Thursday, 29 May 2014
- [Bug 25912] DOMException.prototype.message is up to implementations
- [Bug 25912] DOMException.prototype.message is up to implementations
- [Bug 25912] New: DOMException.prototype.message is up to implementations
Wednesday, 28 May 2014
Tuesday, 27 May 2014
Monday, 26 May 2014
- Re: URGENT: Meeting for WebCrypto WG in TPAC at end of October October?
- [Bug 25839] Curve25519 Named Curve
- URGENT: Meeting for WebCrypto WG in TPAC at end of October October?
Saturday, 24 May 2014
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- URGENT: Meeting for WebCrypto WG in TPAC at end of October October?
- [Bug 25839] Curve25519 Named Curve
Wednesday, 21 May 2014
- [Bug 25839] Curve25519 Named Curve
- [Bug 25857] New: Extractability is not always specified when importing keys (in particular public keys)
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25842] Web developers given enough crypto rope to shoot selves in foot
- [Bug 25721] extractable keys should be disabled by default
Tuesday, 20 May 2014
- [Bug 25842] New: Web developers given enough crypto rope to shoot selves in foot
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] Curve25519 Named Curve
- [Bug 25839] New: Curve25519 Named Curve
- [Bug 25826] The "hash attribute of the algorithm attribute of key" is invalid. There is no hash attribute in the algorithm attribute of key.
- [Bug 25826] New: The "hash attribute of the algorithm attribute of key" is invalid. There is no hash attribute in the algorithm attribute of key.
- Fwd: W3C Workshop: Web Cryptography Next Steps
- [Bug 25820] Should empty key usages be allowed when creating keys?
- [Bug 25820] Should empty key usages be allowed when creating keys?
- [Bug 25820] Should empty key usages be allowed when creating keys?
- [Bug 25820] Should empty key usages be allowed when creating keys?
- [Bug 25820] New: Should empty key usages be allowed when creating keys?
- [Bug 25710] No Key Deletion
Monday, 19 May 2014
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25819] New: Example of how deriveKey works
- [Bug 25710] No Key Deletion
- [Bug 25710] No Key Deletion
- [Bug 25711] Not clear if keys persist across sessions
- [Bug 25710] No Key Deletion
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25711] Not clear if keys persist across sessions
- OperationError vs DataError
- [Bug 25816] New: DH import of PKCS8 uses OperationError instead of DataError for privateKeyInfo parse failure
- [Bug 25815] Spec encourages unsafe handling of secret data for JWK import of RSA/ECC keys
- [Bug 25815] New: Spec encourages unsafe handling of secret data for JWK import of RSA/ECC keys
- [Bug 25799] supercookies
- [Bug 25799] supercookies
- [Bug 25799] New: supercookies
- [Bug 25721] extractable keys should be disabled by default
Sunday, 18 May 2014
Friday, 16 May 2014
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25741] RSA-OAEP is under-specified when the parameters define an operation not supported by the key size
- [Bug 25741] New: RSA-OAEP is under-specified when the parameters define an operation not supported by the key size
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25607] Need to advise authors about security considerations
Thursday, 15 May 2014
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- Update to Key Discovery draft
- [Bug 25711] Not clear if keys persist across sessions
- [Bug 25711] Not clear if keys persist across sessions
- Re: Should we do a call Monday re Last Call?
- Re: Should we do a call Monday re Last Call?
- Re: Should we do a call Monday re Last Call?
- [Bug 25706] Incomplete Key Generation Definitions
- RE: Should we do a call Monday re Last Call?
- [Bug 25711] Not clear if keys persist across sessions
- Re: Should we do a call Monday re Last Call?
- Re: Should we do a call Monday re Last Call?
- Should we do a call Monday re Last Call?
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] extractable keys should be disabled by default
- [Bug 25721] New: extractable keys should be disabled by default
Wednesday, 14 May 2014
- [Bug 25718] New: Support RSA-OAEP with the SHA-2* family of algorithms in JWK
- [Bug 24827] Be clearer about the distinction between operations and methods
- [Bug 25717] New: Provide informative text noting when a parameter in an SPKI/PKCS8/JWK is ignored
- [Bug 23786] Please specify a mapping between WebCrypto AlgorithmIdentifiers and pkcs-1 ones
- [Bug 23786] Please specify a mapping between WebCrypto AlgorithmIdentifiers and pkcs-1 ones
- [Bug 23786] Please specify a mapping between WebCrypto AlgorithmIdentifiers and pkcs-1 ones
- [Bug 24827] Be clearer about the distinction between operations and methods
- [Bug 24827] Be clearer about the distinction between operations and methods
- [Bug 23786] Please specify a mapping between WebCrypto AlgorithmIdentifiers and pkcs-1 ones
- [Bug 25706] Incomplete Key Generation Definitions
- [Bug 25711] Not clear if keys persist across sessions
- [Bug 25710] No Key Deletion
- [Bug 25711] New: Not clear if keys persist across sessions
- [Bug 25710] New: No Key Deletion
- [Bug 25706] New: Incomplete Key Generation Definitions
Tuesday, 13 May 2014
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
Monday, 12 May 2014
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25659] AES-CBC mode does not describe concretely how padding is added
- [Bug 25659] AES-CBC mode does not describe concretely how padding is added
- [Bug 25661] New: Allow algorithms to be implemented "as if", rather than strict adherance
- [Bug 25659] AES-CBC mode does not describe concretely how padding is added
- [Bug 25659] AES-CBC mode does not describe concretely how padding is added
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- RE: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- RE: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- RE: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- [Bug 25387] BigInteger
- [Bug 25387] BigInteger
- [Bug 25390] Use [Exposed] in IDL
- [Bug 25390] Use [Exposed] in IDL
- [Bug 25658] Need normative reference for ArrayBufferView type
- [Bug 25388] Boolean arguments
- [Bug 25387] BigInteger
- [Bug 25659] New: AES-CBC mode does not describe concretely how padding is added
- [Bug 25436] Handling of CryptoOperationData needs to be defined
- [Bug 25626] Convert the various KeyAlgorithm interfaces into Dictionaries
- [Bug 25658] Need normative reference for ArrayBufferView type
- [Bug 25658] New: Need normative reference for ArrayBufferView type
- [Bug 23728] CryptoOperationData can be mutated during operation
- [Bug 23728] CryptoOperationData can be mutated during operation
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
Saturday, 10 May 2014
Friday, 9 May 2014
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- [Bug 25387] BigInteger
- [Bug 25431] Error names allow RSAES-PKCS1-v1_5 oracle attack against wrapped keys
- Re: [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- [W3C Web Crypto WG] Security considerations and recommended algorithms bug
- [Bug 25627] New: Indicate that Key objects have internal state, and that the attributes they expose are reflections of that internal state
- [Bug 25626] New: Convert the various KeyAlgorithm interfaces into Dictionaries
- [Bug 25625] New: Provide a better explanation for the (informative) table in Section 18.1
- [Bug 25624] New: Update Promise-using language to reflect the addition of Promises to ES6
- [Bug 25623] New: Typographic: Web IDL is two words, not one
- [Bug 25622] New: Use RangeError instead of QuotaExceededError
- [Bug 25621] New: Provide better explanation for the concerns of Section 6
- [Bug 25620] New: Provide informative text regarding the origin-based security model of the API
- [Bug 25619] New: Provide (non-normative) explanations for terminology like cryptographic provider
- [Bug 25618] New: Extensibility: Offer spec-blessed ways to extend the algorithms and curves, rather than monkey-patching the spec
Thursday, 8 May 2014
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] Need to advise authors about security considerations
- [Bug 25607] New: Need to advise authors about security considerations
Tuesday, 6 May 2014
- Re: Is the "Key" interface name too generic?
- Re: Is the "Key" interface name too generic?
- Re: Is the "Key" interface name too generic?
- Re: Is the "Key" interface name too generic?
- PROPOSAL: Moving from telecons to a more mailinglist/bugzilla-centric working style
- Minutes from the May 5th telecon
- Re: Is the "Key" interface name too generic?
- Re: Is the "Key" interface name too generic?
- [W3C Web Crypto] About Payment and Web Crypto intersection
- Re: Is the "Key" interface name too generic?
- [Bug 25577] New: The interface name "Key" is very generic
- [Bug 25571] New: Add JOSE mappings for RSA in A.1
- [Bug 25570] New: Need to register RS1 in Section 21.1
- [Bug 25569] New: Suggest adding recommended algorithms to Section 18.2