mirror of
				https://github.com/Mbed-TLS/mbedtls.git
				synced 2025-11-03 20:33:16 +03:00 
			
		
		
		
	Merge remote-tracking branch 'public/development' into development-restricted
* public/development: (23 commits) tests: suite_x509parse: set PSA max operations in x509_verify_restart() library: debug: remove mbedtls_debug_printf_ecdh() library: debug: make mbedtls_debug_print_psa_ec() static Remove call to pk_decrypt() in ssl_server2 Change hardcoded error values in ssl-opt to take in the PSA error alias Test with GCC 15 with sloppy union initialization Update crypto with the union initialization fixes Mark ssl_tls12_preset_suiteb_sig_algs const Mark ssl_tls12_preset_default_sig_algs const Use PSA macros for the `pkalgs` domain reverted compat-2.x.h removal from psa-transition.md Correct ChangeLog file extension Add ChangeLog remove compat-2.x.h Remove trace of secp224k1 Update submodules Improve comments Allow gcc-15 to be in $PATH Enable drivers when testing with GCC 15 GCC 15: Silence -Wunterminated-string-initialization ...
This commit is contained in:
		
							
								
								
									
										2
									
								
								ChangeLog.d/remove-compat-2.x.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								ChangeLog.d/remove-compat-2.x.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,2 @@
 | 
				
			|||||||
 | 
					Removals
 | 
				
			||||||
 | 
					   * Remove compat-2-x.h header from mbedtls.
 | 
				
			||||||
@@ -1,46 +0,0 @@
 | 
				
			|||||||
/**
 | 
					 | 
				
			||||||
 * \file compat-2.x.h
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \brief Compatibility definitions
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \deprecated Use the new names directly instead
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
/*
 | 
					 | 
				
			||||||
 *  Copyright The Mbed TLS Contributors
 | 
					 | 
				
			||||||
 *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
 | 
					 | 
				
			||||||
#warning "Including compat-2.x.h is deprecated"
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifndef MBEDTLS_COMPAT2X_H
 | 
					 | 
				
			||||||
#define MBEDTLS_COMPAT2X_H
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/*
 | 
					 | 
				
			||||||
 * Macros for renamed functions
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
#define mbedtls_ctr_drbg_update_ret   mbedtls_ctr_drbg_update
 | 
					 | 
				
			||||||
#define mbedtls_hmac_drbg_update_ret  mbedtls_hmac_drbg_update
 | 
					 | 
				
			||||||
#define mbedtls_md5_starts_ret        mbedtls_md5_starts
 | 
					 | 
				
			||||||
#define mbedtls_md5_update_ret        mbedtls_md5_update
 | 
					 | 
				
			||||||
#define mbedtls_md5_finish_ret        mbedtls_md5_finish
 | 
					 | 
				
			||||||
#define mbedtls_md5_ret               mbedtls_md5
 | 
					 | 
				
			||||||
#define mbedtls_ripemd160_starts_ret  mbedtls_ripemd160_starts
 | 
					 | 
				
			||||||
#define mbedtls_ripemd160_update_ret  mbedtls_ripemd160_update
 | 
					 | 
				
			||||||
#define mbedtls_ripemd160_finish_ret  mbedtls_ripemd160_finish
 | 
					 | 
				
			||||||
#define mbedtls_ripemd160_ret         mbedtls_ripemd160
 | 
					 | 
				
			||||||
#define mbedtls_sha1_starts_ret       mbedtls_sha1_starts
 | 
					 | 
				
			||||||
#define mbedtls_sha1_update_ret       mbedtls_sha1_update
 | 
					 | 
				
			||||||
#define mbedtls_sha1_finish_ret       mbedtls_sha1_finish
 | 
					 | 
				
			||||||
#define mbedtls_sha1_ret              mbedtls_sha1
 | 
					 | 
				
			||||||
#define mbedtls_sha256_starts_ret     mbedtls_sha256_starts
 | 
					 | 
				
			||||||
#define mbedtls_sha256_update_ret     mbedtls_sha256_update
 | 
					 | 
				
			||||||
#define mbedtls_sha256_finish_ret     mbedtls_sha256_finish
 | 
					 | 
				
			||||||
#define mbedtls_sha256_ret            mbedtls_sha256
 | 
					 | 
				
			||||||
#define mbedtls_sha512_starts_ret     mbedtls_sha512_starts
 | 
					 | 
				
			||||||
#define mbedtls_sha512_update_ret     mbedtls_sha512_update
 | 
					 | 
				
			||||||
#define mbedtls_sha512_finish_ret     mbedtls_sha512_finish
 | 
					 | 
				
			||||||
#define mbedtls_sha512_ret            mbedtls_sha512
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#endif /* MBEDTLS_COMPAT2X_H */
 | 
					 | 
				
			||||||
@@ -51,11 +51,6 @@
 | 
				
			|||||||
#endif /* MBEDTLS_X509_REMOVE_INFO */
 | 
					#endif /* MBEDTLS_X509_REMOVE_INFO */
 | 
				
			||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
 | 
					#endif /* MBEDTLS_X509_CRT_PARSE_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MBEDTLS_ECDH_C)
 | 
					 | 
				
			||||||
#define MBEDTLS_SSL_DEBUG_ECDH(level, ecdh, attr)               \
 | 
					 | 
				
			||||||
    mbedtls_debug_printf_ecdh(ssl, level, __FILE__, __LINE__, ecdh, attr)
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#else /* MBEDTLS_DEBUG_C */
 | 
					#else /* MBEDTLS_DEBUG_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define MBEDTLS_SSL_DEBUG_MSG(level, args)            do { } while (0)
 | 
					#define MBEDTLS_SSL_DEBUG_MSG(level, args)            do { } while (0)
 | 
				
			||||||
@@ -64,7 +59,6 @@
 | 
				
			|||||||
#define MBEDTLS_SSL_DEBUG_MPI(level, text, X)         do { } while (0)
 | 
					#define MBEDTLS_SSL_DEBUG_MPI(level, text, X)         do { } while (0)
 | 
				
			||||||
#define MBEDTLS_SSL_DEBUG_ECP(level, text, X)         do { } while (0)
 | 
					#define MBEDTLS_SSL_DEBUG_ECP(level, text, X)         do { } while (0)
 | 
				
			||||||
#define MBEDTLS_SSL_DEBUG_CRT(level, text, crt)       do { } while (0)
 | 
					#define MBEDTLS_SSL_DEBUG_CRT(level, text, crt)       do { } while (0)
 | 
				
			||||||
#define MBEDTLS_SSL_DEBUG_ECDH(level, ecdh, attr)     do { } while (0)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif /* MBEDTLS_DEBUG_C */
 | 
					#endif /* MBEDTLS_DEBUG_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -230,7 +230,7 @@ static void mbedtls_debug_print_ec_coord(const mbedtls_ssl_context *ssl, int lev
 | 
				
			|||||||
    }
 | 
					    }
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
void mbedtls_debug_print_psa_ec(const mbedtls_ssl_context *ssl, int level,
 | 
					static void mbedtls_debug_print_psa_ec(const mbedtls_ssl_context *ssl, int level,
 | 
				
			||||||
                                       const char *file, int line,
 | 
					                                       const char *file, int line,
 | 
				
			||||||
                                       const char *text, const mbedtls_pk_context *pk)
 | 
					                                       const char *text, const mbedtls_pk_context *pk)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
@@ -412,54 +412,4 @@ void mbedtls_debug_print_crt(const mbedtls_ssl_context *ssl, int level,
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C && MBEDTLS_X509_REMOVE_INFO */
 | 
					#endif /* MBEDTLS_X509_CRT_PARSE_C && MBEDTLS_X509_REMOVE_INFO */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED) && \
 | 
					 | 
				
			||||||
    defined(MBEDTLS_ECDH_C)
 | 
					 | 
				
			||||||
static void mbedtls_debug_printf_ecdh_internal(const mbedtls_ssl_context *ssl,
 | 
					 | 
				
			||||||
                                               int level, const char *file,
 | 
					 | 
				
			||||||
                                               int line,
 | 
					 | 
				
			||||||
                                               const mbedtls_ecdh_context *ecdh,
 | 
					 | 
				
			||||||
                                               mbedtls_debug_ecdh_attr attr)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
 | 
					 | 
				
			||||||
    const mbedtls_ecdh_context *ctx = ecdh;
 | 
					 | 
				
			||||||
#else
 | 
					 | 
				
			||||||
    const mbedtls_ecdh_context_mbed *ctx = &ecdh->ctx.mbed_ecdh;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    switch (attr) {
 | 
					 | 
				
			||||||
        case MBEDTLS_DEBUG_ECDH_Q:
 | 
					 | 
				
			||||||
            mbedtls_debug_print_ecp(ssl, level, file, line, "ECDH: Q",
 | 
					 | 
				
			||||||
                                    &ctx->Q);
 | 
					 | 
				
			||||||
            break;
 | 
					 | 
				
			||||||
        case MBEDTLS_DEBUG_ECDH_QP:
 | 
					 | 
				
			||||||
            mbedtls_debug_print_ecp(ssl, level, file, line, "ECDH: Qp",
 | 
					 | 
				
			||||||
                                    &ctx->Qp);
 | 
					 | 
				
			||||||
            break;
 | 
					 | 
				
			||||||
        case MBEDTLS_DEBUG_ECDH_Z:
 | 
					 | 
				
			||||||
            mbedtls_debug_print_mpi(ssl, level, file, line, "ECDH: z",
 | 
					 | 
				
			||||||
                                    &ctx->z);
 | 
					 | 
				
			||||||
            break;
 | 
					 | 
				
			||||||
        default:
 | 
					 | 
				
			||||||
            break;
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
void mbedtls_debug_printf_ecdh(const mbedtls_ssl_context *ssl, int level,
 | 
					 | 
				
			||||||
                               const char *file, int line,
 | 
					 | 
				
			||||||
                               const mbedtls_ecdh_context *ecdh,
 | 
					 | 
				
			||||||
                               mbedtls_debug_ecdh_attr attr)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
 | 
					 | 
				
			||||||
    mbedtls_debug_printf_ecdh_internal(ssl, level, file, line, ecdh, attr);
 | 
					 | 
				
			||||||
#else
 | 
					 | 
				
			||||||
    switch (ecdh->var) {
 | 
					 | 
				
			||||||
        default:
 | 
					 | 
				
			||||||
            mbedtls_debug_printf_ecdh_internal(ssl, level, file, line, ecdh,
 | 
					 | 
				
			||||||
                                               attr);
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED &&
 | 
					 | 
				
			||||||
          MBEDTLS_ECDH_C */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#endif /* MBEDTLS_DEBUG_C */
 | 
					#endif /* MBEDTLS_DEBUG_C */
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -136,37 +136,4 @@ void mbedtls_debug_print_crt(const mbedtls_ssl_context *ssl, int level,
 | 
				
			|||||||
                             const char *text, const mbedtls_x509_crt *crt);
 | 
					                             const char *text, const mbedtls_x509_crt *crt);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Note: the MBEDTLS_ECDH_C guard here is mandatory because this debug function
 | 
					 | 
				
			||||||
         only works for the built-in implementation. */
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED) && \
 | 
					 | 
				
			||||||
    defined(MBEDTLS_ECDH_C)
 | 
					 | 
				
			||||||
typedef enum {
 | 
					 | 
				
			||||||
    MBEDTLS_DEBUG_ECDH_Q,
 | 
					 | 
				
			||||||
    MBEDTLS_DEBUG_ECDH_QP,
 | 
					 | 
				
			||||||
    MBEDTLS_DEBUG_ECDH_Z,
 | 
					 | 
				
			||||||
} mbedtls_debug_ecdh_attr;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * \brief   Print a field of the ECDH structure in the SSL context to the debug
 | 
					 | 
				
			||||||
 *          output. This function is always used through the
 | 
					 | 
				
			||||||
 *          MBEDTLS_SSL_DEBUG_ECDH() macro, which supplies the ssl context, file
 | 
					 | 
				
			||||||
 *          and line number parameters.
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \param ssl       SSL context
 | 
					 | 
				
			||||||
 * \param level     error level of the debug message
 | 
					 | 
				
			||||||
 * \param file      file the error has occurred in
 | 
					 | 
				
			||||||
 * \param line      line number the error has occurred in
 | 
					 | 
				
			||||||
 * \param ecdh      the ECDH context
 | 
					 | 
				
			||||||
 * \param attr      the identifier of the attribute being output
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \attention       This function is intended for INTERNAL usage within the
 | 
					 | 
				
			||||||
 *                  library only.
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
void mbedtls_debug_printf_ecdh(const mbedtls_ssl_context *ssl, int level,
 | 
					 | 
				
			||||||
                               const char *file, int line,
 | 
					 | 
				
			||||||
                               const mbedtls_ecdh_context *ecdh,
 | 
					 | 
				
			||||||
                               mbedtls_debug_ecdh_attr attr);
 | 
					 | 
				
			||||||
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED &&
 | 
					 | 
				
			||||||
          MBEDTLS_ECDH_C */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#endif /* MBEDTLS_DEBUG_INTERNAL_H */
 | 
					#endif /* MBEDTLS_DEBUG_INTERNAL_H */
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5385,7 +5385,7 @@ static const uint16_t ssl_preset_default_sig_algs[] = {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* NOTICE: see above */
 | 
					/* NOTICE: see above */
 | 
				
			||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
 | 
					#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
 | 
				
			||||||
static uint16_t ssl_tls12_preset_default_sig_algs[] = {
 | 
					static const uint16_t ssl_tls12_preset_default_sig_algs[] = {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(PSA_WANT_ALG_SHA_512)
 | 
					#if defined(PSA_WANT_ALG_SHA_512)
 | 
				
			||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED)
 | 
					#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED)
 | 
				
			||||||
@@ -5449,7 +5449,7 @@ static const uint16_t ssl_preset_suiteb_sig_algs[] = {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* NOTICE: see above */
 | 
					/* NOTICE: see above */
 | 
				
			||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
 | 
					#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
 | 
				
			||||||
static uint16_t ssl_tls12_preset_suiteb_sig_algs[] = {
 | 
					static const uint16_t ssl_tls12_preset_suiteb_sig_algs[] = {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(PSA_WANT_ALG_SHA_256)
 | 
					#if defined(PSA_WANT_ALG_SHA_256)
 | 
				
			||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED)
 | 
					#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED)
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										915
									
								
								library/x509_oid.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										915
									
								
								library/x509_oid.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,915 @@
 | 
				
			|||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \file oid.c
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \brief Object Identifier (OID) database
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 *  Copyright The Mbed TLS Contributors
 | 
				
			||||||
 | 
					 *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "common.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_OID_C)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "mbedtls/oid.h"
 | 
				
			||||||
 | 
					#include "mbedtls/rsa.h"
 | 
				
			||||||
 | 
					#include "mbedtls/error_common.h"
 | 
				
			||||||
 | 
					#include "mbedtls/pk.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "mbedtls/platform.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to automatically add the size of #define'd OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define ADD_LEN(s)      s, MBEDTLS_OID_SIZE(s)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate mbedtls_oid_descriptor_t
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					#define OID_DESCRIPTOR(s, name, description)  { ADD_LEN(s), name, description }
 | 
				
			||||||
 | 
					#define NULL_OID_DESCRIPTOR                   { NULL, 0, NULL, NULL }
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					#define OID_DESCRIPTOR(s, name, description)  { ADD_LEN(s) }
 | 
				
			||||||
 | 
					#define NULL_OID_DESCRIPTOR                   { NULL, 0 }
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate an internal function for oid_XXX_from_asn1() (used by
 | 
				
			||||||
 | 
					 * the other functions)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_TYPED_FROM_ASN1(TYPE_T, NAME, LIST)                    \
 | 
				
			||||||
 | 
					    static const TYPE_T *oid_ ## NAME ## _from_asn1(                   \
 | 
				
			||||||
 | 
					        const mbedtls_asn1_buf *oid)     \
 | 
				
			||||||
 | 
					    {                                                                   \
 | 
				
			||||||
 | 
					        const TYPE_T *p = (LIST);                                       \
 | 
				
			||||||
 | 
					        const mbedtls_oid_descriptor_t *cur =                           \
 | 
				
			||||||
 | 
					            (const mbedtls_oid_descriptor_t *) p;                       \
 | 
				
			||||||
 | 
					        if (p == NULL || oid == NULL) return NULL;                  \
 | 
				
			||||||
 | 
					        while (cur->asn1 != NULL) {                                    \
 | 
				
			||||||
 | 
					            if (cur->asn1_len == oid->len &&                            \
 | 
				
			||||||
 | 
					                memcmp(cur->asn1, oid->p, oid->len) == 0) {          \
 | 
				
			||||||
 | 
					                return p;                                            \
 | 
				
			||||||
 | 
					            }                                                           \
 | 
				
			||||||
 | 
					            p++;                                                        \
 | 
				
			||||||
 | 
					            cur = (const mbedtls_oid_descriptor_t *) p;                 \
 | 
				
			||||||
 | 
					        }                                                               \
 | 
				
			||||||
 | 
					        return NULL;                                                 \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate a function for retrieving a single attribute from the
 | 
				
			||||||
 | 
					 * descriptor of an mbedtls_oid_descriptor_t wrapper.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_GET_DESCRIPTOR_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
 | 
				
			||||||
 | 
					    int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1)                  \
 | 
				
			||||||
 | 
					    {                                                                       \
 | 
				
			||||||
 | 
					        const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid);        \
 | 
				
			||||||
 | 
					        if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND;            \
 | 
				
			||||||
 | 
					        *ATTR1 = data->descriptor.ATTR1;                                    \
 | 
				
			||||||
 | 
					        return 0;                                                        \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_X509_REMOVE_INFO */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate a function for retrieving a single attribute from an
 | 
				
			||||||
 | 
					 * mbedtls_oid_descriptor_t wrapper.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_GET_ATTR1(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1) \
 | 
				
			||||||
 | 
					    int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1)                  \
 | 
				
			||||||
 | 
					    {                                                                       \
 | 
				
			||||||
 | 
					        const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid);        \
 | 
				
			||||||
 | 
					        if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND;            \
 | 
				
			||||||
 | 
					        *ATTR1 = data->ATTR1;                                               \
 | 
				
			||||||
 | 
					        return 0;                                                        \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate a function for retrieving two attributes from an
 | 
				
			||||||
 | 
					 * mbedtls_oid_descriptor_t wrapper.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_GET_ATTR2(FN_NAME, TYPE_T, TYPE_NAME, ATTR1_TYPE, ATTR1,     \
 | 
				
			||||||
 | 
					                         ATTR2_TYPE, ATTR2)                                 \
 | 
				
			||||||
 | 
					    int FN_NAME(const mbedtls_asn1_buf *oid, ATTR1_TYPE * ATTR1,               \
 | 
				
			||||||
 | 
					                ATTR2_TYPE * ATTR2)              \
 | 
				
			||||||
 | 
					    {                                                                           \
 | 
				
			||||||
 | 
					        const TYPE_T *data = oid_ ## TYPE_NAME ## _from_asn1(oid);            \
 | 
				
			||||||
 | 
					        if (data == NULL) return MBEDTLS_ERR_OID_NOT_FOUND;                 \
 | 
				
			||||||
 | 
					        *(ATTR1) = data->ATTR1;                                                 \
 | 
				
			||||||
 | 
					        *(ATTR2) = data->ATTR2;                                                 \
 | 
				
			||||||
 | 
					        return 0;                                                            \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate a function for retrieving the OID based on a single
 | 
				
			||||||
 | 
					 * attribute from a mbedtls_oid_descriptor_t wrapper.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_GET_OID_BY_ATTR1(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1)   \
 | 
				
			||||||
 | 
					    int FN_NAME(ATTR1_TYPE ATTR1, const char **oid, size_t *olen)             \
 | 
				
			||||||
 | 
					    {                                                                           \
 | 
				
			||||||
 | 
					        const TYPE_T *cur = (LIST);                                             \
 | 
				
			||||||
 | 
					        while (cur->descriptor.asn1 != NULL) {                                 \
 | 
				
			||||||
 | 
					            if (cur->ATTR1 == (ATTR1)) {                                       \
 | 
				
			||||||
 | 
					                *oid = cur->descriptor.asn1;                                    \
 | 
				
			||||||
 | 
					                *olen = cur->descriptor.asn1_len;                               \
 | 
				
			||||||
 | 
					                return 0;                                                    \
 | 
				
			||||||
 | 
					            }                                                                   \
 | 
				
			||||||
 | 
					            cur++;                                                              \
 | 
				
			||||||
 | 
					        }                                                                       \
 | 
				
			||||||
 | 
					        return MBEDTLS_ERR_OID_NOT_FOUND;                                    \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Macro to generate a function for retrieving the OID based on two
 | 
				
			||||||
 | 
					 * attributes from a mbedtls_oid_descriptor_t wrapper.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define FN_OID_GET_OID_BY_ATTR2(FN_NAME, TYPE_T, LIST, ATTR1_TYPE, ATTR1,   \
 | 
				
			||||||
 | 
					                                ATTR2_TYPE, ATTR2)                          \
 | 
				
			||||||
 | 
					    int FN_NAME(ATTR1_TYPE ATTR1, ATTR2_TYPE ATTR2, const char **oid,         \
 | 
				
			||||||
 | 
					                size_t *olen)                                                 \
 | 
				
			||||||
 | 
					    {                                                                           \
 | 
				
			||||||
 | 
					        const TYPE_T *cur = (LIST);                                             \
 | 
				
			||||||
 | 
					        while (cur->descriptor.asn1 != NULL) {                                 \
 | 
				
			||||||
 | 
					            if (cur->ATTR1 == (ATTR1) && cur->ATTR2 == (ATTR2)) {              \
 | 
				
			||||||
 | 
					                *oid = cur->descriptor.asn1;                                    \
 | 
				
			||||||
 | 
					                *olen = cur->descriptor.asn1_len;                               \
 | 
				
			||||||
 | 
					                return 0;                                                    \
 | 
				
			||||||
 | 
					            }                                                                   \
 | 
				
			||||||
 | 
					            cur++;                                                              \
 | 
				
			||||||
 | 
					        }                                                                       \
 | 
				
			||||||
 | 
					        return MBEDTLS_ERR_OID_NOT_FOUND;                                   \
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For X520 attribute types
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    const char          *short_name;
 | 
				
			||||||
 | 
					} oid_x520_attr_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_x520_attr_t oid_x520_attr_type[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_CN,          "id-at-commonName",               "Common Name"),
 | 
				
			||||||
 | 
					        "CN",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_COUNTRY,     "id-at-countryName",              "Country"),
 | 
				
			||||||
 | 
					        "C",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_LOCALITY,    "id-at-locality",                 "Locality"),
 | 
				
			||||||
 | 
					        "L",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_STATE,       "id-at-state",                    "State"),
 | 
				
			||||||
 | 
					        "ST",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_ORGANIZATION, "id-at-organizationName",
 | 
				
			||||||
 | 
					                       "Organization"),
 | 
				
			||||||
 | 
					        "O",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_ORG_UNIT,    "id-at-organizationalUnitName",   "Org Unit"),
 | 
				
			||||||
 | 
					        "OU",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS9_EMAIL,
 | 
				
			||||||
 | 
					                       "emailAddress",
 | 
				
			||||||
 | 
					                       "E-mail address"),
 | 
				
			||||||
 | 
					        "emailAddress",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_SERIAL_NUMBER,
 | 
				
			||||||
 | 
					                       "id-at-serialNumber",
 | 
				
			||||||
 | 
					                       "Serial number"),
 | 
				
			||||||
 | 
					        "serialNumber",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_ADDRESS,
 | 
				
			||||||
 | 
					                       "id-at-postalAddress",
 | 
				
			||||||
 | 
					                       "Postal address"),
 | 
				
			||||||
 | 
					        "postalAddress",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_POSTAL_CODE, "id-at-postalCode",               "Postal code"),
 | 
				
			||||||
 | 
					        "postalCode",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_SUR_NAME,    "id-at-surName",                  "Surname"),
 | 
				
			||||||
 | 
					        "SN",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_GIVEN_NAME,  "id-at-givenName",                "Given name"),
 | 
				
			||||||
 | 
					        "GN",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_INITIALS,    "id-at-initials",                 "Initials"),
 | 
				
			||||||
 | 
					        "initials",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_GENERATION_QUALIFIER,
 | 
				
			||||||
 | 
					                       "id-at-generationQualifier",
 | 
				
			||||||
 | 
					                       "Generation qualifier"),
 | 
				
			||||||
 | 
					        "generationQualifier",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_TITLE,       "id-at-title",                    "Title"),
 | 
				
			||||||
 | 
					        "title",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_DN_QUALIFIER,
 | 
				
			||||||
 | 
					                       "id-at-dnQualifier",
 | 
				
			||||||
 | 
					                       "Distinguished Name qualifier"),
 | 
				
			||||||
 | 
					        "dnQualifier",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_PSEUDONYM,   "id-at-pseudonym",                "Pseudonym"),
 | 
				
			||||||
 | 
					        "pseudonym",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_UID,            "id-uid",                         "User Id"),
 | 
				
			||||||
 | 
					        "uid",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DOMAIN_COMPONENT,
 | 
				
			||||||
 | 
					                       "id-domainComponent",
 | 
				
			||||||
 | 
					                       "Domain component"),
 | 
				
			||||||
 | 
					        "DC",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AT_UNIQUE_IDENTIFIER,
 | 
				
			||||||
 | 
					                       "id-at-uniqueIdentifier",
 | 
				
			||||||
 | 
					                       "Unique Identifier"),
 | 
				
			||||||
 | 
					        "uniqueIdentifier",
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        NULL,
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_x520_attr_t, x520_attr, oid_x520_attr_type)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_attr_short_name,
 | 
				
			||||||
 | 
					                 oid_x520_attr_t,
 | 
				
			||||||
 | 
					                 x520_attr,
 | 
				
			||||||
 | 
					                 const char *,
 | 
				
			||||||
 | 
					                 short_name)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For X509 extensions
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    int                 ext_type;
 | 
				
			||||||
 | 
					} oid_x509_ext_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_x509_ext_t oid_x509_ext[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_BASIC_CONSTRAINTS,
 | 
				
			||||||
 | 
					                       "id-ce-basicConstraints",
 | 
				
			||||||
 | 
					                       "Basic Constraints"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_KEY_USAGE,            "id-ce-keyUsage",            "Key Usage"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_KEY_USAGE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EXTENDED_KEY_USAGE,
 | 
				
			||||||
 | 
					                       "id-ce-extKeyUsage",
 | 
				
			||||||
 | 
					                       "Extended Key Usage"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_ALT_NAME,
 | 
				
			||||||
 | 
					                       "id-ce-subjectAltName",
 | 
				
			||||||
 | 
					                       "Subject Alt Name"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_NS_CERT_TYPE,
 | 
				
			||||||
 | 
					                       "id-netscape-certtype",
 | 
				
			||||||
 | 
					                       "Netscape Certificate Type"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_NS_CERT_TYPE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_CERTIFICATE_POLICIES,
 | 
				
			||||||
 | 
					                       "id-ce-certificatePolicies",
 | 
				
			||||||
 | 
					                       "Certificate Policies"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER,
 | 
				
			||||||
 | 
					                       "id-ce-subjectKeyIdentifier",
 | 
				
			||||||
 | 
					                       "Subject Key Identifier"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_SUBJECT_KEY_IDENTIFIER,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER,
 | 
				
			||||||
 | 
					                       "id-ce-authorityKeyIdentifier",
 | 
				
			||||||
 | 
					                       "Authority Key Identifier"),
 | 
				
			||||||
 | 
					        MBEDTLS_OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        0,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_x509_ext_t, x509_ext, oid_x509_ext)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_x509_ext_type, oid_x509_ext_t, x509_ext, int, ext_type)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					static const mbedtls_oid_descriptor_t oid_ext_key_usage[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_SERVER_AUTH,
 | 
				
			||||||
 | 
					                   "id-kp-serverAuth",
 | 
				
			||||||
 | 
					                   "TLS Web Server Authentication"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_CLIENT_AUTH,
 | 
				
			||||||
 | 
					                   "id-kp-clientAuth",
 | 
				
			||||||
 | 
					                   "TLS Web Client Authentication"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_CODE_SIGNING,     "id-kp-codeSigning",     "Code Signing"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_EMAIL_PROTECTION, "id-kp-emailProtection", "E-mail Protection"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_TIME_STAMPING,    "id-kp-timeStamping",    "Time Stamping"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_OCSP_SIGNING,     "id-kp-OCSPSigning",     "OCSP Signing"),
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_WISUN_FAN,
 | 
				
			||||||
 | 
					                   "id-kp-wisun-fan-device",
 | 
				
			||||||
 | 
					                   "Wi-SUN Alliance Field Area Network (FAN)"),
 | 
				
			||||||
 | 
					    NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, ext_key_usage, oid_ext_key_usage)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_extended_key_usage,
 | 
				
			||||||
 | 
					                 mbedtls_oid_descriptor_t,
 | 
				
			||||||
 | 
					                 ext_key_usage,
 | 
				
			||||||
 | 
					                 const char *,
 | 
				
			||||||
 | 
					                 description)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const mbedtls_oid_descriptor_t oid_certificate_policies[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    OID_DESCRIPTOR(MBEDTLS_OID_ANY_POLICY,      "anyPolicy",       "Any Policy"),
 | 
				
			||||||
 | 
					    NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, certificate_policies, oid_certificate_policies)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_certificate_policies,
 | 
				
			||||||
 | 
					                 mbedtls_oid_descriptor_t,
 | 
				
			||||||
 | 
					                 certificate_policies,
 | 
				
			||||||
 | 
					                 const char *,
 | 
				
			||||||
 | 
					                 description)
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_X509_REMOVE_INFO */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For SignatureAlgorithmIdentifier
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t           md_alg;
 | 
				
			||||||
 | 
					    mbedtls_pk_type_t           pk_alg;
 | 
				
			||||||
 | 
					} oid_sig_alg_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_sig_alg_t oid_sig_alg[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_RSA_C)
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_MD5)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_MD5,        "md5WithRSAEncryption",     "RSA with MD5"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_MD5,      MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_MD5 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_1)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA1,       "sha-1WithRSAEncryption",   "RSA with SHA1"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,     MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_1 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA224,     "sha224WithRSAEncryption",
 | 
				
			||||||
 | 
					                       "RSA with SHA-224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA224,   MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_224 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA256,     "sha256WithRSAEncryption",
 | 
				
			||||||
 | 
					                       "RSA with SHA-256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA256,   MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA384,     "sha384WithRSAEncryption",
 | 
				
			||||||
 | 
					                       "RSA with SHA-384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA384,   MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_SHA512,     "sha512WithRSAEncryption",
 | 
				
			||||||
 | 
					                       "RSA with SHA-512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA512,   MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_512 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_1)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_RSA_SHA_OBS,      "sha-1WithRSAEncryption",   "RSA with SHA1"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,     MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_1 */
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_RSA_C */
 | 
				
			||||||
 | 
					#if defined(PSA_HAVE_ALG_SOME_ECDSA)
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_1)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA1,       "ecdsa-with-SHA1",      "ECDSA with SHA1"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,     MBEDTLS_PK_ECDSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_1 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA224,     "ecdsa-with-SHA224",    "ECDSA with SHA224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA224,   MBEDTLS_PK_ECDSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA256,     "ecdsa-with-SHA256",    "ECDSA with SHA256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA256,   MBEDTLS_PK_ECDSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA384,     "ecdsa-with-SHA384",    "ECDSA with SHA384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA384,   MBEDTLS_PK_ECDSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_ECDSA_SHA512,     "ecdsa-with-SHA512",    "ECDSA with SHA512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA512,   MBEDTLS_PK_ECDSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_512 */
 | 
				
			||||||
 | 
					#endif /* PSA_HAVE_ALG_SOME_ECDSA */
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_RSA_C)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_RSASSA_PSS,        "RSASSA-PSS",           "RSASSA-PSS"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_NONE,     MBEDTLS_PK_RSASSA_PSS,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_RSA_C */
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_MD_NONE, MBEDTLS_PK_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					FN_OID_GET_DESCRIPTOR_ATTR1(mbedtls_oid_get_sig_alg_desc,
 | 
				
			||||||
 | 
					                            oid_sig_alg_t,
 | 
				
			||||||
 | 
					                            sig_alg,
 | 
				
			||||||
 | 
					                            const char *,
 | 
				
			||||||
 | 
					                            description)
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR2(mbedtls_oid_get_sig_alg,
 | 
				
			||||||
 | 
					                 oid_sig_alg_t,
 | 
				
			||||||
 | 
					                 sig_alg,
 | 
				
			||||||
 | 
					                 mbedtls_md_type_t,
 | 
				
			||||||
 | 
					                 md_alg,
 | 
				
			||||||
 | 
					                 mbedtls_pk_type_t,
 | 
				
			||||||
 | 
					                 pk_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_OID_BY_ATTR2(mbedtls_oid_get_oid_by_sig_alg,
 | 
				
			||||||
 | 
					                        oid_sig_alg_t,
 | 
				
			||||||
 | 
					                        oid_sig_alg,
 | 
				
			||||||
 | 
					                        mbedtls_pk_type_t,
 | 
				
			||||||
 | 
					                        pk_alg,
 | 
				
			||||||
 | 
					                        mbedtls_md_type_t,
 | 
				
			||||||
 | 
					                        md_alg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For PublicKeyInfo (PKCS1, RFC 5480)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_pk_type_t           pk_alg;
 | 
				
			||||||
 | 
					} oid_pk_alg_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_pk_alg_t oid_pk_alg[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS1_RSA,           "rsaEncryption",    "RSA"),
 | 
				
			||||||
 | 
					        MBEDTLS_PK_RSA,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_ALG_UNRESTRICTED, "id-ecPublicKey",   "Generic EC key"),
 | 
				
			||||||
 | 
					        MBEDTLS_PK_ECKEY,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_ALG_ECDH,         "id-ecDH",          "EC key for ECDH"),
 | 
				
			||||||
 | 
					        MBEDTLS_PK_ECKEY_DH,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_PK_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_pk_alg_t, pk_alg, oid_pk_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_pk_alg, oid_pk_alg_t, pk_alg, mbedtls_pk_type_t, pk_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_pk_alg,
 | 
				
			||||||
 | 
					                        oid_pk_alg_t,
 | 
				
			||||||
 | 
					                        oid_pk_alg,
 | 
				
			||||||
 | 
					                        mbedtls_pk_type_t,
 | 
				
			||||||
 | 
					                        pk_alg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For elliptic curves that use namedCurve inside ECParams (RFC 5480)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_ecp_group_id        grp_id;
 | 
				
			||||||
 | 
					} oid_ecp_grp_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_ecp_grp_t oid_ecp_grp[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_R1_192)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP192R1, "secp192r1",    "secp192r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP192R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_R1_192 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_R1_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP224R1, "secp224r1",    "secp224r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP224R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_R1_224 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_R1_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP256R1, "secp256r1",    "secp256r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP256R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_R1_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_R1_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP384R1, "secp384r1",    "secp384r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP384R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_R1_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_R1_521)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP521R1, "secp521r1",    "secp521r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP521R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_R1_521 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_K1_192)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP192K1, "secp192k1",    "secp192k1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP192K1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_K1_192 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_SECP_K1_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_SECP256K1, "secp256k1",    "secp256k1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_SECP256K1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_SECP_K1_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_BP256R1,   "brainpoolP256r1", "brainpool256r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_BP256R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_BP384R1,   "brainpoolP384r1", "brainpool384r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_BP384R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_EC_GRP_BP512R1,   "brainpoolP512r1", "brainpool512r1"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_BP512R1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_ecp_grp_t, grp_id, oid_ecp_grp)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_ec_grp, oid_ecp_grp_t, grp_id, mbedtls_ecp_group_id, grp_id)
 | 
				
			||||||
 | 
					FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_ec_grp,
 | 
				
			||||||
 | 
					                        oid_ecp_grp_t,
 | 
				
			||||||
 | 
					                        oid_ecp_grp,
 | 
				
			||||||
 | 
					                        mbedtls_ecp_group_id,
 | 
				
			||||||
 | 
					                        grp_id)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For Elliptic Curve algorithms that are directly
 | 
				
			||||||
 | 
					 * encoded in the AlgorithmIdentifier (RFC 8410)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_ecp_group_id        grp_id;
 | 
				
			||||||
 | 
					} oid_ecp_grp_algid_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_ecp_grp_algid_t oid_ecp_grp_algid[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_MONTGOMERY_255)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_X25519,               "X25519",       "X25519"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_CURVE25519,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ECC_MONTGOMERY_448)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_X448,                 "X448",         "X448"),
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_CURVE448,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_ECP_DP_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_ecp_grp_algid_t, grp_id_algid, oid_ecp_grp_algid)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_ec_grp_algid,
 | 
				
			||||||
 | 
					                 oid_ecp_grp_algid_t,
 | 
				
			||||||
 | 
					                 grp_id_algid,
 | 
				
			||||||
 | 
					                 mbedtls_ecp_group_id,
 | 
				
			||||||
 | 
					                 grp_id)
 | 
				
			||||||
 | 
					FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_ec_grp_algid,
 | 
				
			||||||
 | 
					                        oid_ecp_grp_algid_t,
 | 
				
			||||||
 | 
					                        oid_ecp_grp_algid,
 | 
				
			||||||
 | 
					                        mbedtls_ecp_group_id,
 | 
				
			||||||
 | 
					                        grp_id)
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_CIPHER_C)
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For PKCS#5 PBES2 encryption algorithm
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_cipher_type_t       cipher_alg;
 | 
				
			||||||
 | 
					} oid_cipher_alg_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_cipher_alg_t oid_cipher_alg[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DES_CBC,              "desCBC",       "DES-CBC"),
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_DES_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DES_EDE3_CBC,         "des-ede3-cbc", "DES-EDE3-CBC"),
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_DES_EDE3_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AES_128_CBC,          "aes128-cbc", "AES128-CBC"),
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_AES_128_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AES_192_CBC,          "aes192-cbc", "AES192-CBC"),
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_AES_192_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_AES_256_CBC,          "aes256-cbc", "AES256-CBC"),
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_AES_256_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_CIPHER_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_cipher_alg_t, cipher_alg, oid_cipher_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_cipher_alg,
 | 
				
			||||||
 | 
					                 oid_cipher_alg_t,
 | 
				
			||||||
 | 
					                 cipher_alg,
 | 
				
			||||||
 | 
					                 mbedtls_cipher_type_t,
 | 
				
			||||||
 | 
					                 cipher_alg)
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_CIPHER_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For digestAlgorithm
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t           md_alg;
 | 
				
			||||||
 | 
					} oid_md_alg_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_md_alg_t oid_md_alg[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_MD5)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_MD5,       "id-md5",       "MD5"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_MD5,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_1)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA1,      "id-sha1",      "SHA-1"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA224,    "id-sha224",    "SHA-224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA224,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA256,    "id-sha256",    "SHA-256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA256,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA384,    "id-sha384",    "SHA-384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA384,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA512,    "id-sha512",    "SHA-512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA512,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_RIPEMD160)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_RIPEMD160, "id-ripemd160", "RIPEMD-160"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_RIPEMD160,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_224,    "id-sha3-224",    "SHA-3-224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_224,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_256,    "id-sha3-256",    "SHA-3-256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_256,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_384,    "id-sha3-384",    "SHA-3-384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_384,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_DIGEST_ALG_SHA3_512,    "id-sha3-512",    "SHA-3-512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_512,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_MD_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_md_alg_t, md_alg, oid_md_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_md_alg, oid_md_alg_t, md_alg, mbedtls_md_type_t, md_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_OID_BY_ATTR1(mbedtls_oid_get_oid_by_md,
 | 
				
			||||||
 | 
					                        oid_md_alg_t,
 | 
				
			||||||
 | 
					                        oid_md_alg,
 | 
				
			||||||
 | 
					                        mbedtls_md_type_t,
 | 
				
			||||||
 | 
					                        md_alg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For HMAC digestAlgorithm
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t           md_hmac;
 | 
				
			||||||
 | 
					} oid_md_hmac_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_md_hmac_t oid_md_hmac[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_1)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA1,      "hmacSHA1",      "HMAC-SHA-1"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_1 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA224,    "hmacSHA224",    "HMAC-SHA-224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA224,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_224 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA256,    "hmacSHA256",    "HMAC-SHA-256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA256,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA384,    "hmacSHA384",    "HMAC-SHA-384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA384,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA512,    "hmacSHA512",    "HMAC-SHA-512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA512,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA_512 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_224)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA3_224,    "hmacSHA3-224",    "HMAC-SHA3-224"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_224,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA3_224 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_256)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA3_256,    "hmacSHA3-256",    "HMAC-SHA3-256"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_256,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA3_256 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_384)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA3_384,    "hmacSHA3-384",    "HMAC-SHA3-384"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_384,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA3_384 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_SHA3_512)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_SHA3_512,    "hmacSHA3-512",    "HMAC-SHA3-512"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA3_512,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_SHA3_512 */
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_ALG_RIPEMD160)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_HMAC_RIPEMD160,    "hmacRIPEMD160",    "HMAC-RIPEMD160"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_RIPEMD160,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_ALG_RIPEMD160 */
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_MD_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_md_hmac_t, md_hmac, oid_md_hmac)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR1(mbedtls_oid_get_md_hmac, oid_md_hmac_t, md_hmac, mbedtls_md_type_t, md_hmac)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_PKCS12_C) && defined(MBEDTLS_CIPHER_C)
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * For PKCS#12 PBEs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
					    mbedtls_oid_descriptor_t    descriptor;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t           md_alg;
 | 
				
			||||||
 | 
					    mbedtls_cipher_type_t       cipher_alg;
 | 
				
			||||||
 | 
					} oid_pkcs12_pbe_alg_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const oid_pkcs12_pbe_alg_t oid_pkcs12_pbe_alg[] =
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC,
 | 
				
			||||||
 | 
					                       "pbeWithSHAAnd3-KeyTripleDES-CBC",
 | 
				
			||||||
 | 
					                       "PBE with SHA1 and 3-Key 3DES"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,      MBEDTLS_CIPHER_DES_EDE3_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        OID_DESCRIPTOR(MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC,
 | 
				
			||||||
 | 
					                       "pbeWithSHAAnd2-KeyTripleDES-CBC",
 | 
				
			||||||
 | 
					                       "PBE with SHA1 and 2-Key 3DES"),
 | 
				
			||||||
 | 
					        MBEDTLS_MD_SHA1,      MBEDTLS_CIPHER_DES_EDE_CBC,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        NULL_OID_DESCRIPTOR,
 | 
				
			||||||
 | 
					        MBEDTLS_MD_NONE, MBEDTLS_CIPHER_NONE,
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					FN_OID_TYPED_FROM_ASN1(oid_pkcs12_pbe_alg_t, pkcs12_pbe_alg, oid_pkcs12_pbe_alg)
 | 
				
			||||||
 | 
					FN_OID_GET_ATTR2(mbedtls_oid_get_pkcs12_pbe_alg,
 | 
				
			||||||
 | 
					                 oid_pkcs12_pbe_alg_t,
 | 
				
			||||||
 | 
					                 pkcs12_pbe_alg,
 | 
				
			||||||
 | 
					                 mbedtls_md_type_t,
 | 
				
			||||||
 | 
					                 md_alg,
 | 
				
			||||||
 | 
					                 mbedtls_cipher_type_t,
 | 
				
			||||||
 | 
					                 cipher_alg)
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_PKCS12_C && MBEDTLS_CIPHER_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_OID_C */
 | 
				
			||||||
							
								
								
									
										695
									
								
								library/x509_oid.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										695
									
								
								library/x509_oid.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,695 @@
 | 
				
			|||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \file oid.h
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \brief Object Identifier (OID) database
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 *  Copyright The Mbed TLS Contributors
 | 
				
			||||||
 | 
					 *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#ifndef MBEDTLS_OID_H
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_H
 | 
				
			||||||
 | 
					#include "mbedtls/private_access.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "tf-psa-crypto/build_info.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "mbedtls/asn1.h"
 | 
				
			||||||
 | 
					#include "mbedtls/pk.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <stddef.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_CIPHER_C)
 | 
				
			||||||
 | 
					#include "mbedtls/cipher.h"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "mbedtls/md.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/** OID is not found. */
 | 
				
			||||||
 | 
					#define MBEDTLS_ERR_OID_NOT_FOUND                         -0x002E
 | 
				
			||||||
 | 
					/** output buffer is too small */
 | 
				
			||||||
 | 
					#define MBEDTLS_ERR_OID_BUF_TOO_SMALL                     -0x000B
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* This is for the benefit of X.509, but defined here in order to avoid
 | 
				
			||||||
 | 
					 * having a "backwards" include of x.509.h here */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * X.509 extension types (internal, arbitrary values for bitsets)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER    (1 << 0)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_SUBJECT_KEY_IDENTIFIER      (1 << 1)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_KEY_USAGE                   (1 << 2)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES        (1 << 3)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_POLICY_MAPPINGS             (1 << 4)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME            (1 << 5)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_ISSUER_ALT_NAME             (1 << 6)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_SUBJECT_DIRECTORY_ATTRS     (1 << 7)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS           (1 << 8)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_NAME_CONSTRAINTS            (1 << 9)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_POLICY_CONSTRAINTS          (1 << 10)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE          (1 << 11)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_CRL_DISTRIBUTION_POINTS     (1 << 12)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_INIHIBIT_ANYPOLICY          (1 << 13)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_FRESHEST_CRL                (1 << 14)
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X509_EXT_NS_CERT_TYPE                (1 << 16)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Maximum number of OID components allowed
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_MAX_COMPONENTS              128
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Top level OID tuples
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISO_MEMBER_BODIES           "\x2a"          /* {iso(1) member-body(2)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISO_IDENTIFIED_ORG          "\x2b"          /* {iso(1) identified-organization(3)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISO_CCITT_DS                "\x55"          /* {joint-iso-ccitt(2) ds(5)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISO_ITU_COUNTRY             "\x60"          /* {joint-iso-itu-t(2) country(16)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * ISO Member bodies OID parts
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_COUNTRY_US                  "\x86\x48"      /* {us(840)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_RSA_DATA_SECURITY       "\x86\xf7\x0d"  /* {rsadsi(113549)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_RSA_COMPANY                 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORG_RSA_DATA_SECURITY                                 /* {iso(1) member-body(2) us(840) rsadsi(113549)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_ANSI_X9_62              "\xce\x3d" /* ansi-X9-62(10045) */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANSI_X9_62                  MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORG_ANSI_X9_62
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * ISO Identified organization OID parts
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_DOD                     "\x06"          /* {dod(6)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_OIW                     "\x0e"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_OIW_SECSIG                  MBEDTLS_OID_ORG_OIW "\x03"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_OIW_SECSIG_ALG              MBEDTLS_OID_OIW_SECSIG "\x02"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_OIW_SECSIG_SHA1             MBEDTLS_OID_OIW_SECSIG_ALG "\x1a"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_THAWTE                  "\x65"          /* thawte(101) */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_THAWTE                      MBEDTLS_OID_ISO_IDENTIFIED_ORG \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORG_THAWTE
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_CERTICOM                "\x81\x04"  /* certicom(132) */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CERTICOM                    MBEDTLS_OID_ISO_IDENTIFIED_ORG \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORG_CERTICOM
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_TELETRUST               "\x24" /* teletrust(36) */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_TELETRUST                   MBEDTLS_OID_ISO_IDENTIFIED_ORG \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORG_TELETRUST
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * ISO ITU OID parts
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORGANIZATION                "\x01"          /* {organization(1)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISO_ITU_US_ORG              MBEDTLS_OID_ISO_ITU_COUNTRY MBEDTLS_OID_COUNTRY_US \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_ORGANIZATION                                                                                            /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_GOV                     "\x65"          /* {gov(101)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_GOV                         MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ORG_NETSCAPE                "\x86\xF8\x42"  /* {netscape(113730)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NETSCAPE                    MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ISO arc for standard certificate and CRL extensions */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ID_CE                       MBEDTLS_OID_ISO_CCITT_DS "\x1D" /**< id-ce OBJECT IDENTIFIER  ::=  {joint-iso-ccitt(2) ds(5) 29} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NIST_ALG                    MBEDTLS_OID_GOV "\x03\x04" /** { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Private Internet Extensions
 | 
				
			||||||
 | 
					 * { iso(1) identified-organization(3) dod(6) internet(1)
 | 
				
			||||||
 | 
					 *                      security(5) mechanisms(5) pkix(7) }
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_INTERNET                    MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_DOD \
 | 
				
			||||||
 | 
					    "\x01"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKIX                        MBEDTLS_OID_INTERNET "\x05\x05\x07"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Arc for standard naming attributes
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT                          MBEDTLS_OID_ISO_CCITT_DS "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_CN                       MBEDTLS_OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_SUR_NAME                 MBEDTLS_OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_SERIAL_NUMBER            MBEDTLS_OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_COUNTRY                  MBEDTLS_OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_LOCALITY                 MBEDTLS_OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_STATE                    MBEDTLS_OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_ORGANIZATION             MBEDTLS_OID_AT "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_ORG_UNIT                 MBEDTLS_OID_AT "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_TITLE                    MBEDTLS_OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_POSTAL_ADDRESS           MBEDTLS_OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_POSTAL_CODE              MBEDTLS_OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_GIVEN_NAME               MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_INITIALS                 MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_GENERATION_QUALIFIER     MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER        MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributeType:= {id-at 45} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_DN_QUALIFIER             MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AT_PSEUDONYM                MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_UID                         "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x01" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) uid(1)} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DOMAIN_COMPONENT            "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * OIDs for standard certificate extensions
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER    MBEDTLS_OID_ID_CE "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 35 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER      MBEDTLS_OID_ID_CE "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 14 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_KEY_USAGE                   MBEDTLS_OID_ID_CE "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CERTIFICATE_POLICIES        MBEDTLS_OID_ID_CE "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::=  { id-ce 32 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_POLICY_MAPPINGS             MBEDTLS_OID_ID_CE "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::=  { id-ce 33 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_SUBJECT_ALT_NAME            MBEDTLS_OID_ID_CE "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::=  { id-ce 17 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ISSUER_ALT_NAME             MBEDTLS_OID_ID_CE "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::=  { id-ce 18 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS     MBEDTLS_OID_ID_CE "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::=  { id-ce 9 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_BASIC_CONSTRAINTS           MBEDTLS_OID_ID_CE "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::=  { id-ce 19 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NAME_CONSTRAINTS            MBEDTLS_OID_ID_CE "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::=  { id-ce 30 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_POLICY_CONSTRAINTS          MBEDTLS_OID_ID_CE "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::=  { id-ce 36 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EXTENDED_KEY_USAGE          MBEDTLS_OID_ID_CE "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CRL_DISTRIBUTION_POINTS     MBEDTLS_OID_ID_CE "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::=  { id-ce 31 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_INIHIBIT_ANYPOLICY          MBEDTLS_OID_ID_CE "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::=  { id-ce 54 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_FRESHEST_CRL                MBEDTLS_OID_ID_CE "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::=  { id-ce 46 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Certificate policies
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANY_POLICY              MBEDTLS_OID_CERTIFICATE_POLICIES "\x00" /**< anyPolicy OBJECT IDENTIFIER ::= { id-ce-certificatePolicies 0 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Netscape certificate extensions
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_CERT                 MBEDTLS_OID_NETSCAPE "\x01"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_CERT_TYPE            MBEDTLS_OID_NS_CERT  "\x01"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_BASE_URL             MBEDTLS_OID_NS_CERT  "\x02"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_REVOCATION_URL       MBEDTLS_OID_NS_CERT  "\x03"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_CA_REVOCATION_URL    MBEDTLS_OID_NS_CERT  "\x04"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_RENEWAL_URL          MBEDTLS_OID_NS_CERT  "\x07"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_CA_POLICY_URL        MBEDTLS_OID_NS_CERT  "\x08"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_SSL_SERVER_NAME      MBEDTLS_OID_NS_CERT  "\x0C"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_COMMENT              MBEDTLS_OID_NS_CERT  "\x0D"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_DATA_TYPE            MBEDTLS_OID_NETSCAPE "\x02"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_NS_CERT_SEQUENCE        MBEDTLS_OID_NS_DATA_TYPE "\x05"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * OIDs for CRL extensions
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD    MBEDTLS_OID_ID_CE "\x10"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CRL_NUMBER                  MBEDTLS_OID_ID_CE "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * X.509 v3 Extended key usage OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE      MBEDTLS_OID_EXTENDED_KEY_USAGE "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_KP                          MBEDTLS_OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_SERVER_AUTH                 MBEDTLS_OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CLIENT_AUTH                 MBEDTLS_OID_KP "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_CODE_SIGNING                MBEDTLS_OID_KP "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EMAIL_PROTECTION            MBEDTLS_OID_KP "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_TIME_STAMPING               MBEDTLS_OID_KP "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_OCSP_SIGNING                MBEDTLS_OID_KP "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Wi-SUN Alliance Field Area Network
 | 
				
			||||||
 | 
					 * { iso(1) identified-organization(3) dod(6) internet(1)
 | 
				
			||||||
 | 
					 *                      private(4) enterprise(1) WiSUN(45605) FieldAreaNetwork(1) }
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_WISUN_FAN                   MBEDTLS_OID_INTERNET "\x04\x01\x82\xe4\x25\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ON                          MBEDTLS_OID_PKIX "\x08" /**< id-on OBJECT IDENTIFIER ::= { id-pkix 8 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ON_HW_MODULE_NAME           MBEDTLS_OID_ON "\x04" /**< id-on-hardwareModuleName OBJECT IDENTIFIER ::= { id-on 4 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS definition OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS                MBEDTLS_OID_RSA_COMPANY "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1               MBEDTLS_OID_PKCS "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5               MBEDTLS_OID_PKCS "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7               MBEDTLS_OID_PKCS "\x07" /**< pkcs-7 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 7 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS9               MBEDTLS_OID_PKCS "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12              MBEDTLS_OID_PKCS "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#1 OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_RSA           MBEDTLS_OID_PKCS1 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_MD5           MBEDTLS_OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_SHA1          MBEDTLS_OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_SHA224        MBEDTLS_OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_SHA256        MBEDTLS_OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_SHA384        MBEDTLS_OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS1_SHA512        MBEDTLS_OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_RSA_SHA_OBS         "\x2B\x0E\x03\x02\x1D"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS9_EMAIL         MBEDTLS_OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* RFC 4055 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_RSASSA_PSS          MBEDTLS_OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_MGF1                MBEDTLS_OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Digest algorithms
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_MD5              MBEDTLS_OID_RSA_COMPANY "\x02\x05" /**< id-mbedtls_md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA1             MBEDTLS_OID_ISO_IDENTIFIED_ORG \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_OIW_SECSIG_SHA1                                                                        /**< id-mbedtls_sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA224           MBEDTLS_OID_NIST_ALG "\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA256           MBEDTLS_OID_NIST_ALG "\x02\x01" /**< id-mbedtls_sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA384           MBEDTLS_OID_NIST_ALG "\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA512           MBEDTLS_OID_NIST_ALG "\x02\x03" /**< id-mbedtls_sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_RIPEMD160        MBEDTLS_OID_TELETRUST "\x03\x02\x01" /**< id-ripemd160 OBJECT IDENTIFIER :: { iso(1) identified-organization(3) teletrust(36) algorithm(3) hashAlgorithm(2) ripemd160(1) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA3_224         MBEDTLS_OID_NIST_ALG "\x02\x07" /**< id-sha3-224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) sha3-224(7) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA3_256         MBEDTLS_OID_NIST_ALG "\x02\x08" /**< id-sha3-256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) sha3-256(8) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA3_384         MBEDTLS_OID_NIST_ALG "\x02\x09" /**< id-sha3-384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) sha3-384(9) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DIGEST_ALG_SHA3_512         MBEDTLS_OID_NIST_ALG "\x02\x0a" /**< id-sha3-512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) sha3-512(10) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA1                   MBEDTLS_OID_RSA_COMPANY "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA224                 MBEDTLS_OID_RSA_COMPANY "\x02\x08" /**< id-hmacWithSHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 8 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA256                 MBEDTLS_OID_RSA_COMPANY "\x02\x09" /**< id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 9 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA384                 MBEDTLS_OID_RSA_COMPANY "\x02\x0A" /**< id-hmacWithSHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 10 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA512                 MBEDTLS_OID_RSA_COMPANY "\x02\x0B" /**< id-hmacWithSHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 11 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA3_224               MBEDTLS_OID_NIST_ALG "\x02\x0d" /**< id-hmacWithSHA3-512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) hmacWithSHA3-224(13) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA3_256               MBEDTLS_OID_NIST_ALG "\x02\x0e" /**< id-hmacWithSHA3-512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) hmacWithSHA3-256(14) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA3_384               MBEDTLS_OID_NIST_ALG "\x02\x0f" /**< id-hmacWithSHA3-512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) hmacWithSHA3-384(15) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_SHA3_512               MBEDTLS_OID_NIST_ALG "\x02\x10" /**< id-hmacWithSHA3-512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) hmacWithSHA3-512(16) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_HMAC_RIPEMD160              MBEDTLS_OID_INTERNET "\x05\x05\x08\x01\x04" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= {iso(1) iso-identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) ipsec(8) isakmpOakley(1) hmacRIPEMD160(4)} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Encryption algorithms,
 | 
				
			||||||
 | 
					 * the following standardized object identifiers are specified at
 | 
				
			||||||
 | 
					 * https://datatracker.ietf.org/doc/html/rfc8018#appendix-C.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DES_CBC                     MBEDTLS_OID_ISO_IDENTIFIED_ORG \
 | 
				
			||||||
 | 
					        MBEDTLS_OID_OIW_SECSIG_ALG "\x07"                                                                        /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_DES_EDE3_CBC                MBEDTLS_OID_RSA_COMPANY "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES                         MBEDTLS_OID_NIST_ALG "\x01" /** aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES_128_CBC                 MBEDTLS_OID_AES "\x02" /** aes128-cbc-pad OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) aes(1) aes128-CBC-PAD(2) } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES_192_CBC                 MBEDTLS_OID_AES "\x16" /** aes192-cbc-pad OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) aes(1) aes192-CBC-PAD(22) } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES_256_CBC                 MBEDTLS_OID_AES "\x2a" /** aes256-cbc-pad OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) aes(1) aes256-CBC-PAD(42) } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Key Wrapping algorithms
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * RFC 5649
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES128_KW                   MBEDTLS_OID_AES "\x05" /** id-aes128-wrap     OBJECT IDENTIFIER ::= { aes 5 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES128_KWP                  MBEDTLS_OID_AES "\x08" /** id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes 8 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES192_KW                   MBEDTLS_OID_AES "\x19" /** id-aes192-wrap     OBJECT IDENTIFIER ::= { aes 25 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES192_KWP                  MBEDTLS_OID_AES "\x1c" /** id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes 28 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES256_KW                   MBEDTLS_OID_AES "\x2d" /** id-aes256-wrap     OBJECT IDENTIFIER ::= { aes 45 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_AES256_KWP                  MBEDTLS_OID_AES "\x30" /** id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes 48 } */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#5 OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBKDF2                MBEDTLS_OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBES2                 MBEDTLS_OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBMAC1                MBEDTLS_OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#5 PBES1 algorithms
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC       MBEDTLS_OID_PKCS5 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC       MBEDTLS_OID_PKCS5 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC      MBEDTLS_OID_PKCS5 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC      MBEDTLS_OID_PKCS5 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#7 OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_DATA                        MBEDTLS_OID_PKCS7 "\x01" /**< Content type is Data OBJECT IDENTIFIER ::= {pkcs-7 1} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_SIGNED_DATA                 MBEDTLS_OID_PKCS7 "\x02" /**< Content type is Signed Data OBJECT IDENTIFIER ::= {pkcs-7 2} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_ENVELOPED_DATA              MBEDTLS_OID_PKCS7 "\x03" /**< Content type is Enveloped Data OBJECT IDENTIFIER ::= {pkcs-7 3} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_SIGNED_AND_ENVELOPED_DATA   MBEDTLS_OID_PKCS7 "\x04" /**< Content type is Signed and Enveloped Data OBJECT IDENTIFIER ::= {pkcs-7 4} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_DIGESTED_DATA               MBEDTLS_OID_PKCS7 "\x05" /**< Content type is Digested Data OBJECT IDENTIFIER ::= {pkcs-7 5} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS7_ENCRYPTED_DATA              MBEDTLS_OID_PKCS7 "\x06" /**< Content type is Encrypted Data OBJECT IDENTIFIER ::= {pkcs-7 6} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#8 OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS9_CSR_EXT_REQ           MBEDTLS_OID_PKCS9 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * PKCS#12 PBE OIDs
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12_PBE                      MBEDTLS_OID_PKCS12 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC    MBEDTLS_OID_PKCS12_PBE "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC    MBEDTLS_OID_PKCS12_PBE "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC     MBEDTLS_OID_PKCS12_PBE "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC      MBEDTLS_OID_PKCS12_PBE "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * EC key algorithms from RFC 5480
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* id-ecPublicKey OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *       iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_ALG_UNRESTRICTED         MBEDTLS_OID_ANSI_X9_62 "\x02\01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*   id-ecDH OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *     iso(1) identified-organization(3) certicom(132)
 | 
				
			||||||
 | 
					 *     schemes(1) ecdh(12) } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_ALG_ECDH                 MBEDTLS_OID_CERTICOM "\x01\x0c"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp192r1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP192R1        MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp224r1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 33 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP224R1        MBEDTLS_OID_CERTICOM "\x00\x21"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp256r1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP256R1        MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x07"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp384r1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 34 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP384R1        MBEDTLS_OID_CERTICOM "\x00\x22"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp521r1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 35 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP521R1        MBEDTLS_OID_CERTICOM "\x00\x23"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp192k1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 31 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP192K1        MBEDTLS_OID_CERTICOM "\x00\x1f"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp224k1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 32 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP224K1        MBEDTLS_OID_CERTICOM "\x00\x20"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* secp256k1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) identified-organization(3) certicom(132) curve(0) 10 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_SECP256K1        MBEDTLS_OID_CERTICOM "\x00\x0a"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* RFC 5639 4.1
 | 
				
			||||||
 | 
					 * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1)
 | 
				
			||||||
 | 
					 * identified-organization(3) teletrust(36) algorithm(3) signature-
 | 
				
			||||||
 | 
					 * algorithm(3) ecSign(2) 8}
 | 
				
			||||||
 | 
					 * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1}
 | 
				
			||||||
 | 
					 * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_BRAINPOOL_V1         MBEDTLS_OID_TELETRUST "\x03\x03\x02\x08\x01\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_BP256R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x07"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_BP384R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0B"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_EC_GRP_BP512R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0D"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * SEC1 C.1
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
 | 
				
			||||||
 | 
					 * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE   MBEDTLS_OID_ANSI_X9_62 "\x01"
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD  MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE "\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * ECDSA signature identifiers, from RFC 5480
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANSI_X9_62_SIG          MBEDTLS_OID_ANSI_X9_62 "\x04" /* signatures(4) */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ANSI_X9_62_SIG_SHA2     MBEDTLS_OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ECDSA_SHA1              MBEDTLS_OID_ANSI_X9_62_SIG "\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
 | 
				
			||||||
 | 
					 *   ecdsa-with-SHA2(3) 1 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ECDSA_SHA224            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x01"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
 | 
				
			||||||
 | 
					 *   ecdsa-with-SHA2(3) 2 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ECDSA_SHA256            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x02"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
 | 
				
			||||||
 | 
					 *   ecdsa-with-SHA2(3) 3 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ECDSA_SHA384            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x03"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= {
 | 
				
			||||||
 | 
					 *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4)
 | 
				
			||||||
 | 
					 *   ecdsa-with-SHA2(3) 4 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ECDSA_SHA512            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x04"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * EC key algorithms from RFC 8410
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X25519                  MBEDTLS_OID_THAWTE "\x6e" /**< id-X25519    OBJECT IDENTIFIER ::= { 1 3 101 110 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_X448                    MBEDTLS_OID_THAWTE "\x6f" /**< id-X448      OBJECT IDENTIFIER ::= { 1 3 101 111 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ED25519                 MBEDTLS_OID_THAWTE "\x70" /**< id-Ed25519   OBJECT IDENTIFIER ::= { 1 3 101 112 } */
 | 
				
			||||||
 | 
					#define MBEDTLS_OID_ED448                   MBEDTLS_OID_THAWTE "\x71" /**< id-Ed448     OBJECT IDENTIFIER ::= { 1 3 101 113 } */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					extern "C" {
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief Base OID descriptor structure
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					typedef struct mbedtls_oid_descriptor_t {
 | 
				
			||||||
 | 
					    const char *MBEDTLS_PRIVATE(asn1);               /*!< OID ASN.1 representation       */
 | 
				
			||||||
 | 
					    size_t MBEDTLS_PRIVATE(asn1_len);                /*!< length of asn1                 */
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					    const char *MBEDTLS_PRIVATE(name);               /*!< official name (e.g. from RFC)  */
 | 
				
			||||||
 | 
					    const char *MBEDTLS_PRIVATE(description);        /*!< human friendly description     */
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					} mbedtls_oid_descriptor_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate an X.509 extension OID into local values
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param ext_type place to store the extension type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_x509_ext_type(const mbedtls_asn1_buf *oid, int *ext_type);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate an X.509 attribute type OID into the short name
 | 
				
			||||||
 | 
					 *                 (e.g. the OID for an X520 Common Name into "CN")
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param short_name    place to store the string pointer
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_attr_short_name(const mbedtls_asn1_buf *oid, const char **short_name);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate PublicKeyAlgorithm OID into pk_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param pk_alg   place to store public key algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_pk_alg(const mbedtls_asn1_buf *oid, mbedtls_pk_type_t *pk_alg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate pk_type into PublicKeyAlgorithm OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param pk_alg   Public key type to look for
 | 
				
			||||||
 | 
					 * \param oid      place to store ASN.1 OID string pointer
 | 
				
			||||||
 | 
					 * \param olen     length of the OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_oid_by_pk_alg(mbedtls_pk_type_t pk_alg,
 | 
				
			||||||
 | 
					                                  const char **oid, size_t *olen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate NamedCurve OID into an EC group identifier
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param grp_id   place to store group id
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_ec_grp(const mbedtls_asn1_buf *oid, mbedtls_ecp_group_id *grp_id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate EC group identifier into NamedCurve OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param grp_id   EC group identifier
 | 
				
			||||||
 | 
					 * \param oid      place to store ASN.1 OID string pointer
 | 
				
			||||||
 | 
					 * \param olen     length of the OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_oid_by_ec_grp(mbedtls_ecp_group_id grp_id,
 | 
				
			||||||
 | 
					                                  const char **oid, size_t *olen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate AlgorithmIdentifier OID into an EC group identifier,
 | 
				
			||||||
 | 
					 *                 for curves that are directly encoded at this level
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param grp_id   place to store group id
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_ec_grp_algid(const mbedtls_asn1_buf *oid, mbedtls_ecp_group_id *grp_id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate EC group identifier into AlgorithmIdentifier OID,
 | 
				
			||||||
 | 
					 *                 for curves that are directly encoded at this level
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param grp_id   EC group identifier
 | 
				
			||||||
 | 
					 * \param oid      place to store ASN.1 OID string pointer
 | 
				
			||||||
 | 
					 * \param olen     length of the OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_oid_by_ec_grp_algid(mbedtls_ecp_group_id grp_id,
 | 
				
			||||||
 | 
					                                        const char **oid, size_t *olen);
 | 
				
			||||||
 | 
					#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate SignatureAlgorithm OID into md_type and pk_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param md_alg   place to store message digest algorithm
 | 
				
			||||||
 | 
					 * \param pk_alg   place to store public key algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_sig_alg(const mbedtls_asn1_buf *oid,
 | 
				
			||||||
 | 
					                            mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate SignatureAlgorithm OID into description
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param desc     place to store string pointer
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_sig_alg_desc(const mbedtls_asn1_buf *oid, const char **desc);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate md_type and pk_type into SignatureAlgorithm OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param md_alg   message digest algorithm
 | 
				
			||||||
 | 
					 * \param pk_alg   public key algorithm
 | 
				
			||||||
 | 
					 * \param oid      place to store ASN.1 OID string pointer
 | 
				
			||||||
 | 
					 * \param olen     length of the OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_oid_by_sig_alg(mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg,
 | 
				
			||||||
 | 
					                                   const char **oid, size_t *olen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate hmac algorithm OID into md_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param md_hmac  place to store message hmac algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_md_hmac(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_hmac);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate hash algorithm OID into md_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param md_alg   place to store message digest algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_md_alg(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !defined(MBEDTLS_X509_REMOVE_INFO)
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate Extended Key Usage OID into description
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param desc     place to store string pointer
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_extended_key_usage(const mbedtls_asn1_buf *oid, const char **desc);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate certificate policies OID into description
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid      OID to use
 | 
				
			||||||
 | 
					 * \param desc     place to store string pointer
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_certificate_policies(const mbedtls_asn1_buf *oid, const char **desc);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate md_type into hash algorithm OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param md_alg   message digest algorithm
 | 
				
			||||||
 | 
					 * \param oid      place to store ASN.1 OID string pointer
 | 
				
			||||||
 | 
					 * \param olen     length of the OID
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_oid_by_md(mbedtls_md_type_t md_alg, const char **oid, size_t *olen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_CIPHER_C)
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate encryption algorithm OID into cipher_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid           OID to use
 | 
				
			||||||
 | 
					 * \param cipher_alg    place to store cipher algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_cipher_alg(const mbedtls_asn1_buf *oid, mbedtls_cipher_type_t *cipher_alg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(MBEDTLS_PKCS12_C)
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * \brief          Translate PKCS#12 PBE algorithm OID into md_type and
 | 
				
			||||||
 | 
					 *                 cipher_type
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \param oid           OID to use
 | 
				
			||||||
 | 
					 * \param md_alg        place to store message digest algorithm
 | 
				
			||||||
 | 
					 * \param cipher_alg    place to store cipher algorithm
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int mbedtls_oid_get_pkcs12_pbe_alg(const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg,
 | 
				
			||||||
 | 
					                                   mbedtls_cipher_type_t *cipher_alg);
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_PKCS12_C */
 | 
				
			||||||
 | 
					#endif /* MBEDTLS_CIPHER_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif /* oid.h */
 | 
				
			||||||
@@ -1140,7 +1140,6 @@ static int ssl_async_set_key(ssl_async_key_context_t *ctx,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
typedef enum {
 | 
					typedef enum {
 | 
				
			||||||
    ASYNC_OP_SIGN,
 | 
					    ASYNC_OP_SIGN,
 | 
				
			||||||
    ASYNC_OP_DECRYPT,
 | 
					 | 
				
			||||||
} ssl_async_operation_type_t;
 | 
					} ssl_async_operation_type_t;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
typedef struct {
 | 
					typedef struct {
 | 
				
			||||||
@@ -1160,7 +1159,6 @@ typedef struct {
 | 
				
			|||||||
static const char *const ssl_async_operation_names[] =
 | 
					static const char *const ssl_async_operation_names[] =
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
    "sign",
 | 
					    "sign",
 | 
				
			||||||
    "decrypt",
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int ssl_async_start(mbedtls_ssl_context *ssl,
 | 
					static int ssl_async_start(mbedtls_ssl_context *ssl,
 | 
				
			||||||
@@ -1261,11 +1259,6 @@ static int ssl_async_resume(mbedtls_ssl_context *ssl,
 | 
				
			|||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    switch (ctx->operation_type) {
 | 
					    switch (ctx->operation_type) {
 | 
				
			||||||
        case ASYNC_OP_DECRYPT:
 | 
					 | 
				
			||||||
            ret = mbedtls_pk_decrypt(key_slot->pk,
 | 
					 | 
				
			||||||
                                     ctx->input, ctx->input_len,
 | 
					 | 
				
			||||||
                                     output, output_len, output_size);
 | 
					 | 
				
			||||||
            break;
 | 
					 | 
				
			||||||
        case ASYNC_OP_SIGN:
 | 
					        case ASYNC_OP_SIGN:
 | 
				
			||||||
            ret = mbedtls_pk_sign(key_slot->pk,
 | 
					            ret = mbedtls_pk_sign(key_slot->pk,
 | 
				
			||||||
                                  ctx->md_alg,
 | 
					                                  ctx->md_alg,
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -50,8 +50,15 @@ int main(void)
 | 
				
			|||||||
#if defined(MBEDTLS_SSL_TLS_C)
 | 
					#if defined(MBEDTLS_SSL_TLS_C)
 | 
				
			||||||
    void *tls_so = dlopen(TLS_SO_FILENAME, RTLD_NOW);
 | 
					    void *tls_so = dlopen(TLS_SO_FILENAME, RTLD_NOW);
 | 
				
			||||||
    CHECK_DLERROR("dlopen", TLS_SO_FILENAME);
 | 
					    CHECK_DLERROR("dlopen", TLS_SO_FILENAME);
 | 
				
			||||||
 | 
					#pragma GCC diagnostic push
 | 
				
			||||||
 | 
					    /* dlsym() returns an object pointer which is meant to be used as a
 | 
				
			||||||
 | 
					     * function pointer. This has undefined behavior in standard C, so
 | 
				
			||||||
 | 
					     * "gcc -std=c99 -pedantic" complains about it, but it is perfectly
 | 
				
			||||||
 | 
					     * fine on platforms that have dlsym(). */
 | 
				
			||||||
 | 
					#pragma GCC diagnostic ignored "-Wpedantic"
 | 
				
			||||||
    const int *(*ssl_list_ciphersuites)(void) =
 | 
					    const int *(*ssl_list_ciphersuites)(void) =
 | 
				
			||||||
        dlsym(tls_so, "mbedtls_ssl_list_ciphersuites");
 | 
					        dlsym(tls_so, "mbedtls_ssl_list_ciphersuites");
 | 
				
			||||||
 | 
					#pragma GCC diagnostic pop
 | 
				
			||||||
    CHECK_DLERROR("dlsym", "mbedtls_ssl_list_ciphersuites");
 | 
					    CHECK_DLERROR("dlsym", "mbedtls_ssl_list_ciphersuites");
 | 
				
			||||||
    const int *ciphersuites = ssl_list_ciphersuites();
 | 
					    const int *ciphersuites = ssl_list_ciphersuites();
 | 
				
			||||||
    for (n = 0; ciphersuites[n] != 0; n++) {/* nothing to do, we're just counting */
 | 
					    for (n = 0; ciphersuites[n] != 0; n++) {/* nothing to do, we're just counting */
 | 
				
			||||||
@@ -85,9 +92,15 @@ int main(void)
 | 
				
			|||||||
        CHECK_DLERROR("dlopen", TFPSACRYPTO_SO_FILENAME);
 | 
					        CHECK_DLERROR("dlopen", TFPSACRYPTO_SO_FILENAME);
 | 
				
			||||||
        crypto_so_filename = TFPSACRYPTO_SO_FILENAME;
 | 
					        crypto_so_filename = TFPSACRYPTO_SO_FILENAME;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					#pragma GCC diagnostic push
 | 
				
			||||||
 | 
					    /* dlsym() returns an object pointer which is meant to be used as a
 | 
				
			||||||
 | 
					     * function pointer. This has undefined behavior in standard C, so
 | 
				
			||||||
 | 
					     * "gcc -std=c99 -pedantic" complains about it, but it is perfectly
 | 
				
			||||||
 | 
					     * fine on platforms that have dlsym(). */
 | 
				
			||||||
 | 
					#pragma GCC diagnostic ignored "-Wpedantic"
 | 
				
			||||||
    const int *(*md_list)(void) =
 | 
					    const int *(*md_list)(void) =
 | 
				
			||||||
        dlsym(crypto_so, "mbedtls_md_list");
 | 
					        dlsym(crypto_so, "mbedtls_md_list");
 | 
				
			||||||
 | 
					#pragma GCC diagnostic pop
 | 
				
			||||||
    CHECK_DLERROR("dlsym", "mbedtls_md_list");
 | 
					    CHECK_DLERROR("dlsym", "mbedtls_md_list");
 | 
				
			||||||
    const int *mds = md_list();
 | 
					    const int *mds = md_list();
 | 
				
			||||||
    for (n = 0; mds[n] != 0; n++) {/* nothing to do, we're just counting */
 | 
					    for (n = 0; mds[n] != 0; n++) {/* nothing to do, we're just counting */
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -73,6 +73,36 @@ support_test_gcc_latest_opt () {
 | 
				
			|||||||
    type "$GCC_LATEST" >/dev/null 2>/dev/null
 | 
					    type "$GCC_LATEST" >/dev/null 2>/dev/null
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Prepare for a non-regression for https://github.com/Mbed-TLS/mbedtls/issues/9814 :
 | 
				
			||||||
 | 
					# test with GCC 15.
 | 
				
			||||||
 | 
					# Eventually, $GCC_LATEST will be GCC 15 or above, and we can remove this
 | 
				
			||||||
 | 
					# separate component.
 | 
				
			||||||
 | 
					# For the time being, we don't make $GCC_LATEST be GCC 15 on the CI
 | 
				
			||||||
 | 
					# platform, because that would break branches where #9814 isn't fixed yet.
 | 
				
			||||||
 | 
					support_test_gcc15_drivers_opt () {
 | 
				
			||||||
 | 
					    if type gcc-15 >/dev/null 2>/dev/null; then
 | 
				
			||||||
 | 
					        GCC_15=gcc-15
 | 
				
			||||||
 | 
					    elif [ -x /usr/local/gcc-15/bin/gcc-15 ]; then
 | 
				
			||||||
 | 
					        GCC_15=/usr/local/gcc-15/bin/gcc-15
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
					        return 1
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					component_test_gcc15_drivers_opt () {
 | 
				
			||||||
 | 
					    msg "build: GCC 15: full + test drivers dispatching to builtins"
 | 
				
			||||||
 | 
					    scripts/config.py full
 | 
				
			||||||
 | 
					    loc_cflags="$ASAN_CFLAGS -DPSA_CRYPTO_DRIVER_TEST -DMBEDTLS_CONFIG_ADJUST_TEST_ACCELERATORS"
 | 
				
			||||||
 | 
					    loc_cflags="${loc_cflags} -I../framework/tests/include -O2"
 | 
				
			||||||
 | 
					    # Allow a warning that we don't yet comply to.
 | 
				
			||||||
 | 
					    # https://github.com/Mbed-TLS/mbedtls/issues/9944
 | 
				
			||||||
 | 
					    loc_cflags="${loc_cflags} -Wno-error=unterminated-string-initialization"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    make CC=$GCC_15 CFLAGS="${loc_cflags}" LDFLAGS="$ASAN_CFLAGS"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    msg "test: GCC 15: full + test drivers dispatching to builtins"
 | 
				
			||||||
 | 
					    make test
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
component_test_gcc_earliest_opt () {
 | 
					component_test_gcc_earliest_opt () {
 | 
				
			||||||
    scripts/config.py full
 | 
					    scripts/config.py full
 | 
				
			||||||
    test_build_opt 'full config' "$GCC_EARLIEST" -O2
 | 
					    test_build_opt 'full config' "$GCC_EARLIEST" -O2
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -281,20 +281,26 @@ REVERSE_DEPENDENCIES = {
 | 
				
			|||||||
    'PSA_WANT_ECC_MONTGOMERY_448': ['MBEDTLS_ECP_DP_CURVE448_ENABLED'],
 | 
					    'PSA_WANT_ECC_MONTGOMERY_448': ['MBEDTLS_ECP_DP_CURVE448_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_R1_192': ['MBEDTLS_ECP_DP_SECP192R1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_R1_192': ['MBEDTLS_ECP_DP_SECP192R1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_R1_224': ['MBEDTLS_ECP_DP_SECP224R1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_R1_224': ['MBEDTLS_ECP_DP_SECP224R1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_R1_256': ['MBEDTLS_ECJPAKE_C',
 | 
					    'PSA_WANT_ECC_SECP_R1_256': ['PSA_WANT_ALG_JPAKE',
 | 
				
			||||||
                                 'MBEDTLS_ECP_DP_SECP256R1_ENABLED'],
 | 
					                                 'MBEDTLS_ECP_DP_SECP256R1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_R1_384': ['MBEDTLS_ECP_DP_SECP384R1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_R1_384': ['MBEDTLS_ECP_DP_SECP384R1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_R1_521': ['MBEDTLS_ECP_DP_SECP521R1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_R1_521': ['MBEDTLS_ECP_DP_SECP521R1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_K1_192': ['MBEDTLS_ECP_DP_SECP192K1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_K1_192': ['MBEDTLS_ECP_DP_SECP192K1_ENABLED'],
 | 
				
			||||||
    'PSA_WANT_ECC_SECP_K1_256': ['MBEDTLS_ECP_DP_SECP256K1_ENABLED'],
 | 
					    'PSA_WANT_ECC_SECP_K1_256': ['MBEDTLS_ECP_DP_SECP256K1_ENABLED'],
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    'MBEDTLS_ECDSA_C': ['MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
 | 
					    'PSA_WANT_ALG_ECDSA': ['PSA_WANT_ALG_DETERMINISTIC_ECDSA',
 | 
				
			||||||
 | 
					                           'MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
 | 
				
			||||||
                           'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
 | 
					                           'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
 | 
				
			||||||
 | 
					                           'MBEDTLS_ECDSA_C'],
 | 
				
			||||||
 | 
					    'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC': [
 | 
				
			||||||
        'PSA_WANT_ALG_ECDSA',
 | 
					        'PSA_WANT_ALG_ECDSA',
 | 
				
			||||||
                        'PSA_WANT_ALG_DETERMINISTIC_ECDSA'],
 | 
					        'PSA_WANT_ALG_ECDH', 'MBEDTLS_ECDH_C',
 | 
				
			||||||
    'MBEDTLS_ECP_C': ['MBEDTLS_ECDSA_C',
 | 
					        'PSA_WANT_ALG_JPAKE',
 | 
				
			||||||
                      'MBEDTLS_ECDH_C', 'PSA_WANT_ALG_ECDH',
 | 
					        'PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY',
 | 
				
			||||||
                      'MBEDTLS_ECJPAKE_C',
 | 
					        'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT',
 | 
				
			||||||
 | 
					        'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT',
 | 
				
			||||||
 | 
					        'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE',
 | 
				
			||||||
 | 
					        'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE',
 | 
				
			||||||
        'MBEDTLS_ECP_RESTARTABLE',
 | 
					        'MBEDTLS_ECP_RESTARTABLE',
 | 
				
			||||||
        'MBEDTLS_PK_PARSE_EC_EXTENDED',
 | 
					        'MBEDTLS_PK_PARSE_EC_EXTENDED',
 | 
				
			||||||
        'MBEDTLS_PK_PARSE_EC_COMPRESSED',
 | 
					        'MBEDTLS_PK_PARSE_EC_COMPRESSED',
 | 
				
			||||||
@@ -303,28 +309,24 @@ REVERSE_DEPENDENCIES = {
 | 
				
			|||||||
        'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
 | 
					        'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
 | 
				
			||||||
        'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED',
 | 
					        'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED',
 | 
				
			||||||
        'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED',
 | 
					        'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY',
 | 
					        'MBEDTLS_ECP_C'],
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC',
 | 
					    'PSA_WANT_ALG_JPAKE': ['MBEDTLS_ECJPAKE_C',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT',
 | 
					                           'MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT',
 | 
					    'PSA_WANT_ALG_RSA_OAEP': ['PSA_WANT_ALG_RSA_PSS',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE',
 | 
					                              'MBEDTLS_X509_RSASSA_PSS_SUPPORT',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE'],
 | 
					                              'MBEDTLS_PKCS1_V21'],
 | 
				
			||||||
    'MBEDTLS_ECJPAKE_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
 | 
					    'PSA_WANT_ALG_RSA_PKCS1V15_CRYPT': ['PSA_WANT_ALG_RSA_PKCS1V15_SIGN',
 | 
				
			||||||
                          'PSA_WANT_ALG_JPAKE'],
 | 
					                                        'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
 | 
				
			||||||
    'MBEDTLS_PKCS1_V21': ['MBEDTLS_X509_RSASSA_PSS_SUPPORT',
 | 
					                                        'MBEDTLS_PKCS1_V15'],
 | 
				
			||||||
                          'PSA_WANT_ALG_RSA_OAEP',
 | 
					    'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC': [
 | 
				
			||||||
                          'PSA_WANT_ALG_RSA_PSS'],
 | 
					 | 
				
			||||||
    'MBEDTLS_PKCS1_V15': ['MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
 | 
					 | 
				
			||||||
        'PSA_WANT_ALG_RSA_PKCS1V15_CRYPT',
 | 
					        'PSA_WANT_ALG_RSA_PKCS1V15_CRYPT',
 | 
				
			||||||
                          'PSA_WANT_ALG_RSA_PKCS1V15_SIGN'],
 | 
					        'PSA_WANT_ALG_RSA_OAEP',
 | 
				
			||||||
    'MBEDTLS_RSA_C': ['MBEDTLS_PKCS1_V15',
 | 
					 | 
				
			||||||
                      'MBEDTLS_PKCS1_V21',
 | 
					 | 
				
			||||||
                      'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
 | 
					 | 
				
			||||||
        'PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY',
 | 
					        'PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC',
 | 
					 | 
				
			||||||
        'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT',
 | 
					        'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT',
 | 
				
			||||||
        'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT',
 | 
					        'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT',
 | 
				
			||||||
                      'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE'],
 | 
					        'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE',
 | 
				
			||||||
 | 
					        'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
 | 
				
			||||||
 | 
					        'MBEDTLS_RSA_C'],
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    'MBEDTLS_MD5_C' : ['PSA_WANT_ALG_MD5'],
 | 
					    'MBEDTLS_MD5_C' : ['PSA_WANT_ALG_MD5'],
 | 
				
			||||||
    'MBEDTLS_RIPEMD160_C' : ['PSA_WANT_ALG_RIPEMD160'],
 | 
					    'MBEDTLS_RIPEMD160_C' : ['PSA_WANT_ALG_RIPEMD160'],
 | 
				
			||||||
@@ -359,12 +361,10 @@ REVERSE_DEPENDENCIES = {
 | 
				
			|||||||
EXCLUSIVE_GROUPS = {
 | 
					EXCLUSIVE_GROUPS = {
 | 
				
			||||||
    'MBEDTLS_SHA512_C': ['-MBEDTLS_SSL_COOKIE_C',
 | 
					    'MBEDTLS_SHA512_C': ['-MBEDTLS_SSL_COOKIE_C',
 | 
				
			||||||
                         '-MBEDTLS_SSL_TLS_C'],
 | 
					                         '-MBEDTLS_SSL_TLS_C'],
 | 
				
			||||||
    'PSA_WANT_ECC_MONTGOMERY_448': ['-MBEDTLS_ECDSA_C',
 | 
					    'PSA_WANT_ECC_MONTGOMERY_448': ['-PSA_WANT_ALG_ECDSA',
 | 
				
			||||||
                                    '-MBEDTLS_ECDSA_DETERMINISTIC',
 | 
					                                    '-PSA_WANT_ALG_JPAKE',],
 | 
				
			||||||
                                    '-MBEDTLS_ECJPAKE_C',],
 | 
					    'PSA_WANT_ECC_MONTGOMERY_255': ['-PSA_WANT_ALG_ECDSA',
 | 
				
			||||||
    'PSA_WANT_ECC_MONTGOMERY_255': ['-MBEDTLS_ECDSA_C',
 | 
					                                    '-PSA_WANT_ALG_JPAKE'],
 | 
				
			||||||
                                    '-MBEDTLS_ECDSA_DETERMINISTIC',
 | 
					 | 
				
			||||||
                                    '-MBEDTLS_ECJPAKE_C'],
 | 
					 | 
				
			||||||
    'PSA_WANT_KEY_TYPE_ARIA': ['-PSA_WANT_ALG_CMAC',
 | 
					    'PSA_WANT_KEY_TYPE_ARIA': ['-PSA_WANT_ALG_CMAC',
 | 
				
			||||||
                               '-PSA_WANT_ALG_CCM',
 | 
					                               '-PSA_WANT_ALG_CCM',
 | 
				
			||||||
                               '-PSA_WANT_ALG_GCM',
 | 
					                               '-PSA_WANT_ALG_GCM',
 | 
				
			||||||
@@ -559,11 +559,12 @@ class DomainData:
 | 
				
			|||||||
                                          '|MBEDTLS_SHA3_'),
 | 
					                                          '|MBEDTLS_SHA3_'),
 | 
				
			||||||
            # Key exchange types.
 | 
					            # Key exchange types.
 | 
				
			||||||
            'kex': ExclusiveDomain(key_exchange_symbols, build_and_test),
 | 
					            'kex': ExclusiveDomain(key_exchange_symbols, build_and_test),
 | 
				
			||||||
            'pkalgs': ComplementaryDomain(['MBEDTLS_ECDSA_C',
 | 
					
 | 
				
			||||||
                                           'MBEDTLS_ECP_C',
 | 
					            'pkalgs': ComplementaryDomain(['PSA_WANT_ALG_ECDSA',
 | 
				
			||||||
                                           'MBEDTLS_PKCS1_V21',
 | 
					                                           'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC',
 | 
				
			||||||
                                           'MBEDTLS_PKCS1_V15',
 | 
					                                           'PSA_WANT_ALG_RSA_OAEP',
 | 
				
			||||||
                                           'MBEDTLS_RSA_C',
 | 
					                                           'PSA_WANT_ALG_RSA_PKCS1V15_CRYPT',
 | 
				
			||||||
 | 
					                                           'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC',
 | 
				
			||||||
                                           'MBEDTLS_X509_RSASSA_PSS_SUPPORT'],
 | 
					                                           'MBEDTLS_X509_RSASSA_PSS_SUPPORT'],
 | 
				
			||||||
                                          build_and_test),
 | 
					                                          build_and_test),
 | 
				
			||||||
        }
 | 
					        }
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										120
									
								
								tests/ssl-opt.sh
									
									
									
									
									
								
							
							
						
						
									
										120
									
								
								tests/ssl-opt.sh
									
									
									
									
									
								
							@@ -9412,10 +9412,10 @@ run_test    "EC restart: TLS, default" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1" \
 | 
					             debug_level=1" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_verify.*4b00" \
 | 
					            -C "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
					requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
				
			||||||
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
 | 
					requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
 | 
				
			||||||
@@ -9425,10 +9425,10 @@ run_test    "EC restart: TLS, max_ops=0" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=0" \
 | 
					             debug_level=1 ec_max_ops=0" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_verify.*4b00" \
 | 
					            -C "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
					requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
				
			||||||
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
 | 
					requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
 | 
				
			||||||
@@ -9438,10 +9438,10 @@ run_test    "EC restart: TLS, max_ops=65535" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=65535" \
 | 
					             debug_level=1 ec_max_ops=65535" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_verify.*4b00" \
 | 
					            -C "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# The following test cases for restartable ECDH come in two variants:
 | 
					# The following test cases for restartable ECDH come in two variants:
 | 
				
			||||||
# * The "(USE_PSA)" variant expects the current behavior, which is the behavior
 | 
					# * The "(USE_PSA)" variant expects the current behavior, which is the behavior
 | 
				
			||||||
@@ -9466,10 +9466,10 @@ run_test    "EC restart: TLS, max_ops=1000 (no USE_PSA)" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -c "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00"
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
					# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
				
			||||||
# everything except ECDH (where TLS calls PSA directly).
 | 
					# everything except ECDH (where TLS calls PSA directly).
 | 
				
			||||||
@@ -9481,10 +9481,10 @@ run_test    "EC restart: TLS, max_ops=1000 (USE_PSA)" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00"
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# This works the same with & without USE_PSA as we never get to ECDH:
 | 
					# This works the same with & without USE_PSA as we never get to ECDH:
 | 
				
			||||||
# we abort as soon as we determined the cert is bad.
 | 
					# we abort as soon as we determined the cert is bad.
 | 
				
			||||||
@@ -9498,10 +9498,10 @@ run_test    "EC restart: TLS, max_ops=1000, badsign" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            1 \
 | 
					            1 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_verify.*4b00" \
 | 
					            -C "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00" \
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
					            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
				
			||||||
            -c "! mbedtls_ssl_handshake returned" \
 | 
					            -c "! mbedtls_ssl_handshake returned" \
 | 
				
			||||||
            -c "X509 - Certificate verification failed"
 | 
					            -c "X509 - Certificate verification failed"
 | 
				
			||||||
@@ -9518,10 +9518,10 @@ run_test    "EC restart: TLS, max_ops=1000, auth_mode=optional badsign (no USE_P
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000 auth_mode=optional" \
 | 
					             debug_level=1 ec_max_ops=1000 auth_mode=optional" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -c "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00" \
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
					            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
				
			||||||
            -C "! mbedtls_ssl_handshake returned" \
 | 
					            -C "! mbedtls_ssl_handshake returned" \
 | 
				
			||||||
            -C "X509 - Certificate verification failed"
 | 
					            -C "X509 - Certificate verification failed"
 | 
				
			||||||
@@ -9538,10 +9538,10 @@ run_test    "EC restart: TLS, max_ops=1000, auth_mode=optional badsign (USE_PSA)
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000 auth_mode=optional" \
 | 
					             debug_level=1 ec_max_ops=1000 auth_mode=optional" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00" \
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
					            -c "! The certificate is not correctly signed by the trusted CA" \
 | 
				
			||||||
            -C "! mbedtls_ssl_handshake returned" \
 | 
					            -C "! mbedtls_ssl_handshake returned" \
 | 
				
			||||||
            -C "X509 - Certificate verification failed"
 | 
					            -C "X509 - Certificate verification failed"
 | 
				
			||||||
@@ -9558,10 +9558,10 @@ run_test    "EC restart: TLS, max_ops=1000, auth_mode=none badsign (no USE_PSA)"
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000 auth_mode=none" \
 | 
					             debug_level=1 ec_max_ops=1000 auth_mode=none" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -c "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00" \
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "! The certificate is not correctly signed by the trusted CA" \
 | 
					            -C "! The certificate is not correctly signed by the trusted CA" \
 | 
				
			||||||
            -C "! mbedtls_ssl_handshake returned" \
 | 
					            -C "! mbedtls_ssl_handshake returned" \
 | 
				
			||||||
            -C "X509 - Certificate verification failed"
 | 
					            -C "X509 - Certificate verification failed"
 | 
				
			||||||
@@ -9578,10 +9578,10 @@ run_test    "EC restart: TLS, max_ops=1000, auth_mode=none badsign (USE_PSA)" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000 auth_mode=none" \
 | 
					             debug_level=1 ec_max_ops=1000 auth_mode=none" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00" \
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "! The certificate is not correctly signed by the trusted CA" \
 | 
					            -C "! The certificate is not correctly signed by the trusted CA" \
 | 
				
			||||||
            -C "! mbedtls_ssl_handshake returned" \
 | 
					            -C "! mbedtls_ssl_handshake returned" \
 | 
				
			||||||
            -C "X509 - Certificate verification failed"
 | 
					            -C "X509 - Certificate verification failed"
 | 
				
			||||||
@@ -9596,10 +9596,10 @@ run_test    "EC restart: DTLS, max_ops=1000 (no USE_PSA)" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             dtls=1 debug_level=1 ec_max_ops=1000" \
 | 
					             dtls=1 debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -c "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00"
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
					# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
				
			||||||
# everything except ECDH (where TLS calls PSA directly).
 | 
					# everything except ECDH (where TLS calls PSA directly).
 | 
				
			||||||
@@ -9611,10 +9611,10 @@ run_test    "EC restart: DTLS, max_ops=1000 (USE_PSA)" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             dtls=1 debug_level=1 ec_max_ops=1000" \
 | 
					             dtls=1 debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_sign.*4b00"
 | 
					            -c "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# With USE_PSA disabled we expect full restartable behaviour.
 | 
					# With USE_PSA disabled we expect full restartable behaviour.
 | 
				
			||||||
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
					requires_config_enabled MBEDTLS_ECP_RESTARTABLE
 | 
				
			||||||
@@ -9625,10 +9625,10 @@ run_test    "EC restart: TLS, max_ops=1000 no client auth (no USE_PSA)" \
 | 
				
			|||||||
            "$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
 | 
					            "$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -c "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
					# With USE_PSA enabled we expect only partial restartable behaviour:
 | 
				
			||||||
@@ -9640,10 +9640,10 @@ run_test    "EC restart: TLS, max_ops=1000 no client auth (USE_PSA)" \
 | 
				
			|||||||
            "$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
 | 
					            "$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -c "x509_verify_cert.*4b00" \
 | 
					            -c "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -c "mbedtls_pk_verify.*4b00" \
 | 
					            -c "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Restartable is only for ECDHE-ECDSA, with another ciphersuite we expect no
 | 
					# Restartable is only for ECDHE-ECDSA, with another ciphersuite we expect no
 | 
				
			||||||
# restartable behaviour at all (not even client auth).
 | 
					# restartable behaviour at all (not even client auth).
 | 
				
			||||||
@@ -9657,10 +9657,10 @@ run_test    "EC restart: TLS, max_ops=1000, ECDHE-RSA" \
 | 
				
			|||||||
             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
					             key_file=$DATA_FILES_PATH/server5.key crt_file=$DATA_FILES_PATH/server5.crt  \
 | 
				
			||||||
             debug_level=1 ec_max_ops=1000" \
 | 
					             debug_level=1 ec_max_ops=1000" \
 | 
				
			||||||
            0 \
 | 
					            0 \
 | 
				
			||||||
            -C "x509_verify_cert.*4b00" \
 | 
					            -C "x509_verify_cert.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_verify.*4b00" \
 | 
					            -C "mbedtls_pk_verify.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_ecdh_make_public.*4b00" \
 | 
					            -C "mbedtls_ecdh_make_public.*\(4b00\|-248\)" \
 | 
				
			||||||
            -C "mbedtls_pk_sign.*4b00"
 | 
					            -C "mbedtls_pk_sign.*\(4b00\|-248\)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Tests of asynchronous private key support in SSL
 | 
					# Tests of asynchronous private key support in SSL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										146
									
								
								tests/suites/test_suite_x509_oid.data
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										146
									
								
								tests/suites/test_suite_x509_oid.data
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,146 @@
 | 
				
			|||||||
 | 
					OID get Any Policy certificate policy
 | 
				
			||||||
 | 
					oid_get_certificate_policies:"551D2000":"Any Policy"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get certificate policy invalid oid
 | 
				
			||||||
 | 
					oid_get_certificate_policies:"5533445566":""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get certificate policy wrong oid - id-ce-authorityKeyIdentifier
 | 
				
			||||||
 | 
					oid_get_certificate_policies:"551D23":""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-serverAuth
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070301":"TLS Web Server Authentication"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-clientAuth
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070302":"TLS Web Client Authentication"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-codeSigning
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070303":"Code Signing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-emailProtection
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070304":"E-mail Protection"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-timeStamping
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070308":"Time Stamping"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-OCSPSigning
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B06010505070309":"OCSP Signing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage - id-kp-wisun-fan-device
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"2B0601040182E42501":"Wi-SUN Alliance Field Area Network (FAN)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage invalid oid
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"5533445566":""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier
 | 
				
			||||||
 | 
					oid_get_extended_key_usage:"551D23":""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-ce-basicConstraints
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D13":MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-ce-keyUsage
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D0F":MBEDTLS_OID_X509_EXT_KEY_USAGE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-ce-extKeyUsage
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D25":MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-ce-subjectAltName
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D11":MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-netscape-certtype
 | 
				
			||||||
 | 
					oid_get_x509_extension:"6086480186F8420101":MBEDTLS_OID_X509_EXT_NS_CERT_TYPE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - id-ce-certificatePolicies
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D20":MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - invalid oid
 | 
				
			||||||
 | 
					oid_get_x509_extension:"5533445566":0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID get x509 extension - wrong oid - id-ce
 | 
				
			||||||
 | 
					oid_get_x509_extension:"551D":0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-md5
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_MD5
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"2A864886f70d0205":MBEDTLS_MD_MD5
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha1
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_1
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"2b0e03021a":MBEDTLS_MD_SHA1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha224
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_224
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040204":MBEDTLS_MD_SHA224
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha256
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_256
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040201":MBEDTLS_MD_SHA256
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha384
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_384
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040202":MBEDTLS_MD_SHA384
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha512
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_512
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040203":MBEDTLS_MD_SHA512
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha3-224
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_224
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040207":MBEDTLS_MD_SHA3_224
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha3-256
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_256
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040208":MBEDTLS_MD_SHA3_256
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha3-384
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_384
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"608648016503040209":MBEDTLS_MD_SHA3_384
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-sha3-512
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_512
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"60864801650304020a":MBEDTLS_MD_SHA3_512
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - id-ripemd160
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_RIPEMD160
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"2b24030201":MBEDTLS_MD_RIPEMD160
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OID hash id - invalid oid
 | 
				
			||||||
 | 
					oid_get_md_alg_id:"2B864886f70d0204":-1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - RIPEMD160
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_RIPEMD160
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2B06010505080104":MBEDTLS_MD_RIPEMD160
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA1
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_1
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2A864886F70D0207":MBEDTLS_MD_SHA1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA224
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_224
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2A864886F70D0208":MBEDTLS_MD_SHA224
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA256
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_256
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2A864886F70D0209":MBEDTLS_MD_SHA256
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA384
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_384
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2A864886F70D020A":MBEDTLS_MD_SHA384
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA512
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA_512
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"2A864886F70D020B":MBEDTLS_MD_SHA512
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA3_224
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_224
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"60864801650304020D":MBEDTLS_MD_SHA3_224
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA3_256
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_256
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"60864801650304020E":MBEDTLS_MD_SHA3_256
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA3_384
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_384
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"60864801650304020F":MBEDTLS_MD_SHA3_384
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac - SHA3_512
 | 
				
			||||||
 | 
					depends_on:PSA_WANT_ALG_SHA3_512
 | 
				
			||||||
 | 
					mbedtls_oid_get_md_hmac:"608648016503040210":MBEDTLS_MD_SHA3_512
 | 
				
			||||||
							
								
								
									
										120
									
								
								tests/suites/test_suite_x509_oid.function
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										120
									
								
								tests/suites/test_suite_x509_oid.function
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,120 @@
 | 
				
			|||||||
 | 
					/* BEGIN_HEADER */
 | 
				
			||||||
 | 
					#include "mbedtls/oid.h"
 | 
				
			||||||
 | 
					#include "mbedtls/asn1.h"
 | 
				
			||||||
 | 
					#include "mbedtls/asn1write.h"
 | 
				
			||||||
 | 
					#include "string.h"
 | 
				
			||||||
 | 
					/* END_HEADER */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_DEPENDENCIES
 | 
				
			||||||
 | 
					 * depends_on:MBEDTLS_OID_C:!MBEDTLS_X509_REMOVE_INFO
 | 
				
			||||||
 | 
					 * END_DEPENDENCIES
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_CASE */
 | 
				
			||||||
 | 
					void oid_get_certificate_policies(data_t *oid, char *result_str)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    mbedtls_asn1_buf asn1_buf = { 0, 0, NULL };
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    const char *desc;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    asn1_buf.tag = MBEDTLS_ASN1_OID;
 | 
				
			||||||
 | 
					    asn1_buf.p = oid->x;
 | 
				
			||||||
 | 
					    asn1_buf.len = oid->len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ret = mbedtls_oid_get_certificate_policies(&asn1_buf, &desc);
 | 
				
			||||||
 | 
					    if (strlen(result_str) == 0) {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == MBEDTLS_ERR_OID_NOT_FOUND);
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == 0);
 | 
				
			||||||
 | 
					        TEST_ASSERT(strcmp((char *) desc, result_str) == 0);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					/* END_CASE */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_CASE */
 | 
				
			||||||
 | 
					void oid_get_extended_key_usage(data_t *oid, char *result_str)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    mbedtls_asn1_buf asn1_buf = { 0, 0, NULL };
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    const char *desc;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    asn1_buf.tag = MBEDTLS_ASN1_OID;
 | 
				
			||||||
 | 
					    asn1_buf.p = oid->x;
 | 
				
			||||||
 | 
					    asn1_buf.len = oid->len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ret = mbedtls_oid_get_extended_key_usage(&asn1_buf, &desc);
 | 
				
			||||||
 | 
					    if (strlen(result_str) == 0) {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == MBEDTLS_ERR_OID_NOT_FOUND);
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == 0);
 | 
				
			||||||
 | 
					        TEST_ASSERT(strcmp((char *) desc, result_str) == 0);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					/* END_CASE */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_CASE */
 | 
				
			||||||
 | 
					void oid_get_x509_extension(data_t *oid, int exp_type)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    mbedtls_asn1_buf ext_oid = { 0, 0, NULL };
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    int ext_type;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ext_oid.tag = MBEDTLS_ASN1_OID;
 | 
				
			||||||
 | 
					    ext_oid.p = oid->x;
 | 
				
			||||||
 | 
					    ext_oid.len = oid->len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ret = mbedtls_oid_get_x509_ext_type(&ext_oid, &ext_type);
 | 
				
			||||||
 | 
					    if (exp_type == 0) {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == MBEDTLS_ERR_OID_NOT_FOUND);
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == 0);
 | 
				
			||||||
 | 
					        TEST_ASSERT(ext_type == exp_type);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					/* END_CASE */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_CASE */
 | 
				
			||||||
 | 
					void oid_get_md_alg_id(data_t *oid, int exp_md_id)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    mbedtls_asn1_buf md_oid = { 0, 0, NULL };
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t md_id = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    md_oid.tag = MBEDTLS_ASN1_OID;
 | 
				
			||||||
 | 
					    md_oid.p = oid->x;
 | 
				
			||||||
 | 
					    md_oid.len = oid->len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ret = mbedtls_oid_get_md_alg(&md_oid, &md_id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if (exp_md_id < 0) {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == MBEDTLS_ERR_OID_NOT_FOUND);
 | 
				
			||||||
 | 
					        TEST_ASSERT(md_id == 0);
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == 0);
 | 
				
			||||||
 | 
					        TEST_ASSERT((mbedtls_md_type_t) exp_md_id == md_id);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					/* END_CASE */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* BEGIN_CASE */
 | 
				
			||||||
 | 
					void mbedtls_oid_get_md_hmac(data_t *oid, int exp_md_id)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					    mbedtls_asn1_buf md_oid = { 0, 0, NULL };
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    mbedtls_md_type_t md_id = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    md_oid.tag = MBEDTLS_ASN1_OID;
 | 
				
			||||||
 | 
					    md_oid.p = oid->x;
 | 
				
			||||||
 | 
					    md_oid.len = oid->len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ret = mbedtls_oid_get_md_hmac(&md_oid, &md_id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if (exp_md_id < 0) {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == MBEDTLS_ERR_OID_NOT_FOUND);
 | 
				
			||||||
 | 
					        TEST_ASSERT(md_id == 0);
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
 | 
					        TEST_ASSERT(ret == 0);
 | 
				
			||||||
 | 
					        TEST_ASSERT((mbedtls_md_type_t) exp_md_id == md_id);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					/* END_CASE */
 | 
				
			||||||
@@ -679,6 +679,7 @@ void x509_verify_restart(char *crt_file, char *ca_file,
 | 
				
			|||||||
    TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
 | 
					    TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
 | 
				
			||||||
    TEST_EQUAL(mbedtls_x509_crt_parse_file(&ca, ca_file), 0);
 | 
					    TEST_EQUAL(mbedtls_x509_crt_parse_file(&ca, ca_file), 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    psa_interruptible_set_max_ops(max_ops);
 | 
				
			||||||
    mbedtls_ecp_set_max_ops(max_ops);
 | 
					    mbedtls_ecp_set_max_ops(max_ops);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    cnt_restart = 0;
 | 
					    cnt_restart = 0;
 | 
				
			||||||
 
 | 
				
			|||||||
 Submodule tf-psa-crypto updated: 5ab6c9c8d6...35ae18cf89
									
								
							
		Reference in New Issue
	
	Block a user