1 | /****************************************************************************
|
---|
2 | **
|
---|
3 | ** Copyright (C) 2009 Nokia Corporation and/or its subsidiary(-ies).
|
---|
4 | ** Contact: Qt Software Information ([email protected])
|
---|
5 | **
|
---|
6 | ** This file is part of the QtNetwork module of the Qt Toolkit.
|
---|
7 | **
|
---|
8 | ** $QT_BEGIN_LICENSE:LGPL$
|
---|
9 | ** Commercial Usage
|
---|
10 | ** Licensees holding valid Qt Commercial licenses may use this file in
|
---|
11 | ** accordance with the Qt Commercial License Agreement provided with the
|
---|
12 | ** Software or, alternatively, in accordance with the terms contained in
|
---|
13 | ** a written agreement between you and Nokia.
|
---|
14 | **
|
---|
15 | ** GNU Lesser General Public License Usage
|
---|
16 | ** Alternatively, this file may be used under the terms of the GNU Lesser
|
---|
17 | ** General Public License version 2.1 as published by the Free Software
|
---|
18 | ** Foundation and appearing in the file LICENSE.LGPL included in the
|
---|
19 | ** packaging of this file. Please review the following information to
|
---|
20 | ** ensure the GNU Lesser General Public License version 2.1 requirements
|
---|
21 | ** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
|
---|
22 | **
|
---|
23 | ** In addition, as a special exception, Nokia gives you certain
|
---|
24 | ** additional rights. These rights are described in the Nokia Qt LGPL
|
---|
25 | ** Exception version 1.0, included in the file LGPL_EXCEPTION.txt in this
|
---|
26 | ** package.
|
---|
27 | **
|
---|
28 | ** GNU General Public License Usage
|
---|
29 | ** Alternatively, this file may be used under the terms of the GNU
|
---|
30 | ** General Public License version 3.0 as published by the Free Software
|
---|
31 | ** Foundation and appearing in the file LICENSE.GPL included in the
|
---|
32 | ** packaging of this file. Please review the following information to
|
---|
33 | ** ensure the GNU General Public License version 3.0 requirements will be
|
---|
34 | ** met: http://www.gnu.org/copyleft/gpl.html.
|
---|
35 | **
|
---|
36 | ** If you are unsure which license is appropriate for your use, please
|
---|
37 | ** contact the sales department at [email protected].
|
---|
38 | ** $QT_END_LICENSE$
|
---|
39 | **
|
---|
40 | ****************************************************************************/
|
---|
41 |
|
---|
42 | #include "qsslconfiguration.h"
|
---|
43 | #include "qsslconfiguration_p.h"
|
---|
44 | #include "qsslsocket.h"
|
---|
45 | #include "qmutex.h"
|
---|
46 | #include "qdebug.h"
|
---|
47 |
|
---|
48 | QT_BEGIN_NAMESPACE
|
---|
49 |
|
---|
50 | template<> void QSharedDataPointer<QSslConfigurationPrivate>::detach()
|
---|
51 | {
|
---|
52 | if (d && d->ref == 1)
|
---|
53 | return;
|
---|
54 | QSslConfigurationPrivate *x = (d ? new QSslConfigurationPrivate(*d)
|
---|
55 | : new QSslConfigurationPrivate);
|
---|
56 | x->ref.ref();
|
---|
57 | if (d && !d->ref.deref())
|
---|
58 | delete d;
|
---|
59 | d = x;
|
---|
60 | }
|
---|
61 |
|
---|
62 | /*!
|
---|
63 | \class QSslConfiguration
|
---|
64 | \brief The QSslConfiguration class holds the configuration and state of an SSL connection
|
---|
65 | \since 4.4
|
---|
66 |
|
---|
67 | \reentrant
|
---|
68 | \inmodule QtNetwork
|
---|
69 | \ingroup io
|
---|
70 | \ingroup ssl
|
---|
71 |
|
---|
72 | QSslConfiguration is used by Qt networking classes to relay
|
---|
73 | information about an open SSL connection and to allow the
|
---|
74 | application to control certain features of that connection.
|
---|
75 |
|
---|
76 | The settings that QSslConfiguration currently supports are:
|
---|
77 |
|
---|
78 | \list
|
---|
79 | \o The SSL/TLS protocol to be used
|
---|
80 | \o The certificate to be presented to the peer during connection
|
---|
81 | and its associated private key
|
---|
82 | \o The ciphers allowed to be used for encrypting the connection
|
---|
83 | \o The list of Certificate Authorities certificates that are
|
---|
84 | used to validate the peer's certificate
|
---|
85 | \endlist
|
---|
86 |
|
---|
87 | These settings are applied only during the connection
|
---|
88 | handshake. Setting them after the connection has been established
|
---|
89 | has no effect.
|
---|
90 |
|
---|
91 | The state that QSslConfiguration supports are:
|
---|
92 | \list
|
---|
93 | \o The certificate the peer presented during handshake, along
|
---|
94 | with the chain leading to a CA certificate
|
---|
95 | \o The cipher used to encrypt this session
|
---|
96 | \endlist
|
---|
97 |
|
---|
98 | The state can only be obtained once the SSL connection starts, but
|
---|
99 | not necessarily before it's done. Some settings may change during
|
---|
100 | the course of the SSL connection without need to restart it (for
|
---|
101 | instance, the cipher can be changed over time).
|
---|
102 |
|
---|
103 | State in QSslConfiguration objects cannot be changed.
|
---|
104 |
|
---|
105 | QSslConfiguration can be used with QSslSocket and the Network
|
---|
106 | Access API.
|
---|
107 |
|
---|
108 | Note that changing settings in QSslConfiguration is not enough to
|
---|
109 | change the settings in the related SSL connection. You must call
|
---|
110 | setSslConfiguration on a modified QSslConfiguration object to
|
---|
111 | achieve that. The following example illustrates how to change the
|
---|
112 | protocol to TLSv1 in a QSslSocket object:
|
---|
113 |
|
---|
114 | \snippet doc/src/snippets/code/src_network_ssl_qsslconfiguration.cpp 0
|
---|
115 |
|
---|
116 | \sa QSsl::SslProtocol, QSslCertificate, QSslCipher, QSslKey
|
---|
117 | QSslSocket, QNetworkAccessManager,
|
---|
118 | QSslSocket::sslConfiguration(), QSslSocket::setSslConfiguration()
|
---|
119 | */
|
---|
120 |
|
---|
121 | /*!
|
---|
122 | Constructs an empty SSL configuration. This configuration contains
|
---|
123 | no valid settings and the state will be empty. isNull() will
|
---|
124 | return true after this constructor is called.
|
---|
125 |
|
---|
126 | Once any setter methods are called, isNull() will return false.
|
---|
127 | */
|
---|
128 | QSslConfiguration::QSslConfiguration()
|
---|
129 | : d(0)
|
---|
130 | {
|
---|
131 | }
|
---|
132 |
|
---|
133 | /*!
|
---|
134 | Copies the configuration and state of \a other. If \a other is
|
---|
135 | null, this object will be null too.
|
---|
136 | */
|
---|
137 | QSslConfiguration::QSslConfiguration(const QSslConfiguration &other)
|
---|
138 | : d(other.d)
|
---|
139 | {
|
---|
140 | }
|
---|
141 |
|
---|
142 | /*!
|
---|
143 | Releases any resources held by QSslConfiguration.
|
---|
144 | */
|
---|
145 | QSslConfiguration::~QSslConfiguration()
|
---|
146 | {
|
---|
147 | // QSharedDataPointer deletes d for us if necessary
|
---|
148 | }
|
---|
149 |
|
---|
150 | /*!
|
---|
151 | Copies the configuration and state of \a other. If \a other is
|
---|
152 | null, this object will be null too.
|
---|
153 | */
|
---|
154 | QSslConfiguration &QSslConfiguration::operator=(const QSslConfiguration &other)
|
---|
155 | {
|
---|
156 | d = other.d;
|
---|
157 | return *this;
|
---|
158 | }
|
---|
159 |
|
---|
160 | /*!
|
---|
161 | Returns true if this QSslConfiguration object is equal to \a
|
---|
162 | other.
|
---|
163 |
|
---|
164 | Two QSslConfiguration objects are considered equal if they have
|
---|
165 | the exact same settings and state.
|
---|
166 |
|
---|
167 | \sa operator!=()
|
---|
168 | */
|
---|
169 | bool QSslConfiguration::operator==(const QSslConfiguration &other) const
|
---|
170 | {
|
---|
171 | if (d == other.d)
|
---|
172 | return true;
|
---|
173 | return d->peerCertificate == other.d->peerCertificate &&
|
---|
174 | d->peerCertificateChain == other.d->peerCertificateChain &&
|
---|
175 | d->localCertificate == other.d->localCertificate &&
|
---|
176 | d->privateKey == other.d->privateKey &&
|
---|
177 | d->sessionCipher == other.d->sessionCipher &&
|
---|
178 | d->ciphers == other.d->ciphers &&
|
---|
179 | d->caCertificates == d->caCertificates &&
|
---|
180 | d->protocol == other.d->protocol &&
|
---|
181 | d->peerVerifyMode == other.d->peerVerifyMode &&
|
---|
182 | d->peerVerifyDepth == other.d->peerVerifyDepth;
|
---|
183 | }
|
---|
184 |
|
---|
185 | /*!
|
---|
186 | \fn QSslConfiguration::operator!=(const QSslConfiguration &other) const
|
---|
187 |
|
---|
188 | Returns true if this QSslConfiguration differs from \a other. Two
|
---|
189 | QSslConfiguration objects are considered different if any state or
|
---|
190 | setting is different.
|
---|
191 |
|
---|
192 | \sa operator==()
|
---|
193 | */
|
---|
194 |
|
---|
195 | /*!
|
---|
196 | Returns true if this is a null QSslConfiguration object.
|
---|
197 |
|
---|
198 | A QSslConfiguration object is null if it has been
|
---|
199 | default-constructed and no setter methods have been called.
|
---|
200 |
|
---|
201 | \sa setProtocol(), setLocalCertificate(), setPrivateKey(),
|
---|
202 | setCiphers(), setCaCertificates()
|
---|
203 | */
|
---|
204 | bool QSslConfiguration::isNull() const
|
---|
205 | {
|
---|
206 | return d == 0;
|
---|
207 | }
|
---|
208 |
|
---|
209 | /*!
|
---|
210 | Returns the protocol setting for this SSL configuration.
|
---|
211 |
|
---|
212 | \sa setProtocol()
|
---|
213 | */
|
---|
214 | QSsl::SslProtocol QSslConfiguration::protocol() const
|
---|
215 | {
|
---|
216 | return d ? d->protocol : QSsl::SslV3;
|
---|
217 | }
|
---|
218 |
|
---|
219 | /*!
|
---|
220 | Sets the protocol setting for this configuration to be \a
|
---|
221 | protocol.
|
---|
222 |
|
---|
223 | Setting the protocol once the connection has already been
|
---|
224 | established has no effect.
|
---|
225 |
|
---|
226 | \sa protocol()
|
---|
227 | */
|
---|
228 | void QSslConfiguration::setProtocol(QSsl::SslProtocol protocol)
|
---|
229 | {
|
---|
230 | d->protocol = protocol;
|
---|
231 | }
|
---|
232 |
|
---|
233 | /*!
|
---|
234 | Returns the verify mode. This mode decides whether QSslSocket should
|
---|
235 | request a certificate from the peer (i.e., the client requests a
|
---|
236 | certificate from the server, or a server requesting a certificate from the
|
---|
237 | client), and whether it should require that this certificate is valid.
|
---|
238 |
|
---|
239 | The default mode is AutoVerifyPeer, which tells QSslSocket to use
|
---|
240 | VerifyPeer for clients, QueryPeer for clients.
|
---|
241 |
|
---|
242 | \sa setPeerVerifyMode()
|
---|
243 | */
|
---|
244 | QSslSocket::PeerVerifyMode QSslConfiguration::peerVerifyMode() const
|
---|
245 | {
|
---|
246 | return d ? d->peerVerifyMode : QSslSocket::AutoVerifyPeer;
|
---|
247 | }
|
---|
248 |
|
---|
249 | /*!
|
---|
250 | Sets the verify mode to \a mode. This mode decides whether QSslSocket
|
---|
251 | should request a certificate from the peer (i.e., the client requests a
|
---|
252 | certificate from the server, or a server requesting a certificate from the
|
---|
253 | client), and whether it should require that this certificate is valid.
|
---|
254 |
|
---|
255 | The default mode is AutoVerifyPeer, which tells QSslSocket to use
|
---|
256 | VerifyPeer for clients, QueryPeer for clients.
|
---|
257 |
|
---|
258 | \sa peerVerifyMode()
|
---|
259 | */
|
---|
260 | void QSslConfiguration::setPeerVerifyMode(QSslSocket::PeerVerifyMode mode)
|
---|
261 | {
|
---|
262 | d->peerVerifyMode = mode;
|
---|
263 | }
|
---|
264 |
|
---|
265 |
|
---|
266 | /*!
|
---|
267 | Returns the maximum number of certificates in the peer's certificate chain
|
---|
268 | to be checked during the SSL handshake phase, or 0 (the default) if no
|
---|
269 | maximum depth has been set, indicating that the whole certificate chain
|
---|
270 | should be checked.
|
---|
271 |
|
---|
272 | The certificates are checked in issuing order, starting with the peer's
|
---|
273 | own certificate, then its issuer's certificate, and so on.
|
---|
274 |
|
---|
275 | \sa setPeerVerifyDepth(), peerVerifyMode()
|
---|
276 | */
|
---|
277 | int QSslConfiguration::peerVerifyDepth() const
|
---|
278 | {
|
---|
279 | return d ? d->peerVerifyDepth : 0;
|
---|
280 | }
|
---|
281 |
|
---|
282 | /*!
|
---|
283 | Sets the maximum number of certificates in the peer's certificate chain to
|
---|
284 | be checked during the SSL handshake phase, to \a depth. Setting a depth of
|
---|
285 | 0 means that no maximum depth is set, indicating that the whole
|
---|
286 | certificate chain should be checked.
|
---|
287 |
|
---|
288 | The certificates are checked in issuing order, starting with the peer's
|
---|
289 | own certificate, then its issuer's certificate, and so on.
|
---|
290 |
|
---|
291 | \sa peerVerifyDepth(), setPeerVerifyMode()
|
---|
292 | */
|
---|
293 | void QSslConfiguration::setPeerVerifyDepth(int depth)
|
---|
294 | {
|
---|
295 | if (depth < 0) {
|
---|
296 | qWarning("QSslConfiguration::setPeerVerifyDepth: cannot set negative depth of %d", depth);
|
---|
297 | return;
|
---|
298 | }
|
---|
299 | d->peerVerifyDepth = depth;
|
---|
300 | }
|
---|
301 |
|
---|
302 | /*!
|
---|
303 | Returns the certificate to be presented to the peer during the SSL
|
---|
304 | handshake process.
|
---|
305 |
|
---|
306 | \sa setLocalCertificate()
|
---|
307 | */
|
---|
308 | QSslCertificate QSslConfiguration::localCertificate() const
|
---|
309 | {
|
---|
310 | return d ? d->localCertificate : QSslCertificate();
|
---|
311 | }
|
---|
312 |
|
---|
313 | /*!
|
---|
314 | Sets the certificate to be presented to the peer during SSL
|
---|
315 | handshake to be \a certificate.
|
---|
316 |
|
---|
317 | Setting the certificate once the connection has been established
|
---|
318 | has no effect.
|
---|
319 |
|
---|
320 | A certificate is the means of identification used in the SSL
|
---|
321 | process. The local certificate is used by the remote end to verify
|
---|
322 | the local user's identity against its list of Certification
|
---|
323 | Authorities. In most cases, such as in HTTP web browsing, only
|
---|
324 | servers identify to the clients, so the client does not send a
|
---|
325 | certificate.
|
---|
326 |
|
---|
327 | \sa localCertificate()
|
---|
328 | */
|
---|
329 | void QSslConfiguration::setLocalCertificate(const QSslCertificate &certificate)
|
---|
330 | {
|
---|
331 | d->localCertificate = certificate;
|
---|
332 | }
|
---|
333 |
|
---|
334 | /*!
|
---|
335 | Returns the peer's digital certificate (i.e., the immediate
|
---|
336 | certificate of the host you are connected to), or a null
|
---|
337 | certificate, if the peer has not assigned a certificate.
|
---|
338 |
|
---|
339 | The peer certificate is checked automatically during the
|
---|
340 | handshake phase, so this function is normally used to fetch
|
---|
341 | the certificate for display or for connection diagnostic
|
---|
342 | purposes. It contains information about the peer, including
|
---|
343 | its host name, the certificate issuer, and the peer's public
|
---|
344 | key.
|
---|
345 |
|
---|
346 | Because the peer certificate is set during the handshake phase, it
|
---|
347 | is safe to access the peer certificate from a slot connected to
|
---|
348 | the QSslSocket::sslErrors() signal, QNetworkReply::sslErrors()
|
---|
349 | signal, or the QSslSocket::encrypted() signal.
|
---|
350 |
|
---|
351 | If a null certificate is returned, it can mean the SSL handshake
|
---|
352 | failed, or it can mean the host you are connected to doesn't have
|
---|
353 | a certificate, or it can mean there is no connection.
|
---|
354 |
|
---|
355 | If you want to check the peer's complete chain of certificates,
|
---|
356 | use peerCertificateChain() to get them all at once.
|
---|
357 |
|
---|
358 | \sa peerCertificateChain(),
|
---|
359 | QSslSocket::sslErrors(), QSslSocket::ignoreSslErrors(),
|
---|
360 | QNetworkReply::sslErrors(), QNetworkReply::ignoreSslErrors()
|
---|
361 | */
|
---|
362 | QSslCertificate QSslConfiguration::peerCertificate() const
|
---|
363 | {
|
---|
364 | return d ? d->peerCertificate : QSslCertificate();
|
---|
365 | }
|
---|
366 |
|
---|
367 | /*!
|
---|
368 | Returns the peer's chain of digital certificates, starting with
|
---|
369 | the peer's immediate certificate and ending with the CA's
|
---|
370 | certificate.
|
---|
371 |
|
---|
372 | Peer certificates are checked automatically during the handshake
|
---|
373 | phase. This function is normally used to fetch certificates for
|
---|
374 | display, or for performing connection diagnostics. Certificates
|
---|
375 | contain information about the peer and the certificate issuers,
|
---|
376 | including host name, issuer names, and issuer public keys.
|
---|
377 |
|
---|
378 | Because the peer certificate is set during the handshake phase, it
|
---|
379 | is safe to access the peer certificate from a slot connected to
|
---|
380 | the QSslSocket::sslErrors() signal, QNetworkReply::sslErrors()
|
---|
381 | signal, or the QSslSocket::encrypted() signal.
|
---|
382 |
|
---|
383 | If an empty list is returned, it can mean the SSL handshake
|
---|
384 | failed, or it can mean the host you are connected to doesn't have
|
---|
385 | a certificate, or it can mean there is no connection.
|
---|
386 |
|
---|
387 | If you want to get only the peer's immediate certificate, use
|
---|
388 | peerCertificate().
|
---|
389 |
|
---|
390 | \sa peerCertificate(),
|
---|
391 | QSslSocket::sslErrors(), QSslSocket::ignoreSslErrors(),
|
---|
392 | QNetworkReply::sslErrors(), QNetworkReply::ignoreSslErrors()
|
---|
393 | */
|
---|
394 | QList<QSslCertificate> QSslConfiguration::peerCertificateChain() const
|
---|
395 | {
|
---|
396 | return d ? d->peerCertificateChain : QList<QSslCertificate>();
|
---|
397 | }
|
---|
398 |
|
---|
399 | /*!
|
---|
400 | Returns the socket's cryptographic \l {QSslCipher} {cipher}, or a
|
---|
401 | null cipher if the connection isn't encrypted. The socket's cipher
|
---|
402 | for the session is set during the handshake phase. The cipher is
|
---|
403 | used to encrypt and decrypt data transmitted through the socket.
|
---|
404 |
|
---|
405 | The SSL infrastructure also provides functions for setting the
|
---|
406 | ordered list of ciphers from which the handshake phase will
|
---|
407 | eventually select the session cipher. This ordered list must be in
|
---|
408 | place before the handshake phase begins.
|
---|
409 |
|
---|
410 | \sa ciphers(), setCiphers(), QSslSocket::supportedCiphers()
|
---|
411 | */
|
---|
412 | QSslCipher QSslConfiguration::sessionCipher() const
|
---|
413 | {
|
---|
414 | return d ? d->sessionCipher : QSslCipher();
|
---|
415 | }
|
---|
416 |
|
---|
417 | /*!
|
---|
418 | Returns the \l {QSslKey} {SSL key} assigned to this connection or
|
---|
419 | a null key if none has been assigned yet.
|
---|
420 |
|
---|
421 | \sa setPrivateKey(), localCertificate()
|
---|
422 | */
|
---|
423 | QSslKey QSslConfiguration::privateKey() const
|
---|
424 | {
|
---|
425 | return d ? d->privateKey : QSslKey();
|
---|
426 | }
|
---|
427 |
|
---|
428 | /*!
|
---|
429 | Sets the connection's private \l {QSslKey} {key} to \a key. The
|
---|
430 | private key and the local \l {QSslCertificate} {certificate} are
|
---|
431 | used by clients and servers that must prove their identity to
|
---|
432 | SSL peers.
|
---|
433 |
|
---|
434 | Both the key and the local certificate are required if you are
|
---|
435 | creating an SSL server socket. If you are creating an SSL client
|
---|
436 | socket, the key and local certificate are required if your client
|
---|
437 | must identify itself to an SSL server.
|
---|
438 |
|
---|
439 | \sa privateKey(), setLocalCertificate()
|
---|
440 | */
|
---|
441 | void QSslConfiguration::setPrivateKey(const QSslKey &key)
|
---|
442 | {
|
---|
443 | d->privateKey = key;
|
---|
444 | }
|
---|
445 |
|
---|
446 | /*!
|
---|
447 | Returns this connection's current cryptographic cipher suite. This
|
---|
448 | list is used during the handshake phase for choosing a
|
---|
449 | session cipher. The returned list of ciphers is ordered by
|
---|
450 | descending preference. (i.e., the first cipher in the list is the
|
---|
451 | most preferred cipher). The session cipher will be the first one
|
---|
452 | in the list that is also supported by the peer.
|
---|
453 |
|
---|
454 | By default, the handshake phase can choose any of the ciphers
|
---|
455 | supported by this system's SSL libraries, which may vary from
|
---|
456 | system to system. The list of ciphers supported by this system's
|
---|
457 | SSL libraries is returned by QSslSocket::supportedCiphers(). You can restrict
|
---|
458 | the list of ciphers used for choosing the session cipher for this
|
---|
459 | socket by calling setCiphers() with a subset of the supported
|
---|
460 | ciphers. You can revert to using the entire set by calling
|
---|
461 | setCiphers() with the list returned by QSslSocket::supportedCiphers().
|
---|
462 |
|
---|
463 | \sa setCiphers(), QSslSocket::supportedCiphers()
|
---|
464 | */
|
---|
465 | QList<QSslCipher> QSslConfiguration::ciphers() const
|
---|
466 | {
|
---|
467 | return d ? d->ciphers : QList<QSslCipher>();
|
---|
468 | }
|
---|
469 |
|
---|
470 | /*!
|
---|
471 | Sets the cryptographic cipher suite for this socket to \a ciphers,
|
---|
472 | which must contain a subset of the ciphers in the list returned by
|
---|
473 | supportedCiphers().
|
---|
474 |
|
---|
475 | Restricting the cipher suite must be done before the handshake
|
---|
476 | phase, where the session cipher is chosen.
|
---|
477 |
|
---|
478 | \sa ciphers(), QSslSocket::supportedCiphers()
|
---|
479 | */
|
---|
480 | void QSslConfiguration::setCiphers(const QList<QSslCipher> &ciphers)
|
---|
481 | {
|
---|
482 | d->ciphers = ciphers;
|
---|
483 | }
|
---|
484 |
|
---|
485 | /*!
|
---|
486 | Returns this connection's CA certificate database. The CA certificate
|
---|
487 | database is used by the socket during the handshake phase to
|
---|
488 | validate the peer's certificate. It can be moodified prior to the
|
---|
489 | handshake with addCaCertificate(), addCaCertificates(), and
|
---|
490 | setCaCertificates().
|
---|
491 |
|
---|
492 | \sa setCaCertificates()
|
---|
493 | */
|
---|
494 | QList<QSslCertificate> QSslConfiguration::caCertificates() const
|
---|
495 | {
|
---|
496 | return d ? d->caCertificates : QList<QSslCertificate>();
|
---|
497 | }
|
---|
498 |
|
---|
499 | /*!
|
---|
500 | Sets this socket's CA certificate database to be \a certificates.
|
---|
501 | The certificate database must be set prior to the SSL handshake.
|
---|
502 | The CA certificate database is used by the socket during the
|
---|
503 | handshake phase to validate the peer's certificate.
|
---|
504 |
|
---|
505 | \sa caCertificates()
|
---|
506 | */
|
---|
507 | void QSslConfiguration::setCaCertificates(const QList<QSslCertificate> &certificates)
|
---|
508 | {
|
---|
509 | d->caCertificates = certificates;
|
---|
510 | }
|
---|
511 |
|
---|
512 | /*!
|
---|
513 | Returns the default SSL configuration to be used in new SSL
|
---|
514 | connections.
|
---|
515 |
|
---|
516 | The default SSL configuration consists of:
|
---|
517 |
|
---|
518 | \list
|
---|
519 | \o no local certificate and no private key
|
---|
520 | \o protocol SSLv3
|
---|
521 | \o the system's default CA certificate list
|
---|
522 | \o the cipher list equal to the list of the SSL libraries'
|
---|
523 | supported SSL ciphers
|
---|
524 | \endlist
|
---|
525 |
|
---|
526 | \sa QSslSocket::supportedCiphers(), setDefaultConfiguration()
|
---|
527 | */
|
---|
528 | QSslConfiguration QSslConfiguration::defaultConfiguration()
|
---|
529 | {
|
---|
530 | return QSslConfigurationPrivate::defaultConfiguration();
|
---|
531 | }
|
---|
532 |
|
---|
533 | /*!
|
---|
534 | Sets the default SSL configuration to be used in new SSL
|
---|
535 | connections to be \a configuration. Existing connections are not
|
---|
536 | affected by this call.
|
---|
537 |
|
---|
538 | \sa QSslSocket::supportedCiphers(), defaultConfiguration()
|
---|
539 | */
|
---|
540 | void QSslConfiguration::setDefaultConfiguration(const QSslConfiguration &configuration)
|
---|
541 | {
|
---|
542 | QSslConfigurationPrivate::setDefaultConfiguration(configuration);
|
---|
543 | }
|
---|
544 |
|
---|
545 | QT_END_NAMESPACE
|
---|