You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/extensibility/dotnet-sign-cli-reference-vsix.md
+11-2Lines changed: 11 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,9 @@ ms.date: 04/11/2024
26
26
> [!IMPORTANT]
27
27
> Sign CLI only supports `SHA-256`, `SHA-384`, and `SHA-512` as valid fingerprint algorithms. You can use PowerShell to get fingerprints using: `Get-FileHash -Algorithm SHA256 <path to .cer file> | Format-Table -AutoSize`
28
28
29
+
> [!IMPORTANT]
30
+
> Sign CLI only supports `RSA` algorithms, therefore using `ECDSA` to generate your fingerprint will fail signature validation during install. This doesn't block installation, but a “Invalid signature” warnings will show up under the VSIX Installer window during installation.
`Sign CLI` is a Dotnet tool that recursively signs files and containers with a certificate and private. The certificate and private key can be obtained from either a file (PFX, P7B, CER) or from a certificate installed in a certificate store by providing a `SHA-256`, `SHA-384`, or `SHA-512` fingerprint. USB keys can be accessed using a [Cryptographic Service Provider](/windows/win32/seccrypto/cryptographic-service-providers) (CSP) implemented by the manufacturer and accessed from the certificate store.
57
60
58
61
## Installation
59
-
Install Sign CLI globally using `dotnet tool install sign --version <version> --global`, where `<version>` is the latest available version under [Sign (nuget.org)](https://www.nuget.org/packages/sign).
Cryptographic Service Provider containing a private key.
93
+
Cryptographic Service Provider containing a private key.
94
+
95
+
> [!NOTE]
96
+
> You can see all available CSPs by running `certutil -csplist`, where legacy CSPs specify a "Provider Type" and CNG providers usually have "Key Storage Provider" in their names. `certutil -csptest "<provider name>"` provides more information on specific providers.
91
97
92
98
-**`-k|--key-container <CONTAINER NAME>]`**
93
99
94
100
Private key container name.
95
101
102
+
> [!NOTE]
103
+
> You can find all keys stored within a CSP by running `certutil -csp <Provider Name> -key`.
104
+
96
105
-**`-km|--use-machine-key-container]`**
97
106
98
107
Use a machine-level private key container instead of the default user-level container.
0 commit comments