Bug 252113 - Review Request: xml-security - Implementation of W3C security standards for XML
Summary: Review Request: xml-security - Implementation of W3C security standards for XML
Status: CLOSED DUPLICATE of bug 231305
Alias: None
Product: Fedora
Classification: Fedora
Component: Package Review   
(Show other bugs)
Version: rawhide
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Nobody's working on this, feel free to take it
QA Contact: Fedora Extras Quality Assurance
URL: http://xml.apache.org/security
Whiteboard:
Keywords:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-13 22:21 UTC by Vivek Lakshmanan
Modified: 2007-11-30 22:12 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-13 23:29:33 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Vivek Lakshmanan 2007-08-13 22:21:10 UTC
Spec URL: http://vivekl.fedorapeople.org/rpms/xml-security.spec
SRPM URL: http://vivekl.fedorapeople.org/rpms/xml-security-1.3.0-1jpp.3.fc8.src.rpm

The XML Security project is aimed at providing implementation
of security standards for XML. Currently the focus is on the
W3C standards :
- XML-Signature Syntax and Processing; and
- XML Encryption Syntax and Processing.
Once these are implemented, XML Key Management is likely to
be the next focus for the project.
Two libraries are currently available.
A Java library, which includes a mature Digital Signature
implementation. Encryption is currently under development.
A C++ library is also now available. Functionality is
currently more basic than that provided by the Java library.
Needed for supporting application servers

Comment 1 Vivek Lakshmanan 2007-08-13 23:29:33 UTC

*** This bug has been marked as a duplicate of 231305 ***


Note You need to log in before you can comment on or make changes to this bug.