LADI
/
spa
1
Fork 0
spa/src/modules/module-raop-sink.c

2048 lines
51 KiB
C

/* PipeWire */
/* SPDX-FileCopyrightText: Copyright © 2021 Wim Taymans */
/* SPDX-License-Identifier: MIT */
#include <string.h>
#include <stdio.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>
#include <limits.h>
#include <math.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <openssl/err.h>
#if OPENSSL_API_LEVEL >= 30000
#include <openssl/core_names.h>
#endif
#include <openssl/rand.h>
#include <openssl/rsa.h>
#include <openssl/engine.h>
#include <openssl/aes.h>
#include <openssl/md5.h>
#include "config.h"
#include <spa/utils/result.h>
#include <spa/utils/string.h>
#include <spa/utils/json.h>
#include <spa/utils/ringbuffer.h>
#include <spa/debug/types.h>
#include <spa/pod/builder.h>
#include <spa/param/audio/format-utils.h>
#include <spa/param/audio/raw.h>
#include <spa/param/latency-utils.h>
#include <pipewire/impl.h>
#include <pipewire/i18n.h>
#include "module-raop/rtsp-client.h"
/** \page page_module_raop_sink PipeWire Module: AirPlay Sink
*
* Creates a new Sink to stream to an Airplay device.
*
* Normally this sink is automatically created with \ref page_module_raop_discover
* with the right parameters but it is possible to manually create a RAOP sink
* as well.
*
* ## Module Options
*
* Options specific to the behavior of this module
*
* - `raop.ip`: The ip address of the remote end.
* - `raop.port`: The port of the remote end.
* - `raop.name`: The name of the remote end.
* - `raop.hostname`: The hostname of the remote end.
* - `raop.transport`: The data transport to use, one of "udp" or "tcp". Defaults
* to "udp".
* - `raop.encryption.type`: The encryption type to use. One of "none", "RSA" or
* "auth_setup". Default is "none".
* - `raop.audio.codec`: The audio codec to use. Needs to be "PCM". Defaults to "PCM".
* - `raop.password`: The password to use.
* - `stream.props = {}`: properties to be passed to the sink stream
*
* Options with well-known behavior.
*
* - \ref PW_KEY_REMOTE_NAME
* - \ref PW_KEY_AUDIO_FORMAT
* - \ref PW_KEY_AUDIO_RATE
* - \ref PW_KEY_AUDIO_CHANNELS
* - \ref SPA_KEY_AUDIO_POSITION
* - \ref PW_KEY_NODE_NAME
* - \ref PW_KEY_NODE_DESCRIPTION
* - \ref PW_KEY_NODE_GROUP
* - \ref PW_KEY_NODE_LATENCY
* - \ref PW_KEY_NODE_VIRTUAL
* - \ref PW_KEY_MEDIA_CLASS
*
* ## Example configuration
*
*\code{.unparsed}
* context.modules = [
* { name = libpipewire-module-raop-sink
* args = {
* # Set the remote address to tunnel to
* raop.ip = "127.0.0.1"
* raop.port = 8190
* raop.name = "my-raop-device"
* raop.hostname = "My Service"
* #raop.transport = "udp"
* raop.encryption.type = "RSA"
* #raop.audio.codec = "PCM"
* #raop.password = "****"
* #audio.format = "S16"
* #audio.rate = 44100
* #audio.channels = 2
* #audio.position = [ FL FR ]
* stream.props = {
* # extra sink properties
* }
* }
* }
* ]
*\endcode
*
* ## See also
*
* \ref page_module_raop_discover
*/
#define NAME "raop-sink"
PW_LOG_TOPIC_STATIC(mod_topic, "mod." NAME);
#define PW_LOG_TOPIC_DEFAULT mod_topic
#define FRAMES_PER_TCP_PACKET 4096
#define FRAMES_PER_UDP_PACKET 352
#define DEFAULT_TCP_AUDIO_PORT 6000
#define DEFAULT_UDP_AUDIO_PORT 6000
#define DEFAULT_UDP_CONTROL_PORT 6001
#define DEFAULT_UDP_TIMING_PORT 6002
#define AES_CHUNK_SIZE 16
#ifndef MD5_DIGEST_LENGTH
#define MD5_DIGEST_LENGTH 16
#endif
#define MD5_HASH_LENGTH (2*MD5_DIGEST_LENGTH)
#define DEFAULT_USER_AGENT "iTunes/11.0.4 (Windows; N)"
#define DEFAULT_USER_NAME "iTunes"
#define MAX_PORT_RETRY 128
#define DEFAULT_FORMAT "S16"
#define DEFAULT_RATE 44100
#define DEFAULT_CHANNELS 2
#define DEFAULT_POSITION "[ FL FR ]"
#define DEFAULT_LATENCY 22050
#define VOLUME_MAX 0.0
#define VOLUME_DEF -30.0
#define VOLUME_MIN -144.0
#define MODULE_USAGE "( raop.ip=<ip address of host> ) " \
"( raop.port=<remote port> ) " \
"( raop.name=<name of host> ) " \
"( raop.hostname=<hostname of host> ) " \
"( raop.transport=<transport, default:udp> ) " \
"( raop.encryption.type=<encryption, default:none> ) " \
"( raop.audio.codec=PCM ) " \
"( raop.password=<password for auth> ) " \
"( node.latency=<latency as fraction> ) " \
"( node.name=<name of the nodes> ) " \
"( node.description=<description of the nodes> ) " \
"( audio.format=<format, default:"DEFAULT_FORMAT"> ) " \
"( audio.rate=<sample rate, default: "SPA_STRINGIFY(DEFAULT_RATE)"> ) " \
"( audio.channels=<number of channels, default:"SPA_STRINGIFY(DEFAULT_CHANNELS)"> ) " \
"( audio.position=<channel map, default:"DEFAULT_POSITION"> ) " \
"( stream.props=<properties> ) "
static const struct spa_dict_item module_props[] = {
{ PW_KEY_MODULE_AUTHOR, "Wim Taymans <wim.taymans@gmail.com>" },
{ PW_KEY_MODULE_DESCRIPTION, "An RAOP audio sink" },
{ PW_KEY_MODULE_USAGE, MODULE_USAGE },
{ PW_KEY_MODULE_VERSION, PACKAGE_VERSION },
};
enum {
PROTO_TCP,
PROTO_UDP,
};
enum {
CRYPTO_NONE,
CRYPTO_RSA,
CRYPTO_AUTH_SETUP,
};
enum {
CODEC_PCM,
CODEC_ALAC,
CODEC_AAC,
CODEC_AAC_ELD,
};
struct impl {
struct pw_context *context;
struct pw_properties *props;
struct pw_impl_module *module;
struct pw_loop *loop;
struct spa_hook module_listener;
int protocol;
int encryption;
int codec;
struct pw_core *core;
struct spa_hook core_proxy_listener;
struct spa_hook core_listener;
struct pw_properties *stream_props;
struct pw_stream *stream;
struct spa_hook stream_listener;
struct spa_audio_info_raw info;
uint32_t frame_size;
struct pw_rtsp_client *rtsp;
struct spa_hook rtsp_listener;
struct pw_properties *headers;
char session_id[32];
char *password;
char *auth_method;
char *realm;
char *nonce;
unsigned int do_disconnect:1;
uint8_t key[AES_CHUNK_SIZE]; /* Key for aes-cbc */
uint8_t iv[AES_CHUNK_SIZE]; /* Initialization vector for cbc */
EVP_CIPHER_CTX *ctx;
uint16_t control_port;
int control_fd;
struct spa_source *control_source;
uint16_t timing_port;
int timing_fd;
struct spa_source *timing_source;
uint16_t server_port;
int server_fd;
struct spa_source *server_source;
uint32_t block_size;
uint32_t delay;
uint32_t latency;
uint16_t seq;
uint32_t rtptime;
uint32_t ssrc;
uint32_t sync;
uint32_t sync_period;
unsigned int first:1;
unsigned int connected:1;
unsigned int ready:1;
unsigned int recording:1;
bool mute;
float volume;
uint8_t buffer[FRAMES_PER_TCP_PACKET * 4];
uint32_t filled;
};
static void stream_destroy(void *d)
{
struct impl *impl = d;
spa_hook_remove(&impl->stream_listener);
impl->stream = NULL;
}
static inline void bit_writer(uint8_t **p, int *pos, uint8_t data, int len)
{
int rb = 8 - *pos - len;
if (rb >= 0) {
**p = (*pos ? **p : 0) | (data << rb);
*pos += len;
} else {
*(*p)++ |= (data >> -rb);
**p = data << (8+rb);
*pos = -rb;
}
}
static int aes_encrypt(struct impl *impl, uint8_t *data, int len)
{
int i = len & ~0xf, clen = i;
EVP_EncryptInit(impl->ctx, EVP_aes_128_cbc(), impl->key, impl->iv);
EVP_EncryptUpdate(impl->ctx, data, &clen, data, i);
return i;
}
static inline uint64_t timespec_to_ntp(struct timespec *ts)
{
uint64_t ntp = (uint64_t) ts->tv_nsec * UINT32_MAX / SPA_NSEC_PER_SEC;
return ntp | (uint64_t) (ts->tv_sec + 0x83aa7e80) << 32;
}
static inline uint64_t ntp_now(int clockid)
{
struct timespec now;
clock_gettime(clockid, &now);
return timespec_to_ntp(&now);
}
static int send_udp_sync_packet(struct impl *impl,
struct sockaddr *dest_addr, socklen_t addrlen)
{
uint32_t pkt[5];
uint32_t rtptime = impl->rtptime;
uint32_t delay = impl->delay;
uint64_t transmitted;
pkt[0] = htonl(0x80d40007);
if (impl->first)
pkt[0] |= htonl(0x10000000);
rtptime -= delay;
pkt[1] = htonl(rtptime);
transmitted = ntp_now(CLOCK_MONOTONIC);
pkt[2] = htonl(transmitted >> 32);
pkt[3] = htonl(transmitted & 0xffffffff);
rtptime += delay;
pkt[4] = htonl(rtptime);
pw_log_debug("sync: delayed:%u now:%"PRIu64" rtptime:%u",
rtptime - delay, transmitted, rtptime);
return sendto(impl->control_fd, pkt, sizeof(pkt), 0, dest_addr, addrlen);
}
static int send_udp_timing_packet(struct impl *impl, uint64_t remote, uint64_t received,
struct sockaddr *dest_addr, socklen_t addrlen)
{
uint32_t pkt[8];
uint64_t transmitted;
pkt[0] = htonl(0x80d30007);
pkt[1] = 0x00000000;
pkt[2] = htonl(remote >> 32);
pkt[3] = htonl(remote & 0xffffffff);
pkt[4] = htonl(received >> 32);
pkt[5] = htonl(received & 0xffffffff);
transmitted = ntp_now(CLOCK_MONOTONIC);
pkt[6] = htonl(transmitted >> 32);
pkt[7] = htonl(transmitted & 0xffffffff);
pw_log_debug("sync: remote:%"PRIu64" received:%"PRIu64" transmitted:%"PRIu64,
remote, received, transmitted);
return sendto(impl->timing_fd, pkt, sizeof(pkt), 0, dest_addr, addrlen);
}
static int write_codec_pcm(void *dst, void *frames, uint32_t n_frames)
{
uint8_t *bp, *b, *d = frames;
int bpos = 0;
uint32_t i;
b = bp = dst;
bit_writer(&bp, &bpos, 1, 3); /* channel=1, stereo */
bit_writer(&bp, &bpos, 0, 4); /* Unknown */
bit_writer(&bp, &bpos, 0, 8); /* Unknown */
bit_writer(&bp, &bpos, 0, 4); /* Unknown */
bit_writer(&bp, &bpos, 1, 1); /* Hassize */
bit_writer(&bp, &bpos, 0, 2); /* Unused */
bit_writer(&bp, &bpos, 1, 1); /* Is-not-compressed */
bit_writer(&bp, &bpos, (n_frames >> 24) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames >> 16) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames >> 8) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames) & 0xff, 8);
for (i = 0; i < n_frames; i++) {
bit_writer(&bp, &bpos, *(d + 1), 8);
bit_writer(&bp, &bpos, *(d + 0), 8);
bit_writer(&bp, &bpos, *(d + 3), 8);
bit_writer(&bp, &bpos, *(d + 2), 8);
d += 4;
}
return bp - b + 1;
}
static int flush_to_udp_packet(struct impl *impl)
{
const size_t max = 12 + 8 + impl->block_size;
uint32_t pkt[max], len, n_frames;
uint8_t *dst;
int res;
if (!impl->recording)
return 0;
impl->sync++;
if (impl->first || impl->sync == impl->sync_period) {
impl->sync = 0;
send_udp_sync_packet(impl, NULL, 0);
}
pkt[0] = htonl(0x80600000);
if (impl->first)
pkt[0] |= htonl((uint32_t)0x80 << 16);
pkt[0] |= htonl((uint32_t)impl->seq);
pkt[1] = htonl(impl->rtptime);
pkt[2] = htonl(impl->ssrc);
n_frames = impl->filled / impl->frame_size;
dst = (uint8_t*)&pkt[3];
switch (impl->codec) {
case CODEC_PCM:
case CODEC_ALAC:
len = write_codec_pcm(dst, impl->buffer, n_frames);
break;
default:
len = 8 + impl->block_size;
memset(dst, 0, len);
break;
}
if (impl->encryption == CRYPTO_RSA)
aes_encrypt(impl, dst, len);
impl->rtptime += n_frames;
impl->seq = (impl->seq + 1) & 0xffff;
pw_log_debug("send %u", len + 12);
res = send(impl->server_fd, pkt, len + 12, 0);
impl->first = false;
return res;
}
static int flush_to_tcp_packet(struct impl *impl)
{
const size_t max = 16 + 8 + impl->block_size;
uint32_t pkt[max], len, n_frames;
uint8_t *dst;
int res;
if (!impl->recording)
return 0;
pkt[0] = htonl(0x24000000);
pkt[1] = htonl(0x80e00000);
pkt[1] |= htonl((uint32_t)impl->seq);
pkt[2] = htonl(impl->rtptime);
pkt[3] = htonl(impl->ssrc);
n_frames = impl->filled / impl->frame_size;
dst = (uint8_t*)&pkt[4];
switch (impl->codec) {
case CODEC_PCM:
case CODEC_ALAC:
len = write_codec_pcm(dst, impl->buffer, n_frames);
break;
default:
len = 8 + impl->block_size;
memset(dst, 0, len);
break;
}
if (impl->encryption == CRYPTO_RSA)
aes_encrypt(impl, dst, len);
pkt[0] |= htonl((uint32_t) len + 12);
impl->rtptime += n_frames;
impl->seq = (impl->seq + 1) & 0xffff;
pw_log_debug("send %u", len + 16);
res = send(impl->server_fd, pkt, len + 16, 0);
impl->first = false;
return res;
}
static void playback_stream_process(void *d)
{
struct impl *impl = d;
struct pw_buffer *buf;
struct spa_data *bd;
uint8_t *data;
uint32_t offs, size;
if ((buf = pw_stream_dequeue_buffer(impl->stream)) == NULL) {
pw_log_debug("out of buffers: %m");
return;
}
bd = &buf->buffer->datas[0];
offs = SPA_MIN(bd->chunk->offset, bd->maxsize);
size = SPA_MIN(bd->chunk->size, bd->maxsize - offs);
data = SPA_PTROFF(bd->data, offs, uint8_t);
while (size > 0 && impl->block_size > 0) {
uint32_t avail, to_fill;
avail = impl->block_size - impl->filled;
to_fill = SPA_MIN(avail, size);
memcpy(&impl->buffer[impl->filled], data, to_fill);
impl->filled += to_fill;
avail -= to_fill;
size -= to_fill;
data += to_fill;
if (avail == 0) {
switch (impl->protocol) {
case PROTO_UDP:
flush_to_udp_packet(impl);
break;
case PROTO_TCP:
flush_to_tcp_packet(impl);
break;
}
impl->filled = 0;
}
}
pw_stream_queue_buffer(impl->stream, buf);
}
static int create_udp_socket(struct impl *impl, uint16_t *port)
{
int res, ip_version, fd, val, i, af;
struct sockaddr_in sa4;
struct sockaddr_in6 sa6;
if ((res = pw_rtsp_client_get_local_ip(impl->rtsp,
&ip_version, NULL, 0)) < 0)
return res;
if (ip_version == 4) {
sa4.sin_family = af = AF_INET;
sa4.sin_addr.s_addr = INADDR_ANY;
} else {
sa6.sin6_family = af = AF_INET6;
sa6.sin6_addr = in6addr_any;
}
if ((fd = socket(af, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)) < 0) {
pw_log_error("socket failed: %m");
return -errno;
}
#ifdef SO_TIMESTAMP
val = 1;
if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, &val, sizeof(val)) < 0) {
res = -errno;
pw_log_error("setsockopt failed: %m");
goto error;
}
#endif
val = 1;
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) < 0) {
res = -errno;
pw_log_error("setsockopt failed: %m");
goto error;
}
for (i = 0; i < MAX_PORT_RETRY; i++) {
int ret;
if (ip_version == 4) {
sa4.sin_port = htons(*port);
ret = bind(fd, (struct sockaddr*)&sa4, sizeof(sa4));
} else {
sa6.sin6_port = htons(*port);
ret = bind(fd, (struct sockaddr*)&sa6, sizeof(sa6));
}
if (ret == 0)
break;
if (ret < 0 && errno != EADDRINUSE) {
res = -errno;
pw_log_error("bind failed: %m");
goto error;
}
(*port)++;
}
return fd;
error:
close(fd);
return res;
}
static int connect_socket(struct impl *impl, int type, int fd, uint16_t port)
{
const char *host;
struct sockaddr_in sa4;
struct sockaddr_in6 sa6;
struct sockaddr *sa;
size_t salen;
int res, af;
host = pw_properties_get(impl->props, "raop.ip");
if (host == NULL)
return -EINVAL;
if (inet_pton(AF_INET, host, &sa4.sin_addr) > 0) {
sa4.sin_family = af = AF_INET;
sa4.sin_port = htons(port);
sa = (struct sockaddr *) &sa4;
salen = sizeof(sa4);
} else if (inet_pton(AF_INET6, host, &sa6.sin6_addr) > 0) {
sa6.sin6_family = af = AF_INET6;
sa6.sin6_port = htons(port);
sa = (struct sockaddr *) &sa6;
salen = sizeof(sa6);
} else {
pw_log_error("Invalid host '%s'", host);
return -EINVAL;
}
if (fd < 0 &&
(fd = socket(af, type | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)) < 0) {
pw_log_error("socket failed: %m");
return -errno;
}
res = connect(fd, sa, salen);
if (res < 0 && errno != EINPROGRESS) {
res = -errno;
pw_log_error("connect failed: %m");
goto error;
}
pw_log_info("Connected to host:%s port:%d", host, port);
return fd;
error:
if (fd >= 0)
close(fd);
return res;
}
static void
on_timing_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
uint32_t packet[8];
ssize_t bytes;
if (mask & SPA_IO_IN) {
uint64_t remote, received;
struct sockaddr_storage sender;
socklen_t sender_size = sizeof(sender);
received = ntp_now(CLOCK_MONOTONIC);
bytes = recvfrom(impl->timing_fd, packet, sizeof(packet), 0,
(struct sockaddr*)&sender, &sender_size);
if (bytes < 0) {
pw_log_debug("error reading timing packet: %m");
return;
}
if (bytes != sizeof(packet)) {
pw_log_warn("discarding short (%zd < %zd) timing packet",
bytes, sizeof(bytes));
return;
}
if (packet[0] != ntohl(0x80d20007))
return;
remote = ((uint64_t)ntohl(packet[6])) << 32 | ntohl(packet[7]);
if (send_udp_timing_packet(impl, remote, received,
(struct sockaddr *)&sender, sender_size) < 0) {
pw_log_warn("error sending timing packet");
return;
}
}
}
static void
on_control_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
uint32_t packet[2];
ssize_t bytes;
if (mask & SPA_IO_IN) {
uint32_t hdr;
uint16_t seq, num;
bytes = read(impl->control_fd, packet, sizeof(packet));
if (bytes < 0) {
pw_log_debug("error reading control packet: %m");
return;
}
if (bytes != sizeof(packet)) {
pw_log_warn("discarding short (%zd < %zd) control packet",
bytes, sizeof(bytes));
return;
}
hdr = ntohl(packet[0]);
if ((hdr & 0xff000000) != 0x80000000)
return;
seq = ntohl(packet[1]) >> 16;
num = ntohl(packet[1]) & 0xffff;
if (num == 0)
return;
switch (hdr >> 16 & 0xff) {
case 0xd5:
pw_log_debug("retransmit request seq:%u num:%u", seq, num);
/* retransmit request */
break;
}
}
}
static void base64_encode(const uint8_t *data, size_t len, char *enc, char pad)
{
static const char tab[] =
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
size_t i;
for (i = 0; i < len; i += 3) {
uint32_t v;
v = data[i+0] << 16;
v |= (i+1 < len ? data[i+1] : 0) << 8;
v |= (i+2 < len ? data[i+2] : 0);
*enc++ = tab[(v >> (3*6)) & 0x3f];
*enc++ = tab[(v >> (2*6)) & 0x3f];
*enc++ = i+1 < len ? tab[(v >> (1*6)) & 0x3f] : pad;
*enc++ = i+2 < len ? tab[(v >> (0*6)) & 0x3f] : pad;
}
*enc = '\0';
}
static size_t base64_decode(const char *data, size_t len, uint8_t *dec)
{
uint8_t tab[] = {
62, -1, -1, -1, 63, 52, 53, 54, 55, 56,
57, 58, 59, 60, 61, -1, -1, -1, -1, -1,
-1, -1, 0, 1, 2, 3, 4, 5, 6, 7,
8, 9, 10, 11, 12, 13, 14, 15, 16, 17,
18, 19, 20, 21, 22, 23, 24, 25, -1, -1,
-1, -1, -1, -1, 26, 27, 28, 29, 30, 31,
32, 33, 34, 35, 36, 37, 38, 39, 40, 41,
42, 43, 44, 45, 46, 47, 48, 49, 50, 51 };
size_t i, j;
for (i = 0, j = 0; i < len; i += 4) {
uint32_t v;
v = tab[data[i+0]-43] << (3*6);
v |= tab[data[i+1]-43] << (2*6);
v |= (data[i+2] == '=' ? 0 : tab[data[i+2]-43]) << (1*6);
v |= (data[i+3] == '=' ? 0 : tab[data[i+3]-43]);
dec[j++] = (v >> 16) & 0xff;
if (data[i+2] != '=') dec[j++] = (v >> 8) & 0xff;
if (data[i+3] != '=') dec[j++] = v & 0xff;
}
return j;
}
SPA_PRINTF_FUNC(2,3)
static int MD5_hash(char hash[MD5_HASH_LENGTH+1], const char *fmt, ...)
{
unsigned char d[MD5_DIGEST_LENGTH];
int i;
va_list args;
char buffer[1024];
unsigned int size;
va_start(args, fmt);
vsnprintf(buffer, sizeof(buffer), fmt, args);
va_end(args);
size = MD5_DIGEST_LENGTH;
EVP_Digest(buffer, strlen(buffer), d, &size, EVP_md5(), NULL);
for (i = 0; i < MD5_DIGEST_LENGTH; i++)
sprintf(&hash[2*i], "%02x", (uint8_t) d[i]);
hash[MD5_HASH_LENGTH] = '\0';
return 0;
}
static int rtsp_add_auth(struct impl *impl, const char *method)
{
char auth[1024];
if (impl->auth_method == NULL)
return 0;
if (spa_streq(impl->auth_method, "Basic")) {
char buf[256];
char enc[512];
spa_scnprintf(buf, sizeof(buf), "%s:%s", DEFAULT_USER_NAME, impl->password);
base64_encode((uint8_t*)buf, strlen(buf), enc, '=');
spa_scnprintf(auth, sizeof(auth), "Basic %s", enc);
}
else if (spa_streq(impl->auth_method, "Digest")) {
const char *url;
char h1[MD5_HASH_LENGTH+1];
char h2[MD5_HASH_LENGTH+1];
char resp[MD5_HASH_LENGTH+1];
url = pw_rtsp_client_get_url(impl->rtsp);
MD5_hash(h1, "%s:%s:%s", DEFAULT_USER_NAME, impl->realm, impl->password);
MD5_hash(h2, "%s:%s", method, url);
MD5_hash(resp, "%s:%s:%s", h1, impl->nonce, h2);
spa_scnprintf(auth, sizeof(auth),
"username=\"%s\", realm=\"%s\", nonce=\"%s\", uri=\"%s\", response=\"%s\"",
DEFAULT_USER_NAME, impl->realm, impl->nonce, url, resp);
}
else
goto error;
pw_properties_setf(impl->headers, "Authorization", "%s %s",
impl->auth_method, auth);
return 0;
error:
pw_log_error("error adding auth");
return -EINVAL;
}
static int rtsp_send(struct impl *impl, const char *method,
const char *content_type, const char *content,
int (*reply) (void *data, int status, const struct spa_dict *headers))
{
int res;
rtsp_add_auth(impl, method);
res = pw_rtsp_client_send(impl->rtsp, method, &impl->headers->dict,
content_type, content, reply, impl);
return res;
}
static int rtsp_flush_reply(void *data, int status, const struct spa_dict *headers)
{
pw_log_info("reply %d", status);
return 0;
}
static int rtsp_do_flush(struct impl *impl)
{
int res;
if (!impl->recording)
return 0;
pw_properties_set(impl->headers, "Range", "npt=0-");
pw_properties_setf(impl->headers, "RTP-Info",
"seq=%u;rtptime=%u", impl->seq, impl->rtptime);
impl->recording = false;
res = rtsp_send(impl, "FLUSH", NULL, NULL, rtsp_flush_reply);
pw_properties_set(impl->headers, "Range", NULL);
pw_properties_set(impl->headers, "RTP-Info", NULL);
return res;
}
static int rtsp_send_volume(struct impl *impl)
{
if (!impl->recording)
return 0;
char header[128], volstr[64];
snprintf(header, sizeof(header), "volume: %s\r\n",
spa_dtoa(volstr, sizeof(volstr), impl->volume));
return rtsp_send(impl, "SET_PARAMETER", "text/parameters", header, NULL);
}
static int rtsp_record_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
const char *str;
uint32_t n_params;
const struct spa_pod *params[2];
uint8_t buffer[1024];
struct spa_pod_builder b;
struct spa_latency_info latency;
char progress[128];
pw_log_info("reply %d", status);
if ((str = spa_dict_lookup(headers, "Audio-Latency")) != NULL) {
if (!spa_atou32(str, &impl->latency, 0))
impl->latency = DEFAULT_LATENCY;
} else {
impl->latency = DEFAULT_LATENCY;
}
spa_zero(latency);
latency.direction = PW_DIRECTION_INPUT;
latency.min_rate = latency.max_rate = impl->latency;
n_params = 0;
spa_pod_builder_init(&b, buffer, sizeof(buffer));
params[n_params++] = spa_latency_build(&b, SPA_PARAM_Latency, &latency);
pw_stream_update_params(impl->stream, params, n_params);
impl->first = true;
impl->sync = 0;
impl->sync_period = impl->info.rate / (impl->block_size / impl->frame_size);
impl->recording = true;
rtsp_send_volume(impl);
snprintf(progress, sizeof(progress), "progress: %s/%s/%s\r\n", "0", "0", "0");
return rtsp_send(impl, "SET_PARAMETER", "text/parameters", progress, NULL);
}
static int rtsp_do_record(struct impl *impl)
{
int res;
if (!impl->ready || impl->recording)
return 0;
pw_properties_set(impl->headers, "Range", "npt=0-");
pw_properties_setf(impl->headers, "RTP-Info",
"seq=%u;rtptime=%u", impl->seq, impl->rtptime);
res = rtsp_send(impl, "RECORD", NULL, NULL, rtsp_record_reply);
pw_properties_set(impl->headers, "Range", NULL);
pw_properties_set(impl->headers, "RTP-Info", NULL);
return res;
}
static void
on_server_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
if (mask & (SPA_IO_ERR | SPA_IO_HUP))
goto error;
if (mask & SPA_IO_OUT) {
int res;
socklen_t len;
pw_loop_update_io(impl->loop, impl->server_source,
impl->server_source->mask & ~SPA_IO_OUT);
len = sizeof(res);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &res, &len) < 0) {
pw_log_error("getsockopt: %m");
goto error;
}
if (res != 0)
goto error;
impl->ready = true;
if (pw_stream_get_state(impl->stream, NULL) == PW_STREAM_STATE_STREAMING)
rtsp_do_record(impl);
}
return;
error:
pw_loop_update_io(impl->loop, impl->server_source, 0);
}
static int rtsp_setup_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
const char *str, *state = NULL, *s;
size_t len;
uint64_t ntp;
uint16_t control_port, timing_port;
pw_log_info("reply %d", status);
if ((str = spa_dict_lookup(headers, "Session")) == NULL) {
pw_log_error("missing Session header");
return 0;
}
pw_properties_set(impl->headers, "Session", str);
if ((str = spa_dict_lookup(headers, "Transport")) == NULL) {
pw_log_error("missing Transport header");
return 0;
}
impl->server_port = control_port = timing_port = 0;
while ((s = pw_split_walk(str, ";", &len, &state)) != NULL) {
if (spa_strstartswith(s, "server_port=")) {
impl->server_port = atoi(s + 12);
}
else if (spa_strstartswith(s, "control_port=")) {
control_port = atoi(s + 13);
}
else if (spa_strstartswith(s, "timing_port=")) {
timing_port = atoi(s + 12);
}
}
if (impl->server_port == 0) {
pw_log_error("missing server port in Transport");
return 0;
}
if (pw_getrandom(&impl->seq, sizeof(impl->seq), 0) < 0 ||
pw_getrandom(&impl->rtptime, sizeof(impl->rtptime), 0) < 0) {
pw_log_error("error generating random seq and rtptime: %m");
return 0;
}
pw_log_info("server port:%u", impl->server_port);
switch (impl->protocol) {
case PROTO_TCP:
if ((impl->server_fd = connect_socket(impl, SOCK_STREAM, -1, impl->server_port)) < 0)
return impl->server_fd;
impl->server_source = pw_loop_add_io(impl->loop, impl->server_fd,
SPA_IO_OUT, false, on_server_source_io, impl);
break;
case PROTO_UDP:
if (control_port == 0) {
pw_log_error("missing UDP ports in Transport");
return 0;
}
pw_log_info("control:%u timing:%u", control_port, timing_port);
if ((impl->server_fd = connect_socket(impl, SOCK_DGRAM, -1, impl->server_port)) < 0)
return impl->server_fd;
if ((impl->control_fd = connect_socket(impl, SOCK_DGRAM, impl->control_fd, control_port)) < 0)
return impl->control_fd;
if (timing_port != 0) {
/* it is possible that there is no timing_port. We simply don't
* connect then and don't send an initial timing packet.
* We will reply to received timing packets on the same address we
* received the packet from so we don't really need this. */
if ((impl->timing_fd = connect_socket(impl, SOCK_DGRAM, impl->timing_fd, timing_port)) < 0)
return impl->timing_fd;
ntp = ntp_now(CLOCK_MONOTONIC);
send_udp_timing_packet(impl, ntp, ntp, NULL, 0);
}
impl->control_source = pw_loop_add_io(impl->loop, impl->control_fd,
SPA_IO_IN, false, on_control_source_io, impl);
impl->ready = true;
if (pw_stream_get_state(impl->stream, NULL) == PW_STREAM_STATE_STREAMING)
rtsp_do_record(impl);
break;
default:
return 0;
}
return 0;
}
static int rtsp_do_setup(struct impl *impl)
{
int res;
switch (impl->protocol) {
case PROTO_TCP:
pw_properties_set(impl->headers, "Transport",
"RTP/AVP/TCP;unicast;interleaved=0-1;mode=record");
break;
case PROTO_UDP:
impl->control_port = DEFAULT_UDP_CONTROL_PORT;
impl->timing_port = DEFAULT_UDP_TIMING_PORT;
impl->control_fd = create_udp_socket(impl, &impl->control_port);
impl->timing_fd = create_udp_socket(impl, &impl->timing_port);
if (impl->control_fd < 0 || impl->timing_fd < 0)
goto error;
impl->timing_source = pw_loop_add_io(impl->loop, impl->timing_fd,
SPA_IO_IN, false, on_timing_source_io, impl);
pw_properties_setf(impl->headers, "Transport",
"RTP/AVP/UDP;unicast;interleaved=0-1;mode=record;"
"control_port=%u;timing_port=%u",
impl->control_port, impl->timing_port);
break;
default:
return -ENOTSUP;
}
res = rtsp_send(impl, "SETUP", NULL, NULL, rtsp_setup_reply);
pw_properties_set(impl->headers, "Transport", NULL);
return res;
error:
if (impl->control_fd > 0)
close(impl->control_fd);
impl->control_fd = -1;
if (impl->timing_fd > 0)
close(impl->timing_fd);
impl->timing_fd = -1;
return -EIO;
}
static int rtsp_announce_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
pw_log_info("reply %d", status);
pw_properties_set(impl->headers, "Apple-Challenge", NULL);
return rtsp_do_setup(impl);
}
static inline void swap_bytes(uint8_t *data, size_t size)
{
int i, j;
for (i = 0, j = size-1; i < j; i++, j--)
SPA_SWAP(data[i], data[j]);
}
static int rsa_encrypt(uint8_t *data, int len, uint8_t *enc)
{
uint8_t modulus[256];
uint8_t exponent[8];
size_t msize, esize;
int res = 0;
char n[] =
"59dE8qLieItsH1WgjrcFRKj6eUWqi+bGLOX1HL3U3GhC/j0Qg90u3sG/1CUtwC"
"5vOYvfDmFI6oSFXi5ELabWJmT2dKHzBJKa3k9ok+8t9ucRqMd6DZHJ2YCCLlDR"
"KSKv6kDqnw4UwPdpOMXziC/AMj3Z/lUVX1G7WSHCAWKf1zNS1eLvqr+boEjXuB"
"OitnZ/bDzPHrTOZz0Dew0uowxf/+sG+NCK3eQJVxqcaJ/vEHKIVd2M+5qL71yJ"
"Q+87X6oV3eaYvt3zWZYD6z5vYTcrtij2VZ9Zmni/UAaHqn9JdsBWLUEpVviYnh"
"imNVvYFZeCXg/IdTQ+x4IRdiXNv5hEew==";
char e[] = "AQAB";
msize = base64_decode(n, strlen(n), modulus);
esize = base64_decode(e, strlen(e), exponent);
#if OPENSSL_API_LEVEL >= 30000
EVP_PKEY *pkey = NULL;
EVP_PKEY_CTX *ctx = NULL;
OSSL_PARAM params[5];
int err = 0;
size_t size;
#if __BYTE_ORDER == __LITTLE_ENDIAN
swap_bytes(modulus, msize);
swap_bytes(exponent, esize);
#endif
params[0] = OSSL_PARAM_construct_BN(OSSL_PKEY_PARAM_RSA_N, modulus, msize);
params[1] = OSSL_PARAM_construct_BN(OSSL_PKEY_PARAM_RSA_E, exponent, esize);
params[2] = OSSL_PARAM_construct_end();
ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL);
if (ctx == NULL ||
(err = EVP_PKEY_fromdata_init(ctx)) <= 0 ||
(err = EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_PUBLIC_KEY, params)) <= 0)
goto error;
EVP_PKEY_CTX_free(ctx);
params[0] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_PAD_MODE,
OSSL_PKEY_RSA_PAD_MODE_OAEP, 0);
params[1] = OSSL_PARAM_construct_end();
if ((ctx = EVP_PKEY_CTX_new_from_pkey(NULL, pkey, NULL)) == NULL ||
(err = EVP_PKEY_encrypt_init_ex(ctx, params)) <= 0 ||
(err = EVP_PKEY_encrypt(ctx, enc, &size, data, len)) <= 0)
goto error;
res = size;
done:
if (ctx)
EVP_PKEY_CTX_free(ctx);
if (pkey)
EVP_PKEY_free(pkey);
return res;
#else
RSA *rsa = RSA_new();
BIGNUM *n_bn = BN_bin2bn(modulus, msize, NULL);
BIGNUM *e_bn = BN_bin2bn(exponent, esize, NULL);
if (rsa == NULL || n_bn == NULL || e_bn == NULL)
goto error;
RSA_set0_key(rsa, n_bn, e_bn, NULL);
n_bn = e_bn = NULL;
if ((res = RSA_public_encrypt(len, data, enc, rsa, RSA_PKCS1_OAEP_PADDING)) <= 0)
goto error;
done:
if (rsa != NULL)
RSA_free(rsa);
if (n_bn != NULL)
BN_free(n_bn);
if (e_bn != NULL)
BN_free(e_bn);
return res;
#endif
error:
ERR_print_errors_fp(stdout);
res = -EIO;
goto done;
}
static int rtsp_do_announce(struct impl *impl)
{
const char *host;
uint8_t rsakey[512];
char key[512*2];
char iv[16*2];
int res, frames, rsa_len, ip_version;
char *sdp;
char local_ip[256];
int min_latency;
min_latency = DEFAULT_LATENCY;
host = pw_properties_get(impl->props, "raop.ip");
if (impl->protocol == PROTO_TCP)
frames = FRAMES_PER_TCP_PACKET;
else
frames = FRAMES_PER_UDP_PACKET;
impl->block_size = frames * impl->frame_size;
pw_rtsp_client_get_local_ip(impl->rtsp, &ip_version,
local_ip, sizeof(local_ip));
switch (impl->encryption) {
case CRYPTO_NONE:
asprintf(&sdp, "v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n",
impl->session_id, ip_version, local_ip,
ip_version, host, frames, impl->info.rate);
break;
case CRYPTO_AUTH_SETUP:
asprintf(&sdp, "v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n"
"a=min-latency:%d",
impl->session_id, ip_version, local_ip,
ip_version, host, frames, impl->info.rate,
min_latency);
break;
case CRYPTO_RSA:
if (pw_getrandom(impl->key, sizeof(impl->key), 0) < 0 ||
pw_getrandom(impl->iv, sizeof(impl->iv), 0) < 0)
return -errno;
rsa_len = rsa_encrypt(impl->key, 16, rsakey);
if (rsa_len < 0)
return -rsa_len;
base64_encode(rsakey, rsa_len, key, '=');
base64_encode(impl->iv, 16, iv, '=');
asprintf(&sdp, "v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n"
"a=rsaaeskey:%s\r\n"
"a=aesiv:%s\r\n",
impl->session_id, ip_version, local_ip,
ip_version, host, frames, impl->info.rate,
key, iv);
break;
default:
return -ENOTSUP;
}
res = rtsp_send(impl, "ANNOUNCE", "application/sdp", sdp, rtsp_announce_reply);
free(sdp);
return res;
}
static int rtsp_auth_setup_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
pw_log_info("reply %d", status);
return rtsp_do_announce(impl);
}
static int rtsp_do_auth_setup(struct impl *impl)
{
static const unsigned char content[33] =
"\x01"
"\x59\x02\xed\xe9\x0d\x4e\xf2\xbd\x4c\xb6\x8a\x63\x30\x03\x82\x07"
"\xa9\x4d\xbd\x50\xd8\xaa\x46\x5b\x5d\x8c\x01\x2a\x0c\x7e\x1d\x4e";
return pw_rtsp_client_url_send(impl->rtsp, "/auth-setup", "POST", &impl->headers->dict,
"application/octet-stream", content, sizeof(content),
rtsp_auth_setup_reply, impl);
}
static int rtsp_auth_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
int res = 0;
pw_log_info("auth %d", status);
switch (status) {
case 200:
if (impl->encryption == CRYPTO_AUTH_SETUP)
res = rtsp_do_auth_setup(impl);
else
res = rtsp_do_announce(impl);
break;
}
return res;
}
static const char *find_attr(char **tokens, const char *key)
{
int i;
char *p, *s;
for (i = 0; tokens[i]; i++) {
if (!spa_strstartswith(tokens[i], key))
continue;
p = tokens[i] + strlen(key);
if ((s = rindex(p, '"')) == NULL)
continue;
*s = '\0';
if ((s = index(p, '"')) == NULL)
continue;
return s+1;
}
return NULL;
}
static int rtsp_do_auth(struct impl *impl, const struct spa_dict *headers)
{
const char *str, *realm, *nonce;
char **tokens;
int n_tokens;
if ((str = spa_dict_lookup(headers, "WWW-Authenticate")) == NULL)
return -EINVAL;
if (impl->password == NULL) {
pw_log_warn("authentication required but no raop.password property was given");
return -ENOTSUP;
}
pw_log_info("Auth: %s", str);
tokens = pw_split_strv(str, " ", INT_MAX, &n_tokens);
if (tokens == NULL || tokens[0] == NULL)
goto error;
impl->auth_method = strdup(tokens[0]);
if (spa_streq(impl->auth_method, "Digest")) {
realm = find_attr(tokens, "realm");
nonce = find_attr(tokens, "nonce");
if (realm == NULL || nonce == NULL)
goto error;
impl->realm = strdup(realm);
impl->nonce = strdup(nonce);
}
pw_free_strv(tokens);
rtsp_send(impl, "OPTIONS", NULL, NULL, rtsp_auth_reply);
return 0;
error:
pw_free_strv(tokens);
return -EINVAL;
}
static int rtsp_options_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
int res = 0;
pw_log_info("options %d", status);
switch (status) {
case 401:
res = rtsp_do_auth(impl, headers);
break;
case 200:
if (impl->encryption == CRYPTO_AUTH_SETUP)
res = rtsp_do_auth_setup(impl);
else
res = rtsp_do_announce(impl);
break;
}
return res;
}
static void rtsp_connected(void *data)
{
struct impl *impl = data;
uint32_t sci[2];
uint8_t rac[16];
char sac[16*4];
pw_log_info("connected");
impl->connected = true;
if (pw_getrandom(sci, sizeof(sci), 0) < 0 ||
pw_getrandom(rac, sizeof(rac), 0) < 0) {
pw_log_error("error generating random data: %m");
return;
}
pw_properties_setf(impl->headers, "Client-Instance",
"%08x%08x", sci[0], sci[1]);
base64_encode(rac, sizeof(rac), sac, '\0');
pw_properties_set(impl->headers, "Apple-Challenge", sac);
pw_properties_set(impl->headers, "User-Agent", DEFAULT_USER_AGENT);
pw_rtsp_client_send(impl->rtsp, "OPTIONS", &impl->headers->dict,
NULL, NULL, rtsp_options_reply, impl);
}
static void connection_cleanup(struct impl *impl)
{
impl->ready = false;
if (impl->server_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->server_source);
impl->server_source = NULL;
}
if (impl->server_fd >= 0) {
close(impl->server_fd);
impl->server_fd = -1;
}
if (impl->control_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->control_source);
impl->control_source = NULL;
}
if (impl->control_fd >= 0) {
close(impl->control_fd);
impl->control_fd = -1;
}
if (impl->timing_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->timing_source);
impl->timing_source = NULL;
}
if (impl->timing_fd >= 0) {
close(impl->timing_fd);
impl->timing_fd = -1;
}
free(impl->auth_method);
impl->auth_method = NULL;
free(impl->realm);
impl->realm = NULL;
free(impl->nonce);
impl->nonce = NULL;
}
static void rtsp_disconnected(void *data)
{
struct impl *impl = data;
pw_log_info("disconnected");
impl->connected = false;
connection_cleanup(impl);
}
static void rtsp_error(void *data, int res)
{
pw_log_error("error %d", res);
}
static void rtsp_message(void *data, int status,
const struct spa_dict *headers)
{
const struct spa_dict_item *it;
pw_log_info("message %d", status);
spa_dict_for_each(it, headers)
pw_log_info(" %s: %s", it->key, it->value);
}
static const struct pw_rtsp_client_events rtsp_events = {
PW_VERSION_RTSP_CLIENT_EVENTS,
.connected = rtsp_connected,
.error = rtsp_error,
.disconnected = rtsp_disconnected,
.message = rtsp_message,
};
static void stream_state_changed(void *d, enum pw_stream_state old,
enum pw_stream_state state, const char *error)
{
struct impl *impl = d;
switch (state) {
case PW_STREAM_STATE_ERROR:
case PW_STREAM_STATE_UNCONNECTED:
pw_impl_module_schedule_destroy(impl->module);
break;
case PW_STREAM_STATE_PAUSED:
rtsp_do_flush(impl);
break;
case PW_STREAM_STATE_STREAMING:
rtsp_do_record(impl);
break;
default:
break;
}
}
static int rtsp_do_connect(struct impl *impl)
{
const char *hostname, *port;
uint32_t session_id;
if (impl->connected) {
if (!impl->ready)
return rtsp_do_announce(impl);
return 0;
}
hostname = pw_properties_get(impl->props, "raop.ip");
port = pw_properties_get(impl->props, "raop.port");
if (hostname == NULL || port == NULL)
return -EINVAL;
if (pw_getrandom(&session_id, sizeof(session_id), 0) < 0)
return -errno;
spa_scnprintf(impl->session_id, sizeof(impl->session_id), "%u", session_id);
return pw_rtsp_client_connect(impl->rtsp, hostname, atoi(port), impl->session_id);
}
static int rtsp_teardown_reply(void *data, int status, const struct spa_dict *headers)
{
struct impl *impl = data;
const char *str;
pw_log_info("reply");
connection_cleanup(impl);
if ((str = spa_dict_lookup(headers, "Connection")) != NULL) {
if (spa_streq(str, "close"))
pw_rtsp_client_disconnect(impl->rtsp);
}
return 0;
}
static int rtsp_do_teardown(struct impl *impl)
{
if (!impl->ready)
return 0;
return rtsp_send(impl, "TEARDOWN", NULL, NULL, rtsp_teardown_reply);
}
static void stream_props_changed(struct impl *impl, uint32_t id, const struct spa_pod *param)
{
char buf[1024];
struct spa_pod_builder b = SPA_POD_BUILDER_INIT(buf, sizeof(buf));
struct spa_pod_frame f[1];
struct spa_pod_object *obj = (struct spa_pod_object *) param;
struct spa_pod_prop *prop;
spa_pod_builder_push_object(&b, &f[0], SPA_TYPE_OBJECT_Props, SPA_PARAM_Props);
SPA_POD_OBJECT_FOREACH(obj, prop) {
switch (prop->key) {
case SPA_PROP_mute:
{
bool mute;
if (spa_pod_get_bool(&prop->value, &mute) == 0) {
impl->mute = mute;
}
spa_pod_builder_prop(&b, SPA_PROP_softMute, 0);
spa_pod_builder_bool(&b, impl->mute);
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
case SPA_PROP_channelVolumes:
{
uint32_t i, n_vols;
float vols[SPA_AUDIO_MAX_CHANNELS], volume;
float soft_vols[SPA_AUDIO_MAX_CHANNELS];
if ((n_vols = spa_pod_copy_array(&prop->value, SPA_TYPE_Float,
vols, SPA_AUDIO_MAX_CHANNELS)) > 0) {
volume = 0.0f;
for (i = 0; i < n_vols; i++) {
volume += vols[i];
soft_vols[i] = 1.0f;
}
volume /= n_vols;
volume = SPA_CLAMPF(20.0 * log10(volume), VOLUME_MIN, VOLUME_MAX);
impl->volume = volume;
rtsp_send_volume(impl);
}
spa_pod_builder_prop(&b, SPA_PROP_softVolumes, 0);
spa_pod_builder_array(&b, sizeof(float), SPA_TYPE_Float,
n_vols, soft_vols);
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
case SPA_PROP_softVolumes:
case SPA_PROP_softMute:
break;
default:
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
}
param = spa_pod_builder_pop(&b, &f[0]);
pw_stream_set_param(impl->stream, id, param);
}
static void stream_param_changed(void *data, uint32_t id, const struct spa_pod *param)
{
struct impl *impl = data;
switch (id) {
case SPA_PARAM_Format:
if (param == NULL)
rtsp_do_teardown(impl);
else
rtsp_do_connect(impl);
break;
case SPA_PARAM_Props:
if (param != NULL)
stream_props_changed(impl, id, param);
break;
default:
break;
}
}
static const struct pw_stream_events playback_stream_events = {
PW_VERSION_STREAM_EVENTS,
.destroy = stream_destroy,
.state_changed = stream_state_changed,
.param_changed = stream_param_changed,
.process = playback_stream_process
};
static int create_stream(struct impl *impl)
{
int res;
uint32_t n_params;
const struct spa_pod *params[1];
uint8_t buffer[1024];
struct spa_pod_builder b;
impl->stream = pw_stream_new(impl->core, "RAOP sink", impl->stream_props);
impl->stream_props = NULL;
if (impl->stream == NULL)
return -errno;
pw_stream_add_listener(impl->stream,
&impl->stream_listener,
&playback_stream_events, impl);
n_params = 0;
spa_pod_builder_init(&b, buffer, sizeof(buffer));
params[n_params++] = spa_format_audio_raw_build(&b,
SPA_PARAM_EnumFormat, &impl->info);
if ((res = pw_stream_connect(impl->stream,
PW_DIRECTION_INPUT,
PW_ID_ANY,
PW_STREAM_FLAG_MAP_BUFFERS |
PW_STREAM_FLAG_RT_PROCESS,
params, n_params)) < 0)
return res;
impl->headers = pw_properties_new(NULL, NULL);
impl->rtsp = pw_rtsp_client_new(impl->loop, NULL, 0);
if (impl->rtsp == NULL)
return -errno;
pw_rtsp_client_add_listener(impl->rtsp, &impl->rtsp_listener,
&rtsp_events, impl);
return 0;
}
static void core_error(void *data, uint32_t id, int seq, int res, const char *message)
{
struct impl *impl = data;
pw_log_error("error id:%u seq:%d res:%d (%s): %s",
id, seq, res, spa_strerror(res), message);
if (id == PW_ID_CORE && res == -EPIPE)
pw_impl_module_schedule_destroy(impl->module);
}
static const struct pw_core_events core_events = {
PW_VERSION_CORE_EVENTS,
.error = core_error,
};
static void core_destroy(void *d)
{
struct impl *impl = d;
spa_hook_remove(&impl->core_listener);
impl->core = NULL;
pw_impl_module_schedule_destroy(impl->module);
}
static const struct pw_proxy_events core_proxy_events = {
.destroy = core_destroy,
};
static void impl_destroy(struct impl *impl)
{
if (impl->stream)
pw_stream_destroy(impl->stream);
if (impl->core && impl->do_disconnect)
pw_core_disconnect(impl->core);
if (impl->rtsp)
pw_rtsp_client_destroy(impl->rtsp);
if (impl->ctx)
EVP_CIPHER_CTX_free(impl->ctx);
pw_properties_free(impl->headers);
pw_properties_free(impl->stream_props);
pw_properties_free(impl->props);
free(impl->password);
free(impl);
}
static void module_destroy(void *data)
{
struct impl *impl = data;
spa_hook_remove(&impl->module_listener);
impl_destroy(impl);
}
static const struct pw_impl_module_events module_events = {
PW_VERSION_IMPL_MODULE_EVENTS,
.destroy = module_destroy,
};
static inline uint32_t format_from_name(const char *name, size_t len)
{
int i;
for (i = 0; spa_type_audio_format[i].name; i++) {
if (strncmp(name, spa_debug_type_short_name(spa_type_audio_format[i].name), len) == 0)
return spa_type_audio_format[i].type;
}
return SPA_AUDIO_FORMAT_UNKNOWN;
}
static uint32_t channel_from_name(const char *name)
{
int i;
for (i = 0; spa_type_audio_channel[i].name; i++) {
if (spa_streq(name, spa_debug_type_short_name(spa_type_audio_channel[i].name)))
return spa_type_audio_channel[i].type;
}
return SPA_AUDIO_CHANNEL_UNKNOWN;
}
static void parse_position(struct spa_audio_info_raw *info, const char *val, size_t len)
{
struct spa_json it[2];
char v[256];
spa_json_init(&it[0], val, len);
if (spa_json_enter_array(&it[0], &it[1]) <= 0)
spa_json_init(&it[1], val, len);
info->channels = 0;
while (spa_json_get_string(&it[1], v, sizeof(v)) > 0 &&
info->channels < SPA_AUDIO_MAX_CHANNELS) {
info->position[info->channels++] = channel_from_name(v);
}
}
static void parse_audio_info(const struct pw_properties *props, struct spa_audio_info_raw *info)
{
const char *str;
spa_zero(*info);
if ((str = pw_properties_get(props, PW_KEY_AUDIO_FORMAT)) == NULL)
str = DEFAULT_FORMAT;
info->format = format_from_name(str, strlen(str));
info->rate = pw_properties_get_uint32(props, PW_KEY_AUDIO_RATE, info->rate);
if (info->rate == 0)
info->rate = DEFAULT_RATE;
info->channels = pw_properties_get_uint32(props, PW_KEY_AUDIO_CHANNELS, info->channels);
info->channels = SPA_MIN(info->channels, SPA_AUDIO_MAX_CHANNELS);
if ((str = pw_properties_get(props, SPA_KEY_AUDIO_POSITION)) != NULL)
parse_position(info, str, strlen(str));
if (info->channels == 0)
parse_position(info, DEFAULT_POSITION, strlen(DEFAULT_POSITION));
}
static int calc_frame_size(struct spa_audio_info_raw *info)
{
int res = info->channels;
switch (info->format) {
case SPA_AUDIO_FORMAT_U8:
case SPA_AUDIO_FORMAT_S8:
case SPA_AUDIO_FORMAT_ALAW:
case SPA_AUDIO_FORMAT_ULAW:
return res;
case SPA_AUDIO_FORMAT_S16:
case SPA_AUDIO_FORMAT_S16_OE:
case SPA_AUDIO_FORMAT_U16:
return res * 2;
case SPA_AUDIO_FORMAT_S24:
case SPA_AUDIO_FORMAT_S24_OE:
case SPA_AUDIO_FORMAT_U24:
return res * 3;
case SPA_AUDIO_FORMAT_S24_32:
case SPA_AUDIO_FORMAT_S24_32_OE:
case SPA_AUDIO_FORMAT_S32:
case SPA_AUDIO_FORMAT_S32_OE:
case SPA_AUDIO_FORMAT_U32:
case SPA_AUDIO_FORMAT_U32_OE:
case SPA_AUDIO_FORMAT_F32:
case SPA_AUDIO_FORMAT_F32_OE:
return res * 4;
case SPA_AUDIO_FORMAT_F64:
case SPA_AUDIO_FORMAT_F64_OE:
return res * 8;
default:
return 0;
}
}
static void copy_props(struct impl *impl, struct pw_properties *props, const char *key)
{
const char *str;
if ((str = pw_properties_get(props, key)) != NULL) {
if (pw_properties_get(impl->stream_props, key) == NULL)
pw_properties_set(impl->stream_props, key, str);
}
}
SPA_EXPORT
int pipewire__module_init(struct pw_impl_module *module, const char *args)
{
struct pw_context *context = pw_impl_module_get_context(module);
struct pw_properties *props = NULL;
struct impl *impl;
const char *str, *name, *hostname, *ip, *port;
int res;
PW_LOG_TOPIC_INIT(mod_topic);
impl = calloc(1, sizeof(struct impl));
if (impl == NULL)
return -errno;
pw_log_debug("module %p: new %s", impl, args);
impl->server_fd = -1;
impl->control_fd = -1;
impl->timing_fd = -1;
impl->ctx = EVP_CIPHER_CTX_new();
if (impl->ctx == NULL) {
res = -errno;
pw_log_error( "can't create cipher context: %m");
goto error;
}
if (args == NULL)
args = "";
props = pw_properties_new_string(args);
if (props == NULL) {
res = -errno;
pw_log_error( "can't create properties: %m");
goto error;
}
impl->props = props;
impl->stream_props = pw_properties_new(NULL, NULL);
if (impl->stream_props == NULL) {
res = -errno;
pw_log_error( "can't create properties: %m");
goto error;
}
impl->module = module;
impl->context = context;
impl->loop = pw_context_get_main_loop(context);
ip = pw_properties_get(props, "raop.ip");
port = pw_properties_get(props, "raop.port");
if (ip == NULL || port == NULL) {
pw_log_error("Missing raop.ip or raop.port");
res = -EINVAL;
goto error;
}
if (pw_properties_get(props, PW_KEY_NODE_VIRTUAL) == NULL)
pw_properties_set(props, PW_KEY_NODE_VIRTUAL, "true");
if (pw_properties_get(props, PW_KEY_MEDIA_CLASS) == NULL)
pw_properties_set(props, PW_KEY_MEDIA_CLASS, "Audio/Sink");
if (pw_properties_get(props, PW_KEY_DEVICE_ICON_NAME) == NULL)
pw_properties_set(props, PW_KEY_DEVICE_ICON_NAME, "audio-speakers");
if ((name = pw_properties_get(props, "raop.name")) == NULL)
name = "RAOP";
if ((str = strstr(name, "@"))) {
str++;
if (strlen(str) > 0)
name = str;
}
if ((hostname = pw_properties_get(props, "raop.hostname")) == NULL)
hostname = name;
if (pw_properties_get(props, PW_KEY_NODE_NAME) == NULL)
pw_properties_setf(props, PW_KEY_NODE_NAME, "raop_sink.%s.%s.%s",
hostname, ip, port);
if (pw_properties_get(props, PW_KEY_NODE_DESCRIPTION) == NULL)
pw_properties_setf(props, PW_KEY_NODE_DESCRIPTION,
"%s", name);
if (pw_properties_get(props, PW_KEY_NODE_LATENCY) == NULL)
pw_properties_set(props, PW_KEY_NODE_LATENCY, "352/44100");
if ((str = pw_properties_get(props, "stream.props")) != NULL)
pw_properties_update_string(impl->stream_props, str, strlen(str));
copy_props(impl, props, PW_KEY_AUDIO_FORMAT);
copy_props(impl, props, PW_KEY_AUDIO_RATE);
copy_props(impl, props, PW_KEY_AUDIO_CHANNELS);
copy_props(impl, props, SPA_KEY_AUDIO_POSITION);
copy_props(impl, props, PW_KEY_DEVICE_ICON_NAME);
copy_props(impl, props, PW_KEY_NODE_NAME);
copy_props(impl, props, PW_KEY_NODE_DESCRIPTION);
copy_props(impl, props, PW_KEY_NODE_GROUP);
copy_props(impl, props, PW_KEY_NODE_LATENCY);
copy_props(impl, props, PW_KEY_NODE_VIRTUAL);
copy_props(impl, props, PW_KEY_MEDIA_CLASS);
parse_audio_info(impl->stream_props, &impl->info);
impl->frame_size = calc_frame_size(&impl->info);
if (impl->frame_size == 0) {
pw_log_error("unsupported audio format:%d channels:%d",
impl->info.format, impl->info.channels);
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.transport")) == NULL)
str = "udp";
if (spa_streq(str, "udp"))
impl->protocol = PROTO_UDP;
else if (spa_streq(str, "tcp"))
impl->protocol = PROTO_TCP;
else {
pw_log_error( "can't handle transport %s", str);
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.encryption.type")) == NULL)
str = "none";
if (spa_streq(str, "none"))
impl->encryption = CRYPTO_NONE;
else if (spa_streq(str, "RSA"))
impl->encryption = CRYPTO_RSA;
else if (spa_streq(str, "auth_setup"))
impl->encryption = CRYPTO_AUTH_SETUP;
else {
pw_log_error( "can't handle encryption type %s", str);
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.audio.codec")) == NULL)
str = "PCM";
if (spa_streq(str, "PCM"))
impl->codec = CODEC_PCM;
else if (spa_streq(str, "ALAC"))
impl->codec = CODEC_ALAC;
else {
pw_log_error( "can't handle codec type %s", str);
res = -EINVAL;
goto error;
}
str = pw_properties_get(props, "raop.password");
impl->password = str ? strdup(str) : NULL;
impl->core = pw_context_get_object(impl->context, PW_TYPE_INTERFACE_Core);
if (impl->core == NULL) {
str = pw_properties_get(props, PW_KEY_REMOTE_NAME);
impl->core = pw_context_connect(impl->context,
pw_properties_new(
PW_KEY_REMOTE_NAME, str,
NULL),
0);
impl->do_disconnect = true;
}
if (impl->core == NULL) {
res = -errno;
pw_log_error("can't connect: %m");
goto error;
}
pw_proxy_add_listener((struct pw_proxy*)impl->core,
&impl->core_proxy_listener,
&core_proxy_events, impl);
pw_core_add_listener(impl->core,
&impl->core_listener,
&core_events, impl);
if ((res = create_stream(impl)) < 0)
goto error;
pw_impl_module_add_listener(module, &impl->module_listener, &module_events, impl);
pw_impl_module_update_properties(module, &SPA_DICT_INIT_ARRAY(module_props));
return 0;
error:
impl_destroy(impl);
return res;
}