os/security/cryptoservices/certificateandkeymgmt/tcertstore/t_certstoredefs.h
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
*
sl@0
    16
*/
sl@0
    17
sl@0
    18
sl@0
    19
/**
sl@0
    20
 @file 
sl@0
    21
 @internalTechnology
sl@0
    22
*/
sl@0
    23
 
sl@0
    24
#ifndef __T_TCERTSTOREDEFS_H__
sl@0
    25
#define __T_TCERTSTOREDEFS_H__
sl@0
    26
sl@0
    27
#include <e32std.h>
sl@0
    28
#include <e32base.h>
sl@0
    29
sl@0
    30
//script file.Removed the hardcoded refernce c: from KCertStoreTestScript.
sl@0
    31
//Currently not refernced by any file.System drive to be appended when 
sl@0
    32
//KCertStoreTestScript is used.
sl@0
    33
_LIT(KCertStoreTestScript, "\\t_certstore.txt");
sl@0
    34
sl@0
    35
//output file,Removed the hardcoded refernce c: from KCertStoreOutput.
sl@0
    36
//Currently not refernced by any file.System drive to be appended when 
sl@0
    37
//KCertStoreOutput is used.
sl@0
    38
_LIT(KCertStoreOutput, "\\t_certstoreout.txt");
sl@0
    39
sl@0
    40
//action types
sl@0
    41
_LIT8(KCreateFileCertStore, "createfilecertstore");
sl@0
    42
_LIT8(KTestConcurrentCertStore, "testconcurrent");
sl@0
    43
_LIT8(KInitStore, "init");
sl@0
    44
_LIT8(KOnlyCreateStore, "onlycreate");
sl@0
    45
_LIT8(KDeleteStore, "delete");
sl@0
    46
_LIT8(KImportKey, "importkey");
sl@0
    47
_LIT8(KAddCert, "addcert");
sl@0
    48
_LIT8(KDeleteCert, "deletecert");
sl@0
    49
_LIT8(KDeleteRetrieveCACert, "deleteandretrievecacert");
sl@0
    50
_LIT8(KDeleteRetrieveUserCert, "deleteandretrieveusercert");
sl@0
    51
_LIT8(KListCert, "listcert");
sl@0
    52
_LIT8(KRetrieveCert, "retrieve");
sl@0
    53
_LIT8(KLoadUniqueCACert, "loaduniquecacert");
sl@0
    54
_LIT8(KLoadUniqueUserCert, "loaduniqueusercert");
sl@0
    55
_LIT8(KGetApplications, "getapplications");
sl@0
    56
_LIT8(KSetApplications, "setapplications");
sl@0
    57
_LIT8(KSetTruster, "settrust");
sl@0
    58
_LIT8(KGetTrusters, "gettrusters");
sl@0
    59
_LIT8(KInitAppManager, "initappmanager");
sl@0
    60
_LIT8(KDeleteAppManager, "deleteappmanager");
sl@0
    61
_LIT8(KAddClient, "addclient");
sl@0
    62
_LIT8(KGetClients, "getclients");
sl@0
    63
_LIT8(KRemoveClient, "removeclient");
sl@0
    64
_LIT8(KMemFail, "memfail");
sl@0
    65
_LIT8(KCUnifiedCertStoreGetCert, "CUnifiedCertStore GetCert");
sl@0
    66
_LIT8(KSetCapabilities, "setcapabilities");
sl@0
    67
_LIT8(KGetCapabilities, "getcapabilities");
sl@0
    68
_LIT8(KSetMandatory, "setmandatory");
sl@0
    69
_LIT8(KGetMandatory, "getmandatory");
sl@0
    70
_LIT8(KGetSystemUpgrade, "getsystemupgrade");
sl@0
    71
_LIT8(KSetDeletable, "setdeletable");
sl@0
    72
_LIT8(KGetDeletable, "getdeletable");
sl@0
    73
_LIT8(KInitSWICertStore, "initswicertstore");
sl@0
    74
_LIT8(KMultipleReaders, "multiplereaders");
sl@0
    75
sl@0
    76
// Action types for the key store
sl@0
    77
_LIT8(KUnifiedKeyStoreInit, "UnifiedKeyStore Init");
sl@0
    78
_LIT8(KUnifiedKeyStoreDelete, "UnifiedKeyStore Delete");
sl@0
    79
_LIT8(KUnifiedKeyStoreKeyStoreCount, "UnifiedKeyStore KeyStoreCount");
sl@0
    80
_LIT8(KUnifiedKeyStoreList, "UnifiedKeyStore List");
sl@0
    81
_LIT8(KCUnifiedCertStoreReadOnlyCertStoreCount, "CUnifiedCertStore ReadOnlyCertStoreCount");
sl@0
    82
_LIT8(KCUnifiedCertStoreWritableCertStoreCount, "CUnifiedCertStore WritableCertStoreCount");
sl@0
    83
_LIT8(KCUnifiedCertStoreCertStoreCount, "CUnifiedCertStore CertStoreCount");
sl@0
    84
sl@0
    85
_LIT8(KNumberOfStoresStart, "<numberofstores>");
sl@0
    86
_LIT8(KNumberOfStoresEnd, "</numberofstores>");
sl@0
    87
sl@0
    88
_LIT8(KCCTTokenTypeInfoAttributes, "CCTTokenTypeInfo Attributes");
sl@0
    89
sl@0
    90
_LIT8(KStoreIndexStart, "<storeindex>");
sl@0
    91
_LIT8(KStoreIndexEnd, "</storeindex>");
sl@0
    92
sl@0
    93
// Action types for CCTCertInfo
sl@0
    94
_LIT8(KCCTCertInfoHandle, "CCTCertInfo Handle");
sl@0
    95
_LIT8(KCTestCertForDeletable, "testcertfordeletable");
sl@0
    96
sl@0
    97
//tags
sl@0
    98
sl@0
    99
//tags for adding cert
sl@0
   100
_LIT8(KModeStart, "<mode>");
sl@0
   101
_LIT8(KModeEnd, "</mode>");
sl@0
   102
_LIT8(KCertFormatStart, "<format>");
sl@0
   103
_LIT8(KCertFormatEnd, "</format>");
sl@0
   104
_LIT8(KCertTypeStart,"<certtype>");
sl@0
   105
_LIT8(KCertTypeEnd,"</certtype>");
sl@0
   106
_LIT8(KReadOnlyStart, "<readonly>");
sl@0
   107
_LIT8(KReadOnlyEnd, "</readonly>");
sl@0
   108
_LIT8(KIssuerKeyStart, "<issuerkey>");
sl@0
   109
_LIT8(KIssuerKeyEnd, "</issuerkey>");
sl@0
   110
_LIT8(KSubjectKeyStart, "<subjectkey>");
sl@0
   111
_LIT8(KSubjectKeyEnd, "</subjectkey>");
sl@0
   112
_LIT8(KCertFileStart, "<certfile>");
sl@0
   113
_LIT8(KCertFileEnd, "</certfile>");
sl@0
   114
_LIT8(KCertOwnerTypeStart, "<certowner>");//ca or user
sl@0
   115
_LIT8(KCertOwnerTypeEnd, "</certowner>");
sl@0
   116
_LIT8(KStoreToUseStart, "<certstore>");
sl@0
   117
_LIT8(KStoreToUseEnd, "</certstore>");
sl@0
   118
_LIT8(KDeletableStart, "<deletable>");
sl@0
   119
_LIT8(KDeletableEnd, "</deletable>");
sl@0
   120
_LIT8(KSubActionStart, "<subaction>");
sl@0
   121
_LIT8(KSubActionEnd, "</subation>");
sl@0
   122
_LIT8(KTestNewCSClasswDeletable, "TestNewCSClasswDeletable");
sl@0
   123
_LIT8(KTestOldCSClasswoDeletable, "TestOldCSClasswoDeletable");
sl@0
   124
_LIT8(KTestSerialization, "TestSerialization");
sl@0
   125
_LIT8(KTrue, "True");
sl@0
   126
_LIT8(KFalse, "False");
sl@0
   127
_LIT8(KOrderingFilterStart, "<orderingfilter>");
sl@0
   128
_LIT8(KOrderingFilterEnd, "</orderingfilter>");
sl@0
   129
sl@0
   130
sl@0
   131
// tags for filter implementation
sl@0
   132
_LIT8(KFilterStart,"<filter>");
sl@0
   133
_LIT8(KFilterEnd,"</filter>");
sl@0
   134
_LIT8(KCertLabelStart, "<label>");
sl@0
   135
_LIT8(KCertLabelEnd, "</label>");
sl@0
   136
_LIT8(KUidStart,"<uid>");
sl@0
   137
_LIT8(KUidEnd,"</uid>");
sl@0
   138
_LIT8(KOwnerTypeStart,"<ownertype>");
sl@0
   139
_LIT8(KOwnerTypeEnd,"</ownertype>");
sl@0
   140
_LIT8(KKeyUsageDescStart, "<keyusagedescription>");
sl@0
   141
_LIT8(KKeyUsageDescEnd, "</keyusagedescription>");
sl@0
   142
_LIT8(KKeyUsageSchemeStart,"<keyusagescheme>");
sl@0
   143
_LIT8(KKeyUsageSchemeEnd,"</keyusagescheme>");
sl@0
   144
_LIT8(KKeyUsageStart, "<keyusage>");
sl@0
   145
_LIT8(KKeyUsageEnd, "</keyusage>");
sl@0
   146
_LIT8(KKeyTypeStart, "<keytype>");
sl@0
   147
_LIT8(KKeyTypeEnd, "</keytype>");
sl@0
   148
_LIT8(KKeyUsagePKCS,"pkcs15");
sl@0
   149
_LIT8(KKeyUsageX509,"x509");
sl@0
   150
_LIT8(KSubjectKeyIdStart,"<subjectkeyid>");
sl@0
   151
_LIT8(KSubjectKeyIdEnd,"</subjectkeyid>");
sl@0
   152
_LIT8(KIssuerKeyIdStart,"<issuerkeyid>");
sl@0
   153
_LIT8(KIssuerKeyIdEnd,"</issuerkeyid>");
sl@0
   154
_LIT8(KUseSubjectKeyIdStart,"<usesubjectkeyid>");
sl@0
   155
_LIT8(KUseSubjectKeyIdEnd,"</usesubjectkeyid>");
sl@0
   156
sl@0
   157
//  tag for Notification of Change
sl@0
   158
_LIT8(KChangeNotifiedStart, "<ChangeNotification>");
sl@0
   159
_LIT8(KChangeNotifiedEnd, "</ChangeNotification>");
sl@0
   160
sl@0
   161
//	tag for delete all certificates
sl@0
   162
_LIT8(KDeleteAllStart, "<deleteallcerts>");
sl@0
   163
_LIT8(KDeleteAllEnd, "</deleteallcerts>");
sl@0
   164
//cert owner type
sl@0
   165
_LIT8(KCACert, "ca");
sl@0
   166
_LIT8(KUserCert, "user");
sl@0
   167
_LIT8(KPeerCert, "peer");
sl@0
   168
//cert format
sl@0
   169
_LIT8(KX509, "X509");
sl@0
   170
_LIT8(KWTLS, "WTLS");
sl@0
   171
_LIT8(KX968, "X968");
sl@0
   172
_LIT8(KX509URL, "X509URL");
sl@0
   173
_LIT8(KWTLSURL, "WTLSURL");
sl@0
   174
_LIT8(KX968URL, "X968URL");
sl@0
   175
_LIT8(KUnknown, "unknown");
sl@0
   176
sl@0
   177
//tags for showing certs
sl@0
   178
_LIT8(KUIDStart, "<uid>");
sl@0
   179
_LIT8(KUIDEnd, "</uid>");
sl@0
   180
_LIT8(KFormatFlagsStart, "<formatflags>");
sl@0
   181
_LIT8(KFormatFlagsEnd, "</formatflags>");
sl@0
   182
_LIT8(KIssuerDNStart, "<issuerdn>");
sl@0
   183
_LIT8(KIssuerDNEnd, "</issuerdn>");
sl@0
   184
sl@0
   185
//tags for adding clients
sl@0
   186
_LIT8(KNameStart, "<name>");
sl@0
   187
_LIT8(KNameEnd, "</name>");
sl@0
   188
sl@0
   189
//tags for expected result
sl@0
   190
_LIT(KReturnStart, "<return>");
sl@0
   191
_LIT(KReturnEnd, "</return>");
sl@0
   192
_LIT8(KTrustersStart, "<trust>");
sl@0
   193
_LIT8(KTrustersEnd, "</trust>");
sl@0
   194
_LIT8(KOrderingResultStart, "<orderingresult>");
sl@0
   195
_LIT8(KOrderingResultEnd, "</orderingresult>");
sl@0
   196
sl@0
   197
//tags for filecertstore creation
sl@0
   198
_LIT8(KFileNameStart, "<filename>");
sl@0
   199
_LIT8(KFileNameEnd, "</filename>");
sl@0
   200
sl@0
   201
_LIT8(KTokenTypeStart, "<tokentype>");
sl@0
   202
_LIT8(KTokenTypeEnd, "</tokentype>");
sl@0
   203
_LIT8(KTokenStart, "<token>");
sl@0
   204
_LIT8(KTokenEnd, "</token>");
sl@0
   205
_LIT8(KObjectStart, "<object>");
sl@0
   206
_LIT8(KObjectEnd, "</object>");
sl@0
   207
sl@0
   208
_LIT8(KCCTCertInfoStart, "<CCTCertInfo>");
sl@0
   209
_LIT8(KCCTCertInfoEnd, "</CCTCertInfo>");
sl@0
   210
sl@0
   211
_LIT8(KMandatoryStart, "<mandatory>");
sl@0
   212
_LIT8(KMandatoryEnd, "</mandatory>");
sl@0
   213
sl@0
   214
_LIT8(KSystemUpgradeStart, "<systemupgrade>");
sl@0
   215
_LIT8(KSystemUpgradeEnd, "</systemupgrade>");
sl@0
   216
sl@0
   217
sl@0
   218
_LIT8(KDeletionStart, "<deletable>");
sl@0
   219
_LIT8(KDeletionEnd, "</deletable>");
sl@0
   220
sl@0
   221
/////////////////////
sl@0
   222
//	Keystore defs
sl@0
   223
////////////////////
sl@0
   224
// Used for generating filters based on the key usage for X509 certificate scheme
sl@0
   225
_LIT8(KAllKeyUsages, "allusages");
sl@0
   226
_LIT8(KDigitalSignature, "DigitalSignature");
sl@0
   227
_LIT8(KDS, "DS");
sl@0
   228
_LIT8(KNonRepudiation, "NonRepudiation");
sl@0
   229
_LIT8(KNR, "NR");
sl@0
   230
_LIT8(KKeyEncipherment, "KeyEncipherment");
sl@0
   231
_LIT8(KKE, "KE");
sl@0
   232
_LIT8(KDataEncipherment, "DataEncipherment");
sl@0
   233
_LIT8(KDE, "DE");
sl@0
   234
_LIT8(KKeyAgreement, "KeyAgreement");
sl@0
   235
_LIT8(KKA, "KA");
sl@0
   236
_LIT8(KKeyCertSign, "KeyCertSign");
sl@0
   237
_LIT8(KKCS, "KCS");
sl@0
   238
_LIT8(KCRLSign, "CRLSign");
sl@0
   239
_LIT8(KCRLS, "CRLS");
sl@0
   240
_LIT8(KEncipherOnly, "EncipherOnly");
sl@0
   241
_LIT8(KE, "E");
sl@0
   242
_LIT8(KDecipherOnly, "DecipherOnly");
sl@0
   243
_LIT8(KD, "D");
sl@0
   244
sl@0
   245
// Used for generating filters based on the key usage for PKCS15 scheme
sl@0
   246
_LIT8(KPublic, "public");
sl@0
   247
_LIT8(KPrivate, "private");
sl@0
   248
_LIT8(KAll, "all");
sl@0
   249
sl@0
   250
// key usage for public keys for PKCS15 scheme
sl@0
   251
_LIT8(KEncrypt, "Encrypt");
sl@0
   252
_LIT8(KVerify, "Verify");
sl@0
   253
_LIT8(KVerifyRecover, "VerifyRecover");
sl@0
   254
_LIT8(KDerive, "Derive");
sl@0
   255
_LIT8(KWrap, "Wrap");
sl@0
   256
// the last usage is for non-repudiation which has already been defined(KNonRepudiation).
sl@0
   257
sl@0
   258
// key usage for private keys for PKCS15 scheme
sl@0
   259
_LIT8(KDecrypt, "Decrypt");
sl@0
   260
_LIT8(KSign, "Sign");
sl@0
   261
_LIT8(KSignRecover, "SignRecover");
sl@0
   262
// usage for derive has already been defined (KDerived).
sl@0
   263
_LIT8(KUnwrap, "Unwrap");
sl@0
   264
// the last usage is for non-repudiation which has already been defined(KNonRepudiation).
sl@0
   265
sl@0
   266
// common combinations for private key usage
sl@0
   267
_LIT8(KSigning, "Signing");
sl@0
   268
_LIT8(KEncipherAndSign, "EncipherAndSign");
sl@0
   269
_LIT8(KAllKeyUsagesButNR, "AllUsagesButNR");
sl@0
   270
sl@0
   271
_LIT8(KDSAUsage, "DSAUsage");
sl@0
   272
sl@0
   273
sl@0
   274
sl@0
   275
_LIT8(KImportEncrypted, "<encrypted>");
sl@0
   276
_LIT8(KImportEncryptedEnd, "</encrypted>");
sl@0
   277
_LIT8(KImportDataFile, "<ImportData>");
sl@0
   278
_LIT8(KImportDataFileEnd, "</ImportData>");
sl@0
   279
_LIT8(KKeySizeStart, "<keysize>");
sl@0
   280
_LIT8(KKeySizeEnd, "</keysize>");
sl@0
   281
_LIT8(KKeyLabelStart, "<keylabel>");
sl@0
   282
_LIT8(KKeyLabelEnd, "</keylabel>");
sl@0
   283
_LIT8(KKeyAlgorithmStart, "<keyalgorithm>");
sl@0
   284
_LIT8(KKeyAlgorithmEnd, "</keyalgorithm>");
sl@0
   285
_LIT8(KKeyPassphraseStart, "<passphrase>");
sl@0
   286
_LIT8(KKeyPassphraseEnd, "</passphrase>");
sl@0
   287
_LIT8(KAlgRSA, "RSA");
sl@0
   288
_LIT8(KAlgDSA, "DSA");
sl@0
   289
_LIT8(KAlgDH, "DH");
sl@0
   290
_LIT8(KAlgBAD, "BAD");
sl@0
   291
_LIT8(KKeyExportableStart, "<keyexportable>");
sl@0
   292
_LIT8(KKeyExportableEnd, "</keyexportable>");
sl@0
   293
_LIT8(KIsExportable, "IsExportable");
sl@0
   294
_LIT8(KIsNotExportable, "IsNotExportable");
sl@0
   295
_LIT8(KKeyAccessTypeStart, "<keyaccesstype>");
sl@0
   296
_LIT8(KKeyAccessTypeEnd, "</keyaccesstype>");
sl@0
   297
_LIT8(KExtractable, "Extractable");
sl@0
   298
_LIT8(KSensitive, "Sensitive");
sl@0
   299
_LIT8(KAlwaysSensitive, "AlwaysSensitive");
sl@0
   300
_LIT8(KNeverExtractable, "NeverExtractable");
sl@0
   301
_LIT8(KLocal, "Local");
sl@0
   302
sl@0
   303
#endif