| Index: extensions/browser/verified_contents.cc
|
| diff --git a/extensions/browser/verified_contents.cc b/extensions/browser/verified_contents.cc
|
| index 28ed16a771550f01d9b520930d7993603902c123..fc2471dc79a6c086a67ecec1e67bcbc36d9f5c89 100644
|
| --- a/extensions/browser/verified_contents.cc
|
| +++ b/extensions/browser/verified_contents.cc
|
| @@ -21,14 +21,6 @@ using base::Value;
|
|
|
| namespace {
|
|
|
| -// Note: this structure is an ASN.1 which encodes the algorithm used with its
|
| -// parameters. The signature algorithm is "RSA256" aka "RSASSA-PKCS-v1_5 using
|
| -// SHA-256 hash algorithm". This is defined in PKCS #1 (RFC 3447).
|
| -// It is encoding: { OID sha256WithRSAEncryption PARAMETERS NULL }
|
| -const uint8_t kSignatureAlgorithm[15] = {0x30, 0x0d, 0x06, 0x09, 0x2a,
|
| - 0x86, 0x48, 0x86, 0xf7, 0x0d,
|
| - 0x01, 0x01, 0x0b, 0x05, 0x00};
|
| -
|
| const char kBlockSizeKey[] = "block_size";
|
| const char kContentHashesKey[] = "content_hashes";
|
| const char kDescriptionKey[] = "description";
|
| @@ -308,7 +300,7 @@ bool VerifiedContents::VerifySignature(const std::string& protected_value,
|
| const std::string& signature_bytes) {
|
| crypto::SignatureVerifier signature_verifier;
|
| if (!signature_verifier.VerifyInit(
|
| - kSignatureAlgorithm, sizeof(kSignatureAlgorithm),
|
| + crypto::SignatureVerifier::RSA_PKCS1_SHA256,
|
| reinterpret_cast<const uint8_t*>(signature_bytes.data()),
|
| signature_bytes.size(), public_key_, public_key_size_)) {
|
| VLOG(1) << "Could not verify signature - VerifyInit failure";
|
|
|