5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
32 #include <netinet/in.h>
33 #include <arpa/inet.h>
37 #define CONNMAN_API_SUBJECT_TO_CHANGE
38 #include <connman/plugin.h>
39 #include <connman/location.h>
40 #include <connman/log.h>
43 #define PROXY_PORT 911
45 #define HOST "connman.net"
46 #define USER_APP "connman"
47 #define CONNMAN_NET_IP "174.36.13.145"
48 #define CONNMAN_MAX_IP_LENGTH 15
49 #define CONNECT_TIMEOUT 120
50 #define MAX_COUNTER 80
52 #define MAX_HEADER_LINES 13
53 #define PROXY_HEADER_LENGTH 7
55 enum get_page_status {
59 GET_PAGE_REDIRECTED = 3,
63 char host[MAX_COUNTER];
64 char page[MAX_COUNTER];
65 char proxy[MAX_COUNTER];
72 int (*get_page) (struct connman_location *location, char *page, int len,
73 enum get_page_status status);
76 static int create_socket()
80 sk = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
82 connman_error("Can not create TCP socket");
87 static char *get_ip_from_host(char *host)
89 int ip_len = CONNMAN_MAX_IP_LENGTH;
91 struct hostent *host_ent;
93 DBG("Get ip for %s", host);
94 ip = g_try_malloc0(ip_len + 1);
98 host_ent = gethostbyname(host);
99 if (host_ent == NULL) {
100 connman_error("Can not get IP");
104 if (inet_ntop(AF_INET, (void *) host_ent->h_addr_list[0],
105 ip, ip_len) == NULL) {
106 connman_error("Can not resolve host");
117 static char *build_get_query(char *host, char *page)
120 char *host_page = page;
121 char *tpl = "GET /%s HTTP/1.0\r\nHost: %s\r\nUser-Agent: %s\r\n\r\n";
123 if (host_page[0] == '/')
124 host_page = host_page + 1;
126 query = g_try_malloc0(strlen(host) + strlen(host_page) +
127 strlen(USER_APP) + strlen(tpl) - 5);
128 sprintf(query, tpl, host_page, host, USER_APP);
133 static gboolean connect_timeout(gpointer user_data)
135 struct connman_location *location = user_data;
136 struct server_data *data = connman_location_get_data(location);
144 data->get_page(location, NULL, 0, GET_PAGE_TIMEOUT);
149 static void remove_timeout(struct server_data *data)
151 if (data && data->timeout > 0) {
152 g_source_remove(data->timeout);
157 static gboolean tcp_event(GIOChannel *channel, GIOCondition condition,
160 struct connman_location *location = user_data;
161 struct server_data *data = connman_location_get_data(location);
169 if (condition & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) {
170 connman_error("TCP event error %d", condition);
171 remove_timeout(data);
174 data->get_page(location, NULL, 0, GET_PAGE_FAILED);
179 sk = g_io_channel_unix_get_fd(channel);
180 len = recv(sk, buf, BUFSIZ, 0);
183 remove_timeout(data);
185 data->get_page(location, buf, len, GET_PAGE_SUCCESS);
191 static gboolean socket_event(GIOChannel *channel, GIOCondition condition,
194 struct connman_location *location = user_data;
195 struct server_data *data = connman_location_get_data(location);
198 unsigned int send_counter = 0;
204 if (condition & G_IO_OUT && data->connection_ready == 0) {
205 data->connection_ready = 1;
206 sk = g_io_channel_unix_get_fd(channel);
208 query = build_get_query(data->host, data->page);
209 DBG("query is:\n%s\n", query);
211 while (send_counter < strlen(query)) {
212 ret = send(sk, query+send_counter,
213 strlen(query) - send_counter, 0);
215 DBG("Error sending query");
216 remove_timeout(data);
218 data->get_page(location, NULL, 0,
226 } else if (condition & G_IO_IN)
227 tcp_event(channel, condition, user_data);
232 static void remove_connection(struct connman_location *location)
234 struct server_data *data = connman_location_get_data(location);
236 data = connman_location_get_data(location);
240 remove_timeout(data);
242 g_source_remove(data->watch);
244 if (data->channel != NULL)
245 g_io_channel_shutdown(data->channel, TRUE, NULL);
251 connman_location_set_data(location, NULL);
254 static int get_html(struct connman_location *location, int ms_time)
256 struct server_data *data;
257 struct sockaddr_in *remote_host = NULL;
263 data = connman_location_get_data(location);
264 data->connection_ready = 0;
265 data->sock = create_socket();
269 DBG("proxy %s port %d", data->proxy, data->proxy_port);
271 if (strlen(data->proxy) > 0)
272 ip = get_ip_from_host(data->proxy);
274 ip = g_try_malloc0(16);
276 strcpy(ip, CONNMAN_NET_IP);
282 DBG("IP from host %s is %s", data->host, ip);
284 remote_host = g_try_new0(struct sockaddr_in, 1);
285 remote_host->sin_family = AF_INET;
286 ret = inet_pton(AF_INET, ip,
287 (void *) (&(remote_host->sin_addr.s_addr)));
289 connman_error("Error Calling inet_pton");
291 } else if (ret == 0) {
292 connman_error("Wrong IP address %s", ip);
295 if (strlen(data->proxy) > 0)
296 remote_host->sin_port = htons(data->proxy_port);
298 remote_host->sin_port = htons(PORT);
300 data->channel = g_io_channel_unix_new(data->sock);
301 g_io_channel_set_flags(data->channel, G_IO_FLAG_NONBLOCK, NULL);
302 g_io_channel_set_close_on_unref(data->channel, TRUE);
303 data->watch = g_io_add_watch(data->channel, G_IO_OUT | G_IO_IN,
304 socket_event, location);
305 data->timeout = g_timeout_add_seconds(ms_time, connect_timeout,
308 ret = connect(data->sock, (struct sockaddr *)remote_host,
309 sizeof(struct sockaddr));
310 if (ret < 0 && errno != EINPROGRESS) {
311 connman_error("Could not connect");
312 remove_timeout(data);
325 data->get_page(location, NULL, 0, GET_PAGE_FAILED);
330 static int get_status(struct server_data *data, char *page, int len)
337 * Right now we are only looking at HTTP response header to figure
338 * out if AP redirected our HTTP request. In the future we are going
339 * to parse the HTTP body and look for certain fixed context.
340 * To figure out if we are redirected we look for some HTTP header line,
341 * if these header was found then we have our page otherwise we
342 * have a redirection page.
344 lines = g_strsplit(page, "\n", MAX_HEADER_LINES);
346 str = g_strrstr(lines[0], "200 OK");
348 for (i = 0; lines[i] != NULL && i < 12; i++) {
350 str = g_strstr_len(lines[i], 12, "Set-Cookie");
354 return GET_PAGE_SUCCESS;
362 return GET_PAGE_REDIRECTED;
365 static int get_page_cb(struct connman_location *location, char *page, int len,
366 enum get_page_status status)
369 struct server_data *data = connman_location_get_data(location);
371 remove_connection(location);
374 ret = get_status(data, page, len);
378 DBG("status %d", status);
381 case GET_PAGE_SUCCESS:
382 connman_location_report_result(location,
383 CONNMAN_LOCATION_RESULT_ONLINE);
386 case GET_PAGE_REDIRECTED:
387 connman_location_report_result(location,
388 CONNMAN_LOCATION_RESULT_PORTAL);
389 DBG("Page redirected");
391 case GET_PAGE_FAILED:
392 connman_location_report_result(location,
393 CONNMAN_LOCATION_RESULT_UNKNOWN);
394 DBG("Could not get the page");
396 case GET_PAGE_TIMEOUT:
397 connman_location_report_result(location,
398 CONNMAN_LOCATION_RESULT_UNKNOWN);
406 static int location_detect(struct connman_location *location)
409 struct server_data *data;
410 enum connman_service_type service_type;
412 service_type = connman_location_get_type(location);
414 DBG("service type %d", service_type);
416 switch (service_type) {
417 case CONNMAN_SERVICE_TYPE_ETHERNET:
418 case CONNMAN_SERVICE_TYPE_WIFI:
419 case CONNMAN_SERVICE_TYPE_WIMAX:
420 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
421 case CONNMAN_SERVICE_TYPE_CELLULAR:
423 case CONNMAN_SERVICE_TYPE_UNKNOWN:
424 case CONNMAN_SERVICE_TYPE_SYSTEM:
425 case CONNMAN_SERVICE_TYPE_GPS:
426 case CONNMAN_SERVICE_TYPE_VPN:
430 data = g_try_new0(struct server_data, 1);
434 strcpy(data->host, HOST);
435 strcpy(data->page, PAGE);
436 data->get_page = get_page_cb;
439 proxy = getenv("http_proxy");
443 if (strncmp(proxy, "http://", PROXY_HEADER_LENGTH) == 0)
444 strcpy(data->proxy, proxy + PROXY_HEADER_LENGTH);
446 strcpy(data->proxy, proxy);
448 delim = strchr(data->proxy, ':');
452 len = delim - data->proxy;
453 data->proxy[len] = '\0';
455 data->proxy_port = atoi(delim + 1);
457 data->proxy_port = PROXY_PORT;
460 connman_location_set_data(location, data);
462 return get_html(location, CONNECT_TIMEOUT);
465 static int location_finish(struct connman_location *location)
468 remove_connection(location);
472 static struct connman_location_driver location = {
473 .name = "wifi and ethernet location",
474 .type = CONNMAN_SERVICE_TYPE_WIFI,
475 .priority = CONNMAN_LOCATION_PRIORITY_HIGH,
476 .detect = location_detect,
477 .finish = location_finish,
480 static int portal_init(void)
482 return connman_location_driver_register(&location);
485 static void portal_exit(void)
487 connman_location_driver_unregister(&location);
490 CONNMAN_PLUGIN_DEFINE(portal, "Portal detection plugin", VERSION,
491 CONNMAN_PLUGIN_PRIORITY_DEFAULT, portal_init, portal_exit)