* WGs marked with an * asterisk has had at least one new draft made available during the last 5 days

Changeset 1815


Ignore:
Timestamp:
2012-07-18 12:41:31 (2 years ago)
Author:
julian.reschke@gmx.de
Message:

"b64token" -> "token68" (see #376)

Location:
draft-ietf-httpbis/latest
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • draft-ietf-httpbis/latest/httpbis.abnf

    r1706 r1815  
    7373authority = <authority, defined in [RFC3986], Section 3.2> 
    7474authority-form = authority 
    75 b64token = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) *"=" 
    7675byte-content-range-spec = bytes-unit SP byte-range-resp-spec "/" ( instance-length / "*" ) 
    7776byte-range-resp-spec = ( first-byte-pos "-" last-byte-pos ) / "*" 
     
    8180bytes-unit = "bytes" 
    8281cache-directive = token [ "=" ( token / quoted-string ) ] 
    83 challenge = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *( OWS "," [ OWS auth-param ] ) ] ) ] 
     82challenge = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) *( OWS "," [ OWS auth-param ] ) ] ) ] 
    8483charset = token 
    8584chunk = chunk-size [ chunk-ext ] CRLF chunk-data CRLF 
     
    9493connection-option = token 
    9594content-coding = token 
    96 credentials = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *( OWS "," [ OWS auth-param ] ) ] ) ] 
     95credentials = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) *( OWS "," [ OWS auth-param ] ) ] ) ] 
    9796ctext = OWS / %x21-27 ; '!'-''' 
    9897 / %x2A-5B ; '*'-'[' 
     
    217216time-of-day = hour ":" minute ":" second 
    218217token = 1*tchar 
     218token68 = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) *"=" 
    219219trailer-part = *( header-field CRLF ) 
    220220transfer-coding = "chunked" / "compress" / "deflate" / "gzip" / transfer-extension 
  • draft-ietf-httpbis/latest/p7-auth.html

    r1808 r1815  
    449449  }  
    450450  @bottom-center { 
    451        content: "Expires January 17, 2013";  
     451       content: "Expires January 19, 2013";  
    452452  }  
    453453  @bottom-right { 
     
    490490      <meta name="dct.creator" content="Reschke, J. F."> 
    491491      <meta name="dct.identifier" content="urn:ietf:id:draft-ietf-httpbis-p7-auth-latest"> 
    492       <meta name="dct.issued" scheme="ISO8601" content="2012-07-16"> 
     492      <meta name="dct.issued" scheme="ISO8601" content="2012-07-18"> 
    493493      <meta name="dct.replaces" content="urn:ietf:rfc:2616"> 
    494494      <meta name="dct.abstract" content="The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. This document defines the HTTP Authentication framework."> 
     
    521521            </tr> 
    522522            <tr> 
    523                <td class="left">Expires: January 17, 2013</td> 
     523               <td class="left">Expires: January 19, 2013</td> 
    524524               <td class="right">greenbytes</td> 
    525525            </tr> 
    526526            <tr> 
    527527               <td class="left"></td> 
    528                <td class="right">July 16, 2012</td> 
     528               <td class="right">July 18, 2012</td> 
    529529            </tr> 
    530530         </tbody> 
     
    551551         in progress”. 
    552552      </p> 
    553       <p>This Internet-Draft will expire on January 17, 2013.</p> 
     553      <p>This Internet-Draft will expire on January 19, 2013.</p> 
    554554      <h1><a id="rfc.copyrightnotice" href="#rfc.copyrightnotice">Copyright Notice</a></h1> 
    555555      <p>Copyright © 2012 IETF Trust and the persons identified as the document authors. All rights reserved.</p> 
     
    665665      <p id="rfc.section.2.1.p.2">Parameters are name-value pairs where the name is matched case-insensitively, and each parameter name <em class="bcp14">MUST</em> only occur once per challenge. 
    666666      </p> 
    667       <div id="rfc.figure.u.1"></div><pre class="inline"><span id="rfc.iref.a.1"></span><span id="rfc.iref.a.2"></span><span id="rfc.iref.g.1"></span><span id="rfc.iref.g.2"></span><span id="rfc.iref.b.1"></span><span id="rfc.iref.g.3"></span>  auth-scheme    = <a href="#imported.abnf" class="smpl">token</a> 
     667      <div id="rfc.figure.u.1"></div><pre class="inline"><span id="rfc.iref.a.1"></span><span id="rfc.iref.a.2"></span><span id="rfc.iref.g.1"></span><span id="rfc.iref.g.2"></span><span id="rfc.iref.t.1"></span><span id="rfc.iref.g.3"></span>  auth-scheme    = <a href="#imported.abnf" class="smpl">token</a> 
    668668   
    669669  auth-param     = <a href="#imported.abnf" class="smpl">token</a> <a href="#imported.abnf" class="smpl">BWS</a> "=" <a href="#imported.abnf" class="smpl">BWS</a> ( <a href="#imported.abnf" class="smpl">token</a> / <a href="#imported.abnf" class="smpl">quoted-string</a> ) 
    670670 
    671   b64token       = 1*( <a href="#imported.abnf" class="smpl">ALPHA</a> / <a href="#imported.abnf" class="smpl">DIGIT</a> / 
     671  token68        = 1*( <a href="#imported.abnf" class="smpl">ALPHA</a> / <a href="#imported.abnf" class="smpl">DIGIT</a> / 
    672672                       "-" / "." / "_" / "~" / "+" / "/" ) *"="  
    673 </pre><p id="rfc.section.2.1.p.4">The "b64token" syntax allows the 66 unreserved URI characters (<a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>), plus a few others, so that it can hold a base64, base64url (URL and filename safe alphabet), base32, or base16 (hex) encoding, 
     673</pre><p id="rfc.section.2.1.p.4">The "token68" syntax allows the 66 unreserved URI characters (<a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>), plus a few others, so that it can hold a base64, base64url (URL and filename safe alphabet), base32, or base16 (hex) encoding, 
    674674         with or without padding, but excluding whitespace (<a href="#RFC4648" id="rfc.xref.RFC4648.1"><cite title="The Base16, Base32, and Base64 Data Encodings">[RFC4648]</cite></a>). 
    675675      </p> 
     
    678678      <p id="rfc.section.2.1.p.6">The <a href="#status.407" class="smpl">407 (Proxy Authentication Required)</a> response message is used by a proxy to challenge the authorization of a client and <em class="bcp14">MUST</em> include a <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> header field containing at least one challenge applicable to the proxy for the requested resource. 
    679679      </p> 
    680       <div id="rfc.figure.u.2"></div><pre class="inline"><span id="rfc.iref.c.1"></span><span id="rfc.iref.g.4"></span>  <a href="#challenge.and.response" class="smpl">challenge</a>   = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#imported.abnf" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">b64token</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] 
     680      <div id="rfc.figure.u.2"></div><pre class="inline"><span id="rfc.iref.c.1"></span><span id="rfc.iref.g.4"></span>  <a href="#challenge.and.response" class="smpl">challenge</a>   = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#imported.abnf" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">token68</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] 
    681681</pre><div class="note" id="rfc.section.2.1.p.8">  
    682682         <p> <b>Note:</b> User agents will need to take special care in parsing the <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> and <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> header field values because they can contain more than one challenge, or if more than one of each is provided, since the contents 
     
    698698         user as appropriate. 
    699699      </p> 
    700       <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.c.2"></span><span id="rfc.iref.g.5"></span>  <a href="#challenge.and.response" class="smpl">credentials</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#imported.abnf" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">b64token</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] 
     700      <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.c.2"></span><span id="rfc.iref.g.5"></span>  <a href="#challenge.and.response" class="smpl">credentials</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#imported.abnf" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">token68</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] 
    701701</pre><p id="rfc.section.2.1.p.14">Upon a request for a protected resource that omits credentials, contains invalid credentials (e.g., a bad password) or partial 
    702702         credentials (e.g., when the authentication scheme requires more than one round trip), an origin server <em class="bcp14">SHOULD</em> return a <a href="#status.401" class="smpl">401 (Unauthorized)</a> response. Such responses <em class="bcp14">MUST</em> include a <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> header field containing at least one (possibly new) challenge applicable to the requested resource. 
     
    761761         </li> 
    762762         <li> 
    763             <p>The "b64token" notation was introduced for compatibility with existing authentication schemes and can only be used once per 
     763            <p>The "token68" notation was introduced for compatibility with existing authentication schemes and can only be used once per 
    764764               challenge/credentials. New schemes thus ought to use the "auth-param" syntax instead, because otherwise future extensions 
    765765               will be impossible. 
     
    10891089         (<a href="#access.authentication.framework" title="Access Authentication Framework">Section&nbsp;2</a>) 
    10901090      </p> 
    1091       <p id="rfc.section.A.p.2">The "b64token" alternative to auth-param lists has been added for consistency with legacy authentication schemes such as "Basic". 
     1091      <p id="rfc.section.A.p.2">The "token68" alternative to auth-param lists has been added for consistency with legacy authentication schemes such as "Basic". 
    10921092         (<a href="#access.authentication.framework" title="Access Authentication Framework">Section&nbsp;2</a>) 
    10931093      </p> 
     
    11241124<a href="#challenge.and.response" class="smpl">auth-scheme</a> = token 
    11251125 
    1126 <a href="#challenge.and.response" class="smpl">b64token</a> = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) 
     1126<a href="#challenge.and.response" class="smpl">challenge</a> = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) *( 
     1127 OWS "," [ OWS auth-param ] ) ] ) ] 
     1128<a href="#challenge.and.response" class="smpl">credentials</a> = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) 
     1129 *( OWS "," [ OWS auth-param ] ) ] ) ] 
     1130 
     1131<a href="#imported.abnf" class="smpl">quoted-string</a> = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt; 
     1132 
     1133<a href="#imported.abnf" class="smpl">token</a> = &lt;token, defined in [Part1], Section 3.2.4&gt; 
     1134<a href="#challenge.and.response" class="smpl">token68</a> = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) 
    11271135 *"=" 
    1128  
    1129 <a href="#challenge.and.response" class="smpl">challenge</a> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *( 
    1130  OWS "," [ OWS auth-param ] ) ] ) ] 
    1131 <a href="#challenge.and.response" class="smpl">credentials</a> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) 
    1132  *( OWS "," [ OWS auth-param ] ) ] ) ] 
    1133  
    1134 <a href="#imported.abnf" class="smpl">quoted-string</a> = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt; 
    1135  
    1136 <a href="#imported.abnf" class="smpl">token</a> = &lt;token, defined in [Part1], Section 3.2.4&gt; 
    11371136</pre> <h1 id="rfc.section.D"><a href="#rfc.section.D">D.</a>&nbsp;<a id="change.log" href="#change.log">Change Log (to be removed by RFC Editor before publication)</a></h1> 
    11381137      <p id="rfc.section.D.p.1">Changes up to the first Working Group Last Call draft are summarized in &lt;<a href="http://trac.tools.ietf.org/html/draft-ietf-httpbis-p7-auth-19#appendix-C">http://trac.tools.ietf.org/html/draft-ietf-httpbis-p7-auth-19#appendix-C</a>&gt;. 
     
    11531152      </ul> 
    11541153      <h2 id="rfc.section.D.2"><a href="#rfc.section.D.2">D.2</a>&nbsp;<a id="changes.since.20" href="#changes.since.20">Since draft-ietf-httpbis-p7-auth-20</a></h2> 
    1155       <p id="rfc.section.D.2.p.1">None yet.</p> 
     1154      <p id="rfc.section.D.2.p.1">Closed issues: </p> 
     1155      <ul> 
     1156         <li> &lt;<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/376">http://tools.ietf.org/wg/httpbis/trac/ticket/376</a>&gt;: "rename b64token for clarity" 
     1157         </li> 
     1158      </ul> 
    11561159      <h1 id="rfc.index"><a href="#rfc.index">Index</a></h1> 
    1157       <p class="noprint"><a href="#rfc.index.4">4</a> <a href="#rfc.index.A">A</a> <a href="#rfc.index.B">B</a> <a href="#rfc.index.C">C</a> <a href="#rfc.index.G">G</a> <a href="#rfc.index.H">H</a> <a href="#rfc.index.P">P</a> <a href="#rfc.index.R">R</a> <a href="#rfc.index.S">S</a> <a href="#rfc.index.W">W</a>  
     1160      <p class="noprint"><a href="#rfc.index.4">4</a> <a href="#rfc.index.A">A</a> <a href="#rfc.index.C">C</a> <a href="#rfc.index.G">G</a> <a href="#rfc.index.H">H</a> <a href="#rfc.index.P">P</a> <a href="#rfc.index.R">R</a> <a href="#rfc.index.S">S</a> <a href="#rfc.index.T">T</a> <a href="#rfc.index.W">W</a>  
    11581161      </p> 
    11591162      <div class="print2col"> 
     
    11681171                  <li><tt>auth-scheme</tt>&nbsp;&nbsp;<a href="#rfc.iref.a.1"><b>2.1</b></a></li> 
    11691172                  <li>Authorization header field&nbsp;&nbsp;<a href="#rfc.xref.header.authorization.1">2.1</a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.a.3"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li> 
    1170                </ul> 
    1171             </li> 
    1172             <li><a id="rfc.index.B" href="#rfc.index.B"><b>B</b></a><ul> 
    1173                   <li><tt>b64token</tt>&nbsp;&nbsp;<a href="#rfc.iref.b.1"><b>2.1</b></a></li> 
    11741173               </ul> 
    11751174            </li> 
     
    11861185                        <li><tt>auth-scheme</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.1"><b>2.1</b></a></li> 
    11871186                        <li><tt>Authorization</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.6"><b>4.1</b></a></li> 
    1188                         <li><tt>b64token</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.3"><b>2.1</b></a></li> 
    11891187                        <li><tt>challenge</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.4"><b>2.1</b></a></li> 
    11901188                        <li><tt>credentials</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.5"><b>2.1</b></a></li> 
    11911189                        <li><tt>Proxy-Authenticate</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.7"><b>4.2</b></a></li> 
    11921190                        <li><tt>Proxy-Authorization</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.8"><b>4.3</b></a></li> 
     1191                        <li><tt>token68</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.3"><b>2.1</b></a></li> 
    11931192                        <li><tt>WWW-Authenticate</tt>&nbsp;&nbsp;<a href="#rfc.iref.g.9"><b>4.4</b></a></li> 
    11941193                     </ul> 
     
    12611260               </ul> 
    12621261            </li> 
     1262            <li><a id="rfc.index.T" href="#rfc.index.T"><b>T</b></a><ul> 
     1263                  <li><tt>token68</tt>&nbsp;&nbsp;<a href="#rfc.iref.t.1"><b>2.1</b></a></li> 
     1264               </ul> 
     1265            </li> 
    12631266            <li><a id="rfc.index.W" href="#rfc.index.W"><b>W</b></a><ul> 
    12641267                  <li>WWW-Authenticate header field&nbsp;&nbsp;<a href="#rfc.xref.header.www-authenticate.1">3.1</a>, <a href="#rfc.xref.header.www-authenticate.2">4.2</a>, <a href="#rfc.iref.w.1"><b>4.4</b></a>, <a href="#rfc.xref.header.www-authenticate.3">5.3</a></li> 
  • draft-ietf-httpbis/latest/p7-auth.xml

    r1808 r1815  
    203203  <x:anchor-alias value="auth-scheme"/> 
    204204  <x:anchor-alias value="auth-param"/> 
    205   <x:anchor-alias value="b64token"/> 
     205  <x:anchor-alias value="token68"/> 
    206206  <x:anchor-alias value="challenge"/> 
    207207  <x:anchor-alias value="credentials"/> 
     
    220220   and each parameter name &MUST; only occur once per challenge. 
    221221</t> 
    222 <figure><artwork type="abnf2616"><iref item="auth-scheme" primary="true"/><iref item="auth-param" primary="true"/><iref primary="true" item="Grammar" subitem="auth-scheme"/><iref primary="true" item="Grammar" subitem="auth-param"/><iref item="b64token" primary="true"/><iref primary="true" item="Grammar" subitem="b64token"/> 
     222<figure><artwork type="abnf2616"><iref item="auth-scheme" primary="true"/><iref item="auth-param" primary="true"/><iref primary="true" item="Grammar" subitem="auth-scheme"/><iref primary="true" item="Grammar" subitem="auth-param"/><iref item="token68" primary="true"/><iref primary="true" item="Grammar" subitem="token68"/> 
    223223  auth-scheme    = <x:ref>token</x:ref> 
    224224   
    225225  auth-param     = <x:ref>token</x:ref> <x:ref>BWS</x:ref> "=" <x:ref>BWS</x:ref> ( <x:ref>token</x:ref> / <x:ref>quoted-string</x:ref> ) 
    226226 
    227   b64token       = 1*( <x:ref>ALPHA</x:ref> / <x:ref>DIGIT</x:ref> / 
     227  token68        = 1*( <x:ref>ALPHA</x:ref> / <x:ref>DIGIT</x:ref> / 
    228228                       "-" / "." / "_" / "~" / "+" / "/" ) *"="  
    229229</artwork></figure> 
    230230<t> 
    231    The "b64token" syntax allows the 66 unreserved URI characters (<xref target="RFC3986"/>), 
     231   The "token68" syntax allows the 66 unreserved URI characters (<xref target="RFC3986"/>), 
    232232   plus a few others, so that it can hold a base64, base64url (URL and filename 
    233233   safe alphabet), base32, or base16 (hex) encoding, with or without padding, but 
     
    247247</t> 
    248248<figure><artwork type="abnf2616"><iref item="challenge" primary="true"/><iref primary="true" item="Grammar" subitem="challenge"/> 
    249   <x:ref>challenge</x:ref>   = <x:ref>auth-scheme</x:ref> [ 1*<x:ref>SP</x:ref> ( <x:ref>b64token</x:ref> / #<x:ref>auth-param</x:ref> ) ] 
     249  <x:ref>challenge</x:ref>   = <x:ref>auth-scheme</x:ref> [ 1*<x:ref>SP</x:ref> ( <x:ref>token68</x:ref> / #<x:ref>auth-param</x:ref> ) ] 
    250250</artwork></figure> 
    251251<x:note> 
     
    287287</t> 
    288288<figure><artwork type="abnf2616"><iref item="credentials" primary="true"/><iref primary="true" item="Grammar" subitem="credentials"/> 
    289   <x:ref>credentials</x:ref> = <x:ref>auth-scheme</x:ref> [ 1*<x:ref>SP</x:ref> ( <x:ref>b64token</x:ref> / #<x:ref>auth-param</x:ref> ) ] 
     289  <x:ref>credentials</x:ref> = <x:ref>auth-scheme</x:ref> [ 1*<x:ref>SP</x:ref> ( <x:ref>token68</x:ref> / #<x:ref>auth-param</x:ref> ) ] 
    290290</artwork></figure> 
    291291<t> 
     
    411411    <x:lt> 
    412412    <t> 
    413       The "b64token" notation was introduced for compatibility with existing 
     413      The "token68" notation was introduced for compatibility with existing 
    414414      authentication schemes and can only be used once per challenge/credentials. 
    415415      New schemes thus ought to use the "auth-param" syntax instead, because 
     
    10971097</t> 
    10981098<t> 
    1099   The "b64token" alternative to auth-param lists has been added for consistency 
     1099  The "token68" alternative to auth-param lists has been added for consistency 
    11001100  with legacy authentication schemes such as "Basic". 
    11011101  (<xref target="access.authentication.framework"/>) 
     
    11631163<x:ref>auth-scheme</x:ref> = token 
    11641164 
    1165 <x:ref>b64token</x:ref> = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) 
     1165<x:ref>challenge</x:ref> = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) *( 
     1166 OWS "," [ OWS auth-param ] ) ] ) ] 
     1167<x:ref>credentials</x:ref> = auth-scheme [ 1*SP ( token68 / [ ( "," / auth-param ) 
     1168 *( OWS "," [ OWS auth-param ] ) ] ) ] 
     1169 
     1170<x:ref>quoted-string</x:ref> = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt; 
     1171 
     1172<x:ref>token</x:ref> = &lt;token, defined in [Part1], Section 3.2.4&gt; 
     1173<x:ref>token68</x:ref> = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) 
    11661174 *"=" 
    1167  
    1168 <x:ref>challenge</x:ref> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *( 
    1169  OWS "," [ OWS auth-param ] ) ] ) ] 
    1170 <x:ref>credentials</x:ref> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) 
    1171  *( OWS "," [ OWS auth-param ] ) ] ) ] 
    1172  
    1173 <x:ref>quoted-string</x:ref> = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt; 
    1174  
    1175 <x:ref>token</x:ref> = &lt;token, defined in [Part1], Section 3.2.4&gt; 
    11761175</artwork> 
    11771176</figure> 
     
    12151214<section title="Since draft-ietf-httpbis-p7-auth-20" anchor="changes.since.20"> 
    12161215<t> 
    1217   None yet. 
     1216  Closed issues: 
     1217  <list style="symbols"> 
     1218    <t> 
     1219      <eref target="http://tools.ietf.org/wg/httpbis/trac/ticket/376"/>: 
     1220      "rename b64token for clarity" 
     1221    </t> 
     1222  </list> 
    12181223</t> 
    12191224</section> 
Note: See TracChangeset for help on using the changeset viewer.