| 1 | /****************************************************************************
|
|---|
| 2 | **
|
|---|
| 3 | ** Copyright (C) 2009 Nokia Corporation and/or its subsidiary(-ies).
|
|---|
| 4 | ** Contact: Qt Software Information ([email protected])
|
|---|
| 5 | **
|
|---|
| 6 | ** This file is part of the QtNetwork module of the Qt Toolkit.
|
|---|
| 7 | **
|
|---|
| 8 | ** $QT_BEGIN_LICENSE:LGPL$
|
|---|
| 9 | ** Commercial Usage
|
|---|
| 10 | ** Licensees holding valid Qt Commercial licenses may use this file in
|
|---|
| 11 | ** accordance with the Qt Commercial License Agreement provided with the
|
|---|
| 12 | ** Software or, alternatively, in accordance with the terms contained in
|
|---|
| 13 | ** a written agreement between you and Nokia.
|
|---|
| 14 | **
|
|---|
| 15 | ** GNU Lesser General Public License Usage
|
|---|
| 16 | ** Alternatively, this file may be used under the terms of the GNU Lesser
|
|---|
| 17 | ** General Public License version 2.1 as published by the Free Software
|
|---|
| 18 | ** Foundation and appearing in the file LICENSE.LGPL included in the
|
|---|
| 19 | ** packaging of this file. Please review the following information to
|
|---|
| 20 | ** ensure the GNU Lesser General Public License version 2.1 requirements
|
|---|
| 21 | ** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
|
|---|
| 22 | **
|
|---|
| 23 | ** In addition, as a special exception, Nokia gives you certain
|
|---|
| 24 | ** additional rights. These rights are described in the Nokia Qt LGPL
|
|---|
| 25 | ** Exception version 1.0, included in the file LGPL_EXCEPTION.txt in this
|
|---|
| 26 | ** package.
|
|---|
| 27 | **
|
|---|
| 28 | ** GNU General Public License Usage
|
|---|
| 29 | ** Alternatively, this file may be used under the terms of the GNU
|
|---|
| 30 | ** General Public License version 3.0 as published by the Free Software
|
|---|
| 31 | ** Foundation and appearing in the file LICENSE.GPL included in the
|
|---|
| 32 | ** packaging of this file. Please review the following information to
|
|---|
| 33 | ** ensure the GNU General Public License version 3.0 requirements will be
|
|---|
| 34 | ** met: http://www.gnu.org/copyleft/gpl.html.
|
|---|
| 35 | **
|
|---|
| 36 | ** If you are unsure which license is appropriate for your use, please
|
|---|
| 37 | ** contact the sales department at [email protected].
|
|---|
| 38 | ** $QT_END_LICENSE$
|
|---|
| 39 | **
|
|---|
| 40 | ****************************************************************************/
|
|---|
| 41 |
|
|---|
| 42 |
|
|---|
| 43 | /*!
|
|---|
| 44 | \class QSslKey
|
|---|
| 45 | \brief The QSslKey class provides an interface for private and public keys.
|
|---|
| 46 | \since 4.3
|
|---|
| 47 |
|
|---|
| 48 | \reentrant
|
|---|
| 49 | \ingroup io
|
|---|
| 50 | \ingroup ssl
|
|---|
| 51 | \inmodule QtNetwork
|
|---|
| 52 |
|
|---|
| 53 | QSslKey provides a simple API for managing keys.
|
|---|
| 54 |
|
|---|
| 55 | \sa QSslSocket, QSslCertificate, QSslCipher
|
|---|
| 56 | */
|
|---|
| 57 |
|
|---|
| 58 | #include "qsslsocket_openssl_symbols_p.h"
|
|---|
| 59 | #include "qsslkey.h"
|
|---|
| 60 | #include "qsslkey_p.h"
|
|---|
| 61 | #include "qsslsocket.h"
|
|---|
| 62 | #include "qsslsocket_p.h"
|
|---|
| 63 |
|
|---|
| 64 | #include <QtCore/qatomic.h>
|
|---|
| 65 | #include <QtCore/qbytearray.h>
|
|---|
| 66 | #include <QtCore/qiodevice.h>
|
|---|
| 67 | #ifndef QT_NO_DEBUG_STREAM
|
|---|
| 68 | #include <QtCore/qdebug.h>
|
|---|
| 69 |
|
|---|
| 70 | QT_BEGIN_NAMESPACE
|
|---|
| 71 | #endif
|
|---|
| 72 |
|
|---|
| 73 |
|
|---|
| 74 | /*!
|
|---|
| 75 | \internal
|
|---|
| 76 | */
|
|---|
| 77 | void QSslKeyPrivate::clear(bool deep)
|
|---|
| 78 | {
|
|---|
| 79 | isNull = true;
|
|---|
| 80 | if (!QSslSocket::supportsSsl())
|
|---|
| 81 | return;
|
|---|
| 82 | if (rsa) {
|
|---|
| 83 | if (deep)
|
|---|
| 84 | q_RSA_free(rsa);
|
|---|
| 85 | rsa = 0;
|
|---|
| 86 | }
|
|---|
| 87 | if (dsa) {
|
|---|
| 88 | if (deep)
|
|---|
| 89 | q_DSA_free(dsa);
|
|---|
| 90 | dsa = 0;
|
|---|
| 91 | }
|
|---|
| 92 | }
|
|---|
| 93 |
|
|---|
| 94 | /*!
|
|---|
| 95 | \internal
|
|---|
| 96 |
|
|---|
| 97 | Allocates a new rsa or dsa struct and decodes \a pem into it
|
|---|
| 98 | according to the current algorithm and type.
|
|---|
| 99 |
|
|---|
| 100 | If \a deepClear is true, the rsa/dsa struct is freed if it is was
|
|---|
| 101 | already allocated, otherwise we "leak" memory (which is exactly
|
|---|
| 102 | what we want for copy construction).
|
|---|
| 103 |
|
|---|
| 104 | If \a passPhrase is non-empty, it will be used for decrypting
|
|---|
| 105 | \a pem.
|
|---|
| 106 | */
|
|---|
| 107 | void QSslKeyPrivate::decodePem(const QByteArray &pem, const QByteArray &passPhrase,
|
|---|
| 108 | bool deepClear)
|
|---|
| 109 | {
|
|---|
| 110 | if (pem.isEmpty())
|
|---|
| 111 | return;
|
|---|
| 112 |
|
|---|
| 113 | clear(deepClear);
|
|---|
| 114 |
|
|---|
| 115 | if (!QSslSocket::supportsSsl())
|
|---|
| 116 | return;
|
|---|
| 117 |
|
|---|
| 118 | BIO *bio = q_BIO_new_mem_buf(const_cast<char *>(pem.data()), pem.size());
|
|---|
| 119 | if (!bio)
|
|---|
| 120 | return;
|
|---|
| 121 |
|
|---|
| 122 | void *phrase = passPhrase.isEmpty()
|
|---|
| 123 | ? (void *)0
|
|---|
| 124 | : (void *)passPhrase.constData();
|
|---|
| 125 |
|
|---|
| 126 | if (algorithm == QSsl::Rsa) {
|
|---|
| 127 | RSA *result = (type == QSsl::PublicKey)
|
|---|
| 128 | ? q_PEM_read_bio_RSA_PUBKEY(bio, &rsa, 0, phrase)
|
|---|
| 129 | : q_PEM_read_bio_RSAPrivateKey(bio, &rsa, 0, phrase);
|
|---|
| 130 | if (rsa && rsa == result)
|
|---|
| 131 | isNull = false;
|
|---|
| 132 | } else {
|
|---|
| 133 | DSA *result = (type == QSsl::PublicKey)
|
|---|
| 134 | ? q_PEM_read_bio_DSA_PUBKEY(bio, &dsa, 0, phrase)
|
|---|
| 135 | : q_PEM_read_bio_DSAPrivateKey(bio, &dsa, 0, phrase);
|
|---|
| 136 | if (dsa && dsa == result)
|
|---|
| 137 | isNull = false;
|
|---|
| 138 | }
|
|---|
| 139 |
|
|---|
| 140 | q_BIO_free(bio);
|
|---|
| 141 | }
|
|---|
| 142 |
|
|---|
| 143 | /*!
|
|---|
| 144 | Constructs a null key.
|
|---|
| 145 |
|
|---|
| 146 | \sa isNull()
|
|---|
| 147 | */
|
|---|
| 148 | QSslKey::QSslKey()
|
|---|
| 149 | : d(new QSslKeyPrivate)
|
|---|
| 150 | {
|
|---|
| 151 | }
|
|---|
| 152 |
|
|---|
| 153 | /*!
|
|---|
| 154 | \internal
|
|---|
| 155 | */
|
|---|
| 156 | QByteArray QSslKeyPrivate::pemHeader() const
|
|---|
| 157 | {
|
|---|
| 158 | // ### use QByteArray::fromRawData() instead
|
|---|
| 159 | if (type == QSsl::PublicKey)
|
|---|
| 160 | return QByteArray("-----BEGIN PUBLIC KEY-----\n");
|
|---|
| 161 | else if (algorithm == QSsl::Rsa)
|
|---|
| 162 | return QByteArray("-----BEGIN RSA PRIVATE KEY-----\n");
|
|---|
| 163 | return QByteArray("-----BEGIN DSA PRIVATE KEY-----\n");
|
|---|
| 164 | }
|
|---|
| 165 |
|
|---|
| 166 | /*!
|
|---|
| 167 | \internal
|
|---|
| 168 | */
|
|---|
| 169 | QByteArray QSslKeyPrivate::pemFooter() const
|
|---|
| 170 | {
|
|---|
| 171 | // ### use QByteArray::fromRawData() instead
|
|---|
| 172 | if (type == QSsl::PublicKey)
|
|---|
| 173 | return QByteArray("-----END PUBLIC KEY-----\n");
|
|---|
| 174 | else if (algorithm == QSsl::Rsa)
|
|---|
| 175 | return QByteArray("-----END RSA PRIVATE KEY-----\n");
|
|---|
| 176 | return QByteArray("-----END DSA PRIVATE KEY-----\n");
|
|---|
| 177 | }
|
|---|
| 178 |
|
|---|
| 179 | /*!
|
|---|
| 180 | \internal
|
|---|
| 181 |
|
|---|
| 182 | Returns a DER key formatted as PEM.
|
|---|
| 183 | */
|
|---|
| 184 | QByteArray QSslKeyPrivate::pemFromDer(const QByteArray &der) const
|
|---|
| 185 | {
|
|---|
| 186 | QByteArray pem(der.toBase64());
|
|---|
| 187 |
|
|---|
| 188 | const int lineWidth = 64; // RFC 1421
|
|---|
| 189 | const int newLines = pem.size() / lineWidth;
|
|---|
| 190 | const bool rem = pem.size() % lineWidth;
|
|---|
| 191 |
|
|---|
| 192 | // ### optimize
|
|---|
| 193 | for (int i = 0; i < newLines; ++i)
|
|---|
| 194 | pem.insert((i + 1) * lineWidth + i, '\n');
|
|---|
| 195 | if (rem)
|
|---|
| 196 | pem.append('\n'); // ###
|
|---|
| 197 |
|
|---|
| 198 | pem.prepend(pemHeader());
|
|---|
| 199 | pem.append(pemFooter());
|
|---|
| 200 |
|
|---|
| 201 | return pem;
|
|---|
| 202 | }
|
|---|
| 203 |
|
|---|
| 204 | /*!
|
|---|
| 205 | \internal
|
|---|
| 206 |
|
|---|
| 207 | Returns a PEM key formatted as DER.
|
|---|
| 208 | */
|
|---|
| 209 | QByteArray QSslKeyPrivate::derFromPem(const QByteArray &pem) const
|
|---|
| 210 | {
|
|---|
| 211 | const QByteArray header = pemHeader();
|
|---|
| 212 | const QByteArray footer = pemFooter();
|
|---|
| 213 |
|
|---|
| 214 | QByteArray der(pem);
|
|---|
| 215 |
|
|---|
| 216 | const int headerIndex = der.indexOf(header);
|
|---|
| 217 | const int footerIndex = der.indexOf(footer);
|
|---|
| 218 | if (headerIndex == -1 || footerIndex == -1)
|
|---|
| 219 | return QByteArray();
|
|---|
| 220 |
|
|---|
| 221 | der = der.mid(headerIndex + header.size(), footerIndex - (headerIndex + header.size()));
|
|---|
| 222 |
|
|---|
| 223 | return QByteArray::fromBase64(der); // ignores newlines
|
|---|
| 224 | }
|
|---|
| 225 |
|
|---|
| 226 | /*!
|
|---|
| 227 | Constructs a QSslKey by decoding the string in the byte array
|
|---|
| 228 | \a encoded using a specified \a algorithm and \a encoding format.
|
|---|
| 229 | If the encoded key is encrypted, \a passPhrase is used to decrypt
|
|---|
| 230 | it. \a type specifies whether the key is public or private.
|
|---|
| 231 |
|
|---|
| 232 | After construction, use isNull() to check if \a encoded contained
|
|---|
| 233 | a valid key.
|
|---|
| 234 | */
|
|---|
| 235 | QSslKey::QSslKey(const QByteArray &encoded, QSsl::KeyAlgorithm algorithm,
|
|---|
| 236 | QSsl::EncodingFormat encoding, QSsl::KeyType type, const QByteArray &passPhrase)
|
|---|
| 237 | : d(new QSslKeyPrivate)
|
|---|
| 238 | {
|
|---|
| 239 | d->type = type;
|
|---|
| 240 | d->algorithm = algorithm;
|
|---|
| 241 | d->decodePem((encoding == QSsl::Der)
|
|---|
| 242 | ? d->pemFromDer(encoded) : encoded,
|
|---|
| 243 | passPhrase);
|
|---|
| 244 | }
|
|---|
| 245 |
|
|---|
| 246 | /*!
|
|---|
| 247 | Constructs a QSslKey by reading and decoding data from a
|
|---|
| 248 | \a device using a specified \a algorithm and \a encoding format.
|
|---|
| 249 | If the encoded key is encrypted, \a passPhrase is used to decrypt
|
|---|
| 250 | it. \a type specifies whether the key is public or private.
|
|---|
| 251 |
|
|---|
| 252 | After construction, use isNull() to check if \a device provided
|
|---|
| 253 | a valid key.
|
|---|
| 254 | */
|
|---|
| 255 | QSslKey::QSslKey(QIODevice *device, QSsl::KeyAlgorithm algorithm, QSsl::EncodingFormat encoding,
|
|---|
| 256 | QSsl::KeyType type, const QByteArray &passPhrase)
|
|---|
| 257 | : d(new QSslKeyPrivate)
|
|---|
| 258 | {
|
|---|
| 259 | QByteArray encoded;
|
|---|
| 260 | if (device)
|
|---|
| 261 | encoded = device->readAll();
|
|---|
| 262 | d->type = type;
|
|---|
| 263 | d->algorithm = algorithm;
|
|---|
| 264 | d->decodePem((encoding == QSsl::Der) ?
|
|---|
| 265 | d->pemFromDer(encoded) : encoded,
|
|---|
| 266 | passPhrase);
|
|---|
| 267 | }
|
|---|
| 268 |
|
|---|
| 269 | /*!
|
|---|
| 270 | Constructs an identical copy of \a other.
|
|---|
| 271 | */
|
|---|
| 272 | QSslKey::QSslKey(const QSslKey &other) : d(other.d)
|
|---|
| 273 | {
|
|---|
| 274 | d->ref.ref();
|
|---|
| 275 | }
|
|---|
| 276 |
|
|---|
| 277 | /*!
|
|---|
| 278 | Destroys the QSslKey object.
|
|---|
| 279 | */
|
|---|
| 280 | QSslKey::~QSslKey()
|
|---|
| 281 | {
|
|---|
| 282 | if (!d->ref.deref())
|
|---|
| 283 | delete d;
|
|---|
| 284 | }
|
|---|
| 285 |
|
|---|
| 286 | /*!
|
|---|
| 287 | Copies the contents of \a other into this key, making the two keys
|
|---|
| 288 | identical.
|
|---|
| 289 |
|
|---|
| 290 | Returns a reference to this QSslKey.
|
|---|
| 291 | */
|
|---|
| 292 | QSslKey &QSslKey::operator=(const QSslKey &other)
|
|---|
| 293 | {
|
|---|
| 294 | qAtomicAssign(d, other.d);
|
|---|
| 295 | return *this;
|
|---|
| 296 | }
|
|---|
| 297 |
|
|---|
| 298 | /*!
|
|---|
| 299 | Returns true if this is a null key; otherwise false.
|
|---|
| 300 |
|
|---|
| 301 | \sa clear()
|
|---|
| 302 | */
|
|---|
| 303 | bool QSslKey::isNull() const
|
|---|
| 304 | {
|
|---|
| 305 | return d->isNull;
|
|---|
| 306 | }
|
|---|
| 307 |
|
|---|
| 308 | /*!
|
|---|
| 309 | Clears the contents of this key, making it a null key.
|
|---|
| 310 |
|
|---|
| 311 | \sa isNull()
|
|---|
| 312 | */
|
|---|
| 313 | void QSslKey::clear()
|
|---|
| 314 | {
|
|---|
| 315 | if (!d->ref.deref()) {
|
|---|
| 316 | delete d;
|
|---|
| 317 | d = new QSslKeyPrivate;
|
|---|
| 318 | }
|
|---|
| 319 | }
|
|---|
| 320 |
|
|---|
| 321 | /*!
|
|---|
| 322 | Returns the length of the key in bits, or -1 if the key is null.
|
|---|
| 323 | */
|
|---|
| 324 | int QSslKey::length() const
|
|---|
| 325 | {
|
|---|
| 326 | if (d->isNull)
|
|---|
| 327 | return -1;
|
|---|
| 328 | return (d->algorithm == QSsl::Rsa)
|
|---|
| 329 | ? q_BN_num_bits(d->rsa->n) : q_BN_num_bits(d->dsa->p);
|
|---|
| 330 | }
|
|---|
| 331 |
|
|---|
| 332 | /*!
|
|---|
| 333 | Returns the type of the key (i.e., PublicKey or PrivateKey).
|
|---|
| 334 | */
|
|---|
| 335 | QSsl::KeyType QSslKey::type() const
|
|---|
| 336 | {
|
|---|
| 337 | return d->type;
|
|---|
| 338 | }
|
|---|
| 339 |
|
|---|
| 340 | /*!
|
|---|
| 341 | Returns the key algorithm.
|
|---|
| 342 | */
|
|---|
| 343 | QSsl::KeyAlgorithm QSslKey::algorithm() const
|
|---|
| 344 | {
|
|---|
| 345 | return d->algorithm;
|
|---|
| 346 | }
|
|---|
| 347 |
|
|---|
| 348 | /*!
|
|---|
| 349 | Returns the key in DER encoding. The result is encrypted with
|
|---|
| 350 | \a passPhrase if the key is a private key and \a passPhrase is
|
|---|
| 351 | non-empty.
|
|---|
| 352 | */
|
|---|
| 353 | // ### autotest failure for non-empty passPhrase and private key
|
|---|
| 354 | QByteArray QSslKey::toDer(const QByteArray &passPhrase) const
|
|---|
| 355 | {
|
|---|
| 356 | if (d->isNull)
|
|---|
| 357 | return QByteArray();
|
|---|
| 358 | return d->derFromPem(toPem(passPhrase));
|
|---|
| 359 | }
|
|---|
| 360 |
|
|---|
| 361 | /*!
|
|---|
| 362 | Returns the key in PEM encoding. The result is encrypted with
|
|---|
| 363 | \a passPhrase if the key is a private key and \a passPhrase is
|
|---|
| 364 | non-empty.
|
|---|
| 365 | */
|
|---|
| 366 | QByteArray QSslKey::toPem(const QByteArray &passPhrase) const
|
|---|
| 367 | {
|
|---|
| 368 | if (!QSslSocket::supportsSsl() || d->isNull)
|
|---|
| 369 | return QByteArray();
|
|---|
| 370 |
|
|---|
| 371 | BIO *bio = q_BIO_new(q_BIO_s_mem());
|
|---|
| 372 | if (!bio)
|
|---|
| 373 | return QByteArray();
|
|---|
| 374 |
|
|---|
| 375 | bool fail = false;
|
|---|
| 376 |
|
|---|
| 377 | if (d->algorithm == QSsl::Rsa) {
|
|---|
| 378 | if (d->type == QSsl::PublicKey) {
|
|---|
| 379 | if (!q_PEM_write_bio_RSA_PUBKEY(bio, d->rsa))
|
|---|
| 380 | fail = true;
|
|---|
| 381 | } else {
|
|---|
| 382 | if (!q_PEM_write_bio_RSAPrivateKey(
|
|---|
| 383 | bio, d->rsa,
|
|---|
| 384 | // ### the cipher should be selectable in the API:
|
|---|
| 385 | passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(),
|
|---|
| 386 | (uchar *)passPhrase.data(), passPhrase.size(), 0, 0)) {
|
|---|
| 387 | fail = true;
|
|---|
| 388 | }
|
|---|
| 389 | }
|
|---|
| 390 | } else {
|
|---|
| 391 | if (d->type == QSsl::PublicKey) {
|
|---|
| 392 | if (!q_PEM_write_bio_DSA_PUBKEY(bio, d->dsa))
|
|---|
| 393 | fail = true;
|
|---|
| 394 | } else {
|
|---|
| 395 | if (!q_PEM_write_bio_DSAPrivateKey(
|
|---|
| 396 | bio, d->dsa,
|
|---|
| 397 | // ### the cipher should be selectable in the API:
|
|---|
| 398 | passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(),
|
|---|
| 399 | (uchar *)passPhrase.data(), passPhrase.size(), 0, 0)) {
|
|---|
| 400 | fail = true;
|
|---|
| 401 | }
|
|---|
| 402 | }
|
|---|
| 403 | }
|
|---|
| 404 |
|
|---|
| 405 | QByteArray pem;
|
|---|
| 406 | if (!fail) {
|
|---|
| 407 | char *data;
|
|---|
| 408 | long size = q_BIO_get_mem_data(bio, &data);
|
|---|
| 409 | pem = QByteArray(data, size);
|
|---|
| 410 | }
|
|---|
| 411 | q_BIO_free(bio);
|
|---|
| 412 | return pem;
|
|---|
| 413 | }
|
|---|
| 414 |
|
|---|
| 415 | /*!
|
|---|
| 416 | Returns a pointer to the native key handle, if it is available;
|
|---|
| 417 | otherwise a null pointer is returned.
|
|---|
| 418 |
|
|---|
| 419 | You can use this handle together with the native API to access
|
|---|
| 420 | extended information about the key.
|
|---|
| 421 |
|
|---|
| 422 | \warning Use of this function has a high probability of being
|
|---|
| 423 | non-portable, and its return value may vary across platforms, and
|
|---|
| 424 | between minor Qt releases.
|
|---|
| 425 | */
|
|---|
| 426 | Qt::HANDLE QSslKey::handle() const
|
|---|
| 427 | {
|
|---|
| 428 | return (d->algorithm == QSsl::Rsa) ? Qt::HANDLE(d->rsa) : Qt::HANDLE(d->dsa);
|
|---|
| 429 | }
|
|---|
| 430 |
|
|---|
| 431 | /*!
|
|---|
| 432 | Returns true if this key is equal to \a other; otherwise returns false.
|
|---|
| 433 | */
|
|---|
| 434 | bool QSslKey::operator==(const QSslKey &other) const
|
|---|
| 435 | {
|
|---|
| 436 | if (isNull())
|
|---|
| 437 | return other.isNull();
|
|---|
| 438 | if (other.isNull())
|
|---|
| 439 | return isNull();
|
|---|
| 440 | if (algorithm() != other.algorithm())
|
|---|
| 441 | return false;
|
|---|
| 442 | if (type() != other.type())
|
|---|
| 443 | return false;
|
|---|
| 444 | if (length() != other.length())
|
|---|
| 445 | return false;
|
|---|
| 446 | return toDer() == other.toDer();
|
|---|
| 447 | }
|
|---|
| 448 |
|
|---|
| 449 | /*! \fn bool QSslKey::operator!=(const QSslKey &other) const
|
|---|
| 450 |
|
|---|
| 451 | Returns true if this key is not equal to key \a other; otherwise
|
|---|
| 452 | returns false.
|
|---|
| 453 | */
|
|---|
| 454 |
|
|---|
| 455 | #ifndef QT_NO_DEBUG_STREAM
|
|---|
| 456 | class QDebug;
|
|---|
| 457 | QDebug operator<<(QDebug debug, const QSslKey &key)
|
|---|
| 458 | {
|
|---|
| 459 | debug << "QSslKey("
|
|---|
| 460 | << (key.type() == QSsl::PublicKey ? "PublicKey" : "PrivateKey")
|
|---|
| 461 | << ", " << (key.algorithm() == QSsl::Rsa ? "RSA" : "DSA")
|
|---|
| 462 | << ", " << key.length()
|
|---|
| 463 | << ")";
|
|---|
| 464 | return debug;
|
|---|
| 465 | }
|
|---|
| 466 | #endif
|
|---|
| 467 |
|
|---|
| 468 | QT_END_NAMESPACE
|
|---|