cryptohi.gyp |
|
599 |
cryptohi.h |
/
/*
* DER encode/decode (EC)DSA signatures
|
18297 |
cryptoht.h |
_CRYPTOHT_H_ |
426 |
dsautil.c |
bytes |
7842 |
exports.gyp |
|
842 |
key.h |
_KEY_H_ |
425 |
keyhi.h |
#include "secpkcs5.h" |
8602 |
keyi.h |
NSS private functions |
1959 |
keyt.h |
_KEYT_H_ |
431 |
keythi.h |
RFC 4055 Section 1.2 specifies three different RSA key types.
*
* rsaKey maps to keys with SEC_OID_PKCS1_RSA_ENCRYPTION and can be used for
* both encryption and signatures with old (PKCS #1 v1.5) and new (PKCS #1
* v2.1) padding schemes.
*
* rsaPssKey maps to keys with SEC_OID_PKCS1_RSA_PSS_SIGNATURE and may only
* be used for signatures with PSS padding (PKCS #1 v2.1).
*
* rsaOaepKey maps to keys with SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION and may only
* be used for encryption with OAEP padding (PKCS #1 v2.1).
|
7300 |
Makefile |
|
1840 |
manifest.mn |
|
655 |
sechash.c |
for the PK11_ calls below. |
15413 |
sechash.h |
Generic hash api.
|
1787 |
seckey.c |
Parameters for SEC_OID_PKCS1_RSA_PSS_SIGNATURE |
76659 |
secsign.c |
OK, map a PKCS #7 hash and encrypt algorithm into
a standard hashing algorithm. Why did we pass in the whole
PKCS #7 algTag if we were just going to change here you might
ask. Well the answer is for some cards we may have to do the
hashing on card. It may not support CKM_RSA_PKCS sign algorithm,
it may just support CKM_SHA1_RSA_PKCS and/or CKM_MD5_RSA_PKCS.
|
27260 |
secvfy.c |
Recover the DigestInfo from an RSA PKCS#1 signature.
*
* If givenDigestAlg != SEC_OID_UNKNOWN, copy givenDigestAlg to digestAlgOut.
* Otherwise, parse the DigestInfo structure and store the decoded digest
* algorithm into digestAlgOut.
*
* Store the encoded DigestInfo into digestInfo.
* Store the DigestInfo length into digestInfoLen.
*
* This function does *not* verify that the AlgorithmIdentifier in the
* DigestInfo identifies givenDigestAlg or that the DigestInfo is encoded
* correctly; verifyPKCS1DigestInfo does that.
*
* XXX this is assuming that the signature algorithm has WITH_RSA_ENCRYPTION
|
32321 |