summaryrefslogtreecommitdiffstats
path: root/src/plugins/tls/schannel/qtls_schannel_p.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/plugins/tls/schannel/qtls_schannel_p.h')
-rw-r--r--src/plugins/tls/schannel/qtls_schannel_p.h123
1 files changed, 123 insertions, 0 deletions
diff --git a/src/plugins/tls/schannel/qtls_schannel_p.h b/src/plugins/tls/schannel/qtls_schannel_p.h
new file mode 100644
index 0000000000..fab8777249
--- /dev/null
+++ b/src/plugins/tls/schannel/qtls_schannel_p.h
@@ -0,0 +1,123 @@
+// Copyright (C) 2018 The Qt Company Ltd.
+// SPDX-License-Identifier: LicenseRef-Qt-Commercial OR LGPL-3.0-only OR GPL-2.0-only OR GPL-3.0-only
+
+#ifndef QTLS_SCHANNEL_P_H
+#define QTLS_SCHANNEL_P_H
+
+//
+// W A R N I N G
+// -------------
+//
+// This file is not part of the Qt API. It exists purely as an
+// implementation detail. This header file may change from version to
+// version without notice, or even be removed.
+//
+// We mean it.
+//
+
+#include <QtNetwork/private/qtnetworkglobal_p.h>
+
+QT_REQUIRE_CONFIG(schannel);
+
+#include "../shared/qwincrypt_p.h"
+
+#include "qtlsbackend_schannel_p.h"
+
+#include <QtNetwork/private/qsslsocket_p.h>
+
+#define SECURITY_WIN32
+#define SCHANNEL_USE_BLACKLISTS 1
+#include <winternl.h> // needed for UNICODE defines
+#include <security.h>
+#include <schnlsp.h>
+#undef SCHANNEL_USE_BLACKLISTS
+#undef SECURITY_WIN32
+
+QT_BEGIN_NAMESPACE
+
+namespace QTlsPrivate {
+
+class TlsCryptographSchannel final : public TlsCryptograph
+{
+ Q_DISABLE_COPY_MOVE(TlsCryptographSchannel)
+public:
+ TlsCryptographSchannel();
+ ~TlsCryptographSchannel();
+
+ void init(QSslSocket *q, QSslSocketPrivate *d) override;
+
+ void startClientEncryption() override;
+ void startServerEncryption() override;
+ void transmit() override;
+ void disconnectFromHost() override;
+ void disconnected() override;
+ QSslCipher sessionCipher() const override;
+ QSsl::SslProtocol sessionProtocol() const override;
+ void continueHandshake() override;
+ QList<QSslError> tlsErrors() const override;
+
+private:
+ enum class SchannelState {
+ InitializeHandshake, // create and transmit context (client)/accept context (server)
+ PerformHandshake, // get token back, process it
+ VerifyHandshake, // Verify that things are OK
+ Done, // Connection encrypted!
+ Renegotiate // Renegotiating!
+ } schannelState = SchannelState::InitializeHandshake;
+
+ void reset();
+ bool acquireCredentialsHandle();
+ ULONG getContextRequirements();
+ bool createContext(); // for clients
+ bool acceptContext(); // for server
+ bool performHandshake();
+ bool verifyHandshake();
+ bool renegotiate();
+
+ bool sendToken(void *token, unsigned long tokenLength, bool emitError = true);
+ QString targetName() const;
+
+ bool checkSslErrors();
+ void deallocateContext();
+ void freeCredentialsHandle();
+ void closeCertificateStores();
+ void sendShutdown();
+
+ void initializeCertificateStores();
+ bool verifyCertContext(CERT_CONTEXT *certContext);
+
+ bool rootCertOnDemandLoadingAllowed();
+
+ bool hasUndecryptedData() const override { return intermediateBuffer.size() > 0; }
+
+ QSslSocket *q = nullptr;
+ QSslSocketPrivate *d = nullptr;
+
+ SecPkgContext_CipherInfo cipherInfo = {};
+ SecPkgContext_ConnectionInfo connectionInfo = {};
+ SecPkgContext_StreamSizes streamSizes = {};
+
+ CredHandle credentialHandle; // Initialized in ctor
+ CtxtHandle contextHandle; // Initialized in ctor
+
+ QByteArray intermediateBuffer; // data which is left-over or incomplete
+
+ QHCertStorePointer localCertificateStore = nullptr;
+ QHCertStorePointer peerCertificateStore = nullptr;
+ QHCertStorePointer caCertificateStore = nullptr;
+
+ const CERT_CONTEXT *localCertContext = nullptr;
+
+ ULONG contextAttributes = 0;
+ qint64 missingData = 0;
+
+ bool renegotiating = false;
+ bool shutdown = false;
+ QList<QSslError> sslErrors;
+};
+
+} // namespace QTlsPrivate
+
+QT_END_NAMESPACE
+
+#endif // QTLS_SCHANNEL_P_H