mirror of
https://gitlab.uni-freiburg.de/opensourcevdi/spice
synced 2025-12-27 15:45:54 +00:00
gcc 4.6.0 added "[-Werror=unused-but-set-variable]", this and the next few fixes tend to that. Mostly harmless.
3175 lines
90 KiB
C
3175 lines
90 KiB
C
/* -*- Mode: C; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
|
/*
|
|
Copyright (C) 2009 Red Hat, Inc.
|
|
|
|
This library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
This library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#include <limits.h>
|
|
#include <time.h>
|
|
#include <pthread.h>
|
|
#include <sys/mman.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <ctype.h>
|
|
|
|
#include <openssl/bio.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/err.h>
|
|
|
|
#include "spice.h"
|
|
#include "spice-experimental.h"
|
|
#include "reds.h"
|
|
#include <spice/protocol.h>
|
|
#include <spice/vd_agent.h>
|
|
|
|
#include "inputs_channel.h"
|
|
#include "main_channel.h"
|
|
#include "red_common.h"
|
|
#include "red_dispatcher.h"
|
|
#include "snd_worker.h"
|
|
#include <spice/stats.h>
|
|
#include "stat.h"
|
|
#include "ring.h"
|
|
#include "config.h"
|
|
#include "demarshallers.h"
|
|
#include "marshaller.h"
|
|
#include "generated_marshallers.h"
|
|
#include "server/char_device.h"
|
|
#ifdef USE_TUNNEL
|
|
#include "red_tunnel_worker.h"
|
|
#endif
|
|
#ifdef USE_SMARTCARD
|
|
#include "smartcard.h"
|
|
#endif
|
|
|
|
SpiceCoreInterface *core = NULL;
|
|
static SpiceCharDeviceInstance *vdagent = NULL;
|
|
|
|
#define MIGRATION_NOTIFY_SPICE_KEY "spice_mig_ext"
|
|
|
|
#define REDS_MIG_VERSION 3
|
|
#define REDS_MIG_CONTINUE 1
|
|
#define REDS_MIG_ABORT 2
|
|
#define REDS_MIG_DIFF_VERSION 3
|
|
|
|
#define REDS_TOKENS_TO_SEND 5
|
|
#define REDS_VDI_PORT_NUM_RECEIVE_BUFFS 5
|
|
|
|
static int spice_port = -1;
|
|
static int spice_secure_port = -1;
|
|
static char spice_addr[256];
|
|
static int spice_family = PF_UNSPEC;
|
|
static char *default_renderer = "sw";
|
|
|
|
static int ticketing_enabled = 1; //Ticketing is enabled by default
|
|
static pthread_mutex_t *lock_cs;
|
|
static long *lock_count;
|
|
uint32_t streaming_video = STREAM_VIDEO_FILTER;
|
|
spice_image_compression_t image_compression = SPICE_IMAGE_COMPRESS_AUTO_GLZ;
|
|
spice_wan_compression_t jpeg_state = SPICE_WAN_COMPRESSION_AUTO;
|
|
spice_wan_compression_t zlib_glz_state = SPICE_WAN_COMPRESSION_AUTO;
|
|
#ifdef USE_TUNNEL
|
|
void *red_tunnel = NULL;
|
|
#endif
|
|
int agent_mouse = TRUE;
|
|
|
|
static void openssl_init();
|
|
|
|
#define MIGRATE_TIMEOUT (1000 * 10) /* 10sec */
|
|
#define PING_INTERVAL (1000 * 10)
|
|
#define MM_TIMER_GRANULARITY_MS (1000 / 30)
|
|
#define MM_TIME_DELTA 400 /*ms*/
|
|
#define VDI_PORT_WRITE_RETRY_TIMEOUT 100 /*ms*/
|
|
|
|
|
|
typedef struct TicketAuthentication {
|
|
char password[SPICE_MAX_PASSWORD_LENGTH];
|
|
time_t expiration_time;
|
|
} TicketAuthentication;
|
|
|
|
static TicketAuthentication taTicket;
|
|
|
|
typedef struct TicketInfo {
|
|
RSA *rsa;
|
|
int rsa_size;
|
|
BIGNUM *bn;
|
|
SpiceLinkEncryptedTicket encrypted_ticket;
|
|
} TicketInfo;
|
|
|
|
typedef struct MonitorMode {
|
|
uint32_t x_res;
|
|
uint32_t y_res;
|
|
} MonitorMode;
|
|
|
|
typedef struct VDIReadBuf {
|
|
RingItem link;
|
|
int len;
|
|
uint8_t data[SPICE_AGENT_MAX_DATA_SIZE];
|
|
} VDIReadBuf;
|
|
|
|
enum {
|
|
VDI_PORT_READ_STATE_READ_HADER,
|
|
VDI_PORT_READ_STATE_GET_BUFF,
|
|
VDI_PORT_READ_STATE_READ_DATA,
|
|
};
|
|
|
|
void vdagent_char_device_wakeup(SpiceCharDeviceInstance *sin);
|
|
struct SpiceCharDeviceState vdagent_char_device_state = {
|
|
.wakeup = &vdagent_char_device_wakeup,
|
|
};
|
|
|
|
typedef struct VDIPortState {
|
|
int connected;
|
|
uint32_t plug_generation;
|
|
|
|
uint32_t num_tokens;
|
|
uint32_t num_client_tokens;
|
|
Ring external_bufs;
|
|
Ring internal_bufs;
|
|
Ring write_queue;
|
|
|
|
Ring read_bufs;
|
|
uint32_t read_state;
|
|
uint32_t message_recive_len;
|
|
uint8_t *recive_pos;
|
|
uint32_t recive_len;
|
|
VDIReadBuf *current_read_buf;
|
|
|
|
VDIChunkHeader vdi_chunk_header;
|
|
|
|
int client_agent_started;
|
|
} VDIPortState;
|
|
|
|
#ifdef RED_STATISTICS
|
|
|
|
#define REDS_MAX_STAT_NODES 100
|
|
#define REDS_STAT_SHM_SIZE (sizeof(SpiceStat) + REDS_MAX_STAT_NODES * sizeof(SpiceStatNode))
|
|
|
|
typedef struct RedsStatValue {
|
|
uint32_t value;
|
|
uint32_t min;
|
|
uint32_t max;
|
|
uint32_t average;
|
|
uint32_t count;
|
|
} RedsStatValue;
|
|
|
|
#endif
|
|
|
|
typedef struct RedsMigSpice RedsMigSpice;
|
|
|
|
typedef struct RedsState {
|
|
int listen_socket;
|
|
int secure_listen_socket;
|
|
SpiceWatch *listen_watch;
|
|
SpiceWatch *secure_listen_watch;
|
|
int disconnecting;
|
|
VDIPortState agent_state;
|
|
int pending_mouse_event;
|
|
uint32_t link_id;
|
|
Channel *main_channel;
|
|
|
|
int mig_wait_connect;
|
|
int mig_wait_disconnect;
|
|
int mig_inprogress;
|
|
int mig_target;
|
|
RedsMigSpice *mig_spice;
|
|
int num_of_channels;
|
|
Channel *channels;
|
|
int mouse_mode;
|
|
int is_client_mouse_allowed;
|
|
int dispatcher_allows_client_mouse;
|
|
MonitorMode monitor_mode;
|
|
SpiceTimer *mig_timer;
|
|
SpiceTimer *mm_timer;
|
|
SpiceTimer *vdi_port_write_timer;
|
|
int vdi_port_write_timer_started;
|
|
|
|
TicketAuthentication taTicket;
|
|
SSL_CTX *ctx;
|
|
|
|
#ifdef RED_STATISTICS
|
|
char *stat_shm_name;
|
|
SpiceStat *stat;
|
|
pthread_mutex_t stat_lock;
|
|
RedsStatValue roundtrip_stat;
|
|
SpiceTimer *ping_timer;
|
|
int ping_interval;
|
|
#endif
|
|
int peer_minor_version;
|
|
} RedsState;
|
|
|
|
static RedsState *reds = NULL;
|
|
|
|
typedef struct AsyncRead {
|
|
RedsStreamContext *peer;
|
|
void *opaque;
|
|
uint8_t *now;
|
|
uint8_t *end;
|
|
void (*done)(void *opaque);
|
|
void (*error)(void *opaque, int err);
|
|
} AsyncRead;
|
|
|
|
typedef struct RedLinkInfo {
|
|
RedsStreamContext *peer;
|
|
AsyncRead asyc_read;
|
|
SpiceLinkHeader link_header;
|
|
SpiceLinkMess *link_mess;
|
|
int mess_pos;
|
|
TicketInfo tiTicketing;
|
|
} RedLinkInfo;
|
|
|
|
typedef struct VDIPortBuf VDIPortBuf;
|
|
struct __attribute__ ((__packed__)) VDIPortBuf {
|
|
RingItem link;
|
|
uint8_t *now;
|
|
int write_len;
|
|
void (*free)(VDIPortBuf *buf);
|
|
VDIChunkHeader chunk_header; //start send from &chunk_header
|
|
};
|
|
|
|
typedef struct __attribute__ ((__packed__)) VDAgentExtBuf {
|
|
VDIPortBuf base;
|
|
uint8_t buf[SPICE_AGENT_MAX_DATA_SIZE];
|
|
VDIChunkHeader migrate_overflow;
|
|
} VDAgentExtBuf;
|
|
|
|
typedef struct __attribute__ ((__packed__)) VDInternalBuf {
|
|
VDIPortBuf base;
|
|
VDAgentMessage header;
|
|
union {
|
|
VDAgentMouseState mouse_state;
|
|
}
|
|
u;
|
|
VDIChunkHeader migrate_overflow;
|
|
} VDInternalBuf;
|
|
|
|
typedef struct RedSSLParameters {
|
|
char keyfile_password[256];
|
|
char certs_file[256];
|
|
char private_key_file[256];
|
|
char ca_certificate_file[256];
|
|
char dh_key_file[256];
|
|
char ciphersuite[256];
|
|
} RedSSLParameters;
|
|
|
|
typedef struct ChannelSecurityOptions ChannelSecurityOptions;
|
|
struct ChannelSecurityOptions {
|
|
uint32_t channel_id;
|
|
uint32_t options;
|
|
ChannelSecurityOptions *next;
|
|
};
|
|
|
|
static ChannelSecurityOptions *channels_security = NULL;
|
|
static int default_channel_security =
|
|
SPICE_CHANNEL_SECURITY_NONE | SPICE_CHANNEL_SECURITY_SSL;
|
|
|
|
static RedSSLParameters ssl_parameters;
|
|
|
|
static ChannelSecurityOptions *find_channel_security(int id)
|
|
{
|
|
ChannelSecurityOptions *now = channels_security;
|
|
while (now && now->channel_id != id) {
|
|
now = now->next;
|
|
}
|
|
return now;
|
|
}
|
|
|
|
static void reds_channel_event(RedsStreamContext *peer, int event)
|
|
{
|
|
if (core->base.minor_version < 3 || core->channel_event == NULL)
|
|
return;
|
|
core->channel_event(event, &peer->info);
|
|
}
|
|
|
|
static int reds_write(void *ctx, void *buf, size_t size)
|
|
{
|
|
int return_code;
|
|
int sock = (long)ctx;
|
|
size_t count = size;
|
|
|
|
return_code = write(sock, buf, count);
|
|
|
|
return (return_code);
|
|
}
|
|
|
|
static int reds_read(void *ctx, void *buf, size_t size)
|
|
{
|
|
int return_code;
|
|
int sock = (long)ctx;
|
|
size_t count = size;
|
|
|
|
return_code = read(sock, buf, count);
|
|
|
|
return (return_code);
|
|
}
|
|
|
|
static int reds_free(RedsStreamContext *peer)
|
|
{
|
|
reds_channel_event(peer, SPICE_CHANNEL_EVENT_DISCONNECTED);
|
|
close(peer->socket);
|
|
free(peer);
|
|
return 0;
|
|
}
|
|
|
|
static int reds_ssl_write(void *ctx, void *buf, size_t size)
|
|
{
|
|
int return_code;
|
|
int ssl_error;
|
|
SSL *ssl = ctx;
|
|
|
|
return_code = SSL_write(ssl, buf, size);
|
|
|
|
if (return_code < 0) {
|
|
ssl_error = SSL_get_error(ssl, return_code);
|
|
(void)ssl_error;
|
|
}
|
|
|
|
return (return_code);
|
|
}
|
|
|
|
static int reds_ssl_read(void *ctx, void *buf, size_t size)
|
|
{
|
|
int return_code;
|
|
int ssl_error;
|
|
SSL *ssl = ctx;
|
|
|
|
return_code = SSL_read(ssl, buf, size);
|
|
|
|
if (return_code < 0) {
|
|
ssl_error = SSL_get_error(ssl, return_code);
|
|
(void)ssl_error;
|
|
}
|
|
|
|
return (return_code);
|
|
}
|
|
|
|
static int reds_ssl_writev(void *ctx, const struct iovec *vector, int count)
|
|
{
|
|
int i;
|
|
int n;
|
|
int return_code = 0;
|
|
int ssl_error;
|
|
SSL *ssl = ctx;
|
|
|
|
for (i = 0; i < count; ++i) {
|
|
n = SSL_write(ssl, vector[i].iov_base, vector[i].iov_len);
|
|
if (n <= 0) {
|
|
ssl_error = SSL_get_error(ssl, n);
|
|
(void)ssl_error;
|
|
if (return_code <= 0) {
|
|
return n;
|
|
} else {
|
|
break;
|
|
}
|
|
} else {
|
|
return_code += n;
|
|
}
|
|
}
|
|
|
|
return return_code;
|
|
}
|
|
|
|
static int reds_ssl_free(RedsStreamContext *peer)
|
|
{
|
|
reds_channel_event(peer, SPICE_CHANNEL_EVENT_DISCONNECTED);
|
|
SSL_free(peer->ssl);
|
|
close(peer->socket);
|
|
free(peer);
|
|
return 0;
|
|
}
|
|
|
|
static void __reds_release_link(RedLinkInfo *link)
|
|
{
|
|
ASSERT(link->peer);
|
|
if (link->peer->watch) {
|
|
core->watch_remove(link->peer->watch);
|
|
link->peer->watch = NULL;
|
|
}
|
|
free(link->link_mess);
|
|
BN_free(link->tiTicketing.bn);
|
|
if (link->tiTicketing.rsa) {
|
|
RSA_free(link->tiTicketing.rsa);
|
|
}
|
|
free(link);
|
|
}
|
|
|
|
static inline void reds_release_link(RedLinkInfo *link)
|
|
{
|
|
RedsStreamContext *peer = link->peer;
|
|
__reds_release_link(link);
|
|
peer->cb_free(peer);
|
|
}
|
|
|
|
#ifdef RED_STATISTICS
|
|
|
|
void insert_stat_node(StatNodeRef parent, StatNodeRef ref)
|
|
{
|
|
SpiceStatNode *node = &reds->stat->nodes[ref];
|
|
uint32_t pos = INVALID_STAT_REF;
|
|
uint32_t node_index;
|
|
uint32_t *head;
|
|
SpiceStatNode *n;
|
|
|
|
node->first_child_index = INVALID_STAT_REF;
|
|
head = (parent == INVALID_STAT_REF ? &reds->stat->root_index :
|
|
&reds->stat->nodes[parent].first_child_index);
|
|
node_index = *head;
|
|
while (node_index != INVALID_STAT_REF && (n = &reds->stat->nodes[node_index]) &&
|
|
strcmp(node->name, n->name) > 0) {
|
|
pos = node_index;
|
|
node_index = n->next_sibling_index;
|
|
}
|
|
if (pos == INVALID_STAT_REF) {
|
|
node->next_sibling_index = *head;
|
|
*head = ref;
|
|
} else {
|
|
n = &reds->stat->nodes[pos];
|
|
node->next_sibling_index = n->next_sibling_index;
|
|
n->next_sibling_index = ref;
|
|
}
|
|
}
|
|
|
|
StatNodeRef stat_add_node(StatNodeRef parent, const char *name, int visible)
|
|
{
|
|
StatNodeRef ref;
|
|
SpiceStatNode *node;
|
|
|
|
ASSERT(name && strlen(name) > 0);
|
|
if (strlen(name) >= sizeof(node->name)) {
|
|
return INVALID_STAT_REF;
|
|
}
|
|
pthread_mutex_lock(&reds->stat_lock);
|
|
ref = (parent == INVALID_STAT_REF ? reds->stat->root_index :
|
|
reds->stat->nodes[parent].first_child_index);
|
|
while (ref != INVALID_STAT_REF) {
|
|
node = &reds->stat->nodes[ref];
|
|
if (strcmp(name, node->name)) {
|
|
ref = node->next_sibling_index;
|
|
} else {
|
|
pthread_mutex_unlock(&reds->stat_lock);
|
|
return ref;
|
|
}
|
|
}
|
|
if (reds->stat->num_of_nodes >= REDS_MAX_STAT_NODES || reds->stat == NULL) {
|
|
pthread_mutex_unlock(&reds->stat_lock);
|
|
return INVALID_STAT_REF;
|
|
}
|
|
reds->stat->generation++;
|
|
reds->stat->num_of_nodes++;
|
|
for (ref = 0; ref <= REDS_MAX_STAT_NODES; ref++) {
|
|
node = &reds->stat->nodes[ref];
|
|
if (!(node->flags & SPICE_STAT_NODE_FLAG_ENABLED)) {
|
|
break;
|
|
}
|
|
}
|
|
ASSERT(!(node->flags & SPICE_STAT_NODE_FLAG_ENABLED));
|
|
node->value = 0;
|
|
node->flags = SPICE_STAT_NODE_FLAG_ENABLED | (visible ? SPICE_STAT_NODE_FLAG_VISIBLE : 0);
|
|
strncpy(node->name, name, sizeof(node->name));
|
|
insert_stat_node(parent, ref);
|
|
pthread_mutex_unlock(&reds->stat_lock);
|
|
return ref;
|
|
}
|
|
|
|
void stat_remove(SpiceStatNode *node)
|
|
{
|
|
pthread_mutex_lock(&reds->stat_lock);
|
|
node->flags &= ~SPICE_STAT_NODE_FLAG_ENABLED;
|
|
reds->stat->generation++;
|
|
reds->stat->num_of_nodes--;
|
|
pthread_mutex_unlock(&reds->stat_lock);
|
|
}
|
|
|
|
void stat_remove_node(StatNodeRef ref)
|
|
{
|
|
stat_remove(&reds->stat->nodes[ref]);
|
|
}
|
|
|
|
uint64_t *stat_add_counter(StatNodeRef parent, const char *name, int visible)
|
|
{
|
|
StatNodeRef ref = stat_add_node(parent, name, visible);
|
|
SpiceStatNode *node;
|
|
|
|
if (ref == INVALID_STAT_REF) {
|
|
return NULL;
|
|
}
|
|
node = &reds->stat->nodes[ref];
|
|
node->flags |= SPICE_STAT_NODE_FLAG_VALUE;
|
|
return &node->value;
|
|
}
|
|
|
|
void stat_remove_counter(uint64_t *counter)
|
|
{
|
|
stat_remove((SpiceStatNode *)(counter - offsetof(SpiceStatNode, value)));
|
|
}
|
|
|
|
void reds_update_stat_value(uint32_t value)
|
|
{
|
|
RedsStatValue *stat_value = &reds->roundtrip_stat;
|
|
|
|
stat_value->value = value;
|
|
stat_value->min = (stat_value->count ? MIN(stat_value->min, value) : value);
|
|
stat_value->max = MAX(stat_value->max, value);
|
|
stat_value->average = (stat_value->average * stat_value->count + value) /
|
|
(stat_value->count + 1);
|
|
stat_value->count++;
|
|
}
|
|
|
|
#endif
|
|
|
|
void reds_register_channel(Channel *channel)
|
|
{
|
|
ASSERT(reds);
|
|
channel->next = reds->channels;
|
|
reds->channels = channel;
|
|
reds->num_of_channels++;
|
|
}
|
|
|
|
void reds_unregister_channel(Channel *channel)
|
|
{
|
|
Channel **now = &reds->channels;
|
|
|
|
while (*now) {
|
|
if (*now == channel) {
|
|
*now = channel->next;
|
|
reds->num_of_channels--;
|
|
return;
|
|
}
|
|
now = &(*now)->next;
|
|
}
|
|
red_printf("not found");
|
|
}
|
|
|
|
static Channel *reds_find_channel(uint32_t type, uint32_t id)
|
|
{
|
|
Channel *channel = reds->channels;
|
|
while (channel && !(channel->type == type && channel->id == id)) {
|
|
channel = channel->next;
|
|
}
|
|
return channel;
|
|
}
|
|
|
|
static void reds_shatdown_channels()
|
|
{
|
|
Channel *channel = reds->channels;
|
|
while (channel) {
|
|
channel->shutdown(channel);
|
|
channel = channel->next;
|
|
}
|
|
}
|
|
|
|
static void reds_mig_cleanup()
|
|
{
|
|
if (reds->mig_inprogress) {
|
|
reds->mig_inprogress = FALSE;
|
|
reds->mig_wait_connect = FALSE;
|
|
reds->mig_wait_disconnect = FALSE;
|
|
core->timer_cancel(reds->mig_timer);
|
|
}
|
|
}
|
|
|
|
static void reds_reset_vdp()
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
|
|
while (!ring_is_empty(&state->write_queue)) {
|
|
VDIPortBuf *buf;
|
|
RingItem *item;
|
|
|
|
item = ring_get_tail(&state->write_queue);
|
|
ring_remove(item);
|
|
buf = (VDIPortBuf *)item;
|
|
buf->free(buf);
|
|
}
|
|
state->read_state = VDI_PORT_READ_STATE_READ_HADER;
|
|
state->recive_pos = (uint8_t *)&state->vdi_chunk_header;
|
|
state->recive_len = sizeof(state->vdi_chunk_header);
|
|
state->message_recive_len = 0;
|
|
if (state->current_read_buf) {
|
|
ring_add(&state->read_bufs, &state->current_read_buf->link);
|
|
state->current_read_buf = NULL;
|
|
}
|
|
state->client_agent_started = FALSE;
|
|
}
|
|
|
|
int reds_main_channel_connected()
|
|
{
|
|
return !!reds->main_channel;
|
|
}
|
|
|
|
void reds_disconnect()
|
|
{
|
|
if (!reds_main_channel_connected() || reds->disconnecting) {
|
|
return;
|
|
}
|
|
|
|
red_printf("");
|
|
reds->disconnecting = TRUE;
|
|
reds->link_id = 0;
|
|
|
|
if (reds->agent_state.connected) {
|
|
SpiceCharDeviceInterface *sif;
|
|
sif = SPICE_CONTAINEROF(vdagent->base.sif, SpiceCharDeviceInterface, base);
|
|
reds->agent_state.connected = 0;
|
|
if (sif->state) {
|
|
sif->state(vdagent, reds->agent_state.connected);
|
|
}
|
|
reds_reset_vdp();
|
|
}
|
|
|
|
reds_shatdown_channels();
|
|
reds->main_channel->shutdown(reds->main_channel);
|
|
reds->main_channel = NULL;
|
|
reds_mig_cleanup();
|
|
reds->disconnecting = FALSE;
|
|
}
|
|
|
|
static void reds_mig_disconnect()
|
|
{
|
|
if (reds_main_channel_connected()) {
|
|
reds_disconnect();
|
|
} else {
|
|
reds_mig_cleanup();
|
|
}
|
|
}
|
|
|
|
#ifdef RED_STATISTICS
|
|
|
|
static void do_ping_client(const char *opt, int has_interval, int interval)
|
|
{
|
|
if (!reds_main_channel_connected()) {
|
|
red_printf("not connected to peer");
|
|
return;
|
|
}
|
|
|
|
if (!opt) {
|
|
main_channel_push_ping(reds->main_channel, 0);
|
|
} else if (!strcmp(opt, "on")) {
|
|
if (has_interval && interval > 0) {
|
|
reds->ping_interval = interval * 1000;
|
|
}
|
|
core->timer_start(reds->ping_timer, reds->ping_interval);
|
|
} else if (!strcmp(opt, "off")) {
|
|
core->timer_cancel(reds->ping_timer);
|
|
} else {
|
|
return;
|
|
}
|
|
}
|
|
|
|
static void ping_timer_cb()
|
|
{
|
|
if (!reds_main_channel_connected()) {
|
|
red_printf("not connected to peer, ping off");
|
|
core->timer_cancel(reds->ping_timer);
|
|
return;
|
|
}
|
|
do_ping_client(NULL, 0, 0);
|
|
core->timer_start(reds->ping_timer, reds->ping_interval);
|
|
}
|
|
|
|
#endif
|
|
|
|
int reds_get_mouse_mode(void)
|
|
{
|
|
return reds->mouse_mode;
|
|
}
|
|
|
|
static void reds_set_mouse_mode(uint32_t mode)
|
|
{
|
|
if (reds->mouse_mode == mode) {
|
|
return;
|
|
}
|
|
reds->mouse_mode = mode;
|
|
red_dispatcher_set_mouse_mode(reds->mouse_mode);
|
|
main_channel_push_mouse_mode(reds->main_channel, reds->mouse_mode, reds->is_client_mouse_allowed);
|
|
}
|
|
|
|
int reds_get_agent_mouse(void)
|
|
{
|
|
return agent_mouse;
|
|
}
|
|
|
|
static void reds_update_mouse_mode()
|
|
{
|
|
int allowed = 0;
|
|
int qxl_count = red_dispatcher_qxl_count();
|
|
|
|
if ((agent_mouse && vdagent) || (inputs_has_tablet() && qxl_count == 1)) {
|
|
allowed = reds->dispatcher_allows_client_mouse;
|
|
}
|
|
if (allowed == reds->is_client_mouse_allowed) {
|
|
return;
|
|
}
|
|
reds->is_client_mouse_allowed = allowed;
|
|
if (reds->mouse_mode == SPICE_MOUSE_MODE_CLIENT && !allowed) {
|
|
reds_set_mouse_mode(SPICE_MOUSE_MODE_SERVER);
|
|
return;
|
|
}
|
|
if (reds->main_channel) {
|
|
main_channel_push_mouse_mode(reds->main_channel, reds->mouse_mode,
|
|
reds->is_client_mouse_allowed);
|
|
}
|
|
}
|
|
|
|
static void reds_agent_remove()
|
|
{
|
|
SpiceCharDeviceInstance *sin = vdagent;
|
|
SpiceCharDeviceInterface *sif;
|
|
|
|
ASSERT(reds->agent_state.connected)
|
|
reds->agent_state.connected = 0;
|
|
vdagent = NULL;
|
|
reds_update_mouse_mode();
|
|
|
|
if (!reds_main_channel_connected() || !sin) {
|
|
return;
|
|
}
|
|
|
|
sif = SPICE_CONTAINEROF(sin->base.sif, SpiceCharDeviceInterface, base);
|
|
if (sif->state) {
|
|
sif->state(sin, reds->agent_state.connected);
|
|
}
|
|
|
|
if (reds->mig_target) {
|
|
return;
|
|
}
|
|
|
|
reds_reset_vdp();
|
|
main_channel_push_agent_disconnected(reds->main_channel);
|
|
}
|
|
|
|
static void reds_push_tokens()
|
|
{
|
|
reds->agent_state.num_client_tokens += reds->agent_state.num_tokens;
|
|
ASSERT(reds->agent_state.num_client_tokens <= REDS_AGENT_WINDOW_SIZE);
|
|
main_channel_push_tokens(reds->main_channel, reds->agent_state.num_tokens);
|
|
reds->agent_state.num_tokens = 0;
|
|
}
|
|
|
|
static int write_to_vdi_port();
|
|
|
|
static void vdi_port_write_timer_start()
|
|
{
|
|
if (reds->vdi_port_write_timer_started) {
|
|
return;
|
|
}
|
|
reds->vdi_port_write_timer_started = TRUE;
|
|
core->timer_start(reds->vdi_port_write_timer,
|
|
VDI_PORT_WRITE_RETRY_TIMEOUT);
|
|
}
|
|
|
|
static void vdi_port_write_retry()
|
|
{
|
|
reds->vdi_port_write_timer_started = FALSE;
|
|
write_to_vdi_port();
|
|
}
|
|
|
|
static int write_to_vdi_port()
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
SpiceCharDeviceInterface *sif;
|
|
RingItem *ring_item;
|
|
VDIPortBuf *buf;
|
|
int total = 0;
|
|
int n;
|
|
|
|
if (!reds->agent_state.connected || reds->mig_target) {
|
|
return 0;
|
|
}
|
|
|
|
sif = SPICE_CONTAINEROF(vdagent->base.sif, SpiceCharDeviceInterface, base);
|
|
while (reds->agent_state.connected) {
|
|
if (!(ring_item = ring_get_tail(&state->write_queue))) {
|
|
break;
|
|
}
|
|
buf = (VDIPortBuf *)ring_item;
|
|
n = sif->write(vdagent, buf->now, buf->write_len);
|
|
if (n == 0) {
|
|
break;
|
|
}
|
|
total += n;
|
|
buf->write_len -= n;
|
|
if (!buf->write_len) {
|
|
ring_remove(ring_item);
|
|
buf->free(buf);
|
|
continue;
|
|
}
|
|
buf->now += n;
|
|
}
|
|
// Workaround for lack of proper sif write_possible callback (RHBZ 616772)
|
|
if (ring_item != NULL) {
|
|
vdi_port_write_timer_start();
|
|
}
|
|
return total;
|
|
}
|
|
|
|
static int read_from_vdi_port(void);
|
|
|
|
void vdi_read_buf_release(uint8_t *data, void *opaque)
|
|
{
|
|
VDIReadBuf *buf = (VDIReadBuf *)opaque;
|
|
|
|
ring_add(&reds->agent_state.read_bufs, &buf->link);
|
|
/* read_from_vdi_port() may have never completed because the read_bufs
|
|
ring was empty. So we call it again so it can complete its work if
|
|
necessary. Note since we can be called from read_from_vdi_port ourselves
|
|
this can cause recursion, read_from_vdi_port() contains code protecting
|
|
it against this. */
|
|
while (read_from_vdi_port());
|
|
}
|
|
|
|
static void dispatch_vdi_port_data(int port, VDIReadBuf *buf)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
|
|
switch (port) {
|
|
case VDP_CLIENT_PORT: {
|
|
if (reds->agent_state.connected) {
|
|
main_channel_push_agent_data(reds->main_channel, buf->data, buf->len,
|
|
vdi_read_buf_release, buf);
|
|
} else {
|
|
red_printf("throwing away, no client: %d", buf->len);
|
|
vdi_read_buf_release(buf->data, buf);
|
|
}
|
|
break;
|
|
}
|
|
case VDP_SERVER_PORT:
|
|
ring_add(&state->read_bufs, &buf->link);
|
|
break;
|
|
default:
|
|
ring_add(&state->read_bufs, &buf->link);
|
|
red_printf("invalid port");
|
|
reds_agent_remove();
|
|
}
|
|
}
|
|
|
|
/* Note this function MUST always be called in a while loop until it
|
|
returns 0. This is needed because it can cause new data available events
|
|
and its recursion protection causes those to get lost. Calling it until
|
|
it returns 0 ensures that all data has been consumed. */
|
|
static int read_from_vdi_port(void)
|
|
{
|
|
/* There are 2 scenarios where we can get called recursively:
|
|
1) spice-vmc vmc_read triggering flush of throttled data, recalling us
|
|
2) the buf we push to the client may be send immediately without
|
|
blocking, in which case its free function will recall us
|
|
This messes up the state machine, so ignore recursive calls.
|
|
This is why we always must be called in a loop. */
|
|
static int inside_call = 0;
|
|
int quit_loop = 0;
|
|
VDIPortState *state = &reds->agent_state;
|
|
SpiceCharDeviceInterface *sif;
|
|
VDIReadBuf *dispatch_buf;
|
|
int total = 0;
|
|
int n;
|
|
|
|
if (inside_call) {
|
|
return 0;
|
|
}
|
|
inside_call = 1;
|
|
|
|
if (reds->mig_target || !vdagent) {
|
|
// discard data only if we are migrating or vdagent has not been
|
|
// initialized.
|
|
inside_call = 0;
|
|
return 0;
|
|
}
|
|
|
|
sif = SPICE_CONTAINEROF(vdagent->base.sif, SpiceCharDeviceInterface, base);
|
|
while (!quit_loop) {
|
|
switch (state->read_state) {
|
|
case VDI_PORT_READ_STATE_READ_HADER:
|
|
n = sif->read(vdagent, state->recive_pos, state->recive_len);
|
|
if (!n) {
|
|
quit_loop = 1;
|
|
break;
|
|
}
|
|
total += n;
|
|
if ((state->recive_len -= n)) {
|
|
state->recive_pos += n;
|
|
quit_loop = 1;
|
|
break;
|
|
}
|
|
state->message_recive_len = state->vdi_chunk_header.size;
|
|
state->read_state = VDI_PORT_READ_STATE_GET_BUFF;
|
|
case VDI_PORT_READ_STATE_GET_BUFF: {
|
|
RingItem *item;
|
|
|
|
if (!(item = ring_get_head(&state->read_bufs))) {
|
|
quit_loop = 1;
|
|
break;
|
|
}
|
|
|
|
ring_remove(item);
|
|
state->current_read_buf = (VDIReadBuf *)item;
|
|
state->recive_pos = state->current_read_buf->data;
|
|
state->recive_len = MIN(state->message_recive_len,
|
|
sizeof(state->current_read_buf->data));
|
|
state->current_read_buf->len = state->recive_len;
|
|
state->message_recive_len -= state->recive_len;
|
|
state->read_state = VDI_PORT_READ_STATE_READ_DATA;
|
|
}
|
|
case VDI_PORT_READ_STATE_READ_DATA:
|
|
n = sif->read(vdagent, state->recive_pos, state->recive_len);
|
|
if (!n) {
|
|
quit_loop = 1;
|
|
break;
|
|
}
|
|
total += n;
|
|
if ((state->recive_len -= n)) {
|
|
state->recive_pos += n;
|
|
break;
|
|
}
|
|
dispatch_buf = state->current_read_buf;
|
|
state->current_read_buf = NULL;
|
|
state->recive_pos = NULL;
|
|
if (state->message_recive_len == 0) {
|
|
state->read_state = VDI_PORT_READ_STATE_READ_HADER;
|
|
state->recive_pos = (uint8_t *)&state->vdi_chunk_header;
|
|
state->recive_len = sizeof(state->vdi_chunk_header);
|
|
} else {
|
|
state->read_state = VDI_PORT_READ_STATE_GET_BUFF;
|
|
}
|
|
dispatch_vdi_port_data(state->vdi_chunk_header.port, dispatch_buf);
|
|
}
|
|
}
|
|
inside_call = 0;
|
|
return total;
|
|
}
|
|
|
|
void vdagent_char_device_wakeup(SpiceCharDeviceInstance *sin)
|
|
{
|
|
while (read_from_vdi_port());
|
|
}
|
|
|
|
int reds_has_vdagent(void)
|
|
{
|
|
return !!vdagent;
|
|
}
|
|
|
|
void reds_handle_agent_mouse_event(const VDAgentMouseState *mouse_state)
|
|
{
|
|
RingItem *ring_item;
|
|
VDInternalBuf *buf;
|
|
|
|
if (!inputs_inited()) {
|
|
return;
|
|
}
|
|
if (reds->mig_target || !(ring_item = ring_get_head(&reds->agent_state.internal_bufs))) {
|
|
reds->pending_mouse_event = TRUE;
|
|
vdi_port_write_timer_start();
|
|
return;
|
|
}
|
|
reds->pending_mouse_event = FALSE;
|
|
ring_remove(ring_item);
|
|
buf = (VDInternalBuf *)ring_item;
|
|
buf->base.now = (uint8_t *)&buf->base.chunk_header;
|
|
buf->base.write_len = sizeof(VDIChunkHeader) + sizeof(VDAgentMessage) +
|
|
sizeof(VDAgentMouseState);
|
|
buf->u.mouse_state = *mouse_state;
|
|
ring_add(&reds->agent_state.write_queue, &buf->base.link);
|
|
write_to_vdi_port();
|
|
}
|
|
|
|
static void add_token()
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
|
|
if (++state->num_tokens == REDS_TOKENS_TO_SEND) {
|
|
reds_push_tokens();
|
|
}
|
|
}
|
|
|
|
int reds_num_of_channels()
|
|
{
|
|
return reds ? reds->num_of_channels : 0;
|
|
}
|
|
|
|
void reds_fill_channels(SpiceMsgChannels *channels_info)
|
|
{
|
|
Channel *channel;
|
|
int i;
|
|
|
|
channels_info->num_of_channels = reds->num_of_channels;
|
|
channel = reds->channels;
|
|
for (i = 0; i < reds->num_of_channels; i++) {
|
|
ASSERT(channel);
|
|
channels_info->channels[i].type = channel->type;
|
|
channels_info->channels[i].id = channel->id;
|
|
channel = channel->next;
|
|
}
|
|
}
|
|
|
|
void reds_on_main_agent_start()
|
|
{
|
|
reds->agent_state.client_agent_started = TRUE;
|
|
}
|
|
|
|
void reds_on_main_agent_data(void *message, size_t size)
|
|
{
|
|
RingItem *ring_item;
|
|
VDAgentExtBuf *buf;
|
|
|
|
if (!reds->agent_state.num_client_tokens) {
|
|
red_printf("token violation");
|
|
reds_disconnect();
|
|
return;
|
|
}
|
|
--reds->agent_state.num_client_tokens;
|
|
|
|
if (!vdagent) {
|
|
add_token();
|
|
return;
|
|
}
|
|
|
|
if (!reds->agent_state.client_agent_started) {
|
|
red_printf("SPICE_MSGC_MAIN_AGENT_DATA race");
|
|
add_token();
|
|
return;
|
|
}
|
|
|
|
if (size > SPICE_AGENT_MAX_DATA_SIZE) {
|
|
red_printf("invalid agent message");
|
|
reds_disconnect();
|
|
return;
|
|
}
|
|
|
|
if (!(ring_item = ring_get_head(&reds->agent_state.external_bufs))) {
|
|
red_printf("no agent free bufs");
|
|
reds_disconnect();
|
|
return;
|
|
}
|
|
ring_remove(ring_item);
|
|
buf = (VDAgentExtBuf *)ring_item;
|
|
buf->base.now = (uint8_t *)&buf->base.chunk_header.port;
|
|
buf->base.write_len = size + sizeof(VDIChunkHeader);
|
|
buf->base.chunk_header.size = size;
|
|
memcpy(buf->buf, message, size);
|
|
ring_add(&reds->agent_state.write_queue, ring_item);
|
|
write_to_vdi_port();
|
|
}
|
|
|
|
void reds_on_main_migrate_connected()
|
|
{
|
|
if (reds->mig_wait_connect) {
|
|
reds_mig_cleanup();
|
|
}
|
|
}
|
|
|
|
void reds_on_main_migrate_connect_error()
|
|
{
|
|
if (reds->mig_wait_connect) {
|
|
reds_mig_cleanup();
|
|
}
|
|
}
|
|
|
|
void reds_on_main_mouse_mode_request(void *message, size_t size)
|
|
{
|
|
switch (((SpiceMsgcMainMouseModeRequest *)message)->mode) {
|
|
case SPICE_MOUSE_MODE_CLIENT:
|
|
if (reds->is_client_mouse_allowed) {
|
|
reds_set_mouse_mode(SPICE_MOUSE_MODE_CLIENT);
|
|
} else {
|
|
red_printf("client mouse is disabled");
|
|
}
|
|
break;
|
|
case SPICE_MOUSE_MODE_SERVER:
|
|
reds_set_mouse_mode(SPICE_MOUSE_MODE_SERVER);
|
|
break;
|
|
default:
|
|
red_printf("unsupported mouse mode");
|
|
}
|
|
}
|
|
|
|
#define MAIN_CHANNEL_MIG_DATA_VERSION 1
|
|
|
|
typedef struct WriteQueueInfo {
|
|
uint32_t port;
|
|
uint32_t len;
|
|
} WriteQueueInfo;
|
|
|
|
void reds_marshall_migrate_data_item(SpiceMarshaller *m, MainMigrateData *data)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
int buf_index;
|
|
RingItem *now;
|
|
|
|
data->version = MAIN_CHANNEL_MIG_DATA_VERSION;
|
|
|
|
data->agent_connected = !!state->connected;
|
|
data->client_agent_started = state->client_agent_started;
|
|
data->num_client_tokens = state->num_client_tokens;
|
|
data->send_tokens = ~0;
|
|
|
|
data->read_state = state->read_state;
|
|
data->vdi_chunk_header = state->vdi_chunk_header;
|
|
data->recive_len = state->recive_len;
|
|
data->message_recive_len = state->message_recive_len;
|
|
|
|
if (state->current_read_buf) {
|
|
data->read_buf_len = state->current_read_buf->len;
|
|
|
|
if (data->read_buf_len - data->recive_len) {
|
|
spice_marshaller_add_ref(m,
|
|
state->current_read_buf->data,
|
|
data->read_buf_len - data->recive_len);
|
|
}
|
|
} else {
|
|
data->read_buf_len = 0;
|
|
}
|
|
|
|
now = &state->write_queue;
|
|
data->write_queue_size = 0;
|
|
while ((now = ring_prev(&state->write_queue, now))) {
|
|
data->write_queue_size++;
|
|
}
|
|
if (data->write_queue_size) {
|
|
WriteQueueInfo *queue_info;
|
|
|
|
queue_info = (WriteQueueInfo *)
|
|
spice_marshaller_reserve_space(m,
|
|
data->write_queue_size * sizeof(queue_info[0]));
|
|
|
|
buf_index = 0;
|
|
now = &state->write_queue;
|
|
while ((now = ring_prev(&state->write_queue, now))) {
|
|
VDIPortBuf *buf = (VDIPortBuf *)now;
|
|
queue_info[buf_index].port = buf->chunk_header.port;
|
|
queue_info[buf_index++].len = buf->write_len;
|
|
spice_marshaller_add_ref(m, buf->now, buf->write_len);
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
static int reds_main_channel_restore_vdi_read_state(MainMigrateData *data, uint8_t **in_pos,
|
|
uint8_t *end)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
uint8_t *pos = *in_pos;
|
|
RingItem *ring_item;
|
|
|
|
state->read_state = data->read_state;
|
|
state->vdi_chunk_header = data->vdi_chunk_header;
|
|
state->recive_len = data->recive_len;
|
|
state->message_recive_len = data->message_recive_len;
|
|
|
|
switch (state->read_state) {
|
|
case VDI_PORT_READ_STATE_READ_HADER:
|
|
if (data->read_buf_len) {
|
|
red_printf("unexpected receive buf");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
state->recive_pos = (uint8_t *)(&state->vdi_chunk_header + 1) - state->recive_len;
|
|
break;
|
|
case VDI_PORT_READ_STATE_GET_BUFF:
|
|
if (state->message_recive_len > state->vdi_chunk_header.size) {
|
|
red_printf("invalid message receive len");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
if (data->read_buf_len) {
|
|
red_printf("unexpected receive buf");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
break;
|
|
case VDI_PORT_READ_STATE_READ_DATA: {
|
|
VDIReadBuf *buff;
|
|
uint32_t n;
|
|
|
|
if (!data->read_buf_len) {
|
|
red_printf("read state and read_buf_len == 0");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
if (state->message_recive_len > state->vdi_chunk_header.size) {
|
|
red_printf("invalid message receive len");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
if (!(ring_item = ring_get_head(&state->read_bufs))) {
|
|
red_printf("get read buf failed");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
ring_remove(ring_item);
|
|
buff = state->current_read_buf = (VDIReadBuf *)ring_item;
|
|
buff->len = data->read_buf_len;
|
|
n = buff->len - state->recive_len;
|
|
if (buff->len > SPICE_AGENT_MAX_DATA_SIZE || n > SPICE_AGENT_MAX_DATA_SIZE) {
|
|
red_printf("bad read position");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
memcpy(buff->data, pos, n);
|
|
pos += n;
|
|
state->recive_pos = buff->data + n;
|
|
break;
|
|
}
|
|
default:
|
|
red_printf("invalid read state");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
*in_pos = pos;
|
|
return TRUE;
|
|
}
|
|
|
|
static void free_tmp_internal_buf(VDIPortBuf *buf)
|
|
{
|
|
free(buf);
|
|
}
|
|
|
|
static int reds_main_channel_restore_vdi_wqueue(MainMigrateData *data, uint8_t *pos, uint8_t *end)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
WriteQueueInfo *inf;
|
|
WriteQueueInfo *inf_end;
|
|
RingItem *ring_item;
|
|
|
|
if (!data->write_queue_size) {
|
|
return TRUE;
|
|
}
|
|
|
|
inf = (WriteQueueInfo *)pos;
|
|
inf_end = inf + data->write_queue_size;
|
|
pos = (uint8_t *)inf_end;
|
|
if (pos > end) {
|
|
red_printf("access violation");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
for (; inf < inf_end; inf++) {
|
|
if (pos + inf->len > end) {
|
|
red_printf("access violation");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
if (inf->port == VDP_SERVER_PORT) {
|
|
VDInternalBuf *buf;
|
|
|
|
if (inf->len > sizeof(*buf) - SPICE_OFFSETOF(VDInternalBuf, header)) {
|
|
red_printf("bad buffer len");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
buf = spice_new(VDInternalBuf, 1);
|
|
ring_item_init(&buf->base.link);
|
|
buf->base.free = free_tmp_internal_buf;
|
|
buf->base.now = (uint8_t *)&buf->base.chunk_header;
|
|
buf->base.write_len = inf->len;
|
|
memcpy(buf->base.now, pos, buf->base.write_len);
|
|
ring_add(&reds->agent_state.write_queue, &buf->base.link);
|
|
} else if (inf->port == VDP_CLIENT_PORT) {
|
|
VDAgentExtBuf *buf;
|
|
|
|
state->num_tokens--;
|
|
if (inf->len > sizeof(*buf) - SPICE_OFFSETOF(VDAgentExtBuf, buf)) {
|
|
red_printf("bad buffer len");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
if (!(ring_item = ring_get_head(&reds->agent_state.external_bufs))) {
|
|
red_printf("no external buff");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
ring_remove(ring_item);
|
|
buf = (VDAgentExtBuf *)ring_item;
|
|
memcpy(&buf->buf, pos, inf->len);
|
|
buf->base.now = (uint8_t *)buf->buf;
|
|
buf->base.write_len = inf->len;
|
|
ring_add(&reds->agent_state.write_queue, &buf->base.link);
|
|
} else {
|
|
red_printf("invalid data");
|
|
reds_disconnect();
|
|
return FALSE;
|
|
}
|
|
pos += inf->len;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
void reds_on_main_receive_migrate_data(MainMigrateData *data, uint8_t *end)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
uint8_t *pos;
|
|
|
|
if (data->version != MAIN_CHANNEL_MIG_DATA_VERSION) {
|
|
red_printf("version mismatch");
|
|
reds_disconnect();
|
|
return;
|
|
}
|
|
|
|
state->num_client_tokens = data->num_client_tokens;
|
|
ASSERT(state->num_client_tokens + data->write_queue_size <= REDS_AGENT_WINDOW_SIZE +
|
|
REDS_NUM_INTERNAL_AGENT_MESSAGES);
|
|
state->num_tokens = REDS_AGENT_WINDOW_SIZE - state->num_client_tokens;
|
|
|
|
if (!data->agent_connected) {
|
|
if (state->connected) {
|
|
main_channel_push_agent_connected(reds->main_channel);
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (!state->connected) {
|
|
main_channel_push_agent_disconnected(reds->main_channel);
|
|
return;
|
|
}
|
|
|
|
if (state->plug_generation > 1) {
|
|
main_channel_push_agent_disconnected(reds->main_channel);
|
|
main_channel_push_agent_connected(reds->main_channel);
|
|
return;
|
|
}
|
|
|
|
state->client_agent_started = data->client_agent_started;
|
|
|
|
pos = (uint8_t *)(data + 1);
|
|
|
|
if (!reds_main_channel_restore_vdi_read_state(data, &pos, end)) {
|
|
return;
|
|
}
|
|
|
|
reds_main_channel_restore_vdi_wqueue(data, pos, end);
|
|
ASSERT(state->num_client_tokens + state->num_tokens == REDS_AGENT_WINDOW_SIZE);
|
|
|
|
reds->mig_target = FALSE;
|
|
while (write_to_vdi_port() || read_from_vdi_port());
|
|
}
|
|
|
|
static int sync_write(RedsStreamContext *peer, void *in_buf, size_t n)
|
|
{
|
|
uint8_t *buf = (uint8_t *)in_buf;
|
|
while (n) {
|
|
int now = peer->cb_write(peer->ctx, buf, n);
|
|
if (now <= 0) {
|
|
if (now == -1 && (errno == EINTR || errno == EAGAIN)) {
|
|
continue;
|
|
}
|
|
return FALSE;
|
|
}
|
|
n -= now;
|
|
buf += now;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static int reds_send_link_ack(RedLinkInfo *link)
|
|
{
|
|
SpiceLinkHeader header;
|
|
SpiceLinkReply ack;
|
|
Channel *channel;
|
|
BUF_MEM *bmBuf;
|
|
BIO *bio;
|
|
int ret;
|
|
|
|
header.magic = SPICE_MAGIC;
|
|
header.size = sizeof(ack);
|
|
header.major_version = SPICE_VERSION_MAJOR;
|
|
header.minor_version = SPICE_VERSION_MINOR;
|
|
|
|
ack.error = SPICE_LINK_ERR_OK;
|
|
|
|
if ((channel = reds_find_channel(link->link_mess->channel_type, 0))) {
|
|
ack.num_common_caps = channel->num_common_caps;
|
|
ack.num_channel_caps = channel->num_caps;
|
|
header.size += (ack.num_common_caps + ack.num_channel_caps) * sizeof(uint32_t);
|
|
} else {
|
|
ack.num_common_caps = 0;
|
|
ack.num_channel_caps = 0;
|
|
}
|
|
ack.caps_offset = sizeof(SpiceLinkReply);
|
|
|
|
if (!(link->tiTicketing.rsa = RSA_new())) {
|
|
red_printf("RSA nes failed");
|
|
return FALSE;
|
|
}
|
|
|
|
if (!(bio = BIO_new(BIO_s_mem()))) {
|
|
red_printf("BIO new failed");
|
|
return FALSE;
|
|
}
|
|
|
|
RSA_generate_key_ex(link->tiTicketing.rsa, SPICE_TICKET_KEY_PAIR_LENGTH, link->tiTicketing.bn,
|
|
NULL);
|
|
link->tiTicketing.rsa_size = RSA_size(link->tiTicketing.rsa);
|
|
|
|
i2d_RSA_PUBKEY_bio(bio, link->tiTicketing.rsa);
|
|
BIO_get_mem_ptr(bio, &bmBuf);
|
|
memcpy(ack.pub_key, bmBuf->data, sizeof(ack.pub_key));
|
|
|
|
ret = sync_write(link->peer, &header, sizeof(header)) && sync_write(link->peer, &ack,
|
|
sizeof(ack));
|
|
if (channel) {
|
|
ret = ret && sync_write(link->peer, channel->common_caps,
|
|
channel->num_common_caps * sizeof(uint32_t)) &&
|
|
sync_write(link->peer, channel->caps, channel->num_caps * sizeof(uint32_t));
|
|
}
|
|
BIO_free(bio);
|
|
return ret;
|
|
}
|
|
|
|
static int reds_send_link_error(RedLinkInfo *link, uint32_t error)
|
|
{
|
|
SpiceLinkHeader header;
|
|
SpiceLinkReply reply;
|
|
|
|
header.magic = SPICE_MAGIC;
|
|
header.size = sizeof(reply);
|
|
header.major_version = SPICE_VERSION_MAJOR;
|
|
header.minor_version = SPICE_VERSION_MINOR;
|
|
memset(&reply, 0, sizeof(reply));
|
|
reply.error = error;
|
|
return sync_write(link->peer, &header, sizeof(header)) && sync_write(link->peer, &reply,
|
|
sizeof(reply));
|
|
}
|
|
|
|
static void reds_show_new_channel(RedLinkInfo *link, int connection_id)
|
|
{
|
|
red_printf("channel %d:%d, connected successfully, over %s link",
|
|
link->link_mess->channel_type,
|
|
link->link_mess->channel_id,
|
|
link->peer->ssl == NULL ? "Non Secure" : "Secure");
|
|
/* add info + send event */
|
|
if (link->peer->ssl) {
|
|
link->peer->info.flags |= SPICE_CHANNEL_EVENT_FLAG_TLS;
|
|
}
|
|
link->peer->info.connection_id = connection_id;
|
|
link->peer->info.type = link->link_mess->channel_type;
|
|
link->peer->info.id = link->link_mess->channel_id;
|
|
reds_channel_event(link->peer, SPICE_CHANNEL_EVENT_INITIALIZED);
|
|
}
|
|
|
|
static void reds_send_link_result(RedLinkInfo *link, uint32_t error)
|
|
{
|
|
sync_write(link->peer, &error, sizeof(error));
|
|
}
|
|
|
|
// TODO: now that main is a separate channel this should
|
|
// actually be joined with reds_handle_other_links, ebcome reds_handle_link
|
|
static void reds_handle_main_link(RedLinkInfo *link)
|
|
{
|
|
RedsStreamContext *peer;
|
|
SpiceLinkMess *link_mess;
|
|
uint32_t *caps;
|
|
uint32_t connection_id;
|
|
|
|
red_printf("");
|
|
link_mess = link->link_mess;
|
|
reds_disconnect();
|
|
|
|
if (!link_mess->connection_id) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_OK);
|
|
while((connection_id = rand()) == 0);
|
|
reds->agent_state.num_tokens = 0;
|
|
memcpy(&(reds->taTicket), &taTicket, sizeof(reds->taTicket));
|
|
reds->mig_target = FALSE;
|
|
} else {
|
|
if (link_mess->connection_id != reds->link_id) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_BAD_CONNECTION_ID);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
reds_send_link_result(link, SPICE_LINK_ERR_OK);
|
|
connection_id = link_mess->connection_id;
|
|
reds->mig_target = TRUE;
|
|
}
|
|
|
|
reds->link_id = connection_id;
|
|
reds->mig_inprogress = FALSE;
|
|
reds->mig_wait_connect = FALSE;
|
|
reds->mig_wait_disconnect = FALSE;
|
|
|
|
reds_show_new_channel(link, connection_id);
|
|
peer = link->peer;
|
|
link->link_mess = NULL;
|
|
__reds_release_link(link);
|
|
caps = (uint32_t *)((uint8_t *)link_mess + link_mess->caps_offset);
|
|
reds->main_channel = main_channel_init();
|
|
reds->main_channel->link(reds->main_channel, peer, reds->mig_target, link_mess->num_common_caps,
|
|
link_mess->num_common_caps ? caps : NULL, link_mess->num_channel_caps,
|
|
link_mess->num_channel_caps ? caps + link_mess->num_common_caps : NULL);
|
|
free(link_mess);
|
|
|
|
if (vdagent) {
|
|
SpiceCharDeviceInterface *sif;
|
|
sif = SPICE_CONTAINEROF(vdagent->base.sif, SpiceCharDeviceInterface, base);
|
|
reds->agent_state.connected = 1;
|
|
if (sif->state) {
|
|
sif->state(vdagent, reds->agent_state.connected);
|
|
}
|
|
reds->agent_state.plug_generation++;
|
|
}
|
|
|
|
if (!reds->mig_target) {
|
|
reds->agent_state.num_client_tokens = REDS_AGENT_WINDOW_SIZE;
|
|
main_channel_push_init(reds->main_channel, connection_id, red_dispatcher_count(),
|
|
reds->mouse_mode, reds->is_client_mouse_allowed,
|
|
reds_get_mm_time() - MM_TIME_DELTA,
|
|
red_dispatcher_qxl_ram_size());
|
|
|
|
main_channel_start_net_test(reds->main_channel);
|
|
/* Now that we have a client, forward any pending agent data */
|
|
while (read_from_vdi_port());
|
|
}
|
|
}
|
|
|
|
#define RED_MOUSE_STATE_TO_LOCAL(state) \
|
|
((state & SPICE_MOUSE_BUTTON_MASK_LEFT) | \
|
|
((state & SPICE_MOUSE_BUTTON_MASK_MIDDLE) << 1) | \
|
|
((state & SPICE_MOUSE_BUTTON_MASK_RIGHT) >> 1))
|
|
|
|
#define RED_MOUSE_BUTTON_STATE_TO_AGENT(state) \
|
|
(((state & SPICE_MOUSE_BUTTON_MASK_LEFT) ? VD_AGENT_LBUTTON_MASK : 0) | \
|
|
((state & SPICE_MOUSE_BUTTON_MASK_MIDDLE) ? VD_AGENT_MBUTTON_MASK : 0) | \
|
|
((state & SPICE_MOUSE_BUTTON_MASK_RIGHT) ? VD_AGENT_RBUTTON_MASK : 0))
|
|
|
|
void reds_set_client_mouse_allowed(int is_client_mouse_allowed, int x_res, int y_res)
|
|
{
|
|
reds->monitor_mode.x_res = x_res;
|
|
reds->monitor_mode.y_res = y_res;
|
|
reds->dispatcher_allows_client_mouse = is_client_mouse_allowed;
|
|
reds_update_mouse_mode();
|
|
if (reds->is_client_mouse_allowed && inputs_has_tablet()) {
|
|
inputs_set_tablet_logical_size(reds->monitor_mode.x_res, reds->monitor_mode.y_res);
|
|
}
|
|
}
|
|
|
|
static void openssl_init(RedLinkInfo *link)
|
|
{
|
|
unsigned long f4 = RSA_F4;
|
|
link->tiTicketing.bn = BN_new();
|
|
|
|
if (!link->tiTicketing.bn) {
|
|
red_error("OpenSSL BIGNUMS alloc failed");
|
|
}
|
|
|
|
BN_set_word(link->tiTicketing.bn, f4);
|
|
}
|
|
|
|
static void reds_handle_other_links(RedLinkInfo *link)
|
|
{
|
|
Channel *channel;
|
|
RedsStreamContext *peer;
|
|
SpiceLinkMess *link_mess;
|
|
uint32_t *caps;
|
|
|
|
link_mess = link->link_mess;
|
|
|
|
if (!reds->link_id || reds->link_id != link_mess->connection_id) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_BAD_CONNECTION_ID);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
if (!(channel = reds_find_channel(link_mess->channel_type,
|
|
link_mess->channel_id))) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_CHANNEL_NOT_AVAILABLE);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
reds_send_link_result(link, SPICE_LINK_ERR_OK);
|
|
reds_show_new_channel(link, reds->link_id);
|
|
if (link_mess->channel_type == SPICE_CHANNEL_INPUTS && !link->peer->ssl) {
|
|
char *mess = "keyboard channel is insecure";
|
|
const int mess_len = strlen(mess);
|
|
main_channel_push_notify(reds->main_channel, (uint8_t*)mess, mess_len);
|
|
}
|
|
peer = link->peer;
|
|
link->link_mess = NULL;
|
|
__reds_release_link(link);
|
|
caps = (uint32_t *)((uint8_t *)link_mess + link_mess->caps_offset);
|
|
channel->link(channel, peer, reds->mig_target, link_mess->num_common_caps,
|
|
link_mess->num_common_caps ? caps : NULL, link_mess->num_channel_caps,
|
|
link_mess->num_channel_caps ? caps + link_mess->num_common_caps : NULL);
|
|
free(link_mess);
|
|
}
|
|
|
|
static void reds_handle_ticket(void *opaque)
|
|
{
|
|
RedLinkInfo *link = (RedLinkInfo *)opaque;
|
|
char password[SPICE_MAX_PASSWORD_LENGTH];
|
|
time_t ltime;
|
|
|
|
//todo: use monotonic time
|
|
time(<ime);
|
|
RSA_private_decrypt(link->tiTicketing.rsa_size,
|
|
link->tiTicketing.encrypted_ticket.encrypted_data,
|
|
(unsigned char *)password, link->tiTicketing.rsa, RSA_PKCS1_OAEP_PADDING);
|
|
|
|
if (ticketing_enabled) {
|
|
int expired = !link->link_mess->connection_id && taTicket.expiration_time < ltime;
|
|
char *actual_sever_pass = link->link_mess->connection_id ? reds->taTicket.password :
|
|
taTicket.password;
|
|
if (strlen(actual_sever_pass) == 0) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_PERMISSION_DENIED);
|
|
red_printf("Ticketing is enabled, but no password is set. "
|
|
"please set a ticket first");
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
if (expired || strncmp(password, actual_sever_pass, SPICE_MAX_PASSWORD_LENGTH) != 0) {
|
|
reds_send_link_result(link, SPICE_LINK_ERR_PERMISSION_DENIED);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
}
|
|
if (link->link_mess->channel_type == SPICE_CHANNEL_MAIN) {
|
|
reds_handle_main_link(link);
|
|
} else {
|
|
reds_handle_other_links(link);
|
|
}
|
|
}
|
|
|
|
static inline void async_read_clear_handlers(AsyncRead *obj)
|
|
{
|
|
if (!obj->peer->watch) {
|
|
return;
|
|
}
|
|
core->watch_remove(obj->peer->watch);
|
|
obj->peer->watch = NULL;
|
|
}
|
|
|
|
static void async_read_handler(int fd, int event, void *data)
|
|
{
|
|
AsyncRead *obj = (AsyncRead *)data;
|
|
|
|
for (;;) {
|
|
int n = obj->end - obj->now;
|
|
|
|
ASSERT(n > 0);
|
|
if ((n = obj->peer->cb_read(obj->peer->ctx, obj->now, n)) <= 0) {
|
|
if (n < 0) {
|
|
switch (errno) {
|
|
case EAGAIN:
|
|
if (!obj->peer->watch) {
|
|
obj->peer->watch = core->watch_add(obj->peer->socket,
|
|
SPICE_WATCH_EVENT_READ,
|
|
async_read_handler, obj);
|
|
}
|
|
return;
|
|
case EINTR:
|
|
break;
|
|
default:
|
|
async_read_clear_handlers(obj);
|
|
obj->error(obj->opaque, errno);
|
|
return;
|
|
}
|
|
} else {
|
|
async_read_clear_handlers(obj);
|
|
obj->error(obj->opaque, 0);
|
|
return;
|
|
}
|
|
} else {
|
|
obj->now += n;
|
|
if (obj->now == obj->end) {
|
|
async_read_clear_handlers(obj);
|
|
obj->done(obj->opaque);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static int reds_security_check(RedLinkInfo *link)
|
|
{
|
|
ChannelSecurityOptions *security_option = find_channel_security(link->link_mess->channel_type);
|
|
uint32_t security = security_option ? security_option->options : default_channel_security;
|
|
return (link->peer->ssl && (security & SPICE_CHANNEL_SECURITY_SSL)) ||
|
|
(!link->peer->ssl && (security & SPICE_CHANNEL_SECURITY_NONE));
|
|
}
|
|
|
|
static void reds_handle_read_link_done(void *opaque)
|
|
{
|
|
RedLinkInfo *link = (RedLinkInfo *)opaque;
|
|
SpiceLinkMess *link_mess = link->link_mess;
|
|
AsyncRead *obj = &link->asyc_read;
|
|
uint32_t num_caps = link_mess->num_common_caps + link_mess->num_channel_caps;
|
|
|
|
if (num_caps && (num_caps * sizeof(uint32_t) + link_mess->caps_offset >
|
|
link->link_header.size ||
|
|
link_mess->caps_offset < sizeof(*link_mess))) {
|
|
reds_send_link_error(link, SPICE_LINK_ERR_INVALID_DATA);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
if (!reds_security_check(link)) {
|
|
if (link->peer->ssl) {
|
|
red_printf("spice channels %d should not be encrypted", link_mess->channel_type);
|
|
reds_send_link_error(link, SPICE_LINK_ERR_NEED_UNSECURED);
|
|
} else {
|
|
red_printf("spice channels %d should be encrypted", link_mess->channel_type);
|
|
reds_send_link_error(link, SPICE_LINK_ERR_NEED_SECURED);
|
|
}
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
if (!reds_send_link_ack(link)) {
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
obj->now = (uint8_t *)&link->tiTicketing.encrypted_ticket.encrypted_data;
|
|
obj->end = obj->now + link->tiTicketing.rsa_size;
|
|
obj->done = reds_handle_ticket;
|
|
async_read_handler(0, 0, &link->asyc_read);
|
|
}
|
|
|
|
static void reds_handle_link_error(void *opaque, int err)
|
|
{
|
|
RedLinkInfo *link = (RedLinkInfo *)opaque;
|
|
switch (err) {
|
|
case 0:
|
|
case EPIPE:
|
|
break;
|
|
default:
|
|
red_printf("%s", strerror(errno));
|
|
break;
|
|
}
|
|
reds_release_link(link);
|
|
}
|
|
|
|
static void reds_handle_read_header_done(void *opaque)
|
|
{
|
|
RedLinkInfo *link = (RedLinkInfo *)opaque;
|
|
SpiceLinkHeader *header = &link->link_header;
|
|
AsyncRead *obj = &link->asyc_read;
|
|
|
|
if (header->magic != SPICE_MAGIC) {
|
|
reds_send_link_error(link, SPICE_LINK_ERR_INVALID_MAGIC);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
if (header->major_version != SPICE_VERSION_MAJOR) {
|
|
if (header->major_version > 0) {
|
|
reds_send_link_error(link, SPICE_LINK_ERR_VERSION_MISMATCH);
|
|
}
|
|
|
|
red_printf("version mismatch");
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
reds->peer_minor_version = header->minor_version;
|
|
|
|
if (header->size < sizeof(SpiceLinkMess)) {
|
|
reds_send_link_error(link, SPICE_LINK_ERR_INVALID_DATA);
|
|
red_printf("bad size %u", header->size);
|
|
reds_release_link(link);
|
|
return;
|
|
}
|
|
|
|
link->link_mess = spice_malloc(header->size);
|
|
|
|
obj->now = (uint8_t *)link->link_mess;
|
|
obj->end = obj->now + header->size;
|
|
obj->done = reds_handle_read_link_done;
|
|
async_read_handler(0, 0, &link->asyc_read);
|
|
}
|
|
|
|
static void reds_handle_new_link(RedLinkInfo *link)
|
|
{
|
|
AsyncRead *obj = &link->asyc_read;
|
|
obj->opaque = link;
|
|
obj->peer = link->peer;
|
|
obj->now = (uint8_t *)&link->link_header;
|
|
obj->end = (uint8_t *)((SpiceLinkHeader *)&link->link_header + 1);
|
|
obj->done = reds_handle_read_header_done;
|
|
obj->error = reds_handle_link_error;
|
|
async_read_handler(0, 0, &link->asyc_read);
|
|
}
|
|
|
|
static void reds_handle_ssl_accept(int fd, int event, void *data)
|
|
{
|
|
RedLinkInfo *link = (RedLinkInfo *)data;
|
|
int return_code;
|
|
|
|
if ((return_code = SSL_accept(link->peer->ssl)) != 1) {
|
|
int ssl_error = SSL_get_error(link->peer->ssl, return_code);
|
|
if (ssl_error != SSL_ERROR_WANT_READ && ssl_error != SSL_ERROR_WANT_WRITE) {
|
|
red_printf("SSL_accept failed, error=%d", ssl_error);
|
|
reds_release_link(link);
|
|
} else {
|
|
if (ssl_error == SSL_ERROR_WANT_READ) {
|
|
core->watch_update_mask(link->peer->watch, SPICE_WATCH_EVENT_READ);
|
|
} else {
|
|
core->watch_update_mask(link->peer->watch, SPICE_WATCH_EVENT_WRITE);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
core->watch_remove(link->peer->watch);
|
|
link->peer->watch = NULL;
|
|
reds_handle_new_link(link);
|
|
}
|
|
|
|
static RedLinkInfo *__reds_accept_connection(int listen_socket)
|
|
{
|
|
RedLinkInfo *link;
|
|
RedsStreamContext *peer;
|
|
int delay_val = 1;
|
|
int flags;
|
|
int socket;
|
|
|
|
if ((socket = accept(listen_socket, NULL, 0)) == -1) {
|
|
red_printf("accept failed, %s", strerror(errno));
|
|
return NULL;
|
|
}
|
|
|
|
if ((flags = fcntl(socket, F_GETFL)) == -1) {
|
|
red_printf("accept failed, %s", strerror(errno));
|
|
goto error;
|
|
}
|
|
|
|
if (fcntl(socket, F_SETFL, flags | O_NONBLOCK) == -1) {
|
|
red_printf("accept failed, %s", strerror(errno));
|
|
goto error;
|
|
}
|
|
|
|
if (setsockopt(socket, IPPROTO_TCP, TCP_NODELAY, &delay_val, sizeof(delay_val)) == -1) {
|
|
red_printf("setsockopt failed, %s", strerror(errno));
|
|
}
|
|
|
|
link = spice_new0(RedLinkInfo, 1);
|
|
peer = spice_new0(RedsStreamContext, 1);
|
|
link->peer = peer;
|
|
peer->socket = socket;
|
|
|
|
/* gather info + send event */
|
|
peer->info.llen = sizeof(peer->info.laddr);
|
|
peer->info.plen = sizeof(peer->info.paddr);
|
|
getsockname(peer->socket, (struct sockaddr*)(&peer->info.laddr), &peer->info.llen);
|
|
getpeername(peer->socket, (struct sockaddr*)(&peer->info.paddr), &peer->info.plen);
|
|
reds_channel_event(peer, SPICE_CHANNEL_EVENT_CONNECTED);
|
|
|
|
openssl_init(link);
|
|
|
|
return link;
|
|
|
|
error:
|
|
close(socket);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static RedLinkInfo *reds_accept_connection(int listen_socket)
|
|
{
|
|
RedLinkInfo *link;
|
|
RedsStreamContext *peer;
|
|
|
|
if (!(link = __reds_accept_connection(listen_socket))) {
|
|
return NULL;
|
|
}
|
|
peer = link->peer;
|
|
peer->ctx = (void *)((unsigned long)link->peer->socket);
|
|
peer->cb_read = (int (*)(void *, void *, int))reds_read;
|
|
peer->cb_write = (int (*)(void *, void *, int))reds_write;
|
|
peer->cb_readv = (int (*)(void *, const struct iovec *vector, int count))readv;
|
|
peer->cb_writev = (int (*)(void *, const struct iovec *vector, int count))writev;
|
|
peer->cb_free = (int (*)(RedsStreamContext *))reds_free;
|
|
|
|
return link;
|
|
}
|
|
|
|
static void reds_accept_ssl_connection(int fd, int event, void *data)
|
|
{
|
|
RedLinkInfo *link;
|
|
int return_code;
|
|
int ssl_error;
|
|
BIO *sbio;
|
|
|
|
link = __reds_accept_connection(reds->secure_listen_socket);
|
|
if (link == NULL) {
|
|
return;
|
|
}
|
|
|
|
// Handle SSL handshaking
|
|
if (!(sbio = BIO_new_socket(link->peer->socket, BIO_NOCLOSE))) {
|
|
red_printf("could not allocate ssl bio socket");
|
|
goto error;
|
|
}
|
|
|
|
link->peer->ssl = SSL_new(reds->ctx);
|
|
if (!link->peer->ssl) {
|
|
red_printf("could not allocate ssl context");
|
|
BIO_free(sbio);
|
|
goto error;
|
|
}
|
|
|
|
SSL_set_bio(link->peer->ssl, sbio, sbio);
|
|
|
|
link->peer->ctx = (void *)(link->peer->ssl);
|
|
link->peer->cb_write = (int (*)(void *, void *, int))reds_ssl_write;
|
|
link->peer->cb_read = (int (*)(void *, void *, int))reds_ssl_read;
|
|
link->peer->cb_readv = NULL;
|
|
link->peer->cb_writev = reds_ssl_writev;
|
|
link->peer->cb_free = (int (*)(RedsStreamContext *))reds_ssl_free;
|
|
|
|
return_code = SSL_accept(link->peer->ssl);
|
|
if (return_code == 1) {
|
|
reds_handle_new_link(link);
|
|
return;
|
|
}
|
|
|
|
ssl_error = SSL_get_error(link->peer->ssl, return_code);
|
|
if (return_code == -1 && (ssl_error == SSL_ERROR_WANT_READ ||
|
|
ssl_error == SSL_ERROR_WANT_WRITE)) {
|
|
int eventmask = ssl_error == SSL_ERROR_WANT_READ ?
|
|
SPICE_WATCH_EVENT_READ : SPICE_WATCH_EVENT_WRITE;
|
|
link->peer->watch = core->watch_add(link->peer->socket, eventmask,
|
|
reds_handle_ssl_accept, link);
|
|
return;
|
|
}
|
|
|
|
ERR_print_errors_fp(stderr);
|
|
red_printf("SSL_accept failed, error=%d", ssl_error);
|
|
SSL_free(link->peer->ssl);
|
|
|
|
error:
|
|
close(link->peer->socket);
|
|
free(link->peer);
|
|
BN_free(link->tiTicketing.bn);
|
|
free(link);
|
|
}
|
|
|
|
static void reds_accept(int fd, int event, void *data)
|
|
{
|
|
RedLinkInfo *link;
|
|
|
|
link = reds_accept_connection(reds->listen_socket);
|
|
if (link == NULL) {
|
|
red_printf("accept failed");
|
|
return;
|
|
}
|
|
reds_handle_new_link(link);
|
|
}
|
|
|
|
static int reds_init_socket(const char *addr, int portnr, int family)
|
|
{
|
|
static const int on=1, off=0;
|
|
struct addrinfo ai,*res,*e;
|
|
char port[33];
|
|
char uaddr[INET6_ADDRSTRLEN+1];
|
|
char uport[33];
|
|
int slisten,rc;
|
|
|
|
memset(&ai,0, sizeof(ai));
|
|
ai.ai_flags = AI_PASSIVE | AI_ADDRCONFIG;
|
|
ai.ai_socktype = SOCK_STREAM;
|
|
ai.ai_family = family;
|
|
|
|
snprintf(port, sizeof(port), "%d", portnr);
|
|
rc = getaddrinfo(strlen(addr) ? addr : NULL, port, &ai, &res);
|
|
if (rc != 0) {
|
|
red_error("getaddrinfo(%s,%s): %s\n", addr, port,
|
|
gai_strerror(rc));
|
|
}
|
|
|
|
for (e = res; e != NULL; e = e->ai_next) {
|
|
getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
|
|
uaddr,INET6_ADDRSTRLEN, uport,32,
|
|
NI_NUMERICHOST | NI_NUMERICSERV);
|
|
slisten = socket(e->ai_family, e->ai_socktype, e->ai_protocol);
|
|
if (slisten < 0) {
|
|
continue;
|
|
}
|
|
|
|
setsockopt(slisten,SOL_SOCKET,SO_REUSEADDR,(void*)&on,sizeof(on));
|
|
#ifdef IPV6_V6ONLY
|
|
if (e->ai_family == PF_INET6) {
|
|
/* listen on both ipv4 and ipv6 */
|
|
setsockopt(slisten,IPPROTO_IPV6,IPV6_V6ONLY,(void*)&off,
|
|
sizeof(off));
|
|
}
|
|
#endif
|
|
if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) {
|
|
goto listen;
|
|
}
|
|
close(slisten);
|
|
}
|
|
red_printf("%s: binding socket to %s:%d failed\n", __FUNCTION__,
|
|
addr, portnr);
|
|
freeaddrinfo(res);
|
|
return -1;
|
|
|
|
listen:
|
|
freeaddrinfo(res);
|
|
if (listen(slisten,1) != 0) {
|
|
red_error("%s: listen: %s", __FUNCTION__, strerror(errno));
|
|
close(slisten);
|
|
return -1;
|
|
}
|
|
return slisten;
|
|
}
|
|
|
|
static int reds_init_net(void)
|
|
{
|
|
if (spice_port != -1) {
|
|
reds->listen_socket = reds_init_socket(spice_addr, spice_port, spice_family);
|
|
if (-1 == reds->listen_socket) {
|
|
return -1;
|
|
}
|
|
reds->listen_watch = core->watch_add(reds->listen_socket,
|
|
SPICE_WATCH_EVENT_READ,
|
|
reds_accept, NULL);
|
|
if (reds->listen_watch == NULL) {
|
|
red_error("set fd handle failed");
|
|
}
|
|
}
|
|
|
|
if (spice_secure_port != -1) {
|
|
reds->secure_listen_socket = reds_init_socket(spice_addr, spice_secure_port,
|
|
spice_family);
|
|
if (-1 == reds->secure_listen_socket) {
|
|
return -1;
|
|
}
|
|
reds->secure_listen_watch = core->watch_add(reds->secure_listen_socket,
|
|
SPICE_WATCH_EVENT_READ,
|
|
reds_accept_ssl_connection, NULL);
|
|
if (reds->secure_listen_watch == NULL) {
|
|
red_error("set fd handle failed");
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void load_dh_params(SSL_CTX *ctx, char *file)
|
|
{
|
|
DH *ret = 0;
|
|
BIO *bio;
|
|
|
|
if ((bio = BIO_new_file(file, "r")) == NULL) {
|
|
red_error("Could not open DH file");
|
|
}
|
|
|
|
ret = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
|
|
if (ret == 0) {
|
|
red_error("Could not read DH params");
|
|
}
|
|
|
|
BIO_free(bio);
|
|
|
|
if (SSL_CTX_set_tmp_dh(ctx, ret) < 0) {
|
|
red_error("Could not set DH params");
|
|
}
|
|
}
|
|
|
|
/*The password code is not thread safe*/
|
|
static int ssl_password_cb(char *buf, int size, int flags, void *userdata)
|
|
{
|
|
char *pass = ssl_parameters.keyfile_password;
|
|
if (size < strlen(pass) + 1) {
|
|
return (0);
|
|
}
|
|
|
|
strcpy(buf, pass);
|
|
return (strlen(pass));
|
|
}
|
|
|
|
static unsigned long pthreads_thread_id(void)
|
|
{
|
|
unsigned long ret;
|
|
|
|
ret = (unsigned long)pthread_self();
|
|
return (ret);
|
|
}
|
|
|
|
static void pthreads_locking_callback(int mode, int type, char *file, int line)
|
|
{
|
|
if (mode & CRYPTO_LOCK) {
|
|
pthread_mutex_lock(&(lock_cs[type]));
|
|
lock_count[type]++;
|
|
} else {
|
|
pthread_mutex_unlock(&(lock_cs[type]));
|
|
}
|
|
}
|
|
|
|
static void openssl_thread_setup()
|
|
{
|
|
int i;
|
|
|
|
lock_cs = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(pthread_mutex_t));
|
|
lock_count = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(long));
|
|
|
|
for (i = 0; i < CRYPTO_num_locks(); i++) {
|
|
lock_count[i] = 0;
|
|
pthread_mutex_init(&(lock_cs[i]), NULL);
|
|
}
|
|
|
|
CRYPTO_set_id_callback((unsigned long (*)())pthreads_thread_id);
|
|
CRYPTO_set_locking_callback((void (*)())pthreads_locking_callback);
|
|
}
|
|
|
|
static void reds_init_ssl()
|
|
{
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10000000L
|
|
const SSL_METHOD *ssl_method;
|
|
#else
|
|
SSL_METHOD *ssl_method;
|
|
#endif
|
|
int return_code;
|
|
long ssl_options = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3;
|
|
|
|
/* Global system initialization*/
|
|
SSL_library_init();
|
|
SSL_load_error_strings();
|
|
|
|
/* Create our context*/
|
|
ssl_method = TLSv1_method();
|
|
reds->ctx = SSL_CTX_new(ssl_method);
|
|
if (!reds->ctx) {
|
|
red_error("Could not allocate new SSL context");
|
|
}
|
|
|
|
/* Limit connection to TLSv1 only */
|
|
#ifdef SSL_OP_NO_COMPRESSION
|
|
ssl_options |= SSL_OP_NO_COMPRESSION;
|
|
#endif
|
|
SSL_CTX_set_options(reds->ctx, ssl_options);
|
|
|
|
/* Load our keys and certificates*/
|
|
return_code = SSL_CTX_use_certificate_chain_file(reds->ctx, ssl_parameters.certs_file);
|
|
if (return_code != 1) {
|
|
red_error("Could not load certificates from %s", ssl_parameters.certs_file);
|
|
}
|
|
|
|
SSL_CTX_set_default_passwd_cb(reds->ctx, ssl_password_cb);
|
|
|
|
return_code = SSL_CTX_use_PrivateKey_file(reds->ctx, ssl_parameters.private_key_file,
|
|
SSL_FILETYPE_PEM);
|
|
if (return_code != 1) {
|
|
red_error("Could not use private key file");
|
|
}
|
|
|
|
/* Load the CAs we trust*/
|
|
return_code = SSL_CTX_load_verify_locations(reds->ctx, ssl_parameters.ca_certificate_file, 0);
|
|
if (return_code != 1) {
|
|
red_error("Could not use ca file");
|
|
}
|
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x00905100L)
|
|
SSL_CTX_set_verify_depth(reds->ctx, 1);
|
|
#endif
|
|
|
|
if (strlen(ssl_parameters.dh_key_file) > 0) {
|
|
load_dh_params(reds->ctx, ssl_parameters.dh_key_file);
|
|
}
|
|
|
|
SSL_CTX_set_session_id_context(reds->ctx, (const unsigned char *)"SPICE", 5);
|
|
if (strlen(ssl_parameters.ciphersuite) > 0) {
|
|
SSL_CTX_set_cipher_list(reds->ctx, ssl_parameters.ciphersuite);
|
|
}
|
|
|
|
openssl_thread_setup();
|
|
|
|
#ifndef SSL_OP_NO_COMPRESSION
|
|
STACK *cmp_stack = SSL_COMP_get_compression_methods();
|
|
sk_zero(cmp_stack);
|
|
#endif
|
|
}
|
|
|
|
static void reds_exit()
|
|
{
|
|
if (reds->main_channel) {
|
|
main_channel_close(reds->main_channel);
|
|
}
|
|
#ifdef RED_STATISTICS
|
|
shm_unlink(reds->stat_shm_name);
|
|
free(reds->stat_shm_name);
|
|
#endif
|
|
}
|
|
|
|
enum {
|
|
SPICE_OPTION_INVALID,
|
|
SPICE_OPTION_PORT,
|
|
SPICE_OPTION_SPORT,
|
|
SPICE_OPTION_HOST,
|
|
SPICE_OPTION_IMAGE_COMPRESSION,
|
|
SPICE_OPTION_PASSWORD,
|
|
SPICE_OPTION_DISABLE_TICKET,
|
|
SPICE_OPTION_RENDERER,
|
|
SPICE_OPTION_SSLKEY,
|
|
SPICE_OPTION_SSLCERTS,
|
|
SPICE_OPTION_SSLCAFILE,
|
|
SPICE_OPTION_SSLDHFILE,
|
|
SPICE_OPTION_SSLPASSWORD,
|
|
SPICE_OPTION_SSLCIPHERSUITE,
|
|
SPICE_SECURED_CHANNELS,
|
|
SPICE_UNSECURED_CHANNELS,
|
|
SPICE_OPTION_STREAMING_VIDEO,
|
|
SPICE_OPTION_AGENT_MOUSE,
|
|
SPICE_OPTION_PLAYBACK_COMPRESSION,
|
|
};
|
|
|
|
typedef struct OptionsMap {
|
|
const char *name;
|
|
int val;
|
|
} OptionsMap;
|
|
|
|
enum {
|
|
SPICE_TICKET_OPTION_INVALID,
|
|
SPICE_TICKET_OPTION_EXPIRATION,
|
|
SPICE_TICKET_OPTION_CONNECTED,
|
|
};
|
|
|
|
static inline void on_activating_ticketing()
|
|
{
|
|
if (!ticketing_enabled && reds_main_channel_connected()) {
|
|
red_printf("disconnecting");
|
|
reds_disconnect();
|
|
}
|
|
}
|
|
|
|
static void set_image_compression(spice_image_compression_t val)
|
|
{
|
|
if (val == image_compression) {
|
|
return;
|
|
}
|
|
image_compression = val;
|
|
red_dispatcher_on_ic_change();
|
|
}
|
|
|
|
static void set_one_channel_security(int id, uint32_t security)
|
|
{
|
|
ChannelSecurityOptions *security_options;
|
|
|
|
if ((security_options = find_channel_security(id))) {
|
|
security_options->options = security;
|
|
return;
|
|
}
|
|
security_options = spice_new(ChannelSecurityOptions, 1);
|
|
security_options->channel_id = id;
|
|
security_options->options = security;
|
|
security_options->next = channels_security;
|
|
channels_security = security_options;
|
|
}
|
|
|
|
#define REDS_SAVE_VERSION 1
|
|
|
|
struct RedsMigSpice {
|
|
char pub_key[SPICE_TICKET_PUBKEY_BYTES];
|
|
uint32_t mig_key;
|
|
char *host;
|
|
char *cert_subject;
|
|
int port;
|
|
int sport;
|
|
uint16_t cert_pub_key_type;
|
|
uint32_t cert_pub_key_len;
|
|
uint8_t* cert_pub_key;
|
|
};
|
|
|
|
typedef struct RedsMigSpiceMessage {
|
|
uint32_t link_id;
|
|
} RedsMigSpiceMessage;
|
|
|
|
typedef struct RedsMigCertPubKeyInfo {
|
|
uint16_t type;
|
|
uint32_t len;
|
|
} RedsMigCertPubKeyInfo;
|
|
|
|
void reds_mig_release(void)
|
|
{
|
|
if (reds->mig_spice) {
|
|
free(reds->mig_spice->cert_subject);
|
|
free(reds->mig_spice->host);
|
|
free(reds->mig_spice);
|
|
reds->mig_spice = NULL;
|
|
}
|
|
}
|
|
|
|
static void reds_mig_continue(void)
|
|
{
|
|
RedsMigSpice *s = reds->mig_spice;
|
|
|
|
red_printf("");
|
|
main_channel_push_migrate_begin(reds->main_channel, s->port, s->sport,
|
|
s->host, s->cert_pub_key_type, s->cert_pub_key_len, s->cert_pub_key);
|
|
|
|
reds_mig_release();
|
|
|
|
reds->mig_wait_connect = TRUE;
|
|
core->timer_start(reds->mig_timer, MIGRATE_TIMEOUT);
|
|
}
|
|
|
|
static void reds_mig_started(void)
|
|
{
|
|
red_printf("");
|
|
|
|
reds->mig_inprogress = TRUE;
|
|
|
|
if (reds->listen_watch != NULL) {
|
|
core->watch_update_mask(reds->listen_watch, 0);
|
|
}
|
|
|
|
if (reds->secure_listen_watch != NULL) {
|
|
core->watch_update_mask(reds->secure_listen_watch, 0);
|
|
}
|
|
|
|
if (!reds_main_channel_connected()) {
|
|
red_printf("not connected to peer");
|
|
goto error;
|
|
}
|
|
|
|
if ((SPICE_VERSION_MAJOR == 1) && (reds->peer_minor_version < 2)) {
|
|
red_printf("minor version mismatch client %u server %u",
|
|
reds->peer_minor_version, SPICE_VERSION_MINOR);
|
|
goto error;
|
|
}
|
|
|
|
reds_mig_continue();
|
|
return;
|
|
|
|
error:
|
|
reds_mig_release();
|
|
reds_mig_disconnect();
|
|
}
|
|
|
|
static void reds_mig_finished(int completed)
|
|
{
|
|
red_printf("");
|
|
if (reds->listen_watch != NULL) {
|
|
core->watch_update_mask(reds->listen_watch, SPICE_WATCH_EVENT_READ);
|
|
}
|
|
|
|
if (reds->secure_listen_watch != NULL) {
|
|
core->watch_update_mask(reds->secure_listen_watch, SPICE_WATCH_EVENT_READ);
|
|
}
|
|
|
|
if (!reds_main_channel_connected()) {
|
|
red_printf("no peer connected");
|
|
return;
|
|
}
|
|
reds->mig_inprogress = TRUE;
|
|
|
|
if (completed) {
|
|
Channel *channel;
|
|
|
|
reds->mig_wait_disconnect = TRUE;
|
|
core->timer_start(reds->mig_timer, MIGRATE_TIMEOUT);
|
|
|
|
// TODO: so now that main channel is separate, how exactly does migration of it work?
|
|
// - it can have an empty migrate - that seems ok
|
|
// - I can try to fill it's migrate, then move stuff from reds.c there, but a lot of data
|
|
// is in reds state right now.
|
|
main_channel_push_migrate(reds->main_channel);
|
|
channel = reds->channels;
|
|
while (channel) {
|
|
channel->migrate(channel);
|
|
channel = channel->next;
|
|
}
|
|
} else {
|
|
main_channel_push_migrate_cancel(reds->main_channel);
|
|
reds_mig_cleanup();
|
|
}
|
|
}
|
|
|
|
void reds_mig_switch(void)
|
|
{
|
|
main_channel_push_migrate_switch(reds->main_channel);
|
|
}
|
|
|
|
void reds_fill_mig_switch(SpiceMsgMainMigrationSwitchHost *migrate)
|
|
{
|
|
RedsMigSpice *s = reds->mig_spice;
|
|
migrate->port = s->port;
|
|
migrate->sport = s->sport;
|
|
migrate->host_size = strlen(s->host) + 1;
|
|
migrate->host_data = (uint8_t *)s->host;
|
|
if (s->cert_subject) {
|
|
migrate->cert_subject_size = strlen(s->cert_subject) + 1;
|
|
migrate->cert_subject_data = (uint8_t *)s->cert_subject;
|
|
} else {
|
|
migrate->cert_subject_size = 0;
|
|
migrate->cert_subject_data = NULL;
|
|
}
|
|
}
|
|
|
|
static void migrate_timout(void *opaque)
|
|
{
|
|
red_printf("");
|
|
ASSERT(reds->mig_wait_connect || reds->mig_wait_disconnect);
|
|
reds_mig_disconnect();
|
|
}
|
|
|
|
uint32_t reds_get_mm_time()
|
|
{
|
|
struct timespec time_space;
|
|
clock_gettime(CLOCK_MONOTONIC, &time_space);
|
|
return time_space.tv_sec * 1000 + time_space.tv_nsec / 1000 / 1000;
|
|
}
|
|
|
|
void reds_update_mm_timer(uint32_t mm_time)
|
|
{
|
|
red_dispatcher_set_mm_time(mm_time);
|
|
}
|
|
|
|
void reds_enable_mm_timer()
|
|
{
|
|
core->timer_start(reds->mm_timer, MM_TIMER_GRANULARITY_MS);
|
|
if (!reds_main_channel_connected()) {
|
|
return;
|
|
}
|
|
main_channel_push_multi_media_time(reds->main_channel, reds_get_mm_time() - MM_TIME_DELTA);
|
|
}
|
|
|
|
void reds_desable_mm_timer()
|
|
{
|
|
core->timer_cancel(reds->mm_timer);
|
|
}
|
|
|
|
static void mm_timer_proc(void *opaque)
|
|
{
|
|
red_dispatcher_set_mm_time(reds_get_mm_time());
|
|
core->timer_start(reds->mm_timer, MM_TIMER_GRANULARITY_MS);
|
|
}
|
|
|
|
static void attach_to_red_agent(SpiceCharDeviceInstance *sin)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
SpiceCharDeviceInterface *sif;
|
|
|
|
vdagent = sin;
|
|
reds_update_mouse_mode();
|
|
if (!reds_main_channel_connected()) {
|
|
return;
|
|
}
|
|
sif = SPICE_CONTAINEROF(vdagent->base.sif, SpiceCharDeviceInterface, base);
|
|
state->connected = 1;
|
|
if (sif->state) {
|
|
sif->state(vdagent, state->connected);
|
|
}
|
|
reds->agent_state.plug_generation++;
|
|
|
|
if (reds->mig_target) {
|
|
return;
|
|
}
|
|
|
|
main_channel_push_agent_connected(reds->main_channel);
|
|
}
|
|
|
|
__visible__ void spice_server_char_device_wakeup(SpiceCharDeviceInstance* sin)
|
|
{
|
|
(*sin->st->wakeup)(sin);
|
|
}
|
|
|
|
#define SUBTYPE_VDAGENT "vdagent"
|
|
#define SUBTYPE_SMARTCARD "smartcard"
|
|
|
|
const char *spice_server_char_device_recognized_subtypes_list[] = {
|
|
SUBTYPE_VDAGENT,
|
|
#ifdef USE_SMARTCARD
|
|
SUBTYPE_SMARTCARD,
|
|
#endif
|
|
NULL,
|
|
};
|
|
|
|
__visible__ const char** spice_server_char_device_recognized_subtypes()
|
|
{
|
|
return spice_server_char_device_recognized_subtypes_list;
|
|
}
|
|
|
|
static int spice_server_char_device_add_interface(SpiceServer *s,
|
|
SpiceBaseInstance *sin)
|
|
{
|
|
SpiceCharDeviceInstance* char_device =
|
|
SPICE_CONTAINEROF(sin, SpiceCharDeviceInstance, base);
|
|
|
|
red_printf("CHAR_DEVICE %s", char_device->subtype);
|
|
if (strcmp(char_device->subtype, SUBTYPE_VDAGENT) == 0) {
|
|
if (vdagent) {
|
|
red_printf("vdagent already attached");
|
|
return -1;
|
|
}
|
|
char_device->st = &vdagent_char_device_state;
|
|
attach_to_red_agent(char_device);
|
|
}
|
|
#ifdef USE_SMARTCARD
|
|
else if (strcmp(char_device->subtype, SUBTYPE_SMARTCARD) == 0) {
|
|
if (smartcard_device_connect(char_device) == -1) {
|
|
return -1;
|
|
}
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static void spice_server_char_device_remove_interface(SpiceBaseInstance *sin)
|
|
{
|
|
SpiceCharDeviceInstance* char_device =
|
|
SPICE_CONTAINEROF(sin, SpiceCharDeviceInstance, base);
|
|
|
|
red_printf("remove CHAR_DEVICE %s", char_device->subtype);
|
|
if (strcmp(char_device->subtype, SUBTYPE_VDAGENT) == 0) {
|
|
if (vdagent && reds->agent_state.connected) {
|
|
reds_agent_remove();
|
|
}
|
|
}
|
|
#ifdef USE_SMARTCARD
|
|
else if (strcmp(char_device->subtype, SUBTYPE_SMARTCARD) == 0) {
|
|
smartcard_device_disconnect(char_device);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
__visible__ int spice_server_add_interface(SpiceServer *s,
|
|
SpiceBaseInstance *sin)
|
|
{
|
|
const SpiceBaseInterface *interface = sin->sif;
|
|
|
|
ASSERT(reds == s);
|
|
|
|
if (strcmp(interface->type, SPICE_INTERFACE_KEYBOARD) == 0) {
|
|
red_printf("SPICE_INTERFACE_KEYBOARD");
|
|
if (interface->major_version != SPICE_INTERFACE_KEYBOARD_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_KEYBOARD_MINOR) {
|
|
red_printf("unsupported keyboard interface");
|
|
return -1;
|
|
}
|
|
if (inputs_set_keyboard(SPICE_CONTAINEROF(sin, SpiceKbdInstance, base)) != 0) {
|
|
return -1;
|
|
}
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_MOUSE) == 0) {
|
|
red_printf("SPICE_INTERFACE_MOUSE");
|
|
if (interface->major_version != SPICE_INTERFACE_MOUSE_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_MOUSE_MINOR) {
|
|
red_printf("unsupported mouse interface");
|
|
return -1;
|
|
}
|
|
if (inputs_set_mouse(SPICE_CONTAINEROF(sin, SpiceMouseInstance, base)) != 0) {
|
|
return -1;
|
|
}
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_QXL) == 0) {
|
|
QXLInstance *qxl;
|
|
|
|
red_printf("SPICE_INTERFACE_QXL");
|
|
if (interface->major_version != SPICE_INTERFACE_QXL_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_QXL_MINOR) {
|
|
red_printf("unsupported qxl interface");
|
|
return -1;
|
|
}
|
|
|
|
qxl = SPICE_CONTAINEROF(sin, QXLInstance, base);
|
|
qxl->st = spice_new0(QXLState, 1);
|
|
qxl->st->qif = SPICE_CONTAINEROF(interface, QXLInterface, base);
|
|
qxl->st->dispatcher = red_dispatcher_init(qxl);
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_TABLET) == 0) {
|
|
red_printf("SPICE_INTERFACE_TABLET");
|
|
if (interface->major_version != SPICE_INTERFACE_TABLET_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_TABLET_MINOR) {
|
|
red_printf("unsupported tablet interface");
|
|
return -1;
|
|
}
|
|
if (inputs_set_tablet(SPICE_CONTAINEROF(sin, SpiceTabletInstance, base)) != 0) {
|
|
return -1;
|
|
}
|
|
reds_update_mouse_mode();
|
|
if (reds->is_client_mouse_allowed) {
|
|
inputs_set_tablet_logical_size(reds->monitor_mode.x_res, reds->monitor_mode.y_res);
|
|
}
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_PLAYBACK) == 0) {
|
|
red_printf("SPICE_INTERFACE_PLAYBACK");
|
|
if (interface->major_version != SPICE_INTERFACE_PLAYBACK_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_PLAYBACK_MINOR) {
|
|
red_printf("unsupported playback interface");
|
|
return -1;
|
|
}
|
|
snd_attach_playback(SPICE_CONTAINEROF(sin, SpicePlaybackInstance, base));
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_RECORD) == 0) {
|
|
red_printf("SPICE_INTERFACE_RECORD");
|
|
if (interface->major_version != SPICE_INTERFACE_RECORD_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_RECORD_MINOR) {
|
|
red_printf("unsupported record interface");
|
|
return -1;
|
|
}
|
|
snd_attach_record(SPICE_CONTAINEROF(sin, SpiceRecordInstance, base));
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_CHAR_DEVICE) == 0) {
|
|
if (interface->major_version != SPICE_INTERFACE_CHAR_DEVICE_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_CHAR_DEVICE_MINOR) {
|
|
red_printf("unsupported char device interface");
|
|
return -1;
|
|
}
|
|
spice_server_char_device_add_interface(s, sin);
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_NET_WIRE) == 0) {
|
|
#ifdef USE_TUNNEL
|
|
SpiceNetWireInstance *net;
|
|
red_printf("SPICE_INTERFACE_NET_WIRE");
|
|
if (red_tunnel) {
|
|
red_printf("net wire already attached");
|
|
return -1;
|
|
}
|
|
if (interface->major_version != SPICE_INTERFACE_NET_WIRE_MAJOR ||
|
|
interface->minor_version < SPICE_INTERFACE_NET_WIRE_MINOR) {
|
|
red_printf("unsupported net wire interface");
|
|
return -1;
|
|
}
|
|
net = SPICE_CONTAINEROF(sin, SpiceNetWireInstance, base);
|
|
net->st = spice_new0(SpiceNetWireState, 1);
|
|
red_tunnel = red_tunnel_attach(core, net);
|
|
#else
|
|
red_printf("unsupported net wire interface");
|
|
return -1;
|
|
#endif
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_remove_interface(SpiceBaseInstance *sin)
|
|
{
|
|
const SpiceBaseInterface *interface = sin->sif;
|
|
|
|
if (strcmp(interface->type, SPICE_INTERFACE_TABLET) == 0) {
|
|
red_printf("remove SPICE_INTERFACE_TABLET");
|
|
inputs_detach_tablet(SPICE_CONTAINEROF(sin, SpiceTabletInstance, base));
|
|
reds_update_mouse_mode();
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_PLAYBACK) == 0) {
|
|
red_printf("remove SPICE_INTERFACE_PLAYBACK");
|
|
snd_detach_playback(SPICE_CONTAINEROF(sin, SpicePlaybackInstance, base));
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_RECORD) == 0) {
|
|
red_printf("remove SPICE_INTERFACE_RECORD");
|
|
snd_detach_record(SPICE_CONTAINEROF(sin, SpiceRecordInstance, base));
|
|
|
|
} else if (strcmp(interface->type, SPICE_INTERFACE_CHAR_DEVICE) == 0) {
|
|
spice_server_char_device_remove_interface(sin);
|
|
} else {
|
|
red_error("VD_INTERFACE_REMOVING unsupported");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void free_external_agent_buff(VDIPortBuf *in_buf)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
|
|
ring_add(&state->external_bufs, &in_buf->link);
|
|
add_token();
|
|
}
|
|
|
|
static void free_internal_agent_buff(VDIPortBuf *in_buf)
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
|
|
ring_add(&state->internal_bufs, &in_buf->link);
|
|
if (inputs_inited() && reds->pending_mouse_event) {
|
|
reds_handle_agent_mouse_event(inputs_get_mouse_state());
|
|
}
|
|
}
|
|
|
|
static void init_vd_agent_resources()
|
|
{
|
|
VDIPortState *state = &reds->agent_state;
|
|
int i;
|
|
|
|
ring_init(&state->external_bufs);
|
|
ring_init(&state->internal_bufs);
|
|
ring_init(&state->write_queue);
|
|
ring_init(&state->read_bufs);
|
|
|
|
state->read_state = VDI_PORT_READ_STATE_READ_HADER;
|
|
state->recive_pos = (uint8_t *)&state->vdi_chunk_header;
|
|
state->recive_len = sizeof(state->vdi_chunk_header);
|
|
|
|
for (i = 0; i < REDS_AGENT_WINDOW_SIZE; i++) {
|
|
VDAgentExtBuf *buf = spice_new0(VDAgentExtBuf, 1);
|
|
ring_item_init(&buf->base.link);
|
|
buf->base.chunk_header.port = VDP_CLIENT_PORT;
|
|
buf->base.free = free_external_agent_buff;
|
|
ring_add(&reds->agent_state.external_bufs, &buf->base.link);
|
|
}
|
|
|
|
for (i = 0; i < REDS_NUM_INTERNAL_AGENT_MESSAGES; i++) {
|
|
VDInternalBuf *buf = spice_new0(VDInternalBuf, 1);
|
|
ring_item_init(&buf->base.link);
|
|
buf->base.free = free_internal_agent_buff;
|
|
buf->base.chunk_header.port = VDP_SERVER_PORT;
|
|
buf->base.chunk_header.size = sizeof(VDAgentMessage) + sizeof(VDAgentMouseState);
|
|
buf->header.protocol = VD_AGENT_PROTOCOL;
|
|
buf->header.type = VD_AGENT_MOUSE_STATE;
|
|
buf->header.opaque = 0;
|
|
buf->header.size = sizeof(VDAgentMouseState);
|
|
ring_add(&reds->agent_state.internal_bufs, &buf->base.link);
|
|
}
|
|
|
|
for (i = 0; i < REDS_VDI_PORT_NUM_RECEIVE_BUFFS; i++) {
|
|
VDIReadBuf *buf = spice_new0(VDIReadBuf, 1);
|
|
ring_item_init(&buf->link);
|
|
ring_add(&reds->agent_state.read_bufs, &buf->link);
|
|
}
|
|
}
|
|
|
|
const char *version_string = VERSION;
|
|
|
|
static int do_spice_init(SpiceCoreInterface *core_interface)
|
|
{
|
|
red_printf("starting %s", version_string);
|
|
|
|
if (core_interface->base.major_version != SPICE_INTERFACE_CORE_MAJOR) {
|
|
red_printf("bad core interface version");
|
|
goto err;
|
|
}
|
|
core = core_interface;
|
|
reds->listen_socket = -1;
|
|
reds->secure_listen_socket = -1;
|
|
init_vd_agent_resources();
|
|
|
|
if (!(reds->mig_timer = core->timer_add(migrate_timout, NULL))) {
|
|
red_error("migration timer create failed");
|
|
}
|
|
if (!(reds->vdi_port_write_timer = core->timer_add(vdi_port_write_retry, NULL)))
|
|
{
|
|
red_error("vdi port write timer create failed");
|
|
}
|
|
reds->vdi_port_write_timer_started = FALSE;
|
|
|
|
#ifdef RED_STATISTICS
|
|
int shm_name_len = strlen(SPICE_STAT_SHM_NAME) + 20;
|
|
int fd;
|
|
|
|
reds->stat_shm_name = (char *)spice_malloc(shm_name_len);
|
|
snprintf(reds->stat_shm_name, shm_name_len, SPICE_STAT_SHM_NAME, getpid());
|
|
if ((fd = shm_open(reds->stat_shm_name, O_CREAT | O_RDWR, 0444)) == -1) {
|
|
red_error("statistics shm_open failed, %s", strerror(errno));
|
|
}
|
|
if (ftruncate(fd, REDS_STAT_SHM_SIZE) == -1) {
|
|
red_error("statistics ftruncate failed, %s", strerror(errno));
|
|
}
|
|
reds->stat = mmap(NULL, REDS_STAT_SHM_SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
|
|
if (reds->stat == (SpiceStat *)MAP_FAILED) {
|
|
red_error("statistics mmap failed, %s", strerror(errno));
|
|
}
|
|
memset(reds->stat, 0, REDS_STAT_SHM_SIZE);
|
|
reds->stat->magic = SPICE_STAT_MAGIC;
|
|
reds->stat->version = SPICE_STAT_VERSION;
|
|
reds->stat->root_index = INVALID_STAT_REF;
|
|
if (pthread_mutex_init(&reds->stat_lock, NULL)) {
|
|
red_error("mutex init failed");
|
|
}
|
|
if (!(reds->ping_timer = core->timer_add(ping_timer_cb, NULL))) {
|
|
red_error("ping timer create failed");
|
|
}
|
|
reds->ping_interval = PING_INTERVAL;
|
|
#endif
|
|
|
|
if (!(reds->mm_timer = core->timer_add(mm_timer_proc, NULL))) {
|
|
red_error("mm timer create failed");
|
|
}
|
|
core->timer_start(reds->mm_timer, MM_TIMER_GRANULARITY_MS);
|
|
|
|
if (reds_init_net() < 0) {
|
|
goto err;
|
|
}
|
|
if (reds->secure_listen_socket != -1) {
|
|
reds_init_ssl();
|
|
}
|
|
reds->main_channel = NULL;
|
|
inputs_init();
|
|
|
|
#ifdef USE_SMARTCARD
|
|
smartcard_channel_init();
|
|
#endif
|
|
|
|
reds->mouse_mode = SPICE_MOUSE_MODE_SERVER;
|
|
atexit(reds_exit);
|
|
return 0;
|
|
|
|
err:
|
|
return -1;
|
|
}
|
|
|
|
/* new interface */
|
|
__visible__ SpiceServer *spice_server_new(void)
|
|
{
|
|
/* we can't handle multiple instances (yet) */
|
|
ASSERT(reds == NULL);
|
|
|
|
reds = spice_new0(RedsState, 1);
|
|
return reds;
|
|
}
|
|
|
|
__visible__ int spice_server_init(SpiceServer *s, SpiceCoreInterface *core)
|
|
{
|
|
int ret;
|
|
|
|
ASSERT(reds == s);
|
|
ret = do_spice_init(core);
|
|
if (default_renderer) {
|
|
red_dispatcher_add_renderer(default_renderer);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
__visible__ void spice_server_destroy(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
reds_exit();
|
|
}
|
|
|
|
__visible__ spice_compat_version_t spice_get_current_compat_version(void)
|
|
{
|
|
return SPICE_COMPAT_VERSION_CURRENT;
|
|
}
|
|
|
|
__visible__ int spice_server_set_compat_version(SpiceServer *s,
|
|
spice_compat_version_t version)
|
|
{
|
|
if (version < SPICE_COMPAT_VERSION_0_6) {
|
|
/* We don't support 0.4 compat mode atm */
|
|
return -1;
|
|
}
|
|
|
|
if (version > SPICE_COMPAT_VERSION_CURRENT) {
|
|
/* Not compatible with future versions */
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_port(SpiceServer *s, int port)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (port < 0 || port > 0xffff) {
|
|
return -1;
|
|
}
|
|
spice_port = port;
|
|
return 0;
|
|
}
|
|
|
|
__visible__ void spice_server_set_addr(SpiceServer *s, const char *addr, int flags)
|
|
{
|
|
ASSERT(reds == s);
|
|
strncpy(spice_addr, addr, sizeof(spice_addr));
|
|
if (flags & SPICE_ADDR_FLAG_IPV4_ONLY) {
|
|
spice_family = PF_INET;
|
|
}
|
|
if (flags & SPICE_ADDR_FLAG_IPV6_ONLY) {
|
|
spice_family = PF_INET6;
|
|
}
|
|
}
|
|
|
|
__visible__ int spice_server_set_noauth(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
memset(taTicket.password, 0, sizeof(taTicket.password));
|
|
ticketing_enabled = 0;
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_ticket(SpiceServer *s,
|
|
const char *passwd, int lifetime,
|
|
int fail_if_connected,
|
|
int disconnect_if_connected)
|
|
{
|
|
ASSERT(reds == s);
|
|
|
|
if (reds_main_channel_connected()) {
|
|
if (fail_if_connected) {
|
|
return -1;
|
|
}
|
|
if (disconnect_if_connected) {
|
|
reds_disconnect();
|
|
}
|
|
}
|
|
|
|
on_activating_ticketing();
|
|
ticketing_enabled = 1;
|
|
if (lifetime == 0) {
|
|
taTicket.expiration_time = INT_MAX;
|
|
} else {
|
|
time_t now = time(NULL);
|
|
taTicket.expiration_time = now + lifetime;
|
|
}
|
|
if (passwd != NULL) {
|
|
strncpy(taTicket.password, passwd, sizeof(taTicket.password));
|
|
} else {
|
|
memset(taTicket.password, 0, sizeof(taTicket.password));
|
|
taTicket.expiration_time = 0;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_tls(SpiceServer *s, int port,
|
|
const char *ca_cert_file, const char *certs_file,
|
|
const char *private_key_file, const char *key_passwd,
|
|
const char *dh_key_file, const char *ciphersuite)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (port == 0 || ca_cert_file == NULL || certs_file == NULL ||
|
|
private_key_file == NULL) {
|
|
return -1;
|
|
}
|
|
if (port < 0 || port > 0xffff) {
|
|
return -1;
|
|
}
|
|
memset(&ssl_parameters, 0, sizeof(ssl_parameters));
|
|
|
|
spice_secure_port = port;
|
|
strncpy(ssl_parameters.ca_certificate_file, ca_cert_file,
|
|
sizeof(ssl_parameters.ca_certificate_file)-1);
|
|
strncpy(ssl_parameters.certs_file, certs_file,
|
|
sizeof(ssl_parameters.certs_file)-1);
|
|
strncpy(ssl_parameters.private_key_file, private_key_file,
|
|
sizeof(ssl_parameters.private_key_file)-1);
|
|
|
|
if (key_passwd) {
|
|
strncpy(ssl_parameters.keyfile_password, key_passwd,
|
|
sizeof(ssl_parameters.keyfile_password)-1);
|
|
}
|
|
if (ciphersuite) {
|
|
strncpy(ssl_parameters.ciphersuite, ciphersuite,
|
|
sizeof(ssl_parameters.ciphersuite)-1);
|
|
}
|
|
if (dh_key_file) {
|
|
strncpy(ssl_parameters.dh_key_file, dh_key_file,
|
|
sizeof(ssl_parameters.dh_key_file)-1);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_image_compression(SpiceServer *s,
|
|
spice_image_compression_t comp)
|
|
{
|
|
ASSERT(reds == s);
|
|
set_image_compression(comp);
|
|
return 0;
|
|
}
|
|
|
|
__visible__ spice_image_compression_t spice_server_get_image_compression(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
return image_compression;
|
|
}
|
|
|
|
__visible__ int spice_server_set_jpeg_compression(SpiceServer *s, spice_wan_compression_t comp)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (comp == SPICE_WAN_COMPRESSION_INVALID) {
|
|
red_printf("invalid jpeg state");
|
|
return -1;
|
|
}
|
|
// todo: support dynamically changing the state
|
|
jpeg_state = comp;
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_zlib_glz_compression(SpiceServer *s, spice_wan_compression_t comp)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (comp == SPICE_WAN_COMPRESSION_INVALID) {
|
|
red_printf("invalid zlib_glz state");
|
|
return -1;
|
|
}
|
|
// todo: support dynamically changing the state
|
|
zlib_glz_state = comp;
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_channel_security(SpiceServer *s, const char *channel, int security)
|
|
{
|
|
static const char *names[] = {
|
|
[ SPICE_CHANNEL_MAIN ] = "main",
|
|
[ SPICE_CHANNEL_DISPLAY ] = "display",
|
|
[ SPICE_CHANNEL_INPUTS ] = "inputs",
|
|
[ SPICE_CHANNEL_CURSOR ] = "cursor",
|
|
[ SPICE_CHANNEL_PLAYBACK ] = "playback",
|
|
[ SPICE_CHANNEL_RECORD ] = "record",
|
|
#ifdef USE_TUNNEL
|
|
[ SPICE_CHANNEL_TUNNEL ] = "tunnel",
|
|
#endif
|
|
#ifdef USE_SMARTCARD
|
|
[ SPICE_CHANNEL_SMARTCARD] = "smartcard",
|
|
#endif
|
|
};
|
|
int i;
|
|
|
|
ASSERT(reds == s);
|
|
|
|
if (channel == NULL) {
|
|
default_channel_security = security;
|
|
return 0;
|
|
}
|
|
for (i = 0; i < SPICE_N_ELEMENTS(names); i++) {
|
|
if (names[i] && strcmp(names[i], channel) == 0) {
|
|
set_one_channel_security(i, security);
|
|
return 0;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
__visible__ int spice_server_get_sock_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (main_channel_getsockname(reds->main_channel, sa, salen) < 0) {
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_get_peer_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (main_channel_getpeername(reds->main_channel, sa, salen) < 0) {
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_add_renderer(SpiceServer *s, const char *name)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (!red_dispatcher_add_renderer(name)) {
|
|
return -1;
|
|
}
|
|
default_renderer = NULL;
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_kbd_leds(SpiceKbdInstance *sin, int leds)
|
|
{
|
|
inputs_on_keyboard_leds_change(NULL, leds);
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_streaming_video(SpiceServer *s, int value)
|
|
{
|
|
ASSERT(reds == s);
|
|
if (value != SPICE_STREAM_VIDEO_OFF &&
|
|
value != SPICE_STREAM_VIDEO_ALL &&
|
|
value != SPICE_STREAM_VIDEO_FILTER)
|
|
return -1;
|
|
streaming_video = value;
|
|
red_dispatcher_on_sv_change();
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_playback_compression(SpiceServer *s, int enable)
|
|
{
|
|
ASSERT(reds == s);
|
|
snd_set_playback_compression(enable);
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_set_agent_mouse(SpiceServer *s, int enable)
|
|
{
|
|
ASSERT(reds == s);
|
|
agent_mouse = enable;
|
|
reds_update_mouse_mode();
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_migrate_info(SpiceServer *s, const char* dest,
|
|
int port, int secure_port,
|
|
const char* cert_subject)
|
|
{
|
|
RedsMigSpice *spice_migration = NULL;
|
|
|
|
ASSERT(reds == s);
|
|
|
|
if ((port == -1 && secure_port == -1) || !dest)
|
|
return -1;
|
|
|
|
spice_migration = spice_new0(RedsMigSpice, 1);
|
|
spice_migration->port = port;
|
|
spice_migration->sport = secure_port;
|
|
spice_migration->host = strdup(dest);
|
|
if (cert_subject) {
|
|
spice_migration->cert_subject = strdup(cert_subject);
|
|
}
|
|
|
|
reds_mig_release();
|
|
reds->mig_spice = spice_migration;
|
|
return 0;
|
|
}
|
|
|
|
/* interface for seamless migration */
|
|
__visible__ int spice_server_migrate_start(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
|
|
if (1) {
|
|
/* seamless doesn't work, fixing needs protocol change. */
|
|
return -1;
|
|
}
|
|
|
|
if (!reds->mig_spice) {
|
|
return -1;
|
|
}
|
|
reds_mig_started();
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_migrate_client_state(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
|
|
if (!reds_main_channel_connected()) {
|
|
return SPICE_MIGRATE_CLIENT_NONE;
|
|
} else if (reds->mig_wait_connect) {
|
|
return SPICE_MIGRATE_CLIENT_WAITING;
|
|
} else {
|
|
return SPICE_MIGRATE_CLIENT_READY;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
__visible__ int spice_server_migrate_end(SpiceServer *s, int completed)
|
|
{
|
|
ASSERT(reds == s);
|
|
reds_mig_finished(completed);
|
|
return 0;
|
|
}
|
|
|
|
/* interface for switch-host migration */
|
|
__visible__ int spice_server_migrate_switch(SpiceServer *s)
|
|
{
|
|
ASSERT(reds == s);
|
|
reds_mig_switch();
|
|
return 0;
|
|
}
|