W3C home > Mailing lists > Public > xml-encryption@w3.org > April 2002

Re: Decryption Transform processing question

From: Ari Kermaier <arik@phaos.com>
Date: Thu, 25 Apr 2002 18:26:39 -0400
Message-Id: <5.1.0.14.2.20020425181849.0296a5e0@verio.phaos.com>
To: xml-encryption@w3.org
Takeshi answered my question off-list (I'd misread the example in Appendix 
A) -- thanks.

However, I have another question: What is the intended purpose of step 1 
(same as below) in the decryptOctets(X, e) function? Since e will not be 
replaced with the result of the decryption, serializing X doesn't really 
seem necessary....

Ari

>On Tuesday 23 April 2002 15:34, Ari Kermaier wrote:
> > I'm trying to implement the processing rules as defined in the current
> > editor's copy [1], and I don't understand the processing rules for the
> > decryptXML(X,e,C) function, when considered with the examples in Section
> > 4 and Appendix A:
>
>Ari, you've asked some good questions, and while I was reading them came up
>with one of my own!
>
> >    1. Convert X to an octet stream as described in The Reference
> >       Processing Model (section 4.3.3.2) of the XML Signature
> >       specification [XML-Signature].
> >
> > <AK> Apply XML-C14N to node-set X defined above. </AK>
>
>Now that we have the option, is there any reason to use exc-14n instead of
>c14n? Takeshi, Hiroshi ?
Received on Thursday, 25 April 2002 18:24:12 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 20:32:03 UTC