1 | #include "globals.h"
|
---|
2 | #include <termios.h>
|
---|
3 | extern struct s_reader *reader;
|
---|
4 |
|
---|
5 | #define HSIC_CRC 0xA5
|
---|
6 | #define SSSP_MAX_PID 8
|
---|
7 |
|
---|
8 | #define P_HSIC 1 // Humax Sharing Interface Client
|
---|
9 | #define P_SSSP 2 // Simple Serial Sharing Protocol
|
---|
10 | #define P_BOMBA 3 // This is not really a Protocol
|
---|
11 | #define P_DSR95 4 // DSR9500 with SID
|
---|
12 | #define P_GS 5 // GS7001
|
---|
13 | #define P_ALPHA 6 // AlphaStar Receivers
|
---|
14 | #define P_DSR95_OLD 7 // DSR9500 without SID
|
---|
15 | #define P_GBOX 8 // Arion with gbox
|
---|
16 | #define P_MAX P_GBOX
|
---|
17 | #define P_AUTO 0xFF
|
---|
18 |
|
---|
19 | #define P_DSR_AUTO 0
|
---|
20 | #define P_DSR_GNUSMAS 1
|
---|
21 | #define P_DSR_OPEN 2
|
---|
22 | #define P_DSR_PIONEER 3
|
---|
23 | #define P_DSR_WITHSID 4
|
---|
24 | #define P_DSR_UNKNOWN 5
|
---|
25 |
|
---|
26 | #define IS_ECM 0 // incoming data is ECM
|
---|
27 | #define IS_DCW 1 // incoming data is DCW
|
---|
28 | #define IS_PMT 2 // incoming data is PMT
|
---|
29 | #define IS_LGO 3 // incoming data is client logon
|
---|
30 | #define IS_ECHO 4 // incoming data is DCW echo from Samsung
|
---|
31 | #define IS_CAT 5 // incoming data is CAT
|
---|
32 | #define IS_BAD 0xFF // incoming data is unknown
|
---|
33 |
|
---|
34 | static const char *proto_txt[]={"unknown", "hsic", "sssp", "bomba", "dsr9500", "gs",
|
---|
35 | "alpha", "dsr9500old", "gbox"};
|
---|
36 | static const char *dsrproto_txt[]={"unknown", "samsung", "openbox", "pioneer",
|
---|
37 | "extended", "unknown"};
|
---|
38 | static const char *incomplete="incomplete request (%d bytes)";
|
---|
39 | static int connected=0;
|
---|
40 | static struct timeb tps, tpe;
|
---|
41 | static char oscam_ser_usr[32]={0};
|
---|
42 | static char oscam_ser_device[64]={0};
|
---|
43 | static speed_t oscam_ser_baud=0;
|
---|
44 | static int oscam_ser_delay=0;
|
---|
45 | static int oscam_ser_timeout=50;
|
---|
46 | static int oscam_ser_proto=0;
|
---|
47 | int serial_errors=0;
|
---|
48 | static int dsr9500type=P_DSR_AUTO;
|
---|
49 | static int samsung_0a=0; // number of 0A in ALL dcw sent into samsung
|
---|
50 | static int samsung_dcw=0; // number of dcw sent into samsung before echo or ecm is received
|
---|
51 |
|
---|
52 | typedef struct s_gbox
|
---|
53 | {
|
---|
54 | int cat_len;
|
---|
55 | int pmt_len;
|
---|
56 | int ecm_len;
|
---|
57 | } GCC_PACK GBOX_LENS;
|
---|
58 |
|
---|
59 | typedef struct s_sssp
|
---|
60 | {
|
---|
61 | ushort caid;
|
---|
62 | ushort pid;
|
---|
63 | ulong prid;
|
---|
64 | } GCC_PACK SSSP_TAB;
|
---|
65 |
|
---|
66 |
|
---|
67 | GBOX_LENS gbox_lens;
|
---|
68 | SSSP_TAB sssp_tab[SSSP_MAX_PID];
|
---|
69 | ushort sssp_srvid;
|
---|
70 | int sssp_num=0, sssp_fix=0;
|
---|
71 |
|
---|
72 | static int oscam_ser_alpha_convert(uchar *buf, int l)
|
---|
73 | {
|
---|
74 | int i;
|
---|
75 | if (buf[0]==0x7E) // normalize
|
---|
76 | {
|
---|
77 | l-=2;
|
---|
78 | memmove(buf, buf+1, l); // remove BOT/EOT
|
---|
79 | for (i=0; i<l; i++)
|
---|
80 | if (buf[i]==0x20)
|
---|
81 | {
|
---|
82 | memmove(buf+i, buf+i+1, --l);
|
---|
83 | buf[i]^=0x20;
|
---|
84 | }
|
---|
85 | }
|
---|
86 | else // to alphastar
|
---|
87 | {
|
---|
88 | memmove(buf+1, buf, l++); // insert BOT
|
---|
89 | buf[0]=0x7E;
|
---|
90 | for (i=1; i<l; i++)
|
---|
91 | if ((buf[i]==0x20) || (buf[i]==0x7E) || (buf[i]==0x7F))
|
---|
92 | {
|
---|
93 | buf[i]^=0x20;
|
---|
94 | memmove(buf+i+1, buf+i, l++);
|
---|
95 | buf[i++]=0x20;
|
---|
96 | }
|
---|
97 | buf[l++]=0x7F; // insert EOT
|
---|
98 | }
|
---|
99 | return(l);
|
---|
100 | }
|
---|
101 |
|
---|
102 | static void oscam_ser_disconnect(void);
|
---|
103 |
|
---|
104 | static int oscam_ser_parse_url(char *url)
|
---|
105 | {
|
---|
106 | char *service, *usr, *dev, *baud=NULL, *dummy, *para;
|
---|
107 |
|
---|
108 | oscam_ser_proto=P_AUTO;
|
---|
109 | if( (dummy=strstr(url, "://")) )
|
---|
110 | {
|
---|
111 | int i;
|
---|
112 | service=url;
|
---|
113 | url=dummy+3;
|
---|
114 | *dummy=0;
|
---|
115 | for (i=1; i<=P_MAX; i++)
|
---|
116 | if (!strcmp(service, proto_txt[i]))
|
---|
117 | oscam_ser_proto=i;
|
---|
118 | }
|
---|
119 | if ((!client[cs_idx].is_server) && (oscam_ser_proto==P_AUTO)) return(0);
|
---|
120 | switch(oscam_ser_proto) // set the defaults
|
---|
121 | {
|
---|
122 | case P_GS:
|
---|
123 | oscam_ser_timeout=500;
|
---|
124 | oscam_ser_baud=B19200;
|
---|
125 | break;
|
---|
126 | default:
|
---|
127 | oscam_ser_timeout=50;
|
---|
128 | #ifdef B115200
|
---|
129 | oscam_ser_baud=B115200;
|
---|
130 | #else
|
---|
131 | oscam_ser_baud=B9600;
|
---|
132 | #endif
|
---|
133 | }
|
---|
134 |
|
---|
135 | switch( oscam_ser_proto )
|
---|
136 | {
|
---|
137 | case P_DSR95:
|
---|
138 | dsr9500type=(client[cs_idx].is_server)?P_DSR_AUTO:P_DSR_WITHSID;
|
---|
139 | break;
|
---|
140 | case P_DSR95_OLD:
|
---|
141 | dsr9500type=P_DSR_AUTO;
|
---|
142 | oscam_ser_proto=P_DSR95;
|
---|
143 | }
|
---|
144 |
|
---|
145 | usr=url;
|
---|
146 | if( (dev=strchr(usr, '@')) )
|
---|
147 | {
|
---|
148 | *dev++='\0';
|
---|
149 | if( (dummy=strchr(usr, ':')) ) // fake pwd
|
---|
150 | *dummy++='\0';
|
---|
151 | if ((client[cs_idx].is_server) && (!usr[0])) return(0);
|
---|
152 | }
|
---|
153 | else
|
---|
154 | {
|
---|
155 | if (client[cs_idx].is_server) return(0); // user needed in server-mode
|
---|
156 | dev=usr;
|
---|
157 | }
|
---|
158 | if( (baud=strchr(dev, ':')) )// port = baud
|
---|
159 | *baud++='\0';
|
---|
160 | dummy=baud ? baud : dev;
|
---|
161 | if( (para=strchr(dummy, '?')) )
|
---|
162 | {
|
---|
163 | char *ptr1, *ptr2;
|
---|
164 | *para++='\0';
|
---|
165 | for (ptr1=strtok(para, "&"); ptr1; ptr1=strtok(NULL, "&"))
|
---|
166 | {
|
---|
167 | if (!(ptr2=strchr(ptr1, '='))) continue;
|
---|
168 | *ptr2++='\0';
|
---|
169 | strtolower(ptr1);
|
---|
170 | if (!strcmp("delay" , ptr1)) oscam_ser_delay =atoi(ptr2);
|
---|
171 | if (!strcmp("timeout", ptr1)) oscam_ser_timeout=atoi(ptr2);
|
---|
172 | }
|
---|
173 | }
|
---|
174 | if (baud)
|
---|
175 | {
|
---|
176 | trim(baud);
|
---|
177 | #ifdef B115200
|
---|
178 | if (!strcmp(baud, "115200"))
|
---|
179 | oscam_ser_baud=B115200;
|
---|
180 | else
|
---|
181 | #endif
|
---|
182 | #ifdef B57600
|
---|
183 | if (!strcmp(baud, "57600"))
|
---|
184 | oscam_ser_baud=B57600;
|
---|
185 | else
|
---|
186 | #endif
|
---|
187 | if (!strcmp(baud, "38400"))
|
---|
188 | oscam_ser_baud=B38400;
|
---|
189 | else if (!strcmp(baud, "19200"))
|
---|
190 | oscam_ser_baud=B19200;
|
---|
191 | else if (!strcmp(baud, "9600"))
|
---|
192 | oscam_ser_baud=B9600;
|
---|
193 | }
|
---|
194 | cs_strncpy(oscam_ser_usr, usr, sizeof(oscam_ser_usr));
|
---|
195 | cs_strncpy(oscam_ser_device, dev, sizeof(oscam_ser_device));
|
---|
196 | return(oscam_ser_baud);
|
---|
197 | }
|
---|
198 |
|
---|
199 | static void oscam_ser_set_baud(struct termios *tio, speed_t baud)
|
---|
200 | {
|
---|
201 | cfsetospeed(tio, baud);
|
---|
202 | cfsetispeed(tio, baud);
|
---|
203 | }
|
---|
204 |
|
---|
205 | static int oscam_ser_set_serial_device(int fd)
|
---|
206 | {
|
---|
207 | struct termios tio;
|
---|
208 |
|
---|
209 | memset(&tio, 0, sizeof(tio));
|
---|
210 | // tio.c_cflag = (CS8 | CREAD | HUPCL | CLOCAL);
|
---|
211 | tio.c_cflag = (CS8 | CREAD | CLOCAL);
|
---|
212 | tio.c_iflag = IGNPAR;
|
---|
213 | tio.c_cc[VMIN] = 1;
|
---|
214 | tio.c_cc[VTIME] = 0;
|
---|
215 | //#if !defined(OS_CYGWIN32)
|
---|
216 | oscam_ser_set_baud(&tio, B1200);
|
---|
217 | tcsetattr(fd, TCSANOW, &tio);
|
---|
218 | cs_sleepms(500);
|
---|
219 | //#endif
|
---|
220 | oscam_ser_set_baud(&tio, oscam_ser_baud);
|
---|
221 | return(tcsetattr(fd, TCSANOW, &tio));
|
---|
222 | }
|
---|
223 |
|
---|
224 | static int oscam_ser_poll(int event)
|
---|
225 | {
|
---|
226 | int msec;
|
---|
227 | struct pollfd pfds;
|
---|
228 | struct timeb tpc;
|
---|
229 | cs_ftime(&tpc);
|
---|
230 | msec=1000*(tpe.time-tpc.time)+tpe.millitm-tpc.millitm;
|
---|
231 | if (msec<0)
|
---|
232 | return(0);
|
---|
233 | pfds.fd=client[cs_idx].pfd;
|
---|
234 | pfds.events=event;
|
---|
235 | pfds.revents=0;
|
---|
236 | if (poll(&pfds, 1, msec)!=1)
|
---|
237 | return(0);
|
---|
238 | else
|
---|
239 | return(((pfds.revents)&event)==event);
|
---|
240 | }
|
---|
241 |
|
---|
242 | static int oscam_ser_write(uchar *buf, int n)
|
---|
243 | {
|
---|
244 | int i;
|
---|
245 | for (i=0; (i<n) && (oscam_ser_poll(POLLOUT)); i++)
|
---|
246 | {
|
---|
247 | if (oscam_ser_delay)
|
---|
248 | cs_sleepms(oscam_ser_delay);
|
---|
249 | if (write(client[cs_idx].pfd, buf+i, 1)<1)
|
---|
250 | break;
|
---|
251 | }
|
---|
252 | return(i);
|
---|
253 | }
|
---|
254 |
|
---|
255 | static int oscam_ser_send(uchar *buf, int l)
|
---|
256 | {
|
---|
257 | int n;
|
---|
258 | if (!client[cs_idx].pfd) return(0);
|
---|
259 | cs_ftime(&tps);
|
---|
260 | tpe=tps;
|
---|
261 | tpe.millitm+=oscam_ser_timeout+(l*(oscam_ser_delay+1));
|
---|
262 | tpe.time+=(tpe.millitm/1000);
|
---|
263 | tpe.millitm%=1000;
|
---|
264 | n=oscam_ser_write(buf, l);
|
---|
265 | cs_ftime(&tpe);
|
---|
266 | cs_ddump(buf, l, "send %d of %d bytes to %s in %d msec", n, l, remote_txt(),
|
---|
267 | 1000*(tpe.time-tps.time)+tpe.millitm-tps.millitm);
|
---|
268 | if (n!=l)
|
---|
269 | cs_log("transmit error. send %d of %d bytes only !", n, l);
|
---|
270 | return(n);
|
---|
271 | }
|
---|
272 |
|
---|
273 | static int oscam_ser_selrec(uchar *buf, int n, int l, int *c)
|
---|
274 | {
|
---|
275 | int i;
|
---|
276 | if (*c+n>l)
|
---|
277 | n=l-*c;
|
---|
278 | if (n<=0) return(0);
|
---|
279 | for (i=0; (i<n) && (oscam_ser_poll(POLLIN)); i++)
|
---|
280 | if (read(client[cs_idx].pfd, buf+*c, 1)<1 )
|
---|
281 | return(0);
|
---|
282 | else
|
---|
283 | (*c)++;
|
---|
284 | return(i==n);
|
---|
285 | }
|
---|
286 |
|
---|
287 | static int oscam_ser_recv(uchar *xbuf, int l)
|
---|
288 | {
|
---|
289 | int s, p, n, r;
|
---|
290 | uchar job=IS_BAD;
|
---|
291 | static uchar lb;
|
---|
292 | static int have_lb=0;
|
---|
293 | uchar *buf=xbuf+1;
|
---|
294 |
|
---|
295 | if (!client[cs_idx].pfd) return(-1);
|
---|
296 | cs_ftime(&tps);
|
---|
297 | tpe=tps;
|
---|
298 | tpe.millitm+=oscam_ser_timeout;
|
---|
299 | tpe.time+=(tpe.millitm/1000);
|
---|
300 | tpe.millitm%=1000;
|
---|
301 | buf[0]=lb;
|
---|
302 | for (s=p=r=0, n=have_lb; (s<4) && (p>=0); s++)
|
---|
303 | {
|
---|
304 | switch(s)
|
---|
305 | {
|
---|
306 | case 0: // STAGE 0: skip known garbage from DSR9500
|
---|
307 | if (oscam_ser_selrec(buf, 2-n, l, &n))
|
---|
308 | {
|
---|
309 | if ((buf[0]==0x0A) && (buf[1]==0x0D))
|
---|
310 | p=(-4);
|
---|
311 | if ((buf[0]==0x0D) && (buf[1]==0x0A))
|
---|
312 | p=(-4);
|
---|
313 | }
|
---|
314 | else
|
---|
315 | p=(-3);
|
---|
316 | have_lb=0;
|
---|
317 | break;
|
---|
318 | case 1: // STAGE 1: identify protocol
|
---|
319 | p=(-3);
|
---|
320 | if (oscam_ser_selrec(buf, 1, l, &n)) // now we have 3 bytes in buf
|
---|
321 | {
|
---|
322 | p=(-2);
|
---|
323 | if (client[cs_idx].is_server) // HERE IS SERVER
|
---|
324 | {
|
---|
325 | job=IS_ECM; // assume ECM
|
---|
326 | switch(buf[0])
|
---|
327 | {
|
---|
328 | case 0x00: if( (buf[1]==0x01)&&(buf[2]==0x00) )
|
---|
329 | { p=P_GS; job=IS_LGO; tpe.time++; } break;
|
---|
330 | case 0x01: if( (buf[1]&0xf0)==0xb0 ) p=P_GBOX;
|
---|
331 | else {p=P_SSSP; job=IS_PMT;}
|
---|
332 | break; // pmt-request
|
---|
333 | case 0x02: p=P_HSIC; break;
|
---|
334 | case 0x03: switch(oscam_ser_proto)
|
---|
335 | {
|
---|
336 | case P_SSSP :
|
---|
337 | case P_GS :
|
---|
338 | case P_DSR95 : p=oscam_ser_proto; break;
|
---|
339 | case P_AUTO : p=(buf[1]<0x30) ? P_SSSP : P_DSR95;
|
---|
340 | break; // auto for GS is useless !!
|
---|
341 | } break;
|
---|
342 | case 0x04: p=P_DSR95; job=IS_ECHO; dsr9500type=P_DSR_GNUSMAS; break;
|
---|
343 | case 0x7E: p=P_ALPHA; if (buf[1]!=0x80) job=IS_BAD; break;
|
---|
344 | case 0x80:
|
---|
345 | case 0x81: p=P_BOMBA; break;
|
---|
346 | }
|
---|
347 | }
|
---|
348 | else // HERE IS CLIENT
|
---|
349 | {
|
---|
350 | job=IS_DCW; // assume DCW
|
---|
351 | switch(oscam_ser_proto)
|
---|
352 | {
|
---|
353 | case P_HSIC : if ((buf[0]==4) && (buf[1]==4)) p=P_HSIC; break;
|
---|
354 | case P_BOMBA: p=P_BOMBA; break;
|
---|
355 | case P_DSR95: if (buf[0]==4) p=P_DSR95; break;
|
---|
356 | case P_ALPHA: if (buf[0]==0x88) p=P_ALPHA; break;
|
---|
357 | }
|
---|
358 | }
|
---|
359 | if ((oscam_ser_proto!=p) && (oscam_ser_proto!=P_AUTO))
|
---|
360 | p=(-2);
|
---|
361 | }
|
---|
362 | break;
|
---|
363 | case 2: // STAGE 2: examine length
|
---|
364 | if (client[cs_idx].is_server) switch(p)
|
---|
365 | {
|
---|
366 | case P_SSSP : r=(buf[1]<<8)|buf[2]; break;
|
---|
367 | case P_BOMBA : r=buf[2]; break;
|
---|
368 | case P_HSIC : if (oscam_ser_selrec(buf, 12, l, &n)) r=buf[14];
|
---|
369 | else p=(-1);
|
---|
370 | break;
|
---|
371 | case P_DSR95 : if( job==IS_ECHO )
|
---|
372 | {
|
---|
373 | r=17*samsung_dcw-3+samsung_0a;
|
---|
374 | samsung_dcw=samsung_0a=0;
|
---|
375 | }
|
---|
376 | else
|
---|
377 | {
|
---|
378 | if (oscam_ser_selrec(buf, 16, l, &n))
|
---|
379 | {
|
---|
380 | uchar b;
|
---|
381 | if (cs_atob(&b, (char *)buf+17, 1)<0)
|
---|
382 | p=(-2);
|
---|
383 | else {
|
---|
384 | r=(b<<1);
|
---|
385 | r+=(dsr9500type==P_DSR_WITHSID)?4:0;
|
---|
386 | }
|
---|
387 | }
|
---|
388 | else p=(-1);
|
---|
389 | }
|
---|
390 | break;
|
---|
391 | case P_GS : if (job==IS_LGO)
|
---|
392 | r=5;
|
---|
393 | else
|
---|
394 | {
|
---|
395 | if (oscam_ser_selrec(buf, 1, l, &n))
|
---|
396 | r=(buf[3]<<8)|buf[2];
|
---|
397 | else p=(-1);
|
---|
398 | }
|
---|
399 | break;
|
---|
400 | case P_ALPHA : r=-0x7F; // char specifying EOT
|
---|
401 | break;
|
---|
402 | case P_GBOX : r=((buf[1]&0xf)<<8) | buf[2];
|
---|
403 | gbox_lens.cat_len = r;
|
---|
404 | break;
|
---|
405 | default : dsr9500type=P_DSR_AUTO;
|
---|
406 | }
|
---|
407 | else switch(p)
|
---|
408 | {
|
---|
409 | case P_HSIC : r=(buf[2]==0x3A) ? 20 : 0; break; // 3A=DCW / FC=ECM was wrong
|
---|
410 | case P_BOMBA : r=13; break;
|
---|
411 | case P_DSR95 : r=14; break;
|
---|
412 | case P_ALPHA : r=(buf[1]<<8)|buf[2]; break; // should be 16 always
|
---|
413 | }
|
---|
414 | break;
|
---|
415 | case 3: // STAGE 3: get the rest ...
|
---|
416 | if (r>0) // read r additional bytes
|
---|
417 | {
|
---|
418 | int all = n+r;
|
---|
419 | if( !oscam_ser_selrec(buf, r, l, &n) )
|
---|
420 | {
|
---|
421 | cs_debug("not all data received, waiting another 50 ms");
|
---|
422 | tpe.millitm+=50;
|
---|
423 | if( !oscam_ser_selrec(buf, all-n, l, &n) )
|
---|
424 | p=(-1);
|
---|
425 | }
|
---|
426 | // auto detect DSR9500 protocol
|
---|
427 | if( client[cs_idx].is_server && p==P_DSR95 && dsr9500type==P_DSR_AUTO )
|
---|
428 | {
|
---|
429 | tpe.millitm+=20;
|
---|
430 | if( oscam_ser_selrec(buf, 2, l, &n) )
|
---|
431 | {
|
---|
432 | if( cs_atoi((char *)buf+n-2, 1, 1)==0xFFFFFFFF )
|
---|
433 | {
|
---|
434 | switch( (buf[n-2]<<8)|buf[n-1] )
|
---|
435 | {
|
---|
436 | case 0x0A0D : dsr9500type=P_DSR_OPEN; break;
|
---|
437 | case 0x0D0A : dsr9500type=P_DSR_PIONEER; break;
|
---|
438 | default : dsr9500type=P_DSR_UNKNOWN; break;
|
---|
439 | }
|
---|
440 | }else{
|
---|
441 | if( oscam_ser_selrec(buf, 2, l, &n) )
|
---|
442 | if( cs_atoi((char *)buf+n-2, 1, 1)==0xFFFFFFFF )
|
---|
443 | dsr9500type=P_DSR_UNKNOWN;
|
---|
444 | else
|
---|
445 | dsr9500type=P_DSR_WITHSID;
|
---|
446 | else {
|
---|
447 | dsr9500type=P_DSR_UNKNOWN;
|
---|
448 | p=(-1);
|
---|
449 | }
|
---|
450 | }
|
---|
451 | }
|
---|
452 | else
|
---|
453 | dsr9500type=P_DSR_GNUSMAS;
|
---|
454 | if( p )
|
---|
455 | cs_log("detected dsr9500-%s type receiver",
|
---|
456 | dsrproto_txt[dsr9500type]);
|
---|
457 | }
|
---|
458 | // gbox
|
---|
459 | if( client[cs_idx].is_server && p==P_GBOX )
|
---|
460 | {
|
---|
461 | int j;
|
---|
462 | for( j=0; (j<3) && (p>0); j++)
|
---|
463 | switch( j )
|
---|
464 | {
|
---|
465 | case 0: // PMT head
|
---|
466 | if( !oscam_ser_selrec(buf, 3, l, &n) )
|
---|
467 | p=(-1);
|
---|
468 | else if( !(buf[n-3]==0x02 && (buf[n-2]&0xf0)==0xb0) )
|
---|
469 | p=(-2);
|
---|
470 | break;
|
---|
471 | case 1: // PMT + ECM header
|
---|
472 | gbox_lens.pmt_len=((buf[n-2]&0xf)<<8)|buf[n-1];
|
---|
473 | if( !oscam_ser_selrec(buf, gbox_lens.pmt_len+3, l, &n) )
|
---|
474 | p=(-1);
|
---|
475 | break;
|
---|
476 | case 2: // ECM + ECM PID
|
---|
477 | gbox_lens.ecm_len=((buf[n-2]&0xf)<<8)|buf[n-1];
|
---|
478 | if( !oscam_ser_selrec(buf, gbox_lens.ecm_len+4, l, &n) )
|
---|
479 | p=(-1);
|
---|
480 | }
|
---|
481 | } // gbox
|
---|
482 | }
|
---|
483 | else if (r<0) // read until specified char (-r)
|
---|
484 | {
|
---|
485 | while((buf[n-1]!=(-r)) && (p>0))
|
---|
486 | if (!oscam_ser_selrec(buf, 1, l, &n))
|
---|
487 | p=(-1);
|
---|
488 | }
|
---|
489 | break;
|
---|
490 | }
|
---|
491 | }
|
---|
492 | if (p==(-2) || p==(-1)) {
|
---|
493 | oscam_ser_selrec(buf, l-n, l, &n); // flush buffer
|
---|
494 | serial_errors++;
|
---|
495 | }
|
---|
496 | cs_ftime(&tpe);
|
---|
497 | cs_ddump(buf, n, "received %d bytes from %s in %d msec", n, remote_txt(),
|
---|
498 | 1000*(tpe.time-tps.time)+tpe.millitm-tps.millitm);
|
---|
499 | client[cs_idx].last=tpe.time;
|
---|
500 | switch(p)
|
---|
501 | {
|
---|
502 | case (-1): if (client[cs_idx].is_server&&(n>2)&&(buf[0]==2)&&(buf[1]==2)&&(buf[2]==2))
|
---|
503 | {
|
---|
504 | oscam_ser_disconnect();
|
---|
505 | cs_log("humax powered on"); // this is nice ;)
|
---|
506 | }
|
---|
507 | else
|
---|
508 | cs_log(incomplete, n);
|
---|
509 | break;
|
---|
510 | case (-2): cs_debug("unknown request or garbage");
|
---|
511 | break;
|
---|
512 | }
|
---|
513 | xbuf[0]=(uchar) ((job<<4) | p);
|
---|
514 | return((p<0)?0:n+1);
|
---|
515 | }
|
---|
516 |
|
---|
517 | /*
|
---|
518 | * server functions
|
---|
519 | */
|
---|
520 |
|
---|
521 | static void oscam_ser_disconnect_client()
|
---|
522 | {
|
---|
523 | switch(connected ? connected : oscam_ser_proto)
|
---|
524 | {
|
---|
525 | case P_GS:
|
---|
526 | client[cs_idx].mbuf[0] = 0x01;
|
---|
527 | client[cs_idx].mbuf[1] = 0x00;
|
---|
528 | client[cs_idx].mbuf[2] = 0x00;
|
---|
529 | client[cs_idx].mbuf[3] = 0x00;
|
---|
530 | oscam_ser_send(client[cs_idx].mbuf, 4);
|
---|
531 | break;
|
---|
532 | }
|
---|
533 | dsr9500type=P_DSR_AUTO;
|
---|
534 | serial_errors=0;
|
---|
535 | }
|
---|
536 |
|
---|
537 | static void oscam_ser_init_client()
|
---|
538 | {
|
---|
539 | switch(oscam_ser_proto) // sure, does not work in auto-mode
|
---|
540 | {
|
---|
541 | case P_GS:
|
---|
542 | oscam_ser_disconnect_client(); // send disconnect first
|
---|
543 | cs_sleepms(300); // wait a little bit
|
---|
544 | client[cs_idx].mbuf[0] = 0x00;
|
---|
545 | client[cs_idx].mbuf[1] = 0x00;
|
---|
546 | client[cs_idx].mbuf[2] = 0x00;
|
---|
547 | client[cs_idx].mbuf[3] = 0x00;
|
---|
548 | oscam_ser_send(client[cs_idx].mbuf, 4); // send connect
|
---|
549 | break;
|
---|
550 | }
|
---|
551 | }
|
---|
552 |
|
---|
553 | static void oscam_ser_disconnect()
|
---|
554 | {
|
---|
555 | oscam_ser_disconnect_client();
|
---|
556 | if (connected)
|
---|
557 | cs_log("%s disconnected (%s)", username(cs_idx), proto_txt[connected]);
|
---|
558 | connected=0;
|
---|
559 | }
|
---|
560 |
|
---|
561 | static void oscam_ser_auth_client(int proto)
|
---|
562 | {
|
---|
563 | int ok = 0;
|
---|
564 | // After reload base account ptrs may be placed in other address,
|
---|
565 | // and we may can't find it in this process.
|
---|
566 | // Simply save valid account.
|
---|
567 | struct s_auth *account=0;
|
---|
568 |
|
---|
569 | if (connected==proto)
|
---|
570 | return;
|
---|
571 | if (connected)
|
---|
572 | oscam_ser_disconnect();
|
---|
573 | connected=proto;
|
---|
574 | if( !account )
|
---|
575 | {
|
---|
576 | client[cs_idx].usr[0]=0;
|
---|
577 | for (ok=0, account=cfg->account; (account) && (!ok); account=account->next)
|
---|
578 | if( (ok=!strcmp(oscam_ser_usr, account->usr)) )
|
---|
579 | break;
|
---|
580 | }
|
---|
581 | cs_auth_client(ok ? account : (struct s_auth *)(-1), proto_txt[connected]);
|
---|
582 | }
|
---|
583 |
|
---|
584 | static void oscam_ser_send_dcw(ECM_REQUEST *er)
|
---|
585 | {
|
---|
586 | int i;
|
---|
587 | uchar crc;
|
---|
588 | if (er->rc<4) // found
|
---|
589 | switch(connected)
|
---|
590 | {
|
---|
591 | case P_HSIC:
|
---|
592 | for (i=0, crc=HSIC_CRC; i<16; i++)
|
---|
593 | crc^=er->cw[i];
|
---|
594 | memset(client[cs_idx].mbuf , 0x04 , 2);
|
---|
595 | memset(client[cs_idx].mbuf+2 , 0x3a , 2);
|
---|
596 | memcpy(client[cs_idx].mbuf+4 , er->cw, 16);
|
---|
597 | memcpy(client[cs_idx].mbuf+20, &crc , 1);
|
---|
598 | memset(client[cs_idx].mbuf+21, 0x1b , 2);
|
---|
599 | oscam_ser_send(client[cs_idx].mbuf, 23);
|
---|
600 | break;
|
---|
601 | case P_SSSP:
|
---|
602 | client[cs_idx].mbuf[0]=0xF2;
|
---|
603 | client[cs_idx].mbuf[1]=0;
|
---|
604 | client[cs_idx].mbuf[2]=16;
|
---|
605 | memcpy(client[cs_idx].mbuf+3, er->cw, 16);
|
---|
606 | oscam_ser_send(client[cs_idx].mbuf, 19);
|
---|
607 | if (!sssp_fix)
|
---|
608 | {
|
---|
609 | client[cs_idx].mbuf[0]=0xF1;
|
---|
610 | client[cs_idx].mbuf[1]=0;
|
---|
611 | client[cs_idx].mbuf[2]=2;
|
---|
612 | memcpy(client[cs_idx].mbuf+3, i2b(2, er->pid), 2);
|
---|
613 | oscam_ser_send(client[cs_idx].mbuf, 5);
|
---|
614 | sssp_fix=1;
|
---|
615 | }
|
---|
616 | break;
|
---|
617 | case P_GBOX:
|
---|
618 | case P_BOMBA:
|
---|
619 | oscam_ser_send(er->cw, 16);
|
---|
620 | break;
|
---|
621 | case P_DSR95:
|
---|
622 | client[cs_idx].mbuf[0]=4;
|
---|
623 | memcpy(client[cs_idx].mbuf+1, er->cw, 16);
|
---|
624 | oscam_ser_send(client[cs_idx].mbuf, 17);
|
---|
625 | if( dsr9500type==P_DSR_GNUSMAS )
|
---|
626 | {
|
---|
627 | int i;
|
---|
628 | samsung_0a=0;
|
---|
629 | for( i=1; i<17; i++ )
|
---|
630 | if( client[cs_idx].mbuf[i]==0x0A )
|
---|
631 | samsung_0a++;
|
---|
632 | samsung_dcw++;
|
---|
633 | }
|
---|
634 | break;
|
---|
635 | case P_GS:
|
---|
636 | client[cs_idx].mbuf[0]=0x03;
|
---|
637 | client[cs_idx].mbuf[1]=0x08;
|
---|
638 | client[cs_idx].mbuf[2]=0x10;
|
---|
639 | client[cs_idx].mbuf[3]=0x00;
|
---|
640 | memcpy(client[cs_idx].mbuf+4, er->cw, 16);
|
---|
641 | oscam_ser_send(client[cs_idx].mbuf, 20);
|
---|
642 | break;
|
---|
643 | case P_ALPHA:
|
---|
644 | client[cs_idx].mbuf[0]=0x88;
|
---|
645 | client[cs_idx].mbuf[1]=0x00;
|
---|
646 | client[cs_idx].mbuf[2]=0x10;
|
---|
647 | memcpy(client[cs_idx].mbuf+3, er->cw, 16);
|
---|
648 | oscam_ser_send(client[cs_idx].mbuf, 19);
|
---|
649 | break;
|
---|
650 | }
|
---|
651 | else // not found
|
---|
652 | switch(connected)
|
---|
653 | {
|
---|
654 | case P_GS:
|
---|
655 | client[cs_idx].mbuf[0]=0x03;
|
---|
656 | client[cs_idx].mbuf[1]=0x09;
|
---|
657 | client[cs_idx].mbuf[2]=0x00;
|
---|
658 | client[cs_idx].mbuf[3]=0x00;
|
---|
659 | oscam_ser_send(client[cs_idx].mbuf, 4);
|
---|
660 | break;
|
---|
661 | }
|
---|
662 | serial_errors=0; // clear error counter
|
---|
663 | }
|
---|
664 |
|
---|
665 | static void oscam_ser_process_pmt(uchar *buf, int l)
|
---|
666 | {
|
---|
667 | int i;
|
---|
668 | uchar sbuf[32];
|
---|
669 |
|
---|
670 | switch(connected)
|
---|
671 | {
|
---|
672 | case P_SSSP:
|
---|
673 | sssp_fix=0;
|
---|
674 | memset(sssp_tab, 0, sizeof(sssp_tab));
|
---|
675 | sssp_srvid=b2i(2, buf+3);
|
---|
676 | for (i=9, sssp_num=0; (i<l) && (sssp_num<SSSP_MAX_PID); i+=7, sssp_num++)
|
---|
677 | {
|
---|
678 | memcpy(sbuf+3+(sssp_num<<1), buf+i+2, 2);
|
---|
679 | sssp_tab[sssp_num].caid=b2i(2, buf+i );
|
---|
680 | sssp_tab[sssp_num].pid =b2i(2, buf+i+2);
|
---|
681 | sssp_tab[sssp_num].prid=b2i(3, buf+i+4);
|
---|
682 | }
|
---|
683 | sbuf[0]=0xF1;
|
---|
684 | sbuf[1]=0;
|
---|
685 | sbuf[2]=(sssp_num<<1);
|
---|
686 | oscam_ser_send(sbuf, sbuf[2]+3);
|
---|
687 | break;
|
---|
688 | }
|
---|
689 | }
|
---|
690 |
|
---|
691 | static void oscam_ser_client_logon(uchar *buf, int l)
|
---|
692 | {
|
---|
693 | uchar gs_logon[]={0, 1, 0, 0, 2, 1, 0, 0};
|
---|
694 | switch(connected)
|
---|
695 | {
|
---|
696 | case P_GS:
|
---|
697 | if ((l>=8) && (!memcmp(buf, gs_logon, 8)))
|
---|
698 | {
|
---|
699 | buf[0] = 0x02;
|
---|
700 | buf[1] = 0x04;
|
---|
701 | buf[2] = 0x00;
|
---|
702 | buf[3] = 0x00;
|
---|
703 | oscam_ser_send(buf, 4);
|
---|
704 | }
|
---|
705 | break;
|
---|
706 | }
|
---|
707 | }
|
---|
708 |
|
---|
709 | static int oscam_ser_check_ecm(ECM_REQUEST *er, uchar *buf, int l)
|
---|
710 | {
|
---|
711 | int i;
|
---|
712 |
|
---|
713 | if (l<16)
|
---|
714 | {
|
---|
715 | cs_log(incomplete, l);
|
---|
716 | return(1);
|
---|
717 | }
|
---|
718 |
|
---|
719 | switch(connected)
|
---|
720 | {
|
---|
721 | case P_HSIC:
|
---|
722 | er->l = l-12;
|
---|
723 | er->caid = b2i(2, buf+1 );
|
---|
724 | er->prid = b2i(3, buf+3 );
|
---|
725 | er->pid = b2i(2, buf+6 );
|
---|
726 | er->srvid= b2i(2, buf+10);
|
---|
727 | memcpy(er->ecm, buf+12, er->l);
|
---|
728 | break;
|
---|
729 | case P_SSSP:
|
---|
730 | er->pid=b2i(2, buf+3);
|
---|
731 | for (i=0; (i<8) && (sssp_tab[i].pid!=er->pid); i++);
|
---|
732 | if (i>=sssp_num)
|
---|
733 | {
|
---|
734 | cs_debug("illegal request, unknown pid=%04X", er->pid);
|
---|
735 | return(2);
|
---|
736 | }
|
---|
737 | er->l = l-5;
|
---|
738 | er->srvid= sssp_srvid;
|
---|
739 | er->caid = sssp_tab[i].caid;
|
---|
740 | er->prid = sssp_tab[i].prid;
|
---|
741 | memcpy(er->ecm, buf+5, er->l);
|
---|
742 | break;
|
---|
743 | case P_BOMBA:
|
---|
744 | er->l=l;
|
---|
745 | memcpy(er->ecm, buf, er->l);
|
---|
746 | break;
|
---|
747 | case P_DSR95:
|
---|
748 | buf[l]='\0'; // prepare for trim
|
---|
749 | trim((char *)buf+13); // strip spc, nl, cr ...
|
---|
750 | er->l=strlen((char *)buf+13)>>1;
|
---|
751 | er->prid=cs_atoi((char *)buf+3, 3, 0); // ignore errors
|
---|
752 | er->caid=cs_atoi((char *)buf+9, 2, 0); // ignore errors
|
---|
753 | if (cs_atob(er->ecm, (char *)buf+13, er->l)<0)
|
---|
754 | {
|
---|
755 | cs_log("illegal characters in ecm-request");
|
---|
756 | return(1);
|
---|
757 | }
|
---|
758 | if( dsr9500type==P_DSR_WITHSID )
|
---|
759 | {
|
---|
760 | er->l-=2;
|
---|
761 | er->srvid=cs_atoi((char *)buf+13+(er->l<<1), 2, 0);
|
---|
762 | }
|
---|
763 | break;
|
---|
764 | case P_GS:
|
---|
765 | er->l = ((buf[3]<<8)|buf[2]) - 6;
|
---|
766 | er->srvid = (buf[5]<<8)|buf[4]; // sid
|
---|
767 | er->caid = (buf[7]<<8)|buf[6];
|
---|
768 | er->prid = 0;
|
---|
769 | if (er->l>256) er->l=256;
|
---|
770 | memcpy(er->ecm, buf+10, er->l);
|
---|
771 | break;
|
---|
772 | case P_ALPHA:
|
---|
773 | l=oscam_ser_alpha_convert(buf, l);
|
---|
774 | er->l = b2i(2, buf+1 )-2;
|
---|
775 | er->caid = b2i(2, buf+3 );
|
---|
776 | if ((er->l!=l-5) || (er->l>257))
|
---|
777 | {
|
---|
778 | cs_log(incomplete, l);
|
---|
779 | return(1);
|
---|
780 | }
|
---|
781 | memcpy(er->ecm, buf+5, er->l);
|
---|
782 | break;
|
---|
783 | case P_GBOX:
|
---|
784 | er->srvid = b2i(2, buf+gbox_lens.cat_len+3+3);
|
---|
785 | er->l = gbox_lens.ecm_len+3;
|
---|
786 | memcpy(er->ecm, buf+gbox_lens.cat_len+3+gbox_lens.pmt_len+3, er->l);
|
---|
787 | break;
|
---|
788 | }
|
---|
789 | return(0);
|
---|
790 | }
|
---|
791 |
|
---|
792 | static void oscam_ser_process_ecm(uchar *buf, int l)
|
---|
793 | {
|
---|
794 | ECM_REQUEST *er;
|
---|
795 |
|
---|
796 | if (!(er=get_ecmtask()))
|
---|
797 | return;
|
---|
798 |
|
---|
799 | switch(oscam_ser_check_ecm(er, buf, l))
|
---|
800 | {
|
---|
801 | case 2: er->rc=9; return; // error without log
|
---|
802 | case 1: er->rc=9; // error with log
|
---|
803 | }
|
---|
804 | get_cw(er);
|
---|
805 | }
|
---|
806 |
|
---|
807 |
|
---|
808 | static void oscam_ser_server()
|
---|
809 | {
|
---|
810 | int n;
|
---|
811 |
|
---|
812 | connected=0;
|
---|
813 | oscam_ser_init_client();
|
---|
814 |
|
---|
815 | while ((n=process_input(client[cs_idx].mbuf, sizeof(client[cs_idx].mbuf), cfg->cmaxidle))>=0)
|
---|
816 | {
|
---|
817 | if (serial_errors > 3)
|
---|
818 | {
|
---|
819 | cs_log("too many errors, reiniting...");
|
---|
820 | break;
|
---|
821 | }
|
---|
822 | if (n>0)
|
---|
823 | {
|
---|
824 | oscam_ser_auth_client(client[cs_idx].mbuf[0] & 0xF);
|
---|
825 | switch (client[cs_idx].mbuf[0]>>4)
|
---|
826 | {
|
---|
827 | case IS_ECM:
|
---|
828 | oscam_ser_process_ecm(client[cs_idx].mbuf+1, n-1);
|
---|
829 | break;
|
---|
830 | case IS_PMT:
|
---|
831 | oscam_ser_process_pmt(client[cs_idx].mbuf+1, n-1);
|
---|
832 | break;
|
---|
833 | case IS_LGO:
|
---|
834 | oscam_ser_client_logon(client[cs_idx].mbuf+1, n-1);
|
---|
835 | break;
|
---|
836 | }
|
---|
837 | }
|
---|
838 | }
|
---|
839 | oscam_ser_disconnect();
|
---|
840 | }
|
---|
841 |
|
---|
842 | static int init_oscam_ser_device(char *device)
|
---|
843 | {
|
---|
844 | int fd;
|
---|
845 |
|
---|
846 | fd=open(device, O_RDWR | O_NOCTTY | O_SYNC | O_NONBLOCK);
|
---|
847 | if (fd>0)
|
---|
848 | {
|
---|
849 | fcntl(fd, F_SETFL, 0);
|
---|
850 | if (oscam_ser_set_serial_device(fd)<0) cs_log("ERROR ioctl");
|
---|
851 | if (tcflush(fd, TCIOFLUSH)<0) cs_log("ERROR flush");
|
---|
852 | }
|
---|
853 | else
|
---|
854 | {
|
---|
855 | fd=0;
|
---|
856 | cs_log("ERROR opening %s", device);
|
---|
857 | }
|
---|
858 | return(fd);
|
---|
859 | }
|
---|
860 |
|
---|
861 | static void oscam_ser_fork(char *url)
|
---|
862 | {
|
---|
863 | //static char logtxt[32];
|
---|
864 |
|
---|
865 | client[cs_idx].is_server=1;
|
---|
866 | if ((!url) || (!url[0])) return;
|
---|
867 | if (!oscam_ser_parse_url(url)) return;
|
---|
868 | // snprintf(logtxt, sizeof(logtxt)-1, ", %s@%s",
|
---|
869 | // oscam_ser_proto>P_MAX ? "auto" : proto_txt[oscam_ser_proto], oscam_ser_device);
|
---|
870 | // ph[idx].logtxt=logtxt;
|
---|
871 |
|
---|
872 | while(1)
|
---|
873 | {
|
---|
874 | client[cs_idx].au=(-1);
|
---|
875 | client[cs_idx].usr[0]='\0';
|
---|
876 | client[cs_idx].login=time((time_t *)0);
|
---|
877 | client[cs_idx].pfd=init_oscam_ser_device(oscam_ser_device);
|
---|
878 | if (client[cs_idx].pfd)
|
---|
879 | oscam_ser_server();
|
---|
880 | else
|
---|
881 | cs_sleepms(60000); // retry in 1 min. (USB-Device ?)
|
---|
882 | if (client[cs_idx].pfd) close(client[cs_idx].pfd);
|
---|
883 | }
|
---|
884 | }
|
---|
885 |
|
---|
886 | void init_oscam_ser(int ctyp)
|
---|
887 | {
|
---|
888 | char sdevice[512];
|
---|
889 | cs_strncpy(sdevice, cfg->ser_device, sizeof(sdevice));
|
---|
890 |
|
---|
891 | //TODO: untested (threaded)
|
---|
892 | char *p;
|
---|
893 | while( (p=strrchr(sdevice, 1)) )
|
---|
894 | {
|
---|
895 | *p = 0;
|
---|
896 | int i=cs_fork(0, ctyp);
|
---|
897 | client[i].typ='c';
|
---|
898 | client[i].ip=0;
|
---|
899 | client[i].ctyp=ctyp;
|
---|
900 | pthread_create(&client[i].thread, NULL, (void *)oscam_ser_fork, (void *)p + 1);
|
---|
901 |
|
---|
902 | }
|
---|
903 |
|
---|
904 | int i=cs_fork(0, ctyp);
|
---|
905 | client[i].typ='c';
|
---|
906 | client[i].ip=0;
|
---|
907 | client[i].ctyp=ctyp;
|
---|
908 | pthread_create(&client[i].thread, NULL, (void *)oscam_ser_fork, (void *)sdevice);
|
---|
909 |
|
---|
910 | }
|
---|
911 |
|
---|
912 | /*
|
---|
913 | * client functions
|
---|
914 | */
|
---|
915 |
|
---|
916 | static int oscam_ser_client_init()
|
---|
917 | {
|
---|
918 | if ((!reader[client[cs_idx].ridx].device[0])) cs_exit(1);
|
---|
919 | if (!oscam_ser_parse_url(reader[client[cs_idx].ridx].device)) cs_exit(1);
|
---|
920 | client[cs_idx].pfd=init_oscam_ser_device(oscam_ser_device);
|
---|
921 | return((client[cs_idx].pfd>0) ? 0 : 1);
|
---|
922 | }
|
---|
923 |
|
---|
924 | static int oscam_ser_send_ecm(ECM_REQUEST *er, uchar *buf)
|
---|
925 | {
|
---|
926 | switch(oscam_ser_proto)
|
---|
927 | {
|
---|
928 | case P_HSIC:
|
---|
929 | memset(buf, 0, 12);
|
---|
930 | buf[0]=2;
|
---|
931 | memcpy(buf+ 1, i2b(2, er->caid ), 2);
|
---|
932 | memcpy(buf+ 3, i2b(3, er->prid ), 3);
|
---|
933 | memcpy(buf+ 6, i2b(2, er->pid ), 2);
|
---|
934 | memcpy(buf+10, i2b(2, er->srvid), 2);
|
---|
935 | memcpy(buf+12, er->ecm, er->l);
|
---|
936 | oscam_ser_send(buf, 12+er->l);
|
---|
937 | break;
|
---|
938 | case P_BOMBA:
|
---|
939 | oscam_ser_send(er->ecm, er->l);
|
---|
940 | break;
|
---|
941 | case P_DSR95:
|
---|
942 | if( dsr9500type==P_DSR_WITHSID )
|
---|
943 | {
|
---|
944 | sprintf((char *)buf, "%c%08lX%04X%s%04X\n\r",
|
---|
945 | 3, er->prid, er->caid, cs_hexdump(0, er->ecm, er->l), er->srvid);
|
---|
946 | oscam_ser_send(buf, (er->l<<1)+19); // 1 + 8 + 4 + l*2 + 4 + 2
|
---|
947 | }
|
---|
948 | else
|
---|
949 | {
|
---|
950 | sprintf((char *)buf, "%c%08lX%04X%s\n\r",
|
---|
951 | 3, er->prid, er->caid, cs_hexdump(0, er->ecm, er->l));
|
---|
952 | oscam_ser_send(buf, (er->l<<1)+15); // 1 + 8 + 4 + l*2 + 2
|
---|
953 | }
|
---|
954 | break;
|
---|
955 | case P_ALPHA:
|
---|
956 | buf[0]=0x80;
|
---|
957 | memcpy(buf+1, i2b(2, 2+er->l), 2);
|
---|
958 | memcpy(buf+3, i2b(2, er->caid), 2);
|
---|
959 | memcpy(buf+5, er->ecm, er->l);
|
---|
960 | oscam_ser_send(buf, oscam_ser_alpha_convert(buf, 5+er->l));
|
---|
961 | break;
|
---|
962 | }
|
---|
963 | return(0);
|
---|
964 | }
|
---|
965 |
|
---|
966 | static void oscam_ser_process_dcw(uchar *dcw, int *rc, uchar *buf, int l)
|
---|
967 | {
|
---|
968 | switch(oscam_ser_proto)
|
---|
969 | {
|
---|
970 | case P_HSIC:
|
---|
971 | if ((l>=23) && (buf[2]==0x3A) && (buf[3]==0x3A))
|
---|
972 | {
|
---|
973 | int i;
|
---|
974 | uchar crc;
|
---|
975 | for (i=4, crc=HSIC_CRC; i<20; i++)
|
---|
976 | crc^=buf[i];
|
---|
977 | if (crc==buf[20])
|
---|
978 | {
|
---|
979 | memcpy(dcw, buf+4, 16);
|
---|
980 | *rc=1;
|
---|
981 | }
|
---|
982 | }
|
---|
983 | break;
|
---|
984 | case P_BOMBA:
|
---|
985 | if (l>=16)
|
---|
986 | {
|
---|
987 | memcpy(dcw, buf, 16);
|
---|
988 | *rc=1;
|
---|
989 | }
|
---|
990 | break;
|
---|
991 | case P_DSR95:
|
---|
992 | if ((l>=17) && (buf[0]==4))
|
---|
993 | {
|
---|
994 | memcpy(dcw, buf+1, 16);
|
---|
995 | *rc=1;
|
---|
996 | }
|
---|
997 | break;
|
---|
998 | case P_ALPHA:
|
---|
999 | if ((l>=19) && (buf[0]==0x88))
|
---|
1000 | {
|
---|
1001 | memcpy(dcw, buf+3, 16);
|
---|
1002 | *rc=1;
|
---|
1003 | }
|
---|
1004 | break;
|
---|
1005 | }
|
---|
1006 | }
|
---|
1007 |
|
---|
1008 | static int oscam_ser_recv_chk(uchar *dcw, int *rc, uchar *buf, int n)
|
---|
1009 | {
|
---|
1010 | *rc=(-1);
|
---|
1011 | switch (buf[0]>>4)
|
---|
1012 | {
|
---|
1013 | case IS_DCW:
|
---|
1014 | oscam_ser_process_dcw(dcw, rc, buf+1, n-1);
|
---|
1015 | break;
|
---|
1016 | }
|
---|
1017 | return((*rc<0) ? (-1) : 0); // idx not supported in serial module
|
---|
1018 | }
|
---|
1019 |
|
---|
1020 | /*
|
---|
1021 | * protocol structure
|
---|
1022 | */
|
---|
1023 |
|
---|
1024 | void module_oscam_ser(struct s_module *ph)
|
---|
1025 | {
|
---|
1026 | strcpy(ph->desc, "serial");
|
---|
1027 | ph->type=MOD_CONN_SERIAL;
|
---|
1028 | ph->multi=1;
|
---|
1029 | ph->watchdog=0;
|
---|
1030 | ph->s_handler=init_oscam_ser;
|
---|
1031 | ph->recv=oscam_ser_recv;
|
---|
1032 | ph->send_dcw=oscam_ser_send_dcw;
|
---|
1033 | ph->c_multi=0;
|
---|
1034 | ph->c_init=oscam_ser_client_init;
|
---|
1035 | ph->c_recv_chk=oscam_ser_recv_chk;
|
---|
1036 | ph->c_send_ecm=oscam_ser_send_ecm;
|
---|
1037 | ph->num=R_SERIAL;
|
---|
1038 | }
|
---|