5 #include <sys/select.h>
6 #include <sys/socket.h>
12 const int tcp_port_rdp = 3389;
13 int create_server_socket();
18 int server_sock = create_server_socket();
20 iso_recv_connect(server_sock);
21 printf("Got connection.\n");
23 printf("Client closed.\n");
27 int create_server_socket()
29 int server_sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
30 const unsigned int one = 1, zero = 0;
31 struct sockaddr_in addr;
34 setsockopt(server_sock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
35 ioctl(server_sock, FIONBIO, &zero);
37 addr.sin_family = AF_INET;
38 addr.sin_addr.s_addr = INADDR_ANY;
39 addr.sin_port = htons(tcp_port_rdp);
42 err = bind(server_sock, (struct sockaddr *)&addr, sizeof(struct sockaddr));
47 /* try to recover from recoverable errors... */
48 if (errno == ENOMEM || errno == EADDRINUSE) {
49 puts("Waiting 1 sec before trying again...");
58 listen(server_sock, 20);
62 void handle_input_pdu(STREAM s)
65 uint16 message_type, device_flags, param1, param2;
69 in_uint16_le(s, num_events); // number of events
70 in_uint8s(s, 2); // pad
72 for (i = 0; i < num_events; ++i) {
73 rdp_recv_input(s, &time, &message_type, &device_flags, ¶m1, ¶m2);
74 printf("Input event at time %u\n", time);
76 switch (message_type) {
77 case RDP_INPUT_SYNCHRONIZE:
78 printf("- Type: Synchronize (ignored)\n");
80 case RDP_INPUT_CODEPOINT:
81 printf("- Type: Codepoint (ignored)\n");
83 case RDP_INPUT_VIRTKEY:
84 printf("- Type: Virtual key (ignored)\n");
86 case RDP_INPUT_SCANCODE:
87 printf("- Type: Scancode (ignored)\n");
90 printf("- Type: Mouse\n");
91 printf("- Device flags: %x\n", device_flags);
92 printf("- Position: (%u,%u)\n", param1, param2);
96 printf("- Unknown type %x\n", message_type);
103 struct ServerInitialization {
104 unsigned short width;
105 unsigned short height;
106 unsigned char pixelformat[16]; // FIXME
107 unsigned int name_len;
113 int vnc_sock = tcp_connect("127.0.0.1", 5901);
114 struct ServerInitialization si;
117 if (read(vnc_sock, buf, 12) != 12)
118 error("short read on handshake\n");
119 write(vnc_sock, "RFB 003.003\n", 12);
122 if (read(vnc_sock, buf, 4) != 4)
123 error("short read on auth\n");
126 error("auth needed or connection failed\n");
130 write(vnc_sock, buf, 1);
132 // read the server initialization
133 if (read(vnc_sock, &si, sizeof(struct ServerInitialization)) != sizeof(struct ServerInitialization))
134 error("short read on SI");
136 printf("Server is %u x %u\n", ntohs(si.width), ntohs(si.height));
138 if (read(vnc_sock, buf, ntohl(si.name_len)) != ntohl(si.name_len))
139 error("short read on server name\n");
141 printf("Server name is '%*s' (%u bytes)\n", ntohl(si.name_len), buf, ntohl(si.name_len));
143 // we can only accept raw encoding
144 buf[0] = 2; // message type
145 buf[1] = 0; // padding
146 buf[2] = 0; // number of encodings
148 buf[4] = 0; // raw encoding
153 write(vnc_sock, buf, 8);
155 // request the entire framebuffer
156 buf[0] = 3; // message type
157 buf[1] = 0; // incremental
162 buf[6] = 640 >> 8; // width
164 buf[8] = 480 >> 8; // height
167 write(vnc_sock, buf, 10);
169 printf("Connected to VNC!\n");
174 struct vnc_rectangle {
175 unsigned short x, y, width, height;
176 unsigned int encoding;
179 void handle_vnc_fbupdate(int vnc_sock)
181 struct vnc_rectangle rect;
182 unsigned char *data, *ptr, *src, *dst;
183 unsigned short num_rect;
184 int ret, data_left, i, xt, yt;
185 unsigned char smallblock[64 * 64 * 3];
187 if (read(vnc_sock, &num_rect, 2) != 2)
188 error("short read on num_rect\n");
190 for (i = 0; i < ntohs(num_rect); ++i) {
193 if (read(vnc_sock, &rect, sizeof(struct vnc_rectangle)) != sizeof(struct vnc_rectangle))
194 error("short read on vnc_rectangle\n");
196 if (ntohl(rect.encoding) != 0)
197 error("unsupported encoding\n");
199 width = ntohs(rect.width);
200 height = ntohs(rect.height);
202 printf("UPDATE: %ux%u at (%u,%u)\n", width, height,
203 ntohs(rect.x), ntohs(rect.y));
205 ptr = data = xmalloc(width * height * 4);
206 data_left = width * height * 4;
208 while (data_left > 0) {
209 ret = read(vnc_sock, ptr, data_left);
211 error("error on data read\n");
217 // push our 32-bit RGB data into small enough chunks
218 // (64x64) so we are sure we can send them without
219 // everything crashing and stuff :-)
220 for (yt = 0; yt < (height + 63) / 64; ++yt) {
221 for (xt = 0; xt < (width + 63) / 64; ++xt) {
223 int bw = width - xt * 64;
224 int bh = height - yt * 64;
231 for (y = 0; y < bh; ++y) {
232 src = data + ((yt * 64 + (bh + 1 - y)) * width + (xt * 64)) * 4;
233 for (x = 0; x < bw; ++x) {
241 rdp_send_bitmap_update(ntohs(rect.x) + xt * 64, ntohs(rect.y) + yt * 64, bw, bh, smallblock);
251 int vnc_sock = vnc_init();
252 int listen_on_vnc = 0;
254 if (!mcs_recv_connect_initial())
255 error("MCS_CONNECT_INITIAL recv failed");
256 mcs_send_connect_response();
259 uint8 type, data_pdu_type;
264 FD_SET(tcp_get_socket(), &readfs);
265 FD_SET(vnc_sock, &readfs);
267 select(FD_SETSIZE, &readfs, NULL, NULL, NULL);
269 // activity on RDP socket?
270 if (FD_ISSET(tcp_get_socket(), &readfs)) {
271 if ((s = rdp_recv(&type)) != NULL) {
272 if (type != RDP_PDU_DATA) {
273 printf("Unknown RDP packet of type %u\n", type);
277 in_uint8s(s, 8); /* shareid, pad, streamid, length */
278 in_uint8(s, data_pdu_type);
279 in_uint8s(s, 3); /* compress_type, compress_len */
281 switch (data_pdu_type) {
282 case RDP_DATA_PDU_INPUT:
283 printf("Input PDU\n");
288 printf("Unknown data PDU type %u\n", data_pdu_type);
293 // activity on VNC socket?
294 if (FD_ISSET(vnc_sock, &readfs) && listen_on_vnc) {
295 unsigned char buf[256];
297 printf("Activity on VNC socket!\n");
299 if (read(vnc_sock, buf, 2) != 2)
300 error("short read on vnc_sock\n");
304 // frame buffer update!
305 handle_vnc_fbupdate(vnc_sock);
308 printf("Unknown VNC server message %x\n", buf[0]);