Line | Source Code | Coverage |
---|
1 | /**************************************************************************** | - |
2 | ** | - |
3 | ** Copyright (C) 2013 Digia Plc and/or its subsidiary(-ies). | - |
4 | ** Contact: http://www.qt-project.org/legal | - |
5 | ** | - |
6 | ** This file is part of the QtNetwork module of the Qt Toolkit. | - |
7 | ** | - |
8 | ** $QT_BEGIN_LICENSE:LGPL$ | - |
9 | ** Commercial License Usage | - |
10 | ** Licensees holding valid commercial Qt licenses may use this file in | - |
11 | ** accordance with the commercial license agreement provided with the | - |
12 | ** Software or, alternatively, in accordance with the terms contained in | - |
13 | ** a written agreement between you and Digia. For licensing terms and | - |
14 | ** conditions see http://qt.digia.com/licensing. For further information | - |
15 | ** use the contact form at http://qt.digia.com/contact-us. | - |
16 | ** | - |
17 | ** GNU Lesser General Public License Usage | - |
18 | ** Alternatively, this file may be used under the terms of the GNU Lesser | - |
19 | ** General Public License version 2.1 as published by the Free Software | - |
20 | ** Foundation and appearing in the file LICENSE.LGPL included in the | - |
21 | ** packaging of this file. Please review the following information to | - |
22 | ** ensure the GNU Lesser General Public License version 2.1 requirements | - |
23 | ** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. | - |
24 | ** | - |
25 | ** In addition, as a special exception, Digia gives you certain additional | - |
26 | ** rights. These rights are described in the Digia Qt LGPL Exception | - |
27 | ** version 1.1, included in the file LGPL_EXCEPTION.txt in this package. | - |
28 | ** | - |
29 | ** GNU General Public License Usage | - |
30 | ** Alternatively, this file may be used under the terms of the GNU | - |
31 | ** General Public License version 3.0 as published by the Free Software | - |
32 | ** Foundation and appearing in the file LICENSE.GPL included in the | - |
33 | ** packaging of this file. Please review the following information to | - |
34 | ** ensure the GNU General Public License version 3.0 requirements will be | - |
35 | ** met: http://www.gnu.org/copyleft/gpl.html. | - |
36 | ** | - |
37 | ** | - |
38 | ** $QT_END_LICENSE$ | - |
39 | ** | - |
40 | ****************************************************************************/ | - |
41 | | - |
42 | | - |
43 | /*! | - |
44 | \class QSslKey | - |
45 | \brief The QSslKey class provides an interface for private and public keys. | - |
46 | \since 4.3 | - |
47 | | - |
48 | \reentrant | - |
49 | \ingroup network | - |
50 | \ingroup ssl | - |
51 | \ingroup shared | - |
52 | \inmodule QtNetwork | - |
53 | | - |
54 | QSslKey provides a simple API for managing keys. | - |
55 | | - |
56 | \sa QSslSocket, QSslCertificate, QSslCipher | - |
57 | */ | - |
58 | | - |
59 | #include "qsslkey.h" | - |
60 | #include "qsslkey_p.h" | - |
61 | #include "qsslsocket_openssl_symbols_p.h" | - |
62 | #include "qsslsocket.h" | - |
63 | #include "qsslsocket_p.h" | - |
64 | | - |
65 | #include <QtCore/qatomic.h> | - |
66 | #include <QtCore/qbytearray.h> | - |
67 | #include <QtCore/qiodevice.h> | - |
68 | #ifndef QT_NO_DEBUG_STREAM | - |
69 | #include <QtCore/qdebug.h> | - |
70 | #endif | - |
71 | | - |
72 | QT_BEGIN_NAMESPACE | - |
73 | | - |
74 | /*! | - |
75 | \internal | - |
76 | */ | - |
77 | void QSslKeyPrivate::clear(bool deep) | - |
78 | { | - |
79 | isNull = true; executed (the execution status of this line is deduced): isNull = true; | - |
80 | if (!QSslSocket::supportsSsl()) partially evaluated: !QSslSocket::supportsSsl() no Evaluation Count:0 | yes Evaluation Count:10894 |
| 0-10894 |
81 | return; | 0 |
82 | if (rsa) { evaluated: rsa yes Evaluation Count:297 | yes Evaluation Count:10597 |
| 297-10597 |
83 | if (deep) partially evaluated: deep yes Evaluation Count:297 | no Evaluation Count:0 |
| 0-297 |
84 | q_RSA_free(rsa); executed: q_RSA_free(rsa); Execution Count:297 | 297 |
85 | rsa = 0; executed (the execution status of this line is deduced): rsa = 0; | - |
86 | } executed: } Execution Count:297 | 297 |
87 | if (dsa) { evaluated: dsa yes Evaluation Count:160 | yes Evaluation Count:10734 |
| 160-10734 |
88 | if (deep) partially evaluated: deep yes Evaluation Count:160 | no Evaluation Count:0 |
| 0-160 |
89 | q_DSA_free(dsa); executed: q_DSA_free(dsa); Execution Count:160 | 160 |
90 | dsa = 0; executed (the execution status of this line is deduced): dsa = 0; | - |
91 | } executed: } Execution Count:160 | 160 |
92 | if (opaque) { partially evaluated: opaque no Evaluation Count:0 | yes Evaluation Count:10894 |
| 0-10894 |
93 | if (deep) | 0 |
94 | q_EVP_PKEY_free(opaque); never executed: q_EVP_PKEY_free(opaque); | 0 |
95 | opaque = 0; never executed (the execution status of this line is deduced): opaque = 0; | - |
96 | } | 0 |
97 | } executed: } Execution Count:10894 | 10894 |
98 | | - |
99 | /*! | - |
100 | \internal | - |
101 | | - |
102 | Allocates a new rsa or dsa struct and decodes \a pem into it | - |
103 | according to the current algorithm and type. | - |
104 | | - |
105 | If \a deepClear is true, the rsa/dsa struct is freed if it is was | - |
106 | already allocated, otherwise we "leak" memory (which is exactly | - |
107 | what we want for copy construction). | - |
108 | | - |
109 | If \a passPhrase is non-empty, it will be used for decrypting | - |
110 | \a pem. | - |
111 | */ | - |
112 | void QSslKeyPrivate::decodePem(const QByteArray &pem, const QByteArray &passPhrase, | - |
113 | bool deepClear) | - |
114 | { | - |
115 | if (pem.isEmpty()) partially evaluated: pem.isEmpty() no Evaluation Count:0 | yes Evaluation Count:542 |
| 0-542 |
116 | return; | 0 |
117 | | - |
118 | clear(deepClear); executed (the execution status of this line is deduced): clear(deepClear); | - |
119 | | - |
120 | if (!QSslSocket::supportsSsl()) partially evaluated: !QSslSocket::supportsSsl() no Evaluation Count:0 | yes Evaluation Count:542 |
| 0-542 |
121 | return; | 0 |
122 | | - |
123 | BIO *bio = q_BIO_new_mem_buf(const_cast<char *>(pem.data()), pem.size()); executed (the execution status of this line is deduced): BIO *bio = q_BIO_new_mem_buf(const_cast<char *>(pem.data()), pem.size()); | - |
124 | if (!bio) partially evaluated: !bio no Evaluation Count:0 | yes Evaluation Count:542 |
| 0-542 |
125 | return; | 0 |
126 | | - |
127 | void *phrase = (void *)passPhrase.constData(); executed (the execution status of this line is deduced): void *phrase = (void *)passPhrase.constData(); | - |
128 | | - |
129 | if (algorithm == QSsl::Rsa) { evaluated: algorithm == QSsl::Rsa yes Evaluation Count:350 | yes Evaluation Count:192 |
| 192-350 |
130 | RSA *result = (type == QSsl::PublicKey) evaluated: (type == QSsl::PublicKey) yes Evaluation Count:116 | yes Evaluation Count:234 |
| 116-234 |
131 | ? q_PEM_read_bio_RSA_PUBKEY(bio, &rsa, 0, phrase) executed (the execution status of this line is deduced): ? q_PEM_read_bio_RSA_PUBKEY(bio, &rsa, 0, phrase) | - |
132 | : q_PEM_read_bio_RSAPrivateKey(bio, &rsa, 0, phrase); executed (the execution status of this line is deduced): : q_PEM_read_bio_RSAPrivateKey(bio, &rsa, 0, phrase); | - |
133 | if (rsa && rsa == result) evaluated: rsa yes Evaluation Count:291 | yes Evaluation Count:59 |
partially evaluated: rsa == result yes Evaluation Count:291 | no Evaluation Count:0 |
| 0-291 |
134 | isNull = false; executed: isNull = false; Execution Count:291 | 291 |
135 | } else { executed: } Execution Count:350 | 350 |
136 | DSA *result = (type == QSsl::PublicKey) evaluated: (type == QSsl::PublicKey) yes Evaluation Count:64 | yes Evaluation Count:128 |
| 64-128 |
137 | ? q_PEM_read_bio_DSA_PUBKEY(bio, &dsa, 0, phrase) executed (the execution status of this line is deduced): ? q_PEM_read_bio_DSA_PUBKEY(bio, &dsa, 0, phrase) | - |
138 | : q_PEM_read_bio_DSAPrivateKey(bio, &dsa, 0, phrase); executed (the execution status of this line is deduced): : q_PEM_read_bio_DSAPrivateKey(bio, &dsa, 0, phrase); | - |
139 | if (dsa && dsa == result) evaluated: dsa yes Evaluation Count:160 | yes Evaluation Count:32 |
partially evaluated: dsa == result yes Evaluation Count:160 | no Evaluation Count:0 |
| 0-160 |
140 | isNull = false; executed: isNull = false; Execution Count:160 | 160 |
141 | } executed: } Execution Count:192 | 192 |
142 | | - |
143 | q_BIO_free(bio); executed (the execution status of this line is deduced): q_BIO_free(bio); | - |
144 | } executed: } Execution Count:542 | 542 |
145 | | - |
146 | /*! | - |
147 | Constructs a null key. | - |
148 | | - |
149 | \sa isNull() | - |
150 | */ | - |
151 | QSslKey::QSslKey() | - |
152 | : d(new QSslKeyPrivate) | - |
153 | { | - |
154 | } executed: } Execution Count:4634 | 4634 |
155 | | - |
156 | /*! | - |
157 | \internal | - |
158 | */ | - |
159 | QByteArray QSslKeyPrivate::pemHeader() const | - |
160 | { | - |
161 | // ### use QByteArray::fromRawData() instead | - |
162 | if (type == QSsl::PublicKey) evaluated: type == QSsl::PublicKey yes Evaluation Count:463 | yes Evaluation Count:627 |
| 463-627 |
163 | return QByteArray("-----BEGIN PUBLIC KEY-----\n"); executed: return QByteArray("-----BEGIN PUBLIC KEY-----\n"); Execution Count:463 | 463 |
164 | else if (algorithm == QSsl::Rsa) evaluated: algorithm == QSsl::Rsa yes Evaluation Count:399 | yes Evaluation Count:228 |
| 228-399 |
165 | return QByteArray("-----BEGIN RSA PRIVATE KEY-----\n"); executed: return QByteArray("-----BEGIN RSA PRIVATE KEY-----\n"); Execution Count:399 | 399 |
166 | return QByteArray("-----BEGIN DSA PRIVATE KEY-----\n"); executed: return QByteArray("-----BEGIN DSA PRIVATE KEY-----\n"); Execution Count:228 | 228 |
167 | } | - |
168 | | - |
169 | /*! | - |
170 | \internal | - |
171 | */ | - |
172 | QByteArray QSslKeyPrivate::pemFooter() const | - |
173 | { | - |
174 | // ### use QByteArray::fromRawData() instead | - |
175 | if (type == QSsl::PublicKey) evaluated: type == QSsl::PublicKey yes Evaluation Count:463 | yes Evaluation Count:627 |
| 463-627 |
176 | return QByteArray("-----END PUBLIC KEY-----\n"); executed: return QByteArray("-----END PUBLIC KEY-----\n"); Execution Count:463 | 463 |
177 | else if (algorithm == QSsl::Rsa) evaluated: algorithm == QSsl::Rsa yes Evaluation Count:399 | yes Evaluation Count:228 |
| 228-399 |
178 | return QByteArray("-----END RSA PRIVATE KEY-----\n"); executed: return QByteArray("-----END RSA PRIVATE KEY-----\n"); Execution Count:399 | 399 |
179 | return QByteArray("-----END DSA PRIVATE KEY-----\n"); executed: return QByteArray("-----END DSA PRIVATE KEY-----\n"); Execution Count:228 | 228 |
180 | } | - |
181 | | - |
182 | /*! | - |
183 | \internal | - |
184 | | - |
185 | Returns a DER key formatted as PEM. | - |
186 | */ | - |
187 | QByteArray QSslKeyPrivate::pemFromDer(const QByteArray &der) const | - |
188 | { | - |
189 | QByteArray pem(der.toBase64()); executed (the execution status of this line is deduced): QByteArray pem(der.toBase64()); | - |
190 | | - |
191 | const int lineWidth = 64; // RFC 1421 executed (the execution status of this line is deduced): const int lineWidth = 64; | - |
192 | const int newLines = pem.size() / lineWidth; executed (the execution status of this line is deduced): const int newLines = pem.size() / lineWidth; | - |
193 | const bool rem = pem.size() % lineWidth; executed (the execution status of this line is deduced): const bool rem = pem.size() % lineWidth; | - |
194 | | - |
195 | // ### optimize | - |
196 | for (int i = 0; i < newLines; ++i) evaluated: i < newLines yes Evaluation Count:2054 | yes Evaluation Count:266 |
| 266-2054 |
197 | pem.insert((i + 1) * lineWidth + i, '\n'); executed: pem.insert((i + 1) * lineWidth + i, '\n'); Execution Count:2054 | 2054 |
198 | if (rem) evaluated: rem yes Evaluation Count:250 | yes Evaluation Count:16 |
| 16-250 |
199 | pem.append('\n'); // ### executed: pem.append('\n'); Execution Count:250 | 250 |
200 | | - |
201 | pem.prepend(pemHeader()); executed (the execution status of this line is deduced): pem.prepend(pemHeader()); | - |
202 | pem.append(pemFooter()); executed (the execution status of this line is deduced): pem.append(pemFooter()); | - |
203 | | - |
204 | return pem; executed: return pem; Execution Count:266 | 266 |
205 | } | - |
206 | | - |
207 | /*! | - |
208 | \internal | - |
209 | | - |
210 | Returns a PEM key formatted as DER. | - |
211 | */ | - |
212 | QByteArray QSslKeyPrivate::derFromPem(const QByteArray &pem) const | - |
213 | { | - |
214 | const QByteArray header = pemHeader(); executed (the execution status of this line is deduced): const QByteArray header = pemHeader(); | - |
215 | const QByteArray footer = pemFooter(); executed (the execution status of this line is deduced): const QByteArray footer = pemFooter(); | - |
216 | | - |
217 | QByteArray der(pem); executed (the execution status of this line is deduced): QByteArray der(pem); | - |
218 | | - |
219 | const int headerIndex = der.indexOf(header); executed (the execution status of this line is deduced): const int headerIndex = der.indexOf(header); | - |
220 | const int footerIndex = der.indexOf(footer); executed (the execution status of this line is deduced): const int footerIndex = der.indexOf(footer); | - |
221 | if (headerIndex == -1 || footerIndex == -1) partially evaluated: headerIndex == -1 no Evaluation Count:0 | yes Evaluation Count:824 |
partially evaluated: footerIndex == -1 no Evaluation Count:0 | yes Evaluation Count:824 |
| 0-824 |
222 | return QByteArray(); never executed: return QByteArray(); | 0 |
223 | | - |
224 | der = der.mid(headerIndex + header.size(), footerIndex - (headerIndex + header.size())); executed (the execution status of this line is deduced): der = der.mid(headerIndex + header.size(), footerIndex - (headerIndex + header.size())); | - |
225 | | - |
226 | return QByteArray::fromBase64(der); // ignores newlines executed: return QByteArray::fromBase64(der); Execution Count:824 | 824 |
227 | } | - |
228 | | - |
229 | /*! | - |
230 | Constructs a QSslKey by decoding the string in the byte array | - |
231 | \a encoded using a specified \a algorithm and \a encoding format. | - |
232 | If the encoded key is encrypted, \a passPhrase is used to decrypt | - |
233 | it. \a type specifies whether the key is public or private. | - |
234 | | - |
235 | After construction, use isNull() to check if \a encoded contained | - |
236 | a valid key. | - |
237 | */ | - |
238 | QSslKey::QSslKey(const QByteArray &encoded, QSsl::KeyAlgorithm algorithm, | - |
239 | QSsl::EncodingFormat encoding, QSsl::KeyType type, const QByteArray &passPhrase) | - |
240 | : d(new QSslKeyPrivate) | - |
241 | { | - |
242 | d->type = type; executed (the execution status of this line is deduced): d->type = type; | - |
243 | d->algorithm = algorithm; executed (the execution status of this line is deduced): d->algorithm = algorithm; | - |
244 | d->decodePem((encoding == QSsl::Der) executed (the execution status of this line is deduced): d->decodePem((encoding == QSsl::Der) | - |
245 | ? d->pemFromDer(encoded) : encoded, executed (the execution status of this line is deduced): ? d->pemFromDer(encoded) : encoded, | - |
246 | passPhrase); executed (the execution status of this line is deduced): passPhrase); | - |
247 | } executed: } Execution Count:535 | 535 |
248 | | - |
249 | /*! | - |
250 | Constructs a QSslKey by reading and decoding data from a | - |
251 | \a device using a specified \a algorithm and \a encoding format. | - |
252 | If the encoded key is encrypted, \a passPhrase is used to decrypt | - |
253 | it. \a type specifies whether the key is public or private. | - |
254 | | - |
255 | After construction, use isNull() to check if \a device provided | - |
256 | a valid key. | - |
257 | */ | - |
258 | QSslKey::QSslKey(QIODevice *device, QSsl::KeyAlgorithm algorithm, QSsl::EncodingFormat encoding, | - |
259 | QSsl::KeyType type, const QByteArray &passPhrase) | - |
260 | : d(new QSslKeyPrivate) | - |
261 | { | - |
262 | QByteArray encoded; executed (the execution status of this line is deduced): QByteArray encoded; | - |
263 | if (device) partially evaluated: device yes Evaluation Count:7 | no Evaluation Count:0 |
| 0-7 |
264 | encoded = device->readAll(); executed: encoded = device->readAll(); Execution Count:7 | 7 |
265 | d->type = type; executed (the execution status of this line is deduced): d->type = type; | - |
266 | d->algorithm = algorithm; executed (the execution status of this line is deduced): d->algorithm = algorithm; | - |
267 | d->decodePem((encoding == QSsl::Der) ? executed (the execution status of this line is deduced): d->decodePem((encoding == QSsl::Der) ? | - |
268 | d->pemFromDer(encoded) : encoded, executed (the execution status of this line is deduced): d->pemFromDer(encoded) : encoded, | - |
269 | passPhrase); executed (the execution status of this line is deduced): passPhrase); | - |
270 | } executed: } Execution Count:7 | 7 |
271 | | - |
272 | /*! | - |
273 | \since 5.0 | - |
274 | Constructs a QSslKey from a valid native key \a handle. | - |
275 | \a type specifies whether the key is public or private. | - |
276 | | - |
277 | QSslKey will take ownership for this key and you must not | - |
278 | free the key using the native library. The algorithm used | - |
279 | when creating a key from a handle will always be QSsl::Opaque. | - |
280 | */ | - |
281 | QSslKey::QSslKey(Qt::HANDLE handle, QSsl::KeyType type) | - |
282 | : d(new QSslKeyPrivate) | - |
283 | { | - |
284 | d->opaque = reinterpret_cast<EVP_PKEY *>(handle); never executed (the execution status of this line is deduced): d->opaque = reinterpret_cast<EVP_PKEY *>(handle); | - |
285 | d->algorithm = QSsl::Opaque; never executed (the execution status of this line is deduced): d->algorithm = QSsl::Opaque; | - |
286 | d->type = type; never executed (the execution status of this line is deduced): d->type = type; | - |
287 | d->isNull = !d->opaque; never executed (the execution status of this line is deduced): d->isNull = !d->opaque; | - |
288 | } | 0 |
289 | | - |
290 | /*! | - |
291 | Constructs an identical copy of \a other. | - |
292 | */ | - |
293 | QSslKey::QSslKey(const QSslKey &other) : d(other.d) | - |
294 | { | - |
295 | } executed: } Execution Count:297 | 297 |
296 | | - |
297 | /*! | - |
298 | Destroys the QSslKey object. | - |
299 | */ | - |
300 | QSslKey::~QSslKey() | - |
301 | { | - |
302 | } | - |
303 | | - |
304 | /*! | - |
305 | Copies the contents of \a other into this key, making the two keys | - |
306 | identical. | - |
307 | | - |
308 | Returns a reference to this QSslKey. | - |
309 | */ | - |
310 | QSslKey &QSslKey::operator=(const QSslKey &other) | - |
311 | { | - |
312 | d = other.d; executed (the execution status of this line is deduced): d = other.d; | - |
313 | return *this; executed: return *this; Execution Count:147 | 147 |
314 | } | - |
315 | | - |
316 | /*! | - |
317 | \fn void QSslKey::swap(QSslKey &other) | - |
318 | \since 5.0 | - |
319 | | - |
320 | Swaps this ssl key with \a other. This function is very fast and | - |
321 | never fails. | - |
322 | */ | - |
323 | | - |
324 | /*! | - |
325 | Returns true if this is a null key; otherwise false. | - |
326 | | - |
327 | \sa clear() | - |
328 | */ | - |
329 | bool QSslKey::isNull() const | - |
330 | { | - |
331 | return d->isNull; executed: return d->isNull; Execution Count:979 | 979 |
332 | } | - |
333 | | - |
334 | /*! | - |
335 | Clears the contents of this key, making it a null key. | - |
336 | | - |
337 | \sa isNull() | - |
338 | */ | - |
339 | void QSslKey::clear() | - |
340 | { | - |
341 | d = new QSslKeyPrivate; never executed (the execution status of this line is deduced): d = new QSslKeyPrivate; | - |
342 | } | 0 |
343 | | - |
344 | /*! | - |
345 | Returns the length of the key in bits, or -1 if the key is null. | - |
346 | */ | - |
347 | int QSslKey::length() const | - |
348 | { | - |
349 | if (d->isNull || d->algorithm == QSsl::Opaque) evaluated: d->isNull yes Evaluation Count:1 | yes Evaluation Count:582 |
partially evaluated: d->algorithm == QSsl::Opaque no Evaluation Count:0 | yes Evaluation Count:582 |
| 0-582 |
350 | return -1; executed: return -1; Execution Count:1 | 1 |
351 | | - |
352 | return (d->algorithm == QSsl::Rsa) executed: return (d->algorithm == QSsl::Rsa) ? q_BN_num_bits(d->rsa->n) : q_BN_num_bits(d->dsa->p); Execution Count:582 | 582 |
353 | ? q_BN_num_bits(d->rsa->n) : q_BN_num_bits(d->dsa->p); executed: return (d->algorithm == QSsl::Rsa) ? q_BN_num_bits(d->rsa->n) : q_BN_num_bits(d->dsa->p); Execution Count:582 | 582 |
354 | } | - |
355 | | - |
356 | /*! | - |
357 | Returns the type of the key (i.e., PublicKey or PrivateKey). | - |
358 | */ | - |
359 | QSsl::KeyType QSslKey::type() const | - |
360 | { | - |
361 | return d->type; executed: return d->type; Execution Count:538 | 538 |
362 | } | - |
363 | | - |
364 | /*! | - |
365 | Returns the key algorithm. | - |
366 | */ | - |
367 | QSsl::KeyAlgorithm QSslKey::algorithm() const | - |
368 | { | - |
369 | return d->algorithm; executed: return d->algorithm; Execution Count:728 | 728 |
370 | } | - |
371 | | - |
372 | /*! | - |
373 | Returns the key in DER encoding. The result is encrypted with | - |
374 | \a passPhrase if the key is a private key and \a passPhrase is | - |
375 | non-empty. | - |
376 | */ | - |
377 | // ### autotest failure for non-empty passPhrase and private key | - |
378 | QByteArray QSslKey::toDer(const QByteArray &passPhrase) const | - |
379 | { | - |
380 | if (d->isNull || d->algorithm == QSsl::Opaque) partially evaluated: d->isNull no Evaluation Count:0 | yes Evaluation Count:824 |
partially evaluated: d->algorithm == QSsl::Opaque no Evaluation Count:0 | yes Evaluation Count:824 |
| 0-824 |
381 | return QByteArray(); never executed: return QByteArray(); | 0 |
382 | | - |
383 | return d->derFromPem(toPem(passPhrase)); executed: return d->derFromPem(toPem(passPhrase)); Execution Count:824 | 824 |
384 | } | - |
385 | | - |
386 | /*! | - |
387 | Returns the key in PEM encoding. The result is encrypted with | - |
388 | \a passPhrase if the key is a private key and \a passPhrase is | - |
389 | non-empty. | - |
390 | */ | - |
391 | QByteArray QSslKey::toPem(const QByteArray &passPhrase) const | - |
392 | { | - |
393 | if (!QSslSocket::supportsSsl() || d->isNull || d->algorithm == QSsl::Opaque) partially evaluated: !QSslSocket::supportsSsl() no Evaluation Count:0 | yes Evaluation Count:1638 |
evaluated: d->isNull yes Evaluation Count:88 | yes Evaluation Count:1550 |
partially evaluated: d->algorithm == QSsl::Opaque no Evaluation Count:0 | yes Evaluation Count:1550 |
| 0-1638 |
394 | return QByteArray(); executed: return QByteArray(); Execution Count:88 | 88 |
395 | | - |
396 | BIO *bio = q_BIO_new(q_BIO_s_mem()); executed (the execution status of this line is deduced): BIO *bio = q_BIO_new(q_BIO_s_mem()); | - |
397 | if (!bio) partially evaluated: !bio no Evaluation Count:0 | yes Evaluation Count:1550 |
| 0-1550 |
398 | return QByteArray(); never executed: return QByteArray(); | 0 |
399 | | - |
400 | bool fail = false; executed (the execution status of this line is deduced): bool fail = false; | - |
401 | | - |
402 | if (d->algorithm == QSsl::Rsa) { evaluated: d->algorithm == QSsl::Rsa yes Evaluation Count:990 | yes Evaluation Count:560 |
| 560-990 |
403 | if (d->type == QSsl::PublicKey) { evaluated: d->type == QSsl::PublicKey yes Evaluation Count:416 | yes Evaluation Count:574 |
| 416-574 |
404 | if (!q_PEM_write_bio_RSA_PUBKEY(bio, d->rsa)) partially evaluated: !q_PEM_write_bio_RSA_PUBKEY(bio, d->rsa) no Evaluation Count:0 | yes Evaluation Count:416 |
| 0-416 |
405 | fail = true; never executed: fail = true; | 0 |
406 | } else { executed: } Execution Count:416 | 416 |
407 | if (!q_PEM_write_bio_RSAPrivateKey( partially evaluated: !q_PEM_write_bio_RSAPrivateKey( bio, d->rsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:574 |
| 0-574 |
408 | bio, d->rsa, partially evaluated: !q_PEM_write_bio_RSAPrivateKey( bio, d->rsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:574 |
| 0-574 |
409 | // ### the cipher should be selectable in the API: partially evaluated: !q_PEM_write_bio_RSAPrivateKey( bio, d->rsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:574 |
| 0-574 |
410 | passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), partially evaluated: !q_PEM_write_bio_RSAPrivateKey( bio, d->rsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:574 |
| 0-574 |
411 | (uchar *)passPhrase.data(), passPhrase.size(), 0, 0)) { partially evaluated: !q_PEM_write_bio_RSAPrivateKey( bio, d->rsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:574 |
| 0-574 |
412 | fail = true; never executed (the execution status of this line is deduced): fail = true; | - |
413 | } | 0 |
414 | } executed: } Execution Count:574 | 574 |
415 | } else { | - |
416 | if (d->type == QSsl::PublicKey) { evaluated: d->type == QSsl::PublicKey yes Evaluation Count:232 | yes Evaluation Count:328 |
| 232-328 |
417 | if (!q_PEM_write_bio_DSA_PUBKEY(bio, d->dsa)) partially evaluated: !q_PEM_write_bio_DSA_PUBKEY(bio, d->dsa) no Evaluation Count:0 | yes Evaluation Count:232 |
| 0-232 |
418 | fail = true; never executed: fail = true; | 0 |
419 | } else { executed: } Execution Count:232 | 232 |
420 | if (!q_PEM_write_bio_DSAPrivateKey( partially evaluated: !q_PEM_write_bio_DSAPrivateKey( bio, d->dsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:328 |
| 0-328 |
421 | bio, d->dsa, partially evaluated: !q_PEM_write_bio_DSAPrivateKey( bio, d->dsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:328 |
| 0-328 |
422 | // ### the cipher should be selectable in the API: partially evaluated: !q_PEM_write_bio_DSAPrivateKey( bio, d->dsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:328 |
| 0-328 |
423 | passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), partially evaluated: !q_PEM_write_bio_DSAPrivateKey( bio, d->dsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:328 |
| 0-328 |
424 | (uchar *)passPhrase.data(), passPhrase.size(), 0, 0)) { partially evaluated: !q_PEM_write_bio_DSAPrivateKey( bio, d->dsa, passPhrase.isEmpty() ? (const EVP_CIPHER *)0 : q_EVP_des_ede3_cbc(), (uchar *)passPhrase.data(), passPhrase.size(), 0, 0) no Evaluation Count:0 | yes Evaluation Count:328 |
| 0-328 |
425 | fail = true; never executed (the execution status of this line is deduced): fail = true; | - |
426 | } | 0 |
427 | } executed: } Execution Count:328 | 328 |
428 | } | - |
429 | | - |
430 | QByteArray pem; executed (the execution status of this line is deduced): QByteArray pem; | - |
431 | if (!fail) { partially evaluated: !fail yes Evaluation Count:1550 | no Evaluation Count:0 |
| 0-1550 |
432 | char *data; executed (the execution status of this line is deduced): char *data; | - |
433 | long size = q_BIO_get_mem_data(bio, &data); executed (the execution status of this line is deduced): long size = (int)q_BIO_ctrl(bio,3,0,(char *)&data); | - |
434 | pem = QByteArray(data, size); executed (the execution status of this line is deduced): pem = QByteArray(data, size); | - |
435 | } executed: } Execution Count:1550 | 1550 |
436 | q_BIO_free(bio); executed (the execution status of this line is deduced): q_BIO_free(bio); | - |
437 | return pem; executed: return pem; Execution Count:1550 | 1550 |
438 | } | - |
439 | | - |
440 | /*! | - |
441 | Returns a pointer to the native key handle, if it is available; | - |
442 | otherwise a null pointer is returned. | - |
443 | | - |
444 | You can use this handle together with the native API to access | - |
445 | extended information about the key. | - |
446 | | - |
447 | \warning Use of this function has a high probability of being | - |
448 | non-portable, and its return value may vary across platforms, and | - |
449 | between minor Qt releases. | - |
450 | */ | - |
451 | Qt::HANDLE QSslKey::handle() const | - |
452 | { | - |
453 | switch (d->algorithm) { | - |
454 | case QSsl::Opaque: | - |
455 | return Qt::HANDLE(d->opaque); never executed: return Qt::HANDLE(d->opaque); | 0 |
456 | case QSsl::Rsa: | - |
457 | return Qt::HANDLE(d->rsa); executed: return Qt::HANDLE(d->rsa); Execution Count:3 | 3 |
458 | case QSsl::Dsa: | - |
459 | return Qt::HANDLE(d->dsa); never executed: return Qt::HANDLE(d->dsa); | 0 |
460 | default: | - |
461 | return Qt::HANDLE(NULL); never executed: return Qt::HANDLE(__null); | 0 |
462 | } | - |
463 | } | 0 |
464 | | - |
465 | /*! | - |
466 | Returns true if this key is equal to \a other; otherwise returns false. | - |
467 | */ | - |
468 | bool QSslKey::operator==(const QSslKey &other) const | - |
469 | { | - |
470 | if (isNull()) evaluated: isNull() yes Evaluation Count:44 | yes Evaluation Count:181 |
| 44-181 |
471 | return other.isNull(); executed: return other.isNull(); Execution Count:44 | 44 |
472 | if (other.isNull()) partially evaluated: other.isNull() no Evaluation Count:0 | yes Evaluation Count:181 |
| 0-181 |
473 | return isNull(); never executed: return isNull(); | 0 |
474 | if (algorithm() != other.algorithm()) partially evaluated: algorithm() != other.algorithm() no Evaluation Count:0 | yes Evaluation Count:181 |
| 0-181 |
475 | return false; never executed: return false; | 0 |
476 | if (type() != other.type()) partially evaluated: type() != other.type() no Evaluation Count:0 | yes Evaluation Count:181 |
| 0-181 |
477 | return false; never executed: return false; | 0 |
478 | if (length() != other.length()) partially evaluated: length() != other.length() no Evaluation Count:0 | yes Evaluation Count:181 |
| 0-181 |
479 | return false; never executed: return false; | 0 |
480 | if (algorithm() == QSsl::Opaque) partially evaluated: algorithm() == QSsl::Opaque no Evaluation Count:0 | yes Evaluation Count:181 |
| 0-181 |
481 | return handle() == other.handle(); never executed: return handle() == other.handle(); | 0 |
482 | return toDer() == other.toDer(); executed: return toDer() == other.toDer(); Execution Count:181 | 181 |
483 | } | - |
484 | | - |
485 | /*! \fn bool QSslKey::operator!=(const QSslKey &other) const | - |
486 | | - |
487 | Returns true if this key is not equal to key \a other; otherwise | - |
488 | returns false. | - |
489 | */ | - |
490 | | - |
491 | #ifndef QT_NO_DEBUG_STREAM | - |
492 | class QDebug; | - |
493 | QDebug operator<<(QDebug debug, const QSslKey &key) | - |
494 | { | - |
495 | debug << "QSslKey(" never executed (the execution status of this line is deduced): debug << "QSslKey(" | - |
496 | << (key.type() == QSsl::PublicKey ? "PublicKey" : "PrivateKey") never executed (the execution status of this line is deduced): << (key.type() == QSsl::PublicKey ? "PublicKey" : "PrivateKey") | - |
497 | << ", " << (key.algorithm() == QSsl::Opaque ? "OPAQUE" : never executed (the execution status of this line is deduced): << ", " << (key.algorithm() == QSsl::Opaque ? "OPAQUE" : | - |
498 | (key.algorithm() == QSsl::Rsa ? "RSA" : "DSA")) never executed (the execution status of this line is deduced): (key.algorithm() == QSsl::Rsa ? "RSA" : "DSA")) | - |
499 | << ", " << key.length() never executed (the execution status of this line is deduced): << ", " << key.length() | - |
500 | << ')'; never executed (the execution status of this line is deduced): << ')'; | - |
501 | return debug; never executed: return debug; | 0 |
502 | } | - |
503 | #endif | - |
504 | | - |
505 | QT_END_NAMESPACE | - |
506 | | - |
| | |