Makefile 

1840 
cryptohi.gyp 

599 
cryptohi.h 
/
/*
* DER encode/decode (EC)DSA signatures

18297 
cryptoht.h 
_CRYPTOHT_H_ 
426 
dsautil.c 
bytes 
7858 
exports.gyp 

842 
key.h 
_KEY_H_ 
425 
keyhi.h 
#include "secpkcs5.h" 
8465 
keyi.h 
NSS private functions 
1754 
keyt.h 
_KEYT_H_ 
431 
keythi.h 
RFC 4055 Section 1.2 specifies three different RSA key types.
*
* rsaKey maps to keys with SEC_OID_PKCS1_RSA_ENCRYPTION and can be used for
* both encryption and signatures with old (PKCS #1 v1.5) and new (PKCS #1
* v2.1) padding schemes.
*
* rsaPssKey maps to keys with SEC_OID_PKCS1_RSA_PSS_SIGNATURE and may only
* be used for signatures with PSS padding (PKCS #1 v2.1).
*
* rsaOaepKey maps to keys with SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION and may only
* be used for encryption with OAEP padding (PKCS #1 v2.1).

7026 
manifest.mn 

655 
sechash.c 
for the PK11_ calls below. 
11789 
sechash.h 
Generic hash api.

1787 
seckey.c 
Parameters for SEC_OID_PKCS1_RSA_PSS_SIGNATURE 
68829 
secsign.c 
OK, map a PKCS #7 hash and encrypt algorithm into
a standard hashing algorithm. Why did we pass in the whole
PKCS #7 algTag if we were just going to change here you might
ask. Well the answer is for some cards we may have to do the
hashing on card. It may not support CKM_RSA_PKCS sign algorithm,
it may just support CKM_SHA1_RSA_PKCS and/or CKM_MD5_RSA_PKCS.

26361 
secvfy.c 
Recover the DigestInfo from an RSA PKCS#1 signature.
*
* If givenDigestAlg != SEC_OID_UNKNOWN, copy givenDigestAlg to digestAlgOut.
* Otherwise, parse the DigestInfo structure and store the decoded digest
* algorithm into digestAlgOut.
*
* Store the encoded DigestInfo into digestInfo.
* Store the DigestInfo length into digestInfoLen.
*
* This function does *not* verify that the AlgorithmIdentifier in the
* DigestInfo identifies givenDigestAlg or that the DigestInfo is encoded
* correctly; verifyPKCS1DigestInfo does that.
*
* XXX this is assuming that the signature algorithm has WITH_RSA_ENCRYPTION

30193 