Skip to content

Commit d7037c6

Browse files
committed
sign: Drop sign_init support
We need digest_sign_init() as we need to calculate the digest and then sign the data. So drop sign_init() in this patch. Signed-off-by: Gowtham Suresh Kumar <[email protected]>
1 parent a4094f2 commit d7037c6

File tree

1 file changed

+0
-41
lines changed
  • parsec-openssl-provider/src/signature

1 file changed

+0
-41
lines changed

parsec-openssl-provider/src/signature/mod.rs

Lines changed: 0 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -63,38 +63,6 @@ pub unsafe extern "C" fn parsec_provider_signature_freectx(ctx: VOID_PTR) {
6363
// When sig_ctx is dropped, the reference count is decremented and the memory is freed
6464
}
6565

66-
/*
67-
Initialises a context for signing given a provider side signature context in the ctx parameter, and a pointer to a
68-
provider key object in the provkey parameter. The params, if not NULL, should be set on the context in a manner similar
69-
to using OSSL_FUNC_signature_set_ctx_params(). The key object should have been previously generated, loaded or imported
70-
into the provider using the key management (OSSL_OP_KEYMGMT) operation.
71-
*/
72-
unsafe extern "C" fn parsec_provider_signature_sign_init(
73-
ctx: VOID_PTR,
74-
provkey: VOID_PTR,
75-
_params: *const OSSL_PARAM,
76-
) -> std::os::raw::c_int {
77-
let result = super::r#catch(Some(|| super::Error::PROVIDER_SIGNATURE_SIGN_INIT), || {
78-
if ctx.is_null() || provkey.is_null() {
79-
return Err("Neither ctx nor provkey pointers should be NULL.".into());
80-
}
81-
Arc::increment_strong_count(ctx as *const RwLock<ParsecProviderSignatureContext>);
82-
let sig_ctx = Arc::from_raw(ctx as *const RwLock<ParsecProviderSignatureContext>);
83-
84-
Arc::increment_strong_count(provkey as *const RwLock<ParsecProviderKeyObject>);
85-
let prov_key = Arc::from_raw(provkey as *const RwLock<ParsecProviderKeyObject>);
86-
87-
let mut sig_writable = sig_ctx.write().unwrap();
88-
sig_writable.keyobj = Some(prov_key.clone());
89-
Ok(OPENSSL_SUCCESS)
90-
});
91-
92-
match result {
93-
Ok(result) => result,
94-
Err(()) => OPENSSL_ERROR,
95-
}
96-
}
97-
9866
fn get_signature_len(key_attrs: Attributes) -> Result<usize, String> {
9967
match key_attrs.key_type {
10068
Type::RsaKeyPair => Ok(key_attrs.bits / 8),
@@ -216,24 +184,15 @@ pub type SignatureSignPtr = unsafe extern "C" fn(
216184
*const std::os::raw::c_uchar,
217185
std::os::raw::c_uint,
218186
) -> std::os::raw::c_int;
219-
pub type SignatureSignInitPtr =
220-
unsafe extern "C" fn(VOID_PTR, VOID_PTR, *const OSSL_PARAM) -> std::os::raw::c_int;
221187

222188
const OSSL_FUNC_SIGNATURE_NEWCTX_PTR: SignatureNewCtxPtr = parsec_provider_signature_newctx;
223189
const OSSL_FUNC_SIGNATURE_FREECTX_PTR: SignatureFreeCtxPtr = parsec_provider_signature_freectx;
224190
const OSSL_FUNC_SIGNATURE_SIGN_PTR: SignatureSignPtr = parsec_provider_signature_sign;
225-
const OSSL_FUNC_SIGNATURE_SIGN_INIT_PTR: SignatureSignInitPtr = parsec_provider_signature_sign_init;
226191

227192
const PARSEC_PROVIDER_SIGN_IMPL: [OSSL_DISPATCH; 5] = [
228193
unsafe { ossl_dispatch!(OSSL_FUNC_SIGNATURE_NEWCTX, OSSL_FUNC_SIGNATURE_NEWCTX_PTR) },
229194
unsafe { ossl_dispatch!(OSSL_FUNC_SIGNATURE_FREECTX, OSSL_FUNC_SIGNATURE_FREECTX_PTR) },
230195
unsafe { ossl_dispatch!(OSSL_FUNC_SIGNATURE_SIGN, OSSL_FUNC_SIGNATURE_SIGN_PTR) },
231-
unsafe {
232-
ossl_dispatch!(
233-
OSSL_FUNC_SIGNATURE_SIGN_INIT,
234-
OSSL_FUNC_SIGNATURE_SIGN_INIT_PTR
235-
)
236-
},
237196
ossl_dispatch!(),
238197
];
239198

0 commit comments

Comments
 (0)