Index: content/child/webcrypto/openssl/rsa_key_openssl.cc |
diff --git a/content/child/webcrypto/openssl/rsa_key_openssl.cc b/content/child/webcrypto/openssl/rsa_key_openssl.cc |
index 78a9c589b9cfa3635a00c185bd803ac8b053f56c..4d01c8eda2ea8057124c88ac2c3500163f914eff 100644 |
--- a/content/child/webcrypto/openssl/rsa_key_openssl.cc |
+++ b/content/child/webcrypto/openssl/rsa_key_openssl.cc |
@@ -95,7 +95,7 @@ Status CreateWebCryptoPrivateKey( |
const blink::WebCryptoAlgorithmId rsa_algorithm_id, |
const blink::WebCryptoAlgorithm& hash, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
blink::WebCryptoKey* key) { |
blink::WebCryptoKeyAlgorithm key_algorithm; |
Status status = CreateRsaHashedKeyAlgorithm( |
@@ -115,7 +115,7 @@ Status CreateWebCryptoPrivateKey( |
blink::WebCryptoKeyTypePrivate, |
extractable, |
key_algorithm, |
- usage_mask); |
+ usages); |
return Status::Success(); |
} |
@@ -124,7 +124,7 @@ Status CreateWebCryptoPublicKey( |
const blink::WebCryptoAlgorithmId rsa_algorithm_id, |
const blink::WebCryptoAlgorithm& hash, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
blink::WebCryptoKey* key) { |
blink::WebCryptoKeyAlgorithm key_algorithm; |
Status status = CreateRsaHashedKeyAlgorithm( |
@@ -144,7 +144,7 @@ Status CreateWebCryptoPublicKey( |
blink::WebCryptoKeyTypePublic, |
extractable, |
key_algorithm, |
- usage_mask); |
+ usages); |
return Status::Success(); |
} |
@@ -162,7 +162,7 @@ BIGNUM* CreateBIGNUM(const std::string& n) { |
Status ImportRsaPrivateKey(const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
const JwkRsaInfo& params, |
blink::WebCryptoKey* key) { |
crypto::ScopedRSA rsa(RSA_new()); |
@@ -195,13 +195,13 @@ Status ImportRsaPrivateKey(const blink::WebCryptoAlgorithm& algorithm, |
algorithm.id(), |
algorithm.rsaHashedImportParams()->hash(), |
extractable, |
- usage_mask, |
+ usages, |
key); |
} |
Status ImportRsaPublicKey(const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
const CryptoData& n, |
const CryptoData& e, |
blink::WebCryptoKey* key) { |
@@ -222,7 +222,7 @@ Status ImportRsaPublicKey(const blink::WebCryptoAlgorithm& algorithm, |
algorithm.id(), |
algorithm.rsaHashedImportParams()->hash(), |
extractable, |
- usage_mask, |
+ usages, |
key); |
} |
@@ -231,17 +231,17 @@ Status ImportRsaPublicKey(const blink::WebCryptoAlgorithm& algorithm, |
Status RsaHashedAlgorithm::GenerateKey( |
const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask combined_usage_mask, |
+ blink::WebCryptoKeyUsageMask combined_usages, |
GenerateKeyResult* result) const { |
Status status = CheckKeyCreationUsages( |
- all_public_key_usages_ | all_private_key_usages_, combined_usage_mask); |
+ all_public_key_usages_ | all_private_key_usages_, combined_usages); |
if (status.IsError()) |
return status; |
- const blink::WebCryptoKeyUsageMask public_usage_mask = |
- combined_usage_mask & all_public_key_usages_; |
- const blink::WebCryptoKeyUsageMask private_usage_mask = |
- combined_usage_mask & all_private_key_usages_; |
+ const blink::WebCryptoKeyUsageMask public_usages = |
+ combined_usages & all_public_key_usages_; |
+ const blink::WebCryptoKeyUsageMask private_usages = |
+ combined_usages & all_private_key_usages_; |
const blink::WebCryptoRsaHashedKeyGenParams* params = |
algorithm.rsaHashedKeyGenParams(); |
@@ -292,7 +292,7 @@ Status RsaHashedAlgorithm::GenerateKey( |
algorithm.id(), |
params->hash(), |
true, |
- public_usage_mask, |
+ public_usages, |
&public_key); |
if (status.IsError()) |
return status; |
@@ -301,7 +301,7 @@ Status RsaHashedAlgorithm::GenerateKey( |
algorithm.id(), |
params->hash(), |
extractable, |
- private_usage_mask, |
+ private_usages, |
&private_key); |
if (status.IsError()) |
return status; |
@@ -312,16 +312,16 @@ Status RsaHashedAlgorithm::GenerateKey( |
Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey( |
blink::WebCryptoKeyFormat format, |
- blink::WebCryptoKeyUsageMask usage_mask) const { |
+ blink::WebCryptoKeyUsageMask usages) const { |
switch (format) { |
case blink::WebCryptoKeyFormatSpki: |
- return CheckKeyCreationUsages(all_public_key_usages_, usage_mask); |
+ return CheckKeyCreationUsages(all_public_key_usages_, usages); |
case blink::WebCryptoKeyFormatPkcs8: |
- return CheckKeyCreationUsages(all_private_key_usages_, usage_mask); |
+ return CheckKeyCreationUsages(all_private_key_usages_, usages); |
case blink::WebCryptoKeyFormatJwk: |
// TODO(eroman): http://crbug.com/395904 |
return CheckKeyCreationUsages( |
- all_public_key_usages_ | all_private_key_usages_, usage_mask); |
+ all_public_key_usages_ | all_private_key_usages_, usages); |
default: |
return Status::ErrorUnsupportedImportKeyFormat(); |
} |
@@ -331,7 +331,7 @@ Status RsaHashedAlgorithm::ImportKeyPkcs8( |
const CryptoData& key_data, |
const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
blink::WebCryptoKey* key) const { |
if (!key_data.byte_length()) |
return Status::ErrorImportEmptyKeyData(); |
@@ -370,7 +370,7 @@ Status RsaHashedAlgorithm::ImportKeyPkcs8( |
algorithm.id(), |
algorithm.rsaHashedImportParams()->hash(), |
extractable, |
- usage_mask, |
+ usages, |
key); |
} |
@@ -378,7 +378,7 @@ Status RsaHashedAlgorithm::ImportKeySpki( |
const CryptoData& key_data, |
const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
blink::WebCryptoKey* key) const { |
if (!key_data.byte_length()) |
return Status::ErrorImportEmptyKeyData(); |
@@ -404,7 +404,7 @@ Status RsaHashedAlgorithm::ImportKeySpki( |
algorithm.id(), |
algorithm.rsaHashedImportParams()->hash(), |
extractable, |
- usage_mask, |
+ usages, |
key); |
} |
@@ -412,7 +412,7 @@ Status RsaHashedAlgorithm::ImportKeyJwk( |
const CryptoData& key_data, |
const blink::WebCryptoAlgorithm& algorithm, |
bool extractable, |
- blink::WebCryptoKeyUsageMask usage_mask, |
+ blink::WebCryptoKeyUsageMask usages, |
blink::WebCryptoKey* key) const { |
crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
@@ -424,22 +424,22 @@ Status RsaHashedAlgorithm::ImportKeyJwk( |
JwkRsaInfo jwk; |
Status status = |
- ReadRsaKeyJwk(key_data, jwk_algorithm, extractable, usage_mask, &jwk); |
+ ReadRsaKeyJwk(key_data, jwk_algorithm, extractable, usages, &jwk); |
if (status.IsError()) |
return status; |
// Once the key type is known, verify the usages. |
status = CheckKeyCreationUsages( |
jwk.is_private_key ? all_private_key_usages_ : all_public_key_usages_, |
- usage_mask); |
+ usages); |
if (status.IsError()) |
return status; |
return jwk.is_private_key |
- ? ImportRsaPrivateKey(algorithm, extractable, usage_mask, jwk, key) |
+ ? ImportRsaPrivateKey(algorithm, extractable, usages, jwk, key) |
: ImportRsaPublicKey(algorithm, |
extractable, |
- usage_mask, |
+ usages, |
CryptoData(jwk.n), |
CryptoData(jwk.e), |
key); |