blob: 87033ba8217faaf33d89f3a33ba81b54474097ae [file] [log] [blame]
wangyouqiang80487e42024-05-24 15:06:20 +08001#if 1
2#include "mbtk_data_call.h"
3
4#define MBTK_RESULT_FAIL -1
5#define MBTK_RESULT_SUCCESS 0
6
7#define MBTK_BUFF_SIZE 10
8#define MBTK_BUFF_STATE_INIT "000000000"
9#define MBTK_BUFF_STATE_INIT_1 "010000000"
10#define MBTK_APN_STATE "persist.qser.apn.state"
11#define MBTK_APN_AUTH_TYPE "persist.qser.apn.auth"
12#define MBTK_APN_TYPE "persist.qser.apn.type"
13
14#if (defined(MBTK_SG_SUPPORT) && defined(MBTK_ALL_CID_SUPPORT))
15//Setting apn parameters starts from channel 1
16#define MBTK_SET_APN_CID_MIN 1
17#else
18//Setting apn parameters starts from channel 2
19#define MBTK_SET_APN_CID_MIN 2
20#endif
21#define MBTK_SET_APN_CID_MAX 7
22
23/*cid 1 - 7*/
24mbtk_qser_apn_info_s apninfo_s[9];
25char apn_set_state[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT;
26char apn_auth_type[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT;
27mbtk_apn_auth_proto_enum apn_auth[9];
28int default_apn_cid = -1;
29bool default_pdp_state = false;
30bool apn_init_flag = false;
31
32int mbtk_get_default_apn_cid(void)
33{
34 return default_apn_cid;
35}
36
37void mbtk_set_default_apn_cid(int cid)
38{
39 default_apn_cid = cid;
40}
41
42bool mbtk_get_default_pdp_state(void)
43{
44 return default_pdp_state;
45}
46
47void mbtk_set_default_pdp_state(bool state, int cid)
48{
49 int default_cid = mbtk_get_default_apn_cid();
50#ifndef MBTK_SG_SUPPORT
51 if(default_cid == cid || cid == 1)
52#else
53 if(default_cid == cid)
54#endif
55 {
56 default_pdp_state = state;
57 }
58}
59
60
61int mbtk_check_default_pdp_state(int cid)
62{
63#ifdef MBTK_ALL_CID_SUPPORT
64 int default_cid = mbtk_get_default_apn_cid();
65#ifndef MBTK_SG_SUPPORT
66 if((default_cid == cid || cid == 1) && mbtk_get_default_pdp_state())
67#else
68 if(default_cid == cid && mbtk_get_default_pdp_state())
69#endif
70 {
71 LOGE("default pdp already open.default_cid [%d] cid [%d]", default_cid, cid);
72 return MBTK_RESULT_FAIL;
73 }
74#endif
75 return MBTK_RESULT_SUCCESS;
76}
77
78static int mbtk_get_cid(void)
79{
80 int i = 0;
81 for(i = MBTK_SET_APN_CID_MIN; i <= MBTK_SET_APN_CID_MAX; i++)
82 {
83 if(apn_set_state[i] == '0')
84 {
85 return i;
86 }
87 }
88
89 return MBTK_RESULT_FAIL;
90}
91
92
93int mbtk_check_cid(int cid)
94{
95 if(cid < MBTK_APN_CID_MIN || cid > MBTK_APN_CID_MAX)
96 {
97 LOGE("cid range error.");
98 return MBTK_RESULT_FAIL;
99 }
100
101#ifdef MBTK_ALL_CID_SUPPORT
102 if(apn_set_state[cid] != '1' && apn_set_state[cid] != '2')
103 {
104 LOGE("cid [%d] is not exist.", cid);
105 return MBTK_RESULT_FAIL;
106 }
107#endif
108 return MBTK_RESULT_SUCCESS;
109}
110
111int mbtk_qser_route_config(int cid, mbtk_ipv4_info_t *ipv4, mbtk_ipv6_info_t *ipv6)
112{
113 if(ipv4 == NULL || ipv6 == NULL)
114 {
115 LOGE("ip param is NULL.");
116 return MBTK_RESULT_FAIL;
117 }
118
119#ifdef MBTK_ALL_CID_SUPPORT
120 int default_cid = mbtk_get_default_apn_cid();
121#ifndef MBTK_SG_SUPPORT
wangyouqiang13e98402024-05-24 16:07:43 +0800122 if(default_cid != cid && cid != 1)
wangyouqiang80487e42024-05-24 15:06:20 +0800123#else
124 if(default_cid != cid)
125#endif
126#endif
127 {
wangyouqiang13e98402024-05-24 16:07:43 +0800128 LOGE("cid [%d] no default cid.", cid);
wangyouqiang80487e42024-05-24 15:06:20 +0800129 return MBTK_RESULT_FAIL;
130 }
131
132 char buf[1024] = {0};
133 char dns[128] = {0};
134 int offset = 0;
135 int fd = -1;
136 sprintf(buf, "route add default dev ccinet%d", cid -1);
137 system(buf);
138
139 memset(buf, 0x0, 1024);
140 memset(dns, 0x0, 128);
141 offset = sprintf(buf, "search lan\n");
142 if(ipv4->valid)
143 {
144 if(inet_ntop(AF_INET, &(ipv4->PrimaryDNS), dns, 32) == NULL) {
145 LOGE("[qser_data] PrimaryDNS error.");
146 } else {
147 LOGE("[qser_data] PrimaryDNS : %s", dns);
148 }
149 offset += sprintf(buf + offset, "nameserver %s\n", dns);
150 memset(dns, 0x0, 128);
151 if(inet_ntop(AF_INET, &(ipv4->SecondaryDNS), dns, 32) == NULL) {
152 LOGE("[qser_data] SecondaryDNS error.");
153 } else {
154 LOGE("[qser_data] SecondaryDNS : %s", dns);
155 }
156 offset += sprintf(buf + offset, "nameserver %s\n", dns);
157 }
158 if(ipv6->valid)
159 {
160 memset(dns, 0x0, 128);
161 if(ipv6_2_str(&(ipv6->PrimaryDNS), dns))
162 {
163 LOGE("[qser_data] PrimaryDNS error.");
164 } else {
165 LOGE("[qser_data] PrimaryDNS : %s", dns);
166 }
167 offset += sprintf(buf + offset, "nameserver %s\n", dns);
168 memset(dns, 0x0, 128);
169 if(ipv6_2_str(&(ipv6->SecondaryDNS), dns))
170 {
171 LOGE("[qser_data] SecondaryDNS error.");
172 } else {
173 LOGE("[qser_data] SecondaryDNS : %s", dns);
174 }
175 offset += sprintf(buf + offset, "nameserver %s\n", dns);
176 }
177
178 if(offset > 0)
179 {
180 fd = open("/tmp/resolv.conf", O_WRONLY | O_TRUNC);
181 if(fd < 0)
182 {
183 LOGE("[qser_data] mbtk_route_config : open fail.");
184 return MBTK_RESULT_FAIL;
185 }
186
187 int ret = write(fd, buf, offset);
188 if(ret < 0)
189 {
190 LOGE("[qser_data] mbtk_route_config : write fail.");
191 }
192
193 close(fd);
194 }
195
196 return MBTK_RESULT_SUCCESS;
197}
198
199
200static int mbtk_apn_check_num1(const uint8 *apn_type, const uint8 *apn_name, int cid)
201{
202 if(apn_type == NULL || apn_name == NULL)
203 {
204 LOGE("paran is NULL.");
205 return MBTK_RESULT_FAIL;
206 }
207
208 if(cid == 1)
209 {
210 LOGE("no need check.");
211 return MBTK_RESULT_SUCCESS;
212 }
213
214 int apn_name_length = strlen((char *)apn_name);
215 //LOGD("qser_apn_info[0].apn_name: %s!", qser_apn_info[0].apn_name);
216 char *p = strstr((char *)apninfo_s[1].apn_name, "mnc");
217 if(p == NULL)
218 {
219 LOGE("not find !");
220 }
221 else
222 {
223 int default_apn_name_length = p - ((char *)apninfo_s[1].apn_name) -1;
224 LOGD("[qser_data] qser_check_apn_type default_apn_name_length = [%d]!", default_apn_name_length);
225 if(default_apn_name_length == apn_name_length)
226 {
227 int i = 0;
228 while(i < default_apn_name_length)
229 {
230 if(isalpha(apninfo_s[1].apn_name[i]) && isalpha(apn_name[i]))
231 {
232 if(tolower(apninfo_s[1].apn_name[i]) != tolower(apn_name[i]))
233 {
234 break;
235 }
236 }
237 else
238 {
239 //LOGE("[qser_data] not char!");
240 if(apninfo_s[1].apn_name[i] != apn_name[i])
241 {
242 break;
243 }
244 }
245
246 i++;
247 }
248
249 if(i == default_apn_name_length)
250 {
251 LOGE("apn_name is same!cid = [1].");
252 return MBTK_RESULT_FAIL;
253 }
254 }
255 }
256
257 return MBTK_RESULT_SUCCESS;
258}
259
260static int mbtk_apn_check_num2_7(const uint8 *apn_type, const uint8 *apn_name, mbtk_ip_type_enum ip_type, int cid)
261{
262 if(apn_type == NULL || apn_name == NULL)
263 {
264 LOGE("paran is NULL.");
265 return MBTK_RESULT_FAIL;
266 }
267
268 //check 2 - 7
269 int pdp_type_tmp = 1;
270 for (;pdp_type_tmp <= MBTK_APN_CID_MAX; pdp_type_tmp++)
271 {
272 if(pdp_type_tmp == cid)
273 {
274 continue;
275 }
276 if( (apn_set_state[pdp_type_tmp] == '1') || (apn_set_state[pdp_type_tmp] == '2') )
277 {
278 if(strcmp((char *)apninfo_s[pdp_type_tmp].apn_type, (char *)apn_type) == 0)
279 {
280 LOGE("apn_type is same!idx = [%d]", pdp_type_tmp);
281 return MBTK_RESULT_FAIL;
282 }
283 if (strcmp((char *)apninfo_s[pdp_type_tmp].apn_name, (char *)apn_name) == 0)
284 {
285 if(apninfo_s[pdp_type_tmp].ip_type == MBTK_IP_TYPE_IPV4V6 || ip_type == MBTK_IP_TYPE_IPV4V6)
286 {
287 LOGE("[qser_data] apn_name is same and pdp_type is IPV4V6!idx = [%d]", pdp_type_tmp);
288 return MBTK_RESULT_FAIL;
289 }
290
291 if(apninfo_s[pdp_type_tmp].ip_type == ip_type)
292 {
293 LOGE("pdp_type is same and pdp_type is same!idx = [%d]", pdp_type_tmp);
294 return MBTK_RESULT_FAIL;
295 }
296 }
297 }
298 }
299
300 return MBTK_RESULT_SUCCESS;
301}
302
303static int get_apn_user_pass_by_cid(mbtk_apn_info_t *apn)
304{
305 char prop_name[20] = {0};
306 char prop_data[300] = {0};
307 char local_ip[2] = {0};
308 char local_apn_name[128] = {0};
309 char local_apn_user[128] = {0};
310 char local_apn_pass[128] = {0};
311 char local_apn_auth[128] = {0};
312 sprintf(prop_name, "%s_%d",MBTK_APN_PROP,apn->cid);
313 if(property_get(prop_name, prop_data, "") > 0 && !str_empty(prop_data))
314 {
315 int i = 0;
316 int data_len = strlen(prop_data);
317 for(; i < data_len; i++)
318 {
319 if(prop_data[i] == ',')
320 {
321 prop_data[i] = ' ';
322 }
323 }
324 //LOGD("prop_data [%s].", prop_data);
325 int ret = sscanf(prop_data, " %s %s %s %s %s ", local_ip, local_apn_name, local_apn_user, local_apn_pass, local_apn_auth);
326 if(ret != 5)
327 {
328 LOGE("get user pass fail!ret [%d].", ret);
329 return MBTK_RESULT_FAIL;
330 }
331
332 mbtk_ip_type_enum local_ip_type = (mbtk_ip_type_enum)atoi(&local_ip[0]);
333
334 if(apn->ip_type != local_ip_type || strcmp((char *)apn->apn, local_apn_name))
335 {
336 LOGE("APN Changed, not get user/pass/auth.");
337 return MBTK_RESULT_FAIL;
338 }
339
340 if(memcmp(local_apn_user, "NULL", 4))
341 { // Not "NULL"
342 memcpy(apn->user, local_apn_user, strlen(local_apn_user)); // user
343 }
344
345 if(memcmp(local_apn_pass, "NULL", 4))
346 { // Not "NULL"
347 memcpy(apn->pass, local_apn_pass, strlen(local_apn_pass)); // pass
348 }
349
350 return MBTK_RESULT_SUCCESS;
351 }
352 return MBTK_RESULT_FAIL;
353}
354
355
356int mbtk_qser_apn_del(int cid)
357{
358 char buff[32] = {0};
359 int ret = mbtk_check_cid(cid);
360 if(ret < 0)
361 {
362 LOGE("cid is exist");
363 return MBTK_RESULT_FAIL;
364 }
365
366 apn_auth_type[cid] = '0';
367 property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type);
368
369 if(apn_set_state[cid] == '2')
370 {
371 mbtk_set_default_apn_cid(-1);
372 }
373 apn_set_state[cid] = '0';
374 property_set(MBTK_APN_STATE, (char *)apn_set_state);
375
376 sprintf(buff, "%s%d", MBTK_APN_TYPE, cid);
377 property_set(buff, "NULL");
378
379 memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s));
380 return MBTK_RESULT_SUCCESS;
381}
382/*
383AT+CGDCONT?
384+CGDCONT: 1,"IPV4V6","cmnet.MNC000.MCC460.GPRS","10.131.67.146 254.128.0.0.0.0.0.0.0.1.0.2.200.2.158.0",0,0,,,,
385
386+CGDCONT: 8,"IPV4V6","IMS","254.128.0.0.0.0.0.0.0.1.0.2.200.2.160.160",0,0,0,2,1,1
387
388OK
389*/
390
391int mbtk_qser_req_apn_get(void *data, int *data_len, int *cme_err)
392{
393 ATResponse *response = NULL;
394 int err = at_send_command_multiline("AT+CGDCONT?", "+CGDCONT:", &response);
395
396 if (err < 0 || response->success == 0 || !response->p_intermediates){
397 *cme_err = at_get_cme_error(response);
398 goto exit;
399 }
400
401 ATLine* lines_ptr = response->p_intermediates;
402 char *line = NULL;
403 int tmp_int;
404 char *tmp_str = NULL;
405 char buff[32] = {0};
406 uint8 apn_type[128] = {0};
407 /*
408 <apn_num[1]><cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len>...
409 <cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len>
410 */
411 uint8* apn_num = (uint8*)data;
412 uint8* data_ptr = (uint8*)((uint8*)data + sizeof(uint8)); // Jump apn_num[1]
413 mbtk_apn_info_t apn;
414 while(lines_ptr)
415 {
416 line = lines_ptr->line;
417 err = at_tok_start(&line);
418 if (err < 0)
419 {
420 goto exit;
421 }
422
423 err = at_tok_nextint(&line, &tmp_int); // cid
424 if (err < 0)
425 {
426 goto exit;
427 }
428 // Only get CID 1-7
429 if(apn_set_state[tmp_int] != '0')
430 {
431 memset(&apn, 0x0, sizeof(mbtk_apn_info_t));
432 apn.cid = tmp_int;
433 *data_ptr++ = (uint8)tmp_int; // cid
434
435 err = at_tok_nextstr(&line, &tmp_str);// ip type
436 if (err < 0)
437 {
438 goto exit;
439 }
440 if(!strcasecmp(tmp_str, "IP")) {
441 *data_ptr++ = (uint8)MBTK_IP_TYPE_IP;
442 apn.ip_type = MBTK_IP_TYPE_IP;
443 } else if(!strcasecmp(tmp_str, "IPV6")) {
444 *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV6;
445 apn.ip_type = MBTK_IP_TYPE_IPV6;
446 } else if(!strcasecmp(tmp_str, "IPV4V6")) {
447 *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV4V6;
448 apn.ip_type = MBTK_IP_TYPE_IPV4V6;
449 } else {
450 *data_ptr++ = (uint8)MBTK_IP_TYPE_PPP;
451 apn.ip_type = MBTK_IP_TYPE_PPP;
452 }
453
454 err = at_tok_nextstr(&line, &tmp_str); // apn
455 if (err < 0)
456 {
457 goto exit;
458 }
459 if(str_empty(tmp_str)) {
460 uint16_2_byte((uint16)0, data_ptr, false);
461 data_ptr += sizeof(uint16);
462 } else {
463 uint16_2_byte((uint16)strlen(tmp_str), data_ptr, false);
464 data_ptr += sizeof(uint16);
465 memcpy(data_ptr, tmp_str, strlen(tmp_str));
466 data_ptr += strlen(tmp_str);
467 memcpy(apn.apn, tmp_str, strlen(tmp_str));
468 }
469
470 if(get_apn_user_pass_by_cid(&apn)) {
471 // user
472 uint16_2_byte((uint16)0, data_ptr, false);
473 data_ptr += sizeof(uint16);
474
475 // pass
476 uint16_2_byte((uint16)0, data_ptr, false);
477 data_ptr += sizeof(uint16);
478
479 // auth
480 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
481 } else {
482 // user
483 if(str_empty(apn.user)) {
484 uint16_2_byte((uint16)0, data_ptr, false);
485 data_ptr += sizeof(uint16);
486 } else {
487 uint16_2_byte((uint16)strlen((char *)apn.user), data_ptr, false);
488 data_ptr += sizeof(uint16);
489 memcpy(data_ptr, apn.user, strlen((char *)apn.user));
490 data_ptr += strlen((char *)apn.user);
491 }
492
493 // pass
494 if(str_empty(apn.pass)) {
495 uint16_2_byte((uint16)0, data_ptr, false);
496 data_ptr += sizeof(uint16);
497 } else {
498 uint16_2_byte((uint16)strlen((char *)apn.pass), data_ptr, false);
499 data_ptr += sizeof(uint16);
500 memcpy(data_ptr, apn.pass, strlen((char *)apn.pass));
501 data_ptr += strlen((char *)apn.pass);
502 }
503
504 // auth
505 switch(apn_auth_type[apn.cid])
506 {
507 case '0':
508 {
509 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
510 break;
511 }
512 case '1':
513 {
514 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_NONE;
515 break;
516 }
517 case '2':
518 {
519 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_PAP;
520 break;
521 }
522 case '3':
523 {
524 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_CHAP;
525 break;
526 }
527 default:
528 {
529 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
530 break;
531 }
532 }
533 }
534
535 //apn_type
536 memset(buff, 0x0, 32);
537 sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid);
538 property_get(buff, (char *)apn_type, "");
539 if(str_empty(apn_type))
540 {
541 uint16_2_byte((uint16)0, data_ptr, false);
542 data_ptr += sizeof(uint16);
543 } else
544 {
545 uint16_2_byte((uint16)strlen((char *)apn_type), data_ptr, false);
546 data_ptr += sizeof(uint16);
547 memcpy(data_ptr, apn_type, strlen((char *)apn_type));
548 data_ptr += strlen((char *)apn_type);
549 }
550
551 if(apn_init_flag)
552 {
553 apn_init_flag = false;
554 mbtk_qser_apn_save(apn, apn_type, false);
555 }
556 (*apn_num)++;
557 }
558
559 lines_ptr = lines_ptr->p_next;
560 }
561
562 *data_len = data_ptr - (uint8*)data;
563
564 goto exit;
565exit:
566 at_response_free(response);
567 return err;
568}
569
570
571int mbtk_qser_apn_save(mbtk_apn_info_t apn, const uint8 *apn_type, bool state_save)
572{
573 if(apn_type == NULL)
574 {
575 LOGE("param is error.");
576 return MBTK_RESULT_FAIL;
577 }
578
579 int ret = -1;
580 char buff[32] = {0};
581 int cid = apn.cid;
582
583 memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s));
584 apninfo_s[cid].cid = apn.cid;
585 apninfo_s[cid].ip_type = apn.ip_type;
586 apninfo_s[cid].auth_proto = apn_auth[cid];
587 if(strlen((char *)apn.apn))
588 {
589 memcpy(apninfo_s[cid].apn_name, apn.apn, strlen((char *)apn.apn));
590 }
591 if(strlen((char *)apn.user))
592 {
593 memcpy(apninfo_s[cid].user_name, apn.user, strlen((char *)apn.user));
594 }
595 if(strlen((char *)apn.pass))
596 {
597 memcpy(apninfo_s[cid].user_pass, apn.pass, strlen((char *)apn.pass));
598 }
599 if(strlen((char *)apn_type))
600 {
601 memcpy(apninfo_s[cid].apn_type, apn_type, strlen((char *)apn_type));
602 if(state_save)
603 {
604 sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid);
605 property_set(buff, (char *)apn_type);
606 }
607 }
608
609 if(state_save)
610 {
611 if(strcmp((char *)apn_type, "iot_default") == 0)
612 {
613 apn_set_state[cid] = '2';
614 mbtk_set_default_apn_cid(cid);
615 }
616 else
617 {
618 apn_set_state[cid] = '1';
619 }
620 property_set(MBTK_APN_STATE, (char *)apn_set_state);
621
622 apn_auth_type[cid] = (char)apn_auth[cid] + '0';
623 property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type);
624 }
625 return MBTK_RESULT_SUCCESS;
626}
627
628int mbtk_strdata_to_apn(const uint8 *str, mbtk_apn_info_t *apn, uint8 *apn_type, mbtk_apn_req_type_enum *req_type)
629{
630 if(str == NULL || apn == NULL || apn_type == NULL)
631 {
632 LOGE("param is error.");
633 return MBTK_RESULT_FAIL;
634 }
635
636 // <cid[1]><ip_type[1]><req_type[1]><auth[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth_len[2]><apn_type[2]>
637 int len = 0;
638 int ret = -1;
639 memset(apn, 0x0, sizeof(mbtk_apn_info_t));
640
641 // cid
642 apn->cid = (int)*str++;
643
644 // ip_type
645 apn->ip_type = (mbtk_ip_type_enum)(*str++);
646
647 //req_type
648 *req_type = (mbtk_apn_req_type_enum)(*str++);
649 if((*req_type) == MBTK_APN_REQ_TYPE_ADD)
650 {
651 apn->cid = mbtk_get_cid();
652 if(apn->cid < 0)
653 {
654 LOGE("no enough cid.");
655 return MBTK_RESULT_FAIL;
656 }
657 }
658 else
659 {
660 ret = mbtk_check_cid(apn->cid);
661 if(ret < 0)
662 {
663 LOGE("cid is error.");
664 return MBTK_RESULT_FAIL;
665 }
666
667#ifndef MBTK_SG_SUPPORT
668 if(apn->cid == 1)
669 {
670 LOGE("cid 1 no support set.");
671 return MBTK_RESULT_FAIL;
672 }
673#endif
674 }
675
676 // auth
677 apn_auth[apn->cid] = (mbtk_apn_auth_proto_enum)(*str++);
678 if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_NONE || apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_DEFAULT)
679 {
680 memcpy(apn->auth,"NONE",strlen("NONE")+1);
681 }
682 else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_PAP)
683 {
684 memcpy(apn->auth,"PAP",strlen("PAP")+1);
685 }
686 else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_CHAP)
687 {
688 memcpy(apn->auth,"CHAP",strlen("CHAP")+1);
689 }
690 #if 0
691 else if(apn->auth_proto == QSER_APN_AUTH_PROTO_PAP_CHAP)
692 {
693 //NOT SUPPORT
694 }
695 #endif
696 else
697 {
698 LOGE("auth input error!");
699 return MBTK_RESULT_FAIL;
700 }
701
702 // apn
703 len = byte_2_uint16(str, false);
704 str += sizeof(uint16);
705 if(len > 0)
706 {
707 memcpy(apn->apn, str, len);
708 str += len;
709 }
710
711 // user
712 len = byte_2_uint16(str, false);
713 str += sizeof(uint16);
714 if(len > 0)
715 {
716 memcpy(apn->user, str, len);
717 str += len;
718 }
719
720 // pass
721 len = byte_2_uint16(str, false);
722 str += sizeof(uint16);
723 if(len > 0)
724 {
725 memcpy(apn->pass, str, len);
726 str += len;
727 }
728
729 // auth_type
730 len = byte_2_uint16(str, false);
731 str += sizeof(uint16);
732 if(len > 0)
733 {
734 memcpy(apn_type, str, len);
735 str += len;
736 }
737
738 ret = mbtk_apn_check_num1(apn_type, apn->apn, apn->cid);
739 if(ret < 0)
740 {
741 LOGE("num1 check error!");
742 return MBTK_RESULT_FAIL;
743 }
744
745 ret = mbtk_apn_check_num2_7(apn_type, apn->apn, apn->ip_type, apn->cid);
746 if(ret < 0)
747 {
748 LOGE("num2_7 check error!");
749 return MBTK_RESULT_FAIL;
750 }
751
752 LOGD("APN : %d, %d, %s, %s, %s, %s.", apn->cid,
753 apn->ip_type,
754 (str_empty(apn->apn) ? "NULL" : apn->apn),
755 (str_empty(apn->user) ? "NULL" : apn->user),
756 (str_empty(apn->pass) ? "NULL" : apn->pass),
757 (str_empty(apn->auth) ? "NULL" : apn->auth),
758 (str_empty(apn_type) ? "NULL" : apn_type));
759 return MBTK_RESULT_SUCCESS;
760}
761
762void mbtk_qser_apn_init(void)
763{
764 LOGD("enter mbtk_qser_apn_init.");
765 apn_init_flag = true;
766#ifdef MBTK_SG_SUPPORT
767 property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT);
768#else
769 property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT_1);
770#endif
771 LOGD("get apn_set_state[%s].", apn_set_state);
772
773 int i = 0;
774 for(; i < MBTK_BUFF_SIZE; i++)
775 {
776 if(apn_set_state[i] == '2')
777 {
778 mbtk_set_default_apn_cid(i);
779 break;
780 }
781 }
782
783 property_get(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type, MBTK_BUFF_STATE_INIT);
784 LOGD("get apn_auth_type[%s].", apn_auth_type);
785
786 mbtk_get_apn_send_pack();
787}
788#endif