| Index: crypto/hmac_nss.cc
|
| diff --git a/crypto/hmac_nss.cc b/crypto/hmac_nss.cc
|
| deleted file mode 100644
|
| index 25478609e81d929bf93ef6c8af00f777de7647b0..0000000000000000000000000000000000000000
|
| --- a/crypto/hmac_nss.cc
|
| +++ /dev/null
|
| @@ -1,119 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "crypto/hmac.h"
|
| -
|
| -#include <nss.h>
|
| -#include <pk11pub.h>
|
| -#include <stddef.h>
|
| -
|
| -#include <memory>
|
| -
|
| -#include "base/logging.h"
|
| -#include "crypto/nss_util.h"
|
| -#include "crypto/scoped_nss_types.h"
|
| -
|
| -namespace crypto {
|
| -
|
| -struct HMACPlatformData {
|
| - CK_MECHANISM_TYPE mechanism_;
|
| - ScopedPK11Slot slot_;
|
| - ScopedPK11SymKey sym_key_;
|
| -};
|
| -
|
| -HMAC::HMAC(HashAlgorithm hash_alg)
|
| - : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
| - // Only SHA-1 and SHA-256 hash algorithms are supported.
|
| - switch (hash_alg_) {
|
| - case SHA1:
|
| - plat_->mechanism_ = CKM_SHA_1_HMAC;
|
| - break;
|
| - case SHA256:
|
| - plat_->mechanism_ = CKM_SHA256_HMAC;
|
| - break;
|
| - default:
|
| - NOTREACHED() << "Unsupported hash algorithm";
|
| - break;
|
| - }
|
| -}
|
| -
|
| -HMAC::~HMAC() {
|
| -}
|
| -
|
| -bool HMAC::Init(const unsigned char *key, size_t key_length) {
|
| - EnsureNSSInit();
|
| -
|
| - if (plat_->slot_.get()) {
|
| - // Init must not be called more than twice on the same HMAC object.
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - plat_->slot_.reset(PK11_GetInternalSlot());
|
| - if (!plat_->slot_.get()) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - SECItem key_item;
|
| - key_item.type = siBuffer;
|
| - key_item.data = const_cast<unsigned char*>(key); // NSS API isn't const.
|
| - key_item.len = key_length;
|
| -
|
| - plat_->sym_key_.reset(PK11_ImportSymKey(plat_->slot_.get(),
|
| - plat_->mechanism_,
|
| - PK11_OriginUnwrap,
|
| - CKA_SIGN,
|
| - &key_item,
|
| - NULL));
|
| - if (!plat_->sym_key_.get()) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -bool HMAC::Sign(const base::StringPiece& data,
|
| - unsigned char* digest,
|
| - size_t digest_length) const {
|
| - if (!plat_->sym_key_.get()) {
|
| - // Init has not been called before Sign.
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - SECItem param = { siBuffer, NULL, 0 };
|
| - ScopedPK11Context context(PK11_CreateContextBySymKey(plat_->mechanism_,
|
| - CKA_SIGN,
|
| - plat_->sym_key_.get(),
|
| - ¶m));
|
| - if (!context.get()) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - if (PK11_DigestBegin(context.get()) != SECSuccess) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - if (PK11_DigestOp(context.get(),
|
| - reinterpret_cast<const unsigned char*>(data.data()),
|
| - data.length()) != SECSuccess) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - unsigned int len = 0;
|
| - if (PK11_DigestFinal(context.get(),
|
| - digest, &len, digest_length) != SECSuccess) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -} // namespace crypto
|
|
|