2013-06-06 04:57:06 +01:00
|
|
|
/**
|
|
|
|
* Copyright 2013 Albert Vaca <albertvaka@gmail.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation; either version 2 of
|
|
|
|
* the License or (at your option) version 3 or any later version
|
|
|
|
* accepted by the membership of KDE e.V. (or its successor approved
|
|
|
|
* by the membership of KDE e.V.), which shall act as a proxy
|
|
|
|
* defined in Section 14 of version 3 of the license.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "networkpackage.h"
|
2013-08-31 12:04:00 +01:00
|
|
|
|
|
|
|
#include <KSharedConfig>
|
|
|
|
#include <KConfigGroup>
|
2013-09-09 17:30:44 +01:00
|
|
|
|
2013-08-31 12:04:00 +01:00
|
|
|
#include <QByteArray>
|
|
|
|
#include <QDataStream>
|
2013-07-23 15:11:54 +01:00
|
|
|
#include <QHostInfo>
|
2013-08-31 12:04:00 +01:00
|
|
|
#include <QSslKey>
|
|
|
|
#include <QDateTime>
|
2013-09-08 18:06:13 +01:00
|
|
|
#include <QtCrypto>
|
2013-08-31 12:04:00 +01:00
|
|
|
|
2013-07-04 00:09:49 +01:00
|
|
|
#include <qjson/serializer.h>
|
|
|
|
#include <qjson/qobjecthelper.h>
|
2013-06-06 04:57:06 +01:00
|
|
|
|
2013-09-03 01:13:13 +01:00
|
|
|
const QCA::EncryptionAlgorithm NetworkPackage::EncryptionAlgorithm = QCA::EME_PKCS1v15;
|
2013-09-09 17:30:44 +01:00
|
|
|
const int NetworkPackage::ProtocolVersion = 4;
|
2013-09-03 01:13:13 +01:00
|
|
|
|
2013-08-07 12:40:39 +01:00
|
|
|
NetworkPackage::NetworkPackage(const QString& type)
|
2013-07-04 00:09:49 +01:00
|
|
|
{
|
2013-09-01 21:13:03 +01:00
|
|
|
mId = QString::number(QDateTime::currentMSecsSinceEpoch());
|
2013-07-04 00:09:49 +01:00
|
|
|
mType = type;
|
2013-09-01 21:13:03 +01:00
|
|
|
mBody = QVariantMap();
|
2013-09-09 17:30:44 +01:00
|
|
|
mPayload = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void NetworkPackage::createIdentityPackage(NetworkPackage* np)
|
|
|
|
{
|
|
|
|
KSharedConfigPtr config = KSharedConfig::openConfig("kdeconnectrc");
|
|
|
|
QString id = config->group("myself").readEntry<QString>("id","");
|
|
|
|
np->mId = QString::number(QDateTime::currentMSecsSinceEpoch());
|
|
|
|
np->mType = PACKAGE_TYPE_IDENTITY;
|
|
|
|
np->mPayload = 0;
|
|
|
|
np->set("deviceId", id);
|
|
|
|
np->set("deviceName", QHostInfo::localHostName());
|
|
|
|
np->set("protocolVersion", NetworkPackage::ProtocolVersion);
|
|
|
|
|
|
|
|
//qDebug() << "createIdentityPackage" << np->serialize();
|
2013-07-03 02:52:44 +01:00
|
|
|
}
|
|
|
|
|
2013-07-04 00:09:49 +01:00
|
|
|
QByteArray NetworkPackage::serialize() const
|
2013-06-06 04:57:06 +01:00
|
|
|
{
|
2013-07-04 00:09:49 +01:00
|
|
|
//Object -> QVariant
|
|
|
|
//QVariantMap variant;
|
|
|
|
//variant["id"] = mId;
|
|
|
|
//variant["type"] = mType;
|
|
|
|
//variant["body"] = mBody;
|
|
|
|
QVariantMap variant = QJson::QObjectHelper::qobject2qvariant(this);
|
|
|
|
|
2013-09-09 17:30:44 +01:00
|
|
|
if (hasPayload()) {
|
2013-09-09 21:50:27 +01:00
|
|
|
//qDebug() << "Serializing payloadTransferInfo";
|
2013-09-09 17:30:44 +01:00
|
|
|
variant["payloadTransferInfo"] = mPayloadTransferInfo;
|
|
|
|
}
|
|
|
|
|
2013-07-04 00:09:49 +01:00
|
|
|
//QVariant -> json
|
|
|
|
bool ok;
|
|
|
|
QJson::Serializer serializer;
|
|
|
|
QByteArray json = serializer.serialize(variant,&ok);
|
2013-07-24 22:51:06 +01:00
|
|
|
if (!ok) {
|
|
|
|
qDebug() << "Serialization error:" << serializer.errorMessage();
|
|
|
|
} else {
|
2013-09-16 14:21:22 +01:00
|
|
|
if (!isEncrypted()) {
|
|
|
|
qDebug() << "Serialized package:" << json;
|
|
|
|
}
|
2013-07-24 22:51:06 +01:00
|
|
|
json.append('\n');
|
|
|
|
}
|
2013-07-04 00:09:49 +01:00
|
|
|
|
|
|
|
return json;
|
2013-06-06 04:57:06 +01:00
|
|
|
}
|
|
|
|
|
2013-09-02 12:26:26 +01:00
|
|
|
bool NetworkPackage::unserialize(const QByteArray& a, NetworkPackage* np)
|
2013-06-17 11:23:08 +01:00
|
|
|
{
|
2013-07-04 00:09:49 +01:00
|
|
|
//Json -> QVariant
|
|
|
|
QJson::Parser parser;
|
2013-07-04 02:34:35 +01:00
|
|
|
bool ok;
|
|
|
|
QVariantMap variant = parser.parse(a, &ok).toMap();
|
|
|
|
if (!ok) {
|
2013-09-16 14:21:22 +01:00
|
|
|
qDebug() << "Unserialization error:" << a;
|
2013-09-03 15:01:28 +01:00
|
|
|
return false;
|
2013-07-04 02:34:35 +01:00
|
|
|
}
|
2013-07-04 00:09:49 +01:00
|
|
|
|
|
|
|
//QVariant -> Object
|
2013-09-09 17:28:52 +01:00
|
|
|
QJson::QObjectHelper::qvariant2qobject(variant, np);
|
|
|
|
|
|
|
|
if (!np->isEncrypted()) {
|
2013-09-16 14:40:00 +01:00
|
|
|
//qDebug() << "Unserialized package:" << a;
|
2013-09-09 17:28:52 +01:00
|
|
|
}
|
2013-07-23 19:22:38 +01:00
|
|
|
|
2013-09-09 17:30:44 +01:00
|
|
|
if (variant.contains("payloadTransferInfo")) {
|
2013-09-09 17:28:52 +01:00
|
|
|
//qDebug() << "Unserializing payloadTransferInfo";
|
2013-09-09 17:30:44 +01:00
|
|
|
np->mPayloadTransferInfo = variant["payloadTransferInfo"].toMap();
|
|
|
|
}
|
|
|
|
|
2013-09-03 15:01:28 +01:00
|
|
|
return true;
|
2013-07-23 19:22:38 +01:00
|
|
|
|
2013-06-17 11:23:08 +01:00
|
|
|
}
|
|
|
|
|
2013-09-09 21:50:27 +01:00
|
|
|
void NetworkPackage::encrypt(QCA::PublicKey& key)
|
2013-09-01 21:13:03 +01:00
|
|
|
{
|
2013-09-02 02:17:23 +01:00
|
|
|
|
2013-09-09 21:50:27 +01:00
|
|
|
//TODO: Implement payload encryption somehow (create an intermediate iodevice to encrypt the payload here?)
|
2013-09-01 21:13:03 +01:00
|
|
|
QByteArray serialized = serialize();
|
2013-09-02 02:17:23 +01:00
|
|
|
|
2013-09-02 12:26:26 +01:00
|
|
|
int chunkSize = key.maximumEncryptSize(NetworkPackage::EncryptionAlgorithm);
|
2013-09-02 02:17:23 +01:00
|
|
|
|
|
|
|
QStringList chunks;
|
|
|
|
while (!serialized.isEmpty()) {
|
|
|
|
QByteArray chunk = serialized.left(chunkSize);
|
|
|
|
serialized = serialized.mid(chunkSize);
|
2013-09-02 12:26:26 +01:00
|
|
|
QByteArray encryptedChunk = key.encrypt(chunk, NetworkPackage::EncryptionAlgorithm).toByteArray();
|
2013-09-02 02:17:23 +01:00
|
|
|
chunks.append( encryptedChunk.toBase64() );
|
|
|
|
}
|
|
|
|
|
2013-09-08 18:06:13 +01:00
|
|
|
//qDebug() << chunks.size() << "chunks";
|
2013-09-01 21:13:03 +01:00
|
|
|
|
|
|
|
mId = QString::number(QDateTime::currentMSecsSinceEpoch());
|
2013-09-02 12:26:26 +01:00
|
|
|
mType = PACKAGE_TYPE_ENCRYPTED;
|
2013-09-01 21:13:03 +01:00
|
|
|
mBody = QVariantMap();
|
2013-09-02 02:17:23 +01:00
|
|
|
mBody["data"] = chunks;
|
2013-09-01 21:13:03 +01:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-09-09 21:50:27 +01:00
|
|
|
bool NetworkPackage::decrypt(QCA::PrivateKey& key, NetworkPackage* out) const
|
2013-09-01 21:13:03 +01:00
|
|
|
{
|
2013-09-09 21:50:27 +01:00
|
|
|
|
2013-09-02 02:17:23 +01:00
|
|
|
const QStringList& chunks = mBody["data"].toStringList();
|
|
|
|
|
|
|
|
QByteArray decryptedJson;
|
|
|
|
Q_FOREACH(const QString& chunk, chunks) {
|
|
|
|
QByteArray encryptedChunk = QByteArray::fromBase64(chunk.toAscii());
|
|
|
|
QCA::SecureArray decryptedChunk;
|
2013-09-02 12:26:26 +01:00
|
|
|
bool success = key.decrypt(encryptedChunk, &decryptedChunk, NetworkPackage::EncryptionAlgorithm);
|
2013-09-03 01:14:27 +01:00
|
|
|
if (!success) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-09-02 02:17:23 +01:00
|
|
|
decryptedJson.append(decryptedChunk.toByteArray());
|
2013-09-09 21:50:27 +01:00
|
|
|
}
|
2013-09-01 21:13:03 +01:00
|
|
|
|
2013-09-09 21:50:27 +01:00
|
|
|
//TODO: Implement payload encryption somehow (create an intermediate iodevice to decrypt the payload here?)
|
|
|
|
if (hasPayload()) {
|
|
|
|
out->setPayload(mPayload);
|
2013-09-02 02:17:23 +01:00
|
|
|
}
|
2013-09-01 21:13:03 +01:00
|
|
|
|
2013-09-02 12:26:26 +01:00
|
|
|
return unserialize(decryptedJson, out);
|
|
|
|
|
2013-09-01 21:13:03 +01:00
|
|
|
}
|
|
|
|
|