Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(315)

Side by Side Diff: net/quic/crypto/chacha20_poly1305_decrypter_nss.cc

Issue 1082123003: Rename USE_NSS to USE_NSS_CERTS. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@use-nss-certs
Patch Set: rebase Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/crypto/chacha20_poly1305_decrypter.h" 5 #include "net/quic/crypto/chacha20_poly1305_decrypter.h"
6 6
7 #include <pk11pub.h> 7 #include <pk11pub.h>
8 8
9 #include "base/logging.h" 9 #include "base/logging.h"
10 10
11 using base::StringPiece; 11 using base::StringPiece;
12 12
13 namespace net { 13 namespace net {
14 14
15 namespace { 15 namespace {
16 16
17 const size_t kKeySize = 32; 17 const size_t kKeySize = 32;
18 const size_t kNoncePrefixSize = 0; 18 const size_t kNoncePrefixSize = 0;
19 19
20 } // namespace 20 } // namespace
21 21
22 #if defined(USE_NSS) 22 #if defined(USE_NSS_CERTS)
23 23
24 // System NSS doesn't support ChaCha20+Poly1305 yet. 24 // System NSS doesn't support ChaCha20+Poly1305 yet.
25 25
26 ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter() 26 ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter()
27 : AeadBaseDecrypter(CKM_INVALID_MECHANISM, nullptr, kKeySize, 27 : AeadBaseDecrypter(CKM_INVALID_MECHANISM, nullptr, kKeySize,
28 kAuthTagSize, kNoncePrefixSize) { 28 kAuthTagSize, kNoncePrefixSize) {
29 NOTIMPLEMENTED(); 29 NOTIMPLEMENTED();
30 } 30 }
31 31
32 ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {} 32 ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {}
33 33
34 // static 34 // static
35 bool ChaCha20Poly1305Decrypter::IsSupported() { 35 bool ChaCha20Poly1305Decrypter::IsSupported() {
36 return false; 36 return false;
37 } 37 }
38 38
39 void ChaCha20Poly1305Decrypter::FillAeadParams( 39 void ChaCha20Poly1305Decrypter::FillAeadParams(
40 StringPiece nonce, 40 StringPiece nonce,
41 const StringPiece& associated_data, 41 const StringPiece& associated_data,
42 size_t auth_tag_size, 42 size_t auth_tag_size,
43 AeadParams* aead_params) const { 43 AeadParams* aead_params) const {
44 NOTIMPLEMENTED(); 44 NOTIMPLEMENTED();
45 } 45 }
46 46
47 #else // defined(USE_NSS) 47 #else // defined(USE_NSS_CERTS)
48 48
49 ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter() 49 ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter()
50 : AeadBaseDecrypter(CKM_NSS_CHACHA20_POLY1305, PK11_Decrypt, kKeySize, 50 : AeadBaseDecrypter(CKM_NSS_CHACHA20_POLY1305, PK11_Decrypt, kKeySize,
51 kAuthTagSize, kNoncePrefixSize) { 51 kAuthTagSize, kNoncePrefixSize) {
52 static_assert(kKeySize <= kMaxKeySize, "key size too big"); 52 static_assert(kKeySize <= kMaxKeySize, "key size too big");
53 static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize, 53 static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize,
54 "nonce prefix size too big"); 54 "nonce prefix size too big");
55 } 55 }
56 56
57 ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {} 57 ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {}
(...skipping 12 matching lines...) Expand all
70 CK_NSS_AEAD_PARAMS* nss_aead_params = &aead_params->data.nss_aead_params; 70 CK_NSS_AEAD_PARAMS* nss_aead_params = &aead_params->data.nss_aead_params;
71 nss_aead_params->pIv = 71 nss_aead_params->pIv =
72 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data())); 72 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data()));
73 nss_aead_params->ulIvLen = nonce.size(); 73 nss_aead_params->ulIvLen = nonce.size();
74 nss_aead_params->pAAD = 74 nss_aead_params->pAAD =
75 reinterpret_cast<CK_BYTE*>(const_cast<char*>(associated_data.data())); 75 reinterpret_cast<CK_BYTE*>(const_cast<char*>(associated_data.data()));
76 nss_aead_params->ulAADLen = associated_data.size(); 76 nss_aead_params->ulAADLen = associated_data.size();
77 nss_aead_params->ulTagLen = auth_tag_size; 77 nss_aead_params->ulTagLen = auth_tag_size;
78 } 78 }
79 79
80 #endif // defined(USE_NSS) 80 #endif // defined(USE_NSS_CERTS)
81 81
82 } // namespace net 82 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc ('k') | net/quic/crypto/chacha20_poly1305_encrypter_nss.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698