| Index: net/quic/chromium/crypto/proof_source_chromium.cc
|
| diff --git a/net/quic/chromium/crypto/proof_source_chromium.cc b/net/quic/chromium/crypto/proof_source_chromium.cc
|
| index 44b5e825213d06514a59aecdfc9bd1d5aeca1433..5e7906546d3b18296c0998009f2cbd1ec8717380 100644
|
| --- a/net/quic/chromium/crypto/proof_source_chromium.cc
|
| +++ b/net/quic/chromium/crypto/proof_source_chromium.cc
|
| @@ -93,43 +93,27 @@ bool ProofSourceChromium::GetProof(const IPAddress& server_ip,
|
| crypto::ScopedEVP_MD_CTX sign_context(EVP_MD_CTX_create());
|
| EVP_PKEY_CTX* pkey_ctx;
|
|
|
| - if (quic_version > QUIC_VERSION_30) {
|
| - uint32_t len = chlo_hash.length();
|
| - if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, EVP_sha256(),
|
| - nullptr, private_key_->key()) ||
|
| - !EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) ||
|
| - !EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(kProofSignatureLabel),
|
| - sizeof(kProofSignatureLabel)) ||
|
| - !EVP_DigestSignUpdate(sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(&len),
|
| - sizeof(len)) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(chlo_hash.data()), len) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(server_config.data()),
|
| - server_config.size())) {
|
| - return false;
|
| - }
|
| - } else if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, EVP_sha256(),
|
| - nullptr, private_key_->key()) ||
|
| - !EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) ||
|
| - !EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(kProofSignatureLabelOld),
|
| - sizeof(kProofSignatureLabelOld)) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(server_config.data()),
|
| - server_config.size())) {
|
| + uint32_t len_tmp = chlo_hash.length();
|
| + if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, EVP_sha256(),
|
| + nullptr, private_key_->key()) ||
|
| + !EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) ||
|
| + !EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1) ||
|
| + !EVP_DigestSignUpdate(
|
| + sign_context.get(),
|
| + reinterpret_cast<const uint8_t*>(kProofSignatureLabel),
|
| + sizeof(kProofSignatureLabel)) ||
|
| + !EVP_DigestSignUpdate(sign_context.get(),
|
| + reinterpret_cast<const uint8_t*>(&len_tmp),
|
| + sizeof(len_tmp)) ||
|
| + !EVP_DigestSignUpdate(
|
| + sign_context.get(),
|
| + reinterpret_cast<const uint8_t*>(chlo_hash.data()), len_tmp) ||
|
| + !EVP_DigestSignUpdate(
|
| + sign_context.get(),
|
| + reinterpret_cast<const uint8_t*>(server_config.data()),
|
| + server_config.size())) {
|
| return false;
|
| }
|
| -
|
| // Determine the maximum length of the signature.
|
| size_t len = 0;
|
| if (!EVP_DigestSignFinal(sign_context.get(), nullptr, &len)) {
|
|
|