aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlberto Compagno <acompagn+fdio@cisco.com>2019-02-07 13:55:38 +0100
committerAlberto Compagno <acompagn+fdio@cisco.com>2019-02-07 13:55:38 +0100
commitfa9264951b3b3b4e69af84744f20e2dc147facf6 (patch)
treeced7eb7d51dba2860daa1cc1c56425fc5463da76
parent58910d547203d4147690f7ef8fac251d0f375344 (diff)
Code cleanup
Change-Id: Ia032d574a84db8688445567657bd2f970d79cbb3 Signed-off-by: Alberto Compagno <acompagn+fdio@cisco.com>
-rw-r--r--libparc/parc/security/parc_PublicKeySigner.c3
-rw-r--r--libparc/parc/security/parc_SymmetricKeySigner.c2
2 files changed, 1 insertions, 4 deletions
diff --git a/libparc/parc/security/parc_PublicKeySigner.c b/libparc/parc/security/parc_PublicKeySigner.c
index de048df8..c44a9158 100644
--- a/libparc/parc/security/parc_PublicKeySigner.c
+++ b/libparc/parc/security/parc_PublicKeySigner.c
@@ -200,7 +200,6 @@ static inline int _SignDigestECDSA(const PARCCryptoHash *digestToSign, PARCBuffe
EC_KEY *ec_key = EVP_PKEY_get1_EC_KEY(privateKey);
- //*sig = parcMemory_Allocate(ECDSA_size(ec_key));
parcAssertNotNull(sig, "Expected pointer to a memory region for storing the signature %u. Pointer is NULL", ECDSA_size(ec_key));
*sigLength = 0;
@@ -255,8 +254,6 @@ _SignDigest(PARCPublicKeySigner *signer, const PARCCryptoHash *digestToSign, uin
}
PARCBuffer *bbSign = parcBuffer_Wrap(signature_buf, signLenght, 0, signLenght);
- //parcBuffer_Flip(parcBuffer_PutArray(bbSign, sigLength, sig));
- //parcMemory_Deallocate((void **) &sig);
PARCSignature *signature =
parcSignature_Create(_GetSigningAlgorithm(signer),
diff --git a/libparc/parc/security/parc_SymmetricKeySigner.c b/libparc/parc/security/parc_SymmetricKeySigner.c
index 5f87b945..bfb98e42 100644
--- a/libparc/parc/security/parc_SymmetricKeySigner.c
+++ b/libparc/parc/security/parc_SymmetricKeySigner.c
@@ -265,7 +265,7 @@ _signDigest(PARCSymmetricKeySigner *interfaceContext, const PARCCryptoHash *hash
{
// The digest computed via our hash function (hmac) is the actual signature.
// just need to wrap it up with the right parameters.
- PARCBuffer *signatureBits = parcBuffer_Wrap(signature, sig_len, 0, sig_len);//parcBuffer_Copy(parcCryptoHash_GetDigest(hashToSign));
+ PARCBuffer *signatureBits = parcBuffer_Wrap(signature, sig_len, 0, sig_len);
PARCSignature *result = parcSignature_Create(_getSigningAlgorithm(interfaceContext), parcCryptoHash_GetDigestType(hashToSign), signatureBits);
parcBuffer_Release(&signatureBits);
return result;