1 | /* |
2 | SPDX-FileCopyrightText: 2009 Will Stephenson <wstephenson@kde.org> |
3 | SPDX-FileCopyrightText: 2012-2013 Jan Grulich <jgrulich@redhat.com> |
4 | |
5 | SPDX-License-Identifier: LGPL-2.1-only OR LGPL-3.0-only OR LicenseRef-KDE-Accepted-LGPL |
6 | */ |
7 | |
8 | #include <QRegularExpression> |
9 | |
10 | #include "time.h" |
11 | #include "utils.h" |
12 | |
13 | QHostAddress NetworkManager::ipv6AddressAsHostAddress(const QByteArray &address) |
14 | { |
15 | // Q_ASSERT(address.size() == 16); |
16 | Q_IPV6ADDR tmp; |
17 | for (int i = 0; i < 16; ++i) { |
18 | tmp[i] = address[i]; |
19 | } |
20 | QHostAddress hostaddress(tmp); |
21 | Q_ASSERT(hostaddress.protocol() == QAbstractSocket::IPv6Protocol); |
22 | |
23 | return hostaddress; |
24 | } |
25 | |
26 | QByteArray NetworkManager::ipv6AddressFromHostAddress(const QHostAddress &address) |
27 | { |
28 | // Q_ASSERT(address.protocol() == QAbstractSocket::IPv6Protocol); |
29 | Q_IPV6ADDR tmp = address.toIPv6Address(); |
30 | QByteArray assembledAddress; |
31 | assembledAddress.reserve(asize: 16); |
32 | for (int i = 0; i < 16; ++i) { |
33 | assembledAddress.push_back(c: tmp[i]); |
34 | } |
35 | |
36 | return assembledAddress; |
37 | } |
38 | |
39 | QString NetworkManager::macAddressAsString(const QByteArray &ba) |
40 | { |
41 | QStringList mac; |
42 | |
43 | for (int i = 0; i < ba.size(); ++i) { |
44 | mac << QString("%1" ).arg(a: (quint8)ba[i], fieldWidth: 2, base: 16, fillChar: QLatin1Char('0')).toUpper(); |
45 | } |
46 | |
47 | return mac.join(sep: ":" ); |
48 | } |
49 | |
50 | QByteArray NetworkManager::macAddressFromString(const QString &s) |
51 | { |
52 | const QStringList macStringList = s.split(sep: ':'); |
53 | // Q_ASSERT(macStringList.size() == 6); |
54 | QByteArray ba; |
55 | if (!s.isEmpty()) { |
56 | ba.resize(size: 6); |
57 | int i = 0; |
58 | |
59 | for (const QString &macPart : macStringList) { |
60 | ba[i++] = macPart.toUInt(ok: nullptr, base: 16); |
61 | } |
62 | } |
63 | return ba; |
64 | } |
65 | |
66 | bool NetworkManager::macAddressIsValid(const QString &macAddress) |
67 | { |
68 | const static QRegularExpression macAddressCheck(QStringLiteral("([a-fA-F0-9][a-fA-F0-9]:){5}[0-9a-fA-F][0-9a-fA-F]" )); |
69 | return macAddressCheck.match(subject: macAddress).hasMatch(); |
70 | } |
71 | |
72 | bool NetworkManager::macAddressIsValid(const QByteArray &macAddress) |
73 | { |
74 | return macAddressIsValid(macAddress: macAddressAsString(ba: macAddress)); |
75 | } |
76 | |
77 | int NetworkManager::findChannel(int freq) |
78 | { |
79 | int channel; |
80 | if (freq < 2500) { |
81 | channel = 0; |
82 | int i = 0; |
83 | QList<QPair<int, int>> bFreqs = getBFreqs(); |
84 | while (i < bFreqs.size()) { |
85 | if (bFreqs.at(i).second <= freq) { |
86 | channel = bFreqs.at(i).first; |
87 | } else { |
88 | break; |
89 | } |
90 | i++; |
91 | } |
92 | return channel; |
93 | } |
94 | channel = 0; |
95 | int i = 0; |
96 | QList<QPair<int, int>> aFreqs = getAFreqs(); |
97 | while (i < aFreqs.size()) { |
98 | if (aFreqs.at(i).second <= freq) { |
99 | channel = aFreqs.at(i).first; |
100 | if (aFreqs.at(i).second == freq) { |
101 | break; |
102 | } |
103 | } else { |
104 | break; |
105 | } |
106 | i++; |
107 | } |
108 | |
109 | return channel; |
110 | } |
111 | |
112 | NetworkManager::WirelessSetting::FrequencyBand NetworkManager::findFrequencyBand(int freq) |
113 | { |
114 | if (freq < 2500) { |
115 | return WirelessSetting::Bg; |
116 | } |
117 | |
118 | return WirelessSetting::A; |
119 | } |
120 | |
121 | bool NetworkManager::deviceSupportsApCiphers(NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
122 | NetworkManager::AccessPoint::WpaFlags apCiphers, |
123 | WirelessSecurityType type) |
124 | { |
125 | bool havePair = false; |
126 | bool haveGroup = false; |
127 | |
128 | if (type == NetworkManager::StaticWep) { |
129 | havePair = true; |
130 | } else { |
131 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairWep40)) { |
132 | havePair = true; |
133 | } |
134 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairWep104)) { |
135 | havePair = true; |
136 | } |
137 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairTkip)) { |
138 | havePair = true; |
139 | } |
140 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairCcmp)) { |
141 | havePair = true; |
142 | } |
143 | } |
144 | |
145 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupWep40)) { |
146 | haveGroup = true; |
147 | } |
148 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupWep104)) { |
149 | haveGroup = true; |
150 | } |
151 | if (type != StaticWep) { |
152 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupTkip)) { |
153 | haveGroup = true; |
154 | } |
155 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupCcmp)) { |
156 | haveGroup = true; |
157 | } |
158 | } |
159 | |
160 | return (havePair && haveGroup); |
161 | } |
162 | |
163 | // Keep this in sync with NetworkManager/libnm-core/nm-utils.c:nm_utils_security_valid() |
164 | bool NetworkManager::securityIsValid(WirelessSecurityType type, |
165 | NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
166 | bool haveAp, |
167 | bool adhoc, |
168 | NetworkManager::AccessPoint::Capabilities apCaps, |
169 | NetworkManager::AccessPoint::WpaFlags apWpa, |
170 | NetworkManager::AccessPoint::WpaFlags apRsn) |
171 | { |
172 | bool good = true; |
173 | |
174 | // kDebug() << "type(" << type << ") interfaceCaps(" << interfaceCaps << ") haveAp(" << haveAp << ") adhoc(" << adhoc << ") apCaps(" << apCaps << ") apWpa(" |
175 | // << apWpa << " apRsn(" << apRsn << ")"; |
176 | |
177 | if (!haveAp) { |
178 | if (type == NoneSecurity) { |
179 | return true; |
180 | } |
181 | if ((type == StaticWep) // |
182 | || ((type == DynamicWep) && !adhoc) // |
183 | || ((type == Leap) && !adhoc)) { |
184 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) || interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104)) { |
185 | return true; |
186 | } else { |
187 | return false; |
188 | } |
189 | } |
190 | |
191 | // apCaps.testFlag(Privacy) == true for StaticWep, Leap and DynamicWep |
192 | // see libs/internals/wirelessinterfaceconnectionhelpers.cpp |
193 | |
194 | // TODO: this is not in nm-utils.c |
195 | // if (type == Knm::WirelessSecurity::WpaPsk |
196 | // || ((type == Knm::WirelessSecurity::WpaEap) && !adhoc)) { |
197 | // if (interfaceCaps.testFlag(NetworkManager::WirelessDevice::Wpa) && |
198 | // !apCaps.testFlag(NetworkManager::AccessPoint::Privacy)) { |
199 | // return true; |
200 | // } |
201 | // } |
202 | // if (type == Knm::WirelessSecurity::Wpa2Psk |
203 | // || ((type == Knm::WirelessSecurity::Wpa2Eap) && !adhoc)) { |
204 | // if (interfaceCaps.testFlag(NetworkManager::WirelessDevice::Rsn) && |
205 | // !apCaps.testFlag(NetworkManager::AccessPoint::Privacy)) { |
206 | // return true; |
207 | // } |
208 | // } |
209 | } |
210 | |
211 | switch (type) { |
212 | case NoneSecurity: |
213 | Q_ASSERT(haveAp); |
214 | if (apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy)) { |
215 | return false; |
216 | } |
217 | if (apWpa || apRsn) { |
218 | return false; |
219 | } |
220 | break; |
221 | case Leap: /* require PRIVACY bit for LEAP? */ |
222 | if (adhoc) { |
223 | return false; |
224 | } |
225 | /* Fall through */ |
226 | case StaticWep: |
227 | Q_ASSERT(haveAp); |
228 | if (!apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy)) { |
229 | return false; |
230 | } |
231 | if (apWpa || apRsn) { |
232 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: StaticWep)) { |
233 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apRsn, type: StaticWep)) { |
234 | return false; |
235 | } |
236 | } |
237 | } |
238 | break; |
239 | case DynamicWep: |
240 | if (adhoc) { |
241 | return false; |
242 | } |
243 | Q_ASSERT(haveAp); |
244 | if (apRsn || !(apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy))) { |
245 | return false; |
246 | } |
247 | /* Some APs broadcast minimal WPA-enabled beacons that must be handled */ |
248 | if (apWpa) { |
249 | if (!apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
250 | return false; |
251 | } |
252 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: DynamicWep)) { |
253 | return false; |
254 | } |
255 | } |
256 | break; |
257 | case WpaPsk: |
258 | if (adhoc) { |
259 | return false; |
260 | } |
261 | |
262 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wpa)) { |
263 | return false; |
264 | } |
265 | if (haveAp) { |
266 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtPsk)) { |
267 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
268 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
269 | return true; |
270 | } |
271 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
272 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
273 | return true; |
274 | } |
275 | } |
276 | return false; |
277 | } |
278 | break; |
279 | case Wpa2Psk: |
280 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
281 | return false; |
282 | } |
283 | if (haveAp) { |
284 | if (adhoc) { |
285 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::IBSSRsn)) { |
286 | return false; |
287 | } |
288 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
289 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
290 | return true; |
291 | } |
292 | } else { |
293 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtPsk)) { |
294 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
295 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
296 | return true; |
297 | } |
298 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
299 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
300 | return true; |
301 | } |
302 | } |
303 | } |
304 | return false; |
305 | } |
306 | break; |
307 | case WpaEap: |
308 | if (adhoc) { |
309 | return false; |
310 | } |
311 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wpa)) { |
312 | return false; |
313 | } |
314 | if (haveAp) { |
315 | if (!apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
316 | return false; |
317 | } |
318 | /* Ensure at least one WPA cipher is supported */ |
319 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: WpaEap)) { |
320 | return false; |
321 | } |
322 | } |
323 | break; |
324 | case Wpa2Eap: |
325 | if (adhoc) { |
326 | return false; |
327 | } |
328 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
329 | return false; |
330 | } |
331 | if (haveAp) { |
332 | if (!apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
333 | return false; |
334 | } |
335 | /* Ensure at least one WPA cipher is supported */ |
336 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apRsn, type: Wpa2Eap)) { |
337 | return false; |
338 | } |
339 | } |
340 | break; |
341 | case SAE: |
342 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
343 | return false; |
344 | } |
345 | if (haveAp) { |
346 | if (adhoc) { |
347 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::IBSSRsn)) { |
348 | return false; |
349 | } |
350 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
351 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
352 | return true; |
353 | } |
354 | } else { |
355 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtSAE)) { |
356 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
357 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
358 | return true; |
359 | } |
360 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
361 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
362 | return true; |
363 | } |
364 | } |
365 | } |
366 | return false; |
367 | } |
368 | break; |
369 | case OWE: |
370 | if (adhoc) { |
371 | return false; |
372 | } |
373 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
374 | return false; |
375 | } |
376 | if (haveAp) { |
377 | if (!apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtOWE) // |
378 | && !apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtOWETM)) { |
379 | return false; |
380 | } |
381 | } |
382 | break; |
383 | case Wpa3SuiteB192: |
384 | if (adhoc) { |
385 | return false; |
386 | } |
387 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
388 | return false; |
389 | } |
390 | if (haveAp && !apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtEapSuiteB192)) { |
391 | return false; |
392 | } |
393 | break; |
394 | default: |
395 | good = false; |
396 | break; |
397 | } |
398 | |
399 | return good; |
400 | } |
401 | |
402 | NetworkManager::WirelessSecurityType NetworkManager::findBestWirelessSecurity(NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
403 | bool haveAp, |
404 | bool adHoc, |
405 | NetworkManager::AccessPoint::Capabilities apCaps, |
406 | NetworkManager::AccessPoint::WpaFlags apWpa, |
407 | NetworkManager::AccessPoint::WpaFlags apRsn) |
408 | { |
409 | // The ordering of this list is a pragmatic combination of security level and popularity. |
410 | // Therefore static WEP is before LEAP and Dynamic WEP because there is no way to detect |
411 | // if an AP is capable of Dynamic WEP and showing Dynamic WEP first would confuse |
412 | // Static WEP users. |
413 | const QList<NetworkManager::WirelessSecurityType> types = {NetworkManager::Wpa3SuiteB192, |
414 | NetworkManager::SAE, |
415 | NetworkManager::Wpa2Eap, |
416 | NetworkManager::Wpa2Psk, |
417 | NetworkManager::WpaEap, |
418 | NetworkManager::WpaPsk, |
419 | NetworkManager::StaticWep, |
420 | NetworkManager::DynamicWep, |
421 | NetworkManager::Leap, |
422 | NetworkManager::OWE, |
423 | NetworkManager::NoneSecurity}; |
424 | |
425 | for (NetworkManager::WirelessSecurityType type : types) { |
426 | if (NetworkManager::securityIsValid(type, interfaceCaps, haveAp, adhoc: adHoc, apCaps, apWpa, apRsn)) { |
427 | return type; |
428 | } |
429 | } |
430 | return NetworkManager::UnknownSecurity; |
431 | } |
432 | |
433 | bool NetworkManager::wepKeyIsValid(const QString &key, NetworkManager::WirelessSecuritySetting::WepKeyType type) |
434 | { |
435 | if (key.isEmpty()) { |
436 | return false; |
437 | } |
438 | |
439 | const int keylen = key.length(); |
440 | |
441 | if (type != WirelessSecuritySetting::NotSpecified) { |
442 | if (type == WirelessSecuritySetting::Hex) { |
443 | if (keylen == 10 || keylen == 26) { |
444 | /* Hex key */ |
445 | for (int i = 0; i < keylen; ++i) { |
446 | if (!(key.at(i).isDigit() || (key.at(i) >= 'A' && key.at(i) <= 'F') || (key.at(i) >= 'a' && key.at(i) <= 'f'))) { |
447 | return false; |
448 | } |
449 | } |
450 | return true; |
451 | } else if (keylen == 5 || keylen == 13) { |
452 | /* ASCII KEY */ |
453 | for (int i = 0; i < keylen; ++i) { |
454 | if (!key.at(i).isPrint()) { |
455 | return false; |
456 | } |
457 | } |
458 | return true; |
459 | } |
460 | |
461 | return false; |
462 | } else if (type == WirelessSecuritySetting::Passphrase) { |
463 | if (!keylen || keylen > 64) { |
464 | return false; |
465 | } |
466 | |
467 | return true; |
468 | } |
469 | } |
470 | |
471 | return false; |
472 | } |
473 | |
474 | bool NetworkManager::wpaPskIsValid(const QString &psk) |
475 | { |
476 | if (psk.isEmpty()) { |
477 | return false; |
478 | } |
479 | |
480 | const int psklen = psk.length(); |
481 | |
482 | if (psklen < 8 || psklen > 64) { |
483 | return false; |
484 | } |
485 | |
486 | if (psklen == 64) { |
487 | /* Hex PSK */ |
488 | for (int i = 0; i < psklen; ++i) { |
489 | if (!psk.at(i).isLetterOrNumber()) { |
490 | return false; |
491 | } |
492 | } |
493 | } |
494 | |
495 | return true; |
496 | } |
497 | |
498 | NetworkManager::WirelessSecurityType NetworkManager::securityTypeFromConnectionSetting(const NetworkManager::ConnectionSettings::Ptr &settings) |
499 | { |
500 | NetworkManager::WirelessSecuritySetting::Ptr wifiSecuritySetting = settings->setting(Setting::WirelessSecurity).dynamicCast<WirelessSecuritySetting>(); |
501 | if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::Wep) { |
502 | return StaticWep; |
503 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::Ieee8021x) { |
504 | if (wifiSecuritySetting->authAlg() == WirelessSecuritySetting::Leap) { |
505 | return Leap; |
506 | } else { |
507 | return DynamicWep; |
508 | } |
509 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaPsk) { |
510 | if (wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Wpa) && !wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Rsn)) { |
511 | return WpaPsk; |
512 | } |
513 | return Wpa2Psk; |
514 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaEap) { |
515 | if (wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Wpa) && !wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Rsn)) { |
516 | return WpaEap; |
517 | } |
518 | return Wpa2Eap; |
519 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::SAE) { |
520 | return SAE; |
521 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaEapSuiteB192) { |
522 | return Wpa3SuiteB192; |
523 | } |
524 | |
525 | return NoneSecurity; |
526 | } |
527 | |
528 | QList<QPair<int, int>> NetworkManager::getBFreqs() |
529 | { |
530 | QList<QPair<int, int>> freqs; |
531 | |
532 | freqs.append(t: QPair<int, int>(1, 2412)); |
533 | freqs.append(t: QPair<int, int>(2, 2417)); |
534 | freqs.append(t: QPair<int, int>(3, 2422)); |
535 | freqs.append(t: QPair<int, int>(4, 2427)); |
536 | freqs.append(t: QPair<int, int>(5, 2432)); |
537 | freqs.append(t: QPair<int, int>(6, 2437)); |
538 | freqs.append(t: QPair<int, int>(7, 2442)); |
539 | freqs.append(t: QPair<int, int>(8, 2447)); |
540 | freqs.append(t: QPair<int, int>(9, 2452)); |
541 | freqs.append(t: QPair<int, int>(10, 2457)); |
542 | freqs.append(t: QPair<int, int>(11, 2462)); |
543 | freqs.append(t: QPair<int, int>(12, 2467)); |
544 | freqs.append(t: QPair<int, int>(13, 2472)); |
545 | freqs.append(t: QPair<int, int>(14, 2484)); |
546 | |
547 | return freqs; |
548 | } |
549 | |
550 | QList<QPair<int, int>> NetworkManager::getAFreqs() |
551 | { |
552 | QList<QPair<int, int>> freqs; |
553 | |
554 | freqs.append(t: QPair<int, int>(7, 5035)); |
555 | freqs.append(t: QPair<int, int>(8, 5040)); |
556 | freqs.append(t: QPair<int, int>(9, 5045)); |
557 | freqs.append(t: QPair<int, int>(11, 5055)); |
558 | freqs.append(t: QPair<int, int>(12, 5060)); |
559 | freqs.append(t: QPair<int, int>(16, 5080)); |
560 | freqs.append(t: QPair<int, int>(34, 5170)); |
561 | freqs.append(t: QPair<int, int>(36, 5180)); |
562 | freqs.append(t: QPair<int, int>(38, 5190)); |
563 | freqs.append(t: QPair<int, int>(40, 5200)); |
564 | freqs.append(t: QPair<int, int>(42, 5210)); |
565 | freqs.append(t: QPair<int, int>(44, 5220)); |
566 | freqs.append(t: QPair<int, int>(46, 5230)); |
567 | freqs.append(t: QPair<int, int>(48, 5240)); |
568 | freqs.append(t: QPair<int, int>(52, 5260)); |
569 | freqs.append(t: QPair<int, int>(56, 5280)); |
570 | freqs.append(t: QPair<int, int>(60, 5300)); |
571 | freqs.append(t: QPair<int, int>(64, 5320)); |
572 | freqs.append(t: QPair<int, int>(100, 5500)); |
573 | freqs.append(t: QPair<int, int>(104, 5520)); |
574 | freqs.append(t: QPair<int, int>(108, 5540)); |
575 | freqs.append(t: QPair<int, int>(112, 5560)); |
576 | freqs.append(t: QPair<int, int>(116, 5580)); |
577 | freqs.append(t: QPair<int, int>(120, 5600)); |
578 | freqs.append(t: QPair<int, int>(124, 5620)); |
579 | freqs.append(t: QPair<int, int>(128, 5640)); |
580 | freqs.append(t: QPair<int, int>(132, 5660)); |
581 | freqs.append(t: QPair<int, int>(136, 5680)); |
582 | freqs.append(t: QPair<int, int>(140, 5700)); |
583 | freqs.append(t: QPair<int, int>(149, 5745)); |
584 | freqs.append(t: QPair<int, int>(153, 5765)); |
585 | freqs.append(t: QPair<int, int>(157, 5785)); |
586 | freqs.append(t: QPair<int, int>(161, 5805)); |
587 | freqs.append(t: QPair<int, int>(165, 5825)); |
588 | freqs.append(t: QPair<int, int>(183, 4915)); |
589 | freqs.append(t: QPair<int, int>(184, 4920)); |
590 | freqs.append(t: QPair<int, int>(185, 4925)); |
591 | freqs.append(t: QPair<int, int>(187, 4935)); |
592 | freqs.append(t: QPair<int, int>(188, 4940)); |
593 | freqs.append(t: QPair<int, int>(189, 4945)); |
594 | freqs.append(t: QPair<int, int>(192, 4960)); |
595 | freqs.append(t: QPair<int, int>(196, 4980)); |
596 | |
597 | return freqs; |
598 | } |
599 | |
600 | QDateTime NetworkManager::clockBootTimeToDateTime(qlonglong clockBootime) |
601 | { |
602 | clockid_t clk_id = CLOCK_BOOTTIME; |
603 | struct timespec tp; |
604 | int r; |
605 | |
606 | // now is used as a point of reference |
607 | // with the timespec that contains the number of msec since boot |
608 | QDateTime now = QDateTime::currentDateTime(); |
609 | r = clock_gettime(clock_id: clk_id, tp: &tp); |
610 | if (r == -1 && errno == EINVAL) { |
611 | clk_id = CLOCK_MONOTONIC; |
612 | r = clock_gettime(clock_id: clk_id, tp: &tp); |
613 | } |
614 | |
615 | // convert to msecs |
616 | long now_msecs = tp.tv_sec * 1000 + tp.tv_nsec / 1000000; |
617 | |
618 | // diff the msecs and construct a QDateTime based on the offset |
619 | QDateTime res; |
620 | if (clockBootime > now_msecs) { |
621 | qlonglong offset = clockBootime - now_msecs; |
622 | res = QDateTime::fromMSecsSinceEpoch(msecs: now.toMSecsSinceEpoch() + offset); |
623 | } else { |
624 | qlonglong offset = now_msecs - clockBootime; |
625 | res = QDateTime::fromMSecsSinceEpoch(msecs: now.toMSecsSinceEpoch() - offset); |
626 | } |
627 | |
628 | return res; |
629 | } |
630 | |