kdeconnect-kde/core/backends/lan/lanlinkprovider.cpp

554 lines
21 KiB
C++
Raw Normal View History

2013-08-07 10:29:56 +01:00
/**
* Copyright 2013 Albert Vaca <albertvaka@gmail.com>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation; either version 2 of
* the License or (at your option) version 3 or any later version
* accepted by the membership of KDE e.V. (or its successor approved
* by the membership of KDE e.V.), which shall act as a proxy
* defined in Section 14 of version 3 of the license.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2013-08-28 22:47:39 +01:00
#include "lanlinkprovider.h"
#include "core_debug.h"
2013-08-07 10:29:56 +01:00
2015-09-10 14:51:38 +01:00
#ifndef Q_OS_WIN
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <netdb.h>
2015-09-10 14:51:38 +01:00
#endif
2013-08-07 10:29:56 +01:00
#include <QHostInfo>
#include <QTcpServer>
#include <QNetworkProxy>
2013-08-07 10:29:56 +01:00
#include <QUdpSocket>
#include <QNetworkSession>
#include <QNetworkConfigurationManager>
2016-07-05 13:27:53 +01:00
#include <QSslCipher>
#include <QSslConfiguration>
2013-08-07 10:29:56 +01:00
2016-07-05 13:27:53 +01:00
#include "daemon.h"
#include "landevicelink.h"
2015-12-01 18:45:14 +00:00
#include "lanpairinghandler.h"
2016-07-05 13:27:53 +01:00
#include "kdeconnectconfig.h"
#define MIN_VERSION_WITH_SSL_SUPPORT 6
LanLinkProvider::LanLinkProvider(bool testMode)
: mTestMode(testMode)
2013-08-07 10:29:56 +01:00
{
2015-04-04 18:05:55 +01:00
mTcpPort = 0;
2013-08-07 10:29:56 +01:00
combineBroadcastsTimer.setInterval(0); // increase this if waiting a single event-loop iteration is not enough
combineBroadcastsTimer.setSingleShot(true);
2016-11-26 14:12:38 +00:00
connect(&combineBroadcastsTimer, &QTimer::timeout, this, &LanLinkProvider::broadcastToNetwork);
2016-11-26 14:12:38 +00:00
connect(&mUdpSocket, &QIODevice::readyRead, this, &LanLinkProvider::newUdpConnection);
2013-08-07 10:29:56 +01:00
2015-07-05 14:23:53 +01:00
mServer = new Server(this);
mServer->setProxy(QNetworkProxy::NoProxy);
2016-11-26 14:12:38 +00:00
connect(mServer,&QTcpServer::newConnection,this, &LanLinkProvider::newConnection);
2013-08-07 10:29:56 +01:00
mUdpSocket.setProxy(QNetworkProxy::NoProxy);
//Detect when a network interface changes status, so we announce ourelves in the new network
QNetworkConfigurationManager* networkManager = new QNetworkConfigurationManager(this);
connect(networkManager, &QNetworkConfigurationManager::configurationChanged, this, &LanLinkProvider::onNetworkConfigurationChanged);
}
void LanLinkProvider::onNetworkConfigurationChanged(const QNetworkConfiguration &config)
{
if (m_lastConfig != config && config.state() == QNetworkConfiguration::Active) {
m_lastConfig = config;
onNetworkChange();
}
2013-08-07 10:29:56 +01:00
}
2015-04-04 18:05:55 +01:00
LanLinkProvider::~LanLinkProvider()
{
}
2013-08-28 22:47:39 +01:00
void LanLinkProvider::onStart()
2013-08-07 10:29:56 +01:00
{
const QHostAddress bindAddress = mTestMode? QHostAddress::LocalHost : QHostAddress::Any;
bool success = mUdpSocket.bind(bindAddress, PORT, QUdpSocket::ShareAddress);
Q_ASSERT(success);
2016-03-08 00:01:44 +00:00
qCDebug(KDECONNECT_CORE) << "onStart";
2015-12-02 19:04:35 +00:00
mTcpPort = PORT;
while (!mServer->listen(bindAddress, mTcpPort)) {
mTcpPort++;
if (mTcpPort > 1764) { //No ports available?
qCritical(KDECONNECT_CORE) << "Error opening a port in range 1714-1764";
mTcpPort = 0;
return;
}
}
2013-08-07 10:29:56 +01:00
onNetworkChange();
2013-08-07 10:29:56 +01:00
}
2013-08-28 22:47:39 +01:00
void LanLinkProvider::onStop()
2013-08-07 10:29:56 +01:00
{
2016-03-08 00:01:44 +00:00
qCDebug(KDECONNECT_CORE) << "onStop";
mUdpSocket.close();
2015-07-05 14:23:53 +01:00
mServer->close();
2013-08-07 10:29:56 +01:00
}
void LanLinkProvider::onNetworkChange()
{
if (combineBroadcastsTimer.isActive()) {
qCDebug(KDECONNECT_CORE()) << "Preventing duplicate broadcasts";
return;
}
combineBroadcastsTimer.start();
}
//I'm in a new network, let's be polite and introduce myself
void LanLinkProvider::broadcastToNetwork()
{
2015-07-05 14:23:53 +01:00
if (!mServer->isListening()) {
//Not started
return;
}
2015-04-04 18:05:55 +01:00
Q_ASSERT(mTcpPort != 0);
qCDebug(KDECONNECT_CORE()) << "Broadcasting identity packet";
2016-11-20 03:24:28 +00:00
QHostAddress destAddress = mTestMode? QHostAddress::LocalHost : QHostAddress(QStringLiteral("255.255.255.255"));
2016-11-20 03:24:28 +00:00
NetworkPackage np(QLatin1String(""));
2013-08-07 10:29:56 +01:00
NetworkPackage::createIdentityPackage(&np);
np.set(QStringLiteral("tcpPort"), mTcpPort);
2016-11-20 03:24:28 +00:00
#ifdef Q_OS_WIN
//On Windows we need to broadcast from every local IP address to reach all networks
QUdpSocket sendSocket;
sendSocket.setProxy(QNetworkProxy::NoProxy);
2016-11-20 03:24:28 +00:00
for (const QNetworkInterface &iface : QNetworkInterface::allInterfaces()) {
if ( (iface.flags() & QNetworkInterface::IsUp)
&& (iface.flags() & QNetworkInterface::IsRunning)
&& (iface.flags() & QNetworkInterface::CanBroadcast)) {
for (const QNetworkAddressEntry &ifaceAddress : iface.addressEntries()) {
QHostAddress sourceAddress = ifaceAddress.ip();
if (sourceAddress.protocol() == QAbstractSocket::IPv4Protocol && sourceAddress != QHostAddress::LocalHost) {
qCDebug(KDECONNECT_CORE()) << "Broadcasting as" << sourceAddress;
sendSocket.bind(sourceAddress, PORT);
sendSocket.writeDatagram(np.serialize(), destAddress, PORT);
sendSocket.close();
}
}
}
}
#else
mUdpSocket.writeDatagram(np.serialize(), destAddress, PORT);
#endif
2013-08-07 10:29:56 +01:00
}
//I'm the existing device, a new device is kindly introducing itself.
//I will create a TcpSocket and try to connect. This can result in either connected() or connectError().
void LanLinkProvider::newUdpConnection() //udpBroadcastReceived
2013-08-07 10:29:56 +01:00
{
while (mUdpSocket.hasPendingDatagrams()) {
2015-07-05 14:23:53 +01:00
2013-08-07 10:29:56 +01:00
QByteArray datagram;
datagram.resize(mUdpSocket.pendingDatagramSize());
2013-08-07 10:29:56 +01:00
QHostAddress sender;
mUdpSocket.readDatagram(datagram.data(), datagram.size(), &sender);
2013-08-07 10:29:56 +01:00
2015-12-06 00:19:55 +00:00
if (sender.isLoopback() && !mTestMode)
continue;
NetworkPackage* receivedPackage = new NetworkPackage(QLatin1String(""));
bool success = NetworkPackage::unserialize(datagram, receivedPackage);
2013-08-07 10:29:56 +01:00
2016-03-08 00:01:44 +00:00
//qCDebug(KDECONNECT_CORE) << "udp connection from " << receivedPackage->;
2015-12-02 19:04:35 +00:00
2016-05-31 19:09:52 +01:00
//qCDebug(KDECONNECT_CORE) << "Datagram " << datagram.data() ;
2015-07-05 14:23:53 +01:00
if (!success || receivedPackage->type() != PACKAGE_TYPE_IDENTITY) {
delete receivedPackage;
continue;
}
2013-08-07 12:40:39 +01:00
if (receivedPackage->get<QString>(QStringLiteral("deviceId")) == KdeConnectConfig::instance()->deviceId()) {
2015-03-22 06:12:04 +00:00
//qCDebug(KDECONNECT_CORE) << "Ignoring my own broadcast";
delete receivedPackage;
continue;
}
int tcpPort = receivedPackage->get<int>(QStringLiteral("tcpPort"), PORT);
2015-03-22 06:12:04 +00:00
//qCDebug(KDECONNECT_CORE) << "Received Udp identity package from" << sender << " asking for a tcp connection on port " << tcpPort;
2015-07-05 14:23:53 +01:00
QSslSocket* socket = new QSslSocket(this);
socket->setProxy(QNetworkProxy::NoProxy);
receivedIdentityPackages[socket].np = receivedPackage;
receivedIdentityPackages[socket].sender = sender;
2016-11-26 14:12:38 +00:00
connect(socket, &QAbstractSocket::connected, this, &LanLinkProvider::connected);
connect(socket, SIGNAL(error(QAbstractSocket::SocketError)), this, SLOT(connectError()));
socket->connectToHost(sender, tcpPort);
2013-08-07 12:40:39 +01:00
}
}
2013-08-07 10:29:56 +01:00
2013-08-28 22:47:39 +01:00
void LanLinkProvider::connectError()
2013-08-07 12:40:39 +01:00
{
2015-07-05 14:23:53 +01:00
QSslSocket* socket = qobject_cast<QSslSocket*>(sender());
if (!socket) return;
2016-11-26 14:12:38 +00:00
disconnect(socket, &QAbstractSocket::connected, this, &LanLinkProvider::connected);
disconnect(socket, SIGNAL(error(QAbstractSocket::SocketError)), this, SLOT(connectError()));
2013-08-07 10:29:56 +01:00
2015-09-09 19:12:16 +01:00
qCDebug(KDECONNECT_CORE) << "Fallback (1), try reverse connection (send udp packet)" << socket->errorString();
NetworkPackage np(QLatin1String(""));
NetworkPackage::createIdentityPackage(&np);
np.set(QStringLiteral("tcpPort"), mTcpPort);
mUdpSocket.writeDatagram(np.serialize(), receivedIdentityPackages[socket].sender, PORT);
2013-08-07 12:40:39 +01:00
//The socket we created didn't work, and we didn't manage
//to create a LanDeviceLink from it, deleting everything.
2015-07-14 13:04:04 +01:00
delete receivedIdentityPackages.take(socket).np;
delete socket;
2013-08-07 12:40:39 +01:00
}
2016-06-17 00:59:53 +01:00
//We received a UDP package and answered by connecting to them by TCP. This gets called on a succesful connection.
2013-08-28 22:47:39 +01:00
void LanLinkProvider::connected()
2013-08-07 12:40:39 +01:00
{
2015-07-05 14:23:53 +01:00
qCDebug(KDECONNECT_CORE) << "Socket connected";
2015-07-13 15:25:22 +01:00
2015-07-05 14:23:53 +01:00
QSslSocket* socket = qobject_cast<QSslSocket*>(sender());
if (!socket) return;
2016-11-26 14:12:38 +00:00
disconnect(socket, &QAbstractSocket::connected, this, &LanLinkProvider::connected);
2013-08-07 12:40:39 +01:00
disconnect(socket, SIGNAL(error(QAbstractSocket::SocketError)), this, SLOT(connectError()));
configureSocket(socket);
// If socket disconnects due to any reason after connection, link on ssl faliure
2016-11-26 14:12:38 +00:00
connect(socket, &QAbstractSocket::disconnected, socket, &QObject::deleteLater);
NetworkPackage* receivedPackage = receivedIdentityPackages[socket].np;
const QString& deviceId = receivedPackage->get<QString>(QStringLiteral("deviceId"));
//qCDebug(KDECONNECT_CORE) << "Connected" << socket->isWritable();
2013-08-07 12:40:39 +01:00
2015-07-05 14:23:53 +01:00
// If network is on ssl, do not believe when they are connected, believe when handshake is completed
NetworkPackage np2(QLatin1String(""));
2013-08-07 12:40:39 +01:00
NetworkPackage::createIdentityPackage(&np2);
2015-07-05 14:23:53 +01:00
socket->write(np2.serialize());
bool success = socket->waitForBytesWritten();
2013-08-07 12:40:39 +01:00
if (success) {
2016-06-17 00:59:53 +01:00
qCDebug(KDECONNECT_CORE) << "TCP connection done (i'm the existing device)";
2015-07-05 14:23:53 +01:00
// if ssl supported
if (receivedPackage->get<int>(QStringLiteral("protocolVersion")) >= MIN_VERSION_WITH_SSL_SUPPORT) {
bool isDeviceTrusted = KdeConnectConfig::instance()->trustedDevices().contains(deviceId);
configureSslSocket(socket, deviceId, isDeviceTrusted);
2016-03-08 15:29:34 +00:00
qCDebug(KDECONNECT_CORE) << "Starting server ssl (I'm the client TCP socket)";
2015-07-05 14:23:53 +01:00
2016-11-26 14:12:38 +00:00
connect(socket, &QSslSocket::encrypted, this, &LanLinkProvider::encrypted);
if (isDeviceTrusted) {
connect(socket, SIGNAL(sslErrors(QList<QSslError>)), this, SLOT(sslErrors(QList<QSslError>)));
}
2015-07-05 14:23:53 +01:00
socket->startServerEncryption();
return; // Return statement prevents from deleting received package, needed in slot "encrypted"
2015-07-05 14:23:53 +01:00
} else {
qWarning() << receivedPackage->get<QString>(QStringLiteral("deviceName")) << "uses an old protocol version, this won't work";
//addLink(deviceId, socket, receivedPackage, LanDeviceLink::Remotely);
}
2013-08-07 12:40:39 +01:00
} else {
//I think this will never happen, but if it happens the deviceLink
//(or the socket that is now inside it) might not be valid. Delete them.
qCDebug(KDECONNECT_CORE) << "Fallback (2), try reverse connection (send udp packet)";
mUdpSocket.writeDatagram(np2.serialize(), receivedIdentityPackages[socket].sender, PORT);
2013-08-07 10:29:56 +01:00
}
2016-06-02 11:17:07 +01:00
delete receivedIdentityPackages.take(socket).np;
//We don't delete the socket because now it's owned by the LanDeviceLink
2013-08-07 10:29:56 +01:00
}
2015-07-14 13:04:04 +01:00
void LanLinkProvider::encrypted()
{
2016-03-08 00:01:44 +00:00
qCDebug(KDECONNECT_CORE) << "Socket succesfully stablished an SSL connection";
2015-07-13 15:25:22 +01:00
2015-07-05 14:23:53 +01:00
QSslSocket* socket = qobject_cast<QSslSocket*>(sender());
if (!socket) return;
2016-11-26 14:12:38 +00:00
disconnect(socket, &QSslSocket::encrypted, this, &LanLinkProvider::encrypted);
2015-07-05 14:23:53 +01:00
disconnect(socket, SIGNAL(sslErrors(QList<QSslError>)), this, SLOT(sslErrors(QList<QSslError>)));
Q_ASSERT(socket->mode() != QSslSocket::UnencryptedMode);
LanDeviceLink::ConnectionStarted connectionOrigin = (socket->mode() == QSslSocket::SslClientMode)? LanDeviceLink::Locally : LanDeviceLink::Remotely;
2015-07-05 14:23:53 +01:00
NetworkPackage* receivedPackage = receivedIdentityPackages[socket].np;
const QString& deviceId = receivedPackage->get<QString>(QStringLiteral("deviceId"));
2015-07-05 14:23:53 +01:00
addLink(deviceId, socket, receivedPackage, connectionOrigin);
2015-07-05 14:23:53 +01:00
// Copied from connected slot, now delete received package
2016-06-02 11:17:07 +01:00
delete receivedIdentityPackages.take(socket).np;
2015-07-05 14:23:53 +01:00
}
2015-07-14 13:04:04 +01:00
void LanLinkProvider::sslErrors(const QList<QSslError>& errors)
2015-07-05 14:23:53 +01:00
{
QSslSocket* socket = qobject_cast<QSslSocket*>(sender());
if (!socket) return;
2016-11-26 14:12:38 +00:00
disconnect(socket, &QSslSocket::encrypted, this, &LanLinkProvider::encrypted);
2015-07-05 14:23:53 +01:00
disconnect(socket, SIGNAL(sslErrors(QList<QSslError>)), this, SLOT(sslErrors(QList<QSslError>)));
2016-06-21 13:50:17 +01:00
Q_FOREACH (const QSslError &error, errors) {
2015-07-09 22:51:08 +01:00
switch (error.error()) {
case QSslError::CertificateSignatureFailed:
case QSslError::CertificateNotYetValid:
case QSslError::CertificateExpired:
case QSslError::CertificateUntrusted:
case QSslError::SelfSignedCertificate: {
qCDebug(KDECONNECT_CORE) << "Failing due to " << error.errorString();
// Due to simultaneous multiple connections, it may be possible that device instance does not exist anymore
Device *device = Daemon::instance()->getDevice(socket->peerVerifyName());
if (device != Q_NULLPTR) {
device->unpair();
}
2015-07-09 22:51:08 +01:00
break;
}
2015-07-09 22:51:08 +01:00
default:
continue;
}
}
2015-07-14 13:04:04 +01:00
delete receivedIdentityPackages.take(socket).np;
// Socket disconnects itself on ssl error and will be deleted by deleteLater slot, no need to delete manually
2015-07-05 14:23:53 +01:00
}
2016-06-17 00:59:53 +01:00
//I'm the new device and this is the answer to my UDP identity package (no data received yet). They are connecting to us through TCP, and they should send an identity.
2015-07-09 23:27:27 +01:00
void LanLinkProvider::newConnection()
2013-08-07 10:29:56 +01:00
{
2015-07-14 13:04:04 +01:00
//qCDebug(KDECONNECT_CORE) << "LanLinkProvider newConnection";
2013-08-07 10:29:56 +01:00
2015-07-09 23:27:27 +01:00
while (mServer->hasPendingConnections()) {
QSslSocket* socket = mServer->nextPendingConnection();
configureSocket(socket);
//This socket is still managed by us (and child of the QTcpServer), if
//it disconnects before we manage to pass it to a LanDeviceLink, it's
//our responsibility to delete it. We do so with this connection.
2016-11-26 14:12:38 +00:00
connect(socket, &QAbstractSocket::disconnected,
socket, &QObject::deleteLater);
connect(socket, &QIODevice::readyRead,
this, &LanLinkProvider::dataReceived);
2013-08-07 10:29:56 +01:00
2015-07-09 23:27:27 +01:00
}
2013-08-07 10:29:56 +01:00
}
//I'm the new device and this is the answer to my UDP identity package (data received)
2013-08-28 22:47:39 +01:00
void LanLinkProvider::dataReceived()
2013-08-07 10:29:56 +01:00
{
2015-07-05 14:23:53 +01:00
QSslSocket* socket = qobject_cast<QSslSocket*>(sender());
2013-08-07 10:29:56 +01:00
const QByteArray data = socket->readLine();
2013-08-07 10:29:56 +01:00
2016-05-31 19:09:52 +01:00
//qCDebug(KDECONNECT_CORE) << "LanLinkProvider received reply:" << data;
2013-08-07 10:29:56 +01:00
NetworkPackage* np = new NetworkPackage(QLatin1String(""));
2015-07-05 14:23:53 +01:00
bool success = NetworkPackage::unserialize(data, np);
2015-07-13 15:25:22 +01:00
2016-06-02 11:17:07 +01:00
if (!success) {
delete np;
return;
}
if (np->type() != PACKAGE_TYPE_IDENTITY) {
qCWarning(KDECONNECT_CORE) << "LanLinkProvider/newConnection: Expected identity, received " << np->type();
delete np;
return;
}
2013-08-07 10:29:56 +01:00
2015-07-14 13:04:04 +01:00
// Needed in "encrypted" if ssl is used, similar to "connected"
receivedIdentityPackages[socket].np = np;
const QString& deviceId = np->get<QString>(QStringLiteral("deviceId"));
//qCDebug(KDECONNECT_CORE) << "Handshaking done (i'm the new device)";
//This socket will now be owned by the LanDeviceLink or we don't want more data to be received, forget about it
2016-11-26 14:12:38 +00:00
disconnect(socket, &QIODevice::readyRead, this, &LanLinkProvider::dataReceived);
if (np->get<int>(QStringLiteral("protocolVersion")) >= MIN_VERSION_WITH_SSL_SUPPORT) {
2013-08-07 10:29:56 +01:00
2015-07-05 14:23:53 +01:00
bool isDeviceTrusted = KdeConnectConfig::instance()->trustedDevices().contains(deviceId);
configureSslSocket(socket, deviceId, isDeviceTrusted);
2015-07-05 14:23:53 +01:00
2016-03-08 15:29:34 +00:00
qCDebug(KDECONNECT_CORE) << "Starting client ssl (but I'm the server TCP socket)";
2013-08-07 10:29:56 +01:00
2016-11-26 14:12:38 +00:00
connect(socket, &QSslSocket::encrypted, this, &LanLinkProvider::encrypted);
if (isDeviceTrusted) {
connect(socket, SIGNAL(sslErrors(QList<QSslError>)), this, SLOT(sslErrors(QList<QSslError>)));
}
socket->startClientEncryption();
2015-07-05 14:23:53 +01:00
} else {
qWarning() << np->get<QString>(QStringLiteral("deviceName")) << "uses an old protocol version, this won't work";
//addLink(deviceId, socket, np, LanDeviceLink::Locally);
2016-06-02 11:17:07 +01:00
delete receivedIdentityPackages.take(socket).np;
2015-07-05 14:23:53 +01:00
}
2013-08-07 10:29:56 +01:00
}
void LanLinkProvider::deviceLinkDestroyed(QObject* destroyedDeviceLink)
2013-08-07 10:29:56 +01:00
{
const QString id = destroyedDeviceLink->property("deviceId").toString();
2016-06-17 00:59:53 +01:00
//qCDebug(KDECONNECT_CORE) << "deviceLinkDestroyed" << id;
2015-12-11 01:11:55 +00:00
Q_ASSERT(mLinks.key(static_cast<LanDeviceLink*>(destroyedDeviceLink)) == id);
QMap< QString, LanDeviceLink* >::iterator linkIterator = mLinks.find(id);
if (linkIterator != mLinks.end()) {
Q_ASSERT(linkIterator.value() == destroyedDeviceLink);
mLinks.erase(linkIterator);
2015-12-17 13:54:24 +00:00
mPairingHandlers.remove(id);
}
2013-08-07 10:29:56 +01:00
}
void LanLinkProvider::configureSslSocket(QSslSocket* socket, const QString& deviceId, bool isDeviceTrusted)
2013-08-07 10:29:56 +01:00
{
// Setting supported ciphers manually
// Top 3 ciphers are for new Android devices, botton two are for old Android devices
// FIXME : These cipher suites should be checked whether they are supported or not on device
QList<QSslCipher> socketCiphers;
socketCiphers.append(QSslCipher(QStringLiteral("ECDHE-ECDSA-AES256-GCM-SHA384")));
socketCiphers.append(QSslCipher(QStringLiteral("ECDHE-ECDSA-AES128-GCM-SHA256")));
socketCiphers.append(QSslCipher(QStringLiteral("ECDHE-RSA-AES128-SHA")));
socketCiphers.append(QSslCipher(QStringLiteral("RC4-SHA")));
socketCiphers.append(QSslCipher(QStringLiteral("RC4-MD5")));
2015-07-05 14:23:53 +01:00
// Configure for ssl
QSslConfiguration sslConfig;
sslConfig.setCiphers(socketCiphers);
sslConfig.setProtocol(QSsl::TlsV1_0);
socket->setSslConfiguration(sslConfig);
2015-07-05 14:23:53 +01:00
socket->setLocalCertificate(KdeConnectConfig::instance()->certificate());
socket->setPrivateKey(KdeConnectConfig::instance()->privateKeyPath());
socket->setPeerVerifyName(deviceId);
if (isDeviceTrusted) {
QString certString = KdeConnectConfig::instance()->getDeviceProperty(deviceId, QStringLiteral("certificate"), QString());
socket->addCaCertificate(QSslCertificate(certString.toLatin1()));
socket->setPeerVerifyMode(QSslSocket::VerifyPeer);
} else {
socket->setPeerVerifyMode(QSslSocket::QueryPeer);
}
2016-07-12 11:49:21 +01:00
//Usually SSL errors are only bad for trusted devices. Uncomment this section to log errors in any case, for debugging.
//QObject::connect(socket, static_cast<void (QSslSocket::*)(const QList<QSslError>&)>(&QSslSocket::sslErrors), [](const QList<QSslError>& errors)
//{
// Q_FOREACH (const QSslError &error, errors) {
// qCDebug(KDECONNECT_CORE) << "SSL Error:" << error.errorString();
// }
//});
}
void LanLinkProvider::configureSocket(QSslSocket* socket) {
2015-07-05 14:23:53 +01:00
socket->setProxy(QNetworkProxy::NoProxy);
2016-06-09 01:36:02 +01:00
socket->setSocketOption(QAbstractSocket::KeepAliveOption, QVariant(1));
2015-04-04 18:05:55 +01:00
#ifdef TCP_KEEPIDLE
// time to start sending keepalive packets (seconds)
int maxIdle = 10;
2016-06-09 01:36:02 +01:00
setsockopt(socket->socketDescriptor(), IPPROTO_TCP, TCP_KEEPIDLE, &maxIdle, sizeof(maxIdle));
2015-04-04 18:05:55 +01:00
#endif
#ifdef TCP_KEEPINTVL
// interval between keepalive packets after the initial period (seconds)
int interval = 5;
2016-06-09 01:36:02 +01:00
setsockopt(socket->socketDescriptor(), IPPROTO_TCP, TCP_KEEPINTVL, &interval, sizeof(interval));
2015-04-04 18:05:55 +01:00
#endif
#ifdef TCP_KEEPCNT
// number of missed keepalive packets before disconnecting
int count = 3;
2016-06-09 01:36:02 +01:00
setsockopt(socket->socketDescriptor(), IPPROTO_TCP, TCP_KEEPCNT, &count, sizeof(count));
2015-04-04 18:05:55 +01:00
#endif
2013-08-07 10:29:56 +01:00
}
2015-07-05 14:23:53 +01:00
void LanLinkProvider::addLink(const QString& deviceId, QSslSocket* socket, NetworkPackage* receivedPackage, LanDeviceLink::ConnectionStarted connectionOrigin)
2015-11-30 18:36:01 +00:00
{
// Socket disconnection will now be handled by LanDeviceLink
2016-11-26 14:12:38 +00:00
disconnect(socket, &QAbstractSocket::disconnected, socket, &QObject::deleteLater);
2015-12-11 01:11:55 +00:00
LanDeviceLink* deviceLink;
//Do we have a link for this device already?
QMap< QString, LanDeviceLink* >::iterator linkIterator = mLinks.find(deviceId);
if (linkIterator != mLinks.end()) {
//qCDebug(KDECONNECT_CORE) << "Reusing link to" << deviceId;
deviceLink = linkIterator.value();
deviceLink->reset(socket, connectionOrigin);
} else {
deviceLink = new LanDeviceLink(deviceId, this, socket, connectionOrigin);
2016-11-26 14:12:38 +00:00
connect(deviceLink, &QObject::destroyed, this, &LanLinkProvider::deviceLinkDestroyed);
mLinks[deviceId] = deviceLink;
2015-12-17 13:54:24 +00:00
if (mPairingHandlers.contains(deviceId)) {
//We shouldn't have a pairinghandler if we didn't have a link.
//Crash if debug, recover if release (by setting the new devicelink to the old pairinghandler)
Q_ASSERT(mPairingHandlers.contains(deviceId));
mPairingHandlers[deviceId]->setDeviceLink(deviceLink);
}
2015-12-17 15:44:29 +00:00
Q_EMIT onConnectionReceived(*receivedPackage, deviceLink);
2015-07-05 14:23:53 +01:00
}
}
2015-12-01 18:45:14 +00:00
2015-12-17 14:53:29 +00:00
LanPairingHandler* LanLinkProvider::createPairingHandler(DeviceLink* link)
2015-12-01 18:45:14 +00:00
{
2015-12-17 14:53:29 +00:00
LanPairingHandler* ph = mPairingHandlers.value(link->deviceId());
2015-12-01 18:45:14 +00:00
if (!ph) {
2015-12-17 13:54:24 +00:00
ph = new LanPairingHandler(link);
2016-03-08 00:01:44 +00:00
qCDebug(KDECONNECT_CORE) << "creating pairing handler for" << link->deviceId();
2015-12-17 14:53:29 +00:00
connect (ph, &LanPairingHandler::pairingError, link, &DeviceLink::pairingError);
mPairingHandlers[link->deviceId()] = ph;
2015-12-01 18:45:14 +00:00
}
2015-12-17 14:53:29 +00:00
return ph;
}
2015-12-01 18:45:14 +00:00
2015-12-17 14:53:29 +00:00
void LanLinkProvider::userRequestsPair(const QString& deviceId)
{
LanPairingHandler* ph = createPairingHandler(mLinks.value(deviceId));
2015-12-01 18:45:14 +00:00
ph->requestPairing();
}
2015-12-02 19:04:35 +00:00
2016-03-03 00:17:38 +00:00
void LanLinkProvider::userRequestsUnpair(const QString& deviceId)
{
LanPairingHandler* ph = createPairingHandler(mLinks.value(deviceId));
ph->unpair();
}
void LanLinkProvider::incomingPairPackage(DeviceLink* deviceLink, const NetworkPackage& np)
{
2015-12-17 14:53:29 +00:00
LanPairingHandler* ph = createPairingHandler(deviceLink);
ph->packageReceived(np);
}
2015-12-17 13:54:24 +00:00