olszomal
47e9a2299b
attach-signature tests
2020-03-04 13:31:54 +01:00
olszomal
150d14b57c
modify and verify CAB header
2020-03-04 13:28:46 +01:00
olszomal
73cf4e9540
attach to CAB file fixed
...
some improvements for PE files
2020-02-21 16:26:53 +01:00
olszomal
a56aee3c8f
CAB file tests
2020-02-21 14:10:21 +01:00
olszomal
94f5e0c1bf
CAB file support
2020-02-21 14:07:15 +01:00
olszomal
6bcb95e8fa
file format fixes
2020-02-19 10:47:29 +01:00
olszomal
7fcf08ad75
CA bundle install path detection ( #32 )
2020-02-04 22:44:58 +01:00
olszomal
e7dd72c64d
makecerts requirement
2020-01-30 07:09:15 +01:00
Michal Trojnara
2bb573219a
Fix invocation without arguments
...
Closes #29
2020-01-25 18:41:47 +01:00
olszomal
7366df707d
Help ( #27 )
2020-01-25 08:37:11 +01:00
olszomal
49f25a1914
CRL support with new CRLfile global option ( #28 )
2020-01-25 08:25:48 +01:00
olszomal
98910f675a
check libcurl availability
2019-12-28 20:34:13 +01:00
olszomal
5b9f65d2f2
more tests requirements
2019-12-28 20:34:13 +01:00
olszomal
7f6ec7607f
ifdef ENABLE_CURL mistake
2019-12-28 20:34:13 +01:00
olszomal
d36a10bf09
tests improvements
2019-12-28 20:34:13 +01:00
olszomal
a77ed9c9e1
new verify tests
2019-12-28 20:34:13 +01:00
olszomal
3c45de910f
new test library
2019-12-28 20:34:13 +01:00
olszomal
5c0a181436
tests requirements
2019-12-28 20:34:13 +01:00
olszomal
1af321be77
make certs with faketime
2019-12-28 20:34:13 +01:00
olszomal
311f5af395
signature verification
2019-12-28 20:34:13 +01:00
Michał Trojnara
2ffa5a9d69
Signing Time code refactoring
...
- Code simplification.
- Support for the -st option while timestamps are enabled.
- Fix for a NULL pointer dereference.
2019-09-10 23:03:35 +02:00
Viktor Szakats
5c51cab171
reword comment
2019-09-10 22:09:45 +02:00
Viktor Szakats
c72434aa08
add option to override non-trusted time in signature
...
By default the non-trusted time embedded in the signature is the
current time of the machine. This means that adding a signature
prevents from creating reproducible/deterministic binaries.
This patch resolves that by introducing the -st <unix-time> option
where a custom time can be supplied and which will be used in the
signature. By using a point in time bound to the package (e.g.
release date or timestamp of a specific file in the source package
- or just 0 to suppress the current time), it makes it possible to
create signed binaries with reproducible/deterministic, IOW
identical signatures, regardless of when the build was done. It
also makes osslsigncode behaviour closer to signtool.exe, which by
default creates deterministic signatures (by include no
non-trusted time at all.)
The patch has been used live for the last year to build curl-for-win
binaries:
https://github.com/curl/curl-for-win/blob/master/osslsigncode.patch
It also resolves this osslsigncode bug:
https://sourceforge.net/p/osslsigncode/bugs/8/#a59a
2019-09-10 22:09:45 +02:00
olszomal
18810b7e0b
change test for add-msi-dse option
2019-07-28 14:19:08 +02:00
olszomal
b512aa534c
some options warnings
2019-07-28 14:19:08 +02:00
olszomal
de4e85f35a
remove jp_medium and jp_high tests
2019-07-28 14:19:08 +02:00
olszomal
97b7002547
required packages
2019-07-28 14:15:23 +02:00
Randy Fay
dc0b2d7273
Improve build instructions for osslsigncode, fixes #12 ( #15 )
...
fixes #12
* Switch to using PKG_CONFIG_PATH instead of LDFLAGS and CPPFLAGS
2019-07-28 14:11:53 +02:00
Michał Trojnara
764fec5bd1
Fix password tests
2019-07-20 14:38:12 +02:00
Michał Trojnara
f39ac9caee
Fixed "add" tests
...
The "add" command was never supposed to copy a signature.
See afd5c5177d
for details.
2019-07-20 14:17:41 +02:00
Michał Trojnara
1121713d48
Typo
2019-07-20 13:53:50 +02:00
olszomal
00290bc363
Test improvements ( #14 )
...
* removed pvk keys tests
* new 11_sign_nest test
* improved verify_signature()
* new tests of timestamping with the add command
2019-07-20 12:54:46 +02:00
olszomal
62e8ffd0c9
allow timestamping with the add command
2019-07-20 12:51:23 +02:00
Michał Trojnara
891887a974
Never overwrite or unlink an existing file
...
Fixes #9
The code uses the "x" file access mode flag introduced by the C11
standard (ISO/IEC 9899:2011). It may be unsupported on Windows.
2019-07-13 15:25:41 +02:00
olszomal
3645ba7357
New tests for osslsigncode ( #11 )
2019-07-13 11:41:03 +02:00
Michał Trojnara
4c44cfdd76
Fix double free
2019-07-11 20:20:47 +02:00
Jemmy Wang
6c8ec4427a
Fix segmentation fault
2019-07-01 22:02:17 +02:00
Jemmy Wang
c740b097df
Fix SpcPageHashLink generation
...
The orginal code handles ASN1_SET improperly, which results in INVALID
page hash SpcLink.
This commit fixes the bug. osslsigncode can now generate valid
signatures with -ph (page hash) option.
2019-07-01 22:02:17 +02:00
Reimar Döffinger
0bea1ac8f6
Ensure variable is initialized.
...
It seem unnecessarily risky to leave it
uninitialized when PKCS7_free is called
on it unconditionally at the end of the
function.
2019-04-25 00:02:33 +02:00
Michał Trojnara
12966f611a
Consistent DO_EXIT_n interface
2019-04-24 06:54:44 +02:00
Reimar Döffinger
044861b323
Make -pkcs11engine option optional. ( #5 )
...
If not specified, load all builtin engines,
most likely the pkcs11 one will be among them.
This makes the pkcs11module option much easier
to use in the most common use-cases.
2019-04-24 06:47:53 +02:00
Michał Trojnara
bed25dcb7d
Error formatting fixes
...
closes #3
2019-04-24 06:17:31 +02:00
Reimar Döffinger
8c82f76905
Remove unused Authenticode object IDs.
2019-04-23 22:55:57 +02:00
barrybingo
342518fcbe
Minorfixes ( #2 )
...
Replace legacy function
2019-04-02 13:52:25 +02:00
Michał Trojnara
fe08daaa4f
use OpenSSL memory allocation
2018-12-09 23:30:20 +01:00
Michał Trojnara
5a01658434
use tohex() for bin2hex conversion
2018-12-09 23:05:13 +01:00
Michał Trojnara
d007c03bb6
signed/unsigned conversion fixes
2018-12-09 22:51:15 +01:00
Michał Trojnara
a935479e7f
fixed a few typos
2018-12-08 22:06:36 +01:00
Michał Trojnara
db559c4769
code simplification
...
Avoid re-implementing common library functions.
2018-12-08 21:55:15 +01:00
Michał Trojnara
693ac8c476
new bug reporting procedure
2018-12-08 17:07:25 +01:00