oid.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650
  1. /**
  2. * \file oid.c
  3. *
  4. * \brief Object Identifier (OID) database
  5. *
  6. * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
  7. * SPDX-License-Identifier: Apache-2.0
  8. *
  9. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  10. * not use this file except in compliance with the License.
  11. * You may obtain a copy of the License at
  12. *
  13. * http://www.apache.org/licenses/LICENSE-2.0
  14. *
  15. * Unless required by applicable law or agreed to in writing, software
  16. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  17. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  18. * See the License for the specific language governing permissions and
  19. * limitations under the License.
  20. *
  21. * This file is part of mbed TLS (https://tls.mbed.org)
  22. */
  23. #if !defined(MBEDTLS_CONFIG_FILE)
  24. #include "mbedtls/config.h"
  25. #else
  26. #include MBEDTLS_CONFIG_FILE
  27. #endif
  28. #if defined(MBEDTLS_OID_C)
  29. #include "mbedtls/oid.h"
  30. #include "mbedtls/rsa.h"
  31. #include <stdio.h>
  32. #include <string.h>
  33. #if defined(MBEDTLS_PLATFORM_C)
  34. #include "mbedtls/platform.h"
  35. #else
  36. #define mbedtls_snprintf snprintf
  37. #endif
  38. #if defined(MBEDTLS_X509_USE_C) || defined(MBEDTLS_X509_CREATE_C)
  39. #include "mbedtls/x509.h"
  40. #endif
  41. /*
  42. * Macro to automatically add the size of #define'd OIDs
  43. */
  44. #define ADD_LEN(s) s, MBEDTLS_OID_SIZE(s)
  45. /*
  46. * Macro to generate an internal function for oid_XXX_from_asn1() (used by
  47. * the other functions)
  48. */
  49. #define FN_OID_TYPED_FROM_ASN1( TYPE_T, NAME, LIST ) \
  50. static const TYPE_T * oid_ ## NAME ## _from_asn1( const mbedtls_asn1_buf *oid ) \
  51. { \
  52. const TYPE_T *p = LIST; \
  53. const mbedtls_oid_descriptor_t *cur = (const mbedtls_oid_descriptor_t *) p; \
  54. if( p == NULL || oid == NULL ) return( NULL ); \
  55. while( cur->asn1 != NULL ) { \
  56. if( cur->asn1_len == oid->len && \
  57. memcmp( cur->asn1, oid->p, oid->len ) == 0 ) { \
  58. return( p ); \
  59. } \
  60. p++; \
  61. cur = (const mbedtls_oid_descriptor_t *) p; \
  62. } \
  63. return( NULL ); \
  64. }
  65. /*
  66. * Macro to generate a function for retrieving a single attribute from the
  67. * descriptor of an mbedtls_oid_descriptor_t wrapper.
  68. */
  69. #define FN_OID_GET_DESCRIPTOR_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
  70. int FN_NAME( const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1 ) \
  71. { \
  72. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1( oid ); \
  73. if( data == NULL ) return( MBEDTLS_ERR_OID_NOT_FOUND ); \
  74. *ATTR1 = data->descriptor.ATTR1; \
  75. return( 0 ); \
  76. }
  77. /*
  78. * Macro to generate a function for retrieving a single attribute from an
  79. * mbedtls_oid_descriptor_t wrapper.
  80. */
  81. #define FN_OID_GET_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
  82. int FN_NAME( const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1 ) \
  83. { \
  84. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1( oid ); \
  85. if( data == NULL ) return( MBEDTLS_ERR_OID_NOT_FOUND ); \
  86. *ATTR1 = data->ATTR1; \
  87. return( 0 ); \
  88. }
  89. /*
  90. * Macro to generate a function for retrieving two attributes from an
  91. * mbedtls_oid_descriptor_t wrapper.
  92. */
  93. #define FN_OID_GET_ATTR2(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1, \
  94. ATTR2_TYPE, ATTR2) \
  95. int FN_NAME( const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1, ATTR2_TYPE * ATTR2 ) \
  96. { \
  97. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1( oid ); \
  98. if( data == NULL ) return( MBEDTLS_ERR_OID_NOT_FOUND ); \
  99. *ATTR1 = data->ATTR1; \
  100. *ATTR2 = data->ATTR2; \
  101. return( 0 ); \
  102. }
  103. /*
  104. * Macro to generate a function for retrieving the OID based on a single
  105. * attribute from a mbedtls_oid_descriptor_t wrapper.
  106. */
  107. #define FN_OID_GET_OID_BY_ATTR1(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1) \
  108. int FN_NAME( ATTR1_TYPE ATTR1, const char **oid, size_t *olen ) \
  109. { \
  110. const TYPE_T *cur = LIST; \
  111. while( cur->descriptor.asn1 != NULL ) { \
  112. if( cur->ATTR1 == ATTR1 ) { \
  113. *oid = cur->descriptor.asn1; \
  114. *olen = cur->descriptor.asn1_len; \
  115. return( 0 ); \
  116. } \
  117. cur++; \
  118. } \
  119. return( MBEDTLS_ERR_OID_NOT_FOUND ); \
  120. }
  121. /*
  122. * Macro to generate a function for retrieving the OID based on two
  123. * attributes from a mbedtls_oid_descriptor_t wrapper.
  124. */
  125. #define FN_OID_GET_OID_BY_ATTR2(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1, \
  126. ATTR2_TYPE, ATTR2) \
  127. int FN_NAME( ATTR1_TYPE ATTR1, ATTR2_TYPE ATTR2, const char **oid , \
  128. size_t *olen ) \
  129. { \
  130. const TYPE_T *cur = LIST; \
  131. while( cur->descriptor.asn1 != NULL ) { \
  132. if( cur->ATTR1 == ATTR1 && cur->ATTR2 == ATTR2 ) { \
  133. *oid = cur->descriptor.asn1; \
  134. *olen = cur->descriptor.asn1_len; \
  135. return( 0 ); \
  136. } \
  137. cur++; \
  138. } \
  139. return( MBEDTLS_ERR_OID_NOT_FOUND ); \
  140. }
  141. /*
  142. * For X520 attribute types
  143. */
  144. typedef struct {
  145. mbedtls_oid_descriptor_t descriptor;
  146. const char *short_name;
  147. } oid_x520_attr_t;
  148. static const oid_x520_attr_t oid_x520_attr_type[] =
  149. {
  150. {
  151. { ADD_LEN( MBEDTLS_OID_AT_CN ), "id-at-commonName", "Common Name" },
  152. "CN",
  153. },
  154. {
  155. { ADD_LEN( MBEDTLS_OID_AT_COUNTRY ), "id-at-countryName", "Country" },
  156. "C",
  157. },
  158. {
  159. { ADD_LEN( MBEDTLS_OID_AT_LOCALITY ), "id-at-locality", "Locality" },
  160. "L",
  161. },
  162. {
  163. { ADD_LEN( MBEDTLS_OID_AT_STATE ), "id-at-state", "State" },
  164. "ST",
  165. },
  166. {
  167. { ADD_LEN( MBEDTLS_OID_AT_ORGANIZATION ),"id-at-organizationName", "Organization" },
  168. "O",
  169. },
  170. {
  171. { ADD_LEN( MBEDTLS_OID_AT_ORG_UNIT ), "id-at-organizationalUnitName", "Org Unit" },
  172. "OU",
  173. },
  174. {
  175. { ADD_LEN( MBEDTLS_OID_PKCS9_EMAIL ), "emailAddress", "E-mail address" },
  176. "emailAddress",
  177. },
  178. {
  179. { ADD_LEN( MBEDTLS_OID_AT_SERIAL_NUMBER ),"id-at-serialNumber", "Serial number" },
  180. "serialNumber",
  181. },
  182. {
  183. { ADD_LEN( MBEDTLS_OID_AT_POSTAL_ADDRESS ),"id-at-postalAddress", "Postal address" },
  184. "postalAddress",
  185. },
  186. {
  187. { ADD_LEN( MBEDTLS_OID_AT_POSTAL_CODE ), "id-at-postalCode", "Postal code" },
  188. "postalCode",
  189. },
  190. {
  191. { ADD_LEN( MBEDTLS_OID_AT_SUR_NAME ), "id-at-surName", "Surname" },
  192. "SN",
  193. },
  194. {
  195. { ADD_LEN( MBEDTLS_OID_AT_GIVEN_NAME ), "id-at-givenName", "Given name" },
  196. "GN",
  197. },
  198. {
  199. { ADD_LEN( MBEDTLS_OID_AT_INITIALS ), "id-at-initials", "Initials" },
  200. "initials",
  201. },
  202. {
  203. { ADD_LEN( MBEDTLS_OID_AT_GENERATION_QUALIFIER ), "id-at-generationQualifier", "Generation qualifier" },
  204. "generationQualifier",
  205. },
  206. {
  207. { ADD_LEN( MBEDTLS_OID_AT_TITLE ), "id-at-title", "Title" },
  208. "title",
  209. },
  210. {
  211. { ADD_LEN( MBEDTLS_OID_AT_DN_QUALIFIER ),"id-at-dnQualifier", "Distinguished Name qualifier" },
  212. "dnQualifier",
  213. },
  214. {
  215. { ADD_LEN( MBEDTLS_OID_AT_PSEUDONYM ), "id-at-pseudonym", "Pseudonym" },
  216. "pseudonym",
  217. },
  218. {
  219. { ADD_LEN( MBEDTLS_OID_DOMAIN_COMPONENT ), "id-domainComponent", "Domain component" },
  220. "DC",
  221. },
  222. {
  223. { ADD_LEN( MBEDTLS_OID_AT_UNIQUE_IDENTIFIER ), "id-at-uniqueIdentifier", "Unique Identifier" },
  224. "uniqueIdentifier",
  225. },
  226. {
  227. { NULL, 0, NULL, NULL },
  228. NULL,
  229. }
  230. };
  231. FN_OID_TYPED_FROM_ASN1(oid_x520_attr_t, x520_attr, oid_x520_attr_type)
  232. FN_OID_GET_ATTR1(mbedtls_oid_get_attr_short_name, oid_x520_attr_t, x520_attr, const char *, short_name)
  233. #if defined(MBEDTLS_X509_USE_C) || defined(MBEDTLS_X509_CREATE_C)
  234. /*
  235. * For X509 extensions
  236. */
  237. typedef struct {
  238. mbedtls_oid_descriptor_t descriptor;
  239. int ext_type;
  240. } oid_x509_ext_t;
  241. static const oid_x509_ext_t oid_x509_ext[] =
  242. {
  243. {
  244. { ADD_LEN( MBEDTLS_OID_BASIC_CONSTRAINTS ), "id-ce-basicConstraints", "Basic Constraints" },
  245. MBEDTLS_X509_EXT_BASIC_CONSTRAINTS,
  246. },
  247. {
  248. { ADD_LEN( MBEDTLS_OID_KEY_USAGE ), "id-ce-keyUsage", "Key Usage" },
  249. MBEDTLS_X509_EXT_KEY_USAGE,
  250. },
  251. {
  252. { ADD_LEN( MBEDTLS_OID_EXTENDED_KEY_USAGE ), "id-ce-extKeyUsage", "Extended Key Usage" },
  253. MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE,
  254. },
  255. {
  256. { ADD_LEN( MBEDTLS_OID_SUBJECT_ALT_NAME ), "id-ce-subjectAltName", "Subject Alt Name" },
  257. MBEDTLS_X509_EXT_SUBJECT_ALT_NAME,
  258. },
  259. {
  260. { ADD_LEN( MBEDTLS_OID_NS_CERT_TYPE ), "id-netscape-certtype", "Netscape Certificate Type" },
  261. MBEDTLS_X509_EXT_NS_CERT_TYPE,
  262. },
  263. {
  264. { NULL, 0, NULL, NULL },
  265. 0,
  266. },
  267. };
  268. FN_OID_TYPED_FROM_ASN1(oid_x509_ext_t, x509_ext, oid_x509_ext)
  269. FN_OID_GET_ATTR1(mbedtls_oid_get_x509_ext_type, oid_x509_ext_t, x509_ext, int, ext_type)
  270. static const mbedtls_oid_descriptor_t oid_ext_key_usage[] =
  271. {
  272. { ADD_LEN( MBEDTLS_OID_SERVER_AUTH ), "id-kp-serverAuth", "TLS Web Server Authentication" },
  273. { ADD_LEN( MBEDTLS_OID_CLIENT_AUTH ), "id-kp-clientAuth", "TLS Web Client Authentication" },
  274. { ADD_LEN( MBEDTLS_OID_CODE_SIGNING ), "id-kp-codeSigning", "Code Signing" },
  275. { ADD_LEN( MBEDTLS_OID_EMAIL_PROTECTION ), "id-kp-emailProtection", "E-mail Protection" },
  276. { ADD_LEN( MBEDTLS_OID_TIME_STAMPING ), "id-kp-timeStamping", "Time Stamping" },
  277. { ADD_LEN( MBEDTLS_OID_OCSP_SIGNING ), "id-kp-OCSPSigning", "OCSP Signing" },
  278. { NULL, 0, NULL, NULL },
  279. };
  280. FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, ext_key_usage, oid_ext_key_usage)
  281. FN_OID_GET_ATTR1(mbedtls_oid_get_extended_key_usage, mbedtls_oid_descriptor_t, ext_key_usage, const char *, description)
  282. #endif /* MBEDTLS_X509_USE_C || MBEDTLS_X509_CREATE_C */
  283. #if defined(MBEDTLS_MD_C)
  284. /*
  285. * For SignatureAlgorithmIdentifier
  286. */
  287. typedef struct {
  288. mbedtls_oid_descriptor_t descriptor;
  289. mbedtls_md_type_t md_alg;
  290. mbedtls_pk_type_t pk_alg;
  291. } oid_sig_alg_t;
  292. static const oid_sig_alg_t oid_sig_alg[] =
  293. {
  294. {
  295. { ADD_LEN( MBEDTLS_OID_PKCS1_MD2 ), "md2WithRSAEncryption", "RSA with MD2" },
  296. MBEDTLS_MD_MD2, MBEDTLS_PK_RSA,
  297. },
  298. {
  299. { ADD_LEN( MBEDTLS_OID_PKCS1_MD4 ), "md4WithRSAEncryption", "RSA with MD4" },
  300. MBEDTLS_MD_MD4, MBEDTLS_PK_RSA,
  301. },
  302. {
  303. { ADD_LEN( MBEDTLS_OID_PKCS1_MD5 ), "md5WithRSAEncryption", "RSA with MD5" },
  304. MBEDTLS_MD_MD5, MBEDTLS_PK_RSA,
  305. },
  306. {
  307. { ADD_LEN( MBEDTLS_OID_PKCS1_SHA1 ), "sha-1WithRSAEncryption", "RSA with SHA1" },
  308. MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
  309. },
  310. {
  311. { ADD_LEN( MBEDTLS_OID_PKCS1_SHA224 ), "sha224WithRSAEncryption", "RSA with SHA-224" },
  312. MBEDTLS_MD_SHA224, MBEDTLS_PK_RSA,
  313. },
  314. {
  315. { ADD_LEN( MBEDTLS_OID_PKCS1_SHA256 ), "sha256WithRSAEncryption", "RSA with SHA-256" },
  316. MBEDTLS_MD_SHA256, MBEDTLS_PK_RSA,
  317. },
  318. {
  319. { ADD_LEN( MBEDTLS_OID_PKCS1_SHA384 ), "sha384WithRSAEncryption", "RSA with SHA-384" },
  320. MBEDTLS_MD_SHA384, MBEDTLS_PK_RSA,
  321. },
  322. {
  323. { ADD_LEN( MBEDTLS_OID_PKCS1_SHA512 ), "sha512WithRSAEncryption", "RSA with SHA-512" },
  324. MBEDTLS_MD_SHA512, MBEDTLS_PK_RSA,
  325. },
  326. {
  327. { ADD_LEN( MBEDTLS_OID_RSA_SHA_OBS ), "sha-1WithRSAEncryption", "RSA with SHA1" },
  328. MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
  329. },
  330. {
  331. { ADD_LEN( MBEDTLS_OID_ECDSA_SHA1 ), "ecdsa-with-SHA1", "ECDSA with SHA1" },
  332. MBEDTLS_MD_SHA1, MBEDTLS_PK_ECDSA,
  333. },
  334. {
  335. { ADD_LEN( MBEDTLS_OID_ECDSA_SHA224 ), "ecdsa-with-SHA224", "ECDSA with SHA224" },
  336. MBEDTLS_MD_SHA224, MBEDTLS_PK_ECDSA,
  337. },
  338. {
  339. { ADD_LEN( MBEDTLS_OID_ECDSA_SHA256 ), "ecdsa-with-SHA256", "ECDSA with SHA256" },
  340. MBEDTLS_MD_SHA256, MBEDTLS_PK_ECDSA,
  341. },
  342. {
  343. { ADD_LEN( MBEDTLS_OID_ECDSA_SHA384 ), "ecdsa-with-SHA384", "ECDSA with SHA384" },
  344. MBEDTLS_MD_SHA384, MBEDTLS_PK_ECDSA,
  345. },
  346. {
  347. { ADD_LEN( MBEDTLS_OID_ECDSA_SHA512 ), "ecdsa-with-SHA512", "ECDSA with SHA512" },
  348. MBEDTLS_MD_SHA512, MBEDTLS_PK_ECDSA,
  349. },
  350. {
  351. { ADD_LEN( MBEDTLS_OID_RSASSA_PSS ), "RSASSA-PSS", "RSASSA-PSS" },
  352. MBEDTLS_MD_NONE, MBEDTLS_PK_RSASSA_PSS,
  353. },
  354. {
  355. { NULL, 0, NULL, NULL },
  356. MBEDTLS_MD_NONE, MBEDTLS_PK_NONE,
  357. },
  358. };
  359. FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
  360. FN_OID_GET_DESCRIPTOR_ATTR1(mbedtls_oid_get_sig_alg_desc, oid_sig_alg_t, sig_alg, const char *, description)
  361. FN_OID_GET_ATTR2(mbedtls_oid_get_sig_alg, oid_sig_alg_t, sig_alg, mbedtls_md_type_t, md_alg, mbedtls_pk_type_t, pk_alg)
  362. FN_OID_GET_OID_BY_ATTR2(mbedtls_oid_get_oid_by_sig_alg, oid_sig_alg_t, oid_sig_alg, mbedtls_pk_type_t, pk_alg, mbedtls_md_type_t, md_alg)
  363. #endif /* MBEDTLS_MD_C */
  364. /*
  365. * For PublicKeyInfo (PKCS1, RFC 5480)
  366. */
  367. typedef struct {
  368. mbedtls_oid_descriptor_t descriptor;
  369. mbedtls_pk_type_t pk_alg;
  370. } oid_pk_alg_t;
  371. static const oid_pk_alg_t oid_pk_alg[] =
  372. {
  373. {
  374. { ADD_LEN( MBEDTLS_OID_PKCS1_RSA ), "rsaEncryption", "RSA" },
  375. MBEDTLS_PK_RSA,
  376. },
  377. {
  378. { ADD_LEN( MBEDTLS_OID_EC_ALG_UNRESTRICTED ), "id-ecPublicKey", "Generic EC key" },
  379. MBEDTLS_PK_ECKEY,
  380. },
  381. {
  382. { ADD_LEN( MBEDTLS_OID_EC_ALG_ECDH ), "id-ecDH", "EC key for ECDH" },
  383. MBEDTLS_PK_ECKEY_DH,
  384. },
  385. {
  386. { NULL, 0, NULL, NULL },
  387. MBEDTLS_PK_NONE,
  388. },
  389. };
  390. FN_OID_TYPED_FROM_ASN1(oid_pk_alg_t, pk_alg, oid_pk_alg)
  391. FN_OID_GET_ATTR1(mbedtls_oid_get_pk_alg, oid_pk_alg_t, pk_alg, mbedtls_pk_type_t, pk_alg)
  392. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_pk_alg, oid_pk_alg_t, oid_pk_alg, mbedtls_pk_type_t, pk_alg)
  393. #if defined(MBEDTLS_ECP_C)
  394. /*
  395. * For namedCurve (RFC 5480)
  396. */
  397. typedef struct {
  398. mbedtls_oid_descriptor_t descriptor;
  399. mbedtls_ecp_group_id grp_id;
  400. } oid_ecp_grp_t;
  401. static const oid_ecp_grp_t oid_ecp_grp[] =
  402. {
  403. {
  404. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP192R1 ), "secp192r1", "secp192r1" },
  405. MBEDTLS_ECP_DP_SECP192R1,
  406. },
  407. {
  408. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP224R1 ), "secp224r1", "secp224r1" },
  409. MBEDTLS_ECP_DP_SECP224R1,
  410. },
  411. {
  412. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP256R1 ), "secp256r1", "secp256r1" },
  413. MBEDTLS_ECP_DP_SECP256R1,
  414. },
  415. {
  416. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP384R1 ), "secp384r1", "secp384r1" },
  417. MBEDTLS_ECP_DP_SECP384R1,
  418. },
  419. {
  420. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP521R1 ), "secp521r1", "secp521r1" },
  421. MBEDTLS_ECP_DP_SECP521R1,
  422. },
  423. {
  424. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP192K1 ), "secp192k1", "secp192k1" },
  425. MBEDTLS_ECP_DP_SECP192K1,
  426. },
  427. {
  428. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP224K1 ), "secp224k1", "secp224k1" },
  429. MBEDTLS_ECP_DP_SECP224K1,
  430. },
  431. {
  432. { ADD_LEN( MBEDTLS_OID_EC_GRP_SECP256K1 ), "secp256k1", "secp256k1" },
  433. MBEDTLS_ECP_DP_SECP256K1,
  434. },
  435. {
  436. { ADD_LEN( MBEDTLS_OID_EC_GRP_BP256R1 ), "brainpoolP256r1","brainpool256r1" },
  437. MBEDTLS_ECP_DP_BP256R1,
  438. },
  439. {
  440. { ADD_LEN( MBEDTLS_OID_EC_GRP_BP384R1 ), "brainpoolP384r1","brainpool384r1" },
  441. MBEDTLS_ECP_DP_BP384R1,
  442. },
  443. {
  444. { ADD_LEN( MBEDTLS_OID_EC_GRP_BP512R1 ), "brainpoolP512r1","brainpool512r1" },
  445. MBEDTLS_ECP_DP_BP512R1,
  446. },
  447. {
  448. { NULL, 0, NULL, NULL },
  449. MBEDTLS_ECP_DP_NONE,
  450. },
  451. };
  452. FN_OID_TYPED_FROM_ASN1(oid_ecp_grp_t, grp_id, oid_ecp_grp)
  453. FN_OID_GET_ATTR1(mbedtls_oid_get_ec_grp, oid_ecp_grp_t, grp_id, mbedtls_ecp_group_id, grp_id)
  454. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_ec_grp, oid_ecp_grp_t, oid_ecp_grp, mbedtls_ecp_group_id, grp_id)
  455. #endif /* MBEDTLS_ECP_C */
  456. #if defined(MBEDTLS_CIPHER_C)
  457. /*
  458. * For PKCS#5 PBES2 encryption algorithm
  459. */
  460. typedef struct {
  461. mbedtls_oid_descriptor_t descriptor;
  462. mbedtls_cipher_type_t cipher_alg;
  463. } oid_cipher_alg_t;
  464. static const oid_cipher_alg_t oid_cipher_alg[] =
  465. {
  466. {
  467. { ADD_LEN( MBEDTLS_OID_DES_CBC ), "desCBC", "DES-CBC" },
  468. MBEDTLS_CIPHER_DES_CBC,
  469. },
  470. {
  471. { ADD_LEN( MBEDTLS_OID_DES_EDE3_CBC ), "des-ede3-cbc", "DES-EDE3-CBC" },
  472. MBEDTLS_CIPHER_DES_EDE3_CBC,
  473. },
  474. {
  475. { NULL, 0, NULL, NULL },
  476. MBEDTLS_CIPHER_NONE,
  477. },
  478. };
  479. FN_OID_TYPED_FROM_ASN1(oid_cipher_alg_t, cipher_alg, oid_cipher_alg)
  480. FN_OID_GET_ATTR1(mbedtls_oid_get_cipher_alg, oid_cipher_alg_t, cipher_alg, mbedtls_cipher_type_t, cipher_alg)
  481. #endif /* MBEDTLS_CIPHER_C */
  482. #if defined(MBEDTLS_MD_C)
  483. /*
  484. * For digestAlgorithm
  485. */
  486. typedef struct {
  487. mbedtls_oid_descriptor_t descriptor;
  488. mbedtls_md_type_t md_alg;
  489. } oid_md_alg_t;
  490. static const oid_md_alg_t oid_md_alg[] =
  491. {
  492. {
  493. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_MD2 ), "id-md2", "MD2" },
  494. MBEDTLS_MD_MD2,
  495. },
  496. {
  497. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_MD4 ), "id-md4", "MD4" },
  498. MBEDTLS_MD_MD4,
  499. },
  500. {
  501. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_MD5 ), "id-md5", "MD5" },
  502. MBEDTLS_MD_MD5,
  503. },
  504. {
  505. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_SHA1 ), "id-sha1", "SHA-1" },
  506. MBEDTLS_MD_SHA1,
  507. },
  508. {
  509. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_SHA224 ), "id-sha224", "SHA-224" },
  510. MBEDTLS_MD_SHA224,
  511. },
  512. {
  513. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_SHA256 ), "id-sha256", "SHA-256" },
  514. MBEDTLS_MD_SHA256,
  515. },
  516. {
  517. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_SHA384 ), "id-sha384", "SHA-384" },
  518. MBEDTLS_MD_SHA384,
  519. },
  520. {
  521. { ADD_LEN( MBEDTLS_OID_DIGEST_ALG_SHA512 ), "id-sha512", "SHA-512" },
  522. MBEDTLS_MD_SHA512,
  523. },
  524. {
  525. { NULL, 0, NULL, NULL },
  526. MBEDTLS_MD_NONE,
  527. },
  528. };
  529. FN_OID_TYPED_FROM_ASN1(oid_md_alg_t, md_alg, oid_md_alg)
  530. FN_OID_GET_ATTR1(mbedtls_oid_get_md_alg, oid_md_alg_t, md_alg, mbedtls_md_type_t, md_alg)
  531. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_md, oid_md_alg_t, oid_md_alg, mbedtls_md_type_t, md_alg)
  532. #endif /* MBEDTLS_MD_C */
  533. #if defined(MBEDTLS_PKCS12_C)
  534. /*
  535. * For PKCS#12 PBEs
  536. */
  537. typedef struct {
  538. mbedtls_oid_descriptor_t descriptor;
  539. mbedtls_md_type_t md_alg;
  540. mbedtls_cipher_type_t cipher_alg;
  541. } oid_pkcs12_pbe_alg_t;
  542. static const oid_pkcs12_pbe_alg_t oid_pkcs12_pbe_alg[] =
  543. {
  544. {
  545. { ADD_LEN( MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC ), "pbeWithSHAAnd3-KeyTripleDES-CBC", "PBE with SHA1 and 3-Key 3DES" },
  546. MBEDTLS_MD_SHA1, MBEDTLS_CIPHER_DES_EDE3_CBC,
  547. },
  548. {
  549. { ADD_LEN( MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC ), "pbeWithSHAAnd2-KeyTripleDES-CBC", "PBE with SHA1 and 2-Key 3DES" },
  550. MBEDTLS_MD_SHA1, MBEDTLS_CIPHER_DES_EDE_CBC,
  551. },
  552. {
  553. { NULL, 0, NULL, NULL },
  554. MBEDTLS_MD_NONE, MBEDTLS_CIPHER_NONE,
  555. },
  556. };
  557. FN_OID_TYPED_FROM_ASN1(oid_pkcs12_pbe_alg_t, pkcs12_pbe_alg, oid_pkcs12_pbe_alg)
  558. FN_OID_GET_ATTR2(mbedtls_oid_get_pkcs12_pbe_alg, oid_pkcs12_pbe_alg_t, pkcs12_pbe_alg, mbedtls_md_type_t, md_alg, mbedtls_cipher_type_t, cipher_alg)
  559. #endif /* MBEDTLS_PKCS12_C */
  560. #define OID_SAFE_SNPRINTF \
  561. do { \
  562. if( ret < 0 || (size_t) ret >= n ) \
  563. return( MBEDTLS_ERR_OID_BUF_TOO_SMALL ); \
  564. \
  565. n -= (size_t) ret; \
  566. p += (size_t) ret; \
  567. } while( 0 )
  568. /* Return the x.y.z.... style numeric string for the given OID */
  569. int mbedtls_oid_get_numeric_string( char *buf, size_t size,
  570. const mbedtls_asn1_buf *oid )
  571. {
  572. int ret;
  573. size_t i, n;
  574. unsigned int value;
  575. char *p;
  576. p = buf;
  577. n = size;
  578. /* First byte contains first two dots */
  579. if( oid->len > 0 )
  580. {
  581. ret = mbedtls_snprintf( p, n, "%d.%d", oid->p[0] / 40, oid->p[0] % 40 );
  582. OID_SAFE_SNPRINTF;
  583. }
  584. value = 0;
  585. for( i = 1; i < oid->len; i++ )
  586. {
  587. /* Prevent overflow in value. */
  588. if( ( ( value << 7 ) >> 7 ) != value )
  589. return( MBEDTLS_ERR_OID_BUF_TOO_SMALL );
  590. value <<= 7;
  591. value += oid->p[i] & 0x7F;
  592. if( !( oid->p[i] & 0x80 ) )
  593. {
  594. /* Last byte */
  595. ret = mbedtls_snprintf( p, n, ".%d", value );
  596. OID_SAFE_SNPRINTF;
  597. value = 0;
  598. }
  599. }
  600. return( (int) ( size - n ) );
  601. }
  602. #endif /* MBEDTLS_OID_C */