Blame SOURCES/xmlSecOpenSSLX509DataNodeRead-error.patch

326030
Please see this bug report for full details:
326030
https://github.com/lsh123/xmlsec/issues/164
326030
326030
commit e303e077fb3e13654ba711b2816ff1a94247338b
326030
Author: lsh123 <aleksey@aleksey.com>
326030
Date:   Wed Apr 11 17:13:43 2018 -1000
326030
326030
    Add missing return(-1). (#165)
326030
    
326030
    Fixed issue #164. All other crypto libraries are ok.
326030
326030
diff --git a/src/openssl/x509.c b/src/openssl/x509.c
326030
index 15fe70db..b98e62d1 100644
326030
--- a/src/openssl/x509.c
326030
+++ b/src/openssl/x509.c
326030
@@ -870,6 +870,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
326030
                 xmlSecInternalError2("xmlSecOpenSSLX509CertificateNodeRead",
326030
                                      xmlSecKeyDataGetName(data),
326030
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
326030
+                return(-1);
326030
             }
326030
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509SubjectName, xmlSecDSigNs)) {
326030
             ret = xmlSecOpenSSLX509SubjectNameNodeRead(data, cur, keyInfoCtx);
326030
@@ -877,6 +878,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
326030
                 xmlSecInternalError2("xmlSecOpenSSLX509SubjectNameNodeRead",
326030
                                      xmlSecKeyDataGetName(data),
326030
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
326030
+                return(-1);
326030
             }
326030
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509IssuerSerial, xmlSecDSigNs)) {
326030
             ret = xmlSecOpenSSLX509IssuerSerialNodeRead(data, cur, keyInfoCtx);
326030
@@ -884,6 +886,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
326030
                 xmlSecInternalError2("xmlSecOpenSSLX509IssuerSerialNodeRead",
326030
                                      xmlSecKeyDataGetName(data),
326030
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
326030
+                return(-1);
326030
             }
326030
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509SKI, xmlSecDSigNs)) {
326030
             ret = xmlSecOpenSSLX509SKINodeRead(data, cur, keyInfoCtx);
326030
@@ -891,6 +894,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
326030
                 xmlSecInternalError2("xmlSecOpenSSLX509SKINodeRead",
326030
                                      xmlSecKeyDataGetName(data),
326030
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
326030
+                return(-1);
326030
             }
326030
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509CRL, xmlSecDSigNs)) {
326030
             ret = xmlSecOpenSSLX509CRLNodeRead(data, cur, keyInfoCtx);
326030
@@ -898,6 +902,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
326030
                 xmlSecInternalError2("xmlSecOpenSSLX509CRLNodeRead",
326030
                                      xmlSecKeyDataGetName(data),
326030
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
326030
+                return(-1);
326030
             }
326030
         } else if((keyInfoCtx->flags & XMLSEC_KEYINFO_FLAGS_X509DATA_STOP_ON_UNKNOWN_CHILD) != 0) {
326030
             /* laxi schema validation: ignore unknown nodes */