Skip to content

Commit 00a0404

Browse files
committed
Add clarification for media type
All media types declared with IANA registered the same subtype. This commit addresses it. In addition, this commit makes the Content-Type for request and responses normative with `MUST be`. Closes ietf-wg-privacypass#33
1 parent 40b665b commit 00a0404

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

Diff for: draft-ietf-privacypass-batched-tokens.md

+18-14
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ struct {
154154
} StructWithVectors;
155155
~~~
156156

157-
# Batched Privately Verifiable Token
157+
# Batched Privately Verifiable Token {#batched-privately-verifiable-token}
158158

159159
This section describes a batched issuance protocol for select token types,
160160
including 0x0001 (defined in {{RFC9578}}) and 0x0005 (defined in this document).
@@ -221,7 +221,7 @@ The structure fields are defined as follows:
221221

222222
The Client then generates an HTTP POST request to send to the Issuer Request
223223
URL, with the BatchTokenRequest as the content. The media type for this request
224-
is "application/private-token-privately-verifiable-batch-request". An example
224+
MUST be "application/private-token-privately-verifiable-batch-request". An example
225225
request for the Issuer Request URL "https://issuer.example.net/request" is shown
226226
below.
227227

@@ -323,7 +323,7 @@ The structure fields are defined as follows:
323323
Scalar values, computed as `concat(SerializeScalar(proof[0]),
324324
SerializeScalar(proof[1]))`, where Ns is as defined in {{OPRF, Section 4}}.
325325

326-
The Issuer generates an HTTP response with status code 200 whose content
326+
The Issuer MUST generate an HTTP response with status code 200 whose content
327327
consists of TokenResponse, with the content type set as
328328
"application/private-token-privately-verifiable-batch-response".
329329

@@ -409,7 +409,7 @@ struct {
409409
If the FinalizeBatch function fails, the Client aborts the protocol. Token
410410
verification works exactly as specified in {{RFC9578}}.
411411

412-
# Arbitrary Batched Token Issuance
412+
# Arbitrary Batched Token {#arbitrary-batched-token}
413413

414414
This section describes an issuance protocol mechanism for issuing multiple
415415
tokens in one round trip between Client and Issuer. An arbitrary batched token
@@ -455,7 +455,7 @@ The structure fields are defined as follows:
455455

456456
The Client then generates an HTTP POST request to send to the Issuer Request
457457
URL, with the BatchTokenRequest as the content. The media type for this request
458-
is "application/private-token-arbitrary-batch-request". An example request for
458+
MUST be "application/private-token-arbitrary-batch-request". An example request for
459459
the Issuer Request URL "https://issuer.example.net/request" is shown below.
460460

461461
~~~
@@ -508,7 +508,7 @@ prefixed with two bytes. OptionalTokenResponse.token_response is a
508508
length-prefix-encoded TokenResponse, where a length of 0 indicates that the
509509
Issuer failed or refused to issue the associated TokenRequest.
510510

511-
The Issuer generates an HTTP response with status code 200 whose content
511+
The Issuer MUST generate an HTTP response with status code 200 whose content
512512
consists of TokenResponse, with the content type set as
513513
"application/private-token-arbitrary-batch-response".
514514

@@ -591,7 +591,7 @@ Type name:
591591

592592
Subtype name:
593593

594-
: private-token-request
594+
: private-token-privately-verifiable-batch-request
595595

596596
Required parameters:
597597

@@ -619,7 +619,8 @@ Published specification:
619619

620620
Applications that use this media type:
621621

622-
: Applications that want to issue or facilitate issuance of Privacy Pass tokens,
622+
: Applications that want to issue or facilitate issuance of Privacy Pass
623+
Batched Privately Verifiable tokens as defined in {{batched-privately-verifiable-token}},
623624
including Privacy Pass issuer applications themselves.
624625

625626
Fragment identifier considerations:
@@ -664,7 +665,7 @@ Type name:
664665

665666
Subtype name:
666667

667-
: private-token-response
668+
: private-token-privately-verifiable-batch-response
668669

669670
Required parameters:
670671

@@ -692,7 +693,8 @@ Published specification:
692693

693694
Applications that use this media type:
694695

695-
: Applications that want to issue or facilitate issuance of Privacy Pass tokens,
696+
: Applications that want to issue or facilitate issuance of Privacy Pass
697+
Batched Privately Verifiable tokens as defined in {{batched-privately-verifiable-token}},
696698
including Privacy Pass issuer applications themselves.
697699

698700
Fragment identifier considerations:
@@ -737,7 +739,7 @@ Type name:
737739

738740
Subtype name:
739741

740-
: private-token-request
742+
: private-token-arbitrary-batch-request
741743

742744
Required parameters:
743745

@@ -765,7 +767,8 @@ Published specification:
765767

766768
Applications that use this media type:
767769

768-
: Applications that want to issue or facilitate issuance of Privacy Pass tokens,
770+
: Applications that want to issue or facilitate issuance of Privacy Pass
771+
Arbitrary Batched tokens as defined in {{arbitrary-batched-token}},
769772
including Privacy Pass issuer applications themselves.
770773

771774
Fragment identifier considerations:
@@ -810,7 +813,7 @@ Type name:
810813

811814
Subtype name:
812815

813-
: private-token-response
816+
: private-token-arbitrary-batch-response
814817

815818
Required parameters:
816819

@@ -838,7 +841,8 @@ Published specification:
838841

839842
Applications that use this media type:
840843

841-
: Applications that want to issue or facilitate issuance of Privacy Pass tokens,
844+
: Applications that want to issue or facilitate issuance of Privacy Pass
845+
Arbitrary Batched tokens as defined in {{arbitrary-batched-token}},
842846
including Privacy Pass issuer applications themselves.
843847

844848
Fragment identifier considerations:

0 commit comments

Comments
 (0)