5 * Copyright (C) 2010 BMW Car IT GmbH. All rights reserved.
6 * Copyright (C) 2012 Intel Corporation. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
33 #include <dbus/dbus.h>
36 #define CONNMAN_API_SUBJECT_TO_CHANGE
37 #include <connman/plugin.h>
38 #include <connman/provider.h>
39 #include <connman/log.h>
40 #include <connman/task.h>
41 #include <connman/dbus.h>
42 #include <connman/inet.h>
46 #define ARRAY_SIZE(a) (sizeof(a)/sizeof(a[0]))
56 const char *vpnc_default;
59 { "PPTP.User", "user", NULL, OPT_STRING },
60 { "PPTP.EchoFailure", "lcp-echo-failure", "0", OPT_STRING },
61 { "PPTP.EchoInterval", "lcp-echo-interval", "0", OPT_STRING },
62 { "PPTP.Debug", "debug", NULL, OPT_STRING },
63 { "PPTP.RefuseEAP", "refuse-eap", NULL, OPT_BOOL },
64 { "PPTP.RefusePAP", "refuse-pap", NULL, OPT_BOOL },
65 { "PPTP.RefuseCHAP", "refuse-chap", NULL, OPT_BOOL },
66 { "PPTP.RefuseMSCHAP", "refuse-mschap", NULL, OPT_BOOL },
67 { "PPTP.RefuseMSCHAP2", "refuse-mschapv2", NULL, OPT_BOOL },
68 { "PPTP.NoBSDComp", "nobsdcomp", NULL, OPT_BOOL },
69 { "PPTP.NoDeflate", "nodeflate", NULL, OPT_BOOL },
70 { "PPTP.RequirMPPE", "require-mppe", NULL, OPT_BOOL },
71 { "PPTP.RequirMPPE40", "require-mppe-40", NULL, OPT_BOOL },
72 { "PPTP.RequirMPPE128", "require-mppe-128", NULL, OPT_BOOL },
73 { "PPTP.RequirMPPEStateful", "mppe-stateful", NULL, OPT_BOOL },
74 { "PPTP.NoVJ", "no-vj-comp", NULL, OPT_BOOL },
77 static DBusConnection *connection;
79 static DBusMessage *pptp_get_sec(struct connman_task *task,
80 DBusMessage *msg, void *user_data)
82 const char *user, *passwd;
83 struct vpn_provider *provider = user_data;
86 if (dbus_message_get_no_reply(msg) == TRUE)
89 user = vpn_provider_get_string(provider, "PPTP.User");
90 passwd = vpn_provider_get_string(provider, "PPTP.Password");
91 if (user == NULL || strlen(user) == 0 ||
92 passwd == NULL || strlen(passwd) == 0)
95 reply = dbus_message_new_method_return(msg);
99 dbus_message_append_args(reply, DBUS_TYPE_STRING, &user,
100 DBUS_TYPE_STRING, &passwd,
105 static int pptp_notify(DBusMessage *msg, struct vpn_provider *provider)
107 DBusMessageIter iter, dict;
108 const char *reason, *key, *value;
109 char *addressv4 = NULL, *netmask = NULL, *gateway = NULL;
110 char *ifname = NULL, *nameservers = NULL;
111 struct connman_ipaddress *ipaddress = NULL;
113 dbus_message_iter_init(msg, &iter);
115 dbus_message_iter_get_basic(&iter, &reason);
116 dbus_message_iter_next(&iter);
118 if (provider == NULL) {
119 connman_error("No provider found");
120 return VPN_STATE_FAILURE;
123 if (strcmp(reason, "auth failed") == 0)
124 return VPN_STATE_AUTH_FAILURE;
126 if (strcmp(reason, "connect"))
127 return VPN_STATE_DISCONNECT;
129 dbus_message_iter_recurse(&iter, &dict);
131 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
132 DBusMessageIter entry;
134 dbus_message_iter_recurse(&dict, &entry);
135 dbus_message_iter_get_basic(&entry, &key);
136 dbus_message_iter_next(&entry);
137 dbus_message_iter_get_basic(&entry, &value);
139 DBG("%s = %s", key, value);
141 if (!strcmp(key, "INTERNAL_IP4_ADDRESS")) {
142 vpn_provider_set_string(provider, "Address", value);
143 addressv4 = g_strdup(value);
146 if (!strcmp(key, "INTERNAL_IP4_NETMASK")) {
147 vpn_provider_set_string(provider, "Netmask", value);
148 netmask = g_strdup(value);
151 if (!strcmp(key, "INTERNAL_IP4_DNS")) {
152 vpn_provider_set_string(provider, "DNS", value);
153 nameservers = g_strdup(value);
156 if (!strcmp(key, "INTERNAL_IFNAME"))
157 ifname = g_strdup(value);
159 dbus_message_iter_next(&dict);
162 if (vpn_set_ifname(provider, ifname) < 0) {
167 return VPN_STATE_FAILURE;
170 if (addressv4 != NULL)
171 ipaddress = connman_ipaddress_alloc(AF_INET);
175 if (ipaddress == NULL) {
176 connman_error("No IP address for provider");
180 return VPN_STATE_FAILURE;
183 value = vpn_provider_get_string(provider, "HostIP");
185 vpn_provider_set_string(provider, "Gateway", value);
186 gateway = g_strdup(value);
189 if (addressv4 != NULL)
190 connman_ipaddress_set_ipv4(ipaddress, addressv4, netmask,
193 vpn_provider_set_ipaddress(provider, ipaddress);
194 vpn_provider_set_nameservers(provider, nameservers);
200 connman_ipaddress_free(ipaddress);
202 return VPN_STATE_CONNECT;
205 static int pptp_save(struct vpn_provider *provider, GKeyFile *keyfile)
210 for (i = 0; i < (int)ARRAY_SIZE(pptp_options); i++) {
211 if (strncmp(pptp_options[i].cm_opt, "PPTP.", 5) == 0) {
212 option = vpn_provider_get_string(provider,
213 pptp_options[i].cm_opt);
217 g_key_file_set_string(keyfile,
218 vpn_provider_get_save_group(provider),
219 pptp_options[i].cm_opt, option);
223 option = vpn_provider_get_string(provider, "PPTP.Password");
225 g_key_file_set_string(keyfile,
226 vpn_provider_get_save_group(provider),
227 "PPTP.Password", option);
232 static void pptp_write_bool_option(struct connman_task *task,
233 const char *key, const char *value)
235 if (key != NULL && value != NULL) {
236 if (strcasecmp(value, "yes") == 0 ||
237 strcasecmp(value, "true") == 0 ||
238 strcmp(value, "1") == 0)
239 connman_task_add_argument(task, key, NULL);
243 static int pptp_connect(struct vpn_provider *provider,
244 struct connman_task *task, const char *if_name)
246 const char *opt_s, *host;
250 if (connman_task_set_notify(task, "getsec",
251 pptp_get_sec, provider))
254 host = vpn_provider_get_string(provider, "Host");
256 connman_error("Host not set; cannot enable VPN");
260 str = g_strdup_printf("%s %s --nolaunchpppd --loglevel 2",
263 connman_error("can not allocate memory");
267 connman_task_add_argument(task, "pty", str);
270 connman_task_add_argument(task, "nodetach", NULL);
271 connman_task_add_argument(task, "lock", NULL);
272 connman_task_add_argument(task, "usepeerdns", NULL);
273 connman_task_add_argument(task, "noipdefault", NULL);
274 connman_task_add_argument(task, "noauth", NULL);
275 connman_task_add_argument(task, "nodefaultroute", NULL);
276 connman_task_add_argument(task, "ipparam", "pptp_plugin");
278 for (i = 0; i < (int)ARRAY_SIZE(pptp_options); i++) {
279 opt_s = vpn_provider_get_string(provider,
280 pptp_options[i].cm_opt);
282 opt_s = pptp_options[i].vpnc_default;
287 if (pptp_options[i].type == OPT_STRING)
288 connman_task_add_argument(task,
289 pptp_options[i].pptp_opt, opt_s);
290 else if (pptp_options[i].type == OPT_BOOL)
291 pptp_write_bool_option(task,
292 pptp_options[i].pptp_opt, opt_s);
295 connman_task_add_argument(task, "plugin",
296 SCRIPTDIR "/libppp-plugin.so");
298 err = connman_task_run(task, vpn_died, provider,
301 connman_error("pptp failed to start");
308 static int pptp_error_code(int exit_code)
313 return CONNMAN_PROVIDER_ERROR_CONNECT_FAILED;
315 return CONNMAN_PROVIDER_ERROR_LOGIN_FAILED;
317 return CONNMAN_PROVIDER_ERROR_AUTH_FAILED;
319 return CONNMAN_PROVIDER_ERROR_UNKNOWN;
323 static struct vpn_driver vpn_driver = {
324 .flags = VPN_FLAG_NO_TUN,
325 .notify = pptp_notify,
326 .connect = pptp_connect,
327 .error_code = pptp_error_code,
331 static int pptp_init(void)
333 connection = connman_dbus_get_connection();
335 return vpn_register("pptp", &vpn_driver, PPPD);
338 static void pptp_exit(void)
340 vpn_unregister("pptp");
342 dbus_connection_unref(connection);
345 CONNMAN_PLUGIN_DEFINE(pptp, "pptp plugin", VERSION,
346 CONNMAN_PLUGIN_PRIORITY_DEFAULT, pptp_init, pptp_exit)