| Index: content/child/webcrypto/nss/rsa_key_nss.cc
|
| diff --git a/content/child/webcrypto/nss/rsa_key_nss.cc b/content/child/webcrypto/nss/rsa_key_nss.cc
|
| index 7a35593c18bdd75b2bfd5d7cd6e29704aa5f069b..a92163d90c55d592debac5c3f38efb0b2d41bfac 100644
|
| --- a/content/child/webcrypto/nss/rsa_key_nss.cc
|
| +++ b/content/child/webcrypto/nss/rsa_key_nss.cc
|
| @@ -588,23 +588,8 @@ Status RsaHashedAlgorithm::GenerateKey(
|
| Status RsaHashedAlgorithm::VerifyKeyUsagesBeforeImportKey(
|
| blink::WebCryptoKeyFormat format,
|
| blink::WebCryptoKeyUsageMask usages) const {
|
| - switch (format) {
|
| - case blink::WebCryptoKeyFormatSpki:
|
| - return CheckKeyCreationUsages(all_public_key_usages_, usages);
|
| - case blink::WebCryptoKeyFormatPkcs8:
|
| - return CheckKeyCreationUsages(all_private_key_usages_, usages);
|
| - case blink::WebCryptoKeyFormatJwk:
|
| - // The JWK could represent either a public key or private key. The usages
|
| - // must make sense for one of the two. The usages will be checked again by
|
| - // ImportKeyJwk() once the key type has been determined.
|
| - if (CheckKeyCreationUsages(all_private_key_usages_, usages).IsSuccess() ||
|
| - CheckKeyCreationUsages(all_public_key_usages_, usages).IsSuccess()) {
|
| - return Status::Success();
|
| - }
|
| - return Status::ErrorCreateKeyBadUsages();
|
| - default:
|
| - return Status::ErrorUnsupportedImportKeyFormat();
|
| - }
|
| + return VerifyUsagesBeforeImportAsymmetricKey(format, all_public_key_usages_,
|
| + all_private_key_usages_, usages);
|
| }
|
|
|
| Status RsaHashedAlgorithm::ImportKeyPkcs8(
|
|
|