Michał Trojnara
4d08fbb2c1
Only use IPv4 127.0.0.1 for tests
...
Fix #331
2023-12-21 11:33:48 +01:00
Michał Trojnara
98b004edda
Ignore garbage in PE sigpos/siglen
2023-12-20 11:26:50 +01:00
olszomal
34bf3bc525
tests for extract-data command
2023-12-19 13:07:19 +01:00
olszomal
64e1bba96b
Add a new command extract-data to extract a PKCS#7 data content to be signed
2023-12-19 13:07:19 +01:00
olszomal
46bcaa9d88
Skip a null stream warning
2023-12-18 10:14:51 +01:00
olszomal
867e0d446d
Fixed APPX file specific: attach-signature command
2023-12-18 10:14:29 +01:00
olszomal
7285778cb0
Use X509_LOOKUP_load_file() to load certificates with a lookup using the implementation X509_LOOKUP_file()
2023-12-03 18:33:50 +01:00
olszomal
c909ba82d7
tests: fixed string formatting in Python version earlier than 2.6
2023-11-22 17:53:50 +01:00
olszomal
7b60d6447d
tests: initialize resp_data
2023-11-22 17:53:50 +01:00
olszomal
588a1a0b5f
Use default certificates when the HTTP server fails
2023-11-22 17:53:50 +01:00
olszomal
8a9b275494
Fixed unmap_file() segmentation fault
2023-11-21 10:54:44 +01:00
olszomal
0db17be606
Listing each member of the CAT file
2023-11-20 17:20:03 +01:00
olszomal
f9ad19d4a2
Signature index presentation
2023-11-14 10:33:04 +01:00
olszomal
b9ca24d423
Check MsiDigitalSignatureEx
2023-11-14 10:33:04 +01:00
olszomal
8d2b562244
Group warnings for CAT files
2023-11-14 10:33:04 +01:00
olszomal
6f4e9ab597
Fix dereference after null check, CID 1570976
2023-11-14 10:33:04 +01:00
olszomal
6d6270094e
Simplify unlinking outfile
2023-11-13 13:50:41 +01:00
olszomal
57563716d1
Enable x mode modifier if available
2023-11-13 13:50:41 +01:00
olszomal
8ab8a133f7
Overwriting an existing file is not supported
2023-11-13 13:50:41 +01:00
olszomal
ef5047038e
Delete the output file in case of error
2023-11-13 13:50:41 +01:00
olszomal
e290e03341
tests: Add more tests for catalog files.
2023-11-07 14:56:48 +01:00
olszomal
900ffed596
Enable verification that a catalog file was signed by a valid certificate.
...
Simplify setting and signing a content blob.
Clean up a support library.
2023-11-07 14:56:48 +01:00
Michał Trojnara
33253afb5e
Remove unneeded variables
2023-10-17 17:10:28 +02:00
Michał Trojnara
3aba55e5e0
Code simplification
2023-10-17 16:58:57 +02:00
olszomal
898a53b2a7
Create a certificate chain sorted in ascending order by DER encoding
2023-10-17 16:21:26 +02:00
Joe Tylka
75ce1dadf5
Add missing dependencies for install in fresh ubuntu
2023-10-10 16:19:42 +02:00
Michał Trojnara
4166476030
Initial Dockerfile
2023-10-09 17:24:22 +02:00
olszomal
a5690f2d19
Fixed resource leak, CID 1566947, 1566965, 1566967, 1568542, 1568543
2023-10-09 17:21:16 +02:00
olszomal
cdb75578e9
fixed windows segmentation fault
2023-10-06 19:41:43 +02:00
olszomal
e2ab4a152d
improved verify callbacks
2023-10-06 19:41:31 +02:00
Michał Trojnara
b8e690f3bd
Work around a GitHub Actions regression
2023-10-06 19:08:50 +02:00
olszomal
c89d6b43aa
description of built-in TSA options
2023-09-25 15:22:11 +02:00
Michał Trojnara
9faed39931
Add builtin-baseline
2023-09-20 16:25:30 +02:00
Michał Trojnara
ecb17709fc
Initial 2.8-dev commit
2023-09-19 22:03:02 +02:00
Michał Trojnara
9ebd79ad18
Release 2.7
...
Signed-off-by: Michał Trojnara <Michal.Trojnara@stunnel.org>
2.7
2023-09-19 21:51:05 +02:00
Michał Trojnara
1700455533
APPX support ( #303 )
...
Co-authored-by: Maciej Panek <Maciej.panek@punxworks.com>
Co-authored-by: olszomal <Malgorzata.Olszowka@stunnel.org>
2023-09-19 21:23:32 +02:00
Michał Trojnara
a6f767f5a3
Mark the result as not tainted
2023-09-08 14:09:53 +02:00
olszomal
4c5b329bc4
fixed mixed declarations and code
2023-09-08 11:51:20 +02:00
olszomal
5626482e82
fixed a function declaration with a void parameter
2023-09-08 11:51:20 +02:00
olszomal
2d21a2121c
squash gcc debugger warnings
...
remove nsections>UINT16_MAX check
2023-09-08 11:51:20 +02:00
Michał Trojnara
5d2bf2c80f
Fix insufficient MSI_ENTRY comparison
2023-09-04 16:10:25 +02:00
Michael Brown
5b8376ce32
Fix construction of signed CAB header
...
Commit 0f51a06 ("Separate common and format-dependent functions")
performed a substantial amount of refactoring. Within the CFFOLDER
header construction loop in cab_add_header(), the line
tmp = GET_UINT32_LE(indata + i);
seems to have been accidentally deleted, instead of being refactored
to become
tmp = GET_UINT32_LE(ctx->options->indata + i);
with the result that adding a signature to a .cab file will currently
produce an invalid .cab file.
Fix by adding back in the missing line of code.
Signed-off-by: Michael Brown <mbrown@fensystems.co.uk>
2023-08-31 12:27:01 +02:00
Michał Trojnara
1fc2c937f2
Secrets are not available in PRs
2023-08-25 09:49:10 +02:00
olszomal
2ed54490a6
Use TS_TST_INFO struct
2023-07-31 17:46:01 +02:00
olszomal
a096aa8a33
Set signing digest to generate RFC3161 response
2023-07-31 17:46:01 +02:00
olszomal
aa08566a63
Use TS_REQ struct
2023-07-31 17:46:01 +02:00
Małgorzata Olszówka (she/her)
c04b229ce2
Built-in TSA response generation ( #281 )
2023-07-28 16:03:04 +02:00
Michał Trojnara
adcfd9a33f
Apply suggestions from code review
...
Added more detailed error messages.
Fixed formatting and indentation.
Co-authored-by: Małgorzata Olszówka <Malgorzata.Olszowka@stunnel.org>
2023-07-21 11:44:55 +02:00
Maxim Bagryantsev
f2f3a8891c
Fixed validation of supported command
2023-07-21 11:44:55 +02:00
olszomal
29eedf9059
Fixed DIFAT sectors writing
2023-06-30 11:30:02 +02:00