File: qsslsocket.sip

package info (click to toggle)
python-qt4 4.11.4%2Bdfsg-2
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 40,148 kB
  • ctags: 6,150
  • sloc: python: 125,936; cpp: 12,628; xml: 292; makefile: 259; php: 27; sh: 2
file content (273 lines) | stat: -rw-r--r-- 9,432 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
// qsslsocket.sip generated by MetaSIP
//
// This file is part of the QtNetwork Python extension module.
//
// Copyright (c) 2015 Riverbank Computing Limited <info@riverbankcomputing.com>
// 
// This file is part of PyQt4.
// 
// This file may be used under the terms of the GNU General Public License
// version 3.0 as published by the Free Software Foundation and appearing in
// the file LICENSE included in the packaging of this file.  Please review the
// following information to ensure the GNU General Public License version 3.0
// requirements will be met: http://www.gnu.org/copyleft/gpl.html.
// 
// If you do not wish to use this file under the terms of the GPL version 3.0
// then you may purchase a commercial license.  For more information contact
// info@riverbankcomputing.com.
// 
// This file is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE
// WARRANTY OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.


%If (Qt_4_3_0 -)
%If (PyQt_OpenSSL)

class QSslSocket : QTcpSocket
{
%TypeHeaderCode
#include <qsslsocket.h>
%End

public:
    enum SslMode
    {
        UnencryptedMode,
        SslClientMode,
        SslServerMode,
    };

%If (Qt_5_0_0 -)
    explicit QSslSocket(QObject *parent /TransferThis/ = 0);
%End
%If (- Qt_5_0_0)
    QSslSocket(QObject *parent /TransferThis/ = 0);
%End
    virtual ~QSslSocket();
%If (Qt_5_0_0 -)
    void connectToHostEncrypted(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite, QAbstractSocket::NetworkLayerProtocol protocol = QAbstractSocket::AnyIPProtocol) /ReleaseGIL/;
%End
%If (- Qt_5_0_0)
    void connectToHostEncrypted(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite) /ReleaseGIL/;
%End
%If (Qt_5_0_0 -)
    void connectToHostEncrypted(const QString &hostName, quint16 port, const QString &sslPeerName, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite, QAbstractSocket::NetworkLayerProtocol protocol = QAbstractSocket::AnyIPProtocol) /ReleaseGIL/;
%End
%If (Qt_4_6_0 - Qt_5_0_0)
    void connectToHostEncrypted(const QString &hostName, quint16 port, const QString &sslPeerName, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite) /ReleaseGIL/;
%End
%If (Qt_5_0_0 -)
    virtual bool setSocketDescriptor(qintptr socketDescriptor, QAbstractSocket::SocketState state = QAbstractSocket::ConnectedState, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite);
%End
%If (- Qt_5_0_0)
    bool setSocketDescriptor(int socketDescriptor, QAbstractSocket::SocketState state = QAbstractSocket::ConnectedState, QIODevice::OpenMode mode = QIODevice::ReadWrite);
%End
    QSslSocket::SslMode mode() const;
    bool isEncrypted() const;
    QSsl::SslProtocol protocol() const;
    void setProtocol(QSsl::SslProtocol protocol);
    virtual qint64 bytesAvailable() const;
    virtual qint64 bytesToWrite() const;
    virtual bool canReadLine() const;
    virtual void close();
    virtual bool atEnd() const;
    bool flush();
    void abort();
    void setLocalCertificate(const QSslCertificate &certificate);
    void setLocalCertificate(const QString &path, QSsl::EncodingFormat format = QSsl::Pem);
    QSslCertificate localCertificate() const;
    QSslCertificate peerCertificate() const;
    QList<QSslCertificate> peerCertificateChain() const;
    QSslCipher sessionCipher() const;
    void setPrivateKey(const QSslKey &key);
    void setPrivateKey(const QString &fileName, QSsl::KeyAlgorithm algorithm = QSsl::Rsa, QSsl::EncodingFormat format = QSsl::Pem, const QByteArray &passPhrase = QByteArray());
    QSslKey privateKey() const;
    QList<QSslCipher> ciphers() const;
    void setCiphers(const QList<QSslCipher> &ciphers);
    void setCiphers(const QString &ciphers);
    static void setDefaultCiphers(const QList<QSslCipher> &ciphers);
    static QList<QSslCipher> defaultCiphers();
    static QList<QSslCipher> supportedCiphers();
    bool addCaCertificates(const QString &path, QSsl::EncodingFormat format = QSsl::Pem, QRegExp::PatternSyntax syntax = QRegExp::FixedString);
    void addCaCertificate(const QSslCertificate &certificate);
    void addCaCertificates(const QList<QSslCertificate> &certificates);
    void setCaCertificates(const QList<QSslCertificate> &certificates);
    QList<QSslCertificate> caCertificates() const;
    static bool addDefaultCaCertificates(const QString &path, QSsl::EncodingFormat format = QSsl::Pem, QRegExp::PatternSyntax syntax = QRegExp::FixedString);
    static void addDefaultCaCertificate(const QSslCertificate &certificate);
    static void addDefaultCaCertificates(const QList<QSslCertificate> &certificates);
    static void setDefaultCaCertificates(const QList<QSslCertificate> &certificates);
    static QList<QSslCertificate> defaultCaCertificates();
    static QList<QSslCertificate> systemCaCertificates();
%If (Qt_5_0_0 -)
    virtual bool waitForConnected(int msecs = 30000) /ReleaseGIL/;
%End
%If (- Qt_5_0_0)
    bool waitForConnected(int msecs = 30000) /ReleaseGIL/;
%End
    bool waitForEncrypted(int msecs = 30000) /ReleaseGIL/;
    virtual bool waitForReadyRead(int msecs = 30000) /ReleaseGIL/;
    virtual bool waitForBytesWritten(int msecs = 30000) /ReleaseGIL/;
%If (Qt_5_0_0 -)
    virtual bool waitForDisconnected(int msecs = 30000) /ReleaseGIL/;
%End
%If (- Qt_5_0_0)
    bool waitForDisconnected(int msecs = 30000) /ReleaseGIL/;
%End
    QList<QSslError> sslErrors() const;
    static bool supportsSsl();

public slots:
    void startClientEncryption();
    void startServerEncryption();
    void ignoreSslErrors();

signals:
    void encrypted();
    void sslErrors(const QList<QSslError> &errors);
    void modeChanged(QSslSocket::SslMode newMode);

protected slots:
%If (- Qt_5_0_0)
    void connectToHostImplementation(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> openMode);
%End
%If (- Qt_5_0_0)
    void disconnectFromHostImplementation();
%End

protected:
    virtual SIP_PYOBJECT readData(qint64 maxlen) /DocType="Py_v3:bytes;str",ReleaseGIL/ [qint64 (char *data, qint64 maxlen)];
%MethodCode
        // Return the data read or None if there was an error.
        if (a0 < 0)
        {
            PyErr_SetString(PyExc_ValueError, "maximum length of data to be read cannot be negative");
            sipIsErr = 1;
        }
        else
        {
            char *s = new char[a0];
            qint64 len;
        
            Py_BEGIN_ALLOW_THREADS
        #if defined(SIP_PROTECTED_IS_PUBLIC)
            len = sipSelfWasArg ? sipCpp->QSslSocket::readData(s, a0) : sipCpp->readData(s, a0);
        #else
            len = sipCpp->sipProtectVirt_readData(sipSelfWasArg, s, a0);
        #endif
            Py_END_ALLOW_THREADS
        
            if (len < 0)
            {
                Py_INCREF(Py_None);
                sipRes = Py_None;
            }
            else
            {
                sipRes = SIPBytes_FromStringAndSize(s, len);
        
                if (!sipRes)
                    sipIsErr = 1;
            }
        
            delete[] s;
        }
%End

    virtual qint64 writeData(const char *data /Array/, qint64 len /ArraySize/) /ReleaseGIL/;

public:
%If (Qt_4_4_0 -)

    enum PeerVerifyMode
    {
        VerifyNone,
        QueryPeer,
        VerifyPeer,
        AutoVerifyPeer,
    };

%End
%If (Qt_4_4_0 -)
    QSslSocket::PeerVerifyMode peerVerifyMode() const;
%End
%If (Qt_4_4_0 -)
    void setPeerVerifyMode(QSslSocket::PeerVerifyMode mode);
%End
%If (Qt_4_4_0 -)
    int peerVerifyDepth() const;
%End
%If (Qt_4_4_0 -)
    void setPeerVerifyDepth(int depth);
%End
%If (Qt_5_0_0 -)
    virtual void setReadBufferSize(qint64 size);
%End
%If (Qt_4_4_0 - Qt_5_0_0)
    void setReadBufferSize(qint64 size);
%End
%If (Qt_4_4_0 -)
    qint64 encryptedBytesAvailable() const;
%End
%If (Qt_4_4_0 -)
    qint64 encryptedBytesToWrite() const;
%End
%If (Qt_4_4_0 -)
    QSslConfiguration sslConfiguration() const;
%End
%If (Qt_4_4_0 -)
    void setSslConfiguration(const QSslConfiguration &config);
%End

signals:
%If (Qt_4_4_0 -)
    void peerVerifyError(const QSslError &error);
%End
%If (Qt_4_4_0 -)
    void encryptedBytesWritten(qint64 totalBytes);
%End

public:
%If (Qt_5_0_0 -)
    virtual void setSocketOption(QAbstractSocket::SocketOption option, const QVariant &value);
%End
%If (Qt_4_6_0 - Qt_5_0_0)
    void setSocketOption(QAbstractSocket::SocketOption option, const QVariant &value);
%End
%If (Qt_5_0_0 -)
    virtual QVariant socketOption(QAbstractSocket::SocketOption option);
%End
%If (Qt_4_6_0 - Qt_5_0_0)
    QVariant socketOption(QAbstractSocket::SocketOption option);
%End
%If (Qt_4_6_0 -)
    void ignoreSslErrors(const QList<QSslError> &errors);
%End
%If (Qt_4_8_0 -)
    QString peerVerifyName() const;
%End
%If (Qt_4_8_0 -)
    void setPeerVerifyName(const QString &hostName);
%End
%If (Qt_5_0_0 -)
    virtual void resume() /ReleaseGIL/;
%End
%If (Qt_5_0_0 -)
    virtual void connectToHost(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite, QAbstractSocket::NetworkLayerProtocol protocol = QAbstractSocket::AnyIPProtocol) /ReleaseGIL/;
%End
%If (Qt_5_0_0 -)
    virtual void disconnectFromHost() /ReleaseGIL/;
%End
%If (Qt_5_0_0 -)
    static long sslLibraryVersionNumber();
%End
%If (Qt_5_0_0 -)
    static QString sslLibraryVersionString();
%End

private:
    QSslSocket(const QSslSocket &);
};

%End
%End