OLD | NEW |
1 /* ***** BEGIN LICENSE BLOCK ***** | 1 /* ***** BEGIN LICENSE BLOCK ***** |
2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
3 * | 3 * |
4 * The contents of this file are subject to the Mozilla Public License Version | 4 * The contents of this file are subject to the Mozilla Public License Version |
5 * 1.1 (the "License"); you may not use this file except in compliance with | 5 * 1.1 (the "License"); you may not use this file except in compliance with |
6 * the License. You may obtain a copy of the License at | 6 * the License. You may obtain a copy of the License at |
7 * http://www.mozilla.org/MPL/ | 7 * http://www.mozilla.org/MPL/ |
8 * | 8 * |
9 * Software distributed under the License is distributed on an "AS IS" basis, | 9 * Software distributed under the License is distributed on an "AS IS" basis, |
10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License | 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License |
(...skipping 216 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
227 CONST_OID desede[] = { ALGORITHM, 0x11 }; | 227 CONST_OID desede[] = { ALGORITHM, 0x11 }; |
228 CONST_OID sha1[] = { ALGORITHM, 0x1a }; | 228 CONST_OID sha1[] = { ALGORITHM, 0x1a }; |
229 CONST_OID bogusDSASignaturewithSHA1Digest[] = { ALGORITHM, 0x1b }; | 229 CONST_OID bogusDSASignaturewithSHA1Digest[] = { ALGORITHM, 0x1b }; |
230 CONST_OID isoSHA1WithRSASignature[] = { ALGORITHM, 0x1d }; | 230 CONST_OID isoSHA1WithRSASignature[] = { ALGORITHM, 0x1d }; |
231 | 231 |
232 CONST_OID pkcs1RSAEncryption[] = { PKCS1, 0x01 }; | 232 CONST_OID pkcs1RSAEncryption[] = { PKCS1, 0x01 }; |
233 CONST_OID pkcs1MD2WithRSAEncryption[] = { PKCS1, 0x02 }; | 233 CONST_OID pkcs1MD2WithRSAEncryption[] = { PKCS1, 0x02 }; |
234 CONST_OID pkcs1MD4WithRSAEncryption[] = { PKCS1, 0x03 }; | 234 CONST_OID pkcs1MD4WithRSAEncryption[] = { PKCS1, 0x03 }; |
235 CONST_OID pkcs1MD5WithRSAEncryption[] = { PKCS1, 0x04 }; | 235 CONST_OID pkcs1MD5WithRSAEncryption[] = { PKCS1, 0x04 }; |
236 CONST_OID pkcs1SHA1WithRSAEncryption[] = { PKCS1, 0x05 }; | 236 CONST_OID pkcs1SHA1WithRSAEncryption[] = { PKCS1, 0x05 }; |
| 237 CONST_OID pkcs1RSAOAEPEncryption[] = { PKCS1, 0x07 }; |
| 238 CONST_OID pkcs1MGF1[] = { PKCS1, 0x08 }; |
| 239 CONST_OID pkcs1PSpecified[] = { PKCS1, 0x09 }; |
| 240 CONST_OID pkcs1RSAPSSSignature[] = { PKCS1, 10 }; |
237 CONST_OID pkcs1SHA256WithRSAEncryption[] = { PKCS1, 11 }; | 241 CONST_OID pkcs1SHA256WithRSAEncryption[] = { PKCS1, 11 }; |
238 CONST_OID pkcs1SHA384WithRSAEncryption[] = { PKCS1, 12 }; | 242 CONST_OID pkcs1SHA384WithRSAEncryption[] = { PKCS1, 12 }; |
239 CONST_OID pkcs1SHA512WithRSAEncryption[] = { PKCS1, 13 }; | 243 CONST_OID pkcs1SHA512WithRSAEncryption[] = { PKCS1, 13 }; |
| 244 CONST_OID pkcs1SHA224WithRSAEncryption[] = { PKCS1, 14 }; |
240 | 245 |
241 CONST_OID pkcs5PbeWithMD2AndDEScbc[] = { PKCS5, 0x01 }; | 246 CONST_OID pkcs5PbeWithMD2AndDEScbc[] = { PKCS5, 0x01 }; |
242 CONST_OID pkcs5PbeWithMD5AndDEScbc[] = { PKCS5, 0x03 }; | 247 CONST_OID pkcs5PbeWithMD5AndDEScbc[] = { PKCS5, 0x03 }; |
243 CONST_OID pkcs5PbeWithSha1AndDEScbc[] = { PKCS5, 0x0a }; | 248 CONST_OID pkcs5PbeWithSha1AndDEScbc[] = { PKCS5, 0x0a }; |
244 CONST_OID pkcs5Pbkdf2[] = { PKCS5, 12 }; | 249 CONST_OID pkcs5Pbkdf2[] = { PKCS5, 12 }; |
245 CONST_OID pkcs5Pbes2[] = { PKCS5, 13 }; | 250 CONST_OID pkcs5Pbes2[] = { PKCS5, 13 }; |
246 CONST_OID pkcs5Pbmac1[] = { PKCS5, 14 }; | 251 CONST_OID pkcs5Pbmac1[] = { PKCS5, 14 }; |
247 | 252 |
248 CONST_OID pkcs7[] = { PKCS7 }; | 253 CONST_OID pkcs7[] = { PKCS7 }; |
249 CONST_OID pkcs7Data[] = { PKCS7, 0x01 }; | 254 CONST_OID pkcs7Data[] = { PKCS7, 0x01 }; |
(...skipping 1353 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1603 OD( isoSHA1WithRSASignature, SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE, | 1608 OD( isoSHA1WithRSASignature, SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE, |
1604 "ISO SHA-1 with RSA Signature", | 1609 "ISO SHA-1 with RSA Signature", |
1605 CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION ), | 1610 CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION ), |
1606 | 1611 |
1607 /* SEED algorithm OIDs */ | 1612 /* SEED algorithm OIDs */ |
1608 OD( seed_CBC, SEC_OID_SEED_CBC, | 1613 OD( seed_CBC, SEC_OID_SEED_CBC, |
1609 "SEED-CBC", CKM_SEED_CBC, INVALID_CERT_EXTENSION), | 1614 "SEED-CBC", CKM_SEED_CBC, INVALID_CERT_EXTENSION), |
1610 | 1615 |
1611 OD( x509CertificatePoliciesAnyPolicy, SEC_OID_X509_ANY_POLICY, | 1616 OD( x509CertificatePoliciesAnyPolicy, SEC_OID_X509_ANY_POLICY, |
1612 "Certificate Policies AnyPolicy", | 1617 "Certificate Policies AnyPolicy", |
1613 CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION ), | 1618 CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION ), |
| 1619 |
| 1620 OD( pkcs1RSAOAEPEncryption, SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION, |
| 1621 » "PKCS #1 RSA-OAEP Encryption", CKM_RSA_PKCS_OAEP, |
| 1622 » INVALID_CERT_EXTENSION ), |
| 1623 |
| 1624 OD( pkcs1MGF1, SEC_OID_PKCS1_MGF1, |
| 1625 » "PKCS #1 MGF1 Mask Generation Function", CKM_INVALID_MECHANISM, |
| 1626 » INVALID_CERT_EXTENSION ), |
| 1627 |
| 1628 OD( pkcs1PSpecified, SEC_OID_PKCS1_PSPECIFIED, |
| 1629 » "PKCS #1 RSA-OAEP Explicitly Specified Encoding Parameters", |
| 1630 » CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION ), |
| 1631 |
| 1632 OD( pkcs1RSAPSSSignature, SEC_OID_PKCS1_RSA_PSS_SIGNATURE, |
| 1633 » "PKCS #1 RSA-PSS Signature", CKM_RSA_PKCS_PSS, |
| 1634 » INVALID_CERT_EXTENSION ), |
| 1635 |
| 1636 OD( pkcs1SHA224WithRSAEncryption, SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION, |
| 1637 » "PKCS #1 SHA-224 With RSA Encryption", CKM_SHA224_RSA_PKCS, |
| 1638 » INVALID_CERT_EXTENSION ), |
1614 }; | 1639 }; |
1615 | 1640 |
1616 /* PRIVATE EXTENDED SECOID Table | 1641 /* PRIVATE EXTENDED SECOID Table |
1617 * This table is private. Its structure is opaque to the outside. | 1642 * This table is private. Its structure is opaque to the outside. |
1618 * It is indexed by the same SECOidTag as the oids table above. | 1643 * It is indexed by the same SECOidTag as the oids table above. |
1619 * Every member of this struct must have accessor functions (set, get) | 1644 * Every member of this struct must have accessor functions (set, get) |
1620 * and those functions must operate by value, not by reference. | 1645 * and those functions must operate by value, not by reference. |
1621 * The addresses of the contents of this table must not be exposed | 1646 * The addresses of the contents of this table must not be exposed |
1622 * by the accessor functions. | 1647 * by the accessor functions. |
1623 */ | 1648 */ |
(...skipping 519 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2143 memset(xOids, 0, sizeof xOids); | 2168 memset(xOids, 0, sizeof xOids); |
2144 return SECSuccess; | 2169 return SECSuccess; |
2145 } | 2170 } |
2146 | 2171 |
2147 void UTIL_SetForkState(PRBool forked) | 2172 void UTIL_SetForkState(PRBool forked) |
2148 { | 2173 { |
2149 parentForkedAfterC_Initialize = forked; | 2174 parentForkedAfterC_Initialize = forked; |
2150 } | 2175 } |
2151 | 2176 |
2152 | 2177 |
OLD | NEW |