| Index: content/renderer/webcrypto/webcrypto_util.h
|
| diff --git a/content/renderer/webcrypto/webcrypto_util.h b/content/renderer/webcrypto/webcrypto_util.h
|
| index 111b14b83cf7173c298464b2c286119116f15bb0..e77959059bb82ca44fbf8a51e38d345063b743cc 100644
|
| --- a/content/renderer/webcrypto/webcrypto_util.h
|
| +++ b/content/renderer/webcrypto/webcrypto_util.h
|
| @@ -132,6 +132,11 @@ class CONTENT_EXPORT Status {
|
| // key's modulus).
|
| static Status ErrorDataTooLarge();
|
|
|
| + // The data provided to an encrypt/decrypt/sign/verify operation was too
|
| + // small. This usually represents an algorithm restriction (for instance
|
| + // AES-KW requires a minimum of 24 bytes input data).
|
| + static Status ErrorDataTooSmall();
|
| +
|
| // Something was unsupported or unimplemented. This can mean the algorithm in
|
| // question was unsupported, some parameter combination was unsupported, or
|
| // something has not yet been implemented.
|
| @@ -147,6 +152,10 @@ class CONTENT_EXPORT Status {
|
| // (zero length is allowed).
|
| static Status ErrorInvalidAesGcmTagLength();
|
|
|
| + // The input data given to an AES-KW encrypt/decrypt operation was not a
|
| + // multiple of 8 bytes, as required by RFC 3394.
|
| + static Status ErrorInvalidAesKwDataLength();
|
| +
|
| // The "publicExponent" used to generate a key was invalid: either no bytes
|
| // were specified, or the number was too large to fit into an "unsigned long"
|
| // (implemention limitation), or the exponent was zero.
|
|
|