blob: 715fd19945bade748b2681df6c6d5617dd98bb2b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
|
// Copyright (C) 2021 The Qt Company Ltd.
// SPDX-License-Identifier: LicenseRef-Qt-Commercial OR LGPL-3.0-only OR GPL-2.0-only OR GPL-3.0-only
#ifndef QWINDOWSCAROOTFETCHER_P_H
#define QWINDOWSCAROOTFETCHER_P_H
#include <QtNetwork/private/qtnetworkglobal_p.h>
#include <QtNetwork/qsslcertificate.h>
#include <QtNetwork/qsslsocket.h>
#include <QtCore/QtGlobal>
#include <QtCore/QObject>
#include "../shared/qwincrypt_p.h"
//
// W A R N I N G
// -------------
//
// This file is not part of the Qt API. It exists purely as an
// implementation detail. This header file may change from version to
// version without notice, or even be removed.
//
// We mean it.
//
QT_BEGIN_NAMESPACE
class QWindowsCaRootFetcher : public QObject
{
Q_OBJECT
public:
QWindowsCaRootFetcher(const QSslCertificate &certificate, QSslSocket::SslMode sslMode,
const QList<QSslCertificate> &caCertificates = {},
const QString &hostName = {});
~QWindowsCaRootFetcher();
public slots:
void start();
signals:
void finished(QSslCertificate brokenChain, QSslCertificate caroot);
private:
QHCertStorePointer createAdditionalStore() const;
QSslCertificate cert;
QSslSocket::SslMode mode;
// In case the application set CA certificates in the configuration,
// in the past we did not load missing certs. But this disables
// recoverable case when a certificate has Authority Information Access
// extension. So we try to fetch in this scenario also, but in case
// explicitly trusted root was not in a system store, we'll do
// additional checks, thus we need 'peerVerifyName':
QList<QSslCertificate> explicitlyTrustedCAs;
QString peerVerifyName;
};
QT_END_NAMESPACE
#endif // QWINDOWSCAROOTFETCHER_P_H
|