- From: Ryan Sleevi <sleevi@google.com>
- Date: Mon, 25 Mar 2013 13:50:24 -0700
- To: Richard Barnes <rbarnes@bbn.com>
- Cc: Web Cryptography Working Group <public-webcrypto@w3.org>
- Message-ID: <CACvaWvaUCNUv-mh28_sD=Xch6zoWiukMg+-5Fm8QNqSyeM9zUA@mail.gmail.com>
On Mon, Mar 25, 2013 at 1:20 PM, Richard Barnes <rbarnes@bbn.com> wrote:
> Hey all,
>
> Section 1. Is there a problem?
>
> I'm wondering if the "single-shot" syntax for encrypt/decrypt/sign/verify
> introduces a race condition for developers. Suppose I write the following
> two lines:
>
> var op = window.crypto.encrypt(alg, key, buffer);
> op.oncomplete = function(e) { /* do stuff with result */ }
>
> The encrypt() call is asynchronous, so the "complete" event may have
> already fired before the "oncomplete" handler is set. So my handler never
> gets called, which makes my app not work.
>
>
> Section 2. How do we solve the problem
>
> It seems like there are two possible approaches here:
> 1. Delay the event
> 2. Provide explicit sequencing (Promises or synchronous call)
>
> FWIW, PolyCrypt resolves takes the former approach right now. An
> operation caches the last event that it fired of each type. Then when a
> listener is registered, it can get the cached event. This is basically the
> same as the Promises approach, but with dirtier syntax.
>
> In other words, it seems like implementing a Promises-style interface
> should be a high priority, because otherwise there's non-deterministic
> behavior.
>
> --Richard
>
Just to be clear, your polyfill is non-comformant then.
You can easily simulate the "queue a task" by using a setTimeout value of
0, which will ensure that control is yielded back to the event loop before
continuing processing.
Received on Monday, 25 March 2013 20:50:55 UTC