mechanism
|
algtag_to_mechanism(algtag)
Returns the key mechanism enumeration constant (CKM_*)
given an algorithm tag. |
|
|
SecItem
|
|
int
|
cert_crl_reason_from_name(name)
Given the name of a CERTCRLEntryReasonCode constant
return it's integer constant
The string comparison is case insensitive and will match with
or without the crlEntry prefix |
|
|
string
|
|
int
|
cert_general_name_type_from_name(name)
Given the name of a CERTGeneralNameType constant
return it's integer constant
The string comparison is case insensitive and will match with
or without the cert prefix |
|
|
string
|
|
['flag_name', ...]
|
cert_type_flags(flags,
repr_kind=AsEnumName)
Given an integer with NS_CERT_TYPE_*
(e.g. |
|
|
['flag_name', ...]
|
cert_usage_flags(flags,
repr_kind=AsEnumDescription)
Given an integer with certificateUsage*
(e.g. |
|
|
|
clear_ocsp_cache()
Removes all items currently stored in the OCSP cache. |
|
|
PK11Context
|
|
PK11Context
|
|
AlgorithmID
|
create_pbev2_algorithm_id(pbe_alg=SEC_OID_PKCS5_PBKDF2,
cipher_alg=SEC_OID_AES_256_CBC,
prf_alg=SEC_OID_HMAC_SHA1,
key_length=0,
iterations=100,
salt=None)
The default values are appropriate for most users desiring a PKCS5v2
PBE symmetric key. |
|
|
string or list of strings
|
data_to_hex(data,
octets_per_line=0,
separator=':')
Format the binary data as hex string(s). |
|
|
SignedCRL
|
decode_der_crl(der_crl,
type=SEC_CRL_TYPE,
decode_options=CRL_DECODE_DEFAULT_OPTIONS) |
|
|
list of (indent, string) tuples
|
der_universal_secitem_fmt_lines(sec_item,
level=0,
octets_per_line=0,
separator=':')
Given a SecItem in DER format which encodes a ASN.1 universal
type convert the item to a string and return a list of
(indent, string) tuples. |
|
|
|
disable_ocsp_checking(certdb=get_default_certdb())
Turns off OCSP checking for the given certificate database. |
|
|
|
|
|
|
|
enable_ocsp_checking(certdb=get_default_certdb())
Turns on OCSP checking for the given certificate database. |
|
|
|
|
|
|
|
|
|
|
|
|
PK11Slot
|
|
|
|
SecItem
|
generate_new_param(mechanism,
sym_key=None)
Return a SecItem containing a encryption param. |
|
|
string
|
|
(PK11Slot, ...)
|
get_all_tokens(mechanism=CKM_INVALID_MECHANISM,
need_rw=False,
load_certs=False,
pin_args=None)
Return a tuple of PK11Slot objects. |
|
|
|
get_best_slot(...)
get_best_slot(mechanism, [user_data1, ...]) -> PK11Slot |
|
|
int
|
get_block_size(mechanism,
sec_param=None)
Get the mechanism block size |
|
|
|
|
|
get_default_certdb()
Returns the default certificate database as a CertDB object |
|
|
PK11Slot
|
get_internal_key_slot()
Get the default internal key slot. |
|
|
PK11Slot
|
get_internal_slot()
Get the default internal slot. |
|
|
algtag
|
get_iv_length(mechanism)
Returns the length of the mechanism's initialization vector. |
|
|
int
|
get_pad_mechanism(mechanism)
Determine appropriate mechanism to use when padding is required. |
|
|
flag
|
get_use_pkix_for_validation()
Returns the current value of the flag used to enable or disable the
use of PKIX for certificate validation. |
|
|
|
hash_buf(...)
hash_buf(hash_alg, data) --> digest |
|
|
|
import_crl(...)
import_crl(slot, der_crl, url, type, import_options, decode_options, [user_data1, ...]) -> SignedCRL |
|
|
|
import_sym_key(...)
import_sym_key(slot, mechanism, origin, operation, key_data, [user_data1, ...]) -> PK11SymKey |
|
|
string
|
indented_format(line_fmt_tuples,
indent_len=4)
The function supports the display of complex objects which may be
composed of other complex objects. |
|
|
bool
|
is_fips()
Returns True if the internal module has FIPS enabled, False otherwise. |
|
|
int
|
key_mechanism_type_from_name(name)
Given the name of a key mechanism enumeration constant (CKM_*)
return it's integer constant
The string comparison is case insensitive and will match with
or without the CKM_ prefix |
|
|
string
|
|
['flag_name', ...]
|
key_usage_flags(flags,
repr_kind=AsEnumName)
Given an integer with KU_*
(e.g. |
|
|
|
|
[(level, str), ...]
|
|
|
|
algtag
|
mechanism_to_algtag(mechanism)
Returns the algtag given key mechanism enumeration constant (CKM_*)
Throws an KeyError exception if the mechanism is invalid. |
|
|
bool
|
need_pw_init()
Returns True if the internal slot needs to be initialized, False otherwise. |
|
|
string
|
nss_get_version()
Return a string of the NSS library version |
|
|
|
nss_init(cert_dir)
Sets up configuration files and performs other tasks required to run
Network Security Services. |
|
|
InitContext
|
|
['flag_name', ...]
|
nss_init_flags(flags,
repr_kind=AsEnumName)
Given an integer with NSS_INIT*
(e.g. |
|
|
|
nss_init_nodb()
Performs tasks required to run Network Security Services without setting up
configuration files. |
|
|
|
nss_init_read_write(cert_dir)
Sets up configuration files and performs other tasks required to run
Network Security Services. |
|
|
|
|
|
|
|
nss_shutdown()
Closes the key and certificate databases that were opened by nss_init(). |
|
|
|
|
|
|
string
|
|
string
|
oid_str(oid)
Given an oid return it's description as a string. |
|
|
int
|
oid_tag(oid)
Given an oid return it's tag constant. |
|
|
string
|
oid_tag_name(oid)
Given an oid return it's tag constant as a string. |
|
|
SecItem
|
param_from_algid(algid)
Return a SecItem containing a encryption param derived from a AlgorithmID. |
|
|
SecItem
|
param_from_iv(mechanism,
iv=None)
Return a SecItem to be used as the initialization vector for encryption/decryption. |
|
|
int
|
pk11_attribute_type_from_name(name)
Given the name of a PK11 attribute type constant (CKA_*)
return it's integer constant
The string comparison is case insensitive and will match with
or without the CKA_ prefix |
|
|
string
|
|
string
|
|
string
|
|
|
pk11_logout_all()
Logout of every slot for all modules. |
|
|
int
|
pkcs12_cipher_from_name(name)
Given the name of a PKCS12_* constant
return it's integer constant
The string comparison is case insensitive and will match with
or without the PKCS12_ prefix |
|
|
string
|
|
|
|
|
|
|
pkcs12_export(nickname,
pkcs12_password,
key_cipher=SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC,
cert_cipher=SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC,
pin_args=None)
pkcs12_export() is used to export a certificate and private key pair
from the NSS database in a protected manner. |
|
|
int
|
pkcs12_map_cipher(cipher,
key_length=0)
Given an cipher and optionally a key length, map that to a PKCS12 encryption
method returned as a SEC_OID tag. |
|
|
|
|
|
|
SecItem
|
pub_wrap_sym_key(mechanism,
pub_key,
sym_key)
Wraps a public key wrap (which only RSA can do). |
|
|
SecItem
|
read_der_from_file(file,
ascii=False)
Read the contents of a file and return as a SecItem object. |
|
|
buffer
|
read_hex(input,
separators=" ,
:\t\n")
Parse a string containing hexadecimal data and return a buffer
object containing the binary octets. |
|
|
|
set_ocsp_cache_settings(max_cache_entries,
min_secs_till_next_fetch,
max_secs_till_next_fetch)
Sets parameters that control NSS' internal OCSP cache. |
|
|
|
|
|
|
|
set_ocsp_timeout(seconds)
Configure the maximum time NSS will wait for an OCSP response. |
|
|
|
set_password_callback(callback)
Defines a callback function used by the NSS libraries whenever
information protected by a password needs to be retrieved from the key
or certificate databases. |
|
|
|
|
prev_flag
|
|
|
|
|
|
|
|
bool
|
token_exists(mechanism)
Return True if a token is available which can perform
the desired mechanism, False otherwise. |
|
|
(SecItem, ...)
|
x509_alt_name(sec_item,
repr_kind=AsString)
Return a tuple of GeneralNames according the representation kind. |
|
|
(str, ...)
|
x509_cert_type(bitstr,
repr_kind=AsEnumDescription)
Return a tuple of string name for each enabled bit in the key
usage bit string. |
|
|
(obj, ...)
|
x509_ext_key_usage(sec_item,
repr_kind=AsString)
Return a tuple of OID's according the representation kind. |
|
|
(str, ...)
|
x509_key_usage(bitstr,
repr_kind=AsEnumDescription)
Return a tuple of string name for each enabled bit in the key
usage bit string. |
|
|
|
AsDottedDecimal = 9
|
|
AsEnum = 5
|
|
AsEnumDescription = 7
|
|
AsEnumName = 6
|
|
AsIndex = 8
|
|
AsLabeledString = 4
|
|
AsObject = 0
|
|
AsString = 1
|
|
AsTypeEnum = 3
|
|
AsTypeString = 2
|
|
CERTDB_GOVT_APPROVED_CA = 512
|
|
CERTDB_NS_TRUSTED_CA = 32
|
|
CERTDB_SEND_WARN = 4
|
|
CERTDB_TERMINAL_RECORD = 1
|
|
CERTDB_TRUSTED = 2
|
|
CERTDB_TRUSTED_CA = 16
|
|
CERTDB_TRUSTED_CLIENT_CA = 128
|
|
CERTDB_USER = 64
|
|
CERTDB_VALID_CA = 8
|
|
CKA_AC_ISSUER = 131
|
|
CKA_ALLOWED_MECHANISMS = 1073743360
|
|
CKA_ALWAYS_AUTHENTICATE = 514
|
|
CKA_ALWAYS_SENSITIVE = 357
|
|
CKA_APPLICATION = 16
|
|
CKA_ATTR_TYPES = 133
|
|
CKA_AUTH_PIN_FLAGS = 513
|
|
CKA_BASE = 306
|
|
CKA_BITS_PER_PIXEL = 1030
|
|
CKA_CERTIFICATE_CATEGORY = 135
|
|
CKA_CERTIFICATE_TYPE = 128
|
|
CKA_CHAR_COLUMNS = 1028
|
|
CKA_CHAR_ROWS = 1027
|
|
CKA_CHAR_SETS = 1152
|
|
CKA_CHECK_VALUE = 144
|
|
CKA_CLASS = 0
|
|
CKA_COEFFICIENT = 296
|
|
CKA_COLOR = 1029
|
|
CKA_DECRYPT = 261
|
|
CKA_DEFAULT_CMS_ATTRIBUTES = 1282
|
|
CKA_DERIVE = 268
|
|
CKA_ECDSA_PARAMS = 384
|
|
CKA_EC_PARAMS = 384
|
|
CKA_EC_POINT = 385
|
|
CKA_ENCODING_METHODS = 1153
|
|
CKA_ENCRYPT = 260
|
|
CKA_END_DATE = 273
|
|
CKA_EXPONENT_1 = 294
|
|
CKA_EXPONENT_2 = 295
|
|
CKA_EXTRACTABLE = 354
|
|
CKA_HASH_OF_ISSUER_PUBLIC_KEY = 139
|
|
CKA_HASH_OF_SUBJECT_PUBLIC_KEY = 138
|
|
CKA_HAS_RESET = 770
|
|
CKA_HW_FEATURE_TYPE = 768
|
|
CKA_ID = 258
|
|
CKA_ISSUER = 129
|
|
CKA_JAVA_MIDP_SECURITY_DOMAIN = 136
|
|
CKA_KEY_GEN_MECHANISM = 358
|
|
CKA_KEY_TYPE = 256
|
|
CKA_LABEL = 3
|
|
CKA_LOCAL = 355
|
|
CKA_MECHANISM_TYPE = 1280
|
|
CKA_MIME_TYPES = 1154
|
|
CKA_MODIFIABLE = 368
|
|
CKA_MODULUS = 288
|
|
CKA_MODULUS_BITS = 289
|
|
CKA_NEVER_EXTRACTABLE = 356
|
|
CKA_OBJECT_ID = 18
|
|
CKA_OWNER = 132
|
|
CKA_PIXEL_X = 1024
|
|
CKA_PIXEL_Y = 1025
|
|
CKA_PRIME = 304
|
|
CKA_PRIME_1 = 292
|
|
CKA_PRIME_2 = 293
|
|
CKA_PRIME_BITS = 307
|
|
CKA_PRIVATE = 2
|
|
CKA_PRIVATE_EXPONENT = 291
|
|
CKA_PUBLIC_EXPONENT = 290
|
|
CKA_REQUIRED_CMS_ATTRIBUTES = 1281
|
|
CKA_RESET_ON_INIT = 769
|
|
CKA_RESOLUTION = 1026
|
|
CKA_SECONDARY_AUTH = 512
|
|
CKA_SENSITIVE = 259
|
|
CKA_SERIAL_NUMBER = 130
|
|
CKA_SIGN = 264
|
|
CKA_SIGN_RECOVER = 265
|
|
CKA_START_DATE = 272
|
|
CKA_SUBJECT = 257
|
|
CKA_SUBPRIME = 305
|
|
CKA_SUBPRIME_BITS = 308
|
|
CKA_SUB_PRIME_BITS = 308
|
|
CKA_SUPPORTED_CMS_ATTRIBUTES = 1283
|
|
CKA_TOKEN = 1
|
|
CKA_TRUSTED = 134
|
|
CKA_UNWRAP = 263
|
|
CKA_UNWRAP_TEMPLATE = 1073742354
|
|
CKA_URL = 137
|
|
CKA_VALUE = 17
|
|
CKA_VALUE_BITS = 352
|
|
CKA_VALUE_LEN = 353
|
|
CKA_VENDOR_DEFINED = 2147483648
|
|
CKA_VERIFY = 266
|
|
CKA_VERIFY_RECOVER = 267
|
|
CKA_WRAP = 262
|
|
CKA_WRAP_TEMPLATE = 1073742353
|
|
CKA_WRAP_WITH_TRUSTED = 528
|
|
CKM_AES_CBC = 4226
|
|
CKM_AES_CBC_ENCRYPT_DATA = 4357
|
|
CKM_AES_CBC_PAD = 4229
|
|
CKM_AES_ECB = 4225
|
|
CKM_AES_ECB_ENCRYPT_DATA = 4356
|
|
CKM_AES_KEY_GEN = 4224
|
|
CKM_AES_MAC = 4227
|
|
CKM_AES_MAC_GENERAL = 4228
|
|
CKM_BATON_CBC128 = 4147
|
|
CKM_BATON_COUNTER = 4148
|
|
CKM_BATON_ECB128 = 4145
|
|
CKM_BATON_ECB96 = 4146
|
|
CKM_BATON_KEY_GEN = 4144
|
|
CKM_BATON_SHUFFLE = 4149
|
|
CKM_BATON_WRAP = 4150
|
|
CKM_BLOWFISH_CBC = 4241
|
|
CKM_BLOWFISH_KEY_GEN = 4240
|
|
CKM_CAMELLIA_CBC = 1362
|
|
CKM_CAMELLIA_CBC_ENCRYPT_DATA = 1367
|
|
CKM_CAMELLIA_CBC_PAD = 1365
|
|
CKM_CAMELLIA_ECB = 1361
|
|
CKM_CAMELLIA_ECB_ENCRYPT_DATA = 1366
|
|
CKM_CAMELLIA_KEY_GEN = 1360
|
|
CKM_CAMELLIA_MAC = 1363
|
|
CKM_CAMELLIA_MAC_GENERAL = 1364
|
|
CKM_CAST128_CBC = 802
|
|
CKM_CAST128_CBC_PAD = 805
|
|
CKM_CAST128_ECB = 801
|
|
CKM_CAST128_KEY_GEN = 800
|
|
CKM_CAST128_MAC = 803
|
|
CKM_CAST128_MAC_GENERAL = 804
|
|
CKM_CAST3_CBC = 786
|
|
CKM_CAST3_CBC_PAD = 789
|
|
CKM_CAST3_ECB = 785
|
|
CKM_CAST3_KEY_GEN = 784
|
|
CKM_CAST3_MAC = 787
|
|
CKM_CAST3_MAC_GENERAL = 788
|
|
CKM_CAST5_CBC = 802
|
|
CKM_CAST5_CBC_PAD = 805
|
|
CKM_CAST5_ECB = 801
|
|
CKM_CAST5_KEY_GEN = 800
|
|
CKM_CAST5_MAC = 803
|
|
CKM_CAST5_MAC_GENERAL = 804
|
|
CKM_CAST_CBC = 770
|
|
CKM_CAST_CBC_PAD = 773
|
|
CKM_CAST_ECB = 769
|
|
CKM_CAST_KEY_GEN = 768
|
|
CKM_CAST_MAC = 771
|
|
CKM_CAST_MAC_GENERAL = 772
|
|
CKM_CDMF_CBC = 322
|
|
CKM_CDMF_CBC_PAD = 325
|
|
CKM_CDMF_ECB = 321
|
|
CKM_CDMF_KEY_GEN = 320
|
|
CKM_CDMF_MAC = 323
|
|
CKM_CDMF_MAC_GENERAL = 324
|
|
CKM_CMS_SIG = 1280
|
|
CKM_CONCATENATE_BASE_AND_DATA = 866
|
|
CKM_CONCATENATE_BASE_AND_KEY = 864
|
|
CKM_CONCATENATE_DATA_AND_BASE = 867
|
|
CKM_DES2_KEY_GEN = 304
|
|
CKM_DES3_CBC = 307
|
|
CKM_DES3_CBC_ENCRYPT_DATA = 4355
|
|
CKM_DES3_CBC_PAD = 310
|
|
CKM_DES3_ECB = 306
|
|
CKM_DES3_ECB_ENCRYPT_DATA = 4354
|
|
CKM_DES3_KEY_GEN = 305
|
|
CKM_DES3_MAC = 308
|
|
CKM_DES3_MAC_GENERAL = 309
|
|
CKM_DES_CBC = 290
|
|
CKM_DES_CBC_ENCRYPT_DATA = 4353
|
|
CKM_DES_CBC_PAD = 293
|
|
CKM_DES_CFB64 = 338
|
|
CKM_DES_CFB8 = 339
|
|
CKM_DES_ECB = 289
|
|
CKM_DES_ECB_ENCRYPT_DATA = 4352
|
|
CKM_DES_KEY_GEN = 288
|
|
CKM_DES_MAC = 291
|
|
CKM_DES_MAC_GENERAL = 292
|
|
CKM_DES_OFB64 = 336
|
|
CKM_DES_OFB8 = 337
|
|
CKM_DH_PKCS_DERIVE = 33
|
|
CKM_DH_PKCS_KEY_PAIR_GEN = 32
|
|
CKM_DH_PKCS_PARAMETER_GEN = 8193
|
|
CKM_DSA = 17
|
|
CKM_DSA_KEY_PAIR_GEN = 16
|
|
CKM_DSA_PARAMETER_GEN = 8192
|
|
CKM_DSA_SHA1 = 18
|
|
CKM_ECDH1_COFACTOR_DERIVE = 4177
|
|
CKM_ECDH1_DERIVE = 4176
|
|
CKM_ECDSA = 4161
|
|
CKM_ECDSA_KEY_PAIR_GEN = 4160
|
|
CKM_ECDSA_SHA1 = 4162
|
|
CKM_ECMQV_DERIVE = 4178
|
|
CKM_EC_KEY_PAIR_GEN = 4160
|
|
CKM_EXTRACT_KEY_FROM_KEY = 869
|
|
CKM_FASTHASH = 4208
|
|
CKM_FORTEZZA_TIMESTAMP = 4128
|
|
CKM_GENERIC_SECRET_KEY_GEN = 848
|
|
CKM_IDEA_CBC = 834
|
|
CKM_IDEA_CBC_PAD = 837
|
|
CKM_IDEA_ECB = 833
|
|
CKM_IDEA_KEY_GEN = 832
|
|
CKM_IDEA_MAC = 835
|
|
CKM_IDEA_MAC_GENERAL = 836
|
|
CKM_JUNIPER_CBC128 = 4194
|
|
CKM_JUNIPER_COUNTER = 4195
|
|
CKM_JUNIPER_ECB128 = 4193
|
|
CKM_JUNIPER_KEY_GEN = 4192
|
|
CKM_JUNIPER_SHUFFLE = 4196
|
|
CKM_JUNIPER_WRAP = 4197
|
|
CKM_KEA_KEY_DERIVE = 4113
|
|
CKM_KEA_KEY_PAIR_GEN = 4112
|
|
CKM_KEY_WRAP_LYNKS = 1024
|
|
CKM_KEY_WRAP_SET_OAEP = 1025
|
|
CKM_MD2 = 512
|
|
CKM_MD2_HMAC = 513
|
|
CKM_MD2_HMAC_GENERAL = 514
|
|
CKM_MD2_KEY_DERIVATION = 913
|
|
CKM_MD2_RSA_PKCS = 4
|
|
CKM_MD5 = 528
|
|
CKM_MD5_HMAC = 529
|
|
CKM_MD5_HMAC_GENERAL = 530
|
|
CKM_MD5_KEY_DERIVATION = 912
|
|
CKM_MD5_RSA_PKCS = 5
|
|
CKM_PBA_SHA1_WITH_SHA1_HMAC = 960
|
|
CKM_PBE_MD2_DES_CBC = 928
|
|
CKM_PBE_MD5_CAST128_CBC = 932
|
|
CKM_PBE_MD5_CAST3_CBC = 931
|
|
CKM_PBE_MD5_CAST5_CBC = 932
|
|
CKM_PBE_MD5_CAST_CBC = 930
|
|
CKM_PBE_MD5_DES_CBC = 929
|
|
CKM_PBE_SHA1_CAST128_CBC = 933
|
|
CKM_PBE_SHA1_CAST5_CBC = 933
|
|
CKM_PBE_SHA1_DES2_EDE_CBC = 937
|
|
CKM_PBE_SHA1_DES3_EDE_CBC = 936
|
|
CKM_PBE_SHA1_RC2_128_CBC = 938
|
|
CKM_PBE_SHA1_RC2_40_CBC = 939
|
|
CKM_PBE_SHA1_RC4_128 = 934
|
|
CKM_PBE_SHA1_RC4_40 = 935
|
|
CKM_PKCS5_PBKD2 = 944
|
|
CKM_RC2_CBC = 258
|
|
CKM_RC2_CBC_PAD = 261
|
|
CKM_RC2_ECB = 257
|
|
CKM_RC2_KEY_GEN = 256
|
|
CKM_RC2_MAC = 259
|
|
CKM_RC2_MAC_GENERAL = 260
|
|
CKM_RC4 = 273
|
|
CKM_RC4_KEY_GEN = 272
|
|
CKM_RC5_CBC = 818
|
|
CKM_RC5_CBC_PAD = 821
|
|
CKM_RC5_ECB = 817
|
|
CKM_RC5_KEY_GEN = 816
|
|
CKM_RC5_MAC = 819
|
|
CKM_RC5_MAC_GENERAL = 820
|
|
CKM_RIPEMD128 = 560
|
|
CKM_RIPEMD128_HMAC = 561
|
|
CKM_RIPEMD128_HMAC_GENERAL = 562
|
|
CKM_RIPEMD128_RSA_PKCS = 7
|
|
CKM_RIPEMD160 = 576
|
|
CKM_RIPEMD160_HMAC = 577
|
|
CKM_RIPEMD160_HMAC_GENERAL = 578
|
|
CKM_RIPEMD160_RSA_PKCS = 8
|
|
CKM_RSA_9796 = 2
|
|
CKM_RSA_PKCS = 1
|
|
CKM_RSA_PKCS_KEY_PAIR_GEN = 0
|
|
CKM_RSA_PKCS_OAEP = 9
|
|
CKM_RSA_PKCS_PSS = 13
|
|
CKM_RSA_X9_31 = 11
|
|
CKM_RSA_X9_31_KEY_PAIR_GEN = 10
|
|
CKM_RSA_X_509 = 3
|
|
CKM_SEED_CBC = 1618
|
|
CKM_SEED_CBC_ENCRYPT_DATA = 1623
|
|
CKM_SEED_CBC_PAD = 1621
|
|
CKM_SEED_ECB = 1617
|
|
CKM_SEED_ECB_ENCRYPT_DATA = 1622
|
|
CKM_SEED_KEY_GEN = 1616
|
|
CKM_SEED_MAC = 1619
|
|
CKM_SEED_MAC_GENERAL = 1620
|
|
CKM_SHA1_KEY_DERIVATION = 914
|
|
CKM_SHA1_RSA_PKCS = 6
|
|
CKM_SHA1_RSA_PKCS_PSS = 14
|
|
CKM_SHA1_RSA_X9_31 = 12
|
|
CKM_SHA224 = 597
|
|
CKM_SHA224_HMAC = 598
|
|
CKM_SHA224_HMAC_GENERAL = 599
|
|
CKM_SHA224_KEY_DERIVATION = 918
|
|
CKM_SHA224_RSA_PKCS = 70
|
|
CKM_SHA224_RSA_PKCS_PSS = 71
|
|
CKM_SHA256 = 592
|
|
CKM_SHA256_HMAC = 593
|
|
CKM_SHA256_HMAC_GENERAL = 594
|
|
CKM_SHA256_KEY_DERIVATION = 915
|
|
CKM_SHA256_RSA_PKCS = 64
|
|
CKM_SHA256_RSA_PKCS_PSS = 67
|
|
CKM_SHA384 = 608
|
|
CKM_SHA384_HMAC = 609
|
|
CKM_SHA384_HMAC_GENERAL = 610
|
|
CKM_SHA384_KEY_DERIVATION = 916
|
|
CKM_SHA384_RSA_PKCS = 65
|
|
CKM_SHA384_RSA_PKCS_PSS = 68
|
|
CKM_SHA512 = 624
|
|
CKM_SHA512_HMAC = 625
|
|
CKM_SHA512_HMAC_GENERAL = 626
|
|
CKM_SHA512_KEY_DERIVATION = 917
|
|
CKM_SHA512_RSA_PKCS = 66
|
|
CKM_SHA512_RSA_PKCS_PSS = 69
|
|
CKM_SHA_1 = 544
|
|
CKM_SHA_1_HMAC = 545
|
|
CKM_SHA_1_HMAC_GENERAL = 546
|
|
CKM_SKIPJACK_CBC64 = 4098
|
|
CKM_SKIPJACK_CFB16 = 4102
|
|
CKM_SKIPJACK_CFB32 = 4101
|
|
CKM_SKIPJACK_CFB64 = 4100
|
|
CKM_SKIPJACK_CFB8 = 4103
|
|
CKM_SKIPJACK_ECB64 = 4097
|
|
CKM_SKIPJACK_KEY_GEN = 4096
|
|
CKM_SKIPJACK_OFB64 = 4099
|
|
CKM_SKIPJACK_PRIVATE_WRAP = 4105
|
|
CKM_SKIPJACK_RELAYX = 4106
|
|
CKM_SKIPJACK_WRAP = 4104
|
|
CKM_SSL3_KEY_AND_MAC_DERIVE = 882
|
|
CKM_SSL3_MASTER_KEY_DERIVE = 881
|
|
CKM_SSL3_MASTER_KEY_DERIVE_DH = 883
|
|
CKM_SSL3_MD5_MAC = 896
|
|
CKM_SSL3_PRE_MASTER_KEY_GEN = 880
|
|
CKM_SSL3_SHA1_MAC = 897
|
|
CKM_TLS_KEY_AND_MAC_DERIVE = 886
|
|
CKM_TLS_MASTER_KEY_DERIVE = 885
|
|
CKM_TLS_MASTER_KEY_DERIVE_DH = 887
|
|
CKM_TLS_PRE_MASTER_KEY_GEN = 884
|
|
CKM_TLS_PRF = 888
|
|
CKM_TWOFISH_CBC = 4243
|
|
CKM_TWOFISH_KEY_GEN = 4242
|
|
CKM_WTLS_CLIENT_KEY_AND_MAC_DERIVE = 981
|
|
CKM_WTLS_MASTER_KEY_DERIVE = 977
|
|
CKM_WTLS_MASTER_KEY_DERIVE_DH_ECC = 978
|
|
CKM_WTLS_PRE_MASTER_KEY_GEN = 976
|
|
CKM_WTLS_PRF = 979
|
|
CKM_WTLS_SERVER_KEY_AND_MAC_DERIVE = 980
|
|
CKM_X9_42_DH_DERIVE = 49
|
|
CKM_X9_42_DH_HYBRID_DERIVE = 50
|
|
CKM_X9_42_DH_KEY_PAIR_GEN = 48
|
|
CKM_X9_42_DH_PARAMETER_GEN = 8194
|
|
CKM_X9_42_MQV_DERIVE = 51
|
|
CKM_XOR_BASE_AND_DATA = 868
|
|
CRL_DECODE_ADOPT_HEAP_DER = 8
|
|
CRL_DECODE_DEFAULT_OPTIONS = 0
|
|
CRL_DECODE_DONT_COPY_DER = 1
|
|
CRL_DECODE_KEEP_BAD_CRL = 4
|
|
CRL_DECODE_SKIP_ENTRIES = 2
|
|
CRL_IMPORT_BYPASS_CHECKS = 1
|
|
CRL_IMPORT_DEFAULT_OPTIONS = 0
|
|
HEX_SEPARATOR_DEFAULT = ' : '
|
|
KU_ALL = 255
|
|
KU_CRL_SIGN = 2
|
|
KU_DATA_ENCIPHERMENT = 16
|
|
KU_DIGITAL_SIGNATURE = 128
|
|
KU_DIGITAL_SIGNATURE_OR_NON_REPUDIATION = 8192
|
|
KU_ENCIPHER_ONLY = 1
|
|
KU_KEY_AGREEMENT = 8
|
|
KU_KEY_AGREEMENT_OR_ENCIPHERMENT = 16384
|
|
KU_KEY_CERT_SIGN = 4
|
|
KU_KEY_ENCIPHERMENT = 32
|
|
KU_NON_REPUDIATION = 64
|
|
KU_NS_GOVT_APPROVED = 32768
|
|
NSS_INIT_COOPERATE = 960
|
|
NSS_INIT_FORCEOPEN = 8
|
|
NSS_INIT_NOCERTDB = 2
|
|
NSS_INIT_NOMODDB = 4
|
|
NSS_INIT_NOPK11FINALIZE = 256
|
|
NSS_INIT_NOROOTINIT = 16
|
|
NSS_INIT_OPTIMIZESPACE = 32
|
|
NSS_INIT_PK11RELOAD = 128
|
|
NSS_INIT_PK11THREADSAFE = 64
|
|
NSS_INIT_READONLY = 1
|
|
NSS_INIT_RESERVED = 512
|
|
OCTETS_PER_LINE_DEFAULT = 16
|
|
PK11CertListAll = 6
|
|
PK11CertListCA = 3
|
|
PK11CertListCAUnique = 4
|
|
PK11CertListRootUnique = 2
|
|
PK11CertListUnique = 0
|
|
PK11CertListUser = 1
|
|
PK11CertListUserUnique = 5
|
|
PK11_DIS_COULD_NOT_INIT_TOKEN = 2
|
|
PK11_DIS_NONE = 0
|
|
PK11_DIS_TOKEN_NOT_PRESENT = 4
|
|
PK11_DIS_TOKEN_VERIFY_FAILED = 3
|
|
PK11_DIS_USER_SELECTED = 1
|
|
PK11_OriginDerive = 1
|
|
PK11_OriginFortezzaHack = 3
|
|
PK11_OriginGenerated = 2
|
|
PK11_OriginNULL = 0
|
|
PK11_OriginUnwrap = 4
|
|
PKCS12_DES_56 = 131089
|
|
PKCS12_DES_EDE3_168 = 131090
|
|
PKCS12_RC2_CBC_128 = 131074
|
|
PKCS12_RC2_CBC_40 = 131073
|
|
PKCS12_RC4_128 = 131082
|
|
PKCS12_RC4_40 = 131081
|
|
SEC_CERT_NICKNAMES_ALL = 1
|
|
SEC_CERT_NICKNAMES_CA = 4
|
|
SEC_CERT_NICKNAMES_SERVER = 3
|
|
SEC_CERT_NICKNAMES_USER = 2
|
|
SEC_CRL_TYPE = 1
|
|
SEC_KRL_TYPE = 0
|
|
SEC_OID_AES_128_CBC = 184
|
|
SEC_OID_AES_128_ECB = 183
|
|
SEC_OID_AES_128_KEY_WRAP = 197
|
|
SEC_OID_AES_192_CBC = 186
|
|
SEC_OID_AES_192_ECB = 185
|
|
SEC_OID_AES_192_KEY_WRAP = 198
|
|
SEC_OID_AES_256_CBC = 188
|
|
SEC_OID_AES_256_ECB = 187
|
|
SEC_OID_AES_256_KEY_WRAP = 199
|
|
SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE = 201
|
|
SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE = 277
|
|
SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE = 278
|
|
SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE = 279
|
|
SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE = 280
|
|
SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST = 275
|
|
SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST = 276
|
|
SEC_OID_ANSIX962_ECDSA_SIGNATURE_WITH_SHA1_DIGEST = 201
|
|
SEC_OID_ANSIX962_EC_C2ONB191V4 = 229
|
|
SEC_OID_ANSIX962_EC_C2ONB191V5 = 230
|
|
SEC_OID_ANSIX962_EC_C2ONB239V4 = 235
|
|
SEC_OID_ANSIX962_EC_C2ONB239V5 = 236
|
|
SEC_OID_ANSIX962_EC_C2PNB163V1 = 222
|
|
SEC_OID_ANSIX962_EC_C2PNB163V2 = 223
|
|
SEC_OID_ANSIX962_EC_C2PNB163V3 = 224
|
|
SEC_OID_ANSIX962_EC_C2PNB176V1 = 225
|
|
SEC_OID_ANSIX962_EC_C2PNB208W1 = 231
|
|
SEC_OID_ANSIX962_EC_C2PNB272W1 = 237
|
|
SEC_OID_ANSIX962_EC_C2PNB304W1 = 238
|
|
SEC_OID_ANSIX962_EC_C2PNB368W1 = 240
|
|
SEC_OID_ANSIX962_EC_C2TNB191V1 = 226
|
|
SEC_OID_ANSIX962_EC_C2TNB191V2 = 227
|
|
SEC_OID_ANSIX962_EC_C2TNB191V3 = 228
|
|
SEC_OID_ANSIX962_EC_C2TNB239V1 = 232
|
|
SEC_OID_ANSIX962_EC_C2TNB239V2 = 233
|
|
SEC_OID_ANSIX962_EC_C2TNB239V3 = 234
|
|
SEC_OID_ANSIX962_EC_C2TNB359V1 = 239
|
|
SEC_OID_ANSIX962_EC_C2TNB431R1 = 241
|
|
SEC_OID_ANSIX962_EC_PRIME192V1 = 202
|
|
SEC_OID_ANSIX962_EC_PRIME192V2 = 203
|
|
SEC_OID_ANSIX962_EC_PRIME192V3 = 204
|
|
SEC_OID_ANSIX962_EC_PRIME239V1 = 205
|
|
SEC_OID_ANSIX962_EC_PRIME239V2 = 206
|
|
SEC_OID_ANSIX962_EC_PRIME239V3 = 207
|
|
SEC_OID_ANSIX962_EC_PRIME256V1 = 208
|
|
SEC_OID_ANSIX962_EC_PUBLIC_KEY = 200
|
|
SEC_OID_ANSIX9_DSA_SIGNATURE = 124
|
|
SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST = 125
|
|
SEC_OID_AVA_COMMON_NAME = 41
|
|
SEC_OID_AVA_COUNTRY_NAME = 42
|
|
SEC_OID_AVA_DC = 48
|
|
SEC_OID_AVA_DN_QUALIFIER = 47
|
|
SEC_OID_AVA_GENERATION_QUALIFIER = 270
|
|
SEC_OID_AVA_GIVEN_NAME = 268
|
|
SEC_OID_AVA_HOUSE_IDENTIFIER = 271
|
|
SEC_OID_AVA_INITIALS = 269
|
|
SEC_OID_AVA_LOCALITY = 43
|
|
SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME = 46
|
|
SEC_OID_AVA_ORGANIZATION_NAME = 45
|
|
SEC_OID_AVA_POSTAL_ADDRESS = 265
|
|
SEC_OID_AVA_POSTAL_CODE = 266
|
|
SEC_OID_AVA_POST_OFFICE_BOX = 267
|
|
SEC_OID_AVA_PSEUDONYM = 272
|
|
SEC_OID_AVA_SERIAL_NUMBER = 262
|
|
SEC_OID_AVA_STATE_OR_PROVINCE = 44
|
|
SEC_OID_AVA_STREET_ADDRESS = 263
|
|
SEC_OID_AVA_SURNAME = 261
|
|
SEC_OID_AVA_TITLE = 264
|
|
SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST = 126
|
|
SEC_OID_BOGUS_KEY_USAGE = 173
|
|
SEC_OID_CAMELLIA_128_CBC = 288
|
|
SEC_OID_CAMELLIA_192_CBC = 289
|
|
SEC_OID_CAMELLIA_256_CBC = 290
|
|
SEC_OID_CERT_RENEWAL_LOCATOR = 177
|
|
SEC_OID_CMS_3DES_KEY_WRAP = 180
|
|
SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN = 179
|
|
SEC_OID_CMS_RC2_KEY_WRAP = 181
|
|
SEC_OID_DES_CBC = 10
|
|
SEC_OID_DES_CFB = 12
|
|
SEC_OID_DES_ECB = 9
|
|
SEC_OID_DES_EDE = 14
|
|
SEC_OID_DES_EDE3_CBC = 7
|
|
SEC_OID_DES_MAC = 13
|
|
SEC_OID_DES_OFB = 11
|
|
SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH = 147
|
|
SEC_OID_EXT_KEY_USAGE_CODE_SIGN = 148
|
|
SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT = 149
|
|
SEC_OID_EXT_KEY_USAGE_SERVER_AUTH = 146
|
|
SEC_OID_EXT_KEY_USAGE_TIME_STAMP = 150
|
|
SEC_OID_FORTEZZA_SKIPJACK = 153
|
|
SEC_OID_HMAC_SHA1 = 294
|
|
SEC_OID_HMAC_SHA224 = 295
|
|
SEC_OID_HMAC_SHA256 = 296
|
|
SEC_OID_HMAC_SHA384 = 297
|
|
SEC_OID_HMAC_SHA512 = 298
|
|
SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE = 301
|
|
SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE = 15
|
|
SEC_OID_MD2 = 1
|
|
SEC_OID_MD4 = 2
|
|
SEC_OID_MD5 = 3
|
|
SEC_OID_MISSI_ALT_KEA = 59
|
|
SEC_OID_MISSI_DSS = 57
|
|
SEC_OID_MISSI_DSS_OLD = 55
|
|
SEC_OID_MISSI_KEA = 58
|
|
SEC_OID_MISSI_KEA_DSS = 56
|
|
SEC_OID_MISSI_KEA_DSS_OLD = 54
|
|
SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE = 190
|
|
SEC_OID_NETSCAPE_AOLSCREENNAME = 260
|
|
SEC_OID_NETSCAPE_NICKNAME = 175
|
|
SEC_OID_NETSCAPE_RECOVERY_REQUEST = 176
|
|
SEC_OID_NETSCAPE_SMIME_KEA = 152
|
|
SEC_OID_NS_CERT_EXT_BASE_URL = 64
|
|
SEC_OID_NS_CERT_EXT_CA_CERT_URL = 68
|
|
SEC_OID_NS_CERT_EXT_CA_CRL_URL = 67
|
|
SEC_OID_NS_CERT_EXT_CA_POLICY_URL = 70
|
|
SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL = 66
|
|
SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME = 77
|
|
SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL = 69
|
|
SEC_OID_NS_CERT_EXT_CERT_TYPE = 63
|
|
SEC_OID_NS_CERT_EXT_COMMENT = 75
|
|
SEC_OID_NS_CERT_EXT_ENTITY_LOGO = 72
|
|
SEC_OID_NS_CERT_EXT_HOMEPAGE_URL = 71
|
|
SEC_OID_NS_CERT_EXT_ISSUER_LOGO = 61
|
|
SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL = 76
|
|
SEC_OID_NS_CERT_EXT_NETSCAPE_OK = 60
|
|
SEC_OID_NS_CERT_EXT_REVOCATION_URL = 65
|
|
SEC_OID_NS_CERT_EXT_SCOPE_OF_USE = 178
|
|
SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME = 74
|
|
SEC_OID_NS_CERT_EXT_SUBJECT_LOGO = 62
|
|
SEC_OID_NS_CERT_EXT_USER_PICTURE = 73
|
|
SEC_OID_NS_KEY_USAGE_GOVT_APPROVED = 78
|
|
SEC_OID_NS_TYPE_CERT_SEQUENCE = 53
|
|
SEC_OID_NS_TYPE_GIF = 49
|
|
SEC_OID_NS_TYPE_HTML = 52
|
|
SEC_OID_NS_TYPE_JPEG = 50
|
|
SEC_OID_NS_TYPE_URL = 51
|
|
SEC_OID_OCSP_RESPONDER = 151
|
|
SEC_OID_PKCS12 = 100
|
|
SEC_OID_PKCS12_BAG_IDS = 103
|
|
SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID = 111
|
|
SEC_OID_PKCS12_CERT_BAG_IDS = 104
|
|
SEC_OID_PKCS12_ENVELOPING_IDS = 108
|
|
SEC_OID_PKCS12_ESPVK_IDS = 102
|
|
SEC_OID_PKCS12_KEY_BAG_ID = 110
|
|
SEC_OID_PKCS12_KEY_USAGE = 81
|
|
SEC_OID_PKCS12_MODE_IDS = 101
|
|
SEC_OID_PKCS12_OIDS = 105
|
|
SEC_OID_PKCS12_PBE_IDS = 106
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC = 118
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 = 115
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC = 119
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 = 116
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC = 117
|
|
SEC_OID_PKCS12_PKCS8_KEY_SHROUDING = 109
|
|
SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID = 161
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 = 120
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 = 121
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES = 122
|
|
SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST = 123
|
|
SEC_OID_PKCS12_SAFE_CONTENTS_ID = 160
|
|
SEC_OID_PKCS12_SDSI_CERT_BAG = 114
|
|
SEC_OID_PKCS12_SECRET_BAG_ID = 112
|
|
SEC_OID_PKCS12_SIGNATURE_IDS = 107
|
|
SEC_OID_PKCS12_V1_CERT_BAG_ID = 164
|
|
SEC_OID_PKCS12_V1_CRL_BAG_ID = 165
|
|
SEC_OID_PKCS12_V1_KEY_BAG_ID = 162
|
|
SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID = 163
|
|
SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID = 167
|
|
SEC_OID_PKCS12_V1_SECRET_BAG_ID = 166
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC = 158
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 = 154
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC = 157
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC = 156
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC = 159
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 = 155
|
|
SEC_OID_PKCS12_X509_CERT_CRL_BAG = 113
|
|
SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION = 17
|
|
SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION = 18
|
|
SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION = 19
|
|
SEC_OID_PKCS1_RSA_ENCRYPTION = 16
|
|
SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION = 20
|
|
SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION = 194
|
|
SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION = 195
|
|
SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION = 196
|
|
SEC_OID_PKCS5_PBES2 = 292
|
|
SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC = 21
|
|
SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC = 22
|
|
SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC = 23
|
|
SEC_OID_PKCS5_PBKDF2 = 291
|
|
SEC_OID_PKCS5_PBMAC1 = 293
|
|
SEC_OID_PKCS7 = 24
|
|
SEC_OID_PKCS7_DATA = 25
|
|
SEC_OID_PKCS7_DIGESTED_DATA = 29
|
|
SEC_OID_PKCS7_ENCRYPTED_DATA = 30
|
|
SEC_OID_PKCS7_ENVELOPED_DATA = 27
|
|
SEC_OID_PKCS7_SIGNED_DATA = 26
|
|
SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA = 28
|
|
SEC_OID_PKCS9_CHALLENGE_PASSWORD = 37
|
|
SEC_OID_PKCS9_CONTENT_TYPE = 33
|
|
SEC_OID_PKCS9_COUNTER_SIGNATURE = 36
|
|
SEC_OID_PKCS9_EMAIL_ADDRESS = 31
|
|
SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES = 39
|
|
SEC_OID_PKCS9_EXTENSION_REQUEST = 274
|
|
SEC_OID_PKCS9_FRIENDLY_NAME = 171
|
|
SEC_OID_PKCS9_LOCAL_KEY_ID = 172
|
|
SEC_OID_PKCS9_MESSAGE_DIGEST = 34
|
|
SEC_OID_PKCS9_SDSI_CERT = 169
|
|
SEC_OID_PKCS9_SIGNING_TIME = 35
|
|
SEC_OID_PKCS9_SMIME_CAPABILITIES = 40
|
|
SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS = 38
|
|
SEC_OID_PKCS9_UNSTRUCTURED_NAME = 32
|
|
SEC_OID_PKCS9_X509_CERT = 168
|
|
SEC_OID_PKCS9_X509_CRL = 170
|
|
SEC_OID_PKIX_CA_ISSUERS = 273
|
|
SEC_OID_PKIX_CA_REPOSITORY = 300
|
|
SEC_OID_PKIX_CPS_POINTER_QUALIFIER = 128
|
|
SEC_OID_PKIX_OCSP = 130
|
|
SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF = 136
|
|
SEC_OID_PKIX_OCSP_BASIC_RESPONSE = 131
|
|
SEC_OID_PKIX_OCSP_CRL = 133
|
|
SEC_OID_PKIX_OCSP_NONCE = 132
|
|
SEC_OID_PKIX_OCSP_NO_CHECK = 135
|
|
SEC_OID_PKIX_OCSP_RESPONSE = 134
|
|
SEC_OID_PKIX_OCSP_SERVICE_LOCATOR = 137
|
|
SEC_OID_PKIX_REGCTRL_AUTHENTICATOR = 139
|
|
SEC_OID_PKIX_REGCTRL_OLD_CERT_ID = 142
|
|
SEC_OID_PKIX_REGCTRL_PKIPUBINFO = 140
|
|
SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS = 141
|
|
SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY = 143
|
|
SEC_OID_PKIX_REGCTRL_REGTOKEN = 138
|
|
SEC_OID_PKIX_REGINFO_CERT_REQUEST = 145
|
|
SEC_OID_PKIX_REGINFO_UTF8_PAIRS = 144
|
|
SEC_OID_PKIX_TIMESTAMPING = 299
|
|
SEC_OID_PKIX_USER_NOTICE_QUALIFIER = 129
|
|
SEC_OID_RC2_CBC = 5
|
|
SEC_OID_RC4 = 6
|
|
SEC_OID_RC5_CBC_PAD = 8
|
|
SEC_OID_RFC1274_MAIL = 99
|
|
SEC_OID_RFC1274_UID = 98
|
|
SEC_OID_SDN702_DSA_SIGNATURE = 189
|
|
SEC_OID_SECG_EC_SECP112R1 = 209
|
|
SEC_OID_SECG_EC_SECP112R2 = 210
|
|
SEC_OID_SECG_EC_SECP128R1 = 211
|
|
SEC_OID_SECG_EC_SECP128R2 = 212
|
|
SEC_OID_SECG_EC_SECP160K1 = 213
|
|
SEC_OID_SECG_EC_SECP160R1 = 214
|
|
SEC_OID_SECG_EC_SECP160R2 = 215
|
|
SEC_OID_SECG_EC_SECP192K1 = 216
|
|
SEC_OID_SECG_EC_SECP192R1 = 202
|
|
SEC_OID_SECG_EC_SECP224K1 = 217
|
|
SEC_OID_SECG_EC_SECP224R1 = 218
|
|
SEC_OID_SECG_EC_SECP256K1 = 219
|
|
SEC_OID_SECG_EC_SECP256R1 = 208
|
|
SEC_OID_SECG_EC_SECP384R1 = 220
|
|
SEC_OID_SECG_EC_SECP521R1 = 221
|
|
SEC_OID_SECG_EC_SECT113R1 = 242
|
|
SEC_OID_SECG_EC_SECT113R2 = 243
|
|
SEC_OID_SECG_EC_SECT131R1 = 244
|
|
SEC_OID_SECG_EC_SECT131R2 = 245
|
|
SEC_OID_SECG_EC_SECT163K1 = 246
|
|
SEC_OID_SECG_EC_SECT163R1 = 247
|
|
SEC_OID_SECG_EC_SECT163R2 = 248
|
|
SEC_OID_SECG_EC_SECT193R1 = 249
|
|
SEC_OID_SECG_EC_SECT193R2 = 250
|
|
SEC_OID_SECG_EC_SECT233K1 = 251
|
|
SEC_OID_SECG_EC_SECT233R1 = 252
|
|
SEC_OID_SECG_EC_SECT239K1 = 253
|
|
SEC_OID_SECG_EC_SECT283K1 = 254
|
|
SEC_OID_SECG_EC_SECT283R1 = 255
|
|
SEC_OID_SECG_EC_SECT409K1 = 256
|
|
SEC_OID_SECG_EC_SECT409R1 = 257
|
|
SEC_OID_SECG_EC_SECT571K1 = 258
|
|
SEC_OID_SECG_EC_SECT571R1 = 259
|
|
SEC_OID_SHA1 = 4
|
|
SEC_OID_SHA256 = 191
|
|
SEC_OID_SHA384 = 192
|
|
SEC_OID_SHA512 = 193
|
|
SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE = 182
|
|
SEC_OID_UNKNOWN = 0
|
|
SEC_OID_VERISIGN_USER_NOTICES = 127
|
|
SEC_OID_X500_RSA_ENCRYPTION = 97
|
|
SEC_OID_X509_AUTH_INFO_ACCESS = 93
|
|
SEC_OID_X509_AUTH_KEY_ID = 91
|
|
SEC_OID_X509_BASIC_CONSTRAINTS = 85
|
|
SEC_OID_X509_CERTIFICATE_POLICIES = 88
|
|
SEC_OID_X509_CERT_ISSUER = 284
|
|
SEC_OID_X509_CRL_DIST_POINTS = 87
|
|
SEC_OID_X509_CRL_NUMBER = 94
|
|
SEC_OID_X509_DELTA_CRL_INDICATOR = 282
|
|
SEC_OID_X509_EXT_KEY_USAGE = 92
|
|
SEC_OID_X509_FRESHEST_CRL = 285
|
|
SEC_OID_X509_HOLD_INSTRUCTION_CODE = 281
|
|
SEC_OID_X509_INHIBIT_ANY_POLICY = 286
|
|
SEC_OID_X509_INVALID_DATE = 96
|
|
SEC_OID_X509_ISSUER_ALT_NAME = 84
|
|
SEC_OID_X509_ISSUING_DISTRIBUTION_POINT = 283
|
|
SEC_OID_X509_KEY_USAGE = 81
|
|
SEC_OID_X509_NAME_CONSTRAINTS = 86
|
|
SEC_OID_X509_POLICY_CONSTRAINTS = 90
|
|
SEC_OID_X509_POLICY_MAPPINGS = 89
|
|
SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD = 82
|
|
SEC_OID_X509_REASON_CODE = 95
|
|
SEC_OID_X509_SUBJECT_ALT_NAME = 83
|
|
SEC_OID_X509_SUBJECT_DIRECTORY_ATTR = 79
|
|
SEC_OID_X509_SUBJECT_INFO_ACCESS = 287
|
|
SEC_OID_X509_SUBJECT_KEY_ID = 80
|
|
SEC_OID_X942_DIFFIE_HELMAN_KEY = 174
|
|
_C_API = <capsule object "_C_API" at 0x7f1d0752e870>
|
|
__package__ = None
|
|
certDNSName = 3
|
|
certDirectoryName = 5
|
|
certEDIPartyName = 6
|
|
certIPAddress = 8
|
|
certOtherName = 1
|
|
certRFC822Name = 2
|
|
certRegisterID = 9
|
|
certURI = 7
|
|
certUsageAnyCA = 11
|
|
certUsageEmailRecipient = 5
|
|
certUsageEmailSigner = 4
|
|
certUsageObjectSigner = 6
|
|
certUsageProtectedObjectSigner = 9
|
|
certUsageSSLCA = 3
|
|
certUsageSSLClient = 0
|
|
certUsageSSLServer = 1
|
|
certUsageSSLServerWithStepUp = 2
|
|
certUsageStatusResponder = 10
|
|
certUsageUserCertImport = 7
|
|
certUsageVerifyCA = 8
|
|
certX400Address = 4
|
|
certificateUsageAnyCA = 2048
|
|
certificateUsageCheckAllUsages = 0
|
|
certificateUsageEmailRecipient = 32
|
|
certificateUsageEmailSigner = 16
|
|
certificateUsageObjectSigner = 64
|
|
certificateUsageProtectedObjectSigner = 512
|
|
certificateUsageSSLCA = 8
|
|
certificateUsageSSLClient = 1
|
|
certificateUsageSSLServer = 2
|
|
certificateUsageSSLServerWithStepUp = 4
|
|
certificateUsageStatusResponder = 1024
|
|
certificateUsageUserCertImport = 128
|
|
certificateUsageVerifyCA = 256
|
|
crlEntryReasonAaCompromise = 10
|
|
crlEntryReasonAffiliationChanged = 3
|
|
crlEntryReasonCaCompromise = 2
|
|
crlEntryReasonCessationOfOperation = 5
|
|
crlEntryReasonKeyCompromise = 1
|
|
crlEntryReasonPrivilegeWithdrawn = 9
|
|
crlEntryReasonRemoveFromCRL = 8
|
|
crlEntryReasonSuperseded = 4
|
|
crlEntryReasonUnspecified = 0
|
|
crlEntryReasoncertificatedHold = 6
|
|
dhKey = 4
|
|
dsaKey = 2
|
|
ecKey = 6
|
|
fortezzaKey = 3
|
|
generalName = 1
|
|
keaKey = 5
|
|
nullKey = 0
|
|
ocspMode_FailureIsNotAVerificationFailure = 1
|
|
ocspMode_FailureIsVerificationFailure = 0
|
|
relativeDistinguishedName = 2
|
|
rsaKey = 1
|
|
secCertTimeExpired = 1
|
|
secCertTimeNotValidYet = 2
|
|
secCertTimeValid = 0
|
|
ssl_kea_dh = 2
|
|
ssl_kea_ecdh = 4
|
|
ssl_kea_fortezza = 3
|
|
ssl_kea_null = 0
|
|
ssl_kea_rsa = 1
|