| Index: trunk/Source/bindings/v8/SerializedScriptValue.cpp
|
| ===================================================================
|
| --- trunk/Source/bindings/v8/SerializedScriptValue.cpp (revision 174732)
|
| +++ trunk/Source/bindings/v8/SerializedScriptValue.cpp (working copy)
|
| @@ -221,8 +221,10 @@
|
| // props = keyLengthBytes:uint32_t, algorithmId:uint32_t
|
| // If subtag=HmacKeyTag:
|
| // props = keyLengthBytes:uint32_t, hashId:uint32_t
|
| + // If subtag=RsaKeyTag:
|
| + // props = algorithmId:uint32_t, type:uint32_t, modulusLengthBits:uint32_t, publicExponentLength:uint32_t, publicExponent:byte[publicExponentLength]
|
| // If subtag=RsaHashedKeyTag:
|
| - // props = algorithmId:uint32_t, type:uint32_t, modulusLengthBits:uint32_t, publicExponentLength:uint32_t, publicExponent:byte[publicExponentLength], hashId:uint32_t
|
| + // props = <same as for RsaKeyTag>, hashId:uint32_t
|
| ObjectReferenceTag = '^', // ref:uint32_t -> reference table[ref]
|
| GenerateFreshObjectTag = 'o', // -> empty object allocated an object ID and pushed onto the open stack (ref)
|
| GenerateFreshSparseArrayTag = 'a', // length:uint32_t -> empty array[length] allocated an object ID and pushed onto the open stack (ref)
|
| @@ -251,7 +253,7 @@
|
| enum CryptoKeySubTag {
|
| AesKeyTag = 1,
|
| HmacKeyTag = 2,
|
| - // ID 3 was used by RsaKeyTag, while still behind experimental flag.
|
| + RsaKeyTag = 3,
|
| RsaHashedKeyTag = 4,
|
| // Maximum allowed value is 255
|
| };
|
| @@ -266,7 +268,7 @@
|
| AesCbcTag = 1,
|
| HmacTag = 2,
|
| RsaSsaPkcs1v1_5Tag = 3,
|
| - // ID 4 was used by RsaEs, while still behind experimental flag.
|
| + RsaEsPkcs1v1_5Tag = 4,
|
| Sha1Tag = 5,
|
| Sha256Tag = 6,
|
| Sha384Tag = 7,
|
| @@ -515,8 +517,9 @@
|
| case blink::WebCryptoKeyAlgorithmParamsTypeHmac:
|
| doWriteHmacKey(key);
|
| break;
|
| + case blink::WebCryptoKeyAlgorithmParamsTypeRsa:
|
| case blink::WebCryptoKeyAlgorithmParamsTypeRsaHashed:
|
| - doWriteRsaHashedKey(key);
|
| + doWriteRsaKey(key);
|
| break;
|
| case blink::WebCryptoKeyAlgorithmParamsTypeNone:
|
| ASSERT_NOT_REACHED();
|
| @@ -727,10 +730,12 @@
|
| doWriteUint32(key.algorithm().aesParams()->lengthBits() / 8);
|
| }
|
|
|
| - void doWriteRsaHashedKey(const blink::WebCryptoKey& key)
|
| + void doWriteRsaKey(const blink::WebCryptoKey& key)
|
| {
|
| - ASSERT(key.algorithm().rsaHashedParams());
|
| - append(static_cast<uint8_t>(RsaHashedKeyTag));
|
| + if (key.algorithm().rsaHashedParams())
|
| + append(static_cast<uint8_t>(RsaHashedKeyTag));
|
| + else
|
| + append(static_cast<uint8_t>(RsaKeyTag));
|
|
|
| doWriteAlgorithmId(key.algorithm().id());
|
|
|
| @@ -745,11 +750,13 @@
|
| ASSERT_NOT_REACHED();
|
| }
|
|
|
| - const blink::WebCryptoRsaHashedKeyAlgorithmParams* params = key.algorithm().rsaHashedParams();
|
| + const blink::WebCryptoRsaKeyAlgorithmParams* params = key.algorithm().rsaParams();
|
| doWriteUint32(params->modulusLengthBits());
|
| doWriteUint32(params->publicExponent().size());
|
| append(params->publicExponent().data(), params->publicExponent().size());
|
| - doWriteAlgorithmId(key.algorithm().rsaHashedParams()->hash().id());
|
| +
|
| + if (key.algorithm().rsaHashedParams())
|
| + doWriteAlgorithmId(key.algorithm().rsaHashedParams()->hash().id());
|
| }
|
|
|
| void doWriteAlgorithmId(blink::WebCryptoAlgorithmId id)
|
| @@ -761,6 +768,8 @@
|
| return doWriteUint32(HmacTag);
|
| case blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5:
|
| return doWriteUint32(RsaSsaPkcs1v1_5Tag);
|
| + case blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5:
|
| + return doWriteUint32(RsaEsPkcs1v1_5Tag);
|
| case blink::WebCryptoAlgorithmIdSha1:
|
| return doWriteUint32(Sha1Tag);
|
| case blink::WebCryptoAlgorithmIdSha256:
|
| @@ -2245,8 +2254,12 @@
|
| if (!doReadHmacKey(algorithm, type))
|
| return false;
|
| break;
|
| + case RsaKeyTag:
|
| + if (!doReadRsaKey(false, algorithm, type))
|
| + return false;
|
| + break;
|
| case RsaHashedKeyTag:
|
| - if (!doReadRsaHashedKey(algorithm, type))
|
| + if (!doReadRsaKey(true, algorithm, type))
|
| return false;
|
| break;
|
| default:
|
| @@ -2406,7 +2419,7 @@
|
| return !algorithm.isNull();
|
| }
|
|
|
| - bool doReadRsaHashedKey(blink::WebCryptoKeyAlgorithm& algorithm, blink::WebCryptoKeyType& type)
|
| + bool doReadRsaKey(bool hasHash, blink::WebCryptoKeyAlgorithm& algorithm, blink::WebCryptoKeyType& type)
|
| {
|
| blink::WebCryptoAlgorithmId id;
|
| if (!doReadAlgorithmId(id))
|
| @@ -2441,10 +2454,14 @@
|
| const uint8_t* publicExponent = m_buffer + m_position;
|
| m_position += publicExponentSize;
|
|
|
| - blink::WebCryptoAlgorithmId hash;
|
| - if (!doReadAlgorithmId(hash))
|
| - return false;
|
| - algorithm = blink::WebCryptoKeyAlgorithm::createRsaHashed(id, modulusLengthBits, publicExponent, publicExponentSize, hash);
|
| + if (hasHash) {
|
| + blink::WebCryptoAlgorithmId hash;
|
| + if (!doReadAlgorithmId(hash))
|
| + return false;
|
| + algorithm = blink::WebCryptoKeyAlgorithm::createRsaHashed(id, modulusLengthBits, publicExponent, publicExponentSize, hash);
|
| + } else {
|
| + algorithm = blink::WebCryptoKeyAlgorithm::createRsa(id, modulusLengthBits, publicExponent, publicExponentSize);
|
| + }
|
|
|
| return !algorithm.isNull();
|
| }
|
| @@ -2465,6 +2482,9 @@
|
| case RsaSsaPkcs1v1_5Tag:
|
| id = blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5;
|
| return true;
|
| + case RsaEsPkcs1v1_5Tag:
|
| + id = blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5;
|
| + return true;
|
| case Sha1Tag:
|
| id = blink::WebCryptoAlgorithmIdSha1;
|
| return true;
|
|
|