| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/child/webcrypto/openssl/rsa_key_openssl.h" | 5 #include "content/child/webcrypto/openssl/rsa_key_openssl.h" |
| 6 | 6 |
| 7 #include <openssl/evp.h> | 7 #include <openssl/evp.h> |
| 8 | 8 |
| 9 #include "base/logging.h" | 9 #include "base/logging.h" |
| 10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
| (...skipping 216 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 227 if (status.IsError()) | 227 if (status.IsError()) |
| 228 return status; | 228 return status; |
| 229 | 229 |
| 230 result->AssignKeyPair(public_key, private_key); | 230 result->AssignKeyPair(public_key, private_key); |
| 231 return Status::Success(); | 231 return Status::Success(); |
| 232 } | 232 } |
| 233 | 233 |
| 234 Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey( | 234 Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey( |
| 235 blink::WebCryptoKeyFormat format, | 235 blink::WebCryptoKeyFormat format, |
| 236 blink::WebCryptoKeyUsageMask usages) const { | 236 blink::WebCryptoKeyUsageMask usages) const { |
| 237 switch (format) { | 237 return VerifyUsagesBeforeImportAsymmetricKey(format, all_public_key_usages_, |
| 238 case blink::WebCryptoKeyFormatSpki: | 238 all_private_key_usages_, usages); |
| 239 return CheckKeyCreationUsages(all_public_key_usages_, usages); | |
| 240 case blink::WebCryptoKeyFormatPkcs8: | |
| 241 return CheckKeyCreationUsages(all_private_key_usages_, usages); | |
| 242 case blink::WebCryptoKeyFormatJwk: | |
| 243 // The JWK could represent either a public key or private key. The usages | |
| 244 // must make sense for one of the two. The usages will be checked again by | |
| 245 // ImportKeyJwk() once the key type has been determined. | |
| 246 if (CheckKeyCreationUsages(all_private_key_usages_, usages).IsSuccess() || | |
| 247 CheckKeyCreationUsages(all_public_key_usages_, usages).IsSuccess()) { | |
| 248 return Status::Success(); | |
| 249 } | |
| 250 return Status::ErrorCreateKeyBadUsages(); | |
| 251 default: | |
| 252 return Status::ErrorUnsupportedImportKeyFormat(); | |
| 253 } | |
| 254 } | 239 } |
| 255 | 240 |
| 256 Status RsaHashedAlgorithm::ImportKeyPkcs8( | 241 Status RsaHashedAlgorithm::ImportKeyPkcs8( |
| 257 const CryptoData& key_data, | 242 const CryptoData& key_data, |
| 258 const blink::WebCryptoAlgorithm& algorithm, | 243 const blink::WebCryptoAlgorithm& algorithm, |
| 259 bool extractable, | 244 bool extractable, |
| 260 blink::WebCryptoKeyUsageMask usages, | 245 blink::WebCryptoKeyUsageMask usages, |
| 261 blink::WebCryptoKey* key) const { | 246 blink::WebCryptoKey* key) const { |
| 262 crypto::ScopedEVP_PKEY private_key; | 247 crypto::ScopedEVP_PKEY private_key; |
| 263 Status status = | 248 Status status = |
| (...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 444 key->algorithm().rsaHashedParams()->publicExponent().size())) { | 429 key->algorithm().rsaHashedParams()->publicExponent().size())) { |
| 445 return Status::ErrorUnexpected(); | 430 return Status::ErrorUnexpected(); |
| 446 } | 431 } |
| 447 | 432 |
| 448 return Status::Success(); | 433 return Status::Success(); |
| 449 } | 434 } |
| 450 | 435 |
| 451 } // namespace webcrypto | 436 } // namespace webcrypto |
| 452 | 437 |
| 453 } // namespace content | 438 } // namespace content |
| OLD | NEW |