2 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
4 * The contents of this file constitute Original Code as defined in and are
5 * subject to the Apple Public Source License Version 1.2 (the 'License').
6 * You may not use this file except in compliance with the License. Please obtain
7 * a copy of the License at http://www.apple.com/publicsource and read it before
10 * This Original Code and all software distributed under the License are
11 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
12 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
13 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
14 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
15 * specific language governing rights and limitations under the License.
22 Contains: Apple Keychain routines
24 Written by: Doug Mitchell
26 Copyright: (c) 1999 by Apple Computer, Inc., all rights reserved.
30 #ifndef _SSL_KEYCHAIN_H_
31 #define _SSL_KEYCHAIN_H_
34 #include "sslContext.h"
41 * Given an array of certs (as KCItemRefs) and a destination
44 * -- free destCerts if we have any
45 * -- Get raw cert data, convert to array of SSLCertificates in *destCert
46 * -- get pub, priv keys from certRef[0], store in *pubKey, *privKey
47 * -- validate cert chain
54 SSLCertificate
**destCert
, /* &ctx->{localCert,encryptCert} */
55 CSSM_KEY_PTR
*pubKey
, /* &ctx->signingPubKey, etc. */
56 CSSM_KEY_PTR
*privKey
, /* &ctx->signingPrivKey, etc. */
57 CSSM_CSP_HANDLE
*cspHand
/* &ctx->signingKeyCsp, etc. */
58 #if ST_KC_KEYS_NEED_REF
60 SecKeychainRef
*privKeyRef
); /* &ctx->signingKeyRef, etc. */
63 #endif ST_KC_KEYS_NEED_REF
66 * Add Apple built-in root certs to ctx->trustedCerts.
72 #if ST_MANAGES_TRUSTED_ROOTS
75 * Given an open Keychain:
76 * -- Get raw cert data, add to array of CSSM_DATAs in
78 * -- verify that each of these is a valid (self-verifying)
80 * -- add each subject name to acceptableDNList
85 SecKeychainRef keyChainRef
);
88 * Given a newly encountered root cert (obtained from a peer's cert chain),
89 * add it to newRootCertKc if the user so allows, and if so, add it to
95 const CSSM_DATA_PTR rootCert
);
97 #endif /* ST_MANAGES_TRUSTED_ROOTS */
103 #endif /* _SSL_KEYCHAIN_H_ */