diff options
author | Jens-Heiner Rechtien <hr@openoffice.org> | 2005-12-29 14:19:29 +0000 |
---|---|---|
committer | Jens-Heiner Rechtien <hr@openoffice.org> | 2005-12-29 14:19:29 +0000 |
commit | 49d51e38219638ff4e62679cfcb1b40421ad8207 (patch) | |
tree | 2f03f64ed887a3f9a99fc664a685f3ebb2baca3b /libxmlsec | |
parent | 29fda21a551b2bc561f3e9af4f0e1684f29acec1 (diff) |
#i10000#: more C++ style comments in C file removed
Diffstat (limited to 'libxmlsec')
-rw-r--r-- | libxmlsec/xmlsec1-1.2.6.patch | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/libxmlsec/xmlsec1-1.2.6.patch b/libxmlsec/xmlsec1-1.2.6.patch index b430875de542..2a8398d87a7c 100644 --- a/libxmlsec/xmlsec1-1.2.6.patch +++ b/libxmlsec/xmlsec1-1.2.6.patch @@ -13178,27 +13178,27 @@ if (!CERT_LIST_END(head1, certs)) { ! continue; } -! //JL: OpenOffice.org implements its own certificate verification routine. -! //The goal is to seperate validation of the signature -! //and the certificate. For example, OOo could show that the document signature is valid, -! //but the certificate could not be verified. If we do not prevent the verification of -! //the certificate by libxmlsec and the verification fails, then the XML signature may not be -! //verified. This would happen, for example, if the root certificate is not installed. -! // -! //In the store schould only be the certificate from the X509Certificate element -! //and the X509IssuerSerial element. The latter is only there -! //if the certificate is installed. Both certificates must be the same! -! //In case of writing the signature, the store contains only the certificate that -! //was created based on the information from the X509IssuerSerial element. +! /* JL: OpenOffice.org implements its own certificate verification routine. +! The goal is to seperate validation of the signature +! and the certificate. For example, OOo could show that the document signature is valid, +! but the certificate could not be verified. If we do not prevent the verification of +! the certificate by libxmlsec and the verification fails, then the XML signature may not be +! verified. This would happen, for example, if the root certificate is not installed. +! +! In the store schould only be the certificate from the X509Certificate element +! and the X509IssuerSerial element. The latter is only there +! if the certificate is installed. Both certificates must be the same! +! In case of writing the signature, the store contains only the certificate that +! was created based on the information from the X509IssuerSerial element. */ ! status = SECSuccess; ! break; -! // status = CERT_VerifyCertificate(CERT_GetDefaultCertDB(), -! // cert, PR_FALSE, -! // (SECCertificateUsage)0, -! // timeboundary , NULL, NULL, NULL); -! // if (status == SECSuccess) { -! // break; -! // } +! /* status = CERT_VerifyCertificate(CERT_GetDefaultCertDB(), +! cert, PR_FALSE, +! (SECCertificateUsage)0, +! timeboundary , NULL, NULL, NULL); +! if (status == SECSuccess) { +! break; +! } /* } ! if (status == SECSuccess) { |