- From: merlin <merlin@baltimore.ie>
- Date: Thu, 07 Mar 2002 18:09:25 +0000
- To: reagle@w3.org
- Cc: "Takeshi Imamura" <IMAMU@jp.ibm.com>, "Hiroshi Maruyama" <MARUYAMA@jp.ibm.com>, xml-encryption@w3.org
r/reagle@w3.org/2002.03.07/12:25:01 >On Wednesday 06 March 2002 16:31, merlin wrote: >> It might be prudent to require that, if an enc:EncryptedData is present >> with a non-XML Type attribute, then it must be the (sole root element of >> the input | only enc:EncryptedData in the input). Otherwise, operation >> is ambiguous; we don't define an order for performing decryptions, >> and the current language will return the data from the first non-XML >> ciphertext processed. > >I'm not sure what you mean by "operation is ambiguous" and "don't define an >order for performing decryptions." I think I understand your point: it's >difficult to envision someone having: ><foo> > <EncryptedData MimeType="msword"/> > <EncryptedData MimeType="png"/> ></foo> > >but there might be one... and then with respect to the "only >encEncryptedData in the input", I think the input could have more than one >EncryptedData, but that input less those excepted would have to be equal to >one? This is the example I'm considering; assume <foo> above is the input and there is no Except. We state: 1. Within X, select e, an element node with the type enc:EncryptedData, ... We don't place an ordering on selecting e, so a decryptor may choose either the msword or png data first. 3. If the value of the Type attribute is absent or otherwise indicates octets: 1. Let Y' be decryptOctets(X, e). 2. Return Y'. This returns the first non-XML encrypted data encountered, which is what I meant by ambiguous operation. I think, as you suggest, we should require that the input less those excepted must have only one encrypted data of non-XML type. merlin >> Also, text that I'd suggest adding about the Except URI would be along >> the lines of: >> >> When dereferencing Except URIs, the application MUST behave as if the >> root document node of the input node set is used to initialize the >> XPointer evaluation context, even if this node is not part of the node >> set. Unlike XML-Signature, the URI may be evaluated against a different >> document from the signature document. If the input is a different >> document then, as per the XPointer spec, use of the here() function is an >> error. > >Ok: > >http://www.w3.org/Encryption/2001/Drafts/xmlenc-decrypt.html#processing >$Revision: 1.32 $ > > >-- > >Joseph Reagle Jr. http://www.w3.org/People/Reagle/ >W3C Policy Analyst mailto:reagle@w3.org >IETF/W3C XML-Signature Co-Chair http://www.w3.org/Signature/ >W3C XML Encryption Chair http://www.w3.org/Encryption/2001/ > ----------------------------------------------------------------------------- Baltimore Technologies plc will not be liable for direct, special, indirect or consequential damages arising from alteration of the contents of this message by a third party or as a result of any virus being passed on. This footnote confirms that this email message has been swept by Baltimore MIMEsweeper for Content Security threats, including computer viruses. http://www.baltimore.com
Received on Thursday, 7 March 2002 13:09:31 UTC