This is an archived snapshot of W3C's public bugzilla bug tracker, decommissioned in April 2019. Please see the home page for more details.

Bug 26674 - Use required dictionary entries instead of hacks with nullable
Summary: Use required dictionary entries instead of hacks with nullable
Status: RESOLVED FIXED
Alias: None
Product: Web Cryptography
Classification: Unclassified
Component: Web Cryptography API Document (show other bugs)
Version: unspecified
Hardware: PC All
: P2 normal
Target Milestone: ---
Assignee: Mark Watson
QA Contact:
URL:
Whiteboard:
Keywords:
: 26866 (view as bug list)
Depends on:
Blocks:
 
Reported: 2014-08-26 15:20 UTC by Boris Zbarsky
Modified: 2014-09-26 00:47 UTC (History)
3 users (show)

See Also:


Attachments

Description Boris Zbarsky 2014-08-26 15:20:14 UTC
See thread at http://lists.w3.org/Archives/Public/public-webcrypto/2014Jul/0033.html and following.  With bug 26303 fixed, this is now supported in Web IDL.
Comment 1 Richard Barnes 2014-09-19 19:59:51 UTC
*** Bug 26866 has been marked as a duplicate of this bug. ***
Comment 2 Mark Watson 2014-09-25 23:59:26 UTC
I believe the following changes are required for this one:
- Algorithm normalization does not need to handle nullable / non-nullable members explicitly, IDL conversion will throw if required members are missing
- All non-nullable members IDL dictionaries need the 'required' keyword
- Nullable members of IDL dictionaries should be made non-nullable
- RSA-OAEP Encrypt and Decrypt operations must say what to do if the label member is not present (use the empty octet string)
- AES-GCM Encrypt/Decrypt s/if present and not null/if present/ etc.
- CONCAT KDF: explain what to do if publicInfo and privateInfo are not present (use the empty octet string)
Comment 3 Mark Watson 2014-09-26 00:42:43 UTC
There are several additional changes needed in HMAC also.