Sign Authenticode files with Osslsigncode using OpenSSL PKCS11 engine
Osslsigncode is a command-line tool used to code sign, timestamp, and verify signatures executable files. Osslsigncode leverages the OpenSSL library for performing code signing operations. Osslsigncode can be compiled on most platforms where OpenSSL and cURL exist.
Follow these instructions to sign directly using Osslsigncode and securely reference your private key stored in DigiCert® Software Trust Manager. Alternatively, integrate Osslsigncode with Signing Manager Controller (SMCTL) for simplified signing.
Sugerencia
DigiCert® Software Trust Manager only supports Osslsigncode signing on Linux.
To sign on Windows or macOS, use Jsign.
To avoid errors when signing large files, use osslsigncode instead of Jsign.
If you encounter unclear errors, it may be useful to sign via SMCTL and if errors persist, refer to SMCTL logs.
Prerequisites
Linux operating system
Download your certificate
Sign with Osslsigncode
The downloaded certificate is referred to as cert.pem in the scenarios below.
To sign and timestamp:
osslsigncode sign -pkcs11engine /usr/lib/x86_64-linux-gnu/engines-1.1/libpkcs11.so -pkcs11module /root/smpkcs11.so -certs <path to keypair certificate> -key 'pkcs11:object=<keypair alias>;type=private' -in <file to be signed> -out <output signed file> -h sha256 -t http://timestamp.digicert.com
Command sample:
osslsigncode sign -pkcs11engine /usr/lib/x86_64-linux-gnu/engines-1.1/libpkcs11.so -pkcs11module /root/smpkcs11.so -certs cert.pem -key 'pkcs11:object=keypair;type=private' -in test.msi -out test-signed.msi -h sha256 -t http://timestamp.digicert.com
Command output:
root@dcd6f73b44b0:~# osslsigncode sign -pkcs11engine /usr/lib/x86_64-linux-gnu/engines-1.1/libpkcs11.so -pkcs11module /root/smpkcs11.so -certs cert.pem -key 'pkcs11:object=keypair;type=private' -in test.msi -out test-signed.msi -h sha256 -t http://timestamp.digicert.com Succeeded
Verify signature with Osslsigncode
To verify signature:
osslsigncode verify -in <signed file>
Command sample:
osslsigncode verify -in test-signed.msi
Command output:
root@dcd6f73b44b0:~# osslsigncode verify -in test-signed.msi Message digest algorithm : SHA256 Calculated DigitalSignature : 87ACE0A2CD533EDB8BFE20FF1250B121D591C358EDFAC1806087CCE75AE0449C Signature verification: ok Number of signers: 1 Signer #0: Subject : /C=US/ST=TEST/L=XYZABCD/street=Test Address/postalCode=XYZABCD/O=My Org/CN=My Org Issuer : /C=US/ST=TEST/L=XYZABCD/street=Test Address/postalCode=XYZABCD/O=My Org/CN=rsa-ica Number of certificates: 3 Cert #0: Subject : /C=US/ST=TEST/L=XYZABCD/street=Test Address/postalCode=XYZABCD/O=My Org/CN=My Org Issuer : /C=US/ST=TEST/L=XYZABCD/street=Test Address/postalCode=XYZABCD/O=My Org/CN=rsa-ica Cert #1: Subject : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 Assured ID Timestamping CA Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA Cert #2: Subject : /C=US/O=DigiCert, Inc./CN=DigiCert Timestamp 2021 Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 Assured ID Timestamping CA Succeeded