summaryrefslogtreecommitdiff
path: root/external/libxmlsec
AgeCommit message (Collapse)AuthorFilesLines
2016-11-17libxmlsec: remove no longer applying mingw patchesMiklos Vajna3-255/+0
One from the two patches do not apply anymore. Remove both of them for now. Change-Id: I8e06cc28810a9dac13054282a630b0e9b716af86 Reviewed-on: https://gerrit.libreoffice.org/30924 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-11-04Upgrade libxmlsec to 1.2.23Miklos Vajna10-116/+75
Obsoletes xmlsec1-win32-fix-undeclared.patch.1. Change-Id: I11cd52aebbe5ab224de9ab00b74c02abb46296f6 Reviewed-on: https://gerrit.libreoffice.org/30539 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-10-23don't build libxmlsec docsDavid Tardon1-2/+2
Change-Id: I2fd3283147296e3c392a9d282b762b77e473b3eb
2016-08-02libxmlsec: drop xmlsec1-keyinfo-revert.patch.1 completelyMiklos Vajna2-235/+0
And instead attempt to set up the test environment correctly. Change-Id: I06c10b96749c0464da8d2dd9a59b48f16baeead5 Reviewed-on: https://gerrit.libreoffice.org/27785 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-07-29xmlsec: xmlsec1-keyinfo-revert.patch.1 is not needed on WNTMiklos Vajna1-0/+2
Change-Id: I1dbb6bf57dc78f321e6e6d69b7e573309aff8f48 Reviewed-on: https://gerrit.libreoffice.org/27658 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-07-27libxmlsec: mark part of xmlsec1-vc.patch.1 as upstreamedMiklos Vajna3-9/+33
Change-Id: I4a8365c98eef87274ae1809047fd4ea582102f0b Reviewed-on: https://gerrit.libreoffice.org/27556 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-07-20libxmlsec: switch to using upstream 'compile' scriptMiklos Vajna2-345/+0
Upstream used to provide no such one, and it's needed for the macOS build. Latest upstream release does provide one, no need to patch it. Change-Id: I2c2350d0e074f58d13fedb0d72888dd24ac41f44 Reviewed-on: https://gerrit.libreoffice.org/27322 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-07-14Upgrade libxmlsec to 1.2.22Miklos Vajna3-11/+11
No major changes for us, except that finally we bundle the latest upstream (but still heavily patch it). Change-Id: I6bcfcdf48ec5d25eb3f7b14c89838942b4a11b48 Reviewed-on: https://gerrit.libreoffice.org/27196 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-07-11Break gb_DEBUGINFO_FLAGS out of gb_DEBUG_CFLAGSStephan Bergmann1-1/+1
...in preparation of making them orthogonal Change-Id: If75b334c954138b3aed4f8d1ac33061a2267ad52 Reviewed-on: https://gerrit.libreoffice.org/27056 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Stephan Bergmann <sbergman@redhat.com>
2016-07-08Upgrade libxmlsec to 1.2.21Miklos Vajna13-1097/+665
Obsoletes xmlsec1-ooxml.patch.1 and xmlsec1-vs2015.patch.1. Adds xmlsec1-keyinfo-revert.patch.1 till the LO side is adapted to the new xmlsec requirements. Change-Id: I1a46ad8fd7e9c8b4fa7a97591a1d90922969393d Reviewed-on: https://gerrit.libreoffice.org/24403 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-05-24respect verbose in external/libxmlsec/ExternalProject_xmlsec.mkRene Engelhard1-0/+1
as for the other external libs Change-Id: I3d397b3d0afde3df9032cf52dd82d59427924c20
2016-04-22pass original CFLAGSDavid Tardon1-1/+1
Change-Id: Ia37fa1ad21a9411d78b0c30c769b3934d43d1389
2016-04-20libxmlsec: split the upstreamed part of xmlsec1-vc.patch.1 into a new patchMiklos Vajna3-39/+48
Change-Id: I1a6201a21cdf3a42475487a42cd80d11cd5e42b6 Reviewed-on: https://gerrit.libreoffice.org/24253 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-04-13Upgrade libxmlsec to 1.2.20Miklos Vajna6-1100/+575
Obsoletes xmlsec1-update-config.guess.patch.1. Also update xmlsec1-ooxml.patch.1 as it was upstreamed at the end (with improved error checks, etc), which wasn't possible before without loads of conflicts. Change-Id: I6fee428f73f8908289d87cc262ad323ec62e65cf Reviewed-on: https://gerrit.libreoffice.org/24032 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-04-06Upgrade libxmlsec to 1.2.19Miklos Vajna14-1015/+179
Obsoletes our xmlsec1-1.2.14-ansi.patch.1 and xmlsec1-android.patch.1. Change-Id: Ic6499b1a79e3f5a6d94beb62c0c338789c782c86 Reviewed-on: https://gerrit.libreoffice.org/23844 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-03-25Upgrade libxmlsec to 1.2.17Miklos Vajna9-312/+194
So we can drop xmlsec1-configure-libxml-libxslt.patch.1, as upstream commit be72c468dfd3165105ed5cdc949493332c4d3064 (fixed configure issue with emapty --with-libxml/libxsl and config scripts in /bin directory, 2010-07-19) fixes the same problem. Change-Id: Ibb01fb2c5e4074d39168df487180fa88c7bb8035 Reviewed-on: https://gerrit.libreoffice.org/23498 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-03-23xmlsec: clean up the nss keywrapper part of xmlsec1-customkeymanage.patch.1Miklos Vajna1-1261/+31
All of this is already provided by src/nss/kw_*.c. If I build xmlsec as a shared lib, I even get linker errors due to duplicated symbols. For some reason that does not show up in our situation where we build nss as a static lib and link to it in xmlsecurity. Change-Id: If6e00bf3a818a0146c9c30c51174d8e0acab43a9 Reviewed-on: https://gerrit.libreoffice.org/23443 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-03-18Upgrade libxmlsec to 1.2.16Miklos Vajna14-257/+154
No instant drop of any of our patches this time, but a considerable amount of xmlsec1-customkeymanage.patch.1 is now redundant, as part of the key wrapper code is available in this upstream release for both mscrypto and nss. But that can be cleaned up in a separate follow-up commit. Change-Id: I197eaffe3a52f2f9c02af982872185e017965006 Reviewed-on: https://gerrit.libreoffice.org/23344 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk>
2016-03-10Upgrade libxmlsec to 1.2.15Miklos Vajna20-2336/+1876
The primary benefit is that this release supports sha256 out of the box, so we can drop xmlsec1-nss-sha256.patch.1 and xmlsec1-mscrypto-sha256.patch.1. Change-Id: I78606c02591ac8ae7e347b0faa510ae2483e3183 Reviewed-on: https://gerrit.libreoffice.org/23096 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Caolán McNamara <caolanm@redhat.com> Tested-by: Caolán McNamara <caolanm@redhat.com>
2016-03-07libxmlsec: move new files back to xmlsec1-customkeymanage.patchMiklos Vajna10-2926/+3028
That was the situation before commit ec6af4194e80f5f0b2e46ca59802ff397a2a4a24 (convert libxmlsec to gbuild, 2012-11-29), and if we ever manage to upstream this patch, then it'll just make the review process harder if half of the patch is in separate files. Change-Id: I0d12d72ea7a1a2591d1ef5232c006b6b7fea7aff Reviewed-on: https://gerrit.libreoffice.org/22973 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-03-02libxmlsec: start tracking patch upstreaming effortMiklos Vajna1-16/+22
Change-Id: I45519896d745bcc4162d655746585051d47b732d
2016-02-25libxmlsec: remove no longer needed xmlsec1-olderlibxml2.patchMiklos Vajna2-24/+0
I assume this was needed for the Linux baseline. CentOS 6 has libxml 2.7.6, patch is needed for < 2.7.4. (CentOS 5 had 2.6.26, that is only used on libreoffice-5-0). Change-Id: Iae2edbf4f0d484944e399bd901d35a8260272700 Reviewed-on: https://gerrit.libreoffice.org/22659 Reviewed-by: Michael Stahl <mstahl@redhat.com> Tested-by: Jenkins <ci@libreoffice.org>
2016-02-15libxmlsec: fix failing CryptCreateHash() with CALG_SHA_256Miklos Vajna1-10/+90
Previously it got a PROV_RSA_FULL provider, but SHA-256 needs PROV_RSA_AES. Change-Id: I6c689a4c5943920ce656c09d9d7d5e194ff47eb6 Reviewed-on: https://gerrit.libreoffice.org/22364 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-02-03tdf#76142 libxmlsec: implement SHA-256 support in the mscrypto backendMiklos Vajna2-0/+309
The only tricky part is PROV_RSA_FULL -> PROV_RSA_AES, otherwise SHA-256 is not recognized as a valid algo. MSDN documentation for PROV_RSA_FULL at <https://msdn.microsoft.com/en-us/library/windows/desktop/aa387448%28v=vs.85%29.aspx> and PROV_RSA_AES at <https://msdn.microsoft.com/en-us/library/windows/desktop/aa387447%28v=vs.85%29.aspx> say that AES is a superset of full, so should be no backwards-compatibility issue. I tested this on Windows 7, but according to the documentation, it should be no problem on Windows XP, either -- provided that the latest SP is installed. Change-Id: I3ae196679c2cbf0e9e55fab10584d9c46a480659
2016-01-27tdf#76142 libxmlsec: fix xmlSecNssDigestVerify() for SHA-256Miklos Vajna1-5/+26
With this, SfxObjectShell_Impl::showBrokenSignatureWarning() is no longer triggered for the SHA-256 bugdoc. Change-Id: I7a2c5c8517c757e2983f57a3a5908abb941e7a04
2016-01-27libxmlsec: sort elements in OOXML RelationshipTransformMiklos Vajna1-11/+73
The spec says that the implementer shall sort relationship elements by Id value in lexicographical order, so do that before the filtering of these elements. With this, all streams validate for a test document that is supposed to be valid, though xmlSecDSigCtxVerify() still reports errors. Change-Id: I9d9cd511eaebad1f13f4e06891b2a3f61fee4500
2016-01-27libxmlsec: initial OOXML RelationshipTransformMiklos Vajna1-14/+215
Replace the canonicalization with the steps of actions required by ECMA 376, part 2, pages 49 - 70: - parse arguments of the transformation, a SourceId whitelist - add missing TargetMode attributes The largest part is to actually keep the data unchanged, everything still needs to be printed, as the source is a parsed XML tree, while the output is a byte buffer. With this, the first _rels/.rels stream of the OOXML document validates for a test document that is supposed to be valid. Change-Id: Ie996d93de6a7611bac18a8c37c575363552fdab4 Reviewed-on: https://gerrit.libreoffice.org/21832 Reviewed-by: Miklos Vajna <vmiklos@collabora.co.uk> Tested-by: Jenkins <ci@libreoffice.org>
2016-01-26tdf#76142 libxmlsec: extend SHA-256 support in the NSS backendMiklos Vajna1-8/+88
With this, the xmlSecTransformIdListFindByHref() call in xmlSecTransformNodeRead() recognizes the http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 string as a valid signature method as well. Previously SHA-256 was recognized as a digest method only. Change-Id: Ib20ab97dd5bc86dff761f0c58a87afdde112e1e8
2016-01-25libxmlsec: canonize in the OOXML RelationshipTransformMiklos Vajna1-22/+226
This is still a skeleton, but now we canonize the incoming data, not just eat it and output nothing -> at the end we don't hit an assertion that the output of the transform chain is nothing. Change-Id: I28509b8a493c6bf6cdcbb23b95ae7de8947790c1
2016-01-25tdf#76142 libxmlsec: implement SHA-256 support in the NSS backendMiklos Vajna2-0/+137
This way we do not abort a signature verification when we see a <DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> XML node. Note that this just extends the glue layer, both NSS and libxmlsec itself already supported SHA-256 already. Change-Id: I68de99578b839bd7eaa8f21af903aa924c892799
2016-01-25libxmlsec: recognize OOXML RelationshipTransformMiklos Vajna2-0/+174
The transform itself doesn't do anything so far, but the verification is no longer aborted just because we see a transform that we don't know. Change-Id: Ife89157067f3af3326896df3053065c8302795d1
2016-01-23Win build: Set default script engine for cscriptArmin Le Grand1-1/+1
When Windows build is executed, cscript is used to execute JavaScript files. This uses cscript from the system to execute *.js files. cscript is not only capable of executing JavaScript, but also VBScript. Which engine to run is usually determined by the file extension, except when any installed program has added a registered association to the used file type. In that case, the execution of cscript and thus the build fails. This can be prevented by directly defining the script engine when calling cscript, using the /e:javascript parameter for *.js targets. Change-Id: If717b8ae5335acbe4f11c269d3c98a7247a135e6 Reviewed-on: https://gerrit.libreoffice.org/21717 Reviewed-by: Thorsten Behrens <Thorsten.Behrens@CIB.de> Tested-by: Thorsten Behrens <Thorsten.Behrens@CIB.de>
2016-01-20libxmlsec: respect --enable-debug with GCCMiklos Vajna1-0/+1
So we compile using either '-O2' or '-O0 -g', instead of '-O2 -g' all the time. Change-Id: Iefc22f38be37ea876c713724657af460eb4c1606
2015-09-04Fix libxmlsec on MSVC 14.0David Ostrovsky1-0/+36
Change-Id: I37fd06bb0df1ad8f23eddc32b8eb5c93b2943fda Reviewed-on: https://gerrit.libreoffice.org/18327 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: David Ostrovsky <david@ostrovsky.org>
2014-11-28Fold URE: Linux ure/lib/* -> program/Stephan Bergmann1-1/+1
The ../../../program/ links in the URE jar Class-Paths are a temporary kludge (and juh.jar had lacked adaption for Mac OS X). Change-Id: I2542d8a582866485dd61c05df3fc6b4b39a8403d
2014-10-02fdo#82430: MSVC build: avoid using SSE2 instructions in some externalsMichael Stahl1-1/+1
Hopefully this should fix up the most important external libraries. Change-Id: I744cb5a2ce7fafb10852059050cf24589d6ca400
2014-08-12Now that we build NSS, we can build libxmlsec and libxsec_xmlsec for iOS, tooTor Lillqvist2-2/+2
Change-Id: I65ab8aad0744a2aa254fefc7732cd8130bb249fb
2014-07-20fdo#63756 build libxml2 with ICU supportDavid Tardon2-2/+1
Change-Id: I0523e49e640812be435ba4c97b1881ca253eb2ab
2014-05-13update libxmlsec config.* to support ppc64leDavid Tardon2-0/+1631
Change-Id: I4b31729481b7fd538483db5b6e39e1d80e03b3b6
2014-03-11normalize values of MINGW_SHARED_GCCLIB/MINGW_SHARED_GXXLIBMichael Stahl1-2/+2
Change-Id: I4f4cecd95f87b9d37fa1b1a270cf554d7707aaa2
2014-02-27normalize values of CROSS_COMPILINGMichael Stahl1-1/+1
Change-Id: I0cc43cef91e3fcd82a3558a16ab0afbd4d56b141
2014-02-12normalize values of SYSTEM_FREETYPE, SYSTEM_LIBXML, SYSTEM_MARIADBMichael Stahl1-1/+1
Change-Id: Iffcc671ca41c5880579effe0786a3b4d3be0dab0
2014-02-12fdo#74825: fix missing lcms2/libxslt/curl in installation setsMichael Stahl1-2/+2
The assumption that all configure variables had been normalized to TRUE/<empty> turned out not to hold; convert a bit more in that direction. (regression from 4af38b099c741c3676aefeb20c515913aaeed666) Change-Id: I2127c515e8a833a07c9b26ed9d693ce5a1853fe4
2014-01-10libxmlsec: openssl conditional was accidentally invertedMichael Stahl1-1/+1
... in commit bf6d1f77420dcc9ece4d9f4eae1e37b427d85c6a. And it just happens to not build with clang here. Change-Id: Ic467abc894b9c98c81fa64cb57eafaa4cfcaa66e
2013-11-14nss: upgrade to 3.15.3Michael Stahl1-2/+2
- from nss_macosx.patch drop nmedit hunk (removed upstream) - adapt include and lib paths to changed tarball directory layout Change-Id: Ia5dcce8dfd9d10e7e4ba689eefa9f39a51596dfe Reviewed-on: https://gerrit.libreoffice.org/6670 Tested-by: LibreOffice gerrit bot <gerrit@libreoffice.org> Reviewed-by: Michael Stahl <mstahl@redhat.com>
2013-11-04fdo#70393: move libxmlsec to a subdir of externalKhaled Hosny28-0/+8139
Change-Id: I1bcdd01aad7fc2ee2d2f635b0ae4c4183c9ab092 Reviewed-on: https://gerrit.libreoffice.org/6571 Reviewed-by: David Tardon <dtardon@redhat.com> Tested-by: David Tardon <dtardon@redhat.com>