| Index: Source/modules/crypto/Key.cpp
|
| diff --git a/Source/modules/crypto/Key.cpp b/Source/modules/crypto/Key.cpp
|
| index 7f6ae98ec4a51f9a119d570b7a7b4969abe254c6..e8080950df1cca5104422095cbd392f226f89359 100644
|
| --- a/Source/modules/crypto/Key.cpp
|
| +++ b/Source/modules/crypto/Key.cpp
|
| @@ -40,14 +40,14 @@ namespace WebCore {
|
|
|
| namespace {
|
|
|
| -const char* keyTypeToString(WebKit::WebCryptoKeyType type)
|
| +const char* keyTypeToString(blink::WebCryptoKeyType type)
|
| {
|
| switch (type) {
|
| - case WebKit::WebCryptoKeyTypeSecret:
|
| + case blink::WebCryptoKeyTypeSecret:
|
| return "secret";
|
| - case WebKit::WebCryptoKeyTypePublic:
|
| + case blink::WebCryptoKeyTypePublic:
|
| return "public";
|
| - case WebKit::WebCryptoKeyTypePrivate:
|
| + case blink::WebCryptoKeyTypePrivate:
|
| return "private";
|
| }
|
| ASSERT_NOT_REACHED();
|
| @@ -55,23 +55,23 @@ const char* keyTypeToString(WebKit::WebCryptoKeyType type)
|
| }
|
|
|
| struct KeyUsageMapping {
|
| - WebKit::WebCryptoKeyUsage value;
|
| + blink::WebCryptoKeyUsage value;
|
| const char* const name;
|
| };
|
|
|
| const KeyUsageMapping keyUsageMappings[] = {
|
| - { WebKit::WebCryptoKeyUsageEncrypt, "encrypt" },
|
| - { WebKit::WebCryptoKeyUsageDecrypt, "decrypt" },
|
| - { WebKit::WebCryptoKeyUsageSign, "sign" },
|
| - { WebKit::WebCryptoKeyUsageVerify, "verify" },
|
| - { WebKit::WebCryptoKeyUsageDeriveKey, "deriveKey" },
|
| - { WebKit::WebCryptoKeyUsageWrapKey, "wrapKey" },
|
| - { WebKit::WebCryptoKeyUsageUnwrapKey, "unwrapKey" },
|
| + { blink::WebCryptoKeyUsageEncrypt, "encrypt" },
|
| + { blink::WebCryptoKeyUsageDecrypt, "decrypt" },
|
| + { blink::WebCryptoKeyUsageSign, "sign" },
|
| + { blink::WebCryptoKeyUsageVerify, "verify" },
|
| + { blink::WebCryptoKeyUsageDeriveKey, "deriveKey" },
|
| + { blink::WebCryptoKeyUsageWrapKey, "wrapKey" },
|
| + { blink::WebCryptoKeyUsageUnwrapKey, "unwrapKey" },
|
| };
|
|
|
| -COMPILE_ASSERT(WebKit::EndOfWebCryptoKeyUsage == (1 << 6) + 1, update_keyUsageMappings);
|
| +COMPILE_ASSERT(blink::EndOfWebCryptoKeyUsage == (1 << 6) + 1, update_keyUsageMappings);
|
|
|
| -const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage)
|
| +const char* keyUsageToString(blink::WebCryptoKeyUsage usage)
|
| {
|
| for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
|
| if (keyUsageMappings[i].value == usage)
|
| @@ -81,7 +81,7 @@ const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage)
|
| return 0;
|
| }
|
|
|
| -WebKit::WebCryptoKeyUsageMask keyUsageStringToMask(const String& usageString)
|
| +blink::WebCryptoKeyUsageMask keyUsageStringToMask(const String& usageString)
|
| {
|
| for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
|
| if (keyUsageMappings[i].name == usageString)
|
| @@ -90,23 +90,23 @@ WebKit::WebCryptoKeyUsageMask keyUsageStringToMask(const String& usageString)
|
| return 0;
|
| }
|
|
|
| -WebKit::WebCryptoKeyUsageMask toKeyUsage(AlgorithmOperation operation)
|
| +blink::WebCryptoKeyUsageMask toKeyUsage(AlgorithmOperation operation)
|
| {
|
| switch (operation) {
|
| case Encrypt:
|
| - return WebKit::WebCryptoKeyUsageEncrypt;
|
| + return blink::WebCryptoKeyUsageEncrypt;
|
| case Decrypt:
|
| - return WebKit::WebCryptoKeyUsageDecrypt;
|
| + return blink::WebCryptoKeyUsageDecrypt;
|
| case Sign:
|
| - return WebKit::WebCryptoKeyUsageSign;
|
| + return blink::WebCryptoKeyUsageSign;
|
| case Verify:
|
| - return WebKit::WebCryptoKeyUsageVerify;
|
| + return blink::WebCryptoKeyUsageVerify;
|
| case DeriveKey:
|
| - return WebKit::WebCryptoKeyUsageDeriveKey;
|
| + return blink::WebCryptoKeyUsageDeriveKey;
|
| case WrapKey:
|
| - return WebKit::WebCryptoKeyUsageWrapKey;
|
| + return blink::WebCryptoKeyUsageWrapKey;
|
| case UnwrapKey:
|
| - return WebKit::WebCryptoKeyUsageUnwrapKey;
|
| + return blink::WebCryptoKeyUsageUnwrapKey;
|
| case Digest:
|
| case GenerateKey:
|
| case ImportKey:
|
| @@ -118,7 +118,7 @@ WebKit::WebCryptoKeyUsageMask toKeyUsage(AlgorithmOperation operation)
|
| return 0;
|
| }
|
|
|
| -bool getHmacHashId(const WebKit::WebCryptoAlgorithm& algorithm, WebKit::WebCryptoAlgorithmId& hashId)
|
| +bool getHmacHashId(const blink::WebCryptoAlgorithm& algorithm, blink::WebCryptoAlgorithmId& hashId)
|
| {
|
| if (algorithm.hmacParams()) {
|
| hashId = algorithm.hmacParams()->hash().id();
|
| @@ -137,7 +137,7 @@ Key::~Key()
|
| {
|
| }
|
|
|
| -Key::Key(const WebKit::WebCryptoKey& key)
|
| +Key::Key(const blink::WebCryptoKey& key)
|
| : m_key(key)
|
| {
|
| ScriptWrappable::init(this);
|
| @@ -168,14 +168,14 @@ Vector<String> Key::usages() const
|
| {
|
| Vector<String> result;
|
| for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
|
| - WebKit::WebCryptoKeyUsage usage = keyUsageMappings[i].value;
|
| + blink::WebCryptoKeyUsage usage = keyUsageMappings[i].value;
|
| if (m_key.usages() & usage)
|
| result.append(keyUsageToString(usage));
|
| }
|
| return result;
|
| }
|
|
|
| -bool Key::canBeUsedForAlgorithm(const WebKit::WebCryptoAlgorithm& algorithm, AlgorithmOperation op, ExceptionState& es) const
|
| +bool Key::canBeUsedForAlgorithm(const blink::WebCryptoAlgorithm& algorithm, AlgorithmOperation op, ExceptionState& es) const
|
| {
|
| if (!(m_key.usages() & toKeyUsage(op))) {
|
| es.throwDOMException(NotSupportedError, "key.usages does not permit this operation");
|
| @@ -190,9 +190,9 @@ bool Key::canBeUsedForAlgorithm(const WebKit::WebCryptoAlgorithm& algorithm, Alg
|
| // Verify that the algorithm-specific parameters for the key conform to the
|
| // algorithm.
|
|
|
| - if (m_key.algorithm().id() == WebKit::WebCryptoAlgorithmIdHmac) {
|
| - WebKit::WebCryptoAlgorithmId keyHash;
|
| - WebKit::WebCryptoAlgorithmId algorithmHash;
|
| + if (m_key.algorithm().id() == blink::WebCryptoAlgorithmIdHmac) {
|
| + blink::WebCryptoAlgorithmId keyHash;
|
| + blink::WebCryptoAlgorithmId algorithmHash;
|
| if (!getHmacHashId(m_key.algorithm(), keyHash) || !getHmacHashId(algorithm, algorithmHash) || keyHash != algorithmHash) {
|
| es.throwDOMException(NotSupportedError, "key.algorithm does not match that of operation (HMAC's hash differs)");
|
| return false;
|
| @@ -202,23 +202,23 @@ bool Key::canBeUsedForAlgorithm(const WebKit::WebCryptoAlgorithm& algorithm, Alg
|
| return true;
|
| }
|
|
|
| -bool Key::parseFormat(const String& formatString, WebKit::WebCryptoKeyFormat& format, ExceptionState& es)
|
| +bool Key::parseFormat(const String& formatString, blink::WebCryptoKeyFormat& format, ExceptionState& es)
|
| {
|
| // There are few enough values that testing serially is fast enough.
|
| if (formatString == "raw") {
|
| - format = WebKit::WebCryptoKeyFormatRaw;
|
| + format = blink::WebCryptoKeyFormatRaw;
|
| return true;
|
| }
|
| if (formatString == "pkcs8") {
|
| - format = WebKit::WebCryptoKeyFormatPkcs8;
|
| + format = blink::WebCryptoKeyFormatPkcs8;
|
| return true;
|
| }
|
| if (formatString == "spki") {
|
| - format = WebKit::WebCryptoKeyFormatSpki;
|
| + format = blink::WebCryptoKeyFormatSpki;
|
| return true;
|
| }
|
| if (formatString == "jwk") {
|
| - format = WebKit::WebCryptoKeyFormatJwk;
|
| + format = blink::WebCryptoKeyFormatJwk;
|
| return true;
|
| }
|
|
|
| @@ -226,11 +226,11 @@ bool Key::parseFormat(const String& formatString, WebKit::WebCryptoKeyFormat& fo
|
| return false;
|
| }
|
|
|
| -bool Key::parseUsageMask(const Vector<String>& usages, WebKit::WebCryptoKeyUsageMask& mask, ExceptionState& es)
|
| +bool Key::parseUsageMask(const Vector<String>& usages, blink::WebCryptoKeyUsageMask& mask, ExceptionState& es)
|
| {
|
| mask = 0;
|
| for (size_t i = 0; i < usages.size(); ++i) {
|
| - WebKit::WebCryptoKeyUsageMask usage = keyUsageStringToMask(usages[i]);
|
| + blink::WebCryptoKeyUsageMask usage = keyUsageStringToMask(usages[i]);
|
| if (!usage) {
|
| es.throwTypeError("Invalid keyUsages argument");
|
| return false;
|
|
|