Chromium Code Reviews| Index: public/platform/WebCrypto.h |
| diff --git a/public/platform/WebCrypto.h b/public/platform/WebCrypto.h |
| index 998a2153ec8165ddf0a17896085ff8d2873a2920..18103fe79a0956a695f90cd579dd0ce6c1183389 100644 |
| --- a/public/platform/WebCrypto.h |
| +++ b/public/platform/WebCrypto.h |
| @@ -178,6 +178,13 @@ public: |
| // It is possible that unwrappedKeyAlgorithm.isNull() |
| virtual void unwrapKey(WebCryptoKeyFormat, const unsigned char* wrappedKey, unsigned wrappedKeySize, const WebCryptoKey&, const WebCryptoAlgorithm& unwrapAlgorithm, const WebCryptoAlgorithm& unwrappedKeyAlgorithm, bool extractable, WebCryptoKeyUsageMask, WebCryptoResult result) { result.completeWithError(); } |
| + // This is the one exception to the "Completing the request" guarantees |
| + // outlined above. digestSynchronous must provide the result into result |
| + // synchronously. It must return |true| on successful calculation of the |
| + // digest and |false| otherwise. This is useful for Blink internal crypto |
| + // and is not part of the WebCrypto standard. |
| + virtual bool digestSynchronous(const WebCryptoAlgorithm&, const unsigned char* data, unsigned dataSize, WebArrayBuffer& result) { return false; } |
|
eroman
2014/02/08 01:40:22
* Pass a WebCryptoAlgorithmId instead (since none
jww
2014/02/08 02:31:18
Done.
|
| + |
| protected: |
| virtual ~WebCrypto() { } |
| }; |