wangyouqiang | 80487e4 | 2024-05-24 15:06:20 +0800 | [diff] [blame] | 1 | #if 1 |
| 2 | #include "mbtk_data_call.h" |
| 3 | |
| 4 | #define MBTK_RESULT_FAIL -1 |
| 5 | #define MBTK_RESULT_SUCCESS 0 |
| 6 | |
| 7 | #define MBTK_BUFF_SIZE 10 |
| 8 | #define MBTK_BUFF_STATE_INIT "000000000" |
| 9 | #define MBTK_BUFF_STATE_INIT_1 "010000000" |
| 10 | #define MBTK_APN_STATE "persist.qser.apn.state" |
| 11 | #define MBTK_APN_AUTH_TYPE "persist.qser.apn.auth" |
| 12 | #define MBTK_APN_TYPE "persist.qser.apn.type" |
| 13 | |
| 14 | #if (defined(MBTK_SG_SUPPORT) && defined(MBTK_ALL_CID_SUPPORT)) |
| 15 | //Setting apn parameters starts from channel 1 |
| 16 | #define MBTK_SET_APN_CID_MIN 1 |
| 17 | #else |
| 18 | //Setting apn parameters starts from channel 2 |
| 19 | #define MBTK_SET_APN_CID_MIN 2 |
| 20 | #endif |
| 21 | #define MBTK_SET_APN_CID_MAX 7 |
| 22 | |
| 23 | /*cid 1 - 7*/ |
| 24 | mbtk_qser_apn_info_s apninfo_s[9]; |
| 25 | char apn_set_state[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT; |
| 26 | char apn_auth_type[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT; |
| 27 | mbtk_apn_auth_proto_enum apn_auth[9]; |
| 28 | int default_apn_cid = -1; |
| 29 | bool default_pdp_state = false; |
| 30 | bool apn_init_flag = false; |
| 31 | |
| 32 | int mbtk_get_default_apn_cid(void) |
| 33 | { |
| 34 | return default_apn_cid; |
| 35 | } |
| 36 | |
| 37 | void mbtk_set_default_apn_cid(int cid) |
| 38 | { |
| 39 | default_apn_cid = cid; |
| 40 | } |
| 41 | |
| 42 | bool mbtk_get_default_pdp_state(void) |
| 43 | { |
| 44 | return default_pdp_state; |
| 45 | } |
| 46 | |
| 47 | void mbtk_set_default_pdp_state(bool state, int cid) |
| 48 | { |
| 49 | int default_cid = mbtk_get_default_apn_cid(); |
| 50 | #ifndef MBTK_SG_SUPPORT |
| 51 | if(default_cid == cid || cid == 1) |
| 52 | #else |
| 53 | if(default_cid == cid) |
| 54 | #endif |
| 55 | { |
| 56 | default_pdp_state = state; |
| 57 | } |
| 58 | } |
| 59 | |
| 60 | |
| 61 | int mbtk_check_default_pdp_state(int cid) |
| 62 | { |
| 63 | #ifdef MBTK_ALL_CID_SUPPORT |
| 64 | int default_cid = mbtk_get_default_apn_cid(); |
| 65 | #ifndef MBTK_SG_SUPPORT |
| 66 | if((default_cid == cid || cid == 1) && mbtk_get_default_pdp_state()) |
| 67 | #else |
| 68 | if(default_cid == cid && mbtk_get_default_pdp_state()) |
| 69 | #endif |
| 70 | { |
| 71 | LOGE("default pdp already open.default_cid [%d] cid [%d]", default_cid, cid); |
| 72 | return MBTK_RESULT_FAIL; |
| 73 | } |
| 74 | #endif |
| 75 | return MBTK_RESULT_SUCCESS; |
| 76 | } |
| 77 | |
| 78 | static int mbtk_get_cid(void) |
| 79 | { |
| 80 | int i = 0; |
| 81 | for(i = MBTK_SET_APN_CID_MIN; i <= MBTK_SET_APN_CID_MAX; i++) |
| 82 | { |
| 83 | if(apn_set_state[i] == '0') |
| 84 | { |
| 85 | return i; |
| 86 | } |
| 87 | } |
| 88 | |
| 89 | return MBTK_RESULT_FAIL; |
| 90 | } |
| 91 | |
| 92 | |
| 93 | int mbtk_check_cid(int cid) |
| 94 | { |
| 95 | if(cid < MBTK_APN_CID_MIN || cid > MBTK_APN_CID_MAX) |
| 96 | { |
| 97 | LOGE("cid range error."); |
| 98 | return MBTK_RESULT_FAIL; |
| 99 | } |
| 100 | |
| 101 | #ifdef MBTK_ALL_CID_SUPPORT |
| 102 | if(apn_set_state[cid] != '1' && apn_set_state[cid] != '2') |
| 103 | { |
| 104 | LOGE("cid [%d] is not exist.", cid); |
| 105 | return MBTK_RESULT_FAIL; |
| 106 | } |
| 107 | #endif |
| 108 | return MBTK_RESULT_SUCCESS; |
| 109 | } |
| 110 | |
| 111 | int mbtk_qser_route_config(int cid, mbtk_ipv4_info_t *ipv4, mbtk_ipv6_info_t *ipv6) |
| 112 | { |
| 113 | if(ipv4 == NULL || ipv6 == NULL) |
| 114 | { |
| 115 | LOGE("ip param is NULL."); |
| 116 | return MBTK_RESULT_FAIL; |
| 117 | } |
| 118 | |
| 119 | #ifdef MBTK_ALL_CID_SUPPORT |
| 120 | int default_cid = mbtk_get_default_apn_cid(); |
| 121 | #ifndef MBTK_SG_SUPPORT |
wangyouqiang | 13e9840 | 2024-05-24 16:07:43 +0800 | [diff] [blame^] | 122 | if(default_cid != cid && cid != 1) |
wangyouqiang | 80487e4 | 2024-05-24 15:06:20 +0800 | [diff] [blame] | 123 | #else |
| 124 | if(default_cid != cid) |
| 125 | #endif |
| 126 | #endif |
| 127 | { |
wangyouqiang | 13e9840 | 2024-05-24 16:07:43 +0800 | [diff] [blame^] | 128 | LOGE("cid [%d] no default cid.", cid); |
wangyouqiang | 80487e4 | 2024-05-24 15:06:20 +0800 | [diff] [blame] | 129 | return MBTK_RESULT_FAIL; |
| 130 | } |
| 131 | |
| 132 | char buf[1024] = {0}; |
| 133 | char dns[128] = {0}; |
| 134 | int offset = 0; |
| 135 | int fd = -1; |
| 136 | sprintf(buf, "route add default dev ccinet%d", cid -1); |
| 137 | system(buf); |
| 138 | |
| 139 | memset(buf, 0x0, 1024); |
| 140 | memset(dns, 0x0, 128); |
| 141 | offset = sprintf(buf, "search lan\n"); |
| 142 | if(ipv4->valid) |
| 143 | { |
| 144 | if(inet_ntop(AF_INET, &(ipv4->PrimaryDNS), dns, 32) == NULL) { |
| 145 | LOGE("[qser_data] PrimaryDNS error."); |
| 146 | } else { |
| 147 | LOGE("[qser_data] PrimaryDNS : %s", dns); |
| 148 | } |
| 149 | offset += sprintf(buf + offset, "nameserver %s\n", dns); |
| 150 | memset(dns, 0x0, 128); |
| 151 | if(inet_ntop(AF_INET, &(ipv4->SecondaryDNS), dns, 32) == NULL) { |
| 152 | LOGE("[qser_data] SecondaryDNS error."); |
| 153 | } else { |
| 154 | LOGE("[qser_data] SecondaryDNS : %s", dns); |
| 155 | } |
| 156 | offset += sprintf(buf + offset, "nameserver %s\n", dns); |
| 157 | } |
| 158 | if(ipv6->valid) |
| 159 | { |
| 160 | memset(dns, 0x0, 128); |
| 161 | if(ipv6_2_str(&(ipv6->PrimaryDNS), dns)) |
| 162 | { |
| 163 | LOGE("[qser_data] PrimaryDNS error."); |
| 164 | } else { |
| 165 | LOGE("[qser_data] PrimaryDNS : %s", dns); |
| 166 | } |
| 167 | offset += sprintf(buf + offset, "nameserver %s\n", dns); |
| 168 | memset(dns, 0x0, 128); |
| 169 | if(ipv6_2_str(&(ipv6->SecondaryDNS), dns)) |
| 170 | { |
| 171 | LOGE("[qser_data] SecondaryDNS error."); |
| 172 | } else { |
| 173 | LOGE("[qser_data] SecondaryDNS : %s", dns); |
| 174 | } |
| 175 | offset += sprintf(buf + offset, "nameserver %s\n", dns); |
| 176 | } |
| 177 | |
| 178 | if(offset > 0) |
| 179 | { |
| 180 | fd = open("/tmp/resolv.conf", O_WRONLY | O_TRUNC); |
| 181 | if(fd < 0) |
| 182 | { |
| 183 | LOGE("[qser_data] mbtk_route_config : open fail."); |
| 184 | return MBTK_RESULT_FAIL; |
| 185 | } |
| 186 | |
| 187 | int ret = write(fd, buf, offset); |
| 188 | if(ret < 0) |
| 189 | { |
| 190 | LOGE("[qser_data] mbtk_route_config : write fail."); |
| 191 | } |
| 192 | |
| 193 | close(fd); |
| 194 | } |
| 195 | |
| 196 | return MBTK_RESULT_SUCCESS; |
| 197 | } |
| 198 | |
| 199 | |
| 200 | static int mbtk_apn_check_num1(const uint8 *apn_type, const uint8 *apn_name, int cid) |
| 201 | { |
| 202 | if(apn_type == NULL || apn_name == NULL) |
| 203 | { |
| 204 | LOGE("paran is NULL."); |
| 205 | return MBTK_RESULT_FAIL; |
| 206 | } |
| 207 | |
| 208 | if(cid == 1) |
| 209 | { |
| 210 | LOGE("no need check."); |
| 211 | return MBTK_RESULT_SUCCESS; |
| 212 | } |
| 213 | |
| 214 | int apn_name_length = strlen((char *)apn_name); |
| 215 | //LOGD("qser_apn_info[0].apn_name: %s!", qser_apn_info[0].apn_name); |
| 216 | char *p = strstr((char *)apninfo_s[1].apn_name, "mnc"); |
| 217 | if(p == NULL) |
| 218 | { |
| 219 | LOGE("not find !"); |
| 220 | } |
| 221 | else |
| 222 | { |
| 223 | int default_apn_name_length = p - ((char *)apninfo_s[1].apn_name) -1; |
| 224 | LOGD("[qser_data] qser_check_apn_type default_apn_name_length = [%d]!", default_apn_name_length); |
| 225 | if(default_apn_name_length == apn_name_length) |
| 226 | { |
| 227 | int i = 0; |
| 228 | while(i < default_apn_name_length) |
| 229 | { |
| 230 | if(isalpha(apninfo_s[1].apn_name[i]) && isalpha(apn_name[i])) |
| 231 | { |
| 232 | if(tolower(apninfo_s[1].apn_name[i]) != tolower(apn_name[i])) |
| 233 | { |
| 234 | break; |
| 235 | } |
| 236 | } |
| 237 | else |
| 238 | { |
| 239 | //LOGE("[qser_data] not char!"); |
| 240 | if(apninfo_s[1].apn_name[i] != apn_name[i]) |
| 241 | { |
| 242 | break; |
| 243 | } |
| 244 | } |
| 245 | |
| 246 | i++; |
| 247 | } |
| 248 | |
| 249 | if(i == default_apn_name_length) |
| 250 | { |
| 251 | LOGE("apn_name is same!cid = [1]."); |
| 252 | return MBTK_RESULT_FAIL; |
| 253 | } |
| 254 | } |
| 255 | } |
| 256 | |
| 257 | return MBTK_RESULT_SUCCESS; |
| 258 | } |
| 259 | |
| 260 | static int mbtk_apn_check_num2_7(const uint8 *apn_type, const uint8 *apn_name, mbtk_ip_type_enum ip_type, int cid) |
| 261 | { |
| 262 | if(apn_type == NULL || apn_name == NULL) |
| 263 | { |
| 264 | LOGE("paran is NULL."); |
| 265 | return MBTK_RESULT_FAIL; |
| 266 | } |
| 267 | |
| 268 | //check 2 - 7 |
| 269 | int pdp_type_tmp = 1; |
| 270 | for (;pdp_type_tmp <= MBTK_APN_CID_MAX; pdp_type_tmp++) |
| 271 | { |
| 272 | if(pdp_type_tmp == cid) |
| 273 | { |
| 274 | continue; |
| 275 | } |
| 276 | if( (apn_set_state[pdp_type_tmp] == '1') || (apn_set_state[pdp_type_tmp] == '2') ) |
| 277 | { |
| 278 | if(strcmp((char *)apninfo_s[pdp_type_tmp].apn_type, (char *)apn_type) == 0) |
| 279 | { |
| 280 | LOGE("apn_type is same!idx = [%d]", pdp_type_tmp); |
| 281 | return MBTK_RESULT_FAIL; |
| 282 | } |
| 283 | if (strcmp((char *)apninfo_s[pdp_type_tmp].apn_name, (char *)apn_name) == 0) |
| 284 | { |
| 285 | if(apninfo_s[pdp_type_tmp].ip_type == MBTK_IP_TYPE_IPV4V6 || ip_type == MBTK_IP_TYPE_IPV4V6) |
| 286 | { |
| 287 | LOGE("[qser_data] apn_name is same and pdp_type is IPV4V6!idx = [%d]", pdp_type_tmp); |
| 288 | return MBTK_RESULT_FAIL; |
| 289 | } |
| 290 | |
| 291 | if(apninfo_s[pdp_type_tmp].ip_type == ip_type) |
| 292 | { |
| 293 | LOGE("pdp_type is same and pdp_type is same!idx = [%d]", pdp_type_tmp); |
| 294 | return MBTK_RESULT_FAIL; |
| 295 | } |
| 296 | } |
| 297 | } |
| 298 | } |
| 299 | |
| 300 | return MBTK_RESULT_SUCCESS; |
| 301 | } |
| 302 | |
| 303 | static int get_apn_user_pass_by_cid(mbtk_apn_info_t *apn) |
| 304 | { |
| 305 | char prop_name[20] = {0}; |
| 306 | char prop_data[300] = {0}; |
| 307 | char local_ip[2] = {0}; |
| 308 | char local_apn_name[128] = {0}; |
| 309 | char local_apn_user[128] = {0}; |
| 310 | char local_apn_pass[128] = {0}; |
| 311 | char local_apn_auth[128] = {0}; |
| 312 | sprintf(prop_name, "%s_%d",MBTK_APN_PROP,apn->cid); |
| 313 | if(property_get(prop_name, prop_data, "") > 0 && !str_empty(prop_data)) |
| 314 | { |
| 315 | int i = 0; |
| 316 | int data_len = strlen(prop_data); |
| 317 | for(; i < data_len; i++) |
| 318 | { |
| 319 | if(prop_data[i] == ',') |
| 320 | { |
| 321 | prop_data[i] = ' '; |
| 322 | } |
| 323 | } |
| 324 | //LOGD("prop_data [%s].", prop_data); |
| 325 | int ret = sscanf(prop_data, " %s %s %s %s %s ", local_ip, local_apn_name, local_apn_user, local_apn_pass, local_apn_auth); |
| 326 | if(ret != 5) |
| 327 | { |
| 328 | LOGE("get user pass fail!ret [%d].", ret); |
| 329 | return MBTK_RESULT_FAIL; |
| 330 | } |
| 331 | |
| 332 | mbtk_ip_type_enum local_ip_type = (mbtk_ip_type_enum)atoi(&local_ip[0]); |
| 333 | |
| 334 | if(apn->ip_type != local_ip_type || strcmp((char *)apn->apn, local_apn_name)) |
| 335 | { |
| 336 | LOGE("APN Changed, not get user/pass/auth."); |
| 337 | return MBTK_RESULT_FAIL; |
| 338 | } |
| 339 | |
| 340 | if(memcmp(local_apn_user, "NULL", 4)) |
| 341 | { // Not "NULL" |
| 342 | memcpy(apn->user, local_apn_user, strlen(local_apn_user)); // user |
| 343 | } |
| 344 | |
| 345 | if(memcmp(local_apn_pass, "NULL", 4)) |
| 346 | { // Not "NULL" |
| 347 | memcpy(apn->pass, local_apn_pass, strlen(local_apn_pass)); // pass |
| 348 | } |
| 349 | |
| 350 | return MBTK_RESULT_SUCCESS; |
| 351 | } |
| 352 | return MBTK_RESULT_FAIL; |
| 353 | } |
| 354 | |
| 355 | |
| 356 | int mbtk_qser_apn_del(int cid) |
| 357 | { |
| 358 | char buff[32] = {0}; |
| 359 | int ret = mbtk_check_cid(cid); |
| 360 | if(ret < 0) |
| 361 | { |
| 362 | LOGE("cid is exist"); |
| 363 | return MBTK_RESULT_FAIL; |
| 364 | } |
| 365 | |
| 366 | apn_auth_type[cid] = '0'; |
| 367 | property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type); |
| 368 | |
| 369 | if(apn_set_state[cid] == '2') |
| 370 | { |
| 371 | mbtk_set_default_apn_cid(-1); |
| 372 | } |
| 373 | apn_set_state[cid] = '0'; |
| 374 | property_set(MBTK_APN_STATE, (char *)apn_set_state); |
| 375 | |
| 376 | sprintf(buff, "%s%d", MBTK_APN_TYPE, cid); |
| 377 | property_set(buff, "NULL"); |
| 378 | |
| 379 | memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s)); |
| 380 | return MBTK_RESULT_SUCCESS; |
| 381 | } |
| 382 | /* |
| 383 | AT+CGDCONT? |
| 384 | +CGDCONT: 1,"IPV4V6","cmnet.MNC000.MCC460.GPRS","10.131.67.146 254.128.0.0.0.0.0.0.0.1.0.2.200.2.158.0",0,0,,,, |
| 385 | |
| 386 | +CGDCONT: 8,"IPV4V6","IMS","254.128.0.0.0.0.0.0.0.1.0.2.200.2.160.160",0,0,0,2,1,1 |
| 387 | |
| 388 | OK |
| 389 | */ |
| 390 | |
| 391 | int mbtk_qser_req_apn_get(void *data, int *data_len, int *cme_err) |
| 392 | { |
| 393 | ATResponse *response = NULL; |
| 394 | int err = at_send_command_multiline("AT+CGDCONT?", "+CGDCONT:", &response); |
| 395 | |
| 396 | if (err < 0 || response->success == 0 || !response->p_intermediates){ |
| 397 | *cme_err = at_get_cme_error(response); |
| 398 | goto exit; |
| 399 | } |
| 400 | |
| 401 | ATLine* lines_ptr = response->p_intermediates; |
| 402 | char *line = NULL; |
| 403 | int tmp_int; |
| 404 | char *tmp_str = NULL; |
| 405 | char buff[32] = {0}; |
| 406 | uint8 apn_type[128] = {0}; |
| 407 | /* |
| 408 | <apn_num[1]><cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len>... |
| 409 | <cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len> |
| 410 | */ |
| 411 | uint8* apn_num = (uint8*)data; |
| 412 | uint8* data_ptr = (uint8*)((uint8*)data + sizeof(uint8)); // Jump apn_num[1] |
| 413 | mbtk_apn_info_t apn; |
| 414 | while(lines_ptr) |
| 415 | { |
| 416 | line = lines_ptr->line; |
| 417 | err = at_tok_start(&line); |
| 418 | if (err < 0) |
| 419 | { |
| 420 | goto exit; |
| 421 | } |
| 422 | |
| 423 | err = at_tok_nextint(&line, &tmp_int); // cid |
| 424 | if (err < 0) |
| 425 | { |
| 426 | goto exit; |
| 427 | } |
| 428 | // Only get CID 1-7 |
| 429 | if(apn_set_state[tmp_int] != '0') |
| 430 | { |
| 431 | memset(&apn, 0x0, sizeof(mbtk_apn_info_t)); |
| 432 | apn.cid = tmp_int; |
| 433 | *data_ptr++ = (uint8)tmp_int; // cid |
| 434 | |
| 435 | err = at_tok_nextstr(&line, &tmp_str);// ip type |
| 436 | if (err < 0) |
| 437 | { |
| 438 | goto exit; |
| 439 | } |
| 440 | if(!strcasecmp(tmp_str, "IP")) { |
| 441 | *data_ptr++ = (uint8)MBTK_IP_TYPE_IP; |
| 442 | apn.ip_type = MBTK_IP_TYPE_IP; |
| 443 | } else if(!strcasecmp(tmp_str, "IPV6")) { |
| 444 | *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV6; |
| 445 | apn.ip_type = MBTK_IP_TYPE_IPV6; |
| 446 | } else if(!strcasecmp(tmp_str, "IPV4V6")) { |
| 447 | *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV4V6; |
| 448 | apn.ip_type = MBTK_IP_TYPE_IPV4V6; |
| 449 | } else { |
| 450 | *data_ptr++ = (uint8)MBTK_IP_TYPE_PPP; |
| 451 | apn.ip_type = MBTK_IP_TYPE_PPP; |
| 452 | } |
| 453 | |
| 454 | err = at_tok_nextstr(&line, &tmp_str); // apn |
| 455 | if (err < 0) |
| 456 | { |
| 457 | goto exit; |
| 458 | } |
| 459 | if(str_empty(tmp_str)) { |
| 460 | uint16_2_byte((uint16)0, data_ptr, false); |
| 461 | data_ptr += sizeof(uint16); |
| 462 | } else { |
| 463 | uint16_2_byte((uint16)strlen(tmp_str), data_ptr, false); |
| 464 | data_ptr += sizeof(uint16); |
| 465 | memcpy(data_ptr, tmp_str, strlen(tmp_str)); |
| 466 | data_ptr += strlen(tmp_str); |
| 467 | memcpy(apn.apn, tmp_str, strlen(tmp_str)); |
| 468 | } |
| 469 | |
| 470 | if(get_apn_user_pass_by_cid(&apn)) { |
| 471 | // user |
| 472 | uint16_2_byte((uint16)0, data_ptr, false); |
| 473 | data_ptr += sizeof(uint16); |
| 474 | |
| 475 | // pass |
| 476 | uint16_2_byte((uint16)0, data_ptr, false); |
| 477 | data_ptr += sizeof(uint16); |
| 478 | |
| 479 | // auth |
| 480 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT; |
| 481 | } else { |
| 482 | // user |
| 483 | if(str_empty(apn.user)) { |
| 484 | uint16_2_byte((uint16)0, data_ptr, false); |
| 485 | data_ptr += sizeof(uint16); |
| 486 | } else { |
| 487 | uint16_2_byte((uint16)strlen((char *)apn.user), data_ptr, false); |
| 488 | data_ptr += sizeof(uint16); |
| 489 | memcpy(data_ptr, apn.user, strlen((char *)apn.user)); |
| 490 | data_ptr += strlen((char *)apn.user); |
| 491 | } |
| 492 | |
| 493 | // pass |
| 494 | if(str_empty(apn.pass)) { |
| 495 | uint16_2_byte((uint16)0, data_ptr, false); |
| 496 | data_ptr += sizeof(uint16); |
| 497 | } else { |
| 498 | uint16_2_byte((uint16)strlen((char *)apn.pass), data_ptr, false); |
| 499 | data_ptr += sizeof(uint16); |
| 500 | memcpy(data_ptr, apn.pass, strlen((char *)apn.pass)); |
| 501 | data_ptr += strlen((char *)apn.pass); |
| 502 | } |
| 503 | |
| 504 | // auth |
| 505 | switch(apn_auth_type[apn.cid]) |
| 506 | { |
| 507 | case '0': |
| 508 | { |
| 509 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT; |
| 510 | break; |
| 511 | } |
| 512 | case '1': |
| 513 | { |
| 514 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_NONE; |
| 515 | break; |
| 516 | } |
| 517 | case '2': |
| 518 | { |
| 519 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_PAP; |
| 520 | break; |
| 521 | } |
| 522 | case '3': |
| 523 | { |
| 524 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_CHAP; |
| 525 | break; |
| 526 | } |
| 527 | default: |
| 528 | { |
| 529 | *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT; |
| 530 | break; |
| 531 | } |
| 532 | } |
| 533 | } |
| 534 | |
| 535 | //apn_type |
| 536 | memset(buff, 0x0, 32); |
| 537 | sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid); |
| 538 | property_get(buff, (char *)apn_type, ""); |
| 539 | if(str_empty(apn_type)) |
| 540 | { |
| 541 | uint16_2_byte((uint16)0, data_ptr, false); |
| 542 | data_ptr += sizeof(uint16); |
| 543 | } else |
| 544 | { |
| 545 | uint16_2_byte((uint16)strlen((char *)apn_type), data_ptr, false); |
| 546 | data_ptr += sizeof(uint16); |
| 547 | memcpy(data_ptr, apn_type, strlen((char *)apn_type)); |
| 548 | data_ptr += strlen((char *)apn_type); |
| 549 | } |
| 550 | |
| 551 | if(apn_init_flag) |
| 552 | { |
| 553 | apn_init_flag = false; |
| 554 | mbtk_qser_apn_save(apn, apn_type, false); |
| 555 | } |
| 556 | (*apn_num)++; |
| 557 | } |
| 558 | |
| 559 | lines_ptr = lines_ptr->p_next; |
| 560 | } |
| 561 | |
| 562 | *data_len = data_ptr - (uint8*)data; |
| 563 | |
| 564 | goto exit; |
| 565 | exit: |
| 566 | at_response_free(response); |
| 567 | return err; |
| 568 | } |
| 569 | |
| 570 | |
| 571 | int mbtk_qser_apn_save(mbtk_apn_info_t apn, const uint8 *apn_type, bool state_save) |
| 572 | { |
| 573 | if(apn_type == NULL) |
| 574 | { |
| 575 | LOGE("param is error."); |
| 576 | return MBTK_RESULT_FAIL; |
| 577 | } |
| 578 | |
| 579 | int ret = -1; |
| 580 | char buff[32] = {0}; |
| 581 | int cid = apn.cid; |
| 582 | |
| 583 | memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s)); |
| 584 | apninfo_s[cid].cid = apn.cid; |
| 585 | apninfo_s[cid].ip_type = apn.ip_type; |
| 586 | apninfo_s[cid].auth_proto = apn_auth[cid]; |
| 587 | if(strlen((char *)apn.apn)) |
| 588 | { |
| 589 | memcpy(apninfo_s[cid].apn_name, apn.apn, strlen((char *)apn.apn)); |
| 590 | } |
| 591 | if(strlen((char *)apn.user)) |
| 592 | { |
| 593 | memcpy(apninfo_s[cid].user_name, apn.user, strlen((char *)apn.user)); |
| 594 | } |
| 595 | if(strlen((char *)apn.pass)) |
| 596 | { |
| 597 | memcpy(apninfo_s[cid].user_pass, apn.pass, strlen((char *)apn.pass)); |
| 598 | } |
| 599 | if(strlen((char *)apn_type)) |
| 600 | { |
| 601 | memcpy(apninfo_s[cid].apn_type, apn_type, strlen((char *)apn_type)); |
| 602 | if(state_save) |
| 603 | { |
| 604 | sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid); |
| 605 | property_set(buff, (char *)apn_type); |
| 606 | } |
| 607 | } |
| 608 | |
| 609 | if(state_save) |
| 610 | { |
| 611 | if(strcmp((char *)apn_type, "iot_default") == 0) |
| 612 | { |
| 613 | apn_set_state[cid] = '2'; |
| 614 | mbtk_set_default_apn_cid(cid); |
| 615 | } |
| 616 | else |
| 617 | { |
| 618 | apn_set_state[cid] = '1'; |
| 619 | } |
| 620 | property_set(MBTK_APN_STATE, (char *)apn_set_state); |
| 621 | |
| 622 | apn_auth_type[cid] = (char)apn_auth[cid] + '0'; |
| 623 | property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type); |
| 624 | } |
| 625 | return MBTK_RESULT_SUCCESS; |
| 626 | } |
| 627 | |
| 628 | int mbtk_strdata_to_apn(const uint8 *str, mbtk_apn_info_t *apn, uint8 *apn_type, mbtk_apn_req_type_enum *req_type) |
| 629 | { |
| 630 | if(str == NULL || apn == NULL || apn_type == NULL) |
| 631 | { |
| 632 | LOGE("param is error."); |
| 633 | return MBTK_RESULT_FAIL; |
| 634 | } |
| 635 | |
| 636 | // <cid[1]><ip_type[1]><req_type[1]><auth[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth_len[2]><apn_type[2]> |
| 637 | int len = 0; |
| 638 | int ret = -1; |
| 639 | memset(apn, 0x0, sizeof(mbtk_apn_info_t)); |
| 640 | |
| 641 | // cid |
| 642 | apn->cid = (int)*str++; |
| 643 | |
| 644 | // ip_type |
| 645 | apn->ip_type = (mbtk_ip_type_enum)(*str++); |
| 646 | |
| 647 | //req_type |
| 648 | *req_type = (mbtk_apn_req_type_enum)(*str++); |
| 649 | if((*req_type) == MBTK_APN_REQ_TYPE_ADD) |
| 650 | { |
| 651 | apn->cid = mbtk_get_cid(); |
| 652 | if(apn->cid < 0) |
| 653 | { |
| 654 | LOGE("no enough cid."); |
| 655 | return MBTK_RESULT_FAIL; |
| 656 | } |
| 657 | } |
| 658 | else |
| 659 | { |
| 660 | ret = mbtk_check_cid(apn->cid); |
| 661 | if(ret < 0) |
| 662 | { |
| 663 | LOGE("cid is error."); |
| 664 | return MBTK_RESULT_FAIL; |
| 665 | } |
| 666 | |
| 667 | #ifndef MBTK_SG_SUPPORT |
| 668 | if(apn->cid == 1) |
| 669 | { |
| 670 | LOGE("cid 1 no support set."); |
| 671 | return MBTK_RESULT_FAIL; |
| 672 | } |
| 673 | #endif |
| 674 | } |
| 675 | |
| 676 | // auth |
| 677 | apn_auth[apn->cid] = (mbtk_apn_auth_proto_enum)(*str++); |
| 678 | if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_NONE || apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_DEFAULT) |
| 679 | { |
| 680 | memcpy(apn->auth,"NONE",strlen("NONE")+1); |
| 681 | } |
| 682 | else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_PAP) |
| 683 | { |
| 684 | memcpy(apn->auth,"PAP",strlen("PAP")+1); |
| 685 | } |
| 686 | else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_CHAP) |
| 687 | { |
| 688 | memcpy(apn->auth,"CHAP",strlen("CHAP")+1); |
| 689 | } |
| 690 | #if 0 |
| 691 | else if(apn->auth_proto == QSER_APN_AUTH_PROTO_PAP_CHAP) |
| 692 | { |
| 693 | //NOT SUPPORT |
| 694 | } |
| 695 | #endif |
| 696 | else |
| 697 | { |
| 698 | LOGE("auth input error!"); |
| 699 | return MBTK_RESULT_FAIL; |
| 700 | } |
| 701 | |
| 702 | // apn |
| 703 | len = byte_2_uint16(str, false); |
| 704 | str += sizeof(uint16); |
| 705 | if(len > 0) |
| 706 | { |
| 707 | memcpy(apn->apn, str, len); |
| 708 | str += len; |
| 709 | } |
| 710 | |
| 711 | // user |
| 712 | len = byte_2_uint16(str, false); |
| 713 | str += sizeof(uint16); |
| 714 | if(len > 0) |
| 715 | { |
| 716 | memcpy(apn->user, str, len); |
| 717 | str += len; |
| 718 | } |
| 719 | |
| 720 | // pass |
| 721 | len = byte_2_uint16(str, false); |
| 722 | str += sizeof(uint16); |
| 723 | if(len > 0) |
| 724 | { |
| 725 | memcpy(apn->pass, str, len); |
| 726 | str += len; |
| 727 | } |
| 728 | |
| 729 | // auth_type |
| 730 | len = byte_2_uint16(str, false); |
| 731 | str += sizeof(uint16); |
| 732 | if(len > 0) |
| 733 | { |
| 734 | memcpy(apn_type, str, len); |
| 735 | str += len; |
| 736 | } |
| 737 | |
| 738 | ret = mbtk_apn_check_num1(apn_type, apn->apn, apn->cid); |
| 739 | if(ret < 0) |
| 740 | { |
| 741 | LOGE("num1 check error!"); |
| 742 | return MBTK_RESULT_FAIL; |
| 743 | } |
| 744 | |
| 745 | ret = mbtk_apn_check_num2_7(apn_type, apn->apn, apn->ip_type, apn->cid); |
| 746 | if(ret < 0) |
| 747 | { |
| 748 | LOGE("num2_7 check error!"); |
| 749 | return MBTK_RESULT_FAIL; |
| 750 | } |
| 751 | |
| 752 | LOGD("APN : %d, %d, %s, %s, %s, %s.", apn->cid, |
| 753 | apn->ip_type, |
| 754 | (str_empty(apn->apn) ? "NULL" : apn->apn), |
| 755 | (str_empty(apn->user) ? "NULL" : apn->user), |
| 756 | (str_empty(apn->pass) ? "NULL" : apn->pass), |
| 757 | (str_empty(apn->auth) ? "NULL" : apn->auth), |
| 758 | (str_empty(apn_type) ? "NULL" : apn_type)); |
| 759 | return MBTK_RESULT_SUCCESS; |
| 760 | } |
| 761 | |
| 762 | void mbtk_qser_apn_init(void) |
| 763 | { |
| 764 | LOGD("enter mbtk_qser_apn_init."); |
| 765 | apn_init_flag = true; |
| 766 | #ifdef MBTK_SG_SUPPORT |
| 767 | property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT); |
| 768 | #else |
| 769 | property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT_1); |
| 770 | #endif |
| 771 | LOGD("get apn_set_state[%s].", apn_set_state); |
| 772 | |
| 773 | int i = 0; |
| 774 | for(; i < MBTK_BUFF_SIZE; i++) |
| 775 | { |
| 776 | if(apn_set_state[i] == '2') |
| 777 | { |
| 778 | mbtk_set_default_apn_cid(i); |
| 779 | break; |
| 780 | } |
| 781 | } |
| 782 | |
| 783 | property_get(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type, MBTK_BUFF_STATE_INIT); |
| 784 | LOGD("get apn_auth_type[%s].", apn_auth_type); |
| 785 | |
| 786 | mbtk_get_apn_send_pack(); |
| 787 | } |
| 788 | #endif |