On Tue, 2016-04-05 at 12:49 -0400, John Dennis wrote:
> 
> If the API does not have documented behavior constraints then you can't 
> be causing a API breakage.

I think that's overstating the case a little.

Even if the behaviour is undocumented, if real applications are
depending on it in anything other than a completely crack-inspired
fashion then we shouldn't break them.

I speak of the general case, of course.

In *this* case, nobody's managed to offer any examples of where an
application might feed a valid PKCS#11 URI as a "nickname" to one of
these functions, and *depend* on the failure they currently get. Not
even as a wild hypothetical.

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to