10 #define SET_PIXEL_FORMAT 0
11 #define SET_ENCODINGS 2
12 #define FB_UPDATE_REQUEST 3
14 #define POINTER_EVENT 5
15 #define CLIENT_CUT_TEXT 6
17 #define RFB_BUF_SIZE 64
33 struct server_init_message {
36 struct pixel_format fmt;
41 struct fb_update_req {
57 struct key_event_pkt {
64 struct pointer_event_pkt {
71 struct text_event_pkt {
78 struct update_header {
98 char data[RFB_BUF_SIZE];
102 char next_update_incremental;
103 char update_requested;
105 struct fb_update_req client_interest_area;
114 uint32_t frame_bytes;
117 static struct server_init_message server_info;
119 static void init_server_info() {
120 server_info.name_length = htonl(8);
121 memcpy(server_info.name_string, "NetWatch", 8);
124 static void update_server_info() {
126 outputf("RFB: setting fmt %d", fb->curmode.format);
127 server_info.fb_width = htons(fb->curmode.xres);
128 server_info.fb_height = htons(fb->curmode.yres);
129 switch (fb->curmode.format) {
131 server_info.fmt.bpp = 32;
132 server_info.fmt.depth = 24;
133 server_info.fmt.big_endian = 0;
134 server_info.fmt.true_color = 1;
135 server_info.fmt.red_max = htons(255);
136 server_info.fmt.green_max = htons(255);
137 server_info.fmt.blue_max = htons(255);
138 server_info.fmt.red_shift = 0;
139 server_info.fmt.green_shift = 8;
140 server_info.fmt.blue_shift = 16;
143 outputf("RFB: unknown fb fmt %d", fb->curmode.format);
147 outputf("RFB: fb null");
151 static void send_fsm(struct tcp_pcb *pcb, struct rfb_state *state) {
152 struct update_header hdr;
156 switch (state->send_state) {
159 if (state->update_requested) {
160 outputf("RFB send: update requested");
161 state->update_requested = 0;
162 state->send_state = SST_NEEDS_UPDATE;
167 /* potential FALL THROUGH */
169 case SST_NEEDS_UPDATE:
170 outputf("RFB send: sending header");
172 state->frame_bytes = fb->curmode.xres * fb->curmode.yres * fb->curmode.bytestride;
174 hdr.nrects = htons(1);
177 hdr.width = htons(fb->curmode.xres);
178 hdr.height = htons(fb->curmode.yres);
179 hdr.enctype = htonl(0);
180 tcp_write(pcb, &hdr, sizeof(hdr), TCP_WRITE_FLAG_COPY);
182 state->update_pos = 0;
183 state->send_state = SST_SENDING;
189 unsigned char mbuf[8192 /* XXX magic */];
191 left = state->frame_bytes - state->update_pos;
194 state->send_state = SST_IDLE;
201 memcpy(mbuf, fb->fbaddr + state->update_pos, left); /* It's OK if it becomes smaller later. */
205 err = tcp_write(pcb, mbuf, sndlength, TCP_WRITE_FLAG_COPY /* This is my memory on the stack, thank you very much. */);
206 if (err == ERR_MEM) /* Back down until lwip says we've got space. */
208 } while (err == ERR_MEM && sndlength > 1);
211 /* We'll just give up for now and come back when we have space later. */
212 //outputf("RFB: send error %d", err);
216 state->update_pos += sndlength;
218 if (tcp_sndbuf(pcb) == 0) {
226 if (tcp_output(pcb) != ERR_OK)
228 outputf("RFB: tcp_output bailed in send_fsm?");
232 static err_t rfb_sent(void *arg, struct tcp_pcb *pcb, uint16_t len) {
233 struct rfb_state *state = arg;
234 send_fsm(pcb, state);
238 static void close_conn(struct tcp_pcb *pcb, struct rfb_state *state) {
252 static enum fsm_result recv_fsm(struct tcp_pcb *pcb, struct rfb_state *state) {
256 outputf("RFB FSM: st %d rp %d wp %d", state->state, state->readpos,
259 switch(state->state) {
261 if (state->writepos < 12) return NEEDMORE;
263 if (!strncmp(state->data, "RFB 003.003\n", 12)) {
265 } else if (!strncmp(state->data, "RFB 003.005\n", 12)) {
266 /* Spec states that "RFB 003.005", an incorrect value,
267 * should be treated by the server as 3.3. */
269 } else if (!strncmp(state->data, "RFB 003.007\n", 12)) {
271 } else if (!strncmp(state->data, "RFB 003.008\n", 12)) {
274 outputf("RFB: Negotiation fail");
278 outputf("RFB: Negotiated v3.%d", state->version);
280 state->readpos += 12;
281 state->state = ST_CLIENTINIT;
283 /* We support one security type, currently "none".
284 * Send that and SecurityResult. */
285 if (state->version >= 7) {
286 tcp_write(pcb, "\x01\x01\x00\x00\x00\x00", 6, 0);
288 tcp_write(pcb, "\x01\x00\x00\x00\x00", 5, 0);
296 if (state->version >= 7) {
297 /* Ignore the security type and ClientInit */
298 if (state->writepos < 2) return NEEDMORE;
301 /* Just ClientInit */
302 if (state->writepos < 1) return NEEDMORE;
306 state->state = ST_MAIN;
308 outputf("RFB: Sending server info", state->version);
309 tcp_write(pcb, &server_info, sizeof(server_info), TCP_WRITE_FLAG_COPY);
315 if (state->writepos < 1) return NEEDMORE;
317 outputf("RFB: cmd %d", state->data[0]);
318 switch (state->data[0]) {
320 case SET_PIXEL_FORMAT:
322 if (state->writepos < (sizeof(struct pixel_format) + 4))
324 outputf("RFB: SetPixelFormat");
326 struct pixel_format * new_fmt =
327 (struct pixel_format *)(&state->data[4]);
331 state->readpos += sizeof(struct pixel_format) + 4;
335 if (state->writepos < 4) return NEEDMORE;
337 struct set_encs_req * req = (struct set_encs_req *)state->data;
339 pktsize = sizeof(struct set_encs_req) + (4 * ntohs(req->num));
341 outputf("RFB: SetEncodings [%d]", ntohs(req->num));
342 if (state->writepos < pktsize) return NEEDMORE;
344 for (i = 0; i < ntohs(req->num); i++) {
345 outputf("RFB: Encoding: %d", ntohl(req->encodings[i]));
350 state->readpos += pktsize;
353 case FB_UPDATE_REQUEST:
354 if (state->writepos < sizeof(struct fb_update_req))
356 outputf("RFB: UpdateRequest");
358 state->update_requested = 1;
359 memcpy(&state->client_interest_area, state->data,
360 sizeof(struct fb_update_req));
362 state->readpos += sizeof(struct fb_update_req);
366 if (state->writepos < sizeof(struct key_event_pkt))
372 state->readpos += sizeof(struct key_event_pkt);
376 if (state->writepos < sizeof(struct pointer_event_pkt))
378 outputf("RFB: Pointer");
382 state->readpos += sizeof(struct pointer_event_pkt);
385 case CLIENT_CUT_TEXT:
386 if (state->writepos < sizeof(struct text_event_pkt))
388 outputf("RFB: Cut Text");
390 struct text_event_pkt * pkt =
391 (struct text_event_pkt *)state->data;
393 if (state->writepos < sizeof(struct text_event_pkt)
399 state->readpos += sizeof(struct text_event_pkt)
404 outputf("RFB: Bad command: %d", state->data[0]);
407 outputf("RFB: Bad state");
412 static err_t rfb_recv(void *arg, struct tcp_pcb *pcb,
413 struct pbuf *p, err_t err) {
414 struct rfb_state *state = arg;
419 outputf("RFB: recv err %d", err);
420 /* FIXME do something better here? */
425 outputf("RFB: Connection closed");
426 close_conn(pcb, state);
430 if (p->tot_len > (RFB_BUF_SIZE - state->writepos)) {
432 outputf("RFB: Overflow!");
433 close_conn(pcb, state);
437 outputf("RFB: Processing %d", p->tot_len);
438 pbuf_copy_partial(p, state->data + state->writepos, p->tot_len, 0);
439 state->writepos += p->tot_len;
441 tcp_recved(pcb, p->tot_len);
445 switch (recv_fsm(pcb, state)) {
447 outputf("RFB FSM: blocking");
452 outputf("RFB FSM: ok");
454 /* Kick off a send. */
455 if (state->send_state == SST_IDLE
456 && state->update_requested) {
457 send_fsm(pcb, state);
460 if (state->readpos == state->writepos) {
466 state->data + state->readpos,
467 state->writepos - state->readpos);
472 outputf("RFB: Protocol error");
473 close_conn(pcb, state);
479 static err_t rfb_accept(void *arg, struct tcp_pcb *pcb, err_t err) {
480 struct rfb_state *state;
482 LWIP_UNUSED_ARG(arg);
483 LWIP_UNUSED_ARG(err);
485 state = (struct rfb_state *)mem_malloc(sizeof(struct rfb_state));
487 state->state = ST_BEGIN;
490 state->update_requested = 0;
491 state->send_state = SST_IDLE;
493 /* XXX: update_server_info() should be called from the 64ms timer, and deal
494 * with screen resizes appropriately. */
495 update_server_info();
499 outputf("rfb_accept: out of memory\n");
504 tcp_recv(pcb, rfb_recv);
505 tcp_sent(pcb, rfb_sent);
507 tcp_err(pcb, rfb_err);
508 tcp_poll(pcb, rfb_poll, 2);
510 tcp_write(pcb, "RFB 003.008\n", 12, 0);
522 tcp_bind(pcb, IP_ADDR_ANY, RFB_PORT);
523 pcb = tcp_listen(pcb);
524 tcp_accept(pcb, rfb_accept);