| 1 | /* |
| 2 | SPDX-FileCopyrightText: 2009 Will Stephenson <wstephenson@kde.org> |
| 3 | SPDX-FileCopyrightText: 2012-2013 Jan Grulich <jgrulich@redhat.com> |
| 4 | |
| 5 | SPDX-License-Identifier: LGPL-2.1-only OR LGPL-3.0-only OR LicenseRef-KDE-Accepted-LGPL |
| 6 | */ |
| 7 | |
| 8 | #include <QRegularExpression> |
| 9 | |
| 10 | #include "time.h" |
| 11 | #include "utils.h" |
| 12 | |
| 13 | QHostAddress NetworkManager::ipv6AddressAsHostAddress(const QByteArray &address) |
| 14 | { |
| 15 | // Q_ASSERT(address.size() == 16); |
| 16 | Q_IPV6ADDR tmp; |
| 17 | for (int i = 0; i < 16; ++i) { |
| 18 | tmp[i] = address[i]; |
| 19 | } |
| 20 | QHostAddress hostaddress(tmp); |
| 21 | Q_ASSERT(hostaddress.protocol() == QAbstractSocket::IPv6Protocol); |
| 22 | |
| 23 | return hostaddress; |
| 24 | } |
| 25 | |
| 26 | QByteArray NetworkManager::ipv6AddressFromHostAddress(const QHostAddress &address) |
| 27 | { |
| 28 | // Q_ASSERT(address.protocol() == QAbstractSocket::IPv6Protocol); |
| 29 | Q_IPV6ADDR tmp = address.toIPv6Address(); |
| 30 | QByteArray assembledAddress; |
| 31 | assembledAddress.reserve(asize: 16); |
| 32 | for (int i = 0; i < 16; ++i) { |
| 33 | assembledAddress.push_back(c: tmp[i]); |
| 34 | } |
| 35 | |
| 36 | return assembledAddress; |
| 37 | } |
| 38 | |
| 39 | QString NetworkManager::macAddressAsString(const QByteArray &ba) |
| 40 | { |
| 41 | QStringList mac; |
| 42 | |
| 43 | for (int i = 0; i < ba.size(); ++i) { |
| 44 | mac << QString("%1" ).arg(a: (quint8)ba[i], fieldWidth: 2, base: 16, fillChar: QLatin1Char('0')).toUpper(); |
| 45 | } |
| 46 | |
| 47 | return mac.join(sep: ":" ); |
| 48 | } |
| 49 | |
| 50 | QByteArray NetworkManager::macAddressFromString(const QString &s) |
| 51 | { |
| 52 | const QStringList macStringList = s.split(sep: ':'); |
| 53 | // Q_ASSERT(macStringList.size() == 6); |
| 54 | QByteArray ba; |
| 55 | if (!s.isEmpty()) { |
| 56 | ba.resize(size: 6); |
| 57 | int i = 0; |
| 58 | |
| 59 | for (const QString &macPart : macStringList) { |
| 60 | ba[i++] = macPart.toUInt(ok: nullptr, base: 16); |
| 61 | } |
| 62 | } |
| 63 | return ba; |
| 64 | } |
| 65 | |
| 66 | bool NetworkManager::macAddressIsValid(const QString &macAddress) |
| 67 | { |
| 68 | const static QRegularExpression macAddressCheck(QStringLiteral("([a-fA-F0-9][a-fA-F0-9]:){5}[0-9a-fA-F][0-9a-fA-F]" )); |
| 69 | return macAddressCheck.match(subject: macAddress).hasMatch(); |
| 70 | } |
| 71 | |
| 72 | bool NetworkManager::macAddressIsValid(const QByteArray &macAddress) |
| 73 | { |
| 74 | return macAddressIsValid(macAddress: macAddressAsString(ba: macAddress)); |
| 75 | } |
| 76 | |
| 77 | int NetworkManager::findChannel(int freq) |
| 78 | { |
| 79 | int channel; |
| 80 | if (freq < 2500) { |
| 81 | channel = 0; |
| 82 | int i = 0; |
| 83 | QList<QPair<int, int>> bFreqs = getBFreqs(); |
| 84 | while (i < bFreqs.size()) { |
| 85 | if (bFreqs.at(i).second <= freq) { |
| 86 | channel = bFreqs.at(i).first; |
| 87 | } else { |
| 88 | break; |
| 89 | } |
| 90 | i++; |
| 91 | } |
| 92 | return channel; |
| 93 | } |
| 94 | channel = 0; |
| 95 | int i = 0; |
| 96 | QList<QPair<int, int>> aFreqs = getAFreqs(); |
| 97 | while (i < aFreqs.size()) { |
| 98 | if (aFreqs.at(i).second <= freq) { |
| 99 | channel = aFreqs.at(i).first; |
| 100 | if (aFreqs.at(i).second == freq) { |
| 101 | break; |
| 102 | } |
| 103 | } else { |
| 104 | break; |
| 105 | } |
| 106 | i++; |
| 107 | } |
| 108 | |
| 109 | return channel; |
| 110 | } |
| 111 | |
| 112 | NetworkManager::WirelessSetting::FrequencyBand NetworkManager::findFrequencyBand(int freq) |
| 113 | { |
| 114 | if (freq < 2500) { |
| 115 | return WirelessSetting::Bg; |
| 116 | } |
| 117 | |
| 118 | return WirelessSetting::A; |
| 119 | } |
| 120 | |
| 121 | bool NetworkManager::deviceSupportsApCiphers(NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
| 122 | NetworkManager::AccessPoint::WpaFlags apCiphers, |
| 123 | WirelessSecurityType type) |
| 124 | { |
| 125 | bool havePair = false; |
| 126 | bool haveGroup = false; |
| 127 | |
| 128 | if (type == NetworkManager::StaticWep) { |
| 129 | havePair = true; |
| 130 | } else { |
| 131 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairWep40)) { |
| 132 | havePair = true; |
| 133 | } |
| 134 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairWep104)) { |
| 135 | havePair = true; |
| 136 | } |
| 137 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairTkip)) { |
| 138 | havePair = true; |
| 139 | } |
| 140 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::PairCcmp)) { |
| 141 | havePair = true; |
| 142 | } |
| 143 | } |
| 144 | |
| 145 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupWep40)) { |
| 146 | haveGroup = true; |
| 147 | } |
| 148 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupWep104)) { |
| 149 | haveGroup = true; |
| 150 | } |
| 151 | if (type != StaticWep) { |
| 152 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupTkip)) { |
| 153 | haveGroup = true; |
| 154 | } |
| 155 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp) && apCiphers.testFlag(flag: NetworkManager::AccessPoint::GroupCcmp)) { |
| 156 | haveGroup = true; |
| 157 | } |
| 158 | } |
| 159 | |
| 160 | return (havePair && haveGroup); |
| 161 | } |
| 162 | |
| 163 | // Keep this in sync with NetworkManager/libnm-core/nm-utils.c:nm_utils_security_valid() |
| 164 | bool NetworkManager::securityIsValid(WirelessSecurityType type, |
| 165 | NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
| 166 | bool haveAp, |
| 167 | bool adhoc, |
| 168 | NetworkManager::AccessPoint::Capabilities apCaps, |
| 169 | NetworkManager::AccessPoint::WpaFlags apWpa, |
| 170 | NetworkManager::AccessPoint::WpaFlags apRsn) |
| 171 | { |
| 172 | bool good = true; |
| 173 | |
| 174 | // kDebug() << "type(" << type << ") interfaceCaps(" << interfaceCaps << ") haveAp(" << haveAp << ") adhoc(" << adhoc << ") apCaps(" << apCaps << ") apWpa(" |
| 175 | // << apWpa << " apRsn(" << apRsn << ")"; |
| 176 | |
| 177 | if (!haveAp) { |
| 178 | if (type == NoneSecurity) { |
| 179 | return true; |
| 180 | } |
| 181 | if ((type == StaticWep) // |
| 182 | || ((type == DynamicWep) && !adhoc) // |
| 183 | || ((type == Leap) && !adhoc)) { |
| 184 | if (interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep40) || interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wep104)) { |
| 185 | return true; |
| 186 | } else { |
| 187 | return false; |
| 188 | } |
| 189 | } |
| 190 | |
| 191 | // apCaps.testFlag(Privacy) == true for StaticWep, Leap and DynamicWep |
| 192 | // see libs/internals/wirelessinterfaceconnectionhelpers.cpp |
| 193 | |
| 194 | // TODO: this is not in nm-utils.c |
| 195 | // if (type == Knm::WirelessSecurity::WpaPsk |
| 196 | // || ((type == Knm::WirelessSecurity::WpaEap) && !adhoc)) { |
| 197 | // if (interfaceCaps.testFlag(NetworkManager::WirelessDevice::Wpa) && |
| 198 | // !apCaps.testFlag(NetworkManager::AccessPoint::Privacy)) { |
| 199 | // return true; |
| 200 | // } |
| 201 | // } |
| 202 | // if (type == Knm::WirelessSecurity::Wpa2Psk |
| 203 | // || ((type == Knm::WirelessSecurity::Wpa2Eap) && !adhoc)) { |
| 204 | // if (interfaceCaps.testFlag(NetworkManager::WirelessDevice::Rsn) && |
| 205 | // !apCaps.testFlag(NetworkManager::AccessPoint::Privacy)) { |
| 206 | // return true; |
| 207 | // } |
| 208 | // } |
| 209 | } |
| 210 | |
| 211 | switch (type) { |
| 212 | case NoneSecurity: |
| 213 | Q_ASSERT(haveAp); |
| 214 | if (apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy)) { |
| 215 | return false; |
| 216 | } |
| 217 | if (apWpa || apRsn) { |
| 218 | return false; |
| 219 | } |
| 220 | break; |
| 221 | case Leap: /* require PRIVACY bit for LEAP? */ |
| 222 | if (adhoc) { |
| 223 | return false; |
| 224 | } |
| 225 | /* Fall through */ |
| 226 | case StaticWep: |
| 227 | Q_ASSERT(haveAp); |
| 228 | if (!apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy)) { |
| 229 | return false; |
| 230 | } |
| 231 | if (apWpa || apRsn) { |
| 232 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: StaticWep)) { |
| 233 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apRsn, type: StaticWep)) { |
| 234 | return false; |
| 235 | } |
| 236 | } |
| 237 | } |
| 238 | break; |
| 239 | case DynamicWep: |
| 240 | if (adhoc) { |
| 241 | return false; |
| 242 | } |
| 243 | Q_ASSERT(haveAp); |
| 244 | if (apRsn || !(apCaps.testFlag(flag: NetworkManager::AccessPoint::Privacy))) { |
| 245 | return false; |
| 246 | } |
| 247 | /* Some APs broadcast minimal WPA-enabled beacons that must be handled */ |
| 248 | if (apWpa) { |
| 249 | if (!apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
| 250 | return false; |
| 251 | } |
| 252 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: DynamicWep)) { |
| 253 | return false; |
| 254 | } |
| 255 | } |
| 256 | break; |
| 257 | case WpaPsk: |
| 258 | if (adhoc) { |
| 259 | return false; |
| 260 | } |
| 261 | |
| 262 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wpa)) { |
| 263 | return false; |
| 264 | } |
| 265 | if (haveAp) { |
| 266 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtPsk)) { |
| 267 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
| 268 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
| 269 | return true; |
| 270 | } |
| 271 | if (apWpa.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
| 272 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
| 273 | return true; |
| 274 | } |
| 275 | } |
| 276 | return false; |
| 277 | } |
| 278 | break; |
| 279 | case Wpa2Psk: |
| 280 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
| 281 | return false; |
| 282 | } |
| 283 | if (haveAp) { |
| 284 | if (adhoc) { |
| 285 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::IBSSRsn)) { |
| 286 | return false; |
| 287 | } |
| 288 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
| 289 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
| 290 | return true; |
| 291 | } |
| 292 | } else { |
| 293 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtPsk)) { |
| 294 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
| 295 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
| 296 | return true; |
| 297 | } |
| 298 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
| 299 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
| 300 | return true; |
| 301 | } |
| 302 | } |
| 303 | } |
| 304 | return false; |
| 305 | } |
| 306 | break; |
| 307 | case WpaEap: |
| 308 | if (adhoc) { |
| 309 | return false; |
| 310 | } |
| 311 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Wpa)) { |
| 312 | return false; |
| 313 | } |
| 314 | if (haveAp) { |
| 315 | if (!apWpa.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
| 316 | return false; |
| 317 | } |
| 318 | /* Ensure at least one WPA cipher is supported */ |
| 319 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apWpa, type: WpaEap)) { |
| 320 | return false; |
| 321 | } |
| 322 | } |
| 323 | break; |
| 324 | case Wpa2Eap: |
| 325 | if (adhoc) { |
| 326 | return false; |
| 327 | } |
| 328 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
| 329 | return false; |
| 330 | } |
| 331 | if (haveAp) { |
| 332 | if (!apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmt8021x)) { |
| 333 | return false; |
| 334 | } |
| 335 | /* Ensure at least one WPA cipher is supported */ |
| 336 | if (!deviceSupportsApCiphers(interfaceCaps, apCiphers: apRsn, type: Wpa2Eap)) { |
| 337 | return false; |
| 338 | } |
| 339 | } |
| 340 | break; |
| 341 | case SAE: |
| 342 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
| 343 | return false; |
| 344 | } |
| 345 | if (haveAp) { |
| 346 | if (adhoc) { |
| 347 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::IBSSRsn)) { |
| 348 | return false; |
| 349 | } |
| 350 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
| 351 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
| 352 | return true; |
| 353 | } |
| 354 | } else { |
| 355 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtSAE)) { |
| 356 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairTkip) // |
| 357 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Tkip)) { |
| 358 | return true; |
| 359 | } |
| 360 | if (apRsn.testFlag(flag: NetworkManager::AccessPoint::PairCcmp) // |
| 361 | && interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Ccmp)) { |
| 362 | return true; |
| 363 | } |
| 364 | } |
| 365 | } |
| 366 | return false; |
| 367 | } |
| 368 | break; |
| 369 | case OWE: |
| 370 | if (adhoc) { |
| 371 | return false; |
| 372 | } |
| 373 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
| 374 | return false; |
| 375 | } |
| 376 | if (haveAp) { |
| 377 | if (!apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtOWE) // |
| 378 | && !apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtOWETM)) { |
| 379 | return false; |
| 380 | } |
| 381 | } |
| 382 | break; |
| 383 | case Wpa3SuiteB192: |
| 384 | if (adhoc) { |
| 385 | return false; |
| 386 | } |
| 387 | if (!interfaceCaps.testFlag(flag: NetworkManager::WirelessDevice::Rsn)) { |
| 388 | return false; |
| 389 | } |
| 390 | if (haveAp && !apRsn.testFlag(flag: NetworkManager::AccessPoint::KeyMgmtEapSuiteB192)) { |
| 391 | return false; |
| 392 | } |
| 393 | break; |
| 394 | default: |
| 395 | good = false; |
| 396 | break; |
| 397 | } |
| 398 | |
| 399 | return good; |
| 400 | } |
| 401 | |
| 402 | NetworkManager::WirelessSecurityType NetworkManager::findBestWirelessSecurity(NetworkManager::WirelessDevice::Capabilities interfaceCaps, |
| 403 | bool haveAp, |
| 404 | bool adHoc, |
| 405 | NetworkManager::AccessPoint::Capabilities apCaps, |
| 406 | NetworkManager::AccessPoint::WpaFlags apWpa, |
| 407 | NetworkManager::AccessPoint::WpaFlags apRsn) |
| 408 | { |
| 409 | // The ordering of this list is a pragmatic combination of security level and popularity. |
| 410 | // Therefore static WEP is before LEAP and Dynamic WEP because there is no way to detect |
| 411 | // if an AP is capable of Dynamic WEP and showing Dynamic WEP first would confuse |
| 412 | // Static WEP users. |
| 413 | const QList<NetworkManager::WirelessSecurityType> types = {NetworkManager::Wpa3SuiteB192, |
| 414 | NetworkManager::SAE, |
| 415 | NetworkManager::Wpa2Eap, |
| 416 | NetworkManager::Wpa2Psk, |
| 417 | NetworkManager::WpaEap, |
| 418 | NetworkManager::WpaPsk, |
| 419 | NetworkManager::StaticWep, |
| 420 | NetworkManager::DynamicWep, |
| 421 | NetworkManager::Leap, |
| 422 | NetworkManager::OWE, |
| 423 | NetworkManager::NoneSecurity}; |
| 424 | |
| 425 | for (NetworkManager::WirelessSecurityType type : types) { |
| 426 | if (NetworkManager::securityIsValid(type, interfaceCaps, haveAp, adhoc: adHoc, apCaps, apWpa, apRsn)) { |
| 427 | return type; |
| 428 | } |
| 429 | } |
| 430 | return NetworkManager::UnknownSecurity; |
| 431 | } |
| 432 | |
| 433 | bool NetworkManager::wepKeyIsValid(const QString &key, NetworkManager::WirelessSecuritySetting::WepKeyType type) |
| 434 | { |
| 435 | if (key.isEmpty()) { |
| 436 | return false; |
| 437 | } |
| 438 | |
| 439 | const int keylen = key.length(); |
| 440 | |
| 441 | if (type != WirelessSecuritySetting::NotSpecified) { |
| 442 | if (type == WirelessSecuritySetting::Hex) { |
| 443 | if (keylen == 10 || keylen == 26) { |
| 444 | /* Hex key */ |
| 445 | for (int i = 0; i < keylen; ++i) { |
| 446 | if (!(key.at(i).isDigit() || (key.at(i) >= 'A' && key.at(i) <= 'F') || (key.at(i) >= 'a' && key.at(i) <= 'f'))) { |
| 447 | return false; |
| 448 | } |
| 449 | } |
| 450 | return true; |
| 451 | } else if (keylen == 5 || keylen == 13) { |
| 452 | /* ASCII KEY */ |
| 453 | for (int i = 0; i < keylen; ++i) { |
| 454 | if (!key.at(i).isPrint()) { |
| 455 | return false; |
| 456 | } |
| 457 | } |
| 458 | return true; |
| 459 | } |
| 460 | |
| 461 | return false; |
| 462 | } else if (type == WirelessSecuritySetting::Passphrase) { |
| 463 | if (!keylen || keylen > 64) { |
| 464 | return false; |
| 465 | } |
| 466 | |
| 467 | return true; |
| 468 | } |
| 469 | } |
| 470 | |
| 471 | return false; |
| 472 | } |
| 473 | |
| 474 | bool NetworkManager::wpaPskIsValid(const QString &psk) |
| 475 | { |
| 476 | if (psk.isEmpty()) { |
| 477 | return false; |
| 478 | } |
| 479 | |
| 480 | const int psklen = psk.length(); |
| 481 | |
| 482 | if (psklen < 8 || psklen > 64) { |
| 483 | return false; |
| 484 | } |
| 485 | |
| 486 | if (psklen == 64) { |
| 487 | /* Hex PSK */ |
| 488 | for (int i = 0; i < psklen; ++i) { |
| 489 | if (!psk.at(i).isLetterOrNumber()) { |
| 490 | return false; |
| 491 | } |
| 492 | } |
| 493 | } |
| 494 | |
| 495 | return true; |
| 496 | } |
| 497 | |
| 498 | NetworkManager::WirelessSecurityType NetworkManager::securityTypeFromConnectionSetting(const NetworkManager::ConnectionSettings::Ptr &settings) |
| 499 | { |
| 500 | NetworkManager::WirelessSecuritySetting::Ptr wifiSecuritySetting = settings->setting(Setting::WirelessSecurity).dynamicCast<WirelessSecuritySetting>(); |
| 501 | if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::Wep) { |
| 502 | return StaticWep; |
| 503 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::Ieee8021x) { |
| 504 | if (wifiSecuritySetting->authAlg() == WirelessSecuritySetting::Leap) { |
| 505 | return Leap; |
| 506 | } else { |
| 507 | return DynamicWep; |
| 508 | } |
| 509 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaPsk) { |
| 510 | if (wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Wpa) && !wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Rsn)) { |
| 511 | return WpaPsk; |
| 512 | } |
| 513 | return Wpa2Psk; |
| 514 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaEap) { |
| 515 | if (wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Wpa) && !wifiSecuritySetting->proto().contains(t: WirelessSecuritySetting::Rsn)) { |
| 516 | return WpaEap; |
| 517 | } |
| 518 | return Wpa2Eap; |
| 519 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::SAE) { |
| 520 | return SAE; |
| 521 | } else if (wifiSecuritySetting->keyMgmt() == WirelessSecuritySetting::WpaEapSuiteB192) { |
| 522 | return Wpa3SuiteB192; |
| 523 | } |
| 524 | |
| 525 | return NoneSecurity; |
| 526 | } |
| 527 | |
| 528 | QList<QPair<int, int>> NetworkManager::getBFreqs() |
| 529 | { |
| 530 | QList<QPair<int, int>> freqs; |
| 531 | |
| 532 | freqs.append(t: QPair<int, int>(1, 2412)); |
| 533 | freqs.append(t: QPair<int, int>(2, 2417)); |
| 534 | freqs.append(t: QPair<int, int>(3, 2422)); |
| 535 | freqs.append(t: QPair<int, int>(4, 2427)); |
| 536 | freqs.append(t: QPair<int, int>(5, 2432)); |
| 537 | freqs.append(t: QPair<int, int>(6, 2437)); |
| 538 | freqs.append(t: QPair<int, int>(7, 2442)); |
| 539 | freqs.append(t: QPair<int, int>(8, 2447)); |
| 540 | freqs.append(t: QPair<int, int>(9, 2452)); |
| 541 | freqs.append(t: QPair<int, int>(10, 2457)); |
| 542 | freqs.append(t: QPair<int, int>(11, 2462)); |
| 543 | freqs.append(t: QPair<int, int>(12, 2467)); |
| 544 | freqs.append(t: QPair<int, int>(13, 2472)); |
| 545 | freqs.append(t: QPair<int, int>(14, 2484)); |
| 546 | |
| 547 | return freqs; |
| 548 | } |
| 549 | |
| 550 | QList<QPair<int, int>> NetworkManager::getAFreqs() |
| 551 | { |
| 552 | QList<QPair<int, int>> freqs; |
| 553 | |
| 554 | freqs.append(t: QPair<int, int>(7, 5035)); |
| 555 | freqs.append(t: QPair<int, int>(8, 5040)); |
| 556 | freqs.append(t: QPair<int, int>(9, 5045)); |
| 557 | freqs.append(t: QPair<int, int>(11, 5055)); |
| 558 | freqs.append(t: QPair<int, int>(12, 5060)); |
| 559 | freqs.append(t: QPair<int, int>(16, 5080)); |
| 560 | freqs.append(t: QPair<int, int>(34, 5170)); |
| 561 | freqs.append(t: QPair<int, int>(36, 5180)); |
| 562 | freqs.append(t: QPair<int, int>(38, 5190)); |
| 563 | freqs.append(t: QPair<int, int>(40, 5200)); |
| 564 | freqs.append(t: QPair<int, int>(42, 5210)); |
| 565 | freqs.append(t: QPair<int, int>(44, 5220)); |
| 566 | freqs.append(t: QPair<int, int>(46, 5230)); |
| 567 | freqs.append(t: QPair<int, int>(48, 5240)); |
| 568 | freqs.append(t: QPair<int, int>(52, 5260)); |
| 569 | freqs.append(t: QPair<int, int>(56, 5280)); |
| 570 | freqs.append(t: QPair<int, int>(60, 5300)); |
| 571 | freqs.append(t: QPair<int, int>(64, 5320)); |
| 572 | freqs.append(t: QPair<int, int>(100, 5500)); |
| 573 | freqs.append(t: QPair<int, int>(104, 5520)); |
| 574 | freqs.append(t: QPair<int, int>(108, 5540)); |
| 575 | freqs.append(t: QPair<int, int>(112, 5560)); |
| 576 | freqs.append(t: QPair<int, int>(116, 5580)); |
| 577 | freqs.append(t: QPair<int, int>(120, 5600)); |
| 578 | freqs.append(t: QPair<int, int>(124, 5620)); |
| 579 | freqs.append(t: QPair<int, int>(128, 5640)); |
| 580 | freqs.append(t: QPair<int, int>(132, 5660)); |
| 581 | freqs.append(t: QPair<int, int>(136, 5680)); |
| 582 | freqs.append(t: QPair<int, int>(140, 5700)); |
| 583 | freqs.append(t: QPair<int, int>(149, 5745)); |
| 584 | freqs.append(t: QPair<int, int>(153, 5765)); |
| 585 | freqs.append(t: QPair<int, int>(157, 5785)); |
| 586 | freqs.append(t: QPair<int, int>(161, 5805)); |
| 587 | freqs.append(t: QPair<int, int>(165, 5825)); |
| 588 | freqs.append(t: QPair<int, int>(183, 4915)); |
| 589 | freqs.append(t: QPair<int, int>(184, 4920)); |
| 590 | freqs.append(t: QPair<int, int>(185, 4925)); |
| 591 | freqs.append(t: QPair<int, int>(187, 4935)); |
| 592 | freqs.append(t: QPair<int, int>(188, 4940)); |
| 593 | freqs.append(t: QPair<int, int>(189, 4945)); |
| 594 | freqs.append(t: QPair<int, int>(192, 4960)); |
| 595 | freqs.append(t: QPair<int, int>(196, 4980)); |
| 596 | |
| 597 | return freqs; |
| 598 | } |
| 599 | |
| 600 | QDateTime NetworkManager::clockBootTimeToDateTime(qlonglong clockBootime) |
| 601 | { |
| 602 | clockid_t clk_id = CLOCK_BOOTTIME; |
| 603 | struct timespec tp; |
| 604 | int r; |
| 605 | |
| 606 | // now is used as a point of reference |
| 607 | // with the timespec that contains the number of msec since boot |
| 608 | QDateTime now = QDateTime::currentDateTime(); |
| 609 | r = clock_gettime(clock_id: clk_id, tp: &tp); |
| 610 | if (r == -1 && errno == EINVAL) { |
| 611 | clk_id = CLOCK_MONOTONIC; |
| 612 | r = clock_gettime(clock_id: clk_id, tp: &tp); |
| 613 | } |
| 614 | |
| 615 | // convert to msecs |
| 616 | long now_msecs = tp.tv_sec * 1000 + tp.tv_nsec / 1000000; |
| 617 | |
| 618 | // diff the msecs and construct a QDateTime based on the offset |
| 619 | QDateTime res; |
| 620 | if (clockBootime > now_msecs) { |
| 621 | qlonglong offset = clockBootime - now_msecs; |
| 622 | res = QDateTime::fromMSecsSinceEpoch(msecs: now.toMSecsSinceEpoch() + offset); |
| 623 | } else { |
| 624 | qlonglong offset = now_msecs - clockBootime; |
| 625 | res = QDateTime::fromMSecsSinceEpoch(msecs: now.toMSecsSinceEpoch() - offset); |
| 626 | } |
| 627 | |
| 628 | return res; |
| 629 | } |
| 630 | |