This section provides details of the human-readable form of the following certificate store files:
Use the --hfilecertstore command-line option to specify the file certificate store in human-readable form. The file certificate store has the following format:
StartCertStoreEntries StartEntry "Root5CA" Deletable true Format EX509Certificate CertOwnerType ECACertificate SubjectKeyId auto IssuerKeyId auto StartApplicationList # Entry 1 Application "Server Authentication" EndApplicationList Trusted true DataFileName "root5ca.pem" EndEntry EndCertStoreEntries
Notes:
Use the --hswicertstore command-line option to specify the Software Install (SWI) certificate store in human-readable form. The SWI certificate store is of the following format:
StartSwiCertStoreEntries StartEntry "SymbianA" Format EX509Certificate CertOwnerType ECACertificate SubjectKeyId auto IssuerKeyId auto StartApplicationList # Entry 1 Application "SW Install" # Entry 2 Application "SW Install OCSP Signing" EndApplicationList Trusted true DataFileName "cert.der" CapabilitySet { TCB CommDD PowerMgmt MultimediaDD ReadDeviceData WriteDeviceData DRM TrustedUI ProtServ DiskAdmin NetworkControl AllFiles SwEvent NetworkServices LocalServices ReadUserData WriteUserData Location SurroundingsDD UserEnvironment } Mandatory false SystemUpgrade false EndEntry EndSwiCertStoreEntries
Note:
Use the –hcertclients command-line option to specify the certificate client files in human-readable form. A certificate client file has the following format:
StartClientInfo # Entry 1 Uid 0x100042ab Name "SW Install" # Entry 2 Uid 0x1000a8b6 Name "SW Install OCSP Signing" # Entry 3 Uid 0x101f9b28 Name "MIDlet Installation" # Entry 4 Uid 0x1000183d Name "Server Authentication" EndClientInfo
Important: