639 |
639 |
640 const TUid KNonEmbeddedKeyUid={KNonEmbeddedKey}; |
640 const TUid KNonEmbeddedKeyUid={KNonEmbeddedKey}; |
641 const TUid KExtractableKeyUid={KExtractableKey}; |
641 const TUid KExtractableKeyUid={KExtractableKey}; |
642 const TUid KNonExtractableKeyUid={KNonExtractableKey}; |
642 const TUid KNonExtractableKeyUid={KNonExtractableKey}; |
643 |
643 |
644 #ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT |
|
645 /** |
|
646 * The UID below is not specific to ECC. This should be used |
|
647 * as a CKey key param, whenever the user of CryptoSPI just has |
|
648 * the handle and not the actual key with him. The SPI plugin |
|
649 * should search for this ID and invoke the right apis for |
|
650 * getting access to keys. |
|
651 */ |
|
652 const TInt32 KPassedHandleToKey = 0x20025161; |
|
653 const TUid KPassedHandleToKeyUid = {KPassedHandleToKey}; |
|
654 |
|
655 #ifdef SYMBIAN_ENABLE_SDP_ECC |
|
656 /** |
|
657 UIDs related to Ecc (which is Asymmetric Cipher) |
|
658 */ |
|
659 const TInt32 KAlgorithmCipherEcc = 0x20024482; |
|
660 const TInt32 KAlgorithmSignerEcc = 0x20024483; |
|
661 const TInt32 KAlgorithmVerifierEcc = 0x20024486; |
|
662 const TInt32 KAlgorithmECCKeyPairGenerator = 0x20024487; |
|
663 |
|
664 const TUid KEccCipherUid = {KAlgorithmCipherEcc}; |
|
665 const TUid KEccSignerUid = {KAlgorithmSignerEcc}; |
|
666 const TUid KEccVerifierUid = {KAlgorithmVerifierEcc}; |
|
667 const TUid KEccKeyPairGeneratorUid = {KAlgorithmECCKeyPairGenerator}; |
|
668 |
|
669 /** |
|
670 UIDs related to ECC keys |
|
671 */ |
|
672 const TInt32 KEccKeyType = 0x20025160; |
|
673 const TInt32 KEccPublicKey = 0x20024484; |
|
674 const TInt32 KEccPrivateKey = 0x20024485; |
|
675 |
|
676 const TUid KEccKeyTypeUid = {KEccKeyType}; |
|
677 const TUid KEccPublicKeyUid = {KEccPublicKey}; |
|
678 const TUid KEccPrivateKeyUid = {KEccPrivateKey}; |
|
679 |
|
680 /** |
|
681 UIDs related to ECC key params |
|
682 */ |
|
683 const TInt32 KEccFiniteFieldFP = 0x20025151; |
|
684 const TInt32 KEccFiniteFieldF2M = 0x20025152; |
|
685 const TInt32 KEccKeyGenerationSeed = 0x20025153; |
|
686 const TInt32 KEccKeyParameterP = 0x20025154; |
|
687 const TInt32 KEccKeyParameterA = 0x20025155; |
|
688 const TInt32 KEccKeyParameterB = 0x20025156; |
|
689 const TInt32 KEccKeyParameterG = 0x20025157; |
|
690 const TInt32 KEccKeyParameterN = 0x20025158; |
|
691 const TInt32 KEccKeyParameterH = 0x20025159; |
|
692 const TInt32 KEccKeyParameterM = 0x2002515A; |
|
693 const TInt32 KEccKeyParameterF = 0x2002515B; |
|
694 const TInt32 KEccKeyParameterD = 0x2002515C; |
|
695 const TInt32 KEccKeyParameterQ = 0x2002515D; |
|
696 const TInt32 KEccSignatureParameterR = 0x2002515E; |
|
697 const TInt32 KEccSignatureParameterS = 0x2002515F; |
|
698 |
|
699 const TUid KEccFiniteFieldFPUid = {KEccFiniteFieldFP}; |
|
700 const TUid KEccFiniteFieldF2MUid = {KEccFiniteFieldF2M}; |
|
701 const TUid KEccKeyGenerationSeedUid = {KEccKeyGenerationSeed}; |
|
702 const TUid KEccKeyParameterPUid = {KEccKeyParameterP}; |
|
703 const TUid KEccKeyParameterAUid = {KEccKeyParameterA}; |
|
704 const TUid KEccKeyParameterBUid = {KEccKeyParameterB}; |
|
705 const TUid KEccKeyParameterGUid = {KEccKeyParameterG}; |
|
706 const TUid KEccKeyParameterNUid = {KEccKeyParameterN}; |
|
707 const TUid KEccKeyParameterHUid = {KEccKeyParameterH}; |
|
708 const TUid KEccKeyParameterMUid = {KEccKeyParameterM}; |
|
709 const TUid KEccKeyParameterFUid = {KEccKeyParameterF}; |
|
710 const TUid KEccKeyParameterDUid = {KEccKeyParameterD}; |
|
711 const TUid KEccKeyParameterQUid = {KEccKeyParameterQ}; |
|
712 const TUid KEccSignatureParameterRUid = {KEccSignatureParameterR}; |
|
713 const TUid KEccSignatureParameterSUid = {KEccSignatureParameterS}; |
|
714 #endif //SYMBIAN_ENABLE_SDP_ECC |
|
715 #endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT |
|
716 } |
644 } |
717 |
645 |
718 |
646 |
719 #endif //__CRYPTOAPI_CRYPTOSPIDEF_H__ |
647 #endif //__CRYPTOAPI_CRYPTOSPIDEF_H__ |