summaryrefslogtreecommitdiff
path: root/cmd/lib
diff options
context:
space:
mode:
authorDaiki Ueno <dueno@redhat.com>2017-10-24 13:45:06 +0200
committerDaiki Ueno <dueno@redhat.com>2017-10-24 13:45:06 +0200
commit9a4e90672016863e07addc875d74b593e65e43f4 (patch)
tree3ee4061a1eb0c828211eb429e63104e5422b6072 /cmd/lib
parentb486b5a3bead1c84ceff5967d5a1e736efcb2f01 (diff)
downloadnss-hg-9a4e90672016863e07addc875d74b593e65e43f4.tar.gz
Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt
This series adds high level API to sign and verify RSA-PSS signatures on certificates and utilizes them in tools.
Diffstat (limited to 'cmd/lib')
-rw-r--r--cmd/lib/secutil.c7
1 files changed, 2 insertions, 5 deletions
diff --git a/cmd/lib/secutil.c b/cmd/lib/secutil.c
index cf52269c3..cedecee2d 100644
--- a/cmd/lib/secutil.c
+++ b/cmd/lib/secutil.c
@@ -1312,15 +1312,12 @@ SECU_PrintAlgorithmID(FILE *out, SECAlgorithmID *a, char *m, int level)
return;
}
- if (algtag == SEC_OID_PKCS1_RSA_PSS_SIGNATURE) {
- secu_PrintRSAPSSParams(out, &a->parameters, "Parameters", level + 1);
- return;
- }
-
if (a->parameters.len == 0 ||
(a->parameters.len == 2 &&
PORT_Memcmp(a->parameters.data, "\005\000", 2) == 0)) {
/* No arguments or NULL argument */
+ } else if (algtag == SEC_OID_PKCS1_RSA_PSS_SIGNATURE) {
+ secu_PrintRSAPSSParams(out, &a->parameters, "Parameters", level + 1);
} else {
/* Print args to algorithm */
SECU_PrintAsHex(out, &a->parameters, "Args", level + 1);