summaryrefslogtreecommitdiffstats
path: root/net/third_party
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-10-24 13:54:32 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-10-24 13:54:32 +0000
commit40ecbe7fbf307b05d68c80aa52e519e1bfe68d8a (patch)
tree09d4f0c76ccb43a9145abafcb1d68e1f6f900976 /net/third_party
parentf485985e24c08cb6186870dd0b0a02e4684a85ac (diff)
downloadchromium_src-40ecbe7fbf307b05d68c80aa52e519e1bfe68d8a.zip
chromium_src-40ecbe7fbf307b05d68c80aa52e519e1bfe68d8a.tar.gz
chromium_src-40ecbe7fbf307b05d68c80aa52e519e1bfe68d8a.tar.bz2
Update to the new definitions of CKM_NSS_CHACHA20_POLY1305 and
struct CK_NSS_AEAD_PARAMS. This updates code added in https://codereview.chromium.org/23619044. R=agl@chromium.org BUG=310768 TEST=none Review URL: https://codereview.chromium.org/36073014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@230713 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/third_party')
-rw-r--r--net/third_party/nss/ssl/ssl3con.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3con.c
index 7b93a63..8395f61 100644
--- a/net/third_party/nss/ssl/ssl3con.c
+++ b/net/third_party/nss/ssl/ssl3con.c
@@ -43,15 +43,15 @@
/* This is a bodge to allow this code to be compiled against older NSS
* headers. */
#ifndef CKM_NSS_CHACHA20_POLY1305
-#define CKM_NSS_CHACHA20_POLY1305 (CKM_NSS + 25)
+#define CKM_NSS_CHACHA20_POLY1305 (CKM_NSS + 26)
-typedef struct CK_AEAD_PARAMS {
- CK_BYTE_PTR pIv; /* This is the nonce. */
- CK_ULONG ulIvLen;
- CK_BYTE_PTR pAAD;
- CK_ULONG ulAADLen;
- CK_ULONG ulTagBits;
-} CK_AEAD_PARAMS;
+typedef struct CK_NSS_AEAD_PARAMS {
+ CK_BYTE_PTR pIv; /* This is the nonce. */
+ CK_ULONG ulIvLen;
+ CK_BYTE_PTR pAAD;
+ CK_ULONG ulAADLen;
+ CK_ULONG ulTagLen;
+} CK_NSS_AEAD_PARAMS;
#endif
@@ -2064,18 +2064,18 @@ ssl3_ChaCha20Poly1305(
SECItem param;
SECStatus rv = SECFailure;
unsigned int uOutLen;
- CK_AEAD_PARAMS aeadParams;
+ CK_NSS_AEAD_PARAMS aeadParams;
static const int tagSize = 16;
param.type = siBuffer;
param.len = sizeof(aeadParams);
param.data = (unsigned char *) &aeadParams;
- memset(&aeadParams, 0, sizeof(CK_AEAD_PARAMS));
+ memset(&aeadParams, 0, sizeof(aeadParams));
aeadParams.pIv = (unsigned char *) additionalData;
aeadParams.ulIvLen = 8;
aeadParams.pAAD = (unsigned char *) additionalData;
aeadParams.ulAADLen = additionalDataLen;
- aeadParams.ulTagBits = tagSize * 8;
+ aeadParams.ulTagLen = tagSize;
if (doDecrypt) {
rv = pk11_decrypt(keys->write_key, CKM_NSS_CHACHA20_POLY1305, &param,