[xmlsec] xmlsec1-1.2.16 to xmlsec1-1.2.29 decrypt problems

Floodeenjr, Thomas thomas_floodeenjr at mentor.com
Mon Mar 30 08:16:37 PDT 2020


Aleksey,

Following the progression of our code, according to this call stack:

	Application.exe!xmlParseCDSect(_xmlParserCtxt * ctxt) Line 9748	C
 	Application.exe!xmlParseContent(_xmlParserCtxt * ctxt) Line 9831	C
 	Application.exe!xmlParseInNodeContext(_xmlNode * node, const char * data, int datalen, int options, _xmlNode * * lst) Line 13682	C
 	Application.exe!xmlSecReplaceNodeBufferAndReturn(_xmlNode * node, const unsigned char * buffer, unsigned int size, _xmlNode * * replaced) Line 632	C
 	Application.exe!xmlSecReplaceNodeBuffer(_xmlNode * node, const unsigned char * buffer, unsigned int size) Line 609	C
>	Application.exe!xmlSecEncCtxDecrypt(_xmlSecEncCtx * encCtx, _xmlNode * node) Line 562	C

Inside xmlSecReplaceNodeBufferAndReturn(), we call xmlParseInNodeContext(node->parent, (const char*)buffer, size, XML_PARSE_NODICT, &results);

It looks like the call in xmlSecReplaceNodeBufferAndReturn() hard-codes the option to "XML_PARSE_NODICT", and gives us no option to pass in the XML_PARSE_HUGE parameter we need when we call xmlSecEncCtxDecrypt().

Any ideas how to get around this?

Thanks,
-Tom

-----Original Message-----
From: Aleksey Sanin <aleksey at aleksey.com> 
Sent: Friday, March 27, 2020 5:17 PM
To: Floodeenjr, Thomas <thomas_floodeenjr at mentor.com>; xmlsec at aleksey.com
Subject: Re: [xmlsec] xmlsec1-1.2.16 to xmlsec1-1.2.29 decrypt problems

Great. I am not aware of any issues with this flag. Since you posted to libxml2 mailing list, I am sure you fill get the answer shortly.

Aleksey

On 3/27/20 2:55 PM, Floodeenjr, Thomas wrote:
> Aleksey,
> 
> It seems we found the problem. Before we decrypt, we call doc = xmlReadFile( filePath, NULL, XML_PARSE_HUGE ); It seems the XML_PARSE_HUGE flag is not honored in libxml2. I am not sure if this is a bug in libxml2, or if it is a new "feature". We are looking for a way to work around this. If we hard-code it in xmlCtxtUseOptionsInternal(), i.e., ctxt->options |= XML_PARSE_HUGE;, then our code decrypts fine.
> 
> Thanks for your replies.
> 
> -Tom
> 
> 
> 
> -----Original Message-----
> From: Aleksey Sanin <aleksey at aleksey.com>
> Sent: Friday, March 27, 2020 10:32 AM
> To: Floodeenjr, Thomas <thomas_floodeenjr at mentor.com>; 
> xmlsec at aleksey.com
> Subject: Re: [xmlsec] xmlsec1-1.2.16 to xmlsec1-1.2.29 decrypt 
> problems
> 
> Hi Thomas,
> 
> I am not aware of any limitations on file sizes. I would suggest to either set a breakpoint or dump the decrypted data before the call to xmlParseInNodeContext() to see what's wrong. There are a couple options I can think of:
> 1) Decryption is completely incorrect and you will see junk in the buffer.
> 2) Decryption is correct but the data is truncated.
> 
> Let me know what do you find.
> 
> Aleksey
> 
> On 3/27/20 6:07 AM, Floodeenjr, Thomas wrote:
>> Aleksey,
>>
>> Is there a limitation with xmlsec1-1.2.29 on the size of the 
>> encrypted XML that is being decrypted? The file seems to encrypt OK, 
>> but will not decrypt. (290 MB). Smaller files work fine both ways. We 
>> are using
>> libxml2-2.9.9 and openssl-1.1.1d.  (Previously we used libxml2-2.7.8 
>> and openssl-1.0.2g, and it worked fine.)
>>
>> Thanks,
>> -Tom
>>
>> -----Original Message-----
>> From: xmlsec <xmlsec-bounces at aleksey.com> On Behalf Of Floodeenjr, 
>> Thomas
>> Sent: Thursday, March 26, 2020 12:52 PM
>> To: Aleksey Sanin <aleksey at aleksey.com>; xmlsec at aleksey.com
>> Subject: Re: [xmlsec] xmlsec1-1.2.16 to xmlsec1-1.2.29 decrypt 
>> problems
>>
>> It returns here with -1
>>
>>       if(ret != XML_ERR_OK) {
>>           xmlSecXmlError("xmlParseInNodeContext", NULL);
>>           return(-1);
>>       }
>>
>> -----Original Message-----
>> From: Aleksey Sanin <aleksey at aleksey.com>
>> Sent: Thursday, March 26, 2020 11:05 AM
>> To: Floodeenjr, Thomas <thomas_floodeenjr at mentor.com>; 
>> xmlsec at aleksey.com
>> Subject: Re: [xmlsec] xmlsec1-1.2.16 to xmlsec1-1.2.29 decrypt 
>> problems
>>
>> What error do you get?
>>
>> Aleksey
>>
>> On 3/26/20 8:26 AM, Floodeenjr, Thomas wrote:
>>> Hello,
>>>
>>> We recently upgraded from xmlsec1-1.2.16 to xmlsec1-1.2.29. We have 
>>> some data created in 1.2.16 that we can decrypt, but it fails to 
>>> decrypt in 1.2.29.
>>>
>>>                  Application.exe!xmlSecCheckNodeName(_xmlNode * 
>>> const cur, const unsigned char * name, const unsigned char * ns) 
>>> Line 210 C
>>>
>>>>                 
>>>> Application.exe!xmlSecEncCtxEncDataNodeRead(_xmlSecEncCtx * encCtx, 
>>>> _xmlNode * node) Line 696      C
>>>
>>>                  
>>> Application.exe!xmlSecEncCtxDecryptToBuffer(_xmlSecEncCtx
>>> * encCtx, _xmlNode * node) Line 597      C
>>>
>>>                  Application.exe!xmlSecEncCtxDecrypt(_xmlSecEncCtx * 
>>> encCtx, _xmlNode * node) Line 524      C
>>>
>>> Other items do decrypt fine with both versions. Any ideas what we 
>>> can look into?
>>>
>>> Thanks,
>>>
>>> -Tom
>>>
>>>
>>> _______________________________________________
>>> xmlsec mailing list
>>> xmlsec at aleksey.com
>>> http://www.aleksey.com/mailman/listinfo/xmlsec
>>>
>> _______________________________________________
>> xmlsec mailing list
>> xmlsec at aleksey.com
>> http://www.aleksey.com/mailman/listinfo/xmlsec
>>
> _______________________________________________
> xmlsec mailing list
> xmlsec at aleksey.com
> http://www.aleksey.com/mailman/listinfo/xmlsec
> 


More information about the xmlsec mailing list