5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
33 #define CONNMAN_API_SUBJECT_TO_CHANGE
34 #include <connman/plugin.h>
35 #include <connman/provider.h>
36 #include <connman/log.h>
37 #include <connman/task.h>
38 #include <connman/ipconfig.h>
42 static int oc_notify(DBusMessage *msg, struct connman_provider *provider)
44 DBusMessageIter iter, dict;
45 const char *reason, *key, *value;
46 const char *domain = NULL;
47 char *address = NULL, *netmask = NULL, *gateway = NULL;
48 struct connman_ipaddress *ipaddress;
50 dbus_message_iter_init(msg, &iter);
52 dbus_message_iter_get_basic(&iter, &reason);
53 dbus_message_iter_next(&iter);
56 connman_error("No provider found");
57 return VPN_STATE_FAILURE;
60 if (strcmp(reason, "connect"))
61 return VPN_STATE_DISCONNECT;
63 domain = connman_provider_get_string(provider, "VPN.Domain");
65 dbus_message_iter_recurse(&iter, &dict);
67 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
68 DBusMessageIter entry;
70 dbus_message_iter_recurse(&dict, &entry);
71 dbus_message_iter_get_basic(&entry, &key);
72 dbus_message_iter_next(&entry);
73 dbus_message_iter_get_basic(&entry, &value);
75 if (strcmp(key, "CISCO_CSTP_OPTIONS"))
76 DBG("%s = %s", key, value);
78 if (!strcmp(key, "VPNGATEWAY"))
79 gateway = g_strdup(value);
81 if (!strcmp(key, "INTERNAL_IP4_ADDRESS"))
82 address = g_strdup(value);
84 if (!strcmp(key, "INTERNAL_IP4_NETMASK"))
85 netmask = g_strdup(value);
87 if (!strcmp(key, "INTERNAL_IP4_DNS"))
88 connman_provider_set_nameservers(provider, value);
90 if (!strcmp(key, "CISCO_PROXY_PAC"))
91 connman_provider_set_pac(provider, value);
93 if (domain == NULL && !strcmp(key, "CISCO_DEF_DOMAIN"))
96 if (g_str_has_prefix(key, "CISCO_SPLIT_INC") == TRUE ||
97 g_str_has_prefix(key, "CISCO_IPV6_SPLIT_INC") == TRUE)
98 connman_provider_append_route(provider, key, value);
100 dbus_message_iter_next(&dict);
103 ipaddress = connman_ipaddress_alloc(AF_INET);
104 if (ipaddress == NULL) {
109 return VPN_STATE_FAILURE;
112 connman_ipaddress_set_ipv4(ipaddress, address, netmask, gateway);
113 connman_provider_set_ipaddress(provider, ipaddress);
114 connman_provider_set_domain(provider, domain);
119 connman_ipaddress_free(ipaddress);
121 return VPN_STATE_CONNECT;
124 static int oc_connect(struct connman_provider *provider,
125 struct connman_task *task, const char *if_name)
127 const char *vpnhost, *vpncookie, *cafile, *certsha1, *mtu;
130 vpnhost = connman_provider_get_string(provider, "Host");
132 connman_error("Host not set; cannot enable VPN");
136 vpncookie = connman_provider_get_string(provider, "OpenConnect.Cookie");
138 connman_error("OpenConnect.Cookie not set; cannot enable VPN");
142 certsha1 = connman_provider_get_string(provider,
143 "OpenConnect.ServerCert");
145 connman_task_add_argument(task, "--servercert",
148 cafile = connman_provider_get_string(provider, "OpenConnect.CACert");
149 mtu = connman_provider_get_string(provider, "VPN.MTU");
152 connman_task_add_argument(task, "--cafile",
155 connman_task_add_argument(task, "--mtu", (char *)mtu);
157 connman_task_add_argument(task, "--syslog", NULL);
158 connman_task_add_argument(task, "--cookie-on-stdin", NULL);
160 connman_task_add_argument(task, "--script",
161 SCRIPTDIR "/openconnect-script");
163 connman_task_add_argument(task, "--interface", if_name);
165 connman_task_add_argument(task, (char *)vpnhost, NULL);
167 err = connman_task_run(task, vpn_died, provider,
170 connman_error("openconnect failed to start");
174 if (write(fd, vpncookie, strlen(vpncookie)) !=
175 (ssize_t)strlen(vpncookie) ||
176 write(fd, "\n", 1) != 1) {
177 connman_error("openconnect failed to take cookie on stdin");
184 static int oc_error_code(int exit_code)
189 return CONNMAN_PROVIDER_ERROR_CONNECT_FAILED;
191 return CONNMAN_PROVIDER_ERROR_LOGIN_FAILED;
193 return CONNMAN_PROVIDER_ERROR_UNKNOWN;
197 static struct vpn_driver vpn_driver = {
199 .connect = oc_connect,
200 .error_code = oc_error_code,
203 static int openconnect_init(void)
205 return vpn_register("openconnect", &vpn_driver, OPENCONNECT);
208 static void openconnect_exit(void)
210 vpn_unregister("openconnect");
213 CONNMAN_PLUGIN_DEFINE(openconnect, "OpenConnect VPN plugin", VERSION,
214 CONNMAN_PLUGIN_PRIORITY_DEFAULT, openconnect_init, openconnect_exit)