securitydefs.h File Reference

Typedef TKeyUsage

typedef TInt TKeyUsage

General Security Definitions What a key can be used for. The values this can take are defined in TKeyUsageVals.

Deprecated

Enum TKeyUsageVals

What a key can be used for.

These values can be ORed together if a key has several usages. EAllKeyUsages is used when searching for all keys, rather than ones with a particular usage. As these can be combined, TKeyUsage is used to store them.

Deprecated

EnumeratorValueDescription
EDigitalSignature0x80000000
ENonRepudiation0x40000000
EKeyEncipherment0x20000000
EDataEncipherment0x10000000
EKeyAgreement0x08000000
EKeyCertSign0x04000000
ECRLSign0x02000000
EEncipherOnly0x01000000
EDecipherOnly0x00800000
EAllKeyUsages-1

operator| ( TKeyUsagePKCS15, TKeyUsagePKCS15 )

TKeyUsagePKCS15 operator|(TKeyUsagePKCS15aLeft,
TKeyUsagePKCS15aRight
)[inline]

operator& ( TKeyUsagePKCS15, TKeyUsagePKCS15 )

TKeyUsagePKCS15 operator&(TKeyUsagePKCS15aLeft,
TKeyUsagePKCS15aRight
)[inline]

operator|= ( TKeyUsagePKCS15 &, TKeyUsagePKCS15 )

const TKeyUsagePKCS15 &operator|=(TKeyUsagePKCS15 &aLeft,
TKeyUsagePKCS15aRight
)[inline]

operator&= ( TKeyUsagePKCS15 &, TKeyUsagePKCS15 )

const TKeyUsagePKCS15 &operator&=(TKeyUsagePKCS15 &aLeft,
TKeyUsagePKCS15aRight
)[inline]

Enum TKeyUsageX509

What a key can be used for - X.509 scheme.

EnumeratorValueDescription
EX509UsageDigitalSignature0x80000000
EX509UsageNonRepudiation0x40000000
EX509UsageKeyEncipherment0x20000000
EX509UsageDataEncipherment0x10000000
EX509UsageKeyAgreement0x08000000
EX509UsageKeyCertSign0x04000000
EX509UsageCRLSign0x02000000
EX509UsageEncipherOnly0x01000000
EX509UsageDecipherOnly0x00800000
EX509UsageAnySign0x86000000
EX509UsageAllEncipher0x30000000
EX509UsageAllSignEncipher0xB6000000
EX509UsageAll0xffffffffFor use in filters to return all keys.
EX509UsageNone0x00000000

operator| ( TKeyUsageX509, TKeyUsageX509 )

TKeyUsageX509 operator|(TKeyUsageX509aLeft,
TKeyUsageX509aRight
)[inline]

operator& ( TKeyUsageX509, TKeyUsageX509 )

TKeyUsageX509 operator&(TKeyUsageX509aLeft,
TKeyUsageX509aRight
)[inline]

operator|= ( TKeyUsageX509 &, TKeyUsageX509 )

const TKeyUsageX509 &operator|=(TKeyUsageX509 &aLeft,
TKeyUsageX509aRight
)[inline]

operator&= ( TKeyUsageX509 &, TKeyUsageX509 )

const TKeyUsageX509 &operator&=(TKeyUsageX509 &aLeft,
TKeyUsageX509aRight
)[inline]

KeyUsagePKCS15ToX509 ( TKeyUsagePKCS15 )

IMPORT_C TKeyUsageX509KeyUsagePKCS15ToX509(TKeyUsagePKCS15aUsage)

KeyUsageX509ToPKCS15Private ( TKeyUsageX509 )

IMPORT_C TKeyUsagePKCS15KeyUsageX509ToPKCS15Private(TKeyUsageX509aUsage)

KeyUsageX509ToPKCS15Public ( TKeyUsageX509 )

IMPORT_C TKeyUsagePKCS15KeyUsageX509ToPKCS15Public(TKeyUsageX509aUsage)

Enum TCertificateFormat

Supported types of certificate format. Note these must be only 1 byte long as the file cert store only seralises them as 1 byte.

Enum TCertificateOwnerType

The owner of a certificate.

KSHA1HashLengthBytes

const TIntKSHA1HashLengthBytes

The length of a SHA-1 hash

Typedef TSHA1Hash

typedef TBuf8< KSHA1HashLengthBytes >TSHA1Hash

A SHA-1 hash.

Typedef TKeyIdentifier

typedef TSHA1Hash TKeyIdentifier

A SHA-1 hash is also used as a key identifier.

Enum TValidationError

Errors that can occur when validating a certificate chain.

Except EValidatedOK, all these are fatal errors unless specified.

EnumeratorValueDescription
EValidatedOK

Validation OK

EChainHasNoRoot

Certificate chain has no root

ESignatureInvalid

Invalid signature

EDateOutOfRange

Date out of range

ENameIsExcluded

Name is excluded

ENameNotPermitted

Name is not permitted

ENotCACert

Not a CA certificate

ECertificateRevoked

Certificate revoked

EUnrecognizedCriticalExtension

Unrecognized critical extension

ENoBasicConstraintInCACert

No basic constraint in CA certificate

ENoAcceptablePolicy

No acceptable policy

EPathTooLong

Path too long

ENegativePathLengthSpecified

Negative path length specified

ENamesDontChain

Names do not chain

ERequiredPolicyNotFound

Required policy not found

EBadKeyUsage

Bad key usage

ERootCertNotSelfSigned

Root certificate not self-signed.

We cannot tell if this is fatal or not, as we lack the context.

ECriticalExtendedKeyUsage

Critical extended key usage

We cannot tell if this is fatal or not, as we lack the context.

ECriticalCertPoliciesWithQualifiers

Critical certificate policies with qualifiers

We cannot tell if this is fatal or not, as we lack the context.

ECriticalPolicyMapping

Critical policy mapping

We cannot tell if this is fatal or not, as we lack the context.

ECriticalDeviceId

Critical Device Id

We cannot tell if this is fatal or not, as we lack the context.

ECriticalSid

Critical Sid

We cannot tell if this is fatal or not, as we lack the context.

ECriticalVid

Critical Vid

We cannot tell if this is fatal or not, as we lack the context.

ECriticalCapabilities

Critical Capabilities

We cannot tell if this is fatal or not, as we lack the context.