| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/child/webcrypto/nss/sym_key_nss.h" | 5 #include "content/child/webcrypto/nss/sym_key_nss.h" |
| 6 | 6 |
| 7 #include "base/logging.h" | 7 #include "base/logging.h" |
| 8 #include "content/child/webcrypto/crypto_data.h" | 8 #include "content/child/webcrypto/crypto_data.h" |
| 9 #include "content/child/webcrypto/generate_key_result.h" | 9 #include "content/child/webcrypto/generate_key_result.h" |
| 10 #include "content/child/webcrypto/nss/key_nss.h" | 10 #include "content/child/webcrypto/nss/key_nss.h" |
| 11 #include "content/child/webcrypto/nss/util_nss.h" | 11 #include "content/child/webcrypto/nss/util_nss.h" |
| 12 #include "content/child/webcrypto/status.h" | 12 #include "content/child/webcrypto/status.h" |
| 13 #include "content/child/webcrypto/webcrypto_util.h" | 13 #include "content/child/webcrypto/webcrypto_util.h" |
| 14 #include "crypto/scoped_nss_types.h" | 14 #include "crypto/scoped_nss_types.h" |
| 15 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | 15 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
| 16 | 16 |
| 17 namespace content { | 17 namespace content { |
| 18 | 18 |
| 19 namespace webcrypto { | 19 namespace webcrypto { |
| 20 | 20 |
| 21 Status GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, | 21 Status GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, |
| 22 bool extractable, | 22 bool extractable, |
| 23 blink::WebCryptoKeyUsageMask usage_mask, | 23 blink::WebCryptoKeyUsageMask usages, |
| 24 unsigned keylen_bytes, | 24 unsigned keylen_bytes, |
| 25 CK_MECHANISM_TYPE mechanism, | 25 CK_MECHANISM_TYPE mechanism, |
| 26 GenerateKeyResult* result) { | 26 GenerateKeyResult* result) { |
| 27 DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); | 27 DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); |
| 28 | 28 |
| 29 crypto::ScopedPK11Slot slot(PK11_GetInternalKeySlot()); | 29 crypto::ScopedPK11Slot slot(PK11_GetInternalKeySlot()); |
| 30 if (!slot) | 30 if (!slot) |
| 31 return Status::OperationError(); | 31 return Status::OperationError(); |
| 32 | 32 |
| 33 crypto::ScopedPK11SymKey pk11_key( | 33 crypto::ScopedPK11SymKey pk11_key( |
| (...skipping 10 matching lines...) Expand all Loading... |
| 44 return Status::OperationError(); | 44 return Status::OperationError(); |
| 45 | 45 |
| 46 scoped_ptr<SymKeyNss> handle(new SymKeyNss( | 46 scoped_ptr<SymKeyNss> handle(new SymKeyNss( |
| 47 pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); | 47 pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); |
| 48 | 48 |
| 49 result->AssignSecretKey( | 49 result->AssignSecretKey( |
| 50 blink::WebCryptoKey::create(handle.release(), | 50 blink::WebCryptoKey::create(handle.release(), |
| 51 blink::WebCryptoKeyTypeSecret, | 51 blink::WebCryptoKeyTypeSecret, |
| 52 extractable, | 52 extractable, |
| 53 algorithm, | 53 algorithm, |
| 54 usage_mask)); | 54 usages)); |
| 55 | 55 |
| 56 return Status::Success(); | 56 return Status::Success(); |
| 57 } | 57 } |
| 58 | 58 |
| 59 Status ImportKeyRawNss(const CryptoData& key_data, | 59 Status ImportKeyRawNss(const CryptoData& key_data, |
| 60 const blink::WebCryptoKeyAlgorithm& algorithm, | 60 const blink::WebCryptoKeyAlgorithm& algorithm, |
| 61 bool extractable, | 61 bool extractable, |
| 62 blink::WebCryptoKeyUsageMask usage_mask, | 62 blink::WebCryptoKeyUsageMask usages, |
| 63 CK_MECHANISM_TYPE mechanism, | 63 CK_MECHANISM_TYPE mechanism, |
| 64 CK_FLAGS flags, | 64 CK_FLAGS flags, |
| 65 blink::WebCryptoKey* key) { | 65 blink::WebCryptoKey* key) { |
| 66 DCHECK(!algorithm.isNull()); | 66 DCHECK(!algorithm.isNull()); |
| 67 SECItem key_item = MakeSECItemForBuffer(key_data); | 67 SECItem key_item = MakeSECItemForBuffer(key_data); |
| 68 | 68 |
| 69 crypto::ScopedPK11Slot slot(PK11_GetInternalSlot()); | 69 crypto::ScopedPK11Slot slot(PK11_GetInternalSlot()); |
| 70 crypto::ScopedPK11SymKey pk11_sym_key( | 70 crypto::ScopedPK11SymKey pk11_sym_key( |
| 71 PK11_ImportSymKeyWithFlags(slot.get(), | 71 PK11_ImportSymKeyWithFlags(slot.get(), |
| 72 mechanism, | 72 mechanism, |
| 73 PK11_OriginUnwrap, | 73 PK11_OriginUnwrap, |
| 74 CKA_FLAGS_ONLY, | 74 CKA_FLAGS_ONLY, |
| 75 &key_item, | 75 &key_item, |
| 76 flags, | 76 flags, |
| 77 false, | 77 false, |
| 78 NULL)); | 78 NULL)); |
| 79 if (!pk11_sym_key.get()) | 79 if (!pk11_sym_key.get()) |
| 80 return Status::OperationError(); | 80 return Status::OperationError(); |
| 81 | 81 |
| 82 scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data)); | 82 scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data)); |
| 83 | 83 |
| 84 *key = blink::WebCryptoKey::create(handle.release(), | 84 *key = blink::WebCryptoKey::create(handle.release(), |
| 85 blink::WebCryptoKeyTypeSecret, | 85 blink::WebCryptoKeyTypeSecret, |
| 86 extractable, | 86 extractable, |
| 87 algorithm, | 87 algorithm, |
| 88 usage_mask); | 88 usages); |
| 89 return Status::Success(); | 89 return Status::Success(); |
| 90 } | 90 } |
| 91 | 91 |
| 92 } // namespace webcrypto | 92 } // namespace webcrypto |
| 93 | 93 |
| 94 } // namespace content | 94 } // namespace content |
| OLD | NEW |