Index: content/child/webcrypto/platform_crypto_nss.cc |
diff --git a/content/child/webcrypto/platform_crypto_nss.cc b/content/child/webcrypto/platform_crypto_nss.cc |
index ffa62a54f788dcd5722dd57df683a42d2326af29..6f08ae20a518049b080ade528a90c3c91dc1f221 100644 |
--- a/content/child/webcrypto/platform_crypto_nss.cc |
+++ b/content/child/webcrypto/platform_crypto_nss.cc |
@@ -1491,8 +1491,8 @@ Status ImportRsaPublicKey(const blink::WebCryptoAlgorithm& algorithm, |
return Status::Success(); |
} |
-Status WrapSymKeyAesKw(SymKey* wrapping_key, |
- SymKey* key, |
+Status WrapSymKeyAesKw(SymKey* key, |
+ SymKey* wrapping_key, |
std::vector<uint8>* buffer) { |
// The data size must be at least 16 bytes and a multiple of 8 bytes. |
// RFC 3394 does not specify a maximum allowed data length, but since only |
@@ -1591,8 +1591,8 @@ Status DecryptAesKw(SymKey* wrapping_key, |
return Status::Success(); |
} |
-Status WrapSymKeyRsaEs(PublicKey* wrapping_key, |
- SymKey* key, |
+Status WrapSymKeyRsaEs(SymKey* key, |
+ PublicKey* wrapping_key, |
std::vector<uint8>* buffer) { |
// Check the raw length of the key to be wrapped against the max size allowed |
// by the RSA wrapping key. With PKCS#1 v1.5 padding used in this function, |