/[svn]/liblscp/trunk/src/client.c
ViewVC logotype

Diff of /liblscp/trunk/src/client.c

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 107 by capela, Fri Jun 4 21:06:59 2004 UTC revision 171 by capela, Mon Jul 5 16:26:44 2004 UTC
# Line 28  Line 28 
28    
29  // Local prototypes.  // Local prototypes.
30    
31  static void _lscp_client_set_result (lscp_client_t *pClient, char *pszResult, int iErrno);  static void             _lscp_client_evt_proc       (void *pvClient);
 static void _lscp_client_udp_proc   (void *pvClient);  
32    
33    static lscp_status_t    _lscp_client_evt_connect    (lscp_client_t *pClient);
34  //-------------------------------------------------------------------------  static lscp_status_t    _lscp_client_evt_request    (lscp_client_t *pClient, int iSubscribe, lscp_event_t event);
 // Helper functions.  
   
 // Result buffer internal settler.  
 static void _lscp_client_set_result ( lscp_client_t *pClient, char *pszResult, int iErrno )  
 {  
     if (pClient->pszResult)  
         free(pClient->pszResult);  
     pClient->pszResult = NULL;  
   
     pClient->iErrno = iErrno;  
   
     if (pszResult)  
         pClient->pszResult = strdup(lscp_ltrim(pszResult));  
 }  
35    
36    
37  //-------------------------------------------------------------------------  //-------------------------------------------------------------------------
38  // UDP service (datagram oriented).  // Event service (datagram oriented).
39    
40  static void _lscp_client_udp_proc ( void *pvClient )  static void _lscp_client_evt_proc ( void *pvClient )
41  {  {
42      lscp_client_t *pClient = (lscp_client_t *) pvClient;      lscp_client_t *pClient = (lscp_client_t *) pvClient;
     struct sockaddr_in addr;  
     int   cAddr;  
43      char  achBuffer[LSCP_BUFSIZ];      char  achBuffer[LSCP_BUFSIZ];
44      int   cchBuffer;      int   cchBuffer;
45      const char *pszSeps = " \r\n";      const char *pszSeps = ":\r\n";
46      char *pszToken;      char *pszToken;
47      char *pch;      char *pch;
48        int   cchToken;
49        lscp_event_t event;
50    
51  #ifdef DEBUG  #ifdef DEBUG
52      fprintf(stderr, "_lscp_client_udp_proc: Client waiting for events.\n");      fprintf(stderr, "_lscp_client_evt_proc: Client waiting for events.\n");
53  #endif  #endif
54    
55      while (pClient->udp.iState) {      while (pClient->evt.iState) {
56          cAddr = sizeof(struct sockaddr_in);          // Wait for event...
57          cchBuffer = recvfrom(pClient->udp.sock, achBuffer, sizeof(achBuffer), 0, (struct sockaddr *) &addr, &cAddr);          cchBuffer = recv(pClient->evt.sock, achBuffer, sizeof(achBuffer), 0);
58          if (cchBuffer > 0) {          if (cchBuffer > 0) {
59  #ifdef DEBUG              // Make sure received buffer it's null terminated.
60              lscp_socket_trace("_lscp_client_udp_proc: recvfrom", &addr, achBuffer, cchBuffer);              achBuffer[cchBuffer] = (char) 0;
61  #endif              // Parse for the notification event message...
62              if (strncasecmp(achBuffer, "PING ", 5) == 0) {              pszToken = lscp_strtok(achBuffer, pszSeps, &(pch)); // Have "NOTIFY".
63                  // Make sure received buffer it's null terminated.              if (strcasecmp(pszToken, "NOTIFY") == 0) {
64                  achBuffer[cchBuffer] = (char) 0;                  pszToken = lscp_strtok(NULL, pszSeps, &(pch));
65                  lscp_strtok(achBuffer, pszSeps, &(pch));       // Skip "PING"                  event    = lscp_event_from_text(pszToken);
66                  lscp_strtok(NULL, pszSeps, &(pch));            // Skip port (must be the same as in addr)                  // And pick the rest of data...
67                  pszToken = lscp_strtok(NULL, pszSeps, &(pch)); // Have session-id.                  pszToken = lscp_strtok(NULL, pszSeps, &(pch));
68                  if (pszToken) {                  cchToken = (pszToken == NULL ? 0 : strlen(pszToken));
69                      // Set now client's session-id, if not already                  // Double-check if we're really up to it...
70                      if (pClient->sessid == NULL)                  if (pClient->events & event) {
71                          pClient->sessid = strdup(pszToken);                      // Invoke the client event callback...
72                      if (pClient->sessid && strcmp(pszToken, pClient->sessid) == 0) {                      if ((*pClient->pfnCallback)(
73                          sprintf(achBuffer, "PONG %s\r\n", pClient->sessid);                              pClient,
74                          cchBuffer = strlen(achBuffer);                              event,
75                          if (sendto(pClient->udp.sock, achBuffer, cchBuffer, 0, (struct sockaddr *) &addr, cAddr) < cchBuffer)                              pszToken,
76                              lscp_socket_perror("_lscp_client_udp_proc: sendto");                              cchToken,
77  #ifdef DEBUG                              pClient->pvData) != LSCP_OK) {
78                          fprintf(stderr, "> %s", achBuffer);                          pClient->evt.iState = 0;
 #endif  
79                      }                      }
80                  }                  }
                 // Done with life proof.  
             } else {  
                 //  
                 if ((*pClient->pfnCallback)(  
                         pClient,  
                         achBuffer,  
                         cchBuffer,  
                         pClient->pvData) != LSCP_OK) {  
                     pClient->udp.iState = 0;  
                 }  
81              }              }
82          } else {          } else {
83              lscp_socket_perror("_lscp_client_udp_proc: recvfrom");              lscp_socket_perror("_lscp_client_evt_proc: recv");
84              pClient->udp.iState = 0;              pClient->evt.iState = 0;
85          }          }
86      }      }
87    
88  #ifdef DEBUG  #ifdef DEBUG
89      fprintf(stderr, "_lscp_client_udp_proc: Client closing.\n");      fprintf(stderr, "_lscp_client_evt_proc: Client closing.\n");
90  #endif  #endif
91  }  }
92    
93    
94  //-------------------------------------------------------------------------  //-------------------------------------------------------------------------
95    // Event subscription helpers.
96    
97    // Open the event service socket connection.
98    static lscp_status_t _lscp_client_evt_connect ( lscp_client_t *pClient )
99    {
100        lscp_socket_t sock;
101        struct sockaddr_in addr;
102        int cAddr;
103    #if defined(WIN32)
104        int iSockOpt = (-1);
105    #endif
106    
107        // Prepare the event connection socket...
108        sock = socket(AF_INET, SOCK_STREAM, 0);
109        if (sock == INVALID_SOCKET) {
110            lscp_socket_perror("_lscp_client_evt_connect: socket");
111            return LSCP_FAILED;
112        }
113    
114    #if defined(WIN32)
115        if (setsockopt(sock, SOL_SOCKET, SO_DONTLINGER, (char *) &iSockOpt, sizeof(int)) == SOCKET_ERROR)
116            lscp_socket_perror("lscp_client_evt_connect: setsockopt(SO_DONTLINGER)");
117    #endif
118    
119    #ifdef DEBUG
120        lscp_socket_getopts("_lscp_client_evt_connect:", sock);
121    #endif
122    
123        // Use same address of the command connection.
124        cAddr = sizeof(struct sockaddr_in);
125        memmove((char *) &addr, &(pClient->cmd.addr), cAddr);
126    
127        // Start the connection...
128        if (connect(sock, (struct sockaddr *) &addr, cAddr) == SOCKET_ERROR) {
129            lscp_socket_perror("_lscp_client_evt_connect: connect");
130            closesocket(sock);
131            return LSCP_FAILED;
132        }
133        
134        // Set our socket agent struct...
135        lscp_socket_agent_init(&(pClient->evt), sock, &addr, cAddr);
136        
137        // And finally the service thread...
138        return lscp_socket_agent_start(&(pClient->evt), _lscp_client_evt_proc, pClient, 0);
139    }
140    
141    
142    // Subscribe to a single event.
143    static lscp_status_t _lscp_client_evt_request ( lscp_client_t *pClient, int iSubscribe, lscp_event_t event )
144    {
145        const char *pszEvent;
146        char  szQuery[LSCP_BUFSIZ];
147        int   cchQuery;
148    
149        if (pClient == NULL)
150            return LSCP_FAILED;
151    
152        // Which (single) event?
153        pszEvent = lscp_event_to_text(event);
154        if (pszEvent == NULL)
155            return LSCP_FAILED;
156    
157        // Build the query string...
158        cchQuery = sprintf(szQuery, "%sSUBSCRIBE %s\n\n", (iSubscribe == 0 ? "UN" : ""), pszEvent);
159        // Just send data, forget result...
160        if (send(pClient->evt.sock, szQuery, cchQuery, 0) < cchQuery) {
161            lscp_socket_perror("_lscp_client_evt_request: send");
162            return LSCP_FAILED;
163        }
164    
165        // Update as naively as we can...
166        if (iSubscribe)
167            pClient->events |=  event;
168        else
169            pClient->events &= ~event;
170    
171        return LSCP_OK;
172    }
173    
174    
175    //-------------------------------------------------------------------------
176  // Client versioning teller fuunction.  // Client versioning teller fuunction.
177    
178    
# Line 155  lscp_client_t* lscp_client_create ( cons Line 210  lscp_client_t* lscp_client_create ( cons
210      lscp_socket_t sock;      lscp_socket_t sock;
211      struct sockaddr_in addr;      struct sockaddr_in addr;
212      int cAddr;      int cAddr;
213    #if defined(WIN32)
214      int iSockOpt = (-1);      int iSockOpt = (-1);
215    #endif
216    
217      if (pfnCallback == NULL) {      if (pfnCallback == NULL) {
218          fprintf(stderr, "lscp_client_create: Invalid client callback function.\n");          fprintf(stderr, "lscp_client_create: Invalid client callback function.\n");
# Line 164  lscp_client_t* lscp_client_create ( cons Line 221  lscp_client_t* lscp_client_create ( cons
221    
222      pHost = gethostbyname(pszHost);      pHost = gethostbyname(pszHost);
223      if (pHost == NULL) {      if (pHost == NULL) {
224          lscp_socket_perror("lscp_client_create: gethostbyname");          lscp_socket_herror("lscp_client_create: gethostbyname");
225          return NULL;          return NULL;
226      }      }
227    
# Line 184  lscp_client_t* lscp_client_create ( cons Line 241  lscp_client_t* lscp_client_create ( cons
241      fprintf(stderr, "lscp_client_create: pClient=%p: pszHost=%s iPort=%d.\n", pClient, pszHost, iPort);      fprintf(stderr, "lscp_client_create: pClient=%p: pszHost=%s iPort=%d.\n", pClient, pszHost, iPort);
242  #endif  #endif
243    
244      // Prepare the TCP connection socket...      // Prepare the command connection socket...
245    
246      sock = socket(AF_INET, SOCK_STREAM, 0);      sock = socket(AF_INET, SOCK_STREAM, 0);
247      if (sock == INVALID_SOCKET) {      if (sock == INVALID_SOCKET) {
248          lscp_socket_perror("lscp_client_create: tcp: socket");          lscp_socket_perror("lscp_client_create: cmd: socket");
249          free(pClient);          free(pClient);
250          return NULL;          return NULL;
251      }      }
252    
253  #if defined(WIN32)  #if defined(WIN32)
254      if (setsockopt(sock, SOL_SOCKET, SO_DONTLINGER, (char *) &iSockOpt, sizeof(int)) == SOCKET_ERROR)      if (setsockopt(sock, SOL_SOCKET, SO_DONTLINGER, (char *) &iSockOpt, sizeof(int)) == SOCKET_ERROR)
255          lscp_socket_perror("lscp_client_create: tcp: setsockopt(SO_DONTLINGER)");          lscp_socket_perror("lscp_client_create: cmd: setsockopt(SO_DONTLINGER)");
256  #endif  #endif
257    
258  #ifdef DEBUG  #ifdef DEBUG
259      lscp_socket_getopts("lscp_client_create: tcp", sock);      lscp_socket_getopts("lscp_client_create: cmd", sock);
260  #endif  #endif
261    
262      cAddr = sizeof(struct sockaddr_in);      cAddr = sizeof(struct sockaddr_in);
# Line 209  lscp_client_t* lscp_client_create ( cons Line 266  lscp_client_t* lscp_client_create ( cons
266      addr.sin_port = htons((short) iPort);      addr.sin_port = htons((short) iPort);
267    
268      if (connect(sock, (struct sockaddr *) &addr, cAddr) == SOCKET_ERROR) {      if (connect(sock, (struct sockaddr *) &addr, cAddr) == SOCKET_ERROR) {
269          lscp_socket_perror("lscp_client_create: tcp: connect");          lscp_socket_perror("lscp_client_create: cmd: connect");
270          closesocket(sock);          closesocket(sock);
271          free(pClient);          free(pClient);
272          return NULL;          return NULL;
273      }      }
274    
275      lscp_socket_agent_init(&(pClient->tcp), sock, &addr, cAddr);      // Initialize the command socket agent struct...
276        lscp_socket_agent_init(&(pClient->cmd), sock, &addr, cAddr);
277    
278  #ifdef DEBUG  #ifdef DEBUG
279      fprintf(stderr, "lscp_client_create: tcp: pClient=%p: sock=%d addr=%s port=%d.\n", pClient, pClient->tcp.sock, inet_ntoa(pClient->tcp.addr.sin_addr), ntohs(pClient->tcp.addr.sin_port));      fprintf(stderr, "lscp_client_create: cmd: pClient=%p: sock=%d addr=%s port=%d.\n", pClient, pClient->cmd.sock, inet_ntoa(pClient->cmd.addr.sin_addr), ntohs(pClient->cmd.addr.sin_port));
280  #endif  #endif
281    
282      // Prepare the UDP datagram service socket...      // Initialize the event service socket struct...
283        lscp_socket_agent_init(&(pClient->evt), INVALID_SOCKET, NULL, 0);
284      sock = socket(AF_INET, SOCK_DGRAM, 0);      // No events subscribed, yet.
285      if (sock == INVALID_SOCKET) {      pClient->events = LSCP_EVENT_NONE;
         lscp_socket_perror("lscp_client_create: udp: socket");  
         lscp_socket_agent_free(&(pClient->tcp));  
         free(pClient);  
         return NULL;  
     }  
   
     if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char *) &iSockOpt, sizeof(int)) == SOCKET_ERROR)  
         lscp_socket_perror("lscp_client_create: udp: setsockopt(SO_REUSEADDR)");  
   
 #ifdef DEBUG  
     lscp_socket_getopts("lscp_client_create: udp", sock);  
 #endif  
   
     cAddr = sizeof(struct sockaddr_in);  
     memset((char *) &addr, 0, cAddr);  
     addr.sin_family = AF_INET;  
     addr.sin_addr.s_addr = htonl(INADDR_ANY);  
     addr.sin_port = htons(0);  
   
     if (bind(sock, (const struct sockaddr *) &addr, cAddr) == SOCKET_ERROR) {  
         lscp_socket_perror("lscp_client_create: udp: bind");  
         lscp_socket_agent_free(&(pClient->tcp));  
         closesocket(sock);  
         free(pClient);  
         return NULL;  
     }  
   
     if (getsockname(sock, (struct sockaddr *) &addr, &cAddr) == SOCKET_ERROR) {  
         lscp_socket_perror("lscp_client_create: udp: getsockname");  
         lscp_socket_agent_free(&(pClient->tcp));  
         closesocket(sock);  
         free(pClient);  
         return NULL;  
     }  
   
     lscp_socket_agent_init(&(pClient->udp), sock, &addr, cAddr);  
   
 #ifdef DEBUG  
     fprintf(stderr, "lscp_client_create: udp: pClient=%p: sock=%d addr=%s port=%d.\n", pClient, pClient->udp.sock, inet_ntoa(pClient->udp.addr.sin_addr), ntohs(pClient->udp.addr.sin_port));  
 #endif  
   
     // No session id, yet.  
     pClient->sessid = NULL;  
286      // Initialize cached members.      // Initialize cached members.
287      pClient->audio_drivers = NULL;      pClient->audio_drivers = NULL;
288      pClient->midi_drivers = NULL;      pClient->midi_drivers = NULL;
289        pClient->audio_devices = NULL;
290        pClient->midi_devices = NULL;
291      pClient->engines = NULL;      pClient->engines = NULL;
292      lscp_driver_info_init(&(pClient->audio_info));      pClient->channels = NULL;
293      lscp_driver_info_init(&(pClient->midi_info));      lscp_driver_info_init(&(pClient->audio_driver_info));
294        lscp_driver_info_init(&(pClient->midi_driver_info));
295        lscp_device_info_init(&(pClient->audio_device_info));
296        lscp_device_info_init(&(pClient->midi_device_info));
297        lscp_param_info_init(&(pClient->audio_param_info));
298        lscp_param_info_init(&(pClient->midi_param_info));
299        lscp_device_port_info_init(&(pClient->audio_channel_info));
300        lscp_device_port_info_init(&(pClient->midi_port_info));
301        lscp_param_info_init(&(pClient->audio_channel_param_info));
302        lscp_param_info_init(&(pClient->midi_port_param_info));
303      lscp_engine_info_init(&(pClient->engine_info));      lscp_engine_info_init(&(pClient->engine_info));
304      lscp_channel_info_init(&(pClient->channel_info));      lscp_channel_info_init(&(pClient->channel_info));
305      // Initialize error stuff.      // Initialize error stuff.
# Line 288  lscp_client_t* lscp_client_create ( cons Line 314  lscp_client_t* lscp_client_create ( cons
314      // Initialize the transaction mutex.      // Initialize the transaction mutex.
315      lscp_mutex_init(pClient->mutex);      lscp_mutex_init(pClient->mutex);
316    
     // Now's finally time to startup threads...  
     // UDP service thread...  
     if (lscp_socket_agent_start(&(pClient->udp), _lscp_client_udp_proc, pClient, 0) != LSCP_OK) {  
         lscp_socket_agent_free(&(pClient->tcp));  
         lscp_socket_agent_free(&(pClient->udp));  
         lscp_mutex_destroy(pClient->mutex);  
         free(pClient);  
         return NULL;  
     }  
   
317      // Finally we've some success...      // Finally we've some success...
318      return pClient;      return pClient;
319  }  }
# Line 317  lscp_status_t lscp_client_join ( lscp_cl Line 333  lscp_status_t lscp_client_join ( lscp_cl
333      fprintf(stderr, "lscp_client_join: pClient=%p.\n", pClient);      fprintf(stderr, "lscp_client_join: pClient=%p.\n", pClient);
334  #endif  #endif
335    
336  //  lscp_socket_agent_join(&(pClient->udp));  //  lscp_socket_agent_join(&(pClient->evt));
337      lscp_socket_agent_join(&(pClient->tcp));      lscp_socket_agent_join(&(pClient->cmd));
338    
339      return LSCP_OK;      return LSCP_OK;
340  }  }
# Line 340  lscp_status_t lscp_client_destroy ( lscp Line 356  lscp_status_t lscp_client_destroy ( lscp
356      fprintf(stderr, "lscp_client_destroy: pClient=%p.\n", pClient);      fprintf(stderr, "lscp_client_destroy: pClient=%p.\n", pClient);
357  #endif  #endif
358    
359      // Free session-id, if any.      // Lock this section up.
360      if (pClient->sessid)      lscp_mutex_lock(pClient->mutex);
361          free(pClient->sessid);      
     pClient->sessid = NULL;  
362      // Free up all cached members.      // Free up all cached members.
363      lscp_channel_info_reset(&(pClient->channel_info));      lscp_channel_info_reset(&(pClient->channel_info));
364      lscp_engine_info_reset(&(pClient->engine_info));      lscp_engine_info_reset(&(pClient->engine_info));
365      lscp_driver_info_reset(&(pClient->midi_info));      lscp_param_info_reset(&(pClient->midi_port_param_info));
366      lscp_driver_info_reset(&(pClient->audio_info));      lscp_param_info_reset(&(pClient->audio_channel_param_info));
367        lscp_device_port_info_reset(&(pClient->midi_port_info));
368        lscp_device_port_info_reset(&(pClient->audio_channel_info));
369        lscp_param_info_reset(&(pClient->midi_param_info));
370        lscp_param_info_reset(&(pClient->audio_param_info));
371        lscp_device_info_reset(&(pClient->midi_device_info));
372        lscp_device_info_reset(&(pClient->audio_device_info));
373        lscp_driver_info_reset(&(pClient->midi_driver_info));
374        lscp_driver_info_reset(&(pClient->audio_driver_info));
375      // Free available engine table.      // Free available engine table.
376      lscp_szsplit_destroy(pClient->audio_drivers);      lscp_szsplit_destroy(pClient->audio_drivers);
377      lscp_szsplit_destroy(pClient->midi_drivers);      lscp_szsplit_destroy(pClient->midi_drivers);
378        lscp_isplit_destroy(pClient->audio_devices);
379        lscp_isplit_destroy(pClient->midi_devices);
380      lscp_szsplit_destroy(pClient->engines);      lscp_szsplit_destroy(pClient->engines);
381        lscp_isplit_destroy(pClient->channels);
382      // Make them null.      // Make them null.
383      pClient->audio_drivers = NULL;      pClient->audio_drivers = NULL;
384      pClient->midi_drivers = NULL;      pClient->midi_drivers = NULL;
385      pClient->engines = NULL;      pClient->engines = NULL;
386      // Free result error stuff.      // Free result error stuff.
387      _lscp_client_set_result(pClient, NULL, 0);      lscp_client_set_result(pClient, NULL, 0);
388      // Frre stream usage stuff.      // Free stream usage stuff.
389      if (pClient->buffer_fill)      if (pClient->buffer_fill)
390          free(pClient->buffer_fill);          free(pClient->buffer_fill);
391      pClient->buffer_fill = NULL;      pClient->buffer_fill = NULL;
# Line 367  lscp_status_t lscp_client_destroy ( lscp Line 393  lscp_status_t lscp_client_destroy ( lscp
393      pClient->iTimeout = 0;      pClient->iTimeout = 0;
394    
395      // Free socket agents.      // Free socket agents.
396      lscp_socket_agent_free(&(pClient->udp));      lscp_socket_agent_free(&(pClient->evt));
397      lscp_socket_agent_free(&(pClient->tcp));      lscp_socket_agent_free(&(pClient->cmd));
398    
399      // Last but not least, free good ol'transaction mutex.      // Last but not least, free good ol'transaction mutex.
400        lscp_mutex_unlock(pClient->mutex);
401      lscp_mutex_destroy(pClient->mutex);      lscp_mutex_destroy(pClient->mutex);
402    
403      free(pClient);      free(pClient);
# Line 418  int lscp_client_get_timeout ( lscp_clien Line 445  int lscp_client_get_timeout ( lscp_clien
445  //-------------------------------------------------------------------------  //-------------------------------------------------------------------------
446  // Client common protocol functions.  // Client common protocol functions.
447    
   
448  /**  /**
449   *  Submit a command query line string to the server. The query string   *  Submit a command query line string to the server. The query string
450   *  must be cr/lf and null terminated. Besides the return code, the   *  must be cr/lf and null terminated. Besides the return code, the
# Line 434  int lscp_client_get_timeout ( lscp_clien Line 460  int lscp_client_get_timeout ( lscp_clien
460   */   */
461  lscp_status_t lscp_client_query ( lscp_client_t *pClient, const char *pszQuery )  lscp_status_t lscp_client_query ( lscp_client_t *pClient, const char *pszQuery )
462  {  {
463      fd_set fds;                         // File descriptor list for select().      lscp_status_t ret;
464      int    fd, fdmax;                   // Maximum file descriptor number.      
     struct timeval tv;                  // For specifying a timeout value.  
     int    iSelect;                     // Holds select return status.  
     int    iTimeout;  
     int    cchQuery;  
     char   achResult[LSCP_BUFSIZ];  
     int    cchResult;  
     const  char *pszSeps = ":[]";  
     char  *pszResult;  
     char  *pszToken;  
     char  *pch;  
     int    iErrno;  
   
     lscp_status_t ret = LSCP_FAILED;  
   
     if (pClient == NULL)  
         return ret;  
   
465      // Lock this section up.      // Lock this section up.
466      lscp_mutex_lock(pClient->mutex);      lscp_mutex_lock(pClient->mutex);
467    
468      pszResult = NULL;      // Just make the now guarded call.
469      iErrno = -1;      ret = lscp_client_call(pClient, pszQuery);
470        
471      // Send data, and then, wait for the result...      // Unlock this section down.
     cchQuery = strlen(pszQuery);  
     if (send(pClient->tcp.sock, pszQuery, cchQuery, 0) < cchQuery) {  
         lscp_socket_perror("lscp_client_query: send");  
         lscp_mutex_unlock(pClient->mutex);  
         return ret;  
     }  
   
     // Prepare for waiting on select...  
     fd = (int) pClient->tcp.sock;  
     FD_ZERO(&fds);  
     FD_SET((unsigned int) fd, &fds);  
     fdmax = fd;  
   
     // Use the timeout select feature...  
     iTimeout = pClient->iTimeout;  
     if (iTimeout > 1000) {  
         tv.tv_sec = iTimeout / 1000;  
         iTimeout -= tv.tv_sec * 1000;  
     }  
     else tv.tv_sec = 0;  
     tv.tv_usec = iTimeout * 1000;  
   
     // Wait for event...  
     iSelect = select(fdmax + 1, &fds, NULL, NULL, &tv);  
     if (iSelect > 0 && FD_ISSET(fd, &fds)) {  
         // May recv now...  
         cchResult = recv(pClient->tcp.sock, achResult, sizeof(achResult), 0);  
         if (cchResult > 0) {  
             // Assume early success.  
             ret = LSCP_OK;  
             // Always force the result to be null terminated (and trim trailing CRLFs)!  
             while (cchResult > 0 && (achResult[cchResult - 1] == '\n' || achResult[cchResult- 1] == '\r'))  
                 cchResult--;  
             achResult[cchResult] = (char) 0;  
             // Check if the response it's an error or warning message.  
             if (strncasecmp(achResult, "WRN:", 4) == 0)  
                 ret = LSCP_WARNING;  
             else if (strncasecmp(achResult, "ERR:", 4) == 0)  
                 ret = LSCP_ERROR;  
             // So we got a result...  
             if (ret == LSCP_OK) {  
                 // Reset errno in case of success.  
                 iErrno = 0;  
                 // Is it a special successful response?  
                 if (strncasecmp(achResult, "OK[", 3) == 0) {  
                     // Parse the OK message, get the return string under brackets...  
                     pszToken = lscp_strtok(achResult, pszSeps, &(pch));  
                     if (pszToken)  
                         pszResult = lscp_strtok(NULL, pszSeps, &(pch));  
                 }  
                 else pszResult = achResult;  
                 // The result string is now set to the command response, if any.  
             } else {  
                 // Parse the error/warning message, skip first colon...  
                 pszToken = lscp_strtok(achResult, pszSeps, &(pch));  
                 if (pszToken) {  
                     // Get the error number...  
                     pszToken = lscp_strtok(NULL, pszSeps, &(pch));  
                     if (pszToken) {  
                         iErrno = atoi(pszToken);  
                         // And make the message text our final result.  
                         pszResult = lscp_strtok(NULL, pszSeps, &(pch));  
                     }  
                 }  
                 // The result string is set to the error/warning message text.  
             }  
         }  
         else if (cchResult == 0) {  
             // Fake a result message.  
             pszResult = "Server terminated the connection";  
             ret = LSCP_QUIT;  
         }  
         else lscp_socket_perror("lscp_client_query: recv");  
     }   // Check if select has timed out.  
     else if (iSelect == 0) {  
         // Fake a result message.  
         pszResult = "Timeout during receive operation";  
         ret = LSCP_TIMEOUT;  
     }  
     else lscp_socket_perror("lscp_client_query: select");  
   
     // Make the result official...  
     _lscp_client_set_result(pClient, pszResult, iErrno);  
   
     // Can go on with it...  
472      lscp_mutex_unlock(pClient->mutex);      lscp_mutex_unlock(pClient->mutex);
473        
474      return ret;      return ret;
475  }  }
476    
   
477  /**  /**
478   *  Get the last received result string. In case of error or warning,   *  Get the last received result string. In case of error or warning,
479   *  this is the text of the error or warning message issued.   *  this is the text of the error or warning message issued.
# Line 590  int lscp_client_get_errno ( lscp_client_ Line 513  int lscp_client_get_errno ( lscp_client_
513  // Client registration protocol functions.  // Client registration protocol functions.
514    
515  /**  /**
516   *  Register frontend for receiving UDP event messages:   *  Register frontend for receiving event messages:
517   *  SUBSCRIBE NOTIFICATION <udp-port>   *  SUBSCRIBE CHANNELS | VOICE_COUNT | STREAM_COUNT | BUFFER_FILL
518     *      | CHANNEL_INFO | MISCELLANEOUS
519   *   *
520   *  @param pClient  Pointer to client instance structure.   *  @param pClient  Pointer to client instance structure.
521     *  @param events   Bit-wise OR'ed event flags to subscribe.
522   *   *
523   *  @returns LSCP_OK on success, LSCP_FAILED otherwise.   *  @returns LSCP_OK on success, LSCP_FAILED otherwise.
524   */   */
525  lscp_status_t lscp_client_subscribe ( lscp_client_t *pClient )  lscp_status_t lscp_client_subscribe ( lscp_client_t *pClient, lscp_event_t events )
526  {  {
527      lscp_status_t ret;      lscp_status_t ret = LSCP_FAILED;
     char szQuery[LSCP_BUFSIZ];  
     const char *pszResult;  
     const char *pszSeps = "[]";  
     char *pszToken;  
     char *pch;  
528    
529      if (pClient == NULL || pClient->sessid)      if (pClient == NULL)
530          return LSCP_FAILED;          return LSCP_FAILED;
531    
532      sprintf(szQuery, "SUBSCRIBE NOTIFICATION %d\r\n", ntohs(pClient->udp.addr.sin_port));      // Lock this section up.
533      ret = lscp_client_query(pClient, szQuery);      lscp_mutex_lock(pClient->mutex);
534      if (ret == LSCP_OK) {  
535          pszResult = lscp_client_get_result(pClient);      // If applicable, start the alternate connection...
536  #ifdef DEBUG      if (pClient->events == LSCP_EVENT_NONE)
537          fprintf(stderr, "lscp_client_subscribe: %s\n", pszResult);          ret = _lscp_client_evt_connect(pClient);
538  #endif      
539          // Check for the session-id on "OK[sessid]" response.      // Send the subscription commands.
540          pszToken = lscp_strtok(pszResult, pszSeps, &(pch));      if (ret == LSCP_OK && (events & LSCP_EVENT_CHANNELS))
541          if (pszToken && strcasecmp(pszToken, "OK") == 0) {          ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_CHANNELS);
542              pszToken = lscp_strtok(NULL, pszSeps, &(pch));      if (ret == LSCP_OK && (events & LSCP_EVENT_VOICE_COUNT))
543              if (pszToken)          ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_VOICE_COUNT);
544                  pClient->sessid = strdup(pszToken);      if (ret == LSCP_OK && (events & LSCP_EVENT_STREAM_COUNT))
545          }          ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_STREAM_COUNT);
546      }      if (ret == LSCP_OK && (events & LSCP_EVENT_BUFFER_FILL))
547            ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_BUFFER_FILL);
548        if (ret == LSCP_OK && (events & LSCP_EVENT_CHANNEL_INFO))
549            ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_CHANNEL_INFO);
550        if (ret == LSCP_OK && (events & LSCP_EVENT_MISCELLANEOUS))
551            ret = _lscp_client_evt_request(pClient, 1, LSCP_EVENT_MISCELLANEOUS);
552    
553        // Unlock this section down.
554        lscp_mutex_unlock(pClient->mutex);
555    
556      return ret;      return ret;
557  }  }
558    
559    
560  /**  /**
561   *  Deregister frontend for not receiving UDP event messages anymore:   *  Deregister frontend from receiving UDP event messages anymore:
562   *  UNSUBSCRIBE NOTIFICATION <session-id>   *  SUBSCRIBE CHANNELS | VOICE_COUNT | STREAM_COUNT | BUFFER_FILL
563     *      | CHANNEL_INFO | MISCELLANEOUS
564   *   *
565   *  @param pClient  Pointer to client instance structure.   *  @param pClient  Pointer to client instance structure.
566     *  @param events   Bit-wise OR'ed event flags to unsubscribe.
567   *   *
568   *  @returns LSCP_OK on success, LSCP_FAILED otherwise.   *  @returns LSCP_OK on success, LSCP_FAILED otherwise.
569   */   */
570  lscp_status_t lscp_client_unsubscribe ( lscp_client_t *pClient )  lscp_status_t lscp_client_unsubscribe ( lscp_client_t *pClient, lscp_event_t events )
571  {  {
572      lscp_status_t ret;      lscp_status_t ret = LSCP_OK;
     char szQuery[LSCP_BUFSIZ];  
573    
574      if (pClient == NULL)      if (pClient == NULL)
575          return LSCP_FAILED;          return LSCP_FAILED;
     if (pClient->sessid == NULL)  
         return LSCP_FAILED;  
576    
577      sprintf(szQuery, "UNSUBSCRIBE NOTIFICATION %s\n\n", pClient->sessid);      // Lock this section up.
578      ret = lscp_client_query(pClient, szQuery);      lscp_mutex_lock(pClient->mutex);
579      if (ret == LSCP_OK) {  
580  #ifdef DEBUG      // Send the unsubscription commands.
581          fprintf(stderr, "lscp_client_unsubscribe: %s\n", lscp_client_get_result(pClient));      if (ret == LSCP_OK && (events & LSCP_EVENT_CHANNELS))
582  #endif          ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_CHANNELS);
583          // Bail out session-id string.      if (ret == LSCP_OK && (events & LSCP_EVENT_VOICE_COUNT))
584          free(pClient->sessid);          ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_VOICE_COUNT);
585          pClient->sessid = NULL;      if (ret == LSCP_OK && (events & LSCP_EVENT_STREAM_COUNT))
586      }          ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_STREAM_COUNT);
587        if (ret == LSCP_OK && (events & LSCP_EVENT_BUFFER_FILL))
588            ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_BUFFER_FILL);
589        if (ret == LSCP_OK && (events & LSCP_EVENT_CHANNEL_INFO))
590            ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_CHANNEL_INFO);
591        if (ret == LSCP_OK && (events & LSCP_EVENT_MISCELLANEOUS))
592            ret = _lscp_client_evt_request(pClient, 0, LSCP_EVENT_MISCELLANEOUS);
593    
594        // If necessary, close the alternate connection...
595        if (pClient->events == LSCP_EVENT_NONE)
596            lscp_socket_agent_free(&(pClient->evt));
597    
598        // Unlock this section down.
599        lscp_mutex_unlock(pClient->mutex);
600    
601      return ret;      return ret;
602  }  }
# Line 683  lscp_status_t lscp_load_instrument ( lsc Line 623  lscp_status_t lscp_load_instrument ( lsc
623      if (pszFileName == NULL || iSamplerChannel < 0)      if (pszFileName == NULL || iSamplerChannel < 0)
624          return LSCP_FAILED;          return LSCP_FAILED;
625    
626      sprintf(szQuery, "LOAD INSTRUMENT %s %d %d\r\n", pszFileName, iInstrIndex, iSamplerChannel);      sprintf(szQuery, "LOAD INSTRUMENT '%s' %d %d\r\n", pszFileName, iInstrIndex, iSamplerChannel);
627        return lscp_client_query(pClient, szQuery);
628    }
629    
630    
631    /**
632     *  Loading an instrument in the background (non modal):
633     *  LOAD INSTRUMENT NON_MODAL <filename> <instr-index> <sampler-channel>
634     *
635     *  @param pClient          Pointer to client instance structure.
636     *  @param pszFileName      Instrument file name.
637     *  @param iInstrIndex      Instrument index number.
638     *  @param iSamplerChannel  Sampler Channel.
639     *
640     *  @returns LSCP_OK on success, LSCP_FAILED otherwise.
641     */
642    lscp_status_t lscp_load_instrument_non_modal ( lscp_client_t *pClient, const char *pszFileName, int iInstrIndex, int iSamplerChannel )
643    {
644        char szQuery[LSCP_BUFSIZ];
645    
646        if (pszFileName == NULL || iSamplerChannel < 0)
647            return LSCP_FAILED;
648    
649        sprintf(szQuery, "LOAD INSTRUMENT NON_MODAL '%s' %d %d\r\n", pszFileName, iInstrIndex, iSamplerChannel);
650      return lscp_client_query(pClient, szQuery);      return lscp_client_query(pClient, szQuery);
651  }  }
652    
# Line 722  lscp_status_t lscp_load_engine ( lscp_cl Line 685  lscp_status_t lscp_load_engine ( lscp_cl
685  int lscp_get_channels ( lscp_client_t *pClient )  int lscp_get_channels ( lscp_client_t *pClient )
686  {  {
687      int iChannels = -1;      int iChannels = -1;
688      if (lscp_client_query(pClient, "GET CHANNELS\r\n") == LSCP_OK)  
689        // Lock this section up.
690        lscp_mutex_lock(pClient->mutex);
691    
692        if (lscp_client_call(pClient, "GET CHANNELS\r\n") == LSCP_OK)
693          iChannels = atoi(lscp_client_get_result(pClient));          iChannels = atoi(lscp_client_get_result(pClient));
694    
695        // Unlock this section doen.
696        lscp_mutex_unlock(pClient->mutex);
697    
698      return iChannels;      return iChannels;
699  }  }
700    
701    
702  /**  /**
703     *  List current sampler channels number identifiers:
704     *  LIST CHANNELS
705     *
706     *  @param pClient  Pointer to client instance structure.
707     *
708     *  @returns An array of the sampler channels identifiers as positive integers,
709     *  terminated with -1 on success, NULL otherwise.
710     */
711    int *lscp_list_channels ( lscp_client_t *pClient )
712    {
713        const char *pszSeps = ",";
714    
715        if (pClient == NULL)
716            return NULL;
717            
718        // Lock this section up.
719        lscp_mutex_lock(pClient->mutex);
720    
721        if (pClient->channels) {
722            lscp_isplit_destroy(pClient->channels);
723            pClient->channels = NULL;
724        }
725    
726        if (lscp_client_call(pClient, "LIST CHANNELS\r\n") == LSCP_OK)
727            pClient->channels = lscp_isplit_create(lscp_client_get_result(pClient), pszSeps);
728    
729        // Unlock this section down.
730        lscp_mutex_unlock(pClient->mutex);
731    
732        return pClient->channels;
733    }
734    
735    
736    /**
737   *  Adding a new sampler channel:   *  Adding a new sampler channel:
738   *  ADD CHANNEL   *  ADD CHANNEL
739   *   *
# Line 740  int lscp_get_channels ( lscp_client_t *p Line 745  int lscp_get_channels ( lscp_client_t *p
745  int lscp_add_channel ( lscp_client_t *pClient )  int lscp_add_channel ( lscp_client_t *pClient )
746  {  {
747      int iSamplerChannel = -1;      int iSamplerChannel = -1;
748      if (lscp_client_query(pClient, "ADD CHANNEL\r\n") == LSCP_OK)  
749        // Lock this section up.
750        lscp_mutex_lock(pClient->mutex);
751    
752        if (lscp_client_call(pClient, "ADD CHANNEL\r\n") == LSCP_OK)
753          iSamplerChannel = atoi(lscp_client_get_result(pClient));          iSamplerChannel = atoi(lscp_client_get_result(pClient));
754            
755        // Unlock this section down.
756        lscp_mutex_unlock(pClient->mutex);
757    
758      return iSamplerChannel;      return iSamplerChannel;
759  }  }
760    
# Line 780  const char **lscp_get_available_engines Line 793  const char **lscp_get_available_engines
793  {  {
794      const char *pszSeps = ",";      const char *pszSeps = ",";
795    
796        // Lock this section up.
797        lscp_mutex_lock(pClient->mutex);
798    
799      if (pClient->engines) {      if (pClient->engines) {
800          lscp_szsplit_destroy(pClient->engines);          lscp_szsplit_destroy(pClient->engines);
801          pClient->engines = NULL;          pClient->engines = NULL;
802      }      }
803    
804      if (lscp_client_query(pClient, "GET AVAILABLE_ENGINES\r\n") == LSCP_OK)      if (lscp_client_call(pClient, "GET AVAILABLE_ENGINES\r\n") == LSCP_OK)
805          pClient->engines = lscp_szsplit_create(lscp_client_get_result(pClient), pszSeps);          pClient->engines = lscp_szsplit_create(lscp_client_get_result(pClient), pszSeps);
806    
807        // Unlock this section down.
808        lscp_mutex_unlock(pClient->mutex);
809    
810      return (const char **) pClient->engines;      return (const char **) pClient->engines;
811  }  }
812    
# Line 815  lscp_engine_info_t *lscp_get_engine_info Line 834  lscp_engine_info_t *lscp_get_engine_info
834      if (pszEngineName == NULL)      if (pszEngineName == NULL)
835          return NULL;          return NULL;
836    
837        // Lock this section up.
838        lscp_mutex_lock(pClient->mutex);
839    
840      pEngineInfo = &(pClient->engine_info);      pEngineInfo = &(pClient->engine_info);
841      lscp_engine_info_reset(pEngineInfo);      lscp_engine_info_reset(pEngineInfo);
842    
843      sprintf(szQuery, "GET ENGINE INFO %s\r\n", pszEngineName);      sprintf(szQuery, "GET ENGINE INFO %s\r\n", pszEngineName);
844      if (lscp_client_query(pClient, szQuery) != LSCP_OK)      if (lscp_client_call(pClient, szQuery) == LSCP_OK) {
845          return NULL;          pszResult = lscp_client_get_result(pClient);
846            pszToken = lscp_strtok((char *) pszResult, pszSeps, &(pch));
847      pszResult = lscp_client_get_result(pClient);          while (pszToken) {
848      pszToken = lscp_strtok(pszResult, pszSeps, &(pch));              if (strcasecmp(pszToken, "DESCRIPTION") == 0) {
849      while (pszToken) {                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
850          if (strcasecmp(pszToken, "DESCRIPTION") == 0) {                  if (pszToken)
851              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pEngineInfo->description = lscp_unquote(&pszToken, 1);
852              if (pszToken)              }
853                  pEngineInfo->description = lscp_unquote(&pszToken, 1);              else if (strcasecmp(pszToken, "VERSION") == 0) {
854          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
855          else if (strcasecmp(pszToken, "VERSION") == 0) {                  if (pszToken)
856              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pEngineInfo->version = lscp_unquote(&pszToken, 1);
857              if (pszToken)              }
858                  pEngineInfo->version = lscp_unquote(&pszToken, 1);              pszToken = lscp_strtok(NULL, pszSeps, &(pch));
859          }          }
         pszToken = lscp_strtok(NULL, pszSeps, &(pch));  
860      }      }
861        else pEngineInfo = NULL;
862        
863        // Unlock this section down.
864        lscp_mutex_unlock(pClient->mutex);
865    
866      return pEngineInfo;      return pEngineInfo;
867  }  }
# Line 865  lscp_channel_info_t *lscp_get_channel_in Line 890  lscp_channel_info_t *lscp_get_channel_in
890      if (iSamplerChannel < 0)      if (iSamplerChannel < 0)
891          return NULL;          return NULL;
892    
893        // Lock this section up.
894        lscp_mutex_lock(pClient->mutex);
895        
896      pChannelInfo = &(pClient->channel_info);      pChannelInfo = &(pClient->channel_info);
897      lscp_channel_info_reset(pChannelInfo);      lscp_channel_info_reset(pChannelInfo);
898    
899      sprintf(szQuery, "GET CHANNEL INFO %d\r\n", iSamplerChannel);      sprintf(szQuery, "GET CHANNEL INFO %d\r\n", iSamplerChannel);
900      if (lscp_client_query(pClient, szQuery) != LSCP_OK)      if (lscp_client_call(pClient, szQuery) == LSCP_OK) {
901          return NULL;          pszResult = lscp_client_get_result(pClient);
902            pszToken = lscp_strtok((char *) pszResult, pszSeps, &(pch));
903      pszResult = lscp_client_get_result(pClient);          while (pszToken) {
904      pszToken = lscp_strtok(pszResult, pszSeps, &(pch));              if (strcasecmp(pszToken, "ENGINE_NAME") == 0) {
905      while (pszToken) {                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
906          if (strcasecmp(pszToken, "ENGINE_NAME") == 0) {                  if (pszToken)
907              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->engine_name = lscp_unquote(&pszToken, 1);
908              if (pszToken)              }
909                  pChannelInfo->engine_name = lscp_unquote(&pszToken, 1);              else if (strcasecmp(pszToken, "AUDIO_OUTPUT_DEVICE") == 0) {
910          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
911          else if (strcasecmp(pszToken, "AUDIO_OUTPUT_DEVICE") == 0) {                  if (pszToken)
912              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->audio_device = atoi(lscp_ltrim(pszToken));
913              if (pszToken)              }
914                  pChannelInfo->audio_device = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "AUDIO_OUTPUT_CHANNELS") == 0) {
915          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
916          else if (strcasecmp(pszToken, "AUDIO_OUTPUT_CHANNELS") == 0) {                  if (pszToken)
917              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->audio_channels = atoi(lscp_ltrim(pszToken));
918              if (pszToken)              }
919                  pChannelInfo->audio_channels = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "AUDIO_OUTPUT_ROUTING") == 0) {
920          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
921          else if (strcasecmp(pszToken, "AUDIO_OUTPUT_ROUTING") == 0) {                  if (pszToken)
922              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->audio_routing = lscp_szsplit_create(pszToken, ",");
923              if (pszToken)              }
924                  pChannelInfo->audio_routing = lscp_szsplit_create(pszToken, ",");              else if (strcasecmp(pszToken, "INSTRUMENT_FILE") == 0) {
925          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
926          else if (strcasecmp(pszToken, "INSTRUMENT_FILE") == 0) {                  if (pszToken)
927              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->instrument_file = lscp_unquote(&pszToken, 1);
928              if (pszToken)              }
929                  pChannelInfo->instrument_file = lscp_unquote(&pszToken, 1);              else if (strcasecmp(pszToken, "INSTRUMENT_NR") == 0) {
930          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
931          else if (strcasecmp(pszToken, "INSTRUMENT_NR") == 0) {                  if (pszToken)
932              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->instrument_nr = atoi(lscp_ltrim(pszToken));
933              if (pszToken)              }
934                  pChannelInfo->instrument_nr = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "INSTRUMENT_STATUS") == 0) {
935          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
936          else if (strcasecmp(pszToken, "MIDI_INPUT_DEVICE") == 0) {                  if (pszToken)
937              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->instrument_status = atoi(lscp_ltrim(pszToken));
938              if (pszToken)              }
939                  pChannelInfo->midi_device = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "MIDI_INPUT_DEVICE") == 0) {
940          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
941          else if (strcasecmp(pszToken, "MIDI_INPUT_PORT") == 0) {                  if (pszToken)
942              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->midi_device = atoi(lscp_ltrim(pszToken));
943              if (pszToken)              }
944                  pChannelInfo->midi_port = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "MIDI_INPUT_PORT") == 0) {
945          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
946          else if (strcasecmp(pszToken, "MIDI_INPUT_CHANNEL") == 0) {                  if (pszToken)
947              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->midi_port = atoi(lscp_ltrim(pszToken));
948              if (pszToken)              }
949                  pChannelInfo->midi_channel = atoi(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "MIDI_INPUT_CHANNEL") == 0) {
950          }                  pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
951          else if (strcasecmp(pszToken, "VOLUME") == 0) {                  if (pszToken)
952              pszToken = lscp_strtok(NULL, pszCrlf, &(pch));                      pChannelInfo->midi_channel = atoi(lscp_ltrim(pszToken));
953              if (pszToken)              }
954                  pChannelInfo->volume = (float) atof(lscp_ltrim(pszToken));              else if (strcasecmp(pszToken, "VOLUME") == 0) {
955                    pszToken = lscp_strtok(NULL, pszCrlf, &(pch));
956                    if (pszToken)
957                        pChannelInfo->volume = (float) atof(lscp_ltrim(pszToken));
958                }
959                pszToken = lscp_strtok(NULL, pszSeps, &(pch));
960          }          }
         pszToken = lscp_strtok(NULL, pszSeps, &(pch));  
961      }      }
962        else pChannelInfo = NULL;
963        
964        // Unlock this section up.
965        lscp_mutex_unlock(pClient->mutex);
966    
967      return pChannelInfo;      return pChannelInfo;
968  }  }
# Line 949  int lscp_get_channel_voice_count ( lscp_ Line 985  int lscp_get_channel_voice_count ( lscp_
985      if (iSamplerChannel < 0)      if (iSamplerChannel < 0)
986          return iVoiceCount;          return iVoiceCount;
987    
988        // Lock this section up.
989        lscp_mutex_lock(pClient->mutex);
990    
991      sprintf(szQuery, "GET CHANNEL VOICE_COUNT %d\r\n", iSamplerChannel);      sprintf(szQuery, "GET CHANNEL VOICE_COUNT %d\r\n", iSamplerChannel);
992      if (lscp_client_query(pClient, szQuery) == LSCP_OK)      if (lscp_client_call(pClient, szQuery) == LSCP_OK)
993          iVoiceCount = atoi(lscp_client_get_result(pClient));          iVoiceCount = atoi(lscp_client_get_result(pClient));
994    
995        // Unlock this section down.
996        lscp_mutex_unlock(pClient->mutex);
997    
998      return iVoiceCount;      return iVoiceCount;
999  }  }
1000    
# Line 961  int lscp_get_channel_voice_count ( lscp_ Line 1003  int lscp_get_channel_voice_count ( lscp_
1003   *  Current number of active disk streams:   *  Current number of active disk streams:
1004   *  GET CHANNEL STREAM_COUNT <sampler-channel>   *  GET CHANNEL STREAM_COUNT <sampler-channel>
1005   *   *
1006     *  @param pClient          Pointer to client instance structure.
1007     *  @param iSamplerChannel  Sampler channel number.
1008     *
1009   *  @returns The number of active disk streams on success, -1 otherwise.   *  @returns The number of active disk streams on success, -1 otherwise.
1010   */   */
1011  int lscp_get_channel_stream_count ( lscp_client_t *pClient, int iSamplerChannel )  int lscp_get_channel_stream_count ( lscp_client_t *pClient, int iSamplerChannel )
# Line 971  int lscp_get_channel_stream_count ( lscp Line 1016  int lscp_get_channel_stream_count ( lscp
1016      if (iSamplerChannel < 0)      if (iSamplerChannel < 0)
1017          return iStreamCount;          return iStreamCount;
1018    
1019        // Lock this section up.
1020        lscp_mutex_lock(pClient->mutex);
1021    
1022      sprintf(szQuery, "GET CHANNEL STREAM_COUNT %d\r\n", iSamplerChannel);      sprintf(szQuery, "GET CHANNEL STREAM_COUNT %d\r\n", iSamplerChannel);
1023      if (lscp_client_query(pClient, szQuery) == LSCP_OK)      if (lscp_client_call(pClient, szQuery) == LSCP_OK)
1024          iStreamCount = atoi(lscp_client_get_result(pClient));          iStreamCount = atoi(lscp_client_get_result(pClient));
1025    
1026        // Unlock this section down.
1027        lscp_mutex_unlock(pClient->mutex);
1028    
1029      return iStreamCount;      return iStreamCount;
1030  }  }
1031    
1032    
1033  /**  /**
1034     *  Current least usage of active disk streams.
1035     *
1036     *  @param pClient          Pointer to client instance structure.
1037     *  @param iSamplerChannel  Sampler channel number.
1038     *
1039     *  @returns The usage percentage of the least filled active disk stream
1040     *  on success, -1 otherwise.
1041     */
1042    int lscp_get_channel_stream_usage ( lscp_client_t *pClient, int iSamplerChannel )
1043    {
1044        char szQuery[LSCP_BUFSIZ];
1045        int  iStreamUsage = -1;
1046        const char *pszResult;
1047        const char *pszSeps = "[]%,";
1048        char *pszToken;
1049        char *pch;
1050        int   iStream;
1051        int   iPercent;
1052    
1053        if (iSamplerChannel < 0)
1054            return iStreamUsage;
1055    
1056        // Lock this section up.
1057        lscp_mutex_lock(pClient->mutex);
1058    
1059        iStream = 0;
1060        sprintf(szQuery, "GET CHANNEL BUFFER_FILL PERCENTAGE %d\r\n", iSamplerChannel);
1061        if (lscp_client_call(pClient, szQuery) == LSCP_OK) {
1062            pszResult = lscp_client_get_result(pClient);
1063            pszToken = lscp_strtok((char *) pszResult, pszSeps, &(pch));
1064            while (pszToken) {
1065                if (*pszToken) {
1066                    // Skip stream id.
1067                    pszToken = lscp_strtok(NULL, pszSeps, &(pch));
1068                    if (pszToken == NULL)
1069                        break;
1070                    // Get least buffer fill percentage.
1071                    iPercent = atol(pszToken);
1072                    if (iStreamUsage > iPercent || iStream == 0)
1073                        iStreamUsage = iPercent;
1074                    iStream++;
1075                }
1076                pszToken = lscp_strtok(NULL, pszSeps, &(pch));
1077            }
1078        }
1079    
1080        // Unlock this section down.
1081        lscp_mutex_unlock(pClient->mutex);
1082    
1083        return iStreamUsage;
1084    }
1085    
1086    
1087    /**
1088   *  Current fill state of disk stream buffers:   *  Current fill state of disk stream buffers:
1089   *  GET CHANNEL BUFFER_FILL {BYTES|PERCENTAGE} <sampler-channel>   *  GET CHANNEL BUFFER_FILL {BYTES|PERCENTAGE} <sampler-channel>
1090   *   *
# Line 1005  lscp_buffer_fill_t *lscp_get_channel_buf Line 1110  lscp_buffer_fill_t *lscp_get_channel_buf
1110      char *pch;      char *pch;
1111      int   iStream;      int   iStream;
1112    
1113        // Retrieve a channel stream estimation.
1114      iStreamCount = lscp_get_channel_stream_count(pClient, iSamplerChannel);      iStreamCount = lscp_get_channel_stream_count(pClient, iSamplerChannel);
1115        if (pClient->iStreamCount < 0)
1116            return NULL;
1117    
1118        // Lock this section up.
1119        lscp_mutex_lock(pClient->mutex);
1120    
1121        // Check if we need to reallocate the stream usage array.
1122      if (pClient->iStreamCount != iStreamCount) {      if (pClient->iStreamCount != iStreamCount) {
1123          if (pClient->buffer_fill)          if (pClient->buffer_fill)
1124              free(pClient->buffer_fill);              free(pClient->buffer_fill);
# Line 1016  lscp_buffer_fill_t *lscp_get_channel_buf Line 1129  lscp_buffer_fill_t *lscp_get_channel_buf
1129          pClient->iStreamCount = iStreamCount;          pClient->iStreamCount = iStreamCount;
1130      }      }
1131    
     if (pClient->iStreamCount < 1)  
         return NULL;  
   
     iStream = 0;  
     pBufferFill = pClient->buffer_fill;  
   
1132      // Get buffer fill usage...      // Get buffer fill usage...
1133      sprintf(szQuery, "GET CHANNEL BUFFER_FILL %s %d\r\n", pszUsageType, iSamplerChannel);      pBufferFill = pClient->buffer_fill;
1134      if (lscp_client_query(pClient, szQuery) == LSCP_OK) {      if (pBufferFill && iStreamCount > 0) {
1135          pszResult = lscp_client_get_result(pClient);          iStream = 0;
1136          pszToken = lscp_strtok(pszResult, pszSeps, &(pch));          pBufferFill = pClient->buffer_fill;
1137          while (pszToken && iStream < pClient->iStreamCount) {          sprintf(szQuery, "GET CHANNEL BUFFER_FILL %s %d\r\n", pszUsageType, iSamplerChannel);
1138              if (*pszToken) {          if (lscp_client_call(pClient, szQuery) == LSCP_OK) {
1139                  pBufferFill[iStream].stream_id = atol(pszToken);              pszResult = lscp_client_get_result(pClient);
1140                pszToken = lscp_strtok((char *) pszResult, pszSeps, &(pch));
1141                while (pszToken && iStream < pClient->iStreamCount) {
1142                    if (*pszToken) {
1143                        pBufferFill[iStream].stream_id = atol(pszToken);
1144                        pszToken = lscp_strtok(NULL, pszSeps, &(pch));
1145                        if (pszToken == NULL)
1146                            break;
1147                        pBufferFill[iStream].stream_usage = atol(pszToken);
1148                        iStream++;
1149                    }
1150                  pszToken = lscp_strtok(NULL, pszSeps, &(pch));                  pszToken = lscp_strtok(NULL, pszSeps, &(pch));
                 if (pszToken == NULL)  
                     break;  
                 pBufferFill[iStream].stream_usage = atol(pszToken);  
                 iStream++;  
1151              }              }
1152              pszToken = lscp_strtok(NULL, pszSeps, &(pch));          }   // Reset the usage, whatever it was before.
1153          }          else while (iStream < pClient->iStreamCount)
1154      }   // Reset the usage, whatever it was before.              pBufferFill[iStream++].stream_usage = 0;
1155      else while (iStream < pClient->iStreamCount)      }
1156          pBufferFill[iStream++].stream_usage = 0;      
1157        // Unlock this section down.
1158        lscp_mutex_unlock(pClient->mutex);
1159    
1160      return pBufferFill;      return pBufferFill;
1161  }  }
# Line 1067  lscp_status_t lscp_set_channel_audio_typ Line 1182  lscp_status_t lscp_set_channel_audio_typ
1182    
1183    
1184  /**  /**
1185     *  Setting audio output device:
1186     *  SET CHANNEL AUDIO_OUTPUT_DEVICE <sampler-channel> <device-id>
1187     *
1188     *  @param pClient          Pointer to client instance structure.
1189     *  @param iSamplerChannel  Sampler channel number.
1190     *  @param iAudioDevice     Audio output device number identifier.
1191     */
1192    lscp_status_t lscp_set_channel_audio_device ( lscp_client_t *pClient, int iSamplerChannel, int iAudioDevice )
1193    {
1194        char szQuery[LSCP_BUFSIZ];
1195    
1196        if (iSamplerChannel < 0 || iAudioDevice < 0)
1197            return LSCP_FAILED;
1198    
1199        sprintf(szQuery, "SET CHANNEL AUDIO_OUTPUT_DEVICE %d %d\r\n", iSamplerChannel, iAudioDevice);
1200        return lscp_client_query(pClient, szQuery);
1201    }
1202    
1203    
1204    /**
1205   *  Setting audio output channel:   *  Setting audio output channel:
1206   *  SET CHANNEL AUDIO_OUTPUT_CHANNEL <sampler-channel> <audio-output-chan> <audio-input-chan>   *  SET CHANNEL AUDIO_OUTPUT_CHANNEL <sampler-channel> <audio-output-chan> <audio-input-chan>
1207   *   *
# Line 1110  lscp_status_t lscp_set_channel_midi_type Line 1245  lscp_status_t lscp_set_channel_midi_type
1245      return lscp_client_query(pClient, szQuery);      return lscp_client_query(pClient, szQuery);
1246  }  }
1247    
1248    
1249    /**
1250     *  Setting MIDI input device:
1251     *  SET CHANNEL MIDI_INPUT_DEVICE <sampler-channel> <device-id>
1252     *
1253     *  @param pClient          Pointer to client instance structure.
1254     *  @param iSamplerChannel  Sampler channel number.
1255     *  @param iMidiDevice      MIDI input device number identifier.
1256     */
1257    lscp_status_t lscp_set_channel_midi_device ( lscp_client_t *pClient, int iSamplerChannel, int iMidiDevice )
1258    {
1259        char szQuery[LSCP_BUFSIZ];
1260    
1261        if (iSamplerChannel < 0 || iMidiDevice < 0)
1262            return LSCP_FAILED;
1263    
1264        sprintf(szQuery, "SET CHANNEL MIDI_INPUT_DEVICE %d %d\r\n", iSamplerChannel, iMidiDevice);
1265        return lscp_client_query(pClient, szQuery);
1266    }
1267    
1268    
1269  /**  /**
1270   *  Setting MIDI input port:   *  Setting MIDI input port:

Legend:
Removed from v.107  
changed lines
  Added in v.171

  ViewVC Help
Powered by ViewVC