| Index: content/child/webcrypto/nss/hmac_nss.cc
|
| diff --git a/content/child/webcrypto/nss/hmac_nss.cc b/content/child/webcrypto/nss/hmac_nss.cc
|
| index b8a8c0e91e3687dde237d18a4dcdbe0812bdca5d..f02be408d7f8064b09bafd3b843e9ea02226245d 100644
|
| --- a/content/child/webcrypto/nss/hmac_nss.cc
|
| +++ b/content/child/webcrypto/nss/hmac_nss.cc
|
| @@ -8,6 +8,7 @@
|
| #include <sechash.h>
|
|
|
| #include "base/logging.h"
|
| +#include "base/stl_util.h"
|
| #include "content/child/webcrypto/algorithm_implementation.h"
|
| #include "content/child/webcrypto/crypto_data.h"
|
| #include "content/child/webcrypto/jwk.h"
|
| @@ -191,7 +192,7 @@ class HmacImplementation : public AlgorithmImplementation {
|
| DCHECK_NE(0u, signature_item.len);
|
|
|
| buffer->resize(signature_item.len);
|
| - signature_item.data = Uint8VectorStart(buffer);
|
| + signature_item.data = vector_as_array(buffer);
|
|
|
| if (PK11_SignWithSymKey(
|
| sym_key, mechanism, ¶m_item, &signature_item, &data_item) !=
|
| @@ -216,7 +217,7 @@ class HmacImplementation : public AlgorithmImplementation {
|
|
|
| // Do not allow verification of truncated MACs.
|
| *signature_match = result.size() == signature.byte_length() &&
|
| - crypto::SecureMemEqual(Uint8VectorStart(result),
|
| + crypto::SecureMemEqual(vector_as_array(&result),
|
| signature.bytes(),
|
| signature.byte_length());
|
|
|
|
|