Benjamin Smedberg wrote:
> I have no particular opinion about whether this is a good idea for
> NSS. I do think that we should not do this for NSPR unless we
> decide to remove support for binary XPCOM components in Firefox
> (per the ongoing discussion in dev.planning). Many of our XPCOM
> code patterns assume/require use of NSPR, and I don't think it's
> the right time to try changing that.

NSPR is not nearly as big as NSS and we use a large percentage of NSPR 
functionality. So, this kind of "dead code" elimination for NSPR would not 
necessarily be a justifiable win considering potential compatibility pain, like 
it would be for NSS. And also, I don't know (yet) of any startup time, 
correctness, or security wins from doing this for NSPR, like I do know for NSS.

Even if we link NSS and/or NSPR into libxul, we can easily create forwarder 
DLLs with the old DLL names that forward calls to the retained functions in 
libxul, so that any binary components that link to NSS/NSPR and only use the 
NSS/NSPR functions we retain will work correctly.


> > 3. Help out with the DOMCrypt effort that ddahl is leading, which
> > will create a W3C-standardized Javascript API for cryptography for
> > *web* applications. I suspect it would be non-trivial, but
> > possible, to expose the DOMCrypt API to extensions. I suspect that
> > this would replace APIs from #1 and #2 above.
> I tend to think that extensions would get this basically "for free"
> because they have access to the DOM.

It is likely that DOMCrypt will base part of its key management system on a 
same-origin policy, and that origin-based key management policy is likely to be 
inappropriate for a bunch of applications. Also, I do not know how JetPack 
(Addon SDK) deals with any "origin", and I bet there will need to be some 
new/different glue to get DOMCrypt to fit into the JetPack model.

- Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to