Skip to content

Commit 14edb00

Browse files
committed
Merged main into live
2 parents 32b61f6 + 7b09ec7 commit 14edb00

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

docs/extensibility/dotnet-sign-cli-reference-vsix.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ ms.date: 04/11/2024
2626
> [!IMPORTANT]
2727
> Sign CLI only supports `SHA-256`, `SHA-384`, and `SHA-512` as valid fingerprint algorithms. You can use PowerShell to get fingerprints using: `Get-FileHash -Algorithm SHA256 <path to .cer file> | Format-Table -AutoSize`
2828
29+
> [!IMPORTANT]
30+
> Sign CLI only supports `RSA` algorithms, therefore using `ECDSA` to generate your fingerprint will fail signature validation during install. This doesn't block installation, but a “Invalid signature” warnings will show up under the VSIX Installer window during installation.
31+
2932
## Synopsis
3033

3134
```dotnetcli
@@ -56,7 +59,7 @@ sign code certificate-store -h|--help
5659
`Sign CLI` is a Dotnet tool that recursively signs files and containers with a certificate and private. The certificate and private key can be obtained from either a file (PFX, P7B, CER) or from a certificate installed in a certificate store by providing a `SHA-256`, `SHA-384`, or `SHA-512` fingerprint. USB keys can be accessed using a [Cryptographic Service Provider](/windows/win32/seccrypto/cryptographic-service-providers) (CSP) implemented by the manufacturer and accessed from the certificate store.
5760

5861
## Installation
59-
Install Sign CLI globally using `dotnet tool install sign --version <version> --global`, where `<version>` is the latest available version under [Sign (nuget.org)](https://www.nuget.org/packages/sign).
62+
Install Sign CLI globally using `dotnet tool install sign --prerelease --global`
6063

6164
### Offline Installation of Sign CLI
6265
For isolated environments you can download a Sign CLI NuGet package and install it using:
@@ -87,12 +90,18 @@ dotnet tool install --global --add-source <path-to-folder> <tool-name> --version
8790

8891
- **`-csp|--crypto-service-provider <CSP NAME>`**
8992

90-
Cryptographic Service Provider containing a private key.
93+
Cryptographic Service Provider containing a private key.
94+
95+
> [!NOTE]
96+
> You can see all available CSPs by running `certutil -csplist`, where legacy CSPs specify a "Provider Type" and CNG providers usually have "Key Storage Provider" in their names. `certutil -csptest "<provider name>"` provides more information on specific providers.
9197
9298
- **`-k|--key-container <CONTAINER NAME>]`**
9399

94100
Private key container name.
95101

102+
> [!NOTE]
103+
> You can find all keys stored within a CSP by running `certutil -csp <Provider Name> -key`.
104+
96105
- **`-km|--use-machine-key-container]`**
97106

98107
Use a machine-level private key container instead of the default user-level container.

0 commit comments

Comments
 (0)