diff options
author | Daiki Ueno <dueno@redhat.com> | 2017-10-24 13:45:06 +0200 |
---|---|---|
committer | Daiki Ueno <dueno@redhat.com> | 2017-10-24 13:45:06 +0200 |
commit | 9a4e90672016863e07addc875d74b593e65e43f4 (patch) | |
tree | 3ee4061a1eb0c828211eb429e63104e5422b6072 /cmd/lib | |
parent | b486b5a3bead1c84ceff5967d5a1e736efcb2f01 (diff) | |
download | nss-hg-9a4e90672016863e07addc875d74b593e65e43f4.tar.gz |
Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt
This series adds high level API to sign and verify RSA-PSS signatures on certificates and utilizes them in tools.
Diffstat (limited to 'cmd/lib')
-rw-r--r-- | cmd/lib/secutil.c | 7 |
1 files changed, 2 insertions, 5 deletions
diff --git a/cmd/lib/secutil.c b/cmd/lib/secutil.c index cf52269c3..cedecee2d 100644 --- a/cmd/lib/secutil.c +++ b/cmd/lib/secutil.c @@ -1312,15 +1312,12 @@ SECU_PrintAlgorithmID(FILE *out, SECAlgorithmID *a, char *m, int level) return; } - if (algtag == SEC_OID_PKCS1_RSA_PSS_SIGNATURE) { - secu_PrintRSAPSSParams(out, &a->parameters, "Parameters", level + 1); - return; - } - if (a->parameters.len == 0 || (a->parameters.len == 2 && PORT_Memcmp(a->parameters.data, "\005\000", 2) == 0)) { /* No arguments or NULL argument */ + } else if (algtag == SEC_OID_PKCS1_RSA_PSS_SIGNATURE) { + secu_PrintRSAPSSParams(out, &a->parameters, "Parameters", level + 1); } else { /* Print args to algorithm */ SECU_PrintAsHex(out, &a->parameters, "Args", level + 1); |