1/***************************************************************************
2 * Copyright (C) 2005-2014 by the Quassel Project *
3 * devel@quassel-irc.org *
4 * *
5 * This program is free software; you can redistribute it and/or modify *
6 * it under the terms of the GNU General Public License as published by *
7 * the Free Software Foundation; either version 2 of the License, or *
8 * (at your option) version 3. *
9 * *
10 * This program is distributed in the hope that it will be useful, *
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
13 * GNU General Public License for more details. *
14 * *
15 * You should have received a copy of the GNU General Public License *
16 * along with this program; if not, write to the *
17 * Free Software Foundation, Inc., *
18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. *
19 ***************************************************************************/
20
21#include "clientidentity.h"
22
23#include "client.h"
24#include "signalproxy.h"
25
26INIT_SYNCABLE_OBJECT(CertIdentity)
27CertIdentity::CertIdentity(IdentityId id, QObject *parent)
28 : Identity(id, parent)
29#ifdef HAVE_SSL
30 , _certManager(0),
31 _isDirty(false)
32#endif
33{
34}
35
36
37CertIdentity::CertIdentity(const Identity &other, QObject *parent)
38 : Identity(other, parent)
39#ifdef HAVE_SSL
40 , _certManager(0),
41 _isDirty(false)
42#endif
43{
44}
45
46
47CertIdentity::CertIdentity(const CertIdentity &other, QObject *parent)
48 : Identity(other, parent)
49#ifdef HAVE_SSL
50 , _certManager(0),
51 _isDirty(other._isDirty),
52 _sslKey(other._sslKey),
53 _sslCert(other._sslCert)
54#endif
55{
56}
57
58
59#ifdef HAVE_SSL
60void CertIdentity::enableEditSsl(bool enable)
61{
62 if (!enable || _certManager)
63 return;
64
65 _certManager = new ClientCertManager(id(), this);
66 if (isValid()) { // this means we are not a newly created Identity but have a proper Id
67 Client::signalProxy()->synchronize(_certManager);
68 connect(_certManager, SIGNAL(updated()), this, SLOT(markClean()));
69 connect(_certManager, SIGNAL(initDone()), this, SLOT(markClean()));
70 }
71}
72
73
74void CertIdentity::setSslKey(const QSslKey &key)
75{
76 if (key.toPem() == _sslKey.toPem())
77 return;
78 _sslKey = key;
79 _isDirty = true;
80}
81
82
83void CertIdentity::setSslCert(const QSslCertificate &cert)
84{
85 if (cert.toPem() == _sslCert.toPem())
86 return;
87 _sslCert = cert;
88 _isDirty = true;
89}
90
91
92void CertIdentity::requestUpdateSslSettings()
93{
94 if (!_certManager)
95 return;
96
97 _certManager->requestUpdate(_certManager->toVariantMap());
98}
99
100
101void CertIdentity::markClean()
102{
103 _isDirty = false;
104 emit sslSettingsUpdated();
105}
106
107
108// ========================================
109// ClientCertManager
110// ========================================
111void ClientCertManager::setSslKey(const QByteArray &encoded)
112{
113 QSslKey key(encoded, QSsl::Rsa);
114 if (key.isNull())
115 key = QSslKey(encoded, QSsl::Dsa);
116 _certIdentity->setSslKey(key);
117}
118
119
120void ClientCertManager::setSslCert(const QByteArray &encoded)
121{
122 _certIdentity->setSslCert(QSslCertificate(encoded));
123}
124
125
126#endif // HAVE_SSL
127