summaryrefslogtreecommitdiffhomepage
path: root/pkg/crypto/crypto_stdlib.go
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/crypto/crypto_stdlib.go')
-rw-r--r--pkg/crypto/crypto_stdlib.go42
1 files changed, 0 insertions, 42 deletions
diff --git a/pkg/crypto/crypto_stdlib.go b/pkg/crypto/crypto_stdlib.go
deleted file mode 100644
index 28eba2ff6..000000000
--- a/pkg/crypto/crypto_stdlib.go
+++ /dev/null
@@ -1,42 +0,0 @@
-// Copyright 2020 The gVisor Authors.
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-//go:build go1.1
-// +build go1.1
-
-package crypto
-
-import (
- "crypto/ecdsa"
- "crypto/elliptic"
- "crypto/sha512"
- "fmt"
- "math/big"
-)
-
-// EcdsaP384Sha384Verify verifies the signature in r, s of hash using ECDSA
-// P384 + SHA 384 and the public key, pub. Its return value records whether
-// the signature is valid.
-func EcdsaP384Sha384Verify(pub *ecdsa.PublicKey, data []byte, r, s *big.Int) (bool, error) {
- if pub.Curve != elliptic.P384() {
- return false, fmt.Errorf("unsupported key curve: want P-384, got %v", pub.Curve)
- }
- digest := sha512.Sum384(data)
- return ecdsa.Verify(pub, digest[:], r, s), nil
-}
-
-// SumSha384 returns the SHA384 checksum of the data.
-func SumSha384(data []byte) ([sha512.Size384]byte, error) {
- return sha512.Sum384(data), nil
-}