-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmessage.go
213 lines (181 loc) · 5.01 KB
/
message.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
package onkyoctl
import (
"encoding/binary"
"errors"
)
const (
iscpStart = "!"
unitTypeReceiver = "1"
headerSize uint32 = 16
eISCPVersion byte = 0x01
terminator = "\r\n"
cr = byte('\r')
lf = byte('\n')
eof = 0x1A
)
// ISCPMessage is the base message for ISCP.
// The messages consists of:
// ! - start character
// 1 - receiver type
// ... - <command>
// \r\n - terminator
type ISCPMessage struct {
command ISCPCommand
}
// NewISCPMessage creates a new ISCP message with the given command.
func NewISCPMessage(command ISCPCommand) *ISCPMessage {
return &ISCPMessage{
command: command,
}
}
// Format returns the string representation for an ISCPMessage.
// Includes terminating newline (CRLF).
func (i *ISCPMessage) Format() string {
return iscpStart + unitTypeReceiver + string(i.command) + terminator
}
// Command returns the ISCP command for a message.
func (i *ISCPMessage) Command() ISCPCommand {
return i.command
}
func (i *ISCPMessage) String() string {
return "ISCP " + string(i.Command())
}
// ToEISCP converts this message to eISCP format.
func (i *ISCPMessage) ToEISCP() *EISCPMessage {
return &EISCPMessage{
message: i,
}
}
// EISCPMessage is the type for eISCP messages.
type EISCPMessage struct {
message *ISCPMessage
}
// NewEISCPMessage creates a new eISCP message for the given command.
func NewEISCPMessage(command ISCPCommand) *EISCPMessage {
return NewISCPMessage(command).ToEISCP()
}
// Command returns the ISCP command for this message.
func (e *EISCPMessage) Command() ISCPCommand {
return e.message.Command()
}
func (e *EISCPMessage) String() string {
return "eISCP " + string(e.Command())
}
// Raw returns the byte data (header and payload) for this message.
func (e *EISCPMessage) Raw() []byte {
payload := []byte(e.message.Format())
end := binary.BigEndian
headerLen := make([]byte, 4)
end.PutUint32(headerLen, headerSize)
msgLen := make([]byte, 4)
end.PutUint32(msgLen, uint32(len(payload)))
// Header
// 0-3 magic 'ISCP'
// 4-7 length of the header (always 16)
// 8-11 length of the payload (in bytes)
// 12 version
// 13-15 reserved (0x00 0x00 0x00)
header := make([]byte, headerSize)
header[0] = 0x49 // I
header[1] = 0x53 // S
header[2] = 0x43 // C
header[3] = 0x50 // P
header[4] = headerLen[0]
header[5] = headerLen[1]
header[6] = headerLen[2]
header[7] = headerLen[3]
header[8] = msgLen[0]
header[9] = msgLen[1]
header[10] = msgLen[2]
header[11] = msgLen[3]
header[12] = eISCPVersion
header[13] = 0x00
header[14] = 0x00
header[15] = 0x00
result := append(header, payload...)
return result
}
// ParseEISCP reads an eISCP message from a byte array.
func ParseEISCP(data []byte) (*EISCPMessage, error) {
headerSize, payloadSize, err := ParseHeader(data)
if err != nil {
return nil, err
}
totalSize := headerSize + payloadSize
if len(data) < totalSize {
return nil, errors.New("eISCP message too short")
}
payload := data[headerSize:totalSize]
iscp, err := ParseISCP(payload)
if err != nil {
return nil, err
}
return iscp.ToEISCP(), nil
}
// ParseHeader parses the header of an eISCP message
// and returns the header size and payload size
func ParseHeader(data []byte) (int, int, error) {
// we need at least 12 byte
// - 4 bytes "magic"
// - 4 bytes header length
// - 4 bytes payload length
if len(data) < 12 {
return 0, 0, errors.New("eISCP header too short")
}
// check the "magic"
iOk := data[0] == 0x49 // I
sOk := data[1] == 0x53 // S
cOk := data[2] == 0x43 // C
pOk := data[3] == 0x50 // P
magicOk := iOk && sOk && cOk && pOk
if !magicOk {
return 0, 0, errors.New("missing start sequence in message header")
}
end := binary.BigEndian
headerSize := end.Uint32(data[4:8])
payloadSize := end.Uint32(data[8:12])
if len(data) < int(headerSize) {
return 0, 0, errors.New("eISCP header shorter than indicated")
}
// note we might parse the last 4 bytes to get the version
return int(headerSize), int(payloadSize), nil
}
// ParseISCP parses an ISCP message from a byte array.
func ParseISCP(data []byte) (*ISCPMessage, error) {
// decode to string first
s := string(data)
size := len(s)
// expect: !1<COMMAND>\r\n
// where Command is at least three digits
// we can do without CR/LF at the end
if size < 5 {
return nil, errors.New("ISCP message too short")
}
if s[0] != byte('!') {
return nil, errors.New("missing start character '!'")
}
if s[1] != byte('1') {
return nil, errors.New("missing receiver type '1'")
}
// terminators can be:
// - LF 1 byte
// - CR 1 byte
// - CRLF 2 bytes
// - <none>
offset := size - 1
if s[offset] == cr { // CR
offset--
} else if s[offset] == lf { // LF or CRLF
offset--
if s[offset] == cr { // CRLF
offset--
}
}
// for messages from device to controller, EOF should be mandatory.
// however, we don't mind if it is missing.
if s[offset] == eof {
offset--
}
command := string(s[2 : offset+1])
return NewISCPMessage(ISCPCommand(command)), nil
}