mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-06 17:16:12 +00:00
cc9a75cd14
SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN = id-alg-ESDH SEC_OID_CMS_3DES_KEY_WRAP = id-alg-CMS3DESwrap SEC_OID_CMS_RC2_KEY_WRAP = id-alg-CMSRC2wrap
1524 lines
60 KiB
C
1524 lines
60 KiB
C
/*
|
|
* The contents of this file are subject to the Mozilla Public
|
|
* License Version 1.1 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS
|
|
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
* implied. See the License for the specific language governing
|
|
* rights and limitations under the License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is Netscape
|
|
* Communications Corporation. Portions created by Netscape are
|
|
* Copyright (C) 1994-2000 Netscape Communications Corporation. All
|
|
* Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the
|
|
* terms of the GNU General Public License Version 2 or later (the
|
|
* "GPL"), in which case the provisions of the GPL are applicable
|
|
* instead of those above. If you wish to allow use of your
|
|
* version of this file only under the terms of the GPL and not to
|
|
* allow others to use your version of this file under the MPL,
|
|
* indicate your decision by deleting the provisions above and
|
|
* replace them with the notice and other provisions required by
|
|
* the GPL. If you do not delete the provisions above, a recipient
|
|
* may use your version of this file under either the MPL or the
|
|
* GPL.
|
|
*/
|
|
|
|
#include "secoid.h"
|
|
#include "mcom_db.h"
|
|
#include "pkcs11t.h"
|
|
#include "secmodt.h"
|
|
#include "secitem.h"
|
|
#include "secerr.h"
|
|
|
|
/* MISSI Mosaic Object ID space */
|
|
#define MISSI 0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01
|
|
#define MISSI_OLD_KEA_DSS MISSI, 0x0c
|
|
#define MISSI_OLD_DSS MISSI, 0x02
|
|
#define MISSI_KEA_DSS MISSI, 0x14
|
|
#define MISSI_DSS MISSI, 0x13
|
|
#define MISSI_KEA MISSI, 0x0a
|
|
#define MISSI_ALT_KEA MISSI, 0x16
|
|
|
|
/**
|
|
** The Netscape OID space is allocated by Terry Hayes. If you need
|
|
** a piece of the space, contact him at thayes@netscape.com.
|
|
**/
|
|
|
|
/* Netscape Communications Corporation Object ID space */
|
|
/* { 2 16 840 1 113730 } */
|
|
#define NETSCAPE_OID 0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42
|
|
/* netscape certificate extensions */
|
|
#define NETSCAPE_CERT_EXT NETSCAPE_OID, 0x01
|
|
|
|
/* netscape data types */
|
|
#define NETSCAPE_DATA_TYPE NETSCAPE_OID, 0x02
|
|
|
|
/* netscape directory oid - owned by Tim Howes(howes@netscape.com) */
|
|
#define NETSCAPE_DIRECTORY NETSCAPE_OID, 0x03
|
|
|
|
/* various policy type OIDs */
|
|
#define NETSCAPE_POLICY NETSCAPE_OID, 0x04
|
|
|
|
/* netscape cert server oid */
|
|
#define NETSCAPE_CERT_SERVER NETSCAPE_OID, 0x05
|
|
#define NETSCAPE_CERT_SERVER_CRMF NETSCAPE_CERT_SERVER, 0x01
|
|
|
|
/* various algorithm OIDs */
|
|
#define NETSCAPE_ALGS NETSCAPE_OID, 0x06
|
|
|
|
/* Netscape Other Name Types */
|
|
|
|
#define NETSCAPE_NAME_COMPONENTS NETSCAPE_OID, 0x07
|
|
|
|
/* these are old and should go away soon */
|
|
#define OLD_NETSCAPE 0x60, 0x86, 0x48, 0xd8, 0x6a
|
|
#define NS_CERT_EXT OLD_NETSCAPE, 0x01
|
|
#define NS_FILE_TYPE OLD_NETSCAPE, 0x02
|
|
#define NS_IMAGE_TYPE OLD_NETSCAPE, 0x03
|
|
|
|
/* RSA OID name space */
|
|
#define RSADSI 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d
|
|
#define PKCS RSADSI, 0x01
|
|
#define DIGEST RSADSI, 0x02
|
|
#define CIPHER RSADSI, 0x03
|
|
#define PKCS1 PKCS, 0x01
|
|
#define PKCS5 PKCS, 0x05
|
|
#define PKCS7 PKCS, 0x07
|
|
#define PKCS9 PKCS, 0x09
|
|
#define PKCS12 PKCS, 0x0c
|
|
|
|
/* Fortezza algorithm OID space: { 2 16 840 1 101 2 1 1 } */
|
|
/* ### mwelch -- Is this just for algorithms, or all of Fortezza? */
|
|
#define FORTEZZA_ALG 0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01
|
|
|
|
/* Other OID name spaces */
|
|
#define ALGORITHM 0x2b, 0x0e, 0x03, 0x02
|
|
#define X500 0x55
|
|
#define X520_ATTRIBUTE_TYPE X500, 0x04
|
|
#define X500_ALG X500, 0x08
|
|
#define X500_ALG_ENCRYPTION X500_ALG, 0x01
|
|
|
|
/** X.509 v3 Extension OID
|
|
** {joint-iso-ccitt (2) ds(5) 29}
|
|
**/
|
|
#define ID_CE_OID X500, 0x1d
|
|
|
|
#define RFC1274_ATTR_TYPE 0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1
|
|
#define RFC2247_ATTR_TYPE 0x09, 0x92, 0x26, 0xf5, 0x98, 0x1e, 0x64, 0x1
|
|
|
|
/* PKCS #12 name spaces */
|
|
#define PKCS12_MODE_IDS PKCS12, 0x01
|
|
#define PKCS12_ESPVK_IDS PKCS12, 0x02
|
|
#define PKCS12_BAG_IDS PKCS12, 0x03
|
|
#define PKCS12_CERT_BAG_IDS PKCS12, 0x04
|
|
#define PKCS12_OIDS PKCS12, 0x05
|
|
#define PKCS12_PBE_IDS PKCS12_OIDS, 0x01
|
|
#define PKCS12_ENVELOPING_IDS PKCS12_OIDS, 0x02
|
|
#define PKCS12_SIGNATURE_IDS PKCS12_OIDS, 0x03
|
|
#define PKCS12_V2_PBE_IDS PKCS12, 0x01
|
|
#define PKCS9_CERT_TYPES PKCS9, 0x16
|
|
#define PKCS9_CRL_TYPES PKCS9, 0x17
|
|
#define PKCS9_SMIME_IDS PKCS9, 0x10
|
|
#define PKCS9_SMIME_ALGS PKCS9_SMIME_IDS, 3
|
|
#define PKCS12_VERSION1 PKCS12, 0x0a
|
|
#define PKCS12_V1_BAG_IDS PKCS12_VERSION1, 1
|
|
|
|
/* for DSA algorithm */
|
|
/* { iso(1) member-body(2) us(840) x9-57(10040) x9algorithm(4) } */
|
|
#define ANSI_X9_ALGORITHM 0x2a, 0x86, 0x48, 0xce, 0x38, 0x4
|
|
|
|
/* for DH algorithm */
|
|
/* { iso(1) member-body(2) us(840) x9-57(10046) number-type(2) } */
|
|
/* need real OID person to look at this, copied the above line
|
|
* and added 6 to second to last value (and changed '4' to '2' */
|
|
#define ANSI_X942_ALGORITHM 0x2a, 0x86, 0x48, 0xce, 0x3e, 0x2
|
|
|
|
#define VERISIGN 0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x45
|
|
|
|
#define PKIX 0x2b, 0x06, 0x01, 0x05, 0x05, 0x07
|
|
#define PKIX_CERT_EXTENSIONS PKIX, 1
|
|
#define PKIX_POLICY_QUALIFIERS PKIX, 2
|
|
#define PKIX_KEY_USAGE PKIX, 3
|
|
#define PKIX_ACCESS_DESCRIPTION PKIX, 0x30
|
|
#define PKIX_OCSP PKIX_ACCESS_DESCRIPTION, 1
|
|
|
|
#define PKIX_ID_PKIP PKIX, 5
|
|
#define PKIX_ID_REGCTRL PKIX_ID_PKIP, 1
|
|
#define PKIX_ID_REGINFO PKIX_ID_PKIP, 2
|
|
|
|
|
|
static unsigned char md2[] = { DIGEST, 0x02 };
|
|
static unsigned char md4[] = { DIGEST, 0x04 };
|
|
static unsigned char md5[] = { DIGEST, 0x05 };
|
|
static unsigned char sha1[] = { ALGORITHM, 0x1a };
|
|
static unsigned char rc2cbc[] = { CIPHER, 0x02 };
|
|
static unsigned char rc4[] = { CIPHER, 0x04 };
|
|
static unsigned char desede3cbc[] = { CIPHER, 0x07 };
|
|
static unsigned char rc5cbcpad[] = { CIPHER, 0x09 };
|
|
static unsigned char desecb[] = { ALGORITHM, 0x06 };
|
|
static unsigned char descbc[] = { ALGORITHM, 0x07 };
|
|
static unsigned char desofb[] = { ALGORITHM, 0x08 };
|
|
static unsigned char descfb[] = { ALGORITHM, 0x09 };
|
|
static unsigned char desmac[] = { ALGORITHM, 0x0a };
|
|
static unsigned char desede[] = { ALGORITHM, 0x11 };
|
|
static unsigned char isoSHAWithRSASignature[] = { ALGORITHM, 0xf };
|
|
static unsigned char pkcs1RSAEncryption[] = { PKCS1, 0x01 };
|
|
static unsigned char pkcs1MD2WithRSAEncryption[] = { PKCS1, 0x02 };
|
|
static unsigned char pkcs1MD4WithRSAEncryption[] = { PKCS1, 0x03 };
|
|
static unsigned char pkcs1MD5WithRSAEncryption[] = { PKCS1, 0x04 };
|
|
static unsigned char pkcs1SHA1WithRSAEncryption[] = { PKCS1, 0x05 };
|
|
static unsigned char pkcs5PbeWithMD2AndDEScbc[] = { PKCS5, 0x01 };
|
|
static unsigned char pkcs5PbeWithMD5AndDEScbc[] = { PKCS5, 0x03 };
|
|
static unsigned char pkcs5PbeWithSha1AndDEScbc[] = { PKCS5, 0x0a };
|
|
static unsigned char pkcs7[] = { PKCS7 };
|
|
static unsigned char pkcs7Data[] = { PKCS7, 0x01 };
|
|
static unsigned char pkcs7SignedData[] = { PKCS7, 0x02 };
|
|
static unsigned char pkcs7EnvelopedData[] = { PKCS7, 0x03 };
|
|
static unsigned char pkcs7SignedEnvelopedData[] = { PKCS7, 0x04 };
|
|
static unsigned char pkcs7DigestedData[] = { PKCS7, 0x05 };
|
|
static unsigned char pkcs7EncryptedData[] = { PKCS7, 0x06 };
|
|
static unsigned char pkcs9EmailAddress[] = { PKCS9, 0x01 };
|
|
static unsigned char pkcs9UnstructuredName[] = { PKCS9, 0x02 };
|
|
static unsigned char pkcs9ContentType[] = { PKCS9, 0x03 };
|
|
static unsigned char pkcs9MessageDigest[] = { PKCS9, 0x04 };
|
|
static unsigned char pkcs9SigningTime[] = { PKCS9, 0x05 };
|
|
static unsigned char pkcs9CounterSignature[] = { PKCS9, 0x06 };
|
|
static unsigned char pkcs9ChallengePassword[] = { PKCS9, 0x07 };
|
|
static unsigned char pkcs9UnstructuredAddress[] = { PKCS9, 0x08 };
|
|
static unsigned char pkcs9ExtendedCertificateAttributes[] = { PKCS9, 0x09 };
|
|
static unsigned char pkcs9SMIMECapabilities[] = { PKCS9, 15 };
|
|
static unsigned char x520CommonName[] = { X520_ATTRIBUTE_TYPE, 3 };
|
|
static unsigned char x520CountryName[] = { X520_ATTRIBUTE_TYPE, 6 };
|
|
static unsigned char x520LocalityName[] = { X520_ATTRIBUTE_TYPE, 7 };
|
|
static unsigned char x520StateOrProvinceName[] = { X520_ATTRIBUTE_TYPE, 8 };
|
|
static unsigned char x520OrgName[] = { X520_ATTRIBUTE_TYPE, 10 };
|
|
static unsigned char x520OrgUnitName[] = { X520_ATTRIBUTE_TYPE, 11 };
|
|
static unsigned char x520DnQualifier[] = { X520_ATTRIBUTE_TYPE, 46 };
|
|
|
|
static unsigned char nsTypeGIF[] = { NETSCAPE_DATA_TYPE, 0x01 };
|
|
static unsigned char nsTypeJPEG[] = { NETSCAPE_DATA_TYPE, 0x02 };
|
|
static unsigned char nsTypeURL[] = { NETSCAPE_DATA_TYPE, 0x03 };
|
|
static unsigned char nsTypeHTML[] = { NETSCAPE_DATA_TYPE, 0x04 };
|
|
static unsigned char nsTypeCertSeq[] = { NETSCAPE_DATA_TYPE, 0x05 };
|
|
static unsigned char missiCertKEADSSOld[] = { MISSI_OLD_KEA_DSS };
|
|
static unsigned char missiCertDSSOld[] = { MISSI_OLD_DSS };
|
|
static unsigned char missiCertKEADSS[] = { MISSI_KEA_DSS };
|
|
static unsigned char missiCertDSS[] = { MISSI_DSS };
|
|
static unsigned char missiCertKEA[] = { MISSI_KEA };
|
|
static unsigned char missiCertAltKEA[] = { MISSI_ALT_KEA };
|
|
static unsigned char x500RSAEncryption[] = { X500_ALG_ENCRYPTION, 0x01 };
|
|
|
|
/* added for alg 1485 */
|
|
static unsigned char rfc1274Uid[] = { RFC1274_ATTR_TYPE, 1 };
|
|
static unsigned char rfc1274Mail[] = { RFC1274_ATTR_TYPE, 3 };
|
|
static unsigned char rfc2247DomainComponent[] = { RFC2247_ATTR_TYPE, 25 };
|
|
|
|
/* Netscape private certificate extensions */
|
|
static unsigned char nsCertExtNetscapeOK[] = { NS_CERT_EXT, 1 };
|
|
static unsigned char nsCertExtIssuerLogo[] = { NS_CERT_EXT, 2 };
|
|
static unsigned char nsCertExtSubjectLogo[] = { NS_CERT_EXT, 3 };
|
|
static unsigned char nsExtCertType[] = { NETSCAPE_CERT_EXT, 0x01 };
|
|
static unsigned char nsExtBaseURL[] = { NETSCAPE_CERT_EXT, 0x02 };
|
|
static unsigned char nsExtRevocationURL[] = { NETSCAPE_CERT_EXT, 0x03 };
|
|
static unsigned char nsExtCARevocationURL[] = { NETSCAPE_CERT_EXT, 0x04 };
|
|
static unsigned char nsExtCACRLURL[] = { NETSCAPE_CERT_EXT, 0x05 };
|
|
static unsigned char nsExtCACertURL[] = { NETSCAPE_CERT_EXT, 0x06 };
|
|
static unsigned char nsExtCertRenewalURL[] = { NETSCAPE_CERT_EXT, 0x07 };
|
|
static unsigned char nsExtCAPolicyURL[] = { NETSCAPE_CERT_EXT, 0x08 };
|
|
static unsigned char nsExtHomepageURL[] = { NETSCAPE_CERT_EXT, 0x09 };
|
|
static unsigned char nsExtEntityLogo[] = { NETSCAPE_CERT_EXT, 0x0a };
|
|
static unsigned char nsExtUserPicture[] = { NETSCAPE_CERT_EXT, 0x0b };
|
|
static unsigned char nsExtSSLServerName[] = { NETSCAPE_CERT_EXT, 0x0c };
|
|
static unsigned char nsExtComment[] = { NETSCAPE_CERT_EXT, 0x0d };
|
|
|
|
/* the following 2 extensions are defined for and used by Cartman(NSM) */
|
|
static unsigned char nsExtLostPasswordURL[] = { NETSCAPE_CERT_EXT, 0x0e };
|
|
static unsigned char nsExtCertRenewalTime[] = { NETSCAPE_CERT_EXT, 0x0f };
|
|
|
|
#define NETSCAPE_CERT_EXT_AIA NETSCAPE_CERT_EXT, 0x10
|
|
|
|
static unsigned char nsExtAIACertRenewal[] = { NETSCAPE_CERT_EXT_AIA, 0x01 };
|
|
|
|
static unsigned char nsExtCertScopeOfUse[] = { NETSCAPE_CERT_EXT, 0x11 };
|
|
|
|
static unsigned char nsKeyUsageGovtApproved[] = { NETSCAPE_POLICY, 0x01 };
|
|
|
|
|
|
/* Standard x.509 v3 Certificate Extensions */
|
|
static unsigned char x509SubjectDirectoryAttr[] = { ID_CE_OID, 9 };
|
|
static unsigned char x509SubjectKeyID[] = { ID_CE_OID, 14 };
|
|
static unsigned char x509KeyUsage[] = { ID_CE_OID, 15 };
|
|
static unsigned char x509PrivateKeyUsagePeriod[] = { ID_CE_OID, 16 };
|
|
static unsigned char x509SubjectAltName[] = { ID_CE_OID, 17 };
|
|
static unsigned char x509IssuerAltName[] = { ID_CE_OID, 18 };
|
|
static unsigned char x509BasicConstraints[] = { ID_CE_OID, 19 };
|
|
static unsigned char x509NameConstraints[] = { ID_CE_OID, 30 };
|
|
static unsigned char x509CRLDistPoints[] = { ID_CE_OID, 31 };
|
|
static unsigned char x509CertificatePolicies[] = { ID_CE_OID, 32 };
|
|
static unsigned char x509PolicyMappings[] = { ID_CE_OID, 33 };
|
|
static unsigned char x509PolicyConstraints[] = { ID_CE_OID, 34 };
|
|
static unsigned char x509AuthKeyID[] = { ID_CE_OID, 35};
|
|
static unsigned char x509ExtKeyUsage[] = { ID_CE_OID, 37};
|
|
static unsigned char x509AuthInfoAccess[] = { PKIX_CERT_EXTENSIONS, 1 };
|
|
|
|
/* Standard x.509 v3 CRL Extensions */
|
|
static unsigned char x509CrlNumber[] = { ID_CE_OID, 20};
|
|
static unsigned char x509ReasonCode[] = { ID_CE_OID, 21};
|
|
static unsigned char x509InvalidDate[] = { ID_CE_OID, 24};
|
|
|
|
/* pkcs 12 additions */
|
|
static unsigned char pkcs12[] = { PKCS12 };
|
|
static unsigned char pkcs12ModeIDs[] = { PKCS12_MODE_IDS };
|
|
static unsigned char pkcs12ESPVKIDs[] = { PKCS12_ESPVK_IDS };
|
|
static unsigned char pkcs12BagIDs[] = { PKCS12_BAG_IDS };
|
|
static unsigned char pkcs12CertBagIDs[] = { PKCS12_CERT_BAG_IDS };
|
|
static unsigned char pkcs12OIDs[] = { PKCS12_OIDS };
|
|
static unsigned char pkcs12PBEIDs[] = { PKCS12_PBE_IDS };
|
|
static unsigned char pkcs12EnvelopingIDs[] = { PKCS12_ENVELOPING_IDS };
|
|
static unsigned char pkcs12SignatureIDs[] = { PKCS12_SIGNATURE_IDS };
|
|
static unsigned char pkcs12PKCS8KeyShrouding[] = { PKCS12_ESPVK_IDS, 0x01 };
|
|
static unsigned char pkcs12KeyBagID[] = { PKCS12_BAG_IDS, 0x01 };
|
|
static unsigned char pkcs12CertAndCRLBagID[] = { PKCS12_BAG_IDS, 0x02 };
|
|
static unsigned char pkcs12SecretBagID[] = { PKCS12_BAG_IDS, 0x03 };
|
|
static unsigned char pkcs12X509CertCRLBag[] = { PKCS12_CERT_BAG_IDS, 0x01 };
|
|
static unsigned char pkcs12SDSICertBag[] = { PKCS12_CERT_BAG_IDS, 0x02 };
|
|
static unsigned char pkcs12PBEWithSha1And128BitRC4[] = { PKCS12_PBE_IDS, 0x01 };
|
|
static unsigned char pkcs12PBEWithSha1And40BitRC4[] = { PKCS12_PBE_IDS, 0x02 };
|
|
static unsigned char pkcs12PBEWithSha1AndTripleDESCBC[] = { PKCS12_PBE_IDS, 0x03 };
|
|
static unsigned char pkcs12PBEWithSha1And128BitRC2CBC[] = { PKCS12_PBE_IDS, 0x04 };
|
|
static unsigned char pkcs12PBEWithSha1And40BitRC2CBC[] = { PKCS12_PBE_IDS, 0x05 };
|
|
static unsigned char pkcs12RSAEncryptionWith128BitRC4[] =
|
|
{ PKCS12_ENVELOPING_IDS, 0x01 };
|
|
static unsigned char pkcs12RSAEncryptionWith40BitRC4[] =
|
|
{ PKCS12_ENVELOPING_IDS, 0x02 };
|
|
static unsigned char pkcs12RSAEncryptionWithTripleDES[] =
|
|
{ PKCS12_ENVELOPING_IDS, 0x03 };
|
|
static unsigned char pkcs12RSASignatureWithSHA1Digest[] =
|
|
{ PKCS12_SIGNATURE_IDS, 0x01 };
|
|
static unsigned char ansix9DSASignature[] = { ANSI_X9_ALGORITHM, 0x01 };
|
|
static unsigned char ansix9DSASignaturewithSHA1Digest[] =
|
|
{ ANSI_X9_ALGORITHM, 0x03 };
|
|
static unsigned char bogusDSASignaturewithSHA1Digest[] =
|
|
{ ALGORITHM, 0x1b };
|
|
|
|
/* verisign OIDs */
|
|
static unsigned char verisignUserNotices[] = { VERISIGN, 1, 7, 1, 1 };
|
|
|
|
/* pkix OIDs */
|
|
static unsigned char pkixCPSPointerQualifier[] = { PKIX_POLICY_QUALIFIERS, 1 };
|
|
static unsigned char pkixUserNoticeQualifier[] = { PKIX_POLICY_QUALIFIERS, 2 };
|
|
|
|
static unsigned char pkixOCSP[] = { PKIX_OCSP };
|
|
static unsigned char pkixOCSPBasicResponse[] = { PKIX_OCSP, 1 };
|
|
static unsigned char pkixOCSPNonce[] = { PKIX_OCSP, 2 };
|
|
static unsigned char pkixOCSPCRL[] = { PKIX_OCSP, 3 };
|
|
static unsigned char pkixOCSPResponse[] = { PKIX_OCSP, 4 };
|
|
static unsigned char pkixOCSPNoCheck[] = { PKIX_OCSP, 5 };
|
|
static unsigned char pkixOCSPArchiveCutoff[] = { PKIX_OCSP, 6 };
|
|
static unsigned char pkixOCSPServiceLocator[] = { PKIX_OCSP, 7 };
|
|
|
|
static unsigned char pkixRegCtrlRegToken[] = { PKIX_ID_REGCTRL, 1};
|
|
static unsigned char pkixRegCtrlAuthenticator[] = { PKIX_ID_REGCTRL, 2};
|
|
static unsigned char pkixRegCtrlPKIPubInfo[] = { PKIX_ID_REGCTRL, 3};
|
|
static unsigned char pkixRegCtrlPKIArchOptions[] = { PKIX_ID_REGCTRL, 4};
|
|
static unsigned char pkixRegCtrlOldCertID[] = { PKIX_ID_REGCTRL, 5};
|
|
static unsigned char pkixRegCtrlProtEncKey[] = { PKIX_ID_REGCTRL, 6};
|
|
static unsigned char pkixRegInfoUTF8Pairs[] = { PKIX_ID_REGINFO, 1};
|
|
static unsigned char pkixRegInfoCertReq[] = { PKIX_ID_REGINFO, 2};
|
|
|
|
static unsigned char pkixExtendedKeyUsageServerAuth[] =
|
|
{ PKIX_KEY_USAGE, 1 };
|
|
static unsigned char pkixExtendedKeyUsageClientAuth[] =
|
|
{ PKIX_KEY_USAGE, 2 };
|
|
static unsigned char pkixExtendedKeyUsageCodeSign[] =
|
|
{ PKIX_KEY_USAGE, 3 };
|
|
static unsigned char pkixExtendedKeyUsageEMailProtect[] =
|
|
{ PKIX_KEY_USAGE, 4 };
|
|
static unsigned char pkixExtendedKeyUsageTimeStamp[] =
|
|
{ PKIX_KEY_USAGE, 8 };
|
|
static unsigned char pkixOCSPResponderExtendedKeyUsage[] =
|
|
{ PKIX_KEY_USAGE, 9 };
|
|
|
|
/* OIDs for Netscape defined algorithms */
|
|
static unsigned char netscapeSMimeKEA[] = { NETSCAPE_ALGS, 0x01 };
|
|
|
|
/* pkcs 12 version 1.0 ids */
|
|
static unsigned char pkcs12V2PBEWithSha1And128BitRC4[] = { PKCS12_V2_PBE_IDS, 0x01 };
|
|
static unsigned char pkcs12V2PBEWithSha1And40BitRC4[] = { PKCS12_V2_PBE_IDS, 0x02 };
|
|
static unsigned char pkcs12V2PBEWithSha1And3KeyTripleDEScbc[] = { PKCS12_V2_PBE_IDS, 0x03 };
|
|
static unsigned char pkcs12V2PBEWithSha1And2KeyTripleDEScbc[] = { PKCS12_V2_PBE_IDS, 0x04 };
|
|
static unsigned char pkcs12V2PBEWithSha1And128BitRC2cbc[] = { PKCS12_V2_PBE_IDS, 0x05 };
|
|
static unsigned char pkcs12V2PBEWithSha1And40BitRC2cbc[] = { PKCS12_V2_PBE_IDS, 0x06 };
|
|
|
|
static unsigned char pkcs12SafeContentsID[] = {PKCS12_BAG_IDS, 0x04 };
|
|
static unsigned char pkcs12PKCS8ShroudedKeyBagID[] = { PKCS12_BAG_IDS, 0x05 };
|
|
|
|
static unsigned char pkcs12V1KeyBag[] = { PKCS12_V1_BAG_IDS, 0x01 };
|
|
static unsigned char pkcs12V1PKCS8ShroudedKeyBag[] = { PKCS12_V1_BAG_IDS, 0x02 };
|
|
static unsigned char pkcs12V1CertBag[] = { PKCS12_V1_BAG_IDS, 0x03 };
|
|
static unsigned char pkcs12V1CRLBag[] = { PKCS12_V1_BAG_IDS, 0x04 };
|
|
static unsigned char pkcs12V1SecretBag[] = { PKCS12_V1_BAG_IDS, 0x05 };
|
|
static unsigned char pkcs12V1SafeContentsBag[] = { PKCS12_V1_BAG_IDS, 0x06 };
|
|
|
|
static unsigned char pkcs9X509Certificate[] = { PKCS9_CERT_TYPES, 1 };
|
|
static unsigned char pkcs9SDSICertificate[] = { PKCS9_CERT_TYPES, 2 };
|
|
static unsigned char pkcs9X509CRL[] = { PKCS9_CRL_TYPES, 1 };
|
|
static unsigned char pkcs9FriendlyName[] = { PKCS9, 20 };
|
|
static unsigned char pkcs9LocalKeyID[] = { PKCS9, 21 };
|
|
static unsigned char pkcs12KeyUsageAttr[] = { 2, 5, 29, 15 };
|
|
|
|
/* Fortezza algorithm OIDs */
|
|
static unsigned char skipjackCBC[] = { FORTEZZA_ALG, 0x04 };
|
|
static unsigned char dhPublicKey[] = { ANSI_X942_ALGORITHM, 0x1 };
|
|
|
|
/* Netscape other name types */
|
|
static unsigned char netscapeNickname[] = { NETSCAPE_NAME_COMPONENTS, 0x01};
|
|
|
|
/* OIDs needed for cert server */
|
|
static unsigned char netscapeRecoveryRequest[] =
|
|
{ NETSCAPE_CERT_SERVER_CRMF, 0x01 };
|
|
|
|
/* RFC2630 (CMS) OIDs */
|
|
static unsigned char cmsESDH[] = { PKCS9_SMIME_ALGS, 5 };
|
|
static unsigned char cms3DESwrap[] = { PKCS9_SMIME_ALGS, 6 };
|
|
static unsigned char cmsRC2wrap[] = { PKCS9_SMIME_ALGS, 7 };
|
|
|
|
/*
|
|
* NOTE: the order of these entries must mach the SECOidTag enum in secoidt.h!
|
|
*/
|
|
static SECOidData oids[] = {
|
|
{ { siDEROID, NULL, 0 },
|
|
SEC_OID_UNKNOWN,
|
|
"Unknown OID", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, md2, sizeof(md2) },
|
|
SEC_OID_MD2,
|
|
"MD2", CKM_MD2, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, md4, sizeof(md4) },
|
|
SEC_OID_MD4,
|
|
"MD4", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, md5, sizeof(md5) },
|
|
SEC_OID_MD5,
|
|
"MD5", CKM_MD5, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, sha1, sizeof(sha1) },
|
|
SEC_OID_SHA1,
|
|
"SHA-1", CKM_SHA_1, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, rc2cbc, sizeof(rc2cbc) },
|
|
SEC_OID_RC2_CBC,
|
|
"RC2-CBC", CKM_RC2_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, rc4, sizeof(rc4) },
|
|
SEC_OID_RC4,
|
|
"RC4", CKM_RC4, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, desede3cbc, sizeof(desede3cbc) },
|
|
SEC_OID_DES_EDE3_CBC,
|
|
"DES-EDE3-CBC", CKM_DES3_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, rc5cbcpad, sizeof(rc5cbcpad) },
|
|
SEC_OID_RC5_CBC_PAD,
|
|
"RC5-CBCPad", CKM_RC5_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, desecb, sizeof(desecb) },
|
|
SEC_OID_DES_ECB,
|
|
"DES-ECB", CKM_DES_ECB, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, descbc, sizeof(descbc) },
|
|
SEC_OID_DES_CBC,
|
|
"DES-CBC", CKM_DES_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, desofb, sizeof(desofb) },
|
|
SEC_OID_DES_OFB,
|
|
"DES-OFB", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, descfb, sizeof(descfb) },
|
|
SEC_OID_DES_CFB,
|
|
"DES-CFB", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, desmac, sizeof(desmac) },
|
|
SEC_OID_DES_MAC,
|
|
"DES-MAC", CKM_DES_MAC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, desede, sizeof(desede) },
|
|
SEC_OID_DES_EDE,
|
|
"DES-EDE", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, isoSHAWithRSASignature, sizeof(isoSHAWithRSASignature) },
|
|
SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE,
|
|
"ISO SHA with RSA Signature", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs1RSAEncryption, sizeof(pkcs1RSAEncryption) },
|
|
SEC_OID_PKCS1_RSA_ENCRYPTION,
|
|
"PKCS #1 RSA Encryption", CKM_RSA_PKCS, INVALID_CERT_EXTENSION },
|
|
|
|
/* the following Signing mechanisms should get new CKM_ values when
|
|
* values for CKM_RSA_WITH_MDX and CKM_RSA_WITH_SHA_1 get defined in
|
|
* PKCS #11.
|
|
*/
|
|
{ { siDEROID, pkcs1MD2WithRSAEncryption, sizeof(pkcs1MD2WithRSAEncryption) },
|
|
SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION,
|
|
"PKCS #1 MD2 With RSA Encryption", CKM_MD2_RSA_PKCS,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs1MD4WithRSAEncryption, sizeof(pkcs1MD4WithRSAEncryption) },
|
|
SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION,
|
|
"PKCS #1 MD4 With RSA Encryption", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs1MD5WithRSAEncryption, sizeof(pkcs1MD5WithRSAEncryption) },
|
|
SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION,
|
|
"PKCS #1 MD5 With RSA Encryption", CKM_MD5_RSA_PKCS,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs1SHA1WithRSAEncryption, sizeof(pkcs1SHA1WithRSAEncryption) },
|
|
SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION,
|
|
"PKCS #1 SHA-1 With RSA Encryption", CKM_SHA1_RSA_PKCS,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, pkcs5PbeWithMD2AndDEScbc, sizeof(pkcs5PbeWithMD2AndDEScbc) },
|
|
SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC,
|
|
"PKCS #5 Password Based Encryption with MD2 and DES CBC",
|
|
CKM_PBE_MD2_DES_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs5PbeWithMD5AndDEScbc, sizeof(pkcs5PbeWithMD5AndDEScbc) },
|
|
SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC,
|
|
"PKCS #5 Password Based Encryption with MD5 and DES CBC",
|
|
CKM_PBE_MD5_DES_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs5PbeWithSha1AndDEScbc,
|
|
sizeof(pkcs5PbeWithSha1AndDEScbc) },
|
|
SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC,
|
|
"PKCS #5 Password Based Encryption with SHA1 and DES CBC",
|
|
CKM_NETSCAPE_PBE_SHA1_DES_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7, sizeof(pkcs7) },
|
|
SEC_OID_PKCS7,
|
|
"PKCS #7", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7Data, sizeof(pkcs7Data) },
|
|
SEC_OID_PKCS7_DATA,
|
|
"PKCS #7 Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7SignedData, sizeof(pkcs7SignedData) },
|
|
SEC_OID_PKCS7_SIGNED_DATA,
|
|
"PKCS #7 Signed Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7EnvelopedData, sizeof(pkcs7EnvelopedData) },
|
|
SEC_OID_PKCS7_ENVELOPED_DATA,
|
|
"PKCS #7 Enveloped Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7SignedEnvelopedData, sizeof(pkcs7SignedEnvelopedData) },
|
|
SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA,
|
|
"PKCS #7 Signed And Enveloped Data", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7DigestedData, sizeof(pkcs7DigestedData) },
|
|
SEC_OID_PKCS7_DIGESTED_DATA,
|
|
"PKCS #7 Digested Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs7EncryptedData, sizeof(pkcs7EncryptedData) },
|
|
SEC_OID_PKCS7_ENCRYPTED_DATA,
|
|
"PKCS #7 Encrypted Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9EmailAddress, sizeof(pkcs9EmailAddress) },
|
|
SEC_OID_PKCS9_EMAIL_ADDRESS,
|
|
"PKCS #9 Email Address", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9UnstructuredName, sizeof(pkcs9UnstructuredName) },
|
|
SEC_OID_PKCS9_UNSTRUCTURED_NAME,
|
|
"PKCS #9 Unstructured Name", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9ContentType, sizeof(pkcs9ContentType) },
|
|
SEC_OID_PKCS9_CONTENT_TYPE,
|
|
"PKCS #9 Content Type", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9MessageDigest, sizeof(pkcs9MessageDigest) },
|
|
SEC_OID_PKCS9_MESSAGE_DIGEST,
|
|
"PKCS #9 Message Digest", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9SigningTime, sizeof(pkcs9SigningTime) },
|
|
SEC_OID_PKCS9_SIGNING_TIME,
|
|
"PKCS #9 Signing Time", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9CounterSignature, sizeof(pkcs9CounterSignature) },
|
|
SEC_OID_PKCS9_COUNTER_SIGNATURE,
|
|
"PKCS #9 Counter Signature", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9ChallengePassword, sizeof(pkcs9ChallengePassword) },
|
|
SEC_OID_PKCS9_CHALLENGE_PASSWORD,
|
|
"PKCS #9 Challenge Password", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9UnstructuredAddress, sizeof(pkcs9UnstructuredAddress) },
|
|
SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS,
|
|
"PKCS #9 Unstructured Address", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9ExtendedCertificateAttributes,
|
|
sizeof(pkcs9ExtendedCertificateAttributes) },
|
|
SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES,
|
|
"PKCS #9 Extended Certificate Attributes", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9SMIMECapabilities,
|
|
sizeof(pkcs9SMIMECapabilities) },
|
|
SEC_OID_PKCS9_SMIME_CAPABILITIES,
|
|
"PKCS #9 S/MIME Capabilities", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520CommonName,
|
|
sizeof(x520CommonName) },
|
|
SEC_OID_AVA_COMMON_NAME,
|
|
"X520 Common Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520CountryName,
|
|
sizeof(x520CountryName) },
|
|
SEC_OID_AVA_COUNTRY_NAME,
|
|
"X520 Country Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520LocalityName,
|
|
sizeof(x520LocalityName) },
|
|
SEC_OID_AVA_LOCALITY,
|
|
"X520 Locality Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520StateOrProvinceName,
|
|
sizeof(x520StateOrProvinceName) },
|
|
SEC_OID_AVA_STATE_OR_PROVINCE,
|
|
"X520 State Or Province Name", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520OrgName,
|
|
sizeof(x520OrgName) },
|
|
SEC_OID_AVA_ORGANIZATION_NAME,
|
|
"X520 Organization Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520OrgUnitName,
|
|
sizeof(x520OrgUnitName) },
|
|
SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME,
|
|
"X520 Organizational Unit Name", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, x520DnQualifier,
|
|
sizeof(x520DnQualifier) },
|
|
SEC_OID_AVA_DN_QUALIFIER,
|
|
"X520 DN Qualifier", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, rfc2247DomainComponent,
|
|
sizeof(rfc2247DomainComponent), },
|
|
SEC_OID_AVA_DC,
|
|
"RFC 2247 Domain Component", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, nsTypeGIF,
|
|
sizeof(nsTypeGIF) },
|
|
SEC_OID_NS_TYPE_GIF,
|
|
"GIF", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, nsTypeJPEG,
|
|
sizeof(nsTypeJPEG) },
|
|
SEC_OID_NS_TYPE_JPEG,
|
|
"JPEG", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, nsTypeURL,
|
|
sizeof(nsTypeURL) },
|
|
SEC_OID_NS_TYPE_URL,
|
|
"URL", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, nsTypeHTML,
|
|
sizeof(nsTypeHTML) },
|
|
SEC_OID_NS_TYPE_HTML,
|
|
"HTML", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, nsTypeCertSeq,
|
|
sizeof(nsTypeCertSeq) },
|
|
SEC_OID_NS_TYPE_CERT_SEQUENCE,
|
|
"Certificate Sequence", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, missiCertKEADSSOld, sizeof(missiCertKEADSSOld) },
|
|
SEC_OID_MISSI_KEA_DSS_OLD, "MISSI KEA and DSS Algorithm (Old)",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, missiCertDSSOld, sizeof(missiCertDSSOld) },
|
|
SEC_OID_MISSI_DSS_OLD, "MISSI DSS Algorithm (Old)",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, missiCertKEADSS, sizeof(missiCertKEADSS) },
|
|
SEC_OID_MISSI_KEA_DSS, "MISSI KEA and DSS Algorithm",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, missiCertDSS, sizeof(missiCertDSS) },
|
|
SEC_OID_MISSI_DSS, "MISSI DSS Algorithm",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, missiCertKEA, sizeof(missiCertKEA) },
|
|
SEC_OID_MISSI_KEA, "MISSI KEA Algorithm",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, missiCertAltKEA, sizeof(missiCertAltKEA) },
|
|
SEC_OID_MISSI_ALT_KEA, "MISSI Alternate KEA Algorithm",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
|
|
/* Netscape private extensions */
|
|
{ { siDEROID, nsCertExtNetscapeOK,
|
|
sizeof(nsCertExtNetscapeOK) },
|
|
SEC_OID_NS_CERT_EXT_NETSCAPE_OK,
|
|
"Netscape says this cert is OK",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsCertExtIssuerLogo,
|
|
sizeof(nsCertExtIssuerLogo) },
|
|
SEC_OID_NS_CERT_EXT_ISSUER_LOGO,
|
|
"Certificate Issuer Logo",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsCertExtSubjectLogo,
|
|
sizeof(nsCertExtSubjectLogo) },
|
|
SEC_OID_NS_CERT_EXT_SUBJECT_LOGO,
|
|
"Certificate Subject Logo",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCertType,
|
|
sizeof(nsExtCertType) },
|
|
SEC_OID_NS_CERT_EXT_CERT_TYPE,
|
|
"Certificate Type",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtBaseURL,
|
|
sizeof(nsExtBaseURL) },
|
|
SEC_OID_NS_CERT_EXT_BASE_URL,
|
|
"Certificate Extension Base URL",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtRevocationURL,
|
|
sizeof(nsExtRevocationURL) },
|
|
SEC_OID_NS_CERT_EXT_REVOCATION_URL,
|
|
"Certificate Revocation URL",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCARevocationURL,
|
|
sizeof(nsExtCARevocationURL) },
|
|
SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL,
|
|
"Certificate Authority Revocation URL",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCACRLURL,
|
|
sizeof(nsExtCACRLURL) },
|
|
SEC_OID_NS_CERT_EXT_CA_CRL_URL,
|
|
"Certificate Authority CRL Download URL",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCACertURL,
|
|
sizeof(nsExtCACertURL) },
|
|
SEC_OID_NS_CERT_EXT_CA_CERT_URL,
|
|
"Certificate Authority Certificate Download URL",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCertRenewalURL,
|
|
sizeof(nsExtCertRenewalURL) },
|
|
SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL,
|
|
"Certificate Renewal URL", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCAPolicyURL,
|
|
sizeof(nsExtCAPolicyURL) },
|
|
SEC_OID_NS_CERT_EXT_CA_POLICY_URL,
|
|
"Certificate Authority Policy URL",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtHomepageURL,
|
|
sizeof(nsExtHomepageURL) },
|
|
SEC_OID_NS_CERT_EXT_HOMEPAGE_URL,
|
|
"Certificate Homepage URL", CKM_INVALID_MECHANISM,
|
|
UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtEntityLogo,
|
|
sizeof(nsExtEntityLogo) },
|
|
SEC_OID_NS_CERT_EXT_ENTITY_LOGO,
|
|
"Certificate Entity Logo", CKM_INVALID_MECHANISM,
|
|
UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtUserPicture,
|
|
sizeof(nsExtUserPicture) },
|
|
SEC_OID_NS_CERT_EXT_USER_PICTURE,
|
|
"Certificate User Picture", CKM_INVALID_MECHANISM,
|
|
UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtSSLServerName,
|
|
sizeof(nsExtSSLServerName) },
|
|
SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME,
|
|
"Certificate SSL Server Name", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtComment,
|
|
sizeof(nsExtComment) },
|
|
SEC_OID_NS_CERT_EXT_COMMENT,
|
|
"Certificate Comment", CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtLostPasswordURL,
|
|
sizeof(nsExtLostPasswordURL) },
|
|
SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL,
|
|
"Lost Password URL", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsExtCertRenewalTime,
|
|
sizeof(nsExtCertRenewalTime) },
|
|
SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME,
|
|
"Certificate Renewal Time", CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, nsKeyUsageGovtApproved,
|
|
sizeof(nsKeyUsageGovtApproved) },
|
|
SEC_OID_NS_KEY_USAGE_GOVT_APPROVED,
|
|
"Strong Crypto Export Approved",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
|
|
|
|
/* x.509 v3 certificate extensions */
|
|
{ { siDEROID, x509SubjectDirectoryAttr, sizeof(x509SubjectDirectoryAttr) },
|
|
SEC_OID_X509_SUBJECT_DIRECTORY_ATTR,
|
|
"Certificate Subject Directory Attributes",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION},
|
|
{ { siDEROID, x509SubjectKeyID, sizeof(x509SubjectKeyID) },
|
|
SEC_OID_X509_SUBJECT_KEY_ID, "Certificate Subject Key ID",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509KeyUsage, sizeof(x509KeyUsage) },
|
|
SEC_OID_X509_KEY_USAGE, "Certificate Key Usage",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509PrivateKeyUsagePeriod,
|
|
sizeof(x509PrivateKeyUsagePeriod) },
|
|
SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD,
|
|
"Certificate Private Key Usage Period",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509SubjectAltName, sizeof(x509SubjectAltName) },
|
|
SEC_OID_X509_SUBJECT_ALT_NAME, "Certificate Subject Alt Name",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509IssuerAltName, sizeof(x509IssuerAltName) },
|
|
SEC_OID_X509_ISSUER_ALT_NAME, "Certificate Issuer Alt Name",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509BasicConstraints, sizeof(x509BasicConstraints) },
|
|
SEC_OID_X509_BASIC_CONSTRAINTS, "Certificate Basic Constraints",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509NameConstraints, sizeof(x509NameConstraints) },
|
|
SEC_OID_X509_NAME_CONSTRAINTS, "Certificate Name Constraints",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509CRLDistPoints, sizeof(x509CRLDistPoints) },
|
|
SEC_OID_X509_CRL_DIST_POINTS, "CRL Distribution Points",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509CertificatePolicies, sizeof(x509CertificatePolicies) },
|
|
SEC_OID_X509_CERTIFICATE_POLICIES,
|
|
"Certificate Policies",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509PolicyMappings, sizeof(x509PolicyMappings) },
|
|
SEC_OID_X509_POLICY_MAPPINGS, "Certificate Policy Mappings",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509PolicyConstraints, sizeof(x509PolicyConstraints) },
|
|
SEC_OID_X509_POLICY_CONSTRAINTS, "Certificate Policy Constraints",
|
|
CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509AuthKeyID, sizeof(x509AuthKeyID) },
|
|
SEC_OID_X509_AUTH_KEY_ID, "Certificate Authority Key Identifier",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509ExtKeyUsage, sizeof(x509ExtKeyUsage) },
|
|
SEC_OID_X509_EXT_KEY_USAGE, "Extended Key Usage",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509AuthInfoAccess, sizeof(x509AuthInfoAccess) },
|
|
SEC_OID_X509_AUTH_INFO_ACCESS, "Authority Information Access",
|
|
CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION },
|
|
|
|
/* x.509 v3 CRL extensions */
|
|
{ { siDEROID, x509CrlNumber, sizeof(x509CrlNumber) },
|
|
SEC_OID_X509_CRL_NUMBER, "CRL Number", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509ReasonCode, sizeof(x509ReasonCode) },
|
|
SEC_OID_X509_REASON_CODE, "CRL reason code", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, x509InvalidDate, sizeof(x509InvalidDate) },
|
|
SEC_OID_X509_INVALID_DATE, "Invalid Date", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, x500RSAEncryption, sizeof(x500RSAEncryption) },
|
|
SEC_OID_X500_RSA_ENCRYPTION,
|
|
"X500 RSA Encryption", CKM_RSA_X_509, INVALID_CERT_EXTENSION },
|
|
|
|
/* added for alg 1485 */
|
|
{ { siDEROID, rfc1274Uid,
|
|
sizeof(rfc1274Uid) },
|
|
SEC_OID_RFC1274_UID,
|
|
"RFC1274 User Id", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, rfc1274Mail,
|
|
sizeof(rfc1274Uid) },
|
|
SEC_OID_RFC1274_MAIL,
|
|
"RFC1274 E-mail Address", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
|
|
/* pkcs 12 additions */
|
|
{ { siDEROID, pkcs12, sizeof(pkcs12) },
|
|
SEC_OID_PKCS12,
|
|
"PKCS #12", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12ModeIDs, sizeof(pkcs12ModeIDs) },
|
|
SEC_OID_PKCS12_MODE_IDS,
|
|
"PKCS #12 Mode IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12ESPVKIDs, sizeof(pkcs12ESPVKIDs) },
|
|
SEC_OID_PKCS12_ESPVK_IDS,
|
|
"PKCS #12 ESPVK IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12BagIDs, sizeof(pkcs12BagIDs) },
|
|
SEC_OID_PKCS12_BAG_IDS,
|
|
"PKCS #12 Bag IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12CertBagIDs, sizeof(pkcs12CertBagIDs) },
|
|
SEC_OID_PKCS12_CERT_BAG_IDS,
|
|
"PKCS #12 Cert Bag IDs", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12OIDs, sizeof(pkcs12OIDs) },
|
|
SEC_OID_PKCS12_OIDS,
|
|
"PKCS #12 OIDs", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEIDs, sizeof(pkcs12PBEIDs) },
|
|
SEC_OID_PKCS12_PBE_IDS,
|
|
"PKCS #12 PBE IDs", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12SignatureIDs, sizeof(pkcs12SignatureIDs) },
|
|
SEC_OID_PKCS12_SIGNATURE_IDS,
|
|
"PKCS #12 Signature IDs", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12EnvelopingIDs, sizeof(pkcs12EnvelopingIDs) },
|
|
SEC_OID_PKCS12_ENVELOPING_IDS,
|
|
"PKCS #12 Enveloping IDs", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PKCS8KeyShrouding,
|
|
sizeof(pkcs12PKCS8KeyShrouding) },
|
|
SEC_OID_PKCS12_PKCS8_KEY_SHROUDING,
|
|
"PKCS #12 Key Shrouding", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12KeyBagID,
|
|
sizeof(pkcs12KeyBagID) },
|
|
SEC_OID_PKCS12_KEY_BAG_ID,
|
|
"PKCS #12 Key Bag ID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12CertAndCRLBagID,
|
|
sizeof(pkcs12CertAndCRLBagID) },
|
|
SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID,
|
|
"PKCS #12 Cert And CRL Bag ID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12SecretBagID,
|
|
sizeof(pkcs12SecretBagID) },
|
|
SEC_OID_PKCS12_SECRET_BAG_ID,
|
|
"PKCS #12 Secret Bag ID", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12X509CertCRLBag,
|
|
sizeof(pkcs12X509CertCRLBag) },
|
|
SEC_OID_PKCS12_X509_CERT_CRL_BAG,
|
|
"PKCS #12 X509 Cert CRL Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12SDSICertBag,
|
|
sizeof(pkcs12SDSICertBag) },
|
|
SEC_OID_PKCS12_SDSI_CERT_BAG,
|
|
"PKCS #12 SDSI Cert Bag", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEWithSha1And128BitRC4,
|
|
sizeof(pkcs12PBEWithSha1And128BitRC4) },
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4,
|
|
"PKCS #12 PBE With Sha1 and 128 Bit RC4",
|
|
CKM_NETSCAPE_PBE_SHA1_128_BIT_RC4, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEWithSha1And40BitRC4,
|
|
sizeof(pkcs12PBEWithSha1And40BitRC4) },
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4,
|
|
"PKCS #12 PBE With Sha1 and 40 Bit RC4",
|
|
CKM_NETSCAPE_PBE_SHA1_40_BIT_RC4, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEWithSha1AndTripleDESCBC,
|
|
sizeof(pkcs12PBEWithSha1AndTripleDESCBC) },
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC,
|
|
"PKCS #12 PBE With Sha1 and Triple DES CBC",
|
|
CKM_NETSCAPE_PBE_SHA1_TRIPLE_DES_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEWithSha1And128BitRC2CBC,
|
|
sizeof(pkcs12PBEWithSha1And128BitRC2CBC) },
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC,
|
|
"PKCS #12 PBE With Sha1 and 128 Bit RC2 CBC",
|
|
CKM_NETSCAPE_PBE_SHA1_128_BIT_RC2_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PBEWithSha1And40BitRC2CBC,
|
|
sizeof(pkcs12PBEWithSha1And40BitRC2CBC) },
|
|
SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC,
|
|
"PKCS #12 PBE With Sha1 and 40 Bit RC2 CBC",
|
|
CKM_NETSCAPE_PBE_SHA1_40_BIT_RC2_CBC, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12RSAEncryptionWith128BitRC4,
|
|
sizeof(pkcs12RSAEncryptionWith128BitRC4) },
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4,
|
|
"PKCS #12 RSA Encryption with 128 Bit RC4",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12RSAEncryptionWith40BitRC4,
|
|
sizeof(pkcs12RSAEncryptionWith40BitRC4) },
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4,
|
|
"PKCS #12 RSA Encryption with 40 Bit RC4",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12RSAEncryptionWithTripleDES,
|
|
sizeof(pkcs12RSAEncryptionWithTripleDES) },
|
|
SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES,
|
|
"PKCS #12 RSA Encryption with Triple DES",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12RSASignatureWithSHA1Digest,
|
|
sizeof(pkcs12RSASignatureWithSHA1Digest) },
|
|
SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST,
|
|
"PKCS #12 RSA Encryption with Triple DES",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
|
|
/* DSA signatures */
|
|
{ { siDEROID, ansix9DSASignature, sizeof(ansix9DSASignature) },
|
|
SEC_OID_ANSIX9_DSA_SIGNATURE,
|
|
"ANSI X9.57 DSA Signature", CKM_DSA,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, ansix9DSASignaturewithSHA1Digest,
|
|
sizeof(ansix9DSASignaturewithSHA1Digest) },
|
|
SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST,
|
|
"ANSI X9.57 DSA Signature with SHA1 Digest", CKM_DSA_SHA1,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, bogusDSASignaturewithSHA1Digest,
|
|
sizeof(bogusDSASignaturewithSHA1Digest) },
|
|
SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST,
|
|
"FORTEZZA DSA Signature with SHA1 Digest", CKM_DSA_SHA1,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
/* verisign oids */
|
|
{ { siDEROID, verisignUserNotices,
|
|
sizeof(verisignUserNotices) },
|
|
SEC_OID_VERISIGN_USER_NOTICES,
|
|
"Verisign User Notices", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
/* pkix oids */
|
|
{ { siDEROID, pkixCPSPointerQualifier,
|
|
sizeof(pkixCPSPointerQualifier) },
|
|
SEC_OID_PKIX_CPS_POINTER_QUALIFIER,
|
|
"PKIX CPS Pointer Qualifier", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixUserNoticeQualifier,
|
|
sizeof(pkixUserNoticeQualifier) },
|
|
SEC_OID_PKIX_USER_NOTICE_QUALIFIER,
|
|
"PKIX User Notice Qualifier", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, pkixOCSP, sizeof(pkixOCSP), },
|
|
SEC_OID_PKIX_OCSP,
|
|
"PKIX Online Certificate Status Protocol", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPBasicResponse, sizeof(pkixOCSPBasicResponse), },
|
|
SEC_OID_PKIX_OCSP_BASIC_RESPONSE,
|
|
"OCSP Basic Response", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPNonce, sizeof(pkixOCSPNonce), },
|
|
SEC_OID_PKIX_OCSP_NONCE,
|
|
"OCSP Nonce Extension", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPCRL, sizeof(pkixOCSPCRL), },
|
|
SEC_OID_PKIX_OCSP_CRL,
|
|
"OCSP CRL Reference Extension", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPResponse, sizeof(pkixOCSPResponse), },
|
|
SEC_OID_PKIX_OCSP_RESPONSE,
|
|
"OCSP Response Types Extension", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPNoCheck, sizeof(pkixOCSPNoCheck) },
|
|
SEC_OID_PKIX_OCSP_NO_CHECK,
|
|
"OCSP No Check Extension", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPArchiveCutoff, sizeof(pkixOCSPArchiveCutoff) },
|
|
SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF,
|
|
"OCSP Archive Cutoff Extension", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixOCSPServiceLocator, sizeof(pkixOCSPServiceLocator) },
|
|
SEC_OID_PKIX_OCSP_SERVICE_LOCATOR,
|
|
"OCSP Service Locator Extension", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, pkixRegCtrlRegToken,
|
|
sizeof (pkixRegCtrlRegToken) },
|
|
SEC_OID_PKIX_REGCTRL_REGTOKEN,
|
|
"PKIX CRMF Registration Control, Registration Token",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixRegCtrlAuthenticator,
|
|
sizeof (pkixRegCtrlAuthenticator) },
|
|
SEC_OID_PKIX_REGCTRL_AUTHENTICATOR,
|
|
"PKIX CRMF Registration Control, Registration Authenticator",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkixRegCtrlPKIPubInfo,
|
|
sizeof (pkixRegCtrlPKIPubInfo) },
|
|
SEC_OID_PKIX_REGCTRL_PKIPUBINFO,
|
|
"PKIX CRMF Registration Control, PKI Publication Info",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixRegCtrlPKIArchOptions,
|
|
sizeof (pkixRegCtrlPKIArchOptions) },
|
|
SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS,
|
|
"PKIX CRMF Registration Control, PKI Archive Options",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixRegCtrlOldCertID,
|
|
sizeof (pkixRegCtrlOldCertID) },
|
|
SEC_OID_PKIX_REGCTRL_OLD_CERT_ID,
|
|
"PKIX CRMF Registration Control, Old Certificate ID",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixRegCtrlProtEncKey,
|
|
sizeof (pkixRegCtrlProtEncKey) },
|
|
SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY,
|
|
"PKIX CRMF Registration Control, Protocol Encryption Key",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixRegInfoUTF8Pairs,
|
|
sizeof (pkixRegInfoUTF8Pairs) },
|
|
SEC_OID_PKIX_REGINFO_UTF8_PAIRS,
|
|
"PKIX CRMF Registration Info, UTF8 Pairs",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixRegInfoCertReq,
|
|
sizeof (pkixRegInfoCertReq) },
|
|
SEC_OID_PKIX_REGINFO_CERT_REQUEST,
|
|
"PKIX CRMF Registration Info, Certificate Request",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixExtendedKeyUsageServerAuth,
|
|
sizeof (pkixExtendedKeyUsageServerAuth) },
|
|
SEC_OID_EXT_KEY_USAGE_SERVER_AUTH,
|
|
"TLS Web Server Authentication Certificate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixExtendedKeyUsageClientAuth,
|
|
sizeof (pkixExtendedKeyUsageClientAuth) },
|
|
SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH,
|
|
"TLS Web Client Authentication Certificate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixExtendedKeyUsageCodeSign,
|
|
sizeof (pkixExtendedKeyUsageCodeSign) },
|
|
SEC_OID_EXT_KEY_USAGE_CODE_SIGN,
|
|
"Code Signing Certificate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixExtendedKeyUsageEMailProtect,
|
|
sizeof (pkixExtendedKeyUsageEMailProtect) },
|
|
SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT,
|
|
"E-Mail Protection Certificate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixExtendedKeyUsageTimeStamp,
|
|
sizeof (pkixExtendedKeyUsageTimeStamp) },
|
|
SEC_OID_EXT_KEY_USAGE_TIME_STAMP,
|
|
"Time Stamping Certifcate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
{ { siDEROID, pkixOCSPResponderExtendedKeyUsage,
|
|
sizeof (pkixOCSPResponderExtendedKeyUsage) },
|
|
SEC_OID_OCSP_RESPONDER,
|
|
"OCSP Responder Certificate",
|
|
CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION},
|
|
|
|
/* Netscape Algorithm OIDs */
|
|
|
|
{ { siDEROID, netscapeSMimeKEA,
|
|
sizeof(netscapeSMimeKEA) },
|
|
SEC_OID_NETSCAPE_SMIME_KEA,
|
|
"Netscape S/MIME KEA", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
/* Skipjack OID -- ### mwelch temporary */
|
|
{ { siDEROID, skipjackCBC,
|
|
sizeof(skipjackCBC) },
|
|
SEC_OID_FORTEZZA_SKIPJACK,
|
|
"Skipjack CBC64", CKM_SKIPJACK_CBC64,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
/* pkcs12 v2 oids */
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And128BitRC4,
|
|
sizeof(pkcs12V2PBEWithSha1And128BitRC4) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4,
|
|
"PKCS12 V2 PBE With SHA1 And 128 Bit RC4",
|
|
CKM_PBE_SHA1_RC4_128,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And40BitRC4,
|
|
sizeof(pkcs12V2PBEWithSha1And40BitRC4) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4,
|
|
"PKCS12 V2 PBE With SHA1 And 40 Bit RC4",
|
|
CKM_PBE_SHA1_RC4_40,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And3KeyTripleDEScbc,
|
|
sizeof(pkcs12V2PBEWithSha1And3KeyTripleDEScbc) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC,
|
|
"PKCS12 V2 PBE With SHA1 And 3KEY Triple DES-cbc",
|
|
CKM_PBE_SHA1_DES3_EDE_CBC,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And2KeyTripleDEScbc,
|
|
sizeof(pkcs12V2PBEWithSha1And2KeyTripleDEScbc) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC,
|
|
"PKCS12 V2 PBE With SHA1 And 2KEY Triple DES-cbc",
|
|
CKM_PBE_SHA1_DES2_EDE_CBC,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And128BitRC2cbc,
|
|
sizeof(pkcs12V2PBEWithSha1And128BitRC2cbc) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC,
|
|
"PKCS12 V2 PBE With SHA1 And 128 Bit RC2 CBC",
|
|
CKM_PBE_SHA1_RC2_128_CBC,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V2PBEWithSha1And40BitRC2cbc,
|
|
sizeof(pkcs12V2PBEWithSha1And40BitRC2cbc) },
|
|
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC,
|
|
"PKCS12 V2 PBE With SHA1 And 40 Bit RC2 CBC",
|
|
CKM_PBE_SHA1_RC2_40_CBC,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12SafeContentsID,
|
|
sizeof(pkcs12SafeContentsID) },
|
|
SEC_OID_PKCS12_SAFE_CONTENTS_ID,
|
|
"PKCS #12 Safe Contents ID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12PKCS8ShroudedKeyBagID,
|
|
sizeof(pkcs12PKCS8ShroudedKeyBagID) },
|
|
SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID,
|
|
"PKCS #12 Safe Contents ID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1KeyBag,
|
|
sizeof(pkcs12V1KeyBag) },
|
|
SEC_OID_PKCS12_V1_KEY_BAG_ID,
|
|
"PKCS #12 V1 Key Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1PKCS8ShroudedKeyBag,
|
|
sizeof(pkcs12V1PKCS8ShroudedKeyBag) },
|
|
SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID,
|
|
"PKCS #12 V1 PKCS8 Shrouded Key Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1CertBag,
|
|
sizeof(pkcs12V1CertBag) },
|
|
SEC_OID_PKCS12_V1_CERT_BAG_ID,
|
|
"PKCS #12 V1 Cert Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1CRLBag,
|
|
sizeof(pkcs12V1CRLBag) },
|
|
SEC_OID_PKCS12_V1_CRL_BAG_ID,
|
|
"PKCS #12 V1 CRL Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1SecretBag,
|
|
sizeof(pkcs12V1SecretBag) },
|
|
SEC_OID_PKCS12_V1_SECRET_BAG_ID,
|
|
"PKCS #12 V1 Secret Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12V1SafeContentsBag,
|
|
sizeof(pkcs12V1SafeContentsBag) },
|
|
SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID,
|
|
"PKCS #12 V1 Safe Contents Bag", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, pkcs9X509Certificate,
|
|
sizeof(pkcs9X509Certificate) },
|
|
SEC_OID_PKCS9_X509_CERT,
|
|
"PKCS #9 X509 Certificate", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9SDSICertificate,
|
|
sizeof(pkcs9SDSICertificate) },
|
|
SEC_OID_PKCS9_SDSI_CERT,
|
|
"PKCS #9 SDSI Certificate", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9X509CRL,
|
|
sizeof(pkcs9X509CRL) },
|
|
SEC_OID_PKCS9_X509_CRL,
|
|
"PKCS #9 X509 CRL", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9FriendlyName,
|
|
sizeof(pkcs9FriendlyName) },
|
|
SEC_OID_PKCS9_FRIENDLY_NAME,
|
|
"PKCS #9 Friendly Name", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs9LocalKeyID,
|
|
sizeof(pkcs9LocalKeyID) },
|
|
SEC_OID_PKCS9_LOCAL_KEY_ID,
|
|
"PKCS #9 Local Key ID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, pkcs12KeyUsageAttr,
|
|
sizeof(pkcs12KeyUsageAttr) },
|
|
SEC_OID_PKCS12_KEY_USAGE,
|
|
"PKCS 12 Key Usage", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, dhPublicKey,
|
|
sizeof(dhPublicKey) },
|
|
SEC_OID_X942_DIFFIE_HELMAN_KEY,
|
|
"Diffie-Helman Public Key", CKM_DH_PKCS_DERIVE,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, netscapeNickname,
|
|
sizeof(netscapeNickname) },
|
|
SEC_OID_NETSCAPE_NICKNAME,
|
|
"Netscape Nickname", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
/* Cert Server specific OIDs */
|
|
{ { siDEROID, netscapeRecoveryRequest,
|
|
sizeof(netscapeRecoveryRequest) },
|
|
SEC_OID_NETSCAPE_RECOVERY_REQUEST,
|
|
"Recovery Request OID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, nsExtAIACertRenewal,
|
|
sizeof(nsExtAIACertRenewal) },
|
|
SEC_OID_CERT_RENEWAL_LOCATOR,
|
|
"Certificate Renewal Locator OID", CKM_INVALID_MECHANISM,
|
|
INVALID_CERT_EXTENSION },
|
|
|
|
{ { siDEROID, nsExtCertScopeOfUse,
|
|
sizeof(nsExtCertScopeOfUse) },
|
|
SEC_OID_NS_CERT_EXT_SCOPE_OF_USE,
|
|
"Certificate Scope-of-Use Extension", CKM_INVALID_MECHANISM,
|
|
SUPPORTED_CERT_EXTENSION },
|
|
|
|
/* CMS stuff */
|
|
{ { siDEROID, cmsESDH,
|
|
sizeof(cmsESDH) },
|
|
SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN,
|
|
"Ephemeral-Static Diffie-Hellman", CKM_INVALID_MECHANISM /* XXX */,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, cms3DESwrap,
|
|
sizeof(cms3DESwrap) },
|
|
SEC_OID_CMS_3DES_KEY_WRAP,
|
|
"CMS 3DES Key Wrap", CKM_INVALID_MECHANISM /* XXX */,
|
|
INVALID_CERT_EXTENSION },
|
|
{ { siDEROID, cmsRC2wrap,
|
|
sizeof(cmsRC2wrap) },
|
|
SEC_OID_CMS_RC2_KEY_WRAP,
|
|
"CMS RC2 Key Wrap", CKM_INVALID_MECHANISM /* XXX */,
|
|
INVALID_CERT_EXTENSION },
|
|
};
|
|
|
|
/*
|
|
* now the dynamic table. The dynamic table gets build at init time.
|
|
* and gets modified if the user loads new crypto modules.
|
|
*/
|
|
|
|
static DB *oid_d_hash = 0;
|
|
static SECOidData **secoidDynamicTable = NULL;
|
|
static int secoidDynamicTableSize = 0;
|
|
static int secoidLastDynamicEntry = 0;
|
|
static int secoidLastHashEntry = 0;
|
|
|
|
static SECStatus
|
|
secoid_DynamicRehash(void)
|
|
{
|
|
DBT key;
|
|
DBT data;
|
|
int rv;
|
|
SECOidData *oid;
|
|
int i;
|
|
int last = secoidLastDynamicEntry;
|
|
|
|
if (!oid_d_hash) {
|
|
oid_d_hash = dbopen( 0, O_RDWR | O_CREAT, 0600, DB_HASH, 0 );
|
|
}
|
|
|
|
|
|
if ( !oid_d_hash ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return(SECFailure);
|
|
}
|
|
|
|
for ( i = secoidLastHashEntry; i < last; i++ ) {
|
|
oid = secoidDynamicTable[i];
|
|
|
|
/* invalid assert ... guarrenteed not to be true */
|
|
/* PORT_Assert ( oid->offset == i ); */
|
|
|
|
key.data = oid->oid.data;
|
|
key.size = oid->oid.len;
|
|
|
|
data.data = &oid;
|
|
data.size = sizeof(oid);
|
|
|
|
rv = (* oid_d_hash->put)( oid_d_hash, &key, &data, R_NOOVERWRITE );
|
|
if ( rv ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return(SECFailure);
|
|
}
|
|
}
|
|
secoidLastHashEntry = last;
|
|
return(SECSuccess);
|
|
}
|
|
|
|
/*
|
|
* Lookup a Dynamic OID. Dynamic OID's still change slowly, so it's
|
|
* cheaper to rehash the table when it changes than it is to do the loop
|
|
* each time. Worry: what about thread safety here? Global Static data with
|
|
* no locks.... (sigh).
|
|
*/
|
|
static SECStatus
|
|
secoid_FindDynamic(DBT *key, DBT *data) {
|
|
if (secoidDynamicTable == NULL) {
|
|
return SECFailure;
|
|
}
|
|
if (secoidLastHashEntry != secoidLastDynamicEntry) {
|
|
SECStatus rv = secoid_DynamicRehash();
|
|
if ( rv != SECSuccess ) {
|
|
return rv;
|
|
}
|
|
}
|
|
return (SECStatus)(* oid_d_hash->get)( oid_d_hash, key, data, 0 );
|
|
|
|
}
|
|
|
|
static SECOidData *
|
|
secoid_FindDynamicByTag(SECOidTag tagnum)
|
|
{
|
|
int tagNumDiff;
|
|
|
|
if (secoidDynamicTable == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (tagnum < SEC_OID_TOTAL) {
|
|
return NULL;
|
|
}
|
|
|
|
tagNumDiff = tagnum - SEC_OID_TOTAL;
|
|
if (tagNumDiff >= secoidLastDynamicEntry) {
|
|
return NULL;
|
|
}
|
|
|
|
return(secoidDynamicTable[tagNumDiff]);
|
|
}
|
|
|
|
/*
|
|
* this routine is definately not thread safe. It is only called out
|
|
* of the UI, or at init time. If we want to call it any other time,
|
|
* we need to make it thread safe.
|
|
*/
|
|
SECStatus
|
|
SECOID_AddEntry(SECItem *oid, char *description, unsigned long mech) {
|
|
SECOidData *oiddp = (SECOidData *)PORT_Alloc(sizeof(SECOidData));
|
|
int last = secoidLastDynamicEntry;
|
|
int tableSize = secoidDynamicTableSize;
|
|
int next = last++;
|
|
SECOidData **newTable = secoidDynamicTable;
|
|
SECOidData **oldTable = NULL;
|
|
|
|
if (oid == NULL) {
|
|
return SECFailure;
|
|
}
|
|
|
|
/* fill in oid structure */
|
|
if (SECITEM_CopyItem(NULL,&oiddp->oid,oid) != SECSuccess) {
|
|
PORT_Free(oiddp);
|
|
return SECFailure;
|
|
}
|
|
oiddp->offset = (SECOidTag)(next + SEC_OID_TOTAL);
|
|
/* may we should just reference the copy passed to us? */
|
|
oiddp->desc = PORT_Strdup(description);
|
|
oiddp->mechanism = mech;
|
|
|
|
|
|
if (last > tableSize) {
|
|
int oldTableSize = tableSize;
|
|
tableSize += 10;
|
|
oldTable = newTable;
|
|
newTable = (SECOidData **)PORT_ZAlloc(sizeof(SECOidData *)*tableSize);
|
|
if (newTable == NULL) {
|
|
PORT_Free(oiddp->oid.data);
|
|
PORT_Free(oiddp);
|
|
return SECFailure;
|
|
}
|
|
PORT_Memcpy(newTable,oldTable,sizeof(SECOidData *)*oldTableSize);
|
|
PORT_Free(oldTable);
|
|
}
|
|
|
|
newTable[next] = oiddp;
|
|
secoidDynamicTable = newTable;
|
|
secoidDynamicTableSize = tableSize;
|
|
secoidLastDynamicEntry= last;
|
|
return SECSuccess;
|
|
}
|
|
|
|
|
|
/* normal static table processing */
|
|
static DB *oidhash = NULL;
|
|
static DB *oidmechhash = NULL;
|
|
|
|
static SECStatus
|
|
InitOIDHash(void)
|
|
{
|
|
DBT key;
|
|
DBT data;
|
|
int rv;
|
|
SECOidData *oid;
|
|
int i;
|
|
|
|
oidhash = dbopen( 0, O_RDWR | O_CREAT, 0600, DB_HASH, 0 );
|
|
oidmechhash = dbopen( 0, O_RDWR | O_CREAT, 0600, DB_HASH, 0 );
|
|
|
|
if ( !oidhash || !oidmechhash) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
PORT_Assert(0); /*This function should never fail. */
|
|
return(SECFailure);
|
|
}
|
|
|
|
for ( i = 0; i < ( sizeof(oids) / sizeof(SECOidData) ); i++ ) {
|
|
oid = &oids[i];
|
|
|
|
PORT_Assert ( oid->offset == i );
|
|
|
|
key.data = oid->oid.data;
|
|
key.size = oid->oid.len;
|
|
|
|
data.data = &oid;
|
|
data.size = sizeof(oid);
|
|
|
|
rv = (* oidhash->put)( oidhash, &key, &data, R_NOOVERWRITE );
|
|
if ( rv ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
PORT_Assert(0); /*This function should never fail. */
|
|
return(SECFailure);
|
|
}
|
|
|
|
if ( oid->mechanism != CKM_INVALID_MECHANISM ) {
|
|
key.data = &oid->mechanism;
|
|
key.size = sizeof(oid->mechanism);
|
|
|
|
rv = (* oidmechhash->put)( oidmechhash, &key, &data, R_NOOVERWRITE);
|
|
/* Only error out if the error value returned is not
|
|
* RET_SPECIAL, ie the mechanism already has a registered
|
|
* OID.
|
|
*/
|
|
if ( rv && rv != RET_SPECIAL) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
PORT_Assert(0); /* This function should never fail. */
|
|
return(SECFailure);
|
|
}
|
|
}
|
|
}
|
|
|
|
PORT_Assert (i == SEC_OID_TOTAL);
|
|
|
|
return(SECSuccess);
|
|
}
|
|
|
|
SECOidData *
|
|
SECOID_FindOIDByMechanism(unsigned long mechanism)
|
|
{
|
|
DBT key;
|
|
DBT data;
|
|
SECOidData *ret;
|
|
int rv;
|
|
|
|
if ( !oidhash ) {
|
|
rv = InitOIDHash();
|
|
if ( rv != SECSuccess ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return NULL;
|
|
}
|
|
}
|
|
key.data = &mechanism;
|
|
key.size = sizeof(mechanism);
|
|
|
|
rv = (* oidmechhash->get)( oidmechhash, &key, &data, 0 );
|
|
if ( rv || ( data.size != sizeof(unsigned long) ) ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return NULL;
|
|
}
|
|
PORT_Memcpy(&ret, data.data, data.size);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
SECOidData *
|
|
SECOID_FindOID(SECItem *oid)
|
|
{
|
|
DBT key;
|
|
DBT data;
|
|
SECOidData *ret;
|
|
int rv;
|
|
|
|
if ( !oidhash ) {
|
|
rv = InitOIDHash();
|
|
if ( rv != SECSuccess ) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
key.data = oid->data;
|
|
key.size = oid->len;
|
|
|
|
rv = (* oidhash->get)( oidhash, &key, &data, 0 );
|
|
if ( rv || ( data.size != sizeof(SECOidData*) ) ) {
|
|
rv = secoid_FindDynamic(&key, &data);
|
|
if (rv != SECSuccess) {
|
|
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
|
return(0);
|
|
}
|
|
}
|
|
|
|
PORT_Memcpy(&ret, data.data, data.size);
|
|
|
|
return(ret);
|
|
}
|
|
|
|
SECOidTag
|
|
SECOID_FindOIDTag(SECItem *oid)
|
|
{
|
|
SECOidData *oiddata;
|
|
|
|
oiddata = SECOID_FindOID (oid);
|
|
if (oiddata == NULL)
|
|
return SEC_OID_UNKNOWN;
|
|
|
|
return oiddata->offset;
|
|
}
|
|
|
|
SECOidData *
|
|
SECOID_FindOIDByTag(SECOidTag tagnum)
|
|
{
|
|
|
|
if (tagnum >= SEC_OID_TOTAL) {
|
|
return secoid_FindDynamicByTag(tagnum);
|
|
}
|
|
|
|
PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
|
|
return(&oids[tagnum]);
|
|
}
|
|
|
|
PRBool SECOID_KnownCertExtenOID (SECItem *extenOid)
|
|
{
|
|
SECOidData * oidData;
|
|
|
|
oidData = SECOID_FindOID (extenOid);
|
|
if (oidData == (SECOidData *)NULL)
|
|
return (PR_FALSE);
|
|
return ((oidData->supportedExtension == SUPPORTED_CERT_EXTENSION) ?
|
|
PR_TRUE : PR_FALSE);
|
|
}
|
|
|
|
|
|
const char *
|
|
SECOID_FindOIDTagDescription(SECOidTag tagnum)
|
|
{
|
|
SECOidData *oidData = SECOID_FindOIDByTag(tagnum);
|
|
if (!oidData)
|
|
return 0;
|
|
else
|
|
return oidData->desc;
|
|
}
|