- From: Magnus Nyström <magnus@rsa.com>
- Date: Mon, 16 Mar 2009 21:23:57 +0100 (W. Europe Standard Time)
- To: public-xmlsec@w3.org
All, Following up on ACTION-229 that I (and Brian) got last week, here's a simplified variant of my earlier proposal that both Brian and I feel reasonably comfortable with. The difference between this and the earlier proposal is that we now require both the base point and the curve to be verifiably random - if validation data is supplied. This simplifies the schema as well as the validation, and I don't see that it would be a burden for curve generation. For discussion at tomorrow's call. <complexType name="ECParametersType"> <sequence> <element name="FieldID" type="dsig11:FieldIDType"/> <element name="Curve" type="dsig11:CurveType"/> <element name="Base" type="dsig11:ECPointType"/> <element name="Order" type="ds:CryptoBinary"/> <element name="CoFactor" type="integer" minOccurs="0"/> <element name="ECValidationData" type="dsig11:ECValidationDataType" minOccurs="0"/> </sequence> </complexType> <complexType name="ECValidationDataType"> <sequence> <element name="seed" type="ds:CryptoBinary"/> </sequence> <attribute name="hashAlgorithm" type="anyURI" use="required" [? Not certain] /> </complexType> (i.e. if validation data is present, then both the curve and the base point shall be randomly generated) ... and remove the "seed" element from the curve type: <complexType name="CurveType"> <sequence> <element name="A" type="ds:CryptoBinary"/> <element name="B" type="ds:CryptoBinary"/> </sequence> </complexType> -- Magnus
Received on Monday, 16 March 2009 20:24:37 UTC