diff options
Diffstat (limited to 'chromium/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_nss.cc')
-rw-r--r-- | chromium/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_nss.cc | 50 |
1 files changed, 0 insertions, 50 deletions
diff --git a/chromium/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_nss.cc b/chromium/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_nss.cc deleted file mode 100644 index 799a2c5a545..00000000000 --- a/chromium/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_nss.cc +++ /dev/null @@ -1,50 +0,0 @@ -// Copyright 2014 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "net/quic/crypto/chacha20_poly1305_rfc7539_decrypter.h" - -#include <pk11pub.h> - -using base::StringPiece; - -namespace net { - -namespace { - -const size_t kKeySize = 32; -const size_t kNoncePrefixSize = 4; - -} // namespace - -ChaCha20Poly1305Rfc7539Decrypter::ChaCha20Poly1305Rfc7539Decrypter() - : AeadBaseDecrypter(CKM_NSS_CHACHA20_POLY1305, - kKeySize, - kAuthTagSize, - kNoncePrefixSize) { - static_assert(kKeySize <= kMaxKeySize, "key size too big"); - static_assert(kNoncePrefixSize <= kMaxNoncePrefixSize, - "nonce prefix size too big"); -} - -ChaCha20Poly1305Rfc7539Decrypter::~ChaCha20Poly1305Rfc7539Decrypter() {} - -bool ChaCha20Poly1305Rfc7539Decrypter::IsSupported() { - return false; -} - -const char* ChaCha20Poly1305Rfc7539Decrypter::cipher_name() const { - return ""; -} - -uint32_t ChaCha20Poly1305Rfc7539Decrypter::cipher_id() const { - return 0; -} - -void ChaCha20Poly1305Rfc7539Decrypter::FillAeadParams( - base::StringPiece nonce, - base::StringPiece associated_data, - size_t auth_tag_size, - AeadParams* aead_params) const {} - -} // namespace net |