summaryrefslogtreecommitdiff
path: root/chromium/components/webcrypto/status.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/components/webcrypto/status.cc')
-rw-r--r--chromium/components/webcrypto/status.cc122
1 files changed, 61 insertions, 61 deletions
diff --git a/chromium/components/webcrypto/status.cc b/chromium/components/webcrypto/status.cc
index 6ba4cbfccde..7dcbb93c888 100644
--- a/chromium/components/webcrypto/status.cc
+++ b/chromium/components/webcrypto/status.cc
@@ -22,170 +22,170 @@ Status Status::Success() {
}
Status Status::OperationError() {
- return Status(blink::WebCryptoErrorTypeOperation, "");
+ return Status(blink::kWebCryptoErrorTypeOperation, "");
}
Status Status::DataError() {
- return Status(blink::WebCryptoErrorTypeData, "");
+ return Status(blink::kWebCryptoErrorTypeData, "");
}
Status Status::ErrorJwkNotDictionary() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"JWK input could not be parsed to a JSON dictionary");
}
Status Status::ErrorJwkMemberMissing(const std::string& member_name) {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The required JWK member \"" + member_name + "\" was missing");
}
Status Status::ErrorJwkMemberWrongType(const std::string& member_name,
const std::string& expected_type) {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The JWK member \"" + member_name + "\" must be a " + expected_type);
}
Status Status::ErrorJwkBase64Decode(const std::string& member_name) {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK member \"" + member_name +
"\" could not be base64url decoded or contained padding");
}
Status Status::ErrorJwkExtInconsistent() {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The \"ext\" member of the JWK dictionary is inconsistent what that "
"specified by the Web Crypto call");
}
Status Status::ErrorJwkAlgorithmInconsistent() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"alg\" member was inconsistent with that specified "
"by the Web Crypto call");
}
Status Status::ErrorJwkUnrecognizedUse() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"use\" member could not be parsed");
}
Status Status::ErrorJwkUnrecognizedKeyop() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"key_ops\" member could not be parsed");
}
Status Status::ErrorJwkUseInconsistent() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"use\" member was inconsistent with that specified "
"by the Web Crypto call. The JWK usage must be a superset of "
"those requested");
}
Status Status::ErrorJwkKeyopsInconsistent() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"key_ops\" member was inconsistent with that "
"specified by the Web Crypto call. The JWK usage must be a "
"superset of those requested");
}
Status Status::ErrorJwkUseAndKeyopsInconsistent() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"use\" and \"key_ops\" properties were both found "
"but are inconsistent with each other.");
}
Status Status::ErrorJwkUnexpectedKty(const std::string& expected) {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"kty\" member was not \"" + expected + "\"");
}
Status Status::ErrorJwkIncorrectKeyLength() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"k\" member did not include the right length "
"of key data for the given algorithm.");
}
Status Status::ErrorJwkEmptyBigInteger(const std::string& member_name) {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The JWK \"" + member_name + "\" member was empty.");
}
Status Status::ErrorJwkBigIntegerHasLeadingZero(
const std::string& member_name) {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The JWK \"" + member_name + "\" member contained a leading zero.");
}
Status Status::ErrorJwkDuplicateKeyOps() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The \"key_ops\" member of the JWK dictionary contains "
"duplicate usages.");
}
Status Status::ErrorUnsupportedImportKeyFormat() {
- return Status(blink::WebCryptoErrorTypeNotSupported,
+ return Status(blink::kWebCryptoErrorTypeNotSupported,
"Unsupported import key format for algorithm");
}
Status Status::ErrorUnsupportedExportKeyFormat() {
- return Status(blink::WebCryptoErrorTypeNotSupported,
+ return Status(blink::kWebCryptoErrorTypeNotSupported,
"Unsupported export key format for algorithm");
}
Status Status::ErrorImportAesKeyLength() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"AES key data must be 128 or 256 bits");
}
Status Status::ErrorGetAesKeyLength() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"AES key length must be 128 or 256 bits");
}
Status Status::ErrorGenerateAesKeyLength() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"AES key length must be 128 or 256 bits");
}
Status Status::ErrorAes192BitUnsupported() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"192-bit AES keys are not supported");
}
Status Status::ErrorUnexpectedKeyType() {
- return Status(blink::WebCryptoErrorTypeInvalidAccess,
+ return Status(blink::kWebCryptoErrorTypeInvalidAccess,
"The key is not of the expected type");
}
Status Status::ErrorIncorrectSizeAesCbcIv() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The \"iv\" has an unexpected length -- must be 16 bytes");
}
Status Status::ErrorIncorrectSizeAesCtrCounter() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The \"counter\" has an unexpected length -- must be 16 bytes");
}
Status Status::ErrorInvalidAesCtrCounterLength() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The \"length\" member must be >= 1 and <= 128");
}
Status Status::ErrorAesCtrInputTooLongCounterRepeated() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The input is too large for the counter length.");
}
Status Status::ErrorDataTooLarge() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The provided data is too large");
}
Status Status::ErrorDataTooSmall() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The provided data is too small");
}
@@ -194,98 +194,98 @@ Status Status::ErrorUnsupported() {
}
Status Status::ErrorUnsupported(const std::string& message) {
- return Status(blink::WebCryptoErrorTypeNotSupported, message);
+ return Status(blink::kWebCryptoErrorTypeNotSupported, message);
}
Status Status::ErrorUnexpected() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"Something unexpected happened...");
}
Status Status::ErrorInvalidAesGcmTagLength() {
return Status(
- blink::WebCryptoErrorTypeOperation,
+ blink::kWebCryptoErrorTypeOperation,
"The tag length is invalid: Must be 32, 64, 96, 104, 112, 120, or 128 "
"bits");
}
Status Status::ErrorInvalidAesKwDataLength() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The AES-KW input data length is invalid: not a multiple of 8 "
"bytes");
}
Status Status::ErrorGenerateKeyPublicExponent() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The \"publicExponent\" must be either 3 or 65537");
}
Status Status::ErrorImportRsaEmptyModulus() {
- return Status(blink::WebCryptoErrorTypeData, "The modulus is empty");
+ return Status(blink::kWebCryptoErrorTypeData, "The modulus is empty");
}
Status Status::ErrorGenerateRsaUnsupportedModulus() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The modulus length must be a multiple of 8 bits and >= 256 "
"and <= 16384");
}
Status Status::ErrorImportRsaEmptyExponent() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"No bytes for the exponent were provided");
}
Status Status::ErrorKeyNotExtractable() {
- return Status(blink::WebCryptoErrorTypeInvalidAccess,
+ return Status(blink::kWebCryptoErrorTypeInvalidAccess,
"They key is not extractable");
}
Status Status::ErrorGenerateHmacKeyLengthZero() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"HMAC key length must not be zero");
}
Status Status::ErrorHmacImportEmptyKey() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"HMAC key data must not be empty");
}
Status Status::ErrorGetHmacKeyLengthZero() {
- return Status(blink::WebCryptoErrorTypeType,
+ return Status(blink::kWebCryptoErrorTypeType,
"HMAC key length must not be zero");
}
Status Status::ErrorHmacImportBadLength() {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The optional HMAC key length must be shorter than the key data, and by "
"no more than 7 bits.");
}
Status Status::ErrorCreateKeyBadUsages() {
- return Status(blink::WebCryptoErrorTypeSyntax,
+ return Status(blink::kWebCryptoErrorTypeSyntax,
"Cannot create a key using the specified key usages.");
}
Status Status::ErrorCreateKeyEmptyUsages() {
- return Status(blink::WebCryptoErrorTypeSyntax,
+ return Status(blink::kWebCryptoErrorTypeSyntax,
"Usages cannot be empty when creating a key.");
}
Status Status::ErrorImportedEcKeyIncorrectCurve() {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The imported EC key specifies a different curve than requested");
}
Status Status::ErrorJwkIncorrectCrv() {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
"The JWK's \"crv\" member specifies a different curve than requested");
}
Status Status::ErrorEcKeyInvalid() {
- return Status(blink::WebCryptoErrorTypeData,
+ return Status(blink::kWebCryptoErrorTypeData,
"The imported EC key is invalid");
}
@@ -293,7 +293,7 @@ Status Status::JwkOctetStringWrongLength(const std::string& member_name,
size_t expected_length,
size_t actual_length) {
return Status(
- blink::WebCryptoErrorTypeData,
+ blink::kWebCryptoErrorTypeData,
base::StringPrintf(
"The JWK's \"%s\" member defines an octet string of length %" PRIuS
" bytes but should be %" PRIuS,
@@ -302,24 +302,24 @@ Status Status::JwkOctetStringWrongLength(const std::string& member_name,
Status Status::ErrorEcdhPublicKeyWrongType() {
return Status(
- blink::WebCryptoErrorTypeInvalidAccess,
+ blink::kWebCryptoErrorTypeInvalidAccess,
"The public parameter for ECDH key derivation is not a public EC key");
}
Status Status::ErrorEcdhPublicKeyWrongAlgorithm() {
return Status(
- blink::WebCryptoErrorTypeInvalidAccess,
+ blink::kWebCryptoErrorTypeInvalidAccess,
"The public parameter for ECDH key derivation must be for ECDH");
}
Status Status::ErrorEcdhCurveMismatch() {
- return Status(blink::WebCryptoErrorTypeInvalidAccess,
+ return Status(blink::kWebCryptoErrorTypeInvalidAccess,
"The public parameter for ECDH key derivation is for a "
"different named curve");
}
Status Status::ErrorEcdhLengthTooBig(unsigned int max_length_bits) {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
base::StringPrintf(
"Length specified for ECDH key derivation is too large. "
"Maximum allowed is %u bits",
@@ -327,7 +327,7 @@ Status Status::ErrorEcdhLengthTooBig(unsigned int max_length_bits) {
}
Status Status::ErrorHkdfLengthTooLong() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"The length provided for HKDF is too large.");
}
@@ -335,35 +335,35 @@ Status Status::ErrorHkdfDeriveBitsLengthNotSpecified() {
// TODO(nharper): The spec might change so that an OperationError should be
// thrown here instead of a TypeError.
// (https://www.w3.org/Bugs/Public/show_bug.cgi?id=27771)
- return Status(blink::WebCryptoErrorTypeType,
+ return Status(blink::kWebCryptoErrorTypeType,
"No length was specified for the HKDF Derive Bits operation.");
}
Status Status::ErrorPbkdf2InvalidLength() {
return Status(
- blink::WebCryptoErrorTypeOperation,
+ blink::kWebCryptoErrorTypeOperation,
"Length for PBKDF2 key derivation must be a multiple of 8 bits.");
}
Status Status::ErrorPbkdf2DeriveBitsLengthNotSpecified() {
return Status(
- blink::WebCryptoErrorTypeOperation,
+ blink::kWebCryptoErrorTypeOperation,
"No length was specified for the PBKDF2 Derive Bits operation.");
}
Status Status::ErrorPbkdf2DeriveBitsLengthZero() {
return Status(
- blink::WebCryptoErrorTypeOperation,
+ blink::kWebCryptoErrorTypeOperation,
"A length of 0 was specified for PBKDF2's Derive Bits operation.");
}
Status Status::ErrorPbkdf2Iterations0() {
- return Status(blink::WebCryptoErrorTypeOperation,
+ return Status(blink::kWebCryptoErrorTypeOperation,
"PBKDF2 requires iterations > 0");
}
Status Status::ErrorImportExtractableKdfKey() {
- return Status(blink::WebCryptoErrorTypeSyntax,
+ return Status(blink::kWebCryptoErrorTypeSyntax,
"KDF keys must set extractable=false");
}