4 This file is part of PulseAudio.
6 PulseAudio is free software; you can redistribute it and/or modify
7 it under the terms of the GNU Lesser General Public License as published
8 by the Free Software Foundation; either version 2 of the License,
9 or (at your option) any later version.
11 PulseAudio is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with PulseAudio; if not, write to the Free Software
18 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
30 #include <sys/types.h>
37 #ifdef HAVE_SYS_WAIT_H
41 #ifdef HAVE_SYS_SOCKET_H
42 #include <sys/socket.h>
51 #include "../pulsecore/winsock.h"
53 #include <pulsecore/core-error.h>
54 #include <pulse/version.h>
55 #include <pulse/xmalloc.h>
57 #include <pulsecore/native-common.h>
58 #include <pulsecore/pdispatch.h>
59 #include <pulsecore/pstream.h>
60 #include <pulsecore/dynarray.h>
61 #include <pulsecore/socket-client.h>
62 #include <pulsecore/pstream-util.h>
63 #include <pulsecore/core-util.h>
64 #include <pulsecore/log.h>
65 #include <pulsecore/socket-util.h>
66 #include <pulsecore/creds.h>
70 #include "client-conf.h"
73 #include "client-conf-x11.h"
78 #define AUTOSPAWN_LOCK "autospawn.lock"
80 static const pa_pdispatch_cb_t command_table
[PA_COMMAND_MAX
] = {
81 [PA_COMMAND_REQUEST
] = pa_command_request
,
82 [PA_COMMAND_OVERFLOW
] = pa_command_overflow_or_underflow
,
83 [PA_COMMAND_UNDERFLOW
] = pa_command_overflow_or_underflow
,
84 [PA_COMMAND_PLAYBACK_STREAM_KILLED
] = pa_command_stream_killed
,
85 [PA_COMMAND_RECORD_STREAM_KILLED
] = pa_command_stream_killed
,
86 [PA_COMMAND_SUBSCRIBE_EVENT
] = pa_command_subscribe_event
89 static void unlock_autospawn_lock_file(pa_context
*c
) {
92 if (c
->autospawn_lock_fd
>= 0) {
94 pa_runtime_path(AUTOSPAWN_LOCK
, lf
, sizeof(lf
));
96 pa_unlock_lockfile(lf
, c
->autospawn_lock_fd
);
97 c
->autospawn_lock_fd
= -1;
101 static void context_free(pa_context
*c
);
103 pa_context
*pa_context_new(pa_mainloop_api
*mainloop
, const char *name
) {
109 c
= pa_xnew(pa_context
, 1);
111 c
->name
= pa_xstrdup(name
);
112 c
->mainloop
= mainloop
;
116 c
->playback_streams
= pa_dynarray_new();
117 c
->record_streams
= pa_dynarray_new();
119 PA_LLIST_HEAD_INIT(pa_stream
, c
->streams
);
120 PA_LLIST_HEAD_INIT(pa_operation
, c
->operations
);
123 c
->state
= PA_CONTEXT_UNCONNECTED
;
127 c
->state_callback
= NULL
;
128 c
->state_userdata
= NULL
;
130 c
->subscribe_callback
= NULL
;
131 c
->subscribe_userdata
= NULL
;
134 c
->server_list
= NULL
;
136 c
->autospawn_lock_fd
= -1;
137 memset(&c
->spawn_api
, 0, sizeof(c
->spawn_api
));
142 pa_check_signal_is_blocked(SIGPIPE
);
146 c
->conf
= pa_client_conf_new();
147 pa_client_conf_load(c
->conf
, NULL
);
149 pa_client_conf_from_x11(c
->conf
, NULL
);
151 pa_client_conf_env(c
->conf
);
153 if (!(c
->mempool
= pa_mempool_new(!c
->conf
->disable_shm
))) {
155 if (!c
->conf
->disable_shm
)
156 c
->mempool
= pa_mempool_new(0);
167 static void context_free(pa_context
*c
) {
170 unlock_autospawn_lock_file(c
);
172 while (c
->operations
)
173 pa_operation_cancel(c
->operations
);
176 pa_stream_set_state(c
->streams
, PA_STREAM_TERMINATED
);
179 pa_socket_client_unref(c
->client
);
181 pa_pdispatch_unref(c
->pdispatch
);
183 pa_pstream_close(c
->pstream
);
184 pa_pstream_unref(c
->pstream
);
187 if (c
->record_streams
)
188 pa_dynarray_free(c
->record_streams
, NULL
, NULL
);
189 if (c
->playback_streams
)
190 pa_dynarray_free(c
->playback_streams
, NULL
, NULL
);
193 pa_mempool_free(c
->mempool
);
196 pa_client_conf_free(c
->conf
);
198 pa_strlist_free(c
->server_list
);
205 pa_context
* pa_context_ref(pa_context
*c
) {
213 void pa_context_unref(pa_context
*c
) {
221 void pa_context_set_state(pa_context
*c
, pa_context_state_t st
) {
231 if (c
->state_callback
)
232 c
->state_callback(c
, c
->state_userdata
);
234 if (st
== PA_CONTEXT_FAILED
|| st
== PA_CONTEXT_TERMINATED
) {
237 s
= c
->streams
? pa_stream_ref(c
->streams
) : NULL
;
239 pa_stream
*n
= s
->next
? pa_stream_ref(s
->next
) : NULL
;
240 pa_stream_set_state(s
, st
== PA_CONTEXT_FAILED
? PA_STREAM_FAILED
: PA_STREAM_TERMINATED
);
246 pa_pdispatch_unref(c
->pdispatch
);
250 pa_pstream_close(c
->pstream
);
251 pa_pstream_unref(c
->pstream
);
256 pa_socket_client_unref(c
->client
);
263 void pa_context_fail(pa_context
*c
, int error
) {
267 pa_context_set_error(c
, error
);
268 pa_context_set_state(c
, PA_CONTEXT_FAILED
);
271 int pa_context_set_error(pa_context
*c
, int error
) {
273 assert(error
< PA_ERR_MAX
);
281 static void pstream_die_callback(pa_pstream
*p
, void *userdata
) {
282 pa_context
*c
= userdata
;
287 pa_context_fail(c
, PA_ERR_CONNECTIONTERMINATED
);
290 static void pstream_packet_callback(pa_pstream
*p
, pa_packet
*packet
, const pa_creds
*creds
, void *userdata
) {
291 pa_context
*c
= userdata
;
299 if (pa_pdispatch_run(c
->pdispatch
, packet
, creds
, c
) < 0)
300 pa_context_fail(c
, PA_ERR_PROTOCOL
);
305 static void pstream_memblock_callback(pa_pstream
*p
, uint32_t channel
, int64_t offset
, pa_seek_mode_t seek
, const pa_memchunk
*chunk
, void *userdata
) {
306 pa_context
*c
= userdata
;
311 assert(chunk
->memblock
);
312 assert(chunk
->length
);
318 if ((s
= pa_dynarray_get(c
->record_streams
, channel
))) {
320 assert(seek
== PA_SEEK_RELATIVE
&& offset
== 0);
322 pa_memblockq_seek(s
->record_memblockq
, offset
, seek
);
323 pa_memblockq_push_align(s
->record_memblockq
, chunk
);
325 if (s
->read_callback
) {
328 if ((l
= pa_memblockq_get_length(s
->record_memblockq
)) > 0)
329 s
->read_callback(s
, l
, s
->read_userdata
);
336 int pa_context_handle_error(pa_context
*c
, uint32_t command
, pa_tagstruct
*t
) {
340 if (command
== PA_COMMAND_ERROR
) {
343 if (pa_tagstruct_getu32(t
, &c
->error
) < 0) {
344 pa_context_fail(c
, PA_ERR_PROTOCOL
);
348 } else if (command
== PA_COMMAND_TIMEOUT
)
349 c
->error
= PA_ERR_TIMEOUT
;
351 pa_context_fail(c
, PA_ERR_PROTOCOL
);
358 static void setup_complete_callback(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
359 pa_context
*c
= userdata
;
363 assert(c
->state
== PA_CONTEXT_AUTHORIZING
|| c
->state
== PA_CONTEXT_SETTING_NAME
);
367 if (command
!= PA_COMMAND_REPLY
) {
369 if (pa_context_handle_error(c
, command
, t
) < 0)
370 pa_context_fail(c
, PA_ERR_PROTOCOL
);
372 pa_context_fail(c
, c
->error
);
377 case PA_CONTEXT_AUTHORIZING
: {
380 if (pa_tagstruct_getu32(t
, &c
->version
) < 0 ||
381 !pa_tagstruct_eof(t
)) {
382 pa_context_fail(c
, PA_ERR_PROTOCOL
);
386 /* Minimum supported version */
387 if (c
->version
< 8) {
388 pa_context_fail(c
, PA_ERR_VERSION
);
392 /* Enable shared memory support if possible */
393 if (c
->version
>= 10 &&
394 pa_mempool_is_shared(c
->mempool
) &&
397 /* Only enable SHM if both sides are owned by the same
398 * user. This is a security measure because otherwise
399 * data private to the user might leak. */
402 const pa_creds
*creds
;
403 if ((creds
= pa_pdispatch_creds(pd
)))
404 if (getuid() == creds
->uid
)
405 pa_pstream_use_shm(c
->pstream
, 1);
409 reply
= pa_tagstruct_command(c
, PA_COMMAND_SET_CLIENT_NAME
, &tag
);
410 pa_tagstruct_puts(reply
, c
->name
);
411 pa_pstream_send_tagstruct(c
->pstream
, reply
);
412 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, setup_complete_callback
, c
, NULL
);
414 pa_context_set_state(c
, PA_CONTEXT_SETTING_NAME
);
418 case PA_CONTEXT_SETTING_NAME
:
419 pa_context_set_state(c
, PA_CONTEXT_READY
);
430 static void setup_context(pa_context
*c
, pa_iochannel
*io
) {
440 c
->pstream
= pa_pstream_new(c
->mainloop
, io
, c
->mempool
);
442 pa_pstream_set_die_callback(c
->pstream
, pstream_die_callback
, c
);
443 pa_pstream_set_recieve_packet_callback(c
->pstream
, pstream_packet_callback
, c
);
444 pa_pstream_set_recieve_memblock_callback(c
->pstream
, pstream_memblock_callback
, c
);
446 assert(!c
->pdispatch
);
447 c
->pdispatch
= pa_pdispatch_new(c
->mainloop
, command_table
, PA_COMMAND_MAX
);
449 if (!c
->conf
->cookie_valid
)
450 pa_log_warn("No cookie loaded. Attempting to connect without.");
452 t
= pa_tagstruct_command(c
, PA_COMMAND_AUTH
, &tag
);
453 pa_tagstruct_putu32(t
, PA_PROTOCOL_VERSION
);
454 pa_tagstruct_put_arbitrary(t
, c
->conf
->cookie
, sizeof(c
->conf
->cookie
));
460 if (pa_iochannel_creds_supported(io
))
461 pa_iochannel_creds_enable(io
);
463 ucred
.uid
= getuid();
464 ucred
.gid
= getgid();
466 pa_pstream_send_tagstruct_with_creds(c
->pstream
, t
, &ucred
);
469 pa_pstream_send_tagstruct(c
->pstream
, t
);
472 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, setup_complete_callback
, c
, NULL
);
474 pa_context_set_state(c
, PA_CONTEXT_AUTHORIZING
);
479 static void on_connection(pa_socket_client
*client
, pa_iochannel
*io
, void *userdata
);
483 static int context_connect_spawn(pa_context
*c
) {
486 int fds
[2] = { -1, -1} ;
491 if (socketpair(AF_UNIX
, SOCK_STREAM
, 0, fds
) < 0) {
492 pa_log("socketpair(): %s", pa_cstrerror(errno
));
493 pa_context_fail(c
, PA_ERR_INTERNAL
);
497 pa_fd_set_cloexec(fds
[0], 1);
499 pa_socket_low_delay(fds
[0]);
500 pa_socket_low_delay(fds
[1]);
502 if (c
->spawn_api
.prefork
)
503 c
->spawn_api
.prefork();
505 if ((pid
= fork()) < 0) {
506 pa_log("fork(): %s", pa_cstrerror(errno
));
507 pa_context_fail(c
, PA_ERR_INTERNAL
);
509 if (c
->spawn_api
.postfork
)
510 c
->spawn_api
.postfork();
517 const char *state
= NULL
;
519 const char * argv
[MAX_ARGS
+1];
522 /* Not required, since fds[0] has CLOEXEC enabled anyway */
525 if (c
->spawn_api
.atfork
)
526 c
->spawn_api
.atfork();
532 argv
[n
++] = c
->conf
->daemon_binary
;
533 argv
[n
++] = "--daemonize=yes";
535 snprintf(t
, sizeof(t
), "-Lmodule-native-protocol-fd fd=%i", fds
[1]);
536 argv
[n
++] = strdup(t
);
538 while (n
< MAX_ARGS
) {
541 if (!(a
= pa_split_spaces(c
->conf
->extra_arguments
, &state
)))
549 execv(argv
[0], (char * const *) argv
);
556 r
= waitpid(pid
, &status
, 0);
558 if (c
->spawn_api
.postfork
)
559 c
->spawn_api
.postfork();
562 pa_log("waitpid(): %s", pa_cstrerror(errno
));
563 pa_context_fail(c
, PA_ERR_INTERNAL
);
565 } else if (!WIFEXITED(status
) || WEXITSTATUS(status
) != 0) {
566 pa_context_fail(c
, PA_ERR_CONNECTIONREFUSED
);
574 io
= pa_iochannel_new(c
->mainloop
, fds
[0], fds
[0]);
576 setup_context(c
, io
);
577 unlock_autospawn_lock_file(c
);
589 unlock_autospawn_lock_file(c
);
596 #endif /* OS_IS_WIN32 */
598 static int try_next_connection(pa_context
*c
) {
609 c
->server_list
= pa_strlist_pop(c
->server_list
, &u
);
614 if (c
->do_autospawn
) {
615 r
= context_connect_spawn(c
);
620 pa_context_fail(c
, PA_ERR_CONNECTIONREFUSED
);
624 pa_log_debug("Trying to connect to %s...", u
);
627 c
->server
= pa_xstrdup(u
);
629 if (!(c
->client
= pa_socket_client_new_string(c
->mainloop
, u
, PA_NATIVE_DEFAULT_PORT
)))
632 c
->is_local
= pa_socket_client_is_local(c
->client
);
633 pa_socket_client_set_callback(c
->client
, on_connection
, c
);
645 static void on_connection(pa_socket_client
*client
, pa_iochannel
*io
, void *userdata
) {
646 pa_context
*c
= userdata
;
650 assert(c
->state
== PA_CONTEXT_CONNECTING
);
654 pa_socket_client_unref(client
);
658 /* Try the item in the list */
659 if (errno
== ECONNREFUSED
|| errno
== ETIMEDOUT
|| errno
== EHOSTUNREACH
) {
660 try_next_connection(c
);
664 pa_context_fail(c
, PA_ERR_CONNECTIONREFUSED
);
668 unlock_autospawn_lock_file(c
);
669 setup_context(c
, io
);
675 int pa_context_connect(
678 pa_context_flags_t flags
,
679 const pa_spawn_api
*api
) {
686 PA_CHECK_VALIDITY(c
, c
->state
== PA_CONTEXT_UNCONNECTED
, PA_ERR_BADSTATE
);
687 PA_CHECK_VALIDITY(c
, !(flags
& ~PA_CONTEXT_NOAUTOSPAWN
), PA_ERR_INVALID
);
688 PA_CHECK_VALIDITY(c
, !server
|| *server
, PA_ERR_INVALID
);
691 server
= c
->conf
->default_server
;
695 assert(!c
->server_list
);
698 if (!(c
->server_list
= pa_strlist_parse(server
))) {
699 pa_context_fail(c
, PA_ERR_INVALIDSERVER
);
706 /* Prepend in reverse order */
708 if ((d
= getenv("DISPLAY"))) {
711 if ((e
= strchr(d
, ':')))
715 c
->server_list
= pa_strlist_prepend(c
->server_list
, d
);
720 c
->server_list
= pa_strlist_prepend(c
->server_list
, "tcp6:localhost");
721 c
->server_list
= pa_strlist_prepend(c
->server_list
, "tcp4:localhost");
723 /* The system wide instance */
724 c
->server_list
= pa_strlist_prepend(c
->server_list
, PA_SYSTEM_RUNTIME_PATH
"/" PA_NATIVE_DEFAULT_UNIX_SOCKET
);
726 /* The per-user instance */
727 c
->server_list
= pa_strlist_prepend(c
->server_list
, pa_runtime_path(PA_NATIVE_DEFAULT_UNIX_SOCKET
, ufn
, sizeof(ufn
)));
729 /* Wrap the connection attempts in a single transaction for sane autospawn locking */
730 if (!(flags
& PA_CONTEXT_NOAUTOSPAWN
) && c
->conf
->autospawn
) {
733 pa_runtime_path(AUTOSPAWN_LOCK
, lf
, sizeof(lf
));
734 pa_make_secure_parent_dir(lf
, 0700, (uid_t
)-1, (gid_t
)-1);
735 assert(c
->autospawn_lock_fd
<= 0);
736 c
->autospawn_lock_fd
= pa_lock_lockfile(lf
);
745 pa_context_set_state(c
, PA_CONTEXT_CONNECTING
);
746 r
= try_next_connection(c
);
754 void pa_context_disconnect(pa_context
*c
) {
758 pa_context_set_state(c
, PA_CONTEXT_TERMINATED
);
761 pa_context_state_t
pa_context_get_state(pa_context
*c
) {
768 int pa_context_errno(pa_context
*c
) {
775 void pa_context_set_state_callback(pa_context
*c
, pa_context_notify_cb_t cb
, void *userdata
) {
779 c
->state_callback
= cb
;
780 c
->state_userdata
= userdata
;
783 int pa_context_is_pending(pa_context
*c
) {
788 c
->state
== PA_CONTEXT_CONNECTING
||
789 c
->state
== PA_CONTEXT_AUTHORIZING
||
790 c
->state
== PA_CONTEXT_SETTING_NAME
||
791 c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
793 return (c
->pstream
&& pa_pstream_is_pending(c
->pstream
)) ||
794 (c
->pdispatch
&& pa_pdispatch_is_pending(c
->pdispatch
)) ||
798 static void set_dispatch_callbacks(pa_operation
*o
);
800 static void pdispatch_drain_callback(PA_GCC_UNUSED pa_pdispatch
*pd
, void *userdata
) {
801 set_dispatch_callbacks(userdata
);
804 static void pstream_drain_callback(PA_GCC_UNUSED pa_pstream
*s
, void *userdata
) {
805 set_dispatch_callbacks(userdata
);
808 static void set_dispatch_callbacks(pa_operation
*o
) {
814 assert(o
->context
->ref
>= 1);
815 assert(o
->context
->state
== PA_CONTEXT_READY
);
817 pa_pstream_set_drain_callback(o
->context
->pstream
, NULL
, NULL
);
818 pa_pdispatch_set_drain_callback(o
->context
->pdispatch
, NULL
, NULL
);
820 if (pa_pdispatch_is_pending(o
->context
->pdispatch
)) {
821 pa_pdispatch_set_drain_callback(o
->context
->pdispatch
, pdispatch_drain_callback
, o
);
825 if (pa_pstream_is_pending(o
->context
->pstream
)) {
826 pa_pstream_set_drain_callback(o
->context
->pstream
, pstream_drain_callback
, o
);
832 pa_context_notify_cb_t cb
= (pa_context_notify_cb_t
) o
->callback
;
833 cb(o
->context
, o
->userdata
);
836 pa_operation_done(o
);
837 pa_operation_unref(o
);
841 pa_operation
* pa_context_drain(pa_context
*c
, pa_context_notify_cb_t cb
, void *userdata
) {
847 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
848 PA_CHECK_VALIDITY_RETURN_NULL(c
, pa_context_is_pending(c
), PA_ERR_BADSTATE
);
850 o
= pa_operation_new(c
, NULL
, (pa_operation_cb_t
) cb
, userdata
);
851 set_dispatch_callbacks(pa_operation_ref(o
));
856 void pa_context_simple_ack_callback(pa_pdispatch
*pd
, uint32_t command
, PA_GCC_UNUSED
uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
857 pa_operation
*o
= userdata
;
867 if (command
!= PA_COMMAND_REPLY
) {
868 if (pa_context_handle_error(o
->context
, command
, t
) < 0)
872 } else if (!pa_tagstruct_eof(t
)) {
873 pa_context_fail(o
->context
, PA_ERR_PROTOCOL
);
878 pa_context_success_cb_t cb
= (pa_context_success_cb_t
) o
->callback
;
879 cb(o
->context
, success
, o
->userdata
);
883 pa_operation_done(o
);
884 pa_operation_unref(o
);
887 pa_operation
* pa_context_exit_daemon(pa_context
*c
, pa_context_success_cb_t cb
, void *userdata
) {
895 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
897 o
= pa_operation_new(c
, NULL
, (pa_operation_cb_t
) cb
, userdata
);
899 t
= pa_tagstruct_command(c
, PA_COMMAND_EXIT
, &tag
);
900 pa_pstream_send_tagstruct(c
->pstream
, t
);
901 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, pa_context_simple_ack_callback
, pa_operation_ref(o
), (pa_free_cb_t
) pa_operation_unref
);
906 pa_operation
* pa_context_send_simple_command(pa_context
*c
, uint32_t command
, pa_pdispatch_cb_t internal_cb
, pa_operation_cb_t cb
, void *userdata
) {
914 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
916 o
= pa_operation_new(c
, NULL
, cb
, userdata
);
918 t
= pa_tagstruct_command(c
, command
, &tag
);
919 pa_pstream_send_tagstruct(c
->pstream
, t
);
920 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, internal_cb
, pa_operation_ref(o
), (pa_free_cb_t
) pa_operation_unref
);
925 pa_operation
* pa_context_set_default_sink(pa_context
*c
, const char *name
, pa_context_success_cb_t cb
, void *userdata
) {
933 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
935 o
= pa_operation_new(c
, NULL
, (pa_operation_cb_t
) cb
, userdata
);
937 t
= pa_tagstruct_command(c
, PA_COMMAND_SET_DEFAULT_SINK
, &tag
);
938 pa_tagstruct_puts(t
, name
);
939 pa_pstream_send_tagstruct(c
->pstream
, t
);
940 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, pa_context_simple_ack_callback
, pa_operation_ref(o
), (pa_free_cb_t
) pa_operation_unref
);
945 pa_operation
* pa_context_set_default_source(pa_context
*c
, const char *name
, pa_context_success_cb_t cb
, void *userdata
) {
953 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
955 o
= pa_operation_new(c
, NULL
, (pa_operation_cb_t
) cb
, userdata
);
957 t
= pa_tagstruct_command(c
, PA_COMMAND_SET_DEFAULT_SOURCE
, &tag
);
958 pa_tagstruct_puts(t
, name
);
959 pa_pstream_send_tagstruct(c
->pstream
, t
);
960 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, pa_context_simple_ack_callback
, pa_operation_ref(o
), (pa_free_cb_t
) pa_operation_unref
);
965 int pa_context_is_local(pa_context
*c
) {
971 pa_operation
* pa_context_set_name(pa_context
*c
, const char *name
, pa_context_success_cb_t cb
, void *userdata
) {
980 PA_CHECK_VALIDITY_RETURN_NULL(c
, c
->state
== PA_CONTEXT_READY
, PA_ERR_BADSTATE
);
982 o
= pa_operation_new(c
, NULL
, (pa_operation_cb_t
) cb
, userdata
);
984 t
= pa_tagstruct_command(c
, PA_COMMAND_SET_CLIENT_NAME
, &tag
);
985 pa_tagstruct_puts(t
, name
);
986 pa_pstream_send_tagstruct(c
->pstream
, t
);
987 pa_pdispatch_register_reply(c
->pdispatch
, tag
, DEFAULT_TIMEOUT
, pa_context_simple_ack_callback
, pa_operation_ref(o
), (pa_free_cb_t
) pa_operation_unref
);
992 const char* pa_get_library_version(void) {
993 return PACKAGE_VERSION
;
996 const char* pa_context_get_server(pa_context
*c
) {
1003 if (*c
->server
== '{') {
1004 char *e
= strchr(c
->server
+1, '}');
1005 return e
? e
+1 : c
->server
;
1011 uint32_t pa_context_get_protocol_version(PA_GCC_UNUSED pa_context
*c
) {
1012 return PA_PROTOCOL_VERSION
;
1015 uint32_t pa_context_get_server_protocol_version(pa_context
*c
) {
1017 assert(c
->ref
>= 1);
1022 pa_tagstruct
*pa_tagstruct_command(pa_context
*c
, uint32_t command
, uint32_t *tag
) {
1028 t
= pa_tagstruct_new(NULL
, 0);
1029 pa_tagstruct_putu32(t
, command
);
1030 pa_tagstruct_putu32(t
, *tag
= c
->ctag
++);