xmlsec1-noverify.patch (cdf0e10c) | xmlsec1-noverify.patch (a893be29) |
---|---|
1--- misc/xmlsec1-1.2.14/src/mscrypto/x509vfy.c 2009-06-25 22:53:18.000000000 +0200 2+++ misc/build/xmlsec1-1.2.14/src/mscrypto/x509vfy.c 2009-09-23 10:01:07.237316078 +0200 3@@ -567,9 +567,16 @@ 4 CertFreeCertificateContext(nextCert); 5 } 6 7- if((selected == 1) && xmlSecMSCryptoX509StoreConstructCertsChain(store, cert, certs, keyInfoCtx)) { 8- return(cert); 9- } 10+ /* JL: OpenOffice.org implements its own certificate verification routine. | 1--- misc/xmlsec1-1.2.14/src/mscrypto/x509vfy.c 2009-06-25 22:53:18.000000000 +0200 2+++ misc/build/xmlsec1-1.2.14/src/mscrypto/x509vfy.c 2009-09-23 10:01:07.237316078 +0200 3@@ -567,9 +567,16 @@ 4 CertFreeCertificateContext(nextCert); 5 } 6 7- if((selected == 1) && xmlSecMSCryptoX509StoreConstructCertsChain(store, cert, certs, keyInfoCtx)) { 8- return(cert); 9- } 10+ /* JL: OpenOffice.org implements its own certificate verification routine. |
11+ The goal is to seperate validation of the signature | 11+ The goal is to separate validation of the signature |
12+ and the certificate. For example, OOo could show that the document signature is valid, 13+ but the certificate could not be verified. If we do not prevent the verification of 14+ the certificate by libxmlsec and the verification fails, then the XML signature will not be 15+ verified. This would happen, for example, if the root certificate is not installed. 16+ */ 17+/* if((selected == 1) && xmlSecMSCryptoX509StoreConstructCertsChain(store, cert, certs, keyInfoCtx)) { */ 18+ if (selected == 1) 19+ return cert; --- 11 unchanged lines hidden (view full) --- 31- (SECCertificateUsage)0, 32- timeboundary , NULL, NULL, NULL); 33- if (status == SECSuccess) { 34- break; 35- } 36+ 37+ /* 38+ JL: OpenOffice.org implements its own certificate verification routine. | 12+ and the certificate. For example, OOo could show that the document signature is valid, 13+ but the certificate could not be verified. If we do not prevent the verification of 14+ the certificate by libxmlsec and the verification fails, then the XML signature will not be 15+ verified. This would happen, for example, if the root certificate is not installed. 16+ */ 17+/* if((selected == 1) && xmlSecMSCryptoX509StoreConstructCertsChain(store, cert, certs, keyInfoCtx)) { */ 18+ if (selected == 1) 19+ return cert; --- 11 unchanged lines hidden (view full) --- 31- (SECCertificateUsage)0, 32- timeboundary , NULL, NULL, NULL); 33- if (status == SECSuccess) { 34- break; 35- } 36+ 37+ /* 38+ JL: OpenOffice.org implements its own certificate verification routine. |
39+ The goal is to seperate validation of the signature | 39+ The goal is to separate validation of the signature |
40+ and the certificate. For example, OOo could show that the document signature is valid, 41+ but the certificate could not be verified. If we do not prevent the verification of 42+ the certificate by libxmlsec and the verification fails, then the XML signature may not be 43+ verified. This would happen, for example, if the root certificate is not installed. 44+ 45+ status = CERT_VerifyCertificate(CERT_GetDefaultCertDB(), 46+ cert, PR_FALSE, 47+ (SECCertificateUsage)0, --- 12 unchanged lines hidden --- | 40+ and the certificate. For example, OOo could show that the document signature is valid, 41+ but the certificate could not be verified. If we do not prevent the verification of 42+ the certificate by libxmlsec and the verification fails, then the XML signature may not be 43+ verified. This would happen, for example, if the root certificate is not installed. 44+ 45+ status = CERT_VerifyCertificate(CERT_GetDefaultCertDB(), 46+ cert, PR_FALSE, 47+ (SECCertificateUsage)0, --- 12 unchanged lines hidden --- |