Index: content/child/webcrypto/nss/sym_key_nss.cc |
diff --git a/content/child/webcrypto/nss/sym_key_nss.cc b/content/child/webcrypto/nss/sym_key_nss.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..08eef2836cfbfb5194f74e42c7a2b18a190df5d2 |
--- /dev/null |
+++ b/content/child/webcrypto/nss/sym_key_nss.cc |
@@ -0,0 +1,91 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "content/child/webcrypto/nss/sym_key_nss.h" |
+ |
+#include "base/logging.h" |
+#include "content/child/webcrypto/crypto_data.h" |
+#include "content/child/webcrypto/nss/key_nss.h" |
+#include "content/child/webcrypto/nss/util_nss.h" |
+#include "content/child/webcrypto/status.h" |
+#include "content/child/webcrypto/webcrypto_util.h" |
+#include "crypto/scoped_nss_types.h" |
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
+ |
+namespace content { |
+ |
+namespace webcrypto { |
+ |
+Status GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, |
+ bool extractable, |
+ blink::WebCryptoKeyUsageMask usage_mask, |
+ unsigned keylen_bytes, |
+ CK_MECHANISM_TYPE mechanism, |
+ blink::WebCryptoKey* key) { |
+ DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); |
+ |
+ crypto::ScopedPK11Slot slot(PK11_GetInternalKeySlot()); |
+ if (!slot) |
+ return Status::OperationError(); |
+ |
+ crypto::ScopedPK11SymKey pk11_key( |
+ PK11_KeyGen(slot.get(), mechanism, NULL, keylen_bytes, NULL)); |
+ |
+ if (!pk11_key) |
+ return Status::OperationError(); |
+ |
+ if (PK11_ExtractKeyValue(pk11_key.get()) != SECSuccess) |
+ return Status::OperationError(); |
+ |
+ const SECItem* key_data = PK11_GetKeyData(pk11_key.get()); |
+ if (!key_data) |
+ return Status::OperationError(); |
+ |
+ scoped_ptr<SymKeyNss> handle(new SymKeyNss( |
+ pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); |
+ |
+ *key = blink::WebCryptoKey::create(handle.release(), |
+ blink::WebCryptoKeyTypeSecret, |
+ extractable, |
+ algorithm, |
+ usage_mask); |
+ return Status::Success(); |
+} |
+ |
+Status ImportKeyRawNss(const CryptoData& key_data, |
+ const blink::WebCryptoKeyAlgorithm& algorithm, |
+ bool extractable, |
+ blink::WebCryptoKeyUsageMask usage_mask, |
+ CK_MECHANISM_TYPE mechanism, |
+ CK_FLAGS flags, |
+ blink::WebCryptoKey* key) { |
+ DCHECK(!algorithm.isNull()); |
+ SECItem key_item = MakeSECItemForBuffer(key_data); |
+ |
+ crypto::ScopedPK11Slot slot(PK11_GetInternalSlot()); |
+ crypto::ScopedPK11SymKey pk11_sym_key( |
+ PK11_ImportSymKeyWithFlags(slot.get(), |
+ mechanism, |
+ PK11_OriginUnwrap, |
+ CKA_FLAGS_ONLY, |
+ &key_item, |
+ flags, |
+ false, |
+ NULL)); |
+ if (!pk11_sym_key.get()) |
+ return Status::OperationError(); |
+ |
+ scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data)); |
+ |
+ *key = blink::WebCryptoKey::create(handle.release(), |
+ blink::WebCryptoKeyTypeSecret, |
+ extractable, |
+ algorithm, |
+ usage_mask); |
+ return Status::Success(); |
+} |
+ |
+} // namespace webcrypto |
+ |
+} // namespace content |