Hi,
I'm new to this list, so sorry if my question seams stupid .
I saw a lot of code to handle line breaks in the sources, but is this
really necessary ? I think that it's up to the xml writer to handle line
breaks in order to get a nice output, and not in functions like
xmlSecAddChild or
Hi,
I have a problem when I try to validate a detached signature against
my document. The 'xmlSecDSigCtxVerify' function takes two parameters,
the DSig context, and the node pointing to the signature
dsig:Signature/ http://www.w3.org/TR/xmldsig-core/#sec-Signature
node. But as my detached
*without* URI. You probably want to
identify it somehow and assign *some* uri
(e.g. foo://document id or something like this).
Then IO callbacks could catch scheme foo and
load the document you need.
Aleksey
Frank Gross wrote:
Hi,
I have a problem when I try to validate a detached signature
it.
Aleksey
Frank Gross wrote:
Hi,
I noticed that function 'xmlSecEncCtxXmlEncrypt' releases the node
that was encrypted when replaced by the 'EncryptedData' node.
Does it exist a way to not release that node, and let the user choose
whether he wants to destroy it or not ?
Thanks,
Frank
a écrit :
Sure, I love patches :) BTW, you can't find any docs about
flags/flags2 in xmlSecEncCtx because they are not used at the moment :)
Just reserved for the future :)
Aleksey
Frank Gross wrote:
Yes I agree, but it would be more efficient if I wouldn't have to do
that. And I have the same
Hi,
Can some give me an example about how to use key wrap in xmlsec,
because there is nothing in the documentation.
Thanks,
Frank
___
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec
Hi,
I would like to encrypt or validate a document using the X509 retrieval
method but without setting a root certificate in the trusted list of the
key manager. Is this possible ? Because I tried with flag
XMLSEC_KEYINFO_FLAGS_X509DATA_DONT_VERIFY_CERTS in the xmlSecEncCtx
structure and in
Hi,
I've read the WS-Security spec from OASIS, and saw that some
WS-Security tokens can be child of a ds:KeyInfo node. Are there any
plans to support WS-Security or at least a mechanism to extend xmlsec in
order to handle such WS-Security token when signing or validating a
document ?
the XML-Security spec before to look into the WS-Security
spec.
Thanks a lot,
Frank
Aleksey Sanin a écrit :
I accept patches :)
Aleksey
Frank Gross wrote:
Hi,
I've read the WS-Security spec from OASIS, and saw that some
WS-Security tokens can be child of a ds:KeyInfo node. Are there any
Hi,
Find attached a patch to fix a crash in openssl/x509.c file when
XMLSEC_KEYINFO_FLAGS_X509DATA_STOP_ON_UNKNOWN_CERT is set.
Actually when the error message is created it uses the 'subject'
variable but as the variable has been released before, it leads to a crash.
Frank
Index: x509.c
Hi,
I use the 'xmlSecKeyDataXmlRead' and 'xmlSecKeyDataXmlWrite' functions
to save and load X509 certificate in XML, but I get a strange behavior.
When I write my certificate stored in the xmlSecKeyDataPtr section of
the xmlSecKeyPtr, everything is ok, and I get the following XML (Notice
,
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's Development Tools - http://www.4js.com
?xml version=1.0?
valgrindoutput
protocolversion2/protocolversion
preamble
lineMemcheck, a memory error detector./line
lineCopyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et al
___
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec
___
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec
--
Frank GROSS
Software Engineer - Web Services
Four J's
know that spaces are relevant in signature, but it should be possible
for instance to create a XML signature without any line breaks, or am I
wrong ?
Regards,
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's Development Tools - http://www.4js.com
Hi,
I would like to use the flag called
XMLSEC_KEYINFO_FLAGS_KEYNAME_STOP_ON_UNKNOWN, but it doesn't seem to
work. It is defined in keyinfo.h but nowhere else. Is this flag active ?
Regards,
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's Development Tools - http://www
, Frank Gross wrote:
Hi, I modified the library to support that flag as following. It is
working for me, but I don't know if it is ok. Could you have a look and
tell me what you think ,thanks ?
Modified: gws/branches/gws-ext-libs-2.50/lib-aleksey-xmlsec1/src/src/keys.c
) /D _DEBUG /Od /Z7
+CFLAGS = $(CFLAGS) /D _DEBUG /Od /Z7 /MDd
!else
-CFLAGS = $(CFLAGS) /D NDEBUG /O2
+CFLAGS = $(CFLAGS) /D NDEBUG /O2 /MD
!endif
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's
Hi,
I need xmlsec to run on iOS and based on the mac crypto API. Are
there any plans to do it ?
Thanks,
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's Development Tools - http://www.4js.com
___
xmlsec mailing list
xmlsec
I registered that same key
but with a different name.
Thanks,
Frank
--
Frank GROSS
Software Engineer - Web Services
Four J's Development Tools - http://www.4js.com
___
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo
com/lsh123/xmlsec/blob/a181a96b5f73a4ac27be2fc51644326c2b89fe4d/src/keyinfo.c#L663
Aleksey
On 6/19/19 3:50 AM, Frank Gross wrote:
Hi,
Can someone tell me how the flag
XMLSEC_KEYINFO_FLAGS_KEYNAME_STOP_ON_UNKNOWN is suppose to work ?
I was expecting that xmlSecEncCtxDecrypt() fails when that flag is
s
20 matches
Mail list logo