The dir might not exists?

Aleksey

On 10/13/10 10:56 AM, Erik Smith wrote:
I rebuilt libxml, xmlsec, and libxslt to the latest and I get an x509
error for some reason.  Any ideas on this?

libxml version: 2.7.7
xmlsec version: 1.2.16
libxslt version: 1.1.26
func=xmlSecOpenSSLX509StoreInitialize:file=x509vfy.c:line=657:obj=x509-store:subj=X509_LOOKUP_add_dir:error=4:crypto
library function failed:
func=xmlSecKeyDataStoreCreate:file=keysdata.c:line=1330:obj=x509-store:subj=id->initialize:error=1:xmlsec
library function failed:
func=xmlSecOpenSSLKeysMngrInit:file=crypto.c:line=330:obj=unknown:subj=xmlSecKeyDataStoreCreate:error=1:xmlsec
library function failed:xmlSecOpenSSLX509StoreId
func=xmlSecOpenSSLAppDefaultKeysMngrInit:file=app.c:line=1331:obj=unknown:subj=xmlSecOpenSSLKeysMngrInit:error=1:xmlsec
library function failed:



2010/10/13 Aleksey Sanin <[email protected] <mailto:[email protected]>>

    Sounds like you are compiling your application with different flags
    compared to xmlsec. Something like structure members alignment
    or debug vs. release.

    Aleksey


    On 10/13/10 7:32 AM, Erik Smith wrote:

        xmlsec output:

        OK
        SignedInfo References (ok/all): 1/1
        Manifests References (ok/all): 0/0
        = VERIFICATION CONTEXT
        == Status: succeeded
        == flags: 0x00000006
        == flags2: 0x00000000
        == Key Info Read Ctx:
        = KEY INFO READ CONTEXT
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled key data: all
        == RetrievalMethod level (cur/max): 0/1
        == TRANSFORMS CTX (status=0)
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled transforms: all
        === uri: NULL
        === uri xpointer expr: NULL
        == EncryptedKey level (cur/max): 0/1
        === KeyReq:
        ==== keyId: rsa
        ==== keyType: 0x00000001
        ==== keyUsage: 0x00000002
        ==== keyBitsSize: 0
        === list size: 0
        == Key Info Write Ctx:
        = KEY INFO WRITE CONTEXT
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled key data: all
        == RetrievalMethod level (cur/max): 0/1
        == TRANSFORMS CTX (status=0)
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled transforms: all
        === uri: NULL
        === uri xpointer expr: NULL
        == EncryptedKey level (cur/max): 0/1
        === KeyReq:
        ==== keyId: NULL
        ==== keyType: 0x00000001
        ==== keyUsage: 0xffffffff
        ==== keyBitsSize: 0
        === list size: 0
        == Signature Transform Ctx:
        == TRANSFORMS CTX (status=2)
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled transforms: all
        === uri: NULL
        === uri xpointer expr: NULL
        === Transform: exc-c14n
        (href=http://www.w3.org/2001/10/xml-exc-c14n#)
        === Transform: rsa-sha1
        (href=http://www.w3.org/2000/09/xmldsig#rsa-sha1)
        === Transform: membuf-transform (href=NULL)
        == Signature Method:
        === Transform: rsa-sha1
        (href=http://www.w3.org/2000/09/xmldsig#rsa-sha1)
        == Signature Key:
        == KEY
        === method: RSAKeyValue
        === key type: Public
        === key usage: -1
        === rsa key: size = 1024
        === list size: 1
        === X509 Data:
        ==== Certificate:
        ==== Subject Name:
        /C=US/ST=TN/L=Nashville/O=Emdeon/OU=Emdeon/CN=Emdeon
        ==== Issuer Name:
        /C=US/ST=TN/L=Nashville/O=Emdeon/OU=Emdeon/CN=Emdeon
        ==== Issuer Serial: 4CAB2D3B
        == SignedInfo References List:
        === list size: 1
        = REFERENCE VERIFICATION CONTEXT
        == Status: succeeded
        == URI: "#Response-guid-ab3e423b-4f6e-4376-b910-553b31bc6404"
        == Reference Transform Ctx:
        == TRANSFORMS CTX (status=2)
        == flags: 0x00000000
        == flags2: 0x00000000
        == enabled transforms: all
        === uri:
        === uri xpointer expr:
        #Response-guid-ab3e423b-4f6e-4376-b910-553b31bc6404
        === Transform: xpointer
        (href=http://www.w3.org/2001/04/xmldsig-more/xptr)
        === Transform: enveloped-signature
        (href=http://www.w3.org/2000/09/xmldsig#enveloped-signature)
        === Transform: exc-c14n
        (href=http://www.w3.org/2001/10/xml-exc-c14n#)
        === Transform: membuf-transform (href=NULL)
        === Transform: sha1 (href=http://www.w3.org/2000/09/xmldsig#sha1)
        === Transform: membuf-transform (href=NULL)
        == Digest Method:
        === Transform: sha1 (href=http://www.w3.org/2000/09/xmldsig#sha1)
        == PreDigest data - start buffer:
        <Response xmlns="urn:oasis:names:tc:SAML:1.0:protocol"
        xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion"
        xmlns:samlp="urn:oasis:names:tc:SAML:1.0:protocol"
        xmlns:xsd="http://www.w3.org/2001/XMLSchema";
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
        IssueInstant="2010-10-06T21:15:38.906Z" MajorVersion="1"
        MinorVersion="1" Recipient="http://amgr.emdeon.com";
        
ResponseID="Response-guid-ab3e423b-4f6e-4376-b910-553b31bc6404"><Status><StatusCode
        Value="samlp:Success"></StatusCode></Status><Assertion
        xmlns="urn:oasis:names:tc:SAML:1.0:assertion"
        AssertionID="kpenti-df8fac42-ac9d-4317-98c4-7c05fc4bb761"
        IssueInstant="2010-10-06T16:15:38.906Z"
        Issuer="http://access.emdeon.com"; MajorVersion="1"
        MinorVersion="1"><Conditions NotBefore="2010-10-06T21:15:38.905Z"
        
NotOnOrAfter="2010-10-06T21:25:38.905Z"></Conditions><AuthenticationStatement
        AuthenticationInstant="2010-10-06T16:15:38.906Z"
        
AuthenticationMethod="urn:oasis:names:tc:1.0:am:password"><Subject><NameIdentifier>kpenti</NameIdentifier><SubjectConfirmation><ConfirmationMethod>urn:oasis:names:tc:1.0:cm:bearer</ConfirmationMethod></SubjectConfirmation></Subject></AuthenticationStatement></Assertion></Response>
        == PreDigest data - end buffer
        == Manifest References List:
        === list size: 0


        On Wed, Oct 13, 2010 at 7:28 AM, Aleksey Sanin
        <[email protected] <mailto:[email protected]>
        <mailto:[email protected] <mailto:[email protected]>>> wrote:

            What is the output of the xmlsec1 command?

            Aleksey


            On 10/12/10 11:36 PM, Erik Smith wrote:

                After I call xmlSecDSigCtxVerify, the status in the
        contex is
                corrupted
                with a large number.   However xmlsec1 reports
        validation as OK.

                xmlsec1 --verify --pubkey-cert-pem cert.crt
        --store-references
                --id-attr:ResponseID
                urn:oasis:names:tc:SAML:1.0:protocol:Response /saml.xml

                Also xmlSecDSigCtxDebugDump output is exactly the same for
                xmlsec1 and
                my program.

                I've reduced the code down to what is below and I'm
        having trouble
                seeing what could be wrong.

                libxml version: 2.6.27
                xmlsec version: 1.2.11

                Thanks for any help.



                #include <iostream>
                #include <xmlsec/xmltree.h>
                #include <xmlsec/xmldsig.h>
                #include <xmlsec/crypto.h>
                #include <xmlsec/errors.h>

                #ifndef XMLSEC_NO_XSLT
                #include <libxslt/xslt.h>
                #endif

                void error(const char *);

                int main(int argc, char **argv) {
                     using namespace std;
                     int status(0);

                     xmlSecKeysMngrPtr mngr_;
                     xmlSecDSigCtxPtr dsigCtx;
                     xmlDocPtr doc_;

                     cout << "libxml version: " << LIBXML_DOTTED_VERSION
        << endl;
                     cout << "xmlsec version: " << XMLSEC_VERSION << endl;

                     xmlInitParser();
                     LIBXML_TEST_VERSION;
                     xmlLoadExtDtdDefaultValue = XML_DETECT_IDS |
                XML_COMPLETE_ATTRS;
                     xmlSubstituteEntitiesDefault(1);

                #ifndef XMLSEC_NO_XSLT
                     xmlIndentTreeOutput = 1;
                #endif
                     // Init xmlsec library
                     if (xmlSecInit() < 0) error("xmlSecInit");
                     if (xmlSecCheckVersion() != 1)
        error("xmlSecCheckVersion");

                #ifdef XMLSEC_CRYPTO_DYNAMIC_LOADING
                     if(xmlSecCryptoDLLoadLibrary(BAD_CAST "openssl") < 0)
                error("xmlSecCryptoDLLoadLibrary");
                #endif

                     if(xmlSecCryptoAppInit(NULL) < 0) error("Error: crypto
                initialization failed.");
                     if(xmlSecCryptoInit() < 0) error("Error: xmlsec-crypto
                initialization failed.");

                     mngr_ = xmlSecKeysMngrCreate();
                     if (!mngr_) error("bad");

                     if (xmlSecCryptoAppDefaultKeysMngrInit(mngr_) < 0)
                error("bad");

                     xmlSecKeyDataFormat format(xmlSecKeyDataFormatCertPem);
                     xmlSecKeyPtr key = xmlSecCryptoAppKeyLoad("cert.crt",
                format, NULL,
                NULL, NULL);
                     if (!key) error("key load error");

                     if(xmlSecCryptoAppDefaultKeysMngrAdoptKey(mngr_,
        key) < 0)
                error("could not add key");

                     doc_ = xmlParseFile("saml.xml");
                     if (!doc_ || !xmlDocGetRootElement(doc_)) error("bad");

                     set_id(doc_);

                     xmlNodePtr node =
        xmlSecFindNode(xmlDocGetRootElement(doc_),
                xmlSecNodeSignature, xmlSecDSigNs);
                     if (!node) error("start node not found");

                     dsigCtx = xmlSecDSigCtxCreate(mngr_);
                     if (!dsigCtx) error("failed to create signature
        context");

                     std::cout << "status before: " << dsigCtx->status
        << std::endl;
                     if (xmlSecDSigCtxVerify(dsigCtx, node) < 0)
                error("signature verify
                error");
                     std::cout << "status: " << dsigCtx->status <<
        std::endl;
                     //xmlSecDSigCtxDebugDump(dsigCtx, stdout);

                     return status;
                }

                void set_id(xmlDocPtr doc) {
                     using namespace std;

                     xmlNodePtr node = xmlSecFindNode(
                             xmlDocGetRootElement(doc),
                             BAD_CAST "Response",
                             BAD_CAST
        "urn:oasis:names:tc:SAML:1.0:protocol");

                     cout << "element name: " << node->name<< endl;
                     xmlAttrPtr attr = xmlHasProp(node, BAD_CAST
        "ResponseID");
                     if (!attr) error("attribute not found");
                     cout << "attribute name: " << attr->name<< endl;

                     xmlChar *value = xmlNodeListGetString(node->doc,
                attr->children, 1);
                     if (!value) error("xmlNodeListGetString");
                     cout << "value: " << value << endl;

                     xmlAttrPtr tmp(xmlGetID(node->doc, value));
                     if (tmp) {
                         cout << "id already registered" << endl;
                     } else {
                         xmlIDPtr id = xmlAddID(NULL, doc, BAD_CAST
        value, attr);
                         if (!id) {
                             xmlFree(value); // fix
                             error("xmlAddID error");
                         }
                         cout << "id added" << endl;
                     }

                     //xmlFree(value); // fix
                }

                void error(const char *e) {
                     std::cout << e << std::endl;
                     std::cout << "exiting" << std::endl;
                     exit(0);
                }








                _______________________________________________
                xmlsec mailing list
        [email protected] <mailto:[email protected]>
        <mailto:[email protected] <mailto:[email protected]>>

        http://www.aleksey.com/mailman/listinfo/xmlsec



_______________________________________________
xmlsec mailing list
[email protected]
http://www.aleksey.com/mailman/listinfo/xmlsec

Reply via email to