| Absolute File Name: | /home/qt/qt5_coco/qt5/qtbase/src/network/ssl/qsslconfiguration.cpp |
| Source code | Switch to Preprocessed file |
| Line | Source | Count | ||||||
|---|---|---|---|---|---|---|---|---|
| 1 | /**************************************************************************** | - | ||||||
| 2 | ** | - | ||||||
| 3 | ** Copyright (C) 2016 The Qt Company Ltd. | - | ||||||
| 4 | ** Copyright (C) 2014 BlackBerry Limited. All rights reserved. | - | ||||||
| 5 | ** Contact: https://www.qt.io/licensing/ | - | ||||||
| 6 | ** | - | ||||||
| 7 | ** This file is part of the QtNetwork module of the Qt Toolkit. | - | ||||||
| 8 | ** | - | ||||||
| 9 | ** $QT_BEGIN_LICENSE:LGPL$ | - | ||||||
| 10 | ** Commercial License Usage | - | ||||||
| 11 | ** Licensees holding valid commercial Qt licenses may use this file in | - | ||||||
| 12 | ** accordance with the commercial license agreement provided with the | - | ||||||
| 13 | ** Software or, alternatively, in accordance with the terms contained in | - | ||||||
| 14 | ** a written agreement between you and The Qt Company. For licensing terms | - | ||||||
| 15 | ** and conditions see https://www.qt.io/terms-conditions. For further | - | ||||||
| 16 | ** information use the contact form at https://www.qt.io/contact-us. | - | ||||||
| 17 | ** | - | ||||||
| 18 | ** GNU Lesser General Public License Usage | - | ||||||
| 19 | ** Alternatively, this file may be used under the terms of the GNU Lesser | - | ||||||
| 20 | ** General Public License version 3 as published by the Free Software | - | ||||||
| 21 | ** Foundation and appearing in the file LICENSE.LGPL3 included in the | - | ||||||
| 22 | ** packaging of this file. Please review the following information to | - | ||||||
| 23 | ** ensure the GNU Lesser General Public License version 3 requirements | - | ||||||
| 24 | ** will be met: https://www.gnu.org/licenses/lgpl-3.0.html. | - | ||||||
| 25 | ** | - | ||||||
| 26 | ** GNU General Public License Usage | - | ||||||
| 27 | ** Alternatively, this file may be used under the terms of the GNU | - | ||||||
| 28 | ** General Public License version 2.0 or (at your option) the GNU General | - | ||||||
| 29 | ** Public license version 3 or any later version approved by the KDE Free | - | ||||||
| 30 | ** Qt Foundation. The licenses are as published by the Free Software | - | ||||||
| 31 | ** Foundation and appearing in the file LICENSE.GPL2 and LICENSE.GPL3 | - | ||||||
| 32 | ** included in the packaging of this file. Please review the following | - | ||||||
| 33 | ** information to ensure the GNU General Public License requirements will | - | ||||||
| 34 | ** be met: https://www.gnu.org/licenses/gpl-2.0.html and | - | ||||||
| 35 | ** https://www.gnu.org/licenses/gpl-3.0.html. | - | ||||||
| 36 | ** | - | ||||||
| 37 | ** $QT_END_LICENSE$ | - | ||||||
| 38 | ** | - | ||||||
| 39 | ****************************************************************************/ | - | ||||||
| 40 | - | |||||||
| 41 | #include "qssl_p.h" | - | ||||||
| 42 | #include "qsslconfiguration.h" | - | ||||||
| 43 | #include "qsslconfiguration_p.h" | - | ||||||
| 44 | #include "qsslsocket.h" | - | ||||||
| 45 | #include "qsslsocket_p.h" | - | ||||||
| 46 | #include "qmutex.h" | - | ||||||
| 47 | #include "qdebug.h" | - | ||||||
| 48 | - | |||||||
| 49 | QT_BEGIN_NAMESPACE | - | ||||||
| 50 | - | |||||||
| 51 | const QSsl::SslOptions QSslConfigurationPrivate::defaultSslOptions = QSsl::SslOptionDisableEmptyFragments | - | ||||||
| 52 | |QSsl::SslOptionDisableLegacyRenegotiation | - | ||||||
| 53 | |QSsl::SslOptionDisableCompression | - | ||||||
| 54 | |QSsl::SslOptionDisableSessionPersistence; | - | ||||||
| 55 | - | |||||||
| 56 | const char QSslConfiguration::NextProtocolSpdy3_0[] = "spdy/3"; | - | ||||||
| 57 | const char QSslConfiguration::NextProtocolHttp1_1[] = "http/1.1"; | - | ||||||
| 58 | - | |||||||
| 59 | /*! | - | ||||||
| 60 | \class QSslConfiguration | - | ||||||
| 61 | \brief The QSslConfiguration class holds the configuration and state of an SSL connection | - | ||||||
| 62 | \since 4.4 | - | ||||||
| 63 | - | |||||||
| 64 | \reentrant | - | ||||||
| 65 | \inmodule QtNetwork | - | ||||||
| 66 | \ingroup network | - | ||||||
| 67 | \ingroup ssl | - | ||||||
| 68 | \ingroup shared | - | ||||||
| 69 | - | |||||||
| 70 | QSslConfiguration is used by Qt networking classes to relay | - | ||||||
| 71 | information about an open SSL connection and to allow the | - | ||||||
| 72 | application to control certain features of that connection. | - | ||||||
| 73 | - | |||||||
| 74 | The settings that QSslConfiguration currently supports are: | - | ||||||
| 75 | - | |||||||
| 76 | \list | - | ||||||
| 77 | \li The SSL/TLS protocol to be used | - | ||||||
| 78 | \li The certificate to be presented to the peer during connection | - | ||||||
| 79 | and its associated private key | - | ||||||
| 80 | \li The ciphers allowed to be used for encrypting the connection | - | ||||||
| 81 | \li The list of Certificate Authorities certificates that are | - | ||||||
| 82 | used to validate the peer's certificate | - | ||||||
| 83 | \endlist | - | ||||||
| 84 | - | |||||||
| 85 | These settings are applied only during the connection | - | ||||||
| 86 | handshake. Setting them after the connection has been established | - | ||||||
| 87 | has no effect. | - | ||||||
| 88 | - | |||||||
| 89 | The state that QSslConfiguration supports are: | - | ||||||
| 90 | \list | - | ||||||
| 91 | \li The certificate the peer presented during handshake, along | - | ||||||
| 92 | with the chain leading to a CA certificate | - | ||||||
| 93 | \li The cipher used to encrypt this session | - | ||||||
| 94 | \endlist | - | ||||||
| 95 | - | |||||||
| 96 | The state can only be obtained once the SSL connection starts, but | - | ||||||
| 97 | not necessarily before it's done. Some settings may change during | - | ||||||
| 98 | the course of the SSL connection without need to restart it (for | - | ||||||
| 99 | instance, the cipher can be changed over time). | - | ||||||
| 100 | - | |||||||
| 101 | State in QSslConfiguration objects cannot be changed. | - | ||||||
| 102 | - | |||||||
| 103 | QSslConfiguration can be used with QSslSocket and the Network | - | ||||||
| 104 | Access API. | - | ||||||
| 105 | - | |||||||
| 106 | Note that changing settings in QSslConfiguration is not enough to | - | ||||||
| 107 | change the settings in the related SSL connection. You must call | - | ||||||
| 108 | setSslConfiguration on a modified QSslConfiguration object to | - | ||||||
| 109 | achieve that. The following example illustrates how to change the | - | ||||||
| 110 | protocol to TLSv1_0 in a QSslSocket object: | - | ||||||
| 111 | - | |||||||
| 112 | \snippet code/src_network_ssl_qsslconfiguration.cpp 0 | - | ||||||
| 113 | - | |||||||
| 114 | \sa QSsl::SslProtocol, QSslCertificate, QSslCipher, QSslKey, | - | ||||||
| 115 | QSslSocket, QNetworkAccessManager, | - | ||||||
| 116 | QSslSocket::sslConfiguration(), QSslSocket::setSslConfiguration() | - | ||||||
| 117 | */ | - | ||||||
| 118 | - | |||||||
| 119 | /*! | - | ||||||
| 120 | \enum QSslConfiguration::NextProtocolNegotiationStatus | - | ||||||
| 121 | - | |||||||
| 122 | Describes the status of the Next Protocol Negotiation (NPN). | - | ||||||
| 123 | - | |||||||
| 124 | \value NextProtocolNegotiationNone No application protocol | - | ||||||
| 125 | has been negotiated (yet). | - | ||||||
| 126 | - | |||||||
| 127 | \value NextProtocolNegotiationNegotiated A next protocol | - | ||||||
| 128 | has been negotiated (see nextNegotiatedProtocol()). | - | ||||||
| 129 | - | |||||||
| 130 | \value NextProtocolNegotiationUnsupported The client and | - | ||||||
| 131 | server could not agree on a common next application protocol. | - | ||||||
| 132 | */ | - | ||||||
| 133 | - | |||||||
| 134 | /*! | - | ||||||
| 135 | \variable QSslConfiguration::NextProtocolSpdy3_0 | - | ||||||
| 136 | \brief The value used for negotiating SPDY 3.0 during the Next | - | ||||||
| 137 | Protocol Negotiation. | - | ||||||
| 138 | */ | - | ||||||
| 139 | - | |||||||
| 140 | /*! | - | ||||||
| 141 | \variable QSslConfiguration::NextProtocolHttp1_1 | - | ||||||
| 142 | \brief The value used for negotiating HTTP 1.1 during the Next | - | ||||||
| 143 | Protocol Negotiation. | - | ||||||
| 144 | */ | - | ||||||
| 145 | - | |||||||
| 146 | /*! | - | ||||||
| 147 | Constructs an empty SSL configuration. This configuration contains | - | ||||||
| 148 | no valid settings and the state will be empty. isNull() will | - | ||||||
| 149 | return true after this constructor is called. | - | ||||||
| 150 | - | |||||||
| 151 | Once any setter methods are called, isNull() will return false. | - | ||||||
| 152 | */ | - | ||||||
| 153 | QSslConfiguration::QSslConfiguration() | - | ||||||
| 154 | : d(new QSslConfigurationPrivate) | - | ||||||
| 155 | { | - | ||||||
| 156 | } executed 5898 times by 12 tests: end of blockExecuted by:
| 5898 | ||||||
| 157 | - | |||||||
| 158 | /*! | - | ||||||
| 159 | Copies the configuration and state of \a other. If \a other is | - | ||||||
| 160 | null, this object will be null too. | - | ||||||
| 161 | */ | - | ||||||
| 162 | QSslConfiguration::QSslConfiguration(const QSslConfiguration &other) | - | ||||||
| 163 | : d(other.d) | - | ||||||
| 164 | { | - | ||||||
| 165 | } executed 1931 times by 9 tests: end of blockExecuted by:
| 1931 | ||||||
| 166 | - | |||||||
| 167 | /*! | - | ||||||
| 168 | Releases any resources held by QSslConfiguration. | - | ||||||
| 169 | */ | - | ||||||
| 170 | QSslConfiguration::~QSslConfiguration() | - | ||||||
| 171 | { | - | ||||||
| 172 | // QSharedDataPointer deletes d for us if necessary | - | ||||||
| 173 | } | - | ||||||
| 174 | - | |||||||
| 175 | /*! | - | ||||||
| 176 | Copies the configuration and state of \a other. If \a other is | - | ||||||
| 177 | null, this object will be null too. | - | ||||||
| 178 | */ | - | ||||||
| 179 | QSslConfiguration &QSslConfiguration::operator=(const QSslConfiguration &other) | - | ||||||
| 180 | { | - | ||||||
| 181 | d = other.d; | - | ||||||
| 182 | return *this; executed 1484 times by 7 tests: return *this;Executed by:
| 1484 | ||||||
| 183 | } | - | ||||||
| 184 | - | |||||||
| 185 | /*! | - | ||||||
| 186 | \fn void QSslConfiguration::swap(QSslConfiguration &other) | - | ||||||
| 187 | \since 5.0 | - | ||||||
| 188 | - | |||||||
| 189 | Swaps this SSL configuration instance with \a other. This function | - | ||||||
| 190 | is very fast and never fails. | - | ||||||
| 191 | */ | - | ||||||
| 192 | - | |||||||
| 193 | /*! | - | ||||||
| 194 | Returns \c true if this QSslConfiguration object is equal to \a | - | ||||||
| 195 | other. | - | ||||||
| 196 | - | |||||||
| 197 | Two QSslConfiguration objects are considered equal if they have | - | ||||||
| 198 | the exact same settings and state. | - | ||||||
| 199 | - | |||||||
| 200 | \sa operator!=() | - | ||||||
| 201 | */ | - | ||||||
| 202 | bool QSslConfiguration::operator==(const QSslConfiguration &other) const | - | ||||||
| 203 | { | - | ||||||
| 204 | if (d == other.d)
| 40-62 | ||||||
| 205 | return true; executed 40 times by 2 tests: return true;Executed by:
| 40 | ||||||
| 206 | return d->peerCertificate == other.d->peerCertificate && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 207 | d->peerCertificateChain == other.d->peerCertificateChain && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 208 | d->localCertificateChain == other.d->localCertificateChain && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 209 | d->privateKey == other.d->privateKey && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 210 | d->sessionCipher == other.d->sessionCipher && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 211 | d->sessionProtocol == other.d->sessionProtocol && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 212 | d->ciphers == other.d->ciphers && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 213 | d->ellipticCurves == other.d->ellipticCurves && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 214 | d->ephemeralServerKey == other.d->ephemeralServerKey && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 215 | d->caCertificates == other.d->caCertificates && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 216 | d->protocol == other.d->protocol && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 217 | d->peerVerifyMode == other.d->peerVerifyMode && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 218 | d->peerVerifyDepth == other.d->peerVerifyDepth && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 219 | d->allowRootCertOnDemandLoading == other.d->allowRootCertOnDemandLoading && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 220 | d->sslOptions == other.d->sslOptions && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 221 | d->sslSession == other.d->sslSession && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 222 | d->sslSessionTicketLifeTimeHint == other.d->sslSessionTicketLifeTimeHint && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 223 | d->nextAllowedProtocols == other.d->nextAllowedProtocols && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 224 | d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 225 | d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus; executed 62 times by 3 tests: return d->peerCertificate == other.d->peerCertificate && d->peerCertificateChain == other.d->peerCertificateChain && d->localCertificateChain == other.d->localCertificateChain && d->privateKey == other.d->privateKey && d->sessionCipher == other.d->session...ifeTimeHint == other.d->sslSessionTicketLifeTimeHint && d->nextAllowedProtocols == other.d->nextAllowedProtocols && d->nextNegotiatedProtocol == other.d->nextNegotiatedProtocol && d->nextProtocolNegotiationStatus == other.d->nextProtocolNegotiationStatus;Executed by:
| 62 | ||||||
| 226 | } | - | ||||||
| 227 | - | |||||||
| 228 | /*! | - | ||||||
| 229 | \fn QSslConfiguration::operator!=(const QSslConfiguration &other) const | - | ||||||
| 230 | - | |||||||
| 231 | Returns \c true if this QSslConfiguration differs from \a other. Two | - | ||||||
| 232 | QSslConfiguration objects are considered different if any state or | - | ||||||
| 233 | setting is different. | - | ||||||
| 234 | - | |||||||
| 235 | \sa operator==() | - | ||||||
| 236 | */ | - | ||||||
| 237 | - | |||||||
| 238 | /*! | - | ||||||
| 239 | Returns \c true if this is a null QSslConfiguration object. | - | ||||||
| 240 | - | |||||||
| 241 | A QSslConfiguration object is null if it has been | - | ||||||
| 242 | default-constructed and no setter methods have been called. | - | ||||||
| 243 | - | |||||||
| 244 | \sa setProtocol(), setLocalCertificate(), setPrivateKey(), | - | ||||||
| 245 | setCiphers(), setCaCertificates() | - | ||||||
| 246 | */ | - | ||||||
| 247 | bool QSslConfiguration::isNull() const | - | ||||||
| 248 | { | - | ||||||
| 249 | return (d->protocol == QSsl::SecureProtocols && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 250 | d->peerVerifyMode == QSslSocket::AutoVerifyPeer && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 251 | d->peerVerifyDepth == 0 && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 252 | d->allowRootCertOnDemandLoading == true && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 253 | d->caCertificates.count() == 0 && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 254 | d->ciphers.count() == 0 && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 255 | d->ellipticCurves.isEmpty() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 256 | d->ephemeralServerKey.isNull() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 257 | d->localCertificateChain.isEmpty() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 258 | d->privateKey.isNull() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 259 | d->peerCertificate.isNull() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 260 | d->peerCertificateChain.count() == 0 && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 261 | d->sslOptions == QSslConfigurationPrivate::defaultSslOptions && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 262 | d->sslSession.isNull() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 263 | d->sslSessionTicketLifeTimeHint == -1 && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 264 | d->nextAllowedProtocols.isEmpty() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 265 | d->nextNegotiatedProtocol.isNull() && executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 266 | d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone); executed 231 times by 3 tests: return (d->protocol == QSsl::SecureProtocols && d->peerVerifyMode == QSslSocket::AutoVerifyPeer && d->peerVerifyDepth == 0 && d->allowRootCertOnDemandLoading == true && d->caCertificates.count() == 0 && d->ciphers.count() == 0 && d->ellipticCurves.isEmpty...rivate::defaultSslOptions && d->sslSession.isNull() && d->sslSessionTicketLifeTimeHint == -1 && d->nextAllowedProtocols.isEmpty() && d->nextNegotiatedProtocol.isNull() && d->nextProtocolNegotiationStatus == QSslConfiguration::NextProtocolNegotiationNone);Executed by:
| 231 | ||||||
| 267 | } | - | ||||||
| 268 | - | |||||||
| 269 | /*! | - | ||||||
| 270 | Returns the protocol setting for this SSL configuration. | - | ||||||
| 271 | - | |||||||
| 272 | \sa setProtocol() | - | ||||||
| 273 | */ | - | ||||||
| 274 | QSsl::SslProtocol QSslConfiguration::protocol() const | - | ||||||
| 275 | { | - | ||||||
| 276 | return d->protocol; executed 1055 times by 7 tests: return d->protocol;Executed by:
| 1055 | ||||||
| 277 | } | - | ||||||
| 278 | - | |||||||
| 279 | /*! | - | ||||||
| 280 | Sets the protocol setting for this configuration to be \a | - | ||||||
| 281 | protocol. | - | ||||||
| 282 | - | |||||||
| 283 | Setting the protocol once the connection has already been | - | ||||||
| 284 | established has no effect. | - | ||||||
| 285 | - | |||||||
| 286 | \sa protocol() | - | ||||||
| 287 | */ | - | ||||||
| 288 | void QSslConfiguration::setProtocol(QSsl::SslProtocol protocol) | - | ||||||
| 289 | { | - | ||||||
| 290 | d->protocol = protocol; | - | ||||||
| 291 | } executed 2 times by 2 tests: end of blockExecuted by:
| 2 | ||||||
| 292 | - | |||||||
| 293 | /*! | - | ||||||
| 294 | Returns the verify mode. This mode decides whether QSslSocket should | - | ||||||
| 295 | request a certificate from the peer (i.e., the client requests a | - | ||||||
| 296 | certificate from the server, or a server requesting a certificate from the | - | ||||||
| 297 | client), and whether it should require that this certificate is valid. | - | ||||||
| 298 | - | |||||||
| 299 | The default mode is AutoVerifyPeer, which tells QSslSocket to use | - | ||||||
| 300 | VerifyPeer for clients, QueryPeer for servers. | - | ||||||
| 301 | - | |||||||
| 302 | \sa setPeerVerifyMode() | - | ||||||
| 303 | */ | - | ||||||
| 304 | QSslSocket::PeerVerifyMode QSslConfiguration::peerVerifyMode() const | - | ||||||
| 305 | { | - | ||||||
| 306 | return d->peerVerifyMode; executed 589 times by 7 tests: return d->peerVerifyMode;Executed by:
| 589 | ||||||
| 307 | } | - | ||||||
| 308 | - | |||||||
| 309 | /*! | - | ||||||
| 310 | Sets the verify mode to \a mode. This mode decides whether QSslSocket | - | ||||||
| 311 | should request a certificate from the peer (i.e., the client requests a | - | ||||||
| 312 | certificate from the server, or a server requesting a certificate from the | - | ||||||
| 313 | client), and whether it should require that this certificate is valid. | - | ||||||
| 314 | - | |||||||
| 315 | The default mode is AutoVerifyPeer, which tells QSslSocket to use | - | ||||||
| 316 | VerifyPeer for clients, QueryPeer for servers. | - | ||||||
| 317 | - | |||||||
| 318 | \sa peerVerifyMode() | - | ||||||
| 319 | */ | - | ||||||
| 320 | void QSslConfiguration::setPeerVerifyMode(QSslSocket::PeerVerifyMode mode) | - | ||||||
| 321 | { | - | ||||||
| 322 | d->peerVerifyMode = mode; | - | ||||||
| 323 | } never executed: end of block | 0 | ||||||
| 324 | - | |||||||
| 325 | - | |||||||
| 326 | /*! | - | ||||||
| 327 | Returns the maximum number of certificates in the peer's certificate chain | - | ||||||
| 328 | to be checked during the SSL handshake phase, or 0 (the default) if no | - | ||||||
| 329 | maximum depth has been set, indicating that the whole certificate chain | - | ||||||
| 330 | should be checked. | - | ||||||
| 331 | - | |||||||
| 332 | The certificates are checked in issuing order, starting with the peer's | - | ||||||
| 333 | own certificate, then its issuer's certificate, and so on. | - | ||||||
| 334 | - | |||||||
| 335 | \sa setPeerVerifyDepth(), peerVerifyMode() | - | ||||||
| 336 | */ | - | ||||||
| 337 | int QSslConfiguration::peerVerifyDepth() const | - | ||||||
| 338 | { | - | ||||||
| 339 | return d->peerVerifyDepth; executed 589 times by 7 tests: return d->peerVerifyDepth;Executed by:
| 589 | ||||||
| 340 | } | - | ||||||
| 341 | - | |||||||
| 342 | /*! | - | ||||||
| 343 | Sets the maximum number of certificates in the peer's certificate chain to | - | ||||||
| 344 | be checked during the SSL handshake phase, to \a depth. Setting a depth of | - | ||||||
| 345 | 0 means that no maximum depth is set, indicating that the whole | - | ||||||
| 346 | certificate chain should be checked. | - | ||||||
| 347 | - | |||||||
| 348 | The certificates are checked in issuing order, starting with the peer's | - | ||||||
| 349 | own certificate, then its issuer's certificate, and so on. | - | ||||||
| 350 | - | |||||||
| 351 | \sa peerVerifyDepth(), setPeerVerifyMode() | - | ||||||
| 352 | */ | - | ||||||
| 353 | void QSslConfiguration::setPeerVerifyDepth(int depth) | - | ||||||
| 354 | { | - | ||||||
| 355 | if (depth < 0) {
| 0 | ||||||
| 356 | qCWarning(lcSsl, never executed: QMessageLogger( __FILE__ , 357 , __PRETTY_FUNCTION__, lcSsl().categoryName()).warning("QSslConfiguration::setPeerVerifyDepth: cannot set negative depth of %d", depth) ;
| 0 | ||||||
| 357 | "QSslConfiguration::setPeerVerifyDepth: cannot set negative depth of %d", depth); never executed: QMessageLogger( __FILE__ , 357 , __PRETTY_FUNCTION__, lcSsl().categoryName()).warning("QSslConfiguration::setPeerVerifyDepth: cannot set negative depth of %d", depth) ; | 0 | ||||||
| 358 | return; never executed: return; | 0 | ||||||
| 359 | } | - | ||||||
| 360 | d->peerVerifyDepth = depth; | - | ||||||
| 361 | } never executed: end of block | 0 | ||||||
| 362 | - | |||||||
| 363 | /*! | - | ||||||
| 364 | Returns the certificate chain to be presented to the peer during | - | ||||||
| 365 | the SSL handshake process. | - | ||||||
| 366 | - | |||||||
| 367 | \sa localCertificate() | - | ||||||
| 368 | \since 5.1 | - | ||||||
| 369 | */ | - | ||||||
| 370 | QList<QSslCertificate> QSslConfiguration::localCertificateChain() const | - | ||||||
| 371 | { | - | ||||||
| 372 | return d->localCertificateChain; executed 144 times by 4 tests: return d->localCertificateChain;Executed by:
| 144 | ||||||
| 373 | } | - | ||||||
| 374 | - | |||||||
| 375 | /*! | - | ||||||
| 376 | Sets the certificate chain to be presented to the peer during the | - | ||||||
| 377 | SSL handshake to be \a localChain. | - | ||||||
| 378 | - | |||||||
| 379 | Setting the certificate chain once the connection has been | - | ||||||
| 380 | established has no effect. | - | ||||||
| 381 | - | |||||||
| 382 | A certificate is the means of identification used in the SSL | - | ||||||
| 383 | process. The local certificate is used by the remote end to verify | - | ||||||
| 384 | the local user's identity against its list of Certification | - | ||||||
| 385 | Authorities. In most cases, such as in HTTP web browsing, only | - | ||||||
| 386 | servers identify to the clients, so the client does not send a | - | ||||||
| 387 | certificate. | - | ||||||
| 388 | - | |||||||
| 389 | Unlike QSslConfiguration::setLocalCertificate() this method allows | - | ||||||
| 390 | you to specify any intermediate certificates required in order to | - | ||||||
| 391 | validate your certificate. The first item in the list must be the | - | ||||||
| 392 | leaf certificate. | - | ||||||
| 393 | - | |||||||
| 394 | \sa localCertificateChain() | - | ||||||
| 395 | \since 5.1 | - | ||||||
| 396 | */ | - | ||||||
| 397 | void QSslConfiguration::setLocalCertificateChain(const QList<QSslCertificate> &localChain) | - | ||||||
| 398 | { | - | ||||||
| 399 | d->localCertificateChain = localChain; | - | ||||||
| 400 | } never executed: end of block | 0 | ||||||
| 401 | - | |||||||
| 402 | /*! | - | ||||||
| 403 | Returns the certificate to be presented to the peer during the SSL | - | ||||||
| 404 | handshake process. | - | ||||||
| 405 | - | |||||||
| 406 | \sa setLocalCertificate() | - | ||||||
| 407 | */ | - | ||||||
| 408 | QSslCertificate QSslConfiguration::localCertificate() const | - | ||||||
| 409 | { | - | ||||||
| 410 | if (d->localCertificateChain.isEmpty())
| 182-362 | ||||||
| 411 | return QSslCertificate(); executed 362 times by 7 tests: return QSslCertificate();Executed by:
| 362 | ||||||
| 412 | return d->localCertificateChain[0]; executed 182 times by 2 tests: return d->localCertificateChain[0];Executed by:
| 182 | ||||||
| 413 | } | - | ||||||
| 414 | - | |||||||
| 415 | /*! | - | ||||||
| 416 | Sets the certificate to be presented to the peer during SSL | - | ||||||
| 417 | handshake to be \a certificate. | - | ||||||
| 418 | - | |||||||
| 419 | Setting the certificate once the connection has been established | - | ||||||
| 420 | has no effect. | - | ||||||
| 421 | - | |||||||
| 422 | A certificate is the means of identification used in the SSL | - | ||||||
| 423 | process. The local certificate is used by the remote end to verify | - | ||||||
| 424 | the local user's identity against its list of Certification | - | ||||||
| 425 | Authorities. In most cases, such as in HTTP web browsing, only | - | ||||||
| 426 | servers identify to the clients, so the client does not send a | - | ||||||
| 427 | certificate. | - | ||||||
| 428 | - | |||||||
| 429 | \sa localCertificate() | - | ||||||
| 430 | */ | - | ||||||
| 431 | void QSslConfiguration::setLocalCertificate(const QSslCertificate &certificate) | - | ||||||
| 432 | { | - | ||||||
| 433 | d->localCertificateChain = QList<QSslCertificate>(); | - | ||||||
| 434 | d->localCertificateChain += certificate; | - | ||||||
| 435 | } never executed: end of block | 0 | ||||||
| 436 | - | |||||||
| 437 | /*! | - | ||||||
| 438 | Returns the peer's digital certificate (i.e., the immediate | - | ||||||
| 439 | certificate of the host you are connected to), or a null | - | ||||||
| 440 | certificate, if the peer has not assigned a certificate. | - | ||||||
| 441 | - | |||||||
| 442 | The peer certificate is checked automatically during the | - | ||||||
| 443 | handshake phase, so this function is normally used to fetch | - | ||||||
| 444 | the certificate for display or for connection diagnostic | - | ||||||
| 445 | purposes. It contains information about the peer, including | - | ||||||
| 446 | its host name, the certificate issuer, and the peer's public | - | ||||||
| 447 | key. | - | ||||||
| 448 | - | |||||||
| 449 | Because the peer certificate is set during the handshake phase, it | - | ||||||
| 450 | is safe to access the peer certificate from a slot connected to | - | ||||||
| 451 | the QSslSocket::sslErrors() signal, QNetworkReply::sslErrors() | - | ||||||
| 452 | signal, or the QSslSocket::encrypted() signal. | - | ||||||
| 453 | - | |||||||
| 454 | If a null certificate is returned, it can mean the SSL handshake | - | ||||||
| 455 | failed, or it can mean the host you are connected to doesn't have | - | ||||||
| 456 | a certificate, or it can mean there is no connection. | - | ||||||
| 457 | - | |||||||
| 458 | If you want to check the peer's complete chain of certificates, | - | ||||||
| 459 | use peerCertificateChain() to get them all at once. | - | ||||||
| 460 | - | |||||||
| 461 | \sa peerCertificateChain(), | - | ||||||
| 462 | QSslSocket::sslErrors(), QSslSocket::ignoreSslErrors(), | - | ||||||
| 463 | QNetworkReply::sslErrors(), QNetworkReply::ignoreSslErrors() | - | ||||||
| 464 | */ | - | ||||||
| 465 | QSslCertificate QSslConfiguration::peerCertificate() const | - | ||||||
| 466 | { | - | ||||||
| 467 | return d->peerCertificate; never executed: return d->peerCertificate; | 0 | ||||||
| 468 | } | - | ||||||
| 469 | - | |||||||
| 470 | /*! | - | ||||||
| 471 | Returns the peer's chain of digital certificates, starting with | - | ||||||
| 472 | the peer's immediate certificate and ending with the CA's | - | ||||||
| 473 | certificate. | - | ||||||
| 474 | - | |||||||
| 475 | Peer certificates are checked automatically during the handshake | - | ||||||
| 476 | phase. This function is normally used to fetch certificates for | - | ||||||
| 477 | display, or for performing connection diagnostics. Certificates | - | ||||||
| 478 | contain information about the peer and the certificate issuers, | - | ||||||
| 479 | including host name, issuer names, and issuer public keys. | - | ||||||
| 480 | - | |||||||
| 481 | Because the peer certificate is set during the handshake phase, it | - | ||||||
| 482 | is safe to access the peer certificate from a slot connected to | - | ||||||
| 483 | the QSslSocket::sslErrors() signal, QNetworkReply::sslErrors() | - | ||||||
| 484 | signal, or the QSslSocket::encrypted() signal. | - | ||||||
| 485 | - | |||||||
| 486 | If an empty list is returned, it can mean the SSL handshake | - | ||||||
| 487 | failed, or it can mean the host you are connected to doesn't have | - | ||||||
| 488 | a certificate, or it can mean there is no connection. | - | ||||||
| 489 | - | |||||||
| 490 | If you want to get only the peer's immediate certificate, use | - | ||||||
| 491 | peerCertificate(). | - | ||||||
| 492 | - | |||||||
| 493 | \sa peerCertificate(), | - | ||||||
| 494 | QSslSocket::sslErrors(), QSslSocket::ignoreSslErrors(), | - | ||||||
| 495 | QNetworkReply::sslErrors(), QNetworkReply::ignoreSslErrors() | - | ||||||
| 496 | */ | - | ||||||
| 497 | QList<QSslCertificate> QSslConfiguration::peerCertificateChain() const | - | ||||||
| 498 | { | - | ||||||
| 499 | return d->peerCertificateChain; never executed: return d->peerCertificateChain; | 0 | ||||||
| 500 | } | - | ||||||
| 501 | - | |||||||
| 502 | /*! | - | ||||||
| 503 | Returns the socket's cryptographic \l {QSslCipher} {cipher}, or a | - | ||||||
| 504 | null cipher if the connection isn't encrypted. The socket's cipher | - | ||||||
| 505 | for the session is set during the handshake phase. The cipher is | - | ||||||
| 506 | used to encrypt and decrypt data transmitted through the socket. | - | ||||||
| 507 | - | |||||||
| 508 | The SSL infrastructure also provides functions for setting the | - | ||||||
| 509 | ordered list of ciphers from which the handshake phase will | - | ||||||
| 510 | eventually select the session cipher. This ordered list must be in | - | ||||||
| 511 | place before the handshake phase begins. | - | ||||||
| 512 | - | |||||||
| 513 | \sa ciphers(), setCiphers(), QSslSocket::supportedCiphers() | - | ||||||
| 514 | */ | - | ||||||
| 515 | QSslCipher QSslConfiguration::sessionCipher() const | - | ||||||
| 516 | { | - | ||||||
| 517 | return d->sessionCipher; never executed: return d->sessionCipher; | 0 | ||||||
| 518 | } | - | ||||||
| 519 | - | |||||||
| 520 | /*! | - | ||||||
| 521 | Returns the socket's SSL/TLS protocol or UnknownProtocol if the | - | ||||||
| 522 | connection isn't encrypted. The socket's protocol for the session | - | ||||||
| 523 | is set during the handshake phase. | - | ||||||
| 524 | - | |||||||
| 525 | \sa protocol(), setProtocol() | - | ||||||
| 526 | \since 5.4 | - | ||||||
| 527 | */ | - | ||||||
| 528 | QSsl::SslProtocol QSslConfiguration::sessionProtocol() const | - | ||||||
| 529 | { | - | ||||||
| 530 | return d->sessionProtocol; never executed: return d->sessionProtocol; | 0 | ||||||
| 531 | } | - | ||||||
| 532 | - | |||||||
| 533 | /*! | - | ||||||
| 534 | Returns the \l {QSslKey} {SSL key} assigned to this connection or | - | ||||||
| 535 | a null key if none has been assigned yet. | - | ||||||
| 536 | - | |||||||
| 537 | \sa setPrivateKey(), localCertificate() | - | ||||||
| 538 | */ | - | ||||||
| 539 | QSslKey QSslConfiguration::privateKey() const | - | ||||||
| 540 | { | - | ||||||
| 541 | return d->privateKey; executed 228 times by 4 tests: return d->privateKey;Executed by:
| 228 | ||||||
| 542 | } | - | ||||||
| 543 | - | |||||||
| 544 | /*! | - | ||||||
| 545 | Sets the connection's private \l {QSslKey} {key} to \a key. The | - | ||||||
| 546 | private key and the local \l {QSslCertificate} {certificate} are | - | ||||||
| 547 | used by clients and servers that must prove their identity to | - | ||||||
| 548 | SSL peers. | - | ||||||
| 549 | - | |||||||
| 550 | Both the key and the local certificate are required if you are | - | ||||||
| 551 | creating an SSL server socket. If you are creating an SSL client | - | ||||||
| 552 | socket, the key and local certificate are required if your client | - | ||||||
| 553 | must identify itself to an SSL server. | - | ||||||
| 554 | - | |||||||
| 555 | \sa privateKey(), setLocalCertificate() | - | ||||||
| 556 | */ | - | ||||||
| 557 | void QSslConfiguration::setPrivateKey(const QSslKey &key) | - | ||||||
| 558 | { | - | ||||||
| 559 | d->privateKey = key; | - | ||||||
| 560 | } never executed: end of block | 0 | ||||||
| 561 | - | |||||||
| 562 | /*! | - | ||||||
| 563 | Returns this connection's current cryptographic cipher suite. This | - | ||||||
| 564 | list is used during the handshake phase for choosing a | - | ||||||
| 565 | session cipher. The returned list of ciphers is ordered by | - | ||||||
| 566 | descending preference. (i.e., the first cipher in the list is the | - | ||||||
| 567 | most preferred cipher). The session cipher will be the first one | - | ||||||
| 568 | in the list that is also supported by the peer. | - | ||||||
| 569 | - | |||||||
| 570 | By default, the handshake phase can choose any of the ciphers | - | ||||||
| 571 | supported by this system's SSL libraries, which may vary from | - | ||||||
| 572 | system to system. The list of ciphers supported by this system's | - | ||||||
| 573 | SSL libraries is returned by QSslSocket::supportedCiphers(). You can restrict | - | ||||||
| 574 | the list of ciphers used for choosing the session cipher for this | - | ||||||
| 575 | socket by calling setCiphers() with a subset of the supported | - | ||||||
| 576 | ciphers. You can revert to using the entire set by calling | - | ||||||
| 577 | setCiphers() with the list returned by QSslSocket::supportedCiphers(). | - | ||||||
| 578 | - | |||||||
| 579 | \sa setCiphers(), QSslSocket::supportedCiphers() | - | ||||||
| 580 | */ | - | ||||||
| 581 | QList<QSslCipher> QSslConfiguration::ciphers() const | - | ||||||
| 582 | { | - | ||||||
| 583 | return d->ciphers; executed 602 times by 7 tests: return d->ciphers;Executed by:
| 602 | ||||||
| 584 | } | - | ||||||
| 585 | - | |||||||
| 586 | /*! | - | ||||||
| 587 | Sets the cryptographic cipher suite for this socket to \a ciphers, | - | ||||||
| 588 | which must contain a subset of the ciphers in the list returned by | - | ||||||
| 589 | supportedCiphers(). | - | ||||||
| 590 | - | |||||||
| 591 | Restricting the cipher suite must be done before the handshake | - | ||||||
| 592 | phase, where the session cipher is chosen. | - | ||||||
| 593 | - | |||||||
| 594 | \sa ciphers(), QSslSocket::supportedCiphers() | - | ||||||
| 595 | */ | - | ||||||
| 596 | void QSslConfiguration::setCiphers(const QList<QSslCipher> &ciphers) | - | ||||||
| 597 | { | - | ||||||
| 598 | d->ciphers = ciphers; | - | ||||||
| 599 | } executed 2 times by 1 test: end of blockExecuted by:
| 2 | ||||||
| 600 | - | |||||||
| 601 | /*! | - | ||||||
| 602 | \since 5.5 | - | ||||||
| 603 | - | |||||||
| 604 | Returns the list of cryptographic ciphers supported by this | - | ||||||
| 605 | system. This list is set by the system's SSL libraries and may | - | ||||||
| 606 | vary from system to system. | - | ||||||
| 607 | - | |||||||
| 608 | \sa ciphers(), setCiphers() | - | ||||||
| 609 | */ | - | ||||||
| 610 | QList<QSslCipher> QSslConfiguration::supportedCiphers() | - | ||||||
| 611 | { | - | ||||||
| 612 | return QSslSocketPrivate::supportedCiphers(); executed 43 times by 1 test: return QSslSocketPrivate::supportedCiphers();Executed by:
| 43 | ||||||
| 613 | } | - | ||||||
| 614 | - | |||||||
| 615 | /*! | - | ||||||
| 616 | Returns this connection's CA certificate database. The CA certificate | - | ||||||
| 617 | database is used by the socket during the handshake phase to | - | ||||||
| 618 | validate the peer's certificate. It can be modified prior to the | - | ||||||
| 619 | handshake with setCaCertificates(), or with \l{QSslSocket}'s | - | ||||||
| 620 | \l{QSslSocket::}{addCaCertificate()} and | - | ||||||
| 621 | \l{QSslSocket::}{addCaCertificates()}. | - | ||||||
| 622 | - | |||||||
| 623 | \sa setCaCertificates() | - | ||||||
| 624 | */ | - | ||||||
| 625 | QList<QSslCertificate> QSslConfiguration::caCertificates() const | - | ||||||
| 626 | { | - | ||||||
| 627 | return d->caCertificates; executed 602 times by 8 tests: return d->caCertificates;Executed by:
| 602 | ||||||
| 628 | } | - | ||||||
| 629 | - | |||||||
| 630 | /*! | - | ||||||
| 631 | Sets this socket's CA certificate database to be \a certificates. | - | ||||||
| 632 | The certificate database must be set prior to the SSL handshake. | - | ||||||
| 633 | The CA certificate database is used by the socket during the | - | ||||||
| 634 | handshake phase to validate the peer's certificate. | - | ||||||
| 635 | - | |||||||
| 636 | \sa caCertificates() | - | ||||||
| 637 | */ | - | ||||||
| 638 | void QSslConfiguration::setCaCertificates(const QList<QSslCertificate> &certificates) | - | ||||||
| 639 | { | - | ||||||
| 640 | d->caCertificates = certificates; | - | ||||||
| 641 | d->allowRootCertOnDemandLoading = false; | - | ||||||
| 642 | } executed 42 times by 2 tests: end of blockExecuted by:
| 42 | ||||||
| 643 | - | |||||||
| 644 | /*! | - | ||||||
| 645 | \since 5.5 | - | ||||||
| 646 | - | |||||||
| 647 | This function provides the CA certificate database | - | ||||||
| 648 | provided by the operating system. The CA certificate database | - | ||||||
| 649 | returned by this function is used to initialize the database | - | ||||||
| 650 | returned by caCertificates() on the default QSslConfiguration. | - | ||||||
| 651 | - | |||||||
| 652 | \sa caCertificates(), setCaCertificates(), defaultConfiguration() | - | ||||||
| 653 | */ | - | ||||||
| 654 | QList<QSslCertificate> QSslConfiguration::systemCaCertificates() | - | ||||||
| 655 | { | - | ||||||
| 656 | // we are calling ensureInitialized() in the method below | - | ||||||
| 657 | return QSslSocketPrivate::systemCaCertificates(); never executed: return QSslSocketPrivate::systemCaCertificates(); | 0 | ||||||
| 658 | } | - | ||||||
| 659 | - | |||||||
| 660 | /*! | - | ||||||
| 661 | Enables or disables an SSL compatibility \a option. If \a on | - | ||||||
| 662 | is true, the \a option is enabled. If \a on is false, the | - | ||||||
| 663 | \a option is disabled. | - | ||||||
| 664 | - | |||||||
| 665 | \sa testSslOption() | - | ||||||
| 666 | */ | - | ||||||
| 667 | void QSslConfiguration::setSslOption(QSsl::SslOption option, bool on) | - | ||||||
| 668 | { | - | ||||||
| 669 | d->sslOptions.setFlag(option, on); | - | ||||||
| 670 | } executed 3 times by 2 tests: end of blockExecuted by:
| 3 | ||||||
| 671 | - | |||||||
| 672 | /*! | - | ||||||
| 673 | \since 4.8 | - | ||||||
| 674 | - | |||||||
| 675 | Returns \c true if the specified SSL compatibility \a option is enabled. | - | ||||||
| 676 | - | |||||||
| 677 | \sa setSslOption() | - | ||||||
| 678 | */ | - | ||||||
| 679 | bool QSslConfiguration::testSslOption(QSsl::SslOption option) const | - | ||||||
| 680 | { | - | ||||||
| 681 | return d->sslOptions & option; executed 334 times by 7 tests: return d->sslOptions & option;Executed by:
| 334 | ||||||
| 682 | } | - | ||||||
| 683 | - | |||||||
| 684 | /*! | - | ||||||
| 685 | \since 5.2 | - | ||||||
| 686 | - | |||||||
| 687 | If QSsl::SslOptionDisableSessionPersistence was turned off, this | - | ||||||
| 688 | function returns the session ticket used in the SSL handshake in ASN.1 | - | ||||||
| 689 | format, suitable to e.g. be persisted to disk. If no session ticket was | - | ||||||
| 690 | used or QSsl::SslOptionDisableSessionPersistence was not turned off, | - | ||||||
| 691 | this function returns an empty QByteArray. | - | ||||||
| 692 | - | |||||||
| 693 | \note When persisting the session ticket to disk or similar, be | - | ||||||
| 694 | careful not to expose the session to a potential attacker, as | - | ||||||
| 695 | knowledge of the session allows for eavesdropping on data | - | ||||||
| 696 | encrypted with the session parameters. | - | ||||||
| 697 | - | |||||||
| 698 | \sa setSessionTicket(), QSsl::SslOptionDisableSessionPersistence, setSslOption() | - | ||||||
| 699 | */ | - | ||||||
| 700 | QByteArray QSslConfiguration::sessionTicket() const | - | ||||||
| 701 | { | - | ||||||
| 702 | return d->sslSession; executed 592 times by 7 tests: return d->sslSession;Executed by:
| 592 | ||||||
| 703 | } | - | ||||||
| 704 | - | |||||||
| 705 | /*! | - | ||||||
| 706 | \since 5.2 | - | ||||||
| 707 | - | |||||||
| 708 | Sets the session ticket to be used in an SSL handshake. | - | ||||||
| 709 | QSsl::SslOptionDisableSessionPersistence must be turned off | - | ||||||
| 710 | for this to work, and \a sessionTicket must be in ASN.1 format | - | ||||||
| 711 | as returned by sessionTicket(). | - | ||||||
| 712 | - | |||||||
| 713 | \sa sessionTicket(), QSsl::SslOptionDisableSessionPersistence, setSslOption() | - | ||||||
| 714 | */ | - | ||||||
| 715 | void QSslConfiguration::setSessionTicket(const QByteArray &sessionTicket) | - | ||||||
| 716 | { | - | ||||||
| 717 | d->sslSession = sessionTicket; | - | ||||||
| 718 | } executed 1 time by 1 test: end of blockExecuted by:
| 1 | ||||||
| 719 | - | |||||||
| 720 | /*! | - | ||||||
| 721 | \since 5.2 | - | ||||||
| 722 | - | |||||||
| 723 | If QSsl::SslOptionDisableSessionPersistence was turned off, this | - | ||||||
| 724 | function returns the session ticket life time hint sent by the | - | ||||||
| 725 | server (which might be 0). | - | ||||||
| 726 | If the server did not send a session ticket (e.g. when | - | ||||||
| 727 | resuming a session or when the server does not support it) or | - | ||||||
| 728 | QSsl::SslOptionDisableSessionPersistence was not turned off, | - | ||||||
| 729 | this function returns -1. | - | ||||||
| 730 | - | |||||||
| 731 | \sa sessionTicket(), QSsl::SslOptionDisableSessionPersistence, setSslOption() | - | ||||||
| 732 | */ | - | ||||||
| 733 | int QSslConfiguration::sessionTicketLifeTimeHint() const | - | ||||||
| 734 | { | - | ||||||
| 735 | return d->sslSessionTicketLifeTimeHint; executed 141 times by 4 tests: return d->sslSessionTicketLifeTimeHint;Executed by:
| 141 | ||||||
| 736 | } | - | ||||||
| 737 | - | |||||||
| 738 | /*! | - | ||||||
| 739 | \since 5.7 | - | ||||||
| 740 | - | |||||||
| 741 | Returns the ephemeral server key used for cipher algorithms | - | ||||||
| 742 | with forward secrecy, e.g. DHE-RSA-AES128-SHA. | - | ||||||
| 743 | - | |||||||
| 744 | The ephemeral key is only available when running in client mode, i.e. | - | ||||||
| 745 | QSslSocket::SslClientMode. When running in server mode or using a | - | ||||||
| 746 | cipher algorithm without forward secrecy a null key is returned. | - | ||||||
| 747 | The ephemeral server key will be set before emitting the encrypted() | - | ||||||
| 748 | signal. | - | ||||||
| 749 | */ | - | ||||||
| 750 | QSslKey QSslConfiguration::ephemeralServerKey() const | - | ||||||
| 751 | { | - | ||||||
| 752 | return d->ephemeralServerKey; executed 4 times by 1 test: return d->ephemeralServerKey;Executed by:
| 4 | ||||||
| 753 | } | - | ||||||
| 754 | - | |||||||
| 755 | /*! | - | ||||||
| 756 | \since 5.5 | - | ||||||
| 757 | - | |||||||
| 758 | Returns this connection's current list of elliptic curves. This | - | ||||||
| 759 | list is used during the handshake phase for choosing an | - | ||||||
| 760 | elliptic curve (when using an elliptic curve cipher). | - | ||||||
| 761 | The returned list of curves is ordered by descending preference | - | ||||||
| 762 | (i.e., the first curve in the list is the most preferred one). | - | ||||||
| 763 | - | |||||||
| 764 | By default, the handshake phase can choose any of the curves | - | ||||||
| 765 | supported by this system's SSL libraries, which may vary from | - | ||||||
| 766 | system to system. The list of curves supported by this system's | - | ||||||
| 767 | SSL libraries is returned by QSslSocket::supportedEllipticCurves(). | - | ||||||
| 768 | - | |||||||
| 769 | You can restrict the list of curves used for choosing the session cipher | - | ||||||
| 770 | for this socket by calling setEllipticCurves() with a subset of the | - | ||||||
| 771 | supported ciphers. You can revert to using the entire set by calling | - | ||||||
| 772 | setEllipticCurves() with the list returned by | - | ||||||
| 773 | QSslSocket::supportedEllipticCurves(). | - | ||||||
| 774 | - | |||||||
| 775 | \sa setEllipticCurves | - | ||||||
| 776 | */ | - | ||||||
| 777 | QVector<QSslEllipticCurve> QSslConfiguration::ellipticCurves() const | - | ||||||
| 778 | { | - | ||||||
| 779 | return d->ellipticCurves; executed 589 times by 7 tests: return d->ellipticCurves;Executed by:
| 589 | ||||||
| 780 | } | - | ||||||
| 781 | - | |||||||
| 782 | /*! | - | ||||||
| 783 | \since 5.5 | - | ||||||
| 784 | - | |||||||
| 785 | Sets the list of elliptic curves to be used by this socket to \a curves, | - | ||||||
| 786 | which must contain a subset of the curves in the list returned by | - | ||||||
| 787 | supportedEllipticCurves(). | - | ||||||
| 788 | - | |||||||
| 789 | Restricting the elliptic curves must be done before the handshake | - | ||||||
| 790 | phase, where the session cipher is chosen. | - | ||||||
| 791 | - | |||||||
| 792 | \sa ellipticCurves | - | ||||||
| 793 | */ | - | ||||||
| 794 | void QSslConfiguration::setEllipticCurves(const QVector<QSslEllipticCurve> &curves) | - | ||||||
| 795 | { | - | ||||||
| 796 | d->ellipticCurves = curves; | - | ||||||
| 797 | } never executed: end of block | 0 | ||||||
| 798 | - | |||||||
| 799 | /*! | - | ||||||
| 800 | \since 5.5 | - | ||||||
| 801 | - | |||||||
| 802 | Returns the list of elliptic curves supported by this | - | ||||||
| 803 | system. This list is set by the system's SSL libraries and may | - | ||||||
| 804 | vary from system to system. | - | ||||||
| 805 | - | |||||||
| 806 | \sa ellipticCurves(), setEllipticCurves() | - | ||||||
| 807 | */ | - | ||||||
| 808 | QVector<QSslEllipticCurve> QSslConfiguration::supportedEllipticCurves() | - | ||||||
| 809 | { | - | ||||||
| 810 | return QSslSocketPrivate::supportedEllipticCurves(); executed 2 times by 1 test: return QSslSocketPrivate::supportedEllipticCurves();Executed by:
| 2 | ||||||
| 811 | } | - | ||||||
| 812 | - | |||||||
| 813 | /*! | - | ||||||
| 814 | \since 5.3 | - | ||||||
| 815 | - | |||||||
| 816 | This function returns the protocol negotiated with the server | - | ||||||
| 817 | if the Next Protocol Negotiation (NPN) TLS extension was enabled. | - | ||||||
| 818 | In order for the NPN extension to be enabled, setAllowedNextProtocols() | - | ||||||
| 819 | needs to be called explicitly before connecting to the server. | - | ||||||
| 820 | - | |||||||
| 821 | If no protocol could be negotiated or the extension was not enabled, | - | ||||||
| 822 | this function returns a QByteArray which is null. | - | ||||||
| 823 | - | |||||||
| 824 | \sa setAllowedNextProtocols(), nextProtocolNegotiationStatus() | - | ||||||
| 825 | */ | - | ||||||
| 826 | QByteArray QSslConfiguration::nextNegotiatedProtocol() const | - | ||||||
| 827 | { | - | ||||||
| 828 | return d->nextNegotiatedProtocol; executed 232 times by 4 tests: return d->nextNegotiatedProtocol;Executed by:
| 232 | ||||||
| 829 | } | - | ||||||
| 830 | - | |||||||
| 831 | /*! | - | ||||||
| 832 | \since 5.3 | - | ||||||
| 833 | - | |||||||
| 834 | This function sets the allowed \a protocols to be negotiated with the | - | ||||||
| 835 | server through the Next Protocol Negotiation (NPN) TLS extension; each | - | ||||||
| 836 | element in \a protocols must define one allowed protocol. | - | ||||||
| 837 | The function must be called explicitly before connecting to send the NPN | - | ||||||
| 838 | extension in the SSL handshake. | - | ||||||
| 839 | Whether or not the negotiation succeeded can be queried through | - | ||||||
| 840 | nextProtocolNegotiationStatus(). | - | ||||||
| 841 | - | |||||||
| 842 | \sa nextNegotiatedProtocol(), nextProtocolNegotiationStatus(), allowedNextProtocols(), QSslConfiguration::NextProtocolSpdy3_0, QSslConfiguration::NextProtocolHttp1_1 | - | ||||||
| 843 | */ | - | ||||||
| 844 | #if QT_VERSION >= QT_VERSION_CHECK(6,0,0) | - | ||||||
| 845 | void QSslConfiguration::setAllowedNextProtocols(const QList<QByteArray> &protocols) | - | ||||||
| 846 | #else | - | ||||||
| 847 | void QSslConfiguration::setAllowedNextProtocols(QList<QByteArray> protocols) | - | ||||||
| 848 | #endif | - | ||||||
| 849 | { | - | ||||||
| 850 | d->nextAllowedProtocols = protocols; | - | ||||||
| 851 | } executed 112 times by 1 test: end of blockExecuted by:
| 112 | ||||||
| 852 | - | |||||||
| 853 | /*! | - | ||||||
| 854 | \since 5.3 | - | ||||||
| 855 | - | |||||||
| 856 | This function returns the allowed protocols to be negotiated with the | - | ||||||
| 857 | server through the Next Protocol Negotiation (NPN) TLS extension, as set | - | ||||||
| 858 | by setAllowedNextProtocols(). | - | ||||||
| 859 | - | |||||||
| 860 | \sa nextNegotiatedProtocol(), nextProtocolNegotiationStatus(), setAllowedNextProtocols(), QSslConfiguration::NextProtocolSpdy3_0, QSslConfiguration::NextProtocolHttp1_1 | - | ||||||
| 861 | */ | - | ||||||
| 862 | QList<QByteArray> QSslConfiguration::allowedNextProtocols() const | - | ||||||
| 863 | { | - | ||||||
| 864 | return d->nextAllowedProtocols; executed 139 times by 4 tests: return d->nextAllowedProtocols;Executed by:
| 139 | ||||||
| 865 | } | - | ||||||
| 866 | - | |||||||
| 867 | /*! | - | ||||||
| 868 | \since 5.3 | - | ||||||
| 869 | - | |||||||
| 870 | This function returns the status of the Next Protocol Negotiation (NPN). | - | ||||||
| 871 | If the feature has not been enabled through setAllowedNextProtocols(), | - | ||||||
| 872 | this function returns NextProtocolNegotiationNone. | - | ||||||
| 873 | The status will be set before emitting the encrypted() signal. | - | ||||||
| 874 | - | |||||||
| 875 | \sa setAllowedNextProtocols(), allowedNextProtocols(), nextNegotiatedProtocol(), QSslConfiguration::NextProtocolNegotiationStatus | - | ||||||
| 876 | */ | - | ||||||
| 877 | QSslConfiguration::NextProtocolNegotiationStatus QSslConfiguration::nextProtocolNegotiationStatus() const | - | ||||||
| 878 | { | - | ||||||
| 879 | return d->nextProtocolNegotiationStatus; executed 317 times by 5 tests: return d->nextProtocolNegotiationStatus;Executed by:
| 317 | ||||||
| 880 | } | - | ||||||
| 881 | - | |||||||
| 882 | /*! | - | ||||||
| 883 | Returns the default SSL configuration to be used in new SSL | - | ||||||
| 884 | connections. | - | ||||||
| 885 | - | |||||||
| 886 | The default SSL configuration consists of: | - | ||||||
| 887 | - | |||||||
| 888 | \list | - | ||||||
| 889 | \li no local certificate and no private key | - | ||||||
| 890 | \li protocol SecureProtocols (meaning either TLS 1.0 or SSL 3 will be used) | - | ||||||
| 891 | \li the system's default CA certificate list | - | ||||||
| 892 | \li the cipher list equal to the list of the SSL libraries' | - | ||||||
| 893 | supported SSL ciphers that are 128 bits or more | - | ||||||
| 894 | \endlist | - | ||||||
| 895 | - | |||||||
| 896 | \sa QSslSocket::supportedCiphers(), setDefaultConfiguration() | - | ||||||
| 897 | */ | - | ||||||
| 898 | QSslConfiguration QSslConfiguration::defaultConfiguration() | - | ||||||
| 899 | { | - | ||||||
| 900 | return QSslConfigurationPrivate::defaultConfiguration(); executed 1003 times by 11 tests: return QSslConfigurationPrivate::defaultConfiguration();Executed by:
| 1003 | ||||||
| 901 | } | - | ||||||
| 902 | - | |||||||
| 903 | /*! | - | ||||||
| 904 | Sets the default SSL configuration to be used in new SSL | - | ||||||
| 905 | connections to be \a configuration. Existing connections are not | - | ||||||
| 906 | affected by this call. | - | ||||||
| 907 | - | |||||||
| 908 | \sa QSslSocket::supportedCiphers(), defaultConfiguration() | - | ||||||
| 909 | */ | - | ||||||
| 910 | void QSslConfiguration::setDefaultConfiguration(const QSslConfiguration &configuration) | - | ||||||
| 911 | { | - | ||||||
| 912 | QSslConfigurationPrivate::setDefaultConfiguration(configuration); | - | ||||||
| 913 | } executed 16 times by 2 tests: end of blockExecuted by:
| 16 | ||||||
| 914 | - | |||||||
| 915 | /*! \internal | - | ||||||
| 916 | */ | - | ||||||
| 917 | bool QSslConfigurationPrivate::peerSessionWasShared(const QSslConfiguration &configuration) { | - | ||||||
| 918 | return configuration.d->peerSessionShared; executed 14 times by 1 test: return configuration.d->peerSessionShared;Executed by:
| 14 | ||||||
| 919 | } | - | ||||||
| 920 | - | |||||||
| 921 | QT_END_NAMESPACE | - | ||||||
| Source code | Switch to Preprocessed file |