Index: net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
diff --git a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
deleted file mode 100644 |
index d4480f49b2cfaf803bb305317547f79c3d9e5de0..0000000000000000000000000000000000000000 |
--- a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
+++ /dev/null |
@@ -1,58 +0,0 @@ |
-// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/quic/crypto/aes_128_gcm_12_decrypter.h" |
- |
-#include <pk11pub.h> |
-#include <secerr.h> |
- |
-using base::StringPiece; |
- |
-namespace net { |
- |
-namespace { |
- |
-const size_t kKeySize = 16; |
-const size_t kNoncePrefixSize = 4; |
- |
-} // namespace |
- |
-Aes128Gcm12Decrypter::Aes128Gcm12Decrypter() |
- : AeadBaseDecrypter(CKM_AES_GCM, kKeySize, kAuthTagSize, kNoncePrefixSize) { |
- static_assert(kKeySize <= kMaxKeySize, "key size too big"); |
- static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize, |
- "nonce prefix size too big"); |
-} |
- |
-Aes128Gcm12Decrypter::~Aes128Gcm12Decrypter() {} |
- |
-void Aes128Gcm12Decrypter::FillAeadParams(StringPiece nonce, |
- StringPiece associated_data, |
- size_t auth_tag_size, |
- AeadParams* aead_params) const { |
- aead_params->len = sizeof(aead_params->data.gcm_params); |
- CK_GCM_PARAMS* gcm_params = &aead_params->data.gcm_params; |
- gcm_params->pIv = reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data())); |
- gcm_params->ulIvLen = nonce.size(); |
- gcm_params->pAAD = |
- reinterpret_cast<CK_BYTE*>(const_cast<char*>(associated_data.data())); |
- gcm_params->ulAADLen = associated_data.size(); |
- gcm_params->ulTagBits = auth_tag_size * 8; |
-} |
- |
-const char* Aes128Gcm12Decrypter::cipher_name() const { |
- // TODO(rtenneti): Use TLS1_TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256 instead |
- // of hard coded string. |
- // return TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256; |
- return "ECDHE-RSA-AES128-GCM-SHA256"; |
-} |
- |
-uint32_t Aes128Gcm12Decrypter::cipher_id() const { |
- // TODO(rtenneti): when Chromium requires NSS 3.15.2 or later, use |
- // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 instead of 0xC02F. |
- // Or'ed with 0x03000000 to match OpenSSL/BoringSSL implementations. |
- return 0x03000000 | 0xC02F; |
-} |
- |
-} // namespace net |