| Index: net/quic/crypto/chacha20_poly1305_encrypter_nss.cc
|
| diff --git a/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc b/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc
|
| deleted file mode 100644
|
| index 770088cb1deb374da0f525c896c66c9cffcf0577..0000000000000000000000000000000000000000
|
| --- a/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc
|
| +++ /dev/null
|
| @@ -1,80 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/quic/crypto/chacha20_poly1305_encrypter.h"
|
| -
|
| -#include <pk11pub.h>
|
| -
|
| -#include "base/logging.h"
|
| -
|
| -using base::StringPiece;
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -const size_t kKeySize = 32;
|
| -const size_t kNoncePrefixSize = 0;
|
| -
|
| -} // namespace
|
| -
|
| -#if defined(USE_NSS)
|
| -
|
| -// System NSS doesn't support ChaCha20+Poly1305 yet.
|
| -
|
| -ChaCha20Poly1305Encrypter::ChaCha20Poly1305Encrypter()
|
| - : AeadBaseEncrypter(CKM_INVALID_MECHANISM, nullptr, kKeySize,
|
| - kAuthTagSize, kNoncePrefixSize) {
|
| - NOTIMPLEMENTED();
|
| -}
|
| -
|
| -ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() {}
|
| -
|
| -// static
|
| -bool ChaCha20Poly1305Encrypter::IsSupported() {
|
| - return false;
|
| -}
|
| -
|
| -void ChaCha20Poly1305Encrypter::FillAeadParams(StringPiece nonce,
|
| - StringPiece associated_data,
|
| - size_t auth_tag_size,
|
| - AeadParams* aead_params) const {
|
| - NOTIMPLEMENTED();
|
| -}
|
| -
|
| -#else // defined(USE_NSS)
|
| -
|
| -ChaCha20Poly1305Encrypter::ChaCha20Poly1305Encrypter()
|
| - : AeadBaseEncrypter(CKM_NSS_CHACHA20_POLY1305, PK11_Encrypt, kKeySize,
|
| - kAuthTagSize, kNoncePrefixSize) {
|
| - static_assert(kKeySize <= kMaxKeySize, "key size too big");
|
| - static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize,
|
| - "nonce prefix size too big");
|
| -}
|
| -
|
| -ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() {}
|
| -
|
| -// static
|
| -bool ChaCha20Poly1305Encrypter::IsSupported() {
|
| - return true;
|
| -}
|
| -
|
| -void ChaCha20Poly1305Encrypter::FillAeadParams(StringPiece nonce,
|
| - StringPiece associated_data,
|
| - size_t auth_tag_size,
|
| - AeadParams* aead_params) const {
|
| - aead_params->len = sizeof(aead_params->data.nss_aead_params);
|
| - CK_NSS_AEAD_PARAMS* nss_aead_params = &aead_params->data.nss_aead_params;
|
| - nss_aead_params->pIv =
|
| - reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data()));
|
| - nss_aead_params->ulIvLen = nonce.size();
|
| - nss_aead_params->pAAD =
|
| - reinterpret_cast<CK_BYTE*>(const_cast<char*>(associated_data.data()));
|
| - nss_aead_params->ulAADLen = associated_data.size();
|
| - nss_aead_params->ulTagLen = auth_tag_size;
|
| -}
|
| -
|
| -#endif // defined(USE_NSS)
|
| -
|
| -} // namespace net
|
|
|