+ char buf[256];
+ int vnc_sock = tcp_connect("127.0.0.1", 5901);
+ struct ServerInitialization si;
+
+ // get handshake
+ if (read(vnc_sock, buf, 12) != 12)
+ error("short read on handshake\n");
+ write(vnc_sock, "RFB 003.003\n", 12);
+
+ // get auth
+ if (read(vnc_sock, buf, 4) != 4)
+ error("short read on auth\n");
+
+ if (buf[3] != 1)
+ error("auth needed or connection failed\n");
+
+ // send shared flag
+ buf[0] = 1;
+ write(vnc_sock, buf, 1);
+
+ // read the server initialization
+ if (read(vnc_sock, &si, sizeof(struct ServerInitialization)) != sizeof(struct ServerInitialization))
+ error("short read on SI");
+
+ printf("Server is %u x %u\n", ntohs(si.width), ntohs(si.height));
+
+ if (read(vnc_sock, buf, ntohl(si.name_len)) != ntohl(si.name_len))
+ error("short read on server name\n");
+
+// printf("Server name is '%*s' (%u bytes)\n", ntohl(si.name_len), buf, ntohl(si.name_len));
+
+ // we can only accept raw encoding
+ buf[0] = 2; // message type
+ buf[1] = 0; // padding
+ buf[2] = 0; // number of encodings
+ buf[3] = 1;
+ buf[4] = 0; // raw encoding
+ buf[5] = 0;
+ buf[6] = 0;
+ buf[7] = 0;
+
+ write(vnc_sock, buf, 8);
+
+ // request the entire framebuffer
+ buf[0] = 3; // message type
+ buf[1] = 0; // incremental
+ buf[2] = 0; // xpos
+ buf[3] = 0;
+ buf[4] = 0; // ypos
+ buf[5] = 0;
+ buf[6] = 640 >> 8; // width
+ buf[7] = 640 & 0xff;
+ buf[8] = 480 >> 8; // height
+ buf[9] = 480 & 0xff;
+
+ write(vnc_sock, buf, 10);
+
+ printf("Connected to VNC!\n");
+
+ return vnc_sock;
+}
+
+struct vnc_rectangle {
+ unsigned short x, y, width, height;
+ unsigned int encoding;
+};
+
+void handle_vnc_fbupdate(int vnc_sock)
+{
+ struct vnc_rectangle rect;
+ unsigned char *data, *ptr, *src, *dst;
+ unsigned short num_rect;
+ int ret, data_left, i, xt, yt;
+ unsigned char smallblock[64 * 64 * 3];
+
+ if (read(vnc_sock, &num_rect, 2) != 2)
+ error("short read on num_rect\n");
+
+ for (i = 0; i < ntohs(num_rect); ++i) {
+ int width, height;