It is unclear how the driver should be signed in my specific circumstances.
OpenVPN has a tap driver, which consists of tap0901.sys, tap0901.cat and OemWin2k.inf files.
When I install it using "devcon install OemWin2k.inf tap0901" on my 64-bit win7, it installs without any scary warnings.
I renamed the driver to another ogtap100 name (renaming the files to ogtap100.sys, ogtap100.cat and replacing the lines "tap0901" in OemWin2k.inf with "ogtap100" according to http://community.openvpn.net/openvpn/wiki/ManagingWindowsTAPDrivers and comments in OemWin2k.inf).
However, when I run "devcon install OemWin2k.info ogtap100" in the renamed driver, I get a big scary warning from Windows that the driver comes from an unknown source. It will be installed, but I plan to send it as part of my application, so a big scary warning is not good.
When I run "signtool verify / v ogtap100.cat", I get: "SignTool error: the certificate chain has been processed but completed in the root certificate that the trusted trust provider does not trust." even though he also says the root certificate is "Issued: DigiCert High Assurance EV Root CA".
I tried re-signing (signtool sign / f cert.pfx ogtap100.cat) with my own certificate (which works when signing regular .exe files), but I get the same scary warning.
What am I missing?
Could it be. to do with a directory (.cat) file?
I read http://msdn.microsoft.com/en-us/windows/hardware/gg463050 , but suggests that I create the .cat file myself. I already have a .cat file from OpenVPN. Should I re-generate it after renaming files and OewmWin2k.inf? If so, how?
source share