diff options
author | Dustin Puckett <puckett@pobox.com> | 2011-01-28 21:17:09 +0100 |
---|---|---|
committer | Max Kellermann <max@duempel.org> | 2011-01-28 21:17:09 +0100 |
commit | 79e0db4ca0e9c13ca226c06c9228d5afb4c9a277 (patch) | |
tree | bfc4558121f6f6f1e71bf2fc1d43e0be469d2c10 /src/output | |
parent | 9ae3acf2e73f63550218c2af92243490a4344426 (diff) | |
download | mpd-79e0db4ca0e9c13ca226c06c9228d5afb4c9a277.tar.gz mpd-79e0db4ca0e9c13ca226c06c9228d5afb4c9a277.tar.xz mpd-79e0db4ca0e9c13ca226c06c9228d5afb4c9a277.zip |
output/raop: new output plugin
Remote Audio Output Protocol (RAOP), for Apple devices.
Diffstat (limited to 'src/output')
-rw-r--r-- | src/output/raop_output_plugin.c | 1427 | ||||
-rw-r--r-- | src/output/raop_output_plugin.h | 159 |
2 files changed, 1586 insertions, 0 deletions
diff --git a/src/output/raop_output_plugin.c b/src/output/raop_output_plugin.c new file mode 100644 index 000000000..51e9fbf62 --- /dev/null +++ b/src/output/raop_output_plugin.c @@ -0,0 +1,1427 @@ +/* + * Copyright (C) 2003-2010 The Music Player Daemon Project + * http://www.musicpd.org + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + */ + +#include "output_api.h" +#include "mixer_list.h" +#include "raop_output_plugin.h" +#include "../utils.h" + +#include <glib.h> +#include <sys/socket.h> +#include <sys/select.h> +#include <unistd.h> +#include <netinet/in.h> +#include <arpa/inet.h> +#include <netdb.h> +#include <sys/poll.h> +#include <openssl/err.h> +#include <openssl/rand.h> +#include <openssl/rsa.h> +#include <openssl/engine.h> + +#include <fcntl.h> +#undef G_LOG_DOMAIN +#define G_LOG_DOMAIN "raop" + +static struct raop_session_data *raop_session = NULL; + +/** + * The quark used for GError.domain. + */ +static inline GQuark +raop_output_quark(void) +{ + return g_quark_from_static_string("raop_output"); +} + +static struct raop_data * +new_raop_data(void) +{ + struct raop_data *ret = g_new(struct raop_data, 1); + int i; + + pthread_mutex_init(&ret->control_mutex, NULL); + + ret->next = NULL; + ret->is_master = 0; + ret->started = 0; + ret->paused = 0; + + if (raop_session == NULL) { + raop_session = (struct raop_session_data *) malloc(sizeof(struct raop_session_data)); + raop_session->raop_list = NULL; + raop_session->ntp.port = 6002; + raop_session->ntp.fd = -1; + raop_session->ctrl.port = 6001; + raop_session->ctrl.fd = -1; + raop_session->play_state.playing = false; + raop_session->play_state.seq_num = (short) g_random_int(); + raop_session->play_state.rtptime = g_random_int(); + raop_session->play_state.sync_src = g_random_int(); + raop_session->play_state.last_send.tv_sec = 0; + raop_session->play_state.last_send.tv_usec = 0; + + if (!RAND_bytes(raop_session->encrypt.iv, sizeof(raop_session->encrypt.iv)) || !RAND_bytes(raop_session->encrypt.key, sizeof(raop_session->encrypt.key))) { + g_warning("%s:RAND_bytes error code=%ld\n",__func__,ERR_get_error()); + return NULL; + } + memcpy(raop_session->encrypt.nv, raop_session->encrypt.iv, sizeof(raop_session->encrypt.nv)); + for (i = 0; i < 16; i++) { + printf("0x%x ", raop_session->encrypt.key[i]); + } + printf("\n"); + AES_set_encrypt_key(raop_session->encrypt.key, 128, &raop_session->encrypt.ctx); + + raop_session->data_fd = -1; + bzero(raop_session->buffer, RAOP_BUFFER_SIZE); + raop_session->bufferSize = 0; + + pthread_mutex_init(&raop_session->data_mutex, NULL); + pthread_mutex_init(&raop_session->list_mutex, NULL); + } + + return ret; +} + + +/* + * read one line from the file descriptor + * timeout: msec unit, -1 for infinite + * if CR comes then following LF is expected + * returned string in line is always null terminated, maxlen-1 is maximum string length + */ +static int +read_line(int fd, char *line, int maxlen, int timeout, int no_poll) +{ + int i, rval; + int count = 0; + struct pollfd pfds; + char ch; + *line = 0; + pfds.events = POLLIN; + pfds.fd = fd; + for (i = 0;i < maxlen; i++) { + if (no_poll || poll(&pfds, 1, timeout)) + rval=read(fd,&ch,1); + else return 0; + + if (rval == -1) { + if (errno == EAGAIN) return 0; + g_warning("%s:read error: %s\n", __func__, strerror(errno)); + return -1; + } + if (rval == 0) { + g_debug("%s:disconnected on the other end\n", __func__); + return -1; + } + if(ch == '\n') { + *line = 0; + return count; + } + if (ch == '\r') continue; + *line++ = ch; + count++; + if (count >= maxlen - 1) break; + } + *line = 0; + return count; +} + +/* + * Free all memory associated with key_data + */ +static void +free_kd(struct key_data *kd) +{ + struct key_data *iter = kd; + while (iter) { + free(iter->key); + if(iter->data) free(iter->data); + iter = iter->next; + free(kd); + kd = iter; + } +} + +/* + * key_data type data look up + */ +static char * +kd_lookup(struct key_data *kd, const char *key) +{ + while (kd) { + g_debug("checking key %s %s\n", kd->key, key); + if (!strcmp((char*)kd->key, key)) { + g_debug("found %s\n", kd->data); + return (char*) kd->data; + } + kd = kd->next; + } + return NULL; +} + +/* + * remove one character from a string + * return the number of deleted characters + */ +static int +remove_char_from_string(char *str, char rc) +{ + int i = 0, j = 0, len; + int num = 0; + len = strlen(str); + while (i < len) { + if (str[i] == rc) { + for (j = i; j < len; j++) str[j] = str[j + 1]; + len--; + num++; + } else { + i++; + } + } + return num; +} + +#define SLEEP_MSEC(val) usleep(val*1000) + +/* bind an opened socket to specified hostname and port. + * if hostname=NULL, use INADDR_ANY. + * if *port=0, use dynamically assigned port + */ +static int bind_host(int sd, char *hostname, unsigned long ulAddr, unsigned short *port) +{ + struct sockaddr_in my_addr; + socklen_t nlen = sizeof(struct sockaddr); + struct hostent *h; + + memset(&my_addr, 0, sizeof(my_addr)); + /* use specified hostname */ + if (hostname) { + /* get server IP address (no check if input is IP address or DNS name) */ + h = gethostbyname(hostname); + if (h == NULL) { + if (strstr(hostname, "255.255.255.255") == hostname) { + my_addr.sin_addr.s_addr=-1; + } else { + if ((my_addr.sin_addr.s_addr = inet_addr(hostname)) == 0xFFFFFFFF) { + g_warning("gethostbyname: '%s' \n", hostname); + return -1; + } + } + my_addr.sin_family = AF_INET; + } else { + my_addr.sin_family = h->h_addrtype; + memcpy((char *) &my_addr.sin_addr.s_addr, + h->h_addr_list[0], h->h_length); + } + } else { + // if hostname=NULL, use INADDR_ANY + if (ulAddr) + my_addr.sin_addr.s_addr = ulAddr; + else + my_addr.sin_addr.s_addr = htonl(INADDR_ANY); + my_addr.sin_family = AF_INET; + } + + /* bind a specified port */ + my_addr.sin_port = htons(*port); + + if (bind(sd, (struct sockaddr *) &my_addr, sizeof(my_addr)) < 0) { + g_warning("bind error: %s\n", strerror(errno)); + return -1; + } + + if (*port == 0) { + getsockname(sd, (struct sockaddr *) &my_addr, &nlen); + *port = ntohs(my_addr.sin_port); + } + + return 0; +} + +/* + * open tcp port + */ +static int open_tcp_socket(char *hostname, unsigned short *port) +{ + int sd; + + /* socket creation */ + sd = socket(AF_INET, SOCK_STREAM, 0); + if (sd < 0) { + g_warning("cannot create tcp socket\n"); + return -1; + } + if (bind_host(sd, hostname,0, port)) { + close(sd); + return -1; + } + + return sd; +} + +/* + * open udp port + */ +static int open_udp_socket(char *hostname, unsigned short *port) +{ + int sd; + int size = 30000; + + /* socket creation */ + sd = socket(PF_INET, SOCK_DGRAM, 0); + if (sd < 0) { + g_warning("cannot create udp socket\n"); + return -1; + } + if (setsockopt(sd, SOL_SOCKET, SO_SNDBUF, (void *) &size, sizeof(size)) < 0) { + g_warning("Could not set udp send buffer to %d\n", size); + return -1; + } + if (bind_host(sd, hostname,0, port)) { + close(sd); + return -1; + } + + return sd; +} + +/* + * create tcp connection + * as long as the socket is not non-blocking, this can block the process + * nsport is network byte order + */ +static bool +get_tcp_connect(int sd, struct sockaddr_in dest_addr) +{ + if (connect(sd, (struct sockaddr *)&dest_addr, sizeof(struct sockaddr))){ + SLEEP_MSEC(100L); + // try one more time + if (connect(sd, (struct sockaddr *)&dest_addr, sizeof(struct sockaddr))) { + g_warning("error:get_tcp_nconnect addr=%s, port=%d\n", + inet_ntoa(dest_addr.sin_addr), ntohs(dest_addr.sin_port)); + return false; + } + } + return true; +} + +static bool +get_sockaddr_by_host(const char *host, short destport, struct sockaddr_in *addr) +{ + struct hostent *h; + + h = gethostbyname(host); + if (h) { + addr->sin_family = h->h_addrtype; + memcpy((char *) &addr->sin_addr.s_addr, h->h_addr_list[0], h->h_length); + } else { + addr->sin_family = AF_INET; + if ((addr->sin_addr.s_addr=inet_addr(host))==0xFFFFFFFF) { + g_warning("gethostbyname: '%s' \n", host); + return false; + } + } + addr->sin_port = htons(destport); + return true; +} + +static bool +get_tcp_connect_by_host(int sd, const char *host, short destport) +{ + struct sockaddr_in addr; + + get_sockaddr_by_host(host, destport, &addr); + + return get_tcp_connect(sd, addr); +} + +/* + * Store time in the NTP format in the buffer + */ +static void +fill_time_buffer_with_time(unsigned char *buffer, struct timeval *tout) +{ + unsigned long secs_to_baseline = 964697997; + int iter; + double fraction; + unsigned long long_fraction; + unsigned long secs; + + fraction = ((double) tout->tv_usec) / 1000000.0; + long_fraction = (unsigned long) (fraction * 256.0 * 256.0 * 256.0 * 256.0); + secs = secs_to_baseline + tout->tv_sec; + for (iter = 0; iter < 4; iter++) { + buffer[iter] = (secs >> ((3 - iter) * 8)) & 0xff; + } + for (iter = 0; iter < 4; iter++) { + buffer[4 + iter] = (long_fraction >> ((3 - iter) * 8)) & 0xff; + } +} + +/* + * Calculate the current NTP time, store it in the buffer. + */ +static void +fill_time_buffer(unsigned char *buffer) +{ + struct timeval current_time; + + gettimeofday(¤t_time,NULL); + fill_time_buffer_with_time(buffer, ¤t_time); +} + +/* + * Calculate the current NTP time, store it in the buffer. + */ +static void +fill_int(unsigned char *buffer, unsigned int rtp_time) +{ + int iter; + for (iter = 0; iter < 4; iter++) { + buffer[iter] = (rtp_time >> ((3 - iter) * 8)) & 0xff; + } +} + +/* + * Recv the NTP datagram from the AirTunes, send back an NTP response. + */ +static bool +send_timing_response(int fd) +{ + unsigned char buf[32]; + struct sockaddr addr; + int iter; + unsigned int addr_len = sizeof(addr); + int num_bytes = recvfrom(fd, buf, sizeof(buf), 0, &addr, &addr_len); + if (num_bytes == 0) { + return false; + } + fill_time_buffer(buf + 16); + // set to response + buf[1] = 0xd3; + // copy request + for (iter = 0; iter < 8; iter++) { + buf[8 + iter] = buf[24 + iter]; + } + fill_time_buffer(buf + 24); + + num_bytes = sendto(fd, buf, num_bytes, 0, &addr, addr_len); + + return num_bytes == sizeof(buf); +} + +static bool +get_time_for_rtp(struct play_state *state, struct timeval *tout) +{ + unsigned long rtp_diff = state->rtptime - state->start_rtptime; + unsigned long add_secs = rtp_diff / 44100; + unsigned long add_usecs = (((rtp_diff % 44100) * 10000) / 441) % 1000000; + tout->tv_sec = state->start_time.tv_sec + add_secs; + tout->tv_usec = state->start_time.tv_usec + add_usecs; + if (tout->tv_usec >= 1000000) { + tout->tv_sec++; + tout->tv_usec = tout->tv_usec % 1000000; + } + return true; +} + +/* + * Send a control command + */ +bool +send_control_command(struct control_data *ctrl, struct raop_data *rd, struct play_state *state) +{ + unsigned char buf[20]; + int diff; + int num_bytes; + struct timeval ctrl_time; + + diff = 88200; + if (rd->started) { + buf[0] = 0x80; + diff += NUMSAMPLES; + } else { + buf[0] = 0x90; + state->playing = true; + state->start_rtptime = state->rtptime; + } + buf[1] = 0xd4; + buf[2] = 0x00; + buf[3] = 0x07; + fill_int(buf + 4, state->rtptime - diff); + get_time_for_rtp(state, &ctrl_time); + fill_time_buffer_with_time(buf + 8, &ctrl_time); + fill_int(buf + 16, state->rtptime); + + num_bytes = sendto(ctrl->fd, buf, sizeof(buf), 0, (struct sockaddr *) &rd->ctrl_addr, sizeof(rd->ctrl_addr)); + + return true; +} + +/* + * check to see if there are any timing requests, and respond if there are any + */ +static bool +check_timing(struct timeval *tout) +{ + fd_set rdfds; + int fdmax = 0; + + FD_ZERO(&rdfds); + + FD_SET(raop_session->ntp.fd, &rdfds); + fdmax = raop_session->ntp.fd; + select(fdmax + 1, &rdfds,NULL, NULL, tout); + if (FD_ISSET(raop_session->ntp.fd, &rdfds)) { + if (!send_timing_response(raop_session->ntp.fd)) { + g_debug("unable to send timing response\n"); + return false; + } + } + return true; +} + +/* + * send RTSP request, and get response if it's needed + * if this gets a success, *kd is allocated or reallocated (if *kd is not NULL) + */ +static bool +exec_request(struct rtspcl_data *rtspcld, const char *cmd, const char *content_type, + char *content, int get_response, struct key_data *hds, struct key_data **kd) +{ + char line[1024]; + char req[1024]; + char reql[128]; + const char delimiters[] = " "; + char *token, *dp; + int i,dsize = 0,rval; + struct key_data *hd_iter, *cur_kd = *kd; + unsigned int j; + int timeout = 5000; // msec unit + + fd_set rdfds; + int fdmax = 0; + struct timeval tout = {.tv_sec=10, .tv_usec=0}; + + if (!rtspcld) return false; + + sprintf(req, "%s %s RTSP/1.0\r\nCSeq: %d\r\n", cmd, rtspcld->url, ++rtspcld->cseq ); + + if ( rtspcld->session != NULL ) { + sprintf(reql,"Session: %s\r\n", rtspcld->session ); + strncat(req,reql,sizeof(req)); + } + + hd_iter = hds; + while (hd_iter) { + sprintf(reql, "%s: %s\r\n", hd_iter->key, hd_iter->data); + strncat(req, reql, sizeof(req)); + hd_iter = hd_iter->next; + } + + if (content_type && content) { + sprintf(reql, "Content-Type: %s\r\nContent-Length: %d\r\n", + content_type, (int) strlen(content)); + strncat(req,reql,sizeof(req)); + } + + sprintf(reql, "User-Agent: %s\r\n", rtspcld->useragent); + strncat(req, reql, sizeof(req)); + + hd_iter = rtspcld->exthds; + while (hd_iter) { + sprintf(reql, "%s: %s\r\n", hd_iter->key, hd_iter->data); + strncat(req, reql, sizeof(req)); + hd_iter = hd_iter->next; + } + strncat(req, "\r\n", sizeof(req)); + + if (content_type && content) + strncat(req, content, sizeof(req)); + + rval = write(rtspcld->fd, req, strlen(req)); + g_debug("sent %s", req); + + if (!get_response) return true; + + while (true) { + FD_ZERO(&rdfds); + FD_SET(rtspcld->fd, &rdfds); + FD_SET(raop_session->ntp.fd, &rdfds); + fdmax = raop_session->ntp.fd > rtspcld->fd ? raop_session->ntp.fd : rtspcld->fd;; + select(fdmax + 1, &rdfds, NULL, NULL, &tout); + if (FD_ISSET(rtspcld->fd, &rdfds)) { + break; + } + if (FD_ISSET(raop_session->ntp.fd, &rdfds)) { + send_timing_response(raop_session->ntp.fd); + } + } + + if (read_line(rtspcld->fd, line, sizeof(line), timeout, 0) <= 0) { + g_warning("%s: request failed\n",__func__); + return false; + } + g_debug("received %s", line); + + token = strtok(line, delimiters); + token = strtok(NULL, delimiters); + if (token == NULL || strcmp(token,"200")) { + g_warning("%s: request failed, error %s\n", __func__, token); + return false; + } + + i = 0; + while (read_line(rtspcld->fd, line, sizeof(line), timeout, 0) > 0) { + struct key_data *new_kd = NULL; + g_debug("%s -\n",line); + timeout = 1000; // once it started, it shouldn't take a long time + if (i && line[0] == ' ') { + for (j = 0; j < strlen(line); j++) if (line[j] != ' ') break; + dsize += strlen(line + j); + if ((new_kd->data = realloc(new_kd->data, dsize))) return false; + strcat((char*)new_kd->data, line + j); + continue; + } + dp = strstr(line, ":"); + if (!dp) { + g_warning("%s: Request failed, bad header\n", __func__); + free_kd(*kd); + *kd = NULL; + return false; + } + *dp = 0; + new_kd = malloc(sizeof(struct key_data)); + new_kd->key = malloc(strlen(line) + 1); + strcpy((char *) new_kd->key, line); + dsize = strlen(dp + 1) + 1; + new_kd->data = malloc(dsize); + strcpy((char*)new_kd->data, dp + 1); + new_kd->next = NULL; + if (cur_kd == NULL) { + cur_kd = *kd = new_kd; + } else { + cur_kd->next = new_kd; + cur_kd = new_kd; + } + i++; + } + return true; +} + +static bool +rtspcl_set_parameter(struct rtspcl_data *rtspcld, char *parameter) +{ + return exec_request(rtspcld, "SET_PARAMETER", "text/parameters", + parameter, 1, NULL, &rtspcld->kd); +} + +static struct rtspcl_data * +rtspcl_open(void) +{ + struct rtspcl_data *rtspcld; + rtspcld = malloc(sizeof(struct rtspcl_data)); + memset(rtspcld, 0, sizeof(struct rtspcl_data)); + rtspcld->useragent = "RTSPClient"; + return rtspcld; +} + +static bool +rtspcl_remove_all_exthds(struct rtspcl_data *rtspcld) +{ + free_kd(rtspcld->exthds); + rtspcld->exthds = NULL; + return true; +} + +static bool +rtspcl_disconnect(struct rtspcl_data *rtspcld) +{ + if (rtspcld->fd > 0) close(rtspcld->fd); + rtspcld->fd = 0; + return true; +} + +static bool +rtspcl_set_useragent(struct rtspcl_data *rtspcld, const char *name) +{ + rtspcld->useragent = name; + return true; +} + +static bool +rtspcl_add_exthds(struct rtspcl_data *rtspcld, const char *key, char *data) +{ + struct key_data *new_kd; + new_kd = (struct key_data *) malloc(sizeof(struct key_data)); + new_kd->key = malloc(strlen(key) + 1); + new_kd->data = malloc(strlen(data) + 1); + strcpy((char*)new_kd->key, key); + strcpy((char*)new_kd->data, data); + new_kd->next = NULL; + if (!rtspcld->exthds) { + rtspcld->exthds = new_kd; + } else { + struct key_data *iter = rtspcld->exthds; + while (iter->next) { + iter = iter->next; + } + iter->next = new_kd; + } + return true; +} + +static bool +rtspcl_connect(struct rtspcl_data *rtspcld, const char *host, short destport, char *sid) +{ + unsigned short myport = 0; + struct sockaddr_in name; + socklen_t namelen = sizeof(name); + + if ((rtspcld->fd = open_tcp_socket(NULL, &myport)) == -1) return -1; + if (!get_tcp_connect_by_host(rtspcld->fd, host, destport)) return -1; + getsockname(rtspcld->fd, (struct sockaddr*)&name, &namelen); + memcpy(&rtspcld->local_addr, &name.sin_addr,sizeof(struct in_addr)); + sprintf(rtspcld->url, "rtsp://%s/%s", inet_ntoa(name.sin_addr), sid); + getpeername(rtspcld->fd, (struct sockaddr*)&name, &namelen); + memcpy(&rtspcld->host_addr, &name.sin_addr, sizeof(struct in_addr)); + return true; +} + +static bool +rtspcl_announce_sdp(struct rtspcl_data *rtspcld, char *sdp) +{ + return exec_request(rtspcld, "ANNOUNCE", "application/sdp", sdp, 1, NULL, &rtspcld->kd); +} + +static bool +rtspcl_setup(struct rtspcl_data *rtspcld, struct key_data **kd) +{ + struct key_data *rkd = NULL, hds; + const char delimiters[] = ";"; + char *buf = NULL; + char *token, *pc; + int rval = false; + + buf = (char *) malloc(256); + sprintf(buf, "RTP/AVP/UDP;unicast;interleaved=0-1;mode=record;control_port=%d;timing_port=%d", raop_session->ctrl.port, raop_session->ntp.port); + + hds.key = (unsigned char*) strdup("Transport"); + hds.data = (unsigned char*) buf; + hds.next = NULL; + buf = NULL; + if (!exec_request(rtspcld, "SETUP", NULL, NULL, 1, &hds, &rkd)) return false; + free(hds.key); + free(hds.data); + if (!(rtspcld->session = strdup(kd_lookup(rkd, "Session")))) { + g_warning("%s: no session in response\n",__func__); + goto erexit; + } + if (!(rtspcld->transport = kd_lookup(rkd, "Transport"))) { + g_warning("%s: no transport in response\n",__func__); + goto erexit; + } + if (!(buf = malloc(strlen(rtspcld->transport) + 1))) { + goto erexit; + } + strcpy(buf, rtspcld->transport); + token = strtok(buf, delimiters); + rtspcld->server_port = 0; + rtspcld->control_port = 0; + while (token) { + if ((pc = strstr(token, "="))) { + *pc = 0; + if (!strcmp(token,"server_port")) { + rtspcld->server_port=atoi(pc + 1); + } + if (!strcmp(token,"control_port")) { + rtspcld->control_port=atoi(pc + 1); + } + } + token = strtok(NULL, delimiters); + } + if (rtspcld->server_port == 0) { + g_warning("%s: no server_port in response\n",__func__); + goto erexit; + } + if (rtspcld->control_port == 0) { + g_warning("%s: no control_port in response\n",__func__); + goto erexit; + } + rval = true; + erexit: + if (buf) free(buf); + if (!rval) { + free_kd(rkd); + rkd = NULL; + } + *kd = rkd; + return rval; +} + +static bool +rtspcl_record(struct rtspcl_data *rtspcld) +{ + struct key_data *kdRange, *kdRtp; + int rval; + unsigned char *buf = (unsigned char *) malloc(128); + + if (!rtspcld->session) { + g_warning("%s: no session in progress\n", __func__); + free(buf); + return false; + } + sprintf((char *) buf, "seq=%d,rtptime=%u", raop_session->play_state.seq_num, raop_session->play_state.rtptime); + kdRange = malloc(sizeof(struct key_data)); + kdRtp = malloc(sizeof(struct key_data)); + kdRange->key = (unsigned char*) strdup("Range"); + kdRange->data = (unsigned char*) strdup("npt=0-"); + kdRange->next = kdRtp; + kdRtp->key = (unsigned char*) strdup("RTP-Info"); + kdRtp->data = buf; + kdRtp->next = NULL; + rval = exec_request(rtspcld, "RECORD", NULL, NULL, 1, kdRange, &rtspcld->kd); + free_kd(kdRange); + + return rval; +} + +static bool +rtspcl_close(struct rtspcl_data *rtspcld) +{ + rtspcl_disconnect(rtspcld); + rtspcl_remove_all_exthds(rtspcld); + free(rtspcld->session); + free(rtspcld); + return true; +} + +static char* rtspcl_local_ip(struct rtspcl_data *rtspcld) +{ + return inet_ntoa(rtspcld->local_addr); +} + +static int rsa_encrypt(const unsigned char *text, int len, unsigned char *res) +{ + RSA *rsa; + gsize usize; + unsigned char *modulus; + unsigned char *exponent; + int size; + + char n[] = + "59dE8qLieItsH1WgjrcFRKj6eUWqi+bGLOX1HL3U3GhC/j0Qg90u3sG/1CUtwC" + "5vOYvfDmFI6oSFXi5ELabWJmT2dKHzBJKa3k9ok+8t9ucRqMd6DZHJ2YCCLlDR" + "KSKv6kDqnw4UwPdpOMXziC/AMj3Z/lUVX1G7WSHCAWKf1zNS1eLvqr+boEjXuB" + "OitnZ/bDzPHrTOZz0Dew0uowxf/+sG+NCK3eQJVxqcaJ/vEHKIVd2M+5qL71yJ" + "Q+87X6oV3eaYvt3zWZYD6z5vYTcrtij2VZ9Zmni/UAaHqn9JdsBWLUEpVviYnh" + "imNVvYFZeCXg/IdTQ+x4IRdiXNv5hEew=="; + char e[] = "AQAB"; + + rsa = RSA_new(); + + modulus = g_base64_decode(n, &usize); + rsa->n = BN_bin2bn(modulus, usize, NULL); + exponent = g_base64_decode(e, &usize); + rsa->e = BN_bin2bn(exponent, usize, NULL); + g_free(modulus); + g_free(exponent); + size = RSA_public_encrypt(len, text, res, rsa, RSA_PKCS1_OAEP_PADDING); + + RSA_free(rsa); + return size; +} + +static int +raop_encrypt(struct encrypt_data *encryp, unsigned char *data, int size) +{ + // any bytes that fall beyond the last 16 byte page should be sent + // in the clear + int alt_size = size - (size % 16); + + memcpy(encryp->nv, encryp->iv, 16); + + AES_cbc_encrypt(data, data, alt_size, &encryp->ctx, encryp->nv, 1); + + return size; +} + +/* write bits filed data, *bpos=0 for msb, *bpos=7 for lsb + d=data, blen=length of bits field +*/ +static inline void +bits_write(unsigned char **p, unsigned char d, int blen, int *bpos) +{ + int lb, rb, bd; + lb =7 - *bpos; + rb = lb - blen + 1; + if (rb >= 0) { + bd = d << rb; + if (*bpos) + **p |= bd; + else + **p = bd; + *bpos += blen; + } else { + bd = d >> -rb; + **p |= bd; + *p += 1; + **p = d << (8 + rb); + *bpos = -rb; + } +} + +static bool +wrap_pcm(unsigned char *buffer, int bsize, int *size, unsigned char *inData, int inSize) +{ + unsigned char one[4]; + int count = 0; + int bpos = 0; + unsigned char *bp = buffer; + int i, nodata = 0; + bits_write(&bp, 1, 3, &bpos); // channel=1, stereo + bits_write(&bp, 0, 4, &bpos); // unknown + bits_write(&bp, 0, 8, &bpos); // unknown + bits_write(&bp, 0, 4, &bpos); // unknown + if (bsize != 4096 && false) + bits_write(&bp, 1, 1, &bpos); // hassize + else + bits_write(&bp, 0, 1, &bpos); // hassize + bits_write(&bp, 0, 2, &bpos); // unused + bits_write(&bp, 1, 1, &bpos); // is-not-compressed + if (bsize != 4096 && false) { + // size of data, integer, big endian + bits_write(&bp, (bsize >> 24) & 0xff, 8, &bpos); + bits_write(&bp, (bsize >> 16) & 0xff, 8, &bpos); + bits_write(&bp, (bsize >> 8) & 0xff, 8, &bpos); + bits_write(&bp, bsize&0xff, 8, &bpos); + } + while (1) { + if (inSize <= count * 4) nodata = 1; + if (nodata) break; + one[0] = inData[count * 4]; + one[1] = inData[count * 4 + 1]; + one[2] = inData[count * 4 + 2]; + one[3] = inData[count * 4 + 3]; + +#if BYTE_ORDER == BIG_ENDIAN + bits_write(&bp, one[0], 8, &bpos); + bits_write(&bp, one[1], 8, &bpos); + bits_write(&bp, one[2], 8, &bpos); + bits_write(&bp, one[3], 8, &bpos); +#else + bits_write(&bp, one[1], 8, &bpos); + bits_write(&bp, one[0], 8, &bpos); + bits_write(&bp, one[3], 8, &bpos); + bits_write(&bp, one[2], 8, &bpos); +#endif + + if (++count == bsize) break; + } + if (!count) return false; // when no data at all, it should stop playing + /* when readable size is less than bsize, fill 0 at the bottom */ + for(i = 0; i < (bsize - count) * 4; i++) { + bits_write(&bp, 0, 8, &bpos); + } + *size = (int)(bp - buffer); + if (bpos) *size += 1; + return true; +} + +static bool +raopcl_stream_connect(G_GNUC_UNUSED struct raop_data *rd) +{ + return true; +} + + +static bool +raopcl_connect(struct raop_data *rd) +{ + unsigned char buf[4 + 8 + 16]; + char sid[16]; + char sci[24]; + char act_r[17]; + char *sac=NULL, *key = NULL, *iv = NULL; + char sdp[1024]; + int rval = false; + struct key_data *setup_kd = NULL; + char *aj, *token, *pc; + const char delimiters[] = ";"; + unsigned char rsakey[512]; + struct timeval current_time; + unsigned int sessionNum; + int i; + + + gettimeofday(¤t_time,NULL); + sessionNum = current_time.tv_sec + 2082844804; + + RAND_bytes(buf, sizeof(buf)); + sprintf(act_r, "%u", (unsigned int) g_random_int()); + sprintf(sid, "%u", sessionNum); + sprintf(sci, "%08x%08x", *((int *)(buf + 4)), *((int *)(buf + 8))); + sac = g_base64_encode(buf + 12, 16); + if (!(rd->rtspcl = rtspcl_open())) goto erexit; + if (!rtspcl_set_useragent(rd->rtspcl, "iTunes/8.1.1 (Macintosh; U; PPC Mac OS X 10.4)")) goto erexit; + if (!rtspcl_add_exthds(rd->rtspcl, "Client-Instance", sci)) goto erexit; + if (!rtspcl_add_exthds(rd->rtspcl, "DACP-ID", sci)) goto erexit; + if (!rtspcl_add_exthds(rd->rtspcl, "Active-Remote", act_r)) goto erexit; + if (!rtspcl_connect(rd->rtspcl, rd->addr, rd->rtsp_port, sid)) goto erexit; + + i = rsa_encrypt(raop_session->encrypt.key, 16, rsakey); + key = g_base64_encode(rsakey, i); + remove_char_from_string(key, '='); + iv = g_base64_encode(raop_session->encrypt.iv, 16); + remove_char_from_string(iv, '='); + sprintf(sdp, + "v=0\r\n" + "o=iTunes %s 0 IN IP4 %s\r\n" + "s=iTunes\r\n" + "c=IN IP4 %s\r\n" + "t=0 0\r\n" + "m=audio 0 RTP/AVP 96\r\n" + "a=rtpmap:96 AppleLossless\r\n" + "a=fmtp:96 %d 0 16 40 10 14 2 255 0 0 44100\r\n" + "a=rsaaeskey:%s\r\n" + "a=aesiv:%s\r\n", + sid, rtspcl_local_ip(rd->rtspcl), rd->addr, NUMSAMPLES, key, iv); + remove_char_from_string(sac, '='); + // if (!rtspcl_add_exthds(rd->rtspcl, "Apple-Challenge", sac)) goto erexit; + if (!rtspcl_announce_sdp(rd->rtspcl, sdp)) goto erexit; + // if (!rtspcl_mark_del_exthds(rd->rtspcl, "Apple-Challenge")) goto erexit; + if (!rtspcl_setup(rd->rtspcl, &setup_kd)) goto erexit; + if (!(aj = kd_lookup(setup_kd,"Audio-Jack-Status"))) { + g_warning("%s: Audio-Jack-Status is missing\n",__func__); + goto erexit; + } + + token = strtok(aj, delimiters); + while (token) { + if ((pc = strstr(token,"="))) { + *pc = 0; + if (!strcmp(token,"type") && !strcmp(pc+1,"digital")) { + // rd->ajtype = JACK_TYPE_DIGITAL; + } + } else { + if (!strcmp(token,"connected")) { + // rd->ajstatus = JACK_STATUS_CONNECTED; + } + } + token = strtok(NULL, delimiters); + } + + if (!get_sockaddr_by_host(rd->addr, rd->rtspcl->control_port, &rd->ctrl_addr)) goto erexit; + if (!get_sockaddr_by_host(rd->addr, rd->rtspcl->server_port, &rd->data_addr)) goto erexit; + + if (!rtspcl_record(rd->rtspcl)) goto erexit; + + if (!raopcl_stream_connect(rd)) goto erexit; + + rval = true; + + erexit: + if (sac) g_free(sac); + if (key) g_free(key); + if (iv) g_free(iv); + free_kd(setup_kd); + return rval; +} + +static bool +raopcl_close(struct raop_data *rd) +{ + if (rd->rtspcl) + rtspcl_close(rd->rtspcl); + rd->rtspcl = NULL; + free(rd); + return true; +} + +static int +difference (struct timeval *t1, struct timeval *t2) +{ + int ret = 150000000; + if (t1->tv_sec - t2->tv_sec < 150) { + ret = (t1->tv_sec - t2->tv_sec) * 1000000; + ret += t1->tv_usec - t2->tv_usec; + } + return ret; +} + +/* + * With airtunes version 2, we don't get responses back when we send audio + * data. The only requests we get from the airtunes device are timing + * requests. + */ +static bool +send_audio_data(int fd) +{ + int i = 0; + struct timeval current_time, tout, rtp_time; + int diff, olddiff; + struct raop_data *rd = raop_session->raop_list; + + get_time_for_rtp(&raop_session->play_state, &rtp_time); + gettimeofday(¤t_time, NULL); + olddiff = diff = difference(¤t_time, &rtp_time); + + while (diff < -10000) { + tout.tv_sec = 0; + tout.tv_usec = -diff; + check_timing(&tout); + gettimeofday(¤t_time, NULL); + diff = difference(¤t_time, &rtp_time); + } + gettimeofday(&raop_session->play_state.last_send, NULL); + while (rd) { + if (rd->started) { + raop_session->data[1] = 0x60; + } else { + rd->started = true; + raop_session->data[1] = 0xe0; + } + i = sendto(fd, raop_session->data + raop_session->wblk_wsize, + raop_session->wblk_remsize, 0, (struct sockaddr *) &rd->data_addr, + sizeof(rd->data_addr)); + if (i < 0) { + g_warning("%s: write error: %s\n", __func__, strerror(errno)); + return false; + } + if (i == 0) { + g_warning("%s: write, disconnected on the other end\n", __func__); + return false; + } + rd = rd->next; + } + raop_session->wblk_wsize += i; + raop_session->wblk_remsize -= i; + + //g_debug("%d bytes are sent, remaining size=%d\n",i,rd->wblk_remsize); + return true; +} + +static bool +raop_output_test_default_device(void) +{ + return false; +} + +static void * +raop_output_init(G_GNUC_UNUSED const struct audio_format *audio_format, + G_GNUC_UNUSED const struct config_param *param, + G_GNUC_UNUSED GError **error) +{ + struct raop_data *rd; + + rd = new_raop_data(); + rd->addr = config_get_block_string(param, "host", NULL); + rd->rtsp_port = config_get_block_unsigned(param, "port", 5000); + rd->volume = config_get_block_unsigned(param, "volume", 75); + return rd; +} + +static bool +raop_set_volume_local(struct raop_data *rd, int volume) +{ + char vol_str[128]; + sprintf(vol_str, "volume: %d.000000\r\n", volume); + return rtspcl_set_parameter(rd->rtspcl, vol_str); +} + + +static void +raop_output_finish(void *data) +{ + struct raop_data *rd = data; + raopcl_close(rd); + pthread_mutex_destroy(&rd->control_mutex); +} + +#define RAOP_VOLUME_MIN -30 +#define RAOP_VOLUME_MAX 0 + +int +raop_get_volume(struct raop_data *rd) +{ + return rd->volume; +} + +bool +raop_set_volume(struct raop_data *rd, unsigned volume) +{ + int raop_volume; + bool rval; + + //set parameter volume + if (volume == 0) { + raop_volume = -144; + } else { + raop_volume = RAOP_VOLUME_MIN + + (RAOP_VOLUME_MAX - RAOP_VOLUME_MIN) * volume / 100; + } + pthread_mutex_lock(&rd->control_mutex); + rval = raop_set_volume_local(rd, raop_volume); + if (rval) rd->volume = volume; + pthread_mutex_unlock(&rd->control_mutex); + + return rval; +} + +static void +raop_output_cancel(void *data) +{ + //flush + struct key_data kd; + struct raop_data *rd = (struct raop_data *) data; + unsigned char *buf; + int flush_diff = 1; + + rd->started = 0; + if (rd->is_master) { + raop_session->play_state.playing = false; + } + if (rd->paused) { + return; + } + + buf = malloc(128); + + pthread_mutex_lock(&rd->control_mutex); + kd.key = (unsigned char *)strdup("RTP-Info"); + sprintf((char *) buf, "seq=%d; rtptime=%d", raop_session->play_state.seq_num + flush_diff, raop_session->play_state.rtptime + NUMSAMPLES * flush_diff); + kd.data = (unsigned char *)buf; + kd.next = NULL; + exec_request(rd->rtspcl, "FLUSH", NULL, NULL, 1, &kd, &(rd->rtspcl->kd)); + free(kd.key); + free(kd.data); + pthread_mutex_unlock(&rd->control_mutex); +} + +static bool +raop_output_pause(void *data) +{ + struct timeval tout = {.tv_sec = 0, .tv_usec = 0}; + struct raop_data *rd = (struct raop_data *) data; + + check_timing(&tout); + rd->paused = true; + return true; +} + +static void +raop_output_close(void *data) +{ + //teardown + struct raop_data *rd = data; + struct raop_data *iter = raop_session->raop_list; + struct raop_data *prev = NULL; + + pthread_mutex_lock(&raop_session->list_mutex); + while (iter) { + if (iter == rd) { + if (prev != NULL) { + prev->next = rd->next; + } else { + raop_session->raop_list = rd->next; + if (raop_session->raop_list == NULL) { + // TODO clean up everything else + raop_session->play_state.playing = false; + close(raop_session->data_fd); + close(raop_session->ntp.fd); + close(raop_session->ctrl.fd); + } + } + if (rd->is_master && raop_session->raop_list) { + raop_session->raop_list->is_master = true; + } + rd->next = NULL; + rd->is_master = false; + break; + } + prev = iter; + iter = iter->next; + } + pthread_mutex_unlock(&raop_session->list_mutex); + + pthread_mutex_lock(&rd->control_mutex); + exec_request(rd->rtspcl, "TEARDOWN", NULL, NULL, 0, NULL, &(rd->rtspcl->kd)); + pthread_mutex_unlock(&rd->control_mutex); + + rd->started = 0; +} + + +static bool +raop_output_open(void *data, struct audio_format *audio_format, GError **error_r) +{ + //setup, etc. + struct raop_data *rd = data; + + pthread_mutex_lock(&raop_session->list_mutex); + if (raop_session->raop_list == NULL) { + // first raop, need to initialize session data + unsigned short myport = 0; + raop_session->raop_list = rd; + rd->is_master = true; + + if ((raop_session->data_fd = open_udp_socket(NULL, &myport)) == -1) return -1; + if ((raop_session->ntp.fd = open_udp_socket(NULL, &raop_session->ntp.port)) == -1) return false; + if ((raop_session->ctrl.fd = open_udp_socket(NULL, &raop_session->ctrl.port)) == -1) { + close(raop_session->ntp.fd); + raop_session->ctrl.fd = -1; + return false; + } + } + pthread_mutex_unlock(&raop_session->list_mutex); + + audio_format->format = SAMPLE_FORMAT_S16; + g_debug("raop_openDevice %s %d\n", rd->addr, rd->rtsp_port); + if (!raopcl_connect(rd)) { + g_set_error(error_r, raop_output_quark(), -1, + "Unable to connect to device"); + return false; + } + if (!raop_set_volume(rd, rd->volume)) { + g_set_error(error_r, raop_output_quark(), -1, + "Unable to set volume after connecting to device"); + return false; + } + + pthread_mutex_lock(&raop_session->list_mutex); + if (!rd->is_master) { + rd->next = raop_session->raop_list; + raop_session->raop_list = rd; + } + pthread_mutex_unlock(&raop_session->list_mutex); + return true; +} + +static size_t +raop_output_play(void *data, const void *chunk, size_t size, + GError **error_r) +{ + //raopcl_send_sample + struct raop_data *rd = data; + struct timeval tout = {.tv_sec = 0, .tv_usec = 0}; + size_t rval = 0, orig_size = size; + bool first = false; + + rd->paused = false; + if (!rd->is_master) { + // only process data for the master raop + return size; + } + + pthread_mutex_lock(&raop_session->data_mutex); + + check_timing(&tout); + + if (raop_session->play_state.rtptime <= NUMSAMPLES) { + // looped over, need new reference point to calculate correct times + raop_session->play_state.playing = false; + } + first = !raop_session->play_state.playing; + while (raop_session->bufferSize + size >= RAOP_BUFFER_SIZE) { + // ntp header + unsigned char header[] = { + 0x80, 0x60, 0x00, 0x00, + // rtptime + 0x00, 0x00, 0x00, 0x00, + // device + 0x7e, 0xad, 0xd2, 0xd3, + }; + + + int count = 0; + int copyBytes = RAOP_BUFFER_SIZE - raop_session->bufferSize; + + if (!raop_session->play_state.playing || + raop_session->play_state.seq_num % (44100 / NUMSAMPLES + 1) == 0) { + struct raop_data *iter; + pthread_mutex_lock(&raop_session->list_mutex); + if (!raop_session->play_state.playing) { + gettimeofday(&raop_session->play_state.start_time,NULL); + } + iter = raop_session->raop_list; + while (iter) { + if (!send_control_command(&raop_session->ctrl, iter, &raop_session->play_state)) { + g_set_error(error_r, raop_output_quark(), -1, + "Unable to send control command"); + goto erexit; + } + iter = iter->next; + } + pthread_mutex_unlock(&raop_session->list_mutex); + } + + fill_int(header + 8, raop_session->play_state.sync_src); + + memcpy(raop_session->buffer + raop_session->bufferSize, chunk, copyBytes); + raop_session->bufferSize += copyBytes; + chunk = ((const char *)chunk) + copyBytes; + size -= copyBytes; + + if (!wrap_pcm(raop_session->data + RAOP_HEADER_SIZE, NUMSAMPLES, &count, raop_session->buffer, RAOP_BUFFER_SIZE)) { + g_warning("unable to encode %d bytes properly\n", RAOP_BUFFER_SIZE); + } + + memcpy(raop_session->data, header, RAOP_HEADER_SIZE); + raop_session->data[2] = raop_session->play_state.seq_num >> 8; + raop_session->data[3] = raop_session->play_state.seq_num & 0xff; + raop_session->play_state.seq_num ++; + + fill_int(raop_session->data + 4, raop_session->play_state.rtptime); + raop_session->play_state.rtptime += NUMSAMPLES; + + raop_encrypt(&raop_session->encrypt, raop_session->data + RAOP_HEADER_SIZE, count); + raop_session->wblk_remsize = count + RAOP_HEADER_SIZE; + raop_session->wblk_wsize = 0; + + if (!send_audio_data(raop_session->data_fd)) { + g_set_error(error_r, raop_output_quark(), -1, + "Unable to write to device"); + goto erexit; + } + + raop_session->bufferSize = 0; + } + if (size > 0) { + memcpy(raop_session->buffer + raop_session->bufferSize, chunk, size); + raop_session->bufferSize += size; + } + rval = orig_size; + erexit: + pthread_mutex_unlock(&raop_session->data_mutex); + return rval; +} + +const struct audio_output_plugin raopPlugin = { + .name = "raop", + .test_default_device = raop_output_test_default_device, + .init = raop_output_init, + .finish = raop_output_finish, + .open = raop_output_open, + .play = raop_output_play, + .cancel = raop_output_cancel, + .pause = raop_output_pause, + .close = raop_output_close, + .mixer_plugin = &raop_mixer_plugin, +}; diff --git a/src/output/raop_output_plugin.h b/src/output/raop_output_plugin.h new file mode 100644 index 000000000..6672cf8a0 --- /dev/null +++ b/src/output/raop_output_plugin.h @@ -0,0 +1,159 @@ +/* + * Copyright (C) 2003-2010 The Music Player Daemon Project + * http://www.musicpd.org + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + */ + +#ifndef MPD_OUTPUT_RAOP_PLUGIN_H +#define MPD_OUTPUT_RAOP_PLUGIN_H + +#include <pthread.h> +#include <stdbool.h> +#include <netinet/in.h> +#include <sys/time.h> +#include <openssl/aes.h> + +struct key_data { + unsigned char *key; + unsigned char *data; + struct key_data *next; +}; + +struct play_state { + bool playing; + unsigned short seq_num; + unsigned int rtptime; + unsigned int sync_src; + unsigned int start_rtptime; + struct timeval start_time; + struct timeval last_send; +}; + +/*********************************************************************/ + +struct rtspcl_data { + int fd; + char url[128]; + int cseq; + struct key_data *kd; + struct key_data *exthds; + char *session; + char *transport; + unsigned short server_port; + unsigned short control_port; + struct in_addr host_addr; + struct in_addr local_addr; + const char *useragent; + +}; + +enum pause_state { + NO_PAUSE = 0, + OP_PAUSE, + NODATA_PAUSE, +}; + +#define MINIMUM_SAMPLE_SIZE 32 + +#define RAOP_FD_READ (1<<0) +#define RAOP_FD_WRITE (1<<1) + +/*********************************************************************/ + +struct encrypt_data { + AES_KEY ctx; + unsigned char iv[16]; // initialization vector for aes-cbc + unsigned char nv[16]; // next vector for aes-cbc + unsigned char key[16]; // key for aes-cbc +}; + +/*********************************************************************/ + +struct ntp_data { + unsigned short port; + int fd; +}; + +/*********************************************************************/ + +struct raop_data { + struct rtspcl_data *rtspcl; + const char *addr; // target host address + short rtsp_port; + struct sockaddr_in ctrl_addr; + struct sockaddr_in data_addr; + + bool is_master; + struct raop_data *next; + + unsigned volume; + + pthread_mutex_t control_mutex; + + bool started; + bool paused; +}; + +/*********************************************************************/ + +struct control_data { + unsigned short port; + int fd; +}; + +bool +send_control_command(struct control_data *ctrl, struct raop_data *rd, struct play_state *state); + +/*********************************************************************/ + +#define NUMSAMPLES 352 +#define RAOP_BUFFER_SIZE NUMSAMPLES * 4 +#define RAOP_HEADER_SIZE 12 +#define ALAC_MAX_HEADER_SIZE 8 +#define RAOP_MAX_PACKET_SIZE RAOP_BUFFER_SIZE + RAOP_HEADER_SIZE + ALAC_MAX_HEADER_SIZE + +// session +struct raop_session_data { + struct raop_data *raop_list; + struct ntp_data ntp; + struct control_data ctrl; + struct encrypt_data encrypt; + struct play_state play_state; + + int data_fd; + + unsigned char buffer[RAOP_BUFFER_SIZE]; + size_t bufferSize; + + unsigned char data[RAOP_MAX_PACKET_SIZE]; + int wblk_wsize; + int wblk_remsize; + + pthread_mutex_t data_mutex; + pthread_mutex_t list_mutex; +}; + +//static struct raop_session_data *raop_session; + +/*********************************************************************/ + +bool +raop_set_volume(struct raop_data *rd, unsigned volume); + +int +raop_get_volume(struct raop_data *rd); + +#endif |