Index: google_apis/cup/client_update_protocol_nss.cc |
diff --git a/google_apis/cup/client_update_protocol_nss.cc b/google_apis/cup/client_update_protocol_nss.cc |
deleted file mode 100644 |
index 1d3ff24d4f7b115acb37c7e981becd7ae6737ac2..0000000000000000000000000000000000000000 |
--- a/google_apis/cup/client_update_protocol_nss.cc |
+++ /dev/null |
@@ -1,80 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "google_apis/cup/client_update_protocol.h" |
- |
-#include <keyhi.h> |
-#include <pk11pub.h> |
-#include <seccomon.h> |
- |
-#include "base/logging.h" |
-#include "crypto/nss_util.h" |
-#include "crypto/scoped_nss_types.h" |
- |
-typedef scoped_ptr<CERTSubjectPublicKeyInfo, |
- crypto::NSSDestroyer<CERTSubjectPublicKeyInfo, |
- SECKEY_DestroySubjectPublicKeyInfo> > |
- ScopedCERTSubjectPublicKeyInfo; |
- |
-ClientUpdateProtocol::~ClientUpdateProtocol() { |
- if (public_key_) |
- SECKEY_DestroyPublicKey(public_key_); |
-} |
- |
-bool ClientUpdateProtocol::LoadPublicKey(const base::StringPiece& public_key) { |
- crypto::EnsureNSSInit(); |
- |
- // The binary blob |public_key| is expected to be a DER-encoded ASN.1 |
- // Subject Public Key Info. |
- SECItem spki_item; |
- spki_item.type = siBuffer; |
- spki_item.data = |
- reinterpret_cast<unsigned char*>(const_cast<char*>(public_key.data())); |
- spki_item.len = static_cast<unsigned int>(public_key.size()); |
- |
- ScopedCERTSubjectPublicKeyInfo spki( |
- SECKEY_DecodeDERSubjectPublicKeyInfo(&spki_item)); |
- if (!spki.get()) |
- return false; |
- |
- public_key_ = SECKEY_ExtractPublicKey(spki.get()); |
- if (!public_key_) |
- return false; |
- |
- if (!PublicKeyLength()) |
- return false; |
- |
- return true; |
-} |
- |
-size_t ClientUpdateProtocol::PublicKeyLength() { |
- if (!public_key_) |
- return 0; |
- |
- return SECKEY_PublicKeyStrength(public_key_); |
-} |
- |
-bool ClientUpdateProtocol::EncryptKeySource( |
- const std::vector<uint8>& key_source) { |
- // WARNING: This call bypasses the usual PKCS #1 padding and does direct RSA |
- // exponentiation. This is not secure without taking measures to ensure that |
- // the contents of r are suitable. This is done to remain compatible with |
- // the implementation on the Google Update servers; don't copy-paste this |
- // code arbitrarily and expect it to work and/or remain secure! |
- if (!public_key_) |
- return false; |
- |
- size_t keysize = SECKEY_PublicKeyStrength(public_key_); |
- if (key_source.size() != keysize) |
- return false; |
- |
- encrypted_key_source_.resize(keysize); |
- return SECSuccess == PK11_PubEncryptRaw( |
- public_key_, |
- &encrypted_key_source_[0], |
- const_cast<unsigned char*>(&key_source[0]), |
- key_source.size(), |
- NULL); |
-} |
- |