Delphi Developers |
|
Request Free Download Code Signing Trust and Certificate Check component
Other Magenta CodeLook ComCap v5 DUN Manager |
9th October 2018 - Sorry, you now need to request a free file download password to access Delphi components. The Magenta Systems Code Signing Trust and Certificate Check component functions are designed for Code Signing, aka Microsoft Authenticode. Compatible with Delphi 7, 2007, 2009, 2010, XE, XE2, XE3, XE4, XE5, XE6,
XE7, XE8, 10 Seattle, 10.1 Berlin, 10.2 Tokyo and 10.3 Rio. Compatible with
Windows Vista, 2008, 7, 8, 2012, 10, 2016 and 2019. Introduction Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted. These functions were written to support an remote program updater tool, to ensure the new program was not corrupted, but may also be used to self test a Delphi application for image corruption. ProgVerifyTrust - simple function to check code signing certificate exists and is valid and not expired, and the program image is not corrupted. This should work with Windows 2000 and later (which have wintrust.dll). ProgVerifyCert - similar to ProgVerifyTrust, but also extracts the certificate information, names, dates, etc. But this function needs capicom.dll COM object to be installed (from which the CAPICOM_TLB type library is created), which is a free redistributable file, included with this code. This function only works in Win32 applications, because Microsoft has not released a 64-bit of capicom.dll, instead a class error is returned. Microsoft claims Capicom is deprecated with Windows 7, but the DLL still works on both 32-bit and 64-bit editions, with Win32 applications. You need to register the COM object by running 'regsvr32.exe capicom.dll'. Note the API used in CapiCom to sign a program is SignerSign but probably does not support current signing algorithms since it's so old. See below for how to actually sign code. Demonstration Application A Windows demonstration application TRUSTCHK.EXE is supplied, with source and compiled program. A directory signed-samples includes several programs to test checking signatures, trustnone.exe is unsigned, trustbad.exe is deliberately corrupted, trustexpired.cab has an expired certificate, trustodd.exe has an untrusted self signed certificate, trustok.exe is valid. Function ProgVerifyTrust function ProgVerifyTrust (const Fname: string ; const HashOnly, Expired:
boolean; var Response: string): integer ; Function ProgVerifyCert function ProgVerifyCert (const Fname: string ; var CertInfo: TCertInfo):
integer ; Requirements Compatible with Delphi7 to 10.2 Tokyo. Supports both VCL Win32
and Win64, but there is no 64-bit version of Changes 26 Nov 2018 - renamed signprog to MagSignProg for consistency Code Sign Tools The old distribution included a tools directory with signcode.exe and other files, these are now all obsolete and should not be used for signing programs. The latest signing tools are described at:
https://docs.microsoft.com/en-gb/windows/desktop/SecCrypto/signtool Also, applications are now mostly signed twice, once with a SHA1 digest for compatibility with older operating systems, and then again with a SHA256 for current compatibility. Typical commands to dual sign and verify a file are as follows: cd C:\Program Files (x86)\Windows Kits\10\bin\x86 The full list of arguments is detailed at the signtool URL above. If you need to buy a Code Signing certificate to sign your own applications, please look at the Microsoft Get a code signing certificate page first, which provides links to six major certificate issuers mostly with competitive prices you will be unlikely to find by visiting the sites directly. Copyright Information Magenta Systems Code Signing Trust and Certificate Check component is freeware, but is still copyrighted by Magenta Systems Ltd who may change the status or withdraw it at any time, without notice. Magenta Systems Ltd, 9 Vincent Road,
Croydon CR0 6ED, United Kingdom |