diff options
Diffstat (limited to 'nss/lib/softoken/legacydb/pcertt.h')
-rw-r--r-- | nss/lib/softoken/legacydb/pcertt.h | 270 |
1 files changed, 135 insertions, 135 deletions
diff --git a/nss/lib/softoken/legacydb/pcertt.h b/nss/lib/softoken/legacydb/pcertt.h index fd5e17c..7eaa82d 100644 --- a/nss/lib/softoken/legacydb/pcertt.h +++ b/nss/lib/softoken/legacydb/pcertt.h @@ -18,17 +18,17 @@ #include "prmon.h" /* Non-opaque objects */ -typedef struct NSSLOWCERTCertDBHandleStr NSSLOWCERTCertDBHandle; -typedef struct NSSLOWCERTCertKeyStr NSSLOWCERTCertKey; - -typedef struct NSSLOWCERTTrustStr NSSLOWCERTTrust; -typedef struct NSSLOWCERTCertTrustStr NSSLOWCERTCertTrust; -typedef struct NSSLOWCERTCertificateStr NSSLOWCERTCertificate; -typedef struct NSSLOWCERTCertificateListStr NSSLOWCERTCertificateList; -typedef struct NSSLOWCERTIssuerAndSNStr NSSLOWCERTIssuerAndSN; -typedef struct NSSLOWCERTSignedDataStr NSSLOWCERTSignedData; -typedef struct NSSLOWCERTSubjectPublicKeyInfoStr NSSLOWCERTSubjectPublicKeyInfo; -typedef struct NSSLOWCERTValidityStr NSSLOWCERTValidity; +typedef struct NSSLOWCERTCertDBHandleStr NSSLOWCERTCertDBHandle; +typedef struct NSSLOWCERTCertKeyStr NSSLOWCERTCertKey; + +typedef struct NSSLOWCERTTrustStr NSSLOWCERTTrust; +typedef struct NSSLOWCERTCertTrustStr NSSLOWCERTCertTrust; +typedef struct NSSLOWCERTCertificateStr NSSLOWCERTCertificate; +typedef struct NSSLOWCERTCertificateListStr NSSLOWCERTCertificateList; +typedef struct NSSLOWCERTIssuerAndSNStr NSSLOWCERTIssuerAndSN; +typedef struct NSSLOWCERTSignedDataStr NSSLOWCERTSignedData; +typedef struct NSSLOWCERTSubjectPublicKeyInfoStr NSSLOWCERTSubjectPublicKeyInfo; +typedef struct NSSLOWCERTValidityStr NSSLOWCERTValidity; /* ** An X.509 validity object @@ -81,10 +81,10 @@ struct NSSLOWCERTCertTrustStr { struct NSSLOWCERTTrustStr { NSSLOWCERTTrust *next; NSSLOWCERTCertDBHandle *dbhandle; - SECItem dbKey; /* database key for this cert */ - certDBEntryCert *dbEntry; /* database entry struct */ + SECItem dbKey; /* database key for this cert */ + certDBEntryCert *dbEntry; /* database entry struct */ NSSLOWCERTCertTrust *trust; - SECItem *derCert; /* original DER for the cert */ + SECItem *derCert; /* original DER for the cert */ unsigned char dbKeySpace[512]; }; @@ -101,17 +101,17 @@ struct NSSLOWCERTCertificateStr { NSSLOWCERTCertificate *next; NSSLOWCERTCertDBHandle *dbhandle; - SECItem derCert; /* original DER for the cert */ - SECItem derIssuer; /* DER for issuer name */ + SECItem derCert; /* original DER for the cert */ + SECItem derIssuer; /* DER for issuer name */ SECItem derSN; SECItem serialNumber; - SECItem derSubject; /* DER for subject name */ + SECItem derSubject; /* DER for subject name */ SECItem derSubjKeyInfo; NSSLOWCERTSubjectPublicKeyInfo *subjectPublicKeyInfo; - SECItem certKey; /* database key for this cert */ + SECItem certKey; /* database key for this cert */ SECItem validity; - certDBEntryCert *dbEntry; /* database entry struct */ - SECItem subjectKeyID; /* x509v3 subject key identifier */ + certDBEntryCert *dbEntry; /* database entry struct */ + SECItem subjectKeyID; /* x509v3 subject key identifier */ SECItem extensions; char *nickname; char *emailAddr; @@ -127,12 +127,12 @@ struct NSSLOWCERTCertificateStr { unsigned char certKeySpace[512]; }; -#define SEC_CERTIFICATE_VERSION_1 0 /* default created */ -#define SEC_CERTIFICATE_VERSION_2 1 /* v2 */ -#define SEC_CERTIFICATE_VERSION_3 2 /* v3 extensions */ +#define SEC_CERTIFICATE_VERSION_1 0 /* default created */ +#define SEC_CERTIFICATE_VERSION_2 1 /* v2 */ +#define SEC_CERTIFICATE_VERSION_3 2 /* v3 extensions */ -#define SEC_CRL_VERSION_1 0 /* default */ -#define SEC_CRL_VERSION_2 1 /* v2 extensions */ +#define SEC_CRL_VERSION_1 0 /* default */ +#define SEC_CRL_VERSION_2 1 /* v2 extensions */ #define NSS_MAX_LEGACY_DB_KEY_SIZE (60 * 1024) @@ -141,36 +141,36 @@ struct NSSLOWCERTIssuerAndSNStr { SECItem serialNumber; }; -typedef SECStatus (* NSSLOWCERTCertCallback)(NSSLOWCERTCertificate *cert, void *arg); +typedef SECStatus (*NSSLOWCERTCertCallback)(NSSLOWCERTCertificate *cert, void *arg); /* This is the typedef for the callback passed to nsslowcert_OpenCertDB() */ /* callback to return database name based on version number */ -typedef char * (*NSSLOWCERTDBNameFunc)(void *arg, int dbVersion); +typedef char *(*NSSLOWCERTDBNameFunc)(void *arg, int dbVersion); /* XXX Lisa thinks the template declarations belong in cert.h, not here? */ -#include "secasn1t.h" /* way down here because I expect template stuff to - * move out of here anyway */ +#include "secasn1t.h" /* way down here because I expect template stuff to + * move out of here anyway */ /* * Certificate Database related definitions and data structures */ /* version number of certificate database */ -#define CERT_DB_FILE_VERSION 8 -#define CERT_DB_V7_FILE_VERSION 7 -#define CERT_DB_CONTENT_VERSION 2 +#define CERT_DB_FILE_VERSION 8 +#define CERT_DB_V7_FILE_VERSION 7 +#define CERT_DB_CONTENT_VERSION 2 -#define SEC_DB_ENTRY_HEADER_LEN 3 -#define SEC_DB_KEY_HEADER_LEN 1 +#define SEC_DB_ENTRY_HEADER_LEN 3 +#define SEC_DB_KEY_HEADER_LEN 1 /* All database entries have this form: - * - * byte offset field - * ----------- ----- - * 0 version - * 1 type - * 2 flags + * + * byte offset field + * ----------- ----- + * 0 version + * 1 type + * 2 flags */ /* database entry types */ @@ -196,26 +196,26 @@ typedef struct { /* * Certificate entry: * - * byte offset field - * ----------- ----- - * 0 sslFlags-msb - * 1 sslFlags-lsb - * 2 emailFlags-msb - * 3 emailFlags-lsb - * 4 objectSigningFlags-msb - * 5 objectSigningFlags-lsb - * 6 derCert-len-msb - * 7 derCert-len-lsb - * 8 nickname-len-msb - * 9 nickname-len-lsb - * ... derCert - * ... nickname + * byte offset field + * ----------- ----- + * 0 sslFlags-msb + * 1 sslFlags-lsb + * 2 emailFlags-msb + * 3 emailFlags-lsb + * 4 objectSigningFlags-msb + * 5 objectSigningFlags-lsb + * 6 derCert-len-msb + * 7 derCert-len-lsb + * 8 nickname-len-msb + * 9 nickname-len-lsb + * ... derCert + * ... nickname * * NOTE: the nickname string as stored in the database is null terminated, - * in other words, the last byte of the db entry is always 0 - * if a nickname is present. + * in other words, the last byte of the db entry is always 0 + * if a nickname is present. * NOTE: if nickname is not present, then nickname-len-msb and - * nickname-len-lsb will both be zero. + * nickname-len-lsb will both be zero. */ struct _certDBEntryCert { certDBEntryCommon common; @@ -230,11 +230,11 @@ struct _certDBEntryCert { /* * Certificate Nickname entry: * - * byte offset field - * ----------- ----- - * 0 subjectname-len-msb - * 1 subjectname-len-lsb - * 2... subjectname + * byte offset field + * ----------- ----- + * 0 subjectname-len-msb + * 1 subjectname-len-lsb + * 2... subjectname * * The database key for this type of entry is a nickname string * The "subjectname" value is the DER encoded DN of the identity @@ -251,22 +251,22 @@ typedef struct { /* * Certificate Subject entry: * - * byte offset field - * ----------- ----- - * 0 ncerts-msb - * 1 ncerts-lsb - * 2 nickname-msb - * 3 nickname-lsb - * 4 emailAddr-msb - * 5 emailAddr-lsb - * ... nickname - * ... emailAddr - * ...+2*i certkey-len-msb - * ...+1+2*i certkey-len-lsb - * ...+2*ncerts+2*i keyid-len-msb - * ...+1+2*ncerts+2*i keyid-len-lsb - * ... certkeys - * ... keyids + * byte offset field + * ----------- ----- + * 0 ncerts-msb + * 1 ncerts-lsb + * 2 nickname-msb + * 3 nickname-lsb + * 4 emailAddr-msb + * 5 emailAddr-lsb + * ... nickname + * ... emailAddr + * ...+2*i certkey-len-msb + * ...+1+2*i certkey-len-lsb + * ...+2*ncerts+2*i keyid-len-msb + * ...+1+2*ncerts+2*i keyid-len-lsb + * ... certkeys + * ... keyids * * The database key for this type of entry is the DER encoded subject name * The "certkey" value is an array of certificate database lookup keys that @@ -290,17 +290,17 @@ typedef struct _certDBEntrySubject { /* * Certificate SMIME profile entry: * - * byte offset field - * ----------- ----- - * 0 subjectname-len-msb - * 1 subjectname-len-lsb - * 2 smimeoptions-len-msb - * 3 smimeoptions-len-lsb - * 4 options-date-len-msb - * 5 options-date-len-lsb - * 6... subjectname - * ... smimeoptions - * ... options-date + * byte offset field + * ----------- ----- + * 0 subjectname-len-msb + * 1 subjectname-len-lsb + * 2 smimeoptions-len-msb + * 3 smimeoptions-len-lsb + * 4 options-date-len-msb + * 5 options-date-len-lsb + * 6... subjectname + * ... smimeoptions + * ... options-date * * The database key for this type of entry is the email address string * The "subjectname" value is the DER encoded DN of the identity @@ -324,34 +324,34 @@ typedef struct { /* * Crl/krl entry: * - * byte offset field - * ----------- ----- - * 0 derCert-len-msb - * 1 derCert-len-lsb - * 2 url-len-msb - * 3 url-len-lsb - * ... derCert - * ... url + * byte offset field + * ----------- ----- + * 0 derCert-len-msb + * 1 derCert-len-lsb + * 2 url-len-msb + * 3 url-len-lsb + * ... derCert + * ... url * * NOTE: the url string as stored in the database is null terminated, - * in other words, the last byte of the db entry is always 0 - * if a nickname is present. + * in other words, the last byte of the db entry is always 0 + * if a nickname is present. * NOTE: if url is not present, then url-len-msb and - * url-len-lsb will both be zero. + * url-len-lsb will both be zero. */ -#define DB_CRL_ENTRY_HEADER_LEN 4 +#define DB_CRL_ENTRY_HEADER_LEN 4 struct _certDBEntryRevocation { certDBEntryCommon common; - SECItem derCrl; - char *url; /* where to load the crl from */ + SECItem derCrl; + char *url; /* where to load the crl from */ }; /* * Database Version Entry: * - * byte offset field - * ----------- ----- - * only the low level header... + * byte offset field + * ----------- ----- + * only the low level header... * * The database key for this type of entry is the string "Version" */ @@ -365,9 +365,9 @@ typedef struct { /* * Database Content Version Entry: * - * byte offset field - * ----------- ----- - * 0 contentVersion + * byte offset field + * ----------- ----- + * 0 contentVersion * * The database key for this type of entry is the string "ContentVersion" */ @@ -380,39 +380,39 @@ typedef struct { #define SEC_DB_CONTENT_VERSION_KEY_LEN sizeof(SEC_DB_CONTENT_VERSION_KEY) typedef union { - certDBEntryCommon common; - certDBEntryCert cert; + certDBEntryCommon common; + certDBEntryCert cert; certDBEntryContentVersion content; - certDBEntryNickname nickname; - certDBEntryRevocation revocation; - certDBEntrySMime smime; - certDBEntrySubject subject; - certDBEntryVersion version; + certDBEntryNickname nickname; + certDBEntryRevocation revocation; + certDBEntrySMime smime; + certDBEntrySubject subject; + certDBEntryVersion version; } certDBEntry; /* length of the fixed part of a database entry */ -#define DBCERT_V4_HEADER_LEN 7 -#define DB_CERT_V5_ENTRY_HEADER_LEN 7 -#define DB_CERT_V6_ENTRY_HEADER_LEN 7 -#define DB_CERT_ENTRY_HEADER_LEN 10 +#define DBCERT_V4_HEADER_LEN 7 +#define DB_CERT_V5_ENTRY_HEADER_LEN 7 +#define DB_CERT_V6_ENTRY_HEADER_LEN 7 +#define DB_CERT_ENTRY_HEADER_LEN 10 /* common flags for all types of certificates */ -#define CERTDB_TERMINAL_RECORD (1u<<0) -#define CERTDB_TRUSTED (1u<<1) -#define CERTDB_SEND_WARN (1u<<2) -#define CERTDB_VALID_CA (1u<<3) -#define CERTDB_TRUSTED_CA (1u<<4) /* trusted for issuing server certs */ -#define CERTDB_NS_TRUSTED_CA (1u<<5) -#define CERTDB_USER (1u<<6) -#define CERTDB_TRUSTED_CLIENT_CA (1u<<7) /* trusted for issuing client certs */ -#define CERTDB_INVISIBLE_CA (1u<<8) /* don't show in UI */ -#define CERTDB_GOVT_APPROVED_CA (1u<<9) /* can do strong crypto in export ver */ -#define CERTDB_MUST_VERIFY (1u<<10) /* explicitly don't trust this cert */ -#define CERTDB_TRUSTED_UNKNOWN (1u<<11) /* accept trust from another source */ +#define CERTDB_TERMINAL_RECORD (1u << 0) +#define CERTDB_TRUSTED (1u << 1) +#define CERTDB_SEND_WARN (1u << 2) +#define CERTDB_VALID_CA (1u << 3) +#define CERTDB_TRUSTED_CA (1u << 4) /* trusted for issuing server certs */ +#define CERTDB_NS_TRUSTED_CA (1u << 5) +#define CERTDB_USER (1u << 6) +#define CERTDB_TRUSTED_CLIENT_CA (1u << 7) /* trusted for issuing client certs */ +#define CERTDB_INVISIBLE_CA (1u << 8) /* don't show in UI */ +#define CERTDB_GOVT_APPROVED_CA (1u << 9) /* can do strong crypto in export ver */ +#define CERTDB_MUST_VERIFY (1u << 10) /* explicitly don't trust this cert */ +#define CERTDB_TRUSTED_UNKNOWN (1u << 11) /* accept trust from another source */ /* bits not affected by the CKO_NETSCAPE_TRUST object */ -#define CERTDB_PRESERVE_TRUST_BITS (CERTDB_USER | \ - CERTDB_NS_TRUSTED_CA | CERTDB_VALID_CA | CERTDB_INVISIBLE_CA | \ - CERTDB_GOVT_APPROVED_CA) +#define CERTDB_PRESERVE_TRUST_BITS (CERTDB_USER | \ + CERTDB_NS_TRUSTED_CA | CERTDB_VALID_CA | CERTDB_INVISIBLE_CA | \ + CERTDB_GOVT_APPROVED_CA) #endif /* _PCERTT_H_ */ |