cssmapple.pas 55 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367
  1. {
  2. * Copyright (c) 2000-2013 Apple Inc. All Rights Reserved.
  3. *
  4. * @APPLE_LICENSE_HEADER_START@
  5. *
  6. * This file contains Original Code and/or Modifications of Original Code
  7. * as defined in and that are subject to the Apple Public Source License
  8. * Version 2.0 (the 'License'). You may not use this file except in
  9. * compliance with the License. Please obtain a copy of the License at
  10. * http://www.opensource.apple.com/apsl/ and read it before using this
  11. * file.
  12. *
  13. * The Original Code and all software distributed under the License are
  14. * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
  15. * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
  16. * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
  17. * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
  18. * Please see the License for the specific language governing rights and
  19. * limitations under the License.
  20. *
  21. * @APPLE_LICENSE_HEADER_END@
  22. *
  23. * cssmapple.h -- CSSM features specific to Apple's Implementation
  24. }
  25. { Pascal Translation Updated: Jonas Maebe, <[email protected]>, September 2010 }
  26. { Pascal Translation Update: Jonas Maebe <[email protected]>, October 2012 }
  27. { Pascal Translation Update: Jonas Maebe <[email protected]>, August 2015 }
  28. {
  29. Modified for use with Free Pascal
  30. Version 308
  31. Please report any bugs to <[email protected]>
  32. }
  33. {$ifc not defined MACOSALLINCLUDE or not MACOSALLINCLUDE}
  34. {$mode macpas}
  35. {$modeswitch cblocks}
  36. {$packenum 1}
  37. {$macro on}
  38. {$inline on}
  39. {$calling mwpascal}
  40. unit cssmapple;
  41. interface
  42. {$setc UNIVERSAL_INTERFACES_VERSION := $0400}
  43. {$setc GAP_INTERFACES_VERSION := $0308}
  44. {$ifc not defined USE_CFSTR_CONSTANT_MACROS}
  45. {$setc USE_CFSTR_CONSTANT_MACROS := TRUE}
  46. {$endc}
  47. {$ifc defined CPUPOWERPC and defined CPUI386}
  48. {$error Conflicting initial definitions for CPUPOWERPC and CPUI386}
  49. {$endc}
  50. {$ifc defined FPC_BIG_ENDIAN and defined FPC_LITTLE_ENDIAN}
  51. {$error Conflicting initial definitions for FPC_BIG_ENDIAN and FPC_LITTLE_ENDIAN}
  52. {$endc}
  53. {$ifc not defined __ppc__ and defined CPUPOWERPC32}
  54. {$setc __ppc__ := 1}
  55. {$elsec}
  56. {$setc __ppc__ := 0}
  57. {$endc}
  58. {$ifc not defined __ppc64__ and defined CPUPOWERPC64}
  59. {$setc __ppc64__ := 1}
  60. {$elsec}
  61. {$setc __ppc64__ := 0}
  62. {$endc}
  63. {$ifc not defined __i386__ and defined CPUI386}
  64. {$setc __i386__ := 1}
  65. {$elsec}
  66. {$setc __i386__ := 0}
  67. {$endc}
  68. {$ifc not defined __x86_64__ and defined CPUX86_64}
  69. {$setc __x86_64__ := 1}
  70. {$elsec}
  71. {$setc __x86_64__ := 0}
  72. {$endc}
  73. {$ifc not defined __arm__ and defined CPUARM}
  74. {$setc __arm__ := 1}
  75. {$elsec}
  76. {$setc __arm__ := 0}
  77. {$endc}
  78. {$ifc not defined __arm64__ and defined CPUAARCH64}
  79. {$setc __arm64__ := 1}
  80. {$elsec}
  81. {$setc __arm64__ := 0}
  82. {$endc}
  83. {$ifc defined cpu64}
  84. {$setc __LP64__ := 1}
  85. {$elsec}
  86. {$setc __LP64__ := 0}
  87. {$endc}
  88. {$ifc defined __ppc__ and __ppc__ and defined __i386__ and __i386__}
  89. {$error Conflicting definitions for __ppc__ and __i386__}
  90. {$endc}
  91. {$ifc defined __ppc__ and __ppc__}
  92. {$setc TARGET_CPU_PPC := TRUE}
  93. {$setc TARGET_CPU_PPC64 := FALSE}
  94. {$setc TARGET_CPU_X86 := FALSE}
  95. {$setc TARGET_CPU_X86_64 := FALSE}
  96. {$setc TARGET_CPU_ARM := FALSE}
  97. {$setc TARGET_CPU_ARM64 := FALSE}
  98. {$setc TARGET_OS_MAC := TRUE}
  99. {$setc TARGET_OS_IPHONE := FALSE}
  100. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  101. {$setc TARGET_OS_EMBEDDED := FALSE}
  102. {$elifc defined __ppc64__ and __ppc64__}
  103. {$setc TARGET_CPU_PPC := FALSE}
  104. {$setc TARGET_CPU_PPC64 := TRUE}
  105. {$setc TARGET_CPU_X86 := FALSE}
  106. {$setc TARGET_CPU_X86_64 := FALSE}
  107. {$setc TARGET_CPU_ARM := FALSE}
  108. {$setc TARGET_CPU_ARM64 := FALSE}
  109. {$setc TARGET_OS_MAC := TRUE}
  110. {$setc TARGET_OS_IPHONE := FALSE}
  111. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  112. {$setc TARGET_OS_EMBEDDED := FALSE}
  113. {$elifc defined __i386__ and __i386__}
  114. {$setc TARGET_CPU_PPC := FALSE}
  115. {$setc TARGET_CPU_PPC64 := FALSE}
  116. {$setc TARGET_CPU_X86 := TRUE}
  117. {$setc TARGET_CPU_X86_64 := FALSE}
  118. {$setc TARGET_CPU_ARM := FALSE}
  119. {$setc TARGET_CPU_ARM64 := FALSE}
  120. {$ifc defined(iphonesim)}
  121. {$setc TARGET_OS_MAC := FALSE}
  122. {$setc TARGET_OS_IPHONE := TRUE}
  123. {$setc TARGET_IPHONE_SIMULATOR := TRUE}
  124. {$elsec}
  125. {$setc TARGET_OS_MAC := TRUE}
  126. {$setc TARGET_OS_IPHONE := FALSE}
  127. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  128. {$endc}
  129. {$setc TARGET_OS_EMBEDDED := FALSE}
  130. {$elifc defined __x86_64__ and __x86_64__}
  131. {$setc TARGET_CPU_PPC := FALSE}
  132. {$setc TARGET_CPU_PPC64 := FALSE}
  133. {$setc TARGET_CPU_X86 := FALSE}
  134. {$setc TARGET_CPU_X86_64 := TRUE}
  135. {$setc TARGET_CPU_ARM := FALSE}
  136. {$setc TARGET_CPU_ARM64 := FALSE}
  137. {$ifc defined(iphonesim)}
  138. {$setc TARGET_OS_MAC := FALSE}
  139. {$setc TARGET_OS_IPHONE := TRUE}
  140. {$setc TARGET_IPHONE_SIMULATOR := TRUE}
  141. {$elsec}
  142. {$setc TARGET_OS_MAC := TRUE}
  143. {$setc TARGET_OS_IPHONE := FALSE}
  144. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  145. {$endc}
  146. {$setc TARGET_OS_EMBEDDED := FALSE}
  147. {$elifc defined __arm__ and __arm__}
  148. {$setc TARGET_CPU_PPC := FALSE}
  149. {$setc TARGET_CPU_PPC64 := FALSE}
  150. {$setc TARGET_CPU_X86 := FALSE}
  151. {$setc TARGET_CPU_X86_64 := FALSE}
  152. {$setc TARGET_CPU_ARM := TRUE}
  153. {$setc TARGET_CPU_ARM64 := FALSE}
  154. { will require compiler define when/if other Apple devices with ARM cpus ship }
  155. {$setc TARGET_OS_MAC := FALSE}
  156. {$setc TARGET_OS_IPHONE := TRUE}
  157. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  158. {$setc TARGET_OS_EMBEDDED := TRUE}
  159. {$elifc defined __arm64__ and __arm64__}
  160. {$setc TARGET_CPU_PPC := FALSE}
  161. {$setc TARGET_CPU_PPC64 := FALSE}
  162. {$setc TARGET_CPU_X86 := FALSE}
  163. {$setc TARGET_CPU_X86_64 := FALSE}
  164. {$setc TARGET_CPU_ARM := FALSE}
  165. {$setc TARGET_CPU_ARM64 := TRUE}
  166. { will require compiler define when/if other Apple devices with ARM cpus ship }
  167. {$setc TARGET_OS_MAC := FALSE}
  168. {$setc TARGET_OS_IPHONE := TRUE}
  169. {$setc TARGET_IPHONE_SIMULATOR := FALSE}
  170. {$setc TARGET_OS_EMBEDDED := TRUE}
  171. {$elsec}
  172. {$error __ppc__ nor __ppc64__ nor __i386__ nor __x86_64__ nor __arm__ nor __arm64__ is defined.}
  173. {$endc}
  174. {$ifc defined __LP64__ and __LP64__ }
  175. {$setc TARGET_CPU_64 := TRUE}
  176. {$elsec}
  177. {$setc TARGET_CPU_64 := FALSE}
  178. {$endc}
  179. {$ifc defined FPC_BIG_ENDIAN}
  180. {$setc TARGET_RT_BIG_ENDIAN := TRUE}
  181. {$setc TARGET_RT_LITTLE_ENDIAN := FALSE}
  182. {$elifc defined FPC_LITTLE_ENDIAN}
  183. {$setc TARGET_RT_BIG_ENDIAN := FALSE}
  184. {$setc TARGET_RT_LITTLE_ENDIAN := TRUE}
  185. {$elsec}
  186. {$error Neither FPC_BIG_ENDIAN nor FPC_LITTLE_ENDIAN are defined.}
  187. {$endc}
  188. {$setc ACCESSOR_CALLS_ARE_FUNCTIONS := TRUE}
  189. {$setc CALL_NOT_IN_CARBON := FALSE}
  190. {$setc OLDROUTINENAMES := FALSE}
  191. {$setc OPAQUE_TOOLBOX_STRUCTS := TRUE}
  192. {$setc OPAQUE_UPP_TYPES := TRUE}
  193. {$setc OTCARBONAPPLICATION := TRUE}
  194. {$setc OTKERNEL := FALSE}
  195. {$setc PM_USE_SESSION_APIS := TRUE}
  196. {$setc TARGET_API_MAC_CARBON := TRUE}
  197. {$setc TARGET_API_MAC_OS8 := FALSE}
  198. {$setc TARGET_API_MAC_OSX := TRUE}
  199. {$setc TARGET_CARBON := TRUE}
  200. {$setc TARGET_CPU_68K := FALSE}
  201. {$setc TARGET_CPU_MIPS := FALSE}
  202. {$setc TARGET_CPU_SPARC := FALSE}
  203. {$setc TARGET_OS_UNIX := FALSE}
  204. {$setc TARGET_OS_WIN32 := FALSE}
  205. {$setc TARGET_RT_MAC_68881 := FALSE}
  206. {$setc TARGET_RT_MAC_CFM := FALSE}
  207. {$setc TARGET_RT_MAC_MACHO := TRUE}
  208. {$setc TYPED_FUNCTION_POINTERS := TRUE}
  209. {$setc TYPE_BOOL := FALSE}
  210. {$setc TYPE_EXTENDED := FALSE}
  211. {$setc TYPE_LONGLONG := TRUE}
  212. uses MacTypes,MacOSXPosix,cssmerr,cssmtype,x509defs,certextensions;
  213. {$endc} {not MACOSALLINCLUDE}
  214. {$ifc TARGET_OS_MAC}
  215. {$packrecords c}
  216. { Guids for standard Apple addin modules. }
  217. { CSSM itself: (87191ca0-0fc9-11d4-849a-000502b52122) }
  218. var gGuidCssm: CSSM_GUID; external name '_gGuidCssm'; (* attribute const *)
  219. { File based DL (aka "Keychain DL"): (87191ca1-0fc9-11d4-849a-000502b52122) }
  220. var gGuidAppleFileDL: CSSM_GUID; external name '_gGuidAppleFileDL'; (* attribute const *)
  221. { Core CSP (local space): (87191ca2-0fc9-11d4-849a-000502b52122) }
  222. var gGuidAppleCSP: CSSM_GUID; external name '_gGuidAppleCSP'; (* attribute const *)
  223. { Secure CSP/DL (aka "Keychain CSPDL): (87191ca3-0fc9-11d4-849a-000502b52122) }
  224. var gGuidAppleCSPDL: CSSM_GUID; external name '_gGuidAppleCSPDL'; (* attribute const *)
  225. { X509 Certificate CL: (87191ca4-0fc9-11d4-849a-000502b52122) }
  226. var gGuidAppleX509CL: CSSM_GUID; external name '_gGuidAppleX509CL'; (* attribute const *)
  227. { X509 Certificate TP: (87191ca5-0fc9-11d4-849a-000502b52122) }
  228. var gGuidAppleX509TP: CSSM_GUID; external name '_gGuidAppleX509TP'; (* attribute const *)
  229. { DLAP/OpenDirectory access DL: (87191ca6-0fc9-11d4-849a-000502b52122) }
  230. var gGuidAppleLDAPDL: CSSM_GUID; external name '_gGuidAppleLDAPDL'; (* attribute const *)
  231. { TP for ".mac" related policies: (87191ca7-0fc9-11d4-849a-000502b52122) }
  232. var gGuidAppleDotMacTP: CSSM_GUID; external name '_gGuidAppleDotMacTP'; (* attribute const *)
  233. { Smartcard CSP/DL: (87191ca8-0fc9-11d4-849a-000502b52122) }
  234. var gGuidAppleSdCSPDL: CSSM_GUID; external name '_gGuidAppleSdCSPDL'; (* attribute const *)
  235. { DL for ".mac" certificate access: (87191ca9-0fc9-11d4-849a-000502b52122) }
  236. var gGuidAppleDotMacDL: CSSM_GUID; external name '_gGuidAppleDotMacDL'; (* attribute const *)
  237. { Apple defined WORDID values }
  238. const
  239. CSSM_WORDID_KEYCHAIN_PROMPT = CSSM_WORDID_VENDOR_START;
  240. CSSM_WORDID_KEYCHAIN_LOCK = CSSM_WORDID_VENDOR_START + 1;
  241. CSSM_WORDID_KEYCHAIN_CHANGE_LOCK = CSSM_WORDID_VENDOR_START + 2;
  242. CSSM_WORDID_PROCESS = CSSM_WORDID_VENDOR_START + 3;
  243. CSSM_WORDID__RESERVED_1 = CSSM_WORDID_VENDOR_START + 4; { was used in 10.2 test seeds; no longer in use }
  244. CSSM_WORDID_SYMMETRIC_KEY = CSSM_WORDID_VENDOR_START + 5;
  245. CSSM_WORDID_SYSTEM = CSSM_WORDID_VENDOR_START + 6;
  246. CSSM_WORDID_KEY = CSSM_WORDID_VENDOR_START + 7;
  247. CSSM_WORDID_PIN = CSSM_WORDID_VENDOR_START + 8;
  248. CSSM_WORDID_PREAUTH = CSSM_WORDID_VENDOR_START + 9;
  249. CSSM_WORDID_PREAUTH_SOURCE = CSSM_WORDID_VENDOR_START + 10;
  250. CSSM_WORDID_ASYMMETRIC_KEY = CSSM_WORDID_VENDOR_START + 11;
  251. CSSM_WORDID__FIRST_UNUSED = CSSM_WORDID_VENDOR_START + 12;
  252. { Apple defined ACL subject and credential types }
  253. const
  254. CSSM_ACL_SUBJECT_TYPE_KEYCHAIN_PROMPT = CSSM_WORDID_KEYCHAIN_PROMPT;
  255. CSSM_ACL_SUBJECT_TYPE_PROCESS = CSSM_WORDID_PROCESS;
  256. CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE = CSSM_WORDID_SIGNATURE;
  257. CSSM_ACL_SUBJECT_TYPE_COMMENT = CSSM_WORDID_COMMENT;
  258. CSSM_ACL_SUBJECT_TYPE_SYMMETRIC_KEY = CSSM_WORDID_SYMMETRIC_KEY;
  259. CSSM_ACL_SUBJECT_TYPE_PREAUTH = CSSM_WORDID_PREAUTH;
  260. CSSM_ACL_SUBJECT_TYPE_PREAUTH_SOURCE = CSSM_WORDID_PREAUTH_SOURCE;
  261. CSSM_ACL_SUBJECT_TYPE_ASYMMETRIC_KEY = CSSM_WORDID_ASYMMETRIC_KEY;
  262. const
  263. CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT = CSSM_WORDID_KEYCHAIN_PROMPT;
  264. CSSM_SAMPLE_TYPE_KEYCHAIN_LOCK = CSSM_WORDID_KEYCHAIN_LOCK;
  265. CSSM_SAMPLE_TYPE_KEYCHAIN_CHANGE_LOCK = CSSM_WORDID_KEYCHAIN_CHANGE_LOCK;
  266. CSSM_SAMPLE_TYPE_PROCESS = CSSM_WORDID_PROCESS;
  267. CSSM_SAMPLE_TYPE_COMMENT = CSSM_WORDID_COMMENT;
  268. CSSM_SAMPLE_TYPE_RETRY_ID = CSSM_WORDID_PROPAGATE;
  269. CSSM_SAMPLE_TYPE_SYMMETRIC_KEY = CSSM_WORDID_SYMMETRIC_KEY;
  270. CSSM_SAMPLE_TYPE_PREAUTH = CSSM_WORDID_PREAUTH;
  271. CSSM_SAMPLE_TYPE_ASYMMETRIC_KEY = CSSM_WORDID_ASYMMETRIC_KEY;
  272. // there is no CSSM_SAMPLE_TYPE_PREAUTH_SOURCE
  273. { Apple-defined ACL authorization tags }
  274. const
  275. CSSM_ACL_AUTHORIZATION_CHANGE_ACL = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START;
  276. CSSM_ACL_AUTHORIZATION_CHANGE_OWNER = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START + 1;
  277. // the "pre-auth" tags form a contiguous range of (up to) 64K pre-authorizations
  278. CSSM_ACL_AUTHORIZATION_PREAUTH_BASE = CSSM_ACL_AUTHORIZATION_TAG_VENDOR_DEFINED_START + $1000000;
  279. CSSM_ACL_AUTHORIZATION_PREAUTH_END = CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + $10000;
  280. { pre-authorization conversions (auth-tag to slot and back) }
  281. {
  282. #define CSSM_ACL_AUTHORIZATION_PREAUTH(slot) \
  283. (CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + (slot))
  284. #define CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth) \
  285. ((auth) - CSSM_ACL_AUTHORIZATION_PREAUTH_BASE)
  286. #define CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth) \
  287. ((auth) >= CSSM_ACL_AUTHORIZATION_PREAUTH_BASE && \
  288. (auth) < CSSM_ACL_AUTHORIZATION_PREAUTH_END)
  289. }
  290. function CSSM_ACL_AUTHORIZATION_PREAUTH(slot: UInt32): UInt32; inline;
  291. function CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth: UInt32): UInt32; inline;
  292. function CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth: UInt32): Boolean; inline;
  293. { Parameters and structures for Apple-defined ACL subjects and samples }
  294. const
  295. { types of code signatures - item 1 of CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE subjects }
  296. CSSM_ACL_CODE_SIGNATURE_INVALID = 0; { standard OS X code signature }
  297. CSSM_ACL_CODE_SIGNATURE_OSX = 1; { standard OS X code signature }
  298. { ACL subjects of type PROCESS }
  299. const
  300. { PROCESS_SUBJECT mask fields }
  301. CSSM_ACL_MATCH_UID = $01; { match userid against uid field }
  302. CSSM_ACL_MATCH_GID = $02; { match groupid against gid field }
  303. CSSM_ACL_MATCH_HONOR_ROOT = $100; { let root (uid 0) match any userid }
  304. CSSM_ACL_MATCH_BITS = CSSM_ACL_MATCH_UID or CSSM_ACL_MATCH_GID;
  305. const
  306. { PROCESS_SUBJECT structure version field }
  307. CSSM_ACL_PROCESS_SELECTOR_CURRENT_VERSION = $101;
  308. type
  309. cssm_acl_process_subject_selectorPtr = ^cssm_acl_process_subject_selector;
  310. cssm_acl_process_subject_selector = record
  311. { PROCESS_SUBJECT selector }
  312. version: UInt16; { version of this selector }
  313. mask: UInt16; { active fields mask }
  314. uid: UInt32; { effective user id match }
  315. gid: UInt32; { effective group id match }
  316. end;
  317. { ACL subjects of type KEYCHAIN_PROMPT }
  318. const
  319. { KEYCHAIN_PROMPT structure version field }
  320. CSSM_ACL_KEYCHAIN_PROMPT_CURRENT_VERSION = $101;
  321. const
  322. { KEYCHAIN_PROMPT operational flags }
  323. CSSM_ACL_KEYCHAIN_PROMPT_REQUIRE_PASSPHRASE = $0001; { require re-entering of passphrase }
  324. { the following bits are ignored by 10.4 and earlier }
  325. CSSM_ACL_KEYCHAIN_PROMPT_UNSIGNED = $0010; { prompt for unsigned clients }
  326. CSSM_ACL_KEYCHAIN_PROMPT_UNSIGNED_ACT = $0020; { UNSIGNED bit overrides system default }
  327. CSSM_ACL_KEYCHAIN_PROMPT_INVALID = $0040; { prompt for invalid signed clients }
  328. CSSM_ACL_KEYCHAIN_PROMPT_INVALID_ACT = $0080; { INVALID bit overrides system default }
  329. type
  330. cssm_acl_keychain_prompt_selectorPtr = ^cssm_acl_keychain_prompt_selector;
  331. cssm_acl_keychain_prompt_selector = record
  332. { KEYCHAIN_PROMPT selector }
  333. version: UInt16; { version of this selector }
  334. flags: UInt16; { flag bits }
  335. end;
  336. { ACL subjects of type CSSM_ACL_SUBJECT_TYPE_PREAUTH_SOURCE }
  337. type
  338. CSSM_ACL_PREAUTH_TRACKING_STATE = UInt32;
  339. const
  340. { preauth tracking state }
  341. CSSM_ACL_PREAUTH_TRACKING_COUNT_MASK = $ff; { mask for count status }
  342. CSSM_ACL_PREAUTH_TRACKING_BLOCKED = 0; { retries exhausted; the slot is blocked }
  343. { 0 .. 255 is a count of (re)tries remaining }
  344. { bits or'ed into any count given }
  345. CSSM_ACL_PREAUTH_TRACKING_UNKNOWN = $40000000; { status of slot is unknown (ignore count) }
  346. CSSM_ACL_PREAUTH_TRACKING_AUTHORIZED = $80000000; { the slot is currently authorized (or'ed in) }
  347. { Apple defined values of a CSSM_DB_ACCESS_TYPE }
  348. const
  349. CSSM_DB_ACCESS_RESET = $10000; { clear pre-authentications (or'ed bit) }
  350. { Apple defined algorithm IDs }
  351. const
  352. CSSM_ALGID_APPLE_YARROW = CSSM_ALGID_VENDOR_DEFINED;
  353. CSSM_ALGID_AES = CSSM_ALGID_VENDOR_DEFINED + 1; { RijnDael }
  354. CSSM_ALGID_FEE = CSSM_ALGID_VENDOR_DEFINED + 2; { FEE Key Generation }
  355. CSSM_ALGID_FEE_MD5 = CSSM_ALGID_VENDOR_DEFINED + 3; { FEE/ElGamal signature w/ MD5 hash }
  356. CSSM_ALGID_FEE_SHA1 = CSSM_ALGID_VENDOR_DEFINED + 4; { FEE/ElGamal signature w/ SHA1 hash }
  357. CSSM_ALGID_FEED = CSSM_ALGID_VENDOR_DEFINED + 5; { 1:1 FEE asymmetric encryption }
  358. CSSM_ALGID_FEEDEXP = CSSM_ALGID_VENDOR_DEFINED + 6; { 2:1 FEE asymmetric encryption }
  359. CSSM_ALGID_ASC = CSSM_ALGID_VENDOR_DEFINED + 7; { Apple Secure Compression }
  360. CSSM_ALGID_SHA1HMAC_LEGACY = CSSM_ALGID_VENDOR_DEFINED + 8; { HMAC/SHA1, legacy compatible }
  361. CSSM_ALGID_KEYCHAIN_KEY = CSSM_ALGID_VENDOR_DEFINED + 9; { derive or manipulate keychain master keys }
  362. CSSM_ALGID_PKCS12_PBE_ENCR = CSSM_ALGID_VENDOR_DEFINED + 10; { PKCS12, encrypt/decrypt key }
  363. CSSM_ALGID_PKCS12_PBE_MAC = CSSM_ALGID_VENDOR_DEFINED + 11; { PKCS12, MAC key }
  364. CSSM_ALGID_SECURE_PASSPHRASE = CSSM_ALGID_VENDOR_DEFINED + 12; { passphrase acquired by SecurityServer }
  365. CSSM_ALGID_PBE_OPENSSL_MD5 = CSSM_ALGID_VENDOR_DEFINED + 13; { traditional openssl key derivation }
  366. CSSM_ALGID_SHA256 = CSSM_ALGID_VENDOR_DEFINED + 14; { 256-bit SHA2 }
  367. CSSM_ALGID_SHA384 = CSSM_ALGID_VENDOR_DEFINED + 15; { 384-bit SHA2 }
  368. CSSM_ALGID_SHA512 = CSSM_ALGID_VENDOR_DEFINED + 16; { 512-bit SHA2 }
  369. CSSM_ALGID_ENTROPY_DEFAULT = CSSM_ALGID_VENDOR_DEFINED + 17; { default entropy source of (CSP) device, if any }
  370. CSSM_ALGID_SHA224 = CSSM_ALGID_VENDOR_DEFINED + 18; { SHA2, 224 bit }
  371. CSSM_ALGID_SHA224WithRSA = CSSM_ALGID_VENDOR_DEFINED + 19; { RSA signature on SHA224 digest }
  372. CSSM_ALGID_SHA256WithRSA = CSSM_ALGID_VENDOR_DEFINED + 20; { RSA signature on SHA256 digest }
  373. CSSM_ALGID_SHA384WithRSA = CSSM_ALGID_VENDOR_DEFINED + 21; { RSA signature on SHA384 digest }
  374. CSSM_ALGID_SHA512WithRSA = CSSM_ALGID_VENDOR_DEFINED + 22; { RSA signature on SHA512 digest }
  375. CSSM_ALGID_OPENSSH1 = CSSM_ALGID_VENDOR_DEFINED + 23; { OpenSSH v1 RSA key wrapping }
  376. CSSM_ALGID_SHA224WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 24; { ECDSA signature on SHA224 digest }
  377. CSSM_ALGID_SHA256WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 25; { ECDSA signature on SHA256 digest }
  378. CSSM_ALGID_SHA384WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 26; { ECDSA signature on SHA384 digest }
  379. CSSM_ALGID_SHA512WithECDSA = CSSM_ALGID_VENDOR_DEFINED + 27; { ECDSA signature on SHA512 digest }
  380. CSSM_ALGID_ECDSA_SPECIFIED = CSSM_ALGID_VENDOR_DEFINED + 28; { ECDSA with separate digest algorithm specifier }
  381. CSSM_ALGID_ECDH_X963_KDF = CSSM_ALGID_VENDOR_DEFINED + 29; { ECDH with X9.63 key derivation }
  382. CSSM_ALGID__FIRST_UNUSED = CSSM_ALGID_VENDOR_DEFINED + 30;
  383. { Apple defined padding }
  384. const
  385. { RFC 2246 section E.2 for SSLv2 rollback detection }
  386. CSSM_PADDING_APPLE_SSLv2 = CSSM_PADDING_VENDOR_DEFINED;
  387. { Apple defined keyblob formats }
  388. const
  389. CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED = $80000000;
  390. const
  391. { X509 SubjectPublicKeyInfo }
  392. CSSM_KEYBLOB_RAW_FORMAT_X509 = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED;
  393. { OpenSSH v1 }
  394. CSSM_KEYBLOB_RAW_FORMAT_OPENSSH = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 1;
  395. { openssl-style DSA private key }
  396. CSSM_KEYBLOB_RAW_FORMAT_OPENSSL = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 2;
  397. { OpenSSH v2 }
  398. CSSM_KEYBLOB_RAW_FORMAT_OPENSSH2 = CSSM_KEYBLOB_RAW_FORMAT_VENDOR_DEFINED + 3;
  399. { Apple adds some "common" error codes. CDSA does not define an official start value for this. }
  400. const
  401. CSSM_CUSTOM_COMMON_ERROR_EXTENT = $00e0;
  402. CSSM_ERRCODE_NO_USER_INTERACTION = $00e0;
  403. CSSM_ERRCODE_USER_CANCELED = $00e1;
  404. CSSM_ERRCODE_SERVICE_NOT_AVAILABLE = $00e2;
  405. CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION = $00e3;
  406. CSSM_ERRCODE_DEVICE_RESET = $00e4;
  407. CSSM_ERRCODE_DEVICE_FAILED = $00e5;
  408. CSSM_ERRCODE_IN_DARK_WAKE = $00e6;
  409. const
  410. CSSMERR_CSSM_NO_USER_INTERACTION = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  411. CSSMERR_AC_NO_USER_INTERACTION = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  412. CSSMERR_CSP_NO_USER_INTERACTION = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  413. CSSMERR_CL_NO_USER_INTERACTION = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  414. CSSMERR_DL_NO_USER_INTERACTION = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  415. CSSMERR_TP_NO_USER_INTERACTION = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_NO_USER_INTERACTION;
  416. CSSMERR_CSSM_USER_CANCELED = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  417. CSSMERR_AC_USER_CANCELED = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  418. CSSMERR_CSP_USER_CANCELED = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  419. CSSMERR_CL_USER_CANCELED = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  420. CSSMERR_DL_USER_CANCELED = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  421. CSSMERR_TP_USER_CANCELED = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_USER_CANCELED;
  422. CSSMERR_CSSM_SERVICE_NOT_AVAILABLE = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  423. CSSMERR_AC_SERVICE_NOT_AVAILABLE = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  424. CSSMERR_CSP_SERVICE_NOT_AVAILABLE = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  425. CSSMERR_CL_SERVICE_NOT_AVAILABLE = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  426. CSSMERR_DL_SERVICE_NOT_AVAILABLE = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  427. CSSMERR_TP_SERVICE_NOT_AVAILABLE = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_SERVICE_NOT_AVAILABLE;
  428. CSSMERR_CSSM_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  429. CSSMERR_AC_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  430. CSSMERR_CSP_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  431. CSSMERR_CL_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  432. CSSMERR_DL_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  433. CSSMERR_TP_INSUFFICIENT_CLIENT_IDENTIFICATION = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_INSUFFICIENT_CLIENT_IDENTIFICATION;
  434. CSSMERR_CSSM_DEVICE_RESET = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  435. CSSMERR_AC_DEVICE_RESET = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  436. CSSMERR_CSP_DEVICE_RESET = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  437. CSSMERR_CL_DEVICE_RESET = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  438. CSSMERR_DL_DEVICE_RESET = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  439. CSSMERR_TP_DEVICE_RESET = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_DEVICE_RESET;
  440. CSSMERR_CSSM_DEVICE_FAILED = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  441. CSSMERR_AC_DEVICE_FAILED = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  442. CSSMERR_CSP_DEVICE_FAILED = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  443. CSSMERR_CL_DEVICE_FAILED = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  444. CSSMERR_DL_DEVICE_FAILED = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  445. CSSMERR_TP_DEVICE_FAILED = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_DEVICE_FAILED;
  446. CSSMERR_CSSM_IN_DARK_WAKE = CSSM_CSSM_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  447. CSSMERR_AC_IN_DARK_WAKE = CSSM_AC_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  448. CSSMERR_CSP_IN_DARK_WAKE = CSSM_CSP_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  449. CSSMERR_CL_IN_DARK_WAKE = CSSM_CL_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  450. CSSMERR_DL_IN_DARK_WAKE = CSSM_DL_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  451. CSSMERR_TP_IN_DARK_WAKE = CSSM_TP_BASE_ERROR + CSSM_ERRCODE_IN_DARK_WAKE;
  452. { AppleCSPDL, AppleCSP private error codes. }
  453. const
  454. CSSMERR_CSP_APPLE_ADD_APPLICATION_ACL_SUBJECT = CSSM_CSP_PRIVATE_ERROR + 0;
  455. {
  456. * An attempt was made to use a public key which is incomplete due to
  457. * the lack of algorithm-specific parameters.
  458. }
  459. CSSMERR_CSP_APPLE_PUBLIC_KEY_INCOMPLETE = CSSM_CSP_PRIVATE_ERROR + 1;
  460. { a code signature match failed }
  461. CSSMERR_CSP_APPLE_SIGNATURE_MISMATCH = CSSM_CSP_PRIVATE_ERROR + 2;
  462. { Key StartDate/EndDate invalid }
  463. CSSMERR_CSP_APPLE_INVALID_KEY_START_DATE = CSSM_CSP_PRIVATE_ERROR + 3;
  464. CSSMERR_CSP_APPLE_INVALID_KEY_END_DATE = CSSM_CSP_PRIVATE_ERROR + 4;
  465. { Keychain Syncing error codes }
  466. CSSMERR_CSPDL_APPLE_DL_CONVERSION_ERROR = CSSM_CSP_PRIVATE_ERROR + 5;
  467. { SSLv2 padding check: rollback attack detected }
  468. CSSMERR_CSP_APPLE_SSLv2_ROLLBACK = CSSM_CSP_PRIVATE_ERROR + 6;
  469. { AppleFileDL record types. }
  470. const
  471. CSSM_DL_DB_RECORD_GENERIC_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 0;
  472. CSSM_DL_DB_RECORD_INTERNET_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 1;
  473. CSSM_DL_DB_RECORD_APPLESHARE_PASSWORD = CSSM_DB_RECORDTYPE_APP_DEFINED_START + 2;
  474. CSSM_DL_DB_RECORD_X509_CERTIFICATE = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000;
  475. CSSM_DL_DB_RECORD_USER_TRUST = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 1;
  476. CSSM_DL_DB_RECORD_X509_CRL = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 2;
  477. CSSM_DL_DB_RECORD_UNLOCK_REFERRAL = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 3;
  478. CSSM_DL_DB_RECORD_EXTENDED_ATTRIBUTE = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $1000 + 4;
  479. CSSM_DL_DB_RECORD_METADATA = CSSM_DB_RECORDTYPE_APP_DEFINED_START + $8000;
  480. { AppleFileDL extentions: passthrough ids }
  481. const
  482. // Toggle whether or not to autocommit after modifying the database.
  483. // The input parameter is a CSSM_BOOL, where TRUE turns autocommit on
  484. // and FALSE turns it off.
  485. CSSM_APPLEFILEDL_TOGGLE_AUTOCOMMIT = 0;
  486. // Commit any pending changes to the database.
  487. CSSM_APPLEFILEDL_COMMIT = 1;
  488. // Rollback and discard any pending changes to the database.
  489. CSSM_APPLEFILEDL_ROLLBACK = 2;
  490. { UNLOCK_REFERRAL "type" attribute values }
  491. const
  492. CSSM_APPLE_UNLOCK_TYPE_KEY_DIRECT = 1; // master secret key stored directly
  493. CSSM_APPLE_UNLOCK_TYPE_WRAPPED_PRIVATE = 2; // master key wrapped by public key
  494. { Apple DL private error codes. }
  495. const
  496. { The OpenParameters argument passed to CSSM_DL_DbCreate or CSSM_DL_DbOpen
  497. was neither NULL nor a pointer to a valid CSSM_APPLEDL_OPEN_PARAMETERS
  498. structure. }
  499. CSSMERR_APPLEDL_INVALID_OPEN_PARAMETERS = CSSM_DL_PRIVATE_ERROR + 0;
  500. { an operation failed because the disk was full }
  501. CSSMERR_APPLEDL_DISK_FULL = CSSM_DL_PRIVATE_ERROR + 1;
  502. { an operation failed because a disk quota was exceeded }
  503. CSSMERR_APPLEDL_QUOTA_EXCEEDED = CSSM_DL_PRIVATE_ERROR + 2;
  504. { an operation failed because a file was too large }
  505. CSSMERR_APPLEDL_FILE_TOO_BIG = CSSM_DL_PRIVATE_ERROR + 3;
  506. { a keychain database's internal information ("blob") is invalid }
  507. CSSMERR_APPLEDL_INVALID_DATABASE_BLOB = CSSM_DL_PRIVATE_ERROR + 4;
  508. CSSMERR_APPLEDL_INVALID_KEY_BLOB = CSSM_DL_PRIVATE_ERROR + 5;
  509. { the internal data format version for a database's internal information ("blob") is invalid }
  510. CSSMERR_APPLEDL_INCOMPATIBLE_DATABASE_BLOB = CSSM_DL_PRIVATE_ERROR + 6;
  511. CSSMERR_APPLEDL_INCOMPATIBLE_KEY_BLOB = CSSM_DL_PRIVATE_ERROR + 7;
  512. { Apple X509TP private error codes. }
  513. const
  514. { Host name mismatch }
  515. CSSMERR_APPLETP_HOSTNAME_MISMATCH = CSSM_TP_PRIVATE_ERROR + 0;
  516. { Non-understood extension with Critical flag true }
  517. CSSMERR_APPLETP_UNKNOWN_CRITICAL_EXTEN = CSSM_TP_PRIVATE_ERROR + 1;
  518. { Basic Constraints extension required per policy, but not present }
  519. CSSMERR_APPLETP_NO_BASIC_CONSTRAINTS = CSSM_TP_PRIVATE_ERROR + 2;
  520. { Invalid BasicConstraints.CA }
  521. CSSMERR_APPLETP_INVALID_CA = CSSM_TP_PRIVATE_ERROR + 3;
  522. { Invalid Authority Key ID }
  523. CSSMERR_APPLETP_INVALID_AUTHORITY_ID = CSSM_TP_PRIVATE_ERROR + 4;
  524. { Invalid Subject Key ID }
  525. CSSMERR_APPLETP_INVALID_SUBJECT_ID = CSSM_TP_PRIVATE_ERROR + 5;
  526. { Invalid Key Usage for policy }
  527. CSSMERR_APPLETP_INVALID_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 6;
  528. { Invalid Extended Key Usage for policy }
  529. CSSMERR_APPLETP_INVALID_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 7;
  530. { Invalid Subject/Authority Key ID Linkage }
  531. CSSMERR_APPLETP_INVALID_ID_LINKAGE = CSSM_TP_PRIVATE_ERROR + 8;
  532. { PathLengthConstraint exceeded }
  533. CSSMERR_APPLETP_PATH_LEN_CONSTRAINT = CSSM_TP_PRIVATE_ERROR + 9;
  534. { Cert group terminated at a root cert which did not self-verify }
  535. CSSMERR_APPLETP_INVALID_ROOT = CSSM_TP_PRIVATE_ERROR + 10;
  536. { CRL expired/not valid yet }
  537. CSSMERR_APPLETP_CRL_EXPIRED = CSSM_TP_PRIVATE_ERROR + 11;
  538. CSSMERR_APPLETP_CRL_NOT_VALID_YET = CSSM_TP_PRIVATE_ERROR + 12;
  539. { Cannot find appropriate CRL }
  540. CSSMERR_APPLETP_CRL_NOT_FOUND = CSSM_TP_PRIVATE_ERROR + 13;
  541. { specified CRL server down }
  542. CSSMERR_APPLETP_CRL_SERVER_DOWN = CSSM_TP_PRIVATE_ERROR + 14;
  543. { illegible CRL distribution point URL }
  544. CSSMERR_APPLETP_CRL_BAD_URI = CSSM_TP_PRIVATE_ERROR + 15;
  545. { Unknown critical cert/CRL extension }
  546. CSSMERR_APPLETP_UNKNOWN_CERT_EXTEN = CSSM_TP_PRIVATE_ERROR + 16;
  547. CSSMERR_APPLETP_UNKNOWN_CRL_EXTEN = CSSM_TP_PRIVATE_ERROR + 17;
  548. { CRL not verifiable to anchor or root }
  549. CSSMERR_APPLETP_CRL_NOT_TRUSTED = CSSM_TP_PRIVATE_ERROR + 18;
  550. { CRL verified to untrusted root }
  551. CSSMERR_APPLETP_CRL_INVALID_ANCHOR_CERT = CSSM_TP_PRIVATE_ERROR + 19;
  552. { CRL failed policy verification }
  553. CSSMERR_APPLETP_CRL_POLICY_FAIL = CSSM_TP_PRIVATE_ERROR + 20;
  554. { IssuingDistributionPoint extension violation }
  555. CSSMERR_APPLETP_IDP_FAIL = CSSM_TP_PRIVATE_ERROR + 21;
  556. { Cert not found at specified issuerAltName }
  557. CSSMERR_APPLETP_CERT_NOT_FOUND_FROM_ISSUER = CSSM_TP_PRIVATE_ERROR + 22;
  558. { Bad cert obtained from specified issuerAltName }
  559. CSSMERR_APPLETP_BAD_CERT_FROM_ISSUER = CSSM_TP_PRIVATE_ERROR + 23;
  560. { S/MIME Email address mismatch }
  561. CSSMERR_APPLETP_SMIME_EMAIL_ADDRS_NOT_FOUND = CSSM_TP_PRIVATE_ERROR + 24;
  562. { Appropriate S/MIME ExtendedKeyUsage not found }
  563. CSSMERR_APPLETP_SMIME_BAD_EXT_KEY_USE = CSSM_TP_PRIVATE_ERROR + 25;
  564. { S/MIME KeyUsage incompatibility }
  565. CSSMERR_APPLETP_SMIME_BAD_KEY_USE = CSSM_TP_PRIVATE_ERROR + 26;
  566. { S/MIME, cert with KeyUsage flagged !critical }
  567. CSSMERR_APPLETP_SMIME_KEYUSAGE_NOT_CRITICAL = CSSM_TP_PRIVATE_ERROR + 27;
  568. { S/MIME, leaf with empty subject name and no email addrs
  569. * in SubjectAltName }
  570. CSSMERR_APPLETP_SMIME_NO_EMAIL_ADDRS = CSSM_TP_PRIVATE_ERROR + 28;
  571. { S/MIME, leaf with empty subject name, SubjectAltName
  572. * not critical }
  573. CSSMERR_APPLETP_SMIME_SUBJ_ALT_NAME_NOT_CRIT = CSSM_TP_PRIVATE_ERROR + 29;
  574. { Appropriate SSL ExtendedKeyUsage not found }
  575. CSSMERR_APPLETP_SSL_BAD_EXT_KEY_USE = CSSM_TP_PRIVATE_ERROR + 30;
  576. { unparseable OCSP response }
  577. CSSMERR_APPLETP_OCSP_BAD_RESPONSE = CSSM_TP_PRIVATE_ERROR + 31;
  578. { unparseable OCSP request }
  579. CSSMERR_APPLETP_OCSP_BAD_REQUEST = CSSM_TP_PRIVATE_ERROR + 32;
  580. { OCSP service unavailable }
  581. CSSMERR_APPLETP_OCSP_UNAVAILABLE = CSSM_TP_PRIVATE_ERROR + 33;
  582. { OCSP status: cert unrecognized }
  583. CSSMERR_APPLETP_OCSP_STATUS_UNRECOGNIZED = CSSM_TP_PRIVATE_ERROR + 34;
  584. { revocation check not successful for each cert }
  585. CSSMERR_APPLETP_INCOMPLETE_REVOCATION_CHECK = CSSM_TP_PRIVATE_ERROR + 35;
  586. { general network error }
  587. CSSMERR_APPLETP_NETWORK_FAILURE = CSSM_TP_PRIVATE_ERROR + 36;
  588. { OCSP response not verifiable to anchor or root }
  589. CSSMERR_APPLETP_OCSP_NOT_TRUSTED = CSSM_TP_PRIVATE_ERROR + 37;
  590. { OCSP response verified to untrusted root }
  591. CSSMERR_APPLETP_OCSP_INVALID_ANCHOR_CERT = CSSM_TP_PRIVATE_ERROR + 38;
  592. { OCSP response signature error }
  593. CSSMERR_APPLETP_OCSP_SIG_ERROR = CSSM_TP_PRIVATE_ERROR + 39;
  594. { No signer for OCSP response found }
  595. CSSMERR_APPLETP_OCSP_NO_SIGNER = CSSM_TP_PRIVATE_ERROR + 40;
  596. { OCSP responder status: malformed request }
  597. CSSMERR_APPLETP_OCSP_RESP_MALFORMED_REQ = CSSM_TP_PRIVATE_ERROR + 41;
  598. { OCSP responder status: internal error }
  599. CSSMERR_APPLETP_OCSP_RESP_INTERNAL_ERR = CSSM_TP_PRIVATE_ERROR + 42;
  600. { OCSP responder status: try later }
  601. CSSMERR_APPLETP_OCSP_RESP_TRY_LATER = CSSM_TP_PRIVATE_ERROR + 43;
  602. { OCSP responder status: signature required }
  603. CSSMERR_APPLETP_OCSP_RESP_SIG_REQUIRED = CSSM_TP_PRIVATE_ERROR + 44;
  604. { OCSP responder status: unauthorized }
  605. CSSMERR_APPLETP_OCSP_RESP_UNAUTHORIZED = CSSM_TP_PRIVATE_ERROR + 45;
  606. { OCSP response nonce did not match request }
  607. CSSMERR_APPLETP_OCSP_NONCE_MISMATCH = CSSM_TP_PRIVATE_ERROR + 46;
  608. { Illegal cert chain length for Code Signing }
  609. CSSMERR_APPLETP_CS_BAD_CERT_CHAIN_LENGTH = CSSM_TP_PRIVATE_ERROR + 47;
  610. { Missing Basic Constraints for Code Signing }
  611. CSSMERR_APPLETP_CS_NO_BASIC_CONSTRAINTS = CSSM_TP_PRIVATE_ERROR + 48;
  612. { Bad PathLengthConstraint for Code Signing }
  613. CSSMERR_APPLETP_CS_BAD_PATH_LENGTH = CSSM_TP_PRIVATE_ERROR + 49;
  614. { Missing ExtendedKeyUsage for Code Signing }
  615. CSSMERR_APPLETP_CS_NO_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 50;
  616. { Development style Code Signing Cert Detected }
  617. CSSMERR_APPLETP_CODE_SIGN_DEVELOPMENT = CSSM_TP_PRIVATE_ERROR + 51;
  618. { Illegal cert chain length for Resource Signing }
  619. CSSMERR_APPLETP_RS_BAD_CERT_CHAIN_LENGTH = CSSM_TP_PRIVATE_ERROR + 52;
  620. { Bad extended key usage for Resource Signing }
  621. CSSMERR_APPLETP_RS_BAD_EXTENDED_KEY_USAGE = CSSM_TP_PRIVATE_ERROR + 53;
  622. { Trust Setting: deny }
  623. CSSMERR_APPLETP_TRUST_SETTING_DENY = CSSM_TP_PRIVATE_ERROR + 54;
  624. { Invalid empty SubjectName }
  625. CSSMERR_APPLETP_INVALID_EMPTY_SUBJECT = CSSM_TP_PRIVATE_ERROR + 55;
  626. { Unknown critical Qualified Cert Statement ID }
  627. CSSMERR_APPLETP_UNKNOWN_QUAL_CERT_STATEMENT = CSSM_TP_PRIVATE_ERROR + 56;
  628. { Missing required extension }
  629. CSSMERR_APPLETP_MISSING_REQUIRED_EXTENSION = CSSM_TP_PRIVATE_ERROR + 57;
  630. { Extended key usage not marked critical }
  631. CSSMERR_APPLETP_EXT_KEYUSAGE_NOT_CRITICAL = CSSM_TP_PRIVATE_ERROR + 58;
  632. { Required name or identifier not present }
  633. CSSMERR_APPLETP_IDENTIFIER_MISSING = CSSM_TP_PRIVATE_ERROR + 59;
  634. { Apple .mac TP private error codes. }
  635. const
  636. { cert request queued }
  637. CSSMERR_APPLE_DOTMAC_REQ_QUEUED = CSSM_TP_PRIVATE_ERROR + 100;
  638. { cert request redirected }
  639. CSSMERR_APPLE_DOTMAC_REQ_REDIRECT = CSSM_TP_PRIVATE_ERROR + 101;
  640. { general server-reported error }
  641. CSSMERR_APPLE_DOTMAC_REQ_SERVER_ERR = CSSM_TP_PRIVATE_ERROR + 102;
  642. { server-reported parameter error }
  643. CSSMERR_APPLE_DOTMAC_REQ_SERVER_PARAM = CSSM_TP_PRIVATE_ERROR + 103;
  644. { server-reported authorization error }
  645. CSSMERR_APPLE_DOTMAC_REQ_SERVER_AUTH = CSSM_TP_PRIVATE_ERROR + 104;
  646. { server-reported unimplemented }
  647. CSSMERR_APPLE_DOTMAC_REQ_SERVER_UNIMPL = CSSM_TP_PRIVATE_ERROR + 105;
  648. { server-reported not available }
  649. CSSMERR_APPLE_DOTMAC_REQ_SERVER_NOT_AVAIL = CSSM_TP_PRIVATE_ERROR + 106;
  650. { server-reported already exists }
  651. CSSMERR_APPLE_DOTMAC_REQ_SERVER_ALREADY_EXIST = CSSM_TP_PRIVATE_ERROR + 107;
  652. { server-reported service error }
  653. CSSMERR_APPLE_DOTMAC_REQ_SERVER_SERVICE_ERROR = CSSM_TP_PRIVATE_ERROR + 108;
  654. { request already pending for specified user }
  655. CSSMERR_APPLE_DOTMAC_REQ_IS_PENDING = CSSM_TP_PRIVATE_ERROR + 109;
  656. { no request pending for specified user }
  657. CSSMERR_APPLE_DOTMAC_NO_REQ_PENDING = CSSM_TP_PRIVATE_ERROR + 110;
  658. { CSR failed to verify }
  659. CSSMERR_APPLE_DOTMAC_CSR_VERIFY_FAIL = CSSM_TP_PRIVATE_ERROR + 111;
  660. { server reported failed consistency check }
  661. CSSMERR_APPLE_DOTMAC_FAILED_CONSISTENCY_CHECK = CSSM_TP_PRIVATE_ERROR + 112;
  662. const
  663. CSSM_APPLEDL_OPEN_PARAMETERS_VERSION = 1;
  664. type
  665. cssm_appledl_open_parameters_mask = SInt32;
  666. const
  667. kCSSM_APPLEDL_MASK_MODE = 1 shl 0;
  668. { Pass a CSSM_APPLEDL_OPEN_PARAMETERS_PTR as the OpenParameters argument to
  669. CSSM_DL_DbCreate or CSSM_DL_DbOpen. When using this struct, you must zero
  670. out the entire struct before setting any additional parameters to ensure
  671. forward compatibility. }
  672. type
  673. CSSM_APPLEDL_OPEN_PARAMETERS_PTR = ^cssm_appledl_open_parameters;
  674. CSSM_APPLEDL_OPEN_PARAMETERSPtr = ^cssm_appledl_open_parameters;
  675. cssm_appledl_open_parameters = record
  676. length: UInt32; { Should be sizeof(CSSM_APPLEDL_OPEN_PARAMETERS). }
  677. version: UInt32; { Should be CSSM_APPLEDL_OPEN_PARAMETERS_VERSION. }
  678. { If no OpenParameters are specified, autoCommit is on (!CSSM_FALSE) by default.
  679. When autoCommit is on (!CSSM_FALSE), changes made to the Db are written to disk
  680. before returning from each function.
  681. When autoCommit is off (CSSM_FALSE), changes made to the database are not guaranteed
  682. to be written to disk until the Db is closed. This is useful for bulk writes.
  683. Be aware that if autoCommit is off, changes made in previous calls to the DL might
  684. get rolled back if a new modification operation fails. }
  685. autoCommit: CSSM_BOOL;
  686. { Mask marking which of the following fields are to be used. }
  687. mask: UInt32;
  688. { When calling DbCreate, the initial mode to create the database file with; ignored on DbOpen. You must set the kCSSM_APPLEDL_MASK_MODE bit in mask or mode is ignored. }
  689. mode: mode_t;
  690. end;
  691. { AppleCSPDL passthough ids }
  692. const
  693. { Tell the SecurityServer to lock the database specified by the DLDBHandle argument.
  694. The InputParams and OutputParams arguments are ignored. }
  695. CSSM_APPLECSPDL_DB_LOCK = 0;
  696. { Tell the SecurityServer to unlock the database specified by the DLDBHandle argument.
  697. The InputParameters argument is a CSSM_DATA_PTR containing the password, or NULL if
  698. the SecurityServer should prompt for the password.
  699. The OutputParams argument is ignored.
  700. The SecurityServer will put up UI (though the SecurityAgent) when this function is called
  701. iff InputParameters is NULL. }
  702. CSSM_APPLECSPDL_DB_UNLOCK = 1;
  703. { Ask the SecurityServer to get the db settings specified for the database
  704. specified by the DLDBHandle argument. The settings are returned in the OutputParameters argument.
  705. The OutputParameters argument is a pointer to a CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR.
  706. Upon successful completion, the AppleCSPDL will have allocated a
  707. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS structure using the application-specified
  708. allocators for the DL attachment specified by the DLDBHandle argument. The structure will contain
  709. the current database settings for the specified database. The client should free the
  710. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR after it has finished using it.
  711. The InputParameters argument is ignored.
  712. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  713. CSSM_APPLECSPDL_DB_GET_SETTINGS = 2;
  714. { Tell the SecurityServer to set the db settings specified in InputParameters on the database
  715. specified by the DLDBHandle argument.
  716. The InputParameters argument is a const CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS * containing
  717. the new settings for the specified database.
  718. The OutputParams argument is ignored.
  719. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  720. CSSM_APPLECSPDL_DB_SET_SETTINGS = 3;
  721. { Ask the SecurityServer whether the database specified by the DLDBHandle argument is locked.
  722. The InputParameters argument is ignored.
  723. The OutputParameters argument is a pointer to a CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR.
  724. Upon successful completion, the AppleCSPDL will have allocated a
  725. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS structure using the application-specified
  726. allocators for the DL attachment specified by the DLDBHandle argument. The structure will contain
  727. the current lock status for the specified database. The client should free the
  728. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR after it has finished using it.
  729. The SecurityServer will put up UI (though the SecurityAgent) when this function is called. }
  730. CSSM_APPLECSPDL_DB_IS_LOCKED = 4;
  731. { Tell the SecurityServer to change the password for the database specified by
  732. the DLDBHandle.
  733. The InputParameters argument is a const CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERS * containing
  734. a CSSM_ACCESS_CREDENTIALS * which determines how the password will be changed. If the
  735. accessCredentials are NULL, the SecurityAgent will prompt for the old and the new password for the
  736. specified database. If credentials are specified, there should be 2 entries:
  737. 1. a 3-element list containing:
  738. CSSM_WORDID_KEYCHAIN_LOCK, CSSM_SAMPLE_TYPE_PASSWORD, and the old password.
  739. 2. a 3-element list containing:
  740. CSSM_WORDID_KEYCHAIN_CHANGE_LOCK, CSSM_SAMPLE_TYPE_PASSWORD, and the new password.
  741. The OutputParams argument is ignored.
  742. The SecurityServer might put up UI (though the SecurityAgent) when this function is called. }
  743. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD = 5;
  744. { Return the SecurityServer database handle for the database specified by the DLDBHandle }
  745. CSSM_APPLECSPDL_DB_GET_HANDLE = 6;
  746. { Given a CSSM_KEY for the CSPDL, return the SecurityServer key handle }
  747. CSSM_APPLESCPDL_CSP_GET_KEYHANDLE = 7;
  748. CSSM_APPLE_PRIVATE_CSPDL_CODE_8 = 8;
  749. CSSM_APPLE_PRIVATE_CSPDL_CODE_9 = 9;
  750. CSSM_APPLE_PRIVATE_CSPDL_CODE_10 = 10;
  751. CSSM_APPLE_PRIVATE_CSPDL_CODE_11 = 11;
  752. CSSM_APPLE_PRIVATE_CSPDL_CODE_12 = 12;
  753. CSSM_APPLE_PRIVATE_CSPDL_CODE_13 = 13;
  754. CSSM_APPLE_PRIVATE_CSPDL_CODE_14 = 14;
  755. CSSM_APPLE_PRIVATE_CSPDL_CODE_15 = 15;
  756. CSSM_APPLE_PRIVATE_CSPDL_CODE_16 = 16;
  757. CSSM_APPLE_PRIVATE_CSPDL_CODE_17 = 17;
  758. CSSM_APPLE_PRIVATE_CSPDL_CODE_18 = 18;
  759. { Given a CSSM_KEY_PTR in any format, obtain the SHA-1 hash of the
  760. * associated key blob.
  761. * Key is specified in CSSM_CSP_CreatePassThroughContext.
  762. * Hash is allocated bythe CSP, in the App's memory, and returned
  763. * in *outData. }
  764. CSSM_APPLECSP_KEYDIGEST = $100;
  765. { AppleCSPDL passthough parameters }
  766. type
  767. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERS_PTR = ^cssm_applecspdl_db_settings_parameters;
  768. CSSM_APPLECSPDL_DB_SETTINGS_PARAMETERSPtr = ^cssm_applecspdl_db_settings_parameters;
  769. cssm_applecspdl_db_settings_parameters = record
  770. idleTimeout: UInt32; // seconds idle timeout lock
  771. lockOnSleep: UInt8; // lock database when system sleeps
  772. end;
  773. { AppleCSPDL passthough parameters }
  774. type
  775. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERS_PTR = ^cssm_applecspdl_db_is_locked_parameters;
  776. CSSM_APPLECSPDL_DB_IS_LOCKED_PARAMETERSPtr = ^cssm_applecspdl_db_is_locked_parameters;
  777. cssm_applecspdl_db_is_locked_parameters = record
  778. isLocked: UInt8; // True iff the database is locked
  779. end;
  780. { AppleCSPDL passthough parameters }
  781. type
  782. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERS_PTR = ^cssm_applecspdl_db_change_password_parameters;
  783. CSSM_APPLECSPDL_DB_CHANGE_PASSWORD_PARAMETERSPtr = ^cssm_applecspdl_db_change_password_parameters;
  784. cssm_applecspdl_db_change_password_parameters = record
  785. accessCredentials: CSSM_ACCESS_CREDENTIALSPtr;
  786. end;
  787. { Custom wrapped key formats }
  788. const
  789. CSSM_KEYBLOB_WRAPPED_FORMAT_APPLE_CUSTOM = 100;
  790. CSSM_KEYBLOB_WRAPPED_FORMAT_OPENSSL = 101; // traditional openssl
  791. CSSM_KEYBLOB_WRAPPED_FORMAT_OPENSSH1 = 102; // OpenSSH v1
  792. {
  793. * Custom context attributes for AppleCSP.
  794. }
  795. const
  796. CSSM_ATTRIBUTE_VENDOR_DEFINED = $800000;
  797. const
  798. {
  799. * Public Key attribute for use with CSSM_ALGID_FEED.
  800. }
  801. CSSM_ATTRIBUTE_PUBLIC_KEY = (CSSM_ATTRIBUTE_DATA_KEY or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 0));
  802. {
  803. * FEE key attributes.
  804. * See CSSM_FEE_PRIME_TYPE_xxx, CSSM_FEE_CURVE_TYPE_xxx enums, below.
  805. }
  806. CSSM_ATTRIBUTE_FEE_PRIME_TYPE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 1));
  807. CSSM_ATTRIBUTE_FEE_CURVE_TYPE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 2));
  808. {
  809. * Apple Secure Compression (ComCryption) optimization.
  810. * See CSSM_ASC_OPTIMIZE_xxx, enums, below.
  811. }
  812. CSSM_ATTRIBUTE_ASC_OPTIMIZATION = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 3));
  813. {
  814. * RSA blinding. Value is integer, nonzero (blinding on) or zero.
  815. }
  816. CSSM_ATTRIBUTE_RSA_BLINDING = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 4));
  817. {
  818. * Additional public key from which to obtain algorithm-specific
  819. * parameters.
  820. }
  821. CSSM_ATTRIBUTE_PARAM_KEY = (CSSM_ATTRIBUTE_DATA_KEY or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 5));
  822. {
  823. * Prompt string for CSSM_ALGID_SECURE_PASSPHRASE key acquisition.
  824. * Data is a UTF8-encoded external representation of a CFString.
  825. }
  826. CSSM_ATTRIBUTE_PROMPT = (CSSM_ATTRIBUTE_DATA_CSSM_DATA or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 6));
  827. {
  828. * Alert panel title for CSSM_ALGID_SECURE_PASSPHRASE key acquisition.
  829. * Data is a UTF8-encoded external representation of a CFString.
  830. }
  831. CSSM_ATTRIBUTE_ALERT_TITLE = (CSSM_ATTRIBUTE_DATA_CSSM_DATA or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 7));
  832. {
  833. * Boolean to specify whether secure passphrase is being used to encrypt or to
  834. * recover data. In the former case the user will be prompted to enter the
  835. * passphrase twice. Value is integer, nonzero (verify passphrase) or zero.
  836. }
  837. CSSM_ATTRIBUTE_VERIFY_PASSPHRASE = (CSSM_ATTRIBUTE_DATA_UINT32 or (CSSM_ATTRIBUTE_VENDOR_DEFINED + 8));
  838. {
  839. * FEE key pair prime modulus types.
  840. }
  841. const
  842. CSSM_FEE_PRIME_TYPE_DEFAULT = 0; { default per key size }
  843. CSSM_FEE_PRIME_TYPE_MERSENNE = 1; { (2 ** q) - 1 }
  844. CSSM_FEE_PRIME_TYPE_FEE = 2; { (2 ** q) - k }
  845. CSSM_FEE_PRIME_TYPE_GENERAL = 3; { random prime }
  846. {
  847. * FEE curve types. Comments refer to equation
  848. *
  849. * y**2 = x**3 + c(x**2) + ax + b
  850. }
  851. const
  852. CSSM_FEE_CURVE_TYPE_DEFAULT = 0; { default per key size }
  853. CSSM_FEE_CURVE_TYPE_MONTGOMERY = 1; { a==1, b==0 }
  854. CSSM_FEE_CURVE_TYPE_WEIERSTRASS = 2; { c==0. IEEE P1363 compliant. }
  855. CSSM_FEE_CURVE_TYPE_ANSI_X9_62 = 3; { ANSI X9.62 compatible }
  856. {
  857. * Apple Secure Compression (ComCryption) optimization attributes.
  858. }
  859. const
  860. CSSM_ASC_OPTIMIZE_DEFAULT = 0;
  861. CSSM_ASC_OPTIMIZE_SIZE = 1; { max compression (currently the default) }
  862. CSSM_ASC_OPTIMIZE_SECURITY = 2; { currently not implemented }
  863. CSSM_ASC_OPTIMIZE_TIME = 3; { min runtime }
  864. CSSM_ASC_OPTIMIZE_TIME_SIZE = 4; { implies loss of security }
  865. CSSM_ASC_OPTIMIZE_ASCII = 5; { optimized for ASCC text, not implemented }
  866. {
  867. * Apple custom CSSM_KEYATTR_FLAGS.
  868. }
  869. const
  870. {
  871. * When set, indicates a public key which is incomplete (though
  872. * still valid) due to the lack of algorithm-specific parameters.
  873. }
  874. CSSM_KEYATTR_PARTIAL = $00010000;
  875. {
  876. * When set, public keys are stored encrypted. Default is to store
  877. * public keys in the clear. AppleCSPDL only.
  878. }
  879. CSSM_KEYATTR_PUBLIC_KEY_ENCRYPT = $00020000;
  880. {
  881. * Name/OID pair used in CSSM_APPLE_TP_CERT_REQUEST
  882. }
  883. type
  884. CSSM_APPLE_TP_NAME_OIDPtr = ^CSSM_APPLE_TP_NAME_OID;
  885. CSSM_APPLE_TP_NAME_OID = record
  886. strng: {const} CStringPtr;
  887. oid: {const} CSSM_OIDPtr;
  888. end;
  889. {
  890. * Certificate request passed to CSSM_TP_SubmitCredRequest() in the
  891. * CSSM_TP_AUTHORITY_REQUEST_TYPE.Requests field. Used for requesting
  892. * both locally-generated certs (CSSMOID_APPLE_TP_LOCAL_CERT_GEN) and
  893. * cert signing requests (CSSMOID_APPLE_TP_CSR_GEN).
  894. }
  895. type
  896. CSSM_APPLE_TP_CERT_REQUESTPtr = ^CSSM_APPLE_TP_CERT_REQUEST;
  897. CSSM_APPLE_TP_CERT_REQUEST = record
  898. cspHand: CSSM_CSP_HANDLE; // sign with this CSP
  899. clHand: CSSM_CL_HANDLE; // and this CL
  900. serialNumber: UInt32;
  901. numSubjectNames: UInt32;// size subjectNames[]
  902. subjectNames: CSSM_APPLE_TP_NAME_OIDPtr;
  903. {
  904. * Issuer name can be expressed in the simplified CSSM_APPLE_TP_NAME_OID
  905. * array, as is the subject name, or as an CSSM_X509_NAME, which is
  906. * typically obtained from a signing cert.
  907. * Exactly one of (issuerNames, issuerNameX509) must be non-NULL.
  908. }
  909. numIssuerNames: UInt32; // size issuerNames[]
  910. issuerNames: CSSM_APPLE_TP_NAME_OIDPtr; // optional; NULL implies root
  911. // (signer == subject)
  912. issuerNameX509: CSSM_X509_NAME_PTR;
  913. certPublicKey: {const} CSSM_KEYPtr;
  914. issuerPrivateKey: {const} CSSM_KEYPtr;
  915. { Unfortunately there is no practical way to map any algorithm
  916. * to its appropriate OID, and we need both.... }
  917. signatureAlg: CSSM_ALGORITHMS; // e.g., CSSM_ALGID_SHA1WithRSA
  918. signatureOid: CSSM_OID; // e.g., CSSMOID_SHA1WithRSA
  919. notBefore: UInt32; // relative to "now"
  920. notAfter: UInt32;
  921. numExtensions: UInt32;
  922. extensions: CE_DataAndTypePtr; // optional
  923. {
  924. * Optional challenge string for CSSMOID_APPLE_TP_CSR_GEN.
  925. }
  926. challengeString: {const} CStringPtr;
  927. end;
  928. {
  929. * Options for X509TP's CSSM_TP_CertGroupVerify for policy CSSMOID_APPLE_TP_SSL.
  930. * A pointer to, and length of, one of these is optionally placed in
  931. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  932. }
  933. const
  934. CSSM_APPLE_TP_SSL_OPTS_VERSION = 1;
  935. {
  936. * Values for CSSM_APPLE_TP_SSL_OPTIONS.flags.
  937. *
  938. * Set this flag when evaluating a client cert.
  939. }
  940. const
  941. CSSM_APPLE_TP_SSL_CLIENT = $00000001;
  942. type
  943. CSSM_APPLE_TP_SSL_OPTIONSPtr = ^CSSM_APPLE_TP_SSL_OPTIONS;
  944. CSSM_APPLE_TP_SSL_OPTIONS = record
  945. Version: UInt32; // CSSM_APPLE_TP_SSL_OPTS_VERSION
  946. {
  947. * The domain name of the server (e.g., "store.apple.com".) In the
  948. * SSL and TLS protocols, this must match the common name of the
  949. * subject cert. Expressed as a C string, optionally NULL terminated
  950. * if it is NULL terminated, the length field should include the NULL).
  951. }
  952. ServerNameLen: UInt32;
  953. ServerName: {const} CStringPtr; // optional
  954. { new fields for struct version 1 }
  955. Flags: UInt32;
  956. end;
  957. {
  958. * Options for X509TP's CSSM_TP_CertGroupVerify for policy
  959. * CSSMOID_APPLE_TP_REVOCATION_CRL. A pointer to, and length of, one
  960. * of these is optionally placed in
  961. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  962. }
  963. const
  964. CSSM_APPLE_TP_CRL_OPTS_VERSION = 0;
  965. type
  966. CSSM_APPLE_TP_CRL_OPT_FLAGS = UInt32;
  967. const
  968. // require CRL verification for each cert; default is "try"
  969. CSSM_TP_ACTION_REQUIRE_CRL_PER_CERT = $00000001;
  970. // enable fetch from network
  971. CSSM_TP_ACTION_FETCH_CRL_FROM_NET = $00000002;
  972. // if set and positive OCSP verify for given cert, no further revocation
  973. // checking need be done on that cert
  974. CSSM_TP_ACTION_CRL_SUFFICIENT = $00000004;
  975. // require CRL verification for certs which claim a CRL provider
  976. CSSM_TP_ACTION_REQUIRE_CRL_IF_PRESENT = $00000008;
  977. type
  978. CSSM_APPLE_TP_CRL_OPTIONSPtr = ^CSSM_APPLE_TP_CRL_OPTIONS;
  979. CSSM_APPLE_TP_CRL_OPTIONS = record
  980. Version: UInt32; // CSSM_APPLE_TP_CRL_OPTS_VERSION
  981. CrlFlags: CSSM_APPLE_TP_CRL_OPT_FLAGS;
  982. {
  983. * When non-NULL, store CRLs fetched from net here.
  984. * This is most likely a pointer to one of the
  985. * CSSM_TP_CALLERAUTH_CONTEXT.DBList entries but that
  986. * is not a strict requirement.
  987. }
  988. crlStore: CSSM_DL_DB_HANDLE_PTR;
  989. end;
  990. {
  991. * Options for X509TP's CSSM_TP_CertGroupVerify for policy
  992. * CSSMOID_APPLE_TP_SMIME. A pointer to, and length of, one
  993. * of these is optionally placed in
  994. * CSSM_TP_VERIFY_CONTEXT.Cred->Policy.PolicyIds[n].FieldValue.
  995. }
  996. const
  997. CSSM_APPLE_TP_SMIME_OPTS_VERSION = 0;
  998. type
  999. CSSM_APPLE_TP_SMIME_OPTIONSPtr = ^CSSM_APPLE_TP_SMIME_OPTIONS;
  1000. CSSM_APPLE_TP_SMIME_OPTIONS = record
  1001. Version: UInt32; // CSSM_APPLE_TP_SMIME_OPTS_VERSION
  1002. {
  1003. * Intended usage of the leaf cert. The cert's KeyUsage extension,
  1004. * if present, must be a superset of this.
  1005. }
  1006. IntendedUsage: CE_KeyUsage;
  1007. {
  1008. * The email address of the sender. If there is an email address
  1009. * in the sender's cert, that email address must match this one.
  1010. * Both (email address in the cert, and this one) are optional.
  1011. * Expressed as a C string, optionally NULL terminated (i.e.,
  1012. * SenderEmail[SenderEmailLen - 1] may or may not be NULL).
  1013. }
  1014. SenderEmailLen: UInt32;
  1015. SenderEmail: {const} CStringPtr; // optional
  1016. end;
  1017. {
  1018. * Optional ActionData for all X509TP CertGroupVerify policies.
  1019. * A pointer to, and length of, one of these is optionally placed in
  1020. * CSSM_TP_VERIFY_CONTEXT.ActionData.
  1021. }
  1022. type
  1023. CSSM_APPLE_TP_ACTION_FLAGS = UInt32;
  1024. const
  1025. CSSM_TP_ACTION_ALLOW_EXPIRED = $00000001; // allow expired certs
  1026. CSSM_TP_ACTION_LEAF_IS_CA = $00000002; // first cert is a CA
  1027. CSSM_TP_ACTION_FETCH_CERT_FROM_NET = $00000004; // enable net fetch of CA cert
  1028. CSSM_TP_ACTION_ALLOW_EXPIRED_ROOT = $00000008; // allow expired roots
  1029. CSSM_TP_ACTION_REQUIRE_REV_PER_CERT = $00000010; // require positive revocation
  1030. // check per cert
  1031. CSSM_TP_ACTION_TRUST_SETTINGS = $00000020; // use TrustSettings instead of
  1032. // anchors
  1033. CSSM_TP_ACTION_IMPLICIT_ANCHORS = $00000040; // properly self-signed certs are
  1034. // treated as anchors implicitly
  1035. const
  1036. CSSM_APPLE_TP_ACTION_VERSION = 0;
  1037. type
  1038. CSSM_APPLE_TP_ACTION_DATAPtr = ^CSSM_APPLE_TP_ACTION_DATA;
  1039. CSSM_APPLE_TP_ACTION_DATA = record
  1040. Version: UInt32; // CSSM_APPLE_TP_ACTION_VERSION
  1041. ActionFlags: CSSM_APPLE_TP_ACTION_FLAGS; // CSSM_TP_ACTION_ALLOW_EXPIRED, etc.
  1042. end;
  1043. {
  1044. * Per-cert evidence returned from CSSM_TP_CertGroupVerify.
  1045. * An array of these is presented in CSSM_TP_VERIFY_CONTEXT_RESULT.Evidence[2].
  1046. * Same number of these as in the cert group in Evidence[1].
  1047. }
  1048. { First, an array of bits indicating various status of the cert. }
  1049. type
  1050. CSSM_TP_APPLE_CERT_STATUS = UInt32;
  1051. const
  1052. CSSM_CERT_STATUS_EXPIRED = $00000001;
  1053. CSSM_CERT_STATUS_NOT_VALID_YET = $00000002;
  1054. CSSM_CERT_STATUS_IS_IN_INPUT_CERTS = $00000004;
  1055. CSSM_CERT_STATUS_IS_IN_ANCHORS = $00000008;
  1056. CSSM_CERT_STATUS_IS_ROOT = $00000010;
  1057. CSSM_CERT_STATUS_IS_FROM_NET = $00000020;
  1058. { settings found in per-user Trust Settings }
  1059. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_USER = $00000040;
  1060. { settings found in Admin Trust Settings }
  1061. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_ADMIN = $00000080;
  1062. { settings found in System Trust Settings }
  1063. CSSM_CERT_STATUS_TRUST_SETTINGS_FOUND_SYSTEM = $00000100;
  1064. { Trust Settings result = Trust }
  1065. CSSM_CERT_STATUS_TRUST_SETTINGS_TRUST = $00000200;
  1066. { Trust Settings result = Deny }
  1067. CSSM_CERT_STATUS_TRUST_SETTINGS_DENY = $00000400;
  1068. { Per-cert error ignored due to Trust Settings }
  1069. CSSM_CERT_STATUS_TRUST_SETTINGS_IGNORED_ERROR = $00000800;
  1070. type
  1071. CSSM_TP_APPLE_EVIDENCE_INFOArrayPtr = ^CSSM_TP_APPLE_EVIDENCE_INFOPtr;
  1072. CSSM_TP_APPLE_EVIDENCE_INFOPtr = ^CSSM_TP_APPLE_EVIDENCE_INFO;
  1073. CSSM_TP_APPLE_EVIDENCE_INFO = record
  1074. StatusBits: CSSM_TP_APPLE_CERT_STATUS;
  1075. NumStatusCodes: UInt32;
  1076. StatusCodes: CSSM_RETURNPtr;
  1077. { index into raw cert group or AnchorCerts depending on IS_IN_ANCHORS }
  1078. Index: UInt32;
  1079. { nonzero if cert came from a DLDB }
  1080. DlDbHandle: CSSM_DL_DB_HANDLE;
  1081. UniqueRecord: CSSM_DB_UNIQUE_RECORD_PTR;
  1082. end;
  1083. {
  1084. * CSSM_TP_VERIFY_CONTEXT_RESULT.Evidence[0], basically defines which version/flavor
  1085. * of remaining evidence is.
  1086. }
  1087. const
  1088. CSSM_TP_APPLE_EVIDENCE_VERSION = 0;
  1089. type
  1090. CSSM_TP_APPLE_EVIDENCE_HEADERPtr = ^CSSM_TP_APPLE_EVIDENCE_HEADER;
  1091. CSSM_TP_APPLE_EVIDENCE_HEADER = record
  1092. Version: UInt32;
  1093. end;
  1094. {
  1095. * Apple-specific CSSM_EVIDENCE_FORM values
  1096. *
  1097. * The form of the evidence returns from CSSM_TP_CertGroupVerify is:
  1098. *
  1099. * EvidenceForm contents of *Evidence
  1100. * ------------ ---------------------
  1101. * CSSM_EVIDENCE_FORM_APPLE_HEADER CSSM_TP_APPLE_EVIDENCE_HEADER
  1102. * CSSM_EVIDENCE_FORM_APPLE_CERTGROUP CSSM_CERTGROUP
  1103. * CSSM_EVIDENCE_FORM_APPLE_CERT_INFO array of CSSM_TP_APPLE_EVIDENCE_INFO, size
  1104. * CSSM_CERTGROUP.NumCerts
  1105. }
  1106. const
  1107. CSSM_EVIDENCE_FORM_APPLE_CUSTOM = $80000000;
  1108. const
  1109. CSSM_EVIDENCE_FORM_APPLE_HEADER = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 0;
  1110. CSSM_EVIDENCE_FORM_APPLE_CERTGROUP = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 1;
  1111. CSSM_EVIDENCE_FORM_APPLE_CERT_INFO = CSSM_EVIDENCE_FORM_APPLE_CUSTOM + 2;
  1112. { AppleX509CL extensions: passthrough ids }
  1113. const
  1114. {
  1115. * Obtain a signed Certificate Signing Request.
  1116. * Input = CSSM_APPLE_CL_CSR_REQUEST
  1117. * Output = allocated CSSM_DATA which points to a DER-encoded CSR.
  1118. }
  1119. CSSM_APPLEX509CL_OBTAIN_CSR = 0;
  1120. {
  1121. * Perform signature verify of a CSR.
  1122. * Input: CSSM_DATA referring to a DER-encoded CSR.
  1123. * Output: Nothing, returns CSSMERR_CL_VERIFICATION_FAILURE on
  1124. * on failure.
  1125. }
  1126. CSSM_APPLEX509CL_VERIFY_CSR = 1;
  1127. {
  1128. * Used in CL's CSSM_APPLEX509_OBTAIN_CSR Passthrough. This is the
  1129. * input; the output is a CSSM_DATA * containing the signed and
  1130. * DER-encoded CSR.
  1131. }
  1132. type
  1133. CSSM_APPLE_CL_CSR_REQUESTPtr = ^CSSM_APPLE_CL_CSR_REQUEST;
  1134. CSSM_APPLE_CL_CSR_REQUEST = record
  1135. subjectNameX509: CSSM_X509_NAME_PTR;
  1136. { Unfortunately there is no practical way to map any algorithm
  1137. * to its appropriate OID, and we need both.... }
  1138. signatureAlg: CSSM_ALGORITHMS; // e.g., CSSM_ALGID_SHA1WithRSA
  1139. signatureOid: CSSM_OID; // e.g., CSSMOID_SHA1WithRSA
  1140. cspHand: CSSM_CSP_HANDLE; // sign with this CSP
  1141. subjectPublicKey: {const} CSSM_KEYPtr;
  1142. subjectPrivateKey: {const} CSSM_KEYPtr;
  1143. {
  1144. * Optional challenge string.
  1145. }
  1146. challengeString: {const} CStringPtr;
  1147. end;
  1148. {
  1149. * When a CRL with no NextUpdate field is encountered, we use this time
  1150. * as the NextUpdate attribute when storing in a DB. It represents the
  1151. * virtual end of time in CSSM_TIMESTRING form.
  1152. }
  1153. const
  1154. CSSM_APPLE_CRL_END_OF_TIME = '99991231235959';
  1155. {
  1156. * Default filesystem names and locations for SecurityServer features
  1157. * (included here for lack of a better place)
  1158. }
  1159. const
  1160. kKeychainSuffix = '.keychain';
  1161. const
  1162. kSystemKeychainName = 'System.keychain';
  1163. const
  1164. kSystemKeychainDir = '/Library/Keychains/';
  1165. const
  1166. kSystemUnlockFile = '/var/db/SystemKey';
  1167. procedure cssmPerror( how: ConstCStringPtr; error: CSSM_RETURN ); external name '_cssmPerror';
  1168. { Convert between CSSM_OID and CSSM_ALGORITHMS }
  1169. function cssmOidToAlg( const (*var*) oid: CSSM_OID; var alg: CSSM_ALGORITHMS ): CBool; external name '_cssmOidToAlg';
  1170. function cssmAlgToOid( algId: CSSM_ALGORITHMS ): CSSM_OIDPtr; external name '_cssmAlgToOid';
  1171. {
  1172. * The MacOS OSStatus space has an embedding for UNIX errno values, similar to
  1173. * the way we embed CSSM_RETURN values in OSStatus. These are the base and limit
  1174. * values for this embedding.
  1175. }
  1176. const
  1177. errSecErrnoBase = 100000;
  1178. const
  1179. errSecErrnoLimit = 100255;
  1180. {$endc} {TARGET_OS_MAC}
  1181. {$ifc not defined MACOSALLINCLUDE or not MACOSALLINCLUDE}
  1182. implementation
  1183. {$ifc TARGET_OS_MAC}
  1184. function CSSM_ACL_AUTHORIZATION_PREAUTH(slot: UInt32): UInt32; inline;
  1185. begin
  1186. CSSM_ACL_AUTHORIZATION_PREAUTH:=CSSM_ACL_AUTHORIZATION_PREAUTH_BASE + slot
  1187. end;
  1188. function CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT(auth: UInt32): UInt32; inline;
  1189. begin
  1190. CSSM_ACL_AUTHORIZATION_PREAUTH_SLOT:=auth - CSSM_ACL_AUTHORIZATION_PREAUTH_BASE
  1191. end;
  1192. function CSSM_ACL_AUTHORIZATION_IS_PREAUTH(auth: UInt32): Boolean; inline;
  1193. begin
  1194. CSSM_ACL_AUTHORIZATION_IS_PREAUTH:=
  1195. (auth >= CSSM_ACL_AUTHORIZATION_PREAUTH_BASE) and
  1196. (auth < CSSM_ACL_AUTHORIZATION_PREAUTH_END)
  1197. end;
  1198. {$endc} {TARGET_OS_MAC}
  1199. end.
  1200. {$endc} {not MACOSALLINCLUDE}