blob: 80c887345239da315a708760d3f866ddb0f53a65 [file] [log] [blame]
Gilles Peskine47c85792025-05-07 14:35:04 +02001/**
Gilles Peskineb825dcf2025-05-07 19:41:09 +02002 * \file x509_oid.c
Gilles Peskine47c85792025-05-07 14:35:04 +02003 *
4 * \brief Object Identifier (OID) database
5 *
6 * Copyright The Mbed TLS Contributors
7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
8 */
9
Gilles Peskined2fe51c2025-05-07 20:36:20 +020010#include "x509_internal.h"
Gilles Peskine47c85792025-05-07 14:35:04 +020011
Gilles Peskine02ec5852025-05-12 20:52:07 +020012/* Each group of tables and functions has its own dependencies, but
13 * don't even bother to define helper macros if X.509 is completely
14 * disabled. */
15#if defined(MBEDTLS_X509_USE_C) || defined(MBEDTLS_X509_CREATE_C)
Gilles Peskine47c85792025-05-07 14:35:04 +020016
Gilles Peskinecd4c0d72025-05-07 23:45:12 +020017#include "mbedtls/oid.h"
Gilles Peskine86a47f82025-05-07 20:20:12 +020018#include "x509_oid.h"
Gilles Peskine47c85792025-05-07 14:35:04 +020019
20#include <stdio.h>
21#include <string.h>
22
23#include "mbedtls/platform.h"
24
25/*
26 * Macro to automatically add the size of #define'd OIDs
27 */
28#define ADD_LEN(s) s, MBEDTLS_OID_SIZE(s)
29
30/*
Gilles Peskine86e45ba2025-05-07 20:33:39 +020031 * Macro to generate mbedtls_x509_oid_descriptor_t
Gilles Peskine47c85792025-05-07 14:35:04 +020032 */
33#if !defined(MBEDTLS_X509_REMOVE_INFO)
34#define OID_DESCRIPTOR(s, name, description) { ADD_LEN(s), name, description }
35#define NULL_OID_DESCRIPTOR { NULL, 0, NULL, NULL }
36#else
37#define OID_DESCRIPTOR(s, name, description) { ADD_LEN(s) }
38#define NULL_OID_DESCRIPTOR { NULL, 0 }
39#endif
40
41/*
42 * Macro to generate an internal function for oid_XXX_from_asn1() (used by
43 * the other functions)
44 */
45#define FN_OID_TYPED_FROM_ASN1(TYPE_T, NAME, LIST) \
46 static const TYPE_T *oid_ ## NAME ## _from_asn1( \
47 const mbedtls_asn1_buf *oid) \
48 { \
49 const TYPE_T *p = (LIST); \
Gilles Peskine86e45ba2025-05-07 20:33:39 +020050 const mbedtls_x509_oid_descriptor_t *cur = \
51 (const mbedtls_x509_oid_descriptor_t *) p; \
Gilles Peskine47c85792025-05-07 14:35:04 +020052 if (p == NULL || oid == NULL) return NULL; \
53 while (cur->asn1 != NULL) { \
54 if (cur->asn1_len == oid->len && \
55 memcmp(cur->asn1, oid->p, oid->len) == 0) { \
56 return p; \
57 } \
58 p++; \
Gilles Peskine86e45ba2025-05-07 20:33:39 +020059 cur = (const mbedtls_x509_oid_descriptor_t *) p; \
Gilles Peskine47c85792025-05-07 14:35:04 +020060 } \
61 return NULL; \
62 }
63
64#if !defined(MBEDTLS_X509_REMOVE_INFO)
65/*
66 * Macro to generate a function for retrieving a single attribute from the
Gilles Peskine86e45ba2025-05-07 20:33:39 +020067 * descriptor of an mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020068 */
69#define FN_OID_GET_DESCRIPTOR_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
70 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
71 { \
72 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +020073 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +020074 *ATTR1 = data->descriptor.ATTR1; \
75 return 0; \
76 }
77#endif /* MBEDTLS_X509_REMOVE_INFO */
78
79/*
80 * Macro to generate a function for retrieving a single attribute from an
Gilles Peskine86e45ba2025-05-07 20:33:39 +020081 * mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020082 */
83#define FN_OID_GET_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
84 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
85 { \
86 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +020087 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +020088 *ATTR1 = data->ATTR1; \
89 return 0; \
90 }
91
92/*
93 * Macro to generate a function for retrieving two attributes from an
Gilles Peskine86e45ba2025-05-07 20:33:39 +020094 * mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020095 */
96#define FN_OID_GET_ATTR2(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1, \
97 ATTR2_TYPE, ATTR2) \
98 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1, \
99 ATTR2_TYPE * ATTR2) \
100 { \
101 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +0200102 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200103 *(ATTR1) = data->ATTR1; \
104 *(ATTR2) = data->ATTR2; \
105 return 0; \
106 }
107
108/*
109 * Macro to generate a function for retrieving the OID based on a single
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200110 * attribute from a mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +0200111 */
112#define FN_OID_GET_OID_BY_ATTR1(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1) \
113 int FN_NAME(ATTR1_TYPE ATTR1, const char **oid, size_t *olen) \
114 { \
115 const TYPE_T *cur = (LIST); \
116 while (cur->descriptor.asn1 != NULL) { \
117 if (cur->ATTR1 == (ATTR1)) { \
118 *oid = cur->descriptor.asn1; \
119 *olen = cur->descriptor.asn1_len; \
120 return 0; \
121 } \
122 cur++; \
123 } \
Gilles Peskine4c832212025-05-07 23:05:12 +0200124 return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200125 }
126
127/*
128 * Macro to generate a function for retrieving the OID based on two
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200129 * attributes from a mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +0200130 */
131#define FN_OID_GET_OID_BY_ATTR2(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1, \
132 ATTR2_TYPE, ATTR2) \
133 int FN_NAME(ATTR1_TYPE ATTR1, ATTR2_TYPE ATTR2, const char **oid, \
134 size_t *olen) \
135 { \
136 const TYPE_T *cur = (LIST); \
137 while (cur->descriptor.asn1 != NULL) { \
138 if (cur->ATTR1 == (ATTR1) && cur->ATTR2 == (ATTR2)) { \
139 *oid = cur->descriptor.asn1; \
140 *olen = cur->descriptor.asn1_len; \
141 return 0; \
142 } \
143 cur++; \
144 } \
Gilles Peskine4c832212025-05-07 23:05:12 +0200145 return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200146 }
147
148/*
149 * For X520 attribute types
150 */
Gilles Peskine02ec5852025-05-12 20:52:07 +0200151#if defined(MBEDTLS_X509_USE_C)
Gilles Peskine47c85792025-05-07 14:35:04 +0200152typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200153 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200154 const char *short_name;
155} oid_x520_attr_t;
156
157static const oid_x520_attr_t oid_x520_attr_type[] =
158{
159 {
160 OID_DESCRIPTOR(MBEDTLS_OID_AT_CN, "id-at-commonName", "Common Name"),
161 "CN",
162 },
163 {
164 OID_DESCRIPTOR(MBEDTLS_OID_AT_COUNTRY, "id-at-countryName", "Country"),
165 "C",
166 },
167 {
168 OID_DESCRIPTOR(MBEDTLS_OID_AT_LOCALITY, "id-at-locality", "Locality"),
169 "L",
170 },
171 {
172 OID_DESCRIPTOR(MBEDTLS_OID_AT_STATE, "id-at-state", "State"),
173 "ST",
174 },
175 {
176 OID_DESCRIPTOR(MBEDTLS_OID_AT_ORGANIZATION, "id-at-organizationName",
177 "Organization"),
178 "O",
179 },
180 {
181 OID_DESCRIPTOR(MBEDTLS_OID_AT_ORG_UNIT, "id-at-organizationalUnitName", "Org Unit"),
182 "OU",
183 },
184 {
185 OID_DESCRIPTOR(MBEDTLS_OID_PKCS9_EMAIL,
186 "emailAddress",
187 "E-mail address"),
188 "emailAddress",
189 },
190 {
191 OID_DESCRIPTOR(MBEDTLS_OID_AT_SERIAL_NUMBER,
192 "id-at-serialNumber",
193 "Serial number"),
194 "serialNumber",
195 },
196 {
197 OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_ADDRESS,
198 "id-at-postalAddress",
199 "Postal address"),
200 "postalAddress",
201 },
202 {
203 OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_CODE, "id-at-postalCode", "Postal code"),
204 "postalCode",
205 },
206 {
207 OID_DESCRIPTOR(MBEDTLS_OID_AT_SUR_NAME, "id-at-surName", "Surname"),
208 "SN",
209 },
210 {
211 OID_DESCRIPTOR(MBEDTLS_OID_AT_GIVEN_NAME, "id-at-givenName", "Given name"),
212 "GN",
213 },
214 {
215 OID_DESCRIPTOR(MBEDTLS_OID_AT_INITIALS, "id-at-initials", "Initials"),
216 "initials",
217 },
218 {
219 OID_DESCRIPTOR(MBEDTLS_OID_AT_GENERATION_QUALIFIER,
220 "id-at-generationQualifier",
221 "Generation qualifier"),
222 "generationQualifier",
223 },
224 {
225 OID_DESCRIPTOR(MBEDTLS_OID_AT_TITLE, "id-at-title", "Title"),
226 "title",
227 },
228 {
229 OID_DESCRIPTOR(MBEDTLS_OID_AT_DN_QUALIFIER,
230 "id-at-dnQualifier",
231 "Distinguished Name qualifier"),
232 "dnQualifier",
233 },
234 {
235 OID_DESCRIPTOR(MBEDTLS_OID_AT_PSEUDONYM, "id-at-pseudonym", "Pseudonym"),
236 "pseudonym",
237 },
238 {
239 OID_DESCRIPTOR(MBEDTLS_OID_UID, "id-uid", "User Id"),
240 "uid",
241 },
242 {
243 OID_DESCRIPTOR(MBEDTLS_OID_DOMAIN_COMPONENT,
244 "id-domainComponent",
245 "Domain component"),
246 "DC",
247 },
248 {
249 OID_DESCRIPTOR(MBEDTLS_OID_AT_UNIQUE_IDENTIFIER,
250 "id-at-uniqueIdentifier",
251 "Unique Identifier"),
252 "uniqueIdentifier",
253 },
254 {
255 NULL_OID_DESCRIPTOR,
256 NULL,
257 }
258};
259
260FN_OID_TYPED_FROM_ASN1(oid_x520_attr_t, x520_attr, oid_x520_attr_type)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200261FN_OID_GET_ATTR1(mbedtls_x509_oid_get_attr_short_name,
Gilles Peskine47c85792025-05-07 14:35:04 +0200262 oid_x520_attr_t,
263 x520_attr,
264 const char *,
265 short_name)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200266#endif /* MBEDTLS_X509_USE_C */
Gilles Peskine47c85792025-05-07 14:35:04 +0200267
268/*
269 * For X509 extensions
270 */
Gilles Peskine02ec5852025-05-12 20:52:07 +0200271#if defined(MBEDTLS_X509_OID_HAVE_GET_X509_EXT_TYPE)
Gilles Peskine47c85792025-05-07 14:35:04 +0200272typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200273 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200274 int ext_type;
275} oid_x509_ext_t;
276
277static const oid_x509_ext_t oid_x509_ext[] =
278{
279 {
280 OID_DESCRIPTOR(MBEDTLS_OID_BASIC_CONSTRAINTS,
281 "id-ce-basicConstraints",
282 "Basic Constraints"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200283 MBEDTLS_X509_EXT_BASIC_CONSTRAINTS,
Gilles Peskine47c85792025-05-07 14:35:04 +0200284 },
285 {
286 OID_DESCRIPTOR(MBEDTLS_OID_KEY_USAGE, "id-ce-keyUsage", "Key Usage"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200287 MBEDTLS_X509_EXT_KEY_USAGE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200288 },
289 {
290 OID_DESCRIPTOR(MBEDTLS_OID_EXTENDED_KEY_USAGE,
291 "id-ce-extKeyUsage",
292 "Extended Key Usage"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200293 MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200294 },
295 {
296 OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_ALT_NAME,
297 "id-ce-subjectAltName",
298 "Subject Alt Name"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200299 MBEDTLS_X509_EXT_SUBJECT_ALT_NAME,
Gilles Peskine47c85792025-05-07 14:35:04 +0200300 },
301 {
302 OID_DESCRIPTOR(MBEDTLS_OID_NS_CERT_TYPE,
303 "id-netscape-certtype",
304 "Netscape Certificate Type"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200305 MBEDTLS_X509_EXT_NS_CERT_TYPE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200306 },
307 {
308 OID_DESCRIPTOR(MBEDTLS_OID_CERTIFICATE_POLICIES,
309 "id-ce-certificatePolicies",
310 "Certificate Policies"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200311 MBEDTLS_X509_EXT_CERTIFICATE_POLICIES,
Gilles Peskine47c85792025-05-07 14:35:04 +0200312 },
313 {
314 OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER,
315 "id-ce-subjectKeyIdentifier",
316 "Subject Key Identifier"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200317 MBEDTLS_X509_EXT_SUBJECT_KEY_IDENTIFIER,
Gilles Peskine47c85792025-05-07 14:35:04 +0200318 },
319 {
320 OID_DESCRIPTOR(MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER,
321 "id-ce-authorityKeyIdentifier",
322 "Authority Key Identifier"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200323 MBEDTLS_X509_EXT_AUTHORITY_KEY_IDENTIFIER,
Gilles Peskine47c85792025-05-07 14:35:04 +0200324 },
325 {
326 NULL_OID_DESCRIPTOR,
327 0,
328 },
329};
330
331FN_OID_TYPED_FROM_ASN1(oid_x509_ext_t, x509_ext, oid_x509_ext)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200332FN_OID_GET_ATTR1(mbedtls_x509_oid_get_x509_ext_type, oid_x509_ext_t, x509_ext, int, ext_type)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200333#endif /* MBEDTLS_X509_CRT_PARSE_C || MBEDTLS_X509_CSR_PARSE_C */
Gilles Peskine47c85792025-05-07 14:35:04 +0200334
Gilles Peskine02ec5852025-05-12 20:52:07 +0200335#if defined(MBEDTLS_X509_CRT_PARSE_C) && !defined(MBEDTLS_X509_REMOVE_INFO)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200336static const mbedtls_x509_oid_descriptor_t oid_ext_key_usage[] =
Gilles Peskine47c85792025-05-07 14:35:04 +0200337{
338 OID_DESCRIPTOR(MBEDTLS_OID_SERVER_AUTH,
339 "id-kp-serverAuth",
340 "TLS Web Server Authentication"),
341 OID_DESCRIPTOR(MBEDTLS_OID_CLIENT_AUTH,
342 "id-kp-clientAuth",
343 "TLS Web Client Authentication"),
344 OID_DESCRIPTOR(MBEDTLS_OID_CODE_SIGNING, "id-kp-codeSigning", "Code Signing"),
345 OID_DESCRIPTOR(MBEDTLS_OID_EMAIL_PROTECTION, "id-kp-emailProtection", "E-mail Protection"),
346 OID_DESCRIPTOR(MBEDTLS_OID_TIME_STAMPING, "id-kp-timeStamping", "Time Stamping"),
347 OID_DESCRIPTOR(MBEDTLS_OID_OCSP_SIGNING, "id-kp-OCSPSigning", "OCSP Signing"),
348 OID_DESCRIPTOR(MBEDTLS_OID_WISUN_FAN,
349 "id-kp-wisun-fan-device",
350 "Wi-SUN Alliance Field Area Network (FAN)"),
351 NULL_OID_DESCRIPTOR,
352};
353
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200354FN_OID_TYPED_FROM_ASN1(mbedtls_x509_oid_descriptor_t, ext_key_usage, oid_ext_key_usage)
355FN_OID_GET_ATTR1(mbedtls_x509_oid_get_extended_key_usage,
356 mbedtls_x509_oid_descriptor_t,
Gilles Peskine47c85792025-05-07 14:35:04 +0200357 ext_key_usage,
358 const char *,
359 description)
360
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200361static const mbedtls_x509_oid_descriptor_t oid_certificate_policies[] =
Gilles Peskine47c85792025-05-07 14:35:04 +0200362{
363 OID_DESCRIPTOR(MBEDTLS_OID_ANY_POLICY, "anyPolicy", "Any Policy"),
364 NULL_OID_DESCRIPTOR,
365};
366
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200367FN_OID_TYPED_FROM_ASN1(mbedtls_x509_oid_descriptor_t, certificate_policies,
368 oid_certificate_policies)
369FN_OID_GET_ATTR1(mbedtls_x509_oid_get_certificate_policies,
370 mbedtls_x509_oid_descriptor_t,
Gilles Peskine47c85792025-05-07 14:35:04 +0200371 certificate_policies,
372 const char *,
373 description)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200374#endif /* MBEDTLS_X509_CRT_PARSE_C && !MBEDTLS_X509_REMOVE_INFO */
Gilles Peskine47c85792025-05-07 14:35:04 +0200375
376/*
377 * For SignatureAlgorithmIdentifier
378 */
Gilles Peskine02ec5852025-05-12 20:52:07 +0200379#if defined(MBEDTLS_X509_USE_C) || \
380 defined(MBEDTLS_X509_CRT_WRITE_C) || defined(MBEDTLS_X509_CSR_WRITE_C)
Gilles Peskine47c85792025-05-07 14:35:04 +0200381typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200382 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200383 mbedtls_md_type_t md_alg;
384 mbedtls_pk_type_t pk_alg;
385} oid_sig_alg_t;
386
387static const oid_sig_alg_t oid_sig_alg[] =
388{
389#if defined(MBEDTLS_RSA_C)
390#if defined(PSA_WANT_ALG_MD5)
391 {
392 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_MD5, "md5WithRSAEncryption", "RSA with MD5"),
393 MBEDTLS_MD_MD5, MBEDTLS_PK_RSA,
394 },
395#endif /* PSA_WANT_ALG_MD5 */
396#if defined(PSA_WANT_ALG_SHA_1)
397 {
398 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA1, "sha-1WithRSAEncryption", "RSA with SHA1"),
399 MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
400 },
401#endif /* PSA_WANT_ALG_SHA_1 */
402#if defined(PSA_WANT_ALG_SHA_224)
403 {
404 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA224, "sha224WithRSAEncryption",
405 "RSA with SHA-224"),
406 MBEDTLS_MD_SHA224, MBEDTLS_PK_RSA,
407 },
408#endif /* PSA_WANT_ALG_SHA_224 */
409#if defined(PSA_WANT_ALG_SHA_256)
410 {
411 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA256, "sha256WithRSAEncryption",
412 "RSA with SHA-256"),
413 MBEDTLS_MD_SHA256, MBEDTLS_PK_RSA,
414 },
415#endif /* PSA_WANT_ALG_SHA_256 */
416#if defined(PSA_WANT_ALG_SHA_384)
417 {
418 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA384, "sha384WithRSAEncryption",
419 "RSA with SHA-384"),
420 MBEDTLS_MD_SHA384, MBEDTLS_PK_RSA,
421 },
422#endif /* PSA_WANT_ALG_SHA_384 */
423#if defined(PSA_WANT_ALG_SHA_512)
424 {
425 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA512, "sha512WithRSAEncryption",
426 "RSA with SHA-512"),
427 MBEDTLS_MD_SHA512, MBEDTLS_PK_RSA,
428 },
429#endif /* PSA_WANT_ALG_SHA_512 */
430#if defined(PSA_WANT_ALG_SHA_1)
431 {
432 OID_DESCRIPTOR(MBEDTLS_OID_RSA_SHA_OBS, "sha-1WithRSAEncryption", "RSA with SHA1"),
433 MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
434 },
435#endif /* PSA_WANT_ALG_SHA_1 */
436#endif /* MBEDTLS_RSA_C */
437#if defined(PSA_HAVE_ALG_SOME_ECDSA)
438#if defined(PSA_WANT_ALG_SHA_1)
439 {
440 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA1, "ecdsa-with-SHA1", "ECDSA with SHA1"),
441 MBEDTLS_MD_SHA1, MBEDTLS_PK_ECDSA,
442 },
443#endif /* PSA_WANT_ALG_SHA_1 */
444#if defined(PSA_WANT_ALG_SHA_224)
445 {
446 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA224, "ecdsa-with-SHA224", "ECDSA with SHA224"),
447 MBEDTLS_MD_SHA224, MBEDTLS_PK_ECDSA,
448 },
449#endif
450#if defined(PSA_WANT_ALG_SHA_256)
451 {
452 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA256, "ecdsa-with-SHA256", "ECDSA with SHA256"),
453 MBEDTLS_MD_SHA256, MBEDTLS_PK_ECDSA,
454 },
455#endif /* PSA_WANT_ALG_SHA_256 */
456#if defined(PSA_WANT_ALG_SHA_384)
457 {
458 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA384, "ecdsa-with-SHA384", "ECDSA with SHA384"),
459 MBEDTLS_MD_SHA384, MBEDTLS_PK_ECDSA,
460 },
461#endif /* PSA_WANT_ALG_SHA_384 */
462#if defined(PSA_WANT_ALG_SHA_512)
463 {
464 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA512, "ecdsa-with-SHA512", "ECDSA with SHA512"),
465 MBEDTLS_MD_SHA512, MBEDTLS_PK_ECDSA,
466 },
467#endif /* PSA_WANT_ALG_SHA_512 */
468#endif /* PSA_HAVE_ALG_SOME_ECDSA */
469#if defined(MBEDTLS_RSA_C)
470 {
471 OID_DESCRIPTOR(MBEDTLS_OID_RSASSA_PSS, "RSASSA-PSS", "RSASSA-PSS"),
472 MBEDTLS_MD_NONE, MBEDTLS_PK_RSASSA_PSS,
473 },
474#endif /* MBEDTLS_RSA_C */
475 {
476 NULL_OID_DESCRIPTOR,
477 MBEDTLS_MD_NONE, MBEDTLS_PK_NONE,
478 },
479};
480
481FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
482
Gilles Peskine02ec5852025-05-12 20:52:07 +0200483#if defined(MBEDTLS_X509_USE_C) && !defined(MBEDTLS_X509_REMOVE_INFO)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200484FN_OID_GET_DESCRIPTOR_ATTR1(mbedtls_x509_oid_get_sig_alg_desc,
Gilles Peskine47c85792025-05-07 14:35:04 +0200485 oid_sig_alg_t,
486 sig_alg,
487 const char *,
488 description)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200489#endif /* MBEDTLS_X509_USE_C && !MBEDTLS_X509_REMOVE_INFO */
Gilles Peskine47c85792025-05-07 14:35:04 +0200490
Gilles Peskine02ec5852025-05-12 20:52:07 +0200491#if defined(MBEDTLS_X509_USE_C)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200492FN_OID_GET_ATTR2(mbedtls_x509_oid_get_sig_alg,
Gilles Peskine47c85792025-05-07 14:35:04 +0200493 oid_sig_alg_t,
494 sig_alg,
495 mbedtls_md_type_t,
496 md_alg,
497 mbedtls_pk_type_t,
498 pk_alg)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200499#endif /* MBEDTLS_X509_USE_C */
500#if defined(MBEDTLS_X509_CRT_WRITE_C) || defined(MBEDTLS_X509_CSR_WRITE_C)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200501FN_OID_GET_OID_BY_ATTR2(mbedtls_x509_oid_get_oid_by_sig_alg,
Gilles Peskine47c85792025-05-07 14:35:04 +0200502 oid_sig_alg_t,
503 oid_sig_alg,
504 mbedtls_pk_type_t,
505 pk_alg,
506 mbedtls_md_type_t,
507 md_alg)
Gilles Peskine02ec5852025-05-12 20:52:07 +0200508#endif /* MBEDTLS_X509_CRT_WRITE_C || MBEDTLS_X509_CSR_WRITE_C */
Gilles Peskine47c85792025-05-07 14:35:04 +0200509
Gilles Peskine02ec5852025-05-12 20:52:07 +0200510#endif /* MBEDTLS_X509_USE_C || MBEDTLS_X509_CRT_WRITE_C || MBEDTLS_X509_CSR_WRITE_C */
511
512#if defined(MBEDTLS_X509_OID_HAVE_GET_MD_ALG)
Gilles Peskine47c85792025-05-07 14:35:04 +0200513/*
Gilles Peskine47c85792025-05-07 14:35:04 +0200514 * For digestAlgorithm
515 */
Gilles Peskine02ec5852025-05-12 20:52:07 +0200516/* The table of digest OIDs is duplicated in TF-PSA-Crypto (which uses it to
517 * look up the OID for a hash algorithm in RSA PKCS#1v1.5 signature and
518 * verification). */
Gilles Peskine47c85792025-05-07 14:35:04 +0200519typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200520 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200521 mbedtls_md_type_t md_alg;
522} oid_md_alg_t;
523
524static const oid_md_alg_t oid_md_alg[] =
525{
526#if defined(PSA_WANT_ALG_MD5)
527 {
528 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_MD5, "id-md5", "MD5"),
529 MBEDTLS_MD_MD5,
530 },
531#endif
532#if defined(PSA_WANT_ALG_SHA_1)
533 {
534 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA1, "id-sha1", "SHA-1"),
535 MBEDTLS_MD_SHA1,
536 },
537#endif
538#if defined(PSA_WANT_ALG_SHA_224)
539 {
540 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA224, "id-sha224", "SHA-224"),
541 MBEDTLS_MD_SHA224,
542 },
543#endif
544#if defined(PSA_WANT_ALG_SHA_256)
545 {
546 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA256, "id-sha256", "SHA-256"),
547 MBEDTLS_MD_SHA256,
548 },
549#endif
550#if defined(PSA_WANT_ALG_SHA_384)
551 {
552 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA384, "id-sha384", "SHA-384"),
553 MBEDTLS_MD_SHA384,
554 },
555#endif
556#if defined(PSA_WANT_ALG_SHA_512)
557 {
558 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA512, "id-sha512", "SHA-512"),
559 MBEDTLS_MD_SHA512,
560 },
561#endif
562#if defined(PSA_WANT_ALG_RIPEMD160)
563 {
564 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_RIPEMD160, "id-ripemd160", "RIPEMD-160"),
565 MBEDTLS_MD_RIPEMD160,
566 },
567#endif
568#if defined(PSA_WANT_ALG_SHA3_224)
569 {
570 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_224, "id-sha3-224", "SHA-3-224"),
571 MBEDTLS_MD_SHA3_224,
572 },
573#endif
574#if defined(PSA_WANT_ALG_SHA3_256)
575 {
576 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_256, "id-sha3-256", "SHA-3-256"),
577 MBEDTLS_MD_SHA3_256,
578 },
579#endif
580#if defined(PSA_WANT_ALG_SHA3_384)
581 {
582 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_384, "id-sha3-384", "SHA-3-384"),
583 MBEDTLS_MD_SHA3_384,
584 },
585#endif
586#if defined(PSA_WANT_ALG_SHA3_512)
587 {
588 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_512, "id-sha3-512", "SHA-3-512"),
589 MBEDTLS_MD_SHA3_512,
590 },
591#endif
592 {
593 NULL_OID_DESCRIPTOR,
594 MBEDTLS_MD_NONE,
595 },
596};
597
598FN_OID_TYPED_FROM_ASN1(oid_md_alg_t, md_alg, oid_md_alg)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200599FN_OID_GET_ATTR1(mbedtls_x509_oid_get_md_alg, oid_md_alg_t, md_alg, mbedtls_md_type_t, md_alg)
Gilles Peskine47c85792025-05-07 14:35:04 +0200600
Gilles Peskine02ec5852025-05-12 20:52:07 +0200601#endif /* (MBEDTLS_X509_USE_C && MBEDTLS_X509_RSASSA_PSS_SUPPORT) || MBEDTLS_PKCS7_C */
602
603#endif /* some X.509 is enabled */