Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 1 | /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved. |
Pierre Ossman | a4c0aac | 2017-02-19 15:50:29 +0100 | [diff] [blame] | 2 | * Copyright 2011-2017 Pierre Ossman for Cendio AB |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 3 | * |
| 4 | * This is free software; you can redistribute it and/or modify |
| 5 | * it under the terms of the GNU General Public License as published by |
| 6 | * the Free Software Foundation; either version 2 of the License, or |
| 7 | * (at your option) any later version. |
| 8 | * |
| 9 | * This software is distributed in the hope that it will be useful, |
| 10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 12 | * GNU General Public License for more details. |
| 13 | * |
| 14 | * You should have received a copy of the GNU General Public License |
| 15 | * along with this software; if not, write to the Free Software |
| 16 | * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, |
| 17 | * USA. |
| 18 | */ |
Pierre Ossman | dd45b44 | 2018-10-31 17:08:59 +0100 | [diff] [blame^] | 19 | #include <assert.h> |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 20 | #include <stdio.h> |
| 21 | #include <string.h> |
Pierre Ossman | 0068a4f | 2015-11-09 15:48:19 +0100 | [diff] [blame] | 22 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 23 | #include <rfb/Exception.h> |
Pierre Ossman | c754cce | 2011-11-14 15:44:11 +0000 | [diff] [blame] | 24 | #include <rfb/fenceTypes.h> |
Pierre Ossman | 7638e9c | 2014-01-16 13:12:40 +0100 | [diff] [blame] | 25 | #include <rfb/CMsgReader.h> |
| 26 | #include <rfb/CMsgWriter.h> |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 27 | #include <rfb/CSecurity.h> |
Adam Tkac | 5a0caed | 2010-04-23 13:58:10 +0000 | [diff] [blame] | 28 | #include <rfb/Security.h> |
Pierre Ossman | 0068a4f | 2015-11-09 15:48:19 +0100 | [diff] [blame] | 29 | #include <rfb/SecurityClient.h> |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 30 | #include <rfb/CConnection.h> |
| 31 | #include <rfb/util.h> |
| 32 | |
| 33 | #include <rfb/LogWriter.h> |
| 34 | |
Pierre Ossman | 0068a4f | 2015-11-09 15:48:19 +0100 | [diff] [blame] | 35 | #include <rdr/InStream.h> |
| 36 | #include <rdr/OutStream.h> |
| 37 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 38 | using namespace rfb; |
| 39 | |
| 40 | static LogWriter vlog("CConnection"); |
| 41 | |
| 42 | CConnection::CConnection() |
Adam Tkac | f324dc4 | 2010-04-23 14:10:17 +0000 | [diff] [blame] | 43 | : csecurity(0), is(0), os(0), reader_(0), writer_(0), |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 44 | shared(false), |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 45 | state_(RFBSTATE_UNINITIALISED), useProtocol3_3(false), |
| 46 | framebuffer(NULL), decoder(this) |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 47 | { |
| 48 | } |
| 49 | |
| 50 | CConnection::~CConnection() |
| 51 | { |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 52 | setFramebuffer(NULL); |
Pierre Ossman | 82d22e6 | 2018-09-21 15:26:37 +0200 | [diff] [blame] | 53 | if (csecurity) |
| 54 | delete csecurity; |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 55 | delete reader_; |
| 56 | reader_ = 0; |
| 57 | delete writer_; |
| 58 | writer_ = 0; |
| 59 | } |
| 60 | |
| 61 | void CConnection::setStreams(rdr::InStream* is_, rdr::OutStream* os_) |
| 62 | { |
| 63 | is = is_; |
| 64 | os = os_; |
| 65 | } |
| 66 | |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 67 | void CConnection::setFramebuffer(ModifiablePixelBuffer* fb) |
| 68 | { |
Pierre Ossman | 504afa2 | 2015-11-12 12:21:58 +0100 | [diff] [blame] | 69 | decoder.flush(); |
| 70 | |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 71 | if ((framebuffer != NULL) && (fb != NULL)) { |
| 72 | Rect rect; |
| 73 | |
| 74 | const rdr::U8* data; |
| 75 | int stride; |
| 76 | |
| 77 | const rdr::U8 black[4] = { 0, 0, 0, 0 }; |
| 78 | |
| 79 | // Copy still valid area |
| 80 | |
| 81 | rect.setXYWH(0, 0, |
| 82 | __rfbmin(fb->width(), framebuffer->width()), |
| 83 | __rfbmin(fb->height(), framebuffer->height())); |
| 84 | data = framebuffer->getBuffer(framebuffer->getRect(), &stride); |
| 85 | fb->imageRect(rect, data, stride); |
| 86 | |
| 87 | // Black out any new areas |
| 88 | |
| 89 | if (fb->width() > framebuffer->width()) { |
| 90 | rect.setXYWH(framebuffer->width(), 0, |
Brian P. Hinz | 5d66305 | 2016-09-05 09:15:50 -0400 | [diff] [blame] | 91 | fb->width() - framebuffer->width(), |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 92 | fb->height()); |
| 93 | fb->fillRect(rect, black); |
| 94 | } |
| 95 | |
| 96 | if (fb->height() > framebuffer->height()) { |
| 97 | rect.setXYWH(0, framebuffer->height(), |
| 98 | fb->width(), |
| 99 | fb->height() - framebuffer->height()); |
| 100 | fb->fillRect(rect, black); |
| 101 | } |
| 102 | } |
| 103 | |
| 104 | delete framebuffer; |
| 105 | framebuffer = fb; |
| 106 | } |
| 107 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 108 | void CConnection::initialiseProtocol() |
| 109 | { |
| 110 | state_ = RFBSTATE_PROTOCOL_VERSION; |
| 111 | } |
| 112 | |
| 113 | void CConnection::processMsg() |
| 114 | { |
| 115 | switch (state_) { |
| 116 | |
| 117 | case RFBSTATE_PROTOCOL_VERSION: processVersionMsg(); break; |
| 118 | case RFBSTATE_SECURITY_TYPES: processSecurityTypesMsg(); break; |
| 119 | case RFBSTATE_SECURITY: processSecurityMsg(); break; |
| 120 | case RFBSTATE_SECURITY_RESULT: processSecurityResultMsg(); break; |
| 121 | case RFBSTATE_INITIALISATION: processInitMsg(); break; |
| 122 | case RFBSTATE_NORMAL: reader_->readMsg(); break; |
| 123 | case RFBSTATE_UNINITIALISED: |
| 124 | throw Exception("CConnection::processMsg: not initialised yet?"); |
| 125 | default: |
| 126 | throw Exception("CConnection::processMsg: invalid state"); |
| 127 | } |
| 128 | } |
| 129 | |
| 130 | void CConnection::processVersionMsg() |
| 131 | { |
Pierre Ossman | ea7ede9 | 2018-06-18 16:51:53 +0200 | [diff] [blame] | 132 | char verStr[13]; |
| 133 | int majorVersion; |
| 134 | int minorVersion; |
| 135 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 136 | vlog.debug("reading protocol version"); |
Pierre Ossman | ea7ede9 | 2018-06-18 16:51:53 +0200 | [diff] [blame] | 137 | |
| 138 | if (!is->checkNoWait(12)) |
| 139 | return; |
| 140 | |
| 141 | is->readBytes(verStr, 12); |
| 142 | verStr[12] = '\0'; |
| 143 | |
| 144 | if (sscanf(verStr, "RFB %03d.%03d\n", |
| 145 | &majorVersion, &minorVersion) != 2) { |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 146 | state_ = RFBSTATE_INVALID; |
| 147 | throw Exception("reading version failed: not an RFB server?"); |
| 148 | } |
Pierre Ossman | ea7ede9 | 2018-06-18 16:51:53 +0200 | [diff] [blame] | 149 | |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 150 | server.setVersion(majorVersion, minorVersion); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 151 | |
| 152 | vlog.info("Server supports RFB protocol version %d.%d", |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 153 | server.majorVersion, server.minorVersion); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 154 | |
| 155 | // The only official RFB protocol versions are currently 3.3, 3.7 and 3.8 |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 156 | if (server.beforeVersion(3,3)) { |
Pierre Ossman | a7bbe9c | 2015-03-03 16:17:51 +0100 | [diff] [blame] | 157 | vlog.error("Server gave unsupported RFB protocol version %d.%d", |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 158 | server.majorVersion, server.minorVersion); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 159 | state_ = RFBSTATE_INVALID; |
Pierre Ossman | a7bbe9c | 2015-03-03 16:17:51 +0100 | [diff] [blame] | 160 | throw Exception("Server gave unsupported RFB protocol version %d.%d", |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 161 | server.majorVersion, server.minorVersion); |
| 162 | } else if (useProtocol3_3 || server.beforeVersion(3,7)) { |
| 163 | server.setVersion(3,3); |
| 164 | } else if (server.afterVersion(3,8)) { |
| 165 | server.setVersion(3,8); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 166 | } |
| 167 | |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 168 | sprintf(verStr, "RFB %03d.%03d\n", |
| 169 | server.majorVersion, server.minorVersion); |
Pierre Ossman | ea7ede9 | 2018-06-18 16:51:53 +0200 | [diff] [blame] | 170 | os->writeBytes(verStr, 12); |
| 171 | os->flush(); |
| 172 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 173 | state_ = RFBSTATE_SECURITY_TYPES; |
| 174 | |
| 175 | vlog.info("Using RFB protocol version %d.%d", |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 176 | server.majorVersion, server.minorVersion); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 177 | } |
| 178 | |
| 179 | |
| 180 | void CConnection::processSecurityTypesMsg() |
| 181 | { |
| 182 | vlog.debug("processing security types message"); |
| 183 | |
| 184 | int secType = secTypeInvalid; |
| 185 | |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 186 | std::list<rdr::U8> secTypes; |
Michal Srb | dccb5f7 | 2017-03-27 13:55:46 +0300 | [diff] [blame] | 187 | secTypes = security.GetEnabledSecTypes(); |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 188 | |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 189 | if (server.isVersion(3,3)) { |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 190 | |
| 191 | // legacy 3.3 server may only offer "vnc authentication" or "none" |
| 192 | |
| 193 | secType = is->readU32(); |
| 194 | if (secType == secTypeInvalid) { |
| 195 | throwConnFailedException(); |
| 196 | |
| 197 | } else if (secType == secTypeNone || secType == secTypeVncAuth) { |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 198 | std::list<rdr::U8>::iterator i; |
| 199 | for (i = secTypes.begin(); i != secTypes.end(); i++) |
| 200 | if (*i == secType) { |
| 201 | secType = *i; |
| 202 | break; |
| 203 | } |
| 204 | |
| 205 | if (i == secTypes.end()) |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 206 | secType = secTypeInvalid; |
| 207 | } else { |
| 208 | vlog.error("Unknown 3.3 security type %d", secType); |
| 209 | throw Exception("Unknown 3.3 security type"); |
| 210 | } |
| 211 | |
| 212 | } else { |
| 213 | |
| 214 | // >=3.7 server will offer us a list |
| 215 | |
| 216 | int nServerSecTypes = is->readU8(); |
| 217 | if (nServerSecTypes == 0) |
| 218 | throwConnFailedException(); |
| 219 | |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 220 | std::list<rdr::U8>::iterator j; |
Adam Tkac | 05a0cd6 | 2010-07-20 15:07:44 +0000 | [diff] [blame] | 221 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 222 | for (int i = 0; i < nServerSecTypes; i++) { |
| 223 | rdr::U8 serverSecType = is->readU8(); |
| 224 | vlog.debug("Server offers security type %s(%d)", |
Adam Tkac | 7cb47d6 | 2011-02-21 12:55:24 +0000 | [diff] [blame] | 225 | secTypeName(serverSecType), serverSecType); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 226 | |
Adam Tkac | 7cb47d6 | 2011-02-21 12:55:24 +0000 | [diff] [blame] | 227 | /* |
| 228 | * Use the first type sent by server which matches client's type. |
| 229 | * It means server's order specifies priority. |
| 230 | */ |
| 231 | if (secType == secTypeInvalid) { |
| 232 | for (j = secTypes.begin(); j != secTypes.end(); j++) |
| 233 | if (*j == serverSecType) { |
| 234 | secType = *j; |
| 235 | break; |
| 236 | } |
| 237 | } |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 238 | } |
| 239 | |
| 240 | // Inform the server of our decision |
| 241 | if (secType != secTypeInvalid) { |
| 242 | os->writeU8(secType); |
| 243 | os->flush(); |
Pierre Ossman | 71d6666 | 2014-11-11 13:42:51 +0100 | [diff] [blame] | 244 | vlog.info("Choosing security type %s(%d)",secTypeName(secType),secType); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 245 | } |
| 246 | } |
| 247 | |
| 248 | if (secType == secTypeInvalid) { |
| 249 | state_ = RFBSTATE_INVALID; |
| 250 | vlog.error("No matching security types"); |
| 251 | throw Exception("No matching security types"); |
| 252 | } |
| 253 | |
| 254 | state_ = RFBSTATE_SECURITY; |
Pierre Ossman | ad2b3c4 | 2018-09-21 15:31:11 +0200 | [diff] [blame] | 255 | csecurity = security.GetCSecurity(this, secType); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 256 | processSecurityMsg(); |
| 257 | } |
| 258 | |
| 259 | void CConnection::processSecurityMsg() |
| 260 | { |
| 261 | vlog.debug("processing security message"); |
Pierre Ossman | ad2b3c4 | 2018-09-21 15:31:11 +0200 | [diff] [blame] | 262 | if (csecurity->processMsg()) { |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 263 | state_ = RFBSTATE_SECURITY_RESULT; |
| 264 | processSecurityResultMsg(); |
| 265 | } |
| 266 | } |
| 267 | |
| 268 | void CConnection::processSecurityResultMsg() |
| 269 | { |
| 270 | vlog.debug("processing security result message"); |
| 271 | int result; |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 272 | if (server.beforeVersion(3,8) && csecurity->getType() == secTypeNone) { |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 273 | result = secResultOK; |
| 274 | } else { |
| 275 | if (!is->checkNoWait(1)) return; |
| 276 | result = is->readU32(); |
| 277 | } |
| 278 | switch (result) { |
| 279 | case secResultOK: |
| 280 | securityCompleted(); |
| 281 | return; |
| 282 | case secResultFailed: |
| 283 | vlog.debug("auth failed"); |
| 284 | break; |
| 285 | case secResultTooMany: |
| 286 | vlog.debug("auth failed - too many tries"); |
| 287 | break; |
| 288 | default: |
| 289 | throw Exception("Unknown security result from server"); |
| 290 | } |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 291 | state_ = RFBSTATE_INVALID; |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 292 | if (server.beforeVersion(3,8)) |
Pierre Ossman | 1922550 | 2017-10-12 15:05:07 +0200 | [diff] [blame] | 293 | throw AuthFailureException(); |
| 294 | CharArray reason(is->readString()); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 295 | throw AuthFailureException(reason.buf); |
| 296 | } |
| 297 | |
| 298 | void CConnection::processInitMsg() |
| 299 | { |
| 300 | vlog.debug("reading server initialisation"); |
| 301 | reader_->readServerInit(); |
| 302 | } |
| 303 | |
| 304 | void CConnection::throwConnFailedException() |
| 305 | { |
| 306 | state_ = RFBSTATE_INVALID; |
| 307 | CharArray reason; |
| 308 | reason.buf = is->readString(); |
| 309 | throw ConnFailedException(reason.buf); |
| 310 | } |
| 311 | |
| 312 | void CConnection::securityCompleted() |
| 313 | { |
| 314 | state_ = RFBSTATE_INITIALISATION; |
Pierre Ossman | 7638e9c | 2014-01-16 13:12:40 +0100 | [diff] [blame] | 315 | reader_ = new CMsgReader(this, is); |
Pierre Ossman | b14a6bc | 2018-06-18 15:44:26 +0200 | [diff] [blame] | 316 | writer_ = new CMsgWriter(&server, os); |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 317 | vlog.debug("Authentication success!"); |
| 318 | authSuccess(); |
| 319 | writer_->writeClientInit(shared); |
| 320 | } |
| 321 | |
Pierre Ossman | 3da238d | 2015-11-12 12:20:05 +0100 | [diff] [blame] | 322 | void CConnection::setDesktopSize(int w, int h) |
| 323 | { |
Pierre Ossman | 504afa2 | 2015-11-12 12:21:58 +0100 | [diff] [blame] | 324 | decoder.flush(); |
| 325 | |
Pierre Ossman | 3da238d | 2015-11-12 12:20:05 +0100 | [diff] [blame] | 326 | CMsgHandler::setDesktopSize(w,h); |
| 327 | } |
| 328 | |
| 329 | void CConnection::setExtendedDesktopSize(unsigned reason, |
| 330 | unsigned result, |
| 331 | int w, int h, |
| 332 | const ScreenSet& layout) |
| 333 | { |
Pierre Ossman | 504afa2 | 2015-11-12 12:21:58 +0100 | [diff] [blame] | 334 | decoder.flush(); |
| 335 | |
Pierre Ossman | 3da238d | 2015-11-12 12:20:05 +0100 | [diff] [blame] | 336 | CMsgHandler::setExtendedDesktopSize(reason, result, w, h, layout); |
| 337 | } |
| 338 | |
Pierre Ossman | dd45b44 | 2018-10-31 17:08:59 +0100 | [diff] [blame^] | 339 | void CConnection::serverInit(int width, int height, |
| 340 | const PixelFormat& pf, |
| 341 | const char* name) |
Pierre Ossman | 2affd77 | 2018-06-20 07:03:10 +0200 | [diff] [blame] | 342 | { |
Pierre Ossman | dd45b44 | 2018-10-31 17:08:59 +0100 | [diff] [blame^] | 343 | CMsgHandler::serverInit(width, height, pf, name); |
| 344 | |
Pierre Ossman | 2affd77 | 2018-06-20 07:03:10 +0200 | [diff] [blame] | 345 | state_ = RFBSTATE_NORMAL; |
| 346 | vlog.debug("initialisation done"); |
| 347 | |
| 348 | initDone(); |
Pierre Ossman | dd45b44 | 2018-10-31 17:08:59 +0100 | [diff] [blame^] | 349 | assert(framebuffer != NULL); |
| 350 | assert(framebuffer->width() == server.width()); |
| 351 | assert(framebuffer->height() == server.height()); |
Pierre Ossman | 2affd77 | 2018-06-20 07:03:10 +0200 | [diff] [blame] | 352 | } |
| 353 | |
Pierre Ossman | a4c0aac | 2017-02-19 15:50:29 +0100 | [diff] [blame] | 354 | void CConnection::readAndDecodeRect(const Rect& r, int encoding, |
| 355 | ModifiablePixelBuffer* pb) |
| 356 | { |
| 357 | decoder.decodeRect(r, encoding, pb); |
| 358 | decoder.flush(); |
| 359 | } |
| 360 | |
Pierre Ossman | 3da238d | 2015-11-12 12:20:05 +0100 | [diff] [blame] | 361 | void CConnection::framebufferUpdateStart() |
| 362 | { |
| 363 | CMsgHandler::framebufferUpdateStart(); |
| 364 | } |
| 365 | |
| 366 | void CConnection::framebufferUpdateEnd() |
| 367 | { |
Pierre Ossman | 504afa2 | 2015-11-12 12:21:58 +0100 | [diff] [blame] | 368 | decoder.flush(); |
| 369 | |
Pierre Ossman | 3da238d | 2015-11-12 12:20:05 +0100 | [diff] [blame] | 370 | CMsgHandler::framebufferUpdateEnd(); |
| 371 | } |
| 372 | |
Pierre Ossman | 9f273e9 | 2015-11-09 16:34:54 +0100 | [diff] [blame] | 373 | void CConnection::dataRect(const Rect& r, int encoding) |
| 374 | { |
| 375 | decoder.decodeRect(r, encoding, framebuffer); |
| 376 | } |
| 377 | |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 378 | void CConnection::authSuccess() |
| 379 | { |
| 380 | } |
| 381 | |
Pierre Ossman | 2affd77 | 2018-06-20 07:03:10 +0200 | [diff] [blame] | 382 | void CConnection::initDone() |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 383 | { |
Constantin Kaplinsky | a2adc8d | 2006-05-25 05:01:55 +0000 | [diff] [blame] | 384 | } |
Pierre Ossman | c754cce | 2011-11-14 15:44:11 +0000 | [diff] [blame] | 385 | |
| 386 | void CConnection::fence(rdr::U32 flags, unsigned len, const char data[]) |
| 387 | { |
| 388 | CMsgHandler::fence(flags, len, data); |
| 389 | |
| 390 | if (!(flags & fenceFlagRequest)) |
| 391 | return; |
| 392 | |
| 393 | // We cannot guarantee any synchronisation at this level |
| 394 | flags = 0; |
| 395 | |
| 396 | writer()->writeFence(flags, len, data); |
| 397 | } |