Blame SOURCES/xmlSecOpenSSLX509DataNodeRead-error.patch

63b8be
Please see this bug report for full details:
63b8be
https://github.com/lsh123/xmlsec/issues/164
63b8be
63b8be
commit e303e077fb3e13654ba711b2816ff1a94247338b
63b8be
Author: lsh123 <aleksey@aleksey.com>
63b8be
Date:   Wed Apr 11 17:13:43 2018 -1000
63b8be
63b8be
    Add missing return(-1). (#165)
63b8be
    
63b8be
    Fixed issue #164. All other crypto libraries are ok.
63b8be
63b8be
diff --git a/src/openssl/x509.c b/src/openssl/x509.c
63b8be
index 15fe70db..b98e62d1 100644
63b8be
--- a/src/openssl/x509.c
63b8be
+++ b/src/openssl/x509.c
63b8be
@@ -870,6 +870,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
63b8be
                 xmlSecInternalError2("xmlSecOpenSSLX509CertificateNodeRead",
63b8be
                                      xmlSecKeyDataGetName(data),
63b8be
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
63b8be
+                return(-1);
63b8be
             }
63b8be
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509SubjectName, xmlSecDSigNs)) {
63b8be
             ret = xmlSecOpenSSLX509SubjectNameNodeRead(data, cur, keyInfoCtx);
63b8be
@@ -877,6 +878,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
63b8be
                 xmlSecInternalError2("xmlSecOpenSSLX509SubjectNameNodeRead",
63b8be
                                      xmlSecKeyDataGetName(data),
63b8be
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
63b8be
+                return(-1);
63b8be
             }
63b8be
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509IssuerSerial, xmlSecDSigNs)) {
63b8be
             ret = xmlSecOpenSSLX509IssuerSerialNodeRead(data, cur, keyInfoCtx);
63b8be
@@ -884,6 +886,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
63b8be
                 xmlSecInternalError2("xmlSecOpenSSLX509IssuerSerialNodeRead",
63b8be
                                      xmlSecKeyDataGetName(data),
63b8be
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
63b8be
+                return(-1);
63b8be
             }
63b8be
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509SKI, xmlSecDSigNs)) {
63b8be
             ret = xmlSecOpenSSLX509SKINodeRead(data, cur, keyInfoCtx);
63b8be
@@ -891,6 +894,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
63b8be
                 xmlSecInternalError2("xmlSecOpenSSLX509SKINodeRead",
63b8be
                                      xmlSecKeyDataGetName(data),
63b8be
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
63b8be
+                return(-1);
63b8be
             }
63b8be
         } else if(xmlSecCheckNodeName(cur, xmlSecNodeX509CRL, xmlSecDSigNs)) {
63b8be
             ret = xmlSecOpenSSLX509CRLNodeRead(data, cur, keyInfoCtx);
63b8be
@@ -898,6 +902,7 @@ xmlSecOpenSSLX509DataNodeRead(xmlSecKeyDataPtr data, xmlNodePtr node, xmlSecKeyI
63b8be
                 xmlSecInternalError2("xmlSecOpenSSLX509CRLNodeRead",
63b8be
                                      xmlSecKeyDataGetName(data),
63b8be
                                      "node=%s", xmlSecErrorsSafeString(xmlSecNodeGetName(cur)));
63b8be
+                return(-1);
63b8be
             }
63b8be
         } else if((keyInfoCtx->flags & XMLSEC_KEYINFO_FLAGS_X509DATA_STOP_ON_UNKNOWN_CHILD) != 0) {
63b8be
             /* laxi schema validation: ignore unknown nodes */