Hi,

Thank you all for reviewing the request.

I just wanted to inform that the PR to add the X25519 and Ed25519 into the WebCrytpo specification has been merged already.

https://github.com/w3c/webcrypto/pull/362#issuecomment-2519927404

On 2/12/24 3:11, Domenic Denicola wrote:
Thanks for taking the time to answer all my questions. LGTM1.

Please continue working on getting the spec PR merged, although I understand that's waiting on reviewers so is largely out of your control.

On Tue, Nov 26, 2024 at 6:12 PM Javier Fernandez <jfernan...@igalia.com> wrote:

    Hi.


    Javier, can you speak to whether there's web platform test
    coverage for the tricky issues that were discussed on the PR,
    e.g. the three listed in your last comment?


    First of all, the PR is to merge both X25519 and Ed25519
    algorithms. This intent is just for the X25519, since the Ed25519
    is still not ready and needs more spec work. We all think that
    this work can be done as part of the new Web Cryptography spec draft.

    The dertiveBits interop issue is the only one affecting the X25519
    algorithm. There were already tests, but I have added a few more
    as part of bug fixes on the different browsers (mostly Firefox and
    Safari). I'm pretty sure we have good coverage on this issue already.

    Let me use the email to clarify the other issues that were
    identified as part of the PR discussion. Regarding the small-order
    checks, I have added tests cases to cover the most important uses
    of small-order points. We could add more if we want to be exhaustive.

    Finally, the random EdDSA signatures is still not clear enough to
    define tests, IMHO. We had some in the past, which were useful to
    detect the interop issue with WebKit. However, since WebKit
    considers this feature mandatory, we have removed the tests that
    checked for a deterministic signature. The Secure Curves spec
    doesn't explicitly states that the signatures must be
    deterministic; it just refers to the  RFC8032 paper where the
    Ed25519 signing algorithm is specified. The CFRG has discussed
    this issue and they are considering to take on a -bis document to
    modify the Ed25519 algorithm, but we reached a consensus in the PR
    that we can merge the current text, registering the issues about
    small-order points and randomized signatures, and work on them as
    part of the Web Crypto spec draft.





-- You received this message because you are subscribed to the Google
    Groups "blink-dev" group.
    To unsubscribe from this group and stop receiving emails from it,
    send an email to blink-dev+unsubscr...@chromium.org.
    To view this discussion visit
    
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/335cdfd2-11f3-49ac-8bf4-3ed5ad9bab03%40igalia.com
    
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/335cdfd2-11f3-49ac-8bf4-3ed5ad9bab03%40igalia.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAM0wra-0QYqhqQc%3D5orxdE4pYQiRFpOybOzn8AmZQ-wB-E85fQ%40mail.gmail.com <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAM0wra-0QYqhqQc%3D5orxdE4pYQiRFpOybOzn8AmZQ-wB-E85fQ%40mail.gmail.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/803669d3-8f1d-4fcf-af35-1c81db1fcf38%40igalia.com.

Reply via email to