File: | s/lib/util/secoid.c |
Warning: | line 2075, column 34 Although the value stored to 'tableEntries' is used in the enclosing expression, the value is never actually read from 'tableEntries' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 | |
5 | #include "secoid.h" |
6 | #include "pkcs11t.h" |
7 | #include "secitem.h" |
8 | #include "secerr.h" |
9 | #include "prenv.h" |
10 | #include "plhash.h" |
11 | #include "nssrwlk.h" |
12 | #include "nssutil.h" |
13 | #include "secoidt.h" |
14 | |
15 | /* Library identity and versioning */ |
16 | |
17 | #if defined(DEBUG1) |
18 | #define _DEBUG_STRING" (debug)" " (debug)" |
19 | #else |
20 | #define _DEBUG_STRING" (debug)" "" |
21 | #endif |
22 | |
23 | /* |
24 | * Version information |
25 | */ |
26 | const char __nss_util_version[] = "Version: NSS " NSSUTIL_VERSION"3.101 Beta" _DEBUG_STRING" (debug)"; |
27 | |
28 | /* MISSI Mosaic Object ID space */ |
29 | /* USGov algorithm OID space: { 2 16 840 1 101 } */ |
30 | #define USGOV0x60, 0x86, 0x48, 0x01, 0x65 0x60, 0x86, 0x48, 0x01, 0x65 |
31 | #define MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01 USGOV0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01 |
32 | #define MISSI_OLD_KEA_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0c MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0c |
33 | #define MISSI_OLD_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x02 MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x02 |
34 | #define MISSI_KEA_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x14 MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x14 |
35 | #define MISSI_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x13 MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x13 |
36 | #define MISSI_KEA0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0a MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0a |
37 | #define MISSI_ALT_KEA0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x16 MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x16 |
38 | |
39 | #define NISTALGS0x60, 0x86, 0x48, 0x01, 0x65, 3, 4 USGOV0x60, 0x86, 0x48, 0x01, 0x65, 3, 4 |
40 | #define AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1 NISTALGS0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1 |
41 | #define SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2 NISTALGS0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2 |
42 | #define DSA20x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 3 NISTALGS0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 3 |
43 | |
44 | /** |
45 | ** The Netscape OID space is allocated by Terry Hayes. If you need |
46 | ** a piece of the space, contact him at thayes@netscape.com. |
47 | **/ |
48 | |
49 | /* Netscape Communications Corporation Object ID space */ |
50 | /* { 2 16 840 1 113730 } */ |
51 | #define NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42 0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42 |
52 | #define NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01 |
53 | #define NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02 |
54 | /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ |
55 | #define NETSCAPE_DIRECTORY0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x03 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x03 |
56 | #define NETSCAPE_POLICY0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x04 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x04 |
57 | #define NETSCAPE_CERT_SERVER0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x05 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x05 |
58 | #define NETSCAPE_ALGS0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x06 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x06 /* algorithm OIDs */ |
59 | #define NETSCAPE_NAME_COMPONENTS0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x07 NETSCAPE_OID0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x07 |
60 | |
61 | #define NETSCAPE_CERT_EXT_AIA0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x10 NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x10 |
62 | #define NETSCAPE_CERT_SERVER_CRMF0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x05, 0x01 NETSCAPE_CERT_SERVER0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x05, 0x01 |
63 | |
64 | /* these are old and should go away soon */ |
65 | #define OLD_NETSCAPE0x60, 0x86, 0x48, 0xd8, 0x6a 0x60, 0x86, 0x48, 0xd8, 0x6a |
66 | #define NS_CERT_EXT0x60, 0x86, 0x48, 0xd8, 0x6a, 0x01 OLD_NETSCAPE0x60, 0x86, 0x48, 0xd8, 0x6a, 0x01 |
67 | #define NS_FILE_TYPE0x60, 0x86, 0x48, 0xd8, 0x6a, 0x02 OLD_NETSCAPE0x60, 0x86, 0x48, 0xd8, 0x6a, 0x02 |
68 | #define NS_IMAGE_TYPE0x60, 0x86, 0x48, 0xd8, 0x6a, 0x03 OLD_NETSCAPE0x60, 0x86, 0x48, 0xd8, 0x6a, 0x03 |
69 | |
70 | /* RSA OID name space */ |
71 | #define RSADSI0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d |
72 | #define PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01 RSADSI0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01 |
73 | #define DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02 RSADSI0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02 |
74 | #define CIPHER0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03 RSADSI0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03 |
75 | #define PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01 PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01 |
76 | #define PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05 PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05 |
77 | #define PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07 PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07 |
78 | #define PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09 PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09 |
79 | #define PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c PKCS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c |
80 | |
81 | /* Other OID name spaces */ |
82 | #define ALGORITHM0x2b, 0x0e, 0x03, 0x02 0x2b, 0x0e, 0x03, 0x02 |
83 | #define X5000x55 0x55 |
84 | #define X520_ATTRIBUTE_TYPE0x55, 0x04 X5000x55, 0x04 |
85 | #define X500_ALG0x55, 0x08 X5000x55, 0x08 |
86 | #define X500_ALG_ENCRYPTION0x55, 0x08, 0x01 X500_ALG0x55, 0x08, 0x01 |
87 | |
88 | /** X.509 v3 Extension OID |
89 | ** {joint-iso-ccitt (2) ds(5) 29} |
90 | **/ |
91 | #define ID_CE_OID0x55, 0x1d X5000x55, 0x1d |
92 | |
93 | #define RFC1274_ATTR_TYPE0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1 0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1 |
94 | /* #define RFC2247_ATTR_TYPE 0x09, 0x92, 0x26, 0xf5, 0x98, 0x1e, 0x64, 0x1 this is WRONG! */ |
95 | |
96 | /* PKCS #12 name spaces */ |
97 | #define PKCS12_MODE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01 |
98 | #define PKCS12_ESPVK_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x02 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x02 |
99 | #define PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03 |
100 | #define PKCS12_CERT_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x04 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x04 |
101 | #define PKCS12_OIDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05 |
102 | #define PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01 PKCS12_OIDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01 |
103 | #define PKCS12_ENVELOPING_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02 PKCS12_OIDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02 |
104 | #define PKCS12_SIGNATURE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x03 PKCS12_OIDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x03 |
105 | #define PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01 PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01 |
106 | #define PKCS9_CERT_TYPES0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x16 PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x16 |
107 | #define PKCS9_CRL_TYPES0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x17 PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x17 |
108 | #define PKCS9_SMIME_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10 PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10 |
109 | #define PKCS9_SMIME_ATTRS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 2 PKCS9_SMIME_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 2 |
110 | #define PKCS9_SMIME_ALGS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 3 PKCS9_SMIME_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 3 |
111 | #define PKCS12_VERSION10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a |
112 | #define PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1 PKCS12_VERSION10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1 |
113 | |
114 | /* for DSA algorithm */ |
115 | /* { iso(1) member-body(2) us(840) x9-57(10040) x9algorithm(4) } */ |
116 | #define ANSI_X9_ALGORITHM0x2a, 0x86, 0x48, 0xce, 0x38, 0x4 0x2a, 0x86, 0x48, 0xce, 0x38, 0x4 |
117 | |
118 | /* for DH algorithm */ |
119 | /* { iso(1) member-body(2) us(840) x9-57(10046) number-type(2) } */ |
120 | /* need real OID person to look at this, copied the above line |
121 | * and added 6 to second to last value (and changed '4' to '2' */ |
122 | #define ANSI_X942_ALGORITHM0x2a, 0x86, 0x48, 0xce, 0x3e, 0x2 0x2a, 0x86, 0x48, 0xce, 0x3e, 0x2 |
123 | |
124 | #define VERISIGN0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x45 0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x45 |
125 | |
126 | #define INTERNET_SECURITY_MECH0x2b, 0x06, 0x01, 0x05, 0x05 0x2b, 0x06, 0x01, 0x05, 0x05 |
127 | |
128 | #define PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07 INTERNET_SECURITY_MECH0x2b, 0x06, 0x01, 0x05, 0x05, 0x07 |
129 | #define PKIX_CERT_EXTENSIONS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 1 PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 1 |
130 | #define PKIX_POLICY_QUALIFIERS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 2 PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 2 |
131 | #define PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3 PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3 |
132 | #define PKIX_ACCESS_DESCRIPTION0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30 PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30 |
133 | #define PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1 PKIX_ACCESS_DESCRIPTION0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1 |
134 | #define PKIX_CA_ISSUERS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 2 PKIX_ACCESS_DESCRIPTION0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 2 |
135 | |
136 | #define PKIX_ID_PKIP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5 PKIX0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5 |
137 | #define PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1 PKIX_ID_PKIP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1 |
138 | #define PKIX_ID_REGINFO0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 2 PKIX_ID_PKIP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 2 |
139 | |
140 | /* Microsoft Object ID space */ |
141 | /* { 1.3.6.1.4.1.311 } */ |
142 | #define MICROSOFT_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37 0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37 |
143 | #define EV_NAME_ATTRIBUTE0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 60, 2, 1 MICROSOFT_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 60, 2, 1 |
144 | |
145 | /* Microsoft Crypto 2.0 ID space */ |
146 | /* { 1.3.6.1.4.1.311.10 } */ |
147 | #define MS_CRYPTO_200x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 10 MICROSOFT_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 10 |
148 | /* Microsoft Crypto 2.0 Extended Key Usage ID space */ |
149 | /* { 1.3.6.1.4.1.311.10.3 } */ |
150 | #define MS_CRYPTO_EKU0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 10, 3 MS_CRYPTO_200x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 10, 3 |
151 | |
152 | #define CERTICOM_OID0x2b, 0x81, 0x04 0x2b, 0x81, 0x04 |
153 | #define SECG_OID0x2b, 0x81, 0x04, 0x00 CERTICOM_OID0x2b, 0x81, 0x04, 0x00 |
154 | |
155 | #define ANSI_X962_OID0x2a, 0x86, 0x48, 0xce, 0x3d 0x2a, 0x86, 0x48, 0xce, 0x3d |
156 | #define ANSI_X962_CURVE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03 ANSI_X962_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03 |
157 | #define ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00 ANSI_X962_CURVE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00 |
158 | #define ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01 ANSI_X962_CURVE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01 |
159 | #define ANSI_X962_SIGNATURE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04 ANSI_X962_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04 |
160 | #define ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03 ANSI_X962_SIGNATURE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03 |
161 | |
162 | #define X9_63_SCHEME0x2B, 0x81, 0x05, 0x10, 0x86, 0x48, 0x3F, 0x00 0x2B, 0x81, 0x05, 0x10, 0x86, 0x48, 0x3F, 0x00 |
163 | #define SECG_SCHEME0x2b, 0x81, 0x04, 0x01 CERTICOM_OID0x2b, 0x81, 0x04, 0x01 |
164 | |
165 | /* for Camellia: iso(1) member-body(2) jisc(392) |
166 | * mitsubishi(200011) isl(61) security(1) algorithm(1) |
167 | */ |
168 | #define MITSUBISHI_ALG0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01 0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01 |
169 | #define CAMELLIA_ENCRYPT_OID0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 1 MITSUBISHI_ALG0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 1 |
170 | #define CAMELLIA_WRAP_OID0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 3 MITSUBISHI_ALG0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 3 |
171 | |
172 | /* For IDEA: 1.3.6.1.4.1.188.7.1.1 |
173 | */ |
174 | #define ASCOM_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0xbc 0x2b, 0x6, 0x1, 0x4, 0x1, 0xbc |
175 | #define ASCOM_IDEA_ALG0x2b, 0x6, 0x1, 0x4, 0x1, 0xbc, 0x7, 0x1, 0x1 ASCOM_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0xbc, 0x7, 0x1, 0x1 |
176 | |
177 | /* for SEED : iso(1) member-body(2) korea(410) |
178 | * kisa(200004) algorithm(1) |
179 | */ |
180 | #define SEED_OID0x2a, 0x83, 0x1a, 0x8c, 0x9a, 0x44, 0x01 0x2a, 0x83, 0x1a, 0x8c, 0x9a, 0x44, 0x01 |
181 | |
182 | #define CONST_OIDstatic const unsigned char static const unsigned char |
183 | |
184 | CONST_OIDstatic const unsigned char md2[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x02 }; |
185 | CONST_OIDstatic const unsigned char md4[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x04 }; |
186 | CONST_OIDstatic const unsigned char md5[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05 }; |
187 | CONST_OIDstatic const unsigned char hmac_sha1[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 7 }; |
188 | CONST_OIDstatic const unsigned char hmac_sha224[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 8 }; |
189 | CONST_OIDstatic const unsigned char hmac_sha256[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 9 }; |
190 | CONST_OIDstatic const unsigned char hmac_sha384[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 10 }; |
191 | CONST_OIDstatic const unsigned char hmac_sha512[] = { DIGEST0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 11 }; |
192 | |
193 | CONST_OIDstatic const unsigned char rc2cbc[] = { CIPHER0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03, 0x02 }; |
194 | CONST_OIDstatic const unsigned char rc4[] = { CIPHER0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03, 0x04 }; |
195 | CONST_OIDstatic const unsigned char desede3cbc[] = { CIPHER0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03, 0x07 }; |
196 | CONST_OIDstatic const unsigned char rc5cbcpad[] = { CIPHER0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x03, 0x09 }; |
197 | |
198 | CONST_OIDstatic const unsigned char desecb[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x06 }; |
199 | CONST_OIDstatic const unsigned char descbc[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x07 }; |
200 | CONST_OIDstatic const unsigned char desofb[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x08 }; |
201 | CONST_OIDstatic const unsigned char descfb[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x09 }; |
202 | CONST_OIDstatic const unsigned char desmac[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x0a }; |
203 | CONST_OIDstatic const unsigned char sdn702DSASignature[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x0c }; |
204 | CONST_OIDstatic const unsigned char isoSHAWithRSASignature[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x0f }; |
205 | CONST_OIDstatic const unsigned char desede[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x11 }; |
206 | CONST_OIDstatic const unsigned char sha1[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x1a }; |
207 | CONST_OIDstatic const unsigned char bogusDSASignaturewithSHA1Digest[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x1b }; |
208 | CONST_OIDstatic const unsigned char isoSHA1WithRSASignature[] = { ALGORITHM0x2b, 0x0e, 0x03, 0x02, 0x1d }; |
209 | |
210 | CONST_OIDstatic const unsigned char pkcs1RSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01 }; |
211 | CONST_OIDstatic const unsigned char pkcs1MD2WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x02 }; |
212 | CONST_OIDstatic const unsigned char pkcs1MD4WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x03 }; |
213 | CONST_OIDstatic const unsigned char pkcs1MD5WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x04 }; |
214 | CONST_OIDstatic const unsigned char pkcs1SHA1WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x05 }; |
215 | CONST_OIDstatic const unsigned char pkcs1RSAOAEPEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x07 }; |
216 | CONST_OIDstatic const unsigned char pkcs1MGF1[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x08 }; |
217 | CONST_OIDstatic const unsigned char pkcs1PSpecified[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x09 }; |
218 | CONST_OIDstatic const unsigned char pkcs1RSAPSSSignature[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 10 }; |
219 | CONST_OIDstatic const unsigned char pkcs1SHA256WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 11 }; |
220 | CONST_OIDstatic const unsigned char pkcs1SHA384WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 12 }; |
221 | CONST_OIDstatic const unsigned char pkcs1SHA512WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 13 }; |
222 | CONST_OIDstatic const unsigned char pkcs1SHA224WithRSAEncryption[] = { PKCS10x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 14 }; |
223 | |
224 | CONST_OIDstatic const unsigned char pkcs5PbeWithMD2AndDEScbc[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 0x01 }; |
225 | CONST_OIDstatic const unsigned char pkcs5PbeWithMD5AndDEScbc[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 0x03 }; |
226 | CONST_OIDstatic const unsigned char pkcs5PbeWithSha1AndDEScbc[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 0x0a }; |
227 | CONST_OIDstatic const unsigned char pkcs5Pbkdf2[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 12 }; |
228 | CONST_OIDstatic const unsigned char pkcs5Pbes2[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 13 }; |
229 | CONST_OIDstatic const unsigned char pkcs5Pbmac1[] = { PKCS50x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x05, 14 }; |
230 | |
231 | CONST_OIDstatic const unsigned char pkcs7[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07 }; |
232 | CONST_OIDstatic const unsigned char pkcs7Data[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x01 }; |
233 | CONST_OIDstatic const unsigned char pkcs7SignedData[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x02 }; |
234 | CONST_OIDstatic const unsigned char pkcs7EnvelopedData[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x03 }; |
235 | CONST_OIDstatic const unsigned char pkcs7SignedEnvelopedData[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x04 }; |
236 | CONST_OIDstatic const unsigned char pkcs7DigestedData[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x05 }; |
237 | CONST_OIDstatic const unsigned char pkcs7EncryptedData[] = { PKCS70x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x06 }; |
238 | |
239 | CONST_OIDstatic const unsigned char pkcs9EmailAddress[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x01 }; |
240 | CONST_OIDstatic const unsigned char pkcs9UnstructuredName[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x02 }; |
241 | CONST_OIDstatic const unsigned char pkcs9ContentType[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x03 }; |
242 | CONST_OIDstatic const unsigned char pkcs9MessageDigest[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x04 }; |
243 | CONST_OIDstatic const unsigned char pkcs9SigningTime[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x05 }; |
244 | CONST_OIDstatic const unsigned char pkcs9CounterSignature[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x06 }; |
245 | CONST_OIDstatic const unsigned char pkcs9ChallengePassword[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x07 }; |
246 | CONST_OIDstatic const unsigned char pkcs9UnstructuredAddress[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x08 }; |
247 | CONST_OIDstatic const unsigned char pkcs9ExtendedCertificateAttributes[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x09 }; |
248 | CONST_OIDstatic const unsigned char pkcs9ExtensionRequest[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 14 }; |
249 | CONST_OIDstatic const unsigned char pkcs9SMIMECapabilities[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 15 }; |
250 | CONST_OIDstatic const unsigned char pkcs9FriendlyName[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 20 }; |
251 | CONST_OIDstatic const unsigned char pkcs9LocalKeyID[] = { PKCS90x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 21 }; |
252 | |
253 | CONST_OIDstatic const unsigned char pkcs9X509Certificate[] = { PKCS9_CERT_TYPES0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x16, 1 }; |
254 | CONST_OIDstatic const unsigned char pkcs9SDSICertificate[] = { PKCS9_CERT_TYPES0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x16, 2 }; |
255 | CONST_OIDstatic const unsigned char pkcs9X509CRL[] = { PKCS9_CRL_TYPES0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x17, 1 }; |
256 | |
257 | /* RFC2630 (CMS) OIDs */ |
258 | CONST_OIDstatic const unsigned char cmsESDH[] = { PKCS9_SMIME_ALGS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 3, 5 }; |
259 | CONST_OIDstatic const unsigned char cms3DESwrap[] = { PKCS9_SMIME_ALGS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 3, 6 }; |
260 | CONST_OIDstatic const unsigned char cmsRC2wrap[] = { PKCS9_SMIME_ALGS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 3, 7 }; |
261 | |
262 | /* RFC2633 SMIME message attributes */ |
263 | CONST_OIDstatic const unsigned char smimeEncryptionKeyPreference[] = { PKCS9_SMIME_ATTRS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 2, 11 }; |
264 | CONST_OIDstatic const unsigned char ms_smimeEncryptionKeyPreference[] = { MICROSOFT_OID0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 0x10, 0x4 }; |
265 | |
266 | CONST_OIDstatic const unsigned char x520CommonName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 3 }; |
267 | CONST_OIDstatic const unsigned char x520SurName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 4 }; |
268 | CONST_OIDstatic const unsigned char x520SerialNumber[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 5 }; |
269 | CONST_OIDstatic const unsigned char x520CountryName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 6 }; |
270 | CONST_OIDstatic const unsigned char x520LocalityName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 7 }; |
271 | CONST_OIDstatic const unsigned char x520StateOrProvinceName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 8 }; |
272 | CONST_OIDstatic const unsigned char x520StreetAddress[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 9 }; |
273 | CONST_OIDstatic const unsigned char x520OrgName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 10 }; |
274 | CONST_OIDstatic const unsigned char x520OrgUnitName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 11 }; |
275 | CONST_OIDstatic const unsigned char x520Title[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 12 }; |
276 | CONST_OIDstatic const unsigned char x520BusinessCategory[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 15 }; |
277 | CONST_OIDstatic const unsigned char x520PostalAddress[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 16 }; |
278 | CONST_OIDstatic const unsigned char x520PostalCode[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 17 }; |
279 | CONST_OIDstatic const unsigned char x520PostOfficeBox[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 18 }; |
280 | CONST_OIDstatic const unsigned char x520Name[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 41 }; |
281 | CONST_OIDstatic const unsigned char x520GivenName[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 42 }; |
282 | CONST_OIDstatic const unsigned char x520Initials[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 43 }; |
283 | CONST_OIDstatic const unsigned char x520GenerationQualifier[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 44 }; |
284 | CONST_OIDstatic const unsigned char x520DnQualifier[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 46 }; |
285 | CONST_OIDstatic const unsigned char x520HouseIdentifier[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 51 }; |
286 | CONST_OIDstatic const unsigned char x520Pseudonym[] = { X520_ATTRIBUTE_TYPE0x55, 0x04, 65 }; |
287 | |
288 | CONST_OIDstatic const unsigned char nsTypeGIF[] = { NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02, 0x01 }; |
289 | CONST_OIDstatic const unsigned char nsTypeJPEG[] = { NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02, 0x02 }; |
290 | CONST_OIDstatic const unsigned char nsTypeURL[] = { NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02, 0x03 }; |
291 | CONST_OIDstatic const unsigned char nsTypeHTML[] = { NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02, 0x04 }; |
292 | CONST_OIDstatic const unsigned char nsTypeCertSeq[] = { NETSCAPE_DATA_TYPE0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x02, 0x05 }; |
293 | |
294 | CONST_OIDstatic const unsigned char missiCertKEADSSOld[] = { MISSI_OLD_KEA_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0c }; |
295 | CONST_OIDstatic const unsigned char missiCertDSSOld[] = { MISSI_OLD_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x02 }; |
296 | CONST_OIDstatic const unsigned char missiCertKEADSS[] = { MISSI_KEA_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x14 }; |
297 | CONST_OIDstatic const unsigned char missiCertDSS[] = { MISSI_DSS0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x13 }; |
298 | CONST_OIDstatic const unsigned char missiCertKEA[] = { MISSI_KEA0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x0a }; |
299 | CONST_OIDstatic const unsigned char missiCertAltKEA[] = { MISSI_ALT_KEA0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x16 }; |
300 | CONST_OIDstatic const unsigned char x500RSAEncryption[] = { X500_ALG_ENCRYPTION0x55, 0x08, 0x01, 0x01 }; |
301 | |
302 | /* added for alg 1485 */ |
303 | CONST_OIDstatic const unsigned char rfc1274Uid[] = { RFC1274_ATTR_TYPE0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1, 1 }; |
304 | CONST_OIDstatic const unsigned char rfc1274Mail[] = { RFC1274_ATTR_TYPE0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1, 3 }; |
305 | CONST_OIDstatic const unsigned char rfc2247DomainComponent[] = { RFC1274_ATTR_TYPE0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x1, 25 }; |
306 | |
307 | /* Netscape private certificate extensions */ |
308 | CONST_OIDstatic const unsigned char nsCertExtNetscapeOK[] = { NS_CERT_EXT0x60, 0x86, 0x48, 0xd8, 0x6a, 0x01, 1 }; |
309 | CONST_OIDstatic const unsigned char nsCertExtIssuerLogo[] = { NS_CERT_EXT0x60, 0x86, 0x48, 0xd8, 0x6a, 0x01, 2 }; |
310 | CONST_OIDstatic const unsigned char nsCertExtSubjectLogo[] = { NS_CERT_EXT0x60, 0x86, 0x48, 0xd8, 0x6a, 0x01, 3 }; |
311 | CONST_OIDstatic const unsigned char nsExtCertType[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x01 }; |
312 | CONST_OIDstatic const unsigned char nsExtBaseURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x02 }; |
313 | CONST_OIDstatic const unsigned char nsExtRevocationURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x03 }; |
314 | CONST_OIDstatic const unsigned char nsExtCARevocationURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x04 }; |
315 | CONST_OIDstatic const unsigned char nsExtCACRLURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x05 }; |
316 | CONST_OIDstatic const unsigned char nsExtCACertURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x06 }; |
317 | CONST_OIDstatic const unsigned char nsExtCertRenewalURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x07 }; |
318 | CONST_OIDstatic const unsigned char nsExtCAPolicyURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x08 }; |
319 | CONST_OIDstatic const unsigned char nsExtHomepageURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x09 }; |
320 | CONST_OIDstatic const unsigned char nsExtEntityLogo[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0a }; |
321 | CONST_OIDstatic const unsigned char nsExtUserPicture[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0b }; |
322 | CONST_OIDstatic const unsigned char nsExtSSLServerName[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0c }; |
323 | CONST_OIDstatic const unsigned char nsExtComment[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0d }; |
324 | |
325 | /* the following 2 extensions are defined for and used by Cartman(NSM) */ |
326 | CONST_OIDstatic const unsigned char nsExtLostPasswordURL[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0e }; |
327 | CONST_OIDstatic const unsigned char nsExtCertRenewalTime[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x0f }; |
328 | |
329 | CONST_OIDstatic const unsigned char nsExtAIACertRenewal[] = { NETSCAPE_CERT_EXT_AIA0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x10, 0x01 }; |
330 | CONST_OIDstatic const unsigned char nsExtCertScopeOfUse[] = { NETSCAPE_CERT_EXT0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x01, 0x11 }; |
331 | /* Reserved Netscape (2 16 840 1 113730 1 18) = { NETSCAPE_CERT_EXT, 0x12 }; */ |
332 | |
333 | /* Netscape policy values */ |
334 | CONST_OIDstatic const unsigned char nsKeyUsageGovtApproved[] = { NETSCAPE_POLICY0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x04, 0x01 }; |
335 | |
336 | /* Netscape other name types */ |
337 | CONST_OIDstatic const unsigned char netscapeNickname[] = { NETSCAPE_NAME_COMPONENTS0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x07, 0x01 }; |
338 | CONST_OIDstatic const unsigned char netscapeAOLScreenname[] = { NETSCAPE_NAME_COMPONENTS0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x07, 0x02 }; |
339 | |
340 | /* OIDs needed for cert server */ |
341 | CONST_OIDstatic const unsigned char netscapeRecoveryRequest[] = { NETSCAPE_CERT_SERVER_CRMF0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x05, 0x01, 0x01 }; |
342 | |
343 | /* Standard x.509 v3 Certificate & CRL Extensions */ |
344 | CONST_OIDstatic const unsigned char x509SubjectDirectoryAttr[] = { ID_CE_OID0x55, 0x1d, 9 }; |
345 | CONST_OIDstatic const unsigned char x509SubjectKeyID[] = { ID_CE_OID0x55, 0x1d, 14 }; |
346 | CONST_OIDstatic const unsigned char x509KeyUsage[] = { ID_CE_OID0x55, 0x1d, 15 }; |
347 | CONST_OIDstatic const unsigned char x509PrivateKeyUsagePeriod[] = { ID_CE_OID0x55, 0x1d, 16 }; |
348 | CONST_OIDstatic const unsigned char x509SubjectAltName[] = { ID_CE_OID0x55, 0x1d, 17 }; |
349 | CONST_OIDstatic const unsigned char x509IssuerAltName[] = { ID_CE_OID0x55, 0x1d, 18 }; |
350 | CONST_OIDstatic const unsigned char x509BasicConstraints[] = { ID_CE_OID0x55, 0x1d, 19 }; |
351 | CONST_OIDstatic const unsigned char x509CRLNumber[] = { ID_CE_OID0x55, 0x1d, 20 }; |
352 | CONST_OIDstatic const unsigned char x509ReasonCode[] = { ID_CE_OID0x55, 0x1d, 21 }; |
353 | CONST_OIDstatic const unsigned char x509HoldInstructionCode[] = { ID_CE_OID0x55, 0x1d, 23 }; |
354 | CONST_OIDstatic const unsigned char x509InvalidDate[] = { ID_CE_OID0x55, 0x1d, 24 }; |
355 | CONST_OIDstatic const unsigned char x509DeltaCRLIndicator[] = { ID_CE_OID0x55, 0x1d, 27 }; |
356 | CONST_OIDstatic const unsigned char x509IssuingDistributionPoint[] = { ID_CE_OID0x55, 0x1d, 28 }; |
357 | CONST_OIDstatic const unsigned char x509CertIssuer[] = { ID_CE_OID0x55, 0x1d, 29 }; |
358 | CONST_OIDstatic const unsigned char x509NameConstraints[] = { ID_CE_OID0x55, 0x1d, 30 }; |
359 | CONST_OIDstatic const unsigned char x509CRLDistPoints[] = { ID_CE_OID0x55, 0x1d, 31 }; |
360 | CONST_OIDstatic const unsigned char x509CertificatePolicies[] = { ID_CE_OID0x55, 0x1d, 32 }; |
361 | CONST_OIDstatic const unsigned char x509PolicyMappings[] = { ID_CE_OID0x55, 0x1d, 33 }; |
362 | CONST_OIDstatic const unsigned char x509AuthKeyID[] = { ID_CE_OID0x55, 0x1d, 35 }; |
363 | CONST_OIDstatic const unsigned char x509PolicyConstraints[] = { ID_CE_OID0x55, 0x1d, 36 }; |
364 | CONST_OIDstatic const unsigned char x509ExtKeyUsage[] = { ID_CE_OID0x55, 0x1d, 37 }; |
365 | CONST_OIDstatic const unsigned char x509FreshestCRL[] = { ID_CE_OID0x55, 0x1d, 46 }; |
366 | CONST_OIDstatic const unsigned char x509InhibitAnyPolicy[] = { ID_CE_OID0x55, 0x1d, 54 }; |
367 | |
368 | CONST_OIDstatic const unsigned char x509CertificatePoliciesAnyPolicy[] = { ID_CE_OID0x55, 0x1d, 32, 0 }; |
369 | CONST_OIDstatic const unsigned char x509ExtKeyUsageAnyUsage[] = { ID_CE_OID0x55, 0x1d, 37, 0 }; |
370 | |
371 | CONST_OIDstatic const unsigned char x509AuthInfoAccess[] = { PKIX_CERT_EXTENSIONS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 1, 1 }; |
372 | CONST_OIDstatic const unsigned char x509SubjectInfoAccess[] = { PKIX_CERT_EXTENSIONS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 1, 11 }; |
373 | |
374 | CONST_OIDstatic const unsigned char x509SIATimeStamping[] = { PKIX_ACCESS_DESCRIPTION0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x03 }; |
375 | CONST_OIDstatic const unsigned char x509SIACaRepository[] = { PKIX_ACCESS_DESCRIPTION0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x05 }; |
376 | |
377 | /* pkcs 12 additions */ |
378 | CONST_OIDstatic const unsigned char pkcs12[] = { PKCS120x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c }; |
379 | CONST_OIDstatic const unsigned char pkcs12ModeIDs[] = { PKCS12_MODE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01 }; |
380 | CONST_OIDstatic const unsigned char pkcs12ESPVKIDs[] = { PKCS12_ESPVK_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x02 }; |
381 | CONST_OIDstatic const unsigned char pkcs12BagIDs[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03 }; |
382 | CONST_OIDstatic const unsigned char pkcs12CertBagIDs[] = { PKCS12_CERT_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x04 }; |
383 | CONST_OIDstatic const unsigned char pkcs12OIDs[] = { PKCS12_OIDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05 }; |
384 | CONST_OIDstatic const unsigned char pkcs12PBEIDs[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01 }; |
385 | CONST_OIDstatic const unsigned char pkcs12EnvelopingIDs[] = { PKCS12_ENVELOPING_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02 }; |
386 | CONST_OIDstatic const unsigned char pkcs12SignatureIDs[] = { PKCS12_SIGNATURE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x03 }; |
387 | CONST_OIDstatic const unsigned char pkcs12PKCS8KeyShrouding[] = { PKCS12_ESPVK_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x02, 0x01 }; |
388 | CONST_OIDstatic const unsigned char pkcs12KeyBagID[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03, 0x01 }; |
389 | CONST_OIDstatic const unsigned char pkcs12CertAndCRLBagID[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03, 0x02 }; |
390 | CONST_OIDstatic const unsigned char pkcs12SecretBagID[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03, 0x03 }; |
391 | CONST_OIDstatic const unsigned char pkcs12X509CertCRLBag[] = { PKCS12_CERT_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x04, 0x01 }; |
392 | CONST_OIDstatic const unsigned char pkcs12SDSICertBag[] = { PKCS12_CERT_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x04, 0x02 }; |
393 | CONST_OIDstatic const unsigned char pkcs12PBEWithSha1And128BitRC4[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01, 0x01 }; |
394 | CONST_OIDstatic const unsigned char pkcs12PBEWithSha1And40BitRC4[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01, 0x02 }; |
395 | CONST_OIDstatic const unsigned char pkcs12PBEWithSha1AndTripleDESCBC[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01, 0x03 }; |
396 | CONST_OIDstatic const unsigned char pkcs12PBEWithSha1And128BitRC2CBC[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01, 0x04 }; |
397 | CONST_OIDstatic const unsigned char pkcs12PBEWithSha1And40BitRC2CBC[] = { PKCS12_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x01, 0x05 }; |
398 | CONST_OIDstatic const unsigned char pkcs12RSAEncryptionWith128BitRC4[] = { PKCS12_ENVELOPING_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02, 0x01 }; |
399 | CONST_OIDstatic const unsigned char pkcs12RSAEncryptionWith40BitRC4[] = { PKCS12_ENVELOPING_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02, 0x02 }; |
400 | CONST_OIDstatic const unsigned char pkcs12RSAEncryptionWithTripleDES[] = { PKCS12_ENVELOPING_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x02, 0x03 }; |
401 | CONST_OIDstatic const unsigned char pkcs12RSASignatureWithSHA1Digest[] = { PKCS12_SIGNATURE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x05, 0x03, 0x01 }; |
402 | |
403 | /* pkcs 12 version 1.0 ids */ |
404 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And128BitRC4[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x01 }; |
405 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And40BitRC4[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x02 }; |
406 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And3KeyTripleDEScbc[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x03 }; |
407 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And2KeyTripleDEScbc[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x04 }; |
408 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And128BitRC2cbc[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x05 }; |
409 | CONST_OIDstatic const unsigned char pkcs12V2PBEWithSha1And40BitRC2cbc[] = { PKCS12_V2_PBE_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x06 }; |
410 | |
411 | CONST_OIDstatic const unsigned char pkcs12SafeContentsID[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03, 0x04 }; |
412 | CONST_OIDstatic const unsigned char pkcs12PKCS8ShroudedKeyBagID[] = { PKCS12_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x03, 0x05 }; |
413 | |
414 | CONST_OIDstatic const unsigned char pkcs12V1KeyBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x01 }; |
415 | CONST_OIDstatic const unsigned char pkcs12V1PKCS8ShroudedKeyBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x02 }; |
416 | CONST_OIDstatic const unsigned char pkcs12V1CertBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x03 }; |
417 | CONST_OIDstatic const unsigned char pkcs12V1CRLBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x04 }; |
418 | CONST_OIDstatic const unsigned char pkcs12V1SecretBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x05 }; |
419 | CONST_OIDstatic const unsigned char pkcs12V1SafeContentsBag[] = { PKCS12_V1_BAG_IDS0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x0a, 1, 0x06 }; |
420 | |
421 | /* The following encoding is INCORRECT, but correcting it would create a |
422 | * duplicate OID in the table. So, we will leave it alone. |
423 | */ |
424 | CONST_OIDstatic const unsigned char pkcs12KeyUsageAttr[] = { 2, 5, 29, 15 }; |
425 | |
426 | CONST_OIDstatic const unsigned char ansix9DSASignature[] = { ANSI_X9_ALGORITHM0x2a, 0x86, 0x48, 0xce, 0x38, 0x4, 0x01 }; |
427 | CONST_OIDstatic const unsigned char ansix9DSASignaturewithSHA1Digest[] = { ANSI_X9_ALGORITHM0x2a, 0x86, 0x48, 0xce, 0x38, 0x4, 0x03 }; |
428 | CONST_OIDstatic const unsigned char nistDSASignaturewithSHA224Digest[] = { DSA20x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 3, 0x01 }; |
429 | CONST_OIDstatic const unsigned char nistDSASignaturewithSHA256Digest[] = { DSA20x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 3, 0x02 }; |
430 | |
431 | /* verisign OIDs */ |
432 | CONST_OIDstatic const unsigned char verisignUserNotices[] = { VERISIGN0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x45, 1, 7, 1, 1 }; |
433 | |
434 | /* pkix OIDs */ |
435 | CONST_OIDstatic const unsigned char pkixCPSPointerQualifier[] = { PKIX_POLICY_QUALIFIERS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 2, 1 }; |
436 | CONST_OIDstatic const unsigned char pkixUserNoticeQualifier[] = { PKIX_POLICY_QUALIFIERS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 2, 2 }; |
437 | |
438 | CONST_OIDstatic const unsigned char pkixOCSP[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1 }; |
439 | CONST_OIDstatic const unsigned char pkixOCSPBasicResponse[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 1 }; |
440 | CONST_OIDstatic const unsigned char pkixOCSPNonce[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 2 }; |
441 | CONST_OIDstatic const unsigned char pkixOCSPCRL[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 3 }; |
442 | CONST_OIDstatic const unsigned char pkixOCSPResponse[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 4 }; |
443 | CONST_OIDstatic const unsigned char pkixOCSPNoCheck[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 5 }; |
444 | CONST_OIDstatic const unsigned char pkixOCSPArchiveCutoff[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 6 }; |
445 | CONST_OIDstatic const unsigned char pkixOCSPServiceLocator[] = { PKIX_OCSP0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 1, 7 }; |
446 | |
447 | CONST_OIDstatic const unsigned char pkixCAIssuers[] = { PKIX_CA_ISSUERS0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 2 }; |
448 | |
449 | CONST_OIDstatic const unsigned char pkixRegCtrlRegToken[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 1 }; |
450 | CONST_OIDstatic const unsigned char pkixRegCtrlAuthenticator[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 2 }; |
451 | CONST_OIDstatic const unsigned char pkixRegCtrlPKIPubInfo[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 3 }; |
452 | CONST_OIDstatic const unsigned char pkixRegCtrlPKIArchOptions[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 4 }; |
453 | CONST_OIDstatic const unsigned char pkixRegCtrlOldCertID[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 5 }; |
454 | CONST_OIDstatic const unsigned char pkixRegCtrlProtEncKey[] = { PKIX_ID_REGCTRL0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 1, 6 }; |
455 | CONST_OIDstatic const unsigned char pkixRegInfoUTF8Pairs[] = { PKIX_ID_REGINFO0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 2, 1 }; |
456 | CONST_OIDstatic const unsigned char pkixRegInfoCertReq[] = { PKIX_ID_REGINFO0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 5, 2, 2 }; |
457 | |
458 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageServerAuth[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 1 }; |
459 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageClientAuth[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 2 }; |
460 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageCodeSign[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 3 }; |
461 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageEMailProtect[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 4 }; |
462 | /* IPsecEnd, IPsecTunnel, and IPsecUser are deprecated, but still in use |
463 | * (see RFC4945) */ |
464 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageIPsecEnd[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 5 }; |
465 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageIPsecTunnel[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 6 }; |
466 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageIPsecUser[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 7 }; |
467 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageTimeStamp[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 8 }; |
468 | CONST_OIDstatic const unsigned char pkixOCSPResponderExtendedKeyUsage[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 9 }; |
469 | /* 17 replaces 5 + 6 + 7 (declared obsolete in RFC 4945) */ |
470 | CONST_OIDstatic const unsigned char pkixExtendedKeyUsageIPsecIKE[] = { PKIX_KEY_USAGE0x2b, 0x06, 0x01, 0x05, 0x05, 0x07, 3, 17 }; |
471 | CONST_OIDstatic const unsigned char msExtendedKeyUsageTrustListSigning[] = { MS_CRYPTO_EKU0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 10, 3, 1 }; |
472 | |
473 | CONST_OIDstatic const unsigned char ipsecIKEEnd[] = { INTERNET_SECURITY_MECH0x2b, 0x06, 0x01, 0x05, 0x05, 0x08, 0x02, 0x01 }; |
474 | CONST_OIDstatic const unsigned char ipsecIKEIntermediate[] = { INTERNET_SECURITY_MECH0x2b, 0x06, 0x01, 0x05, 0x05, 0x08, 0x02, 0x02 }; |
475 | |
476 | /* OIDs for Netscape defined algorithms */ |
477 | CONST_OIDstatic const unsigned char netscapeSMimeKEA[] = { NETSCAPE_ALGS0x60, 0x86, 0x48, 0x01, 0x86, 0xf8, 0x42, 0x06, 0x01 }; |
478 | |
479 | /* Fortezza algorithm OIDs */ |
480 | CONST_OIDstatic const unsigned char skipjackCBC[] = { MISSI0x60, 0x86, 0x48, 0x01, 0x65, 0x02, 0x01, 0x01, 0x04 }; |
481 | CONST_OIDstatic const unsigned char dhPublicKey[] = { ANSI_X942_ALGORITHM0x2a, 0x86, 0x48, 0xce, 0x3e, 0x2, 0x1 }; |
482 | |
483 | CONST_OIDstatic const unsigned char idea_CBC[] = { ASCOM_IDEA_ALG0x2b, 0x6, 0x1, 0x4, 0x1, 0xbc, 0x7, 0x1, 0x1, 2 }; |
484 | CONST_OIDstatic const unsigned char aes128_GCM[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 0x6 }; |
485 | CONST_OIDstatic const unsigned char aes192_GCM[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 0x1a }; |
486 | CONST_OIDstatic const unsigned char aes256_GCM[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 0x2e }; |
487 | CONST_OIDstatic const unsigned char aes128_ECB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 1 }; |
488 | CONST_OIDstatic const unsigned char aes128_CBC[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 2 }; |
489 | #ifdef DEFINE_ALL_AES_CIPHERS |
490 | CONST_OIDstatic const unsigned char aes128_OFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 3 }; |
491 | CONST_OIDstatic const unsigned char aes128_CFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 4 }; |
492 | #endif |
493 | CONST_OIDstatic const unsigned char aes128_KEY_WRAP[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 5 }; |
494 | |
495 | CONST_OIDstatic const unsigned char aes192_ECB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 21 }; |
496 | CONST_OIDstatic const unsigned char aes192_CBC[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 22 }; |
497 | #ifdef DEFINE_ALL_AES_CIPHERS |
498 | CONST_OIDstatic const unsigned char aes192_OFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 23 }; |
499 | CONST_OIDstatic const unsigned char aes192_CFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 24 }; |
500 | #endif |
501 | CONST_OIDstatic const unsigned char aes192_KEY_WRAP[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 25 }; |
502 | |
503 | CONST_OIDstatic const unsigned char aes256_ECB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 41 }; |
504 | CONST_OIDstatic const unsigned char aes256_CBC[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 42 }; |
505 | #ifdef DEFINE_ALL_AES_CIPHERS |
506 | CONST_OIDstatic const unsigned char aes256_OFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 43 }; |
507 | CONST_OIDstatic const unsigned char aes256_CFB[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 44 }; |
508 | #endif |
509 | CONST_OIDstatic const unsigned char aes256_KEY_WRAP[] = { AES0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 1, 45 }; |
510 | |
511 | CONST_OIDstatic const unsigned char camellia128_CBC[] = { CAMELLIA_ENCRYPT_OID0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 1, 2 }; |
512 | CONST_OIDstatic const unsigned char camellia192_CBC[] = { CAMELLIA_ENCRYPT_OID0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 1, 3 }; |
513 | CONST_OIDstatic const unsigned char camellia256_CBC[] = { CAMELLIA_ENCRYPT_OID0x2a, 0x83, 0x08, 0x8c, 0x9a, 0x4b, 0x3d, 0x01, 0x01, 1, 4 }; |
514 | |
515 | CONST_OIDstatic const unsigned char sha256[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 1 }; |
516 | CONST_OIDstatic const unsigned char sha384[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 2 }; |
517 | CONST_OIDstatic const unsigned char sha512[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 3 }; |
518 | CONST_OIDstatic const unsigned char sha224[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 4 }; |
519 | |
520 | CONST_OIDstatic const unsigned char sha3_224[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 7 }; |
521 | CONST_OIDstatic const unsigned char sha3_256[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 8 }; |
522 | CONST_OIDstatic const unsigned char sha3_384[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 9 }; |
523 | CONST_OIDstatic const unsigned char sha3_512[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 10 }; |
524 | |
525 | CONST_OIDstatic const unsigned char hmac_sha3_224[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 13 }; |
526 | CONST_OIDstatic const unsigned char hmac_sha3_256[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 14 }; |
527 | CONST_OIDstatic const unsigned char hmac_sha3_384[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 15 }; |
528 | CONST_OIDstatic const unsigned char hmac_sha3_512[] = { SHAXXX0x60, 0x86, 0x48, 0x01, 0x65, 3, 4, 2, 16 }; |
529 | |
530 | CONST_OIDstatic const unsigned char ansix962ECPublicKey[] = { ANSI_X962_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01 }; |
531 | CONST_OIDstatic const unsigned char ansix962SignaturewithSHA1Digest[] = { ANSI_X962_SIGNATURE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x01 }; |
532 | CONST_OIDstatic const unsigned char ansix962SignatureRecommended[] = { ANSI_X962_SIGNATURE_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x02 }; |
533 | CONST_OIDstatic const unsigned char ansix962SignatureSpecified[] = { ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03 }; |
534 | CONST_OIDstatic const unsigned char ansix962SignaturewithSHA224Digest[] = { ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x01 }; |
535 | CONST_OIDstatic const unsigned char ansix962SignaturewithSHA256Digest[] = { ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x02 }; |
536 | CONST_OIDstatic const unsigned char ansix962SignaturewithSHA384Digest[] = { ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x03 }; |
537 | CONST_OIDstatic const unsigned char ansix962SignaturewithSHA512Digest[] = { ANSI_X962_SPECIFY_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x04 }; |
538 | |
539 | /* ANSI X9.62 prime curve OIDs */ |
540 | /* NOTE: prime192v1 is the same as secp192r1, prime256v1 is the |
541 | * same as secp256r1 |
542 | */ |
543 | CONST_OIDstatic const unsigned char ansiX962prime192v1[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x01 }; /* unsupported by freebl */ |
544 | CONST_OIDstatic const unsigned char ansiX962prime192v2[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x02 }; /* unsupported by freebl */ |
545 | CONST_OIDstatic const unsigned char ansiX962prime192v3[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x03 }; /* unsupported by freebl */ |
546 | CONST_OIDstatic const unsigned char ansiX962prime239v1[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x04 }; /* unsupported by freebl */ |
547 | CONST_OIDstatic const unsigned char ansiX962prime239v2[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x05 }; /* unsupported by freebl */ |
548 | CONST_OIDstatic const unsigned char ansiX962prime239v3[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x06 }; /* unsupported by freebl */ |
549 | CONST_OIDstatic const unsigned char ansiX962prime256v1[] = { ANSI_X962_GFp_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 }; |
550 | |
551 | /* SECG prime curve OIDs */ |
552 | CONST_OIDstatic const unsigned char secgECsecp112r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x06 }; /* unsupported by freebl */ |
553 | CONST_OIDstatic const unsigned char secgECsecp112r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x07 }; /* unsupported by freebl */ |
554 | CONST_OIDstatic const unsigned char secgECsecp128r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1c }; /* unsupported by freebl */ |
555 | CONST_OIDstatic const unsigned char secgECsecp128r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1d }; /* unsupported by freebl */ |
556 | CONST_OIDstatic const unsigned char secgECsecp160k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x09 }; /* unsupported by freebl */ |
557 | CONST_OIDstatic const unsigned char secgECsecp160r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x08 }; /* unsupported by freebl */ |
558 | CONST_OIDstatic const unsigned char secgECsecp160r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1e }; /* unsupported by freebl */ |
559 | CONST_OIDstatic const unsigned char secgECsecp192k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1f }; /* unsupported by freebl */ |
560 | CONST_OIDstatic const unsigned char secgECsecp224k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x20 }; /* unsupported by freebl */ |
561 | CONST_OIDstatic const unsigned char secgECsecp224r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x21 }; /* unsupported by freebl */ |
562 | CONST_OIDstatic const unsigned char secgECsecp256k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x0a }; /* unsupported by freebl */ |
563 | CONST_OIDstatic const unsigned char secgECsecp384r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x22 }; |
564 | CONST_OIDstatic const unsigned char secgECsecp521r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x23 }; |
565 | |
566 | /* ANSI X9.62 characteristic two curve OIDs */ |
567 | CONST_OIDstatic const unsigned char ansiX962c2pnb163v1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x01 }; /* unsupported by freebl */ |
568 | CONST_OIDstatic const unsigned char ansiX962c2pnb163v2[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x02 }; /* unsupported by freebl */ |
569 | CONST_OIDstatic const unsigned char ansiX962c2pnb163v3[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x03 }; /* unsupported by freebl */ |
570 | CONST_OIDstatic const unsigned char ansiX962c2pnb176v1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x04 }; /* unsupported by freebl */ |
571 | CONST_OIDstatic const unsigned char ansiX962c2tnb191v1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x05 }; /* unsupported by freebl */ |
572 | CONST_OIDstatic const unsigned char ansiX962c2tnb191v2[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x06 }; /* unsupported by freebl */ |
573 | CONST_OIDstatic const unsigned char ansiX962c2tnb191v3[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x07 }; /* unsupported by freebl */ |
574 | CONST_OIDstatic const unsigned char ansiX962c2onb191v4[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x08 }; /* unsupported by freebl */ |
575 | CONST_OIDstatic const unsigned char ansiX962c2onb191v5[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x09 }; /* unsupported by freebl */ |
576 | CONST_OIDstatic const unsigned char ansiX962c2pnb208w1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0a }; /* unsupported by freebl */ |
577 | CONST_OIDstatic const unsigned char ansiX962c2tnb239v1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0b }; /* unsupported by freebl */ |
578 | CONST_OIDstatic const unsigned char ansiX962c2tnb239v2[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0c }; /* unsupported by freebl */ |
579 | CONST_OIDstatic const unsigned char ansiX962c2tnb239v3[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0d }; /* unsupported by freebl */ |
580 | CONST_OIDstatic const unsigned char ansiX962c2onb239v4[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0e }; /* unsupported by freebl */ |
581 | CONST_OIDstatic const unsigned char ansiX962c2onb239v5[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x0f }; /* unsupported by freebl */ |
582 | CONST_OIDstatic const unsigned char ansiX962c2pnb272w1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x10 }; /* unsupported by freebl */ |
583 | CONST_OIDstatic const unsigned char ansiX962c2pnb304w1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x11 }; /* unsupported by freebl */ |
584 | CONST_OIDstatic const unsigned char ansiX962c2tnb359v1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x12 }; /* unsupported by freebl */ |
585 | CONST_OIDstatic const unsigned char ansiX962c2pnb368w1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x13 }; /* unsupported by freebl */ |
586 | CONST_OIDstatic const unsigned char ansiX962c2tnb431r1[] = { ANSI_X962_GF2m_OID0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x00, 0x14 }; /* unsupported by freebl */ |
587 | |
588 | /* SECG characterisitic two curve OIDs */ |
589 | CONST_OIDstatic const unsigned char secgECsect113r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x04 }; /* unsupported by freebl */ |
590 | CONST_OIDstatic const unsigned char secgECsect113r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x05 }; /* unsupported by freebl */ |
591 | CONST_OIDstatic const unsigned char secgECsect131r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x16 }; /* unsupported by freebl */ |
592 | CONST_OIDstatic const unsigned char secgECsect131r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x17 }; /* unsupported by freebl */ |
593 | CONST_OIDstatic const unsigned char secgECsect163k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x01 }; /* unsupported by freebl */ |
594 | CONST_OIDstatic const unsigned char secgECsect163r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x02 }; /* unsupported by freebl */ |
595 | CONST_OIDstatic const unsigned char secgECsect163r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x0f }; /* unsupported by freebl */ |
596 | CONST_OIDstatic const unsigned char secgECsect193r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x18 }; /* unsupported by freebl */ |
597 | CONST_OIDstatic const unsigned char secgECsect193r2[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x19 }; /* unsupported by freebl */ |
598 | CONST_OIDstatic const unsigned char secgECsect233k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1a }; /* unsupported by freebl */ |
599 | CONST_OIDstatic const unsigned char secgECsect233r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x1b }; /* unsupported by freebl */ |
600 | CONST_OIDstatic const unsigned char secgECsect239k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x03 }; /* unsupported by freebl */ |
601 | CONST_OIDstatic const unsigned char secgECsect283k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x10 }; /* unsupported by freebl */ |
602 | CONST_OIDstatic const unsigned char secgECsect283r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x11 }; /* unsupported by freebl */ |
603 | CONST_OIDstatic const unsigned char secgECsect409k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x24 }; /* unsupported by freebl */ |
604 | CONST_OIDstatic const unsigned char secgECsect409r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x25 }; /* unsupported by freebl */ |
605 | CONST_OIDstatic const unsigned char secgECsect571k1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x26 }; /* unsupported by freebl */ |
606 | CONST_OIDstatic const unsigned char secgECsect571r1[] = { SECG_OID0x2b, 0x81, 0x04, 0x00, 0x27 }; /* unsupported by freebl */ |
607 | |
608 | /* Diffie-Hellman key agreement algorithms */ |
609 | CONST_OIDstatic const unsigned char dhSinglePassstdDHsha1kdfscheme[] = { X9_63_SCHEME0x2B, 0x81, 0x05, 0x10, 0x86, 0x48, 0x3F, 0x00, 0x02 }; |
610 | CONST_OIDstatic const unsigned char dhSinglePassstdDHsha224kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0B, 0x00 }; |
611 | CONST_OIDstatic const unsigned char dhSinglePassstdDHsha256kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0B, 0x01 }; |
612 | CONST_OIDstatic const unsigned char dhSinglePassstdDHsha384kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0B, 0x02 }; |
613 | CONST_OIDstatic const unsigned char dhSinglePassstdDHsha512kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0B, 0x03 }; |
614 | CONST_OIDstatic const unsigned char dhSinglePasscofactorDHsha1kdfscheme[] = { X9_63_SCHEME0x2B, 0x81, 0x05, 0x10, 0x86, 0x48, 0x3F, 0x00, 0x03 }; |
615 | CONST_OIDstatic const unsigned char dhSinglePasscofactorDHsha224kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0E, 0x00 }; |
616 | CONST_OIDstatic const unsigned char dhSinglePasscofactorDHsha256kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0E, 0x01 }; |
617 | CONST_OIDstatic const unsigned char dhSinglePasscofactorDHsha384kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0E, 0x02 }; |
618 | CONST_OIDstatic const unsigned char dhSinglePasscofactorDHsha512kdfscheme[] = { SECG_SCHEME0x2b, 0x81, 0x04, 0x01, 0x0E, 0x03 }; |
619 | |
620 | CONST_OIDstatic const unsigned char seed_CBC[] = { SEED_OID0x2a, 0x83, 0x1a, 0x8c, 0x9a, 0x44, 0x01, 4 }; |
621 | |
622 | CONST_OIDstatic const unsigned char evIncorporationLocality[] = { EV_NAME_ATTRIBUTE0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 60, 2, 1, 1 }; |
623 | CONST_OIDstatic const unsigned char evIncorporationState[] = { EV_NAME_ATTRIBUTE0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 60, 2, 1, 2 }; |
624 | CONST_OIDstatic const unsigned char evIncorporationCountry[] = { EV_NAME_ATTRIBUTE0x2b, 0x6, 0x1, 0x4, 0x1, 0x82, 0x37, 60, 2, 1, 3 }; |
625 | |
626 | /* https://tools.ietf.org/html/draft-josefsson-pkix-newcurves-01 |
627 | * 1.3.6.1.4.1.11591.15.1 |
628 | */ |
629 | CONST_OIDstatic const unsigned char curve25519[] = { 0x2B, 0x06, 0x01, 0x04, 0x01, 0xDA, 0x47, 0x0F, 0x01 }; |
630 | |
631 | /* |
632 | https://oid-rep.orange-labs.fr/get/1.3.101.112 |
633 | A.1. ASN.1 Object for Ed25519 |
634 | id-Ed25519 OBJECT IDENTIFIER ::= { 1.3.101.112 } |
635 | Parameters are absent. Length is 7 bytes. |
636 | Binary encoding: 3005 0603 2B65 70 |
637 | |
638 | The same algorithm identifiers are used for identifying a public key, |
639 | a private key, and a signature (for the two EdDSA related OIDs). |
640 | Additional encoding information is provided below for each of these |
641 | locations. |
642 | */ |
643 | |
644 | CONST_OIDstatic const unsigned char ed25519PublicKey[] = { 0x2B, 0x65, 0x70 }; |
645 | CONST_OIDstatic const unsigned char ed25519Signature[] = { 0x2B, 0x65, 0x70 }; |
646 | |
647 | #define OI(x){ siDEROID, (unsigned char *)x, sizeof x } \ |
648 | { \ |
649 | siDEROID, (unsigned char *)x, sizeof x \ |
650 | } |
651 | #ifndef SECOID_NO_STRINGS |
652 | #define OD(oid, tag, desc, mech, ext){ { siDEROID, (unsigned char *)oid, sizeof oid } , tag, desc, mech, ext } \ |
653 | { \ |
654 | OI(oid){ siDEROID, (unsigned char *)oid, sizeof oid } \ |
655 | , tag, desc, mech, ext \ |
656 | } |
657 | #define ODE(tag, desc, mech, ext){ { siDEROID, ((void*)0), 0 }, tag, desc, mech, ext } \ |
658 | { \ |
659 | { siDEROID, NULL((void*)0), 0 }, tag, desc, mech, ext \ |
660 | } |
661 | #else |
662 | #define OD(oid, tag, desc, mech, ext){ { siDEROID, (unsigned char *)oid, sizeof oid } , tag, desc, mech, ext } \ |
663 | { \ |
664 | OI(oid){ siDEROID, (unsigned char *)oid, sizeof oid } \ |
665 | , tag, 0, mech, ext \ |
666 | } |
667 | #define ODE(tag, desc, mech, ext){ { siDEROID, ((void*)0), 0 }, tag, desc, mech, ext } \ |
668 | { \ |
669 | { siDEROID, NULL((void*)0), 0 }, tag, 0, mech, ext \ |
670 | } |
671 | #endif |
672 | |
673 | #if defined(NSS_ALLOW_UNSUPPORTED_CRITICAL) |
674 | #define FAKE_SUPPORTED_CERT_EXTENSIONUNSUPPORTED_CERT_EXTENSION SUPPORTED_CERT_EXTENSION |
675 | #else |
676 | #define FAKE_SUPPORTED_CERT_EXTENSIONUNSUPPORTED_CERT_EXTENSION UNSUPPORTED_CERT_EXTENSION |
677 | #endif |
678 | |
679 | /* |
680 | * NOTE: the order of these entries must mach the SECOidTag enum in secoidt.h! |
681 | */ |
682 | const static SECOidData oids[SEC_OID_TOTAL] = { |
683 | { { siDEROID, NULL((void*)0), 0 }, SEC_OID_UNKNOWN, "Unknown OID", CKM_INVALID_MECHANISM0xffffffffUL, INVALID_CERT_EXTENSION }, |
684 | OD(md2, SEC_OID_MD2, "MD2", CKM_MD2, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)md2, sizeof md2 } , SEC_OID_MD2 , "MD2", 0x00000200UL, INVALID_CERT_EXTENSION }, |
685 | OD(md4, SEC_OID_MD4,{ { siDEROID, (unsigned char *)md4, sizeof md4 } , SEC_OID_MD4 , "MD4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
686 | "MD4", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)md4, sizeof md4 } , SEC_OID_MD4 , "MD4", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
687 | OD(md5, SEC_OID_MD5, "MD5", CKM_MD5, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)md5, sizeof md5 } , SEC_OID_MD5 , "MD5", 0x00000210UL, INVALID_CERT_EXTENSION }, |
688 | OD(sha1, SEC_OID_SHA1, "SHA-1", CKM_SHA_1, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha1, sizeof sha1 } , SEC_OID_SHA1 , "SHA-1", 0x00000220UL, INVALID_CERT_EXTENSION }, |
689 | OD(rc2cbc, SEC_OID_RC2_CBC,{ { siDEROID, (unsigned char *)rc2cbc, sizeof rc2cbc } , SEC_OID_RC2_CBC , "RC2-CBC", 0x00000102UL, INVALID_CERT_EXTENSION } |
690 | "RC2-CBC", CKM_RC2_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rc2cbc, sizeof rc2cbc } , SEC_OID_RC2_CBC , "RC2-CBC", 0x00000102UL, INVALID_CERT_EXTENSION }, |
691 | OD(rc4, SEC_OID_RC4, "RC4", CKM_RC4, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rc4, sizeof rc4 } , SEC_OID_RC4 , "RC4", 0x00000111UL, INVALID_CERT_EXTENSION }, |
692 | OD(desede3cbc, SEC_OID_DES_EDE3_CBC,{ { siDEROID, (unsigned char *)desede3cbc, sizeof desede3cbc } , SEC_OID_DES_EDE3_CBC, "DES-EDE3-CBC", 0x00000133UL, INVALID_CERT_EXTENSION } |
693 | "DES-EDE3-CBC", CKM_DES3_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)desede3cbc, sizeof desede3cbc } , SEC_OID_DES_EDE3_CBC, "DES-EDE3-CBC", 0x00000133UL, INVALID_CERT_EXTENSION }, |
694 | OD(rc5cbcpad, SEC_OID_RC5_CBC_PAD,{ { siDEROID, (unsigned char *)rc5cbcpad, sizeof rc5cbcpad } , SEC_OID_RC5_CBC_PAD, "RC5-CBCPad", 0x00000332UL, INVALID_CERT_EXTENSION } |
695 | "RC5-CBCPad", CKM_RC5_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rc5cbcpad, sizeof rc5cbcpad } , SEC_OID_RC5_CBC_PAD, "RC5-CBCPad", 0x00000332UL, INVALID_CERT_EXTENSION }, |
696 | OD(desecb, SEC_OID_DES_ECB,{ { siDEROID, (unsigned char *)desecb, sizeof desecb } , SEC_OID_DES_ECB , "DES-ECB", 0x00000121UL, INVALID_CERT_EXTENSION } |
697 | "DES-ECB", CKM_DES_ECB, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)desecb, sizeof desecb } , SEC_OID_DES_ECB , "DES-ECB", 0x00000121UL, INVALID_CERT_EXTENSION }, |
698 | OD(descbc, SEC_OID_DES_CBC,{ { siDEROID, (unsigned char *)descbc, sizeof descbc } , SEC_OID_DES_CBC , "DES-CBC", 0x00000122UL, INVALID_CERT_EXTENSION } |
699 | "DES-CBC", CKM_DES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)descbc, sizeof descbc } , SEC_OID_DES_CBC , "DES-CBC", 0x00000122UL, INVALID_CERT_EXTENSION }, |
700 | OD(desofb, SEC_OID_DES_OFB,{ { siDEROID, (unsigned char *)desofb, sizeof desofb } , SEC_OID_DES_OFB , "DES-OFB", 0xffffffffUL, INVALID_CERT_EXTENSION } |
701 | "DES-OFB", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)desofb, sizeof desofb } , SEC_OID_DES_OFB , "DES-OFB", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
702 | OD(descfb, SEC_OID_DES_CFB,{ { siDEROID, (unsigned char *)descfb, sizeof descfb } , SEC_OID_DES_CFB , "DES-CFB", 0xffffffffUL, INVALID_CERT_EXTENSION } |
703 | "DES-CFB", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)descfb, sizeof descfb } , SEC_OID_DES_CFB , "DES-CFB", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
704 | OD(desmac, SEC_OID_DES_MAC,{ { siDEROID, (unsigned char *)desmac, sizeof desmac } , SEC_OID_DES_MAC , "DES-MAC", 0x00000123UL, INVALID_CERT_EXTENSION } |
705 | "DES-MAC", CKM_DES_MAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)desmac, sizeof desmac } , SEC_OID_DES_MAC , "DES-MAC", 0x00000123UL, INVALID_CERT_EXTENSION }, |
706 | OD(desede, SEC_OID_DES_EDE,{ { siDEROID, (unsigned char *)desede, sizeof desede } , SEC_OID_DES_EDE , "DES-EDE", 0xffffffffUL, INVALID_CERT_EXTENSION } |
707 | "DES-EDE", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)desede, sizeof desede } , SEC_OID_DES_EDE , "DES-EDE", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
708 | OD(isoSHAWithRSASignature, SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE,{ { siDEROID, (unsigned char *)isoSHAWithRSASignature, sizeof isoSHAWithRSASignature } , SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE , "ISO SHA with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION } |
709 | "ISO SHA with RSA Signature",{ { siDEROID, (unsigned char *)isoSHAWithRSASignature, sizeof isoSHAWithRSASignature } , SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE , "ISO SHA with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION } |
710 | CKM_SHA1_RSA_PKCS, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)isoSHAWithRSASignature, sizeof isoSHAWithRSASignature } , SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE , "ISO SHA with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION }, |
711 | OD(pkcs1RSAEncryption, SEC_OID_PKCS1_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1RSAEncryption, sizeof pkcs1RSAEncryption } , SEC_OID_PKCS1_RSA_ENCRYPTION, "PKCS #1 RSA Encryption", 0x00000001UL , INVALID_CERT_EXTENSION } |
712 | "PKCS #1 RSA Encryption", CKM_RSA_PKCS, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1RSAEncryption, sizeof pkcs1RSAEncryption } , SEC_OID_PKCS1_RSA_ENCRYPTION, "PKCS #1 RSA Encryption", 0x00000001UL , INVALID_CERT_EXTENSION }, |
713 | |
714 | /* the following Signing mechanisms should get new CKM_ values when |
715 | * values for CKM_RSA_WITH_MDX and CKM_RSA_WITH_SHA_1 get defined in |
716 | * PKCS #11. |
717 | */ |
718 | OD(pkcs1MD2WithRSAEncryption, SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1MD2WithRSAEncryption, sizeof pkcs1MD2WithRSAEncryption } , SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION , "PKCS #1 MD2 With RSA Encryption", 0x00000004UL, INVALID_CERT_EXTENSION } |
719 | "PKCS #1 MD2 With RSA Encryption", CKM_MD2_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1MD2WithRSAEncryption, sizeof pkcs1MD2WithRSAEncryption } , SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION , "PKCS #1 MD2 With RSA Encryption", 0x00000004UL, INVALID_CERT_EXTENSION } |
720 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1MD2WithRSAEncryption, sizeof pkcs1MD2WithRSAEncryption } , SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION , "PKCS #1 MD2 With RSA Encryption", 0x00000004UL, INVALID_CERT_EXTENSION }, |
721 | OD(pkcs1MD4WithRSAEncryption, SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1MD4WithRSAEncryption, sizeof pkcs1MD4WithRSAEncryption } , SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION , "PKCS #1 MD4 With RSA Encryption", 0xffffffffUL, INVALID_CERT_EXTENSION } |
722 | "PKCS #1 MD4 With RSA Encryption",{ { siDEROID, (unsigned char *)pkcs1MD4WithRSAEncryption, sizeof pkcs1MD4WithRSAEncryption } , SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION , "PKCS #1 MD4 With RSA Encryption", 0xffffffffUL, INVALID_CERT_EXTENSION } |
723 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1MD4WithRSAEncryption, sizeof pkcs1MD4WithRSAEncryption } , SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION , "PKCS #1 MD4 With RSA Encryption", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
724 | OD(pkcs1MD5WithRSAEncryption, SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1MD5WithRSAEncryption, sizeof pkcs1MD5WithRSAEncryption } , SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION , "PKCS #1 MD5 With RSA Encryption", 0x00000005UL, INVALID_CERT_EXTENSION } |
725 | "PKCS #1 MD5 With RSA Encryption", CKM_MD5_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1MD5WithRSAEncryption, sizeof pkcs1MD5WithRSAEncryption } , SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION , "PKCS #1 MD5 With RSA Encryption", 0x00000005UL, INVALID_CERT_EXTENSION } |
726 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1MD5WithRSAEncryption, sizeof pkcs1MD5WithRSAEncryption } , SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION , "PKCS #1 MD5 With RSA Encryption", 0x00000005UL, INVALID_CERT_EXTENSION }, |
727 | OD(pkcs1SHA1WithRSAEncryption, SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1SHA1WithRSAEncryption, sizeof pkcs1SHA1WithRSAEncryption } , SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-1 With RSA Encryption", 0x00000006UL, INVALID_CERT_EXTENSION } |
728 | "PKCS #1 SHA-1 With RSA Encryption", CKM_SHA1_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1SHA1WithRSAEncryption, sizeof pkcs1SHA1WithRSAEncryption } , SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-1 With RSA Encryption", 0x00000006UL, INVALID_CERT_EXTENSION } |
729 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1SHA1WithRSAEncryption, sizeof pkcs1SHA1WithRSAEncryption } , SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-1 With RSA Encryption", 0x00000006UL, INVALID_CERT_EXTENSION }, |
730 | |
731 | OD(pkcs5PbeWithMD2AndDEScbc, SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC,{ { siDEROID, (unsigned char *)pkcs5PbeWithMD2AndDEScbc, sizeof pkcs5PbeWithMD2AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD2 and DES-CBC", 0x000003A0UL , INVALID_CERT_EXTENSION } |
732 | "PKCS #5 Password Based Encryption with MD2 and DES-CBC",{ { siDEROID, (unsigned char *)pkcs5PbeWithMD2AndDEScbc, sizeof pkcs5PbeWithMD2AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD2 and DES-CBC", 0x000003A0UL , INVALID_CERT_EXTENSION } |
733 | CKM_PBE_MD2_DES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5PbeWithMD2AndDEScbc, sizeof pkcs5PbeWithMD2AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD2 and DES-CBC", 0x000003A0UL , INVALID_CERT_EXTENSION }, |
734 | OD(pkcs5PbeWithMD5AndDEScbc, SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC,{ { siDEROID, (unsigned char *)pkcs5PbeWithMD5AndDEScbc, sizeof pkcs5PbeWithMD5AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD5 and DES-CBC", 0x000003A1UL , INVALID_CERT_EXTENSION } |
735 | "PKCS #5 Password Based Encryption with MD5 and DES-CBC",{ { siDEROID, (unsigned char *)pkcs5PbeWithMD5AndDEScbc, sizeof pkcs5PbeWithMD5AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD5 and DES-CBC", 0x000003A1UL , INVALID_CERT_EXTENSION } |
736 | CKM_PBE_MD5_DES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5PbeWithMD5AndDEScbc, sizeof pkcs5PbeWithMD5AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC , "PKCS #5 Password Based Encryption with MD5 and DES-CBC", 0x000003A1UL , INVALID_CERT_EXTENSION }, |
737 | OD(pkcs5PbeWithSha1AndDEScbc, SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC,{ { siDEROID, (unsigned char *)pkcs5PbeWithSha1AndDEScbc, sizeof pkcs5PbeWithSha1AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC , "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC", 0x80000002UL, INVALID_CERT_EXTENSION } |
738 | "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC",{ { siDEROID, (unsigned char *)pkcs5PbeWithSha1AndDEScbc, sizeof pkcs5PbeWithSha1AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC , "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC", 0x80000002UL, INVALID_CERT_EXTENSION } |
739 | CKM_NSS_PBE_SHA1_DES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5PbeWithSha1AndDEScbc, sizeof pkcs5PbeWithSha1AndDEScbc } , SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC , "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC", 0x80000002UL, INVALID_CERT_EXTENSION }, |
740 | OD(pkcs7, SEC_OID_PKCS7,{ { siDEROID, (unsigned char *)pkcs7, sizeof pkcs7 } , SEC_OID_PKCS7 , "PKCS #7", 0xffffffffUL, INVALID_CERT_EXTENSION } |
741 | "PKCS #7", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7, sizeof pkcs7 } , SEC_OID_PKCS7 , "PKCS #7", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
742 | OD(pkcs7Data, SEC_OID_PKCS7_DATA,{ { siDEROID, (unsigned char *)pkcs7Data, sizeof pkcs7Data } , SEC_OID_PKCS7_DATA, "PKCS #7 Data", 0xffffffffUL, INVALID_CERT_EXTENSION } |
743 | "PKCS #7 Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7Data, sizeof pkcs7Data } , SEC_OID_PKCS7_DATA, "PKCS #7 Data", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
744 | OD(pkcs7SignedData, SEC_OID_PKCS7_SIGNED_DATA,{ { siDEROID, (unsigned char *)pkcs7SignedData, sizeof pkcs7SignedData } , SEC_OID_PKCS7_SIGNED_DATA, "PKCS #7 Signed Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
745 | "PKCS #7 Signed Data", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7SignedData, sizeof pkcs7SignedData } , SEC_OID_PKCS7_SIGNED_DATA, "PKCS #7 Signed Data", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
746 | OD(pkcs7EnvelopedData, SEC_OID_PKCS7_ENVELOPED_DATA,{ { siDEROID, (unsigned char *)pkcs7EnvelopedData, sizeof pkcs7EnvelopedData } , SEC_OID_PKCS7_ENVELOPED_DATA, "PKCS #7 Enveloped Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
747 | "PKCS #7 Enveloped Data",{ { siDEROID, (unsigned char *)pkcs7EnvelopedData, sizeof pkcs7EnvelopedData } , SEC_OID_PKCS7_ENVELOPED_DATA, "PKCS #7 Enveloped Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
748 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7EnvelopedData, sizeof pkcs7EnvelopedData } , SEC_OID_PKCS7_ENVELOPED_DATA, "PKCS #7 Enveloped Data", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
749 | OD(pkcs7SignedEnvelopedData, SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA,{ { siDEROID, (unsigned char *)pkcs7SignedEnvelopedData, sizeof pkcs7SignedEnvelopedData } , SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA , "PKCS #7 Signed And Enveloped Data", 0xffffffffUL, INVALID_CERT_EXTENSION } |
750 | "PKCS #7 Signed And Enveloped Data",{ { siDEROID, (unsigned char *)pkcs7SignedEnvelopedData, sizeof pkcs7SignedEnvelopedData } , SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA , "PKCS #7 Signed And Enveloped Data", 0xffffffffUL, INVALID_CERT_EXTENSION } |
751 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7SignedEnvelopedData, sizeof pkcs7SignedEnvelopedData } , SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA , "PKCS #7 Signed And Enveloped Data", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
752 | OD(pkcs7DigestedData, SEC_OID_PKCS7_DIGESTED_DATA,{ { siDEROID, (unsigned char *)pkcs7DigestedData, sizeof pkcs7DigestedData } , SEC_OID_PKCS7_DIGESTED_DATA, "PKCS #7 Digested Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
753 | "PKCS #7 Digested Data",{ { siDEROID, (unsigned char *)pkcs7DigestedData, sizeof pkcs7DigestedData } , SEC_OID_PKCS7_DIGESTED_DATA, "PKCS #7 Digested Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
754 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7DigestedData, sizeof pkcs7DigestedData } , SEC_OID_PKCS7_DIGESTED_DATA, "PKCS #7 Digested Data", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
755 | OD(pkcs7EncryptedData, SEC_OID_PKCS7_ENCRYPTED_DATA,{ { siDEROID, (unsigned char *)pkcs7EncryptedData, sizeof pkcs7EncryptedData } , SEC_OID_PKCS7_ENCRYPTED_DATA, "PKCS #7 Encrypted Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
756 | "PKCS #7 Encrypted Data",{ { siDEROID, (unsigned char *)pkcs7EncryptedData, sizeof pkcs7EncryptedData } , SEC_OID_PKCS7_ENCRYPTED_DATA, "PKCS #7 Encrypted Data", 0xffffffffUL , INVALID_CERT_EXTENSION } |
757 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs7EncryptedData, sizeof pkcs7EncryptedData } , SEC_OID_PKCS7_ENCRYPTED_DATA, "PKCS #7 Encrypted Data", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
758 | OD(pkcs9EmailAddress, SEC_OID_PKCS9_EMAIL_ADDRESS,{ { siDEROID, (unsigned char *)pkcs9EmailAddress, sizeof pkcs9EmailAddress } , SEC_OID_PKCS9_EMAIL_ADDRESS, "PKCS #9 Email Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
759 | "PKCS #9 Email Address",{ { siDEROID, (unsigned char *)pkcs9EmailAddress, sizeof pkcs9EmailAddress } , SEC_OID_PKCS9_EMAIL_ADDRESS, "PKCS #9 Email Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
760 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9EmailAddress, sizeof pkcs9EmailAddress } , SEC_OID_PKCS9_EMAIL_ADDRESS, "PKCS #9 Email Address", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
761 | OD(pkcs9UnstructuredName, SEC_OID_PKCS9_UNSTRUCTURED_NAME,{ { siDEROID, (unsigned char *)pkcs9UnstructuredName, sizeof pkcs9UnstructuredName } , SEC_OID_PKCS9_UNSTRUCTURED_NAME, "PKCS #9 Unstructured Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
762 | "PKCS #9 Unstructured Name",{ { siDEROID, (unsigned char *)pkcs9UnstructuredName, sizeof pkcs9UnstructuredName } , SEC_OID_PKCS9_UNSTRUCTURED_NAME, "PKCS #9 Unstructured Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
763 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9UnstructuredName, sizeof pkcs9UnstructuredName } , SEC_OID_PKCS9_UNSTRUCTURED_NAME, "PKCS #9 Unstructured Name" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
764 | OD(pkcs9ContentType, SEC_OID_PKCS9_CONTENT_TYPE,{ { siDEROID, (unsigned char *)pkcs9ContentType, sizeof pkcs9ContentType } , SEC_OID_PKCS9_CONTENT_TYPE, "PKCS #9 Content Type", 0xffffffffUL , INVALID_CERT_EXTENSION } |
765 | "PKCS #9 Content Type",{ { siDEROID, (unsigned char *)pkcs9ContentType, sizeof pkcs9ContentType } , SEC_OID_PKCS9_CONTENT_TYPE, "PKCS #9 Content Type", 0xffffffffUL , INVALID_CERT_EXTENSION } |
766 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9ContentType, sizeof pkcs9ContentType } , SEC_OID_PKCS9_CONTENT_TYPE, "PKCS #9 Content Type", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
767 | OD(pkcs9MessageDigest, SEC_OID_PKCS9_MESSAGE_DIGEST,{ { siDEROID, (unsigned char *)pkcs9MessageDigest, sizeof pkcs9MessageDigest } , SEC_OID_PKCS9_MESSAGE_DIGEST, "PKCS #9 Message Digest", 0xffffffffUL , INVALID_CERT_EXTENSION } |
768 | "PKCS #9 Message Digest",{ { siDEROID, (unsigned char *)pkcs9MessageDigest, sizeof pkcs9MessageDigest } , SEC_OID_PKCS9_MESSAGE_DIGEST, "PKCS #9 Message Digest", 0xffffffffUL , INVALID_CERT_EXTENSION } |
769 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9MessageDigest, sizeof pkcs9MessageDigest } , SEC_OID_PKCS9_MESSAGE_DIGEST, "PKCS #9 Message Digest", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
770 | OD(pkcs9SigningTime, SEC_OID_PKCS9_SIGNING_TIME,{ { siDEROID, (unsigned char *)pkcs9SigningTime, sizeof pkcs9SigningTime } , SEC_OID_PKCS9_SIGNING_TIME, "PKCS #9 Signing Time", 0xffffffffUL , INVALID_CERT_EXTENSION } |
771 | "PKCS #9 Signing Time",{ { siDEROID, (unsigned char *)pkcs9SigningTime, sizeof pkcs9SigningTime } , SEC_OID_PKCS9_SIGNING_TIME, "PKCS #9 Signing Time", 0xffffffffUL , INVALID_CERT_EXTENSION } |
772 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9SigningTime, sizeof pkcs9SigningTime } , SEC_OID_PKCS9_SIGNING_TIME, "PKCS #9 Signing Time", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
773 | OD(pkcs9CounterSignature, SEC_OID_PKCS9_COUNTER_SIGNATURE,{ { siDEROID, (unsigned char *)pkcs9CounterSignature, sizeof pkcs9CounterSignature } , SEC_OID_PKCS9_COUNTER_SIGNATURE, "PKCS #9 Counter Signature" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
774 | "PKCS #9 Counter Signature",{ { siDEROID, (unsigned char *)pkcs9CounterSignature, sizeof pkcs9CounterSignature } , SEC_OID_PKCS9_COUNTER_SIGNATURE, "PKCS #9 Counter Signature" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
775 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9CounterSignature, sizeof pkcs9CounterSignature } , SEC_OID_PKCS9_COUNTER_SIGNATURE, "PKCS #9 Counter Signature" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
776 | OD(pkcs9ChallengePassword, SEC_OID_PKCS9_CHALLENGE_PASSWORD,{ { siDEROID, (unsigned char *)pkcs9ChallengePassword, sizeof pkcs9ChallengePassword } , SEC_OID_PKCS9_CHALLENGE_PASSWORD, "PKCS #9 Challenge Password", 0xffffffffUL, INVALID_CERT_EXTENSION } |
777 | "PKCS #9 Challenge Password",{ { siDEROID, (unsigned char *)pkcs9ChallengePassword, sizeof pkcs9ChallengePassword } , SEC_OID_PKCS9_CHALLENGE_PASSWORD, "PKCS #9 Challenge Password", 0xffffffffUL, INVALID_CERT_EXTENSION } |
778 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9ChallengePassword, sizeof pkcs9ChallengePassword } , SEC_OID_PKCS9_CHALLENGE_PASSWORD, "PKCS #9 Challenge Password", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
779 | OD(pkcs9UnstructuredAddress, SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS,{ { siDEROID, (unsigned char *)pkcs9UnstructuredAddress, sizeof pkcs9UnstructuredAddress } , SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS , "PKCS #9 Unstructured Address", 0xffffffffUL, INVALID_CERT_EXTENSION } |
780 | "PKCS #9 Unstructured Address",{ { siDEROID, (unsigned char *)pkcs9UnstructuredAddress, sizeof pkcs9UnstructuredAddress } , SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS , "PKCS #9 Unstructured Address", 0xffffffffUL, INVALID_CERT_EXTENSION } |
781 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9UnstructuredAddress, sizeof pkcs9UnstructuredAddress } , SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS , "PKCS #9 Unstructured Address", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
782 | OD(pkcs9ExtendedCertificateAttributes,{ { siDEROID, (unsigned char *)pkcs9ExtendedCertificateAttributes , sizeof pkcs9ExtendedCertificateAttributes } , SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES , "PKCS #9 Extended Certificate Attributes", 0xffffffffUL, INVALID_CERT_EXTENSION } |
783 | SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES,{ { siDEROID, (unsigned char *)pkcs9ExtendedCertificateAttributes , sizeof pkcs9ExtendedCertificateAttributes } , SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES , "PKCS #9 Extended Certificate Attributes", 0xffffffffUL, INVALID_CERT_EXTENSION } |
784 | "PKCS #9 Extended Certificate Attributes",{ { siDEROID, (unsigned char *)pkcs9ExtendedCertificateAttributes , sizeof pkcs9ExtendedCertificateAttributes } , SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES , "PKCS #9 Extended Certificate Attributes", 0xffffffffUL, INVALID_CERT_EXTENSION } |
785 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9ExtendedCertificateAttributes , sizeof pkcs9ExtendedCertificateAttributes } , SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES , "PKCS #9 Extended Certificate Attributes", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
786 | OD(pkcs9SMIMECapabilities, SEC_OID_PKCS9_SMIME_CAPABILITIES,{ { siDEROID, (unsigned char *)pkcs9SMIMECapabilities, sizeof pkcs9SMIMECapabilities } , SEC_OID_PKCS9_SMIME_CAPABILITIES, "PKCS #9 S/MIME Capabilities", 0xffffffffUL, INVALID_CERT_EXTENSION } |
787 | "PKCS #9 S/MIME Capabilities",{ { siDEROID, (unsigned char *)pkcs9SMIMECapabilities, sizeof pkcs9SMIMECapabilities } , SEC_OID_PKCS9_SMIME_CAPABILITIES, "PKCS #9 S/MIME Capabilities", 0xffffffffUL, INVALID_CERT_EXTENSION } |
788 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9SMIMECapabilities, sizeof pkcs9SMIMECapabilities } , SEC_OID_PKCS9_SMIME_CAPABILITIES, "PKCS #9 S/MIME Capabilities", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
789 | OD(x520CommonName, SEC_OID_AVA_COMMON_NAME,{ { siDEROID, (unsigned char *)x520CommonName, sizeof x520CommonName } , SEC_OID_AVA_COMMON_NAME, "X520 Common Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
790 | "X520 Common Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520CommonName, sizeof x520CommonName } , SEC_OID_AVA_COMMON_NAME, "X520 Common Name", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
791 | OD(x520CountryName, SEC_OID_AVA_COUNTRY_NAME,{ { siDEROID, (unsigned char *)x520CountryName, sizeof x520CountryName } , SEC_OID_AVA_COUNTRY_NAME, "X520 Country Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
792 | "X520 Country Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520CountryName, sizeof x520CountryName } , SEC_OID_AVA_COUNTRY_NAME, "X520 Country Name", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
793 | OD(x520LocalityName, SEC_OID_AVA_LOCALITY,{ { siDEROID, (unsigned char *)x520LocalityName, sizeof x520LocalityName } , SEC_OID_AVA_LOCALITY, "X520 Locality Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
794 | "X520 Locality Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520LocalityName, sizeof x520LocalityName } , SEC_OID_AVA_LOCALITY, "X520 Locality Name", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
795 | OD(x520StateOrProvinceName, SEC_OID_AVA_STATE_OR_PROVINCE,{ { siDEROID, (unsigned char *)x520StateOrProvinceName, sizeof x520StateOrProvinceName } , SEC_OID_AVA_STATE_OR_PROVINCE, "X520 State Or Province Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
796 | "X520 State Or Province Name",{ { siDEROID, (unsigned char *)x520StateOrProvinceName, sizeof x520StateOrProvinceName } , SEC_OID_AVA_STATE_OR_PROVINCE, "X520 State Or Province Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
797 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520StateOrProvinceName, sizeof x520StateOrProvinceName } , SEC_OID_AVA_STATE_OR_PROVINCE, "X520 State Or Province Name" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
798 | OD(x520OrgName, SEC_OID_AVA_ORGANIZATION_NAME,{ { siDEROID, (unsigned char *)x520OrgName, sizeof x520OrgName } , SEC_OID_AVA_ORGANIZATION_NAME, "X520 Organization Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
799 | "X520 Organization Name",{ { siDEROID, (unsigned char *)x520OrgName, sizeof x520OrgName } , SEC_OID_AVA_ORGANIZATION_NAME, "X520 Organization Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
800 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520OrgName, sizeof x520OrgName } , SEC_OID_AVA_ORGANIZATION_NAME, "X520 Organization Name", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
801 | OD(x520OrgUnitName, SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME,{ { siDEROID, (unsigned char *)x520OrgUnitName, sizeof x520OrgUnitName } , SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME, "X520 Organizational Unit Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
802 | "X520 Organizational Unit Name",{ { siDEROID, (unsigned char *)x520OrgUnitName, sizeof x520OrgUnitName } , SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME, "X520 Organizational Unit Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
803 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520OrgUnitName, sizeof x520OrgUnitName } , SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME, "X520 Organizational Unit Name" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
804 | OD(x520DnQualifier, SEC_OID_AVA_DN_QUALIFIER,{ { siDEROID, (unsigned char *)x520DnQualifier, sizeof x520DnQualifier } , SEC_OID_AVA_DN_QUALIFIER, "X520 DN Qualifier", 0xffffffffUL , INVALID_CERT_EXTENSION } |
805 | "X520 DN Qualifier", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520DnQualifier, sizeof x520DnQualifier } , SEC_OID_AVA_DN_QUALIFIER, "X520 DN Qualifier", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
806 | OD(rfc2247DomainComponent, SEC_OID_AVA_DC,{ { siDEROID, (unsigned char *)rfc2247DomainComponent, sizeof rfc2247DomainComponent } , SEC_OID_AVA_DC, "RFC 2247 Domain Component" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
807 | "RFC 2247 Domain Component",{ { siDEROID, (unsigned char *)rfc2247DomainComponent, sizeof rfc2247DomainComponent } , SEC_OID_AVA_DC, "RFC 2247 Domain Component" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
808 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rfc2247DomainComponent, sizeof rfc2247DomainComponent } , SEC_OID_AVA_DC, "RFC 2247 Domain Component" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
809 | |
810 | OD(nsTypeGIF, SEC_OID_NS_TYPE_GIF,{ { siDEROID, (unsigned char *)nsTypeGIF, sizeof nsTypeGIF } , SEC_OID_NS_TYPE_GIF, "GIF", 0xffffffffUL, INVALID_CERT_EXTENSION } |
811 | "GIF", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsTypeGIF, sizeof nsTypeGIF } , SEC_OID_NS_TYPE_GIF, "GIF", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
812 | OD(nsTypeJPEG, SEC_OID_NS_TYPE_JPEG,{ { siDEROID, (unsigned char *)nsTypeJPEG, sizeof nsTypeJPEG } , SEC_OID_NS_TYPE_JPEG, "JPEG", 0xffffffffUL, INVALID_CERT_EXTENSION } |
813 | "JPEG", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsTypeJPEG, sizeof nsTypeJPEG } , SEC_OID_NS_TYPE_JPEG, "JPEG", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
814 | OD(nsTypeURL, SEC_OID_NS_TYPE_URL,{ { siDEROID, (unsigned char *)nsTypeURL, sizeof nsTypeURL } , SEC_OID_NS_TYPE_URL, "URL", 0xffffffffUL, INVALID_CERT_EXTENSION } |
815 | "URL", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsTypeURL, sizeof nsTypeURL } , SEC_OID_NS_TYPE_URL, "URL", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
816 | OD(nsTypeHTML, SEC_OID_NS_TYPE_HTML,{ { siDEROID, (unsigned char *)nsTypeHTML, sizeof nsTypeHTML } , SEC_OID_NS_TYPE_HTML, "HTML", 0xffffffffUL, INVALID_CERT_EXTENSION } |
817 | "HTML", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsTypeHTML, sizeof nsTypeHTML } , SEC_OID_NS_TYPE_HTML, "HTML", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
818 | OD(nsTypeCertSeq, SEC_OID_NS_TYPE_CERT_SEQUENCE,{ { siDEROID, (unsigned char *)nsTypeCertSeq, sizeof nsTypeCertSeq } , SEC_OID_NS_TYPE_CERT_SEQUENCE, "Certificate Sequence", 0xffffffffUL , INVALID_CERT_EXTENSION } |
819 | "Certificate Sequence",{ { siDEROID, (unsigned char *)nsTypeCertSeq, sizeof nsTypeCertSeq } , SEC_OID_NS_TYPE_CERT_SEQUENCE, "Certificate Sequence", 0xffffffffUL , INVALID_CERT_EXTENSION } |
820 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsTypeCertSeq, sizeof nsTypeCertSeq } , SEC_OID_NS_TYPE_CERT_SEQUENCE, "Certificate Sequence", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
821 | OD(missiCertKEADSSOld, SEC_OID_MISSI_KEA_DSS_OLD,{ { siDEROID, (unsigned char *)missiCertKEADSSOld, sizeof missiCertKEADSSOld } , SEC_OID_MISSI_KEA_DSS_OLD, "MISSI KEA and DSS Algorithm (Old)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
822 | "MISSI KEA and DSS Algorithm (Old)",{ { siDEROID, (unsigned char *)missiCertKEADSSOld, sizeof missiCertKEADSSOld } , SEC_OID_MISSI_KEA_DSS_OLD, "MISSI KEA and DSS Algorithm (Old)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
823 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertKEADSSOld, sizeof missiCertKEADSSOld } , SEC_OID_MISSI_KEA_DSS_OLD, "MISSI KEA and DSS Algorithm (Old)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
824 | OD(missiCertDSSOld, SEC_OID_MISSI_DSS_OLD,{ { siDEROID, (unsigned char *)missiCertDSSOld, sizeof missiCertDSSOld } , SEC_OID_MISSI_DSS_OLD, "MISSI DSS Algorithm (Old)", 0xffffffffUL , INVALID_CERT_EXTENSION } |
825 | "MISSI DSS Algorithm (Old)",{ { siDEROID, (unsigned char *)missiCertDSSOld, sizeof missiCertDSSOld } , SEC_OID_MISSI_DSS_OLD, "MISSI DSS Algorithm (Old)", 0xffffffffUL , INVALID_CERT_EXTENSION } |
826 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertDSSOld, sizeof missiCertDSSOld } , SEC_OID_MISSI_DSS_OLD, "MISSI DSS Algorithm (Old)", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
827 | OD(missiCertKEADSS, SEC_OID_MISSI_KEA_DSS,{ { siDEROID, (unsigned char *)missiCertKEADSS, sizeof missiCertKEADSS } , SEC_OID_MISSI_KEA_DSS, "MISSI KEA and DSS Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION } |
828 | "MISSI KEA and DSS Algorithm",{ { siDEROID, (unsigned char *)missiCertKEADSS, sizeof missiCertKEADSS } , SEC_OID_MISSI_KEA_DSS, "MISSI KEA and DSS Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION } |
829 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertKEADSS, sizeof missiCertKEADSS } , SEC_OID_MISSI_KEA_DSS, "MISSI KEA and DSS Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
830 | OD(missiCertDSS, SEC_OID_MISSI_DSS,{ { siDEROID, (unsigned char *)missiCertDSS, sizeof missiCertDSS } , SEC_OID_MISSI_DSS, "MISSI DSS Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION } |
831 | "MISSI DSS Algorithm",{ { siDEROID, (unsigned char *)missiCertDSS, sizeof missiCertDSS } , SEC_OID_MISSI_DSS, "MISSI DSS Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION } |
832 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertDSS, sizeof missiCertDSS } , SEC_OID_MISSI_DSS, "MISSI DSS Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
833 | OD(missiCertKEA, SEC_OID_MISSI_KEA,{ { siDEROID, (unsigned char *)missiCertKEA, sizeof missiCertKEA } , SEC_OID_MISSI_KEA, "MISSI KEA Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION } |
834 | "MISSI KEA Algorithm",{ { siDEROID, (unsigned char *)missiCertKEA, sizeof missiCertKEA } , SEC_OID_MISSI_KEA, "MISSI KEA Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION } |
835 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertKEA, sizeof missiCertKEA } , SEC_OID_MISSI_KEA, "MISSI KEA Algorithm", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
836 | OD(missiCertAltKEA, SEC_OID_MISSI_ALT_KEA,{ { siDEROID, (unsigned char *)missiCertAltKEA, sizeof missiCertAltKEA } , SEC_OID_MISSI_ALT_KEA, "MISSI Alternate KEA Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION } |
837 | "MISSI Alternate KEA Algorithm",{ { siDEROID, (unsigned char *)missiCertAltKEA, sizeof missiCertAltKEA } , SEC_OID_MISSI_ALT_KEA, "MISSI Alternate KEA Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION } |
838 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)missiCertAltKEA, sizeof missiCertAltKEA } , SEC_OID_MISSI_ALT_KEA, "MISSI Alternate KEA Algorithm", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
839 | |
840 | /* Netscape private extensions */ |
841 | OD(nsCertExtNetscapeOK, SEC_OID_NS_CERT_EXT_NETSCAPE_OK,{ { siDEROID, (unsigned char *)nsCertExtNetscapeOK, sizeof nsCertExtNetscapeOK } , SEC_OID_NS_CERT_EXT_NETSCAPE_OK, "Netscape says this cert is OK" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
842 | "Netscape says this cert is OK",{ { siDEROID, (unsigned char *)nsCertExtNetscapeOK, sizeof nsCertExtNetscapeOK } , SEC_OID_NS_CERT_EXT_NETSCAPE_OK, "Netscape says this cert is OK" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
843 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsCertExtNetscapeOK, sizeof nsCertExtNetscapeOK } , SEC_OID_NS_CERT_EXT_NETSCAPE_OK, "Netscape says this cert is OK" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
844 | OD(nsCertExtIssuerLogo, SEC_OID_NS_CERT_EXT_ISSUER_LOGO,{ { siDEROID, (unsigned char *)nsCertExtIssuerLogo, sizeof nsCertExtIssuerLogo } , SEC_OID_NS_CERT_EXT_ISSUER_LOGO, "Certificate Issuer Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
845 | "Certificate Issuer Logo",{ { siDEROID, (unsigned char *)nsCertExtIssuerLogo, sizeof nsCertExtIssuerLogo } , SEC_OID_NS_CERT_EXT_ISSUER_LOGO, "Certificate Issuer Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
846 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsCertExtIssuerLogo, sizeof nsCertExtIssuerLogo } , SEC_OID_NS_CERT_EXT_ISSUER_LOGO, "Certificate Issuer Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
847 | OD(nsCertExtSubjectLogo, SEC_OID_NS_CERT_EXT_SUBJECT_LOGO,{ { siDEROID, (unsigned char *)nsCertExtSubjectLogo, sizeof nsCertExtSubjectLogo } , SEC_OID_NS_CERT_EXT_SUBJECT_LOGO, "Certificate Subject Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
848 | "Certificate Subject Logo",{ { siDEROID, (unsigned char *)nsCertExtSubjectLogo, sizeof nsCertExtSubjectLogo } , SEC_OID_NS_CERT_EXT_SUBJECT_LOGO, "Certificate Subject Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
849 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsCertExtSubjectLogo, sizeof nsCertExtSubjectLogo } , SEC_OID_NS_CERT_EXT_SUBJECT_LOGO, "Certificate Subject Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
850 | OD(nsExtCertType, SEC_OID_NS_CERT_EXT_CERT_TYPE,{ { siDEROID, (unsigned char *)nsExtCertType, sizeof nsExtCertType } , SEC_OID_NS_CERT_EXT_CERT_TYPE, "Certificate Type", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
851 | "Certificate Type",{ { siDEROID, (unsigned char *)nsExtCertType, sizeof nsExtCertType } , SEC_OID_NS_CERT_EXT_CERT_TYPE, "Certificate Type", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
852 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCertType, sizeof nsExtCertType } , SEC_OID_NS_CERT_EXT_CERT_TYPE, "Certificate Type", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
853 | OD(nsExtBaseURL, SEC_OID_NS_CERT_EXT_BASE_URL,{ { siDEROID, (unsigned char *)nsExtBaseURL, sizeof nsExtBaseURL } , SEC_OID_NS_CERT_EXT_BASE_URL, "Certificate Extension Base URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
854 | "Certificate Extension Base URL",{ { siDEROID, (unsigned char *)nsExtBaseURL, sizeof nsExtBaseURL } , SEC_OID_NS_CERT_EXT_BASE_URL, "Certificate Extension Base URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
855 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtBaseURL, sizeof nsExtBaseURL } , SEC_OID_NS_CERT_EXT_BASE_URL, "Certificate Extension Base URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
856 | OD(nsExtRevocationURL, SEC_OID_NS_CERT_EXT_REVOCATION_URL,{ { siDEROID, (unsigned char *)nsExtRevocationURL, sizeof nsExtRevocationURL } , SEC_OID_NS_CERT_EXT_REVOCATION_URL, "Certificate Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
857 | "Certificate Revocation URL",{ { siDEROID, (unsigned char *)nsExtRevocationURL, sizeof nsExtRevocationURL } , SEC_OID_NS_CERT_EXT_REVOCATION_URL, "Certificate Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
858 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtRevocationURL, sizeof nsExtRevocationURL } , SEC_OID_NS_CERT_EXT_REVOCATION_URL, "Certificate Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
859 | OD(nsExtCARevocationURL, SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL,{ { siDEROID, (unsigned char *)nsExtCARevocationURL, sizeof nsExtCARevocationURL } , SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL, "Certificate Authority Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
860 | "Certificate Authority Revocation URL",{ { siDEROID, (unsigned char *)nsExtCARevocationURL, sizeof nsExtCARevocationURL } , SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL, "Certificate Authority Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
861 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCARevocationURL, sizeof nsExtCARevocationURL } , SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL, "Certificate Authority Revocation URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
862 | OD(nsExtCACRLURL, SEC_OID_NS_CERT_EXT_CA_CRL_URL,{ { siDEROID, (unsigned char *)nsExtCACRLURL, sizeof nsExtCACRLURL } , SEC_OID_NS_CERT_EXT_CA_CRL_URL, "Certificate Authority CRL Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
863 | "Certificate Authority CRL Download URL",{ { siDEROID, (unsigned char *)nsExtCACRLURL, sizeof nsExtCACRLURL } , SEC_OID_NS_CERT_EXT_CA_CRL_URL, "Certificate Authority CRL Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
864 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCACRLURL, sizeof nsExtCACRLURL } , SEC_OID_NS_CERT_EXT_CA_CRL_URL, "Certificate Authority CRL Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
865 | OD(nsExtCACertURL, SEC_OID_NS_CERT_EXT_CA_CERT_URL,{ { siDEROID, (unsigned char *)nsExtCACertURL, sizeof nsExtCACertURL } , SEC_OID_NS_CERT_EXT_CA_CERT_URL, "Certificate Authority Certificate Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
866 | "Certificate Authority Certificate Download URL",{ { siDEROID, (unsigned char *)nsExtCACertURL, sizeof nsExtCACertURL } , SEC_OID_NS_CERT_EXT_CA_CERT_URL, "Certificate Authority Certificate Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
867 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCACertURL, sizeof nsExtCACertURL } , SEC_OID_NS_CERT_EXT_CA_CERT_URL, "Certificate Authority Certificate Download URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
868 | OD(nsExtCertRenewalURL, SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL,{ { siDEROID, (unsigned char *)nsExtCertRenewalURL, sizeof nsExtCertRenewalURL } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL, "Certificate Renewal URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
869 | "Certificate Renewal URL",{ { siDEROID, (unsigned char *)nsExtCertRenewalURL, sizeof nsExtCertRenewalURL } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL, "Certificate Renewal URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
870 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCertRenewalURL, sizeof nsExtCertRenewalURL } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL, "Certificate Renewal URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
871 | OD(nsExtCAPolicyURL, SEC_OID_NS_CERT_EXT_CA_POLICY_URL,{ { siDEROID, (unsigned char *)nsExtCAPolicyURL, sizeof nsExtCAPolicyURL } , SEC_OID_NS_CERT_EXT_CA_POLICY_URL, "Certificate Authority Policy URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
872 | "Certificate Authority Policy URL",{ { siDEROID, (unsigned char *)nsExtCAPolicyURL, sizeof nsExtCAPolicyURL } , SEC_OID_NS_CERT_EXT_CA_POLICY_URL, "Certificate Authority Policy URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
873 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCAPolicyURL, sizeof nsExtCAPolicyURL } , SEC_OID_NS_CERT_EXT_CA_POLICY_URL, "Certificate Authority Policy URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
874 | OD(nsExtHomepageURL, SEC_OID_NS_CERT_EXT_HOMEPAGE_URL,{ { siDEROID, (unsigned char *)nsExtHomepageURL, sizeof nsExtHomepageURL } , SEC_OID_NS_CERT_EXT_HOMEPAGE_URL, "Certificate Homepage URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
875 | "Certificate Homepage URL",{ { siDEROID, (unsigned char *)nsExtHomepageURL, sizeof nsExtHomepageURL } , SEC_OID_NS_CERT_EXT_HOMEPAGE_URL, "Certificate Homepage URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
876 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtHomepageURL, sizeof nsExtHomepageURL } , SEC_OID_NS_CERT_EXT_HOMEPAGE_URL, "Certificate Homepage URL" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
877 | OD(nsExtEntityLogo, SEC_OID_NS_CERT_EXT_ENTITY_LOGO,{ { siDEROID, (unsigned char *)nsExtEntityLogo, sizeof nsExtEntityLogo } , SEC_OID_NS_CERT_EXT_ENTITY_LOGO, "Certificate Entity Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
878 | "Certificate Entity Logo",{ { siDEROID, (unsigned char *)nsExtEntityLogo, sizeof nsExtEntityLogo } , SEC_OID_NS_CERT_EXT_ENTITY_LOGO, "Certificate Entity Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
879 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtEntityLogo, sizeof nsExtEntityLogo } , SEC_OID_NS_CERT_EXT_ENTITY_LOGO, "Certificate Entity Logo" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
880 | OD(nsExtUserPicture, SEC_OID_NS_CERT_EXT_USER_PICTURE,{ { siDEROID, (unsigned char *)nsExtUserPicture, sizeof nsExtUserPicture } , SEC_OID_NS_CERT_EXT_USER_PICTURE, "Certificate User Picture" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
881 | "Certificate User Picture",{ { siDEROID, (unsigned char *)nsExtUserPicture, sizeof nsExtUserPicture } , SEC_OID_NS_CERT_EXT_USER_PICTURE, "Certificate User Picture" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
882 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtUserPicture, sizeof nsExtUserPicture } , SEC_OID_NS_CERT_EXT_USER_PICTURE, "Certificate User Picture" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
883 | OD(nsExtSSLServerName, SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME,{ { siDEROID, (unsigned char *)nsExtSSLServerName, sizeof nsExtSSLServerName } , SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME, "Certificate SSL Server Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
884 | "Certificate SSL Server Name",{ { siDEROID, (unsigned char *)nsExtSSLServerName, sizeof nsExtSSLServerName } , SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME, "Certificate SSL Server Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
885 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtSSLServerName, sizeof nsExtSSLServerName } , SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME, "Certificate SSL Server Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
886 | OD(nsExtComment, SEC_OID_NS_CERT_EXT_COMMENT,{ { siDEROID, (unsigned char *)nsExtComment, sizeof nsExtComment } , SEC_OID_NS_CERT_EXT_COMMENT, "Certificate Comment", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
887 | "Certificate Comment",{ { siDEROID, (unsigned char *)nsExtComment, sizeof nsExtComment } , SEC_OID_NS_CERT_EXT_COMMENT, "Certificate Comment", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
888 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtComment, sizeof nsExtComment } , SEC_OID_NS_CERT_EXT_COMMENT, "Certificate Comment", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
889 | OD(nsExtLostPasswordURL, SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL,{ { siDEROID, (unsigned char *)nsExtLostPasswordURL, sizeof nsExtLostPasswordURL } , SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL, "Lost Password URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
890 | "Lost Password URL",{ { siDEROID, (unsigned char *)nsExtLostPasswordURL, sizeof nsExtLostPasswordURL } , SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL, "Lost Password URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
891 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtLostPasswordURL, sizeof nsExtLostPasswordURL } , SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL, "Lost Password URL" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
892 | OD(nsExtCertRenewalTime, SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME,{ { siDEROID, (unsigned char *)nsExtCertRenewalTime, sizeof nsExtCertRenewalTime } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME, "Certificate Renewal Time" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
893 | "Certificate Renewal Time",{ { siDEROID, (unsigned char *)nsExtCertRenewalTime, sizeof nsExtCertRenewalTime } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME, "Certificate Renewal Time" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
894 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCertRenewalTime, sizeof nsExtCertRenewalTime } , SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME, "Certificate Renewal Time" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
895 | OD(nsKeyUsageGovtApproved, SEC_OID_NS_KEY_USAGE_GOVT_APPROVED,{ { siDEROID, (unsigned char *)nsKeyUsageGovtApproved, sizeof nsKeyUsageGovtApproved } , SEC_OID_NS_KEY_USAGE_GOVT_APPROVED , "Strong Crypto Export Approved", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
896 | "Strong Crypto Export Approved",{ { siDEROID, (unsigned char *)nsKeyUsageGovtApproved, sizeof nsKeyUsageGovtApproved } , SEC_OID_NS_KEY_USAGE_GOVT_APPROVED , "Strong Crypto Export Approved", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
897 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsKeyUsageGovtApproved, sizeof nsKeyUsageGovtApproved } , SEC_OID_NS_KEY_USAGE_GOVT_APPROVED , "Strong Crypto Export Approved", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
898 | |
899 | /* x.509 v3 certificate extensions */ |
900 | OD(x509SubjectDirectoryAttr, SEC_OID_X509_SUBJECT_DIRECTORY_ATTR,{ { siDEROID, (unsigned char *)x509SubjectDirectoryAttr, sizeof x509SubjectDirectoryAttr } , SEC_OID_X509_SUBJECT_DIRECTORY_ATTR , "Certificate Subject Directory Attributes", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
901 | "Certificate Subject Directory Attributes",{ { siDEROID, (unsigned char *)x509SubjectDirectoryAttr, sizeof x509SubjectDirectoryAttr } , SEC_OID_X509_SUBJECT_DIRECTORY_ATTR , "Certificate Subject Directory Attributes", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
902 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SubjectDirectoryAttr, sizeof x509SubjectDirectoryAttr } , SEC_OID_X509_SUBJECT_DIRECTORY_ATTR , "Certificate Subject Directory Attributes", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
903 | OD(x509SubjectKeyID, SEC_OID_X509_SUBJECT_KEY_ID,{ { siDEROID, (unsigned char *)x509SubjectKeyID, sizeof x509SubjectKeyID } , SEC_OID_X509_SUBJECT_KEY_ID, "Certificate Subject Key ID" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
904 | "Certificate Subject Key ID",{ { siDEROID, (unsigned char *)x509SubjectKeyID, sizeof x509SubjectKeyID } , SEC_OID_X509_SUBJECT_KEY_ID, "Certificate Subject Key ID" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
905 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SubjectKeyID, sizeof x509SubjectKeyID } , SEC_OID_X509_SUBJECT_KEY_ID, "Certificate Subject Key ID" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
906 | OD(x509KeyUsage, SEC_OID_X509_KEY_USAGE,{ { siDEROID, (unsigned char *)x509KeyUsage, sizeof x509KeyUsage } , SEC_OID_X509_KEY_USAGE, "Certificate Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
907 | "Certificate Key Usage",{ { siDEROID, (unsigned char *)x509KeyUsage, sizeof x509KeyUsage } , SEC_OID_X509_KEY_USAGE, "Certificate Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
908 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509KeyUsage, sizeof x509KeyUsage } , SEC_OID_X509_KEY_USAGE, "Certificate Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
909 | OD(x509PrivateKeyUsagePeriod, SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD,{ { siDEROID, (unsigned char *)x509PrivateKeyUsagePeriod, sizeof x509PrivateKeyUsagePeriod } , SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD , "Certificate Private Key Usage Period", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
910 | "Certificate Private Key Usage Period",{ { siDEROID, (unsigned char *)x509PrivateKeyUsagePeriod, sizeof x509PrivateKeyUsagePeriod } , SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD , "Certificate Private Key Usage Period", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
911 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509PrivateKeyUsagePeriod, sizeof x509PrivateKeyUsagePeriod } , SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD , "Certificate Private Key Usage Period", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
912 | OD(x509SubjectAltName, SEC_OID_X509_SUBJECT_ALT_NAME,{ { siDEROID, (unsigned char *)x509SubjectAltName, sizeof x509SubjectAltName } , SEC_OID_X509_SUBJECT_ALT_NAME, "Certificate Subject Alt Name" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
913 | "Certificate Subject Alt Name",{ { siDEROID, (unsigned char *)x509SubjectAltName, sizeof x509SubjectAltName } , SEC_OID_X509_SUBJECT_ALT_NAME, "Certificate Subject Alt Name" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
914 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SubjectAltName, sizeof x509SubjectAltName } , SEC_OID_X509_SUBJECT_ALT_NAME, "Certificate Subject Alt Name" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
915 | OD(x509IssuerAltName, SEC_OID_X509_ISSUER_ALT_NAME,{ { siDEROID, (unsigned char *)x509IssuerAltName, sizeof x509IssuerAltName } , SEC_OID_X509_ISSUER_ALT_NAME, "Certificate Issuer Alt Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
916 | "Certificate Issuer Alt Name",{ { siDEROID, (unsigned char *)x509IssuerAltName, sizeof x509IssuerAltName } , SEC_OID_X509_ISSUER_ALT_NAME, "Certificate Issuer Alt Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
917 | CKM_INVALID_MECHANISM, FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509IssuerAltName, sizeof x509IssuerAltName } , SEC_OID_X509_ISSUER_ALT_NAME, "Certificate Issuer Alt Name" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
918 | OD(x509BasicConstraints, SEC_OID_X509_BASIC_CONSTRAINTS,{ { siDEROID, (unsigned char *)x509BasicConstraints, sizeof x509BasicConstraints } , SEC_OID_X509_BASIC_CONSTRAINTS, "Certificate Basic Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
919 | "Certificate Basic Constraints",{ { siDEROID, (unsigned char *)x509BasicConstraints, sizeof x509BasicConstraints } , SEC_OID_X509_BASIC_CONSTRAINTS, "Certificate Basic Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
920 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509BasicConstraints, sizeof x509BasicConstraints } , SEC_OID_X509_BASIC_CONSTRAINTS, "Certificate Basic Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
921 | OD(x509NameConstraints, SEC_OID_X509_NAME_CONSTRAINTS,{ { siDEROID, (unsigned char *)x509NameConstraints, sizeof x509NameConstraints } , SEC_OID_X509_NAME_CONSTRAINTS, "Certificate Name Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
922 | "Certificate Name Constraints",{ { siDEROID, (unsigned char *)x509NameConstraints, sizeof x509NameConstraints } , SEC_OID_X509_NAME_CONSTRAINTS, "Certificate Name Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
923 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509NameConstraints, sizeof x509NameConstraints } , SEC_OID_X509_NAME_CONSTRAINTS, "Certificate Name Constraints" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
924 | OD(x509CRLDistPoints, SEC_OID_X509_CRL_DIST_POINTS,{ { siDEROID, (unsigned char *)x509CRLDistPoints, sizeof x509CRLDistPoints } , SEC_OID_X509_CRL_DIST_POINTS, "CRL Distribution Points", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
925 | "CRL Distribution Points",{ { siDEROID, (unsigned char *)x509CRLDistPoints, sizeof x509CRLDistPoints } , SEC_OID_X509_CRL_DIST_POINTS, "CRL Distribution Points", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
926 | CKM_INVALID_MECHANISM, FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509CRLDistPoints, sizeof x509CRLDistPoints } , SEC_OID_X509_CRL_DIST_POINTS, "CRL Distribution Points", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
927 | OD(x509CertificatePolicies, SEC_OID_X509_CERTIFICATE_POLICIES,{ { siDEROID, (unsigned char *)x509CertificatePolicies, sizeof x509CertificatePolicies } , SEC_OID_X509_CERTIFICATE_POLICIES , "Certificate Policies", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
928 | "Certificate Policies",{ { siDEROID, (unsigned char *)x509CertificatePolicies, sizeof x509CertificatePolicies } , SEC_OID_X509_CERTIFICATE_POLICIES , "Certificate Policies", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
929 | CKM_INVALID_MECHANISM, FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509CertificatePolicies, sizeof x509CertificatePolicies } , SEC_OID_X509_CERTIFICATE_POLICIES , "Certificate Policies", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
930 | OD(x509PolicyMappings, SEC_OID_X509_POLICY_MAPPINGS,{ { siDEROID, (unsigned char *)x509PolicyMappings, sizeof x509PolicyMappings } , SEC_OID_X509_POLICY_MAPPINGS, "Certificate Policy Mappings" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
931 | "Certificate Policy Mappings",{ { siDEROID, (unsigned char *)x509PolicyMappings, sizeof x509PolicyMappings } , SEC_OID_X509_POLICY_MAPPINGS, "Certificate Policy Mappings" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
932 | CKM_INVALID_MECHANISM, UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509PolicyMappings, sizeof x509PolicyMappings } , SEC_OID_X509_POLICY_MAPPINGS, "Certificate Policy Mappings" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
933 | OD(x509PolicyConstraints, SEC_OID_X509_POLICY_CONSTRAINTS,{ { siDEROID, (unsigned char *)x509PolicyConstraints, sizeof x509PolicyConstraints } , SEC_OID_X509_POLICY_CONSTRAINTS, "Certificate Policy Constraints" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
934 | "Certificate Policy Constraints",{ { siDEROID, (unsigned char *)x509PolicyConstraints, sizeof x509PolicyConstraints } , SEC_OID_X509_POLICY_CONSTRAINTS, "Certificate Policy Constraints" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
935 | CKM_INVALID_MECHANISM, FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509PolicyConstraints, sizeof x509PolicyConstraints } , SEC_OID_X509_POLICY_CONSTRAINTS, "Certificate Policy Constraints" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
936 | OD(x509AuthKeyID, SEC_OID_X509_AUTH_KEY_ID,{ { siDEROID, (unsigned char *)x509AuthKeyID, sizeof x509AuthKeyID } , SEC_OID_X509_AUTH_KEY_ID, "Certificate Authority Key Identifier" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
937 | "Certificate Authority Key Identifier",{ { siDEROID, (unsigned char *)x509AuthKeyID, sizeof x509AuthKeyID } , SEC_OID_X509_AUTH_KEY_ID, "Certificate Authority Key Identifier" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
938 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509AuthKeyID, sizeof x509AuthKeyID } , SEC_OID_X509_AUTH_KEY_ID, "Certificate Authority Key Identifier" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
939 | OD(x509ExtKeyUsage, SEC_OID_X509_EXT_KEY_USAGE,{ { siDEROID, (unsigned char *)x509ExtKeyUsage, sizeof x509ExtKeyUsage } , SEC_OID_X509_EXT_KEY_USAGE, "Extended Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
940 | "Extended Key Usage",{ { siDEROID, (unsigned char *)x509ExtKeyUsage, sizeof x509ExtKeyUsage } , SEC_OID_X509_EXT_KEY_USAGE, "Extended Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
941 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509ExtKeyUsage, sizeof x509ExtKeyUsage } , SEC_OID_X509_EXT_KEY_USAGE, "Extended Key Usage", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
942 | OD(x509AuthInfoAccess, SEC_OID_X509_AUTH_INFO_ACCESS,{ { siDEROID, (unsigned char *)x509AuthInfoAccess, sizeof x509AuthInfoAccess } , SEC_OID_X509_AUTH_INFO_ACCESS, "Authority Information Access" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
943 | "Authority Information Access",{ { siDEROID, (unsigned char *)x509AuthInfoAccess, sizeof x509AuthInfoAccess } , SEC_OID_X509_AUTH_INFO_ACCESS, "Authority Information Access" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
944 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509AuthInfoAccess, sizeof x509AuthInfoAccess } , SEC_OID_X509_AUTH_INFO_ACCESS, "Authority Information Access" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
945 | |
946 | /* x.509 v3 CRL extensions */ |
947 | OD(x509CRLNumber, SEC_OID_X509_CRL_NUMBER,{ { siDEROID, (unsigned char *)x509CRLNumber, sizeof x509CRLNumber } , SEC_OID_X509_CRL_NUMBER, "CRL Number", 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
948 | "CRL Number", CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509CRLNumber, sizeof x509CRLNumber } , SEC_OID_X509_CRL_NUMBER, "CRL Number", 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
949 | OD(x509ReasonCode, SEC_OID_X509_REASON_CODE,{ { siDEROID, (unsigned char *)x509ReasonCode, sizeof x509ReasonCode } , SEC_OID_X509_REASON_CODE, "CRL reason code", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
950 | "CRL reason code", CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509ReasonCode, sizeof x509ReasonCode } , SEC_OID_X509_REASON_CODE, "CRL reason code", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
951 | OD(x509InvalidDate, SEC_OID_X509_INVALID_DATE,{ { siDEROID, (unsigned char *)x509InvalidDate, sizeof x509InvalidDate } , SEC_OID_X509_INVALID_DATE, "Invalid Date", 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
952 | "Invalid Date", CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509InvalidDate, sizeof x509InvalidDate } , SEC_OID_X509_INVALID_DATE, "Invalid Date", 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
953 | |
954 | OD(x500RSAEncryption, SEC_OID_X500_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)x500RSAEncryption, sizeof x500RSAEncryption } , SEC_OID_X500_RSA_ENCRYPTION, "X500 RSA Encryption", 0x00000003UL , INVALID_CERT_EXTENSION } |
955 | "X500 RSA Encryption", CKM_RSA_X_509, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x500RSAEncryption, sizeof x500RSAEncryption } , SEC_OID_X500_RSA_ENCRYPTION, "X500 RSA Encryption", 0x00000003UL , INVALID_CERT_EXTENSION }, |
956 | |
957 | /* added for alg 1485 */ |
958 | OD(rfc1274Uid, SEC_OID_RFC1274_UID,{ { siDEROID, (unsigned char *)rfc1274Uid, sizeof rfc1274Uid } , SEC_OID_RFC1274_UID, "RFC1274 User Id", 0xffffffffUL, INVALID_CERT_EXTENSION } |
959 | "RFC1274 User Id", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rfc1274Uid, sizeof rfc1274Uid } , SEC_OID_RFC1274_UID, "RFC1274 User Id", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
960 | OD(rfc1274Mail, SEC_OID_RFC1274_MAIL,{ { siDEROID, (unsigned char *)rfc1274Mail, sizeof rfc1274Mail } , SEC_OID_RFC1274_MAIL, "RFC1274 E-mail Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
961 | "RFC1274 E-mail Address",{ { siDEROID, (unsigned char *)rfc1274Mail, sizeof rfc1274Mail } , SEC_OID_RFC1274_MAIL, "RFC1274 E-mail Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
962 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)rfc1274Mail, sizeof rfc1274Mail } , SEC_OID_RFC1274_MAIL, "RFC1274 E-mail Address", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
963 | |
964 | /* pkcs 12 additions */ |
965 | OD(pkcs12, SEC_OID_PKCS12,{ { siDEROID, (unsigned char *)pkcs12, sizeof pkcs12 } , SEC_OID_PKCS12 , "PKCS #12", 0xffffffffUL, INVALID_CERT_EXTENSION } |
966 | "PKCS #12", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12, sizeof pkcs12 } , SEC_OID_PKCS12 , "PKCS #12", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
967 | OD(pkcs12ModeIDs, SEC_OID_PKCS12_MODE_IDS,{ { siDEROID, (unsigned char *)pkcs12ModeIDs, sizeof pkcs12ModeIDs } , SEC_OID_PKCS12_MODE_IDS, "PKCS #12 Mode IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
968 | "PKCS #12 Mode IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12ModeIDs, sizeof pkcs12ModeIDs } , SEC_OID_PKCS12_MODE_IDS, "PKCS #12 Mode IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
969 | OD(pkcs12ESPVKIDs, SEC_OID_PKCS12_ESPVK_IDS,{ { siDEROID, (unsigned char *)pkcs12ESPVKIDs, sizeof pkcs12ESPVKIDs } , SEC_OID_PKCS12_ESPVK_IDS, "PKCS #12 ESPVK IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
970 | "PKCS #12 ESPVK IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12ESPVKIDs, sizeof pkcs12ESPVKIDs } , SEC_OID_PKCS12_ESPVK_IDS, "PKCS #12 ESPVK IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
971 | OD(pkcs12BagIDs, SEC_OID_PKCS12_BAG_IDS,{ { siDEROID, (unsigned char *)pkcs12BagIDs, sizeof pkcs12BagIDs } , SEC_OID_PKCS12_BAG_IDS, "PKCS #12 Bag IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
972 | "PKCS #12 Bag IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12BagIDs, sizeof pkcs12BagIDs } , SEC_OID_PKCS12_BAG_IDS, "PKCS #12 Bag IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
973 | OD(pkcs12CertBagIDs, SEC_OID_PKCS12_CERT_BAG_IDS,{ { siDEROID, (unsigned char *)pkcs12CertBagIDs, sizeof pkcs12CertBagIDs } , SEC_OID_PKCS12_CERT_BAG_IDS, "PKCS #12 Cert Bag IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
974 | "PKCS #12 Cert Bag IDs",{ { siDEROID, (unsigned char *)pkcs12CertBagIDs, sizeof pkcs12CertBagIDs } , SEC_OID_PKCS12_CERT_BAG_IDS, "PKCS #12 Cert Bag IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
975 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12CertBagIDs, sizeof pkcs12CertBagIDs } , SEC_OID_PKCS12_CERT_BAG_IDS, "PKCS #12 Cert Bag IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
976 | OD(pkcs12OIDs, SEC_OID_PKCS12_OIDS,{ { siDEROID, (unsigned char *)pkcs12OIDs, sizeof pkcs12OIDs } , SEC_OID_PKCS12_OIDS, "PKCS #12 OIDs", 0xffffffffUL, INVALID_CERT_EXTENSION } |
977 | "PKCS #12 OIDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12OIDs, sizeof pkcs12OIDs } , SEC_OID_PKCS12_OIDS, "PKCS #12 OIDs", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
978 | OD(pkcs12PBEIDs, SEC_OID_PKCS12_PBE_IDS,{ { siDEROID, (unsigned char *)pkcs12PBEIDs, sizeof pkcs12PBEIDs } , SEC_OID_PKCS12_PBE_IDS, "PKCS #12 PBE IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
979 | "PKCS #12 PBE IDs", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEIDs, sizeof pkcs12PBEIDs } , SEC_OID_PKCS12_PBE_IDS, "PKCS #12 PBE IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
980 | OD(pkcs12SignatureIDs, SEC_OID_PKCS12_SIGNATURE_IDS,{ { siDEROID, (unsigned char *)pkcs12SignatureIDs, sizeof pkcs12SignatureIDs } , SEC_OID_PKCS12_SIGNATURE_IDS, "PKCS #12 Signature IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
981 | "PKCS #12 Signature IDs",{ { siDEROID, (unsigned char *)pkcs12SignatureIDs, sizeof pkcs12SignatureIDs } , SEC_OID_PKCS12_SIGNATURE_IDS, "PKCS #12 Signature IDs", 0xffffffffUL , INVALID_CERT_EXTENSION } |
982 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12SignatureIDs, sizeof pkcs12SignatureIDs } , SEC_OID_PKCS12_SIGNATURE_IDS, "PKCS #12 Signature IDs", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
983 | OD(pkcs12EnvelopingIDs, SEC_OID_PKCS12_ENVELOPING_IDS,{ { siDEROID, (unsigned char *)pkcs12EnvelopingIDs, sizeof pkcs12EnvelopingIDs } , SEC_OID_PKCS12_ENVELOPING_IDS, "PKCS #12 Enveloping IDs" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
984 | "PKCS #12 Enveloping IDs",{ { siDEROID, (unsigned char *)pkcs12EnvelopingIDs, sizeof pkcs12EnvelopingIDs } , SEC_OID_PKCS12_ENVELOPING_IDS, "PKCS #12 Enveloping IDs" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
985 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12EnvelopingIDs, sizeof pkcs12EnvelopingIDs } , SEC_OID_PKCS12_ENVELOPING_IDS, "PKCS #12 Enveloping IDs" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
986 | OD(pkcs12PKCS8KeyShrouding, SEC_OID_PKCS12_PKCS8_KEY_SHROUDING,{ { siDEROID, (unsigned char *)pkcs12PKCS8KeyShrouding, sizeof pkcs12PKCS8KeyShrouding } , SEC_OID_PKCS12_PKCS8_KEY_SHROUDING , "PKCS #12 Key Shrouding", 0xffffffffUL, INVALID_CERT_EXTENSION } |
987 | "PKCS #12 Key Shrouding",{ { siDEROID, (unsigned char *)pkcs12PKCS8KeyShrouding, sizeof pkcs12PKCS8KeyShrouding } , SEC_OID_PKCS12_PKCS8_KEY_SHROUDING , "PKCS #12 Key Shrouding", 0xffffffffUL, INVALID_CERT_EXTENSION } |
988 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PKCS8KeyShrouding, sizeof pkcs12PKCS8KeyShrouding } , SEC_OID_PKCS12_PKCS8_KEY_SHROUDING , "PKCS #12 Key Shrouding", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
989 | OD(pkcs12KeyBagID, SEC_OID_PKCS12_KEY_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12KeyBagID, sizeof pkcs12KeyBagID } , SEC_OID_PKCS12_KEY_BAG_ID, "PKCS #12 Key Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
990 | "PKCS #12 Key Bag ID",{ { siDEROID, (unsigned char *)pkcs12KeyBagID, sizeof pkcs12KeyBagID } , SEC_OID_PKCS12_KEY_BAG_ID, "PKCS #12 Key Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
991 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12KeyBagID, sizeof pkcs12KeyBagID } , SEC_OID_PKCS12_KEY_BAG_ID, "PKCS #12 Key Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
992 | OD(pkcs12CertAndCRLBagID, SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12CertAndCRLBagID, sizeof pkcs12CertAndCRLBagID } , SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID, "PKCS #12 Cert And CRL Bag ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
993 | "PKCS #12 Cert And CRL Bag ID",{ { siDEROID, (unsigned char *)pkcs12CertAndCRLBagID, sizeof pkcs12CertAndCRLBagID } , SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID, "PKCS #12 Cert And CRL Bag ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
994 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12CertAndCRLBagID, sizeof pkcs12CertAndCRLBagID } , SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID, "PKCS #12 Cert And CRL Bag ID" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
995 | OD(pkcs12SecretBagID, SEC_OID_PKCS12_SECRET_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12SecretBagID, sizeof pkcs12SecretBagID } , SEC_OID_PKCS12_SECRET_BAG_ID, "PKCS #12 Secret Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
996 | "PKCS #12 Secret Bag ID",{ { siDEROID, (unsigned char *)pkcs12SecretBagID, sizeof pkcs12SecretBagID } , SEC_OID_PKCS12_SECRET_BAG_ID, "PKCS #12 Secret Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
997 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12SecretBagID, sizeof pkcs12SecretBagID } , SEC_OID_PKCS12_SECRET_BAG_ID, "PKCS #12 Secret Bag ID", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
998 | OD(pkcs12X509CertCRLBag, SEC_OID_PKCS12_X509_CERT_CRL_BAG,{ { siDEROID, (unsigned char *)pkcs12X509CertCRLBag, sizeof pkcs12X509CertCRLBag } , SEC_OID_PKCS12_X509_CERT_CRL_BAG, "PKCS #12 X509 Cert CRL Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
999 | "PKCS #12 X509 Cert CRL Bag",{ { siDEROID, (unsigned char *)pkcs12X509CertCRLBag, sizeof pkcs12X509CertCRLBag } , SEC_OID_PKCS12_X509_CERT_CRL_BAG, "PKCS #12 X509 Cert CRL Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1000 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12X509CertCRLBag, sizeof pkcs12X509CertCRLBag } , SEC_OID_PKCS12_X509_CERT_CRL_BAG, "PKCS #12 X509 Cert CRL Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1001 | OD(pkcs12SDSICertBag, SEC_OID_PKCS12_SDSI_CERT_BAG,{ { siDEROID, (unsigned char *)pkcs12SDSICertBag, sizeof pkcs12SDSICertBag } , SEC_OID_PKCS12_SDSI_CERT_BAG, "PKCS #12 SDSI Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1002 | "PKCS #12 SDSI Cert Bag",{ { siDEROID, (unsigned char *)pkcs12SDSICertBag, sizeof pkcs12SDSICertBag } , SEC_OID_PKCS12_SDSI_CERT_BAG, "PKCS #12 SDSI Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1003 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12SDSICertBag, sizeof pkcs12SDSICertBag } , SEC_OID_PKCS12_SDSI_CERT_BAG, "PKCS #12 SDSI Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1004 | OD(pkcs12PBEWithSha1And128BitRC4,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC4, sizeof pkcs12PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 128 Bit RC4", 0x80000007UL, INVALID_CERT_EXTENSION } |
1005 | SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC4, sizeof pkcs12PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 128 Bit RC4", 0x80000007UL, INVALID_CERT_EXTENSION } |
1006 | "PKCS #12 PBE With SHA-1 and 128 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC4, sizeof pkcs12PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 128 Bit RC4", 0x80000007UL, INVALID_CERT_EXTENSION } |
1007 | CKM_NSS_PBE_SHA1_128_BIT_RC4, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC4, sizeof pkcs12PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 128 Bit RC4", 0x80000007UL, INVALID_CERT_EXTENSION }, |
1008 | OD(pkcs12PBEWithSha1And40BitRC4,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC4, sizeof pkcs12PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 40 Bit RC4", 0x80000006UL, INVALID_CERT_EXTENSION } |
1009 | SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC4, sizeof pkcs12PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 40 Bit RC4", 0x80000006UL, INVALID_CERT_EXTENSION } |
1010 | "PKCS #12 PBE With SHA-1 and 40 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC4, sizeof pkcs12PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 40 Bit RC4", 0x80000006UL, INVALID_CERT_EXTENSION } |
1011 | CKM_NSS_PBE_SHA1_40_BIT_RC4, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC4, sizeof pkcs12PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 PBE With SHA-1 and 40 Bit RC4", 0x80000006UL, INVALID_CERT_EXTENSION }, |
1012 | OD(pkcs12PBEWithSha1AndTripleDESCBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1AndTripleDESCBC , sizeof pkcs12PBEWithSha1AndTripleDESCBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC , "PKCS #12 PBE With SHA-1 and Triple DES-CBC", 0x80000003UL, INVALID_CERT_EXTENSION } |
1013 | SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1AndTripleDESCBC , sizeof pkcs12PBEWithSha1AndTripleDESCBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC , "PKCS #12 PBE With SHA-1 and Triple DES-CBC", 0x80000003UL, INVALID_CERT_EXTENSION } |
1014 | "PKCS #12 PBE With SHA-1 and Triple DES-CBC",{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1AndTripleDESCBC , sizeof pkcs12PBEWithSha1AndTripleDESCBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC , "PKCS #12 PBE With SHA-1 and Triple DES-CBC", 0x80000003UL, INVALID_CERT_EXTENSION } |
1015 | CKM_NSS_PBE_SHA1_TRIPLE_DES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEWithSha1AndTripleDESCBC , sizeof pkcs12PBEWithSha1AndTripleDESCBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC , "PKCS #12 PBE With SHA-1 and Triple DES-CBC", 0x80000003UL, INVALID_CERT_EXTENSION }, |
1016 | OD(pkcs12PBEWithSha1And128BitRC2CBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC2CBC , sizeof pkcs12PBEWithSha1And128BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 128 Bit RC2 CBC", 0x80000005UL , INVALID_CERT_EXTENSION } |
1017 | SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC2CBC , sizeof pkcs12PBEWithSha1And128BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 128 Bit RC2 CBC", 0x80000005UL , INVALID_CERT_EXTENSION } |
1018 | "PKCS #12 PBE With SHA-1 and 128 Bit RC2 CBC",{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC2CBC , sizeof pkcs12PBEWithSha1And128BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 128 Bit RC2 CBC", 0x80000005UL , INVALID_CERT_EXTENSION } |
1019 | CKM_NSS_PBE_SHA1_128_BIT_RC2_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And128BitRC2CBC , sizeof pkcs12PBEWithSha1And128BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 128 Bit RC2 CBC", 0x80000005UL , INVALID_CERT_EXTENSION }, |
1020 | OD(pkcs12PBEWithSha1And40BitRC2CBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC2CBC , sizeof pkcs12PBEWithSha1And40BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 40 Bit RC2 CBC", 0x80000004UL, INVALID_CERT_EXTENSION } |
1021 | SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC,{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC2CBC , sizeof pkcs12PBEWithSha1And40BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 40 Bit RC2 CBC", 0x80000004UL, INVALID_CERT_EXTENSION } |
1022 | "PKCS #12 PBE With SHA-1 and 40 Bit RC2 CBC",{ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC2CBC , sizeof pkcs12PBEWithSha1And40BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 40 Bit RC2 CBC", 0x80000004UL, INVALID_CERT_EXTENSION } |
1023 | CKM_NSS_PBE_SHA1_40_BIT_RC2_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PBEWithSha1And40BitRC2CBC , sizeof pkcs12PBEWithSha1And40BitRC2CBC } , SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 PBE With SHA-1 and 40 Bit RC2 CBC", 0x80000004UL, INVALID_CERT_EXTENSION }, |
1024 | OD(pkcs12RSAEncryptionWith128BitRC4,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith128BitRC4 , sizeof pkcs12RSAEncryptionWith128BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 , "PKCS #12 RSA Encryption with 128 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1025 | SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith128BitRC4 , sizeof pkcs12RSAEncryptionWith128BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 , "PKCS #12 RSA Encryption with 128 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1026 | "PKCS #12 RSA Encryption with 128 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith128BitRC4 , sizeof pkcs12RSAEncryptionWith128BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 , "PKCS #12 RSA Encryption with 128 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1027 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith128BitRC4 , sizeof pkcs12RSAEncryptionWith128BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4 , "PKCS #12 RSA Encryption with 128 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1028 | OD(pkcs12RSAEncryptionWith40BitRC4,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith40BitRC4 , sizeof pkcs12RSAEncryptionWith40BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 , "PKCS #12 RSA Encryption with 40 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1029 | SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith40BitRC4 , sizeof pkcs12RSAEncryptionWith40BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 , "PKCS #12 RSA Encryption with 40 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1030 | "PKCS #12 RSA Encryption with 40 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith40BitRC4 , sizeof pkcs12RSAEncryptionWith40BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 , "PKCS #12 RSA Encryption with 40 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1031 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWith40BitRC4 , sizeof pkcs12RSAEncryptionWith40BitRC4 } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4 , "PKCS #12 RSA Encryption with 40 Bit RC4", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1032 | OD(pkcs12RSAEncryptionWithTripleDES,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWithTripleDES , sizeof pkcs12RSAEncryptionWithTripleDES } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1033 | SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES,{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWithTripleDES , sizeof pkcs12RSAEncryptionWithTripleDES } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1034 | "PKCS #12 RSA Encryption with Triple DES",{ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWithTripleDES , sizeof pkcs12RSAEncryptionWithTripleDES } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1035 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12RSAEncryptionWithTripleDES , sizeof pkcs12RSAEncryptionWithTripleDES } , SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1036 | OD(pkcs12RSASignatureWithSHA1Digest,{ { siDEROID, (unsigned char *)pkcs12RSASignatureWithSHA1Digest , sizeof pkcs12RSASignatureWithSHA1Digest } , SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1037 | SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST,{ { siDEROID, (unsigned char *)pkcs12RSASignatureWithSHA1Digest , sizeof pkcs12RSASignatureWithSHA1Digest } , SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1038 | "PKCS #12 RSA Encryption with Triple DES",{ { siDEROID, (unsigned char *)pkcs12RSASignatureWithSHA1Digest , sizeof pkcs12RSASignatureWithSHA1Digest } , SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1039 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12RSASignatureWithSHA1Digest , sizeof pkcs12RSASignatureWithSHA1Digest } , SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST , "PKCS #12 RSA Encryption with Triple DES", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1040 | |
1041 | /* DSA signatures */ |
1042 | OD(ansix9DSASignature, SEC_OID_ANSIX9_DSA_SIGNATURE,{ { siDEROID, (unsigned char *)ansix9DSASignature, sizeof ansix9DSASignature } , SEC_OID_ANSIX9_DSA_SIGNATURE, "ANSI X9.57 DSA Signature" , 0x00000011UL, INVALID_CERT_EXTENSION } |
1043 | "ANSI X9.57 DSA Signature", CKM_DSA, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix9DSASignature, sizeof ansix9DSASignature } , SEC_OID_ANSIX9_DSA_SIGNATURE, "ANSI X9.57 DSA Signature" , 0x00000011UL, INVALID_CERT_EXTENSION }, |
1044 | OD(ansix9DSASignaturewithSHA1Digest,{ { siDEROID, (unsigned char *)ansix9DSASignaturewithSHA1Digest , sizeof ansix9DSASignaturewithSHA1Digest } , SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST , "ANSI X9.57 DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1045 | SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST,{ { siDEROID, (unsigned char *)ansix9DSASignaturewithSHA1Digest , sizeof ansix9DSASignaturewithSHA1Digest } , SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST , "ANSI X9.57 DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1046 | "ANSI X9.57 DSA Signature with SHA-1 Digest",{ { siDEROID, (unsigned char *)ansix9DSASignaturewithSHA1Digest , sizeof ansix9DSASignaturewithSHA1Digest } , SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST , "ANSI X9.57 DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1047 | CKM_DSA_SHA1, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix9DSASignaturewithSHA1Digest , sizeof ansix9DSASignaturewithSHA1Digest } , SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST , "ANSI X9.57 DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION }, |
1048 | OD(bogusDSASignaturewithSHA1Digest,{ { siDEROID, (unsigned char *)bogusDSASignaturewithSHA1Digest , sizeof bogusDSASignaturewithSHA1Digest } , SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST , "FORTEZZA DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1049 | SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST,{ { siDEROID, (unsigned char *)bogusDSASignaturewithSHA1Digest , sizeof bogusDSASignaturewithSHA1Digest } , SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST , "FORTEZZA DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1050 | "FORTEZZA DSA Signature with SHA-1 Digest",{ { siDEROID, (unsigned char *)bogusDSASignaturewithSHA1Digest , sizeof bogusDSASignaturewithSHA1Digest } , SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST , "FORTEZZA DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION } |
1051 | CKM_DSA_SHA1, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)bogusDSASignaturewithSHA1Digest , sizeof bogusDSASignaturewithSHA1Digest } , SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST , "FORTEZZA DSA Signature with SHA-1 Digest", 0x00000012UL, INVALID_CERT_EXTENSION }, |
1052 | |
1053 | /* verisign oids */ |
1054 | OD(verisignUserNotices, SEC_OID_VERISIGN_USER_NOTICES,{ { siDEROID, (unsigned char *)verisignUserNotices, sizeof verisignUserNotices } , SEC_OID_VERISIGN_USER_NOTICES, "Verisign User Notices", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1055 | "Verisign User Notices",{ { siDEROID, (unsigned char *)verisignUserNotices, sizeof verisignUserNotices } , SEC_OID_VERISIGN_USER_NOTICES, "Verisign User Notices", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1056 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)verisignUserNotices, sizeof verisignUserNotices } , SEC_OID_VERISIGN_USER_NOTICES, "Verisign User Notices", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1057 | |
1058 | /* pkix oids */ |
1059 | OD(pkixCPSPointerQualifier, SEC_OID_PKIX_CPS_POINTER_QUALIFIER,{ { siDEROID, (unsigned char *)pkixCPSPointerQualifier, sizeof pkixCPSPointerQualifier } , SEC_OID_PKIX_CPS_POINTER_QUALIFIER , "PKIX CPS Pointer Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1060 | "PKIX CPS Pointer Qualifier",{ { siDEROID, (unsigned char *)pkixCPSPointerQualifier, sizeof pkixCPSPointerQualifier } , SEC_OID_PKIX_CPS_POINTER_QUALIFIER , "PKIX CPS Pointer Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1061 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixCPSPointerQualifier, sizeof pkixCPSPointerQualifier } , SEC_OID_PKIX_CPS_POINTER_QUALIFIER , "PKIX CPS Pointer Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1062 | OD(pkixUserNoticeQualifier, SEC_OID_PKIX_USER_NOTICE_QUALIFIER,{ { siDEROID, (unsigned char *)pkixUserNoticeQualifier, sizeof pkixUserNoticeQualifier } , SEC_OID_PKIX_USER_NOTICE_QUALIFIER , "PKIX User Notice Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1063 | "PKIX User Notice Qualifier",{ { siDEROID, (unsigned char *)pkixUserNoticeQualifier, sizeof pkixUserNoticeQualifier } , SEC_OID_PKIX_USER_NOTICE_QUALIFIER , "PKIX User Notice Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1064 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixUserNoticeQualifier, sizeof pkixUserNoticeQualifier } , SEC_OID_PKIX_USER_NOTICE_QUALIFIER , "PKIX User Notice Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1065 | |
1066 | OD(pkixOCSP, SEC_OID_PKIX_OCSP,{ { siDEROID, (unsigned char *)pkixOCSP, sizeof pkixOCSP } , SEC_OID_PKIX_OCSP , "PKIX Online Certificate Status Protocol", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1067 | "PKIX Online Certificate Status Protocol",{ { siDEROID, (unsigned char *)pkixOCSP, sizeof pkixOCSP } , SEC_OID_PKIX_OCSP , "PKIX Online Certificate Status Protocol", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1068 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSP, sizeof pkixOCSP } , SEC_OID_PKIX_OCSP , "PKIX Online Certificate Status Protocol", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1069 | OD(pkixOCSPBasicResponse, SEC_OID_PKIX_OCSP_BASIC_RESPONSE,{ { siDEROID, (unsigned char *)pkixOCSPBasicResponse, sizeof pkixOCSPBasicResponse } , SEC_OID_PKIX_OCSP_BASIC_RESPONSE, "OCSP Basic Response", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1070 | "OCSP Basic Response", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPBasicResponse, sizeof pkixOCSPBasicResponse } , SEC_OID_PKIX_OCSP_BASIC_RESPONSE, "OCSP Basic Response", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1071 | OD(pkixOCSPNonce, SEC_OID_PKIX_OCSP_NONCE,{ { siDEROID, (unsigned char *)pkixOCSPNonce, sizeof pkixOCSPNonce } , SEC_OID_PKIX_OCSP_NONCE, "OCSP Nonce Extension", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1072 | "OCSP Nonce Extension", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPNonce, sizeof pkixOCSPNonce } , SEC_OID_PKIX_OCSP_NONCE, "OCSP Nonce Extension", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1073 | OD(pkixOCSPCRL, SEC_OID_PKIX_OCSP_CRL,{ { siDEROID, (unsigned char *)pkixOCSPCRL, sizeof pkixOCSPCRL } , SEC_OID_PKIX_OCSP_CRL, "OCSP CRL Reference Extension", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1074 | "OCSP CRL Reference Extension",{ { siDEROID, (unsigned char *)pkixOCSPCRL, sizeof pkixOCSPCRL } , SEC_OID_PKIX_OCSP_CRL, "OCSP CRL Reference Extension", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1075 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPCRL, sizeof pkixOCSPCRL } , SEC_OID_PKIX_OCSP_CRL, "OCSP CRL Reference Extension", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1076 | OD(pkixOCSPResponse, SEC_OID_PKIX_OCSP_RESPONSE,{ { siDEROID, (unsigned char *)pkixOCSPResponse, sizeof pkixOCSPResponse } , SEC_OID_PKIX_OCSP_RESPONSE, "OCSP Response Types Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1077 | "OCSP Response Types Extension",{ { siDEROID, (unsigned char *)pkixOCSPResponse, sizeof pkixOCSPResponse } , SEC_OID_PKIX_OCSP_RESPONSE, "OCSP Response Types Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1078 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPResponse, sizeof pkixOCSPResponse } , SEC_OID_PKIX_OCSP_RESPONSE, "OCSP Response Types Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1079 | OD(pkixOCSPNoCheck, SEC_OID_PKIX_OCSP_NO_CHECK,{ { siDEROID, (unsigned char *)pkixOCSPNoCheck, sizeof pkixOCSPNoCheck } , SEC_OID_PKIX_OCSP_NO_CHECK, "OCSP No Check Extension", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
1080 | "OCSP No Check Extension",{ { siDEROID, (unsigned char *)pkixOCSPNoCheck, sizeof pkixOCSPNoCheck } , SEC_OID_PKIX_OCSP_NO_CHECK, "OCSP No Check Extension", 0xffffffffUL , SUPPORTED_CERT_EXTENSION } |
1081 | CKM_INVALID_MECHANISM, SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPNoCheck, sizeof pkixOCSPNoCheck } , SEC_OID_PKIX_OCSP_NO_CHECK, "OCSP No Check Extension", 0xffffffffUL , SUPPORTED_CERT_EXTENSION }, |
1082 | OD(pkixOCSPArchiveCutoff, SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF,{ { siDEROID, (unsigned char *)pkixOCSPArchiveCutoff, sizeof pkixOCSPArchiveCutoff } , SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF, "OCSP Archive Cutoff Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1083 | "OCSP Archive Cutoff Extension",{ { siDEROID, (unsigned char *)pkixOCSPArchiveCutoff, sizeof pkixOCSPArchiveCutoff } , SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF, "OCSP Archive Cutoff Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1084 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPArchiveCutoff, sizeof pkixOCSPArchiveCutoff } , SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF, "OCSP Archive Cutoff Extension" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1085 | OD(pkixOCSPServiceLocator, SEC_OID_PKIX_OCSP_SERVICE_LOCATOR,{ { siDEROID, (unsigned char *)pkixOCSPServiceLocator, sizeof pkixOCSPServiceLocator } , SEC_OID_PKIX_OCSP_SERVICE_LOCATOR , "OCSP Service Locator Extension", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1086 | "OCSP Service Locator Extension",{ { siDEROID, (unsigned char *)pkixOCSPServiceLocator, sizeof pkixOCSPServiceLocator } , SEC_OID_PKIX_OCSP_SERVICE_LOCATOR , "OCSP Service Locator Extension", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1087 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPServiceLocator, sizeof pkixOCSPServiceLocator } , SEC_OID_PKIX_OCSP_SERVICE_LOCATOR , "OCSP Service Locator Extension", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1088 | |
1089 | OD(pkixRegCtrlRegToken, SEC_OID_PKIX_REGCTRL_REGTOKEN,{ { siDEROID, (unsigned char *)pkixRegCtrlRegToken, sizeof pkixRegCtrlRegToken } , SEC_OID_PKIX_REGCTRL_REGTOKEN, "PKIX CRMF Registration Control, Registration Token" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1090 | "PKIX CRMF Registration Control, Registration Token",{ { siDEROID, (unsigned char *)pkixRegCtrlRegToken, sizeof pkixRegCtrlRegToken } , SEC_OID_PKIX_REGCTRL_REGTOKEN, "PKIX CRMF Registration Control, Registration Token" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1091 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlRegToken, sizeof pkixRegCtrlRegToken } , SEC_OID_PKIX_REGCTRL_REGTOKEN, "PKIX CRMF Registration Control, Registration Token" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1092 | OD(pkixRegCtrlAuthenticator, SEC_OID_PKIX_REGCTRL_AUTHENTICATOR,{ { siDEROID, (unsigned char *)pkixRegCtrlAuthenticator, sizeof pkixRegCtrlAuthenticator } , SEC_OID_PKIX_REGCTRL_AUTHENTICATOR , "PKIX CRMF Registration Control, Registration Authenticator" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1093 | "PKIX CRMF Registration Control, Registration Authenticator",{ { siDEROID, (unsigned char *)pkixRegCtrlAuthenticator, sizeof pkixRegCtrlAuthenticator } , SEC_OID_PKIX_REGCTRL_AUTHENTICATOR , "PKIX CRMF Registration Control, Registration Authenticator" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1094 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlAuthenticator, sizeof pkixRegCtrlAuthenticator } , SEC_OID_PKIX_REGCTRL_AUTHENTICATOR , "PKIX CRMF Registration Control, Registration Authenticator" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1095 | OD(pkixRegCtrlPKIPubInfo, SEC_OID_PKIX_REGCTRL_PKIPUBINFO,{ { siDEROID, (unsigned char *)pkixRegCtrlPKIPubInfo, sizeof pkixRegCtrlPKIPubInfo } , SEC_OID_PKIX_REGCTRL_PKIPUBINFO, "PKIX CRMF Registration Control, PKI Publication Info" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1096 | "PKIX CRMF Registration Control, PKI Publication Info",{ { siDEROID, (unsigned char *)pkixRegCtrlPKIPubInfo, sizeof pkixRegCtrlPKIPubInfo } , SEC_OID_PKIX_REGCTRL_PKIPUBINFO, "PKIX CRMF Registration Control, PKI Publication Info" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1097 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlPKIPubInfo, sizeof pkixRegCtrlPKIPubInfo } , SEC_OID_PKIX_REGCTRL_PKIPUBINFO, "PKIX CRMF Registration Control, PKI Publication Info" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1098 | OD(pkixRegCtrlPKIArchOptions,{ { siDEROID, (unsigned char *)pkixRegCtrlPKIArchOptions, sizeof pkixRegCtrlPKIArchOptions } , SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS , "PKIX CRMF Registration Control, PKI Archive Options", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1099 | SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS,{ { siDEROID, (unsigned char *)pkixRegCtrlPKIArchOptions, sizeof pkixRegCtrlPKIArchOptions } , SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS , "PKIX CRMF Registration Control, PKI Archive Options", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1100 | "PKIX CRMF Registration Control, PKI Archive Options",{ { siDEROID, (unsigned char *)pkixRegCtrlPKIArchOptions, sizeof pkixRegCtrlPKIArchOptions } , SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS , "PKIX CRMF Registration Control, PKI Archive Options", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1101 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlPKIArchOptions, sizeof pkixRegCtrlPKIArchOptions } , SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS , "PKIX CRMF Registration Control, PKI Archive Options", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1102 | OD(pkixRegCtrlOldCertID, SEC_OID_PKIX_REGCTRL_OLD_CERT_ID,{ { siDEROID, (unsigned char *)pkixRegCtrlOldCertID, sizeof pkixRegCtrlOldCertID } , SEC_OID_PKIX_REGCTRL_OLD_CERT_ID, "PKIX CRMF Registration Control, Old Certificate ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1103 | "PKIX CRMF Registration Control, Old Certificate ID",{ { siDEROID, (unsigned char *)pkixRegCtrlOldCertID, sizeof pkixRegCtrlOldCertID } , SEC_OID_PKIX_REGCTRL_OLD_CERT_ID, "PKIX CRMF Registration Control, Old Certificate ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1104 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlOldCertID, sizeof pkixRegCtrlOldCertID } , SEC_OID_PKIX_REGCTRL_OLD_CERT_ID, "PKIX CRMF Registration Control, Old Certificate ID" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1105 | OD(pkixRegCtrlProtEncKey, SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY,{ { siDEROID, (unsigned char *)pkixRegCtrlProtEncKey, sizeof pkixRegCtrlProtEncKey } , SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY, "PKIX CRMF Registration Control, Protocol Encryption Key" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1106 | "PKIX CRMF Registration Control, Protocol Encryption Key",{ { siDEROID, (unsigned char *)pkixRegCtrlProtEncKey, sizeof pkixRegCtrlProtEncKey } , SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY, "PKIX CRMF Registration Control, Protocol Encryption Key" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1107 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegCtrlProtEncKey, sizeof pkixRegCtrlProtEncKey } , SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY, "PKIX CRMF Registration Control, Protocol Encryption Key" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1108 | OD(pkixRegInfoUTF8Pairs, SEC_OID_PKIX_REGINFO_UTF8_PAIRS,{ { siDEROID, (unsigned char *)pkixRegInfoUTF8Pairs, sizeof pkixRegInfoUTF8Pairs } , SEC_OID_PKIX_REGINFO_UTF8_PAIRS, "PKIX CRMF Registration Info, UTF8 Pairs" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1109 | "PKIX CRMF Registration Info, UTF8 Pairs",{ { siDEROID, (unsigned char *)pkixRegInfoUTF8Pairs, sizeof pkixRegInfoUTF8Pairs } , SEC_OID_PKIX_REGINFO_UTF8_PAIRS, "PKIX CRMF Registration Info, UTF8 Pairs" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1110 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegInfoUTF8Pairs, sizeof pkixRegInfoUTF8Pairs } , SEC_OID_PKIX_REGINFO_UTF8_PAIRS, "PKIX CRMF Registration Info, UTF8 Pairs" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1111 | OD(pkixRegInfoCertReq, SEC_OID_PKIX_REGINFO_CERT_REQUEST,{ { siDEROID, (unsigned char *)pkixRegInfoCertReq, sizeof pkixRegInfoCertReq } , SEC_OID_PKIX_REGINFO_CERT_REQUEST, "PKIX CRMF Registration Info, Certificate Request" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1112 | "PKIX CRMF Registration Info, Certificate Request",{ { siDEROID, (unsigned char *)pkixRegInfoCertReq, sizeof pkixRegInfoCertReq } , SEC_OID_PKIX_REGINFO_CERT_REQUEST, "PKIX CRMF Registration Info, Certificate Request" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1113 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixRegInfoCertReq, sizeof pkixRegInfoCertReq } , SEC_OID_PKIX_REGINFO_CERT_REQUEST, "PKIX CRMF Registration Info, Certificate Request" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1114 | OD(pkixExtendedKeyUsageServerAuth,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageServerAuth , sizeof pkixExtendedKeyUsageServerAuth } , SEC_OID_EXT_KEY_USAGE_SERVER_AUTH , "TLS Web Server Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1115 | SEC_OID_EXT_KEY_USAGE_SERVER_AUTH,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageServerAuth , sizeof pkixExtendedKeyUsageServerAuth } , SEC_OID_EXT_KEY_USAGE_SERVER_AUTH , "TLS Web Server Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1116 | "TLS Web Server Authentication Certificate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageServerAuth , sizeof pkixExtendedKeyUsageServerAuth } , SEC_OID_EXT_KEY_USAGE_SERVER_AUTH , "TLS Web Server Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1117 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageServerAuth , sizeof pkixExtendedKeyUsageServerAuth } , SEC_OID_EXT_KEY_USAGE_SERVER_AUTH , "TLS Web Server Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1118 | OD(pkixExtendedKeyUsageClientAuth,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageClientAuth , sizeof pkixExtendedKeyUsageClientAuth } , SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH , "TLS Web Client Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1119 | SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageClientAuth , sizeof pkixExtendedKeyUsageClientAuth } , SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH , "TLS Web Client Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1120 | "TLS Web Client Authentication Certificate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageClientAuth , sizeof pkixExtendedKeyUsageClientAuth } , SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH , "TLS Web Client Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1121 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageClientAuth , sizeof pkixExtendedKeyUsageClientAuth } , SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH , "TLS Web Client Authentication Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1122 | OD(pkixExtendedKeyUsageCodeSign, SEC_OID_EXT_KEY_USAGE_CODE_SIGN,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageCodeSign, sizeof pkixExtendedKeyUsageCodeSign } , SEC_OID_EXT_KEY_USAGE_CODE_SIGN , "Code Signing Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1123 | "Code Signing Certificate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageCodeSign, sizeof pkixExtendedKeyUsageCodeSign } , SEC_OID_EXT_KEY_USAGE_CODE_SIGN , "Code Signing Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1124 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageCodeSign, sizeof pkixExtendedKeyUsageCodeSign } , SEC_OID_EXT_KEY_USAGE_CODE_SIGN , "Code Signing Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1125 | OD(pkixExtendedKeyUsageEMailProtect,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageEMailProtect , sizeof pkixExtendedKeyUsageEMailProtect } , SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT , "E-Mail Protection Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1126 | SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageEMailProtect , sizeof pkixExtendedKeyUsageEMailProtect } , SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT , "E-Mail Protection Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1127 | "E-Mail Protection Certificate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageEMailProtect , sizeof pkixExtendedKeyUsageEMailProtect } , SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT , "E-Mail Protection Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1128 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageEMailProtect , sizeof pkixExtendedKeyUsageEMailProtect } , SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT , "E-Mail Protection Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1129 | OD(pkixExtendedKeyUsageTimeStamp,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageTimeStamp, sizeof pkixExtendedKeyUsageTimeStamp } , SEC_OID_EXT_KEY_USAGE_TIME_STAMP , "Time Stamping Certifcate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1130 | SEC_OID_EXT_KEY_USAGE_TIME_STAMP,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageTimeStamp, sizeof pkixExtendedKeyUsageTimeStamp } , SEC_OID_EXT_KEY_USAGE_TIME_STAMP , "Time Stamping Certifcate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1131 | "Time Stamping Certifcate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageTimeStamp, sizeof pkixExtendedKeyUsageTimeStamp } , SEC_OID_EXT_KEY_USAGE_TIME_STAMP , "Time Stamping Certifcate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1132 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageTimeStamp, sizeof pkixExtendedKeyUsageTimeStamp } , SEC_OID_EXT_KEY_USAGE_TIME_STAMP , "Time Stamping Certifcate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1133 | OD(pkixOCSPResponderExtendedKeyUsage, SEC_OID_OCSP_RESPONDER,{ { siDEROID, (unsigned char *)pkixOCSPResponderExtendedKeyUsage , sizeof pkixOCSPResponderExtendedKeyUsage } , SEC_OID_OCSP_RESPONDER , "OCSP Responder Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1134 | "OCSP Responder Certificate",{ { siDEROID, (unsigned char *)pkixOCSPResponderExtendedKeyUsage , sizeof pkixOCSPResponderExtendedKeyUsage } , SEC_OID_OCSP_RESPONDER , "OCSP Responder Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1135 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixOCSPResponderExtendedKeyUsage , sizeof pkixOCSPResponderExtendedKeyUsage } , SEC_OID_OCSP_RESPONDER , "OCSP Responder Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1136 | |
1137 | /* Netscape Algorithm OIDs */ |
1138 | |
1139 | OD(netscapeSMimeKEA, SEC_OID_NETSCAPE_SMIME_KEA,{ { siDEROID, (unsigned char *)netscapeSMimeKEA, sizeof netscapeSMimeKEA } , SEC_OID_NETSCAPE_SMIME_KEA, "Netscape S/MIME KEA", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1140 | "Netscape S/MIME KEA", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)netscapeSMimeKEA, sizeof netscapeSMimeKEA } , SEC_OID_NETSCAPE_SMIME_KEA, "Netscape S/MIME KEA", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1141 | |
1142 | /* Skipjack OID -- ### mwelch temporary */ |
1143 | OD(skipjackCBC, SEC_OID_FORTEZZA_SKIPJACK,{ { siDEROID, (unsigned char *)skipjackCBC, sizeof skipjackCBC } , SEC_OID_FORTEZZA_SKIPJACK, "Skipjack CBC64", 0x00001002UL , INVALID_CERT_EXTENSION } |
1144 | "Skipjack CBC64", CKM_SKIPJACK_CBC64, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)skipjackCBC, sizeof skipjackCBC } , SEC_OID_FORTEZZA_SKIPJACK, "Skipjack CBC64", 0x00001002UL , INVALID_CERT_EXTENSION }, |
1145 | |
1146 | /* pkcs12 v2 oids */ |
1147 | OD(pkcs12V2PBEWithSha1And128BitRC4,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC4 , sizeof pkcs12V2PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4", 0x000003A6UL, INVALID_CERT_EXTENSION } |
1148 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC4 , sizeof pkcs12V2PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4", 0x000003A6UL, INVALID_CERT_EXTENSION } |
1149 | "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC4 , sizeof pkcs12V2PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4", 0x000003A6UL, INVALID_CERT_EXTENSION } |
1150 | CKM_PBE_SHA1_RC4_128, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC4 , sizeof pkcs12V2PBEWithSha1And128BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4", 0x000003A6UL, INVALID_CERT_EXTENSION }, |
1151 | OD(pkcs12V2PBEWithSha1And40BitRC4,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC4 , sizeof pkcs12V2PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4", 0x000003A7UL, INVALID_CERT_EXTENSION } |
1152 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC4 , sizeof pkcs12V2PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4", 0x000003A7UL, INVALID_CERT_EXTENSION } |
1153 | "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC4 , sizeof pkcs12V2PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4", 0x000003A7UL, INVALID_CERT_EXTENSION } |
1154 | CKM_PBE_SHA1_RC4_40, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC4 , sizeof pkcs12V2PBEWithSha1And40BitRC4 } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4", 0x000003A7UL, INVALID_CERT_EXTENSION }, |
1155 | OD(pkcs12V2PBEWithSha1And3KeyTripleDEScbc,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And3KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And3KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC", 0x000003A8UL , INVALID_CERT_EXTENSION } |
1156 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And3KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And3KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC", 0x000003A8UL , INVALID_CERT_EXTENSION } |
1157 | "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And3KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And3KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC", 0x000003A8UL , INVALID_CERT_EXTENSION } |
1158 | CKM_PBE_SHA1_DES3_EDE_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And3KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And3KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC", 0x000003A8UL , INVALID_CERT_EXTENSION }, |
1159 | OD(pkcs12V2PBEWithSha1And2KeyTripleDEScbc,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And2KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And2KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 2KEY Triple DES-CBC", 0x000003A9UL , INVALID_CERT_EXTENSION } |
1160 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And2KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And2KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 2KEY Triple DES-CBC", 0x000003A9UL , INVALID_CERT_EXTENSION } |
1161 | "PKCS #12 V2 PBE With SHA-1 And 2KEY Triple DES-CBC",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And2KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And2KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 2KEY Triple DES-CBC", 0x000003A9UL , INVALID_CERT_EXTENSION } |
1162 | CKM_PBE_SHA1_DES2_EDE_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And2KeyTripleDEScbc , sizeof pkcs12V2PBEWithSha1And2KeyTripleDEScbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC , "PKCS #12 V2 PBE With SHA-1 And 2KEY Triple DES-CBC", 0x000003A9UL , INVALID_CERT_EXTENSION }, |
1163 | OD(pkcs12V2PBEWithSha1And128BitRC2cbc,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC2cbc , sizeof pkcs12V2PBEWithSha1And128BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC", 0x000003AAUL , INVALID_CERT_EXTENSION } |
1164 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC2cbc , sizeof pkcs12V2PBEWithSha1And128BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC", 0x000003AAUL , INVALID_CERT_EXTENSION } |
1165 | "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC2cbc , sizeof pkcs12V2PBEWithSha1And128BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC", 0x000003AAUL , INVALID_CERT_EXTENSION } |
1166 | CKM_PBE_SHA1_RC2_128_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And128BitRC2cbc , sizeof pkcs12V2PBEWithSha1And128BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC", 0x000003AAUL , INVALID_CERT_EXTENSION }, |
1167 | OD(pkcs12V2PBEWithSha1And40BitRC2cbc,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC2cbc , sizeof pkcs12V2PBEWithSha1And40BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC", 0x000003ABUL , INVALID_CERT_EXTENSION } |
1168 | SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC,{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC2cbc , sizeof pkcs12V2PBEWithSha1And40BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC", 0x000003ABUL , INVALID_CERT_EXTENSION } |
1169 | "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC",{ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC2cbc , sizeof pkcs12V2PBEWithSha1And40BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC", 0x000003ABUL , INVALID_CERT_EXTENSION } |
1170 | CKM_PBE_SHA1_RC2_40_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V2PBEWithSha1And40BitRC2cbc , sizeof pkcs12V2PBEWithSha1And40BitRC2cbc } , SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC , "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC", 0x000003ABUL , INVALID_CERT_EXTENSION }, |
1171 | OD(pkcs12SafeContentsID, SEC_OID_PKCS12_SAFE_CONTENTS_ID,{ { siDEROID, (unsigned char *)pkcs12SafeContentsID, sizeof pkcs12SafeContentsID } , SEC_OID_PKCS12_SAFE_CONTENTS_ID, "PKCS #12 Safe Contents ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1172 | "PKCS #12 Safe Contents ID",{ { siDEROID, (unsigned char *)pkcs12SafeContentsID, sizeof pkcs12SafeContentsID } , SEC_OID_PKCS12_SAFE_CONTENTS_ID, "PKCS #12 Safe Contents ID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1173 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12SafeContentsID, sizeof pkcs12SafeContentsID } , SEC_OID_PKCS12_SAFE_CONTENTS_ID, "PKCS #12 Safe Contents ID" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1174 | OD(pkcs12PKCS8ShroudedKeyBagID,{ { siDEROID, (unsigned char *)pkcs12PKCS8ShroudedKeyBagID, sizeof pkcs12PKCS8ShroudedKeyBagID } , SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 Safe Contents ID", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1175 | SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12PKCS8ShroudedKeyBagID, sizeof pkcs12PKCS8ShroudedKeyBagID } , SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 Safe Contents ID", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1176 | "PKCS #12 Safe Contents ID",{ { siDEROID, (unsigned char *)pkcs12PKCS8ShroudedKeyBagID, sizeof pkcs12PKCS8ShroudedKeyBagID } , SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 Safe Contents ID", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1177 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12PKCS8ShroudedKeyBagID, sizeof pkcs12PKCS8ShroudedKeyBagID } , SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 Safe Contents ID", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1178 | OD(pkcs12V1KeyBag, SEC_OID_PKCS12_V1_KEY_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1KeyBag, sizeof pkcs12V1KeyBag } , SEC_OID_PKCS12_V1_KEY_BAG_ID, "PKCS #12 V1 Key Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1179 | "PKCS #12 V1 Key Bag",{ { siDEROID, (unsigned char *)pkcs12V1KeyBag, sizeof pkcs12V1KeyBag } , SEC_OID_PKCS12_V1_KEY_BAG_ID, "PKCS #12 V1 Key Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1180 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1KeyBag, sizeof pkcs12V1KeyBag } , SEC_OID_PKCS12_V1_KEY_BAG_ID, "PKCS #12 V1 Key Bag", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1181 | OD(pkcs12V1PKCS8ShroudedKeyBag,{ { siDEROID, (unsigned char *)pkcs12V1PKCS8ShroudedKeyBag, sizeof pkcs12V1PKCS8ShroudedKeyBag } , SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 V1 PKCS8 Shrouded Key Bag", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1182 | SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1PKCS8ShroudedKeyBag, sizeof pkcs12V1PKCS8ShroudedKeyBag } , SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 V1 PKCS8 Shrouded Key Bag", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1183 | "PKCS #12 V1 PKCS8 Shrouded Key Bag",{ { siDEROID, (unsigned char *)pkcs12V1PKCS8ShroudedKeyBag, sizeof pkcs12V1PKCS8ShroudedKeyBag } , SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 V1 PKCS8 Shrouded Key Bag", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1184 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1PKCS8ShroudedKeyBag, sizeof pkcs12V1PKCS8ShroudedKeyBag } , SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID , "PKCS #12 V1 PKCS8 Shrouded Key Bag", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1185 | OD(pkcs12V1CertBag, SEC_OID_PKCS12_V1_CERT_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1CertBag, sizeof pkcs12V1CertBag } , SEC_OID_PKCS12_V1_CERT_BAG_ID, "PKCS #12 V1 Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1186 | "PKCS #12 V1 Cert Bag",{ { siDEROID, (unsigned char *)pkcs12V1CertBag, sizeof pkcs12V1CertBag } , SEC_OID_PKCS12_V1_CERT_BAG_ID, "PKCS #12 V1 Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1187 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1CertBag, sizeof pkcs12V1CertBag } , SEC_OID_PKCS12_V1_CERT_BAG_ID, "PKCS #12 V1 Cert Bag", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1188 | OD(pkcs12V1CRLBag, SEC_OID_PKCS12_V1_CRL_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1CRLBag, sizeof pkcs12V1CRLBag } , SEC_OID_PKCS12_V1_CRL_BAG_ID, "PKCS #12 V1 CRL Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1189 | "PKCS #12 V1 CRL Bag",{ { siDEROID, (unsigned char *)pkcs12V1CRLBag, sizeof pkcs12V1CRLBag } , SEC_OID_PKCS12_V1_CRL_BAG_ID, "PKCS #12 V1 CRL Bag", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1190 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1CRLBag, sizeof pkcs12V1CRLBag } , SEC_OID_PKCS12_V1_CRL_BAG_ID, "PKCS #12 V1 CRL Bag", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1191 | OD(pkcs12V1SecretBag, SEC_OID_PKCS12_V1_SECRET_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1SecretBag, sizeof pkcs12V1SecretBag } , SEC_OID_PKCS12_V1_SECRET_BAG_ID, "PKCS #12 V1 Secret Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1192 | "PKCS #12 V1 Secret Bag",{ { siDEROID, (unsigned char *)pkcs12V1SecretBag, sizeof pkcs12V1SecretBag } , SEC_OID_PKCS12_V1_SECRET_BAG_ID, "PKCS #12 V1 Secret Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1193 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1SecretBag, sizeof pkcs12V1SecretBag } , SEC_OID_PKCS12_V1_SECRET_BAG_ID, "PKCS #12 V1 Secret Bag" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1194 | OD(pkcs12V1SafeContentsBag, SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID,{ { siDEROID, (unsigned char *)pkcs12V1SafeContentsBag, sizeof pkcs12V1SafeContentsBag } , SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID , "PKCS #12 V1 Safe Contents Bag", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1195 | "PKCS #12 V1 Safe Contents Bag",{ { siDEROID, (unsigned char *)pkcs12V1SafeContentsBag, sizeof pkcs12V1SafeContentsBag } , SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID , "PKCS #12 V1 Safe Contents Bag", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1196 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12V1SafeContentsBag, sizeof pkcs12V1SafeContentsBag } , SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID , "PKCS #12 V1 Safe Contents Bag", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1197 | |
1198 | OD(pkcs9X509Certificate, SEC_OID_PKCS9_X509_CERT,{ { siDEROID, (unsigned char *)pkcs9X509Certificate, sizeof pkcs9X509Certificate } , SEC_OID_PKCS9_X509_CERT, "PKCS #9 X509 Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1199 | "PKCS #9 X509 Certificate",{ { siDEROID, (unsigned char *)pkcs9X509Certificate, sizeof pkcs9X509Certificate } , SEC_OID_PKCS9_X509_CERT, "PKCS #9 X509 Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1200 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9X509Certificate, sizeof pkcs9X509Certificate } , SEC_OID_PKCS9_X509_CERT, "PKCS #9 X509 Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1201 | OD(pkcs9SDSICertificate, SEC_OID_PKCS9_SDSI_CERT,{ { siDEROID, (unsigned char *)pkcs9SDSICertificate, sizeof pkcs9SDSICertificate } , SEC_OID_PKCS9_SDSI_CERT, "PKCS #9 SDSI Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1202 | "PKCS #9 SDSI Certificate",{ { siDEROID, (unsigned char *)pkcs9SDSICertificate, sizeof pkcs9SDSICertificate } , SEC_OID_PKCS9_SDSI_CERT, "PKCS #9 SDSI Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1203 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9SDSICertificate, sizeof pkcs9SDSICertificate } , SEC_OID_PKCS9_SDSI_CERT, "PKCS #9 SDSI Certificate", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1204 | OD(pkcs9X509CRL, SEC_OID_PKCS9_X509_CRL,{ { siDEROID, (unsigned char *)pkcs9X509CRL, sizeof pkcs9X509CRL } , SEC_OID_PKCS9_X509_CRL, "PKCS #9 X509 CRL", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1205 | "PKCS #9 X509 CRL", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9X509CRL, sizeof pkcs9X509CRL } , SEC_OID_PKCS9_X509_CRL, "PKCS #9 X509 CRL", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1206 | OD(pkcs9FriendlyName, SEC_OID_PKCS9_FRIENDLY_NAME,{ { siDEROID, (unsigned char *)pkcs9FriendlyName, sizeof pkcs9FriendlyName } , SEC_OID_PKCS9_FRIENDLY_NAME, "PKCS #9 Friendly Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1207 | "PKCS #9 Friendly Name",{ { siDEROID, (unsigned char *)pkcs9FriendlyName, sizeof pkcs9FriendlyName } , SEC_OID_PKCS9_FRIENDLY_NAME, "PKCS #9 Friendly Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1208 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9FriendlyName, sizeof pkcs9FriendlyName } , SEC_OID_PKCS9_FRIENDLY_NAME, "PKCS #9 Friendly Name", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1209 | OD(pkcs9LocalKeyID, SEC_OID_PKCS9_LOCAL_KEY_ID,{ { siDEROID, (unsigned char *)pkcs9LocalKeyID, sizeof pkcs9LocalKeyID } , SEC_OID_PKCS9_LOCAL_KEY_ID, "PKCS #9 Local Key ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1210 | "PKCS #9 Local Key ID",{ { siDEROID, (unsigned char *)pkcs9LocalKeyID, sizeof pkcs9LocalKeyID } , SEC_OID_PKCS9_LOCAL_KEY_ID, "PKCS #9 Local Key ID", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1211 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9LocalKeyID, sizeof pkcs9LocalKeyID } , SEC_OID_PKCS9_LOCAL_KEY_ID, "PKCS #9 Local Key ID", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1212 | OD(pkcs12KeyUsageAttr, SEC_OID_BOGUS_KEY_USAGE,{ { siDEROID, (unsigned char *)pkcs12KeyUsageAttr, sizeof pkcs12KeyUsageAttr } , SEC_OID_BOGUS_KEY_USAGE, "Bogus Key Usage", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1213 | "Bogus Key Usage", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs12KeyUsageAttr, sizeof pkcs12KeyUsageAttr } , SEC_OID_BOGUS_KEY_USAGE, "Bogus Key Usage", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1214 | OD(dhPublicKey, SEC_OID_X942_DIFFIE_HELMAN_KEY,{ { siDEROID, (unsigned char *)dhPublicKey, sizeof dhPublicKey } , SEC_OID_X942_DIFFIE_HELMAN_KEY, "Diffie-Helman Public Key" , 0x00000021UL, INVALID_CERT_EXTENSION } |
1215 | "Diffie-Helman Public Key", CKM_DH_PKCS_DERIVE,{ { siDEROID, (unsigned char *)dhPublicKey, sizeof dhPublicKey } , SEC_OID_X942_DIFFIE_HELMAN_KEY, "Diffie-Helman Public Key" , 0x00000021UL, INVALID_CERT_EXTENSION } |
1216 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhPublicKey, sizeof dhPublicKey } , SEC_OID_X942_DIFFIE_HELMAN_KEY, "Diffie-Helman Public Key" , 0x00000021UL, INVALID_CERT_EXTENSION }, |
1217 | OD(netscapeNickname, SEC_OID_NETSCAPE_NICKNAME,{ { siDEROID, (unsigned char *)netscapeNickname, sizeof netscapeNickname } , SEC_OID_NETSCAPE_NICKNAME, "Netscape Nickname", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1218 | "Netscape Nickname", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)netscapeNickname, sizeof netscapeNickname } , SEC_OID_NETSCAPE_NICKNAME, "Netscape Nickname", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1219 | |
1220 | /* Cert Server specific OIDs */ |
1221 | OD(netscapeRecoveryRequest, SEC_OID_NETSCAPE_RECOVERY_REQUEST,{ { siDEROID, (unsigned char *)netscapeRecoveryRequest, sizeof netscapeRecoveryRequest } , SEC_OID_NETSCAPE_RECOVERY_REQUEST , "Recovery Request OID", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1222 | "Recovery Request OID",{ { siDEROID, (unsigned char *)netscapeRecoveryRequest, sizeof netscapeRecoveryRequest } , SEC_OID_NETSCAPE_RECOVERY_REQUEST , "Recovery Request OID", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1223 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)netscapeRecoveryRequest, sizeof netscapeRecoveryRequest } , SEC_OID_NETSCAPE_RECOVERY_REQUEST , "Recovery Request OID", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1224 | |
1225 | OD(nsExtAIACertRenewal, SEC_OID_CERT_RENEWAL_LOCATOR,{ { siDEROID, (unsigned char *)nsExtAIACertRenewal, sizeof nsExtAIACertRenewal } , SEC_OID_CERT_RENEWAL_LOCATOR, "Certificate Renewal Locator OID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1226 | "Certificate Renewal Locator OID", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)nsExtAIACertRenewal, sizeof nsExtAIACertRenewal } , SEC_OID_CERT_RENEWAL_LOCATOR, "Certificate Renewal Locator OID" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1227 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtAIACertRenewal, sizeof nsExtAIACertRenewal } , SEC_OID_CERT_RENEWAL_LOCATOR, "Certificate Renewal Locator OID" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1228 | |
1229 | OD(nsExtCertScopeOfUse, SEC_OID_NS_CERT_EXT_SCOPE_OF_USE,{ { siDEROID, (unsigned char *)nsExtCertScopeOfUse, sizeof nsExtCertScopeOfUse } , SEC_OID_NS_CERT_EXT_SCOPE_OF_USE, "Certificate Scope-of-Use Extension" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
1230 | "Certificate Scope-of-Use Extension", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)nsExtCertScopeOfUse, sizeof nsExtCertScopeOfUse } , SEC_OID_NS_CERT_EXT_SCOPE_OF_USE, "Certificate Scope-of-Use Extension" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION } |
1231 | SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)nsExtCertScopeOfUse, sizeof nsExtCertScopeOfUse } , SEC_OID_NS_CERT_EXT_SCOPE_OF_USE, "Certificate Scope-of-Use Extension" , 0xffffffffUL, SUPPORTED_CERT_EXTENSION }, |
1232 | |
1233 | /* CMS stuff */ |
1234 | OD(cmsESDH, SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN,{ { siDEROID, (unsigned char *)cmsESDH, sizeof cmsESDH } , SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN , "Ephemeral-Static Diffie-Hellman", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1235 | "Ephemeral-Static Diffie-Hellman", CKM_INVALID_MECHANISM /* XXX */,{ { siDEROID, (unsigned char *)cmsESDH, sizeof cmsESDH } , SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN , "Ephemeral-Static Diffie-Hellman", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1236 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)cmsESDH, sizeof cmsESDH } , SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN , "Ephemeral-Static Diffie-Hellman", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1237 | OD(cms3DESwrap, SEC_OID_CMS_3DES_KEY_WRAP,{ { siDEROID, (unsigned char *)cms3DESwrap, sizeof cms3DESwrap } , SEC_OID_CMS_3DES_KEY_WRAP, "CMS Triple DES Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1238 | "CMS Triple DES Key Wrap", CKM_INVALID_MECHANISM /* XXX */,{ { siDEROID, (unsigned char *)cms3DESwrap, sizeof cms3DESwrap } , SEC_OID_CMS_3DES_KEY_WRAP, "CMS Triple DES Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1239 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)cms3DESwrap, sizeof cms3DESwrap } , SEC_OID_CMS_3DES_KEY_WRAP, "CMS Triple DES Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1240 | OD(cmsRC2wrap, SEC_OID_CMS_RC2_KEY_WRAP,{ { siDEROID, (unsigned char *)cmsRC2wrap, sizeof cmsRC2wrap } , SEC_OID_CMS_RC2_KEY_WRAP, "CMS RC2 Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1241 | "CMS RC2 Key Wrap", CKM_INVALID_MECHANISM /* XXX */,{ { siDEROID, (unsigned char *)cmsRC2wrap, sizeof cmsRC2wrap } , SEC_OID_CMS_RC2_KEY_WRAP, "CMS RC2 Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1242 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)cmsRC2wrap, sizeof cmsRC2wrap } , SEC_OID_CMS_RC2_KEY_WRAP, "CMS RC2 Key Wrap", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1243 | OD(smimeEncryptionKeyPreference, SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE,{ { siDEROID, (unsigned char *)smimeEncryptionKeyPreference, sizeof smimeEncryptionKeyPreference } , SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE , "S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1244 | "S/MIME Encryption Key Preference",{ { siDEROID, (unsigned char *)smimeEncryptionKeyPreference, sizeof smimeEncryptionKeyPreference } , SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE , "S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1245 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)smimeEncryptionKeyPreference, sizeof smimeEncryptionKeyPreference } , SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE , "S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1246 | |
1247 | /* AES algorithm OIDs */ |
1248 | OD(aes128_ECB, SEC_OID_AES_128_ECB,{ { siDEROID, (unsigned char *)aes128_ECB, sizeof aes128_ECB } , SEC_OID_AES_128_ECB, "AES-128-ECB", 0x00001081UL, INVALID_CERT_EXTENSION } |
1249 | "AES-128-ECB", CKM_AES_ECB, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes128_ECB, sizeof aes128_ECB } , SEC_OID_AES_128_ECB, "AES-128-ECB", 0x00001081UL, INVALID_CERT_EXTENSION }, |
1250 | OD(aes128_CBC, SEC_OID_AES_128_CBC,{ { siDEROID, (unsigned char *)aes128_CBC, sizeof aes128_CBC } , SEC_OID_AES_128_CBC, "AES-128-CBC", 0x00001082UL, INVALID_CERT_EXTENSION } |
1251 | "AES-128-CBC", CKM_AES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes128_CBC, sizeof aes128_CBC } , SEC_OID_AES_128_CBC, "AES-128-CBC", 0x00001082UL, INVALID_CERT_EXTENSION }, |
1252 | OD(aes192_ECB, SEC_OID_AES_192_ECB,{ { siDEROID, (unsigned char *)aes192_ECB, sizeof aes192_ECB } , SEC_OID_AES_192_ECB, "AES-192-ECB", 0x00001081UL, INVALID_CERT_EXTENSION } |
1253 | "AES-192-ECB", CKM_AES_ECB, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes192_ECB, sizeof aes192_ECB } , SEC_OID_AES_192_ECB, "AES-192-ECB", 0x00001081UL, INVALID_CERT_EXTENSION }, |
1254 | OD(aes192_CBC, SEC_OID_AES_192_CBC,{ { siDEROID, (unsigned char *)aes192_CBC, sizeof aes192_CBC } , SEC_OID_AES_192_CBC, "AES-192-CBC", 0x00001082UL, INVALID_CERT_EXTENSION } |
1255 | "AES-192-CBC", CKM_AES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes192_CBC, sizeof aes192_CBC } , SEC_OID_AES_192_CBC, "AES-192-CBC", 0x00001082UL, INVALID_CERT_EXTENSION }, |
1256 | OD(aes256_ECB, SEC_OID_AES_256_ECB,{ { siDEROID, (unsigned char *)aes256_ECB, sizeof aes256_ECB } , SEC_OID_AES_256_ECB, "AES-256-ECB", 0x00001081UL, INVALID_CERT_EXTENSION } |
1257 | "AES-256-ECB", CKM_AES_ECB, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes256_ECB, sizeof aes256_ECB } , SEC_OID_AES_256_ECB, "AES-256-ECB", 0x00001081UL, INVALID_CERT_EXTENSION }, |
1258 | OD(aes256_CBC, SEC_OID_AES_256_CBC,{ { siDEROID, (unsigned char *)aes256_CBC, sizeof aes256_CBC } , SEC_OID_AES_256_CBC, "AES-256-CBC", 0x00001082UL, INVALID_CERT_EXTENSION } |
1259 | "AES-256-CBC", CKM_AES_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes256_CBC, sizeof aes256_CBC } , SEC_OID_AES_256_CBC, "AES-256-CBC", 0x00001082UL, INVALID_CERT_EXTENSION }, |
1260 | |
1261 | /* More bogus DSA OIDs */ |
1262 | OD(sdn702DSASignature, SEC_OID_SDN702_DSA_SIGNATURE,{ { siDEROID, (unsigned char *)sdn702DSASignature, sizeof sdn702DSASignature } , SEC_OID_SDN702_DSA_SIGNATURE, "SDN.702 DSA Signature", 0x00000012UL , INVALID_CERT_EXTENSION } |
1263 | "SDN.702 DSA Signature", CKM_DSA_SHA1, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sdn702DSASignature, sizeof sdn702DSASignature } , SEC_OID_SDN702_DSA_SIGNATURE, "SDN.702 DSA Signature", 0x00000012UL , INVALID_CERT_EXTENSION }, |
1264 | |
1265 | OD(ms_smimeEncryptionKeyPreference,{ { siDEROID, (unsigned char *)ms_smimeEncryptionKeyPreference , sizeof ms_smimeEncryptionKeyPreference } , SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE , "Microsoft S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1266 | SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE,{ { siDEROID, (unsigned char *)ms_smimeEncryptionKeyPreference , sizeof ms_smimeEncryptionKeyPreference } , SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE , "Microsoft S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1267 | "Microsoft S/MIME Encryption Key Preference",{ { siDEROID, (unsigned char *)ms_smimeEncryptionKeyPreference , sizeof ms_smimeEncryptionKeyPreference } , SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE , "Microsoft S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1268 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ms_smimeEncryptionKeyPreference , sizeof ms_smimeEncryptionKeyPreference } , SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE , "Microsoft S/MIME Encryption Key Preference", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1269 | |
1270 | OD(sha256, SEC_OID_SHA256, "SHA-256", CKM_SHA256, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha256, sizeof sha256 } , SEC_OID_SHA256 , "SHA-256", 0x00000250UL, INVALID_CERT_EXTENSION }, |
1271 | OD(sha384, SEC_OID_SHA384, "SHA-384", CKM_SHA384, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha384, sizeof sha384 } , SEC_OID_SHA384 , "SHA-384", 0x00000260UL, INVALID_CERT_EXTENSION }, |
1272 | OD(sha512, SEC_OID_SHA512, "SHA-512", CKM_SHA512, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha512, sizeof sha512 } , SEC_OID_SHA512 , "SHA-512", 0x00000270UL, INVALID_CERT_EXTENSION }, |
1273 | |
1274 | OD(pkcs1SHA256WithRSAEncryption, SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1SHA256WithRSAEncryption, sizeof pkcs1SHA256WithRSAEncryption } , SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-256 With RSA Encryption", 0x00000040UL, INVALID_CERT_EXTENSION } |
1275 | "PKCS #1 SHA-256 With RSA Encryption", CKM_SHA256_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1SHA256WithRSAEncryption, sizeof pkcs1SHA256WithRSAEncryption } , SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-256 With RSA Encryption", 0x00000040UL, INVALID_CERT_EXTENSION } |
1276 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1SHA256WithRSAEncryption, sizeof pkcs1SHA256WithRSAEncryption } , SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-256 With RSA Encryption", 0x00000040UL, INVALID_CERT_EXTENSION }, |
1277 | OD(pkcs1SHA384WithRSAEncryption, SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1SHA384WithRSAEncryption, sizeof pkcs1SHA384WithRSAEncryption } , SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-384 With RSA Encryption", 0x00000041UL, INVALID_CERT_EXTENSION } |
1278 | "PKCS #1 SHA-384 With RSA Encryption", CKM_SHA384_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1SHA384WithRSAEncryption, sizeof pkcs1SHA384WithRSAEncryption } , SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-384 With RSA Encryption", 0x00000041UL, INVALID_CERT_EXTENSION } |
1279 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1SHA384WithRSAEncryption, sizeof pkcs1SHA384WithRSAEncryption } , SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-384 With RSA Encryption", 0x00000041UL, INVALID_CERT_EXTENSION }, |
1280 | OD(pkcs1SHA512WithRSAEncryption, SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1SHA512WithRSAEncryption, sizeof pkcs1SHA512WithRSAEncryption } , SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-512 With RSA Encryption", 0x00000042UL, INVALID_CERT_EXTENSION } |
1281 | "PKCS #1 SHA-512 With RSA Encryption", CKM_SHA512_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1SHA512WithRSAEncryption, sizeof pkcs1SHA512WithRSAEncryption } , SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-512 With RSA Encryption", 0x00000042UL, INVALID_CERT_EXTENSION } |
1282 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1SHA512WithRSAEncryption, sizeof pkcs1SHA512WithRSAEncryption } , SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-512 With RSA Encryption", 0x00000042UL, INVALID_CERT_EXTENSION }, |
1283 | |
1284 | OD(aes128_KEY_WRAP, SEC_OID_AES_128_KEY_WRAP,{ { siDEROID, (unsigned char *)aes128_KEY_WRAP, sizeof aes128_KEY_WRAP } , SEC_OID_AES_128_KEY_WRAP, "AES-128 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION } |
1285 | "AES-128 Key Wrap", CKM_NSS_AES_KEY_WRAP, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes128_KEY_WRAP, sizeof aes128_KEY_WRAP } , SEC_OID_AES_128_KEY_WRAP, "AES-128 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION }, |
1286 | OD(aes192_KEY_WRAP, SEC_OID_AES_192_KEY_WRAP,{ { siDEROID, (unsigned char *)aes192_KEY_WRAP, sizeof aes192_KEY_WRAP } , SEC_OID_AES_192_KEY_WRAP, "AES-192 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION } |
1287 | "AES-192 Key Wrap", CKM_NSS_AES_KEY_WRAP, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes192_KEY_WRAP, sizeof aes192_KEY_WRAP } , SEC_OID_AES_192_KEY_WRAP, "AES-192 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION }, |
1288 | OD(aes256_KEY_WRAP, SEC_OID_AES_256_KEY_WRAP,{ { siDEROID, (unsigned char *)aes256_KEY_WRAP, sizeof aes256_KEY_WRAP } , SEC_OID_AES_256_KEY_WRAP, "AES-256 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION } |
1289 | "AES-256 Key Wrap", CKM_NSS_AES_KEY_WRAP, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes256_KEY_WRAP, sizeof aes256_KEY_WRAP } , SEC_OID_AES_256_KEY_WRAP, "AES-256 Key Wrap", ((0x80000000UL | 0x4E534350) + 1), INVALID_CERT_EXTENSION }, |
1290 | |
1291 | /* Elliptic Curve Cryptography (ECC) OIDs */ |
1292 | OD(ansix962ECPublicKey, SEC_OID_ANSIX962_EC_PUBLIC_KEY,{ { siDEROID, (unsigned char *)ansix962ECPublicKey, sizeof ansix962ECPublicKey } , SEC_OID_ANSIX962_EC_PUBLIC_KEY, "X9.62 elliptic curve public key" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1293 | "X9.62 elliptic curve public key", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)ansix962ECPublicKey, sizeof ansix962ECPublicKey } , SEC_OID_ANSIX962_EC_PUBLIC_KEY, "X9.62 elliptic curve public key" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1294 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962ECPublicKey, sizeof ansix962ECPublicKey } , SEC_OID_ANSIX962_EC_PUBLIC_KEY, "X9.62 elliptic curve public key" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1295 | OD(ansix962SignaturewithSHA1Digest,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA1Digest , sizeof ansix962SignaturewithSHA1Digest } , SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE , "X9.62 ECDSA signature with SHA-1", 0x00001042UL, INVALID_CERT_EXTENSION } |
1296 | SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA1Digest , sizeof ansix962SignaturewithSHA1Digest } , SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE , "X9.62 ECDSA signature with SHA-1", 0x00001042UL, INVALID_CERT_EXTENSION } |
1297 | "X9.62 ECDSA signature with SHA-1", CKM_ECDSA_SHA1,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA1Digest , sizeof ansix962SignaturewithSHA1Digest } , SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE , "X9.62 ECDSA signature with SHA-1", 0x00001042UL, INVALID_CERT_EXTENSION } |
1298 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignaturewithSHA1Digest , sizeof ansix962SignaturewithSHA1Digest } , SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE , "X9.62 ECDSA signature with SHA-1", 0x00001042UL, INVALID_CERT_EXTENSION }, |
1299 | |
1300 | /* Named curves */ |
1301 | /* NOTE: Only P256, P384, P521, and 25519 are supported by softoken. |
1302 | * Using other curves requires an appropriate token. */ |
1303 | |
1304 | /* ANSI X9.62 named elliptic curves (prime field) */ |
1305 | OD(ansiX962prime192v1, SEC_OID_ANSIX962_EC_PRIME192V1,{ { siDEROID, (unsigned char *)ansiX962prime192v1, sizeof ansiX962prime192v1 } , SEC_OID_ANSIX962_EC_PRIME192V1, "ANSI X9.62 elliptic curve prime192v1 (aka secp192r1, NIST P-192)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1306 | "ANSI X9.62 elliptic curve prime192v1 (aka secp192r1, NIST P-192)",{ { siDEROID, (unsigned char *)ansiX962prime192v1, sizeof ansiX962prime192v1 } , SEC_OID_ANSIX962_EC_PRIME192V1, "ANSI X9.62 elliptic curve prime192v1 (aka secp192r1, NIST P-192)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1307 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime192v1, sizeof ansiX962prime192v1 } , SEC_OID_ANSIX962_EC_PRIME192V1, "ANSI X9.62 elliptic curve prime192v1 (aka secp192r1, NIST P-192)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1308 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime192v1, sizeof ansiX962prime192v1 } , SEC_OID_ANSIX962_EC_PRIME192V1, "ANSI X9.62 elliptic curve prime192v1 (aka secp192r1, NIST P-192)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1309 | OD(ansiX962prime192v2, SEC_OID_ANSIX962_EC_PRIME192V2,{ { siDEROID, (unsigned char *)ansiX962prime192v2, sizeof ansiX962prime192v2 } , SEC_OID_ANSIX962_EC_PRIME192V2, "ANSI X9.62 elliptic curve prime192v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1310 | "ANSI X9.62 elliptic curve prime192v2",{ { siDEROID, (unsigned char *)ansiX962prime192v2, sizeof ansiX962prime192v2 } , SEC_OID_ANSIX962_EC_PRIME192V2, "ANSI X9.62 elliptic curve prime192v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1311 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime192v2, sizeof ansiX962prime192v2 } , SEC_OID_ANSIX962_EC_PRIME192V2, "ANSI X9.62 elliptic curve prime192v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1312 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime192v2, sizeof ansiX962prime192v2 } , SEC_OID_ANSIX962_EC_PRIME192V2, "ANSI X9.62 elliptic curve prime192v2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1313 | OD(ansiX962prime192v3, SEC_OID_ANSIX962_EC_PRIME192V3,{ { siDEROID, (unsigned char *)ansiX962prime192v3, sizeof ansiX962prime192v3 } , SEC_OID_ANSIX962_EC_PRIME192V3, "ANSI X9.62 elliptic curve prime192v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1314 | "ANSI X9.62 elliptic curve prime192v3",{ { siDEROID, (unsigned char *)ansiX962prime192v3, sizeof ansiX962prime192v3 } , SEC_OID_ANSIX962_EC_PRIME192V3, "ANSI X9.62 elliptic curve prime192v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1315 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime192v3, sizeof ansiX962prime192v3 } , SEC_OID_ANSIX962_EC_PRIME192V3, "ANSI X9.62 elliptic curve prime192v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1316 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime192v3, sizeof ansiX962prime192v3 } , SEC_OID_ANSIX962_EC_PRIME192V3, "ANSI X9.62 elliptic curve prime192v3" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1317 | OD(ansiX962prime239v1, SEC_OID_ANSIX962_EC_PRIME239V1,{ { siDEROID, (unsigned char *)ansiX962prime239v1, sizeof ansiX962prime239v1 } , SEC_OID_ANSIX962_EC_PRIME239V1, "ANSI X9.62 elliptic curve prime239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1318 | "ANSI X9.62 elliptic curve prime239v1",{ { siDEROID, (unsigned char *)ansiX962prime239v1, sizeof ansiX962prime239v1 } , SEC_OID_ANSIX962_EC_PRIME239V1, "ANSI X9.62 elliptic curve prime239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1319 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime239v1, sizeof ansiX962prime239v1 } , SEC_OID_ANSIX962_EC_PRIME239V1, "ANSI X9.62 elliptic curve prime239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1320 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime239v1, sizeof ansiX962prime239v1 } , SEC_OID_ANSIX962_EC_PRIME239V1, "ANSI X9.62 elliptic curve prime239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1321 | OD(ansiX962prime239v2, SEC_OID_ANSIX962_EC_PRIME239V2,{ { siDEROID, (unsigned char *)ansiX962prime239v2, sizeof ansiX962prime239v2 } , SEC_OID_ANSIX962_EC_PRIME239V2, "ANSI X9.62 elliptic curve prime239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1322 | "ANSI X9.62 elliptic curve prime239v2",{ { siDEROID, (unsigned char *)ansiX962prime239v2, sizeof ansiX962prime239v2 } , SEC_OID_ANSIX962_EC_PRIME239V2, "ANSI X9.62 elliptic curve prime239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1323 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime239v2, sizeof ansiX962prime239v2 } , SEC_OID_ANSIX962_EC_PRIME239V2, "ANSI X9.62 elliptic curve prime239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1324 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime239v2, sizeof ansiX962prime239v2 } , SEC_OID_ANSIX962_EC_PRIME239V2, "ANSI X9.62 elliptic curve prime239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1325 | OD(ansiX962prime239v3, SEC_OID_ANSIX962_EC_PRIME239V3,{ { siDEROID, (unsigned char *)ansiX962prime239v3, sizeof ansiX962prime239v3 } , SEC_OID_ANSIX962_EC_PRIME239V3, "ANSI X9.62 elliptic curve prime239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1326 | "ANSI X9.62 elliptic curve prime239v3",{ { siDEROID, (unsigned char *)ansiX962prime239v3, sizeof ansiX962prime239v3 } , SEC_OID_ANSIX962_EC_PRIME239V3, "ANSI X9.62 elliptic curve prime239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1327 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime239v3, sizeof ansiX962prime239v3 } , SEC_OID_ANSIX962_EC_PRIME239V3, "ANSI X9.62 elliptic curve prime239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1328 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime239v3, sizeof ansiX962prime239v3 } , SEC_OID_ANSIX962_EC_PRIME239V3, "ANSI X9.62 elliptic curve prime239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1329 | OD(ansiX962prime256v1, SEC_OID_ANSIX962_EC_PRIME256V1,{ { siDEROID, (unsigned char *)ansiX962prime256v1, sizeof ansiX962prime256v1 } , SEC_OID_ANSIX962_EC_PRIME256V1, "ANSI X9.62 elliptic curve prime256v1 (aka secp256r1, NIST P-256)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1330 | "ANSI X9.62 elliptic curve prime256v1 (aka secp256r1, NIST P-256)",{ { siDEROID, (unsigned char *)ansiX962prime256v1, sizeof ansiX962prime256v1 } , SEC_OID_ANSIX962_EC_PRIME256V1, "ANSI X9.62 elliptic curve prime256v1 (aka secp256r1, NIST P-256)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1331 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962prime256v1, sizeof ansiX962prime256v1 } , SEC_OID_ANSIX962_EC_PRIME256V1, "ANSI X9.62 elliptic curve prime256v1 (aka secp256r1, NIST P-256)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1332 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962prime256v1, sizeof ansiX962prime256v1 } , SEC_OID_ANSIX962_EC_PRIME256V1, "ANSI X9.62 elliptic curve prime256v1 (aka secp256r1, NIST P-256)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1333 | |
1334 | /* SECG named elliptic curves (prime field) */ |
1335 | OD(secgECsecp112r1, SEC_OID_SECG_EC_SECP112R1,{ { siDEROID, (unsigned char *)secgECsecp112r1, sizeof secgECsecp112r1 } , SEC_OID_SECG_EC_SECP112R1, "SECG elliptic curve secp112r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1336 | "SECG elliptic curve secp112r1",{ { siDEROID, (unsigned char *)secgECsecp112r1, sizeof secgECsecp112r1 } , SEC_OID_SECG_EC_SECP112R1, "SECG elliptic curve secp112r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1337 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp112r1, sizeof secgECsecp112r1 } , SEC_OID_SECG_EC_SECP112R1, "SECG elliptic curve secp112r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1338 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp112r1, sizeof secgECsecp112r1 } , SEC_OID_SECG_EC_SECP112R1, "SECG elliptic curve secp112r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1339 | OD(secgECsecp112r2, SEC_OID_SECG_EC_SECP112R2,{ { siDEROID, (unsigned char *)secgECsecp112r2, sizeof secgECsecp112r2 } , SEC_OID_SECG_EC_SECP112R2, "SECG elliptic curve secp112r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1340 | "SECG elliptic curve secp112r2",{ { siDEROID, (unsigned char *)secgECsecp112r2, sizeof secgECsecp112r2 } , SEC_OID_SECG_EC_SECP112R2, "SECG elliptic curve secp112r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1341 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp112r2, sizeof secgECsecp112r2 } , SEC_OID_SECG_EC_SECP112R2, "SECG elliptic curve secp112r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1342 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp112r2, sizeof secgECsecp112r2 } , SEC_OID_SECG_EC_SECP112R2, "SECG elliptic curve secp112r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1343 | OD(secgECsecp128r1, SEC_OID_SECG_EC_SECP128R1,{ { siDEROID, (unsigned char *)secgECsecp128r1, sizeof secgECsecp128r1 } , SEC_OID_SECG_EC_SECP128R1, "SECG elliptic curve secp128r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1344 | "SECG elliptic curve secp128r1",{ { siDEROID, (unsigned char *)secgECsecp128r1, sizeof secgECsecp128r1 } , SEC_OID_SECG_EC_SECP128R1, "SECG elliptic curve secp128r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1345 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp128r1, sizeof secgECsecp128r1 } , SEC_OID_SECG_EC_SECP128R1, "SECG elliptic curve secp128r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1346 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp128r1, sizeof secgECsecp128r1 } , SEC_OID_SECG_EC_SECP128R1, "SECG elliptic curve secp128r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1347 | OD(secgECsecp128r2, SEC_OID_SECG_EC_SECP128R2,{ { siDEROID, (unsigned char *)secgECsecp128r2, sizeof secgECsecp128r2 } , SEC_OID_SECG_EC_SECP128R2, "SECG elliptic curve secp128r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1348 | "SECG elliptic curve secp128r2",{ { siDEROID, (unsigned char *)secgECsecp128r2, sizeof secgECsecp128r2 } , SEC_OID_SECG_EC_SECP128R2, "SECG elliptic curve secp128r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1349 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp128r2, sizeof secgECsecp128r2 } , SEC_OID_SECG_EC_SECP128R2, "SECG elliptic curve secp128r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1350 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp128r2, sizeof secgECsecp128r2 } , SEC_OID_SECG_EC_SECP128R2, "SECG elliptic curve secp128r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1351 | OD(secgECsecp160k1, SEC_OID_SECG_EC_SECP160K1,{ { siDEROID, (unsigned char *)secgECsecp160k1, sizeof secgECsecp160k1 } , SEC_OID_SECG_EC_SECP160K1, "SECG elliptic curve secp160k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1352 | "SECG elliptic curve secp160k1",{ { siDEROID, (unsigned char *)secgECsecp160k1, sizeof secgECsecp160k1 } , SEC_OID_SECG_EC_SECP160K1, "SECG elliptic curve secp160k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1353 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp160k1, sizeof secgECsecp160k1 } , SEC_OID_SECG_EC_SECP160K1, "SECG elliptic curve secp160k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1354 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp160k1, sizeof secgECsecp160k1 } , SEC_OID_SECG_EC_SECP160K1, "SECG elliptic curve secp160k1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1355 | OD(secgECsecp160r1, SEC_OID_SECG_EC_SECP160R1,{ { siDEROID, (unsigned char *)secgECsecp160r1, sizeof secgECsecp160r1 } , SEC_OID_SECG_EC_SECP160R1, "SECG elliptic curve secp160r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1356 | "SECG elliptic curve secp160r1",{ { siDEROID, (unsigned char *)secgECsecp160r1, sizeof secgECsecp160r1 } , SEC_OID_SECG_EC_SECP160R1, "SECG elliptic curve secp160r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1357 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp160r1, sizeof secgECsecp160r1 } , SEC_OID_SECG_EC_SECP160R1, "SECG elliptic curve secp160r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1358 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp160r1, sizeof secgECsecp160r1 } , SEC_OID_SECG_EC_SECP160R1, "SECG elliptic curve secp160r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1359 | OD(secgECsecp160r2, SEC_OID_SECG_EC_SECP160R2,{ { siDEROID, (unsigned char *)secgECsecp160r2, sizeof secgECsecp160r2 } , SEC_OID_SECG_EC_SECP160R2, "SECG elliptic curve secp160r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1360 | "SECG elliptic curve secp160r2",{ { siDEROID, (unsigned char *)secgECsecp160r2, sizeof secgECsecp160r2 } , SEC_OID_SECG_EC_SECP160R2, "SECG elliptic curve secp160r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1361 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp160r2, sizeof secgECsecp160r2 } , SEC_OID_SECG_EC_SECP160R2, "SECG elliptic curve secp160r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1362 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp160r2, sizeof secgECsecp160r2 } , SEC_OID_SECG_EC_SECP160R2, "SECG elliptic curve secp160r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1363 | OD(secgECsecp192k1, SEC_OID_SECG_EC_SECP192K1,{ { siDEROID, (unsigned char *)secgECsecp192k1, sizeof secgECsecp192k1 } , SEC_OID_SECG_EC_SECP192K1, "SECG elliptic curve secp192k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1364 | "SECG elliptic curve secp192k1",{ { siDEROID, (unsigned char *)secgECsecp192k1, sizeof secgECsecp192k1 } , SEC_OID_SECG_EC_SECP192K1, "SECG elliptic curve secp192k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1365 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp192k1, sizeof secgECsecp192k1 } , SEC_OID_SECG_EC_SECP192K1, "SECG elliptic curve secp192k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1366 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp192k1, sizeof secgECsecp192k1 } , SEC_OID_SECG_EC_SECP192K1, "SECG elliptic curve secp192k1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1367 | OD(secgECsecp224k1, SEC_OID_SECG_EC_SECP224K1,{ { siDEROID, (unsigned char *)secgECsecp224k1, sizeof secgECsecp224k1 } , SEC_OID_SECG_EC_SECP224K1, "SECG elliptic curve secp224k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1368 | "SECG elliptic curve secp224k1",{ { siDEROID, (unsigned char *)secgECsecp224k1, sizeof secgECsecp224k1 } , SEC_OID_SECG_EC_SECP224K1, "SECG elliptic curve secp224k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1369 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp224k1, sizeof secgECsecp224k1 } , SEC_OID_SECG_EC_SECP224K1, "SECG elliptic curve secp224k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1370 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp224k1, sizeof secgECsecp224k1 } , SEC_OID_SECG_EC_SECP224K1, "SECG elliptic curve secp224k1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1371 | OD(secgECsecp224r1, SEC_OID_SECG_EC_SECP224R1,{ { siDEROID, (unsigned char *)secgECsecp224r1, sizeof secgECsecp224r1 } , SEC_OID_SECG_EC_SECP224R1, "SECG elliptic curve secp224r1 (aka NIST P-224)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1372 | "SECG elliptic curve secp224r1 (aka NIST P-224)",{ { siDEROID, (unsigned char *)secgECsecp224r1, sizeof secgECsecp224r1 } , SEC_OID_SECG_EC_SECP224R1, "SECG elliptic curve secp224r1 (aka NIST P-224)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1373 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp224r1, sizeof secgECsecp224r1 } , SEC_OID_SECG_EC_SECP224R1, "SECG elliptic curve secp224r1 (aka NIST P-224)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1374 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp224r1, sizeof secgECsecp224r1 } , SEC_OID_SECG_EC_SECP224R1, "SECG elliptic curve secp224r1 (aka NIST P-224)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1375 | OD(secgECsecp256k1, SEC_OID_SECG_EC_SECP256K1,{ { siDEROID, (unsigned char *)secgECsecp256k1, sizeof secgECsecp256k1 } , SEC_OID_SECG_EC_SECP256K1, "SECG elliptic curve secp256k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1376 | "SECG elliptic curve secp256k1",{ { siDEROID, (unsigned char *)secgECsecp256k1, sizeof secgECsecp256k1 } , SEC_OID_SECG_EC_SECP256K1, "SECG elliptic curve secp256k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1377 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp256k1, sizeof secgECsecp256k1 } , SEC_OID_SECG_EC_SECP256K1, "SECG elliptic curve secp256k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1378 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp256k1, sizeof secgECsecp256k1 } , SEC_OID_SECG_EC_SECP256K1, "SECG elliptic curve secp256k1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1379 | OD(secgECsecp384r1, SEC_OID_SECG_EC_SECP384R1,{ { siDEROID, (unsigned char *)secgECsecp384r1, sizeof secgECsecp384r1 } , SEC_OID_SECG_EC_SECP384R1, "SECG elliptic curve secp384r1 (aka NIST P-384)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1380 | "SECG elliptic curve secp384r1 (aka NIST P-384)",{ { siDEROID, (unsigned char *)secgECsecp384r1, sizeof secgECsecp384r1 } , SEC_OID_SECG_EC_SECP384R1, "SECG elliptic curve secp384r1 (aka NIST P-384)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1381 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp384r1, sizeof secgECsecp384r1 } , SEC_OID_SECG_EC_SECP384R1, "SECG elliptic curve secp384r1 (aka NIST P-384)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1382 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp384r1, sizeof secgECsecp384r1 } , SEC_OID_SECG_EC_SECP384R1, "SECG elliptic curve secp384r1 (aka NIST P-384)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1383 | OD(secgECsecp521r1, SEC_OID_SECG_EC_SECP521R1,{ { siDEROID, (unsigned char *)secgECsecp521r1, sizeof secgECsecp521r1 } , SEC_OID_SECG_EC_SECP521R1, "SECG elliptic curve secp521r1 (aka NIST P-521)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1384 | "SECG elliptic curve secp521r1 (aka NIST P-521)",{ { siDEROID, (unsigned char *)secgECsecp521r1, sizeof secgECsecp521r1 } , SEC_OID_SECG_EC_SECP521R1, "SECG elliptic curve secp521r1 (aka NIST P-521)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1385 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsecp521r1, sizeof secgECsecp521r1 } , SEC_OID_SECG_EC_SECP521R1, "SECG elliptic curve secp521r1 (aka NIST P-521)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1386 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsecp521r1, sizeof secgECsecp521r1 } , SEC_OID_SECG_EC_SECP521R1, "SECG elliptic curve secp521r1 (aka NIST P-521)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1387 | |
1388 | /* ANSI X9.62 named elliptic curves (characteristic two field) */ |
1389 | OD(ansiX962c2pnb163v1, SEC_OID_ANSIX962_EC_C2PNB163V1,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v1, sizeof ansiX962c2pnb163v1 } , SEC_OID_ANSIX962_EC_C2PNB163V1, "ANSI X9.62 elliptic curve c2pnb163v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1390 | "ANSI X9.62 elliptic curve c2pnb163v1",{ { siDEROID, (unsigned char *)ansiX962c2pnb163v1, sizeof ansiX962c2pnb163v1 } , SEC_OID_ANSIX962_EC_C2PNB163V1, "ANSI X9.62 elliptic curve c2pnb163v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1391 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v1, sizeof ansiX962c2pnb163v1 } , SEC_OID_ANSIX962_EC_C2PNB163V1, "ANSI X9.62 elliptic curve c2pnb163v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1392 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb163v1, sizeof ansiX962c2pnb163v1 } , SEC_OID_ANSIX962_EC_C2PNB163V1, "ANSI X9.62 elliptic curve c2pnb163v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1393 | OD(ansiX962c2pnb163v2, SEC_OID_ANSIX962_EC_C2PNB163V2,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v2, sizeof ansiX962c2pnb163v2 } , SEC_OID_ANSIX962_EC_C2PNB163V2, "ANSI X9.62 elliptic curve c2pnb163v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1394 | "ANSI X9.62 elliptic curve c2pnb163v2",{ { siDEROID, (unsigned char *)ansiX962c2pnb163v2, sizeof ansiX962c2pnb163v2 } , SEC_OID_ANSIX962_EC_C2PNB163V2, "ANSI X9.62 elliptic curve c2pnb163v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1395 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v2, sizeof ansiX962c2pnb163v2 } , SEC_OID_ANSIX962_EC_C2PNB163V2, "ANSI X9.62 elliptic curve c2pnb163v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1396 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb163v2, sizeof ansiX962c2pnb163v2 } , SEC_OID_ANSIX962_EC_C2PNB163V2, "ANSI X9.62 elliptic curve c2pnb163v2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1397 | OD(ansiX962c2pnb163v3, SEC_OID_ANSIX962_EC_C2PNB163V3,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v3, sizeof ansiX962c2pnb163v3 } , SEC_OID_ANSIX962_EC_C2PNB163V3, "ANSI X9.62 elliptic curve c2pnb163v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1398 | "ANSI X9.62 elliptic curve c2pnb163v3",{ { siDEROID, (unsigned char *)ansiX962c2pnb163v3, sizeof ansiX962c2pnb163v3 } , SEC_OID_ANSIX962_EC_C2PNB163V3, "ANSI X9.62 elliptic curve c2pnb163v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1399 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb163v3, sizeof ansiX962c2pnb163v3 } , SEC_OID_ANSIX962_EC_C2PNB163V3, "ANSI X9.62 elliptic curve c2pnb163v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1400 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb163v3, sizeof ansiX962c2pnb163v3 } , SEC_OID_ANSIX962_EC_C2PNB163V3, "ANSI X9.62 elliptic curve c2pnb163v3" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1401 | OD(ansiX962c2pnb176v1, SEC_OID_ANSIX962_EC_C2PNB176V1,{ { siDEROID, (unsigned char *)ansiX962c2pnb176v1, sizeof ansiX962c2pnb176v1 } , SEC_OID_ANSIX962_EC_C2PNB176V1, "ANSI X9.62 elliptic curve c2pnb176v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1402 | "ANSI X9.62 elliptic curve c2pnb176v1",{ { siDEROID, (unsigned char *)ansiX962c2pnb176v1, sizeof ansiX962c2pnb176v1 } , SEC_OID_ANSIX962_EC_C2PNB176V1, "ANSI X9.62 elliptic curve c2pnb176v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1403 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb176v1, sizeof ansiX962c2pnb176v1 } , SEC_OID_ANSIX962_EC_C2PNB176V1, "ANSI X9.62 elliptic curve c2pnb176v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1404 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb176v1, sizeof ansiX962c2pnb176v1 } , SEC_OID_ANSIX962_EC_C2PNB176V1, "ANSI X9.62 elliptic curve c2pnb176v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1405 | OD(ansiX962c2tnb191v1, SEC_OID_ANSIX962_EC_C2TNB191V1,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v1, sizeof ansiX962c2tnb191v1 } , SEC_OID_ANSIX962_EC_C2TNB191V1, "ANSI X9.62 elliptic curve c2tnb191v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1406 | "ANSI X9.62 elliptic curve c2tnb191v1",{ { siDEROID, (unsigned char *)ansiX962c2tnb191v1, sizeof ansiX962c2tnb191v1 } , SEC_OID_ANSIX962_EC_C2TNB191V1, "ANSI X9.62 elliptic curve c2tnb191v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1407 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v1, sizeof ansiX962c2tnb191v1 } , SEC_OID_ANSIX962_EC_C2TNB191V1, "ANSI X9.62 elliptic curve c2tnb191v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1408 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb191v1, sizeof ansiX962c2tnb191v1 } , SEC_OID_ANSIX962_EC_C2TNB191V1, "ANSI X9.62 elliptic curve c2tnb191v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1409 | OD(ansiX962c2tnb191v2, SEC_OID_ANSIX962_EC_C2TNB191V2,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v2, sizeof ansiX962c2tnb191v2 } , SEC_OID_ANSIX962_EC_C2TNB191V2, "ANSI X9.62 elliptic curve c2tnb191v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1410 | "ANSI X9.62 elliptic curve c2tnb191v2",{ { siDEROID, (unsigned char *)ansiX962c2tnb191v2, sizeof ansiX962c2tnb191v2 } , SEC_OID_ANSIX962_EC_C2TNB191V2, "ANSI X9.62 elliptic curve c2tnb191v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1411 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v2, sizeof ansiX962c2tnb191v2 } , SEC_OID_ANSIX962_EC_C2TNB191V2, "ANSI X9.62 elliptic curve c2tnb191v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1412 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb191v2, sizeof ansiX962c2tnb191v2 } , SEC_OID_ANSIX962_EC_C2TNB191V2, "ANSI X9.62 elliptic curve c2tnb191v2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1413 | OD(ansiX962c2tnb191v3, SEC_OID_ANSIX962_EC_C2TNB191V3,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v3, sizeof ansiX962c2tnb191v3 } , SEC_OID_ANSIX962_EC_C2TNB191V3, "ANSI X9.62 elliptic curve c2tnb191v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1414 | "ANSI X9.62 elliptic curve c2tnb191v3",{ { siDEROID, (unsigned char *)ansiX962c2tnb191v3, sizeof ansiX962c2tnb191v3 } , SEC_OID_ANSIX962_EC_C2TNB191V3, "ANSI X9.62 elliptic curve c2tnb191v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1415 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb191v3, sizeof ansiX962c2tnb191v3 } , SEC_OID_ANSIX962_EC_C2TNB191V3, "ANSI X9.62 elliptic curve c2tnb191v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1416 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb191v3, sizeof ansiX962c2tnb191v3 } , SEC_OID_ANSIX962_EC_C2TNB191V3, "ANSI X9.62 elliptic curve c2tnb191v3" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1417 | OD(ansiX962c2onb191v4, SEC_OID_ANSIX962_EC_C2ONB191V4,{ { siDEROID, (unsigned char *)ansiX962c2onb191v4, sizeof ansiX962c2onb191v4 } , SEC_OID_ANSIX962_EC_C2ONB191V4, "ANSI X9.62 elliptic curve c2onb191v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1418 | "ANSI X9.62 elliptic curve c2onb191v4",{ { siDEROID, (unsigned char *)ansiX962c2onb191v4, sizeof ansiX962c2onb191v4 } , SEC_OID_ANSIX962_EC_C2ONB191V4, "ANSI X9.62 elliptic curve c2onb191v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1419 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2onb191v4, sizeof ansiX962c2onb191v4 } , SEC_OID_ANSIX962_EC_C2ONB191V4, "ANSI X9.62 elliptic curve c2onb191v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1420 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2onb191v4, sizeof ansiX962c2onb191v4 } , SEC_OID_ANSIX962_EC_C2ONB191V4, "ANSI X9.62 elliptic curve c2onb191v4" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1421 | OD(ansiX962c2onb191v5, SEC_OID_ANSIX962_EC_C2ONB191V5,{ { siDEROID, (unsigned char *)ansiX962c2onb191v5, sizeof ansiX962c2onb191v5 } , SEC_OID_ANSIX962_EC_C2ONB191V5, "ANSI X9.62 elliptic curve c2onb191v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1422 | "ANSI X9.62 elliptic curve c2onb191v5",{ { siDEROID, (unsigned char *)ansiX962c2onb191v5, sizeof ansiX962c2onb191v5 } , SEC_OID_ANSIX962_EC_C2ONB191V5, "ANSI X9.62 elliptic curve c2onb191v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1423 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2onb191v5, sizeof ansiX962c2onb191v5 } , SEC_OID_ANSIX962_EC_C2ONB191V5, "ANSI X9.62 elliptic curve c2onb191v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1424 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2onb191v5, sizeof ansiX962c2onb191v5 } , SEC_OID_ANSIX962_EC_C2ONB191V5, "ANSI X9.62 elliptic curve c2onb191v5" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1425 | OD(ansiX962c2pnb208w1, SEC_OID_ANSIX962_EC_C2PNB208W1,{ { siDEROID, (unsigned char *)ansiX962c2pnb208w1, sizeof ansiX962c2pnb208w1 } , SEC_OID_ANSIX962_EC_C2PNB208W1, "ANSI X9.62 elliptic curve c2pnb208w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1426 | "ANSI X9.62 elliptic curve c2pnb208w1",{ { siDEROID, (unsigned char *)ansiX962c2pnb208w1, sizeof ansiX962c2pnb208w1 } , SEC_OID_ANSIX962_EC_C2PNB208W1, "ANSI X9.62 elliptic curve c2pnb208w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1427 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb208w1, sizeof ansiX962c2pnb208w1 } , SEC_OID_ANSIX962_EC_C2PNB208W1, "ANSI X9.62 elliptic curve c2pnb208w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1428 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb208w1, sizeof ansiX962c2pnb208w1 } , SEC_OID_ANSIX962_EC_C2PNB208W1, "ANSI X9.62 elliptic curve c2pnb208w1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1429 | OD(ansiX962c2tnb239v1, SEC_OID_ANSIX962_EC_C2TNB239V1,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v1, sizeof ansiX962c2tnb239v1 } , SEC_OID_ANSIX962_EC_C2TNB239V1, "ANSI X9.62 elliptic curve c2tnb239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1430 | "ANSI X9.62 elliptic curve c2tnb239v1",{ { siDEROID, (unsigned char *)ansiX962c2tnb239v1, sizeof ansiX962c2tnb239v1 } , SEC_OID_ANSIX962_EC_C2TNB239V1, "ANSI X9.62 elliptic curve c2tnb239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1431 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v1, sizeof ansiX962c2tnb239v1 } , SEC_OID_ANSIX962_EC_C2TNB239V1, "ANSI X9.62 elliptic curve c2tnb239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1432 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb239v1, sizeof ansiX962c2tnb239v1 } , SEC_OID_ANSIX962_EC_C2TNB239V1, "ANSI X9.62 elliptic curve c2tnb239v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1433 | OD(ansiX962c2tnb239v2, SEC_OID_ANSIX962_EC_C2TNB239V2,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v2, sizeof ansiX962c2tnb239v2 } , SEC_OID_ANSIX962_EC_C2TNB239V2, "ANSI X9.62 elliptic curve c2tnb239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1434 | "ANSI X9.62 elliptic curve c2tnb239v2",{ { siDEROID, (unsigned char *)ansiX962c2tnb239v2, sizeof ansiX962c2tnb239v2 } , SEC_OID_ANSIX962_EC_C2TNB239V2, "ANSI X9.62 elliptic curve c2tnb239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1435 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v2, sizeof ansiX962c2tnb239v2 } , SEC_OID_ANSIX962_EC_C2TNB239V2, "ANSI X9.62 elliptic curve c2tnb239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1436 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb239v2, sizeof ansiX962c2tnb239v2 } , SEC_OID_ANSIX962_EC_C2TNB239V2, "ANSI X9.62 elliptic curve c2tnb239v2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1437 | OD(ansiX962c2tnb239v3, SEC_OID_ANSIX962_EC_C2TNB239V3,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v3, sizeof ansiX962c2tnb239v3 } , SEC_OID_ANSIX962_EC_C2TNB239V3, "ANSI X9.62 elliptic curve c2tnb239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1438 | "ANSI X9.62 elliptic curve c2tnb239v3",{ { siDEROID, (unsigned char *)ansiX962c2tnb239v3, sizeof ansiX962c2tnb239v3 } , SEC_OID_ANSIX962_EC_C2TNB239V3, "ANSI X9.62 elliptic curve c2tnb239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1439 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb239v3, sizeof ansiX962c2tnb239v3 } , SEC_OID_ANSIX962_EC_C2TNB239V3, "ANSI X9.62 elliptic curve c2tnb239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1440 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb239v3, sizeof ansiX962c2tnb239v3 } , SEC_OID_ANSIX962_EC_C2TNB239V3, "ANSI X9.62 elliptic curve c2tnb239v3" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1441 | OD(ansiX962c2onb239v4, SEC_OID_ANSIX962_EC_C2ONB239V4,{ { siDEROID, (unsigned char *)ansiX962c2onb239v4, sizeof ansiX962c2onb239v4 } , SEC_OID_ANSIX962_EC_C2ONB239V4, "ANSI X9.62 elliptic curve c2onb239v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1442 | "ANSI X9.62 elliptic curve c2onb239v4",{ { siDEROID, (unsigned char *)ansiX962c2onb239v4, sizeof ansiX962c2onb239v4 } , SEC_OID_ANSIX962_EC_C2ONB239V4, "ANSI X9.62 elliptic curve c2onb239v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1443 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2onb239v4, sizeof ansiX962c2onb239v4 } , SEC_OID_ANSIX962_EC_C2ONB239V4, "ANSI X9.62 elliptic curve c2onb239v4" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1444 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2onb239v4, sizeof ansiX962c2onb239v4 } , SEC_OID_ANSIX962_EC_C2ONB239V4, "ANSI X9.62 elliptic curve c2onb239v4" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1445 | OD(ansiX962c2onb239v5, SEC_OID_ANSIX962_EC_C2ONB239V5,{ { siDEROID, (unsigned char *)ansiX962c2onb239v5, sizeof ansiX962c2onb239v5 } , SEC_OID_ANSIX962_EC_C2ONB239V5, "ANSI X9.62 elliptic curve c2onb239v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1446 | "ANSI X9.62 elliptic curve c2onb239v5",{ { siDEROID, (unsigned char *)ansiX962c2onb239v5, sizeof ansiX962c2onb239v5 } , SEC_OID_ANSIX962_EC_C2ONB239V5, "ANSI X9.62 elliptic curve c2onb239v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1447 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2onb239v5, sizeof ansiX962c2onb239v5 } , SEC_OID_ANSIX962_EC_C2ONB239V5, "ANSI X9.62 elliptic curve c2onb239v5" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1448 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2onb239v5, sizeof ansiX962c2onb239v5 } , SEC_OID_ANSIX962_EC_C2ONB239V5, "ANSI X9.62 elliptic curve c2onb239v5" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1449 | OD(ansiX962c2pnb272w1, SEC_OID_ANSIX962_EC_C2PNB272W1,{ { siDEROID, (unsigned char *)ansiX962c2pnb272w1, sizeof ansiX962c2pnb272w1 } , SEC_OID_ANSIX962_EC_C2PNB272W1, "ANSI X9.62 elliptic curve c2pnb272w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1450 | "ANSI X9.62 elliptic curve c2pnb272w1",{ { siDEROID, (unsigned char *)ansiX962c2pnb272w1, sizeof ansiX962c2pnb272w1 } , SEC_OID_ANSIX962_EC_C2PNB272W1, "ANSI X9.62 elliptic curve c2pnb272w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1451 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb272w1, sizeof ansiX962c2pnb272w1 } , SEC_OID_ANSIX962_EC_C2PNB272W1, "ANSI X9.62 elliptic curve c2pnb272w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1452 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb272w1, sizeof ansiX962c2pnb272w1 } , SEC_OID_ANSIX962_EC_C2PNB272W1, "ANSI X9.62 elliptic curve c2pnb272w1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1453 | OD(ansiX962c2pnb304w1, SEC_OID_ANSIX962_EC_C2PNB304W1,{ { siDEROID, (unsigned char *)ansiX962c2pnb304w1, sizeof ansiX962c2pnb304w1 } , SEC_OID_ANSIX962_EC_C2PNB304W1, "ANSI X9.62 elliptic curve c2pnb304w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1454 | "ANSI X9.62 elliptic curve c2pnb304w1",{ { siDEROID, (unsigned char *)ansiX962c2pnb304w1, sizeof ansiX962c2pnb304w1 } , SEC_OID_ANSIX962_EC_C2PNB304W1, "ANSI X9.62 elliptic curve c2pnb304w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1455 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb304w1, sizeof ansiX962c2pnb304w1 } , SEC_OID_ANSIX962_EC_C2PNB304W1, "ANSI X9.62 elliptic curve c2pnb304w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1456 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb304w1, sizeof ansiX962c2pnb304w1 } , SEC_OID_ANSIX962_EC_C2PNB304W1, "ANSI X9.62 elliptic curve c2pnb304w1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1457 | OD(ansiX962c2tnb359v1, SEC_OID_ANSIX962_EC_C2TNB359V1,{ { siDEROID, (unsigned char *)ansiX962c2tnb359v1, sizeof ansiX962c2tnb359v1 } , SEC_OID_ANSIX962_EC_C2TNB359V1, "ANSI X9.62 elliptic curve c2tnb359v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1458 | "ANSI X9.62 elliptic curve c2tnb359v1",{ { siDEROID, (unsigned char *)ansiX962c2tnb359v1, sizeof ansiX962c2tnb359v1 } , SEC_OID_ANSIX962_EC_C2TNB359V1, "ANSI X9.62 elliptic curve c2tnb359v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1459 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb359v1, sizeof ansiX962c2tnb359v1 } , SEC_OID_ANSIX962_EC_C2TNB359V1, "ANSI X9.62 elliptic curve c2tnb359v1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1460 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb359v1, sizeof ansiX962c2tnb359v1 } , SEC_OID_ANSIX962_EC_C2TNB359V1, "ANSI X9.62 elliptic curve c2tnb359v1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1461 | OD(ansiX962c2pnb368w1, SEC_OID_ANSIX962_EC_C2PNB368W1,{ { siDEROID, (unsigned char *)ansiX962c2pnb368w1, sizeof ansiX962c2pnb368w1 } , SEC_OID_ANSIX962_EC_C2PNB368W1, "ANSI X9.62 elliptic curve c2pnb368w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1462 | "ANSI X9.62 elliptic curve c2pnb368w1",{ { siDEROID, (unsigned char *)ansiX962c2pnb368w1, sizeof ansiX962c2pnb368w1 } , SEC_OID_ANSIX962_EC_C2PNB368W1, "ANSI X9.62 elliptic curve c2pnb368w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1463 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2pnb368w1, sizeof ansiX962c2pnb368w1 } , SEC_OID_ANSIX962_EC_C2PNB368W1, "ANSI X9.62 elliptic curve c2pnb368w1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1464 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2pnb368w1, sizeof ansiX962c2pnb368w1 } , SEC_OID_ANSIX962_EC_C2PNB368W1, "ANSI X9.62 elliptic curve c2pnb368w1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1465 | OD(ansiX962c2tnb431r1, SEC_OID_ANSIX962_EC_C2TNB431R1,{ { siDEROID, (unsigned char *)ansiX962c2tnb431r1, sizeof ansiX962c2tnb431r1 } , SEC_OID_ANSIX962_EC_C2TNB431R1, "ANSI X9.62 elliptic curve c2tnb431r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1466 | "ANSI X9.62 elliptic curve c2tnb431r1",{ { siDEROID, (unsigned char *)ansiX962c2tnb431r1, sizeof ansiX962c2tnb431r1 } , SEC_OID_ANSIX962_EC_C2TNB431R1, "ANSI X9.62 elliptic curve c2tnb431r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1467 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansiX962c2tnb431r1, sizeof ansiX962c2tnb431r1 } , SEC_OID_ANSIX962_EC_C2TNB431R1, "ANSI X9.62 elliptic curve c2tnb431r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1468 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansiX962c2tnb431r1, sizeof ansiX962c2tnb431r1 } , SEC_OID_ANSIX962_EC_C2TNB431R1, "ANSI X9.62 elliptic curve c2tnb431r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1469 | |
1470 | /* SECG named elliptic curves (characterisitic two field) */ |
1471 | OD(secgECsect113r1, SEC_OID_SECG_EC_SECT113R1,{ { siDEROID, (unsigned char *)secgECsect113r1, sizeof secgECsect113r1 } , SEC_OID_SECG_EC_SECT113R1, "SECG elliptic curve sect113r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1472 | "SECG elliptic curve sect113r1",{ { siDEROID, (unsigned char *)secgECsect113r1, sizeof secgECsect113r1 } , SEC_OID_SECG_EC_SECT113R1, "SECG elliptic curve sect113r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1473 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect113r1, sizeof secgECsect113r1 } , SEC_OID_SECG_EC_SECT113R1, "SECG elliptic curve sect113r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1474 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect113r1, sizeof secgECsect113r1 } , SEC_OID_SECG_EC_SECT113R1, "SECG elliptic curve sect113r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1475 | OD(secgECsect113r2, SEC_OID_SECG_EC_SECT113R2,{ { siDEROID, (unsigned char *)secgECsect113r2, sizeof secgECsect113r2 } , SEC_OID_SECG_EC_SECT113R2, "SECG elliptic curve sect113r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1476 | "SECG elliptic curve sect113r2",{ { siDEROID, (unsigned char *)secgECsect113r2, sizeof secgECsect113r2 } , SEC_OID_SECG_EC_SECT113R2, "SECG elliptic curve sect113r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1477 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect113r2, sizeof secgECsect113r2 } , SEC_OID_SECG_EC_SECT113R2, "SECG elliptic curve sect113r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1478 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect113r2, sizeof secgECsect113r2 } , SEC_OID_SECG_EC_SECT113R2, "SECG elliptic curve sect113r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1479 | OD(secgECsect131r1, SEC_OID_SECG_EC_SECT131R1,{ { siDEROID, (unsigned char *)secgECsect131r1, sizeof secgECsect131r1 } , SEC_OID_SECG_EC_SECT131R1, "SECG elliptic curve sect131r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1480 | "SECG elliptic curve sect131r1",{ { siDEROID, (unsigned char *)secgECsect131r1, sizeof secgECsect131r1 } , SEC_OID_SECG_EC_SECT131R1, "SECG elliptic curve sect131r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1481 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect131r1, sizeof secgECsect131r1 } , SEC_OID_SECG_EC_SECT131R1, "SECG elliptic curve sect131r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1482 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect131r1, sizeof secgECsect131r1 } , SEC_OID_SECG_EC_SECT131R1, "SECG elliptic curve sect131r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1483 | OD(secgECsect131r2, SEC_OID_SECG_EC_SECT131R2,{ { siDEROID, (unsigned char *)secgECsect131r2, sizeof secgECsect131r2 } , SEC_OID_SECG_EC_SECT131R2, "SECG elliptic curve sect131r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1484 | "SECG elliptic curve sect131r2",{ { siDEROID, (unsigned char *)secgECsect131r2, sizeof secgECsect131r2 } , SEC_OID_SECG_EC_SECT131R2, "SECG elliptic curve sect131r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1485 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect131r2, sizeof secgECsect131r2 } , SEC_OID_SECG_EC_SECT131R2, "SECG elliptic curve sect131r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1486 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect131r2, sizeof secgECsect131r2 } , SEC_OID_SECG_EC_SECT131R2, "SECG elliptic curve sect131r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1487 | OD(secgECsect163k1, SEC_OID_SECG_EC_SECT163K1,{ { siDEROID, (unsigned char *)secgECsect163k1, sizeof secgECsect163k1 } , SEC_OID_SECG_EC_SECT163K1, "SECG elliptic curve sect163k1 (aka NIST K-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1488 | "SECG elliptic curve sect163k1 (aka NIST K-163)",{ { siDEROID, (unsigned char *)secgECsect163k1, sizeof secgECsect163k1 } , SEC_OID_SECG_EC_SECT163K1, "SECG elliptic curve sect163k1 (aka NIST K-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1489 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect163k1, sizeof secgECsect163k1 } , SEC_OID_SECG_EC_SECT163K1, "SECG elliptic curve sect163k1 (aka NIST K-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1490 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect163k1, sizeof secgECsect163k1 } , SEC_OID_SECG_EC_SECT163K1, "SECG elliptic curve sect163k1 (aka NIST K-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1491 | OD(secgECsect163r1, SEC_OID_SECG_EC_SECT163R1,{ { siDEROID, (unsigned char *)secgECsect163r1, sizeof secgECsect163r1 } , SEC_OID_SECG_EC_SECT163R1, "SECG elliptic curve sect163r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1492 | "SECG elliptic curve sect163r1",{ { siDEROID, (unsigned char *)secgECsect163r1, sizeof secgECsect163r1 } , SEC_OID_SECG_EC_SECT163R1, "SECG elliptic curve sect163r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1493 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect163r1, sizeof secgECsect163r1 } , SEC_OID_SECG_EC_SECT163R1, "SECG elliptic curve sect163r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1494 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect163r1, sizeof secgECsect163r1 } , SEC_OID_SECG_EC_SECT163R1, "SECG elliptic curve sect163r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1495 | OD(secgECsect163r2, SEC_OID_SECG_EC_SECT163R2,{ { siDEROID, (unsigned char *)secgECsect163r2, sizeof secgECsect163r2 } , SEC_OID_SECG_EC_SECT163R2, "SECG elliptic curve sect163r2 (aka NIST B-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1496 | "SECG elliptic curve sect163r2 (aka NIST B-163)",{ { siDEROID, (unsigned char *)secgECsect163r2, sizeof secgECsect163r2 } , SEC_OID_SECG_EC_SECT163R2, "SECG elliptic curve sect163r2 (aka NIST B-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1497 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect163r2, sizeof secgECsect163r2 } , SEC_OID_SECG_EC_SECT163R2, "SECG elliptic curve sect163r2 (aka NIST B-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1498 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect163r2, sizeof secgECsect163r2 } , SEC_OID_SECG_EC_SECT163R2, "SECG elliptic curve sect163r2 (aka NIST B-163)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1499 | OD(secgECsect193r1, SEC_OID_SECG_EC_SECT193R1,{ { siDEROID, (unsigned char *)secgECsect193r1, sizeof secgECsect193r1 } , SEC_OID_SECG_EC_SECT193R1, "SECG elliptic curve sect193r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1500 | "SECG elliptic curve sect193r1",{ { siDEROID, (unsigned char *)secgECsect193r1, sizeof secgECsect193r1 } , SEC_OID_SECG_EC_SECT193R1, "SECG elliptic curve sect193r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1501 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect193r1, sizeof secgECsect193r1 } , SEC_OID_SECG_EC_SECT193R1, "SECG elliptic curve sect193r1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1502 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect193r1, sizeof secgECsect193r1 } , SEC_OID_SECG_EC_SECT193R1, "SECG elliptic curve sect193r1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1503 | OD(secgECsect193r2, SEC_OID_SECG_EC_SECT193R2,{ { siDEROID, (unsigned char *)secgECsect193r2, sizeof secgECsect193r2 } , SEC_OID_SECG_EC_SECT193R2, "SECG elliptic curve sect193r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1504 | "SECG elliptic curve sect193r2",{ { siDEROID, (unsigned char *)secgECsect193r2, sizeof secgECsect193r2 } , SEC_OID_SECG_EC_SECT193R2, "SECG elliptic curve sect193r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1505 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect193r2, sizeof secgECsect193r2 } , SEC_OID_SECG_EC_SECT193R2, "SECG elliptic curve sect193r2" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1506 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect193r2, sizeof secgECsect193r2 } , SEC_OID_SECG_EC_SECT193R2, "SECG elliptic curve sect193r2" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1507 | OD(secgECsect233k1, SEC_OID_SECG_EC_SECT233K1,{ { siDEROID, (unsigned char *)secgECsect233k1, sizeof secgECsect233k1 } , SEC_OID_SECG_EC_SECT233K1, "SECG elliptic curve sect233k1 (aka NIST K-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1508 | "SECG elliptic curve sect233k1 (aka NIST K-233)",{ { siDEROID, (unsigned char *)secgECsect233k1, sizeof secgECsect233k1 } , SEC_OID_SECG_EC_SECT233K1, "SECG elliptic curve sect233k1 (aka NIST K-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1509 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect233k1, sizeof secgECsect233k1 } , SEC_OID_SECG_EC_SECT233K1, "SECG elliptic curve sect233k1 (aka NIST K-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1510 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect233k1, sizeof secgECsect233k1 } , SEC_OID_SECG_EC_SECT233K1, "SECG elliptic curve sect233k1 (aka NIST K-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1511 | OD(secgECsect233r1, SEC_OID_SECG_EC_SECT233R1,{ { siDEROID, (unsigned char *)secgECsect233r1, sizeof secgECsect233r1 } , SEC_OID_SECG_EC_SECT233R1, "SECG elliptic curve sect233r1 (aka NIST B-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1512 | "SECG elliptic curve sect233r1 (aka NIST B-233)",{ { siDEROID, (unsigned char *)secgECsect233r1, sizeof secgECsect233r1 } , SEC_OID_SECG_EC_SECT233R1, "SECG elliptic curve sect233r1 (aka NIST B-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1513 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect233r1, sizeof secgECsect233r1 } , SEC_OID_SECG_EC_SECT233R1, "SECG elliptic curve sect233r1 (aka NIST B-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1514 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect233r1, sizeof secgECsect233r1 } , SEC_OID_SECG_EC_SECT233R1, "SECG elliptic curve sect233r1 (aka NIST B-233)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1515 | OD(secgECsect239k1, SEC_OID_SECG_EC_SECT239K1,{ { siDEROID, (unsigned char *)secgECsect239k1, sizeof secgECsect239k1 } , SEC_OID_SECG_EC_SECT239K1, "SECG elliptic curve sect239k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1516 | "SECG elliptic curve sect239k1",{ { siDEROID, (unsigned char *)secgECsect239k1, sizeof secgECsect239k1 } , SEC_OID_SECG_EC_SECT239K1, "SECG elliptic curve sect239k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1517 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect239k1, sizeof secgECsect239k1 } , SEC_OID_SECG_EC_SECT239K1, "SECG elliptic curve sect239k1" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1518 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect239k1, sizeof secgECsect239k1 } , SEC_OID_SECG_EC_SECT239K1, "SECG elliptic curve sect239k1" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1519 | OD(secgECsect283k1, SEC_OID_SECG_EC_SECT283K1,{ { siDEROID, (unsigned char *)secgECsect283k1, sizeof secgECsect283k1 } , SEC_OID_SECG_EC_SECT283K1, "SECG elliptic curve sect283k1 (aka NIST K-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1520 | "SECG elliptic curve sect283k1 (aka NIST K-283)",{ { siDEROID, (unsigned char *)secgECsect283k1, sizeof secgECsect283k1 } , SEC_OID_SECG_EC_SECT283K1, "SECG elliptic curve sect283k1 (aka NIST K-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1521 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect283k1, sizeof secgECsect283k1 } , SEC_OID_SECG_EC_SECT283K1, "SECG elliptic curve sect283k1 (aka NIST K-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1522 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect283k1, sizeof secgECsect283k1 } , SEC_OID_SECG_EC_SECT283K1, "SECG elliptic curve sect283k1 (aka NIST K-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1523 | OD(secgECsect283r1, SEC_OID_SECG_EC_SECT283R1,{ { siDEROID, (unsigned char *)secgECsect283r1, sizeof secgECsect283r1 } , SEC_OID_SECG_EC_SECT283R1, "SECG elliptic curve sect283r1 (aka NIST B-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1524 | "SECG elliptic curve sect283r1 (aka NIST B-283)",{ { siDEROID, (unsigned char *)secgECsect283r1, sizeof secgECsect283r1 } , SEC_OID_SECG_EC_SECT283R1, "SECG elliptic curve sect283r1 (aka NIST B-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1525 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect283r1, sizeof secgECsect283r1 } , SEC_OID_SECG_EC_SECT283R1, "SECG elliptic curve sect283r1 (aka NIST B-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1526 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect283r1, sizeof secgECsect283r1 } , SEC_OID_SECG_EC_SECT283R1, "SECG elliptic curve sect283r1 (aka NIST B-283)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1527 | OD(secgECsect409k1, SEC_OID_SECG_EC_SECT409K1,{ { siDEROID, (unsigned char *)secgECsect409k1, sizeof secgECsect409k1 } , SEC_OID_SECG_EC_SECT409K1, "SECG elliptic curve sect409k1 (aka NIST K-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1528 | "SECG elliptic curve sect409k1 (aka NIST K-409)",{ { siDEROID, (unsigned char *)secgECsect409k1, sizeof secgECsect409k1 } , SEC_OID_SECG_EC_SECT409K1, "SECG elliptic curve sect409k1 (aka NIST K-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1529 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect409k1, sizeof secgECsect409k1 } , SEC_OID_SECG_EC_SECT409K1, "SECG elliptic curve sect409k1 (aka NIST K-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1530 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect409k1, sizeof secgECsect409k1 } , SEC_OID_SECG_EC_SECT409K1, "SECG elliptic curve sect409k1 (aka NIST K-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1531 | OD(secgECsect409r1, SEC_OID_SECG_EC_SECT409R1,{ { siDEROID, (unsigned char *)secgECsect409r1, sizeof secgECsect409r1 } , SEC_OID_SECG_EC_SECT409R1, "SECG elliptic curve sect409r1 (aka NIST B-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1532 | "SECG elliptic curve sect409r1 (aka NIST B-409)",{ { siDEROID, (unsigned char *)secgECsect409r1, sizeof secgECsect409r1 } , SEC_OID_SECG_EC_SECT409R1, "SECG elliptic curve sect409r1 (aka NIST B-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1533 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect409r1, sizeof secgECsect409r1 } , SEC_OID_SECG_EC_SECT409R1, "SECG elliptic curve sect409r1 (aka NIST B-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1534 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect409r1, sizeof secgECsect409r1 } , SEC_OID_SECG_EC_SECT409R1, "SECG elliptic curve sect409r1 (aka NIST B-409)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1535 | OD(secgECsect571k1, SEC_OID_SECG_EC_SECT571K1,{ { siDEROID, (unsigned char *)secgECsect571k1, sizeof secgECsect571k1 } , SEC_OID_SECG_EC_SECT571K1, "SECG elliptic curve sect571k1 (aka NIST K-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1536 | "SECG elliptic curve sect571k1 (aka NIST K-571)",{ { siDEROID, (unsigned char *)secgECsect571k1, sizeof secgECsect571k1 } , SEC_OID_SECG_EC_SECT571K1, "SECG elliptic curve sect571k1 (aka NIST K-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1537 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect571k1, sizeof secgECsect571k1 } , SEC_OID_SECG_EC_SECT571K1, "SECG elliptic curve sect571k1 (aka NIST K-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1538 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect571k1, sizeof secgECsect571k1 } , SEC_OID_SECG_EC_SECT571K1, "SECG elliptic curve sect571k1 (aka NIST K-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1539 | OD(secgECsect571r1, SEC_OID_SECG_EC_SECT571R1,{ { siDEROID, (unsigned char *)secgECsect571r1, sizeof secgECsect571r1 } , SEC_OID_SECG_EC_SECT571R1, "SECG elliptic curve sect571r1 (aka NIST B-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1540 | "SECG elliptic curve sect571r1 (aka NIST B-571)",{ { siDEROID, (unsigned char *)secgECsect571r1, sizeof secgECsect571r1 } , SEC_OID_SECG_EC_SECT571R1, "SECG elliptic curve sect571r1 (aka NIST B-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1541 | CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)secgECsect571r1, sizeof secgECsect571r1 } , SEC_OID_SECG_EC_SECT571R1, "SECG elliptic curve sect571r1 (aka NIST B-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1542 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)secgECsect571r1, sizeof secgECsect571r1 } , SEC_OID_SECG_EC_SECT571R1, "SECG elliptic curve sect571r1 (aka NIST B-571)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1543 | |
1544 | OD(netscapeAOLScreenname, SEC_OID_NETSCAPE_AOLSCREENNAME,{ { siDEROID, (unsigned char *)netscapeAOLScreenname, sizeof netscapeAOLScreenname } , SEC_OID_NETSCAPE_AOLSCREENNAME, "AOL Screenname", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1545 | "AOL Screenname", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)netscapeAOLScreenname, sizeof netscapeAOLScreenname } , SEC_OID_NETSCAPE_AOLSCREENNAME, "AOL Screenname", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1546 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)netscapeAOLScreenname, sizeof netscapeAOLScreenname } , SEC_OID_NETSCAPE_AOLSCREENNAME, "AOL Screenname", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1547 | |
1548 | OD(x520SurName, SEC_OID_AVA_SURNAME,{ { siDEROID, (unsigned char *)x520SurName, sizeof x520SurName } , SEC_OID_AVA_SURNAME, "X520 Title", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1549 | "X520 Title", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520SurName, sizeof x520SurName } , SEC_OID_AVA_SURNAME, "X520 Title", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1550 | OD(x520SerialNumber, SEC_OID_AVA_SERIAL_NUMBER,{ { siDEROID, (unsigned char *)x520SerialNumber, sizeof x520SerialNumber } , SEC_OID_AVA_SERIAL_NUMBER, "X520 Serial Number", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1551 | "X520 Serial Number", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520SerialNumber, sizeof x520SerialNumber } , SEC_OID_AVA_SERIAL_NUMBER, "X520 Serial Number", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1552 | OD(x520StreetAddress, SEC_OID_AVA_STREET_ADDRESS,{ { siDEROID, (unsigned char *)x520StreetAddress, sizeof x520StreetAddress } , SEC_OID_AVA_STREET_ADDRESS, "X520 Street Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1553 | "X520 Street Address", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520StreetAddress, sizeof x520StreetAddress } , SEC_OID_AVA_STREET_ADDRESS, "X520 Street Address", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1554 | OD(x520Title, SEC_OID_AVA_TITLE,{ { siDEROID, (unsigned char *)x520Title, sizeof x520Title } , SEC_OID_AVA_TITLE, "X520 Title", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1555 | "X520 Title", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520Title, sizeof x520Title } , SEC_OID_AVA_TITLE, "X520 Title", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1556 | OD(x520PostalAddress, SEC_OID_AVA_POSTAL_ADDRESS,{ { siDEROID, (unsigned char *)x520PostalAddress, sizeof x520PostalAddress } , SEC_OID_AVA_POSTAL_ADDRESS, "X520 Postal Address", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1557 | "X520 Postal Address", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520PostalAddress, sizeof x520PostalAddress } , SEC_OID_AVA_POSTAL_ADDRESS, "X520 Postal Address", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1558 | OD(x520PostalCode, SEC_OID_AVA_POSTAL_CODE,{ { siDEROID, (unsigned char *)x520PostalCode, sizeof x520PostalCode } , SEC_OID_AVA_POSTAL_CODE, "X520 Postal Code", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1559 | "X520 Postal Code", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520PostalCode, sizeof x520PostalCode } , SEC_OID_AVA_POSTAL_CODE, "X520 Postal Code", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1560 | OD(x520PostOfficeBox, SEC_OID_AVA_POST_OFFICE_BOX,{ { siDEROID, (unsigned char *)x520PostOfficeBox, sizeof x520PostOfficeBox } , SEC_OID_AVA_POST_OFFICE_BOX, "X520 Post Office Box", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1561 | "X520 Post Office Box", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520PostOfficeBox, sizeof x520PostOfficeBox } , SEC_OID_AVA_POST_OFFICE_BOX, "X520 Post Office Box", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1562 | OD(x520GivenName, SEC_OID_AVA_GIVEN_NAME,{ { siDEROID, (unsigned char *)x520GivenName, sizeof x520GivenName } , SEC_OID_AVA_GIVEN_NAME, "X520 Given Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1563 | "X520 Given Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520GivenName, sizeof x520GivenName } , SEC_OID_AVA_GIVEN_NAME, "X520 Given Name", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1564 | OD(x520Initials, SEC_OID_AVA_INITIALS,{ { siDEROID, (unsigned char *)x520Initials, sizeof x520Initials } , SEC_OID_AVA_INITIALS, "X520 Initials", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1565 | "X520 Initials", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520Initials, sizeof x520Initials } , SEC_OID_AVA_INITIALS, "X520 Initials", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1566 | OD(x520GenerationQualifier, SEC_OID_AVA_GENERATION_QUALIFIER,{ { siDEROID, (unsigned char *)x520GenerationQualifier, sizeof x520GenerationQualifier } , SEC_OID_AVA_GENERATION_QUALIFIER , "X520 Generation Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1567 | "X520 Generation Qualifier",{ { siDEROID, (unsigned char *)x520GenerationQualifier, sizeof x520GenerationQualifier } , SEC_OID_AVA_GENERATION_QUALIFIER , "X520 Generation Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1568 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520GenerationQualifier, sizeof x520GenerationQualifier } , SEC_OID_AVA_GENERATION_QUALIFIER , "X520 Generation Qualifier", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1569 | OD(x520HouseIdentifier, SEC_OID_AVA_HOUSE_IDENTIFIER,{ { siDEROID, (unsigned char *)x520HouseIdentifier, sizeof x520HouseIdentifier } , SEC_OID_AVA_HOUSE_IDENTIFIER, "X520 House Identifier", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1570 | "X520 House Identifier",{ { siDEROID, (unsigned char *)x520HouseIdentifier, sizeof x520HouseIdentifier } , SEC_OID_AVA_HOUSE_IDENTIFIER, "X520 House Identifier", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1571 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520HouseIdentifier, sizeof x520HouseIdentifier } , SEC_OID_AVA_HOUSE_IDENTIFIER, "X520 House Identifier", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1572 | OD(x520Pseudonym, SEC_OID_AVA_PSEUDONYM,{ { siDEROID, (unsigned char *)x520Pseudonym, sizeof x520Pseudonym } , SEC_OID_AVA_PSEUDONYM, "X520 Pseudonym", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1573 | "X520 Pseudonym", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520Pseudonym, sizeof x520Pseudonym } , SEC_OID_AVA_PSEUDONYM, "X520 Pseudonym", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1574 | |
1575 | /* More OIDs */ |
1576 | OD(pkixCAIssuers, SEC_OID_PKIX_CA_ISSUERS,{ { siDEROID, (unsigned char *)pkixCAIssuers, sizeof pkixCAIssuers } , SEC_OID_PKIX_CA_ISSUERS, "PKIX CA issuers access method" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1577 | "PKIX CA issuers access method",{ { siDEROID, (unsigned char *)pkixCAIssuers, sizeof pkixCAIssuers } , SEC_OID_PKIX_CA_ISSUERS, "PKIX CA issuers access method" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1578 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixCAIssuers, sizeof pkixCAIssuers } , SEC_OID_PKIX_CA_ISSUERS, "PKIX CA issuers access method" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1579 | OD(pkcs9ExtensionRequest, SEC_OID_PKCS9_EXTENSION_REQUEST,{ { siDEROID, (unsigned char *)pkcs9ExtensionRequest, sizeof pkcs9ExtensionRequest } , SEC_OID_PKCS9_EXTENSION_REQUEST, "PKCS #9 Extension Request" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1580 | "PKCS #9 Extension Request",{ { siDEROID, (unsigned char *)pkcs9ExtensionRequest, sizeof pkcs9ExtensionRequest } , SEC_OID_PKCS9_EXTENSION_REQUEST, "PKCS #9 Extension Request" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1581 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs9ExtensionRequest, sizeof pkcs9ExtensionRequest } , SEC_OID_PKCS9_EXTENSION_REQUEST, "PKCS #9 Extension Request" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1582 | |
1583 | /* more ECC Signature Oids */ |
1584 | OD(ansix962SignatureRecommended,{ { siDEROID, (unsigned char *)ansix962SignatureRecommended, sizeof ansix962SignatureRecommended } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST , "X9.62 ECDSA signature with recommended digest", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1585 | SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST,{ { siDEROID, (unsigned char *)ansix962SignatureRecommended, sizeof ansix962SignatureRecommended } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST , "X9.62 ECDSA signature with recommended digest", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1586 | "X9.62 ECDSA signature with recommended digest", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)ansix962SignatureRecommended, sizeof ansix962SignatureRecommended } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST , "X9.62 ECDSA signature with recommended digest", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1587 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignatureRecommended, sizeof ansix962SignatureRecommended } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST , "X9.62 ECDSA signature with recommended digest", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1588 | OD(ansix962SignatureSpecified,{ { siDEROID, (unsigned char *)ansix962SignatureSpecified, sizeof ansix962SignatureSpecified } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST , "X9.62 ECDSA signature with specified digest", 0x00001041UL , INVALID_CERT_EXTENSION } |
1589 | SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST,{ { siDEROID, (unsigned char *)ansix962SignatureSpecified, sizeof ansix962SignatureSpecified } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST , "X9.62 ECDSA signature with specified digest", 0x00001041UL , INVALID_CERT_EXTENSION } |
1590 | "X9.62 ECDSA signature with specified digest", CKM_ECDSA,{ { siDEROID, (unsigned char *)ansix962SignatureSpecified, sizeof ansix962SignatureSpecified } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST , "X9.62 ECDSA signature with specified digest", 0x00001041UL , INVALID_CERT_EXTENSION } |
1591 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignatureSpecified, sizeof ansix962SignatureSpecified } , SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST , "X9.62 ECDSA signature with specified digest", 0x00001041UL , INVALID_CERT_EXTENSION }, |
1592 | OD(ansix962SignaturewithSHA224Digest,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA224Digest , sizeof ansix962SignaturewithSHA224Digest } , SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE , "X9.62 ECDSA signature with SHA224", 0x00001043UL, INVALID_CERT_EXTENSION } |
1593 | SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA224Digest , sizeof ansix962SignaturewithSHA224Digest } , SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE , "X9.62 ECDSA signature with SHA224", 0x00001043UL, INVALID_CERT_EXTENSION } |
1594 | "X9.62 ECDSA signature with SHA224", CKM_ECDSA_SHA224,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA224Digest , sizeof ansix962SignaturewithSHA224Digest } , SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE , "X9.62 ECDSA signature with SHA224", 0x00001043UL, INVALID_CERT_EXTENSION } |
1595 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignaturewithSHA224Digest , sizeof ansix962SignaturewithSHA224Digest } , SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE , "X9.62 ECDSA signature with SHA224", 0x00001043UL, INVALID_CERT_EXTENSION }, |
1596 | OD(ansix962SignaturewithSHA256Digest,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA256Digest , sizeof ansix962SignaturewithSHA256Digest } , SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE , "X9.62 ECDSA signature with SHA256", 0x00001044UL, INVALID_CERT_EXTENSION } |
1597 | SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA256Digest , sizeof ansix962SignaturewithSHA256Digest } , SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE , "X9.62 ECDSA signature with SHA256", 0x00001044UL, INVALID_CERT_EXTENSION } |
1598 | "X9.62 ECDSA signature with SHA256", CKM_ECDSA_SHA256,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA256Digest , sizeof ansix962SignaturewithSHA256Digest } , SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE , "X9.62 ECDSA signature with SHA256", 0x00001044UL, INVALID_CERT_EXTENSION } |
1599 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignaturewithSHA256Digest , sizeof ansix962SignaturewithSHA256Digest } , SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE , "X9.62 ECDSA signature with SHA256", 0x00001044UL, INVALID_CERT_EXTENSION }, |
1600 | OD(ansix962SignaturewithSHA384Digest,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA384Digest , sizeof ansix962SignaturewithSHA384Digest } , SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE , "X9.62 ECDSA signature with SHA384", 0x00001045UL, INVALID_CERT_EXTENSION } |
1601 | SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA384Digest , sizeof ansix962SignaturewithSHA384Digest } , SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE , "X9.62 ECDSA signature with SHA384", 0x00001045UL, INVALID_CERT_EXTENSION } |
1602 | "X9.62 ECDSA signature with SHA384", CKM_ECDSA_SHA384,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA384Digest , sizeof ansix962SignaturewithSHA384Digest } , SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE , "X9.62 ECDSA signature with SHA384", 0x00001045UL, INVALID_CERT_EXTENSION } |
1603 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignaturewithSHA384Digest , sizeof ansix962SignaturewithSHA384Digest } , SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE , "X9.62 ECDSA signature with SHA384", 0x00001045UL, INVALID_CERT_EXTENSION }, |
1604 | OD(ansix962SignaturewithSHA512Digest,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA512Digest , sizeof ansix962SignaturewithSHA512Digest } , SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE , "X9.62 ECDSA signature with SHA512", 0x00001046UL, INVALID_CERT_EXTENSION } |
1605 | SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA512Digest , sizeof ansix962SignaturewithSHA512Digest } , SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE , "X9.62 ECDSA signature with SHA512", 0x00001046UL, INVALID_CERT_EXTENSION } |
1606 | "X9.62 ECDSA signature with SHA512", CKM_ECDSA_SHA512,{ { siDEROID, (unsigned char *)ansix962SignaturewithSHA512Digest , sizeof ansix962SignaturewithSHA512Digest } , SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE , "X9.62 ECDSA signature with SHA512", 0x00001046UL, INVALID_CERT_EXTENSION } |
1607 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ansix962SignaturewithSHA512Digest , sizeof ansix962SignaturewithSHA512Digest } , SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE , "X9.62 ECDSA signature with SHA512", 0x00001046UL, INVALID_CERT_EXTENSION }, |
1608 | |
1609 | /* More id-ce and id-pe OIDs from RFC 3280 */ |
1610 | OD(x509HoldInstructionCode, SEC_OID_X509_HOLD_INSTRUCTION_CODE,{ { siDEROID, (unsigned char *)x509HoldInstructionCode, sizeof x509HoldInstructionCode } , SEC_OID_X509_HOLD_INSTRUCTION_CODE , "CRL Hold Instruction Code", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1611 | "CRL Hold Instruction Code", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509HoldInstructionCode, sizeof x509HoldInstructionCode } , SEC_OID_X509_HOLD_INSTRUCTION_CODE , "CRL Hold Instruction Code", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1612 | UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509HoldInstructionCode, sizeof x509HoldInstructionCode } , SEC_OID_X509_HOLD_INSTRUCTION_CODE , "CRL Hold Instruction Code", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1613 | OD(x509DeltaCRLIndicator, SEC_OID_X509_DELTA_CRL_INDICATOR,{ { siDEROID, (unsigned char *)x509DeltaCRLIndicator, sizeof x509DeltaCRLIndicator } , SEC_OID_X509_DELTA_CRL_INDICATOR, "Delta CRL Indicator", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1614 | "Delta CRL Indicator", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509DeltaCRLIndicator, sizeof x509DeltaCRLIndicator } , SEC_OID_X509_DELTA_CRL_INDICATOR, "Delta CRL Indicator", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1615 | FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509DeltaCRLIndicator, sizeof x509DeltaCRLIndicator } , SEC_OID_X509_DELTA_CRL_INDICATOR, "Delta CRL Indicator", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1616 | OD(x509IssuingDistributionPoint, SEC_OID_X509_ISSUING_DISTRIBUTION_POINT,{ { siDEROID, (unsigned char *)x509IssuingDistributionPoint, sizeof x509IssuingDistributionPoint } , SEC_OID_X509_ISSUING_DISTRIBUTION_POINT , "Issuing Distribution Point", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1617 | "Issuing Distribution Point", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509IssuingDistributionPoint, sizeof x509IssuingDistributionPoint } , SEC_OID_X509_ISSUING_DISTRIBUTION_POINT , "Issuing Distribution Point", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1618 | FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509IssuingDistributionPoint, sizeof x509IssuingDistributionPoint } , SEC_OID_X509_ISSUING_DISTRIBUTION_POINT , "Issuing Distribution Point", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1619 | OD(x509CertIssuer, SEC_OID_X509_CERT_ISSUER,{ { siDEROID, (unsigned char *)x509CertIssuer, sizeof x509CertIssuer } , SEC_OID_X509_CERT_ISSUER, "Certificate Issuer Extension" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1620 | "Certificate Issuer Extension", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509CertIssuer, sizeof x509CertIssuer } , SEC_OID_X509_CERT_ISSUER, "Certificate Issuer Extension" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1621 | FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509CertIssuer, sizeof x509CertIssuer } , SEC_OID_X509_CERT_ISSUER, "Certificate Issuer Extension" , 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1622 | OD(x509FreshestCRL, SEC_OID_X509_FRESHEST_CRL,{ { siDEROID, (unsigned char *)x509FreshestCRL, sizeof x509FreshestCRL } , SEC_OID_X509_FRESHEST_CRL, "Freshest CRL", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1623 | "Freshest CRL", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509FreshestCRL, sizeof x509FreshestCRL } , SEC_OID_X509_FRESHEST_CRL, "Freshest CRL", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1624 | UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509FreshestCRL, sizeof x509FreshestCRL } , SEC_OID_X509_FRESHEST_CRL, "Freshest CRL", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1625 | OD(x509InhibitAnyPolicy, SEC_OID_X509_INHIBIT_ANY_POLICY,{ { siDEROID, (unsigned char *)x509InhibitAnyPolicy, sizeof x509InhibitAnyPolicy } , SEC_OID_X509_INHIBIT_ANY_POLICY, "Inhibit Any Policy", 0xffffffffUL , UNSUPPORTED_CERT_EXTENSION } |
1626 | "Inhibit Any Policy", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509InhibitAnyPolicy, sizeof x509InhibitAnyPolicy } , SEC_OID_X509_INHIBIT_ANY_POLICY, "Inhibit Any Policy", 0xffffffffUL , UNSUPPORTED_CERT_EXTENSION } |
1627 | FAKE_SUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509InhibitAnyPolicy, sizeof x509InhibitAnyPolicy } , SEC_OID_X509_INHIBIT_ANY_POLICY, "Inhibit Any Policy", 0xffffffffUL , UNSUPPORTED_CERT_EXTENSION }, |
1628 | OD(x509SubjectInfoAccess, SEC_OID_X509_SUBJECT_INFO_ACCESS,{ { siDEROID, (unsigned char *)x509SubjectInfoAccess, sizeof x509SubjectInfoAccess } , SEC_OID_X509_SUBJECT_INFO_ACCESS, "Subject Info Access", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1629 | "Subject Info Access", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509SubjectInfoAccess, sizeof x509SubjectInfoAccess } , SEC_OID_X509_SUBJECT_INFO_ACCESS, "Subject Info Access", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION } |
1630 | UNSUPPORTED_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SubjectInfoAccess, sizeof x509SubjectInfoAccess } , SEC_OID_X509_SUBJECT_INFO_ACCESS, "Subject Info Access", 0xffffffffUL, UNSUPPORTED_CERT_EXTENSION }, |
1631 | |
1632 | /* Camellia algorithm OIDs */ |
1633 | OD(camellia128_CBC, SEC_OID_CAMELLIA_128_CBC,{ { siDEROID, (unsigned char *)camellia128_CBC, sizeof camellia128_CBC } , SEC_OID_CAMELLIA_128_CBC, "CAMELLIA-128-CBC", 0x00000552UL , INVALID_CERT_EXTENSION } |
1634 | "CAMELLIA-128-CBC", CKM_CAMELLIA_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)camellia128_CBC, sizeof camellia128_CBC } , SEC_OID_CAMELLIA_128_CBC, "CAMELLIA-128-CBC", 0x00000552UL , INVALID_CERT_EXTENSION }, |
1635 | OD(camellia192_CBC, SEC_OID_CAMELLIA_192_CBC,{ { siDEROID, (unsigned char *)camellia192_CBC, sizeof camellia192_CBC } , SEC_OID_CAMELLIA_192_CBC, "CAMELLIA-192-CBC", 0x00000552UL , INVALID_CERT_EXTENSION } |
1636 | "CAMELLIA-192-CBC", CKM_CAMELLIA_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)camellia192_CBC, sizeof camellia192_CBC } , SEC_OID_CAMELLIA_192_CBC, "CAMELLIA-192-CBC", 0x00000552UL , INVALID_CERT_EXTENSION }, |
1637 | OD(camellia256_CBC, SEC_OID_CAMELLIA_256_CBC,{ { siDEROID, (unsigned char *)camellia256_CBC, sizeof camellia256_CBC } , SEC_OID_CAMELLIA_256_CBC, "CAMELLIA-256-CBC", 0x00000552UL , INVALID_CERT_EXTENSION } |
1638 | "CAMELLIA-256-CBC", CKM_CAMELLIA_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)camellia256_CBC, sizeof camellia256_CBC } , SEC_OID_CAMELLIA_256_CBC, "CAMELLIA-256-CBC", 0x00000552UL , INVALID_CERT_EXTENSION }, |
1639 | |
1640 | /* PKCS 5 v2 OIDS */ |
1641 | OD(pkcs5Pbkdf2, SEC_OID_PKCS5_PBKDF2,{ { siDEROID, (unsigned char *)pkcs5Pbkdf2, sizeof pkcs5Pbkdf2 } , SEC_OID_PKCS5_PBKDF2, "PKCS #5 Password Based Key Dervive Function v2 " , 0x000003B0UL, INVALID_CERT_EXTENSION } |
1642 | "PKCS #5 Password Based Key Dervive Function v2 ",{ { siDEROID, (unsigned char *)pkcs5Pbkdf2, sizeof pkcs5Pbkdf2 } , SEC_OID_PKCS5_PBKDF2, "PKCS #5 Password Based Key Dervive Function v2 " , 0x000003B0UL, INVALID_CERT_EXTENSION } |
1643 | CKM_PKCS5_PBKD2, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5Pbkdf2, sizeof pkcs5Pbkdf2 } , SEC_OID_PKCS5_PBKDF2, "PKCS #5 Password Based Key Dervive Function v2 " , 0x000003B0UL, INVALID_CERT_EXTENSION }, |
1644 | OD(pkcs5Pbes2, SEC_OID_PKCS5_PBES2,{ { siDEROID, (unsigned char *)pkcs5Pbes2, sizeof pkcs5Pbes2 } , SEC_OID_PKCS5_PBES2, "PKCS #5 Password Based Encryption v2 " , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1645 | "PKCS #5 Password Based Encryption v2 ",{ { siDEROID, (unsigned char *)pkcs5Pbes2, sizeof pkcs5Pbes2 } , SEC_OID_PKCS5_PBES2, "PKCS #5 Password Based Encryption v2 " , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1646 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5Pbes2, sizeof pkcs5Pbes2 } , SEC_OID_PKCS5_PBES2, "PKCS #5 Password Based Encryption v2 " , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1647 | OD(pkcs5Pbmac1, SEC_OID_PKCS5_PBMAC1,{ { siDEROID, (unsigned char *)pkcs5Pbmac1, sizeof pkcs5Pbmac1 } , SEC_OID_PKCS5_PBMAC1, "PKCS #5 Password Based Authentication v1 " , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1648 | "PKCS #5 Password Based Authentication v1 ",{ { siDEROID, (unsigned char *)pkcs5Pbmac1, sizeof pkcs5Pbmac1 } , SEC_OID_PKCS5_PBMAC1, "PKCS #5 Password Based Authentication v1 " , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1649 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs5Pbmac1, sizeof pkcs5Pbmac1 } , SEC_OID_PKCS5_PBMAC1, "PKCS #5 Password Based Authentication v1 " , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1650 | OD(hmac_sha1, SEC_OID_HMAC_SHA1, "HMAC SHA-1",{ { siDEROID, (unsigned char *)hmac_sha1, sizeof hmac_sha1 } , SEC_OID_HMAC_SHA1, "HMAC SHA-1", 0x00000221UL, INVALID_CERT_EXTENSION } |
1651 | CKM_SHA_1_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha1, sizeof hmac_sha1 } , SEC_OID_HMAC_SHA1, "HMAC SHA-1", 0x00000221UL, INVALID_CERT_EXTENSION }, |
1652 | OD(hmac_sha224, SEC_OID_HMAC_SHA224, "HMAC SHA-224",{ { siDEROID, (unsigned char *)hmac_sha224, sizeof hmac_sha224 } , SEC_OID_HMAC_SHA224, "HMAC SHA-224", 0x00000256UL, INVALID_CERT_EXTENSION } |
1653 | CKM_SHA224_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha224, sizeof hmac_sha224 } , SEC_OID_HMAC_SHA224, "HMAC SHA-224", 0x00000256UL, INVALID_CERT_EXTENSION }, |
1654 | OD(hmac_sha256, SEC_OID_HMAC_SHA256, "HMAC SHA-256",{ { siDEROID, (unsigned char *)hmac_sha256, sizeof hmac_sha256 } , SEC_OID_HMAC_SHA256, "HMAC SHA-256", 0x00000251UL, INVALID_CERT_EXTENSION } |
1655 | CKM_SHA256_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha256, sizeof hmac_sha256 } , SEC_OID_HMAC_SHA256, "HMAC SHA-256", 0x00000251UL, INVALID_CERT_EXTENSION }, |
1656 | OD(hmac_sha384, SEC_OID_HMAC_SHA384, "HMAC SHA-384",{ { siDEROID, (unsigned char *)hmac_sha384, sizeof hmac_sha384 } , SEC_OID_HMAC_SHA384, "HMAC SHA-384", 0x00000261UL, INVALID_CERT_EXTENSION } |
1657 | CKM_SHA384_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha384, sizeof hmac_sha384 } , SEC_OID_HMAC_SHA384, "HMAC SHA-384", 0x00000261UL, INVALID_CERT_EXTENSION }, |
1658 | OD(hmac_sha512, SEC_OID_HMAC_SHA512, "HMAC SHA-512",{ { siDEROID, (unsigned char *)hmac_sha512, sizeof hmac_sha512 } , SEC_OID_HMAC_SHA512, "HMAC SHA-512", 0x00000271UL, INVALID_CERT_EXTENSION } |
1659 | CKM_SHA512_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha512, sizeof hmac_sha512 } , SEC_OID_HMAC_SHA512, "HMAC SHA-512", 0x00000271UL, INVALID_CERT_EXTENSION }, |
1660 | |
1661 | /* SIA extension OIDs */ |
1662 | OD(x509SIATimeStamping, SEC_OID_PKIX_TIMESTAMPING,{ { siDEROID, (unsigned char *)x509SIATimeStamping, sizeof x509SIATimeStamping } , SEC_OID_PKIX_TIMESTAMPING, "SIA Time Stamping", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1663 | "SIA Time Stamping", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509SIATimeStamping, sizeof x509SIATimeStamping } , SEC_OID_PKIX_TIMESTAMPING, "SIA Time Stamping", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1664 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SIATimeStamping, sizeof x509SIATimeStamping } , SEC_OID_PKIX_TIMESTAMPING, "SIA Time Stamping", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1665 | OD(x509SIACaRepository, SEC_OID_PKIX_CA_REPOSITORY,{ { siDEROID, (unsigned char *)x509SIACaRepository, sizeof x509SIACaRepository } , SEC_OID_PKIX_CA_REPOSITORY, "SIA CA Repository", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1666 | "SIA CA Repository", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)x509SIACaRepository, sizeof x509SIACaRepository } , SEC_OID_PKIX_CA_REPOSITORY, "SIA CA Repository", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1667 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509SIACaRepository, sizeof x509SIACaRepository } , SEC_OID_PKIX_CA_REPOSITORY, "SIA CA Repository", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1668 | |
1669 | OD(isoSHA1WithRSASignature, SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE,{ { siDEROID, (unsigned char *)isoSHA1WithRSASignature, sizeof isoSHA1WithRSASignature } , SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE , "ISO SHA-1 with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION } |
1670 | "ISO SHA-1 with RSA Signature",{ { siDEROID, (unsigned char *)isoSHA1WithRSASignature, sizeof isoSHA1WithRSASignature } , SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE , "ISO SHA-1 with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION } |
1671 | CKM_SHA1_RSA_PKCS, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)isoSHA1WithRSASignature, sizeof isoSHA1WithRSASignature } , SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE , "ISO SHA-1 with RSA Signature", 0x00000006UL, INVALID_CERT_EXTENSION }, |
1672 | |
1673 | /* SEED algorithm OIDs */ |
1674 | OD(seed_CBC, SEC_OID_SEED_CBC,{ { siDEROID, (unsigned char *)seed_CBC, sizeof seed_CBC } , SEC_OID_SEED_CBC , "SEED-CBC", 0x00000652UL, INVALID_CERT_EXTENSION } |
1675 | "SEED-CBC", CKM_SEED_CBC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)seed_CBC, sizeof seed_CBC } , SEC_OID_SEED_CBC , "SEED-CBC", 0x00000652UL, INVALID_CERT_EXTENSION }, |
1676 | |
1677 | OD(x509CertificatePoliciesAnyPolicy, SEC_OID_X509_ANY_POLICY,{ { siDEROID, (unsigned char *)x509CertificatePoliciesAnyPolicy , sizeof x509CertificatePoliciesAnyPolicy } , SEC_OID_X509_ANY_POLICY , "Certificate Policies AnyPolicy", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1678 | "Certificate Policies AnyPolicy",{ { siDEROID, (unsigned char *)x509CertificatePoliciesAnyPolicy , sizeof x509CertificatePoliciesAnyPolicy } , SEC_OID_X509_ANY_POLICY , "Certificate Policies AnyPolicy", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1679 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509CertificatePoliciesAnyPolicy , sizeof x509CertificatePoliciesAnyPolicy } , SEC_OID_X509_ANY_POLICY , "Certificate Policies AnyPolicy", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1680 | |
1681 | OD(pkcs1RSAOAEPEncryption, SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1RSAOAEPEncryption, sizeof pkcs1RSAOAEPEncryption } , SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION , "PKCS #1 RSA-OAEP Encryption", 0x00000009UL, INVALID_CERT_EXTENSION } |
1682 | "PKCS #1 RSA-OAEP Encryption", CKM_RSA_PKCS_OAEP,{ { siDEROID, (unsigned char *)pkcs1RSAOAEPEncryption, sizeof pkcs1RSAOAEPEncryption } , SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION , "PKCS #1 RSA-OAEP Encryption", 0x00000009UL, INVALID_CERT_EXTENSION } |
1683 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1RSAOAEPEncryption, sizeof pkcs1RSAOAEPEncryption } , SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION , "PKCS #1 RSA-OAEP Encryption", 0x00000009UL, INVALID_CERT_EXTENSION }, |
1684 | |
1685 | OD(pkcs1MGF1, SEC_OID_PKCS1_MGF1,{ { siDEROID, (unsigned char *)pkcs1MGF1, sizeof pkcs1MGF1 } , SEC_OID_PKCS1_MGF1, "PKCS #1 MGF1 Mask Generation Function", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1686 | "PKCS #1 MGF1 Mask Generation Function", CKM_INVALID_MECHANISM,{ { siDEROID, (unsigned char *)pkcs1MGF1, sizeof pkcs1MGF1 } , SEC_OID_PKCS1_MGF1, "PKCS #1 MGF1 Mask Generation Function", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1687 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1MGF1, sizeof pkcs1MGF1 } , SEC_OID_PKCS1_MGF1, "PKCS #1 MGF1 Mask Generation Function", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1688 | |
1689 | OD(pkcs1PSpecified, SEC_OID_PKCS1_PSPECIFIED,{ { siDEROID, (unsigned char *)pkcs1PSpecified, sizeof pkcs1PSpecified } , SEC_OID_PKCS1_PSPECIFIED, "PKCS #1 RSA-OAEP Explicitly Specified Encoding Parameters" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1690 | "PKCS #1 RSA-OAEP Explicitly Specified Encoding Parameters",{ { siDEROID, (unsigned char *)pkcs1PSpecified, sizeof pkcs1PSpecified } , SEC_OID_PKCS1_PSPECIFIED, "PKCS #1 RSA-OAEP Explicitly Specified Encoding Parameters" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1691 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1PSpecified, sizeof pkcs1PSpecified } , SEC_OID_PKCS1_PSPECIFIED, "PKCS #1 RSA-OAEP Explicitly Specified Encoding Parameters" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1692 | |
1693 | OD(pkcs1RSAPSSSignature, SEC_OID_PKCS1_RSA_PSS_SIGNATURE,{ { siDEROID, (unsigned char *)pkcs1RSAPSSSignature, sizeof pkcs1RSAPSSSignature } , SEC_OID_PKCS1_RSA_PSS_SIGNATURE, "PKCS #1 RSA-PSS Signature" , 0x0000000DUL, INVALID_CERT_EXTENSION } |
1694 | "PKCS #1 RSA-PSS Signature", CKM_RSA_PKCS_PSS,{ { siDEROID, (unsigned char *)pkcs1RSAPSSSignature, sizeof pkcs1RSAPSSSignature } , SEC_OID_PKCS1_RSA_PSS_SIGNATURE, "PKCS #1 RSA-PSS Signature" , 0x0000000DUL, INVALID_CERT_EXTENSION } |
1695 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1RSAPSSSignature, sizeof pkcs1RSAPSSSignature } , SEC_OID_PKCS1_RSA_PSS_SIGNATURE, "PKCS #1 RSA-PSS Signature" , 0x0000000DUL, INVALID_CERT_EXTENSION }, |
1696 | |
1697 | OD(pkcs1SHA224WithRSAEncryption, SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION,{ { siDEROID, (unsigned char *)pkcs1SHA224WithRSAEncryption, sizeof pkcs1SHA224WithRSAEncryption } , SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-224 With RSA Encryption", 0x00000046UL, INVALID_CERT_EXTENSION } |
1698 | "PKCS #1 SHA-224 With RSA Encryption", CKM_SHA224_RSA_PKCS,{ { siDEROID, (unsigned char *)pkcs1SHA224WithRSAEncryption, sizeof pkcs1SHA224WithRSAEncryption } , SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-224 With RSA Encryption", 0x00000046UL, INVALID_CERT_EXTENSION } |
1699 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkcs1SHA224WithRSAEncryption, sizeof pkcs1SHA224WithRSAEncryption } , SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION , "PKCS #1 SHA-224 With RSA Encryption", 0x00000046UL, INVALID_CERT_EXTENSION }, |
1700 | |
1701 | OD(sha224, SEC_OID_SHA224, "SHA-224", CKM_SHA224, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha224, sizeof sha224 } , SEC_OID_SHA224 , "SHA-224", 0x00000255UL, INVALID_CERT_EXTENSION }, |
1702 | |
1703 | OD(evIncorporationLocality, SEC_OID_EV_INCORPORATION_LOCALITY,{ { siDEROID, (unsigned char *)evIncorporationLocality, sizeof evIncorporationLocality } , SEC_OID_EV_INCORPORATION_LOCALITY , "Jurisdiction of Incorporation Locality Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1704 | "Jurisdiction of Incorporation Locality Name",{ { siDEROID, (unsigned char *)evIncorporationLocality, sizeof evIncorporationLocality } , SEC_OID_EV_INCORPORATION_LOCALITY , "Jurisdiction of Incorporation Locality Name", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1705 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)evIncorporationLocality, sizeof evIncorporationLocality } , SEC_OID_EV_INCORPORATION_LOCALITY , "Jurisdiction of Incorporation Locality Name", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1706 | OD(evIncorporationState, SEC_OID_EV_INCORPORATION_STATE,{ { siDEROID, (unsigned char *)evIncorporationState, sizeof evIncorporationState } , SEC_OID_EV_INCORPORATION_STATE, "Jurisdiction of Incorporation State Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1707 | "Jurisdiction of Incorporation State Name",{ { siDEROID, (unsigned char *)evIncorporationState, sizeof evIncorporationState } , SEC_OID_EV_INCORPORATION_STATE, "Jurisdiction of Incorporation State Name" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1708 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)evIncorporationState, sizeof evIncorporationState } , SEC_OID_EV_INCORPORATION_STATE, "Jurisdiction of Incorporation State Name" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1709 | OD(evIncorporationCountry, SEC_OID_EV_INCORPORATION_COUNTRY,{ { siDEROID, (unsigned char *)evIncorporationCountry, sizeof evIncorporationCountry } , SEC_OID_EV_INCORPORATION_COUNTRY, "Jurisdiction of Incorporation Country Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1710 | "Jurisdiction of Incorporation Country Name",{ { siDEROID, (unsigned char *)evIncorporationCountry, sizeof evIncorporationCountry } , SEC_OID_EV_INCORPORATION_COUNTRY, "Jurisdiction of Incorporation Country Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1711 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)evIncorporationCountry, sizeof evIncorporationCountry } , SEC_OID_EV_INCORPORATION_COUNTRY, "Jurisdiction of Incorporation Country Name", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1712 | OD(x520BusinessCategory, SEC_OID_BUSINESS_CATEGORY,{ { siDEROID, (unsigned char *)x520BusinessCategory, sizeof x520BusinessCategory } , SEC_OID_BUSINESS_CATEGORY, "Business Category", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1713 | "Business Category",{ { siDEROID, (unsigned char *)x520BusinessCategory, sizeof x520BusinessCategory } , SEC_OID_BUSINESS_CATEGORY, "Business Category", 0xffffffffUL , INVALID_CERT_EXTENSION } |
1714 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520BusinessCategory, sizeof x520BusinessCategory } , SEC_OID_BUSINESS_CATEGORY, "Business Category", 0xffffffffUL , INVALID_CERT_EXTENSION }, |
1715 | |
1716 | OD(nistDSASignaturewithSHA224Digest,{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA224Digest , sizeof nistDSASignaturewithSHA224Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST , "DSA with SHA-224 Signature", 0x00000013UL, INVALID_CERT_EXTENSION } |
1717 | SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST,{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA224Digest , sizeof nistDSASignaturewithSHA224Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST , "DSA with SHA-224 Signature", 0x00000013UL, INVALID_CERT_EXTENSION } |
1718 | "DSA with SHA-224 Signature",{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA224Digest , sizeof nistDSASignaturewithSHA224Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST , "DSA with SHA-224 Signature", 0x00000013UL, INVALID_CERT_EXTENSION } |
1719 | CKM_DSA_SHA224, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nistDSASignaturewithSHA224Digest , sizeof nistDSASignaturewithSHA224Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST , "DSA with SHA-224 Signature", 0x00000013UL, INVALID_CERT_EXTENSION }, |
1720 | OD(nistDSASignaturewithSHA256Digest,{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA256Digest , sizeof nistDSASignaturewithSHA256Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST , "DSA with SHA-256 Signature", 0x00000014UL, INVALID_CERT_EXTENSION } |
1721 | SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST,{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA256Digest , sizeof nistDSASignaturewithSHA256Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST , "DSA with SHA-256 Signature", 0x00000014UL, INVALID_CERT_EXTENSION } |
1722 | "DSA with SHA-256 Signature",{ { siDEROID, (unsigned char *)nistDSASignaturewithSHA256Digest , sizeof nistDSASignaturewithSHA256Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST , "DSA with SHA-256 Signature", 0x00000014UL, INVALID_CERT_EXTENSION } |
1723 | CKM_DSA_SHA256, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)nistDSASignaturewithSHA256Digest , sizeof nistDSASignaturewithSHA256Digest } , SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST , "DSA with SHA-256 Signature", 0x00000014UL, INVALID_CERT_EXTENSION }, |
1724 | OD(msExtendedKeyUsageTrustListSigning,{ { siDEROID, (unsigned char *)msExtendedKeyUsageTrustListSigning , sizeof msExtendedKeyUsageTrustListSigning } , SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING , "Microsoft Trust List Signing", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1725 | SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING,{ { siDEROID, (unsigned char *)msExtendedKeyUsageTrustListSigning , sizeof msExtendedKeyUsageTrustListSigning } , SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING , "Microsoft Trust List Signing", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1726 | "Microsoft Trust List Signing",{ { siDEROID, (unsigned char *)msExtendedKeyUsageTrustListSigning , sizeof msExtendedKeyUsageTrustListSigning } , SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING , "Microsoft Trust List Signing", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1727 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)msExtendedKeyUsageTrustListSigning , sizeof msExtendedKeyUsageTrustListSigning } , SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING , "Microsoft Trust List Signing", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1728 | OD(x520Name, SEC_OID_AVA_NAME,{ { siDEROID, (unsigned char *)x520Name, sizeof x520Name } , SEC_OID_AVA_NAME , "X520 Name", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1729 | "X520 Name", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x520Name, sizeof x520Name } , SEC_OID_AVA_NAME , "X520 Name", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1730 | |
1731 | OD(aes128_GCM, SEC_OID_AES_128_GCM,{ { siDEROID, (unsigned char *)aes128_GCM, sizeof aes128_GCM } , SEC_OID_AES_128_GCM, "AES-128-GCM", 0x00001087UL, INVALID_CERT_EXTENSION } |
1732 | "AES-128-GCM", CKM_AES_GCM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes128_GCM, sizeof aes128_GCM } , SEC_OID_AES_128_GCM, "AES-128-GCM", 0x00001087UL, INVALID_CERT_EXTENSION }, |
1733 | OD(aes192_GCM, SEC_OID_AES_192_GCM,{ { siDEROID, (unsigned char *)aes192_GCM, sizeof aes192_GCM } , SEC_OID_AES_192_GCM, "AES-192-GCM", 0x00001087UL, INVALID_CERT_EXTENSION } |
1734 | "AES-192-GCM", CKM_AES_GCM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes192_GCM, sizeof aes192_GCM } , SEC_OID_AES_192_GCM, "AES-192-GCM", 0x00001087UL, INVALID_CERT_EXTENSION }, |
1735 | OD(aes256_GCM, SEC_OID_AES_256_GCM,{ { siDEROID, (unsigned char *)aes256_GCM, sizeof aes256_GCM } , SEC_OID_AES_256_GCM, "AES-256-GCM", 0x00001087UL, INVALID_CERT_EXTENSION } |
1736 | "AES-256-GCM", CKM_AES_GCM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)aes256_GCM, sizeof aes256_GCM } , SEC_OID_AES_256_GCM, "AES-256-GCM", 0x00001087UL, INVALID_CERT_EXTENSION }, |
1737 | OD(idea_CBC, SEC_OID_IDEA_CBC,{ { siDEROID, (unsigned char *)idea_CBC, sizeof idea_CBC } , SEC_OID_IDEA_CBC , "IDEA_CBC", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1738 | "IDEA_CBC", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)idea_CBC, sizeof idea_CBC } , SEC_OID_IDEA_CBC , "IDEA_CBC", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1739 | |
1740 | ODE(SEC_OID_RC2_40_CBC,{ { siDEROID, ((void*)0), 0 }, SEC_OID_RC2_40_CBC, "RC2-40-CBC" , 0x00000102UL, INVALID_CERT_EXTENSION } |
1741 | "RC2-40-CBC", CKM_RC2_CBC, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_RC2_40_CBC, "RC2-40-CBC" , 0x00000102UL, INVALID_CERT_EXTENSION }, |
1742 | ODE(SEC_OID_DES_40_CBC,{ { siDEROID, ((void*)0), 0 }, SEC_OID_DES_40_CBC, "DES-40-CBC" , 0x00000102UL, INVALID_CERT_EXTENSION } |
1743 | "DES-40-CBC", CKM_RC2_CBC, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_DES_40_CBC, "DES-40-CBC" , 0x00000102UL, INVALID_CERT_EXTENSION }, |
1744 | ODE(SEC_OID_RC4_40,{ { siDEROID, ((void*)0), 0 }, SEC_OID_RC4_40, "RC4-40", 0x00000111UL , INVALID_CERT_EXTENSION } |
1745 | "RC4-40", CKM_RC4, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_RC4_40, "RC4-40", 0x00000111UL , INVALID_CERT_EXTENSION }, |
1746 | ODE(SEC_OID_RC4_56,{ { siDEROID, ((void*)0), 0 }, SEC_OID_RC4_56, "RC4-56", 0x00000111UL , INVALID_CERT_EXTENSION } |
1747 | "RC4-56", CKM_RC4, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_RC4_56, "RC4-56", 0x00000111UL , INVALID_CERT_EXTENSION }, |
1748 | ODE(SEC_OID_NULL_CIPHER,{ { siDEROID, ((void*)0), 0 }, SEC_OID_NULL_CIPHER, "NULL cipher" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1749 | "NULL cipher", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_NULL_CIPHER, "NULL cipher" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1750 | ODE(SEC_OID_HMAC_MD5,{ { siDEROID, ((void*)0), 0 }, SEC_OID_HMAC_MD5, "HMAC-MD5", 0x00000211UL , INVALID_CERT_EXTENSION } |
1751 | "HMAC-MD5", CKM_MD5_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_HMAC_MD5, "HMAC-MD5", 0x00000211UL , INVALID_CERT_EXTENSION }, |
1752 | ODE(SEC_OID_TLS_RSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_RSA, "TLS RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1753 | "TLS RSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_RSA, "TLS RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1754 | ODE(SEC_OID_TLS_DHE_RSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_RSA, "TLS DHE-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1755 | "TLS DHE-RSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_RSA, "TLS DHE-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1756 | ODE(SEC_OID_TLS_DHE_DSS,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_DSS, "TLS DHE-DSS key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1757 | "TLS DHE-DSS key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_DSS, "TLS DHE-DSS key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1758 | ODE(SEC_OID_TLS_DH_RSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_RSA, "TLS DH-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1759 | "TLS DH-RSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_RSA, "TLS DH-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1760 | ODE(SEC_OID_TLS_DH_DSS,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_DSS, "TLS DH-DSS key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1761 | "TLS DH-DSS key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_DSS, "TLS DH-DSS key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1762 | ODE(SEC_OID_TLS_DH_ANON,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_ANON, "TLS DH-ANON key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1763 | "TLS DH-ANON key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_ANON, "TLS DH-ANON key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1764 | ODE(SEC_OID_TLS_ECDHE_ECDSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_ECDSA, "TLS ECDHE-ECDSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1765 | "TLS ECDHE-ECDSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_ECDSA, "TLS ECDHE-ECDSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1766 | ODE(SEC_OID_TLS_ECDHE_RSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_RSA, "TLS ECDHE-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1767 | "TLS ECDHE-RSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_RSA, "TLS ECDHE-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1768 | ODE(SEC_OID_TLS_ECDH_ECDSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_ECDSA, "TLS ECDH-ECDSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1769 | "TLS ECDH-ECDSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_ECDSA, "TLS ECDH-ECDSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1770 | ODE(SEC_OID_TLS_ECDH_RSA,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_RSA, "TLS ECDH-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1771 | "TLS ECDH-RSA key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_RSA, "TLS ECDH-RSA key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1772 | ODE(SEC_OID_TLS_ECDH_ANON,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_ANON, "TLS ECDH-ANON key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1773 | "TLS ECDH-ANON key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDH_ANON, "TLS ECDH-ANON key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1774 | ODE(SEC_OID_TLS_RSA_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_RSA_EXPORT, "TLS RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1775 | "TLS RSA-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_RSA_EXPORT, "TLS RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1776 | ODE(SEC_OID_TLS_DHE_RSA_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_RSA_EXPORT, "TLS DHE-RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1777 | "TLS DHE-RSA-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_RSA_EXPORT, "TLS DHE-RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1778 | ODE(SEC_OID_TLS_DHE_DSS_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_DSS_EXPORT, "TLS DHE-DSS-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1779 | "TLS DHE-DSS-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_DSS_EXPORT, "TLS DHE-DSS-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1780 | ODE(SEC_OID_TLS_DH_RSA_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_RSA_EXPORT, "TLS DH-RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1781 | "TLS DH-RSA-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_RSA_EXPORT, "TLS DH-RSA-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1782 | ODE(SEC_OID_TLS_DH_DSS_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_DSS_EXPORT, "TLS DH-DSS-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1783 | "TLS DH-DSS-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_DSS_EXPORT, "TLS DH-DSS-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1784 | ODE(SEC_OID_TLS_DH_ANON_EXPORT,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_ANON_EXPORT, "TLS DH-ANON-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1785 | "TLS DH-ANON-EXPORT key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DH_ANON_EXPORT, "TLS DH-ANON-EXPORT key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1786 | ODE(SEC_OID_APPLY_SSL_POLICY,{ { siDEROID, ((void*)0), 0 }, SEC_OID_APPLY_SSL_POLICY, "Apply SSL policy (pseudo-OID)" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1787 | "Apply SSL policy (pseudo-OID)", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_APPLY_SSL_POLICY, "Apply SSL policy (pseudo-OID)" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1788 | ODE(SEC_OID_CHACHA20_POLY1305,{ { siDEROID, ((void*)0), 0 }, SEC_OID_CHACHA20_POLY1305, "ChaCha20-Poly1305" , ((0x80000000UL | 0x4E534350) + 28), INVALID_CERT_EXTENSION } |
1789 | "ChaCha20-Poly1305", CKM_NSS_CHACHA20_POLY1305, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_CHACHA20_POLY1305, "ChaCha20-Poly1305" , ((0x80000000UL | 0x4E534350) + 28), INVALID_CERT_EXTENSION }, |
1790 | |
1791 | ODE(SEC_OID_TLS_ECDHE_PSK,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_PSK, "TLS ECHDE-PSK key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1792 | "TLS ECHDE-PSK key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_ECDHE_PSK, "TLS ECHDE-PSK key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1793 | ODE(SEC_OID_TLS_DHE_PSK,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_PSK, "TLS DHE-PSK key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1794 | "TLS DHE-PSK key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_PSK, "TLS DHE-PSK key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1795 | |
1796 | ODE(SEC_OID_TLS_FFDHE_2048,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_2048, "TLS FFDHE 2048-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1797 | "TLS FFDHE 2048-bit key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_2048, "TLS FFDHE 2048-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1798 | ODE(SEC_OID_TLS_FFDHE_3072,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_3072, "TLS FFDHE 3072-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1799 | "TLS FFDHE 3072-bit key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_3072, "TLS FFDHE 3072-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1800 | ODE(SEC_OID_TLS_FFDHE_4096,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_4096, "TLS FFDHE 4096-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1801 | "TLS FFDHE 4096-bit key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_4096, "TLS FFDHE 4096-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1802 | ODE(SEC_OID_TLS_FFDHE_6144,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_6144, "TLS FFDHE 6144-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1803 | "TLS FFDHE 6144-bit key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_6144, "TLS FFDHE 6144-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1804 | ODE(SEC_OID_TLS_FFDHE_8192,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_8192, "TLS FFDHE 8192-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1805 | "TLS FFDHE 8192-bit key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_FFDHE_8192, "TLS FFDHE 8192-bit key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1806 | ODE(SEC_OID_TLS_DHE_CUSTOM,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_CUSTOM, "TLS DHE custom group key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1807 | "TLS DHE custom group key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS_DHE_CUSTOM, "TLS DHE custom group key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1808 | OD(curve25519, SEC_OID_CURVE25519,{ { siDEROID, (unsigned char *)curve25519, sizeof curve25519 } , SEC_OID_CURVE25519, "Curve25519", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1809 | "Curve25519", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)curve25519, sizeof curve25519 } , SEC_OID_CURVE25519, "Curve25519", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1810 | ODE(SEC_OID_TLS13_KEA_ANY,{ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS13_KEA_ANY, "TLS 1.3 fake key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1811 | "TLS 1.3 fake key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_TLS13_KEA_ANY, "TLS 1.3 fake key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1812 | |
1813 | OD(x509ExtKeyUsageAnyUsage, SEC_OID_X509_ANY_EXT_KEY_USAGE,{ { siDEROID, (unsigned char *)x509ExtKeyUsageAnyUsage, sizeof x509ExtKeyUsageAnyUsage } , SEC_OID_X509_ANY_EXT_KEY_USAGE, "Any Extended Key Usage" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1814 | "Any Extended Key Usage",{ { siDEROID, (unsigned char *)x509ExtKeyUsageAnyUsage, sizeof x509ExtKeyUsageAnyUsage } , SEC_OID_X509_ANY_EXT_KEY_USAGE, "Any Extended Key Usage" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1815 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)x509ExtKeyUsageAnyUsage, sizeof x509ExtKeyUsageAnyUsage } , SEC_OID_X509_ANY_EXT_KEY_USAGE, "Any Extended Key Usage" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1816 | OD(pkixExtendedKeyUsageIPsecIKE,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecIKE, sizeof pkixExtendedKeyUsageIPsecIKE } , SEC_OID_EXT_KEY_USAGE_IPSEC_IKE , "IPsec IKE Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1817 | SEC_OID_EXT_KEY_USAGE_IPSEC_IKE,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecIKE, sizeof pkixExtendedKeyUsageIPsecIKE } , SEC_OID_EXT_KEY_USAGE_IPSEC_IKE , "IPsec IKE Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1818 | "IPsec IKE Certificate",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecIKE, sizeof pkixExtendedKeyUsageIPsecIKE } , SEC_OID_EXT_KEY_USAGE_IPSEC_IKE , "IPsec IKE Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1819 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecIKE, sizeof pkixExtendedKeyUsageIPsecIKE } , SEC_OID_EXT_KEY_USAGE_IPSEC_IKE , "IPsec IKE Certificate", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1820 | OD(ipsecIKEEnd,{ { siDEROID, (unsigned char *)ipsecIKEEnd, sizeof ipsecIKEEnd } , SEC_OID_IPSEC_IKE_END, "IPsec IKE End", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1821 | SEC_OID_IPSEC_IKE_END,{ { siDEROID, (unsigned char *)ipsecIKEEnd, sizeof ipsecIKEEnd } , SEC_OID_IPSEC_IKE_END, "IPsec IKE End", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1822 | "IPsec IKE End",{ { siDEROID, (unsigned char *)ipsecIKEEnd, sizeof ipsecIKEEnd } , SEC_OID_IPSEC_IKE_END, "IPsec IKE End", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1823 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ipsecIKEEnd, sizeof ipsecIKEEnd } , SEC_OID_IPSEC_IKE_END, "IPsec IKE End", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1824 | OD(ipsecIKEIntermediate,{ { siDEROID, (unsigned char *)ipsecIKEIntermediate, sizeof ipsecIKEIntermediate } , SEC_OID_IPSEC_IKE_INTERMEDIATE, "IPsec IKE Intermediate" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1825 | SEC_OID_IPSEC_IKE_INTERMEDIATE,{ { siDEROID, (unsigned char *)ipsecIKEIntermediate, sizeof ipsecIKEIntermediate } , SEC_OID_IPSEC_IKE_INTERMEDIATE, "IPsec IKE Intermediate" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1826 | "IPsec IKE Intermediate",{ { siDEROID, (unsigned char *)ipsecIKEIntermediate, sizeof ipsecIKEIntermediate } , SEC_OID_IPSEC_IKE_INTERMEDIATE, "IPsec IKE Intermediate" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1827 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ipsecIKEIntermediate, sizeof ipsecIKEIntermediate } , SEC_OID_IPSEC_IKE_INTERMEDIATE, "IPsec IKE Intermediate" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1828 | OD(pkixExtendedKeyUsageIPsecEnd,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecEnd, sizeof pkixExtendedKeyUsageIPsecEnd } , SEC_OID_EXT_KEY_USAGE_IPSEC_END , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1829 | SEC_OID_EXT_KEY_USAGE_IPSEC_END,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecEnd, sizeof pkixExtendedKeyUsageIPsecEnd } , SEC_OID_EXT_KEY_USAGE_IPSEC_END , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1830 | "IPsec Tunnel",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecEnd, sizeof pkixExtendedKeyUsageIPsecEnd } , SEC_OID_EXT_KEY_USAGE_IPSEC_END , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1831 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecEnd, sizeof pkixExtendedKeyUsageIPsecEnd } , SEC_OID_EXT_KEY_USAGE_IPSEC_END , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1832 | OD(pkixExtendedKeyUsageIPsecTunnel,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecTunnel , sizeof pkixExtendedKeyUsageIPsecTunnel } , SEC_OID_EXT_KEY_USAGE_IPSEC_TUNNEL , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1833 | SEC_OID_EXT_KEY_USAGE_IPSEC_TUNNEL,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecTunnel , sizeof pkixExtendedKeyUsageIPsecTunnel } , SEC_OID_EXT_KEY_USAGE_IPSEC_TUNNEL , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1834 | "IPsec Tunnel",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecTunnel , sizeof pkixExtendedKeyUsageIPsecTunnel } , SEC_OID_EXT_KEY_USAGE_IPSEC_TUNNEL , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1835 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecTunnel , sizeof pkixExtendedKeyUsageIPsecTunnel } , SEC_OID_EXT_KEY_USAGE_IPSEC_TUNNEL , "IPsec Tunnel", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1836 | OD(pkixExtendedKeyUsageIPsecUser,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecUser, sizeof pkixExtendedKeyUsageIPsecUser } , SEC_OID_EXT_KEY_USAGE_IPSEC_USER , "IPsec User", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1837 | SEC_OID_EXT_KEY_USAGE_IPSEC_USER,{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecUser, sizeof pkixExtendedKeyUsageIPsecUser } , SEC_OID_EXT_KEY_USAGE_IPSEC_USER , "IPsec User", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1838 | "IPsec User",{ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecUser, sizeof pkixExtendedKeyUsageIPsecUser } , SEC_OID_EXT_KEY_USAGE_IPSEC_USER , "IPsec User", 0xffffffffUL, INVALID_CERT_EXTENSION } |
1839 | CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)pkixExtendedKeyUsageIPsecUser, sizeof pkixExtendedKeyUsageIPsecUser } , SEC_OID_EXT_KEY_USAGE_IPSEC_USER , "IPsec User", 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1840 | |
1841 | OD(sha3_224, SEC_OID_SHA3_224, "SHA3-224", CKM_SHA3_224, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha3_224, sizeof sha3_224 } , SEC_OID_SHA3_224 , "SHA3-224", 0x000002B5UL, INVALID_CERT_EXTENSION }, |
1842 | OD(sha3_256, SEC_OID_SHA3_256, "SHA3-256", CKM_SHA3_256, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha3_256, sizeof sha3_256 } , SEC_OID_SHA3_256 , "SHA3-256", 0x000002B0UL, INVALID_CERT_EXTENSION }, |
1843 | OD(sha3_384, SEC_OID_SHA3_384, "SHA3-384", CKM_SHA3_384, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha3_384, sizeof sha3_384 } , SEC_OID_SHA3_384 , "SHA3-384", 0x000002C0UL, INVALID_CERT_EXTENSION }, |
1844 | OD(sha3_512, SEC_OID_SHA3_512, "SHA3-512", CKM_SHA3_512, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)sha3_512, sizeof sha3_512 } , SEC_OID_SHA3_512 , "SHA3-512", 0x000002D0UL, INVALID_CERT_EXTENSION }, |
1845 | |
1846 | OD(hmac_sha3_224, SEC_OID_HMAC_SHA3_224, "HMAC SHA3-224", CKM_SHA3_224_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha3_224, sizeof hmac_sha3_224 } , SEC_OID_HMAC_SHA3_224, "HMAC SHA3-224", 0x000002B6UL, INVALID_CERT_EXTENSION }, |
1847 | OD(hmac_sha3_256, SEC_OID_HMAC_SHA3_256, "HMAC SHA3-256", CKM_SHA3_256_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha3_256, sizeof hmac_sha3_256 } , SEC_OID_HMAC_SHA3_256, "HMAC SHA3-256", 0x000002B1UL, INVALID_CERT_EXTENSION }, |
1848 | OD(hmac_sha3_384, SEC_OID_HMAC_SHA3_384, "HMAC SHA3-384", CKM_SHA3_384_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha3_384, sizeof hmac_sha3_384 } , SEC_OID_HMAC_SHA3_384, "HMAC SHA3-384", 0x000002C1UL, INVALID_CERT_EXTENSION }, |
1849 | OD(hmac_sha3_512, SEC_OID_HMAC_SHA3_512, "HMAC SHA3-512", CKM_SHA3_512_HMAC, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)hmac_sha3_512, sizeof hmac_sha3_512 } , SEC_OID_HMAC_SHA3_512, "HMAC SHA3-512", 0x000002D1UL, INVALID_CERT_EXTENSION }, |
1850 | |
1851 | ODE(SEC_OID_XYBER768D00,{ { siDEROID, ((void*)0), 0 }, SEC_OID_XYBER768D00, "X25519+Kyber768 key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION } |
1852 | "X25519+Kyber768 key exchange", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION){ { siDEROID, ((void*)0), 0 }, SEC_OID_XYBER768D00, "X25519+Kyber768 key exchange" , 0xffffffffUL, INVALID_CERT_EXTENSION }, |
1853 | |
1854 | OD(ed25519Signature, SEC_OID_ED25519_SIGNATURE, "X9.62 EDDSA signature", CKM_EDDSA,{ { siDEROID, (unsigned char *)ed25519Signature, sizeof ed25519Signature } , SEC_OID_ED25519_SIGNATURE, "X9.62 EDDSA signature", 0x00001057UL , INVALID_CERT_EXTENSION } |
1855 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ed25519Signature, sizeof ed25519Signature } , SEC_OID_ED25519_SIGNATURE, "X9.62 EDDSA signature", 0x00001057UL , INVALID_CERT_EXTENSION }, |
1856 | |
1857 | OD(ed25519PublicKey, SEC_OID_ED25519_PUBLIC_KEY,{ { siDEROID, (unsigned char *)ed25519PublicKey, sizeof ed25519PublicKey } , SEC_OID_ED25519_PUBLIC_KEY, "X9.62 elliptic edwards curve public key" , 0x00001055UL, INVALID_CERT_EXTENSION } |
1858 | "X9.62 elliptic edwards curve public key", CKM_EC_EDWARDS_KEY_PAIR_GEN, INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)ed25519PublicKey, sizeof ed25519PublicKey } , SEC_OID_ED25519_PUBLIC_KEY, "X9.62 elliptic edwards curve public key" , 0x00001055UL, INVALID_CERT_EXTENSION }, |
1859 | |
1860 | OD(dhSinglePassstdDHsha1kdfscheme, SEC_OID_DHSINGLEPASS_STDDH_SHA1KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha1kdfscheme , sizeof dhSinglePassstdDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA1 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1861 | "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA1 KDF", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha1kdfscheme , sizeof dhSinglePassstdDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA1 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1862 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePassstdDHsha1kdfscheme , sizeof dhSinglePassstdDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA1 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1863 | OD(dhSinglePassstdDHsha224kdfscheme, SEC_OID_DHSINGLEPASS_STDDH_SHA224KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha224kdfscheme , sizeof dhSinglePassstdDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA224 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1864 | "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA224 KDF", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha224kdfscheme , sizeof dhSinglePassstdDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA224 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1865 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePassstdDHsha224kdfscheme , sizeof dhSinglePassstdDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA224 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1866 | OD(dhSinglePassstdDHsha256kdfscheme, SEC_OID_DHSINGLEPASS_STDDH_SHA256KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha256kdfscheme , sizeof dhSinglePassstdDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA256 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1867 | "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA256 KDF", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha256kdfscheme , sizeof dhSinglePassstdDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA256 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1868 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePassstdDHsha256kdfscheme , sizeof dhSinglePassstdDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA256 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1869 | OD(dhSinglePassstdDHsha384kdfscheme, SEC_OID_DHSINGLEPASS_STDDH_SHA384KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha384kdfscheme , sizeof dhSinglePassstdDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA384 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1870 | "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA384 KDF", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha384kdfscheme , sizeof dhSinglePassstdDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA384 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1871 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePassstdDHsha384kdfscheme , sizeof dhSinglePassstdDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA384 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1872 | OD(dhSinglePassstdDHsha512kdfscheme, SEC_OID_DHSINGLEPASS_STDDH_SHA512KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha512kdfscheme , sizeof dhSinglePassstdDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA512 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1873 | "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA512 KDF", CKM_ECDH1_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePassstdDHsha512kdfscheme , sizeof dhSinglePassstdDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA512 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION } |
1874 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePassstdDHsha512kdfscheme , sizeof dhSinglePassstdDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_STDDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Standard with SHA512 KDF" , 0x00001050UL, INVALID_CERT_EXTENSION }, |
1875 | OD(dhSinglePasscofactorDHsha1kdfscheme, SEC_OID_DHSINGLEPASS_COFACTORDH_SHA1KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha1kdfscheme , sizeof dhSinglePasscofactorDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA1 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1876 | "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA1 KDF", CKM_ECDH1_COFACTOR_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha1kdfscheme , sizeof dhSinglePasscofactorDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA1 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1877 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha1kdfscheme , sizeof dhSinglePasscofactorDHsha1kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA1KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA1 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION }, |
1878 | OD(dhSinglePasscofactorDHsha224kdfscheme, SEC_OID_DHSINGLEPASS_COFACTORDH_SHA224KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha224kdfscheme , sizeof dhSinglePasscofactorDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA224 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1879 | "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA224 KDF", CKM_ECDH1_COFACTOR_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha224kdfscheme , sizeof dhSinglePasscofactorDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA224 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1880 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha224kdfscheme , sizeof dhSinglePasscofactorDHsha224kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA224KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA224 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION }, |
1881 | OD(dhSinglePasscofactorDHsha256kdfscheme, SEC_OID_DHSINGLEPASS_COFACTORDH_SHA256KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha256kdfscheme , sizeof dhSinglePasscofactorDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA256 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1882 | "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA256 KDF", CKM_ECDH1_COFACTOR_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha256kdfscheme , sizeof dhSinglePasscofactorDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA256 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1883 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha256kdfscheme , sizeof dhSinglePasscofactorDHsha256kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA256KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA256 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION }, |
1884 | OD(dhSinglePasscofactorDHsha384kdfscheme, SEC_OID_DHSINGLEPASS_COFACTORDH_SHA384KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha384kdfscheme , sizeof dhSinglePasscofactorDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA384 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1885 | "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA384 KDF", CKM_ECDH1_COFACTOR_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha384kdfscheme , sizeof dhSinglePasscofactorDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA384 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1886 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha384kdfscheme , sizeof dhSinglePasscofactorDHsha384kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA384KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA384 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION }, |
1887 | OD(dhSinglePasscofactorDHsha512kdfscheme, SEC_OID_DHSINGLEPASS_COFACTORDH_SHA512KDF_SCHEME,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha512kdfscheme , sizeof dhSinglePasscofactorDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA512 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1888 | "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA512 KDF", CKM_ECDH1_COFACTOR_DERIVE,{ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha512kdfscheme , sizeof dhSinglePasscofactorDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA512 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION } |
1889 | INVALID_CERT_EXTENSION){ { siDEROID, (unsigned char *)dhSinglePasscofactorDHsha512kdfscheme , sizeof dhSinglePasscofactorDHsha512kdfscheme } , SEC_OID_DHSINGLEPASS_COFACTORDH_SHA512KDF_SCHEME , "Eliptic Curve Diffie-Hellman Single Pass Cofactor with SHA512 KDF" , 0x00001051UL, INVALID_CERT_EXTENSION }, |
1890 | }; |
1891 | |
1892 | /* PRIVATE EXTENDED SECOID Table |
1893 | * This table is private. Its structure is opaque to the outside. |
1894 | * It is indexed by the same SECOidTag as the oids table above. |
1895 | * Every member of this struct must have accessor functions (set, get) |
1896 | * and those functions must operate by value, not by reference. |
1897 | * The addresses of the contents of this table must not be exposed |
1898 | * by the accessor functions. |
1899 | */ |
1900 | typedef struct privXOidStr { |
1901 | PRUint32 notPolicyFlags; /* ones complement of policy flags */ |
1902 | } privXOid; |
1903 | |
1904 | static privXOid xOids[SEC_OID_TOTAL]; |
1905 | |
1906 | /* |
1907 | * now the dynamic table. The dynamic table gets build at init time. |
1908 | * and conceivably gets modified if the user loads new crypto modules. |
1909 | * All this static data, and the allocated data to which it points, |
1910 | * is protected by a global reader/writer lock. |
1911 | * The c language guarantees that global and static data that is not |
1912 | * explicitly initialized will be initialized with zeros. If we |
1913 | * initialize it with zeros, the data goes into the initialized data |
1914 | * secment, and increases the size of the library. By leaving it |
1915 | * uninitialized, it is allocated in BSS, and does NOT increase the |
1916 | * library size. |
1917 | */ |
1918 | |
1919 | typedef struct dynXOidStr { |
1920 | SECOidData data; |
1921 | privXOid priv; |
1922 | } dynXOid; |
1923 | |
1924 | static NSSRWLock *dynOidLock; |
1925 | static PLArenaPool *dynOidPool; |
1926 | static PLHashTable *dynOidHash; |
1927 | static dynXOid **dynOidTable; /* not in the pool */ |
1928 | static int dynOidEntriesAllocated; |
1929 | static int dynOidEntriesUsed; |
1930 | |
1931 | /* Creates NSSRWLock and dynOidPool at initialization time. |
1932 | */ |
1933 | static SECStatus |
1934 | secoid_InitDynOidData(void) |
1935 | { |
1936 | SECStatus rv = SECSuccess; |
1937 | |
1938 | dynOidLock = NSSRWLock_NewNSSRWLock_New_Util(1, "dynamic OID data"); |
1939 | if (!dynOidLock) { |
1940 | return SECFailure; /* Error code should already be set. */ |
1941 | } |
1942 | dynOidPool = PORT_NewArenaPORT_NewArena_Util(2048); |
1943 | if (!dynOidPool) { |
1944 | rv = SECFailure /* Error code should already be set. */; |
1945 | } |
1946 | return rv; |
1947 | } |
1948 | |
1949 | /* Add oidData to hash table. Caller holds write lock dynOidLock. */ |
1950 | static SECStatus |
1951 | secoid_HashDynamicOiddata(const SECOidData *oid) |
1952 | { |
1953 | PLHashEntry *entry; |
1954 | |
1955 | if (!dynOidHash) { |
1956 | dynOidHash = PL_NewHashTable(0, SECITEM_Hash, SECITEM_HashCompare, |
1957 | PL_CompareValues, NULL((void*)0), NULL((void*)0)); |
1958 | if (!dynOidHash) { |
1959 | return SECFailure; |
1960 | } |
1961 | } |
1962 | |
1963 | entry = PL_HashTableAdd(dynOidHash, &oid->oid, (void *)oid); |
1964 | return entry ? SECSuccess : SECFailure; |
1965 | } |
1966 | |
1967 | /* |
1968 | * Lookup a Dynamic OID. Dynamic OID's still change slowly, so it's |
1969 | * cheaper to rehash the table when it changes than it is to do the loop |
1970 | * each time. |
1971 | */ |
1972 | static SECOidData * |
1973 | secoid_FindDynamic(const SECItem *key) |
1974 | { |
1975 | SECOidData *ret = NULL((void*)0); |
1976 | |
1977 | NSSRWLock_LockReadNSSRWLock_LockRead_Util(dynOidLock); |
1978 | if (dynOidHash) { |
1979 | ret = (SECOidData *)PL_HashTableLookup(dynOidHash, key); |
1980 | } |
1981 | NSSRWLock_UnlockReadNSSRWLock_UnlockRead_Util(dynOidLock); |
1982 | if (ret == NULL((void*)0)) { |
1983 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_UNRECOGNIZED_OID); |
1984 | } |
1985 | return ret; |
1986 | } |
1987 | |
1988 | static dynXOid * |
1989 | secoid_FindDynamicByTag(SECOidTag tagnum) |
1990 | { |
1991 | dynXOid *dxo = NULL((void*)0); |
1992 | int tagNumDiff; |
1993 | |
1994 | if (tagnum < SEC_OID_TOTAL) { |
1995 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
1996 | return NULL((void*)0); |
1997 | } |
1998 | tagNumDiff = tagnum - SEC_OID_TOTAL; |
1999 | |
2000 | NSSRWLock_LockReadNSSRWLock_LockRead_Util(dynOidLock); |
2001 | if (dynOidTable != NULL((void*)0) && |
2002 | tagNumDiff < dynOidEntriesUsed) { |
2003 | dxo = dynOidTable[tagNumDiff]; |
2004 | } |
2005 | NSSRWLock_UnlockReadNSSRWLock_UnlockRead_Util(dynOidLock); |
2006 | if (dxo == NULL((void*)0)) { |
2007 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_UNRECOGNIZED_OID); |
2008 | } |
2009 | return dxo; |
2010 | } |
2011 | |
2012 | /* |
2013 | * This routine is thread safe now. |
2014 | */ |
2015 | SECOidTag |
2016 | SECOID_AddEntrySECOID_AddEntry_Util(const SECOidData *src) |
2017 | { |
2018 | SECOidData *dst; |
2019 | dynXOid **table; |
2020 | SECOidTag ret = SEC_OID_UNKNOWN; |
2021 | SECStatus rv; |
2022 | int tableEntries; |
2023 | int used; |
2024 | |
2025 | if (!src || !src->oid.data || !src->oid.len || |
2026 | !src->desc || !strlen(src->desc)) { |
2027 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_INVALID_ARGS); |
2028 | return ret; |
2029 | } |
2030 | if (src->supportedExtension != INVALID_CERT_EXTENSION && |
2031 | src->supportedExtension != UNSUPPORTED_CERT_EXTENSION && |
2032 | src->supportedExtension != SUPPORTED_CERT_EXTENSION) { |
2033 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_INVALID_ARGS); |
2034 | return ret; |
2035 | } |
2036 | |
2037 | if (!dynOidPool || !dynOidLock) { |
2038 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_NOT_INITIALIZED); |
2039 | return ret; |
2040 | } |
2041 | |
2042 | NSSRWLock_LockWriteNSSRWLock_LockWrite_Util(dynOidLock); |
2043 | |
2044 | /* We've just acquired the write lock, and now we call FindOIDTag |
2045 | ** which will acquire and release the read lock. NSSRWLock has been |
2046 | ** designed to allow this very case without deadlock. This approach |
2047 | ** makes the test for the presence of the OID, and the subsequent |
2048 | ** addition of the OID to the table a single atomic write operation. |
2049 | */ |
2050 | ret = SECOID_FindOIDTagSECOID_FindOIDTag_Util(&src->oid); |
2051 | if (ret != SEC_OID_UNKNOWN) { |
2052 | /* we could return an error here, but I chose not to do that. |
2053 | ** This way, if we add an OID to the shared library's built in |
2054 | ** list of OIDs in some future release, and that OID is the same |
2055 | ** as some OID that a program has been adding, the program will |
2056 | ** not suddenly stop working. |
2057 | */ |
2058 | goto done; |
2059 | } |
2060 | |
2061 | table = dynOidTable; |
2062 | tableEntries = dynOidEntriesAllocated; |
2063 | used = dynOidEntriesUsed; |
2064 | |
2065 | if (used + 1 > tableEntries) { |
2066 | dynXOid **newTable; |
2067 | int newTableEntries = tableEntries + 16; |
2068 | |
2069 | newTable = (dynXOid **)PORT_ReallocPORT_Realloc_Util(table, |
2070 | newTableEntries * sizeof(dynXOid *)); |
2071 | if (newTable == NULL((void*)0)) { |
2072 | goto done; |
2073 | } |
2074 | dynOidTable = table = newTable; |
2075 | dynOidEntriesAllocated = tableEntries = newTableEntries; |
Although the value stored to 'tableEntries' is used in the enclosing expression, the value is never actually read from 'tableEntries' | |
2076 | } |
2077 | |
2078 | /* copy oid structure */ |
2079 | dst = (SECOidData *)PORT_ArenaZNew(dynOidPool, dynXOid)(dynXOid *)PORT_ArenaZAlloc_Util(dynOidPool, sizeof(dynXOid)); |
2080 | if (!dst) { |
2081 | goto done; |
2082 | } |
2083 | rv = SECITEM_CopyItemSECITEM_CopyItem_Util(dynOidPool, &dst->oid, &src->oid); |
2084 | if (rv != SECSuccess) { |
2085 | goto done; |
2086 | } |
2087 | dst->desc = PORT_ArenaStrdupPORT_ArenaStrdup_Util(dynOidPool, src->desc); |
2088 | if (!dst->desc) { |
2089 | goto done; |
2090 | } |
2091 | dst->offset = (SECOidTag)(used + SEC_OID_TOTAL); |
2092 | dst->mechanism = src->mechanism; |
2093 | dst->supportedExtension = src->supportedExtension; |
2094 | |
2095 | rv = secoid_HashDynamicOiddata(dst); |
2096 | if (rv == SECSuccess) { |
2097 | table[used++] = (dynXOid *)dst; |
2098 | dynOidEntriesUsed = used; |
2099 | ret = dst->offset; |
2100 | } |
2101 | done: |
2102 | NSSRWLock_UnlockWriteNSSRWLock_UnlockWrite_Util(dynOidLock); |
2103 | return ret; |
2104 | } |
2105 | |
2106 | /* normal static table processing */ |
2107 | static PLHashTable *oidhash = NULL((void*)0); |
2108 | static PLHashTable *oidmechhash = NULL((void*)0); |
2109 | |
2110 | static PLHashNumber |
2111 | secoid_HashNumber(const void *key) |
2112 | { |
2113 | return (PLHashNumber)((char *)key - (char *)NULL((void*)0)); |
2114 | } |
2115 | |
2116 | #define DEF_FLAGS(0x00000001 | 0x00000004 | 0x00000004) (NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SSL_KX0x00000004) |
2117 | static void |
2118 | handleHashAlgSupport(char *envVal) |
2119 | { |
2120 | char *myVal = PORT_StrdupPORT_Strdup_Util(envVal); /* Get a copy we can alter */ |
2121 | char *arg = myVal; |
2122 | |
2123 | while (arg && *arg) { |
2124 | char *nextArg = PL_strpbrk(arg, ";"); |
2125 | PRUint32 notEnable; |
2126 | |
2127 | if (nextArg) { |
2128 | while (*nextArg == ';') { |
2129 | *nextArg++ = '\0'; |
2130 | } |
2131 | } |
2132 | notEnable = (*arg == '-') ? (DEF_FLAGS(0x00000001 | 0x00000004 | 0x00000004)) : 0; |
2133 | if ((*arg == '+' || *arg == '-') && *++arg) { |
2134 | int i; |
2135 | |
2136 | for (i = 1; i < SEC_OID_TOTAL; i++) { |
2137 | if (oids[i].desc && strstr(arg, oids[i].desc)) { |
2138 | xOids[i].notPolicyFlags = notEnable | |
2139 | (xOids[i].notPolicyFlags & ~(DEF_FLAGS(0x00000001 | 0x00000004 | 0x00000004))); |
2140 | } |
2141 | } |
2142 | } |
2143 | arg = nextArg; |
2144 | } |
2145 | PORT_FreePORT_Free_Util(myVal); /* can handle NULL argument OK */ |
2146 | } |
2147 | |
2148 | SECStatus |
2149 | SECOID_Init(void) |
2150 | { |
2151 | PLHashEntry *entry; |
2152 | const SECOidData *oid; |
2153 | SECOidTag i; |
2154 | char *envVal; |
2155 | |
2156 | #define NSS_VERSION_VARIABLE __nss_util_version |
2157 | #include "verref.h" |
2158 | |
2159 | if (oidhash) { |
2160 | return SECSuccess; /* already initialized */ |
2161 | } |
2162 | |
2163 | /* xyber768d00 must be enabled explicitly */ |
2164 | xOids[SEC_OID_XYBER768D00].notPolicyFlags = NSS_USE_ALG_IN_SSL_KX0x00000004; |
2165 | |
2166 | if (!PR_GetEnvSecure("NSS_ALLOW_WEAK_SIGNATURE_ALG")) { |
2167 | /* initialize any policy flags that are disabled by default */ |
2168 | xOids[SEC_OID_MD2].notPolicyFlags = ~0; |
2169 | xOids[SEC_OID_MD4].notPolicyFlags = ~0; |
2170 | xOids[SEC_OID_MD5].notPolicyFlags = ~0; |
2171 | xOids[SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION].notPolicyFlags = ~0; |
2172 | xOids[SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION].notPolicyFlags = ~0; |
2173 | xOids[SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION].notPolicyFlags = ~0; |
2174 | xOids[SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC].notPolicyFlags = ~0; |
2175 | xOids[SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC].notPolicyFlags = ~0; |
2176 | } |
2177 | |
2178 | /* turn off NSS_USE_POLICY_IN_SSL by default */ |
2179 | xOids[SEC_OID_APPLY_SSL_POLICY].notPolicyFlags = NSS_USE_POLICY_IN_SSL0x00000010; |
2180 | |
2181 | envVal = PR_GetEnvSecure("NSS_HASH_ALG_SUPPORT"); |
2182 | if (envVal) |
2183 | handleHashAlgSupport(envVal); |
2184 | |
2185 | if (secoid_InitDynOidData() != SECSuccess) { |
2186 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2187 | PORT_Assert(0)((0)?((void)0):PR_Assert("0","secoid.c",2187)); /* this function should never fail */ |
2188 | return SECFailure; |
2189 | } |
2190 | |
2191 | oidhash = PL_NewHashTable(0, SECITEM_Hash, SECITEM_HashCompare, |
2192 | PL_CompareValues, NULL((void*)0), NULL((void*)0)); |
2193 | oidmechhash = PL_NewHashTable(0, secoid_HashNumber, PL_CompareValues, |
2194 | PL_CompareValues, NULL((void*)0), NULL((void*)0)); |
2195 | |
2196 | if (!oidhash || !oidmechhash) { |
2197 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2198 | PORT_Assert(0)((0)?((void)0):PR_Assert("0","secoid.c",2198)); /*This function should never fail. */ |
2199 | return (SECFailure); |
2200 | } |
2201 | |
2202 | for (i = 0; i < SEC_OID_TOTAL; i++) { |
2203 | oid = &oids[i]; |
2204 | PORT_Assert(oid->offset == i)((oid->offset == i)?((void)0):PR_Assert("oid->offset == i" ,"secoid.c",2204)); |
2205 | entry = PL_HashTableAdd(oidhash, &oid->oid, (void *)oid); |
2206 | |
2207 | if (entry == NULL((void*)0)) { |
2208 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2209 | PORT_Assert(0)((0)?((void)0):PR_Assert("0","secoid.c",2209)); /*This function should never fail. */ |
2210 | return (SECFailure); |
2211 | } |
2212 | |
2213 | if (oid->mechanism != CKM_INVALID_MECHANISM0xffffffffUL) { |
2214 | entry = PL_HashTableAdd(oidmechhash, |
2215 | (void *)(uintptr_t)oid->mechanism, (void *)oid); |
2216 | if (entry == NULL((void*)0)) { |
2217 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2218 | PORT_Assert(0)((0)?((void)0):PR_Assert("0","secoid.c",2218)); /* This function should never fail. */ |
2219 | return (SECFailure); |
2220 | } |
2221 | } |
2222 | } |
2223 | |
2224 | PORT_Assert(i == SEC_OID_TOTAL)((i == SEC_OID_TOTAL)?((void)0):PR_Assert("i == SEC_OID_TOTAL" ,"secoid.c",2224)); |
2225 | |
2226 | return (SECSuccess); |
2227 | } |
2228 | |
2229 | SECOidData * |
2230 | SECOID_FindOIDByMechanism(unsigned long mechanism) |
2231 | { |
2232 | SECOidData *ret; |
2233 | |
2234 | PR_ASSERT(oidmechhash != NULL)((oidmechhash != ((void*)0))?((void)0):PR_Assert("oidmechhash != NULL" ,"secoid.c",2234)); |
2235 | if (oidmechhash == NULL((void*)0) && SECOID_Init() != SECSuccess) { |
2236 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2237 | return NULL((void*)0); |
2238 | } |
2239 | |
2240 | ret = PL_HashTableLookupConst(oidmechhash, (void *)(uintptr_t)mechanism); |
2241 | if (ret == NULL((void*)0)) { |
2242 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2243 | } |
2244 | |
2245 | return (ret); |
2246 | } |
2247 | |
2248 | SECOidData * |
2249 | SECOID_FindOIDSECOID_FindOID_Util(const SECItem *oid) |
2250 | { |
2251 | SECOidData *ret; |
2252 | |
2253 | PR_ASSERT(oidhash != NULL)((oidhash != ((void*)0))?((void)0):PR_Assert("oidhash != NULL" ,"secoid.c",2253)); |
2254 | if (oidhash == NULL((void*)0) && SECOID_Init() != SECSuccess) { |
2255 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
2256 | return NULL((void*)0); |
2257 | } |
2258 | |
2259 | ret = PL_HashTableLookupConst(oidhash, oid); |
2260 | if (ret == NULL((void*)0)) { |
2261 | ret = secoid_FindDynamic(oid); |
2262 | if (ret == NULL((void*)0)) { |
2263 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_UNRECOGNIZED_OID); |
2264 | } |
2265 | } |
2266 | return (ret); |
2267 | } |
2268 | |
2269 | SECOidTag |
2270 | SECOID_FindOIDTagSECOID_FindOIDTag_Util(const SECItem *oid) |
2271 | { |
2272 | SECOidData *oiddata; |
2273 | |
2274 | oiddata = SECOID_FindOIDSECOID_FindOID_Util(oid); |
2275 | if (oiddata == NULL((void*)0)) { |
2276 | return SEC_OID_UNKNOWN; |
2277 | } |
2278 | |
2279 | return oiddata->offset; |
2280 | } |
2281 | |
2282 | /* This really should return const. */ |
2283 | SECOidData * |
2284 | SECOID_FindOIDByTagSECOID_FindOIDByTag_Util(SECOidTag tagnum) |
2285 | { |
2286 | if (tagnum >= SEC_OID_TOTAL) { |
2287 | return (SECOidData *)secoid_FindDynamicByTag(tagnum); |
2288 | } |
2289 | |
2290 | PORT_Assert((unsigned int)tagnum < SEC_OID_TOTAL)(((unsigned int)tagnum < SEC_OID_TOTAL)?((void)0):PR_Assert ("(unsigned int)tagnum < SEC_OID_TOTAL","secoid.c",2290)); |
2291 | return (SECOidData *)(&oids[tagnum]); |
2292 | } |
2293 | |
2294 | PRBool |
2295 | SECOID_KnownCertExtenOID(SECItem *extenOid) |
2296 | { |
2297 | SECOidData *oidData; |
2298 | |
2299 | oidData = SECOID_FindOIDSECOID_FindOID_Util(extenOid); |
2300 | if (oidData == (SECOidData *)NULL((void*)0)) |
2301 | return (PR_FALSE0); |
2302 | return ((oidData->supportedExtension == SUPPORTED_CERT_EXTENSION) ? PR_TRUE1 : PR_FALSE0); |
2303 | } |
2304 | |
2305 | const char * |
2306 | SECOID_FindOIDTagDescriptionSECOID_FindOIDTagDescription_Util(SECOidTag tagnum) |
2307 | { |
2308 | const SECOidData *oidData = SECOID_FindOIDByTagSECOID_FindOIDByTag_Util(tagnum); |
2309 | return oidData ? oidData->desc : 0; |
2310 | } |
2311 | |
2312 | /* --------- opaque extended OID table accessor functions ---------------*/ |
2313 | /* |
2314 | * Any of these functions may return SECSuccess or SECFailure with the error |
2315 | * code set to SEC_ERROR_UNKNOWN_OBJECT_TYPE if the SECOidTag is out of range. |
2316 | */ |
2317 | |
2318 | static privXOid * |
2319 | secoid_FindXOidByTag(SECOidTag tagnum) |
2320 | { |
2321 | if (tagnum >= SEC_OID_TOTAL) { |
2322 | dynXOid *dxo = secoid_FindDynamicByTag(tagnum); |
2323 | return (dxo ? &dxo->priv : NULL((void*)0)); |
2324 | } |
2325 | |
2326 | PORT_Assert((unsigned int)tagnum < SEC_OID_TOTAL)(((unsigned int)tagnum < SEC_OID_TOTAL)?((void)0):PR_Assert ("(unsigned int)tagnum < SEC_OID_TOTAL","secoid.c",2326)); |
2327 | return &xOids[tagnum]; |
2328 | } |
2329 | |
2330 | /* The Get function outputs the 32-bit value associated with the SECOidTag. |
2331 | * Flags bits are the NSS_USE_ALG_ #defines in "secoidt.h". |
2332 | * Default value for any algorithm is 0xffffffff (enabled for all purposes). |
2333 | * No value is output if function returns SECFailure. |
2334 | */ |
2335 | SECStatus |
2336 | NSS_GetAlgorithmPolicy(SECOidTag tag, PRUint32 *pValue) |
2337 | { |
2338 | privXOid *pxo = secoid_FindXOidByTag(tag); |
2339 | if (!pxo) |
2340 | return SECFailure; |
2341 | if (!pValue) { |
2342 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_INVALID_ARGS); |
2343 | return SECFailure; |
2344 | } |
2345 | *pValue = ~(pxo->notPolicyFlags); |
2346 | return SECSuccess; |
2347 | } |
2348 | |
2349 | static PRBool nss_policy_locked = PR_FALSE0; |
2350 | |
2351 | /* The Set function modifies the stored value according to the following |
2352 | * algorithm: |
2353 | * policy[tag] = (policy[tag] & ~clearBits) | setBits; |
2354 | */ |
2355 | SECStatus |
2356 | NSS_SetAlgorithmPolicy(SECOidTag tag, PRUint32 setBits, PRUint32 clearBits) |
2357 | { |
2358 | privXOid *pxo = secoid_FindXOidByTag(tag); |
2359 | PRUint32 policyFlags; |
2360 | if (!pxo) |
2361 | return SECFailure; |
2362 | |
2363 | if (nss_policy_locked) { |
2364 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_POLICY_LOCKED); |
2365 | return SECFailure; |
2366 | } |
2367 | /* The stored policy flags are the ones complement of the flags as |
2368 | * seen by the user. This is not atomic, but these changes should |
2369 | * be done rarely, e.g. at initialization time. |
2370 | */ |
2371 | policyFlags = ~(pxo->notPolicyFlags); |
2372 | policyFlags = (policyFlags & ~clearBits) | setBits; |
2373 | pxo->notPolicyFlags = ~policyFlags; |
2374 | return SECSuccess; |
2375 | } |
2376 | |
2377 | /* Get the state of nss_policy_locked */ |
2378 | PRBool |
2379 | NSS_IsPolicyLocked(void) |
2380 | { |
2381 | return nss_policy_locked; |
2382 | } |
2383 | |
2384 | /* Once the policy is locked, it can't be unlocked */ |
2385 | void |
2386 | NSS_LockPolicy(void) |
2387 | { |
2388 | nss_policy_locked = PR_TRUE1; |
2389 | } |
2390 | |
2391 | /* --------- END OF opaque extended OID table accessor functions ---------*/ |
2392 | |
2393 | /* for now, this is only used in a single place, so it can remain static */ |
2394 | static PRBool parentForkedAfterC_Initialize; |
2395 | |
2396 | #define SKIP_AFTER_FORK(x)if (!parentForkedAfterC_Initialize) x \ |
2397 | if (!parentForkedAfterC_Initialize) \ |
2398 | x |
2399 | |
2400 | /* |
2401 | * free up the oid tables. |
2402 | */ |
2403 | SECStatus |
2404 | SECOID_Shutdown(void) |
2405 | { |
2406 | if (oidhash) { |
2407 | PL_HashTableDestroy(oidhash); |
2408 | oidhash = NULL((void*)0); |
2409 | } |
2410 | if (oidmechhash) { |
2411 | PL_HashTableDestroy(oidmechhash); |
2412 | oidmechhash = NULL((void*)0); |
2413 | } |
2414 | /* Have to handle the case where the lock was created, but |
2415 | ** the pool wasn't. |
2416 | ** I'm not going to attempt to create the lock, just to protect |
2417 | ** the destruction of data that probably isn't initialized anyway. |
2418 | */ |
2419 | if (dynOidLock) { |
2420 | SKIP_AFTER_FORK(NSSRWLock_LockWrite(dynOidLock))if (!parentForkedAfterC_Initialize) NSSRWLock_LockWrite_Util( dynOidLock); |
2421 | if (dynOidHash) { |
2422 | PL_HashTableDestroy(dynOidHash); |
2423 | dynOidHash = NULL((void*)0); |
2424 | } |
2425 | if (dynOidPool) { |
2426 | PORT_FreeArenaPORT_FreeArena_Util(dynOidPool, PR_FALSE0); |
2427 | dynOidPool = NULL((void*)0); |
2428 | } |
2429 | if (dynOidTable) { |
2430 | PORT_FreePORT_Free_Util(dynOidTable); |
2431 | dynOidTable = NULL((void*)0); |
2432 | } |
2433 | dynOidEntriesAllocated = 0; |
2434 | dynOidEntriesUsed = 0; |
2435 | |
2436 | SKIP_AFTER_FORK(NSSRWLock_UnlockWrite(dynOidLock))if (!parentForkedAfterC_Initialize) NSSRWLock_UnlockWrite_Util (dynOidLock); |
2437 | SKIP_AFTER_FORK(NSSRWLock_Destroy(dynOidLock))if (!parentForkedAfterC_Initialize) NSSRWLock_Destroy_Util(dynOidLock ); |
2438 | dynOidLock = NULL((void*)0); |
2439 | } else { |
2440 | /* Since dynOidLock doesn't exist, then all the data it protects |
2441 | ** should be uninitialized. We'll check that (in DEBUG builds), |
2442 | ** and then make sure it is so, in case NSS is reinitialized. |
2443 | */ |
2444 | PORT_Assert(!dynOidHash && !dynOidPool && !dynOidTable &&((!dynOidHash && !dynOidPool && !dynOidTable && !dynOidEntriesAllocated && !dynOidEntriesUsed)?((void )0):PR_Assert("!dynOidHash && !dynOidPool && !dynOidTable && !dynOidEntriesAllocated && !dynOidEntriesUsed" ,"secoid.c",2445)) |
2445 | !dynOidEntriesAllocated && !dynOidEntriesUsed)((!dynOidHash && !dynOidPool && !dynOidTable && !dynOidEntriesAllocated && !dynOidEntriesUsed)?((void )0):PR_Assert("!dynOidHash && !dynOidPool && !dynOidTable && !dynOidEntriesAllocated && !dynOidEntriesUsed" ,"secoid.c",2445)); |
2446 | dynOidHash = NULL((void*)0); |
2447 | dynOidPool = NULL((void*)0); |
2448 | dynOidTable = NULL((void*)0); |
2449 | dynOidEntriesAllocated = 0; |
2450 | dynOidEntriesUsed = 0; |
2451 | } |
2452 | /* we are trashing the old policy state now, also reenable changing |
2453 | * the policy as well */ |
2454 | nss_policy_locked = PR_FALSE0; |
2455 | memset(xOids, 0, sizeof xOids); |
2456 | return SECSuccess; |
2457 | } |
2458 | |
2459 | void |
2460 | UTIL_SetForkState(PRBool forked) |
2461 | { |
2462 | parentForkedAfterC_Initialize = forked; |
2463 | } |
2464 | |
2465 | const char * |
2466 | NSSUTIL_GetVersion(void) |
2467 | { |
2468 | return NSSUTIL_VERSION"3.101 Beta"; |
2469 | } |