id | lang | string |
---|
0 | 1033 | .1253 |
10 | 1033 | Usage: signtool <command> [options]
Valid commands:
sign -- Sign files using an embedded signature.
timestamp -- Timestamp previously-signed files.
verify -- Verify embedded or catalog signatures.
catdb -- Modify a catalog database.
remove -- Remove embedded signature(s) or reduce the size of an
embedded signed file.
For help on a specific command, enter "signtool <command> /?"
|
100 | 1033 | Usage: signtool sign [options] <filename(s)>
Use the "sign" command to sign files using embedded signatures. Signing
protects a file from tampering, and allows users to verify the signer (you)
based on a signing certificate. The options below allow you to specify signing
parameters and to select the signing certificate you wish to use.
|
101 | 1033 |
Certificate selection options:
|
102 | 1033 |
Signing parameter options:
|
103 | 1033 |
Private Key selection options:
|
104 | 1033 |
Other options:
|
106 | 1033 | /a Select the best signing cert automatically. SignTool will find all
valid certs that satisfy all specified conditions and select the
one that is valid for the longest. If this option is not present,
SignTool will expect to find only one valid signing cert.
|
107 | 1033 | /c <name> Specify the Certificate Template Name (Microsoft extension) of the
signing cert.
|
108 | 1033 | /csp <name> Specify the CSP containing the Private Key Container.
|
109 | 1033 | /d <desc.> Provide a description of the signed content.
|
110 | 1033 | /du <URL> Provide a URL with more information about the signed content.
|
111 | 1033 | /f <file> Specify the signing cert in a file. If this file is a PFX with
a password, the password may be supplied with the "/p" option.
If the file does not contain private keys, use the "/csp" and "/kc"
options to specify the CSP and container name of the private key.
|
112 | 1033 | /i <name> Specify the Issuer of the signing cert, or a substring.
|
115 | 1033 | /kc <name> Specify the Key Container Name of the Private Key.
|
116 | 1033 | /n <name> Specify the Subject Name of the signing cert, or a substring.
|
117 | 1033 | /p <pass.> Specify a password to use when opening the PFX file.
|
118 | 1033 | /q No output on success and minimal output on failure. As always,
SignTool returns 0 on success, 1 on failure, and 2 on warning.
|
119 | 1033 | /r <name> Specify the Subject Name of a Root cert that the signing cert must
chain to.
|
120 | 1033 | /s <name> Specify the Store to open when searching for the cert. The default
is the "MY" Store.
|
121 | 1033 | /sm Open a Machine store instead of a User store.
|
122 | 1033 | /sha1 <h> Specify the SHA1 thumbprint of the signing cert.
|
123 | 1033 | /t <URL> Specify the timestamp server's URL. If this option is not present,
the signed file will not be timestamped. A warning is generated if
timestamping fails.
|
124 | 1033 | /u <usage> Specify the Enhanced Key Usage that must be present in the cert.
The parameter may be specified by OID or by string. The default
usage is "Code Signing" (1.3.6.1.5.5.7.3.3).
|
125 | 1033 | /uw Specify usage of "Windows System Component Verification"
(1.3.6.1.4.1.311.10.3.6).
|
126 | 1033 | /v Print verbose success and status messages. This may also provide
slightly more information on error.
|
127 | 1033 | /ac <file> Add an additional certificate, from <file>, to the signature block.
|
129 | 1033 | /ph Generate page hashes for executable files if supported.
|
130 | 1033 | /nph Suppress page hashes for executable files if supported.
|
131 | 1033 | The default is determined by the SIGNTOOL_PAGE_HASHES
environment variable and by the wintrust.dll version.
|
132 | 1033 | /as Append this signature. If no primary signature is present, this
signature will be made the primary signature instead.
|
134 | 1033 | /es Enumerate signatures on a file.
|
135 | 1033 | /debug Display additional debug information.
|
147 | 1033 | /fd Specifies the file digest algorithm to use for creating file
signatures. (Default is SHA1)
|
148 | 1033 | /tr <URL> Specifies the RFC 3161 timestamp server's URL. If this option
(or /t) is not specified, the signed file will not be timestamped.
A warning is generated if timestamping fails. This switch cannot
be used with the /t switch.
|
149 | 1033 | /tseal <URL> Specifies the RFC 3161 timestamp server's URL for timestamping a
sealed file.
|
150 | 1033 | /td <alg> Used with the /tr or /tseal switch to request a digest algorithm
used by the RFC 3161 timestamp server.
|
151 | 1033 | /ed Enumerates digest algorithms supported on this machine that can be used for signing, page hashes and timestamps. |
152 | 1033 |
PKCS7 options:
|
153 | 1033 | /p7 <path> Specifies that for each specified content file a PKCS7 file is
produced. The PKCS7 file will be named: <path>\<file>.p7
|
154 | 1033 | /p7co <OID> Specifies the <OID> that identifies the signed content.
|
155 | 1033 | /p7ce <Value> Defined values:
Embedded - Embeds the signed content in the PKCS7.
DetachedSignedData - Produces the signed data part of
a detached PKCS7.
The default is 'Embedded'
|
156 | 1033 | /seal Add a sealing signature if the file format supports it.
|
157 | 1033 | /itos Create a primary signature with the intent-to-seal attribute.
|
158 | 1033 | /force Continue to seal or sign in situations where the existing signature
or sealing signature needs to be removed to support sealing.
|
159 | 1033 | /nosealwarn Sealing-related warnings do not affect SignTool's return code.
|
160 | 1033 |
Digest options:
|
161 | 1033 | /dg <path> Generates the to be signed digest and the unsigned PKCS7 files.
The output digest and PKCS7 files will be: <path>\<file>.dig and
<path>\<file>.p7u. To output an additional XML file, see /dxml.
|
162 | 1033 | /ds Signs the digest only. The input file should be the digest
generated by the /dg option. The output file will be:
<file>.signed.
|
163 | 1033 | /di <path> Creates the signature by ingesting the signed digest to the
unsigned PKCS7 file. The input signed digest and unsigned
PKCS7 files should be: <path>\<file>.dig.signed and
<path>\<file>.p7u.
|
164 | 1033 | /dxml When used with the /dg option, produces an XML file. The output
file will be: <path>\<file>.dig.xml.
|
165 | 1033 | /dlib <dll> Specifies the DLL implementing the AuthenticodeDigestSign
function to sign the digest with. This option is equivalent
to using SignTool separately with the /dg, /ds, and /di switches,
except this option invokes all three as one atomic operation.
|
166 | 1033 | /dmdf <file> When used with the /dlib option, passes the file's contents to
the AuthenticodeDigestSign function without modification.
|
167 | 1033 | /sa <OID> <value> Specify an OID and value to be included as an authenticated
attribute in the signature. The value will be encoded as an
ASN1 UTF8 string. This option may be given multiple times.
|
168 | 1033 | /rmc Specifies signing a PE file with the relaxed marker check semantic.
The flag is ignored for non-PE files. During verification, certain
authenticated sections of the signature will bypass invalid PE
markers check. This option should only be used after careful
consideration and reviewing the details of MSRC case MS12-024 to
ensure that no vulnerabilities are introduced.
|
200 | 1033 | Usage: signtool verify [options] <filename(s)>
Use the "verify" command to verify embedded or catalog signatures.
Verification determines if the signing certificate was issued by a trusted
party, whether that certificate has been revoked, and whether the certificate
is valid under a specific policy. Options allow you to specify requirements
that must be met and to specify how to find the catalog, if appropriate.
|
201 | 1033 |
Catalogs are used by Microsoft and others to sign many files very efficiently.
Catalog options:
|
202 | 1033 |
Other options:
|
203 | 1033 |
SignTool uses the "Windows Driver" Verification Policy by default. The options
below allow you to use alternate Policies.
Verification Policy options:
|
204 | 1033 |
Signature requirement options:
|
205 | 1033 | /a Automatically attempt to verify the file using all methods. First
search for a catalog using all catalog databases. If the file is
not signed in any catalog, attempt to verify the embedded
signature. When verifying files that may or may not be signed in a
catalog, such as Windows files and drivers, this option is the
easiest way to ensure that the signature is found.
|
206 | 1033 | /ad Find the catalog automatically using the default catalog database.
|
207 | 1033 | /as Find the catalog automatically using the system component (driver)
catalog database.
|
208 | 1033 | /ag <GUID> Find the catalog automatically in the specified catalog database.
Catalog databases are identified by GUID.
Example GUID: {F750E6C3-38EE-11D1-85E5-00C04FC295EE}
|
209 | 1033 | /c <file> Specify the catalog file.
|
210 | 1033 | /ca <h> Verify that the file is signed with an intermediate CA cert with
the specified hash. This option may be specified multiple times;
one of the specified hashes must match.
|
211 | 1033 | /o <ver> When verifying a file that is in a signed catalog, verify that the
file is valid for the specified platform.
Parameter format is: PlatformID:VerMajor.VerMinor.BuildNumber
|
212 | 1033 | /pa Use the "Default Authenticode" Verification Policy.
|
213 | 1033 | /pg <GUID> Specify the verification policy by GUID (also called ActionID).
|
214 | 1033 | /q No output on success and minimal output on failure. As always,
SignTool returns 0 on success, 1 on failure, and 2 on warning.
|
215 | 1033 | /r <name> Specify the Subject Name of a Root cert that the signing cert must
chain to.
|
216 | 1033 | /sha1 <h> Verify that the signer certificate has the specified hash. This
option may be specified multiple times; one of the specified hashes
must match.
|
217 | 1033 | /tw Generate a Warning if the signature is not timestamped.
|
218 | 1033 | /u <usage> Generate a Warning if the specified Enhanced Key Usage is not
present in the cert. This option may be given multiple times.
|
219 | 1033 | /v Print verbose success and status messages. This may also provide
slightly more information on error. If you want to see information
about the signer, you should use this option.
|
220 | 1033 | /kp Perform the verification with the kernel-mode driver signing policy.
|
221 | 1033 |
Manifest options:
|
222 | 1033 | /ph Print and verify page hash values.
|
223 | 1033 | /d Print Description and Description URL.
|
224 | 1033 | /all Verify all signatures in a file with multiple signatures.
|
225 | 1033 | /ds <index> Verify the signature at <index>.
|
226 | 1033 | /ms Use multiple verification semantics. This is the default behavior
of a Win8 WinVerifyTrust call.
|
227 | 1033 | /p7 Verify PKCS7 files. No existing policies are used for p7 validation.
The signature is checked and a chain is built for the signing
certificate.
|
228 | 1033 | /hash <SHA1 | SHA256> Optional hash algorithm to use when searching for
a file in a catalog.
|
229 | 1033 | /sl Verify sealing signatures for supported file types.
|
230 | 1033 | /bp Perform the verification with the Biometric mode signing policy.
|
233 | 1033 | /enclave Perform the verification with the enclave signing policy. This also
prints the Unique ID and Author ID information.
|
300 | 1033 | Usage: signtool timestamp [options] <filename(s)>
Use the "timestamp" command to add a timestamp to a previously-signed file.
The "/t" option is required.
|
301 | 1033 | /q No output on success and minimal output on failure. As always,
SignTool returns 0 on success and 1 on failure.
|
302 | 1033 | /t <URL> Specify the timestamp server's URL.
|
303 | 1033 | /v Print verbose success and status messages. This may also provide
slightly more information on error.
|
304 | 1033 | /tr <URL> Specifies the RFC 3161 timestamp server's URL.
|
305 | 1033 | /tseal <URL> Specifies the RFC 3161 timestamp server's URL for timestamping a
sealed file. One of /t, /tr or /tseal is required.
|
306 | 1033 | /td <alg> Used with the /tr or /tseal switch to request a digest algorithm
used by the RFC 3161 timestamp server.
|
307 | 1033 | /tp <index> Timestamps the signature at <index>.
|
308 | 1033 | /p7 Timestamps PKCS7 files.
|
309 | 1033 | /force Remove any sealing signature that is present in order to timestamp.
|
310 | 1033 | /nosealwarn Warnings for removing a sealing signature do not affect SignTool's
return code.
|
400 | 1033 | Usage: signtool catdb [options] <filename(s)>
Use the "catdb" command to add or remove catalog files to or from a catalog
database. Catalog databases are used for automatic lookup of catalog files,
and are identified by GUID.
|
401 | 1033 |
Catalog Database options allow you to select which catalog database to operate
on. If you do not specify a catalog database, SignTool operates on the system
component (driver) database.
Catalog Database options:
|
402 | 1033 |
Other options specify what to do with the selected catalog database, and other
behavior. If you do not specify any other options, SignTool will add the
specified catalogs to the catalog database, replacing any existing catalog
which has the same name.
Other options:
|
403 | 1033 | /d Operate on the default catalog database instead of the system
component (driver) catalog database.
|
404 | 1033 | /g <GUID> Operate on the specified catalog database.
|
405 | 1033 | /q No output on success and minimal output on failure. As always,
SignTool returns 0 on success and 1 on failure.
|
406 | 1033 | /r Remove the specified catalogs from the catalog database.
|
407 | 1033 | /u Automatically generate a unique name for the added catalogs. The
catalog files will be renamed if necessary to prevent name
conflicts with existing catalog files.
|
408 | 1033 | /v Print verbose success and status messages. This may also provide
slightly more information on error.
|
500 | 1033 | Usage: signtool remove [options] <filename(s)>
Use the "remove" command to remove the embedded signature(s) or sections of
the embedded signature on a PE/COFF file.
WARNING: This command will modify the file on the disk. Please create a backup
copy if you want to preserve the original file.
The option "/c" and/or "/u", or "/s" is required.
|
501 | 1033 | /u Remove the unauthenticated attributes from the signature
e.g. Dual signatures and timestamps.
|
502 | 1033 | /c Remove all certificates, except for the signer certificate
from the signature.
|
503 | 1033 | /q No output on success and minimal output on failure. As always,
SignTool returns 0 on success and 1 on failure.
|
504 | 1033 | /v Print verbose success and status messages. This may also provide
slightly more information on error.
|
505 | 1033 | /s Remove the signature(s) entirely.
|
1001 | 1033 | SignTool Error: A required parameter is missing.
|
1002 | 1033 | SignTool Error: Invalid command: %1!s!
|
1003 | 1033 | SignTool Error: Missing filename.
|
1004 | 1033 | SignTool Error: File not found: %1!s!
|
1005 | 1033 | SignTool Error: You cannot use the %1!s! option twice.
|
1006 | 1033 | SignTool Error: The %1!s! option requires a parameter.
|
1007 | 1033 | SignTool Error: Invalid option: %1!s!
|
1008 | 1033 | SignTool Error: An unexpected internal error has occurred.
|
1009 | 1033 | SignTool Error: The %1!s! option requires the %2!s! option.
|
1010 | 1033 | SignTool Error: The %1!s! option requires the use of one of the following
options: %2!s!
|
1011 | 1033 | SignTool Error: The %1!s! option is incompatible with the %2!s! option.
|
1012 | 1033 | SignTool Error: The %1!s! option cannot be used with any of the following
options: %2!s!
|
1013 | 1033 | SignTool Error: The %1!s! option is required.
|
1014 | 1033 | SignTool Error: There was an error opening the file list: %1!s!
|
1015 | 1033 | SignTool Error: Invalid GUID format: %1!s!
Expected GUID format: {F750E6C3-38EE-11D1-85E5-00C04FC295EE}
|
1016 | 1033 | SignTool Error: Occurrence of DLL name and parameter mismatched.
|
1017 | 1033 | SignTool Error: This version of signtool does not support the %1!s! functionality.
|
1018 | 1033 | SignTool Error: Missing required parameter(s), expecting %!s!.
|
1019 | 1033 | SignTool Error: The %1!s! option cannot be used with any other option.
|
1020 | 1033 | SignTool Error: The %1!s! option is incompatible with signing multiple files.
|
1021 | 1033 | SignTool Error: Out of memory.
|
1022 | 1033 | SignTool Error: Invalid Enhanced Key Usage: %1!s!
|
1023 | 1033 | SignTool Error: Specify the RFC 3161 timestamp server's URL instead with /tr.
|
1024 | 1033 | SignTool Error: Invalid OID: %1!s!
|
1100 | 1033 | SignTool Error: Invalid SHA1 hash format: %1!s!
|
1101 | 1033 | SignTool Error: The Enhanced Key Usage string is too long.
|
1102 | 1033 | SignTool Error: Invalid Timestamp URL: %1!s!
|
1103 | 1033 | SignTool Error: Invalid hash format: %1!s!
|
1104 | 1033 | SignTool Error: The hash provided is too long.
|
1110 | 1033 | SignTool Error: Invalid DSIG value: %1!s!
|
1111 | 1033 | SignTool Error: Invalid Key Spec value: %1!s!
|
1112 | 1033 | SignTool Error: The signer's certificate is not valid for signing.
|
1113 | 1033 | SignTool Error: The specified algorithm cannot be used or is invalid.
|
1114 | 1033 | SignTool Error: No private key is available.
|
1115 | 1033 | SignTool Error: Only P7 Embedded signatures are supported with Digest Signing.
|
1200 | 1033 | SignTool Error: Invalid OS Version string: %1!s!
Expected format: PlatformID:VerMajor.VerMinor
Examples: 2:5.0 -- Windows NT, Version 5.0 -- Windows 2000
2:5.1 -- Windows NT, Version 5.1 -- Windows XP
You may optionally add a build number to the Version string.
Example: 2:5.1.2600 -- Windows XP final build
|
1300 | 1033 | SignTool Error: Invalid index selected for timestamping.
|
2000 | 1033 | Number of warnings: %1!u!
|
2001 | 1033 | Number of errors: %1!u!
|
2002 | 1033 | SignTool Warning: The following option or combination of options is not
supported and will be ignored in whole or in part: %1!s!
|
2003 | 1033 | SignTool Error: No files were processed.
|
2004 | 1033 | SignTool Error: %1!s! returned error: 0x%2!08X!
%3!s! |
2005 | 1033 | SignTool Error: Signtool requires CAPICOM version 2.1.0.1 or higher. Please
copy the latest version of CAPICOM.dll into the directory that contains
SignTool.exe. If CAPICOM.dll exists, you may not have proper
permissions to install CAPICOM.
|
2006 | 1033 | SignTool Error: Access is denied.
|
2007 | 1033 | SignTool Error: The file is being used by another process.
|
2008 | 1033 | SignTool Error: The file cannot be mapped into memory. It may be zero size.
|
2010 | 1033 | SignTool Error: This version of signtool is not supported on this operating system.
|
2011 | 1033 | SignTool Error: A required function is not present.
This error likely means that you are running SignTool on an OS that
does not support the options you've specified.
|
2100 | 1033 | Number of files successfully Signed: %1!u!
|
2101 | 1033 | The following certificate was selected:
|
2102 | 1033 | Issued to: %1!s!
|
2103 | 1033 | Issued by: %1!s!
|
2104 | 1033 | Expires: %1!s!
|
2105 | 1033 | SHA1 hash: %1!s!
|
2106 | 1033 | Successfully signed: %1!s!
|
2107 | 1033 | Successfully signed and timestamped: %1!s!
|
2108 | 1033 |
Attempting to sign: %1!s!
|
2109 | 1033 | SignTool Warning: Signing succeeded, but an error occurred while attempting to
timestamp: %1!s!
|
2110 | 1033 | SignTool Error: The specified PFX password is not correct.
|
2111 | 1033 | SignTool Error: No certificates were found that met all the given criteria.
|
2112 | 1033 | SignTool Error: The specified CSP could not be found.
|
2113 | 1033 | SignTool Error: The private key for the selected certificate is not accessible.
|
2114 | 1033 | SignTool Error: An error occurred while attempting to load the signing
certificate from: %1!s!
|
2115 | 1033 | SignTool Error: No certificate was found with the specified SHA1 Hash.
|
2116 | 1033 | SignTool Error: No certificate was found with the specified Issuer.
|
2117 | 1033 | SignTool Error: Multiple certificates were found that meet all the given
criteria. Use the /a option to allow SignTool to choose the best
certificate automatically or use the /sha1 option with the hash of the
desired certificate.
The following certificates meet all given criteria:
|
2118 | 1033 | SignTool Error: An error occurred while attempting to open the certificate
store: "%1!s!"
|
2119 | 1033 | SignTool Error: An error occurred while attempting to sign: %1!s!
|
2120 | 1033 | SignTool Error: This file format cannot be signed because it is not recognized.
|
2121 | 1033 | SignTool Error: The specified private key does not match the public key of the
selected certificate.
|
2122 | 1033 | SignTool Error: The "%1!s!" certificate store was not found.
|
2123 | 1033 | SignTool Error: The specified private key container was not found.
|
2124 | 1033 | SignTool Error: An error occurred while attempting to open the specified
private key container.
|
2125 | 1033 | Either the file being signed or one of the DLL specified by /j switch |
2126 | 1033 | SignTool Warning: Unable to enable page-hashes.
|
2127 | 1033 | SignTool Warning: Unable to disable page-hashes.
|
2128 | 1033 |
The following certificates have been found to be suitable for signing:
|
2129 | 1033 | The expiration date cannot be determined.
|
2130 | 1033 | Signtool Error: The provided cross certificate would not be present in the certificate chain.
|
2131 | 1033 | Signtool Error: One of the secondary signatures has an invalid or missing sequence number.
|
2132 | 1033 | SignTool Error: Multiple signature support is not implemented for this filetype.
|
2133 | 1033 | SignTool Error: Invalid index specified.
|
2134 | 1033 | SignTool Error: This file is signed with an older version of the Authenticode
signature format that does not support sealing. The file will have to
have its existing signature(s) removed and resigned with support for
sealing. The /force option must be specified as part of the command in
order to do so.
|
2135 | 1033 | SignTool Warning: The existing signature was removed and the file was
successfully re-signed and sealed.
|
2136 | 1033 | SignTool Error: This file is signed with an older version of the Authenticode
signature format that does not support sealing. The file will have to
have its existing signature(s) removed and resigned with support for
sealing. The /force option must be specified as part of the command in
order to do so.
|
2137 | 1033 | SignTool Warning: The existing signature was removed and the file was
successfully re-signed with the intentToSeal attribute set. The file
will fail verification until the signature is sealed and users are
therefore advised to seal.
|
2138 | 1033 | The file was signed with the intentToSeal attribute set. The file will fail
verification until the signature is sealed and users are therefore
advised to seal.
|
2139 | 1033 | SignTool Error: The file has a sealed signature. In order to append more
signatures the seal will have to be removed and the file will have to
be re-signed. The /force option must be specified as part of the
command in order to do so.
|
2140 | 1033 | SignTool Warning: The existing seal was removed from the file and the desired
signature was appended to the file. The file will fail verification
until the signature is sealed and users are therefore advised to seal.
|
2141 | 1033 | SignTool Error: The file has a sealing signature. In order to seal with a new
signer the existing sealing signature will be replaced. The
/force option must be specified as part of the command in order to do
so.
|
2142 | 1033 | SignTool Warning: The existing sealing signature was successfully replaced on
the file.
|
2143 | 1033 | The file was signed but no sealing operations were performed since the file
format does not support sealing signatures.
|
2144 | 1033 | SignTool Error: The existing signature cannot be timestamped and sealed in the
same signtool command. Use separate commands to replace or timestamp
the signature, and then seal the file.
|
2145 | 1033 | SignTool Error: A signature exists for this signer and the digest algorithm
cannot be changed while sealing. Use separate commands to replace the
signature, and then seal the file.
|
2146 | 1033 | SignTool Error: There was an unspecified error while sealing.
|
2147 | 1033 | For more information, please see https://aka.ms/badexeformat
|
2200 | 1033 | Number of files successfully Verified: %1!u!
|
2201 | 1033 | Number of failed Verifications: %1!u!
|
2202 | 1033 |
Verifying: %1!s!
|
2203 | 1033 | Successfully verified: %1!s!
|
2204 | 1033 | File is signed in catalog: %1!s!
|
2205 | 1033 | Unable to verify this file using a catalog.
|
2206 | 1033 | Signing Certificate Chain:
|
2207 | 1033 | Countersigned by:
|
2208 | 1033 | Timestamp Verified by:
|
2209 | 1033 | File is not timestamped.
|
2210 | 1033 | The signature is timestamped: %1!s!
|
2211 | 1033 | This catalog file has been previously evaluated.
|
2212 | 1033 | SignTool Warning: File is not timestamped: %1!s!
|
2213 | 1033 | SignTool Error: An error occurred while attempting to verify: %1!s!
|
2214 | 1033 | SignTool Error: File not valid: %1!s!
|
2215 | 1033 | SignTool Error: Signing Cert does not chain to the specified Root Cert.
|
2216 | 1033 | SignTool Error: Could not open the specified catalog: %1!s!
|
2217 | 1033 | SignTool Error: File not found in the specified catalog.
|
2218 | 1033 | SignTool Error: This catalog is not valid for the specified OS version.
|
2219 | 1033 | SignTool Error: This catalog is not valid for the current OS version. You may
use the /o option to verify against a different OS version.
|
2220 | 1033 | SignTool Error: This file format cannot be verified because it is not
recognized.
|
2221 | 1033 | SignTool Error: The signing certificate is not valid for the requested usage.
|
2222 | 1033 | This error sometimes means that you are using the wrong verification
policy. Consider using the /pa option.
|
2223 | 1033 | SignTool Error: No signature found.
|
2224 | 1033 | SignTool Error: A certificate chain processed, but terminated in a root
certificate which is not trusted by the trust provider.
|
2225 | 1033 | SignTool Error: /kp cannot be used with /bp, /pa, or /pg.
|
2226 | 1033 | The signature is timestamped, however the timestamp time is not valid.
|
2227 | 1033 | SignTool Error: Signing Cert does not chain to a Microsoft Root Cert.
|
2228 | 1033 | SignTool Warning: A discrepancy was detected in the page hashes.
The computed page hashes do not match the embedded page hashes.
|
2229 | 1033 | SignTool Warning: No page hashes are present.
|
2231 | 1033 | Page hashes:
|
2232 | 1033 | Computed page hashes:
|
2233 | 1033 | File has page hashes.
|
2234 | 1033 | Cross Certificate Chain:
|
2235 | 1033 | SignTool Error: Signature did not pass crypto policy.
|
2236 | 1033 | Number of signatures successfully Verified: %1!u!
|
2237 | 1033 | SignTool Warning: The timestamp certificate is not valid for the requested usage.
|
2238 | 1033 | SignTool Warning: An error has been found with the timestamp.
CERT_TRUST_STATUS.dwErrorStatus: 0x%1!08X!
CERT_TRUST_STATUS.dwInfoStatus: 0x%1!08X!
|
2239 | 1033 | SignTool Error: File is marked intent-to-seal but lacks a sealing signature
|
2240 | 1033 | File is marked with intent to seal.
|
2241 | 1033 | File is not marked with intent to seal.
|
2242 | 1033 | File does not support sealing signatures.
|
2243 | 1033 | This signer seals the file.
|
2244 | 1033 | SignTool Error: The signer does not possess the specified EKUs.
|
2245 | 1033 | SignTool Error: No intermediate CA with a specified thumbprint was found.
|
2246 | 1033 | SignTool Error: The signing certificate does not have a specified SHA1 hash.
|
2247 | 1033 | SignTool Error: /bp cannot be used with /kp, /pa, or /pg.
|
2248 | 1033 | SignTool Error: The signing certificate is not valid for Biometric policy.
|
2249 | 1033 | SignTool Error: The signing certificate or attributes are not valid for Enclave policy.
|
2250 | 1033 | SignTool Warning: Enclave information could not be created.
|
2251 | 1033 | Unique ID: %1!s!
|
2252 | 1033 | Author ID: %1!s!
|
2300 | 1033 | Number of files successfully timestamped: %1!u!
|
2301 | 1033 |
Timestamping: %1!s!
|
2302 | 1033 | Successfully timestamped: %1!s!
|
2303 | 1033 | SignTool Error: An error occurred while attempting to timestamp: %1!s!
|
2304 | 1033 | SignTool Error: No signature was found. The file must be signed before it can
be timestamped.
|
2305 | 1033 | SignTool Error: The specified timestamp server either could not be reached or
returned an invalid response.
|
2306 | 1033 | SignTool Warning: The specified algorithm is not considered secure.
|
2307 | 1033 | SignTool Error: The file has a sealed signature. In order to timestamp the file
the seal will have to be removed and the file will have to be resigned.
The /force option must be specified as part of the command in order to
do so. |
2308 | 1033 | SignTool Warning: The existing seal was removed from the file and the file was
successfully timestamped. The file will fail verification until the
signature is sealed and users are therefore advised to seal. |
2309 | 1033 | SignTool Error: No sealing signature was found. The file must be sealed before
it can be seal timestamped.
|
2310 | 1033 | SignTool Error: The file format does not support sealing signatures and cannot
be seal timestamped.
|
2400 | 1033 | Adding Catalog: %1!s!
|
2401 | 1033 | Removing Catalog: %1!s!
|
2402 | 1033 | Catalog added successfully: %1!s!
|
2403 | 1033 | Catalog added successfully: %1!s!
System assigned name: %2!s!
|
2404 | 1033 | Catalog removed successfully: %1!s!
|
2405 | 1033 | Number of catalog files successfully Added: %1!u!
|
2406 | 1033 | Number of catalog files successfully Removed: %1!u!
|
2407 | 1033 | SignTool Error: An error occurred while attempting to add: %1!s!
|
2408 | 1033 | SignTool Error: An error occurred while attempting to remove: %1!s!
|
2409 | 1033 | SignTool Error: Removing a catalog is not supported on this version of windows.
|
2410 | 1033 | SignTool Error: Invalid catalog name: %1!s!
Please specify just the filename, with no path or wildcard specifiers.
|
2411 | 1033 | SignTool Error: Catalog not found in the catalog database: %1!s!
|
2412 | 1033 | SignTool Error: Invalid catalog file: %1!s!
|
2500 | 1033 | Removing unauthenticated attributes from the signature on file: %1!s!
|
2501 | 1033 | Removing CA certificates from the signature on file: %1!s!
|
2502 | 1033 | Successfully committed changes to the file: %1!s!
|
2503 | 1033 | SignTool Error: Unsupported file type: %1!s!
|
2504 | 1033 | SignTool Error: Unsupported number of certificates on image (only one is expected): %1!s!
|
2505 | 1033 | SignTool Warning: No unauthenticated attributes found in the signature.
|
2506 | 1033 | SignTool Warning: No certificates were removed.
|
2507 | 1033 | Number of files successfully processed: %1!u!
|
2508 | 1033 | SignTool Error: Failed to obtain the cryptographic message: %1!s!
|
2509 | 1033 | SignTool Error: Failed to properly build the Subject Info: %1!s!
|
2510 | 1033 | Removing signature on file: %1!s!
|