{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.z2tb38dz/b1/python-signxml_4.0.5+dfsg-2_arm64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.z2tb38dz/b2/python-signxml_4.0.5+dfsg-2_arm64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,3 +1,3 @@\n \n- 0f45ceddd13026886d483bf146f4097c 103664 doc optional python-signxml-doc_4.0.5+dfsg-2_all.deb\n+ 5fcf8f3dce47ff8045a9b115ed840664 103660 doc optional python-signxml-doc_4.0.5+dfsg-2_all.deb\n ef41577adadd11b99b5ebb8c8454903e 42712 python optional python3-signxml_4.0.5+dfsg-2_all.deb\n"}, {"source1": "python-signxml-doc_4.0.5+dfsg-2_all.deb", "source2": "python-signxml-doc_4.0.5+dfsg-2_all.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-06-12 20:37:42.000000 debian-binary\n--rw-r--r-- 0 0 0 1928 2025-06-12 20:37:42.000000 control.tar.xz\n--rw-r--r-- 0 0 0 101544 2025-06-12 20:37:42.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 1932 2025-06-12 20:37:42.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 101536 2025-06-12 20:37:42.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/python-signxml-doc/html/index.html", "source2": "./usr/share/doc/python-signxml-doc/html/index.html", "unified_diff": "@@ -788,15 +788,15 @@\n
Verify the XML signature supplied in the data and return a list of VerifyResult
data structures\n representing the data signed by the signature, or raise an exception if the signature is not valid. By default,\n this requires the signature to be generated using a valid X.509 certificate. To enable other means of signature\n validation, set expect_config
to a configuration with the require_x509 parameter set to False.
See what is signed
\nIt is important to understand and follow the best practice rule of \u201cSee what is signed\u201d when verifying XML\n@@ -1489,15 +1489,15 @@\n \n
Create a new XAdES Signature Verifier object, which can be used to verify multiple pieces of data.
\nVerify the XAdES signature supplied in the data and return a list of XAdESVerifyResult
data structures\n representing the data signed by the signature, or raise an exception if the signature is not valid. This method\n is a wrapper around signxml.XMLVerifier.verify()
; see its documentation for more details and arguments it\n supports.