@@ -154,7 +154,7 @@ struct {
154
154
} StructWithVectors;
155
155
~~~
156
156
157
- # Batched Privately Verifiable Token
157
+ # Batched Privately Verifiable Token {#batched-privately-verifiable-token}
158
158
159
159
This section describes a batched issuance protocol for select token types,
160
160
including 0x0001 (defined in {{RFC9578}}) and 0x0005 (defined in this document).
@@ -221,7 +221,7 @@ The structure fields are defined as follows:
221
221
222
222
The Client then generates an HTTP POST request to send to the Issuer Request
223
223
URL, with the BatchTokenRequest as the content. The media type for this request
224
- is "application/private-token-privately-verifiable-batch-request". An example
224
+ MUST be "application/private-token-privately-verifiable-batch-request". An example
225
225
request for the Issuer Request URL "https://issuer.example.net/request" is shown
226
226
below.
227
227
@@ -323,7 +323,7 @@ The structure fields are defined as follows:
323
323
Scalar values, computed as `concat(SerializeScalar(proof[0]),
324
324
SerializeScalar(proof[1]))`, where Ns is as defined in {{OPRF, Section 4}}.
325
325
326
- The Issuer generates an HTTP response with status code 200 whose content
326
+ The Issuer MUST generate an HTTP response with status code 200 whose content
327
327
consists of TokenResponse, with the content type set as
328
328
" application/private-token-privately-verifiable-batch-response" .
329
329
@@ -409,7 +409,7 @@ struct {
409
409
If the FinalizeBatch function fails, the Client aborts the protocol. Token
410
410
verification works exactly as specified in {{RFC9578}}.
411
411
412
- # Arbitrary Batched Token Issuance
412
+ # Arbitrary Batched Token {#arbitrary-batched-privately-token}
413
413
414
414
This section describes an issuance protocol mechanism for issuing multiple
415
415
tokens in one round trip between Client and Issuer. An arbitrary batched token
@@ -455,7 +455,7 @@ The structure fields are defined as follows:
455
455
456
456
The Client then generates an HTTP POST request to send to the Issuer Request
457
457
URL, with the BatchTokenRequest as the content. The media type for this request
458
- is "application/private-token-arbitrary-batch-request". An example request for
458
+ MUST be "application/private-token-arbitrary-batch-request". An example request for
459
459
the Issuer Request URL "https://issuer.example.net/request" is shown below.
460
460
461
461
~~~
@@ -508,7 +508,7 @@ prefixed with two bytes. OptionalTokenResponse.token_response is a
508
508
length-prefix-encoded TokenResponse, where a length of 0 indicates that the
509
509
Issuer failed or refused to issue the associated TokenRequest.
510
510
511
- The Issuer generates an HTTP response with status code 200 whose content
511
+ The Issuer MUST generate an HTTP response with status code 200 whose content
512
512
consists of TokenResponse, with the content type set as
513
513
" application/private-token-arbitrary-batch-response" .
514
514
@@ -591,7 +591,7 @@ Type name:
591
591
592
592
Subtype name :
593
593
594
- : private-token-request
594
+ : private-token-privately-verifiable-batch- request
595
595
596
596
Required parameters :
597
597
@@ -619,7 +619,8 @@ Published specification:
619
619
620
620
Applications that use this media type :
621
621
622
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
622
+ : Applications that want to issue or facilitate issuance of Privacy Pass
623
+ Batched Privately Verifiable tokens as defined in {{batched-privately-verifiable-token}},
623
624
including Privacy Pass issuer applications themselves.
624
625
625
626
Fragment identifier considerations :
@@ -664,7 +665,7 @@ Type name:
664
665
665
666
Subtype name :
666
667
667
- : private-token-response
668
+ : private-token-privately-verifiable-batch- response
668
669
669
670
Required parameters :
670
671
@@ -692,7 +693,8 @@ Published specification:
692
693
693
694
Applications that use this media type :
694
695
695
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
696
+ : Applications that want to issue or facilitate issuance of Privacy Pass
697
+ Batched Privately Verifiable tokens as defined in {{batched-privately-verifiable-token}},
696
698
including Privacy Pass issuer applications themselves.
697
699
698
700
Fragment identifier considerations :
@@ -737,7 +739,7 @@ Type name:
737
739
738
740
Subtype name :
739
741
740
- : private-token-request
742
+ : private-token-arbitrary-batch- request
741
743
742
744
Required parameters :
743
745
@@ -765,7 +767,8 @@ Published specification:
765
767
766
768
Applications that use this media type :
767
769
768
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
770
+ : Applications that want to issue or facilitate issuance of Privacy Pass
771
+ Arbitrary Batched tokens as defined in {{arbitrary-batched-token}},
769
772
including Privacy Pass issuer applications themselves.
770
773
771
774
Fragment identifier considerations :
@@ -810,7 +813,7 @@ Type name:
810
813
811
814
Subtype name :
812
815
813
- : private-token-response
816
+ : private-token-arbitrary-batch- response
814
817
815
818
Required parameters :
816
819
@@ -838,7 +841,8 @@ Published specification:
838
841
839
842
Applications that use this media type :
840
843
841
- : Applications that want to issue or facilitate issuance of Privacy Pass tokens,
844
+ : Applications that want to issue or facilitate issuance of Privacy Pass
845
+ Arbitrary Batched tokens as defined in {{arbitrary-batched-token}},
842
846
including Privacy Pass issuer applications themselves.
843
847
844
848
Fragment identifier considerations :
0 commit comments