2 * Copyright (c) 2011-2015 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
19 #include <cynara-client.h>
20 #include <cynara-error.h>
21 #include <cynara-session.h>
24 #include <system_info.h>
26 #include "vc_command.h"
27 #include "vc_info_parser.h"
29 #include "vc_regex_rule.h"
30 #include "vc_config_mgr.h"
31 #include "voice_control_command.h"
32 #include "voice_control_command_expand.h"
33 #include "voice_control_common.h"
34 #include "voice_control_key_defines.h"
36 static pthread_mutex_t g_cmd_mutex = PTHREAD_MUTEX_INITIALIZER;
37 static pthread_mutex_t g_cmd_list_mutex = PTHREAD_MUTEX_INITIALIZER;
38 #define CMD_MUTEX_LOCK() pthread_mutex_lock(&g_cmd_mutex)
39 #define CMD_MUTEX_UNLOCK() pthread_mutex_unlock(&g_cmd_mutex)
40 #define CMD_LIST_MUTEX_LOCK() pthread_mutex_lock(&g_cmd_list_mutex)
41 #define CMD_LIST_MUTEX_UNLOCK() pthread_mutex_unlock(&g_cmd_list_mutex)
43 static int g_feature_enabled = -1;
44 static bool g_privilege_allowed = false;
46 static pthread_mutex_t g_cynara_mutex = PTHREAD_MUTEX_INITIALIZER;
47 static cynara *p_cynara = NULL;
48 static GList *g_cmd_list = NULL;
49 static GList *g_cmdlist_list = NULL;
52 // For getting timestamp using regular expression
53 static regex_t reg[MAX_NUM_REGEX];
54 static time_t t_now; //time_t is based on UTC
55 static struct tm td_now; //if use localtime function, the value follows the local time zone, otherwise it follows the UTC.
57 static int g_time_flag;
58 static int g_date_flag;
60 static int g_data_sidx;
61 static int g_data_eidx;
63 static int __vc_cmd_get_feature_enabled()
65 if (0 == g_feature_enabled) {
66 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
67 return VC_ERROR_NOT_SUPPORTED;
68 } else if (-1 == g_feature_enabled) {
69 bool vc_supported = false;
70 bool mic_supported = false;
71 if (0 == system_info_get_platform_bool(VC_FEATURE_PATH, &vc_supported)) {
72 if (0 == system_info_get_platform_bool(VC_MIC_FEATURE_PATH, &mic_supported)) {
73 if (false == vc_supported || false == mic_supported) {
74 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
75 g_feature_enabled = 0;
76 return VC_ERROR_NOT_SUPPORTED;
79 g_feature_enabled = 1;
81 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
82 return VC_ERROR_NOT_SUPPORTED;
85 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
86 return VC_ERROR_NOT_SUPPORTED;
93 static int __check_privilege_initialize()
95 int ret = cynara_initialize(&p_cynara, NULL);
96 if (CYNARA_API_SUCCESS != ret)
97 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to initialize");
99 return ret == CYNARA_API_SUCCESS;
102 static int __check_privilege(const char* uid, const char * privilege)
105 char label_path[1024] = "/proc/self/attr/current";
106 char smack_label[1024] = {'\0',};
112 fp = fopen(label_path, "r");
114 if (0 >= fread(smack_label, 1, sizeof(smack_label), fp))
115 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to fread");
120 pid_t pid = getpid();
121 char *session = cynara_session_from_pid(pid);
122 int ret = cynara_check(p_cynara, smack_label, session, uid, privilege);
123 SLOG(LOG_DEBUG, TAG_VCCMD, "[Client]cynara_check returned %d(%s)", ret, (CYNARA_API_ACCESS_ALLOWED == ret) ? "Allowed" : "Denied");
127 if (ret != CYNARA_API_ACCESS_ALLOWED)
132 static void __check_privilege_deinitialize()
136 int ret = cynara_finish(p_cynara);
137 if (ret != CYNARA_API_SUCCESS)
138 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] cynara finish %d", ret);
143 static int __vc_cmd_check_privilege()
145 if (true == g_privilege_allowed)
146 return VC_ERROR_NONE;
148 pthread_mutex_lock(&g_cynara_mutex);
150 if (false == g_privilege_allowed) {
152 ret = __check_privilege_initialize();
154 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] privilege initialize is failed");
155 g_privilege_allowed = false;
156 pthread_mutex_unlock(&g_cynara_mutex);
157 return VC_ERROR_PERMISSION_DENIED;
161 snprintf(uid, 32, "%d", getuid());
163 ret = __check_privilege(uid, VC_PRIVILEGE_RECORDER);
166 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Permission is denied(%s)(%s)", VC_PRIVILEGE_RECORDER, uid);
167 __check_privilege_deinitialize();
168 g_privilege_allowed = false;
169 pthread_mutex_unlock(&g_cynara_mutex);
170 return VC_ERROR_PERMISSION_DENIED;
174 __check_privilege_deinitialize();
177 g_privilege_allowed = true;
178 pthread_mutex_unlock(&g_cynara_mutex);
179 return VC_ERROR_NONE;
182 int vc_cmd_list_create(vc_cmd_list_h* vc_cmd_list)
184 if (0 != __vc_cmd_get_feature_enabled()) {
185 return VC_ERROR_NOT_SUPPORTED;
187 if (0 != __vc_cmd_check_privilege()) {
188 return VC_ERROR_PERMISSION_DENIED;
191 CMD_LIST_MUTEX_LOCK();
193 if (NULL == vc_cmd_list) {
194 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
195 CMD_LIST_MUTEX_UNLOCK();
196 return VC_ERROR_INVALID_PARAMETER;
199 vc_cmd_list_s* list = (vc_cmd_list_s*)calloc(1, sizeof(vc_cmd_list_s));
202 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
203 CMD_LIST_MUTEX_UNLOCK();
204 return VC_ERROR_OUT_OF_MEMORY;
210 *vc_cmd_list = (vc_cmd_list_h)list;
212 g_cmdlist_list = g_list_append(g_cmdlist_list, list);
214 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", *vc_cmd_list);
216 CMD_LIST_MUTEX_UNLOCK();
217 return VC_ERROR_NONE;
220 int vc_cmd_list_destroy(vc_cmd_list_h vc_cmd_list, bool release_command)
222 if (0 != __vc_cmd_get_feature_enabled()) {
223 return VC_ERROR_NOT_SUPPORTED;
225 if (0 != __vc_cmd_check_privilege()) {
226 return VC_ERROR_PERMISSION_DENIED;
229 CMD_LIST_MUTEX_LOCK();
231 if (NULL == vc_cmd_list) {
232 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
233 CMD_LIST_MUTEX_UNLOCK();
234 return VC_ERROR_INVALID_PARAMETER;
238 vc_cmd_list_s* list = NULL;
239 list = (vc_cmd_list_s*)vc_cmd_list;
241 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", list);
244 iter = g_list_find(g_cmdlist_list, list);
246 SLOG(LOG_ERROR, TAG_VCCMD, "Fail to destroy client : handle is not valid");
247 CMD_LIST_MUTEX_UNLOCK();
248 return VC_ERROR_INVALID_PARAMETER;
251 g_cmdlist_list = g_list_delete_link(g_cmdlist_list, iter);
253 vc_cmd_list_remove_all((vc_cmd_list_h)list, release_command);
257 SLOG(LOG_DEBUG, TAG_VCCMD, "Client destroy");
259 CMD_LIST_MUTEX_UNLOCK();
260 return VC_ERROR_NONE;
263 int vc_cmd_list_get_count(vc_cmd_list_h vc_cmd_list, int* count)
265 if (0 != __vc_cmd_get_feature_enabled()) {
266 return VC_ERROR_NOT_SUPPORTED;
268 if (0 != __vc_cmd_check_privilege()) {
269 return VC_ERROR_PERMISSION_DENIED;
272 if (NULL == vc_cmd_list || NULL == count) {
273 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Get command count : Input parameter is NULL");
274 return VC_ERROR_INVALID_PARAMETER;
277 vc_cmd_list_s* list = NULL;
278 list = (vc_cmd_list_s*)vc_cmd_list;
280 *count = g_slist_length(list->list);
282 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), count(%d)", list, *count);
284 return VC_ERROR_NONE;
287 int vc_cmd_list_add(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
289 if (0 != __vc_cmd_get_feature_enabled()) {
290 return VC_ERROR_NOT_SUPPORTED;
292 if (0 != __vc_cmd_check_privilege()) {
293 return VC_ERROR_PERMISSION_DENIED;
296 if (NULL == vc_cmd_list || NULL == vc_command) {
297 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
298 return VC_ERROR_INVALID_PARAMETER;
301 vc_cmd_list_s* list = NULL;
302 list = (vc_cmd_list_s*)vc_cmd_list;
304 vc_cmd_s* cmd = NULL;
305 cmd = (vc_cmd_s*)vc_command;
307 list->list = g_slist_append(list->list, cmd);
309 if (1 == g_slist_length(list->list)) {
313 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
315 return VC_ERROR_NONE;
318 int vc_cmd_list_remove(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
320 if (0 != __vc_cmd_get_feature_enabled()) {
321 return VC_ERROR_NOT_SUPPORTED;
323 if (0 != __vc_cmd_check_privilege()) {
324 return VC_ERROR_PERMISSION_DENIED;
327 if (NULL == vc_cmd_list || NULL == vc_command) {
328 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
329 return VC_ERROR_INVALID_PARAMETER;
332 vc_cmd_list_s* list = NULL;
333 list = (vc_cmd_list_s*)vc_cmd_list;
335 vc_cmd_s* cmd = NULL;
336 cmd = (vc_cmd_s*)vc_command;
338 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
341 iter = g_slist_find(list->list, cmd);
343 SLOG(LOG_ERROR, TAG_VCCMD, "Fail to destroy command : handle is not valid");
344 return VC_ERROR_INVALID_PARAMETER;
347 list->list = g_slist_remove_link(list->list, iter);
348 SLOG(LOG_DEBUG, TAG_VCCMD, "destroy command");
350 int len = g_slist_length(list->list);
353 else if (list->index == len)
354 list->index = len - 1;
356 return VC_ERROR_NONE;
359 static void __vc_cmd_list_remove_all_foreach(gpointer data, gpointer user_data)
361 vc_cmd_s *temp = NULL;
364 SLOG(LOG_DEBUG, TAG_VCCMD, "Free command(%p)", temp);
365 vc_cmd_destroy((vc_cmd_h)temp);
371 int vc_cmd_list_remove_all(vc_cmd_list_h vc_cmd_list, bool release_command)
373 if (0 != __vc_cmd_get_feature_enabled()) {
374 return VC_ERROR_NOT_SUPPORTED;
376 if (0 != __vc_cmd_check_privilege()) {
377 return VC_ERROR_PERMISSION_DENIED;
380 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Destroy all command");
382 if (NULL == vc_cmd_list) {
383 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
384 return VC_ERROR_INVALID_PARAMETER;
387 vc_cmd_list_s* list = NULL;
388 list = (vc_cmd_list_s*)vc_cmd_list;
390 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), release command (%s)"
391 , list, release_command ? "true" : "false");
393 if (true == release_command) {
395 g_slist_foreach(list->list, __vc_cmd_list_remove_all_foreach, NULL);
396 g_slist_free(list->list);
402 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
404 return VC_ERROR_NONE;
407 int vc_cmd_list_foreach_commands(vc_cmd_list_h vc_cmd_list, vc_cmd_list_cb callback, void* user_data)
409 if (0 != __vc_cmd_get_feature_enabled()) {
410 return VC_ERROR_NOT_SUPPORTED;
412 if (0 != __vc_cmd_check_privilege()) {
413 return VC_ERROR_PERMISSION_DENIED;
416 if (NULL == vc_cmd_list) {
417 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
418 return VC_ERROR_INVALID_PARAMETER;
421 vc_cmd_list_s* list = NULL;
422 list = (vc_cmd_list_s*)vc_cmd_list;
425 iter = g_slist_nth(list->list, 0);
426 while (NULL != iter) {
427 vc_cmd_s *temp_cmd = NULL;
428 temp_cmd = iter->data;
429 if (NULL == temp_cmd) {
430 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] No command in list");
431 return VC_ERROR_OPERATION_FAILED;
433 if (false == callback((vc_cmd_h)temp_cmd, user_data))
436 iter = g_slist_next(iter);
439 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Foreach commands Done");
441 return VC_ERROR_NONE;
444 int vc_cmd_list_filter_by_type(vc_cmd_list_h original, int type, vc_cmd_list_h* filtered)
446 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Filter by type");
448 if (0 != __vc_cmd_get_feature_enabled()) {
449 return VC_ERROR_NOT_SUPPORTED;
451 if (0 != __vc_cmd_check_privilege()) {
452 return VC_ERROR_PERMISSION_DENIED;
455 if (NULL == original) {
456 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
457 return VC_ERROR_INVALID_PARAMETER;
460 if (VC_COMMAND_TYPE_NONE >= type || VC_COMMAND_TYPE_EXCLUSIVE < type) {
461 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid type");
462 return VC_ERROR_INVALID_PARAMETER;
465 vc_cmd_list_s* list = NULL;
466 list = (vc_cmd_list_s*)original;
468 vc_cmd_list_h temp_list;
469 if (0 != vc_cmd_list_create(&temp_list)) {
470 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to list create");
471 return VC_ERROR_OPERATION_FAILED;
475 iter = g_slist_nth(list->list, 0);
476 while (NULL != iter) {
477 vc_cmd_s *iter_cmd = NULL;
478 iter_cmd = iter->data;
479 if (NULL == iter_cmd) {
480 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] No command in list");
481 return VC_ERROR_OPERATION_FAILED;
485 if (0 != vc_cmd_get_type((vc_cmd_h)iter_cmd, &iter_type)) {
486 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get command type");
490 if (iter_type == type) {
492 if (0 != vc_cmd_create(&temp_cmd)) {
493 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to create cmd");
497 memcpy(temp_cmd, iter_cmd, sizeof(vc_cmd_s));
498 if (NULL != iter_cmd->command)
499 ((vc_cmd_s *)temp_cmd)->command = strdup(iter_cmd->command);
500 if (NULL != iter_cmd->parameter)
501 ((vc_cmd_s *)temp_cmd)->parameter = strdup(iter_cmd->parameter);
503 if (0 != vc_cmd_list_add(temp_list, temp_cmd)) {
504 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to cmd list add");
505 vc_cmd_destroy(temp_cmd);
509 iter = g_slist_next(iter);
513 if (0 != vc_cmd_list_get_count(temp_list, &count)) {
514 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get count");
516 SLOG(LOG_DEBUG, TAG_VCCMD, "Filtering result : (%d) command", count);
519 *filtered = temp_list;
521 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
523 return VC_ERROR_NONE;
526 int vc_cmd_list_first(vc_cmd_list_h vc_cmd_list)
528 if (0 != __vc_cmd_get_feature_enabled()) {
529 return VC_ERROR_NOT_SUPPORTED;
531 if (0 != __vc_cmd_check_privilege()) {
532 return VC_ERROR_PERMISSION_DENIED;
535 if (NULL == vc_cmd_list) {
536 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
537 return VC_ERROR_INVALID_PARAMETER;
540 vc_cmd_list_s* list = NULL;
541 list = (vc_cmd_list_s*)vc_cmd_list;
543 if (0 == g_slist_length(list->list)) {
544 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
545 return VC_ERROR_EMPTY;
550 return VC_ERROR_NONE;
553 int vc_cmd_list_last(vc_cmd_list_h vc_cmd_list)
555 if (0 != __vc_cmd_get_feature_enabled()) {
556 return VC_ERROR_NOT_SUPPORTED;
558 if (0 != __vc_cmd_check_privilege()) {
559 return VC_ERROR_PERMISSION_DENIED;
562 if (NULL == vc_cmd_list) {
563 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
564 return VC_ERROR_INVALID_PARAMETER;
567 vc_cmd_list_s* list = NULL;
568 list = (vc_cmd_list_s*)vc_cmd_list;
570 int count = g_slist_length(list->list);
573 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
574 return VC_ERROR_EMPTY;
576 list->index = count - 1;
577 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
580 return VC_ERROR_NONE;
583 int vc_cmd_list_next(vc_cmd_list_h vc_cmd_list)
585 if (0 != __vc_cmd_get_feature_enabled()) {
586 return VC_ERROR_NOT_SUPPORTED;
588 if (0 != __vc_cmd_check_privilege()) {
589 return VC_ERROR_PERMISSION_DENIED;
592 if (NULL == vc_cmd_list) {
593 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
594 return VC_ERROR_INVALID_PARAMETER;
597 vc_cmd_list_s* list = NULL;
598 list = (vc_cmd_list_s*)vc_cmd_list;
600 int count = g_slist_length(list->list);
602 if (list->index < count - 1) {
603 list->index = list->index + 1;
604 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
606 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
607 return VC_ERROR_ITERATION_END;
610 return VC_ERROR_NONE;
613 int vc_cmd_list_prev(vc_cmd_list_h vc_cmd_list)
615 if (0 != __vc_cmd_get_feature_enabled()) {
616 return VC_ERROR_NOT_SUPPORTED;
618 if (0 != __vc_cmd_check_privilege()) {
619 return VC_ERROR_PERMISSION_DENIED;
622 if (NULL == vc_cmd_list) {
623 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
624 return VC_ERROR_INVALID_PARAMETER;
627 vc_cmd_list_s* list = NULL;
628 list = (vc_cmd_list_s*)vc_cmd_list;
630 if (list->index > 0) {
631 list->index = list->index - 1;
632 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
634 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
635 return VC_ERROR_ITERATION_END;
638 return VC_ERROR_NONE;
641 int vc_cmd_list_get_current(vc_cmd_list_h vc_cmd_list, vc_cmd_h* vc_command)
643 if (0 != __vc_cmd_get_feature_enabled()) {
644 return VC_ERROR_NOT_SUPPORTED;
646 if (0 != __vc_cmd_check_privilege()) {
647 return VC_ERROR_PERMISSION_DENIED;
650 if (NULL == vc_cmd_list || NULL == vc_command) {
651 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
652 return VC_ERROR_INVALID_PARAMETER;
655 vc_cmd_list_s* list = NULL;
656 list = (vc_cmd_list_s*)vc_cmd_list;
658 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), index (%d)", list, list->index);
660 if (0 == g_slist_length(list->list)) {
661 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list is empty");
663 return VC_ERROR_EMPTY;
666 vc_cmd_s *temp_cmd = NULL;
667 temp_cmd = g_slist_nth_data(list->list, list->index);
669 *vc_command = (vc_cmd_h)temp_cmd;
671 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] Get current command (%p)", *vc_command);
673 return VC_ERROR_NONE;
677 int vc_cmd_create(vc_cmd_h* vc_command)
679 if (0 != __vc_cmd_get_feature_enabled()) {
680 return VC_ERROR_NOT_SUPPORTED;
682 if (0 != __vc_cmd_check_privilege()) {
683 return VC_ERROR_PERMISSION_DENIED;
688 if (NULL == vc_command) {
689 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
691 return VC_ERROR_INVALID_PARAMETER;
694 vc_cmd_s* command = (vc_cmd_s*)calloc(1, sizeof(vc_cmd_s));
696 if (NULL == command) {
697 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
699 return VC_ERROR_OUT_OF_MEMORY;
705 command->type = VC_COMMAND_TYPE_NONE;
706 command->format = VC_CMD_FORMAT_FIXED;
707 command->command = NULL;
708 command->parameter = NULL;
710 command->priority = 0;
711 command->key = VC_KEY_NONE;
712 command->modifier = VC_MODIFIER_NONE;
713 command->invocation_name = NULL;
714 command->appid = NULL;
715 command->fixed = NULL;
716 command->coordinates = NULL;
718 *vc_command = (vc_cmd_h)command;
720 g_cmd_list = g_list_append(g_cmd_list, command);
722 SLOG(LOG_DEBUG, TAG_VCCMD, "[Create command][%p]", *vc_command);
725 return VC_ERROR_NONE;
728 int vc_cmd_destroy(vc_cmd_h vc_command)
730 if (0 != __vc_cmd_get_feature_enabled()) {
731 return VC_ERROR_NOT_SUPPORTED;
733 if (0 != __vc_cmd_check_privilege()) {
734 return VC_ERROR_PERMISSION_DENIED;
739 if (NULL == vc_command) {
740 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
742 return VC_ERROR_INVALID_PARAMETER;
745 vc_cmd_s* command = NULL;
746 command = (vc_cmd_s*)vc_command;
748 SLOG(LOG_DEBUG, TAG_VCCMD, "[Destroy command][%p]", command);
751 iter = g_list_find(g_cmd_list, command);
753 SLOG(LOG_ERROR, TAG_VCCMD, "Fail to command destroy : handle is not valid");
755 return VC_ERROR_INVALID_PARAMETER;
758 g_cmd_list = g_list_delete_link(g_cmd_list, iter);
760 if (command->command)
761 free(command->command);
762 command->command = NULL;
763 if (command->parameter)
764 free(command->parameter);
765 command->parameter = NULL;
766 if (command->invocation_name)
767 free(command->invocation_name);
768 command->invocation_name = NULL;
770 free(command->appid);
771 command->appid = NULL;
773 free(command->fixed);
774 command->fixed = NULL;
775 if (command->coordinates)
776 free(command->coordinates);
777 command->coordinates = NULL;
782 return VC_ERROR_NONE;
785 int vc_cmd_set_id(vc_cmd_h vc_command, int id)
787 if (0 != __vc_cmd_get_feature_enabled()) {
788 return VC_ERROR_NOT_SUPPORTED;
790 if (0 != __vc_cmd_check_privilege()) {
791 return VC_ERROR_PERMISSION_DENIED;
794 if (NULL == vc_command) {
795 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
796 return VC_ERROR_INVALID_PARAMETER;
799 vc_cmd_s* cmd = NULL;
800 cmd = (vc_cmd_s*)vc_command;
803 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set id][%p] id(%d)", vc_command, cmd->id);
805 return VC_ERROR_NONE;
808 int vc_cmd_get_id(vc_cmd_h vc_command, int* id)
810 if (0 != __vc_cmd_get_feature_enabled()) {
811 return VC_ERROR_NOT_SUPPORTED;
813 if (0 != __vc_cmd_check_privilege()) {
814 return VC_ERROR_PERMISSION_DENIED;
817 if (NULL == vc_command || NULL == id) {
818 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
819 return VC_ERROR_INVALID_PARAMETER;
822 vc_cmd_s* cmd = NULL;
823 cmd = (vc_cmd_s*)vc_command;
826 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get id][%p] id(%d)", vc_command, *id);
828 return VC_ERROR_NONE;
831 int vc_cmd_set_appid(vc_cmd_h vc_command, const char* appid)
833 if (0 != __vc_cmd_get_feature_enabled()) {
834 return VC_ERROR_NOT_SUPPORTED;
837 if (NULL == vc_command) {
838 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, vc_command is NULL");
839 return VC_ERROR_INVALID_PARAMETER;
843 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, appid is NULL");
844 return VC_ERROR_INVALID_PARAMETER;
847 vc_cmd_s* cmd = NULL;
848 cmd = (vc_cmd_s*)vc_command;
853 cmd->appid = strdup(appid);
855 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set appid][%p] appid(%s)", vc_command, cmd->appid);
856 return VC_ERROR_NONE;
859 int vc_cmd_get_appid(vc_cmd_h vc_command, char** appid)
861 if (0 != __vc_cmd_get_feature_enabled()) {
862 return VC_ERROR_NOT_SUPPORTED;
865 if (NULL == vc_command || NULL == appid) {
866 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
867 return VC_ERROR_INVALID_PARAMETER;
870 vc_cmd_s* cmd = NULL;
871 cmd = (vc_cmd_s*)vc_command;
874 *appid = strdup(gettext(cmd->appid));
878 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get appid][%p] appid(%s)", vc_command, *appid);
880 return VC_ERROR_NONE;
883 int vc_cmd_set_command(vc_cmd_h vc_command, const char* command)
885 if (0 != __vc_cmd_get_feature_enabled()) {
886 return VC_ERROR_NOT_SUPPORTED;
888 if (0 != __vc_cmd_check_privilege()) {
889 return VC_ERROR_PERMISSION_DENIED;
892 if (NULL == vc_command || NULL == command) {
893 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
894 return VC_ERROR_INVALID_PARAMETER;
897 vc_cmd_s* cmd = NULL;
898 cmd = (vc_cmd_s*)vc_command;
903 cmd->command = strdup(command);
905 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set command][%p] Command(%s)", vc_command, cmd->command);
907 return VC_ERROR_NONE;
910 int vc_cmd_get_command(vc_cmd_h vc_command, char** command)
912 if (0 != __vc_cmd_get_feature_enabled()) {
913 return VC_ERROR_NOT_SUPPORTED;
915 if (0 != __vc_cmd_check_privilege()) {
916 return VC_ERROR_PERMISSION_DENIED;
919 if (NULL == vc_command || NULL == command) {
920 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
921 return VC_ERROR_INVALID_PARAMETER;
924 vc_cmd_s* cmd = NULL;
925 cmd = (vc_cmd_s*)vc_command;
928 *command = strdup(gettext(cmd->command));
932 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get command][%p] Command(%s)", vc_command, *command);
934 return VC_ERROR_NONE;
937 int vc_cmd_set_unfixed_command(vc_cmd_h vc_command, const char* command)
939 if (0 != __vc_cmd_get_feature_enabled()) {
940 return VC_ERROR_NOT_SUPPORTED;
942 if (0 != __vc_cmd_check_privilege()) {
943 return VC_ERROR_PERMISSION_DENIED;
946 if (NULL == vc_command || NULL == command) {
947 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
948 return VC_ERROR_INVALID_PARAMETER;
951 vc_cmd_s* cmd = NULL;
952 cmd = (vc_cmd_s*)vc_command;
955 free(cmd->parameter);
956 cmd->parameter = NULL;
957 cmd->parameter = strdup(command);
958 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set unfixed command][%p] unfixed command(%s)", vc_command, cmd->parameter);
960 return VC_ERROR_NONE;
963 int vc_cmd_get_unfixed_command(vc_cmd_h vc_command, char** command)
965 if (0 != __vc_cmd_get_feature_enabled()) {
966 return VC_ERROR_NOT_SUPPORTED;
969 if (NULL == vc_command || NULL == command) {
970 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
971 return VC_ERROR_INVALID_PARAMETER;
974 vc_cmd_s* cmd = NULL;
975 cmd = (vc_cmd_s*)vc_command;
978 *command = strdup(gettext(cmd->parameter));
982 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get unfixed command][%p] unfixed command(%s)", vc_command, *command);
984 return VC_ERROR_NONE;
987 int vc_cmd_set_fixed_command(vc_cmd_h vc_command, const char* fixed)
989 if (0 != __vc_cmd_get_feature_enabled()) {
990 return VC_ERROR_NOT_SUPPORTED;
993 if (NULL == vc_command) {
994 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
995 return VC_ERROR_INVALID_PARAMETER;
999 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, fixed is NULL");
1000 return VC_ERROR_INVALID_PARAMETER;
1003 vc_cmd_s* cmd = NULL;
1004 cmd = (vc_cmd_s*)vc_command;
1009 cmd->fixed = strdup(fixed);
1011 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set parameter][%p] fixed command(%s)", vc_command, cmd->fixed);
1012 return VC_ERROR_NONE;
1015 int vc_cmd_get_fixed_command(vc_cmd_h vc_command, char** fixed)
1017 if (0 != __vc_cmd_get_feature_enabled()) {
1018 return VC_ERROR_NOT_SUPPORTED;
1021 if (NULL == vc_command || NULL == fixed) {
1022 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
1023 return VC_ERROR_INVALID_PARAMETER;
1026 vc_cmd_s* cmd = NULL;
1027 cmd = (vc_cmd_s*)vc_command;
1030 *fixed = strdup(gettext(cmd->fixed));
1034 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get fixed command][%p] fixed command(%s)", vc_command, *fixed);
1036 return VC_ERROR_NONE;
1039 int vc_cmd_set_invocation_name(vc_cmd_h vc_command, const char* invocation_name)
1041 if (0 != __vc_cmd_get_feature_enabled()) {
1042 return VC_ERROR_NOT_SUPPORTED;
1045 if (NULL == vc_command) {
1046 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, vc_command is NULL");
1047 return VC_ERROR_INVALID_PARAMETER;
1050 if (NULL == invocation_name) {
1051 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, invocation_name is NULL");
1052 return VC_ERROR_INVALID_PARAMETER;
1055 vc_cmd_s* cmd = NULL;
1056 cmd = (vc_cmd_s*)vc_command;
1058 if (cmd->invocation_name)
1059 free(cmd->invocation_name);
1060 cmd->invocation_name = NULL;
1061 cmd->invocation_name = strdup(invocation_name);
1063 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set invocation name][%p] invocation_name(%s)", vc_command, cmd->invocation_name);
1064 return VC_ERROR_NONE;
1067 int vc_cmd_get_invocation_name(vc_cmd_h vc_command, char** invocation_name)
1069 if (0 != __vc_cmd_get_feature_enabled()) {
1070 return VC_ERROR_NOT_SUPPORTED;
1073 if (NULL == vc_command || NULL == invocation_name) {
1074 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
1075 return VC_ERROR_INVALID_PARAMETER;
1078 vc_cmd_s* cmd = NULL;
1079 cmd = (vc_cmd_s*)vc_command;
1081 if (cmd->invocation_name)
1082 *invocation_name = strdup(gettext(cmd->invocation_name));
1084 *invocation_name = NULL;
1086 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get invocation name][%p] invocation_name(%s)", vc_command, *invocation_name);
1087 return VC_ERROR_NONE;
1090 int vc_cmd_set_type(vc_cmd_h vc_command, int type)
1092 if (0 != __vc_cmd_get_feature_enabled()) {
1093 return VC_ERROR_NOT_SUPPORTED;
1095 if (0 != __vc_cmd_check_privilege()) {
1096 return VC_ERROR_PERMISSION_DENIED;
1099 if (NULL == vc_command) {
1100 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1101 return VC_ERROR_INVALID_PARAMETER;
1104 vc_cmd_s* cmd = NULL;
1105 cmd = (vc_cmd_s*)vc_command;
1109 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set type][%p] type(%d)", vc_command, cmd->type);
1111 return VC_ERROR_NONE;
1114 int vc_cmd_get_type(vc_cmd_h vc_command, int* type)
1116 if (0 != __vc_cmd_get_feature_enabled()) {
1117 return VC_ERROR_NOT_SUPPORTED;
1119 if (0 != __vc_cmd_check_privilege()) {
1120 return VC_ERROR_PERMISSION_DENIED;
1123 if (NULL == vc_command || NULL == type) {
1124 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1125 return VC_ERROR_INVALID_PARAMETER;
1128 vc_cmd_s* cmd = NULL;
1129 cmd = (vc_cmd_s*)vc_command;
1133 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get type][%p] type(%d)", vc_command, *type);
1135 return VC_ERROR_NONE;
1138 int vc_cmd_set_format(vc_cmd_h vc_command, int format)
1140 if (0 != __vc_cmd_get_feature_enabled()) {
1141 return VC_ERROR_NOT_SUPPORTED;
1144 if (NULL == vc_command) {
1145 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1146 return VC_ERROR_INVALID_PARAMETER;
1149 vc_cmd_s* cmd = NULL;
1150 cmd = (vc_cmd_s*)vc_command;
1152 cmd->format = format;
1154 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set format][%p] format(%d)", vc_command, format);
1156 return VC_ERROR_NONE;
1159 int vc_cmd_get_format(vc_cmd_h vc_command, int* format)
1161 if (0 != __vc_cmd_get_feature_enabled()) {
1162 return VC_ERROR_NOT_SUPPORTED;
1165 if (NULL == vc_command || NULL == format) {
1166 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1167 return VC_ERROR_INVALID_PARAMETER;
1170 vc_cmd_s* cmd = NULL;
1171 cmd = (vc_cmd_s*)vc_command;
1173 *format = cmd->format;
1175 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get format][%p] format(%d)", vc_command, *format);
1177 return VC_ERROR_NONE;
1180 int vc_cmd_set_pid(vc_cmd_h vc_command, int pid)
1182 if (0 != __vc_cmd_get_feature_enabled()) {
1183 return VC_ERROR_NOT_SUPPORTED;
1185 if (0 != __vc_cmd_check_privilege()) {
1186 return VC_ERROR_PERMISSION_DENIED;
1189 if (NULL == vc_command) {
1190 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1191 return VC_ERROR_INVALID_PARAMETER;
1194 vc_cmd_s* cmd = NULL;
1195 cmd = (vc_cmd_s*)vc_command;
1199 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set pid][%p] pid(%d)", vc_command, cmd->pid);
1201 return VC_ERROR_NONE;
1204 int vc_cmd_get_pid(vc_cmd_h vc_command, int* pid)
1206 if (0 != __vc_cmd_get_feature_enabled()) {
1207 return VC_ERROR_NOT_SUPPORTED;
1209 if (0 != __vc_cmd_check_privilege()) {
1210 return VC_ERROR_PERMISSION_DENIED;
1213 if (NULL == vc_command || NULL == pid) {
1214 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1215 return VC_ERROR_INVALID_PARAMETER;
1218 vc_cmd_s* cmd = NULL;
1219 cmd = (vc_cmd_s*)vc_command;
1223 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get pid][%p] pid(%d)", vc_command, *pid);
1225 return VC_ERROR_NONE;
1228 int vc_cmd_set_domain(vc_cmd_h vc_command, int domain)
1230 if (0 != __vc_cmd_get_feature_enabled()) {
1231 return VC_ERROR_NOT_SUPPORTED;
1233 if (0 != __vc_cmd_check_privilege()) {
1234 return VC_ERROR_PERMISSION_DENIED;
1237 if (NULL == vc_command) {
1238 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1239 return VC_ERROR_INVALID_PARAMETER;
1242 vc_cmd_s* cmd = NULL;
1243 cmd = (vc_cmd_s*)vc_command;
1245 cmd->domain = domain;
1247 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set domain] domain : %d", domain);
1249 return VC_ERROR_NONE;
1252 int vc_cmd_get_domain(vc_cmd_h vc_command, int* domain)
1254 if (0 != __vc_cmd_get_feature_enabled()) {
1255 return VC_ERROR_NOT_SUPPORTED;
1257 if (0 != __vc_cmd_check_privilege()) {
1258 return VC_ERROR_PERMISSION_DENIED;
1261 if (NULL == vc_command || NULL == domain) {
1262 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1263 return VC_ERROR_INVALID_PARAMETER;
1266 vc_cmd_s* cmd = NULL;
1267 cmd = (vc_cmd_s*)vc_command;
1269 *domain = cmd->domain;
1271 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get domain] domain : %d", *domain);
1273 return VC_ERROR_NONE;
1277 * @brief Sets key value of command.
1279 * @param[in] vc_command Command handle
1280 * @param[in] key key value
1281 * @param[in] modifier modifier value
1283 * @return 0 on success, otherwise a negative error value
1284 * @retval #VC_ERROR_NONE Successful
1285 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1287 * @see vc_cmd_get_result_key()
1289 int vc_cmd_set_result_key(vc_cmd_h vc_command, int key, int modifier)
1291 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Set result key");
1293 if (NULL == vc_command) {
1294 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1295 return VC_ERROR_INVALID_PARAMETER;
1298 vc_cmd_s* cmd = NULL;
1299 cmd = (vc_cmd_s*)vc_command;
1301 SLOG(LOG_DEBUG, TAG_VCCMD, "key : %d, modifier : %d", key, modifier);
1304 cmd->modifier = modifier;
1306 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1308 return VC_ERROR_NONE;
1312 * @brief Gets key value of command.
1314 * @param[in] vc_command Command handle
1315 * @param[out] key key value
1316 * @param[out] modifier modifier value
1318 * @return 0 on success, otherwise a negative error value
1319 * @retval #VC_ERROR_NONE Successful
1320 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1322 * @see vc_cmd_add_result_key()
1324 int vc_cmd_get_result_key(vc_cmd_h vc_command, int* key, int* modifier)
1326 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Get result key");
1328 if (NULL == vc_command || NULL == key || NULL == modifier) {
1329 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1330 return VC_ERROR_INVALID_PARAMETER;
1333 vc_cmd_s* cmd = NULL;
1334 cmd = (vc_cmd_s*)vc_command;
1337 *modifier = cmd->modifier;
1339 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1341 return VC_ERROR_NONE;
1344 int vc_cmd_print_list(vc_cmd_list_h vc_cmd_list)
1346 if (NULL == vc_cmd_list) {
1350 vc_cmd_list_s* list = NULL;
1351 list = (vc_cmd_list_s*)vc_cmd_list;
1353 SLOG(LOG_DEBUG, TAG_VCCMD, "@ Command List @");
1354 SLOG(LOG_DEBUG, TAG_VCCMD, "[List][%p]", list);
1357 GSList *iter = NULL;
1358 iter = g_slist_nth(list->list, 0);
1359 while (NULL != iter) {
1360 vc_cmd_s *cmd = NULL;
1363 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] No command in list");
1364 return VC_ERROR_OPERATION_FAILED;
1366 SLOG(LOG_DEBUG, TAG_VCCMD, " [%d][%p] PID(%d) ID(%d) Type(%d) Format(%d) Command(%s) Param(%s) Appid(%s) Invocation(%s) Fixed(%s)",
1367 i++, cmd, cmd->pid, cmd->index, cmd->type, cmd->format, cmd->command, cmd->parameter, cmd->appid, cmd->invocation_name, cmd->fixed);
1369 iter = g_slist_next(iter);
1372 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1374 return VC_ERROR_NONE;
1377 int vc_cmd_get_nlu_json(vc_cmd_h vc_cmd, char** json)
1379 if (0 != __vc_cmd_get_feature_enabled()) {
1380 return VC_ERROR_NOT_SUPPORTED;
1383 if (NULL == vc_cmd || NULL == json) {
1384 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] NULL parameter");
1385 return VC_ERROR_INVALID_PARAMETER;
1388 vc_cmd_s* cmd = NULL;
1389 cmd = (vc_cmd_s*)vc_cmd;
1391 if (VC_CMD_FORMAT_ACTION != cmd->format) {
1392 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not Action format");
1393 return VC_ERROR_INVALID_PARAMETER;
1396 if (0 != vc_info_parser_get_nlu_result(json)) {
1397 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get nlu result");
1398 return VC_ERROR_OPERATION_FAILED;
1401 return VC_ERROR_NONE;
1404 static void __vc_cmd_regex_deinit(int num_regex)
1406 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Start Deinitialize regex @@@");
1409 for (i = 0; num_regex > i; i++) {
1413 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1416 static int __vc_cmd_regex_init()
1418 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Initialize regular expression @@@");
1420 int cflags = REG_EXTENDED | REG_ICASE;
1426 vc_config_mgr_get_default_language(&lang);
1428 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
1429 return VC_ERROR_OPERATION_FAILED;
1432 if (!strcmp("en_US", lang)) {
1434 } else if (!strcmp("ko_KR", lang)) {
1440 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not supported language type");
1441 return VC_ERROR_INVALID_LANGUAGE;
1447 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ lang type > %d @@@", lang_type);
1449 re_syntax_options = RE_SYNTAX_POSIX_EXTENDED;
1451 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s" , TIME_ABS1_REGEX[lang_type]);
1452 ret = regcomp(®[0], TIME_ABS1_REGEX[lang_type], cflags);
1454 regerror(ret, ®[0], errStr, sizeof(errStr));
1456 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1457 return VC_ERROR_OPERATION_FAILED;
1460 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_ABS2_REGEX[lang_type]);
1461 ret = regcomp(®[1], TIME_ABS2_REGEX[lang_type], cflags);
1463 regerror(ret, ®[1], errStr, sizeof(errStr));
1464 __vc_cmd_regex_deinit(1);
1466 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1467 return VC_ERROR_OPERATION_FAILED;
1470 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_ABS3_REGEX[lang_type]);
1471 ret = regcomp(®[2], TIME_ABS3_REGEX[lang_type], cflags);
1473 regerror(ret, ®[2], errStr, sizeof(errStr));
1474 __vc_cmd_regex_deinit(2);
1476 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1477 return VC_ERROR_OPERATION_FAILED;
1480 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL1_REGEX[lang_type]);
1481 ret = regcomp(®[3], TIME_REL1_REGEX[lang_type], cflags);
1483 regerror(ret, ®[3], errStr, sizeof(errStr));
1484 __vc_cmd_regex_deinit(3);
1486 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1487 return VC_ERROR_OPERATION_FAILED;
1490 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL2_REGEX[lang_type]);
1491 ret = regcomp(®[4], TIME_REL2_REGEX[lang_type], cflags);
1493 regerror(ret, ®[4], errStr, sizeof(errStr));
1494 __vc_cmd_regex_deinit(4);
1496 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1497 return VC_ERROR_OPERATION_FAILED;
1500 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL3_REGEX[lang_type]);
1501 ret = regcomp(®[5], TIME_REL3_REGEX[lang_type], cflags);
1503 regerror(ret, ®[5], errStr, sizeof(errStr));
1504 __vc_cmd_regex_deinit(5);
1506 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1507 return VC_ERROR_OPERATION_FAILED;
1510 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_PHR_REGEX[lang_type]);
1511 ret = regcomp(®[6], TIME_PHR_REGEX[lang_type], cflags);
1513 regerror(ret, ®[6], errStr, sizeof(errStr));
1514 __vc_cmd_regex_deinit(6);
1516 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1517 return VC_ERROR_OPERATION_FAILED;
1520 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS1_REGEX[lang_type]);
1521 ret = regcomp(®[7], DATE_ABS1_REGEX[lang_type], cflags);
1523 regerror(ret, ®[7], errStr, sizeof(errStr));
1524 __vc_cmd_regex_deinit(7);
1526 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1527 return VC_ERROR_OPERATION_FAILED;
1530 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS2_REGEX[lang_type]);
1531 ret = regcomp(®[8], DATE_ABS2_REGEX[lang_type], cflags);
1533 regerror(ret, ®[8], errStr, sizeof(errStr));
1534 __vc_cmd_regex_deinit(8);
1536 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1537 return VC_ERROR_OPERATION_FAILED;
1540 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS3_REGEX[lang_type]);
1541 ret = regcomp(®[9], DATE_ABS3_REGEX[lang_type], cflags);
1543 regerror(ret, ®[9], errStr, sizeof(errStr));
1544 __vc_cmd_regex_deinit(9);
1546 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1547 return VC_ERROR_OPERATION_FAILED;
1550 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_PHR1_REGEX[lang_type]);
1551 ret = regcomp(®[10], DATE_PHR1_REGEX[lang_type], cflags);
1553 regerror(ret, ®[10], errStr, sizeof(errStr));
1554 __vc_cmd_regex_deinit(10);
1556 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1557 return VC_ERROR_OPERATION_FAILED;
1560 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_PHR2_REGEX[lang_type]);
1561 ret = regcomp(®[11], DATE_PHR2_REGEX[lang_type], cflags);
1563 regerror(ret, ®[11], errStr, sizeof(errStr));
1564 __vc_cmd_regex_deinit(11);
1566 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1567 return VC_ERROR_OPERATION_FAILED;
1570 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1572 return VC_ERROR_NONE;
1575 static void __vc_cmd_add_year(struct tm *td, int year)
1577 td->tm_year += year;
1580 static void __vc_cmd_add_mon(struct tm *td, int mon)
1584 mon = td->tm_mon + mon;
1588 __vc_cmd_add_year(td, year);
1591 td->tm_mon = mon % 12;
1594 static void __vc_cmd_add_mday(struct tm *td, int mday)
1596 int max_day[12] = {31, 28, 31, 30, 31, 30, 31, 30, 30, 31, 30, 31};
1597 int year = td->tm_year + 1900;
1601 if ((0 == year % 4 && 0 != year % 100) || 0 == year % 400) max_day[1] = 29;
1603 mday = td->tm_mday + mday;
1605 for (mon = td->tm_mon; mday >= max_day[mon % 12]; mon++) {
1606 mday -= max_day[mon % 12];
1608 if (11 == mon % 12) {
1611 if ((0 == year % 4 && 0 != year % 100) || 0 == year % 400) {
1619 mon = mon - td->tm_mon;
1622 __vc_cmd_add_mon(td, mon);
1628 static void __vc_cmd_add_hour(struct tm *td, int hour)
1632 hour = td->tm_hour + hour;
1636 __vc_cmd_add_mday(td, day);
1639 td->tm_hour = hour % 24;
1642 static void __vc_cmd_add_min(struct tm *td, int min)
1646 min = td->tm_min + min;
1650 __vc_cmd_add_hour(td, hour);
1653 td->tm_min = min % 60;
1656 static void __copy_struct_tm(struct tm *des, struct tm *src)
1658 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Start to copy struct tm @@@");
1660 des->tm_sec = src->tm_sec;
1661 des->tm_min = src->tm_min;
1662 des->tm_hour = src->tm_hour;
1663 des->tm_mday = src->tm_mday;
1664 des->tm_mon = src->tm_mon;
1665 des->tm_year = src->tm_year;
1666 des->tm_wday = src->tm_wday;
1667 des->tm_yday = src->tm_yday;
1668 des->tm_isdst = src->tm_isdst;
1670 des->tm_gmtoff = src->tm_gmtoff;
1671 des->tm_zone = src->tm_zone;
1674 static void __update_data_sidx(int idx)
1676 if (0 > g_data_sidx || idx < g_data_sidx) g_data_sidx = idx;
1679 static void __update_data_eidx(int idx)
1681 if (0 > g_data_eidx || idx > g_data_eidx) g_data_eidx = idx;
1684 static int __vc_cmd_tphrase_check(const char *str, struct tm *td, int *exist)
1686 regmatch_t pmatch[3];
1692 ret = regexec(®[6], str, 3, pmatch, 0);
1695 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1697 if (12 < td->tm_hour) {
1698 __vc_cmd_add_mday(td, 1);
1704 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1706 __vc_cmd_add_mday(td, 1);
1711 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1713 __update_data_sidx(pmatch[0].rm_so);
1714 __update_data_eidx(pmatch[0].rm_eo);
1717 return VC_ERROR_NONE;
1720 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1721 return VC_ERROR_NONE;
1724 static int __vc_cmd_trelative_check(const char *str, struct tm *td, int *exist)
1726 regmatch_t pmatch[2];
1734 char *tempstr = NULL;
1737 ret = regexec(®[3], str, 1, pmatch, 0);
1739 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", pmatch[0].rm_eo - pmatch[0].rm_so, str+pmatch[0].rm_so);
1742 sidx = pmatch[0].rm_so;
1743 eidx = pmatch[0].rm_eo;
1745 ret = regexec(®[4], str, 2, pmatch, 0);
1747 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1750 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1751 return VC_ERROR_OPERATION_FAILED;
1753 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1755 if (NULL == tempstr) {
1756 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1757 return VC_ERROR_OUT_OF_MEMORY;
1760 hour = atoi(tempstr);
1765 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1767 if (pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1768 if (pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1771 ret = regexec(®[5], str, 2, pmatch, 0);
1773 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1776 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1777 return VC_ERROR_OPERATION_FAILED;
1779 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1781 if (NULL == tempstr) {
1782 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1783 return VC_ERROR_OUT_OF_MEMORY;
1786 min = atoi(tempstr);
1791 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1793 if (pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1794 if (pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1797 if (hour < 0 && min < 0) {
1798 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1799 return VC_ERROR_NONE;
1802 hour = 0 > hour ? 0 : hour;
1803 min = 0 > min ? 0 : min;
1805 min = min + (hour * 60);
1807 __vc_cmd_add_min(td, min);
1810 __update_data_sidx(sidx);
1811 __update_data_eidx(eidx);
1814 return VC_ERROR_NONE;
1817 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1818 return VC_ERROR_NONE;
1821 static int __vc_cmd_tabsolute_check(const char *str, struct tm *td, int *exist)
1823 regmatch_t pmatch[5];
1832 char *tempstr = NULL;
1835 ret = regexec(®[0], str, 5, pmatch, 0);
1837 for (idx = 1; 5 > idx && 0 >= pmatch[idx].rm_eo - pmatch[idx].rm_so; idx++);
1841 sidx = pmatch[0].rm_so;
1842 eidx = pmatch[0].rm_eo;
1845 ret = regexec(®[1], str, 2, pmatch, 0);
1847 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1850 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1851 return VC_ERROR_OPERATION_FAILED;
1853 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1855 if (NULL == tempstr) {
1856 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1857 return VC_ERROR_OUT_OF_MEMORY;
1860 hour = atoi(tempstr);
1863 hour = hour + 12 * flag;
1865 if (12 == hour) hour = 0;
1866 else if (24 == hour) hour = 12;
1869 if (0 > hour || 24 <= hour || (0 == flag && 12 < hour)) {
1870 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
1873 return VC_ERROR_NONE;
1879 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1881 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1882 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1883 } else if (0 < flag) {
1884 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
1885 return VC_ERROR_NONE;
1888 ret = regexec(®[2], str, 2, pmatch, 0);
1891 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1893 tempstr = strndup(str + pmatch[idx].rm_so, (size_t)len);
1895 if (NULL == tempstr) {
1896 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1897 return VC_ERROR_OUT_OF_MEMORY;
1900 min = atoi(tempstr);
1902 if (0 > min || 60 <= min) {
1903 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
1906 return VC_ERROR_NONE;
1918 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", pmatch[0].rm_eo - pmatch[0].rm_so, str + pmatch[0].rm_so);
1919 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1920 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1923 if (0 > hour && 0 > min) {
1924 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1925 return VC_ERROR_NONE;
1928 if (0 <= min && 0 <= hour) {
1929 if (hour < td->tm_hour || (hour == td->tm_hour && min <= td->tm_min)) __vc_cmd_add_mday(td, 1);
1933 } else if (0 <= min) {
1935 vc_config_mgr_get_default_language(&lang);
1937 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
1938 return VC_ERROR_OPERATION_FAILED;
1941 if (!strcmp("en_US", lang)) {
1942 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
1945 return VC_ERROR_NONE;
1947 if (min <= td->tm_min) __vc_cmd_add_hour(td, 1);
1954 if (hour <= td->tm_hour) __vc_cmd_add_mday(td, 1);
1962 __update_data_sidx(sidx);
1963 __update_data_eidx(eidx);
1966 return VC_ERROR_NONE;
1969 static int __vc_cmd_dphrase_check(const char *str, struct tm *td, int *exist)
1971 regmatch_t pmatch[10];
1977 ret = regexec(®[10], str, 5, pmatch, 0);
1979 for (idx = 1; 5 > idx && 0 >= pmatch[idx].rm_eo - pmatch[idx].rm_so; idx++);
1981 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1983 td->tm_year = td_now.tm_year;
1984 td->tm_mon = td_now.tm_mon;
1985 td->tm_mday = td_now.tm_mday;
1987 __vc_cmd_add_mday(td, idx - 1);
1989 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1991 __update_data_sidx(pmatch[0].rm_so);
1992 __update_data_eidx(pmatch[0].rm_eo);
1995 return VC_ERROR_NONE;
1998 ret = regexec(®[11], str, 10, pmatch, 0);
2000 for (idx = 1; 10 > idx; idx++) {
2001 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
2006 td->tm_year = td_now.tm_year;
2007 td->tm_mon = td_now.tm_mon;
2008 td->tm_mday = td_now.tm_mday;
2010 __vc_cmd_add_mday(td, idx + 1);
2012 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2014 __update_data_sidx(pmatch[0].rm_so);
2015 __update_data_eidx(pmatch[0].rm_eo);
2018 return VC_ERROR_NONE;
2021 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
2022 return VC_ERROR_NONE;
2025 static int __vc_cmd_dabsolute_check(const char *str, struct tm *td, int *exist)
2027 regmatch_t pmatch[13];
2038 char *tempstr = NULL;
2041 ret = regexec(®[9], str, 2, pmatch, 0);
2043 len = pmatch[1].rm_eo - pmatch[1].rm_so;
2046 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
2047 return VC_ERROR_OPERATION_FAILED;
2049 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
2051 if (NULL == tempstr) {
2052 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
2053 return VC_ERROR_OUT_OF_MEMORY;
2056 day = atoi(tempstr);
2061 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2063 sidx = pmatch[0].rm_so;
2064 eidx = pmatch[0].rm_eo;
2066 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
2067 return VC_ERROR_NONE;
2070 ret = regexec(®[8], str, 13, pmatch, 0);
2072 for (idx = 1; 13 > idx; idx++) {
2073 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
2083 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2085 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
2086 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
2089 vc_config_mgr_get_default_language(&lang);
2091 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
2092 return VC_ERROR_OPERATION_FAILED;
2095 if (!strcmp("en_US", lang)) {
2096 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
2099 return VC_ERROR_NONE;
2108 ret = regexec(®[7], str, 3, pmatch, 0);
2110 if (!m_flag) return -1;
2112 len = pmatch[2].rm_eo - pmatch[2].rm_so;
2115 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
2116 return VC_ERROR_OPERATION_FAILED;
2118 tempstr = strndup(str + pmatch[2].rm_so, (size_t)len);
2120 if (NULL == tempstr) {
2121 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
2122 return VC_ERROR_OUT_OF_MEMORY;
2125 year = atoi(tempstr);
2126 year = 1900 < year ? year - 1900 : year + 100;
2132 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2134 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
2135 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
2140 if (0 > g_time_flag) {
2144 } else if (2 == g_time_flag) {
2145 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
2146 return VC_ERROR_NONE;
2149 int max_day[12] = {31, 28, 31, 30, 31, 30, 31, 30, 30, 31, 30, 31};
2150 if ((0 == (year + 1900) % 4 && 0 != (year + 1900) % 100) || 0 == (year + 1900) % 400) max_day[1] = 29;
2152 if (max_day[mon] < day || 1 > day) {
2153 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incoming sentence is weird");
2154 return VC_ERROR_NONE;
2163 if (day < td_now.tm_mday) __vc_cmd_add_mon(td, 1);
2165 if (mon < td_now.tm_mon) __vc_cmd_add_year(td, 1);
2166 else if (mon == td_now.tm_mon && day < td_now.tm_mday) __vc_cmd_add_year(td, 1);
2170 __update_data_sidx(sidx);
2171 __update_data_eidx(eidx);
2174 return VC_ERROR_NONE;
2177 static int __vc_cmd_time_check(const char *str, struct tm *td)
2179 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Check time value in string \"%s\"", str);
2184 ret = __vc_cmd_tphrase_check(str, td, &exist);
2188 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2190 } else if (VC_ERROR_NONE != ret) {
2191 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred > (%d)", ret);
2195 ret = __vc_cmd_trelative_check(str, td, &exist);
2199 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2201 } else if (VC_ERROR_NONE != ret) {
2202 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred > (%d)", ret);
2206 ret = __vc_cmd_tabsolute_check(str, td, &exist);
2210 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2212 } else if (VC_ERROR_NONE != ret) {
2213 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred > (%d)", ret);
2217 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ There is no time value");
2218 return VC_ERROR_NONE;
2221 static int __vc_cmd_date_check(const char *str, struct tm *td)
2223 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Check date value in string \"%s\"", str);
2228 ret = __vc_cmd_dphrase_check(str, td, &exist);
2232 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Date value is exist");
2234 } else if (VC_ERROR_NONE != ret) {
2235 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred > (%d)", ret);
2239 ret = __vc_cmd_dabsolute_check(str, td, &exist);
2243 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Date value is exist");
2245 } else if (VC_ERROR_NONE != ret) {
2246 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred > (%d)", ret);
2250 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ There is no date value");
2251 return VC_ERROR_NONE;
2254 int vc_cmd_get_datetime(const char *text, time_t *result, char **remain)
2256 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Get timestamp data");
2259 const char *day_name[7] = {"Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"};
2262 if (NULL == text || NULL == result || NULL == remain) {
2263 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter");
2264 return VC_ERROR_INVALID_PARAMETER;
2268 ret = __vc_cmd_regex_init();
2269 if (VC_ERROR_NONE != ret) {
2270 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] initialize regex failed");
2274 g_data_sidx = g_data_eidx = -1;
2277 localtime_r(&t_now, &td_now);
2278 SLOG(LOG_DEBUG, TAG_VCCMD, "Current timestamp = %d", (int)t_now);
2280 __copy_struct_tm(&td, &td_now);
2281 SLOG(LOG_DEBUG, TAG_VCCMD, "%d-%d-%d (%s), %d:%d:%d",
2282 td.tm_year + 1900, td.tm_mon + 1, td.tm_mday, day_name[td.tm_wday], td.tm_hour, td.tm_min, td.tm_sec);
2284 g_time_flag = g_date_flag = -1;
2286 ret = __vc_cmd_time_check(text, &td);
2287 if (VC_ERROR_NONE != ret) {
2288 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred in the check > (%d)", ret);
2292 ret = __vc_cmd_date_check(text, &td);
2293 if (VC_ERROR_NONE != ret) {
2294 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occurred in the check > (%d)", ret);
2298 __vc_cmd_regex_deinit(12);
2300 if (g_time_flag > 0 || g_date_flag > 0) {
2301 *result = mktime(&td);
2303 SLOG(LOG_DEBUG, TAG_VCCMD, "Timestamp in the text = %ld", *result);
2304 SLOG(LOG_DEBUG, TAG_VCCMD, "%d-%d-%d (%s), %d:%d:%d",
2305 td.tm_year + 1900, td.tm_mon + 1, td.tm_mday, day_name[td.tm_wday], td.tm_hour, td.tm_min, td.tm_sec);
2307 *remain = (char *)calloc(sizeof(char), (strlen(text) + 1 - g_data_eidx + g_data_sidx));
2309 if (NULL == *remain) {
2310 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Out of memory error");
2311 return VC_ERROR_OUT_OF_MEMORY;
2314 strncpy(*remain, text, g_data_sidx);
2315 strncat(*remain, text + g_data_eidx, strlen(text) - g_data_eidx);
2317 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no data in the text");
2320 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
2322 return VC_ERROR_NONE;