Index: content/renderer/webcrypto/webcrypto_impl_openssl.cc |
diff --git a/content/renderer/webcrypto/webcrypto_impl_openssl.cc b/content/renderer/webcrypto/webcrypto_impl_openssl.cc |
index 3543f5a3f7952124b2291df39ef7ba03951cdf84..25e54277241b6fdbb5ea84c4ad62b63282ee979d 100644 |
--- a/content/renderer/webcrypto/webcrypto_impl_openssl.cc |
+++ b/content/renderer/webcrypto/webcrypto_impl_openssl.cc |
@@ -156,6 +156,24 @@ bool AesCbcEncryptDecrypt(CipherOperation cipher_operation, |
return true; |
} |
+bool ExportKeyInternalRaw( |
+ const blink::WebCryptoKey& key, |
+ blink::WebArrayBuffer* buffer) { |
+ |
+ DCHECK(key.handle()); |
+ DCHECK(buffer); |
+ |
+ if (key.type() != blink::WebCryptoKeyTypeSecret || !key.extractable()) |
+ return false; |
+ |
+ SymKeyHandle* const sym_key = reinterpret_cast<SymKeyHandle*>(key.handle()); |
+ |
+ *buffer = blink::WebArrayBuffer::create(sym_key->key().size(), 1); |
eroman
2013/12/04 19:04:00
[optional] Consider extracting this to a helper in
padolph
2013/12/04 22:22:13
Done.
|
+ memcpy(buffer->data(), &sym_key->key()[0], sym_key->key().size()); |
+ |
+ return true; |
+} |
+ |
} // namespace |
void WebCryptoImpl::Init() { crypto::EnsureOpenSSLInit(); } |
@@ -368,10 +386,18 @@ bool WebCryptoImpl::ExportKeyInternal( |
blink::WebCryptoKeyFormat format, |
const blink::WebCryptoKey& key, |
blink::WebArrayBuffer* buffer) { |
- // TODO(padolph): Implement raw export |
- // TODO(padolph): Implement spki export |
- // TODO(padolph): Implement pkcs8 export |
- // TODO(padolph): Implement jwk export |
+ switch (format) { |
+ case blink::WebCryptoKeyFormatRaw: |
+ return ExportKeyInternalRaw(key, buffer); |
+ case blink::WebCryptoKeyFormatSpki: |
+ // TODO(padolph): Implement spki export |
+ return false; |
+ case blink::WebCryptoKeyFormatPkcs8: |
+ // TODO(padolph): Implement pkcs8 export |
+ return false; |
+ default: |
+ return false; |
+ } |
return false; |
} |