Chromium Code Reviews| Index: components/webcrypto/jwk.h |
| diff --git a/components/webcrypto/jwk.h b/components/webcrypto/jwk.h |
| index 2c55582f729f0856faa5ae0d058fdf48c597f7e8..411a986e1064cab02e3d598139690c57031b4e54 100644 |
| --- a/components/webcrypto/jwk.h |
| +++ b/components/webcrypto/jwk.h |
| @@ -126,29 +126,6 @@ class JwkWriter { |
| base::DictionaryValue dict_; |
| }; |
| -// Writes a JWK-formatted symmetric key to |jwk_key_data|. |
| -// * raw_key_data: The actual key data |
| -// * algorithm: The JWK algorithm name (i.e. "alg") |
| -// * extractable: The JWK extractability (i.e. "ext") |
| -// * usages: The JWK usages (i.e. "key_ops") |
| -void WriteSecretKeyJwk(const CryptoData& raw_key_data, |
| - const std::string& algorithm, |
| - bool extractable, |
| - blink::WebCryptoKeyUsageMask usages, |
| - std::vector<uint8_t>* jwk_key_data); |
| - |
| -// Parses a UTF-8 encoded JWK (key_data), and extracts the key material to |
| -// |*raw_key_data|. Returns Status::Success() on success, otherwise an error. |
| -// In order for this to succeed: |
| -// * expected_extractable must be consistent with the JWK's "ext", if |
| -// present. |
| -// * expected_usages must be a subset of the JWK's "key_ops" if present. |
| -Status ReadSecretKeyNoExpectedAlg(const CryptoData& key_data, |
| - bool expected_extractable, |
| - blink::WebCryptoKeyUsageMask expected_usages, |
| - std::vector<uint8_t>* raw_key_data, |
| - JwkReader* jwk); |
|
davidben
2015/09/18 22:16:00
Is the intent that this file just be a generic JWK
eroman
2015/09/18 23:13:23
Yes. I would like jwk.{h, cc} to just contain the
|
| - |
| // This decodes JWK's flavor of base64 encoding, as described by: |
| // https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-36#section-2 |
| // |