Hello

Any thoughts on how the following can happen would be much appreciate.

Have some code like this which is preceeded by creating a verify contxt etc etc 
just like examples::
......        /* print verification result to stdout */        
if(dsigCtx->status == xmlSecDSigStatusSucceeded) {                
fprintf(stdout, "RESULT: Signature is OK  %d\n", dsigCtx->status);        } 
else {                fprintf(stdout, "RESULT: Signature is INVALID %d\n", 
dsigCtx->status);        }        fprintf(stdout, 
"---------------------------------------------------\n");

        xmlSecDSigCtxDebugDump(dsigCtx, stdout);......

And get the following output:


RESULT: Signature is INVALID 
7219120---------------------------------------------------= VERIFICATION 
CONTEXT== Status: succeeded== flags: 0x0000000e== flags2: 0x00000000== Key Info 
Read Ctx:= KEY INFO READ CONTEXT== flags: 0x00000000== flags2: 0x00000000== 
enabled key data: all== RetrievalMethod level (cur/max): 0/1== TRANSFORMS CTX 
(status=0)== flags: 0x00000000== flags2: 0x00000000== enabled transforms: 
all=== uri: NULL=== uri xpointer expr: NULL== EncryptedKey level (cur/max): 
0/1=== KeyReq:==== keyId: rsa==== keyType: 0x00000001==== keyUsage: 
0x00000002==== keyBitsSize: 0=== list size: 0== Key Info Write Ctx:= KEY INFO 
WRITE CONTEXT== flags: 0x00000000== flags2: 0x00000000== enabled key data: 
all== RetrievalMethod level (cur/max): 0/1== TRANSFORMS CTX (status=0)== flags: 
0x00000000== flags2: 0x00000000== enabled transforms: all=== uri: NULL=== uri 
xpointer expr: NULL== EncryptedKey level (cur/max): 0/1=== KeyReq:==== keyId: 
NULL==== keyType: 0x00000001==== keyUsage: 0xffffffff==== keyBitsSize: 0=== 
list size: 0== Signature Transform Ctx:== TRANSFORMS CTX (status=2)== flags: 
0x00000000== flags2: 0x00000000== enabled transforms: all=== uri: NULL=== uri 
xpointer expr: NULL=== Transform: exc-c14n 
(href=http://www.w3.org/2001/10/xml-exc-c14n#)=== Transform: membuf-transform 
(href=NULL)=== Transform: rsa-sha1 
(href=http://www.w3.org/2000/09/xmldsig#rsa-sha1)=== Transform: 
membuf-transform (href=NULL)== Signature Method:=== Transform: rsa-sha1 
(href=http://www.w3.org/2000/09/xmldsig#rsa-sha1)== Signature Key:== KEY=== 
method: RSAKeyValue=== key type: Public=== key usage: -1=== key not valid 
before: 1458586152=== key not valid after: 1774118952=== rsa key: size = 
2048=== list size: 1=== X509 Data:==== Key Certificate:==== Subject Name: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX==== Issuer Name: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX==== Issuer Serial: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX==== Certificate:==== Subject Name: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX==== Issuer Name: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX==== Issuer Serial: 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXX== SignedInfo References List:=== list size: 1= 
REFERENCE VERIFICATION CONTEXT== Status: succeeded== URI: 
"#_c4e9522ba1289864766f54df6a04eae5b77fd7c70d"== Reference Transform Ctx:== 
TRANSFORMS CTX (status=2)== flags: 0x00000000== flags2: 0x00000000== enabled 
transforms: all=== uri: === uri xpointer expr: 
#_c4e9522ba1289864766f54df6a04eae5b77fd7c70d=== Transform: xpointer 
(href=http://www.w3.org/2001/04/xmldsig-more/xptr)=== Transform: 
enveloped-signature 
(href=http://www.w3.org/2000/09/xmldsig#enveloped-signature)=== Transform: 
exc-c14n (href=http://www.w3.org/2001/10/xml-exc-c14n#)=== Transform: 
membuf-transform (href=NULL)=== Transform: sha1 
(href=http://www.w3.org/2000/09/xmldsig#sha1)=== Transform: membuf-transform 
(href=NULL)== Digest Method:=== Transform: sha1 
(href=http://www.w3.org/2000/09/xmldsig#sha1)== PreDigest data - start 
buffer:........
....

Any ideas how this could happen?
The dump prints the status as being successful.This as per the setting of the 
dsigCtx->status inxmlSecDSigCtxDebugDump() function in xmldsig.c


But how is it printing some garbage value before hand? (7219120)Why is it not 
initialized or set to unknown/invalid. 

Would appreciate any insight? No other logs/erros from the xmlsec are evident.
Are there any other logs I could refer to?
Would appreciate any thoughts. 







_______________________________________________
xmlsec mailing list
[email protected]
http://www.aleksey.com/mailman/listinfo/xmlsec

Reply via email to