[GH-ISSUE #101] Failure to sign due to FIPS does not return an error #82

Closed
opened 2026-02-25 21:30:37 +03:00 by kerem · 1 comment
Owner

Originally created by @brettshearer on GitHub (Mar 29, 2025).
Original GitHub issue: https://github.com/brutaldev/StrongNameSigner/issues/101

Originally assigned to: @brutaldev on GitHub.

When FIPS is enabled the following error is shown in logs:

==== signing WeakEventListener.dll ====

---- Brutal Developer .NET Assembly Strong-Name Signer 3.5.0.0 ----

Console application to sign .NET assemblies with a strong-name key and fix assembly references.

  1. Loading assemblies...
  2. Checking assembly references...
    Checking assembly references in 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'.
  3. Strong-name unsigned assemblies...
    Signing assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'.
  4. Fix InternalVisibleToAttribute references...
  5. Fix CustomAttributes with Type references...
  6. Fix BAML references...
  7. Save assembly changes...
    Saving changes to assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'.
    Failed to save assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll': This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.
  8. Cleanup...

This is our usage:

echo ==== signing WeakEventListener.dll ====
.\packages\Brutal.Dev.StrongNameSigner\build\StrongNameSigner.Console.exe -a .\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll -out .\packages\SimpleWeakEventListener\lib\netstandard2.0
if %errorlevel% neq 0 goto :end

If the file is missing completely, we get an error code.
I would expect that a failure to sign should also raise an error code.

Originally created by @brettshearer on GitHub (Mar 29, 2025). Original GitHub issue: https://github.com/brutaldev/StrongNameSigner/issues/101 Originally assigned to: @brutaldev on GitHub. When FIPS is enabled the following error is shown in logs: ==== signing WeakEventListener.dll ==== ------------------------------------------------------------------- ---- Brutal Developer .NET Assembly Strong-Name Signer 3.5.0.0 ---- ------------------------------------------------------------------- Console application to sign .NET assemblies with a strong-name key and fix assembly references. 1. Loading assemblies... 2. Checking assembly references... Checking assembly references in 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'. 3. Strong-name unsigned assemblies... Signing assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'. 4. Fix InternalVisibleToAttribute references... 5. Fix CustomAttributes with Type references... 6. Fix BAML references... 7. Save assembly changes... Saving changes to assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll'. **Failed to save assembly 'c:\git\wtg\CargoWise\Dev\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll': This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.** 8. Cleanup... This is our usage: echo ==== signing WeakEventListener.dll ==== .\packages\Brutal.Dev.StrongNameSigner\build\StrongNameSigner.Console.exe -a .\packages\SimpleWeakEventListener\lib\netstandard2.0\WeakEventListener.dll -out .\packages\SimpleWeakEventListener\lib\netstandard2.0 if %errorlevel% neq 0 goto :end If the file is missing completely, we get an error code. I would expect that a failure to sign should also raise an error code.
kerem 2026-02-25 21:30:37 +03:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@brutaldev commented on GitHub (Mar 30, 2025):

Should be fixed up in v3.5.1

If the file is missing completely, we get an error code.
I would expect that a failure to sign should also raise an error code.

I have also added an error code for any signing failure in the core, even if other operations succeed. Any non-warning errors have always returned a non-zero error code.

<!-- gh-comment-id:2764754529 --> @brutaldev commented on GitHub (Mar 30, 2025): Should be fixed up in [v3.5.1](https://github.com/brutaldev/StrongNameSigner/releases/tag/v3.5.1) > If the file is missing completely, we get an error code. > I would expect that a failure to sign should also raise an error code. I have also added an error code for any signing failure in the core, even if other operations succeed. Any non-warning errors have always returned a non-zero error code.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/StrongNameSigner#82
No description provided.