Created
December 1, 2023 16:43
-
-
Save senortestamarck/eb79f1cedecafd80118f1a74b56e1837 to your computer and use it in GitHub Desktop.
spy2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
*************** OpenSC PKCS#11 spy ***************** | |
Loaded: "/usr/lib/opensc-pkcs11.so" | |
0: C_GetInterface | |
2023-12-01 16:36:42.741 | |
[in] pInterfaceName 0000000000427685 / 7 | |
00000000 50 4B 43 53 20 31 31 PKCS 11 | |
[in] pVersion = NULL | |
[in] flags = | |
Returned: 0 CKR_OK | |
1: C_Initialize | |
2023-12-01 16:36:42.741 | |
[in] pInitArgs = (nil) | |
Returned: 0 CKR_OK | |
2: C_GetSlotList | |
2023-12-01 16:36:42.991 | |
[in] tokenPresent = 0x0 | |
[out] pSlotList: | |
Count is 1 | |
[out] *pulCount = 0x1 | |
Returned: 0 CKR_OK | |
3: C_GetSlotList | |
2023-12-01 16:36:42.993 | |
[in] tokenPresent = 0x0 | |
[out] pSlotList: | |
Slot 0 | |
[out] *pulCount = 0x1 | |
Returned: 0 CKR_OK | |
4: C_GetSlotInfo | |
2023-12-01 16:36:42.994 | |
[in] slotID = 0x0 | |
[out] pInfo: | |
slotDescription: 'Identiv uTrust 3512 SAM slot Tok' | |
'en [CCID Interface] (55512030...' | |
manufacturerID: 'Identiv ' | |
hardwareVersion: 0.0 | |
firmwareVersion: 0.0 | |
flags: 7 | |
CKF_TOKEN_PRESENT | |
CKF_REMOVABLE_DEVICE | |
CKF_HW_SLOT | |
Returned: 0 CKR_OK | |
5: C_OpenSession | |
2023-12-01 16:36:42.997 | |
[in] slotID = 0x0 | |
[in] flags = 0x6 | |
[in] pApplication = (nil) | |
[in] Notify = (nil) | |
[out] *phSession = 0x15b8fa0 | |
Returned: 0 CKR_OK | |
6: C_GetTokenInfo | |
2023-12-01 16:36:42.997 | |
[in] slotID = 0x0 | |
[out] pInfo: | |
label: 'SmartCard-HSM (UserPIN) ' | |
manufacturerID: 'www.CardContact.de ' | |
model: 'PKCS#15 emulated' | |
serialNumber: 'DECC0900154 ' | |
ulMaxSessionCount: 0 | |
ulSessionCount: 0 | |
ulMaxRwSessionCount: 0 | |
ulRwSessionCount: 0 | |
ulMaxPinLen: 15 | |
ulMinPinLen: 6 | |
ulTotalPublicMemory: -1 | |
ulFreePublicMemory: -1 | |
ulTotalPrivateMemory: -1 | |
ulFreePrivateMemory: -1 | |
hardwareVersion: 24.13 | |
firmwareVersion: 3.5 | |
time: ' ' | |
flags: 40d | |
CKF_RNG | |
CKF_LOGIN_REQUIRED | |
CKF_USER_PIN_INITIALIZED | |
CKF_TOKEN_INITIALIZED | |
Returned: 0 CKR_OK | |
7: C_Login | |
2023-12-01 16:36:43.009 | |
[in] hSession = 0x15b8fa0 | |
[in] userType = CKU_USER | |
[in] pPin[ulPinLen] 00007ffec3a8493a / 6 | |
00000000 30 30 30 30 30 30 000000 | |
Returned: 0 CKR_OK | |
8: C_GetMechanismList | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[out] pMechanismList[34]: | |
Count is 34 | |
Returned: 0 CKR_OK | |
9: C_GetMechanismList | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[out] pMechanismList[34]: | |
CKM_SHA_1 | |
Unknown Mechanism (00000255) | |
CKM_SHA256 | |
CKM_SHA384 | |
CKM_SHA512 | |
CKM_MD5 | |
CKM_RIPEMD160 | |
CKM_GOSTR3411 | |
CKM_ECDSA | |
Unknown Mechanism (00001045) | |
Unknown Mechanism (00001046) | |
CKM_ECDSA_SHA1 | |
Unknown Mechanism (00001043) | |
Unknown Mechanism (00001044) | |
CKM_ECDH1_COFACTOR_DERIVE | |
CKM_ECDH1_DERIVE | |
CKM_EC_KEY_PAIR_GEN | |
CKM_RSA_X_509 | |
CKM_RSA_PKCS | |
CKM_SHA1_RSA_PKCS | |
Unknown Mechanism (00000046) | |
CKM_SHA256_RSA_PKCS | |
CKM_SHA384_RSA_PKCS | |
CKM_SHA512_RSA_PKCS | |
CKM_MD5_RSA_PKCS | |
CKM_RIPEMD160_RSA_PKCS | |
CKM_RSA_PKCS_PSS | |
CKM_SHA1_RSA_PKCS_PSS | |
Unknown Mechanism (00000047) | |
CKM_SHA256_RSA_PKCS_PSS | |
CKM_SHA384_RSA_PKCS_PSS | |
CKM_SHA512_RSA_PKCS_PSS | |
CKM_RSA_PKCS_OAEP | |
CKM_RSA_PKCS_KEY_PAIR_GEN | |
Returned: 0 CKR_OK | |
10: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA_1 [out] pInfo: | |
CKM_SHA_1 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
11: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = 0x00000255[out] pInfo: | |
Unknown Mechanism (00000255) : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
12: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA256 [out] pInfo: | |
CKM_SHA256 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
13: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA384 [out] pInfo: | |
CKM_SHA384 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
14: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA512 [out] pInfo: | |
CKM_SHA512 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
15: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_MD5 [out] pInfo: | |
CKM_MD5 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
16: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_RIPEMD160 [out] pInfo: | |
CKM_RIPEMD160 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
17: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_GOSTR3411 [out] pInfo: | |
CKM_GOSTR3411 : min:0 max:0 flags:0x400 ( Digest ) | |
Returned: 0 CKR_OK | |
18: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_ECDSA [out] pInfo: | |
CKM_ECDSA : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
19: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = 0x00001045[out] pInfo: | |
Unknown Mechanism (00001045) : min:192 max:521 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
20: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = 0x00001046[out] pInfo: | |
Unknown Mechanism (00001046) : min:192 max:521 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
21: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_ECDSA_SHA1 [out] pInfo: | |
CKM_ECDSA_SHA1 : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
22: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = 0x00001043[out] pInfo: | |
Unknown Mechanism (00001043) : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
23: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = 0x00001044[out] pInfo: | |
Unknown Mechanism (00001044) : min:192 max:521 flags:0x1D02801 ( Hardware Sign Verify F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
24: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_ECDH1_COFACTOR_DERIVE [out] pInfo: | |
CKM_ECDH1_COFACTOR_DERIVE : min:192 max:521 flags:0x1D80001 ( Hardware Derive F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
25: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_ECDH1_DERIVE [out] pInfo: | |
CKM_ECDH1_DERIVE : min:192 max:521 flags:0x1D80001 ( Hardware Derive F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
26: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_EC_KEY_PAIR_GEN [out] pInfo: | |
CKM_EC_KEY_PAIR_GEN : min:192 max:521 flags:0x1D10001 ( Hardware KeyPair F(P) EcParams NamedCurve Uncompress ) | |
Returned: 0 CKR_OK | |
27: C_GetMechanismInfo | |
2023-12-01 16:36:43.090 | |
[in] slotID = 0x0 | |
[in] type = CKM_RSA_X_509 [out] pInfo: | |
CKM_RSA_X_509 : min:1024 max:4096 flags:0x2A01 ( Hardware Decrypt Sign Verify ) | |
Returned: 0 CKR_OK | |
28: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_RSA_PKCS [out] pInfo: | |
CKM_RSA_PKCS : min:1024 max:4096 flags:0x2A01 ( Hardware Decrypt Sign Verify ) | |
Returned: 0 CKR_OK | |
29: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA1_RSA_PKCS [out] pInfo: | |
CKM_SHA1_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
30: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = 0x00000046[out] pInfo: | |
Unknown Mechanism (00000046) : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
31: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA256_RSA_PKCS [out] pInfo: | |
CKM_SHA256_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
32: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA384_RSA_PKCS [out] pInfo: | |
CKM_SHA384_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
33: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA512_RSA_PKCS [out] pInfo: | |
CKM_SHA512_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
34: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_MD5_RSA_PKCS [out] pInfo: | |
CKM_MD5_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
35: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_RIPEMD160_RSA_PKCS [out] pInfo: | |
CKM_RIPEMD160_RSA_PKCS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
36: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_RSA_PKCS_PSS [out] pInfo: | |
CKM_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2801 ( Hardware Sign Verify ) | |
Returned: 0 CKR_OK | |
37: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA1_RSA_PKCS_PSS [out] pInfo: | |
CKM_SHA1_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
38: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = 0x00000047[out] pInfo: | |
Unknown Mechanism (00000047) : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
39: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA256_RSA_PKCS_PSS [out] pInfo: | |
CKM_SHA256_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
40: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA384_RSA_PKCS_PSS [out] pInfo: | |
CKM_SHA384_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
41: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_SHA512_RSA_PKCS_PSS [out] pInfo: | |
CKM_SHA512_RSA_PKCS_PSS : min:1024 max:4096 flags:0x2800 ( Sign Verify ) | |
Returned: 0 CKR_OK | |
42: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_RSA_PKCS_OAEP [out] pInfo: | |
CKM_RSA_PKCS_OAEP : min:1024 max:4096 flags:0x201 ( Hardware Decrypt ) | |
Returned: 0 CKR_OK | |
43: C_GetMechanismInfo | |
2023-12-01 16:36:43.091 | |
[in] slotID = 0x0 | |
[in] type = CKM_RSA_PKCS_KEY_PAIR_GEN [out] pInfo: | |
CKM_RSA_PKCS_KEY_PAIR_GEN : min:1024 max:4096 flags:0x10000 ( KeyPair ) | |
Returned: 0 CKR_OK | |
44: C_GenerateKeyPair | |
2023-12-01 16:36:43.091 | |
[in] hSession = 0x15b8fa0 | |
[in] pMechanism->type = CKM_EC_KEY_PAIR_GEN | |
[in] pMechanism->pParameter[ulParameterLen] NULL [size : 0x0 (0)] | |
[in] pPublicKeyTemplate[8]: | |
CKA_CLASS CKO_PUBLIC_KEY | |
CKA_TOKEN True | |
CKA_VERIFY True | |
CKA_DERIVE True | |
CKA_EC_PARAMS 00000000015b9140 / 10 | |
00000000 06 08 2A 86 48 CE 3D 03 01 07 ..*.H.=... | |
CKA_KEY_TYPE CKK_EC | |
CKA_ID 000000000062d140 / 1 | |
00000000 01 . | |
CKA_PRIVATE False | |
[in] pPrivateKeyTemplate[8]: | |
CKA_CLASS CKO_PRIVATE_KEY | |
CKA_TOKEN True | |
CKA_PRIVATE True | |
CKA_SENSITIVE True | |
CKA_SIGN True | |
CKA_DERIVE True | |
CKA_KEY_TYPE CKK_EC | |
CKA_ID 000000000062d140 / 1 | |
00000000 01 . | |
Returned: 5 CKR_GENERAL_ERROR | |
45: C_Finalize | |
2023-12-01 16:36:44.901 | |
Returned: 0 CKR_OK |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment