| Index: net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| diff --git a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| deleted file mode 100644
|
| index 78c1d3dc847717e7eeb45709867109d192825ac4..0000000000000000000000000000000000000000
|
| --- a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| +++ /dev/null
|
| @@ -1,44 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/quic/crypto/aes_128_gcm_12_encrypter.h"
|
| -
|
| -#include <pk11pub.h>
|
| -#include <secerr.h>
|
| -
|
| -using base::StringPiece;
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -const size_t kKeySize = 16;
|
| -const size_t kNoncePrefixSize = 4;
|
| -
|
| -} // namespace
|
| -
|
| -Aes128Gcm12Encrypter::Aes128Gcm12Encrypter()
|
| - : AeadBaseEncrypter(CKM_AES_GCM, kKeySize, kAuthTagSize, kNoncePrefixSize) {
|
| - static_assert(kKeySize <= kMaxKeySize, "key size too big");
|
| - static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize,
|
| - "nonce prefix size too big");
|
| -}
|
| -
|
| -Aes128Gcm12Encrypter::~Aes128Gcm12Encrypter() {}
|
| -
|
| -void Aes128Gcm12Encrypter::FillAeadParams(StringPiece nonce,
|
| - StringPiece associated_data,
|
| - size_t auth_tag_size,
|
| - AeadParams* aead_params) const {
|
| - aead_params->len = sizeof(aead_params->data.gcm_params);
|
| - CK_GCM_PARAMS* gcm_params = &aead_params->data.gcm_params;
|
| - gcm_params->pIv = reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data()));
|
| - gcm_params->ulIvLen = nonce.size();
|
| - gcm_params->pAAD =
|
| - reinterpret_cast<CK_BYTE*>(const_cast<char*>(associated_data.data()));
|
| - gcm_params->ulAADLen = associated_data.size();
|
| - gcm_params->ulTagBits = auth_tag_size * 8;
|
| -}
|
| -
|
| -} // namespace net
|
|
|