summaryrefslogtreecommitdiffstats
path: root/tdeio/kssl/ksslcertificatehome.cpp
diff options
context:
space:
mode:
authorMichele Calgaro <michele.calgaro@yahoo.it>2020-12-06 21:23:48 +0900
committerMichele Calgaro <michele.calgaro@yahoo.it>2020-12-06 21:24:20 +0900
commit4f99f868f09bbffa2e15733b8b7c78eba07a199e (patch)
tree3fb0957e93160f69f55942fff50a2ad496bf4f4c /tdeio/kssl/ksslcertificatehome.cpp
parent19f44e5ff3756172540e768fc0d08d761f0c374e (diff)
downloadtdelibs-4f99f868f09bbffa2e15733b8b7c78eba07a199e.tar.gz
tdelibs-4f99f868f09bbffa2e15733b8b7c78eba07a199e.zip
Renaming of files in preparation for code style tools.
Signed-off-by: Michele Calgaro <michele.calgaro@yahoo.it>
Diffstat (limited to 'tdeio/kssl/ksslcertificatehome.cpp')
-rw-r--r--tdeio/kssl/ksslcertificatehome.cpp246
1 files changed, 246 insertions, 0 deletions
diff --git a/tdeio/kssl/ksslcertificatehome.cpp b/tdeio/kssl/ksslcertificatehome.cpp
new file mode 100644
index 000000000..39470c5ab
--- /dev/null
+++ b/tdeio/kssl/ksslcertificatehome.cpp
@@ -0,0 +1,246 @@
+/* This file is part of the KDE project
+ *
+ * Copyright (C) 2000-2005 George Staikos <staikos@kde.org>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Library General Public
+ * License as published by the Free Software Foundation; either
+ * version 2 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Library General Public License for more details.
+ *
+ * You should have received a copy of the GNU Library General Public License
+ * along with this library; see the file COPYING.LIB. If not, write to
+ * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ * Boston, MA 02110-1301, USA.
+ */
+
+#include <ksslcertificatehome.h>
+#include <ksslcertificate.h>
+#include <ksslpkcs12.h>
+
+#include <kresolver.h>
+#include <ksimpleconfig.h>
+
+using namespace KNetwork;
+
+TQStringList KSSLCertificateHome::getCertificateList() {
+KSimpleConfig cfg("ksslcertificates", false);
+TQStringList list = cfg.groupList();
+TQString defaultstr("<default>");
+TQString blankstr("");
+
+list.remove(defaultstr);
+list.remove(blankstr);
+
+return list;
+}
+
+
+// KDE 4: make it const TQString &
+void KSSLCertificateHome::setDefaultCertificate(TQString name, TQString host, bool send, bool prompt) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+#ifdef Q_WS_WIN //temporary
+ cfg.setGroup(host);
+#else
+ cfg.setGroup(KResolver::domainToAscii(host));
+#endif
+ cfg.writeEntry("certificate", name);
+ cfg.writeEntry("send", send);
+ cfg.writeEntry("prompt", prompt);
+ cfg.sync();
+}
+
+
+// KDE 4: make it const TQString &
+void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, TQString host, bool send, bool prompt) {
+ if (cert)
+ KSSLCertificateHome::setDefaultCertificate(cert->name(), host, send, prompt);
+}
+
+
+// KDE 4: make it const TQString &
+bool KSSLCertificateHome::addCertificate(TQString filename, TQString password, bool storePass) {
+KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
+
+ if (!pkcs) return false;
+
+ KSSLCertificateHome::addCertificate(pkcs, storePass?password:TQString(""));
+ delete pkcs;
+
+return true;
+}
+
+
+// KDE 4: make it const TQString &
+bool KSSLCertificateHome::addCertificate(KSSLPKCS12 *cert, TQString passToStore) {
+ if (!cert) return false;
+
+KSimpleConfig cfg("ksslcertificates", false);
+
+ cfg.setGroup(cert->name());
+ cfg.writeEntry("PKCS12Base64", cert->toString());
+ cfg.writeEntry("Password", passToStore);
+ cfg.sync();
+return true;
+}
+
+bool KSSLCertificateHome::deleteCertificate(const TQString &filename, const TQString &password) {
+KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
+
+ if (!pkcs) return false;
+
+ bool ok = deleteCertificate(pkcs);
+ delete pkcs;
+
+return ok;
+}
+
+bool KSSLCertificateHome::deleteCertificate(KSSLPKCS12 *cert) {
+ if (!cert) return false;
+
+ return deleteCertificateByName(cert->name());
+}
+
+bool KSSLCertificateHome::deleteCertificateByName(const TQString &name) {
+ if (name.isEmpty()) return false;
+
+KSimpleConfig cfg("ksslcertificates", false);
+
+ bool ok = cfg.deleteGroup(name);
+ cfg.sync();
+
+return ok;
+}
+
+// KDE 4: make it const TQString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByName(TQString name, TQString password) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return NULL;
+
+ cfg.setGroup(name);
+
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
+}
+
+
+// KDE 4: make it const TQString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByName(TQString name) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return NULL;
+
+ cfg.setGroup(name);
+
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), cfg.readEntry("Password", ""));
+}
+
+
+// KDE 4: make it const TQString &
+bool KSSLCertificateHome::hasCertificateByName(TQString name) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return false;
+ return true;
+}
+
+// KDE 4: make it const TQString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByHost(TQString host, TQString password, KSSLAuthAction *aa) {
+ return KSSLCertificateHome::getCertificateByName(KSSLCertificateHome::getDefaultCertificateName(host, aa), password);
+}
+
+
+// KDE 4: make it const TQString &
+TQString KSSLCertificateHome::getDefaultCertificateName(TQString host, KSSLAuthAction *aa) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+#ifdef Q_WS_WIN //temporary
+ if (!cfg.hasGroup(host)) {
+#else
+ if (!cfg.hasGroup(KResolver::domainToAscii(host))) {
+#endif
+ if (aa) *aa = AuthNone;
+ return TQString::null;
+ } else {
+#ifdef Q_WS_WIN //temporary
+ cfg.setGroup(host);
+#else
+ cfg.setGroup(KResolver::domainToAscii(host));
+#endif
+ if (aa) {
+ bool tmp = cfg.readBoolEntry("send", false);
+ *aa = AuthSend;
+ if (!tmp) {
+ tmp = cfg.readBoolEntry("prompt", false);
+ *aa = AuthPrompt;
+ if (!tmp) {
+ *aa = AuthDont;
+ }
+ }
+ }
+ return cfg.readEntry("certificate", "");
+ }
+}
+
+
+TQString KSSLCertificateHome::getDefaultCertificateName(KSSLAuthAction *aa) {
+TDEConfig cfg("cryptodefaults", false);
+
+ cfg.setGroup("Auth");
+ if (aa) {
+ TQString am = cfg.readEntry("AuthMethod", "");
+ if (am == "send")
+ *aa = AuthSend;
+ else if (am == "prompt")
+ *aa = AuthPrompt;
+ else
+ *aa = AuthDont;
+ }
+
+return cfg.readEntry("DefaultCert", "");
+}
+
+
+// KDE 4: make it const TQString &
+KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(TQString password, KSSLAuthAction *aa) {
+TQString name = KSSLCertificateHome::getDefaultCertificateName(aa);
+KSimpleConfig cfg("ksslcertificates", false);
+
+ if (name.isEmpty()) return NULL;
+
+ cfg.setGroup(name);
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
+}
+
+
+
+KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(KSSLAuthAction *aa) {
+TQString name = KSSLCertificateHome::getDefaultCertificateName(aa);
+KSimpleConfig cfg("ksslcertificates", false);
+
+ if (name.isEmpty()) return NULL;
+
+ cfg.setGroup(name);
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""),
+ cfg.readEntry("Password", ""));
+}
+
+
+// KDE 4: make it const TQString &
+void KSSLCertificateHome::setDefaultCertificate(TQString name, bool send, bool prompt) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+ cfg.setGroup("<default>");
+ cfg.writeEntry("defaultCertificate", name);
+ cfg.writeEntry("send", send);
+ cfg.writeEntry("prompt", prompt);
+}
+
+
+void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, bool send, bool prompt) {
+ if (cert)
+ KSSLCertificateHome::setDefaultCertificate(cert->name(), send, prompt);
+}
+