summaryrefslogtreecommitdiffstats
path: root/kio/kssl/ksslcertificatehome.cc
diff options
context:
space:
mode:
authortoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
committertoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
commitce4a32fe52ef09d8f5ff1dd22c001110902b60a2 (patch)
tree5ac38a06f3dde268dc7927dc155896926aaf7012 /kio/kssl/ksslcertificatehome.cc
downloadtdelibs-ce4a32fe52ef09d8f5ff1dd22c001110902b60a2.tar.gz
tdelibs-ce4a32fe52ef09d8f5ff1dd22c001110902b60a2.zip
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdelibs@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'kio/kssl/ksslcertificatehome.cc')
-rw-r--r--kio/kssl/ksslcertificatehome.cc246
1 files changed, 246 insertions, 0 deletions
diff --git a/kio/kssl/ksslcertificatehome.cc b/kio/kssl/ksslcertificatehome.cc
new file mode 100644
index 000000000..48f0b3e3b
--- /dev/null
+++ b/kio/kssl/ksslcertificatehome.cc
@@ -0,0 +1,246 @@
+/* This file is part of the KDE project
+ *
+ * Copyright (C) 2000-2005 George Staikos <[email protected]>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Library General Public
+ * License as published by the Free Software Foundation; either
+ * version 2 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Library General Public License for more details.
+ *
+ * You should have received a copy of the GNU Library General Public License
+ * along with this library; see the file COPYING.LIB. If not, write to
+ * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ * Boston, MA 02110-1301, USA.
+ */
+
+#include <ksslcertificatehome.h>
+#include <ksslcertificate.h>
+#include <ksslpkcs12.h>
+
+#include <kresolver.h>
+#include <ksimpleconfig.h>
+
+using namespace KNetwork;
+
+QStringList KSSLCertificateHome::getCertificateList() {
+KSimpleConfig cfg("ksslcertificates", false);
+QStringList list = cfg.groupList();
+QString defaultstr("<default>");
+QString blankstr("");
+
+list.remove(defaultstr);
+list.remove(blankstr);
+
+return list;
+}
+
+
+// KDE 4: make it const QString &
+void KSSLCertificateHome::setDefaultCertificate(QString name, QString host, bool send, bool prompt) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+#ifdef Q_WS_WIN //temporary
+ cfg.setGroup(host);
+#else
+ cfg.setGroup(KResolver::domainToAscii(host));
+#endif
+ cfg.writeEntry("certificate", name);
+ cfg.writeEntry("send", send);
+ cfg.writeEntry("prompt", prompt);
+ cfg.sync();
+}
+
+
+// KDE 4: make it const QString &
+void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, QString host, bool send, bool prompt) {
+ if (cert)
+ KSSLCertificateHome::setDefaultCertificate(cert->name(), host, send, prompt);
+}
+
+
+// KDE 4: make it const QString &
+bool KSSLCertificateHome::addCertificate(QString filename, QString password, bool storePass) {
+KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
+
+ if (!pkcs) return false;
+
+ KSSLCertificateHome::addCertificate(pkcs, storePass?password:QString(""));
+ delete pkcs;
+
+return true;
+}
+
+
+// KDE 4: make it const QString &
+bool KSSLCertificateHome::addCertificate(KSSLPKCS12 *cert, QString passToStore) {
+ if (!cert) return false;
+
+KSimpleConfig cfg("ksslcertificates", false);
+
+ cfg.setGroup(cert->name());
+ cfg.writeEntry("PKCS12Base64", cert->toString());
+ cfg.writeEntry("Password", passToStore);
+ cfg.sync();
+return true;
+}
+
+bool KSSLCertificateHome::deleteCertificate(const QString &filename, const QString &password) {
+KSSLPKCS12 *pkcs = KSSLPKCS12::loadCertFile(filename, password);
+
+ if (!pkcs) return false;
+
+ bool ok = deleteCertificate(pkcs);
+ delete pkcs;
+
+return ok;
+}
+
+bool KSSLCertificateHome::deleteCertificate(KSSLPKCS12 *cert) {
+ if (!cert) return false;
+
+ return deleteCertificateByName(cert->name());
+}
+
+bool KSSLCertificateHome::deleteCertificateByName(const QString &name) {
+ if (name.isEmpty()) return false;
+
+KSimpleConfig cfg("ksslcertificates", false);
+
+ bool ok = cfg.deleteGroup(name);
+ cfg.sync();
+
+return ok;
+}
+
+// KDE 4: make it const QString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByName(QString name, QString password) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return NULL;
+
+ cfg.setGroup(name);
+
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
+}
+
+
+// KDE 4: make it const QString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByName(QString name) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return NULL;
+
+ cfg.setGroup(name);
+
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), cfg.readEntry("Password", ""));
+}
+
+
+// KDE 4: make it const QString &
+bool KSSLCertificateHome::hasCertificateByName(QString name) {
+KSimpleConfig cfg("ksslcertificates", false);
+ if (!cfg.hasGroup(name)) return false;
+ return true;
+}
+
+// KDE 4: make it const QString &
+KSSLPKCS12* KSSLCertificateHome::getCertificateByHost(QString host, QString password, KSSLAuthAction *aa) {
+ return KSSLCertificateHome::getCertificateByName(KSSLCertificateHome::getDefaultCertificateName(host, aa), password);
+}
+
+
+// KDE 4: make it const QString &
+QString KSSLCertificateHome::getDefaultCertificateName(QString host, KSSLAuthAction *aa) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+#ifdef Q_WS_WIN //temporary
+ if (!cfg.hasGroup(host)) {
+#else
+ if (!cfg.hasGroup(KResolver::domainToAscii(host))) {
+#endif
+ if (aa) *aa = AuthNone;
+ return QString::null;
+ } else {
+#ifdef Q_WS_WIN //temporary
+ cfg.setGroup(host);
+#else
+ cfg.setGroup(KResolver::domainToAscii(host));
+#endif
+ if (aa) {
+ bool tmp = cfg.readBoolEntry("send", false);
+ *aa = AuthSend;
+ if (!tmp) {
+ tmp = cfg.readBoolEntry("prompt", false);
+ *aa = AuthPrompt;
+ if (!tmp) {
+ *aa = AuthDont;
+ }
+ }
+ }
+ return cfg.readEntry("certificate", "");
+ }
+}
+
+
+QString KSSLCertificateHome::getDefaultCertificateName(KSSLAuthAction *aa) {
+KConfig cfg("cryptodefaults", false);
+
+ cfg.setGroup("Auth");
+ if (aa) {
+ QString am = cfg.readEntry("AuthMethod", "");
+ if (am == "send")
+ *aa = AuthSend;
+ else if (am == "prompt")
+ *aa = AuthPrompt;
+ else
+ *aa = AuthDont;
+ }
+
+return cfg.readEntry("DefaultCert", "");
+}
+
+
+// KDE 4: make it const QString &
+KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(QString password, KSSLAuthAction *aa) {
+QString name = KSSLCertificateHome::getDefaultCertificateName(aa);
+KSimpleConfig cfg("ksslcertificates", false);
+
+ if (name.isEmpty()) return NULL;
+
+ cfg.setGroup(name);
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""), password);
+}
+
+
+
+KSSLPKCS12* KSSLCertificateHome::getDefaultCertificate(KSSLAuthAction *aa) {
+QString name = KSSLCertificateHome::getDefaultCertificateName(aa);
+KSimpleConfig cfg("ksslcertificates", false);
+
+ if (name.isEmpty()) return NULL;
+
+ cfg.setGroup(name);
+ return KSSLPKCS12::fromString(cfg.readEntry("PKCS12Base64", ""),
+ cfg.readEntry("Password", ""));
+}
+
+
+// KDE 4: make it const QString &
+void KSSLCertificateHome::setDefaultCertificate(QString name, bool send, bool prompt) {
+KSimpleConfig cfg("ksslauthmap", false);
+
+ cfg.setGroup("<default>");
+ cfg.writeEntry("defaultCertificate", name);
+ cfg.writeEntry("send", send);
+ cfg.writeEntry("prompt", prompt);
+}
+
+
+void KSSLCertificateHome::setDefaultCertificate(KSSLPKCS12 *cert, bool send, bool prompt) {
+ if (cert)
+ KSSLCertificateHome::setDefaultCertificate(cert->name(), send, prompt);
+}
+