Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Dirk Schulze

Am 27.07.2011 um 23:03 schrieb Darin Fisher:

> Perhaps related to this thread, shouldn't we be basing SVG animations off of 
> the same animation scheduler that drives requestAnimationFrame and soon CSS 
> animations (https://bugs.webkit.org/show_bug.cgi?id=64591)?  It seems less 
> than ideal to use a Timer.
I'd love to share as much animation timing stuff as possible!

Dirk

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Short commit-queue and EWS outage

2011-07-27 Thread Adam Barth
Amazon is performing some maintenance on the "feeder" machine that
vends jobs to the EWS and commit queue bots.  Supposedly the system
will be down for an hour from 1am PST to 2am PST tomorrow (in a couple
hours).  Hopefully nothing will explode.

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Darin Fisher
Perhaps related to this thread, shouldn't we be basing SVG animations off of
the same animation scheduler that drives requestAnimationFrame and soon CSS
animations (https://bugs.webkit.org/show_bug.cgi?id=64591)?  It seems less
than ideal to use a Timer.

-Darin


On Wed, Jul 27, 2011 at 11:14 AM, Scott Graham  wrote:

> Hi,
>
> When the Timer is fired for SMILTimeContainer to update animations, the
> elapsed time is calculated based on the client's currentTime().
>
> That elapsed time is passed into updateAnimations and is used most of the
> way "down".
>
> In some cases during the update though, SMILTimeContainer::elapsed() is
> re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged,
> createInstanceTimesFromSyncbase).
>
> This seems somewhat incorrect because it means that various parts of the
> animation will be updated with (slightly) different elapsed times than
> others. It also makes it impractical to use a debugger to step the code.
>
> Does anyone disagree that all updates should use the same elapsed time
> during the update? Or, in other words, is there any reason to re-get the
> current wallclock time during the update?
>
> Thanks,
> Scott
>
>
> ___
> webkit-dev mailing list
> webkit-dev@lists.webkit.org
> http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev
>
>
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Scott Graham
On Wed, Jul 27, 2011 at 12:15 PM, Simon Fraser wrote:

> On Jul 27, 2011, at 11:14 AM, Scott Graham wrote:
> > Does anyone disagree that all updates should use the same elapsed time
> during the update? Or, in other words, is there any reason to re-get the
> current wallclock time during the update?
>
> I think your analysis is correct. You should file a bug for this in
> bugs.webkit.org, and folks can review your proposed changes there.
>
>
Thanks, done: https://bugs.webkit.org/show_bug.cgi?id=65274

scott
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Simon Fraser
On Jul 27, 2011, at 11:14 AM, Scott Graham wrote:

> Hi,
> 
> When the Timer is fired for SMILTimeContainer to update animations, the 
> elapsed time is calculated based on the client's currentTime().
> 
> That elapsed time is passed into updateAnimations and is used most of the way 
> "down".
> 
> In some cases during the update though, SMILTimeContainer::elapsed() is 
> re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged, 
> createInstanceTimesFromSyncbase).
> 
> This seems somewhat incorrect because it means that various parts of the 
> animation will be updated with (slightly) different elapsed times than 
> others. It also makes it impractical to use a debugger to step the code.
> 
> Does anyone disagree that all updates should use the same elapsed time during 
> the update? Or, in other words, is there any reason to re-get the current 
> wallclock time during the update?

I think your analysis is correct. You should file a bug for this in 
bugs.webkit.org, and folks can review your proposed changes there.

Simon


___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Scott Graham
Hi,

When the Timer is fired for SMILTimeContainer to update animations, the
elapsed time is calculated based on the client's currentTime().

That elapsed time is passed into updateAnimations and is used most of the
way "down".

In some cases during the update though, SMILTimeContainer::elapsed() is
re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged,
createInstanceTimesFromSyncbase).

This seems somewhat incorrect because it means that various parts of the
animation will be updated with (slightly) different elapsed times than
others. It also makes it impractical to use a debugger to step the code.

Does anyone disagree that all updates should use the same elapsed time
during the update? Or, in other words, is there any reason to re-get the
current wallclock time during the update?

Thanks,
Scott
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Fwd: Re: [New DOM property] selectionDirection on HTMLInputElement and HTMLTextAreaElement

2011-07-27 Thread Ryosuke Niwa
-- Forwarded message --
From: "Ryosuke Niwa" 
Date: Jul 27, 2011 10:32 AM
Subject: Re: [New DOM property] selectionDirection on HTMLInputElement and
HTMLTextAreaElement
To: "Ryosuke Niwa" 
Cc: "Aryeh Gregor" , "WebKit Development" <
webkit-dev@lists.webkit.org>, "Tim Down" , "Ian Hixie" <
i...@hixie.ch>, "Ojan Vafai" 

Mozilla bug: https://bugzilla.mozilla.org/show_bug.cgi?id=674558

- Ryosuke
On Jul 14, 2011 5:46 PM, "Ryosuke Niwa"  wrote:
> Hi all,
>
> I have a patch to add selectionDirection property on HTMLInputElement and
> HTMLTextAreaElement on https://bugs.webkit.org/show_bug.cgi?id=60403.
>
> The purpose of this property is to let websites control base and extent of
> selection. The property has been added to the HTML5 spec section
> 4.10.20<
http://www.whatwg.org/specs/web-apps/current-work/multipage/association-of-controls-and-forms.html#textFieldSelection
>,
> and an extensive discussion about this
> feature<
http://lists.whatwg.org/pipermail/whatwg-whatwg.org/2011-January/029814.html
>
> has
> been done on whatwg. Given the discussion took place on whatwg and how
> simple this API is, I consider it to be a stable API.
>
> Best,
> Ryosuke Niwa
> Software Engineer
> Google Inc.
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Sam Weinig
I think we should let the spec mature a bit before diving in.

-Sam

On Jul 26, 2011, at 10:53 PM, Adam Barth wrote:

> Hi webkit-dev,
> 
> As some of you are probably aware, Mozilla is experimenting with
> exposing some basic cryptographic primitives to web applications:
> 
> https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest
> 
> I wanted to get a sense from the WebKit community about how interested
> we are in implementing this feature.  My sense is that this API is
> fairly early in it's lifecycle, so one perspective is that we should
> wait for Mozilla to experiment for a bit longer and revisit this
> question once the design is further along (e.g., submitted to the W3C
> standards process).
> 
> Another perspective is that there are some simple parts of the API
> that we should implement now, and we can grow into the more involved
> parts of the API as they mature.  For example, the CryptoHash
> interface can be implemented independently of the rest of the API and
> provides value by itself.
> 
> Thoughts?
> 
> Adam
> ___
> webkit-dev mailing list
> webkit-dev@lists.webkit.org
> http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Heads up : Qt port and its multimedia support.

2011-07-27 Thread Alexis Menard
Hello,

Just a small heads up on the multimedia support for the Qt port. At
the last webkit summit I've heard some Google folks a bit confused
about our multimedia story and I'm sure others are so here is the
story :

We had a first Phonon backend, abandoned and really far from feature
completion and far from working well : I removed it with
http://trac.webkit.org/changeset/89832 as we thought it was not good
idea to let it broken on the trunk.

Then we have a QtMultimedia media player (Qt Multimedia is a separate
add-on for Qt) that was added to the tree last year to provide a more
extensive API than Phonon and supporting more platforms (Symbian).
Unfortunately Qt Multimedia lacks of stability, the quality of the
backends is really heterogenous and they behaves differently. I felt
the support was built on unstable foundations so I decided it was not
good option either.

As a fun project, QtWebKit people decided to give a try on how the Qt
port could use the GStreamer backend of webkit maintained by our GTK
friends. Main changesets related :
http://trac.webkit.org/changeset/72184,
http://trac.webkit.org/changeset/83078.

I also did the same on Mac, and it is possible for the Qt port to the
QtKit media player maintained by Apple. Main changesets
http://trac.webkit.org/changeset/87312 and
http://trac.webkit.org/changeset/89617.

Both implementation work pretty well with Qt, supports more features
than we had with QtMultimedia, have better results in LayoutTests and
make us work closer to the other webkit devs -> only benefits :D
therefore after http://trac.webkit.org/changeset/91752 the GStreamer
media player is the default on Linux and QtKit the default media
player on Mac for the Qt port. On Windows and Symbian we still use
QtMultimedia media player for now.

Our Linux implementation is already covered by a bot so now the fellow
GStreamer media player contributors should watch the Qt bots when they
work on the media player. Unfortunately for our Apple friends we don't
have yet a Qt Mac bot, though we are working on making one ready for
build.webkit.org (we do have one running but not yet at the level to
be promoted to build.webkit.org) so I will watch carefully the stuff
going on the QtKit media player.

Anyway if you have any question on the multimedia support in Qt and if
you are unsure about a change that could affect QtWebKit in either
GStreamer and QtKit, CC me on a bug or reach me on IRC.

Thanks to Eric Carlson, Philippe Normand and others who helped me to
make all of this working.

Any questions?

-- 
Alexis Menard (darktears)
Software Engineer
INdT Recife Brazil
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Adam Barth
These sorts of questions are probably better discussed on the whatwg
mailing list (where there is currently a thread about DOMCrypt)
because they're general questions about the use cases and features set
of the API and not about WebKit's implementation (or
non-implementation) of the API.

Thanks for you interest.

Adam


On Wed, Jul 27, 2011 at 2:29 AM, Christoph Martens  wrote:
>
> Well, I think that makes sense... But not for me. I have the opinion that
> cloud-hosted keys aren't keys anymore - right?
> I mean, man-in-the-middle attacks are the 100% use case when it comes to
> encryption due to buggy DNS-protocol that can't be updated.
>
> I also think that this is kinda interesting when it comes to signing
> uploads or files from inside a WebApp.
> It makes sense to build a JavaScript API for hashing the values - so that
> you can transfer data via unencrypted connection - which isn't smart, but
> it should gain a low level of security depending on the algorithm.
> But I wouldn't trust the hoster if there are plaintext passwords stored on
> their servers. That's kinda php4 =/
>
> Do you know which algorithms are planned to be implemented? Are there
> twofish, blowfish or similar going to be included as well?
>
> __
> Christoph Martens
> JavaScript Engineer, Zynga Germany
> Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker
>
>
>
> Zynga Game Germany GmbH
> An der Welle 4
> 60322 Frankfurt, Germany
> cmart...@zynga.com
>
>
>
>
> On 7/27/11 10:11 AM, "Adam Barth"  wrote:
>
>>My sense is that the Mozilla folks want to start with the simple
>>building blocks first and then work up to more complicated things like
>>interacting with OS key stores and smart card readers.
>>
>>DOMCrypt is also useful for protecting data at rest, which isn't
>>something you can do with TLS.  For example, imagine that a web site
>>wants to store a bunch of sensitive data on the client.  The site can
>>encrypt the data using DOMCrypt and then keep the KeyID off-device
>>(e.g., in the cloud or in escrow).  Later, the site can reunite the
>>KeyID with the encrypted data on the client in order to decrypt.
>>
>>As a more concrete example of the above, consider a service like
>>LastPass that wants to store your passwords (encrypted) on the client
>>and never wants to touch your plaintext passwords on the server.
>>
>>These use cases all involve the public key encryption/decryption
>>functionality.  The hashing and MACing operations are somewhat lower
>>level building blocks, but they seem like an easier place to start.
>>
>>Adam
>>
>>
>>On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens 
>>wrote:
>>> Hey Adam,
>>>
>>> I thought it might make sense to let the user specify a private key file
>>> (e.g. an RSA-key) that is in the browsers KeyChain.
>>> Would that make sense to have it implemented in the DOMCryptAPI?
>>>
>>> Otherwise I can't see many use cases, because I think encryption on a
>>>high
>>> OSI layer just doesn't make sense for me.
>>> If someone is able to sniff SSL/TLS encrypted packages due to nulling he
>>> will also be able to collect enough generated data to see how the
>>>hashing
>>> on the Browser-side works and which one will be the next hash generated
>>>-
>>> thanks to cuda and ati stream.
>>> But that's just my personal opinion on that.
>>>
>>> Greets from Germany,
>>> Chris
>>>
>>> __
>>> Christoph Martens
>>> JavaScript Engineer, Zynga Germany
>>> Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker
>>>
>>>
>>>
>>> Zynga Game Germany GmbH
>>> An der Welle 4
>>> 60322 Frankfurt, Germany
>>> cmart...@zynga.com
>>>
>>>
>>>
>>>
>>> On 7/27/11 7:53 AM, "Adam Barth"  wrote:
>>>
Hi webkit-dev,

As some of you are probably aware, Mozilla is experimenting with
exposing some basic cryptographic primitives to web applications:

https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest

I wanted to get a sense from the WebKit community about how interested
we are in implementing this feature.  My sense is that this API is
fairly early in it's lifecycle, so one perspective is that we should
wait for Mozilla to experiment for a bit longer and revisit this
question once the design is further along (e.g., submitted to the W3C
standards process).

Another perspective is that there are some simple parts of the API
that we should implement now, and we can grow into the more involved
parts of the API as they mature.  For example, the CryptoHash
interface can be implemented independently of the rest of the API and
provides value by itself.

Thoughts?

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev
>>>
>>>
>
>
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.we

Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Christoph Martens

Well, I think that makes sense... But not for me. I have the opinion that
cloud-hosted keys aren't keys anymore - right?
I mean, man-in-the-middle attacks are the 100% use case when it comes to
encryption due to buggy DNS-protocol that can't be updated.

I also think that this is kinda interesting when it comes to signing
uploads or files from inside a WebApp.
It makes sense to build a JavaScript API for hashing the values - so that
you can transfer data via unencrypted connection - which isn't smart, but
it should gain a low level of security depending on the algorithm.
But I wouldn't trust the hoster if there are plaintext passwords stored on
their servers. That's kinda php4 =/

Do you know which algorithms are planned to be implemented? Are there
twofish, blowfish or similar going to be included as well?

__
Christoph Martens
JavaScript Engineer, Zynga Germany
Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



Zynga Game Germany GmbH
An der Welle 4
60322 Frankfurt, Germany
cmart...@zynga.com




On 7/27/11 10:11 AM, "Adam Barth"  wrote:

>My sense is that the Mozilla folks want to start with the simple
>building blocks first and then work up to more complicated things like
>interacting with OS key stores and smart card readers.
>
>DOMCrypt is also useful for protecting data at rest, which isn't
>something you can do with TLS.  For example, imagine that a web site
>wants to store a bunch of sensitive data on the client.  The site can
>encrypt the data using DOMCrypt and then keep the KeyID off-device
>(e.g., in the cloud or in escrow).  Later, the site can reunite the
>KeyID with the encrypted data on the client in order to decrypt.
>
>As a more concrete example of the above, consider a service like
>LastPass that wants to store your passwords (encrypted) on the client
>and never wants to touch your plaintext passwords on the server.
>
>These use cases all involve the public key encryption/decryption
>functionality.  The hashing and MACing operations are somewhat lower
>level building blocks, but they seem like an easier place to start.
>
>Adam
>
>
>On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens 
>wrote:
>> Hey Adam,
>>
>> I thought it might make sense to let the user specify a private key file
>> (e.g. an RSA-key) that is in the browsers KeyChain.
>> Would that make sense to have it implemented in the DOMCryptAPI?
>>
>> Otherwise I can't see many use cases, because I think encryption on a
>>high
>> OSI layer just doesn't make sense for me.
>> If someone is able to sniff SSL/TLS encrypted packages due to nulling he
>> will also be able to collect enough generated data to see how the
>>hashing
>> on the Browser-side works and which one will be the next hash generated
>>-
>> thanks to cuda and ati stream.
>> But that's just my personal opinion on that.
>>
>> Greets from Germany,
>> Chris
>>
>> __
>> Christoph Martens
>> JavaScript Engineer, Zynga Germany
>> Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker
>>
>>
>>
>> Zynga Game Germany GmbH
>> An der Welle 4
>> 60322 Frankfurt, Germany
>> cmart...@zynga.com
>>
>>
>>
>>
>> On 7/27/11 7:53 AM, "Adam Barth"  wrote:
>>
>>>Hi webkit-dev,
>>>
>>>As some of you are probably aware, Mozilla is experimenting with
>>>exposing some basic cryptographic primitives to web applications:
>>>
>>>https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest
>>>
>>>I wanted to get a sense from the WebKit community about how interested
>>>we are in implementing this feature.  My sense is that this API is
>>>fairly early in it's lifecycle, so one perspective is that we should
>>>wait for Mozilla to experiment for a bit longer and revisit this
>>>question once the design is further along (e.g., submitted to the W3C
>>>standards process).
>>>
>>>Another perspective is that there are some simple parts of the API
>>>that we should implement now, and we can grow into the more involved
>>>parts of the API as they mature.  For example, the CryptoHash
>>>interface can be implemented independently of the rest of the API and
>>>provides value by itself.
>>>
>>>Thoughts?
>>>
>>>Adam
>>>___
>>>webkit-dev mailing list
>>>webkit-dev@lists.webkit.org
>>>http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev
>>
>>

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Adam Barth
My sense is that the Mozilla folks want to start with the simple
building blocks first and then work up to more complicated things like
interacting with OS key stores and smart card readers.

DOMCrypt is also useful for protecting data at rest, which isn't
something you can do with TLS.  For example, imagine that a web site
wants to store a bunch of sensitive data on the client.  The site can
encrypt the data using DOMCrypt and then keep the KeyID off-device
(e.g., in the cloud or in escrow).  Later, the site can reunite the
KeyID with the encrypted data on the client in order to decrypt.

As a more concrete example of the above, consider a service like
LastPass that wants to store your passwords (encrypted) on the client
and never wants to touch your plaintext passwords on the server.

These use cases all involve the public key encryption/decryption
functionality.  The hashing and MACing operations are somewhat lower
level building blocks, but they seem like an easier place to start.

Adam


On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens  wrote:
> Hey Adam,
>
> I thought it might make sense to let the user specify a private key file
> (e.g. an RSA-key) that is in the browsers KeyChain.
> Would that make sense to have it implemented in the DOMCryptAPI?
>
> Otherwise I can't see many use cases, because I think encryption on a high
> OSI layer just doesn't make sense for me.
> If someone is able to sniff SSL/TLS encrypted packages due to nulling he
> will also be able to collect enough generated data to see how the hashing
> on the Browser-side works and which one will be the next hash generated -
> thanks to cuda and ati stream.
> But that's just my personal opinion on that.
>
> Greets from Germany,
> Chris
>
> __
> Christoph Martens
> JavaScript Engineer, Zynga Germany
> Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker
>
>
>
> Zynga Game Germany GmbH
> An der Welle 4
> 60322 Frankfurt, Germany
> cmart...@zynga.com
>
>
>
>
> On 7/27/11 7:53 AM, "Adam Barth"  wrote:
>
>>Hi webkit-dev,
>>
>>As some of you are probably aware, Mozilla is experimenting with
>>exposing some basic cryptographic primitives to web applications:
>>
>>https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest
>>
>>I wanted to get a sense from the WebKit community about how interested
>>we are in implementing this feature.  My sense is that this API is
>>fairly early in it's lifecycle, so one perspective is that we should
>>wait for Mozilla to experiment for a bit longer and revisit this
>>question once the design is further along (e.g., submitted to the W3C
>>standards process).
>>
>>Another perspective is that there are some simple parts of the API
>>that we should implement now, and we can grow into the more involved
>>parts of the API as they mature.  For example, the CryptoHash
>>interface can be implemented independently of the rest of the API and
>>provides value by itself.
>>
>>Thoughts?
>>
>>Adam
>>___
>>webkit-dev mailing list
>>webkit-dev@lists.webkit.org
>>http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev
>
>
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Christoph Martens
Hey Adam,

I thought it might make sense to let the user specify a private key file
(e.g. an RSA-key) that is in the browsers KeyChain.
Would that make sense to have it implemented in the DOMCryptAPI?

Otherwise I can't see many use cases, because I think encryption on a high
OSI layer just doesn't make sense for me.
If someone is able to sniff SSL/TLS encrypted packages due to nulling he
will also be able to collect enough generated data to see how the hashing
on the Browser-side works and which one will be the next hash generated -
thanks to cuda and ati stream.
But that's just my personal opinion on that.

Greets from Germany,
Chris

__
Christoph Martens
JavaScript Engineer, Zynga Germany
Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



Zynga Game Germany GmbH
An der Welle 4
60322 Frankfurt, Germany
cmart...@zynga.com




On 7/27/11 7:53 AM, "Adam Barth"  wrote:

>Hi webkit-dev,
>
>As some of you are probably aware, Mozilla is experimenting with
>exposing some basic cryptographic primitives to web applications:
>
>https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest
>
>I wanted to get a sense from the WebKit community about how interested
>we are in implementing this feature.  My sense is that this API is
>fairly early in it's lifecycle, so one perspective is that we should
>wait for Mozilla to experiment for a bit longer and revisit this
>question once the design is further along (e.g., submitted to the W3C
>standards process).
>
>Another perspective is that there are some simple parts of the API
>that we should implement now, and we can grow into the more involved
>parts of the API as they mature.  For example, the CryptoHash
>interface can be implemented independently of the rest of the API and
>provides value by itself.
>
>Thoughts?
>
>Adam
>___
>webkit-dev mailing list
>webkit-dev@lists.webkit.org
>http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev