security/nss/cmd/pk11util/scripts/pcert

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 Load aolkeypk11.dll
     2 C_Initialize NULL
     3 C_GetSlotList false NULL slotCount
     4 NewArray slotList CK_ULONG slotCount
     5 C_GetSlotList false slotList slotCount
     6 #change the following to the appropriate slot id
     7 set slotID 1
     8 #set slotID slotList[0]
     9 C_GetSlotInfo slotID slotInfo
    10 C_GetTokenInfo slotID tokenInfo
    11 C_OpenSession slotID CK_SESSION_SERIAL session
    12 #
    13 #uncomment the following line and include the correct password
    14 #C_Login session CKU_USER 0000 4 
    15 #
    16 # build the search template
    17 #
    18 NewTemplate search CKA_CLASS
    19 SetTemplate search 0 CKO_CERTIFICATE
    20 NewArray certID CK_ULONG 1
    21 C_FindObjectsInit session search 1
    22 C_FindObjects session certID 1 count
    23 C_FindObjectsFinal session
    24 #
    25 # now read the cert out
    26 #
    27 NewTemplate derCert CKA_VALUE
    28 C_GetAttributeValue session certID derCert 1
    29 BuildTemplate derCert
    30 C_GetAttributeValue session certID derCert 1

mercurial