QCA
Go to the documentation of this file.
32 #ifndef QCA_SECURELAYER_H
33 #define QCA_SECURELAYER_H
119 virtual bool isClosable()
const;
125 virtual int bytesAvailable()
const = 0;
131 virtual int bytesOutgoingAvailable()
const = 0;
140 virtual void close();
168 virtual void writeIncoming(
const QByteArray &a) = 0;
179 virtual QByteArray readOutgoing(
int *plainBytes =
nullptr) = 0;
195 virtual int convertBytesWritten(qint64 encryptedBytes) = 0;
212 void readyReadOutgoing();
387 QStringList supportedCipherSuites(
const Version &version = TLS_v1)
const;
412 void setCertificate(
const KeyBundle &kb);
447 void setConstraints(
int minSSF,
int maxSSF);
459 void setConstraints(
const QStringList &cipherSuiteList);
505 bool canCompress()
const;
513 bool canSetHostName()
const;
522 bool compressionEnabled()
const;
530 void setCompressionEnabled(
bool b);
573 void continueAfterStep();
582 bool isHandshaken()
const;
589 bool isCompressed()
const;
594 Version version()
const;
613 int cipherBits()
const;
621 int cipherMaxBits()
const;
634 Error errorCode()
const;
653 IdentityResult peerIdentityResult()
const;
663 Validity peerCertificateValidity()
const;
684 bool isClosable()
const override;
685 int bytesAvailable()
const override;
686 int bytesOutgoingAvailable()
const override;
687 void close()
override;
690 void writeIncoming(
const QByteArray &a)
override;
691 QByteArray readOutgoing(
int *plainBytes =
nullptr)
override;
693 int convertBytesWritten(qint64 encryptedBytes)
override;
701 int packetsAvailable()
const;
709 int packetsOutgoingAvailable()
const;
716 int packetMTU()
const;
725 void setPacketMTU(
int size)
const;
739 void hostNameReceived();
752 void certificateRequested();
764 void peerCertificateAvailable();
786 void connectNotify(
const QMetaMethod &signal)
override;
794 void disconnectNotify(
const QMetaMethod &signal)
override;
800 friend class Private;
869 AuthFlagsNone = 0x00,
871 AllowAnonymous = 0x02,
872 RequireForwardSecrecy = 0x04,
873 RequirePassCredentials = 0x08,
874 RequireMutualAuth = 0x10,
875 RequireAuthzidSupport = 0x20
883 AllowClientSendFirst,
884 DisableClientSendFirst
893 DisableServerSendLast
922 Params(
bool user,
bool authzid,
bool pass,
bool realm);
942 bool needUsername()
const;
947 bool canSendAuthzid()
const;
952 bool needPassword()
const;
957 bool canSendRealm()
const;
1010 void setConstraints(
AuthFlags f,
int minSSF,
int maxSSF);
1018 void setLocalAddress(
const QString &addr, quint16 port);
1026 void setRemoteAddress(
const QString &addr, quint16 port);
1033 void setExternalAuthId(
const QString &authid);
1041 void setExternalSSF(
int strength);
1054 void startClient(
const QString &service,
1070 void startServer(
const QString &service,
1084 void putServerFirstStep(
const QString &mech);
1132 Error errorCode()
const;
1144 void setUsername(
const QString &user);
1151 void setAuthzid(
const QString &auth);
1165 void setRealm(
const QString &realm);
1170 void continueAfterParams();
1175 void continueAfterAuthCheck();
1178 int bytesAvailable()
const override;
1179 int bytesOutgoingAvailable()
const override;
1182 void writeIncoming(
const QByteArray &a)
override;
1183 QByteArray readOutgoing(
int *plainBytes =
nullptr)
override;
1184 int convertBytesWritten(qint64 encryptedBytes)
override;
1199 void clientStarted(
bool clientInit,
const QByteArray &clientInitData);
1205 void serverStarted();
1242 void authenticated();
1245 Q_DISABLE_COPY(
SASL)
1248 friend class Private;
@ SSL_v3
Secure Socket Layer, version 3.
IdentityResult
Type of identity.
@ SL_High
must be more than 128 bit
@ NoUser
User not found (server side only)
@ InvalidCertificate
invalid cert
QCA - the Qt Cryptographic Architecture.
@ TLS_v1
Transport Layer Security, version 1.
Version
Version of TLS or SSL.
@ HostMismatch
valid cert provided, but wrong owner
@ BadProtocol
Bad protocol or cancelled.
SecurityLevel
Specify the lower-bound for acceptable TLS/SASL security layers.
@ BadServer
Server failed mutual authentication (client side only)
@ ErrorInit
problem starting up SASL
@ Expired
Passphrase expired, has to be reset (server side only)
@ ErrorCertKeyMismatch
certificate and private key don't match
@ ErrorHandshake
problem during the negotiation
@ SL_Highest
SL_High or max possible, whichever is greater.
@ NeedEncrypt
Encryption is needed in order to use mechanism (server side only)
@ TooWeak
Mechanism too weak for this user (server side only)
@ ErrorSignerExpired
local certificate is expired
ScriptableExtension * host() const
@ SL_Integrity
must at least get integrity protection
@ SSL_v2
Secure Socket Layer, version 2.
@ NoMechanism
No compatible/appropriate authentication mechanism.
@ Disabled
Account is disabled (server side only)
@ BadAuth
Authentication failure (server side only)
AuthCondition
Possible authentication error states.
ClientSendMode
Mode options for client side sending.
AuthFlags
Authentication requirement flag values.
@ SL_Baseline
must be 128 bit or more
@ ErrorInit
problem starting up TLS
@ ErrorHandshake
problem during the authentication process
Error
Possible errors that may occur when using SASL.
@ ErrorSignerInvalid
local certificate is invalid in some way
ServerSendMode
Mode options for server side sending.
@ Valid
identity is verified
@ AuthFail
Generic authentication failure.
Validity
The validity (or otherwise) of a certificate.
@ SL_Export
must be export level bits or more
@ SL_None
indicates that no security is ok
@ NoAuthzid
Authorization failure (server side only)
This file is part of the KDE documentation.
Documentation copyright © 1996-2023 The KDE developers.
Generated on Thu Mar 23 2023 03:56:41 by
doxygen 1.8.17 written
by
Dimitri van Heesch, © 1997-2006
KDE's Doxygen guidelines are available online.