Crates.io | firewire-oxfw-protocols |
lib.rs | firewire-oxfw-protocols |
version | 0.2.0 |
source | src |
created_at | 2022-08-05 07:12:19.724697 |
updated_at | 2023-04-18 11:56:20.350329 |
description | Implementation of protocol for Oxford Semiconductor FW970/971 ASICs and vendor-specific models |
homepage | https://alsa-project.github.io/gobject-introspection-docs/ |
repository | https://github.com/alsa-project/snd-firewire-ctl-services |
max_upload_size | |
id | 639185 |
size | 103,423 |
The library crate includes implementation of protocol for OXFW970 and OXFW971 ASICS and application devices connected to IEEE 1394 bus.
Oxford Semiconductor was established in 1992, and was acquired by PLX Technology in 2009. It shipped two ASICs; OXFW970 (launched in 2004) and OXFW971 (launched in 2006), as low-cost solution for multi channel isochronous streaming FireWire audio controller. They were applied to some products from several vendors for audio and music unit in IEEE 1394 bus.
Linux sound subsystem, a.k.a ALSA, provides loadable kernel module (snd-oxfw
) as driver for
the units. The driver maintains isochronous packet streams for audio frames and MIDI messages
since the other ASIC functions such as digital signal processing can be operated by user space
application directly.
The crate is supplemental implementation for runtime program to satisfy the purpose.
This is the list of dependent crates.
The glib and hinawa crates require some underlying system libraries
The functions of Linux FireWire subsystem is called via hinawa crate and library to communicate with node in IEEE 1394 bus, thus the crate is not portable.
This is the list of models currently supported.
The other models seem not to accept any operations to internal DSP functions from the outside.
The crate is developed and maintained by ALSA GObject Introspection team for snd-firewire-ctl-services project, and not stable yet. The included Rust elements are likely changed without backward compatibility.
The crate is released under GNU Lesser General Public License v3.0 or later with respect to clause for reverse engineering.
If finding issue, please file it in https://github.com/alsa-project/snd-firewire-ctl-services/.
The implementation of protocol is developed by the way of reverse engineering; sniffing IEEE 1394 bus to which target device is connected, and analysis of the communication between the device and driver provided by hardware vendor. Fortunately, developer got source code for command and response mechanism endowed by Echo Digital Audio corporation, and permission to re-implement them to open source software. Nevertheless it's natural not to work with your device since developer worked with blackbox.
Some programs are available under 'src/bin' directory.
This program retrieves information from node of target device by protocol defined by Oxford Semiconductor, then print the information.
Without any command line argument, it prints help message and exit.
Usage:
oxfw-info CDEV
where:
CDEV: The path to special file of firewire character device, typically '/dev/fw1'.
Please run with an argument for firewire character device:
$ cargo run --bin oxfw-info /dev/fw1
...