blob: c516b7aaf7f3c979bfaa87693c7146f3fe2b1854 [file] [log] [blame]
Paul Bakkerc70b9822013-04-07 22:00:46 +02001/**
2 * \file oid.h
3 *
4 * \brief Object Identifier (OID) database
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02007 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakkerc70b9822013-04-07 22:00:46 +020021 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000022 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerc70b9822013-04-07 22:00:46 +020023 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#ifndef MBEDTLS_OID_H
25#define MBEDTLS_OID_H
Paul Bakkerc70b9822013-04-07 22:00:46 +020026
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020027#if !defined(MBEDTLS_CONFIG_FILE)
Paul Bakker47fce022013-06-28 17:34:34 +020028#include "config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020029#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020030#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020031#endif
Rich Evans00ab4702015-02-06 13:43:58 +000032
Paul Bakkerc70b9822013-04-07 22:00:46 +020033#include "asn1.h"
Paul Bakkered27a042013-04-18 22:46:23 +020034#include "pk.h"
Rich Evans00ab4702015-02-06 13:43:58 +000035
36#include <stddef.h>
37
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020038#if defined(MBEDTLS_CIPHER_C)
Paul Bakker47fce022013-06-28 17:34:34 +020039#include "cipher.h"
40#endif
41
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020042#if defined(MBEDTLS_MD_C)
Paul Bakker47fce022013-06-28 17:34:34 +020043#include "md.h"
44#endif
45
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_ERR_OID_NOT_FOUND -0x002E /**< OID is not found. */
47#define MBEDTLS_ERR_OID_BUF_TOO_SMALL -0x000B /**< output buffer is too small */
Paul Bakkerc70b9822013-04-07 22:00:46 +020048
Manuel Pégourié-Gonnardc49ada42019-01-28 09:20:59 +010049/* This is for the benefit of X.509, but defined here in order to avoid
50 * having a "backwards" include of x.509.h here */
51/*
52 * X.509 extension types (internal, arbitrary values for bitsets)
53 */
54#define MBEDTLS_OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER (1 << 0)
55#define MBEDTLS_OID_X509_EXT_SUBJECT_KEY_IDENTIFIER (1 << 1)
56#define MBEDTLS_OID_X509_EXT_KEY_USAGE (1 << 2)
57#define MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES (1 << 3)
58#define MBEDTLS_OID_X509_EXT_POLICY_MAPPINGS (1 << 4)
59#define MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME (1 << 5)
60#define MBEDTLS_OID_X509_EXT_ISSUER_ALT_NAME (1 << 6)
61#define MBEDTLS_OID_X509_EXT_SUBJECT_DIRECTORY_ATTRS (1 << 7)
62#define MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS (1 << 8)
63#define MBEDTLS_OID_X509_EXT_NAME_CONSTRAINTS (1 << 9)
64#define MBEDTLS_OID_X509_EXT_POLICY_CONSTRAINTS (1 << 10)
65#define MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE (1 << 11)
66#define MBEDTLS_OID_X509_EXT_CRL_DISTRIBUTION_POINTS (1 << 12)
67#define MBEDTLS_OID_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13)
68#define MBEDTLS_OID_X509_EXT_FRESHEST_CRL (1 << 14)
69#define MBEDTLS_OID_X509_EXT_NS_CERT_TYPE (1 << 16)
70
Paul Bakkerc70b9822013-04-07 22:00:46 +020071/*
72 * Top level OID tuples
73 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_OID_ISO_MEMBER_BODIES "\x2a" /* {iso(1) member-body(2)} */
75#define MBEDTLS_OID_ISO_IDENTIFIED_ORG "\x2b" /* {iso(1) identified-organization(3)} */
76#define MBEDTLS_OID_ISO_CCITT_DS "\x55" /* {joint-iso-ccitt(2) ds(5)} */
77#define MBEDTLS_OID_ISO_ITU_COUNTRY "\x60" /* {joint-iso-itu-t(2) country(16)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +020078
79/*
80 * ISO Member bodies OID parts
81 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020082#define MBEDTLS_OID_COUNTRY_US "\x86\x48" /* {us(840)} */
83#define MBEDTLS_OID_ORG_RSA_DATA_SECURITY "\x86\xf7\x0d" /* {rsadsi(113549)} */
84#define MBEDTLS_OID_RSA_COMPANY MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
85 MBEDTLS_OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */
86#define MBEDTLS_OID_ORG_ANSI_X9_62 "\xce\x3d" /* ansi-X9-62(10045) */
87#define MBEDTLS_OID_ANSI_X9_62 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
88 MBEDTLS_OID_ORG_ANSI_X9_62
Paul Bakkerc70b9822013-04-07 22:00:46 +020089
90/*
91 * ISO Identified organization OID parts
92 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020093#define MBEDTLS_OID_ORG_DOD "\x06" /* {dod(6)} */
94#define MBEDTLS_OID_ORG_OIW "\x0e"
95#define MBEDTLS_OID_OIW_SECSIG MBEDTLS_OID_ORG_OIW "\x03"
96#define MBEDTLS_OID_OIW_SECSIG_ALG MBEDTLS_OID_OIW_SECSIG "\x02"
97#define MBEDTLS_OID_OIW_SECSIG_SHA1 MBEDTLS_OID_OIW_SECSIG_ALG "\x1a"
98#define MBEDTLS_OID_ORG_CERTICOM "\x81\x04" /* certicom(132) */
99#define MBEDTLS_OID_CERTICOM MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_CERTICOM
100#define MBEDTLS_OID_ORG_TELETRUST "\x24" /* teletrust(36) */
101#define MBEDTLS_OID_TELETRUST MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_TELETRUST
Paul Bakkerc70b9822013-04-07 22:00:46 +0200102
103/*
104 * ISO ITU OID parts
105 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200106#define MBEDTLS_OID_ORGANIZATION "\x01" /* {organization(1)} */
107#define MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ISO_ITU_COUNTRY MBEDTLS_OID_COUNTRY_US MBEDTLS_OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200108
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200109#define MBEDTLS_OID_ORG_GOV "\x65" /* {gov(101)} */
110#define MBEDTLS_OID_GOV MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112#define MBEDTLS_OID_ORG_NETSCAPE "\x86\xF8\x42" /* {netscape(113730)} */
113#define MBEDTLS_OID_NETSCAPE MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200114
115/* ISO arc for standard certificate and CRL extensions */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200116#define MBEDTLS_OID_ID_CE MBEDTLS_OID_ISO_CCITT_DS "\x1D" /**< id-ce OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 29} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200117
Ron Eldor488fd082018-07-15 09:38:39 +0300118#define MBEDTLS_OID_NIST_ALG MBEDTLS_OID_GOV "\x03\x04" /** { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) */
119
Paul Bakkerc70b9822013-04-07 22:00:46 +0200120/**
121 * Private Internet Extensions
122 * { iso(1) identified-organization(3) dod(6) internet(1)
123 * security(5) mechanisms(5) pkix(7) }
124 */
Ron Eldorb6dc1052019-04-01 18:12:23 +0300125#define MBEDTLS_OID_INTERNET MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_DOD "\x01"
126#define MBEDTLS_OID_PKIX MBEDTLS_OID_INTERNET "\x05\x05\x07"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200127
128/*
129 * Arc for standard naming attributes
130 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200131#define MBEDTLS_OID_AT MBEDTLS_OID_ISO_CCITT_DS "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */
132#define MBEDTLS_OID_AT_CN MBEDTLS_OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */
133#define MBEDTLS_OID_AT_SUR_NAME MBEDTLS_OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */
134#define MBEDTLS_OID_AT_SERIAL_NUMBER MBEDTLS_OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */
135#define MBEDTLS_OID_AT_COUNTRY MBEDTLS_OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */
136#define MBEDTLS_OID_AT_LOCALITY MBEDTLS_OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */
137#define MBEDTLS_OID_AT_STATE MBEDTLS_OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */
138#define MBEDTLS_OID_AT_ORGANIZATION MBEDTLS_OID_AT "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */
139#define MBEDTLS_OID_AT_ORG_UNIT MBEDTLS_OID_AT "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */
140#define MBEDTLS_OID_AT_TITLE MBEDTLS_OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */
141#define MBEDTLS_OID_AT_POSTAL_ADDRESS MBEDTLS_OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */
142#define MBEDTLS_OID_AT_POSTAL_CODE MBEDTLS_OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */
143#define MBEDTLS_OID_AT_GIVEN_NAME MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
144#define MBEDTLS_OID_AT_INITIALS MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
145#define MBEDTLS_OID_AT_GENERATION_QUALIFIER MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
146#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributType:= {id-at 45} */
147#define MBEDTLS_OID_AT_DN_QUALIFIER MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
148#define MBEDTLS_OID_AT_PSEUDONYM MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
Paul Bakker63844402014-04-30 15:34:12 +0200149
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200150#define MBEDTLS_OID_DOMAIN_COMPONENT "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200151
152/*
153 * OIDs for standard certificate extensions
154 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200155#define MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER MBEDTLS_OID_ID_CE "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 } */
156#define MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER MBEDTLS_OID_ID_CE "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 14 } */
157#define MBEDTLS_OID_KEY_USAGE MBEDTLS_OID_ID_CE "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } */
158#define MBEDTLS_OID_CERTIFICATE_POLICIES MBEDTLS_OID_ID_CE "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-ce 32 } */
159#define MBEDTLS_OID_POLICY_MAPPINGS MBEDTLS_OID_ID_CE "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::= { id-ce 33 } */
160#define MBEDTLS_OID_SUBJECT_ALT_NAME MBEDTLS_OID_ID_CE "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 } */
161#define MBEDTLS_OID_ISSUER_ALT_NAME MBEDTLS_OID_ID_CE "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::= { id-ce 18 } */
162#define MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS MBEDTLS_OID_ID_CE "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::= { id-ce 9 } */
163#define MBEDTLS_OID_BASIC_CONSTRAINTS MBEDTLS_OID_ID_CE "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 } */
164#define MBEDTLS_OID_NAME_CONSTRAINTS MBEDTLS_OID_ID_CE "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::= { id-ce 30 } */
165#define MBEDTLS_OID_POLICY_CONSTRAINTS MBEDTLS_OID_ID_CE "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::= { id-ce 36 } */
166#define MBEDTLS_OID_EXTENDED_KEY_USAGE MBEDTLS_OID_ID_CE "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */
167#define MBEDTLS_OID_CRL_DISTRIBUTION_POINTS MBEDTLS_OID_ID_CE "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::= { id-ce 31 } */
168#define MBEDTLS_OID_INIHIBIT_ANYPOLICY MBEDTLS_OID_ID_CE "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::= { id-ce 54 } */
169#define MBEDTLS_OID_FRESHEST_CRL MBEDTLS_OID_ID_CE "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::= { id-ce 46 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200170
171/*
Ron Eldor11ee0712019-03-25 18:22:52 +0200172 * Certificate policies
173 */
174#define MBEDTLS_OID_ANY_POLICY MBEDTLS_OID_CERTIFICATE_POLICIES "\x00" /**< anyPolicy OBJECT IDENTIFIER ::= { id-ce-certificatePolicies 0 } */
175
176/*
Paul Bakkerc70b9822013-04-07 22:00:46 +0200177 * Netscape certificate extensions
178 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200179#define MBEDTLS_OID_NS_CERT MBEDTLS_OID_NETSCAPE "\x01"
180#define MBEDTLS_OID_NS_CERT_TYPE MBEDTLS_OID_NS_CERT "\x01"
181#define MBEDTLS_OID_NS_BASE_URL MBEDTLS_OID_NS_CERT "\x02"
182#define MBEDTLS_OID_NS_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x03"
183#define MBEDTLS_OID_NS_CA_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x04"
184#define MBEDTLS_OID_NS_RENEWAL_URL MBEDTLS_OID_NS_CERT "\x07"
185#define MBEDTLS_OID_NS_CA_POLICY_URL MBEDTLS_OID_NS_CERT "\x08"
186#define MBEDTLS_OID_NS_SSL_SERVER_NAME MBEDTLS_OID_NS_CERT "\x0C"
187#define MBEDTLS_OID_NS_COMMENT MBEDTLS_OID_NS_CERT "\x0D"
188#define MBEDTLS_OID_NS_DATA_TYPE MBEDTLS_OID_NETSCAPE "\x02"
189#define MBEDTLS_OID_NS_CERT_SEQUENCE MBEDTLS_OID_NS_DATA_TYPE "\x05"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200190
191/*
192 * OIDs for CRL extensions
193 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194#define MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD MBEDTLS_OID_ID_CE "\x10"
195#define MBEDTLS_OID_CRL_NUMBER MBEDTLS_OID_ID_CE "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200196
197/*
198 * X.509 v3 Extended key usage OIDs
199 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200#define MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE MBEDTLS_OID_EXTENDED_KEY_USAGE "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200201
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202#define MBEDTLS_OID_KP MBEDTLS_OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */
203#define MBEDTLS_OID_SERVER_AUTH MBEDTLS_OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */
204#define MBEDTLS_OID_CLIENT_AUTH MBEDTLS_OID_KP "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */
205#define MBEDTLS_OID_CODE_SIGNING MBEDTLS_OID_KP "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */
206#define MBEDTLS_OID_EMAIL_PROTECTION MBEDTLS_OID_KP "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */
207#define MBEDTLS_OID_TIME_STAMPING MBEDTLS_OID_KP "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */
208#define MBEDTLS_OID_OCSP_SIGNING MBEDTLS_OID_KP "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200209
Ron Eldorb6dc1052019-04-01 18:12:23 +0300210/**
211 * Wi-SUN Alliance Field Area Network
212 * { iso(1) identified-organization(3) dod(6) internet(1)
213 * private(4) enterprise(1) WiSUN(45605) FieldAreaNetwork(1) }
214 */
215#define MBEDTLS_OID_WISUN_FAN MBEDTLS_OID_INTERNET "\x04\x01\x82\xe4\x25\x01"
216
Ron Eldorb2dc3fa2019-03-21 13:40:13 +0200217#define MBEDTLS_OID_ON MBEDTLS_OID_PKIX "\x08" /**< id-on OBJECT IDENTIFIER ::= { id-pkix 8 } */
218#define MBEDTLS_OID_ON_HW_MODULE_NAME MBEDTLS_OID_ON "\x04" /**< id-on-hardwareModuleName OBJECT IDENTIFIER ::= { id-on 4 } */
219
Paul Bakker9b5e8852013-06-28 16:12:50 +0200220/*
221 * PKCS definition OIDs
222 */
223
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200224#define MBEDTLS_OID_PKCS MBEDTLS_OID_RSA_COMPANY "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */
225#define MBEDTLS_OID_PKCS1 MBEDTLS_OID_PKCS "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */
226#define MBEDTLS_OID_PKCS5 MBEDTLS_OID_PKCS "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */
227#define MBEDTLS_OID_PKCS9 MBEDTLS_OID_PKCS "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */
228#define MBEDTLS_OID_PKCS12 MBEDTLS_OID_PKCS "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200229
Paul Bakker9b5e8852013-06-28 16:12:50 +0200230/*
231 * PKCS#1 OIDs
232 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200233#define MBEDTLS_OID_PKCS1_RSA MBEDTLS_OID_PKCS1 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */
234#define MBEDTLS_OID_PKCS1_MD2 MBEDTLS_OID_PKCS1 "\x02" /**< md2WithRSAEncryption ::= { pkcs-1 2 } */
235#define MBEDTLS_OID_PKCS1_MD4 MBEDTLS_OID_PKCS1 "\x03" /**< md4WithRSAEncryption ::= { pkcs-1 3 } */
236#define MBEDTLS_OID_PKCS1_MD5 MBEDTLS_OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */
237#define MBEDTLS_OID_PKCS1_SHA1 MBEDTLS_OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */
238#define MBEDTLS_OID_PKCS1_SHA224 MBEDTLS_OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */
239#define MBEDTLS_OID_PKCS1_SHA256 MBEDTLS_OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */
240#define MBEDTLS_OID_PKCS1_SHA384 MBEDTLS_OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */
241#define MBEDTLS_OID_PKCS1_SHA512 MBEDTLS_OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200242
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200243#define MBEDTLS_OID_RSA_SHA_OBS "\x2B\x0E\x03\x02\x1D"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200244
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200245#define MBEDTLS_OID_PKCS9_EMAIL MBEDTLS_OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200246
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +0100247/* RFC 4055 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248#define MBEDTLS_OID_RSASSA_PSS MBEDTLS_OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */
249#define MBEDTLS_OID_MGF1 MBEDTLS_OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +0100250
Paul Bakker9b5e8852013-06-28 16:12:50 +0200251/*
252 * Digest algorithms
253 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254#define MBEDTLS_OID_DIGEST_ALG_MD2 MBEDTLS_OID_RSA_COMPANY "\x02\x02" /**< id-mbedtls_md2 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 2 } */
255#define MBEDTLS_OID_DIGEST_ALG_MD4 MBEDTLS_OID_RSA_COMPANY "\x02\x04" /**< id-mbedtls_md4 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 4 } */
256#define MBEDTLS_OID_DIGEST_ALG_MD5 MBEDTLS_OID_RSA_COMPANY "\x02\x05" /**< id-mbedtls_md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */
257#define MBEDTLS_OID_DIGEST_ALG_SHA1 MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_OIW_SECSIG_SHA1 /**< id-mbedtls_sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */
Ron Eldor488fd082018-07-15 09:38:39 +0300258#define MBEDTLS_OID_DIGEST_ALG_SHA224 MBEDTLS_OID_NIST_ALG "\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */
259#define MBEDTLS_OID_DIGEST_ALG_SHA256 MBEDTLS_OID_NIST_ALG "\x02\x01" /**< id-mbedtls_sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200260
Ron Eldor488fd082018-07-15 09:38:39 +0300261#define MBEDTLS_OID_DIGEST_ALG_SHA384 MBEDTLS_OID_NIST_ALG "\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200262
Ron Eldor488fd082018-07-15 09:38:39 +0300263#define MBEDTLS_OID_DIGEST_ALG_SHA512 MBEDTLS_OID_NIST_ALG "\x02\x03" /**< id-mbedtls_sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200264
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200265#define MBEDTLS_OID_HMAC_SHA1 MBEDTLS_OID_RSA_COMPANY "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200266
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800267#define MBEDTLS_OID_HMAC_SHA224 MBEDTLS_OID_RSA_COMPANY "\x02\x08" /**< id-hmacWithSHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 8 } */
268
269#define MBEDTLS_OID_HMAC_SHA256 MBEDTLS_OID_RSA_COMPANY "\x02\x09" /**< id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 9 } */
270
271#define MBEDTLS_OID_HMAC_SHA384 MBEDTLS_OID_RSA_COMPANY "\x02\x0A" /**< id-hmacWithSHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 10 } */
272
273#define MBEDTLS_OID_HMAC_SHA512 MBEDTLS_OID_RSA_COMPANY "\x02\x0B" /**< id-hmacWithSHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 11 } */
274
Paul Bakker9b5e8852013-06-28 16:12:50 +0200275/*
276 * Encryption algorithms
277 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200278#define MBEDTLS_OID_DES_CBC MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_OIW_SECSIG_ALG "\x07" /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */
279#define MBEDTLS_OID_DES_EDE3_CBC MBEDTLS_OID_RSA_COMPANY "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */
Ron Eldor488fd082018-07-15 09:38:39 +0300280#define MBEDTLS_OID_AES MBEDTLS_OID_NIST_ALG "\x01" /** aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 1 } */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200281
282/*
Ron Eldor488fd082018-07-15 09:38:39 +0300283 * Key Wrapping algorithms
284 */
285/*
286 * RFC 5649
287 */
288#define MBEDTLS_OID_AES128_KW MBEDTLS_OID_AES "\x05" /** id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 } */
289#define MBEDTLS_OID_AES128_KWP MBEDTLS_OID_AES "\x08" /** id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes 8 } */
290#define MBEDTLS_OID_AES192_KW MBEDTLS_OID_AES "\x19" /** id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 } */
291#define MBEDTLS_OID_AES192_KWP MBEDTLS_OID_AES "\x1c" /** id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes 28 } */
292#define MBEDTLS_OID_AES256_KW MBEDTLS_OID_AES "\x2d" /** id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 } */
293#define MBEDTLS_OID_AES256_KWP MBEDTLS_OID_AES "\x30" /** id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes 48 } */
294/*
Paul Bakker9b5e8852013-06-28 16:12:50 +0200295 * PKCS#5 OIDs
296 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200297#define MBEDTLS_OID_PKCS5_PBKDF2 MBEDTLS_OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */
298#define MBEDTLS_OID_PKCS5_PBES2 MBEDTLS_OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */
299#define MBEDTLS_OID_PKCS5_PBMAC1 MBEDTLS_OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200300
301/*
302 * PKCS#5 PBES1 algorithms
303 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200304#define MBEDTLS_OID_PKCS5_PBE_MD2_DES_CBC MBEDTLS_OID_PKCS5 "\x01" /**< pbeWithMD2AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 1} */
305#define MBEDTLS_OID_PKCS5_PBE_MD2_RC2_CBC MBEDTLS_OID_PKCS5 "\x04" /**< pbeWithMD2AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 4} */
306#define MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC MBEDTLS_OID_PKCS5 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */
307#define MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC MBEDTLS_OID_PKCS5 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */
308#define MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC MBEDTLS_OID_PKCS5 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */
309#define MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC MBEDTLS_OID_PKCS5 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200310
Paul Bakker7749a222013-06-28 17:28:20 +0200311/*
Paul Bakkerfde42702013-08-25 14:47:27 +0200312 * PKCS#8 OIDs
313 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314#define MBEDTLS_OID_PKCS9_CSR_EXT_REQ MBEDTLS_OID_PKCS9 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */
Paul Bakkerfde42702013-08-25 14:47:27 +0200315
316/*
Paul Bakker7749a222013-06-28 17:28:20 +0200317 * PKCS#12 PBE OIDs
318 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200319#define MBEDTLS_OID_PKCS12_PBE MBEDTLS_OID_PKCS12 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */
Paul Bakker7749a222013-06-28 17:28:20 +0200320
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200321#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_128 MBEDTLS_OID_PKCS12_PBE "\x01" /**< pbeWithSHAAnd128BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 1} */
322#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_40 MBEDTLS_OID_PKCS12_PBE "\x02" /**< pbeWithSHAAnd40BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 2} */
323#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC MBEDTLS_OID_PKCS12_PBE "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */
324#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC MBEDTLS_OID_PKCS12_PBE "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */
325#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC MBEDTLS_OID_PKCS12_PBE "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */
326#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC MBEDTLS_OID_PKCS12_PBE "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */
Paul Bakker7749a222013-06-28 17:28:20 +0200327
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200328/*
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200329 * EC key algorithms from RFC 5480
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200330 */
331
332/* id-ecPublicKey OBJECT IDENTIFIER ::= {
333 * iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200334#define MBEDTLS_OID_EC_ALG_UNRESTRICTED MBEDTLS_OID_ANSI_X9_62 "\x02\01"
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200335
336/* id-ecDH OBJECT IDENTIFIER ::= {
337 * iso(1) identified-organization(3) certicom(132)
338 * schemes(1) ecdh(12) } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200339#define MBEDTLS_OID_EC_ALG_ECDH MBEDTLS_OID_CERTICOM "\x01\x0c"
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200340
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200341/*
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100342 * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200343 */
344
345/* secp192r1 OBJECT IDENTIFIER ::= {
346 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200347#define MBEDTLS_OID_EC_GRP_SECP192R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x01"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200348
349/* secp224r1 OBJECT IDENTIFIER ::= {
350 * iso(1) identified-organization(3) certicom(132) curve(0) 33 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200351#define MBEDTLS_OID_EC_GRP_SECP224R1 MBEDTLS_OID_CERTICOM "\x00\x21"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200352
353/* secp256r1 OBJECT IDENTIFIER ::= {
354 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200355#define MBEDTLS_OID_EC_GRP_SECP256R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x07"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200356
357/* secp384r1 OBJECT IDENTIFIER ::= {
358 * iso(1) identified-organization(3) certicom(132) curve(0) 34 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200359#define MBEDTLS_OID_EC_GRP_SECP384R1 MBEDTLS_OID_CERTICOM "\x00\x22"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200360
361/* secp521r1 OBJECT IDENTIFIER ::= {
362 * iso(1) identified-organization(3) certicom(132) curve(0) 35 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200363#define MBEDTLS_OID_EC_GRP_SECP521R1 MBEDTLS_OID_CERTICOM "\x00\x23"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200364
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100365/* secp192k1 OBJECT IDENTIFIER ::= {
366 * iso(1) identified-organization(3) certicom(132) curve(0) 31 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200367#define MBEDTLS_OID_EC_GRP_SECP192K1 MBEDTLS_OID_CERTICOM "\x00\x1f"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100368
369/* secp224k1 OBJECT IDENTIFIER ::= {
370 * iso(1) identified-organization(3) certicom(132) curve(0) 32 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200371#define MBEDTLS_OID_EC_GRP_SECP224K1 MBEDTLS_OID_CERTICOM "\x00\x20"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100372
373/* secp256k1 OBJECT IDENTIFIER ::= {
374 * iso(1) identified-organization(3) certicom(132) curve(0) 10 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200375#define MBEDTLS_OID_EC_GRP_SECP256K1 MBEDTLS_OID_CERTICOM "\x00\x0a"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100376
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200377/* RFC 5639 4.1
378 * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1)
379 * identified-organization(3) teletrust(36) algorithm(3) signature-
380 * algorithm(3) ecSign(2) 8}
381 * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1}
382 * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200383#define MBEDTLS_OID_EC_BRAINPOOL_V1 MBEDTLS_OID_TELETRUST "\x03\x03\x02\x08\x01\x01"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200384
385/* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200386#define MBEDTLS_OID_EC_GRP_BP256R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x07"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200387
388/* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200389#define MBEDTLS_OID_EC_GRP_BP384R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0B"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200390
391/* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200392#define MBEDTLS_OID_EC_GRP_BP512R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0D"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200393
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200394/*
Manuel Pégourié-Gonnardeab20d22014-03-14 17:58:42 +0100395 * SEC1 C.1
396 *
397 * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
398 * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)}
399 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200400#define MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE MBEDTLS_OID_ANSI_X9_62 "\x01"
401#define MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE "\x01"
Manuel Pégourié-Gonnardeab20d22014-03-14 17:58:42 +0100402
403/*
Paul Bakker75342a62014-04-08 17:35:40 +0200404 * ECDSA signature identifiers, from RFC 5480
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200405 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200406#define MBEDTLS_OID_ANSI_X9_62_SIG MBEDTLS_OID_ANSI_X9_62 "\x04" /* signatures(4) */
407#define MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 MBEDTLS_OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200408
409/* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= {
410 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200411#define MBEDTLS_OID_ECDSA_SHA1 MBEDTLS_OID_ANSI_X9_62_SIG "\x01"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200412
413/* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= {
414 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
415 * ecdsa-with-SHA2(3) 1 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200416#define MBEDTLS_OID_ECDSA_SHA224 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x01"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200417
418/* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= {
419 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
420 * ecdsa-with-SHA2(3) 2 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200421#define MBEDTLS_OID_ECDSA_SHA256 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x02"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200422
423/* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= {
424 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
425 * ecdsa-with-SHA2(3) 3 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200426#define MBEDTLS_OID_ECDSA_SHA384 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x03"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200427
428/* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= {
429 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
430 * ecdsa-with-SHA2(3) 4 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200431#define MBEDTLS_OID_ECDSA_SHA512 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x04"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200432
Paul Bakkerc70b9822013-04-07 22:00:46 +0200433#ifdef __cplusplus
434extern "C" {
435#endif
436
437/**
438 * \brief Base OID descriptor structure
439 */
Dawid Drozd428cc522018-07-24 10:02:47 +0200440typedef struct mbedtls_oid_descriptor_t
441{
Paul Bakkerc70b9822013-04-07 22:00:46 +0200442 const char *asn1; /*!< OID ASN.1 representation */
Manuel Pégourié-Gonnard298aae42013-08-15 14:22:17 +0200443 size_t asn1_len; /*!< length of asn1 */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200444 const char *name; /*!< official name (e.g. from RFC) */
445 const char *description; /*!< human friendly description */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200446} mbedtls_oid_descriptor_t;
Paul Bakkerc70b9822013-04-07 22:00:46 +0200447
448/**
449 * \brief Translate an ASN.1 OID into its numeric representation
450 * (e.g. "\x2A\x86\x48\x86\xF7\x0D" into "1.2.840.113549")
451 *
452 * \param buf buffer to put representation in
453 * \param size size of the buffer
454 * \param oid OID to translate
455 *
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100456 * \return Length of the string written (excluding final NULL) or
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200457 * MBEDTLS_ERR_OID_BUF_TOO_SMALL in case of error
Paul Bakkerc70b9822013-04-07 22:00:46 +0200458 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200459int mbedtls_oid_get_numeric_string( char *buf, size_t size, const mbedtls_asn1_buf *oid );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200460
461/**
462 * \brief Translate an X.509 extension OID into local values
463 *
464 * \param oid OID to use
465 * \param ext_type place to store the extension type
466 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200467 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200468 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200469int mbedtls_oid_get_x509_ext_type( const mbedtls_asn1_buf *oid, int *ext_type );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200470
471/**
472 * \brief Translate an X.509 attribute type OID into the short name
473 * (e.g. the OID for an X520 Common Name into "CN")
474 *
475 * \param oid OID to use
476 * \param short_name place to store the string pointer
477 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200478 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200479 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200480int mbedtls_oid_get_attr_short_name( const mbedtls_asn1_buf *oid, const char **short_name );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200481
482/**
483 * \brief Translate PublicKeyAlgorithm OID into pk_type
484 *
485 * \param oid OID to use
486 * \param pk_alg place to store public key algorithm
487 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200488 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200489 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200490int mbedtls_oid_get_pk_alg( const mbedtls_asn1_buf *oid, mbedtls_pk_type_t *pk_alg );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200491
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200492/**
493 * \brief Translate pk_type into PublicKeyAlgorithm OID
494 *
495 * \param pk_alg Public key type to look for
496 * \param oid place to store ASN.1 OID string pointer
497 * \param olen length of the OID
498 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200499 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200500 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200501int mbedtls_oid_get_oid_by_pk_alg( mbedtls_pk_type_t pk_alg,
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200502 const char **oid, size_t *olen );
503
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200504#if defined(MBEDTLS_ECP_C)
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200505/**
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200506 * \brief Translate NamedCurve OID into an EC group identifier
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200507 *
508 * \param oid OID to use
509 * \param grp_id place to store group id
510 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200511 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200512 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200513int mbedtls_oid_get_ec_grp( const mbedtls_asn1_buf *oid, mbedtls_ecp_group_id *grp_id );
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200514
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200515/**
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200516 * \brief Translate EC group identifier into NamedCurve OID
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200517 *
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200518 * \param grp_id EC group identifier
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200519 * \param oid place to store ASN.1 OID string pointer
520 * \param olen length of the OID
521 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200522 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200523 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200524int mbedtls_oid_get_oid_by_ec_grp( mbedtls_ecp_group_id grp_id,
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200525 const char **oid, size_t *olen );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200526#endif /* MBEDTLS_ECP_C */
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200527
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200528#if defined(MBEDTLS_MD_C)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200529/**
530 * \brief Translate SignatureAlgorithm OID into md_type and pk_type
531 *
532 * \param oid OID to use
533 * \param md_alg place to store message digest algorithm
534 * \param pk_alg place to store public key algorithm
535 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200536 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200537 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200538int mbedtls_oid_get_sig_alg( const mbedtls_asn1_buf *oid,
539 mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200540
541/**
542 * \brief Translate SignatureAlgorithm OID into description
543 *
544 * \param oid OID to use
545 * \param desc place to store string pointer
546 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200547 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200548 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200549int mbedtls_oid_get_sig_alg_desc( const mbedtls_asn1_buf *oid, const char **desc );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200550
551/**
552 * \brief Translate md_type and pk_type into SignatureAlgorithm OID
553 *
554 * \param md_alg message digest algorithm
555 * \param pk_alg public key algorithm
556 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200557 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200558 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200559 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200560 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200561int mbedtls_oid_get_oid_by_sig_alg( mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg,
Paul Bakker1c3853b2013-09-10 11:43:44 +0200562 const char **oid, size_t *olen );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200563
564/**
565 * \brief Translate hash algorithm OID into md_type
566 *
567 * \param oid OID to use
568 * \param md_alg place to store message digest algorithm
569 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200570 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200571 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200572int mbedtls_oid_get_md_alg( const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg );
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800573
574/**
575 * \brief Translate hmac algorithm OID into md_type
576 *
577 * \param oid OID to use
578 * \param md_hmac place to store message hmac algorithm
579 *
580 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
581 */
582int mbedtls_oid_get_md_hmac( const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_hmac );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200583#endif /* MBEDTLS_MD_C */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200584
585/**
586 * \brief Translate Extended Key Usage OID into description
587 *
588 * \param oid OID to use
589 * \param desc place to store string pointer
590 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200591 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200592 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200593int mbedtls_oid_get_extended_key_usage( const mbedtls_asn1_buf *oid, const char **desc );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200594
595/**
Ron Eldor11ee0712019-03-25 18:22:52 +0200596 * \brief Translate certificate policies OID into description
597 *
598 * \param oid OID to use
599 * \param desc place to store string pointer
600 *
601 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
602 */
603int mbedtls_oid_get_certificate_policies( const mbedtls_asn1_buf *oid, const char **desc );
604
605/**
Paul Bakkerc70b9822013-04-07 22:00:46 +0200606 * \brief Translate md_type into hash algorithm OID
607 *
608 * \param md_alg message digest algorithm
609 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200610 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200611 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200612 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200613 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200614int mbedtls_oid_get_oid_by_md( mbedtls_md_type_t md_alg, const char **oid, size_t *olen );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200615
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200616#if defined(MBEDTLS_CIPHER_C)
Paul Bakker9b5e8852013-06-28 16:12:50 +0200617/**
618 * \brief Translate encryption algorithm OID into cipher_type
619 *
620 * \param oid OID to use
621 * \param cipher_alg place to store cipher algorithm
622 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200623 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakker9b5e8852013-06-28 16:12:50 +0200624 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200625int mbedtls_oid_get_cipher_alg( const mbedtls_asn1_buf *oid, mbedtls_cipher_type_t *cipher_alg );
626#endif /* MBEDTLS_CIPHER_C */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200627
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200628#if defined(MBEDTLS_PKCS12_C)
Paul Bakker7749a222013-06-28 17:28:20 +0200629/**
630 * \brief Translate PKCS#12 PBE algorithm OID into md_type and
631 * cipher_type
632 *
633 * \param oid OID to use
634 * \param md_alg place to store message digest algorithm
635 * \param cipher_alg place to store cipher algorithm
636 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200637 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakker7749a222013-06-28 17:28:20 +0200638 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200639int mbedtls_oid_get_pkcs12_pbe_alg( const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg,
640 mbedtls_cipher_type_t *cipher_alg );
641#endif /* MBEDTLS_PKCS12_C */
Paul Bakker7749a222013-06-28 17:28:20 +0200642
Paul Bakkerc70b9822013-04-07 22:00:46 +0200643#ifdef __cplusplus
644}
645#endif
646
647#endif /* oid.h */