tsdecrypt reads and decrypts CSA encrypted incoming mpeg transport stream over UDP/RTP using code words obtained from OSCAM or similar CAM server. tsdecrypt communicates with CAM server using cs378x (camd35 over tcp) protocol or newcamd protocol. https://georgi.unixsol.org/programs/tsdecrypt/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

csa.c 4.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. /*
  2. * CSA functions
  3. * Copyright (C) 2011-2012 Unix Solutions Ltd.
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2
  7. * as published by the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
  17. */
  18. #include <stdio.h>
  19. #include <stdlib.h>
  20. #include <string.h>
  21. #include <inttypes.h>
  22. #include <sys/time.h>
  23. #include "libfuncs/libfuncs.h"
  24. #include "csa.h"
  25. csakey_t *csa_key_alloc(void) {
  26. struct csakey *key = calloc(1, sizeof(struct csakey));
  27. key->s_csakey[0] = dvbcsa_key_alloc();
  28. key->s_csakey[1] = dvbcsa_key_alloc();
  29. key->bs_csakey[0] = dvbcsa_bs_key_alloc();
  30. key->bs_csakey[1] = dvbcsa_bs_key_alloc();
  31. return (csakey_t *)key;
  32. }
  33. void csa_key_free(csakey_t **pcsakey) {
  34. struct csakey *key = *((struct csakey **)pcsakey);
  35. if (key) {
  36. dvbcsa_key_free(key->s_csakey[0]);
  37. dvbcsa_key_free(key->s_csakey[1]);
  38. dvbcsa_bs_key_free(key->bs_csakey[0]);
  39. dvbcsa_bs_key_free(key->bs_csakey[1]);
  40. FREE(*pcsakey);
  41. }
  42. }
  43. inline unsigned int csa_get_batch_size(void) {
  44. if (use_dvbcsa) {
  45. return dvbcsa_bs_batch_size(); // 32?
  46. }
  47. return 0;
  48. }
  49. inline void csa_set_even_cw(csakey_t *csakey, uint8_t *even_cw) {
  50. struct csakey *key = (struct csakey *)csakey;
  51. dvbcsa_key_set(even_cw, key->s_csakey[0]);
  52. dvbcsa_bs_key_set(even_cw, key->bs_csakey[0]);
  53. }
  54. inline void csa_set_odd_cw(csakey_t *csakey, uint8_t *odd_cw) {
  55. struct csakey *key = (struct csakey *)csakey;
  56. dvbcsa_key_set(odd_cw, key->s_csakey[1]);
  57. dvbcsa_bs_key_set(odd_cw, key->bs_csakey[1]);
  58. }
  59. inline void csa_decrypt_single_packet(csakey_t *csakey, uint8_t *ts_packet) {
  60. struct csakey *key = (struct csakey *)csakey;
  61. if (use_dvbcsa) {
  62. unsigned int key_idx = ts_packet_get_scrambled(ts_packet) - 2;
  63. unsigned int payload_offset = ts_packet_get_payload_offset(ts_packet);
  64. ts_packet_set_not_scrambled(ts_packet);
  65. dvbcsa_decrypt(key->s_csakey[key_idx], ts_packet + payload_offset, 188 - payload_offset);
  66. }
  67. }
  68. inline void csa_decrypt_multiple_even(csakey_t *csakey, struct csa_batch *batch) {
  69. struct csakey *key = (struct csakey *)csakey;
  70. dvbcsa_bs_decrypt(key->bs_csakey[0], (struct dvbcsa_bs_batch_s *)batch, 184);
  71. }
  72. inline void csa_decrypt_multiple_odd(csakey_t *csakey, struct csa_batch *batch) {
  73. struct csakey *key = (struct csakey *)csakey;
  74. dvbcsa_bs_decrypt(key->bs_csakey[1], (struct dvbcsa_bs_batch_s *)batch, 184);
  75. }
  76. /* The following routine is taken from benchbitslice in libdvbcsa */
  77. void csa_benchmark(void) {
  78. struct timeval t0, t1;
  79. struct dvbcsa_bs_key_s *key = dvbcsa_bs_key_alloc();
  80. unsigned int n, i, npackets = 0;
  81. unsigned int batch_size = dvbcsa_bs_batch_size();
  82. uint8_t data[batch_size + 1][188];
  83. struct dvbcsa_bs_batch_s pcks[batch_size + 1];
  84. uint8_t cw[8] = { 0x12, 0x34, 0x56, 0x78, 0x89, 0xab, 0xcd, 0xef, };
  85. srand(time(0));
  86. puts("Single threaded CSA decoding benchmark");
  87. dvbcsa_bs_key_set (cw, key);
  88. printf("Batch size %d packets.\n\n", batch_size);
  89. for (i = 0; i < batch_size; i++) {
  90. pcks[i].data = data[i];
  91. pcks[i].len = 184;
  92. memset(data[i], rand(), pcks[i].len);
  93. }
  94. pcks[i].data = NULL;
  95. gettimeofday(&t0, NULL);
  96. for (n = (1 << 12) / batch_size; n < (1 << 19) / batch_size; n *= 2) {
  97. printf(" Decrypting %6u mpegts packets\r", n * batch_size);
  98. fflush(stdout);
  99. for (i = 0; i < n; i++) {
  100. dvbcsa_bs_decrypt(key, pcks, 184);
  101. }
  102. npackets += n * batch_size;
  103. }
  104. gettimeofday(&t1, NULL);
  105. unsigned long long usec = timeval_diff_usec(&t0, &t1);
  106. printf("DONE: %u packets (%u bytes) decrypted in %llu ms = %.1f Mbits/s\n\n",
  107. npackets,
  108. npackets * 188,
  109. usec / 1000,
  110. (double)(npackets * 188 * 8) / (double)usec
  111. );
  112. dvbcsa_bs_key_free(key);
  113. }