author | sl |
Tue, 10 Jun 2014 14:32:02 +0200 | |
changeset 1 | 260cb5ec6c19 |
permissions | -rw-r--r-- |
sl@0 | 1 |
/* |
sl@0 | 2 |
* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies). |
sl@0 | 3 |
* All rights reserved. |
sl@0 | 4 |
* This component and the accompanying materials are made available |
sl@0 | 5 |
* under the terms of the License "Eclipse Public License v1.0" |
sl@0 | 6 |
* which accompanies this distribution, and is available |
sl@0 | 7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html". |
sl@0 | 8 |
* |
sl@0 | 9 |
* Initial Contributors: |
sl@0 | 10 |
* Nokia Corporation - initial contribution. |
sl@0 | 11 |
* |
sl@0 | 12 |
* Contributors: |
sl@0 | 13 |
* |
sl@0 | 14 |
* Description: Defines error codes for the security subsystem. |
sl@0 | 15 |
* |
sl@0 | 16 |
* |
sl@0 | 17 |
* @file |
sl@0 | 18 |
* @publishedAll |
sl@0 | 19 |
* @released |
sl@0 | 20 |
*/ |
sl@0 | 21 |
|
sl@0 | 22 |
#ifndef __SECURITYERR_H__ |
sl@0 | 23 |
#define __SECURITYERR_H__ |
sl@0 | 24 |
|
sl@0 | 25 |
#include <e32std.h> |
sl@0 | 26 |
|
sl@0 | 27 |
|
sl@0 | 28 |
|
sl@0 | 29 |
/** |
sl@0 | 30 |
If the passphrase entered is incorrect. |
sl@0 | 31 |
**/ |
sl@0 | 32 |
const TInt KErrBadPassphrase = -11000; |
sl@0 | 33 |
|
sl@0 | 34 |
|
sl@0 | 35 |
|
sl@0 | 36 |
/** |
sl@0 | 37 |
Operation in progress or its result is not secure. |
sl@0 | 38 |
**/ |
sl@0 | 39 |
const TInt KErrNotSecure = -11001; |
sl@0 | 40 |
|
sl@0 | 41 |
|
sl@0 | 42 |
|
sl@0 | 43 |
/** |
sl@0 | 44 |
If the key size is larger than that allowed |
sl@0 | 45 |
by the cipher strength restrictions of the crypto |
sl@0 | 46 |
library. |
sl@0 | 47 |
**/ |
sl@0 | 48 |
const TInt KErrKeyNotWeakEnough = -11002; |
sl@0 | 49 |
|
sl@0 | 50 |
|
sl@0 | 51 |
|
sl@0 | 52 |
/** |
sl@0 | 53 |
Length of the padding data is invalid. |
sl@0 | 54 |
**/ |
sl@0 | 55 |
const TInt KErrInvalidPadding = -11003; |
sl@0 | 56 |
|
sl@0 | 57 |
|
sl@0 | 58 |
|
sl@0 | 59 |
/** |
sl@0 | 60 |
If the key is weaker than that allowed |
sl@0 | 61 |
by the cipher strength restrictions of the crypto |
sl@0 | 62 |
library. |
sl@0 | 63 |
**/ |
sl@0 | 64 |
const TInt KErrWeakKey = -11004; |
sl@0 | 65 |
|
sl@0 | 66 |
|
sl@0 | 67 |
|
sl@0 | 68 |
/** |
sl@0 | 69 |
If the export of negative values is not |
sl@0 | 70 |
supported. |
sl@0 | 71 |
**/ |
sl@0 | 72 |
const TInt KErrNegativeExportNotSupported = -11005; |
sl@0 | 73 |
|
sl@0 | 74 |
|
sl@0 | 75 |
|
sl@0 | 76 |
/** |
sl@0 | 77 |
If the requested key generation algorithm is not |
sl@0 | 78 |
supported. |
sl@0 | 79 |
**/ |
sl@0 | 80 |
const TInt KErrKeyAlgorithm = -11006; |
sl@0 | 81 |
|
sl@0 | 82 |
|
sl@0 | 83 |
|
sl@0 | 84 |
/** |
sl@0 | 85 |
If the key usage flags are not valid or not |
sl@0 | 86 |
consistent with the key algorithm. |
sl@0 | 87 |
**/ |
sl@0 | 88 |
const TInt KErrKeyUsage = -11007; |
sl@0 | 89 |
|
sl@0 | 90 |
|
sl@0 | 91 |
|
sl@0 | 92 |
/** |
sl@0 | 93 |
If a validity period is specified during key generation, |
sl@0 | 94 |
but the end date is in the past. |
sl@0 | 95 |
**/ |
sl@0 | 96 |
const TInt KErrKeyValidity = -11008; |
sl@0 | 97 |
|
sl@0 | 98 |
|
sl@0 | 99 |
|
sl@0 | 100 |
/** |
sl@0 | 101 |
If the requested key size is not supported. |
sl@0 | 102 |
**/ |
sl@0 | 103 |
const TInt KErrKeySize = -11009; |
sl@0 | 104 |
|
sl@0 | 105 |
|
sl@0 | 106 |
|
sl@0 | 107 |
/** |
sl@0 | 108 |
If an invalid combination of key access |
sl@0 | 109 |
flags were specified. |
sl@0 | 110 |
**/ |
sl@0 | 111 |
const TInt KErrKeyAccess = -11010; |
sl@0 | 112 |
|
sl@0 | 113 |
|
sl@0 | 114 |
|
sl@0 | 115 |
/** |
sl@0 | 116 |
If the requested private key is not present. |
sl@0 | 117 |
**/ |
sl@0 | 118 |
const TInt KErrPrivateKeyNotFound = -11011; |
sl@0 | 119 |
|
sl@0 | 120 |
|
sl@0 | 121 |
|
sl@0 | 122 |
/** |
sl@0 | 123 |
If a setting in the repository is not found. |
sl@0 | 124 |
**/ |
sl@0 | 125 |
const TInt KErrSettingNotFound = -11012; |
sl@0 | 126 |
|
sl@0 | 127 |
#endif // __SECURITYERR_H__ |