- From: Joseph Reagle <reagle@w3.org>
- Date: Thu, 25 Apr 2002 17:43:08 -0400
- To: Ari Kermaier <arik@phaos.com>, xml-encryption@w3.org
- Cc: <imamu@jp.ibm.com>, <maruyama@jp.ibm.com>
On Tuesday 23 April 2002 15:34, Ari Kermaier wrote: > I'm trying to implement the processing rules as defined in the current > editor's copy [1], and I don't understand the processing rules for the > decryptXML(X,e,C) function, when considered with the examples in Section > 4 and Appendix A: Ari, you've asked some good questions, and while I was reading them came up with one of my own! > 1. Convert X to an octet stream as described in The Reference > Processing Model (section 4.3.3.2) of the XML Signature > specification [XML-Signature]. > > <AK> Apply XML-C14N to node-set X defined above. </AK> Now that we have the option, is there any reason to use exc-14n instead of c14n? Takeshi, Hiroshi ?
Received on Thursday, 25 April 2002 17:44:16 UTC