summaryrefslogtreecommitdiffstats
path: root/kio/kssl/ksslcertificatecache.h
diff options
context:
space:
mode:
authortoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
committertoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
commitce4a32fe52ef09d8f5ff1dd22c001110902b60a2 (patch)
tree5ac38a06f3dde268dc7927dc155896926aaf7012 /kio/kssl/ksslcertificatecache.h
downloadtdelibs-ce4a32fe52ef09d8f5ff1dd22c001110902b60a2.tar.gz
tdelibs-ce4a32fe52ef09d8f5ff1dd22c001110902b60a2.zip
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdelibs@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'kio/kssl/ksslcertificatecache.h')
-rw-r--r--kio/kssl/ksslcertificatecache.h107
1 files changed, 107 insertions, 0 deletions
diff --git a/kio/kssl/ksslcertificatecache.h b/kio/kssl/ksslcertificatecache.h
new file mode 100644
index 000000000..5c640a2a2
--- /dev/null
+++ b/kio/kssl/ksslcertificatecache.h
@@ -0,0 +1,107 @@
+/* This file is part of the KDE project
+ *
+ * Copyright (C) 2000, 2001 George Staikos <staikos@kde.org>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Library General Public
+ * License as published by the Free Software Foundation; either
+ * version 2 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Library General Public License for more details.
+ *
+ * You should have received a copy of the GNU Library General Public License
+ * along with this library; see the file COPYING.LIB. If not, write to
+ * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ * Boston, MA 02110-1301, USA.
+ */
+
+#ifndef _INCLUDE_KSSLCCACHE_H
+#define _INCLUDE_KSSLCCACHE_H
+
+class KSSLCertificate;
+#include <qstring.h>
+#include <qstringlist.h>
+#include <qdatetime.h>
+
+#include <kdelibs_export.h>
+
+class KIO_EXPORT KSSLCertificateCache {
+public:
+
+enum KSSLCertificatePolicy { Unknown, Reject, Accept, Prompt, Ambiguous };
+// Unknown: no policy has been set for this record
+// Reject: user has requested to not accept data from this site
+// Accept: user has requested to always accept data from this site
+// Prompt: user wishes to be prompted before accepting this certificate
+// You may need to set a [non-]permanent policy on this record after
+// the user is prompted.
+// Ambiguous: The state cannot be uniquely determined. Hopefully this
+// doesn't happen.
+
+ KSSLCertificateCache();
+ ~KSSLCertificateCache();
+
+ void addCertificate(KSSLCertificate& cert, KSSLCertificatePolicy policy,
+ bool permanent = true);
+
+ // WARNING! This is not a "secure" method. You need to actually
+ // do a getPolicyByCertificate to be cryptographically sure
+ // that this is an accepted certificate/site pair.
+ // (note that the site (CN) is encoded in the certificate
+ // so you should only accept certificates whose CN matches
+ // the exact FQDN of the site presenting it)
+ // If you're just doing an OpenSSL connection, I believe it
+ // tests this for you, but don't take my word for it.
+ KSSLCertificatePolicy getPolicyByCN(QString& cn);
+
+ KSSLCertificatePolicy getPolicyByCertificate(KSSLCertificate& cert);
+
+ bool seenCN(QString& cn);
+ bool seenCertificate(KSSLCertificate& cert);
+
+ bool removeByCN(QString& cn);
+ bool removeByCertificate(KSSLCertificate& cert);
+
+ bool isPermanent(KSSLCertificate& cert);
+
+ bool modifyByCN(QString& cn,
+ KSSLCertificateCache::KSSLCertificatePolicy policy,
+ bool permanent,
+ QDateTime& expires);
+
+ bool modifyByCertificate(KSSLCertificate& cert,
+ KSSLCertificateCache::KSSLCertificatePolicy policy,
+ bool permanent,
+ QDateTime& expires);
+
+ QStringList getHostList(KSSLCertificate& cert);
+ bool addHost(KSSLCertificate& cert, QString& host);
+ bool removeHost(KSSLCertificate& cert, QString& host);
+
+ // SMIME
+ QStringList getKDEKeyByEmail(const QString &email);
+ KSSLCertificate *getCertByMD5Digest(const QString &key);
+
+ void reload();
+
+ // You shouldn't need to call this but in some weird circumstances
+ // it might be necessary.
+ void saveToDisk();
+
+private:
+ class KSSLCertificateCachePrivate;
+ KSSLCertificateCachePrivate *d;
+
+ void loadDefaultPolicies();
+ void clearList();
+
+};
+
+
+KIO_EXPORT QDataStream& operator<<(QDataStream& s, const KSSLCertificateCache::KSSLCertificatePolicy& p);
+KIO_EXPORT QDataStream& operator>>(QDataStream& s, KSSLCertificateCache::KSSLCertificatePolicy& p);
+
+#endif