mirror of
https://gitlab.freedesktop.org/pulseaudio/pulseaudio.git
synced 2025-11-06 13:29:56 -05:00
FSF addresses used in PA sources are no longer valid and rpmlint generates numerous warnings during packaging because of this. This patch changes all FSF addresses to FSF web page according to the GPL how-to: https://www.gnu.org/licenses/gpl-howto.en.html Done automatically by sed-ing through sources.
434 lines
13 KiB
C
434 lines
13 KiB
C
/***
|
|
This file is part of PulseAudio.
|
|
|
|
Copyright 2008 Lennart Poettering
|
|
Copyright 2009 Colin Guthrie
|
|
|
|
PulseAudio is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU Lesser General Public License as published
|
|
by the Free Software Foundation; either version 2.1 of the License,
|
|
or (at your option) any later version.
|
|
|
|
PulseAudio is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with PulseAudio; if not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <pulse/context.h>
|
|
#include <pulse/xmalloc.h>
|
|
#include <pulse/fork-detect.h>
|
|
#include <pulse/operation.h>
|
|
|
|
#include <pulsecore/macro.h>
|
|
#include <pulsecore/pstream-util.h>
|
|
|
|
#include "internal.h"
|
|
#include "ext-device-manager.h"
|
|
|
|
enum {
|
|
SUBCOMMAND_TEST,
|
|
SUBCOMMAND_READ,
|
|
SUBCOMMAND_RENAME,
|
|
SUBCOMMAND_DELETE,
|
|
SUBCOMMAND_ROLE_DEVICE_PRIORITY_ROUTING,
|
|
SUBCOMMAND_REORDER,
|
|
SUBCOMMAND_SUBSCRIBE,
|
|
SUBCOMMAND_EVENT
|
|
};
|
|
|
|
static void ext_device_manager_test_cb(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
pa_operation *o = userdata;
|
|
uint32_t version = PA_INVALID_INDEX;
|
|
|
|
pa_assert(pd);
|
|
pa_assert(o);
|
|
pa_assert(PA_REFCNT_VALUE(o) >= 1);
|
|
|
|
if (!o->context)
|
|
goto finish;
|
|
|
|
if (command != PA_COMMAND_REPLY) {
|
|
if (pa_context_handle_error(o->context, command, t, false) < 0)
|
|
goto finish;
|
|
|
|
} else if (pa_tagstruct_getu32(t, &version) < 0 ||
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
pa_context_fail(o->context, PA_ERR_PROTOCOL);
|
|
goto finish;
|
|
}
|
|
|
|
if (o->callback) {
|
|
pa_ext_device_manager_test_cb_t cb = (pa_ext_device_manager_test_cb_t) o->callback;
|
|
cb(o->context, version, o->userdata);
|
|
}
|
|
|
|
finish:
|
|
pa_operation_done(o);
|
|
pa_operation_unref(o);
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_test(
|
|
pa_context *c,
|
|
pa_ext_device_manager_test_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o;
|
|
pa_tagstruct *t;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_TEST);
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, ext_device_manager_test_cb, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
static void ext_device_manager_read_cb(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
pa_operation *o = userdata;
|
|
int eol = 1;
|
|
|
|
pa_assert(pd);
|
|
pa_assert(o);
|
|
pa_assert(PA_REFCNT_VALUE(o) >= 1);
|
|
|
|
if (!o->context)
|
|
goto finish;
|
|
|
|
if (command != PA_COMMAND_REPLY) {
|
|
if (pa_context_handle_error(o->context, command, t, false) < 0)
|
|
goto finish;
|
|
|
|
eol = -1;
|
|
} else {
|
|
|
|
while (!pa_tagstruct_eof(t)) {
|
|
pa_ext_device_manager_info i;
|
|
|
|
memset(&i, 0, sizeof(i));
|
|
|
|
if (pa_tagstruct_gets(t, &i.name) < 0 ||
|
|
pa_tagstruct_gets(t, &i.description) < 0 ||
|
|
pa_tagstruct_gets(t, &i.icon) < 0 ||
|
|
pa_tagstruct_getu32(t, &i.index) < 0 ||
|
|
pa_tagstruct_getu32(t, &i.n_role_priorities) < 0) {
|
|
|
|
pa_context_fail(o->context, PA_ERR_PROTOCOL);
|
|
goto finish;
|
|
}
|
|
|
|
if (i.n_role_priorities > 0) {
|
|
uint32_t j;
|
|
i.role_priorities = pa_xnew0(pa_ext_device_manager_role_priority_info, i.n_role_priorities+1);
|
|
|
|
for (j = 0; j < i.n_role_priorities; j++) {
|
|
|
|
if (pa_tagstruct_gets(t, &i.role_priorities[j].role) < 0 ||
|
|
pa_tagstruct_getu32(t, &i.role_priorities[j].priority) < 0) {
|
|
|
|
pa_context_fail(o->context, PA_ERR_PROTOCOL);
|
|
pa_xfree(i.role_priorities);
|
|
goto finish;
|
|
}
|
|
}
|
|
|
|
/* Terminate with an extra NULL entry, just to make sure */
|
|
i.role_priorities[j].role = NULL;
|
|
i.role_priorities[j].priority = 0;
|
|
}
|
|
|
|
if (o->callback) {
|
|
pa_ext_device_manager_read_cb_t cb = (pa_ext_device_manager_read_cb_t) o->callback;
|
|
cb(o->context, &i, 0, o->userdata);
|
|
}
|
|
|
|
pa_xfree(i.role_priorities);
|
|
}
|
|
}
|
|
|
|
if (o->callback) {
|
|
pa_ext_device_manager_read_cb_t cb = (pa_ext_device_manager_read_cb_t) o->callback;
|
|
cb(o->context, NULL, eol, o->userdata);
|
|
}
|
|
|
|
finish:
|
|
pa_operation_done(o);
|
|
pa_operation_unref(o);
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_read(
|
|
pa_context *c,
|
|
pa_ext_device_manager_read_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o;
|
|
pa_tagstruct *t;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_READ);
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, ext_device_manager_read_cb, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_set_device_description(
|
|
pa_context *c,
|
|
const char* device,
|
|
const char* description,
|
|
pa_context_success_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o = NULL;
|
|
pa_tagstruct *t = NULL;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
pa_assert(device);
|
|
pa_assert(description);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, *description, PA_ERR_INVALID);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_RENAME);
|
|
|
|
pa_tagstruct_puts(t, device);
|
|
pa_tagstruct_puts(t, description);
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, pa_context_simple_ack_callback, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_delete(
|
|
pa_context *c,
|
|
const char *const s[],
|
|
pa_context_success_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o = NULL;
|
|
pa_tagstruct *t = NULL;
|
|
const char *const *k;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
pa_assert(s);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_DELETE);
|
|
|
|
for (k = s; *k; k++) {
|
|
if (!*k || !**k)
|
|
goto fail;
|
|
|
|
pa_tagstruct_puts(t, *k);
|
|
}
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, pa_context_simple_ack_callback, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
|
|
fail:
|
|
if (o) {
|
|
pa_operation_cancel(o);
|
|
pa_operation_unref(o);
|
|
}
|
|
|
|
if (t)
|
|
pa_tagstruct_free(t);
|
|
|
|
pa_context_set_error(c, PA_ERR_INVALID);
|
|
return NULL;
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_enable_role_device_priority_routing(
|
|
pa_context *c,
|
|
int enable,
|
|
pa_context_success_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o = NULL;
|
|
pa_tagstruct *t = NULL;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_ROLE_DEVICE_PRIORITY_ROUTING);
|
|
pa_tagstruct_put_boolean(t, !!enable);
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, pa_context_simple_ack_callback, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_reorder_devices_for_role(
|
|
pa_context *c,
|
|
const char* role,
|
|
const char** devices,
|
|
pa_context_success_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag, i;
|
|
pa_operation *o = NULL;
|
|
pa_tagstruct *t = NULL;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
pa_assert(role);
|
|
pa_assert(devices);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_REORDER);
|
|
pa_tagstruct_puts(t, role);
|
|
|
|
i = 0; while (devices[i]) i++;
|
|
pa_tagstruct_putu32(t, i);
|
|
|
|
i = 0;
|
|
while (devices[i])
|
|
pa_tagstruct_puts(t, devices[i++]);
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, pa_context_simple_ack_callback, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
pa_operation *pa_ext_device_manager_subscribe(
|
|
pa_context *c,
|
|
int enable,
|
|
pa_context_success_cb_t cb,
|
|
void *userdata) {
|
|
|
|
uint32_t tag;
|
|
pa_operation *o;
|
|
pa_tagstruct *t;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !pa_detect_fork(), PA_ERR_FORKED);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->version >= 14, PA_ERR_NOTSUPPORTED);
|
|
|
|
o = pa_operation_new(c, NULL, (pa_operation_cb_t) cb, userdata);
|
|
|
|
t = pa_tagstruct_command(c, PA_COMMAND_EXTENSION, &tag);
|
|
pa_tagstruct_putu32(t, PA_INVALID_INDEX);
|
|
pa_tagstruct_puts(t, "module-device-manager");
|
|
pa_tagstruct_putu32(t, SUBCOMMAND_SUBSCRIBE);
|
|
pa_tagstruct_put_boolean(t, enable);
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
pa_pdispatch_register_reply(c->pdispatch, tag, DEFAULT_TIMEOUT, pa_context_simple_ack_callback, pa_operation_ref(o), (pa_free_cb_t) pa_operation_unref);
|
|
|
|
return o;
|
|
}
|
|
|
|
void pa_ext_device_manager_set_subscribe_cb(
|
|
pa_context *c,
|
|
pa_ext_device_manager_subscribe_cb_t cb,
|
|
void *userdata) {
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
|
|
if (pa_detect_fork())
|
|
return;
|
|
|
|
c->ext_device_manager.callback = cb;
|
|
c->ext_device_manager.userdata = userdata;
|
|
}
|
|
|
|
void pa_ext_device_manager_command(pa_context *c, uint32_t tag, pa_tagstruct *t) {
|
|
uint32_t subcommand;
|
|
|
|
pa_assert(c);
|
|
pa_assert(PA_REFCNT_VALUE(c) >= 1);
|
|
pa_assert(t);
|
|
|
|
if (pa_tagstruct_getu32(t, &subcommand) < 0 ||
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
pa_context_fail(c, PA_ERR_PROTOCOL);
|
|
return;
|
|
}
|
|
|
|
if (subcommand != SUBCOMMAND_EVENT) {
|
|
pa_context_fail(c, PA_ERR_PROTOCOL);
|
|
return;
|
|
}
|
|
|
|
if (c->ext_device_manager.callback)
|
|
c->ext_device_manager.callback(c, c->ext_device_manager.userdata);
|
|
}
|