Skip to content

Instantly share code, notes, and snippets.

@senortestamarck
Created December 1, 2023 16:43
Show Gist options
  • Save senortestamarck/eb79f1cedecafd80118f1a74b56e1837 to your computer and use it in GitHub Desktop.
Save senortestamarck/eb79f1cedecafd80118f1a74b56e1837 to your computer and use it in GitHub Desktop.
spy2
*************** OpenSC PKCS#11 spy *****************
Loaded: "/usr/lib/opensc-pkcs11.so"
0: C_GetInterface
2023-12-01 16:36:42.741
[in] pInterfaceName 0000000000427685 / 7
00000000 50 4B 43 53 20 31 31 PKCS 11
[in] pVersion = NULL
[in] flags =
Returned: 0 CKR_OK
1: C_Initialize
2023-12-01 16:36:42.741
[in] pInitArgs = (nil)
Returned: 0 CKR_OK
2: C_GetSlotList
2023-12-01 16:36:42.991
[in] tokenPresent = 0x0
[out] pSlotList:
Count is 1
[out] *pulCount = 0x1
Returned: 0 CKR_OK
3: C_GetSlotList
2023-12-01 16:36:42.993
[in] tokenPresent = 0x0
[out] pSlotList:
Slot 0
[out] *pulCount = 0x1
Returned: 0 CKR_OK
4: C_GetSlotInfo
2023-12-01 16:36:42.994
[in] slotID = 0x0
[out] pInfo:
slotDescription: 'Identiv uTrust 3512 SAM slot Tok'
'en [CCID Interface] (55512030...'
manufacturerID: 'Identiv '
hardwareVersion: 0.0
firmwareVersion: 0.0
flags: 7
CKF_TOKEN_PRESENT
CKF_REMOVABLE_DEVICE
CKF_HW_SLOT
Returned: 0 CKR_OK
5: C_OpenSession
2023-12-01 16:36:42.997
[in] slotID = 0x0
[in] flags = 0x6
[in] pApplication = (nil)
[in] Notify = (nil)
[out] *phSession = 0x15b8fa0
Returned: 0 CKR_OK
6: C_GetTokenInfo
2023-12-01 16:36:42.997
[in] slotID = 0x0
[out] pInfo:
label: 'SmartCard-HSM (UserPIN) '
manufacturerID: 'www.CardContact.de '
model: 'PKCS#15 emulated'
serialNumber: 'DECC0900154 '
ulMaxSessionCount: 0
ulSessionCount: 0
ulMaxRwSessionCount: 0
ulRwSessionCount: 0
ulMaxPinLen: 15
ulMinPinLen: 6
ulTotalPublicMemory: -1
ulFreePublicMemory: -1
ulTotalPrivateMemory: -1
ulFreePrivateMemory: -1
hardwareVersion: 24.13
firmwareVersion: 3.5
time: ' '
flags: 40d
CKF_RNG
CKF_LOGIN_REQUIRED
CKF_USER_PIN_INITIALIZED
CKF_TOKEN_INITIALIZED
Returned: 0 CKR_OK
7: C_Login
2023-12-01 16:36:43.009
[in] hSession = 0x15b8fa0
[in] userType = CKU_USER
[in] pPin[ulPinLen] 00007ffec3a8493a / 6
00000000 30 30 30 30 30 30 000000
Returned: 0 CKR_OK
8: C_GetMechanismList
2023-12-01 16:36:43.090
[in] slotID = 0x0
[out] pMechanismList[34]:
Count is 34
Returned: 0 CKR_OK
9: C_GetMechanismList
2023-12-01 16:36:43.090
[in] slotID = 0x0
[out] pMechanismList[34]:
CKM_SHA_1
Unknown Mechanism (00000255)
CKM_SHA256
CKM_SHA384
CKM_SHA512
CKM_MD5
CKM_RIPEMD160
CKM_GOSTR3411
CKM_ECDSA
Unknown Mechanism (00001045)
Unknown Mechanism (00001046)
CKM_ECDSA_SHA1
Unknown Mechanism (00001043)
Unknown Mechanism (00001044)
CKM_ECDH1_COFACTOR_DERIVE
CKM_ECDH1_DERIVE
CKM_EC_KEY_PAIR_GEN
CKM_RSA_X_509
CKM_RSA_PKCS
CKM_SHA1_RSA_PKCS
Unknown Mechanism (00000046)
CKM_SHA256_RSA_PKCS
CKM_SHA384_RSA_PKCS
CKM_SHA512_RSA_PKCS
CKM_MD5_RSA_PKCS
CKM_RIPEMD160_RSA_PKCS
CKM_RSA_PKCS_PSS
CKM_SHA1_RSA_PKCS_PSS
Unknown Mechanism (00000047)
CKM_SHA256_RSA_PKCS_PSS
CKM_SHA384_RSA_PKCS_PSS
CKM_SHA512_RSA_PKCS_PSS
CKM_RSA_PKCS_OAEP
CKM_RSA_PKCS_KEY_PAIR_GEN
Returned: 0 CKR_OK
10: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_SHA_1 [out] pInfo:
CKM_SHA_1 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
11: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = 0x00000255[out] pInfo:
Unknown Mechanism (00000255) : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
12: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_SHA256 [out] pInfo:
CKM_SHA256 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
13: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_SHA384 [out] pInfo:
CKM_SHA384 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
14: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_SHA512 [out] pInfo:
CKM_SHA512 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
15: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_MD5 [out] pInfo:
CKM_MD5 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
16: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_RIPEMD160 [out] pInfo:
CKM_RIPEMD160 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
17: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_GOSTR3411 [out] pInfo:
CKM_GOSTR3411 : min:0 max:0 flags:0x400 ( Digest )
Returned: 0 CKR_OK
18: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_ECDSA [out] pInfo:
CKM_ECDSA : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
19: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = 0x00001045[out] pInfo:
Unknown Mechanism (00001045) : min:192 max:521 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
20: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = 0x00001046[out] pInfo:
Unknown Mechanism (00001046) : min:192 max:521 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
21: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_ECDSA_SHA1 [out] pInfo:
CKM_ECDSA_SHA1 : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
22: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = 0x00001043[out] pInfo:
Unknown Mechanism (00001043) : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
23: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = 0x00001044[out] pInfo:
Unknown Mechanism (00001044) : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
24: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_ECDH1_COFACTOR_DERIVE [out] pInfo:
CKM_ECDH1_COFACTOR_DERIVE : min:192 max:521 flags:0x1D80001 ( Hardware Derive F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
25: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_ECDH1_DERIVE [out] pInfo:
CKM_ECDH1_DERIVE : min:192 max:521 flags:0x1D80001 ( Hardware Derive F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
26: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_EC_KEY_PAIR_GEN [out] pInfo:
CKM_EC_KEY_PAIR_GEN : min:192 max:521 flags:0x1D10001 ( Hardware KeyPair F(P) EcParams NamedCurve Uncompress )
Returned: 0 CKR_OK
27: C_GetMechanismInfo
2023-12-01 16:36:43.090
[in] slotID = 0x0
[in] type = CKM_RSA_X_509 [out] pInfo:
CKM_RSA_X_509 : min:1024 max:4096 flags:0x2A01 ( Hardware Decrypt Sign Verify )
Returned: 0 CKR_OK
28: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_RSA_PKCS [out] pInfo:
CKM_RSA_PKCS : min:1024 max:4096 flags:0x2A01 ( Hardware Decrypt Sign Verify )
Returned: 0 CKR_OK
29: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA1_RSA_PKCS [out] pInfo:
CKM_SHA1_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
30: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = 0x00000046[out] pInfo:
Unknown Mechanism (00000046) : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
31: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA256_RSA_PKCS [out] pInfo:
CKM_SHA256_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
32: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA384_RSA_PKCS [out] pInfo:
CKM_SHA384_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
33: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA512_RSA_PKCS [out] pInfo:
CKM_SHA512_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
34: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_MD5_RSA_PKCS [out] pInfo:
CKM_MD5_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
35: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_RIPEMD160_RSA_PKCS [out] pInfo:
CKM_RIPEMD160_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
36: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_RSA_PKCS_PSS [out] pInfo:
CKM_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2801 ( Hardware Sign Verify )
Returned: 0 CKR_OK
37: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA1_RSA_PKCS_PSS [out] pInfo:
CKM_SHA1_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
38: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = 0x00000047[out] pInfo:
Unknown Mechanism (00000047) : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
39: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA256_RSA_PKCS_PSS [out] pInfo:
CKM_SHA256_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
40: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA384_RSA_PKCS_PSS [out] pInfo:
CKM_SHA384_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
41: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_SHA512_RSA_PKCS_PSS [out] pInfo:
CKM_SHA512_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify )
Returned: 0 CKR_OK
42: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_RSA_PKCS_OAEP [out] pInfo:
CKM_RSA_PKCS_OAEP : min:1024 max:4096 flags:0x201 ( Hardware Decrypt )
Returned: 0 CKR_OK
43: C_GetMechanismInfo
2023-12-01 16:36:43.091
[in] slotID = 0x0
[in] type = CKM_RSA_PKCS_KEY_PAIR_GEN [out] pInfo:
CKM_RSA_PKCS_KEY_PAIR_GEN : min:1024 max:4096 flags:0x10000 ( KeyPair )
Returned: 0 CKR_OK
44: C_GenerateKeyPair
2023-12-01 16:36:43.091
[in] hSession = 0x15b8fa0
[in] pMechanism->type = CKM_EC_KEY_PAIR_GEN
[in] pMechanism->pParameter[ulParameterLen] NULL [size : 0x0 (0)]
[in] pPublicKeyTemplate[8]:
CKA_CLASS CKO_PUBLIC_KEY
CKA_TOKEN True
CKA_VERIFY True
CKA_DERIVE True
CKA_EC_PARAMS 00000000015b9140 / 10
00000000 06 08 2A 86 48 CE 3D 03 01 07 ..*.H.=...
CKA_KEY_TYPE CKK_EC
CKA_ID 000000000062d140 / 1
00000000 01 .
CKA_PRIVATE False
[in] pPrivateKeyTemplate[8]:
CKA_CLASS CKO_PRIVATE_KEY
CKA_TOKEN True
CKA_PRIVATE True
CKA_SENSITIVE True
CKA_SIGN True
CKA_DERIVE True
CKA_KEY_TYPE CKK_EC
CKA_ID 000000000062d140 / 1
00000000 01 .
Returned: 5 CKR_GENERAL_ERROR
45: C_Finalize
2023-12-01 16:36:44.901
Returned: 0 CKR_OK
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment