PageRenderTime 62ms CodeModel.GetById 15ms RepoModel.GetById 1ms app.codeStats 0ms

/packages/univint/src/cssmapple.pas

https://github.com/slibre/freepascal
Pascal | 1333 lines | 555 code | 165 blank | 613 comment | 0 complexity | 6584a90232495951f8526a9ed4d63d02 MD5 | raw file
Possible License(s): LGPL-2.0, LGPL-2.1, LGPL-3.0
  1. {
  2. * Copyright (c) 2000-2004 Apple Computer, Inc. All Rights Reserved.
  3. *
  4. * @APPLE_LICENSE_HEADER_START@
  5. *
  6. * This file contains Original Code and/or Modifications of Original Code
  7. * as defined in and that are subject to the Apple Public Source License
  8. * Version 2.0 (the 'License'). You may not use this file except in
  9. * compliance with the License. Please obtain a copy of the License at
  10. * http://www.opensource.apple.com/apsl/ and read it before using this
  11. * file.
  12. *
  13. * The Original Code and all software distributed under the License are
  14. * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
  15. * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
  16. * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
  17. * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
  18. * Please see the License for the specific language governing rights and
  19. * limitations under the License.
  20. *
  21. * @APPLE_LICENSE_HEADER_END@
  22. *
  23. * cssmapple.h -- CSSM features specific to Apple's Implementation
  24. }
  25. { Pascal Translation Updated: Jonas Maebe, <jonas@freepascal.org>, September 2010 }
  26. { Pascal Translation Update: Jonas Maebe <jonas@freepascal.org>, October 2012 }
  27. {
  28. Modified for use with Free Pascal
  29. Version 308
  30. Please report any bugs to <gpc@microbizz.nl>
  31. }
  32. {$ifc not defined MACOSALLINCLUDE or not MACOSALLINCLUDE}
  33. {$mode macpas}
  34. {$packenum 1}
  35. {$macro on}
  36. {$inline on}
  37. {$calling mwpascal}
  38. unit cssmapple;
  39. interface
  40. {$setc UNIVERSAL_INTERFACES_VERSION := $0400}
  41. {$setc GAP_INTERFACES_VERSION := $0308}
  42. {$ifc not defined USE_CFSTR_CONSTANT_MACROS}
  43. {$setc USE_CFSTR_CONSTANT_MACROS := TRUE}
  44. {$endc}
  45. {$ifc defined CPUPOWERPC and defined CPUI386}
  46. {$error Conflicting initial definitions for CPUPOWERPC and CPUI386}
  47. {$endc}
  48. {$ifc defined FPC_BIG_ENDIAN and defined FPC_LITTLE_ENDIAN}
  49. {$error Conflicting initial definitions for FPC_BIG_ENDIAN and FPC_LITTLE_ENDIAN}
  50. {$endc}
  51. {$ifc not defined __ppc__ and defined CPUPOWERPC32}
  52. {$setc __ppc__ := 1}
  53. {$elsec}
  54. {$setc __ppc__ := 0}
  55. {$endc}
  56. {$ifc not defined __ppc64__ and defined CPUPOWERPC64}
  57. {$setc __ppc64__ := 1}
  58. {$elsec}
  59. {$setc __ppc64__ := 0}
  60. {$endc}
  61. {$ifc not defined __i386__ and defined CPUI386}
  62. {$setc __i386__ := 1}
  63. {$elsec}
  64. {$setc __i386__ := 0}
  65. {$endc}
  66. {$ifc not defined __x86_64__ and defined CPUX86_64}
  67. {$setc __x86_64__ := 1}
  68. {$elsec}
  69. {$setc __x86_64__ := 0}
  70. {$endc}
  71. {$ifc not defined __arm__ and defined CPUARM}
  72. {$setc __arm__ := 1}
  73. {$elsec}
  74. {$setc __arm__ := 0}
  75. {$endc}
  76. {$ifc defined cpu64}
  77. {$setc __LP64__ := 1}
  78. {$elsec}
  79. {$setc __LP64__ := 0}
  80. {$endc}
  81. {$ifc defined __ppc__ and __ppc__ and defined __i386__ and __i386__}
  82. {$error Conflicting definitions for __ppc__ and __i386__}
  83. {$endc}
  84. {$ifc defined __ppc__ and __ppc__}
  85. {$setc TARGET_CPU_PPC := TRUE}
  86. {$setc TARGET_CPU_PPC64 := FALSE}
  87. {$setc TARGET_CPU_X86 := FALSE}
  88. {$setc TARGET_CPU_X86_64 := FALSE}
  89. {$setc TARGET_CPU_ARM := FALSE}
  90. {$setc TARGET_OS_MAC := TRUE}
  91. {$setc TARGET_OS_IPHONE := FALSE}
  92. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  93. {$setc TARGET_OS_EMBEDDED := FALSE}
  94. {$elifc defined __ppc64__ and __ppc64__}
  95. {$setc TARGET_CPU_PPC := FALSE}
  96. {$setc TARGET_CPU_PPC64 := TRUE}
  97. {$setc TARGET_CPU_X86 := FALSE}
  98. {$setc TARGET_CPU_X86_64 := FALSE}
  99. {$setc TARGET_CPU_ARM := FALSE}
  100. {$setc TARGET_OS_MAC := TRUE}
  101. {$setc TARGET_OS_IPHONE := FALSE}
  102. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  103. {$setc TARGET_OS_EMBEDDED := FALSE}
  104. {$elifc defined __i386__ and __i386__}
  105. {$setc TARGET_CPU_PPC := FALSE}
  106. {$setc TARGET_CPU_PPC64 := FALSE}
  107. {$setc TARGET_CPU_X86 := TRUE}
  108. {$setc TARGET_CPU_X86_64 := FALSE}
  109. {$setc TARGET_CPU_ARM := FALSE}
  110. {$ifc defined(iphonesim)}
  111. {$setc TARGET_OS_MAC := FALSE}
  112. {$setc TARGET_OS_IPHONE := TRUE}
  113. {$setc TARGET_IPHONE_SIMULATOR := TRUE}
  114. {$elsec}
  115. {$setc TARGET_OS_MAC := TRUE}
  116. {$setc TARGET_OS_IPHONE := FALSE}
  117. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  118. {$endc}
  119. {$setc TARGET_OS_EMBEDDED := FALSE}
  120. {$elifc defined __x86_64__ and __x86_64__}
  121. {$setc TARGET_CPU_PPC := FALSE}
  122. {$setc TARGET_CPU_PPC64 := FALSE}
  123. {$setc TARGET_CPU_X86 := FALSE}
  124. {$setc TARGET_CPU_X86_64 := TRUE}
  125. {$setc TARGET_CPU_ARM := FALSE}
  126. {$setc TARGET_OS_MAC := TRUE}
  127. {$setc TARGET_OS_IPHONE := FALSE}
  128. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  129. {$setc TARGET_OS_EMBEDDED := FALSE}
  130. {$elifc defined __arm__ and __arm__}
  131. {$setc TARGET_CPU_PPC := FALSE}
  132. {$setc TARGET_CPU_PPC64 := FALSE}
  133. {$setc TARGET_CPU_X86 := FALSE}
  134. {$setc TARGET_CPU_X86_64 := FALSE}
  135. {$setc TARGET_CPU_ARM := TRUE}
  136. { will require compiler define when/if other Apple devices with ARM cpus ship }
  137. {$setc TARGET_OS_MAC := FALSE}
  138. {$setc TARGET_OS_IPHONE := TRUE}
  139. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  140. {$setc TARGET_OS_EMBEDDED := TRUE}
  141. {$elsec}
  142. {$error __ppc__ nor __ppc64__ nor __i386__ nor __x86_64__ nor __arm__ is defined.}
  143. {$endc}
  144. {$ifc defined __LP64__ and __LP64__ }
  145. {$setc TARGET_CPU_64 := TRUE}
  146. {$elsec}
  147. {$setc TARGET_CPU_64 := FALSE}
  148. {$endc}
  149. {$ifc defined FPC_BIG_ENDIAN}
  150. {$setc TARGET_RT_BIG_ENDIAN := TRUE}
  151. {$setc TARGET_RT_LITTLE_ENDIAN := FALSE}
  152. {$elifc defined FPC_LITTLE_ENDIAN}
  153. {$setc TARGET_RT_BIG_ENDIAN := FALSE}
  154. {$setc TARGET_RT_LITTLE_ENDIAN := TRUE}
  155. {$elsec}
  156. {$error Neither FPC_BIG_ENDIAN nor FPC_LITTLE_ENDIAN are defined.}
  157. {$endc}
  158. {$setc ACCESSOR_CALLS_ARE_FUNCTIONS := TRUE}
  159. {$setc CALL_NOT_IN_CARBON := FALSE}
  160. {$setc OLDROUTINENAMES := FALSE}
  161. {$setc OPAQUE_TOOLBOX_STRUCTS := TRUE}
  162. {$setc OPAQUE_UPP_TYPES := TRUE}
  163. {$setc OTCARBONAPPLICATION := TRUE}
  164. {$setc OTKERNEL := FALSE}
  165. {$setc PM_USE_SESSION_APIS := TRUE}
  166. {$setc TARGET_API_MAC_CARBON := TRUE}
  167. {$setc TARGET_API_MAC_OS8 := FALSE}
  168. {$setc TARGET_API_MAC_OSX := TRUE}
  169. {$setc TARGET_CARBON := TRUE}
  170. {$setc TARGET_CPU_68K := FALSE}
  171. {$setc TARGET_CPU_MIPS := FALSE}
  172. {$setc TARGET_CPU_SPARC := FALSE}
  173. {$setc TARGET_OS_UNIX := FALSE}
  174. {$setc TARGET_OS_WIN32 := FALSE}
  175. {$setc TARGET_RT_MAC_68881 := FALSE}
  176. {$setc TARGET_RT_MAC_CFM := FALSE}
  177. {$setc TARGET_RT_MAC_MACHO := TRUE}
  178. {$setc TYPED_FUNCTION_POINTERS := TRUE}
  179. {$setc TYPE_BOOL := FALSE}
  180. {$setc TYPE_EXTENDED := FALSE}
  181. {$setc TYPE_LONGLONG := TRUE}
  182. uses MacTypes,MacOSXPosix,cssmerr,cssmtype,x509defs,certextensions;
  183. {$endc} {not MACOSALLINCLUDE}
  184. {$ifc TARGET_OS_MAC}
  185. {$packrecords c}
  186. { Guids for standard Apple addin modules. }
  187. { CSSM itself: (87191ca0-0fc9-11d4-849a-000502b52122) }
  188. var gGuidCssm: CSSM_GUID; external name '_gGuidCssm'; (* attribute const *)
  189. { File based DL (aka "Keychain DL"): (87191ca1-0fc9-11d4-849a-000502b52122) }
  190. var gGuidAppleFileDL: CSSM_GUID; external name '_gGuidAppleFileDL'; (* attribute const *)
  191. { Core CSP (local space): (87191ca2-0fc9-11d4-849a-000502b52122) }
  192. var gGuidAppleCSP: CSSM_GUID; external name '_gGuidAppleCSP'; (* attribute const *)
  193. { Secure CSP/DL (aka "Keychain CSPDL): (87191ca3-0fc9-11d4-849a-000502b52122) }
  194. var gGuidAppleCSPDL: CSSM_GUID; external name '_gGuidAppleCSPDL'; (* attribute const *)
  195. { X509 Certificate CL: (87191ca4-0fc9-11d4-849a-000502b52122) }
  196. var gGuidAppleX509CL: CSSM_GUID; external name '_gGuidAppleX509CL'; (* attribute const *)
  197. { X509 Certificate TP: (87191ca5-0fc9-11d4-849a-000502b52122) }
  198. var gGuidAppleX509TP: CSSM_GUID; external name '_gGuidAppleX509TP'; (* attribute const *)
  199. { DLAP/OpenDirectory access DL: (87191ca6-0fc9-11d4-849a-000502b52122) }
  200. var gGuidAppleLDAPDL: CSSM_GUID; external name '_gGuidAppleLDAPDL'; (* attribute const *)
  201. { TP for ".mac" related policies: (87191ca7-0fc9-11d4-849a-000502b52122) }
  202. var gGuidAppleDotMacTP: CSSM_GUID; external name '_gGuidAppleDotMacTP'; (* attribute const *)
  203. { Smartcard CSP/DL: (87191ca8-0fc9-11d4-849a-000502b52122) }
  204. var gGuidAppleSdCSPDL: CSSM_GUID; external name '_gGuidAppleSdCSPDL'; (* attribute const *)
  205. { DL for ".mac" certificate access: (87191ca9-0fc9-11d4-849a-000502b52122) }
  206. var gGuidAppleDotMacDL: CSSM_GUID; external name '_gGuidAppleDotMacDL'; (* attribute const *)
  207. { Apple defined WORDID values }
  208. const
  209. CSSM_WORDID_KEYCHAIN_PROMPT = CSSM_WORDID_VENDOR_START;
  210. CSSM_WORDID_KEYCHAIN_LOCK = CSSM_WORDID_VENDOR_START + 1;
  211. CSSM_WORDID_KEYCHAIN_CHANGE_LOCK = CSSM_WORDID_VENDOR_START + 2;
  212. CSSM_WORDID_PROCESS = CSSM_WORDID_VENDOR_START + 3;
  213. CSSM_WORDID__RESERVED_1 = CSSM_WORDID_VENDOR_START + 4; { was used in 10.2 test seeds; no longer in use }
  214. CSSM_WORDID_SYMMETRIC_KEY = CSSM_WORDID_VENDOR_START + 5;
  215. CSSM_WORDID_SYSTEM = CSSM_WORDID_VENDOR_START + 6;
  216. CSSM_WORDID_KEY = CSSM_WORDID_VENDOR_START + 7;
  217. CSSM_WORDID_PIN = CSSM_WORDID_VENDOR_START + 8;
  218. CSSM_WORDID_PREAUTH = CSSM_WORDID_VENDOR_START + 9;
  219. CSSM_WORDID_PREAUTH_SOURCE = CSSM_WORDID_VENDOR_START + 10;
  220. CSSM_WORDID_ASYMMETRIC_KEY = CSSM_WORDID_VENDOR_START + 11;
  221. CSSM_WORDID__FIRST_UNUSED = CSSM_WORDID_VENDOR_START + 12;
  222. { Apple defined ACL subject and credential types }
  223. const
  224. CSSM_ACL_SUBJECT_TYPE_KEYCHAIN_PROMPT = CSSM_WORDID_KEYCHAIN_PROMPT;
  225. CSSM_ACL_SUBJECT_TYPE_PROCESS = CSSM_WORDID_PROCESS;
  226. CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE = CSSM_WORDID_SIGNATURE;
  227. CSSM_ACL_SUBJECT_TYPE_COMMENT = CSSM_WORDID_COMMENT;
  228. CSSM_ACL_SUBJECT_TYPE_SYMMETRIC_KEY = CSSM_WORDID_SYMMETRIC_KEY;
  229. CSSM_ACL_SUBJECT_TYPE_PREAUTH = CSSM_WORDID_PREAUTH;
  230. CSSM_ACL_SUBJECT_TYPE_PREAUTH_SOURCE = CSSM_WORDID_PREAUTH_SOURCE;
  231. CSSM_ACL_SUBJECT_TYPE_ASYMMETRIC_KEY = CSSM_WORDID_ASYMMETRIC_KEY;
  232. const
  233. CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT = CSSM_WORDID_KEYCHAIN_PROMPT;
  234. CSSM_SAMPLE_TYPE_KEYCHAIN_LOCK = CSSM_WORDID_KEYCHAIN_LOCK;
  235. CSSM_SAMPLE_TYPE_KEYCHAIN_CHANGE_LOCK = CSSM_WORDID_KEYCHAIN_CHANGE_LOCK;
  236. CSSM_SAMPLE_TYPE_PROCESS = CSSM_WORDID_PROCESS;
  237. CSSM_SAMPLE_TYPE_COMMENT = CSSM_WORDID_COMMENT;
  238. CSSM_SAMPLE_TYPE_RETRY_ID = CSSM_WORDID_PROPAGATE;
  239. CSSM_SAMPLE_TYPE_SYMMETRIC_KEY = CSSM_WORDID_SYMMETRIC_KEY;
  240. CSSM_SAMPLE_TYPE_PREAUTH = CSSM_WORDID_PREAUTH;
  241. CSSM_SAMPLE_TYPE_ASYMMETRIC_KEY = CSSM_WORDID_ASYMMETRIC_KEY;
  242. // there is no CSSM_SAMPLE_TYPE_PREAUTH_SOURCE
  243. { Apple-defined ACL authorization tags }
  244. const
  245. CSSM_ACL_AUTHORIZATION_CHANGE_ACL = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START;
  246. CSSM_ACL_AUTHORIZATION_CHANGE_OWNER = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START + 1;
  247. // the "pre-auth" tags form a contiguous range of (up to) 64K pre-authorizations
  248. CSSM_ACL_AUTHORIZATION_PREAUTH_BASE = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START + $1000000;
  249. CSSM_ACL_AUTHORIZATION_PREAUTH_END = CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + $10000;
  250. { pre-authorization conversions (auth-tag to slot and back) }
  251. {
  252. #define CSSM_ACL_AUTHORIZATION_PREAUTH(slot) \
  253. (CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + (slot))
  254. #define CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth) \
  255. ((auth) - CSSM_ACL_AUTHORIZATION_PREAUTH_BASE)
  256. #define CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth) \
  257. ((auth) >= CSSM_ACL_AUTHORIZATION_PREAUTH_BASE && \
  258. (auth) < CSSM_ACL_AUTHORIZATION_PREAUTH_END)
  259. }
  260. function CSSM_ACL_AUTHORIZATION_PREAUTH(slot: UInt32): UInt32; inline;
  261. function CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth: UInt32): UInt32; inline;
  262. function CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth: UInt32): Boolean; inline;
  263. { Parameters and structures for Apple-defined ACL subjects and samples }
  264. const
  265. { types of code signatures - item 1 of CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE subjects }
  266. CSSM_ACL_CODE_SIGNATURE_INVALID = 0; { standard OS X code signature }
  267. CSSM_ACL_CODE_SIGNATURE_OSX = 1; { standard OS X code signature }
  268. { ACL subjects of type PROCESS }
  269. const
  270. { PROCESS_SUBJECT mask fields }
  271. CSSM_ACL_MATCH_UID = $01; { match userid against uid field }
  272. CSSM_ACL_MATCH_GID = $02; { match groupid against gid field }
  273. CSSM_ACL_MATCH_HONOR_ROOT = $100; { let root (uid 0) match any userid }
  274. CSSM_ACL_MATCH_BITS = CSSM_ACL_MATCH_UID or CSSM_ACL_MATCH_GID;
  275. const
  276. { PROCESS_SUBJECT structure version field }
  277. CSSM_ACL_PROCESS_SELECTOR_CURRENT_VERSION = $101;
  278. type
  279. cssm_acl_process_subject_selectorPtr = ^cssm_acl_process_subject_selector;
  280. cssm_acl_process_subject_selector = record
  281. { PROCESS_SUBJECT selector }
  282. version: UInt16; { version of this selector }
  283. mask: UInt16; { active fields mask }
  284. uid: UInt32; { effective user id match }
  285. gid: UInt32; { effective group id match }
  286. end;
  287. { ACL subjects of type KEYCHAIN_PROMPT }
  288. const
  289. { KEYCHAIN_PROMPT structure version field }
  290. CSSM_ACL_KEYCHAIN_PROMPT_CURRENT_VERSION = $101;
  291. const
  292. { KEYCHAIN_PROMPT operational flags }
  293. CSSM_ACL_KEYCHAIN_PROMPT_REQUIRE_PASSPHRASE = $0001; { require re-entering of passphrase }
  294. { the following bits are ignored by 10.4 and earlier }
  295. CSSM_ACL_KEYCHAIN_PROMPT_UNSIGNED = $0010; { prompt for unsigned clients }
  296. CSSM_ACL_KEYCHAIN_PROMPT_UNSIGNED_ACT = $0020; { UNSIGNED bit overrides system default }
  297. CSSM_ACL_KEYCHAIN_PROMPT_INVALID = $0040; { prompt for invalid signed clients }
  298. CSSM_ACL_KEYCHAIN_PROMPT_INVALID_ACT = $0080; { INVALID bit overrides system default }
  299. type
  300. cssm_acl_keychain_prompt_selectorPtr = ^cssm_acl_keychain_prompt_selector;
  301. cssm_acl_keychain_prompt_selector = record
  302. { KEYCHAIN_PROMPT selector }
  303. version: UInt16; { version of this selector }
  304. flags: UInt16; { flag bits }
  305. end;
  306. { ACL subjects of type CSSM_ACL_SUBJECT_TYPE_PREAUTH_SOURCE }
  307. type
  308. CSSM_ACL_PREAUTH_TRACKING_STATE = UInt32;
  309. const
  310. { preauth tracking state }
  311. CSSM_ACL_PREAUTH_TRACKING_COUNT_MASK = $ff; { mask for count status }
  312. CSSM_ACL_PREAUTH_TRACKING_BLOCKED = 0; { retries exhausted; the slot is blocked }
  313. { 0 .. 255 is a count of (re)tries remaining }
  314. { bits or'ed into any count given }
  315. CSSM_ACL_PREAUTH_TRACKING_UNKNOWN = $40000000; { status of slot is unknown (ignore count) }
  316. CSSM_ACL_PREAUTH_TRACKING_AUTHORIZED = $80000000; { the slot is currently authorized (or'ed in) }
  317. { Apple defined values of a CSSM_DB_ACCESS_TYPE }
  318. const
  319. CSSM_DB_ACCESS_RESET = $10000; { clear pre-authentications (or'ed bit) }
  320. { Apple defined algorithm IDs }
  321. const
  322. CSSM_ALGID_APPLE_YARROW = CSSM_ALGID_VENDOR_DEFINED;
  323. CSSM_ALGID_AES = CSSM_ALGID_VENDOR_DEFINED + 1; { RijnDael }
  324. CSSM_ALGID_FEE = CSSM_ALGID_VENDOR_DEFINED + 2; { FEE Key Generation }
  325. CSSM_ALGID_FEE_MD5 = CSSM_ALGID_VENDOR_DEFINED + 3; { FEE/ElGamal signature w/ MD5 hash }
  326. CSSM_ALGID_FEE_SHA1 = CSSM_ALGID_VENDOR_DEFINED + 4; { FEE/ElGamal signature w/ SHA1 hash }
  327. CSSM_ALGID_FEED = CSSM_ALGID_VENDOR_DEFINED + 5; { 1:1 FEE asymmetric encryption }
  328. CSSM_ALGID_FEEDEXP = CSSM_ALGID_VENDOR_DEFINED + 6; { 2:1 FEE asymmetric encryption }
  329. CSSM_ALGID_ASC = CSSM_ALGID_VENDOR_DEFINED + 7; { Apple Secure Compression }
  330. CSSM_ALGID_SHA1HMAC_LEGACY = CSSM_ALGID_VENDOR_DEFINED + 8; { HMAC/SHA1, legacy compatible }
  331. CSSM_ALGID_KEYCHAIN_KEY = CSSM_ALGID_VENDOR_DEFINED + 9; { derive or manipulate keychain master keys }
  332. CSSM_ALGID_PKCS12_PBE_ENCR = CSSM_ALGID_VENDOR_DEFINED + 10; { PKCS12, encrypt/decrypt key }
  333. CSSM_ALGID_PKCS12_PBE_MAC = CSSM_ALGID_VENDOR_DEFINED + 11; { PKCS12, MAC key }
  334. CSSM_ALGID_SECURE_PASSPHRASE = CSSM_ALGID_VENDOR_DEFINED + 12; { passphrase acquired by SecurityServer }
  335. CSSM_ALGID_PBE_OPENSSL_MD5 = CSSM_ALGID_VENDOR_DEFINED + 13; { traditional openssl key derivation }
  336. CSSM_ALGID_SHA256 = CSSM_ALGID_VENDOR_DEFINED + 14; { 256-bit SHA2 }
  337. CSSM_ALGID_SHA384 = CSSM_ALGID_VENDOR_DEFINED + 15; { 384-bit SHA2 }
  338. CSSM_ALGID_SHA512 = CSSM_ALGID_VENDOR_DEFINED + 16; { 512-bit SHA2 }
  339. CSSM_ALGID_ENTROPY_DEFAULT = CSSM_ALGID_VENDOR_DEFINED + 17; { default entropy source of (CSP) device, if any }
  340. CSSM_ALGID_SHA224 = CSSM_ALGID_VENDOR_DEFINED + 18; { SHA2, 224 bit }
  341. CSSM_ALGID_SHA224WithRSA = CSSM_ALGID_VENDOR_DEFINED + 19; { RSA signature on SHA224 digest }
  342. CSSM_ALGID_SHA256WithRSA = CSSM_ALGID_VENDOR_DEFINED + 20; { RSA signature on SHA256 digest }
  343. CSSM_ALGID_SHA384WithRSA = CSSM_ALGID_VENDOR_DEFINED + 21; { RSA signature on SHA384 digest }
  344. CSSM_ALGID_SHA512WithRSA = CSSM_ALGID_VENDOR_DEFINED + 22; { RSA signature on SHA512 digest }
  345. CSSM_ALGID_OPENSSH1 = CSSM_ALGID_VENDOR_DEFINED + 23; { OpenSSH v1 RSA key wrapping }
  346. CSSM_ALGID_SHA224WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 24; { ECDSA signature on SHA224 digest }
  347. CSSM_ALGID_SHA256WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 25; { ECDSA signature on SHA256 digest }
  348. CSSM_ALGID_SHA384WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 26; { ECDSA signature on SHA384 digest }
  349. CSSM_ALGID_SHA512WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 27; { ECDSA signature on SHA512 digest }
  350. CSSM_ALGID_ECDSA_SPECIFIED = CSSM_ALGID_VENDOR_DEFINED + 28; { ECDSA with separate digest algorithm specifier }
  351. CSSM_ALGID_ECDH_X963_KDF = CSSM_ALGID_VENDOR_DEFINED + 29; { ECDH with X9.63 key derivation }
  352. CSSM_ALGID__FIRST_UNUSED = CSSM_ALGID_VENDOR_DEFINED + 30;
  353. { Apple defined padding }
  354. const
  355. { RFC 2246 section E.2 for SSLv2 rollback detection }
  356. CSSM_PADDING_APPLE_SSLv2 = CSSM_PADDING_VENDOR_DEFINED;
  357. { Apple defined keyblob formats }
  358. const
  359. CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED = $80000000;
  360. const
  361. { X509 SubjectPublicKeyInfo }
  362. CSSM_KEYBLOB_RAW_FORMAT_X509 = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED;
  363. { OpenSSH v1 }
  364. CSSM_KEYBLOB_RAW_FORMAT_OPENSSH = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 1;
  365. { openssl-style DSA private key }
  366. CSSM_KEYBLOB_RAW_FORMAT_OPENSSL = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 2;
  367. { OpenSSH v2 }
  368. CSSM_KEYBLOB_RAW_FORMAT_OPENSSH2 = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 3;
  369. { Apple adds some "common" error codes. CDSA does not define an official start value for this. }
  370. const
  371. CSSM_CUSTOM_COMMON_ERROR_EXTENT = $00e0;
  372. CSSM_ERRCODE_NO_USER_INTERACTION = $00e0;
  373. CSSM_ERRCODE_USER_CANCELED = $00e1;
  374. CSSM_ERRCODE_SERVICE_NOT_AVAILABLE = $00e2;
  375. CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION = $00e3;
  376. CSSM_ERRCODE_DEVICE_RESET = $00e4;
  377. CSSM_ERRCODE_DEVICE_FAILED = $00e5;
  378. CSSM_ERRCODE_IN_DARK_WAKE = $00e6;
  379. const
  380. CSSMERR_CSSM_NO_USER_INTERACTION = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  381. CSSMERR_AC_NO_USER_INTERACTION = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  382. CSSMERR_CSP_NO_USER_INTERACTION = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  383. CSSMERR_CL_NO_USER_INTERACTION = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  384. CSSMERR_DL_NO_USER_INTERACTION = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  385. CSSMERR_TP_NO_USER_INTERACTION = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  386. CSSMERR_CSSM_USER_CANCELED = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  387. CSSMERR_AC_USER_CANCELED = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  388. CSSMERR_CSP_USER_CANCELED = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  389. CSSMERR_CL_USER_CANCELED = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  390. CSSMERR_DL_USER_CANCELED = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  391. CSSMERR_TP_USER_CANCELED = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  392. CSSMERR_CSSM_SERVICE_NOT_AVAILABLE = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  393. CSSMERR_AC_SERVICE_NOT_AVAILABLE = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  394. CSSMERR_CSP_SERVICE_NOT_AVAILABLE = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  395. CSSMERR_CL_SERVICE_NOT_AVAILABLE = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  396. CSSMERR_DL_SERVICE_NOT_AVAILABLE = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  397. CSSMERR_TP_SERVICE_NOT_AVAILABLE = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  398. CSSMERR_CSSM_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  399. CSSMERR_AC_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  400. CSSMERR_CSP_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  401. CSSMERR_CL_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  402. CSSMERR_DL_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  403. CSSMERR_TP_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  404. CSSMERR_CSSM_DEVICE_RESET = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  405. CSSMERR_AC_DEVICE_RESET = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  406. CSSMERR_CSP_DEVICE_RESET = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  407. CSSMERR_CL_DEVICE_RESET = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  408. CSSMERR_DL_DEVICE_RESET = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  409. CSSMERR_TP_DEVICE_RESET = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  410. CSSMERR_CSSM_DEVICE_FAILED = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  411. CSSMERR_AC_DEVICE_FAILED = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  412. CSSMERR_CSP_DEVICE_FAILED = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  413. CSSMERR_CL_DEVICE_FAILED = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  414. CSSMERR_DL_DEVICE_FAILED = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  415. CSSMERR_TP_DEVICE_FAILED = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  416. CSSMERR_CSSM_IN_DARK_WAKE = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  417. CSSMERR_AC_IN_DARK_WAKE = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  418. CSSMERR_CSP_IN_DARK_WAKE = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  419. CSSMERR_CL_IN_DARK_WAKE = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  420. CSSMERR_DL_IN_DARK_WAKE = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  421. CSSMERR_TP_IN_DARK_WAKE = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  422. { AppleCSPDL, AppleCSP private error codes. }
  423. const
  424. CSSMERR_CSP_APPLE_ADD_APPLICATION_ACL_SUBJECT = CSSM_CSP_PRIVATE_ERROR + 0;
  425. {
  426. * An attempt was made to use a public key which is incomplete due to
  427. * the lack of algorithm-specific parameters.
  428. }
  429. CSSMERR_CSP_APPLE_PUBLIC_KEY_INCOMPLETE = CSSM_CSP_PRIVATE_ERROR + 1;
  430. { a code signature match failed }
  431. CSSMERR_CSP_APPLE_SIGNATURE_MISMATCH = CSSM_CSP_PRIVATE_ERROR + 2;
  432. { Key StartDate/EndDate invalid }
  433. CSSMERR_CSP_APPLE_INVALID_KEY_START_DATE = CSSM_CSP_PRIVATE_ERROR + 3;
  434. CSSMERR_CSP_APPLE_INVALID_KEY_END_DATE = CSSM_CSP_PRIVATE_ERROR + 4;
  435. { Keychain Syncing error codes }
  436. CSSMERR_CSPDL_APPLE_DL_CONVERSION_ERROR = CSSM_CSP_PRIVATE_ERROR + 5;
  437. { SSLv2 padding check: rollback attack detected }
  438. CSSMERR_CSP_APPLE_SSLv2_ROLLBACK = CSSM_CSP_PRIVATE_ERROR + 6;
  439. { AppleFileDL record types. }
  440. const
  441. CSSM_DL_DB_RECORD_GENERIC_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 0;
  442. CSSM_DL_DB_RECORD_INTERNET_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 1;
  443. CSSM_DL_DB_RECORD_APPLESHARE_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 2;
  444. CSSM_DL_DB_RECORD_X509_CERTIFICATE = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000;
  445. CSSM_DL_DB_RECORD_USER_TRUST = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 1;
  446. CSSM_DL_DB_RECORD_X509_CRL = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 2;
  447. CSSM_DL_DB_RECORD_UNLOCK_REFERRAL = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 3;
  448. CSSM_DL_DB_RECORD_EXTENDED_ATTRIBUTE = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 4;
  449. CSSM_DL_DB_RECORD_METADATA = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $8000;
  450. { AppleFileDL extentions: passthrough ids }
  451. const
  452. // Toggle whether or not to autocommit after modifying the database.
  453. // The input parameter is a CSSM_BOOL, where TRUE turns autocommit on
  454. // and FALSE turns it off.
  455. CSSM_APPLEFILEDL_TOGGLE_AUTOCOMMIT = 0;
  456. // Commit any pending changes to the database.
  457. CSSM_APPLEFILEDL_COMMIT = 1;
  458. // Rollback and discard any pending changes to the database.
  459. CSSM_APPLEFILEDL_ROLLBACK = 2;
  460. { UNLOCK_REFERRAL "type" attribute values }
  461. const
  462. CSSM_APPLE_UNLOCK_TYPE_KEY_DIRECT = 1; // master secret key stored directly
  463. CSSM_APPLE_UNLOCK_TYPE_WRAPPED_PRIVATE = 2; // master key wrapped by public key
  464. { Apple DL private error codes. }
  465. const
  466. { The OpenParameters argument passed to CSSM_DL_DbCreate or CSSM_DL_DbOpen
  467. was neither NULL nor a pointer to a valid CSSM_APPLEDL_OPEN_PARAMETERS
  468. structure. }
  469. CSSMERR_APPLEDL_INVALID_OPEN_PARAMETERS = CSSM_DL_PRIVATE_ERROR + 0;
  470. { an operation failed because the disk was full }
  471. CSSMERR_APPLEDL_DISK_FULL = CSSM_DL_PRIVATE_ERROR + 1;
  472. { an operation failed because a disk quota was exceeded }
  473. CSSMERR_APPLEDL_QUOTA_EXCEEDED = CSSM_DL_PRIVATE_ERROR + 2;
  474. { an operation failed because a file was too large }
  475. CSSMERR_APPLEDL_FILE_TOO_BIG = CSSM_DL_PRIVATE_ERROR + 3;
  476. { a keychain database's internal information ("blob") is invalid }
  477. CSSMERR_APPLEDL_INVALID_DATABASE_BLOB = CSSM_DL_PRIVATE_ERROR + 4;
  478. CSSMERR_APPLEDL_INVALID_KEY_BLOB = CSSM_DL_PRIVATE_ERROR + 5;
  479. { the internal data format version for a database's internal information ("blob") is invalid }
  480. CSSMERR_APPLEDL_INCOMPATIBLE_DATABASE_BLOB = CSSM_DL_PRIVATE_ERROR + 6;
  481. CSSMERR_APPLEDL_INCOMPATIBLE_KEY_BLOB = CSSM_DL_PRIVATE_ERROR + 7;
  482. { Apple X509TP private error codes. }
  483. const
  484. { Host name mismatch }
  485. CSSMERR_APPLETP_HOSTNAME_MISMATCH = CSSM_TP_PRIVATE_ERROR + 0;
  486. { Non-understood extension with Critical flag true }
  487. CSSMERR_APPLETP_UNKNOWN_CRITICAL_EXTEN = CSSM_TP_PRIVATE_ERROR + 1;
  488. { Basic Constraints extension required per policy, but not present }
  489. CSSMERR_APPLETP_NO_BASIC_CONSTRAINTS = CSSM_TP_PRIVATE_ERROR + 2;
  490. { Invalid BasicConstraints.CA }
  491. CSSMERR_APPLETP_INVALID_CA = CSSM_TP_PRIVATE_ERROR + 3;
  492. { Invalid Authority Key ID }
  493. CSSMERR_APPLETP_INVALID_AUTHORITY_ID = CSSM_TP_PRIVATE_ERROR + 4;
  494. { Invalid Subject Key ID }
  495. CSSMERR_APPLETP_INVALID_SUBJECT_ID = CSSM_TP_PRIVATE_ERROR + 5;
  496. { Invalid Key Usage for policy }
  497. CSSMERR_APPLETP_INVALID_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 6;
  498. { Invalid Extended Key Usage for policy }
  499. CSSMERR_APPLETP_INVALID_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 7;
  500. { Invalid Subject/Authority Key ID Linkage }
  501. CSSMERR_APPLETP_INVALID_ID_LINKAGE = CSSM_TP_PRIVATE_ERROR + 8;
  502. { PathLengthConstraint exceeded }
  503. CSSMERR_APPLETP_PATH_LEN_CONSTRAINT = CSSM_TP_PRIVATE_ERROR + 9;
  504. { Cert group terminated at a root cert which did not self-verify }
  505. CSSMERR_APPLETP_INVALID_ROOT = CSSM_TP_PRIVATE_ERROR + 10;
  506. { CRL expired/not valid yet }
  507. CSSMERR_APPLETP_CRL_EXPIRED = CSSM_TP_PRIVATE_ERROR + 11;
  508. CSSMERR_APPLETP_CRL_NOT_VALID_YET = CSSM_TP_PRIVATE_ERROR + 12;
  509. { Cannot find appropriate CRL }
  510. CSSMERR_APPLETP_CRL_NOT_FOUND = CSSM_TP_PRIVATE_ERROR + 13;
  511. { specified CRL server down }
  512. CSSMERR_APPLETP_CRL_SERVER_DOWN = CSSM_TP_PRIVATE_ERROR + 14;
  513. { illegible CRL distribution point URL }
  514. CSSMERR_APPLETP_CRL_BAD_URI = CSSM_TP_PRIVATE_ERROR + 15;
  515. { Unknown critical cert/CRL extension }
  516. CSSMERR_APPLETP_UNKNOWN_CERT_EXTEN = CSSM_TP_PRIVATE_ERROR + 16;
  517. CSSMERR_APPLETP_UNKNOWN_CRL_EXTEN = CSSM_TP_PRIVATE_ERROR + 17;
  518. { CRL not verifiable to anchor or root }
  519. CSSMERR_APPLETP_CRL_NOT_TRUSTED = CSSM_TP_PRIVATE_ERROR + 18;
  520. { CRL verified to untrusted root }
  521. CSSMERR_APPLETP_CRL_INVALID_ANCHOR_CERT = CSSM_TP_PRIVATE_ERROR + 19;
  522. { CRL failed policy verification }
  523. CSSMERR_APPLETP_CRL_POLICY_FAIL = CSSM_TP_PRIVATE_ERROR + 20;
  524. { IssuingDistributionPoint extension violation }
  525. CSSMERR_APPLETP_IDP_FAIL = CSSM_TP_PRIVATE_ERROR + 21;
  526. { Cert not found at specified issuerAltName }
  527. CSSMERR_APPLETP_CERT_NOT_FOUND_FROM_ISSUER = CSSM_TP_PRIVATE_ERROR + 22;
  528. { Bad cert obtained from specified issuerAltName }
  529. CSSMERR_APPLETP_BAD_CERT_FROM_ISSUER = CSSM_TP_PRIVATE_ERROR + 23;
  530. { S/MIME Email address mismatch }
  531. CSSMERR_APPLETP_SMIME_EMAIL_ADDRS_NOT_FOUND = CSSM_TP_PRIVATE_ERROR + 24;
  532. { Appropriate S/MIME ExtendedKeyUsage not found }
  533. CSSMERR_APPLETP_SMIME_BAD_EXT_KEY_USE = CSSM_TP_PRIVATE_ERROR + 25;
  534. { S/MIME KeyUsage incompatibility }
  535. CSSMERR_APPLETP_SMIME_BAD_KEY_USE = CSSM_TP_PRIVATE_ERROR + 26;
  536. { S/MIME, cert with KeyUsage flagged !critical }
  537. CSSMERR_APPLETP_SMIME_KEYUSAGE_NOT_CRITICAL = CSSM_TP_PRIVATE_ERROR + 27;
  538. { S/MIME, leaf with empty subject name and no email addrs
  539. * in SubjectAltName }
  540. CSSMERR_APPLETP_SMIME_NO_EMAIL_ADDRS = CSSM_TP_PRIVATE_ERROR + 28;
  541. { S/MIME, leaf with empty subject name, SubjectAltName
  542. * not critical }
  543. CSSMERR_APPLETP_SMIME_SUBJ_ALT_NAME_NOT_CRIT = CSSM_TP_PRIVATE_ERROR + 29;
  544. { Appropriate SSL ExtendedKeyUsage not found }
  545. CSSMERR_APPLETP_SSL_BAD_EXT_KEY_USE = CSSM_TP_PRIVATE_ERROR + 30;
  546. { unparseable OCSP response }
  547. CSSMERR_APPLETP_OCSP_BAD_RESPONSE = CSSM_TP_PRIVATE_ERROR + 31;
  548. { unparseable OCSP request }
  549. CSSMERR_APPLETP_OCSP_BAD_REQUEST = CSSM_TP_PRIVATE_ERROR + 32;
  550. { OCSP service unavailable }
  551. CSSMERR_APPLETP_OCSP_UNAVAILABLE = CSSM_TP_PRIVATE_ERROR + 33;
  552. { OCSP status: cert unrecognized }
  553. CSSMERR_APPLETP_OCSP_STATUS_UNRECOGNIZED = CSSM_TP_PRIVATE_ERROR + 34;
  554. { revocation check not successful for each cert }
  555. CSSMERR_APPLETP_INCOMPLETE_REVOCATION_CHECK = CSSM_TP_PRIVATE_ERROR + 35;
  556. { general network error }
  557. CSSMERR_APPLETP_NETWORK_FAILURE = CSSM_TP_PRIVATE_ERROR + 36;
  558. { OCSP response not verifiable to anchor or root }
  559. CSSMERR_APPLETP_OCSP_NOT_TRUSTED = CSSM_TP_PRIVATE_ERROR + 37;
  560. { OCSP response verified to untrusted root }
  561. CSSMERR_APPLETP_OCSP_INVALID_ANCHOR_CERT = CSSM_TP_PRIVATE_ERROR + 38;
  562. { OCSP response signature error }
  563. CSSMERR_APPLETP_OCSP_SIG_ERROR = CSSM_TP_PRIVATE_ERROR + 39;
  564. { No signer for OCSP response found }
  565. CSSMERR_APPLETP_OCSP_NO_SIGNER = CSSM_TP_PRIVATE_ERROR + 40;
  566. { OCSP responder status: malformed request }
  567. CSSMERR_APPLETP_OCSP_RESP_MALFORMED_REQ = CSSM_TP_PRIVATE_ERROR + 41;
  568. { OCSP responder status: internal error }
  569. CSSMERR_APPLETP_OCSP_RESP_INTERNAL_ERR = CSSM_TP_PRIVATE_ERROR + 42;
  570. { OCSP responder status: try later }
  571. CSSMERR_APPLETP_OCSP_RESP_TRY_LATER = CSSM_TP_PRIVATE_ERROR + 43;
  572. { OCSP responder status: signature required }
  573. CSSMERR_APPLETP_OCSP_RESP_SIG_REQUIRED = CSSM_TP_PRIVATE_ERROR + 44;
  574. { OCSP responder status: unauthorized }
  575. CSSMERR_APPLETP_OCSP_RESP_UNAUTHORIZED = CSSM_TP_PRIVATE_ERROR + 45;
  576. { OCSP response nonce did not match request }
  577. CSSMERR_APPLETP_OCSP_NONCE_MISMATCH = CSSM_TP_PRIVATE_ERROR + 46;
  578. { Illegal cert chain length for Code Signing }
  579. CSSMERR_APPLETP_CS_BAD_CERT_CHAIN_LENGTH = CSSM_TP_PRIVATE_ERROR + 47;
  580. { Missing Basic Constraints for Code Signing }
  581. CSSMERR_APPLETP_CS_NO_BASIC_CONSTRAINTS = CSSM_TP_PRIVATE_ERROR + 48;
  582. { Bad PathLengthConstraint for Code Signing }
  583. CSSMERR_APPLETP_CS_BAD_PATH_LENGTH = CSSM_TP_PRIVATE_ERROR + 49;
  584. { Missing ExtendedKeyUsage for Code Signing }
  585. CSSMERR_APPLETP_CS_NO_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 50;
  586. { Development style Code Signing Cert Detected }
  587. CSSMERR_APPLETP_CODE_SIGN_DEVELOPMENT = CSSM_TP_PRIVATE_ERROR + 51;
  588. { Illegal cert chain length for Resource Signing }
  589. CSSMERR_APPLETP_RS_BAD_CERT_CHAIN_LENGTH = CSSM_TP_PRIVATE_ERROR + 52;
  590. { bad extended key usage for Resource Signing }
  591. CSSMERR_APPLETP_RS_BAD_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 53;
  592. { Trust Setting: deny }
  593. CSSMERR_APPLETP_TRUST_SETTING_DENY = CSSM_TP_PRIVATE_ERROR + 54;
  594. { invalid empty SubjectName }
  595. CSSMERR_APPLETP_INVALID_EMPTY_SUBJECT = CSSM_TP_PRIVATE_ERROR + 55;
  596. { unknown critical Qualified Cert Statement ID }
  597. CSSMERR_APPLETP_UNKNOWN_QUAL_CERT_STATEMENT = CSSM_TP_PRIVATE_ERROR + 56;
  598. { Missing required extension }
  599. CSSMERR_APPLETP_MISSING_REQUIRED_EXTENSION = CSSM_TP_PRIVATE_ERROR + 57;
  600. { Extended key usage not marked critical }
  601. CSSMERR_APPLETP_EXT_KEYUSAGE_NOT_CRITICAL = CSSM_TP_PRIVATE_ERROR + 58;
  602. { Apple .mac TP private error codes. }
  603. const
  604. { cert request queued }
  605. CSSMERR_APPLE_DOTMAC_REQ_QUEUED = CSSM_TP_PRIVATE_ERROR + 100;
  606. { cert request redirected }
  607. CSSMERR_APPLE_DOTMAC_REQ_REDIRECT = CSSM_TP_PRIVATE_ERROR + 101;
  608. { general server-reported error }
  609. CSSMERR_APPLE_DOTMAC_REQ_SERVER_ERR = CSSM_TP_PRIVATE_ERROR + 102;
  610. { server-reported parameter error }
  611. CSSMERR_APPLE_DOTMAC_REQ_SERVER_PARAM = CSSM_TP_PRIVATE_ERROR + 103;
  612. { server-reported authorization error }
  613. CSSMERR_APPLE_DOTMAC_REQ_SERVER_AUTH = CSSM_TP_PRIVATE_ERROR + 104;
  614. { server-reported unimplemented }
  615. CSSMERR_APPLE_DOTMAC_REQ_SERVER_UNIMPL = CSSM_TP_PRIVATE_ERROR + 105;
  616. { server-reported not available }
  617. CSSMERR_APPLE_DOTMAC_REQ_SERVER_NOT_AVAIL = CSSM_TP_PRIVATE_ERROR + 106;
  618. { server-reported already exists }
  619. CSSMERR_APPLE_DOTMAC_REQ_SERVER_ALREADY_EXIST = CSSM_TP_PRIVATE_ERROR + 107;
  620. { server-reported service error }
  621. CSSMERR_APPLE_DOTMAC_REQ_SERVER_SERVICE_ERROR = CSSM_TP_PRIVATE_ERROR + 108;
  622. { request already pending for specified user }
  623. CSSMERR_APPLE_DOTMAC_REQ_IS_PENDING = CSSM_TP_PRIVATE_ERROR + 109;
  624. { no request pending for specified user }
  625. CSSMERR_APPLE_DOTMAC_NO_REQ_PENDING = CSSM_TP_PRIVATE_ERROR + 110;
  626. { CSR failed to verify }
  627. CSSMERR_APPLE_DOTMAC_CSR_VERIFY_FAIL = CSSM_TP_PRIVATE_ERROR + 111;
  628. { server reported failed consistency check }
  629. CSSMERR_APPLE_DOTMAC_FAILED_CONSISTENCY_CHECK = CSSM_TP_PRIVATE_ERROR + 112;
  630. const
  631. CSSM_APPLEDL_OPEN_PARAMETERS_VERSION = 1;
  632. type
  633. cssm_appledl_open_parameters_mask = SInt32;
  634. const
  635. kCSSM_APPLEDL_MASK_MODE = 1 shl 0;
  636. { Pass a CSSM_APPLEDL_OPEN_PARAMETERS_PTR as the OpenParameters argument to
  637. CSSM_DL_DbCreate or CSSM_DL_DbOpen. When using this struct, you must zero
  638. out the entire struct before setting any additional parameters to ensure
  639. forward compatibility. }
  640. type
  641. CSSM_APPLEDL_OPEN_PARAMETERS_PTR = ^cssm_appledl_open_parameters;
  642. CSSM_APPLEDL_OPEN_PARAMETERSPtr = ^cssm_appledl_open_parameters;
  643. cssm_appledl_open_parameters = record
  644. length: UInt32; { Should be sizeof(CSSM_APPLEDL_OPEN_PARAMETERS). }
  645. version: UInt32; { Should be CSSM_APPLEDL_OPEN_PARAMETERS_VERSION. }
  646. { If no OpenParameters are specified, autoCommit is on (!CSSM_FALSE) by default.
  647. When autoCommit is on (!CSSM_FALSE), changes made to the Db are written to disk
  648. before returning from each function.
  649. When autoCommit is off (CSSM_FALSE), changes made to the database are not guaranteed
  650. to be written to disk until the Db is closed. This is useful for bulk writes.
  651. Be aware that if autoCommit is off, changes made in previous calls to the DL might
  652. get rolled back if a new modification operation fails. }
  653. autoCommit: CSSM_BOOL;
  654. { Mask marking which of the following fields are to be used. }
  655. mask: UInt32;
  656. { When calling DbCreate, the initial mode to create the database file with; ignored on DbOpen. You must set the kCSSM_APPLEDL_MASK_MODE bit in mask or mode is ignored. }
  657. mode: mode_t;
  658. end;
  659. { AppleCSPDL passthough ids }
  660. const
  661. { Tell the SecurityServer to lock the database specified by the DLDBHandle argument.
  662. The InputParams and OutputParams arguments are ignored. }
  663. CSSM_APPLECSPDL_DB_LOCK = 0;
  664. { Tell the SecurityServer to unlock the database specified by the DLDBHandle argument.
  665. The InputParameters argument is a CSSM_DATA_PTR containing the password, or NULL if
  666. the SecurityServer should prompt for the password.
  667. The OutputParams argument is ignored.
  668. The SecurityServer will put up UI (though the SecurityAgent) when this function is called
  669. iff InputParameters is NULL. }
  670. CSSM_APPLECSPDL_DB_UNLOCK = 1;
  671. { Ask the SecurityServer to get the db settings specified for the database
  672. specified by the DLDBHandle argument. The settings are returned in the OutputParameters argument.
  673. The OutputParameters argument is a pointer to a CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR.
  674. Upon successful completion, the AppleCSPDL will have allocated a
  675. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS structure using the application-specified
  676. allocators for the DL attachment specified by the DLDBHandle argument. The structure will contain
  677. the current database settings for the specified database. The client should free the
  678. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR after it has finished using it.
  679. The InputParameters argument is ignored.
  680. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  681. CSSM_APPLECSPDL_DB_GET_SETTINGS = 2;
  682. { Tell the SecurityServer to set the db settings specified in InputParameters on the database
  683. specified by the DLDBHandle argument.
  684. The InputParameters argument is a const CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS * containing
  685. the new settings for the specified database.
  686. The OutputParams argument is ignored.
  687. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  688. CSSM_APPLECSPDL_DB_SET_SETTINGS = 3;
  689. { Ask the SecurityServer whether the database specified by the DLDBHandle argument is locked.
  690. The InputParameters argument is ignored.
  691. The OutputParameters argument is a pointer to a CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR.
  692. Upon successful completion, the AppleCSPDL will have allocated a
  693. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS structure using the application-specified
  694. allocators for the DL attachment specified by the DLDBHandle argument. The structure will contain
  695. the current lock status for the specified database. The client should free the
  696. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR after it has finished using it.
  697. The SecurityServer will put up UI (though the SecurityAgent) when this function is called. }
  698. CSSM_APPLECSPDL_DB_IS_LOCKED = 4;
  699. { Tell the SecurityServer to change the password for the database specified by
  700. the DLDBHandle.
  701. The InputParameters argument is a const CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERS * containing
  702. a CSSM_ACCESS_CREDENTIALS * which determines how the password will be changed. If the
  703. accessCredentials are NULL, the SecurityAgent will prompt for the old and the new password for the
  704. specified database. If credentials are specified, there should be 2 entries:
  705. 1. a 3-element list containing:
  706. CSSM_WORDID_KEYCHAIN_LOCK, CSSM_SAMPLE_TYPE_PASSWORD, and the old password.
  707. 2. a 3-element list containing:
  708. CSSM_WORDID_KEYCHAIN_CHANGE_LOCK, CSSM_SAMPLE_TYPE_PASSWORD, and the new password.
  709. The OutputParams argument is ignored.
  710. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  711. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD = 5;
  712. { Return the SecurityServer database handle for the database specified by the DLDBHandle }
  713. CSSM_APPLECSPDL_DB_GET_HANDLE = 6;
  714. { Given a CSSM_KEY for the CSPDL, return the SecurityServer key handle }
  715. CSSM_APPLESCPDL_CSP_GET_KEYHANDLE = 7;
  716. CSSM_APPLE_PRIVATE_CSPDL_CODE_8 = 8;
  717. CSSM_APPLE_PRIVATE_CSPDL_CODE_9 = 9;
  718. CSSM_APPLE_PRIVATE_CSPDL_CODE_10 = 10;
  719. CSSM_APPLE_PRIVATE_CSPDL_CODE_11 = 11;
  720. CSSM_APPLE_PRIVATE_CSPDL_CODE_12 = 12;
  721. CSSM_APPLE_PRIVATE_CSPDL_CODE_13 = 13;
  722. CSSM_APPLE_PRIVATE_CSPDL_CODE_14 = 14;
  723. CSSM_APPLE_PRIVATE_CSPDL_CODE_15 = 15;
  724. CSSM_APPLE_PRIVATE_CSPDL_CODE_16 = 16;
  725. { Given a CSSM_KEY_PTR in any format, obtain the SHA-1 hash of the
  726. * associated key blob.
  727. * Key is specified in CSSM_CSP_CreatePassThroughContext.
  728. * Hash is allocated bythe CSP, in the App's memory, and returned
  729. * in *outData. }
  730. CSSM_APPLECSP_KEYDIGEST = $100;
  731. { AppleCSPDL passthough parameters }
  732. type
  733. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR = ^cssm_applecspdl_db_settings_parameters;
  734. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERSPtr = ^cssm_applecspdl_db_settings_parameters;
  735. cssm_applecspdl_db_settings_parameters = record
  736. idleTimeout: UInt32; // seconds idle timeout lock
  737. lockOnSleep: UInt8; // lock database when system sleeps
  738. end;
  739. { AppleCSPDL passthough parameters }
  740. type
  741. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR = ^cssm_applecspdl_db_is_locked_parameters;
  742. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERSPtr = ^cssm_applecspdl_db_is_locked_parameters;
  743. cssm_applecspdl_db_is_locked_parameters = record
  744. isLocked: UInt8; // True iff the database is locked
  745. end;
  746. { AppleCSPDL passthough parameters }
  747. type
  748. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERS_PTR = ^cssm_applecspdl_db_change_password_parameters;
  749. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERSPtr = ^cssm_applecspdl_db_change_password_parameters;
  750. cssm_applecspdl_db_change_password_parameters = record
  751. accessCredentials: CSSM_ACCESS_CREDENTIALSPtr;
  752. end;
  753. { Custom wrapped key formats }
  754. const
  755. CSSM_KEYBLOB_WRAPPED_FORMAT_APPLE_CUSTOM = 100;
  756. CSSM_KEYBLOB_WRAPPED_FORMAT_OPENSSL = 101; // traditional openssl
  757. CSSM_KEYBLOB_WRAPPED_FORMAT_OPENSSH1 = 102; // OpenSSH v1
  758. {
  759. * Custom context attributes for AppleCSP.
  760. }
  761. const
  762. CSSM_ATTRIBUTE_VENDOR_DEFINED = $800000;
  763. const
  764. {
  765. * Public Key attribute for use with CSSM_ALGID_FEED.
  766. }
  767. CSSM_ATTRIBUTE_PUBLIC_KEY = (CSSM_ATTRIBUTE_DATA_KEY or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 0));
  768. {
  769. * FEE key attributes.
  770. * See CSSM_FEE_PRIME_TYPE_xxx, CSSM_FEE_CURVE_TYPE_xxx enums, below.
  771. }
  772. CSSM_ATTRIBUTE_FEE_PRIME_TYPE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 1));
  773. CSSM_ATTRIBUTE_FEE_CURVE_TYPE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 2));
  774. {
  775. * Apple Secure Compression (ComCryption) optimization.
  776. * See CSSM_ASC_OPTIMIZE_xxx, enums, below.
  777. }
  778. CSSM_ATTRIBUTE_ASC_OPTIMIZATION = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 3));
  779. {
  780. * RSA blinding. Value is integer, nonzero (blinding on) or zero.
  781. }
  782. CSSM_ATTRIBUTE_RSA_BLINDING = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 4));
  783. {
  784. * Additional public key from which to obtain algorithm-specific
  785. * parameters.
  786. }
  787. CSSM_ATTRIBUTE_PARAM_KEY = (CSSM_ATTRIBUTE_DATA_KEY or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 5));
  788. {
  789. * Prompt string for CSSM_ALGID_SECURE_PASSPHRASE key acquisition.
  790. * Data is a UTF8-encoded external representation of a CFString.
  791. }
  792. CSSM_ATTRIBUTE_PROMPT = (CSSM_ATTRIBUTE_DATA_CSSM_DATA or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 6));
  793. {
  794. * Alert panel title for CSSM_ALGID_SECURE_PASSPHRASE key acquisition.
  795. * Data is a UTF8-encoded external representation of a CFString.
  796. }
  797. CSSM_ATTRIBUTE_ALERT_TITLE = (CSSM_ATTRIBUTE_DATA_CSSM_DATA or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 7));
  798. {
  799. * Boolean to specify whether secure passphrase is being used to encrypt or to
  800. * recover data. In the former case the user will be prompted to enter the
  801. * passphrase twice. Value is integer, nonzero (verify passphrase) or zero.
  802. }
  803. CSSM_ATTRIBUTE_VERIFY_PASSPHRASE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 8));
  804. {
  805. * FEE key pair prime modulus types.
  806. }
  807. const
  808. CSSM_FEE_PRIME_TYPE_DEFAULT = 0; { default per key size }
  809. CSSM_FEE_PRIME_TYPE_MERSENNE = 1; { (2 ** q) - 1Ê}
  810. CSSM_FEE_PRIME_TYPE_FEE = 2; { (2 ** q) - k }
  811. CSSM_FEE_PRIME_TYPE_GENERAL = 3; { random prime }
  812. {
  813. * FEE curve types. Comments refer to equation
  814. *
  815. * y**2 = x**3 + c(x**2) + ax + b
  816. }
  817. const
  818. CSSM_FEE_CURVE_TYPE_DEFAULT = 0; { default per key size }
  819. CSSM_FEE_CURVE_TYPE_MONTGOMERY = 1; { a==1, b==0 }
  820. CSSM_FEE_CURVE_TYPE_WEIERSTRASS = 2; { c==0. IEEE P1363 compliant. }
  821. CSSM_FEE_CURVE_TYPE_ANSI_X9_62 = 3; { ANSI X9.62 compatible }
  822. {
  823. * Apple Secure Compression (ComCryption) optimization attributes.
  824. }
  825. const
  826. CSSM_ASC_OPTIMIZE_DEFAULT = 0;
  827. CSSM_ASC_OPTIMIZE_SIZE = 1; { max compression (currently the default) }
  828. CSSM_ASC_OPTIMIZE_SECURITY = 2; { currently not implemented }
  829. CSSM_ASC_OPTIMIZE_TIME = 3; { min runtime }
  830. CSSM_ASC_OPTIMIZE_TIME_SIZE = 4; { implies loss of security }
  831. CSSM_ASC_OPTIMIZE_ASCII = 5; { optimized for ASCC text, not implemented }
  832. {
  833. * Apple custom CSSM_KEYATTR_FLAGS.
  834. }
  835. const
  836. {
  837. * When set, indicates a public key which is incomplete (though
  838. * still valid) due to the lack of algorithm-specific parameters.
  839. }
  840. CSSM_KEYATTR_PARTIAL = $00010000;
  841. {
  842. * When set, public keys are stored encrypted. Default is to store
  843. * public keys in the clear. AppleCSPDL only.
  844. }
  845. CSSM_KEYATTR_PUBLIC_KEY_ENCRYPT = $00020000;
  846. {
  847. * Name/OID pair used in CSSM_APPLE_TP_CERT_REQUEST
  848. }
  849. type
  850. CSSM_APPLE_TP_NAME_OIDPtr = ^CSSM_APPLE_TP_NAME_OID;
  851. CSSM_APPLE_TP_NAME_OID = record
  852. strng: {const} CStringPtr;
  853. oid: {const} CSSM_OIDPtr;
  854. end;
  855. {
  856. * Certificate request passed to CSSM_TP_SubmitCredRequest() in the
  857. * CSSM_TP_AUTHORITY_REQUEST_TYPE.Requests field. Used for requesting
  858. * both locally-generated certs (CSSMOID_APPLE_TP_LOCAL_CERT_GEN) and
  859. * cert signing requests (CSSMOID_APPLE_TP_CSR_GEN).
  860. }
  861. type
  862. CSSM_APPLE_TP_CERT_REQUESTPtr = ^CSSM_APPLE_TP_CERT_REQUEST;
  863. CSSM_APPLE_TP_CERT_REQUEST = record
  864. cspHand: CSSM_CSP_HANDLE; // sign with this CSP
  865. clHand: CSSM_CL_HANDLE; // and this CL
  866. serialNumber: UInt32;
  867. numSubjectNames: UInt32;// size subjectNames[]
  868. subjectNames: CSSM_APPLE_TP_NAME_OIDPtr;
  869. {
  870. * Issuer name can be expressed in the simplified CSSM_APPLE_TP_NAME_OID
  871. * array, as is the subject name, or as an CSSM_X509_NAME, which is
  872. * typically obtained from a signing cert.
  873. * Exactly one of (issuerNames, issuerNameX509) must be non-NULL.
  874. }
  875. numIssuerNames: UInt32; // size issuerNames[]
  876. issuerNames: CSSM_APPLE_TP_NAME_OIDPtr; // optional; NULL implies root
  877. // (signer == subject)
  878. issuerNameX509: CSSM_X509_NAME_PTR;
  879. certPublicKey: {const} CSSM_KEYPtr;
  880. issuerPrivateKey: {const} CSSM_KEYPtr;
  881. { Unfortunately there is no practical way to map any algorithm
  882. * to its appropriate OID, and we need both.... }
  883. signatureAlg: CSSM_ALGORITHMS; // e.g., CSSM_ALGID_SHA1WithRSA
  884. signatureOid: CSSM_OID; // e.g., CSSMOID_SHA1WithRSA
  885. notBefore: UInt32; // relative to "now"
  886. notAfter: UInt32;
  887. numExtensions: UInt32;
  888. extensions: CE_DataAndTypePtr; // optional
  889. {
  890. * Optional challenge string for CSSMOID_APPLE_TP_CSR_GEN.
  891. }
  892. challengeString: {const} CStringPtr;
  893. end;
  894. {
  895. * Options for X509TP's CSSM_TP_CertGroupVerify for policy CSSMOID_APPLE_TP_SSL.
  896. * A pointer to, and length of, one of these is optionally placed in
  897. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  898. }
  899. const
  900. CSSM_APPLE_TP_SSL_OPTS_VERSION = 1;
  901. {
  902. * Values for CSSM_APPLE_TP_SSL_OPTIONS.flags.
  903. *
  904. * Set this flag when evaluating a client cert.
  905. }
  906. const
  907. CSSM_APPLE_TP_SSL_CLIENT = $00000001;
  908. type
  909. CSSM_APPLE_TP_SSL_OPTIONSPtr = ^CSSM_APPLE_TP_SSL_OPTIONS;
  910. CSSM_APPLE_TP_SSL_OPTIONS = record
  911. Version: UInt32; // CSSM_APPLE_TP_SSL_OPTS_VERSION
  912. {
  913. * The domain name of the server (e.g., "store.apple.com".) In the
  914. * SSL and TLS protocols, this must match the common name of the
  915. * subject cert. Expressed as a C string, optionally NULL terminated
  916. * if it is NULL terminated, the length field should include the NULL).
  917. }
  918. ServerNameLen: UInt32;
  919. ServerName: {const} CStringPtr; // optional
  920. { new fields for struct version 1 }
  921. Flags: UInt32;
  922. end;
  923. {
  924. * Options for X509TP's CSSM_TP_CertGroupVerify for policy
  925. * CSSMOID_APPLE_TP_REVOCATION_CRL. A pointer to, and length of, one
  926. * of these is optionally placed in
  927. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  928. }
  929. const
  930. CSSM_APPLE_TP_CRL_OPTS_VERSION = 0;
  931. type
  932. CSSM_APPLE_TP_CRL_OPT_FLAGS = UInt32;
  933. const
  934. // require CRL verification for each cert; default is "try"
  935. CSSM_TP_ACTION_REQUIRE_CRL_PER_CERT = $00000001;
  936. // enable fetch from network
  937. CSSM_TP_ACTION_FETCH_CRL_FROM_NET = $00000002;
  938. // if set and positive OCSP verify for given cert, no further revocation
  939. // checking need be done on that cert
  940. CSSM_TP_ACTION_CRL_SUFFICIENT = $00000004;
  941. // require CRL verification for certs which claim a CRL provider
  942. CSSM_TP_ACTION_REQUIRE_CRL_IF_PRESENT = $00000008;
  943. type
  944. CSSM_APPLE_TP_CRL_OPTIONSPtr = ^CSSM_APPLE_TP_CRL_OPTIONS;
  945. CSSM_APPLE_TP_CRL_OPTIONS = record
  946. Version: UInt32; // CSSM_APPLE_TP_CRL_OPTS_VERSION
  947. CrlFlags: CSSM_APPLE_TP_CRL_OPT_FLAGS;
  948. {
  949. * When non-NULL, store CRLs fetched from net here.
  950. * This is most likely a pointer to one of the
  951. * CSSM_TP_CALLERAUTH_CONTEXT.DBList entries but that
  952. * is not a strict requirement.
  953. }
  954. crlStore: CSSM_DL_DB_HANDLE_PTR;
  955. end;
  956. {
  957. * Options for X509TP's CSSM_TP_CertGroupVerify for policy
  958. * CSSMOID_APPLE_TP_SMIME. A pointer to, and length of, one
  959. * of these is optionally placed in
  960. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  961. }
  962. const
  963. CSSM_APPLE_TP_SMIME_OPTS_VERSION = 0;
  964. type
  965. CSSM_APPLE_TP_SMIME_OPTIONSPtr = ^CSSM_APPLE_TP_SMIME_OPTIONS;
  966. CSSM_APPLE_TP_SMIME_OPTIONS = record
  967. Version: UInt32; // CSSM_APPLE_TP_SMIME_OPTS_VERSION
  968. {
  969. * Intended usage of the leaf cert. The cert's KeyUsage extension,
  970. * if present, must be a superset of this.
  971. }
  972. IntendedUsage: CE_KeyUsage;
  973. {
  974. * The email address of the sender. If there is an email address
  975. * in the sender's cert, that email address must match this one.
  976. * Both (email address in the cert, and this one) are optional.
  977. * Expressed as a C string, optionally NULL terminated (i.e.,
  978. * SenderEmail[SenderEmailLen - 1] may or may not be NULL).
  979. }
  980. SenderEmailLen: UInt32;
  981. SenderEmail: {const} CStringPtr; // optional
  982. end;
  983. {
  984. * Optional ActionData for all X509TP CertGroupVerify policies.
  985. * A pointer to, and length of, one of these is optionally placed in
  986. * CSSM_TP_VERIFY_CONTEXT.ActionData.
  987. }
  988. type
  989. CSSM_APPLE_TP_ACTION_FLAGS = UInt32;
  990. const
  991. CSSM_TP_ACTION_ALLOW_EXPIRED = $00000001; // allow expired certs
  992. CSSM_TP_ACTION_LEAF_IS_CA = $00000002; // first cert is a CA
  993. CSSM_TP_ACTION_FETCH_CERT_FROM_NET = $00000004; // enable net fetch of CA cert
  994. CSSM_TP_ACTION_ALLOW_EXPIRED_ROOT = $00000008; // allow expired roots
  995. CSSM_TP_ACTION_REQUIRE_REV_PER_CERT = $00000010; // require positive revocation
  996. // check per cert
  997. CSSM_TP_ACTION_TRUST_SETTINGS = $00000020; // use TrustSettings instead of
  998. // anchors
  999. CSSM_TP_ACTION_IMPLICIT_ANCHORS = $00000040; // properly self-signed certs are
  1000. // treated as anchors implicitly
  1001. const
  1002. CSSM_APPLE_TP_ACTION_VERSION = 0;
  1003. type
  1004. CSSM_APPLE_TP_ACTION_DATAPtr = ^CSSM_APPLE_TP_ACTION_DATA;
  1005. CSSM_APPLE_TP_ACTION_DATA = record
  1006. Version: UInt32; // CSSM_APPLE_TP_ACTION_VERSION
  1007. ActionFlags: CSSM_APPLE_TP_ACTION_FLAGS; // CSSM_TP_ACTION_ALLOW_EXPIRED, etc.
  1008. end;
  1009. {
  1010. * Per-cert evidence returned from CSSM_TP_CertGroupVerify.
  1011. * An array of these is presented in CSSM_TP_VERIFY_CONTEXT_RESULT.Evidence[2].
  1012. * Same number of these as in the cert group in Evidence[1].
  1013. }
  1014. { First, an array of bits indicating various status of the cert. }
  1015. type
  1016. CSSM_TP_APPLE_CERT_STATUS = UInt32;
  1017. const
  1018. CSSM_CERT_STATUS_EXPIRED = $00000001;
  1019. CSSM_CERT_STATUS_NOT_VALID_YET = $00000002;
  1020. CSSM_CERT_STATUS_IS_IN_INPUT_CERTS = $00000004;
  1021. CSSM_CERT_STATUS_IS_IN_ANCHORS = $00000008;
  1022. CSSM_CERT_STATUS_IS_ROOT = $00000010;
  1023. CSSM_CERT_STATUS_IS_FROM_NET = $00000020;
  1024. { settings found in per-user Trust Settings }
  1025. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_USER = $00000040;
  1026. { settings found in Admin Trust Settings }
  1027. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_ADMIN = $00000080;
  1028. { settings found in System Trust Settings }
  1029. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_SYSTEM = $00000100;
  1030. { Trust Settings result = Trust }
  1031. CSSM_CERT_STATUS_TRUST_SETTINGS_TRUST = $00000200;
  1032. { Trust Settings result = Deny }
  1033. CSSM_CERT_STATUS_TRUST_SETTINGS_DENY = $00000400;
  1034. { Per-cert error ignored due to Trust Settings }
  1035. CSSM_CERT_STATUS_TRUST_SETTINGS_IGNORED_ERROR = $00000800;
  1036. type
  1037. CSSM_TP_APPLE_EVIDENCE_INFOArrayPtr = ^CSSM_TP_APPLE_EVIDENCE_INFOPtr;
  1038. CSSM_TP_APPLE_EVIDENCE_INFOPtr = ^CSSM_TP_APPLE_EVIDENCE_INFO;
  1039. CSSM_TP_APPLE_EVIDENCE_INFO = record
  1040. StatusBits: CSSM_TP_APPLE_CERT_STATUS;
  1041. NumStatusCodes: UInt32;
  1042. StatusCodes: CSSM_RETURNPtr;
  1043. { index into raw cert group or AnchorCerts depending on IS_IN_ANCHORS }
  1044. Index: UInt32;
  1045. { nonzero if cert came from a DLDB }
  1046. DlDbHandle: CSSM_DL_DB_HANDLE;
  1047. UniqueRecord: CSSM_DB_UNIQUE_RECORD_PTR;
  1048. end;
  1049. {
  1050. * CSSM_TP_VERIFY_CONTEXT_RESULT.Evidence[0], basically defines which version/flavor
  1051. * of remaining evidence is.
  1052. }
  1053. const
  1054. CSSM_TP_APPLE_EVIDENCE_VERSION = 0;
  1055. type
  1056. CSSM_TP_APPLE_EVIDENCE_HEADERPtr = ^CSSM_TP_APPLE_EVIDENCE_HEADER;
  1057. CSSM_TP_APPLE_EVIDENCE_HEADER = record
  1058. Version: UInt32;
  1059. end;
  1060. {
  1061. * Apple-specific CSSM_EVIDENCE_FORM values
  1062. *
  1063. * The form of the evidence returns from CSSM_TP_CertGroupVerify is:
  1064. *
  1065. * EvidenceForm contents of *Evidence
  1066. * ------------ ---------------------
  1067. * CSSM_EVIDENCE_FORM_APPLE_HEADER CSSM_TP_APPLE_EVIDENCE_HEADER
  1068. * CSSM_EVIDENCE_FORM_APPLE_CERTGROUP CSSM_CERTGROUP
  1069. * CSSM_EVIDENCE_FORM_APPLE_CERT_INFO array of CSSM_TP_APPLE_EVIDENCE_INFO, size
  1070. * CSSM_CERTGROUP.NumCerts
  1071. }
  1072. const
  1073. CSSM_EVIDENCE_FORM_APPLE_CUSTOM = $80000000;
  1074. const
  1075. CSSM_EVIDENCE_FORM_APPLE_HEADER = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 0;
  1076. CSSM_EVIDENCE_FORM_APPLE_CERTGROUP = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 1;
  1077. CSSM_EVIDENCE_FORM_APPLE_CERT_INFO = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 2;
  1078. { AppleX509CL extensions: passthrough ids }
  1079. const
  1080. {
  1081. * Obtain a signed Certificate Signing Request.
  1082. * Input = CSSM_APPLE_CL_CSR_REQUEST
  1083. * Output = allocated CSSM_DATA which points to a DER-encoded CSR.
  1084. }
  1085. CSSM_APPLEX509CL_OBTAIN_CSR = 0;
  1086. {
  1087. * Perform signature verify of a CSR.
  1088. * Input: CSSM_DATA referring to a DER-encoded CSR.
  1089. * Output: Nothing, returns CSSMERR_CL_VERIFICATION_FAILURE on
  1090. * on failure.
  1091. }
  1092. CSSM_APPLEX509CL_VERIFY_CSR = 1;
  1093. {
  1094. * Used in CL's CSSM_APPLEX509_OBTAIN_CSR Passthrough. This is the
  1095. * input; the output is a CSSM_DATA * containing the signed and
  1096. * DER-encoded CSR.
  1097. }
  1098. type
  1099. CSSM_APPLE_CL_CSR_REQUESTPtr = ^CSSM_APPLE_CL_CSR_REQUEST;
  1100. CSSM_APPLE_CL_CSR_REQUEST = record
  1101. subjectNameX509: CSSM_X509_NAME_PTR;
  1102. { Unfortunately there is no practical way to map any algorithm
  1103. * to its appropriate OID, and we need both.... }
  1104. signatureAlg: CSSM_ALGORITHMS; // e.g., CSSM_ALGID_SHA1WithRSA
  1105. signatureOid: CSSM_OID; // e.g., CSSMOID_SHA1WithRSA
  1106. cspHand: CSSM_CSP_HANDLE; // sign with this CSP
  1107. subjectPublicKey: {const} CSSM_KEYPtr;
  1108. subjectPrivateKey: {const} CSSM_KEYPtr;
  1109. {
  1110. * Optional challenge string.
  1111. }
  1112. challengeString: {const} CStringPtr;
  1113. end;
  1114. {
  1115. * When a CRL with no NextUpdate field is encountered, we use this time
  1116. * as the NextUpdate attribute when storing in a DB. It represents the
  1117. * virtual end of time in CSSM_TIMESTRING form.
  1118. }
  1119. const
  1120. CSSM_APPLE_CRL_END_OF_TIME = '99991231235959';
  1121. {
  1122. * Default filesystem names and locations for SecurityServer features
  1123. * (included here for lack of a better place)
  1124. }
  1125. const
  1126. kKeychainSuffix = '.keychain';
  1127. const
  1128. kSystemKeychainName = 'System.keychain';
  1129. const
  1130. kSystemKeychainDir = '/Library/Keychains/';
  1131. const
  1132. kSystemUnlockFile = '/var/db/SystemKey';
  1133. procedure cssmPerror( how: ConstCStringPtr; error: CSSM_RETURN ); external name '_cssmPerror';
  1134. { Convert between CSSM_OID and CSSM_ALGORITHMS }
  1135. function cssmOidToAlg( const (*var*) oid: CSSM_OID; var alg: CSSM_ALGORITHMS ): CBool; external name '_cssmOidToAlg';
  1136. function cssmAlgToOid( algId: CSSM_ALGORITHMS ): CSSM_OIDPtr; external name '_cssmAlgToOid';
  1137. {
  1138. * The MacOS OSStatus space has an embedding for UNIX errno values, similar to
  1139. * the way we embed CSSM_RETURN values in OSStatus. These are the base and limit
  1140. * values for this embedding.
  1141. }
  1142. const
  1143. errSecErrnoBase = 100000;
  1144. const
  1145. errSecErrnoLimit = 100255;
  1146. {$endc} {TARGET_OS_MAC}
  1147. {$ifc not defined MACOSALLINCLUDE or not MACOSALLINCLUDE}
  1148. implementation
  1149. {$ifc TARGET_OS_MAC}
  1150. function CSSM_ACL_AUTHORIZATION_PREAUTH(slot: UInt32): UInt32; inline;
  1151. begin
  1152. CSSM_ACL_AUTHORIZATION_PREAUTH:=CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + slot
  1153. end;
  1154. function CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth: UInt32): UInt32; inline;
  1155. begin
  1156. CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT:=auth - CSSM_ACL_AUTHORIZATION_PREAUTH_BASE
  1157. end;
  1158. function CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth: UInt32): Boolean; inline;
  1159. begin
  1160. CSSM_ACL_AUTHORIZATION_IS_PREAUTH:=
  1161. (auth >= CSSM_ACL_AUTHORIZATION_PREAUTH_BASE) and
  1162. (auth < CSSM_ACL_AUTHORIZATION_PREAUTH_END)
  1163. end;
  1164. {$endc} {TARGET_OS_MAC}
  1165. end.
  1166. {$endc} {not MACOSALLINCLUDE}