certs & slots list command

user1@ubuntu:~$ sudo pkcs11-tool -O
Using slot 0 with a present token (0x0)
Public Key Object; RSA 2048 bits
  label:      CAC ID Certificate
  ID:         0001
  Usage:      encrypt, verify, verifyRecover
  Access:     none
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0001;object=CAC%20ID%20Certificate;type=public
Certificate Object; type = X.509 cert
  label:      CAC ID Certificate
  subject:    DN: CN=Fake Smart Card CA
  serial:     C741800E
  ID:         0001
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0001;object=CAC%20ID%20Certificate;type=cert
Certificate Object; type = X.509 cert
  label:      CAC Email Signature Certificate
  subject:    DN: CN=Fake Smart Card CA
  serial:     C741800E
  ID:         0002
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0002;object=CAC%20Email%20Signature%20Certificate;type=cert
Public Key Object; RSA 2048 bits
  label:      CAC Email Signature Certificate
  ID:         0002
  Usage:      encrypt, verify, verifyRecover
  Access:     none
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0002;object=CAC%20Email%20Signature%20Certificate;type=public
Public Key Object; RSA 2048 bits
  label:      CAC Email Encryption Certificate
  ID:         0003
  Usage:      encrypt, verify, verifyRecover
  Access:     none
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0003;object=CAC%20Email%20Encryption%20Certificate;type=public
Certificate Object; type = X.509 cert
  label:      CAC Email Encryption Certificate
  subject:    DN: CN=Fake Smart Card CA
  serial:     C741800E
  ID:         0003
  uri:        
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;id=%0003;object=CAC%20Email%20Encryption%20Certificate;type=cert
Profile object 3194130528
  profile_id:          CKP_PUBLIC_CERTIFICATES_TOKEN (4)
Data object 3194128256
  label:          'PKI Certificate'
  application:    'PKI Certificate'
  app_id:         <empty>
  flags:          <empty>
  uri:            
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;object=PKI%20Certificate;type=data
Data object 3194128352
  label:          'PKI Credential'
  application:    'PKI Credential'
  app_id:         <empty>
  flags:          <empty>
  uri:            
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;object=PKI%20Credential;type=data
Data object 3194128448
  label:          'Person Instance'
  application:    'Person Instance'
  app_id:         <empty>
  flags:          <empty>
  uri:            
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;object=Person%20Instance;type=data
Data object 3194128544
  label:          'Personnel'
  application:    'Personnel'
  app_id:         <empty>
  flags:          <empty>
  uri:            
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA;object=Personnel;type=data

user1@ubuntu:~$ sudo pkcs11-tool --list-slots
Available slots:
Slot 0 (0x0): Gemalto Gemplus USB SmartCard Reader 433-Swap [CCID Interface...
  token label        : Fake Smart Card CA
  token manufacturer : Common Access Card
  token model        : PKCS#15 emulated
  token flags        : login required, PIN pad present, rng, token initialized, 
PIN initialized
  hardware version   : 0.0
  firmware version   : 0.0
  serial num         : 000058bd002c19b5
  pin min/max        : 4/8
  uri                : 
pkcs11:model=PKCS%2315%20emulated;manufacturer=Common%20Access%20Card;serial=000058bd002c19b5;token=Fake%20Smart%20Card%20CA

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110521

Title:
  Continue searching other PKCS#11 tokens if certificates are not found

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2110521/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to