/* * qca_cert.h - Qt Cryptographic Architecture * Copyright (C) 2003-2007 Justin Karneges * Copyright (C) 2004-2006 Brad Hards * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA * 02110-1301 USA * */ /** \file qca_cert.h Header file for PGP key and X.509 certificate related classes \note You should not use this header directly from an application. You should just use \#include \ instead. */ #ifndef QCA_CERT_H #define QCA_CERT_H #include "qca_core.h" #include "qca_publickey.h" #include namespace QCA { class CertContext; class CSRContext; class CRLContext; class Certificate; class CRL; class CertificateCollection; class CertificateChain; /** Certificate Request Format */ enum CertificateRequestFormat { PKCS10, ///< standard PKCS#10 format SPKAC ///< Signed Public Key and Challenge (Netscape) format }; /** Known types of information stored in certificates This enumerator offers a convenient way to work with common types. */ enum CertificateInfoTypeKnown { CommonName, ///< The common name (eg person), id = "2.5.4.3" Email, ///< Email address, id = "GeneralName.rfc822Name" EmailLegacy, ///< PKCS#9 Email field, id = "1.2.840.113549.1.9.1" Organization, ///< An organisation (eg company), id = "2.5.4.10" OrganizationalUnit, ///< An part of an organisation (eg a division or branch), id = "2.5.4.11" Locality, ///< The locality (eg city, a shire, or part of a state), id = "2.5.4.7" IncorporationLocality, ///< The locality of incorporation (EV certificates), id = "1.3.6.1.4.1.311.60.2.1.1" State, ///< The state within the country, id = "2.5.4.8" IncorporationState, ///< The state of incorporation (EV certificates), id = "1.3.6.1.4.1.311.60.2.1.2" Country, ///< The country, id = "2.5.4.6" IncorporationCountry, ///< The country of incorporation (EV certificates), id = "1.3.6.1.4.1.311.60.2.1.3" URI, ///< Uniform Resource Identifier, id = "GeneralName.uniformResourceIdentifier" DNS, ///< DNS name, id = "GeneralName.dNSName" IPAddress, ///< IP address, id = "GeneralName.iPAddress" XMPP ///< XMPP address (see http://www.ietf.org/rfc/rfc3920.txt), id = "1.3.6.1.5.5.7.8.5" }; /** \class CertificateInfoType qca_cert.h QtCrypto Certificate information type This class represents a type of information being stored in a certificate. It can be created either using a known type (from the Known enumerator) or an identifier string (usually an OID). Types created either way are interchangeable. Types also have the notion of a Section. Some types may reside in the Distinguished Name field of a certificate, and some types may reside in the Subject Alternative Name field. This class is capable of representing a type from either section. In the general case, applications will want to use the CertificateInfoTypeKnown enumerator types. These are from RFC3280 (http://www.ietf.org/rfc/rfc3280.txt) except where shown. The entries for IncorporationLocality, IncorporationState and IncorporationCountry are the same as Locality, State and Country respectively, except that the Extended Validation (EV) certificate guidelines (published by the %Certificate Authority / Browser Forum, see http://www.cabforum.org) distinguish between the place of where the company does business (which is the Locality / State / Country combination) and the jurisdiction where the company is legally incorporated (the IncorporationLocality / IncorporationState / IncorporationCountry combination). \sa Certificate::subjectInfo() and Certificate::issuerInfo() \sa CRL::issuerInfo() \ingroup UserAPI */ class QCA_EXPORT CertificateInfoType { public: /** Section of the certificate that the information belongs in */ enum Section { DN, ///< Distinguished name (the primary name) AlternativeName ///< Alternative name }; /** Standard constructor */ CertificateInfoType(); /** Construct a new type The section will be derived by \a known. \param known the type as part of the CertificateInfoTypeKnown enumerator */ CertificateInfoType(CertificateInfoTypeKnown known); /** Construct a new type \param id the type as an identifier string (OID or internal) \param section the section this type belongs in \sa id */ CertificateInfoType(const QString &id, Section section); /** Standard copy constructor \param from the certificate information to copy from */ CertificateInfoType(const CertificateInfoType &from); ~CertificateInfoType(); /** Standard assignment operator \param from the certificate information to assign from */ CertificateInfoType &operator=(const CertificateInfoType &from); /** The section the type is part of */ Section section() const; /** The type as part of the CertificateInfoTypeKnown enumerator This function may return a value that does not exist in the enumerator. In that case, you may use id() to determine the type. */ CertificateInfoTypeKnown known() const; /** The type as an identifier string For types that have OIDs, this function returns an OID in string form. For types that do not have OIDs, this function returns an internal identifier string whose first character is not a digit (this allows you to tell the difference between an OID and an internal identifier). It is hereby stated that General Names (of the X.509 Subject Alternative Name) shall use the internal identifier format "GeneralName.[rfc field name]". For example, the rfc822Name field would have the identifier "GeneralName.rfc822Name". Applications should not store, use, or compare against internal identifiers unless the identifiers are explicitly documented (e.g. GeneralName). */ QString id() const; /** Comparison operator \param other the certificate information to compare with this certificate information. */ bool operator<(const CertificateInfoType &other) const; /** Comparison operator \param other the certificate information to compare with this certificate information. */ bool operator==(const CertificateInfoType &other) const; /** Inequality operator \param other the certificate information to compare with this certificate information. */ inline bool operator!=(const CertificateInfoType &other) const { return !(*this == other); } private: class Private; QSharedDataPointer d; }; /** \class CertificateInfoPair qca_cert.h QtCrypto One entry in a certificate information list \ingroup UserAPI */ class QCA_EXPORT CertificateInfoPair { public: /** Standard constructor */ CertificateInfoPair(); /** Construct a new pair \param type the type of information stored in this pair \param value the value of the information to be stored */ CertificateInfoPair(const CertificateInfoType &type, const QString &value); /** Standard copy constructor \param from the information pair to copy from */ CertificateInfoPair(const CertificateInfoPair &from); ~CertificateInfoPair(); /** Standard assignment operator \param from the information pair to assign from */ CertificateInfoPair &operator=(const CertificateInfoPair &from); /** The type of information stored in the pair */ CertificateInfoType type() const; /** The value of the information stored in the pair */ QString value() const; /** Comparison operator \param other the certificate information pair to compare with this certificate information pair. */ bool operator==(const CertificateInfoPair &other) const; /** Inequality operator \param other the certificate information pair to compare with this certificate information pair. */ inline bool operator!=(const CertificateInfoPair &other) const { return !(*this == other); } private: class Private; QSharedDataPointer d; }; /** Known types of certificate constraints This enumerator offers a convenient way to work with common types. */ enum ConstraintTypeKnown { // KeyUsage DigitalSignature, ///< %Certificate can be used to create digital signatures, id = "KeyUsage.digitalSignature" NonRepudiation, ///< %Certificate can be used for non-repudiation, id = "KeyUsage.nonRepudiation" KeyEncipherment, ///< %Certificate can be used for encrypting / decrypting keys, id = "KeyUsage.keyEncipherment" DataEncipherment, ///< %Certificate can be used for encrypting / decrypting data, id = "KeyUsage.dataEncipherment" KeyAgreement, ///< %Certificate can be used for key agreement, id = "KeyUsage.keyAgreement" KeyCertificateSign, ///< %Certificate can be used for key certificate signing, id = "KeyUsage.keyCertSign" CRLSign, ///< %Certificate can be used to sign %Certificate Revocation Lists, id = "KeyUsage.crlSign" EncipherOnly, ///< %Certificate can only be used for encryption, id = "KeyUsage.encipherOnly" DecipherOnly, ///< %Certificate can only be used for decryption, id = "KeyUsage.decipherOnly" // ExtKeyUsage ServerAuth, ///< %Certificate can be used for server authentication (e.g. web server), id = "1.3.6.1.5.5.7.3.1". ///< This is an extended usage constraint. ClientAuth, ///< %Certificate can be used for client authentication (e.g. web browser), id = "1.3.6.1.5.5.7.3.2". ///< This is an extended usage constraint. CodeSigning, ///< %Certificate can be used to sign code, id = "1.3.6.1.5.5.7.3.3". This is an extended usage ///< constraint. EmailProtection, ///< %Certificate can be used to sign / encrypt email, id = "1.3.6.1.5.5.7.3.4". This is an ///< extended usage constraint. IPSecEndSystem, ///< %Certificate can be used to authenticate a endpoint in IPSEC, id = "1.3.6.1.5.5.7.3.5". This is ///< an extended usage constraint. IPSecTunnel, ///< %Certificate can be used to authenticate a tunnel in IPSEC, id = "1.3.6.1.5.5.7.3.6". This is an ///< extended usage constraint. IPSecUser, ///< %Certificate can be used to authenticate a user in IPSEC, id = "1.3.6.1.5.5.7.3.7". This is an ///< extended usage constraint. TimeStamping, ///< %Certificate can be used to create a "time stamp" signature, id = "1.3.6.1.5.5.7.3.8". This is an ///< extended usage constraint. OCSPSigning ///< %Certificate can be used to sign an Online %Certificate Status Protocol (OCSP) assertion, id = ///< "1.3.6.1.5.5.7.3.9". This is an extended usage constraint. }; /** \class ConstraintType qca_cert.h QtCrypto Certificate constraint X.509 certificates can be constrained in their application - that is, some certificates can only be used for certain purposes. This class is used to identify an approved purpose for a certificate. \note It is common for a certificate to have more than one purpose. \ingroup UserAPI */ class QCA_EXPORT ConstraintType { public: /** Section of the certificate that the constraint belongs in */ enum Section { KeyUsage, ///< Stored in the key usage section ExtendedKeyUsage ///< Stored in the extended key usage section }; /** Standard constructor */ ConstraintType(); /** Construct a new constraint The section will be derived by \a known. \param known the type as part of the ConstraintTypeKnown enumerator */ ConstraintType(ConstraintTypeKnown known); /** Construct a new constraint \param id the type as an identifier string (OID or internal) \param section the section this type belongs in \sa id */ ConstraintType(const QString &id, Section section); /** Standard copy constructor \param from the constraint type to copy from */ ConstraintType(const ConstraintType &from); ~ConstraintType(); /** Standard assignment operator \param from the constraint type to assign from */ ConstraintType &operator=(const ConstraintType &from); /** The section the constraint is part of */ Section section() const; /** The type as part of the ConstraintTypeKnown enumerator This function may return a value that does not exist in the enumerator. In that case, you may use id() to determine the type. */ ConstraintTypeKnown known() const; /** The type as an identifier string For types that have OIDs, this function returns an OID in string form. For types that do not have OIDs, this function returns an internal identifier string whose first character is not a digit (this allows you to tell the difference between an OID and an internal identifier). It is hereby stated that the KeyUsage bit fields shall use the internal identifier format "KeyUsage.[rfc field name]". For example, the keyEncipherment field would have the identifier "KeyUsage.keyEncipherment". Applications should not store, use, or compare against internal identifiers unless the identifiers are explicitly documented (e.g. KeyUsage). */ QString id() const; /** Comparison operator \param other the constraint type to compare with this constraint */ bool operator<(const ConstraintType &other) const; /** Comparison operator \param other the constraint type to compare with this constraint */ bool operator==(const ConstraintType &other) const; /** Inequality operator \param other the constraint type to compare with this constraint */ inline bool operator!=(const ConstraintType &other) const { return !(*this == other); } private: class Private; QSharedDataPointer d; }; /** Specify the intended usage of a certificate */ enum UsageMode { UsageAny = 0x00, ///< Any application, or unspecified UsageTLSServer = 0x01, ///< server side of a TLS or SSL connection UsageTLSClient = 0x02, ///< client side of a TLS or SSL connection UsageCodeSigning = 0x04, ///< code signing certificate UsageEmailProtection = 0x08, ///< email (S/MIME) certificate UsageTimeStamping = 0x10, ///< time stamping certificate UsageCRLSigning = 0x20 ///< certificate revocation list signing certificate }; /** The validity (or otherwise) of a certificate */ enum Validity { ValidityGood, ///< The certificate is valid ErrorRejected, ///< The root CA rejected the certificate purpose ErrorUntrusted, ///< The certificate is not trusted ErrorSignatureFailed, ///< The signature does not match ErrorInvalidCA, ///< The Certificate Authority is invalid ErrorInvalidPurpose, ///< The purpose does not match the intended usage ErrorSelfSigned, ///< The certificate is self-signed, and is not found in the list of trusted certificates ErrorRevoked, ///< The certificate has been revoked ErrorPathLengthExceeded, ///< The path length from the root CA to this certificate is too long ErrorExpired, ///< The certificate has expired, or is not yet valid (e.g. current time is earlier than notBefore ///< time) ErrorExpiredCA, ///< The Certificate Authority has expired ErrorValidityUnknown = 64 ///< Validity is unknown }; /** The conditions to validate for a certificate */ enum ValidateFlags { ValidateAll = 0x00, // Verify all conditions ValidateRevoked = 0x01, // Verify the certificate was not revoked ValidateExpired = 0x02, // Verify the certificate has not expired ValidatePolicy = 0x04 // Verify the certificate can be used for a specified purpose }; /** Certificate properties type With this container, the information is not necessarily stored in the same sequence as the certificate format itself. Use this container if the order the information is/was stored does not matter for you (this is the case with most applications). Additionally, the EmailLegacy type should not be used with this container. Use Email instead. */ typedef QMultiMap CertificateInfo; /** \class CertificateInfoOrdered qca_cert.h QtCrypto Ordered certificate properties type This container stores the information in the same sequence as the certificate format itself. \ingroup UserAPI */ class CertificateInfoOrdered : public QList { public: /** Convert to RFC 1779 string format */ inline QString toString() const; /** Return a new CertificateInfoOrdered that only contains the Distinguished Name (DN) types found in this object. */ inline CertificateInfoOrdered dnOnly() const; }; /** Convert to RFC 1779 string format \param in the certificate info to convert */ QCA_EXPORT QString orderedToDNString(const CertificateInfoOrdered &in); /** Return a new CertificateInfoOrdered that only contains the Distinguished Name (DN) types found in the input object. \param in the certificate info to extract from */ QCA_EXPORT CertificateInfoOrdered orderedDNOnly(const CertificateInfoOrdered &in); inline QString CertificateInfoOrdered::toString() const { return orderedToDNString(*this); } inline CertificateInfoOrdered CertificateInfoOrdered::dnOnly() const { return orderedDNOnly(*this); } /** %Certificate constraints type */ typedef QList Constraints; /** Create a list of unique friendly names among a list of certificates \param list the list of certificates for which a friendly name is required. */ QCA_EXPORT QStringList makeFriendlyNames(const QList &list); /** \class CertificateOptions qca_cert.h QtCrypto %Certificate options \note In SPKAC mode, all options are ignored except for challenge \ingroup UserAPI */ class QCA_EXPORT CertificateOptions { public: /** Create a Certificate options set \param format the format to create the certificate request in */ CertificateOptions(CertificateRequestFormat format = PKCS10); /** Standard copy constructor \param from the Certificate Options to copy into this object */ CertificateOptions(const CertificateOptions &from); ~CertificateOptions(); /** Standard assignment operator \param from the Certificate Options to copy into this object */ CertificateOptions &operator=(const CertificateOptions &from); /** test the format type for this certificate */ CertificateRequestFormat format() const; /** Specify the format for this certificate \param f the format to use */ void setFormat(CertificateRequestFormat f); /** Test if the certificate options object is valid \return true if the certificate options object is valid */ bool isValid() const; /** The challenge part of the certificate For CertificateRequest only \sa setChallenge */ QString challenge() const; /** Information on the subject of the certificate \sa setInfo */ CertificateInfo info() const; /** Information on the subject of the certificate, in the exact order the items will be written \sa setInfoOrdered */ CertificateInfoOrdered infoOrdered() const; /** List the constraints on this certificate */ Constraints constraints() const; /** list the policies on this certificate */ QStringList policies() const; /** list of URI locations for CRL files each URI refers to the same CRL file For Certificate creation only */ QStringList crlLocations() const; /** list of URI locations for issuer certificate files each URI refers to the same issuer file For Certificate creation only */ QStringList issuerLocations() const; /** list of URI locations for OCSP services For Certificate creation only */ QStringList ocspLocations() const; /** test if the certificate is a CA cert \sa setAsCA \sa setAsUser */ bool isCA() const; /** return the path limit on this certificate */ int pathLimit() const; /** The serial number for the certificate For Certificate creation only */ BigInteger serialNumber() const; /** the first time the certificate will be valid For Certificate creation only */ QDateTime notValidBefore() const; /** the last time the certificate is valid For Certificate creation only */ QDateTime notValidAfter() const; /** Specify the challenge associated with this certificate \param s the challenge string \sa challenge() */ void setChallenge(const QString &s); /** Specify information for the subject associated with the certificate \param info the information for the subject \sa info() */ void setInfo(const CertificateInfo &info); /** Specify information for the subject associated with the certificate \param info the information for the subject \sa info() */ void setInfoOrdered(const CertificateInfoOrdered &info); /** set the constraints on the certificate \param constraints the constraints to be used for the certificate */ void setConstraints(const Constraints &constraints); /** set the policies on the certificate \param policies the policies to be used for the certificate */ void setPolicies(const QStringList &policies); /** set the CRL locations of the certificate each location refers to the same CRL. \param locations a list of URIs to CRL files */ void setCRLLocations(const QStringList &locations); /** set the issuer certificate locations of the certificate each location refers to the same issuer file. \param locations a list of URIs to issuer certificate files */ void setIssuerLocations(const QStringList &locations); /** set the OCSP service locations of the certificate \param locations a list of URIs to OCSP services */ void setOCSPLocations(const QStringList &locations); /** set the certificate to be a CA cert \param pathLimit the number of intermediate certificates allowable */ void setAsCA(int pathLimit = 8); // value from Botan /** set the certificate to be a user cert (this is the default) */ void setAsUser(); /** Set the serial number property on this certificate \param i the serial number to use */ void setSerialNumber(const BigInteger &i); /** Set the validity period for the certificate \param start the first time this certificate becomes valid \param end the last time this certificate is valid */ void setValidityPeriod(const QDateTime &start, const QDateTime &end); private: class Private; Private *d; }; /** \class Certificate qca_cert.h QtCrypto Public Key (X.509) certificate This class contains one X.509 certificate \ingroup UserAPI */ class QCA_EXPORT Certificate : public Algorithm { public: /** Create an empty Certificate */ Certificate(); /** Create a Certificate from a PEM encoded file \param fileName the name (and path, if required) of the file that contains the PEM encoded certificate */ Certificate(const QString &fileName); /** Create a Certificate with specified options and a specified private key \param opts the options to use \param key the private key for this certificate \param provider the provider to use to create this key, if a particular provider is required */ Certificate(const CertificateOptions &opts, const PrivateKey &key, const QString &provider = QString()); /** Standard copy constructor \param from the certificate to copy from */ Certificate(const Certificate &from); ~Certificate() override; /** Standard assignment operator \param from the Certificate to assign from */ Certificate &operator=(const Certificate &from); /** Test if the certificate is empty (null) \return true if the certificate is null */ bool isNull() const; /** The earliest date that the certificate is valid */ QDateTime notValidBefore() const; /** The latest date that the certificate is valid */ QDateTime notValidAfter() const; /** Properties of the subject of the certificate, as a QMultiMap This is the method that provides information on the subject organisation, common name, DNS name, and so on. The list of information types (i.e. the key to the multi-map) is a CertificateInfoType. The values are a list of QString. An example of how you can iterate over the list is: \code foreach( QString dns, info.values(QCA::DNS) ) { std::cout << " " << qPrintable(dns) << std::endl; } \endcode */ CertificateInfo subjectInfo() const; /** Properties of the subject of the certificate, as an ordered list (QList of CertificateInfoPair). This allows access to the certificate information in the same order as they appear in a certificate. Each pair in the list has a type and a value. For example: \code CertificateInfoOrdered info = cert.subjectInfoOrdered(); // info[0].type == CommonName // info[0].value == "example.com" \endcode \sa subjectInfo for an unordered version \sa issuerInfoOrdered for the ordered information on the issuer \sa CertificateInfoPair for the elements in the list */ CertificateInfoOrdered subjectInfoOrdered() const; /** Properties of the issuer of the certificate \sa subjectInfo for how the return value works. */ CertificateInfo issuerInfo() const; /** Properties of the issuer of the certificate, as an ordered list (QList of CertificateInfoPair). This allows access to the certificate information in the same order as they appear in a certificate. Each pair in the list has a type and a value. \sa issuerInfo for an unordered version \sa subjectInfoOrdered for the ordered information on the subject \sa CertificateInfoPair for the elements in the list */ CertificateInfoOrdered issuerInfoOrdered() const; /** The constraints that apply to this certificate */ Constraints constraints() const; /** The policies that apply to this certificate Policies are specified as strings containing OIDs */ QStringList policies() const; /** List of URI locations for CRL files Each URI refers to the same CRL file */ QStringList crlLocations() const; /** List of URI locations for issuer certificate files Each URI refers to the same issuer file */ QStringList issuerLocations() const; /** List of URI locations for OCSP services */ QStringList ocspLocations() const; /** The common name of the subject of the certificate Common names are normally the name of a person, company or organisation */ QString commonName() const; /** The serial number of the certificate */ BigInteger serialNumber() const; /** The public key associated with the subject of the certificate */ PublicKey subjectPublicKey() const; /** Test if the Certificate is valid as a %Certificate Authority \return true if the Certificate is valid as a %Certificate Authority */ bool isCA() const; /** Test if the Certificate is self-signed \return true if the certificate is self-signed */ bool isSelfSigned() const; /** Test if the Certificate has signed another Certificate object and is therefore the issuer \param other the certificate to test \return true if this certificate is the issuer of the argument */ bool isIssuerOf(const Certificate &other) const; /** The upper bound of the number of links in the certificate chain, if any */ int pathLimit() const; /** The signature algorithm used for the signature on this certificate */ SignatureAlgorithm signatureAlgorithm() const; /** The key identifier associated with the subject */ QByteArray subjectKeyId() const; /** The key identifier associated with the issuer */ QByteArray issuerKeyId() const; /** Check the validity of a certificate \param trusted a collection of trusted certificates \param untrusted a collection of additional certificates, not necessarily trusted \param u the use required for the certificate \param vf the conditions to validate \note This function may block */ Validity validate(const CertificateCollection &trusted, const CertificateCollection &untrusted, UsageMode u = UsageAny, ValidateFlags vf = ValidateAll) const; /** Export the Certificate into a DER format */ QByteArray toDER() const; /** Export the Certificate into a PEM format */ QString toPEM() const; /** Export the Certificate into PEM format in a file \param fileName the name of the file to use */ bool toPEMFile(const QString &fileName) const; /** Import the certificate from DER \param a the array containing the certificate in DER format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the Certificate corresponding to the certificate in the provided array */ static Certificate fromDER(const QByteArray &a, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the certificate from PEM format \param s the string containing the certificate in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the Certificate corresponding to the certificate in the provided string */ static Certificate fromPEM(const QString &s, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the certificate from a file \param fileName the name (and path, if required) of the file containing the certificate in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the Certificate corresponding to the certificate in the provided string */ static Certificate fromPEMFile(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); /** Test if the subject of the certificate matches a specified host name This will return true (indicating a match), if the specified host name meets the RFC 2818 validation rules with this certificate. If the host is an internationalized domain name, then it must be provided in unicode format, not in IDNA ACE/punycode format. \param host the name of the host to compare to */ bool matchesHostName(const QString &host) const; /** Test for equality of two certificates \param a the certificate to compare this certificate with \return true if the two certificates are the same */ bool operator==(const Certificate &a) const; /** Inequality operator \param other the certificate to compare this certificate with */ inline bool operator!=(const Certificate &other) const { return !(*this == other); } /** \internal \param c context (internal) */ void change(CertContext *c); private: class Private; friend class Private; QSharedDataPointer d; friend class CertificateChain; Validity chain_validate(const CertificateChain &chain, const CertificateCollection &trusted, const QList &untrusted_crls, UsageMode u, ValidateFlags vf) const; CertificateChain chain_complete(const CertificateChain &chain, const QList &issuers, Validity *result) const; }; /** \class CertificateChain qca_cert.h QtCrypto A chain of related Certificates CertificateChain is a list (a QList) of certificates that are related by the signature from one to another. If Certificate C signs Certificate B, and Certificate B signs Certificate A, then C, B and A form a chain. The normal use of a CertificateChain is from a end-user Certificate (called the primary, equivalent to QList::first()) through some intermediate Certificates to some other Certificate (QList::last()), which might be a root %Certificate Authority, but does not need to be. You can build up the chain using normal QList operations, such as QList::append(). \sa QCA::CertificateCollection for an alternative way to represent a group of Certificates that do not necessarily have a chained relationship. \ingroup UserAPI */ class CertificateChain : public QList { public: /** Create an empty certificate chain */ inline CertificateChain() { } /** Create a certificate chain, starting at the specified certificate \param primary the end-user certificate that forms one end of the chain */ inline CertificateChain(const Certificate &primary) { append(primary); } /** Return the primary (end-user) Certificate */ inline const Certificate &primary() const { return first(); } /** Check the validity of a certificate chain \param trusted a collection of trusted certificates \param untrusted_crls a list of additional CRLs, not necessarily trusted \param u the use required for the primary certificate \param vf the conditions to validate \note This function may block \sa Certificate::validate() */ inline Validity validate(const CertificateCollection &trusted, const QList &untrusted_crls = QList(), UsageMode u = UsageAny, ValidateFlags vf = ValidateAll) const; /** Complete a certificate chain for the primary certificate, using the rest of the certificates in the chain object, as well as those in \a issuers, as possible issuers in the chain. If there are issuers missing, then the chain might be incomplete (at the worst case, if no issuers exist for the primary certificate, then the resulting chain will consist of just the primary certificate). Use the \a result argument to find out if there was a problem during completion. A result of ValidityGood means the chain was completed successfully. The newly constructed CertificateChain is returned. If the certificate chain is empty, then this will return an empty CertificateChain object. \param issuers a pool of issuers to draw from as necessary \param result the result of the completion operation \note This function may block \sa validate */ inline CertificateChain complete(const QList &issuers = QList(), Validity *result = nullptr) const; }; inline Validity CertificateChain::validate(const CertificateCollection &trusted, const QList &untrusted_crls, UsageMode u, ValidateFlags vf) const { if (isEmpty()) return ErrorValidityUnknown; return first().chain_validate(*this, trusted, untrusted_crls, u, vf); } inline CertificateChain CertificateChain::complete(const QList &issuers, Validity *result) const { if (isEmpty()) return CertificateChain(); return first().chain_complete(*this, issuers, result); } /** \class CertificateRequest qca_cert.h QtCrypto %Certificate Request A CertificateRequest is a unsigned request for a Certificate \ingroup UserAPI */ class QCA_EXPORT CertificateRequest : public Algorithm { public: /** Create an empty certificate request */ CertificateRequest(); /** Create a certificate request based on the contents of a file \param fileName the file (and path, if necessary) containing a PEM encoded certificate request */ CertificateRequest(const QString &fileName); /** Create a certificate request based on specified options \param opts the options to use in the certificate request \param key the private key that matches the certificate being requested \param provider the provider to use, if a specific provider is required */ CertificateRequest(const CertificateOptions &opts, const PrivateKey &key, const QString &provider = QString()); /** Standard copy constructor \param from the request to copy from */ CertificateRequest(const CertificateRequest &from); ~CertificateRequest() override; /** Standard assignment operator \param from the request to assign from */ CertificateRequest &operator=(const CertificateRequest &from); /** test if the certificate request is empty \return true if the certificate request is empty, otherwise false */ bool isNull() const; /** Test if the certificate request can use a specified format \param f the format to test for \param provider the provider to use, if a specific provider is required \return true if the certificate request can use the specified format */ static bool canUseFormat(CertificateRequestFormat f, const QString &provider = QString()); /** the format that this Certificate request is in */ CertificateRequestFormat format() const; /** Information on the subject of the certificate being requested \note this only applies to PKCS#10 format certificate requests \sa subjectInfoOrdered for a version that maintains order in the subject information. */ CertificateInfo subjectInfo() const; /** Information on the subject of the certificate being requested, as an ordered list (QList of CertificateInfoPair). \note this only applies to PKCS#10 format certificate requests \sa subjectInfo for a version that does not maintain order, but allows access based on a multimap. \sa CertificateInfoPair for the elements in the list */ CertificateInfoOrdered subjectInfoOrdered() const; /** The constraints that apply to this certificate request \note this only applies to PKCS#10 format certificate requests */ Constraints constraints() const; /** The policies that apply to this certificate request \note this only applies to PKCS#10 format certificate requests */ QStringList policies() const; /** The public key belonging to the issuer */ PublicKey subjectPublicKey() const; /** Test if this %Certificate Request is for a %Certificate Authority certificate \note this only applies to PKCS#10 format certificate requests */ bool isCA() const; /** The path limit for the certificate in this %Certificate Request \note this only applies to PKCS#10 format certificate requests */ int pathLimit() const; /** The challenge associated with this certificate request */ QString challenge() const; /** The algorithm used to make the signature on this certificate request */ SignatureAlgorithm signatureAlgorithm() const; /** Test for equality of two certificate requests \param csr the certificate request to be compared to this certificate request \return true if the two certificate requests are the same */ bool operator==(const CertificateRequest &csr) const; /** Inequality operator \param other the certificate request to be compared to this certificate request */ inline bool operator!=(const CertificateRequest &other) const { return !(*this == other); } /** Export the %Certificate Request into a DER format \note this only applies to PKCS#10 format certificate requests */ QByteArray toDER() const; /** Export the %Certificate Request into a PEM format \note this only applies to PKCS#10 format certificate requests */ QString toPEM() const; /** Export the Certificate into PEM format in a file \param fileName the name of the file to use \note this only applies to PKCS#10 format certificate requests */ bool toPEMFile(const QString &fileName) const; /** Import the certificate request from DER \param a the array containing the certificate request in DER format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateRequest corresponding to the certificate request in the provided array \note this only applies to PKCS#10 format certificate requests */ static CertificateRequest fromDER(const QByteArray &a, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the certificate request from PEM format \param s the string containing the certificate request in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateRequest corresponding to the certificate request in the provided string \note this only applies to PKCS#10 format certificate requests */ static CertificateRequest fromPEM(const QString &s, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the certificate request from a file \param fileName the name (and path, if required) of the file containing the certificate request in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateRequest corresponding to the certificate request in the provided string \note this only applies to PKCS#10 format certificate requests */ static CertificateRequest fromPEMFile(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); /** Export the CertificateRequest to a string \return the string corresponding to the certificate request \note this only applies to SPKAC format certificate requests */ QString toString() const; /** Import the CertificateRequest from a string \param s the string containing to the certificate request \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateRequest corresponding to the certificate request in the provided string \note this only applies to SPKAC format certificate requests */ static CertificateRequest fromString(const QString &s, ConvertResult *result = nullptr, const QString &provider = QString()); /** \internal \param c context (internal) */ void change(CSRContext *c); private: class Private; friend class Private; QSharedDataPointer d; }; /** \class CRLEntry qca_cert.h QtCrypto Part of a CRL representing a single certificate \ingroup UserAPI */ class QCA_EXPORT CRLEntry { public: /** The reason why the certificate has been revoked */ enum Reason { Unspecified, ///< reason is unknown KeyCompromise, ///< private key has been compromised CACompromise, ///< certificate authority has been compromised AffiliationChanged, Superseded, ///< certificate has been superseded CessationOfOperation, CertificateHold, ///< certificate is on hold RemoveFromCRL, ///< certificate was previously in a CRL, but is now valid PrivilegeWithdrawn, AACompromise ///< attribute authority has been compromised }; /** create an empty CRL entry */ CRLEntry(); /** create a CRL entry \param c the certificate to revoke \param r the reason that the certificate is being revoked */ explicit CRLEntry(const Certificate &c, Reason r = Unspecified); /** create a CRL entry \param serial the serial number of the Certificate being revoked \param time the time the Certificate was revoked (or will be revoked) \param r the reason that the certificate is being revoked */ CRLEntry(const BigInteger serial, const QDateTime &time, Reason r = Unspecified); /** Copy constructor \param from the CRLEntry to copy from */ CRLEntry(const CRLEntry &from); ~CRLEntry(); /** Standard assignment operator \param from the CRLEntry to copy from */ CRLEntry &operator=(const CRLEntry &from); /** The serial number of the certificate that is the subject of this CRL entry */ BigInteger serialNumber() const; /** The time this CRL entry was created */ QDateTime time() const; /** Test if this CRL entry is empty */ bool isNull() const; /** The reason that this CRL entry was created Alternatively, you might like to think of this as the reason that the subject certificate has been revoked */ Reason reason() const; /** Test if one CRL entry is "less than" another CRL entries are compared based on their serial number \param a the CRL entry to be compared to this CRL entry. */ bool operator<(const CRLEntry &a) const; /** Test for equality of two CRL Entries \param a the CRL entry to be compared to this CRL entry. \return true if the two certificates are the same */ bool operator==(const CRLEntry &a) const; /** Inequality operator \param other the CRL entry to be compared to this CRL entry. */ inline bool operator!=(const CRLEntry &other) const { return !(*this == other); } private: BigInteger _serial; QDateTime _time; Reason _reason; class Private; Private *d; }; /** \class CRL qca_cert.h QtCrypto %Certificate Revocation List A %CRL is a list of certificates that are special in some way. The normal reason for including a certificate on a %CRL is that the certificate should no longer be used. For example, if a key is compromised, then the associated certificate may no longer provides appropriate security. There are other reasons why a certificate may be placed on a %CRL, as shown in the CRLEntry::Reason enumeration. \sa CertificateCollection for a way to handle Certificates and CRLs as a single entity. \sa CRLEntry for the %CRL segment representing a single Certificate. \ingroup UserAPI */ class QCA_EXPORT CRL : public Algorithm { public: CRL(); /** Standard copy constructor \param from the revocation list to copy from */ CRL(const CRL &from); ~CRL() override; /** Standard assignment operator \param from the revocation list to assign from */ CRL &operator=(const CRL &from); /** Test if the CRL is empty \return true if the CRL is empty, otherwise return false */ bool isNull() const; /** Information on the issuer of the CRL as a QMultiMap. \sa issuerInfoOrdered for a version that maintains the order of information fields as per the underlying CRL. */ CertificateInfo issuerInfo() const; /** Information on the issuer of the CRL as an ordered list (QList of CertificateInfoPair). \sa issuerInfo for a version that allows lookup based on a multimap. \sa CertificateInfoPair for the elements in the list */ CertificateInfoOrdered issuerInfoOrdered() const; /** The CRL serial number. Note that serial numbers are a CRL extension, and not all certificates have one. \return the CRL serial number, or -1 if there is no serial number */ int number() const; /** the time that this CRL became (or becomes) valid */ QDateTime thisUpdate() const; /** the time that this CRL will be obsoleted you should obtain an updated CRL at this time */ QDateTime nextUpdate() const; /** a list of the revoked certificates in this CRL */ QList revoked() const; /** The signature algorithm used for the signature on this CRL */ SignatureAlgorithm signatureAlgorithm() const; /** The key identification of the CRL issuer */ QByteArray issuerKeyId() const; /** Test for equality of two %Certificate Revocation Lists \param a the CRL to be compared to this CRL \return true if the two CRLs are the same */ bool operator==(const CRL &a) const; /** Inequality operator \param other the CRL to be compared to this CRL */ inline bool operator!=(const CRL &other) const { return !(*this == other); } /** Export the %Certificate Revocation List (CRL) in DER format \return an array containing the CRL in DER format */ QByteArray toDER() const; /** Export the %Certificate Revocation List (CRL) in PEM format \return a string containing the CRL in PEM format */ QString toPEM() const; /** Export the %Certificate Revocation List (CRL) into PEM format in a file \param fileName the name of the file to use */ bool toPEMFile(const QString &fileName) const; /** Import a DER encoded %Certificate Revocation List (CRL) \param a the array containing the CRL in DER format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CRL corresponding to the contents of the array */ static CRL fromDER(const QByteArray &a, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import a PEM encoded %Certificate Revocation List (CRL) \param s the string containing the CRL in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CRL corresponding to the contents of the string */ static CRL fromPEM(const QString &s, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import a PEM encoded %Certificate Revocation List (CRL) from a file \param fileName the name (and path, if required) of the file containing the certificate in PEM format \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CRL in the file */ static CRL fromPEMFile(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); /** \internal \param c context (internal) */ void change(CRLContext *c); private: class Private; friend class Private; QSharedDataPointer d; }; /** \class CertificateCollection qca_cert.h QtCrypto Bundle of Certificates and CRLs CertificateCollection provides a bundle of Certificates and Certificate Revocation Lists (CRLs), not necessarily related. \sa QCA::CertificateChain for a representation of a chain of Certificates related by signatures. \ingroup UserAPI */ class QCA_EXPORT CertificateCollection { public: /** Create an empty Certificate / CRL collection */ CertificateCollection(); /** Standard copy constructor \param from the CertificateCollection to copy from */ CertificateCollection(const CertificateCollection &from); ~CertificateCollection(); /** Standard assignment operator \param from the CertificateCollection to copy from */ CertificateCollection &operator=(const CertificateCollection &from); /** Append a Certificate to this collection \param cert the Certificate to add to this CertificateCollection */ void addCertificate(const Certificate &cert); /** Append a CRL to this collection \param crl the certificate revokation list to add to this CertificateCollection */ void addCRL(const CRL &crl); /** The Certificates in this collection */ QList certificates() const; /** The CRLs in this collection */ QList crls() const; /** Add another CertificateCollection to this collection \param other the CertificateCollection to add to this collection */ void append(const CertificateCollection &other); /** Add another CertificateCollection to this collection \param other the CertificateCollection to add to this collection */ CertificateCollection operator+(const CertificateCollection &other) const; /** Add another CertificateCollection to this collection \param other the CertificateCollection to add to this collection */ CertificateCollection &operator+=(const CertificateCollection &other); /** test if the CertificateCollection can be imported and exported to PKCS#7 format \param provider the provider to use, if a specific provider is required \return true if the CertificateCollection can be imported and exported to PKCS#7 format */ static bool canUsePKCS7(const QString &provider = QString()); /** export the CertificateCollection to a plain text file \param fileName the name (and path, if required) to write the contents of the CertificateCollection to \return true if the export succeeded, otherwise false */ bool toFlatTextFile(const QString &fileName); /** export the CertificateCollection to a PKCS#7 file \param fileName the name (and path, if required) to write the contents of the CertificateCollection to \param provider the provider to use, if a specific provider is required \return true if the export succeeded, otherwise false */ bool toPKCS7File(const QString &fileName, const QString &provider = QString()); /** import a CertificateCollection from a text file \param fileName the name (and path, if required) to read the certificate collection from \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateCollection corresponding to the contents of the file specified in fileName */ static CertificateCollection fromFlatTextFile(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); /** import a CertificateCollection from a PKCS#7 file \param fileName the name (and path, if required) to read the certificate collection from \param result a pointer to a ConvertResult, which if not-null will be set to the conversion status \param provider the provider to use, if a specific provider is required \return the CertificateCollection corresponding to the contents of the file specified in fileName */ static CertificateCollection fromPKCS7File(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); private: class Private; QSharedDataPointer d; }; /** \class CertificateAuthority qca_cert.h QtCrypto A %Certificate Authority is used to generate Certificates and %Certificate Revocation Lists (CRLs). \ingroup UserAPI */ class QCA_EXPORT CertificateAuthority : public Algorithm { public: /** Create a new %Certificate Authority \param cert the CA certificate \param key the private key associated with the CA certificate \param provider the provider to use, if a specific provider is required */ CertificateAuthority(const Certificate &cert, const PrivateKey &key, const QString &provider); /** Copy constructor \param from the CertificateAuthority to copy from */ CertificateAuthority(const CertificateAuthority &from); ~CertificateAuthority() override; /** Standard assignment operator \param from the CertificateAuthority to copy from */ CertificateAuthority &operator=(const CertificateAuthority &from); /** The Certificate belonging to the %CertificateAuthority This is the Certificate that was passed as an argument to the constructor */ Certificate certificate() const; /** Create a new Certificate by signing the provider CertificateRequest \param req the CertificateRequest to sign \param notValidAfter the last date that the Certificate will be valid */ Certificate signRequest(const CertificateRequest &req, const QDateTime ¬ValidAfter) const; /** Create a new Certificate \param key the Public Key to use to create the Certificate \param opts the options to use for the new Certificate */ Certificate createCertificate(const PublicKey &key, const CertificateOptions &opts) const; /** Create a new %Certificate Revocation List (CRL) \param nextUpdate the date that the CRL will be updated \return an empty CRL */ CRL createCRL(const QDateTime &nextUpdate) const; /** Update the CRL to include new entries \param crl the CRL to update \param entries the entries to add to the CRL \param nextUpdate the date that this CRL will be updated \return the update CRL */ CRL updateCRL(const CRL &crl, const QList &entries, const QDateTime &nextUpdate) const; private: class Private; Private *d; }; /** \class KeyBundle qca_cert.h QtCrypto Certificate chain and private key pair KeyBundle is essentially a convience class that holds a certificate chain and an associated private key. This class has a number of methods that make it particularly suitable for accessing a PKCS12 (.p12) format file, however it can be used as just a container for a Certificate, its associated PrivateKey and optionally additional X.509 Certificate that form a chain. For more information on PKCS12 "Personal Information Exchange Syntax Standard", see ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-12/pkcs-12v1.pdf. \ingroup UserAPI */ class QCA_EXPORT KeyBundle { public: /** Create an empty KeyBundle */ KeyBundle(); /** Create a KeyBundle from a PKCS12 (.p12) encoded file This constructor requires appropriate plugin (provider) support. You must check for the "pkcs12" feature before using this constructor. \param fileName the name of the file to read from \param passphrase the passphrase that is applicable to the file \sa fromFile for a more flexible version of the same capability. \note This synchronous operation may require event handling, and so it must not be called from the same thread as an EventHandler. */ explicit KeyBundle(const QString &fileName, const SecureArray &passphrase = SecureArray()); /** Standard copy constructor \param from the KeyBundle to use as source */ KeyBundle(const KeyBundle &from); ~KeyBundle(); /** Standard assignment operator \param from the KeyBundle to use as source */ KeyBundle &operator=(const KeyBundle &from); /** Test if this key is empty (null) */ bool isNull() const; /** The name associated with this key. This is also known as the "friendly name", and if present, is typically suitable to be displayed to the user. \sa setName */ QString name() const; /** The public certificate part of this bundle \sa setCertificateChainAndKey */ CertificateChain certificateChain() const; /** The private key part of this bundle \sa setCertificateChainAndKey */ PrivateKey privateKey() const; /** Specify the name of this bundle \param s the name to use */ void setName(const QString &s); /** Set the public certificate and private key \param c the CertificateChain containing the public part of the Bundle \param key the private key part of the Bundle \sa privateKey, certificateChain for getters */ void setCertificateChainAndKey(const CertificateChain &c, const PrivateKey &key); /** Export the key bundle to an array in PKCS12 format. This method requires appropriate plugin (provider) support - you must check for the "pkcs12" feature, as shown below. \code if( QCA::isSupported("pkcs12") ) { // can use I/O byteArray = bundle.toArray( "pass phrase" ); } else { // not possible to use I/O } \endcode \param passphrase the passphrase to use to protect the bundle \param provider the provider to use, if a specific provider is required */ QByteArray toArray(const SecureArray &passphrase, const QString &provider = QString()) const; /** Export the key bundle to a file in PKCS12 (.p12) format This method requires appropriate plugin (provider) support - you must check for the "pkcs12" feature, as shown below. \code if( QCA::isSupported("pkcs12") ) { // can use I/O bool result = bundle.toFile( filename, "pass phrase" ); } else { // not possible to use I/O } \endcode \param fileName the name of the file to save to \param passphrase the passphrase to use to protect the bundle \param provider the provider to use, if a specific provider is required */ bool toFile(const QString &fileName, const SecureArray &passphrase, const QString &provider = QString()) const; /** Import the key bundle from an array in PKCS12 format This method requires appropriate plugin (provider) support - you must check for the "pkcs12" feature, as shown below. \code if( QCA::isSupported("pkcs12") ) { // can use I/O bundle = QCA::KeyBundle::fromArray( array, "pass phrase" ); } else { // not possible to use I/O } \endcode \param a the array to import from \param passphrase the passphrase for the encoded bundle \param result pointer to the result of the import process \param provider the provider to use, if a specific provider is required \sa QCA::KeyLoader for an asynchronous loader approach. \note This synchronous operation may require event handling, and so it must not be called from the same thread as an EventHandler. */ static KeyBundle fromArray(const QByteArray &a, const SecureArray &passphrase = SecureArray(), ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the key bundle from a file in PKCS12 (.p12) format This method requires appropriate plugin (provider) support - you must check for the "pkcs12" feature, as shown below. \code if( QCA::isSupported("pkcs12") ) { // can use I/O bundle = QCA::KeyBundle::fromFile( filename, "pass phrase" ); } else { // not possible to use I/O } \endcode \param fileName the name of the file to read from \param passphrase the passphrase for the encoded bundle \param result pointer to the result of the import process \param provider the provider to use, if a specific provider is required \sa QCA::KeyLoader for an asynchronous loader approach. \note This synchronous operation may require event handling, and so it must not be called from the same thread as an EventHandler. */ static KeyBundle fromFile(const QString &fileName, const SecureArray &passphrase = SecureArray(), ConvertResult *result = nullptr, const QString &provider = QString()); private: class Private; QSharedDataPointer d; }; /** \class PGPKey qca_cert.h QtCrypto Pretty Good Privacy key This holds either a reference to an item in a real PGP keyring, or a standalone item created using the from*() functions. Note that with the latter method, the key is of no use besides being informational. The key must be in a keyring (that is, inKeyring() == true) to actually do crypto with it. \ingroup UserAPI */ class QCA_EXPORT PGPKey : public Algorithm { public: /** Create an empty PGP key */ PGPKey(); /** Create a PGP key from an encoded file \param fileName the name (and path, if required) of the file that the PGP key is to be loaded from. \sa fromFile for a version that allows better error checking / validation \sa toFile for a method to write out the key. */ PGPKey(const QString &fileName); /** Standard copy constructor \param from the PGPKey to use as the source */ PGPKey(const PGPKey &from); ~PGPKey() override; /** Standard assignment operator \param from the PGPKey to use as the source */ PGPKey &operator=(const PGPKey &from); /** Test if the PGP key is empty (null) \return true if the PGP key is null */ bool isNull() const; /** The Key identification for the PGP key */ QString keyId() const; /** The primary user identification for the key */ QString primaryUserId() const; /** The list of all user identifications associated with the key */ QStringList userIds() const; /** Test if the PGP key is the secret key \return true if the PGP key is the secret key */ bool isSecret() const; /** The creation date for the key */ QDateTime creationDate() const; /** The expiration date for the key */ QDateTime expirationDate() const; /** The key fingerpint This will return the PGP fingerprint as a string. It comprises 40 hex digits, without spaces. */ QString fingerprint() const; /** Test if this key is in a keyring \return true if the key is in a keyring \note keys that are not in a keyring cannot be used for encryption, decryption, signing or verification */ bool inKeyring() const; /** Test if the key is trusted \return true if the key is trusted */ bool isTrusted() const; /** Export the key to an array. This will export the key in a binary format (that is, not in an "ascii armoured" form). \sa fromArray for a static import method. \sa toString for an "ascii armoured" export method. */ QByteArray toArray() const; /** Export the key to a string This will export the key in an "ascii armoured" form. \sa fromString for a static import method. \sa toArray for a binary format export method. */ QString toString() const; /** Export the key to a file \param fileName the name of the file to save the key to */ bool toFile(const QString &fileName) const; /** Import the key from an array \param a the array to import from \param result if not null, this will be set to the result of the import process \param provider the provider to use, if a particular provider is required */ static PGPKey fromArray(const QByteArray &a, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the key from a string \param s the string to import from \param result if not null, this will be set to the result of the import process \param provider the provider to use, if a particular provider is required */ static PGPKey fromString(const QString &s, ConvertResult *result = nullptr, const QString &provider = QString()); /** Import the key from a file \param fileName string containing the name of the file to import from \param result if not null, this will be set to the result of the import process \param provider the provider to use, if a particular provider is required */ static PGPKey fromFile(const QString &fileName, ConvertResult *result = nullptr, const QString &provider = QString()); private: class Private; Private *d; }; /** \class KeyLoader qca_cert.h QtCrypto Asynchronous private key loader GUI applications generally must use KeyLoader to load private keys. This is because the synchronous private key loading functions, for example QCA::PrivateKey::fromPEMFile(), cannot be used within the same thread as an EventHandler, and most GUI applications will use EventHandler from the main thread. KeyLoader does not have this problem. It can be used from any thread, including the same thread as EventHandler. The KeyLoader class allows you to asynchronously load stand-alone private keys (QCA::PrivateKey) or private keys with a certificate (QCA::KeyBundle) with a signal that advises of completion. To use this class to load a PrivateKey, you create a KeyLoader object then use one of the loadPrivateKeyFrom...() functions, depending on the format for your key. These functions return immediately. When you get the finished() signal, you can check that the loading operation succeeded (using convertResult()) and then obtain the PrivateKey using the privateKey() function. The same process applies for loading a KeyBundle, except that you use either loadKeyBundleFromFile() or loadKeyBundleFromArray() instead of the loadPrivateKeyFrom...() function, and use keyBundle() instead of privateKey(). The loader may need a passphrase to complete the loading of the key or key bundle. You should use the QCA::EventHandler class to ensure that you deal with this correctly. \note %QCA also provides synchronous private key loading using QCA::PrivateKey::fromPEMFile(), QCA::PrivateKey::fromPEM() and QCA::PrivateKey::fromDER(). %QCA provides synchronous key bundle loading using QCA::KeyBundle::fromArray() and QCA::KeyBundle::fromFile(). \ingroup UserAPI */ class QCA_EXPORT KeyLoader : public QObject { Q_OBJECT public: /** Create a KeyLoader object. \param parent the parent object for this object */ KeyLoader(QObject *parent = nullptr); ~KeyLoader() override; /** Initiate an asynchronous loading of a PrivateKey from a PEM format file. This function will return immediately. \param fileName the name of the file (and path, if necessary) to load the key from */ void loadPrivateKeyFromPEMFile(const QString &fileName); /** Initiate an asynchronous loading of a PrivateKey from a PEM format string. This function will return immediately. \param s the string containing the PEM formatted key */ void loadPrivateKeyFromPEM(const QString &s); /** Initiate an asynchronous loading of a PrivateKey from a DER format array. This function will return immediately. \param a the array containing the DER formatted key */ void loadPrivateKeyFromDER(const SecureArray &a); /** Initiate an asynchronous loading of a KeyBundle from a file This function will return immediately. \param fileName the name of the file (and path, if necessary) to load the key bundle from */ void loadKeyBundleFromFile(const QString &fileName); /** Initiate an asynchronous loading of a KeyBundle from an array This function will return immediately. \param a the array containing the key bundle */ void loadKeyBundleFromArray(const QByteArray &a); /** The result of the loading process. This is not valid until the finished() signal has been emitted. */ ConvertResult convertResult() const; /** The private key that has been loaded. This is only valid if loadPrivateKeyFromPEMFile(), loadPrivateKeyFromPEM() or loadPrivateKeyFromDER() has been used, the load has completed (that is, finished() has been emitted), and the conversion succeeded (that is, convertResult() returned ConvertGood). */ PrivateKey privateKey() const; /** The key bundle that has been loaded. This is only valid if loadKeyBundleFromFile() or loadKeyBundleFromArray() has been used, the load has completed (that is, finished() has been emitted), and the conversion succeeded (that is, convertResult() returned ConvertGood). */ KeyBundle keyBundle() const; Q_SIGNALS: /** Signal that is emitted when the load process has completed. \note The load process may not have completed successfully - check the result of convertResult() to confirm this before using the privateKey() or keyBundle() results. */ void finished(); private: Q_DISABLE_COPY(KeyLoader) class Private; friend class Private; Private *d; }; } #endif