Force SHA-256 digest for timestamp signatures
Comodo timestamp server defaults to SHA-1. To make sure timestamp signatures are SHA-256, add appropriate signtool.exe flag.
This commit is contained in:
parent
f6ce76d384
commit
3396f9cf97
@ -1 +1 @@
|
|||||||
Subproject commit 06230f6ebd386a0e8f559d3857634dfa83cb73e3
|
Subproject commit 332709b1d0349ec52255725c5da8f78c08296cca
|
Binary file not shown.
@ -43,7 +43,7 @@
|
|||||||
<ItemGroup />
|
<ItemGroup />
|
||||||
<Target Name="Sign" Condition="'$(ManifestCertificateThumbprint)' != '' and ('$(ConfigurationType)' == 'Application' or '$(ConfigurationType)' == 'DynamicLibrary')" AfterTargets="_Manifest" BeforeTargets="RegisterOutput" Inputs="$(OutDir)$(TargetName)$(TargetExt)" Outputs="$(IntDir)$(TargetName).sign">
|
<Target Name="Sign" Condition="'$(ManifestCertificateThumbprint)' != '' and ('$(ConfigurationType)' == 'Application' or '$(ConfigurationType)' == 'DynamicLibrary')" AfterTargets="_Manifest" BeforeTargets="RegisterOutput" Inputs="$(OutDir)$(TargetName)$(TargetExt)" Outputs="$(IntDir)$(TargetName).sign">
|
||||||
<Message Text="Signing output file..." />
|
<Message Text="Signing output file..." />
|
||||||
<Exec Command="signtool.exe sign /sha1 "%ManifestCertificateThumbprint%" /fd sha256 /tr "%ManifestTimestampRFC3161Url%" /q "$(OutDir)$(TargetName)$(TargetExt)"" />
|
<Exec Command="signtool.exe sign /sha1 "%ManifestCertificateThumbprint%" /fd sha256 /tr "%ManifestTimestampRFC3161Url%" /td sha256 /q "$(OutDir)$(TargetName)$(TargetExt)"" />
|
||||||
<Touch Files="$(IntDir)$(TargetName).sign" AlwaysCreate="true" />
|
<Touch Files="$(IntDir)$(TargetName).sign" AlwaysCreate="true" />
|
||||||
</Target>
|
</Target>
|
||||||
</Project>
|
</Project>
|
Loading…
x
Reference in New Issue
Block a user