QSsl 名称空间

The QSsl namespace declares enums common to all SSL classes in QtNetwork . 更多...

头: #include <QSsl>
Since: Qt 4.3

    类型

    enum AlternateNameEntryType { EmailEntry, DnsEntry }
    enum EncodingFormat { Pem, Der }
    enum KeyAlgorithm { Rsa, Dsa }
    enum KeyType { PrivateKey, PublicKey }
    enum SslOption { SslOptionDisableEmptyFragments, SslOptionDisableSessionTickets, SslOptionDisableCompression, SslOptionDisableServerNameIndication, SslOptionDisableLegacyRenegotiation }
    flags SslOptions
    enum SslProtocol { SslV3, SslV2, TlsV1, UnknownProtocol, ..., SecureProtocols }

    详细描述

    The QSsl namespace declares enums common to all SSL classes in QtNetwork .

    类型文档编制

    enum QSsl:: AlternateNameEntryType

    Describes the key types for alternate name entries in QSslCertificate .

    常量 描述
    QSsl::EmailEntry 0 An email entry; the entry contains an email address that the certificate is valid for.
    QSsl::DnsEntry 1 A DNS host name entry; the entry contains a host name entry that the certificate is valid for. The entry may contain wildcards.

    另请参阅 QSslCertificate::alternateSubjectNames ().

    enum QSsl:: EncodingFormat

    描述证书和密钥支持的编码格式。

    常量 描述
    QSsl::Pem 0 PEM 格式。
    QSsl::Der 1 DER 格式。

    enum QSsl:: KeyAlgorithm

    Describes the different key algorithms supported by QSslKey .

    常量 描述
    QSsl::Rsa 0 RSA 算法。
    QSsl::Dsa 1 DSA 算法。

    enum QSsl:: KeyType

    Describes the two types of keys QSslKey 支持。

    常量 描述
    QSsl::PrivateKey 0 私钥。
    QSsl::PublicKey 1 公钥。

    enum QSsl:: SslOption
    flags QSsl:: SslOptions

    Describes the options that can be used to control the details of SSL behaviour. These options are generally used to turn features off to work around buggy servers.

    常量 描述
    QSsl::SslOptionDisableEmptyFragments 0x01 Disables the insertion of empty fragments into the data when using block ciphers. When enabled, this prevents some attacks (such as the BEAST attack), however it is incompatible with some servers.
    QSsl::SslOptionDisableSessionTickets 0x02 Disables the SSL session ticket extension. This can cause slower connection setup, however some servers are not compatible with the extension.
    QSsl::SslOptionDisableCompression 0x04 Disables the SSL compression extension. When enabled, this allows the data being passed over SSL to be compressed, however some servers are not compatible with this extension.
    QSsl::SslOptionDisableServerNameIndication 0x08 Disables the SSL server name indication extension. When enabled, this tells the server the virtual host being accessed allowing it to respond with the correct certificate.
    QSsl::SslOptionDisableLegacyRenegotiation 0x10 Disables the older insecure mechanism for renegotiating the connection parameters. When enabled, this option can allow connections for legacy servers, but it introduces the possibility that an attacker could inject plaintext into the SSL session.

    By default, SslOptionDisableEmptyFragments is turned on since this causes problems with a large number of servers. SslOptionDisableLegacyRenegotiation is also turned on, since it introduces a security risk. SslOptionDisableCompression is turned on to prevent the attack publicised by CRIME. The other options are turned off.

    Note: Availability of above options depends on the version of the SSL backend in use.

    The SslOptions type is a typedef for QFlags <SslOption>. It stores an OR combination of SslOption values.

    enum QSsl:: SslProtocol

    描述密码协议。

    常量 描述
    QSsl::SslV3 0 SSLv3
    QSsl::SslV2 1 SSLv2
    QSsl::TlsV1 2 TLSv1
    QSsl::UnknownProtocol -1 The cipher's protocol cannot be determined.
    QSsl::AnyProtocol 3 The socket understands SSLv2, SSLv3, and TLSv1. This value is used by QSslSocket 仅。
    QSsl::TlsV1SslV3 4 On the client side, this will send a TLS 1.0 Client Hello, enabling TLSv1 and SSLv3 connections. On the server side, this will enable both SSLv3 and TLSv1 connections.
    QSsl::SecureProtocols 5 The default option, using protocols known to be secure; currently behaves like TlsV1SslV3.

    Note: most servers using SSL understand both versions (2 and 3), but it is recommended to use the latest version only for security reasons. However, SSL and TLS are not compatible with each other: if you get unexpected handshake failures, verify that you chose the correct setting for your protocol.