Index: net/quic/crypto/proof_verifier_chromium.cc |
diff --git a/net/quic/crypto/proof_verifier_chromium.cc b/net/quic/crypto/proof_verifier_chromium.cc |
index 9e3b2ec2ca6c246028440ae7177de71bab0c76f7..c5fa6b356942aeca16f31183bdb771e3e661f157 100644 |
--- a/net/quic/crypto/proof_verifier_chromium.cc |
+++ b/net/quic/crypto/proof_verifier_chromium.cc |
@@ -365,27 +365,11 @@ bool ProofVerifierChromium::Job::VerifySignature(const string& signed_data, |
return false; |
} |
} else if (type == X509Certificate::kPublicKeyTypeECDSA) { |
- // This is the algorithm ID for ECDSA with SHA-256. Parameters are ABSENT. |
- // RFC 5758: |
- // ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) |
- // us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 } |
- // ... |
- // When the ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with-SHA384, or |
- // ecdsa-with-SHA512 algorithm identifier appears in the algorithm field |
- // as an AlgorithmIdentifier, the encoding MUST omit the parameters |
- // field. That is, the AlgorithmIdentifier SHALL be a SEQUENCE of one |
- // component, the OID ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with- |
- // SHA384, or ecdsa-with-SHA512. |
- // See also RFC 5480, Appendix A. |
- static const uint8_t kECDSAWithSHA256AlgorithmID[] = { |
- 0x30, 0x0a, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x02, |
- }; |
- |
- if (!verifier.VerifyInit( |
- kECDSAWithSHA256AlgorithmID, sizeof(kECDSAWithSHA256AlgorithmID), |
- reinterpret_cast<const uint8_t*>(signature.data()), |
- signature.size(), reinterpret_cast<const uint8_t*>(spki.data()), |
- spki.size())) { |
+ if (!verifier.VerifyInit(crypto::SignatureVerifier::ECDSA_SHA256, |
+ reinterpret_cast<const uint8_t*>(signature.data()), |
+ signature.size(), |
+ reinterpret_cast<const uint8_t*>(spki.data()), |
+ spki.size())) { |
DLOG(WARNING) << "VerifyInit failed"; |
return false; |
} |