白日放歌须纵酒,青春作伴好还乡。这篇文章主要讲述文件签名 exe,dll,sys相关的知识,希望能为你提供帮助。
rem exe文件签名
signtool.exe sign /s "My" /n "Beijing Cybervision Co., Ltd" /t "http://timestamp.verisign.com/scripts/timstamp.dll" "files\\ClientSetup.exe"
rem ################################
rem 对sys文件进行签名 一定要先签名,再生产cat文件,顺序不能变
rem
signtool.exe sign /ac "MSCV-VSClass3.cer" /s "My" /n "Beijing Cybervision Co., Ltd" /t "http://timestamp.verisign.com/scripts/timstamp.dll" "files\\eposf.sys"
rem ################################
rem 生成CAT文件(如果是32位驱动则把X64换成X86)
rem
inf2cat /driver:files /os:XP_X64,Server2003_X64,Vista_X64,Server2008_X64
rem ################################
rem 对CAT文件进行签名
rem
signtool.exe sign /ac "MSCV-VSClass3.cer" /s "My" /n "Beijing Cybervision Co., Ltd" /t "http://timestamp.verisign.com/scripts/timstamp.dll" "files\\eposf.cat"
DriverVer
DriverVer
=
08/28/2000,1.0.0.10
改为 DriverVer
=
08/28/2008,1.0.0.10
驱动文件的日期不能与这个日期有冲突
Done Adding Additional Store
Successfully signed and timestamped: files\\eposfsf.sys
............................
Signability test failed.
Errors:
22.9.7: DriverVer set to incorrect date (must be postdated to 12/5/2007 for newe
st OS) in \\eposf.inf
Warnings:
None
Done Adding Additional Store
Successfully signed and timestamped: files\\eposf.cat
signtool
Usage: signtool sign [options] <
filename(s)>
Use the "sign" command to sign files using embedded signatures. Signing
protects a file from tampering, and allows users to verify the signer (you)
based on a signing certificate. The options below allow you to specify signing
parameters and to select the signing certificate you wish to use.
Certificate selection options:
/a
Select the best signing cert automatically. SignTool will find all
valid certs that satisfy all specified conditions and select the
one that is valid for the longest. If this option is not present,
SignTool will expect to find only one valid signing cert.
/ac <
file>
Add an additional certificate, from <
file>
, to the signature block.
/c <
name>
Specify the Certificate Template Name (Microsoft extension) of the
signing cert.
/f <
file>
Specify the signing cert in a file. If this file is a PFX with
a password, the password may be supplied with the "/p" option.
If the file does not contain private keys, use the "/csp" and "/kc"
options to specify the CSP and container name of the private key.
/i <
name>
Specify the Issuer of the signing cert, or a substring.
/n <
name>
Specify the Subject Name of the signing cert, or a substring.
/p <
pass.>
Specify a password to use when opening the PFX file.
/r <
name>
Specify the Subject Name of a Root cert that the signing cert must
chain to.
/s <
name>
Specify the Store to open when searching for the cert. The default
is the "MY" Store.
/sm
Open a Machine store instead of a User store.
/sha1 <
h>
Specify the SHA1 hash of the signing cert.
/fd
Specifies the file digest algorithm to use for creating file
signatures. (Default is SHA1)
/u <
usage>
Specify the Enhanced Key Usage that must be present in the cert.
The parameter may be specified by OID or by string. The default
usage is "Code Signing" (1.3.6.1.5.5.7.3.3).
/uw
Specify usage of "Windows System Component Verification"
(1.3.6.1.4.1.311.10.3.6).
Private Key selection options:
/csp <
name>
Specify the CSP containing the Private Key Container.
/kc <
name>
Specify the Key Container Name of the Private Key.
Signing parameter options:
/d <
desc.>
Provide a description of the signed content.
/du <
URL>
Provide a URL with more information about the signed content.
/t <
URL>
Specify the timestamp servers URL. If this option is not present,
the signed file will not be timestamped. A warning is generated if
timestamping fails.
/tr <
URL>
Specifies the RFC 3161 timestamp servers URL. If this option
(or /t) is not specified, the signed file will not be timestamped.
A warning is generated if timestamping fails.
This switch cannot
be used with the /t switch.
/td <
alg>
Used with the /tr switch to request a digest algorithm used by the
RFC 3161 timestamp server.
Other options:
/ph
Generate page hashes for executable files if supported.
/nph
Suppress page hashes for executable files if supported.
The default is determined by the SIGNTOOL_PAGE_HASHES
environment variable and by the wintrust.dll version.
/q
No output on success and minimal output on failure. As always,
SignTool returns 0 on success, 1 on failure, and 2 on warning.
/v
Print verbose success and status messages. This may also provide
slightly more information on error.
INF2CAT
Version 2.3.0.0
Runs driver signability tests and creates the catalog(s).
INF2CAT /driver:path /os:operatingSystem1[,os2]... [/nocat] [/verbose]
[/drm[:file1[,file2]...]]
[/pe[:file1[,file2]...]]
[/pageHashes[:file1][,file2]...]]
/driver (/drv)
Indicates the path to the driver package follows.
path
Specifies the path to the driver package.
/os
Indicates the operating system(s) targeted by the driver
package follows. The targeted operating system(s) is a
comma separated list of the following values:
operatingSystem1
2000
XP_X86
Server2003_X86
Vista_X86
Server2008_X86
XP_X64
Server2003_X64
Vista_X64
Server2008_X64
Server2003_IA64
Server2008_IA64
/nocat
Prevents the creation of the catalog(s).
/verbose (/v)
Displays detailed console output.
/drm
Add DRM level catalog attribute to files.
Optionally
followed by a list of files.
/pe
Add PE catalog attribute to files.
Optionally
followed by a list of files.
/pageHashes
Include page hashes with files.
Optionally
followed by a list of files.
【文件签名 exe,dll,sys】
推荐阅读
- JavaScript数组常用方法解析和深层次js数组扁平化
- JavaScript的相关知识点学习与实践二
- windows的CP_ACP代码页与CP_OEMCP代码页区别
- 容器一直处于ContainerCannotRun状态
- docker部署开源堡垒机
- MYSQL MM HA安装配置及调优
- HarmonyOS应用集成AGC应用内消息与远程配置
- Java异常处理机制详解(建议收藏保存)。
- 如何利用DFS实现文件服务器的双机容错(在没有cluster环境的时候)