Comments (8)
Hi
Can you show me a sample signed XML where validaiton fails but you beleive it is valid?
The best is if you fork this repository and create a fix (with a test). Then send me a pull request.
Yaron
from xml-crypto.
Ok, in monday morning i'll send you a signed xml.
Thanks
On Fri, May 31, 2013 at 9:19 PM, Yaron Naveh [email protected]:
Hi
Can you show me a sample signed XML where validaiton fails but you beleive
it is valid?
The best is if you fork this repository and create a fix (with a test).
Then send me a pull request.Yaron
—
Reply to this email directly or view it on GitHubhttps://github.com//issues/10#issuecomment-18766153
.
Lautaro
Saludos amigo quiere verse tan feliz como yo.. ah, pero tiene el poder
dentro de usted ahora mismo!, asique úselo!, envíe un dolar a Pato Feliz,
Avenida Siempre Viva 72 Springfield, no tarde! la felicidad, la felicidad
eterna solo a un dolar de distancia!
from xml-crypto.
here is the sample
On Fri, May 31, 2013 at 9:19 PM, Yaron Naveh [email protected]:
Hi
Can you show me a sample signed XML where validaiton fails but you beleive
it is valid?
The best is if you fork this repository and create a fix (with a test).
Then send me a pull request.Yaron
—
Reply to this email directly or view it on GitHubhttps://github.com//issues/10#issuecomment-18766153
.
Lautaro
Saludos amigo quiere verse tan feliz como yo.. ah, pero tiene el poder
dentro de usted ahora mismo!, asique úselo!, envíe un dolar a Pato Feliz,
Avenida Siempre Viva 72 Springfield, no tarde! la felicidad, la felicidad
eterna solo a un dolar de distancia!
from xml-crypto.
I cannot attach file in here. I'll send you by mail.
from xml-crypto.
is this already fixed in the main branch?
from xml-crypto.
The issue of attributes order is not fixed in my fork. By the way I didn't
fix the problem in c14n transformation. Justo fix the order in my own
implementation of Node.serializeToString().I have to do this to fix the
poblem, but is not the best solution and is not for every case. Sorry.
On Sat, Jul 20, 2013 at 4:12 PM, Yaron Naveh [email protected]:
is this already fixed in the main branch?
—
Reply to this email directly or view it on GitHubhttps://github.com//issues/10#issuecomment-21294081
.
Lautaro
Saludos amigo quiere verse tan feliz como yo.. ah, pero tiene el poder
dentro de usted ahora mismo!, asique úselo!, envíe un dolar a Pato Feliz,
Avenida Siempre Viva 72 Springfield, no tarde! la felicidad, la felicidad
eterna solo a un dolar de distancia!
from xml-crypto.
Thanks, I was referreing to the issue of ID="", can I close this issue?
from xml-crypto.
Sorry, de issue of ID="" is OK, I Just remove my patch and everything works
fine. Thanks.
On Sat, Jul 20, 2013 at 6:06 PM, Yaron Naveh [email protected]:
Thanks, I was referreing to the issue of ID="", can I close this issue?
—
Reply to this email directly or view it on GitHubhttps://github.com//issues/10#issuecomment-21295839
.
Lautaro
Saludos amigo quiere verse tan feliz como yo.. ah, pero tiene el poder
dentro de usted ahora mismo!, asique úselo!, envíe un dolar a Pato Feliz,
Avenida Siempre Viva 72 Springfield, no tarde! la felicidad, la felicidad
eterna solo a un dolar de distancia!
from xml-crypto.
Related Issues (20)
- A Proposal for Moving Forward HOT 1
- refactor: deprecate `SignedXml.signingKey` in favor of `SignedXml.publicKey` and `SignedXml.privateKey` HOT 1
- `xpath` dependency "problem" HOT 10
- [ENHANCEMENT]: Signature compliant to http://www.w3.org/2007/05/xmldsig-more#sha256-rsa-MGF1 HOT 5
- [ENHANCEMENT]: Export `C14nCanonicalization`, `ExclusiveCanonicalization` HOT 1
- [ENHANCEMENT]: Remove files, folders not needed on the release HOT 2
- Add Reference for the KeyInfo node
- [BUG]: keyInfo usage HOT 4
- invalid signature: for uri calculated digest is '*' but the xml to validate supplies digest '*' HOT 9
- Issue with Signature Verification When 'Transforms' Tag is Absent in 'Reference' Element HOT 5
- How to sign a SAML assertion? HOT 1
- Potentially unsafe default impl for `getKeyInfo()` HOT 2
- [BUG?]: duplicate reference in signature HOT 6
- The declared digest does not match the actual calculated digest HOT 3
- Bug/Outdated README: unclear whether signatureAlgorithm required or not HOT 2
- [ENHANCEMENT]: AddObject to SignedXml instance HOT 4
- [ENHANCEMENT]: wssecurity - getCertFromKeyInfo not possible HOT 1
- [ENHANCEMENT]: Improve experience of adding a `Reference` to the `Signature`.
- [ENHANCEMENT]: Making the signature wrap the content that it's signing HOT 4
- digest is invalid because the computed digest differs from the digest in the XML HOT 4
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from xml-crypto.