inbuf;
|
|
|
|
|
|
|
|
nrecvd = psock_recv(&session->connect, encodings,
|
2016-04-21 16:16:33 +02:00
|
|
|
CONFIG_VNCSERVER_INBUFFER_SIZE, 0);
|
2016-04-21 01:01:48 +02:00
|
|
|
if (nrecvd < 0)
|
|
|
|
{
|
2018-01-31 00:23:10 +01:00
|
|
|
gerr("ERROR: Receive SetEncodings failed: %d\n", (int)nrecvd);
|
|
|
|
return (int)nrecvd;
|
2016-04-21 01:01:48 +02:00
|
|
|
}
|
2016-04-23 18:57:28 +02:00
|
|
|
else if (nrecvd == 0)
|
|
|
|
{
|
2016-06-12 19:11:57 +02:00
|
|
|
gwarn("WARNING: Connection closed\n");
|
2016-04-23 18:57:28 +02:00
|
|
|
return -ECONNABORTED;
|
|
|
|
}
|
2016-04-21 01:01:48 +02:00
|
|
|
|
2016-04-23 18:57:28 +02:00
|
|
|
if (encodings->msgtype == RFB_SETENCODINGS_MSG)
|
2016-04-21 01:01:48 +02:00
|
|
|
{
|
2016-04-21 16:16:33 +02:00
|
|
|
DEBUGASSERT(nrecvd >= SIZEOF_RFB_SETENCODINGS_S(0));
|
2016-04-21 01:01:48 +02:00
|
|
|
|
|
|
|
/* Pick out any mutually supported encodings */
|
|
|
|
|
|
|
|
ret = vnc_client_encodings(session, encodings);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: vnc_set_encodings failed: %d\n", ret);
|
2016-04-21 01:01:48 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
2016-04-20 17:47:02 +02:00
|
|
|
|
|
|
|
session->state = VNCSERVER_CONFIGURED;
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: vnc_client_pixelformat
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* A Client-to-Sever SetPixelFormat message has been received. We need to
|
|
|
|
* immediately switch the output color format that we generate.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* session - An instance of the session structure.
|
2020-01-27 05:31:25 +01:00
|
|
|
* pixelfmt - The pixel from the received SetPixelFormat message
|
2016-04-20 17:47:02 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns zero (OK) on success; a negated errno value on failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int vnc_client_pixelformat(FAR struct vnc_session_s *session,
|
|
|
|
FAR struct rfb_pixelfmt_s *pixelfmt)
|
|
|
|
{
|
2016-04-16 23:59:00 +02:00
|
|
|
if (pixelfmt->truecolor == 0)
|
|
|
|
{
|
|
|
|
/* At present, we support only TrueColor formats */
|
|
|
|
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: No support for palette colors\n");
|
2016-04-16 23:59:00 +02:00
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
2016-04-19 18:10:59 +02:00
|
|
|
if (pixelfmt->bpp == 8 && pixelfmt->depth == 6)
|
|
|
|
{
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Client pixel format: RGB8 2:2:2\n");
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB8_222;
|
|
|
|
session->bpp = 8;
|
|
|
|
session->bigendian = false;
|
2016-04-19 18:10:59 +02:00
|
|
|
}
|
|
|
|
else if (pixelfmt->bpp == 8 && pixelfmt->depth == 8)
|
|
|
|
{
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Client pixel format: RGB8 3:3:2\n");
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB8_332;
|
|
|
|
session->bpp = 8;
|
|
|
|
session->bigendian = false;
|
2016-04-19 18:10:59 +02:00
|
|
|
}
|
|
|
|
else if (pixelfmt->bpp == 16 && pixelfmt->depth == 15)
|
2016-04-16 23:59:00 +02:00
|
|
|
{
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Client pixel format: RGB16 5:5:5\n");
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB16_555;
|
|
|
|
session->bpp = 16;
|
|
|
|
session->bigendian = (pixelfmt->bigendian != 0) ? true : false;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
else if (pixelfmt->bpp == 16 && pixelfmt->depth == 16)
|
|
|
|
{
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Client pixel format: RGB16 5:6:5\n");
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB16_565;
|
|
|
|
session->bpp = 16;
|
|
|
|
session->bigendian = (pixelfmt->bigendian != 0) ? true : false;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
else if (pixelfmt->bpp == 32 && pixelfmt->depth == 24)
|
|
|
|
{
|
2016-06-11 19:59:51 +02:00
|
|
|
ginfo("Client pixel format: RGB32 8:8:8\n");
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB32;
|
|
|
|
session->bpp = 32;
|
|
|
|
session->bigendian = (pixelfmt->bigendian != 0) ? true : false;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
else if (pixelfmt->bpp == 32 && pixelfmt->depth == 32)
|
|
|
|
{
|
2016-04-21 20:18:35 +02:00
|
|
|
session->colorfmt = FB_FMT_RGB32;
|
|
|
|
session->bpp = 32;
|
|
|
|
session->bigendian = (pixelfmt->bigendian != 0) ? true : false;
|
2016-04-16 23:59:00 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* We do not support any other conversions */
|
|
|
|
|
2016-06-11 23:50:49 +02:00
|
|
|
gerr("ERROR: No support for this BPP=%d and depth=%d\n",
|
2016-04-16 23:59:00 +02:00
|
|
|
pixelfmt->bpp, pixelfmt->depth);
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
2016-04-23 18:22:54 +02:00
|
|
|
session->change = true;
|
2016-04-16 23:59:00 +02:00
|
|
|
return OK;
|
2016-04-16 20:50:23 +02:00
|
|
|
}
|