- From: Ari Kermaier <arik@phaos.com>
- Date: Thu, 25 Apr 2002 18:26:39 -0400
- To: xml-encryption@w3.org
Takeshi answered my question off-list (I'd misread the example in Appendix A) -- thanks. However, I have another question: What is the intended purpose of step 1 (same as below) in the decryptOctets(X, e) function? Since e will not be replaced with the result of the decryption, serializing X doesn't really seem necessary.... Ari >On Tuesday 23 April 2002 15:34, Ari Kermaier wrote: > > I'm trying to implement the processing rules as defined in the current > > editor's copy [1], and I don't understand the processing rules for the > > decryptXML(X,e,C) function, when considered with the examples in Section > > 4 and Appendix A: > >Ari, you've asked some good questions, and while I was reading them came up >with one of my own! > > > 1. Convert X to an octet stream as described in The Reference > > Processing Model (section 4.3.3.2) of the XML Signature > > specification [XML-Signature]. > > > > <AK> Apply XML-C14N to node-set X defined above. </AK> > >Now that we have the option, is there any reason to use exc-14n instead of >c14n? Takeshi, Hiroshi ?
Received on Thursday, 25 April 2002 18:24:12 UTC