- The AWS KMS signing service has been integrated (with contributions from Vincent Malmedy)
- Nitrokey support has been improved with automatic PKCS#11 configuration using the new
NITROKEYstoretype - Smart cards are now supported with the new
OPENSCstoretype - OpenPGP cards are now supported with the new
OPENPGPstoretype - Google Cloud KMS via HashiCorp Vault is now supported with the new
HASHICORPVAULTstoretype (contributed by Maria Merkel) - The Maven plugin can now use passwords defined in the Maven settings.xml file
- The "X.509 Certificate for PIV Authentication" on a Yubikey (slot 9a) is now automatically detected
- SHA-1 signing with Azure Key Vault is now possible (contributed by Andrij Abyzov)
- MSI signing has been improved:
- MSI files with embedded sub storages (such as localized installers) are now supported
- Signing a MSI file already signed with an extended signature is no longer rejected
- An issue causing some MSI files to become corrupted once signed has been fixed
- A user friendly error message is now displayed when the private key and the certificate don't match
- Setting
-Djava.security.debug=sunpkcs11with theYUBIKEYstoretype no longer triggers an error - The cloud keystore name is no longer treated as a relative file by the Ant task and the Maven plugin
- The paths are resolved relatively to the Ant/Maven/Gradle subproject or module directory instead of the root directory
- Signing with SSL.com eSigner now also works when the malware scanning feature is enabled
- API changes:
- The
KeyStoreUtilsclass has been replaced byKeyStoreBuilder
- The
- Upgraded BouncyCastle to 1.73