cryptohi.gyp |
|
599 |
cryptohi.h |
/
/*
* DER encode/decode (EC)DSA signatures
|
18297 |
cryptoht.h |
_CRYPTOHT_H_ |
426 |
dsautil.c |
bytes |
7843 |
exports.gyp |
|
842 |
key.h |
_KEY_H_ |
425 |
keyhi.h |
Destroy a subject-public-key-info object.
|
8781 |
keyi.h |
NSS private functions |
2565 |
keyt.h |
_KEYT_H_ |
431 |
keythi.h |
RFC 4055 Section 1.2 specifies three different RSA key types.
*
* rsaKey maps to keys with SEC_OID_PKCS1_RSA_ENCRYPTION and can be used for
* both encryption and signatures with old (PKCS #1 v1.5) and new (PKCS #1
* v2.1) padding schemes.
*
* rsaPssKey maps to keys with SEC_OID_PKCS1_RSA_PSS_SIGNATURE and may only
* be used for signatures with PSS padding (PKCS #1 v2.1).
*
* rsaOaepKey maps to keys with SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION and may only
* be used for encryption with OAEP padding (PKCS #1 v2.1).
|
7320 |
Makefile |
|
1840 |
manifest.mn |
|
655 |
sechash.c |
for the PK11_ calls below. |
9544 |
sechash.h |
Generic hash api.
|
1626 |
seckey.c |
Parameters for SEC_OID_PKCS1_RSA_PSS_SIGNATURE |
77610 |
secsign.c |
if we are using explicitly hashing, this value will be non-null |
30720 |
secvfy.c |
Recover the DigestInfo from an RSA PKCS#1 signature.
*
* If givenDigestAlg != SEC_OID_UNKNOWN, copy givenDigestAlg to digestAlgOut.
* Otherwise, parse the DigestInfo structure and store the decoded digest
* algorithm into digestAlgOut.
*
* Store the encoded DigestInfo into digestInfo.
* Store the DigestInfo length into digestInfoLen.
*
* This function does *not* verify that the AlgorithmIdentifier in the
* DigestInfo identifies givenDigestAlg or that the DigestInfo is encoded
* correctly; verifyPKCS1DigestInfo does that.
*
* XXX this is assuming that the signature algorithm has WITH_RSA_ENCRYPTION
|
43042 |