summaryrefslogtreecommitdiffstats
path: root/tdeio/kssl/ksslcertificatehome.cc
diff options
context:
space:
mode:
authorMichele Calgaro <michele.calgaro@yahoo.it>2020-12-06 21:23:48 +0900
committerMichele Calgaro <michele.calgaro@yahoo.it>2020-12-06 21:24:20 +0900
commit4f99f868f09bbffa2e15733b8b7c78eba07a199e (patch)
tree3fb0957e93160f69f55942fff50a2ad496bf4f4c /tdeio/kssl/ksslcertificatehome.cc
parent19f44e5ff3756172540e768fc0d08d761f0c374e (diff)
downloadtdelibs-4f99f868f09bbffa2e15733b8b7c78eba07a199e.tar.gz
tdelibs-4f99f868f09bbffa2e15733b8b7c78eba07a199e.zip
Renaming of files in preparation for code style tools.
Signed-off-by: Michele Calgaro <michele.calgaro@yahoo.it>
Diffstat (limited to 'tdeio/kssl/ksslcertificatehome.cc')
-rw-r--r--tdeio/kssl/ksslcertificatehome.cc246
1 files changed, 0 insertions, 246 deletions
diff --git a/tdeio/kssl/ksslcertificatehome.cc b/tdeio/kssl/ksslcertificatehome.cc
deleted file mode 100644
index 39470c5ab..000000000
--- a/tdeio/kssl/ksslcertificatehome.cc
+++ /dev/null
@@ -1,246 +0,0 @@
-/* This file is part of the KDE project
- *
- * Copyright (C) 2000-2005 George Staikos <staikos@kde.org>
- *
- * This library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Library General Public
- * License as published by the Free Software Foundation; either
- * version 2 of the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Library General Public License for more details.
- *
- * You should have received a copy of the GNU Library General Public License
- * along with this library; see the file COPYING.LIB. If not, write to
- * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
- * Boston, MA 02110-1301, USA.
- */
-
-#include <ksslcertificatehome.h>
-#include <ksslcertificate.h>
-#include <ksslpkcs12.h>
-
-#include <kresolver.h>
-#include <ksimpleconfig.h>
-
-using namespace KNetwork;
-
-TQStringList KSSLCertificateHome::getCertificateList() {
-KSimpleConfig cfg("ksslcertificates", false);
-TQStringList list = cfg.groupList();
-TQString defaultstr("<default>");
-TQString blankstr("");
-
-list.remove(defaultstr);
-list.remove(blankstr);
-
-return list;
-}
-
-
-// KDE 4: make it const TQString &
-void KSSLCertificateHome::setDefaultCertificate(TQString name, TQString host, bool send, bool prompt) {
-KSimpleConfig cfg("ksslauthmap", false);
-
-#ifdef Q_WS_WIN //temporary
- cfg.setGroup(host);
-#else
- cfg.setGroup(KResolver::domainToAscii(host));
-#endif
- cfg.writeEntry("certificate", name);
- cfg.writeEntry("send", send);
- cfg.writeEntry("prompt", prompt);
- cfg.sync();
-}
-
-
-// KDE 4: make it const TQString &
-void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, TQString host, bool send, bool prompt) {
- if (cert)
- KSSLCertificateHome::setDefaultCertificate(cert->name(), host, send, prompt);
-}
-
-
-// KDE 4: make it const TQString &
-bool KSSLCertificateHome::addCertificate(TQString filename, TQString password, bool storePass) {
-KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
-
- if (!pkcs) return false;
-
- KSSLCertificateHome::addCertificate(pkcs, storePass?password:TQString(""));
- delete pkcs;
-
-return true;
-}
-
-
-// KDE 4: make it const TQString &
-bool KSSLCertificateHome::addCertificate(KSSLPKCS12 *cert, TQString passToStore) {
- if (!cert) return false;
-
-KSimpleConfig cfg("ksslcertificates", false);
-
- cfg.setGroup(cert->name());
- cfg.writeEntry("PKCS12Base64", cert->toString());
- cfg.writeEntry("Password", passToStore);
- cfg.sync();
-return true;
-}
-
-bool KSSLCertificateHome::deleteCertificate(const TQString &filename, const TQString &password) {
-KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
-
- if (!pkcs) return false;
-
- bool ok = deleteCertificate(pkcs);
- delete pkcs;
-
-return ok;
-}
-
-bool KSSLCertificateHome::deleteCertificate(KSSLPKCS12 *cert) {
- if (!cert) return false;
-
- return deleteCertificateByName(cert->name());
-}
-
-bool KSSLCertificateHome::deleteCertificateByName(const TQString &name) {
- if (name.isEmpty()) return false;
-
-KSimpleConfig cfg("ksslcertificates", false);
-
- bool ok = cfg.deleteGroup(name);
- cfg.sync();
-
-return ok;
-}
-
-// KDE 4: make it const TQString &
-KSSLPKCS12* KSSLCertificateHome::getCertificateByName(TQString name, TQString password) {
-KSimpleConfig cfg("ksslcertificates", false);
- if (!cfg.hasGroup(name)) return NULL;
-
- cfg.setGroup(name);
-
- return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
-}
-
-
-// KDE 4: make it const TQString &
-KSSLPKCS12* KSSLCertificateHome::getCertificateByName(TQString name) {
-KSimpleConfig cfg("ksslcertificates", false);
- if (!cfg.hasGroup(name)) return NULL;
-
- cfg.setGroup(name);
-
- return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), cfg.readEntry("Password", ""));
-}
-
-
-// KDE 4: make it const TQString &
-bool KSSLCertificateHome::hasCertificateByName(TQString name) {
-KSimpleConfig cfg("ksslcertificates", false);
- if (!cfg.hasGroup(name)) return false;
- return true;
-}
-
-// KDE 4: make it const TQString &
-KSSLPKCS12* KSSLCertificateHome::getCertificateByHost(TQString host, TQString password, KSSLAuthAction *aa) {
- return KSSLCertificateHome::getCertificateByName(KSSLCertificateHome::getDefaultCertificateName(host, aa), password);
-}
-
-
-// KDE 4: make it const TQString &
-TQString KSSLCertificateHome::getDefaultCertificateName(TQString host, KSSLAuthAction *aa) {
-KSimpleConfig cfg("ksslauthmap", false);
-
-#ifdef Q_WS_WIN //temporary
- if (!cfg.hasGroup(host)) {
-#else
- if (!cfg.hasGroup(KResolver::domainToAscii(host))) {
-#endif
- if (aa) *aa = AuthNone;
- return TQString::null;
- } else {
-#ifdef Q_WS_WIN //temporary
- cfg.setGroup(host);
-#else
- cfg.setGroup(KResolver::domainToAscii(host));
-#endif
- if (aa) {
- bool tmp = cfg.readBoolEntry("send", false);
- *aa = AuthSend;
- if (!tmp) {
- tmp = cfg.readBoolEntry("prompt", false);
- *aa = AuthPrompt;
- if (!tmp) {
- *aa = AuthDont;
- }
- }
- }
- return cfg.readEntry("certificate", "");
- }
-}
-
-
-TQString KSSLCertificateHome::getDefaultCertificateName(KSSLAuthAction *aa) {
-TDEConfig cfg("cryptodefaults", false);
-
- cfg.setGroup("Auth");
- if (aa) {
- TQString am = cfg.readEntry("AuthMethod", "");
- if (am == "send")
- *aa = AuthSend;
- else if (am == "prompt")
- *aa = AuthPrompt;
- else
- *aa = AuthDont;
- }
-
-return cfg.readEntry("DefaultCert", "");
-}
-
-
-// KDE 4: make it const TQString &
-KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(TQString password, KSSLAuthAction *aa) {
-TQString name = KSSLCertificateHome::getDefaultCertificateName(aa);
-KSimpleConfig cfg("ksslcertificates", false);
-
- if (name.isEmpty()) return NULL;
-
- cfg.setGroup(name);
- return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
-}
-
-
-
-KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(KSSLAuthAction *aa) {
-TQString name = KSSLCertificateHome::getDefaultCertificateName(aa);
-KSimpleConfig cfg("ksslcertificates", false);
-
- if (name.isEmpty()) return NULL;
-
- cfg.setGroup(name);
- return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""),
- cfg.readEntry("Password", ""));
-}
-
-
-// KDE 4: make it const TQString &
-void KSSLCertificateHome::setDefaultCertificate(TQString name, bool send, bool prompt) {
-KSimpleConfig cfg("ksslauthmap", false);
-
- cfg.setGroup("<default>");
- cfg.writeEntry("defaultCertificate", name);
- cfg.writeEntry("send", send);
- cfg.writeEntry("prompt", prompt);
-}
-
-
-void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, bool send, bool prompt) {
- if (cert)
- KSSLCertificateHome::setDefaultCertificate(cert->name(), send, prompt);
-}
-