From: DWinters on
In expanding our drivers to support Windows Seven 64-bit, we've run into a
snag, with error code 52. We're currently using a minimal .INF to try to get
one card working in just this environment, and once it works we'll expand it
for the other 100+ products and combine it with our 32-bit .INF.

We have a certificate based on the VeriSign Class 3 Code Signing 2009-2 CA.
We build the .SYS, sign the .SYS, make a .CAT with INF2CAT, then sign the
..CAT. Previous (failed) driver versions are removed by uninstalling via
Device Manager, and checking the checkbox to delete driver files. Driver
installation starts out well, asks if we want to trust ourselves, and does
not show the red dialog, but ends with a Code 52 failure message, saying
something unspecific in the driver package isn't signed properly and warning
that this may be the result of an attack.

Installing the certificate in the Trusted Root Certification Authorities
store doesn't appear to change anything, so we don't think it's a problem
with the certificate itself. Performing the build/sign/INF2CAT/sign steps
from Windows Seven 64-bit doesn't appear to change anything, so we don't
think it's a format problem. Our leading hypothesis is that there's an
additional signing step needed; does Code 52 correspond to a more specific
failure of signing than its message indicates? Is there a step noticeably
missing?
From: Maxim S. Shatskih on
> In expanding our drivers to support Windows Seven 64-bit, we've run into a
> snag, with error code 52.

What will setupapi.dev.log say?

--
Maxim S. Shatskih
Windows DDK MVP
maxim(a)storagecraft.com
http://www.storagecraft.com