Index: content/child/webcrypto/nss/sym_key_nss.cc |
diff --git a/content/child/webcrypto/nss/sym_key_nss.cc b/content/child/webcrypto/nss/sym_key_nss.cc |
deleted file mode 100644 |
index 08eef2836cfbfb5194f74e42c7a2b18a190df5d2..0000000000000000000000000000000000000000 |
--- a/content/child/webcrypto/nss/sym_key_nss.cc |
+++ /dev/null |
@@ -1,91 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "content/child/webcrypto/nss/sym_key_nss.h" |
- |
-#include "base/logging.h" |
-#include "content/child/webcrypto/crypto_data.h" |
-#include "content/child/webcrypto/nss/key_nss.h" |
-#include "content/child/webcrypto/nss/util_nss.h" |
-#include "content/child/webcrypto/status.h" |
-#include "content/child/webcrypto/webcrypto_util.h" |
-#include "crypto/scoped_nss_types.h" |
-#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
- |
-namespace content { |
- |
-namespace webcrypto { |
- |
-Status GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, |
- bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
- unsigned keylen_bytes, |
- CK_MECHANISM_TYPE mechanism, |
- blink::WebCryptoKey* key) { |
- DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); |
- |
- crypto::ScopedPK11Slot slot(PK11_GetInternalKeySlot()); |
- if (!slot) |
- return Status::OperationError(); |
- |
- crypto::ScopedPK11SymKey pk11_key( |
- PK11_KeyGen(slot.get(), mechanism, NULL, keylen_bytes, NULL)); |
- |
- if (!pk11_key) |
- return Status::OperationError(); |
- |
- if (PK11_ExtractKeyValue(pk11_key.get()) != SECSuccess) |
- return Status::OperationError(); |
- |
- const SECItem* key_data = PK11_GetKeyData(pk11_key.get()); |
- if (!key_data) |
- return Status::OperationError(); |
- |
- scoped_ptr<SymKeyNss> handle(new SymKeyNss( |
- pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); |
- |
- *key = blink::WebCryptoKey::create(handle.release(), |
- blink::WebCryptoKeyTypeSecret, |
- extractable, |
- algorithm, |
- usage_mask); |
- return Status::Success(); |
-} |
- |
-Status ImportKeyRawNss(const CryptoData& key_data, |
- const blink::WebCryptoKeyAlgorithm& algorithm, |
- bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
- CK_MECHANISM_TYPE mechanism, |
- CK_FLAGS flags, |
- blink::WebCryptoKey* key) { |
- DCHECK(!algorithm.isNull()); |
- SECItem key_item = MakeSECItemForBuffer(key_data); |
- |
- crypto::ScopedPK11Slot slot(PK11_GetInternalSlot()); |
- crypto::ScopedPK11SymKey pk11_sym_key( |
- PK11_ImportSymKeyWithFlags(slot.get(), |
- mechanism, |
- PK11_OriginUnwrap, |
- CKA_FLAGS_ONLY, |
- &key_item, |
- flags, |
- false, |
- NULL)); |
- if (!pk11_sym_key.get()) |
- return Status::OperationError(); |
- |
- scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data)); |
- |
- *key = blink::WebCryptoKey::create(handle.release(), |
- blink::WebCryptoKeyTypeSecret, |
- extractable, |
- algorithm, |
- usage_mask); |
- return Status::Success(); |
-} |
- |
-} // namespace webcrypto |
- |
-} // namespace content |