Force SHA-256 digest for timestamp signatures
Comodo timestamp server defaults to SHA-1. To make sure timestamp signatures are SHA-256, add appropriate signtool.exe flag.
This commit is contained in:
parent
841ac1b923
commit
1c74fe5e10
@ -1 +1 @@
|
||||
Subproject commit 17bf10bb2c150ac20d300c6d511fbdff781935da
|
||||
Subproject commit 332709b1d0349ec52255725c5da8f78c08296cca
|
Binary file not shown.
@ -43,7 +43,7 @@
|
||||
<ItemGroup />
|
||||
<Target Name="Sign" Condition="'$(ManifestCertificateThumbprint)' != '' and ('$(ConfigurationType)' == 'Application' or '$(ConfigurationType)' == 'DynamicLibrary')" AfterTargets="_Manifest" BeforeTargets="RegisterOutput" Inputs="$(OutDir)$(TargetName)$(TargetExt)" Outputs="$(IntDir)$(TargetName).sign">
|
||||
<Message Text="Signing output file..." />
|
||||
<Exec Command="signtool.exe sign /sha1 "%ManifestCertificateThumbprint%" /fd sha256 /tr "%ManifestTimestampRFC3161Url%" /q "$(OutDir)$(TargetName)$(TargetExt)"" />
|
||||
<Exec Command="signtool.exe sign /sha1 "%ManifestCertificateThumbprint%" /fd sha256 /tr "%ManifestTimestampRFC3161Url%" /td sha256 /q "$(OutDir)$(TargetName)$(TargetExt)"" />
|
||||
<Touch Files="$(IntDir)$(TargetName).sign" AlwaysCreate="true" />
|
||||
</Target>
|
||||
</Project>
|
Loading…
x
Reference in New Issue
Block a user