diff options
author | Jens-Heiner Rechtien <hr@openoffice.org> | 2005-12-29 13:55:35 +0000 |
---|---|---|
committer | Jens-Heiner Rechtien <hr@openoffice.org> | 2005-12-29 13:55:35 +0000 |
commit | 29fda21a551b2bc561f3e9af4f0e1684f29acec1 (patch) | |
tree | 258d08bcc709790d40ecb1fec4e5e499d844ddca /libxmlsec | |
parent | 8af911020e06e196c714709f59c9f44ed5a8d72e (diff) |
#i10000#: C++ style comments in C file removed
Diffstat (limited to 'libxmlsec')
-rw-r--r-- | libxmlsec/xmlsec1-1.2.6.patch | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/libxmlsec/xmlsec1-1.2.6.patch b/libxmlsec/xmlsec1-1.2.6.patch index a333cca19052..b430875de542 100644 --- a/libxmlsec/xmlsec1-1.2.6.patch +++ b/libxmlsec/xmlsec1-1.2.6.patch @@ -2823,23 +2823,23 @@ ! continue ; ! } ! -! //JL: OpenOffice.org implements its own certificate verification routine. -! //The goal is to seperate validation of the signature -! //and the certificate. For example, OOo could show that the document signature is valid, -! //but the certificate could not be verified. If we do not prevent the verification of -! //the certificate by libxmlsec and the verification fails, then the XML signature will not be -! //verified. This would happen, for example, if the root certificate is not installed. -! // -! //In the store schould only be the certificate from the X509Certificate element -! //and the X509IssuerSerial element. The latter is only there -! //if the certificate is installed. Both certificates must be the same! -! //In case of writing the signature, the store contains only the certificate that -! //was created based on the information from the X509IssuerSerial element. +! /* JL: OpenOffice.org implements its own certificate verification routine. +! The goal is to seperate validation of the signature +! and the certificate. For example, OOo could show that the document signature is valid, +! but the certificate could not be verified. If we do not prevent the verification of +! the certificate by libxmlsec and the verification fails, then the XML signature will not be +! verified. This would happen, for example, if the root certificate is not installed. +! +! In the store schould only be the certificate from the X509Certificate element +! and the X509IssuerSerial element. The latter is only there +! if the certificate is installed. Both certificates must be the same! +! In case of writing the signature, the store contains only the certificate that +! was created based on the information from the X509IssuerSerial element. */ ! return cert; ! -! // if( xmlSecMSCryptoX509StoreConstructCertsChain( store, cert, certs, keyInfoCtx ) ) { -! // return( cert ) ; -! // } +! /* if( xmlSecMSCryptoX509StoreConstructCertsChain( store, cert, certs, keyInfoCtx ) ) { +! return( cert ) ; +! } */ } return (NULL); |