KWallet

kwalletbackend.cc
1/*
2 This file is part of the KDE project
3 SPDX-FileCopyrightText: 2001-2004 George Staikos <staikos@kde.org>
4
5 SPDX-License-Identifier: LGPL-2.0-or-later
6*/
7
8#include "kwalletbackend.h"
9#include "kwalletbackend_debug.h"
10
11#include <stdlib.h>
12
13#include <QSaveFile>
14#ifdef HAVE_GPGMEPP
15#include <gpgme++/key.h>
16#endif
17#include <gcrypt.h>
18#include <KNotification>
19#include <KLocalizedString>
20
21#include <QDir>
22#include <QFile>
23#include <QFileInfo>
24#include <QSaveFile>
25#include <QCryptographicHash>
26#include <QRegularExpression>
27#include <QStandardPaths>
28
29#include "blowfish.h"
30#include "sha1.h"
31#include "cbc.h"
32
33#include <assert.h>
34#include <cerrno>
35
36// quick fix to get random numbers on win32
37#ifdef Q_OS_WIN //krazy:exclude=cpp
38#include <windows.h>
39#include <wincrypt.h>
40#endif
41
42#define KWALLETSTORAGE_VERSION_MAJOR 0
43#define KWALLETSTORAGE_VERSION_MINOR 1
44
45using namespace KWallet;
46
47#define KWMAGIC "KWALLET\n\r\0\r\n"
48
49static const QByteArray walletAllowedChars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789^&'@{}[],$=!-#()%.+_\r\n\t\f\v ";
50
51/* The encoding works if the name contains at least one unsupported character.
52 * Names that were allowed prior to the Secret Service API patch remain intact.
53 */
54QString Backend::encodeWalletName(const QString &name) {
55 /* Use a semicolon as "percent" because it does not conflict with already allowed characters for wallet names
56 * and is allowed for file names
57 */
58 return QString::fromUtf8(name.toUtf8().toPercentEncoding(walletAllowedChars, {}, ';'));
59}
60
61QString Backend::decodeWalletName(const QString &encodedName) {
63}
64
65gcry_error_t ensureGcryptInit()
66{
67 bool static gcry_secmem_init = false;
68 if (gcry_secmem_init) {
69 return 0;
70 }
71 gcry_error_t error = gcry_control(GCRYCTL_INIT_SECMEM, 32768, 0);
72 if (error != 0) {
73 qCWarning(KWALLETBACKEND_LOG) << "Can't get secure memory:" << error;
74 return error;
75 }
76 gcry_secmem_init = true;
77
78 gcry_control(GCRYCTL_INITIALIZATION_FINISHED, 0);
79
80 return error;
81}
82
83class Backend::BackendPrivate
84{
85};
86
87// static void initKWalletDir()
88// {
89// KGlobal::dirs()->addResourceType("kwallet", 0, "share/apps/kwallet");
90// }
91
92Backend::Backend(const QString &name, bool isPath)
93 : d(nullptr),
94 _name(name),
95 _cipherType(KWallet::BACKEND_CIPHER_UNKNOWN)
96{
97// initKWalletDir();
98
99 ensureGcryptInit();
100
101 if (isPath) {
102 _path = name;
103 } else {
104 _path = getSaveLocation() + '/' + encodeWalletName(_name) + ".kwl";
105 }
106
107 _open = false;
108}
109
110Backend::~Backend()
111{
112 if (_open) {
113 close();
114 }
115 delete d;
116}
117
118QString Backend::getSaveLocation()
119{
120 QString writeLocation = QStandardPaths::writableLocation(QStandardPaths::GenericDataLocation) + QLatin1String("/kwalletd");
121 QDir writeDir(writeLocation);
122 if (!writeDir.exists()) {
123 if (!writeDir.mkpath(writeLocation)) {
124 qFatal("Cannot create wallet save location!");
125 }
126 }
127
128 // qCDebug(KWALLETBACKEND_LOG) << "Using saveLocation " + writeLocation;
129 return writeLocation;
130}
131
132void Backend::setCipherType(BackendCipherType ct)
133{
134 // changing cipher type on already initialed wallets is not permitted
135 assert(_cipherType == KWallet::BACKEND_CIPHER_UNKNOWN);
136 _cipherType = ct;
137}
138
139static int password2PBKDF2_SHA512(const QByteArray &password, QByteArray &hash, const QByteArray &salt)
140{
141 if (!gcry_check_version("1.5.0")) {
142 qCWarning(KWALLETBACKEND_LOG) << "libcrypt version is too old";
143 return GPG_ERR_USER_2;
144 }
145
146 gcry_error_t error = ensureGcryptInit();
147 if (error != 0) {
148 return error;
149 }
150
151 error = gcry_kdf_derive(password.constData(), password.size(),
152 GCRY_KDF_PBKDF2, GCRY_MD_SHA512,
153 salt.data(), salt.size(),
154 PBKDF2_SHA512_ITERATIONS, PBKDF2_SHA512_KEYSIZE, hash.data());
155
156 return error;
157}
158
159// this should be SHA-512 for release probably
160static int password2hash(const QByteArray &password, QByteArray &hash)
161{
162 SHA1 sha;
163 int shasz = sha.size() / 8;
164
165 assert(shasz >= 20);
166
167 QByteArray block1(shasz, 0);
168
169 sha.process(password.data(), qMin(password.size(), 16));
170
171 // To make brute force take longer
172 for (int i = 0; i < 2000; i++) {
173 memcpy(block1.data(), sha.hash(), shasz);
174 sha.reset();
175 sha.process(block1.data(), shasz);
176 }
177
178 sha.reset();
179
180 if (password.size() > 16) {
181 sha.process(password.data() + 16, qMin(password.size() - 16, 16));
182 QByteArray block2(shasz, 0);
183 // To make brute force take longer
184 for (int i = 0; i < 2000; i++) {
185 memcpy(block2.data(), sha.hash(), shasz);
186 sha.reset();
187 sha.process(block2.data(), shasz);
188 }
189
190 sha.reset();
191
192 if (password.size() > 32) {
193 sha.process(password.data() + 32, qMin(password.size() - 32, 16));
194
195 QByteArray block3(shasz, 0);
196 // To make brute force take longer
197 for (int i = 0; i < 2000; i++) {
198 memcpy(block3.data(), sha.hash(), shasz);
199 sha.reset();
200 sha.process(block3.data(), shasz);
201 }
202
203 sha.reset();
204
205 if (password.size() > 48) {
206 sha.process(password.data() + 48, password.size() - 48);
207
208 QByteArray block4(shasz, 0);
209 // To make brute force take longer
210 for (int i = 0; i < 2000; i++) {
211 memcpy(block4.data(), sha.hash(), shasz);
212 sha.reset();
213 sha.process(block4.data(), shasz);
214 }
215
216 sha.reset();
217 // split 14/14/14/14
218 hash.resize(56);
219 memcpy(hash.data(), block1.data(), 14);
220 memcpy(hash.data() + 14, block2.data(), 14);
221 memcpy(hash.data() + 28, block3.data(), 14);
222 memcpy(hash.data() + 42, block4.data(), 14);
223 block4.fill(0);
224 } else {
225 // split 20/20/16
226 hash.resize(56);
227 memcpy(hash.data(), block1.data(), 20);
228 memcpy(hash.data() + 20, block2.data(), 20);
229 memcpy(hash.data() + 40, block3.data(), 16);
230 }
231 block3.fill(0);
232 } else {
233 // split 20/20
234 hash.resize(40);
235 memcpy(hash.data(), block1.data(), 20);
236 memcpy(hash.data() + 20, block2.data(), 20);
237 }
238 block2.fill(0);
239 } else {
240 // entirely block1
241 hash.resize(20);
242 memcpy(hash.data(), block1.data(), 20);
243 }
244
245 block1.fill(0);
246
247 return 0;
248}
249
250int Backend::deref()
251{
252 if (--_ref < 0) {
253 qCDebug(KWALLETBACKEND_LOG) << "refCount negative!";
254 _ref = 0;
255 }
256 return _ref;
257}
258
259bool Backend::exists(const QString &wallet)
260{
261 QString saveLocation = getSaveLocation();
262 QString path = saveLocation + '/' + encodeWalletName(wallet) + QLatin1String(".kwl");
263 // Note: 60 bytes is presently the minimum size of a wallet file.
264 // Anything smaller is junk.
265 return QFile::exists(path) && QFileInfo(path).size() >= 60;
266}
267
268QString Backend::openRCToString(int rc)
269{
270 switch (rc) {
271 case -255:
272 return i18n("Already open.");
273 case -2:
274 return i18n("Error opening file.");
275 case -3:
276 return i18n("Not a wallet file.");
277 case -4:
278 return i18n("Unsupported file format revision.");
279 case -41:
280 return QStringLiteral("Unknown cipher or hash"); //FIXME: use i18n after string freeze
281 case -42:
282 return i18n("Unknown encryption scheme.");
283 case -43:
284 return i18n("Corrupt file?");
285 case -8:
286 return i18n("Error validating wallet integrity. Possibly corrupted.");
287 case -5:
288 case -7:
289 case -9:
290 return i18n("Read error - possibly incorrect password.");
291 case -6:
292 return i18n("Decryption error.");
293 default:
294 return QString();
295 }
296}
297
298int Backend::open(const QByteArray &password, WId w)
299{
300 if (_open) {
301 return -255; // already open
302 }
303
304 setPassword(password);
305 return openInternal(w);
306}
307
308#ifdef HAVE_GPGMEPP
309int Backend::open(const GpgME::Key &key)
310{
311 if (_open) {
312 return -255; // already open
313 }
314 _gpgKey = key;
315 return openInternal();
316}
317#endif // HAVE_GPGMEPP
318
319int Backend::openPreHashed(const QByteArray &passwordHash)
320{
321 if (_open) {
322 return -255; // already open
323 }
324
325 // check the password hash for correct size (currently fixed)
326 if (passwordHash.size() != 20 && passwordHash.size() != 40 &&
327 passwordHash.size() != 56) {
328 return -42; // unsupported encryption scheme
329 }
330
331 _passhash = passwordHash;
332 _newPassHash = passwordHash;
333 _useNewHash = true;//Only new hash is supported
334
335 return openInternal();
336}
337
338int Backend::openInternal(WId w)
339{
340 // No wallet existed. Let's create it.
341 // Note: 60 bytes is presently the minimum size of a wallet file.
342 // Anything smaller is junk and should be deleted.
343 if (!QFile::exists(_path) || QFileInfo(_path).size() < 60) {
344 QFile newfile(_path);
345 if (!newfile.open(QIODevice::ReadWrite)) {
346 return -2; // error opening file
347 }
348 newfile.close();
349 _open = true;
350 if (sync(w) != 0) {
351 return -2;
352 }
353 }
354
355 QFile db(_path);
356
357 if (!db.open(QIODevice::ReadOnly)) {
358 return -2; // error opening file
359 }
360
361 char magicBuf[KWMAGIC_LEN];
362 db.read(magicBuf, KWMAGIC_LEN);
363 if (memcmp(magicBuf, KWMAGIC, KWMAGIC_LEN) != 0) {
364 return -3; // bad magic
365 }
366
367 db.read(magicBuf, 4);
368
369 // First byte is major version, second byte is minor version
370 if (magicBuf[0] != KWALLETSTORAGE_VERSION_MAJOR) {
371 return -4; // unknown version
372 }
373
374 //0 has been the MINOR version until 4.13, from that point we use it to upgrade the hash
375 if (magicBuf[1] == 1) {
376 qCDebug(KWALLETBACKEND_LOG) << "Wallet new enough, using new hash";
377 swapToNewHash();
378 } else if (magicBuf[1] != 0) {
379 qCDebug(KWALLETBACKEND_LOG) << "Wallet is old, sad panda :(";
380 return -4; // unknown version
381 }
382
383 BackendPersistHandler *phandler = BackendPersistHandler::getPersistHandler(magicBuf);
384 if (nullptr == phandler) {
385 return -41; // unknown cipher or hash
386 }
387 int result = phandler->read(this, db, w);
388 delete phandler;
389 return result;
390}
391
392void Backend::swapToNewHash()
393{
394 //Runtime error happened and we can't use the new hash
395 if (!_useNewHash) {
396 qCDebug(KWALLETBACKEND_LOG) << "Runtime error on the new hash";
397 return;
398 }
399 _passhash.fill(0);//Making sure the old passhash is not around in memory
400 _passhash = _newPassHash;//Use the new hash, means the wallet is modern enough
401}
402
403QByteArray Backend::createAndSaveSalt(const QString &path) const
404{
405 QFile saltFile(path);
406 saltFile.remove();
407
408 if (!saltFile.open(QIODevice::WriteOnly)) {
409 return QByteArray();
410 }
411 saltFile.setPermissions(QFile::ReadUser | QFile::WriteUser);
412
413 if (ensureGcryptInit() != 0) {
414 return QByteArray();
415 }
416
417 QByteArray salt(PBKDF2_SHA512_SALTSIZE, Qt::Initialization::Uninitialized);
418 gcry_randomize(salt.data(), salt.size(), GCRY_STRONG_RANDOM);
419
420
421 if (saltFile.write(salt) != PBKDF2_SHA512_SALTSIZE) {
422 return QByteArray();
423 }
424
425 saltFile.close();
426
427 return salt;
428}
429
430int Backend::sync(WId w)
431{
432 if (!_open) {
433 return -255; // not open yet
434 }
435
436 if (!QFile::exists(_path)) {
437 return -3; // File does not exist
438 }
439
440 QSaveFile sf(_path);
441
443 return -1; // error opening file
444 }
445 sf.setPermissions(QFile::ReadUser | QFile::WriteUser);
446
447 if (sf.write(KWMAGIC, KWMAGIC_LEN) != KWMAGIC_LEN) {
448 sf.cancelWriting();
449 return -4; // write error
450 }
451
452 // Write the version number
453 QByteArray version(4, 0);
454 version[0] = KWALLETSTORAGE_VERSION_MAJOR;
455 if (_useNewHash) {
456 version[1] = KWALLETSTORAGE_VERSION_MINOR;
457 //Use the sync to update the hash to PBKDF2_SHA512
458 swapToNewHash();
459 } else {
460 version[1] = 0; //was KWALLETSTORAGE_VERSION_MINOR before the new hash
461 }
462
463 BackendPersistHandler *phandler = BackendPersistHandler::getPersistHandler(_cipherType);
464 if (nullptr == phandler) {
465 return -4; // write error
466 }
467 int rc = phandler->write(this, sf, version, w);
468 if (rc < 0) {
469 // Oops! wallet file sync filed! Display a notification about that
470 // TODO: change kwalletd status flags, when status flags will be implemented
471 KNotification *notification = new KNotification(QStringLiteral("syncFailed"));
472 notification->setText(i18n("Failed to sync wallet <b>%1</b> to disk. Error codes are:\nRC <b>%2</b>\nSF <b>%3</b>. Please file a BUG report using this information to bugs.kde.org", _name, rc, sf.errorString()));
473 notification->sendEvent();
474 }
475 delete phandler;
476 return rc;
477}
478
479int Backend::closeInternal(bool save)
480{
481 // save if requested
482 if (save) {
483 int rc = sync(0);
484 if (rc != 0) {
485 return rc;
486 }
487 }
488
489 // do the actual close
490 for (FolderMap::ConstIterator i = _entries.constBegin(); i != _entries.constEnd(); ++i) {
491 for (EntryMap::ConstIterator j = i.value().constBegin(); j != i.value().constEnd(); ++j) {
492 delete j.value();
493 }
494 }
495 _entries.clear();
496 _open = false;
497
498 return 0;
499}
500
501int Backend::close(bool save)
502{
503 int rc = closeInternal(save);
504 if (rc)
505 return rc;
506
507 // empty the password hash
508 _passhash.fill(0);
509 _newPassHash.fill(0);
510
511 return 0;
512}
513
514const QString &Backend::walletName() const
515{
516 return _name;
517}
518
519int Backend::renameWallet(const QString &newName, bool isPath)
520{
521 QString newPath;
522 const auto saveLocation = getSaveLocation();
523
524 if (isPath) {
525 newPath = newName;
526 } else {
527 newPath = saveLocation + QChar::fromLatin1('/') + encodeWalletName(newName) + QStringLiteral(".kwl");
528 }
529
530 if (newPath == _path) {
531 return 0;
532 }
533
534 if (QFile::exists(newPath)) {
535 return -EEXIST;
536 }
537
538 int rc = closeInternal(true);
539 if (rc) {
540 return rc;
541 }
542
543 QFile::rename(_path, newPath);
544 QFile::rename(saveLocation + QChar::fromLatin1('/') + encodeWalletName(_name) + QStringLiteral(".salt"),
545 saveLocation + QChar::fromLatin1('/') + encodeWalletName(newName) + QStringLiteral(".salt"));
546
547 _name = newName;
548 _path = newPath;
549
550 rc = openInternal();
551 if (rc) {
552 return rc;
553 }
554
555 return 0;
556}
557
558bool Backend::isOpen() const
559{
560 return _open;
561}
562
563QStringList Backend::folderList() const
564{
565 return _entries.keys();
566}
567
568QStringList Backend::entryList() const
569{
570 return _entries[_folder].keys();
571}
572
573Entry *Backend::readEntry(const QString &key)
574{
575 Entry *rc = nullptr;
576
577 if (_open && hasEntry(key)) {
578 rc = _entries[_folder][key];
579 }
580
581 return rc;
582}
583
584#if KWALLET_BUILD_DEPRECATED_SINCE(5, 72)
585QList<Entry *> Backend::readEntryList(const QString &key)
586{
587 QList<Entry *> rc;
588
589 if (!_open) {
590 return rc;
591 }
592
593 // HACK: see Wallet::WalletPrivate::forEachItemThatMatches()
594 const QString pattern = QRegularExpression::wildcardToRegularExpression(key).replace(
595 QLatin1String("[^/]"), QLatin1String("."));
596 const QRegularExpression re(pattern);
597
598 const EntryMap &map = _entries[_folder];
599 for (EntryMap::ConstIterator i = map.begin(); i != map.end(); ++i) {
600 if (re.match(i.key()).hasMatch()) {
601 rc.append(i.value());
602 }
603 }
604 return rc;
605}
606#endif
607
608QList<Entry *> Backend::entriesList() const
609{
610 if (!_open) {
611 return QList<Entry *>();
612 }
613 const EntryMap &map = _entries[_folder];
614
615 return map.values();
616}
617
618
619bool Backend::createFolder(const QString &f)
620{
621 if (_entries.contains(f)) {
622 return false;
623 }
624
625 _entries.insert(f, EntryMap());
626
627 QCryptographicHash folderMd5(QCryptographicHash::Md5);
628 folderMd5.addData(f.toUtf8());
629 _hashes.insert(MD5Digest(folderMd5.result()), QList<MD5Digest>());
630
631 return true;
632}
633
634int Backend::renameEntry(const QString &oldName, const QString &newName)
635{
636 EntryMap &emap = _entries[_folder];
637 EntryMap::Iterator oi = emap.find(oldName);
638 EntryMap::Iterator ni = emap.find(newName);
639
640 if (oi != emap.end() && ni == emap.end()) {
641 Entry *e = oi.value();
642 emap.erase(oi);
643 emap[newName] = e;
644
645 QCryptographicHash folderMd5(QCryptographicHash::Md5);
646 folderMd5.addData(_folder.toUtf8());
647
648 HashMap::iterator i = _hashes.find(MD5Digest(folderMd5.result()));
649 if (i != _hashes.end()) {
650 QCryptographicHash oldMd5(QCryptographicHash::Md5);
651 QCryptographicHash newMd5(QCryptographicHash::Md5);
652 oldMd5.addData(oldName.toUtf8());
653 newMd5.addData(newName.toUtf8());
654 i.value().removeAll(MD5Digest(oldMd5.result()));
655 i.value().append(MD5Digest(newMd5.result()));
656 }
657 return 0;
658 }
659
660 return -1;
661}
662
663void Backend::writeEntry(Entry *e)
664{
665 if (!_open) {
666 return;
667 }
668
669 if (!hasEntry(e->key())) {
670 _entries[_folder][e->key()] = new Entry;
671 }
672 _entries[_folder][e->key()]->copy(e);
673
674 QCryptographicHash folderMd5(QCryptographicHash::Md5);
675 folderMd5.addData(_folder.toUtf8());
676
677 HashMap::iterator i = _hashes.find(MD5Digest(folderMd5.result()));
678 if (i != _hashes.end()) {
679 QCryptographicHash md5(QCryptographicHash::Md5);
680 md5.addData(e->key().toUtf8());
681 i.value().append(MD5Digest(md5.result()));
682 }
683}
684
685bool Backend::hasEntry(const QString &key) const
686{
687 return _entries.contains(_folder) && _entries[_folder].contains(key);
688}
689
690bool Backend::removeEntry(const QString &key)
691{
692 if (!_open) {
693 return false;
694 }
695
696 FolderMap::Iterator fi = _entries.find(_folder);
697 EntryMap::Iterator ei = fi.value().find(key);
698
699 if (fi != _entries.end() && ei != fi.value().end()) {
700 delete ei.value();
701 fi.value().erase(ei);
702 QCryptographicHash folderMd5(QCryptographicHash::Md5);
703 folderMd5.addData(_folder.toUtf8());
704
705 HashMap::iterator i = _hashes.find(MD5Digest(folderMd5.result()));
706 if (i != _hashes.end()) {
707 QCryptographicHash md5(QCryptographicHash::Md5);
708 md5.addData(key.toUtf8());
709 i.value().removeAll(MD5Digest(md5.result()));
710 }
711 return true;
712 }
713
714 return false;
715}
716
717bool Backend::removeFolder(const QString &f)
718{
719 if (!_open) {
720 return false;
721 }
722
723 FolderMap::Iterator fi = _entries.find(f);
724
725 if (fi != _entries.end()) {
726 if (_folder == f) {
727 _folder.clear();
728 }
729
730 for (EntryMap::Iterator ei = fi.value().begin(); ei != fi.value().end(); ++ei) {
731 delete ei.value();
732 }
733
734 _entries.erase(fi);
735
736 QCryptographicHash folderMd5(QCryptographicHash::Md5);
737 folderMd5.addData(f.toUtf8());
738 _hashes.remove(MD5Digest(folderMd5.result()));
739 return true;
740 }
741
742 return false;
743}
744
745bool Backend::folderDoesNotExist(const QString &folder) const
746{
747 QCryptographicHash md5(QCryptographicHash::Md5);
748 md5.addData(folder.toUtf8());
749 return !_hashes.contains(MD5Digest(md5.result()));
750}
751
752bool Backend::entryDoesNotExist(const QString &folder, const QString &entry) const
753{
754 QCryptographicHash md5(QCryptographicHash::Md5);
755 md5.addData(folder.toUtf8());
756 HashMap::const_iterator i = _hashes.find(MD5Digest(md5.result()));
757 if (i != _hashes.end()) {
758 md5.reset();
759 md5.addData(entry.toUtf8());
760 return !i.value().contains(MD5Digest(md5.result()));
761 }
762 return true;
763}
764
765void Backend::setPassword(const QByteArray &password)
766{
767 _passhash.fill(0); // empty just in case
768 BlowFish _bf;
769 CipherBlockChain bf(&_bf);
770 _passhash.resize(bf.keyLen() / 8);
771 _newPassHash.resize(bf.keyLen() / 8);
772 _newPassHash.fill(0);
773
774 password2hash(password, _passhash);
775
776 QByteArray salt;
777 QFile saltFile(getSaveLocation() + '/' + encodeWalletName(_name) + ".salt");
778 if (!saltFile.exists() || saltFile.size() == 0) {
779 salt = createAndSaveSalt(saltFile.fileName());
780 } else {
781 if (!saltFile.open(QIODevice::ReadOnly)) {
782 salt = createAndSaveSalt(saltFile.fileName());
783 } else {
784 salt = saltFile.readAll();
785 }
786 }
787
788 if (!salt.isEmpty() && password2PBKDF2_SHA512(password, _newPassHash, salt) == 0) {
789 qCDebug(KWALLETBACKEND_LOG) << "Setting useNewHash to true";
790 _useNewHash = true;
791 }
792}
793
794#ifdef HAVE_GPGMEPP
795const GpgME::Key &Backend::gpgKey() const
796{
797 return _gpgKey;
798}
799#endif
void sendEvent()
void setText(const QString &text)
QString i18n(const char *text, const TYPE &arg...)
KDB_EXPORT KDbVersionInfo version()
QString path(const QString &relativePath)
void error(QWidget *parent, const QString &text, const QString &title, const KGuiItem &buttonOk, Options options=Notify)
QString name(StandardAction id)
const char * constData() const const
char * data()
QByteArray fromPercentEncoding(const QByteArray &input, char percent)
bool isEmpty() const const
void resize(qsizetype newSize, char c)
qsizetype size() const const
QByteArray toPercentEncoding(const QByteArray &exclude, const QByteArray &include, char percent) const const
QChar fromLatin1(char c)
bool exists() const const
bool rename(const QString &newName)
void append(QList< T > &&value)
QString wildcardToRegularExpression(QStringView pattern, WildcardConversionOptions options)
QString writableLocation(StandardLocation type)
QString fromUtf8(QByteArrayView str)
QString & replace(QChar before, QChar after, Qt::CaseSensitivity cs)
QByteArray toUtf8() const const
QFuture< void > map(Iterator begin, Iterator end, MapFunctor &&function)
This file is part of the KDE documentation.
Documentation copyright © 1996-2025 The KDE developers.
Generated on Fri Apr 4 2025 12:01:28 by doxygen 1.13.2 written by Dimitri van Heesch, © 1997-2006

KDE's Doxygen guidelines are available online.