@@ -250,38 +250,8 @@ static int pkey_ec_verify(EVP_PKEY_CTX *ctx,
250250 return ret ;
251251}
252252
253- static int int_update (EVP_MD_CTX * ctx , const void * data , size_t count )
254- {
255- if (!EVP_DigestUpdate (ctx , data , count ))
256- return 0 ;
257- return 1 ;
258- }
259-
260253static int pkey_ec_signctx_init (EVP_PKEY_CTX * ctx , EVP_MD_CTX * mctx )
261254{
262- EC_PKEY_CTX * dctx = ctx -> data ;
263- EC_KEY * ec_key = ctx -> pkey -> pkey .ec ;
264- const EVP_MD * md = EVP_sm3 ();
265- unsigned char zid [EVP_MAX_MD_SIZE ];
266- unsigned int zidlen = sizeof (zid );
267-
268- //FIXME: it is wrong to do it here!
269- #if 0
270- if (dctx -> sign_type == NID_sm_scheme ) {
271- if (!SM2_compute_id_digest (md , zid , & zidlen , ec_key )) {
272- ECerr (EC_F_PKEY_EC_SIGNCTX_INIT , ERR_R_SM2_LIB );
273- return 0 ;
274- }
275-
276- mctx -> update = int_update ;
277-
278- if (!mctx -> update (mctx , zid , zidlen )) {
279- ECerr (EC_F_PKEY_EC_SIGNCTX_INIT , ERR_R_EVP_LIB );
280- return 0 ;
281- }
282- }
283- #endif
284-
285255 return 1 ;
286256}
287257
@@ -324,29 +294,7 @@ static int pkey_ec_signctx(EVP_PKEY_CTX *ctx,
324294
325295static int pkey_ec_verifyctx_init (EVP_PKEY_CTX * ctx , EVP_MD_CTX * mctx )
326296{
327- int ret = 0 ;
328- EC_PKEY_CTX * dctx = ctx -> data ;
329- EC_KEY * ec_key = ctx -> pkey -> pkey .ec ;
330- const EVP_MD * md = EVP_sm3 (); // FIXME: we need to get md from somewhere
331- unsigned char zid [EVP_MAX_MD_SIZE ];
332- unsigned int zidlen ;
333-
334- #if 0
335- if (dctx -> sign_type == NID_sm_scheme ) {
336-
337- zidlen = sizeof (zid );
338- if (!SM2_compute_id_digest (md , zid , & zidlen , ec_key )) {
339- goto end ;
340- }
341- if (!mctx -> update (mctx , zid , zidlen )) {
342- goto end ;
343- }
344- }
345- #endif
346-
347- ret = 1 ;
348- end :
349- return ret ;
297+ return 1 ;
350298}
351299
352300static int pkey_ec_verifyctx (EVP_PKEY_CTX * ctx ,
0 commit comments