Remove TODO about removing ECDSA_do_sign/ECDSA_do_verify.
These functions are useful for implementing non-ASN.1-based protocols like JSON Web Signature (JWS) and they are even already used within Chromium. Change-Id: I58f41ca7beedc5a0b7a8c3da53f319aadff4c0e7 Reviewed-on: https://boringssl-review.googlesource.com/3936 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
7e6c4c8945
commit
5d48b02a5b
@ -107,17 +107,13 @@ OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_new(void);
|
|||||||
OPENSSL_EXPORT void ECDSA_SIG_free(ECDSA_SIG *sig);
|
OPENSSL_EXPORT void ECDSA_SIG_free(ECDSA_SIG *sig);
|
||||||
|
|
||||||
/* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and returns the
|
/* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and returns the
|
||||||
* resulting signature structure, or NULL on error.
|
* resulting signature structure, or NULL on error. */
|
||||||
*
|
|
||||||
* TODO(fork): remove this function. */
|
|
||||||
OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest,
|
OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest,
|
||||||
size_t digest_len, EC_KEY *key);
|
size_t digest_len, EC_KEY *key);
|
||||||
|
|
||||||
/* ECDSA_verify verifies that |sig| constitutes a valid signature by |key| of
|
/* ECDSA_verify verifies that |sig| constitutes a valid signature by |key| of
|
||||||
* |digest|. It returns one on success or zero if the signature is invalid or
|
* |digest|. It returns one on success or zero if the signature is invalid or
|
||||||
* on error.
|
* on error. */
|
||||||
*
|
|
||||||
* TODO(fork): remove this function. */
|
|
||||||
OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
|
OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
|
||||||
const ECDSA_SIG *sig, EC_KEY *key);
|
const ECDSA_SIG *sig, EC_KEY *key);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user