OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 13 matching lines...) Expand all Loading... |
24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | 24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | 25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
29 */ | 29 */ |
30 | 30 |
31 [ | 31 [ |
32 NoInterfaceObject, | 32 NoInterfaceObject, |
33 ] interface SubtleCrypto { | 33 ] interface SubtleCrypto { |
34 [RaisesException] CryptoOperation encrypt(Dictionary algorithm); | 34 [RaisesException] CryptoOperation encrypt(Dictionary algorithm, Key key); |
35 [RaisesException] CryptoOperation decrypt(Dictionary algorithm); | 35 [RaisesException] CryptoOperation decrypt(Dictionary algorithm, Key key); |
36 [RaisesException] CryptoOperation sign(Dictionary algorithm); | 36 [RaisesException] CryptoOperation sign(Dictionary algorithm, Key key); |
37 [RaisesException, ImplementedAs=verifySignature] CryptoOperation verify(Dict
ionary algorithm); | 37 [RaisesException, ImplementedAs=verifySignature] CryptoOperation verify(Dict
ionary algorithm, Key key, ArrayBufferView signature); |
38 [RaisesException] CryptoOperation digest(Dictionary algorithm); | 38 [RaisesException] CryptoOperation digest(Dictionary algorithm); |
39 | 39 |
| 40 [RaisesException] any generateKey(Dictionary algorithm, boolean extractable,
DOMString[] keyUsages); |
40 [RaisesException] any importKey(DOMString format, ArrayBufferView keyData, D
ictionary algorithm, boolean extractable, DOMString[] keyUsages); | 41 [RaisesException] any importKey(DOMString format, ArrayBufferView keyData, D
ictionary algorithm, boolean extractable, DOMString[] keyUsages); |
41 }; | 42 }; |
42 | 43 |
OLD | NEW |