wireshark/epan/dissectors/packet-vnc.c

3146 lines
93 KiB
C

/* packet-vnc.c
* Routines for VNC dissection (Virtual Network Computing)
* Copyright 2005, Ulf Lamping <ulf.lamping@web.de>
* Copyright 2006-2007, Stephen Fisher (see AUTHORS file)
*
* $Id$
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
/* Dissection of the VNC (Virtual Network Computing) network traffic.
*
* All versions of RealVNC and TightVNC are supported.
* Note: The addition of TightVNC support is not yet complete.
*
* Several VNC implementations available, see:
* http://www.realvnc.com/
* http://www.tightvnc.com/
* http://ultravnc.sourceforge.net/
* ...
*
* The protocol itself is known as RFB - Remote Frame Buffer Protocol.
*
* This code is based on the protocol specification:
* http://www.realvnc.com/docs/rfbproto.pdf
* and the RealVNC free edition & TightVNC source code
*/
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <math.h>
#include <glib.h>
#include <epan/conversation.h>
#include <epan/emem.h>
#include <epan/packet.h>
#include <epan/prefs.h>
#include "packet-x11-keysym.h" /* This contains the X11 value_string
* "keysym_vals_source" that VNC also uses. */
static const value_string security_types_vs[] = {
{ 0, "Invalid" },
{ 1, "None" },
{ 2, "VNC" },
{ 5, "RA2" },
{ 6, "RA2ne" },
{ 16, "Tight" },
{ 17, "Ultra" },
{ 18, "TLS" },
{ 19, "VeNCrypt" },
{ 0, NULL }
};
typedef enum {
INVALID = 0,
NONE = 1,
VNC = 2,
RA2 = 5,
RA2ne = 6,
TIGHT = 16,
ULTRA = 17,
TLS = 18,
VENCRYPT = 19
} security_types_e;
static const value_string auth_result_vs[] = {
{ 0, "OK" },
{ 1, "Failed" },
{ 0, NULL }
};
static const value_string yes_no_vs[] = {
{ 0, "No" },
{ 1, "Yes" },
{ 0, NULL }
};
static const value_string client_message_types_vs[] = {
{ 0, "Set Pixel Format" },
{ 2, "Set Encodings" },
{ 3, "Framebuffer Update Request" },
{ 4, "Key Event" },
{ 5, "Pointer Event" },
{ 6, "Cut Text" },
{ 0, NULL }
};
static const value_string server_message_types_vs[] = {
{ 0, "Framebuffer Update" },
{ 1, "Set Colormap Entries" },
{ 2, "Ring Bell" },
{ 3, "Cut Text" },
{ 0, NULL }
};
static const value_string button_mask_vs[] = {
{ 0, "Not pressed" },
{ 1, "Pressed" },
{ 0, NULL }
};
typedef enum {
ENCODING_DESKTOP_SIZE = -223,
ENCODING_LAST_RECT = -224,
ENCODING_POINTER_POS = -232,
ENCODING_RICH_CURSOR = -239,
ENCODING_X_CURSOR = -240,
ENCODING_RAW = 0,
ENCODING_COPY_RECT = 1,
ENCODING_RRE = 2,
ENCODING_CORRE = 4,
ENCODING_HEXTILE = 5,
ENCODING_ZLIB = 6,
ENCODING_TIGHT = 7,
ENCODING_ZLIBHEX = 8,
ENCODING_RLE = 16
} encoding_type_e;
static const value_string encoding_types_vs[] = {
{ ENCODING_DESKTOP_SIZE, "DesktopSize (pseudo)" },
{ ENCODING_LAST_RECT, "LastRect (pseudo)" },
{ ENCODING_POINTER_POS, "Pointer pos (pseudo)" },
{ ENCODING_RICH_CURSOR, "Rich Cursor (pseudo)" },
{ ENCODING_X_CURSOR, "X Cursor (pseudo)" },
{ ENCODING_RAW, "Raw" },
{ ENCODING_COPY_RECT, "CopyRect" },
{ ENCODING_RRE, "RRE" },
{ ENCODING_CORRE, "CoRRE" },
{ ENCODING_HEXTILE, "Hextile" },
{ ENCODING_ZLIB, "Zlib" },
{ ENCODING_TIGHT, "Tight" },
{ ENCODING_ZLIBHEX, "ZlibHex" },
{ ENCODING_RLE, "ZRLE" },
{ 0, NULL }
};
/* Rectangle types for Tight encoding. These come in the "control byte" at the
* start of a rectangle's payload. Note that these are with respect to the most
* significant bits 4-7 of the control byte, so you must shift it to the right 4
* bits before comparing against these values.
*/
#define TIGHT_RECT_FILL 0x08
#define TIGHT_RECT_JPEG 0x09
#define TIGHT_RECT_MAX_VALUE 0x09
#define TIGHT_RECT_EXPLICIT_FILTER_FLAG 0x04
/* Filter types for Basic encoding of Tight rectangles */
#define TIGHT_RECT_FILTER_COPY 0x00
#define TIGHT_RECT_FILTER_PALETTE 0x01
#define TIGHT_RECT_FILTER_GRADIENT 0x02
/* Minimum number of bytes to compress for Tight encoding */
#define TIGHT_MIN_BYTES_TO_COMPRESS 12
static const value_string tight_filter_ids_vs[] = {
{ TIGHT_RECT_FILTER_COPY, "Copy" },
{ TIGHT_RECT_FILTER_PALETTE, "Palette" },
{ TIGHT_RECT_FILTER_GRADIENT, "Gradient" },
{ 0, NULL }
};
typedef enum {
SERVER_VERSION,
CLIENT_VERSION,
SECURITY,
SECURITY_TYPES,
TIGHT_TUNNELING_CAPABILITIES,
TIGHT_TUNNEL_TYPE_REPLY,
TIGHT_AUTH_CAPABILITIES,
TIGHT_AUTH_TYPE_REPLY,
TIGHT_AUTH_TYPE_AND_VENDOR_CODE,
TIGHT_UNKNOWN_PACKET3,
VNC_AUTHENTICATION_CHALLENGE,
VNC_AUTHENTICATION_RESPONSE,
SECURITY_RESULT,
CLIENT_INIT,
SERVER_INIT,
TIGHT_INTERACTION_CAPS,
TIGHT_INTERACTION_CAPS_LIST,
NORMAL_TRAFFIC
} vnc_session_state_e;
/* This structure will be tied to each conversation. */
typedef struct {
guint8 security_type_selected;
gdouble server_proto_ver, client_proto_ver;
vnc_session_state_e vnc_next_state;
guint32 server_port;
/* These are specific to TightVNC */
gint num_server_message_types;
gint num_client_message_types;
gint num_encoding_types;
} vnc_conversation_t;
/* This structure will be tied to each packet */
typedef struct {
guint8 bytes_per_pixel;
guint8 depth;
vnc_session_state_e state;
gint preferred_encoding;
} vnc_packet_t;
void proto_reg_handoff_vnc(void);
static gboolean vnc_startup_messages(tvbuff_t *tvb, packet_info *pinfo,
gint offset, proto_tree *tree,
vnc_conversation_t *per_conversation_info);
static void vnc_client_to_server(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_server_to_client(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_client_set_pixel_format(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_client_set_encodings(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_client_framebuffer_update_request(tvbuff_t *tvb,
packet_info *pinfo,
gint *offset,
proto_tree *tree);
static void vnc_client_key_event(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_client_pointer_event(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_client_cut_text(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree);
static guint vnc_server_framebuffer_update(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static guint vnc_raw_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height);
static guint vnc_copyrect_encoding(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree,
guint16 width, guint16 height);
static guint vnc_rre_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height);
static guint vnc_hextile_encoding(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree,
guint16 width, guint16 height);
static guint vnc_zrle_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height);
static guint vnc_tight_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height);
static guint vnc_rich_cursor_encoding(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree, guint16 width,
guint16 height);
static guint vnc_x_cursor_encoding(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree, guint16 width,
guint16 height);
static guint vnc_server_set_colormap_entries(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_server_ring_bell(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static guint vnc_server_cut_text(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree);
static void vnc_set_bytes_per_pixel(packet_info *pinfo, guint8 bytes_per_pixel);
static void vnc_set_depth(packet_info *pinfo, guint8 depth);
static guint8 vnc_get_bytes_per_pixel(packet_info *pinfo);
#define DEST_PORT_VNC pinfo->destport == 5500 || pinfo->destport == 5501 || \
pinfo->destport == 5900 || pinfo->destport == 5901 || \
pinfo->destport == vnc_preference_alternate_port
#define VNC_BYTES_NEEDED(a) \
if(a > (guint)tvb_length_remaining(tvb, *offset)) \
return a;
/* Variables for our preferences */
static guint vnc_preference_alternate_port = 0;
/* Initialize the protocol and registered fields */
static int proto_vnc = -1; /* Protocol subtree */
static int hf_vnc_padding = -1;
static int hf_vnc_server_proto_ver = -1;
static int hf_vnc_client_proto_ver = -1;
static int hf_vnc_num_security_types = -1;
static int hf_vnc_security_type = -1;
static int hf_vnc_server_security_type = -1;
static int hf_vnc_client_security_type = -1;
static int hf_vnc_vendor_code = -1;
static int hf_vnc_security_type_string = -1;
static int hf_vnc_auth_challenge = -1;
static int hf_vnc_auth_response = -1;
static int hf_vnc_auth_result = -1;
static int hf_vnc_auth_error = -1;
static int hf_vnc_share_desktop_flag = -1;
static int hf_vnc_width = -1;
static int hf_vnc_height = -1;
static int hf_vnc_server_bits_per_pixel = -1;
static int hf_vnc_server_depth = -1;
static int hf_vnc_server_big_endian_flag = -1;
static int hf_vnc_server_true_color_flag = -1;
static int hf_vnc_server_red_max = -1;
static int hf_vnc_server_green_max = -1;
static int hf_vnc_server_blue_max = -1;
static int hf_vnc_server_red_shift = -1;
static int hf_vnc_server_green_shift = -1;
static int hf_vnc_server_blue_shift = -1;
static int hf_vnc_desktop_name = -1;
static int hf_vnc_desktop_name_len = -1;
static int hf_vnc_num_server_message_types = -1;
static int hf_vnc_num_client_message_types = -1;
static int hf_vnc_num_encoding_types = -1;
/********** Client Message Types **********/
static int hf_vnc_client_message_type = -1; /* A subtree under VNC */
static int hf_vnc_client_bits_per_pixel = -1;
static int hf_vnc_client_depth = -1;
static int hf_vnc_client_big_endian_flag = -1;
static int hf_vnc_client_true_color_flag = -1;
static int hf_vnc_client_red_max = -1;
static int hf_vnc_client_green_max = -1;
static int hf_vnc_client_blue_max = -1;
static int hf_vnc_client_red_shift = -1;
static int hf_vnc_client_green_shift = -1;
static int hf_vnc_client_blue_shift = -1;
/* Client Key Event */
static int hf_vnc_key_down = -1;
static int hf_vnc_key = -1;
/* Client Pointer Event */
static int hf_vnc_button_1_pos = -1;
static int hf_vnc_button_2_pos = -1;
static int hf_vnc_button_3_pos = -1;
static int hf_vnc_button_4_pos = -1;
static int hf_vnc_button_5_pos = -1;
static int hf_vnc_button_6_pos = -1;
static int hf_vnc_button_7_pos = -1;
static int hf_vnc_button_8_pos = -1;
static int hf_vnc_pointer_x_pos = -1;
static int hf_vnc_pointer_y_pos = -1;
/* Client Framebuffer Update Request */
static int hf_vnc_update_req_incremental = -1;
static int hf_vnc_update_req_x_pos = -1;
static int hf_vnc_update_req_y_pos = -1;
static int hf_vnc_update_req_width = -1;
static int hf_vnc_update_req_height = -1;
/* Client Set Encodings */
static int hf_vnc_client_set_encodings_encoding_type = -1;
/* Client Cut Text */
static int hf_vnc_client_cut_text_len = -1;
static int hf_vnc_client_cut_text = -1;
/********** Server Message Types **********/
static int hf_vnc_server_message_type = -1; /* Subtree */
/* Tunneling capabilities (TightVNC extension) */
static int hf_vnc_tight_num_tunnel_types = -1;
static int hf_vnc_tight_tunnel_type = -1;
/* Authentication capabilities (TightVNC extension) */
static int hf_vnc_tight_num_auth_types = -1;
static int hf_vnc_tight_auth_type = -1;
/* TightVNC capabilities */
static int hf_vnc_tight_server_message_type = -1;
static int hf_vnc_tight_server_vendor = -1;
static int hf_vnc_tight_server_name = -1;
static int hf_vnc_tight_client_message_type = -1;
static int hf_vnc_tight_client_vendor = -1;
static int hf_vnc_tight_client_name = -1;
static int hf_vnc_tight_encoding_type = -1;
static int hf_vnc_tight_encoding_vendor = -1;
static int hf_vnc_tight_encoding_name = -1;
/* Tight compression parameters */
static int hf_vnc_tight_reset_stream0 = -1;
static int hf_vnc_tight_reset_stream1 = -1;
static int hf_vnc_tight_reset_stream2 = -1;
static int hf_vnc_tight_reset_stream3 = -1;
static int hf_vnc_tight_rect_type = -1;
static int hf_vnc_tight_image_len = -1;
static int hf_vnc_tight_image_data = -1;
static int hf_vnc_tight_fill_color = -1;
static int hf_vnc_tight_filter_flag = -1;
static int hf_vnc_tight_filter_id = -1;
static int hf_vnc_tight_palette_num_colors = -1;
static int hf_vnc_tight_palette_data = -1;
/* Server Framebuffer Update */
static int hf_vnc_fb_update_x_pos = -1;
static int hf_vnc_fb_update_y_pos = -1;
static int hf_vnc_fb_update_width = -1;
static int hf_vnc_fb_update_height = -1;
static int hf_vnc_fb_update_encoding_type = -1;
/* Raw Encoding */
static int hf_vnc_raw_pixel_data = -1;
/* CopyRect Encoding */
static int hf_vnc_copyrect_src_x_pos = -1;
static int hf_vnc_copyrect_src_y_pos = -1;
/* RRE Encoding */
static int hf_vnc_rre_num_subrects = -1;
static int hf_vnc_rre_bg_pixel = -1;
static int hf_vnc_rre_subrect_pixel = -1;
static int hf_vnc_rre_subrect_x_pos = -1;
static int hf_vnc_rre_subrect_y_pos = -1;
static int hf_vnc_rre_subrect_width = -1;
static int hf_vnc_rre_subrect_height = -1;
/* Hextile Encoding */
static int hf_vnc_hextile_subencoding_mask = -1;
static int hf_vnc_hextile_raw = -1;
static int hf_vnc_hextile_raw_value = -1;
static int hf_vnc_hextile_bg = -1;
static int hf_vnc_hextile_bg_value = -1;
static int hf_vnc_hextile_fg = -1;
static int hf_vnc_hextile_fg_value = -1;
static int hf_vnc_hextile_anysubrects = -1;
static int hf_vnc_hextile_num_subrects = -1;
static int hf_vnc_hextile_subrectscolored = -1;
static int hf_vnc_hextile_subrect_pixel_value = -1;
static int hf_vnc_hextile_subrect_x_pos = -1;
static int hf_vnc_hextile_subrect_y_pos = -1;
static int hf_vnc_hextile_subrect_width = -1;
static int hf_vnc_hextile_subrect_height = -1;
/* ZRLE Encoding */
static int hf_vnc_zrle_len = -1;
static int hf_vnc_zrle_subencoding = -1;
static int hf_vnc_zrle_rle = -1;
static int hf_vnc_zrle_palette_size = -1;
static int hf_vnc_zrle_data = -1;
static int hf_vnc_zrle_raw = -1;
static int hf_vnc_zrle_palette = -1;
/* Cursor Encoding */
static int hf_vnc_cursor_x_fore_back = -1;
static int hf_vnc_cursor_encoding_pixels = -1;
static int hf_vnc_cursor_encoding_bitmask = -1;
/* Server Set Colormap Entries */
static int hf_vnc_colormap_first_color = -1;
static int hf_vnc_colormap_num_colors = -1;
static int hf_vnc_colormap_red = -1;
static int hf_vnc_colormap_green = -1;
static int hf_vnc_colormap_blue = -1;
/* Server Cut Text */
static int hf_vnc_server_cut_text_len = -1;
static int hf_vnc_server_cut_text = -1;
/********** End of Server Message Types **********/
static gboolean vnc_preference_desegment = TRUE;
/* Initialize the subtree pointers */
static gint ett_vnc = -1;
static gint ett_vnc_client_message_type = -1;
static gint ett_vnc_server_message_type = -1;
static gint ett_vnc_rect = -1;
static gint ett_vnc_encoding_type = -1;
static gint ett_vnc_rre_subrect = -1;
static gint ett_vnc_hextile_subencoding_mask = -1;
static gint ett_vnc_hextile_num_subrects = -1;
static gint ett_vnc_hextile_subrect = -1;
static gint ett_vnc_zrle_subencoding = -1;
static gint ett_vnc_colormap_num_groups = -1;
static gint ett_vnc_colormap_color_group = -1;
/* Global so they keep their value between packets */
guint8 vnc_bytes_per_pixel;
guint8 vnc_depth;
static dissector_handle_t vnc_handle;
/* Code to dissect the packets */
static void
dissect_vnc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
{
gboolean ret;
gint offset = 0;
/* Set up structures needed to add the protocol subtree and manage it */
proto_item *ti=NULL;
proto_tree *vnc_tree=NULL;
conversation_t *conversation;
vnc_conversation_t *per_conversation_info;
conversation = find_conversation(pinfo->fd->num, &pinfo->src,
&pinfo->dst, pinfo->ptype,
pinfo->srcport, pinfo->destport, 0);
if(!conversation) { /* Conversation does not exist yet - create it */
conversation = conversation_new(pinfo->fd->num, &pinfo->src,
&pinfo->dst, pinfo->ptype,
pinfo->srcport,
pinfo->destport, 0);
}
/* Retrieve information from conversation, or add it if it isn't
* there yet */
per_conversation_info = conversation_get_proto_data(conversation,
proto_vnc);
if(!per_conversation_info) {
per_conversation_info = se_alloc(sizeof(vnc_conversation_t));
per_conversation_info->vnc_next_state = SERVER_VERSION;
conversation_add_proto_data(conversation, proto_vnc,
per_conversation_info);
}
/* Make entries in Protocol column and Info column on summary display */
if (check_col(pinfo->cinfo, COL_PROTOCOL))
col_set_str(pinfo->cinfo, COL_PROTOCOL, "VNC");
/* First, clear the info column */
if(check_col(pinfo->cinfo, COL_INFO))
col_clear(pinfo->cinfo, COL_INFO);
/* create display subtree for the protocol */
if(tree) {
ti = proto_tree_add_item(tree, proto_vnc, tvb, 0, -1, FALSE);
vnc_tree = proto_item_add_subtree(ti, ett_vnc);
}
offset = 0; /* Start at the beginning of the VNC protocol data */
/* Dissect any remaining session startup messages */
ret = vnc_startup_messages(tvb, pinfo, offset, vnc_tree,
per_conversation_info);
vnc_set_bytes_per_pixel(pinfo, vnc_bytes_per_pixel);
vnc_set_depth(pinfo, vnc_depth);
if(!ret) {
if(DEST_PORT_VNC || per_conversation_info->server_port == pinfo->destport)
vnc_client_to_server(tvb, pinfo, &offset, vnc_tree);
else
vnc_server_to_client(tvb, pinfo, &offset, vnc_tree);
}
}
/* Returns the new offset after processing the 4-byte vendor string */
static gint
process_vendor(proto_tree *tree, gint hfindex, tvbuff_t *tvb, gint offset)
{
gchar *vendor;
proto_item *ti;
vendor = tvb_get_ephemeral_string(tvb, offset, 4);
ti = proto_tree_add_string(tree, hfindex, tvb, offset, 4, vendor);
if(g_ascii_strcasecmp(vendor, "STDV") == 0)
proto_item_append_text(ti, " (Standard VNC vendor)");
else if(g_ascii_strcasecmp(vendor, "TRDV") == 0)
proto_item_append_text(ti, " (Tridia VNC vendor)");
else if(g_ascii_strcasecmp(vendor, "TGHT") == 0)
proto_item_append_text(ti, " (Tight VNC vendor)");
offset += 4;
return offset;
}
/* Returns the new offset after processing the specified number of capabilities */
static gint
process_tight_capabilities(proto_tree *tree,
gint type_index, gint vendor_index, gint name_index,
tvbuff_t *tvb, gint offset, gint num_capabilities)
{
gint i;
/* See vnc_unixsrc/include/rfbproto.h:rfbCapabilityInfo */
for (i = 0; i < num_capabilities; i++) {
char *name;
proto_tree_add_item(tree, type_index, tvb, offset, 4, FALSE);
offset += 4;
offset = process_vendor(tree, vendor_index, tvb, offset);
name = tvb_get_ephemeral_string(tvb, offset, 8);
proto_tree_add_string(tree, name_index, tvb, offset, 8, name);
offset += 8;
}
return offset;
}
/* Returns true if this looks like a client or server version packet: 12 bytes, in the format "RFB xxx.yyy\n" .
* Will check for the 12 bytes exact length, the 'RFB ' string and that it ends with a '\n'.
* The exact 'xxx.yyy' is checked later, by trying to convert it to a double using g_ascii_strtod.
*/
static gboolean
vnc_is_client_or_server_version_message(tvbuff_t *tvb)
{
if(tvb_length(tvb) != 12) {
return FALSE;
}
if(tvb_strncaseeql(tvb, 0, "RFB ", 4) != 0) {
return FALSE;
}
/* 0x2e = '.' 0xa = '\n' */
if((tvb_get_guint8(tvb, 7) != 0x2e) || (tvb_get_guint8(tvb,11) != 0xa)) {
return FALSE;
}
return TRUE;
}
static gboolean test_vnc_protocol(tvbuff_t *tvb, packet_info *pinfo,
proto_tree *tree)
{
conversation_t *conversation;
if (vnc_is_client_or_server_version_message(tvb)) {
conversation = conversation_new(pinfo->fd->num, &pinfo->src,
&pinfo->dst, pinfo->ptype,
pinfo->srcport,
pinfo->destport, 0);
conversation_set_dissector(conversation, vnc_handle);
dissect_vnc(tvb, pinfo, tree);
return TRUE;
}
return FALSE;
}
/* Returns true if additional session startup messages follow */
static gboolean
vnc_startup_messages(tvbuff_t *tvb, packet_info *pinfo, gint offset,
proto_tree *tree, vnc_conversation_t
*per_conversation_info)
{
guint8 num_security_types;
guint32 desktop_name_len, auth_result, text_len;
vnc_packet_t *per_packet_info;
gint num_tunnel_types;
gint num_auth_types;
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
if(!per_packet_info) {
per_packet_info = se_alloc(sizeof(vnc_packet_t));
per_packet_info->state = per_conversation_info->vnc_next_state;
per_packet_info->preferred_encoding = -1;
p_add_proto_data(pinfo->fd, proto_vnc, per_packet_info);
}
/* Packet dissection follows */
switch(per_packet_info->state) {
case SERVER_VERSION :
if (!vnc_is_client_or_server_version_message(tvb))
return TRUE; /* we still hope to get a SERVER_VERSION message some day. Do not proceed yet */
proto_tree_add_item(tree, hf_vnc_server_proto_ver, tvb, 4,
7, FALSE);
per_conversation_info->server_proto_ver =
g_ascii_strtod((char *)tvb_get_ephemeral_string(tvb, 4, 7),
NULL);
per_conversation_info->server_port = pinfo->srcport;
if (check_col(pinfo->cinfo, COL_INFO))
col_add_fstr(pinfo->cinfo, COL_INFO,
"Server protocol version: %s",
tvb_format_text(tvb, 4, 7));
per_conversation_info->vnc_next_state = CLIENT_VERSION;
break;
case CLIENT_VERSION :
if (!vnc_is_client_or_server_version_message(tvb))
return TRUE; /* we still hope to get a CLIENT_VERSION message some day. Do not proceed yet */
proto_tree_add_item(tree, hf_vnc_client_proto_ver, tvb,
4, 7, FALSE);
per_conversation_info->client_proto_ver =
g_ascii_strtod((char *)tvb_get_ephemeral_string(tvb, 4, 7),
NULL);
if (check_col(pinfo->cinfo, COL_INFO))
col_add_fstr(pinfo->cinfo, COL_INFO,
"Client protocol version: %s",
tvb_format_text(tvb, 4, 7));
per_conversation_info->vnc_next_state = SECURITY;
break;
case SECURITY :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Security types supported");
/* We're checking against the client protocol version because
* the client is the final decider on which version to use
* after the server offers the highest version it supports. */
if(per_conversation_info->client_proto_ver >= 3.007) {
num_security_types = tvb_get_guint8(tvb, offset);
if (tree) {
proto_tree_add_item(tree,
hf_vnc_num_security_types, tvb,
offset, 1, FALSE);
for(offset = 1; offset <= num_security_types; offset++){
proto_tree_add_item(tree,
hf_vnc_security_type, tvb,
offset, 1, FALSE);
}
}
} else {
/* Version < 3.007: The server decides the
* authentication type for us to use */
proto_tree_add_item(tree,
hf_vnc_server_security_type, tvb,
offset, 4, FALSE);
}
per_conversation_info->vnc_next_state = SECURITY_TYPES;
break;
case SECURITY_TYPES :
if (check_col(pinfo->cinfo, COL_INFO)) {
col_set_str(pinfo->cinfo, COL_INFO,
"Authentication type selected by client");
}
proto_tree_add_item(tree, hf_vnc_client_security_type, tvb,
offset, 1, FALSE);
per_conversation_info->security_type_selected =
tvb_get_guint8(tvb, offset);
switch(per_conversation_info->security_type_selected) {
case 1 : /* None */
if(per_conversation_info->client_proto_ver >= 3.008)
per_conversation_info->vnc_next_state =
SECURITY_RESULT;
else
per_conversation_info->vnc_next_state =
CLIENT_INIT;
break;
case 2 : /* VNC */
per_conversation_info->vnc_next_state =
VNC_AUTHENTICATION_CHALLENGE;
break;
case 16 : /* Tight */
per_conversation_info->vnc_next_state =
TIGHT_TUNNELING_CAPABILITIES;
default :
/* Security type not supported by this dissector */
break;
}
break;
case TIGHT_TUNNELING_CAPABILITIES :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"TightVNC tunneling capabilities supported");
proto_tree_add_item(tree, hf_vnc_tight_num_tunnel_types, tvb, offset, 4, FALSE);
num_tunnel_types = tvb_get_ntohl(tvb, offset);
offset += 4;
{
gint i;
for(i = 0; i < num_tunnel_types; i++) {
/* TightVNC and Xvnc don't support any tunnel capabilities yet, but each capability
* is 16 bytes, so skip them.
*/
proto_tree_add_item(tree, hf_vnc_tight_tunnel_type, tvb, offset, 16, FALSE);
offset += 16;
}
}
if (num_tunnel_types == 0)
per_conversation_info->vnc_next_state = TIGHT_AUTH_CAPABILITIES;
else
per_conversation_info->vnc_next_state = TIGHT_TUNNEL_TYPE_REPLY;
break;
case TIGHT_TUNNEL_TYPE_REPLY:
/* Neither TightVNC nor Xvnc implement this; they just have a placeholder that emits an error
* message and closes the connection (xserver/hw/vnc/auth.c:rfbProcessClientTunnelingType).
* We should actually never get here...
*/
break;
case TIGHT_AUTH_CAPABILITIES:
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"TightVNC authentication capabilities supported");
proto_tree_add_item(tree, hf_vnc_tight_num_auth_types, tvb, offset, 4, FALSE);
num_auth_types = tvb_get_ntohl(tvb, offset);
offset += 4;
{
int i;
for (i = 0; i < num_auth_types; i++) {
/* See xserver/hw/vnc/auth.c:rfbSendAuthCaps()
* We don't actually display the auth types for now.
*/
proto_tree_add_item(tree, hf_vnc_tight_auth_type, tvb, offset, 16, FALSE);
offset += 16;
}
}
if (num_auth_types == 0)
per_conversation_info->vnc_next_state = CLIENT_INIT;
else
per_conversation_info->vnc_next_state = TIGHT_AUTH_TYPE_REPLY;
break;
case TIGHT_AUTH_TYPE_REPLY:
REPORT_DISSECTOR_BUG("Unimplemented case: TightVNC authentication reply");
/* FIXME: implement. See xserver/hw/vnc/auth.c:rfbProcessClientAuthType() */
break;
case TIGHT_AUTH_TYPE_AND_VENDOR_CODE :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Authentication type / vendor code");
proto_tree_add_item(tree, hf_vnc_server_security_type, tvb,
offset, 4, FALSE);
offset += 4;
offset = process_vendor(tree, hf_vnc_vendor_code, tvb, offset);
/* Display authentication method string */
proto_tree_add_item(tree, hf_vnc_security_type_string, tvb,
offset, 8, FALSE);
per_conversation_info->vnc_next_state =
TIGHT_UNKNOWN_PACKET3;
break;
case TIGHT_UNKNOWN_PACKET3 :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Unknown packet (TightVNC)");
proto_tree_add_text(tree, tvb, offset, -1,
"Unknown packet (TightVNC)");
per_conversation_info->vnc_next_state =
VNC_AUTHENTICATION_CHALLENGE;
break;
case VNC_AUTHENTICATION_CHALLENGE :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Authentication challenge from server");
proto_tree_add_item(tree, hf_vnc_auth_challenge, tvb,
offset, 16, FALSE);
per_conversation_info->vnc_next_state =
VNC_AUTHENTICATION_RESPONSE;
break;
case VNC_AUTHENTICATION_RESPONSE :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Authentication response from client");
proto_tree_add_item(tree, hf_vnc_auth_response, tvb,
offset, 16, FALSE);
per_conversation_info->vnc_next_state = SECURITY_RESULT;
break;
case SECURITY_RESULT :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Authentication result");
proto_tree_add_item(tree, hf_vnc_auth_result, tvb, offset,
4, FALSE);
auth_result = tvb_get_ntohl(tvb, offset);
offset += 4;
switch(auth_result) {
case 0 : /* OK */
per_conversation_info->vnc_next_state = CLIENT_INIT;
break;
case 1 : /* Failed */
if(per_conversation_info->client_proto_ver >= 3.008) {
text_len = tvb_get_ntohl(tvb, offset);
proto_tree_add_text(tree, tvb, offset, 4, "Length of authentication error: %d", text_len);
offset += 4;
proto_tree_add_item(tree, hf_vnc_auth_error, tvb,
offset, text_len, FALSE);
offset += text_len;
}
return TRUE; /* All versions: Do not continue
processing VNC packets as connection
will be closed after this packet. */
break;
}
break;
case CLIENT_INIT :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Share desktop flag");
proto_tree_add_item(tree, hf_vnc_share_desktop_flag, tvb,
offset, 1, FALSE);
per_conversation_info->vnc_next_state = SERVER_INIT;
break;
case SERVER_INIT :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Server framebuffer parameters");
proto_tree_add_item(tree, hf_vnc_width, tvb, offset, 2,
FALSE);
offset += 2;
proto_tree_add_item(tree, hf_vnc_height, tvb, offset, 2,
FALSE);
offset += 2;
proto_tree_add_item(tree, hf_vnc_server_bits_per_pixel,
tvb, offset, 1, FALSE);
vnc_bytes_per_pixel = tvb_get_guint8(tvb, offset)/8;
vnc_set_bytes_per_pixel(pinfo, vnc_bytes_per_pixel);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_depth, tvb, offset,
1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_big_endian_flag,
tvb, offset, 1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_true_color_flag,
tvb, offset, 1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_red_max,
tvb, offset, 2, FALSE);
offset += 2;
proto_tree_add_item(tree, hf_vnc_server_green_max,
tvb, offset, 2, FALSE);
offset += 2;
proto_tree_add_item(tree, hf_vnc_server_blue_max,
tvb, offset, 2, FALSE);
offset += 2;
proto_tree_add_item(tree, hf_vnc_server_red_shift,
tvb, offset, 1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_green_shift,
tvb, offset, 1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_server_blue_shift,
tvb, offset, 1, FALSE);
offset += 1;
proto_tree_add_item(tree, hf_vnc_padding,
tvb, offset, 3, FALSE);
offset += 3; /* Skip over 3 bytes of padding */
if(tvb_length_remaining(tvb, offset) > 0) {
/* Sometimes the desktop name & length is skipped */
proto_tree_add_item(tree, hf_vnc_desktop_name_len,
tvb, offset, 4, FALSE);
desktop_name_len = tvb_get_ntohl(tvb, offset);
offset += 4;
proto_tree_add_item(tree, hf_vnc_desktop_name,
tvb, offset, desktop_name_len,
FALSE);
}
if(per_conversation_info->security_type_selected == TIGHT)
per_conversation_info->vnc_next_state =
TIGHT_INTERACTION_CAPS;
else
per_conversation_info->vnc_next_state = NORMAL_TRAFFIC;
break;
case TIGHT_INTERACTION_CAPS :
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"TightVNC Interaction Capabilities");
proto_tree_add_item(tree, hf_vnc_num_server_message_types,
tvb, offset, 2, FALSE);
per_conversation_info->num_server_message_types = tvb_get_ntohs(tvb, offset);
offset += 2;
proto_tree_add_item(tree, hf_vnc_num_client_message_types,
tvb, offset, 2, FALSE);
per_conversation_info->num_client_message_types = tvb_get_ntohs(tvb, offset);
offset += 2;
proto_tree_add_item(tree, hf_vnc_num_encoding_types,
tvb, offset, 2, FALSE);
per_conversation_info->num_encoding_types = tvb_get_ntohs(tvb, offset);
offset += 2;
proto_tree_add_item(tree, hf_vnc_padding, tvb, offset, 2,
FALSE);
offset += 2;
per_conversation_info->vnc_next_state = TIGHT_INTERACTION_CAPS_LIST;
break;
case TIGHT_INTERACTION_CAPS_LIST:
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"TightVNC Interaction Capabilities list");
offset = process_tight_capabilities(tree,
hf_vnc_tight_server_message_type,
hf_vnc_tight_server_vendor,
hf_vnc_tight_server_name,
tvb, offset, per_conversation_info->num_server_message_types);
offset = process_tight_capabilities(tree,
hf_vnc_tight_client_message_type,
hf_vnc_tight_client_vendor,
hf_vnc_tight_client_name,
tvb, offset, per_conversation_info->num_client_message_types);
offset = process_tight_capabilities(tree,
hf_vnc_tight_encoding_type,
hf_vnc_tight_encoding_vendor,
hf_vnc_tight_encoding_name,
tvb, offset, per_conversation_info->num_encoding_types);
per_conversation_info->vnc_next_state = NORMAL_TRAFFIC;
break;
case NORMAL_TRAFFIC :
return FALSE;
}
return TRUE;
}
static void
vnc_client_to_server(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
guint8 message_type;
proto_item *ti=NULL;
proto_tree *vnc_client_message_type_tree;
message_type = tvb_get_guint8(tvb, *offset);
ti = proto_tree_add_item(tree, hf_vnc_client_message_type, tvb,
*offset, 1, FALSE);
vnc_client_message_type_tree =
proto_item_add_subtree(ti, ett_vnc_client_message_type);
*offset += 1;
switch(message_type) {
case 0 :
vnc_client_set_pixel_format(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
case 2 :
vnc_client_set_encodings(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
case 3 :
vnc_client_framebuffer_update_request(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
case 4 :
vnc_client_key_event(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
case 5:
vnc_client_pointer_event(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
case 6 :
vnc_client_cut_text(tvb, pinfo, offset,
vnc_client_message_type_tree);
break;
default :
if (check_col(pinfo->cinfo, COL_INFO))
col_append_fstr(pinfo->cinfo, COL_INFO,
"Unknown client message type (%u)",
message_type);
break;
}
}
static void
vnc_server_to_client(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
gint start_offset;
guint8 message_type;
gint bytes_needed = 0, length_remaining;
proto_item *ti=NULL;
proto_tree *vnc_server_message_type_tree;
start_offset = *offset;
message_type = tvb_get_guint8(tvb, *offset);
ti = proto_tree_add_item(tree, hf_vnc_server_message_type, tvb,
*offset, 1, FALSE);
vnc_server_message_type_tree =
proto_item_add_subtree(ti, ett_vnc_server_message_type);
*offset += 1;
switch(message_type) {
case 0 :
bytes_needed =
vnc_server_framebuffer_update(tvb, pinfo, offset,
vnc_server_message_type_tree);
break;
case 1 :
bytes_needed = vnc_server_set_colormap_entries(tvb, pinfo, offset, vnc_server_message_type_tree);
break;
case 2 :
vnc_server_ring_bell(tvb, pinfo, offset,
vnc_server_message_type_tree);
break;
case 3 :
bytes_needed = vnc_server_cut_text(tvb, pinfo, offset,
vnc_server_message_type_tree);
break;
default :
if (check_col(pinfo->cinfo, COL_INFO))
col_append_str(pinfo->cinfo, COL_INFO,
"Unknown server message type");
break;
}
if(bytes_needed > 0 && vnc_preference_desegment &&
pinfo->can_desegment) {
length_remaining = tvb_length_remaining(tvb, *offset);
pinfo->desegment_offset = start_offset;
pinfo->desegment_len = bytes_needed - length_remaining;
return;
}
}
static void
vnc_client_set_pixel_format(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Client set pixel format");
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset,
3, FALSE);
*offset += 3; /* Skip over 3 bytes of padding */
proto_tree_add_item(tree, hf_vnc_client_bits_per_pixel, tvb, *offset,
1, FALSE);
vnc_bytes_per_pixel = tvb_get_guint8(tvb, *offset)/8;
vnc_set_bytes_per_pixel(pinfo, vnc_bytes_per_pixel);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_depth, tvb, *offset,
1, FALSE);
vnc_depth = tvb_get_guint8(tvb, *offset);
vnc_set_depth(pinfo, vnc_depth);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_big_endian_flag, tvb, *offset,
1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_true_color_flag, tvb, *offset,
1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_red_max, tvb, *offset,
2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_client_green_max, tvb, *offset,
2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_client_blue_max, tvb, *offset,
2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_client_red_shift, tvb, *offset,
1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_green_shift, tvb, *offset,
1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_client_blue_shift, tvb, *offset,
1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset,
3, FALSE);
*offset += 3; /* Skip over 3 bytes of padding */
}
static void
vnc_client_set_encodings(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
guint16 number_of_encodings;
guint counter;
vnc_packet_t *per_packet_info;
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Client set encodings");
proto_tree_add_item(tree, hf_vnc_padding,
tvb, *offset, 1, FALSE);
*offset += 1; /* Skip over 1 byte of padding */
number_of_encodings = tvb_get_ntohs(tvb, *offset);
proto_tree_add_text(tree, tvb, *offset, 2,
"Number of encodings: %d", number_of_encodings);
*offset += 2;
per_packet_info->preferred_encoding = -1;
for(counter = 1; counter <= number_of_encodings; counter++) {
proto_tree_add_item(tree,
hf_vnc_client_set_encodings_encoding_type,
tvb, *offset, 4, FALSE);
/* Remember the first real encoding as the preferred encoding,
* per xserver/hw/vnc/rfbserver.c:rfbProcessClientNormalMessage().
* Otherwise, use RAW as the preferred encoding.
*/
if (per_packet_info->preferred_encoding == -1) {
int encoding;
encoding = tvb_get_ntohl(tvb, *offset);
switch(encoding) {
case ENCODING_RAW:
case ENCODING_RRE:
case ENCODING_CORRE:
case ENCODING_HEXTILE:
case ENCODING_ZLIB:
case ENCODING_TIGHT:
per_packet_info->preferred_encoding = encoding;
break;
}
}
*offset += 4;
}
if (per_packet_info->preferred_encoding == -1)
per_packet_info->preferred_encoding = ENCODING_RAW;
}
static void
vnc_client_framebuffer_update_request(tvbuff_t *tvb, packet_info *pinfo,
gint *offset, proto_tree *tree)
{
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Client framebuffer update request");
proto_tree_add_item(tree, hf_vnc_update_req_incremental,
tvb, *offset, 1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_update_req_x_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_update_req_y_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_update_req_width, tvb,
*offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_update_req_height, tvb,
*offset, 2, FALSE);
*offset += 2;
}
static void
vnc_client_key_event(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Client key event");
proto_tree_add_item(tree, hf_vnc_key_down, tvb, *offset, 1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset, 2, FALSE);
*offset += 2; /* Skip over 2 bytes of padding */
proto_tree_add_item(tree, hf_vnc_key, tvb, *offset, 4, FALSE);
*offset += 4;
}
static void
vnc_client_pointer_event(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Client pointer event");
proto_tree_add_item(tree, hf_vnc_button_1_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_2_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_3_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_4_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_5_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_6_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_7_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(tree, hf_vnc_button_8_pos, tvb, *offset, 1, FALSE);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_pointer_x_pos, tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_pointer_y_pos, tvb, *offset, 2, FALSE);
*offset += 2;
}
static void
vnc_client_cut_text(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
guint32 text_len;
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Client cut text");
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset, 3, FALSE);
*offset += 3; /* Skip over 3 bytes of padding */
text_len = tvb_get_ntohl(tvb, *offset);
proto_tree_add_item(tree, hf_vnc_client_cut_text_len, tvb, *offset, 4,
FALSE);
*offset += 4;
proto_tree_add_item(tree, hf_vnc_client_cut_text, tvb, *offset,
text_len, FALSE);
*offset += text_len;
}
static guint
vnc_server_framebuffer_update(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
gint num_rects, i;
guint16 width, height;
guint bytes_needed = 0;
gint32 encoding_type;
proto_item *ti, *ti_x, *ti_y, *ti_width, *ti_height;
proto_tree *vnc_rect_tree, *vnc_encoding_type_tree;
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Server framebuffer update");
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset, 1, FALSE);
*offset += 1;
num_rects = tvb_get_ntohs(tvb, *offset);
proto_tree_add_text(tree, tvb, *offset, 2, "Number of rectangles: %d",
num_rects);
*offset += 2;
for(i = 1; i <= num_rects; i++) {
VNC_BYTES_NEEDED(12);
ti = proto_tree_add_text(tree, tvb, *offset, 12,
"Rectangle #%d", i);
vnc_rect_tree =
proto_item_add_subtree(ti, ett_vnc_rect);
ti_x = proto_tree_add_item(vnc_rect_tree, hf_vnc_fb_update_x_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
ti_y = proto_tree_add_item(vnc_rect_tree, hf_vnc_fb_update_y_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
ti_width = proto_tree_add_item(vnc_rect_tree, hf_vnc_fb_update_width,
tvb, *offset, 2, FALSE);
width = tvb_get_ntohs(tvb, *offset);
*offset += 2;
ti_height = proto_tree_add_item(vnc_rect_tree, hf_vnc_fb_update_height,
tvb, *offset, 2, FALSE);
height = tvb_get_ntohs(tvb, *offset);
*offset += 2;
ti = proto_tree_add_item(vnc_rect_tree,
hf_vnc_fb_update_encoding_type,
tvb, *offset, 4, FALSE);
encoding_type = tvb_get_ntohl(tvb, *offset);
*offset += 4;
if (encoding_type == ENCODING_LAST_RECT)
break; /* exit the loop */
vnc_encoding_type_tree =
proto_item_add_subtree(ti, ett_vnc_encoding_type);
switch(encoding_type) {
case ENCODING_RAW:
bytes_needed = vnc_raw_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_COPY_RECT:
bytes_needed =
vnc_copyrect_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_RRE:
bytes_needed =
vnc_rre_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_HEXTILE:
bytes_needed =
vnc_hextile_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_RLE:
bytes_needed =
vnc_zrle_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_TIGHT:
bytes_needed =
vnc_tight_encoding(tvb, pinfo, offset,
vnc_encoding_type_tree,
width, height);
break;
case ENCODING_RICH_CURSOR:
case ENCODING_X_CURSOR:
proto_item_append_text (ti_x, " (hotspot X)");
proto_item_append_text (ti_y, " (hotspot Y)");
proto_item_append_text (ti_width, " (cursor width)");
proto_item_append_text (ti_height, " (cursor height)");
if (encoding_type == ENCODING_RICH_CURSOR)
bytes_needed = vnc_rich_cursor_encoding(tvb, pinfo, offset, vnc_encoding_type_tree, width, height);
else
bytes_needed = vnc_x_cursor_encoding(tvb, pinfo, offset, vnc_encoding_type_tree, width, height);
break;
case ENCODING_POINTER_POS:
proto_item_append_text (ti_x, " (pointer X)");
proto_item_append_text (ti_y, " (pointer Y)");
proto_item_append_text (ti_width, " (unused)");
proto_item_append_text (ti_height, " (unused)");
bytes_needed = 0;
break;
case ENCODING_DESKTOP_SIZE:
/* There is no payload for this message type */
bytes_needed = 0;
break;
}
/* Check if the routines above requested more bytes to
* be desegmented. */
if(bytes_needed > 0)
return bytes_needed;
}
return 0;
}
static guint
vnc_raw_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
{
guint8 bytes_per_pixel = vnc_get_bytes_per_pixel(pinfo);
guint length;
length = width * height * bytes_per_pixel;
VNC_BYTES_NEEDED(length);
proto_tree_add_item(tree, hf_vnc_raw_pixel_data, tvb, *offset,
length, FALSE);
*offset += length;
return 0; /* bytes_needed */
}
static guint
vnc_copyrect_encoding(tvbuff_t *tvb, packet_info *pinfo _U_, gint *offset,
proto_tree *tree, guint16 width _U_, guint16 height _U_)
{
proto_tree_add_item(tree, hf_vnc_copyrect_src_x_pos, tvb, *offset,
2, FALSE);
*offset += 2;
proto_tree_add_item(tree, hf_vnc_copyrect_src_y_pos, tvb, *offset,
2, FALSE);
*offset += 2;
return 0; /* bytes_needed */
}
static guint
vnc_rre_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width _U_, guint16 height _U_)
{
guint8 bytes_per_pixel = vnc_get_bytes_per_pixel(pinfo);
guint32 num_subrects, i;
guint bytes_needed;
proto_item *ti;
proto_tree *subrect_tree;
VNC_BYTES_NEEDED(4);
proto_tree_add_item(tree, hf_vnc_rre_num_subrects, tvb, *offset,
4, FALSE);
num_subrects = tvb_get_ntohl(tvb, *offset);
*offset += 4;
VNC_BYTES_NEEDED(bytes_per_pixel);
proto_tree_add_item(tree, hf_vnc_rre_bg_pixel, tvb, *offset,
bytes_per_pixel, FALSE);
*offset += bytes_per_pixel;
for(i = 1; i <= num_subrects; i++) {
bytes_needed = bytes_per_pixel + 8;
VNC_BYTES_NEEDED(bytes_needed);
ti = proto_tree_add_text(tree, tvb, *offset, bytes_per_pixel +
8, "Subrectangle #%d", i);
subrect_tree =
proto_item_add_subtree(ti, ett_vnc_rre_subrect);
proto_tree_add_item(subrect_tree, hf_vnc_rre_subrect_pixel,
tvb, *offset, bytes_per_pixel, FALSE);
*offset += bytes_per_pixel;
proto_tree_add_item(subrect_tree, hf_vnc_rre_subrect_x_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(subrect_tree, hf_vnc_rre_subrect_y_pos,
tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(subrect_tree, hf_vnc_rre_subrect_width,
tvb, *offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(subrect_tree, hf_vnc_rre_subrect_height,
tvb, *offset, 2, FALSE);
*offset += 2;
}
return 0; /* bytes_needed */
}
static guint
vnc_hextile_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
{
guint8 bytes_per_pixel = vnc_get_bytes_per_pixel(pinfo);
guint8 i, subencoding_mask, num_subrects, subrect_len;
guint length;
proto_tree *subencoding_mask_tree, *subrect_tree, *num_subrects_tree;
proto_item *ti;
VNC_BYTES_NEEDED(1);
ti = proto_tree_add_item(tree, hf_vnc_hextile_subencoding_mask, tvb,
*offset, 1, FALSE);
subencoding_mask = tvb_get_guint8(tvb, *offset);
subencoding_mask_tree =
proto_item_add_subtree(ti, ett_vnc_hextile_subencoding_mask);
proto_tree_add_item(subencoding_mask_tree,
hf_vnc_hextile_raw, tvb, *offset, 1,
FALSE);
proto_tree_add_item(subencoding_mask_tree,
hf_vnc_hextile_bg, tvb, *offset, 1,
FALSE);
proto_tree_add_item(subencoding_mask_tree,
hf_vnc_hextile_fg, tvb, *offset, 1,
FALSE);
proto_tree_add_item(subencoding_mask_tree,
hf_vnc_hextile_anysubrects, tvb, *offset, 1,
FALSE);
proto_tree_add_item(subencoding_mask_tree,
hf_vnc_hextile_subrectscolored, tvb, *offset, 1,
FALSE);
*offset += 1;
if(subencoding_mask & 0x1) { /* Raw */
length = width * height * bytes_per_pixel;
VNC_BYTES_NEEDED(length);
proto_tree_add_item(tree, hf_vnc_hextile_raw_value, tvb,
*offset, length, FALSE);
*offset += length;
} else {
if(subencoding_mask & 0x2) { /* Background Specified */
proto_tree_add_item(tree, hf_vnc_hextile_bg_value,
tvb, *offset, bytes_per_pixel,
FALSE);
*offset += bytes_per_pixel;
}
if(subencoding_mask & 0x4) { /* Foreground Specified */
proto_tree_add_item(tree, hf_vnc_hextile_fg_value,
tvb, *offset, bytes_per_pixel,
FALSE);
*offset += bytes_per_pixel;
}
if(subencoding_mask & 0x8) { /* Any Subrects */
ti = proto_tree_add_item(tree,
hf_vnc_hextile_num_subrects,
tvb, *offset, 1,
FALSE);
num_subrects = tvb_get_guint8(tvb, *offset);
*offset += 1;
num_subrects_tree =
proto_item_add_subtree(ti, ett_vnc_hextile_num_subrects);
for(i = 1; i <= num_subrects; i++) {
if(subencoding_mask & 0x16)
subrect_len = bytes_per_pixel + 2;
else
subrect_len = 2;
ti = proto_tree_add_text(num_subrects_tree, tvb,
*offset, subrect_len,
"Subrectangle #%d", i);
subrect_tree =
proto_item_add_subtree(ti, ett_vnc_hextile_subrect);
if(subencoding_mask & 0x16) {
/* Subrects Colored */
proto_tree_add_item(subrect_tree, hf_vnc_hextile_subrect_pixel_value, tvb, *offset, bytes_per_pixel, FALSE);
*offset += bytes_per_pixel;
}
proto_tree_add_item(subrect_tree,
hf_vnc_hextile_subrect_x_pos, tvb, *offset, 1, FALSE);
proto_tree_add_item(subrect_tree, hf_vnc_hextile_subrect_y_pos, tvb, *offset, 1, FALSE);
*offset += 1;
proto_tree_add_item(subrect_tree, hf_vnc_hextile_subrect_width, tvb, *offset, 1, FALSE);
proto_tree_add_item(subrect_tree, hf_vnc_hextile_subrect_height, tvb, *offset, 1, FALSE);
*offset += 1;
}
}
}
return 0; /* bytes_needed */
}
#ifdef HAVE_LIBZ
static guint
vnc_zrle_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
#else
static guint
vnc_zrle_encoding(tvbuff_t *tvb, packet_info *pinfo _U_, gint *offset,
proto_tree *tree, guint16 width _U_, guint16 height _U_)
#endif
{
guint32 data_len;
#ifdef HAVE_LIBZ
guint8 palette_size;
guint8 bytes_per_cpixel = vnc_get_bytes_per_pixel(pinfo);
gint uncomp_offset = 0;
guint length;
gint subencoding_type;
tvbuff_t *uncomp_tvb = NULL;
proto_tree *zrle_subencoding_tree;
proto_item *ti;
#endif
VNC_BYTES_NEEDED(4);
proto_tree_add_item(tree, hf_vnc_zrle_len, tvb, *offset,
4, FALSE);
data_len = tvb_get_ntohl(tvb, *offset);
*offset += 4;
VNC_BYTES_NEEDED(data_len);
proto_tree_add_item(tree, hf_vnc_zrle_data, tvb, *offset,
data_len, FALSE);
#ifdef HAVE_LIBZ
uncomp_tvb = tvb_child_uncompress(tvb, tvb, *offset, data_len);
if(uncomp_tvb != NULL) {
add_new_data_source(pinfo, uncomp_tvb,
"Uncompressed ZRLE data");
ti = proto_tree_add_item(tree, hf_vnc_zrle_subencoding,
uncomp_tvb, uncomp_offset, 1, FALSE);
zrle_subencoding_tree =
proto_item_add_subtree(ti, ett_vnc_zrle_subencoding);
proto_tree_add_item(zrle_subencoding_tree, hf_vnc_zrle_rle,
uncomp_tvb, uncomp_offset, 1, FALSE);
proto_tree_add_item(zrle_subencoding_tree,
hf_vnc_zrle_palette_size, uncomp_tvb,
uncomp_offset, 1, FALSE);
subencoding_type = tvb_get_guint8(uncomp_tvb, uncomp_offset);
palette_size = subencoding_type & 0x7F;
uncomp_offset += 1;
if(subencoding_type == 0) { /* Raw */
length = width * height * bytes_per_cpixel;
VNC_BYTES_NEEDED(length);
/* XXX - not working yet! */
proto_tree_add_item(zrle_subencoding_tree,
hf_vnc_zrle_raw, uncomp_tvb,
uncomp_offset, length, FALSE);
} else if(subencoding_type >= 130 && subencoding_type <= 255) {
length = palette_size * bytes_per_cpixel;
VNC_BYTES_NEEDED(length);
proto_tree_add_item(zrle_subencoding_tree,
hf_vnc_zrle_palette, uncomp_tvb,
uncomp_offset, length, FALSE);
/* XXX - Not complete! */
}
} else {
proto_tree_add_text(tree, tvb, *offset, data_len,
"Decompression of ZRLE data failed");
}
#endif /* HAVE_LIBZ */
*offset += data_len;
return 0; /* bytes_needed */
}
static guint
read_compact_len(tvbuff_t *tvb, gint *offset, gint *length, gint *value_length)
{
gint b;
VNC_BYTES_NEEDED(1);
*value_length = 0;
b = tvb_get_guint8(tvb, *offset);
*offset += 1;
*value_length += 1;
*length = b & 0x7f;
if ((b & 0x80) != 0) {
VNC_BYTES_NEEDED(1);
b = tvb_get_guint8(tvb, *offset);
*offset += 1;
*value_length += 1;
*length |= (b & 0x7f) << 7;
if ((b & 0x80) != 0) {
VNC_BYTES_NEEDED (1);
b = tvb_get_guint8(tvb, *offset);
*offset += 1;
*value_length += 1;
*length |= (b & 0xff) << 14;
}
}
return 0;
}
static guint
process_compact_length_and_image_data(tvbuff_t *tvb, gint *offset, proto_tree *tree)
{
guint bytes_needed;
guint length, value_length;
bytes_needed = read_compact_len (tvb, offset, &length, &value_length);
if (bytes_needed != 0)
return bytes_needed;
proto_tree_add_uint(tree, hf_vnc_tight_image_len, tvb, *offset - value_length, value_length, length);
VNC_BYTES_NEEDED(length);
proto_tree_add_item(tree, hf_vnc_tight_image_data, tvb, *offset, length, FALSE);
*offset += length;
return 0; /* bytes_needed */
}
static guint
process_tight_rect_filter_palette(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, gint *bits_per_pixel)
{
vnc_packet_t *per_packet_info;
gint num_colors;
guint palette_bytes;
/* See TightVNC's vnc_unixsrc/vncviewer/tight.c:InitFilterPaletteBPP() */
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
VNC_BYTES_NEEDED(1);
proto_tree_add_item(tree, hf_vnc_tight_palette_num_colors, tvb, *offset, 1, FALSE);
num_colors = tvb_get_guint8(tvb, *offset);
*offset += 1;
num_colors++;
if (num_colors < 2)
return 0;
if (per_packet_info->depth == 24)
palette_bytes = num_colors * 3;
else
palette_bytes = num_colors * per_packet_info->depth / 8;
VNC_BYTES_NEEDED(palette_bytes);
proto_tree_add_item(tree, hf_vnc_tight_palette_data, tvb, *offset, palette_bytes, FALSE);
*offset += palette_bytes;
/* This is the number of bits per pixel *in the image data*, not the actual client depth */
if (num_colors == 2)
*bits_per_pixel = 1;
else
*bits_per_pixel = 8;
return 0;
}
static guint
vnc_tight_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
{
vnc_packet_t *per_packet_info;
guint8 comp_ctl;
proto_item *compression_type_ti;
gint bit_offset;
gint bytes_needed = -1;
/* unused arguments */
(void) width;
(void) height;
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
/* See xserver/hw/vnc/rfbproto.h and grep for "Tight Encoding." for the following layout */
VNC_BYTES_NEEDED(1);
/* least significant bits 0-3 are "reset compression stream N" */
bit_offset = *offset * 8;
proto_tree_add_bits_item(tree, hf_vnc_tight_reset_stream0, tvb, bit_offset + 7, 1, FALSE);
proto_tree_add_bits_item(tree, hf_vnc_tight_reset_stream1, tvb, bit_offset + 6, 1, FALSE);
proto_tree_add_bits_item(tree, hf_vnc_tight_reset_stream2, tvb, bit_offset + 5, 1, FALSE);
proto_tree_add_bits_item(tree, hf_vnc_tight_reset_stream3, tvb, bit_offset + 4, 1, FALSE);
/* most significant bits 4-7 are "compression type" */
compression_type_ti = proto_tree_add_bits_item(tree, hf_vnc_tight_rect_type, tvb, bit_offset + 0, 4, FALSE);
comp_ctl = tvb_get_guint8(tvb, *offset);
*offset += 1;
comp_ctl >>= 4; /* skip over the "reset compression" bits from above */
/* compression format */
if (comp_ctl == TIGHT_RECT_FILL) {
/* "fill" encoding (solid rectangle) */
proto_item_append_text(compression_type_ti, " (fill encoding - solid rectangle)");
if (per_packet_info->depth == 24) {
VNC_BYTES_NEEDED(3);
proto_tree_add_item(tree, hf_vnc_tight_fill_color, tvb, *offset, 3, FALSE);
*offset += 3;
} else {
VNC_BYTES_NEEDED(per_packet_info->bytes_per_pixel);
proto_tree_add_item(tree, hf_vnc_tight_fill_color, tvb, *offset, per_packet_info->bytes_per_pixel, FALSE);
*offset += per_packet_info->bytes_per_pixel;
}
bytes_needed = 0;
} else if (comp_ctl == TIGHT_RECT_JPEG) {
/* jpeg encoding */
proto_item_append_text(compression_type_ti, " (JPEG encoding)");
bytes_needed = process_compact_length_and_image_data(tvb, offset, tree);
if (bytes_needed != 0)
return bytes_needed;
} else if (comp_ctl > TIGHT_RECT_MAX_VALUE) {
/* invalid encoding */
proto_item_append_text(compression_type_ti, " (invalid encoding)");
DISSECTOR_ASSERT_NOT_REACHED();
} else {
guint row_size;
gint bits_per_pixel;
/* basic encoding */
proto_item_append_text(compression_type_ti, " (basic encoding)");
proto_tree_add_bits_item(tree, hf_vnc_tight_filter_flag, tvb, bit_offset + 1, 1, FALSE);
bits_per_pixel = per_packet_info->depth;
if ((comp_ctl & TIGHT_RECT_EXPLICIT_FILTER_FLAG) != 0) {
guint8 filter_id;
/* explicit filter */
VNC_BYTES_NEEDED(1);
proto_tree_add_item(tree, hf_vnc_tight_filter_id, tvb, *offset, 1, FALSE);
filter_id = tvb_get_guint8(tvb, *offset);
*offset += 1;
switch (filter_id) {
case TIGHT_RECT_FILTER_COPY:
/* nothing to do */
break;
case TIGHT_RECT_FILTER_PALETTE:
bytes_needed = process_tight_rect_filter_palette(tvb, pinfo, offset, tree, &bits_per_pixel);
if (bytes_needed != 0)
return bytes_needed;
break;
case TIGHT_RECT_FILTER_GRADIENT:
/* nothing to do */
break;
}
} else {
/* this is the same case as TIGHT_RECT_FILTER_COPY, so there's nothing special to do */
}
row_size = ((guint) width * bits_per_pixel + 7) / 8;
if (row_size * height < TIGHT_MIN_BYTES_TO_COMPRESS) {
guint num_bytes;
/* The data is not compressed; just skip over it */
num_bytes = row_size * height;
VNC_BYTES_NEEDED(num_bytes);
proto_tree_add_item(tree, hf_vnc_tight_image_data, tvb, *offset, num_bytes, FALSE);
*offset += num_bytes;
bytes_needed = 0;
} else {
/* The data is compressed; read its length and data */
bytes_needed = process_compact_length_and_image_data(tvb, offset, tree);
if (bytes_needed != 0)
return bytes_needed;
}
}
DISSECTOR_ASSERT(bytes_needed != -1);
return bytes_needed;
}
static guint
decode_cursor(tvbuff_t *tvb, gint *offset, proto_tree *tree,
guint pixels_bytes, guint mask_bytes)
{
guint total_bytes;
total_bytes = pixels_bytes + mask_bytes;
VNC_BYTES_NEEDED (total_bytes);
proto_tree_add_item(tree, hf_vnc_cursor_encoding_pixels, tvb, *offset,
pixels_bytes, FALSE);
*offset += pixels_bytes;
proto_tree_add_item(tree, hf_vnc_cursor_encoding_bitmask, tvb, *offset,
mask_bytes, FALSE);
*offset += mask_bytes;
return 0; /* bytes_needed */
}
static guint
vnc_rich_cursor_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
{
guint8 bytes_per_pixel = vnc_get_bytes_per_pixel(pinfo);
guint pixels_bytes, mask_bytes;
pixels_bytes = width * height * bytes_per_pixel;
mask_bytes = ((width + 7) / 8) * height;
return decode_cursor(tvb, offset, tree,
pixels_bytes, mask_bytes);
}
static guint
vnc_x_cursor_encoding(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree, guint16 width, guint16 height)
{
gint bitmap_row_bytes = (width + 7) / 8;
gint mask_bytes = bitmap_row_bytes * height;
(void) pinfo; /* unused argument */
VNC_BYTES_NEEDED (6);
proto_tree_add_item(tree, hf_vnc_cursor_x_fore_back, tvb, *offset, 6, FALSE);
*offset += 6;
/* The length of the pixel data is the same as the length of the mask data (X cursors are strictly black/white) */
return decode_cursor(tvb, offset, tree,
mask_bytes, mask_bytes);
}
static guint
vnc_server_set_colormap_entries(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
guint16 number_of_colors;
guint counter, bytes_needed;
proto_item *ti;
proto_tree *vnc_colormap_num_groups, *vnc_colormap_color_group;
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Server set colormap entries");
number_of_colors = tvb_get_ntohs(tvb, 4);
bytes_needed = (number_of_colors * 6) + 6;
VNC_BYTES_NEEDED(bytes_needed);
ti = proto_tree_add_item(tree, hf_vnc_server_message_type, tvb,
*offset, 1, FALSE);
tree = proto_item_add_subtree(ti, ett_vnc_server_message_type);
*offset += 1;
proto_tree_add_item(tree, hf_vnc_padding, tvb, *offset, 1, FALSE);
*offset += 1; /* Skip over 1 byte of padding */
proto_tree_add_item(tree,
hf_vnc_colormap_first_color,
tvb, *offset, 2, FALSE);
*offset += 2;
ti = proto_tree_add_item(tree, hf_vnc_colormap_num_colors, tvb,
*offset, 2, FALSE);
vnc_colormap_num_groups =
proto_item_add_subtree(ti, ett_vnc_colormap_num_groups);
*offset += 2;
for(counter = 1; counter <= number_of_colors; counter++) {
ti = proto_tree_add_text(vnc_colormap_num_groups, tvb,
*offset, 6,
"Color group #%d", counter);
vnc_colormap_color_group =
proto_item_add_subtree(ti,
ett_vnc_colormap_color_group);
proto_tree_add_item(vnc_colormap_color_group,
hf_vnc_colormap_red, tvb,
*offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(vnc_colormap_color_group,
hf_vnc_colormap_green, tvb,
*offset, 2, FALSE);
*offset += 2;
proto_tree_add_item(vnc_colormap_color_group,
hf_vnc_colormap_blue, tvb,
*offset, 2, FALSE);
*offset += 2;
}
return *offset;
}
static void
vnc_server_ring_bell(tvbuff_t *tvb _U_, packet_info *pinfo, gint *offset _U_,
proto_tree *tree _U_)
{
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO, "Server ring bell on client");
/* This message type has no payload... */
}
static guint
vnc_server_cut_text(tvbuff_t *tvb, packet_info *pinfo, gint *offset,
proto_tree *tree)
{
guint32 text_len;
if (check_col(pinfo->cinfo, COL_INFO))
col_set_str(pinfo->cinfo, COL_INFO,
"Server cut text");
text_len = tvb_get_ntohl(tvb, *offset);
proto_tree_add_item(tree,
hf_vnc_server_cut_text_len, tvb, *offset, 4,
FALSE);
*offset += 4;
VNC_BYTES_NEEDED(text_len);
proto_tree_add_item(tree, hf_vnc_server_cut_text, tvb, *offset,
text_len, FALSE);
*offset += text_len;
return *offset;
}
static void
vnc_set_bytes_per_pixel(packet_info *pinfo, guint8 bytes_per_pixel)
{
vnc_packet_t *per_packet_info;
/* The per_packet_info has already been created by the
* vnc_startup_messages() routine. */
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
per_packet_info->bytes_per_pixel = bytes_per_pixel;
}
static void
vnc_set_depth(packet_info *pinfo, guint8 depth)
{
vnc_packet_t *per_packet_info;
/* The per_packet_info has already been created by the
* vnc_startup_messages() routine. */
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
per_packet_info->depth = depth;
}
static guint8
vnc_get_bytes_per_pixel(packet_info *pinfo)
{
vnc_packet_t *per_packet_info;
/* The per_packet_info has already been created by the
* vnc_startup_messages() routine. */
per_packet_info = p_get_proto_data(pinfo->fd, proto_vnc);
return per_packet_info->bytes_per_pixel;
}
/* Register the protocol with Wireshark */
void
proto_register_vnc(void)
{
module_t *vnc_module; /* To handle our preferences */
/* Setup list of header fields */
static hf_register_info hf[] = {
{ &hf_vnc_padding,
{ "Padding", "vnc.padding",
FT_NONE, BASE_NONE, NULL, 0x0,
"Unused space", HFILL }
},
{ &hf_vnc_server_proto_ver,
{ "Server protocol version", "vnc.server_proto_ver",
FT_STRING, BASE_NONE, NULL, 0x0,
"VNC protocol version on server", HFILL }
},
{ &hf_vnc_client_proto_ver,
{ "Client protocol version", "vnc.client_proto_ver",
FT_STRING, BASE_NONE, NULL, 0x0,
"VNC protocol version on client", HFILL }
},
{ &hf_vnc_num_security_types,
{ "Number of security types", "vnc.num_security_types",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of security (authentication) types supported by the server", HFILL }
},
{ &hf_vnc_security_type,
{ "Security type", "vnc.security_type",
FT_UINT8, BASE_DEC, VALS(security_types_vs), 0x0,
"Security types offered by the server (VNC versions => 3.007", HFILL }
},
{ &hf_vnc_server_security_type,
{ "Security type", "vnc.server_security_type",
FT_UINT32, BASE_DEC, VALS(security_types_vs), 0x0,
"Security type mandated by the server", HFILL }
},
{ &hf_vnc_client_security_type,
{ "Security type selected", "vnc.security_type",
FT_UINT8, BASE_DEC, VALS(security_types_vs), 0x0,
"Security type selected by the client", HFILL }
},
{ &hf_vnc_tight_num_tunnel_types,
{ "Number of supported tunnel types", "vnc.num_tunnel_types",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Number of tunnel types for TightVNC", HFILL }
},
{ &hf_vnc_tight_tunnel_type,
{ "Tunnel type", "vnc.tunnel_type",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Tunnel type specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_num_auth_types,
{ "Number of supported authentication types", "vnc.num_auth_types",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Authentication types specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_auth_type,
{ "Authentication type", "vnc.auth_type",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Authentication type specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_server_message_type,
{ "Server message type", "vnc.server_message_type",
FT_INT32, BASE_DEC, NULL, 0x0,
"Server message type specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_server_vendor,
{ "Server vendor code", "vnc.server_vendor",
FT_STRING, BASE_NONE, NULL, 0x0,
"Server vendor code specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_server_name,
{ "Server name", "vnc.server_name",
FT_STRING, BASE_NONE, NULL, 0x0,
"Server name specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_client_message_type,
{ "Client message type", "vnc.client_message_type",
FT_INT32, BASE_DEC, NULL, 0x0,
"Client message type specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_client_vendor,
{ "Client vendor code", "vnc.client_vendor",
FT_STRING, BASE_NONE, NULL, 0x0,
"Client vendor code specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_client_name,
{ "Client name", "vnc.client_name",
FT_STRING, BASE_NONE, NULL, 0x0,
"Client name specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_encoding_type,
{ "Encoding type", "vnc.encoding_type",
FT_INT32, BASE_DEC, NULL, 0x0,
"Encoding type specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_encoding_vendor,
{ "Encoding vendor code", "vnc.encoding_vendor",
FT_STRING, BASE_NONE, NULL, 0x0,
"Encoding vendor code specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_encoding_name,
{ "Encoding name", "vnc.encoding_name",
FT_STRING, BASE_NONE, NULL, 0x0,
"Encoding name specific to TightVNC", HFILL }
},
{ &hf_vnc_tight_reset_stream0,
{ "Reset compression stream 0", "vnc.tight_reset_stream0",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Tight compression, reset compression stream 0", HFILL }
},
{ &hf_vnc_tight_reset_stream1,
{ "Reset compression stream 1", "vnc.tight_reset_stream0",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Tight compression, reset compression stream 1", HFILL }
},
{ &hf_vnc_tight_reset_stream2,
{ "Reset compression stream 2", "vnc.tight_reset_stream0",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Tight compression, reset compression stream 2", HFILL }
},
{ &hf_vnc_tight_reset_stream3,
{ "Reset compression stream 3", "vnc.tight_reset_stream0",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Tight compression, reset compression stream 3", HFILL }
},
{ &hf_vnc_tight_rect_type,
{ "Rectangle type", "vnc.tight_rect_type",
FT_UINT8, BASE_HEX, NULL, 0x0,
"Tight compression, rectangle type", HFILL }
},
{ &hf_vnc_tight_image_len,
{ "Image data length", "vnc.tight_image_len",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Tight compression, length of image data", HFILL }
},
{ &hf_vnc_tight_image_data,
{ "Image data", "vnc.tight_image_data",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Tight compression, image data", HFILL }
},
{ &hf_vnc_tight_fill_color,
{ "Fill color (RGB)", "vnc.tight_fill_color",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Tight compression, fill color for solid rectangle", HFILL }
},
{ &hf_vnc_tight_filter_flag,
{ "Explicit filter flag", "vnc.tight_filter_flag",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Tight compression, explicit filter flag", HFILL }
},
{ &hf_vnc_tight_filter_id,
{ "Filter ID", "vnc.tight_filter_id",
FT_UINT8, BASE_DEC, VALS(tight_filter_ids_vs), 0x0,
"Tight compression, filter ID", HFILL }
},
{ &hf_vnc_tight_palette_num_colors,
{ "Number of colors in palette", "vnc.tight_palette_num_colors",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Tight compression, number of colors in rectangle's palette", HFILL }
},
{ &hf_vnc_tight_palette_data,
{ "Palette data", "vnc.tight_palette_data",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Tight compression, palette data for a rectangle", HFILL }
},
{ &hf_vnc_vendor_code,
{ "Vendor code", "vnc.vendor_code",
FT_STRING, BASE_NONE, NULL, 0x0,
"Identifies the VNC server software's vendor", HFILL }
},
{ &hf_vnc_security_type_string,
{ "Security type string", "vnc.security_type_string",
FT_STRING, BASE_NONE, NULL, 0x0,
"Security type being used", HFILL }
},
{ &hf_vnc_auth_challenge,
{ "Authentication challenge", "vnc.auth_challenge",
FT_STRING, BASE_NONE, NULL, 0x0,
"Random authentication challenge from server to client", HFILL }
},
{ &hf_vnc_auth_response,
{ "Authentication response", "vnc.auth_response",
FT_STRING, BASE_NONE, NULL, 0x0,
"Client's encrypted response to the server's authentication challenge", HFILL }
},
{ &hf_vnc_auth_result,
{ "Authentication result", "vnc.auth_result",
FT_UINT32, BASE_DEC, VALS(auth_result_vs), 0x0,
"Authentication result", HFILL }
},
{ &hf_vnc_auth_error,
{ "Authentication error", "vnc.auth_error",
FT_STRING, BASE_NONE, NULL, 0x0,
"Authentication error (present only if the authentication result is fail", HFILL }
},
{ &hf_vnc_share_desktop_flag,
{ "Share desktop flag", "vnc.share_desktop_flag",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x0,
"Client's desire to share the server's desktop with other clients", HFILL }
},
{ &hf_vnc_width,
{ "Framebuffer width", "vnc.width",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Width of the framebuffer (screen) in pixels", HFILL }
},
{ &hf_vnc_height,
{ "Framebuffer height", "vnc.width",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Height of the framebuffer (screen) in pixels", HFILL }
},
{ &hf_vnc_server_bits_per_pixel,
{ "Bits per pixel", "vnc.server_bits_per_pixel",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of bits used by server for each pixel value on the wire from the server", HFILL }
},
{ &hf_vnc_server_depth,
{ "Depth", "vnc.server_depth",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of useful bits in the pixel value on server", HFILL }
},
{ &hf_vnc_server_big_endian_flag,
{ "Big endian flag", "vnc.server_big_endian_flag",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"True if multi-byte pixels are interpreted as big endian by server", HFILL }
},
{ &hf_vnc_server_true_color_flag,
{ "True color flag", "vnc.server_true_color_flag",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"If true, then the next six items specify how to extract the red, green and blue intensities from the pixel value on the server.", HFILL }
},
{ &hf_vnc_server_red_max,
{ "Red maximum", "vnc.server_red_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum red value on server as n: 2^n - 1", HFILL }
},
{ &hf_vnc_server_green_max,
{ "Green maximum", "vnc.server_green_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum green value on server as n: 2^n - 1", HFILL }
},
{ &hf_vnc_server_blue_max,
{ "Blue maximum", "vnc.server_blue_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum blue value on server as n: 2^n - 1", HFILL }
},
{ &hf_vnc_server_red_shift,
{ "Red shift", "vnc.server_red_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the red value in a pixel to the least significant bit on the server", HFILL }
},
{ &hf_vnc_server_green_shift,
{ "Green shift", "vnc.server_green_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the green value in a pixel to the least significant bit on the server", HFILL }
},
{ &hf_vnc_server_blue_shift,
{ "Blue shift", "vnc.server_blue_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the blue value in a pixel to the least significant bit on the server", HFILL }
},
{ &hf_vnc_desktop_name_len,
{ "Desktop name length", "vnc.desktop_name_len",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Length of desktop name in bytes", HFILL }
},
{ &hf_vnc_desktop_name,
{ "Desktop name", "vnc.desktop_name",
FT_STRING, BASE_NONE, NULL, 0x0,
"Name of the VNC desktop on the server", HFILL }
},
{ &hf_vnc_num_server_message_types,
{ "Server message types", "vnc.num_server_message_types",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Unknown", HFILL } /* XXX - Needs description */
},
{ &hf_vnc_num_client_message_types,
{ "Client message types", "vnc.num_client_message_types",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Unknown", HFILL } /* XXX - Needs description */
},
{ &hf_vnc_num_encoding_types,
{ "Encoding types", "vnc.num_encoding_types",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Unknown", HFILL } /* XXX - Needs description */
},
{ &hf_vnc_client_message_type,
{ "Client Message Type", "vnc.client_message_type",
FT_UINT8, BASE_DEC, VALS(client_message_types_vs), 0x0,
"Message type from client", HFILL }
},
{ &hf_vnc_client_bits_per_pixel,
{ "Bits per pixel", "vnc.client_bits_per_pixel",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of bits used by server for each pixel value on the wire from the client", HFILL }
},
{ &hf_vnc_client_depth,
{ "Depth", "vnc.client_depth",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of useful bits in the pixel value on client", HFILL }
},
{ &hf_vnc_client_big_endian_flag,
{ "Big endian flag", "vnc.client_big_endian_flag",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"True if multi-byte pixels are interpreted as big endian by client", HFILL }
},
{ &hf_vnc_client_true_color_flag,
{ "True color flag", "vnc.client_true_color_flag",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"If true, then the next six items specify how to extract the red, green and blue intensities from the pixel value on the client.", HFILL }
},
{ &hf_vnc_client_red_max,
{ "Red maximum", "vnc.client_red_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum red value on client as n: 2^n - 1", HFILL }
},
{ &hf_vnc_client_green_max,
{ "Green maximum", "vnc.client_green_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum green value on client as n: 2^n - 1", HFILL }
},
{ &hf_vnc_client_blue_max,
{ "Blue maximum", "vnc.client_blue_max",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Maximum blue value on client as n: 2^n - 1", HFILL }
},
{ &hf_vnc_client_red_shift,
{ "Red shift", "vnc.client_red_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the red value in a pixel to the least significant bit on the client", HFILL }
},
{ &hf_vnc_client_green_shift,
{ "Green shift", "vnc.client_green_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the green value in a pixel to the least significant bit on the client", HFILL }
},
{ &hf_vnc_client_blue_shift,
{ "Blue shift", "vnc.client_blue_shift",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of shifts needed to get the blue value in a pixel to the least significant bit on the client", HFILL }
},
/* Client Key Event */
{ &hf_vnc_key_down,
{ "Key down", "vnc.key_down",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x0,
"Specifies whether the key is being pressed or not", HFILL }
},
{ &hf_vnc_key,
{ "Key", "vnc.key",
FT_UINT32, BASE_HEX, VALS(keysym_vals_source), 0x0, /* keysym_vals_source is from packet-x11-keysym.h */
"Key being pressed/depressed", HFILL }
},
/* Client Pointer Event */
{ &hf_vnc_button_1_pos,
{ "Mouse button #1 position", "vnc.button_1_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x1,
"Whether mouse button #1 is being pressed or not", HFILL }
},
{ &hf_vnc_button_2_pos,
{ "Mouse button #2 position", "vnc.button_2_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x2,
"Whether mouse button #2 is being pressed or not", HFILL }
},
{ &hf_vnc_button_3_pos,
{ "Mouse button #3 position", "vnc.button_3_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x4,
"Whether mouse button #3 is being pressed or not", HFILL }
},
{ &hf_vnc_button_4_pos,
{ "Mouse button #4 position", "vnc.button_4_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x8,
"Whether mouse button #4 is being pressed or not", HFILL }
},
{ &hf_vnc_button_5_pos,
{ "Mouse button #5 position", "vnc.button_5_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x10,
"Whether mouse button #5 is being pressed or not", HFILL }
},
{ &hf_vnc_button_6_pos,
{ "Mouse button #6 position", "vnc.button_6_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x20,
"Whether mouse button #6 is being pressed or not", HFILL }
},
{ &hf_vnc_button_7_pos,
{ "Mouse button #7 position", "vnc.button_7_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x40,
"Whether mouse button #7 is being pressed or not", HFILL }
},
{ &hf_vnc_button_8_pos,
{ "Mouse button #8 position", "vnc.button_8_pos",
FT_UINT8, BASE_DEC, VALS(&button_mask_vs), 0x80,
"Whether mouse button #8 is being pressed or not", HFILL }
},
{ &hf_vnc_pointer_x_pos,
{ "X position", "vnc.pointer_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Position of mouse cursor on the x-axis", HFILL }
},
{ &hf_vnc_pointer_y_pos,
{ "Y position", "vnc.pointer_y_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Position of mouse cursor on the y-axis", HFILL }
},
{ &hf_vnc_client_set_encodings_encoding_type,
{ "Encoding type", "vnc.client_set_encodings_encoding_type",
FT_INT32, BASE_DEC, VALS(encoding_types_vs), 0x0,
"Type of encoding used to send pixel data from server to client", HFILL }
},
/* Client Framebuffer Update Request */
{ &hf_vnc_update_req_incremental,
{ "Incremental update", "vnc.update_req_incremental",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"Specifies if the client wants an incremental update instead of a full one", HFILL }
},
{ &hf_vnc_update_req_x_pos,
{ "X position", "vnc.update_req_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"X position of framebuffer (screen) update requested", HFILL }
},
{ &hf_vnc_update_req_y_pos,
{ "Y position", "vnc.update_req_y_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Y position of framebuffer (screen) update request", HFILL }
},
{ &hf_vnc_update_req_width,
{ "Width", "vnc.update_req_width",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Width of framebuffer (screen) update request", HFILL }
},
{ &hf_vnc_update_req_height,
{ "Height", "vnc.update_req_height",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Height of framebuffer (screen) update request", HFILL }
},
{ &hf_vnc_client_cut_text_len,
{ "Length", "vnc.client_cut_text_len",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Length of client's copy/cut text (clipboard) string in bytes", HFILL }
},
{ &hf_vnc_client_cut_text,
{ "Text", "vnc.client_cut_text",
FT_STRING, BASE_NONE, NULL, 0x0,
"Text string in the client's copy/cut text (clipboard)", HFILL }
},
/********** Server Message Types **********/
{ &hf_vnc_server_message_type,
{ "Server Message Type", "vnc.server_message_type",
FT_UINT8, BASE_DEC, VALS(server_message_types_vs), 0x0,
"Message type from server", HFILL }
},
{ &hf_vnc_fb_update_x_pos,
{ "X position", "vnc.fb_update_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"X position of this server framebuffer update", HFILL }
},
{ &hf_vnc_fb_update_y_pos,
{ "Y position", "vnc.fb_update_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Y position of this server framebuffer update", HFILL }
},
{ &hf_vnc_fb_update_width,
{ "Width", "vnc.fb_update_width",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Width of this server framebuffer update", HFILL }
},
{ &hf_vnc_fb_update_height,
{ "Height", "vnc.fb_update_height",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Height of this server framebuffer update", HFILL }
},
{ &hf_vnc_fb_update_encoding_type,
{ "Encoding type", "vnc.fb_update_encoding_type",
FT_INT32, BASE_DEC, VALS(encoding_types_vs), 0x0,
"Encoding type of this server framebuffer update", HFILL }
},
/* Cursor encoding */
{ &hf_vnc_cursor_x_fore_back,
{ "X Cursor foreground RGB / background RGB", "vnc.cursor_x_fore_back",
FT_BYTES, BASE_NONE, NULL, 0x0,
"RGB values for the X cursor's foreground and background", HFILL }
},
{ &hf_vnc_cursor_encoding_pixels,
{ "Cursor encoding pixels", "vnc.cursor_encoding_pixels",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Cursor encoding pixel data", HFILL }
},
{ &hf_vnc_cursor_encoding_bitmask,
{ "Cursor encoding bitmask", "vnc.cursor_encoding_bitmask",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Cursor encoding pixel bitmask", HFILL }
},
/* Raw Encoding */
{ &hf_vnc_raw_pixel_data,
{ "Pixel data", "vnc.raw_pixel_data",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Raw pixel data.", HFILL }
},
/* CopyRect Encoding*/
{ &hf_vnc_copyrect_src_x_pos,
{ "Source x position", "vnc.copyrect_src_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"X position of the rectangle to copy from", HFILL }
},
{ &hf_vnc_copyrect_src_y_pos,
{ "Source y position", "vnc.copyrect_src_y_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Y position of the rectangle to copy from", HFILL }
},
/* RRE Encoding */
{ &hf_vnc_rre_num_subrects,
{ "Number of subrectangles", "vnc.rre_num_subrects",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Number of subrectangles contained in this encoding type", HFILL }
},
{ &hf_vnc_rre_bg_pixel,
{ "Background pixel value", "vnc.rre_bg_pixel",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Background pixel value", HFILL }
},
{ &hf_vnc_rre_subrect_pixel,
{ "Pixel value", "vnc.rre_subrect_pixel",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Subrectangle pixel value", HFILL }
},
{ &hf_vnc_rre_subrect_x_pos,
{ "X position", "vnc.rre_subrect_x_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Position of this subrectangle on the x axis", HFILL }
},
{ &hf_vnc_rre_subrect_y_pos,
{ "Y position", "vnc.rre_subrect_y_pos",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Position of this subrectangle on the y axis", HFILL }
},
{ &hf_vnc_rre_subrect_width,
{ "Width", "vnc.rre_subrect_width",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Width of this subrectangle", HFILL }
},
{ &hf_vnc_rre_subrect_height,
{ "Height", "vnc.rre_subrect_height",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Height of this subrectangle", HFILL }
},
/* Hextile Encoding */
{ &hf_vnc_hextile_subencoding_mask,
{ "Subencoding type", "vnc.hextile_subencoding",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Hextile subencoding type.", HFILL }
},
{ &hf_vnc_hextile_raw,
{ "Raw", "vnc.hextile_raw",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x1,
"Raw subencoding is used in this tile", HFILL }
},
{ &hf_vnc_hextile_raw_value,
{ "Raw pixel values", "vnc.hextile_raw_value",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Raw subencoding pixel values", HFILL }
},
{ &hf_vnc_hextile_bg,
{ "Background Specified", "vnc.hextile_bg",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x2,
"Background Specified subencoding is used in this tile", HFILL }
},
{ &hf_vnc_hextile_bg_value,
{ "Background pixel value", "vnc.hextile_bg_value",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Background color for this tile", HFILL }
},
{ &hf_vnc_hextile_fg,
{ "Foreground Specified", "vnc.hextile_fg",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x4,
"Foreground Specified subencoding is used in this tile", HFILL }
},
{ &hf_vnc_hextile_fg_value,
{ "Foreground pixel value", "vnc.hextile_fg_value",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Foreground color for this tile", HFILL }
},
{ &hf_vnc_hextile_anysubrects,
{ "Any Subrects", "vnc.hextile_anysubrects",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x8,
"Any subrects subencoding is used in this tile", HFILL }
},
{ &hf_vnc_hextile_num_subrects,
{ "Number of subrectangles", "vnc.hextile_num_subrects",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Number of subrectangles that follow", HFILL }
},
{ &hf_vnc_hextile_subrectscolored,
{ "Subrects Colored", "vnc.hextile_subrectscolored",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x10,
"Subrects colored subencoding is used in this tile", HFILL }
},
{ &hf_vnc_hextile_subrect_pixel_value,
{ "Pixel value", "vnc.hextile_subrect_pixel_value",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Pixel value of this subrectangle", HFILL }
},
{ &hf_vnc_hextile_subrect_x_pos,
{ "X position", "vnc.hextile_subrect_x_pos",
FT_UINT8, BASE_DEC, NULL, 0xF0, /* Top 4 bits */
"X position of this subrectangle", HFILL }
},
{ &hf_vnc_hextile_subrect_y_pos,
{ "Y position", "vnc.hextile_subrect_y_pos",
FT_UINT8, BASE_DEC, NULL, 0xF, /* Bottom 4 bits */
"Y position of this subrectangle", HFILL }
},
{ &hf_vnc_hextile_subrect_width,
{ "Width", "vnc.hextile_subrect_width",
FT_UINT8, BASE_DEC, NULL, 0xF0, /* Top 4 bits */
"Subrectangle width minus one", HFILL }
},
{ &hf_vnc_hextile_subrect_height,
{ "Height", "vnc.hextile_subrect_height",
FT_UINT8, BASE_DEC, NULL, 0xF, /* Bottom 4 bits */
"Subrectangle height minus one", HFILL }
},
/* ZRLE Encoding */
{ &hf_vnc_zrle_len,
{ "ZRLE compressed length", "vnc.zrle_len",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Length of compressed ZRLE data that follows", HFILL }
},
{ &hf_vnc_zrle_subencoding,
{ "Subencoding type", "vnc.zrle_subencoding",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Subencoding type byte", HFILL }
},
{ &hf_vnc_zrle_rle,
{ "RLE", "vnc.zrle_rle",
FT_UINT8, BASE_DEC, VALS(yes_no_vs), 0x80, /* Upper bit */
"Specifies that data is run-length encoded", HFILL }
},
{ &hf_vnc_zrle_palette_size,
{ "Palette size", "vnc.zrle_palette_size",
FT_UINT8, BASE_DEC, NULL, 0x7F, /* Lower 7 bits */
"Palette size", HFILL }
},
{ &hf_vnc_zrle_data,
{ "ZRLE compressed data", "vnc.zrle_data",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Compressed ZRLE data. Compiling with zlib support will uncompress and dissect this data", HFILL }
},
{ &hf_vnc_zrle_raw,
{ "Pixel values", "vnc.zrle_raw",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Raw pixel values for this tile", HFILL }
},
{ &hf_vnc_zrle_palette,
{ "Palette", "vnc.zrle_palette",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Palette pixel values", HFILL }
},
/* Server Set Colormap Entries */
{ &hf_vnc_colormap_first_color,
{ "First color", "vnc.colormap_first_color",
FT_UINT16, BASE_DEC, NULL, 0x0,
"First color that should be mapped to given RGB intensities", HFILL }
},
{ &hf_vnc_colormap_num_colors,
{ "Number of color groups", "vnc.colormap_groups",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Number of red/green/blue color groups", HFILL }
},
{ &hf_vnc_colormap_red,
{ "Red", "vnc.colormap_red",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Red intensity", HFILL }
},
{ &hf_vnc_colormap_green,
{ "Green", "vnc.colormap_green",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Green intensity", HFILL }
},
{ &hf_vnc_colormap_blue,
{ "Blue", "vnc.colormap_blue",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Blue intensity", HFILL }
},
/* Server Cut Text */
{ &hf_vnc_server_cut_text_len,
{ "Length", "vnc.server_cut_text_len",
FT_UINT32, BASE_DEC, NULL, 0x0,
"Length of server's copy/cut text (clipboard) string in bytes", HFILL }
},
{ &hf_vnc_server_cut_text,
{ "Text", "vnc.server_cut_text",
FT_STRING, BASE_NONE, NULL, 0x0,
"Text string in the server's copy/cut text (clipboard)", HFILL }
},
};
/* Setup protocol subtree arrays */
static gint *ett[] = {
&ett_vnc,
&ett_vnc_client_message_type,
&ett_vnc_server_message_type,
&ett_vnc_rect,
&ett_vnc_encoding_type,
&ett_vnc_rre_subrect,
&ett_vnc_hextile_subencoding_mask,
&ett_vnc_hextile_num_subrects,
&ett_vnc_hextile_subrect,
&ett_vnc_zrle_subencoding,
&ett_vnc_colormap_num_groups,
&ett_vnc_colormap_color_group
};
/* Register the protocol name and description */
proto_vnc = proto_register_protocol("Virtual Network Computing",
"VNC", "vnc");
/* Required function calls to register the header fields and subtrees */
proto_register_field_array(proto_vnc, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
/* Register our preferences module */
vnc_module = prefs_register_protocol(proto_vnc, proto_reg_handoff_vnc);
prefs_register_bool_preference(vnc_module, "desegment", "Reassemble VNC messages spanning multiple TCP segments.", "Whether the VNC dissector should reassemble messages spanning multiple TCP segments. To use this option, you must also enable \"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.", &vnc_preference_desegment);
prefs_register_uint_preference(vnc_module, "alternate_port", "Alternate TCP port", "Decode this port's traffic as VNC in addition to the default ports (5500, 5501, 5900, 5901)", 10, &vnc_preference_alternate_port);
}
void
proto_reg_handoff_vnc(void)
{
static gboolean inited = FALSE;
/* This is a behind the scenes variable that is not changed by the user.
* This stores last setting of the vnc_preference_alternate_port. Used to keep
* track of when the user has changed the setting so that we can delete
* and re-register with the new port number. */
static guint vnc_preference_alternate_port_last = 0;
if(!inited) {
vnc_handle = create_dissector_handle(dissect_vnc, proto_vnc);
dissector_add("tcp.port", 5500, vnc_handle);
dissector_add("tcp.port", 5501, vnc_handle);
dissector_add("tcp.port", 5900, vnc_handle);
dissector_add("tcp.port", 5901, vnc_handle);
heur_dissector_add("tcp", test_vnc_protocol, proto_vnc);
/* We don't register a port for the VNC HTTP server because
* that simply provides a java program for download via the
* HTTP protocol. The java program then connects to a standard
* VNC port. */
inited = TRUE;
} else { /* only after preferences have been read/changed */
if(vnc_preference_alternate_port != vnc_preference_alternate_port_last &&
vnc_preference_alternate_port != 5500 &&
vnc_preference_alternate_port != 5501 &&
vnc_preference_alternate_port != 5900 &&
vnc_preference_alternate_port != 5901) {
if (vnc_preference_alternate_port_last != 0) {
dissector_delete("tcp.port",
vnc_preference_alternate_port_last,
vnc_handle);
}
/* Save this setting to see if has changed later */
vnc_preference_alternate_port_last =
vnc_preference_alternate_port;
/* Register the new port setting */
if (vnc_preference_alternate_port != 0) {
dissector_add("tcp.port",
vnc_preference_alternate_port,
vnc_handle);
}
}
heur_dissector_add("tcp", test_vnc_protocol, proto_vnc);
}
}