| Index: content/child/webcrypto/nss/rsa_hashed_algorithm_nss.cc
|
| diff --git a/content/child/webcrypto/nss/rsa_hashed_algorithm_nss.cc b/content/child/webcrypto/nss/rsa_hashed_algorithm_nss.cc
|
| index 6232246307ae6f039f7b664a9d636a143a8d51d0..4098e119f3b30b800ae3af7b19ae73aa96a85de2 100644
|
| --- a/content/child/webcrypto/nss/rsa_hashed_algorithm_nss.cc
|
| +++ b/content/child/webcrypto/nss/rsa_hashed_algorithm_nss.cc
|
| @@ -24,7 +24,7 @@ namespace webcrypto {
|
|
|
| namespace {
|
|
|
| -#if defined(USE_NSS) && !defined(OS_CHROMEOS)
|
| +#if defined(USE_NSS_CERTS) && !defined(OS_CHROMEOS)
|
| Status ErrorRsaPrivateKeyImportNotSupported() {
|
| return Status::ErrorUnsupported(
|
| "NSS version must be at least 3.16.2 for RSA private key import. See "
|
| @@ -127,7 +127,7 @@ struct RSAPrivateKey {
|
| // The system NSS library doesn't have the new PK11_ExportDERPrivateKeyInfo
|
| // function yet (https://bugzilla.mozilla.org/show_bug.cgi?id=519255). So we
|
| // provide a fallback implementation.
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
| const SEC_ASN1Template RSAPrivateKeyTemplate[] = {
|
| {SEC_ASN1_SEQUENCE, 0, NULL, sizeof(RSAPrivateKey)},
|
| {SEC_ASN1_INTEGER, offsetof(RSAPrivateKey, version)},
|
| @@ -140,7 +140,7 @@ const SEC_ASN1Template RSAPrivateKeyTemplate[] = {
|
| {SEC_ASN1_INTEGER, offsetof(RSAPrivateKey, exponent2)},
|
| {SEC_ASN1_INTEGER, offsetof(RSAPrivateKey, coefficient)},
|
| {0}};
|
| -#endif // defined(USE_NSS)
|
| +#endif // defined(USE_NSS_CERTS)
|
|
|
| // On success |value| will be filled with data which must be freed by
|
| // SECITEM_FreeItem(value, PR_FALSE);
|
| @@ -254,7 +254,7 @@ Status ExportKeyPkcs8Nss(SECKEYPrivateKey* key, std::vector<uint8_t>* buffer) {
|
|
|
| // TODO(rsleevi): Implement OAEP support according to the spec.
|
|
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
| // PK11_ExportDERPrivateKeyInfo isn't available. Use our fallback code.
|
| const SECOidTag algorithm = SEC_OID_PKCS1_RSA_ENCRYPTION;
|
| const int kPrivateKeyInfoVersion = 0;
|
| @@ -292,9 +292,9 @@ Status ExportKeyPkcs8Nss(SECKEYPrivateKey* key, std::vector<uint8_t>* buffer) {
|
| crypto::ScopedSECItem encoded_key(
|
| SEC_ASN1EncodeItem(NULL, NULL, &private_key_info,
|
| SEC_ASN1_GET(SECKEY_PrivateKeyInfoTemplate)));
|
| -#else // defined(USE_NSS)
|
| +#else // defined(USE_NSS_CERTS)
|
| crypto::ScopedSECItem encoded_key(PK11_ExportDERPrivateKeyInfo(key, NULL));
|
| -#endif // defined(USE_NSS)
|
| +#endif // defined(USE_NSS_CERTS)
|
|
|
| if (!encoded_key.get())
|
| return Status::OperationError();
|
|
|