oid.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847
  1. /**
  2. * \file oid.c
  3. *
  4. * \brief Object Identifier (OID) database
  5. *
  6. * Copyright The Mbed TLS Contributors
  7. * SPDX-License-Identifier: Apache-2.0
  8. *
  9. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  10. * not use this file except in compliance with the License.
  11. * You may obtain a copy of the License at
  12. *
  13. * http://www.apache.org/licenses/LICENSE-2.0
  14. *
  15. * Unless required by applicable law or agreed to in writing, software
  16. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  17. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  18. * See the License for the specific language governing permissions and
  19. * limitations under the License.
  20. */
  21. #include "common.h"
  22. #if defined(MBEDTLS_OID_C)
  23. #include "mbedtls/oid.h"
  24. #include "mbedtls/rsa.h"
  25. #include "mbedtls/error.h"
  26. #include <stdio.h>
  27. #include <string.h>
  28. #include "mbedtls/platform.h"
  29. /*
  30. * Macro to automatically add the size of #define'd OIDs
  31. */
  32. #define ADD_LEN(s) s, MBEDTLS_OID_SIZE(s)
  33. /*
  34. * Macro to generate an internal function for oid_XXX_from_asn1() (used by
  35. * the other functions)
  36. */
  37. #define FN_OID_TYPED_FROM_ASN1(TYPE_T, NAME, LIST) \
  38. static const TYPE_T *oid_ ## NAME ## _from_asn1( \
  39. const mbedtls_asn1_buf *oid) \
  40. { \
  41. const TYPE_T *p = (LIST); \
  42. const mbedtls_oid_descriptor_t *cur = \
  43. (const mbedtls_oid_descriptor_t *) p; \
  44. if (p == NULL || oid == NULL) return NULL; \
  45. while (cur->asn1 != NULL) { \
  46. if (cur->asn1_len == oid->len && \
  47. memcmp(cur->asn1, oid->p, oid->len) == 0) { \
  48. return p; \
  49. } \
  50. p++; \
  51. cur = (const mbedtls_oid_descriptor_t *) p; \
  52. } \
  53. return NULL; \
  54. }
  55. /*
  56. * Macro to generate a function for retrieving a single attribute from the
  57. * descriptor of an mbedtls_oid_descriptor_t wrapper.
  58. */
  59. #define FN_OID_GET_DESCRIPTOR_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
  60. int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
  61. { \
  62. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
  63. if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND; \
  64. *ATTR1 = data->descriptor.ATTR1; \
  65. return 0; \
  66. }
  67. /*
  68. * Macro to generate a function for retrieving a single attribute from an
  69. * mbedtls_oid_descriptor_t wrapper.
  70. */
  71. #define FN_OID_GET_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
  72. int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1) \
  73. { \
  74. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
  75. if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND; \
  76. *ATTR1 = data->ATTR1; \
  77. return 0; \
  78. }
  79. /*
  80. * Macro to generate a function for retrieving two attributes from an
  81. * mbedtls_oid_descriptor_t wrapper.
  82. */
  83. #define FN_OID_GET_ATTR2(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1, \
  84. ATTR2_TYPE, ATTR2) \
  85. int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1, \
  86. ATTR2_TYPE * ATTR2) \
  87. { \
  88. const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid); \
  89. if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND; \
  90. *(ATTR1) = data->ATTR1; \
  91. *(ATTR2) = data->ATTR2; \
  92. return 0; \
  93. }
  94. /*
  95. * Macro to generate a function for retrieving the OID based on a single
  96. * attribute from a mbedtls_oid_descriptor_t wrapper.
  97. */
  98. #define FN_OID_GET_OID_BY_ATTR1(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1) \
  99. int FN_NAME(ATTR1_TYPE ATTR1, const char **oid, size_t *olen) \
  100. { \
  101. const TYPE_T *cur = (LIST); \
  102. while (cur->descriptor.asn1 != NULL) { \
  103. if (cur->ATTR1 == (ATTR1)) { \
  104. *oid = cur->descriptor.asn1; \
  105. *olen = cur->descriptor.asn1_len; \
  106. return 0; \
  107. } \
  108. cur++; \
  109. } \
  110. return MBEDTLS_ERR_OID_NOT_FOUND; \
  111. }
  112. /*
  113. * Macro to generate a function for retrieving the OID based on two
  114. * attributes from a mbedtls_oid_descriptor_t wrapper.
  115. */
  116. #define FN_OID_GET_OID_BY_ATTR2(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1, \
  117. ATTR2_TYPE, ATTR2) \
  118. int FN_NAME(ATTR1_TYPE ATTR1, ATTR2_TYPE ATTR2, const char **oid, \
  119. size_t *olen) \
  120. { \
  121. const TYPE_T *cur = (LIST); \
  122. while (cur->descriptor.asn1 != NULL) { \
  123. if (cur->ATTR1 == (ATTR1) && cur->ATTR2 == (ATTR2)) { \
  124. *oid = cur->descriptor.asn1; \
  125. *olen = cur->descriptor.asn1_len; \
  126. return 0; \
  127. } \
  128. cur++; \
  129. } \
  130. return MBEDTLS_ERR_OID_NOT_FOUND; \
  131. }
  132. /*
  133. * For X520 attribute types
  134. */
  135. typedef struct {
  136. mbedtls_oid_descriptor_t descriptor;
  137. const char *short_name;
  138. } oid_x520_attr_t;
  139. static const oid_x520_attr_t oid_x520_attr_type[] =
  140. {
  141. {
  142. { ADD_LEN(MBEDTLS_OID_AT_CN), "id-at-commonName", "Common Name" },
  143. "CN",
  144. },
  145. {
  146. { ADD_LEN(MBEDTLS_OID_AT_COUNTRY), "id-at-countryName", "Country" },
  147. "C",
  148. },
  149. {
  150. { ADD_LEN(MBEDTLS_OID_AT_LOCALITY), "id-at-locality", "Locality" },
  151. "L",
  152. },
  153. {
  154. { ADD_LEN(MBEDTLS_OID_AT_STATE), "id-at-state", "State" },
  155. "ST",
  156. },
  157. {
  158. { ADD_LEN(MBEDTLS_OID_AT_ORGANIZATION), "id-at-organizationName", "Organization" },
  159. "O",
  160. },
  161. {
  162. { ADD_LEN(MBEDTLS_OID_AT_ORG_UNIT), "id-at-organizationalUnitName", "Org Unit" },
  163. "OU",
  164. },
  165. {
  166. { ADD_LEN(MBEDTLS_OID_PKCS9_EMAIL), "emailAddress", "E-mail address" },
  167. "emailAddress",
  168. },
  169. {
  170. { ADD_LEN(MBEDTLS_OID_AT_SERIAL_NUMBER), "id-at-serialNumber", "Serial number" },
  171. "serialNumber",
  172. },
  173. {
  174. { ADD_LEN(MBEDTLS_OID_AT_POSTAL_ADDRESS), "id-at-postalAddress",
  175. "Postal address" },
  176. "postalAddress",
  177. },
  178. {
  179. { ADD_LEN(MBEDTLS_OID_AT_POSTAL_CODE), "id-at-postalCode", "Postal code" },
  180. "postalCode",
  181. },
  182. {
  183. { ADD_LEN(MBEDTLS_OID_AT_SUR_NAME), "id-at-surName", "Surname" },
  184. "SN",
  185. },
  186. {
  187. { ADD_LEN(MBEDTLS_OID_AT_GIVEN_NAME), "id-at-givenName", "Given name" },
  188. "GN",
  189. },
  190. {
  191. { ADD_LEN(MBEDTLS_OID_AT_INITIALS), "id-at-initials", "Initials" },
  192. "initials",
  193. },
  194. {
  195. { ADD_LEN(MBEDTLS_OID_AT_GENERATION_QUALIFIER), "id-at-generationQualifier",
  196. "Generation qualifier" },
  197. "generationQualifier",
  198. },
  199. {
  200. { ADD_LEN(MBEDTLS_OID_AT_TITLE), "id-at-title", "Title" },
  201. "title",
  202. },
  203. {
  204. { ADD_LEN(MBEDTLS_OID_AT_DN_QUALIFIER), "id-at-dnQualifier",
  205. "Distinguished Name qualifier" },
  206. "dnQualifier",
  207. },
  208. {
  209. { ADD_LEN(MBEDTLS_OID_AT_PSEUDONYM), "id-at-pseudonym", "Pseudonym" },
  210. "pseudonym",
  211. },
  212. {
  213. { ADD_LEN(MBEDTLS_OID_DOMAIN_COMPONENT), "id-domainComponent",
  214. "Domain component" },
  215. "DC",
  216. },
  217. {
  218. { ADD_LEN(MBEDTLS_OID_AT_UNIQUE_IDENTIFIER), "id-at-uniqueIdentifier",
  219. "Unique Identifier" },
  220. "uniqueIdentifier",
  221. },
  222. {
  223. { NULL, 0, NULL, NULL },
  224. NULL,
  225. }
  226. };
  227. FN_OID_TYPED_FROM_ASN1(oid_x520_attr_t, x520_attr, oid_x520_attr_type)
  228. FN_OID_GET_ATTR1(mbedtls_oid_get_attr_short_name,
  229. oid_x520_attr_t,
  230. x520_attr,
  231. const char *,
  232. short_name)
  233. /*
  234. * For X509 extensions
  235. */
  236. typedef struct {
  237. mbedtls_oid_descriptor_t descriptor;
  238. int ext_type;
  239. } oid_x509_ext_t;
  240. static const oid_x509_ext_t oid_x509_ext[] =
  241. {
  242. {
  243. { ADD_LEN(MBEDTLS_OID_BASIC_CONSTRAINTS), "id-ce-basicConstraints",
  244. "Basic Constraints" },
  245. MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS,
  246. },
  247. {
  248. { ADD_LEN(MBEDTLS_OID_KEY_USAGE), "id-ce-keyUsage", "Key Usage" },
  249. MBEDTLS_OID_X509_EXT_KEY_USAGE,
  250. },
  251. {
  252. { ADD_LEN(MBEDTLS_OID_EXTENDED_KEY_USAGE), "id-ce-extKeyUsage",
  253. "Extended Key Usage" },
  254. MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE,
  255. },
  256. {
  257. { ADD_LEN(MBEDTLS_OID_SUBJECT_ALT_NAME), "id-ce-subjectAltName",
  258. "Subject Alt Name" },
  259. MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME,
  260. },
  261. {
  262. { ADD_LEN(MBEDTLS_OID_NS_CERT_TYPE), "id-netscape-certtype",
  263. "Netscape Certificate Type" },
  264. MBEDTLS_OID_X509_EXT_NS_CERT_TYPE,
  265. },
  266. {
  267. { ADD_LEN(MBEDTLS_OID_CERTIFICATE_POLICIES), "id-ce-certificatePolicies",
  268. "Certificate Policies" },
  269. MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES,
  270. },
  271. {
  272. { NULL, 0, NULL, NULL },
  273. 0,
  274. },
  275. };
  276. FN_OID_TYPED_FROM_ASN1(oid_x509_ext_t, x509_ext, oid_x509_ext)
  277. FN_OID_GET_ATTR1(mbedtls_oid_get_x509_ext_type, oid_x509_ext_t, x509_ext, int, ext_type)
  278. static const mbedtls_oid_descriptor_t oid_ext_key_usage[] =
  279. {
  280. { ADD_LEN(MBEDTLS_OID_SERVER_AUTH), "id-kp-serverAuth",
  281. "TLS Web Server Authentication" },
  282. { ADD_LEN(MBEDTLS_OID_CLIENT_AUTH), "id-kp-clientAuth",
  283. "TLS Web Client Authentication" },
  284. { ADD_LEN(MBEDTLS_OID_CODE_SIGNING), "id-kp-codeSigning", "Code Signing" },
  285. { ADD_LEN(MBEDTLS_OID_EMAIL_PROTECTION), "id-kp-emailProtection", "E-mail Protection" },
  286. { ADD_LEN(MBEDTLS_OID_TIME_STAMPING), "id-kp-timeStamping", "Time Stamping" },
  287. { ADD_LEN(MBEDTLS_OID_OCSP_SIGNING), "id-kp-OCSPSigning", "OCSP Signing" },
  288. { ADD_LEN(MBEDTLS_OID_WISUN_FAN), "id-kp-wisun-fan-device",
  289. "Wi-SUN Alliance Field Area Network (FAN)" },
  290. { NULL, 0, NULL, NULL },
  291. };
  292. FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, ext_key_usage, oid_ext_key_usage)
  293. FN_OID_GET_ATTR1(mbedtls_oid_get_extended_key_usage,
  294. mbedtls_oid_descriptor_t,
  295. ext_key_usage,
  296. const char *,
  297. description)
  298. static const mbedtls_oid_descriptor_t oid_certificate_policies[] =
  299. {
  300. { ADD_LEN(MBEDTLS_OID_ANY_POLICY), "anyPolicy", "Any Policy" },
  301. { NULL, 0, NULL, NULL },
  302. };
  303. FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, certificate_policies, oid_certificate_policies)
  304. FN_OID_GET_ATTR1(mbedtls_oid_get_certificate_policies,
  305. mbedtls_oid_descriptor_t,
  306. certificate_policies,
  307. const char *,
  308. description)
  309. #if defined(MBEDTLS_MD_C)
  310. /*
  311. * For SignatureAlgorithmIdentifier
  312. */
  313. typedef struct {
  314. mbedtls_oid_descriptor_t descriptor;
  315. mbedtls_md_type_t md_alg;
  316. mbedtls_pk_type_t pk_alg;
  317. } oid_sig_alg_t;
  318. static const oid_sig_alg_t oid_sig_alg[] =
  319. {
  320. #if defined(MBEDTLS_RSA_C)
  321. #if defined(MBEDTLS_MD2_C)
  322. {
  323. { ADD_LEN(MBEDTLS_OID_PKCS1_MD2), "md2WithRSAEncryption", "RSA with MD2" },
  324. MBEDTLS_MD_MD2, MBEDTLS_PK_RSA,
  325. },
  326. #endif /* MBEDTLS_MD2_C */
  327. #if defined(MBEDTLS_MD4_C)
  328. {
  329. { ADD_LEN(MBEDTLS_OID_PKCS1_MD4), "md4WithRSAEncryption", "RSA with MD4" },
  330. MBEDTLS_MD_MD4, MBEDTLS_PK_RSA,
  331. },
  332. #endif /* MBEDTLS_MD4_C */
  333. #if defined(MBEDTLS_MD5_C)
  334. {
  335. { ADD_LEN(MBEDTLS_OID_PKCS1_MD5), "md5WithRSAEncryption", "RSA with MD5" },
  336. MBEDTLS_MD_MD5, MBEDTLS_PK_RSA,
  337. },
  338. #endif /* MBEDTLS_MD5_C */
  339. #if defined(MBEDTLS_SHA1_C)
  340. {
  341. { ADD_LEN(MBEDTLS_OID_PKCS1_SHA1), "sha-1WithRSAEncryption", "RSA with SHA1" },
  342. MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
  343. },
  344. #endif /* MBEDTLS_SHA1_C */
  345. #if defined(MBEDTLS_SHA256_C)
  346. {
  347. { ADD_LEN(MBEDTLS_OID_PKCS1_SHA224), "sha224WithRSAEncryption", "RSA with SHA-224" },
  348. MBEDTLS_MD_SHA224, MBEDTLS_PK_RSA,
  349. },
  350. {
  351. { ADD_LEN(MBEDTLS_OID_PKCS1_SHA256), "sha256WithRSAEncryption", "RSA with SHA-256" },
  352. MBEDTLS_MD_SHA256, MBEDTLS_PK_RSA,
  353. },
  354. #endif /* MBEDTLS_SHA256_C */
  355. #if defined(MBEDTLS_SHA512_C)
  356. {
  357. { ADD_LEN(MBEDTLS_OID_PKCS1_SHA384), "sha384WithRSAEncryption", "RSA with SHA-384" },
  358. MBEDTLS_MD_SHA384, MBEDTLS_PK_RSA,
  359. },
  360. {
  361. { ADD_LEN(MBEDTLS_OID_PKCS1_SHA512), "sha512WithRSAEncryption", "RSA with SHA-512" },
  362. MBEDTLS_MD_SHA512, MBEDTLS_PK_RSA,
  363. },
  364. #endif /* MBEDTLS_SHA512_C */
  365. #if defined(MBEDTLS_SHA1_C)
  366. {
  367. { ADD_LEN(MBEDTLS_OID_RSA_SHA_OBS), "sha-1WithRSAEncryption", "RSA with SHA1" },
  368. MBEDTLS_MD_SHA1, MBEDTLS_PK_RSA,
  369. },
  370. #endif /* MBEDTLS_SHA1_C */
  371. #endif /* MBEDTLS_RSA_C */
  372. #if defined(MBEDTLS_ECDSA_C)
  373. #if defined(MBEDTLS_SHA1_C)
  374. {
  375. { ADD_LEN(MBEDTLS_OID_ECDSA_SHA1), "ecdsa-with-SHA1", "ECDSA with SHA1" },
  376. MBEDTLS_MD_SHA1, MBEDTLS_PK_ECDSA,
  377. },
  378. #endif /* MBEDTLS_SHA1_C */
  379. #if defined(MBEDTLS_SHA256_C)
  380. {
  381. { ADD_LEN(MBEDTLS_OID_ECDSA_SHA224), "ecdsa-with-SHA224", "ECDSA with SHA224" },
  382. MBEDTLS_MD_SHA224, MBEDTLS_PK_ECDSA,
  383. },
  384. {
  385. { ADD_LEN(MBEDTLS_OID_ECDSA_SHA256), "ecdsa-with-SHA256", "ECDSA with SHA256" },
  386. MBEDTLS_MD_SHA256, MBEDTLS_PK_ECDSA,
  387. },
  388. #endif /* MBEDTLS_SHA256_C */
  389. #if defined(MBEDTLS_SHA512_C)
  390. {
  391. { ADD_LEN(MBEDTLS_OID_ECDSA_SHA384), "ecdsa-with-SHA384", "ECDSA with SHA384" },
  392. MBEDTLS_MD_SHA384, MBEDTLS_PK_ECDSA,
  393. },
  394. {
  395. { ADD_LEN(MBEDTLS_OID_ECDSA_SHA512), "ecdsa-with-SHA512", "ECDSA with SHA512" },
  396. MBEDTLS_MD_SHA512, MBEDTLS_PK_ECDSA,
  397. },
  398. #endif /* MBEDTLS_SHA512_C */
  399. #endif /* MBEDTLS_ECDSA_C */
  400. #if defined(MBEDTLS_RSA_C)
  401. {
  402. { ADD_LEN(MBEDTLS_OID_RSASSA_PSS), "RSASSA-PSS", "RSASSA-PSS" },
  403. MBEDTLS_MD_NONE, MBEDTLS_PK_RSASSA_PSS,
  404. },
  405. #endif /* MBEDTLS_RSA_C */
  406. {
  407. { NULL, 0, NULL, NULL },
  408. MBEDTLS_MD_NONE, MBEDTLS_PK_NONE,
  409. },
  410. };
  411. FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
  412. FN_OID_GET_DESCRIPTOR_ATTR1(mbedtls_oid_get_sig_alg_desc,
  413. oid_sig_alg_t,
  414. sig_alg,
  415. const char *,
  416. description)
  417. FN_OID_GET_ATTR2(mbedtls_oid_get_sig_alg,
  418. oid_sig_alg_t,
  419. sig_alg,
  420. mbedtls_md_type_t,
  421. md_alg,
  422. mbedtls_pk_type_t,
  423. pk_alg)
  424. FN_OID_GET_OID_BY_ATTR2(mbedtls_oid_get_oid_by_sig_alg,
  425. oid_sig_alg_t,
  426. oid_sig_alg,
  427. mbedtls_pk_type_t,
  428. pk_alg,
  429. mbedtls_md_type_t,
  430. md_alg)
  431. #endif /* MBEDTLS_MD_C */
  432. /*
  433. * For PublicKeyInfo (PKCS1, RFC 5480)
  434. */
  435. typedef struct {
  436. mbedtls_oid_descriptor_t descriptor;
  437. mbedtls_pk_type_t pk_alg;
  438. } oid_pk_alg_t;
  439. static const oid_pk_alg_t oid_pk_alg[] =
  440. {
  441. {
  442. { ADD_LEN(MBEDTLS_OID_PKCS1_RSA), "rsaEncryption", "RSA" },
  443. MBEDTLS_PK_RSA,
  444. },
  445. {
  446. { ADD_LEN(MBEDTLS_OID_EC_ALG_UNRESTRICTED), "id-ecPublicKey", "Generic EC key" },
  447. MBEDTLS_PK_ECKEY,
  448. },
  449. {
  450. { ADD_LEN(MBEDTLS_OID_EC_ALG_ECDH), "id-ecDH", "EC key for ECDH" },
  451. MBEDTLS_PK_ECKEY_DH,
  452. },
  453. {
  454. { NULL, 0, NULL, NULL },
  455. MBEDTLS_PK_NONE,
  456. },
  457. };
  458. FN_OID_TYPED_FROM_ASN1(oid_pk_alg_t, pk_alg, oid_pk_alg)
  459. FN_OID_GET_ATTR1(mbedtls_oid_get_pk_alg, oid_pk_alg_t, pk_alg, mbedtls_pk_type_t, pk_alg)
  460. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_pk_alg,
  461. oid_pk_alg_t,
  462. oid_pk_alg,
  463. mbedtls_pk_type_t,
  464. pk_alg)
  465. #if defined(MBEDTLS_ECP_C)
  466. /*
  467. * For namedCurve (RFC 5480)
  468. */
  469. typedef struct {
  470. mbedtls_oid_descriptor_t descriptor;
  471. mbedtls_ecp_group_id grp_id;
  472. } oid_ecp_grp_t;
  473. static const oid_ecp_grp_t oid_ecp_grp[] =
  474. {
  475. #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
  476. {
  477. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP192R1), "secp192r1", "secp192r1" },
  478. MBEDTLS_ECP_DP_SECP192R1,
  479. },
  480. #endif /* MBEDTLS_ECP_DP_SECP192R1_ENABLED */
  481. #if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
  482. {
  483. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP224R1), "secp224r1", "secp224r1" },
  484. MBEDTLS_ECP_DP_SECP224R1,
  485. },
  486. #endif /* MBEDTLS_ECP_DP_SECP224R1_ENABLED */
  487. #if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
  488. {
  489. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP256R1), "secp256r1", "secp256r1" },
  490. MBEDTLS_ECP_DP_SECP256R1,
  491. },
  492. #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED */
  493. #if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
  494. {
  495. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP384R1), "secp384r1", "secp384r1" },
  496. MBEDTLS_ECP_DP_SECP384R1,
  497. },
  498. #endif /* MBEDTLS_ECP_DP_SECP384R1_ENABLED */
  499. #if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
  500. {
  501. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP521R1), "secp521r1", "secp521r1" },
  502. MBEDTLS_ECP_DP_SECP521R1,
  503. },
  504. #endif /* MBEDTLS_ECP_DP_SECP521R1_ENABLED */
  505. #if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
  506. {
  507. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP192K1), "secp192k1", "secp192k1" },
  508. MBEDTLS_ECP_DP_SECP192K1,
  509. },
  510. #endif /* MBEDTLS_ECP_DP_SECP192K1_ENABLED */
  511. #if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
  512. {
  513. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP224K1), "secp224k1", "secp224k1" },
  514. MBEDTLS_ECP_DP_SECP224K1,
  515. },
  516. #endif /* MBEDTLS_ECP_DP_SECP224K1_ENABLED */
  517. #if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
  518. {
  519. { ADD_LEN(MBEDTLS_OID_EC_GRP_SECP256K1), "secp256k1", "secp256k1" },
  520. MBEDTLS_ECP_DP_SECP256K1,
  521. },
  522. #endif /* MBEDTLS_ECP_DP_SECP256K1_ENABLED */
  523. #if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
  524. {
  525. { ADD_LEN(MBEDTLS_OID_EC_GRP_BP256R1), "brainpoolP256r1", "brainpool256r1" },
  526. MBEDTLS_ECP_DP_BP256R1,
  527. },
  528. #endif /* MBEDTLS_ECP_DP_BP256R1_ENABLED */
  529. #if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
  530. {
  531. { ADD_LEN(MBEDTLS_OID_EC_GRP_BP384R1), "brainpoolP384r1", "brainpool384r1" },
  532. MBEDTLS_ECP_DP_BP384R1,
  533. },
  534. #endif /* MBEDTLS_ECP_DP_BP384R1_ENABLED */
  535. #if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
  536. {
  537. { ADD_LEN(MBEDTLS_OID_EC_GRP_BP512R1), "brainpoolP512r1", "brainpool512r1" },
  538. MBEDTLS_ECP_DP_BP512R1,
  539. },
  540. #endif /* MBEDTLS_ECP_DP_BP512R1_ENABLED */
  541. {
  542. { NULL, 0, NULL, NULL },
  543. MBEDTLS_ECP_DP_NONE,
  544. },
  545. };
  546. FN_OID_TYPED_FROM_ASN1(oid_ecp_grp_t, grp_id, oid_ecp_grp)
  547. FN_OID_GET_ATTR1(mbedtls_oid_get_ec_grp, oid_ecp_grp_t, grp_id, mbedtls_ecp_group_id, grp_id)
  548. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_ec_grp,
  549. oid_ecp_grp_t,
  550. oid_ecp_grp,
  551. mbedtls_ecp_group_id,
  552. grp_id)
  553. #endif /* MBEDTLS_ECP_C */
  554. #if defined(MBEDTLS_CIPHER_C)
  555. /*
  556. * For PKCS#5 PBES2 encryption algorithm
  557. */
  558. typedef struct {
  559. mbedtls_oid_descriptor_t descriptor;
  560. mbedtls_cipher_type_t cipher_alg;
  561. } oid_cipher_alg_t;
  562. static const oid_cipher_alg_t oid_cipher_alg[] =
  563. {
  564. {
  565. { ADD_LEN(MBEDTLS_OID_DES_CBC), "desCBC", "DES-CBC" },
  566. MBEDTLS_CIPHER_DES_CBC,
  567. },
  568. {
  569. { ADD_LEN(MBEDTLS_OID_DES_EDE3_CBC), "des-ede3-cbc", "DES-EDE3-CBC" },
  570. MBEDTLS_CIPHER_DES_EDE3_CBC,
  571. },
  572. {
  573. { NULL, 0, NULL, NULL },
  574. MBEDTLS_CIPHER_NONE,
  575. },
  576. };
  577. FN_OID_TYPED_FROM_ASN1(oid_cipher_alg_t, cipher_alg, oid_cipher_alg)
  578. FN_OID_GET_ATTR1(mbedtls_oid_get_cipher_alg,
  579. oid_cipher_alg_t,
  580. cipher_alg,
  581. mbedtls_cipher_type_t,
  582. cipher_alg)
  583. #endif /* MBEDTLS_CIPHER_C */
  584. #if defined(MBEDTLS_MD_C)
  585. /*
  586. * For digestAlgorithm
  587. */
  588. typedef struct {
  589. mbedtls_oid_descriptor_t descriptor;
  590. mbedtls_md_type_t md_alg;
  591. } oid_md_alg_t;
  592. static const oid_md_alg_t oid_md_alg[] =
  593. {
  594. #if defined(MBEDTLS_MD2_C)
  595. {
  596. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_MD2), "id-md2", "MD2" },
  597. MBEDTLS_MD_MD2,
  598. },
  599. #endif /* MBEDTLS_MD2_C */
  600. #if defined(MBEDTLS_MD4_C)
  601. {
  602. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_MD4), "id-md4", "MD4" },
  603. MBEDTLS_MD_MD4,
  604. },
  605. #endif /* MBEDTLS_MD4_C */
  606. #if defined(MBEDTLS_MD5_C)
  607. {
  608. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_MD5), "id-md5", "MD5" },
  609. MBEDTLS_MD_MD5,
  610. },
  611. #endif /* MBEDTLS_MD5_C */
  612. #if defined(MBEDTLS_SHA1_C)
  613. {
  614. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_SHA1), "id-sha1", "SHA-1" },
  615. MBEDTLS_MD_SHA1,
  616. },
  617. #endif /* MBEDTLS_SHA1_C */
  618. #if defined(MBEDTLS_SHA256_C)
  619. {
  620. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_SHA224), "id-sha224", "SHA-224" },
  621. MBEDTLS_MD_SHA224,
  622. },
  623. {
  624. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_SHA256), "id-sha256", "SHA-256" },
  625. MBEDTLS_MD_SHA256,
  626. },
  627. #endif /* MBEDTLS_SHA256_C */
  628. #if defined(MBEDTLS_SHA512_C)
  629. {
  630. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_SHA384), "id-sha384", "SHA-384" },
  631. MBEDTLS_MD_SHA384,
  632. },
  633. {
  634. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_SHA512), "id-sha512", "SHA-512" },
  635. MBEDTLS_MD_SHA512,
  636. },
  637. #endif /* MBEDTLS_SHA512_C */
  638. #if defined(MBEDTLS_RIPEMD160_C)
  639. {
  640. { ADD_LEN(MBEDTLS_OID_DIGEST_ALG_RIPEMD160), "id-ripemd160", "RIPEMD-160" },
  641. MBEDTLS_MD_RIPEMD160,
  642. },
  643. #endif /* MBEDTLS_RIPEMD160_C */
  644. {
  645. { NULL, 0, NULL, NULL },
  646. MBEDTLS_MD_NONE,
  647. },
  648. };
  649. FN_OID_TYPED_FROM_ASN1(oid_md_alg_t, md_alg, oid_md_alg)
  650. FN_OID_GET_ATTR1(mbedtls_oid_get_md_alg, oid_md_alg_t, md_alg, mbedtls_md_type_t, md_alg)
  651. FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_md,
  652. oid_md_alg_t,
  653. oid_md_alg,
  654. mbedtls_md_type_t,
  655. md_alg)
  656. /*
  657. * For HMAC digestAlgorithm
  658. */
  659. typedef struct {
  660. mbedtls_oid_descriptor_t descriptor;
  661. mbedtls_md_type_t md_hmac;
  662. } oid_md_hmac_t;
  663. static const oid_md_hmac_t oid_md_hmac[] =
  664. {
  665. #if defined(MBEDTLS_SHA1_C)
  666. {
  667. { ADD_LEN(MBEDTLS_OID_HMAC_SHA1), "hmacSHA1", "HMAC-SHA-1" },
  668. MBEDTLS_MD_SHA1,
  669. },
  670. #endif /* MBEDTLS_SHA1_C */
  671. #if defined(MBEDTLS_SHA256_C)
  672. {
  673. { ADD_LEN(MBEDTLS_OID_HMAC_SHA224), "hmacSHA224", "HMAC-SHA-224" },
  674. MBEDTLS_MD_SHA224,
  675. },
  676. {
  677. { ADD_LEN(MBEDTLS_OID_HMAC_SHA256), "hmacSHA256", "HMAC-SHA-256" },
  678. MBEDTLS_MD_SHA256,
  679. },
  680. #endif /* MBEDTLS_SHA256_C */
  681. #if defined(MBEDTLS_SHA512_C)
  682. {
  683. { ADD_LEN(MBEDTLS_OID_HMAC_SHA384), "hmacSHA384", "HMAC-SHA-384" },
  684. MBEDTLS_MD_SHA384,
  685. },
  686. {
  687. { ADD_LEN(MBEDTLS_OID_HMAC_SHA512), "hmacSHA512", "HMAC-SHA-512" },
  688. MBEDTLS_MD_SHA512,
  689. },
  690. #endif /* MBEDTLS_SHA512_C */
  691. {
  692. { NULL, 0, NULL, NULL },
  693. MBEDTLS_MD_NONE,
  694. },
  695. };
  696. FN_OID_TYPED_FROM_ASN1(oid_md_hmac_t, md_hmac, oid_md_hmac)
  697. FN_OID_GET_ATTR1(mbedtls_oid_get_md_hmac, oid_md_hmac_t, md_hmac, mbedtls_md_type_t, md_hmac)
  698. #endif /* MBEDTLS_MD_C */
  699. #if defined(MBEDTLS_PKCS12_C)
  700. /*
  701. * For PKCS#12 PBEs
  702. */
  703. typedef struct {
  704. mbedtls_oid_descriptor_t descriptor;
  705. mbedtls_md_type_t md_alg;
  706. mbedtls_cipher_type_t cipher_alg;
  707. } oid_pkcs12_pbe_alg_t;
  708. static const oid_pkcs12_pbe_alg_t oid_pkcs12_pbe_alg[] =
  709. {
  710. {
  711. { ADD_LEN(MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC), "pbeWithSHAAnd3-KeyTripleDES-CBC",
  712. "PBE with SHA1 and 3-Key 3DES" },
  713. MBEDTLS_MD_SHA1, MBEDTLS_CIPHER_DES_EDE3_CBC,
  714. },
  715. {
  716. { ADD_LEN(MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC), "pbeWithSHAAnd2-KeyTripleDES-CBC",
  717. "PBE with SHA1 and 2-Key 3DES" },
  718. MBEDTLS_MD_SHA1, MBEDTLS_CIPHER_DES_EDE_CBC,
  719. },
  720. {
  721. { NULL, 0, NULL, NULL },
  722. MBEDTLS_MD_NONE, MBEDTLS_CIPHER_NONE,
  723. },
  724. };
  725. FN_OID_TYPED_FROM_ASN1(oid_pkcs12_pbe_alg_t, pkcs12_pbe_alg, oid_pkcs12_pbe_alg)
  726. FN_OID_GET_ATTR2(mbedtls_oid_get_pkcs12_pbe_alg,
  727. oid_pkcs12_pbe_alg_t,
  728. pkcs12_pbe_alg,
  729. mbedtls_md_type_t,
  730. md_alg,
  731. mbedtls_cipher_type_t,
  732. cipher_alg)
  733. #endif /* MBEDTLS_PKCS12_C */
  734. /* Return the x.y.z.... style numeric string for the given OID */
  735. int mbedtls_oid_get_numeric_string(char *buf, size_t size,
  736. const mbedtls_asn1_buf *oid)
  737. {
  738. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  739. char *p = buf;
  740. size_t n = size;
  741. unsigned int value = 0;
  742. if (size > INT_MAX) {
  743. /* Avoid overflow computing return value */
  744. return MBEDTLS_ERR_ASN1_INVALID_LENGTH;
  745. }
  746. if (oid->len <= 0) {
  747. /* OID must not be empty */
  748. return MBEDTLS_ERR_ASN1_OUT_OF_DATA;
  749. }
  750. for (size_t i = 0; i < oid->len; i++) {
  751. /* Prevent overflow in value. */
  752. if (value > (UINT_MAX >> 7)) {
  753. return MBEDTLS_ERR_ASN1_INVALID_DATA;
  754. }
  755. if ((value == 0) && ((oid->p[i]) == 0x80)) {
  756. /* Overlong encoding is not allowed */
  757. return MBEDTLS_ERR_ASN1_INVALID_DATA;
  758. }
  759. value <<= 7;
  760. value |= oid->p[i] & 0x7F;
  761. if (!(oid->p[i] & 0x80)) {
  762. /* Last byte */
  763. if (n == size) {
  764. int component1;
  765. unsigned int component2;
  766. /* First subidentifier contains first two OID components */
  767. if (value >= 80) {
  768. component1 = '2';
  769. component2 = value - 80;
  770. } else if (value >= 40) {
  771. component1 = '1';
  772. component2 = value - 40;
  773. } else {
  774. component1 = '0';
  775. component2 = value;
  776. }
  777. ret = mbedtls_snprintf(p, n, "%c.%u", component1, component2);
  778. } else {
  779. ret = mbedtls_snprintf(p, n, ".%u", value);
  780. }
  781. if (ret < 2 || (size_t) ret >= n) {
  782. return MBEDTLS_ERR_OID_BUF_TOO_SMALL;
  783. }
  784. n -= (size_t) ret;
  785. p += ret;
  786. value = 0;
  787. }
  788. }
  789. if (value != 0) {
  790. /* Unterminated subidentifier */
  791. return MBEDTLS_ERR_ASN1_OUT_OF_DATA;
  792. }
  793. return (int) (size - n);
  794. }
  795. #endif /* MBEDTLS_OID_C */