You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Authenticode signing API ([Javadoc](https://javadoc.io/doc/net.jsign/jsign-core))
45
48
* JCA security provider to use the keystores supported by Jsign with other tools such as jarsigner or apksigner
@@ -49,19 +52,40 @@ See https://ebourg.github.io/jsign for more information.
49
52
50
53
## Changes
51
54
52
-
#### Version 6.1 (in development)
55
+
#### Version 7.0 (in development)
53
56
54
-
*The Oracle Cloud signing service has been integrated
57
+
*New signing services: HashiCorp Vault Transit (contributed by Eatay Mizrachi), Azure Trusted Signing, Oracle Cloud and GaraSign
55
58
* Signing of NuGet packages has been implemented (contributed by Sebastian Stamm)
56
-
* Jsign now checks if the certificate subject matches the app manifest publisher before signing APPX/MSIX packages
59
+
* Commands have been added:
60
+
*`timestamp`: timestamps the signatures of a file
61
+
*`tag`: adds unsigned data (such as user identification data) to signed files
62
+
*`extract`: extracts the signature from a signed file, in DER or PEM format
63
+
*`remove`: removes the signature from a signed file
64
+
* The intermediate certificates are downloaded if missing from the keystore or the certificate chain file
65
+
* File list files prefixed with `@` are now supported with the command line tool to sign multiple files
66
+
* Wildcard patterns are now accepted by the command line tool to scan directories for files to sign
67
+
* Jsign now checks if the certificate subject matches the app manifest publisher before signing APPX/MSIX packages (with contributions from Scott Cooper)
68
+
* The new `--debug`, `--verbose` and `--quiet` parameters control the verbosity of the output messages
57
69
* The JCA provider now works with [apksigner](https://developer.android.com/tools/apksigner) for signing Android applications
70
+
* RSA 4096 keys are supported with the `PIV` storetype (for Yubikeys with firmware version 5.7 or higher)
71
+
* Certificates using an Ed25519 or Ed448 key are now supported (experimental)
58
72
* The APPX/MSIX bundles are now signed with the correct Authenticode UUID
73
+
* The signed APPX/MSIX files no longer contain a `[Content_Types].old` entry
59
74
* The error message displayed when the password of a PKCS#12 keystore is missing has been fixed
60
75
* The log4j configuration warning displayed when signing a MSI file has been fixed (contributed by Pascal Davoust)
61
76
* The value of the `storetype` parameter is now case insensitive
77
+
* The Azure Key Vault account no longer needs the permission to list the keys when signing with jarsigner
78
+
* The DigiCert ONE host can now be specified with the `keystore` parameter
79
+
* On Windows the YubiKey library path is automatically added to the PATH of the command line tool
80
+
* Signing more than one file with the `YUBIKEY` storetype no longer triggers a `CKR_USER_NOT_LOGGED_IN` error
81
+
* MS Cabinet files with a pre-allocated reserve are now supported
62
82
* API changes:
83
+
* The keystore builder and the JCA provider are now in a separate `jsign-crypto` module
63
84
* The PEFile class has been refactored to keep only the methods related to signing
64
-
* Switched to BouncyCastle LTS 2.73.5
85
+
* The java.util.logging API is now used to log debug messages under the `net.jsign` logger
86
+
*`Signable` implementations are now discovered dynamically using the ServiceLoader mechanism
87
+
*`Signable.createContentInfo()` has been replaced with `Signable.createSignedContent()`
0 commit comments