Bug 137321 - [EME] Improvements to the secure proof of key release protocol
Summary: [EME] Improvements to the secure proof of key release protocol
Status: NEW
Alias: None
Product: WebKit
Classification: Unclassified
Component: Media (show other bugs)
Version: 528+ (Nightly build)
Hardware: Unspecified Unspecified
: P2 Normal
Assignee: Nobody
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-10-01 16:24 PDT by Jer Noble
Modified: 2014-10-01 16:24 PDT (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jer Noble 2014-10-01 16:24:17 PDT
After conversations with clients, change the informal protocol used to generate SPoKR messages to the following:

  session = keys.createSession('mime', initData);
  ...
  session.close()

This will result in a new keymessage, the contents of which is the SPoKR blob for that session.

The client will acknowledge receipt of the blob by calling:

  session.update('acknowledge');

This will remove the session from the persistent store.

Additionally, outside of an existing storage, a client can ask for all outstanding SPoKR entries by creating a session like the following:

  session = keys.createSession('keyrelease', certData);

This will result in a new keymessage, the contents of the first SPoKR blob in the persistent store.

The client will acknowledge receipt of the blob by calling:

  session.update('acknowledge');

This will remove the session from the persistent store.