This section provides details of the human-readable form of the following certificate store files:
Note: For details of the fields that make up these certificate store files, see
Human-Readable File Formats Reference.Use the --hfilecertstore command-line option
to specify the file certificate store in human-readable form. The file certificate
store has the following format:
StartCertStoreEntries
StartEntry "Root5CA"
Deletable true
Format EX509Certificate
CertOwnerType ECACertificate
SubjectKeyId auto
IssuerKeyId auto
StartApplicationList
# Entry 1
Application "Server Authentication"
EndApplicationList
Trusted true
DataFileName "root5ca.pem"
EndEntry
EndCertStoreEntries
Notes:
Use the --hswicertstore command-line option
to specify the Software Install (SWI) certificate store in human-readable
form. The SWI certificate store is of the following format:
StartSwiCertStoreEntries
StartEntry "SymbianA"
Format EX509Certificate
CertOwnerType ECACertificate
SubjectKeyId auto
IssuerKeyId auto
StartApplicationList
# Entry 1
Application "SW Install"
# Entry 2
Application "SW Install OCSP Signing"
EndApplicationList
Trusted true
DataFileName "cert.der"
CapabilitySet { TCB CommDD PowerMgmt MultimediaDD ReadDeviceData
WriteDeviceData DRM TrustedUI ProtServ DiskAdmin NetworkControl
AllFiles SwEvent NetworkServices LocalServices ReadUserData
WriteUserData Location SurroundingsDD UserEnvironment }
Mandatory false
SystemUpgrade false
EndEntry
EndSwiCertStoreEntries
Note:
Use the –hcertclients command-line
option to specify the certificate client files in human-readable form. A certificate
client file has the following format:
StartClientInfo
# Entry 1
Uid 0x100042ab
Name "SW Install"
# Entry 2
Uid 0x1000a8b6
Name "SW Install OCSP Signing"
# Entry 3
Uid 0x101f9b28
Name "MIDlet Installation"
# Entry 4
Uid 0x1000183d
Name "Server Authentication"
EndClientInfo
Important: