| Index: crypto/ec_signature_creator_nss.cc
|
| diff --git a/crypto/ec_signature_creator_nss.cc b/crypto/ec_signature_creator_nss.cc
|
| deleted file mode 100644
|
| index 7c8cc7df55c73175a5d394102efc6fe2ea28771e..0000000000000000000000000000000000000000
|
| --- a/crypto/ec_signature_creator_nss.cc
|
| +++ /dev/null
|
| @@ -1,116 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "crypto/ec_signature_creator_impl.h"
|
| -
|
| -#include <cryptohi.h>
|
| -#include <pk11pub.h>
|
| -#include <secerr.h>
|
| -#include <sechash.h>
|
| -#if defined(OS_POSIX)
|
| -#include <stddef.h>
|
| -#include <stdint.h>
|
| -#include <unistd.h>
|
| -#endif
|
| -
|
| -#include "base/logging.h"
|
| -#include "crypto/ec_private_key.h"
|
| -#include "crypto/nss_util.h"
|
| -#include "crypto/scoped_nss_types.h"
|
| -
|
| -namespace crypto {
|
| -
|
| -namespace {
|
| -
|
| -SECStatus SignData(SECItem* result,
|
| - SECItem* input,
|
| - SECKEYPrivateKey* key,
|
| - HASH_HashType hash_type) {
|
| - if (key->keyType != ecKey) {
|
| - DLOG(FATAL) << "Should be using an EC key.";
|
| - PORT_SetError(SEC_ERROR_INVALID_ARGS);
|
| - return SECFailure;
|
| - }
|
| -
|
| - // Hash the input.
|
| - std::vector<uint8_t> hash_data(HASH_ResultLen(hash_type));
|
| - SECStatus rv = HASH_HashBuf(
|
| - hash_type, &hash_data[0], input->data, input->len);
|
| - if (rv != SECSuccess)
|
| - return rv;
|
| - SECItem hash = {siBuffer, &hash_data[0],
|
| - static_cast<unsigned int>(hash_data.size())};
|
| -
|
| - // Compute signature of hash.
|
| - int signature_len = PK11_SignatureLen(key);
|
| - std::vector<uint8_t> signature_data(signature_len);
|
| - SECItem sig = {siBuffer, &signature_data[0],
|
| - static_cast<unsigned int>(signature_len)};
|
| - rv = PK11_Sign(key, &sig, &hash);
|
| - if (rv != SECSuccess)
|
| - return rv;
|
| -
|
| - // DER encode the signature.
|
| - return DSAU_EncodeDerSigWithLen(result, &sig, sig.len);
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -ECSignatureCreatorImpl::ECSignatureCreatorImpl(ECPrivateKey* key)
|
| - : key_(key) {
|
| - EnsureNSSInit();
|
| -}
|
| -
|
| -ECSignatureCreatorImpl::~ECSignatureCreatorImpl() {}
|
| -
|
| -bool ECSignatureCreatorImpl::Sign(const uint8_t* data,
|
| - int data_len,
|
| - std::vector<uint8_t>* signature) {
|
| - // Data to be signed
|
| - SECItem secret;
|
| - secret.type = siBuffer;
|
| - secret.len = data_len;
|
| - secret.data = const_cast<unsigned char*>(data);
|
| -
|
| - // SECItem to receive the output buffer.
|
| - SECItem result;
|
| - result.type = siBuffer;
|
| - result.len = 0;
|
| - result.data = NULL;
|
| -
|
| - // Sign the secret data and save it to |result|.
|
| - SECStatus rv =
|
| - SignData(&result, &secret, key_->key(), HASH_AlgSHA256);
|
| - if (rv != SECSuccess) {
|
| - DLOG(ERROR) << "DerSignData: " << PORT_GetError();
|
| - return false;
|
| - }
|
| -
|
| - // Copy the signed data into the output vector.
|
| - signature->assign(result.data, result.data + result.len);
|
| - SECITEM_FreeItem(&result, PR_FALSE /* only free |result.data| */);
|
| - return true;
|
| -}
|
| -
|
| -bool ECSignatureCreatorImpl::DecodeSignature(
|
| - const std::vector<uint8_t>& der_sig,
|
| - std::vector<uint8_t>* out_raw_sig) {
|
| - SECItem der_sig_item;
|
| - der_sig_item.type = siBuffer;
|
| - der_sig_item.len = der_sig.size();
|
| - der_sig_item.data = const_cast<uint8_t*>(&der_sig[0]);
|
| -
|
| - size_t signature_len = SECKEY_SignatureLen(key_->public_key());
|
| - if (signature_len == 0)
|
| - return false;
|
| -
|
| - SECItem* raw_sig = DSAU_DecodeDerSigToLen(&der_sig_item, signature_len);
|
| - if (!raw_sig)
|
| - return false;
|
| - out_raw_sig->assign(raw_sig->data, raw_sig->data + raw_sig->len);
|
| - SECITEM_FreeItem(raw_sig, PR_TRUE /* free SECItem structure itself. */);
|
| - return true;
|
| -}
|
| -
|
| -} // namespace crypto
|
|
|