summaryrefslogtreecommitdiff
path: root/libxmlsec
diff options
context:
space:
mode:
authorJens-Heiner Rechtien <hr@openoffice.org>2005-12-29 13:55:35 +0000
committerJens-Heiner Rechtien <hr@openoffice.org>2005-12-29 13:55:35 +0000
commit29fda21a551b2bc561f3e9af4f0e1684f29acec1 (patch)
tree258d08bcc709790d40ecb1fec4e5e499d844ddca /libxmlsec
parent8af911020e06e196c714709f59c9f44ed5a8d72e (diff)
#i10000#: C++ style comments in C file removed
Diffstat (limited to 'libxmlsec')
-rw-r--r--libxmlsec/xmlsec1-1.2.6.patch30
1 files changed, 15 insertions, 15 deletions
diff --git a/libxmlsec/xmlsec1-1.2.6.patch b/libxmlsec/xmlsec1-1.2.6.patch
index a333cca19052..b430875de542 100644
--- a/libxmlsec/xmlsec1-1.2.6.patch
+++ b/libxmlsec/xmlsec1-1.2.6.patch
@@ -2823,23 +2823,23 @@
! continue ;
! }
!
-! //JL: OpenOffice.org implements its own certificate verification routine.
-! //The goal is to seperate validation of the signature
-! //and the certificate. For example, OOo could show that the document signature is valid,
-! //but the certificate could not be verified. If we do not prevent the verification of
-! //the certificate by libxmlsec and the verification fails, then the XML signature will not be
-! //verified. This would happen, for example, if the root certificate is not installed.
-! //
-! //In the store schould only be the certificate from the X509Certificate element
-! //and the X509IssuerSerial element. The latter is only there
-! //if the certificate is installed. Both certificates must be the same!
-! //In case of writing the signature, the store contains only the certificate that
-! //was created based on the information from the X509IssuerSerial element.
+! /* JL: OpenOffice.org implements its own certificate verification routine.
+! The goal is to seperate validation of the signature
+! and the certificate. For example, OOo could show that the document signature is valid,
+! but the certificate could not be verified. If we do not prevent the verification of
+! the certificate by libxmlsec and the verification fails, then the XML signature will not be
+! verified. This would happen, for example, if the root certificate is not installed.
+!
+! In the store schould only be the certificate from the X509Certificate element
+! and the X509IssuerSerial element. The latter is only there
+! if the certificate is installed. Both certificates must be the same!
+! In case of writing the signature, the store contains only the certificate that
+! was created based on the information from the X509IssuerSerial element. */
! return cert;
!
-! // if( xmlSecMSCryptoX509StoreConstructCertsChain( store, cert, certs, keyInfoCtx ) ) {
-! // return( cert ) ;
-! // }
+! /* if( xmlSecMSCryptoX509StoreConstructCertsChain( store, cert, certs, keyInfoCtx ) ) {
+! return( cert ) ;
+! } */
}
return (NULL);