XMLSec 1.3.0-rc2 #595
Replies: 3 comments 22 replies
-
This builds. :-) When running the libreoffice tests, I hit a case where we insert some certificates and a signing certificate from code, try to sign a template and that works with 1.2.37 but not with 1.3.0-rc2. I'm not sure if the problem is on your end or on our end. Let me describe what we try to do and perhaps you can guess; if not, then I'll try to write some standalone reproducer (if you want). First, here is the xmlDocDump(() output for the template we try to sign:
(In the unlikely case you would be interested in building the libreoffice code, the local change is:
and to run the problematic testcase from the problematic suite:
But I guess you want to avoid building that codebase. :-) ) Anyhow, when we use the NSS backend on Linux, we call xmlSecDSigCtxSign(), the output we get is:
So far I only investigating that NULL certsList. It seems 1.2.x had no assert for that, at least in 1.2.x I guess the equivalent NSS function was xmlSecNssX509StoreFindCert_ex(), and there I see in gdb that also ctx->certsList is NULL, but no error is emitted. Perhaps the first question would be if I'm OK to ignore that assertion failure for now (because it's not relevant for why the whole signing fails) or not. If it helps, here is the testcase: I.e. we load the certs & signing key from DER files, try to sign and for some reason now this stopped working. Do you have a hint where to start debugging this? It's also possible that our test .der files are in some strange format and that needs changing. I also thought about trying to bisect this, if I can find out how to generate a release tarball from a given commit. Thanks. |
Beta Was this translation helpful? Give feedback.
-
Yes, that's the case here, we ask NSS / mscrypto to do the verification separately so we can inform the user if the failure is around the certificates or something else (digest mismatch, etc). It was done like this before my time (in openoffice), but given that the verification does happen, I think it's reasonable. For everything else: thanks, will try out and report back. :-) |
Beta Was this translation helpful? Give feedback.
-
First, thanks a lot for the tests!
I wonder if this is caused by multiple certs :) |
Beta Was this translation helpful? Give feedback.
-
Soruce tar file:
Changes from 1.3.0-RC1
include/xmlsec/x509.h
(thanks @vmiklos for bug report)XMLSec 1.3.0-RC1
The XMLSec 1.3.0 release includes a large number of changes including several API / ABI breaking changes (hence version bump). Please test the release candidate and let me know if you run into any issues! I plan to have at least one more release candidate in 2-3 weeks before the release mid-April.
core xmlsec and all xmlsec-crypto libraries:
xmlsec-openssl library:
xmlsec-nss library:
xmlsec-gnutls library:
xmlsec-mscng library:
xmlsec-mscrypto library:
xmlsec-gcrypt library:
xmlsec command line utility:
This discussion was created from the release 1.3.0-rc2.
Beta Was this translation helpful? Give feedback.
All reactions