• Skip to content
  • Skip to link menu
KDE 4.3 API Reference
  • KDE API Reference
  • kdelibs
  • Sitemap
  • Contact Us
 

KIO

kopenssl.h

Go to the documentation of this file.
00001 /* This file is part of the KDE libraries
00002    Copyright (C) 2001-2003 George Staikos <staikos@kde.org>
00003 
00004    This library is free software; you can redistribute it and/or
00005    modify it under the terms of the GNU Library General Public
00006    License version 2 as published by the Free Software Foundation.
00007 
00008    This library is distributed in the hope that it will be useful,
00009    but WITHOUT ANY WARRANTY; without even the implied warranty of
00010    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
00011    Library General Public License for more details.
00012 
00013    You should have received a copy of the GNU Library General Public License
00014    along with this library; see the file COPYING.LIB.  If not, write to
00015    the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
00016    Boston, MA 02110-1301, USA.
00017 */
00018 
00019 
00020 // IF YOU ARE USING THIS CLASS, YOU ARE MAKING A MISTAKE.
00021 
00022 #ifndef __KOPENSSLPROXY_H
00023 #define __KOPENSSLPROXY_H
00024 
00025 #define KOSSL KOpenSSLProxy
00026 class KOpenSSLProxyPrivate;
00027 
00028 #include <kio/kio_export.h>
00029 
00030 #include <ksslconfig.h>
00031 
00032 #ifdef KSSL_HAVE_SSL
00033 #define crypt _openssl_crypt
00034 #include <openssl/ssl.h>
00035 #include <openssl/x509.h>
00036 #include <openssl/x509v3.h>
00037 #include <openssl/pem.h>
00038 #include <openssl/bio.h>
00039 #include <openssl/rand.h>
00040 #include <openssl/asn1.h>
00041 #include <openssl/pkcs7.h>
00042 #include <openssl/pkcs12.h>
00043 #include <openssl/evp.h>
00044 #include <openssl/stack.h>
00045 #include <openssl/bn.h>
00046 #undef crypt
00047 #if OPENSSL_VERSION_NUMBER >= 0x10000000L
00048 #define STACK _STACK
00049 #define OSSL_SKVALUE_RTYPE void
00050 #define OSSL_MORECONST const
00051 #else
00052 #define OSSL_SKVALUE_RTYPE char
00053 #define OSSL_MORECONST
00054 #endif
00055 #endif
00056 
00065 class KOpenSSLProxy {
00066 public:
00067 
00072    static KOpenSSLProxy *self();
00073 
00077    bool hasLibCrypto() const;
00078 
00082    bool hasLibSSL() const;
00083 
00088    void destroy();
00089 
00090    // Here are the symbols that we need.
00091 #ifdef KSSL_HAVE_SSL
00092 
00093    /*
00094     *   SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
00095     */
00096    int SSL_connect(SSL *ssl);
00097 
00098    /*
00099     *   SSL_accept - initiate the TLS/SSL handshake with an TLS/SSL server
00100     */
00101    int SSL_accept(SSL *ssl);
00102 
00103    /*
00104     *   SSL_get_error - get the error code
00105     */
00106    int SSL_get_error(SSL *ssl, int rc);
00107 
00108    /*
00109     *   SSL_read - read bytes from a TLS/SSL connection.
00110     */
00111    int SSL_read(SSL *ssl, void *buf, int num);
00112 
00113    /*
00114     *   SSL_write - write bytes to a TLS/SSL connection.
00115     */
00116    int SSL_write(SSL *ssl, const void *buf, int num);
00117 
00118    /*
00119     *   SSL_new - create a new SSL structure for a connection
00120     */
00121    SSL *SSL_new(SSL_CTX *ctx);
00122 
00123    /*
00124     *   SSL_free - free an allocated SSL structure
00125     */
00126    void SSL_free(SSL *ssl);
00127 
00128    /*
00129     *   SSL_shutdown - shutdown an allocated SSL connection
00130     */
00131    int SSL_shutdown(SSL *ssl);
00132 
00133    /*
00134     *   SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions
00135     */
00136    SSL_CTX *SSL_CTX_new(SSL_METHOD *method);
00137 
00138    /*
00139     *   SSL_CTX_free - free an allocated SSL_CTX object
00140     */
00141    void SSL_CTX_free(SSL_CTX *ctx);
00142 
00143    /*
00144     *   SSL_set_fd - connect the SSL object with a file descriptor
00145     */
00146    int SSL_set_fd(SSL *ssl, int fd);
00147 
00148    /*
00149     *   SSL_pending - obtain number of readable bytes buffered in an SSL object
00150     */
00151    int SSL_pending(SSL *ssl);
00152 
00153    /*
00154     *   SSL_peek - obtain bytes buffered in an SSL object
00155     */
00156    int SSL_peek(SSL *ssl, void *buf, int num);
00157 
00158    /*
00159     *   SSL_CTX_set_cipher_list - choose list of available SSL_CIPHERs
00160     */
00161    int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str);
00162 
00163    /*
00164     *   SSL_CTX_set_verify - set peer certificate verification parameters
00165     */
00166    void SSL_CTX_set_verify(SSL_CTX *ctx, int mode,
00167                          int (*verify_callback)(int, X509_STORE_CTX *));
00168 
00169    /*
00170     *   SSL_use_certificate - load certificate
00171     */
00172    int SSL_use_certificate(SSL *ssl, X509 *x);
00173 
00174    /*
00175     *   SSL_get_current_cipher - get SSL_CIPHER of a connection
00176     */
00177    SSL_CIPHER *SSL_get_current_cipher(SSL *ssl);
00178 
00179    /*
00180     *   SSL_set_options - manipulate SSL engine options
00181     *   Note: These are all mapped to SSL_ctrl so call them as the comment
00182     *         specifies but know that they use SSL_ctrl.  They are #define
00183     *         so they will map to the one in this class if called as a
00184     *         member function of this class.
00185     */
00186    /* long SSL_set_options(SSL *ssl, long options); */
00187    /*   Returns 0 if not reused, 1 if session id is reused */
00188    /*   int SSL_session_reused(SSL *ssl); */
00189    long    SSL_ctrl(SSL *ssl,int cmd, long larg, char *parg);
00190 
00191    /*
00192     *   RAND_egd - set the path to the EGD
00193     */
00194    int RAND_egd(const char *path);
00195 
00196 
00197    /*
00198     *   RAND_file_name
00199     */
00200    const char *RAND_file_name(char *buf, size_t num);
00201 
00202 
00203    /*
00204     *   RAND_load_file
00205     */
00206    int RAND_load_file(const char *filename, long max_bytes);
00207 
00208 
00209    /*
00210     *   RAND_write_file
00211     */
00212    int RAND_write_file(const char *filename);
00213 
00214 
00215    /*
00216     *   TLSv1_client_method - return a TLSv1 client method object
00217     */
00218    SSL_METHOD *TLSv1_client_method();
00219 
00220 
00221    /*
00222     *   SSLv23_client_method - return a SSLv23 client method object
00223     */
00224    SSL_METHOD *SSLv23_client_method();
00225 
00226 
00227    /*
00228     *   SSL_get_peer_certificate - return the peer's certificate
00229     */
00230    X509 *SSL_get_peer_certificate(SSL *s);
00231 
00232 
00233    /*
00234     *   SSL_get_peer_cert_chain - get the peer's certificate chain
00235     */
00236    STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s);
00237 
00238    /*
00239     *   SSL_CIPHER_get_bits - get the number of bits in this cipher
00240     */
00241    int SSL_CIPHER_get_bits(SSL_CIPHER *c,int *alg_bits);
00242 
00243 
00244    /*
00245     *   SSL_CIPHER_get_version - get the version of this cipher
00246     */
00247    char *SSL_CIPHER_get_version(SSL_CIPHER *c);
00248 
00249 
00250    /*
00251     *   SSL_CIPHER_get_name - get the name of this cipher
00252     */
00253    const char *SSL_CIPHER_get_name(SSL_CIPHER *c);
00254 
00255 
00256    /*
00257     *   SSL_CIPHER_description - get the description of this cipher
00258     */
00259    char *SSL_CIPHER_description(SSL_CIPHER *,char *buf,int size);
00260 
00261 
00262    /*
00263     *   SSL_CTX_use_PrivateKey - set the private key for the session.
00264     *                          - for use with client certificates
00265     */
00266    int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
00267 
00268 
00269    /*
00270     *   SSL_CTX_use_certificate - set the client certificate for the session.
00271     */
00272    int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x);
00273 
00274 
00275    /*
00276     *   d2i_X509 - Covert a text representation of X509 to an X509 object
00277     */
00278    X509 * d2i_X509(X509 **a,unsigned char **pp,long length);
00279 
00280 
00281    /*
00282     *   i2d_X509 - Covert an X509 object into a text representation
00283     */
00284    int i2d_X509(X509 *a,unsigned char **pp);
00285 
00286 
00287    /*
00288     *   X509_cmp - compare two X509 objects
00289     */
00290    int X509_cmp(X509 *a, X509 *b);
00291 
00292 
00293    /*
00294     *   X509_dup - duplicate an X509 object
00295     */
00296    X509 *X509_dup(X509 *x509);
00297 
00298 
00299    /*
00300     *   X509_STORE_CTX_new - create an X509 store context
00301     */
00302    X509_STORE_CTX *X509_STORE_CTX_new(void);
00303 
00304 
00305    /*
00306     *   X509_STORE_CTX_free - free up an X509 store context
00307     */
00308    void X509_STORE_CTX_free(X509_STORE_CTX *v);
00309 
00310 
00311    /*
00312     *   X509_STORE_CTX_set_chain - set the certificate chain
00313     */
00314    void X509_STORE_CTX_set_chain(X509_STORE_CTX *v, STACK_OF(X509)* x);
00315 
00316    /*
00317     *   X509_STORE_CTX_set_purpose - set the purpose of the certificate
00318     */
00319    void X509_STORE_CTX_set_purpose(X509_STORE_CTX *v, int purpose);
00320 
00321    /*
00322     *   X509_verify_cert - verify the certificate
00323     */
00324    int X509_verify_cert(X509_STORE_CTX *v);
00325 
00326 
00327    /*
00328     *   X509_STORE_new - create an X509 store
00329     */
00330    X509_STORE *X509_STORE_new(void);
00331 
00332 
00333    /*
00334     *   X509_STORE_free - free up an X509 store
00335     */
00336    void X509_STORE_free(X509_STORE *v);
00337 
00338 
00339    /*
00340     *   X509_free - free up an X509
00341     */
00342    void X509_free(X509 *v);
00343 
00344 
00345    /*
00346     *   X509_NAME_oneline - return the X509 data in a string
00347     */
00348    char *X509_NAME_oneline(X509_NAME *a, char *buf, int size);
00349 
00350 
00351    /*
00352     *   X509_get_subject_name - return the X509_NAME for the subject field
00353     */
00354    X509_NAME *X509_get_subject_name(X509 *a);
00355 
00356 
00357    /*
00358     *   X509_get_issuer_name - return the X509_NAME for the issuer field
00359     */
00360    X509_NAME *X509_get_issuer_name(X509 *a);
00361 
00362 
00363    /*
00364     *   X509_STORE_add_lookup - add a lookup file/method to an X509 store
00365     */
00366    X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m);
00367 
00368 
00369    /*
00370     *   X509_LOOKUP_file - Definition of the LOOKUP_file method
00371     */
00372    X509_LOOKUP_METHOD *X509_LOOKUP_file(void);
00373 
00374 
00375    /*
00376     *   X509_LOOKUP_free - Free an X509_LOOKUP
00377     */
00378    void X509_LOOKUP_free(X509_LOOKUP *x);
00379 
00380 
00381    /*
00382     *   X509_LOOKUP_ctrl - This is not normally called directly (use macros)
00383     */
00384    int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, char **ret);
00385 
00386 
00387    /*
00388     *   X509_STORE_CTX_init - initialize an X509 STORE context
00389     */
00390    void X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain);
00391 
00392 
00393    /*
00394     *   CRYPTO_free - free up an internally allocated object
00395     */
00396    void CRYPTO_free(void *x);
00397 
00398    /*
00399     *   BIO_new - create new BIO
00400     */
00401    BIO *BIO_new(BIO_METHOD *type);
00402 
00403    /*
00404     *   BIO methods - only one defined here yet
00405     */
00406    BIO_METHOD *BIO_s_mem(void);
00407 
00408    /*
00409     *   BIO_new_fp - nastiness called BIO - used to create BIO* from FILE*
00410     */
00411    BIO *BIO_new_fp(FILE *stream, int close_flag);
00412 
00413    /*
00414     *   BIO_new_mem_buf - read only BIO from memory region
00415     */
00416    BIO *BIO_new_mem_buf(void *buf, int len);
00417 
00418    /*
00419     *   BIO_free - nastiness called BIO - used to destroy BIO*
00420     */
00421    int BIO_free(BIO *a);
00422 
00423    /*
00424     *   BIO_ctrl - BIO control method
00425     */
00426    long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg);
00427 
00428    /*
00429     *   BIO_write - equivalent to ::write for BIO
00430     */
00431    int BIO_write(BIO *b, const void *data, int len);
00432 
00433    /*
00434     *   PEM_write_bio_X509 - write a PEM encoded cert to a BIO*
00435     */
00436    int PEM_write_bio_X509(BIO *bp, X509 *x);
00437 
00438    /*
00439     *   ASN1_item_i2d_fp - used for netscape output
00440     */
00441    int ASN1_item_i2d_fp(FILE *out, unsigned char *x);
00442 
00443 
00444    /*
00445     *   ASN1_d2i_fp - read an X509 from a DER encoded file (buf can be NULL)
00446     */
00447    X509 *X509_d2i_fp(FILE *out, X509** buf);
00448 
00449 
00450    /*
00451     *   X509_print - print the text form of an X509
00452     */
00453    int X509_print(FILE *fp, X509 *x);
00454 
00455 
00456    /*
00457     *   Read a PKCS#12 cert from fp
00458     */
00459    PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12);
00460 
00461 
00462    /*
00463     *   Change the password on a PKCS#12 cert
00464     */
00465    int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
00466 
00467 
00468    /*
00469     *   Write a PKCS#12 to mem
00470     */
00471    int i2d_PKCS12(PKCS12 *p12, unsigned char **p);
00472 
00473 
00474    /*
00475     *   Write a PKCS#12 to FILE*
00476     */
00477    int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
00478 
00479 
00480    /*
00481     *   Create a new PKCS#12 object
00482     */
00483    PKCS12 *PKCS12_new(void);
00484 
00485 
00486    /*
00487     *   Destroy that PKCS#12 that you created!
00488     */
00489    void PKCS12_free(PKCS12 *a);
00490 
00491 
00492    /*
00493     *   Parse the PKCS#12
00494     */
00495    int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey,
00496                     X509 **cert, STACK_OF(X509) **ca);
00497 
00498 
00499    /*
00500     *   Free the Private Key
00501     */
00502    void EVP_PKEY_free(EVP_PKEY *x);
00503 
00504 
00505    /*
00506     *   Pop off the stack
00507     */
00508    char *sk_pop(STACK *s);
00509 
00510 
00511    /*
00512     *   Free the stack
00513     */
00514    void sk_free(STACK *s);
00515 
00516 #if OPENSSL_VERSION_NUMBER >= 0x10000000L
00517    void sk_free(void *s) { return sk_free(reinterpret_cast<STACK*>(s)); }
00518 #endif
00519 
00520    /*
00521     *  Number of elements in the stack
00522     */
00523    int sk_num(STACK *s);
00524 
00525 
00526    /*
00527     *  Value of element n in the stack
00528     */
00529    char *sk_value(STACK *s, int n);
00530 
00531 #if OPENSSL_VERSION_NUMBER >= 0x10000000L
00532    char *sk_value(void *s, int n) { return sk_value(reinterpret_cast<STACK*>(s), n); }
00533 #endif
00534 
00535    /*
00536     *  Create a new stack
00537     */
00538    STACK *sk_new(int (*cmp)());
00539 
00540 
00541    /*
00542     *  Add an element to the stack
00543     */
00544    int sk_push(STACK *s, char *d);
00545 
00546 #if OPENSSL_VERSION_NUMBER >= 0x10000000L
00547    int sk_push(void *s, void *d) { return sk_push(reinterpret_cast<STACK*>(s), reinterpret_cast<char*>(d)); }
00548 #endif
00549 
00550 
00551    /*
00552     *  Duplicate the stack
00553     */
00554    STACK *sk_dup(STACK *s);
00555 
00556 
00557    /*
00558     *  Convert an ASN1_INTEGER to its text form
00559     */
00560    char *i2s_ASN1_INTEGER(X509V3_EXT_METHOD *meth, ASN1_INTEGER *aint);
00561 
00562 
00563    /*
00564     *  Get the certificate's serial number
00565     */
00566    ASN1_INTEGER *X509_get_serialNumber(X509 *x);
00567 
00568 
00569    /*
00570     *  Get the certificate's public key
00571     */
00572    EVP_PKEY *X509_get_pubkey(X509 *x);
00573 
00574 
00575    /*
00576     *  Convert the public key to a decimal form
00577     */
00578    int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp);
00579 
00580 
00581    /*
00582     *  Check the private key of a PKCS bundle against the X509
00583     */
00584    int X509_check_private_key(X509 *x, EVP_PKEY *p);
00585 
00586 
00587    /*
00588     *  Convert a BIGNUM to a hex string
00589     */
00590    char *BN_bn2hex(const BIGNUM *a);
00591 
00592 
00593    /*
00594     *  Compute the digest of an X.509
00595     */
00596    int X509_digest(const X509 *x,const EVP_MD *t, unsigned char *md, unsigned int *len);
00597 
00598 
00599    /*
00600     *  EVP_md5
00601     */
00602    EVP_MD *EVP_md5();
00603 
00604 
00605    /*
00606     *  ASN1_INTEGER free
00607     */
00608    void ASN1_INTEGER_free(ASN1_INTEGER *x);
00609 
00610    /*
00611     *  ASN1_STRING_data
00612     */
00613    unsigned char *ASN1_STRING_data(ASN1_STRING *x);
00614 
00615    /*
00616     * ASN1_STRING_length
00617     */
00618    int ASN1_STRING_length(ASN1_STRING *x);
00619 
00620    /*
00621     *
00622     */
00623    int OBJ_obj2nid(ASN1_OBJECT *o);
00624 
00625    /*
00626     *
00627     */
00628    const char * OBJ_nid2ln(int n);
00629 
00630    /*
00631     * get the number of extensions
00632     */
00633    int X509_get_ext_count(X509 *x);
00634 
00635    /*
00636     *
00637     */
00638    int X509_get_ext_by_NID(X509 *x, int nid, int lastpos);
00639 
00640    /*
00641     *
00642     */
00643    int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos);
00644 
00645    /*
00646     *
00647     */
00648    X509_EXTENSION *X509_get_ext(X509 *x, int loc);
00649 
00650    /*
00651     *
00652     */
00653    X509_EXTENSION *X509_delete_ext(X509 *x, int loc);
00654 
00655    /*
00656     *
00657     */
00658    int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
00659 
00660    /*
00661     *
00662     */
00663    void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx);
00664 
00665    /*
00666     *
00667     */
00668    char *i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, ASN1_OCTET_STRING *ia5);
00669 
00670    /*
00671     *
00672     */
00673    int ASN1_BIT_STRING_get_bit(ASN1_BIT_STRING *a, int n);
00674 
00675    /*
00676     *
00677     */
00678    PKCS7 *PKCS7_new(void);
00679 
00680    /*
00681     *
00682     */
00683    void PKCS7_free(PKCS7 *a);
00684 
00685    /*
00686     *
00687     */
00688    void PKCS7_content_free(PKCS7 *a);
00689 
00690    /*
00691     *
00692     */
00693    int i2d_PKCS7(PKCS7 *a, unsigned char **pp);
00694 
00695    /*
00696     *
00697     */
00698    PKCS7 *d2i_PKCS7(PKCS7 **a, unsigned char **pp,long length);
00699 
00700    /*
00701     *
00702     */
00703    int i2d_PKCS7_fp(FILE *fp,PKCS7 *p7);
00704 
00705    /*
00706     *
00707     */
00708    PKCS7 *d2i_PKCS7_fp(FILE *fp,PKCS7 **p7);
00709 
00710    /*
00711     *
00712     */
00713    int i2d_PKCS7_bio(BIO *bp,PKCS7 *p7);
00714 
00715    /*
00716     *
00717     */
00718    PKCS7 *d2i_PKCS7_bio(BIO *bp,PKCS7 **p7);
00719 
00720    /*
00721     *
00722     */
00723    PKCS7 *PKCS7_dup(PKCS7 *p7);
00724 
00725    /*
00726     *  Create a PKCS7 signature / signed message
00727     */
00728    PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
00729              BIO *data, int flags);
00730 
00731    /*
00732     *  Verify a PKCS7 signature.
00733     */
00734    int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
00735                                               BIO *indata, BIO *out, int flags);
00736 
00737    /*
00738     *  Get signers of a verified PKCS7 signature
00739     */
00740    STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags);
00741 
00742    /*
00743     *  PKCS7 encrypt message
00744     */
00745    PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, EVP_CIPHER *cipher,
00746             int flags);
00747 
00748    /*
00749     *  decrypt PKCS7 message
00750     */
00751    int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
00752 
00753 
00754    /*
00755     * Load a CA list file.
00756     */
00757    STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file);
00758 
00759    /*
00760     * Load a file of PEM encoded objects.
00761     */
00762    STACK_OF(X509_INFO) *PEM_X509_INFO_read(FILE *fp, STACK_OF(X509_INFO) *sk,
00763                    pem_password_cb *cb, void *u);
00764 
00765    /*
00766     * Get the number of purposes available
00767     */
00768    int X509_PURPOSE_get_count();
00769 
00770 
00771    /*
00772     * Get the ID of a purpose
00773     */
00774    int X509_PURPOSE_get_id(X509_PURPOSE *);
00775 
00776 
00777    /*
00778     * Check the existence of purpose id "id" in x.  for CA, set ca = 1, else 0
00779     */
00780    int X509_check_purpose(X509 *x, int id, int ca);
00781 
00782 
00783    /*
00784     * Get the purpose with index #idx
00785     */
00786    X509_PURPOSE * X509_PURPOSE_get0(int idx);
00787 
00788 
00789    /*
00790     * Create a new Private KEY
00791     */
00792    EVP_PKEY* EVP_PKEY_new();
00793 
00794 
00795    /*
00796     * Assign a private key
00797     */
00798    int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key);
00799 
00800 
00801    /*
00802     * Generate a RSA key
00803     */
00804    RSA *RSA_generate_key(int bits, unsigned long e, void
00805                         (*callback)(int,int,void *), void *cb_arg);
00806 
00807 
00808    /*
00809     * Create/destroy a certificate request
00810     */
00811    X509_REQ *X509_REQ_new();
00812    void X509_REQ_free(X509_REQ *a);
00813 
00814 
00815    /*
00816     * Set the public key in the REQ object
00817     */
00818    int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey);
00819 
00820    /* for testing */
00821    int i2d_X509_REQ_fp(FILE *fp, X509_REQ *x);
00822 
00823    /* SMime support */
00824    STACK *X509_get1_email(X509 *x);
00825    void X509_email_free(STACK *sk);
00826 
00827    /* Ciphers needed for SMime */
00828    EVP_CIPHER *EVP_des_ede3_cbc();
00829    EVP_CIPHER *EVP_des_cbc();
00830    EVP_CIPHER *EVP_rc2_cbc();
00831    EVP_CIPHER *EVP_rc2_64_cbc();
00832    EVP_CIPHER *EVP_rc2_40_cbc();
00833 
00834    /* clear the current error  - use this often*/
00835    void ERR_clear_error();
00836 
00837    /* retrieve the latest error */
00838    unsigned long ERR_get_error();
00839 
00840    /* Print the errors to this stream */
00841    void ERR_print_errors_fp(FILE *fp);
00842 
00843    /* Get a pointer to the SSL session id (reference counted) */
00844    SSL_SESSION *SSL_get1_session(SSL *ssl);
00845 
00846    /* Frees a pointer to the SSL session id (reference decremented if needed) */
00847    void SSL_SESSION_free(SSL_SESSION *session);
00848 
00849    /* Set the SSL session to reuse. */
00850    int SSL_set_session(SSL *ssl, SSL_SESSION *session);
00851 
00852    /* Decode ASN.1 to SSL_SESSION */
00853    SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, long length);
00854    /* Encode SSL_SESSION to ASN.1 */
00855    int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp);
00856 
00857    /* Write privatekey to FILE stream */
00858    int i2d_PrivateKey_fp(FILE*, EVP_PKEY*);
00859 
00860    /* Write PKCS#8privatekey to FILE stream */
00861    int i2d_PKCS8PrivateKey_fp(FILE*, EVP_PKEY*, const EVP_CIPHER*, char*, int, pem_password_cb*, void*);
00862 
00863    /* Free RSA structure */
00864    void RSA_free(RSA*);
00865 
00866    /* Get a blowfish CBC pointer */
00867    EVP_CIPHER *EVP_bf_cbc();
00868 
00869    /* Sign a CSR */
00870    int X509_REQ_sign(X509_REQ*, EVP_PKEY*, const EVP_MD*);
00871 
00872    /* add a name entry */
00873    int X509_NAME_add_entry_by_txt(X509_NAME*, char*, int, unsigned char*, int, int, int);
00874 
00875    /* Create a name */
00876    X509_NAME *X509_NAME_new();
00877 
00878    /* Set the subject */
00879    int X509_REQ_set_subject_name(X509_REQ*,X509_NAME*);
00880 
00881    /* get list of available SSL_CIPHER's sorted by preference */
00882    STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL* ssl);
00883 
00884 #endif
00885 
00886 private:
00887    friend class KOpenSSLProxyPrivate;
00888    KOpenSSLProxy();
00889    ~KOpenSSLProxy();
00890    KOpenSSLProxyPrivate * const d;
00891 };
00892 
00893 #endif

KIO

Skip menu "KIO"
  • Main Page
  • Namespace List
  • Class Hierarchy
  • Alphabetical List
  • Class List
  • File List
  • Namespace Members
  • Class Members
  • Related Pages

kdelibs

Skip menu "kdelibs"
  • DNSSD
  • Interfaces
  •   KHexEdit
  •   KMediaPlayer
  •   KSpeech
  •   KTextEditor
  • Kate
  • kconf_update
  • KDE3Support
  •   KUnitTest
  • KDECore
  • KDED
  • KDEsu
  • KDEUI
  • KDocTools
  • KFile
  • KHTML
  • KImgIO
  • KInit
  • kio
  • KIOSlave
  • KJS
  •   KJS-API
  •   WTF
  • kjsembed
  • KNewStuff
  • KParts
  • KPty
  • Kross
  • KUtils
  • Nepomuk
  • Plasma
  • Solid
  • Sonnet
  • ThreadWeaver
Generated for kdelibs by doxygen 1.6.1
This website is maintained by Adriaan de Groot and Allen Winter.
KDE® and the K Desktop Environment® logo are registered trademarks of KDE e.V. | Legal