1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222
|
// qsslsocket.sip generated by MetaSIP on Sun Jun 24 12:29:14 2012
//
// This file is part of the QtNetwork Python extension module.
//
// Copyright (c) 2012 Riverbank Computing Limited <info@riverbankcomputing.com>
//
// This file is part of PyQt.
//
// This file may be used under the terms of the GNU General Public
// License versions 2.0 or 3.0 as published by the Free Software
// Foundation and appearing in the files LICENSE.GPL2 and LICENSE.GPL3
// included in the packaging of this file. Alternatively you may (at
// your option) use any later version of the GNU General Public
// License if such license has been publicly approved by Riverbank
// Computing Limited (or its successors, if any) and the KDE Free Qt
// Foundation. In addition, as a special exception, Riverbank gives you
// certain additional rights. These rights are described in the Riverbank
// GPL Exception version 1.1, which can be found in the file
// GPL_EXCEPTION.txt in this package.
//
// If you are unsure which license is appropriate for your use, please
// contact the sales department at sales@riverbankcomputing.com.
//
// This file is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE
// WARRANTY OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
%If (Qt_4_3_0 -)
%If (PyQt_OpenSSL)
class QSslSocket : QTcpSocket
{
%TypeHeaderCode
#include <qsslsocket.h>
%End
public:
enum SslMode
{
UnencryptedMode,
SslClientMode,
SslServerMode,
};
QSslSocket(QObject *parent /TransferThis/ = 0);
virtual ~QSslSocket();
void connectToHostEncrypted(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite) /ReleaseGIL/;
%If (Qt_4_6_0 -)
void connectToHostEncrypted(const QString &hostName, quint16 port, const QString &sslPeerName, QFlags<QIODevice::OpenModeFlag> mode = QIODevice::ReadWrite) /ReleaseGIL/;
%End
bool setSocketDescriptor(int socketDescriptor, QAbstractSocket::SocketState state = QAbstractSocket::ConnectedState, QIODevice::OpenMode mode = QIODevice::ReadWrite);
QSslSocket::SslMode mode() const;
bool isEncrypted() const;
QSsl::SslProtocol protocol() const;
void setProtocol(QSsl::SslProtocol protocol);
virtual qint64 bytesAvailable() const;
virtual qint64 bytesToWrite() const;
virtual bool canReadLine() const;
virtual void close();
virtual bool atEnd() const;
bool flush();
void abort();
void setLocalCertificate(const QSslCertificate &certificate);
void setLocalCertificate(const QString &path, QSsl::EncodingFormat format = QSsl::Pem);
QSslCertificate localCertificate() const;
QSslCertificate peerCertificate() const;
QList<QSslCertificate> peerCertificateChain() const;
QSslCipher sessionCipher() const;
void setPrivateKey(const QSslKey &key);
void setPrivateKey(const QString &fileName, QSsl::KeyAlgorithm algorithm = QSsl::Rsa, QSsl::EncodingFormat format = QSsl::Pem, const QByteArray &passPhrase = QByteArray());
QSslKey privateKey() const;
QList<QSslCipher> ciphers() const;
void setCiphers(const QList<QSslCipher> &ciphers);
void setCiphers(const QString &ciphers);
static void setDefaultCiphers(const QList<QSslCipher> &ciphers);
static QList<QSslCipher> defaultCiphers();
static QList<QSslCipher> supportedCiphers();
bool addCaCertificates(const QString &path, QSsl::EncodingFormat format = QSsl::Pem, QRegExp::PatternSyntax syntax = QRegExp::FixedString);
void addCaCertificate(const QSslCertificate &certificate);
void addCaCertificates(const QList<QSslCertificate> &certificates);
void setCaCertificates(const QList<QSslCertificate> &certificates);
QList<QSslCertificate> caCertificates() const;
static bool addDefaultCaCertificates(const QString &path, QSsl::EncodingFormat format = QSsl::Pem, QRegExp::PatternSyntax syntax = QRegExp::FixedString);
static void addDefaultCaCertificate(const QSslCertificate &certificate);
static void addDefaultCaCertificates(const QList<QSslCertificate> &certificates);
static void setDefaultCaCertificates(const QList<QSslCertificate> &certificates);
static QList<QSslCertificate> defaultCaCertificates();
static QList<QSslCertificate> systemCaCertificates();
bool waitForConnected(int msecs = 30000) /ReleaseGIL/;
bool waitForEncrypted(int msecs = 30000) /ReleaseGIL/;
virtual bool waitForReadyRead(int msecs = 30000) /ReleaseGIL/;
virtual bool waitForBytesWritten(int msecs = 30000) /ReleaseGIL/;
bool waitForDisconnected(int msecs = 30000) /ReleaseGIL/;
QList<QSslError> sslErrors() const;
static bool supportsSsl();
public slots:
void startClientEncryption();
void startServerEncryption();
void ignoreSslErrors();
signals:
void encrypted();
void sslErrors(const QList<QSslError> &errors);
void modeChanged(QSslSocket::SslMode newMode);
protected slots:
void connectToHostImplementation(const QString &hostName, quint16 port, QFlags<QIODevice::OpenModeFlag> openMode);
void disconnectFromHostImplementation();
protected:
virtual SIP_PYOBJECT readData(qint64 maxlen) /DocType="Py_v3:bytes;str",ReleaseGIL/ [qint64 (char *data, qint64 maxlen)];
%MethodCode
// Return the data read or None if there was an error.
if (a0 < 0)
{
PyErr_SetString(PyExc_ValueError, "maximum length of data to be read cannot be negative");
sipIsErr = 1;
}
else
{
char *s = new char[a0];
qint64 len;
Py_BEGIN_ALLOW_THREADS
#if defined(SIP_PROTECTED_IS_PUBLIC)
len = sipSelfWasArg ? sipCpp->QSslSocket::readData(s, a0) : sipCpp->readData(s, a0);
#else
len = sipCpp->sipProtectVirt_readData(sipSelfWasArg, s, a0);
#endif
Py_END_ALLOW_THREADS
if (len < 0)
{
Py_INCREF(Py_None);
sipRes = Py_None;
}
else
{
sipRes = SIPBytes_FromStringAndSize(s, len);
if (!sipRes)
sipIsErr = 1;
}
delete[] s;
}
%End
virtual qint64 writeData(const char *data /Array/, qint64 len /ArraySize/) /ReleaseGIL/;
public:
%If (Qt_4_4_0 -)
enum PeerVerifyMode
{
VerifyNone,
QueryPeer,
VerifyPeer,
AutoVerifyPeer,
};
%End
%If (Qt_4_4_0 -)
QSslSocket::PeerVerifyMode peerVerifyMode() const;
%End
%If (Qt_4_4_0 -)
void setPeerVerifyMode(QSslSocket::PeerVerifyMode mode);
%End
%If (Qt_4_4_0 -)
int peerVerifyDepth() const;
%End
%If (Qt_4_4_0 -)
void setPeerVerifyDepth(int depth);
%End
%If (Qt_4_4_0 -)
void setReadBufferSize(qint64 size);
%End
%If (Qt_4_4_0 -)
qint64 encryptedBytesAvailable() const;
%End
%If (Qt_4_4_0 -)
qint64 encryptedBytesToWrite() const;
%End
%If (Qt_4_4_0 -)
QSslConfiguration sslConfiguration() const;
%End
%If (Qt_4_4_0 -)
void setSslConfiguration(const QSslConfiguration &config);
%End
signals:
%If (Qt_4_4_0 -)
void peerVerifyError(const QSslError &error);
%End
%If (Qt_4_4_0 -)
void encryptedBytesWritten(qint64 totalBytes);
%End
public:
%If (Qt_4_6_0 -)
void setSocketOption(QAbstractSocket::SocketOption option, const QVariant &value);
%End
%If (Qt_4_6_0 -)
QVariant socketOption(QAbstractSocket::SocketOption option);
%End
%If (Qt_4_6_0 -)
void ignoreSslErrors(const QList<QSslError> &errors);
%End
%If (Qt_4_8_0 -)
QString peerVerifyName() const;
%End
%If (Qt_4_8_0 -)
void setPeerVerifyName(const QString &hostName);
%End
private:
QSslSocket(const QSslSocket &);
};
%End
%End
|