- From: Takeshi Imamura <IMAMU@jp.ibm.com>
- Date: Sun, 15 Sep 2002 10:14:39 +0900
- To: reagle@w3.org
- Cc: Merlin Hughes <merlin@baltimore.ie>, xml-encryption@w3.org
Joseph, I'm sorry for not replying sooner. >> 2. In Step 3 of decryptNodeSet() in Section 3.1, a step saying that Y is >> replaced with Y U {Od} is missing between Steps 1 and 2. > >You're right, but I'm not sure that's enough given this is a recursive >function. I've also prepended the following to the last step, "If Od >contains xenc:EncryptedData that are not in E." Is that correct? "Replace Y with Y ∪ Od" in Step 2 is not correct because Y is a set of node-sets while Od is just a node-set. This would be "Replace Y with Y ∪ {Od}". Also, the text you added, i.e., "If Od contains xenc:EncryptedData that are not in E" does not seem to be necessary. If this condition is true, decryptNodeSet() just returns an empty set, so it would be OK. >> 4. In Section 3.4.4, a KeyInfo structure referenced by a RetrievalMethod >> element could be included in the second and third examples. Also, a >> decrypted document could be added to the end. So, examples would be as >> follows: > >You're example isn't intended to be plug-and-play is it? For instance, your >new [a*] example has no mention of <Part number="1">, but this is still in >[c*], which you didn't give a replacement for? While we could demonstrate >that dsig:RetrievalMethod could be used, I'm not sure we need to >demonstrate that here; and I'm not sure what you mean by "decrypted >document could be added to the end." So given my confusion I won't >introduce any changes to the example, though if you and Merlin want to give >me the html to replace it, I'll happily do so! Are you talking about the examples in Section 3.3? This comment is not for them but for the ones in Section 3.4.4, where the relation between references and super-encryption is described. Thanks, Takeshi IMAMURA Tokyo Research Laboratory IBM Research imamu@jp.ibm.com
Received on Saturday, 14 September 2002 23:11:04 UTC