Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(108)

Side by Side Diff: net/cert/ct_log_verifier_openssl.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/ct_log_verifier.h" 5 #include "net/cert/ct_log_verifier.h"
6 6
7 #include <openssl/evp.h> 7 #include <openssl/evp.h>
8 #include <openssl/x509.h> 8 #include <openssl/x509.h>
9 9
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 30 matching lines...) Expand all
41 CTLogVerifier::~CTLogVerifier() { 41 CTLogVerifier::~CTLogVerifier() {
42 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); 42 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
43 43
44 if (public_key_) 44 if (public_key_)
45 EVP_PKEY_free(public_key_); 45 EVP_PKEY_free(public_key_);
46 } 46 }
47 47
48 CTLogVerifier::CTLogVerifier() 48 CTLogVerifier::CTLogVerifier()
49 : hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE), 49 : hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE),
50 signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS), 50 signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS),
51 public_key_(NULL) {} 51 public_key_(NULL) {
52 }
52 53
53 bool CTLogVerifier::Init(const base::StringPiece& public_key, 54 bool CTLogVerifier::Init(const base::StringPiece& public_key,
54 const base::StringPiece& description) { 55 const base::StringPiece& description) {
55 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); 56 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
56 57
57 crypto::ScopedOpenSSL<BIO, BIO_free_all> bio( 58 crypto::ScopedOpenSSL<BIO, BIO_free_all> bio(
58 BIO_new_mem_buf(const_cast<char*>(public_key.data()), public_key.size())); 59 BIO_new_mem_buf(const_cast<char*>(public_key.data()), public_key.size()));
59 if (!bio.get()) 60 if (!bio.get())
60 return false; 61 return false;
61 62
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
97 const base::StringPiece& signature) { 98 const base::StringPiece& signature) {
98 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); 99 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
99 100
100 const EVP_MD* hash_alg = GetEvpAlg(hash_algorithm_); 101 const EVP_MD* hash_alg = GetEvpAlg(hash_algorithm_);
101 if (hash_alg == NULL) 102 if (hash_alg == NULL)
102 return false; 103 return false;
103 104
104 EVP_MD_CTX ctx; 105 EVP_MD_CTX ctx;
105 EVP_MD_CTX_init(&ctx); 106 EVP_MD_CTX_init(&ctx);
106 107
107 bool ok = ( 108 bool ok =
108 1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) && 109 (1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) &&
109 1 == EVP_DigestVerifyUpdate( 110 1 == EVP_DigestVerifyUpdate(
110 &ctx, data_to_sign.data(), data_to_sign.size()) && 111 &ctx, data_to_sign.data(), data_to_sign.size()) &&
111 1 == EVP_DigestVerifyFinal( 112 1 == EVP_DigestVerifyFinal(&ctx,
112 &ctx, 113 reinterpret_cast<unsigned char*>(
113 reinterpret_cast<unsigned char*>(const_cast<char*>(signature.data())), 114 const_cast<char*>(signature.data())),
114 signature.size())); 115 signature.size()));
115 116
116 EVP_MD_CTX_cleanup(&ctx); 117 EVP_MD_CTX_cleanup(&ctx);
117 return ok; 118 return ok;
118 } 119 }
119 120
120 } // namespace net 121 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698