8000 fontBuilder: Don't add a stub signature to DSIG by miguelsousa · Pull Request #1621 · fonttools/fonttools · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

fontBuilder: Don't add a stub signature to DSIG #1621

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 25, 2019
Merged

Conversation

miguelsousa
Copy link
Collaborator
@miguelsousa miguelsousa commented May 24, 2019

An empty DSIG is enough to make MS applications happy and also fixes an error reported by MS Font Validator.

@miguelsousa miguelsousa requested a review from justvanrossum May 24, 2019 23:55
@justvanrossum
8000
Copy link
Collaborator

Why do we need two different fake/dummy DSIG tables? If the empty one is the more canonical way to do it, I'd be happy to just have that.

@anthrotype
Copy link
Member

I wonder if it’s actually still the case that “some MS applications require this”, do you have concrete examples with recent versions?
I have tried unsuccessfully a few years ago on the opentype mailing list to raise the issue that the DSIG spec does not match the MS implementation; and that since nobody would or could implement a tool for signing/verifying such signatures it would have been best to deprecate the table and remove it from the OT spec.
I would prefer that fonttools did not add such “dummy” DSIG table, as that would contribute to maintain this situation.
I believe the anybody can write a simple script based on fonttools to add such table if they wish (and there are numerous snippets floating around such as this one).

@moyogo
Copy link
Collaborator
moyogo commented May 25, 2019

Plenty of people are still using versions of Microsoft Office applications that work fine for them and that require the DSIG for OT features to work.
I’d recommend fontBuilder add a dummy DSIG by default, or at least provide the option to do it easily.

@chrissimpkins
Copy link
Member

Is there more information about what OT features this issue influences for MS Word users at any affected version?

@anthrotype
Copy link
Member

If we have to add one I prefer it is an empty one rather than an invalid but non-empty DSIG. And possibly disabled by default so if one cares and knows what they are doing the can opt in

@chrissimpkins
Copy link
Member

I prefer it is an empty one rather than an invalid but non-empty DSIG

Is the public/private key authentication "feature" of applications that use this table removed and, for some reason, they simply need the table to be present to support some OT features as Denis suggested above? If DSIG certificate authentication is still occurring out there, then the approach in your comment seems mandatory Cosimo.

An empty DSIG is enough to make MS applications happy and also fixes an error reported by MS Font Validator
@miguelsousa
Copy link
Collaborator Author

@justvanrossum an empty DSIG is enough. That's what makeotf has been doing for a while and we know of no side effects. Also, MS Font Validator complains about the stub signature. I've updated the PR.

@anthrotype FontBuilder only adds a DSIG when setupDummyDSIG is called.

@miguelsousa miguelsousa changed the title fontBuilder: Enable making an empty dummy DSIG table fontBuilder: Don't add a stub signature to DSIG May 25, 2019
@justvanrossum
Copy link
Collaborator

an empty DSIG is enough

Then let's make it do that instead of the current behavior.

Yes, FontBuilder never adds a dummy DSIG implicitly.

@miguelsousa miguelsousa merged commit 5045fb7 into master May 25, 2019
@miguelsousa miguelsousa deleted the fb-empty-dsig branch May 25, 2019 19:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants
0