blob: e8bd0d19d80c3b15166517f77998ab2019613c28 [file] [log] [blame]
Gilles Peskine47c85792025-05-07 14:35:04 +02001/**
Gilles Peskineb825dcf2025-05-07 19:41:09 +02002 * \file x509_oid.c
Gilles Peskine47c85792025-05-07 14:35:04 +02003 *
4 * \brief Object Identifier (OID) database
5 *
6 * Copyright The Mbed TLS Contributors
7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
8 */
9
Gilles Peskined2fe51c2025-05-07 20:36:20 +020010#include "x509_internal.h"
Gilles Peskine47c85792025-05-07 14:35:04 +020011
12#if defined(MBEDTLS_OID_C)
13
Gilles Peskinecd4c0d72025-05-07 23:45:12 +020014#include "mbedtls/oid.h"
Gilles Peskine86a47f82025-05-07 20:20:12 +020015#include "x509_oid.h"
Gilles Peskine47c85792025-05-07 14:35:04 +020016
17#include <stdio.h>
18#include <string.h>
19
20#include "mbedtls/platform.h"
21
22/*
23 * Macro to automatically add the size of #define'd OIDs
24 */
25#define ADD_LEN(s) s, MBEDTLS_OID_SIZE(s)
26
27/*
Gilles Peskine86e45ba2025-05-07 20:33:39 +020028 * Macro to generate mbedtls_x509_oid_descriptor_t
Gilles Peskine47c85792025-05-07 14:35:04 +020029 */
30#if !defined(MBEDTLS_X509_REMOVE_INFO)
31#define OID_DESCRIPTOR(s, name, description) { ADD_LEN(s), name, description }
32#define NULL_OID_DESCRIPTOR { NULL, 0, NULL, NULL }
33#else
34#define OID_DESCRIPTOR(s, name, description) { ADD_LEN(s) }
35#define NULL_OID_DESCRIPTOR { NULL, 0 }
36#endif
37
38/*
39 * Macro to generate an internal function for oid_XXX_from_asn1() (used by
40 * the other functions)
41 */
42#define FN_OID_TYPED_FROM_ASN1(TYPE_T, NAME, LIST) \
43 static const TYPE_T *oid_ ## NAME ## _from_asn1( \
44 const mbedtls_asn1_buf *oid) \
45 { \
46 const TYPE_T *p = (LIST); \
Gilles Peskine86e45ba2025-05-07 20:33:39 +020047 const mbedtls_x509_oid_descriptor_t *cur = \
48 (const mbedtls_x509_oid_descriptor_t *) p; \
Gilles Peskine47c85792025-05-07 14:35:04 +020049 if (p == NULL || oid == NULL) return NULL; \
50 while (cur->asn1 != NULL) { \
51 if (cur->asn1_len == oid->len && \
52 memcmp(cur->asn1, oid->p, oid->len) == 0) { \
53 return p; \
54 } \
55 p++; \
Gilles Peskine86e45ba2025-05-07 20:33:39 +020056 cur = (const mbedtls_x509_oid_descriptor_t *) p; \
Gilles Peskine47c85792025-05-07 14:35:04 +020057 } \
58 return NULL; \
59 }
60
61#if !defined(MBEDTLS_X509_REMOVE_INFO)
62/*
63 * Macro to generate a function for retrieving a single attribute from the
Gilles Peskine86e45ba2025-05-07 20:33:39 +020064 * descriptor of an mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020065 */
66#define FN_OID_GET_DESCRIPTOR_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
67 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
68 { \
69 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +020070 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +020071 *ATTR1 = data->descriptor.ATTR1; \
72 return 0; \
73 }
74#endif /* MBEDTLS_X509_REMOVE_INFO */
75
76/*
77 * Macro to generate a function for retrieving a single attribute from an
Gilles Peskine86e45ba2025-05-07 20:33:39 +020078 * mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020079 */
80#define FN_OID_GET_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
81 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
82 { \
83 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +020084 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +020085 *ATTR1 = data->ATTR1; \
86 return 0; \
87 }
88
89/*
90 * Macro to generate a function for retrieving two attributes from an
Gilles Peskine86e45ba2025-05-07 20:33:39 +020091 * mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +020092 */
93#define FN_OID_GET_ATTR2(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1, \
94 ATTR2_TYPE, ATTR2) \
95 int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1, \
96 ATTR2_TYPE * ATTR2) \
97 { \
98 const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
Gilles Peskine4c832212025-05-07 23:05:12 +020099 if (data == NULL) return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200100 *(ATTR1) = data->ATTR1; \
101 *(ATTR2) = data->ATTR2; \
102 return 0; \
103 }
104
105/*
106 * Macro to generate a function for retrieving the OID based on a single
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200107 * attribute from a mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +0200108 */
109#define FN_OID_GET_OID_BY_ATTR1(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1) \
110 int FN_NAME(ATTR1_TYPE ATTR1, const char **oid, size_t *olen) \
111 { \
112 const TYPE_T *cur = (LIST); \
113 while (cur->descriptor.asn1 != NULL) { \
114 if (cur->ATTR1 == (ATTR1)) { \
115 *oid = cur->descriptor.asn1; \
116 *olen = cur->descriptor.asn1_len; \
117 return 0; \
118 } \
119 cur++; \
120 } \
Gilles Peskine4c832212025-05-07 23:05:12 +0200121 return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200122 }
123
124/*
125 * Macro to generate a function for retrieving the OID based on two
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200126 * attributes from a mbedtls_x509_oid_descriptor_t wrapper.
Gilles Peskine47c85792025-05-07 14:35:04 +0200127 */
128#define FN_OID_GET_OID_BY_ATTR2(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1, \
129 ATTR2_TYPE, ATTR2) \
130 int FN_NAME(ATTR1_TYPE ATTR1, ATTR2_TYPE ATTR2, const char **oid, \
131 size_t *olen) \
132 { \
133 const TYPE_T *cur = (LIST); \
134 while (cur->descriptor.asn1 != NULL) { \
135 if (cur->ATTR1 == (ATTR1) && cur->ATTR2 == (ATTR2)) { \
136 *oid = cur->descriptor.asn1; \
137 *olen = cur->descriptor.asn1_len; \
138 return 0; \
139 } \
140 cur++; \
141 } \
Gilles Peskine4c832212025-05-07 23:05:12 +0200142 return MBEDTLS_ERR_X509_UNKNOWN_OID; \
Gilles Peskine47c85792025-05-07 14:35:04 +0200143 }
144
145/*
146 * For X520 attribute types
147 */
148typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200149 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200150 const char *short_name;
151} oid_x520_attr_t;
152
153static const oid_x520_attr_t oid_x520_attr_type[] =
154{
155 {
156 OID_DESCRIPTOR(MBEDTLS_OID_AT_CN, "id-at-commonName", "Common Name"),
157 "CN",
158 },
159 {
160 OID_DESCRIPTOR(MBEDTLS_OID_AT_COUNTRY, "id-at-countryName", "Country"),
161 "C",
162 },
163 {
164 OID_DESCRIPTOR(MBEDTLS_OID_AT_LOCALITY, "id-at-locality", "Locality"),
165 "L",
166 },
167 {
168 OID_DESCRIPTOR(MBEDTLS_OID_AT_STATE, "id-at-state", "State"),
169 "ST",
170 },
171 {
172 OID_DESCRIPTOR(MBEDTLS_OID_AT_ORGANIZATION, "id-at-organizationName",
173 "Organization"),
174 "O",
175 },
176 {
177 OID_DESCRIPTOR(MBEDTLS_OID_AT_ORG_UNIT, "id-at-organizationalUnitName", "Org Unit"),
178 "OU",
179 },
180 {
181 OID_DESCRIPTOR(MBEDTLS_OID_PKCS9_EMAIL,
182 "emailAddress",
183 "E-mail address"),
184 "emailAddress",
185 },
186 {
187 OID_DESCRIPTOR(MBEDTLS_OID_AT_SERIAL_NUMBER,
188 "id-at-serialNumber",
189 "Serial number"),
190 "serialNumber",
191 },
192 {
193 OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_ADDRESS,
194 "id-at-postalAddress",
195 "Postal address"),
196 "postalAddress",
197 },
198 {
199 OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_CODE, "id-at-postalCode", "Postal code"),
200 "postalCode",
201 },
202 {
203 OID_DESCRIPTOR(MBEDTLS_OID_AT_SUR_NAME, "id-at-surName", "Surname"),
204 "SN",
205 },
206 {
207 OID_DESCRIPTOR(MBEDTLS_OID_AT_GIVEN_NAME, "id-at-givenName", "Given name"),
208 "GN",
209 },
210 {
211 OID_DESCRIPTOR(MBEDTLS_OID_AT_INITIALS, "id-at-initials", "Initials"),
212 "initials",
213 },
214 {
215 OID_DESCRIPTOR(MBEDTLS_OID_AT_GENERATION_QUALIFIER,
216 "id-at-generationQualifier",
217 "Generation qualifier"),
218 "generationQualifier",
219 },
220 {
221 OID_DESCRIPTOR(MBEDTLS_OID_AT_TITLE, "id-at-title", "Title"),
222 "title",
223 },
224 {
225 OID_DESCRIPTOR(MBEDTLS_OID_AT_DN_QUALIFIER,
226 "id-at-dnQualifier",
227 "Distinguished Name qualifier"),
228 "dnQualifier",
229 },
230 {
231 OID_DESCRIPTOR(MBEDTLS_OID_AT_PSEUDONYM, "id-at-pseudonym", "Pseudonym"),
232 "pseudonym",
233 },
234 {
235 OID_DESCRIPTOR(MBEDTLS_OID_UID, "id-uid", "User Id"),
236 "uid",
237 },
238 {
239 OID_DESCRIPTOR(MBEDTLS_OID_DOMAIN_COMPONENT,
240 "id-domainComponent",
241 "Domain component"),
242 "DC",
243 },
244 {
245 OID_DESCRIPTOR(MBEDTLS_OID_AT_UNIQUE_IDENTIFIER,
246 "id-at-uniqueIdentifier",
247 "Unique Identifier"),
248 "uniqueIdentifier",
249 },
250 {
251 NULL_OID_DESCRIPTOR,
252 NULL,
253 }
254};
255
256FN_OID_TYPED_FROM_ASN1(oid_x520_attr_t, x520_attr, oid_x520_attr_type)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200257FN_OID_GET_ATTR1(mbedtls_x509_oid_get_attr_short_name,
Gilles Peskine47c85792025-05-07 14:35:04 +0200258 oid_x520_attr_t,
259 x520_attr,
260 const char *,
261 short_name)
262
263/*
264 * For X509 extensions
265 */
266typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200267 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200268 int ext_type;
269} oid_x509_ext_t;
270
271static const oid_x509_ext_t oid_x509_ext[] =
272{
273 {
274 OID_DESCRIPTOR(MBEDTLS_OID_BASIC_CONSTRAINTS,
275 "id-ce-basicConstraints",
276 "Basic Constraints"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200277 MBEDTLS_X509_EXT_BASIC_CONSTRAINTS,
Gilles Peskine47c85792025-05-07 14:35:04 +0200278 },
279 {
280 OID_DESCRIPTOR(MBEDTLS_OID_KEY_USAGE, "id-ce-keyUsage", "Key Usage"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200281 MBEDTLS_X509_EXT_KEY_USAGE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200282 },
283 {
284 OID_DESCRIPTOR(MBEDTLS_OID_EXTENDED_KEY_USAGE,
285 "id-ce-extKeyUsage",
286 "Extended Key Usage"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200287 MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200288 },
289 {
290 OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_ALT_NAME,
291 "id-ce-subjectAltName",
292 "Subject Alt Name"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200293 MBEDTLS_X509_EXT_SUBJECT_ALT_NAME,
Gilles Peskine47c85792025-05-07 14:35:04 +0200294 },
295 {
296 OID_DESCRIPTOR(MBEDTLS_OID_NS_CERT_TYPE,
297 "id-netscape-certtype",
298 "Netscape Certificate Type"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200299 MBEDTLS_X509_EXT_NS_CERT_TYPE,
Gilles Peskine47c85792025-05-07 14:35:04 +0200300 },
301 {
302 OID_DESCRIPTOR(MBEDTLS_OID_CERTIFICATE_POLICIES,
303 "id-ce-certificatePolicies",
304 "Certificate Policies"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200305 MBEDTLS_X509_EXT_CERTIFICATE_POLICIES,
Gilles Peskine47c85792025-05-07 14:35:04 +0200306 },
307 {
308 OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER,
309 "id-ce-subjectKeyIdentifier",
310 "Subject Key Identifier"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200311 MBEDTLS_X509_EXT_SUBJECT_KEY_IDENTIFIER,
Gilles Peskine47c85792025-05-07 14:35:04 +0200312 },
313 {
314 OID_DESCRIPTOR(MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER,
315 "id-ce-authorityKeyIdentifier",
316 "Authority Key Identifier"),
Gilles Peskine32a11122025-04-09 21:51:46 +0200317 MBEDTLS_X509_EXT_AUTHORITY_KEY_IDENTIFIER,
Gilles Peskine47c85792025-05-07 14:35:04 +0200318 },
319 {
320 NULL_OID_DESCRIPTOR,
321 0,
322 },
323};
324
325FN_OID_TYPED_FROM_ASN1(oid_x509_ext_t, x509_ext, oid_x509_ext)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200326FN_OID_GET_ATTR1(mbedtls_x509_oid_get_x509_ext_type, oid_x509_ext_t, x509_ext, int, ext_type)
Gilles Peskine47c85792025-05-07 14:35:04 +0200327
328#if !defined(MBEDTLS_X509_REMOVE_INFO)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200329static const mbedtls_x509_oid_descriptor_t oid_ext_key_usage[] =
Gilles Peskine47c85792025-05-07 14:35:04 +0200330{
331 OID_DESCRIPTOR(MBEDTLS_OID_SERVER_AUTH,
332 "id-kp-serverAuth",
333 "TLS Web Server Authentication"),
334 OID_DESCRIPTOR(MBEDTLS_OID_CLIENT_AUTH,
335 "id-kp-clientAuth",
336 "TLS Web Client Authentication"),
337 OID_DESCRIPTOR(MBEDTLS_OID_CODE_SIGNING, "id-kp-codeSigning", "Code Signing"),
338 OID_DESCRIPTOR(MBEDTLS_OID_EMAIL_PROTECTION, "id-kp-emailProtection", "E-mail Protection"),
339 OID_DESCRIPTOR(MBEDTLS_OID_TIME_STAMPING, "id-kp-timeStamping", "Time Stamping"),
340 OID_DESCRIPTOR(MBEDTLS_OID_OCSP_SIGNING, "id-kp-OCSPSigning", "OCSP Signing"),
341 OID_DESCRIPTOR(MBEDTLS_OID_WISUN_FAN,
342 "id-kp-wisun-fan-device",
343 "Wi-SUN Alliance Field Area Network (FAN)"),
344 NULL_OID_DESCRIPTOR,
345};
346
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200347FN_OID_TYPED_FROM_ASN1(mbedtls_x509_oid_descriptor_t, ext_key_usage, oid_ext_key_usage)
348FN_OID_GET_ATTR1(mbedtls_x509_oid_get_extended_key_usage,
349 mbedtls_x509_oid_descriptor_t,
Gilles Peskine47c85792025-05-07 14:35:04 +0200350 ext_key_usage,
351 const char *,
352 description)
353
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200354static const mbedtls_x509_oid_descriptor_t oid_certificate_policies[] =
Gilles Peskine47c85792025-05-07 14:35:04 +0200355{
356 OID_DESCRIPTOR(MBEDTLS_OID_ANY_POLICY, "anyPolicy", "Any Policy"),
357 NULL_OID_DESCRIPTOR,
358};
359
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200360FN_OID_TYPED_FROM_ASN1(mbedtls_x509_oid_descriptor_t, certificate_policies,
361 oid_certificate_policies)
362FN_OID_GET_ATTR1(mbedtls_x509_oid_get_certificate_policies,
363 mbedtls_x509_oid_descriptor_t,
Gilles Peskine47c85792025-05-07 14:35:04 +0200364 certificate_policies,
365 const char *,
366 description)
367#endif /* MBEDTLS_X509_REMOVE_INFO */
368
369/*
370 * For SignatureAlgorithmIdentifier
371 */
372typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200373 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200374 mbedtls_md_type_t md_alg;
375 mbedtls_pk_type_t pk_alg;
376} oid_sig_alg_t;
377
378static const oid_sig_alg_t oid_sig_alg[] =
379{
380#if defined(MBEDTLS_RSA_C)
381#if defined(PSA_WANT_ALG_MD5)
382 {
383 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_MD5, "md5WithRSAEncryption", "RSA with MD5"),
384 MBEDTLS_MD_MD5, MBEDTLS_PK_RSA,
385 },
386#endif /* PSA_WANT_ALG_MD5 */
387#if defined(PSA_WANT_ALG_SHA_1)
388 {
389 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA1, "sha-1WithRSAEncryption", "RSA with SHA1"),
390 MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
391 },
392#endif /* PSA_WANT_ALG_SHA_1 */
393#if defined(PSA_WANT_ALG_SHA_224)
394 {
395 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA224, "sha224WithRSAEncryption",
396 "RSA with SHA-224"),
397 MBEDTLS_MD_SHA224, MBEDTLS_PK_RSA,
398 },
399#endif /* PSA_WANT_ALG_SHA_224 */
400#if defined(PSA_WANT_ALG_SHA_256)
401 {
402 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA256, "sha256WithRSAEncryption",
403 "RSA with SHA-256"),
404 MBEDTLS_MD_SHA256, MBEDTLS_PK_RSA,
405 },
406#endif /* PSA_WANT_ALG_SHA_256 */
407#if defined(PSA_WANT_ALG_SHA_384)
408 {
409 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA384, "sha384WithRSAEncryption",
410 "RSA with SHA-384"),
411 MBEDTLS_MD_SHA384, MBEDTLS_PK_RSA,
412 },
413#endif /* PSA_WANT_ALG_SHA_384 */
414#if defined(PSA_WANT_ALG_SHA_512)
415 {
416 OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA512, "sha512WithRSAEncryption",
417 "RSA with SHA-512"),
418 MBEDTLS_MD_SHA512, MBEDTLS_PK_RSA,
419 },
420#endif /* PSA_WANT_ALG_SHA_512 */
421#if defined(PSA_WANT_ALG_SHA_1)
422 {
423 OID_DESCRIPTOR(MBEDTLS_OID_RSA_SHA_OBS, "sha-1WithRSAEncryption", "RSA with SHA1"),
424 MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
425 },
426#endif /* PSA_WANT_ALG_SHA_1 */
427#endif /* MBEDTLS_RSA_C */
428#if defined(PSA_HAVE_ALG_SOME_ECDSA)
429#if defined(PSA_WANT_ALG_SHA_1)
430 {
431 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA1, "ecdsa-with-SHA1", "ECDSA with SHA1"),
432 MBEDTLS_MD_SHA1, MBEDTLS_PK_ECDSA,
433 },
434#endif /* PSA_WANT_ALG_SHA_1 */
435#if defined(PSA_WANT_ALG_SHA_224)
436 {
437 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA224, "ecdsa-with-SHA224", "ECDSA with SHA224"),
438 MBEDTLS_MD_SHA224, MBEDTLS_PK_ECDSA,
439 },
440#endif
441#if defined(PSA_WANT_ALG_SHA_256)
442 {
443 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA256, "ecdsa-with-SHA256", "ECDSA with SHA256"),
444 MBEDTLS_MD_SHA256, MBEDTLS_PK_ECDSA,
445 },
446#endif /* PSA_WANT_ALG_SHA_256 */
447#if defined(PSA_WANT_ALG_SHA_384)
448 {
449 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA384, "ecdsa-with-SHA384", "ECDSA with SHA384"),
450 MBEDTLS_MD_SHA384, MBEDTLS_PK_ECDSA,
451 },
452#endif /* PSA_WANT_ALG_SHA_384 */
453#if defined(PSA_WANT_ALG_SHA_512)
454 {
455 OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA512, "ecdsa-with-SHA512", "ECDSA with SHA512"),
456 MBEDTLS_MD_SHA512, MBEDTLS_PK_ECDSA,
457 },
458#endif /* PSA_WANT_ALG_SHA_512 */
459#endif /* PSA_HAVE_ALG_SOME_ECDSA */
460#if defined(MBEDTLS_RSA_C)
461 {
462 OID_DESCRIPTOR(MBEDTLS_OID_RSASSA_PSS, "RSASSA-PSS", "RSASSA-PSS"),
463 MBEDTLS_MD_NONE, MBEDTLS_PK_RSASSA_PSS,
464 },
465#endif /* MBEDTLS_RSA_C */
466 {
467 NULL_OID_DESCRIPTOR,
468 MBEDTLS_MD_NONE, MBEDTLS_PK_NONE,
469 },
470};
471
472FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
473
474#if !defined(MBEDTLS_X509_REMOVE_INFO)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200475FN_OID_GET_DESCRIPTOR_ATTR1(mbedtls_x509_oid_get_sig_alg_desc,
Gilles Peskine47c85792025-05-07 14:35:04 +0200476 oid_sig_alg_t,
477 sig_alg,
478 const char *,
479 description)
480#endif
481
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200482FN_OID_GET_ATTR2(mbedtls_x509_oid_get_sig_alg,
Gilles Peskine47c85792025-05-07 14:35:04 +0200483 oid_sig_alg_t,
484 sig_alg,
485 mbedtls_md_type_t,
486 md_alg,
487 mbedtls_pk_type_t,
488 pk_alg)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200489FN_OID_GET_OID_BY_ATTR2(mbedtls_x509_oid_get_oid_by_sig_alg,
Gilles Peskine47c85792025-05-07 14:35:04 +0200490 oid_sig_alg_t,
491 oid_sig_alg,
492 mbedtls_pk_type_t,
493 pk_alg,
494 mbedtls_md_type_t,
495 md_alg)
496
497/*
Gilles Peskine47c85792025-05-07 14:35:04 +0200498 * For digestAlgorithm
499 */
500typedef struct {
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200501 mbedtls_x509_oid_descriptor_t descriptor;
Gilles Peskine47c85792025-05-07 14:35:04 +0200502 mbedtls_md_type_t md_alg;
503} oid_md_alg_t;
504
505static const oid_md_alg_t oid_md_alg[] =
506{
507#if defined(PSA_WANT_ALG_MD5)
508 {
509 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_MD5, "id-md5", "MD5"),
510 MBEDTLS_MD_MD5,
511 },
512#endif
513#if defined(PSA_WANT_ALG_SHA_1)
514 {
515 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA1, "id-sha1", "SHA-1"),
516 MBEDTLS_MD_SHA1,
517 },
518#endif
519#if defined(PSA_WANT_ALG_SHA_224)
520 {
521 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA224, "id-sha224", "SHA-224"),
522 MBEDTLS_MD_SHA224,
523 },
524#endif
525#if defined(PSA_WANT_ALG_SHA_256)
526 {
527 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA256, "id-sha256", "SHA-256"),
528 MBEDTLS_MD_SHA256,
529 },
530#endif
531#if defined(PSA_WANT_ALG_SHA_384)
532 {
533 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA384, "id-sha384", "SHA-384"),
534 MBEDTLS_MD_SHA384,
535 },
536#endif
537#if defined(PSA_WANT_ALG_SHA_512)
538 {
539 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA512, "id-sha512", "SHA-512"),
540 MBEDTLS_MD_SHA512,
541 },
542#endif
543#if defined(PSA_WANT_ALG_RIPEMD160)
544 {
545 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_RIPEMD160, "id-ripemd160", "RIPEMD-160"),
546 MBEDTLS_MD_RIPEMD160,
547 },
548#endif
549#if defined(PSA_WANT_ALG_SHA3_224)
550 {
551 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_224, "id-sha3-224", "SHA-3-224"),
552 MBEDTLS_MD_SHA3_224,
553 },
554#endif
555#if defined(PSA_WANT_ALG_SHA3_256)
556 {
557 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_256, "id-sha3-256", "SHA-3-256"),
558 MBEDTLS_MD_SHA3_256,
559 },
560#endif
561#if defined(PSA_WANT_ALG_SHA3_384)
562 {
563 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_384, "id-sha3-384", "SHA-3-384"),
564 MBEDTLS_MD_SHA3_384,
565 },
566#endif
567#if defined(PSA_WANT_ALG_SHA3_512)
568 {
569 OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_512, "id-sha3-512", "SHA-3-512"),
570 MBEDTLS_MD_SHA3_512,
571 },
572#endif
573 {
574 NULL_OID_DESCRIPTOR,
575 MBEDTLS_MD_NONE,
576 },
577};
578
579FN_OID_TYPED_FROM_ASN1(oid_md_alg_t, md_alg, oid_md_alg)
Gilles Peskine86e45ba2025-05-07 20:33:39 +0200580FN_OID_GET_ATTR1(mbedtls_x509_oid_get_md_alg, oid_md_alg_t, md_alg, mbedtls_md_type_t, md_alg)
581FN_OID_GET_OID_BY_ATTR1(mbedtls_x509_oid_get_oid_by_md,
Gilles Peskine47c85792025-05-07 14:35:04 +0200582 oid_md_alg_t,
583 oid_md_alg,
584 mbedtls_md_type_t,
585 md_alg)
586
Gilles Peskine47c85792025-05-07 14:35:04 +0200587#endif /* MBEDTLS_OID_C */