@@ -222,9 +222,10 @@ The structure fields are defined as follows:
222
222
223
223
The Client then generates an HTTP POST request to send to the Issuer Request
224
224
URL, with the BatchTokenRequest as the content. The media type for this request
225
- is "application/private-token-privately-verifiable-batch-request". An example
226
- request for the Issuer Request URL "https://issuer.example.net/request" is shown
227
- below.
225
+ MUST be "application/private-token-privately-verifiable-batch-request". If not,
226
+ the Issuer responds with status code 415.
227
+ An example request for the Issuer Request URL
228
+ " https://issuer.example.net/request" is shown below.
228
229
229
230
~~~
230
231
POST /request HTTP/1.1
@@ -324,9 +325,11 @@ The structure fields are defined as follows:
324
325
Scalar values, computed as `concat(SerializeScalar(proof[0]),
325
326
SerializeScalar(proof[1]))`, where Ns is as defined in {{OPRF, Section 4}}.
326
327
327
- The Issuer generates an HTTP response with status code 200 whose content
328
+ The Issuer MUST generate an HTTP response with status code 200 whose content
328
329
consists of TokenResponse, with the content type set as
329
- " application/private-token-privately-verifiable-batch-response" .
330
+ " application/private-token-privately-verifiable-batch-response" . Clients MUST
331
+ ignore the response if the status code is not 200 or if the content type is not
332
+ " application/private-token-arbitrary-batch-response" .
330
333
331
334
~~~
332
335
HTTP/1.1 200 OK
@@ -456,8 +459,10 @@ The structure fields are defined as follows:
456
459
457
460
The Client then generates an HTTP POST request to send to the Issuer Request
458
461
URL, with the BatchTokenRequest as the content. The media type for this request
459
- is "application/private-token-arbitrary-batch-request". An example request for
460
- the Issuer Request URL "https://issuer.example.net/request" is shown below.
462
+ MUST be "application/private-token-arbitrary-batch-request". If not, the Issuer
463
+ responds with status code 415.
464
+ An example request for the Issuer Request URL
465
+ " https://issuer.example.net/request" is shown below.
461
466
462
467
~~~
463
468
POST /request HTTP/1.1
@@ -509,8 +514,10 @@ prefixed with two bytes. OptionalTokenResponse.token_response is a
509
514
length-prefix-encoded TokenResponse, where a length of 0 indicates that the
510
515
Issuer failed or refused to issue the associated TokenRequest.
511
516
512
- The Issuer generates an HTTP response with status code 200 whose content
517
+ The Issuer MUST generate an HTTP response with status code 200 whose content
513
518
consists of TokenResponse, with the content type set as
519
+ " application/private-token-arbitrary-batch-response" . Clients MUST ignore the
520
+ response if the status code is not 200 or if the content type is not
514
521
" application/private-token-arbitrary-batch-response" .
515
522
516
523
If the Issuer issues some tokens but not all, it MUST return an HTTP 206 to the
@@ -592,7 +599,7 @@ Type name:
592
599
593
600
Subtype name :
594
601
595
- : private-token-request
602
+ : private-token-privately-verifiable-batch- request
596
603
597
604
Required parameters :
598
605
@@ -620,7 +627,8 @@ Published specification:
620
627
621
628
Applications that use this media type :
622
629
623
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
630
+ : Applications that want to issue or facilitate issuance of Privacy Pass
631
+ Batched Privately Verifiable tokens as defined in {{batched-private}},
624
632
including Privacy Pass issuer applications themselves.
625
633
626
634
Fragment identifier considerations :
@@ -665,7 +673,7 @@ Type name:
665
673
666
674
Subtype name :
667
675
668
- : private-token-response
676
+ : private-token-privately-verifiable-batch- response
669
677
670
678
Required parameters :
671
679
@@ -693,7 +701,8 @@ Published specification:
693
701
694
702
Applications that use this media type :
695
703
696
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
704
+ : Applications that want to issue or facilitate issuance of Privacy Pass
705
+ Batched Privately Verifiable tokens as defined in {{batched-private}},
697
706
including Privacy Pass issuer applications themselves.
698
707
699
708
Fragment identifier considerations :
@@ -738,7 +747,7 @@ Type name:
738
747
739
748
Subtype name :
740
749
741
- : private-token-request
750
+ : private-token-arbitrary-batch- request
742
751
743
752
Required parameters :
744
753
@@ -766,7 +775,8 @@ Published specification:
766
775
767
776
Applications that use this media type :
768
777
769
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
778
+ : Applications that want to issue or facilitate issuance of Privacy Pass
779
+ Arbitrary Batched tokens as defined in {{batched-arbitrary}},
770
780
including Privacy Pass issuer applications themselves.
771
781
772
782
Fragment identifier considerations :
@@ -811,7 +821,7 @@ Type name:
811
821
812
822
Subtype name :
813
823
814
- : private-token-response
824
+ : private-token-arbitrary-batch- response
815
825
816
826
Required parameters :
817
827
@@ -839,7 +849,8 @@ Published specification:
839
849
840
850
Applications that use this media type :
841
851
842
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
852
+ : Applications that want to issue or facilitate issuance of Privacy Pass
853
+ Arbitrary Batched tokens as defined in {{batched-arbitrary}},
843
854
including Privacy Pass issuer applications themselves.
844
855
845
856
Fragment identifier considerations :
0 commit comments