2 * Copyright (c) 2011-2015 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
19 #include <cynara-client.h>
20 #include <cynara-error.h>
21 #include <cynara-session.h>
24 #include <system_info.h>
26 #include "vc_command.h"
27 #include "vc_info_parser.h"
29 #include "vc_regex_rule.h"
30 #include "vc_config_mgr.h"
31 #include "voice_control_command.h"
32 #include "voice_control_command_expand.h"
33 #include "voice_control_common.h"
34 #include "voice_control_key_defines.h"
36 static int g_feature_enabled = -1;
38 static int g_privilege_allowed = 1; /* Always True */
39 static cynara *p_cynara = NULL;
40 static GList *g_cmdlist_list = NULL;
43 // For getting timestamp using regular expression
44 static regex_t reg[MAX_NUM_REGEX];
45 static time_t t_now; //time_t is based on UTC
46 static struct tm td_now; //if use localtime function, the value follows the local time zone, otherwise it follows the UTC.
48 static int g_time_flag;
49 static int g_date_flag;
51 static int g_data_sidx;
52 static int g_data_eidx;
54 static int __vc_cmd_get_feature_enabled()
56 if (0 == g_feature_enabled) {
57 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
58 return VC_ERROR_NOT_SUPPORTED;
59 } else if (-1 == g_feature_enabled) {
60 bool vc_supported = false;
61 bool mic_supported = false;
62 if (0 == system_info_get_platform_bool(VC_FEATURE_PATH, &vc_supported)) {
63 if (0 == system_info_get_platform_bool(VC_MIC_FEATURE_PATH, &mic_supported)) {
64 if (false == vc_supported || false == mic_supported) {
65 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Voice control feature NOT supported");
66 g_feature_enabled = 0;
67 return VC_ERROR_NOT_SUPPORTED;
70 g_feature_enabled = 1;
72 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
73 return VC_ERROR_NOT_SUPPORTED;
76 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get feature value");
77 return VC_ERROR_NOT_SUPPORTED;
84 static int __check_privilege_initialize()
86 int ret = cynara_initialize(&p_cynara, NULL);
87 if (CYNARA_API_SUCCESS != ret)
88 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to initialize");
90 return ret == CYNARA_API_SUCCESS;
93 static int __check_privilege(const char* uid, const char * privilege)
96 char label_path[1024] = "/proc/self/attr/current";
97 char smack_label[1024] = {'\0',};
103 fp = fopen(label_path, "r");
105 if (sizeof(smack_label) != fread(smack_label, 1, sizeof(smack_label), fp))
106 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] fail to fread");
111 pid_t pid = getpid();
112 char *session = cynara_session_from_pid(pid);
113 int ret = cynara_check(p_cynara, smack_label, session, uid, privilege);
114 SLOG(LOG_DEBUG, TAG_VCCMD, "[Client]cynara_check returned %d(%s)", ret, (CYNARA_API_ACCESS_ALLOWED == ret) ? "Allowed" : "Denied");
118 if (ret != CYNARA_API_ACCESS_ALLOWED)
123 static void __check_privilege_deinitialize()
126 cynara_finish(p_cynara);
130 static int __vc_cmd_check_privilege()
134 if (0 == g_privilege_allowed) {
135 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Permission is denied");
136 return VC_ERROR_PERMISSION_DENIED;
137 } else if (-1 == g_privilege_allowed) {
138 if (false == __check_privilege_initialize()) {
139 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] privilege initialize is failed");
140 return VC_ERROR_PERMISSION_DENIED;
142 snprintf(uid, 16, "%d", getuid());
143 if (false == __check_privilege(uid, VC_PRIVILEGE)) {
144 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Permission is denied");
145 g_privilege_allowed = 0;
146 __check_privilege_deinitialize();
147 return VC_ERROR_PERMISSION_DENIED;
149 __check_privilege_deinitialize();
152 g_privilege_allowed = 1;
154 return VC_ERROR_NONE;
157 int vc_cmd_list_create(vc_cmd_list_h* vc_cmd_list)
159 if (0 != __vc_cmd_get_feature_enabled()) {
160 return VC_ERROR_NOT_SUPPORTED;
162 if (0 != __vc_cmd_check_privilege()) {
163 return VC_ERROR_PERMISSION_DENIED;
166 if (NULL == vc_cmd_list) {
167 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
168 return VC_ERROR_INVALID_PARAMETER;
171 vc_cmd_list_s* list = (vc_cmd_list_s*)calloc(1, sizeof(vc_cmd_list_s));
174 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
175 return VC_ERROR_OUT_OF_MEMORY;
181 *vc_cmd_list = (vc_cmd_list_h)list;
183 g_cmdlist_list = g_list_append(g_cmdlist_list, list);
185 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", *vc_cmd_list);
187 return VC_ERROR_NONE;
190 int vc_cmd_list_destroy(vc_cmd_list_h vc_cmd_list, bool release_command)
192 if (0 != __vc_cmd_get_feature_enabled()) {
193 return VC_ERROR_NOT_SUPPORTED;
195 if (0 != __vc_cmd_check_privilege()) {
196 return VC_ERROR_PERMISSION_DENIED;
199 if (NULL == vc_cmd_list) {
200 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
201 return VC_ERROR_INVALID_PARAMETER;
204 vc_cmd_list_remove_all(vc_cmd_list, release_command);
206 vc_cmd_list_s* list = NULL;
207 list = (vc_cmd_list_s*)vc_cmd_list;
209 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p)", list);
212 vc_cmd_list_s *data = NULL;
214 /* if list have item */
215 if (g_list_length(g_cmdlist_list) > 0) {
216 /* Get a first item */
217 iter = g_list_first(g_cmdlist_list);
219 while (NULL != iter) {
221 if (data && list == data) {
222 g_cmdlist_list = g_list_remove_link(g_cmdlist_list, iter);
227 SLOG(LOG_DEBUG, TAG_VCCMD, "Client destroy");
230 return VC_ERROR_NONE;
233 iter = g_list_next(iter);
236 SLOG(LOG_ERROR, TAG_VCCMD, "Fail to destroy client : handle is not valid");
238 return VC_ERROR_INVALID_PARAMETER;
241 int vc_cmd_list_get_count(vc_cmd_list_h vc_cmd_list, int* count)
243 if (0 != __vc_cmd_get_feature_enabled()) {
244 return VC_ERROR_NOT_SUPPORTED;
246 if (0 != __vc_cmd_check_privilege()) {
247 return VC_ERROR_PERMISSION_DENIED;
250 if (NULL == vc_cmd_list || NULL == count) {
251 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Get command count : Input parameter is NULL");
252 return VC_ERROR_INVALID_PARAMETER;
255 vc_cmd_list_s* list = NULL;
256 list = (vc_cmd_list_s*)vc_cmd_list;
258 *count = g_slist_length(list->list);
260 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), count(%d)", list, *count);
262 return VC_ERROR_NONE;
265 int vc_cmd_list_add(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
267 if (0 != __vc_cmd_get_feature_enabled()) {
268 return VC_ERROR_NOT_SUPPORTED;
270 if (0 != __vc_cmd_check_privilege()) {
271 return VC_ERROR_PERMISSION_DENIED;
274 if (NULL == vc_cmd_list || NULL == vc_command) {
275 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
276 return VC_ERROR_INVALID_PARAMETER;
279 vc_cmd_list_s* list = NULL;
280 list = (vc_cmd_list_s*)vc_cmd_list;
282 vc_cmd_s* cmd = NULL;
283 cmd = (vc_cmd_s*)vc_command;
285 list->list = g_slist_append(list->list, cmd);
287 if (1 == g_slist_length(list->list)) {
291 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
293 return VC_ERROR_NONE;
296 int vc_cmd_list_remove(vc_cmd_list_h vc_cmd_list, vc_cmd_h vc_command)
298 if (0 != __vc_cmd_get_feature_enabled()) {
299 return VC_ERROR_NOT_SUPPORTED;
301 if (0 != __vc_cmd_check_privilege()) {
302 return VC_ERROR_PERMISSION_DENIED;
305 if (NULL == vc_cmd_list || NULL == vc_command) {
306 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
307 return VC_ERROR_INVALID_PARAMETER;
310 vc_cmd_list_s* list = NULL;
311 list = (vc_cmd_list_s*)vc_cmd_list;
313 vc_cmd_s* cmd = NULL;
314 cmd = (vc_cmd_s*)vc_command;
316 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list(%p), command(%p)", list, cmd);
318 vc_cmd_s* temp_cmd = NULL;
321 iter = g_slist_nth(list->list, 0);
323 while (NULL != iter) {
324 temp_cmd = iter->data;
326 if (NULL != temp_cmd && cmd == temp_cmd) {
327 list->list = g_slist_remove(list->list, temp_cmd);
329 if (true == release_command) {
330 SLOG(LOG_DEBUG, TAG_VCCMD, "Release command data");
331 if (NULL != temp_cmd->command) free(temp_cmd->command);
332 if (NULL != temp_cmd->parameter) free(temp_cmd->parameter);
339 iter = g_slist_next(iter);
342 int count = g_slist_length(list->list);
346 } else if (list->index == count) {
347 list->index = count - 1;
350 return VC_ERROR_NONE;
353 int vc_cmd_list_remove_all(vc_cmd_list_h vc_cmd_list, bool release_command)
355 if (0 != __vc_cmd_get_feature_enabled()) {
356 return VC_ERROR_NOT_SUPPORTED;
358 if (0 != __vc_cmd_check_privilege()) {
359 return VC_ERROR_PERMISSION_DENIED;
362 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Destroy all command");
364 if (NULL == vc_cmd_list) {
365 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
366 return VC_ERROR_INVALID_PARAMETER;
369 vc_cmd_list_s* list = NULL;
370 list = (vc_cmd_list_s*)vc_cmd_list;
372 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), release command (%s)"
373 , list, release_command ? "true" : "false");
375 int count = g_slist_length(list->list);
380 for (i = 0; i < count ; i++) {
381 temp_cmd = g_slist_nth_data(list->list, 0);
383 if (NULL != temp_cmd) {
384 list->list = g_slist_remove(list->list, temp_cmd);
386 if (true == release_command) {
387 SLOG(LOG_DEBUG, TAG_VCCMD, "Free command(%p)", temp_cmd);
388 if (NULL != temp_cmd->command) free(temp_cmd->command);
389 if (NULL != temp_cmd->parameter) free(temp_cmd->parameter);
390 if (NULL != temp_cmd->appid) free(temp_cmd->appid);
391 if (NULL != temp_cmd->invocation_name) free(temp_cmd->invocation_name);
392 if (NULL != temp_cmd->fixed) free(temp_cmd->fixed);
401 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
403 return VC_ERROR_NONE;
406 int vc_cmd_list_foreach_commands(vc_cmd_list_h vc_cmd_list, vc_cmd_list_cb callback, void* user_data)
408 if (0 != __vc_cmd_get_feature_enabled()) {
409 return VC_ERROR_NOT_SUPPORTED;
411 if (0 != __vc_cmd_check_privilege()) {
412 return VC_ERROR_PERMISSION_DENIED;
415 if (NULL == vc_cmd_list) {
416 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
417 return VC_ERROR_INVALID_PARAMETER;
420 vc_cmd_list_s* list = NULL;
421 list = (vc_cmd_list_s*)vc_cmd_list;
423 int count = g_slist_length(list->list);
429 iter = g_slist_nth(list->list, 0);
431 for (i = 0; i < count; i++) {
433 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] No command in list");
434 return VC_ERROR_OPERATION_FAILED;
437 temp_cmd = iter->data;
439 if (NULL != temp_cmd) {
440 if (false == callback((vc_cmd_h)temp_cmd, user_data)) {
445 iter = g_slist_next(iter);
448 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Foreach commands Done");
450 return VC_ERROR_NONE;
453 int vc_cmd_list_filter_by_type(vc_cmd_list_h original, int type, vc_cmd_list_h* filtered)
455 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Filter by type");
457 if (0 != __vc_cmd_get_feature_enabled()) {
458 return VC_ERROR_NOT_SUPPORTED;
460 if (0 != __vc_cmd_check_privilege()) {
461 return VC_ERROR_PERMISSION_DENIED;
464 if (NULL == original) {
465 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
466 return VC_ERROR_INVALID_PARAMETER;
469 if (VC_COMMAND_TYPE_NONE >= type || VC_COMMAND_TYPE_EXCLUSIVE < type) {
470 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid type");
471 return VC_ERROR_INVALID_PARAMETER;
474 vc_cmd_list_s* list = NULL;
475 list = (vc_cmd_list_s*)original;
477 vc_cmd_list_h temp_list;
478 if (0 != vc_cmd_list_create(&temp_list)) {
479 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to list create");
480 return VC_ERROR_OPERATION_FAILED;
483 int count = g_slist_length(list->list);
489 iter = g_slist_nth(list->list, 0);
491 for (i = 0; i < count; i++) {
493 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] No command in list");
494 return VC_ERROR_OPERATION_FAILED;
496 if (NULL != iter->data) {
497 iter_cmd = iter->data;
499 if (NULL != iter_cmd) {
501 if (0 != vc_cmd_get_type((vc_cmd_h)iter_cmd, &iter_type)) {
502 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get command type");
506 if (iter_type == type) {
508 if (0 != vc_cmd_create(&temp_cmd)) {
509 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to create cmd");
513 memcpy(temp_cmd, iter_cmd, sizeof(vc_cmd_s));
514 if (NULL != iter_cmd->command) {
515 ((vc_cmd_s*)temp_cmd)->command = strdup(iter_cmd->command);
517 if (NULL != iter_cmd->parameter) {
518 ((vc_cmd_s*)temp_cmd)->parameter = strdup(iter_cmd->parameter);
521 if (0 != vc_cmd_list_add(temp_list, temp_cmd)) {
522 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to cmd list add");
523 vc_cmd_destroy(temp_cmd);
529 iter = g_slist_next(iter);
533 if (0 != vc_cmd_list_get_count(temp_list, &count)) {
534 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get count");
536 SLOG(LOG_DEBUG, TAG_VCCMD, "Filtering result : (%d) command", count);
539 *filtered = temp_list;
541 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
543 return VC_ERROR_NONE;
546 int vc_cmd_list_first(vc_cmd_list_h vc_cmd_list)
548 if (0 != __vc_cmd_get_feature_enabled()) {
549 return VC_ERROR_NOT_SUPPORTED;
551 if (0 != __vc_cmd_check_privilege()) {
552 return VC_ERROR_PERMISSION_DENIED;
555 if (NULL == vc_cmd_list) {
556 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
557 return VC_ERROR_INVALID_PARAMETER;
560 vc_cmd_list_s* list = NULL;
561 list = (vc_cmd_list_s*)vc_cmd_list;
563 if (0 == g_slist_length(list->list)) {
564 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
565 return VC_ERROR_EMPTY;
570 return VC_ERROR_NONE;
573 int vc_cmd_list_last(vc_cmd_list_h vc_cmd_list)
575 if (0 != __vc_cmd_get_feature_enabled()) {
576 return VC_ERROR_NOT_SUPPORTED;
578 if (0 != __vc_cmd_check_privilege()) {
579 return VC_ERROR_PERMISSION_DENIED;
582 if (NULL == vc_cmd_list) {
583 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
584 return VC_ERROR_INVALID_PARAMETER;
587 vc_cmd_list_s* list = NULL;
588 list = (vc_cmd_list_s*)vc_cmd_list;
590 int count = g_slist_length(list->list);
593 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] List is empty");
594 return VC_ERROR_EMPTY;
596 list->index = count - 1;
597 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
600 return VC_ERROR_NONE;
603 int vc_cmd_list_next(vc_cmd_list_h vc_cmd_list)
605 if (0 != __vc_cmd_get_feature_enabled()) {
606 return VC_ERROR_NOT_SUPPORTED;
608 if (0 != __vc_cmd_check_privilege()) {
609 return VC_ERROR_PERMISSION_DENIED;
612 if (NULL == vc_cmd_list) {
613 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
614 return VC_ERROR_INVALID_PARAMETER;
617 vc_cmd_list_s* list = NULL;
618 list = (vc_cmd_list_s*)vc_cmd_list;
620 int count = g_slist_length(list->list);
622 if (list->index < count - 1) {
623 list->index = list->index + 1;
624 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
626 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
627 return VC_ERROR_ITERATION_END;
630 return VC_ERROR_NONE;
633 int vc_cmd_list_prev(vc_cmd_list_h vc_cmd_list)
635 if (0 != __vc_cmd_get_feature_enabled()) {
636 return VC_ERROR_NOT_SUPPORTED;
638 if (0 != __vc_cmd_check_privilege()) {
639 return VC_ERROR_PERMISSION_DENIED;
642 if (NULL == vc_cmd_list) {
643 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
644 return VC_ERROR_INVALID_PARAMETER;
647 vc_cmd_list_s* list = NULL;
648 list = (vc_cmd_list_s*)vc_cmd_list;
650 if (list->index > 0) {
651 list->index = list->index - 1;
652 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
654 SLOG(LOG_DEBUG, TAG_VCCMD, "[DEBUG] List index : %d", list->index);
655 return VC_ERROR_ITERATION_END;
658 return VC_ERROR_NONE;
661 int vc_cmd_list_get_current(vc_cmd_list_h vc_cmd_list, vc_cmd_h* vc_command)
663 if (0 != __vc_cmd_get_feature_enabled()) {
664 return VC_ERROR_NOT_SUPPORTED;
666 if (0 != __vc_cmd_check_privilege()) {
667 return VC_ERROR_PERMISSION_DENIED;
670 if (NULL == vc_cmd_list || NULL == vc_command) {
671 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
672 return VC_ERROR_INVALID_PARAMETER;
675 vc_cmd_list_s* list = NULL;
676 list = (vc_cmd_list_s*)vc_cmd_list;
678 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list (%p), index (%d)", list, list->index);
680 if (0 == g_slist_length(list->list)) {
681 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] list is empty");
683 return VC_ERROR_EMPTY;
686 vc_cmd_s *temp_cmd = NULL;
687 temp_cmd = g_slist_nth_data(list->list, list->index);
689 *vc_command = (vc_cmd_h)temp_cmd;
691 SLOG(LOG_DEBUG, TAG_VCCMD, "[List] Get current command (%p)", *vc_command);
693 return VC_ERROR_NONE;
697 int vc_cmd_create(vc_cmd_h* vc_command)
699 if (0 != __vc_cmd_get_feature_enabled()) {
700 return VC_ERROR_NOT_SUPPORTED;
702 if (0 != __vc_cmd_check_privilege()) {
703 return VC_ERROR_PERMISSION_DENIED;
706 if (NULL == vc_command) {
707 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
708 return VC_ERROR_INVALID_PARAMETER;
711 vc_cmd_s* command = (vc_cmd_s*)calloc(1, sizeof(vc_cmd_s));
713 if (NULL == command) {
714 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not enough memory");
715 return VC_ERROR_OUT_OF_MEMORY;
721 command->type = VC_COMMAND_TYPE_NONE;
722 command->format = VC_CMD_FORMAT_FIXED;
723 command->command = NULL;
724 command->parameter = NULL;
726 command->priority = 0;
727 command->key = VC_KEY_NONE;
728 command->modifier = VC_MODIFIER_NONE;
729 command->invocation_name = NULL;
730 command->appid = NULL;
731 command->fixed = NULL;
733 *vc_command = (vc_cmd_h)command;
735 SLOG(LOG_DEBUG, TAG_VCCMD, "[Create command][%p]", *vc_command);
737 return VC_ERROR_NONE;
740 int vc_cmd_destroy(vc_cmd_h vc_command)
742 if (0 != __vc_cmd_get_feature_enabled()) {
743 return VC_ERROR_NOT_SUPPORTED;
745 if (0 != __vc_cmd_check_privilege()) {
746 return VC_ERROR_PERMISSION_DENIED;
749 if (NULL == vc_command) {
750 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Input parameter is NULL");
751 return VC_ERROR_INVALID_PARAMETER;
754 vc_cmd_s* command = NULL;
755 command = (vc_cmd_s*)vc_command;
757 SLOG(LOG_DEBUG, TAG_VCCMD, "[Destroy command][%p]", command);
759 if (NULL != command) {
760 if (NULL != command->command) {
761 free(command->command);
762 command->command = NULL;
764 if (NULL != command->parameter) {
765 free(command->parameter);
766 command->parameter = NULL;
768 if (NULL != command->invocation_name) {
769 free(command->invocation_name);
770 command->invocation_name = NULL;
772 if (NULL != command->appid) {
773 free(command->appid);
774 command->appid = NULL;
776 if (NULL != command->fixed) {
777 free(command->fixed);
778 command->fixed = NULL;
784 return VC_ERROR_NONE;
787 int vc_cmd_set_id(vc_cmd_h vc_command, int id)
789 if (0 != __vc_cmd_get_feature_enabled()) {
790 return VC_ERROR_NOT_SUPPORTED;
792 if (0 != __vc_cmd_check_privilege()) {
793 return VC_ERROR_PERMISSION_DENIED;
796 if (NULL == vc_command) {
797 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
798 return VC_ERROR_INVALID_PARAMETER;
801 vc_cmd_s* cmd = NULL;
802 cmd = (vc_cmd_s*)vc_command;
806 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set id][%p] id(%d)", vc_command, cmd->id);
812 int vc_cmd_get_id(vc_cmd_h vc_command, int* id)
814 if (0 != __vc_cmd_get_feature_enabled()) {
815 return VC_ERROR_NOT_SUPPORTED;
817 if (0 != __vc_cmd_check_privilege()) {
818 return VC_ERROR_PERMISSION_DENIED;
821 if (NULL == vc_command || NULL == id) {
822 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
823 return VC_ERROR_INVALID_PARAMETER;
826 vc_cmd_s* cmd = NULL;
827 cmd = (vc_cmd_s*)vc_command;
831 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get id][%p] id(%d)", vc_command, *id);
837 int vc_cmd_set_appid(vc_cmd_h vc_command, const char* appid)
839 if (0 != __vc_cmd_get_feature_enabled()) {
840 return VC_ERROR_NOT_SUPPORTED;
843 if (NULL == vc_command) {
844 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, vc_command is NULL");
845 return VC_ERROR_INVALID_PARAMETER;
849 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, appid is NULL");
850 return VC_ERROR_INVALID_PARAMETER;
853 vc_cmd_s* cmd = NULL;
854 cmd = (vc_cmd_s*)vc_command;
856 if (NULL != cmd->appid) {
861 cmd->appid = strdup(appid);
863 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set appid][%p] appid(%s)", vc_command, cmd->appid);
867 int vc_cmd_get_appid(vc_cmd_h vc_command, char** appid)
869 if (0 != __vc_cmd_get_feature_enabled()) {
870 return VC_ERROR_NOT_SUPPORTED;
873 if (NULL == vc_command || NULL == appid) {
874 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
875 return VC_ERROR_INVALID_PARAMETER;
878 vc_cmd_s* cmd = NULL;
879 cmd = (vc_cmd_s*)vc_command;
881 if (NULL != cmd->appid) {
882 *appid = strdup(gettext(cmd->appid));
885 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get appid][%p] appid(%s)", vc_command, *appid);
889 int vc_cmd_set_command(vc_cmd_h vc_command, const char* command)
891 if (0 != __vc_cmd_get_feature_enabled()) {
892 return VC_ERROR_NOT_SUPPORTED;
894 if (0 != __vc_cmd_check_privilege()) {
895 return VC_ERROR_PERMISSION_DENIED;
898 if (NULL == vc_command) {
899 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
900 return VC_ERROR_INVALID_PARAMETER;
903 vc_cmd_s* cmd = NULL;
904 cmd = (vc_cmd_s*)vc_command;
906 if (NULL != cmd->command) {
912 if (NULL != command) {
913 cmd->command = strdup(command);
916 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set command][%p] Command(%s)", vc_command, cmd->command);
921 int vc_cmd_get_command(vc_cmd_h vc_command, char** command)
923 if (0 != __vc_cmd_get_feature_enabled()) {
924 return VC_ERROR_NOT_SUPPORTED;
926 if (0 != __vc_cmd_check_privilege()) {
927 return VC_ERROR_PERMISSION_DENIED;
930 if (NULL == vc_command || NULL == command) {
931 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
932 return VC_ERROR_INVALID_PARAMETER;
935 vc_cmd_s* cmd = NULL;
936 cmd = (vc_cmd_s*)vc_command;
938 if (NULL != cmd->command) {
939 *command = strdup(gettext(cmd->command));
942 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get command][%p] Command(%s)", vc_command, *command);
947 int vc_cmd_set_unfixed_command(vc_cmd_h vc_command, const char* command)
949 if (0 != __vc_cmd_get_feature_enabled()) {
950 return VC_ERROR_NOT_SUPPORTED;
952 if (0 != __vc_cmd_check_privilege()) {
953 return VC_ERROR_PERMISSION_DENIED;
956 if (NULL == vc_command) {
957 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
958 return VC_ERROR_INVALID_PARAMETER;
961 vc_cmd_s* cmd = NULL;
962 cmd = (vc_cmd_s*)vc_command;
964 if (NULL != cmd->parameter) {
965 free(cmd->parameter);
968 cmd->parameter = NULL;
970 if (NULL != command) {
971 cmd->parameter = strdup(command);
972 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set unfixed command][%p] unfixed command(%s)", vc_command, cmd->parameter);
978 int vc_cmd_get_unfixed_command(vc_cmd_h vc_command, char** command)
980 if (0 != __vc_cmd_get_feature_enabled()) {
981 return VC_ERROR_NOT_SUPPORTED;
984 if (NULL == vc_command || NULL == command) {
985 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
986 return VC_ERROR_INVALID_PARAMETER;
989 vc_cmd_s* cmd = NULL;
990 cmd = (vc_cmd_s*)vc_command;
992 if (NULL != cmd->parameter) {
993 *command = strdup(gettext(cmd->parameter));
994 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get unfixed command][%p] unfixed command(%s)", vc_command, *command);
1000 int vc_cmd_set_fixed_command(vc_cmd_h vc_command, const char* fixed)
1002 if (0 != __vc_cmd_get_feature_enabled()) {
1003 return VC_ERROR_NOT_SUPPORTED;
1006 if (NULL == vc_command) {
1007 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1008 return VC_ERROR_INVALID_PARAMETER;
1011 if (NULL == fixed) {
1012 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, fixed is NULL");
1013 return VC_ERROR_INVALID_PARAMETER;
1016 vc_cmd_s* cmd = NULL;
1017 cmd = (vc_cmd_s*)vc_command;
1019 if (NULL != cmd->fixed) {
1024 cmd->fixed = strdup(fixed);
1026 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set parameter][%p] fixed command(%s)", vc_command, cmd->fixed);
1030 int vc_cmd_get_fixed_command(vc_cmd_h vc_command, char** fixed)
1032 if (0 != __vc_cmd_get_feature_enabled()) {
1033 return VC_ERROR_NOT_SUPPORTED;
1036 if (NULL == vc_command || NULL == fixed) {
1037 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
1038 return VC_ERROR_INVALID_PARAMETER;
1041 vc_cmd_s* cmd = NULL;
1042 cmd = (vc_cmd_s*)vc_command;
1044 if (NULL != cmd->fixed) {
1045 *fixed = strdup(gettext(cmd->fixed));
1046 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get fixed command][%p] fixed command(%s)", vc_command, *fixed);
1052 int vc_cmd_set_invocation_name(vc_cmd_h vc_command, const char* invocation_name)
1054 if (0 != __vc_cmd_get_feature_enabled()) {
1055 return VC_ERROR_NOT_SUPPORTED;
1058 if (NULL == vc_command) {
1059 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, vc_command is NULL");
1060 return VC_ERROR_INVALID_PARAMETER;
1063 if (NULL == invocation_name) {
1064 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter, invocation_name is NULL");
1065 return VC_ERROR_INVALID_PARAMETER;
1068 vc_cmd_s* cmd = NULL;
1069 cmd = (vc_cmd_s*)vc_command;
1071 if (NULL != cmd->invocation_name) {
1072 free(cmd->invocation_name);
1073 cmd->invocation_name = NULL;
1076 cmd->invocation_name = strdup(invocation_name);
1078 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set invocation name][%p] invocation_name(%s)", vc_command, cmd->invocation_name);
1082 int vc_cmd_get_invocation_name(vc_cmd_h vc_command, char** invocation_name)
1084 if (0 != __vc_cmd_get_feature_enabled()) {
1085 return VC_ERROR_NOT_SUPPORTED;
1088 if (NULL == vc_command || NULL == invocation_name) {
1089 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid handle ");
1090 return VC_ERROR_INVALID_PARAMETER;
1093 vc_cmd_s* cmd = NULL;
1094 cmd = (vc_cmd_s*)vc_command;
1096 if (NULL != cmd->invocation_name) {
1097 *invocation_name = strdup(gettext(cmd->invocation_name));
1100 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get invocation name][%p] invocation_name(%s)", vc_command, *invocation_name);
1104 int vc_cmd_set_type(vc_cmd_h vc_command, int type)
1106 if (0 != __vc_cmd_get_feature_enabled()) {
1107 return VC_ERROR_NOT_SUPPORTED;
1109 if (0 != __vc_cmd_check_privilege()) {
1110 return VC_ERROR_PERMISSION_DENIED;
1113 if (NULL == vc_command) {
1114 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1115 return VC_ERROR_INVALID_PARAMETER;
1118 vc_cmd_s* cmd = NULL;
1119 cmd = (vc_cmd_s*)vc_command;
1123 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set type][%p] type(%d)", vc_command, cmd->type);
1128 int vc_cmd_get_type(vc_cmd_h vc_command, int* type)
1130 if (0 != __vc_cmd_get_feature_enabled()) {
1131 return VC_ERROR_NOT_SUPPORTED;
1133 if (0 != __vc_cmd_check_privilege()) {
1134 return VC_ERROR_PERMISSION_DENIED;
1137 if (NULL == vc_command || NULL == type) {
1138 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1139 return VC_ERROR_INVALID_PARAMETER;
1142 vc_cmd_s* cmd = NULL;
1143 cmd = (vc_cmd_s*)vc_command;
1147 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get type][%p] type(%d)", vc_command, *type);
1152 int vc_cmd_set_format(vc_cmd_h vc_command, int format)
1154 if (0 != __vc_cmd_get_feature_enabled()) {
1155 return VC_ERROR_NOT_SUPPORTED;
1158 if (NULL == vc_command) {
1159 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1160 return VC_ERROR_INVALID_PARAMETER;
1163 vc_cmd_s* cmd = NULL;
1164 cmd = (vc_cmd_s*)vc_command;
1166 cmd->format = format;
1168 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set format][%p] format(%d)", vc_command, format);
1173 int vc_cmd_get_format(vc_cmd_h vc_command, int* format)
1175 if (0 != __vc_cmd_get_feature_enabled()) {
1176 return VC_ERROR_NOT_SUPPORTED;
1179 if (NULL == vc_command || NULL == format) {
1180 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1181 return VC_ERROR_INVALID_PARAMETER;
1184 vc_cmd_s* cmd = NULL;
1185 cmd = (vc_cmd_s*)vc_command;
1187 *format = cmd->format;
1189 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get format][%p] format(%d)", vc_command, *format);
1194 int vc_cmd_set_pid(vc_cmd_h vc_command, int pid)
1196 if (0 != __vc_cmd_get_feature_enabled()) {
1197 return VC_ERROR_NOT_SUPPORTED;
1199 if (0 != __vc_cmd_check_privilege()) {
1200 return VC_ERROR_PERMISSION_DENIED;
1203 if (NULL == vc_command) {
1204 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1205 return VC_ERROR_INVALID_PARAMETER;
1208 vc_cmd_s* cmd = NULL;
1209 cmd = (vc_cmd_s*)vc_command;
1213 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set pid][%p] pid(%d)", vc_command, cmd->pid);
1218 int vc_cmd_get_pid(vc_cmd_h vc_command, int* pid)
1220 if (0 != __vc_cmd_get_feature_enabled()) {
1221 return VC_ERROR_NOT_SUPPORTED;
1223 if (0 != __vc_cmd_check_privilege()) {
1224 return VC_ERROR_PERMISSION_DENIED;
1227 if (NULL == vc_command || NULL == pid) {
1228 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1229 return VC_ERROR_INVALID_PARAMETER;
1232 vc_cmd_s* cmd = NULL;
1233 cmd = (vc_cmd_s*)vc_command;
1237 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get pid][%p] pid(%d)", vc_command, *pid);
1242 int vc_cmd_set_domain(vc_cmd_h vc_command, int domain)
1244 if (0 != __vc_cmd_get_feature_enabled()) {
1245 return VC_ERROR_NOT_SUPPORTED;
1247 if (0 != __vc_cmd_check_privilege()) {
1248 return VC_ERROR_PERMISSION_DENIED;
1251 if (NULL == vc_command) {
1252 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1253 return VC_ERROR_INVALID_PARAMETER;
1256 vc_cmd_s* cmd = NULL;
1257 cmd = (vc_cmd_s*)vc_command;
1259 cmd->domain = domain;
1261 SLOG(LOG_DEBUG, TAG_VCCMD, "[Set domain] domain : %d", domain);
1266 int vc_cmd_get_domain(vc_cmd_h vc_command, int* domain)
1268 if (0 != __vc_cmd_get_feature_enabled()) {
1269 return VC_ERROR_NOT_SUPPORTED;
1271 if (0 != __vc_cmd_check_privilege()) {
1272 return VC_ERROR_PERMISSION_DENIED;
1275 if (NULL == vc_command || NULL == domain) {
1276 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1277 return VC_ERROR_INVALID_PARAMETER;
1280 vc_cmd_s* cmd = NULL;
1281 cmd = (vc_cmd_s*)vc_command;
1283 *domain = cmd->domain;
1285 SLOG(LOG_DEBUG, TAG_VCCMD, "[Get domain] domain : %d", *domain);
1291 * @brief Sets key value of command.
1293 * @param[in] vc_command Command handle
1294 * @param[in] key key value
1295 * @param[in] modifier modifier value
1297 * @return 0 on success, otherwise a negative error value
1298 * @retval #VC_ERROR_NONE Successful
1299 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1301 * @see vc_cmd_get_result_key()
1303 int vc_cmd_set_result_key(vc_cmd_h vc_command, int key, int modifier)
1305 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Set result key");
1307 if (NULL == vc_command) {
1308 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1309 return VC_ERROR_INVALID_PARAMETER;
1312 vc_cmd_s* cmd = NULL;
1313 cmd = (vc_cmd_s*)vc_command;
1315 SLOG(LOG_DEBUG, TAG_VCCMD, "key : %d, modifier : %d", key, modifier);
1318 cmd->modifier = modifier;
1320 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1326 * @brief Gets key value of command.
1328 * @param[in] vc_command Command handle
1329 * @param[out] key key value
1330 * @param[out] modifier modifier value
1332 * @return 0 on success, otherwise a negative error value
1333 * @retval #VC_ERROR_NONE Successful
1334 * @retval #VC_ERROR_INVALID_PARAMETER Invalid parameter
1336 * @see vc_cmd_add_result_key()
1338 int vc_cmd_get_result_key(vc_cmd_h vc_command, int* key, int* modifier)
1340 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Get result key");
1342 if (NULL == vc_command || NULL == key || NULL == modifier) {
1343 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter ");
1344 return VC_ERROR_INVALID_PARAMETER;
1347 vc_cmd_s* cmd = NULL;
1348 cmd = (vc_cmd_s*)vc_command;
1351 *modifier = cmd->modifier;
1353 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1358 int vc_cmd_print_list(vc_cmd_list_h vc_cmd_list)
1360 if (NULL == vc_cmd_list) {
1364 vc_cmd_list_s* list = NULL;
1365 list = (vc_cmd_list_s*)vc_cmd_list;
1367 SLOG(LOG_DEBUG, TAG_VCCMD, "@ Command List @");
1368 SLOG(LOG_DEBUG, TAG_VCCMD, "[List][%p]", list);
1370 int count = g_slist_length(list->list);
1373 vc_cmd_s *cmd = NULL;
1375 for (i = 0; i < count ; i++) {
1376 cmd = g_slist_nth_data(list->list, i);
1379 SLOG(LOG_DEBUG, TAG_VCCMD, " [%d][%p] PID(%d) ID(%d) Type(%d) Format(%d) Command(%s) Param(%s) Appid(%s) Invocation(%s) Fixed(%s)",
1380 i, cmd, cmd->pid, cmd->index, cmd->type, cmd->format, cmd->command, cmd->parameter, cmd->appid, cmd->invocation_name, cmd->fixed);
1384 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1389 int vc_cmd_get_nlu_json(vc_cmd_h vc_cmd, char** json)
1391 if (0 != __vc_cmd_get_feature_enabled()) {
1392 return VC_ERROR_NOT_SUPPORTED;
1395 if (NULL == vc_cmd || NULL == json) {
1396 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] NULL parameter");
1397 return VC_ERROR_INVALID_PARAMETER;
1400 vc_cmd_s* cmd = NULL;
1401 cmd = (vc_cmd_s*)vc_cmd;
1403 if (VC_CMD_FORMAT_ACTION != cmd->format) {
1404 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not Action format");
1405 return VC_ERROR_INVALID_PARAMETER;
1408 if (0 != vc_info_parser_get_nlu_result(json)) {
1409 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get nlu result");
1410 return VC_ERROR_OPERATION_FAILED;
1416 static void __vc_cmd_regex_deinit(int num_regex)
1418 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Start Deinitialize regex @@@");
1421 for (i = 0; num_regex > i; i++) {
1425 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1428 static int __vc_cmd_regex_init()
1430 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Initialize regular expression @@@");
1432 int cflags = REG_EXTENDED | REG_ICASE;
1438 vc_config_mgr_get_default_language(&lang);
1440 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
1441 return VC_ERROR_OPERATION_FAILED;
1444 if (!strcmp("en_US", lang)) {
1446 } else if (!strcmp("ko_KR", lang)) {
1452 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Not supported language type");
1453 return VC_ERROR_INVALID_LANGUAGE;
1459 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ lang type > %d @@@", lang_type);
1461 re_syntax_options = RE_SYNTAX_POSIX_EXTENDED;
1463 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s" , TIME_ABS1_REGEX[lang_type]);
1464 ret = regcomp(®[0], TIME_ABS1_REGEX[lang_type], cflags);
1466 regerror(ret, ®[0], errStr, sizeof(errStr));
1468 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1469 return VC_ERROR_OPERATION_FAILED;
1472 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_ABS2_REGEX[lang_type]);
1473 ret = regcomp(®[1], TIME_ABS2_REGEX[lang_type], cflags);
1475 regerror(ret, ®[1], errStr, sizeof(errStr));
1476 __vc_cmd_regex_deinit(1);
1478 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1479 return VC_ERROR_OPERATION_FAILED;
1482 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_ABS3_REGEX[lang_type]);
1483 ret = regcomp(®[2], TIME_ABS3_REGEX[lang_type], cflags);
1485 regerror(ret, ®[2], errStr, sizeof(errStr));
1486 __vc_cmd_regex_deinit(2);
1488 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1489 return VC_ERROR_OPERATION_FAILED;
1492 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL1_REGEX[lang_type]);
1493 ret = regcomp(®[3], TIME_REL1_REGEX[lang_type], cflags);
1495 regerror(ret, ®[3], errStr, sizeof(errStr));
1496 __vc_cmd_regex_deinit(3);
1498 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1499 return VC_ERROR_OPERATION_FAILED;
1502 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL2_REGEX[lang_type]);
1503 ret = regcomp(®[4], TIME_REL2_REGEX[lang_type], cflags);
1505 regerror(ret, ®[4], errStr, sizeof(errStr));
1506 __vc_cmd_regex_deinit(4);
1508 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1509 return VC_ERROR_OPERATION_FAILED;
1512 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_REL3_REGEX[lang_type]);
1513 ret = regcomp(®[5], TIME_REL3_REGEX[lang_type], cflags);
1515 regerror(ret, ®[5], errStr, sizeof(errStr));
1516 __vc_cmd_regex_deinit(5);
1518 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1519 return VC_ERROR_OPERATION_FAILED;
1522 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", TIME_PHR_REGEX[lang_type]);
1523 ret = regcomp(®[6], TIME_PHR_REGEX[lang_type], cflags);
1525 regerror(ret, ®[6], errStr, sizeof(errStr));
1526 __vc_cmd_regex_deinit(6);
1528 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1529 return VC_ERROR_OPERATION_FAILED;
1532 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS1_REGEX[lang_type]);
1533 ret = regcomp(®[7], DATE_ABS1_REGEX[lang_type], cflags);
1535 regerror(ret, ®[7], errStr, sizeof(errStr));
1536 __vc_cmd_regex_deinit(7);
1538 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1539 return VC_ERROR_OPERATION_FAILED;
1542 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS2_REGEX[lang_type]);
1543 ret = regcomp(®[8], DATE_ABS2_REGEX[lang_type], cflags);
1545 regerror(ret, ®[8], errStr, sizeof(errStr));
1546 __vc_cmd_regex_deinit(8);
1548 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1549 return VC_ERROR_OPERATION_FAILED;
1552 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_ABS3_REGEX[lang_type]);
1553 ret = regcomp(®[9], DATE_ABS3_REGEX[lang_type], cflags);
1555 regerror(ret, ®[9], errStr, sizeof(errStr));
1556 __vc_cmd_regex_deinit(9);
1558 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1559 return VC_ERROR_OPERATION_FAILED;
1562 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_PHR1_REGEX[lang_type]);
1563 ret = regcomp(®[10], DATE_PHR1_REGEX[lang_type], cflags);
1565 regerror(ret, ®[10], errStr, sizeof(errStr));
1566 __vc_cmd_regex_deinit(10);
1568 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1569 return VC_ERROR_OPERATION_FAILED;
1572 SLOG(LOG_DEBUG, TAG_VCCMD, "Regular expression > %s", DATE_PHR2_REGEX[lang_type]);
1573 ret = regcomp(®[11], DATE_PHR2_REGEX[lang_type], cflags);
1575 regerror(ret, ®[11], errStr, sizeof(errStr));
1576 __vc_cmd_regex_deinit(11);
1578 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] regcomp() error > %s", errStr);
1579 return VC_ERROR_OPERATION_FAILED;
1582 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
1584 return VC_ERROR_NONE;
1587 static void __vc_cmd_add_year(struct tm *td, int year)
1589 td->tm_year += year;
1592 static void __vc_cmd_add_mon(struct tm *td, int mon)
1596 mon = td->tm_mon + mon;
1600 __vc_cmd_add_year(td, year);
1603 td->tm_mon = mon % 12;
1606 static void __vc_cmd_add_mday(struct tm *td, int mday)
1608 int max_day[12] = {31, 28, 31, 30, 31, 30, 31, 30, 30, 31, 30, 31};
1609 int year = td->tm_year + 1900;
1613 if ((0 == year % 4 && 0 != year % 100) || 0 == year % 400) max_day[1] = 29;
1615 mday = td->tm_mday + mday;
1617 for (mon = td->tm_mon; mday >= max_day[mon % 12]; mon++) {
1618 mday -= max_day[mon % 12];
1620 if (11 == mon % 12) {
1623 if ((0 == year % 4 && 0 != year % 100) || 0 == year % 400) {
1631 mon = mon - td->tm_mon;
1634 __vc_cmd_add_mon(td, mon);
1640 static void __vc_cmd_add_hour(struct tm *td, int hour)
1644 hour = td->tm_hour + hour;
1648 __vc_cmd_add_mday(td, day);
1651 td->tm_hour = hour % 24;
1654 static void __vc_cmd_add_min(struct tm *td, int min)
1658 min = td->tm_min + min;
1662 __vc_cmd_add_hour(td, hour);
1665 td->tm_min = min % 60;
1668 static void __copy_struct_tm(struct tm *des, struct tm *src)
1670 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Start to copy struct tm @@@");
1672 des->tm_sec = src->tm_sec;
1673 des->tm_min = src->tm_min;
1674 des->tm_hour = src->tm_hour;
1675 des->tm_mday = src->tm_mday;
1676 des->tm_mon = src->tm_mon;
1677 des->tm_year = src->tm_year;
1678 des->tm_wday = src->tm_wday;
1679 des->tm_yday = src->tm_yday;
1680 des->tm_isdst = src->tm_isdst;
1682 des->tm_gmtoff = src->tm_gmtoff;
1683 des->tm_zone = src->tm_zone;
1686 static void __update_data_sidx(int idx)
1688 if (0 > g_data_sidx || idx < g_data_sidx) g_data_sidx = idx;
1691 static void __update_data_eidx(int idx)
1693 if (0 > g_data_eidx || idx > g_data_eidx) g_data_eidx = idx;
1696 static int __vc_cmd_tphrase_check(const char *str, struct tm *td, int *exist)
1698 regmatch_t pmatch[3];
1704 ret = regexec(®[6], str, 3, pmatch, 0);
1707 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1709 if (12 < td->tm_hour) {
1710 __vc_cmd_add_mday(td, 1);
1716 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1718 __vc_cmd_add_mday(td, 1);
1723 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1725 __update_data_sidx(pmatch[0].rm_so);
1726 __update_data_eidx(pmatch[0].rm_eo);
1729 return VC_ERROR_NONE;
1732 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1733 return VC_ERROR_NONE;
1736 static int __vc_cmd_trelative_check(const char *str, struct tm *td, int *exist)
1738 regmatch_t pmatch[2];
1746 char *tempstr = NULL;
1749 ret = regexec(®[3], str, 1, pmatch, 0);
1751 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", pmatch[0].rm_eo - pmatch[0].rm_so, str+pmatch[0].rm_so);
1754 sidx = pmatch[0].rm_so;
1755 eidx = pmatch[0].rm_eo;
1757 ret = regexec(®[4], str, 2, pmatch, 0);
1759 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1762 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1763 return VC_ERROR_OPERATION_FAILED;
1765 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1767 if (NULL == tempstr) {
1768 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1769 return VC_ERROR_OUT_OF_MEMORY;
1772 hour = atoi(tempstr);
1777 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1779 if (pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1780 if (pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1783 ret = regexec(®[5], str, 2, pmatch, 0);
1785 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1788 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1789 return VC_ERROR_OPERATION_FAILED;
1791 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1793 if (NULL == tempstr) {
1794 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1795 return VC_ERROR_OUT_OF_MEMORY;
1798 min = atoi(tempstr);
1803 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1805 if (pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1806 if (pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1809 if (hour < 0 && min < 0) {
1810 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1811 return VC_ERROR_NONE;
1814 hour = 0 > hour ? 0 : hour;
1815 min = 0 > min ? 0 : min;
1817 min = min + (hour * 60);
1819 __vc_cmd_add_min(td, min);
1822 __update_data_sidx(sidx);
1823 __update_data_eidx(eidx);
1826 return VC_ERROR_NONE;
1829 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1830 return VC_ERROR_NONE;
1833 static int __vc_cmd_tabsolute_check(const char *str, struct tm *td, int *exist)
1835 regmatch_t pmatch[5];
1844 char *tempstr = NULL;
1847 ret = regexec(®[0], str, 5, pmatch, 0);
1849 for (idx = 1; 5 > idx && 0 >= pmatch[idx].rm_eo - pmatch[idx].rm_so; idx++);
1853 sidx = pmatch[0].rm_so;
1854 eidx = pmatch[0].rm_eo;
1857 ret = regexec(®[1], str, 2, pmatch, 0);
1859 len = pmatch[1].rm_eo - pmatch[1].rm_so;
1862 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
1863 return VC_ERROR_OPERATION_FAILED;
1865 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
1867 if (NULL == tempstr) {
1868 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1869 return VC_ERROR_OUT_OF_MEMORY;
1872 hour = atoi(tempstr);
1875 hour = hour + 12 * flag;
1877 if (12 == hour) hour = 0;
1878 else if (24 == hour) hour = 12;
1881 if (0 > hour || 24 <= hour || (0 == flag && 12 < hour)) {
1882 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
1883 return VC_ERROR_NONE;
1889 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1891 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1892 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1893 } else if (0 < flag) {
1894 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
1895 return VC_ERROR_NONE;
1898 ret = regexec(®[2], str, 2, pmatch, 0);
1901 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1903 tempstr = strndup(str + pmatch[idx].rm_so, (size_t)len);
1905 if (NULL == tempstr) {
1906 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
1907 return VC_ERROR_OUT_OF_MEMORY;
1910 min = atoi(tempstr);
1912 if (0 > min || 60 <= min) {
1913 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
1914 return VC_ERROR_NONE;
1926 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", pmatch[0].rm_eo - pmatch[0].rm_so, str + pmatch[0].rm_so);
1927 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
1928 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
1931 if (0 > hour && 0 > min) {
1932 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
1933 return VC_ERROR_NONE;
1936 if (0 <= min && 0 <= hour) {
1937 if (hour < td->tm_hour || (hour == td->tm_hour && min <= td->tm_min)) __vc_cmd_add_mday(td, 1);
1941 } else if (0 <= min) {
1943 vc_config_mgr_get_default_language(&lang);
1945 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
1946 return VC_ERROR_OPERATION_FAILED;
1949 if (!strcmp("en_US", lang)) {
1950 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
1953 return VC_ERROR_NONE;
1955 if (min <= td->tm_min) __vc_cmd_add_hour(td, 1);
1962 if (hour <= td->tm_hour) __vc_cmd_add_mday(td, 1);
1970 __update_data_sidx(sidx);
1971 __update_data_eidx(eidx);
1974 return VC_ERROR_NONE;
1977 static int __vc_cmd_dphrase_check(const char *str, struct tm *td, int *exist)
1979 regmatch_t pmatch[10];
1985 ret = regexec(®[10], str, 5, pmatch, 0);
1987 for (idx = 1; 5 > idx && 0 >= pmatch[idx].rm_eo - pmatch[idx].rm_so; idx++);
1989 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
1991 td->tm_year = td_now.tm_year;
1992 td->tm_mon = td_now.tm_mon;
1993 td->tm_mday = td_now.tm_mday;
1995 __vc_cmd_add_mday(td, idx - 1);
1997 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
1999 __update_data_sidx(pmatch[0].rm_so);
2000 __update_data_eidx(pmatch[0].rm_eo);
2003 return VC_ERROR_NONE;
2006 ret = regexec(®[11], str, 10, pmatch, 0);
2008 for (idx = 1; 10 > idx; idx++) {
2009 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
2014 td->tm_year = td_now.tm_year;
2015 td->tm_mon = td_now.tm_mon;
2016 td->tm_mday = td_now.tm_mday;
2018 __vc_cmd_add_mday(td, idx + 1);
2020 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2022 __update_data_sidx(pmatch[0].rm_so);
2023 __update_data_eidx(pmatch[0].rm_eo);
2026 return VC_ERROR_NONE;
2029 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no matched string");
2030 return VC_ERROR_NONE;
2033 static int __vc_cmd_dabsolute_check(const char *str, struct tm *td, int *exist)
2035 regmatch_t pmatch[13];
2046 char *tempstr = NULL;
2049 ret = regexec(®[9], str, 2, pmatch, 0);
2051 len = pmatch[1].rm_eo - pmatch[1].rm_so;
2054 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
2055 return VC_ERROR_OPERATION_FAILED;
2057 tempstr = strndup(str + pmatch[1].rm_so, (size_t)len);
2059 if (NULL == tempstr) {
2060 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
2061 return VC_ERROR_OUT_OF_MEMORY;
2064 day = atoi(tempstr);
2069 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2071 sidx = pmatch[0].rm_so;
2072 eidx = pmatch[0].rm_eo;
2074 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
2075 return VC_ERROR_NONE;
2078 ret = regexec(®[8], str, 13, pmatch, 0);
2080 for (idx = 1; 13 > idx; idx++) {
2081 len = pmatch[idx].rm_eo - pmatch[idx].rm_so;
2091 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2093 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
2094 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
2097 vc_config_mgr_get_default_language(&lang);
2099 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Fail to get current language");
2100 return VC_ERROR_OPERATION_FAILED;
2103 if (!strcmp("en_US", lang)) {
2104 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
2107 return VC_ERROR_NONE;
2116 ret = regexec(®[7], str, 3, pmatch, 0);
2118 if (!m_flag) return -1;
2120 len = pmatch[2].rm_eo - pmatch[2].rm_so;
2123 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid string length");
2124 return VC_ERROR_OPERATION_FAILED;
2126 tempstr = strndup(str + pmatch[2].rm_so, (size_t)len);
2128 if (NULL == tempstr) {
2129 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Memory allocation is failed");
2130 return VC_ERROR_OUT_OF_MEMORY;
2133 year = atoi(tempstr);
2134 year = 1900 < year ? year - 1900 : year + 100;
2140 SLOG(LOG_DEBUG, TAG_VCCMD, "Matched string > %.*s", len, str + pmatch[0].rm_so);
2142 if (0 > sidx || pmatch[0].rm_so < sidx) sidx = pmatch[0].rm_so;
2143 if (0 > eidx || pmatch[0].rm_eo > eidx) eidx = pmatch[0].rm_eo;
2148 if (0 > g_time_flag) {
2152 } else if (2 == g_time_flag) {
2153 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
2154 return VC_ERROR_NONE;
2157 int max_day[12] = {31, 28, 31, 30, 31, 30, 31, 30, 30, 31, 30, 31};
2158 if ((0 == (year + 1900) % 4 && 0 != (year + 1900) % 100) || 0 == (year + 1900) % 400) max_day[1] = 29;
2160 if (max_day[mon] < day || 1 > day) {
2161 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] Incomming sentence is weird");
2162 return VC_ERROR_NONE;
2171 if (day < td_now.tm_mday) __vc_cmd_add_mon(td, 1);
2173 if (mon < td_now.tm_mon) __vc_cmd_add_year(td, 1);
2174 else if (mon == td_now.tm_mon && day < td_now.tm_mday) __vc_cmd_add_year(td, 1);
2178 __update_data_sidx(sidx);
2179 __update_data_eidx(eidx);
2182 return VC_ERROR_NONE;
2185 static int __vc_cmd_time_check(const char *str, struct tm *td)
2187 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Check time value in string \"%s\"", str);
2192 ret = __vc_cmd_tphrase_check(str, td, &exist);
2196 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2198 } else if (VC_ERROR_NONE != ret) {
2199 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured > (%d)", ret);
2203 ret = __vc_cmd_trelative_check(str, td, &exist);
2207 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2209 } else if (VC_ERROR_NONE != ret) {
2210 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured > (%d)", ret);
2214 ret = __vc_cmd_tabsolute_check(str, td, &exist);
2218 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Time value is exist");
2220 } else if (VC_ERROR_NONE != ret) {
2221 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured > (%d)", ret);
2225 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ There is no time value");
2226 return VC_ERROR_NONE;
2229 static int __vc_cmd_date_check(const char *str, struct tm *td)
2231 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Check date value in string \"%s\"", str);
2236 ret = __vc_cmd_dphrase_check(str, td, &exist);
2240 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Date value is exist");
2242 } else if (VC_ERROR_NONE != ret) {
2243 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured > (%d)", ret);
2247 ret = __vc_cmd_dabsolute_check(str, td, &exist);
2251 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Date value is exist");
2253 } else if (VC_ERROR_NONE != ret) {
2254 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured > (%d)", ret);
2258 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ There is no date value");
2259 return VC_ERROR_NONE;
2262 int vc_cmd_get_datetime(const char *text, time_t *result, char **remain)
2264 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@ Get timestamp data");
2267 const char *day_name[7] = {"Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat"};
2270 if (NULL == text || NULL == result || NULL == remain) {
2271 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Invalid parameter");
2272 return VC_ERROR_INVALID_PARAMETER;
2276 ret = __vc_cmd_regex_init();
2277 if (VC_ERROR_NONE != ret) {
2278 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] initialize regex failed");
2282 g_data_sidx = g_data_eidx = -1;
2285 localtime_r(&t_now, &td_now);
2286 SLOG(LOG_DEBUG, TAG_VCCMD, "Current timestamp = %d", (int)t_now);
2288 __copy_struct_tm(&td, &td_now);
2289 SLOG(LOG_DEBUG, TAG_VCCMD, "%d-%d-%d (%s), %d:%d:%d",
2290 td.tm_year + 1900, td.tm_mon + 1, td.tm_mday, day_name[td.tm_wday], td.tm_hour, td.tm_min, td.tm_sec);
2292 g_time_flag = g_date_flag = -1;
2294 ret = __vc_cmd_time_check(text, &td);
2295 if (VC_ERROR_NONE != ret) {
2296 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured in the check > (%d)", ret);
2300 ret = __vc_cmd_date_check(text, &td);
2301 if (VC_ERROR_NONE != ret) {
2302 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Error is occured in the check > (%d)", ret);
2306 __vc_cmd_regex_deinit(12);
2308 if (g_time_flag > 0 || g_date_flag > 0) {
2309 *result = mktime(&td);
2311 SLOG(LOG_DEBUG, TAG_VCCMD, "Timestamp in the text = %ld", *result);
2312 SLOG(LOG_DEBUG, TAG_VCCMD, "%d-%d-%d (%s), %d:%d:%d",
2313 td.tm_year + 1900, td.tm_mon + 1, td.tm_mday, day_name[td.tm_wday], td.tm_hour, td.tm_min, td.tm_sec);
2315 *remain = (char *)calloc(sizeof(char), (strlen(text) + 1 - g_data_eidx + g_data_sidx));
2317 if (NULL == *remain) {
2318 SLOG(LOG_ERROR, TAG_VCCMD, "[ERROR] Out of memory error");
2319 return VC_ERROR_OUT_OF_MEMORY;
2322 strncpy(*remain, text, g_data_sidx);
2323 strncat(*remain, text + g_data_eidx, strlen(text) - g_data_eidx);
2325 SLOG(LOG_DEBUG, TAG_VCCMD, "[REGEX] There is no data in the text");
2328 SLOG(LOG_DEBUG, TAG_VCCMD, "@@@");
2330 return VC_ERROR_NONE;