From c5d23aa666e91f139d50cb71f3c0386e8a97d87f Mon Sep 17 00:00:00 2001 From: Adeel Mujahid <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 13:25:38 +0300 Subject: [PATCH 1/6] Restructure WellKnownOids.cs --- .../src/System/Formats/Asn1/WellKnownOids.cs | 600 +++++++++--------- 1 file changed, 300 insertions(+), 300 deletions(-) diff --git a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs index cbcd6b39d28ef6..50de0f3a7ab6ba 100644 --- a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs +++ b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs @@ -6,205 +6,6 @@ namespace System.Formats.Asn1 { internal static class WellKnownOids { - private static ReadOnlySpan DSA => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01, }; - private static ReadOnlySpan DSAWithSha1 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03, }; - private static ReadOnlySpan EC => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01, }; - private static ReadOnlySpan EcPrimeField => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01, }; - private static ReadOnlySpan EcChar2Field => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02, }; - private static ReadOnlySpan Secp256r1 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07, }; - private static ReadOnlySpan ECDSAWithSha1 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01, }; - private static ReadOnlySpan ECDSAWithSha256 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02, }; - private static ReadOnlySpan ECDSAWithSha384 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03, }; - private static ReadOnlySpan ECDSAWithSha512 => - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04, }; - private static ReadOnlySpan RSA => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, }; - private static ReadOnlySpan RSAWithSha1 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, }; - private static ReadOnlySpan RSAOAEP => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07, }; - private static ReadOnlySpan MGF1 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08, }; - private static ReadOnlySpan OaepPSpecified => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09, }; - private static ReadOnlySpan RSAPSS => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A, }; - private static ReadOnlySpan RSAWithSha256 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B, }; - private static ReadOnlySpan RSAWithSha384 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C, }; - private static ReadOnlySpan RSAWithSha512 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D, }; - private static ReadOnlySpan PbeWithMD5AndDESCBC => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03, }; - private static ReadOnlySpan PbeWithSha1AndDESCBC => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A, }; - private static ReadOnlySpan PbeWithSha1AndRC2CBC => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B, }; - private static ReadOnlySpan Pbkdf2 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C, }; - private static ReadOnlySpan PasswordBasedEncryptionScheme2 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D, }; - private static ReadOnlySpan Pkcs7Data => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, }; - private static ReadOnlySpan Pkcs7SignedData => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02, }; - private static ReadOnlySpan Pkcs7EnvelopedData => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03, }; - private static ReadOnlySpan Pkcs7EncryptedData => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06, }; - private static ReadOnlySpan Pkcs9EmailAddress => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, }; - private static ReadOnlySpan Pkcs9ContentType => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03, }; - private static ReadOnlySpan Pkcs9MessageDigest => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04, }; - private static ReadOnlySpan Pkcs9SigningTime => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05, }; - private static ReadOnlySpan Pkcs9CounterSigner => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06, }; - private static ReadOnlySpan Pkcs9Challenge => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07, }; - private static ReadOnlySpan Pkcs9ExtensionRequest => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E, }; - private static ReadOnlySpan Pkcs9SMimeCapabilities => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F, }; - private static ReadOnlySpan TstInfo => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04, }; - private static ReadOnlySpan SigningCertificateAttr => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C, }; - private static ReadOnlySpan SignatureTimeStampAttr => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E, }; - private static ReadOnlySpan SigningCertificateV2Attr => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F, }; - private static ReadOnlySpan Pkcs9FriendlyName => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14, }; - private static ReadOnlySpan LocalKeyId => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15, }; - private static ReadOnlySpan Pkcs12X509CertType => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01, }; - private static ReadOnlySpan Pkcs12TripleDes => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03, }; - private static ReadOnlySpan Pkcs12Rc2Cbc128 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05, }; - private static ReadOnlySpan Pkcs12Rc2Cbc40 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06, }; - private static ReadOnlySpan Pkcs12KeyBag => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01, }; - private static ReadOnlySpan Pkcs12ShroudedKeyBag => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02, }; - private static ReadOnlySpan Pkcs12CertBag => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03, }; - private static ReadOnlySpan Pkcs12SecretBag => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05, }; - private static ReadOnlySpan Pkcs12SafeContentsBag => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06, }; - private static ReadOnlySpan MD5 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, }; - private static ReadOnlySpan HMACSHA1 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07, }; - private static ReadOnlySpan HMACSHA256 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09, }; - private static ReadOnlySpan HMACSHA384 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A, }; - private static ReadOnlySpan HMACSHA512 => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B, }; - private static ReadOnlySpan RC2CBC => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02, }; - private static ReadOnlySpan TripleDESCBC => - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07, }; - private static ReadOnlySpan Pkcs12KeyProviderName => - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01, }; - private static ReadOnlySpan KeyIdentifier => - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14, }; - private static ReadOnlySpan UserPrincipalName => - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03, }; - private static ReadOnlySpan DocumentNameAttr => - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01, }; - private static ReadOnlySpan DocumentDescriptionAttr => - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02, }; - private static ReadOnlySpan KeyPurposeTlsServer => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01, }; - private static ReadOnlySpan KeyPurposeTlsClient => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02, }; - private static ReadOnlySpan KeyPurposeCodeSign => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03, }; - private static ReadOnlySpan KeyPurposeEmailProtection => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04, }; - private static ReadOnlySpan KeyPurposeTimestamping => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08, }; - private static ReadOnlySpan KeyPurposeOcspSigner => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09, }; - private static ReadOnlySpan Pkcs7NoSignature => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02, }; - private static ReadOnlySpan OCSP => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, }; - private static ReadOnlySpan OcspNonce => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02, }; - private static ReadOnlySpan CAIssuers => - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02, }; - private static ReadOnlySpan SHA1 => - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A, }; - private static ReadOnlySpan DES => - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07, }; - private static ReadOnlySpan Secp384r1 => - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22, }; - private static ReadOnlySpan Secp521r1 => - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23, }; - private static ReadOnlySpan CommonName => - new byte[] { 0x55, 0x04, 0x03, }; - private static ReadOnlySpan SerialNumber => - new byte[] { 0x55, 0x04, 0x05, }; - private static ReadOnlySpan CountryOrRegionName => - new byte[] { 0x55, 0x04, 0x06, }; - private static ReadOnlySpan Locality => - new byte[] { 0x55, 0x04, 0x07, }; - private static ReadOnlySpan StateOrProvinceName => - new byte[] { 0x55, 0x04, 0x08, }; - private static ReadOnlySpan OrganizationName => - new byte[] { 0x55, 0x04, 0x0A, }; - private static ReadOnlySpan OrganizationalUnit => - new byte[] { 0x55, 0x04, 0x0B, }; - private static ReadOnlySpan OrganizationIdentifier => - new byte[] { 0x55, 0x04, 0x61, }; - private static ReadOnlySpan SubjectKeyIdentifier => - new byte[] { 0x55, 0x1D, 0x0E, }; - private static ReadOnlySpan KeyUsage => - new byte[] { 0x55, 0x1D, 0x0F, }; - private static ReadOnlySpan SubjectAlternativeName => - new byte[] { 0x55, 0x1D, 0x11, }; - private static ReadOnlySpan BasicConstraints => - new byte[] { 0x55, 0x1D, 0x13, }; - private static ReadOnlySpan CrlNumber => - new byte[] { 0x55, 0x1D, 0x14, }; - private static ReadOnlySpan AuthorityKeyIdentifier => - new byte[] { 0x55, 0x1D, 0x23, }; - private static ReadOnlySpan Aes128Cbc => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02, }; - private static ReadOnlySpan Aes192Cbc => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16, }; - private static ReadOnlySpan Aes256Cbc => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A, }; - private static ReadOnlySpan Sha256 => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, }; - private static ReadOnlySpan Sha384 => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, }; - private static ReadOnlySpan Sha512 => - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, }; - private static ReadOnlySpan CabForumDV => - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01, }; - private static ReadOnlySpan CabForumOV => - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02, }; - internal static string? GetValue(ReadOnlySpan contents) { return contents switch @@ -314,108 +115,307 @@ internal static class WellKnownOids internal static ReadOnlySpan GetContents(ReadOnlySpan value) { - return value switch + ReadOnlySpan DSA = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01, }; + ReadOnlySpan DSAWithSha1 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03, }; + ReadOnlySpan EC = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01, }; + ReadOnlySpan EcPrimeField = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01, }; + ReadOnlySpan EcChar2Field = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02, }; + ReadOnlySpan Secp256r1 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07, }; + ReadOnlySpan ECDSAWithSha1 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01, }; + ReadOnlySpan ECDSAWithSha256 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02, }; + ReadOnlySpan ECDSAWithSha384 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03, }; + ReadOnlySpan ECDSAWithSha512 = + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04, }; + ReadOnlySpan RSA = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, }; + ReadOnlySpan RSAWithSha1 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, }; + ReadOnlySpan RSAOAEP = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07, }; + ReadOnlySpan MGF1 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08, }; + ReadOnlySpan OaepPSpecified = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09, }; + ReadOnlySpan RSAPSS = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A, }; + ReadOnlySpan RSAWithSha256 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B, }; + ReadOnlySpan RSAWithSha384 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C, }; + ReadOnlySpan RSAWithSha512 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D, }; + ReadOnlySpan PbeWithMD5AndDESCBC = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03, }; + ReadOnlySpan PbeWithSha1AndDESCBC = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A, }; + ReadOnlySpan PbeWithSha1AndRC2CBC = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B, }; + ReadOnlySpan Pbkdf2 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C, }; + ReadOnlySpan PasswordBasedEncryptionScheme2 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D, }; + ReadOnlySpan Pkcs7Data = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, }; + ReadOnlySpan Pkcs7SignedData = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02, }; + ReadOnlySpan Pkcs7EnvelopedData = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03, }; + ReadOnlySpan Pkcs7EncryptedData = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06, }; + ReadOnlySpan Pkcs9EmailAddress = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, }; + ReadOnlySpan Pkcs9ContentType = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03, }; + ReadOnlySpan Pkcs9MessageDigest = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04, }; + ReadOnlySpan Pkcs9SigningTime = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05, }; + ReadOnlySpan Pkcs9CounterSigner = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06, }; + ReadOnlySpan Pkcs9Challenge = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07, }; + ReadOnlySpan Pkcs9ExtensionRequest = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E, }; + ReadOnlySpan Pkcs9SMimeCapabilities = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F, }; + ReadOnlySpan TstInfo = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04, }; + ReadOnlySpan SigningCertificateAttr = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C, }; + ReadOnlySpan SignatureTimeStampAttr = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E, }; + ReadOnlySpan SigningCertificateV2Attr = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F, }; + ReadOnlySpan Pkcs9FriendlyName = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14, }; + ReadOnlySpan LocalKeyId = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15, }; + ReadOnlySpan Pkcs12X509CertType = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01, }; + ReadOnlySpan Pkcs12TripleDes = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03, }; + ReadOnlySpan Pkcs12Rc2Cbc128 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05, }; + ReadOnlySpan Pkcs12Rc2Cbc40 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06, }; + ReadOnlySpan Pkcs12KeyBag = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01, }; + ReadOnlySpan Pkcs12ShroudedKeyBag = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02, }; + ReadOnlySpan Pkcs12CertBag = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03, }; + ReadOnlySpan Pkcs12SecretBag = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05, }; + ReadOnlySpan Pkcs12SafeContentsBag = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06, }; + ReadOnlySpan MD5 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, }; + ReadOnlySpan HMACSHA1 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07, }; + ReadOnlySpan HMACSHA256 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09, }; + ReadOnlySpan HMACSHA384 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A, }; + ReadOnlySpan HMACSHA512 = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B, }; + ReadOnlySpan RC2CBC = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02, }; + ReadOnlySpan TripleDESCBC = + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07, }; + ReadOnlySpan Pkcs12KeyProviderName = + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01, }; + ReadOnlySpan KeyIdentifier = + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14, }; + ReadOnlySpan UserPrincipalName = + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03, }; + ReadOnlySpan DocumentNameAttr = + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01, }; + ReadOnlySpan DocumentDescriptionAttr = + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02, }; + ReadOnlySpan KeyPurposeTlsServer = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01, }; + ReadOnlySpan KeyPurposeTlsClient = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02, }; + ReadOnlySpan KeyPurposeCodeSign = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03, }; + ReadOnlySpan KeyPurposeEmailProtection = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04, }; + ReadOnlySpan KeyPurposeTimestamping = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08, }; + ReadOnlySpan KeyPurposeOcspSigner = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09, }; + ReadOnlySpan Pkcs7NoSignature = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02, }; + ReadOnlySpan OCSP = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, }; + ReadOnlySpan OcspNonce = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02, }; + ReadOnlySpan CAIssuers = + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02, }; + ReadOnlySpan SHA1 = + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A, }; + ReadOnlySpan DES = + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07, }; + ReadOnlySpan Secp384r1 = + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22, }; + ReadOnlySpan Secp521r1 = + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23, }; + ReadOnlySpan CommonName = + new byte[] { 0x55, 0x04, 0x03, }; + ReadOnlySpan SerialNumber = + new byte[] { 0x55, 0x04, 0x05, }; + ReadOnlySpan CountryOrRegionName = + new byte[] { 0x55, 0x04, 0x06, }; + ReadOnlySpan Locality = + new byte[] { 0x55, 0x04, 0x07, }; + ReadOnlySpan StateOrProvinceName = + new byte[] { 0x55, 0x04, 0x08, }; + ReadOnlySpan OrganizationName = + new byte[] { 0x55, 0x04, 0x0A, }; + ReadOnlySpan OrganizationalUnit = + new byte[] { 0x55, 0x04, 0x0B, }; + ReadOnlySpan OrganizationIdentifier = + new byte[] { 0x55, 0x04, 0x61, }; + ReadOnlySpan SubjectKeyIdentifier = + new byte[] { 0x55, 0x1D, 0x0E, }; + ReadOnlySpan KeyUsage = + new byte[] { 0x55, 0x1D, 0x0F, }; + ReadOnlySpan SubjectAlternativeName = + new byte[] { 0x55, 0x1D, 0x11, }; + ReadOnlySpan BasicConstraints = + new byte[] { 0x55, 0x1D, 0x13, }; + ReadOnlySpan CrlNumber = + new byte[] { 0x55, 0x1D, 0x14, }; + ReadOnlySpan AuthorityKeyIdentifier = + new byte[] { 0x55, 0x1D, 0x23, }; + ReadOnlySpan Aes128Cbc = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02, }; + ReadOnlySpan Aes192Cbc = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16, }; + ReadOnlySpan Aes256Cbc = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A, }; + ReadOnlySpan Sha256 = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, }; + ReadOnlySpan Sha384 = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, }; + ReadOnlySpan Sha512 = + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, }; + ReadOnlySpan CabForumDV = + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01, }; + ReadOnlySpan CabForumOV = + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02, }; + + switch (value) { - "1.2.840.10040.4.1" => DSA, - "1.2.840.10040.4.3" => DSAWithSha1, - "1.2.840.10045.2.1" => EC, - "1.2.840.10045.1.1" => EcPrimeField, - "1.2.840.10045.1.2" => EcChar2Field, - "1.2.840.10045.3.1.7" => Secp256r1, - "1.2.840.10045.4.1" => ECDSAWithSha1, - "1.2.840.10045.4.3.2" => ECDSAWithSha256, - "1.2.840.10045.4.3.3" => ECDSAWithSha384, - "1.2.840.10045.4.3.4" => ECDSAWithSha512, - "1.2.840.113549.1.1.1" => RSA, - "1.2.840.113549.1.1.5" => RSAWithSha1, - "1.2.840.113549.1.1.7" => RSAOAEP, - "1.2.840.113549.1.1.8" => MGF1, - "1.2.840.113549.1.1.9" => OaepPSpecified, - "1.2.840.113549.1.1.10" => RSAPSS, - "1.2.840.113549.1.1.11" => RSAWithSha256, - "1.2.840.113549.1.1.12" => RSAWithSha384, - "1.2.840.113549.1.1.13" => RSAWithSha512, - "1.2.840.113549.1.5.3" => PbeWithMD5AndDESCBC, - "1.2.840.113549.1.5.10" => PbeWithSha1AndDESCBC, - "1.2.840.113549.1.5.11" => PbeWithSha1AndRC2CBC, - "1.2.840.113549.1.5.12" => Pbkdf2, - "1.2.840.113549.1.5.13" => PasswordBasedEncryptionScheme2, - "1.2.840.113549.1.7.1" => Pkcs7Data, - "1.2.840.113549.1.7.2" => Pkcs7SignedData, - "1.2.840.113549.1.7.3" => Pkcs7EnvelopedData, - "1.2.840.113549.1.7.6" => Pkcs7EncryptedData, - "1.2.840.113549.1.9.1" => Pkcs9EmailAddress, - "1.2.840.113549.1.9.3" => Pkcs9ContentType, - "1.2.840.113549.1.9.4" => Pkcs9MessageDigest, - "1.2.840.113549.1.9.5" => Pkcs9SigningTime, - "1.2.840.113549.1.9.6" => Pkcs9CounterSigner, - "1.2.840.113549.1.9.7" => Pkcs9Challenge, - "1.2.840.113549.1.9.14" => Pkcs9ExtensionRequest, - "1.2.840.113549.1.9.15" => Pkcs9SMimeCapabilities, - "1.2.840.113549.1.9.16.1.4" => TstInfo, - "1.2.840.113549.1.9.16.2.12" => SigningCertificateAttr, - "1.2.840.113549.1.9.16.2.14" => SignatureTimeStampAttr, - "1.2.840.113549.1.9.16.2.47" => SigningCertificateV2Attr, - "1.2.840.113549.1.9.20" => Pkcs9FriendlyName, - "1.2.840.113549.1.9.21" => LocalKeyId, - "1.2.840.113549.1.9.22.1" => Pkcs12X509CertType, - "1.2.840.113549.1.12.1.3" => Pkcs12TripleDes, - "1.2.840.113549.1.12.1.5" => Pkcs12Rc2Cbc128, - "1.2.840.113549.1.12.1.6" => Pkcs12Rc2Cbc40, - "1.2.840.113549.1.12.10.1.1" => Pkcs12KeyBag, - "1.2.840.113549.1.12.10.1.2" => Pkcs12ShroudedKeyBag, - "1.2.840.113549.1.12.10.1.3" => Pkcs12CertBag, - "1.2.840.113549.1.12.10.1.5" => Pkcs12SecretBag, - "1.2.840.113549.1.12.10.1.6" => Pkcs12SafeContentsBag, - "1.2.840.113549.2.5" => MD5, - "1.2.840.113549.2.7" => HMACSHA1, - "1.2.840.113549.2.9" => HMACSHA256, - "1.2.840.113549.2.10" => HMACSHA384, - "1.2.840.113549.2.11" => HMACSHA512, - "1.2.840.113549.3.2" => RC2CBC, - "1.2.840.113549.3.7" => TripleDESCBC, - "1.3.6.1.4.1.311.17.1" => Pkcs12KeyProviderName, - "1.3.6.1.4.1.311.17.3.20" => KeyIdentifier, - "1.3.6.1.4.1.311.20.2.3" => UserPrincipalName, - "1.3.6.1.4.1.311.88.2.1" => DocumentNameAttr, - "1.3.6.1.4.1.311.88.2.2" => DocumentDescriptionAttr, - "1.3.6.1.5.5.7.3.1" => KeyPurposeTlsServer, - "1.3.6.1.5.5.7.3.2" => KeyPurposeTlsClient, - "1.3.6.1.5.5.7.3.3" => KeyPurposeCodeSign, - "1.3.6.1.5.5.7.3.4" => KeyPurposeEmailProtection, - "1.3.6.1.5.5.7.3.8" => KeyPurposeTimestamping, - "1.3.6.1.5.5.7.3.9" => KeyPurposeOcspSigner, - "1.3.6.1.5.5.7.6.2" => Pkcs7NoSignature, - "1.3.6.1.5.5.7.48.1" => OCSP, - "1.3.6.1.5.5.7.48.1.2" => OcspNonce, - "1.3.6.1.5.5.7.48.2" => CAIssuers, - "1.3.14.3.2.26" => SHA1, - "1.3.14.3.2.7" => DES, - "1.3.132.0.34" => Secp384r1, - "1.3.132.0.35" => Secp521r1, - "2.5.4.3" => CommonName, - "2.5.4.5" => SerialNumber, - "2.5.4.6" => CountryOrRegionName, - "2.5.4.7" => Locality, - "2.5.4.8" => StateOrProvinceName, - "2.5.4.10" => OrganizationName, - "2.5.4.11" => OrganizationalUnit, - "2.5.4.97" => OrganizationIdentifier, - "2.5.29.14" => SubjectKeyIdentifier, - "2.5.29.15" => KeyUsage, - "2.5.29.17" => SubjectAlternativeName, - "2.5.29.19" => BasicConstraints, - "2.5.29.20" => CrlNumber, - "2.5.29.35" => AuthorityKeyIdentifier, - "2.16.840.1.101.3.4.1.2" => Aes128Cbc, - "2.16.840.1.101.3.4.1.22" => Aes192Cbc, - "2.16.840.1.101.3.4.1.42" => Aes256Cbc, - "2.16.840.1.101.3.4.2.1" => Sha256, - "2.16.840.1.101.3.4.2.2" => Sha384, - "2.16.840.1.101.3.4.2.3" => Sha512, - "2.23.140.1.2.1" => CabForumDV, - "2.23.140.1.2.2" => CabForumOV, - _ => ReadOnlySpan.Empty, + case "1.2.840.10040.4.1": return DSA; + case "1.2.840.10040.4.3": return DSAWithSha1; + case "1.2.840.10045.2.1": return EC; + case "1.2.840.10045.1.1": return EcPrimeField; + case "1.2.840.10045.1.2": return EcChar2Field; + case "1.2.840.10045.3.1.7": return Secp256r1; + case "1.2.840.10045.4.1": return ECDSAWithSha1; + case "1.2.840.10045.4.3.2": return ECDSAWithSha256; + case "1.2.840.10045.4.3.3": return ECDSAWithSha384; + case "1.2.840.10045.4.3.4": return ECDSAWithSha512; + case "1.2.840.113549.1.1.1": return RSA; + case "1.2.840.113549.1.1.5": return RSAWithSha1; + case "1.2.840.113549.1.1.7": return RSAOAEP; + case "1.2.840.113549.1.1.8": return MGF1; + case "1.2.840.113549.1.1.9": return OaepPSpecified; + case "1.2.840.113549.1.1.10": return RSAPSS; + case "1.2.840.113549.1.1.11": return RSAWithSha256; + case "1.2.840.113549.1.1.12": return RSAWithSha384; + case "1.2.840.113549.1.1.13": return RSAWithSha512; + case "1.2.840.113549.1.5.3": return PbeWithMD5AndDESCBC; + case "1.2.840.113549.1.5.10": return PbeWithSha1AndDESCBC; + case "1.2.840.113549.1.5.11": return PbeWithSha1AndRC2CBC; + case "1.2.840.113549.1.5.12": return Pbkdf2; + case "1.2.840.113549.1.5.13": return PasswordBasedEncryptionScheme2; + case "1.2.840.113549.1.7.1": return Pkcs7Data; + case "1.2.840.113549.1.7.2": return Pkcs7SignedData; + case "1.2.840.113549.1.7.3": return Pkcs7EnvelopedData; + case "1.2.840.113549.1.7.6": return Pkcs7EncryptedData; + case "1.2.840.113549.1.9.1": return Pkcs9EmailAddress; + case "1.2.840.113549.1.9.3": return Pkcs9ContentType; + case "1.2.840.113549.1.9.4": return Pkcs9MessageDigest; + case "1.2.840.113549.1.9.5": return Pkcs9SigningTime; + case "1.2.840.113549.1.9.6": return Pkcs9CounterSigner; + case "1.2.840.113549.1.9.7": return Pkcs9Challenge; + case "1.2.840.113549.1.9.14": return Pkcs9ExtensionRequest; + case "1.2.840.113549.1.9.15": return Pkcs9SMimeCapabilities; + case "1.2.840.113549.1.9.16.1.4": return TstInfo; + case "1.2.840.113549.1.9.16.2.12": return SigningCertificateAttr; + case "1.2.840.113549.1.9.16.2.14": return SignatureTimeStampAttr; + case "1.2.840.113549.1.9.16.2.47": return SigningCertificateV2Attr; + case "1.2.840.113549.1.9.20": return Pkcs9FriendlyName; + case "1.2.840.113549.1.9.21": return LocalKeyId; + case "1.2.840.113549.1.9.22.1": return Pkcs12X509CertType; + case "1.2.840.113549.1.12.1.3": return Pkcs12TripleDes; + case "1.2.840.113549.1.12.1.5": return Pkcs12Rc2Cbc128; + case "1.2.840.113549.1.12.1.6": return Pkcs12Rc2Cbc40; + case "1.2.840.113549.1.12.10.1.1": return Pkcs12KeyBag; + case "1.2.840.113549.1.12.10.1.2": return Pkcs12ShroudedKeyBag; + case "1.2.840.113549.1.12.10.1.3": return Pkcs12CertBag; + case "1.2.840.113549.1.12.10.1.5": return Pkcs12SecretBag; + case "1.2.840.113549.1.12.10.1.6": return Pkcs12SafeContentsBag; + case "1.2.840.113549.2.5": return MD5; + case "1.2.840.113549.2.7": return HMACSHA1; + case "1.2.840.113549.2.9": return HMACSHA256; + case "1.2.840.113549.2.10": return HMACSHA384; + case "1.2.840.113549.2.11": return HMACSHA512; + case "1.2.840.113549.3.2": return RC2CBC; + case "1.2.840.113549.3.7": return TripleDESCBC; + case "1.3.6.1.4.1.311.17.1": return Pkcs12KeyProviderName; + case "1.3.6.1.4.1.311.17.3.20": return KeyIdentifier; + case "1.3.6.1.4.1.311.20.2.3": return UserPrincipalName; + case "1.3.6.1.4.1.311.88.2.1": return DocumentNameAttr; + case "1.3.6.1.4.1.311.88.2.2": return DocumentDescriptionAttr; + case "1.3.6.1.5.5.7.3.1": return KeyPurposeTlsServer; + case "1.3.6.1.5.5.7.3.2": return KeyPurposeTlsClient; + case "1.3.6.1.5.5.7.3.3": return KeyPurposeCodeSign; + case "1.3.6.1.5.5.7.3.4": return KeyPurposeEmailProtection; + case "1.3.6.1.5.5.7.3.8": return KeyPurposeTimestamping; + case "1.3.6.1.5.5.7.3.9": return KeyPurposeOcspSigner; + case "1.3.6.1.5.5.7.6.2": return Pkcs7NoSignature; + case "1.3.6.1.5.5.7.48.1": return OCSP; + case "1.3.6.1.5.5.7.48.1.2": return OcspNonce; + case "1.3.6.1.5.5.7.48.2": return CAIssuers; + case "1.3.14.3.2.26": return SHA1; + case "1.3.14.3.2.7": return DES; + case "1.3.132.0.34": return Secp384r1; + case "1.3.132.0.35": return Secp521r1; + case "2.5.4.3": return CommonName; + case "2.5.4.5": return SerialNumber; + case "2.5.4.6": return CountryOrRegionName; + case "2.5.4.7": return Locality; + case "2.5.4.8": return StateOrProvinceName; + case "2.5.4.10": return OrganizationName; + case "2.5.4.11": return OrganizationalUnit; + case "2.5.4.97": return OrganizationIdentifier; + case "2.5.29.14": return SubjectKeyIdentifier; + case "2.5.29.15": return KeyUsage; + case "2.5.29.17": return SubjectAlternativeName; + case "2.5.29.19": return BasicConstraints; + case "2.5.29.20": return CrlNumber; + case "2.5.29.35": return AuthorityKeyIdentifier; + case "2.16.840.1.101.3.4.1.2": return Aes128Cbc; + case "2.16.840.1.101.3.4.1.22": return Aes192Cbc; + case "2.16.840.1.101.3.4.1.42": return Aes256Cbc; + case "2.16.840.1.101.3.4.2.1": return Sha256; + case "2.16.840.1.101.3.4.2.2": return Sha384; + case "2.16.840.1.101.3.4.2.3": return Sha512; + case "2.23.140.1.2.1": return CabForumDV; + case "2.23.140.1.2.2": return CabForumOV; + default: return ReadOnlySpan.Empty; }; } } From c07669004da182e99e43faa77d42512fb0da2295 Mon Sep 17 00:00:00 2001 From: Adeel <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 15:05:58 +0300 Subject: [PATCH 2/6] Revert to switch expr --- .../src/System/Formats/Asn1/WellKnownOids.cs | 400 +++++++++--------- 1 file changed, 200 insertions(+), 200 deletions(-) diff --git a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs index 50de0f3a7ab6ba..f5cbfd96bdaa52 100644 --- a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs +++ b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs @@ -116,306 +116,306 @@ internal static class WellKnownOids internal static ReadOnlySpan GetContents(ReadOnlySpan value) { ReadOnlySpan DSA = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01 }, ReadOnlySpan DSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03 }, ReadOnlySpan EC = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 }, ReadOnlySpan EcPrimeField = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01 }, ReadOnlySpan EcChar2Field = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02 }, ReadOnlySpan Secp256r1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07 }, ReadOnlySpan ECDSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01 }, ReadOnlySpan ECDSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02 }, ReadOnlySpan ECDSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03 }, ReadOnlySpan ECDSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04, }; + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04 }, ReadOnlySpan RSA = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01 }, ReadOnlySpan RSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05 }, ReadOnlySpan RSAOAEP = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07 }, ReadOnlySpan MGF1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08 }, ReadOnlySpan OaepPSpecified = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09 }, ReadOnlySpan RSAPSS = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A }, ReadOnlySpan RSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B }, ReadOnlySpan RSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C }, ReadOnlySpan RSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D }, ReadOnlySpan PbeWithMD5AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03 }, ReadOnlySpan PbeWithSha1AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A }, ReadOnlySpan PbeWithSha1AndRC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B }, ReadOnlySpan Pbkdf2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C }, ReadOnlySpan PasswordBasedEncryptionScheme2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D }, ReadOnlySpan Pkcs7Data = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01 }, ReadOnlySpan Pkcs7SignedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02 }, ReadOnlySpan Pkcs7EnvelopedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03 }, ReadOnlySpan Pkcs7EncryptedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06 }, ReadOnlySpan Pkcs9EmailAddress = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01 }, ReadOnlySpan Pkcs9ContentType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03 }, ReadOnlySpan Pkcs9MessageDigest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04 }, ReadOnlySpan Pkcs9SigningTime = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05 }, ReadOnlySpan Pkcs9CounterSigner = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06 }, ReadOnlySpan Pkcs9Challenge = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07 }, ReadOnlySpan Pkcs9ExtensionRequest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E }, ReadOnlySpan Pkcs9SMimeCapabilities = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F }, ReadOnlySpan TstInfo = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04 }, ReadOnlySpan SigningCertificateAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C }, ReadOnlySpan SignatureTimeStampAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E }, ReadOnlySpan SigningCertificateV2Attr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F }, ReadOnlySpan Pkcs9FriendlyName = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14 }, ReadOnlySpan LocalKeyId = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15 }, ReadOnlySpan Pkcs12X509CertType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01 }, ReadOnlySpan Pkcs12TripleDes = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03 }, ReadOnlySpan Pkcs12Rc2Cbc128 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05 }, ReadOnlySpan Pkcs12Rc2Cbc40 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06 }, ReadOnlySpan Pkcs12KeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01 }, ReadOnlySpan Pkcs12ShroudedKeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02 }, ReadOnlySpan Pkcs12CertBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03 }, ReadOnlySpan Pkcs12SecretBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05 }, ReadOnlySpan Pkcs12SafeContentsBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06 }, ReadOnlySpan MD5 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05 }, ReadOnlySpan HMACSHA1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07 }, ReadOnlySpan HMACSHA256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09 }, ReadOnlySpan HMACSHA384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A }, ReadOnlySpan HMACSHA512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B }, ReadOnlySpan RC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02 }, ReadOnlySpan TripleDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07, }; + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07 }, ReadOnlySpan Pkcs12KeyProviderName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01, }; + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01 }, ReadOnlySpan KeyIdentifier = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14, }; + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14 }, ReadOnlySpan UserPrincipalName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03, }; + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03 }, ReadOnlySpan DocumentNameAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01, }; + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01 }, ReadOnlySpan DocumentDescriptionAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02, }; + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02 }, ReadOnlySpan KeyPurposeTlsServer = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01 }, ReadOnlySpan KeyPurposeTlsClient = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02 }, ReadOnlySpan KeyPurposeCodeSign = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03 }, ReadOnlySpan KeyPurposeEmailProtection = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04 }, ReadOnlySpan KeyPurposeTimestamping = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08 }, ReadOnlySpan KeyPurposeOcspSigner = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09 }, ReadOnlySpan Pkcs7NoSignature = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02 }, ReadOnlySpan OCSP = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01 }, ReadOnlySpan OcspNonce = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02 }, ReadOnlySpan CAIssuers = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02, }; + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02 }, ReadOnlySpan SHA1 = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A, }; + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A }, ReadOnlySpan DES = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07, }; + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07 }, ReadOnlySpan Secp384r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22, }; + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22 }, ReadOnlySpan Secp521r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23, }; + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23 }, ReadOnlySpan CommonName = - new byte[] { 0x55, 0x04, 0x03, }; + new byte[] { 0x55, 0x04, 0x03 }, ReadOnlySpan SerialNumber = - new byte[] { 0x55, 0x04, 0x05, }; + new byte[] { 0x55, 0x04, 0x05 }, ReadOnlySpan CountryOrRegionName = - new byte[] { 0x55, 0x04, 0x06, }; + new byte[] { 0x55, 0x04, 0x06 }, ReadOnlySpan Locality = - new byte[] { 0x55, 0x04, 0x07, }; + new byte[] { 0x55, 0x04, 0x07 }, ReadOnlySpan StateOrProvinceName = - new byte[] { 0x55, 0x04, 0x08, }; + new byte[] { 0x55, 0x04, 0x08 }, ReadOnlySpan OrganizationName = - new byte[] { 0x55, 0x04, 0x0A, }; + new byte[] { 0x55, 0x04, 0x0A }, ReadOnlySpan OrganizationalUnit = - new byte[] { 0x55, 0x04, 0x0B, }; + new byte[] { 0x55, 0x04, 0x0B }, ReadOnlySpan OrganizationIdentifier = - new byte[] { 0x55, 0x04, 0x61, }; + new byte[] { 0x55, 0x04, 0x61 }, ReadOnlySpan SubjectKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x0E, }; + new byte[] { 0x55, 0x1D, 0x0E }, ReadOnlySpan KeyUsage = - new byte[] { 0x55, 0x1D, 0x0F, }; + new byte[] { 0x55, 0x1D, 0x0F }, ReadOnlySpan SubjectAlternativeName = - new byte[] { 0x55, 0x1D, 0x11, }; + new byte[] { 0x55, 0x1D, 0x11 }, ReadOnlySpan BasicConstraints = - new byte[] { 0x55, 0x1D, 0x13, }; + new byte[] { 0x55, 0x1D, 0x13 }, ReadOnlySpan CrlNumber = - new byte[] { 0x55, 0x1D, 0x14, }; + new byte[] { 0x55, 0x1D, 0x14 }, ReadOnlySpan AuthorityKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x23, }; + new byte[] { 0x55, 0x1D, 0x23 }, ReadOnlySpan Aes128Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02 }, ReadOnlySpan Aes192Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16 }, ReadOnlySpan Aes256Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A }, ReadOnlySpan Sha256 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01 }, ReadOnlySpan Sha384 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02 }, ReadOnlySpan Sha512 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, }; + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03 }, ReadOnlySpan CabForumDV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01, }; + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01 }, ReadOnlySpan CabForumOV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02, }; + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02 }, - switch (value) + return value switch { - case "1.2.840.10040.4.1": return DSA; - case "1.2.840.10040.4.3": return DSAWithSha1; - case "1.2.840.10045.2.1": return EC; - case "1.2.840.10045.1.1": return EcPrimeField; - case "1.2.840.10045.1.2": return EcChar2Field; - case "1.2.840.10045.3.1.7": return Secp256r1; - case "1.2.840.10045.4.1": return ECDSAWithSha1; - case "1.2.840.10045.4.3.2": return ECDSAWithSha256; - case "1.2.840.10045.4.3.3": return ECDSAWithSha384; - case "1.2.840.10045.4.3.4": return ECDSAWithSha512; - case "1.2.840.113549.1.1.1": return RSA; - case "1.2.840.113549.1.1.5": return RSAWithSha1; - case "1.2.840.113549.1.1.7": return RSAOAEP; - case "1.2.840.113549.1.1.8": return MGF1; - case "1.2.840.113549.1.1.9": return OaepPSpecified; - case "1.2.840.113549.1.1.10": return RSAPSS; - case "1.2.840.113549.1.1.11": return RSAWithSha256; - case "1.2.840.113549.1.1.12": return RSAWithSha384; - case "1.2.840.113549.1.1.13": return RSAWithSha512; - case "1.2.840.113549.1.5.3": return PbeWithMD5AndDESCBC; - case "1.2.840.113549.1.5.10": return PbeWithSha1AndDESCBC; - case "1.2.840.113549.1.5.11": return PbeWithSha1AndRC2CBC; - case "1.2.840.113549.1.5.12": return Pbkdf2; - case "1.2.840.113549.1.5.13": return PasswordBasedEncryptionScheme2; - case "1.2.840.113549.1.7.1": return Pkcs7Data; - case "1.2.840.113549.1.7.2": return Pkcs7SignedData; - case "1.2.840.113549.1.7.3": return Pkcs7EnvelopedData; - case "1.2.840.113549.1.7.6": return Pkcs7EncryptedData; - case "1.2.840.113549.1.9.1": return Pkcs9EmailAddress; - case "1.2.840.113549.1.9.3": return Pkcs9ContentType; - case "1.2.840.113549.1.9.4": return Pkcs9MessageDigest; - case "1.2.840.113549.1.9.5": return Pkcs9SigningTime; - case "1.2.840.113549.1.9.6": return Pkcs9CounterSigner; - case "1.2.840.113549.1.9.7": return Pkcs9Challenge; - case "1.2.840.113549.1.9.14": return Pkcs9ExtensionRequest; - case "1.2.840.113549.1.9.15": return Pkcs9SMimeCapabilities; - case "1.2.840.113549.1.9.16.1.4": return TstInfo; - case "1.2.840.113549.1.9.16.2.12": return SigningCertificateAttr; - case "1.2.840.113549.1.9.16.2.14": return SignatureTimeStampAttr; - case "1.2.840.113549.1.9.16.2.47": return SigningCertificateV2Attr; - case "1.2.840.113549.1.9.20": return Pkcs9FriendlyName; - case "1.2.840.113549.1.9.21": return LocalKeyId; - case "1.2.840.113549.1.9.22.1": return Pkcs12X509CertType; - case "1.2.840.113549.1.12.1.3": return Pkcs12TripleDes; - case "1.2.840.113549.1.12.1.5": return Pkcs12Rc2Cbc128; - case "1.2.840.113549.1.12.1.6": return Pkcs12Rc2Cbc40; - case "1.2.840.113549.1.12.10.1.1": return Pkcs12KeyBag; - case "1.2.840.113549.1.12.10.1.2": return Pkcs12ShroudedKeyBag; - case "1.2.840.113549.1.12.10.1.3": return Pkcs12CertBag; - case "1.2.840.113549.1.12.10.1.5": return Pkcs12SecretBag; - case "1.2.840.113549.1.12.10.1.6": return Pkcs12SafeContentsBag; - case "1.2.840.113549.2.5": return MD5; - case "1.2.840.113549.2.7": return HMACSHA1; - case "1.2.840.113549.2.9": return HMACSHA256; - case "1.2.840.113549.2.10": return HMACSHA384; - case "1.2.840.113549.2.11": return HMACSHA512; - case "1.2.840.113549.3.2": return RC2CBC; - case "1.2.840.113549.3.7": return TripleDESCBC; - case "1.3.6.1.4.1.311.17.1": return Pkcs12KeyProviderName; - case "1.3.6.1.4.1.311.17.3.20": return KeyIdentifier; - case "1.3.6.1.4.1.311.20.2.3": return UserPrincipalName; - case "1.3.6.1.4.1.311.88.2.1": return DocumentNameAttr; - case "1.3.6.1.4.1.311.88.2.2": return DocumentDescriptionAttr; - case "1.3.6.1.5.5.7.3.1": return KeyPurposeTlsServer; - case "1.3.6.1.5.5.7.3.2": return KeyPurposeTlsClient; - case "1.3.6.1.5.5.7.3.3": return KeyPurposeCodeSign; - case "1.3.6.1.5.5.7.3.4": return KeyPurposeEmailProtection; - case "1.3.6.1.5.5.7.3.8": return KeyPurposeTimestamping; - case "1.3.6.1.5.5.7.3.9": return KeyPurposeOcspSigner; - case "1.3.6.1.5.5.7.6.2": return Pkcs7NoSignature; - case "1.3.6.1.5.5.7.48.1": return OCSP; - case "1.3.6.1.5.5.7.48.1.2": return OcspNonce; - case "1.3.6.1.5.5.7.48.2": return CAIssuers; - case "1.3.14.3.2.26": return SHA1; - case "1.3.14.3.2.7": return DES; - case "1.3.132.0.34": return Secp384r1; - case "1.3.132.0.35": return Secp521r1; - case "2.5.4.3": return CommonName; - case "2.5.4.5": return SerialNumber; - case "2.5.4.6": return CountryOrRegionName; - case "2.5.4.7": return Locality; - case "2.5.4.8": return StateOrProvinceName; - case "2.5.4.10": return OrganizationName; - case "2.5.4.11": return OrganizationalUnit; - case "2.5.4.97": return OrganizationIdentifier; - case "2.5.29.14": return SubjectKeyIdentifier; - case "2.5.29.15": return KeyUsage; - case "2.5.29.17": return SubjectAlternativeName; - case "2.5.29.19": return BasicConstraints; - case "2.5.29.20": return CrlNumber; - case "2.5.29.35": return AuthorityKeyIdentifier; - case "2.16.840.1.101.3.4.1.2": return Aes128Cbc; - case "2.16.840.1.101.3.4.1.22": return Aes192Cbc; - case "2.16.840.1.101.3.4.1.42": return Aes256Cbc; - case "2.16.840.1.101.3.4.2.1": return Sha256; - case "2.16.840.1.101.3.4.2.2": return Sha384; - case "2.16.840.1.101.3.4.2.3": return Sha512; - case "2.23.140.1.2.1": return CabForumDV; - case "2.23.140.1.2.2": return CabForumOV; - default: return ReadOnlySpan.Empty; + "1.2.840.10040.4.1" => DSA, + "1.2.840.10040.4.3" => DSAWithSha1, + "1.2.840.10045.2.1" => EC, + "1.2.840.10045.1.1" => EcPrimeField, + "1.2.840.10045.1.2" => EcChar2Field, + "1.2.840.10045.3.1.7" => Secp256r1, + "1.2.840.10045.4.1" => ECDSAWithSha1, + "1.2.840.10045.4.3.2" => ECDSAWithSha256, + "1.2.840.10045.4.3.3" => ECDSAWithSha384, + "1.2.840.10045.4.3.4" => ECDSAWithSha512, + "1.2.840.113549.1.1.1" => RSA, + "1.2.840.113549.1.1.5" => RSAWithSha1, + "1.2.840.113549.1.1.7" => RSAOAEP, + "1.2.840.113549.1.1.8" => MGF1, + "1.2.840.113549.1.1.9" => OaepPSpecified, + "1.2.840.113549.1.1.10" => RSAPSS, + "1.2.840.113549.1.1.11" => RSAWithSha256, + "1.2.840.113549.1.1.12" => RSAWithSha384, + "1.2.840.113549.1.1.13" => RSAWithSha512, + "1.2.840.113549.1.5.3" => PbeWithMD5AndDESCBC, + "1.2.840.113549.1.5.10" => PbeWithSha1AndDESCBC, + "1.2.840.113549.1.5.11" => PbeWithSha1AndRC2CBC, + "1.2.840.113549.1.5.12" => Pbkdf2, + "1.2.840.113549.1.5.13" => PasswordBasedEncryptionScheme2, + "1.2.840.113549.1.7.1" => Pkcs7Data, + "1.2.840.113549.1.7.2" => Pkcs7SignedData, + "1.2.840.113549.1.7.3" => Pkcs7EnvelopedData, + "1.2.840.113549.1.7.6" => Pkcs7EncryptedData, + "1.2.840.113549.1.9.1" => Pkcs9EmailAddress, + "1.2.840.113549.1.9.3" => Pkcs9ContentType, + "1.2.840.113549.1.9.4" => Pkcs9MessageDigest, + "1.2.840.113549.1.9.5" => Pkcs9SigningTime, + "1.2.840.113549.1.9.6" => Pkcs9CounterSigner, + "1.2.840.113549.1.9.7" => Pkcs9Challenge, + "1.2.840.113549.1.9.14" => Pkcs9ExtensionRequest, + "1.2.840.113549.1.9.15" => Pkcs9SMimeCapabilities, + "1.2.840.113549.1.9.16.1.4" => TstInfo, + "1.2.840.113549.1.9.16.2.12" => SigningCertificateAttr, + "1.2.840.113549.1.9.16.2.14" => SignatureTimeStampAttr, + "1.2.840.113549.1.9.16.2.47" => SigningCertificateV2Attr, + "1.2.840.113549.1.9.20" => Pkcs9FriendlyName, + "1.2.840.113549.1.9.21" => LocalKeyId, + "1.2.840.113549.1.9.22.1" => Pkcs12X509CertType, + "1.2.840.113549.1.12.1.3" => Pkcs12TripleDes, + "1.2.840.113549.1.12.1.5" => Pkcs12Rc2Cbc128, + "1.2.840.113549.1.12.1.6" => Pkcs12Rc2Cbc40, + "1.2.840.113549.1.12.10.1.1" => Pkcs12KeyBag, + "1.2.840.113549.1.12.10.1.2" => Pkcs12ShroudedKeyBag, + "1.2.840.113549.1.12.10.1.3" => Pkcs12CertBag, + "1.2.840.113549.1.12.10.1.5" => Pkcs12SecretBag, + "1.2.840.113549.1.12.10.1.6" => Pkcs12SafeContentsBag, + "1.2.840.113549.2.5" => MD5, + "1.2.840.113549.2.7" => HMACSHA1, + "1.2.840.113549.2.9" => HMACSHA256, + "1.2.840.113549.2.10" => HMACSHA384, + "1.2.840.113549.2.11" => HMACSHA512, + "1.2.840.113549.3.2" => RC2CBC, + "1.2.840.113549.3.7" => TripleDESCBC, + "1.3.6.1.4.1.311.17.1" => Pkcs12KeyProviderName, + "1.3.6.1.4.1.311.17.3.20" => KeyIdentifier, + "1.3.6.1.4.1.311.20.2.3" => UserPrincipalName, + "1.3.6.1.4.1.311.88.2.1" => DocumentNameAttr, + "1.3.6.1.4.1.311.88.2.2" => DocumentDescriptionAttr, + "1.3.6.1.5.5.7.3.1" => KeyPurposeTlsServer, + "1.3.6.1.5.5.7.3.2" => KeyPurposeTlsClient, + "1.3.6.1.5.5.7.3.3" => KeyPurposeCodeSign, + "1.3.6.1.5.5.7.3.4" => KeyPurposeEmailProtection, + "1.3.6.1.5.5.7.3.8" => KeyPurposeTimestamping, + "1.3.6.1.5.5.7.3.9" => KeyPurposeOcspSigner, + "1.3.6.1.5.5.7.6.2" => Pkcs7NoSignature, + "1.3.6.1.5.5.7.48.1" => OCSP, + "1.3.6.1.5.5.7.48.1.2" => OcspNonce, + "1.3.6.1.5.5.7.48.2" => CAIssuers, + "1.3.14.3.2.26" => SHA1, + "1.3.14.3.2.7" => DES, + "1.3.132.0.34" => Secp384r1, + "1.3.132.0.35" => Secp521r1, + "2.5.4.3" => CommonName, + "2.5.4.5" => SerialNumber, + "2.5.4.6" => CountryOrRegionName, + "2.5.4.7" => Locality, + "2.5.4.8" => StateOrProvinceName, + "2.5.4.10" => OrganizationName, + "2.5.4.11" => OrganizationalUnit, + "2.5.4.97" => OrganizationIdentifier, + "2.5.29.14" => SubjectKeyIdentifier, + "2.5.29.15" => KeyUsage, + "2.5.29.17" => SubjectAlternativeName, + "2.5.29.19" => BasicConstraints, + "2.5.29.20" => CrlNumber, + "2.5.29.35" => AuthorityKeyIdentifier, + "2.16.840.1.101.3.4.1.2" => Aes128Cbc, + "2.16.840.1.101.3.4.1.22" => Aes192Cbc, + "2.16.840.1.101.3.4.1.42" => Aes256Cbc, + "2.16.840.1.101.3.4.2.1" => Sha256, + "2.16.840.1.101.3.4.2.2" => Sha384, + "2.16.840.1.101.3.4.2.3" => Sha512, + "2.23.140.1.2.1" => CabForumDV, + "2.23.140.1.2.2" => CabForumOV, + _ => ReadOnlySpan.Empty }; } } From 21ec8ffe1a8f53b0461c0ed28b5dde16eceb117c Mon Sep 17 00:00:00 2001 From: Adeel <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 15:48:39 +0300 Subject: [PATCH 3/6] . --- .../src/System/Formats/Asn1/WellKnownOids.cs | 198 +++++++++--------- 1 file changed, 99 insertions(+), 99 deletions(-) diff --git a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs index f5cbfd96bdaa52..c3d6aae613951f 100644 --- a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs +++ b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs @@ -116,203 +116,203 @@ internal static class WellKnownOids internal static ReadOnlySpan GetContents(ReadOnlySpan value) { ReadOnlySpan DSA = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01 }; ReadOnlySpan DSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03 }; ReadOnlySpan EC = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 }; ReadOnlySpan EcPrimeField = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01 }; ReadOnlySpan EcChar2Field = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02 }; ReadOnlySpan Secp256r1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07 }; ReadOnlySpan ECDSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01 }; ReadOnlySpan ECDSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02 }; ReadOnlySpan ECDSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03 }; ReadOnlySpan ECDSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04 }, + new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04 }; ReadOnlySpan RSA = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01 }; ReadOnlySpan RSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05 }; ReadOnlySpan RSAOAEP = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07 }; ReadOnlySpan MGF1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08 }; ReadOnlySpan OaepPSpecified = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09 }; ReadOnlySpan RSAPSS = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A }; ReadOnlySpan RSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B }; ReadOnlySpan RSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C }; ReadOnlySpan RSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D }; ReadOnlySpan PbeWithMD5AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03 }; ReadOnlySpan PbeWithSha1AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A }; ReadOnlySpan PbeWithSha1AndRC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B }; ReadOnlySpan Pbkdf2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C }; ReadOnlySpan PasswordBasedEncryptionScheme2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D }; ReadOnlySpan Pkcs7Data = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01 }; ReadOnlySpan Pkcs7SignedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02 }; ReadOnlySpan Pkcs7EnvelopedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03 }; ReadOnlySpan Pkcs7EncryptedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06 }; ReadOnlySpan Pkcs9EmailAddress = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01 }; ReadOnlySpan Pkcs9ContentType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03 }; ReadOnlySpan Pkcs9MessageDigest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04 }; ReadOnlySpan Pkcs9SigningTime = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05 }; ReadOnlySpan Pkcs9CounterSigner = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06 }; ReadOnlySpan Pkcs9Challenge = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07 }; ReadOnlySpan Pkcs9ExtensionRequest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E }; ReadOnlySpan Pkcs9SMimeCapabilities = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F }; ReadOnlySpan TstInfo = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04 }; ReadOnlySpan SigningCertificateAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C }; ReadOnlySpan SignatureTimeStampAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E }; ReadOnlySpan SigningCertificateV2Attr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F }; ReadOnlySpan Pkcs9FriendlyName = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14 }; ReadOnlySpan LocalKeyId = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15 }; ReadOnlySpan Pkcs12X509CertType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01 }; ReadOnlySpan Pkcs12TripleDes = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03 }; ReadOnlySpan Pkcs12Rc2Cbc128 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05 }; ReadOnlySpan Pkcs12Rc2Cbc40 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06 }; ReadOnlySpan Pkcs12KeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01 }; ReadOnlySpan Pkcs12ShroudedKeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02 }; ReadOnlySpan Pkcs12CertBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03 }; ReadOnlySpan Pkcs12SecretBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05 }; ReadOnlySpan Pkcs12SafeContentsBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06 }; ReadOnlySpan MD5 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05 }; ReadOnlySpan HMACSHA1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07 }; ReadOnlySpan HMACSHA256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09 }; ReadOnlySpan HMACSHA384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A }; ReadOnlySpan HMACSHA512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B }; ReadOnlySpan RC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02 }; ReadOnlySpan TripleDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07 }, + new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07 }; ReadOnlySpan Pkcs12KeyProviderName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01 }, + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01 }; ReadOnlySpan KeyIdentifier = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14 }, + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14 }; ReadOnlySpan UserPrincipalName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03 }, + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03 }; ReadOnlySpan DocumentNameAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01 }, + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01 }; ReadOnlySpan DocumentDescriptionAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02 }, + new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02 }; ReadOnlySpan KeyPurposeTlsServer = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01 }; ReadOnlySpan KeyPurposeTlsClient = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02 }; ReadOnlySpan KeyPurposeCodeSign = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03 }; ReadOnlySpan KeyPurposeEmailProtection = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04 }; ReadOnlySpan KeyPurposeTimestamping = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08 }; ReadOnlySpan KeyPurposeOcspSigner = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09 }; ReadOnlySpan Pkcs7NoSignature = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02 }; ReadOnlySpan OCSP = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01 }; ReadOnlySpan OcspNonce = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02 }; ReadOnlySpan CAIssuers = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02 }, + new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02 }; ReadOnlySpan SHA1 = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A }, + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A }; ReadOnlySpan DES = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07 }, + new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07 }; ReadOnlySpan Secp384r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22 }, + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22 }; ReadOnlySpan Secp521r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23 }, + new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23 }; ReadOnlySpan CommonName = - new byte[] { 0x55, 0x04, 0x03 }, + new byte[] { 0x55, 0x04, 0x03 }; ReadOnlySpan SerialNumber = - new byte[] { 0x55, 0x04, 0x05 }, + new byte[] { 0x55, 0x04, 0x05 }; ReadOnlySpan CountryOrRegionName = - new byte[] { 0x55, 0x04, 0x06 }, + new byte[] { 0x55, 0x04, 0x06 }; ReadOnlySpan Locality = - new byte[] { 0x55, 0x04, 0x07 }, + new byte[] { 0x55, 0x04, 0x07 }; ReadOnlySpan StateOrProvinceName = - new byte[] { 0x55, 0x04, 0x08 }, + new byte[] { 0x55, 0x04, 0x08 }; ReadOnlySpan OrganizationName = - new byte[] { 0x55, 0x04, 0x0A }, + new byte[] { 0x55, 0x04, 0x0A }; ReadOnlySpan OrganizationalUnit = - new byte[] { 0x55, 0x04, 0x0B }, + new byte[] { 0x55, 0x04, 0x0B }; ReadOnlySpan OrganizationIdentifier = - new byte[] { 0x55, 0x04, 0x61 }, + new byte[] { 0x55, 0x04, 0x61 }; ReadOnlySpan SubjectKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x0E }, + new byte[] { 0x55, 0x1D, 0x0E }; ReadOnlySpan KeyUsage = - new byte[] { 0x55, 0x1D, 0x0F }, + new byte[] { 0x55, 0x1D, 0x0F }; ReadOnlySpan SubjectAlternativeName = - new byte[] { 0x55, 0x1D, 0x11 }, + new byte[] { 0x55, 0x1D, 0x11 }; ReadOnlySpan BasicConstraints = - new byte[] { 0x55, 0x1D, 0x13 }, + new byte[] { 0x55, 0x1D, 0x13 }; ReadOnlySpan CrlNumber = - new byte[] { 0x55, 0x1D, 0x14 }, + new byte[] { 0x55, 0x1D, 0x14 }; ReadOnlySpan AuthorityKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x23 }, + new byte[] { 0x55, 0x1D, 0x23 }; ReadOnlySpan Aes128Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02 }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02 }; ReadOnlySpan Aes192Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16 }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16 }; ReadOnlySpan Aes256Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A }; ReadOnlySpan Sha256 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01 }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01 }; ReadOnlySpan Sha384 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02 }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02 }; ReadOnlySpan Sha512 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03 }, + new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03 }; ReadOnlySpan CabForumDV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01 }, + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01 }; ReadOnlySpan CabForumOV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02 }, + new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02 }; return value switch { From 069592e331eeed5782e22673cffcc3b3aa8f1965 Mon Sep 17 00:00:00 2001 From: Adeel <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 18:48:28 +0300 Subject: [PATCH 4/6] Use a single local --- .../src/System/Formats/Asn1/WellKnownOids.cs | 498 +++++++----------- 1 file changed, 201 insertions(+), 297 deletions(-) diff --git a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs index c3d6aae613951f..04cb22fe4ff6a5 100644 --- a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs +++ b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs @@ -115,306 +115,210 @@ internal static class WellKnownOids internal static ReadOnlySpan GetContents(ReadOnlySpan value) { - ReadOnlySpan DSA = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01 }; - ReadOnlySpan DSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03 }; - ReadOnlySpan EC = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 }; - ReadOnlySpan EcPrimeField = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01 }; - ReadOnlySpan EcChar2Field = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02 }; - ReadOnlySpan Secp256r1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07 }; - ReadOnlySpan ECDSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01 }; - ReadOnlySpan ECDSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02 }; - ReadOnlySpan ECDSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03 }; - ReadOnlySpan ECDSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04 }; - ReadOnlySpan RSA = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01 }; - ReadOnlySpan RSAWithSha1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05 }; - ReadOnlySpan RSAOAEP = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07 }; - ReadOnlySpan MGF1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08 }; - ReadOnlySpan OaepPSpecified = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09 }; - ReadOnlySpan RSAPSS = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A }; - ReadOnlySpan RSAWithSha256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B }; - ReadOnlySpan RSAWithSha384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C }; - ReadOnlySpan RSAWithSha512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D }; - ReadOnlySpan PbeWithMD5AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03 }; - ReadOnlySpan PbeWithSha1AndDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A }; - ReadOnlySpan PbeWithSha1AndRC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B }; - ReadOnlySpan Pbkdf2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C }; - ReadOnlySpan PasswordBasedEncryptionScheme2 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D }; - ReadOnlySpan Pkcs7Data = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01 }; - ReadOnlySpan Pkcs7SignedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02 }; - ReadOnlySpan Pkcs7EnvelopedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03 }; - ReadOnlySpan Pkcs7EncryptedData = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06 }; - ReadOnlySpan Pkcs9EmailAddress = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01 }; - ReadOnlySpan Pkcs9ContentType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03 }; - ReadOnlySpan Pkcs9MessageDigest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04 }; - ReadOnlySpan Pkcs9SigningTime = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05 }; - ReadOnlySpan Pkcs9CounterSigner = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06 }; - ReadOnlySpan Pkcs9Challenge = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07 }; - ReadOnlySpan Pkcs9ExtensionRequest = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E }; - ReadOnlySpan Pkcs9SMimeCapabilities = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F }; - ReadOnlySpan TstInfo = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04 }; - ReadOnlySpan SigningCertificateAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C }; - ReadOnlySpan SignatureTimeStampAttr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E }; - ReadOnlySpan SigningCertificateV2Attr = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F }; - ReadOnlySpan Pkcs9FriendlyName = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14 }; - ReadOnlySpan LocalKeyId = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15 }; - ReadOnlySpan Pkcs12X509CertType = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01 }; - ReadOnlySpan Pkcs12TripleDes = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03 }; - ReadOnlySpan Pkcs12Rc2Cbc128 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05 }; - ReadOnlySpan Pkcs12Rc2Cbc40 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06 }; - ReadOnlySpan Pkcs12KeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01 }; - ReadOnlySpan Pkcs12ShroudedKeyBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02 }; - ReadOnlySpan Pkcs12CertBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03 }; - ReadOnlySpan Pkcs12SecretBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05 }; - ReadOnlySpan Pkcs12SafeContentsBag = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06 }; - ReadOnlySpan MD5 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05 }; - ReadOnlySpan HMACSHA1 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07 }; - ReadOnlySpan HMACSHA256 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09 }; - ReadOnlySpan HMACSHA384 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A }; - ReadOnlySpan HMACSHA512 = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B }; - ReadOnlySpan RC2CBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02 }; - ReadOnlySpan TripleDESCBC = - new byte[] { 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07 }; - ReadOnlySpan Pkcs12KeyProviderName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01 }; - ReadOnlySpan KeyIdentifier = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14 }; - ReadOnlySpan UserPrincipalName = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03 }; - ReadOnlySpan DocumentNameAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01 }; - ReadOnlySpan DocumentDescriptionAttr = - new byte[] { 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02 }; - ReadOnlySpan KeyPurposeTlsServer = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01 }; - ReadOnlySpan KeyPurposeTlsClient = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02 }; - ReadOnlySpan KeyPurposeCodeSign = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03 }; - ReadOnlySpan KeyPurposeEmailProtection = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04 }; - ReadOnlySpan KeyPurposeTimestamping = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08 }; - ReadOnlySpan KeyPurposeOcspSigner = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09 }; - ReadOnlySpan Pkcs7NoSignature = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02 }; - ReadOnlySpan OCSP = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01 }; - ReadOnlySpan OcspNonce = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02 }; - ReadOnlySpan CAIssuers = - new byte[] { 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02 }; - ReadOnlySpan SHA1 = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x1A }; - ReadOnlySpan DES = - new byte[] { 0x2B, 0x0E, 0x03, 0x02, 0x07 }; - ReadOnlySpan Secp384r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x22 }; - ReadOnlySpan Secp521r1 = - new byte[] { 0x2B, 0x81, 0x04, 0x00, 0x23 }; - ReadOnlySpan CommonName = - new byte[] { 0x55, 0x04, 0x03 }; - ReadOnlySpan SerialNumber = - new byte[] { 0x55, 0x04, 0x05 }; - ReadOnlySpan CountryOrRegionName = - new byte[] { 0x55, 0x04, 0x06 }; - ReadOnlySpan Locality = - new byte[] { 0x55, 0x04, 0x07 }; - ReadOnlySpan StateOrProvinceName = - new byte[] { 0x55, 0x04, 0x08 }; - ReadOnlySpan OrganizationName = - new byte[] { 0x55, 0x04, 0x0A }; - ReadOnlySpan OrganizationalUnit = - new byte[] { 0x55, 0x04, 0x0B }; - ReadOnlySpan OrganizationIdentifier = - new byte[] { 0x55, 0x04, 0x61 }; - ReadOnlySpan SubjectKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x0E }; - ReadOnlySpan KeyUsage = - new byte[] { 0x55, 0x1D, 0x0F }; - ReadOnlySpan SubjectAlternativeName = - new byte[] { 0x55, 0x1D, 0x11 }; - ReadOnlySpan BasicConstraints = - new byte[] { 0x55, 0x1D, 0x13 }; - ReadOnlySpan CrlNumber = - new byte[] { 0x55, 0x1D, 0x14 }; - ReadOnlySpan AuthorityKeyIdentifier = - new byte[] { 0x55, 0x1D, 0x23 }; - ReadOnlySpan Aes128Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02 }; - ReadOnlySpan Aes192Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16 }; - ReadOnlySpan Aes256Cbc = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A }; - ReadOnlySpan Sha256 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01 }; - ReadOnlySpan Sha384 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02 }; - ReadOnlySpan Sha512 = - new byte[] { 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03 }; - ReadOnlySpan CabForumDV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01 }; - ReadOnlySpan CabForumOV = - new byte[] { 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02 }; + ReadOnlySpan data = new byte[] + { + 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x01, // DSA + 0x2A, 0x86, 0x48, 0xCE, 0x38, 0x04, 0x03, // DSAWithSha1 + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01, // EC + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x01, // EcPrimeField + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x01, 0x02, // EcChar2Field + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07, // Secp256r1 + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01, // ECDSAWithSha1 + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02, // ECDSAWithSha256 + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x03, // ECDSAWithSha384 + 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04, // ECDSAWithSha512 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, // RSA + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x05, // RSAWithSha1 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x07, // RSAOAEP + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x08, // MGF1 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x09, // OaepPSpecified + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0A, // RSAPSS + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0B, // RSAWithSha256 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0C, // RSAWithSha384 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x0D, // RSAWithSha512 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x03, // PbeWithMD5AndDESCBC + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0A, // PbeWithSha1AndDESCBC + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0B, // PbeWithSha1AndRC2CBC + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C, // Pbkdf2 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D, // PasswordBasedEncryptionScheme2 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, // Pkcs7Data + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02, // Pkcs7SignedData + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x03, // Pkcs7EnvelopedData + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06, // Pkcs7EncryptedData + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x01, // Pkcs9EmailAddress + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x03, // Pkcs9ContentType + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04, // Pkcs9MessageDigest + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x05, // Pkcs9SigningTime + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x06, // Pkcs9CounterSigner + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x07, // Pkcs9Challenge + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0E, // Pkcs9ExtensionRequest + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x0F, // Pkcs9SMimeCapabilities + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x01, 0x04, // TstInfo + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0C, // SigningCertificateAttr + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x0E, // SignatureTimeStampAttr + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x10, 0x02, 0x2F, // SigningCertificateV2Attr + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x14, // Pkcs9FriendlyName + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x15, // LocalKeyId + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01, // Pkcs12X509CertType + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03, // Pkcs12TripleDes + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x05, // Pkcs12Rc2Cbc128 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06, // Pkcs12Rc2Cbc40 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01, // Pkcs12KeyBag + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02, // Pkcs12ShroudedKeyBag + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03, // Pkcs12CertBag + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x05, // Pkcs12SecretBag + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x06, // Pkcs12SafeContentsBag + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, // MD5 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x07, // HMACSHA1 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x09, // HMACSHA256 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0A, // HMACSHA384 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x0B, // HMACSHA512 + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x02, // RC2CBC + 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x03, 0x07, // TripleDESCBC + 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x01, // Pkcs12KeyProviderName + 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x11, 0x03, 0x14, // KeyIdentifier + 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03, // UserPrincipalName + 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x01, // DocumentNameAttr + 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x58, 0x02, 0x02, // DocumentDescriptionAttr + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x01, // KeyPurposeTlsServer + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x02, // KeyPurposeTlsClient + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x03, // KeyPurposeCodeSign + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x04, // KeyPurposeEmailProtection + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x08, // KeyPurposeTimestamping + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x03, 0x09, // KeyPurposeOcspSigner + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x06, 0x02, // Pkcs7NoSignature + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, // OCSP + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x01, 0x02, // OcspNonce + 0x2B, 0x06, 0x01, 0x05, 0x05, 0x07, 0x30, 0x02, // CAIssuers + 0x2B, 0x0E, 0x03, 0x02, 0x1A, // SHA1 + 0x2B, 0x0E, 0x03, 0x02, 0x07, // DES + 0x2B, 0x81, 0x04, 0x00, 0x22, // Secp384r1 + 0x2B, 0x81, 0x04, 0x00, 0x23, // Secp521r1 + 0x55, 0x04, 0x03, // CommonName + 0x55, 0x04, 0x05, // SerialNumber + 0x55, 0x04, 0x06, // CountryOrRegionName + 0x55, 0x04, 0x07, // Locality + 0x55, 0x04, 0x08, // StateOrProvinceName + 0x55, 0x04, 0x0A, // OrganizationName + 0x55, 0x04, 0x0B, // OrganizationalUnit + 0x55, 0x04, 0x61, // OrganizationIdentifier + 0x55, 0x1D, 0x0E, // SubjectKeyIdentifier + 0x55, 0x1D, 0x0F, // KeyUsage + 0x55, 0x1D, 0x11, // SubjectAlternativeName + 0x55, 0x1D, 0x13, // BasicConstraints + 0x55, 0x1D, 0x14, // CrlNumber + 0x55, 0x1D, 0x23, // AuthorityKeyIdentifier + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02, // Aes128Cbc + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x16, // Aes192Cbc + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A, // Aes256Cbc + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, // Sha256 + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, // Sha384 + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, // Sha512 + 0x67, 0x81, 0x0C, 0x01, 0x02, 0x01, // CabForumDV + 0x67, 0x81, 0x0C, 0x01, 0x02, 0x02, // CabForumOV + }; return value switch { - "1.2.840.10040.4.1" => DSA, - "1.2.840.10040.4.3" => DSAWithSha1, - "1.2.840.10045.2.1" => EC, - "1.2.840.10045.1.1" => EcPrimeField, - "1.2.840.10045.1.2" => EcChar2Field, - "1.2.840.10045.3.1.7" => Secp256r1, - "1.2.840.10045.4.1" => ECDSAWithSha1, - "1.2.840.10045.4.3.2" => ECDSAWithSha256, - "1.2.840.10045.4.3.3" => ECDSAWithSha384, - "1.2.840.10045.4.3.4" => ECDSAWithSha512, - "1.2.840.113549.1.1.1" => RSA, - "1.2.840.113549.1.1.5" => RSAWithSha1, - "1.2.840.113549.1.1.7" => RSAOAEP, - "1.2.840.113549.1.1.8" => MGF1, - "1.2.840.113549.1.1.9" => OaepPSpecified, - "1.2.840.113549.1.1.10" => RSAPSS, - "1.2.840.113549.1.1.11" => RSAWithSha256, - "1.2.840.113549.1.1.12" => RSAWithSha384, - "1.2.840.113549.1.1.13" => RSAWithSha512, - "1.2.840.113549.1.5.3" => PbeWithMD5AndDESCBC, - "1.2.840.113549.1.5.10" => PbeWithSha1AndDESCBC, - "1.2.840.113549.1.5.11" => PbeWithSha1AndRC2CBC, - "1.2.840.113549.1.5.12" => Pbkdf2, - "1.2.840.113549.1.5.13" => PasswordBasedEncryptionScheme2, - "1.2.840.113549.1.7.1" => Pkcs7Data, - "1.2.840.113549.1.7.2" => Pkcs7SignedData, - "1.2.840.113549.1.7.3" => Pkcs7EnvelopedData, - "1.2.840.113549.1.7.6" => Pkcs7EncryptedData, - "1.2.840.113549.1.9.1" => Pkcs9EmailAddress, - "1.2.840.113549.1.9.3" => Pkcs9ContentType, - "1.2.840.113549.1.9.4" => Pkcs9MessageDigest, - "1.2.840.113549.1.9.5" => Pkcs9SigningTime, - "1.2.840.113549.1.9.6" => Pkcs9CounterSigner, - "1.2.840.113549.1.9.7" => Pkcs9Challenge, - "1.2.840.113549.1.9.14" => Pkcs9ExtensionRequest, - "1.2.840.113549.1.9.15" => Pkcs9SMimeCapabilities, - "1.2.840.113549.1.9.16.1.4" => TstInfo, - "1.2.840.113549.1.9.16.2.12" => SigningCertificateAttr, - "1.2.840.113549.1.9.16.2.14" => SignatureTimeStampAttr, - "1.2.840.113549.1.9.16.2.47" => SigningCertificateV2Attr, - "1.2.840.113549.1.9.20" => Pkcs9FriendlyName, - "1.2.840.113549.1.9.21" => LocalKeyId, - "1.2.840.113549.1.9.22.1" => Pkcs12X509CertType, - "1.2.840.113549.1.12.1.3" => Pkcs12TripleDes, - "1.2.840.113549.1.12.1.5" => Pkcs12Rc2Cbc128, - "1.2.840.113549.1.12.1.6" => Pkcs12Rc2Cbc40, - "1.2.840.113549.1.12.10.1.1" => Pkcs12KeyBag, - "1.2.840.113549.1.12.10.1.2" => Pkcs12ShroudedKeyBag, - "1.2.840.113549.1.12.10.1.3" => Pkcs12CertBag, - "1.2.840.113549.1.12.10.1.5" => Pkcs12SecretBag, - "1.2.840.113549.1.12.10.1.6" => Pkcs12SafeContentsBag, - "1.2.840.113549.2.5" => MD5, - "1.2.840.113549.2.7" => HMACSHA1, - "1.2.840.113549.2.9" => HMACSHA256, - "1.2.840.113549.2.10" => HMACSHA384, - "1.2.840.113549.2.11" => HMACSHA512, - "1.2.840.113549.3.2" => RC2CBC, - "1.2.840.113549.3.7" => TripleDESCBC, - "1.3.6.1.4.1.311.17.1" => Pkcs12KeyProviderName, - "1.3.6.1.4.1.311.17.3.20" => KeyIdentifier, - "1.3.6.1.4.1.311.20.2.3" => UserPrincipalName, - "1.3.6.1.4.1.311.88.2.1" => DocumentNameAttr, - "1.3.6.1.4.1.311.88.2.2" => DocumentDescriptionAttr, - "1.3.6.1.5.5.7.3.1" => KeyPurposeTlsServer, - "1.3.6.1.5.5.7.3.2" => KeyPurposeTlsClient, - "1.3.6.1.5.5.7.3.3" => KeyPurposeCodeSign, - "1.3.6.1.5.5.7.3.4" => KeyPurposeEmailProtection, - "1.3.6.1.5.5.7.3.8" => KeyPurposeTimestamping, - "1.3.6.1.5.5.7.3.9" => KeyPurposeOcspSigner, - "1.3.6.1.5.5.7.6.2" => Pkcs7NoSignature, - "1.3.6.1.5.5.7.48.1" => OCSP, - "1.3.6.1.5.5.7.48.1.2" => OcspNonce, - "1.3.6.1.5.5.7.48.2" => CAIssuers, - "1.3.14.3.2.26" => SHA1, - "1.3.14.3.2.7" => DES, - "1.3.132.0.34" => Secp384r1, - "1.3.132.0.35" => Secp521r1, - "2.5.4.3" => CommonName, - "2.5.4.5" => SerialNumber, - "2.5.4.6" => CountryOrRegionName, - "2.5.4.7" => Locality, - "2.5.4.8" => StateOrProvinceName, - "2.5.4.10" => OrganizationName, - "2.5.4.11" => OrganizationalUnit, - "2.5.4.97" => OrganizationIdentifier, - "2.5.29.14" => SubjectKeyIdentifier, - "2.5.29.15" => KeyUsage, - "2.5.29.17" => SubjectAlternativeName, - "2.5.29.19" => BasicConstraints, - "2.5.29.20" => CrlNumber, - "2.5.29.35" => AuthorityKeyIdentifier, - "2.16.840.1.101.3.4.1.2" => Aes128Cbc, - "2.16.840.1.101.3.4.1.22" => Aes192Cbc, - "2.16.840.1.101.3.4.1.42" => Aes256Cbc, - "2.16.840.1.101.3.4.2.1" => Sha256, - "2.16.840.1.101.3.4.2.2" => Sha384, - "2.16.840.1.101.3.4.2.3" => Sha512, - "2.23.140.1.2.1" => CabForumDV, - "2.23.140.1.2.2" => CabForumOV, + "1.2.840.10040.4.1" => data.Slice(0, 6), // DSA + "1.2.840.10040.4.3" => data.Slice(6, 6), // DSAWithSha1 + "1.2.840.10045.2.1" => data.Slice(12, 6), // EC + "1.2.840.10045.1.1" => data.Slice(18, 6), // EcPrimeField + "1.2.840.10045.1.2" => data.Slice(24, 6), // EcChar2Field + "1.2.840.10045.3.1.7" => data.Slice(30, 7), // Secp256r1 + "1.2.840.10045.4.1" => data.Slice(37, 6), // ECDSAWithSha1 + "1.2.840.10045.4.3.2" => data.Slice(43, 7), // ECDSAWithSha256 + "1.2.840.10045.4.3.3" => data.Slice(50, 7), // ECDSAWithSha384 + "1.2.840.10045.4.3.4" => data.Slice(57, 7), // ECDSAWithSha512 + "1.2.840.113549.1.1.1" => data.Slice(64, 8), // RSA + "1.2.840.113549.1.1.5" => data.Slice(72, 8), // RSAWithSha1 + "1.2.840.113549.1.1.7" => data.Slice(80, 8), // RSAOAEP + "1.2.840.113549.1.1.8" => data.Slice(88, 8), // MGF1 + "1.2.840.113549.1.1.9" => data.Slice(96, 8), // OaepPSpecified + "1.2.840.113549.1.1.10" => data.Slice(104, 8), // RSAPSS + "1.2.840.113549.1.1.11" => data.Slice(112, 8), // RSAWithSha256 + "1.2.840.113549.1.1.12" => data.Slice(120, 8), // RSAWithSha384 + "1.2.840.113549.1.1.13" => data.Slice(128, 8), // RSAWithSha512 + "1.2.840.113549.1.5.3" => data.Slice(136, 8), // PbeWithMD5AndDESCBC + "1.2.840.113549.1.5.10" => data.Slice(144, 8), // PbeWithSha1AndDESCBC + "1.2.840.113549.1.5.11" => data.Slice(152, 8), // PbeWithSha1AndRC2CBC + "1.2.840.113549.1.5.12" => data.Slice(160, 8), // Pbkdf2 + "1.2.840.113549.1.5.13" => data.Slice(168, 8), // PasswordBasedEncryptionScheme2 + "1.2.840.113549.1.7.1" => data.Slice(176, 8), // Pkcs7Data + "1.2.840.113549.1.7.2" => data.Slice(184, 8), // Pkcs7SignedData + "1.2.840.113549.1.7.3" => data.Slice(192, 8), // Pkcs7EnvelopedData + "1.2.840.113549.1.7.6" => data.Slice(200, 8), // Pkcs7EncryptedData + "1.2.840.113549.1.9.1" => data.Slice(208, 8), // Pkcs9EmailAddress + "1.2.840.113549.1.9.3" => data.Slice(216, 8), // Pkcs9ContentType + "1.2.840.113549.1.9.4" => data.Slice(224, 8), // Pkcs9MessageDigest + "1.2.840.113549.1.9.5" => data.Slice(232, 8), // Pkcs9SigningTime + "1.2.840.113549.1.9.6" => data.Slice(240, 8), // Pkcs9CounterSigner + "1.2.840.113549.1.9.7" => data.Slice(248, 8), // Pkcs9Challenge + "1.2.840.113549.1.9.14" => data.Slice(256, 8), // Pkcs9ExtensionRequest + "1.2.840.113549.1.9.15" => data.Slice(264, 8), // Pkcs9SMimeCapabilities + "1.2.840.113549.1.9.16.1.4" => data.Slice(272, 10), // TstInfo + "1.2.840.113549.1.9.16.2.12" => data.Slice(282, 10), // SigningCertificateAttr + "1.2.840.113549.1.9.16.2.14" => data.Slice(292, 10), // SignatureTimeStampAttr + "1.2.840.113549.1.9.16.2.47" => data.Slice(302, 10), // SigningCertificateV2Attr + "1.2.840.113549.1.9.20" => data.Slice(312, 8), // Pkcs9FriendlyName + "1.2.840.113549.1.9.21" => data.Slice(320, 8), // LocalKeyId + "1.2.840.113549.1.9.22.1" => data.Slice(328, 9), // Pkcs12X509CertType + "1.2.840.113549.1.12.1.3" => data.Slice(337, 9), // Pkcs12TripleDes + "1.2.840.113549.1.12.1.5" => data.Slice(346, 9), // Pkcs12Rc2Cbc128 + "1.2.840.113549.1.12.1.6" => data.Slice(355, 9), // Pkcs12Rc2Cbc40 + "1.2.840.113549.1.12.10.1.1" => data.Slice(364, 10), // Pkcs12KeyBag + "1.2.840.113549.1.12.10.1.2" => data.Slice(374, 10), // Pkcs12ShroudedKeyBag + "1.2.840.113549.1.12.10.1.3" => data.Slice(384, 10), // Pkcs12CertBag + "1.2.840.113549.1.12.10.1.5" => data.Slice(394, 10), // Pkcs12SecretBag + "1.2.840.113549.1.12.10.1.6" => data.Slice(404, 10), // Pkcs12SafeContentsBag + "1.2.840.113549.2.5" => data.Slice(414, 7), // MD5 + "1.2.840.113549.2.7" => data.Slice(421, 7), // HMACSHA1 + "1.2.840.113549.2.9" => data.Slice(428, 7), // HMACSHA256 + "1.2.840.113549.2.10" => data.Slice(435, 7), // HMACSHA384 + "1.2.840.113549.2.11" => data.Slice(442, 7), // HMACSHA512 + "1.2.840.113549.3.2" => data.Slice(449, 7), // RC2CBC + "1.2.840.113549.3.7" => data.Slice(456, 7), // TripleDESCBC + "1.3.6.1.4.1.311.17.1" => data.Slice(463, 8), // Pkcs12KeyProviderName + "1.3.6.1.4.1.311.17.3.20" => data.Slice(471, 9), // KeyIdentifier + "1.3.6.1.4.1.311.20.2.3" => data.Slice(480, 9), // UserPrincipalName + "1.3.6.1.4.1.311.88.2.1" => data.Slice(489, 9), // DocumentNameAttr + "1.3.6.1.4.1.311.88.2.2" => data.Slice(498, 9), // DocumentDescriptionAttr + "1.3.6.1.5.5.7.3.1" => data.Slice(507, 7), // KeyPurposeTlsServer + "1.3.6.1.5.5.7.3.2" => data.Slice(514, 7), // KeyPurposeTlsClient + "1.3.6.1.5.5.7.3.3" => data.Slice(521, 7), // KeyPurposeCodeSign + "1.3.6.1.5.5.7.3.4" => data.Slice(528, 7), // KeyPurposeEmailProtection + "1.3.6.1.5.5.7.3.8" => data.Slice(535, 7), // KeyPurposeTimestamping + "1.3.6.1.5.5.7.3.9" => data.Slice(542, 7), // KeyPurposeOcspSigner + "1.3.6.1.5.5.7.6.2" => data.Slice(549, 7), // Pkcs7NoSignature + "1.3.6.1.5.5.7.48.1" => data.Slice(556, 7), // OCSP + "1.3.6.1.5.5.7.48.1.2" => data.Slice(563, 8), // OcspNonce + "1.3.6.1.5.5.7.48.2" => data.Slice(571, 7), // CAIssuers + "1.3.14.3.2.26" => data.Slice(578, 4), // SHA1 + "1.3.14.3.2.7" => data.Slice(582, 4), // DES + "1.3.132.0.34" => data.Slice(586, 4), // Secp384r1 + "1.3.132.0.35" => data.Slice(590, 4), // Secp521r1 + "2.5.4.3" => data.Slice(594, 2), // CommonName + "2.5.4.5" => data.Slice(596, 2), // SerialNumber + "2.5.4.6" => data.Slice(598, 2), // CountryOrRegionName + "2.5.4.7" => data.Slice(600, 2), // Locality + "2.5.4.8" => data.Slice(602, 2), // StateOrProvinceName + "2.5.4.10" => data.Slice(604, 2), // OrganizationName + "2.5.4.11" => data.Slice(606, 2), // OrganizationalUnit + "2.5.4.97" => data.Slice(608, 2), // OrganizationIdentifier + "2.5.29.14" => data.Slice(610, 2), // SubjectKeyIdentifier + "2.5.29.15" => data.Slice(612, 2), // KeyUsage + "2.5.29.17" => data.Slice(614, 2), // SubjectAlternativeName + "2.5.29.19" => data.Slice(616, 2), // BasicConstraints + "2.5.29.20" => data.Slice(618, 2), // CrlNumber + "2.5.29.35" => data.Slice(620, 2), // AuthorityKeyIdentifier + "2.16.840.1.101.3.4.1.2" => data.Slice(622, 8), // Aes128Cbc + "2.16.840.1.101.3.4.1.22" => data.Slice(630, 8), // Aes192Cbc + "2.16.840.1.101.3.4.1.42" => data.Slice(638, 8), // Aes256Cbc + "2.16.840.1.101.3.4.2.1" => data.Slice(646, 8), // Sha256 + "2.16.840.1.101.3.4.2.2" => data.Slice(654, 8), // Sha384 + "2.16.840.1.101.3.4.2.3" => data.Slice(662, 8), // Sha512 + "2.23.140.1.2.1" => data.Slice(670, 5), // CabForumDV + "2.23.140.1.2.2" => data.Slice(675, 5), // CabForumOV _ => ReadOnlySpan.Empty }; } From 8cc13a376671f3133a2a99c311f2f698b8100163 Mon Sep 17 00:00:00 2001 From: Adeel <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 19:45:24 +0300 Subject: [PATCH 5/6] Fix arguments --- dump7 | 99 +++++++++ .../src/System/Formats/Asn1/WellKnownOids.cs | 198 +++++++++--------- 2 files changed, 198 insertions(+), 99 deletions(-) create mode 100644 dump7 diff --git a/dump7 b/dump7 new file mode 100644 index 00000000000000..16a627ffd2aeb1 --- /dev/null +++ b/dump7 @@ -0,0 +1,99 @@ +data.Slice(0, 7), // DSA +data.Slice(7, 7), // DSAWithSha1 +data.Slice(14, 7), // EC +data.Slice(21, 7), // EcPrimeField +data.Slice(28, 7), // EcChar2Field +data.Slice(35, 8), // Secp256r1 +data.Slice(43, 7), // ECDSAWithSha1 +data.Slice(50, 8), // ECDSAWithSha256 +data.Slice(58, 8), // ECDSAWithSha384 +data.Slice(66, 8), // ECDSAWithSha512 +data.Slice(74, 9), // RSA +data.Slice(83, 9), // RSAWithSha1 +data.Slice(92, 9), // RSAOAEP +data.Slice(101, 9), // MGF1 +data.Slice(110, 9), // OaepPSpecified +data.Slice(119, 9), // RSAPSS +data.Slice(128, 9), // RSAWithSha256 +data.Slice(137, 9), // RSAWithSha384 +data.Slice(146, 9), // RSAWithSha512 +data.Slice(155, 9), // PbeWithMD5AndDESCBC +data.Slice(164, 9), // PbeWithSha1AndDESCBC +data.Slice(173, 9), // PbeWithSha1AndRC2CBC +data.Slice(182, 9), // Pbkdf2 +data.Slice(191, 9), // PasswordBasedEncryptionScheme2 +data.Slice(200, 9), // Pkcs7Data +data.Slice(209, 9), // Pkcs7SignedData +data.Slice(218, 9), // Pkcs7EnvelopedData +data.Slice(227, 9), // Pkcs7EncryptedData +data.Slice(236, 9), // Pkcs9EmailAddress +data.Slice(245, 9), // Pkcs9ContentType +data.Slice(254, 9), // Pkcs9MessageDigest +data.Slice(263, 9), // Pkcs9SigningTime +data.Slice(272, 9), // Pkcs9CounterSigner +data.Slice(281, 9), // Pkcs9Challenge +data.Slice(290, 9), // Pkcs9ExtensionRequest +data.Slice(299, 9), // Pkcs9SMimeCapabilities +data.Slice(308, 11), // TstInfo +data.Slice(319, 11), // SigningCertificateAttr +data.Slice(330, 11), // SignatureTimeStampAttr +data.Slice(341, 11), // SigningCertificateV2Attr +data.Slice(352, 9), // Pkcs9FriendlyName +data.Slice(361, 9), // LocalKeyId +data.Slice(370, 10), // Pkcs12X509CertType +data.Slice(380, 10), // Pkcs12TripleDes +data.Slice(390, 10), // Pkcs12Rc2Cbc128 +data.Slice(400, 10), // Pkcs12Rc2Cbc40 +data.Slice(410, 11), // Pkcs12KeyBag +data.Slice(421, 11), // Pkcs12ShroudedKeyBag +data.Slice(432, 11), // Pkcs12CertBag +data.Slice(443, 11), // Pkcs12SecretBag +data.Slice(454, 11), // Pkcs12SafeContentsBag +data.Slice(465, 8), // MD5 +data.Slice(473, 8), // HMACSHA1 +data.Slice(481, 8), // HMACSHA256 +data.Slice(489, 8), // HMACSHA384 +data.Slice(497, 8), // HMACSHA512 +data.Slice(505, 8), // RC2CBC +data.Slice(513, 8), // TripleDESCBC +data.Slice(521, 9), // Pkcs12KeyProviderName +data.Slice(530, 10), // KeyIdentifier +data.Slice(540, 10), // UserPrincipalName +data.Slice(550, 10), // DocumentNameAttr +data.Slice(560, 10), // DocumentDescriptionAttr +data.Slice(570, 8), // KeyPurposeTlsServer +data.Slice(578, 8), // KeyPurposeTlsClient +data.Slice(586, 8), // KeyPurposeCodeSign +data.Slice(594, 8), // KeyPurposeEmailProtection +data.Slice(602, 8), // KeyPurposeTimestamping +data.Slice(610, 8), // KeyPurposeOcspSigner +data.Slice(618, 8), // Pkcs7NoSignature +data.Slice(626, 8), // OCSP +data.Slice(634, 9), // OcspNonce +data.Slice(643, 8), // CAIssuers +data.Slice(651, 5), // SHA1 +data.Slice(656, 5), // DES +data.Slice(661, 5), // Secp384r1 +data.Slice(666, 5), // Secp521r1 +data.Slice(671, 3), // CommonName +data.Slice(674, 3), // SerialNumber +data.Slice(677, 3), // CountryOrRegionName +data.Slice(680, 3), // Locality +data.Slice(683, 3), // StateOrProvinceName +data.Slice(686, 3), // OrganizationName +data.Slice(689, 3), // OrganizationalUnit +data.Slice(692, 3), // OrganizationIdentifier +data.Slice(695, 3), // SubjectKeyIdentifier +data.Slice(698, 3), // KeyUsage +data.Slice(701, 3), // SubjectAlternativeName +data.Slice(704, 3), // BasicConstraints +data.Slice(707, 3), // CrlNumber +data.Slice(710, 3), // AuthorityKeyIdentifier +data.Slice(713, 9), // Aes128Cbc +data.Slice(722, 9), // Aes192Cbc +data.Slice(731, 9), // Aes256Cbc +data.Slice(740, 9), // Sha256 +data.Slice(749, 9), // Sha384 +data.Slice(758, 9), // Sha512 +data.Slice(767, 6), // CabForumDV +data.Slice(773, 6), // CabForumOV diff --git a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs index 04cb22fe4ff6a5..457ad2e9d8840a 100644 --- a/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs +++ b/src/libraries/System.Formats.Asn1/src/System/Formats/Asn1/WellKnownOids.cs @@ -220,105 +220,105 @@ internal static ReadOnlySpan GetContents(ReadOnlySpan value) return value switch { - "1.2.840.10040.4.1" => data.Slice(0, 6), // DSA - "1.2.840.10040.4.3" => data.Slice(6, 6), // DSAWithSha1 - "1.2.840.10045.2.1" => data.Slice(12, 6), // EC - "1.2.840.10045.1.1" => data.Slice(18, 6), // EcPrimeField - "1.2.840.10045.1.2" => data.Slice(24, 6), // EcChar2Field - "1.2.840.10045.3.1.7" => data.Slice(30, 7), // Secp256r1 - "1.2.840.10045.4.1" => data.Slice(37, 6), // ECDSAWithSha1 - "1.2.840.10045.4.3.2" => data.Slice(43, 7), // ECDSAWithSha256 - "1.2.840.10045.4.3.3" => data.Slice(50, 7), // ECDSAWithSha384 - "1.2.840.10045.4.3.4" => data.Slice(57, 7), // ECDSAWithSha512 - "1.2.840.113549.1.1.1" => data.Slice(64, 8), // RSA - "1.2.840.113549.1.1.5" => data.Slice(72, 8), // RSAWithSha1 - "1.2.840.113549.1.1.7" => data.Slice(80, 8), // RSAOAEP - "1.2.840.113549.1.1.8" => data.Slice(88, 8), // MGF1 - "1.2.840.113549.1.1.9" => data.Slice(96, 8), // OaepPSpecified - "1.2.840.113549.1.1.10" => data.Slice(104, 8), // RSAPSS - "1.2.840.113549.1.1.11" => data.Slice(112, 8), // RSAWithSha256 - "1.2.840.113549.1.1.12" => data.Slice(120, 8), // RSAWithSha384 - "1.2.840.113549.1.1.13" => data.Slice(128, 8), // RSAWithSha512 - "1.2.840.113549.1.5.3" => data.Slice(136, 8), // PbeWithMD5AndDESCBC - "1.2.840.113549.1.5.10" => data.Slice(144, 8), // PbeWithSha1AndDESCBC - "1.2.840.113549.1.5.11" => data.Slice(152, 8), // PbeWithSha1AndRC2CBC - "1.2.840.113549.1.5.12" => data.Slice(160, 8), // Pbkdf2 - "1.2.840.113549.1.5.13" => data.Slice(168, 8), // PasswordBasedEncryptionScheme2 - "1.2.840.113549.1.7.1" => data.Slice(176, 8), // Pkcs7Data - "1.2.840.113549.1.7.2" => data.Slice(184, 8), // Pkcs7SignedData - "1.2.840.113549.1.7.3" => data.Slice(192, 8), // Pkcs7EnvelopedData - "1.2.840.113549.1.7.6" => data.Slice(200, 8), // Pkcs7EncryptedData - "1.2.840.113549.1.9.1" => data.Slice(208, 8), // Pkcs9EmailAddress - "1.2.840.113549.1.9.3" => data.Slice(216, 8), // Pkcs9ContentType - "1.2.840.113549.1.9.4" => data.Slice(224, 8), // Pkcs9MessageDigest - "1.2.840.113549.1.9.5" => data.Slice(232, 8), // Pkcs9SigningTime - "1.2.840.113549.1.9.6" => data.Slice(240, 8), // Pkcs9CounterSigner - "1.2.840.113549.1.9.7" => data.Slice(248, 8), // Pkcs9Challenge - "1.2.840.113549.1.9.14" => data.Slice(256, 8), // Pkcs9ExtensionRequest - "1.2.840.113549.1.9.15" => data.Slice(264, 8), // Pkcs9SMimeCapabilities - "1.2.840.113549.1.9.16.1.4" => data.Slice(272, 10), // TstInfo - "1.2.840.113549.1.9.16.2.12" => data.Slice(282, 10), // SigningCertificateAttr - "1.2.840.113549.1.9.16.2.14" => data.Slice(292, 10), // SignatureTimeStampAttr - "1.2.840.113549.1.9.16.2.47" => data.Slice(302, 10), // SigningCertificateV2Attr - "1.2.840.113549.1.9.20" => data.Slice(312, 8), // Pkcs9FriendlyName - "1.2.840.113549.1.9.21" => data.Slice(320, 8), // LocalKeyId - "1.2.840.113549.1.9.22.1" => data.Slice(328, 9), // Pkcs12X509CertType - "1.2.840.113549.1.12.1.3" => data.Slice(337, 9), // Pkcs12TripleDes - "1.2.840.113549.1.12.1.5" => data.Slice(346, 9), // Pkcs12Rc2Cbc128 - "1.2.840.113549.1.12.1.6" => data.Slice(355, 9), // Pkcs12Rc2Cbc40 - "1.2.840.113549.1.12.10.1.1" => data.Slice(364, 10), // Pkcs12KeyBag - "1.2.840.113549.1.12.10.1.2" => data.Slice(374, 10), // Pkcs12ShroudedKeyBag - "1.2.840.113549.1.12.10.1.3" => data.Slice(384, 10), // Pkcs12CertBag - "1.2.840.113549.1.12.10.1.5" => data.Slice(394, 10), // Pkcs12SecretBag - "1.2.840.113549.1.12.10.1.6" => data.Slice(404, 10), // Pkcs12SafeContentsBag - "1.2.840.113549.2.5" => data.Slice(414, 7), // MD5 - "1.2.840.113549.2.7" => data.Slice(421, 7), // HMACSHA1 - "1.2.840.113549.2.9" => data.Slice(428, 7), // HMACSHA256 - "1.2.840.113549.2.10" => data.Slice(435, 7), // HMACSHA384 - "1.2.840.113549.2.11" => data.Slice(442, 7), // HMACSHA512 - "1.2.840.113549.3.2" => data.Slice(449, 7), // RC2CBC - "1.2.840.113549.3.7" => data.Slice(456, 7), // TripleDESCBC - "1.3.6.1.4.1.311.17.1" => data.Slice(463, 8), // Pkcs12KeyProviderName - "1.3.6.1.4.1.311.17.3.20" => data.Slice(471, 9), // KeyIdentifier - "1.3.6.1.4.1.311.20.2.3" => data.Slice(480, 9), // UserPrincipalName - "1.3.6.1.4.1.311.88.2.1" => data.Slice(489, 9), // DocumentNameAttr - "1.3.6.1.4.1.311.88.2.2" => data.Slice(498, 9), // DocumentDescriptionAttr - "1.3.6.1.5.5.7.3.1" => data.Slice(507, 7), // KeyPurposeTlsServer - "1.3.6.1.5.5.7.3.2" => data.Slice(514, 7), // KeyPurposeTlsClient - "1.3.6.1.5.5.7.3.3" => data.Slice(521, 7), // KeyPurposeCodeSign - "1.3.6.1.5.5.7.3.4" => data.Slice(528, 7), // KeyPurposeEmailProtection - "1.3.6.1.5.5.7.3.8" => data.Slice(535, 7), // KeyPurposeTimestamping - "1.3.6.1.5.5.7.3.9" => data.Slice(542, 7), // KeyPurposeOcspSigner - "1.3.6.1.5.5.7.6.2" => data.Slice(549, 7), // Pkcs7NoSignature - "1.3.6.1.5.5.7.48.1" => data.Slice(556, 7), // OCSP - "1.3.6.1.5.5.7.48.1.2" => data.Slice(563, 8), // OcspNonce - "1.3.6.1.5.5.7.48.2" => data.Slice(571, 7), // CAIssuers - "1.3.14.3.2.26" => data.Slice(578, 4), // SHA1 - "1.3.14.3.2.7" => data.Slice(582, 4), // DES - "1.3.132.0.34" => data.Slice(586, 4), // Secp384r1 - "1.3.132.0.35" => data.Slice(590, 4), // Secp521r1 - "2.5.4.3" => data.Slice(594, 2), // CommonName - "2.5.4.5" => data.Slice(596, 2), // SerialNumber - "2.5.4.6" => data.Slice(598, 2), // CountryOrRegionName - "2.5.4.7" => data.Slice(600, 2), // Locality - "2.5.4.8" => data.Slice(602, 2), // StateOrProvinceName - "2.5.4.10" => data.Slice(604, 2), // OrganizationName - "2.5.4.11" => data.Slice(606, 2), // OrganizationalUnit - "2.5.4.97" => data.Slice(608, 2), // OrganizationIdentifier - "2.5.29.14" => data.Slice(610, 2), // SubjectKeyIdentifier - "2.5.29.15" => data.Slice(612, 2), // KeyUsage - "2.5.29.17" => data.Slice(614, 2), // SubjectAlternativeName - "2.5.29.19" => data.Slice(616, 2), // BasicConstraints - "2.5.29.20" => data.Slice(618, 2), // CrlNumber - "2.5.29.35" => data.Slice(620, 2), // AuthorityKeyIdentifier - "2.16.840.1.101.3.4.1.2" => data.Slice(622, 8), // Aes128Cbc - "2.16.840.1.101.3.4.1.22" => data.Slice(630, 8), // Aes192Cbc - "2.16.840.1.101.3.4.1.42" => data.Slice(638, 8), // Aes256Cbc - "2.16.840.1.101.3.4.2.1" => data.Slice(646, 8), // Sha256 - "2.16.840.1.101.3.4.2.2" => data.Slice(654, 8), // Sha384 - "2.16.840.1.101.3.4.2.3" => data.Slice(662, 8), // Sha512 - "2.23.140.1.2.1" => data.Slice(670, 5), // CabForumDV - "2.23.140.1.2.2" => data.Slice(675, 5), // CabForumOV + "1.2.840.10040.4.1" => data.Slice(0, 7), // DSA + "1.2.840.10040.4.3" => data.Slice(7, 7), // DSAWithSha1 + "1.2.840.10045.2.1" => data.Slice(14, 7), // EC + "1.2.840.10045.1.1" => data.Slice(21, 7), // EcPrimeField + "1.2.840.10045.1.2" => data.Slice(28, 7), // EcChar2Field + "1.2.840.10045.3.1.7" => data.Slice(35, 8), // Secp256r1 + "1.2.840.10045.4.1" => data.Slice(43, 7), // ECDSAWithSha1 + "1.2.840.10045.4.3.2" => data.Slice(50, 8), // ECDSAWithSha256 + "1.2.840.10045.4.3.3" => data.Slice(58, 8), // ECDSAWithSha384 + "1.2.840.10045.4.3.4" => data.Slice(66, 8), // ECDSAWithSha512 + "1.2.840.113549.1.1.1" => data.Slice(74, 9), // RSA + "1.2.840.113549.1.1.5" => data.Slice(83, 9), // RSAWithSha1 + "1.2.840.113549.1.1.7" => data.Slice(92, 9), // RSAOAEP + "1.2.840.113549.1.1.8" => data.Slice(101, 9), // MGF1 + "1.2.840.113549.1.1.9" => data.Slice(110, 9), // OaepPSpecified + "1.2.840.113549.1.1.10" => data.Slice(119, 9), // RSAPSS + "1.2.840.113549.1.1.11" => data.Slice(128, 9), // RSAWithSha256 + "1.2.840.113549.1.1.12" => data.Slice(137, 9), // RSAWithSha384 + "1.2.840.113549.1.1.13" => data.Slice(146, 9), // RSAWithSha512 + "1.2.840.113549.1.5.3" => data.Slice(155, 9), // PbeWithMD5AndDESCBC + "1.2.840.113549.1.5.10" => data.Slice(164, 9), // PbeWithSha1AndDESCBC + "1.2.840.113549.1.5.11" => data.Slice(173, 9), // PbeWithSha1AndRC2CBC + "1.2.840.113549.1.5.12" => data.Slice(182, 9), // Pbkdf2 + "1.2.840.113549.1.5.13" => data.Slice(191, 9), // PasswordBasedEncryptionScheme2 + "1.2.840.113549.1.7.1" => data.Slice(200, 9), // Pkcs7Data + "1.2.840.113549.1.7.2" => data.Slice(209, 9), // Pkcs7SignedData + "1.2.840.113549.1.7.3" => data.Slice(218, 9), // Pkcs7EnvelopedData + "1.2.840.113549.1.7.6" => data.Slice(227, 9), // Pkcs7EncryptedData + "1.2.840.113549.1.9.1" => data.Slice(236, 9), // Pkcs9EmailAddress + "1.2.840.113549.1.9.3" => data.Slice(245, 9), // Pkcs9ContentType + "1.2.840.113549.1.9.4" => data.Slice(254, 9), // Pkcs9MessageDigest + "1.2.840.113549.1.9.5" => data.Slice(263, 9), // Pkcs9SigningTime + "1.2.840.113549.1.9.6" => data.Slice(272, 9), // Pkcs9CounterSigner + "1.2.840.113549.1.9.7" => data.Slice(281, 9), // Pkcs9Challenge + "1.2.840.113549.1.9.14" => data.Slice(290, 9), // Pkcs9ExtensionRequest + "1.2.840.113549.1.9.15" => data.Slice(299, 9), // Pkcs9SMimeCapabilities + "1.2.840.113549.1.9.16.1.4" => data.Slice(308, 11), // TstInfo + "1.2.840.113549.1.9.16.2.12" => data.Slice(319, 11), // SigningCertificateAttr + "1.2.840.113549.1.9.16.2.14" => data.Slice(330, 11), // SignatureTimeStampAttr + "1.2.840.113549.1.9.16.2.47" => data.Slice(341, 11), // SigningCertificateV2Attr + "1.2.840.113549.1.9.20" => data.Slice(352, 9), // Pkcs9FriendlyName + "1.2.840.113549.1.9.21" => data.Slice(361, 9), // LocalKeyId + "1.2.840.113549.1.9.22.1" => data.Slice(370, 10), // Pkcs12X509CertType + "1.2.840.113549.1.12.1.3" => data.Slice(380, 10), // Pkcs12TripleDes + "1.2.840.113549.1.12.1.5" => data.Slice(390, 10), // Pkcs12Rc2Cbc128 + "1.2.840.113549.1.12.1.6" => data.Slice(400, 10), // Pkcs12Rc2Cbc40 + "1.2.840.113549.1.12.10.1.1" => data.Slice(410, 11), // Pkcs12KeyBag + "1.2.840.113549.1.12.10.1.2" => data.Slice(421, 11), // Pkcs12ShroudedKeyBag + "1.2.840.113549.1.12.10.1.3" => data.Slice(432, 11), // Pkcs12CertBag + "1.2.840.113549.1.12.10.1.5" => data.Slice(443, 11), // Pkcs12SecretBag + "1.2.840.113549.1.12.10.1.6" => data.Slice(454, 11), // Pkcs12SafeContentsBag + "1.2.840.113549.2.5" => data.Slice(465, 8), // MD5 + "1.2.840.113549.2.7" => data.Slice(473, 8), // HMACSHA1 + "1.2.840.113549.2.9" => data.Slice(481, 8), // HMACSHA256 + "1.2.840.113549.2.10" => data.Slice(489, 8), // HMACSHA384 + "1.2.840.113549.2.11" => data.Slice(497, 8), // HMACSHA512 + "1.2.840.113549.3.2" => data.Slice(505, 8), // RC2CBC + "1.2.840.113549.3.7" => data.Slice(513, 8), // TripleDESCBC + "1.3.6.1.4.1.311.17.1" => data.Slice(521, 9), // Pkcs12KeyProviderName + "1.3.6.1.4.1.311.17.3.20" => data.Slice(530, 10), // KeyIdentifier + "1.3.6.1.4.1.311.20.2.3" => data.Slice(540, 10), // UserPrincipalName + "1.3.6.1.4.1.311.88.2.1" => data.Slice(550, 10), // DocumentNameAttr + "1.3.6.1.4.1.311.88.2.2" => data.Slice(560, 10), // DocumentDescriptionAttr + "1.3.6.1.5.5.7.3.1" => data.Slice(570, 8), // KeyPurposeTlsServer + "1.3.6.1.5.5.7.3.2" => data.Slice(578, 8), // KeyPurposeTlsClient + "1.3.6.1.5.5.7.3.3" => data.Slice(586, 8), // KeyPurposeCodeSign + "1.3.6.1.5.5.7.3.4" => data.Slice(594, 8), // KeyPurposeEmailProtection + "1.3.6.1.5.5.7.3.8" => data.Slice(602, 8), // KeyPurposeTimestamping + "1.3.6.1.5.5.7.3.9" => data.Slice(610, 8), // KeyPurposeOcspSigner + "1.3.6.1.5.5.7.6.2" => data.Slice(618, 8), // Pkcs7NoSignature + "1.3.6.1.5.5.7.48.1" => data.Slice(626, 8), // OCSP + "1.3.6.1.5.5.7.48.1.2" => data.Slice(634, 9), // OcspNonce + "1.3.6.1.5.5.7.48.2" => data.Slice(643, 8), // CAIssuers + "1.3.14.3.2.26" => data.Slice(651, 5), // SHA1 + "1.3.14.3.2.7" => data.Slice(656, 5), // DES + "1.3.132.0.34" => data.Slice(661, 5), // Secp384r1 + "1.3.132.0.35" => data.Slice(666, 5), // Secp521r1 + "2.5.4.3" => data.Slice(671, 3), // CommonName + "2.5.4.5" => data.Slice(674, 3), // SerialNumber + "2.5.4.6" => data.Slice(677, 3), // CountryOrRegionName + "2.5.4.7" => data.Slice(680, 3), // Locality + "2.5.4.8" => data.Slice(683, 3), // StateOrProvinceName + "2.5.4.10" => data.Slice(686, 3), // OrganizationName + "2.5.4.11" => data.Slice(689, 3), // OrganizationalUnit + "2.5.4.97" => data.Slice(692, 3), // OrganizationIdentifier + "2.5.29.14" => data.Slice(695, 3), // SubjectKeyIdentifier + "2.5.29.15" => data.Slice(698, 3), // KeyUsage + "2.5.29.17" => data.Slice(701, 3), // SubjectAlternativeName + "2.5.29.19" => data.Slice(704, 3), // BasicConstraints + "2.5.29.20" => data.Slice(707, 3), // CrlNumber + "2.5.29.35" => data.Slice(710, 3), // AuthorityKeyIdentifier + "2.16.840.1.101.3.4.1.2" => data.Slice(713, 9), // Aes128Cbc + "2.16.840.1.101.3.4.1.22" => data.Slice(722, 9), // Aes192Cbc + "2.16.840.1.101.3.4.1.42" => data.Slice(731, 9), // Aes256Cbc + "2.16.840.1.101.3.4.2.1" => data.Slice(740, 9), // Sha256 + "2.16.840.1.101.3.4.2.2" => data.Slice(749, 9), // Sha384 + "2.16.840.1.101.3.4.2.3" => data.Slice(758, 9), // Sha512 + "2.23.140.1.2.1" => data.Slice(767, 6), // CabForumDV + "2.23.140.1.2.2" => data.Slice(773, 6), // CabForumOV _ => ReadOnlySpan.Empty }; } From be14b98dbb8c694c293215a7d1b4b19cc815833d Mon Sep 17 00:00:00 2001 From: Adeel <3840695+am11@users.noreply.github.com> Date: Mon, 17 Apr 2023 19:46:19 +0300 Subject: [PATCH 6/6] Delete temp file --- dump7 | 99 ----------------------------------------------------------- 1 file changed, 99 deletions(-) delete mode 100644 dump7 diff --git a/dump7 b/dump7 deleted file mode 100644 index 16a627ffd2aeb1..00000000000000 --- a/dump7 +++ /dev/null @@ -1,99 +0,0 @@ -data.Slice(0, 7), // DSA -data.Slice(7, 7), // DSAWithSha1 -data.Slice(14, 7), // EC -data.Slice(21, 7), // EcPrimeField -data.Slice(28, 7), // EcChar2Field -data.Slice(35, 8), // Secp256r1 -data.Slice(43, 7), // ECDSAWithSha1 -data.Slice(50, 8), // ECDSAWithSha256 -data.Slice(58, 8), // ECDSAWithSha384 -data.Slice(66, 8), // ECDSAWithSha512 -data.Slice(74, 9), // RSA -data.Slice(83, 9), // RSAWithSha1 -data.Slice(92, 9), // RSAOAEP -data.Slice(101, 9), // MGF1 -data.Slice(110, 9), // OaepPSpecified -data.Slice(119, 9), // RSAPSS -data.Slice(128, 9), // RSAWithSha256 -data.Slice(137, 9), // RSAWithSha384 -data.Slice(146, 9), // RSAWithSha512 -data.Slice(155, 9), // PbeWithMD5AndDESCBC -data.Slice(164, 9), // PbeWithSha1AndDESCBC -data.Slice(173, 9), // PbeWithSha1AndRC2CBC -data.Slice(182, 9), // Pbkdf2 -data.Slice(191, 9), // PasswordBasedEncryptionScheme2 -data.Slice(200, 9), // Pkcs7Data -data.Slice(209, 9), // Pkcs7SignedData -data.Slice(218, 9), // Pkcs7EnvelopedData -data.Slice(227, 9), // Pkcs7EncryptedData -data.Slice(236, 9), // Pkcs9EmailAddress -data.Slice(245, 9), // Pkcs9ContentType -data.Slice(254, 9), // Pkcs9MessageDigest -data.Slice(263, 9), // Pkcs9SigningTime -data.Slice(272, 9), // Pkcs9CounterSigner -data.Slice(281, 9), // Pkcs9Challenge -data.Slice(290, 9), // Pkcs9ExtensionRequest -data.Slice(299, 9), // Pkcs9SMimeCapabilities -data.Slice(308, 11), // TstInfo -data.Slice(319, 11), // SigningCertificateAttr -data.Slice(330, 11), // SignatureTimeStampAttr -data.Slice(341, 11), // SigningCertificateV2Attr -data.Slice(352, 9), // Pkcs9FriendlyName -data.Slice(361, 9), // LocalKeyId -data.Slice(370, 10), // Pkcs12X509CertType -data.Slice(380, 10), // Pkcs12TripleDes -data.Slice(390, 10), // Pkcs12Rc2Cbc128 -data.Slice(400, 10), // Pkcs12Rc2Cbc40 -data.Slice(410, 11), // Pkcs12KeyBag -data.Slice(421, 11), // Pkcs12ShroudedKeyBag -data.Slice(432, 11), // Pkcs12CertBag -data.Slice(443, 11), // Pkcs12SecretBag -data.Slice(454, 11), // Pkcs12SafeContentsBag -data.Slice(465, 8), // MD5 -data.Slice(473, 8), // HMACSHA1 -data.Slice(481, 8), // HMACSHA256 -data.Slice(489, 8), // HMACSHA384 -data.Slice(497, 8), // HMACSHA512 -data.Slice(505, 8), // RC2CBC -data.Slice(513, 8), // TripleDESCBC -data.Slice(521, 9), // Pkcs12KeyProviderName -data.Slice(530, 10), // KeyIdentifier -data.Slice(540, 10), // UserPrincipalName -data.Slice(550, 10), // DocumentNameAttr -data.Slice(560, 10), // DocumentDescriptionAttr -data.Slice(570, 8), // KeyPurposeTlsServer -data.Slice(578, 8), // KeyPurposeTlsClient -data.Slice(586, 8), // KeyPurposeCodeSign -data.Slice(594, 8), // KeyPurposeEmailProtection -data.Slice(602, 8), // KeyPurposeTimestamping -data.Slice(610, 8), // KeyPurposeOcspSigner -data.Slice(618, 8), // Pkcs7NoSignature -data.Slice(626, 8), // OCSP -data.Slice(634, 9), // OcspNonce -data.Slice(643, 8), // CAIssuers -data.Slice(651, 5), // SHA1 -data.Slice(656, 5), // DES -data.Slice(661, 5), // Secp384r1 -data.Slice(666, 5), // Secp521r1 -data.Slice(671, 3), // CommonName -data.Slice(674, 3), // SerialNumber -data.Slice(677, 3), // CountryOrRegionName -data.Slice(680, 3), // Locality -data.Slice(683, 3), // StateOrProvinceName -data.Slice(686, 3), // OrganizationName -data.Slice(689, 3), // OrganizationalUnit -data.Slice(692, 3), // OrganizationIdentifier -data.Slice(695, 3), // SubjectKeyIdentifier -data.Slice(698, 3), // KeyUsage -data.Slice(701, 3), // SubjectAlternativeName -data.Slice(704, 3), // BasicConstraints -data.Slice(707, 3), // CrlNumber -data.Slice(710, 3), // AuthorityKeyIdentifier -data.Slice(713, 9), // Aes128Cbc -data.Slice(722, 9), // Aes192Cbc -data.Slice(731, 9), // Aes256Cbc -data.Slice(740, 9), // Sha256 -data.Slice(749, 9), // Sha384 -data.Slice(758, 9), // Sha512 -data.Slice(767, 6), // CabForumDV -data.Slice(773, 6), // CabForumOV