| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/child/webcrypto/openssl/rsa_key_openssl.h" | 5 #include "content/child/webcrypto/openssl/rsa_key_openssl.h" |
| 6 | 6 |
| 7 #include <openssl/evp.h> | 7 #include <openssl/evp.h> |
| 8 | 8 |
| 9 #include "base/logging.h" | 9 #include "base/logging.h" |
| 10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
| (...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 151 } | 151 } |
| 152 | 152 |
| 153 } // namespace | 153 } // namespace |
| 154 | 154 |
| 155 Status RsaHashedAlgorithm::GenerateKey( | 155 Status RsaHashedAlgorithm::GenerateKey( |
| 156 const blink::WebCryptoAlgorithm& algorithm, | 156 const blink::WebCryptoAlgorithm& algorithm, |
| 157 bool extractable, | 157 bool extractable, |
| 158 blink::WebCryptoKeyUsageMask combined_usages, | 158 blink::WebCryptoKeyUsageMask combined_usages, |
| 159 GenerateKeyResult* result) const { | 159 GenerateKeyResult* result) const { |
| 160 Status status = CheckKeyCreationUsages( | 160 Status status = CheckKeyCreationUsages( |
| 161 all_public_key_usages_ | all_private_key_usages_, combined_usages); | 161 all_public_key_usages_ | all_private_key_usages_, combined_usages, false); |
| 162 if (status.IsError()) | 162 if (status.IsError()) |
| 163 return status; | 163 return status; |
| 164 | 164 |
| 165 const blink::WebCryptoKeyUsageMask public_usages = | 165 const blink::WebCryptoKeyUsageMask public_usages = |
| 166 combined_usages & all_public_key_usages_; | 166 combined_usages & all_public_key_usages_; |
| 167 const blink::WebCryptoKeyUsageMask private_usages = | 167 const blink::WebCryptoKeyUsageMask private_usages = |
| 168 combined_usages & all_private_key_usages_; | 168 combined_usages & all_private_key_usages_; |
| 169 | 169 |
| 170 if (private_usages == 0) | 170 if (private_usages == 0) |
| 171 return Status::ErrorCreateKeyEmptyUsages(); | 171 return Status::ErrorCreateKeyEmptyUsages(); |
| (...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 229 | 229 |
| 230 result->AssignKeyPair(public_key, private_key); | 230 result->AssignKeyPair(public_key, private_key); |
| 231 return Status::Success(); | 231 return Status::Success(); |
| 232 } | 232 } |
| 233 | 233 |
| 234 Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey( | 234 Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey( |
| 235 blink::WebCryptoKeyFormat format, | 235 blink::WebCryptoKeyFormat format, |
| 236 blink::WebCryptoKeyUsageMask usages) const { | 236 blink::WebCryptoKeyUsageMask usages) const { |
| 237 switch (format) { | 237 switch (format) { |
| 238 case blink::WebCryptoKeyFormatSpki: | 238 case blink::WebCryptoKeyFormatSpki: |
| 239 return CheckKeyCreationUsages(all_public_key_usages_, usages); | 239 return CheckKeyCreationUsages(all_public_key_usages_, usages, false); |
| 240 case blink::WebCryptoKeyFormatPkcs8: | 240 case blink::WebCryptoKeyFormatPkcs8: |
| 241 return CheckKeyCreationUsages(all_private_key_usages_, usages); | 241 return CheckKeyCreationUsages(all_private_key_usages_, usages, true); |
| 242 case blink::WebCryptoKeyFormatJwk: | 242 case blink::WebCryptoKeyFormatJwk: |
| 243 // The JWK could represent either a public key or private key. The usages | 243 // The JWK could represent either a public key or private key. The usages |
| 244 // must make sense for one of the two. The usages will be checked again by | 244 // must make sense for one of the two. The usages will be checked again by |
| 245 // ImportKeyJwk() once the key type has been determined. | 245 // ImportKeyJwk() once the key type has been determined. |
| 246 if (CheckKeyCreationUsages(all_private_key_usages_, usages).IsSuccess() || | 246 if (CheckKeyCreationUsages( |
| 247 CheckKeyCreationUsages(all_public_key_usages_, usages).IsSuccess()) { | 247 all_private_key_usages_, usages, true).IsSuccess() || |
| 248 CheckKeyCreationUsages( |
| 249 all_public_key_usages_, usages, false).IsSuccess()) { |
| 248 return Status::Success(); | 250 return Status::Success(); |
| 249 } | 251 } |
| 250 return Status::ErrorCreateKeyBadUsages(); | 252 return Status::ErrorCreateKeyBadUsages(); |
| 251 default: | 253 default: |
| 252 return Status::ErrorUnsupportedImportKeyFormat(); | 254 return Status::ErrorUnsupportedImportKeyFormat(); |
| 253 } | 255 } |
| 254 } | 256 } |
| 255 | 257 |
| 256 Status RsaHashedAlgorithm::ImportKeyPkcs8( | 258 Status RsaHashedAlgorithm::ImportKeyPkcs8( |
| 257 const CryptoData& key_data, | 259 const CryptoData& key_data, |
| (...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 444 key->algorithm().rsaHashedParams()->publicExponent().size())) { | 446 key->algorithm().rsaHashedParams()->publicExponent().size())) { |
| 445 return Status::ErrorUnexpected(); | 447 return Status::ErrorUnexpected(); |
| 446 } | 448 } |
| 447 | 449 |
| 448 return Status::Success(); | 450 return Status::Success(); |
| 449 } | 451 } |
| 450 | 452 |
| 451 } // namespace webcrypto | 453 } // namespace webcrypto |
| 452 | 454 |
| 453 } // namespace content | 455 } // namespace content |
| OLD | NEW |