sl@0
|
1 |
/*
|
sl@0
|
2 |
* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
3 |
* All rights reserved.
|
sl@0
|
4 |
* This component and the accompanying materials are made available
|
sl@0
|
5 |
* under the terms of the License "Eclipse Public License v1.0"
|
sl@0
|
6 |
* which accompanies this distribution, and is available
|
sl@0
|
7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
8 |
*
|
sl@0
|
9 |
* Initial Contributors:
|
sl@0
|
10 |
* Nokia Corporation - initial contribution.
|
sl@0
|
11 |
*
|
sl@0
|
12 |
* Contributors:
|
sl@0
|
13 |
*
|
sl@0
|
14 |
* Description:
|
sl@0
|
15 |
*
|
sl@0
|
16 |
*/
|
sl@0
|
17 |
|
sl@0
|
18 |
|
sl@0
|
19 |
/**
|
sl@0
|
20 |
@file
|
sl@0
|
21 |
@internalTechnology
|
sl@0
|
22 |
*/
|
sl@0
|
23 |
|
sl@0
|
24 |
#ifndef __T_TCERTSTOREDEFS_H__
|
sl@0
|
25 |
#define __T_TCERTSTOREDEFS_H__
|
sl@0
|
26 |
|
sl@0
|
27 |
#include <e32std.h>
|
sl@0
|
28 |
#include <e32base.h>
|
sl@0
|
29 |
|
sl@0
|
30 |
//script file.Removed the hardcoded refernce c: from KCertStoreTestScript.
|
sl@0
|
31 |
//Currently not refernced by any file.System drive to be appended when
|
sl@0
|
32 |
//KCertStoreTestScript is used.
|
sl@0
|
33 |
_LIT(KCertStoreTestScript, "\\t_certstore.txt");
|
sl@0
|
34 |
|
sl@0
|
35 |
//output file,Removed the hardcoded refernce c: from KCertStoreOutput.
|
sl@0
|
36 |
//Currently not refernced by any file.System drive to be appended when
|
sl@0
|
37 |
//KCertStoreOutput is used.
|
sl@0
|
38 |
_LIT(KCertStoreOutput, "\\t_certstoreout.txt");
|
sl@0
|
39 |
|
sl@0
|
40 |
//action types
|
sl@0
|
41 |
_LIT8(KCreateFileCertStore, "createfilecertstore");
|
sl@0
|
42 |
_LIT8(KTestConcurrentCertStore, "testconcurrent");
|
sl@0
|
43 |
_LIT8(KInitStore, "init");
|
sl@0
|
44 |
_LIT8(KOnlyCreateStore, "onlycreate");
|
sl@0
|
45 |
_LIT8(KDeleteStore, "delete");
|
sl@0
|
46 |
_LIT8(KImportKey, "importkey");
|
sl@0
|
47 |
_LIT8(KAddCert, "addcert");
|
sl@0
|
48 |
_LIT8(KDeleteCert, "deletecert");
|
sl@0
|
49 |
_LIT8(KDeleteRetrieveCACert, "deleteandretrievecacert");
|
sl@0
|
50 |
_LIT8(KDeleteRetrieveUserCert, "deleteandretrieveusercert");
|
sl@0
|
51 |
_LIT8(KListCert, "listcert");
|
sl@0
|
52 |
_LIT8(KRetrieveCert, "retrieve");
|
sl@0
|
53 |
_LIT8(KLoadUniqueCACert, "loaduniquecacert");
|
sl@0
|
54 |
_LIT8(KLoadUniqueUserCert, "loaduniqueusercert");
|
sl@0
|
55 |
_LIT8(KGetApplications, "getapplications");
|
sl@0
|
56 |
_LIT8(KSetApplications, "setapplications");
|
sl@0
|
57 |
_LIT8(KSetTruster, "settrust");
|
sl@0
|
58 |
_LIT8(KGetTrusters, "gettrusters");
|
sl@0
|
59 |
_LIT8(KInitAppManager, "initappmanager");
|
sl@0
|
60 |
_LIT8(KDeleteAppManager, "deleteappmanager");
|
sl@0
|
61 |
_LIT8(KAddClient, "addclient");
|
sl@0
|
62 |
_LIT8(KGetClients, "getclients");
|
sl@0
|
63 |
_LIT8(KRemoveClient, "removeclient");
|
sl@0
|
64 |
_LIT8(KMemFail, "memfail");
|
sl@0
|
65 |
_LIT8(KCUnifiedCertStoreGetCert, "CUnifiedCertStore GetCert");
|
sl@0
|
66 |
_LIT8(KSetCapabilities, "setcapabilities");
|
sl@0
|
67 |
_LIT8(KGetCapabilities, "getcapabilities");
|
sl@0
|
68 |
_LIT8(KSetMandatory, "setmandatory");
|
sl@0
|
69 |
_LIT8(KGetMandatory, "getmandatory");
|
sl@0
|
70 |
_LIT8(KGetSystemUpgrade, "getsystemupgrade");
|
sl@0
|
71 |
_LIT8(KSetDeletable, "setdeletable");
|
sl@0
|
72 |
_LIT8(KGetDeletable, "getdeletable");
|
sl@0
|
73 |
_LIT8(KInitSWICertStore, "initswicertstore");
|
sl@0
|
74 |
_LIT8(KMultipleReaders, "multiplereaders");
|
sl@0
|
75 |
|
sl@0
|
76 |
// Action types for the key store
|
sl@0
|
77 |
_LIT8(KUnifiedKeyStoreInit, "UnifiedKeyStore Init");
|
sl@0
|
78 |
_LIT8(KUnifiedKeyStoreDelete, "UnifiedKeyStore Delete");
|
sl@0
|
79 |
_LIT8(KUnifiedKeyStoreKeyStoreCount, "UnifiedKeyStore KeyStoreCount");
|
sl@0
|
80 |
_LIT8(KUnifiedKeyStoreList, "UnifiedKeyStore List");
|
sl@0
|
81 |
_LIT8(KCUnifiedCertStoreReadOnlyCertStoreCount, "CUnifiedCertStore ReadOnlyCertStoreCount");
|
sl@0
|
82 |
_LIT8(KCUnifiedCertStoreWritableCertStoreCount, "CUnifiedCertStore WritableCertStoreCount");
|
sl@0
|
83 |
_LIT8(KCUnifiedCertStoreCertStoreCount, "CUnifiedCertStore CertStoreCount");
|
sl@0
|
84 |
|
sl@0
|
85 |
_LIT8(KNumberOfStoresStart, "<numberofstores>");
|
sl@0
|
86 |
_LIT8(KNumberOfStoresEnd, "</numberofstores>");
|
sl@0
|
87 |
|
sl@0
|
88 |
_LIT8(KCCTTokenTypeInfoAttributes, "CCTTokenTypeInfo Attributes");
|
sl@0
|
89 |
|
sl@0
|
90 |
_LIT8(KStoreIndexStart, "<storeindex>");
|
sl@0
|
91 |
_LIT8(KStoreIndexEnd, "</storeindex>");
|
sl@0
|
92 |
|
sl@0
|
93 |
// Action types for CCTCertInfo
|
sl@0
|
94 |
_LIT8(KCCTCertInfoHandle, "CCTCertInfo Handle");
|
sl@0
|
95 |
_LIT8(KCTestCertForDeletable, "testcertfordeletable");
|
sl@0
|
96 |
|
sl@0
|
97 |
//tags
|
sl@0
|
98 |
|
sl@0
|
99 |
//tags for adding cert
|
sl@0
|
100 |
_LIT8(KModeStart, "<mode>");
|
sl@0
|
101 |
_LIT8(KModeEnd, "</mode>");
|
sl@0
|
102 |
_LIT8(KCertFormatStart, "<format>");
|
sl@0
|
103 |
_LIT8(KCertFormatEnd, "</format>");
|
sl@0
|
104 |
_LIT8(KCertTypeStart,"<certtype>");
|
sl@0
|
105 |
_LIT8(KCertTypeEnd,"</certtype>");
|
sl@0
|
106 |
_LIT8(KReadOnlyStart, "<readonly>");
|
sl@0
|
107 |
_LIT8(KReadOnlyEnd, "</readonly>");
|
sl@0
|
108 |
_LIT8(KIssuerKeyStart, "<issuerkey>");
|
sl@0
|
109 |
_LIT8(KIssuerKeyEnd, "</issuerkey>");
|
sl@0
|
110 |
_LIT8(KSubjectKeyStart, "<subjectkey>");
|
sl@0
|
111 |
_LIT8(KSubjectKeyEnd, "</subjectkey>");
|
sl@0
|
112 |
_LIT8(KCertFileStart, "<certfile>");
|
sl@0
|
113 |
_LIT8(KCertFileEnd, "</certfile>");
|
sl@0
|
114 |
_LIT8(KCertOwnerTypeStart, "<certowner>");//ca or user
|
sl@0
|
115 |
_LIT8(KCertOwnerTypeEnd, "</certowner>");
|
sl@0
|
116 |
_LIT8(KStoreToUseStart, "<certstore>");
|
sl@0
|
117 |
_LIT8(KStoreToUseEnd, "</certstore>");
|
sl@0
|
118 |
_LIT8(KDeletableStart, "<deletable>");
|
sl@0
|
119 |
_LIT8(KDeletableEnd, "</deletable>");
|
sl@0
|
120 |
_LIT8(KSubActionStart, "<subaction>");
|
sl@0
|
121 |
_LIT8(KSubActionEnd, "</subation>");
|
sl@0
|
122 |
_LIT8(KTestNewCSClasswDeletable, "TestNewCSClasswDeletable");
|
sl@0
|
123 |
_LIT8(KTestOldCSClasswoDeletable, "TestOldCSClasswoDeletable");
|
sl@0
|
124 |
_LIT8(KTestSerialization, "TestSerialization");
|
sl@0
|
125 |
_LIT8(KTrue, "True");
|
sl@0
|
126 |
_LIT8(KFalse, "False");
|
sl@0
|
127 |
_LIT8(KOrderingFilterStart, "<orderingfilter>");
|
sl@0
|
128 |
_LIT8(KOrderingFilterEnd, "</orderingfilter>");
|
sl@0
|
129 |
|
sl@0
|
130 |
|
sl@0
|
131 |
// tags for filter implementation
|
sl@0
|
132 |
_LIT8(KFilterStart,"<filter>");
|
sl@0
|
133 |
_LIT8(KFilterEnd,"</filter>");
|
sl@0
|
134 |
_LIT8(KCertLabelStart, "<label>");
|
sl@0
|
135 |
_LIT8(KCertLabelEnd, "</label>");
|
sl@0
|
136 |
_LIT8(KUidStart,"<uid>");
|
sl@0
|
137 |
_LIT8(KUidEnd,"</uid>");
|
sl@0
|
138 |
_LIT8(KOwnerTypeStart,"<ownertype>");
|
sl@0
|
139 |
_LIT8(KOwnerTypeEnd,"</ownertype>");
|
sl@0
|
140 |
_LIT8(KKeyUsageDescStart, "<keyusagedescription>");
|
sl@0
|
141 |
_LIT8(KKeyUsageDescEnd, "</keyusagedescription>");
|
sl@0
|
142 |
_LIT8(KKeyUsageSchemeStart,"<keyusagescheme>");
|
sl@0
|
143 |
_LIT8(KKeyUsageSchemeEnd,"</keyusagescheme>");
|
sl@0
|
144 |
_LIT8(KKeyUsageStart, "<keyusage>");
|
sl@0
|
145 |
_LIT8(KKeyUsageEnd, "</keyusage>");
|
sl@0
|
146 |
_LIT8(KKeyTypeStart, "<keytype>");
|
sl@0
|
147 |
_LIT8(KKeyTypeEnd, "</keytype>");
|
sl@0
|
148 |
_LIT8(KKeyUsagePKCS,"pkcs15");
|
sl@0
|
149 |
_LIT8(KKeyUsageX509,"x509");
|
sl@0
|
150 |
_LIT8(KSubjectKeyIdStart,"<subjectkeyid>");
|
sl@0
|
151 |
_LIT8(KSubjectKeyIdEnd,"</subjectkeyid>");
|
sl@0
|
152 |
_LIT8(KIssuerKeyIdStart,"<issuerkeyid>");
|
sl@0
|
153 |
_LIT8(KIssuerKeyIdEnd,"</issuerkeyid>");
|
sl@0
|
154 |
_LIT8(KUseSubjectKeyIdStart,"<usesubjectkeyid>");
|
sl@0
|
155 |
_LIT8(KUseSubjectKeyIdEnd,"</usesubjectkeyid>");
|
sl@0
|
156 |
|
sl@0
|
157 |
// tag for Notification of Change
|
sl@0
|
158 |
_LIT8(KChangeNotifiedStart, "<ChangeNotification>");
|
sl@0
|
159 |
_LIT8(KChangeNotifiedEnd, "</ChangeNotification>");
|
sl@0
|
160 |
|
sl@0
|
161 |
// tag for delete all certificates
|
sl@0
|
162 |
_LIT8(KDeleteAllStart, "<deleteallcerts>");
|
sl@0
|
163 |
_LIT8(KDeleteAllEnd, "</deleteallcerts>");
|
sl@0
|
164 |
//cert owner type
|
sl@0
|
165 |
_LIT8(KCACert, "ca");
|
sl@0
|
166 |
_LIT8(KUserCert, "user");
|
sl@0
|
167 |
_LIT8(KPeerCert, "peer");
|
sl@0
|
168 |
//cert format
|
sl@0
|
169 |
_LIT8(KX509, "X509");
|
sl@0
|
170 |
_LIT8(KWTLS, "WTLS");
|
sl@0
|
171 |
_LIT8(KX968, "X968");
|
sl@0
|
172 |
_LIT8(KX509URL, "X509URL");
|
sl@0
|
173 |
_LIT8(KWTLSURL, "WTLSURL");
|
sl@0
|
174 |
_LIT8(KX968URL, "X968URL");
|
sl@0
|
175 |
_LIT8(KUnknown, "unknown");
|
sl@0
|
176 |
|
sl@0
|
177 |
//tags for showing certs
|
sl@0
|
178 |
_LIT8(KUIDStart, "<uid>");
|
sl@0
|
179 |
_LIT8(KUIDEnd, "</uid>");
|
sl@0
|
180 |
_LIT8(KFormatFlagsStart, "<formatflags>");
|
sl@0
|
181 |
_LIT8(KFormatFlagsEnd, "</formatflags>");
|
sl@0
|
182 |
_LIT8(KIssuerDNStart, "<issuerdn>");
|
sl@0
|
183 |
_LIT8(KIssuerDNEnd, "</issuerdn>");
|
sl@0
|
184 |
|
sl@0
|
185 |
//tags for adding clients
|
sl@0
|
186 |
_LIT8(KNameStart, "<name>");
|
sl@0
|
187 |
_LIT8(KNameEnd, "</name>");
|
sl@0
|
188 |
|
sl@0
|
189 |
//tags for expected result
|
sl@0
|
190 |
_LIT(KReturnStart, "<return>");
|
sl@0
|
191 |
_LIT(KReturnEnd, "</return>");
|
sl@0
|
192 |
_LIT8(KTrustersStart, "<trust>");
|
sl@0
|
193 |
_LIT8(KTrustersEnd, "</trust>");
|
sl@0
|
194 |
_LIT8(KOrderingResultStart, "<orderingresult>");
|
sl@0
|
195 |
_LIT8(KOrderingResultEnd, "</orderingresult>");
|
sl@0
|
196 |
|
sl@0
|
197 |
//tags for filecertstore creation
|
sl@0
|
198 |
_LIT8(KFileNameStart, "<filename>");
|
sl@0
|
199 |
_LIT8(KFileNameEnd, "</filename>");
|
sl@0
|
200 |
|
sl@0
|
201 |
_LIT8(KTokenTypeStart, "<tokentype>");
|
sl@0
|
202 |
_LIT8(KTokenTypeEnd, "</tokentype>");
|
sl@0
|
203 |
_LIT8(KTokenStart, "<token>");
|
sl@0
|
204 |
_LIT8(KTokenEnd, "</token>");
|
sl@0
|
205 |
_LIT8(KObjectStart, "<object>");
|
sl@0
|
206 |
_LIT8(KObjectEnd, "</object>");
|
sl@0
|
207 |
|
sl@0
|
208 |
_LIT8(KCCTCertInfoStart, "<CCTCertInfo>");
|
sl@0
|
209 |
_LIT8(KCCTCertInfoEnd, "</CCTCertInfo>");
|
sl@0
|
210 |
|
sl@0
|
211 |
_LIT8(KMandatoryStart, "<mandatory>");
|
sl@0
|
212 |
_LIT8(KMandatoryEnd, "</mandatory>");
|
sl@0
|
213 |
|
sl@0
|
214 |
_LIT8(KSystemUpgradeStart, "<systemupgrade>");
|
sl@0
|
215 |
_LIT8(KSystemUpgradeEnd, "</systemupgrade>");
|
sl@0
|
216 |
|
sl@0
|
217 |
|
sl@0
|
218 |
_LIT8(KDeletionStart, "<deletable>");
|
sl@0
|
219 |
_LIT8(KDeletionEnd, "</deletable>");
|
sl@0
|
220 |
|
sl@0
|
221 |
/////////////////////
|
sl@0
|
222 |
// Keystore defs
|
sl@0
|
223 |
////////////////////
|
sl@0
|
224 |
// Used for generating filters based on the key usage for X509 certificate scheme
|
sl@0
|
225 |
_LIT8(KAllKeyUsages, "allusages");
|
sl@0
|
226 |
_LIT8(KDigitalSignature, "DigitalSignature");
|
sl@0
|
227 |
_LIT8(KDS, "DS");
|
sl@0
|
228 |
_LIT8(KNonRepudiation, "NonRepudiation");
|
sl@0
|
229 |
_LIT8(KNR, "NR");
|
sl@0
|
230 |
_LIT8(KKeyEncipherment, "KeyEncipherment");
|
sl@0
|
231 |
_LIT8(KKE, "KE");
|
sl@0
|
232 |
_LIT8(KDataEncipherment, "DataEncipherment");
|
sl@0
|
233 |
_LIT8(KDE, "DE");
|
sl@0
|
234 |
_LIT8(KKeyAgreement, "KeyAgreement");
|
sl@0
|
235 |
_LIT8(KKA, "KA");
|
sl@0
|
236 |
_LIT8(KKeyCertSign, "KeyCertSign");
|
sl@0
|
237 |
_LIT8(KKCS, "KCS");
|
sl@0
|
238 |
_LIT8(KCRLSign, "CRLSign");
|
sl@0
|
239 |
_LIT8(KCRLS, "CRLS");
|
sl@0
|
240 |
_LIT8(KEncipherOnly, "EncipherOnly");
|
sl@0
|
241 |
_LIT8(KE, "E");
|
sl@0
|
242 |
_LIT8(KDecipherOnly, "DecipherOnly");
|
sl@0
|
243 |
_LIT8(KD, "D");
|
sl@0
|
244 |
|
sl@0
|
245 |
// Used for generating filters based on the key usage for PKCS15 scheme
|
sl@0
|
246 |
_LIT8(KPublic, "public");
|
sl@0
|
247 |
_LIT8(KPrivate, "private");
|
sl@0
|
248 |
_LIT8(KAll, "all");
|
sl@0
|
249 |
|
sl@0
|
250 |
// key usage for public keys for PKCS15 scheme
|
sl@0
|
251 |
_LIT8(KEncrypt, "Encrypt");
|
sl@0
|
252 |
_LIT8(KVerify, "Verify");
|
sl@0
|
253 |
_LIT8(KVerifyRecover, "VerifyRecover");
|
sl@0
|
254 |
_LIT8(KDerive, "Derive");
|
sl@0
|
255 |
_LIT8(KWrap, "Wrap");
|
sl@0
|
256 |
// the last usage is for non-repudiation which has already been defined(KNonRepudiation).
|
sl@0
|
257 |
|
sl@0
|
258 |
// key usage for private keys for PKCS15 scheme
|
sl@0
|
259 |
_LIT8(KDecrypt, "Decrypt");
|
sl@0
|
260 |
_LIT8(KSign, "Sign");
|
sl@0
|
261 |
_LIT8(KSignRecover, "SignRecover");
|
sl@0
|
262 |
// usage for derive has already been defined (KDerived).
|
sl@0
|
263 |
_LIT8(KUnwrap, "Unwrap");
|
sl@0
|
264 |
// the last usage is for non-repudiation which has already been defined(KNonRepudiation).
|
sl@0
|
265 |
|
sl@0
|
266 |
// common combinations for private key usage
|
sl@0
|
267 |
_LIT8(KSigning, "Signing");
|
sl@0
|
268 |
_LIT8(KEncipherAndSign, "EncipherAndSign");
|
sl@0
|
269 |
_LIT8(KAllKeyUsagesButNR, "AllUsagesButNR");
|
sl@0
|
270 |
|
sl@0
|
271 |
_LIT8(KDSAUsage, "DSAUsage");
|
sl@0
|
272 |
|
sl@0
|
273 |
|
sl@0
|
274 |
|
sl@0
|
275 |
_LIT8(KImportEncrypted, "<encrypted>");
|
sl@0
|
276 |
_LIT8(KImportEncryptedEnd, "</encrypted>");
|
sl@0
|
277 |
_LIT8(KImportDataFile, "<ImportData>");
|
sl@0
|
278 |
_LIT8(KImportDataFileEnd, "</ImportData>");
|
sl@0
|
279 |
_LIT8(KKeySizeStart, "<keysize>");
|
sl@0
|
280 |
_LIT8(KKeySizeEnd, "</keysize>");
|
sl@0
|
281 |
_LIT8(KKeyLabelStart, "<keylabel>");
|
sl@0
|
282 |
_LIT8(KKeyLabelEnd, "</keylabel>");
|
sl@0
|
283 |
_LIT8(KKeyAlgorithmStart, "<keyalgorithm>");
|
sl@0
|
284 |
_LIT8(KKeyAlgorithmEnd, "</keyalgorithm>");
|
sl@0
|
285 |
_LIT8(KKeyPassphraseStart, "<passphrase>");
|
sl@0
|
286 |
_LIT8(KKeyPassphraseEnd, "</passphrase>");
|
sl@0
|
287 |
_LIT8(KAlgRSA, "RSA");
|
sl@0
|
288 |
_LIT8(KAlgDSA, "DSA");
|
sl@0
|
289 |
_LIT8(KAlgDH, "DH");
|
sl@0
|
290 |
_LIT8(KAlgBAD, "BAD");
|
sl@0
|
291 |
_LIT8(KKeyExportableStart, "<keyexportable>");
|
sl@0
|
292 |
_LIT8(KKeyExportableEnd, "</keyexportable>");
|
sl@0
|
293 |
_LIT8(KIsExportable, "IsExportable");
|
sl@0
|
294 |
_LIT8(KIsNotExportable, "IsNotExportable");
|
sl@0
|
295 |
_LIT8(KKeyAccessTypeStart, "<keyaccesstype>");
|
sl@0
|
296 |
_LIT8(KKeyAccessTypeEnd, "</keyaccesstype>");
|
sl@0
|
297 |
_LIT8(KExtractable, "Extractable");
|
sl@0
|
298 |
_LIT8(KSensitive, "Sensitive");
|
sl@0
|
299 |
_LIT8(KAlwaysSensitive, "AlwaysSensitive");
|
sl@0
|
300 |
_LIT8(KNeverExtractable, "NeverExtractable");
|
sl@0
|
301 |
_LIT8(KLocal, "Local");
|
sl@0
|
302 |
|
sl@0
|
303 |
#endif
|