This is an archived snapshot of W3C's public bugzilla bug tracker, decommissioned in April 2019. Please see the home page for more details.

Bug 22571 - Invalid IDL - Dictionary members as attributes
Summary: Invalid IDL - Dictionary members as attributes
Status: RESOLVED FIXED
Alias: None
Product: Web Cryptography
Classification: Unclassified
Component: Web Cryptography API Document (show other bugs)
Version: unspecified
Hardware: PC Windows NT
: P2 normal
Target Milestone: ---
Assignee: Ryan Sleevi
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-07-04 01:07 UTC by Ryan Sleevi
Modified: 2014-02-13 12:56 UTC (History)
3 users (show)

See Also:


Attachments

Description Ryan Sleevi 2013-07-04 01:07:53 UTC
Both the Key object and the CryptoOperation object expose dictionary attributes - 'algorithm'

Per http://dev.w3.org/2006/webapi/WebIDL/#idl-attributes , attributes MUST NOT be sequences, dictionaries, or union types that have dictionaries or sequences as members.

One way to resolve this is to specify parallel interfaces for normalized algorithms.
Comment 1 Ryan Sleevi 2014-02-13 12:56:25 UTC
I've hopefully resolved this in https://dvcs.w3.org/hg/webcrypto-api/rev/2fa3494f0179

The Key object now exposes a KeyAlgorithm interface, rather than the Algorithm dictionary, and each of the Key types is meant to specify their minimal set of common parameters.

For example, an RSA key (whether public or private) includes the algorithm name, the public modulus length (in bits), and the public exponent. For algorithms which are 'tainted' - eg: by hash algorithms, as in the case of PSS, SSA, and OAEP - additional properties - such as the Hash - are exposed.

There are still gaps in the normative requirements to specify exactly how to convert an Algorithm to a KeyAlgorithm, but hopefully this resolves the blocking concern. As such, I'm marking this as FIXED.