This section provides details of the human-readable form of the following certificate store files:
Note: For details of the fields that make up these certificate store files, see
Human-Readable File Formats Reference.Use the --hfilecertstore
command-line option
to specify the file certificate store in human-readable form. The file certificate
store has the following format:
StartCertStoreEntries StartEntry "Root5CA" Deletable true Format EX509Certificate CertOwnerType ECACertificate SubjectKeyId auto IssuerKeyId auto StartApplicationList # Entry 1 Application "Server Authentication" EndApplicationList Trusted true DataFileName "root5ca.pem" EndEntry EndCertStoreEntries
Notes:
Use the --hswicertstore
command-line option
to specify the Software Install (SWI) certificate store in human-readable
form. The SWI certificate store is of the following format:
StartSwiCertStoreEntries StartEntry "SymbianA" Format EX509Certificate CertOwnerType ECACertificate SubjectKeyId auto IssuerKeyId auto StartApplicationList # Entry 1 Application "SW Install" # Entry 2 Application "SW Install OCSP Signing" EndApplicationList Trusted true DataFileName "cert.der" CapabilitySet { TCB CommDD PowerMgmt MultimediaDD ReadDeviceData WriteDeviceData DRM TrustedUI ProtServ DiskAdmin NetworkControl AllFiles SwEvent NetworkServices LocalServices ReadUserData WriteUserData Location SurroundingsDD UserEnvironment } Mandatory false SystemUpgrade false EndEntry EndSwiCertStoreEntries
Note:
Use the –hcertclients
command-line
option to specify the certificate client files in human-readable form. A certificate
client file has the following format:
StartClientInfo # Entry 1 Uid 0x100042ab Name "SW Install" # Entry 2 Uid 0x1000a8b6 Name "SW Install OCSP Signing" # Entry 3 Uid 0x101f9b28 Name "MIDlet Installation" # Entry 4 Uid 0x1000183d Name "Server Authentication" EndClientInfo
Important: