blob: 32b0340c73839f89062d5c977d79b6c7f48cfb4e [file] [log] [blame]
Paul Bakkerc70b9822013-04-07 22:00:46 +02001/**
2 * \file oid.h
3 *
4 * \brief Object Identifier (OID) database
5 *
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +02006 * Copyright (C) 2006-2014, Brainspark B.V.
Paul Bakkerc70b9822013-04-07 22:00:46 +02007 *
8 * This file is part of PolarSSL (http://www.polarssl.org)
9 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
10 *
11 * All rights reserved.
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with this program; if not, write to the Free Software Foundation, Inc.,
25 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
26 */
27#ifndef POLARSSL_OID_H
28#define POLARSSL_OID_H
29
30#include <string.h>
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020031#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker47fce022013-06-28 17:34:34 +020032#include "config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020033#else
34#include POLARSSL_CONFIG_FILE
35#endif
Paul Bakkerc70b9822013-04-07 22:00:46 +020036#include "asn1.h"
Paul Bakkered27a042013-04-18 22:46:23 +020037#include "pk.h"
Paul Bakker47fce022013-06-28 17:34:34 +020038#if defined(POLARSSL_CIPHER_C)
39#include "cipher.h"
40#endif
41
42#if defined(POLARSSL_MD_C)
43#include "md.h"
44#endif
45
Paul Bakker7c6b2c32013-09-16 13:49:26 +020046#if defined(POLARSSL_X509_USE_C) || defined(POLARSSL_X509_CREATE_C)
Paul Bakkerc70b9822013-04-07 22:00:46 +020047#include "x509.h"
Paul Bakker47fce022013-06-28 17:34:34 +020048#endif
Paul Bakkerc70b9822013-04-07 22:00:46 +020049
50#define POLARSSL_ERR_OID_NOT_FOUND -0x002E /**< OID is not found. */
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +010051#define POLARSSL_ERR_OID_BUF_TOO_SMALL -0x000B /**< output buffer is too small */
Paul Bakkerc70b9822013-04-07 22:00:46 +020052
53/*
54 * Top level OID tuples
55 */
56#define OID_ISO_MEMBER_BODIES "\x2a" /* {iso(1) member-body(2)} */
57#define OID_ISO_IDENTIFIED_ORG "\x2b" /* {iso(1) identified-organization(3)} */
58#define OID_ISO_CCITT_DS "\x55" /* {joint-iso-ccitt(2) ds(5)} */
59#define OID_ISO_ITU_COUNTRY "\x60" /* {joint-iso-itu-t(2) country(16)} */
60
61/*
62 * ISO Member bodies OID parts
63 */
64#define OID_COUNTRY_US "\x86\x48" /* {us(840)} */
65#define OID_ORG_RSA_DATA_SECURITY "\x86\xf7\x0d" /* {rsadsi(113549)} */
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +020066#define OID_RSA_COMPANY OID_ISO_MEMBER_BODIES OID_COUNTRY_US \
Paul Bakkerc70b9822013-04-07 22:00:46 +020067 OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +020068#define OID_ORG_ANSI_X9_62 "\xce\x3d" /* ansi-X9-62(10045) */
69#define OID_ANSI_X9_62 OID_ISO_MEMBER_BODIES OID_COUNTRY_US \
70 OID_ORG_ANSI_X9_62
Paul Bakkerc70b9822013-04-07 22:00:46 +020071
72/*
73 * ISO Identified organization OID parts
74 */
75#define OID_ORG_DOD "\x06" /* {dod(6)} */
Paul Bakker9b5e8852013-06-28 16:12:50 +020076#define OID_ORG_OIW "\x0e"
77#define OID_OIW_SECSIG OID_ORG_OIW "\x03"
78#define OID_OIW_SECSIG_ALG OID_OIW_SECSIG "\x02"
79#define OID_OIW_SECSIG_SHA1 OID_OIW_SECSIG_ALG "\x1a"
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +020080#define OID_ORG_CERTICOM "\x81\x04" /* certicom(132) */
81#define OID_CERTICOM OID_ISO_IDENTIFIED_ORG OID_ORG_CERTICOM
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +020082#define OID_ORG_TELETRUST "\x24" /* teletrust(36) */
83#define OID_TELETRUST OID_ISO_IDENTIFIED_ORG OID_ORG_TELETRUST
Paul Bakkerc70b9822013-04-07 22:00:46 +020084
85/*
86 * ISO ITU OID parts
87 */
88#define OID_ORGANIZATION "\x01" /* {organization(1)} */
89#define OID_ISO_ITU_US_ORG OID_ISO_ITU_COUNTRY OID_COUNTRY_US OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */
90
91#define OID_ORG_GOV "\x65" /* {gov(101)} */
92#define OID_GOV OID_ISO_ITU_US_ORG OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */
93
94#define OID_ORG_NETSCAPE "\x86\xF8\x42" /* {netscape(113730)} */
95#define OID_NETSCAPE OID_ISO_ITU_US_ORG OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */
96
97/* ISO arc for standard certificate and CRL extensions */
98#define OID_ID_CE OID_ISO_CCITT_DS "\x1D" /**< id-ce OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 29} */
99
100/**
101 * Private Internet Extensions
102 * { iso(1) identified-organization(3) dod(6) internet(1)
103 * security(5) mechanisms(5) pkix(7) }
104 */
105#define OID_PKIX OID_ISO_IDENTIFIED_ORG OID_ORG_DOD "\x01\x05\x05\x07"
106
107/*
108 * Arc for standard naming attributes
109 */
110#define OID_AT OID_ISO_CCITT_DS "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */
111#define OID_AT_CN OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */
Paul Bakker63844402014-04-30 15:34:12 +0200112#define OID_AT_SUR_NAME OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */
Paul Bakker7b0be682013-10-29 14:24:37 +0100113#define OID_AT_SERIAL_NUMBER OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200114#define OID_AT_COUNTRY OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */
115#define OID_AT_LOCALITY OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */
116#define OID_AT_STATE OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */
117#define OID_AT_ORGANIZATION OID_AT "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */
118#define OID_AT_ORG_UNIT OID_AT "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */
Paul Bakker63844402014-04-30 15:34:12 +0200119#define OID_AT_TITLE OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */
Paul Bakker7b0be682013-10-29 14:24:37 +0100120#define OID_AT_POSTAL_ADDRESS OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */
121#define OID_AT_POSTAL_CODE OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */
Paul Bakker63844402014-04-30 15:34:12 +0200122#define OID_AT_GIVEN_NAME OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
123#define OID_AT_INITIALS OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
124#define OID_AT_GENERATION_QUALIFIER OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
125#define OID_AT_DN_QUALIFIER OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
126#define OID_AT_PSEUDONYM OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
127
128#define OID_DOMAIN_COMPONENT "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200129
130/*
131 * OIDs for standard certificate extensions
132 */
133#define OID_AUTHORITY_KEY_IDENTIFIER OID_ID_CE "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 } */
134#define OID_SUBJECT_KEY_IDENTIFIER OID_ID_CE "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 14 } */
135#define OID_KEY_USAGE OID_ID_CE "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } */
136#define OID_CERTIFICATE_POLICIES OID_ID_CE "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-ce 32 } */
137#define OID_POLICY_MAPPINGS OID_ID_CE "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::= { id-ce 33 } */
138#define OID_SUBJECT_ALT_NAME OID_ID_CE "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 } */
139#define OID_ISSUER_ALT_NAME OID_ID_CE "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::= { id-ce 18 } */
140#define OID_SUBJECT_DIRECTORY_ATTRS OID_ID_CE "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::= { id-ce 9 } */
141#define OID_BASIC_CONSTRAINTS OID_ID_CE "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 } */
142#define OID_NAME_CONSTRAINTS OID_ID_CE "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::= { id-ce 30 } */
143#define OID_POLICY_CONSTRAINTS OID_ID_CE "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::= { id-ce 36 } */
144#define OID_EXTENDED_KEY_USAGE OID_ID_CE "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */
145#define OID_CRL_DISTRIBUTION_POINTS OID_ID_CE "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::= { id-ce 31 } */
146#define OID_INIHIBIT_ANYPOLICY OID_ID_CE "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::= { id-ce 54 } */
147#define OID_FRESHEST_CRL OID_ID_CE "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::= { id-ce 46 } */
148
149/*
150 * Netscape certificate extensions
151 */
152#define OID_NS_CERT OID_NETSCAPE "\x01"
153#define OID_NS_CERT_TYPE OID_NS_CERT "\x01"
154#define OID_NS_BASE_URL OID_NS_CERT "\x02"
155#define OID_NS_REVOCATION_URL OID_NS_CERT "\x03"
156#define OID_NS_CA_REVOCATION_URL OID_NS_CERT "\x04"
157#define OID_NS_RENEWAL_URL OID_NS_CERT "\x07"
158#define OID_NS_CA_POLICY_URL OID_NS_CERT "\x08"
159#define OID_NS_SSL_SERVER_NAME OID_NS_CERT "\x0C"
160#define OID_NS_COMMENT OID_NS_CERT "\x0D"
161#define OID_NS_DATA_TYPE OID_NETSCAPE "\x02"
162#define OID_NS_CERT_SEQUENCE OID_NS_DATA_TYPE "\x05"
163
164/*
165 * OIDs for CRL extensions
166 */
167#define OID_PRIVATE_KEY_USAGE_PERIOD OID_ID_CE "\x10"
168#define OID_CRL_NUMBER OID_ID_CE "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */
169
170/*
171 * X.509 v3 Extended key usage OIDs
172 */
173#define OID_ANY_EXTENDED_KEY_USAGE OID_EXTENDED_KEY_USAGE "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */
174
175#define OID_KP OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */
176#define OID_SERVER_AUTH OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */
177#define OID_CLIENT_AUTH OID_KP "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */
178#define OID_CODE_SIGNING OID_KP "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */
179#define OID_EMAIL_PROTECTION OID_KP "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */
180#define OID_TIME_STAMPING OID_KP "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */
181#define OID_OCSP_SIGNING OID_KP "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */
182
Paul Bakker9b5e8852013-06-28 16:12:50 +0200183/*
184 * PKCS definition OIDs
185 */
186
Paul Bakkerc70b9822013-04-07 22:00:46 +0200187#define OID_PKCS OID_RSA_COMPANY "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */
188#define OID_PKCS1 OID_PKCS "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200189#define OID_PKCS5 OID_PKCS "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200190#define OID_PKCS9 OID_PKCS "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */
Paul Bakker7749a222013-06-28 17:28:20 +0200191#define OID_PKCS12 OID_PKCS "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200192
Paul Bakker9b5e8852013-06-28 16:12:50 +0200193/*
194 * PKCS#1 OIDs
195 */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200196#define OID_PKCS1_RSA OID_PKCS1 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */
197#define OID_PKCS1_MD2 OID_PKCS1 "\x02" /**< md2WithRSAEncryption ::= { pkcs-1 2 } */
198#define OID_PKCS1_MD4 OID_PKCS1 "\x03" /**< md4WithRSAEncryption ::= { pkcs-1 3 } */
199#define OID_PKCS1_MD5 OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */
200#define OID_PKCS1_SHA1 OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */
201#define OID_PKCS1_SHA224 OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */
202#define OID_PKCS1_SHA256 OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */
203#define OID_PKCS1_SHA384 OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */
204#define OID_PKCS1_SHA512 OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */
205
206#define OID_RSA_SHA_OBS "\x2B\x0E\x03\x02\x1D"
207
208#define OID_PKCS9_EMAIL OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */
209
Paul Bakker9b5e8852013-06-28 16:12:50 +0200210/*
211 * Digest algorithms
212 */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200213#define OID_DIGEST_ALG_MD2 OID_RSA_COMPANY "\x02\x02" /**< id-md2 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 2 } */
214#define OID_DIGEST_ALG_MD4 OID_RSA_COMPANY "\x02\x04" /**< id-md4 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 4 } */
215#define OID_DIGEST_ALG_MD5 OID_RSA_COMPANY "\x02\x05" /**< id-md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */
216#define OID_DIGEST_ALG_SHA1 OID_ISO_IDENTIFIED_ORG OID_OIW_SECSIG_SHA1 /**< id-sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */
217#define OID_DIGEST_ALG_SHA224 OID_GOV "\x03\x04\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */
218#define OID_DIGEST_ALG_SHA256 OID_GOV "\x03\x04\x02\x01" /**< id-sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */
219
220#define OID_DIGEST_ALG_SHA384 OID_GOV "\x03\x04\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */
221
222#define OID_DIGEST_ALG_SHA512 OID_GOV "\x03\x04\x02\x03" /**< id-sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */
223
Paul Bakker9b5e8852013-06-28 16:12:50 +0200224#define OID_HMAC_SHA1 OID_RSA_COMPANY "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */
225
226/*
227 * Encryption algorithms
228 */
229#define OID_DES_CBC OID_ISO_IDENTIFIED_ORG OID_OIW_SECSIG_ALG "\x07" /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */
230#define OID_DES_EDE3_CBC OID_RSA_COMPANY "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */
231
232/*
233 * PKCS#5 OIDs
234 */
235#define OID_PKCS5_PBKDF2 OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */
236#define OID_PKCS5_PBES2 OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */
237#define OID_PKCS5_PBMAC1 OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */
238
239/*
240 * PKCS#5 PBES1 algorithms
241 */
242#define OID_PKCS5_PBE_MD2_DES_CBC OID_PKCS5 "\x01" /**< pbeWithMD2AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 1} */
243#define OID_PKCS5_PBE_MD2_RC2_CBC OID_PKCS5 "\x04" /**< pbeWithMD2AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 4} */
244#define OID_PKCS5_PBE_MD5_DES_CBC OID_PKCS5 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */
245#define OID_PKCS5_PBE_MD5_RC2_CBC OID_PKCS5 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */
246#define OID_PKCS5_PBE_SHA1_DES_CBC OID_PKCS5 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */
247#define OID_PKCS5_PBE_SHA1_RC2_CBC OID_PKCS5 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */
248
Paul Bakker7749a222013-06-28 17:28:20 +0200249/*
Paul Bakkerfde42702013-08-25 14:47:27 +0200250 * PKCS#8 OIDs
251 */
252#define OID_PKCS9_CSR_EXT_REQ OID_PKCS9 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */
253
254/*
Paul Bakker7749a222013-06-28 17:28:20 +0200255 * PKCS#12 PBE OIDs
256 */
257#define OID_PKCS12_PBE OID_PKCS12 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */
258
259#define OID_PKCS12_PBE_SHA1_RC4_128 OID_PKCS12_PBE "\x01" /**< pbeWithSHAAnd128BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 1} */
260#define OID_PKCS12_PBE_SHA1_RC4_40 OID_PKCS12_PBE "\x02" /**< pbeWithSHAAnd40BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 2} */
261#define OID_PKCS12_PBE_SHA1_DES3_EDE_CBC OID_PKCS12_PBE "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */
262#define OID_PKCS12_PBE_SHA1_DES2_EDE_CBC OID_PKCS12_PBE "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */
263#define OID_PKCS12_PBE_SHA1_RC2_128_CBC OID_PKCS12_PBE "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */
264#define OID_PKCS12_PBE_SHA1_RC2_40_CBC OID_PKCS12_PBE "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */
265
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200266/*
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200267 * EC key algorithms from RFC 5480
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200268 */
269
270/* id-ecPublicKey OBJECT IDENTIFIER ::= {
271 * iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */
272#define OID_EC_ALG_UNRESTRICTED OID_ANSI_X9_62 "\x02\01"
273
274/* id-ecDH OBJECT IDENTIFIER ::= {
275 * iso(1) identified-organization(3) certicom(132)
276 * schemes(1) ecdh(12) } */
277#define OID_EC_ALG_ECDH OID_CERTICOM "\x01\x0c"
278
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200279/*
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100280 * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200281 */
282
283/* secp192r1 OBJECT IDENTIFIER ::= {
284 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */
285#define OID_EC_GRP_SECP192R1 OID_ANSI_X9_62 "\x03\x01\x01"
286
287/* secp224r1 OBJECT IDENTIFIER ::= {
288 * iso(1) identified-organization(3) certicom(132) curve(0) 33 } */
289#define OID_EC_GRP_SECP224R1 OID_CERTICOM "\x00\x21"
290
291/* secp256r1 OBJECT IDENTIFIER ::= {
292 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */
293#define OID_EC_GRP_SECP256R1 OID_ANSI_X9_62 "\x03\x01\x07"
294
295/* secp384r1 OBJECT IDENTIFIER ::= {
296 * iso(1) identified-organization(3) certicom(132) curve(0) 34 } */
297#define OID_EC_GRP_SECP384R1 OID_CERTICOM "\x00\x22"
298
299/* secp521r1 OBJECT IDENTIFIER ::= {
300 * iso(1) identified-organization(3) certicom(132) curve(0) 35 } */
301#define OID_EC_GRP_SECP521R1 OID_CERTICOM "\x00\x23"
302
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100303/* secp192k1 OBJECT IDENTIFIER ::= {
304 * iso(1) identified-organization(3) certicom(132) curve(0) 31 } */
305#define OID_EC_GRP_SECP192K1 OID_CERTICOM "\x00\x1f"
306
307/* secp224k1 OBJECT IDENTIFIER ::= {
308 * iso(1) identified-organization(3) certicom(132) curve(0) 32 } */
309#define OID_EC_GRP_SECP224K1 OID_CERTICOM "\x00\x20"
310
311/* secp256k1 OBJECT IDENTIFIER ::= {
312 * iso(1) identified-organization(3) certicom(132) curve(0) 10 } */
313#define OID_EC_GRP_SECP256K1 OID_CERTICOM "\x00\x0a"
314
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200315/* RFC 5639 4.1
316 * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1)
317 * identified-organization(3) teletrust(36) algorithm(3) signature-
318 * algorithm(3) ecSign(2) 8}
319 * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1}
320 * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */
321#define OID_EC_BRAINPOOL_V1 OID_TELETRUST "\x03\x03\x02\x08\x01\x01"
322
323/* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */
324#define OID_EC_GRP_BP256R1 OID_EC_BRAINPOOL_V1 "\x07"
325
326/* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */
327#define OID_EC_GRP_BP384R1 OID_EC_BRAINPOOL_V1 "\x0B"
328
329/* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */
330#define OID_EC_GRP_BP512R1 OID_EC_BRAINPOOL_V1 "\x0D"
331
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200332/*
Manuel Pégourié-Gonnardeab20d22014-03-14 17:58:42 +0100333 * SEC1 C.1
334 *
335 * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
336 * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)}
337 */
338#define OID_ANSI_X9_62_FIELD_TYPE OID_ANSI_X9_62 "\x01"
339#define OID_ANSI_X9_62_PRIME_FIELD OID_ANSI_X9_62_FIELD_TYPE "\x01"
340
341/*
Paul Bakker75342a62014-04-08 17:35:40 +0200342 * ECDSA signature identifiers, from RFC 5480
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200343 */
344#define OID_ANSI_X9_62_SIG OID_ANSI_X9_62 "\x04" /* signatures(4) */
345#define OID_ANSI_X9_62_SIG_SHA2 OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
346
347/* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= {
348 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */
349#define OID_ECDSA_SHA1 OID_ANSI_X9_62_SIG "\x01"
350
351/* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= {
352 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
353 * ecdsa-with-SHA2(3) 1 } */
354#define OID_ECDSA_SHA224 OID_ANSI_X9_62_SIG_SHA2 "\x01"
355
356/* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= {
357 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
358 * ecdsa-with-SHA2(3) 2 } */
359#define OID_ECDSA_SHA256 OID_ANSI_X9_62_SIG_SHA2 "\x02"
360
361/* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= {
362 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
363 * ecdsa-with-SHA2(3) 3 } */
364#define OID_ECDSA_SHA384 OID_ANSI_X9_62_SIG_SHA2 "\x03"
365
366/* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= {
367 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
368 * ecdsa-with-SHA2(3) 4 } */
369#define OID_ECDSA_SHA512 OID_ANSI_X9_62_SIG_SHA2 "\x04"
370
Paul Bakkerc70b9822013-04-07 22:00:46 +0200371#ifdef __cplusplus
372extern "C" {
373#endif
374
375/**
376 * \brief Base OID descriptor structure
377 */
378typedef struct {
379 const char *asn1; /*!< OID ASN.1 representation */
Manuel Pégourié-Gonnard298aae42013-08-15 14:22:17 +0200380 size_t asn1_len; /*!< length of asn1 */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200381 const char *name; /*!< official name (e.g. from RFC) */
382 const char *description; /*!< human friendly description */
383} oid_descriptor_t;
384
385/**
386 * \brief Translate an ASN.1 OID into its numeric representation
387 * (e.g. "\x2A\x86\x48\x86\xF7\x0D" into "1.2.840.113549")
388 *
389 * \param buf buffer to put representation in
390 * \param size size of the buffer
391 * \param oid OID to translate
392 *
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100393 * \return Length of the string written (excluding final NULL) or
394 * POLARSSL_ERR_OID_BUF_TO_SMALL in case of error
Paul Bakkerc70b9822013-04-07 22:00:46 +0200395 */
396int oid_get_numeric_string( char *buf, size_t size, const asn1_buf *oid );
397
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200398#if defined(POLARSSL_X509_USE_C) || defined(POLARSSL_X509_CREATE_C)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200399/**
400 * \brief Translate an X.509 extension OID into local values
401 *
402 * \param oid OID to use
403 * \param ext_type place to store the extension type
404 *
405 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
406 */
407int oid_get_x509_ext_type( const asn1_buf *oid, int *ext_type );
Paul Bakkered27a042013-04-18 22:46:23 +0200408#endif
Paul Bakkerc70b9822013-04-07 22:00:46 +0200409
410/**
411 * \brief Translate an X.509 attribute type OID into the short name
412 * (e.g. the OID for an X520 Common Name into "CN")
413 *
414 * \param oid OID to use
415 * \param short_name place to store the string pointer
416 *
417 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
418 */
419int oid_get_attr_short_name( const asn1_buf *oid, const char **short_name );
420
421/**
422 * \brief Translate PublicKeyAlgorithm OID into pk_type
423 *
424 * \param oid OID to use
425 * \param pk_alg place to store public key algorithm
426 *
427 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
428 */
429int oid_get_pk_alg( const asn1_buf *oid, pk_type_t *pk_alg );
430
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200431/**
432 * \brief Translate pk_type into PublicKeyAlgorithm OID
433 *
434 * \param pk_alg Public key type to look for
435 * \param oid place to store ASN.1 OID string pointer
436 * \param olen length of the OID
437 *
438 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
439 */
440int oid_get_oid_by_pk_alg( pk_type_t pk_alg,
441 const char **oid, size_t *olen );
442
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200443#if defined(POLARSSL_ECP_C)
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200444/**
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200445 * \brief Translate NamedCurve OID into an EC group identifier
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200446 *
447 * \param oid OID to use
448 * \param grp_id place to store group id
449 *
450 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
451 */
452int oid_get_ec_grp( const asn1_buf *oid, ecp_group_id *grp_id );
453
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200454/**
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200455 * \brief Translate EC group identifier into NamedCurve OID
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200456 *
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200457 * \param grp_id EC group identifier
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200458 * \param oid place to store ASN.1 OID string pointer
459 * \param olen length of the OID
460 *
461 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
462 */
463int oid_get_oid_by_ec_grp( ecp_group_id grp_id,
464 const char **oid, size_t *olen );
465#endif /* POLARSSL_ECP_C */
466
Paul Bakker47fce022013-06-28 17:34:34 +0200467#if defined(POLARSSL_MD_C)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200468/**
469 * \brief Translate SignatureAlgorithm OID into md_type and pk_type
470 *
471 * \param oid OID to use
472 * \param md_alg place to store message digest algorithm
473 * \param pk_alg place to store public key algorithm
474 *
475 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
476 */
477int oid_get_sig_alg( const asn1_buf *oid,
478 md_type_t *md_alg, pk_type_t *pk_alg );
479
480/**
481 * \brief Translate SignatureAlgorithm OID into description
482 *
483 * \param oid OID to use
484 * \param desc place to store string pointer
485 *
486 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
487 */
488int oid_get_sig_alg_desc( const asn1_buf *oid, const char **desc );
489
490/**
491 * \brief Translate md_type and pk_type into SignatureAlgorithm OID
492 *
493 * \param md_alg message digest algorithm
494 * \param pk_alg public key algorithm
495 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200496 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200497 *
498 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
499 */
500int oid_get_oid_by_sig_alg( pk_type_t pk_alg, md_type_t md_alg,
Paul Bakker1c3853b2013-09-10 11:43:44 +0200501 const char **oid, size_t *olen );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200502
503/**
504 * \brief Translate hash algorithm OID into md_type
505 *
506 * \param oid OID to use
507 * \param md_alg place to store message digest algorithm
508 *
509 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
510 */
511int oid_get_md_alg( const asn1_buf *oid, md_type_t *md_alg );
Paul Bakker47fce022013-06-28 17:34:34 +0200512#endif /* POLARSSL_MD_C */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200513
514/**
515 * \brief Translate Extended Key Usage OID into description
516 *
517 * \param oid OID to use
518 * \param desc place to store string pointer
519 *
520 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
521 */
522int oid_get_extended_key_usage( const asn1_buf *oid, const char **desc );
523
524/**
525 * \brief Translate md_type into hash algorithm OID
526 *
527 * \param md_alg message digest algorithm
528 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200529 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200530 *
531 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
532 */
Paul Bakker1c3853b2013-09-10 11:43:44 +0200533int oid_get_oid_by_md( md_type_t md_alg, const char **oid, size_t *olen );
Paul Bakkerc70b9822013-04-07 22:00:46 +0200534
Paul Bakker47fce022013-06-28 17:34:34 +0200535#if defined(POLARSSL_CIPHER_C)
Paul Bakker9b5e8852013-06-28 16:12:50 +0200536/**
537 * \brief Translate encryption algorithm OID into cipher_type
538 *
539 * \param oid OID to use
540 * \param cipher_alg place to store cipher algorithm
541 *
542 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
543 */
544int oid_get_cipher_alg( const asn1_buf *oid, cipher_type_t *cipher_alg );
Paul Bakker47fce022013-06-28 17:34:34 +0200545#endif /* POLARSSL_CIPHER_C */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200546
Paul Bakker7749a222013-06-28 17:28:20 +0200547#if defined(POLARSSL_PKCS12_C)
548/**
549 * \brief Translate PKCS#12 PBE algorithm OID into md_type and
550 * cipher_type
551 *
552 * \param oid OID to use
553 * \param md_alg place to store message digest algorithm
554 * \param cipher_alg place to store cipher algorithm
555 *
556 * \return 0 if successful, or POLARSSL_ERR_OID_NOT_FOUND
557 */
558int oid_get_pkcs12_pbe_alg( const asn1_buf *oid, md_type_t *md_alg,
559 cipher_type_t *cipher_alg );
560#endif /* POLARSSL_PKCS12_C */
561
Paul Bakkerc70b9822013-04-07 22:00:46 +0200562#ifdef __cplusplus
563}
564#endif
565
566#endif /* oid.h */