summaryrefslogtreecommitdiff
path: root/src/libstrongswan/asn1
diff options
context:
space:
mode:
authorYves-Alexis Perez <corsac@corsac.net>2017-11-21 10:22:31 +0100
committerYves-Alexis Perez <corsac@corsac.net>2017-11-21 10:22:31 +0100
commite1d78dc2faaa06e7c3f71ef674a71e4de2f0758e (patch)
treeae0c8b5f4cd8289d0797882ea18969f33ea59a1e /src/libstrongswan/asn1
parent11d6b62db969bdd808d0f56706cb18f113927a31 (diff)
downloadvyos-strongswan-e1d78dc2faaa06e7c3f71ef674a71e4de2f0758e.tar.gz
vyos-strongswan-e1d78dc2faaa06e7c3f71ef674a71e4de2f0758e.zip
New upstream version 5.6.1
Diffstat (limited to 'src/libstrongswan/asn1')
-rw-r--r--src/libstrongswan/asn1/asn1.c32
-rw-r--r--src/libstrongswan/asn1/asn1.h25
-rw-r--r--src/libstrongswan/asn1/oid.c940
-rw-r--r--src/libstrongswan/asn1/oid.h477
-rw-r--r--src/libstrongswan/asn1/oid.txt6
5 files changed, 769 insertions, 711 deletions
diff --git a/src/libstrongswan/asn1/asn1.c b/src/libstrongswan/asn1/asn1.c
index 8b9dc1c48..3f3a5c587 100644
--- a/src/libstrongswan/asn1/asn1.c
+++ b/src/libstrongswan/asn1/asn1.c
@@ -33,7 +33,15 @@ const chunk_t ASN1_INTEGER_1 = chunk_from_chars(0x02, 0x01, 0x01);
const chunk_t ASN1_INTEGER_2 = chunk_from_chars(0x02, 0x01, 0x02);
/*
- * Defined in header.
+ * Described in header
+ */
+chunk_t asn1_algorithmIdentifier_params(int oid, chunk_t params)
+{
+ return asn1_wrap(ASN1_SEQUENCE, "mm", asn1_build_known_oid(oid), params);
+}
+
+/*
+ * Described in header
*/
chunk_t asn1_algorithmIdentifier(int oid)
{
@@ -55,7 +63,7 @@ chunk_t asn1_algorithmIdentifier(int oid)
parameters = asn1_simple_object(ASN1_NULL, chunk_empty);
break;
}
- return asn1_wrap(ASN1_SEQUENCE, "mm", asn1_build_known_oid(oid), parameters);
+ return asn1_algorithmIdentifier_params(oid, parameters);
}
/*
@@ -609,6 +617,26 @@ uint64_t asn1_parse_integer_uint64(chunk_t blob)
return val;
}
+/*
+ * Described in header
+ */
+chunk_t asn1_integer_from_uint64(uint64_t val)
+{
+ u_char buf[sizeof(val)];
+ chunk_t enc = chunk_empty;
+
+ if (val < 0x100)
+ {
+ buf[0] = (u_char)val;
+ return chunk_clone(chunk_create(buf, 1));
+ }
+ for (enc.ptr = buf + sizeof(val); val; enc.len++, val >>= 8)
+ { /* fill the buffer from the end */
+ *(--enc.ptr) = val & 0xff;
+ }
+ return chunk_clone(enc);
+}
+
/**
* ASN.1 definition of an algorithmIdentifier
*/
diff --git a/src/libstrongswan/asn1/asn1.h b/src/libstrongswan/asn1/asn1.h
index f0b3e17e8..3c7389e5c 100644
--- a/src/libstrongswan/asn1/asn1.h
+++ b/src/libstrongswan/asn1/asn1.h
@@ -1,8 +1,8 @@
/*
+ * Copyright (C) 2011-2017 Tobias Brunner
* Copyright (C) 2006 Martin Will
* Copyright (C) 2000-2008 Andreas Steffen
- *
- * Hochschule fuer Technik Rapperswil
+ * HSR Hochschule fuer Technik Rapperswil
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
@@ -92,14 +92,23 @@ extern const chunk_t ASN1_INTEGER_2;
/** Some ASN.1 analysis functions */
/**
- * Build an algorithmIdentifier from a known OID.
+ * Build an algorithmIdentifier from a known OID with empty parameters.
*
* @param oid known OID index
- * @return body of the corresponding OID, allocated
+ * @return body of the corresponding ASN.1 structure, allocated
*/
chunk_t asn1_algorithmIdentifier(int oid);
/**
+ * Build an algorithmIdentifier from a known OID and the given prameters.
+ *
+ * @param oid known OID index
+ * @param params parameters to encode in the algorithmIdentifier (adopted)
+ * @return body of the corresponding ASN.1 structure, allocated
+ */
+chunk_t asn1_algorithmIdentifier_params(int oid, chunk_t params);
+
+/**
* Converts an ASN.1 OID into a known OID index
*
* @param object body of an OID
@@ -181,6 +190,14 @@ bool asn1_parse_simple_object(chunk_t *object, asn1_t type, u_int level0,
uint64_t asn1_parse_integer_uint64(chunk_t blob);
/**
+ * Converts an uint64_t to an ASN.1 INTEGER object.
+ *
+ * @param val integer to convert
+ * @return body of an ASN.1 coded integer object
+ */
+chunk_t asn1_integer_from_uint64(uint64_t val);
+
+/**
* Print the value of an ASN.1 simple object
*
* @param object ASN.1 object to be printed
diff --git a/src/libstrongswan/asn1/oid.c b/src/libstrongswan/asn1/oid.c
index bb423dcac..6d9f98ee4 100644
--- a/src/libstrongswan/asn1/oid.c
+++ b/src/libstrongswan/asn1/oid.c
@@ -28,478 +28,482 @@ const oid_t oid_names[] = {
{ 0x01, 0, 1, 8, "pilotAttributeType" }, /* 15 */
{ 0x01, 17, 0, 9, "UID" }, /* 16 */
{ 0x19, 0, 0, 9, "DC" }, /* 17 */
- {0x55, 67, 1, 0, "X.500" }, /* 18 */
- { 0x04, 39, 1, 1, "X.509" }, /* 19 */
+ {0x55, 70, 1, 0, "X.500" }, /* 18 */
+ { 0x04, 42, 1, 1, "X.509" }, /* 19 */
{ 0x03, 21, 0, 2, "CN" }, /* 20 */
{ 0x04, 22, 0, 2, "S" }, /* 21 */
{ 0x05, 23, 0, 2, "SN" }, /* 22 */
{ 0x06, 24, 0, 2, "C" }, /* 23 */
{ 0x07, 25, 0, 2, "L" }, /* 24 */
{ 0x08, 26, 0, 2, "ST" }, /* 25 */
- { 0x0A, 27, 0, 2, "O" }, /* 26 */
- { 0x0B, 28, 0, 2, "OU" }, /* 27 */
- { 0x0C, 29, 0, 2, "T" }, /* 28 */
- { 0x0D, 30, 0, 2, "D" }, /* 29 */
- { 0x24, 31, 0, 2, "userCertificate" }, /* 30 */
- { 0x29, 32, 0, 2, "N" }, /* 31 */
- { 0x2A, 33, 0, 2, "G" }, /* 32 */
- { 0x2B, 34, 0, 2, "I" }, /* 33 */
- { 0x2D, 35, 0, 2, "ID" }, /* 34 */
- { 0x2E, 36, 0, 2, "dnQualifier" }, /* 35 */
- { 0x36, 37, 0, 2, "dmdName" }, /* 36 */
- { 0x41, 38, 0, 2, "pseudonym" }, /* 37 */
- { 0x48, 0, 0, 2, "role" }, /* 38 */
- { 0x1D, 0, 1, 1, "id-ce" }, /* 39 */
- { 0x09, 41, 0, 2, "subjectDirectoryAttrs" }, /* 40 */
- { 0x0E, 42, 0, 2, "subjectKeyIdentifier" }, /* 41 */
- { 0x0F, 43, 0, 2, "keyUsage" }, /* 42 */
- { 0x10, 44, 0, 2, "privateKeyUsagePeriod" }, /* 43 */
- { 0x11, 45, 0, 2, "subjectAltName" }, /* 44 */
- { 0x12, 46, 0, 2, "issuerAltName" }, /* 45 */
- { 0x13, 47, 0, 2, "basicConstraints" }, /* 46 */
- { 0x14, 48, 0, 2, "crlNumber" }, /* 47 */
- { 0x15, 49, 0, 2, "reasonCode" }, /* 48 */
- { 0x17, 50, 0, 2, "holdInstructionCode" }, /* 49 */
- { 0x18, 51, 0, 2, "invalidityDate" }, /* 50 */
- { 0x1B, 52, 0, 2, "deltaCrlIndicator" }, /* 51 */
- { 0x1C, 53, 0, 2, "issuingDistributionPoint" }, /* 52 */
- { 0x1D, 54, 0, 2, "certificateIssuer" }, /* 53 */
- { 0x1E, 55, 0, 2, "nameConstraints" }, /* 54 */
- { 0x1F, 56, 0, 2, "crlDistributionPoints" }, /* 55 */
- { 0x20, 58, 1, 2, "certificatePolicies" }, /* 56 */
- { 0x00, 0, 0, 3, "anyPolicy" }, /* 57 */
- { 0x21, 59, 0, 2, "policyMappings" }, /* 58 */
- { 0x23, 60, 0, 2, "authorityKeyIdentifier" }, /* 59 */
- { 0x24, 61, 0, 2, "policyConstraints" }, /* 60 */
- { 0x25, 63, 1, 2, "extendedKeyUsage" }, /* 61 */
- { 0x00, 0, 0, 3, "anyExtendedKeyUsage" }, /* 62 */
- { 0x2E, 64, 0, 2, "freshestCRL" }, /* 63 */
- { 0x36, 65, 0, 2, "inhibitAnyPolicy" }, /* 64 */
- { 0x37, 66, 0, 2, "targetInformation" }, /* 65 */
- { 0x38, 0, 0, 2, "noRevAvail" }, /* 66 */
- {0x2A, 191, 1, 0, "" }, /* 67 */
- { 0x83, 80, 1, 1, "" }, /* 68 */
- { 0x08, 0, 1, 2, "jp" }, /* 69 */
- { 0x8C, 0, 1, 3, "" }, /* 70 */
- { 0x9A, 0, 1, 4, "" }, /* 71 */
- { 0x4B, 0, 1, 5, "" }, /* 72 */
- { 0x3D, 0, 1, 6, "" }, /* 73 */
- { 0x01, 0, 1, 7, "security" }, /* 74 */
- { 0x01, 0, 1, 8, "algorithm" }, /* 75 */
- { 0x01, 0, 1, 9, "symm-encryption-alg" }, /* 76 */
- { 0x02, 78, 0, 10, "camellia128-cbc" }, /* 77 */
- { 0x03, 79, 0, 10, "camellia192-cbc" }, /* 78 */
- { 0x04, 0, 0, 10, "camellia256-cbc" }, /* 79 */
- { 0x86, 0, 1, 1, "" }, /* 80 */
- { 0x48, 0, 1, 2, "us" }, /* 81 */
- { 0x86, 150, 1, 3, "" }, /* 82 */
- { 0xF6, 88, 1, 4, "" }, /* 83 */
- { 0x7D, 0, 1, 5, "NortelNetworks" }, /* 84 */
- { 0x07, 0, 1, 6, "Entrust" }, /* 85 */
- { 0x41, 0, 1, 7, "nsn-ce" }, /* 86 */
- { 0x00, 0, 0, 8, "entrustVersInfo" }, /* 87 */
- { 0xF7, 0, 1, 4, "" }, /* 88 */
- { 0x0D, 0, 1, 5, "RSADSI" }, /* 89 */
- { 0x01, 145, 1, 6, "PKCS" }, /* 90 */
- { 0x01, 103, 1, 7, "PKCS-1" }, /* 91 */
- { 0x01, 93, 0, 8, "rsaEncryption" }, /* 92 */
- { 0x02, 94, 0, 8, "md2WithRSAEncryption" }, /* 93 */
- { 0x04, 95, 0, 8, "md5WithRSAEncryption" }, /* 94 */
- { 0x05, 96, 0, 8, "sha-1WithRSAEncryption" }, /* 95 */
- { 0x07, 97, 0, 8, "id-RSAES-OAEP" }, /* 96 */
- { 0x08, 98, 0, 8, "id-mgf1" }, /* 97 */
- { 0x09, 99, 0, 8, "id-pSpecified" }, /* 98 */
- { 0x0B, 100, 0, 8, "sha256WithRSAEncryption" }, /* 99 */
- { 0x0C, 101, 0, 8, "sha384WithRSAEncryption" }, /* 100 */
- { 0x0D, 102, 0, 8, "sha512WithRSAEncryption" }, /* 101 */
- { 0x0E, 0, 0, 8, "sha224WithRSAEncryption" }, /* 102 */
- { 0x05, 108, 1, 7, "PKCS-5" }, /* 103 */
- { 0x03, 105, 0, 8, "pbeWithMD5AndDES-CBC" }, /* 104 */
- { 0x0A, 106, 0, 8, "pbeWithSHA1AndDES-CBC" }, /* 105 */
- { 0x0C, 107, 0, 8, "id-PBKDF2" }, /* 106 */
- { 0x0D, 0, 0, 8, "id-PBES2" }, /* 107 */
- { 0x07, 115, 1, 7, "PKCS-7" }, /* 108 */
- { 0x01, 110, 0, 8, "data" }, /* 109 */
- { 0x02, 111, 0, 8, "signedData" }, /* 110 */
- { 0x03, 112, 0, 8, "envelopedData" }, /* 111 */
- { 0x04, 113, 0, 8, "signedAndEnvelopedData" }, /* 112 */
- { 0x05, 114, 0, 8, "digestedData" }, /* 113 */
- { 0x06, 0, 0, 8, "encryptedData" }, /* 114 */
- { 0x09, 129, 1, 7, "PKCS-9" }, /* 115 */
- { 0x01, 117, 0, 8, "E" }, /* 116 */
- { 0x02, 118, 0, 8, "unstructuredName" }, /* 117 */
- { 0x03, 119, 0, 8, "contentType" }, /* 118 */
- { 0x04, 120, 0, 8, "messageDigest" }, /* 119 */
- { 0x05, 121, 0, 8, "signingTime" }, /* 120 */
- { 0x06, 122, 0, 8, "counterSignature" }, /* 121 */
- { 0x07, 123, 0, 8, "challengePassword" }, /* 122 */
- { 0x08, 124, 0, 8, "unstructuredAddress" }, /* 123 */
- { 0x0E, 125, 0, 8, "extensionRequest" }, /* 124 */
- { 0x0F, 126, 0, 8, "S/MIME Capabilities" }, /* 125 */
- { 0x16, 0, 1, 8, "certTypes" }, /* 126 */
- { 0x01, 128, 0, 9, "X.509" }, /* 127 */
- { 0x02, 0, 0, 9, "SDSI" }, /* 128 */
- { 0x0c, 0, 1, 7, "PKCS-12" }, /* 129 */
- { 0x01, 137, 1, 8, "pbeIds" }, /* 130 */
- { 0x01, 132, 0, 9, "pbeWithSHAAnd128BitRC4" }, /* 131 */
- { 0x02, 133, 0, 9, "pbeWithSHAAnd40BitRC4" }, /* 132 */
- { 0x03, 134, 0, 9, "pbeWithSHAAnd3-KeyTripleDES-CBC" }, /* 133 */
- { 0x04, 135, 0, 9, "pbeWithSHAAnd2-KeyTripleDES-CBC" }, /* 134 */
- { 0x05, 136, 0, 9, "pbeWithSHAAnd128BitRC2-CBC" }, /* 135 */
- { 0x06, 0, 0, 9, "pbeWithSHAAnd40BitRC2-CBC" }, /* 136 */
- { 0x0a, 0, 1, 8, "PKCS-12v1" }, /* 137 */
- { 0x01, 0, 1, 9, "bagIds" }, /* 138 */
- { 0x01, 140, 0, 10, "keyBag" }, /* 139 */
- { 0x02, 141, 0, 10, "pkcs8ShroudedKeyBag" }, /* 140 */
- { 0x03, 142, 0, 10, "certBag" }, /* 141 */
- { 0x04, 143, 0, 10, "crlBag" }, /* 142 */
- { 0x05, 144, 0, 10, "secretBag" }, /* 143 */
- { 0x06, 0, 0, 10, "safeContentsBag" }, /* 144 */
- { 0x02, 148, 1, 6, "digestAlgorithm" }, /* 145 */
- { 0x02, 147, 0, 7, "md2" }, /* 146 */
- { 0x05, 0, 0, 7, "md5" }, /* 147 */
- { 0x03, 0, 1, 6, "encryptionAlgorithm" }, /* 148 */
- { 0x07, 0, 0, 7, "3des-ede-cbc" }, /* 149 */
- { 0xCE, 0, 1, 3, "" }, /* 150 */
- { 0x3D, 0, 1, 4, "ansi-X9-62" }, /* 151 */
- { 0x02, 154, 1, 5, "id-publicKeyType" }, /* 152 */
- { 0x01, 0, 0, 6, "id-ecPublicKey" }, /* 153 */
- { 0x03, 184, 1, 5, "ellipticCurve" }, /* 154 */
- { 0x00, 176, 1, 6, "c-TwoCurve" }, /* 155 */
- { 0x01, 157, 0, 7, "c2pnb163v1" }, /* 156 */
- { 0x02, 158, 0, 7, "c2pnb163v2" }, /* 157 */
- { 0x03, 159, 0, 7, "c2pnb163v3" }, /* 158 */
- { 0x04, 160, 0, 7, "c2pnb176w1" }, /* 159 */
- { 0x05, 161, 0, 7, "c2tnb191v1" }, /* 160 */
- { 0x06, 162, 0, 7, "c2tnb191v2" }, /* 161 */
- { 0x07, 163, 0, 7, "c2tnb191v3" }, /* 162 */
- { 0x08, 164, 0, 7, "c2onb191v4" }, /* 163 */
- { 0x09, 165, 0, 7, "c2onb191v5" }, /* 164 */
- { 0x0A, 166, 0, 7, "c2pnb208w1" }, /* 165 */
- { 0x0B, 167, 0, 7, "c2tnb239v1" }, /* 166 */
- { 0x0C, 168, 0, 7, "c2tnb239v2" }, /* 167 */
- { 0x0D, 169, 0, 7, "c2tnb239v3" }, /* 168 */
- { 0x0E, 170, 0, 7, "c2onb239v4" }, /* 169 */
- { 0x0F, 171, 0, 7, "c2onb239v5" }, /* 170 */
- { 0x10, 172, 0, 7, "c2pnb272w1" }, /* 171 */
- { 0x11, 173, 0, 7, "c2pnb304w1" }, /* 172 */
- { 0x12, 174, 0, 7, "c2tnb359v1" }, /* 173 */
- { 0x13, 175, 0, 7, "c2pnb368w1" }, /* 174 */
- { 0x14, 0, 0, 7, "c2tnb431r1" }, /* 175 */
- { 0x01, 0, 1, 6, "primeCurve" }, /* 176 */
- { 0x01, 178, 0, 7, "prime192v1" }, /* 177 */
- { 0x02, 179, 0, 7, "prime192v2" }, /* 178 */
- { 0x03, 180, 0, 7, "prime192v3" }, /* 179 */
- { 0x04, 181, 0, 7, "prime239v1" }, /* 180 */
- { 0x05, 182, 0, 7, "prime239v2" }, /* 181 */
- { 0x06, 183, 0, 7, "prime239v3" }, /* 182 */
- { 0x07, 0, 0, 7, "prime256v1" }, /* 183 */
- { 0x04, 0, 1, 5, "id-ecSigType" }, /* 184 */
- { 0x01, 186, 0, 6, "ecdsa-with-SHA1" }, /* 185 */
- { 0x03, 0, 1, 6, "ecdsa-with-Specified" }, /* 186 */
- { 0x01, 188, 0, 7, "ecdsa-with-SHA224" }, /* 187 */
- { 0x02, 189, 0, 7, "ecdsa-with-SHA256" }, /* 188 */
- { 0x03, 190, 0, 7, "ecdsa-with-SHA384" }, /* 189 */
- { 0x04, 0, 0, 7, "ecdsa-with-SHA512" }, /* 190 */
- {0x2B, 421, 1, 0, "" }, /* 191 */
- { 0x06, 332, 1, 1, "dod" }, /* 192 */
- { 0x01, 0, 1, 2, "internet" }, /* 193 */
- { 0x04, 283, 1, 3, "private" }, /* 194 */
- { 0x01, 0, 1, 4, "enterprise" }, /* 195 */
- { 0x82, 233, 1, 5, "" }, /* 196 */
- { 0x37, 209, 1, 6, "Microsoft" }, /* 197 */
- { 0x0A, 202, 1, 7, "" }, /* 198 */
- { 0x03, 0, 1, 8, "" }, /* 199 */
- { 0x03, 201, 0, 9, "msSGC" }, /* 200 */
- { 0x04, 0, 0, 9, "msEncryptingFileSystem" }, /* 201 */
- { 0x14, 206, 1, 7, "msEnrollmentInfrastructure" }, /* 202 */
- { 0x02, 0, 1, 8, "msCertificateTypeExtension" }, /* 203 */
- { 0x02, 205, 0, 9, "msSmartcardLogon" }, /* 204 */
- { 0x03, 0, 0, 9, "msUPN" }, /* 205 */
- { 0x15, 0, 1, 7, "msCertSrvInfrastructure" }, /* 206 */
- { 0x07, 208, 0, 8, "msCertTemplate" }, /* 207 */
- { 0x0A, 0, 0, 8, "msApplicationCertPolicies" }, /* 208 */
- { 0xA0, 0, 1, 6, "" }, /* 209 */
- { 0x2A, 0, 1, 7, "ITA" }, /* 210 */
- { 0x01, 212, 0, 8, "strongSwan" }, /* 211 */
- { 0x02, 213, 0, 8, "cps" }, /* 212 */
- { 0x03, 214, 0, 8, "e-voting" }, /* 213 */
- { 0x05, 0, 1, 8, "BLISS" }, /* 214 */
- { 0x01, 217, 1, 9, "keyType" }, /* 215 */
- { 0x01, 0, 0, 10, "blissPublicKey" }, /* 216 */
- { 0x02, 226, 1, 9, "parameters" }, /* 217 */
- { 0x01, 219, 0, 10, "BLISS-I" }, /* 218 */
- { 0x02, 220, 0, 10, "BLISS-II" }, /* 219 */
- { 0x03, 221, 0, 10, "BLISS-III" }, /* 220 */
- { 0x04, 222, 0, 10, "BLISS-IV" }, /* 221 */
- { 0x05, 223, 0, 10, "BLISS-B-I" }, /* 222 */
- { 0x06, 224, 0, 10, "BLISS-B-II" }, /* 223 */
- { 0x07, 225, 0, 10, "BLISS-B-III" }, /* 224 */
- { 0x08, 0, 0, 10, "BLISS-B-IV" }, /* 225 */
- { 0x03, 0, 1, 9, "blissSigType" }, /* 226 */
- { 0x01, 228, 0, 10, "BLISS-with-SHA2-512" }, /* 227 */
- { 0x02, 229, 0, 10, "BLISS-with-SHA2-384" }, /* 228 */
- { 0x03, 230, 0, 10, "BLISS-with-SHA2-256" }, /* 229 */
- { 0x04, 231, 0, 10, "BLISS-with-SHA3-512" }, /* 230 */
- { 0x05, 232, 0, 10, "BLISS-with-SHA3-384" }, /* 231 */
- { 0x06, 0, 0, 10, "BLISS-with-SHA3-256" }, /* 232 */
- { 0x89, 240, 1, 5, "" }, /* 233 */
- { 0x31, 0, 1, 6, "" }, /* 234 */
- { 0x01, 0, 1, 7, "" }, /* 235 */
- { 0x01, 0, 1, 8, "" }, /* 236 */
- { 0x02, 0, 1, 9, "" }, /* 237 */
- { 0x02, 0, 1, 10, "" }, /* 238 */
- { 0x4B, 0, 0, 11, "TCGID" }, /* 239 */
- { 0x97, 244, 1, 5, "" }, /* 240 */
- { 0x55, 0, 1, 6, "" }, /* 241 */
- { 0x01, 0, 1, 7, "" }, /* 242 */
- { 0x02, 0, 0, 8, "blowfish-cbc" }, /* 243 */
- { 0xC1, 0, 1, 5, "" }, /* 244 */
- { 0x16, 0, 1, 6, "ntruCryptosystems" }, /* 245 */
- { 0x01, 0, 1, 7, "eess" }, /* 246 */
- { 0x01, 0, 1, 8, "eess1" }, /* 247 */
- { 0x01, 252, 1, 9, "eess1-algs" }, /* 248 */
- { 0x01, 250, 0, 10, "ntru-EESS1v1-SVES" }, /* 249 */
- { 0x02, 251, 0, 10, "ntru-EESS1v1-SVSSA" }, /* 250 */
- { 0x03, 0, 0, 10, "ntru-EESS1v1-NTRUSign" }, /* 251 */
- { 0x02, 282, 1, 9, "eess1-params" }, /* 252 */
- { 0x01, 254, 0, 10, "ees251ep1" }, /* 253 */
- { 0x02, 255, 0, 10, "ees347ep1" }, /* 254 */
- { 0x03, 256, 0, 10, "ees503ep1" }, /* 255 */
- { 0x07, 257, 0, 10, "ees251sp2" }, /* 256 */
- { 0x0C, 258, 0, 10, "ees251ep4" }, /* 257 */
- { 0x0D, 259, 0, 10, "ees251ep5" }, /* 258 */
- { 0x0E, 260, 0, 10, "ees251sp3" }, /* 259 */
- { 0x0F, 261, 0, 10, "ees251sp4" }, /* 260 */
- { 0x10, 262, 0, 10, "ees251sp5" }, /* 261 */
- { 0x11, 263, 0, 10, "ees251sp6" }, /* 262 */
- { 0x12, 264, 0, 10, "ees251sp7" }, /* 263 */
- { 0x13, 265, 0, 10, "ees251sp8" }, /* 264 */
- { 0x14, 266, 0, 10, "ees251sp9" }, /* 265 */
- { 0x22, 267, 0, 10, "ees401ep1" }, /* 266 */
- { 0x23, 268, 0, 10, "ees449ep1" }, /* 267 */
- { 0x24, 269, 0, 10, "ees677ep1" }, /* 268 */
- { 0x25, 270, 0, 10, "ees1087ep2" }, /* 269 */
- { 0x26, 271, 0, 10, "ees541ep1" }, /* 270 */
- { 0x27, 272, 0, 10, "ees613ep1" }, /* 271 */
- { 0x28, 273, 0, 10, "ees887ep1" }, /* 272 */
- { 0x29, 274, 0, 10, "ees1171ep1" }, /* 273 */
- { 0x2A, 275, 0, 10, "ees659ep1" }, /* 274 */
- { 0x2B, 276, 0, 10, "ees761ep1" }, /* 275 */
- { 0x2C, 277, 0, 10, "ees1087ep1" }, /* 276 */
- { 0x2D, 278, 0, 10, "ees1499ep1" }, /* 277 */
- { 0x2E, 279, 0, 10, "ees401ep2" }, /* 278 */
- { 0x2F, 280, 0, 10, "ees439ep1" }, /* 279 */
- { 0x30, 281, 0, 10, "ees593ep1" }, /* 280 */
- { 0x31, 0, 0, 10, "ees743ep1" }, /* 281 */
- { 0x03, 0, 0, 9, "eess1-encodingMethods" }, /* 282 */
- { 0x05, 0, 1, 3, "security" }, /* 283 */
- { 0x05, 0, 1, 4, "mechanisms" }, /* 284 */
- { 0x07, 329, 1, 5, "id-pkix" }, /* 285 */
- { 0x01, 290, 1, 6, "id-pe" }, /* 286 */
- { 0x01, 288, 0, 7, "authorityInfoAccess" }, /* 287 */
- { 0x03, 289, 0, 7, "qcStatements" }, /* 288 */
- { 0x07, 0, 0, 7, "ipAddrBlocks" }, /* 289 */
- { 0x02, 293, 1, 6, "id-qt" }, /* 290 */
- { 0x01, 292, 0, 7, "cps" }, /* 291 */
- { 0x02, 0, 0, 7, "unotice" }, /* 292 */
- { 0x03, 303, 1, 6, "id-kp" }, /* 293 */
- { 0x01, 295, 0, 7, "serverAuth" }, /* 294 */
- { 0x02, 296, 0, 7, "clientAuth" }, /* 295 */
- { 0x03, 297, 0, 7, "codeSigning" }, /* 296 */
- { 0x04, 298, 0, 7, "emailProtection" }, /* 297 */
- { 0x05, 299, 0, 7, "ipsecEndSystem" }, /* 298 */
- { 0x06, 300, 0, 7, "ipsecTunnel" }, /* 299 */
- { 0x07, 301, 0, 7, "ipsecUser" }, /* 300 */
- { 0x08, 302, 0, 7, "timeStamping" }, /* 301 */
- { 0x09, 0, 0, 7, "ocspSigning" }, /* 302 */
- { 0x08, 311, 1, 6, "id-otherNames" }, /* 303 */
- { 0x01, 305, 0, 7, "personalData" }, /* 304 */
- { 0x02, 306, 0, 7, "userGroup" }, /* 305 */
- { 0x03, 307, 0, 7, "id-on-permanentIdentifier" }, /* 306 */
- { 0x04, 308, 0, 7, "id-on-hardwareModuleName" }, /* 307 */
- { 0x05, 309, 0, 7, "xmppAddr" }, /* 308 */
- { 0x06, 310, 0, 7, "id-on-SIM" }, /* 309 */
- { 0x07, 0, 0, 7, "id-on-dnsSRV" }, /* 310 */
- { 0x0A, 316, 1, 6, "id-aca" }, /* 311 */
- { 0x01, 313, 0, 7, "authenticationInfo" }, /* 312 */
- { 0x02, 314, 0, 7, "accessIdentity" }, /* 313 */
- { 0x03, 315, 0, 7, "chargingIdentity" }, /* 314 */
- { 0x04, 0, 0, 7, "group" }, /* 315 */
- { 0x0B, 317, 0, 6, "subjectInfoAccess" }, /* 316 */
- { 0x30, 0, 1, 6, "id-ad" }, /* 317 */
- { 0x01, 326, 1, 7, "ocsp" }, /* 318 */
- { 0x01, 320, 0, 8, "basic" }, /* 319 */
- { 0x02, 321, 0, 8, "nonce" }, /* 320 */
- { 0x03, 322, 0, 8, "crl" }, /* 321 */
- { 0x04, 323, 0, 8, "response" }, /* 322 */
- { 0x05, 324, 0, 8, "noCheck" }, /* 323 */
- { 0x06, 325, 0, 8, "archiveCutoff" }, /* 324 */
- { 0x07, 0, 0, 8, "serviceLocator" }, /* 325 */
- { 0x02, 327, 0, 7, "caIssuers" }, /* 326 */
- { 0x03, 328, 0, 7, "timeStamping" }, /* 327 */
- { 0x05, 0, 0, 7, "caRepository" }, /* 328 */
- { 0x08, 0, 1, 5, "ipsec" }, /* 329 */
- { 0x02, 0, 1, 6, "certificate" }, /* 330 */
- { 0x02, 0, 0, 7, "iKEIntermediate" }, /* 331 */
- { 0x0E, 338, 1, 1, "oiw" }, /* 332 */
- { 0x03, 0, 1, 2, "secsig" }, /* 333 */
- { 0x02, 0, 1, 3, "algorithms" }, /* 334 */
- { 0x07, 336, 0, 4, "des-cbc" }, /* 335 */
- { 0x1A, 337, 0, 4, "sha-1" }, /* 336 */
- { 0x1D, 0, 0, 4, "sha-1WithRSASignature" }, /* 337 */
- { 0x24, 384, 1, 1, "TeleTrusT" }, /* 338 */
- { 0x03, 0, 1, 2, "algorithm" }, /* 339 */
- { 0x03, 0, 1, 3, "signatureAlgorithm" }, /* 340 */
- { 0x01, 345, 1, 4, "rsaSignature" }, /* 341 */
- { 0x02, 343, 0, 5, "rsaSigWithripemd160" }, /* 342 */
- { 0x03, 344, 0, 5, "rsaSigWithripemd128" }, /* 343 */
- { 0x04, 0, 0, 5, "rsaSigWithripemd256" }, /* 344 */
- { 0x02, 0, 1, 4, "ecSign" }, /* 345 */
- { 0x01, 347, 0, 5, "ecSignWithsha1" }, /* 346 */
- { 0x02, 348, 0, 5, "ecSignWithripemd160" }, /* 347 */
- { 0x03, 349, 0, 5, "ecSignWithmd2" }, /* 348 */
- { 0x04, 350, 0, 5, "ecSignWithmd5" }, /* 349 */
- { 0x05, 367, 1, 5, "ttt-ecg" }, /* 350 */
- { 0x01, 355, 1, 6, "fieldType" }, /* 351 */
- { 0x01, 0, 1, 7, "characteristictwoField" }, /* 352 */
- { 0x01, 0, 1, 8, "basisType" }, /* 353 */
- { 0x01, 0, 0, 9, "ipBasis" }, /* 354 */
- { 0x02, 357, 1, 6, "keyType" }, /* 355 */
- { 0x01, 0, 0, 7, "ecgPublicKey" }, /* 356 */
- { 0x03, 358, 0, 6, "curve" }, /* 357 */
- { 0x04, 365, 1, 6, "signatures" }, /* 358 */
- { 0x01, 360, 0, 7, "ecgdsa-with-RIPEMD160" }, /* 359 */
- { 0x02, 361, 0, 7, "ecgdsa-with-SHA1" }, /* 360 */
- { 0x03, 362, 0, 7, "ecgdsa-with-SHA224" }, /* 361 */
- { 0x04, 363, 0, 7, "ecgdsa-with-SHA256" }, /* 362 */
- { 0x05, 364, 0, 7, "ecgdsa-with-SHA384" }, /* 363 */
- { 0x06, 0, 0, 7, "ecgdsa-with-SHA512" }, /* 364 */
- { 0x05, 0, 1, 6, "module" }, /* 365 */
- { 0x01, 0, 0, 7, "1" }, /* 366 */
- { 0x08, 0, 1, 5, "ecStdCurvesAndGeneration" }, /* 367 */
- { 0x01, 0, 1, 6, "ellipticCurve" }, /* 368 */
- { 0x01, 0, 1, 7, "versionOne" }, /* 369 */
- { 0x01, 371, 0, 8, "brainpoolP160r1" }, /* 370 */
- { 0x02, 372, 0, 8, "brainpoolP160t1" }, /* 371 */
- { 0x03, 373, 0, 8, "brainpoolP192r1" }, /* 372 */
- { 0x04, 374, 0, 8, "brainpoolP192t1" }, /* 373 */
- { 0x05, 375, 0, 8, "brainpoolP224r1" }, /* 374 */
- { 0x06, 376, 0, 8, "brainpoolP224t1" }, /* 375 */
- { 0x07, 377, 0, 8, "brainpoolP256r1" }, /* 376 */
- { 0x08, 378, 0, 8, "brainpoolP256t1" }, /* 377 */
- { 0x09, 379, 0, 8, "brainpoolP320r1" }, /* 378 */
- { 0x0A, 380, 0, 8, "brainpoolP320t1" }, /* 379 */
- { 0x0B, 381, 0, 8, "brainpoolP384r1" }, /* 380 */
- { 0x0C, 382, 0, 8, "brainpoolP384t1" }, /* 381 */
- { 0x0D, 383, 0, 8, "brainpoolP512r1" }, /* 382 */
- { 0x0E, 0, 0, 8, "brainpoolP512t1" }, /* 383 */
- { 0x65, 387, 1, 1, "Thawte" }, /* 384 */
- { 0x70, 386, 0, 2, "id-Ed25519" }, /* 385 */
- { 0x71, 0, 0, 2, "id-Ed448" }, /* 386 */
- { 0x81, 0, 1, 1, "" }, /* 387 */
- { 0x04, 0, 1, 2, "Certicom" }, /* 388 */
- { 0x00, 0, 1, 3, "curve" }, /* 389 */
- { 0x01, 391, 0, 4, "sect163k1" }, /* 390 */
- { 0x02, 392, 0, 4, "sect163r1" }, /* 391 */
- { 0x03, 393, 0, 4, "sect239k1" }, /* 392 */
- { 0x04, 394, 0, 4, "sect113r1" }, /* 393 */
- { 0x05, 395, 0, 4, "sect113r2" }, /* 394 */
- { 0x06, 396, 0, 4, "secp112r1" }, /* 395 */
- { 0x07, 397, 0, 4, "secp112r2" }, /* 396 */
- { 0x08, 398, 0, 4, "secp160r1" }, /* 397 */
- { 0x09, 399, 0, 4, "secp160k1" }, /* 398 */
- { 0x0A, 400, 0, 4, "secp256k1" }, /* 399 */
- { 0x0F, 401, 0, 4, "sect163r2" }, /* 400 */
- { 0x10, 402, 0, 4, "sect283k1" }, /* 401 */
- { 0x11, 403, 0, 4, "sect283r1" }, /* 402 */
- { 0x16, 404, 0, 4, "sect131r1" }, /* 403 */
- { 0x17, 405, 0, 4, "sect131r2" }, /* 404 */
- { 0x18, 406, 0, 4, "sect193r1" }, /* 405 */
- { 0x19, 407, 0, 4, "sect193r2" }, /* 406 */
- { 0x1A, 408, 0, 4, "sect233k1" }, /* 407 */
- { 0x1B, 409, 0, 4, "sect233r1" }, /* 408 */
- { 0x1C, 410, 0, 4, "secp128r1" }, /* 409 */
- { 0x1D, 411, 0, 4, "secp128r2" }, /* 410 */
- { 0x1E, 412, 0, 4, "secp160r2" }, /* 411 */
- { 0x1F, 413, 0, 4, "secp192k1" }, /* 412 */
- { 0x20, 414, 0, 4, "secp224k1" }, /* 413 */
- { 0x21, 415, 0, 4, "secp224r1" }, /* 414 */
- { 0x22, 416, 0, 4, "secp384r1" }, /* 415 */
- { 0x23, 417, 0, 4, "secp521r1" }, /* 416 */
- { 0x24, 418, 0, 4, "sect409k1" }, /* 417 */
- { 0x25, 419, 0, 4, "sect409r1" }, /* 418 */
- { 0x26, 420, 0, 4, "sect571k1" }, /* 419 */
- { 0x27, 0, 0, 4, "sect571r1" }, /* 420 */
- {0x60, 484, 1, 0, "" }, /* 421 */
- { 0x86, 0, 1, 1, "" }, /* 422 */
- { 0x48, 0, 1, 2, "" }, /* 423 */
- { 0x01, 0, 1, 3, "organization" }, /* 424 */
- { 0x65, 460, 1, 4, "gov" }, /* 425 */
- { 0x03, 0, 1, 5, "csor" }, /* 426 */
- { 0x04, 0, 1, 6, "nistalgorithm" }, /* 427 */
- { 0x01, 438, 1, 7, "aes" }, /* 428 */
- { 0x02, 430, 0, 8, "id-aes128-CBC" }, /* 429 */
- { 0x06, 431, 0, 8, "id-aes128-GCM" }, /* 430 */
- { 0x07, 432, 0, 8, "id-aes128-CCM" }, /* 431 */
- { 0x16, 433, 0, 8, "id-aes192-CBC" }, /* 432 */
- { 0x1A, 434, 0, 8, "id-aes192-GCM" }, /* 433 */
- { 0x1B, 435, 0, 8, "id-aes192-CCM" }, /* 434 */
- { 0x2A, 436, 0, 8, "id-aes256-CBC" }, /* 435 */
- { 0x2E, 437, 0, 8, "id-aes256-GCM" }, /* 436 */
- { 0x2F, 0, 0, 8, "id-aes256-CCM" }, /* 437 */
- { 0x02, 451, 1, 7, "hashAlgs" }, /* 438 */
- { 0x01, 440, 0, 8, "id-sha256" }, /* 439 */
- { 0x02, 441, 0, 8, "id-sha384" }, /* 440 */
- { 0x03, 442, 0, 8, "id-sha512" }, /* 441 */
- { 0x04, 443, 0, 8, "id-sha224" }, /* 442 */
- { 0x05, 444, 0, 8, "id-sha512-224" }, /* 443 */
- { 0x06, 445, 0, 8, "id-sha512-256" }, /* 444 */
- { 0x07, 446, 0, 8, "id-sha3-224" }, /* 445 */
- { 0x08, 447, 0, 8, "id-sha3-256" }, /* 446 */
- { 0x09, 448, 0, 8, "id-sha3-384" }, /* 447 */
- { 0x0A, 449, 0, 8, "id-sha3-512" }, /* 448 */
- { 0x0B, 450, 0, 8, "id-shake128" }, /* 449 */
- { 0x0C, 0, 0, 8, "id-shake256" }, /* 450 */
- { 0x03, 0, 1, 7, "sigAlgs" }, /* 451 */
- { 0x09, 453, 0, 8, "id-ecdsa-with-sha3-224" }, /* 452 */
- { 0x0A, 454, 0, 8, "id-ecdsa-with-sha3-256" }, /* 453 */
- { 0x0B, 455, 0, 8, "id-ecdsa-with-sha3-384" }, /* 454 */
- { 0x0C, 456, 0, 8, "id-ecdsa-with-sha3-512" }, /* 455 */
- { 0x0D, 457, 0, 8, "id-rsassa-pkcs1v15-with-sha3-224"}, /* 456 */
- { 0x0E, 458, 0, 8, "id-rsassa-pkcs1v15-with-sha3-256"}, /* 457 */
- { 0x0F, 459, 0, 8, "id-rsassa-pkcs1v15-with-sha3-384"}, /* 458 */
- { 0x10, 0, 0, 8, "id-rsassa-pkcs1v15-with-sha3-512"}, /* 459 */
- { 0x86, 0, 1, 4, "" }, /* 460 */
- { 0xf8, 0, 1, 5, "" }, /* 461 */
- { 0x42, 474, 1, 6, "netscape" }, /* 462 */
- { 0x01, 469, 1, 7, "" }, /* 463 */
- { 0x01, 465, 0, 8, "nsCertType" }, /* 464 */
- { 0x03, 466, 0, 8, "nsRevocationUrl" }, /* 465 */
- { 0x04, 467, 0, 8, "nsCaRevocationUrl" }, /* 466 */
- { 0x08, 468, 0, 8, "nsCaPolicyUrl" }, /* 467 */
- { 0x0d, 0, 0, 8, "nsComment" }, /* 468 */
- { 0x03, 472, 1, 7, "directory" }, /* 469 */
- { 0x01, 0, 1, 8, "" }, /* 470 */
- { 0x03, 0, 0, 9, "employeeNumber" }, /* 471 */
- { 0x04, 0, 1, 7, "policy" }, /* 472 */
- { 0x01, 0, 0, 8, "nsSGC" }, /* 473 */
- { 0x45, 0, 1, 6, "verisign" }, /* 474 */
- { 0x01, 0, 1, 7, "pki" }, /* 475 */
- { 0x09, 0, 1, 8, "attributes" }, /* 476 */
- { 0x02, 478, 0, 9, "messageType" }, /* 477 */
- { 0x03, 479, 0, 9, "pkiStatus" }, /* 478 */
- { 0x04, 480, 0, 9, "failInfo" }, /* 479 */
- { 0x05, 481, 0, 9, "senderNonce" }, /* 480 */
- { 0x06, 482, 0, 9, "recipientNonce" }, /* 481 */
- { 0x07, 483, 0, 9, "transID" }, /* 482 */
- { 0x08, 0, 0, 9, "extensionReq" }, /* 483 */
- {0x67, 0, 1, 0, "" }, /* 484 */
- { 0x81, 0, 1, 1, "" }, /* 485 */
- { 0x05, 0, 1, 2, "" }, /* 486 */
- { 0x02, 0, 1, 3, "tcg-attribute" }, /* 487 */
- { 0x01, 489, 0, 4, "tcg-at-tpmManufacturer" }, /* 488 */
- { 0x02, 490, 0, 4, "tcg-at-tpmModel" }, /* 489 */
- { 0x03, 491, 0, 4, "tcg-at-tpmVersion" }, /* 490 */
- { 0x0F, 0, 0, 4, "tcg-at-tpmIdLabel" } /* 491 */
+ { 0x09, 27, 0, 2, "STREET" }, /* 26 */
+ { 0x0A, 28, 0, 2, "O" }, /* 27 */
+ { 0x0B, 29, 0, 2, "OU" }, /* 28 */
+ { 0x0C, 30, 0, 2, "T" }, /* 29 */
+ { 0x0D, 31, 0, 2, "D" }, /* 30 */
+ { 0x10, 32, 0, 2, "postalAddress" }, /* 31 */
+ { 0x11, 33, 0, 2, "postalCode" }, /* 32 */
+ { 0x24, 34, 0, 2, "userCertificate" }, /* 33 */
+ { 0x29, 35, 0, 2, "N" }, /* 34 */
+ { 0x2A, 36, 0, 2, "G" }, /* 35 */
+ { 0x2B, 37, 0, 2, "I" }, /* 36 */
+ { 0x2D, 38, 0, 2, "ID" }, /* 37 */
+ { 0x2E, 39, 0, 2, "dnQualifier" }, /* 38 */
+ { 0x36, 40, 0, 2, "dmdName" }, /* 39 */
+ { 0x41, 41, 0, 2, "pseudonym" }, /* 40 */
+ { 0x48, 0, 0, 2, "role" }, /* 41 */
+ { 0x1D, 0, 1, 1, "id-ce" }, /* 42 */
+ { 0x09, 44, 0, 2, "subjectDirectoryAttrs" }, /* 43 */
+ { 0x0E, 45, 0, 2, "subjectKeyIdentifier" }, /* 44 */
+ { 0x0F, 46, 0, 2, "keyUsage" }, /* 45 */
+ { 0x10, 47, 0, 2, "privateKeyUsagePeriod" }, /* 46 */
+ { 0x11, 48, 0, 2, "subjectAltName" }, /* 47 */
+ { 0x12, 49, 0, 2, "issuerAltName" }, /* 48 */
+ { 0x13, 50, 0, 2, "basicConstraints" }, /* 49 */
+ { 0x14, 51, 0, 2, "crlNumber" }, /* 50 */
+ { 0x15, 52, 0, 2, "reasonCode" }, /* 51 */
+ { 0x17, 53, 0, 2, "holdInstructionCode" }, /* 52 */
+ { 0x18, 54, 0, 2, "invalidityDate" }, /* 53 */
+ { 0x1B, 55, 0, 2, "deltaCrlIndicator" }, /* 54 */
+ { 0x1C, 56, 0, 2, "issuingDistributionPoint" }, /* 55 */
+ { 0x1D, 57, 0, 2, "certificateIssuer" }, /* 56 */
+ { 0x1E, 58, 0, 2, "nameConstraints" }, /* 57 */
+ { 0x1F, 59, 0, 2, "crlDistributionPoints" }, /* 58 */
+ { 0x20, 61, 1, 2, "certificatePolicies" }, /* 59 */
+ { 0x00, 0, 0, 3, "anyPolicy" }, /* 60 */
+ { 0x21, 62, 0, 2, "policyMappings" }, /* 61 */
+ { 0x23, 63, 0, 2, "authorityKeyIdentifier" }, /* 62 */
+ { 0x24, 64, 0, 2, "policyConstraints" }, /* 63 */
+ { 0x25, 66, 1, 2, "extendedKeyUsage" }, /* 64 */
+ { 0x00, 0, 0, 3, "anyExtendedKeyUsage" }, /* 65 */
+ { 0x2E, 67, 0, 2, "freshestCRL" }, /* 66 */
+ { 0x36, 68, 0, 2, "inhibitAnyPolicy" }, /* 67 */
+ { 0x37, 69, 0, 2, "targetInformation" }, /* 68 */
+ { 0x38, 0, 0, 2, "noRevAvail" }, /* 69 */
+ {0x2A, 195, 1, 0, "" }, /* 70 */
+ { 0x83, 83, 1, 1, "" }, /* 71 */
+ { 0x08, 0, 1, 2, "jp" }, /* 72 */
+ { 0x8C, 0, 1, 3, "" }, /* 73 */
+ { 0x9A, 0, 1, 4, "" }, /* 74 */
+ { 0x4B, 0, 1, 5, "" }, /* 75 */
+ { 0x3D, 0, 1, 6, "" }, /* 76 */
+ { 0x01, 0, 1, 7, "security" }, /* 77 */
+ { 0x01, 0, 1, 8, "algorithm" }, /* 78 */
+ { 0x01, 0, 1, 9, "symm-encryption-alg" }, /* 79 */
+ { 0x02, 81, 0, 10, "camellia128-cbc" }, /* 80 */
+ { 0x03, 82, 0, 10, "camellia192-cbc" }, /* 81 */
+ { 0x04, 0, 0, 10, "camellia256-cbc" }, /* 82 */
+ { 0x86, 0, 1, 1, "" }, /* 83 */
+ { 0x48, 0, 1, 2, "us" }, /* 84 */
+ { 0x86, 154, 1, 3, "" }, /* 85 */
+ { 0xF6, 91, 1, 4, "" }, /* 86 */
+ { 0x7D, 0, 1, 5, "NortelNetworks" }, /* 87 */
+ { 0x07, 0, 1, 6, "Entrust" }, /* 88 */
+ { 0x41, 0, 1, 7, "nsn-ce" }, /* 89 */
+ { 0x00, 0, 0, 8, "entrustVersInfo" }, /* 90 */
+ { 0xF7, 0, 1, 4, "" }, /* 91 */
+ { 0x0D, 0, 1, 5, "RSADSI" }, /* 92 */
+ { 0x01, 149, 1, 6, "PKCS" }, /* 93 */
+ { 0x01, 107, 1, 7, "PKCS-1" }, /* 94 */
+ { 0x01, 96, 0, 8, "rsaEncryption" }, /* 95 */
+ { 0x02, 97, 0, 8, "md2WithRSAEncryption" }, /* 96 */
+ { 0x04, 98, 0, 8, "md5WithRSAEncryption" }, /* 97 */
+ { 0x05, 99, 0, 8, "sha-1WithRSAEncryption" }, /* 98 */
+ { 0x07, 100, 0, 8, "id-RSAES-OAEP" }, /* 99 */
+ { 0x08, 101, 0, 8, "id-mgf1" }, /* 100 */
+ { 0x09, 102, 0, 8, "id-pSpecified" }, /* 101 */
+ { 0x0A, 103, 0, 8, "RSASSA-PSS" }, /* 102 */
+ { 0x0B, 104, 0, 8, "sha256WithRSAEncryption" }, /* 103 */
+ { 0x0C, 105, 0, 8, "sha384WithRSAEncryption" }, /* 104 */
+ { 0x0D, 106, 0, 8, "sha512WithRSAEncryption" }, /* 105 */
+ { 0x0E, 0, 0, 8, "sha224WithRSAEncryption" }, /* 106 */
+ { 0x05, 112, 1, 7, "PKCS-5" }, /* 107 */
+ { 0x03, 109, 0, 8, "pbeWithMD5AndDES-CBC" }, /* 108 */
+ { 0x0A, 110, 0, 8, "pbeWithSHA1AndDES-CBC" }, /* 109 */
+ { 0x0C, 111, 0, 8, "id-PBKDF2" }, /* 110 */
+ { 0x0D, 0, 0, 8, "id-PBES2" }, /* 111 */
+ { 0x07, 119, 1, 7, "PKCS-7" }, /* 112 */
+ { 0x01, 114, 0, 8, "data" }, /* 113 */
+ { 0x02, 115, 0, 8, "signedData" }, /* 114 */
+ { 0x03, 116, 0, 8, "envelopedData" }, /* 115 */
+ { 0x04, 117, 0, 8, "signedAndEnvelopedData" }, /* 116 */
+ { 0x05, 118, 0, 8, "digestedData" }, /* 117 */
+ { 0x06, 0, 0, 8, "encryptedData" }, /* 118 */
+ { 0x09, 133, 1, 7, "PKCS-9" }, /* 119 */
+ { 0x01, 121, 0, 8, "E" }, /* 120 */
+ { 0x02, 122, 0, 8, "unstructuredName" }, /* 121 */
+ { 0x03, 123, 0, 8, "contentType" }, /* 122 */
+ { 0x04, 124, 0, 8, "messageDigest" }, /* 123 */
+ { 0x05, 125, 0, 8, "signingTime" }, /* 124 */
+ { 0x06, 126, 0, 8, "counterSignature" }, /* 125 */
+ { 0x07, 127, 0, 8, "challengePassword" }, /* 126 */
+ { 0x08, 128, 0, 8, "unstructuredAddress" }, /* 127 */
+ { 0x0E, 129, 0, 8, "extensionRequest" }, /* 128 */
+ { 0x0F, 130, 0, 8, "S/MIME Capabilities" }, /* 129 */
+ { 0x16, 0, 1, 8, "certTypes" }, /* 130 */
+ { 0x01, 132, 0, 9, "X.509" }, /* 131 */
+ { 0x02, 0, 0, 9, "SDSI" }, /* 132 */
+ { 0x0c, 0, 1, 7, "PKCS-12" }, /* 133 */
+ { 0x01, 141, 1, 8, "pbeIds" }, /* 134 */
+ { 0x01, 136, 0, 9, "pbeWithSHAAnd128BitRC4" }, /* 135 */
+ { 0x02, 137, 0, 9, "pbeWithSHAAnd40BitRC4" }, /* 136 */
+ { 0x03, 138, 0, 9, "pbeWithSHAAnd3-KeyTripleDES-CBC" }, /* 137 */
+ { 0x04, 139, 0, 9, "pbeWithSHAAnd2-KeyTripleDES-CBC" }, /* 138 */
+ { 0x05, 140, 0, 9, "pbeWithSHAAnd128BitRC2-CBC" }, /* 139 */
+ { 0x06, 0, 0, 9, "pbeWithSHAAnd40BitRC2-CBC" }, /* 140 */
+ { 0x0a, 0, 1, 8, "PKCS-12v1" }, /* 141 */
+ { 0x01, 0, 1, 9, "bagIds" }, /* 142 */
+ { 0x01, 144, 0, 10, "keyBag" }, /* 143 */
+ { 0x02, 145, 0, 10, "pkcs8ShroudedKeyBag" }, /* 144 */
+ { 0x03, 146, 0, 10, "certBag" }, /* 145 */
+ { 0x04, 147, 0, 10, "crlBag" }, /* 146 */
+ { 0x05, 148, 0, 10, "secretBag" }, /* 147 */
+ { 0x06, 0, 0, 10, "safeContentsBag" }, /* 148 */
+ { 0x02, 152, 1, 6, "digestAlgorithm" }, /* 149 */
+ { 0x02, 151, 0, 7, "md2" }, /* 150 */
+ { 0x05, 0, 0, 7, "md5" }, /* 151 */
+ { 0x03, 0, 1, 6, "encryptionAlgorithm" }, /* 152 */
+ { 0x07, 0, 0, 7, "3des-ede-cbc" }, /* 153 */
+ { 0xCE, 0, 1, 3, "" }, /* 154 */
+ { 0x3D, 0, 1, 4, "ansi-X9-62" }, /* 155 */
+ { 0x02, 158, 1, 5, "id-publicKeyType" }, /* 156 */
+ { 0x01, 0, 0, 6, "id-ecPublicKey" }, /* 157 */
+ { 0x03, 188, 1, 5, "ellipticCurve" }, /* 158 */
+ { 0x00, 180, 1, 6, "c-TwoCurve" }, /* 159 */
+ { 0x01, 161, 0, 7, "c2pnb163v1" }, /* 160 */
+ { 0x02, 162, 0, 7, "c2pnb163v2" }, /* 161 */
+ { 0x03, 163, 0, 7, "c2pnb163v3" }, /* 162 */
+ { 0x04, 164, 0, 7, "c2pnb176w1" }, /* 163 */
+ { 0x05, 165, 0, 7, "c2tnb191v1" }, /* 164 */
+ { 0x06, 166, 0, 7, "c2tnb191v2" }, /* 165 */
+ { 0x07, 167, 0, 7, "c2tnb191v3" }, /* 166 */
+ { 0x08, 168, 0, 7, "c2onb191v4" }, /* 167 */
+ { 0x09, 169, 0, 7, "c2onb191v5" }, /* 168 */
+ { 0x0A, 170, 0, 7, "c2pnb208w1" }, /* 169 */
+ { 0x0B, 171, 0, 7, "c2tnb239v1" }, /* 170 */
+ { 0x0C, 172, 0, 7, "c2tnb239v2" }, /* 171 */
+ { 0x0D, 173, 0, 7, "c2tnb239v3" }, /* 172 */
+ { 0x0E, 174, 0, 7, "c2onb239v4" }, /* 173 */
+ { 0x0F, 175, 0, 7, "c2onb239v5" }, /* 174 */
+ { 0x10, 176, 0, 7, "c2pnb272w1" }, /* 175 */
+ { 0x11, 177, 0, 7, "c2pnb304w1" }, /* 176 */
+ { 0x12, 178, 0, 7, "c2tnb359v1" }, /* 177 */
+ { 0x13, 179, 0, 7, "c2pnb368w1" }, /* 178 */
+ { 0x14, 0, 0, 7, "c2tnb431r1" }, /* 179 */
+ { 0x01, 0, 1, 6, "primeCurve" }, /* 180 */
+ { 0x01, 182, 0, 7, "prime192v1" }, /* 181 */
+ { 0x02, 183, 0, 7, "prime192v2" }, /* 182 */
+ { 0x03, 184, 0, 7, "prime192v3" }, /* 183 */
+ { 0x04, 185, 0, 7, "prime239v1" }, /* 184 */
+ { 0x05, 186, 0, 7, "prime239v2" }, /* 185 */
+ { 0x06, 187, 0, 7, "prime239v3" }, /* 186 */
+ { 0x07, 0, 0, 7, "prime256v1" }, /* 187 */
+ { 0x04, 0, 1, 5, "id-ecSigType" }, /* 188 */
+ { 0x01, 190, 0, 6, "ecdsa-with-SHA1" }, /* 189 */
+ { 0x03, 0, 1, 6, "ecdsa-with-Specified" }, /* 190 */
+ { 0x01, 192, 0, 7, "ecdsa-with-SHA224" }, /* 191 */
+ { 0x02, 193, 0, 7, "ecdsa-with-SHA256" }, /* 192 */
+ { 0x03, 194, 0, 7, "ecdsa-with-SHA384" }, /* 193 */
+ { 0x04, 0, 0, 7, "ecdsa-with-SHA512" }, /* 194 */
+ {0x2B, 425, 1, 0, "" }, /* 195 */
+ { 0x06, 336, 1, 1, "dod" }, /* 196 */
+ { 0x01, 0, 1, 2, "internet" }, /* 197 */
+ { 0x04, 287, 1, 3, "private" }, /* 198 */
+ { 0x01, 0, 1, 4, "enterprise" }, /* 199 */
+ { 0x82, 237, 1, 5, "" }, /* 200 */
+ { 0x37, 213, 1, 6, "Microsoft" }, /* 201 */
+ { 0x0A, 206, 1, 7, "" }, /* 202 */
+ { 0x03, 0, 1, 8, "" }, /* 203 */
+ { 0x03, 205, 0, 9, "msSGC" }, /* 204 */
+ { 0x04, 0, 0, 9, "msEncryptingFileSystem" }, /* 205 */
+ { 0x14, 210, 1, 7, "msEnrollmentInfrastructure" }, /* 206 */
+ { 0x02, 0, 1, 8, "msCertificateTypeExtension" }, /* 207 */
+ { 0x02, 209, 0, 9, "msSmartcardLogon" }, /* 208 */
+ { 0x03, 0, 0, 9, "msUPN" }, /* 209 */
+ { 0x15, 0, 1, 7, "msCertSrvInfrastructure" }, /* 210 */
+ { 0x07, 212, 0, 8, "msCertTemplate" }, /* 211 */
+ { 0x0A, 0, 0, 8, "msApplicationCertPolicies" }, /* 212 */
+ { 0xA0, 0, 1, 6, "" }, /* 213 */
+ { 0x2A, 0, 1, 7, "ITA" }, /* 214 */
+ { 0x01, 216, 0, 8, "strongSwan" }, /* 215 */
+ { 0x02, 217, 0, 8, "cps" }, /* 216 */
+ { 0x03, 218, 0, 8, "e-voting" }, /* 217 */
+ { 0x05, 0, 1, 8, "BLISS" }, /* 218 */
+ { 0x01, 221, 1, 9, "keyType" }, /* 219 */
+ { 0x01, 0, 0, 10, "blissPublicKey" }, /* 220 */
+ { 0x02, 230, 1, 9, "parameters" }, /* 221 */
+ { 0x01, 223, 0, 10, "BLISS-I" }, /* 222 */
+ { 0x02, 224, 0, 10, "BLISS-II" }, /* 223 */
+ { 0x03, 225, 0, 10, "BLISS-III" }, /* 224 */
+ { 0x04, 226, 0, 10, "BLISS-IV" }, /* 225 */
+ { 0x05, 227, 0, 10, "BLISS-B-I" }, /* 226 */
+ { 0x06, 228, 0, 10, "BLISS-B-II" }, /* 227 */
+ { 0x07, 229, 0, 10, "BLISS-B-III" }, /* 228 */
+ { 0x08, 0, 0, 10, "BLISS-B-IV" }, /* 229 */
+ { 0x03, 0, 1, 9, "blissSigType" }, /* 230 */
+ { 0x01, 232, 0, 10, "BLISS-with-SHA2-512" }, /* 231 */
+ { 0x02, 233, 0, 10, "BLISS-with-SHA2-384" }, /* 232 */
+ { 0x03, 234, 0, 10, "BLISS-with-SHA2-256" }, /* 233 */
+ { 0x04, 235, 0, 10, "BLISS-with-SHA3-512" }, /* 234 */
+ { 0x05, 236, 0, 10, "BLISS-with-SHA3-384" }, /* 235 */
+ { 0x06, 0, 0, 10, "BLISS-with-SHA3-256" }, /* 236 */
+ { 0x89, 244, 1, 5, "" }, /* 237 */
+ { 0x31, 0, 1, 6, "" }, /* 238 */
+ { 0x01, 0, 1, 7, "" }, /* 239 */
+ { 0x01, 0, 1, 8, "" }, /* 240 */
+ { 0x02, 0, 1, 9, "" }, /* 241 */
+ { 0x02, 0, 1, 10, "" }, /* 242 */
+ { 0x4B, 0, 0, 11, "TCGID" }, /* 243 */
+ { 0x97, 248, 1, 5, "" }, /* 244 */
+ { 0x55, 0, 1, 6, "" }, /* 245 */
+ { 0x01, 0, 1, 7, "" }, /* 246 */
+ { 0x02, 0, 0, 8, "blowfish-cbc" }, /* 247 */
+ { 0xC1, 0, 1, 5, "" }, /* 248 */
+ { 0x16, 0, 1, 6, "ntruCryptosystems" }, /* 249 */
+ { 0x01, 0, 1, 7, "eess" }, /* 250 */
+ { 0x01, 0, 1, 8, "eess1" }, /* 251 */
+ { 0x01, 256, 1, 9, "eess1-algs" }, /* 252 */
+ { 0x01, 254, 0, 10, "ntru-EESS1v1-SVES" }, /* 253 */
+ { 0x02, 255, 0, 10, "ntru-EESS1v1-SVSSA" }, /* 254 */
+ { 0x03, 0, 0, 10, "ntru-EESS1v1-NTRUSign" }, /* 255 */
+ { 0x02, 286, 1, 9, "eess1-params" }, /* 256 */
+ { 0x01, 258, 0, 10, "ees251ep1" }, /* 257 */
+ { 0x02, 259, 0, 10, "ees347ep1" }, /* 258 */
+ { 0x03, 260, 0, 10, "ees503ep1" }, /* 259 */
+ { 0x07, 261, 0, 10, "ees251sp2" }, /* 260 */
+ { 0x0C, 262, 0, 10, "ees251ep4" }, /* 261 */
+ { 0x0D, 263, 0, 10, "ees251ep5" }, /* 262 */
+ { 0x0E, 264, 0, 10, "ees251sp3" }, /* 263 */
+ { 0x0F, 265, 0, 10, "ees251sp4" }, /* 264 */
+ { 0x10, 266, 0, 10, "ees251sp5" }, /* 265 */
+ { 0x11, 267, 0, 10, "ees251sp6" }, /* 266 */
+ { 0x12, 268, 0, 10, "ees251sp7" }, /* 267 */
+ { 0x13, 269, 0, 10, "ees251sp8" }, /* 268 */
+ { 0x14, 270, 0, 10, "ees251sp9" }, /* 269 */
+ { 0x22, 271, 0, 10, "ees401ep1" }, /* 270 */
+ { 0x23, 272, 0, 10, "ees449ep1" }, /* 271 */
+ { 0x24, 273, 0, 10, "ees677ep1" }, /* 272 */
+ { 0x25, 274, 0, 10, "ees1087ep2" }, /* 273 */
+ { 0x26, 275, 0, 10, "ees541ep1" }, /* 274 */
+ { 0x27, 276, 0, 10, "ees613ep1" }, /* 275 */
+ { 0x28, 277, 0, 10, "ees887ep1" }, /* 276 */
+ { 0x29, 278, 0, 10, "ees1171ep1" }, /* 277 */
+ { 0x2A, 279, 0, 10, "ees659ep1" }, /* 278 */
+ { 0x2B, 280, 0, 10, "ees761ep1" }, /* 279 */
+ { 0x2C, 281, 0, 10, "ees1087ep1" }, /* 280 */
+ { 0x2D, 282, 0, 10, "ees1499ep1" }, /* 281 */
+ { 0x2E, 283, 0, 10, "ees401ep2" }, /* 282 */
+ { 0x2F, 284, 0, 10, "ees439ep1" }, /* 283 */
+ { 0x30, 285, 0, 10, "ees593ep1" }, /* 284 */
+ { 0x31, 0, 0, 10, "ees743ep1" }, /* 285 */
+ { 0x03, 0, 0, 9, "eess1-encodingMethods" }, /* 286 */
+ { 0x05, 0, 1, 3, "security" }, /* 287 */
+ { 0x05, 0, 1, 4, "mechanisms" }, /* 288 */
+ { 0x07, 333, 1, 5, "id-pkix" }, /* 289 */
+ { 0x01, 294, 1, 6, "id-pe" }, /* 290 */
+ { 0x01, 292, 0, 7, "authorityInfoAccess" }, /* 291 */
+ { 0x03, 293, 0, 7, "qcStatements" }, /* 292 */
+ { 0x07, 0, 0, 7, "ipAddrBlocks" }, /* 293 */
+ { 0x02, 297, 1, 6, "id-qt" }, /* 294 */
+ { 0x01, 296, 0, 7, "cps" }, /* 295 */
+ { 0x02, 0, 0, 7, "unotice" }, /* 296 */
+ { 0x03, 307, 1, 6, "id-kp" }, /* 297 */
+ { 0x01, 299, 0, 7, "serverAuth" }, /* 298 */
+ { 0x02, 300, 0, 7, "clientAuth" }, /* 299 */
+ { 0x03, 301, 0, 7, "codeSigning" }, /* 300 */
+ { 0x04, 302, 0, 7, "emailProtection" }, /* 301 */
+ { 0x05, 303, 0, 7, "ipsecEndSystem" }, /* 302 */
+ { 0x06, 304, 0, 7, "ipsecTunnel" }, /* 303 */
+ { 0x07, 305, 0, 7, "ipsecUser" }, /* 304 */
+ { 0x08, 306, 0, 7, "timeStamping" }, /* 305 */
+ { 0x09, 0, 0, 7, "ocspSigning" }, /* 306 */
+ { 0x08, 315, 1, 6, "id-otherNames" }, /* 307 */
+ { 0x01, 309, 0, 7, "personalData" }, /* 308 */
+ { 0x02, 310, 0, 7, "userGroup" }, /* 309 */
+ { 0x03, 311, 0, 7, "id-on-permanentIdentifier" }, /* 310 */
+ { 0x04, 312, 0, 7, "id-on-hardwareModuleName" }, /* 311 */
+ { 0x05, 313, 0, 7, "xmppAddr" }, /* 312 */
+ { 0x06, 314, 0, 7, "id-on-SIM" }, /* 313 */
+ { 0x07, 0, 0, 7, "id-on-dnsSRV" }, /* 314 */
+ { 0x0A, 320, 1, 6, "id-aca" }, /* 315 */
+ { 0x01, 317, 0, 7, "authenticationInfo" }, /* 316 */
+ { 0x02, 318, 0, 7, "accessIdentity" }, /* 317 */
+ { 0x03, 319, 0, 7, "chargingIdentity" }, /* 318 */
+ { 0x04, 0, 0, 7, "group" }, /* 319 */
+ { 0x0B, 321, 0, 6, "subjectInfoAccess" }, /* 320 */
+ { 0x30, 0, 1, 6, "id-ad" }, /* 321 */
+ { 0x01, 330, 1, 7, "ocsp" }, /* 322 */
+ { 0x01, 324, 0, 8, "basic" }, /* 323 */
+ { 0x02, 325, 0, 8, "nonce" }, /* 324 */
+ { 0x03, 326, 0, 8, "crl" }, /* 325 */
+ { 0x04, 327, 0, 8, "response" }, /* 326 */
+ { 0x05, 328, 0, 8, "noCheck" }, /* 327 */
+ { 0x06, 329, 0, 8, "archiveCutoff" }, /* 328 */
+ { 0x07, 0, 0, 8, "serviceLocator" }, /* 329 */
+ { 0x02, 331, 0, 7, "caIssuers" }, /* 330 */
+ { 0x03, 332, 0, 7, "timeStamping" }, /* 331 */
+ { 0x05, 0, 0, 7, "caRepository" }, /* 332 */
+ { 0x08, 0, 1, 5, "ipsec" }, /* 333 */
+ { 0x02, 0, 1, 6, "certificate" }, /* 334 */
+ { 0x02, 0, 0, 7, "iKEIntermediate" }, /* 335 */
+ { 0x0E, 342, 1, 1, "oiw" }, /* 336 */
+ { 0x03, 0, 1, 2, "secsig" }, /* 337 */
+ { 0x02, 0, 1, 3, "algorithms" }, /* 338 */
+ { 0x07, 340, 0, 4, "des-cbc" }, /* 339 */
+ { 0x1A, 341, 0, 4, "sha-1" }, /* 340 */
+ { 0x1D, 0, 0, 4, "sha-1WithRSASignature" }, /* 341 */
+ { 0x24, 388, 1, 1, "TeleTrusT" }, /* 342 */
+ { 0x03, 0, 1, 2, "algorithm" }, /* 343 */
+ { 0x03, 0, 1, 3, "signatureAlgorithm" }, /* 344 */
+ { 0x01, 349, 1, 4, "rsaSignature" }, /* 345 */
+ { 0x02, 347, 0, 5, "rsaSigWithripemd160" }, /* 346 */
+ { 0x03, 348, 0, 5, "rsaSigWithripemd128" }, /* 347 */
+ { 0x04, 0, 0, 5, "rsaSigWithripemd256" }, /* 348 */
+ { 0x02, 0, 1, 4, "ecSign" }, /* 349 */
+ { 0x01, 351, 0, 5, "ecSignWithsha1" }, /* 350 */
+ { 0x02, 352, 0, 5, "ecSignWithripemd160" }, /* 351 */
+ { 0x03, 353, 0, 5, "ecSignWithmd2" }, /* 352 */
+ { 0x04, 354, 0, 5, "ecSignWithmd5" }, /* 353 */
+ { 0x05, 371, 1, 5, "ttt-ecg" }, /* 354 */
+ { 0x01, 359, 1, 6, "fieldType" }, /* 355 */
+ { 0x01, 0, 1, 7, "characteristictwoField" }, /* 356 */
+ { 0x01, 0, 1, 8, "basisType" }, /* 357 */
+ { 0x01, 0, 0, 9, "ipBasis" }, /* 358 */
+ { 0x02, 361, 1, 6, "keyType" }, /* 359 */
+ { 0x01, 0, 0, 7, "ecgPublicKey" }, /* 360 */
+ { 0x03, 362, 0, 6, "curve" }, /* 361 */
+ { 0x04, 369, 1, 6, "signatures" }, /* 362 */
+ { 0x01, 364, 0, 7, "ecgdsa-with-RIPEMD160" }, /* 363 */
+ { 0x02, 365, 0, 7, "ecgdsa-with-SHA1" }, /* 364 */
+ { 0x03, 366, 0, 7, "ecgdsa-with-SHA224" }, /* 365 */
+ { 0x04, 367, 0, 7, "ecgdsa-with-SHA256" }, /* 366 */
+ { 0x05, 368, 0, 7, "ecgdsa-with-SHA384" }, /* 367 */
+ { 0x06, 0, 0, 7, "ecgdsa-with-SHA512" }, /* 368 */
+ { 0x05, 0, 1, 6, "module" }, /* 369 */
+ { 0x01, 0, 0, 7, "1" }, /* 370 */
+ { 0x08, 0, 1, 5, "ecStdCurvesAndGeneration" }, /* 371 */
+ { 0x01, 0, 1, 6, "ellipticCurve" }, /* 372 */
+ { 0x01, 0, 1, 7, "versionOne" }, /* 373 */
+ { 0x01, 375, 0, 8, "brainpoolP160r1" }, /* 374 */
+ { 0x02, 376, 0, 8, "brainpoolP160t1" }, /* 375 */
+ { 0x03, 377, 0, 8, "brainpoolP192r1" }, /* 376 */
+ { 0x04, 378, 0, 8, "brainpoolP192t1" }, /* 377 */
+ { 0x05, 379, 0, 8, "brainpoolP224r1" }, /* 378 */
+ { 0x06, 380, 0, 8, "brainpoolP224t1" }, /* 379 */
+ { 0x07, 381, 0, 8, "brainpoolP256r1" }, /* 380 */
+ { 0x08, 382, 0, 8, "brainpoolP256t1" }, /* 381 */
+ { 0x09, 383, 0, 8, "brainpoolP320r1" }, /* 382 */
+ { 0x0A, 384, 0, 8, "brainpoolP320t1" }, /* 383 */
+ { 0x0B, 385, 0, 8, "brainpoolP384r1" }, /* 384 */
+ { 0x0C, 386, 0, 8, "brainpoolP384t1" }, /* 385 */
+ { 0x0D, 387, 0, 8, "brainpoolP512r1" }, /* 386 */
+ { 0x0E, 0, 0, 8, "brainpoolP512t1" }, /* 387 */
+ { 0x65, 391, 1, 1, "Thawte" }, /* 388 */
+ { 0x70, 390, 0, 2, "id-Ed25519" }, /* 389 */
+ { 0x71, 0, 0, 2, "id-Ed448" }, /* 390 */
+ { 0x81, 0, 1, 1, "" }, /* 391 */
+ { 0x04, 0, 1, 2, "Certicom" }, /* 392 */
+ { 0x00, 0, 1, 3, "curve" }, /* 393 */
+ { 0x01, 395, 0, 4, "sect163k1" }, /* 394 */
+ { 0x02, 396, 0, 4, "sect163r1" }, /* 395 */
+ { 0x03, 397, 0, 4, "sect239k1" }, /* 396 */
+ { 0x04, 398, 0, 4, "sect113r1" }, /* 397 */
+ { 0x05, 399, 0, 4, "sect113r2" }, /* 398 */
+ { 0x06, 400, 0, 4, "secp112r1" }, /* 399 */
+ { 0x07, 401, 0, 4, "secp112r2" }, /* 400 */
+ { 0x08, 402, 0, 4, "secp160r1" }, /* 401 */
+ { 0x09, 403, 0, 4, "secp160k1" }, /* 402 */
+ { 0x0A, 404, 0, 4, "secp256k1" }, /* 403 */
+ { 0x0F, 405, 0, 4, "sect163r2" }, /* 404 */
+ { 0x10, 406, 0, 4, "sect283k1" }, /* 405 */
+ { 0x11, 407, 0, 4, "sect283r1" }, /* 406 */
+ { 0x16, 408, 0, 4, "sect131r1" }, /* 407 */
+ { 0x17, 409, 0, 4, "sect131r2" }, /* 408 */
+ { 0x18, 410, 0, 4, "sect193r1" }, /* 409 */
+ { 0x19, 411, 0, 4, "sect193r2" }, /* 410 */
+ { 0x1A, 412, 0, 4, "sect233k1" }, /* 411 */
+ { 0x1B, 413, 0, 4, "sect233r1" }, /* 412 */
+ { 0x1C, 414, 0, 4, "secp128r1" }, /* 413 */
+ { 0x1D, 415, 0, 4, "secp128r2" }, /* 414 */
+ { 0x1E, 416, 0, 4, "secp160r2" }, /* 415 */
+ { 0x1F, 417, 0, 4, "secp192k1" }, /* 416 */
+ { 0x20, 418, 0, 4, "secp224k1" }, /* 417 */
+ { 0x21, 419, 0, 4, "secp224r1" }, /* 418 */
+ { 0x22, 420, 0, 4, "secp384r1" }, /* 419 */
+ { 0x23, 421, 0, 4, "secp521r1" }, /* 420 */
+ { 0x24, 422, 0, 4, "sect409k1" }, /* 421 */
+ { 0x25, 423, 0, 4, "sect409r1" }, /* 422 */
+ { 0x26, 424, 0, 4, "sect571k1" }, /* 423 */
+ { 0x27, 0, 0, 4, "sect571r1" }, /* 424 */
+ {0x60, 488, 1, 0, "" }, /* 425 */
+ { 0x86, 0, 1, 1, "" }, /* 426 */
+ { 0x48, 0, 1, 2, "" }, /* 427 */
+ { 0x01, 0, 1, 3, "organization" }, /* 428 */
+ { 0x65, 464, 1, 4, "gov" }, /* 429 */
+ { 0x03, 0, 1, 5, "csor" }, /* 430 */
+ { 0x04, 0, 1, 6, "nistalgorithm" }, /* 431 */
+ { 0x01, 442, 1, 7, "aes" }, /* 432 */
+ { 0x02, 434, 0, 8, "id-aes128-CBC" }, /* 433 */
+ { 0x06, 435, 0, 8, "id-aes128-GCM" }, /* 434 */
+ { 0x07, 436, 0, 8, "id-aes128-CCM" }, /* 435 */
+ { 0x16, 437, 0, 8, "id-aes192-CBC" }, /* 436 */
+ { 0x1A, 438, 0, 8, "id-aes192-GCM" }, /* 437 */
+ { 0x1B, 439, 0, 8, "id-aes192-CCM" }, /* 438 */
+ { 0x2A, 440, 0, 8, "id-aes256-CBC" }, /* 439 */
+ { 0x2E, 441, 0, 8, "id-aes256-GCM" }, /* 440 */
+ { 0x2F, 0, 0, 8, "id-aes256-CCM" }, /* 441 */
+ { 0x02, 455, 1, 7, "hashAlgs" }, /* 442 */
+ { 0x01, 444, 0, 8, "id-sha256" }, /* 443 */
+ { 0x02, 445, 0, 8, "id-sha384" }, /* 444 */
+ { 0x03, 446, 0, 8, "id-sha512" }, /* 445 */
+ { 0x04, 447, 0, 8, "id-sha224" }, /* 446 */
+ { 0x05, 448, 0, 8, "id-sha512-224" }, /* 447 */
+ { 0x06, 449, 0, 8, "id-sha512-256" }, /* 448 */
+ { 0x07, 450, 0, 8, "id-sha3-224" }, /* 449 */
+ { 0x08, 451, 0, 8, "id-sha3-256" }, /* 450 */
+ { 0x09, 452, 0, 8, "id-sha3-384" }, /* 451 */
+ { 0x0A, 453, 0, 8, "id-sha3-512" }, /* 452 */
+ { 0x0B, 454, 0, 8, "id-shake128" }, /* 453 */
+ { 0x0C, 0, 0, 8, "id-shake256" }, /* 454 */
+ { 0x03, 0, 1, 7, "sigAlgs" }, /* 455 */
+ { 0x09, 457, 0, 8, "id-ecdsa-with-sha3-224" }, /* 456 */
+ { 0x0A, 458, 0, 8, "id-ecdsa-with-sha3-256" }, /* 457 */
+ { 0x0B, 459, 0, 8, "id-ecdsa-with-sha3-384" }, /* 458 */
+ { 0x0C, 460, 0, 8, "id-ecdsa-with-sha3-512" }, /* 459 */
+ { 0x0D, 461, 0, 8, "id-rsassa-pkcs1v15-with-sha3-224"}, /* 460 */
+ { 0x0E, 462, 0, 8, "id-rsassa-pkcs1v15-with-sha3-256"}, /* 461 */
+ { 0x0F, 463, 0, 8, "id-rsassa-pkcs1v15-with-sha3-384"}, /* 462 */
+ { 0x10, 0, 0, 8, "id-rsassa-pkcs1v15-with-sha3-512"}, /* 463 */
+ { 0x86, 0, 1, 4, "" }, /* 464 */
+ { 0xf8, 0, 1, 5, "" }, /* 465 */
+ { 0x42, 478, 1, 6, "netscape" }, /* 466 */
+ { 0x01, 473, 1, 7, "" }, /* 467 */
+ { 0x01, 469, 0, 8, "nsCertType" }, /* 468 */
+ { 0x03, 470, 0, 8, "nsRevocationUrl" }, /* 469 */
+ { 0x04, 471, 0, 8, "nsCaRevocationUrl" }, /* 470 */
+ { 0x08, 472, 0, 8, "nsCaPolicyUrl" }, /* 471 */
+ { 0x0d, 0, 0, 8, "nsComment" }, /* 472 */
+ { 0x03, 476, 1, 7, "directory" }, /* 473 */
+ { 0x01, 0, 1, 8, "" }, /* 474 */
+ { 0x03, 0, 0, 9, "employeeNumber" }, /* 475 */
+ { 0x04, 0, 1, 7, "policy" }, /* 476 */
+ { 0x01, 0, 0, 8, "nsSGC" }, /* 477 */
+ { 0x45, 0, 1, 6, "verisign" }, /* 478 */
+ { 0x01, 0, 1, 7, "pki" }, /* 479 */
+ { 0x09, 0, 1, 8, "attributes" }, /* 480 */
+ { 0x02, 482, 0, 9, "messageType" }, /* 481 */
+ { 0x03, 483, 0, 9, "pkiStatus" }, /* 482 */
+ { 0x04, 484, 0, 9, "failInfo" }, /* 483 */
+ { 0x05, 485, 0, 9, "senderNonce" }, /* 484 */
+ { 0x06, 486, 0, 9, "recipientNonce" }, /* 485 */
+ { 0x07, 487, 0, 9, "transID" }, /* 486 */
+ { 0x08, 0, 0, 9, "extensionReq" }, /* 487 */
+ {0x67, 0, 1, 0, "" }, /* 488 */
+ { 0x81, 0, 1, 1, "" }, /* 489 */
+ { 0x05, 0, 1, 2, "" }, /* 490 */
+ { 0x02, 0, 1, 3, "tcg-attribute" }, /* 491 */
+ { 0x01, 493, 0, 4, "tcg-at-tpmManufacturer" }, /* 492 */
+ { 0x02, 494, 0, 4, "tcg-at-tpmModel" }, /* 493 */
+ { 0x03, 495, 0, 4, "tcg-at-tpmVersion" }, /* 494 */
+ { 0x0F, 0, 0, 4, "tcg-at-tpmIdLabel" } /* 495 */
};
diff --git a/src/libstrongswan/asn1/oid.h b/src/libstrongswan/asn1/oid.h
index f316c0c78..0e9b7ea24 100644
--- a/src/libstrongswan/asn1/oid.h
+++ b/src/libstrongswan/asn1/oid.h
@@ -30,242 +30,247 @@ extern const oid_t oid_names[];
#define OID_COUNTRY 23
#define OID_LOCALITY 24
#define OID_STATE_OR_PROVINCE 25
-#define OID_ORGANIZATION 26
-#define OID_ORGANIZATION_UNIT 27
-#define OID_TITLE 28
-#define OID_DESCRIPTION 29
-#define OID_USER_CERTIFICATE 30
-#define OID_NAME 31
-#define OID_GIVEN_NAME 32
-#define OID_INITIALS 33
-#define OID_UNIQUE_IDENTIFIER 34
-#define OID_DN_QUALIFIER 35
-#define OID_DMD_NAME 36
-#define OID_PSEUDONYM 37
-#define OID_ROLE 38
-#define OID_SUBJECT_KEY_ID 41
-#define OID_KEY_USAGE 42
-#define OID_SUBJECT_ALT_NAME 44
-#define OID_BASIC_CONSTRAINTS 46
-#define OID_CRL_NUMBER 47
-#define OID_CRL_REASON_CODE 48
-#define OID_DELTA_CRL_INDICATOR 51
-#define OID_ISSUING_DIST_POINT 52
-#define OID_NAME_CONSTRAINTS 54
-#define OID_CRL_DISTRIBUTION_POINTS 55
-#define OID_CERTIFICATE_POLICIES 56
-#define OID_ANY_POLICY 57
-#define OID_POLICY_MAPPINGS 58
-#define OID_AUTHORITY_KEY_ID 59
-#define OID_POLICY_CONSTRAINTS 60
-#define OID_EXTENDED_KEY_USAGE 61
-#define OID_FRESHEST_CRL 63
-#define OID_INHIBIT_ANY_POLICY 64
-#define OID_TARGET_INFORMATION 65
-#define OID_NO_REV_AVAIL 66
-#define OID_CAMELLIA128_CBC 77
-#define OID_CAMELLIA192_CBC 78
-#define OID_CAMELLIA256_CBC 79
-#define OID_RSA_ENCRYPTION 92
-#define OID_MD2_WITH_RSA 93
-#define OID_MD5_WITH_RSA 94
-#define OID_SHA1_WITH_RSA 95
-#define OID_RSAES_OAEP 96
-#define OID_SHA256_WITH_RSA 99
-#define OID_SHA384_WITH_RSA 100
-#define OID_SHA512_WITH_RSA 101
-#define OID_SHA224_WITH_RSA 102
-#define OID_PBE_MD5_DES_CBC 104
-#define OID_PBE_SHA1_DES_CBC 105
-#define OID_PBKDF2 106
-#define OID_PBES2 107
-#define OID_PKCS7_DATA 109
-#define OID_PKCS7_SIGNED_DATA 110
-#define OID_PKCS7_ENVELOPED_DATA 111
-#define OID_PKCS7_SIGNED_ENVELOPED_DATA 112
-#define OID_PKCS7_DIGESTED_DATA 113
-#define OID_PKCS7_ENCRYPTED_DATA 114
-#define OID_EMAIL_ADDRESS 116
-#define OID_UNSTRUCTURED_NAME 117
-#define OID_PKCS9_CONTENT_TYPE 118
-#define OID_PKCS9_MESSAGE_DIGEST 119
-#define OID_PKCS9_SIGNING_TIME 120
-#define OID_CHALLENGE_PASSWORD 122
-#define OID_UNSTRUCTURED_ADDRESS 123
-#define OID_EXTENSION_REQUEST 124
-#define OID_X509_CERTIFICATE 127
-#define OID_PBE_SHA1_RC4_128 131
-#define OID_PBE_SHA1_RC4_40 132
-#define OID_PBE_SHA1_3DES_CBC 133
-#define OID_PBE_SHA1_3DES_2KEY_CBC 134
-#define OID_PBE_SHA1_RC2_CBC_128 135
-#define OID_PBE_SHA1_RC2_CBC_40 136
-#define OID_P12_KEY_BAG 139
-#define OID_P12_PKCS8_KEY_BAG 140
-#define OID_P12_CERT_BAG 141
-#define OID_P12_CRL_BAG 142
-#define OID_MD2 146
-#define OID_MD5 147
-#define OID_3DES_EDE_CBC 149
-#define OID_EC_PUBLICKEY 153
-#define OID_C2PNB163V1 156
-#define OID_C2PNB163V2 157
-#define OID_C2PNB163V3 158
-#define OID_C2PNB176W1 159
-#define OID_C2PNB191V1 160
-#define OID_C2PNB191V2 161
-#define OID_C2PNB191V3 162
-#define OID_C2PNB191V4 163
-#define OID_C2PNB191V5 164
-#define OID_C2PNB208W1 165
-#define OID_C2PNB239V1 166
-#define OID_C2PNB239V2 167
-#define OID_C2PNB239V3 168
-#define OID_C2PNB239V4 169
-#define OID_C2PNB239V5 170
-#define OID_C2PNB272W1 171
-#define OID_C2PNB304W1 172
-#define OID_C2PNB359V1 173
-#define OID_C2PNB368W1 174
-#define OID_C2PNB431R1 175
-#define OID_PRIME192V1 177
-#define OID_PRIME192V2 178
-#define OID_PRIME192V3 179
-#define OID_PRIME239V1 180
-#define OID_PRIME239V2 181
-#define OID_PRIME239V3 182
-#define OID_PRIME256V1 183
-#define OID_ECDSA_WITH_SHA1 185
-#define OID_ECDSA_WITH_SHA224 187
-#define OID_ECDSA_WITH_SHA256 188
-#define OID_ECDSA_WITH_SHA384 189
-#define OID_ECDSA_WITH_SHA512 190
-#define OID_MS_SMARTCARD_LOGON 204
-#define OID_USER_PRINCIPAL_NAME 205
-#define OID_STRONGSWAN 211
-#define OID_BLISS_PUBLICKEY 216
-#define OID_BLISS_I 218
-#define OID_BLISS_II 219
-#define OID_BLISS_III 220
-#define OID_BLISS_IV 221
-#define OID_BLISS_B_I 222
-#define OID_BLISS_B_II 223
-#define OID_BLISS_B_III 224
-#define OID_BLISS_B_IV 225
-#define OID_BLISS_WITH_SHA2_512 227
-#define OID_BLISS_WITH_SHA2_384 228
-#define OID_BLISS_WITH_SHA2_256 229
-#define OID_BLISS_WITH_SHA3_512 230
-#define OID_BLISS_WITH_SHA3_384 231
-#define OID_BLISS_WITH_SHA3_256 232
-#define OID_TCGID 239
-#define OID_BLOWFISH_CBC 243
-#define OID_AUTHORITY_INFO_ACCESS 287
-#define OID_IP_ADDR_BLOCKS 289
-#define OID_POLICY_QUALIFIER_CPS 291
-#define OID_POLICY_QUALIFIER_UNOTICE 292
-#define OID_SERVER_AUTH 294
-#define OID_CLIENT_AUTH 295
-#define OID_OCSP_SIGNING 302
-#define OID_XMPP_ADDR 308
-#define OID_AUTHENTICATION_INFO 312
-#define OID_ACCESS_IDENTITY 313
-#define OID_CHARGING_IDENTITY 314
-#define OID_GROUP 315
-#define OID_OCSP 318
-#define OID_BASIC 319
-#define OID_NONCE 320
-#define OID_CRL 321
-#define OID_RESPONSE 322
-#define OID_NO_CHECK 323
-#define OID_ARCHIVE_CUTOFF 324
-#define OID_SERVICE_LOCATOR 325
-#define OID_CA_ISSUERS 326
-#define OID_IKE_INTERMEDIATE 331
-#define OID_DES_CBC 335
-#define OID_SHA1 336
-#define OID_SHA1_WITH_RSA_OIW 337
-#define OID_ECGDSA_PUBKEY 356
-#define OID_ECGDSA_SIG_WITH_RIPEMD160 359
-#define OID_ECGDSA_SIG_WITH_SHA1 360
-#define OID_ECGDSA_SIG_WITH_SHA224 361
-#define OID_ECGDSA_SIG_WITH_SHA256 362
-#define OID_ECGDSA_SIG_WITH_SHA384 363
-#define OID_ECGDSA_SIG_WITH_SHA512 364
-#define OID_ED25519 385
-#define OID_ED448 386
-#define OID_SECT163K1 390
-#define OID_SECT163R1 391
-#define OID_SECT239K1 392
-#define OID_SECT113R1 393
-#define OID_SECT113R2 394
-#define OID_SECT112R1 395
-#define OID_SECT112R2 396
-#define OID_SECT160R1 397
-#define OID_SECT160K1 398
-#define OID_SECT256K1 399
-#define OID_SECT163R2 400
-#define OID_SECT283K1 401
-#define OID_SECT283R1 402
-#define OID_SECT131R1 403
-#define OID_SECT131R2 404
-#define OID_SECT193R1 405
-#define OID_SECT193R2 406
-#define OID_SECT233K1 407
-#define OID_SECT233R1 408
-#define OID_SECT128R1 409
-#define OID_SECT128R2 410
-#define OID_SECT160R2 411
-#define OID_SECT192K1 412
-#define OID_SECT224K1 413
-#define OID_SECT224R1 414
-#define OID_SECT384R1 415
-#define OID_SECT521R1 416
-#define OID_SECT409K1 417
-#define OID_SECT409R1 418
-#define OID_SECT571K1 419
-#define OID_SECT571R1 420
-#define OID_AES128_CBC 429
-#define OID_AES128_GCM 430
-#define OID_AES128_CCM 431
-#define OID_AES192_CBC 432
-#define OID_AES192_GCM 433
-#define OID_AES192_CCM 434
-#define OID_AES256_CBC 435
-#define OID_AES256_GCM 436
-#define OID_AES256_CCM 437
-#define OID_SHA256 439
-#define OID_SHA384 440
-#define OID_SHA512 441
-#define OID_SHA224 442
-#define OID_SHA3_224 445
-#define OID_SHA3_256 446
-#define OID_SHA3_384 447
-#define OID_SHA3_512 448
-#define OID_ECDSA_WITH_SHA3_224 452
-#define OID_ECDSA_WITH_SHA3_256 453
-#define OID_ECDSA_WITH_SHA3_384 454
-#define OID_ECDSA_WITH_SHA3_512 455
-#define OID_RSASSA_PKCS1V15_WITH_SHA3_224 456
-#define OID_RSASSA_PKCS1V15_WITH_SHA3_256 457
-#define OID_RSASSA_PKCS1V15_WITH_SHA3_384 458
-#define OID_RSASSA_PKCS1V15_WITH_SHA3_512 459
-#define OID_NS_REVOCATION_URL 465
-#define OID_NS_CA_REVOCATION_URL 466
-#define OID_NS_CA_POLICY_URL 467
-#define OID_NS_COMMENT 468
-#define OID_EMPLOYEE_NUMBER 471
-#define OID_PKI_MESSAGE_TYPE 477
-#define OID_PKI_STATUS 478
-#define OID_PKI_FAIL_INFO 479
-#define OID_PKI_SENDER_NONCE 480
-#define OID_PKI_RECIPIENT_NONCE 481
-#define OID_PKI_TRANS_ID 482
-#define OID_TPM_MANUFACTURER 488
-#define OID_TPM_MODEL 489
-#define OID_TPM_VERSION 490
-#define OID_TPM_ID_LABEL 491
+#define OID_STREET_ADDRESS 26
+#define OID_ORGANIZATION 27
+#define OID_ORGANIZATION_UNIT 28
+#define OID_TITLE 29
+#define OID_DESCRIPTION 30
+#define OID_POSTAL_ADDRESS 31
+#define OID_POSTAL_CODE 32
+#define OID_USER_CERTIFICATE 33
+#define OID_NAME 34
+#define OID_GIVEN_NAME 35
+#define OID_INITIALS 36
+#define OID_UNIQUE_IDENTIFIER 37
+#define OID_DN_QUALIFIER 38
+#define OID_DMD_NAME 39
+#define OID_PSEUDONYM 40
+#define OID_ROLE 41
+#define OID_SUBJECT_KEY_ID 44
+#define OID_KEY_USAGE 45
+#define OID_SUBJECT_ALT_NAME 47
+#define OID_BASIC_CONSTRAINTS 49
+#define OID_CRL_NUMBER 50
+#define OID_CRL_REASON_CODE 51
+#define OID_DELTA_CRL_INDICATOR 54
+#define OID_ISSUING_DIST_POINT 55
+#define OID_NAME_CONSTRAINTS 57
+#define OID_CRL_DISTRIBUTION_POINTS 58
+#define OID_CERTIFICATE_POLICIES 59
+#define OID_ANY_POLICY 60
+#define OID_POLICY_MAPPINGS 61
+#define OID_AUTHORITY_KEY_ID 62
+#define OID_POLICY_CONSTRAINTS 63
+#define OID_EXTENDED_KEY_USAGE 64
+#define OID_FRESHEST_CRL 66
+#define OID_INHIBIT_ANY_POLICY 67
+#define OID_TARGET_INFORMATION 68
+#define OID_NO_REV_AVAIL 69
+#define OID_CAMELLIA128_CBC 80
+#define OID_CAMELLIA192_CBC 81
+#define OID_CAMELLIA256_CBC 82
+#define OID_RSA_ENCRYPTION 95
+#define OID_MD2_WITH_RSA 96
+#define OID_MD5_WITH_RSA 97
+#define OID_SHA1_WITH_RSA 98
+#define OID_RSAES_OAEP 99
+#define OID_MGF1 100
+#define OID_RSASSA_PSS 102
+#define OID_SHA256_WITH_RSA 103
+#define OID_SHA384_WITH_RSA 104
+#define OID_SHA512_WITH_RSA 105
+#define OID_SHA224_WITH_RSA 106
+#define OID_PBE_MD5_DES_CBC 108
+#define OID_PBE_SHA1_DES_CBC 109
+#define OID_PBKDF2 110
+#define OID_PBES2 111
+#define OID_PKCS7_DATA 113
+#define OID_PKCS7_SIGNED_DATA 114
+#define OID_PKCS7_ENVELOPED_DATA 115
+#define OID_PKCS7_SIGNED_ENVELOPED_DATA 116
+#define OID_PKCS7_DIGESTED_DATA 117
+#define OID_PKCS7_ENCRYPTED_DATA 118
+#define OID_EMAIL_ADDRESS 120
+#define OID_UNSTRUCTURED_NAME 121
+#define OID_PKCS9_CONTENT_TYPE 122
+#define OID_PKCS9_MESSAGE_DIGEST 123
+#define OID_PKCS9_SIGNING_TIME 124
+#define OID_CHALLENGE_PASSWORD 126
+#define OID_UNSTRUCTURED_ADDRESS 127
+#define OID_EXTENSION_REQUEST 128
+#define OID_X509_CERTIFICATE 131
+#define OID_PBE_SHA1_RC4_128 135
+#define OID_PBE_SHA1_RC4_40 136
+#define OID_PBE_SHA1_3DES_CBC 137
+#define OID_PBE_SHA1_3DES_2KEY_CBC 138
+#define OID_PBE_SHA1_RC2_CBC_128 139
+#define OID_PBE_SHA1_RC2_CBC_40 140
+#define OID_P12_KEY_BAG 143
+#define OID_P12_PKCS8_KEY_BAG 144
+#define OID_P12_CERT_BAG 145
+#define OID_P12_CRL_BAG 146
+#define OID_MD2 150
+#define OID_MD5 151
+#define OID_3DES_EDE_CBC 153
+#define OID_EC_PUBLICKEY 157
+#define OID_C2PNB163V1 160
+#define OID_C2PNB163V2 161
+#define OID_C2PNB163V3 162
+#define OID_C2PNB176W1 163
+#define OID_C2PNB191V1 164
+#define OID_C2PNB191V2 165
+#define OID_C2PNB191V3 166
+#define OID_C2PNB191V4 167
+#define OID_C2PNB191V5 168
+#define OID_C2PNB208W1 169
+#define OID_C2PNB239V1 170
+#define OID_C2PNB239V2 171
+#define OID_C2PNB239V3 172
+#define OID_C2PNB239V4 173
+#define OID_C2PNB239V5 174
+#define OID_C2PNB272W1 175
+#define OID_C2PNB304W1 176
+#define OID_C2PNB359V1 177
+#define OID_C2PNB368W1 178
+#define OID_C2PNB431R1 179
+#define OID_PRIME192V1 181
+#define OID_PRIME192V2 182
+#define OID_PRIME192V3 183
+#define OID_PRIME239V1 184
+#define OID_PRIME239V2 185
+#define OID_PRIME239V3 186
+#define OID_PRIME256V1 187
+#define OID_ECDSA_WITH_SHA1 189
+#define OID_ECDSA_WITH_SHA224 191
+#define OID_ECDSA_WITH_SHA256 192
+#define OID_ECDSA_WITH_SHA384 193
+#define OID_ECDSA_WITH_SHA512 194
+#define OID_MS_SMARTCARD_LOGON 208
+#define OID_USER_PRINCIPAL_NAME 209
+#define OID_STRONGSWAN 215
+#define OID_BLISS_PUBLICKEY 220
+#define OID_BLISS_I 222
+#define OID_BLISS_II 223
+#define OID_BLISS_III 224
+#define OID_BLISS_IV 225
+#define OID_BLISS_B_I 226
+#define OID_BLISS_B_II 227
+#define OID_BLISS_B_III 228
+#define OID_BLISS_B_IV 229
+#define OID_BLISS_WITH_SHA2_512 231
+#define OID_BLISS_WITH_SHA2_384 232
+#define OID_BLISS_WITH_SHA2_256 233
+#define OID_BLISS_WITH_SHA3_512 234
+#define OID_BLISS_WITH_SHA3_384 235
+#define OID_BLISS_WITH_SHA3_256 236
+#define OID_TCGID 243
+#define OID_BLOWFISH_CBC 247
+#define OID_AUTHORITY_INFO_ACCESS 291
+#define OID_IP_ADDR_BLOCKS 293
+#define OID_POLICY_QUALIFIER_CPS 295
+#define OID_POLICY_QUALIFIER_UNOTICE 296
+#define OID_SERVER_AUTH 298
+#define OID_CLIENT_AUTH 299
+#define OID_OCSP_SIGNING 306
+#define OID_XMPP_ADDR 312
+#define OID_AUTHENTICATION_INFO 316
+#define OID_ACCESS_IDENTITY 317
+#define OID_CHARGING_IDENTITY 318
+#define OID_GROUP 319
+#define OID_OCSP 322
+#define OID_BASIC 323
+#define OID_NONCE 324
+#define OID_CRL 325
+#define OID_RESPONSE 326
+#define OID_NO_CHECK 327
+#define OID_ARCHIVE_CUTOFF 328
+#define OID_SERVICE_LOCATOR 329
+#define OID_CA_ISSUERS 330
+#define OID_IKE_INTERMEDIATE 335
+#define OID_DES_CBC 339
+#define OID_SHA1 340
+#define OID_SHA1_WITH_RSA_OIW 341
+#define OID_ECGDSA_PUBKEY 360
+#define OID_ECGDSA_SIG_WITH_RIPEMD160 363
+#define OID_ECGDSA_SIG_WITH_SHA1 364
+#define OID_ECGDSA_SIG_WITH_SHA224 365
+#define OID_ECGDSA_SIG_WITH_SHA256 366
+#define OID_ECGDSA_SIG_WITH_SHA384 367
+#define OID_ECGDSA_SIG_WITH_SHA512 368
+#define OID_ED25519 389
+#define OID_ED448 390
+#define OID_SECT163K1 394
+#define OID_SECT163R1 395
+#define OID_SECT239K1 396
+#define OID_SECT113R1 397
+#define OID_SECT113R2 398
+#define OID_SECT112R1 399
+#define OID_SECT112R2 400
+#define OID_SECT160R1 401
+#define OID_SECT160K1 402
+#define OID_SECT256K1 403
+#define OID_SECT163R2 404
+#define OID_SECT283K1 405
+#define OID_SECT283R1 406
+#define OID_SECT131R1 407
+#define OID_SECT131R2 408
+#define OID_SECT193R1 409
+#define OID_SECT193R2 410
+#define OID_SECT233K1 411
+#define OID_SECT233R1 412
+#define OID_SECT128R1 413
+#define OID_SECT128R2 414
+#define OID_SECT160R2 415
+#define OID_SECT192K1 416
+#define OID_SECT224K1 417
+#define OID_SECT224R1 418
+#define OID_SECT384R1 419
+#define OID_SECT521R1 420
+#define OID_SECT409K1 421
+#define OID_SECT409R1 422
+#define OID_SECT571K1 423
+#define OID_SECT571R1 424
+#define OID_AES128_CBC 433
+#define OID_AES128_GCM 434
+#define OID_AES128_CCM 435
+#define OID_AES192_CBC 436
+#define OID_AES192_GCM 437
+#define OID_AES192_CCM 438
+#define OID_AES256_CBC 439
+#define OID_AES256_GCM 440
+#define OID_AES256_CCM 441
+#define OID_SHA256 443
+#define OID_SHA384 444
+#define OID_SHA512 445
+#define OID_SHA224 446
+#define OID_SHA3_224 449
+#define OID_SHA3_256 450
+#define OID_SHA3_384 451
+#define OID_SHA3_512 452
+#define OID_ECDSA_WITH_SHA3_224 456
+#define OID_ECDSA_WITH_SHA3_256 457
+#define OID_ECDSA_WITH_SHA3_384 458
+#define OID_ECDSA_WITH_SHA3_512 459
+#define OID_RSASSA_PKCS1V15_WITH_SHA3_224 460
+#define OID_RSASSA_PKCS1V15_WITH_SHA3_256 461
+#define OID_RSASSA_PKCS1V15_WITH_SHA3_384 462
+#define OID_RSASSA_PKCS1V15_WITH_SHA3_512 463
+#define OID_NS_REVOCATION_URL 469
+#define OID_NS_CA_REVOCATION_URL 470
+#define OID_NS_CA_POLICY_URL 471
+#define OID_NS_COMMENT 472
+#define OID_EMPLOYEE_NUMBER 475
+#define OID_PKI_MESSAGE_TYPE 481
+#define OID_PKI_STATUS 482
+#define OID_PKI_FAIL_INFO 483
+#define OID_PKI_SENDER_NONCE 484
+#define OID_PKI_RECIPIENT_NONCE 485
+#define OID_PKI_TRANS_ID 486
+#define OID_TPM_MANUFACTURER 492
+#define OID_TPM_MODEL 493
+#define OID_TPM_VERSION 494
+#define OID_TPM_ID_LABEL 495
-#define OID_MAX 492
+#define OID_MAX 496
#endif /* OID_H_ */
diff --git a/src/libstrongswan/asn1/oid.txt b/src/libstrongswan/asn1/oid.txt
index a0c2aada3..9583baa5e 100644
--- a/src/libstrongswan/asn1/oid.txt
+++ b/src/libstrongswan/asn1/oid.txt
@@ -24,10 +24,13 @@
0x06 "C" OID_COUNTRY
0x07 "L" OID_LOCALITY
0x08 "ST" OID_STATE_OR_PROVINCE
+ 0x09 "STREET" OID_STREET_ADDRESS
0x0A "O" OID_ORGANIZATION
0x0B "OU" OID_ORGANIZATION_UNIT
0x0C "T" OID_TITLE
0x0D "D" OID_DESCRIPTION
+ 0x10 "postalAddress" OID_POSTAL_ADDRESS
+ 0x11 "postalCode" OID_POSTAL_CODE
0x24 "userCertificate" OID_USER_CERTIFICATE
0x29 "N" OID_NAME
0x2A "G" OID_GIVEN_NAME
@@ -95,8 +98,9 @@
0x04 "md5WithRSAEncryption" OID_MD5_WITH_RSA
0x05 "sha-1WithRSAEncryption" OID_SHA1_WITH_RSA
0x07 "id-RSAES-OAEP" OID_RSAES_OAEP
- 0x08 "id-mgf1"
+ 0x08 "id-mgf1" OID_MGF1
0x09 "id-pSpecified"
+ 0x0A "RSASSA-PSS" OID_RSASSA_PSS
0x0B "sha256WithRSAEncryption" OID_SHA256_WITH_RSA
0x0C "sha384WithRSAEncryption" OID_SHA384_WITH_RSA
0x0D "sha512WithRSAEncryption" OID_SHA512_WITH_RSA