"Jean-Marc Desperrier" wrote:
> I notice the committed code extracts the generated shared symmetric
> key up to the javascript level, so takes no real advantage from
> having generated it inside NSS (I'd expect it instead to leave
> the AES256 key inside NSS and just get back the handle to it to
> encrypt what it needs later. It seems they believe they *must* be
> able to extract the key, but I don't really understand why).

This was done this way because of the desire to change the JavaScript parts of 
Sync as little as possible. The kind of improvement you described above will be 
made to resolve Bug 443386 and/or Bug 638966. 

> BTW, it's a bit disappointing to see the javascript so entangled with
> the specificities of J-PAKE, when the P11 layer below maps it to
> generic PK11_KeyGenWithTemplate / PK11_DeriveWithTemplate /
> PK11_Derive operations.

We don't intend to expose J-PAKE to anything except Sync. The resolution of Bug 
443386 will change that interface in a non-backward-compatible way (except for 
Sync, which will get modified to use the new interface in lockstep). Also, I am 
hoping to move *all* of the lower-level Sync crypto stuff from Javascript into 
its own native-code implementation exposed with more Sync-specific APIs. See 
Bug 636309.

I am very interested in what you want to use SRP for (especially other than 
Sync). Maybe there is some way to get your SRP-based ideas working in Firefox 
without waiting around for us to take some action on it. Lets start a new 
thread (privately or on this mailing list) about that.

- Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to