Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guide about authenticode #1250

Closed
pkking opened this issue Nov 9, 2023 · 5 comments
Closed

Guide about authenticode #1250

pkking opened this issue Nov 9, 2023 · 5 comments

Comments

@pkking
Copy link

pkking commented Nov 9, 2023

Hi, im recently working on authenticode, and i have read #723 and #813, so im just wondering if there's some guide for creating a authenticode signatrue using this library :_)

Sorry if the ping disturbed any of you @roblabla

@baloo
Copy link
Member

baloo commented Nov 27, 2023

I've made an implementation in goblin.
Because goblin doesn't want to pull extra dependencies, there an external crate (goblin-signing) that brings rust-crypto hashers in.

(That second crate is still a WIP, the intention is for it to move to https://github.com/nix-community eventually)

@pkking
Copy link
Author

pkking commented Nov 28, 2023

I've made an implementation in goblin.
Because goblin doesn't want to pull extra dependencies, there an external crate (goblin-signing) that brings rust-crypto hashers in.

(That second crate is still a WIP, the intention is for it to move to https://github.com/nix-community eventually)

Thanks for your reply, will take a look :)

@baloo
Copy link
Member

baloo commented Dec 11, 2023

I've put up a PR rewriting the authenticode according to the spec.
m4b/goblin#383

@pkking
Copy link
Author

pkking commented Dec 23, 2023

I've put up a PR rewriting the authenticode according to the spec.
m4b/goblin#383

cool!

@tarcieri
Copy link
Member

Seems like the question here is answered?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants