pipewire/src/modules/module-raop-sink.c
Wim Taymans 8bbca3b8f3 spa: add spa_audio_parse_position_n
Add a function that accepts the size of the position array when reading
the audio positions. This makes it possible to decouple the position
array size from SPA_AUDIO_MAX_CHANNELS.

Also use SPA_N_ELEMENTS to pass the number of array elements to
functions instead of a fixed constant. This makes it easier to change
the array size later to a different constant without having to patch up
all the places where the size is used.
2025-10-21 09:59:13 +02:00

1976 lines
51 KiB
C

/* PipeWire */
/* SPDX-FileCopyrightText: Copyright © 2021 Wim Taymans */
/* SPDX-License-Identifier: MIT */
#include "config.h"
#include <string.h>
#include <stdio.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>
#include <limits.h>
#include <math.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <openssl/err.h>
#if OPENSSL_API_LEVEL >= 30000
#include <openssl/core_names.h>
#endif
#include <openssl/rand.h>
#include <openssl/rsa.h>
#include <openssl/aes.h>
#include <openssl/md5.h>
#include <openssl/evp.h>
#include <spa/utils/cleanup.h>
#include <spa/utils/result.h>
#include <spa/utils/string.h>
#include <spa/utils/json.h>
#include <spa/utils/ringbuffer.h>
#include <spa/debug/types.h>
#include <spa/pod/builder.h>
#include <spa/param/audio/format-utils.h>
#include <spa/param/audio/raw.h>
#include <pipewire/impl.h>
#include <pipewire/i18n.h>
#include "network-utils.h"
#include "module-raop/rtsp-client.h"
#include "module-rtp/rtp.h"
#include "module-rtp/stream.h"
/** \page page_module_raop_sink AirPlay Sink
*
* Creates a new Sink to stream to an Airplay device.
*
* Normally this sink is automatically created with \ref page_module_raop_discover
* with the right parameters but it is possible to manually create a RAOP sink
* as well.
*
* ## Module Name
*
* `libpipewire-module-raop-sink`
*
* ## Module Options
*
* Options specific to the behavior of this module
*
* - `raop.ip`: The ip address of the remote end.
* - `raop.port`: The port of the remote end.
* - `raop.name`: The name of the remote end.
* - `raop.hostname`: The hostname of the remote end.
* - `raop.transport`: The data transport to use, one of "udp" or "tcp". Defaults
* to "udp".
* - `raop.encryption.type`: The encryption type to use. One of "none", "RSA" or
* "auth_setup". Default is "none".
* - `raop.audio.codec`: The audio codec to use. Needs to be "PCM". Defaults to "PCM".
* - `raop.password`: The password to use.
* - `stream.props = {}`: properties to be passed to the sink stream
*
* Options with well-known behavior.
*
* - \ref PW_KEY_REMOTE_NAME
* - \ref PW_KEY_AUDIO_FORMAT
* - \ref PW_KEY_AUDIO_RATE
* - \ref PW_KEY_AUDIO_CHANNELS
* - \ref SPA_KEY_AUDIO_POSITION
* - \ref PW_KEY_NODE_NAME
* - \ref PW_KEY_NODE_DESCRIPTION
* - \ref PW_KEY_NODE_GROUP
* - \ref PW_KEY_NODE_LATENCY
* - \ref PW_KEY_NODE_VIRTUAL
* - \ref PW_KEY_MEDIA_CLASS
*
* ## Example configuration
*
*\code{.unparsed}
* # ~/.config/pipewire/pipewire.conf.d/my-raop-sink.conf
*
* context.modules = [
* { name = libpipewire-module-raop-sink
* args = {
* # Set the remote address to tunnel to
* raop.ip = "127.0.0.1"
* raop.port = 8190
* raop.name = "my-raop-device"
* raop.hostname = "My Service"
* #raop.transport = "udp"
* raop.encryption.type = "RSA"
* #raop.audio.codec = "PCM"
* #raop.password = "****"
* #audio.format = "S16"
* #audio.rate = 44100
* #audio.channels = 2
* #audio.position = [ FL FR ]
* stream.props = {
* # extra sink properties
* }
* }
* }
* ]
*\endcode
*
* ## See also
*
* \ref page_module_raop_discover
*/
#define NAME "raop-sink"
PW_LOG_TOPIC(mod_topic, "mod." NAME);
#define PW_LOG_TOPIC_DEFAULT mod_topic
#define BUFFER_SIZE (1u<<22)
#define BUFFER_MASK (BUFFER_SIZE-1)
#define BUFFER_SIZE2 (BUFFER_SIZE>>1)
#define BUFFER_MASK2 (BUFFER_SIZE2-1)
#define FRAMES_PER_TCP_PACKET 4096
#define FRAMES_PER_UDP_PACKET 352
#define RAOP_AUDIO_PORT 6000
#define RAOP_UDP_CONTROL_PORT 6001
#define RAOP_UDP_TIMING_PORT 6002
#define AES_CHUNK_SIZE 16
#ifndef MD5_DIGEST_LENGTH
#define MD5_DIGEST_LENGTH 16
#endif
#define MD5_HASH_LENGTH (2*MD5_DIGEST_LENGTH)
#define DEFAULT_USER_NAME "PipeWire"
#define RAOP_AUTH_USER_NAME "iTunes"
#define MAX_PORT_RETRY 128
#define RAOP_FORMAT "S16LE"
#define RAOP_STRIDE (2*DEFAULT_CHANNELS)
#define RAOP_RATE 44100
#define RAOP_LATENCY_MS 250
#define DEFAULT_LATENCY_MS 1500
#define MAX_CHANNELS SPA_AUDIO_MAX_CHANNELS
#define VOLUME_MAX 0.0
#define VOLUME_MIN -30.0
#define VOLUME_MUTE -144.0
#define MODULE_USAGE "( raop.ip=<ip address of host> ) " \
"( raop.port=<remote port> ) " \
"( raop.name=<name of host> ) " \
"( raop.hostname=<hostname of host> ) " \
"( raop.transport=<transport, default:udp> ) " \
"( raop.encryption.type=<encryption, default:none> ) " \
"( raop.audio.codec=PCM ) " \
"( raop.password=<password for auth> ) " \
"( raop.latency.ms=<min latency in ms, default:"SPA_STRINGIFY(DEFAULT_LATENCY_MS)"> ) " \
"( node.latency=<latency as fraction> ) " \
"( node.name=<name of the nodes> ) " \
"( node.description=<description of the nodes> ) " \
"( audio.format=<format, default:"RAOP_FORMAT"> ) " \
"( audio.rate=<sample rate, default: "SPA_STRINGIFY(RAOP_RATE)"> ) " \
"( audio.channels=<number of channels, default:"SPA_STRINGIFY(DEFAULT_CHANNELS)"> ) " \
"( audio.position=<channel map, default:"DEFAULT_POSITION"> ) " \
"( stream.props=<properties> ) "
static const struct spa_dict_item module_props[] = {
{ PW_KEY_MODULE_AUTHOR, "Wim Taymans <wim.taymans@gmail.com>" },
{ PW_KEY_MODULE_DESCRIPTION, "An RAOP audio sink" },
{ PW_KEY_MODULE_USAGE, MODULE_USAGE },
{ PW_KEY_MODULE_VERSION, PACKAGE_VERSION },
};
enum {
PROTO_TCP,
PROTO_UDP,
};
enum {
CRYPTO_NONE,
CRYPTO_RSA,
CRYPTO_AUTH_SETUP,
CRYPTO_FP_SAP25,
};
enum {
CODEC_PCM,
CODEC_ALAC,
CODEC_AAC,
CODEC_AAC_ELD,
};
struct impl {
struct pw_context *context;
struct pw_properties *props;
struct pw_impl_module *module;
struct pw_loop *loop;
struct pw_timer_queue *timer_queue;
struct spa_hook module_listener;
int protocol;
int encryption;
int codec;
struct pw_core *core;
struct spa_hook core_proxy_listener;
struct spa_hook core_listener;
struct pw_properties *stream_props;
struct rtp_stream *stream;
struct pw_rtsp_client *rtsp;
struct spa_hook rtsp_listener;
struct pw_properties *headers;
char session_id[32];
char *password;
char *auth_method;
char *realm;
char *nonce;
unsigned int do_disconnect:1;
uint8_t aes_key[AES_CHUNK_SIZE]; /* Key for aes-cbc */
uint8_t aes_iv[AES_CHUNK_SIZE]; /* Initialization vector for cbc */
EVP_CIPHER_CTX *ctx;
uint16_t control_port;
int control_fd;
struct spa_source *control_source;
struct pw_timer feedback_timer;
uint16_t timing_port;
int timing_fd;
struct spa_source *timing_source;
uint16_t server_port;
int server_fd;
struct spa_source *server_source;
uint32_t psamples;
uint32_t rate;
uint32_t mtu;
uint32_t stride;
uint32_t latency;
uint32_t ssrc;
uint32_t sync;
uint32_t sync_period;
unsigned int connected:1;
unsigned int ready:1;
unsigned int recording:1;
bool mute;
float volume;
struct spa_ringbuffer ring;
uint8_t buffer[BUFFER_SIZE];
struct spa_io_position *io_position;
uint32_t filled;
};
static inline void bit_writer(uint8_t **p, int *pos, uint8_t data, int len)
{
int rb = 8 - *pos - len;
if (rb >= 0) {
**p = (*pos ? **p : 0) | (data << rb);
*pos += len;
} else {
*(*p)++ |= (data >> -rb);
**p = data << (8+rb);
*pos = -rb;
}
}
static int aes_encrypt(struct impl *impl, uint8_t *data, int len)
{
int i = len & ~0xf, clen = i;
EVP_EncryptInit(impl->ctx, EVP_aes_128_cbc(), impl->aes_key, impl->aes_iv);
EVP_EncryptUpdate(impl->ctx, data, &clen, data, i);
return i;
}
static inline uint64_t timespec_to_ntp(struct timespec *ts)
{
uint64_t ntp = (uint64_t) ts->tv_nsec * UINT32_MAX / SPA_NSEC_PER_SEC;
return ntp | (uint64_t) (ts->tv_sec + 0x83aa7e80) << 32;
}
static inline uint64_t ntp_now(void)
{
struct timespec now;
clock_gettime(CLOCK_REALTIME, &now);
return timespec_to_ntp(&now);
}
static int send_udp_sync_packet(struct impl *impl, uint32_t rtptime, unsigned int first)
{
uint32_t out[3];
uint32_t latency = impl->latency;
uint64_t transmitted;
struct rtp_header header;
struct iovec iov[2];
struct msghdr msg;
int res;
spa_zero(header);
header.v = 2;
if (first)
header.x = 1;
header.m = 1;
header.pt = 84;
header.sequence_number = 7;
header.timestamp = htonl(rtptime - latency);
iov[0].iov_base = &header;
iov[0].iov_len = 8;
transmitted = ntp_now();
out[0] = htonl(transmitted >> 32);
out[1] = htonl(transmitted & 0xffffffff);
out[2] = htonl(rtptime);
iov[1].iov_base = out;
iov[1].iov_len = sizeof(out);
msg.msg_name = NULL;
msg.msg_namelen = 0;
msg.msg_iov = iov;
msg.msg_iovlen = 2;
msg.msg_control = NULL;
msg.msg_controllen = 0;
msg.msg_flags = 0;
res = sendmsg(impl->control_fd, &msg, MSG_NOSIGNAL);
if (res < 0) {
res = -errno;
pw_log_warn("error sending control packet: %d", res);
}
pw_log_debug("raop control sync: first:%d latency:%u now:%"PRIx64" rtptime:%u",
first, latency, transmitted, rtptime);
return res;
}
static int send_udp_timing_packet(struct impl *impl, uint64_t remote, uint64_t received,
struct sockaddr *dest_addr, socklen_t addrlen)
{
uint32_t out[6];
uint64_t transmitted;
struct rtp_header header;
struct iovec iov[2];
struct msghdr msg;
int res;
spa_zero(header);
header.v = 2;
header.pt = 83;
header.m = 1;
iov[0].iov_base = &header;
iov[0].iov_len = 8;
out[0] = htonl(remote >> 32);
out[1] = htonl(remote & 0xffffffff);
out[2] = htonl(received >> 32);
out[3] = htonl(received & 0xffffffff);
transmitted = ntp_now();
out[4] = htonl(transmitted >> 32);
out[5] = htonl(transmitted & 0xffffffff);
iov[1].iov_base = out;
iov[1].iov_len = sizeof(out);
msg.msg_name = dest_addr;
msg.msg_namelen = addrlen;
msg.msg_iov = iov;
msg.msg_iovlen = 2;
msg.msg_control = NULL;
msg.msg_controllen = 0;
msg.msg_flags = 0;
res = sendmsg(impl->timing_fd, &msg, MSG_NOSIGNAL);
if (res < 0) {
res = -errno;
pw_log_warn("error sending timing packet: %d", res);
}
pw_log_debug("raop timing sync: remote:%"PRIx64" received:%"PRIx64" transmitted:%"PRIx64,
remote, received, transmitted);
return res;
}
static int write_codec_pcm(void *dst, void *frames, uint32_t n_frames)
{
uint8_t *bp, *b, *d = frames;
int bpos = 0;
uint32_t i;
b = bp = dst;
bit_writer(&bp, &bpos, 1, 3); /* channel=1, stereo */
bit_writer(&bp, &bpos, 0, 4); /* Unknown */
bit_writer(&bp, &bpos, 0, 8); /* Unknown */
bit_writer(&bp, &bpos, 0, 4); /* Unknown */
bit_writer(&bp, &bpos, 1, 1); /* Hassize */
bit_writer(&bp, &bpos, 0, 2); /* Unused */
bit_writer(&bp, &bpos, 1, 1); /* Is-not-compressed */
bit_writer(&bp, &bpos, (n_frames >> 24) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames >> 16) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames >> 8) & 0xff, 8);
bit_writer(&bp, &bpos, (n_frames) & 0xff, 8);
for (i = 0; i < n_frames; i++) {
bit_writer(&bp, &bpos, *(d + 1), 8);
bit_writer(&bp, &bpos, *(d + 0), 8);
bit_writer(&bp, &bpos, *(d + 3), 8);
bit_writer(&bp, &bpos, *(d + 2), 8);
d += 4;
}
bit_writer(&bp, &bpos, 7, 3); /* end tag */
return bp - b + 1;
}
static ssize_t send_packet(int fd, struct msghdr *msg)
{
ssize_t n;
n = sendmsg(fd, msg, MSG_NOSIGNAL);
if (n < 0)
pw_log_debug("sendmsg() failed: %m");
return n;
}
static void stream_send_packet(void *data, struct iovec *iov, size_t iovlen)
{
struct impl *impl = data;
const size_t max = 8 + impl->mtu;
uint32_t tcp_pkt[1], out[max], len, n_frames, rtptime;
struct iovec out_vec[3];
struct rtp_header *header;
struct msghdr msg;
uint8_t *dst;
if (!impl->recording)
return;
header = (struct rtp_header*)iov[0].iov_base;
if (header->v != 2)
pw_log_warn("invalid rtp packet version");
rtptime = htonl(header->timestamp);
if (header->m || ++impl->sync == impl->sync_period) {
send_udp_sync_packet(impl, rtptime, header->m);
impl->sync = 0;
}
n_frames = iov[1].iov_len / impl->stride;
msg.msg_name = NULL;
msg.msg_namelen = 0;
msg.msg_iov = out_vec;
msg.msg_iovlen = 0;
msg.msg_control = NULL;
msg.msg_controllen = 0;
msg.msg_flags = 0;
dst = (uint8_t*)&out[0];
switch (impl->codec) {
case CODEC_PCM:
case CODEC_ALAC:
len = write_codec_pcm(dst, (void *)iov[1].iov_base, n_frames);
break;
default:
len = 8 + impl->mtu;
memset(dst, 0, len);
break;
}
if (impl->encryption == CRYPTO_RSA)
aes_encrypt(impl, dst, len);
if (impl->protocol == PROTO_TCP) {
out[0] |= htonl((uint32_t) len + 12);
tcp_pkt[0] = htonl(0x24000000);
out_vec[msg.msg_iovlen++] = (struct iovec) { tcp_pkt, 4 };
}
out_vec[msg.msg_iovlen++] = (struct iovec) { header, 12 };
out_vec[msg.msg_iovlen++] = (struct iovec) { out, len };
pw_log_debug("raop sending %zu", out_vec[0].iov_len + out_vec[1].iov_len + out_vec[2].iov_len);
send_packet(impl->server_fd, &msg);
}
static int create_udp_socket(struct impl *impl, uint16_t *port)
{
int res, ip_version, fd, val, i, af;
struct sockaddr_in sa4;
struct sockaddr_in6 sa6;
if ((res = pw_rtsp_client_get_local_ip(impl->rtsp,
&ip_version, NULL, 0)) < 0)
return res;
if (ip_version == 4) {
sa4.sin_family = af = AF_INET;
sa4.sin_addr.s_addr = INADDR_ANY;
} else {
sa6.sin6_family = af = AF_INET6;
sa6.sin6_addr = in6addr_any;
}
if ((fd = socket(af, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)) < 0) {
pw_log_error("socket failed: %m");
return -errno;
}
#ifdef SO_TIMESTAMP
val = 1;
if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, &val, sizeof(val)) < 0) {
res = -errno;
pw_log_error("setsockopt failed: %m");
goto error;
}
#endif
val = 1;
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) < 0) {
res = -errno;
pw_log_error("setsockopt failed: %m");
goto error;
}
for (i = 0; i < MAX_PORT_RETRY; i++) {
int ret;
if (ip_version == 4) {
sa4.sin_port = htons(*port);
ret = bind(fd, (struct sockaddr*)&sa4, sizeof(sa4));
} else {
sa6.sin6_port = htons(*port);
ret = bind(fd, (struct sockaddr*)&sa6, sizeof(sa6));
}
if (ret == 0)
break;
if (ret < 0 && errno != EADDRINUSE) {
res = -errno;
pw_log_error("bind failed: %m");
goto error;
}
(*port)++;
}
return fd;
error:
close(fd);
return res;
}
static int connect_socket(struct impl *impl, int type, int fd, uint16_t port)
{
const char *host;
struct sockaddr_storage addr;
socklen_t len = 0;
int res;
host = pw_properties_get(impl->props, "raop.ip");
if (host == NULL)
return -EINVAL;
if ((res = pw_net_parse_address(host, port, &addr, &len)) < 0) {
pw_log_error("Invalid host '%s' port:%d", host, port);
return -EINVAL;
}
if (fd < 0 &&
(fd = socket(addr.ss_family, type | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)) < 0) {
pw_log_error("socket failed: %m");
return -errno;
}
res = connect(fd, (struct sockaddr*)&addr, len);
if (res < 0 && errno != EINPROGRESS) {
res = -errno;
pw_log_error("connect failed: %m");
goto error;
}
pw_log_info("Connected to host:%s port:%d", host, port);
return fd;
error:
if (fd >= 0)
close(fd);
return res;
}
static void
on_timing_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
uint32_t packet[8];
ssize_t bytes;
if (mask & (SPA_IO_ERR | SPA_IO_HUP)) {
pw_log_warn("error on timing socket: %08x", mask);
pw_loop_update_io(impl->loop, impl->timing_source, 0);
return;
}
if (mask & SPA_IO_IN) {
uint64_t remote, received;
struct sockaddr_storage sender;
socklen_t sender_size = sizeof(sender);
received = ntp_now();
bytes = recvfrom(impl->timing_fd, packet, sizeof(packet), 0,
(struct sockaddr*)&sender, &sender_size);
if (bytes < 0) {
pw_log_debug("error reading timing packet: %m");
return;
}
if (bytes != sizeof(packet)) {
pw_log_warn("discarding short (%zd < %zd) timing packet",
bytes, sizeof(bytes));
return;
}
if (packet[0] != ntohl(0x80d20007))
return;
remote = ((uint64_t)ntohl(packet[6])) << 32 | ntohl(packet[7]);
if (send_udp_timing_packet(impl, remote, received,
(struct sockaddr *)&sender, sender_size) < 0) {
pw_log_warn("error sending timing packet");
return;
}
}
}
static void
on_control_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
uint32_t packet[2];
ssize_t bytes;
if (mask & (SPA_IO_ERR | SPA_IO_HUP)) {
pw_log_warn("error on control socket: %08x", mask);
pw_loop_update_io(impl->loop, impl->control_source, 0);
return;
}
if (mask & SPA_IO_IN) {
uint32_t hdr;
uint16_t seq, num;
bytes = read(impl->control_fd, packet, sizeof(packet));
if (bytes < 0) {
pw_log_warn("error reading control packet: %m");
return;
}
if (bytes != sizeof(packet)) {
pw_log_warn("discarding short (%zd < %zd) control packet",
bytes, sizeof(bytes));
return;
}
hdr = ntohl(packet[0]);
if ((hdr & 0xff000000) != 0x80000000)
return;
seq = ntohl(packet[1]) >> 16;
num = ntohl(packet[1]) & 0xffff;
if (num == 0)
return;
switch (hdr >> 16 & 0xff) {
case 0xd5:
pw_log_debug("retransmit request seq:%u num:%u", seq, num);
/* retransmit request */
break;
}
}
}
static void base64_encode(const uint8_t *data, size_t len, char *enc, char pad)
{
static const char tab[] =
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
size_t i;
for (i = 0; i < len; i += 3) {
uint32_t v;
v = data[i+0] << 16;
v |= (i+1 < len ? data[i+1] : 0) << 8;
v |= (i+2 < len ? data[i+2] : 0);
*enc++ = tab[(v >> (3*6)) & 0x3f];
*enc++ = tab[(v >> (2*6)) & 0x3f];
*enc++ = i+1 < len ? tab[(v >> (1*6)) & 0x3f] : pad;
*enc++ = i+2 < len ? tab[(v >> (0*6)) & 0x3f] : pad;
}
*enc = '\0';
}
static size_t base64_decode(const char *data, size_t len, uint8_t *dec)
{
uint8_t tab[] = {
62, -1, -1, -1, 63, 52, 53, 54, 55, 56,
57, 58, 59, 60, 61, -1, -1, -1, -1, -1,
-1, -1, 0, 1, 2, 3, 4, 5, 6, 7,
8, 9, 10, 11, 12, 13, 14, 15, 16, 17,
18, 19, 20, 21, 22, 23, 24, 25, -1, -1,
-1, -1, -1, -1, 26, 27, 28, 29, 30, 31,
32, 33, 34, 35, 36, 37, 38, 39, 40, 41,
42, 43, 44, 45, 46, 47, 48, 49, 50, 51 };
size_t i, j;
for (i = 0, j = 0; i < len; i += 4) {
uint32_t v;
v = tab[data[i+0]-43] << (3*6);
v |= tab[data[i+1]-43] << (2*6);
v |= (data[i+2] == '=' ? 0 : tab[data[i+2]-43]) << (1*6);
v |= (data[i+3] == '=' ? 0 : tab[data[i+3]-43]);
dec[j++] = (v >> 16) & 0xff;
if (data[i+2] != '=') dec[j++] = (v >> 8) & 0xff;
if (data[i+3] != '=') dec[j++] = v & 0xff;
}
return j;
}
SPA_PRINTF_FUNC(2,3)
static int MD5_hash(char hash[MD5_HASH_LENGTH+1], const char *fmt, ...)
{
unsigned char d[MD5_DIGEST_LENGTH];
int i;
va_list args;
char buffer[1024];
unsigned int size;
va_start(args, fmt);
vsnprintf(buffer, sizeof(buffer), fmt, args);
va_end(args);
size = MD5_DIGEST_LENGTH;
EVP_Digest(buffer, strlen(buffer), d, &size, EVP_md5(), NULL);
for (i = 0; i < MD5_DIGEST_LENGTH; i++)
sprintf(&hash[2*i], "%02x", (uint8_t) d[i]);
hash[MD5_HASH_LENGTH] = '\0';
return 0;
}
static int rtsp_add_raop_auth_header(struct impl *impl, const char *method)
{
char auth[1024];
if (impl->auth_method == NULL)
return 0;
if (spa_streq(impl->auth_method, "Basic")) {
char buf[256];
char enc[512];
spa_scnprintf(buf, sizeof(buf), "%s:%s", RAOP_AUTH_USER_NAME, impl->password);
base64_encode((uint8_t*)buf, strlen(buf), enc, '=');
spa_scnprintf(auth, sizeof(auth), "Basic %s", enc);
}
else if (spa_streq(impl->auth_method, "Digest")) {
const char *url;
char h1[MD5_HASH_LENGTH+1];
char h2[MD5_HASH_LENGTH+1];
char resp[MD5_HASH_LENGTH+1];
url = pw_rtsp_client_get_url(impl->rtsp);
MD5_hash(h1, "%s:%s:%s", RAOP_AUTH_USER_NAME, impl->realm, impl->password);
MD5_hash(h2, "%s:%s", method, url);
MD5_hash(resp, "%s:%s:%s", h1, impl->nonce, h2);
spa_scnprintf(auth, sizeof(auth),
"username=\"%s\", realm=\"%s\", nonce=\"%s\", uri=\"%s\", response=\"%s\"",
RAOP_AUTH_USER_NAME, impl->realm, impl->nonce, url, resp);
}
else
goto error;
pw_properties_setf(impl->headers, "Authorization", "%s %s",
impl->auth_method, auth);
return 0;
error:
pw_log_error("error adding raop RSA auth");
return -EINVAL;
}
static int rtsp_send(struct impl *impl, const char *method,
const char *content_type, const char *content,
int (*reply) (void *data, int status, const struct spa_dict *headers, const struct pw_array *content))
{
int res;
rtsp_add_raop_auth_header(impl, method);
res = pw_rtsp_client_send(impl->rtsp, method, &impl->headers->dict,
content_type, content, reply, impl);
return res;
}
static int rtsp_log_reply_status(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
pw_log_info("reply status: %d", status);
return 0;
}
static int rtsp_send_volume(struct impl *impl)
{
if (!impl->recording)
return 0;
char header[128], volstr[64];
snprintf(header, sizeof(header), "volume: %s\r\n",
spa_dtoa(volstr, sizeof(volstr), impl->mute ? VOLUME_MUTE : impl->volume));
return rtsp_send(impl, "SET_PARAMETER", "text/parameters", header, rtsp_log_reply_status);
}
static void rtsp_do_post_feedback(void *data)
{
struct impl *impl = data;
pw_rtsp_client_url_send(impl->rtsp, "/feedback", "POST", &impl->headers->dict,
NULL, NULL, 0, rtsp_log_reply_status, impl);
pw_timer_queue_add(impl->timer_queue, &impl->feedback_timer,
&impl->feedback_timer.timeout, 2 * SPA_NSEC_PER_SEC,
rtsp_do_post_feedback, impl);
}
static uint32_t msec_to_samples(struct impl *impl, uint32_t msec)
{
return (uint64_t) msec * impl->rate / 1000;
}
static int rtsp_record_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
const char *str;
char progress[128];
struct spa_process_latency_info process_latency;
pw_log_info("record status: %d", status);
switch (status) {
case 200:
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
// feedback timer is only needed for auth_setup encryption
if (impl->encryption == CRYPTO_FP_SAP25) {
pw_timer_queue_cancel(&impl->feedback_timer);
pw_timer_queue_add(impl->timer_queue, &impl->feedback_timer,
NULL, 2 * SPA_NSEC_PER_SEC,
rtsp_do_post_feedback, impl);
}
if ((str = spa_dict_lookup(headers, "Audio-Latency")) != NULL) {
uint32_t l;
if (spa_atou32(str, &l, 0))
impl->latency = SPA_MAX(l, impl->latency);
}
spa_zero(process_latency);
process_latency.rate = impl->latency + msec_to_samples(impl, RAOP_LATENCY_MS);
rtp_stream_update_process_latency(impl->stream, &process_latency);
rtp_stream_set_first(impl->stream);
impl->sync = 0;
impl->recording = true;
rtsp_send_volume(impl);
snprintf(progress, sizeof(progress), "progress: %s/%s/%s\r\n", "0", "0", "0");
return rtsp_send(impl, "SET_PARAMETER", "text/parameters", progress, rtsp_log_reply_status);
}
static int rtsp_do_record(struct impl *impl)
{
int res;
uint16_t seq;
uint32_t rtptime;
if (!impl->ready || impl->recording)
return 0;
seq = rtp_stream_get_seq(impl->stream);
rtptime = rtp_stream_get_time(impl->stream, &impl->rate);
pw_properties_set(impl->headers, "Range", "npt=0-");
pw_properties_setf(impl->headers, "RTP-Info",
"seq=%u;rtptime=%u", seq, rtptime);
res = rtsp_send(impl, "RECORD", NULL, NULL, rtsp_record_reply);
pw_properties_set(impl->headers, "Range", NULL);
pw_properties_set(impl->headers, "RTP-Info", NULL);
return res;
}
static void
on_server_source_io(void *data, int fd, uint32_t mask)
{
struct impl *impl = data;
if (mask & (SPA_IO_ERR | SPA_IO_HUP))
goto error;
if (mask & SPA_IO_OUT) {
int res;
socklen_t len;
pw_loop_update_io(impl->loop, impl->server_source,
impl->server_source->mask & ~SPA_IO_OUT);
len = sizeof(res);
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &res, &len) < 0) {
pw_log_error("getsockopt: %m");
goto error;
}
if (res != 0)
goto error;
impl->ready = true;
if (rtp_stream_get_state(impl->stream, NULL) == PW_STREAM_STATE_STREAMING)
rtsp_do_record(impl);
}
return;
error:
pw_loop_update_io(impl->loop, impl->server_source, 0);
pw_impl_module_schedule_destroy(impl->module);
}
static int rtsp_setup_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
const char *str, *state = NULL, *s;
size_t len;
uint64_t ntp;
uint16_t control_port, timing_port;
pw_log_info("setup status: %d", status);
switch (status) {
case 200:
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
if ((str = spa_dict_lookup(headers, "Session")) == NULL) {
pw_log_error("missing Session header");
return 0;
}
pw_properties_set(impl->headers, "Session", str);
if ((str = spa_dict_lookup(headers, "Transport")) == NULL) {
pw_log_error("missing Transport header");
return 0;
}
impl->server_port = control_port = timing_port = 0;
while ((s = pw_split_walk(str, ";", &len, &state)) != NULL) {
if (spa_strstartswith(s, "server_port=")) {
impl->server_port = atoi(s + 12);
}
else if (spa_strstartswith(s, "control_port=")) {
control_port = atoi(s + 13);
}
else if (spa_strstartswith(s, "timing_port=")) {
timing_port = atoi(s + 12);
}
}
if (impl->server_port == 0) {
pw_log_error("missing server port in Transport");
return 0;
}
pw_log_info("server port:%u", impl->server_port);
switch (impl->protocol) {
case PROTO_TCP:
if ((impl->server_fd = connect_socket(impl, SOCK_STREAM, -1, impl->server_port)) < 0)
return impl->server_fd;
impl->server_source = pw_loop_add_io(impl->loop, impl->server_fd,
SPA_IO_OUT, false, on_server_source_io, impl);
break;
case PROTO_UDP:
if (control_port == 0) {
pw_log_error("missing UDP ports in Transport");
return 0;
}
pw_log_info("control:%u timing:%u", control_port, timing_port);
if ((impl->server_fd = connect_socket(impl, SOCK_DGRAM, -1, impl->server_port)) < 0)
return impl->server_fd;
if ((impl->control_fd = connect_socket(impl, SOCK_DGRAM, impl->control_fd, control_port)) < 0)
return impl->control_fd;
if (timing_port != 0) {
/* it is possible that there is no timing_port. We simply don't
* connect then and don't send an initial timing packet.
* We will reply to received timing packets on the same address we
* received the packet from so we don't really need this. */
if ((impl->timing_fd = connect_socket(impl, SOCK_DGRAM, impl->timing_fd, timing_port)) < 0)
return impl->timing_fd;
ntp = ntp_now();
send_udp_timing_packet(impl, ntp, ntp, NULL, 0);
}
impl->control_source = pw_loop_add_io(impl->loop, impl->control_fd,
SPA_IO_IN, false, on_control_source_io, impl);
impl->ready = true;
if (rtp_stream_get_state(impl->stream, NULL) == PW_STREAM_STATE_STREAMING)
rtsp_do_record(impl);
break;
default:
return 0;
}
return 0;
}
static int rtsp_do_setup(struct impl *impl)
{
int res;
switch (impl->protocol) {
case PROTO_TCP:
pw_properties_set(impl->headers, "Transport",
"RTP/AVP/TCP;unicast;interleaved=0-1;mode=record");
break;
case PROTO_UDP:
impl->control_port = RAOP_UDP_CONTROL_PORT;
impl->timing_port = RAOP_UDP_TIMING_PORT;
impl->control_fd = create_udp_socket(impl, &impl->control_port);
impl->timing_fd = create_udp_socket(impl, &impl->timing_port);
if (impl->control_fd < 0 || impl->timing_fd < 0)
goto error;
impl->timing_source = pw_loop_add_io(impl->loop, impl->timing_fd,
SPA_IO_IN, false, on_timing_source_io, impl);
pw_properties_setf(impl->headers, "Transport",
"RTP/AVP/UDP;unicast;interleaved=0-1;mode=record;"
"control_port=%u;timing_port=%u",
impl->control_port, impl->timing_port);
break;
default:
return -ENOTSUP;
}
res = rtsp_send(impl, "SETUP", NULL, NULL, rtsp_setup_reply);
pw_properties_set(impl->headers, "Transport", NULL);
return res;
error:
if (impl->control_fd > 0)
close(impl->control_fd);
impl->control_fd = -1;
if (impl->timing_fd > 0)
close(impl->timing_fd);
impl->timing_fd = -1;
return -EIO;
}
static int rtsp_announce_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
pw_log_info("announce status: %d", status);
switch (status) {
case 200:
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
pw_properties_set(impl->headers, "Apple-Challenge", NULL);
return rtsp_do_setup(impl);
}
static inline void swap_bytes(uint8_t *data, size_t size)
{
int i, j;
for (i = 0, j = size-1; i < j; i++, j--)
SPA_SWAP(data[i], data[j]);
}
static int rsa_encrypt(uint8_t *data, int len, uint8_t *enc)
{
uint8_t modulus[256];
uint8_t exponent[8];
size_t msize, esize;
int res = 0;
char n[] =
"59dE8qLieItsH1WgjrcFRKj6eUWqi+bGLOX1HL3U3GhC/j0Qg90u3sG/1CUtwC"
"5vOYvfDmFI6oSFXi5ELabWJmT2dKHzBJKa3k9ok+8t9ucRqMd6DZHJ2YCCLlDR"
"KSKv6kDqnw4UwPdpOMXziC/AMj3Z/lUVX1G7WSHCAWKf1zNS1eLvqr+boEjXuB"
"OitnZ/bDzPHrTOZz0Dew0uowxf/+sG+NCK3eQJVxqcaJ/vEHKIVd2M+5qL71yJ"
"Q+87X6oV3eaYvt3zWZYD6z5vYTcrtij2VZ9Zmni/UAaHqn9JdsBWLUEpVviYnh"
"imNVvYFZeCXg/IdTQ+x4IRdiXNv5hEew==";
char e[] = "AQAB";
msize = base64_decode(n, strlen(n), modulus);
esize = base64_decode(e, strlen(e), exponent);
#if OPENSSL_API_LEVEL >= 30000
EVP_PKEY *pkey = NULL;
EVP_PKEY_CTX *ctx = NULL;
OSSL_PARAM params[5];
int err = 0;
size_t size;
#if __BYTE_ORDER == __LITTLE_ENDIAN
swap_bytes(modulus, msize);
swap_bytes(exponent, esize);
#endif
params[0] = OSSL_PARAM_construct_BN(OSSL_PKEY_PARAM_RSA_N, modulus, msize);
params[1] = OSSL_PARAM_construct_BN(OSSL_PKEY_PARAM_RSA_E, exponent, esize);
params[2] = OSSL_PARAM_construct_end();
ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL);
if (ctx == NULL ||
(err = EVP_PKEY_fromdata_init(ctx)) <= 0 ||
(err = EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_PUBLIC_KEY, params)) <= 0)
goto error;
EVP_PKEY_CTX_free(ctx);
params[0] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_PAD_MODE,
OSSL_PKEY_RSA_PAD_MODE_OAEP, 0);
params[1] = OSSL_PARAM_construct_end();
if ((ctx = EVP_PKEY_CTX_new_from_pkey(NULL, pkey, NULL)) == NULL ||
(err = EVP_PKEY_encrypt_init_ex(ctx, params)) <= 0 ||
(err = EVP_PKEY_encrypt(ctx, enc, &size, data, len)) <= 0)
goto error;
res = size;
done:
if (ctx)
EVP_PKEY_CTX_free(ctx);
if (pkey)
EVP_PKEY_free(pkey);
return res;
#else
RSA *rsa = RSA_new();
BIGNUM *n_bn = BN_bin2bn(modulus, msize, NULL);
BIGNUM *e_bn = BN_bin2bn(exponent, esize, NULL);
if (rsa == NULL || n_bn == NULL || e_bn == NULL)
goto error;
RSA_set0_key(rsa, n_bn, e_bn, NULL);
n_bn = e_bn = NULL;
if ((res = RSA_public_encrypt(len, data, enc, rsa, RSA_PKCS1_OAEP_PADDING)) <= 0)
goto error;
done:
if (rsa != NULL)
RSA_free(rsa);
if (n_bn != NULL)
BN_free(n_bn);
if (e_bn != NULL)
BN_free(e_bn);
return res;
#endif
error:
ERR_print_errors_fp(stdout);
res = -EIO;
goto done;
}
static int rtsp_do_announce(struct impl *impl)
{
const char *host;
uint8_t rsakey[512];
uint32_t rtp_latency;
char key[512*2];
char iv[16*2];
int res, rsa_len, ip_version;
spa_autofree char *sdp = NULL;
char local_ip[256];
host = pw_properties_get(impl->props, "raop.ip");
rtp_latency = msec_to_samples(impl, RAOP_LATENCY_MS);
pw_rtsp_client_get_local_ip(impl->rtsp, &ip_version,
local_ip, sizeof(local_ip));
switch (impl->encryption) {
case CRYPTO_NONE:
case CRYPTO_FP_SAP25:
sdp = spa_aprintf("v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n",
impl->session_id, ip_version, local_ip,
ip_version, host, impl->psamples, impl->rate);
if (!sdp)
return -errno;
break;
case CRYPTO_AUTH_SETUP:
sdp = spa_aprintf("v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n"
"a=min-latency:%d",
impl->session_id, ip_version, local_ip,
ip_version, host, impl->psamples, impl->rate,
rtp_latency);
if (!sdp)
return -errno;
break;
case CRYPTO_RSA:
{
uint8_t rac[16];
char sac[16*4];
if ((res = pw_getrandom(rac, sizeof(rac), 0)) < 0 ||
(res = pw_getrandom(impl->aes_key, sizeof(impl->aes_key), 0)) < 0 ||
(res = pw_getrandom(impl->aes_iv, sizeof(impl->aes_iv), 0)) < 0)
return res;
base64_encode(rac, sizeof(rac), sac, '\0');
pw_properties_set(impl->headers, "Apple-Challenge", sac);
rsa_len = rsa_encrypt(impl->aes_key, 16, rsakey);
if (rsa_len < 0)
return -rsa_len;
base64_encode(rsakey, rsa_len, key, '=');
base64_encode(impl->aes_iv, 16, iv, '=');
sdp = spa_aprintf("v=0\r\n"
"o=iTunes %s 0 IN IP%d %s\r\n"
"s=iTunes\r\n"
"c=IN IP%d %s\r\n"
"t=0 0\r\n"
"m=audio 0 RTP/AVP 96\r\n"
"a=rtpmap:96 AppleLossless\r\n"
"a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 %u\r\n"
"a=rsaaeskey:%s\r\n"
"a=aesiv:%s\r\n",
impl->session_id, ip_version, local_ip,
ip_version, host, impl->psamples, impl->rate,
key, iv);
if (!sdp)
return -errno;
break;
}
default:
return -ENOTSUP;
}
return rtsp_send(impl, "ANNOUNCE", "application/sdp", sdp, rtsp_announce_reply);
}
static int rtsp_post_auth_setup_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
pw_log_info("auth-setup status: %d", status);
switch (status) {
case 200:
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
return rtsp_do_announce(impl);
}
static int rtsp_do_post_auth_setup(struct impl *impl)
{
static const uint8_t content[33] = {
0x01,
0x59, 0x02, 0xed, 0xe9, 0x0d, 0x4e, 0xf2, 0xbd,
0x4c, 0xb6, 0x8a, 0x63, 0x30, 0x03, 0x82, 0x07,
0xa9, 0x4d, 0xbd, 0x50, 0xd8, 0xaa, 0x46, 0x5b,
0x5d, 0x8c, 0x01, 0x2a, 0x0c, 0x7e, 0x1d, 0x4e };
return pw_rtsp_client_url_send(impl->rtsp, "/auth-setup", "POST", &impl->headers->dict,
"application/octet-stream", content, sizeof(content),
rtsp_post_auth_setup_reply, impl);
}
static int rtsp_options_auth_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
int res = 0;
pw_log_info("auth status: %d", status);
switch (status) {
case 200:
if (impl->encryption == CRYPTO_AUTH_SETUP)
res = rtsp_do_post_auth_setup(impl);
else
res = rtsp_do_announce(impl);
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
return res;
}
static const char *find_attr(char **tokens, const char *key)
{
int i;
char *p, *s;
for (i = 0; tokens[i]; i++) {
if (!spa_strstartswith(tokens[i], key))
continue;
p = tokens[i] + strlen(key);
if ((s = rindex(p, '"')) == NULL)
continue;
*s = '\0';
if ((s = index(p, '"')) == NULL)
continue;
return s+1;
}
return NULL;
}
static int rtsp_do_options_auth(struct impl *impl, const struct spa_dict *headers)
{
const char *str, *realm, *nonce;
int n_tokens;
if ((str = spa_dict_lookup(headers, "WWW-Authenticate")) == NULL)
return -EINVAL;
if (impl->password == NULL) {
pw_log_warn("authentication required but no raop.password property was given");
return -ENOTSUP;
}
pw_log_info("Auth: %s", str);
spa_auto(pw_strv) tokens = pw_split_strv(str, " ", INT_MAX, &n_tokens);
if (tokens == NULL || tokens[0] == NULL)
return -EINVAL;
impl->auth_method = strdup(tokens[0]);
if (spa_streq(impl->auth_method, "Digest")) {
realm = find_attr(tokens, "realm");
nonce = find_attr(tokens, "nonce");
if (realm == NULL || nonce == NULL)
return -EINVAL;
impl->realm = strdup(realm);
impl->nonce = strdup(nonce);
}
return rtsp_send(impl, "OPTIONS", NULL, NULL, rtsp_options_auth_reply);
}
static int rtsp_options_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
int res = 0;
pw_log_info("options status: %d", status);
switch (status) {
case 401:
res = rtsp_do_options_auth(impl, headers);
break;
case 200:
if (impl->encryption == CRYPTO_AUTH_SETUP)
res = rtsp_do_post_auth_setup(impl);
else
res = rtsp_do_announce(impl);
break;
default:
pw_impl_module_schedule_destroy(impl->module);
return 0;
}
return res;
}
static void rtsp_connected(void *data)
{
struct impl *impl = data;
uint32_t sci[2];
int res;
pw_log_info("connected");
impl->connected = true;
if ((res = pw_getrandom(sci, sizeof(sci), 0)) < 0) {
pw_log_error("error generating random data: %s", spa_strerror(res));
return;
}
pw_properties_setf(impl->headers, "Client-Instance",
"%08X%08X", sci[0], sci[1]);
pw_properties_setf(impl->headers, "DACP-ID",
"%08X%08X", sci[0], sci[1]);
pw_properties_set(impl->headers, "User-Agent", DEFAULT_USER_NAME "/" PACKAGE_VERSION);
pw_rtsp_client_send(impl->rtsp, "OPTIONS", &impl->headers->dict,
NULL, NULL, rtsp_options_reply, impl);
}
static void connection_cleanup(struct impl *impl)
{
impl->ready = false;
if (impl->server_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->server_source);
impl->server_source = NULL;
}
if (impl->server_fd >= 0) {
close(impl->server_fd);
impl->server_fd = -1;
}
if (impl->control_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->control_source);
impl->control_source = NULL;
}
if (impl->control_fd >= 0) {
close(impl->control_fd);
impl->control_fd = -1;
}
if (impl->timing_source != NULL) {
pw_loop_destroy_source(impl->loop, impl->timing_source);
impl->timing_source = NULL;
}
if (impl->timing_fd >= 0) {
close(impl->timing_fd);
impl->timing_fd = -1;
}
pw_timer_queue_cancel(&impl->feedback_timer);
free(impl->auth_method);
impl->auth_method = NULL;
free(impl->realm);
impl->realm = NULL;
free(impl->nonce);
impl->nonce = NULL;
}
static void rtsp_disconnected(void *data)
{
struct impl *impl = data;
pw_log_info("disconnected");
impl->connected = false;
connection_cleanup(impl);
}
static void rtsp_error(void *data, int res)
{
pw_log_error("error %d", res);
}
static void rtsp_message(void *data, int status,
const struct spa_dict *headers)
{
const struct spa_dict_item *it;
pw_log_info("message %d", status);
spa_dict_for_each(it, headers)
pw_log_info(" %s: %s", it->key, it->value);
}
static const struct pw_rtsp_client_events rtsp_events = {
PW_VERSION_RTSP_CLIENT_EVENTS,
.connected = rtsp_connected,
.error = rtsp_error,
.disconnected = rtsp_disconnected,
.message = rtsp_message,
};
static void stream_destroy(void *d)
{
struct impl *impl = d;
impl->stream = NULL;
}
static void stream_report_error(void *data, const char *error)
{
struct impl *impl = data;
if (error) {
pw_log_error("stream error: %s", error);
pw_impl_module_schedule_destroy(impl->module);
}
}
static int rtsp_do_connect(struct impl *impl)
{
const char *hostname, *port;
uint32_t session_id;
int res;
if (impl->connected) {
if (!impl->ready)
return rtsp_do_announce(impl);
return 0;
}
hostname = pw_properties_get(impl->props, "raop.ip");
port = pw_properties_get(impl->props, "raop.port");
if (hostname == NULL || port == NULL)
return -EINVAL;
if ((res = pw_getrandom(&session_id, sizeof(session_id), 0)) < 0)
return res;
spa_scnprintf(impl->session_id, sizeof(impl->session_id), "%u", session_id);
return pw_rtsp_client_connect(impl->rtsp, hostname, atoi(port), impl->session_id);
}
static int rtsp_teardown_reply(void *data, int status, const struct spa_dict *headers, const struct pw_array *content)
{
struct impl *impl = data;
const char *str;
pw_log_info("teardown status: %d", status);
connection_cleanup(impl);
if ((str = spa_dict_lookup(headers, "Connection")) != NULL) {
if (spa_streq(str, "close"))
pw_rtsp_client_disconnect(impl->rtsp);
}
return 0;
}
static int rtsp_do_teardown(struct impl *impl)
{
impl->recording = false;
if (!impl->ready)
return 0;
return rtsp_send(impl, "TEARDOWN", NULL, NULL, rtsp_teardown_reply);
}
static void stream_props_changed(struct impl *impl, uint32_t id, const struct spa_pod *param)
{
char buf[1024];
struct spa_pod_builder b = SPA_POD_BUILDER_INIT(buf, sizeof(buf));
struct spa_pod_frame f[1];
struct spa_pod_object *obj = (struct spa_pod_object *) param;
struct spa_pod_prop *prop;
spa_pod_builder_push_object(&b, &f[0], SPA_TYPE_OBJECT_Props, SPA_PARAM_Props);
SPA_POD_OBJECT_FOREACH(obj, prop) {
switch (prop->key) {
case SPA_PROP_mute:
{
bool mute;
if (spa_pod_get_bool(&prop->value, &mute) == 0) {
if (impl->mute != mute) {
impl->mute = mute;
rtsp_send_volume(impl);
}
}
spa_pod_builder_prop(&b, SPA_PROP_softMute, 0);
spa_pod_builder_bool(&b, false);
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
case SPA_PROP_channelVolumes:
{
uint32_t i, n_vols;
float vols[MAX_CHANNELS], volume;
float soft_vols[MAX_CHANNELS];
if ((n_vols = spa_pod_copy_array(&prop->value, SPA_TYPE_Float,
vols, SPA_N_ELEMENTS(vols))) > 0) {
volume = 0.0f;
for (i = 0; i < n_vols; i++) {
volume += vols[i];
soft_vols[i] = 1.0f;
}
volume /= n_vols;
volume = SPA_CLAMPF(cbrtf(volume) * 30 - 30, VOLUME_MIN, VOLUME_MAX);
impl->volume = volume;
rtsp_send_volume(impl);
spa_pod_builder_prop(&b, SPA_PROP_softVolumes, 0);
spa_pod_builder_array(&b, sizeof(float), SPA_TYPE_Float,
n_vols, soft_vols);
}
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
case SPA_PROP_softVolumes:
case SPA_PROP_softMute:
break;
default:
spa_pod_builder_raw_padded(&b, prop, SPA_POD_PROP_SIZE(prop));
break;
}
}
param = spa_pod_builder_pop(&b, &f[0]);
rtp_stream_set_param(impl->stream, id, param);
}
static void stream_param_changed(void *data, uint32_t id, const struct spa_pod *param)
{
struct impl *impl = data;
switch (id) {
case SPA_PARAM_Format:
if (param == NULL)
rtsp_do_teardown(impl);
else
rtsp_do_connect(impl);
break;
case SPA_PARAM_Props:
if (param != NULL)
stream_props_changed(impl, id, param);
break;
default:
break;
}
}
static const struct rtp_stream_events stream_events = {
RTP_VERSION_STREAM_EVENTS,
.destroy = stream_destroy,
.report_error = stream_report_error,
.param_changed = stream_param_changed,
.send_packet = stream_send_packet
};
static void core_error(void *data, uint32_t id, int seq, int res, const char *message)
{
struct impl *impl = data;
pw_log_error("error id:%u seq:%d res:%d (%s): %s",
id, seq, res, spa_strerror(res), message);
if (id == PW_ID_CORE && res == -EPIPE)
pw_impl_module_schedule_destroy(impl->module);
}
static const struct pw_core_events core_events = {
PW_VERSION_CORE_EVENTS,
.error = core_error,
};
static void core_destroy(void *d)
{
struct impl *impl = d;
spa_hook_remove(&impl->core_listener);
impl->core = NULL;
pw_impl_module_schedule_destroy(impl->module);
}
static const struct pw_proxy_events core_proxy_events = {
.destroy = core_destroy,
};
static void impl_destroy(struct impl *impl)
{
if (impl->stream)
rtp_stream_destroy(impl->stream);
if (impl->core && impl->do_disconnect)
pw_core_disconnect(impl->core);
if (impl->rtsp)
pw_rtsp_client_destroy(impl->rtsp);
if (impl->ctx)
EVP_CIPHER_CTX_free(impl->ctx);
pw_properties_free(impl->headers);
pw_properties_free(impl->stream_props);
pw_properties_free(impl->props);
free(impl->password);
free(impl);
}
static void module_destroy(void *data)
{
struct impl *impl = data;
spa_hook_remove(&impl->module_listener);
impl_destroy(impl);
}
static const struct pw_impl_module_events module_events = {
PW_VERSION_IMPL_MODULE_EVENTS,
.destroy = module_destroy,
};
static void copy_props(struct impl *impl, struct pw_properties *props, const char *key)
{
const char *str;
if ((str = pw_properties_get(props, key)) != NULL) {
if (pw_properties_get(impl->stream_props, key) == NULL)
pw_properties_set(impl->stream_props, key, str);
}
}
SPA_EXPORT
int pipewire__module_init(struct pw_impl_module *module, const char *args)
{
struct pw_context *context = pw_impl_module_get_context(module);
struct pw_properties *props = NULL;
struct impl *impl;
const char *str, *name, *hostname, *ip, *port;
int res = 0;
PW_LOG_TOPIC_INIT(mod_topic);
impl = calloc(1, sizeof(struct impl));
if (impl == NULL)
return -errno;
pw_log_debug("module %p: new %s", impl, args);
impl->server_fd = -1;
impl->control_fd = -1;
impl->timing_fd = -1;
impl->ctx = EVP_CIPHER_CTX_new();
if (impl->ctx == NULL) {
res = -errno;
pw_log_error( "can't create cipher context: %m");
goto error;
}
if (args == NULL)
args = "";
props = pw_properties_new_string(args);
if (props == NULL) {
res = -errno;
pw_log_error( "can't create properties: %m");
goto error;
}
impl->props = props;
impl->stream_props = pw_properties_new(NULL, NULL);
if (impl->stream_props == NULL) {
res = -errno;
pw_log_error( "can't create properties: %m");
goto error;
}
impl->module = module;
impl->context = context;
impl->loop = pw_context_get_main_loop(context);
impl->timer_queue = pw_context_get_timer_queue(context);
ip = pw_properties_get(props, "raop.ip");
port = pw_properties_get(props, "raop.port");
if (ip == NULL || port == NULL) {
pw_log_error("Missing raop.ip or raop.port");
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.transport")) == NULL)
str = "udp";
if (spa_streq(str, "udp")) {
impl->protocol = PROTO_UDP;
impl->psamples = FRAMES_PER_UDP_PACKET;
} else if (spa_streq(str, "tcp")) {
impl->protocol = PROTO_TCP;
impl->psamples = FRAMES_PER_TCP_PACKET;
} else {
pw_log_error( "can't handle transport %s", str);
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.encryption.type")) == NULL)
str = "none";
if (spa_streq(str, "none"))
impl->encryption = CRYPTO_NONE;
else if (spa_streq(str, "RSA"))
impl->encryption = CRYPTO_RSA;
else if (spa_streq(str, "auth_setup"))
impl->encryption = CRYPTO_AUTH_SETUP;
else if (spa_streq(str, "fp_sap25"))
impl->encryption = CRYPTO_FP_SAP25;
else {
pw_log_error( "can't handle encryption type %s", str);
res = -EINVAL;
goto error;
}
if ((str = pw_properties_get(props, "raop.audio.codec")) == NULL)
str = "PCM";
if (spa_streq(str, "PCM"))
impl->codec = CODEC_PCM;
else if (spa_streq(str, "ALAC"))
impl->codec = CODEC_ALAC;
else {
pw_log_error( "can't handle codec type %s", str);
res = -EINVAL;
goto error;
}
str = pw_properties_get(props, "raop.password");
impl->password = str ? strdup(str) : NULL;
if ((name = pw_properties_get(props, "raop.name")) == NULL)
name = "RAOP";
if ((str = strchr(name, '@')) != NULL) {
str++;
if (strlen(str) > 0)
name = str;
}
if ((hostname = pw_properties_get(props, "raop.hostname")) == NULL)
hostname = name;
impl->rate = RAOP_RATE;
impl->latency = msec_to_samples(impl, RAOP_LATENCY_MS);
impl->stride = RAOP_STRIDE;
if ((str = pw_properties_get(props, "raop.latency.ms")) == NULL)
str = SPA_STRINGIFY(DEFAULT_LATENCY_MS);
impl->latency = SPA_MAX(impl->latency, msec_to_samples(impl, atoi(str)));
if (pw_properties_get(props, PW_KEY_AUDIO_FORMAT) == NULL)
pw_properties_setf(props, PW_KEY_AUDIO_FORMAT, "%s", RAOP_FORMAT);
if (pw_properties_get(props, PW_KEY_AUDIO_RATE) == NULL)
pw_properties_setf(props, PW_KEY_AUDIO_RATE, "%u", impl->rate);
if (pw_properties_get(props, PW_KEY_DEVICE_ICON_NAME) == NULL)
pw_properties_set(props, PW_KEY_DEVICE_ICON_NAME, "audio-speakers");
if (pw_properties_get(props, PW_KEY_NODE_NAME) == NULL)
pw_properties_setf(props, PW_KEY_NODE_NAME, "raop_sink.%s.%s.%s",
hostname, ip, port);
if (pw_properties_get(props, PW_KEY_MEDIA_NAME) == NULL)
pw_properties_setf(props, PW_KEY_MEDIA_NAME, "RAOP to %s", name);
if (pw_properties_get(props, PW_KEY_NODE_DESCRIPTION) == NULL)
pw_properties_setf(props, PW_KEY_NODE_DESCRIPTION, "%s", name);
if (pw_properties_get(props, PW_KEY_NODE_LATENCY) == NULL)
pw_properties_setf(props, PW_KEY_NODE_LATENCY, "%u/%u",
impl->psamples, impl->rate);
if (pw_properties_get(props, PW_KEY_NODE_VIRTUAL) == NULL)
pw_properties_set(props, PW_KEY_NODE_VIRTUAL, "true");
if (pw_properties_get(props, PW_KEY_MEDIA_CLASS) == NULL)
pw_properties_set(props, PW_KEY_MEDIA_CLASS, "Audio/Sink");
if (pw_properties_get(props, "net.mtu") == NULL)
pw_properties_set(props, "net.mtu", "1448");
if (pw_properties_get(props, "rtp.sender-ts-offset") == NULL)
pw_properties_setf(props, "rtp.sender-ts-offset", "%d", 0);
if (pw_properties_get(props, "sess.ts-direct") == NULL)
pw_properties_setf(props, "sess.ts-direct", "%d", 0);
if (pw_properties_get(props, "sess.media") == NULL)
pw_properties_set(props, "sess.media", "raop");
if (pw_properties_get(props, "sess.latency.msec") == NULL)
pw_properties_setf(props, "sess.latency.msec", "%d", RAOP_LATENCY_MS);
if ((str = pw_properties_get(props, "stream.props")) != NULL)
pw_properties_update_string(impl->stream_props, str, strlen(str));
copy_props(impl, props, PW_KEY_AUDIO_FORMAT);
copy_props(impl, props, PW_KEY_AUDIO_RATE);
copy_props(impl, props, PW_KEY_AUDIO_CHANNELS);
copy_props(impl, props, SPA_KEY_AUDIO_POSITION);
copy_props(impl, props, PW_KEY_DEVICE_ICON_NAME);
copy_props(impl, props, PW_KEY_NODE_NAME);
copy_props(impl, props, PW_KEY_NODE_DESCRIPTION);
copy_props(impl, props, PW_KEY_NODE_GROUP);
copy_props(impl, props, PW_KEY_NODE_LATENCY);
copy_props(impl, props, PW_KEY_NODE_VIRTUAL);
copy_props(impl, props, PW_KEY_MEDIA_CLASS);
copy_props(impl, props, PW_KEY_MEDIA_FORMAT);
copy_props(impl, props, PW_KEY_MEDIA_NAME);
copy_props(impl, props, "net.mtu");
copy_props(impl, props, "rtp.sender-ts-offset");
copy_props(impl, props, "sess.media");
copy_props(impl, props, "sess.name");
copy_props(impl, props, "sess.min-ptime");
copy_props(impl, props, "sess.max-ptime");
copy_props(impl, props, "sess.latency.msec");
copy_props(impl, props, "sess.ts-refclk");
copy_props(impl, props, "sess.ts-direct");
impl->mtu = pw_properties_get_uint32(impl->props, "net.mtu", 1448);
impl->sync_period = impl->rate / (impl->mtu / impl->stride);
impl->core = pw_context_get_object(impl->context, PW_TYPE_INTERFACE_Core);
if (impl->core == NULL) {
str = pw_properties_get(props, PW_KEY_REMOTE_NAME);
impl->core = pw_context_connect(impl->context,
pw_properties_new(
PW_KEY_REMOTE_NAME, str,
NULL),
0);
impl->do_disconnect = true;
}
if (impl->core == NULL) {
res = -errno;
pw_log_error("can't connect: %m");
goto error;
}
pw_proxy_add_listener((struct pw_proxy*)impl->core,
&impl->core_proxy_listener,
&core_proxy_events, impl);
pw_core_add_listener(impl->core,
&impl->core_listener,
&core_events, impl);
impl->stream = rtp_stream_new(impl->core,
PW_DIRECTION_INPUT, pw_properties_copy(impl->stream_props),
&stream_events, impl);
if (impl->stream == NULL) {
res = -errno;
pw_log_error("can't create raop stream: %m");
goto error;
}
impl->headers = pw_properties_new(NULL, NULL);
impl->rtsp = pw_rtsp_client_new(impl->loop, NULL, 0);
if (impl->rtsp == NULL)
goto error;
pw_rtsp_client_add_listener(impl->rtsp, &impl->rtsp_listener,
&rtsp_events, impl);
pw_impl_module_add_listener(module, &impl->module_listener, &module_events, impl);
pw_impl_module_update_properties(module, &SPA_DICT_INIT_ARRAY(module_props));
return 0;
error:
impl_destroy(impl);
return res;
}