1 /*
2  * This file is part of gtkD.
3  *
4  * gtkD is free software; you can redistribute it and/or modify
5  * it under the terms of the GNU Lesser General Public License
6  * as published by the Free Software Foundation; either version 3
7  * of the License, or (at your option) any later version, with
8  * some exceptions, please read the COPYING file.
9  *
10  * gtkD is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  * GNU Lesser General Public License for more details.
14  *
15  * You should have received a copy of the GNU Lesser General Public License
16  * along with gtkD; if not, write to the Free Software
17  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110, USA
18  */
19 
20 // generated automatically - do not change
21 // find conversion definition on APILookup.txt
22 // implement new conversion functionalities on the wrap.utils pakage
23 
24 
25 module gio.TlsClientConnectionT;
26 
27 public  import gio.IOStream;
28 public  import gio.SocketConnectableIF;
29 public  import gio.c.functions;
30 public  import gio.c.types;
31 public  import glib.ConstructionException;
32 public  import glib.ErrorG;
33 public  import glib.GException;
34 public  import glib.ListG;
35 public  import gobject.ObjectG;
36 public  import gtkc.giotypes;
37 
38 
39 /**
40  * #GTlsClientConnection is the client-side subclass of
41  * #GTlsConnection, representing a client-side TLS connection.
42  *
43  * Since: 2.28
44  */
45 public template TlsClientConnectionT(TStruct)
46 {
47 	/** Get the main Gtk struct */
48 	public GTlsClientConnection* getTlsClientConnectionStruct(bool transferOwnership = false)
49 	{
50 		if (transferOwnership)
51 			ownedRef = false;
52 		return cast(GTlsClientConnection*)getStruct();
53 	}
54 
55 
56 	/**
57 	 * Copies session state from one connection to another. This is
58 	 * not normally needed, but may be used when the same session
59 	 * needs to be used between different endpoints as is required
60 	 * by some protocols such as FTP over TLS. @source should have
61 	 * already completed a handshake, and @conn should not have
62 	 * completed a handshake.
63 	 *
64 	 * Params:
65 	 *     source = a #GTlsClientConnection
66 	 *
67 	 * Since: 2.46
68 	 */
69 	public void copySessionState(TlsClientConnectionIF source)
70 	{
71 		g_tls_client_connection_copy_session_state(getTlsClientConnectionStruct(), (source is null) ? null : source.getTlsClientConnectionStruct());
72 	}
73 
74 	/**
75 	 * Gets the list of distinguished names of the Certificate Authorities
76 	 * that the server will accept certificates from. This will be set
77 	 * during the TLS handshake if the server requests a certificate.
78 	 * Otherwise, it will be %NULL.
79 	 *
80 	 * Each item in the list is a #GByteArray which contains the complete
81 	 * subject DN of the certificate authority.
82 	 *
83 	 * Returns: the list of
84 	 *     CA DNs. You should unref each element with g_byte_array_unref() and then
85 	 *     the free the list with g_list_free().
86 	 *
87 	 * Since: 2.28
88 	 */
89 	public ListG getAcceptedCas()
90 	{
91 		auto p = g_tls_client_connection_get_accepted_cas(getTlsClientConnectionStruct());
92 
93 		if(p is null)
94 		{
95 			return null;
96 		}
97 
98 		return new ListG(cast(GList*) p, true);
99 	}
100 
101 	/**
102 	 * Gets @conn's expected server identity
103 	 *
104 	 * Returns: a #GSocketConnectable describing the
105 	 *     expected server identity, or %NULL if the expected identity is not
106 	 *     known.
107 	 *
108 	 * Since: 2.28
109 	 */
110 	public SocketConnectableIF getServerIdentity()
111 	{
112 		auto p = g_tls_client_connection_get_server_identity(getTlsClientConnectionStruct());
113 
114 		if(p is null)
115 		{
116 			return null;
117 		}
118 
119 		return ObjectG.getDObject!(SocketConnectableIF)(cast(GSocketConnectable*) p);
120 	}
121 
122 	/**
123 	 * Gets whether @conn will use SSL 3.0 rather than the
124 	 * highest-supported version of TLS; see
125 	 * g_tls_client_connection_set_use_ssl3().
126 	 *
127 	 * Returns: whether @conn will use SSL 3.0
128 	 *
129 	 * Since: 2.28
130 	 */
131 	public bool getUseSsl3()
132 	{
133 		return g_tls_client_connection_get_use_ssl3(getTlsClientConnectionStruct()) != 0;
134 	}
135 
136 	/**
137 	 * Gets @conn's validation flags
138 	 *
139 	 * Returns: the validation flags
140 	 *
141 	 * Since: 2.28
142 	 */
143 	public GTlsCertificateFlags getValidationFlags()
144 	{
145 		return g_tls_client_connection_get_validation_flags(getTlsClientConnectionStruct());
146 	}
147 
148 	/**
149 	 * Sets @conn's expected server identity, which is used both to tell
150 	 * servers on virtual hosts which certificate to present, and also
151 	 * to let @conn know what name to look for in the certificate when
152 	 * performing %G_TLS_CERTIFICATE_BAD_IDENTITY validation, if enabled.
153 	 *
154 	 * Params:
155 	 *     identity = a #GSocketConnectable describing the expected server identity
156 	 *
157 	 * Since: 2.28
158 	 */
159 	public void setServerIdentity(SocketConnectableIF identity)
160 	{
161 		g_tls_client_connection_set_server_identity(getTlsClientConnectionStruct(), (identity is null) ? null : identity.getSocketConnectableStruct());
162 	}
163 
164 	/**
165 	 * If @use_ssl3 is %TRUE, this forces @conn to use SSL 3.0 rather than
166 	 * trying to properly negotiate the right version of TLS or SSL to use.
167 	 * This can be used when talking to servers that do not implement the
168 	 * fallbacks correctly and which will therefore fail to handshake with
169 	 * a "modern" TLS handshake attempt.
170 	 *
171 	 * Params:
172 	 *     useSsl3 = whether to use SSL 3.0
173 	 *
174 	 * Since: 2.28
175 	 */
176 	public void setUseSsl3(bool useSsl3)
177 	{
178 		g_tls_client_connection_set_use_ssl3(getTlsClientConnectionStruct(), useSsl3);
179 	}
180 
181 	/**
182 	 * Sets @conn's validation flags, to override the default set of
183 	 * checks performed when validating a server certificate. By default,
184 	 * %G_TLS_CERTIFICATE_VALIDATE_ALL is used.
185 	 *
186 	 * Params:
187 	 *     flags = the #GTlsCertificateFlags to use
188 	 *
189 	 * Since: 2.28
190 	 */
191 	public void setValidationFlags(GTlsCertificateFlags flags)
192 	{
193 		g_tls_client_connection_set_validation_flags(getTlsClientConnectionStruct(), flags);
194 	}
195 }