See inline.

On Thu, Aug 20, 2009 at 5:09 PM, Darren J Moffat <Darren.Moffat at 
sun.com>wrote:

> Rishi Renjith wrote:
>
>> Yes, the RSA private keys as well as the certificates are stored in the
>> keystore in the card. See below .
>> /*bash-3.00# certutil -K -d .* certutil: Checking token "NSS Certificate
>> DB" in slot "NSS User Private Key and Certificate Services" Enter Password
>> or Pin for "NSS Certificate DB": certutil: no keys found *bash-3.00#
>> certutil -K -d . -h "Sun Software PKCS#11 softtoken"* certutil: Checking
>> token "Sun Software PKCS#11 softtoken" in slot "Sun Crypto Softtoken" Enter
>> Password or Pin for "Sun Software PKCS#11 softtoken": certutil: no keys
>> found *bash-3.00# certutil -K -d . -h "Sun Metaslot"* certutil: Checking
>> token "Sun Metaslot" in slot "Sun Metaslot" Enter Password or Pin for "Sun
>> Metaslot": < 0> rsa      //204a23dbb2e82d7d8c1495e3374dcd//4462423e4c   Sun
>> Metaslot:cert309 < 1> rsa      //54ea6d93df1cfef13064aedc6f6c7f//0dce34e7b6
>>   Sun Metaslot:cert147 < 2> rsa
>>  //34d4a4974cf325e735dd23bb3a6b46//80249f3550   (orphan) < 3> rsa
>>  //2018eecb4c05eb25cd30be4de6f13c//caeadcb43d   Sun Metaslot:cert1151 < 4>
>> rsa      //61932a2d796fd8f6e82949059176e9//80cde5c55a   sanCert < 5> rsa
>>  //4e752a9b4a76c1462d9aec76de1617//e08d07ff42   Sun Metaslot:ismc_cert  /
>>
>
> what is the output of:
>
> $ cryptoadm list metaslot
>
> Does it look exactly like this:
>
> System-wide Meta Slot Configuration:
> ------------------------------------
> Status: enabled
> Sensitive Token Object Automatic Migrate: enabled
> Persistent object store slot: Sun Crypto Softtoken
> Persistent object store token: Sun Software PKCS#11 softtoken
>
> It shouldn't because I see from an earlier email that you did run
> "cryptoadm enable metaslot token=ks".  Was that run before the application
> was started ?

bash-3.00# cryptoadm list metaslot
System-wide Meta Slot Configuration:
------------------------------------
Status: enabled
Sensitive Token Object Automatic Migrate: disabled
Persistent object store token: ks

Yes this was executed before we started the application.

>
>
> Please also show the output of:
>
> $ pktool list
>
> $ pktool list token=ks objtype=both

bash-3.00# pktool list
bash-3.00# pktool list token=ks objtype=both
Enter pin for ks:
Found 1 keys.
Key #1 - RSA private key:
Found 1 certificates.
1. (X.509 certificate)
        Label: cert309
        ID: b5:b5:ba:b0:d3:cc:8d:ac:99:45:32:8c:70:26:f3:06:a6:dd:64:64
        Subject: C=US, ST=California, L=Santa Clara, O=Sun, OU=Org,
CN=nobody
        Issuer: C=US, ST=California, L=Santa Clara, O=Sun, OU=Org, CN=nobody
        Serial: 0x8E3207E2

>
>
> That assumes your Token name is 'ks'.
>
> $ cryptoadm list -p

 bash-3.00# cryptoadm list -p

User-level providers:
=====================
/usr/lib/security/$ISA/pkcs11_kernel.so: all mechanisms are enabled. random
is e
nabled.
/usr/lib/security/$ISA/pkcs11_softtoken_extra.so: all mechanisms are
enabled. ra
ndom is enabled.

Kernel software providers:
==========================
cryptoadm: failed to retrieve the mechanism list for des.
cryptoadm: failed to retrieve the mechanism list for aes256.
arcfour2048: all mechanisms are enabled.
blowfish448: all mechanisms are enabled.
sha1: all mechanisms are enabled, except
CKM_SHA_1,CKM_SHA_1_HMAC,CKM_SHA_1_HMAC
_GENERAL.
cryptoadm: failed to retrieve the mechanism list for sha2.
md5: all mechanisms are enabled, except
CKM_MD5,CKM_MD5_HMAC,CKM_MD5_HMAC_GENERA
L.
swrand: random is enabled.

Kernel hardware providers:
==========================
mca/0: all mechanisms are enabled. random is enabled.
bash-3.00#

>
>
>
> --
> Darren J Moffat
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/crypto-discuss/attachments/20090820/20821cca/attachment.html>

Reply via email to