diff options
author | Konstantin Ritt <ritt.ks@gmail.com> | 2015-01-23 13:11:18 +0400 |
---|---|---|
committer | Konstantin Ritt <ritt.ks@gmail.com> | 2015-01-28 17:05:44 +0000 |
commit | 131b3cffc839dea602998e62d238a525707b0f5b (patch) | |
tree | 02162ce5af7c1467af42e973058ffb7695c3e6c2 /src/network | |
parent | f99b3719f0b89842de82099215adea9a074e263f (diff) |
[QSSL] Pass params of shareable type by const-ref rather than by value
Change-Id: I9c09a3e2dfb90eb22d4509ac6c450a0bb5da48f6
Reviewed-by: Olivier Goffart (Woboq GmbH) <ogoffart@woboq.com>
Reviewed-by: Richard J. Moore <rich@kde.org>
Diffstat (limited to 'src/network')
-rw-r--r-- | src/network/ssl/qsslcertificate.cpp | 4 | ||||
-rw-r--r-- | src/network/ssl/qsslcertificate.h | 4 | ||||
-rw-r--r-- | src/network/ssl/qsslconfiguration.cpp | 4 | ||||
-rw-r--r-- | src/network/ssl/qsslconfiguration.h | 4 | ||||
-rw-r--r-- | src/network/ssl/qsslsocket_openssl.cpp | 2 | ||||
-rw-r--r-- | src/network/ssl/qsslsocket_openssl_p.h | 2 | ||||
-rw-r--r-- | src/network/ssl/qsslsocket_winrt.cpp | 2 | ||||
-rw-r--r-- | src/network/ssl/qsslsocket_winrt_p.h | 2 |
8 files changed, 20 insertions, 4 deletions
diff --git a/src/network/ssl/qsslcertificate.cpp b/src/network/ssl/qsslcertificate.cpp index c34d16a37a..302b2db285 100644 --- a/src/network/ssl/qsslcertificate.cpp +++ b/src/network/ssl/qsslcertificate.cpp @@ -559,7 +559,11 @@ QList<QSslCertificate> QSslCertificate::fromData(const QByteArray &data, QSsl::E \since 5.0 */ +#if QT_VERSION >= QT_VERSION_CHECK(6,0,0) +QList<QSslError> QSslCertificate::verify(const QList<QSslCertificate> &certificateChain, const QString &hostName) +#else QList<QSslError> QSslCertificate::verify(QList<QSslCertificate> certificateChain, const QString &hostName) +#endif { return QSslSocketBackendPrivate::verify(certificateChain, hostName); } diff --git a/src/network/ssl/qsslcertificate.h b/src/network/ssl/qsslcertificate.h index 6aa7544815..01c9df4314 100644 --- a/src/network/ssl/qsslcertificate.h +++ b/src/network/ssl/qsslcertificate.h @@ -136,7 +136,11 @@ public: static QList<QSslCertificate> fromData( const QByteArray &data, QSsl::EncodingFormat format = QSsl::Pem); +#if QT_VERSION >= QT_VERSION_CHECK(6,0,0) + static QList<QSslError> verify(const QList<QSslCertificate> &certificateChain, const QString &hostName = QString()); +#else static QList<QSslError> verify(QList<QSslCertificate> certificateChain, const QString &hostName = QString()); +#endif static bool importPkcs12(QIODevice *device, QSslKey *key, QSslCertificate *cert, diff --git a/src/network/ssl/qsslconfiguration.cpp b/src/network/ssl/qsslconfiguration.cpp index 9054d412f7..1686d9e635 100644 --- a/src/network/ssl/qsslconfiguration.cpp +++ b/src/network/ssl/qsslconfiguration.cpp @@ -773,7 +773,11 @@ QByteArray QSslConfiguration::nextNegotiatedProtocol() const \sa nextNegotiatedProtocol(), nextProtocolNegotiationStatus(), allowedNextProtocols(), QSslConfiguration::NextProtocolSpdy3_0, QSslConfiguration::NextProtocolHttp1_1 */ +#if QT_VERSION >= QT_VERSION_CHECK(6,0,0) +void QSslConfiguration::setAllowedNextProtocols(const QList<QByteArray> &protocols) +#else void QSslConfiguration::setAllowedNextProtocols(QList<QByteArray> protocols) +#endif { d->nextAllowedProtocols = protocols; } diff --git a/src/network/ssl/qsslconfiguration.h b/src/network/ssl/qsslconfiguration.h index 7bc7a32cb7..0f53413cfd 100644 --- a/src/network/ssl/qsslconfiguration.h +++ b/src/network/ssl/qsslconfiguration.h @@ -136,7 +136,11 @@ public: NextProtocolNegotiationUnsupported }; +#if QT_VERSION >= QT_VERSION_CHECK(6,0,0) + void setAllowedNextProtocols(const QList<QByteArray> &protocols); +#else void setAllowedNextProtocols(QList<QByteArray> protocols); +#endif QList<QByteArray> allowedNextProtocols() const; QByteArray nextNegotiatedProtocol() const; diff --git a/src/network/ssl/qsslsocket_openssl.cpp b/src/network/ssl/qsslsocket_openssl.cpp index 509db38672..aecbebfd1f 100644 --- a/src/network/ssl/qsslsocket_openssl.cpp +++ b/src/network/ssl/qsslsocket_openssl.cpp @@ -1643,7 +1643,7 @@ QList<QSslCertificate> QSslSocketBackendPrivate::STACKOFX509_to_QSslCertificates return certificates; } -QList<QSslError> QSslSocketBackendPrivate::verify(QList<QSslCertificate> certificateChain, const QString &hostName) +QList<QSslError> QSslSocketBackendPrivate::verify(const QList<QSslCertificate> &certificateChain, const QString &hostName) { QList<QSslError> errors; if (certificateChain.count() <= 0) { diff --git a/src/network/ssl/qsslsocket_openssl_p.h b/src/network/ssl/qsslsocket_openssl_p.h index 7fbccff802..9564ef8566 100644 --- a/src/network/ssl/qsslsocket_openssl_p.h +++ b/src/network/ssl/qsslsocket_openssl_p.h @@ -138,7 +138,7 @@ public: Q_AUTOTEST_EXPORT static long setupOpenSslOptions(QSsl::SslProtocol protocol, QSsl::SslOptions sslOptions); static QSslCipher QSslCipher_from_SSL_CIPHER(SSL_CIPHER *cipher); static QList<QSslCertificate> STACKOFX509_to_QSslCertificates(STACK_OF(X509) *x509); - static QList<QSslError> verify(QList<QSslCertificate> certificateChain, const QString &hostName); + static QList<QSslError> verify(const QList<QSslCertificate> &certificateChain, const QString &hostName); static QString getErrorsFromOpenSsl(); static bool importPkcs12(QIODevice *device, QSslKey *key, QSslCertificate *cert, diff --git a/src/network/ssl/qsslsocket_winrt.cpp b/src/network/ssl/qsslsocket_winrt.cpp index 7527422f75..96bc9b1159 100644 --- a/src/network/ssl/qsslsocket_winrt.cpp +++ b/src/network/ssl/qsslsocket_winrt.cpp @@ -654,7 +654,7 @@ HRESULT QSslSocketBackendPrivate::onSslUpgrade(IAsyncAction *action, AsyncStatus return S_OK; } -QList<QSslError> QSslSocketBackendPrivate::verify(QList<QSslCertificate> certificateChain, const QString &hostName) +QList<QSslError> QSslSocketBackendPrivate::verify(const QList<QSslCertificate> &certificateChain, const QString &hostName) { Q_UNIMPLEMENTED(); Q_UNUSED(certificateChain) diff --git a/src/network/ssl/qsslsocket_winrt_p.h b/src/network/ssl/qsslsocket_winrt_p.h index f0df7c6ef1..119635ceba 100644 --- a/src/network/ssl/qsslsocket_winrt_p.h +++ b/src/network/ssl/qsslsocket_winrt_p.h @@ -91,7 +91,7 @@ public: void continueHandshake() Q_DECL_OVERRIDE; static QList<QSslCipher> defaultCiphers(); - static QList<QSslError> verify(QList<QSslCertificate> certificateChain, const QString &hostName); + static QList<QSslError> verify(const QList<QSslCertificate> &certificateChain, const QString &hostName); static bool importPkcs12(QIODevice *device, QSslKey *key, QSslCertificate *cert, QList<QSslCertificate> *caCertificates, |