read cert from smart card

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



pkcs11-tool run successfully.

mithat at adige:~$ openssl x509 -inform DER -in nescert.der -noout -text
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 65032255735509265 (0xe70a7df60eb111)
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=TR, L=Gebze - Kocaeli, O=T\xC3\xBCrkiye Bilimsel ve
Teknolojik Ara\xC5\x9Ft\xC4\xB1rma Kurumu - T\xC3\x9CB\xC4\xB0TAK,
OU=B\xC4\xB0LGEM, CN=Kamu Elektronik Sertifika Hizmet
Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 - S\xC3\xBCr\xC3\xBCm 5
        Validity
            Not Before: Jun 25 14:01:22 2014 GMT
            Not After : Jun 16 14:44:33 2017 GMT
        Subject: C=TR/serialNumber=62917107586, CN=M\xC4\xB0THAT BOZKURT
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:8b:c2:0c:79:2c:72:ff:63:29:1a:d0:46:36:20:
                    6f:17:db:6e:b2:55:8d:4c:7e:4b:2c:4a:cc:99:5f:
                    53:a0:c2:60:8b:1a:c9:24:bc:97:72:af:bd:56:e9:
                    eb:79:68:7f:dc:45:6b:45:8f:a4:34:f5:fa:f5:2a:
                    40:10:d9:7e:7f:a1:b0:74:ef:6a:a8:e7:9c:0a:e7:
                    f3:21:24:1d:33:30:b3:e6:37:ae:51:8e:b4:bc:b1:
                    43:8e:ce:44:72:a7:c8:ad:be:3a:89:66:97:c1:0b:
                    34:76:f3:2d:88:fc:8c:5f:b3:f2:8e:7e:a0:34:95:
                    29:4f:96:e3:8d:02:26:00:18:8c:ab:c5:a7:80:a3:
                    5a:cd:7a:fa:41:ce:e3:9c:32:34:31:cc:f5:b0:d8:
                    25:54:97:7e:1d:57:68:79:43:48:a9:76:34:ac:09:
                    95:bd:38:99:53:c6:de:78:63:99:ac:4c:42:e5:1f:
                    f8:52:52:08:5e:14:e3:fc:74:d8:d1:a1:69:5e:d4:
                    33:25:92:fa:10:36:5f:d6:bc:2f:0a:61:5d:88:0a:
                    0c:73:6b:c7:18:d7:ca:0f:8b:b2:89:35:37:dd:be:
                    4a:a6:02:95:4a:8d:28:42:2e:4e:00:1a:7a:21:b7:
                    26:22:ef:c5:c6:8f:bc:a0:ea:2c:3e:54:aa:d0:57:
                    b8:05
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Authority Key Identifier:

keyid:BB:75:CF:AC:66:56:08:88:3C:5E:B1:77:5C:25:38:07:6C:C6:EA:C0

            X509v3 Subject Key Identifier:
                F8:24:FF:DB:CE:2B:AD:B7:73:8C:8F:77:82:2D:2F:CA:CC:B7:AD:A4
            X509v3 Key Usage: critical
                Digital Signature, Non Repudiation
            X509v3 Certificate Policies:
                Policy: 2.16.792.1.2.1.1.5.7.1.1
                  CPS: http://www.kamusm.gov.tr/BilgiDeposu/KSM_NES_SUE
                  User Notice:
                    Explicit Text:

            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 CRL Distribution Points:

                Full Name:
                  URI:http://depo.kamusm.gov.tr/nes/NESIL.v5.crl

            Authority Information Access:
                CA Issuers - URI:http://depo.kamusm.gov.tr/nes/neshs.v5.crt
                OCSP - URI:http://ocsp5.kamusm.gov.tr/

            qcStatements:
                0z0......F..0n..`...=...N..._Bu sertifika, 5070
say..l.. Elektronik ..mza Kanununa g..re nitelikli elektronik
sertifikad..r.
    Signature Algorithm: sha256WithRSAEncryption
         b2:48:c4:20:2f:22:11:16:4a:e9:fa:51:9b:4c:5e:b1:a1:05:
         fa:dc:c9:7a:fa:75:bf:f7:06:0f:9b:e7:33:39:06:48:a3:3d:
         fe:92:f5:e1:49:e8:fb:6d:cc:08:1b:64:06:52:f0:95:1e:54:
         cb:db:4c:30:e6:5f:1b:b7:dd:bd:7c:ef:cc:35:f7:d3:10:b3:
         c8:37:8c:22:77:0e:bc:c8:20:15:f8:35:b2:57:d1:1c:89:08:
         dd:2a:63:bc:c8:da:7d:fa:1b:3c:4d:9e:3c:16:95:88:37:fa:
         3f:27:e8:8a:8f:b2:97:a7:82:2f:10:02:ab:64:3f:c1:54:1a:
         d1:c8:76:36:1d:a4:7e:15:b9:7f:ab:bf:bd:74:af:ec:19:4a:
         73:f1:24:4d:06:6f:7a:b5:48:bf:10:65:30:ce:48:42:8f:82:
         af:7e:a2:02:ee:b4:33:60:77:f6:4b:a9:f4:e0:f6:e5:ae:ba:
         4b:4b:ed:a5:7f:1f:45:cd:e2:4c:92:7a:52:16:97:df:66:e1:
         94:b2:57:19:a5:94:de:38:d0:b5:e7:3d:fe:85:c1:ad:90:b0:
         83:b0:9f:4d:de:17:07:52:80:96:11:34:60:e5:f3:17:92:5e:
         33:a1:50:cf:a1:a0:74:58:86:a4:bb:40:a6:81:8a:ba:38:17:
         3b:fd:36:11



2016-02-25 14:00 GMT+02:00 David Woodhouse <dwmw2 at infradead.org>:
> On Thu, 2016-02-25 at 13:39 +0200, Mithat Bozkurt wrote:
>>
>> BTW I am getting e-mail with subject is " Your message to p11-glue
>> awaits moderator approval" from p11-glue.
>
> It might be one of those horrid lists which require you to subscribe
> before you post to it.
>
> Or maybe it just hates you for top-posting. :)
>
>> Do I remove the p11-glue from recipients or remain same?
>
> Let's drop it. I think the interesting part for now is in p11tool
> (which is part of GnuTLS and hence Nikos' problem) rather than p11-kit
> itself.
>
> Try extracting your cert with OpenSC's pkcs11-tool instead:
>
>   pkcs11-tool -module /usr/lib/libakisp11.so -l -a 62917107586NES0 -y cert -r -o nescert.der
>   openssl x509 -inform DER -in nescert.der -noout -text
>
>
> When that doesn't work, install the pkcs11-spy module (which on Fedora
> would be /usr/lib64/pkcs11/pkcs11-spy.so). Then:
>
>  export PKCS11SPY=/usr/lib/libakisp11.so
>
> and repeat the p11tool/pkcs11-tool invocations to extract the cert, but
> using pkcs11-spy.so as the provider instead of (directly) using the
> akis module. Show the full output of those commands.
>
> --
> dwmw2
>



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux