pkcs11-tools | manage objects on PKCS # 11 crypotographic tokens | TLS library

 by   Mastercard C Version: v2.5.1 License: Non-SPDX

kandi X-RAY | pkcs11-tools Summary

kandi X-RAY | pkcs11-tools Summary

pkcs11-tools is a C library typically used in Security, TLS applications. pkcs11-tools has no bugs, it has no vulnerabilities and it has low support. However pkcs11-tools has a Non-SPDX License. You can download it from GitHub.

To build the source code, simply execute (with appropriate privileges). To list the methods available on a PKCS#11 token, use p11slotinfo, that will return the list of available mechanisms, together with allowed APIs. To list the objects sitting on the token at slot with index 0, use p11ls. objects are listed together with their attributes;.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              pkcs11-tools has a low active ecosystem.
              It has 92 star(s) with 23 fork(s). There are 14 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 1 open issues and 22 have been closed. On average issues are closed in 52 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of pkcs11-tools is v2.5.1

            kandi-Quality Quality

              pkcs11-tools has 0 bugs and 1 code smells.

            kandi-Security Security

              pkcs11-tools has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              pkcs11-tools code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              pkcs11-tools has a Non-SPDX License.
              Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.

            kandi-Reuse Reuse

              pkcs11-tools releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.
              It has 21 lines of code, 2 functions and 1 files.
              It has low code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of pkcs11-tools
            Get all kandi verified functions for this library.

            pkcs11-tools Key Features

            No Key Features are available at this moment for pkcs11-tools.

            pkcs11-tools Examples and Code Snippets

            PKCS#11 tools,Introduction
            Cdot img1Lines of Code : 152dot img1License : Non-SPDX (NOASSERTION)
            copy iconCopy
            $ ./configure
            $ make install
            
            $ p11slotinfo -l /usr/local/opt/softhsm/lib/softhsm/libsofthsm2.so
            PKCS#11 module slot list:
            Slot index: 0
            ----------------
            Description : SoftHSM slot ID 0x14a93125
            Token Label : first token
            Manufacturer: SoftHSM project  

            Community Discussions

            Trending Discussions on pkcs11-tools

            QUESTION

            Extract names from PIV smartcard
            Asked 2020-Sep-10 at 18:52

            I am trying to extract the following from a PIV Smartcard:

            1. Subject Common Name
            2. Certificate Subject Alt Name / Microsoft Principal Name

            I am using RedHat 6 (eventually 7) and CoolKey as my PKCS11 module.

            I need a way to extract this information via code without requiring the smartcard pin, be it from shell commands or a smartcard library. Currently I can get the Common Name by using the shell command 'pkcs11-tools --module -T' so the Subject Alt Name is truly what I am after, but I would like to find a better way to get the Common Name if available.

            I know this information is available without entering the pin as I can view it all in the included Smartcard Manager on RHEL (esc). I have a certificate chain of root, intermediate, and subordinate if that matters.

            My thoughts are I have to extract the certificate from the card, verify that certificate with my local CAs, and then decrypt it. I have spent days reading documentation on APDUs, smartcards, and openssl and have gotten nowhere.

            edit view of RHEL smart card manager:

            This is what the smart card viewer shows when you open the card and view the details. The Microsoft Principal Name is what I'm looking to extract from the card, as well as the "common name" which is displayed in the Hierarchy portion as well as other spots, shown by the red text.

            I actually have since switched to using pkcs15-tool, as pkcs11-tool cutoff longer common names (you can see this in the title bar of the screenshot, same issue). Output of: 'pkcs15-tool --list-info'

            ...

            ANSWER

            Answered 2020-Sep-10 at 18:52

            I was able to get the common name and UPN/Certificate Alt Name by using Java bouncycastle and the iaik pkcs11 wrapper.

            Source https://stackoverflow.com/questions/63728277

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install pkcs11-tools

            The project can compile on many platforms, including Linux, AIX, Solaris. Using cross-compilers, it is also possible to compile for the Windows platform. Compilation under MacOS requires brew. Please refer to docs/INSTALL.md for installation instructions.

            Support

            If you wish to contribute to this project, please refer to the rules in docs/CONTRIBUTING.md.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/Mastercard/pkcs11-tools.git

          • CLI

            gh repo clone Mastercard/pkcs11-tools

          • sshUrl

            git@github.com:Mastercard/pkcs11-tools.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular TLS Libraries

            mkcert

            by FiloSottile

            v2rayN

            by 2dust

            acme.sh

            by acmesh-official

            nginxconfig.io

            by digitalocean

            v2ray

            by 233boy

            Try Top Libraries by Mastercard

            client-encryption-java

            by MastercardJava

            insomnia-plugin-mastercard

            by MastercardJavaScript

            insomnia-plugin-mastercard-auth

            by MastercardJavaScript

            oauth1-signer-java

            by MastercardJava