Agree.

There is an exception in some Cyberian applications. Some require splitting
the parser from the validator as separate processes, because the validators
are considered critical processes which must be isolated and protected.
Some network security systems have requirements such as "two separate
implementations"; one for inbound, different one for outbound. In some such
systems, the parser is not (always) subject to this constraint, and may not
even run on the same piece of equipment.

-mikeb

On Wed, Aug 3, 2022 at 2:34 PM Roger L Costello <coste...@mitre.org> wrote:

> *Desired Parsing Behavior*: If data is well-formed and valid, we want
> parsing to produce XML and display no errors. If data is well-formed but
> not valid, we want parsing to produce XML and display errors. If data is
> not well-formed, we want parsing to not produce XML and display errors. Use
> the Daffodil “-V limited” option when parsing from a command line, as it
> results in the desired parsing behavior.
>
>
>
> Do you agree?
>
>
>
> /Roger
>

Reply via email to