--- a/spec/Overview.html Mon Dec 03 17:47:03 2012 -0800
+++ b/spec/Overview.html Mon Dec 03 17:54:56 2012 -0800
@@ -145,7 +145,7 @@
<div id="toc">
<h2>Table of Contents</h2>
- <div class="toc"><ul><li><a href="#introduction">1. Introduction</a></li><li><a href="#use-cases">2. Use Cases</a><ul><li><a href="#multifactor-authentication">2.1. Multi-factor Authentication</a></li><li><a href="#protected-document">2.2. Protected Document Exchange</a></li><li><a href="#cloud-storage">2.3. Cloud Storage</a></li><li><a href="#document-signing">2.4. Document Signing</a></li><li><a href="#data-integrity-protection">2.5. Data Integrity Protection</a></li><li><a href="#secure-messaging">2.6. Secure Messaging</a></li><li><a href="#jose">2.7. Javascript Object Signing and Encryption (JOSE)</a></li></ul></li><li><a href="#conformance">3. Conformance</a></li><li><a href="#scope">4. Scope</a><ul><li><a href="#scope-abstraction">4.1. Level of abstraction</a></li><li><a href="#scope-algorithms">4.2. Cryptographic algorithms</a></li><li><a href="#scope-operations">4.3. Operations</a></li><li><a href="#scope-out-of-scope">4.4. Out of scope</a></li></ul></li><li><a href="#security">5. Security considerations</a><ul><li><a href="#security-implementers">5.1. Security considerations for implementers</a></li><li><a href="#security-developers">5.2. Security considerations for developers</a></li></ul></li><li><a href="#privacy">6. Privacy considerations</a></li><li><a href="#dependencies">7. Dependencies</a></li><li><a href="#terminology">8. Terminology</a></li><li><a href="#RandomSource-interface">9. RandomSource interface</a><ul><li><a href="#RandomSource-description">9.1. Description</a></li><li><a href="#RandomSource-interface-methods">9.2. Methods and Parameters</a><ul><li><a href="#RandomSource-method-getRandomValues">9.2.1. The getRandomValues method</a></li></ul></li></ul></li><li><a href="#algorithm-dictionary">10. Algorithm dictionary</a><ul><li><a href="#algorithm-dictionary-members">10.1. Algorithm Dictionary Members</a></li></ul></li><li><a href="#key-interface">11. Key interface</a><ul><li><a href="#key-interface-description">11.1. Description</a></li><li><a href="#key-interface-members">11.2. Key interface members</a></li><li><a href="#key-interface-clone">11.3. Structured clone algorithm</a></li></ul></li><li><a href="#cryptooperation-interface">12. CryptoOperation interface</a><ul><li><a href="#CryptoOperation-states">12.1. CryptoOperation states</a></li><li><a href="#cryptooperation-task-source">12.2. The CryptoOperation Task Source</a></li><li><a href="#cryptooperation-events">12.3. Event Handler Attributes</a></li><li><a href="#CryptoOperation-attributes">12.4. Attributes</a></li><li><a href="#CryptoOperation-methods">12.5. Methods and Parameters</a><ul><li><a href="#CryptoOperation-method-init">12.5.1. The init method</a></li><li><a href="#CryptoOperation-method-processData">12.5.2. The processData(ArrayBufferView buffer) method</a></li><li><a href="#CryptoOperation-method-complete">12.5.3. The complete() method</a></li><li><a href="#CryptoOperation-method-abort">12.5.4. The abort() method</a></li></ul></li></ul></li><li><a href="#KeyOperation-interface">13. KeyOperation interface</a></li><li><a href="#KeyGenerator-interface">14. KeyGenerator interface</a></li><li><a href="#KeyDeriver-interface">15. KeyDeriver interface</a></li><li><a href="#KeyImporter-interface">16. KeyImporter interface</a></li><li><a href="#KeyExporter-interface">17. KeyExporter interface</a></li><li><a href="#crypto-interface">18. Crypto interface</a><ul><li><a href="#crypto-interface-methods">18.1. Methods and Parameters</a><ul><li><a href="#Crypto-method-createEncrypter">18.1.1. The createEncrypter method</a></li><li><a href="#Crypto-method-createDecrypter">18.1.2. The createDecrypter method</a></li><li><a href="#Crypto-method-createSigner">18.1.3. The createSigner method</a></li><li><a href="#Crypto-method-createVerifier">18.1.4. The createVerifier method</a></li><li><a href="#Crypto-method-createDigester">18.1.5. The createDigester method</a></li><li><a href="#Crypto-method-createKeyGenerator">18.1.6. The createKeyGenerator method</a></li><li><a href="#Crypto-method-createKeyDeriver">18.1.7. The createKeyDeriver method</a></li><li><a href="#Crypto-method-createKeyImporter">18.1.8. The createKeyImporter method</a></li><li><a href="#Crypto-method-createKeyExporter">18.1.9. The createKeyExporter method</a></li></ul></li></ul></li><li><a href="#WorkerCrypto-interface">19. WorkerCrypto interface</a><ul><li><a href="#WorkerCrypto-description">19.1. Description</a></li></ul></li><li><a href="#big-integer">20. BigInteger</a></li><li><a href="#keypair">21. KeyPair</a></li><li><a href="#named-curve">22. NamedCurve</a></li><li><a href="#ec-point">23. ECPoint</a></li><li><a href="#key-discovery">24. Key Discovery</a></li><li><a href="#algorithms">25. Algorithms</a><ul><li><a href="#recommended-algorithms">25.1. Recommended algorithms</a></li><li><a href="#defining-an-algorithm">25.2. Defining an algorithm</a><ul><li><a href="#recognized-algorithm-name">25.2.1. Recognized algorithm name</a></li><li><a href="#supported-operations">25.2.2. Supported operations</a></li><li><a href="#algorithm-specific-params">25.2.3. Algorithm-specific parameters</a></li><li><a href="#algorithm-result">25.2.4. Algorithm results</a></li><li><a href="#algorithm-alias">25.2.5. Algorithm aliases</a></li></ul></li><li><a href="#rsaes-pkcs1">25.3. RSAES-PKCS1-v1_5</a><ul><li><a href="#rsaes-pkcs1-description">25.3.1. Description</a></li><li><a href="#rsaes-pkcs1-registration">25.3.2. Registration</a></li><li><a href="#RsaKeyGenParams-dictionary">25.3.3. RsaKeyGenParams dictionary</a></li><li><a href="#rsaes-pkcs1-operations">25.3.4. Operations</a></li></ul></li><li><a href="#rsassa-pkcs1">25.4. RSASSA-PKCS1-v1_5</a><ul><li><a href="#rsassa-pkcs1-description">25.4.1. Description</a></li><li><a href="#rsassa-pkcs1-registration">25.4.2. Registration</a></li><li><a href="#RsaSsaParams-dictionary">25.4.3. RsaSsaParams dictionary</a></li><li><a href="#rsassa-pkcs1-operations">25.4.4. Operations</a></li></ul></li><li><a href="#rsa-pss">25.5. RSA-PSS</a><ul><li><a href="#rsa-pss-description">25.5.1. Description</a></li><li><a href="#rsa-pss-registration">25.5.2. Registration</a></li><li><a href="#rsa-pss-params">25.5.3. RsaPssParams dictionary</a></li><li><a href="#rsa-pss-operations">25.5.4. Operations</a></li></ul></li><li><a href="#rsa-oaep">25.6. RSA-OAEP</a><ul><li><a href="#rsa-oaep-description">25.6.1. Description</a></li><li><a href="#rsa-oaep-registration">25.6.2. Registration</a></li><li><a href="#rsa-oaep-params">25.6.3. RsaOaepParams dictionary</a></li><li><a href="#rsa-oaep-operations">25.6.4. Operations</a></li></ul></li><li><a href="#ecdsa">25.7. ECDSA</a><ul><li><a href="#ecdsa-description">25.7.1. Description</a></li><li><a href="#ecdsa-registration">25.7.2. Registration</a></li><li><a href="#EcdsaParams-dictionary">25.7.3. EcdsaParams dictionary</a></li><li><a href="#EcKeyGenParams-dictionary">25.7.4. EcKeyGenParams dictionary</a></li><li><a href="#ecdsa-operations">25.7.5. Operations</a></li></ul></li><li><a href="#ecdh">25.8. ECDH</a><ul><li><a href="#ecdh-description">25.8.1. Description</a></li><li><a href="#ecdh-registration">25.8.2. Registration</a></li><li><a href="#dh-EcdhKeyDeriveParams">25.8.3. EcdhKeyDeriveParams dictionary</a></li><li><a href="#ecdh-operations">25.8.4. Operations</a></li></ul></li><li><a href="#aes-ctr">25.9. AES-CTR</a><ul><li><a href="#aes-ctr-description">25.9.1. Description</a></li><li><a href="#aes-ctr-registration">25.9.2. Registration</a></li><li><a href="#aes-ctr-params">25.9.3. AesCtrParams dictionary</a></li><li><a href="#aes-keygen-params">25.9.4. AesKeyGenParams dictionary</a></li><li><a href="#aes-ctr-operations">25.9.5. Operations</a></li></ul></li><li><a href="#aes-cbc">25.10. AES-CBC</a><ul><li><a href="#aes-cbc-description">25.10.1. Description</a></li><li><a href="#aes-cbc-registration">25.10.2. Registration</a></li><li><a href="#aes-cbc-params">25.10.3. AesCbcParams dictionary</a></li><li><a href="#aes-cbc-operations">25.10.4. Operations</a></li></ul></li><li><a href="#aes-gcm">25.11. AES-GCM</a><ul><li><a href="#aes-gcm-description">25.11.1. Description</a></li><li><a href="#aes-gcm-registration">25.11.2. Registration</a></li><li><a href="#aes-gcm-params">25.11.3. AesGcmParams dictionary</a></li><li><a href="#aes-gcm-operations">25.11.4. Operations</a></li></ul></li><li><a href="#hmac">25.12. HMAC</a><ul><li><a href="#hmac-description">25.12.1. Description</a></li><li><a href="#hmac-registration">25.12.2. Registration</a></li><li><a href="#hmac-params">25.12.3. HmacParams dictionary</a></li><li><a href="#hmac-operations">25.12.4. Operations</a></li></ul></li><li><a href="#dh">25.13. Diffie-Hellman</a><ul><li><a href="#dh-description">25.13.1. Description</a></li><li><a href="#dh-registration">25.13.2. Registration</a></li><li><a href="#dh-DhKeyGenParams">25.13.3. DhKeyGenParams dictionary</a></li><li><a href="#dh-DhKeyDeriveParams">25.13.4. DhKeyDeriveParams dictionary</a></li><li><a href="#dh-operations">25.13.5. Operations</a></li></ul></li><li><a href="#sha">25.14. SHA</a><ul><li><a href="#sha-description">25.14.1. Description</a></li><li><a href="#sha-registration">25.14.2. Registration</a></li><li><a href="#sha-operations">25.14.3. Operations</a></li></ul></li><li><a href="#pbkdf2">25.15. PBKDF2</a><ul><li><a href="#pbkdf2-description">25.15.1. Description</a></li><li><a href="#pbkdf2-registration">25.15.2. Registration</a></li><li><a href="#pbkdf2-params">25.15.3. Pbkdf2Params dictionary</a></li><li><a href="#pbkdf2-operations">25.15.4. Operations</a></li></ul></li></ul></li><li><a href="#algorithm-normalizing-rules">26. Algorithm normalizing rules</a></li><li><a href="#examples-section">27. JavaScript Example Code</a><ul><li><a href="#examples-signing">27.1. Generate a signing key pair, sign some data</a></li><li><a href="#examples-symmetric-encryption">27.2. Symmetric Encryption</a></li></ul></li><li><a href="#acknowledgements-section">28. Acknowledgements</a></li><li><a href="#references">29. References</a><ul><li><a href="#normative-references">29.1. Normative References</a></li><li><a href="#informative-references">29.2. Informative References</a></li></ul></li></ul></div>
+ <div class="toc"><ul><li><a href="#introduction">1. Introduction</a></li><li><a href="#use-cases">2. Use Cases</a><ul><li><a href="#multifactor-authentication">2.1. Multi-factor Authentication</a></li><li><a href="#protected-document">2.2. Protected Document Exchange</a></li><li><a href="#cloud-storage">2.3. Cloud Storage</a></li><li><a href="#document-signing">2.4. Document Signing</a></li><li><a href="#data-integrity-protection">2.5. Data Integrity Protection</a></li><li><a href="#secure-messaging">2.6. Secure Messaging</a></li><li><a href="#jose">2.7. Javascript Object Signing and Encryption (JOSE)</a></li></ul></li><li><a href="#conformance">3. Conformance</a></li><li><a href="#scope">4. Scope</a><ul><li><a href="#scope-abstraction">4.1. Level of abstraction</a></li><li><a href="#scope-algorithms">4.2. Cryptographic algorithms</a></li><li><a href="#scope-operations">4.3. Operations</a></li><li><a href="#scope-out-of-scope">4.4. Out of scope</a></li></ul></li><li><a href="#security">5. Security considerations</a><ul><li><a href="#security-implementers">5.1. Security considerations for implementers</a></li><li><a href="#security-developers">5.2. Security considerations for developers</a></li></ul></li><li><a href="#privacy">6. Privacy considerations</a></li><li><a href="#dependencies">7. Dependencies</a></li><li><a href="#terminology">8. Terminology</a></li><li><a href="#RandomSource-interface">9. RandomSource interface</a><ul><li><a href="#RandomSource-description">9.1. Description</a></li><li><a href="#RandomSource-interface-methods">9.2. Methods and Parameters</a><ul><li><a href="#RandomSource-method-getRandomValues">9.2.1. The getRandomValues method</a></li></ul></li></ul></li><li><a href="#algorithm-dictionary">10. Algorithm dictionary</a><ul><li><a href="#algorithm-dictionary-members">10.1. Algorithm Dictionary Members</a></li></ul></li><li><a href="#key-interface">11. Key interface</a><ul><li><a href="#key-interface-description">11.1. Description</a></li><li><a href="#key-interface-members">11.2. Key interface members</a></li><li><a href="#key-interface-clone">11.3. Structured clone algorithm</a></li></ul></li><li><a href="#cryptooperation-interface">12. CryptoOperation interface</a><ul><li><a href="#CryptoOperation-states">12.1. CryptoOperation states</a></li><li><a href="#cryptooperation-task-source">12.2. The CryptoOperation Task Source</a></li><li><a href="#cryptooperation-events">12.3. Event Handler Attributes</a></li><li><a href="#CryptoOperation-attributes">12.4. Attributes</a></li><li><a href="#CryptoOperation-methods">12.5. Methods and Parameters</a><ul><li><a href="#CryptoOperation-method-init">12.5.1. The init method</a></li><li><a href="#CryptoOperation-method-processData">12.5.2. The processData(ArrayBufferView buffer) method</a></li><li><a href="#CryptoOperation-method-complete">12.5.3. The complete() method</a></li><li><a href="#CryptoOperation-method-abort">12.5.4. The abort() method</a></li></ul></li></ul></li><li><a href="#KeyOperation-interface">13. KeyOperation interface</a></li><li><a href="#KeyGenerator-interface">14. KeyGenerator interface</a></li><li><a href="#KeyDeriver-interface">15. KeyDeriver interface</a></li><li><a href="#KeyImporter-interface">16. KeyImporter interface</a></li><li><a href="#KeyExporter-interface">17. KeyExporter interface</a></li><li><a href="#crypto-interface">18. Crypto interface</a><ul><li><a href="#crypto-interface-methods">18.1. Methods and Parameters</a><ul><li><a href="#Crypto-method-createEncrypter">18.1.1. The createEncrypter method</a></li><li><a href="#Crypto-method-createDecrypter">18.1.2. The createDecrypter method</a></li><li><a href="#Crypto-method-createSigner">18.1.3. The createSigner method</a></li><li><a href="#Crypto-method-createVerifier">18.1.4. The createVerifier method</a></li><li><a href="#Crypto-method-createDigester">18.1.5. The createDigester method</a></li><li><a href="#Crypto-method-createKeyGenerator">18.1.6. The createKeyGenerator method</a></li><li><a href="#Crypto-method-createKeyDeriver">18.1.7. The createKeyDeriver method</a></li><li><a href="#Crypto-method-createKeyImporter">18.1.8. The createKeyImporter method</a></li><li><a href="#Crypto-method-createKeyExporter">18.1.9. The createKeyExporter method</a></li></ul></li></ul></li><li><a href="#WorkerCrypto-interface">19. WorkerCrypto interface</a><ul><li><a href="#WorkerCrypto-description">19.1. Description</a></li></ul></li><li><a href="#big-integer">20. BigInteger</a></li><li><a href="#keypair">21. KeyPair</a></li><li><a href="#key-discovery">22. Key Discovery</a></li><li><a href="#algorithms">23. Algorithms</a><ul><li><a href="#recommended-algorithms">23.1. Recommended algorithms</a></li><li><a href="#defining-an-algorithm">23.2. Defining an algorithm</a><ul><li><a href="#recognized-algorithm-name">23.2.1. Recognized algorithm name</a></li><li><a href="#supported-operations">23.2.2. Supported operations</a></li><li><a href="#algorithm-specific-params">23.2.3. Algorithm-specific parameters</a></li><li><a href="#algorithm-result">23.2.4. Algorithm results</a></li><li><a href="#algorithm-alias">23.2.5. Algorithm aliases</a></li></ul></li><li><a href="#rsaes-pkcs1">23.3. RSAES-PKCS1-v1_5</a><ul><li><a href="#rsaes-pkcs1-description">23.3.1. Description</a></li><li><a href="#rsaes-pkcs1-registration">23.3.2. Registration</a></li><li><a href="#RsaKeyGenParams-dictionary">23.3.3. RsaKeyGenParams dictionary</a></li><li><a href="#rsaes-pkcs1-operations">23.3.4. Operations</a></li></ul></li><li><a href="#rsassa-pkcs1">23.4. RSASSA-PKCS1-v1_5</a><ul><li><a href="#rsassa-pkcs1-description">23.4.1. Description</a></li><li><a href="#rsassa-pkcs1-registration">23.4.2. Registration</a></li><li><a href="#RsaSsaParams-dictionary">23.4.3. RsaSsaParams dictionary</a></li><li><a href="#rsassa-pkcs1-operations">23.4.4. Operations</a></li></ul></li><li><a href="#rsa-pss">23.5. RSA-PSS</a><ul><li><a href="#rsa-pss-description">23.5.1. Description</a></li><li><a href="#rsa-pss-registration">23.5.2. Registration</a></li><li><a href="#rsa-pss-params">23.5.3. RsaPssParams dictionary</a></li><li><a href="#rsa-pss-operations">23.5.4. Operations</a></li></ul></li><li><a href="#rsa-oaep">23.6. RSA-OAEP</a><ul><li><a href="#rsa-oaep-description">23.6.1. Description</a></li><li><a href="#rsa-oaep-registration">23.6.2. Registration</a></li><li><a href="#rsa-oaep-params">23.6.3. RsaOaepParams dictionary</a></li><li><a href="#rsa-oaep-operations">23.6.4. Operations</a></li></ul></li><li><a href="#ecdsa">23.7. ECDSA</a><ul><li><a href="#ecdsa-description">23.7.1. Description</a></li><li><a href="#ecdsa-registration">23.7.2. Registration</a></li><li><a href="#EcdsaParams-dictionary">23.7.3. EcdsaParams dictionary</a></li><li><a href="#EcKeyGenParams-dictionary">23.7.4. EcKeyGenParams dictionary</a></li><li><a href="#ecdsa-operations">23.7.5. Operations</a></li></ul></li><li><a href="#ecdh">23.8. ECDH</a><ul><li><a href="#ecdh-description">23.8.1. Description</a></li><li><a href="#ecdh-registration">23.8.2. Registration</a></li><li><a href="#dh-EcdhKeyDeriveParams">23.8.3. EcdhKeyDeriveParams dictionary</a></li><li><a href="#ecdh-operations">23.8.4. Operations</a></li></ul></li><li><a href="#aes-ctr">23.9. AES-CTR</a><ul><li><a href="#aes-ctr-description">23.9.1. Description</a></li><li><a href="#aes-ctr-registration">23.9.2. Registration</a></li><li><a href="#aes-ctr-params">23.9.3. AesCtrParams dictionary</a></li><li><a href="#aes-keygen-params">23.9.4. AesKeyGenParams dictionary</a></li><li><a href="#aes-ctr-operations">23.9.5. Operations</a></li></ul></li><li><a href="#aes-cbc">23.10. AES-CBC</a><ul><li><a href="#aes-cbc-description">23.10.1. Description</a></li><li><a href="#aes-cbc-registration">23.10.2. Registration</a></li><li><a href="#aes-cbc-params">23.10.3. AesCbcParams dictionary</a></li><li><a href="#aes-cbc-operations">23.10.4. Operations</a></li></ul></li><li><a href="#aes-gcm">23.11. AES-GCM</a><ul><li><a href="#aes-gcm-description">23.11.1. Description</a></li><li><a href="#aes-gcm-registration">23.11.2. Registration</a></li><li><a href="#aes-gcm-params">23.11.3. AesGcmParams dictionary</a></li><li><a href="#aes-gcm-operations">23.11.4. Operations</a></li></ul></li><li><a href="#hmac">23.12. HMAC</a><ul><li><a href="#hmac-description">23.12.1. Description</a></li><li><a href="#hmac-registration">23.12.2. Registration</a></li><li><a href="#hmac-params">23.12.3. HmacParams dictionary</a></li><li><a href="#hmac-operations">23.12.4. Operations</a></li></ul></li><li><a href="#dh">23.13. Diffie-Hellman</a><ul><li><a href="#dh-description">23.13.1. Description</a></li><li><a href="#dh-registration">23.13.2. Registration</a></li><li><a href="#dh-DhKeyGenParams">23.13.3. DhKeyGenParams dictionary</a></li><li><a href="#dh-DhKeyDeriveParams">23.13.4. DhKeyDeriveParams dictionary</a></li><li><a href="#dh-operations">23.13.5. Operations</a></li></ul></li><li><a href="#sha">23.14. SHA</a><ul><li><a href="#sha-description">23.14.1. Description</a></li><li><a href="#sha-registration">23.14.2. Registration</a></li><li><a href="#sha-operations">23.14.3. Operations</a></li></ul></li><li><a href="#pbkdf2">23.15. PBKDF2</a><ul><li><a href="#pbkdf2-description">23.15.1. Description</a></li><li><a href="#pbkdf2-registration">23.15.2. Registration</a></li><li><a href="#pbkdf2-params">23.15.3. Pbkdf2Params dictionary</a></li><li><a href="#pbkdf2-operations">23.15.4. Operations</a></li></ul></li></ul></li><li><a href="#algorithm-normalizing-rules">24. Algorithm normalizing rules</a></li><li><a href="#examples-section">25. JavaScript Example Code</a><ul><li><a href="#examples-signing">25.1. Generate a signing key pair, sign some data</a></li><li><a href="#examples-symmetric-encryption">25.2. Symmetric Encryption</a></li></ul></li><li><a href="#acknowledgements-section">26. Acknowledgements</a></li><li><a href="#references">27. References</a><ul><li><a href="#normative-references">27.1. Normative References</a></li><li><a href="#informative-references">27.2. Informative References</a></li></ul></li></ul></div>
</div>
<div id="sections">
@@ -1771,38 +1771,8 @@
</p>
</div>
- <div id="named-curve" class="section">
- <h2>22. NamedCurve</h2>
- <div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
-enum <dfn id="dfn-NamedCurve">NamedCurve</dfn> {
- <span class="comment">// NIST recommended curve P-256, also known as secp256r1.</span>
- <dfn id="dfn-NamedCurve-p256">"P-256"</dfn>,
- <span class="comment">// NIST recommended curve P-384, also known as secp384r1.</span>
- <dfn id="dfn-NamedCurve-p384">"P-384"</dfn>,
- <span class="comment">// NIST recommended curve P-521, also known as secp521r1.</span>
- <dfn id="dfn-NamedCurve-p521">"P-521"</dfn>
-};
- </code></pre></div></div>
- <p>
- The <a href="#dfn-NamedCurve">NamedCurve</a> enumeration type represents named elliptic curves, which
- are a convenient way to specify the domain parameters of well-known elliptic curves.
- </p>
- </div>
-
- <div id="ec-point" class="section">
- <h2>23. ECPoint</h2>
- <div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
-typedef Uint8Array <dfn id="dfn-ECPoint">ECPoint</dfn>;
- </code></pre></div></div>
- <p>
- The <a href="#dfn-ECPoint">ECPoint</a> typedef is a <code>Uint8Array</code> holding an
- elliptic curve point. An elliptic curve point is converted to an array of Uint8 elements
- using the procedure specified in <a href="#X9.62">X9.62</a> Annex A.5.7.
- </p>
- </div>
-
<div id="key-discovery" class="section">
- <h2>24. Key Discovery</h2>
+ <h2>22. Key Discovery</h2>
<p class="norm">This section is non-normative.</p>
<div class="ednote"><div class="ednoteHeader">Editorial note</div>
<p>
@@ -1845,9 +1815,9 @@
</div>
<div id="algorithms" class="section">
- <h2>25. Algorithms</h2>
+ <h2>23. Algorithms</h2>
<div id="recommended-algorithms" class="section">
- <h3>25.1. Recommended algorithms</h3>
+ <h3>23.1. Recommended algorithms</h3>
<p class="norm">This section is non-normative</p>
<p>
As the API is meant to be extensible in order to keep up with future developments within
@@ -1870,7 +1840,7 @@
</p>
</div>
<div id="defining-an-algorithm" class="section">
- <h3>25.2. Defining an algorithm</h3>
+ <h3>23.2. Defining an algorithm</h3>
<p>
Each algorithm that is to be exposed via the Web Cryptography API
<span class="RFC2119">SHOULD</span> be registered via the Web Cryptography working group,
@@ -1879,7 +1849,7 @@
<span class="RFC2119">MUST</span> be processed as if the sections had been defined.
</p>
<div id="recognized-algorithm-name" class="section">
- <h4>25.2.1. Recognized algorithm name</h4>
+ <h4>23.2.1. Recognized algorithm name</h4>
<p>
Each registered algorithm <span class="RFC2119">MUST</span> have a canonical name
for which applications can refer to the algorithm. The canonical name
@@ -1890,14 +1860,14 @@
</p>
</div>
<div id="supported-operations" class="section">
- <h4>25.2.2. Supported operations</h4>
+ <h4>23.2.2. Supported operations</h4>
<p>
Each registered algorithm <span class="RFC2119">MUST</span> define the operations
that it supports.
</p>
</div>
<div id="algorithm-specific-params" class="section">
- <h4>25.2.3. Algorithm-specific parameters</h4>
+ <h4>23.2.3. Algorithm-specific parameters</h4>
<p>
Each registered algorithm <span class="RFC2119">MUST</span> define the expected
contents of the <a href="#dfn-Algorithm-params"><code>params</code></a> member of
@@ -1912,7 +1882,7 @@
</p>
</div>
<div id="algorithm-result" class="section">
- <h4>25.2.4. Algorithm results</h4>
+ <h4>23.2.4. Algorithm results</h4>
<p>
Each registered algorithm <span class="RFC2119">MUST</span> define the contents
of the <a href="#dfn-CryptoOperation-result"><code>result</code></a> attribute of the
@@ -1922,7 +1892,7 @@
</p>
</div>
<div id="algorithm-alias" class="section">
- <h4>25.2.5. <dfn id="dfn-algorithm-alias">Algorithm aliases</dfn></h4>
+ <h4>23.2.5. <dfn id="dfn-algorithm-alias">Algorithm aliases</dfn></h4>
<p>
Each registered algorithm <span class="RFC2119">MAY</span> define one or more aliases
that may define a fully normalized <a href="#dfn-Algorithm">Algorithm</a> object.
@@ -1945,9 +1915,9 @@
</div>
<div id="rsaes-pkcs1" class="section">
- <h3>25.3. RSAES-PKCS1-v1_5</h3>
+ <h3>23.3. RSAES-PKCS1-v1_5</h3>
<div id="rsaes-pkcs1-description" class="section">
- <h4>25.3.1. Description</h4>
+ <h4>23.3.1. Description</h4>
<p>
The <code>"RSAES-PKCS1-v1_5"</code> algorithm identifier is used to perform encryption
and decryption ordering to the RSAES-PKCS1-v1_5 algorithm specified in
@@ -1955,7 +1925,7 @@
</p>
</div>
<div id="rsaes-pkcs1-registration" class="section">
- <h4>25.3.2. Registration</h4>
+ <h4>23.3.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"RSAES-PKCS1-v1_5"</code>.
@@ -1988,7 +1958,7 @@
</table>
</div>
<div id="RsaKeyGenParams-dictionary" class="section">
- <h4>25.3.3. RsaKeyGenParams dictionary</h4>
+ <h4>23.3.3. RsaKeyGenParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-RsaKeyGenParams">RsaKeyGenParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The length, in bits, of the RSA modulus</span>
@@ -1999,7 +1969,7 @@
</code></pre></div></div>
</div>
<div id="rsaes-pkcs1-operations" class="section">
- <h4>25.3.4. Operations</h4>
+ <h4>23.3.4. Operations</h4>
<dl>
<dt>Encrypt</dt>
<dd>
@@ -2129,9 +2099,9 @@
</div>
<div id="rsassa-pkcs1" class="section">
- <h3>25.4. RSASSA-PKCS1-v1_5</h3>
+ <h3>23.4. RSASSA-PKCS1-v1_5</h3>
<div id="rsassa-pkcs1-description" class="section">
- <h4>25.4.1. Description</h4>
+ <h4>23.4.1. Description</h4>
<p>
The <code>"RSASSA-PKCS1-v1_5"</code> algorithm identifier is used to perform
signing and verification using the RSASSA-PKCS1-v1_5 algorithm specified in
@@ -2139,7 +2109,7 @@
</p>
</div>
<div id="rsassa-pkcs1-registration" class="section">
- <h4>25.4.2. Registration</h4>
+ <h4>23.4.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"RSASSA-PKCS1-v1_5"</code>.
@@ -2172,7 +2142,7 @@
</table>
</div>
<div id="RsaSsaParams-dictionary" class="section">
- <h4>25.4.3. RsaSsaParams dictionary</h4>
+ <h4>23.4.3. RsaSsaParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-RsaSsaParams">RsaSsaParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The hash algorithm to use</span>
@@ -2181,7 +2151,7 @@
</code></pre></div></div>
</div>
<div id="rsassa-pkcs1-operations" class="section">
- <h4>25.4.4. Operations</h4>
+ <h4>23.4.4. Operations</h4>
<ul>
<li>Sign</li>
<li>Verify</li>
@@ -2191,9 +2161,9 @@
</div>
<div id="rsa-pss" class="section">
- <h3>25.5. RSA-PSS</h3>
+ <h3>23.5. RSA-PSS</h3>
<div id="rsa-pss-description" class="section">
- <h4>25.5.1. Description</h4>
+ <h4>23.5.1. Description</h4>
<p>
The <code>"RSA-PSS"</code> algorithm identifier is used to perform signing
and verification using the RSASSA-PSS algorithm specified in
@@ -2201,7 +2171,7 @@
</p>
</div>
<div id="rsa-pss-registration" class="section">
- <h4>25.5.2. Registration</h4>
+ <h4>23.5.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"RSA-PSS"</code>.
@@ -2234,7 +2204,7 @@
</table>
</div>
<div id="rsa-pss-params" class="section">
- <h4>25.5.3. RsaPssParams dictionary</h4>
+ <h4>23.5.3. RsaPssParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-RsaPssParams">RsaPssParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The hash function to apply to the message</span>
@@ -2247,7 +2217,7 @@
</code></pre></div></div>
</div>
<div id="rsa-pss-operations" class="section">
- <h4>25.5.4. Operations</h4>
+ <h4>23.5.4. Operations</h4>
<ul>
<li>Sign</li>
<li>Verify</li>
@@ -2257,9 +2227,9 @@
</div>
<div id="rsa-oaep" class="section">
- <h3>25.6. RSA-OAEP</h3>
+ <h3>23.6. RSA-OAEP</h3>
<div id="rsa-oaep-description" class="section">
- <h4>25.6.1. Description</h4>
+ <h4>23.6.1. Description</h4>
<p>
The <code>"RSA-OAEP"</code> algorithm identifier is used to perform encryption
and decryption ordering to the RSAES-OAEP algorithm specified in
@@ -2267,7 +2237,7 @@
</p>
</div>
<div id="rsa-oaep-registration" class="section">
- <h4>25.6.2. Registration</h4>
+ <h4>23.6.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"RSA-OAEP"</code>.
@@ -2301,7 +2271,7 @@
</div>
<div id="rsa-oaep-params" class="section">
- <h4>25.6.3. RsaOaepParams dictionary</h4>
+ <h4>23.6.3. RsaOaepParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-RsaOaepParams">RsaOaepParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The hash function to apply to the message</span>
@@ -2314,7 +2284,7 @@
</code></pre></div></div>
</div>
<div id="rsa-oaep-operations" class="section">
- <h4>25.6.4. Operations</h4>
+ <h4>23.6.4. Operations</h4>
<ul>
<li>Encrypt</li>
<li>Decrypt</li>
@@ -2324,9 +2294,9 @@
</div>
<div id="ecdsa" class="section">
- <h3>25.7. ECDSA</h3>
+ <h3>23.7. ECDSA</h3>
<div id="ecdsa-description" class="section">
- <h4>25.7.1. Description</h4>
+ <h4>23.7.1. Description</h4>
<p>
The <code>"ECDSA"</code> algorithm identifier is used to perform signing
and verification using the ECDSA algorithm specified in
@@ -2334,7 +2304,7 @@
</p>
</div>
<div id="ecdsa-registration" class="section">
- <h4>25.7.2. Registration</h4>
+ <h4>23.7.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"ECDSA"</code>.
@@ -2368,7 +2338,7 @@
</table>
</div>
<div id="EcdsaParams-dictionary" class="section">
- <h4>25.7.3. EcdsaParams dictionary</h4>
+ <h4>23.7.3. EcdsaParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-EcdsaParams">EcdsaParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The hash algorithm to use</span>
@@ -2377,16 +2347,30 @@
</code></pre></div></div>
</div>
<div id="EcKeyGenParams-dictionary" class="section">
- <h4>25.7.4. EcKeyGenParams dictionary</h4>
+ <h4>23.7.4. EcKeyGenParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
+enum <dfn id="dfn-NamedCurve">NamedCurve</dfn> {
+ <span class="comment">// NIST recommended curve P-256, also known as secp256r1.</span>
+ <dfn id="dfn-NamedCurve-p256">"P-256"</dfn>,
+ <span class="comment">// NIST recommended curve P-384, also known as secp384r1.</span>
+ <dfn id="dfn-NamedCurve-p384">"P-384"</dfn>,
+ <span class="comment">// NIST recommended curve P-521, also known as secp521r1.</span>
+ <dfn id="dfn-NamedCurve-p521">"P-521"</dfn>
+};
+
dictionary <dfn id="dfn-EcKeyGenParams">EcKeyGenParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// A named curve</span>
NamedCurve namedCurve;
};
</code></pre></div></div>
+ <p>
+ The <a href="#dfn-NamedCurve">NamedCurve</a> enumeration type represents named elliptic curves, which
+ are a convenient way to specify the domain parameters of well-known elliptic curves.
+ </p>
</div>
+
<div id="ecdsa-operations" class="section">
- <h4>25.7.5. Operations</h4>
+ <h4>23.7.5. Operations</h4>
<dl>
<dt>Sign</dt>
<dd>
@@ -2512,16 +2496,16 @@
</div>
<div id="ecdh" class="section">
- <h3>25.8. ECDH</h3>
+ <h3>23.8. ECDH</h3>
<div id="ecdh-description" class="section">
- <h4>25.8.1. Description</h4>
+ <h4>23.8.1. Description</h4>
<p>
This describes using Elliptic Curve Diffie-Hellman (ECDH) for key generation and key agreement, as
specified by <a href="#X9.63">X9.63</a>.
</p>
</div>
<div id="ecdh-registration" class="section">
- <h4>25.8.2. Registration</h4>
+ <h4>23.8.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"ECDH"</code>.
@@ -2549,16 +2533,23 @@
</table>
</div>
<div id="dh-EcdhKeyDeriveParams" class="section">
- <h4>25.8.3. EcdhKeyDeriveParams dictionary</h4>
+ <h4>23.8.3. EcdhKeyDeriveParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
+typedef Uint8Array <dfn id="dfn-ECPoint">ECPoint</dfn>;
+
dictionary <dfn id="dfn-EcdhKeyDeriveParams">EcdhKeyDeriveParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The peer's EC public key.</span>
ECPoint public;
};
</code></pre></div></div>
+ <p>
+ The <a href="#dfn-ECPoint">ECPoint</a> typedef is a <code>Uint8Array</code> holding an
+ elliptic curve point. An elliptic curve point is converted to an array of Uint8 elements
+ using the procedure specified in <a href="#X9.62">X9.62</a> Annex A.5.7.
+ </p>
</div>
<div id="ecdh-operations" class="section">
- <h4>25.8.4. Operations</h4>
+ <h4>23.8.4. Operations</h4>
<ul>
<li>Generate Key</li>
<li>Derive Key</li>
@@ -2577,14 +2568,14 @@
</div>
<div id="aes-ctr" class="section">
- <h3>25.9. AES-CTR</h3>
+ <h3>23.9. AES-CTR</h3>
<div id="aes-ctr-description" class="section">
- <h4>25.9.1. Description</h4>
+ <h4>23.9.1. Description</h4>
<p>
</p>
</div>
<div id="aes-ctr-registration" class="section">
- <h4>25.9.2. Registration</h4>
+ <h4>23.9.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"AES-CTR"</code>.
@@ -2618,7 +2609,7 @@
</div>
<div id="aes-ctr-params" class="section">
- <h4>25.9.3. AesCtrParams dictionary</h4>
+ <h4>23.9.3. AesCtrParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-AesCtrParams">AesCtrParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The initial value of the counter block. counter <span class="RFC2119">MUST</span> be 16 bytes
@@ -2636,7 +2627,7 @@
</code></pre></div></div>
</div>
<div id="aes-keygen-params" class="section">
- <h4>25.9.4. AesKeyGenParams dictionary</h4>
+ <h4>23.9.4. AesKeyGenParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-AesKeyGenParams">AesKeyGenParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The length, in bits, of the key.</span>
@@ -2645,7 +2636,7 @@
</code></pre></div></div>
</div>
<div id="aes-ctr-operations" class="section">
- <h4>25.9.5. Operations</h4>
+ <h4>23.9.5. Operations</h4>
<ul>
<li>Encrypt</li>
<li>Decrypt</li>
@@ -2655,12 +2646,12 @@
</div>
<div id="aes-cbc" class="section">
- <h3>25.10. AES-CBC</h3>
+ <h3>23.10. AES-CBC</h3>
<div id="aes-cbc-description" class="section">
- <h4>25.10.1. Description</h4>
+ <h4>23.10.1. Description</h4>
</div>
<div id="aes-cbc-registration" class="section">
- <h4>25.10.2. Registration</h4>
+ <h4>23.10.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"AES-CBC"</code>.
@@ -2693,7 +2684,7 @@
</table>
</div>
<div id="aes-cbc-params" class="section">
- <h4>25.10.3. AesCbcParams dictionary</h4>
+ <h4>23.10.3. AesCbcParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-AesCbcParams">AesCbcParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The initialization vector. <span class="RFC2119">MUST</span> be 16 bytes.</span>
@@ -2702,7 +2693,7 @@
</code></pre></div></div>
</div>
<div id="aes-cbc-operations" class="section">
- <h4>25.10.4. Operations</h4>
+ <h4>23.10.4. Operations</h4>
<ul>
<li>Encrypt</li>
<li>Decrypt</li>
@@ -2712,12 +2703,12 @@
</div>
<div id="aes-gcm" class="section">
- <h3>25.11. AES-GCM</h3>
+ <h3>23.11. AES-GCM</h3>
<div id="aes-gcm-description" class="section">
- <h4>25.11.1. Description</h4>
+ <h4>23.11.1. Description</h4>
</div>
<div id="aes-gcm-registration" class="section">
- <h4>25.11.2. Registration</h4>
+ <h4>23.11.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"AES-GCM"</code>.
@@ -2750,7 +2741,7 @@
</table>
</div>
<div id="aes-gcm-params" class="section">
- <h4>25.11.3. AesGcmParams dictionary</h4>
+ <h4>23.11.3. AesGcmParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-AesGcmParams">AesGcmParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The initialization vector to use. May be up to 2^56 bytes long.</span>
@@ -2763,7 +2754,7 @@
</code></pre></div></div>
</div>
<div id="aes-gcm-operations" class="section">
- <h4>25.11.4. Operations</h4>
+ <h4>23.11.4. Operations</h4>
<ul>
<li>Encrypt</li>
<li>Decrypt</li>
@@ -2773,12 +2764,12 @@
</div>
<div id="hmac" class="section">
- <h3>25.12. HMAC</h3>
+ <h3>23.12. HMAC</h3>
<div id="hmac-description" class="section">
- <h4>25.12.1. Description</h4>
+ <h4>23.12.1. Description</h4>
</div>
<div id="hmac-registration" class="section">
- <h4>25.12.2. Registration</h4>
+ <h4>23.12.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"HMAC"</code>.
@@ -2811,7 +2802,7 @@
</table>
</div>
<div id="hmac-params" class="section">
- <h4>25.12.3. HmacParams dictionary</h4>
+ <h4>23.12.3. HmacParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-HmacParams">HmacParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The inner hash function to use.</span>
@@ -2820,7 +2811,7 @@
</code></pre></div></div>
</div>
<div id="hmac-operations" class="section">
- <h4>25.12.4. Operations</h4>
+ <h4>23.12.4. Operations</h4>
<ul>
<li>Sign</li>
<li>Verify</li>
@@ -2829,16 +2820,16 @@
</div>
</div>
<div id="dh" class="section">
- <h3>25.13. Diffie-Hellman</h3>
+ <h3>23.13. Diffie-Hellman</h3>
<div id="dh-description" class="section">
- <h4>25.13.1. Description</h4>
+ <h4>23.13.1. Description</h4>
<p>
This describes using Diffie-Hellman for key generation and key agreement, as specified
by <a href="#PKCS3">PKCS #3</a>.
</p>
</div>
<div id="dh-registration" class="section">
- <h4>25.13.2. Registration</h4>
+ <h4>23.13.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"DH"</code>.
@@ -2866,7 +2857,7 @@
</table>
</div>
<div id="dh-DhKeyGenParams" class="section">
- <h4>25.13.3. DhKeyGenParams dictionary</h4>
+ <h4>23.13.3. DhKeyGenParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-DhKeyGenParams">DhKeyGenParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The prime p.</span>
@@ -2877,7 +2868,7 @@
</code></pre></div></div>
</div>
<div id="dh-DhKeyDeriveParams" class="section">
- <h4>25.13.4. DhKeyDeriveParams dictionary</h4>
+ <h4>23.13.4. DhKeyDeriveParams dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-DhKeyDeriveParams">DhKeyDeriveParams</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
<span class="comment">// The peer's public value.</span>
@@ -2886,7 +2877,7 @@
</code></pre></div></div>
</div>
<div id="dh-operations" class="section">
- <h4>25.13.5. Operations</h4>
+ <h4>23.13.5. Operations</h4>
<ul>
<li>Generate Key</li>
<li>Derive Key</li>
@@ -2894,16 +2885,16 @@
</div>
</div>
<div id="sha" class="section">
- <h3>25.14. SHA</h3>
+ <h3>23.14. SHA</h3>
<div id="sha-description" class="section">
- <h4>25.14.1. Description</h4>
+ <h4>23.14.1. Description</h4>
<p>
This describes the SHA-1 and SHA-2 families, as specified by
[<a href="#FIPS180-4">FIPS 180-4</a>].
</p>
</div>
<div id="sha-registration" class="section">
- <h4>25.14.2. Registration</h4>
+ <h4>23.14.2. Registration</h4>
<p>
The following algorithms are added as <a href="#recognized-algorithm-name">
recognized algorithm names</a>:
@@ -2938,19 +2929,19 @@
</table>
</div>
<div id="sha-operations" class="section">
- <h4>25.14.3. Operations</h4>
+ <h4>23.14.3. Operations</h4>
<ul>
<li>Digest</li>
</ul>
</div>
</div>
<div id="pbkdf2" class="section">
- <h3>25.15. PBKDF2</h3>
+ <h3>23.15. PBKDF2</h3>
<div id="pbkdf2-description" class="section">
- <h4>25.15.1. Description</h4>
+ <h4>23.15.1. Description</h4>
</div>
<div id="pbkdf2-registration" class="section">
- <h4>25.15.2. Registration</h4>
+ <h4>23.15.2. Registration</h4>
<p>
The <a href="#recognized-algorithm-name">recognized algorithm name</a> for
this algorithm is <code>"PBKDF2"</code>.
@@ -2973,7 +2964,7 @@
</table>
</div>
<div id="pbkdf2-params" class="section">
- <h4>25.15.3. Pbkdf2Params dictionary</h4>
+ <h4>23.15.3. Pbkdf2Params dictionary</h4>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">IDL</span></div><div class="blockContent"><pre class="code"><code class="idl-code">
dictionary <dfn id="dfn-Pbkdf2Params">Pbkdf2Params</dfn> : <a href="#dfn-AlgorithmParameters">AlgorithmParameters</a> {
ArrayBufferView salt;
@@ -2992,7 +2983,7 @@
</div>
</div>
<div id="pbkdf2-operations" class="section">
- <h4>25.15.4. Operations</h4>
+ <h4>23.15.4. Operations</h4>
<ul>
<li>Derive Key</li>
</ul>
@@ -3001,7 +2992,7 @@
</div>
<div id="algorithm-normalizing-rules" class="section">
- <h2>26. Algorithm normalizing rules</h2>
+ <h2>24. Algorithm normalizing rules</h2>
<p>
The <a href="#dfn-AlgorithmIdentifier"><code>AlgorithmIdentifier</code></a> typedef
permits algorithms to be specified as either a <code>dictionary</code> or a DOMString.
@@ -3071,9 +3062,9 @@
</ol>
</div>
<div id="examples-section" class="section">
- <h2>27. JavaScript Example Code</h2>
+ <h2>25. JavaScript Example Code</h2>
<div id="examples-signing" class="section">
- <h3>27.1. Generate a signing key pair, sign some data</h3>
+ <h3>25.1. Generate a signing key pair, sign some data</h3>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">ECMAScript</span></div><div class="blockContent"><pre class="code"><code class="es-code">
var publicExponent = new Uint8Array([0x01, 0x00, 0x01]);
@@ -3142,7 +3133,7 @@
</code></pre></div></div>
</div>
<div id="examples-symmetric-encryption" class="section">
- <h3>27.2. Symmetric Encryption</h3>
+ <h3>25.2. Symmetric Encryption</h3>
<div class="block"><div class="blockTitleDiv"><span class="blockTitle">ECMAScript</span></div><div class="blockContent"><pre class="code"><code class="es-code">
var clearDataArrayBufferView = convertPlainTextToArrayBufferView("Plain Text Data");
<span class="comment">// TODO: create example utility function that converts text -> ArrayBufferView</span>
@@ -3204,7 +3195,7 @@
</div>
</div>
<div id="acknowledgements-section" class="section">
- <h2>28. Acknowledgements</h2>
+ <h2>26. Acknowledgements</h2>
<p>
The editors would like to thank Adam Barth, Ali Asad, Arun Ranganathan, Brian Smith,
Brian Warner, Channy Yun, Kai Engert, Mark Watson, Vijay Bharadwaj, Virginie Galindo,
@@ -3225,9 +3216,9 @@
</p>
</div>
<div id="references" class="section">
- <h2>29. References</h2>
+ <h2>27. References</h2>
<div id="normative-references" class="section">
- <h3>29.1. Normative References</h3>
+ <h3>27.1. Normative References</h3>
<dl>
<dt id="RFC2119">RFC2119</dt>
<dd>
@@ -3300,7 +3291,7 @@
</dl>
</div>
<div id="informative-references" class="section">
- <h3>29.2. Informative References</h3>
+ <h3>27.2. Informative References</h3>
<dl>
<dt id="draft-TLS-OBC">draft-balfanz-tls-obc-01</dt>
<dd>