• Skip to content
  • Skip to link menu
KDE 4.2 API Reference
  • KDE API Reference
  • kdelibs
  • Sitemap
  • Contact Us
 

KIO

kopenssl.h

Go to the documentation of this file.
00001 /* This file is part of the KDE libraries
00002    Copyright (C) 2001-2003 George Staikos <staikos@kde.org>
00003  
00004    This library is free software; you can redistribute it and/or
00005    modify it under the terms of the GNU Library General Public
00006    License version 2 as published by the Free Software Foundation.
00007  
00008    This library is distributed in the hope that it will be useful,
00009    but WITHOUT ANY WARRANTY; without even the implied warranty of
00010    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
00011    Library General Public License for more details.
00012  
00013    You should have received a copy of the GNU Library General Public License
00014    along with this library; see the file COPYING.LIB.  If not, write to
00015    the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
00016    Boston, MA 02110-1301, USA.
00017 */
00018 
00019 
00020 // IF YOU ARE USING THIS CLASS, YOU ARE MAKING A MISTAKE.
00021 
00022 #ifndef __KOPENSSLPROXY_H 
00023 #define __KOPENSSLPROXY_H
00024 
00025 #define KOSSL KOpenSSLProxy
00026 class KOpenSSLProxyPrivate;
00027 
00028 #include <kio/kio_export.h>
00029 
00030 #include <ksslconfig.h>
00031 
00032 #ifdef KSSL_HAVE_SSL
00033 #define crypt _openssl_crypt
00034 #include <openssl/ssl.h>
00035 #include <openssl/x509.h>
00036 #include <openssl/x509v3.h>
00037 #include <openssl/pem.h>
00038 #include <openssl/bio.h>
00039 #include <openssl/rand.h>
00040 #include <openssl/asn1.h>
00041 #include <openssl/pkcs7.h>
00042 #include <openssl/pkcs12.h>
00043 #include <openssl/evp.h>
00044 #include <openssl/stack.h>
00045 #include <openssl/bn.h>
00046 #undef crypt
00047 #endif
00048 
00057 class KIO_EXPORT KOpenSSLProxy {
00058 public:
00059 
00064    static KOpenSSLProxy *self();
00065 
00069    bool hasLibCrypto() const;
00070 
00074    bool hasLibSSL() const;
00075 
00080    void destroy();
00081 
00082    // Here are the symbols that we need.
00083 #ifdef KSSL_HAVE_SSL
00084 
00085    /*
00086     *   SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
00087     */
00088    int SSL_connect(SSL *ssl);
00089 
00090    /*
00091     *   SSL_accept - initiate the TLS/SSL handshake with an TLS/SSL server
00092     */
00093    int SSL_accept(SSL *ssl);
00094 
00095    /*
00096     *   SSL_get_error - get the error code
00097     */
00098    int SSL_get_error(SSL *ssl, int rc);
00099 
00100    /*
00101     *   SSL_read - read bytes from a TLS/SSL connection.
00102     */
00103    int SSL_read(SSL *ssl, void *buf, int num);
00104 
00105    /*
00106     *   SSL_write - write bytes to a TLS/SSL connection.
00107     */
00108    int SSL_write(SSL *ssl, const void *buf, int num);
00109 
00110    /*
00111     *   SSL_new - create a new SSL structure for a connection
00112     */
00113    SSL *SSL_new(SSL_CTX *ctx);
00114 
00115    /*
00116     *   SSL_free - free an allocated SSL structure
00117     */
00118    void SSL_free(SSL *ssl);
00119 
00120    /*
00121     *   SSL_shutdown - shutdown an allocated SSL connection
00122     */
00123    int SSL_shutdown(SSL *ssl);
00124 
00125    /*
00126     *   SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions
00127     */
00128    SSL_CTX *SSL_CTX_new(SSL_METHOD *method);
00129 
00130    /*
00131     *   SSL_CTX_free - free an allocated SSL_CTX object
00132     */
00133    void SSL_CTX_free(SSL_CTX *ctx);
00134 
00135    /*
00136     *   SSL_set_fd - connect the SSL object with a file descriptor
00137     */
00138    int SSL_set_fd(SSL *ssl, int fd);
00139 
00140    /*
00141     *   SSL_pending - obtain number of readable bytes buffered in an SSL object
00142     */
00143    int SSL_pending(SSL *ssl);
00144 
00145    /*
00146     *   SSL_peek - obtain bytes buffered in an SSL object
00147     */
00148    int SSL_peek(SSL *ssl, void *buf, int num);
00149 
00150    /*
00151     *   SSL_CTX_set_cipher_list - choose list of available SSL_CIPHERs
00152     */
00153    int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str);
00154 
00155    /*
00156     *   SSL_CTX_set_verify - set peer certificate verification parameters
00157     */
00158    void SSL_CTX_set_verify(SSL_CTX *ctx, int mode,
00159                          int (*verify_callback)(int, X509_STORE_CTX *));
00160 
00161    /*
00162     *   SSL_use_certificate - load certificate
00163     */
00164    int SSL_use_certificate(SSL *ssl, X509 *x);
00165 
00166    /*
00167     *   SSL_get_current_cipher - get SSL_CIPHER of a connection
00168     */
00169    SSL_CIPHER *SSL_get_current_cipher(SSL *ssl);
00170 
00171    /*
00172     *   SSL_set_options - manipulate SSL engine options
00173     *   Note: These are all mapped to SSL_ctrl so call them as the comment
00174     *         specifies but know that they use SSL_ctrl.  They are #define
00175     *         so they will map to the one in this class if called as a
00176     *         member function of this class.
00177     */
00178    /* long SSL_set_options(SSL *ssl, long options); */
00179    /*   Returns 0 if not reused, 1 if session id is reused */
00180    /*   int SSL_session_reused(SSL *ssl); */
00181    long    SSL_ctrl(SSL *ssl,int cmd, long larg, char *parg);
00182 
00183    /*
00184     *   RAND_egd - set the path to the EGD
00185     */
00186    int RAND_egd(const char *path);
00187 
00188 
00189    /*
00190     *   RAND_file_name 
00191     */
00192    const char *RAND_file_name(char *buf, size_t num);
00193 
00194 
00195    /*
00196     *   RAND_load_file 
00197     */
00198    int RAND_load_file(const char *filename, long max_bytes);
00199 
00200 
00201    /*
00202     *   RAND_write_file 
00203     */
00204    int RAND_write_file(const char *filename);
00205 
00206 
00207    /*
00208     *   TLSv1_client_method - return a TLSv1 client method object
00209     */
00210    SSL_METHOD *TLSv1_client_method();
00211 
00212 
00213    /*
00214     *   SSLv23_client_method - return a SSLv23 client method object
00215     */
00216    SSL_METHOD *SSLv23_client_method();
00217 
00218 
00219    /*
00220     *   SSL_get_peer_certificate - return the peer's certificate
00221     */
00222    X509 *SSL_get_peer_certificate(SSL *s);
00223 
00224 
00225    /*
00226     *   SSL_get_peer_cert_chain - get the peer's certificate chain
00227     */
00228    STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s);
00229 
00230    /*
00231     *   SSL_CIPHER_get_bits - get the number of bits in this cipher
00232     */
00233    int SSL_CIPHER_get_bits(SSL_CIPHER *c,int *alg_bits);
00234 
00235 
00236    /*
00237     *   SSL_CIPHER_get_version - get the version of this cipher
00238     */
00239    char *SSL_CIPHER_get_version(SSL_CIPHER *c);
00240 
00241 
00242    /*
00243     *   SSL_CIPHER_get_name - get the name of this cipher
00244     */
00245    const char *SSL_CIPHER_get_name(SSL_CIPHER *c);
00246 
00247 
00248    /*
00249     *   SSL_CIPHER_description - get the description of this cipher
00250     */
00251    char *SSL_CIPHER_description(SSL_CIPHER *,char *buf,int size);
00252 
00253 
00254    /*
00255     *   SSL_CTX_use_PrivateKey - set the private key for the session.
00256     *                          - for use with client certificates
00257     */
00258    int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
00259 
00260 
00261    /*
00262     *   SSL_CTX_use_certificate - set the client certificate for the session.
00263     */
00264    int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x);
00265 
00266 
00267    /*
00268     *   d2i_X509 - Covert a text representation of X509 to an X509 object
00269     */
00270    X509 * d2i_X509(X509 **a,unsigned char **pp,long length);
00271 
00272 
00273    /*
00274     *   i2d_X509 - Covert an X509 object into a text representation
00275     */
00276    int i2d_X509(X509 *a,unsigned char **pp);
00277 
00278 
00279    /*
00280     *   X509_cmp - compare two X509 objects
00281     */
00282    int X509_cmp(X509 *a, X509 *b);
00283 
00284 
00285    /*
00286     *   X509_dup - duplicate an X509 object
00287     */
00288    X509 *X509_dup(X509 *x509);
00289 
00290 
00291    /*
00292     *   X509_STORE_CTX_new - create an X509 store context
00293     */
00294    X509_STORE_CTX *X509_STORE_CTX_new(void);
00295 
00296 
00297    /*
00298     *   X509_STORE_CTX_free - free up an X509 store context
00299     */
00300    void X509_STORE_CTX_free(X509_STORE_CTX *v);
00301 
00302 
00303    /*
00304     *   X509_STORE_CTX_set_chain - set the certificate chain
00305     */
00306    void X509_STORE_CTX_set_chain(X509_STORE_CTX *v, STACK_OF(X509)* x);
00307 
00308    /*
00309     *   X509_STORE_CTX_set_purpose - set the purpose of the certificate 
00310     */
00311    void X509_STORE_CTX_set_purpose(X509_STORE_CTX *v, int purpose);
00312 
00313    /*
00314     *   X509_verify_cert - verify the certificate
00315     */
00316    int X509_verify_cert(X509_STORE_CTX *v);
00317 
00318 
00319    /*
00320     *   X509_STORE_new - create an X509 store
00321     */
00322    X509_STORE *X509_STORE_new(void);
00323 
00324 
00325    /*
00326     *   X509_STORE_free - free up an X509 store
00327     */
00328    void X509_STORE_free(X509_STORE *v);
00329 
00330 
00331    /*
00332     *   X509_free - free up an X509
00333     */
00334    void X509_free(X509 *v);
00335 
00336 
00337    /*
00338     *   X509_NAME_oneline - return the X509 data in a string
00339     */
00340    char *X509_NAME_oneline(X509_NAME *a, char *buf, int size);
00341 
00342 
00343    /*
00344     *   X509_get_subject_name - return the X509_NAME for the subject field
00345     */
00346    X509_NAME *X509_get_subject_name(X509 *a);
00347 
00348 
00349    /*
00350     *   X509_get_issuer_name - return the X509_NAME for the issuer field
00351     */
00352    X509_NAME *X509_get_issuer_name(X509 *a);
00353 
00354 
00355    /*
00356     *   X509_STORE_add_lookup - add a lookup file/method to an X509 store
00357     */
00358    X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m);
00359 
00360 
00361    /*
00362     *   X509_LOOKUP_file - Definition of the LOOKUP_file method
00363     */
00364    X509_LOOKUP_METHOD *X509_LOOKUP_file(void);
00365 
00366 
00367    /*
00368     *   X509_LOOKUP_free - Free an X509_LOOKUP
00369     */
00370    void X509_LOOKUP_free(X509_LOOKUP *x);
00371 
00372 
00373    /*
00374     *   X509_LOOKUP_ctrl - This is not normally called directly (use macros)
00375     */
00376    int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, char **ret);
00377 
00378 
00379    /*
00380     *   X509_STORE_CTX_init - initialize an X509 STORE context
00381     */
00382    void X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain);
00383 
00384 
00385    /*
00386     *   CRYPTO_free - free up an internally allocated object
00387     */
00388    void CRYPTO_free(void *x);
00389 
00390    /*
00391     *   BIO_new - create new BIO
00392     */
00393    BIO *BIO_new(BIO_METHOD *type);
00394 
00395    /*
00396     *   BIO methods - only one defined here yet
00397     */
00398    BIO_METHOD *BIO_s_mem(void);
00399 
00400    /*
00401     *   BIO_new_fp - nastiness called BIO - used to create BIO* from FILE*
00402     */
00403    BIO *BIO_new_fp(FILE *stream, int close_flag);
00404 
00405    /*
00406     *   BIO_new_mem_buf - read only BIO from memory region
00407     */
00408    BIO *BIO_new_mem_buf(void *buf, int len);
00409 
00410    /*
00411     *   BIO_free - nastiness called BIO - used to destroy BIO*
00412     */
00413    int BIO_free(BIO *a);
00414 
00415    /*
00416     *   BIO_ctrl - BIO control method
00417     */
00418    long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg);
00419 
00420    /*
00421     *   BIO_write - equivalent to ::write for BIO
00422     */
00423    int BIO_write(BIO *b, const void *data, int len);
00424 
00425    /*
00426     *   PEM_write_bio_X509 - write a PEM encoded cert to a BIO*
00427     */
00428    int PEM_write_bio_X509(BIO *bp, X509 *x);
00429 
00430    /*
00431     *   ASN1_item_i2d_fp - used for netscape output
00432     */
00433    int ASN1_item_i2d_fp(FILE *out, unsigned char *x);
00434 
00435 
00436    /*
00437     *   ASN1_d2i_fp - read an X509 from a DER encoded file (buf can be NULL)
00438     */
00439    X509 *X509_d2i_fp(FILE *out, X509** buf);
00440 
00441 
00442    /*
00443     *   X509_print - print the text form of an X509
00444     */
00445    int X509_print(FILE *fp, X509 *x);
00446 
00447 
00448    /*
00449     *   Read a PKCS#12 cert from fp
00450     */
00451    PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12);
00452 
00453 
00454    /*
00455     *   Change the password on a PKCS#12 cert
00456     */
00457    int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
00458 
00459 
00460    /*
00461     *   Write a PKCS#12 to mem
00462     */
00463    int i2d_PKCS12(PKCS12 *p12, unsigned char **p);
00464 
00465 
00466    /*
00467     *   Write a PKCS#12 to FILE*
00468     */
00469    int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12);
00470 
00471 
00472    /*
00473     *   Create a new PKCS#12 object
00474     */
00475    PKCS12 *PKCS12_new(void);
00476 
00477 
00478    /*
00479     *   Destroy that PKCS#12 that you created!
00480     */
00481    void PKCS12_free(PKCS12 *a);
00482 
00483 
00484    /* 
00485     *   Parse the PKCS#12 
00486     */
00487    int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey,
00488                     X509 **cert, STACK_OF(X509) **ca);
00489 
00490 
00491    /* 
00492     *   Free the Private Key
00493     */
00494    void EVP_PKEY_free(EVP_PKEY *x);
00495 
00496 
00497    /* 
00498     *   Pop off the stack
00499     */
00500    char *sk_pop(STACK *s);
00501 
00502 
00503    /* 
00504     *   Free the stack
00505     */
00506    void sk_free(STACK *s);
00507 
00508 
00509    /* 
00510     *  Number of elements in the stack
00511     */
00512    int sk_num(STACK *s);
00513 
00514 
00515    /* 
00516     *  Value of element n in the stack
00517     */
00518    char *sk_value(STACK *s, int n);
00519 
00520 
00521    /* 
00522     *  Create a new stack
00523     */
00524    STACK *sk_new(int (*cmp)());
00525 
00526 
00527    /* 
00528     *  Add an element to the stack
00529     */
00530    int sk_push(STACK *s, char *d);
00531 
00532 
00533    /* 
00534     *  Duplicate the stack
00535     */
00536    STACK *sk_dup(STACK *s);
00537 
00538 
00539    /*
00540     *  Convert an ASN1_INTEGER to its text form
00541     */
00542    char *i2s_ASN1_INTEGER(X509V3_EXT_METHOD *meth, ASN1_INTEGER *aint);
00543 
00544 
00545    /*
00546     *  Get the certificate's serial number
00547     */
00548    ASN1_INTEGER *X509_get_serialNumber(X509 *x);
00549 
00550 
00551    /*
00552     *  Get the certificate's public key
00553     */
00554    EVP_PKEY *X509_get_pubkey(X509 *x);
00555 
00556 
00557    /*
00558     *  Convert the public key to a decimal form
00559     */
00560    int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); 
00561 
00562 
00563    /*
00564     *  Check the private key of a PKCS bundle against the X509
00565     */
00566    int X509_check_private_key(X509 *x, EVP_PKEY *p);
00567 
00568 
00569    /*
00570     *  Convert a BIGNUM to a hex string
00571     */
00572    char *BN_bn2hex(const BIGNUM *a);
00573 
00574 
00575    /*
00576     *  Compute the digest of an X.509
00577     */
00578    int X509_digest(const X509 *x,const EVP_MD *t, unsigned char *md, unsigned int *len);
00579 
00580 
00581    /*
00582     *  EVP_md5
00583     */
00584    EVP_MD *EVP_md5();
00585 
00586 
00587    /*
00588     *  ASN1_INTEGER free
00589     */
00590    void ASN1_INTEGER_free(ASN1_INTEGER *x);
00591 
00592 
00593    /*
00594     *  ASN1_STRING_data
00595     */
00596    unsigned char *ASN1_STRING_data(ASN1_STRING *x);
00597 
00598    /*
00599     *  
00600     */
00601    int OBJ_obj2nid(ASN1_OBJECT *o);
00602 
00603    /*
00604     *  
00605     */
00606    const char * OBJ_nid2ln(int n);
00607 
00608    /*
00609     * get the number of extensions
00610     */
00611    int X509_get_ext_count(X509 *x);
00612 
00613    /*
00614     * 
00615     */
00616    int X509_get_ext_by_NID(X509 *x, int nid, int lastpos);
00617 
00618    /*
00619     *
00620     */
00621    int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos);
00622 
00623    /*
00624     *
00625     */
00626    X509_EXTENSION *X509_get_ext(X509 *x, int loc);
00627 
00628    /*
00629     *
00630     */
00631    X509_EXTENSION *X509_delete_ext(X509 *x, int loc);
00632 
00633    /*
00634     *
00635     */
00636    int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
00637 
00638    /*
00639     *
00640     */
00641    void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx);
00642 
00643    /*
00644     *
00645     */
00646    char *i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, ASN1_OCTET_STRING *ia5);
00647 
00648    /*
00649     *
00650     */
00651    int ASN1_BIT_STRING_get_bit(ASN1_BIT_STRING *a, int n);
00652 
00653    /*
00654     *
00655     */
00656    PKCS7 *PKCS7_new(void);
00657 
00658    /*
00659     *
00660     */
00661    void PKCS7_free(PKCS7 *a);
00662 
00663    /*
00664     *
00665     */
00666    void PKCS7_content_free(PKCS7 *a);
00667 
00668    /*
00669     *
00670     */
00671    int i2d_PKCS7(PKCS7 *a, unsigned char **pp);
00672 
00673    /*
00674     *
00675     */
00676    PKCS7 *d2i_PKCS7(PKCS7 **a, unsigned char **pp,long length);
00677 
00678    /*
00679     *
00680     */
00681    int i2d_PKCS7_fp(FILE *fp,PKCS7 *p7);
00682 
00683    /*
00684     * 
00685     */
00686    PKCS7 *d2i_PKCS7_fp(FILE *fp,PKCS7 **p7);
00687 
00688    /*
00689     *
00690     */
00691    int i2d_PKCS7_bio(BIO *bp,PKCS7 *p7);
00692 
00693    /*
00694     *
00695     */
00696    PKCS7 *d2i_PKCS7_bio(BIO *bp,PKCS7 **p7);
00697 
00698    /*
00699     *
00700     */
00701    PKCS7 *PKCS7_dup(PKCS7 *p7);
00702 
00703    /*
00704     *  Create a PKCS7 signature / signed message
00705     */
00706    PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
00707              BIO *data, int flags);
00708 
00709    /*
00710     *  Verify a PKCS7 signature.
00711     */
00712    int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
00713                                               BIO *indata, BIO *out, int flags);
00714 
00715    /*
00716     *  Get signers of a verified PKCS7 signature
00717     */
00718    STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags);
00719 
00720    /*
00721     *  PKCS7 encrypt message
00722     */
00723    PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, EVP_CIPHER *cipher,
00724             int flags);
00725 
00726    /*
00727     *  decrypt PKCS7 message
00728     */
00729    int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
00730 
00731 
00732    /*
00733     * Load a CA list file.
00734     */
00735    STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file);
00736 
00737    /*
00738     * Load a file of PEM encoded objects.
00739     */
00740    STACK_OF(X509_INFO) *PEM_X509_INFO_read(FILE *fp, STACK_OF(X509_INFO) *sk,
00741                    pem_password_cb *cb, void *u);
00742 
00743    /*
00744     * Get the number of purposes available
00745     */
00746    int X509_PURPOSE_get_count();
00747 
00748 
00749    /*
00750     * Get the ID of a purpose
00751     */
00752    int X509_PURPOSE_get_id(X509_PURPOSE *);
00753 
00754 
00755    /*
00756     * Check the existence of purpose id "id" in x.  for CA, set ca = 1, else 0
00757     */
00758    int X509_check_purpose(X509 *x, int id, int ca);
00759 
00760 
00761    /*
00762     * Get the purpose with index #idx
00763     */
00764    X509_PURPOSE * X509_PURPOSE_get0(int idx);
00765 
00766 
00767    /*
00768     * Create a new Private KEY
00769     */
00770    EVP_PKEY* EVP_PKEY_new();
00771 
00772 
00773    /*
00774     * Assign a private key
00775     */
00776    int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key);
00777 
00778 
00779    /*
00780     * Generate a RSA key
00781     */
00782    RSA *RSA_generate_key(int bits, unsigned long e, void
00783                         (*callback)(int,int,void *), void *cb_arg);
00784 
00785 
00786    /*
00787     * Create/destroy a certificate request
00788     */
00789    X509_REQ *X509_REQ_new();
00790    void X509_REQ_free(X509_REQ *a);
00791 
00792 
00793    /*
00794     * Set the public key in the REQ object
00795     */
00796    int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey);
00797 
00798    /* for testing */
00799    int i2d_X509_REQ_fp(FILE *fp, X509_REQ *x);
00800 
00801    /* SMime support */
00802    STACK *X509_get1_email(X509 *x);
00803    void X509_email_free(STACK *sk);
00804 
00805    /* Ciphers needed for SMime */
00806    EVP_CIPHER *EVP_des_ede3_cbc();
00807    EVP_CIPHER *EVP_des_cbc();
00808    EVP_CIPHER *EVP_rc2_cbc();
00809    EVP_CIPHER *EVP_rc2_64_cbc();
00810    EVP_CIPHER *EVP_rc2_40_cbc();
00811 
00812    /* clear the current error  - use this often*/
00813    void ERR_clear_error();
00814 
00815    /* retrieve the latest error */
00816    unsigned long ERR_get_error();
00817 
00818    /* Print the errors to this stream */
00819    void ERR_print_errors_fp(FILE *fp);
00820 
00821    /* Get a pointer to the SSL session id (reference counted) */
00822    SSL_SESSION *SSL_get1_session(SSL *ssl);
00823 
00824    /* Frees a pointer to the SSL session id (reference decremented if needed) */
00825    void SSL_SESSION_free(SSL_SESSION *session);
00826 
00827    /* Set the SSL session to reuse. */
00828    int SSL_set_session(SSL *ssl, SSL_SESSION *session);
00829 
00830    /* Decode ASN.1 to SSL_SESSION */
00831    SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, long length);
00832    /* Encode SSL_SESSION to ASN.1 */
00833    int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp);
00834 
00835    /* Write privatekey to FILE stream */
00836    int i2d_PrivateKey_fp(FILE*, EVP_PKEY*);
00837 
00838    /* Write PKCS#8privatekey to FILE stream */
00839    int i2d_PKCS8PrivateKey_fp(FILE*, EVP_PKEY*, const EVP_CIPHER*, char*, int, pem_password_cb*, void*);
00840 
00841    /* Free RSA structure */
00842    void RSA_free(RSA*);
00843 
00844    /* Get a blowfish CBC pointer */
00845    EVP_CIPHER *EVP_bf_cbc();
00846 
00847    /* Sign a CSR */
00848    int X509_REQ_sign(X509_REQ*, EVP_PKEY*, const EVP_MD*);
00849 
00850    /* add a name entry */
00851    int X509_NAME_add_entry_by_txt(X509_NAME*, char*, int, unsigned char*, int, int, int);
00852 
00853    /* Create a name */
00854    X509_NAME *X509_NAME_new();
00855 
00856    /* Set the subject */
00857    int X509_REQ_set_subject_name(X509_REQ*,X509_NAME*);
00858 
00859    /* get list of available SSL_CIPHER's sorted by preference */
00860    STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL* ssl);
00861 
00862 #endif
00863 
00864 private:
00865    friend class KOpenSSLProxyPrivate;
00866    KOpenSSLProxy();
00867    ~KOpenSSLProxy();
00868    KOpenSSLProxyPrivate * const d;
00869 };
00870 
00871 #endif

KIO

Skip menu "KIO"
  • Main Page
  • Namespace List
  • Class Hierarchy
  • Alphabetical List
  • Class List
  • File List
  • Namespace Members
  • Class Members
  • Related Pages

kdelibs

Skip menu "kdelibs"
  • DNSSD
  • Interfaces
  •   KHexEdit
  •   KMediaPlayer
  •   KSpeech
  •   KTextEditor
  • Kate
  • kconf_update
  • KDE3Support
  •   KUnitTest
  • KDECore
  • KDED
  • KDEsu
  • KDEUI
  • KDocTools
  • KFile
  • KHTML
  • KImgIO
  • KInit
  • kio
  • KIOSlave
  • KJS
  •   KJS-API
  •   WTF
  • kjsembed
  • KNewStuff
  • KParts
  • Kross
  • KUtils
  • Nepomuk
  • Plasma
  • Solid
  • Sonnet
  • ThreadWeaver
Generated for kdelibs by doxygen 1.5.7
This website is maintained by Adriaan de Groot and Allen Winter.
KDE® and the K Desktop Environment® logo are registered trademarks of KDE e.V. | Legal