owntone-server/src/outputs/rtp_common.c
2021-01-10 14:51:16 +01:00

351 lines
11 KiB
C

/*
* Copyright (C) 2019- Espen Jürgensen <espenjurgensen@gmail.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifdef HAVE_CONFIG_H
# include <config.h>
#endif
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <ctype.h>
#include <errno.h>
#include <stdint.h>
#include <stdio.h>
#include <stdarg.h>
#include <limits.h>
#include <sys/param.h>
#include <gcrypt.h>
#include "logger.h"
#include "misc.h"
#include "rtp_common.h"
#define RTP_HEADER_LEN 12
#define RTCP_SYNC_PACKET_LEN 20
// NTP timestamp definitions
#define FRAC 4294967296. // 2^32 as a double
#define NTP_EPOCH_DELTA 0x83aa7e80 // 2208988800 - that's 1970 - 1900 in seconds
static inline void
timespec_to_ntp(struct timespec *ts, struct ntp_timestamp *ns)
{
/* Seconds since NTP Epoch (1900-01-01) */
ns->sec = ts->tv_sec + NTP_EPOCH_DELTA;
ns->frac = (uint32_t)((double)ts->tv_nsec * 1e-9 * FRAC);
}
static inline void
ntp_to_timespec(struct ntp_timestamp *ns, struct timespec *ts)
{
/* Seconds since Unix Epoch (1970-01-01) */
ts->tv_sec = ns->sec - NTP_EPOCH_DELTA;
ts->tv_nsec = (long)((double)ns->frac / (1e-9 * FRAC));
}
struct rtp_session *
rtp_session_new(struct media_quality *quality, int pktbuf_size, int sync_each_nsamples)
{
struct rtp_session *session;
CHECK_NULL(L_PLAYER, session = calloc(1, sizeof(struct rtp_session)));
// Random SSRC ID, RTP time start and sequence start
gcry_randomize(&session->ssrc_id, sizeof(session->ssrc_id), GCRY_STRONG_RANDOM);
gcry_randomize(&session->pos, sizeof(session->pos), GCRY_STRONG_RANDOM);
gcry_randomize(&session->seqnum, sizeof(session->seqnum), GCRY_STRONG_RANDOM);
if (quality)
session->quality = *quality;
session->pktbuf_size = pktbuf_size;
CHECK_NULL(L_PLAYER, session->pktbuf = calloc(session->pktbuf_size, sizeof(struct rtp_packet)));
if (sync_each_nsamples > 0)
session->sync_each_nsamples = sync_each_nsamples;
else if (sync_each_nsamples == 0 && quality)
session->sync_each_nsamples = quality->sample_rate;
return session;
}
void
rtp_session_free(struct rtp_session *session)
{
int i;
for (i = 0; i < session->pktbuf_size; i++)
free(session->pktbuf[i].data);
free(session->pktbuf);
free(session->sync_packet_next.data);
free(session);
}
void
rtp_session_flush(struct rtp_session *session)
{
session->pktbuf_len = 0;
session->sync_counter = 0;
}
// We don't want the caller to malloc payload for every packet, so instead we
// will get him a packet from the ring buffer, thus in most cases reusing memory
struct rtp_packet *
rtp_packet_next(struct rtp_session *session, size_t payload_len, int samples, char payload_type, char marker_bit)
{
struct rtp_packet *pkt;
uint16_t seq;
uint32_t rtptime;
uint32_t ssrc_id;
pkt = &session->pktbuf[session->pktbuf_next];
// When first filling up the buffer we malloc, but otherwise the existing data
// allocation should in most cases suffice. If not, we realloc.
if (!pkt->data || payload_len > pkt->payload_size)
{
pkt->data_size = RTP_HEADER_LEN + payload_len;
if (!pkt->data)
CHECK_NULL(L_PLAYER, pkt->data = malloc(pkt->data_size));
else
CHECK_NULL(L_PLAYER, pkt->data = realloc(pkt->data, pkt->data_size));
pkt->header = pkt->data;
pkt->payload = pkt->data + RTP_HEADER_LEN;
pkt->payload_size = payload_len;
}
pkt->samples = samples;
pkt->header_len = RTP_HEADER_LEN;
pkt->payload_len = payload_len;
pkt->data_len = RTP_HEADER_LEN + payload_len;
pkt->seqnum = session->seqnum;
// The RTP header is made of these 12 bytes (RFC 3550):
// 0 1 2 3
// 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// |V=2|P|X| CC |M| PT | sequence number |
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// | timestamp |
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// | synchronization source (SSRC) identifier |
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
pkt->header[0] = 0x80; // Version = 2, P, X and CC are 0
pkt->header[1] = (marker_bit << 7) | payload_type; // M and payload type
seq = htobe16(session->seqnum);
memcpy(pkt->header + 2, &seq, 2);
rtptime = htobe32(session->pos);
memcpy(pkt->header + 4, &rtptime, 4);
ssrc_id = htobe32(session->ssrc_id);
memcpy(pkt->header + 8, &ssrc_id, 4);
return pkt;
}
void
rtp_packet_commit(struct rtp_session *session, struct rtp_packet *pkt)
{
// Increase size of retransmit buffer since we just wrote a packet
if (session->pktbuf_len < session->pktbuf_size)
session->pktbuf_len++;
// Advance counters to prepare for next packet
session->pktbuf_next = (session->pktbuf_next + 1) % session->pktbuf_size;
session->seqnum++;
session->pos += pkt->samples;
session->sync_counter += pkt->samples;
}
struct rtp_packet *
rtp_packet_get(struct rtp_session *session, uint16_t seqnum)
{
uint16_t first;
uint16_t last;
uint16_t delta;
size_t idx;
if (session->pktbuf_len == 0)
{
DPRINTF(E_DBG, L_PLAYER, "Seqnum %" PRIu16 " requested, but buffer is empty\n", seqnum);
return NULL;
}
last = session->seqnum - 1;
first = session->seqnum - session->pktbuf_len;
// Rules of programming:
// 1) Make your code easy to read
// 2) Disregard rule number one if you can use XOR
//
// The below should be the same as this (a check that works with int wrap-around):
// (first <= last && (first <= seqnum && seqnum <= last)) || (first > last && (first <= seqnum || seqnum <= last))
if (! ((first <= last) ^ (first <= seqnum) ^ (seqnum <= last)))
{
DPRINTF(E_DBG, L_PLAYER, "Seqnum %" PRIu16 " not in buffer (have seqnum %" PRIu16 " to %" PRIu16 ")\n", seqnum, first, last);
return NULL;
}
// Distance from current seqnum (which is at pktbuf_next) to the requested seqnum
delta = session->seqnum - seqnum;
// Adding pktbuf_size so we don't have to deal with "negative" pktbuf_next - delta
idx = (session->pktbuf_next + session->pktbuf_size - delta) % session->pktbuf_size;
return &session->pktbuf[idx];
}
bool
rtp_sync_is_time(struct rtp_session *session)
{
if (session->sync_each_nsamples && session->sync_counter > session->sync_each_nsamples)
{
session->sync_counter = 0;
return true;
}
return false;
}
struct rtp_packet *
rtp_sync_packet_next(struct rtp_session *session, struct rtcp_timestamp cur_stamp, char type)
{
struct ntp_timestamp cur_ts;
uint32_t rtptime;
uint32_t cur_pos;
if (!session->sync_packet_next.data)
{
CHECK_NULL(L_PLAYER, session->sync_packet_next.data = malloc(RTCP_SYNC_PACKET_LEN));
session->sync_packet_next.data_len = RTCP_SYNC_PACKET_LEN;
}
session->sync_packet_next.data[0] = type;
session->sync_packet_next.data[1] = 0xd4;
session->sync_packet_next.data[2] = 0x00;
session->sync_packet_next.data[3] = 0x07;
timespec_to_ntp(&cur_stamp.ts, &cur_ts);
cur_pos = htobe32(cur_stamp.pos);
memcpy(session->sync_packet_next.data + 4, &cur_pos, 4);
cur_ts.sec = htobe32(cur_ts.sec);
cur_ts.frac = htobe32(cur_ts.frac);
memcpy(session->sync_packet_next.data + 8, &cur_ts.sec, 4);
memcpy(session->sync_packet_next.data + 12, &cur_ts.frac, 4);
rtptime = htobe32(session->pos);
memcpy(session->sync_packet_next.data + 16, &rtptime, 4);
/* DPRINTF(E_DBG, L_PLAYER, "SYNC PACKET cur_ts:%ld.%ld, cur_pos:%u, rtptime:%u, type:0x%x, sync_counter:%d\n",
cur_stamp.ts.tv_sec, cur_stamp.ts.tv_nsec,
cur_stamp.pos,
session->pos,
session->sync_packet_next.data[0],
session->sync_counter
);
*/
return &session->sync_packet_next;
}
int
rtcp_packet_parse(struct rtcp_packet *pkt, uint8_t *data, size_t size)
{
if (size < 8) // Must be large enough for at least SSRC
goto packet_malformed;
memset(pkt, 0, sizeof(struct rtcp_packet));
pkt->version = (data[0] & 0xc0) >> 6; // AND 11000000
if (pkt->version != 2)
goto packet_malformed;
pkt->padding = (data[0] & 0x20) >> 5; // AND 00100000
memcpy(&pkt->len, data + 2, 2);
pkt->len = 4 * (be16toh(pkt->len) + 1); // Input len is 32-bit words excl. the 32-bit header
memcpy(&pkt->ssrc, data + 4, 4);
pkt->ssrc = be32toh(pkt->ssrc);
if (size < pkt->len)
goto packet_malformed; // Possibly a partial read?
pkt->payload = data + pkt->len;
pkt->payload_len = size - pkt->len;
pkt->packet_type = data[1];
// TODO use a switch()
if (pkt->packet_type == RTCP_PACKET_RR) // 201, see RFC 1889
{
pkt->rr.report_count = data[0] & 0x1f; // AND 00011111
// TODO check total size of reports is smaller than size?
}
else if (pkt->packet_type == RTCP_PACKET_APP && size >= 12) // 204, see RFC 1889
{
pkt->app.subtype = data[0] & 0x1f; // AND 00011111
memcpy(pkt->app.name, data + 8, 4);
}
else if (pkt->packet_type == RTCP_PACKET_PSFB && size >= 12) // 206, see RFC 4585, payload specific feedback
{
pkt->psfb.message_type = data[0] & 0x1f; // AND 00011111
memcpy(&pkt->psfb.media_src, data + 8, 4);
pkt->psfb.media_src = be32toh(pkt->psfb.media_src);
pkt->psfb.fci = data + 12;
pkt->psfb.fci_len = size - 12;
}
else if (pkt->packet_type == RTCP_PACKET_XR && size >= 24) // 207, see RFC 3611, however we can handle only 1 block
{
pkt->xr.block_type = data[8];
pkt->xr.block_specific = data[9];
memcpy(&pkt->xr.block_len, data + 10, 2);
pkt->xr.block_len = 4 * be16toh(pkt->xr.block_len);
if (pkt->xr.block_type != 4 || pkt->xr.block_len != 8)
return 0; // We can only parse handle Receiver Reference Time Report with 8 byte NTP timestamp
memcpy(&pkt->xr.ntp.sec, data + 12, 4);
pkt->xr.ntp.sec = be32toh(pkt->xr.ntp.sec);
memcpy(&pkt->xr.ntp.frac, data + 16, 4);
pkt->xr.ntp.frac = be32toh(pkt->xr.ntp.frac);
}
else
return -1; // Don't know how to parse
/*
DPRINTF(E_DBG, L_PLAYER, "RTCP PACKET vers=%d, padding=%d, len=%" PRIu16 ", payload_len=%zu, ssrc=%" PRIu32 "\n", pkt->version, pkt->padding, pkt->len, pkt->payload_len, pkt->ssrc);
if (pkt->packet_type == RTCP_PACKET_APP)
DPRINTF(E_DBG, L_PLAYER, "RTCP APP PACKET subtype=%d, name=%s\n", pkt->app.subtype, pkt->app.name);
else if (pkt->packet_type == RTCP_PACKET_XR)
DPRINTF(E_DBG, L_PLAYER, "RTCP XR PACKET block_type=%d, block_len=%" PRIu16 "\n", pkt->xr.block_type, pkt->xr.block_len);
*/
return 0;
packet_malformed:
DPRINTF(E_SPAM, L_PLAYER, "Ignoring incoming packet, packet is non-RTCP, malformed or partial (size=%zu)\n", size);
return -1;
}