OLD | NEW |
1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 /* | 4 /* |
5 * certt.h - public data structures for the certificate library | 5 * certt.h - public data structures for the certificate library |
6 * | 6 * |
7 * $Id: certt.h,v 1.57 2012/09/28 23:40:14 rrelyea%redhat.com Exp $ | 7 * $Id: certt.h,v 1.58 2013/01/07 03:56:12 ryan.sleevi%gmail.com Exp $ |
8 */ | 8 */ |
9 #ifndef _CERTT_H_ | 9 #ifndef _CERTT_H_ |
10 #define _CERTT_H_ | 10 #define _CERTT_H_ |
11 | 11 |
12 #include "prclist.h" | 12 #include "prclist.h" |
13 #include "pkcs11t.h" | 13 #include "pkcs11t.h" |
14 #include "seccomon.h" | 14 #include "seccomon.h" |
15 #include "secmodt.h" | 15 #include "secmodt.h" |
16 #include "secoidt.h" | 16 #include "secoidt.h" |
17 #include "plarena.h" | 17 #include "plarena.h" |
(...skipping 930 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
948 cert_pi_certStores = 10,/* Bitmask of Cert Store flags (see below) | 948 cert_pi_certStores = 10,/* Bitmask of Cert Store flags (see below) |
949 * Set in value.scalar.ui */ | 949 * Set in value.scalar.ui */ |
950 cert_pi_trustAnchors = 11,/* Specify the list of trusted roots to | 950 cert_pi_trustAnchors = 11,/* Specify the list of trusted roots to |
951 * validate against. | 951 * validate against. |
952 * The default set of trusted roots, these are | 952 * The default set of trusted roots, these are |
953 * root CA certs from libnssckbi.so or CA | 953 * root CA certs from libnssckbi.so or CA |
954 * certs trusted by user, are used in any of | 954 * certs trusted by user, are used in any of |
955 * the following cases: | 955 * the following cases: |
956 * * when the parameter is not set. | 956 * * when the parameter is not set. |
957 * * when the list of trust anchors is empt
y. | 957 * * when the list of trust anchors is empt
y. |
| 958 * Note that this handling can be further altere
d by altering the |
| 959 * cert_pi_useOnlyTrustAnchors flag |
958 * Specified in value.pointer.chain */ | 960 * Specified in value.pointer.chain */ |
959 cert_pi_useAIACertFetch = 12, /* Enables cert fetching using AIA extension. | 961 cert_pi_useAIACertFetch = 12, /* Enables cert fetching using AIA extension. |
960 * In NSS 3.12.1 or later. Default is off. | 962 * In NSS 3.12.1 or later. Default is off. |
961 * Value is in value.scalar.b */ | 963 * Value is in value.scalar.b */ |
962 cert_pi_chainVerifyCallback = 13, | 964 cert_pi_chainVerifyCallback = 13, |
963 /* The callback container for doing extra | 965 /* The callback container for doing extra |
964 * validation on the currently calculated chain. | 966 * validation on the currently calculated chain. |
965 * Value is in value.pointer.chainVerifyCallback
*/ | 967 * Value is in value.pointer.chainVerifyCallback
*/ |
| 968 cert_pi_useOnlyTrustAnchors = 14,/* If true, disables trusting any |
| 969 * certificates other than the ones passed in vi
a cert_pi_trustAnchors. |
| 970 * If false, then the certificates specified via
cert_pi_trustAnchors |
| 971 * will be combined with the pre-existing truste
d roots, but only for |
| 972 * the certificate validation being performed. |
| 973 * If no value has been supplied via cert_pi_tru
stAnchors, this has no |
| 974 * effect. |
| 975 * The default value is true, meaning if this is
not supplied, only |
| 976 * trust anchors supplied via cert_pi_trustAncho
rs are trusted. |
| 977 * Specified in value.scalar.b */ |
966 cert_pi_max /* SPECIAL: signifies maximum allowed value, | 978 cert_pi_max /* SPECIAL: signifies maximum allowed value, |
967 * can increase in future releases */ | 979 * can increase in future releases */ |
968 } CERTValParamInType; | 980 } CERTValParamInType; |
969 | 981 |
970 /* | 982 /* |
971 * for all out parameters: | 983 * for all out parameters: |
972 * out parameters are only returned if the caller asks for them in | 984 * out parameters are only returned if the caller asks for them in |
973 * the CERTValOutParam array. Caller is responsible for the CERTValOutParam | 985 * the CERTValOutParam array. Caller is responsible for the CERTValOutParam |
974 * array itself. The pkix verify function will allocate and other arrays | 986 * array itself. The pkix verify function will allocate and other arrays |
975 * pointers, or objects. The Caller is responsible for freeing those results. | 987 * pointers, or objects. The Caller is responsible for freeing those results. |
(...skipping 348 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1324 SEC_ASN1_CHOOSER_DECLARE(CERT_SetOfSignedCrlTemplate) | 1336 SEC_ASN1_CHOOSER_DECLARE(CERT_SetOfSignedCrlTemplate) |
1325 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedDataTemplate) | 1337 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedDataTemplate) |
1326 SEC_ASN1_CHOOSER_DECLARE(CERT_SubjectPublicKeyInfoTemplate) | 1338 SEC_ASN1_CHOOSER_DECLARE(CERT_SubjectPublicKeyInfoTemplate) |
1327 SEC_ASN1_CHOOSER_DECLARE(SEC_SignedCertificateTemplate) | 1339 SEC_ASN1_CHOOSER_DECLARE(SEC_SignedCertificateTemplate) |
1328 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedCrlTemplate) | 1340 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedCrlTemplate) |
1329 SEC_ASN1_CHOOSER_DECLARE(CERT_TimeChoiceTemplate) | 1341 SEC_ASN1_CHOOSER_DECLARE(CERT_TimeChoiceTemplate) |
1330 | 1342 |
1331 SEC_END_PROTOS | 1343 SEC_END_PROTOS |
1332 | 1344 |
1333 #endif /* _CERTT_H_ */ | 1345 #endif /* _CERTT_H_ */ |
OLD | NEW |