|
@@ -0,0 +1,199 @@
|
|
1
|
+#include <unistd.h>
|
|
2
|
+
|
|
3
|
+#include "data.h"
|
|
4
|
+#include "tables.h"
|
|
5
|
+
|
|
6
|
+static unsigned long ts_pack;
|
|
7
|
+static int ts_pack_shown;
|
|
8
|
+
|
|
9
|
+void show_ts_pack(struct ts *ts, uint16_t pid, char *wtf, char *extra, uint8_t *ts_packet) {
|
|
10
|
+ char cw1_dump[8 * 6];
|
|
11
|
+ char cw2_dump[8 * 6];
|
|
12
|
+ if (ts->debug_level >= 4) {
|
|
13
|
+ if (ts_pack_shown)
|
|
14
|
+ return;
|
|
15
|
+ int stype = ts_packet_get_scrambled(ts_packet);
|
|
16
|
+ ts_hex_dump_buf(cw1_dump, 8 * 6, ts->key.cw , 8, 0);
|
|
17
|
+ ts_hex_dump_buf(cw2_dump, 8 * 6, ts->key.cw + 8, 8, 0);
|
|
18
|
+ fprintf(stderr, "@ %s %s %03x %5ld %7ld | %s %s | %s\n",
|
|
19
|
+ stype == 0 ? "------" :
|
|
20
|
+ stype == 2 ? "even 0" :
|
|
21
|
+ stype == 3 ? "odd 1" : "??????",
|
|
22
|
+ wtf,
|
|
23
|
+ pid,
|
|
24
|
+ ts_pack, ts_pack * 188,
|
|
25
|
+ cw1_dump, cw2_dump, extra ? extra : wtf);
|
|
26
|
+ }
|
|
27
|
+}
|
|
28
|
+
|
|
29
|
+static void dump_ts_pack(struct ts *ts, uint16_t pid, uint8_t *ts_packet) {
|
|
30
|
+ if (pid == 0x010) show_ts_pack(ts, pid, "nit", NULL, ts_packet);
|
|
31
|
+ else if (pid == 0x11) show_ts_pack(ts, pid, "sdt", NULL, ts_packet);
|
|
32
|
+ else if (pid == 0x12) show_ts_pack(ts, pid, "epg", NULL, ts_packet);
|
|
33
|
+ else show_ts_pack(ts, pid, "---", NULL, ts_packet);
|
|
34
|
+}
|
|
35
|
+
|
|
36
|
+static void decode_packet(struct ts *ts, uint8_t *ts_packet) {
|
|
37
|
+ int scramble_idx = ts_packet_get_scrambled(ts_packet);
|
|
38
|
+ if (scramble_idx > 1) {
|
|
39
|
+ if (ts->key.is_valid_cw) {
|
|
40
|
+ // scramble_idx 2 == even key
|
|
41
|
+ // scramble_idx 3 == odd key
|
|
42
|
+ ts_packet_set_not_scrambled(ts_packet);
|
|
43
|
+ uint8_t payload_ofs = ts_packet_get_payload_offset(ts_packet);
|
|
44
|
+ dvbcsa_decrypt(ts->key.csakey[scramble_idx - 2], ts_packet + payload_ofs, 188 - payload_ofs);
|
|
45
|
+ } else {
|
|
46
|
+ // Can't decrypt the packet just make it NULL packet
|
|
47
|
+ if (ts->pid_filter)
|
|
48
|
+ ts_packet_set_pid(ts_packet, 0x1fff);
|
|
49
|
+ }
|
|
50
|
+ }
|
|
51
|
+}
|
|
52
|
+
|
|
53
|
+static void decode_buffer(struct ts *ts, uint8_t *data, int data_len) {
|
|
54
|
+ int i;
|
|
55
|
+ int batch_sz = dvbcsa_bs_batch_size(); // 32?
|
|
56
|
+ int even_packets = 0;
|
|
57
|
+ int odd_packets = 0;
|
|
58
|
+ struct dvbcsa_bs_batch_s even_pcks[batch_sz + 1];
|
|
59
|
+ struct dvbcsa_bs_batch_s odd_pcks [batch_sz + 1];
|
|
60
|
+
|
|
61
|
+ // Prepare batch structure
|
|
62
|
+ for (i = 0; i < batch_sz; i++) {
|
|
63
|
+ uint8_t *ts_packet = data + (i * 188);
|
|
64
|
+
|
|
65
|
+ int scramble_idx = ts_packet_get_scrambled(ts_packet);
|
|
66
|
+ if (scramble_idx > 1) {
|
|
67
|
+ if (ts->key.is_valid_cw) {
|
|
68
|
+ uint8_t payload_ofs = ts_packet_get_payload_offset(ts_packet);
|
|
69
|
+ if (scramble_idx == 2) { // scramble_idx 2 == even key
|
|
70
|
+ even_pcks[even_packets].data = ts_packet + payload_ofs;
|
|
71
|
+ even_pcks[even_packets].len = 188 - payload_ofs;
|
|
72
|
+ even_packets++;
|
|
73
|
+ }
|
|
74
|
+ if (scramble_idx == 3) { // scramble_idx 3 == odd key
|
|
75
|
+ odd_pcks[odd_packets].data = ts_packet + payload_ofs;
|
|
76
|
+ odd_pcks[odd_packets].len = 188 - payload_ofs;
|
|
77
|
+ odd_packets++;
|
|
78
|
+ }
|
|
79
|
+ ts_packet_set_not_scrambled(ts_packet);
|
|
80
|
+ } else {
|
|
81
|
+ if (ts->pid_filter)
|
|
82
|
+ ts_packet_set_pid(ts_packet, 0x1fff);
|
|
83
|
+ }
|
|
84
|
+ }
|
|
85
|
+ }
|
|
86
|
+
|
|
87
|
+ // Decode packets
|
|
88
|
+ if (even_packets) {
|
|
89
|
+ even_pcks[even_packets].data = NULL; // Last one...
|
|
90
|
+ dvbcsa_bs_decrypt(ts->key.bs_csakey[0], even_pcks, 184);
|
|
91
|
+ }
|
|
92
|
+ if (odd_packets) {
|
|
93
|
+ odd_pcks[odd_packets].data = NULL; // Last one...
|
|
94
|
+ dvbcsa_bs_decrypt(ts->key.bs_csakey[1], odd_pcks, 184);
|
|
95
|
+ }
|
|
96
|
+
|
|
97
|
+ // Fill write buffer
|
|
98
|
+ for (i=0; i<data_len; i += 188) {
|
|
99
|
+ uint8_t *ts_packet = data + i;
|
|
100
|
+
|
|
101
|
+ if (!ts->pid_filter) {
|
|
102
|
+ cbuf_fill(ts->write_buf, ts_packet, 188);
|
|
103
|
+ } else {
|
|
104
|
+ uint16_t pid = ts_packet_get_pid(ts_packet);
|
|
105
|
+ if (pidmap_get(&ts->pidmap, pid)) // PAT or allowed PIDs
|
|
106
|
+ cbuf_fill(ts->write_buf, ts_packet, 188);
|
|
107
|
+ }
|
|
108
|
+ }
|
|
109
|
+}
|
|
110
|
+
|
|
111
|
+void *decode_thread(void *_ts) {
|
|
112
|
+ struct ts *ts = _ts;
|
|
113
|
+ uint8_t *data;
|
|
114
|
+ int data_size;
|
|
115
|
+ int req_size = 188 * dvbcsa_bs_batch_size();
|
|
116
|
+
|
|
117
|
+ while (!ts->decode_stop) {
|
|
118
|
+ data = cbuf_peek(ts->decode_buf, req_size, &data_size);
|
|
119
|
+ if (data_size < req_size) {
|
|
120
|
+ usleep(10000);
|
|
121
|
+ continue;
|
|
122
|
+ }
|
|
123
|
+ data = cbuf_get(ts->decode_buf, req_size, &data_size);
|
|
124
|
+ if (data)
|
|
125
|
+ decode_buffer(ts, data, data_size);
|
|
126
|
+ }
|
|
127
|
+
|
|
128
|
+ do { // Flush data
|
|
129
|
+ data = cbuf_get(ts->decode_buf, req_size, &data_size);
|
|
130
|
+ if (data)
|
|
131
|
+ decode_buffer(ts, data, data_size);
|
|
132
|
+ } while(data);
|
|
133
|
+
|
|
134
|
+ return NULL;
|
|
135
|
+}
|
|
136
|
+
|
|
137
|
+void *write_thread(void *_ts) {
|
|
138
|
+ struct ts *ts = _ts;
|
|
139
|
+ uint8_t *data;
|
|
140
|
+ int data_size;
|
|
141
|
+
|
|
142
|
+ while (!ts->write_stop) {
|
|
143
|
+ data_size = 0;
|
|
144
|
+ data = cbuf_peek(ts->write_buf, FRAME_SIZE, &data_size);
|
|
145
|
+ if (data_size < FRAME_SIZE) {
|
|
146
|
+ usleep(5000);
|
|
147
|
+ continue;
|
|
148
|
+ }
|
|
149
|
+ data = cbuf_get (ts->write_buf, FRAME_SIZE, &data_size);
|
|
150
|
+ if (data)
|
|
151
|
+ write(ts->output.fd, data, data_size);
|
|
152
|
+ }
|
|
153
|
+
|
|
154
|
+ do { // Flush data
|
|
155
|
+ data = cbuf_get(ts->write_buf, FRAME_SIZE, &data_size);
|
|
156
|
+ if (data)
|
|
157
|
+ write(ts->output.fd, data, data_size);
|
|
158
|
+ } while(data);
|
|
159
|
+
|
|
160
|
+ return NULL;
|
|
161
|
+}
|
|
162
|
+
|
|
163
|
+void process_packets(struct ts *ts, uint8_t *data, ssize_t data_len) {
|
|
164
|
+ ssize_t i;
|
|
165
|
+ for (i=0; i<data_len; i += 188) {
|
|
166
|
+ uint8_t *ts_packet = data + i;
|
|
167
|
+ uint16_t pid = ts_packet_get_pid(ts_packet);
|
|
168
|
+
|
|
169
|
+ ts_pack_shown = 0;
|
|
170
|
+
|
|
171
|
+ process_pat(ts, pid, ts_packet);
|
|
172
|
+ process_cat(ts, pid, ts_packet);
|
|
173
|
+ process_pmt(ts, pid, ts_packet);
|
|
174
|
+ process_emm(ts, pid, ts_packet);
|
|
175
|
+ process_ecm(ts, pid, ts_packet);
|
|
176
|
+
|
|
177
|
+ if (!ts_pack_shown)
|
|
178
|
+ dump_ts_pack(ts, pid, ts_packet);
|
|
179
|
+
|
|
180
|
+ if (ts->threaded) {
|
|
181
|
+ // Add to decode buffer. The decoder thread will handle it
|
|
182
|
+ if (cbuf_fill(ts->decode_buf, ts_packet, 188) != 0) {
|
|
183
|
+ ts_LOGf("Decode buffer is full, waiting...\n");
|
|
184
|
+ cbuf_dump(ts->decode_buf);
|
|
185
|
+ usleep(10000);
|
|
186
|
+ }
|
|
187
|
+ } else {
|
|
188
|
+ decode_packet(ts, ts_packet);
|
|
189
|
+ if (ts->pid_filter) {
|
|
190
|
+ if (pidmap_get(&ts->pidmap, pid)) // PAT or allowed PIDs
|
|
191
|
+ write(ts->output.fd, ts_packet, 188);
|
|
192
|
+ } else {
|
|
193
|
+ write(ts->output.fd, ts_packet, 188);
|
|
194
|
+ }
|
|
195
|
+ }
|
|
196
|
+
|
|
197
|
+ ts_pack++;
|
|
198
|
+ }
|
|
199
|
+}
|