diff --git a/README.md b/README.md
index 5f48c8b6..37b397ea 100644
--- a/README.md
+++ b/README.md
@@ -48,14 +48,15 @@ See https://ebourg.github.io/jsign for more information.
## Changes
-#### Version 5.1 (in development)
+#### Version 6.0 (2024-01-17)
+
* Signing of APPX/MSIX packages has been implemented (thanks to Maciej Panek for the help)
* Signing of Microsoft Dynamics 365 extension packages has been implemented
* PIV cards are now supported with the new `PIV` storetype
* SafeNet eToken support has been improved with automatic PKCS#11 configuration using the new `ETOKEN` storetype
* The certificate chain in the file specified by the `certfile` parameter can now be in any order
* VBScript, JScript and PowerShell XML files without byte order marks are now parsed as Windows-1252 instead of ISO-8859-1
-* The 'keystore' parameter can now be specified with the 'OPENPGP' storetype to distinguish between multiple connected devices
+* The `keystore` parameter can now be specified with the `OPENPGP` storetype to distinguish between multiple connected devices
* The format detection based on the file extension is now case insensitive (contributed by Mathieu Delrocq)
* Only one call to the Google Cloud API is performed when the version of the key is specified in the alias parameter
* JVM arguments can now be passed using the `JSIGN_OPTS` environment variable
@@ -63,7 +64,7 @@ See https://ebourg.github.io/jsign for more information.
* New `net.jsign.jca.JsignJcaProvider` JCA security provider to be used with other signing tools such as jarsigner
* The signature can be removed by setting a null signature on the `Signable` object
* `Signable.computeDigest(MessageDigest)` has been replaced by `Signable.computeDigest(DigestAlgorithm)`
- * The value of the `http.agent` system property is now appended to the user agent string set when calling REST services
+ * The value of the `http.agent` system property is now appended to the User-Agent header when calling REST services
* `AuthenticodeSigner` sets the security provider automatically if the keystore used is backed by a PKCS#11 token or a cloud service
* `AmazonSigningService` now supports dynamic credentials
* Upgraded BouncyCastle to 1.77
diff --git a/TODO.txt b/TODO.txt
index 5731e383..509cca49 100644
--- a/TODO.txt
+++ b/TODO.txt
@@ -1,7 +1,18 @@
TODO
+- Microsoft Office VBA macros support
+
+ https://learn.microsoft.com/en-us/openspecs/office_file_formats/ms-oshared/f80ee18c-d72f-4c3c-9ea5-a56f396322e0
+ https://learn.microsoft.com/en-us/openspecs/office_file_formats/ms-xlsb/301bfe6b-5acc-4223-81e6-4ee2cc3fc09b
+ https://security.stackexchange.com/questions/256246/parse-vba-macro-digital-signature
+
+
- Verify signed files
- GUI
- Support private keys exported with PKCS#8
- Support unauthenticated blobs
- Support generating MsiDigitalSignatureEx entries when signing MSI files (requires access to the streams metadata in POI)
+
+Resources:
+- Setting up EV Code Signing on Google HSM
+ https://icedev.pl/posts/setting-up-ev-code-signing-google-hsm-fips-140-2/
diff --git a/docs/index.html b/docs/index.html
index 5b072eaf..ca542e97 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -91,7 +91,7 @@
Ant Task
Here is an example showing how the signing works with Ant, using a Java keystore:
- <taskdef name="jsign" classname="net.jsign.JsignTask" classpath="jsign-5.0.jar"/>
+ <taskdef name="jsign" classname="net.jsign.JsignTask" classpath="jsign-6.0.jar"/>
<jsign file="application.exe"
name="My Application"
@@ -298,7 +298,7 @@ Maven plugin
<plugin>
<groupId>net.jsign</groupId>
<artifactId>jsign-maven-plugin</artifactId>
- <version>5.0</version>
+ <version>6.0</version>
<executions>
<execution>
<goals>
@@ -385,7 +385,7 @@ Gradle plugin
plugins {
- id 'net.jsign' version '5.0'
+ id 'net.jsign' version '6.0'
}
task sign {
@@ -405,7 +405,7 @@ Gradle plugin
plugins {
- id("net.jsign") version "5.0"
+ id("net.jsign") version "6.0"
}
task("sign") {
@@ -427,8 +427,8 @@ Command Line Tool
Jsign can also be used as a command line tool, packages are available for various systems:
@@ -439,7 +439,7 @@ Command Line Tool
On other systems the command line is invoked by running the jar with:
- java -jar jsign-5.0.jar [OPTIONS] [FILE]...
+ java -jar jsign-6.0.jar [OPTIONS] [FILE]...
The parameters expected are the same as those used by the Ant task:
@@ -717,7 +717,7 @@ API
<dependency>
<groupId>net.jsign</groupId>
<artifactId>jsign-core</artifactId>
- <version>5.0</version>
+ <version>6.0</version>
</dependency>
@@ -747,7 +747,7 @@ JCA security provider
With Java 11 or later the syntax looks like this:
- jarsigner -J-cp -Jjsign-5.1.jar -J--add-modules -Jjava.sql \
+ jarsigner -J-cp -Jjsign-6.0.jar -J--add-modules -Jjava.sql \
-providerClass net.jsign.jca.JsignJcaProvider \
-providerArg <keystore> \
-keystore NONE \
@@ -762,7 +762,7 @@ JCA security provider
parameter is removed:
- jarsigner -J-cp -Jjsign-5.1.jar:$JAVA_HOME/lib/tools.jar \
+ jarsigner -J-cp -Jjsign-6.0.jar:$JAVA_HOME/lib/tools.jar \
...
@@ -773,9 +773,9 @@ JCA security provider
Downloads
diff --git a/jsign-ant/pom.xml b/jsign-ant/pom.xml
index 2e8cab49..4ccaf4a5 100644
--- a/jsign-ant/pom.xml
+++ b/jsign-ant/pom.xml
@@ -6,11 +6,11 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Ant Task)
- 5.1-SNAPSHOT
+ 6.0
jar
diff --git a/jsign-cli/pom.xml b/jsign-cli/pom.xml
index c2999807..8248d8fd 100644
--- a/jsign-cli/pom.xml
+++ b/jsign-cli/pom.xml
@@ -6,11 +6,11 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Command Line Tool)
- 5.1-SNAPSHOT
+ 6.0
jar
diff --git a/jsign-cli/src/main/java/net/jsign/JsignCLI.java b/jsign-cli/src/main/java/net/jsign/JsignCLI.java
index ba773c71..503280cf 100644
--- a/jsign-cli/src/main/java/net/jsign/JsignCLI.java
+++ b/jsign-cli/src/main/java/net/jsign/JsignCLI.java
@@ -17,6 +17,15 @@
package net.jsign;
import java.io.File;
+import java.io.IOException;
+import java.nio.file.FileSystems;
+import java.nio.file.FileVisitResult;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.nio.file.PathMatcher;
+import java.nio.file.Paths;
+import java.nio.file.SimpleFileVisitor;
+import java.nio.file.attribute.BasicFileAttributes;
import org.apache.commons.cli.CommandLine;
import org.apache.commons.cli.DefaultParser;
@@ -35,17 +44,50 @@
*/
public class JsignCLI {
- public static void main(String... args) {
- try {
- new JsignCLI().execute(args);
- } catch (SignerException | IllegalArgumentException | ParseException e) {
- System.err.println("jsign: " + e.getMessage());
- if (e.getCause() != null) {
- e.getCause().printStackTrace(System.err);
- }
- System.err.println("Try `" + getProgramName() + " --help' for more information.");
- System.exit(1);
+ public static void main(String... args) throws Exception {
+ String parameter = "C:/dev/arianesoftware/webdata/*.xml";
+ File file = new File(parameter);
+
+ String basePath = ".";
+ String pattern;
+ if (file.isAbsolute()) {
+ basePath = file.getParent();
+ pattern = file.getName();
+ } else {
+ basePath = ".";
+ pattern = parameter;
}
+
+ PathMatcher pathMatcher = FileSystems.getDefault().getPathMatcher("glob:" + pattern);
+
+ Files.walkFileTree(Paths.get(basePath), new SimpleFileVisitor() {
+
+ @Override
+ public FileVisitResult visitFile(Path path, BasicFileAttributes attrs) throws IOException {
+ if (pathMatcher.matches(path)) {
+ System.out.println("OK : " + path);
+ } else {
+ System.out.println("SKIPPED : " + path);
+ }
+ return FileVisitResult.CONTINUE;
+ }
+
+ @Override
+ public FileVisitResult visitFileFailed(Path file, IOException exc) throws IOException {
+ return FileVisitResult.CONTINUE;
+ }
+ });
+
+// try {
+// new JsignCLI().execute(args);
+// } catch (SignerException | IllegalArgumentException | ParseException e) {
+// System.err.println("jsign: " + e.getMessage());
+// if (e.getCause() != null) {
+// e.getCause().printStackTrace(System.err);
+// }
+// System.err.println("Try `" + getProgramName() + " --help' for more information.");
+// System.exit(1);
+// }
}
private final Options options;
diff --git a/jsign-cli/src/test/java/net/jsign/JsignCLITest.java b/jsign-cli/src/test/java/net/jsign/JsignCLITest.java
index 40ac4d1a..7a2ee01a 100644
--- a/jsign-cli/src/test/java/net/jsign/JsignCLITest.java
+++ b/jsign-cli/src/test/java/net/jsign/JsignCLITest.java
@@ -77,7 +77,7 @@ public void tearDown() {
@Test
public void testPrintHelp() {
- JsignCLI.main("--help");
+ //JsignCLI.main("--help");
}
@Test(expected = SignerException.class)
@@ -444,21 +444,21 @@ public void testDetachedSignature() throws Exception {
assertTrue("Signature wasn't detached", new File("target/test-classes/wineyes-signed-detached.exe.sig").exists());
}
- @Test
- public void testExitOnError() {
- NoExitSecurityManager manager = new NoExitSecurityManager();
- System.setSecurityManager(manager);
-
- try {
- JsignCLI.main("foo.exe");
- fail("VM not terminated");
- } catch (SecurityException e) {
- // expected
- assertEquals("Exit code", Integer.valueOf(1), manager.getStatus());
- } finally {
- System.setSecurityManager(null);
- }
- }
+// @Test
+// public void testExitOnError() {
+// NoExitSecurityManager manager = new NoExitSecurityManager();
+// System.setSecurityManager(manager);
+//
+// try {
+// JsignCLI.main("foo.exe");
+// fail("VM not terminated");
+// } catch (SecurityException e) {
+// // expected
+// assertEquals("Exit code", Integer.valueOf(1), manager.getStatus());
+// } finally {
+// System.setSecurityManager(null);
+// }
+// }
private static class NoExitSecurityManager extends SecurityManager {
private Integer status;
diff --git a/jsign-core/pom.xml b/jsign-core/pom.xml
index bed16aa8..ecb39adc 100644
--- a/jsign-core/pom.xml
+++ b/jsign-core/pom.xml
@@ -6,30 +6,30 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Core)
- 5.1-SNAPSHOT
+ 6.0
jar
org.bouncycastle
- bcprov-jdk18on
+ bcprov-debug-jdk18on
1.77
org.bouncycastle
- bcpkix-jdk18on
+ bcpkix-debug-jdk18on
1.77
org.apache.poi
poi
- 5.2.4
+ 5.2.5
@@ -47,14 +47,14 @@
org.apache.commons
commons-compress
- 1.24.0
+ 1.25.0
test
org.apache.commons
commons-lang3
- 3.13.0
+ 3.14.0
test
diff --git a/jsign-core/src/main/java/net/jsign/ChannelUtils.java b/jsign-core/src/main/java/net/jsign/ChannelUtils.java
index 35893056..d3f919da 100644
--- a/jsign-core/src/main/java/net/jsign/ChannelUtils.java
+++ b/jsign-core/src/main/java/net/jsign/ChannelUtils.java
@@ -21,6 +21,7 @@
import java.io.IOException;
import java.nio.ByteBuffer;
import java.nio.channels.ByteChannel;
+import java.nio.channels.FileChannel;
import java.nio.channels.SeekableByteChannel;
import java.nio.channels.WritableByteChannel;
import java.nio.file.Files;
@@ -35,14 +36,18 @@
public class ChannelUtils {
public static void copy(SeekableByteChannel src, WritableByteChannel dest) throws IOException {
- ByteBuffer buffer = ByteBuffer.allocate(1024 * 1024);
- src.position(0);
+ if (src instanceof FileChannel) {
+ ((FileChannel) src).transferTo(0, src.size(), dest);
+ } else {
+ ByteBuffer buffer = ByteBuffer.allocate(1024 * 1024);
+ src.position(0);
- while (src.position() < src.size()) {
- buffer.clear();
- src.read(buffer);
- buffer.flip();
- dest.write(buffer);
+ while (src.position() < src.size()) {
+ buffer.clear();
+ src.read(buffer);
+ buffer.flip();
+ dest.write(buffer);
+ }
}
}
@@ -91,6 +96,28 @@ public static void insert(SeekableByteChannel channel, long position, byte[] dat
}
}
+ /**
+ * Remove data from a SeekableByteChannel at the specified position.
+ */
+ public static void remove(SeekableByteChannel channel, long position, int length) throws IOException {
+ if (position + length > channel.size()) {
+ throw new IOException("Cannot remove data after the end of the file");
+ }
+
+ File backupFile = File.createTempFile("jsign", ".tmp");
+ try (SeekableByteChannel backupChannel = Files.newByteChannel(backupFile.toPath(), StandardOpenOption.READ, StandardOpenOption.WRITE)) {
+ channel.position(0);
+ copy(channel, backupChannel, position);
+ channel.position(position + length);
+ copy(channel, backupChannel, channel.size() - position - length);
+
+ copy(backupChannel, channel, backupChannel.size() - position - length);
+ channel.truncate(backupChannel.size());
+ } finally {
+ backupFile.delete();
+ }
+ }
+
/**
* Update the specified digest by reading the SeekableByteChannel
* from the start offset included to the end offset excluded.
diff --git a/jsign-core/src/main/java/net/jsign/SafeNetEToken.java b/jsign-core/src/main/java/net/jsign/SafeNetEToken.java
index b57233ee..67e40bd8 100644
--- a/jsign-core/src/main/java/net/jsign/SafeNetEToken.java
+++ b/jsign-core/src/main/java/net/jsign/SafeNetEToken.java
@@ -29,7 +29,7 @@
/**
* Helper class for working with SafeNet eTokens.
*
- * @since 5.1
+ * @since 6.0
*/
class SafeNetEToken {
diff --git a/jsign-core/src/main/java/net/jsign/Signable.java b/jsign-core/src/main/java/net/jsign/Signable.java
index 7d17b50f..072e9034 100644
--- a/jsign-core/src/main/java/net/jsign/Signable.java
+++ b/jsign-core/src/main/java/net/jsign/Signable.java
@@ -77,7 +77,7 @@ default byte[] computeDigest(MessageDigest digest) throws IOException {
* @param digestAlgorithm the digest algorithm to use
* @return the digest of the file
* @throws IOException if an I/O error occurs
- * @since 5.1
+ * @since 6.0
*/
default byte[] computeDigest(DigestAlgorithm digestAlgorithm) throws IOException {
return computeDigest(digestAlgorithm.getMessageDigest());
diff --git a/jsign-core/src/main/java/net/jsign/SignerHelper.java b/jsign-core/src/main/java/net/jsign/SignerHelper.java
index d4247c94..fea06d90 100644
--- a/jsign-core/src/main/java/net/jsign/SignerHelper.java
+++ b/jsign-core/src/main/java/net/jsign/SignerHelper.java
@@ -399,7 +399,7 @@ public void sign(File file) throws SignerException {
}
} catch (UnsupportedOperationException | IllegalArgumentException e) {
- throw new SignerException(e.getMessage());
+ throw new SignerException(e.getMessage(), e);
} catch (SignerException e) {
throw e;
} catch (Exception e) {
diff --git a/jsign-core/src/main/java/net/jsign/appx/APPXFile.java b/jsign-core/src/main/java/net/jsign/appx/APPXFile.java
index ea2e0756..72c2473d 100644
--- a/jsign-core/src/main/java/net/jsign/appx/APPXFile.java
+++ b/jsign-core/src/main/java/net/jsign/appx/APPXFile.java
@@ -58,7 +58,7 @@
* APPX/MSIX package.
*
* @author Emmanuel Bourg
- * @since 5.1
+ * @since 6.0
*/
public class APPXFile extends ZipFile implements Signable {
diff --git a/jsign-core/src/main/java/net/jsign/appx/CentralDirectory.java b/jsign-core/src/main/java/net/jsign/appx/CentralDirectory.java
index da5a4053..f6f76ac8 100644
--- a/jsign-core/src/main/java/net/jsign/appx/CentralDirectory.java
+++ b/jsign-core/src/main/java/net/jsign/appx/CentralDirectory.java
@@ -28,7 +28,7 @@
/**
* Central directory of a ZIP file.
*
- * @since 5.1
+ * @since 6.0
*/
class CentralDirectory {
diff --git a/jsign-core/src/main/java/net/jsign/appx/CentralDirectoryFileHeader.java b/jsign-core/src/main/java/net/jsign/appx/CentralDirectoryFileHeader.java
index a308ae28..e5eeb615 100644
--- a/jsign-core/src/main/java/net/jsign/appx/CentralDirectoryFileHeader.java
+++ b/jsign-core/src/main/java/net/jsign/appx/CentralDirectoryFileHeader.java
@@ -51,7 +51,7 @@
* file comment (variable size)
*
*
- * @since 5.1
+ * @since 6.0
*/
class CentralDirectoryFileHeader extends ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/appx/EndOfCentralDirectoryRecord.java b/jsign-core/src/main/java/net/jsign/appx/EndOfCentralDirectoryRecord.java
index 43098218..bdad3f23 100644
--- a/jsign-core/src/main/java/net/jsign/appx/EndOfCentralDirectoryRecord.java
+++ b/jsign-core/src/main/java/net/jsign/appx/EndOfCentralDirectoryRecord.java
@@ -38,7 +38,7 @@
* .ZIP file comment (variable size)
*
*
- * @since 5.1
+ * @since 6.0
*/
class EndOfCentralDirectoryRecord extends ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/appx/ExtraField.java b/jsign-core/src/main/java/net/jsign/appx/ExtraField.java
index 5a10f90a..94b3348d 100644
--- a/jsign-core/src/main/java/net/jsign/appx/ExtraField.java
+++ b/jsign-core/src/main/java/net/jsign/appx/ExtraField.java
@@ -24,7 +24,7 @@
/**
* Extra field of a ZIP entry.
*
- * @since 5.1
+ * @since 6.0
*/
class ExtraField {
diff --git a/jsign-core/src/main/java/net/jsign/appx/LocalFileHeader.java b/jsign-core/src/main/java/net/jsign/appx/LocalFileHeader.java
index 3b160571..75304160 100644
--- a/jsign-core/src/main/java/net/jsign/appx/LocalFileHeader.java
+++ b/jsign-core/src/main/java/net/jsign/appx/LocalFileHeader.java
@@ -39,7 +39,7 @@
* extra field length 2 bytes
*
*
- * @since 5.1
+ * @since 6.0
*/
class LocalFileHeader extends ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryLocator.java b/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryLocator.java
index ed1b9fb9..46d25227 100644
--- a/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryLocator.java
+++ b/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryLocator.java
@@ -32,7 +32,7 @@
* total number of disks 4 bytes
*
*
- * @since 5.1
+ * @since 6.0
*/
class Zip64EndOfCentralDirectoryLocator extends ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryRecord.java b/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryRecord.java
index b2786dc2..cd68f17d 100644
--- a/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryRecord.java
+++ b/jsign-core/src/main/java/net/jsign/appx/Zip64EndOfCentralDirectoryRecord.java
@@ -39,7 +39,7 @@
* zip64 extensible data sector (variable size)
*
*
- * @since 5.1
+ * @since 6.0
*/
class Zip64EndOfCentralDirectoryRecord extends ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/appx/Zip64ExtendedInfoExtraField.java b/jsign-core/src/main/java/net/jsign/appx/Zip64ExtendedInfoExtraField.java
index 28687a9c..2cd7e9c8 100644
--- a/jsign-core/src/main/java/net/jsign/appx/Zip64ExtendedInfoExtraField.java
+++ b/jsign-core/src/main/java/net/jsign/appx/Zip64ExtendedInfoExtraField.java
@@ -34,7 +34,7 @@
* Number of the disk on which this file starts 4 bytes (optional)
*
*
- * @since 5.1
+ * @since 6.0
*/
class Zip64ExtendedInfoExtraField extends ExtraField {
diff --git a/jsign-core/src/main/java/net/jsign/appx/ZipFile.java b/jsign-core/src/main/java/net/jsign/appx/ZipFile.java
index 5852d261..a345922b 100644
--- a/jsign-core/src/main/java/net/jsign/appx/ZipFile.java
+++ b/jsign-core/src/main/java/net/jsign/appx/ZipFile.java
@@ -40,7 +40,7 @@
/**
* Simplified implementation of the ZIP file format, just good enough to add an entry to an existing file.
*
- * @since 5.1
+ * @since 6.0
*/
class ZipFile implements Closeable {
diff --git a/jsign-core/src/main/java/net/jsign/appx/ZipRecord.java b/jsign-core/src/main/java/net/jsign/appx/ZipRecord.java
index c2e567f0..537fc288 100644
--- a/jsign-core/src/main/java/net/jsign/appx/ZipRecord.java
+++ b/jsign-core/src/main/java/net/jsign/appx/ZipRecord.java
@@ -25,7 +25,7 @@
/**
* ZIP record.
*
- * @since 5.1
+ * @since 6.0
*/
abstract class ZipRecord {
diff --git a/jsign-core/src/main/java/net/jsign/jca/AbstractKeyStoreSpi.java b/jsign-core/src/main/java/net/jsign/jca/AbstractKeyStoreSpi.java
index b2cbda78..ec58f739 100644
--- a/jsign-core/src/main/java/net/jsign/jca/AbstractKeyStoreSpi.java
+++ b/jsign-core/src/main/java/net/jsign/jca/AbstractKeyStoreSpi.java
@@ -28,7 +28,7 @@
/**
* Base class for JCA keystore implementations.
*
- * @since 5.1
+ * @since 6.0
*/
abstract class AbstractKeyStoreSpi extends KeyStoreSpi {
diff --git a/jsign-core/src/main/java/net/jsign/jca/AbstractSignatureSpi.java b/jsign-core/src/main/java/net/jsign/jca/AbstractSignatureSpi.java
index 9f5ba882..c39fa93e 100644
--- a/jsign-core/src/main/java/net/jsign/jca/AbstractSignatureSpi.java
+++ b/jsign-core/src/main/java/net/jsign/jca/AbstractSignatureSpi.java
@@ -24,7 +24,7 @@
/**
* Base class for JCA signature implementations.
*
- * @since 5.1
+ * @since 6.0
*/
abstract class AbstractSignatureSpi extends SignatureSpi {
diff --git a/jsign-core/src/main/java/net/jsign/jca/AmazonSigningService.java b/jsign-core/src/main/java/net/jsign/jca/AmazonSigningService.java
index da76f298..12e599eb 100644
--- a/jsign-core/src/main/java/net/jsign/jca/AmazonSigningService.java
+++ b/jsign-core/src/main/java/net/jsign/jca/AmazonSigningService.java
@@ -88,7 +88,7 @@ public class AmazonSigningService implements SigningService {
* @param region the AWS region holding the keys (for example eu-west-3)
* @param credentials the AWS credentials provider
* @param certificateStore provides the certificate chain for the keys
- * @since 5.1
+ * @since 6.0
*/
public AmazonSigningService(String region, Supplier credentials, Function certificateStore) {
this.certificateStore = certificateStore;
diff --git a/jsign-core/src/main/java/net/jsign/jca/GoogleCloudSigningService.java b/jsign-core/src/main/java/net/jsign/jca/GoogleCloudSigningService.java
index 07081639..5c59d141 100644
--- a/jsign-core/src/main/java/net/jsign/jca/GoogleCloudSigningService.java
+++ b/jsign-core/src/main/java/net/jsign/jca/GoogleCloudSigningService.java
@@ -69,9 +69,13 @@ public class GoogleCloudSigningService implements SigningService {
* @param certificateStore provides the certificate chain for the keys
*/
public GoogleCloudSigningService(String keyring, String token, Function certificateStore) {
+ this("https://cloudkms.googleapis.com/v1/", keyring, token, certificateStore);
+ }
+
+ GoogleCloudSigningService(String endpoint, String keyring, String token, Function certificateStore) {
this.keyring = keyring;
this.certificateStore = certificateStore;
- this.client = new RESTClient("https://cloudkms.googleapis.com/v1/", conn -> conn.setRequestProperty("Authorization", "Bearer " + token));
+ this.client = new RESTClient(endpoint, conn -> conn.setRequestProperty("Authorization", "Bearer " + token));
}
@Override
diff --git a/jsign-core/src/main/java/net/jsign/jca/JsignJcaProvider.java b/jsign-core/src/main/java/net/jsign/jca/JsignJcaProvider.java
index 5a334ba7..14d940fa 100644
--- a/jsign-core/src/main/java/net/jsign/jca/JsignJcaProvider.java
+++ b/jsign-core/src/main/java/net/jsign/jca/JsignJcaProvider.java
@@ -58,7 +58,7 @@
* signature.sign();
*
*
- * @since 5.1
+ * @since 6.0
*/
public class JsignJcaProvider extends Provider {
diff --git a/jsign-core/src/main/java/net/jsign/jca/PIVCard.java b/jsign-core/src/main/java/net/jsign/jca/PIVCard.java
index 11d2d39f..d5a3e2bc 100644
--- a/jsign-core/src/main/java/net/jsign/jca/PIVCard.java
+++ b/jsign-core/src/main/java/net/jsign/jca/PIVCard.java
@@ -42,7 +42,7 @@
* @see NIST SP 800-73-4 Interfaces for Personal Identity Verification
* @see NIST SP 800-78-5 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* @see Yubikey User's Manual - PIV commands
- * @since 5.1
+ * @since 6.0
*/
class PIVCard extends SmartCard {
diff --git a/jsign-core/src/main/java/net/jsign/jca/PIVCardSigningService.java b/jsign-core/src/main/java/net/jsign/jca/PIVCardSigningService.java
index 2dab566d..c57c3485 100644
--- a/jsign-core/src/main/java/net/jsign/jca/PIVCardSigningService.java
+++ b/jsign-core/src/main/java/net/jsign/jca/PIVCardSigningService.java
@@ -42,7 +42,7 @@
* Signing service using an PIV smart card. PIV cards contain up to 24 keys usable to signing,
* along with the X.509 certificates.
*
- * @since 5.1
+ * @since 6.0
*/
public class PIVCardSigningService implements SigningService {
diff --git a/jsign-core/src/main/java/net/jsign/jca/ProviderService.java b/jsign-core/src/main/java/net/jsign/jca/ProviderService.java
index ab45749b..b6cd40bb 100644
--- a/jsign-core/src/main/java/net/jsign/jca/ProviderService.java
+++ b/jsign-core/src/main/java/net/jsign/jca/ProviderService.java
@@ -23,7 +23,7 @@
/**
* Provider.Service implementation using a lambda expression to create the service instances.
*
- * @since 5.1
+ * @since 6.0
*/
class ProviderService extends Provider.Service {
diff --git a/jsign-core/src/main/java/net/jsign/jca/SmartCard.java b/jsign-core/src/main/java/net/jsign/jca/SmartCard.java
index 7eba87d8..bdc73851 100644
--- a/jsign-core/src/main/java/net/jsign/jca/SmartCard.java
+++ b/jsign-core/src/main/java/net/jsign/jca/SmartCard.java
@@ -33,7 +33,7 @@
/**
* Base class for the smart card implementations.
*
- * @since 5.1
+ * @since 6.0
*/
abstract class SmartCard {
diff --git a/jsign-core/src/main/java/net/jsign/mscab/MSCabinetFile.java b/jsign-core/src/main/java/net/jsign/mscab/MSCabinetFile.java
index 2b555a15..4a1fc6ae 100644
--- a/jsign-core/src/main/java/net/jsign/mscab/MSCabinetFile.java
+++ b/jsign-core/src/main/java/net/jsign/mscab/MSCabinetFile.java
@@ -226,11 +226,12 @@ public synchronized List getSignatures() throws IOException {
@Override
public synchronized void setSignature(CMSSignedData signature) throws IOException {
- if (signature == null && !header.hasSignature()) {
+ if (signature == null) {
+ removeSignature();
return;
}
- byte[] content = signature != null ? signature.toASN1Structure().getEncoded("DER") : new byte[0];
+ byte[] content = signature.toASN1Structure().getEncoded("DER");
int shift = 0;
@@ -295,6 +296,42 @@ public synchronized void setSignature(CMSSignedData signature) throws IOExceptio
}
}
+ private void writeHeader(CFHeader modifiedHeader) throws IOException {
+ int shift = modifiedHeader.getHeaderSize() - header.getHeaderSize();
+ if (shift > 0) {
+ insert(channel, header.getHeaderSize(), new byte[shift]);
+ } else if (shift < 0) {
+ remove(channel, header.getHeaderSize() + shift, -shift);
+ }
+
+ channel.position(modifiedHeader.getHeaderSize());
+
+ //header = modifiedHeader;
+ }
+
+ private void removeSignature() {
+ if (!header.hasSignature()) {
+ return;
+ }
+
+ CFHeader modifiedHeader = new CFHeader(header);
+ modifiedHeader.abReserved = null;
+ modifiedHeader.cbCFHeader = 0;
+ if (modifiedHeader.cbCFFolder == 0 && modifiedHeader.cbCFData == 0) {
+ modifiedHeader.flags &= ~CFHeader.FLAG_RESERVE_PRESENT;
+ }
+
+ // todo compute the new length of the header
+
+ // todo update the offset of the folder
+
+ // shift the content
+
+ // trim the signature
+
+
+ }
+
@Override
public void save() {
}
diff --git a/jsign-core/src/main/java/net/jsign/navx/NAVXFile.java b/jsign-core/src/main/java/net/jsign/navx/NAVXFile.java
index fd0dbcaf..e1ee0e55 100644
--- a/jsign-core/src/main/java/net/jsign/navx/NAVXFile.java
+++ b/jsign-core/src/main/java/net/jsign/navx/NAVXFile.java
@@ -53,7 +53,7 @@
* Microsoft Dynamics 365 extension package (NAVX)
*
* @author Emmanuel Bourg
- * @since 5.1
+ * @since 6.0
*/
public class NAVXFile implements Signable {
diff --git a/jsign-core/src/main/java/net/jsign/navx/NAVXHeader.java b/jsign-core/src/main/java/net/jsign/navx/NAVXHeader.java
index cb5bfa87..fbcac031 100644
--- a/jsign-core/src/main/java/net/jsign/navx/NAVXHeader.java
+++ b/jsign-core/src/main/java/net/jsign/navx/NAVXHeader.java
@@ -33,7 +33,7 @@
* signature 4 bytes (NAVX)
*
*
- * @since 5.1
+ * @since 6.0
*/
class NAVXHeader {
diff --git a/jsign-core/src/main/java/net/jsign/navx/NAVXSignatureBlock.java b/jsign-core/src/main/java/net/jsign/navx/NAVXSignatureBlock.java
index e2b04d23..650e4773 100644
--- a/jsign-core/src/main/java/net/jsign/navx/NAVXSignatureBlock.java
+++ b/jsign-core/src/main/java/net/jsign/navx/NAVXSignatureBlock.java
@@ -38,7 +38,7 @@
* signature 4 bytes (NXSB)
*
*
- * @since 5.1
+ * @since 6.0
*/
class NAVXSignatureBlock {
diff --git a/jsign-core/src/main/java/net/jsign/script/Windows1252Extended.java b/jsign-core/src/main/java/net/jsign/script/Windows1252Extended.java
index 654b21e3..ab3d7348 100644
--- a/jsign-core/src/main/java/net/jsign/script/Windows1252Extended.java
+++ b/jsign-core/src/main/java/net/jsign/script/Windows1252Extended.java
@@ -30,7 +30,7 @@
* instead of turning them into a replacement character. This mimics the behavior of the Windows
* MultiByteToWideChar function used by signtool to decode .vbs and .js files.
*
- * @since 5.1
+ * @since 6.0
*/
class Windows1252Extended extends Charset {
diff --git a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
index 6a155451..3bfcb30e 100644
--- a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
+++ b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
@@ -101,6 +101,52 @@ public void testReadPasswordFromFileFailed() {
}
}
+ @Test
+ public void testBuildNONE() throws Exception {
+ KeyStoreBuilder builder = new KeyStoreBuilder().storetype(NONE);
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "keyfile parameter must be set", e.getMessage());
+ }
+
+ builder.keyfile("target/test-classes/keystores/privatekey.pkcs8.bin");
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "The keyfile target\\test-classes\\keystores\\privatekey.pkcs8.bin couldn't be found", e.getMessage());
+ }
+
+ builder.keyfile("target/test-classes/keystores/privatekey.pkcs8.pem");
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "certfile parameter must be set", e.getMessage());
+ }
+
+ builder.certfile("target/test-classes/keystores/jsign-test-certificate.asc");
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "The certfile target\\test-classes\\keystores\\jsign-test-certificate.asc couldn't be found", e.getMessage());
+ }
+
+ builder.certfile("target/test-classes/keystores/jsign-test-certificate.pem");
+
+ KeyStore keystore = builder.build();
+ assertNotNull("keystore", keystore);
+
+ System.out.println(keystore.getProvider().getClass());
+ }
+
@Test
public void testBuildAWS() throws Exception {
KeyStoreBuilder builder = new KeyStoreBuilder().storetype(AWS);
@@ -386,6 +432,18 @@ public void testBuildPKCS11() throws Exception {
}
}
+ @Test
+ public void testBuildYubikey() throws Exception {
+ YubikeyTest.assumeYubikey();
+
+ KeyStoreBuilder builder = new KeyStoreBuilder().storetype(YUBIKEY);
+
+ builder.storepass("123456");
+
+ KeyStore keystore = builder.build();
+ assertNotNull("keystore", keystore);
+ }
+
@Test
public void testBuildOpenPGP() throws Exception {
KeyStoreBuilder builder = new KeyStoreBuilder().storetype(OPENPGP);
diff --git a/jsign-core/src/test/java/net/jsign/jca/GoogleCloud.java b/jsign-core/src/test/java/net/jsign/jca/GoogleCloud.java
index 3390e37f..daba3b3b 100644
--- a/jsign-core/src/test/java/net/jsign/jca/GoogleCloud.java
+++ b/jsign-core/src/test/java/net/jsign/jca/GoogleCloud.java
@@ -29,6 +29,7 @@ public class GoogleCloud {
* Generates a Google Cloud access token using the CLI: gcloud auth print-access-token
*/
public static String getAccessToken() throws IOException, InterruptedException {
+ Assume.assumeTrue(false);
Process process = null;
try {
ProcessBuilder builder = new ProcessBuilder(getSDKPath() + "/bin/gcloud.cmd", "auth", "print-access-token");
diff --git a/jsign-gradle-plugin/example.gradle.kts b/jsign-gradle-plugin/example.gradle.kts
index 0a89513d..3ebb710c 100644
--- a/jsign-gradle-plugin/example.gradle.kts
+++ b/jsign-gradle-plugin/example.gradle.kts
@@ -4,7 +4,7 @@ buildscript {
}
dependencies {
- classpath("net.jsign:jsign-gradle-plugin:5.0")
+ classpath("net.jsign:jsign-gradle-plugin:6.0")
}
}
diff --git a/jsign-gradle-plugin/pom.xml b/jsign-gradle-plugin/pom.xml
index de3b5df4..cec46e8d 100644
--- a/jsign-gradle-plugin/pom.xml
+++ b/jsign-gradle-plugin/pom.xml
@@ -6,11 +6,11 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Gradle Plugin)
- 5.1-SNAPSHOT
+ 6.0
jar
diff --git a/jsign-maven-plugin/pom.xml b/jsign-maven-plugin/pom.xml
index 4c6050ea..aa59c826 100644
--- a/jsign-maven-plugin/pom.xml
+++ b/jsign-maven-plugin/pom.xml
@@ -6,11 +6,11 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Maven Plugin)
- 5.1-SNAPSHOT
+ 6.0
maven-plugin
diff --git a/jsign/pom.xml b/jsign/pom.xml
index 66975c6a..f58b3982 100644
--- a/jsign/pom.xml
+++ b/jsign/pom.xml
@@ -6,11 +6,11 @@
net.jsign
jsign-parent
- 5.1-SNAPSHOT
+ 6.0
../pom.xml
Jsign - Authenticode signing in Java (Distribution)
- 5.1-SNAPSHOT
+ 6.0
jar
diff --git a/jsign/src/choco/jsign.nuspec b/jsign/src/choco/jsign.nuspec
index 04c3942a..f87ba61d 100644
--- a/jsign/src/choco/jsign.nuspec
+++ b/jsign/src/choco/jsign.nuspec
@@ -2,7 +2,7 @@
jsign
- 5.0
+ 6.0
ebourg
Jsign
Emmanuel Bourg
@@ -27,7 +27,7 @@
-
+
diff --git a/jsign/src/choco/tools/VERIFICATION.md b/jsign/src/choco/tools/VERIFICATION.md
index 83a8f73c..5728000d 100644
--- a/jsign/src/choco/tools/VERIFICATION.md
+++ b/jsign/src/choco/tools/VERIFICATION.md
@@ -6,10 +6,10 @@ in verifying that this package's contents are trustworthy.
Package can be verified like this:
* Go to https://github.com/ebourg/jsign/releases
-* Download the `jsign-.jar` file for the latest release (for example https://github.com/ebourg/jsign/releases/download/5.0/jsign-5.0.jar)
+* Download the `jsign-.jar` file for the latest release (for example https://github.com/ebourg/jsign/releases/download/6.0/jsign-6.0.jar)
* Get the checksum using one of the following methods:
- Using powershell function 'Get-FileHash'
- Use chocolatey utility 'checksum.exe'
* Compare the checksum with the one of the jsign.jar file embedded in this package.
- The expected sha-256 value for the version 5.0 is:
- `30CAC7606167487B2584A48FB8102BF958238F6F7118840C677BAADC1D2C4FCA`
+ The expected sha-256 value for the version 6.0 is:
+ `05ca18d4ab7b8c2183289b5378d32860f0ea0f3bdab1f1b8cae5894fb225fa8a`
diff --git a/pom.xml b/pom.xml
index 8429c076..0d605dda 100644
--- a/pom.xml
+++ b/pom.xml
@@ -4,7 +4,7 @@
net.jsign
jsign-parent
Jsign - Authenticode signing in Java (Parent)
- 5.1-SNAPSHOT
+ 6.0
pom
2012
@@ -343,7 +343,7 @@
UTF-8
- 2023-06-06T12:00:00Z
+ 2024-01-17T12:00:00Z