2 * Copyright (c) 2011-2015 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include <cynara-client.h>
18 #include <cynara-error.h>
19 #include <cynara-session.h>
22 #include <system_info.h>
24 #include "vc_command.h"
26 #include "voice_control_command.h"
27 #include "voice_control_command_expand.h"
28 #include "voice_control_common.h"
29 #include "voice_control_key_defines.h"
31 static int g_feature_enabled = -1;
33 static int g_privilege_allowed = -1;
34 static cynara *p_cynara = NULL;
36 static int __vc_cmd_get_feature_enabled()
38 if (0 == g_feature_enabled) {
39 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
40 return VC_ERROR_NOT_SUPPORTED;
41 } else if (-1 == g_feature_enabled) {
42 bool vc_supported = false;
43 bool mic_supported = false;
44 if (0 == system_info_get_platform_bool(VC_FEATURE_PATH, &vc_supported)) {
45 if (0 == system_info_get_platform_bool(VC_MIC_FEATURE_PATH, &mic_supported)) {
46 if (false == vc_supported || false == mic_supported) {
47 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
48 g_feature_enabled = 0;
49 return VC_ERROR_NOT_SUPPORTED;
52 g_feature_enabled = 1;
54 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
55 return VC_ERROR_NOT_SUPPORTED;
58 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
59 return VC_ERROR_NOT_SUPPORTED;
66 static int __check_privilege_initialize()
68 int ret = cynara_initialize(&p_cynara, NULL);
69 if (CYNARA_API_SUCCESS != ret)
70 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to initialize");
72 return ret == CYNARA_API_SUCCESS;
75 static int __check_privilege(const char* uid, const char * privilege)
78 char smack_label[1024] = "/proc/self/attr/current";
84 fp = fopen(smack_label, "r");
86 if (fread(smack_label, 1, sizeof(smack_label), fp) <= 0)
87 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to fread");
93 char *session = cynara_session_from_pid(pid);
94 int ret = cynara_check(p_cynara, smack_label, session, uid, privilege);
95 SLOG(LOG_DEBUG, TAG_VCCMD, "[Client]cynara_check returned %d(%s)", ret, (CYNARA_API_ACCESS_ALLOWED == ret) ? "Allowed" : "Denied");
99 if (ret != CYNARA_API_ACCESS_ALLOWED)
104 static void __check_privilege_deinitialize()
107 cynara_finish(p_cynara);
111 static int __vc_cmd_check_privilege()
116 if (0 == g_privilege_allowed) {
117 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Permission is denied");
118 return VC_ERROR_PERMISSION_DENIED;
119 } else if (-1 == g_privilege_allowed) {
120 if (false == __check_privilege_initialize()){
121 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] privilege initialize is failed");
122 return VC_ERROR_PERMISSION_DENIED;
124 snprintf(uid, 16, "%d", getuid());
125 if (false == __check_privilege(uid, VC_PRIVILEGE)) {
126 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Permission is denied");
127 g_privilege_allowed = 0;
128 __check_privilege_deinitialize();
129 return VC_ERROR_PERMISSION_DENIED;
131 __check_privilege_deinitialize();
134 g_privilege_allowed = 1;
135 return VC_ERROR_NONE;
138 int vc_cmd_list_create(vc_cmd_list_h* vc_cmd_list)
140 if (0 != __vc_cmd_get_feature_enabled()) {
141 return VC_ERROR_NOT_SUPPORTED;
143 if (0 != __vc_cmd_check_privilege()) {
144 return VC_ERROR_PERMISSION_DENIED;
147 if (NULL == vc_cmd_list) {
148 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
149 return VC_ERROR_INVALID_PARAMETER;
152 vc_cmd_list_s* list = (vc_cmd_list_s*)calloc(1, sizeof(vc_cmd_list_s));
155 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
156 return VC_ERROR_OUT_OF_MEMORY;
162 *vc_cmd_list = (vc_cmd_list_h)list;
164 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", *vc_cmd_list);
166 return VC_ERROR_NONE;
169 int vc_cmd_list_destroy(vc_cmd_list_h vc_cmd_list, bool release_command)
171 if (0 != __vc_cmd_get_feature_enabled()) {
172 return VC_ERROR_NOT_SUPPORTED;
174 if (0 != __vc_cmd_check_privilege()) {
175 return VC_ERROR_PERMISSION_DENIED;
178 if (NULL == vc_cmd_list) {
179 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
180 return VC_ERROR_INVALID_PARAMETER;
183 vc_cmd_list_remove_all(vc_cmd_list, release_command);
185 vc_cmd_list_s* list = NULL;
186 list = (vc_cmd_list_s*)vc_cmd_list;
188 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", list);
195 return VC_ERROR_NONE;
198 int vc_cmd_list_get_count(vc_cmd_list_h vc_cmd_list, int* count)
200 if (0 != __vc_cmd_get_feature_enabled()) {
201 return VC_ERROR_NOT_SUPPORTED;
203 if (0 != __vc_cmd_check_privilege()) {
204 return VC_ERROR_PERMISSION_DENIED;
207 if (NULL == vc_cmd_list || NULL == count) {
208 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Get command count : Input parameter is NULL");
209 return VC_ERROR_INVALID_PARAMETER;
212 vc_cmd_list_s* list = NULL;
213 list = (vc_cmd_list_s*)vc_cmd_list;
215 *count = g_slist_length(list->list);
217 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), count(%d)", list, *count);
219 return VC_ERROR_NONE;
222 int vc_cmd_list_add(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
224 if (0 != __vc_cmd_get_feature_enabled()) {
225 return VC_ERROR_NOT_SUPPORTED;
227 if (0 != __vc_cmd_check_privilege()) {
228 return VC_ERROR_PERMISSION_DENIED;
231 if (NULL == vc_cmd_list || NULL == vc_command) {
232 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
233 return VC_ERROR_INVALID_PARAMETER;
236 vc_cmd_list_s* list = NULL;
237 list = (vc_cmd_list_s*)vc_cmd_list;
239 vc_cmd_s* cmd = NULL;
240 cmd = (vc_cmd_s*)vc_command;
242 list->list = g_slist_append(list->list, cmd);
244 if (1 == g_slist_length(list->list)) {
248 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
250 return VC_ERROR_NONE;
253 int vc_cmd_list_remove(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
255 if (0 != __vc_cmd_get_feature_enabled()) {
256 return VC_ERROR_NOT_SUPPORTED;
258 if (0 != __vc_cmd_check_privilege()) {
259 return VC_ERROR_PERMISSION_DENIED;
262 if (NULL == vc_cmd_list || NULL == vc_command) {
263 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
264 return VC_ERROR_INVALID_PARAMETER;
267 vc_cmd_list_s* list = NULL;
268 list = (vc_cmd_list_s*)vc_cmd_list;
270 vc_cmd_s* cmd = NULL;
271 cmd = (vc_cmd_s*)vc_command;
273 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
275 vc_cmd_s* temp_cmd = NULL;
278 iter = g_slist_nth(list->list, 0);
280 while (NULL != iter) {
281 temp_cmd = iter->data;
283 if (NULL != temp_cmd && cmd == temp_cmd) {
284 list->list = g_slist_remove(list->list, temp_cmd);
286 if (true == release_command) {
287 SLOG(LOG_DEBUG, TAG_VCCMD, "Release command data");
288 if (NULL != temp_cmd->command) free(temp_cmd->command);
289 if (NULL != temp_cmd->parameter) free(temp_cmd->parameter);
296 iter = g_slist_next(iter);
299 int count = g_slist_length(list->list);
303 } else if (list->index == count) {
304 list->index = count - 1;
307 return VC_ERROR_NONE;
310 int vc_cmd_list_remove_all(vc_cmd_list_h vc_cmd_list, bool release_command)
312 if (0 != __vc_cmd_get_feature_enabled()) {
313 return VC_ERROR_NOT_SUPPORTED;
315 if (0 != __vc_cmd_check_privilege()) {
316 return VC_ERROR_PERMISSION_DENIED;
319 SLOG(LOG_DEBUG, TAG_VCCMD, "===== Destroy all command");
321 if (NULL == vc_cmd_list) {
322 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
323 return VC_ERROR_INVALID_PARAMETER;
326 vc_cmd_list_s* list = NULL;
327 list = (vc_cmd_list_s*)vc_cmd_list;
329 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), release command (%s)"
330 , list, release_command ? "true" : "false");
332 int count = g_slist_length(list->list);
337 for (i = 0; i < count ; i++) {
338 temp_cmd = g_slist_nth_data(list->list, 0);
340 if (NULL != temp_cmd) {
341 list->list = g_slist_remove(list->list, temp_cmd);
343 if (true == release_command) {
344 SLOG(LOG_DEBUG, TAG_VCCMD, "Free command(%p)", temp_cmd);
345 if (NULL != temp_cmd->command) free(temp_cmd->command);
346 if (NULL != temp_cmd->parameter) free(temp_cmd->parameter);
355 SLOG(LOG_DEBUG, TAG_VCCMD, "=====");
356 SLOG(LOG_DEBUG, TAG_VCCMD, " ");
358 return VC_ERROR_NONE;
361 int vc_cmd_list_foreach_commands(vc_cmd_list_h vc_cmd_list, vc_cmd_list_cb callback, void* user_data)
363 if (0 != __vc_cmd_get_feature_enabled()) {
364 return VC_ERROR_NOT_SUPPORTED;
366 if (0 != __vc_cmd_check_privilege()) {
367 return VC_ERROR_PERMISSION_DENIED;
370 if (NULL == vc_cmd_list) {
371 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
372 return VC_ERROR_INVALID_PARAMETER;
375 vc_cmd_list_s* list = NULL;
376 list = (vc_cmd_list_s*)vc_cmd_list;
378 int count = g_slist_length(list->list);
384 iter = g_slist_nth(list->list, 0);
386 for (i = 0; i < count; i++) {
387 temp_cmd = iter->data;
389 if (NULL != temp_cmd) {
390 if (false == callback((vc_cmd_h)temp_cmd, user_data)) {
395 iter = g_slist_next(iter);
398 SLOG(LOG_DEBUG, TAG_VCCMD, "===== Foreach commands Done");
400 return VC_ERROR_NONE;
403 int vc_cmd_list_filter_by_type(vc_cmd_list_h original, int type, vc_cmd_list_h* filtered)
405 SLOG(LOG_DEBUG, TAG_VCCMD, "===== Filter by type");
407 if (0 != __vc_cmd_get_feature_enabled()) {
408 return VC_ERROR_NOT_SUPPORTED;
410 if (0 != __vc_cmd_check_privilege()) {
411 return VC_ERROR_PERMISSION_DENIED;
414 if (NULL == original) {
415 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
416 return VC_ERROR_INVALID_PARAMETER;
419 if (VC_COMMAND_TYPE_NONE >= type || VC_COMMAND_TYPE_EXCLUSIVE < type) {
420 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid type");
421 return VC_ERROR_INVALID_PARAMETER;
424 vc_cmd_list_s* list = NULL;
425 list = (vc_cmd_list_s*)original;
427 vc_cmd_list_h temp_list;
428 if (0 != vc_cmd_list_create(&temp_list)) {
429 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to list create");
430 return VC_ERROR_OPERATION_FAILED;
433 int count = g_slist_length(list->list);
439 iter = g_slist_nth(list->list, 0);
441 for (i = 0; i < count; i++) {
442 if (NULL != iter->data) {
443 iter_cmd = iter->data;
445 if (NULL != iter_cmd) {
447 if (0 != vc_cmd_get_type((vc_cmd_h)iter_cmd, &iter_type)) {
448 SLOG(LOG_ERROR,TAG_VCCMD, "[ERROR] Fail to get command type");
452 if (iter_type == type) {
454 if (0 != vc_cmd_create(&temp_cmd)) {
455 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to create cmd");
459 memcpy(temp_cmd, iter_cmd, sizeof(vc_cmd_s));
460 if (NULL != iter_cmd->command) {
461 ((vc_cmd_s*)temp_cmd)->command = strdup(iter_cmd->command);
463 if (NULL != iter_cmd->parameter) {
464 ((vc_cmd_s*)temp_cmd)->parameter = strdup(iter_cmd->parameter);
467 if (0 != vc_cmd_list_add(temp_list, temp_cmd)) {
468 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to cmd list add");
469 vc_cmd_destroy(temp_cmd);
475 iter = g_slist_next(iter);
479 if (0 != vc_cmd_list_get_count(temp_list, &count)) {
480 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get count");
482 SLOG(LOG_DEBUG, TAG_VCCMD, "Filtering result : (%d) command", count);
485 *filtered = temp_list;
487 SLOG(LOG_DEBUG, TAG_VCCMD, "=====");
489 return VC_ERROR_NONE;
492 int vc_cmd_list_first(vc_cmd_list_h vc_cmd_list)
494 if (0 != __vc_cmd_get_feature_enabled()) {
495 return VC_ERROR_NOT_SUPPORTED;
497 if (0 != __vc_cmd_check_privilege()) {
498 return VC_ERROR_PERMISSION_DENIED;
501 if (NULL == vc_cmd_list) {
502 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
503 return VC_ERROR_INVALID_PARAMETER;
506 vc_cmd_list_s* list = NULL;
507 list = (vc_cmd_list_s*)vc_cmd_list;
509 if (0 == g_slist_length(list->list)) {
510 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
511 return VC_ERROR_EMPTY;
516 return VC_ERROR_NONE;
519 int vc_cmd_list_last(vc_cmd_list_h vc_cmd_list)
521 if (0 != __vc_cmd_get_feature_enabled()) {
522 return VC_ERROR_NOT_SUPPORTED;
524 if (0 != __vc_cmd_check_privilege()) {
525 return VC_ERROR_PERMISSION_DENIED;
528 if (NULL == vc_cmd_list) {
529 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
530 return VC_ERROR_INVALID_PARAMETER;
533 vc_cmd_list_s* list = NULL;
534 list = (vc_cmd_list_s*)vc_cmd_list;
536 int count = g_slist_length(list->list);
539 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
540 return VC_ERROR_EMPTY;
542 list->index = count - 1;
543 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
546 return VC_ERROR_NONE;
549 int vc_cmd_list_next(vc_cmd_list_h vc_cmd_list)
551 if (0 != __vc_cmd_get_feature_enabled()) {
552 return VC_ERROR_NOT_SUPPORTED;
554 if (0 != __vc_cmd_check_privilege()) {
555 return VC_ERROR_PERMISSION_DENIED;
558 if (NULL == vc_cmd_list) {
559 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
560 return VC_ERROR_INVALID_PARAMETER;
563 vc_cmd_list_s* list = NULL;
564 list = (vc_cmd_list_s*)vc_cmd_list;
566 int count = g_slist_length(list->list);
568 if (list->index < count - 1) {
569 list->index = list->index + 1;
570 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
572 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
573 return VC_ERROR_ITERATION_END;
576 return VC_ERROR_NONE;
579 int vc_cmd_list_prev(vc_cmd_list_h vc_cmd_list)
581 if (0 != __vc_cmd_get_feature_enabled()) {
582 return VC_ERROR_NOT_SUPPORTED;
584 if (0 != __vc_cmd_check_privilege()) {
585 return VC_ERROR_PERMISSION_DENIED;
588 if (NULL == vc_cmd_list) {
589 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
590 return VC_ERROR_INVALID_PARAMETER;
593 vc_cmd_list_s* list = NULL;
594 list = (vc_cmd_list_s*)vc_cmd_list;
596 if (list->index > 0) {
597 list->index = list->index - 1;
598 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
600 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
601 return VC_ERROR_ITERATION_END;
604 return VC_ERROR_NONE;
607 int vc_cmd_list_get_current(vc_cmd_list_h vc_cmd_list, vc_cmd_h* vc_command)
609 if (0 != __vc_cmd_get_feature_enabled()) {
610 return VC_ERROR_NOT_SUPPORTED;
612 if (0 != __vc_cmd_check_privilege()) {
613 return VC_ERROR_PERMISSION_DENIED;
616 if (NULL == vc_cmd_list || NULL == vc_command) {
617 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
618 return VC_ERROR_INVALID_PARAMETER;
621 vc_cmd_list_s* list = NULL;
622 list = (vc_cmd_list_s*)vc_cmd_list;
624 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), index (%d)", list, list->index);
626 if (0 == g_slist_length(list->list)) {
627 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list is empty");
629 return VC_ERROR_EMPTY;
632 vc_cmd_s *temp_cmd = NULL;
633 temp_cmd = g_slist_nth_data(list->list, list->index);
635 *vc_command = (vc_cmd_h)temp_cmd;
637 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] Get current command (%p)", *vc_command);
639 return VC_ERROR_NONE;
643 int vc_cmd_create(vc_cmd_h* vc_command)
645 if (0 != __vc_cmd_get_feature_enabled()) {
646 return VC_ERROR_NOT_SUPPORTED;
648 if (0 != __vc_cmd_check_privilege()) {
649 return VC_ERROR_PERMISSION_DENIED;
652 if (NULL == vc_command) {
653 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
654 return VC_ERROR_INVALID_PARAMETER;
657 vc_cmd_s* command = (vc_cmd_s*)calloc(1, sizeof(vc_cmd_s));
659 if (NULL == command) {
660 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
661 return VC_ERROR_OUT_OF_MEMORY;
667 command->type = VC_COMMAND_TYPE_NONE;
668 command->format = VC_CMD_FORMAT_FIXED;
669 command->command = NULL;
670 command->parameter = NULL;
672 command->key = VC_KEY_NONE;
673 command->modifier = VC_MODIFIER_NONE;
675 *vc_command = (vc_cmd_h)command;
677 SLOG(LOG_DEBUG, TAG_VCCMD, "[Create command][%p]", *vc_command);
679 return VC_ERROR_NONE;
682 int vc_cmd_destroy(vc_cmd_h vc_command)
684 if (0 != __vc_cmd_get_feature_enabled()) {
685 return VC_ERROR_NOT_SUPPORTED;
687 if (0 != __vc_cmd_check_privilege()) {
688 return VC_ERROR_PERMISSION_DENIED;
691 if (NULL == vc_command) {
692 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
693 return VC_ERROR_INVALID_PARAMETER;
696 vc_cmd_s* command = NULL;
697 command = (vc_cmd_s*)vc_command;
699 SLOG(LOG_DEBUG, TAG_VCCMD, "[Destroy command][%p]", command);
701 if (NULL != command) {
702 if (NULL != command->command) free(command->command);
703 if (NULL != command->parameter) free(command->parameter);
708 return VC_ERROR_NONE;
711 int vc_cmd_set_id(vc_cmd_h vc_command, int id)
713 if (0 != __vc_cmd_get_feature_enabled()) {
714 return VC_ERROR_NOT_SUPPORTED;
716 if (0 != __vc_cmd_check_privilege()) {
717 return VC_ERROR_PERMISSION_DENIED;
720 if (NULL == vc_command) {
721 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
722 return VC_ERROR_INVALID_PARAMETER;
725 vc_cmd_s* cmd = NULL;
726 cmd = (vc_cmd_s*)vc_command;
730 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set id][%p] id(%d)", vc_command, cmd->id);
736 int vc_cmd_get_id(vc_cmd_h vc_command, int* id)
738 if (0 != __vc_cmd_get_feature_enabled()) {
739 return VC_ERROR_NOT_SUPPORTED;
741 if (0 != __vc_cmd_check_privilege()) {
742 return VC_ERROR_PERMISSION_DENIED;
745 if (NULL == vc_command || NULL == id) {
746 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
747 return VC_ERROR_INVALID_PARAMETER;
750 vc_cmd_s* cmd = NULL;
751 cmd = (vc_cmd_s*)vc_command;
755 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get id][%p] id(%d)", vc_command, *id);
761 int vc_cmd_set_command(vc_cmd_h vc_command, const char* command)
763 if (0 != __vc_cmd_get_feature_enabled()) {
764 return VC_ERROR_NOT_SUPPORTED;
766 if (0 != __vc_cmd_check_privilege()) {
767 return VC_ERROR_PERMISSION_DENIED;
770 if (NULL == vc_command) {
771 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
772 return VC_ERROR_INVALID_PARAMETER;
775 vc_cmd_s* cmd = NULL;
776 cmd = (vc_cmd_s*)vc_command;
778 if (NULL != cmd->command) {
784 if (NULL != command) {
785 cmd->command = strdup(command);
788 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set command][%p] Command(%s)", vc_command, cmd->command);
793 int vc_cmd_get_command(vc_cmd_h vc_command, char** command)
795 if (0 != __vc_cmd_get_feature_enabled()) {
796 return VC_ERROR_NOT_SUPPORTED;
798 if (0 != __vc_cmd_check_privilege()) {
799 return VC_ERROR_PERMISSION_DENIED;
802 if (NULL == vc_command || NULL == command) {
803 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
804 return VC_ERROR_INVALID_PARAMETER;
807 vc_cmd_s* cmd = NULL;
808 cmd = (vc_cmd_s*)vc_command;
810 if (NULL != cmd->command) {
811 *command = strdup(gettext(cmd->command));
814 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get command][%p] Command(%s)", vc_command, *command);
819 int vc_cmd_set_unfixed_command(vc_cmd_h vc_command, const char* command)
821 if (0 != __vc_cmd_get_feature_enabled()) {
822 return VC_ERROR_NOT_SUPPORTED;
824 if (0 != __vc_cmd_check_privilege()) {
825 return VC_ERROR_PERMISSION_DENIED;
828 if (NULL == vc_command) {
829 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
830 return VC_ERROR_INVALID_PARAMETER;
833 vc_cmd_s* cmd = NULL;
834 cmd = (vc_cmd_s*)vc_command;
836 if (NULL != cmd->parameter) {
837 free(cmd->parameter);
840 cmd->parameter = NULL;
842 if (NULL != command) {
843 cmd->parameter = strdup(command);
844 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set parameter][%p] parameter(%s)", vc_command, cmd->parameter);
850 int vc_cmd_get_unfixed_command(vc_cmd_h vc_command, char** command)
852 if (0 != __vc_cmd_get_feature_enabled()) {
853 return VC_ERROR_NOT_SUPPORTED;
855 if (0 != __vc_cmd_check_privilege()) {
856 return VC_ERROR_PERMISSION_DENIED;
859 if (NULL == vc_command || NULL == command) {
860 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
861 return VC_ERROR_INVALID_PARAMETER;
864 vc_cmd_s* cmd = NULL;
865 cmd = (vc_cmd_s*)vc_command;
867 if (NULL != cmd->parameter) {
868 *command = strdup(gettext(cmd->parameter));
869 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get nonfixed command][%p] nonfixed command(%s)", vc_command, *command);
875 int vc_cmd_set_type(vc_cmd_h vc_command, int type)
877 if (0 != __vc_cmd_get_feature_enabled()) {
878 return VC_ERROR_NOT_SUPPORTED;
880 if (0 != __vc_cmd_check_privilege()) {
881 return VC_ERROR_PERMISSION_DENIED;
884 if (NULL == vc_command) {
885 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
886 return VC_ERROR_INVALID_PARAMETER;
889 vc_cmd_s* cmd = NULL;
890 cmd = (vc_cmd_s*)vc_command;
894 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set type][%p] type(%d)", vc_command, cmd->type);
899 int vc_cmd_get_type(vc_cmd_h vc_command, int* type)
901 if (0 != __vc_cmd_get_feature_enabled()) {
902 return VC_ERROR_NOT_SUPPORTED;
904 if (0 != __vc_cmd_check_privilege()) {
905 return VC_ERROR_PERMISSION_DENIED;
908 if (NULL == vc_command || NULL == type) {
909 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
910 return VC_ERROR_INVALID_PARAMETER;
913 vc_cmd_s* cmd = NULL;
914 cmd = (vc_cmd_s*)vc_command;
918 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get type][%p] type(%d)", vc_command, *type);
923 int vc_cmd_set_format(vc_cmd_h vc_command, vc_cmd_format_e format)
925 if (0 != __vc_cmd_get_feature_enabled()) {
926 return VC_ERROR_NOT_SUPPORTED;
928 if (0 != __vc_cmd_check_privilege()) {
929 return VC_ERROR_PERMISSION_DENIED;
932 if (NULL == vc_command) {
933 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
934 return VC_ERROR_INVALID_PARAMETER;
937 vc_cmd_s* cmd = NULL;
938 cmd = (vc_cmd_s*)vc_command;
940 cmd->format = format;
942 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set format][%p] format(%d)", vc_command, format);
947 int vc_cmd_get_format(vc_cmd_h vc_command, vc_cmd_format_e* format)
949 if (0 != __vc_cmd_get_feature_enabled()) {
950 return VC_ERROR_NOT_SUPPORTED;
952 if (0 != __vc_cmd_check_privilege()) {
953 return VC_ERROR_PERMISSION_DENIED;
956 if (NULL == vc_command || NULL == format) {
957 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
958 return VC_ERROR_INVALID_PARAMETER;
961 vc_cmd_s* cmd = NULL;
962 cmd = (vc_cmd_s*)vc_command;
964 *format = cmd->format;
966 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get format][%p] format(%d)", vc_command, *format);
971 int vc_cmd_set_pid(vc_cmd_h vc_command, int pid)
973 if (0 != __vc_cmd_get_feature_enabled()) {
974 return VC_ERROR_NOT_SUPPORTED;
976 if (0 != __vc_cmd_check_privilege()) {
977 return VC_ERROR_PERMISSION_DENIED;
980 if (NULL == vc_command) {
981 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
982 return VC_ERROR_INVALID_PARAMETER;
985 vc_cmd_s* cmd = NULL;
986 cmd = (vc_cmd_s*)vc_command;
990 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set pid][%p] pid(%d)", vc_command, cmd->pid);
995 int vc_cmd_get_pid(vc_cmd_h vc_command, int* pid)
997 if (0 != __vc_cmd_get_feature_enabled()) {
998 return VC_ERROR_NOT_SUPPORTED;
1000 if (0 != __vc_cmd_check_privilege()) {
1001 return VC_ERROR_PERMISSION_DENIED;
1004 if (NULL == vc_command || NULL == pid) {
1005 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1006 return VC_ERROR_INVALID_PARAMETER;
1009 vc_cmd_s* cmd = NULL;
1010 cmd = (vc_cmd_s*)vc_command;
1014 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get pid][%p] pid(%d)", vc_command, *pid);
1019 int vc_cmd_set_domain(vc_cmd_h vc_command, int domain)
1021 if (0 != __vc_cmd_get_feature_enabled()) {
1022 return VC_ERROR_NOT_SUPPORTED;
1024 if (0 != __vc_cmd_check_privilege()) {
1025 return VC_ERROR_PERMISSION_DENIED;
1028 if (NULL == vc_command) {
1029 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1030 return VC_ERROR_INVALID_PARAMETER;
1033 vc_cmd_s* cmd = NULL;
1034 cmd = (vc_cmd_s*)vc_command;
1036 cmd->domain = domain;
1038 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set domain] domain : %d", domain);
1043 int vc_cmd_get_domain(vc_cmd_h vc_command, int* domain)
1045 if (0 != __vc_cmd_get_feature_enabled()) {
1046 return VC_ERROR_NOT_SUPPORTED;
1048 if (0 != __vc_cmd_check_privilege()) {
1049 return VC_ERROR_PERMISSION_DENIED;
1052 if (NULL == vc_command || NULL == domain) {
1053 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1054 return VC_ERROR_INVALID_PARAMETER;
1057 vc_cmd_s* cmd = NULL;
1058 cmd = (vc_cmd_s*)vc_command;
1060 *domain = cmd->domain;
1062 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get domain] domain : %d", *domain);
1068 * @brief Sets key value of command.
1070 * @param[in] vc_command Command handle
1071 * @param[in] key key value
1072 * @param[in] modifier modifier value
1074 * @return 0 on success, otherwise a negative error value
1075 * @retval #VC_ERROR_NONE Successful
1076 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1078 * @see vc_cmd_get_result_key()
1080 int vc_cmd_set_result_key(vc_cmd_h vc_command, int key, int modifier)
1082 SLOG(LOG_DEBUG, TAG_VCCMD, "===== Set result key");
1084 if (NULL == vc_command) {
1085 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1086 return VC_ERROR_INVALID_PARAMETER;
1089 vc_cmd_s* cmd = NULL;
1090 cmd = (vc_cmd_s*)vc_command;
1092 SLOG(LOG_DEBUG, TAG_VCCMD, "key : %d, modifier : %d", key, modifier);
1095 cmd->modifier = modifier;
1097 SLOG(LOG_DEBUG, TAG_VCCMD, "=====");
1098 SLOG(LOG_DEBUG, TAG_VCCMD, " ");
1104 * @brief Gets key value of command.
1106 * @param[in] vc_command Command handle
1107 * @param[out] key key value
1108 * @param[out] modifier modifier value
1110 * @return 0 on success, otherwise a negative error value
1111 * @retval #VC_ERROR_NONE Successful
1112 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1114 * @see vc_cmd_add_result_key()
1116 int vc_cmd_get_result_key(vc_cmd_h vc_command, int* key, int* modifier)
1118 SLOG(LOG_DEBUG, TAG_VCCMD, "===== Get result key");
1120 if (NULL == vc_command || NULL == key || NULL == modifier) {
1121 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1122 return VC_ERROR_INVALID_PARAMETER;
1125 vc_cmd_s* cmd = NULL;
1126 cmd = (vc_cmd_s*)vc_command;
1129 *modifier = cmd->modifier;
1131 SLOG(LOG_DEBUG, TAG_VCCMD, "=====");
1132 SLOG(LOG_DEBUG, TAG_VCCMD, " ");
1137 int vc_cmd_print_list(vc_cmd_list_h vc_cmd_list)
1139 if (NULL == vc_cmd_list) {
1143 vc_cmd_list_s* list = NULL;
1144 list = (vc_cmd_list_s*)vc_cmd_list;
1146 SLOG(LOG_DEBUG, TAG_VCCMD, "=== Command List ===");
1147 SLOG(LOG_DEBUG, TAG_VCCMD, "[List][%p]", list);
1149 int count = g_slist_length(list->list);
1152 vc_cmd_s *temp_cmd = NULL;
1154 for (i = 0; i < count ; i++) {
1155 temp_cmd = g_slist_nth_data(list->list, i);
1157 if (NULL != temp_cmd) {
1158 SLOG(LOG_DEBUG, TAG_VCCMD, " [%d][%p] PID(%d) ID(%d) Type(%d) Format(%d) Domain(%d) Command(%s) Param(%s)",
1159 i, temp_cmd, temp_cmd->pid, temp_cmd->index, temp_cmd->type, temp_cmd->format, temp_cmd->domain, temp_cmd->command, temp_cmd->parameter);
1163 SLOG(LOG_DEBUG, TAG_VCCMD, "==================");
1164 SLOG(LOG_DEBUG, TAG_VCCMD, " ");