michael@0: /* This Source Code Form is subject to the terms of the Mozilla Public michael@0: * License, v. 2.0. If a copy of the MPL was not distributed with this michael@0: * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ michael@0: michael@0: #ifndef _SECOIDT_H_ michael@0: #define _SECOIDT_H_ michael@0: michael@0: #include "utilrename.h" michael@0: michael@0: /* michael@0: * secoidt.h - public data structures for ASN.1 OID functions michael@0: */ michael@0: michael@0: #include "secitem.h" michael@0: michael@0: typedef struct SECOidDataStr SECOidData; michael@0: typedef struct SECAlgorithmIDStr SECAlgorithmID; michael@0: michael@0: /* michael@0: ** An X.500 algorithm identifier michael@0: */ michael@0: struct SECAlgorithmIDStr { michael@0: SECItem algorithm; michael@0: SECItem parameters; michael@0: }; michael@0: michael@0: /* michael@0: * Misc object IDs - these numbers are for convenient handling. michael@0: * They are mapped into real object IDs michael@0: * michael@0: * NOTE: the order of these entries must mach the array "oids" of SECOidData michael@0: * in util/secoid.c. michael@0: */ michael@0: typedef enum { michael@0: SEC_OID_UNKNOWN = 0, michael@0: SEC_OID_MD2 = 1, michael@0: SEC_OID_MD4 = 2, michael@0: SEC_OID_MD5 = 3, michael@0: SEC_OID_SHA1 = 4, michael@0: SEC_OID_RC2_CBC = 5, michael@0: SEC_OID_RC4 = 6, michael@0: SEC_OID_DES_EDE3_CBC = 7, michael@0: SEC_OID_RC5_CBC_PAD = 8, michael@0: SEC_OID_DES_ECB = 9, michael@0: SEC_OID_DES_CBC = 10, michael@0: SEC_OID_DES_OFB = 11, michael@0: SEC_OID_DES_CFB = 12, michael@0: SEC_OID_DES_MAC = 13, michael@0: SEC_OID_DES_EDE = 14, michael@0: SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE = 15, michael@0: SEC_OID_PKCS1_RSA_ENCRYPTION = 16, michael@0: SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION = 17, michael@0: SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION = 18, michael@0: SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION = 19, michael@0: SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION = 20, michael@0: SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC = 21, michael@0: SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC = 22, michael@0: SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC = 23, michael@0: SEC_OID_PKCS7 = 24, michael@0: SEC_OID_PKCS7_DATA = 25, michael@0: SEC_OID_PKCS7_SIGNED_DATA = 26, michael@0: SEC_OID_PKCS7_ENVELOPED_DATA = 27, michael@0: SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA = 28, michael@0: SEC_OID_PKCS7_DIGESTED_DATA = 29, michael@0: SEC_OID_PKCS7_ENCRYPTED_DATA = 30, michael@0: SEC_OID_PKCS9_EMAIL_ADDRESS = 31, michael@0: SEC_OID_PKCS9_UNSTRUCTURED_NAME = 32, michael@0: SEC_OID_PKCS9_CONTENT_TYPE = 33, michael@0: SEC_OID_PKCS9_MESSAGE_DIGEST = 34, michael@0: SEC_OID_PKCS9_SIGNING_TIME = 35, michael@0: SEC_OID_PKCS9_COUNTER_SIGNATURE = 36, michael@0: SEC_OID_PKCS9_CHALLENGE_PASSWORD = 37, michael@0: SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS = 38, michael@0: SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES = 39, michael@0: SEC_OID_PKCS9_SMIME_CAPABILITIES = 40, michael@0: SEC_OID_AVA_COMMON_NAME = 41, michael@0: SEC_OID_AVA_COUNTRY_NAME = 42, michael@0: SEC_OID_AVA_LOCALITY = 43, michael@0: SEC_OID_AVA_STATE_OR_PROVINCE = 44, michael@0: SEC_OID_AVA_ORGANIZATION_NAME = 45, michael@0: SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME = 46, michael@0: SEC_OID_AVA_DN_QUALIFIER = 47, michael@0: SEC_OID_AVA_DC = 48, michael@0: michael@0: SEC_OID_NS_TYPE_GIF = 49, michael@0: SEC_OID_NS_TYPE_JPEG = 50, michael@0: SEC_OID_NS_TYPE_URL = 51, michael@0: SEC_OID_NS_TYPE_HTML = 52, michael@0: SEC_OID_NS_TYPE_CERT_SEQUENCE = 53, michael@0: SEC_OID_MISSI_KEA_DSS_OLD = 54, michael@0: SEC_OID_MISSI_DSS_OLD = 55, michael@0: SEC_OID_MISSI_KEA_DSS = 56, michael@0: SEC_OID_MISSI_DSS = 57, michael@0: SEC_OID_MISSI_KEA = 58, michael@0: SEC_OID_MISSI_ALT_KEA = 59, michael@0: michael@0: /* Netscape private certificate extensions */ michael@0: SEC_OID_NS_CERT_EXT_NETSCAPE_OK = 60, michael@0: SEC_OID_NS_CERT_EXT_ISSUER_LOGO = 61, michael@0: SEC_OID_NS_CERT_EXT_SUBJECT_LOGO = 62, michael@0: SEC_OID_NS_CERT_EXT_CERT_TYPE = 63, michael@0: SEC_OID_NS_CERT_EXT_BASE_URL = 64, michael@0: SEC_OID_NS_CERT_EXT_REVOCATION_URL = 65, michael@0: SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL = 66, michael@0: SEC_OID_NS_CERT_EXT_CA_CRL_URL = 67, michael@0: SEC_OID_NS_CERT_EXT_CA_CERT_URL = 68, michael@0: SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL = 69, michael@0: SEC_OID_NS_CERT_EXT_CA_POLICY_URL = 70, michael@0: SEC_OID_NS_CERT_EXT_HOMEPAGE_URL = 71, michael@0: SEC_OID_NS_CERT_EXT_ENTITY_LOGO = 72, michael@0: SEC_OID_NS_CERT_EXT_USER_PICTURE = 73, michael@0: SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME = 74, michael@0: SEC_OID_NS_CERT_EXT_COMMENT = 75, michael@0: SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL = 76, michael@0: SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME = 77, michael@0: SEC_OID_NS_KEY_USAGE_GOVT_APPROVED = 78, michael@0: michael@0: /* x.509 v3 Extensions */ michael@0: SEC_OID_X509_SUBJECT_DIRECTORY_ATTR = 79, michael@0: SEC_OID_X509_SUBJECT_KEY_ID = 80, michael@0: SEC_OID_X509_KEY_USAGE = 81, michael@0: SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD = 82, michael@0: SEC_OID_X509_SUBJECT_ALT_NAME = 83, michael@0: SEC_OID_X509_ISSUER_ALT_NAME = 84, michael@0: SEC_OID_X509_BASIC_CONSTRAINTS = 85, michael@0: SEC_OID_X509_NAME_CONSTRAINTS = 86, michael@0: SEC_OID_X509_CRL_DIST_POINTS = 87, michael@0: SEC_OID_X509_CERTIFICATE_POLICIES = 88, michael@0: SEC_OID_X509_POLICY_MAPPINGS = 89, michael@0: SEC_OID_X509_POLICY_CONSTRAINTS = 90, michael@0: SEC_OID_X509_AUTH_KEY_ID = 91, michael@0: SEC_OID_X509_EXT_KEY_USAGE = 92, michael@0: SEC_OID_X509_AUTH_INFO_ACCESS = 93, michael@0: michael@0: SEC_OID_X509_CRL_NUMBER = 94, michael@0: SEC_OID_X509_REASON_CODE = 95, michael@0: SEC_OID_X509_INVALID_DATE = 96, michael@0: /* End of x.509 v3 Extensions */ michael@0: michael@0: SEC_OID_X500_RSA_ENCRYPTION = 97, michael@0: michael@0: /* alg 1485 additions */ michael@0: SEC_OID_RFC1274_UID = 98, michael@0: SEC_OID_RFC1274_MAIL = 99, michael@0: michael@0: /* PKCS 12 additions */ michael@0: SEC_OID_PKCS12 = 100, michael@0: SEC_OID_PKCS12_MODE_IDS = 101, michael@0: SEC_OID_PKCS12_ESPVK_IDS = 102, michael@0: SEC_OID_PKCS12_BAG_IDS = 103, michael@0: SEC_OID_PKCS12_CERT_BAG_IDS = 104, michael@0: SEC_OID_PKCS12_OIDS = 105, michael@0: SEC_OID_PKCS12_PBE_IDS = 106, michael@0: SEC_OID_PKCS12_SIGNATURE_IDS = 107, michael@0: SEC_OID_PKCS12_ENVELOPING_IDS = 108, michael@0: /* SEC_OID_PKCS12_OFFLINE_TRANSPORT_MODE, michael@0: SEC_OID_PKCS12_ONLINE_TRANSPORT_MODE, */ michael@0: SEC_OID_PKCS12_PKCS8_KEY_SHROUDING = 109, michael@0: SEC_OID_PKCS12_KEY_BAG_ID = 110, michael@0: SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID = 111, michael@0: SEC_OID_PKCS12_SECRET_BAG_ID = 112, michael@0: SEC_OID_PKCS12_X509_CERT_CRL_BAG = 113, michael@0: SEC_OID_PKCS12_SDSI_CERT_BAG = 114, michael@0: SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 = 115, michael@0: SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 = 116, michael@0: SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC = 117, michael@0: SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC = 118, michael@0: SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC = 119, michael@0: SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 = 120, michael@0: SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 = 121, michael@0: SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES = 122, michael@0: SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST = 123, michael@0: /* end of PKCS 12 additions */ michael@0: michael@0: /* DSA signatures */ michael@0: SEC_OID_ANSIX9_DSA_SIGNATURE = 124, michael@0: SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST = 125, michael@0: SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST = 126, michael@0: michael@0: /* Verisign OIDs */ michael@0: SEC_OID_VERISIGN_USER_NOTICES = 127, michael@0: michael@0: /* PKIX OIDs */ michael@0: SEC_OID_PKIX_CPS_POINTER_QUALIFIER = 128, michael@0: SEC_OID_PKIX_USER_NOTICE_QUALIFIER = 129, michael@0: SEC_OID_PKIX_OCSP = 130, michael@0: SEC_OID_PKIX_OCSP_BASIC_RESPONSE = 131, michael@0: SEC_OID_PKIX_OCSP_NONCE = 132, michael@0: SEC_OID_PKIX_OCSP_CRL = 133, michael@0: SEC_OID_PKIX_OCSP_RESPONSE = 134, michael@0: SEC_OID_PKIX_OCSP_NO_CHECK = 135, michael@0: SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF = 136, michael@0: SEC_OID_PKIX_OCSP_SERVICE_LOCATOR = 137, michael@0: SEC_OID_PKIX_REGCTRL_REGTOKEN = 138, michael@0: SEC_OID_PKIX_REGCTRL_AUTHENTICATOR = 139, michael@0: SEC_OID_PKIX_REGCTRL_PKIPUBINFO = 140, michael@0: SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS = 141, michael@0: SEC_OID_PKIX_REGCTRL_OLD_CERT_ID = 142, michael@0: SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY = 143, michael@0: SEC_OID_PKIX_REGINFO_UTF8_PAIRS = 144, michael@0: SEC_OID_PKIX_REGINFO_CERT_REQUEST = 145, michael@0: SEC_OID_EXT_KEY_USAGE_SERVER_AUTH = 146, michael@0: SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH = 147, michael@0: SEC_OID_EXT_KEY_USAGE_CODE_SIGN = 148, michael@0: SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT = 149, michael@0: SEC_OID_EXT_KEY_USAGE_TIME_STAMP = 150, michael@0: SEC_OID_OCSP_RESPONDER = 151, michael@0: michael@0: /* Netscape Algorithm OIDs */ michael@0: SEC_OID_NETSCAPE_SMIME_KEA = 152, michael@0: michael@0: /* Skipjack OID -- ### mwelch temporary */ michael@0: SEC_OID_FORTEZZA_SKIPJACK = 153, michael@0: michael@0: /* PKCS 12 V2 oids */ michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 = 154, michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 = 155, michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC = 156, michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC = 157, michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC = 158, michael@0: SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC = 159, michael@0: SEC_OID_PKCS12_SAFE_CONTENTS_ID = 160, michael@0: SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID = 161, michael@0: michael@0: SEC_OID_PKCS12_V1_KEY_BAG_ID = 162, michael@0: SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID = 163, michael@0: SEC_OID_PKCS12_V1_CERT_BAG_ID = 164, michael@0: SEC_OID_PKCS12_V1_CRL_BAG_ID = 165, michael@0: SEC_OID_PKCS12_V1_SECRET_BAG_ID = 166, michael@0: SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID = 167, michael@0: SEC_OID_PKCS9_X509_CERT = 168, michael@0: SEC_OID_PKCS9_SDSI_CERT = 169, michael@0: SEC_OID_PKCS9_X509_CRL = 170, michael@0: SEC_OID_PKCS9_FRIENDLY_NAME = 171, michael@0: SEC_OID_PKCS9_LOCAL_KEY_ID = 172, michael@0: SEC_OID_BOGUS_KEY_USAGE = 173, michael@0: michael@0: /*Diffe Helman OIDS */ michael@0: SEC_OID_X942_DIFFIE_HELMAN_KEY = 174, michael@0: michael@0: /* Netscape other name types */ michael@0: /* SEC_OID_NETSCAPE_NICKNAME is an otherName field of type IA5String michael@0: * in the subjectAltName certificate extension. NSS dropped support michael@0: * for SEC_OID_NETSCAPE_NICKNAME in NSS 3.13. */ michael@0: SEC_OID_NETSCAPE_NICKNAME = 175, michael@0: michael@0: /* Cert Server OIDS */ michael@0: SEC_OID_NETSCAPE_RECOVERY_REQUEST = 176, michael@0: michael@0: /* New PSM certificate management OIDs */ michael@0: SEC_OID_CERT_RENEWAL_LOCATOR = 177, michael@0: SEC_OID_NS_CERT_EXT_SCOPE_OF_USE = 178, michael@0: michael@0: /* CMS (RFC2630) OIDs */ michael@0: SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN = 179, michael@0: SEC_OID_CMS_3DES_KEY_WRAP = 180, michael@0: SEC_OID_CMS_RC2_KEY_WRAP = 181, michael@0: michael@0: /* SMIME attributes */ michael@0: SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE = 182, michael@0: michael@0: /* AES OIDs */ michael@0: SEC_OID_AES_128_ECB = 183, michael@0: SEC_OID_AES_128_CBC = 184, michael@0: SEC_OID_AES_192_ECB = 185, michael@0: SEC_OID_AES_192_CBC = 186, michael@0: SEC_OID_AES_256_ECB = 187, michael@0: SEC_OID_AES_256_CBC = 188, michael@0: michael@0: SEC_OID_SDN702_DSA_SIGNATURE = 189, michael@0: michael@0: SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE = 190, michael@0: michael@0: SEC_OID_SHA256 = 191, michael@0: SEC_OID_SHA384 = 192, michael@0: SEC_OID_SHA512 = 193, michael@0: michael@0: SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION = 194, michael@0: SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION = 195, michael@0: SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION = 196, michael@0: michael@0: SEC_OID_AES_128_KEY_WRAP = 197, michael@0: SEC_OID_AES_192_KEY_WRAP = 198, michael@0: SEC_OID_AES_256_KEY_WRAP = 199, michael@0: michael@0: /* Elliptic Curve Cryptography (ECC) OIDs */ michael@0: SEC_OID_ANSIX962_EC_PUBLIC_KEY = 200, michael@0: SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE = 201, michael@0: michael@0: #define SEC_OID_ANSIX962_ECDSA_SIGNATURE_WITH_SHA1_DIGEST \ michael@0: SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE michael@0: michael@0: /* ANSI X9.62 named elliptic curves (prime field) */ michael@0: SEC_OID_ANSIX962_EC_PRIME192V1 = 202, michael@0: SEC_OID_ANSIX962_EC_PRIME192V2 = 203, michael@0: SEC_OID_ANSIX962_EC_PRIME192V3 = 204, michael@0: SEC_OID_ANSIX962_EC_PRIME239V1 = 205, michael@0: SEC_OID_ANSIX962_EC_PRIME239V2 = 206, michael@0: SEC_OID_ANSIX962_EC_PRIME239V3 = 207, michael@0: SEC_OID_ANSIX962_EC_PRIME256V1 = 208, michael@0: michael@0: /* SECG named elliptic curves (prime field) */ michael@0: SEC_OID_SECG_EC_SECP112R1 = 209, michael@0: SEC_OID_SECG_EC_SECP112R2 = 210, michael@0: SEC_OID_SECG_EC_SECP128R1 = 211, michael@0: SEC_OID_SECG_EC_SECP128R2 = 212, michael@0: SEC_OID_SECG_EC_SECP160K1 = 213, michael@0: SEC_OID_SECG_EC_SECP160R1 = 214, michael@0: SEC_OID_SECG_EC_SECP160R2 = 215, michael@0: SEC_OID_SECG_EC_SECP192K1 = 216, michael@0: /* SEC_OID_SECG_EC_SECP192R1 is SEC_OID_ANSIX962_EC_PRIME192V1 */ michael@0: SEC_OID_SECG_EC_SECP224K1 = 217, michael@0: SEC_OID_SECG_EC_SECP224R1 = 218, michael@0: SEC_OID_SECG_EC_SECP256K1 = 219, michael@0: /* SEC_OID_SECG_EC_SECP256R1 is SEC_OID_ANSIX962_EC_PRIME256V1 */ michael@0: SEC_OID_SECG_EC_SECP384R1 = 220, michael@0: SEC_OID_SECG_EC_SECP521R1 = 221, michael@0: michael@0: /* ANSI X9.62 named elliptic curves (characteristic two field) */ michael@0: SEC_OID_ANSIX962_EC_C2PNB163V1 = 222, michael@0: SEC_OID_ANSIX962_EC_C2PNB163V2 = 223, michael@0: SEC_OID_ANSIX962_EC_C2PNB163V3 = 224, michael@0: SEC_OID_ANSIX962_EC_C2PNB176V1 = 225, michael@0: SEC_OID_ANSIX962_EC_C2TNB191V1 = 226, michael@0: SEC_OID_ANSIX962_EC_C2TNB191V2 = 227, michael@0: SEC_OID_ANSIX962_EC_C2TNB191V3 = 228, michael@0: SEC_OID_ANSIX962_EC_C2ONB191V4 = 229, michael@0: SEC_OID_ANSIX962_EC_C2ONB191V5 = 230, michael@0: SEC_OID_ANSIX962_EC_C2PNB208W1 = 231, michael@0: SEC_OID_ANSIX962_EC_C2TNB239V1 = 232, michael@0: SEC_OID_ANSIX962_EC_C2TNB239V2 = 233, michael@0: SEC_OID_ANSIX962_EC_C2TNB239V3 = 234, michael@0: SEC_OID_ANSIX962_EC_C2ONB239V4 = 235, michael@0: SEC_OID_ANSIX962_EC_C2ONB239V5 = 236, michael@0: SEC_OID_ANSIX962_EC_C2PNB272W1 = 237, michael@0: SEC_OID_ANSIX962_EC_C2PNB304W1 = 238, michael@0: SEC_OID_ANSIX962_EC_C2TNB359V1 = 239, michael@0: SEC_OID_ANSIX962_EC_C2PNB368W1 = 240, michael@0: SEC_OID_ANSIX962_EC_C2TNB431R1 = 241, michael@0: michael@0: /* SECG named elliptic curves (characteristic two field) */ michael@0: SEC_OID_SECG_EC_SECT113R1 = 242, michael@0: SEC_OID_SECG_EC_SECT113R2 = 243, michael@0: SEC_OID_SECG_EC_SECT131R1 = 244, michael@0: SEC_OID_SECG_EC_SECT131R2 = 245, michael@0: SEC_OID_SECG_EC_SECT163K1 = 246, michael@0: SEC_OID_SECG_EC_SECT163R1 = 247, michael@0: SEC_OID_SECG_EC_SECT163R2 = 248, michael@0: SEC_OID_SECG_EC_SECT193R1 = 249, michael@0: SEC_OID_SECG_EC_SECT193R2 = 250, michael@0: SEC_OID_SECG_EC_SECT233K1 = 251, michael@0: SEC_OID_SECG_EC_SECT233R1 = 252, michael@0: SEC_OID_SECG_EC_SECT239K1 = 253, michael@0: SEC_OID_SECG_EC_SECT283K1 = 254, michael@0: SEC_OID_SECG_EC_SECT283R1 = 255, michael@0: SEC_OID_SECG_EC_SECT409K1 = 256, michael@0: SEC_OID_SECG_EC_SECT409R1 = 257, michael@0: SEC_OID_SECG_EC_SECT571K1 = 258, michael@0: SEC_OID_SECG_EC_SECT571R1 = 259, michael@0: michael@0: SEC_OID_NETSCAPE_AOLSCREENNAME = 260, michael@0: michael@0: SEC_OID_AVA_SURNAME = 261, michael@0: SEC_OID_AVA_SERIAL_NUMBER = 262, michael@0: SEC_OID_AVA_STREET_ADDRESS = 263, michael@0: SEC_OID_AVA_TITLE = 264, michael@0: SEC_OID_AVA_POSTAL_ADDRESS = 265, michael@0: SEC_OID_AVA_POSTAL_CODE = 266, michael@0: SEC_OID_AVA_POST_OFFICE_BOX = 267, michael@0: SEC_OID_AVA_GIVEN_NAME = 268, michael@0: SEC_OID_AVA_INITIALS = 269, michael@0: SEC_OID_AVA_GENERATION_QUALIFIER = 270, michael@0: SEC_OID_AVA_HOUSE_IDENTIFIER = 271, michael@0: SEC_OID_AVA_PSEUDONYM = 272, michael@0: michael@0: /* More OIDs */ michael@0: SEC_OID_PKIX_CA_ISSUERS = 273, michael@0: SEC_OID_PKCS9_EXTENSION_REQUEST = 274, michael@0: michael@0: /* new EC Signature oids */ michael@0: SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST = 275, michael@0: SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST = 276, michael@0: SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE = 277, michael@0: SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE = 278, michael@0: SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE = 279, michael@0: SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE = 280, michael@0: michael@0: /* More id-ce and id-pe OIDs from RFC 3280 */ michael@0: SEC_OID_X509_HOLD_INSTRUCTION_CODE = 281, michael@0: SEC_OID_X509_DELTA_CRL_INDICATOR = 282, michael@0: SEC_OID_X509_ISSUING_DISTRIBUTION_POINT = 283, michael@0: SEC_OID_X509_CERT_ISSUER = 284, michael@0: SEC_OID_X509_FRESHEST_CRL = 285, michael@0: SEC_OID_X509_INHIBIT_ANY_POLICY = 286, michael@0: SEC_OID_X509_SUBJECT_INFO_ACCESS = 287, michael@0: michael@0: /* Camellia OIDs (RFC3657)*/ michael@0: SEC_OID_CAMELLIA_128_CBC = 288, michael@0: SEC_OID_CAMELLIA_192_CBC = 289, michael@0: SEC_OID_CAMELLIA_256_CBC = 290, michael@0: michael@0: /* PKCS 5 V2 OIDS */ michael@0: SEC_OID_PKCS5_PBKDF2 = 291, michael@0: SEC_OID_PKCS5_PBES2 = 292, michael@0: SEC_OID_PKCS5_PBMAC1 = 293, michael@0: SEC_OID_HMAC_SHA1 = 294, michael@0: SEC_OID_HMAC_SHA224 = 295, michael@0: SEC_OID_HMAC_SHA256 = 296, michael@0: SEC_OID_HMAC_SHA384 = 297, michael@0: SEC_OID_HMAC_SHA512 = 298, michael@0: michael@0: SEC_OID_PKIX_TIMESTAMPING = 299, michael@0: SEC_OID_PKIX_CA_REPOSITORY = 300, michael@0: michael@0: SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE = 301, michael@0: michael@0: SEC_OID_SEED_CBC = 302, michael@0: michael@0: SEC_OID_X509_ANY_POLICY = 303, michael@0: michael@0: SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION = 304, michael@0: SEC_OID_PKCS1_MGF1 = 305, michael@0: SEC_OID_PKCS1_PSPECIFIED = 306, michael@0: SEC_OID_PKCS1_RSA_PSS_SIGNATURE = 307, michael@0: SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION = 308, michael@0: michael@0: SEC_OID_SHA224 = 309, michael@0: michael@0: SEC_OID_EV_INCORPORATION_LOCALITY = 310, michael@0: SEC_OID_EV_INCORPORATION_STATE = 311, michael@0: SEC_OID_EV_INCORPORATION_COUNTRY = 312, michael@0: SEC_OID_BUSINESS_CATEGORY = 313, michael@0: michael@0: SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST = 314, michael@0: SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST = 315, michael@0: michael@0: /* Microsoft Trust List Signing michael@0: * szOID_KP_CTL_USAGE_SIGNING michael@0: * where KP stands for Key Purpose michael@0: */ michael@0: SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING = 316, michael@0: michael@0: /* The 'name' attribute type in X.520 */ michael@0: SEC_OID_AVA_NAME = 317, michael@0: michael@0: SEC_OID_TOTAL michael@0: } SECOidTag; michael@0: michael@0: #define SEC_OID_SECG_EC_SECP192R1 SEC_OID_ANSIX962_EC_PRIME192V1 michael@0: #define SEC_OID_SECG_EC_SECP256R1 SEC_OID_ANSIX962_EC_PRIME256V1 michael@0: #define SEC_OID_PKCS12_KEY_USAGE SEC_OID_X509_KEY_USAGE michael@0: michael@0: /* fake OID for DSS sign/verify */ michael@0: #define SEC_OID_SHA SEC_OID_MISS_DSS michael@0: michael@0: typedef enum { michael@0: INVALID_CERT_EXTENSION = 0, michael@0: UNSUPPORTED_CERT_EXTENSION = 1, michael@0: SUPPORTED_CERT_EXTENSION = 2 michael@0: } SECSupportExtenTag; michael@0: michael@0: struct SECOidDataStr { michael@0: SECItem oid; michael@0: SECOidTag offset; michael@0: const char * desc; michael@0: unsigned long mechanism; michael@0: SECSupportExtenTag supportedExtension; michael@0: /* only used for x.509 v3 extensions, so michael@0: that we can print the names of those michael@0: extensions that we don't even support */ michael@0: }; michael@0: michael@0: /* New Opaque extended OID table API. michael@0: * These are algorithm policy Flags, used with functions michael@0: * NSS_SetAlgorithmPolicy & NSS_GetAlgorithmPolicy. michael@0: */ michael@0: #define NSS_USE_ALG_IN_CERT_SIGNATURE 0x00000001 /* CRLs and OCSP, too */ michael@0: #define NSS_USE_ALG_IN_CMS_SIGNATURE 0x00000002 /* used in S/MIME */ michael@0: #define NSS_USE_ALG_RESERVED 0xfffffffc /* may be used in future */ michael@0: michael@0: /* Code MUST NOT SET or CLEAR reserved bits, and must NOT depend on them michael@0: * being all zeros or having any other known value. The reserved bits michael@0: * must be ignored. michael@0: */ michael@0: michael@0: michael@0: #endif /* _SECOIDT_H_ */