/[cvs]/joko/ToolBox/Windows/VpnDial-installer/vpndial/bin/winhttpcertcfg.exe
ViewVC logotype

Annotation of /joko/ToolBox/Windows/VpnDial-installer/vpndial/bin/winhttpcertcfg.exe

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.1 - (hide annotations)
Tue Nov 22 17:32:44 2005 UTC (19 years ago) by janosch
Branch: MAIN
CVS Tags: HEAD
File MIME type: application/octet-stream
initial commit

1 janosch 1.1 MZ@ !L!This program cannot be run in DOS mode.
2     $:~~u~~u~~uvz~uv(w~u~~t9~uv*q~uv~uv+~uv/~uRich~~uPELq> 
3     &\3@29 `dpP @a$.texth%& `.bss$@.dataP*@.idata`,@.rsrcPp4@@q>#!LOCAL_MACHINECURRENT_USERError: Unable to determine account name for SID, error = 0x%X
4     Error: No account information was found.
5     SetSecurityDescriptorControladvapi32.dll%s
6    
7     %s
8     %s\%s
9     Additional accounts and groups with access to the private key include:
10     The Discretionary Access Control List (DACL) for this object is a NULL DACL. This implies everyone has full access to this object. This NULL DACL could bein place because the system is running on a filesystem which does not support protected files (such as the FAT32 filesystem)
11     Error: Failed to grant access with error code 0x%X
12    
13     Granting private key access for account:
14     Private key access has already been granted for account:
15     Error: Failed to remove access with error code 0x%X
16    
17     Account already does not have access to private key.
18    
19     Removing private key access for account:
20     Error: Unable to update security info for key container, error = 0x%X
21    
22     This can only be done by the user who installed the certificate.
23    
24     Error: Access was not successfully obtained for the private key.
25     Error: Failed to obtain security descriptor for private key
26    
27     Error: Failed to obtain security information for private key
28    
29     OPERATION FAILED
30     The Discretionary Access Control List (DACL) for this object is a NULL DACL. This implies everyone has full access to this object. This NULL DACL could bein place because the system is running on a filesystem which does not support protected files (such as the FAT32 filesystem)
31     Error: Failed to obtain access list private key
32    
33     Error: Failed to open certificate store with error code 0x%X
34     Error: Unable to open PFX file
35     Error: PFX file was not found
36     Error: Unable to import contents of PFX file.
37     Please make sure the filename and path,
38     as well as the password, are correct.
39    
40     Warning: Failed to import root certificate
41    
42     Error: Unable to import root certificate
43    
44     RootError: Failed to import a certificate, error = 0x%X
45    
46    
47     Imported certificate:
48     Error: Could not find needed DLL entry point
49     CryptUIWizImportError: Failed to load cryptography component with error code 0x%X
50     cryptui.dllError: Unable to find or obtain a context for requested certificate
51    
52     Matching certificate:
53     Usage:
54    
55     winhttpcertcfg [-?] : To view help information
56    
57     winhttpcertcfg [-i PFXFile | -g | -r | -l]
58     [-a Account] [-c CertStore] [-s SubjectStr] [-p PFXPassword]
59    
60     Note:
61    
62     The user must have sufficient privileges to use this tool,
63     which likely requires the user to be an administrator and
64     the same user who installed the client certificate, if it is
65     already installed.
66    
67     Options:
68    
69     To list accounts which have access to the private key for
70     specified certificate:
71     winhttpcertcfg -l -c CertLocation -s SubjectStr
72    
73     To grant access to private key for an account with
74     specified certificate that is already installed:
75     winhttpcertcfg -g -c CertLocation -s SubjectStr -a Account
76    
77     To import a certificate plus private key from a PFX file:
78     winhttpcertcfg -i PFXFile -c CertLocation
79    
80     To remove access to private key for an account with
81     specified certificate:
82     winhttpcertcfg -r -c CertLocation -s SubjectStr -a Account
83    
84     Description of secondary options:
85    
86     -c LOCAL_MACHINE|CURRENT_USER\CertStore
87    
88     Use LOCAL_MACHINE or CURRENT_USER to designate which
89     registry branch to use for the location. The
90     certificate store can be any installed on the machine.
91     Typical examples are MY, Root, and TrustedPeople.
92    
93     -a Account
94    
95     User account on the machine being configured. This could
96     be a local machine or domain account, such as:
97     IWAM_TESTMACHINE, TESTUSER, or TESTDOMAIN\DOMAINUSER.
98    
99     -s SubjectStr
100    
101     Case-insensitive search string for finding the first
102     enumerated certificate with a subject name that contains
103     this substring.
104    
105     -p PFXPassword
106    
107     Password to use for importing the certificate and
108     private key. This option can only be used with -i.
109    
110     Microsoft (R) WinHTTP Certificate Configuration Tool
111     Copyright (C) Microsoft Corporation 2001.
112    
113     UnhandledExceptionFilterkernel32.dll44HP`!NB10q>winhttpcertcfg.pdb\5UQS] W39};u3MVuHb5bWWPuEWW։E DP>;YujXu PuuWW֋ f<A3^_[UQQS39]VW]]u ;};uaE PEP6EPSuSa=<b׃zt9]=@btuj@;Éu E6uj@;ËMtM QMQ6MQPuSauG<bE;Ë=DbtP׉u;tP׉ub@h@PbE 3jWX_^[ UQQS39M VWMMu;E;aEPEPQEP6u uӅ=<b׃zt\u=@bj@ׅujuj@ׅMuj[/MQMQPEP6u uӅt6auE<b؋=DbtP׃&utP׃&bS@hPb 3jWX_^[h4bthP8bt3 W|$tkG SU-aVjjh0PhՋ؍CPj@@bt4SVG h
114     0PhՅtbV hPb ^][_UPE3SW3ۺʍf39]ʍfu3IV5aWPSjjuWPSSju֍PP0b@^M_[ PU$V$Wj$3Y!F$S-t /PHbj[;@PblYa+tZtN+eMYSD$P7,b;ÍD$vNQPT*M j\7b؅YYj h7b u Fj h,7b !FFPCSjMj\7bYYFt FFGF@8pt+tHukM~cF M~NFP7eu?Mst0~t't ~ t~uu~u u ~ t&[$_^]i  UQQeeEPEPuRuGbVW}u tWhjhPb5DbtWփ}tu_^UQbeVu uh@PbYYCWhPb3f9~YYv+EPPVatE8u P1Gf;~r_3^UQSVW}33f9wuvXEPPWat>E8u6u Pat%b hPbEYYP3CFf;wreb hPbYYu u h?jWa<b=@EuUu afG!]0Sj@@buu E*QSPau><bE6Db&}tub@h\Pb E_^[ 3f;_sTEPPWat.E8HQpj6uaat Cf;_r <bEf;_ou h?j6a`<bERU SV5b3W}f9GEEEvq]EPSWatJE8uBu Pat1b hlP֋EYYPSWat5EEfEf;Gr}ub@h4PYY3_^[<bbW@hPփ U<S39]]]]]]]]]ujWXEVWEPEPEPSjBua=b5ajEPSjuօuj@@b;ÉEejMQPjuօ?EPEPEPuau%9]t <bh$Eb@PYYUEd~Vu9]ub hPbYY])uEPu u5 u u;ÉEE PE
115     Puau<bEu EPatE;uESPjEPatŸPPEP|EPau EWpjEPjuauq<bhE@b@htPbYY>b@h0Pסb@hP׃9]tub@hP׃ 9]_^t9]t
116     Sua9]t uDbE[ U0h$bEu&<bPEb@hpPb h\P8bEu$<bEb@h,PbYYSVuFWv=a# @Pjjj
117     ׉E3PPPPj39ME+;#QQQQQQQjhvja3u}ЫFE؋FEEPF3%W W PEEUvEPEPv}v}Q;ljE!}!}=bEuuaE
118     PEPjuuatGb hPYYub hPYYjuuuEa<bPb@hP׃ }ZjuaF#h @P3VVj
119     a;ƉEu<bEb@hPzVjuPaub@hpPYYua}5Dbtuփ}tcu\<bPh9<bEbuh@PbYY(h<bPhXEb@Pb }_^[t jua}t juau(bEUQQVuNWv3ɸ#ȁQWWj
120     a;ljEu <bSWv hWhPa؅ۡbthee hPbYYS>tEPEPvvuA6uS}5Dbtuփ}tu@hPbYYtSajua[_^U bV5bW h P3YYEPE PEHP}t'~} EPb@h PYY EPT}t uY}t uY}t uY}t uY_^UPt=N@unVEP bu3ub3b3b3EP bE3E35Pu
121     PN@h 4b^th P8b@; PuU$X(P@tЃ=@t>W3!EjY}󫹲}EEЍEjE EbEP@_hbPbjŨj(h f=MZu(<PEu t! te*v39tv39MejXbY @ @\b @b @`b @=Pu h 5dbYhPh P@E܍EP5@EPEPEPlbEhPhPE pbuuu0uȃ}uVtbxb-E MPQ5YYËeuЃ}uVbbMk%b%b%|b%hbhhYYY3h\5dPD$l$l$+SVWEePEEEEdËMd Y_^[Q%Tb%Pb82N@`db,a4ePbd`fa`gaeepebeNeeeeeee
122     ff:fVfvffffgggtgPg2g gffccccccvcb\cLc>c*cc
123     cbbbbb@e eeedddddddd|drdbdXdNdBd:d0d ddeepebeNeeeeeee
124     ff:fVfvffffgggtgPg2g gffccccccvcb\cLc>c*cc
125     cbbbbb@e eeedddddddd|drdbdXdNdBd:d0d ddkMultiByteToWideCharlstrlenARLocalFreeNLocalAllociGetLastErrorGetProcAddresswGetModuleHandleAlstrcmpAGetShortPathNameAFreeLibraryHLoadLibraryAQueryPerformanceCounterGetTickCount>GetCurrentThreadId;GetCurrentProcessIdGetSystemTimeAsFileTimeQTerminateProcess:GetCurrentProcess=SetUnhandledExceptionFilterKERNEL32.dll??2@YAPAXI@ZfprintfD_iob_strnicmpstrchr$tolower??3@YAXPAX@Z_c_exit_exitN_XcptFilter_cexitexitq__initenvp__getmainargs@_initterm__setusermatherr_adjust_fdiv__p__commode__p__fmode__set_app_type_except_handler3msvcrt.dll_controlfpGLookupAccountSidA>IsValidSidELookupAccountNameAGetAceAddAccessDeniedAce1InitializeAclGetLengthSidAddAccessAllowedAceEqualSidDeleteAceCryptReleaseContextCryptSetProvParam=IsValidSecurityDescriptor/SetSecurityDescriptorDacl2InitializeSecurityDescriptorGetSecurityDescriptorControlGetSecurityDescriptorDaclCryptGetProvParamADVAPI32.dllMCertNameToStrAECertGetNameStringAtCryptAcquireCertificatePrivateKeyCertCloseStore<CertFreeCertificateContextCertAddCertificateContextToStore)CertEnumCertificatesInStoreCryptQueryObjectPCertOpenStore2CertFindCertificateInStoreCRYPT32.dll0 H`p4VS_VERSION_INFO?JStringFileInfo&040904B0LCompanyNameMicrosoft Corporation5FileDescriptionMicrosoft (R) WinHTTP Certificate Configuration Toolp(FileVersion5.0.3790.0 built by: dnsrv_dev(v-smgum)FInternalNameWinHttpCertCfg.exe.LegalCopyright Microsoft Corporation. All rights reserved.NOriginalFilenameWinHttpCertCfg.exej%ProductNameMicrosoft Windows Operating System: ProductVersion5.0.3790.0DVarFileInfo$Translation 

MailToCvsAdmin">MailToCvsAdmin
ViewVC Help
Powered by ViewVC 1.1.26 RSS 2.0 feed