+void
+handle_font2_pdu(STREAM s)
+{
+ printf("FONT2 PDU, responding with magic\n");
+
+ s = rdp_init_data(8);
+ out_uint16_le(s, 0);
+ out_uint16_le(s, 0);
+ out_uint16_le(s, 3);
+ out_uint16_le(s, 4);
+ s_mark_end(s);
+ rdp_send_data(s, 0x28);
+}
+
+struct ServerInitialization {
+ unsigned short width;
+ unsigned short height;
+ unsigned char pixelformat[16]; // FIXME
+ unsigned int name_len;
+};
+
+int vnc_init()
+{
+ char buf[256];
+ int vnc_sock = tcp_connect("127.0.0.1", 5901);
+ struct ServerInitialization si;
+
+ // get handshake
+ if (read(vnc_sock, buf, 12) != 12)
+ error("short read on handshake\n");
+ write(vnc_sock, "RFB 003.003\n", 12);
+
+ // get auth
+ if (read(vnc_sock, buf, 4) != 4)
+ error("short read on auth\n");
+
+ if (buf[3] != 1)
+ error("auth needed or connection failed\n");
+
+ // send shared flag
+ buf[0] = 1;
+ write(vnc_sock, buf, 1);
+
+ // read the server initialization
+ if (read(vnc_sock, &si, sizeof(struct ServerInitialization)) != sizeof(struct ServerInitialization))
+ error("short read on SI");
+
+ printf("Server is %u x %u\n", ntohs(si.width), ntohs(si.height));
+
+ if (read(vnc_sock, buf, ntohl(si.name_len)) != ntohl(si.name_len))
+ error("short read on server name\n");
+
+// printf("Server name is '%*s' (%u bytes)\n", ntohl(si.name_len), buf, ntohl(si.name_len));
+
+ // we can only accept raw encoding
+ buf[0] = 2; // message type
+ buf[1] = 0; // padding
+ buf[2] = 0; // number of encodings
+ buf[3] = 1;
+ buf[4] = 0; // raw encoding
+ buf[5] = 0;
+ buf[6] = 0;
+ buf[7] = 0;
+
+ write(vnc_sock, buf, 8);
+
+ // request the entire framebuffer
+ buf[0] = 3; // message type
+ buf[1] = 0; // incremental
+ buf[2] = 0; // xpos
+ buf[3] = 0;
+ buf[4] = 0; // ypos
+ buf[5] = 0;
+ buf[6] = 640 >> 8; // width
+ buf[7] = 640 & 0xff;
+ buf[8] = 480 >> 8; // height
+ buf[9] = 480 & 0xff;
+
+ write(vnc_sock, buf, 10);
+
+ printf("Connected to VNC!\n");
+
+ return vnc_sock;
+}
+
+struct vnc_rectangle {
+ unsigned short x, y, width, height;
+ unsigned int encoding;
+};
+
+#define SBX 32
+#define SBY 32
+
+void handle_vnc_fbupdate(int vnc_sock)
+{
+ struct vnc_rectangle rect;
+ unsigned char *data, *ptr, *src, *dst;
+ unsigned short num_rect;
+ int ret, data_left, i, xt, yt;
+ unsigned char smallblock[SBX * SBY * 3];
+
+ if (read(vnc_sock, &num_rect, 2) != 2)
+ error("short read on num_rect\n");
+
+ for (i = 0; i < ntohs(num_rect); ++i) {
+ int width, height;
+
+ if (read(vnc_sock, &rect, sizeof(struct vnc_rectangle)) != sizeof(struct vnc_rectangle))
+ error("short read on vnc_rectangle\n");
+
+ if (ntohl(rect.encoding) != 0)
+ error("unsupported encoding\n");
+
+ width = ntohs(rect.width);
+ height = ntohs(rect.height);
+
+ printf("UPDATE: %ux%u at (%u,%u)\n", width, height,
+ ntohs(rect.x), ntohs(rect.y));
+
+ ptr = data = xmalloc(width * height * 4);
+ data_left = width * height * 4;
+
+ while (data_left > 0) {
+ ret = read(vnc_sock, ptr, data_left);
+ if (ret <= 0)
+ error("error on data read\n");
+
+ ptr += ret;
+ data_left -= ret;
+ }
+
+ // push our 32-bit RGB data into small enough chunks
+ // (64x64) so we are sure we can send them without
+ // everything crashing and stuff :-)
+ for (yt = 0; yt < (height + (SBY-1)) / SBY; ++yt) {
+ for (xt = 0; xt < (width + (SBX-1)) / SBX; ++xt) {
+ int x, y;
+ int bw = width - xt * SBX;
+ int bh = height - yt * SBY;
+ if (bw > SBX)
+ bw = SBX;
+ if (bh > SBY)
+ bh = SBY;
+
+ dst = smallblock;
+ for (y = 0; y < bh; ++y) {
+ src = data + ((yt * SBY + (bh - 1 - y)) * width + (xt * SBX)) * 4;
+ for (x = 0; x < bw; ++x) {
+ *dst++ = *src++;
+ *dst++ = *src++;
+ *dst++ = *src++;
+ ++src;
+ }
+ }
+
+ rdp_send_bitmap_update(ntohs(rect.x) + xt * SBX, ntohs(rect.y) + yt * SBY, bw, bh, smallblock);
+ }
+ }
+
+ xfree(data);
+ }
+}
+
+int listen_on_vnc = 0;
+