2 This file is part of PulseAudio.
4 Copyright 2008 Colin Guthrie
6 PulseAudio is free software; you can redistribute it and/or modify
7 it under the terms of the GNU Lesser General Public License as published
8 by the Free Software Foundation; either version 2.1 of the License,
9 or (at your option) any later version.
11 PulseAudio is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with PulseAudio; if not, write to the Free Software
18 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
30 #include <sys/ioctl.h>
32 #ifdef HAVE_SYS_FILIO_H
33 #include <sys/filio.h>
36 /* TODO: Replace OpenSSL with NSS */
37 #include <openssl/err.h>
38 #include <openssl/rand.h>
39 #include <openssl/aes.h>
40 #include <openssl/rsa.h>
41 #include <openssl/engine.h>
43 #include <pulse/xmalloc.h>
45 #include <pulsecore/core-error.h>
46 #include <pulsecore/core-util.h>
47 #include <pulsecore/iochannel.h>
48 #include <pulsecore/socket-util.h>
49 #include <pulsecore/log.h>
50 #include <pulsecore/parseaddr.h>
51 #include <pulsecore/macro.h>
52 #include <pulsecore/memchunk.h>
53 #include <pulsecore/random.h>
55 #include "raop_client.h"
56 #include "rtsp_client.h"
59 #define AES_CHUNKSIZE 16
61 #define JACK_STATUS_DISCONNECTED 0
62 #define JACK_STATUS_CONNECTED 1
64 #define JACK_TYPE_ANALOG 0
65 #define JACK_TYPE_DIGITAL 1
67 #define VOLUME_DEF -30
68 #define VOLUME_MIN -144
71 #define RAOP_PORT 5000
74 struct pa_raop_client
{
84 /* Encryption Related bits */
86 uint8_t aes_iv
[AES_CHUNKSIZE
]; /* initialization vector for aes-cbc */
87 uint8_t aes_nv
[AES_CHUNKSIZE
]; /* next vector for aes-cbc */
88 uint8_t aes_key
[AES_CHUNKSIZE
]; /* key for aes-cbc */
96 pa_raop_client_cb_t callback
;
98 pa_raop_client_closed_cb_t closed_callback
;
99 void* closed_userdata
;
103 * Function to write bits into a buffer.
104 * @param buffer Handle to the buffer. It will be incremented if new data requires it.
105 * @param bit_pos A pointer to a position buffer to keep track the current write location (0 for MSB, 7 for LSB)
106 * @param size A pointer to the byte size currently written. This allows the calling function to do simple buffer overflow checks
107 * @param data The data to write
108 * @param data_bit_len The number of bits from data to write
110 static inline void bit_writer(uint8_t **buffer
, uint8_t *bit_pos
, int *size
, uint8_t data
, uint8_t data_bit_len
) {
111 int bits_left
, bit_overflow
;
117 /* If bit pos is zero, we will definately use at least one bit from the current byte so size increments. */
121 /* Calc the number of bits left in the current byte of buffer */
122 bits_left
= 7 - *bit_pos
+ 1;
123 /* Calc the overflow of bits in relation to how much space we have left... */
124 bit_overflow
= bits_left
- data_bit_len
;
125 if (bit_overflow
>= 0) {
126 /* We can fit the new data in our current byte */
127 /* As we write from MSB->LSB we need to left shift by the overflow amount */
128 bit_data
= data
<< bit_overflow
;
130 **buffer
|= bit_data
;
133 /* If our data fits exactly into the current byte, we need to increment our pointer */
134 if (0 == bit_overflow
) {
135 /* Do not increment size as it will be incremented on next call as bit_pos is zero */
139 *bit_pos
+= data_bit_len
;
142 /* bit_overflow is negative, there for we will need a new byte from our buffer */
143 /* Firstly fill up what's left in the current byte */
144 bit_data
= data
>> -bit_overflow
;
145 **buffer
|= bit_data
;
146 /* Increment our buffer pointer and size counter*/
149 **buffer
= data
<< (8 + bit_overflow
);
150 *bit_pos
= -bit_overflow
;
154 static int rsa_encrypt(uint8_t *text
, int len
, uint8_t *res
) {
156 "59dE8qLieItsH1WgjrcFRKj6eUWqi+bGLOX1HL3U3GhC/j0Qg90u3sG/1CUtwC"
157 "5vOYvfDmFI6oSFXi5ELabWJmT2dKHzBJKa3k9ok+8t9ucRqMd6DZHJ2YCCLlDR"
158 "KSKv6kDqnw4UwPdpOMXziC/AMj3Z/lUVX1G7WSHCAWKf1zNS1eLvqr+boEjXuB"
159 "OitnZ/bDzPHrTOZz0Dew0uowxf/+sG+NCK3eQJVxqcaJ/vEHKIVd2M+5qL71yJ"
160 "Q+87X6oV3eaYvt3zWZYD6z5vYTcrtij2VZ9Zmni/UAaHqn9JdsBWLUEpVviYnh"
161 "imNVvYFZeCXg/IdTQ+x4IRdiXNv5hEew==";
162 const char e
[] = "AQAB";
163 uint8_t modules
[256];
169 size
= pa_base64_decode(n
, modules
);
170 rsa
->n
= BN_bin2bn(modules
, size
, NULL
);
171 size
= pa_base64_decode(e
, exponent
);
172 rsa
->e
= BN_bin2bn(exponent
, size
, NULL
);
174 size
= RSA_public_encrypt(len
, text
, res
, rsa
, RSA_PKCS1_OAEP_PADDING
);
179 static int aes_encrypt(pa_raop_client
* c
, uint8_t *data
, int size
) {
185 memcpy(c
->aes_nv
, c
->aes_iv
, AES_CHUNKSIZE
);
186 while (i
+AES_CHUNKSIZE
<= size
) {
188 for (j
=0; j
<AES_CHUNKSIZE
; ++j
)
189 buf
[j
] ^= c
->aes_nv
[j
];
191 AES_encrypt(buf
, buf
, &c
->aes
);
192 memcpy(c
->aes_nv
, buf
, AES_CHUNKSIZE
);
198 static inline void rtrimchar(char *str
, char rc
) {
199 char *sp
= str
+ strlen(str
) - 1;
200 while (sp
>= str
&& *sp
== rc
) {
206 static void on_connection(pa_socket_client
*sc
, pa_iochannel
*io
, void *userdata
) {
207 pa_raop_client
*c
= userdata
;
211 pa_assert(c
->sc
== sc
);
212 pa_assert(c
->fd
< 0);
213 pa_assert(c
->callback
);
215 pa_socket_client_unref(c
->sc
);
219 pa_log("Connection failed: %s", pa_cstrerror(errno
));
223 c
->fd
= pa_iochannel_get_send_fd(io
);
225 pa_iochannel_set_noclose(io
, TRUE
);
226 pa_iochannel_free(io
);
228 pa_make_tcp_socket_low_delay(c
->fd
);
230 pa_log_debug("Connection established");
231 c
->callback(c
->fd
, c
->userdata
);
234 static void rtsp_cb(pa_rtsp_client
*rtsp
, pa_rtsp_state state
, pa_headerlist
* headers
, void *userdata
) {
235 pa_raop_client
* c
= userdata
;
238 pa_assert(rtsp
== c
->rtsp
);
241 case STATE_CONNECT
: {
244 char *key
, *iv
, *sac
, *sdp
;
249 pa_log_debug("RAOP: CONNECTED");
250 ip
= pa_rtsp_localip(c
->rtsp
);
251 /* First of all set the url properly */
252 url
= pa_sprintf_malloc("rtsp://%s/%s", ip
, c
->sid
);
253 pa_rtsp_set_url(c
->rtsp
, url
);
256 /* Now encrypt our aes_public key to send to the device */
257 i
= rsa_encrypt(c
->aes_key
, AES_CHUNKSIZE
, rsakey
);
258 pa_base64_encode(rsakey
, i
, &key
);
260 pa_base64_encode(c
->aes_iv
, AES_CHUNKSIZE
, &iv
);
263 pa_random(&rand_data
, sizeof(rand_data
));
264 pa_base64_encode(&rand_data
, AES_CHUNKSIZE
, &sac
);
266 pa_rtsp_add_header(c
->rtsp
, "Apple-Challenge", sac
);
267 sdp
= pa_sprintf_malloc(
269 "o=iTunes %s 0 IN IP4 %s\r\n"
273 "m=audio 0 RTP/AVP 96\r\n"
274 "a=rtpmap:96 AppleLossless\r\n"
275 "a=fmtp:96 4096 0 16 40 10 14 2 255 0 0 44100\r\n"
278 c
->sid
, ip
, c
->host
, key
, iv
);
279 pa_rtsp_announce(c
->rtsp
, sdp
);
288 pa_log_debug("RAOP: ANNOUNCED");
289 pa_rtsp_remove_header(c
->rtsp
, "Apple-Challenge");
290 pa_rtsp_setup(c
->rtsp
);
294 char *aj
= pa_xstrdup(pa_headerlist_gets(headers
, "Audio-Jack-Status"));
295 pa_log_debug("RAOP: SETUP");
298 char delimiters
[] = ";";
299 const char* token_state
= NULL
;
300 c
->jack_type
= JACK_TYPE_ANALOG
;
301 c
->jack_status
= JACK_STATUS_DISCONNECTED
;
303 while ((token
= pa_split(aj
, delimiters
, &token_state
))) {
304 if ((pc
= strstr(token
, "="))) {
306 if (pa_streq(token
, "type") && pa_streq(pc
+1, "digital")) {
307 c
->jack_type
= JACK_TYPE_DIGITAL
;
310 if (pa_streq(token
, "connected"))
311 c
->jack_status
= JACK_STATUS_CONNECTED
;
317 pa_log_warn("Audio Jack Status missing");
319 pa_rtsp_record(c
->rtsp
, &c
->seq
, &c
->rtptime
);
324 uint32_t port
= pa_rtsp_serverport(c
->rtsp
);
325 pa_log_debug("RAOP: RECORDED");
327 if (!(c
->sc
= pa_socket_client_new_string(c
->core
->mainloop
, TRUE
, c
->host
, port
))) {
328 pa_log("failed to connect to server '%s:%d'", c
->host
, port
);
331 pa_socket_client_set_callback(c
->sc
, on_connection
, c
);
336 pa_log_debug("RAOP: FLUSHED");
340 pa_log_debug("RAOP: TEARDOWN");
343 case STATE_SET_PARAMETER
:
344 pa_log_debug("RAOP: SET_PARAMETER");
347 case STATE_DISCONNECTED
:
348 pa_assert(c
->closed_callback
);
351 pa_log_debug("RTSP control channel closed");
352 pa_rtsp_client_free(c
->rtsp
);
355 /* We do not close the fd, we leave it to the closed callback to do that */
359 pa_socket_client_unref(c
->sc
);
364 c
->closed_callback(c
->closed_userdata
);
369 pa_raop_client
* pa_raop_client_new(pa_core
*core
, const char* host
) {
371 pa_raop_client
* c
= pa_xnew0(pa_raop_client
, 1);
376 if (pa_parse_address(host
, &a
) < 0 || a
.type
== PA_PARSED_ADDRESS_UNIX
)
382 c
->host
= pa_xstrdup(a
.path_or_host
);
388 if (pa_raop_connect(c
)) {
389 pa_raop_client_free(c
);
396 void pa_raop_client_free(pa_raop_client
* c
) {
400 pa_rtsp_client_free(c
->rtsp
);
408 int pa_raop_connect(pa_raop_client
* c
) {
419 pa_log_debug("Connection already in progress");
423 c
->rtsp
= pa_rtsp_client_new(c
->core
->mainloop
, c
->host
, c
->port
, "iTunes/4.6 (Macintosh; U; PPC Mac OS X 10.3)");
425 /* Initialise the AES encryption system */
426 pa_random(c
->aes_iv
, sizeof(c
->aes_iv
));
427 pa_random(c
->aes_key
, sizeof(c
->aes_key
));
428 memcpy(c
->aes_nv
, c
->aes_iv
, sizeof(c
->aes_nv
));
429 AES_set_encrypt_key(c
->aes_key
, 128, &c
->aes
);
431 /* Generate random instance id */
432 pa_random(&rand_data
, sizeof(rand_data
));
433 c
->sid
= pa_sprintf_malloc("%u", rand_data
.a
);
434 sci
= pa_sprintf_malloc("%08x%08x",rand_data
.b
, rand_data
.c
);
435 pa_rtsp_add_header(c
->rtsp
, "Client-Instance", sci
);
437 pa_rtsp_set_callback(c
->rtsp
, rtsp_cb
, c
);
438 return pa_rtsp_connect(c
->rtsp
);
442 int pa_raop_flush(pa_raop_client
* c
) {
445 pa_rtsp_flush(c
->rtsp
, c
->seq
, c
->rtptime
);
450 int pa_raop_client_set_volume(pa_raop_client
* c
, pa_volume_t volume
) {
457 db
= pa_sw_volume_to_dB(volume
);
460 else if (db
> VOLUME_MAX
)
463 param
= pa_sprintf_malloc("volume: %0.6f\r\n", db
);
465 /* We just hit and hope, cannot wait for the callback */
466 rv
= pa_rtsp_setparameter(c
->rtsp
, param
);
472 int pa_raop_client_encode_sample(pa_raop_client
* c
, pa_memchunk
* raw
, pa_memchunk
* encoded
) {
476 uint8_t *ibp
, *maxibp
;
481 static uint8_t header
[] = {
482 0x24, 0x00, 0x00, 0x00,
483 0xF0, 0xFF, 0x00, 0x00,
484 0x00, 0x00, 0x00, 0x00,
485 0x00, 0x00, 0x00, 0x00,
487 int header_size
= sizeof(header
);
490 pa_assert(c
->fd
> 0);
492 pa_assert(raw
->memblock
);
493 pa_assert(raw
->length
> 0);
496 /* We have to send 4 byte chunks */
497 bsize
= (int)(raw
->length
/ 4);
500 /* Leave 16 bytes extra to allow for the ALAC header which is about 55 bits */
501 bufmax
= length
+ header_size
+ 16;
502 pa_memchunk_reset(encoded
);
503 encoded
->memblock
= pa_memblock_new(c
->core
->mempool
, bufmax
);
504 b
= pa_memblock_acquire(encoded
->memblock
);
505 memcpy(b
, header
, header_size
);
507 /* Now write the actual samples */
508 bp
= b
+ header_size
;
510 bit_writer(&bp
,&bpos
,&size
,1,3); /* channel=1, stereo */
511 bit_writer(&bp
,&bpos
,&size
,0,4); /* unknown */
512 bit_writer(&bp
,&bpos
,&size
,0,8); /* unknown */
513 bit_writer(&bp
,&bpos
,&size
,0,4); /* unknown */
514 bit_writer(&bp
,&bpos
,&size
,1,1); /* hassize */
515 bit_writer(&bp
,&bpos
,&size
,0,2); /* unused */
516 bit_writer(&bp
,&bpos
,&size
,1,1); /* is-not-compressed */
518 /* size of data, integer, big endian */
519 bit_writer(&bp
,&bpos
,&size
,(bsize
>>24)&0xff,8);
520 bit_writer(&bp
,&bpos
,&size
,(bsize
>>16)&0xff,8);
521 bit_writer(&bp
,&bpos
,&size
,(bsize
>>8)&0xff,8);
522 bit_writer(&bp
,&bpos
,&size
,(bsize
)&0xff,8);
524 ibp
= p
= pa_memblock_acquire(raw
->memblock
);
525 maxibp
= p
+ raw
->length
- 4;
526 while (ibp
<= maxibp
) {
527 /* Byte swap stereo data */
528 bit_writer(&bp
,&bpos
,&size
,*(ibp
+1),8);
529 bit_writer(&bp
,&bpos
,&size
,*(ibp
+0),8);
530 bit_writer(&bp
,&bpos
,&size
,*(ibp
+3),8);
531 bit_writer(&bp
,&bpos
,&size
,*(ibp
+2),8);
536 pa_memblock_release(raw
->memblock
);
537 encoded
->length
= header_size
+ size
;
539 /* store the length (endian swapped: make this better) */
540 len
= size
+ header_size
- 4;
542 *(b
+ 3) = len
& 0xff;
544 /* encrypt our data */
545 aes_encrypt(c
, (b
+ header_size
), size
);
547 /* We're done with the chunk */
548 pa_memblock_release(encoded
->memblock
);
554 void pa_raop_client_set_callback(pa_raop_client
* c
, pa_raop_client_cb_t callback
, void *userdata
) {
557 c
->callback
= callback
;
558 c
->userdata
= userdata
;
561 void pa_raop_client_set_closed_callback(pa_raop_client
* c
, pa_raop_client_closed_cb_t callback
, void *userdata
) {
564 c
->closed_callback
= callback
;
565 c
->closed_userdata
= userdata
;