| OLD | NEW |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 4 /* | 4 /* |
| 5 * certt.h - public data structures for the certificate library | 5 * certt.h - public data structures for the certificate library |
| 6 * | 6 * |
| 7 * $Id: certt.h,v 1.57 2012/09/28 23:40:14 rrelyea%redhat.com Exp $ | 7 * $Id: certt.h,v 1.58 2013/01/07 03:56:12 ryan.sleevi%gmail.com Exp $ |
| 8 */ | 8 */ |
| 9 #ifndef _CERTT_H_ | 9 #ifndef _CERTT_H_ |
| 10 #define _CERTT_H_ | 10 #define _CERTT_H_ |
| 11 | 11 |
| 12 #include "prclist.h" | 12 #include "prclist.h" |
| 13 #include "pkcs11t.h" | 13 #include "pkcs11t.h" |
| 14 #include "seccomon.h" | 14 #include "seccomon.h" |
| 15 #include "secmodt.h" | 15 #include "secmodt.h" |
| 16 #include "secoidt.h" | 16 #include "secoidt.h" |
| 17 #include "plarena.h" | 17 #include "plarena.h" |
| (...skipping 930 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 948 cert_pi_certStores = 10,/* Bitmask of Cert Store flags (see below) | 948 cert_pi_certStores = 10,/* Bitmask of Cert Store flags (see below) |
| 949 * Set in value.scalar.ui */ | 949 * Set in value.scalar.ui */ |
| 950 cert_pi_trustAnchors = 11,/* Specify the list of trusted roots to | 950 cert_pi_trustAnchors = 11,/* Specify the list of trusted roots to |
| 951 * validate against. | 951 * validate against. |
| 952 * The default set of trusted roots, these are | 952 * The default set of trusted roots, these are |
| 953 * root CA certs from libnssckbi.so or CA | 953 * root CA certs from libnssckbi.so or CA |
| 954 * certs trusted by user, are used in any of | 954 * certs trusted by user, are used in any of |
| 955 * the following cases: | 955 * the following cases: |
| 956 * * when the parameter is not set. | 956 * * when the parameter is not set. |
| 957 * * when the list of trust anchors is empt
y. | 957 * * when the list of trust anchors is empt
y. |
| 958 * Note that this handling can be further altere
d by altering the |
| 959 * cert_pi_useOnlyTrustAnchors flag |
| 958 * Specified in value.pointer.chain */ | 960 * Specified in value.pointer.chain */ |
| 959 cert_pi_useAIACertFetch = 12, /* Enables cert fetching using AIA extension. | 961 cert_pi_useAIACertFetch = 12, /* Enables cert fetching using AIA extension. |
| 960 * In NSS 3.12.1 or later. Default is off. | 962 * In NSS 3.12.1 or later. Default is off. |
| 961 * Value is in value.scalar.b */ | 963 * Value is in value.scalar.b */ |
| 962 cert_pi_chainVerifyCallback = 13, | 964 cert_pi_chainVerifyCallback = 13, |
| 963 /* The callback container for doing extra | 965 /* The callback container for doing extra |
| 964 * validation on the currently calculated chain. | 966 * validation on the currently calculated chain. |
| 965 * Value is in value.pointer.chainVerifyCallback
*/ | 967 * Value is in value.pointer.chainVerifyCallback
*/ |
| 968 cert_pi_useOnlyTrustAnchors = 14,/* If true, disables trusting any |
| 969 * certificates other than the ones passed in vi
a cert_pi_trustAnchors. |
| 970 * If false, then the certificates specified via
cert_pi_trustAnchors |
| 971 * will be combined with the pre-existing truste
d roots, but only for |
| 972 * the certificate validation being performed. |
| 973 * If no value has been supplied via cert_pi_tru
stAnchors, this has no |
| 974 * effect. |
| 975 * The default value is true, meaning if this is
not supplied, only |
| 976 * trust anchors supplied via cert_pi_trustAncho
rs are trusted. |
| 977 * Specified in value.scalar.b */ |
| 966 cert_pi_max /* SPECIAL: signifies maximum allowed value, | 978 cert_pi_max /* SPECIAL: signifies maximum allowed value, |
| 967 * can increase in future releases */ | 979 * can increase in future releases */ |
| 968 } CERTValParamInType; | 980 } CERTValParamInType; |
| 969 | 981 |
| 970 /* | 982 /* |
| 971 * for all out parameters: | 983 * for all out parameters: |
| 972 * out parameters are only returned if the caller asks for them in | 984 * out parameters are only returned if the caller asks for them in |
| 973 * the CERTValOutParam array. Caller is responsible for the CERTValOutParam | 985 * the CERTValOutParam array. Caller is responsible for the CERTValOutParam |
| 974 * array itself. The pkix verify function will allocate and other arrays | 986 * array itself. The pkix verify function will allocate and other arrays |
| 975 * pointers, or objects. The Caller is responsible for freeing those results. | 987 * pointers, or objects. The Caller is responsible for freeing those results. |
| (...skipping 348 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1324 SEC_ASN1_CHOOSER_DECLARE(CERT_SetOfSignedCrlTemplate) | 1336 SEC_ASN1_CHOOSER_DECLARE(CERT_SetOfSignedCrlTemplate) |
| 1325 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedDataTemplate) | 1337 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedDataTemplate) |
| 1326 SEC_ASN1_CHOOSER_DECLARE(CERT_SubjectPublicKeyInfoTemplate) | 1338 SEC_ASN1_CHOOSER_DECLARE(CERT_SubjectPublicKeyInfoTemplate) |
| 1327 SEC_ASN1_CHOOSER_DECLARE(SEC_SignedCertificateTemplate) | 1339 SEC_ASN1_CHOOSER_DECLARE(SEC_SignedCertificateTemplate) |
| 1328 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedCrlTemplate) | 1340 SEC_ASN1_CHOOSER_DECLARE(CERT_SignedCrlTemplate) |
| 1329 SEC_ASN1_CHOOSER_DECLARE(CERT_TimeChoiceTemplate) | 1341 SEC_ASN1_CHOOSER_DECLARE(CERT_TimeChoiceTemplate) |
| 1330 | 1342 |
| 1331 SEC_END_PROTOS | 1343 SEC_END_PROTOS |
| 1332 | 1344 |
| 1333 #endif /* _CERTT_H_ */ | 1345 #endif /* _CERTT_H_ */ |
| OLD | NEW |