summaryrefslogtreecommitdiff
path: root/src/libstrongswan/asn1
diff options
context:
space:
mode:
authorYves-Alexis Perez <corsac@debian.org>2015-11-18 14:49:27 +0100
committerYves-Alexis Perez <corsac@debian.org>2015-11-18 14:49:27 +0100
commit1e980d6be0ef0e243c6fe82b5e855454b97e24a4 (patch)
tree0d59eec2ce2ed332434ae80fc78a44db9ad293c5 /src/libstrongswan/asn1
parent5dca9ea0e2931f0e2a056c7964d311bcc30a01b8 (diff)
downloadvyos-strongswan-1e980d6be0ef0e243c6fe82b5e855454b97e24a4.tar.gz
vyos-strongswan-1e980d6be0ef0e243c6fe82b5e855454b97e24a4.zip
Imported Upstream version 5.3.4
Diffstat (limited to 'src/libstrongswan/asn1')
-rw-r--r--src/libstrongswan/asn1/oid.c511
-rw-r--r--src/libstrongswan/asn1/oid.h201
-rw-r--r--src/libstrongswan/asn1/oid.txt17
3 files changed, 371 insertions, 358 deletions
diff --git a/src/libstrongswan/asn1/oid.c b/src/libstrongswan/asn1/oid.c
index a750f7fcb..a088b0527 100644
--- a/src/libstrongswan/asn1/oid.c
+++ b/src/libstrongswan/asn1/oid.c
@@ -199,12 +199,12 @@ const oid_t oid_names[] = {
{ 0x02, 187, 0, 7, "ecdsa-with-SHA256" }, /* 186 */
{ 0x03, 188, 0, 7, "ecdsa-with-SHA384" }, /* 187 */
{ 0x04, 0, 0, 7, "ecdsa-with-SHA512" }, /* 188 */
- {0x2B, 413, 1, 0, "" }, /* 189 */
- { 0x06, 327, 1, 1, "dod" }, /* 190 */
+ {0x2B, 416, 1, 0, "" }, /* 189 */
+ { 0x06, 330, 1, 1, "dod" }, /* 190 */
{ 0x01, 0, 1, 2, "internet" }, /* 191 */
- { 0x04, 278, 1, 3, "private" }, /* 192 */
+ { 0x04, 281, 1, 3, "private" }, /* 192 */
{ 0x01, 0, 1, 4, "enterprise" }, /* 193 */
- { 0x82, 228, 1, 5, "" }, /* 194 */
+ { 0x82, 231, 1, 5, "" }, /* 194 */
{ 0x37, 207, 1, 6, "Microsoft" }, /* 195 */
{ 0x0A, 200, 1, 7, "" }, /* 196 */
{ 0x03, 0, 1, 8, "" }, /* 197 */
@@ -235,254 +235,257 @@ const oid_t oid_names[] = {
{ 0x07, 223, 0, 10, "BLISS-B-III" }, /* 222 */
{ 0x08, 0, 0, 10, "BLISS-B-IV" }, /* 223 */
{ 0x03, 0, 1, 9, "blissSigType" }, /* 224 */
- { 0x01, 226, 0, 10, "BLISS-with-SHA512" }, /* 225 */
- { 0x02, 227, 0, 10, "BLISS-with-SHA384" }, /* 226 */
- { 0x03, 0, 0, 10, "BLISS-with-SHA256" }, /* 227 */
- { 0x89, 235, 1, 5, "" }, /* 228 */
- { 0x31, 0, 1, 6, "" }, /* 229 */
- { 0x01, 0, 1, 7, "" }, /* 230 */
- { 0x01, 0, 1, 8, "" }, /* 231 */
- { 0x02, 0, 1, 9, "" }, /* 232 */
- { 0x02, 0, 1, 10, "" }, /* 233 */
- { 0x4B, 0, 0, 11, "TCGID" }, /* 234 */
- { 0x97, 239, 1, 5, "" }, /* 235 */
- { 0x55, 0, 1, 6, "" }, /* 236 */
- { 0x01, 0, 1, 7, "" }, /* 237 */
- { 0x02, 0, 0, 8, "blowfish-cbc" }, /* 238 */
- { 0xC1, 0, 1, 5, "" }, /* 239 */
- { 0x16, 0, 1, 6, "ntruCryptosystems" }, /* 240 */
- { 0x01, 0, 1, 7, "eess" }, /* 241 */
- { 0x01, 0, 1, 8, "eess1" }, /* 242 */
- { 0x01, 247, 1, 9, "eess1-algs" }, /* 243 */
- { 0x01, 245, 0, 10, "ntru-EESS1v1-SVES" }, /* 244 */
- { 0x02, 246, 0, 10, "ntru-EESS1v1-SVSSA" }, /* 245 */
- { 0x03, 0, 0, 10, "ntru-EESS1v1-NTRUSign" }, /* 246 */
- { 0x02, 277, 1, 9, "eess1-params" }, /* 247 */
- { 0x01, 249, 0, 10, "ees251ep1" }, /* 248 */
- { 0x02, 250, 0, 10, "ees347ep1" }, /* 249 */
- { 0x03, 251, 0, 10, "ees503ep1" }, /* 250 */
- { 0x07, 252, 0, 10, "ees251sp2" }, /* 251 */
- { 0x0C, 253, 0, 10, "ees251ep4" }, /* 252 */
- { 0x0D, 254, 0, 10, "ees251ep5" }, /* 253 */
- { 0x0E, 255, 0, 10, "ees251sp3" }, /* 254 */
- { 0x0F, 256, 0, 10, "ees251sp4" }, /* 255 */
- { 0x10, 257, 0, 10, "ees251sp5" }, /* 256 */
- { 0x11, 258, 0, 10, "ees251sp6" }, /* 257 */
- { 0x12, 259, 0, 10, "ees251sp7" }, /* 258 */
- { 0x13, 260, 0, 10, "ees251sp8" }, /* 259 */
- { 0x14, 261, 0, 10, "ees251sp9" }, /* 260 */
- { 0x22, 262, 0, 10, "ees401ep1" }, /* 261 */
- { 0x23, 263, 0, 10, "ees449ep1" }, /* 262 */
- { 0x24, 264, 0, 10, "ees677ep1" }, /* 263 */
- { 0x25, 265, 0, 10, "ees1087ep2" }, /* 264 */
- { 0x26, 266, 0, 10, "ees541ep1" }, /* 265 */
- { 0x27, 267, 0, 10, "ees613ep1" }, /* 266 */
- { 0x28, 268, 0, 10, "ees887ep1" }, /* 267 */
- { 0x29, 269, 0, 10, "ees1171ep1" }, /* 268 */
- { 0x2A, 270, 0, 10, "ees659ep1" }, /* 269 */
- { 0x2B, 271, 0, 10, "ees761ep1" }, /* 270 */
- { 0x2C, 272, 0, 10, "ees1087ep1" }, /* 271 */
- { 0x2D, 273, 0, 10, "ees1499ep1" }, /* 272 */
- { 0x2E, 274, 0, 10, "ees401ep2" }, /* 273 */
- { 0x2F, 275, 0, 10, "ees439ep1" }, /* 274 */
- { 0x30, 276, 0, 10, "ees593ep1" }, /* 275 */
- { 0x31, 0, 0, 10, "ees743ep1" }, /* 276 */
- { 0x03, 0, 0, 9, "eess1-encodingMethods" }, /* 277 */
- { 0x05, 0, 1, 3, "security" }, /* 278 */
- { 0x05, 0, 1, 4, "mechanisms" }, /* 279 */
- { 0x07, 324, 1, 5, "id-pkix" }, /* 280 */
- { 0x01, 285, 1, 6, "id-pe" }, /* 281 */
- { 0x01, 283, 0, 7, "authorityInfoAccess" }, /* 282 */
- { 0x03, 284, 0, 7, "qcStatements" }, /* 283 */
- { 0x07, 0, 0, 7, "ipAddrBlocks" }, /* 284 */
- { 0x02, 288, 1, 6, "id-qt" }, /* 285 */
- { 0x01, 287, 0, 7, "cps" }, /* 286 */
- { 0x02, 0, 0, 7, "unotice" }, /* 287 */
- { 0x03, 298, 1, 6, "id-kp" }, /* 288 */
- { 0x01, 290, 0, 7, "serverAuth" }, /* 289 */
- { 0x02, 291, 0, 7, "clientAuth" }, /* 290 */
- { 0x03, 292, 0, 7, "codeSigning" }, /* 291 */
- { 0x04, 293, 0, 7, "emailProtection" }, /* 292 */
- { 0x05, 294, 0, 7, "ipsecEndSystem" }, /* 293 */
- { 0x06, 295, 0, 7, "ipsecTunnel" }, /* 294 */
- { 0x07, 296, 0, 7, "ipsecUser" }, /* 295 */
- { 0x08, 297, 0, 7, "timeStamping" }, /* 296 */
- { 0x09, 0, 0, 7, "ocspSigning" }, /* 297 */
- { 0x08, 306, 1, 6, "id-otherNames" }, /* 298 */
- { 0x01, 300, 0, 7, "personalData" }, /* 299 */
- { 0x02, 301, 0, 7, "userGroup" }, /* 300 */
- { 0x03, 302, 0, 7, "id-on-permanentIdentifier" }, /* 301 */
- { 0x04, 303, 0, 7, "id-on-hardwareModuleName" }, /* 302 */
- { 0x05, 304, 0, 7, "xmppAddr" }, /* 303 */
- { 0x06, 305, 0, 7, "id-on-SIM" }, /* 304 */
- { 0x07, 0, 0, 7, "id-on-dnsSRV" }, /* 305 */
- { 0x0A, 311, 1, 6, "id-aca" }, /* 306 */
- { 0x01, 308, 0, 7, "authenticationInfo" }, /* 307 */
- { 0x02, 309, 0, 7, "accessIdentity" }, /* 308 */
- { 0x03, 310, 0, 7, "chargingIdentity" }, /* 309 */
- { 0x04, 0, 0, 7, "group" }, /* 310 */
- { 0x0B, 312, 0, 6, "subjectInfoAccess" }, /* 311 */
- { 0x30, 0, 1, 6, "id-ad" }, /* 312 */
- { 0x01, 321, 1, 7, "ocsp" }, /* 313 */
- { 0x01, 315, 0, 8, "basic" }, /* 314 */
- { 0x02, 316, 0, 8, "nonce" }, /* 315 */
- { 0x03, 317, 0, 8, "crl" }, /* 316 */
- { 0x04, 318, 0, 8, "response" }, /* 317 */
- { 0x05, 319, 0, 8, "noCheck" }, /* 318 */
- { 0x06, 320, 0, 8, "archiveCutoff" }, /* 319 */
- { 0x07, 0, 0, 8, "serviceLocator" }, /* 320 */
- { 0x02, 322, 0, 7, "caIssuers" }, /* 321 */
- { 0x03, 323, 0, 7, "timeStamping" }, /* 322 */
- { 0x05, 0, 0, 7, "caRepository" }, /* 323 */
- { 0x08, 0, 1, 5, "ipsec" }, /* 324 */
- { 0x02, 0, 1, 6, "certificate" }, /* 325 */
- { 0x02, 0, 0, 7, "iKEIntermediate" }, /* 326 */
- { 0x0E, 333, 1, 1, "oiw" }, /* 327 */
- { 0x03, 0, 1, 2, "secsig" }, /* 328 */
- { 0x02, 0, 1, 3, "algorithms" }, /* 329 */
- { 0x07, 331, 0, 4, "des-cbc" }, /* 330 */
- { 0x1A, 332, 0, 4, "sha-1" }, /* 331 */
- { 0x1D, 0, 0, 4, "sha-1WithRSASignature" }, /* 332 */
- { 0x24, 379, 1, 1, "TeleTrusT" }, /* 333 */
- { 0x03, 0, 1, 2, "algorithm" }, /* 334 */
- { 0x03, 0, 1, 3, "signatureAlgorithm" }, /* 335 */
- { 0x01, 340, 1, 4, "rsaSignature" }, /* 336 */
- { 0x02, 338, 0, 5, "rsaSigWithripemd160" }, /* 337 */
- { 0x03, 339, 0, 5, "rsaSigWithripemd128" }, /* 338 */
- { 0x04, 0, 0, 5, "rsaSigWithripemd256" }, /* 339 */
- { 0x02, 0, 1, 4, "ecSign" }, /* 340 */
- { 0x01, 342, 0, 5, "ecSignWithsha1" }, /* 341 */
- { 0x02, 343, 0, 5, "ecSignWithripemd160" }, /* 342 */
- { 0x03, 344, 0, 5, "ecSignWithmd2" }, /* 343 */
- { 0x04, 345, 0, 5, "ecSignWithmd5" }, /* 344 */
- { 0x05, 362, 1, 5, "ttt-ecg" }, /* 345 */
- { 0x01, 350, 1, 6, "fieldType" }, /* 346 */
- { 0x01, 0, 1, 7, "characteristictwoField" }, /* 347 */
- { 0x01, 0, 1, 8, "basisType" }, /* 348 */
- { 0x01, 0, 0, 9, "ipBasis" }, /* 349 */
- { 0x02, 352, 1, 6, "keyType" }, /* 350 */
- { 0x01, 0, 0, 7, "ecgPublicKey" }, /* 351 */
- { 0x03, 353, 0, 6, "curve" }, /* 352 */
- { 0x04, 360, 1, 6, "signatures" }, /* 353 */
- { 0x01, 355, 0, 7, "ecgdsa-with-RIPEMD160" }, /* 354 */
- { 0x02, 356, 0, 7, "ecgdsa-with-SHA1" }, /* 355 */
- { 0x03, 357, 0, 7, "ecgdsa-with-SHA224" }, /* 356 */
- { 0x04, 358, 0, 7, "ecgdsa-with-SHA256" }, /* 357 */
- { 0x05, 359, 0, 7, "ecgdsa-with-SHA384" }, /* 358 */
- { 0x06, 0, 0, 7, "ecgdsa-with-SHA512" }, /* 359 */
- { 0x05, 0, 1, 6, "module" }, /* 360 */
- { 0x01, 0, 0, 7, "1" }, /* 361 */
- { 0x08, 0, 1, 5, "ecStdCurvesAndGeneration" }, /* 362 */
- { 0x01, 0, 1, 6, "ellipticCurve" }, /* 363 */
- { 0x01, 0, 1, 7, "versionOne" }, /* 364 */
- { 0x01, 366, 0, 8, "brainpoolP160r1" }, /* 365 */
- { 0x02, 367, 0, 8, "brainpoolP160t1" }, /* 366 */
- { 0x03, 368, 0, 8, "brainpoolP192r1" }, /* 367 */
- { 0x04, 369, 0, 8, "brainpoolP192t1" }, /* 368 */
- { 0x05, 370, 0, 8, "brainpoolP224r1" }, /* 369 */
- { 0x06, 371, 0, 8, "brainpoolP224t1" }, /* 370 */
- { 0x07, 372, 0, 8, "brainpoolP256r1" }, /* 371 */
- { 0x08, 373, 0, 8, "brainpoolP256t1" }, /* 372 */
- { 0x09, 374, 0, 8, "brainpoolP320r1" }, /* 373 */
- { 0x0A, 375, 0, 8, "brainpoolP320t1" }, /* 374 */
- { 0x0B, 376, 0, 8, "brainpoolP384r1" }, /* 375 */
- { 0x0C, 377, 0, 8, "brainpoolP384t1" }, /* 376 */
- { 0x0D, 378, 0, 8, "brainpoolP512r1" }, /* 377 */
- { 0x0E, 0, 0, 8, "brainpoolP512t1" }, /* 378 */
- { 0x81, 0, 1, 1, "" }, /* 379 */
- { 0x04, 0, 1, 2, "Certicom" }, /* 380 */
- { 0x00, 0, 1, 3, "curve" }, /* 381 */
- { 0x01, 383, 0, 4, "sect163k1" }, /* 382 */
- { 0x02, 384, 0, 4, "sect163r1" }, /* 383 */
- { 0x03, 385, 0, 4, "sect239k1" }, /* 384 */
- { 0x04, 386, 0, 4, "sect113r1" }, /* 385 */
- { 0x05, 387, 0, 4, "sect113r2" }, /* 386 */
- { 0x06, 388, 0, 4, "secp112r1" }, /* 387 */
- { 0x07, 389, 0, 4, "secp112r2" }, /* 388 */
- { 0x08, 390, 0, 4, "secp160r1" }, /* 389 */
- { 0x09, 391, 0, 4, "secp160k1" }, /* 390 */
- { 0x0A, 392, 0, 4, "secp256k1" }, /* 391 */
- { 0x0F, 393, 0, 4, "sect163r2" }, /* 392 */
- { 0x10, 394, 0, 4, "sect283k1" }, /* 393 */
- { 0x11, 395, 0, 4, "sect283r1" }, /* 394 */
- { 0x16, 396, 0, 4, "sect131r1" }, /* 395 */
- { 0x17, 397, 0, 4, "sect131r2" }, /* 396 */
- { 0x18, 398, 0, 4, "sect193r1" }, /* 397 */
- { 0x19, 399, 0, 4, "sect193r2" }, /* 398 */
- { 0x1A, 400, 0, 4, "sect233k1" }, /* 399 */
- { 0x1B, 401, 0, 4, "sect233r1" }, /* 400 */
- { 0x1C, 402, 0, 4, "secp128r1" }, /* 401 */
- { 0x1D, 403, 0, 4, "secp128r2" }, /* 402 */
- { 0x1E, 404, 0, 4, "secp160r2" }, /* 403 */
- { 0x1F, 405, 0, 4, "secp192k1" }, /* 404 */
- { 0x20, 406, 0, 4, "secp224k1" }, /* 405 */
- { 0x21, 407, 0, 4, "secp224r1" }, /* 406 */
- { 0x22, 408, 0, 4, "secp384r1" }, /* 407 */
- { 0x23, 409, 0, 4, "secp521r1" }, /* 408 */
- { 0x24, 410, 0, 4, "sect409k1" }, /* 409 */
- { 0x25, 411, 0, 4, "sect409r1" }, /* 410 */
- { 0x26, 412, 0, 4, "sect571k1" }, /* 411 */
- { 0x27, 0, 0, 4, "sect571r1" }, /* 412 */
- {0x60, 467, 1, 0, "" }, /* 413 */
- { 0x86, 0, 1, 1, "" }, /* 414 */
- { 0x48, 0, 1, 2, "" }, /* 415 */
- { 0x01, 0, 1, 3, "organization" }, /* 416 */
- { 0x65, 443, 1, 4, "gov" }, /* 417 */
- { 0x03, 0, 1, 5, "csor" }, /* 418 */
- { 0x04, 0, 1, 6, "nistalgorithm" }, /* 419 */
- { 0x01, 430, 1, 7, "aes" }, /* 420 */
- { 0x02, 422, 0, 8, "id-aes128-CBC" }, /* 421 */
- { 0x06, 423, 0, 8, "id-aes128-GCM" }, /* 422 */
- { 0x07, 424, 0, 8, "id-aes128-CCM" }, /* 423 */
- { 0x16, 425, 0, 8, "id-aes192-CBC" }, /* 424 */
- { 0x1A, 426, 0, 8, "id-aes192-GCM" }, /* 425 */
- { 0x1B, 427, 0, 8, "id-aes192-CCM" }, /* 426 */
- { 0x2A, 428, 0, 8, "id-aes256-CBC" }, /* 427 */
- { 0x2E, 429, 0, 8, "id-aes256-GCM" }, /* 428 */
- { 0x2F, 0, 0, 8, "id-aes256-CCM" }, /* 429 */
- { 0x02, 0, 1, 7, "hashalgs" }, /* 430 */
- { 0x01, 432, 0, 8, "id-sha256" }, /* 431 */
- { 0x02, 433, 0, 8, "id-sha384" }, /* 432 */
- { 0x03, 434, 0, 8, "id-sha512" }, /* 433 */
- { 0x04, 435, 0, 8, "id-sha224" }, /* 434 */
- { 0x05, 436, 0, 8, "id-sha512-224" }, /* 435 */
- { 0x06, 437, 0, 8, "id-sha512-256" }, /* 436 */
- { 0x07, 438, 0, 8, "id-sha3-224" }, /* 437 */
- { 0x08, 439, 0, 8, "id-sha3-256" }, /* 438 */
- { 0x09, 440, 0, 8, "id-sha3-384" }, /* 439 */
- { 0x0A, 441, 0, 8, "id-sha3-512" }, /* 440 */
- { 0x0B, 442, 0, 8, "id-shake128" }, /* 441 */
- { 0x0C, 0, 0, 8, "id-shake256" }, /* 442 */
- { 0x86, 0, 1, 4, "" }, /* 443 */
- { 0xf8, 0, 1, 5, "" }, /* 444 */
- { 0x42, 457, 1, 6, "netscape" }, /* 445 */
- { 0x01, 452, 1, 7, "" }, /* 446 */
- { 0x01, 448, 0, 8, "nsCertType" }, /* 447 */
- { 0x03, 449, 0, 8, "nsRevocationUrl" }, /* 448 */
- { 0x04, 450, 0, 8, "nsCaRevocationUrl" }, /* 449 */
- { 0x08, 451, 0, 8, "nsCaPolicyUrl" }, /* 450 */
- { 0x0d, 0, 0, 8, "nsComment" }, /* 451 */
- { 0x03, 455, 1, 7, "directory" }, /* 452 */
- { 0x01, 0, 1, 8, "" }, /* 453 */
- { 0x03, 0, 0, 9, "employeeNumber" }, /* 454 */
- { 0x04, 0, 1, 7, "policy" }, /* 455 */
- { 0x01, 0, 0, 8, "nsSGC" }, /* 456 */
- { 0x45, 0, 1, 6, "verisign" }, /* 457 */
- { 0x01, 0, 1, 7, "pki" }, /* 458 */
- { 0x09, 0, 1, 8, "attributes" }, /* 459 */
- { 0x02, 461, 0, 9, "messageType" }, /* 460 */
- { 0x03, 462, 0, 9, "pkiStatus" }, /* 461 */
- { 0x04, 463, 0, 9, "failInfo" }, /* 462 */
- { 0x05, 464, 0, 9, "senderNonce" }, /* 463 */
- { 0x06, 465, 0, 9, "recipientNonce" }, /* 464 */
- { 0x07, 466, 0, 9, "transID" }, /* 465 */
- { 0x08, 0, 0, 9, "extensionReq" }, /* 466 */
- {0x67, 0, 1, 0, "" }, /* 467 */
- { 0x81, 0, 1, 1, "" }, /* 468 */
- { 0x05, 0, 1, 2, "" }, /* 469 */
- { 0x02, 0, 1, 3, "tcg-attribute" }, /* 470 */
- { 0x01, 472, 0, 4, "tcg-at-tpmManufacturer" }, /* 471 */
- { 0x02, 473, 0, 4, "tcg-at-tpmModel" }, /* 472 */
- { 0x03, 474, 0, 4, "tcg-at-tpmVersion" }, /* 473 */
- { 0x0F, 0, 0, 4, "tcg-at-tpmIdLabel" } /* 474 */
+ { 0x01, 226, 0, 10, "BLISS-with-SHA2-512" }, /* 225 */
+ { 0x02, 227, 0, 10, "BLISS-with-SHA2-384" }, /* 226 */
+ { 0x03, 228, 0, 10, "BLISS-with-SHA2-256" }, /* 227 */
+ { 0x04, 229, 0, 10, "BLISS-with-SHA3-512" }, /* 228 */
+ { 0x05, 230, 0, 10, "BLISS-with-SHA3-384" }, /* 229 */
+ { 0x06, 0, 0, 10, "BLISS-with-SHA3-256" }, /* 230 */
+ { 0x89, 238, 1, 5, "" }, /* 231 */
+ { 0x31, 0, 1, 6, "" }, /* 232 */
+ { 0x01, 0, 1, 7, "" }, /* 233 */
+ { 0x01, 0, 1, 8, "" }, /* 234 */
+ { 0x02, 0, 1, 9, "" }, /* 235 */
+ { 0x02, 0, 1, 10, "" }, /* 236 */
+ { 0x4B, 0, 0, 11, "TCGID" }, /* 237 */
+ { 0x97, 242, 1, 5, "" }, /* 238 */
+ { 0x55, 0, 1, 6, "" }, /* 239 */
+ { 0x01, 0, 1, 7, "" }, /* 240 */
+ { 0x02, 0, 0, 8, "blowfish-cbc" }, /* 241 */
+ { 0xC1, 0, 1, 5, "" }, /* 242 */
+ { 0x16, 0, 1, 6, "ntruCryptosystems" }, /* 243 */
+ { 0x01, 0, 1, 7, "eess" }, /* 244 */
+ { 0x01, 0, 1, 8, "eess1" }, /* 245 */
+ { 0x01, 250, 1, 9, "eess1-algs" }, /* 246 */
+ { 0x01, 248, 0, 10, "ntru-EESS1v1-SVES" }, /* 247 */
+ { 0x02, 249, 0, 10, "ntru-EESS1v1-SVSSA" }, /* 248 */
+ { 0x03, 0, 0, 10, "ntru-EESS1v1-NTRUSign" }, /* 249 */
+ { 0x02, 280, 1, 9, "eess1-params" }, /* 250 */
+ { 0x01, 252, 0, 10, "ees251ep1" }, /* 251 */
+ { 0x02, 253, 0, 10, "ees347ep1" }, /* 252 */
+ { 0x03, 254, 0, 10, "ees503ep1" }, /* 253 */
+ { 0x07, 255, 0, 10, "ees251sp2" }, /* 254 */
+ { 0x0C, 256, 0, 10, "ees251ep4" }, /* 255 */
+ { 0x0D, 257, 0, 10, "ees251ep5" }, /* 256 */
+ { 0x0E, 258, 0, 10, "ees251sp3" }, /* 257 */
+ { 0x0F, 259, 0, 10, "ees251sp4" }, /* 258 */
+ { 0x10, 260, 0, 10, "ees251sp5" }, /* 259 */
+ { 0x11, 261, 0, 10, "ees251sp6" }, /* 260 */
+ { 0x12, 262, 0, 10, "ees251sp7" }, /* 261 */
+ { 0x13, 263, 0, 10, "ees251sp8" }, /* 262 */
+ { 0x14, 264, 0, 10, "ees251sp9" }, /* 263 */
+ { 0x22, 265, 0, 10, "ees401ep1" }, /* 264 */
+ { 0x23, 266, 0, 10, "ees449ep1" }, /* 265 */
+ { 0x24, 267, 0, 10, "ees677ep1" }, /* 266 */
+ { 0x25, 268, 0, 10, "ees1087ep2" }, /* 267 */
+ { 0x26, 269, 0, 10, "ees541ep1" }, /* 268 */
+ { 0x27, 270, 0, 10, "ees613ep1" }, /* 269 */
+ { 0x28, 271, 0, 10, "ees887ep1" }, /* 270 */
+ { 0x29, 272, 0, 10, "ees1171ep1" }, /* 271 */
+ { 0x2A, 273, 0, 10, "ees659ep1" }, /* 272 */
+ { 0x2B, 274, 0, 10, "ees761ep1" }, /* 273 */
+ { 0x2C, 275, 0, 10, "ees1087ep1" }, /* 274 */
+ { 0x2D, 276, 0, 10, "ees1499ep1" }, /* 275 */
+ { 0x2E, 277, 0, 10, "ees401ep2" }, /* 276 */
+ { 0x2F, 278, 0, 10, "ees439ep1" }, /* 277 */
+ { 0x30, 279, 0, 10, "ees593ep1" }, /* 278 */
+ { 0x31, 0, 0, 10, "ees743ep1" }, /* 279 */
+ { 0x03, 0, 0, 9, "eess1-encodingMethods" }, /* 280 */
+ { 0x05, 0, 1, 3, "security" }, /* 281 */
+ { 0x05, 0, 1, 4, "mechanisms" }, /* 282 */
+ { 0x07, 327, 1, 5, "id-pkix" }, /* 283 */
+ { 0x01, 288, 1, 6, "id-pe" }, /* 284 */
+ { 0x01, 286, 0, 7, "authorityInfoAccess" }, /* 285 */
+ { 0x03, 287, 0, 7, "qcStatements" }, /* 286 */
+ { 0x07, 0, 0, 7, "ipAddrBlocks" }, /* 287 */
+ { 0x02, 291, 1, 6, "id-qt" }, /* 288 */
+ { 0x01, 290, 0, 7, "cps" }, /* 289 */
+ { 0x02, 0, 0, 7, "unotice" }, /* 290 */
+ { 0x03, 301, 1, 6, "id-kp" }, /* 291 */
+ { 0x01, 293, 0, 7, "serverAuth" }, /* 292 */
+ { 0x02, 294, 0, 7, "clientAuth" }, /* 293 */
+ { 0x03, 295, 0, 7, "codeSigning" }, /* 294 */
+ { 0x04, 296, 0, 7, "emailProtection" }, /* 295 */
+ { 0x05, 297, 0, 7, "ipsecEndSystem" }, /* 296 */
+ { 0x06, 298, 0, 7, "ipsecTunnel" }, /* 297 */
+ { 0x07, 299, 0, 7, "ipsecUser" }, /* 298 */
+ { 0x08, 300, 0, 7, "timeStamping" }, /* 299 */
+ { 0x09, 0, 0, 7, "ocspSigning" }, /* 300 */
+ { 0x08, 309, 1, 6, "id-otherNames" }, /* 301 */
+ { 0x01, 303, 0, 7, "personalData" }, /* 302 */
+ { 0x02, 304, 0, 7, "userGroup" }, /* 303 */
+ { 0x03, 305, 0, 7, "id-on-permanentIdentifier" }, /* 304 */
+ { 0x04, 306, 0, 7, "id-on-hardwareModuleName" }, /* 305 */
+ { 0x05, 307, 0, 7, "xmppAddr" }, /* 306 */
+ { 0x06, 308, 0, 7, "id-on-SIM" }, /* 307 */
+ { 0x07, 0, 0, 7, "id-on-dnsSRV" }, /* 308 */
+ { 0x0A, 314, 1, 6, "id-aca" }, /* 309 */
+ { 0x01, 311, 0, 7, "authenticationInfo" }, /* 310 */
+ { 0x02, 312, 0, 7, "accessIdentity" }, /* 311 */
+ { 0x03, 313, 0, 7, "chargingIdentity" }, /* 312 */
+ { 0x04, 0, 0, 7, "group" }, /* 313 */
+ { 0x0B, 315, 0, 6, "subjectInfoAccess" }, /* 314 */
+ { 0x30, 0, 1, 6, "id-ad" }, /* 315 */
+ { 0x01, 324, 1, 7, "ocsp" }, /* 316 */
+ { 0x01, 318, 0, 8, "basic" }, /* 317 */
+ { 0x02, 319, 0, 8, "nonce" }, /* 318 */
+ { 0x03, 320, 0, 8, "crl" }, /* 319 */
+ { 0x04, 321, 0, 8, "response" }, /* 320 */
+ { 0x05, 322, 0, 8, "noCheck" }, /* 321 */
+ { 0x06, 323, 0, 8, "archiveCutoff" }, /* 322 */
+ { 0x07, 0, 0, 8, "serviceLocator" }, /* 323 */
+ { 0x02, 325, 0, 7, "caIssuers" }, /* 324 */
+ { 0x03, 326, 0, 7, "timeStamping" }, /* 325 */
+ { 0x05, 0, 0, 7, "caRepository" }, /* 326 */
+ { 0x08, 0, 1, 5, "ipsec" }, /* 327 */
+ { 0x02, 0, 1, 6, "certificate" }, /* 328 */
+ { 0x02, 0, 0, 7, "iKEIntermediate" }, /* 329 */
+ { 0x0E, 336, 1, 1, "oiw" }, /* 330 */
+ { 0x03, 0, 1, 2, "secsig" }, /* 331 */
+ { 0x02, 0, 1, 3, "algorithms" }, /* 332 */
+ { 0x07, 334, 0, 4, "des-cbc" }, /* 333 */
+ { 0x1A, 335, 0, 4, "sha-1" }, /* 334 */
+ { 0x1D, 0, 0, 4, "sha-1WithRSASignature" }, /* 335 */
+ { 0x24, 382, 1, 1, "TeleTrusT" }, /* 336 */
+ { 0x03, 0, 1, 2, "algorithm" }, /* 337 */
+ { 0x03, 0, 1, 3, "signatureAlgorithm" }, /* 338 */
+ { 0x01, 343, 1, 4, "rsaSignature" }, /* 339 */
+ { 0x02, 341, 0, 5, "rsaSigWithripemd160" }, /* 340 */
+ { 0x03, 342, 0, 5, "rsaSigWithripemd128" }, /* 341 */
+ { 0x04, 0, 0, 5, "rsaSigWithripemd256" }, /* 342 */
+ { 0x02, 0, 1, 4, "ecSign" }, /* 343 */
+ { 0x01, 345, 0, 5, "ecSignWithsha1" }, /* 344 */
+ { 0x02, 346, 0, 5, "ecSignWithripemd160" }, /* 345 */
+ { 0x03, 347, 0, 5, "ecSignWithmd2" }, /* 346 */
+ { 0x04, 348, 0, 5, "ecSignWithmd5" }, /* 347 */
+ { 0x05, 365, 1, 5, "ttt-ecg" }, /* 348 */
+ { 0x01, 353, 1, 6, "fieldType" }, /* 349 */
+ { 0x01, 0, 1, 7, "characteristictwoField" }, /* 350 */
+ { 0x01, 0, 1, 8, "basisType" }, /* 351 */
+ { 0x01, 0, 0, 9, "ipBasis" }, /* 352 */
+ { 0x02, 355, 1, 6, "keyType" }, /* 353 */
+ { 0x01, 0, 0, 7, "ecgPublicKey" }, /* 354 */
+ { 0x03, 356, 0, 6, "curve" }, /* 355 */
+ { 0x04, 363, 1, 6, "signatures" }, /* 356 */
+ { 0x01, 358, 0, 7, "ecgdsa-with-RIPEMD160" }, /* 357 */
+ { 0x02, 359, 0, 7, "ecgdsa-with-SHA1" }, /* 358 */
+ { 0x03, 360, 0, 7, "ecgdsa-with-SHA224" }, /* 359 */
+ { 0x04, 361, 0, 7, "ecgdsa-with-SHA256" }, /* 360 */
+ { 0x05, 362, 0, 7, "ecgdsa-with-SHA384" }, /* 361 */
+ { 0x06, 0, 0, 7, "ecgdsa-with-SHA512" }, /* 362 */
+ { 0x05, 0, 1, 6, "module" }, /* 363 */
+ { 0x01, 0, 0, 7, "1" }, /* 364 */
+ { 0x08, 0, 1, 5, "ecStdCurvesAndGeneration" }, /* 365 */
+ { 0x01, 0, 1, 6, "ellipticCurve" }, /* 366 */
+ { 0x01, 0, 1, 7, "versionOne" }, /* 367 */
+ { 0x01, 369, 0, 8, "brainpoolP160r1" }, /* 368 */
+ { 0x02, 370, 0, 8, "brainpoolP160t1" }, /* 369 */
+ { 0x03, 371, 0, 8, "brainpoolP192r1" }, /* 370 */
+ { 0x04, 372, 0, 8, "brainpoolP192t1" }, /* 371 */
+ { 0x05, 373, 0, 8, "brainpoolP224r1" }, /* 372 */
+ { 0x06, 374, 0, 8, "brainpoolP224t1" }, /* 373 */
+ { 0x07, 375, 0, 8, "brainpoolP256r1" }, /* 374 */
+ { 0x08, 376, 0, 8, "brainpoolP256t1" }, /* 375 */
+ { 0x09, 377, 0, 8, "brainpoolP320r1" }, /* 376 */
+ { 0x0A, 378, 0, 8, "brainpoolP320t1" }, /* 377 */
+ { 0x0B, 379, 0, 8, "brainpoolP384r1" }, /* 378 */
+ { 0x0C, 380, 0, 8, "brainpoolP384t1" }, /* 379 */
+ { 0x0D, 381, 0, 8, "brainpoolP512r1" }, /* 380 */
+ { 0x0E, 0, 0, 8, "brainpoolP512t1" }, /* 381 */
+ { 0x81, 0, 1, 1, "" }, /* 382 */
+ { 0x04, 0, 1, 2, "Certicom" }, /* 383 */
+ { 0x00, 0, 1, 3, "curve" }, /* 384 */
+ { 0x01, 386, 0, 4, "sect163k1" }, /* 385 */
+ { 0x02, 387, 0, 4, "sect163r1" }, /* 386 */
+ { 0x03, 388, 0, 4, "sect239k1" }, /* 387 */
+ { 0x04, 389, 0, 4, "sect113r1" }, /* 388 */
+ { 0x05, 390, 0, 4, "sect113r2" }, /* 389 */
+ { 0x06, 391, 0, 4, "secp112r1" }, /* 390 */
+ { 0x07, 392, 0, 4, "secp112r2" }, /* 391 */
+ { 0x08, 393, 0, 4, "secp160r1" }, /* 392 */
+ { 0x09, 394, 0, 4, "secp160k1" }, /* 393 */
+ { 0x0A, 395, 0, 4, "secp256k1" }, /* 394 */
+ { 0x0F, 396, 0, 4, "sect163r2" }, /* 395 */
+ { 0x10, 397, 0, 4, "sect283k1" }, /* 396 */
+ { 0x11, 398, 0, 4, "sect283r1" }, /* 397 */
+ { 0x16, 399, 0, 4, "sect131r1" }, /* 398 */
+ { 0x17, 400, 0, 4, "sect131r2" }, /* 399 */
+ { 0x18, 401, 0, 4, "sect193r1" }, /* 400 */
+ { 0x19, 402, 0, 4, "sect193r2" }, /* 401 */
+ { 0x1A, 403, 0, 4, "sect233k1" }, /* 402 */
+ { 0x1B, 404, 0, 4, "sect233r1" }, /* 403 */
+ { 0x1C, 405, 0, 4, "secp128r1" }, /* 404 */
+ { 0x1D, 406, 0, 4, "secp128r2" }, /* 405 */
+ { 0x1E, 407, 0, 4, "secp160r2" }, /* 406 */
+ { 0x1F, 408, 0, 4, "secp192k1" }, /* 407 */
+ { 0x20, 409, 0, 4, "secp224k1" }, /* 408 */
+ { 0x21, 410, 0, 4, "secp224r1" }, /* 409 */
+ { 0x22, 411, 0, 4, "secp384r1" }, /* 410 */
+ { 0x23, 412, 0, 4, "secp521r1" }, /* 411 */
+ { 0x24, 413, 0, 4, "sect409k1" }, /* 412 */
+ { 0x25, 414, 0, 4, "sect409r1" }, /* 413 */
+ { 0x26, 415, 0, 4, "sect571k1" }, /* 414 */
+ { 0x27, 0, 0, 4, "sect571r1" }, /* 415 */
+ {0x60, 470, 1, 0, "" }, /* 416 */
+ { 0x86, 0, 1, 1, "" }, /* 417 */
+ { 0x48, 0, 1, 2, "" }, /* 418 */
+ { 0x01, 0, 1, 3, "organization" }, /* 419 */
+ { 0x65, 446, 1, 4, "gov" }, /* 420 */
+ { 0x03, 0, 1, 5, "csor" }, /* 421 */
+ { 0x04, 0, 1, 6, "nistalgorithm" }, /* 422 */
+ { 0x01, 433, 1, 7, "aes" }, /* 423 */
+ { 0x02, 425, 0, 8, "id-aes128-CBC" }, /* 424 */
+ { 0x06, 426, 0, 8, "id-aes128-GCM" }, /* 425 */
+ { 0x07, 427, 0, 8, "id-aes128-CCM" }, /* 426 */
+ { 0x16, 428, 0, 8, "id-aes192-CBC" }, /* 427 */
+ { 0x1A, 429, 0, 8, "id-aes192-GCM" }, /* 428 */
+ { 0x1B, 430, 0, 8, "id-aes192-CCM" }, /* 429 */
+ { 0x2A, 431, 0, 8, "id-aes256-CBC" }, /* 430 */
+ { 0x2E, 432, 0, 8, "id-aes256-GCM" }, /* 431 */
+ { 0x2F, 0, 0, 8, "id-aes256-CCM" }, /* 432 */
+ { 0x02, 0, 1, 7, "hashalgs" }, /* 433 */
+ { 0x01, 435, 0, 8, "id-sha256" }, /* 434 */
+ { 0x02, 436, 0, 8, "id-sha384" }, /* 435 */
+ { 0x03, 437, 0, 8, "id-sha512" }, /* 436 */
+ { 0x04, 438, 0, 8, "id-sha224" }, /* 437 */
+ { 0x05, 439, 0, 8, "id-sha512-224" }, /* 438 */
+ { 0x06, 440, 0, 8, "id-sha512-256" }, /* 439 */
+ { 0x07, 441, 0, 8, "id-sha3-224" }, /* 440 */
+ { 0x08, 442, 0, 8, "id-sha3-256" }, /* 441 */
+ { 0x09, 443, 0, 8, "id-sha3-384" }, /* 442 */
+ { 0x0A, 444, 0, 8, "id-sha3-512" }, /* 443 */
+ { 0x0B, 445, 0, 8, "id-shake128" }, /* 444 */
+ { 0x0C, 0, 0, 8, "id-shake256" }, /* 445 */
+ { 0x86, 0, 1, 4, "" }, /* 446 */
+ { 0xf8, 0, 1, 5, "" }, /* 447 */
+ { 0x42, 460, 1, 6, "netscape" }, /* 448 */
+ { 0x01, 455, 1, 7, "" }, /* 449 */
+ { 0x01, 451, 0, 8, "nsCertType" }, /* 450 */
+ { 0x03, 452, 0, 8, "nsRevocationUrl" }, /* 451 */
+ { 0x04, 453, 0, 8, "nsCaRevocationUrl" }, /* 452 */
+ { 0x08, 454, 0, 8, "nsCaPolicyUrl" }, /* 453 */
+ { 0x0d, 0, 0, 8, "nsComment" }, /* 454 */
+ { 0x03, 458, 1, 7, "directory" }, /* 455 */
+ { 0x01, 0, 1, 8, "" }, /* 456 */
+ { 0x03, 0, 0, 9, "employeeNumber" }, /* 457 */
+ { 0x04, 0, 1, 7, "policy" }, /* 458 */
+ { 0x01, 0, 0, 8, "nsSGC" }, /* 459 */
+ { 0x45, 0, 1, 6, "verisign" }, /* 460 */
+ { 0x01, 0, 1, 7, "pki" }, /* 461 */
+ { 0x09, 0, 1, 8, "attributes" }, /* 462 */
+ { 0x02, 464, 0, 9, "messageType" }, /* 463 */
+ { 0x03, 465, 0, 9, "pkiStatus" }, /* 464 */
+ { 0x04, 466, 0, 9, "failInfo" }, /* 465 */
+ { 0x05, 467, 0, 9, "senderNonce" }, /* 466 */
+ { 0x06, 468, 0, 9, "recipientNonce" }, /* 467 */
+ { 0x07, 469, 0, 9, "transID" }, /* 468 */
+ { 0x08, 0, 0, 9, "extensionReq" }, /* 469 */
+ {0x67, 0, 1, 0, "" }, /* 470 */
+ { 0x81, 0, 1, 1, "" }, /* 471 */
+ { 0x05, 0, 1, 2, "" }, /* 472 */
+ { 0x02, 0, 1, 3, "tcg-attribute" }, /* 473 */
+ { 0x01, 475, 0, 4, "tcg-at-tpmManufacturer" }, /* 474 */
+ { 0x02, 476, 0, 4, "tcg-at-tpmModel" }, /* 475 */
+ { 0x03, 477, 0, 4, "tcg-at-tpmVersion" }, /* 476 */
+ { 0x0F, 0, 0, 4, "tcg-at-tpmIdLabel" } /* 477 */
};
diff --git a/src/libstrongswan/asn1/oid.h b/src/libstrongswan/asn1/oid.h
index 0f7c5d644..b9ed08d2e 100644
--- a/src/libstrongswan/asn1/oid.h
+++ b/src/libstrongswan/asn1/oid.h
@@ -150,103 +150,110 @@ extern const oid_t oid_names[];
#define OID_BLISS_B_II 221
#define OID_BLISS_B_III 222
#define OID_BLISS_B_IV 223
-#define OID_BLISS_WITH_SHA512 225
-#define OID_BLISS_WITH_SHA384 226
-#define OID_BLISS_WITH_SHA256 227
-#define OID_TCGID 234
-#define OID_BLOWFISH_CBC 238
-#define OID_AUTHORITY_INFO_ACCESS 282
-#define OID_IP_ADDR_BLOCKS 284
-#define OID_POLICY_QUALIFIER_CPS 286
-#define OID_POLICY_QUALIFIER_UNOTICE 287
-#define OID_SERVER_AUTH 289
-#define OID_CLIENT_AUTH 290
-#define OID_OCSP_SIGNING 297
-#define OID_XMPP_ADDR 303
-#define OID_AUTHENTICATION_INFO 307
-#define OID_ACCESS_IDENTITY 308
-#define OID_CHARGING_IDENTITY 309
-#define OID_GROUP 310
-#define OID_OCSP 313
-#define OID_BASIC 314
-#define OID_NONCE 315
-#define OID_CRL 316
-#define OID_RESPONSE 317
-#define OID_NO_CHECK 318
-#define OID_ARCHIVE_CUTOFF 319
-#define OID_SERVICE_LOCATOR 320
-#define OID_CA_ISSUERS 321
-#define OID_IKE_INTERMEDIATE 326
-#define OID_DES_CBC 330
-#define OID_SHA1 331
-#define OID_SHA1_WITH_RSA_OIW 332
-#define OID_ECGDSA_PUBKEY 351
-#define OID_ECGDSA_SIG_WITH_RIPEMD160 354
-#define OID_ECGDSA_SIG_WITH_SHA1 355
-#define OID_ECGDSA_SIG_WITH_SHA224 356
-#define OID_ECGDSA_SIG_WITH_SHA256 357
-#define OID_ECGDSA_SIG_WITH_SHA384 358
-#define OID_ECGDSA_SIG_WITH_SHA512 359
-#define OID_SECT163K1 382
-#define OID_SECT163R1 383
-#define OID_SECT239K1 384
-#define OID_SECT113R1 385
-#define OID_SECT113R2 386
-#define OID_SECT112R1 387
-#define OID_SECT112R2 388
-#define OID_SECT160R1 389
-#define OID_SECT160K1 390
-#define OID_SECT256K1 391
-#define OID_SECT163R2 392
-#define OID_SECT283K1 393
-#define OID_SECT283R1 394
-#define OID_SECT131R1 395
-#define OID_SECT131R2 396
-#define OID_SECT193R1 397
-#define OID_SECT193R2 398
-#define OID_SECT233K1 399
-#define OID_SECT233R1 400
-#define OID_SECT128R1 401
-#define OID_SECT128R2 402
-#define OID_SECT160R2 403
-#define OID_SECT192K1 404
-#define OID_SECT224K1 405
-#define OID_SECT224R1 406
-#define OID_SECT384R1 407
-#define OID_SECT521R1 408
-#define OID_SECT409K1 409
-#define OID_SECT409R1 410
-#define OID_SECT571K1 411
-#define OID_SECT571R1 412
-#define OID_AES128_CBC 421
-#define OID_AES128_GCM 422
-#define OID_AES128_CCM 423
-#define OID_AES192_CBC 424
-#define OID_AES192_GCM 425
-#define OID_AES192_CCM 426
-#define OID_AES256_CBC 427
-#define OID_AES256_GCM 428
-#define OID_AES256_CCM 429
-#define OID_SHA256 431
-#define OID_SHA384 432
-#define OID_SHA512 433
-#define OID_SHA224 434
-#define OID_NS_REVOCATION_URL 448
-#define OID_NS_CA_REVOCATION_URL 449
-#define OID_NS_CA_POLICY_URL 450
-#define OID_NS_COMMENT 451
-#define OID_EMPLOYEE_NUMBER 454
-#define OID_PKI_MESSAGE_TYPE 460
-#define OID_PKI_STATUS 461
-#define OID_PKI_FAIL_INFO 462
-#define OID_PKI_SENDER_NONCE 463
-#define OID_PKI_RECIPIENT_NONCE 464
-#define OID_PKI_TRANS_ID 465
-#define OID_TPM_MANUFACTURER 471
-#define OID_TPM_MODEL 472
-#define OID_TPM_VERSION 473
-#define OID_TPM_ID_LABEL 474
+#define OID_BLISS_WITH_SHA2_512 225
+#define OID_BLISS_WITH_SHA2_384 226
+#define OID_BLISS_WITH_SHA2_256 227
+#define OID_BLISS_WITH_SHA3_512 228
+#define OID_BLISS_WITH_SHA3_384 229
+#define OID_BLISS_WITH_SHA3_256 230
+#define OID_TCGID 237
+#define OID_BLOWFISH_CBC 241
+#define OID_AUTHORITY_INFO_ACCESS 285
+#define OID_IP_ADDR_BLOCKS 287
+#define OID_POLICY_QUALIFIER_CPS 289
+#define OID_POLICY_QUALIFIER_UNOTICE 290
+#define OID_SERVER_AUTH 292
+#define OID_CLIENT_AUTH 293
+#define OID_OCSP_SIGNING 300
+#define OID_XMPP_ADDR 306
+#define OID_AUTHENTICATION_INFO 310
+#define OID_ACCESS_IDENTITY 311
+#define OID_CHARGING_IDENTITY 312
+#define OID_GROUP 313
+#define OID_OCSP 316
+#define OID_BASIC 317
+#define OID_NONCE 318
+#define OID_CRL 319
+#define OID_RESPONSE 320
+#define OID_NO_CHECK 321
+#define OID_ARCHIVE_CUTOFF 322
+#define OID_SERVICE_LOCATOR 323
+#define OID_CA_ISSUERS 324
+#define OID_IKE_INTERMEDIATE 329
+#define OID_DES_CBC 333
+#define OID_SHA1 334
+#define OID_SHA1_WITH_RSA_OIW 335
+#define OID_ECGDSA_PUBKEY 354
+#define OID_ECGDSA_SIG_WITH_RIPEMD160 357
+#define OID_ECGDSA_SIG_WITH_SHA1 358
+#define OID_ECGDSA_SIG_WITH_SHA224 359
+#define OID_ECGDSA_SIG_WITH_SHA256 360
+#define OID_ECGDSA_SIG_WITH_SHA384 361
+#define OID_ECGDSA_SIG_WITH_SHA512 362
+#define OID_SECT163K1 385
+#define OID_SECT163R1 386
+#define OID_SECT239K1 387
+#define OID_SECT113R1 388
+#define OID_SECT113R2 389
+#define OID_SECT112R1 390
+#define OID_SECT112R2 391
+#define OID_SECT160R1 392
+#define OID_SECT160K1 393
+#define OID_SECT256K1 394
+#define OID_SECT163R2 395
+#define OID_SECT283K1 396
+#define OID_SECT283R1 397
+#define OID_SECT131R1 398
+#define OID_SECT131R2 399
+#define OID_SECT193R1 400
+#define OID_SECT193R2 401
+#define OID_SECT233K1 402
+#define OID_SECT233R1 403
+#define OID_SECT128R1 404
+#define OID_SECT128R2 405
+#define OID_SECT160R2 406
+#define OID_SECT192K1 407
+#define OID_SECT224K1 408
+#define OID_SECT224R1 409
+#define OID_SECT384R1 410
+#define OID_SECT521R1 411
+#define OID_SECT409K1 412
+#define OID_SECT409R1 413
+#define OID_SECT571K1 414
+#define OID_SECT571R1 415
+#define OID_AES128_CBC 424
+#define OID_AES128_GCM 425
+#define OID_AES128_CCM 426
+#define OID_AES192_CBC 427
+#define OID_AES192_GCM 428
+#define OID_AES192_CCM 429
+#define OID_AES256_CBC 430
+#define OID_AES256_GCM 431
+#define OID_AES256_CCM 432
+#define OID_SHA256 434
+#define OID_SHA384 435
+#define OID_SHA512 436
+#define OID_SHA224 437
+#define OID_SHA3_224 440
+#define OID_SHA3_256 441
+#define OID_SHA3_384 442
+#define OID_SHA3_512 443
+#define OID_NS_REVOCATION_URL 451
+#define OID_NS_CA_REVOCATION_URL 452
+#define OID_NS_CA_POLICY_URL 453
+#define OID_NS_COMMENT 454
+#define OID_EMPLOYEE_NUMBER 457
+#define OID_PKI_MESSAGE_TYPE 463
+#define OID_PKI_STATUS 464
+#define OID_PKI_FAIL_INFO 465
+#define OID_PKI_SENDER_NONCE 466
+#define OID_PKI_RECIPIENT_NONCE 467
+#define OID_PKI_TRANS_ID 468
+#define OID_TPM_MANUFACTURER 474
+#define OID_TPM_MODEL 475
+#define OID_TPM_VERSION 476
+#define OID_TPM_ID_LABEL 477
-#define OID_MAX 475
+#define OID_MAX 478
#endif /* OID_H_ */
diff --git a/src/libstrongswan/asn1/oid.txt b/src/libstrongswan/asn1/oid.txt
index 919d24c43..64dedcb33 100644
--- a/src/libstrongswan/asn1/oid.txt
+++ b/src/libstrongswan/asn1/oid.txt
@@ -223,9 +223,12 @@
0x07 "BLISS-B-III" OID_BLISS_B_III
0x08 "BLISS-B-IV" OID_BLISS_B_IV
0x03 "blissSigType"
- 0x01 "BLISS-with-SHA512" OID_BLISS_WITH_SHA512
- 0x02 "BLISS-with-SHA384" OID_BLISS_WITH_SHA384
- 0x03 "BLISS-with-SHA256" OID_BLISS_WITH_SHA256
+ 0x01 "BLISS-with-SHA2-512" OID_BLISS_WITH_SHA2_512
+ 0x02 "BLISS-with-SHA2-384" OID_BLISS_WITH_SHA2_384
+ 0x03 "BLISS-with-SHA2-256" OID_BLISS_WITH_SHA2_256
+ 0x04 "BLISS-with-SHA3-512" OID_BLISS_WITH_SHA3_512
+ 0x05 "BLISS-with-SHA3-384" OID_BLISS_WITH_SHA3_384
+ 0x06 "BLISS-with-SHA3-256" OID_BLISS_WITH_SHA3_256
0x89 ""
0x31 ""
0x01 ""
@@ -435,10 +438,10 @@
0x04 "id-sha224" OID_SHA224
0x05 "id-sha512-224"
0x06 "id-sha512-256"
- 0x07 "id-sha3-224"
- 0x08 "id-sha3-256"
- 0x09 "id-sha3-384"
- 0x0A "id-sha3-512"
+ 0x07 "id-sha3-224" OID_SHA3_224
+ 0x08 "id-sha3-256" OID_SHA3_256
+ 0x09 "id-sha3-384" OID_SHA3_384
+ 0x0A "id-sha3-512" OID_SHA3_512
0x0B "id-shake128"
0x0C "id-shake256"
0x86 ""