Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2029)

Unified Diff: content/renderer/webcrypto_sha_digest_nss.cc

Issue 19757011: WebCrypto: Implement digest() using NSS (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/renderer/webcrypto_sha_digest_nss.cc
diff --git a/content/renderer/webcrypto_sha_digest_nss.cc b/content/renderer/webcrypto_sha_digest_nss.cc
new file mode 100644
index 0000000000000000000000000000000000000000..9a82de9fbfee8c55a4ee4700805743cea60f583b
--- /dev/null
+++ b/content/renderer/webcrypto_sha_digest_nss.cc
@@ -0,0 +1,112 @@
+// Copyright (c) 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "content/renderer/webcrypto_sha_digest.h"
+
+#include <pk11pub.h>
+
+#include "base/logging.h"
+#include "crypto/nss_util.h"
+#include "third_party/WebKit/public/platform/WebArrayBuffer.h"
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithm.h"
+
+namespace content {
+
Ryan Sleevi 2013/07/31 18:19:19 I'm a bit mixed on using the PK11 functions direct
Bryan Eyler 2013/08/02 00:49:05 I didn't know about this interface. Looks a bit c
+WebCryptoSHADigest::WebCryptoSHADigest(
+ const WebKit::WebCryptoAlgorithmId algorithm_id,
+ WebKit::WebCryptoOperationResult& result)
+ : result_(result),
+ context_(NULL),
+ hash_algorithm_(SEC_OID_UNKNOWN),
+ hash_result_length_(0) {
+ switch (algorithm_id) {
+ case WebKit::WebCryptoAlgorithmIdSha1:
+ hash_algorithm_ = SEC_OID_SHA1;
+ hash_result_length_ = 20;
Ryan Sleevi 2013/07/31 18:19:19 If you keep with the OID formation, all of these c
Bryan Eyler 2013/08/02 00:49:05 Done.
+ break;
+ case WebKit::WebCryptoAlgorithmIdSha224:
+ hash_algorithm_ = SEC_OID_SHA224;
+ hash_result_length_ = 28;
+ break;
+ case WebKit::WebCryptoAlgorithmIdSha256:
+ hash_algorithm_ = SEC_OID_SHA256;
+ hash_result_length_ = 32;
+ break;
+ case WebKit::WebCryptoAlgorithmIdSha384:
+ hash_algorithm_ = SEC_OID_SHA384;
+ hash_result_length_ = 48;
+ break;
+ case WebKit::WebCryptoAlgorithmIdSha512:
+ hash_algorithm_ = SEC_OID_SHA512;
+ hash_result_length_ = 64;
+ break;
+ default:
+ NOTREACHED();
+ hash_algorithm_ = SEC_OID_UNKNOWN;
+ hash_result_length_ = 0;
+ }
+}
+
+WebCryptoSHADigest::~WebCryptoSHADigest() {
+ if (context_) {
+ PK11_DestroyContext(context_, PR_TRUE);
+ }
+}
+
+bool WebCryptoSHADigest::Initialize() {
+ crypto::EnsureNSSInit();
+
+ context_ = PK11_CreateDigestContext(hash_algorithm_);
+ if (!context_) {
+ LOG(ERROR) << "Could not create digest context for hash algorithm: "
+ << hash_algorithm_;
Ryan Sleevi 2013/07/31 18:19:19 Seems that this is unused beyond the constructor -
Bryan Eyler 2013/08/02 00:49:05 Make sense. I want to keep the creation of the co
+ return false;
+ }
+
+ if (PK11_DigestBegin(context_) != SECSuccess) {
+ LOG(ERROR) << "Could not initialize digest context.";
+ return false;
+ }
+
+ return true;
+}
+
+void WebCryptoSHADigest::process(const unsigned char* bytes, size_t size) {
+ DCHECK(context_);
+
+ if (PK11_DigestOp(context_, bytes, size) != SECSuccess) {
eroman 2013/07/31 02:23:50 Is it safe to call this when |bytes| is garbage, b
Ryan Sleevi 2013/07/31 18:19:19 It should be.
Bryan Eyler 2013/08/02 00:49:05 Test added for this.
+ LOG(ERROR) << "Could not process digest contents of size: " << size;
+ result_.completeWithError();
eroman 2013/07/31 02:23:50 delete this; (Any time completing the operation,
Bryan Eyler 2013/08/02 00:49:05 Obsolete now.
+ }
+}
+
+void WebCryptoSHADigest::abort() {
+ delete this;
+}
+
+void WebCryptoSHADigest::finish() {
+ DCHECK(context_);
+
+ unsigned char* digest = NULL;
Ryan Sleevi 2013/07/31 18:19:19 Move this to line 96 (keep declaration and definit
Bryan Eyler 2013/08/02 00:49:05 Done.
+
+ WebKit::WebArrayBuffer buffer(
+ WebKit::WebArrayBuffer::create(hash_result_length_, 1));
Ryan Sleevi 2013/07/31 18:19:19 Same here - hash_result_length_ is unused outside
eroman 2013/07/31 21:10:35 This was based on my recommendation, so that he ha
+
+ digest = reinterpret_cast<unsigned char*>(buffer.data());
+ DCHECK(digest);
+
+ unsigned int result_length = 0;
+ if (PK11_DigestFinal(context_, digest, &result_length, hash_result_length_)
+ != SECSuccess || result_length != hash_result_length_) {
Ryan Sleevi 2013/07/31 18:19:19 Seems like this should match Chromium style (the !
Bryan Eyler 2013/08/02 00:49:05 Obsolete after moving to new interface. Will look
+ LOG(ERROR) << "Could not finalize digest data.";
+ result_.completeWithError();
eroman 2013/07/31 02:23:50 delete this;
Bryan Eyler 2013/08/02 00:49:05 Done.
+ return;
+ }
+
+ result_.completeWithArrayBuffer(buffer);
+
+ delete this;
+}
+
+} // namespace content

Powered by Google App Engine
This is Rietveld 408576698