OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "content/child/webcrypto/nss/sym_key_nss.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "content/child/webcrypto/crypto_data.h" | |
9 #include "content/child/webcrypto/nss/key_nss.h" | |
10 #include "content/child/webcrypto/nss/util_nss.h" | |
11 #include "content/child/webcrypto/status.h" | |
12 #include "content/child/webcrypto/webcrypto_util.h" | |
13 #include "crypto/scoped_nss_types.h" | |
14 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | |
15 | |
16 namespace content { | |
17 | |
18 namespace webcrypto { | |
19 | |
20 Status GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, | |
21 bool extractable, | |
22 blink::WebCryptoKeyUsageMask usage_mask, | |
23 unsigned keylen_bytes, | |
24 CK_MECHANISM_TYPE mechanism, | |
25 blink::WebCryptoKey* key) { | |
26 DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); | |
27 | |
28 crypto::ScopedPK11Slot slot(PK11_GetInternalKeySlot()); | |
29 if (!slot) | |
30 return Status::OperationError(); | |
31 | |
32 crypto::ScopedPK11SymKey pk11_key( | |
33 PK11_KeyGen(slot.get(), mechanism, NULL, keylen_bytes, NULL)); | |
34 | |
35 if (!pk11_key) | |
36 return Status::OperationError(); | |
37 | |
38 if (PK11_ExtractKeyValue(pk11_key.get()) != SECSuccess) | |
39 return Status::OperationError(); | |
40 | |
41 const SECItem* key_data = PK11_GetKeyData(pk11_key.get()); | |
42 if (!key_data) | |
43 return Status::OperationError(); | |
44 | |
45 scoped_ptr<SymKeyNss> handle(new SymKeyNss( | |
46 pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); | |
47 | |
48 *key = blink::WebCryptoKey::create(handle.release(), | |
49 blink::WebCryptoKeyTypeSecret, | |
50 extractable, | |
51 algorithm, | |
52 usage_mask); | |
53 return Status::Success(); | |
54 } | |
55 | |
56 Status ImportKeyRawNss(const CryptoData& key_data, | |
57 const blink::WebCryptoKeyAlgorithm& algorithm, | |
58 bool extractable, | |
59 blink::WebCryptoKeyUsageMask usage_mask, | |
60 CK_MECHANISM_TYPE mechanism, | |
61 CK_FLAGS flags, | |
62 blink::WebCryptoKey* key) { | |
63 DCHECK(!algorithm.isNull()); | |
64 SECItem key_item = MakeSECItemForBuffer(key_data); | |
65 | |
66 crypto::ScopedPK11Slot slot(PK11_GetInternalSlot()); | |
67 crypto::ScopedPK11SymKey pk11_sym_key( | |
68 PK11_ImportSymKeyWithFlags(slot.get(), | |
69 mechanism, | |
70 PK11_OriginUnwrap, | |
71 CKA_FLAGS_ONLY, | |
72 &key_item, | |
73 flags, | |
74 false, | |
75 NULL)); | |
76 if (!pk11_sym_key.get()) | |
77 return Status::OperationError(); | |
78 | |
79 scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data)); | |
80 | |
81 *key = blink::WebCryptoKey::create(handle.release(), | |
82 blink::WebCryptoKeyTypeSecret, | |
83 extractable, | |
84 algorithm, | |
85 usage_mask); | |
86 return Status::Success(); | |
87 } | |
88 | |
89 } // namespace webcrypto | |
90 | |
91 } // namespace content | |
OLD | NEW |