CA bundle install path detection (#32)

This commit is contained in:
olszomal 2020-02-04 22:44:58 +01:00 committed by GitHub
parent e7dd72c64d
commit 7fcf08ad75
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
45 changed files with 129 additions and 123 deletions

View File

@ -132,6 +132,8 @@ fi
AC_SUBST([OPTIONAL_LIBCURL_CFLAGS])
AC_SUBST([OPTIONAL_LIBCURL_LIBS])
AC_DEFINE_UNQUOTED([CA_BUNDLE_PATH], ["$(curl-config --ca 2>/dev/null)"], [CA bundle install path])
AC_CONFIG_FILES([Makefile])
AC_OUTPUT

View File

@ -1919,7 +1919,7 @@ static int verify_timestamp(PKCS7 *p7, PKCS7 *tmstamp_p7, char *untrusted)
printf("TSA's certificates file: %s\n", untrusted);
store = X509_STORE_new();
if (!load_file_lookup(store, untrusted, NULL, X509_PURPOSE_TIMESTAMP_SIGN)) {
fprintf(stderr, "Failed to add timestamp store lookup file\n");
printf("\nUse the \"-untrusted\" option to add the CA cert bundle to verify timestamp server.\n");
ret = 1; /* FAILED */
}
verok = PKCS7_verify(tmstamp_p7, tmstamp_p7->d.sign->cert, store, 0, NULL, 0);
@ -2971,6 +2971,10 @@ static char *get_cafile(void)
const char *sslpart1, *sslpart2;
char *cafile, *openssl_dir, *str_begin, *str_end;
#ifdef CA_BUNDLE_PATH
if (strcmp(CA_BUNDLE_PATH, ""))
return OPENSSL_strdup(CA_BUNDLE_PATH);
#endif
sslpart1 = OpenSSL_version(OPENSSL_DIR);
sslpart2 = "/certs/ca-bundle.crt";
str_begin = strchr(sslpart1, '"');

View File

@ -3,7 +3,7 @@
result=0
test_result() {
if [ "$1" == 0 ]
if test "$1" -eq 0
then
printf "Succeeded\n" >> "makecerts.log"
else
@ -139,9 +139,9 @@ make_certs() {
test_result $?
# copy new files
if [ -s tmp/CACert.pem ] && [ -s tmp/crosscert.pem ] && [ -s tmp/expired.pem ] && [ -s tmp/cert.pem ] && \
[ -s tmp/CACertCRL.pem ] && [ -s tmp/revoked.pem ] && [ -s tmp/key.pem ] && [ -s tmp/keyp.pem ] && \
[ -s tmp/key.der ] && [ -s tmp/cert.der ] && [ -s tmp/cert.spc ] && [ -s tmp/cert.p12 ]
if test -s tmp/CACert.pem -a -s tmp/crosscert.pem -a -s tmp/expired.pem -a -s tmp/cert.pem \
-a -s tmp/CACertCRL.pem -a -s tmp/revoked.pem -a -s tmp/key.pem -a -s tmp/keyp.pem \
-a -s tmp/key.der -a -s tmp/cert.der -a -s tmp/cert.spc -a -s tmp/cert.p12
then
cp tmp/* ./
printf "%s\n" "keys & certificates successfully generated"
@ -164,7 +164,7 @@ make_certs() {
}
# Tests requirement
if [ -n "$(command -v faketime)" ]
if test -n "$(command -v faketime)"
then
make_certs $1
result=$?

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="011. Sign a PE file with the certificate and private key files in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="012. Sign a CAB file with the certificate and private key files in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -40,7 +40,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="013. Sign a MSI file with the certificate and private key files in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="021. Sign a PE file with the encrypted private key file in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="022. Sign a CAB file with the encrypted private key file in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -41,7 +41,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="023. Sign a MSI file with the encrypted private key file in the PEM format"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="031. Sign a PE file with the encrypted private key file in the DER format"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -25,7 +25,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="032. Sign a CAB file with the encrypted private key file in the DER format"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -42,7 +42,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="033. Sign a MSI file with the encrypted private key file in the DER format"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="041. Sign a PE file a SPC certificate file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -25,7 +25,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="042. Sign a CAB file a SPC certificate file"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -42,7 +42,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="043. Sign a MSI file a SPC certificate file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="051. Sign a PE file with a certificate and key stored in a PKCS#12 container"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -23,7 +23,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="052. Sign a CAB file with a certificate and key stored in a PKCS#12 container"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -40,7 +40,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="053. Sign a MSI file with a certificate and key stored in a PKCS#12 container"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -6,9 +6,9 @@ res=0
skip=0
test_name="061. Checking SHA256 message digests for 01x-05x tests"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
if [ $(cat "sha256sum_exe.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1 ]
if test $(cat "sha256sum_exe.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1
then
res=1
cat "sha256sum_exe.log" >> "results.log"
@ -21,9 +21,9 @@ if [ -s "test.exe" ]
skip=$(($skip+1))
fi
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
if [ $(cat "sha256sum_ex_.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1 ]
if test $(cat "sha256sum_ex_.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1
then
res=1
cat "sha256sum_ex_.log" >> "results.log"
@ -36,9 +36,9 @@ if [ -s "test.ex_" ]
skip=$(($skip+1))
fi
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
if [ $(cat "sha256sum_msi.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1 ]
if test $(cat "sha256sum_msi.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1
then
res=1
cat "sha256sum_msi.log" >> "results.log"
@ -51,7 +51,7 @@ if [ -s "sample.msi" ]
skip=$(($skip+1))
fi
if [ $skip -lt 3 ]
if test $skip -lt 3
then
test_result "$res" "$test_name"
else

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="071. Sign a PE file with Authenticode timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# CAB file
test_name="072. Sign a CAB file with Authenticode timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.ex_" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -41,7 +41,7 @@ if [ -s "test.ex_" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="073. Sign a MSI file with Authenticode timestamping"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -11,7 +11,7 @@ script_path=$(pwd)
# PE file
test_name="081. Sign a PE file with RFC 3161 timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -28,7 +28,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# CAB file
test_name="082. Sign a CAB file with RFC 3161 timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.ex_" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -45,7 +45,7 @@ if [ -s "test.ex_" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="083. Sign a MSI file with RFC 3161 timestamping"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="091. Generate page hashes for a PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 -ph \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="101. Sign a PE file with addUnauthenticatedBlob"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="102. Sign a CAB file with addUnauthenticatedBlob"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -41,7 +41,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="103. Sign a MSI file with addUnauthenticatedBlob"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="111. Sign a PE file with the nest flag"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -32,7 +32,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="113. Sign a MSI file with the nest flag"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="121. Sign a PE file with the PEM key file and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="122. Sign a CAB file with a PEM key file and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -41,7 +41,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="123. Sign a MSI file with a PEM key file and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="131. Sign a PE file with a PKCS#12 container and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -25,7 +25,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="132. Sign a CAB file with a PKCS#12 container and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -42,7 +42,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="133. Sign a MSI file with a PKCS#12 container and the file with a password"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="141. Sign a PE file with a descryption"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -24,7 +24,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="142. Sign a CAB file with a descryption"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -41,7 +41,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="143. Sign a MSI file with a descryption"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="151. Sign a PE file with specified URL"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -25,7 +25,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="152. Sign a CAB file with specified URL"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -42,7 +42,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="153. Sign a MSI file with specified URL"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -10,7 +10,7 @@ script_path=$(pwd)
# PE file
test_name="161. Sign a PE file with the common purpose set"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -27,7 +27,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="162. Sign a CAB file with the common purpose set"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -44,7 +44,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="163. Sign a MSI file with the common purpose set"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -9,7 +9,7 @@ script_path=$(pwd)
# PE file
test_name="171. Add an additional certificate to the signature block of the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -26,7 +26,7 @@ if [ -s "test.exe" ]
# CAB file
test_name="172. Add an additional certificate to the signature block of the CAB file"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -43,7 +43,7 @@ if [ -s "test.ex_" ]
# MSI file
test_name="173. Add an additional certificate to the signature block of the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="211. Sign a PE file with MD5 set of cryptographic hash functions"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h md5 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="221. Sign a PE file with SHA1 set of cryptographic hash functions"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha1 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="231. Signing a PE file with SHA1 set of cryptographic hash functions"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha2 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="241. Sign a PE file with SHA384 set of cryptographic hash functions"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha384 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="251. Sign a PE file with SHA512 set of cryptographic hash functions"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha512 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="311. Extract the signature from the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -28,7 +28,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="312. Extract the signature from the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="321. Attach the signature to the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode attach-signature -sigin "sign_pe.pem" \
-CAfile "${script_path}/../certs/CACert.pem" \
@ -26,7 +26,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="322. Attach the signature to the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode attach-signature -sigin "sign_msi.pem" \
-CAfile "${script_path}/../certs/CACert.pem" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="331. Remove the signature from the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -28,7 +28,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="332. Remove the signature from the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,9 +7,9 @@ res=0
skip=0
test_name="351. Checking SHA256 message digests for 31x-34x tests"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
if [ $(cat "sha256sum_exe.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1 ]
if test $(cat "sha256sum_exe.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1
then
res=1
cat "sha256sum_exe.log" >> "results.log"
@ -22,9 +22,9 @@ if [ -s "test.exe" ]
skip=$(($skip+1))
fi
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
if [ $(cat "sha256sum_msi.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1 ]
if test $(cat "sha256sum_msi.log" | cut -d' ' -f1 | uniq | wc -l) -ne 1
then
res=1
cat "sha256sum_msi.log" >> "results.log"
@ -37,7 +37,7 @@ if [ -s "sample.msi" ]
skip=$(($skip+1))
fi
if [ $skip -lt 2 ]
if test $skip -lt 2
then
test_result "$res" "$test_name"
else

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="361. Add an unauthenticated blob to the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -29,7 +29,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="362. Add an unauthenticated blob to the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="371. Add an authenticode timestamp to the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -29,7 +29,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="372. Add an authenticode timestamp to the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="381. Add RFC 3161 timestamp to signed PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -29,7 +29,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="382. Add RFC 3161 timestamp to signed MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -7,7 +7,7 @@ script_path=$(pwd)
# PE file
test_name="401. Compare the leaf certificate hash against specified SHA256 message digest for the PE file"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \
@ -25,7 +25,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="403. Compare the leaf certificate hash against specified SHA256 message digest for the MSI file"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -17,7 +17,7 @@ script_path=$(pwd)
# MSI file
test_name="411. Sign a MSI file with the add-msi-dse option"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -11,7 +11,7 @@ script_path=$(pwd)
# CAB file
test_name="421. Sign a CAB file with jp low option"
printf "\n%s\n" "$test_name"
if [ -s "test.ex_" ]
if test -s "test.ex_"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="451. Verify changed PE file after signing"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="461. Verify changed PE file after signing with Authenticode timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -8,7 +8,7 @@ script_path=$(pwd)
# PE file
test_name="471. Verify changed PE file after signing with RFC 3161 timestamping"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
../../osslsigncode sign -h sha256 \
-st "1556668800" \

View File

@ -6,7 +6,7 @@
# PE file
test_name="511. Verify PE file signature after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ]
if test -s "test.exe"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)
@ -26,7 +26,7 @@ if [ -s "test.exe" ]
# MSI file
test_name="513. Verify MSI file signature after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ]
if test -s "sample.msi"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)

View File

@ -6,7 +6,7 @@
# PE file
test_name="521. Verify PE file signature with timestamping after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)
@ -27,7 +27,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="523. Verify MSI file signature with timestamping after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)

View File

@ -6,7 +6,7 @@
# PE file
test_name="531. Verify PE file signature with RFC3161 after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)
@ -27,7 +27,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="533. Verify MSI file signature with RFC3161 after the cert has been expired"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)

View File

@ -6,7 +6,7 @@
# PE file
test_name="541. Verify PE file signed with the expired cert"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)
@ -27,7 +27,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="543. Verify MSI file signed with the expired cert"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)

View File

@ -6,7 +6,7 @@
# PE file
test_name="551. Verify PE file signed with the revoked cert"
printf "\n%s\n" "$test_name"
if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
if test -s "test.exe" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)
@ -27,7 +27,7 @@ if [ -s "test.exe" ] && ! grep -q "no libcurl available" "results.log"
# MSI file
test_name="553. Verify MSI file signed with the revoked cert"
printf "\n%s\n" "$test_name"
if [ -s "sample.msi" ] && ! grep -q "no libcurl available" "results.log"
if test -s "sample.msi" && ! grep -q "no libcurl available" "results.log"
then
TZ=GMT faketime -f '@2019-05-01 00:00:00' /bin/bash -c '
script_path=$(pwd)

View File

@ -11,7 +11,7 @@ test_result() {
local result=0
if [ "$1" -eq 0 ]
if test "$1" -eq 0
then
printf "%s\n" "Test succeeded"
else
@ -40,8 +40,8 @@ modify_blob() {
-CRLfile "${script_path}/../certs/CACertCRL.pem" \
-in "test_$1_changed.$2" 2>> "verify.log" 1>&2
result=$?
if [ "$result" -ne 0 ] || \
[ $(grep -e "Calculated DigitalSignature" -e "Calculated message digest" "verify.log" | uniq | wc -l) -ne 1 ]
if test "$result" -ne 0 \
-o $(grep -e "Calculated DigitalSignature" -e "Calculated message digest" "verify.log" | uniq | wc -l) -ne 1
then
printf "Failed: verify error or non-unique message digests found\n" 2>> "verify.log" 1>&2
result=1
@ -61,7 +61,7 @@ search_pattern() {
local result=0
if [ "$3" = "ASCII" ]
if test "$3" = "ASCII"
then
hex_pattern=$(echo -n "$4" | xxd -p)
else
@ -72,9 +72,9 @@ search_pattern() {
then
result=1
printf "Failed: $4 not found\n"
elif [ "$5" = "MODIFY" ]
elif test "$5" = "MODIFY"
then
if [ "$2" != "ex_" ]
if test "$2" != "ex_"
then
modify_blob "$1" "$2" "$4"
result=$?
@ -99,9 +99,9 @@ verify_signature() {
local result=0
printf "" > "verify.log"
if [ "$1" -eq 0 ]
if test "$1" -eq 0
then
if [ "$3" != "ex_" ]
if test "$3" != "ex_"
then
cp "test_$2.$3" "test_tmp.tmp"
TZ=GMT faketime -f "$5" /bin/bash -c '
@ -116,25 +116,25 @@ verify_signature() {
else
printf "VERIFY is not supported for CAB files\n"
fi
if [ "$result" -eq 0 ] && [ "$7" != "UNUSED_PATTERN" ] && [ "$8" != "UNUSED_PATTERN" ]
if test "$result" -eq 0 -a "$7" != "UNUSED_PATTERN" -a "$8" != "UNUSED_PATTERN"
then
search_pattern "$2" "$3" "$7" "$8" "$9"
result=$?
fi
if [ "$6" = "sha256sum" ]
if test "$6" = "sha256sum"
then
if [ -s "test_$2_signed.$3" ]
if test -s "test_$2_signed.$3"
then
sha256sum "test_$2_signed.$3" 2>> "sha256sum_$3.log" 1>&2
else
sha256sum "test_$2.$3" 2>> "sha256sum_$3.log" 1>&2
fi
fi
if [ "$4" = "success" ] && [ "$result" -eq 0 ]
if test "$4" = "success" -a "$result" -eq 0
then
rm -f "test_$2.$3" "test_$2_signed.$3" "test_$2_modifed.$3" "test_$2_changed.$3"
result=0
elif [ "$4" = "fail" ] && [ "$result" -eq 1 ]
elif test "$4" = "fail" -a "$result" -eq 1
then
rm -f "test_$2.$3" "test_$2_signed.$3" "test_$2_modifed.$3" "test_$2_changed.$3"
cat "verify.log" >> "results.log"
@ -157,9 +157,9 @@ verify_leaf_hash() {
local result=0
printf "" > "verify.log"
if [ "$1" -eq 0 ]
if test "$1" -eq 0
then
if [ "$3" != "ex_" ]
if test "$3" != "ex_"
then
cp "test_$2.$3" "test_tmp.tmp"
TZ=GMT faketime -f "$4" /bin/bash -c '
@ -175,7 +175,7 @@ verify_leaf_hash() {
else
printf "VERIFY is not supported for CAB files\n"
fi
if [ "$result" -eq 0 ]
if test "$result" -eq 0
then
rm -f "test_$2.$3"
else

View File

@ -19,7 +19,7 @@ make_tests() {
/bin/sh $plik 3>&1 2>> "results.log" 1>&2
done
count=$(grep -c "Test succeeded" "results.log")
if [ $count -ne 0 ]
if test $count -ne 0
then
skip=$(grep -c "Test skipped" "results.log")
fail=$(grep -c "Test failed" "results.log")
@ -38,9 +38,9 @@ date > "results.log"
../../osslsigncode -v >> "results.log" 2>/dev/null
cd ${certs_path}
if [ -s CACert.pem ] && [ -s crosscert.pem ] && [ -s expired.pem ] && [ -s cert.pem ] && \
[ -s CACertCRL.pem ] && [ -s revoked.pem ] && [ -s key.pem ] && [ -s keyp.pem ] && \
[ -s key.der ] && [ -s cert.der ] && [ -s cert.spc ] && [ -s cert.p12 ]
if test -s CACert.pem -a -s crosscert.pem -a -s expired.pem -a -s cert.pem \
-a -s CACertCRL.pem -a -s revoked.pem -a -s key.pem -a -s keyp.pem \
-a -s key.der -a -s cert.der -a -s cert.spc -a -s cert.p12
then
printf "%s\n" "keys & certificates path: ${certs_path}"
else
@ -49,16 +49,16 @@ if [ -s CACert.pem ] && [ -s crosscert.pem ] && [ -s expired.pem ] && [ -s cert.
fi
cd "${result_path}"
if [ "$result" -ne 0 ]
if test "$result" -ne 0
then
exit $result
fi
# PE and CAB files support
if [ -n "$(command -v x86_64-w64-mingw32-gcc)" ]
if test -n "$(command -v x86_64-w64-mingw32-gcc)"
then
x86_64-w64-mingw32-gcc "../myapp.c" -o "test.exe" 2>> "results.log" 1>&2
if [ -n "$(command -v gcab)" ]
if test -n "$(command -v gcab)"
then
gcab -c "test.ex_" "test.exe" 2>> "results.log" 1>&2
else
@ -75,7 +75,7 @@ if grep -q "no libgsf available" "results.log"
then
printf "%s\n" "signing MSI files requires libgsf/libgsf-devel packages and reconfiguration osslsigncode"
else
if [ -n "$(command -v wixl)" ]
if test -n "$(command -v wixl)"
then
touch FoobarAppl10.exe
cp "../sample.wxs" "sample.wxs" 2>> "results.log" 1>&2
@ -93,9 +93,9 @@ if grep -q "no libcurl available" "results.log"
fi
# Tests requirements
if [ -n "$(command -v faketime)" ]
if test -n "$(command -v faketime)"
then
if [ -n "$(command -v xxd)" ]
if test -n "$(command -v xxd)"
then
make_tests
result=$?