1 /** 2 * \file oid.h 3 * 4 * \brief Object Identifier (OID) database 5 */ 6 /* 7 * Copyright The Mbed TLS Contributors 8 * SPDX-License-Identifier: Apache-2.0 9 * 10 * Licensed under the Apache License, Version 2.0 (the "License"); you may 11 * not use this file except in compliance with the License. 12 * You may obtain a copy of the License at 13 * 14 * http://www.apache.org/licenses/LICENSE-2.0 15 * 16 * Unless required by applicable law or agreed to in writing, software 17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 19 * See the License for the specific language governing permissions and 20 * limitations under the License. 21 */ 22 #ifndef MBEDTLS_OID_H 23 #define MBEDTLS_OID_H 24 #include "mbedtls/private_access.h" 25 26 #include "mbedtls/build_info.h" 27 28 #include "mbedtls/asn1.h" 29 #include "mbedtls/pk.h" 30 31 #include <stddef.h> 32 33 #if defined(MBEDTLS_CIPHER_C) 34 #include "mbedtls/cipher.h" 35 #endif 36 37 #include "mbedtls/md.h" 38 39 /** OID is not found. */ 40 #define MBEDTLS_ERR_OID_NOT_FOUND -0x002E 41 /** output buffer is too small */ 42 #define MBEDTLS_ERR_OID_BUF_TOO_SMALL -0x000B 43 44 /* This is for the benefit of X.509, but defined here in order to avoid 45 * having a "backwards" include of x.509.h here */ 46 /* 47 * X.509 extension types (internal, arbitrary values for bitsets) 48 */ 49 #define MBEDTLS_OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER (1 << 0) 50 #define MBEDTLS_OID_X509_EXT_SUBJECT_KEY_IDENTIFIER (1 << 1) 51 #define MBEDTLS_OID_X509_EXT_KEY_USAGE (1 << 2) 52 #define MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES (1 << 3) 53 #define MBEDTLS_OID_X509_EXT_POLICY_MAPPINGS (1 << 4) 54 #define MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME (1 << 5) 55 #define MBEDTLS_OID_X509_EXT_ISSUER_ALT_NAME (1 << 6) 56 #define MBEDTLS_OID_X509_EXT_SUBJECT_DIRECTORY_ATTRS (1 << 7) 57 #define MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS (1 << 8) 58 #define MBEDTLS_OID_X509_EXT_NAME_CONSTRAINTS (1 << 9) 59 #define MBEDTLS_OID_X509_EXT_POLICY_CONSTRAINTS (1 << 10) 60 #define MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE (1 << 11) 61 #define MBEDTLS_OID_X509_EXT_CRL_DISTRIBUTION_POINTS (1 << 12) 62 #define MBEDTLS_OID_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13) 63 #define MBEDTLS_OID_X509_EXT_FRESHEST_CRL (1 << 14) 64 #define MBEDTLS_OID_X509_EXT_NS_CERT_TYPE (1 << 16) 65 66 /* 67 * Top level OID tuples 68 */ 69 #define MBEDTLS_OID_ISO_MEMBER_BODIES "\x2a" /* {iso(1) member-body(2)} */ 70 #define MBEDTLS_OID_ISO_IDENTIFIED_ORG "\x2b" /* {iso(1) identified-organization(3)} */ 71 #define MBEDTLS_OID_ISO_CCITT_DS "\x55" /* {joint-iso-ccitt(2) ds(5)} */ 72 #define MBEDTLS_OID_ISO_ITU_COUNTRY "\x60" /* {joint-iso-itu-t(2) country(16)} */ 73 74 /* 75 * ISO Member bodies OID parts 76 */ 77 #define MBEDTLS_OID_COUNTRY_US "\x86\x48" /* {us(840)} */ 78 #define MBEDTLS_OID_ORG_RSA_DATA_SECURITY "\x86\xf7\x0d" /* {rsadsi(113549)} */ 79 #define MBEDTLS_OID_RSA_COMPANY MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \ 80 MBEDTLS_OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */ 81 #define MBEDTLS_OID_ORG_ANSI_X9_62 "\xce\x3d" /* ansi-X9-62(10045) */ 82 #define MBEDTLS_OID_ANSI_X9_62 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \ 83 MBEDTLS_OID_ORG_ANSI_X9_62 84 85 /* 86 * ISO Identified organization OID parts 87 */ 88 #define MBEDTLS_OID_ORG_DOD "\x06" /* {dod(6)} */ 89 #define MBEDTLS_OID_ORG_OIW "\x0e" 90 #define MBEDTLS_OID_OIW_SECSIG MBEDTLS_OID_ORG_OIW "\x03" 91 #define MBEDTLS_OID_OIW_SECSIG_ALG MBEDTLS_OID_OIW_SECSIG "\x02" 92 #define MBEDTLS_OID_OIW_SECSIG_SHA1 MBEDTLS_OID_OIW_SECSIG_ALG "\x1a" 93 #define MBEDTLS_OID_ORG_CERTICOM "\x81\x04" /* certicom(132) */ 94 #define MBEDTLS_OID_CERTICOM MBEDTLS_OID_ISO_IDENTIFIED_ORG \ 95 MBEDTLS_OID_ORG_CERTICOM 96 #define MBEDTLS_OID_ORG_TELETRUST "\x24" /* teletrust(36) */ 97 #define MBEDTLS_OID_TELETRUST MBEDTLS_OID_ISO_IDENTIFIED_ORG \ 98 MBEDTLS_OID_ORG_TELETRUST 99 100 /* 101 * ISO ITU OID parts 102 */ 103 #define MBEDTLS_OID_ORGANIZATION "\x01" /* {organization(1)} */ 104 #define MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ISO_ITU_COUNTRY MBEDTLS_OID_COUNTRY_US \ 105 MBEDTLS_OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */ 106 107 #define MBEDTLS_OID_ORG_GOV "\x65" /* {gov(101)} */ 108 #define MBEDTLS_OID_GOV MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */ 109 110 #define MBEDTLS_OID_ORG_NETSCAPE "\x86\xF8\x42" /* {netscape(113730)} */ 111 #define MBEDTLS_OID_NETSCAPE MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */ 112 113 /* ISO arc for standard certificate and CRL extensions */ 114 #define MBEDTLS_OID_ID_CE MBEDTLS_OID_ISO_CCITT_DS "\x1D" /**< id-ce OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 29} */ 115 116 #define MBEDTLS_OID_NIST_ALG MBEDTLS_OID_GOV "\x03\x04" /** { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) */ 117 118 /** 119 * Private Internet Extensions 120 * { iso(1) identified-organization(3) dod(6) internet(1) 121 * security(5) mechanisms(5) pkix(7) } 122 */ 123 #define MBEDTLS_OID_INTERNET MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_DOD \ 124 "\x01" 125 #define MBEDTLS_OID_PKIX MBEDTLS_OID_INTERNET "\x05\x05\x07" 126 127 /* 128 * Arc for standard naming attributes 129 */ 130 #define MBEDTLS_OID_AT MBEDTLS_OID_ISO_CCITT_DS "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */ 131 #define MBEDTLS_OID_AT_CN MBEDTLS_OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */ 132 #define MBEDTLS_OID_AT_SUR_NAME MBEDTLS_OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */ 133 #define MBEDTLS_OID_AT_SERIAL_NUMBER MBEDTLS_OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */ 134 #define MBEDTLS_OID_AT_COUNTRY MBEDTLS_OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */ 135 #define MBEDTLS_OID_AT_LOCALITY MBEDTLS_OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */ 136 #define MBEDTLS_OID_AT_STATE MBEDTLS_OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */ 137 #define MBEDTLS_OID_AT_ORGANIZATION MBEDTLS_OID_AT "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */ 138 #define MBEDTLS_OID_AT_ORG_UNIT MBEDTLS_OID_AT "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */ 139 #define MBEDTLS_OID_AT_TITLE MBEDTLS_OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */ 140 #define MBEDTLS_OID_AT_POSTAL_ADDRESS MBEDTLS_OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */ 141 #define MBEDTLS_OID_AT_POSTAL_CODE MBEDTLS_OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */ 142 #define MBEDTLS_OID_AT_GIVEN_NAME MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */ 143 #define MBEDTLS_OID_AT_INITIALS MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */ 144 #define MBEDTLS_OID_AT_GENERATION_QUALIFIER MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */ 145 #define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributeType:= {id-at 45} */ 146 #define MBEDTLS_OID_AT_DN_QUALIFIER MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */ 147 #define MBEDTLS_OID_AT_PSEUDONYM MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */ 148 149 #define MBEDTLS_OID_UID "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x01" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) uid(1)} */ 150 #define MBEDTLS_OID_DOMAIN_COMPONENT "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */ 151 152 /* 153 * OIDs for standard certificate extensions 154 */ 155 #define MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER MBEDTLS_OID_ID_CE "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 } */ 156 #define MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER MBEDTLS_OID_ID_CE "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 14 } */ 157 #define MBEDTLS_OID_KEY_USAGE MBEDTLS_OID_ID_CE "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 } */ 158 #define MBEDTLS_OID_CERTIFICATE_POLICIES MBEDTLS_OID_ID_CE "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-ce 32 } */ 159 #define MBEDTLS_OID_POLICY_MAPPINGS MBEDTLS_OID_ID_CE "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::= { id-ce 33 } */ 160 #define MBEDTLS_OID_SUBJECT_ALT_NAME MBEDTLS_OID_ID_CE "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 } */ 161 #define MBEDTLS_OID_ISSUER_ALT_NAME MBEDTLS_OID_ID_CE "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::= { id-ce 18 } */ 162 #define MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS MBEDTLS_OID_ID_CE "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::= { id-ce 9 } */ 163 #define MBEDTLS_OID_BASIC_CONSTRAINTS MBEDTLS_OID_ID_CE "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 } */ 164 #define MBEDTLS_OID_NAME_CONSTRAINTS MBEDTLS_OID_ID_CE "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::= { id-ce 30 } */ 165 #define MBEDTLS_OID_POLICY_CONSTRAINTS MBEDTLS_OID_ID_CE "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::= { id-ce 36 } */ 166 #define MBEDTLS_OID_EXTENDED_KEY_USAGE MBEDTLS_OID_ID_CE "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */ 167 #define MBEDTLS_OID_CRL_DISTRIBUTION_POINTS MBEDTLS_OID_ID_CE "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::= { id-ce 31 } */ 168 #define MBEDTLS_OID_INIHIBIT_ANYPOLICY MBEDTLS_OID_ID_CE "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::= { id-ce 54 } */ 169 #define MBEDTLS_OID_FRESHEST_CRL MBEDTLS_OID_ID_CE "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::= { id-ce 46 } */ 170 171 /* 172 * Certificate policies 173 */ 174 #define MBEDTLS_OID_ANY_POLICY MBEDTLS_OID_CERTIFICATE_POLICIES "\x00" /**< anyPolicy OBJECT IDENTIFIER ::= { id-ce-certificatePolicies 0 } */ 175 176 /* 177 * Netscape certificate extensions 178 */ 179 #define MBEDTLS_OID_NS_CERT MBEDTLS_OID_NETSCAPE "\x01" 180 #define MBEDTLS_OID_NS_CERT_TYPE MBEDTLS_OID_NS_CERT "\x01" 181 #define MBEDTLS_OID_NS_BASE_URL MBEDTLS_OID_NS_CERT "\x02" 182 #define MBEDTLS_OID_NS_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x03" 183 #define MBEDTLS_OID_NS_CA_REVOCATION_URL MBEDTLS_OID_NS_CERT "\x04" 184 #define MBEDTLS_OID_NS_RENEWAL_URL MBEDTLS_OID_NS_CERT "\x07" 185 #define MBEDTLS_OID_NS_CA_POLICY_URL MBEDTLS_OID_NS_CERT "\x08" 186 #define MBEDTLS_OID_NS_SSL_SERVER_NAME MBEDTLS_OID_NS_CERT "\x0C" 187 #define MBEDTLS_OID_NS_COMMENT MBEDTLS_OID_NS_CERT "\x0D" 188 #define MBEDTLS_OID_NS_DATA_TYPE MBEDTLS_OID_NETSCAPE "\x02" 189 #define MBEDTLS_OID_NS_CERT_SEQUENCE MBEDTLS_OID_NS_DATA_TYPE "\x05" 190 191 /* 192 * OIDs for CRL extensions 193 */ 194 #define MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD MBEDTLS_OID_ID_CE "\x10" 195 #define MBEDTLS_OID_CRL_NUMBER MBEDTLS_OID_ID_CE "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */ 196 197 /* 198 * X.509 v3 Extended key usage OIDs 199 */ 200 #define MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE MBEDTLS_OID_EXTENDED_KEY_USAGE "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */ 201 202 #define MBEDTLS_OID_KP MBEDTLS_OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */ 203 #define MBEDTLS_OID_SERVER_AUTH MBEDTLS_OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */ 204 #define MBEDTLS_OID_CLIENT_AUTH MBEDTLS_OID_KP "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */ 205 #define MBEDTLS_OID_CODE_SIGNING MBEDTLS_OID_KP "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */ 206 #define MBEDTLS_OID_EMAIL_PROTECTION MBEDTLS_OID_KP "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */ 207 #define MBEDTLS_OID_TIME_STAMPING MBEDTLS_OID_KP "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */ 208 #define MBEDTLS_OID_OCSP_SIGNING MBEDTLS_OID_KP "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */ 209 210 /** 211 * Wi-SUN Alliance Field Area Network 212 * { iso(1) identified-organization(3) dod(6) internet(1) 213 * private(4) enterprise(1) WiSUN(45605) FieldAreaNetwork(1) } 214 */ 215 #define MBEDTLS_OID_WISUN_FAN MBEDTLS_OID_INTERNET "\x04\x01\x82\xe4\x25\x01" 216 217 #define MBEDTLS_OID_ON MBEDTLS_OID_PKIX "\x08" /**< id-on OBJECT IDENTIFIER ::= { id-pkix 8 } */ 218 #define MBEDTLS_OID_ON_HW_MODULE_NAME MBEDTLS_OID_ON "\x04" /**< id-on-hardwareModuleName OBJECT IDENTIFIER ::= { id-on 4 } */ 219 220 /* 221 * PKCS definition OIDs 222 */ 223 224 #define MBEDTLS_OID_PKCS MBEDTLS_OID_RSA_COMPANY "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */ 225 #define MBEDTLS_OID_PKCS1 MBEDTLS_OID_PKCS "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */ 226 #define MBEDTLS_OID_PKCS5 MBEDTLS_OID_PKCS "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */ 227 #define MBEDTLS_OID_PKCS7 MBEDTLS_OID_PKCS "\x07" /**< pkcs-7 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 7 } */ 228 #define MBEDTLS_OID_PKCS9 MBEDTLS_OID_PKCS "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */ 229 #define MBEDTLS_OID_PKCS12 MBEDTLS_OID_PKCS "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */ 230 231 /* 232 * PKCS#1 OIDs 233 */ 234 #define MBEDTLS_OID_PKCS1_RSA MBEDTLS_OID_PKCS1 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */ 235 #define MBEDTLS_OID_PKCS1_MD5 MBEDTLS_OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */ 236 #define MBEDTLS_OID_PKCS1_SHA1 MBEDTLS_OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */ 237 #define MBEDTLS_OID_PKCS1_SHA224 MBEDTLS_OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */ 238 #define MBEDTLS_OID_PKCS1_SHA256 MBEDTLS_OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */ 239 #define MBEDTLS_OID_PKCS1_SHA384 MBEDTLS_OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */ 240 #define MBEDTLS_OID_PKCS1_SHA512 MBEDTLS_OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */ 241 242 #define MBEDTLS_OID_RSA_SHA_OBS "\x2B\x0E\x03\x02\x1D" 243 244 #define MBEDTLS_OID_PKCS9_EMAIL MBEDTLS_OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */ 245 246 /* RFC 4055 */ 247 #define MBEDTLS_OID_RSASSA_PSS MBEDTLS_OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */ 248 #define MBEDTLS_OID_MGF1 MBEDTLS_OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */ 249 250 /* 251 * Digest algorithms 252 */ 253 #define MBEDTLS_OID_DIGEST_ALG_MD5 MBEDTLS_OID_RSA_COMPANY "\x02\x05" /**< id-mbedtls_md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */ 254 #define MBEDTLS_OID_DIGEST_ALG_SHA1 MBEDTLS_OID_ISO_IDENTIFIED_ORG \ 255 MBEDTLS_OID_OIW_SECSIG_SHA1 /**< id-mbedtls_sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */ 256 #define MBEDTLS_OID_DIGEST_ALG_SHA224 MBEDTLS_OID_NIST_ALG "\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */ 257 #define MBEDTLS_OID_DIGEST_ALG_SHA256 MBEDTLS_OID_NIST_ALG "\x02\x01" /**< id-mbedtls_sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */ 258 259 #define MBEDTLS_OID_DIGEST_ALG_SHA384 MBEDTLS_OID_NIST_ALG "\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */ 260 261 #define MBEDTLS_OID_DIGEST_ALG_SHA512 MBEDTLS_OID_NIST_ALG "\x02\x03" /**< id-mbedtls_sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */ 262 263 #define MBEDTLS_OID_DIGEST_ALG_RIPEMD160 MBEDTLS_OID_TELETRUST "\x03\x02\x01" /**< id-ripemd160 OBJECT IDENTIFIER :: { iso(1) identified-organization(3) teletrust(36) algorithm(3) hashAlgorithm(2) ripemd160(1) } */ 264 265 #define MBEDTLS_OID_HMAC_SHA1 MBEDTLS_OID_RSA_COMPANY "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */ 266 267 #define MBEDTLS_OID_HMAC_SHA224 MBEDTLS_OID_RSA_COMPANY "\x02\x08" /**< id-hmacWithSHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 8 } */ 268 269 #define MBEDTLS_OID_HMAC_SHA256 MBEDTLS_OID_RSA_COMPANY "\x02\x09" /**< id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 9 } */ 270 271 #define MBEDTLS_OID_HMAC_SHA384 MBEDTLS_OID_RSA_COMPANY "\x02\x0A" /**< id-hmacWithSHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 10 } */ 272 273 #define MBEDTLS_OID_HMAC_SHA512 MBEDTLS_OID_RSA_COMPANY "\x02\x0B" /**< id-hmacWithSHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 11 } */ 274 275 /* 276 * Encryption algorithms 277 */ 278 #define MBEDTLS_OID_DES_CBC MBEDTLS_OID_ISO_IDENTIFIED_ORG \ 279 MBEDTLS_OID_OIW_SECSIG_ALG "\x07" /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */ 280 #define MBEDTLS_OID_DES_EDE3_CBC MBEDTLS_OID_RSA_COMPANY "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */ 281 #define MBEDTLS_OID_AES MBEDTLS_OID_NIST_ALG "\x01" /** aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 1 } */ 282 283 /* 284 * Key Wrapping algorithms 285 */ 286 /* 287 * RFC 5649 288 */ 289 #define MBEDTLS_OID_AES128_KW MBEDTLS_OID_AES "\x05" /** id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 } */ 290 #define MBEDTLS_OID_AES128_KWP MBEDTLS_OID_AES "\x08" /** id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes 8 } */ 291 #define MBEDTLS_OID_AES192_KW MBEDTLS_OID_AES "\x19" /** id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 } */ 292 #define MBEDTLS_OID_AES192_KWP MBEDTLS_OID_AES "\x1c" /** id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes 28 } */ 293 #define MBEDTLS_OID_AES256_KW MBEDTLS_OID_AES "\x2d" /** id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 } */ 294 #define MBEDTLS_OID_AES256_KWP MBEDTLS_OID_AES "\x30" /** id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes 48 } */ 295 /* 296 * PKCS#5 OIDs 297 */ 298 #define MBEDTLS_OID_PKCS5_PBKDF2 MBEDTLS_OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */ 299 #define MBEDTLS_OID_PKCS5_PBES2 MBEDTLS_OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */ 300 #define MBEDTLS_OID_PKCS5_PBMAC1 MBEDTLS_OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */ 301 302 /* 303 * PKCS#5 PBES1 algorithms 304 */ 305 #define MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC MBEDTLS_OID_PKCS5 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */ 306 #define MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC MBEDTLS_OID_PKCS5 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */ 307 #define MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC MBEDTLS_OID_PKCS5 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */ 308 #define MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC MBEDTLS_OID_PKCS5 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */ 309 310 /* 311 * PKCS#7 OIDs 312 */ 313 #define MBEDTLS_OID_PKCS7_DATA MBEDTLS_OID_PKCS7 "\x01" /**< Content type is Data OBJECT IDENTIFIER ::= {pkcs-7 1} */ 314 #define MBEDTLS_OID_PKCS7_SIGNED_DATA MBEDTLS_OID_PKCS7 "\x02" /**< Content type is Signed Data OBJECT IDENTIFIER ::= {pkcs-7 2} */ 315 #define MBEDTLS_OID_PKCS7_ENVELOPED_DATA MBEDTLS_OID_PKCS7 "\x03" /**< Content type is Enveloped Data OBJECT IDENTIFIER ::= {pkcs-7 3} */ 316 #define MBEDTLS_OID_PKCS7_SIGNED_AND_ENVELOPED_DATA MBEDTLS_OID_PKCS7 "\x04" /**< Content type is Signed and Enveloped Data OBJECT IDENTIFIER ::= {pkcs-7 4} */ 317 #define MBEDTLS_OID_PKCS7_DIGESTED_DATA MBEDTLS_OID_PKCS7 "\x05" /**< Content type is Digested Data OBJECT IDENTIFIER ::= {pkcs-7 5} */ 318 #define MBEDTLS_OID_PKCS7_ENCRYPTED_DATA MBEDTLS_OID_PKCS7 "\x06" /**< Content type is Encrypted Data OBJECT IDENTIFIER ::= {pkcs-7 6} */ 319 320 /* 321 * PKCS#8 OIDs 322 */ 323 #define MBEDTLS_OID_PKCS9_CSR_EXT_REQ MBEDTLS_OID_PKCS9 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */ 324 325 /* 326 * PKCS#12 PBE OIDs 327 */ 328 #define MBEDTLS_OID_PKCS12_PBE MBEDTLS_OID_PKCS12 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */ 329 330 #define MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC MBEDTLS_OID_PKCS12_PBE "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */ 331 #define MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC MBEDTLS_OID_PKCS12_PBE "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */ 332 #define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC MBEDTLS_OID_PKCS12_PBE "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */ 333 #define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC MBEDTLS_OID_PKCS12_PBE "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */ 334 335 /* 336 * EC key algorithms from RFC 5480 337 */ 338 339 /* id-ecPublicKey OBJECT IDENTIFIER ::= { 340 * iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */ 341 #define MBEDTLS_OID_EC_ALG_UNRESTRICTED MBEDTLS_OID_ANSI_X9_62 "\x02\01" 342 343 /* id-ecDH OBJECT IDENTIFIER ::= { 344 * iso(1) identified-organization(3) certicom(132) 345 * schemes(1) ecdh(12) } */ 346 #define MBEDTLS_OID_EC_ALG_ECDH MBEDTLS_OID_CERTICOM "\x01\x0c" 347 348 /* 349 * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2 350 */ 351 352 /* secp192r1 OBJECT IDENTIFIER ::= { 353 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */ 354 #define MBEDTLS_OID_EC_GRP_SECP192R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x01" 355 356 /* secp224r1 OBJECT IDENTIFIER ::= { 357 * iso(1) identified-organization(3) certicom(132) curve(0) 33 } */ 358 #define MBEDTLS_OID_EC_GRP_SECP224R1 MBEDTLS_OID_CERTICOM "\x00\x21" 359 360 /* secp256r1 OBJECT IDENTIFIER ::= { 361 * iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */ 362 #define MBEDTLS_OID_EC_GRP_SECP256R1 MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x07" 363 364 /* secp384r1 OBJECT IDENTIFIER ::= { 365 * iso(1) identified-organization(3) certicom(132) curve(0) 34 } */ 366 #define MBEDTLS_OID_EC_GRP_SECP384R1 MBEDTLS_OID_CERTICOM "\x00\x22" 367 368 /* secp521r1 OBJECT IDENTIFIER ::= { 369 * iso(1) identified-organization(3) certicom(132) curve(0) 35 } */ 370 #define MBEDTLS_OID_EC_GRP_SECP521R1 MBEDTLS_OID_CERTICOM "\x00\x23" 371 372 /* secp192k1 OBJECT IDENTIFIER ::= { 373 * iso(1) identified-organization(3) certicom(132) curve(0) 31 } */ 374 #define MBEDTLS_OID_EC_GRP_SECP192K1 MBEDTLS_OID_CERTICOM "\x00\x1f" 375 376 /* secp224k1 OBJECT IDENTIFIER ::= { 377 * iso(1) identified-organization(3) certicom(132) curve(0) 32 } */ 378 #define MBEDTLS_OID_EC_GRP_SECP224K1 MBEDTLS_OID_CERTICOM "\x00\x20" 379 380 /* secp256k1 OBJECT IDENTIFIER ::= { 381 * iso(1) identified-organization(3) certicom(132) curve(0) 10 } */ 382 #define MBEDTLS_OID_EC_GRP_SECP256K1 MBEDTLS_OID_CERTICOM "\x00\x0a" 383 384 /* RFC 5639 4.1 385 * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1) 386 * identified-organization(3) teletrust(36) algorithm(3) signature- 387 * algorithm(3) ecSign(2) 8} 388 * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1} 389 * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */ 390 #define MBEDTLS_OID_EC_BRAINPOOL_V1 MBEDTLS_OID_TELETRUST "\x03\x03\x02\x08\x01\x01" 391 392 /* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */ 393 #define MBEDTLS_OID_EC_GRP_BP256R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x07" 394 395 /* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */ 396 #define MBEDTLS_OID_EC_GRP_BP384R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0B" 397 398 /* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */ 399 #define MBEDTLS_OID_EC_GRP_BP512R1 MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0D" 400 401 /* 402 * SEC1 C.1 403 * 404 * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 } 405 * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)} 406 */ 407 #define MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE MBEDTLS_OID_ANSI_X9_62 "\x01" 408 #define MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE "\x01" 409 410 /* 411 * ECDSA signature identifiers, from RFC 5480 412 */ 413 #define MBEDTLS_OID_ANSI_X9_62_SIG MBEDTLS_OID_ANSI_X9_62 "\x04" /* signatures(4) */ 414 #define MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 MBEDTLS_OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */ 415 416 /* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { 417 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */ 418 #define MBEDTLS_OID_ECDSA_SHA1 MBEDTLS_OID_ANSI_X9_62_SIG "\x01" 419 420 /* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= { 421 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 422 * ecdsa-with-SHA2(3) 1 } */ 423 #define MBEDTLS_OID_ECDSA_SHA224 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x01" 424 425 /* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { 426 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 427 * ecdsa-with-SHA2(3) 2 } */ 428 #define MBEDTLS_OID_ECDSA_SHA256 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x02" 429 430 /* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= { 431 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 432 * ecdsa-with-SHA2(3) 3 } */ 433 #define MBEDTLS_OID_ECDSA_SHA384 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x03" 434 435 /* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= { 436 * iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 437 * ecdsa-with-SHA2(3) 4 } */ 438 #define MBEDTLS_OID_ECDSA_SHA512 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x04" 439 440 #ifdef __cplusplus 441 extern "C" { 442 #endif 443 444 /** 445 * \brief Base OID descriptor structure 446 */ 447 typedef struct mbedtls_oid_descriptor_t { 448 const char *MBEDTLS_PRIVATE(asn1); /*!< OID ASN.1 representation */ 449 size_t MBEDTLS_PRIVATE(asn1_len); /*!< length of asn1 */ 450 #if !defined(MBEDTLS_X509_REMOVE_INFO) 451 const char *MBEDTLS_PRIVATE(name); /*!< official name (e.g. from RFC) */ 452 const char *MBEDTLS_PRIVATE(description); /*!< human friendly description */ 453 #endif 454 } mbedtls_oid_descriptor_t; 455 456 /** 457 * \brief Translate an ASN.1 OID into its numeric representation 458 * (e.g. "\x2A\x86\x48\x86\xF7\x0D" into "1.2.840.113549") 459 * 460 * \param buf buffer to put representation in 461 * \param size size of the buffer 462 * \param oid OID to translate 463 * 464 * \return Length of the string written (excluding final NULL) or 465 * MBEDTLS_ERR_OID_BUF_TOO_SMALL in case of error 466 */ 467 int mbedtls_oid_get_numeric_string(char *buf, size_t size, const mbedtls_asn1_buf *oid); 468 469 /** 470 * \brief Translate an X.509 extension OID into local values 471 * 472 * \param oid OID to use 473 * \param ext_type place to store the extension type 474 * 475 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 476 */ 477 int mbedtls_oid_get_x509_ext_type(const mbedtls_asn1_buf *oid, int *ext_type); 478 479 /** 480 * \brief Translate an X.509 attribute type OID into the short name 481 * (e.g. the OID for an X520 Common Name into "CN") 482 * 483 * \param oid OID to use 484 * \param short_name place to store the string pointer 485 * 486 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 487 */ 488 int mbedtls_oid_get_attr_short_name(const mbedtls_asn1_buf *oid, const char **short_name); 489 490 /** 491 * \brief Translate PublicKeyAlgorithm OID into pk_type 492 * 493 * \param oid OID to use 494 * \param pk_alg place to store public key algorithm 495 * 496 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 497 */ 498 int mbedtls_oid_get_pk_alg(const mbedtls_asn1_buf *oid, mbedtls_pk_type_t *pk_alg); 499 500 /** 501 * \brief Translate pk_type into PublicKeyAlgorithm OID 502 * 503 * \param pk_alg Public key type to look for 504 * \param oid place to store ASN.1 OID string pointer 505 * \param olen length of the OID 506 * 507 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 508 */ 509 int mbedtls_oid_get_oid_by_pk_alg(mbedtls_pk_type_t pk_alg, 510 const char **oid, size_t *olen); 511 512 #if defined(MBEDTLS_ECP_C) 513 /** 514 * \brief Translate NamedCurve OID into an EC group identifier 515 * 516 * \param oid OID to use 517 * \param grp_id place to store group id 518 * 519 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 520 */ 521 int mbedtls_oid_get_ec_grp(const mbedtls_asn1_buf *oid, mbedtls_ecp_group_id *grp_id); 522 523 /** 524 * \brief Translate EC group identifier into NamedCurve OID 525 * 526 * \param grp_id EC group identifier 527 * \param oid place to store ASN.1 OID string pointer 528 * \param olen length of the OID 529 * 530 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 531 */ 532 int mbedtls_oid_get_oid_by_ec_grp(mbedtls_ecp_group_id grp_id, 533 const char **oid, size_t *olen); 534 #endif /* MBEDTLS_ECP_C */ 535 536 /** 537 * \brief Translate SignatureAlgorithm OID into md_type and pk_type 538 * 539 * \param oid OID to use 540 * \param md_alg place to store message digest algorithm 541 * \param pk_alg place to store public key algorithm 542 * 543 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 544 */ 545 int mbedtls_oid_get_sig_alg(const mbedtls_asn1_buf *oid, 546 mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg); 547 548 /** 549 * \brief Translate SignatureAlgorithm OID into description 550 * 551 * \param oid OID to use 552 * \param desc place to store string pointer 553 * 554 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 555 */ 556 int mbedtls_oid_get_sig_alg_desc(const mbedtls_asn1_buf *oid, const char **desc); 557 558 /** 559 * \brief Translate md_type and pk_type into SignatureAlgorithm OID 560 * 561 * \param md_alg message digest algorithm 562 * \param pk_alg public key algorithm 563 * \param oid place to store ASN.1 OID string pointer 564 * \param olen length of the OID 565 * 566 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 567 */ 568 int mbedtls_oid_get_oid_by_sig_alg(mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, 569 const char **oid, size_t *olen); 570 571 /** 572 * \brief Translate hmac algorithm OID into md_type 573 * 574 * \param oid OID to use 575 * \param md_hmac place to store message hmac algorithm 576 * 577 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 578 */ 579 int mbedtls_oid_get_md_hmac(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_hmac); 580 581 /** 582 * \brief Translate hash algorithm OID into md_type 583 * 584 * \param oid OID to use 585 * \param md_alg place to store message digest algorithm 586 * 587 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 588 */ 589 int mbedtls_oid_get_md_alg(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg); 590 591 #if !defined(MBEDTLS_X509_REMOVE_INFO) 592 /** 593 * \brief Translate Extended Key Usage OID into description 594 * 595 * \param oid OID to use 596 * \param desc place to store string pointer 597 * 598 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 599 */ 600 int mbedtls_oid_get_extended_key_usage(const mbedtls_asn1_buf *oid, const char **desc); 601 #endif 602 603 /** 604 * \brief Translate certificate policies OID into description 605 * 606 * \param oid OID to use 607 * \param desc place to store string pointer 608 * 609 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 610 */ 611 int mbedtls_oid_get_certificate_policies(const mbedtls_asn1_buf *oid, const char **desc); 612 613 /** 614 * \brief Translate md_type into hash algorithm OID 615 * 616 * \param md_alg message digest algorithm 617 * \param oid place to store ASN.1 OID string pointer 618 * \param olen length of the OID 619 * 620 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 621 */ 622 int mbedtls_oid_get_oid_by_md(mbedtls_md_type_t md_alg, const char **oid, size_t *olen); 623 624 #if defined(MBEDTLS_CIPHER_C) 625 /** 626 * \brief Translate encryption algorithm OID into cipher_type 627 * 628 * \param oid OID to use 629 * \param cipher_alg place to store cipher algorithm 630 * 631 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 632 */ 633 int mbedtls_oid_get_cipher_alg(const mbedtls_asn1_buf *oid, mbedtls_cipher_type_t *cipher_alg); 634 #endif /* MBEDTLS_CIPHER_C */ 635 636 #if defined(MBEDTLS_PKCS12_C) 637 /** 638 * \brief Translate PKCS#12 PBE algorithm OID into md_type and 639 * cipher_type 640 * 641 * \param oid OID to use 642 * \param md_alg place to store message digest algorithm 643 * \param cipher_alg place to store cipher algorithm 644 * 645 * \return 0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND 646 */ 647 int mbedtls_oid_get_pkcs12_pbe_alg(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg, 648 mbedtls_cipher_type_t *cipher_alg); 649 #endif /* MBEDTLS_PKCS12_C */ 650 651 #ifdef __cplusplus 652 } 653 #endif 654 655 #endif /* oid.h */ 656