188 Commits

Author SHA1 Message Date
olszomal
cafa23819b more memory leaks fixed 2020-04-07 15:49:00 +02:00
olszomal
235448d839 fixed memory leaks 2020-04-03 15:12:43 +02:00
olszomal
077783aa2a signer extended key usage XKU_CODE_SIGN 2020-04-03 12:31:59 +02:00
olszomal
7c39f73ff6 memory cleanup 2020-04-03 11:44:56 +02:00
olszomal
1e4681980f print osslsigncode version and usage 2020-04-02 12:18:37 +02:00
olszomal
26d35cee40 C89 standard compatibility 2020-04-02 12:03:06 +02:00
olszomal
a79c0c6426 is_indirect_data_signature() 2020-04-01 13:25:58 +02:00
olszomal
3ae025a133 code cleaning 2020-03-31 12:55:09 +02:00
olszomal
6383166189 enable MsiDigitalSignatureEx 2020-03-27 15:00:47 +01:00
olszomal
0692db5ed3 resolved merge conflict by incorporating both suggestions 2020-03-27 14:28:04 +01:00
olszomal
ee2d65d354 msi_calc_MsiDigitalSignatureEx() with GSF_PARAMS struct 2020-03-27 14:04:14 +01:00
olszomal
3635d586fb create pkcs7 object and prepare file to sign 2020-03-27 13:51:59 +01:00
olszomal
ee17261eaf resolved merge conflict 2020-03-26 11:24:24 +01:00
olszomal
77493d5cde input options and input file header validation 2020-03-26 10:38:02 +01:00
olszomal
cdd2a23bf1 check attached data 2020-03-26 09:16:18 +01:00
olszomal
20236fb677
Verification purpose and nested signature (#35)
- Require "Code Signing" extended key usage for authenticode verification.
 - Only check for the X509_PURPOSE_CRL_SIGN purpose in CRL verification.
 - Only require one valid signature for a nested signature.
2020-03-25 21:00:47 +01:00
olszomal
18b19cbe5d Update additional data size 2020-03-25 14:06:36 +01:00
olszomal
e570907a59 Append signature to outfile 2020-03-25 13:52:08 +01:00
olszomal
9f6af8becb set_indirect_data_blob() 2020-03-24 14:44:03 +01:00
olszomal
b7f0461311 page hash verification 2020-03-24 14:04:37 +01:00
olszomal
1715a02cd8 get_indirect_data_blob() with options and header structures 2020-03-24 13:59:38 +01:00
olszomal
536cf9670b get_file_type() 2020-03-17 11:17:45 +01:00
olszomal
0f35d25791 CRYPTO_PARAMS struct 2020-03-17 11:01:37 +01:00
olszomal
f93bdc0f98 nturl/ntsurl GLOBAL_OPTIONS related to turl/tsurl 2020-03-16 14:41:21 +01:00
olszomal
6e46f71e69 main_configure() 2020-03-16 14:20:02 +01:00
olszomal
5e0f6e17a9 GLOBAL_OPTIONS struct 2020-03-16 10:32:39 +01:00
olszomal
1281dbccf1 read certificate and key 2020-03-13 12:19:42 +01:00
olszomal
9e670ea7a0 read_password 2020-03-12 15:36:40 +01:00
olszomal
29b138a667 create_new_signature() 2020-03-12 15:03:36 +01:00
olszomal
e7f0577bf3 set_signing_bob 2020-03-12 14:13:26 +01:00
olszomal
f0050d6033 MSI Digital Signatures support 2020-03-12 13:35:30 +01:00
olszomal
ccde20f8e2 FILE_HEADER struct for CAB header support 2020-03-11 09:25:27 +01:00
olszomal
787933ef53 verify_pe_header() 2020-03-10 13:26:20 +01:00
olszomal
7cd0e9d581 add jp/purpose/desc/url attribute functions 2020-03-04 15:35:48 +01:00
olszomal
889679e080 attach_sigfile() 2020-03-04 14:34:51 +01:00
olszomal
150d14b57c modify and verify CAB header 2020-03-04 13:28:46 +01:00
olszomal
73cf4e9540 attach to CAB file fixed
some improvements for PE files
2020-02-21 16:26:53 +01:00
olszomal
94f5e0c1bf CAB file support 2020-02-21 14:07:15 +01:00
olszomal
6bcb95e8fa file format fixes 2020-02-19 10:47:29 +01:00
olszomal
7fcf08ad75
CA bundle install path detection (#32) 2020-02-04 22:44:58 +01:00
Michal Trojnara
2bb573219a Fix invocation without arguments
Closes #29
2020-01-25 18:41:47 +01:00
olszomal
7366df707d Help (#27) 2020-01-25 08:37:11 +01:00
olszomal
49f25a1914 CRL support with new CRLfile global option (#28) 2020-01-25 08:25:48 +01:00
olszomal
7f6ec7607f ifdef ENABLE_CURL mistake 2019-12-28 20:34:13 +01:00
olszomal
311f5af395 signature verification 2019-12-28 20:34:13 +01:00
Michał Trojnara
2ffa5a9d69 Signing Time code refactoring
- Code simplification.
 - Support for the -st option while timestamps are enabled.
 - Fix for a NULL pointer dereference.
2019-09-10 23:03:35 +02:00
Viktor Szakats
5c51cab171 reword comment 2019-09-10 22:09:45 +02:00
Viktor Szakats
c72434aa08 add option to override non-trusted time in signature
By default the non-trusted time embedded in the signature is the
current time of the machine. This means that adding a signature
prevents from creating reproducible/deterministic binaries.

This patch resolves that by introducing the -st <unix-time> option
where a custom time can be supplied and which will be used in the
signature. By using a point in time bound to the package (e.g.
release date or timestamp of a specific file in the source package
- or just 0 to suppress the current time), it makes it possible to
create signed binaries with reproducible/deterministic, IOW
identical signatures, regardless of when the build was done. It
also makes osslsigncode behaviour closer to signtool.exe, which by
default creates deterministic signatures (by include no
non-trusted time at all.)

The patch has been used live for the last year to build curl-for-win
binaries:
  https://github.com/curl/curl-for-win/blob/master/osslsigncode.patch

It also resolves this osslsigncode bug:
  https://sourceforge.net/p/osslsigncode/bugs/8/#a59a
2019-09-10 22:09:45 +02:00
olszomal
b512aa534c some options warnings 2019-07-28 14:19:08 +02:00
olszomal
62e8ffd0c9 allow timestamping with the add command 2019-07-20 12:51:23 +02:00