Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [remm@omni releases]$ java -Djava.security.debug=sunpkcs11 -jar libs/jsign-3.1/jsign-3.1.jar --keystore ~/.digicertone/pkcs11properties.cfg --storepass NONE --storetype PKCS11 --alias "Tomcat-PMC-key-2021-04" --alg SHA-512 --tsaurl http://timestamp.digicert.com tomcat-9.0.47/output/dist/Uninstall.exe
- SunPKCS11 loading /home/remm/.digicertone/pkcs11properties.cfg
- sunpkcs11: Initializing PKCS#11 library /home/remm/.digicertone/smpkcs11.so
- Information for provider SunPKCS11-DigiCertONE
- Library info:
- cryptokiVersion: 2.21
- manufacturerID: DigiCert
- flags: 0
- libraryDescription: DigiCert PKCS#11
- libraryVersion: 0.01
- All slots: 0
- Slots with tokens: 0
- Slot info for slot 0:
- slotDescription: SecureSigning PKCS#11 Virtual Slot
- manufacturerID: DigiCert
- flags: CKF_TOKEN_PRESENT
- hardwareVersion: 0.00
- firmwareVersion: 0.00
- Token info for token in slot 0:
- label: Virtual PKCS#11 Token
- manufacturerID: DigiCert
- model: DigiCert PKCS#11
- serialNumber: SS0123456789
- flags: CKF_USER_PIN_INITIALIZED | CKF_RESTORE_KEY_NOT_NEEDED | CKF_TOKEN_INITIALIZED
- ulMaxSessionCount: CK_EFFECTIVELY_INFINITE
- ulSessionCount: CK_UNAVAILABLE_INFORMATION
- ulMaxRwSessionCount: CK_EFFECTIVELY_INFINITE
- ulRwSessionCount: CK_UNAVAILABLE_INFORMATION
- ulMaxPinLen: 255
- ulMinPinLen: 4
- ulTotalPublicMemory: CK_UNAVAILABLE_INFORMATION
- ulFreePublicMemory: CK_UNAVAILABLE_INFORMATION
- ulTotalPrivateMemory: CK_UNAVAILABLE_INFORMATION
- ulFreePrivateMemory: CK_UNAVAILABLE_INFORMATION
- hardwareVersion: 0.00
- firmwareVersion: 0.00
- utcTime: ypyP
- Mechanism CKM_EC_KEY_PAIR_GEN:
- ulMinKeySize: 112
- ulMaxKeySize: 521
- flags: 65536 = CKF_GENERATE_KEY_PAIR
- Mechanism CKM_SHA_1:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA512:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA3_224:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA3_512:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA256_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA384_RSA_PKCS_PSS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA3_256:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA512_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA1_RSA_PKCS_PSS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA512_RSA_PKCS_PSS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_ECDSA:
- ulMinKeySize: 112
- ulMaxKeySize: 521
- flags: 26224640 = CKF_SIGN | CKF_VERIFY | CKF_EC_F_P | CKF_EC_UNCOMPRESS
- Mechanism CKM_SHA224:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA384:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA1_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA224_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA224_RSA_PKCS_PSS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_SHA256_RSA_PKCS_PSS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- Mechanism CKM_RSA_PKCS_KEY_PAIR_GEN:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 65536 = CKF_GENERATE_KEY_PAIR
- Mechanism CKM_SHA256:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA3_384:
- ulMinKeySize: 0
- ulMaxKeySize: 0
- flags: 1024 = CKF_DIGEST
- Mechanism CKM_SHA384_RSA_PKCS:
- ulMinKeySize: 1024
- ulMaxKeySize: 16384
- flags: 10240 = CKF_SIGN | CKF_VERIFY
- sunpkcs11: login operation not required for token - ignoring login request
- Adding Authenticode signature to tomcat-9.0.47/output/dist/Uninstall.exe
- jsign: Couldn't sign tomcat-9.0.47/output/dist/Uninstall.exe
- java.security.ProviderException: sun.security.pkcs11.wrapper.PKCS11Exception: CKR_FUNCTION_FAILED
- at jdk.crypto.cryptoki/sun.security.pkcs11.P11Signature.engineSign(P11Signature.java:685)
- at java.base/java.security.Signature$Delegate.engineSign(Signature.java:1404)
- at java.base/java.security.Signature.sign(Signature.java:713)
- at net.jsign.bouncycastle.operator.jcajce.JcaContentSignerBuilder$1.getSignature(Unknown Source)
- at net.jsign.bouncycastle.cms.SignerInfoGenerator.generate(Unknown Source)
- at net.jsign.bouncycastle.cms.CMSSignedDataGenerator.generate(Unknown Source)
- at net.jsign.bouncycastle.cms.CMSSignedDataGenerator.generate(Unknown Source)
- at net.jsign.asn1.authenticode.AuthenticodeSignedDataGenerator.generate(AuthenticodeSignedDataGenerator.java:50)
- at net.jsign.AuthenticodeSigner.createSignedData(AuthenticodeSigner.java:368)
- at net.jsign.AuthenticodeSigner.sign(AuthenticodeSigner.java:339)
- at net.jsign.SignerHelper.sign(SignerHelper.java:424)
- at net.jsign.JsignCLI.execute(JsignCLI.java:111)
- at net.jsign.JsignCLI.main(JsignCLI.java:40)
- Caused by: sun.security.pkcs11.wrapper.PKCS11Exception: CKR_FUNCTION_FAILED
- at jdk.crypto.cryptoki/sun.security.pkcs11.wrapper.PKCS11.C_SignFinal(Native Method)
- at jdk.crypto.cryptoki/sun.security.pkcs11.P11Signature.engineSign(P11Signature.java:635)
- ... 12 more
- Try `java -jar jsign.jar --help' for more information.
Add Comment
Please, Sign In to add comment