- From: Thomas Roessler <tlr@w3.org>
- Date: Tue, 21 Apr 2009 18:02:40 +0200
- To: Konrad Lanz <konrad.lanz@iaik.tugraz.at>
- Cc: XMLSec WG Public List <public-xmlsec@w3.org>
Received on Tuesday, 21 April 2009 16:02:50 UTC
To pick up on the question that Scott asked today, what are the concrete examples of things that break if the constrained implementation of exclusive C14N is used (not just as an optimization, but as the *only* canonicalization available)? Since you seemed to have some ideas on the call, are there concrete examples that you can give? http://www.w3.org/TR/xml-exc-c14n/#sec-Implementation Thanks, -- Thomas Roessler, W3C <tlr@w3.org> Come to the W3C track unconferences at WWW 2009! http://www.w3.org/2009/04/w3c-track.html
Received on Tuesday, 21 April 2009 16:02:50 UTC