7bb3d81f6694acfc4944a7b817bcfa2bfb16e470
[platform/upstream/connman.git] / vpn / vpn-provider.c
1 /*
2  *
3  *  ConnMan VPN daemon
4  *
5  *  Copyright (C) 2012  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <string.h>
29 #include <stdlib.h>
30 #include <gdbus.h>
31 #include <connman/log.h>
32 #include <gweb/gresolv.h>
33 #include <netdb.h>
34
35 #include "../src/connman.h"
36 #include "connman/agent.h"
37 #include "connman/vpn-dbus.h"
38 #include "vpn-provider.h"
39 #include "vpn.h"
40
41 static DBusConnection *connection;
42 static GHashTable *provider_hash;
43 static GSList *driver_list;
44 static int configuration_count;
45 static gboolean handle_routes;
46
47 struct vpn_route {
48         int family;
49         char *network;
50         char *netmask;
51         char *gateway;
52 };
53
54 struct vpn_setting {
55         gboolean hide_value;
56         gboolean immutable;
57         char *value;
58 };
59
60 struct vpn_provider {
61         int refcount;
62         int index;
63         int fd;
64         enum vpn_provider_state state;
65         char *path;
66         char *identifier;
67         char *name;
68         char *type;
69         char *host;
70         char *domain;
71         int family;
72         GHashTable *routes;
73         struct vpn_provider_driver *driver;
74         void *driver_data;
75         GHashTable *setting_strings;
76         GHashTable *user_routes;
77         GSList *user_networks;
78         GResolv *resolv;
79         char **host_ip;
80         struct vpn_ipconfig *ipconfig_ipv4;
81         struct vpn_ipconfig *ipconfig_ipv6;
82         char **nameservers;
83         guint notify_id;
84         char *config_file;
85         char *config_entry;
86         connman_bool_t immutable;
87 };
88
89 static void append_properties(DBusMessageIter *iter,
90                                 struct vpn_provider *provider);
91
92 static void free_route(gpointer data)
93 {
94         struct vpn_route *route = data;
95
96         g_free(route->network);
97         g_free(route->netmask);
98         g_free(route->gateway);
99
100         g_free(route);
101 }
102
103 static void free_setting(gpointer data)
104 {
105         struct vpn_setting *setting = data;
106
107         g_free(setting->value);
108         g_free(setting);
109 }
110
111 static void append_route(DBusMessageIter *iter, void *user_data)
112 {
113         struct vpn_route *route = user_data;
114         DBusMessageIter item;
115         int family = 0;
116
117         connman_dbus_dict_open(iter, &item);
118
119         if (route == NULL)
120                 goto empty_dict;
121
122         if (route->family == AF_INET)
123                 family = 4;
124         else if (route->family == AF_INET6)
125                 family = 6;
126
127         if (family != 0)
128                 connman_dbus_dict_append_basic(&item, "ProtocolFamily",
129                                         DBUS_TYPE_INT32, &family);
130
131         if (route->network != NULL)
132                 connman_dbus_dict_append_basic(&item, "Network",
133                                         DBUS_TYPE_STRING, &route->network);
134
135         if (route->netmask != NULL)
136                 connman_dbus_dict_append_basic(&item, "Netmask",
137                                         DBUS_TYPE_STRING, &route->netmask);
138
139         if (route->gateway != NULL)
140                 connman_dbus_dict_append_basic(&item, "Gateway",
141                                         DBUS_TYPE_STRING, &route->gateway);
142
143 empty_dict:
144         connman_dbus_dict_close(iter, &item);
145 }
146
147 static void append_routes(DBusMessageIter *iter, void *user_data)
148 {
149         GHashTable *routes = user_data;
150         GHashTableIter hash;
151         gpointer value, key;
152
153         if (routes == NULL) {
154                 append_route(iter, NULL);
155                 return;
156         }
157
158         g_hash_table_iter_init(&hash, routes);
159
160         while (g_hash_table_iter_next(&hash, &key, &value) == TRUE) {
161                 DBusMessageIter dict;
162
163                 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL,
164                                                 &dict);
165                 append_route(&dict, value);
166                 dbus_message_iter_close_container(iter, &dict);
167         }
168 }
169
170 static void send_routes(struct vpn_provider *provider, GHashTable *routes,
171                         const char *name)
172 {
173         connman_dbus_property_changed_array(provider->path,
174                                         VPN_CONNECTION_INTERFACE,
175                                         name,
176                                         DBUS_TYPE_DICT_ENTRY,
177                                         append_routes,
178                                         routes);
179 }
180
181 static int provider_routes_changed(struct vpn_provider *provider)
182 {
183         DBG("provider %p", provider);
184
185         send_routes(provider, provider->routes, "ServerRoutes");
186
187         return 0;
188 }
189
190 static GSList *read_route_dict(GSList *routes, DBusMessageIter *dicts)
191 {
192         DBusMessageIter dict, value, entry;
193         const char *network, *netmask, *gateway;
194         struct vpn_route *route;
195         int family, type;
196         const char *key;
197
198         dbus_message_iter_recurse(dicts, &entry);
199
200         network = netmask = gateway = NULL;
201         family = PF_UNSPEC;
202
203         while (dbus_message_iter_get_arg_type(&entry) == DBUS_TYPE_DICT_ENTRY) {
204
205                 dbus_message_iter_recurse(&entry, &dict);
206                 dbus_message_iter_get_basic(&dict, &key);
207
208                 dbus_message_iter_next(&dict);
209                 dbus_message_iter_recurse(&dict, &value);
210
211                 type = dbus_message_iter_get_arg_type(&value);
212
213                 switch (type) {
214                 case DBUS_TYPE_STRING:
215                         if (g_str_equal(key, "ProtocolFamily") == TRUE)
216                                 dbus_message_iter_get_basic(&value, &family);
217                         else if (g_str_equal(key, "Network") == TRUE)
218                                 dbus_message_iter_get_basic(&value, &network);
219                         else if (g_str_equal(key, "Netmask") == TRUE)
220                                 dbus_message_iter_get_basic(&value, &netmask);
221                         else if (g_str_equal(key, "Gateway") == TRUE)
222                                 dbus_message_iter_get_basic(&value, &gateway);
223                         break;
224                 }
225
226                 dbus_message_iter_next(&entry);
227         }
228
229         DBG("family %d network %s netmask %s gateway %s", family,
230                 network, netmask, gateway);
231
232         if (network == NULL || netmask == NULL) {
233                 DBG("Ignoring route as network/netmask is missing");
234                 return routes;
235         }
236
237         route = g_try_new(struct vpn_route, 1);
238         if (route == NULL) {
239                 g_slist_free_full(routes, free_route);
240                 return NULL;
241         }
242
243         if (family == PF_UNSPEC) {
244                 family = connman_inet_check_ipaddress(network);
245                 if (family < 0) {
246                         DBG("Cannot get address family of %s (%d/%s)", network,
247                                 family, gai_strerror(family));
248
249                         g_free(route);
250                         return routes;
251                 }
252         } else {
253                 switch (family) {
254                 case '4':
255                         family = AF_INET;
256                         break;
257                 case '6':
258                         family = AF_INET6;
259                         break;
260                 default:
261                         family = PF_UNSPEC;
262                         break;
263                 }
264         }
265
266         route->family = family;
267         route->network = g_strdup(network);
268         route->netmask = g_strdup(netmask);
269         route->gateway = g_strdup(gateway);
270
271         routes = g_slist_prepend(routes, route);
272         return routes;
273 }
274
275 static GSList *get_user_networks(DBusMessageIter *array)
276 {
277         DBusMessageIter entry;
278         GSList *list = NULL;
279
280         while (dbus_message_iter_get_arg_type(array) == DBUS_TYPE_ARRAY) {
281
282                 dbus_message_iter_recurse(array, &entry);
283
284                 while (dbus_message_iter_get_arg_type(&entry) ==
285                                                         DBUS_TYPE_STRUCT) {
286                         DBusMessageIter dicts;
287
288                         dbus_message_iter_recurse(&entry, &dicts);
289
290                         while (dbus_message_iter_get_arg_type(&dicts) ==
291                                                         DBUS_TYPE_ARRAY) {
292
293                                 list = read_route_dict(list, &dicts);
294                                 dbus_message_iter_next(&dicts);
295                         }
296
297                         dbus_message_iter_next(&entry);
298                 }
299
300                 dbus_message_iter_next(array);
301         }
302
303         return list;
304 }
305
306 static void set_user_networks(struct vpn_provider *provider, GSList *networks)
307 {
308         GSList *list;
309
310         for (list = networks; list != NULL; list = g_slist_next(list)) {
311                 struct vpn_route *route = list->data;
312
313                 if (__vpn_provider_append_user_route(provider,
314                                         route->family, route->network,
315                                         route->netmask, route->gateway) != 0)
316                         break;
317         }
318 }
319
320 static void del_routes(struct vpn_provider *provider)
321 {
322         GHashTableIter hash;
323         gpointer value, key;
324
325         g_hash_table_iter_init(&hash, provider->user_routes);
326         while (handle_routes == TRUE && g_hash_table_iter_next(&hash,
327                                                 &key, &value) == TRUE) {
328                 struct vpn_route *route = value;
329                 if (route->family == AF_INET6) {
330                         unsigned char prefixlen = atoi(route->netmask);
331                         connman_inet_del_ipv6_network_route(provider->index,
332                                                         route->network,
333                                                         prefixlen);
334                 } else
335                         connman_inet_del_host_route(provider->index,
336                                                 route->network);
337         }
338
339         g_hash_table_remove_all(provider->user_routes);
340         g_slist_free_full(provider->user_networks, free_route);
341         provider->user_networks = NULL;
342 }
343
344 static void send_value(const char *path, const char *key, const char *value)
345 {
346         const char *empty = "";
347         const char *str;
348
349         if (value != NULL)
350                 str = value;
351         else
352                 str = empty;
353
354         connman_dbus_property_changed_basic(path,
355                                         VPN_CONNECTION_INTERFACE,
356                                         key,
357                                         DBUS_TYPE_STRING,
358                                         &str);
359 }
360
361 static gboolean provider_send_changed(gpointer data)
362 {
363         struct vpn_provider *provider = data;
364
365         provider_routes_changed(provider);
366
367         provider->notify_id = 0;
368
369         return FALSE;
370 }
371
372 static void provider_schedule_changed(struct vpn_provider *provider)
373 {
374         if (provider->notify_id != 0)
375                 g_source_remove(provider->notify_id);
376
377         provider->notify_id = g_timeout_add(100, provider_send_changed,
378                                                                 provider);
379 }
380
381 static DBusMessage *get_properties(DBusConnection *conn,
382                                         DBusMessage *msg, void *data)
383 {
384         struct vpn_provider *provider = data;
385         DBusMessage *reply;
386         DBusMessageIter array;
387
388         DBG("provider %p", provider);
389
390         reply = dbus_message_new_method_return(msg);
391         if (reply == NULL)
392                 return NULL;
393
394         dbus_message_iter_init_append(reply, &array);
395
396         append_properties(&array, provider);
397
398         return reply;
399 }
400
401 static DBusMessage *set_property(DBusConnection *conn, DBusMessage *msg,
402                                                                 void *data)
403 {
404         struct vpn_provider *provider = data;
405         DBusMessageIter iter, value;
406         const char *name;
407         int type;
408
409         DBG("conn %p", conn);
410
411         if (dbus_message_iter_init(msg, &iter) == FALSE)
412                 return __connman_error_invalid_arguments(msg);
413
414         if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
415                 return __connman_error_invalid_arguments(msg);
416
417         dbus_message_iter_get_basic(&iter, &name);
418         dbus_message_iter_next(&iter);
419
420         if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
421                 return __connman_error_invalid_arguments(msg);
422
423         dbus_message_iter_recurse(&iter, &value);
424
425         type = dbus_message_iter_get_arg_type(&value);
426
427         if (g_str_equal(name, "UserRoutes") == TRUE) {
428                 GSList *networks;
429
430                 if (type != DBUS_TYPE_ARRAY)
431                         return __connman_error_invalid_arguments(msg);
432
433                 networks = get_user_networks(&value);
434                 if (networks != NULL) {
435                         del_routes(provider);
436                         provider->user_networks = networks;
437                         set_user_networks(provider, provider->user_networks);
438
439                         if (handle_routes == FALSE)
440                                 send_routes(provider, provider->user_routes,
441                                                                 "UserRoutes");
442                 }
443         } else {
444                 const char *str;
445
446                 dbus_message_iter_get_basic(&value, &str);
447                 vpn_provider_set_string(provider, name, str);
448         }
449
450         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
451 }
452
453 static DBusMessage *clear_property(DBusConnection *conn, DBusMessage *msg,
454                                                                 void *data)
455 {
456         struct vpn_provider *provider = data;
457         const char *name;
458
459         DBG("conn %p", conn);
460
461         dbus_message_get_args(msg, NULL, DBUS_TYPE_STRING, &name,
462                                                         DBUS_TYPE_INVALID);
463
464         if (g_str_equal(name, "UserRoutes") == TRUE) {
465                 del_routes(provider);
466
467                 if (handle_routes == FALSE)
468                         send_routes(provider, provider->user_routes, name);
469         } else if (vpn_provider_get_string(provider, name) != NULL) {
470                 vpn_provider_set_string(provider, name, NULL);
471         } else {
472                 return __connman_error_invalid_property(msg);
473         }
474
475         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
476 }
477
478 static DBusMessage *do_connect(DBusConnection *conn, DBusMessage *msg,
479                                                                 void *data)
480 {
481         struct vpn_provider *provider = data;
482         int err;
483
484         DBG("conn %p provider %p", conn, provider);
485
486         err = __vpn_provider_connect(provider, msg);
487         if (err < 0)
488                 return __connman_error_failed(msg, -err);
489
490         return NULL;
491 }
492
493 static DBusMessage *do_disconnect(DBusConnection *conn, DBusMessage *msg,
494                                                                 void *data)
495 {
496         struct vpn_provider *provider = data;
497         int err;
498
499         DBG("conn %p provider %p", conn, provider);
500
501         err = __vpn_provider_disconnect(provider);
502         if (err < 0 && err != -EINPROGRESS)
503                 return __connman_error_failed(msg, -err);
504
505         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
506 }
507
508 static const GDBusMethodTable connection_methods[] = {
509         { GDBUS_METHOD("GetProperties",
510                         NULL, GDBUS_ARGS({ "properties", "a{sv}" }),
511                         get_properties) },
512         { GDBUS_METHOD("SetProperty",
513                         GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
514                         NULL, set_property) },
515         { GDBUS_METHOD("ClearProperty",
516                         GDBUS_ARGS({ "name", "s" }), NULL,
517                         clear_property) },
518         { GDBUS_ASYNC_METHOD("Connect", NULL, NULL, do_connect) },
519         { GDBUS_METHOD("Disconnect", NULL, NULL, do_disconnect) },
520         { },
521 };
522
523 static const GDBusSignalTable connection_signals[] = {
524         { GDBUS_SIGNAL("PropertyChanged",
525                         GDBUS_ARGS({ "name", "s" }, { "value", "v" })) },
526         { },
527 };
528
529 static void resolv_result(GResolvResultStatus status,
530                                         char **results, gpointer user_data)
531 {
532         struct vpn_provider *provider = user_data;
533
534         DBG("status %d", status);
535
536         if (status == G_RESOLV_RESULT_STATUS_SUCCESS && results != NULL &&
537                                                 g_strv_length(results) > 0)
538                 provider->host_ip = g_strdupv(results);
539
540         vpn_provider_unref(provider);
541 }
542
543 static void provider_resolv_host_addr(struct vpn_provider *provider)
544 {
545         if (provider->host == NULL)
546                 return;
547
548         if (connman_inet_check_ipaddress(provider->host) > 0)
549                 return;
550
551         if (provider->host_ip != NULL)
552                 return;
553
554         /*
555          * If the hostname is not numeric, try to resolv it. We do not wait
556          * the result as it might take some time. We will get the result
557          * before VPN will feed routes to us because VPN client will need
558          * the IP address also before VPN connection can be established.
559          */
560         provider->resolv = g_resolv_new(0);
561         if (provider->resolv == NULL) {
562                 DBG("Cannot resolv %s", provider->host);
563                 return;
564         }
565
566         DBG("Trying to resolv %s", provider->host);
567
568         vpn_provider_ref(provider);
569
570         g_resolv_lookup_hostname(provider->resolv, provider->host,
571                                 resolv_result, provider);
572 }
573
574 void __vpn_provider_append_properties(struct vpn_provider *provider,
575                                                         DBusMessageIter *iter)
576 {
577         if (provider->host != NULL)
578                 connman_dbus_dict_append_basic(iter, "Host",
579                                         DBUS_TYPE_STRING, &provider->host);
580
581         if (provider->domain != NULL)
582                 connman_dbus_dict_append_basic(iter, "Domain",
583                                         DBUS_TYPE_STRING, &provider->domain);
584
585         if (provider->type != NULL)
586                 connman_dbus_dict_append_basic(iter, "Type", DBUS_TYPE_STRING,
587                                                  &provider->type);
588 }
589
590 int __vpn_provider_append_user_route(struct vpn_provider *provider,
591                                 int family, const char *network,
592                                 const char *netmask, const char *gateway)
593 {
594         struct vpn_route *route;
595         char *key = g_strdup_printf("%d/%s/%s/%s", family, network,
596                                 netmask, gateway != NULL ? gateway : "");
597
598         DBG("family %d network %s netmask %s gw %s", family, network,
599                                                         netmask, gateway);
600
601         route = g_hash_table_lookup(provider->user_routes, key);
602         if (route == NULL) {
603                 route = g_try_new0(struct vpn_route, 1);
604                 if (route == NULL) {
605                         connman_error("out of memory");
606                         return -ENOMEM;
607                 }
608
609                 route->family = family;
610                 route->network = g_strdup(network);
611                 route->netmask = g_strdup(netmask);
612                 route->gateway = g_strdup(gateway);
613
614                 g_hash_table_replace(provider->user_routes, key, route);
615         } else
616                 g_free(key);
617
618         return 0;
619 }
620
621 static struct vpn_route *get_route(char *route_str)
622 {
623         char **elems = g_strsplit(route_str, "/", 0);
624         char *network, *netmask, *gateway, *family_str;
625         int family = PF_UNSPEC;
626         struct vpn_route *route = NULL;
627
628         if (elems == NULL)
629                 return NULL;
630
631         family_str = elems[0];
632
633         network = elems[1];
634         if (network == NULL || network[0] == '\0')
635                 goto out;
636
637         netmask = elems[2];
638         if (netmask == NULL || netmask[0] == '\0')
639                 goto out;
640
641         gateway = elems[3];
642
643         route = g_try_new0(struct vpn_route, 1);
644         if (route == NULL)
645                 goto out;
646
647         if (family_str[0] == '\0' || atoi(family_str) == 0) {
648                 family = PF_UNSPEC;
649         } else {
650                 switch (family_str[0]) {
651                 case '4':
652                         family = AF_INET;
653                         break;
654                 case '6':
655                         family = AF_INET6;
656                         break;
657                 }
658         }
659
660         if (g_strrstr(network, ":") != NULL) {
661                 if (family != PF_UNSPEC && family != AF_INET6)
662                         DBG("You have IPv6 address but you have non IPv6 route");
663         } else if (g_strrstr(network, ".") != NULL) {
664                 if (family != PF_UNSPEC && family != AF_INET)
665                         DBG("You have IPv4 address but you have non IPv4 route");
666
667                 if (g_strrstr(netmask, ".") == NULL) {
668                         /* We have netmask length */
669                         in_addr_t addr;
670                         struct in_addr netmask_in;
671                         unsigned char prefix_len = 32;
672
673                         if (netmask != NULL) {
674                                 char *ptr;
675                                 long int value = strtol(netmask, &ptr, 10);
676                                 if (ptr != netmask && *ptr == '\0' &&
677                                                                 value <= 32)
678                                         prefix_len = value;
679                         }
680
681                         addr = 0xffffffff << (32 - prefix_len);
682                         netmask_in.s_addr = htonl(addr);
683                         netmask = inet_ntoa(netmask_in);
684
685                         DBG("network %s netmask %s", network, netmask);
686                 }
687         }
688
689         if (family == PF_UNSPEC) {
690                 family = connman_inet_check_ipaddress(network);
691                 if (family < 0 || family == PF_UNSPEC)
692                         goto out;
693         }
694
695         route->family = family;
696         route->network = g_strdup(network);
697         route->netmask = g_strdup(netmask);
698         route->gateway = g_strdup(gateway);
699
700 out:
701         g_strfreev(elems);
702         return route;
703 }
704
705 static GSList *get_routes(gchar **networks)
706 {
707         struct vpn_route *route;
708         GSList *routes = NULL;
709         int i;
710
711         for (i = 0; networks[i] != NULL; i++) {
712                 route = get_route(networks[i]);
713                 if (route != NULL)
714                         routes = g_slist_prepend(routes, route);
715         }
716
717         return routes;
718 }
719
720 static int provider_load_from_keyfile(struct vpn_provider *provider,
721                 GKeyFile *keyfile)
722 {
723         gsize idx = 0;
724         gchar **settings;
725         gchar *key, *value;
726         gsize length, num_user_networks;
727         gchar **networks = NULL;
728
729         settings = g_key_file_get_keys(keyfile, provider->identifier, &length,
730                                 NULL);
731         if (settings == NULL) {
732                 g_key_file_free(keyfile);
733                 return -ENOENT;
734         }
735
736         while (idx < length) {
737                 key = settings[idx];
738                 if (key != NULL) {
739                         if (g_str_equal(key, "Networks") == TRUE) {
740                                 networks = g_key_file_get_string_list(keyfile,
741                                                 provider->identifier,
742                                                 key,
743                                                 &num_user_networks,
744                                                 NULL);
745                                 provider->user_networks = get_routes(networks);
746
747                         } else {
748                                 value = g_key_file_get_string(keyfile,
749                                                         provider->identifier,
750                                                         key, NULL);
751                                 vpn_provider_set_string(provider, key,
752                                                         value);
753                                 g_free(value);
754                         }
755                 }
756                 idx += 1;
757         }
758         g_strfreev(settings);
759         g_strfreev(networks);
760
761         if (provider->user_networks != NULL)
762                 set_user_networks(provider, provider->user_networks);
763
764         return 0;
765 }
766
767
768 static int vpn_provider_load(struct vpn_provider *provider)
769 {
770         GKeyFile *keyfile;
771
772         DBG("provider %p", provider);
773
774         keyfile = __connman_storage_load_provider(provider->identifier);
775         if (keyfile == NULL)
776                 return -ENOENT;
777
778         provider_load_from_keyfile(provider, keyfile);
779
780         g_key_file_free(keyfile);
781         return 0;
782 }
783
784 static gchar **create_network_list(GSList *networks, gsize *count)
785 {
786         GSList *list;
787         gchar **result = NULL;
788         unsigned int num_elems = 0;
789
790         for (list = networks; list != NULL; list = g_slist_next(list)) {
791                 struct vpn_route *route = list->data;
792                 int family;
793
794                 result = g_try_realloc(result,
795                                 (num_elems + 1) * sizeof(gchar *));
796                 if (result == NULL)
797                         return NULL;
798
799                 switch (route->family) {
800                 case AF_INET:
801                         family = 4;
802                         break;
803                 case AF_INET6:
804                         family = 6;
805                         break;
806                 default:
807                         family = 0;
808                         break;
809                 }
810
811                 result[num_elems] = g_strdup_printf("%d/%s/%s/%s",
812                                 family, route->network, route->netmask,
813                                 route->gateway == NULL ? "" : route->gateway);
814
815                 num_elems++;
816         }
817
818         result = g_try_realloc(result, (num_elems + 1) * sizeof(gchar *));
819         if (result == NULL)
820                 return NULL;
821
822         result[num_elems] = NULL;
823         *count = num_elems;
824         return result;
825 }
826
827 static int vpn_provider_save(struct vpn_provider *provider)
828 {
829         GKeyFile *keyfile;
830
831         DBG("provider %p", provider);
832
833         keyfile = g_key_file_new();
834         if (keyfile == NULL)
835                 return -ENOMEM;
836
837         g_key_file_set_string(keyfile, provider->identifier,
838                         "Name", provider->name);
839         g_key_file_set_string(keyfile, provider->identifier,
840                         "Type", provider->type);
841         g_key_file_set_string(keyfile, provider->identifier,
842                         "Host", provider->host);
843         g_key_file_set_string(keyfile, provider->identifier,
844                         "VPN.Domain", provider->domain);
845         if (provider->user_networks != NULL) {
846                 gchar **networks;
847                 gsize network_count;
848
849                 networks = create_network_list(provider->user_networks,
850                                                         &network_count);
851                 if (networks != NULL) {
852                         g_key_file_set_string_list(keyfile,
853                                                 provider->identifier,
854                                                 "Networks",
855                                                 (const gchar ** const)networks,
856                                                 network_count);
857                         g_strfreev(networks);
858                 }
859         }
860
861         if (provider->config_file != NULL && strlen(provider->config_file) > 0)
862                 g_key_file_set_string(keyfile, provider->identifier,
863                                 "Config.file", provider->config_file);
864
865         if (provider->config_entry != NULL &&
866                                         strlen(provider->config_entry) > 0)
867                 g_key_file_set_string(keyfile, provider->identifier,
868                                 "Config.ident", provider->config_entry);
869
870         if (provider->driver != NULL && provider->driver->save != NULL)
871                 provider->driver->save(provider, keyfile);
872
873         __connman_storage_save_provider(keyfile, provider->identifier);
874         g_key_file_free(keyfile);
875
876         return 0;
877 }
878
879 struct vpn_provider *__vpn_provider_lookup(const char *identifier)
880 {
881         struct vpn_provider *provider = NULL;
882
883         provider = g_hash_table_lookup(provider_hash, identifier);
884
885         return provider;
886 }
887
888 static gboolean match_driver(struct vpn_provider *provider,
889                                 struct vpn_provider_driver *driver)
890 {
891         if (g_strcmp0(driver->name, provider->type) == 0)
892                 return TRUE;
893
894         return FALSE;
895 }
896
897 static int provider_probe(struct vpn_provider *provider)
898 {
899         GSList *list;
900
901         DBG("provider %p driver %p name %s", provider, provider->driver,
902                                                 provider->name);
903
904         if (provider->driver != NULL)
905                 return -EALREADY;
906
907         for (list = driver_list; list; list = list->next) {
908                 struct vpn_provider_driver *driver = list->data;
909
910                 if (match_driver(provider, driver) == FALSE)
911                         continue;
912
913                 DBG("driver %p name %s", driver, driver->name);
914
915                 if (driver->probe != NULL && driver->probe(provider) == 0) {
916                         provider->driver = driver;
917                         break;
918                 }
919         }
920
921         if (provider->driver == NULL)
922                 return -ENODEV;
923
924         return 0;
925 }
926
927 static void provider_remove(struct vpn_provider *provider)
928 {
929         if (provider->driver != NULL) {
930                 provider->driver->remove(provider);
931                 provider->driver = NULL;
932         }
933 }
934
935 static int provider_register(struct vpn_provider *provider)
936 {
937         return provider_probe(provider);
938 }
939
940 static void provider_unregister(struct vpn_provider *provider)
941 {
942         provider_remove(provider);
943 }
944
945 struct vpn_provider *
946 vpn_provider_ref_debug(struct vpn_provider *provider,
947                         const char *file, int line, const char *caller)
948 {
949         DBG("%p ref %d by %s:%d:%s()", provider, provider->refcount + 1,
950                 file, line, caller);
951
952         __sync_fetch_and_add(&provider->refcount, 1);
953
954         return provider;
955 }
956
957 static void provider_destruct(struct vpn_provider *provider)
958 {
959         DBG("provider %p", provider);
960
961         if (provider->notify_id != 0)
962                 g_source_remove(provider->notify_id);
963
964         g_free(provider->name);
965         g_free(provider->type);
966         g_free(provider->host);
967         g_free(provider->domain);
968         g_free(provider->identifier);
969         g_free(provider->path);
970         g_slist_free_full(provider->user_networks, free_route);
971         g_strfreev(provider->nameservers);
972         g_hash_table_destroy(provider->routes);
973         g_hash_table_destroy(provider->user_routes);
974         g_hash_table_destroy(provider->setting_strings);
975         if (provider->resolv != NULL) {
976                 g_resolv_unref(provider->resolv);
977                 provider->resolv = NULL;
978         }
979         __vpn_ipconfig_unref(provider->ipconfig_ipv4);
980         __vpn_ipconfig_unref(provider->ipconfig_ipv6);
981
982         g_strfreev(provider->host_ip);
983         g_free(provider->config_file);
984         g_free(provider->config_entry);
985         g_free(provider);
986 }
987
988 void vpn_provider_unref_debug(struct vpn_provider *provider,
989                                 const char *file, int line, const char *caller)
990 {
991         DBG("%p ref %d by %s:%d:%s()", provider, provider->refcount - 1,
992                 file, line, caller);
993
994         if (__sync_fetch_and_sub(&provider->refcount, 1) != 1)
995                 return;
996
997         provider_remove(provider);
998
999         provider_destruct(provider);
1000 }
1001
1002 static void configuration_count_add(void)
1003 {
1004         DBG("count %d", configuration_count + 1);
1005
1006         __sync_fetch_and_add(&configuration_count, 1);
1007 }
1008
1009 static void configuration_count_del(void)
1010 {
1011         DBG("count %d", configuration_count - 1);
1012
1013         if (__sync_fetch_and_sub(&configuration_count, 1) != 1)
1014                 return;
1015 }
1016
1017 int __vpn_provider_disconnect(struct vpn_provider *provider)
1018 {
1019         int err;
1020
1021         DBG("provider %p", provider);
1022
1023         if (provider->driver != NULL && provider->driver->disconnect != NULL)
1024                 err = provider->driver->disconnect(provider);
1025         else
1026                 return -EOPNOTSUPP;
1027
1028         if (err == -EINPROGRESS)
1029                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_CONNECT);
1030
1031         return err;
1032 }
1033
1034 static void connect_cb(struct vpn_provider *provider, void *user_data,
1035                                                                 int error)
1036 {
1037         DBusMessage *pending = user_data;
1038
1039         DBG("provider %p user %p error %d", provider, user_data, error);
1040
1041         if (error != 0) {
1042                 DBusMessage *reply = __connman_error_failed(pending, error);
1043                 if (reply != NULL)
1044                         g_dbus_send_message(connection, reply);
1045
1046                 vpn_provider_indicate_error(provider,
1047                                         VPN_PROVIDER_ERROR_CONNECT_FAILED);
1048                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
1049         } else
1050                 g_dbus_send_reply(connection, pending, DBUS_TYPE_INVALID);
1051
1052         dbus_message_unref(pending);
1053 }
1054
1055 int __vpn_provider_connect(struct vpn_provider *provider, DBusMessage *msg)
1056 {
1057         int err;
1058
1059         DBG("provider %p", provider);
1060
1061         if (provider->driver != NULL && provider->driver->connect != NULL) {
1062                 dbus_message_ref(msg);
1063                 err = provider->driver->connect(provider, connect_cb, msg);
1064         } else
1065                 return -EOPNOTSUPP;
1066
1067         if (err == -EINPROGRESS)
1068                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_CONNECT);
1069
1070         return err;
1071 }
1072
1073 static void connection_removed_signal(struct vpn_provider *provider)
1074 {
1075         DBusMessage *signal;
1076         DBusMessageIter iter;
1077
1078         signal = dbus_message_new_signal(VPN_MANAGER_PATH,
1079                         VPN_MANAGER_INTERFACE, "ConnectionRemoved");
1080         if (signal == NULL)
1081                 return;
1082
1083         dbus_message_iter_init_append(signal, &iter);
1084         dbus_message_iter_append_basic(&iter, DBUS_TYPE_OBJECT_PATH,
1085                                                         &provider->path);
1086         dbus_connection_send(connection, signal, NULL);
1087         dbus_message_unref(signal);
1088 }
1089
1090 static char *get_ident(const char *path)
1091 {
1092         char *pos;
1093
1094         if (*path != '/')
1095                 return NULL;
1096
1097         pos = strrchr(path, '/');
1098         if (pos == NULL)
1099                 return NULL;
1100
1101         return pos + 1;
1102 }
1103
1104 int __vpn_provider_remove(const char *path)
1105 {
1106         struct vpn_provider *provider;
1107         char *ident;
1108
1109         DBG("path %s", path);
1110
1111         ident = get_ident(path);
1112
1113         provider = __vpn_provider_lookup(ident);
1114         if (provider != NULL)
1115                 return __vpn_provider_delete(provider);
1116
1117         return -ENXIO;
1118 }
1119
1120 int __vpn_provider_delete(struct vpn_provider *provider)
1121 {
1122         DBG("Deleting VPN %s", provider->identifier);
1123
1124         connection_removed_signal(provider);
1125
1126         provider_unregister(provider);
1127
1128         __connman_storage_remove_provider(provider->identifier);
1129
1130         g_hash_table_remove(provider_hash, provider->identifier);
1131
1132         return 0;
1133 }
1134
1135 static void append_ipv4(DBusMessageIter *iter, void *user_data)
1136 {
1137         struct vpn_provider *provider = user_data;
1138         const char *address, *gateway, *peer;
1139
1140         address = __vpn_ipconfig_get_local(provider->ipconfig_ipv4);
1141         if (address != NULL) {
1142                 in_addr_t addr;
1143                 struct in_addr netmask;
1144                 char *mask;
1145                 int prefixlen;
1146
1147                 prefixlen = __vpn_ipconfig_get_prefixlen(
1148                                                 provider->ipconfig_ipv4);
1149
1150                 addr = 0xffffffff << (32 - prefixlen);
1151                 netmask.s_addr = htonl(addr);
1152                 mask = inet_ntoa(netmask);
1153
1154                 connman_dbus_dict_append_basic(iter, "Address",
1155                                                 DBUS_TYPE_STRING, &address);
1156
1157                 connman_dbus_dict_append_basic(iter, "Netmask",
1158                                                 DBUS_TYPE_STRING, &mask);
1159         }
1160
1161         gateway = __vpn_ipconfig_get_gateway(provider->ipconfig_ipv4);
1162         if (gateway != NULL)
1163                 connman_dbus_dict_append_basic(iter, "Gateway",
1164                                                 DBUS_TYPE_STRING, &gateway);
1165
1166         peer = __vpn_ipconfig_get_peer(provider->ipconfig_ipv4);
1167         if (peer != NULL)
1168                 connman_dbus_dict_append_basic(iter, "Peer",
1169                                                 DBUS_TYPE_STRING, &peer);
1170 }
1171
1172 static void append_ipv6(DBusMessageIter *iter, void *user_data)
1173 {
1174         struct vpn_provider *provider = user_data;
1175         const char *address, *gateway, *peer;
1176
1177         address = __vpn_ipconfig_get_local(provider->ipconfig_ipv6);
1178         if (address != NULL) {
1179                 unsigned char prefixlen;
1180
1181                 connman_dbus_dict_append_basic(iter, "Address",
1182                                                 DBUS_TYPE_STRING, &address);
1183
1184                 prefixlen = __vpn_ipconfig_get_prefixlen(
1185                                                 provider->ipconfig_ipv6);
1186
1187                 connman_dbus_dict_append_basic(iter, "PrefixLength",
1188                                                 DBUS_TYPE_BYTE, &prefixlen);
1189         }
1190
1191         gateway = __vpn_ipconfig_get_gateway(provider->ipconfig_ipv6);
1192         if (gateway != NULL)
1193                 connman_dbus_dict_append_basic(iter, "Gateway",
1194                                                 DBUS_TYPE_STRING, &gateway);
1195
1196         peer = __vpn_ipconfig_get_peer(provider->ipconfig_ipv6);
1197         if (peer != NULL)
1198                 connman_dbus_dict_append_basic(iter, "Peer",
1199                                                 DBUS_TYPE_STRING, &peer);
1200 }
1201
1202 static const char *state2string(enum vpn_provider_state state)
1203 {
1204         switch (state) {
1205         case VPN_PROVIDER_STATE_UNKNOWN:
1206                 break;
1207         case VPN_PROVIDER_STATE_IDLE:
1208                 return "idle";
1209         case VPN_PROVIDER_STATE_CONNECT:
1210                 return "configuration";
1211         case VPN_PROVIDER_STATE_READY:
1212                 return "ready";
1213         case VPN_PROVIDER_STATE_DISCONNECT:
1214                 return "disconnect";
1215         case VPN_PROVIDER_STATE_FAILURE:
1216                 return "failure";
1217         }
1218
1219         return NULL;
1220 }
1221
1222 static int provider_indicate_state(struct vpn_provider *provider,
1223                                 enum vpn_provider_state state)
1224 {
1225         const char *str;
1226         enum vpn_provider_state old_state;
1227
1228         str = state2string(state);
1229         DBG("provider %p state %s/%d", provider, str, state);
1230         if (str == NULL)
1231                 return -EINVAL;
1232
1233         old_state = provider->state;
1234         provider->state = state;
1235
1236         if (state == VPN_PROVIDER_STATE_READY) {
1237                 connman_dbus_property_changed_basic(provider->path,
1238                                         VPN_CONNECTION_INTERFACE, "Index",
1239                                         DBUS_TYPE_INT32, &provider->index);
1240
1241                 if (provider->family == AF_INET)
1242                         connman_dbus_property_changed_dict(provider->path,
1243                                         VPN_CONNECTION_INTERFACE, "IPv4",
1244                                         append_ipv4, provider);
1245                 else if (provider->family == AF_INET6)
1246                         connman_dbus_property_changed_dict(provider->path,
1247                                         VPN_CONNECTION_INTERFACE, "IPv6",
1248                                         append_ipv6, provider);
1249         }
1250
1251         if (old_state != state)
1252                 connman_dbus_property_changed_basic(provider->path,
1253                                         VPN_CONNECTION_INTERFACE, "State",
1254                                         DBUS_TYPE_STRING, &str);
1255
1256         /*
1257          * We do not stay in failure state as clients like connmand can
1258          * get confused about our current state.
1259          */
1260         if (provider->state == VPN_PROVIDER_STATE_FAILURE)
1261                 provider->state = VPN_PROVIDER_STATE_IDLE;
1262
1263         return 0;
1264 }
1265
1266 static void append_nameservers(DBusMessageIter *iter, char **servers)
1267 {
1268         int i;
1269
1270         DBG("%p", servers);
1271
1272         for (i = 0; servers[i] != NULL; i++) {
1273                 DBG("servers[%d] %s", i, servers[i]);
1274                 dbus_message_iter_append_basic(iter,
1275                                         DBUS_TYPE_STRING, &servers[i]);
1276         }
1277 }
1278
1279 static void append_dns(DBusMessageIter *iter, void *user_data)
1280 {
1281         struct vpn_provider *provider = user_data;
1282
1283         if (provider->nameservers != NULL)
1284                 append_nameservers(iter, provider->nameservers);
1285 }
1286
1287 static void append_state(DBusMessageIter *iter,
1288                                         struct vpn_provider *provider)
1289 {
1290         char *str;
1291
1292         switch (provider->state) {
1293         case VPN_PROVIDER_STATE_UNKNOWN:
1294         case VPN_PROVIDER_STATE_IDLE:
1295                 str = "idle";
1296                 break;
1297         case VPN_PROVIDER_STATE_CONNECT:
1298                 str = "configuration";
1299                 break;
1300         case VPN_PROVIDER_STATE_READY:
1301                 str = "ready";
1302                 break;
1303         case VPN_PROVIDER_STATE_DISCONNECT:
1304                 str = "disconnect";
1305                 break;
1306         case VPN_PROVIDER_STATE_FAILURE:
1307                 str = "failure";
1308                 break;
1309         }
1310
1311         connman_dbus_dict_append_basic(iter, "State",
1312                                 DBUS_TYPE_STRING, &str);
1313 }
1314
1315 static void append_properties(DBusMessageIter *iter,
1316                                         struct vpn_provider *provider)
1317 {
1318         DBusMessageIter dict;
1319         GHashTableIter hash;
1320         gpointer value, key;
1321
1322         connman_dbus_dict_open(iter, &dict);
1323
1324         append_state(&dict, provider);
1325
1326         if (provider->type != NULL)
1327                 connman_dbus_dict_append_basic(&dict, "Type",
1328                                         DBUS_TYPE_STRING, &provider->type);
1329
1330         if (provider->name != NULL)
1331                 connman_dbus_dict_append_basic(&dict, "Name",
1332                                         DBUS_TYPE_STRING, &provider->name);
1333
1334         if (provider->host != NULL)
1335                 connman_dbus_dict_append_basic(&dict, "Host",
1336                                         DBUS_TYPE_STRING, &provider->host);
1337         if (provider->index >= 0)
1338                 connman_dbus_dict_append_basic(&dict, "Index",
1339                                         DBUS_TYPE_INT32, &provider->index);
1340         if (provider->domain != NULL)
1341                 connman_dbus_dict_append_basic(&dict, "Domain",
1342                                         DBUS_TYPE_STRING, &provider->domain);
1343
1344         connman_dbus_dict_append_basic(&dict, "Immutable", DBUS_TYPE_BOOLEAN,
1345                                         &provider->immutable);
1346
1347         if (provider->family == AF_INET)
1348                 connman_dbus_dict_append_dict(&dict, "IPv4", append_ipv4,
1349                                                 provider);
1350         else if (provider->family == AF_INET6)
1351                 connman_dbus_dict_append_dict(&dict, "IPv6", append_ipv6,
1352                                                 provider);
1353
1354         connman_dbus_dict_append_array(&dict, "Nameservers",
1355                                 DBUS_TYPE_STRING, append_dns, provider);
1356
1357         connman_dbus_dict_append_array(&dict, "UserRoutes",
1358                                 DBUS_TYPE_DICT_ENTRY, append_routes,
1359                                 provider->user_routes);
1360
1361         connman_dbus_dict_append_array(&dict, "ServerRoutes",
1362                                 DBUS_TYPE_DICT_ENTRY, append_routes,
1363                                 provider->routes);
1364
1365         if (provider->setting_strings != NULL) {
1366                 g_hash_table_iter_init(&hash, provider->setting_strings);
1367
1368                 while (g_hash_table_iter_next(&hash, &key, &value) == TRUE) {
1369                         struct vpn_setting *setting = value;
1370
1371                         if (setting->hide_value == FALSE &&
1372                                                         setting->value != NULL)
1373                                 connman_dbus_dict_append_basic(&dict, key,
1374                                                         DBUS_TYPE_STRING,
1375                                                         &setting->value);
1376                 }
1377         }
1378
1379         connman_dbus_dict_close(iter, &dict);
1380 }
1381
1382 static void connection_added_signal(struct vpn_provider *provider)
1383 {
1384         DBusMessage *signal;
1385         DBusMessageIter iter;
1386
1387         signal = dbus_message_new_signal(VPN_MANAGER_PATH,
1388                         VPN_MANAGER_INTERFACE, "ConnectionAdded");
1389         if (signal == NULL)
1390                 return;
1391
1392         dbus_message_iter_init_append(signal, &iter);
1393         dbus_message_iter_append_basic(&iter, DBUS_TYPE_OBJECT_PATH,
1394                                                         &provider->path);
1395         append_properties(&iter, provider);
1396
1397         dbus_connection_send(connection, signal, NULL);
1398         dbus_message_unref(signal);
1399 }
1400
1401 static connman_bool_t check_host(char **hosts, char *host)
1402 {
1403         int i;
1404
1405         if (hosts == NULL)
1406                 return FALSE;
1407
1408         for (i = 0; hosts[i] != NULL; i++) {
1409                 if (g_strcmp0(hosts[i], host) == 0)
1410                         return TRUE;
1411         }
1412
1413         return FALSE;
1414 }
1415
1416 static void provider_append_routes(gpointer key, gpointer value,
1417                                         gpointer user_data)
1418 {
1419         struct vpn_route *route = value;
1420         struct vpn_provider *provider = user_data;
1421         int index = provider->index;
1422
1423         if (handle_routes == FALSE)
1424                 return;
1425
1426         /*
1427          * If the VPN administrator/user has given a route to
1428          * VPN server, then we must discard that because the
1429          * server cannot be contacted via VPN tunnel.
1430          */
1431         if (check_host(provider->host_ip, route->network) == TRUE) {
1432                 DBG("Discarding VPN route to %s via %s at index %d",
1433                         route->network, route->gateway, index);
1434                 return;
1435         }
1436
1437         if (route->family == AF_INET6) {
1438                 unsigned char prefix_len = atoi(route->netmask);
1439
1440                 connman_inet_add_ipv6_network_route(index, route->network,
1441                                                         route->gateway,
1442                                                         prefix_len);
1443         } else {
1444                 connman_inet_add_network_route(index, route->network,
1445                                                 route->gateway,
1446                                                 route->netmask);
1447         }
1448 }
1449
1450 static int set_connected(struct vpn_provider *provider,
1451                                         connman_bool_t connected)
1452 {
1453         struct vpn_ipconfig *ipconfig;
1454
1455         DBG("provider %p id %s connected %d", provider,
1456                                         provider->identifier, connected);
1457
1458         if (connected == TRUE) {
1459                 if (provider->family == AF_INET6)
1460                         ipconfig = provider->ipconfig_ipv6;
1461                 else
1462                         ipconfig = provider->ipconfig_ipv4;
1463
1464                 __vpn_ipconfig_address_add(ipconfig, provider->family);
1465
1466                 if (handle_routes == TRUE)
1467                         __vpn_ipconfig_gateway_add(ipconfig, provider->family);
1468
1469                 provider_indicate_state(provider,
1470                                         VPN_PROVIDER_STATE_READY);
1471
1472                 g_hash_table_foreach(provider->routes, provider_append_routes,
1473                                         provider);
1474
1475                 g_hash_table_foreach(provider->user_routes,
1476                                         provider_append_routes, provider);
1477
1478         } else {
1479                 provider_indicate_state(provider,
1480                                         VPN_PROVIDER_STATE_DISCONNECT);
1481
1482                 provider_indicate_state(provider,
1483                                         VPN_PROVIDER_STATE_IDLE);
1484         }
1485
1486         return 0;
1487 }
1488
1489 int vpn_provider_set_state(struct vpn_provider *provider,
1490                                         enum vpn_provider_state state)
1491 {
1492         if (provider == NULL)
1493                 return -EINVAL;
1494
1495         switch (state) {
1496         case VPN_PROVIDER_STATE_UNKNOWN:
1497                 return -EINVAL;
1498         case VPN_PROVIDER_STATE_IDLE:
1499                 return set_connected(provider, FALSE);
1500         case VPN_PROVIDER_STATE_CONNECT:
1501                 return provider_indicate_state(provider, state);
1502         case VPN_PROVIDER_STATE_READY:
1503                 return set_connected(provider, TRUE);
1504         case VPN_PROVIDER_STATE_DISCONNECT:
1505                 return provider_indicate_state(provider, state);
1506         case VPN_PROVIDER_STATE_FAILURE:
1507                 return provider_indicate_state(provider, state);
1508         }
1509         return -EINVAL;
1510 }
1511
1512 int vpn_provider_indicate_error(struct vpn_provider *provider,
1513                                         enum vpn_provider_error error)
1514 {
1515         DBG("provider %p id %s error %d", provider, provider->identifier,
1516                                                                         error);
1517
1518         switch (error) {
1519         case VPN_PROVIDER_ERROR_LOGIN_FAILED:
1520                 break;
1521         case VPN_PROVIDER_ERROR_AUTH_FAILED:
1522                 vpn_provider_set_state(provider, VPN_PROVIDER_STATE_FAILURE);
1523                 break;
1524         case VPN_PROVIDER_ERROR_CONNECT_FAILED:
1525                 break;
1526         default:
1527                 break;
1528         }
1529
1530         return 0;
1531 }
1532
1533 static int connection_unregister(struct vpn_provider *provider)
1534 {
1535         DBG("provider %p path %s", provider, provider->path);
1536
1537         if (provider->path == NULL)
1538                 return -EALREADY;
1539
1540         g_dbus_unregister_interface(connection, provider->path,
1541                                 VPN_CONNECTION_INTERFACE);
1542
1543         g_free(provider->path);
1544         provider->path = NULL;
1545
1546         return 0;
1547 }
1548
1549 static int connection_register(struct vpn_provider *provider)
1550 {
1551         DBG("provider %p path %s", provider, provider->path);
1552
1553         if (provider->path != NULL)
1554                 return -EALREADY;
1555
1556         provider->path = g_strdup_printf("%s/connection/%s", VPN_PATH,
1557                                                 provider->identifier);
1558
1559         g_dbus_register_interface(connection, provider->path,
1560                                 VPN_CONNECTION_INTERFACE,
1561                                 connection_methods, connection_signals,
1562                                 NULL, provider, NULL);
1563
1564         return 0;
1565 }
1566
1567 static void unregister_provider(gpointer data)
1568 {
1569         struct vpn_provider *provider = data;
1570
1571         configuration_count_del();
1572
1573         connection_unregister(provider);
1574
1575         vpn_provider_unref(provider);
1576 }
1577
1578 static void provider_initialize(struct vpn_provider *provider)
1579 {
1580         DBG("provider %p", provider);
1581
1582         provider->index = 0;
1583         provider->fd = -1;
1584         provider->name = NULL;
1585         provider->type = NULL;
1586         provider->domain = NULL;
1587         provider->identifier = NULL;
1588         provider->immutable = FALSE;
1589         provider->user_networks = NULL;
1590         provider->routes = g_hash_table_new_full(g_direct_hash, g_direct_equal,
1591                                         NULL, free_route);
1592         provider->user_routes = g_hash_table_new_full(g_str_hash, g_str_equal,
1593                                         g_free, free_route);
1594         provider->setting_strings = g_hash_table_new_full(g_str_hash,
1595                                         g_str_equal, g_free, free_setting);
1596 }
1597
1598 static struct vpn_provider *vpn_provider_new(void)
1599 {
1600         struct vpn_provider *provider;
1601
1602         provider = g_try_new0(struct vpn_provider, 1);
1603         if (provider == NULL)
1604                 return NULL;
1605
1606         provider->refcount = 1;
1607
1608         DBG("provider %p", provider);
1609         provider_initialize(provider);
1610
1611         return provider;
1612 }
1613
1614 static struct vpn_provider *vpn_provider_get(const char *identifier)
1615 {
1616         struct vpn_provider *provider;
1617
1618         provider = g_hash_table_lookup(provider_hash, identifier);
1619         if (provider != NULL)
1620                 return provider;
1621
1622         provider = vpn_provider_new();
1623         if (provider == NULL)
1624                 return NULL;
1625
1626         DBG("provider %p", provider);
1627
1628         provider->identifier = g_strdup(identifier);
1629
1630         g_hash_table_insert(provider_hash, provider->identifier, provider);
1631
1632         configuration_count_add();
1633
1634         return provider;
1635 }
1636
1637 static void provider_dbus_ident(char *ident)
1638 {
1639         int i, len = strlen(ident);
1640
1641         for (i = 0; i < len; i++) {
1642                 if (ident[i] >= '0' && ident[i] <= '9')
1643                         continue;
1644                 if (ident[i] >= 'a' && ident[i] <= 'z')
1645                         continue;
1646                 if (ident[i] >= 'A' && ident[i] <= 'Z')
1647                         continue;
1648                 ident[i] = '_';
1649         }
1650 }
1651
1652 static struct vpn_provider *provider_create_from_keyfile(GKeyFile *keyfile,
1653                 const char *ident)
1654 {
1655         struct vpn_provider *provider;
1656
1657         if (keyfile == NULL || ident == NULL)
1658                 return NULL;
1659
1660         provider = __vpn_provider_lookup(ident);
1661         if (provider == NULL) {
1662                 provider = vpn_provider_get(ident);
1663                 if (provider == NULL) {
1664                         DBG("can not create provider");
1665                         return NULL;
1666                 }
1667
1668                 provider_load_from_keyfile(provider, keyfile);
1669
1670                 if (provider->name == NULL || provider->host == NULL ||
1671                                 provider->domain == NULL) {
1672                         DBG("cannot get name, host or domain");
1673                         vpn_provider_unref(provider);
1674                         return NULL;
1675                 }
1676
1677                 if (provider_register(provider) == 0)
1678                         connection_register(provider);
1679         }
1680         return provider;
1681 }
1682
1683 static void provider_create_all_from_type(const char *provider_type)
1684 {
1685         unsigned int i;
1686         char **providers;
1687         char *id, *type;
1688         GKeyFile *keyfile;
1689
1690         DBG("provider type %s", provider_type);
1691
1692         providers = __connman_storage_get_providers();
1693
1694         if (providers == NULL)
1695                 return;
1696
1697         for (i = 0; providers[i] != NULL; i+=1) {
1698
1699                 if (strncmp(providers[i], "provider_", 9) != 0)
1700                         continue;
1701
1702                 id = providers[i] + 9;
1703                 keyfile = __connman_storage_load_provider(id);
1704
1705                 if (keyfile == NULL)
1706                         continue;
1707
1708                 type = g_key_file_get_string(keyfile, id, "Type", NULL);
1709
1710                 DBG("keyfile %p id %s type %s", keyfile, id, type);
1711
1712                 if (strcmp(provider_type, type) != 0) {
1713                         g_free(type);
1714                         g_key_file_free(keyfile);
1715                         continue;
1716                 }
1717
1718                 if (provider_create_from_keyfile(keyfile, id) == NULL)
1719                         DBG("could not create provider");
1720
1721                 g_free(type);
1722                 g_key_file_free(keyfile);
1723         }
1724         g_strfreev(providers);
1725 }
1726
1727 char *__vpn_provider_create_identifier(const char *host, const char *domain)
1728 {
1729         char *ident;
1730
1731         ident = g_strdup_printf("%s_%s", host, domain);
1732         if (ident == NULL)
1733                 return NULL;
1734
1735         provider_dbus_ident(ident);
1736
1737         return ident;
1738 }
1739
1740 int __vpn_provider_create(DBusMessage *msg)
1741 {
1742         struct vpn_provider *provider;
1743         DBusMessageIter iter, array;
1744         const char *type = NULL, *name = NULL;
1745         const char *host = NULL, *domain = NULL;
1746         GSList *networks = NULL;
1747         char *ident;
1748         int err;
1749
1750         dbus_message_iter_init(msg, &iter);
1751         dbus_message_iter_recurse(&iter, &array);
1752
1753         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1754                 DBusMessageIter entry, value;
1755                 const char *key;
1756
1757                 dbus_message_iter_recurse(&array, &entry);
1758                 dbus_message_iter_get_basic(&entry, &key);
1759
1760                 dbus_message_iter_next(&entry);
1761                 dbus_message_iter_recurse(&entry, &value);
1762
1763                 switch (dbus_message_iter_get_arg_type(&value)) {
1764                 case DBUS_TYPE_STRING:
1765                         if (g_str_equal(key, "Type") == TRUE)
1766                                 dbus_message_iter_get_basic(&value, &type);
1767                         else if (g_str_equal(key, "Name") == TRUE)
1768                                 dbus_message_iter_get_basic(&value, &name);
1769                         else if (g_str_equal(key, "Host") == TRUE)
1770                                 dbus_message_iter_get_basic(&value, &host);
1771                         else if (g_str_equal(key, "VPN.Domain") == TRUE ||
1772                                         g_str_equal(key, "Domain") == TRUE)
1773                                 dbus_message_iter_get_basic(&value, &domain);
1774                         break;
1775                 case DBUS_TYPE_ARRAY:
1776                         if (g_str_equal(key, "UserRoutes") == TRUE)
1777                                 networks = get_user_networks(&value);
1778                         break;
1779                 }
1780
1781                 dbus_message_iter_next(&array);
1782         }
1783
1784         if (host == NULL || domain == NULL)
1785                 return -EINVAL;
1786
1787         DBG("Type %s name %s networks %p", type, name, networks);
1788
1789         if (type == NULL || name == NULL)
1790                 return -EOPNOTSUPP;
1791
1792         ident = __vpn_provider_create_identifier(host, domain);
1793         DBG("ident %s", ident);
1794
1795         provider = __vpn_provider_lookup(ident);
1796         if (provider == NULL) {
1797                 provider = vpn_provider_get(ident);
1798                 if (provider == NULL) {
1799                         DBG("can not create provider");
1800                         g_free(ident);
1801                         return -EOPNOTSUPP;
1802                 }
1803
1804                 provider->host = g_strdup(host);
1805                 provider->domain = g_strdup(domain);
1806                 provider->name = g_strdup(name);
1807                 provider->type = g_strdup(type);
1808
1809                 if (provider_register(provider) == 0)
1810                         vpn_provider_load(provider);
1811
1812                 provider_resolv_host_addr(provider);
1813         }
1814
1815         if (networks != NULL) {
1816                 g_slist_free_full(provider->user_networks, free_route);
1817                 provider->user_networks = networks;
1818                 set_user_networks(provider, provider->user_networks);
1819         }
1820
1821         dbus_message_iter_init(msg, &iter);
1822         dbus_message_iter_recurse(&iter, &array);
1823
1824         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1825                 DBusMessageIter entry, value;
1826                 const char *key, *str;
1827
1828                 dbus_message_iter_recurse(&array, &entry);
1829                 dbus_message_iter_get_basic(&entry, &key);
1830
1831                 dbus_message_iter_next(&entry);
1832                 dbus_message_iter_recurse(&entry, &value);
1833
1834                 switch (dbus_message_iter_get_arg_type(&value)) {
1835                 case DBUS_TYPE_STRING:
1836                         dbus_message_iter_get_basic(&value, &str);
1837                         vpn_provider_set_string(provider, key, str);
1838                         break;
1839                 }
1840
1841                 dbus_message_iter_next(&array);
1842         }
1843
1844         g_free(ident);
1845
1846         vpn_provider_save(provider);
1847
1848         err = provider_register(provider);
1849         if (err != 0 && err != -EALREADY)
1850                 return err;
1851
1852         connection_register(provider);
1853
1854         DBG("provider %p index %d path %s", provider, provider->index,
1855                                                         provider->path);
1856
1857         g_dbus_send_reply(connection, msg,
1858                                 DBUS_TYPE_OBJECT_PATH, &provider->path,
1859                                 DBUS_TYPE_INVALID);
1860
1861         connection_added_signal(provider);
1862
1863         return 0;
1864 }
1865
1866 static const char *get_string(GHashTable *settings, const char *key)
1867 {
1868         DBG("settings %p key %s", settings, key);
1869
1870         return g_hash_table_lookup(settings, key);
1871 }
1872
1873 static GSList *parse_user_networks(const char *network_str)
1874 {
1875         GSList *networks = NULL;
1876         char **elems;
1877         int i = 0;
1878
1879         if (network_str == NULL)
1880                 return NULL;
1881
1882         elems = g_strsplit(network_str, ",", 0);
1883         if (elems == NULL)
1884                 return NULL;
1885
1886         while (elems[i] != NULL) {
1887                 struct vpn_route *vpn_route;
1888                 char *network, *netmask, *gateway;
1889                 int family;
1890                 char **route;
1891
1892                 route = g_strsplit(elems[i], "/", 0);
1893                 if (route == NULL)
1894                         goto next;
1895
1896                 network = route[0];
1897                 if (network == NULL || network[0] == '\0')
1898                         goto next;
1899
1900                 family = connman_inet_check_ipaddress(network);
1901                 if (family < 0) {
1902                         DBG("Cannot get address family of %s (%d/%s)", network,
1903                                 family, gai_strerror(family));
1904
1905                         goto next;
1906                 }
1907
1908                 switch (family) {
1909                 case AF_INET:
1910                         break;
1911                 case AF_INET6:
1912                         break;
1913                 default:
1914                         DBG("Unsupported address family %d", family);
1915                         goto next;
1916                 }
1917
1918                 netmask = route[1];
1919                 if (netmask == NULL || netmask[0] == '\0')
1920                         goto next;
1921
1922                 gateway = route[2];
1923
1924                 vpn_route = g_try_new0(struct vpn_route, 1);
1925                 if (vpn_route == NULL) {
1926                         g_strfreev(route);
1927                         break;
1928                 }
1929
1930                 vpn_route->family = family;
1931                 vpn_route->network = g_strdup(network);
1932                 vpn_route->netmask = g_strdup(netmask);
1933                 vpn_route->gateway = g_strdup(gateway);
1934
1935                 DBG("route %s/%s%s%s", network, netmask,
1936                         gateway ? " via " : "", gateway ? gateway : "");
1937
1938                 networks = g_slist_prepend(networks, vpn_route);
1939
1940         next:
1941                 g_strfreev(route);
1942                 i++;
1943         }
1944
1945         g_strfreev(elems);
1946
1947         return g_slist_reverse(networks);
1948 }
1949
1950 int __vpn_provider_create_from_config(GHashTable *settings,
1951                                 const char *config_ident,
1952                                 const char *config_entry)
1953 {
1954         struct vpn_provider *provider;
1955         const char *type, *name, *host, *domain, *networks_str;
1956         GSList *networks;
1957         char *ident = NULL;
1958         GHashTableIter hash;
1959         gpointer value, key;
1960         int err;
1961
1962         type = get_string(settings, "Type");
1963         name = get_string(settings, "Name");
1964         host = get_string(settings, "Host");
1965         domain = get_string(settings, "Domain");
1966         networks_str = get_string(settings, "Networks");
1967         networks = parse_user_networks(networks_str);
1968
1969         if (host == NULL || domain == NULL) {
1970                 err = -EINVAL;
1971                 goto fail;
1972         }
1973
1974         DBG("type %s name %s networks %s", type, name, networks_str);
1975
1976         if (type == NULL || name == NULL) {
1977                 err = -EOPNOTSUPP;
1978                 goto fail;
1979         }
1980
1981         ident = __vpn_provider_create_identifier(host, domain);
1982         DBG("ident %s", ident);
1983
1984         provider = __vpn_provider_lookup(ident);
1985         if (provider == NULL) {
1986                 provider = vpn_provider_get(ident);
1987                 if (provider == NULL) {
1988                         DBG("can not create provider");
1989                         err = -EOPNOTSUPP;
1990                         goto fail;
1991                 }
1992
1993                 provider->host = g_strdup(host);
1994                 provider->domain = g_strdup(domain);
1995                 provider->name = g_strdup(name);
1996                 provider->type = g_ascii_strdown(type, -1);
1997
1998                 provider->config_file = g_strdup(config_ident);
1999                 provider->config_entry = g_strdup(config_entry);
2000
2001                 if (provider_register(provider) == 0)
2002                         vpn_provider_load(provider);
2003
2004                 provider_resolv_host_addr(provider);
2005         }
2006
2007         if (networks != NULL) {
2008                 g_slist_free_full(provider->user_networks, free_route);
2009                 provider->user_networks = networks;
2010                 set_user_networks(provider, provider->user_networks);
2011         }
2012
2013         g_hash_table_iter_init(&hash, settings);
2014
2015         while (g_hash_table_iter_next(&hash, &key, &value) == TRUE)
2016                 __vpn_provider_set_string_immutable(provider, key, value);
2017
2018         vpn_provider_save(provider);
2019
2020         err = provider_register(provider);
2021         if (err != 0 && err != -EALREADY)
2022                 goto fail;
2023
2024         connection_register(provider);
2025
2026         DBG("provider %p index %d path %s", provider, provider->index,
2027                                                         provider->path);
2028
2029         connection_added_signal(provider);
2030
2031         g_free(ident);
2032
2033         return 0;
2034
2035 fail:
2036         g_free(ident);
2037         g_slist_free_full(networks, free_route);
2038
2039         return err;
2040 }
2041
2042 static void append_connection_structs(DBusMessageIter *iter, void *user_data)
2043 {
2044         DBusMessageIter entry;
2045         GHashTableIter hash;
2046         gpointer value, key;
2047
2048         g_hash_table_iter_init(&hash, provider_hash);
2049
2050         while (g_hash_table_iter_next(&hash, &key, &value) == TRUE) {
2051                 struct vpn_provider *provider = value;
2052
2053                 DBG("path %s", provider->path);
2054
2055                 if (provider->identifier == NULL)
2056                         continue;
2057
2058                 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT,
2059                                 NULL, &entry);
2060                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_OBJECT_PATH,
2061                                 &provider->path);
2062                 append_properties(&entry, provider);
2063                 dbus_message_iter_close_container(iter, &entry);
2064         }
2065 }
2066
2067 DBusMessage *__vpn_provider_get_connections(DBusMessage *msg)
2068 {
2069         DBusMessage *reply;
2070
2071         DBG("");
2072
2073         reply = dbus_message_new_method_return(msg);
2074         if (reply == NULL)
2075                 return NULL;
2076
2077         __connman_dbus_append_objpath_dict_array(reply,
2078                         append_connection_structs, NULL);
2079
2080         return reply;
2081 }
2082
2083 const char * __vpn_provider_get_ident(struct vpn_provider *provider)
2084 {
2085         if (provider == NULL)
2086                 return NULL;
2087
2088         return provider->identifier;
2089 }
2090
2091 static int set_string(struct vpn_provider *provider,
2092                         const char *key, const char *value,
2093                         gboolean hide_value, gboolean immutable)
2094 {
2095         DBG("provider %p key %s immutable %s value %s", provider, key,
2096                 immutable ? "yes" : "no",
2097                 hide_value ? "<not printed>" : value);
2098
2099         if (g_str_equal(key, "Type") == TRUE) {
2100                 g_free(provider->type);
2101                 provider->type = g_ascii_strdown(value, -1);
2102                 send_value(provider->path, "Type", provider->type);
2103         } else if (g_str_equal(key, "Name") == TRUE) {
2104                 g_free(provider->name);
2105                 provider->name = g_strdup(value);
2106                 send_value(provider->path, "Name", provider->name);
2107         } else if (g_str_equal(key, "Host") == TRUE) {
2108                 g_free(provider->host);
2109                 provider->host = g_strdup(value);
2110                 send_value(provider->path, "Host", provider->host);
2111         } else if (g_str_equal(key, "VPN.Domain") == TRUE ||
2112                         g_str_equal(key, "Domain") == TRUE) {
2113                 g_free(provider->domain);
2114                 provider->domain = g_strdup(value);
2115                 send_value(provider->path, "Domain", provider->domain);
2116         } else {
2117                 struct vpn_setting *setting;
2118
2119                 setting = g_hash_table_lookup(provider->setting_strings, key);
2120                 if (setting != NULL && immutable == FALSE &&
2121                                                 setting->immutable == TRUE) {
2122                         DBG("Trying to set immutable variable %s", key);
2123                         return -EPERM;
2124                 }
2125
2126                 setting = g_try_new(struct vpn_setting, 1);
2127                 if (setting == NULL)
2128                         return -ENOMEM;
2129
2130                 setting->value = g_strdup(value);
2131                 setting->hide_value = hide_value;
2132
2133                 if (immutable == TRUE)
2134                         setting->immutable = TRUE;
2135
2136                 if (hide_value == FALSE)
2137                         send_value(provider->path, key, setting->value);
2138
2139                 g_hash_table_replace(provider->setting_strings,
2140                                 g_strdup(key), setting);
2141         }
2142
2143         return 0;
2144 }
2145
2146 int vpn_provider_set_string(struct vpn_provider *provider,
2147                                         const char *key, const char *value)
2148 {
2149         return set_string(provider, key, value, FALSE, FALSE);
2150 }
2151
2152 int vpn_provider_set_string_hide_value(struct vpn_provider *provider,
2153                                         const char *key, const char *value)
2154 {
2155         return set_string(provider, key, value, TRUE, FALSE);
2156 }
2157
2158 int __vpn_provider_set_string_immutable(struct vpn_provider *provider,
2159                                         const char *key, const char *value)
2160 {
2161         return set_string(provider, key, value, FALSE, TRUE);
2162 }
2163
2164 const char *vpn_provider_get_string(struct vpn_provider *provider,
2165                                                         const char *key)
2166 {
2167         struct vpn_setting *setting;
2168
2169         DBG("provider %p key %s", provider, key);
2170
2171         if (g_str_equal(key, "Type") == TRUE)
2172                 return provider->type;
2173         else if (g_str_equal(key, "Name") == TRUE)
2174                 return provider->name;
2175         else if (g_str_equal(key, "Host") == TRUE)
2176                 return provider->host;
2177         else if (g_str_equal(key, "HostIP") == TRUE) {
2178                 if (provider->host_ip == NULL ||
2179                                 provider->host_ip[0] == NULL)
2180                         return provider->host;
2181                 else
2182                         return provider->host_ip[0];
2183         } else if (g_str_equal(key, "VPN.Domain") == TRUE ||
2184                         g_str_equal(key, "Domain") == TRUE)
2185                 return provider->domain;
2186
2187         setting = g_hash_table_lookup(provider->setting_strings, key);
2188         if (setting == NULL)
2189                 return NULL;
2190
2191         return setting->value;
2192 }
2193
2194 connman_bool_t __vpn_provider_check_routes(struct vpn_provider *provider)
2195 {
2196         if (provider == NULL)
2197                 return FALSE;
2198
2199         if (provider->user_routes != NULL &&
2200                         g_hash_table_size(provider->user_routes) > 0)
2201                 return TRUE;
2202
2203         if (provider->routes != NULL &&
2204                         g_hash_table_size(provider->routes) > 0)
2205                 return TRUE;
2206
2207         return FALSE;
2208 }
2209
2210 void *vpn_provider_get_data(struct vpn_provider *provider)
2211 {
2212         return provider->driver_data;
2213 }
2214
2215 void vpn_provider_set_data(struct vpn_provider *provider, void *data)
2216 {
2217         provider->driver_data = data;
2218 }
2219
2220 void vpn_provider_set_index(struct vpn_provider *provider, int index)
2221 {
2222         DBG("index %d provider %p", index, provider);
2223
2224         if (provider->ipconfig_ipv4 == NULL) {
2225                 provider->ipconfig_ipv4 = __vpn_ipconfig_create(index,
2226                                                                 AF_INET);
2227                 if (provider->ipconfig_ipv4 == NULL) {
2228                         DBG("Couldnt create ipconfig for IPv4");
2229                         goto done;
2230                 }
2231         }
2232
2233         __vpn_ipconfig_set_index(provider->ipconfig_ipv4, index);
2234
2235         if (provider->ipconfig_ipv6 == NULL) {
2236                 provider->ipconfig_ipv6 = __vpn_ipconfig_create(index,
2237                                                                 AF_INET6);
2238                 if (provider->ipconfig_ipv6 == NULL) {
2239                         DBG("Couldnt create ipconfig for IPv6");
2240                         goto done;
2241                 }
2242         }
2243
2244         __vpn_ipconfig_set_index(provider->ipconfig_ipv6, index);
2245
2246 done:
2247         provider->index = index;
2248 }
2249
2250 int vpn_provider_get_index(struct vpn_provider *provider)
2251 {
2252         return provider->index;
2253 }
2254
2255 int vpn_provider_set_ipaddress(struct vpn_provider *provider,
2256                                         struct connman_ipaddress *ipaddress)
2257 {
2258         struct vpn_ipconfig *ipconfig = NULL;
2259
2260         switch (ipaddress->family) {
2261         case AF_INET:
2262                 ipconfig = provider->ipconfig_ipv4;
2263                 break;
2264         case AF_INET6:
2265                 ipconfig = provider->ipconfig_ipv6;
2266                 break;
2267         default:
2268                 break;
2269         }
2270
2271         DBG("provider %p ipconfig %p family %d", provider, ipconfig,
2272                                                         ipaddress->family);
2273
2274         if (ipconfig == NULL)
2275                 return -EINVAL;
2276
2277         provider->family = ipaddress->family;
2278
2279         __vpn_ipconfig_set_local(ipconfig, ipaddress->local);
2280         __vpn_ipconfig_set_peer(ipconfig, ipaddress->peer);
2281         __vpn_ipconfig_set_broadcast(ipconfig, ipaddress->broadcast);
2282         __vpn_ipconfig_set_gateway(ipconfig, ipaddress->gateway);
2283         __vpn_ipconfig_set_prefixlen(ipconfig, ipaddress->prefixlen);
2284
2285         return 0;
2286 }
2287
2288 int vpn_provider_set_pac(struct vpn_provider *provider,
2289                                 const char *pac)
2290 {
2291         DBG("provider %p pac %s", provider, pac);
2292
2293         return 0;
2294 }
2295
2296
2297 int vpn_provider_set_domain(struct vpn_provider *provider,
2298                                         const char *domain)
2299 {
2300         DBG("provider %p domain %s", provider, domain);
2301
2302         g_free(provider->domain);
2303         provider->domain = g_strdup(domain);
2304
2305         return 0;
2306 }
2307
2308 int vpn_provider_set_nameservers(struct vpn_provider *provider,
2309                                         const char *nameservers)
2310 {
2311         DBG("provider %p nameservers %s", provider, nameservers);
2312
2313         g_strfreev(provider->nameservers);
2314         provider->nameservers = NULL;
2315
2316         if (nameservers == NULL)
2317                 return 0;
2318
2319         provider->nameservers = g_strsplit(nameservers, " ", 0);
2320
2321         return 0;
2322 }
2323
2324 enum provider_route_type {
2325         PROVIDER_ROUTE_TYPE_NONE = 0,
2326         PROVIDER_ROUTE_TYPE_MASK = 1,
2327         PROVIDER_ROUTE_TYPE_ADDR = 2,
2328         PROVIDER_ROUTE_TYPE_GW   = 3,
2329 };
2330
2331 static int route_env_parse(struct vpn_provider *provider, const char *key,
2332                                 int *family, unsigned long *idx,
2333                                 enum provider_route_type *type)
2334 {
2335         char *end;
2336         const char *start;
2337
2338         DBG("name %s", provider->name);
2339
2340         if (!strcmp(provider->type, "openvpn")) {
2341                 if (g_str_has_prefix(key, "route_network_") == TRUE) {
2342                         start = key + strlen("route_network_");
2343                         *type = PROVIDER_ROUTE_TYPE_ADDR;
2344                 } else if (g_str_has_prefix(key, "route_netmask_") == TRUE) {
2345                         start = key + strlen("route_netmask_");
2346                         *type = PROVIDER_ROUTE_TYPE_MASK;
2347                 } else if (g_str_has_prefix(key, "route_gateway_") == TRUE) {
2348                         start = key + strlen("route_gateway_");
2349                         *type = PROVIDER_ROUTE_TYPE_GW;
2350                 } else
2351                         return -EINVAL;
2352
2353                 *family = AF_INET;
2354                 *idx = g_ascii_strtoull(start, &end, 10);
2355
2356         } else if (!strcmp(provider->type, "openconnect")) {
2357                 if (g_str_has_prefix(key, "CISCO_SPLIT_INC_") == TRUE) {
2358                         *family = AF_INET;
2359                         start = key + strlen("CISCO_SPLIT_INC_");
2360                 } else if (g_str_has_prefix(key,
2361                                         "CISCO_IPV6_SPLIT_INC_") == TRUE) {
2362                         *family = AF_INET6;
2363                         start = key + strlen("CISCO_IPV6_SPLIT_INC_");
2364                 } else
2365                         return -EINVAL;
2366
2367                 *idx = g_ascii_strtoull(start, &end, 10);
2368
2369                 if (strncmp(end, "_ADDR", 5) == 0)
2370                         *type = PROVIDER_ROUTE_TYPE_ADDR;
2371                 else if (strncmp(end, "_MASK", 5) == 0)
2372                         *type = PROVIDER_ROUTE_TYPE_MASK;
2373                 else if (strncmp(end, "_MASKLEN", 8) == 0 &&
2374                                 *family == AF_INET6) {
2375                         *type = PROVIDER_ROUTE_TYPE_MASK;
2376                 } else
2377                         return -EINVAL;
2378         }
2379
2380         return 0;
2381 }
2382
2383 int vpn_provider_append_route(struct vpn_provider *provider,
2384                                         const char *key, const char *value)
2385 {
2386         struct vpn_route *route;
2387         int ret, family = 0;
2388         unsigned long idx = 0;
2389         enum provider_route_type type = PROVIDER_ROUTE_TYPE_NONE;
2390
2391         DBG("key %s value %s", key, value);
2392
2393         ret = route_env_parse(provider, key, &family, &idx, &type);
2394         if (ret < 0)
2395                 return ret;
2396
2397         DBG("idx %lu family %d type %d", idx, family, type);
2398
2399         route = g_hash_table_lookup(provider->routes, GINT_TO_POINTER(idx));
2400         if (route == NULL) {
2401                 route = g_try_new0(struct vpn_route, 1);
2402                 if (route == NULL) {
2403                         connman_error("out of memory");
2404                         return -ENOMEM;
2405                 }
2406
2407                 route->family = family;
2408
2409                 g_hash_table_replace(provider->routes, GINT_TO_POINTER(idx),
2410                                                 route);
2411         }
2412
2413         switch (type) {
2414         case PROVIDER_ROUTE_TYPE_NONE:
2415                 break;
2416         case PROVIDER_ROUTE_TYPE_MASK:
2417                 route->netmask = g_strdup(value);
2418                 break;
2419         case PROVIDER_ROUTE_TYPE_ADDR:
2420                 route->network = g_strdup(value);
2421                 break;
2422         case PROVIDER_ROUTE_TYPE_GW:
2423                 route->gateway = g_strdup(value);
2424                 break;
2425         }
2426
2427         if (handle_routes == FALSE) {
2428                 if (route->netmask != NULL && route->gateway != NULL &&
2429                                                         route->network != NULL)
2430                         provider_schedule_changed(provider);
2431         }
2432
2433         return 0;
2434 }
2435
2436 const char *vpn_provider_get_driver_name(struct vpn_provider *provider)
2437 {
2438         if (provider->driver == NULL)
2439                 return NULL;
2440
2441         return provider->driver->name;
2442 }
2443
2444 const char *vpn_provider_get_save_group(struct vpn_provider *provider)
2445 {
2446         return provider->identifier;
2447 }
2448
2449 static gint compare_priority(gconstpointer a, gconstpointer b)
2450 {
2451         return 0;
2452 }
2453
2454 static void clean_provider(gpointer key, gpointer value, gpointer user_data)
2455 {
2456         struct vpn_provider *provider = value;
2457
2458         if (provider->driver != NULL && provider->driver->remove)
2459                 provider->driver->remove(provider);
2460
2461         connection_unregister(provider);
2462 }
2463
2464 int vpn_provider_driver_register(struct vpn_provider_driver *driver)
2465 {
2466         DBG("driver %p name %s", driver, driver->name);
2467
2468         driver_list = g_slist_insert_sorted(driver_list, driver,
2469                                                         compare_priority);
2470         provider_create_all_from_type(driver->name);
2471         return 0;
2472 }
2473
2474 void vpn_provider_driver_unregister(struct vpn_provider_driver *driver)
2475 {
2476         GHashTableIter iter;
2477         gpointer value, key;
2478
2479         DBG("driver %p name %s", driver, driver->name);
2480
2481         driver_list = g_slist_remove(driver_list, driver);
2482
2483         g_hash_table_iter_init(&iter, provider_hash);
2484         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2485                 struct vpn_provider *provider = value;
2486
2487                 if (provider != NULL && provider->driver != NULL &&
2488                                 provider->driver->type == driver->type &&
2489                                 g_strcmp0(provider->driver->name,
2490                                                         driver->name) == 0) {
2491                         provider->driver = NULL;
2492                 }
2493         }
2494 }
2495
2496 const char *vpn_provider_get_name(struct vpn_provider *provider)
2497 {
2498         return provider->name;
2499 }
2500
2501 const char *vpn_provider_get_host(struct vpn_provider *provider)
2502 {
2503         return provider->host;
2504 }
2505
2506 const char *vpn_provider_get_path(struct vpn_provider *provider)
2507 {
2508         return provider->path;
2509 }
2510
2511 static int agent_probe(struct connman_agent *agent)
2512 {
2513         DBG("agent %p", agent);
2514         return 0;
2515 }
2516
2517 static void agent_remove(struct connman_agent *agent)
2518 {
2519         DBG("agent %p", agent);
2520 }
2521
2522 static struct connman_agent_driver agent_driver = {
2523         .name           = "vpn",
2524         .interface      = VPN_AGENT_INTERFACE,
2525         .probe          = agent_probe,
2526         .remove         = agent_remove,
2527 };
2528
2529 static void remove_unprovisioned_providers()
2530 {
2531         gchar **providers;
2532         GKeyFile *keyfile, *configkeyfile;
2533         char *file, *section;
2534         int i = 0;
2535
2536         providers = __connman_storage_get_providers();
2537         if (providers == NULL)
2538                 return;
2539
2540         for (; providers[i] != NULL; i++) {
2541                 char *group = providers[i] + sizeof("provider_") - 1;
2542                 file = section = NULL;
2543                 keyfile = configkeyfile = NULL;
2544
2545                 keyfile = __connman_storage_load_provider(group);
2546                 if (keyfile == NULL)
2547                         continue;
2548
2549                 file = g_key_file_get_string(keyfile, group,
2550                                         "Config.file", NULL);
2551                 if (file == NULL)
2552                         goto next;
2553
2554                 section = g_key_file_get_string(keyfile, group,
2555                                         "Config.ident", NULL);
2556                 if (section == NULL)
2557                         goto next;
2558
2559                 configkeyfile = __connman_storage_load_provider_config(file);
2560                 if (configkeyfile == NULL) {
2561                         /*
2562                          * Config file is missing, remove the provisioned
2563                          * service.
2564                          */
2565                         __connman_storage_remove_provider(group);
2566                         goto next;
2567                 }
2568
2569                 if (g_key_file_has_group(configkeyfile, section) == FALSE)
2570                         /*
2571                          * Config section is missing, remove the provisioned
2572                          * service.
2573                          */
2574                         __connman_storage_remove_provider(group);
2575
2576         next:
2577                 if (keyfile != NULL)
2578                         g_key_file_free(keyfile);
2579
2580                 if (configkeyfile != NULL)
2581                         g_key_file_free(configkeyfile);
2582
2583                 g_free(section);
2584                 g_free(file);
2585         }
2586
2587         g_strfreev(providers);
2588 }
2589
2590 int __vpn_provider_init(gboolean do_routes)
2591 {
2592         int err;
2593
2594         DBG("");
2595
2596         handle_routes = do_routes;
2597
2598         err = connman_agent_driver_register(&agent_driver);
2599         if (err < 0) {
2600                 connman_error("Cannot register agent driver for %s",
2601                                                 agent_driver.name);
2602                 return err;
2603         }
2604
2605         connection = connman_dbus_get_connection();
2606
2607         remove_unprovisioned_providers();
2608
2609         provider_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2610                                                 NULL, unregister_provider);
2611         return 0;
2612 }
2613
2614 void __vpn_provider_cleanup(void)
2615 {
2616         DBG("");
2617
2618         g_hash_table_foreach(provider_hash, clean_provider, NULL);
2619
2620         g_hash_table_destroy(provider_hash);
2621         provider_hash = NULL;
2622
2623         connman_agent_driver_unregister(&agent_driver);
2624
2625         dbus_connection_unref(connection);
2626 }