Name Description Size
Makefile 1840
cryptohi.gyp 599
cryptohi.h / /* * DER encode/decode (EC)DSA signatures 18297
cryptoht.h _CRYPTOHT_H_ 426
dsautil.c bytes 7858
exports.gyp 842
key.h _KEY_H_ 425
keyhi.h #include "secpkcs5.h" 8465
keyi.h NSS private functions 1754
keyt.h _KEYT_H_ 431
keythi.h RFC 4055 Section 1.2 specifies three different RSA key types. * * rsaKey maps to keys with SEC_OID_PKCS1_RSA_ENCRYPTION and can be used for * both encryption and signatures with old (PKCS #1 v1.5) and new (PKCS #1 * v2.1) padding schemes. * * rsaPssKey maps to keys with SEC_OID_PKCS1_RSA_PSS_SIGNATURE and may only * be used for signatures with PSS padding (PKCS #1 v2.1). * * rsaOaepKey maps to keys with SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION and may only * be used for encryption with OAEP padding (PKCS #1 v2.1). 7026
manifest.mn 655
sechash.c for the PK11_ calls below. 11789
sechash.h Generic hash api. 1787
seckey.c Parameters for SEC_OID_PKCS1_RSA_PSS_SIGNATURE 68829
secsign.c OK, map a PKCS #7 hash and encrypt algorithm into a standard hashing algorithm. Why did we pass in the whole PKCS #7 algTag if we were just going to change here you might ask. Well the answer is for some cards we may have to do the hashing on card. It may not support CKM_RSA_PKCS sign algorithm, it may just support CKM_SHA1_RSA_PKCS and/or CKM_MD5_RSA_PKCS. 26361
secvfy.c Recover the DigestInfo from an RSA PKCS#1 signature. * * If givenDigestAlg != SEC_OID_UNKNOWN, copy givenDigestAlg to digestAlgOut. * Otherwise, parse the DigestInfo structure and store the decoded digest * algorithm into digestAlgOut. * * Store the encoded DigestInfo into digestInfo. * Store the DigestInfo length into digestInfoLen. * * This function does *not* verify that the AlgorithmIdentifier in the * DigestInfo identifies givenDigestAlg or that the DigestInfo is encoded * correctly; verifyPKCS1DigestInfo does that. * * XXX this is assuming that the signature algorithm has WITH_RSA_ENCRYPTION 30193