15.4. Processing Flow
This section describes the sequence of operations for XML encryption and decryption processing. The XML Encryption Recommendation [XMLENC] attempts to define the boundary between the application and an encrypter or decrypter, but it remains flexible because some steps may be carried out by either one. Discussion of cryptographic and directly related processing, where XMLDSIG is used as an analogy, appears in the subsections “Encryption Processing” and “Decryption Processing.” Discussion of other “application” processing appears in the subsections “Pre-encryption Processing,” “Post-encryption Processing,” “Pre-decryption Processing,” and “Post-decryption Processing.”
15.4.1. Encryption
The following steps need to be performed ...
Get Secure XML: The New Syntax for Signatures and Encryption now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.