blob: 8a6dc2fb66a70a2b22d7ec7c900ba2c9e1177fa2 [file] [log] [blame]
wangyouqiang80487e42024-05-24 15:06:20 +08001#if 1
2#include "mbtk_data_call.h"
3
4#define MBTK_RESULT_FAIL -1
5#define MBTK_RESULT_SUCCESS 0
6
7#define MBTK_BUFF_SIZE 10
8#define MBTK_BUFF_STATE_INIT "000000000"
9#define MBTK_BUFF_STATE_INIT_1 "010000000"
10#define MBTK_APN_STATE "persist.qser.apn.state"
11#define MBTK_APN_AUTH_TYPE "persist.qser.apn.auth"
12#define MBTK_APN_TYPE "persist.qser.apn.type"
13
14#if (defined(MBTK_SG_SUPPORT) && defined(MBTK_ALL_CID_SUPPORT))
15//Setting apn parameters starts from channel 1
16#define MBTK_SET_APN_CID_MIN 1
17#else
18//Setting apn parameters starts from channel 2
19#define MBTK_SET_APN_CID_MIN 2
20#endif
21#define MBTK_SET_APN_CID_MAX 7
22
23/*cid 1 - 7*/
24mbtk_qser_apn_info_s apninfo_s[9];
25char apn_set_state[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT;
26char apn_auth_type[MBTK_BUFF_SIZE] = MBTK_BUFF_STATE_INIT;
27mbtk_apn_auth_proto_enum apn_auth[9];
28int default_apn_cid = -1;
29bool default_pdp_state = false;
30bool apn_init_flag = false;
31
32int mbtk_get_default_apn_cid(void)
33{
34 return default_apn_cid;
35}
36
37void mbtk_set_default_apn_cid(int cid)
38{
39 default_apn_cid = cid;
40}
41
42bool mbtk_get_default_pdp_state(void)
43{
44 return default_pdp_state;
45}
46
47void mbtk_set_default_pdp_state(bool state, int cid)
48{
49 int default_cid = mbtk_get_default_apn_cid();
50#ifndef MBTK_SG_SUPPORT
51 if(default_cid == cid || cid == 1)
52#else
53 if(default_cid == cid)
54#endif
55 {
56 default_pdp_state = state;
57 }
58}
59
60
61int mbtk_check_default_pdp_state(int cid)
62{
63#ifdef MBTK_ALL_CID_SUPPORT
64 int default_cid = mbtk_get_default_apn_cid();
65#ifndef MBTK_SG_SUPPORT
66 if((default_cid == cid || cid == 1) && mbtk_get_default_pdp_state())
67#else
68 if(default_cid == cid && mbtk_get_default_pdp_state())
69#endif
70 {
71 LOGE("default pdp already open.default_cid [%d] cid [%d]", default_cid, cid);
72 return MBTK_RESULT_FAIL;
73 }
74#endif
75 return MBTK_RESULT_SUCCESS;
76}
77
78static int mbtk_get_cid(void)
79{
80 int i = 0;
81 for(i = MBTK_SET_APN_CID_MIN; i <= MBTK_SET_APN_CID_MAX; i++)
82 {
83 if(apn_set_state[i] == '0')
84 {
85 return i;
86 }
87 }
88
89 return MBTK_RESULT_FAIL;
90}
91
92
93int mbtk_check_cid(int cid)
94{
95 if(cid < MBTK_APN_CID_MIN || cid > MBTK_APN_CID_MAX)
96 {
97 LOGE("cid range error.");
98 return MBTK_RESULT_FAIL;
99 }
100
101#ifdef MBTK_ALL_CID_SUPPORT
102 if(apn_set_state[cid] != '1' && apn_set_state[cid] != '2')
103 {
104 LOGE("cid [%d] is not exist.", cid);
105 return MBTK_RESULT_FAIL;
106 }
107#endif
108 return MBTK_RESULT_SUCCESS;
109}
110
111int mbtk_qser_route_config(int cid, mbtk_ipv4_info_t *ipv4, mbtk_ipv6_info_t *ipv6)
112{
113 if(ipv4 == NULL || ipv6 == NULL)
114 {
115 LOGE("ip param is NULL.");
116 return MBTK_RESULT_FAIL;
117 }
118
119#ifdef MBTK_ALL_CID_SUPPORT
120 int default_cid = mbtk_get_default_apn_cid();
121#ifndef MBTK_SG_SUPPORT
wangyouqiang13e98402024-05-24 16:07:43 +0800122 if(default_cid != cid && cid != 1)
wangyouqiang80487e42024-05-24 15:06:20 +0800123#else
124 if(default_cid != cid)
125#endif
126#endif
127 {
wangyouqiang13e98402024-05-24 16:07:43 +0800128 LOGE("cid [%d] no default cid.", cid);
wangyouqiang80487e42024-05-24 15:06:20 +0800129 return MBTK_RESULT_FAIL;
130 }
131
132 char buf[1024] = {0};
133 char dns[128] = {0};
134 int offset = 0;
135 int fd = -1;
136 sprintf(buf, "route add default dev ccinet%d", cid -1);
137 system(buf);
138
139 memset(buf, 0x0, 1024);
140 memset(dns, 0x0, 128);
141 offset = sprintf(buf, "search lan\n");
142 if(ipv4->valid)
143 {
144 if(inet_ntop(AF_INET, &(ipv4->PrimaryDNS), dns, 32) == NULL) {
145 LOGE("[qser_data] PrimaryDNS error.");
146 } else {
147 LOGE("[qser_data] PrimaryDNS : %s", dns);
148 }
149 offset += sprintf(buf + offset, "nameserver %s\n", dns);
150 memset(dns, 0x0, 128);
151 if(inet_ntop(AF_INET, &(ipv4->SecondaryDNS), dns, 32) == NULL) {
152 LOGE("[qser_data] SecondaryDNS error.");
153 } else {
154 LOGE("[qser_data] SecondaryDNS : %s", dns);
155 }
156 offset += sprintf(buf + offset, "nameserver %s\n", dns);
157 }
158 if(ipv6->valid)
159 {
160 memset(dns, 0x0, 128);
161 if(ipv6_2_str(&(ipv6->PrimaryDNS), dns))
162 {
163 LOGE("[qser_data] PrimaryDNS error.");
164 } else {
165 LOGE("[qser_data] PrimaryDNS : %s", dns);
166 }
167 offset += sprintf(buf + offset, "nameserver %s\n", dns);
168 memset(dns, 0x0, 128);
169 if(ipv6_2_str(&(ipv6->SecondaryDNS), dns))
170 {
171 LOGE("[qser_data] SecondaryDNS error.");
172 } else {
173 LOGE("[qser_data] SecondaryDNS : %s", dns);
174 }
175 offset += sprintf(buf + offset, "nameserver %s\n", dns);
176 }
177
178 if(offset > 0)
179 {
180 fd = open("/tmp/resolv.conf", O_WRONLY | O_TRUNC);
181 if(fd < 0)
182 {
183 LOGE("[qser_data] mbtk_route_config : open fail.");
184 return MBTK_RESULT_FAIL;
185 }
186
187 int ret = write(fd, buf, offset);
188 if(ret < 0)
189 {
190 LOGE("[qser_data] mbtk_route_config : write fail.");
191 }
192
193 close(fd);
194 }
195
196 return MBTK_RESULT_SUCCESS;
197}
198
199
200static int mbtk_apn_check_num1(const uint8 *apn_type, const uint8 *apn_name, int cid)
201{
202 if(apn_type == NULL || apn_name == NULL)
203 {
204 LOGE("paran is NULL.");
205 return MBTK_RESULT_FAIL;
206 }
207
208 if(cid == 1)
209 {
210 LOGE("no need check.");
211 return MBTK_RESULT_SUCCESS;
212 }
213
214 int apn_name_length = strlen((char *)apn_name);
215 //LOGD("qser_apn_info[0].apn_name: %s!", qser_apn_info[0].apn_name);
216 char *p = strstr((char *)apninfo_s[1].apn_name, "mnc");
217 if(p == NULL)
218 {
219 LOGE("not find !");
220 }
221 else
222 {
223 int default_apn_name_length = p - ((char *)apninfo_s[1].apn_name) -1;
224 LOGD("[qser_data] qser_check_apn_type default_apn_name_length = [%d]!", default_apn_name_length);
225 if(default_apn_name_length == apn_name_length)
226 {
227 int i = 0;
228 while(i < default_apn_name_length)
229 {
230 if(isalpha(apninfo_s[1].apn_name[i]) && isalpha(apn_name[i]))
231 {
232 if(tolower(apninfo_s[1].apn_name[i]) != tolower(apn_name[i]))
233 {
234 break;
235 }
236 }
237 else
238 {
239 //LOGE("[qser_data] not char!");
240 if(apninfo_s[1].apn_name[i] != apn_name[i])
241 {
242 break;
243 }
244 }
245
246 i++;
247 }
248
249 if(i == default_apn_name_length)
250 {
251 LOGE("apn_name is same!cid = [1].");
252 return MBTK_RESULT_FAIL;
253 }
254 }
255 }
256
257 return MBTK_RESULT_SUCCESS;
258}
259
260static int mbtk_apn_check_num2_7(const uint8 *apn_type, const uint8 *apn_name, mbtk_ip_type_enum ip_type, int cid)
261{
262 if(apn_type == NULL || apn_name == NULL)
263 {
264 LOGE("paran is NULL.");
265 return MBTK_RESULT_FAIL;
266 }
267
268 //check 2 - 7
269 int pdp_type_tmp = 1;
270 for (;pdp_type_tmp <= MBTK_APN_CID_MAX; pdp_type_tmp++)
271 {
272 if(pdp_type_tmp == cid)
273 {
274 continue;
275 }
276 if( (apn_set_state[pdp_type_tmp] == '1') || (apn_set_state[pdp_type_tmp] == '2') )
277 {
278 if(strcmp((char *)apninfo_s[pdp_type_tmp].apn_type, (char *)apn_type) == 0)
279 {
280 LOGE("apn_type is same!idx = [%d]", pdp_type_tmp);
281 return MBTK_RESULT_FAIL;
282 }
283 if (strcmp((char *)apninfo_s[pdp_type_tmp].apn_name, (char *)apn_name) == 0)
284 {
285 if(apninfo_s[pdp_type_tmp].ip_type == MBTK_IP_TYPE_IPV4V6 || ip_type == MBTK_IP_TYPE_IPV4V6)
286 {
287 LOGE("[qser_data] apn_name is same and pdp_type is IPV4V6!idx = [%d]", pdp_type_tmp);
288 return MBTK_RESULT_FAIL;
289 }
290
291 if(apninfo_s[pdp_type_tmp].ip_type == ip_type)
292 {
293 LOGE("pdp_type is same and pdp_type is same!idx = [%d]", pdp_type_tmp);
294 return MBTK_RESULT_FAIL;
295 }
296 }
297 }
298 }
299
300 return MBTK_RESULT_SUCCESS;
301}
302
303static int get_apn_user_pass_by_cid(mbtk_apn_info_t *apn)
304{
305 char prop_name[20] = {0};
306 char prop_data[300] = {0};
307 char local_ip[2] = {0};
308 char local_apn_name[128] = {0};
309 char local_apn_user[128] = {0};
310 char local_apn_pass[128] = {0};
311 char local_apn_auth[128] = {0};
312 sprintf(prop_name, "%s_%d",MBTK_APN_PROP,apn->cid);
313 if(property_get(prop_name, prop_data, "") > 0 && !str_empty(prop_data))
314 {
315 int i = 0;
316 int data_len = strlen(prop_data);
317 for(; i < data_len; i++)
318 {
319 if(prop_data[i] == ',')
320 {
321 prop_data[i] = ' ';
322 }
323 }
324 //LOGD("prop_data [%s].", prop_data);
325 int ret = sscanf(prop_data, " %s %s %s %s %s ", local_ip, local_apn_name, local_apn_user, local_apn_pass, local_apn_auth);
326 if(ret != 5)
327 {
328 LOGE("get user pass fail!ret [%d].", ret);
329 return MBTK_RESULT_FAIL;
330 }
331
332 mbtk_ip_type_enum local_ip_type = (mbtk_ip_type_enum)atoi(&local_ip[0]);
333
334 if(apn->ip_type != local_ip_type || strcmp((char *)apn->apn, local_apn_name))
335 {
336 LOGE("APN Changed, not get user/pass/auth.");
337 return MBTK_RESULT_FAIL;
338 }
339
340 if(memcmp(local_apn_user, "NULL", 4))
341 { // Not "NULL"
342 memcpy(apn->user, local_apn_user, strlen(local_apn_user)); // user
343 }
344
345 if(memcmp(local_apn_pass, "NULL", 4))
346 { // Not "NULL"
347 memcpy(apn->pass, local_apn_pass, strlen(local_apn_pass)); // pass
348 }
349
350 return MBTK_RESULT_SUCCESS;
351 }
352 return MBTK_RESULT_FAIL;
353}
354
355
356int mbtk_qser_apn_del(int cid)
357{
358 char buff[32] = {0};
359 int ret = mbtk_check_cid(cid);
360 if(ret < 0)
361 {
362 LOGE("cid is exist");
363 return MBTK_RESULT_FAIL;
364 }
365
wangyouqiang75b6cfd2024-05-31 14:25:45 +0800366#ifndef MBTK_SG_SUPPORT
367 if(cid == 1)
368 {
369 LOGE("cid 1 is exist");
370 return MBTK_RESULT_FAIL;
371 }
372#endif
373
wangyouqiang80487e42024-05-24 15:06:20 +0800374 apn_auth_type[cid] = '0';
375 property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type);
376
377 if(apn_set_state[cid] == '2')
378 {
379 mbtk_set_default_apn_cid(-1);
380 }
381 apn_set_state[cid] = '0';
382 property_set(MBTK_APN_STATE, (char *)apn_set_state);
383
384 sprintf(buff, "%s%d", MBTK_APN_TYPE, cid);
385 property_set(buff, "NULL");
386
387 memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s));
388 return MBTK_RESULT_SUCCESS;
389}
390/*
391AT+CGDCONT?
392+CGDCONT: 1,"IPV4V6","cmnet.MNC000.MCC460.GPRS","10.131.67.146 254.128.0.0.0.0.0.0.0.1.0.2.200.2.158.0",0,0,,,,
393
394+CGDCONT: 8,"IPV4V6","IMS","254.128.0.0.0.0.0.0.0.1.0.2.200.2.160.160",0,0,0,2,1,1
395
396OK
397*/
398
399int mbtk_qser_req_apn_get(void *data, int *data_len, int *cme_err)
400{
401 ATResponse *response = NULL;
402 int err = at_send_command_multiline("AT+CGDCONT?", "+CGDCONT:", &response);
403
404 if (err < 0 || response->success == 0 || !response->p_intermediates){
405 *cme_err = at_get_cme_error(response);
406 goto exit;
407 }
408
409 ATLine* lines_ptr = response->p_intermediates;
410 char *line = NULL;
411 int tmp_int;
412 char *tmp_str = NULL;
413 char buff[32] = {0};
414 uint8 apn_type[128] = {0};
415 /*
416 <apn_num[1]><cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len>...
417 <cid[1]><ip_type[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth[1]><apn_type_len[2]><apn_type_len>
418 */
419 uint8* apn_num = (uint8*)data;
420 uint8* data_ptr = (uint8*)((uint8*)data + sizeof(uint8)); // Jump apn_num[1]
421 mbtk_apn_info_t apn;
422 while(lines_ptr)
423 {
424 line = lines_ptr->line;
425 err = at_tok_start(&line);
426 if (err < 0)
427 {
428 goto exit;
429 }
430
431 err = at_tok_nextint(&line, &tmp_int); // cid
432 if (err < 0)
433 {
434 goto exit;
435 }
436 // Only get CID 1-7
437 if(apn_set_state[tmp_int] != '0')
438 {
439 memset(&apn, 0x0, sizeof(mbtk_apn_info_t));
440 apn.cid = tmp_int;
441 *data_ptr++ = (uint8)tmp_int; // cid
442
443 err = at_tok_nextstr(&line, &tmp_str);// ip type
444 if (err < 0)
445 {
446 goto exit;
447 }
448 if(!strcasecmp(tmp_str, "IP")) {
449 *data_ptr++ = (uint8)MBTK_IP_TYPE_IP;
450 apn.ip_type = MBTK_IP_TYPE_IP;
451 } else if(!strcasecmp(tmp_str, "IPV6")) {
452 *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV6;
453 apn.ip_type = MBTK_IP_TYPE_IPV6;
454 } else if(!strcasecmp(tmp_str, "IPV4V6")) {
455 *data_ptr++ = (uint8)MBTK_IP_TYPE_IPV4V6;
456 apn.ip_type = MBTK_IP_TYPE_IPV4V6;
457 } else {
458 *data_ptr++ = (uint8)MBTK_IP_TYPE_PPP;
459 apn.ip_type = MBTK_IP_TYPE_PPP;
460 }
461
462 err = at_tok_nextstr(&line, &tmp_str); // apn
463 if (err < 0)
464 {
465 goto exit;
466 }
467 if(str_empty(tmp_str)) {
468 uint16_2_byte((uint16)0, data_ptr, false);
469 data_ptr += sizeof(uint16);
470 } else {
471 uint16_2_byte((uint16)strlen(tmp_str), data_ptr, false);
472 data_ptr += sizeof(uint16);
473 memcpy(data_ptr, tmp_str, strlen(tmp_str));
474 data_ptr += strlen(tmp_str);
475 memcpy(apn.apn, tmp_str, strlen(tmp_str));
476 }
477
478 if(get_apn_user_pass_by_cid(&apn)) {
479 // user
480 uint16_2_byte((uint16)0, data_ptr, false);
481 data_ptr += sizeof(uint16);
482
483 // pass
484 uint16_2_byte((uint16)0, data_ptr, false);
485 data_ptr += sizeof(uint16);
486
487 // auth
488 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
489 } else {
490 // user
491 if(str_empty(apn.user)) {
492 uint16_2_byte((uint16)0, data_ptr, false);
493 data_ptr += sizeof(uint16);
494 } else {
495 uint16_2_byte((uint16)strlen((char *)apn.user), data_ptr, false);
496 data_ptr += sizeof(uint16);
497 memcpy(data_ptr, apn.user, strlen((char *)apn.user));
498 data_ptr += strlen((char *)apn.user);
499 }
500
501 // pass
502 if(str_empty(apn.pass)) {
503 uint16_2_byte((uint16)0, data_ptr, false);
504 data_ptr += sizeof(uint16);
505 } else {
506 uint16_2_byte((uint16)strlen((char *)apn.pass), data_ptr, false);
507 data_ptr += sizeof(uint16);
508 memcpy(data_ptr, apn.pass, strlen((char *)apn.pass));
509 data_ptr += strlen((char *)apn.pass);
510 }
511
512 // auth
513 switch(apn_auth_type[apn.cid])
514 {
515 case '0':
516 {
517 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
518 break;
519 }
520 case '1':
521 {
522 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_NONE;
523 break;
524 }
525 case '2':
526 {
527 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_PAP;
528 break;
529 }
530 case '3':
531 {
532 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_CHAP;
533 break;
534 }
535 default:
536 {
537 *data_ptr++ = (uint8)MBTK_APN_AUTH_PROTO_DEFAULT;
538 break;
539 }
540 }
541 }
542
543 //apn_type
544 memset(buff, 0x0, 32);
545 sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid);
546 property_get(buff, (char *)apn_type, "");
547 if(str_empty(apn_type))
548 {
549 uint16_2_byte((uint16)0, data_ptr, false);
550 data_ptr += sizeof(uint16);
551 } else
552 {
553 uint16_2_byte((uint16)strlen((char *)apn_type), data_ptr, false);
554 data_ptr += sizeof(uint16);
555 memcpy(data_ptr, apn_type, strlen((char *)apn_type));
556 data_ptr += strlen((char *)apn_type);
557 }
558
559 if(apn_init_flag)
560 {
561 apn_init_flag = false;
562 mbtk_qser_apn_save(apn, apn_type, false);
563 }
564 (*apn_num)++;
565 }
566
567 lines_ptr = lines_ptr->p_next;
568 }
569
570 *data_len = data_ptr - (uint8*)data;
571
572 goto exit;
573exit:
574 at_response_free(response);
575 return err;
576}
577
578
579int mbtk_qser_apn_save(mbtk_apn_info_t apn, const uint8 *apn_type, bool state_save)
580{
581 if(apn_type == NULL)
582 {
583 LOGE("param is error.");
584 return MBTK_RESULT_FAIL;
585 }
586
587 int ret = -1;
588 char buff[32] = {0};
589 int cid = apn.cid;
590
591 memset(&apninfo_s[cid], 0x0, sizeof(mbtk_qser_apn_info_s));
592 apninfo_s[cid].cid = apn.cid;
593 apninfo_s[cid].ip_type = apn.ip_type;
594 apninfo_s[cid].auth_proto = apn_auth[cid];
595 if(strlen((char *)apn.apn))
596 {
597 memcpy(apninfo_s[cid].apn_name, apn.apn, strlen((char *)apn.apn));
598 }
599 if(strlen((char *)apn.user))
600 {
601 memcpy(apninfo_s[cid].user_name, apn.user, strlen((char *)apn.user));
602 }
603 if(strlen((char *)apn.pass))
604 {
605 memcpy(apninfo_s[cid].user_pass, apn.pass, strlen((char *)apn.pass));
606 }
607 if(strlen((char *)apn_type))
608 {
609 memcpy(apninfo_s[cid].apn_type, apn_type, strlen((char *)apn_type));
610 if(state_save)
611 {
612 sprintf(buff, "%s%d", MBTK_APN_TYPE, apn.cid);
613 property_set(buff, (char *)apn_type);
614 }
615 }
616
617 if(state_save)
618 {
619 if(strcmp((char *)apn_type, "iot_default") == 0)
620 {
621 apn_set_state[cid] = '2';
622 mbtk_set_default_apn_cid(cid);
623 }
624 else
625 {
626 apn_set_state[cid] = '1';
627 }
628 property_set(MBTK_APN_STATE, (char *)apn_set_state);
629
630 apn_auth_type[cid] = (char)apn_auth[cid] + '0';
631 property_set(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type);
632 }
633 return MBTK_RESULT_SUCCESS;
634}
635
636int mbtk_strdata_to_apn(const uint8 *str, mbtk_apn_info_t *apn, uint8 *apn_type, mbtk_apn_req_type_enum *req_type)
637{
638 if(str == NULL || apn == NULL || apn_type == NULL)
639 {
640 LOGE("param is error.");
641 return MBTK_RESULT_FAIL;
642 }
643
644 // <cid[1]><ip_type[1]><req_type[1]><auth[1]><apn_len[2]><apn><user_len[2]><user><pass_len[2]><pass><auth_len[2]><apn_type[2]>
645 int len = 0;
646 int ret = -1;
647 memset(apn, 0x0, sizeof(mbtk_apn_info_t));
648
649 // cid
650 apn->cid = (int)*str++;
651
652 // ip_type
653 apn->ip_type = (mbtk_ip_type_enum)(*str++);
654
655 //req_type
656 *req_type = (mbtk_apn_req_type_enum)(*str++);
657 if((*req_type) == MBTK_APN_REQ_TYPE_ADD)
658 {
659 apn->cid = mbtk_get_cid();
660 if(apn->cid < 0)
661 {
662 LOGE("no enough cid.");
663 return MBTK_RESULT_FAIL;
664 }
665 }
666 else
667 {
668 ret = mbtk_check_cid(apn->cid);
669 if(ret < 0)
670 {
671 LOGE("cid is error.");
672 return MBTK_RESULT_FAIL;
673 }
674
675#ifndef MBTK_SG_SUPPORT
676 if(apn->cid == 1)
677 {
678 LOGE("cid 1 no support set.");
679 return MBTK_RESULT_FAIL;
680 }
681#endif
682 }
683
684 // auth
685 apn_auth[apn->cid] = (mbtk_apn_auth_proto_enum)(*str++);
686 if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_NONE || apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_DEFAULT)
687 {
688 memcpy(apn->auth,"NONE",strlen("NONE")+1);
689 }
690 else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_PAP)
691 {
692 memcpy(apn->auth,"PAP",strlen("PAP")+1);
693 }
694 else if(apn_auth[apn->cid] == MBTK_APN_AUTH_PROTO_CHAP)
695 {
696 memcpy(apn->auth,"CHAP",strlen("CHAP")+1);
697 }
698 #if 0
699 else if(apn->auth_proto == QSER_APN_AUTH_PROTO_PAP_CHAP)
700 {
701 //NOT SUPPORT
702 }
703 #endif
704 else
705 {
706 LOGE("auth input error!");
707 return MBTK_RESULT_FAIL;
708 }
709
710 // apn
711 len = byte_2_uint16(str, false);
712 str += sizeof(uint16);
713 if(len > 0)
714 {
715 memcpy(apn->apn, str, len);
716 str += len;
717 }
718
719 // user
720 len = byte_2_uint16(str, false);
721 str += sizeof(uint16);
722 if(len > 0)
723 {
724 memcpy(apn->user, str, len);
725 str += len;
726 }
727
728 // pass
729 len = byte_2_uint16(str, false);
730 str += sizeof(uint16);
731 if(len > 0)
732 {
733 memcpy(apn->pass, str, len);
734 str += len;
735 }
736
737 // auth_type
738 len = byte_2_uint16(str, false);
739 str += sizeof(uint16);
740 if(len > 0)
741 {
742 memcpy(apn_type, str, len);
743 str += len;
744 }
745
746 ret = mbtk_apn_check_num1(apn_type, apn->apn, apn->cid);
747 if(ret < 0)
748 {
749 LOGE("num1 check error!");
750 return MBTK_RESULT_FAIL;
751 }
752
753 ret = mbtk_apn_check_num2_7(apn_type, apn->apn, apn->ip_type, apn->cid);
754 if(ret < 0)
755 {
756 LOGE("num2_7 check error!");
757 return MBTK_RESULT_FAIL;
758 }
759
760 LOGD("APN : %d, %d, %s, %s, %s, %s.", apn->cid,
761 apn->ip_type,
762 (str_empty(apn->apn) ? "NULL" : apn->apn),
763 (str_empty(apn->user) ? "NULL" : apn->user),
764 (str_empty(apn->pass) ? "NULL" : apn->pass),
765 (str_empty(apn->auth) ? "NULL" : apn->auth),
766 (str_empty(apn_type) ? "NULL" : apn_type));
767 return MBTK_RESULT_SUCCESS;
768}
769
770void mbtk_qser_apn_init(void)
771{
772 LOGD("enter mbtk_qser_apn_init.");
773 apn_init_flag = true;
774#ifdef MBTK_SG_SUPPORT
775 property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT);
776#else
777 property_get(MBTK_APN_STATE, (char *)apn_set_state, MBTK_BUFF_STATE_INIT_1);
778#endif
779 LOGD("get apn_set_state[%s].", apn_set_state);
780
781 int i = 0;
782 for(; i < MBTK_BUFF_SIZE; i++)
783 {
784 if(apn_set_state[i] == '2')
785 {
786 mbtk_set_default_apn_cid(i);
787 break;
788 }
789 }
790
791 property_get(MBTK_APN_AUTH_TYPE, (char *)apn_auth_type, MBTK_BUFF_STATE_INIT);
792 LOGD("get apn_auth_type[%s].", apn_auth_type);
793
794 mbtk_get_apn_send_pack();
795}
796#endif