blob: df4b44a91efce602e695f94223fcc1a24d085ed8 [file] [log] [blame]
Paul Bakkerc70b9822013-04-07 22:00:46 +02001/**
2 * \file oid.h
3 *
4 * \brief Object Identifier (OID) database
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakkerc70b9822013-04-07 22:00:46 +020021 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#ifndef MBEDTLS_OID_H
23#define MBEDTLS_OID_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020024#include "mbedtls/private_access.h"
Paul Bakkerc70b9822013-04-07 22:00:46 +020025
Bence Szépkútic662b362021-05-27 11:25:03 +020026#include "mbedtls/build_info.h"
Rich Evans00ab4702015-02-06 13:43:58 +000027
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010028#include "mbedtls/asn1.h"
29#include "mbedtls/pk.h"
Rich Evans00ab4702015-02-06 13:43:58 +000030
31#include <stddef.h>
32
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020033#if defined(MBEDTLS_CIPHER_C)
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020034# include "mbedtls/cipher.h"
Paul Bakker47fce022013-06-28 17:34:34 +020035#endif
36
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020037#if defined(MBEDTLS_MD_C)
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020038# include "mbedtls/md.h"
Paul Bakker47fce022013-06-28 17:34:34 +020039#endif
40
Gilles Peskined2971572021-07-26 18:48:10 +020041/** OID is not found. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020042#define MBEDTLS_ERR_OID_NOT_FOUND -0x002E
Gilles Peskined2971572021-07-26 18:48:10 +020043/** output buffer is too small */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020044#define MBEDTLS_ERR_OID_BUF_TOO_SMALL -0x000B
Paul Bakkerc70b9822013-04-07 22:00:46 +020045
Manuel Pégourié-Gonnardc49ada42019-01-28 09:20:59 +010046/* This is for the benefit of X.509, but defined here in order to avoid
47 * having a "backwards" include of x.509.h here */
48/*
49 * X.509 extension types (internal, arbitrary values for bitsets)
50 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020051#define MBEDTLS_OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER (1 << 0)
52#define MBEDTLS_OID_X509_EXT_SUBJECT_KEY_IDENTIFIER (1 << 1)
53#define MBEDTLS_OID_X509_EXT_KEY_USAGE (1 << 2)
54#define MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES (1 << 3)
55#define MBEDTLS_OID_X509_EXT_POLICY_MAPPINGS (1 << 4)
56#define MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME (1 << 5)
57#define MBEDTLS_OID_X509_EXT_ISSUER_ALT_NAME (1 << 6)
58#define MBEDTLS_OID_X509_EXT_SUBJECT_DIRECTORY_ATTRS (1 << 7)
59#define MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS (1 << 8)
60#define MBEDTLS_OID_X509_EXT_NAME_CONSTRAINTS (1 << 9)
61#define MBEDTLS_OID_X509_EXT_POLICY_CONSTRAINTS (1 << 10)
62#define MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE (1 << 11)
63#define MBEDTLS_OID_X509_EXT_CRL_DISTRIBUTION_POINTS (1 << 12)
64#define MBEDTLS_OID_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13)
65#define MBEDTLS_OID_X509_EXT_FRESHEST_CRL (1 << 14)
66#define MBEDTLS_OID_X509_EXT_NS_CERT_TYPE (1 << 16)
Manuel Pégourié-Gonnardc49ada42019-01-28 09:20:59 +010067
Paul Bakkerc70b9822013-04-07 22:00:46 +020068/*
69 * Top level OID tuples
70 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020071#define MBEDTLS_OID_ISO_MEMBER_BODIES "\x2a" /* {iso(1) member-body(2)} */
72#define MBEDTLS_OID_ISO_IDENTIFIED_ORG \
73 "\x2b" /* {iso(1) identified-organization(3)} */
74#define MBEDTLS_OID_ISO_CCITT_DS "\x55" /* {joint-iso-ccitt(2) ds(5)} */
75#define MBEDTLS_OID_ISO_ITU_COUNTRY \
76 "\x60" /* {joint-iso-itu-t(2) country(16)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +020077
78/*
79 * ISO Member bodies OID parts
80 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020081#define MBEDTLS_OID_COUNTRY_US "\x86\x48" /* {us(840)} */
82#define MBEDTLS_OID_ORG_RSA_DATA_SECURITY "\x86\xf7\x0d" /* {rsadsi(113549)} */
83#define MBEDTLS_OID_RSA_COMPANY \
84 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
85 MBEDTLS_OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */
86#define MBEDTLS_OID_ORG_ANSI_X9_62 "\xce\x3d" /* ansi-X9-62(10045) */
87#define MBEDTLS_OID_ANSI_X9_62 \
88 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
89 MBEDTLS_OID_ORG_ANSI_X9_62
Paul Bakkerc70b9822013-04-07 22:00:46 +020090
91/*
92 * ISO Identified organization OID parts
93 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020094#define MBEDTLS_OID_ORG_DOD "\x06" /* {dod(6)} */
95#define MBEDTLS_OID_ORG_OIW "\x0e"
96#define MBEDTLS_OID_OIW_SECSIG MBEDTLS_OID_ORG_OIW "\x03"
97#define MBEDTLS_OID_OIW_SECSIG_ALG MBEDTLS_OID_OIW_SECSIG "\x02"
98#define MBEDTLS_OID_OIW_SECSIG_SHA1 MBEDTLS_OID_OIW_SECSIG_ALG "\x1a"
99#define MBEDTLS_OID_ORG_CERTICOM "\x81\x04" /* certicom(132) */
100#define MBEDTLS_OID_CERTICOM \
101 MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_CERTICOM
102#define MBEDTLS_OID_ORG_TELETRUST "\x24" /* teletrust(36) */
103#define MBEDTLS_OID_TELETRUST \
104 MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_TELETRUST
Paul Bakkerc70b9822013-04-07 22:00:46 +0200105
106/*
107 * ISO ITU OID parts
108 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200109#define MBEDTLS_OID_ORGANIZATION "\x01" /* {organization(1)} */
110#define MBEDTLS_OID_ISO_ITU_US_ORG \
111 MBEDTLS_OID_ISO_ITU_COUNTRY MBEDTLS_OID_COUNTRY_US \
112 MBEDTLS_OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200113
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200114#define MBEDTLS_OID_ORG_GOV "\x65" /* {gov(101)} */
115#define MBEDTLS_OID_GOV \
116 MBEDTLS_OID_ISO_ITU_US_ORG \
117 MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200118
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200119#define MBEDTLS_OID_ORG_NETSCAPE "\x86\xF8\x42" /* {netscape(113730)} */
120#define MBEDTLS_OID_NETSCAPE \
121 MBEDTLS_OID_ISO_ITU_US_ORG \
122 MBEDTLS_OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200123
124/* ISO arc for standard certificate and CRL extensions */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200125#define MBEDTLS_OID_ID_CE \
126 MBEDTLS_OID_ISO_CCITT_DS \
127 "\x1D" /**< id-ce OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 29} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200128
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200129#define MBEDTLS_OID_NIST_ALG \
130 MBEDTLS_OID_GOV "\x03\x04" /** { joint-iso-itu-t(2) country(16) us(840) \
131 organization(1) gov(101) csor(3) \
132 nistAlgorithm(4) */
Ron Eldor488fd082018-07-15 09:38:39 +0300133
Paul Bakkerc70b9822013-04-07 22:00:46 +0200134/**
135 * Private Internet Extensions
136 * { iso(1) identified-organization(3) dod(6) internet(1)
137 * security(5) mechanisms(5) pkix(7) }
138 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200139#define MBEDTLS_OID_INTERNET \
140 MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_DOD "\x01"
141#define MBEDTLS_OID_PKIX MBEDTLS_OID_INTERNET "\x05\x05\x07"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200142
143/*
144 * Arc for standard naming attributes
145 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200146#define MBEDTLS_OID_AT \
147 MBEDTLS_OID_ISO_CCITT_DS \
148 "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */
149#define MBEDTLS_OID_AT_CN \
150 MBEDTLS_OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */
151#define MBEDTLS_OID_AT_SUR_NAME \
152 MBEDTLS_OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */
153#define MBEDTLS_OID_AT_SERIAL_NUMBER \
154 MBEDTLS_OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */
155#define MBEDTLS_OID_AT_COUNTRY \
156 MBEDTLS_OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */
157#define MBEDTLS_OID_AT_LOCALITY \
158 MBEDTLS_OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */
159#define MBEDTLS_OID_AT_STATE \
160 MBEDTLS_OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */
161#define MBEDTLS_OID_AT_ORGANIZATION \
162 MBEDTLS_OID_AT \
163 "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */
164#define MBEDTLS_OID_AT_ORG_UNIT \
165 MBEDTLS_OID_AT \
166 "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */
167#define MBEDTLS_OID_AT_TITLE \
168 MBEDTLS_OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */
169#define MBEDTLS_OID_AT_POSTAL_ADDRESS \
170 MBEDTLS_OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */
171#define MBEDTLS_OID_AT_POSTAL_CODE \
172 MBEDTLS_OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */
173#define MBEDTLS_OID_AT_GIVEN_NAME \
174 MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
175#define MBEDTLS_OID_AT_INITIALS \
176 MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
177#define MBEDTLS_OID_AT_GENERATION_QUALIFIER \
178 MBEDTLS_OID_AT \
179 "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
180#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER \
181 MBEDTLS_OID_AT \
182 "\x2D" /**< id-at-uniqueIdentifier AttributType:= {id-at 45} */
183#define MBEDTLS_OID_AT_DN_QUALIFIER \
184 MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
185#define MBEDTLS_OID_AT_PSEUDONYM \
186 MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
Paul Bakker63844402014-04-30 15:34:12 +0200187
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200188#define MBEDTLS_OID_UID \
189 "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x01" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) uid(1)} */
190#define MBEDTLS_OID_DOMAIN_COMPONENT \
191 "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200192
193/*
194 * OIDs for standard certificate extensions
195 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200196#define MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER \
197 MBEDTLS_OID_ID_CE \
198 "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 } */
199#define MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER \
200 MBEDTLS_OID_ID_CE \
201 "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 14 } */
202#define MBEDTLS_OID_KEY_USAGE \
203 MBEDTLS_OID_ID_CE \
204 "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } */
205#define MBEDTLS_OID_CERTIFICATE_POLICIES \
206 MBEDTLS_OID_ID_CE \
207 "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-ce 32 } */
208#define MBEDTLS_OID_POLICY_MAPPINGS \
209 MBEDTLS_OID_ID_CE \
210 "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::= { id-ce 33 } */
211#define MBEDTLS_OID_SUBJECT_ALT_NAME \
212 MBEDTLS_OID_ID_CE \
213 "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 } */
214#define MBEDTLS_OID_ISSUER_ALT_NAME \
215 MBEDTLS_OID_ID_CE \
216 "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::= { id-ce 18 } */
217#define MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS \
218 MBEDTLS_OID_ID_CE \
219 "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::= { id-ce 9 } */
220#define MBEDTLS_OID_BASIC_CONSTRAINTS \
221 MBEDTLS_OID_ID_CE \
222 "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 } */
223#define MBEDTLS_OID_NAME_CONSTRAINTS \
224 MBEDTLS_OID_ID_CE \
225 "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::= { id-ce 30 } */
226#define MBEDTLS_OID_POLICY_CONSTRAINTS \
227 MBEDTLS_OID_ID_CE \
228 "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::= { id-ce 36 } */
229#define MBEDTLS_OID_EXTENDED_KEY_USAGE \
230 MBEDTLS_OID_ID_CE \
231 "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */
232#define MBEDTLS_OID_CRL_DISTRIBUTION_POINTS \
233 MBEDTLS_OID_ID_CE \
234 "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::= { id-ce 31 } */
235#define MBEDTLS_OID_INIHIBIT_ANYPOLICY \
236 MBEDTLS_OID_ID_CE \
237 "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::= { id-ce 54 } */
238#define MBEDTLS_OID_FRESHEST_CRL \
239 MBEDTLS_OID_ID_CE \
240 "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::= { id-ce 46 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200241
242/*
Ron Eldor11ee0712019-03-25 18:22:52 +0200243 * Certificate policies
244 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200245#define MBEDTLS_OID_ANY_POLICY \
246 MBEDTLS_OID_CERTIFICATE_POLICIES \
247 "\x00" /**< anyPolicy OBJECT IDENTIFIER ::= { id-ce-certificatePolicies 0 } */
Ron Eldor11ee0712019-03-25 18:22:52 +0200248
249/*
Paul Bakkerc70b9822013-04-07 22:00:46 +0200250 * Netscape certificate extensions
251 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200252#define MBEDTLS_OID_NS_CERT MBEDTLS_OID_NETSCAPE "\x01"
253#define MBEDTLS_OID_NS_CERT_TYPE MBEDTLS_OID_NS_CERT "\x01"
254#define MBEDTLS_OID_NS_BASE_URL MBEDTLS_OID_NS_CERT "\x02"
255#define MBEDTLS_OID_NS_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x03"
256#define MBEDTLS_OID_NS_CA_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x04"
257#define MBEDTLS_OID_NS_RENEWAL_URL MBEDTLS_OID_NS_CERT "\x07"
258#define MBEDTLS_OID_NS_CA_POLICY_URL MBEDTLS_OID_NS_CERT "\x08"
259#define MBEDTLS_OID_NS_SSL_SERVER_NAME MBEDTLS_OID_NS_CERT "\x0C"
260#define MBEDTLS_OID_NS_COMMENT MBEDTLS_OID_NS_CERT "\x0D"
261#define MBEDTLS_OID_NS_DATA_TYPE MBEDTLS_OID_NETSCAPE "\x02"
262#define MBEDTLS_OID_NS_CERT_SEQUENCE MBEDTLS_OID_NS_DATA_TYPE "\x05"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200263
264/*
265 * OIDs for CRL extensions
266 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200267#define MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD MBEDTLS_OID_ID_CE "\x10"
268#define MBEDTLS_OID_CRL_NUMBER \
269 MBEDTLS_OID_ID_CE \
270 "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200271
272/*
273 * X.509 v3 Extended key usage OIDs
274 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200275#define MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE \
276 MBEDTLS_OID_EXTENDED_KEY_USAGE \
277 "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200278
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200279#define MBEDTLS_OID_KP \
280 MBEDTLS_OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */
281#define MBEDTLS_OID_SERVER_AUTH \
282 MBEDTLS_OID_KP \
283 "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */
284#define MBEDTLS_OID_CLIENT_AUTH \
285 MBEDTLS_OID_KP \
286 "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */
287#define MBEDTLS_OID_CODE_SIGNING \
288 MBEDTLS_OID_KP \
289 "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */
290#define MBEDTLS_OID_EMAIL_PROTECTION \
291 MBEDTLS_OID_KP \
292 "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */
293#define MBEDTLS_OID_TIME_STAMPING \
294 MBEDTLS_OID_KP \
295 "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */
296#define MBEDTLS_OID_OCSP_SIGNING \
297 MBEDTLS_OID_KP \
298 "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200299
Ron Eldorb6dc1052019-04-01 18:12:23 +0300300/**
301 * Wi-SUN Alliance Field Area Network
302 * { iso(1) identified-organization(3) dod(6) internet(1)
303 * private(4) enterprise(1) WiSUN(45605) FieldAreaNetwork(1) }
304 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200305#define MBEDTLS_OID_WISUN_FAN MBEDTLS_OID_INTERNET "\x04\x01\x82\xe4\x25\x01"
Ron Eldorb6dc1052019-04-01 18:12:23 +0300306
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200307#define MBEDTLS_OID_ON \
308 MBEDTLS_OID_PKIX "\x08" /**< id-on OBJECT IDENTIFIER ::= { id-pkix 8 } */
309#define MBEDTLS_OID_ON_HW_MODULE_NAME \
310 MBEDTLS_OID_ON \
311 "\x04" /**< id-on-hardwareModuleName OBJECT IDENTIFIER ::= { id-on 4 } */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200312
313/*
Paul Bakkerc70b9822013-04-07 22:00:46 +0200314 * PKCS definition OIDs
Paul Bakker9b5e8852013-06-28 16:12:50 +0200315 */
316
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200317#define MBEDTLS_OID_PKCS \
318 MBEDTLS_OID_RSA_COMPANY \
319 "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */
320#define MBEDTLS_OID_PKCS1 \
321 MBEDTLS_OID_PKCS \
322 "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */
323#define MBEDTLS_OID_PKCS5 \
324 MBEDTLS_OID_PKCS \
325 "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */
326#define MBEDTLS_OID_PKCS9 \
327 MBEDTLS_OID_PKCS \
328 "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */
329#define MBEDTLS_OID_PKCS12 \
330 MBEDTLS_OID_PKCS \
331 "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200332
Paul Bakker9b5e8852013-06-28 16:12:50 +0200333/*
334 * PKCS#1 OIDs
335 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200336#define MBEDTLS_OID_PKCS1_RSA \
337 MBEDTLS_OID_PKCS1 \
338 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */
339#define MBEDTLS_OID_PKCS1_MD5 \
340 MBEDTLS_OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */
341#define MBEDTLS_OID_PKCS1_SHA1 \
342 MBEDTLS_OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */
343#define MBEDTLS_OID_PKCS1_SHA224 \
344 MBEDTLS_OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */
345#define MBEDTLS_OID_PKCS1_SHA256 \
346 MBEDTLS_OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */
347#define MBEDTLS_OID_PKCS1_SHA384 \
348 MBEDTLS_OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */
349#define MBEDTLS_OID_PKCS1_SHA512 \
350 MBEDTLS_OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200351
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200352#define MBEDTLS_OID_RSA_SHA_OBS "\x2B\x0E\x03\x02\x1D"
Paul Bakkerc70b9822013-04-07 22:00:46 +0200353
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200354#define MBEDTLS_OID_PKCS9_EMAIL \
355 MBEDTLS_OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200356
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +0100357/* RFC 4055 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200358#define MBEDTLS_OID_RSASSA_PSS \
359 MBEDTLS_OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */
360#define MBEDTLS_OID_MGF1 \
361 MBEDTLS_OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */
Manuel Pégourié-Gonnard59a75d52014-01-22 10:12:57 +0100362
Paul Bakker9b5e8852013-06-28 16:12:50 +0200363/*
364 * Digest algorithms
365 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200366#define MBEDTLS_OID_DIGEST_ALG_MD5 \
367 MBEDTLS_OID_RSA_COMPANY \
368 "\x02\x05" /**< id-mbedtls_md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */
369#define MBEDTLS_OID_DIGEST_ALG_SHA1 \
370 MBEDTLS_OID_ISO_IDENTIFIED_ORG \
371 MBEDTLS_OID_OIW_SECSIG_SHA1 /**< id-mbedtls_sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */
372#define MBEDTLS_OID_DIGEST_ALG_SHA224 \
373 MBEDTLS_OID_NIST_ALG \
374 "\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */
375#define MBEDTLS_OID_DIGEST_ALG_SHA256 \
376 MBEDTLS_OID_NIST_ALG \
377 "\x02\x01" /**< id-mbedtls_sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200378
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200379#define MBEDTLS_OID_DIGEST_ALG_SHA384 \
380 MBEDTLS_OID_NIST_ALG \
381 "\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200382
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200383#define MBEDTLS_OID_DIGEST_ALG_SHA512 \
384 MBEDTLS_OID_NIST_ALG \
385 "\x02\x03" /**< id-mbedtls_sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200386
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200387#define MBEDTLS_OID_DIGEST_ALG_RIPEMD160 \
388 MBEDTLS_OID_TELETRUST \
389 "\x03\x02\x01" /**< id-ripemd160 OBJECT IDENTIFIER :: { iso(1) identified-organization(3) teletrust(36) algorithm(3) hashAlgorithm(2) ripemd160(1) } */
Jack Lloyd5d9c9632019-05-01 13:43:53 -0400390
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200391#define MBEDTLS_OID_HMAC_SHA1 \
392 MBEDTLS_OID_RSA_COMPANY \
393 "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200394
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200395#define MBEDTLS_OID_HMAC_SHA224 \
396 MBEDTLS_OID_RSA_COMPANY \
397 "\x02\x08" /**< id-hmacWithSHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 8 } */
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800398
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200399#define MBEDTLS_OID_HMAC_SHA256 \
400 MBEDTLS_OID_RSA_COMPANY \
401 "\x02\x09" /**< id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 9 } */
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800402
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200403#define MBEDTLS_OID_HMAC_SHA384 \
404 MBEDTLS_OID_RSA_COMPANY \
405 "\x02\x0A" /**< id-hmacWithSHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 10 } */
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800406
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200407#define MBEDTLS_OID_HMAC_SHA512 \
408 MBEDTLS_OID_RSA_COMPANY \
409 "\x02\x0B" /**< id-hmacWithSHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 11 } */
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800410
Paul Bakker9b5e8852013-06-28 16:12:50 +0200411/*
412 * Encryption algorithms
413 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200414#define MBEDTLS_OID_DES_CBC \
415 MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_OIW_SECSIG_ALG \
416 "\x07" /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */
417#define MBEDTLS_OID_DES_EDE3_CBC \
418 MBEDTLS_OID_RSA_COMPANY \
419 "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */
420#define MBEDTLS_OID_AES \
421 MBEDTLS_OID_NIST_ALG \
422 "\x01" /** aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 1 } */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200423
424/*
Ron Eldor488fd082018-07-15 09:38:39 +0300425 * Key Wrapping algorithms
426 */
427/*
428 * RFC 5649
429 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200430#define MBEDTLS_OID_AES128_KW \
431 MBEDTLS_OID_AES \
432 "\x05" /** id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 } */
433#define MBEDTLS_OID_AES128_KWP \
434 MBEDTLS_OID_AES \
435 "\x08" /** id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes 8 } */
436#define MBEDTLS_OID_AES192_KW \
437 MBEDTLS_OID_AES \
438 "\x19" /** id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 } */
439#define MBEDTLS_OID_AES192_KWP \
440 MBEDTLS_OID_AES \
441 "\x1c" /** id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes 28 } */
442#define MBEDTLS_OID_AES256_KW \
443 MBEDTLS_OID_AES \
444 "\x2d" /** id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 } */
445#define MBEDTLS_OID_AES256_KWP \
446 MBEDTLS_OID_AES \
447 "\x30" /** id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes 48 } */
Ron Eldor488fd082018-07-15 09:38:39 +0300448/*
Paul Bakker9b5e8852013-06-28 16:12:50 +0200449 * PKCS#5 OIDs
450 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200451#define MBEDTLS_OID_PKCS5_PBKDF2 \
452 MBEDTLS_OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */
453#define MBEDTLS_OID_PKCS5_PBES2 \
454 MBEDTLS_OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */
455#define MBEDTLS_OID_PKCS5_PBMAC1 \
456 MBEDTLS_OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200457
458/*
459 * PKCS#5 PBES1 algorithms
460 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200461#define MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC \
462 MBEDTLS_OID_PKCS5 \
463 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */
464#define MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC \
465 MBEDTLS_OID_PKCS5 \
466 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */
467#define MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC \
468 MBEDTLS_OID_PKCS5 \
469 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */
470#define MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC \
471 MBEDTLS_OID_PKCS5 \
472 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200473
Paul Bakker7749a222013-06-28 17:28:20 +0200474/*
Paul Bakkerfde42702013-08-25 14:47:27 +0200475 * PKCS#8 OIDs
476 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200477#define MBEDTLS_OID_PKCS9_CSR_EXT_REQ \
478 MBEDTLS_OID_PKCS9 \
479 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */
Paul Bakkerfde42702013-08-25 14:47:27 +0200480
481/*
Paul Bakker7749a222013-06-28 17:28:20 +0200482 * PKCS#12 PBE OIDs
483 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200484#define MBEDTLS_OID_PKCS12_PBE \
485 MBEDTLS_OID_PKCS12 \
486 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */
Paul Bakker7749a222013-06-28 17:28:20 +0200487
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200488#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC \
489 MBEDTLS_OID_PKCS12_PBE \
490 "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */
491#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC \
492 MBEDTLS_OID_PKCS12_PBE \
493 "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */
494#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC \
495 MBEDTLS_OID_PKCS12_PBE \
496 "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */
497#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC \
498 MBEDTLS_OID_PKCS12_PBE \
499 "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */
Paul Bakker7749a222013-06-28 17:28:20 +0200500
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200501/*
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200502 * EC key algorithms from RFC 5480
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200503 */
504
505/* id-ecPublicKey OBJECT IDENTIFIER ::= {
506 * iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200507#define MBEDTLS_OID_EC_ALG_UNRESTRICTED MBEDTLS_OID_ANSI_X9_62 "\x02\01"
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200508
509/* id-ecDH OBJECT IDENTIFIER ::= {
510 * iso(1) identified-organization(3) certicom(132)
511 * schemes(1) ecdh(12) } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200512#define MBEDTLS_OID_EC_ALG_ECDH MBEDTLS_OID_CERTICOM "\x01\x0c"
Manuel Pégourié-Gonnard5a9b82e2013-07-01 16:57:44 +0200513
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200514/*
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100515 * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200516 */
517
518/* secp192r1 OBJECT IDENTIFIER ::= {
519 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200520#define MBEDTLS_OID_EC_GRP_SECP192R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x01"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200521
522/* secp224r1 OBJECT IDENTIFIER ::= {
523 * iso(1) identified-organization(3) certicom(132) curve(0) 33 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200524#define MBEDTLS_OID_EC_GRP_SECP224R1 MBEDTLS_OID_CERTICOM "\x00\x21"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200525
526/* secp256r1 OBJECT IDENTIFIER ::= {
527 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200528#define MBEDTLS_OID_EC_GRP_SECP256R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x07"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200529
530/* secp384r1 OBJECT IDENTIFIER ::= {
531 * iso(1) identified-organization(3) certicom(132) curve(0) 34 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200532#define MBEDTLS_OID_EC_GRP_SECP384R1 MBEDTLS_OID_CERTICOM "\x00\x22"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200533
534/* secp521r1 OBJECT IDENTIFIER ::= {
535 * iso(1) identified-organization(3) certicom(132) curve(0) 35 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200536#define MBEDTLS_OID_EC_GRP_SECP521R1 MBEDTLS_OID_CERTICOM "\x00\x23"
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200537
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100538/* secp192k1 OBJECT IDENTIFIER ::= {
539 * iso(1) identified-organization(3) certicom(132) curve(0) 31 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200540#define MBEDTLS_OID_EC_GRP_SECP192K1 MBEDTLS_OID_CERTICOM "\x00\x1f"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100541
542/* secp224k1 OBJECT IDENTIFIER ::= {
543 * iso(1) identified-organization(3) certicom(132) curve(0) 32 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200544#define MBEDTLS_OID_EC_GRP_SECP224K1 MBEDTLS_OID_CERTICOM "\x00\x20"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100545
546/* secp256k1 OBJECT IDENTIFIER ::= {
547 * iso(1) identified-organization(3) certicom(132) curve(0) 10 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200548#define MBEDTLS_OID_EC_GRP_SECP256K1 MBEDTLS_OID_CERTICOM "\x00\x0a"
Manuel Pégourié-Gonnard9bcff392014-01-10 18:26:48 +0100549
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200550/* RFC 5639 4.1
551 * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1)
552 * identified-organization(3) teletrust(36) algorithm(3) signature-
553 * algorithm(3) ecSign(2) 8}
554 * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1}
555 * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200556#define MBEDTLS_OID_EC_BRAINPOOL_V1 \
557 MBEDTLS_OID_TELETRUST "\x03\x03\x02\x08\x01\x01"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200558
559/* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200560#define MBEDTLS_OID_EC_GRP_BP256R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x07"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200561
562/* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200563#define MBEDTLS_OID_EC_GRP_BP384R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0B"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200564
565/* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200566#define MBEDTLS_OID_EC_GRP_BP512R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0D"
Manuel Pégourié-Gonnard48ac3db2013-10-10 15:11:33 +0200567
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200568/*
Manuel Pégourié-Gonnardeab20d22014-03-14 17:58:42 +0100569 * SEC1 C.1
570 *
571 * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
572 * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)}
573 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200574#define MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE MBEDTLS_OID_ANSI_X9_62 "\x01"
575#define MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD \
576 MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE "\x01"
Manuel Pégourié-Gonnardeab20d22014-03-14 17:58:42 +0100577
578/*
Paul Bakker75342a62014-04-08 17:35:40 +0200579 * ECDSA signature identifiers, from RFC 5480
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200580 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200581#define MBEDTLS_OID_ANSI_X9_62_SIG \
582 MBEDTLS_OID_ANSI_X9_62 "\x04" /* signatures(4) */
583#define MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 \
584 MBEDTLS_OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200585
586/* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= {
587 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200588#define MBEDTLS_OID_ECDSA_SHA1 MBEDTLS_OID_ANSI_X9_62_SIG "\x01"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200589
590/* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= {
591 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
592 * ecdsa-with-SHA2(3) 1 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200593#define MBEDTLS_OID_ECDSA_SHA224 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x01"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200594
595/* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= {
596 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
597 * ecdsa-with-SHA2(3) 2 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200598#define MBEDTLS_OID_ECDSA_SHA256 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x02"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200599
600/* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= {
601 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
602 * ecdsa-with-SHA2(3) 3 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200603#define MBEDTLS_OID_ECDSA_SHA384 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x03"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200604
605/* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= {
606 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
607 * ecdsa-with-SHA2(3) 4 } */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200608#define MBEDTLS_OID_ECDSA_SHA512 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x04"
Manuel Pégourié-Gonnard1e60cd02013-07-10 10:28:53 +0200609
Paul Bakkerc70b9822013-04-07 22:00:46 +0200610#ifdef __cplusplus
611extern "C" {
612#endif
613
614/**
615 * \brief Base OID descriptor structure
616 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200617typedef struct mbedtls_oid_descriptor_t {
618 const char *MBEDTLS_PRIVATE(asn1); /*!< OID ASN.1 representation */
619 size_t MBEDTLS_PRIVATE(asn1_len); /*!< length of asn1 */
Hanno Becker612a2f12020-10-09 09:19:39 +0100620#if !defined(MBEDTLS_X509_REMOVE_INFO)
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200621 const char *MBEDTLS_PRIVATE(name); /*!< official name (e.g. from RFC) */
622 const char *MBEDTLS_PRIVATE(description); /*!< human friendly description */
Peter Kolbus9a969b62018-12-11 13:55:56 -0600623#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200624} mbedtls_oid_descriptor_t;
Paul Bakkerc70b9822013-04-07 22:00:46 +0200625
626/**
627 * \brief Translate an ASN.1 OID into its numeric representation
628 * (e.g. "\x2A\x86\x48\x86\xF7\x0D" into "1.2.840.113549")
629 *
630 * \param buf buffer to put representation in
631 * \param size size of the buffer
632 * \param oid OID to translate
633 *
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100634 * \return Length of the string written (excluding final NULL) or
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200635 * MBEDTLS_ERR_OID_BUF_TOO_SMALL in case of error
Paul Bakkerc70b9822013-04-07 22:00:46 +0200636 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200637int mbedtls_oid_get_numeric_string(char *buf,
638 size_t size,
639 const mbedtls_asn1_buf *oid);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200640
641/**
642 * \brief Translate an X.509 extension OID into local values
643 *
644 * \param oid OID to use
645 * \param ext_type place to store the extension type
646 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200647 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200648 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200649int mbedtls_oid_get_x509_ext_type(const mbedtls_asn1_buf *oid, int *ext_type);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200650
651/**
652 * \brief Translate an X.509 attribute type OID into the short name
653 * (e.g. the OID for an X520 Common Name into "CN")
654 *
655 * \param oid OID to use
656 * \param short_name place to store the string pointer
657 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200658 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200659 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200660int mbedtls_oid_get_attr_short_name(const mbedtls_asn1_buf *oid,
661 const char **short_name);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200662
663/**
664 * \brief Translate PublicKeyAlgorithm OID into pk_type
665 *
666 * \param oid OID to use
667 * \param pk_alg place to store public key algorithm
668 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200669 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200670 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200671int mbedtls_oid_get_pk_alg(const mbedtls_asn1_buf *oid,
672 mbedtls_pk_type_t *pk_alg);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200673
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200674/**
675 * \brief Translate pk_type into PublicKeyAlgorithm OID
676 *
677 * \param pk_alg Public key type to look for
678 * \param oid place to store ASN.1 OID string pointer
679 * \param olen length of the OID
680 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200681 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200682 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200683int mbedtls_oid_get_oid_by_pk_alg(mbedtls_pk_type_t pk_alg,
684 const char **oid,
685 size_t *olen);
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200686
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200687#if defined(MBEDTLS_ECP_C)
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200688/**
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200689 * \brief Translate NamedCurve OID into an EC group identifier
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200690 *
691 * \param oid OID to use
692 * \param grp_id place to store group id
693 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200694 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200695 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200696int mbedtls_oid_get_ec_grp(const mbedtls_asn1_buf *oid,
697 mbedtls_ecp_group_id *grp_id);
Manuel Pégourié-Gonnardf0b30d02013-07-01 17:34:57 +0200698
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200699/**
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200700 * \brief Translate EC group identifier into NamedCurve OID
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200701 *
Manuel Pégourié-Gonnardedda9042013-09-12 02:17:54 +0200702 * \param grp_id EC group identifier
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200703 * \param oid place to store ASN.1 OID string pointer
704 * \param olen length of the OID
705 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200706 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200707 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200708int mbedtls_oid_get_oid_by_ec_grp(mbedtls_ecp_group_id grp_id,
709 const char **oid,
710 size_t *olen);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200711#endif /* MBEDTLS_ECP_C */
Manuel Pégourié-Gonnard3837dae2013-09-12 01:39:07 +0200712
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200713#if defined(MBEDTLS_MD_C)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200714/**
715 * \brief Translate SignatureAlgorithm OID into md_type and pk_type
716 *
717 * \param oid OID to use
718 * \param md_alg place to store message digest algorithm
719 * \param pk_alg place to store public key algorithm
720 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200721 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200722 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200723int mbedtls_oid_get_sig_alg(const mbedtls_asn1_buf *oid,
724 mbedtls_md_type_t *md_alg,
725 mbedtls_pk_type_t *pk_alg);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200726
727/**
728 * \brief Translate SignatureAlgorithm OID into description
729 *
730 * \param oid OID to use
731 * \param desc place to store string pointer
732 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200733 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200734 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200735int mbedtls_oid_get_sig_alg_desc(const mbedtls_asn1_buf *oid,
736 const char **desc);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200737
738/**
739 * \brief Translate md_type and pk_type into SignatureAlgorithm OID
740 *
741 * \param md_alg message digest algorithm
742 * \param pk_alg public key algorithm
743 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200744 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200745 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200746 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200747 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200748int mbedtls_oid_get_oid_by_sig_alg(mbedtls_pk_type_t pk_alg,
749 mbedtls_md_type_t md_alg,
750 const char **oid,
751 size_t *olen);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200752
753/**
754 * \brief Translate hash algorithm OID into md_type
755 *
756 * \param oid OID to use
757 * \param md_alg place to store message digest algorithm
758 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200759 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200760 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200761int mbedtls_oid_get_md_alg(const mbedtls_asn1_buf *oid,
762 mbedtls_md_type_t *md_alg);
Antonio Quartulli12ccef22017-12-20 07:03:55 +0800763
764/**
765 * \brief Translate hmac algorithm OID into md_type
766 *
767 * \param oid OID to use
768 * \param md_hmac place to store message hmac algorithm
769 *
770 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
771 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200772int mbedtls_oid_get_md_hmac(const mbedtls_asn1_buf *oid,
773 mbedtls_md_type_t *md_hmac);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200774#endif /* MBEDTLS_MD_C */
Paul Bakkerc70b9822013-04-07 22:00:46 +0200775
Hanno Becker612a2f12020-10-09 09:19:39 +0100776#if !defined(MBEDTLS_X509_REMOVE_INFO)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200777/**
778 * \brief Translate Extended Key Usage OID into description
779 *
780 * \param oid OID to use
781 * \param desc place to store string pointer
782 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200783 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200784 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200785int mbedtls_oid_get_extended_key_usage(const mbedtls_asn1_buf *oid,
786 const char **desc);
Peter Kolbus9a969b62018-12-11 13:55:56 -0600787#endif
Paul Bakkerc70b9822013-04-07 22:00:46 +0200788
789/**
Ron Eldor11ee0712019-03-25 18:22:52 +0200790 * \brief Translate certificate policies OID into description
791 *
792 * \param oid OID to use
793 * \param desc place to store string pointer
794 *
795 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
796 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200797int mbedtls_oid_get_certificate_policies(const mbedtls_asn1_buf *oid,
798 const char **desc);
Ron Eldor11ee0712019-03-25 18:22:52 +0200799
800/**
Paul Bakkerc70b9822013-04-07 22:00:46 +0200801 * \brief Translate md_type into hash algorithm OID
802 *
803 * \param md_alg message digest algorithm
804 * \param oid place to store ASN.1 OID string pointer
Paul Bakker1c3853b2013-09-10 11:43:44 +0200805 * \param olen length of the OID
Paul Bakkerc70b9822013-04-07 22:00:46 +0200806 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200807 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakkerc70b9822013-04-07 22:00:46 +0200808 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200809int mbedtls_oid_get_oid_by_md(mbedtls_md_type_t md_alg,
810 const char **oid,
811 size_t *olen);
Paul Bakkerc70b9822013-04-07 22:00:46 +0200812
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200813#if defined(MBEDTLS_CIPHER_C)
Paul Bakker9b5e8852013-06-28 16:12:50 +0200814/**
815 * \brief Translate encryption algorithm OID into cipher_type
816 *
817 * \param oid OID to use
818 * \param cipher_alg place to store cipher algorithm
819 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200820 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakker9b5e8852013-06-28 16:12:50 +0200821 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200822int mbedtls_oid_get_cipher_alg(const mbedtls_asn1_buf *oid,
823 mbedtls_cipher_type_t *cipher_alg);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200824#endif /* MBEDTLS_CIPHER_C */
Paul Bakker9b5e8852013-06-28 16:12:50 +0200825
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200826#if defined(MBEDTLS_PKCS12_C)
Paul Bakker7749a222013-06-28 17:28:20 +0200827/**
828 * \brief Translate PKCS#12 PBE algorithm OID into md_type and
829 * cipher_type
830 *
831 * \param oid OID to use
832 * \param md_alg place to store message digest algorithm
833 * \param cipher_alg place to store cipher algorithm
834 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200835 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
Paul Bakker7749a222013-06-28 17:28:20 +0200836 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200837int mbedtls_oid_get_pkcs12_pbe_alg(const mbedtls_asn1_buf *oid,
838 mbedtls_md_type_t *md_alg,
839 mbedtls_cipher_type_t *cipher_alg);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200840#endif /* MBEDTLS_PKCS12_C */
Paul Bakker7749a222013-06-28 17:28:20 +0200841
Paul Bakkerc70b9822013-04-07 22:00:46 +0200842#ifdef __cplusplus
843}
844#endif
845
846#endif /* oid.h */