From d63aef1df8a6d463d639c7c6142611e8bb661176 Mon Sep 17 00:00:00 2001
From: lsh123
Date: Tue, 22 Nov 2022 21:28:06 -0500
Subject: [PATCH 01/15] fix enc context reset (issue #437) (#438)
---
src/xmlenc.c | 18 +++-
tests/aleksey-xmlenc-01/enc-two-enc-keys.data | 7 ++
tests/aleksey-xmlenc-01/enc-two-enc-keys.tmpl | 32 +++++++
tests/aleksey-xmlenc-01/enc-two-enc-keys.xml | 82 ++++++++++++++++++
tests/keys/README.md | 8 ++
tests/keys/ca2key.p12 | Bin 0 -> 1910 bytes
tests/keys/cakey.p12 | Bin 0 -> 2244 bytes
tests/testEnc.sh | 16 ++++
8 files changed, 159 insertions(+), 4 deletions(-)
create mode 100644 tests/aleksey-xmlenc-01/enc-two-enc-keys.data
create mode 100644 tests/aleksey-xmlenc-01/enc-two-enc-keys.tmpl
create mode 100644 tests/aleksey-xmlenc-01/enc-two-enc-keys.xml
create mode 100644 tests/keys/ca2key.p12
create mode 100644 tests/keys/cakey.p12
diff --git a/src/xmlenc.c b/src/xmlenc.c
index c21a1a149..4312d3739 100644
--- a/src/xmlenc.c
+++ b/src/xmlenc.c
@@ -95,6 +95,17 @@ xmlSecEncCtxDestroy(xmlSecEncCtxPtr encCtx) {
xmlFree(encCtx);
}
+static void
+xmlSecEncCtxSetDefaults(xmlSecEncCtxPtr encCtx) {
+ xmlSecAssert(encCtx != NULL);
+
+ encCtx->keyInfoReadCtx.mode = xmlSecKeyInfoModeRead;
+
+ /* it's not wise to write private key :) */
+ encCtx->keyInfoWriteCtx.mode = xmlSecKeyInfoModeWrite;
+ encCtx->keyInfoWriteCtx.keyReq.keyType = xmlSecKeyDataTypePublic;
+}
+
/**
* xmlSecEncCtxInitialize:
* @encCtx: the pointer to processing context.
@@ -120,16 +131,12 @@ xmlSecEncCtxInitialize(xmlSecEncCtxPtr encCtx, xmlSecKeysMngrPtr keysMngr) {
xmlSecInternalError("xmlSecKeyInfoCtxInitialize", NULL);
return(-1);
}
- encCtx->keyInfoReadCtx.mode = xmlSecKeyInfoModeRead;
ret = xmlSecKeyInfoCtxInitialize(&(encCtx->keyInfoWriteCtx), keysMngr);
if(ret < 0) {
xmlSecInternalError("xmlSecKeyInfoCtxInitialize", NULL);
return(-1);
}
- encCtx->keyInfoWriteCtx.mode = xmlSecKeyInfoModeWrite;
- /* it's not wise to write private key :) */
- encCtx->keyInfoWriteCtx.keyReq.keyType = xmlSecKeyDataTypePublic;
/* initializes transforms encCtx */
ret = xmlSecTransformCtxInitialize(&(encCtx->transformCtx));
@@ -138,6 +145,7 @@ xmlSecEncCtxInitialize(xmlSecEncCtxPtr encCtx, xmlSecKeysMngrPtr keysMngr) {
return(-1);
}
+ xmlSecEncCtxSetDefaults(encCtx);
return(0);
}
@@ -222,6 +230,8 @@ xmlSecEncCtxReset(xmlSecEncCtxPtr encCtx) {
encCtx->encDataNode = encCtx->encMethodNode =
encCtx->keyInfoNode = encCtx->cipherValueNode = NULL;
+
+ xmlSecEncCtxSetDefaults(encCtx);
}
/**
diff --git a/tests/aleksey-xmlenc-01/enc-two-enc-keys.data b/tests/aleksey-xmlenc-01/enc-two-enc-keys.data
new file mode 100644
index 000000000..0532dec5e
--- /dev/null
+++ b/tests/aleksey-xmlenc-01/enc-two-enc-keys.data
@@ -0,0 +1,7 @@
+
+
+]>
+
+test
+
diff --git a/tests/aleksey-xmlenc-01/enc-two-enc-keys.tmpl b/tests/aleksey-xmlenc-01/enc-two-enc-keys.tmpl
new file mode 100644
index 000000000..80e4c7514
--- /dev/null
+++ b/tests/aleksey-xmlenc-01/enc-two-enc-keys.tmpl
@@ -0,0 +1,32 @@
+
+
+
+
+
+
+key1
+
+
+
+
+
+
+
+
+
+
+
+key2
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/tests/aleksey-xmlenc-01/enc-two-enc-keys.xml b/tests/aleksey-xmlenc-01/enc-two-enc-keys.xml
new file mode 100644
index 000000000..62ac11b9b
--- /dev/null
+++ b/tests/aleksey-xmlenc-01/enc-two-enc-keys.xml
@@ -0,0 +1,82 @@
+
+
+]>
+
+
+
+
+
+
+key1
+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+
+
+
+
+OWIZitDwtQp3dvJ2NP2bgQaaiW+Z0vwyh8ajaw7nuwlqQugrbugy9upogbKMpOrz
+XFLfdzfQ5EfRBr2MaPvMkft2wBWfYOS437RNrKdd/MZxZjSPoFRAMBz4F6cVjDx5
+L3/I/3usuqoyYLNtjQTxcIt+sdtNMZnAyVxz/08vEGg=
+
+
+
+
+
+key2
+
+MIIDzzCCAzigAwIBAgIJAK+ii7kzrdqtMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD
+VQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTE9MDsGA1UEChM0WE1MIFNlY3Vy
+aXR5IExpYnJhcnkgKGh0dHA6Ly93d3cuYWxla3NleS5jb20veG1sc2VjKTEQMA4G
+A1UECxMHUm9vdCBDQTEWMBQGA1UEAxMNQWxla3NleSBTYW5pbjEhMB8GCSqGSIb3
+DQEJARYSeG1sc2VjQGFsZWtzZXkuY29tMCAXDTE0MDUyMzE3NTIzOFoYDzIxMTQw
+NDI5MTc1MjM4WjCBnDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWEx
+PTA7BgNVBAoTNFhNTCBTZWN1cml0eSBMaWJyYXJ5IChodHRwOi8vd3d3LmFsZWtz
+ZXkuY29tL3htbHNlYykxFjAUBgNVBAMTDUFsZWtzZXkgU2FuaW4xITAfBgkqhkiG
+9w0BCQEWEnhtbHNlY0BhbGVrc2V5LmNvbTBcMA0GCSqGSIb3DQEBAQUAA0sAMEgC
+QQCyuvKJ2CuUPD33ghPt4Q8MilesHxVbbpyKfmabrYVpDGVDmOKKp337qJUZZ95K
+fwlXbR2j0zyKWJmvRxUx+PsTAgMBAAGjggFFMIIBQTAMBgNVHRMEBTADAQH/MCwG
+CWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNV
+HQ4EFgQU/uTsUyTwlZXHELXhRLVdOWVa434wgeMGA1UdIwSB2zCB2IAUBrWkrKeq
+dUTqFZxP3wWDT2oe/guhgbSkgbEwga4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
+YWxpZm9ybmlhMT0wOwYDVQQKEzRYTUwgU2VjdXJpdHkgTGlicmFyeSAoaHR0cDov
+L3d3dy5hbGVrc2V5LmNvbS94bWxzZWMpMRAwDgYDVQQLEwdSb290IENBMRYwFAYD
+VQQDEw1BbGVrc2V5IFNhbmluMSEwHwYJKoZIhvcNAQkBFhJ4bWxzZWNAYWxla3Nl
+eS5jb22CCQCvoou5M63arDANBgkqhkiG9w0BAQUFAAOBgQBuTAW63AgWqqUDPGi8
+BiXbdKHhFP4J8qgkdv5WMa6SpSWVgNgOYXkK/BSg1aSmQtGv8/8UvBRPoJnO4y0N
+jWUFf1ubOgUNmedYNLq7YbTp8yTGWeogCyM2xdWELMP8BMgQL0sP+MDAFMKO3itY
+mEWnCEsP15HKSTms54RNj7oJ+A==
+
+
+
+
+fDxlxg+iGPUl78ourojHao8/BcxY+A2IQXVghY/OqeQUUD9eT55jrGxgw5UEADoq
+ZD8I/KolksaZ1414NyOIIw==
+
+
+
+
+ORyr/Fi6TMsMMfEWeDy9iPGl43zoKJLbTTukFwOqtfBi0nSdsMkGkmpQAs3a1PsG
+
+
diff --git a/tests/keys/README.md b/tests/keys/README.md
index 02b0efd50..9e5fffce4 100644
--- a/tests/keys/README.md
+++ b/tests/keys/README.md
@@ -226,6 +226,14 @@ keys into PKCS12 form that is suitable for not only NSS but all crypto engines (
password is `secret123`):
```
+cat cakey.pem cacert.pem > allcakey.pem
+openssl pkcs12 -export -in allcakey.pem -name CARsaKey -out cakey.p12
+rm allcakey.pem
+
+cat ca2key.pem ca2cert.pem cacert.pem > allca2key.pem
+openssl pkcs12 -export -in allca2key.pem -name CA2RsaKey -out ca2key.p12
+rm allca2key.pem
+
cat dsakey.pem dsacert.pem ca2cert.pem cacert.pem > alldsa.pem
openssl pkcs12 -export -in alldsa.pem -name TestDsaKey -out dsakey.p12
diff --git a/tests/keys/ca2key.p12 b/tests/keys/ca2key.p12
new file mode 100644
index 0000000000000000000000000000000000000000..54f6bb16b9db90d06778c8d69e5c387978d047ab
GIT binary patch
literal 1910
zcmai#X*8P&7ssC`5{VIgX{4%z)SlQLOSSr1>b1mD)rO+zpe-`B)G}(UsUXH$Qd>>Y
zmMMd#q-tMMZ3wlDYGN;5OFOkx(XrQ<^S-D3I3Mo0=l=iqocrP4^SclY84LpjAR1Cd
zP>4vkq;H6TNbo)lDG8?`u?MmkM1#NnW(nS>!CxFmZ7>ixNcG1W3!?rv4JL#DAe^9(2i+3%5`cq5xM&LHhsudLMs>FGaN4k&
zn%ylL{QSR$7Q~JAyz6NbrBGSpVE9_tus$kru%V)TayvUA;r?j`J4{EUNzXuFvJsSJ
z_&0kqc9UyhtItX4^7Qr^c|FOug}-?EVEx$_!Woh((cP}LFe$RQNNMZV3?t5=)BE+H
z*n|Dr#lAl-*hd*IJt8Hwc!4Q~zY(1D9;2nLGW&@$Reqi;W`Q>|U+-F{JerJH^D=*788-)nkFZa|{HLq-r&
zSUa;)TsYM#6=ihCrzcdX3wU`=hER-G!P^+udjvzN5QRyzA_jZDcXw^1PmaJ6sr{
zkE|2D{j9X*IuNY>6g+pX1vUSPvtA-FnkJ{#V<8&TP%o@!VoWH0^K%>1J;2kE?eREo
zq-k}S&h7p0@gZNub-V+u%2+%zGGKKOHSEnXwqGos4O##R+Q3rc1gOEp}TbwX)Dk
zsG8cvivza|?AiBhB2ckc4n?;eCg0i)1iXS9H1+&)_qI1Q;Gvs)XU>-EnTV=6IxUwt
zn)GLlosC~2x-O|$b8V9N2Ezp@?j}KEsn=Ld4r{J2hl)m(8U|9V9_rF2qXjukyQE_u
z&bL@6Rmn9xqAHm)9d)$fNj7F6AvfU^Q{~k}?~jp%5Ixr)8p-MA+Yb|nA%PuK+2bzw
zuwkFJ%iz#7GLtvi#z=!UgUay&Q}NCli+$8Ht`r0Ul5O4H8b4Ev6)cnEUJ8l;j#)0$
zU2Q1JhD{GCyC044o>B<71ddH~NgA!+dp~xyR_g|H=}v-Ys8!L*W%eo3Mp$#|`wVk;
z6&;y|n0QBl%#Z$odsa^QS2Pni6&M&nwC40?PQLS8<5QkiPD;01AAnCc(v?sa@RAYq
z^B4`MWhY?;=q-l1ACzQ%w!G)hB$_mOMyhgn7`GwcbTKJoMJmy!v-FE3r6uvIHWQ4J
zOKlfNX7Ac{-;PG8h_f-jbXCi$2|sYD+LbmPUcZtTjt>ksT|J*D?|{ce597!6?D<=S
zVw0z~LHlAs18O&NZEs2|D)Ai0t!GiHIX?{y7_*)=L*z4CNdedf(lMqJFUaGdAY
z+-xw9NV}a}u^o&QY2RN#^=SLHR~Y{N{*Q3@RIE{>eSL%btV{|0aUoV?R+@jRj{Hz5
zAO^=PV*x4pr59g62+^{5H@yYD+-8YA+2+r9yjX$WQ6yrJ$u-#P?GLS#
zMdM>O{uJw}FgyIQw+{2&V6?>vuAu-2gPk%Bmx4(vc8=j=^=(k*_zqzgO0JQxt-L%n
zW!`rSt@9h2mD)>RcrUCyo6SN$tp0sk(zSn*D(dRPS6Kfy{|R<22PoTQJ54;O$h~z4
zOuZYb;Af!0&hO_yG}y_neEJ)BFcmlrrf?wR4?!L~O!l$Yr!H@U8KXI3
z;w*2>QSRN@w=Ns~6PTBAr5v|u?>gMbk&#wn>7jM78@(nLyp^XS9@jka^&M2PB)X;G5UeJ(tTkd
zGw0H%5M_A;eTVlk_M
z6y%Kt$pw5U|JA;F94Sg5>tD1<+42pw^uVx)5}&;sB(l~?V}54lhi*>f<;CH+HslLo
z%-f+tE4+ofbx4~*(v7MK{rcsO=Nmf-gz3;Kb75D$s(q`Fal4e|uY0?_TqlE2mlN+=
z4Jwb_;Z0?@S9`p$S%NncPKs06Zu+~C<(#Z3yh7gbL05oLJF~XoQ*Asy%kJxx?%(Kc
zGjTa7FBgzMrPKUFvX&)u{OiJn#I?j_4g;ou37`#-fe^qGumQY)a7g}J3s&n0T$~>z
zLRsL%L?KW{ov0LuhecuqzzpvvjPTW!K
literal 0
HcmV?d00001
diff --git a/tests/keys/cakey.p12 b/tests/keys/cakey.p12
new file mode 100644
index 0000000000000000000000000000000000000000..b3ea9c8b9a5207ebbdf721b3e5a249359fb76153
GIT binary patch
literal 2244
zcmai#c{me}AIE2AHrw3y87g6zTSVrLoH;62u4%52`${WUBiCAv+=gW3YOWk%(&3De
zrBFGlDTK)J?fd+GPyPA*2)1QF_fig$Q{vF{cQ4qu{@EA<9
z>~IhWgaA-*Fyw#NfKV0yN(>CWlx)W2!wh1Q194th#-fLXPYS>TKPz^o>|9R7ff6mm
zs2#zpjg#_hM=q;WzxDIkX=?G6lTf-#QZ`yo8W(H01Na=;_UY4H81eO>QoO#l3V3uu
z2bkk181@}CSV{JWZlo3tPc9U}VMS(ese`J>>CEWBAkW%iUQIYj&M2&lo?WKlO|{W)
zo|xh@A5mLo;=%SYQT
zP~nMQ$K!}bUAJT%3&p)Ue;vNPdBzZ2mPO3HeYHmdYKcI14nxH+B7T^w^rqj6J8hmK
zSzIcD-Fst_E#xjppoQHFDG<%X>qkuM!%rL$Xjg4$VXkajIsvvkMdptA2A0&ivUsks
z3X0ubgGY|HMUpx$Nk@3!si&=E3Z2h7G-8;8B{d9WDwWzyS2Ef~%3kZ4hM)*@z)@D}
z#S(Qd4$n91#L!I+`T>%(V%T|du<0f=&{Wg7kwa;`#O&gnF1wy{0cPhm5g7FykX
zmwmhvPcHKK$1$_p)}=|&s^g++qLdeYQ0S6U!ckvxuiM;yB&IdxD>};^;V
zDMrMUx-lEoRo=)+{
z(%W*6l`Bb+PEU7m9x(ws5;S0|;xL*4I8i3ofl-rHk$q@(ocoj4qT4~iNY*xBL^a*4
z+z?6D;Q|?l@BTW^F?41OAU4YFr7*p5vT0{KcFA7)0YJ0cT0MDvC@HF&uqkXQ5~SzU
zq2jHwAEH~Ht*U%9%P?Kd^qWHBMw4WK3Vu`~`VE%f9r=b+Y+=N|E1z%yUv4Cj$oN9Y
z7a1wyB~txi*UZ+b?p
z!ZM=T)l91>s-qN-kBQp+nbNR#`7urX*U0x>L)@?MEdh+`T?Sk4#C!gdme9bEuBx
zi*}U;1<-n7n)IfYua_cJ(OVK>8
zozmcf{@`1)maIRO6=7^^q9`s>F<|oP)>RagpE@jVJ!sQ3LXpK&O
z&7k6rb#sU$7xeTfsYGfgrzh>XQjReW5ut75$_)D4-=lTW6c%^t1&*{^=^+OGCvLc4|f
z4ZDi&cU5;-@RaJeM_{?*h`Q_Qp*06o`v;XzXKvuT`x$|fTJn?eT^ziu~r3{`Tz`_M<^>)Z!SMC^Rjs%cjBbo^qBc*6Cd3vKSrCN0_(`jr~l
zG0iSeg&1dZ+JY5FfG9h^K4|}*d<6UyKEGVh+W=%)djIlAOwGVkwfJEDgmv*Et77Xx
zkw{_QCpAw>?t`!q-q`T-g{GQYZ+Wm%gHwtWE}cP0lNx=v%`HuDEFnJ}y_VV>U|*G+
zQHffd4o8t)sIL9J&h3SjFn0<++O;dT#qeUD>g(NSH|BnY5COKJWjCz1TwNv
Date: Mon, 28 Nov 2022 16:09:51 -0500
Subject: [PATCH 02/15] fix missing returns and full audit for all errors
(issue #449) (#450)
---
scripts/check-return.pl | 23 +++++++++++++++++++++++
src/dl.c | 3 +++
src/gcrypt/signatures.c | 10 +++++-----
src/gnutls/x509vfy.c | 6 +++---
src/keyinfo.c | 5 +++--
src/mscng/certkeys.c | 2 ++
src/mscng/x509.c | 4 ++++
src/mscng/x509vfy.c | 6 +++++-
src/mscrypto/signatures.c | 2 +-
src/nss/signatures.c | 2 +-
src/openssl/evp_signatures.c | 2 +-
src/openssl/kt_rsa.c | 2 ++
src/openssl/signatures.c | 2 +-
src/openssl/x509vfy.c | 13 ++++++++-----
src/xmldsig.c | 1 +
src/xmlsec.c | 11 +++++++++--
src/xmltree.c | 1 +
17 files changed, 73 insertions(+), 22 deletions(-)
create mode 100644 scripts/check-return.pl
diff --git a/scripts/check-return.pl b/scripts/check-return.pl
new file mode 100644
index 000000000..fdd1bcf56
--- /dev/null
+++ b/scripts/check-return.pl
@@ -0,0 +1,23 @@
+#!/bin/perl
+#
+# Usage:
+# egrep -r -A8 -n 'xmlSec.*Error[0-9]?\(' ./src/ | sed 's/ //g' | perl ./scripts/check-return.pl
+#
+
+my $has_return = 0;
+my $where = "";
+foreach my $line ( ) {
+ chomp( $line );
+ if($line eq "--" || $line eq '}' || $line eq 'continue' || $line eq 'break') {
+ if(not $has_return) {
+ print("FOUND MISSING RETURN: $where\n");
+ }
+ $has_return = 0;
+ $where = "";
+ } elsif($line =~ /.*Error.*/ && $where eq "") {
+ # print("Found error: $line\n");
+ $where = $line
+ } elsif($line =~ /.*goto.*/ || $line =~ /.*return.*/ || $line =~ /.*ignoreerror.*/) {
+ $has_return = 1;
+ }
+}
\ No newline at end of file
diff --git a/src/dl.c b/src/dl.c
index 03aa9f2e6..ea81d2b8f 100644
--- a/src/dl.c
+++ b/src/dl.c
@@ -223,6 +223,7 @@ xmlSecCryptoDLLibraryDestroy(xmlSecCryptoDLLibraryPtr lib) {
ret = lt_dlclose(lib->handle);
if(ret != 0) {
xmlSecIOError("lt_dlclose", NULL, NULL);
+ /* ignore error */
}
}
#endif /* XMLSEC_DL_LIBLTDL */
@@ -234,6 +235,7 @@ xmlSecCryptoDLLibraryDestroy(xmlSecCryptoDLLibraryPtr lib) {
res = FreeLibrary(lib->handle);
if(!res) {
xmlSecIOError("FreeLibrary", NULL, NULL);
+ /* ignore error */
}
}
#endif /* defined(XMLSEC_WINDOWS) && defined(XMLSEC_DL_WIN32)*/
@@ -395,6 +397,7 @@ xmlSecCryptoDLShutdown(void) {
ret = lt_dlexit ();
if(ret != 0) {
xmlSecIOError("lt_dlexit", NULL, NULL);
+ /* ignore error */
}
#else /* XMLSEC_DL_LIBLTDL */
UNREFERENCED_PARAMETER(ret);
diff --git a/src/gcrypt/signatures.c b/src/gcrypt/signatures.c
index 5a4e4e4da..338ec8f1e 100644
--- a/src/gcrypt/signatures.c
+++ b/src/gcrypt/signatures.c
@@ -388,16 +388,16 @@ xmlSecGCryptPkSignatureVerify(xmlSecTransformPtr transform,
}
/* check result */
- if(ret == 1) {
- transform->status = xmlSecTransformStatusOk;
- } else {
+ if(ret != 1) {
xmlSecOtherError(XMLSEC_ERRORS_R_DATA_NOT_MATCH,
xmlSecTransformGetName(transform),
- "ctx->verify: signature does not verify");
+ "ctx->verify: signature verification failed");
transform->status = xmlSecTransformStatusFail;
+ return(0);
}
- /* done */
+ /* success */
+ transform->status = xmlSecTransformStatusOk;
return(0);
}
diff --git a/src/gnutls/x509vfy.c b/src/gnutls/x509vfy.c
index b0cbb6b81..b557b0960 100644
--- a/src/gnutls/x509vfy.c
+++ b/src/gnutls/x509vfy.c
@@ -406,12 +406,12 @@ xmlSecGnuTLSX509StoreVerify(xmlSecKeyDataStorePtr store,
}
if(err != GNUTLS_E_SUCCESS) {
xmlSecGnuTLSError("gnutls_x509_crt_list_verify", err, NULL);
- /* don't stop, continue! */
+ /* ignore error, don't stop, continue! */
continue;
} else if(verify != 0) {
xmlSecOtherError2(XMLSEC_ERRORS_R_CERT_VERIFY_FAILED, NULL,
"gnutls_x509_crt_list_verify: verification failed: status=%u", verify);
- /* don't stop, continue! */
+ /* ignore error, don't stop, continue! */
continue;
}
@@ -420,7 +420,7 @@ xmlSecGnuTLSX509StoreVerify(xmlSecKeyDataStorePtr store,
ret = xmlSecGnuTLSX509CheckTime(cert_list, cert_list_cur_size, verification_time);
if(ret != 1) {
xmlSecInternalError("xmlSecGnuTLSX509CheckTime", NULL);
- /* don't stop, continue! */
+ /* ignore error, don't stop, continue! */
continue;
}
diff --git a/src/keyinfo.c b/src/keyinfo.c
index 18c48cd83..dd17673f2 100644
--- a/src/keyinfo.c
+++ b/src/keyinfo.c
@@ -1053,9 +1053,10 @@ xmlSecKeyDataRetrievalMethodXmlRead(xmlSecKeyDataId id, xmlSecKeyPtr key, xmlNod
if((keyInfoCtx->flags & XMLSEC_KEYINFO_FLAGS_RETRMETHOD_STOP_ON_UNKNOWN_HREF) != 0) {
xmlSecInvalidNodeAttributeError(node, xmlSecAttrType, xmlSecKeyDataKlassGetName(id),
"retrieval type is unknown");
- } else {
- res = 0;
+ goto done;
}
+
+ res = 0;
goto done;
}
diff --git a/src/mscng/certkeys.c b/src/mscng/certkeys.c
index c0053d355..14659607e 100644
--- a/src/mscng/certkeys.c
+++ b/src/mscng/certkeys.c
@@ -304,6 +304,7 @@ xmlSecMSCngKeyDataFinalize(xmlSecKeyDataPtr data) {
status = NCryptFreeObject(ctx->privkey);
if(status != STATUS_SUCCESS) {
xmlSecMSCngNtError("BCryptDestroyKey", NULL, status);
+ /* ignore error */
}
}
@@ -311,6 +312,7 @@ xmlSecMSCngKeyDataFinalize(xmlSecKeyDataPtr data) {
status = BCryptDestroyKey(ctx->pubkey);
if(status != STATUS_SUCCESS) {
xmlSecMSCngNtError("BCryptDestroyKey", NULL, status);
+ /* ignore error */
}
}
diff --git a/src/mscng/x509.c b/src/mscng/x509.c
index 30ed19a76..36e9bc46c 100644
--- a/src/mscng/x509.c
+++ b/src/mscng/x509.c
@@ -134,12 +134,14 @@ xmlSecMSCngKeyDataX509Finalize(xmlSecKeyDataPtr data) {
if(ctx->cert != NULL) {
if(!CertFreeCertificateContext(ctx->cert)) {
xmlSecMSCngLastError("CertFreeCertificateContext", NULL);
+ /* ignore error */
}
}
if(ctx->hMemStore != 0) {
if(!CertCloseStore(ctx->hMemStore, 0)) {
xmlSecMSCngLastError("CertCloseStore", NULL);
+ /* ignore error */
}
}
@@ -820,6 +822,7 @@ xmlSecMSCngKeyDataX509DebugDump(xmlSecKeyDataPtr data, FILE* output) {
xmlSecAssert(output != NULL);
xmlSecNotImplementedError(NULL);
+ /* ignore error */
}
static void
@@ -828,6 +831,7 @@ xmlSecMSCngKeyDataX509DebugXmlDump(xmlSecKeyDataPtr data, FILE* output) {
xmlSecAssert(output != NULL);
xmlSecNotImplementedError(NULL);
+ /* ignore error */
}
static xmlSecKeyDataKlass xmlSecMSCngKeyDataX509Klass = {
diff --git a/src/mscng/x509vfy.c b/src/mscng/x509vfy.c
index 95e7807b4..87da7110e 100644
--- a/src/mscng/x509vfy.c
+++ b/src/mscng/x509vfy.c
@@ -65,6 +65,7 @@ xmlSecMSCngX509StoreFinalize(xmlSecKeyDataStorePtr store) {
ret = CertCloseStore(ctx->trusted, CERT_CLOSE_STORE_CHECK_FLAG);
if(ret == FALSE) {
xmlSecMSCngLastError("CertCloseStore", xmlSecKeyDataStoreGetName(store));
+ /* ignore error */
}
}
@@ -72,6 +73,7 @@ xmlSecMSCngX509StoreFinalize(xmlSecKeyDataStorePtr store) {
ret = CertCloseStore(ctx->trustedMemStore, CERT_CLOSE_STORE_CHECK_FLAG);
if(ret == FALSE) {
xmlSecMSCngLastError("CertCloseStore", xmlSecKeyDataStoreGetName(store));
+ /* ignore error */
}
}
@@ -79,6 +81,7 @@ xmlSecMSCngX509StoreFinalize(xmlSecKeyDataStorePtr store) {
ret = CertCloseStore(ctx->untrusted, CERT_CLOSE_STORE_CHECK_FLAG);
if(ret == FALSE) {
xmlSecMSCngLastError("CertCloseStore", xmlSecKeyDataStoreGetName(store));
+ /* ignore error */
}
}
@@ -86,7 +89,8 @@ xmlSecMSCngX509StoreFinalize(xmlSecKeyDataStorePtr store) {
ret = CertCloseStore(ctx->untrustedMemStore, CERT_CLOSE_STORE_CHECK_FLAG);
if(ret == FALSE) {
xmlSecMSCngLastError("CertCloseStore", xmlSecKeyDataStoreGetName(store));
- }
+ /* ignore error */
+ }
}
memset(ctx, 0, sizeof(xmlSecMSCngX509StoreCtx));
diff --git a/src/mscrypto/signatures.c b/src/mscrypto/signatures.c
index cbcc286fa..64ad383ee 100644
--- a/src/mscrypto/signatures.c
+++ b/src/mscrypto/signatures.c
@@ -408,7 +408,7 @@ static int xmlSecMSCryptoSignatureVerify(xmlSecTransformPtr transform,
dwError = GetLastError();
if (NTE_BAD_SIGNATURE == HRESULT_FROM_WIN32(dwError)) {
xmlSecOtherError(XMLSEC_ERRORS_R_DATA_NOT_MATCH, xmlSecTransformGetName(transform),
- "CryptVerifySignature: signature does not verify");
+ "CryptVerifySignature: signature verification failed");
transform->status = xmlSecTransformStatusFail;
goto done;
} else {
diff --git a/src/nss/signatures.c b/src/nss/signatures.c
index a13c77d5d..9c39d372c 100644
--- a/src/nss/signatures.c
+++ b/src/nss/signatures.c
@@ -459,7 +459,7 @@ xmlSecNssSignatureVerify(xmlSecTransformPtr transform,
if (PORT_GetError() == SEC_ERROR_PKCS7_BAD_SIGNATURE) {
xmlSecOtherError(XMLSEC_ERRORS_R_DATA_NOT_MATCH,
xmlSecTransformGetName(transform),
- "VFY_EndWithSignature: signature does not verify");
+ "VFY_EndWithSignature: signature verification failed");
transform->status = xmlSecTransformStatusFail;
} else {
xmlSecNssError("VFY_EndWithSignature",
diff --git a/src/openssl/evp_signatures.c b/src/openssl/evp_signatures.c
index e1ce02b68..7e1605e2b 100644
--- a/src/openssl/evp_signatures.c
+++ b/src/openssl/evp_signatures.c
@@ -452,7 +452,7 @@ xmlSecOpenSSLEvpSignatureVerify(xmlSecTransformPtr transform,
} else if(ret != 1) {
xmlSecOtherError(XMLSEC_ERRORS_R_DATA_NOT_MATCH,
xmlSecTransformGetName(transform),
- "EVP_VerifyFinal: signature does not verify");
+ "EVP_VerifyFinal: signature verification failed");
transform->status = xmlSecTransformStatusFail;
return(0);
}
diff --git a/src/openssl/kt_rsa.c b/src/openssl/kt_rsa.c
index 6a86bace4..5431084ed 100644
--- a/src/openssl/kt_rsa.c
+++ b/src/openssl/kt_rsa.c
@@ -526,6 +526,7 @@ xmlSecOpenSSLRsaPkcs1Process(xmlSecTransformPtr transform) {
if(ret < 0) {
xmlSecInternalError("xmlSecOpenSSLRsaPkcs1ProcessImpl",
xmlSecTransformGetName(transform));
+ return(-1);
}
ret = xmlSecBufferSetSize(out, outSize);
@@ -811,6 +812,7 @@ xmlSecOpenSSLRsaOaepSetKeyImpl(xmlSecOpenSSLRsaOaepCtxPtr ctx, EVP_PKEY* pKey,
ctx->pKeyCtx = EVP_PKEY_CTX_new_from_pkey(xmlSecOpenSSLGetLibCtx(), pKey, NULL);
if (ctx->pKeyCtx == NULL) {
xmlSecOpenSSLError("EVP_PKEY_CTX_new_from_pkey", NULL);
+ return (-1);
}
if (encrypt != 0) {
diff --git a/src/openssl/signatures.c b/src/openssl/signatures.c
index 307726321..9e40a099e 100644
--- a/src/openssl/signatures.c
+++ b/src/openssl/signatures.c
@@ -501,7 +501,7 @@ xmlSecOpenSSLSignatureVerify(xmlSecTransformPtr transform,
} else {
xmlSecOtherError(XMLSEC_ERRORS_R_DATA_NOT_MATCH,
xmlSecTransformGetName(transform),
- "ctx->verifyCallback: signature does not verify");
+ "ctx->verifyCallback: signature verification failed");
transform->status = xmlSecTransformStatusFail;
}
diff --git a/src/openssl/x509vfy.c b/src/openssl/x509vfy.c
index e168517e1..5f6e4dd1c 100644
--- a/src/openssl/x509vfy.c
+++ b/src/openssl/x509vfy.c
@@ -250,7 +250,6 @@ xmlSecOpenSSLX509StoreVerify(xmlSecKeyDataStorePtr store, XMLSEC_STACK_OF_X509*
xmlSecAssert2(ctx != NULL, NULL);
xmlSecAssert2(ctx->xst != NULL, NULL);
- /* dup certs */
certs2 = sk_X509_dup(certs);
if(certs2 == NULL) {
xmlSecOpenSSLError("sk_X509_dup",
@@ -391,6 +390,7 @@ xmlSecOpenSSLX509StoreVerify(xmlSecKeyDataStorePtr store, XMLSEC_STACK_OF_X509*
xmlSecKeyDataStoreGetName(store),
"X509_verify_cert: subject=%s; issuer=%s; err=%d; msg=%s",
subject, issuer, err, xmlSecErrorsSafeString(err_msg));
+ /* ignore error */
}
}
}
@@ -410,27 +410,30 @@ xmlSecOpenSSLX509StoreVerify(xmlSecKeyDataStorePtr store, XMLSEC_STACK_OF_X509*
xmlSecKeyDataStoreGetName(store),
"subject=%s; issuer=%s; err=%d; msg=%s",
subject, issuer, err, xmlSecErrorsSafeString(err_msg));
- break;
+ goto done;
+
case X509_V_ERR_CERT_NOT_YET_VALID:
case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
xmlSecOtherError5(XMLSEC_ERRORS_R_CERT_NOT_YET_VALID,
xmlSecKeyDataStoreGetName(store),
"subject=%s; issuer=%s; err=%d; msg=%s",
subject, issuer, err, xmlSecErrorsSafeString(err_msg));
- break;
+ goto done;
+
case X509_V_ERR_CERT_HAS_EXPIRED:
case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
xmlSecOtherError5(XMLSEC_ERRORS_R_CERT_HAS_EXPIRED,
xmlSecKeyDataStoreGetName(store),
"subject=%s; issuer=%s; err=%d; msg=%s",
subject, issuer, err, xmlSecErrorsSafeString(err_msg));
- break;
+ goto done;
+
default:
xmlSecOtherError5(XMLSEC_ERRORS_R_CERT_VERIFY_FAILED,
xmlSecKeyDataStoreGetName(store),
"subject=%s; issuer=%s; err=%d; msg=%s",
subject, issuer, err, xmlSecErrorsSafeString(err_msg));
- break;
+ goto done;
}
}
diff --git a/src/xmldsig.c b/src/xmldsig.c
index e7a8b44c8..668ea2382 100644
--- a/src/xmldsig.c
+++ b/src/xmldsig.c
@@ -655,6 +655,7 @@ xmlSecDSigCtxProcessSignedInfoNode(xmlSecDSigCtxPtr dsigCtx, xmlNodePtr node, xm
if(dsigCtx->preSignMemBufMethod == NULL) {
xmlSecInternalError("xmlSecTransformCtxCreateAndAppend",
xmlSecTransformKlassGetName(xmlSecTransformMemBufId));
+ return(-1);
}
}
diff --git a/src/xmlsec.c b/src/xmlsec.c
index c36dc7f2a..6da57caa9 100644
--- a/src/xmlsec.c
+++ b/src/xmlsec.c
@@ -130,7 +130,7 @@ xmlSecInit(void) {
*/
int
xmlSecShutdown(void) {
- int res = 0;
+ int res = -1;
xmlSecTransformIdsShutdown();
xmlSecKeyDataIdsShutdown();
@@ -138,10 +138,17 @@ xmlSecShutdown(void) {
#ifndef XMLSEC_NO_CRYPTO_DYNAMIC_LOADING
if(xmlSecCryptoDLShutdown() < 0) {
xmlSecInternalError("xmlSecCryptoDLShutdown", NULL);
- res = -1;
+ goto done;
}
#endif /* XMLSEC_NO_CRYPTO_DYNAMIC_LOADING */
+ /* success */
+ res = 0;
+
+#ifndef XMLSEC_NO_CRYPTO_DYNAMIC_LOADING
+done:
+#endif /* XMLSEC_NO_CRYPTO_DYNAMIC_LOADING */
+
xmlSecIOShutdown();
xmlSecErrorsShutdown();
return(res);
diff --git a/src/xmltree.c b/src/xmltree.c
index 13e0a6d97..b2ef6e734 100644
--- a/src/xmltree.c
+++ b/src/xmltree.c
@@ -768,6 +768,7 @@ xmlSecAddIDs(xmlDocPtr doc, xmlNodePtr cur, const xmlChar** ids) {
xmlAddID(NULL, doc, name, attr);
} else if(tmp != attr) {
xmlSecInvalidStringDataError("id", name, "unique id (id already defined)", NULL);
+ /* ignore error */
}
xmlFree(name);
}
From 7a874b4533a67375591eb71f0dba0e653f2f36d1 Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 16:17:53 -0500
Subject: [PATCH 03/15] update docs
---
configure.ac | 4 ++--
docs/download.html | 2 +-
docs/index.html | 8 ++++++++
docs/news.html | 8 ++++++++
4 files changed, 19 insertions(+), 3 deletions(-)
diff --git a/configure.ac b/configure.ac
index a308425b9..e28819d97 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,10 +1,10 @@
dnl Process this file with autoconf to produce a configure script.
-AC_INIT([xmlsec1],[1.2.36],[http://www.aleksey.com/xmlsec])
+AC_INIT([xmlsec1],[1.2.37],[http://www.aleksey.com/xmlsec])
XMLSEC_PACKAGE=xmlsec1
XMLSEC_VERSION_MAJOR=1
XMLSEC_VERSION_MINOR=2
-XMLSEC_VERSION_SUBMINOR=36
+XMLSEC_VERSION_SUBMINOR=37
XMLSEC_VERSION="$XMLSEC_VERSION_MAJOR.$XMLSEC_VERSION_MINOR.$XMLSEC_VERSION_SUBMINOR"
XMLSEC_VERSION_INFO=`echo $XMLSEC_VERSION | awk -F. '{ printf "%d:%d:%d", $1+$2, $3, $2 }'`
XMLSEC_VERSION_SAFE=`echo $XMLSEC_VERSION | sed 's/\./_/g'`
diff --git a/docs/download.html b/docs/download.html
index 67af4b292..8b86df4a1 100644
--- a/docs/download.html
+++ b/docs/download.html
@@ -48,7 +48,7 @@
Download
Stable releases.
-The latest stable XML Security Library version is 1.2.36:
+The latest stable XML Security Library version is 1.2.37:
-
Sources for latest version.
diff --git a/docs/index.html b/docs/index.html
index 2c2f2bbf6..0589ebf48 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -67,6 +67,14 @@ XML Security Library
see the Copyright file in the distribution for details.
News
+- November 30 2022
+ The XML Security Library 1.2.37 release includes the following changes:
+
+
+
- October 31 2022
The XML Security Library 1.2.36 release includes the following changes:
diff --git a/docs/news.html b/docs/news.html
index b732a0e15..5f555a093 100644
--- a/docs/news.html
+++ b/docs/news.html
@@ -48,6 +48,14 @@
XML Security Library News
+ - November 30 2022
+ The XML Security Library 1.2.37 release includes the following changes:
+
+
+
- October 31 2022
The XML Security Library 1.2.36 release includes the following changes:
From 9cf095c732a8bf735e75e3db448a63e2d28317f3 Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 16:21:25 -0500
Subject: [PATCH 04/15] update docs for 1.2.37 release
---
docs/api/xmlsec-version.html | 6 +++---
man/xmlsec1-config.1 | 2 +-
man/xmlsec1.1 | 2 +-
scripts/build_docs.sh | 18 ++++++++++++++++++
4 files changed, 23 insertions(+), 5 deletions(-)
create mode 100644 scripts/build_docs.sh
diff --git a/docs/api/xmlsec-version.html b/docs/api/xmlsec-version.html
index 2f6a6c314..8705de0f9 100644
--- a/docs/api/xmlsec-version.html
+++ b/docs/api/xmlsec-version.html
@@ -78,7 +78,7 @@ version
Types and Values
XMLSEC_VERSION
-
#define XMLSEC_VERSION "1.2.36"
+#define XMLSEC_VERSION "1.2.37"
The library version string in the format
"$major_number.$minor_number.$sub_minor_number".
@@ -100,14 +100,14 @@ version
XMLSEC_VERSION_SUBMINOR
-
#define XMLSEC_VERSION_SUBMINOR 36
+#define XMLSEC_VERSION_SUBMINOR 37
The library sub-minor version number.
XMLSEC_VERSION_INFO
-
#define XMLSEC_VERSION_INFO "3:36:2"
+#define XMLSEC_VERSION_INFO "3:37:2"
The library version info string in the format
"$major_number+$minor_number:$sub_minor_number:$minor_number".
diff --git a/man/xmlsec1-config.1 b/man/xmlsec1-config.1
index aa2c56ce8..b39d30f11 100644
--- a/man/xmlsec1-config.1
+++ b/man/xmlsec1-config.1
@@ -1,5 +1,5 @@
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.49.1.
-.TH XMLSEC1-CONFIG "1" "October 2022" "xmlsec1-config 1.2.36" "User Commands"
+.TH XMLSEC1-CONFIG "1" "November 2022" "xmlsec1-config 1.2.37" "User Commands"
.SH NAME
xmlsec1-config \- detail installed version of xmlsec library
.SH SYNOPSIS
diff --git a/man/xmlsec1.1 b/man/xmlsec1.1
index c9aa528ee..b4f3a82f9 100644
--- a/man/xmlsec1.1
+++ b/man/xmlsec1.1
@@ -1,5 +1,5 @@
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.49.1.
-.TH XMLSEC1 "1" "October 2022" "xmlsec1 1.2.36 (openssl)" "User Commands"
+.TH XMLSEC1 "1" "November 2022" "xmlsec1 1.2.37 (openssl)" "User Commands"
.SH NAME
xmlsec1 \- sign, verify, encrypt and decrypt XML documents
.SH SYNOPSIS
diff --git a/scripts/build_docs.sh b/scripts/build_docs.sh
new file mode 100644
index 000000000..362a077f0
--- /dev/null
+++ b/scripts/build_docs.sh
@@ -0,0 +1,18 @@
+#!/bin/sh
+
+# config
+configure_options=""
+configure_options="$configure_options --enable-static-linking --enable-crypto-dl=no"
+configure_options="$configure_options --enable-manpages-build --enable-docs-build"
+configure_options="$configure_options --enable-md5 --enable-ripemd160"
+cur_pwd=`pwd`
+today=`date +%F-%H-%M-%S`
+
+echo "============= Building xmlsec"
+make distclean
+./autogen.sh $configure_options
+make
+
+echo "============== Cleanup"
+cd "$cur_pwd"
+
From 68f1e089deaa0cb3b20f47ac6c9a440e66fd99bb Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 16:24:11 -0500
Subject: [PATCH 05/15] update build script
---
scripts/build_release.sh | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/scripts/build_release.sh b/scripts/build_release.sh
index e1e164ebf..de46de33e 100755
--- a/scripts/build_release.sh
+++ b/scripts/build_release.sh
@@ -17,6 +17,7 @@ tar_file="xmlsec1-$version.tar.gz"
sig_file="xmlsec1-$version.sig"
rc_tar_file="xmlsec1-$version-$rc.tar.gz"
rc_sig_file="xmlsec1-$version-$rc.sig"
+git_1_2_x_branch="xmlsec-1_2_x"
git_release_branch=`echo "xmlsec-$version" | sed 's/\./_/g'`
git_version_tag=`echo $version | sed 's/\./_/g'`
@@ -36,6 +37,9 @@ cd xmlsec
if [ x"$rc" != x ]; then
echo "============== Switching to release branch '$git_release_branch' for RC build '$rc'"
git checkout $git_release_branch
+else
+ echo "============== Switching to 1.2.x branch '$git_1_2_x_branch'"
+ git checkout $git_1_2_x_branch
fi
find . -name ".git" | xargs rm -r
From a8b36a5f9cef3769c69f531b3e7b388d6c379db0 Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 21:33:29 +0000
Subject: [PATCH 06/15] fix download version
---
docs/download.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/download.html b/docs/download.html
index 8b86df4a1..2e291ca43 100644
--- a/docs/download.html
+++ b/docs/download.html
@@ -51,7 +51,7 @@ Stable releases.
The latest stable XML Security Library version is 1.2.37:
-
-Sources for latest version.
+Sources for latest version.
-
Windows binaries for XMLSec Library
(as well as LibXML2, LibXSLT and OpenSSL) from Igor Zlatkovic.
From a18532d2908345a8eef378892df5171338e5fe9b Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 16:41:29 -0500
Subject: [PATCH 07/15] add xmlsec-1_2_x branch to github workflows
---
.github/workflows/make-check.yml | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/make-check.yml b/.github/workflows/make-check.yml
index 042fbd398..99943c698 100755
--- a/.github/workflows/make-check.yml
+++ b/.github/workflows/make-check.yml
@@ -2,9 +2,13 @@ name: Make Check
on:
push:
- branches: [ master ]
+ branches:
+ - master
+ - xmlsec-1_2_x
pull_request:
- branches: [ master ]
+ branches:
+ - master
+ - xmlsec-1_2_x
jobs:
check-ubuntu-openssl300:
From c11cecbdbbf58dec5d6a9b9b0dc19c6f31a85069 Mon Sep 17 00:00:00 2001
From: Aleksey Sanin
Date: Mon, 28 Nov 2022 16:47:43 -0500
Subject: [PATCH 08/15] add xmlsec-1_2_x branch to github workflows
---
.github/workflows/make-check.yml | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/.github/workflows/make-check.yml b/.github/workflows/make-check.yml
index 99943c698..b2b044ddd 100755
--- a/.github/workflows/make-check.yml
+++ b/.github/workflows/make-check.yml
@@ -3,12 +3,12 @@ name: Make Check
on:
push:
branches:
- - master
- - xmlsec-1_2_x
+ - master
+ - xmlsec-1_2_x
pull_request:
branches:
- - master
- - xmlsec-1_2_x
+ - master
+ - xmlsec-1_2_x
jobs:
check-ubuntu-openssl300:
From 60674591e760a5e2ea31c51dda2c07392a216e0f Mon Sep 17 00:00:00 2001
From: lsh123
Date: Mon, 28 Nov 2022 17:36:35 -0500
Subject: [PATCH 09/15] update docs (#453)
---
docs/bugs.html | 2 --
docs/download.html | 4 ++--
docs/xmldsig.html | 2 --
3 files changed, 2 insertions(+), 6 deletions(-)
diff --git a/docs/bugs.html b/docs/bugs.html
index d062d071d..0b8672305 100644
--- a/docs/bugs.html
+++ b/docs/bugs.html
@@ -81,7 +81,6 @@
by any information distribution using XMLSec GitHub issues tracker, discussions,
source code, or any other XMLSec related tools.
-
@@ -89,7 +88,6 @@
able to ask permissions to publish it. If you are the author or know
the author then I would appreciate if you send me a message on GitHub so I can ask
permissions and put author's name here.
-