PKCS11HSMKeyTool with iKey4000 java exception

Help
Roman
2013-08-26
2013-08-27
  • Roman
    Roman
    2013-08-26

    I'm trying to use iKey4000 through PKCS#11 as a hard token with EJBCA.
    I successfully generated key through PKCS11HSMKeyTool as follows:

    clientToolBox>ejbcaClientToolBox.bat PKCS11HSMKeyTool generate eTPKCS11.dll 2048 testkey 3
    2013-08-26 13:03:18,403 INFO [org.ejbca.util.keystore.KeyTools] Using SUN PKCS11 provider: sun.security.pkcs11.SunPKCS11
    PKCS11 Token [SunPKCS11-eTPKCS11.dll-slot3] Password:
    Created certificate with entry testkey.

    But when I want to test it the following exception occurs:

    ejbcaClientToolBox.bat PKCS11HSMKeyTool test eTPKCS11.dll 3
    Test of keystore with ID 3.
    2013-08-26 13:06:21,635 INFO [org.ejbca.util.keystore.KeyTools] Using SUN PKCS1
    1 provider: sun.security.pkcs11.SunPKCS11
    PKCS11 Token [SunPKCS11-eTPKCS11.dll-slot3] Password:
    ←[1;4mTesting of key: testkey←[0m
    Private part:
    SunPKCS11-eTPKCS11.dll-slot3 RSA private key, 2048 bits (id 159711236, token obj
    ect, sensitive, unextractable)
    RSA key:
    modulus: d883fd5374e4c3a78101138690fef262c08a0552c0bbe6df54a4543d4e227f0c95337
    06adda01f2a4d5aa41d8377ff247c7d80b4d7e00119aa3c8573e6ed578937dd481021d8ae7c99e85
    d3bf741bacf2b4c9440d292a89a72461b23f574044e39382c523bd3d3a102495d58057d2edfb33a3
    7a94b15415beaa807fa71d2ee01d0d928113d9f3a8ada1ee4027c9880068f1f87af3c161b56422b8
    23cd1de27662401a0fe698292dd334dbe70fb6168c231b168f34e74672fe9b828a9ff1ae62f36a23
    919e2327427dd7c7b5e1c626318326eeef390fe4bfdf94a07246ff13a51603474fd61b13d99049ae
    6ef533a157ce601d9aacaeabd50a6448079ac0c5a87
    public exponent: 10001
    javax.crypto.BadPaddingException: doFinal() failed
    at sun.security.pkcs11.P11RSACipher.implDoFinal(P11RSACipher.java:362)
    at sun.security.pkcs11.P11RSACipher.engineDoFinal(P11RSACipher.java:387)
    at javax.crypto.Cipher.doFinal(Cipher.java:2087)
    at org.ejbca.ui.cli.KeyStoreContainerTest$Crypto.doOperation(KeyStoreCon
    tainerTest.java:205)
    at org.ejbca.ui.cli.KeyStoreContainerTest$NormalTest.test(KeyStoreContai
    nerTest.java:354)
    at org.ejbca.ui.cli.KeyStoreContainerTest$NormalTest.doIt(KeyStoreContai
    nerTest.java:371)
    at org.ejbca.ui.cli.KeyStoreContainerTest.startNormal(KeyStoreContainerT
    est.java:118)
    at org.ejbca.ui.cli.KeyStoreContainerTest.test(KeyStoreContainerTest.jav
    a:64)
    at org.ejbca.ui.cli.HSMKeyTool.doIt(HSMKeyTool.java:249)
    at org.ejbca.ui.cli.HSMKeyTool.execute(HSMKeyTool.java:290)
    at org.ejbca.ui.cli.PKCS11HSMKeyTool.execute(PKCS11HSMKeyTool.java:47)
    at org.ejbca.ui.cli.ClientToolBox.executeIfSelected(ClientToolBox.java:4
    0)
    at org.ejbca.ui.cli.ClientToolBox.main(ClientToolBox.java:70)
    Caused by: sun.security.pkcs11.wrapper.PKCS11Exception: CKR_FUNCTION_FAILED
    at sun.security.pkcs11.wrapper.PKCS11.C_Decrypt(Native Method)
    at sun.security.pkcs11.P11RSACipher.implDoFinal(P11RSACipher.java:340)
    ... 12 more
    Signature test of key testkey: signature length 256; first byte 60; verifying tr
    ue
    Signings per second: 1
    Crypto not possible with this key. See exception

    What does it mean?

     
  • Roman
    Roman
    2013-08-27

    I also tried to use IAIK provider with testing the key, but unsuccessfully.
    There is different exception when using IAIK provider, following:

    ejbcaClientToolBox.bat PKCS11HSMKeyTool test eTPKCS11.dll 3
    Test of keystore with ID 3.
    Testing of key: keytesting
    java.lang.UnsupportedOperationException: Private Exponent value is sensitive.
    at iaik.pkcs.pkcs11.provider.keys.IAIKPKCS11RsaPrivateKey.getPrivateExponent(Unknown Source)
    at org.ejbca.util.keystore.KeyTools.isPrivateKeyExtractable(KeyTools.java:1069)
    at org.ejbca.ui.cli.KeyStoreContainerTest$NormalTest.doIt(KeyStoreContainerTest.java:374)
    at org.ejbca.ui.cli.KeyStoreContainerTest.startNormal(KeyStoreContainerTest.java:124)
    at org.ejbca.ui.cli.KeyStoreContainerTest.test(KeyStoreContainerTest.java:68)
    at org.ejbca.ui.cli.HSMKeyTool.doIt(HSMKeyTool.java:249)
    at org.ejbca.ui.cli.HSMKeyTool.execute(HSMKeyTool.java:290)
    at org.ejbca.ui.cli.PKCS11HSMKeyTool.execute(PKCS11HSMKeyTool.java:47)
    at org.ejbca.ui.cli.ClientToolBox.executeIfSelected(ClientToolBox.java:45)
    at org.ejbca.ui.cli.ClientToolBox.main(ClientToolBox.java:79)

    How to solve this problems?
    Of course that the private exponent is sensitive and can't be exported, it's the reason why we are storing it securely.

    It can't be done through SunPKCS11 nor IAIKPKCS11...
    Is there someone who can help me with that?

     
  • What version of EJBCA are you using? Can you please try with the latest version. Otherwise we will not be able to look at the code with the line numbers given in the message you get.

    We know nothing about IAIK, so I can not comment in that. The PKCS#11 command above looks like something strangely implemented in the PCKS#11, an operations fails.

    You can always use p11spy to see whih PKCS#11 commands are actually used and try do debug iKeys PKCS#11 library (I assume you use the latest version there?).

    Otherwise, I have never tried using an iKey as an HSM. The commands works nicely with all HSMs we've trown at EJBCA.

    Cheers,
    Tomas


     
  • Roman
    Roman
    2013-08-27

    I'm using the latest free version of EJBCA (4.0.16).
    For iKey4000 I'm using the latest PKSC#11 library from Safenet (named eTPKCS11.dll on Windows platform).

    I googled that the exception through IAIK PKCS#11 provider is a bug in IAIK implementation but SunPKCS11 should be working.

    I don't know about p11spy. It looks like I need to use it to see what is happening to be able to solve the exception.

    Please let me know if you find out what is the reason of this exception.
    Thank you.

     
  • Roman
    Roman
    2013-08-27

    I configured PKCS11-SPY to use the eTPKCS11.dll module and tried to test PKCS11HSMKeyTool again but there is another exception...this time it is not able to construct PKCS11 provider:

    ejbcaClientToolBox.bat PKCS11HSMKeyTool test pkcs11-spy.dll 3
    Test of keystore with ID 3.
    2013-08-27 14:07:44,303 ERROR [org.ejbca.util.keystore.KeyTools] Error constructing pkcs11 provider: sun.security.pkcs11.SunPKCS11
    java.io.IOException: Error constructing pkcs11 provider: sun.security.pkcs11.SunPKCS11
    at org.ejbca.util.keystore.KeyTools.getP11Provider(KeyTools.java:908)
    at org.ejbca.util.keystore.KeyTools.getP11Provider(KeyTools.java:864)
    at org.ejbca.util.keystore.KeyStoreContainerP11.getInstance(KeyStoreContainerP11.java:51)
    at org.ejbca.util.keystore.KeyStoreContainerFactory.getInstance(KeyStoreContainerFactory.java:55)
    at org.ejbca.ui.cli.KeyStoreContainerTest.getKeyStore(KeyStoreContainerTest.java:154)
    at org.ejbca.ui.cli.KeyStoreContainerTest.startNormal(KeyStoreContainerTest.java:109)
    at org.ejbca.ui.cli.KeyStoreContainerTest.test(KeyStoreContainerTest.java:64)
    at org.ejbca.ui.cli.HSMKeyTool.doIt(HSMKeyTool.java:249)
    at org.ejbca.ui.cli.HSMKeyTool.execute(HSMKeyTool.java:290)
    at org.ejbca.ui.cli.PKCS11HSMKeyTool.execute(PKCS11HSMKeyTool.java:47)
    at org.ejbca.ui.cli.ClientToolBox.executeIfSelected(ClientToolBox.java:40)
    at org.ejbca.ui.cli.ClientToolBox.main(ClientToolBox.java:70)
    Caused by: java.lang.ClassNotFoundException: sun.security.pkcs11.SunPKCS11
    at java.net.URLClassLoader$1.run(Unknown Source)
    at java.net.URLClassLoader$1.run(Unknown Source)
    at java.security.AccessController.doPrivileged(Native Method)
    at java.net.URLClassLoader.findClass(Unknown Source)
    at java.lang.ClassLoader.loadClass(Unknown Source)
    at sun.misc.Launcher$AppClassLoader.loadClass(Unknown Source)
    at java.lang.ClassLoader.loadClass(Unknown Source)
    at java.lang.Class.forName0(Native Method)
    at java.lang.Class.forName(Unknown Source)
    at org.ejbca.util.keystore.KeyTools.getP11Provider(KeyTools.java:903)
    ... 11 more
    Not possible to load keys. Maybe a smart card should be inserted or maybe you just typed the wrong PIN. Press enter when the problem is fixed.

    I also tried the simple test to see if the PKCS11-SPY is working correctly and it works:

    pkcs11-tool --module pkcs11-spy.dll --list-slots

     
  • Roman
    Roman
    2013-08-27

    I use java IDE to get the log from PKCS11-SPY and I'm sending here the log. I'm not wiser from that log...do you see there anything that could be the cause why I receive CKR_FUNCTION_FAILED?

    ** OpenSC PKCS#11 spy ****
    Loaded: "C:\Windows\System32\eTPKCS11.dll"

    0: C_GetFunctionList
    2013-08-27 14:33:53.215
    Returned: 0 CKR_OK

    1: C_Initialize
    2013-08-27 14:33:53.215
    [in] pInitArgs = 19131F50
    flags: 2
    CKF_OS_LOCKING_OK
    Returned: 0 CKR_OK

    2: C_GetInfo
    2013-08-27 14:33:53.231
    [out] pInfo:
    cryptokiVersion: 2.20
    manufacturerID: 'SafeNet, Inc. '
    flags: 0
    libraryDescription: 'SafeNet eToken PKCS#11 '
    libraryVersion: 8.2
    Returned: 0 CKR_OK

    3: C_GetSlotInfo
    2013-08-27 14:33:53.247
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    4: C_GetTokenInfo
    2013-08-27 14:33:53.247
    [in] slotID = 0x3
    [out] pInfo:
    label: ' '
    manufacturerID: '©SafeNet, Inc. '
    model: 'Model 400 '
    serialNumber: '91298325 '
    ulMaxSessionCount: 0
    ulSessionCount: 0
    ulMaxRwSessionCount: 0
    ulRwSessionCount: 0
    ulMaxPinLen: 16
    ulMinPinLen: 6
    ulTotalPublicMemory: 73728
    ulFreePublicMemory: 48148
    ulTotalPrivateMemory: 73728
    ulFreePrivateMemory: 48148
    hardwareVersion: 0.8
    firmwareVersion: 0.8
    time: ' '
    flags: 60d
    CKF_RNG
    CKF_LOGIN_REQUIRED
    CKF_USER_PIN_INITIALIZED
    CKF_DUAL_CRYPTO_OPERATIONS
    CKF_TOKEN_INITIALIZED
    Returned: 0 CKR_OK

    5: C_OpenSession
    2013-08-27 14:33:53.262
    [in] slotID = 0x3
    [in] flags = 0x6
    pApplication=00000000
    Notify=00000000
    [out] *phSession = 0x2f60003
    Returned: 0 CKR_OK

    6: C_GetSlotInfo
    2013-08-27 14:33:53.262
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    7: C_GetSessionInfo
    2013-08-27 14:33:53.262
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_PUBLIC_SESSION'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    8: C_GetMechanismList
    2013-08-27 14:33:53.262
    [in] slotID = 0x3
    [out] pMechanismList[54]:
    Count is 54
    Returned: 0 CKR_OK

    9: C_GetMechanismList
    2013-08-27 14:33:53.262
    [in] slotID = 0x3
    [out] pMechanismList[54]:
    CKM_DES_MAC
    CKM_DES_MAC_GENERAL
    CKM_DES3_MAC
    CKM_DES3_MAC_GENERAL
    CKM_AES_MAC
    CKM_AES_MAC_GENERAL
    CKM_RC4
    CKM_DES_ECB
    CKM_DES_CBC
    CKM_DES_CBC_PAD
    CKM_DES3_ECB
    CKM_DES3_CBC
    CKM_DES3_CBC_PAD
    CKM_AES_ECB
    CKM_AES_CBC
    CKM_AES_CBC_PAD
    Unknown Mechanism (00001086)
    Unknown Mechanism (00001088)
    CKM_RSA_PKCS_KEY_PAIR_GEN
    CKM_RSA_PKCS
    CKM_MD5_RSA_PKCS
    CKM_SHA1_RSA_PKCS
    CKM_SHA256_RSA_PKCS
    CKM_SHA384_RSA_PKCS
    CKM_SHA512_RSA_PKCS
    CKM_RC4_KEY_GEN
    CKM_DES_KEY_GEN
    CKM_DES2_KEY_GEN
    CKM_DES3_KEY_GEN
    CKM_AES_KEY_GEN
    CKM_PBE_SHA1_RC4_128
    CKM_PBE_SHA1_RC4_40
    CKM_PBE_SHA1_DES3_EDE_CBC
    CKM_PBE_SHA1_DES2_EDE_CBC
    CKM_GENERIC_SECRET_KEY_GEN
    CKM_PBA_SHA1_WITH_SHA1_HMAC
    CKM_PBE_MD5_DES_CBC
    CKM_PKCS5_PBKD2
    CKM_MD5_HMAC_GENERAL
    CKM_MD5_HMAC
    CKM_SHA_1_HMAC_GENERAL
    CKM_SHA_1_HMAC
    CKM_SHA256_HMAC_GENERAL
    CKM_SHA256_HMAC
    CKM_SHA384_HMAC_GENERAL
    CKM_SHA384_HMAC
    CKM_SHA512_HMAC_GENERAL
    CKM_SHA512_HMAC
    CKM_MD5
    CKM_SHA_1
    CKM_SHA256
    CKM_SHA384
    CKM_SHA512
    Unknown Mechanism (80006001)
    Returned: 0 CKR_OK

    10: C_GetSessionInfo
    2013-08-27 14:33:53.278
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_PUBLIC_SESSION'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    11: C_Login
    2013-08-27 14:33:53.278
    [in] hSession = 0x2f60003
    [in] userType = CKU_USER
    [in] pPin[ulPinLen] 1913c7f0 / 8
    00000000 69 4B 65 7A 34 30 30 30 iKez4000
    Returned: 0 CKR_OK

    12: C_GetSlotInfo
    2013-08-27 14:33:55.384
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    13: C_GetSessionInfo
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    14: C_FindObjectsInit
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_PRIVATE_KEY
    Returned: 0 CKR_OK

    15: C_FindObjects
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x1
    Object 0x9850004 matches
    Returned: 0 CKR_OK

    16: C_FindObjects
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    17: C_FindObjectsFinal
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    18: C_GetAttributeValue
    2013-08-27 14:33:55.384
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_ID 00000000 / 0
    [out] pTemplate[1]:
    CKA_ID 00000000 / 20
    Returned: 0 CKR_OK

    19: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_ID 19132150 / 20
    [out] pTemplate[1]:
    CKA_ID 19132150 / 20
    00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    00000010 00 00 00 01 ....
    Returned: 0 CKR_OK

    20: C_GetSlotInfo
    2013-08-27 14:33:57.910
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    21: C_GetSessionInfo
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    22: C_FindObjectsInit
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_CERTIFICATE
    Returned: 0 CKR_OK

    23: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x1
    Object 0x2970005 matches
    Returned: 0 CKR_OK

    24: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    25: C_FindObjectsFinal
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    26: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_LABEL 00000000 / 0
    [out] pTemplate[1]:
    CKA_LABEL 00000000 / 10
    Returned: 0 CKR_OK

    27: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_LABEL 1913d868 / 10
    [out] pTemplate[1]:
    CKA_LABEL 1913d868 / 10
    6B657974 65737469 6E67
    k e y t e s t i n g
    Returned: 0 CKR_OK

    28: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_ID 00000000 / 0
    [out] pTemplate[1]:
    CKA_ID 00000000 / 20
    Returned: 0 CKR_OK

    29: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_ID 19132150 / 20
    [out] pTemplate[1]:
    CKA_ID 19132150 / 20
    00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    00000010 00 00 00 01 ....
    Returned: 0 CKR_OK

    30: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_VALUE 00000000 / 0
    [out] pTemplate[1]:
    CKA_VALUE 00000000 / 740
    Returned: 0 CKR_OK

    31: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_VALUE 1913c9d8 / 740
    [out] pTemplate[1]:
    CKA_VALUE 1913c9d8 / 740
    00000000 30 82 02 E0 30 82 01 C8 A0 03 02 01 02 02 06 01 0...0...........
    00000010 40 B9 29 D7 73 30 0D 06 09 2A 86 48 86 F7 0D 01 @.).s0....H....
    00000020 01 05 05 00 30 31 31 0B 30 09 06 03 55 04 06 13 ....011.0...U...
    00000030 02 55 53 31 0F 30 0D 06 03 55 04 07 13 06 61 72 .US1.0...U....ar
    00000040 6F 75 6E 64 31 11 30 0F 06 03 55 04 03 13 08 73 ound1.0...U....s
    00000050 6F 6D 65 20 67 75 79 30 1E 17 0D 31 33 30 38 32 ome guy0...13082
    00000060 36 30 35 34 37 34 31 5A 17 0D 34 33 30 38 32 30 6054741Z..430820
    00000070 30 35 34 37 34 31 5A 30 31 31 0B 30 09 06 03 55 054741Z011.0...U
    00000080 04 06 13 02 55 53 31 0F 30 0D 06 03 55 04 07 13 ....US1.0...U...
    00000090 06 61 72 6F 75 6E 64 31 11 30 0F 06 03 55 04 03 .around1.0...U..
    000000A0 13 08 73 6F 6D 65 20 67 75 79 30 82 01 22 30 0D ..some guy0.."0.
    000000B0 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 ..
    .H...........
    000000C0 0F 00 30 82 01 0A 02 82 01 01 00 C5 DC C4 E7 79 ..0............y
    000000D0 73 1C 6E 15 1E 0C F6 1D 10 60 20 24 A3 1B 96 39 s.n......$...9 000000E0 30 1E DD CF D6 A5 A2 63 4A B7 A0 E3 A2 67 40 04 0......cJ....g@. 000000F0 00 49 91 B5 9D 4A CD 40 E4 78 A0 89 91 0F 4E 76 .I...J.@.x....Nv 00000100 21 7B BA 4D 6D AE B9 FF 9D 52 81 8F C9 16 C0 CB !{.Mm....R...... 00000110 C6 A0 B6 3B 90 73 C4 6C 0F BD 9B 9A BC 8F 38 E6 ...;.s.l......8. 00000120 51 DE ED 07 86 13 D0 90 B9 4F 8D 9D 5F 5C 32 05 Q........O.._\2. 00000130 6E FA D7 C5 F3 5F 5E 68 7A C7 8E 09 F9 90 E2 93 n...._^hz....... 00000140 65 37 8B EC F0 73 C9 FB EA BB 6C DC 0C CE 27 CB e7...s....l...'. 00000150 04 87 D2 60 56 0B 48 B5 44 AE 65 F7 E9 69 93 CF ...V.H.D.e..i..
    00000160 4F 0D 9D FB 3E 6B 4B 14 20 25 A1 53 4A 0B D0 5B O...>kK. %.SJ..Q).t. 00000200 F9 9D 3A 9E 19 3D B1 05 8B 60 9D 74 2B 19 97 D9 ..:..=...`.t+... 00000210 E9 4D A1 68 83 72 A5 FE 75 1B B2 63 6A C9 23 41 .M.h.r..u..cj.#A 00000220 4D CD AC 3C 00 5A 1D 18 FA 8F FF 6B E3 27 D1 B6 M..<.Z.....k.'.. 00000230 ED EC 77 BD 94 71 FD D3 B1 E8 B0 26 74 85 9B 67 ..w..q.....&t..g 00000240 5D AB 63 BB AF 54 25 13 BD 12 2C D6 B4 1C 00 B9">
    00000170 4E 17 C7 27 BF EA EC 90 C5 E5 67 6C 30 50 A5 9C N..'......gl0P..
    00000180 3A 6B AE EC AC 81 6A 95 E1 A4 E6 EA 8B 1B B1 74 :k....j........t
    00000190 4F D7 56 54 F1 A2 BB F1 C0 EF 06 AC 3D 28 A7 26 O.VT........=(.&
    000001A0 EE CC 67 4D 72 7C 62 E4 3B 47 B6 6D CD 36 91 A3 ..gMr|b.;G.m.6..
    000001B0 E7 09 57 1A 97 02 9A 06 2A C1 05 20 63 58 07 0F ..W....... cX..
    000001C0 EF B9 C1 87 51 05 F7 BF A2 E7 D9 02 03 01 00 01 ....Q...........
    000001D0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 0...
    .H.........
    000001E0 82 01 01 00 50 47 73 C1 FD 7A D3 3F AE 99 40 12 ....PGs..z.?..@.
    000001F0 2B A8 8F FA BE 6A 47 97 C0 4D 3E 51 29 18 74 C4 +....jG..M>Q).t.
    00000200 F9 9D 3A 9E 19 3D B1 05 8B 60 9D 74 2B 19 97 D9 ..:..=...`.t+...
    00000210 E9 4D A1 68 83 72 A5 FE 75 1B B2 63 6A C9 23 41 .M.h.r..u..cj.#A
    00000220 4D CD AC 3C 00 5A 1D 18 FA 8F FF 6B E3 27 D1 B6 M..<.Z.....k.'..
    00000230 ED EC 77 BD 94 71 FD D3 B1 E8 B0 26 74 85 9B 67 ..w..q.....&t..g
    00000240 5D AB 63 BB AF 54 25 13 BD 12 2C D6 B4 1C 00 B9
    .c..T%...,.....
    00000250 7C E9 C3 D8 F0 16 AF C0 ED 81 72 D7 31 E2 0A C3 |.........r.1...
    00000260 6A 45 36 85 E3 5C 27 9B 85 80 D2 E6 B1 89 ED E6 jE6..\'.........
    00000270 9E C8 C1 51 FA E0 6F 16 D2 A8 C4 B9 B7 E8 40 58 ...Q..o.......@X
    00000280 BE 78 33 3A F8 19 71 5B 14 78 14 B8 81 F3 92 C6 .x3:..q[.x......
    00000290 7B 1E EF 4F 8D E3 17 8A BE 7E 80 EE 12 09 A7 7B {..O.....~.....{
    000002A0 3A 1B 5C 99 19 87 36 28 34 89 93 14 5A 6A 52 C5 :....6(4...ZjR.
    000002B0 47 82 7E 84 5F 20 01 DD 25 2E C6 68 43 33 40 83 G.~._ ..%..hC3@.
    000002C0 E8 26 A5 09 DB 91 34 A7 C2 A8 4B F5 8D 89 4F 18 .&....4...K...O.
    000002D0 82 2E 85 8B 1B C1 A1 A8 B2 9A B0 D4 14 2D 6D AC .............-m.
    000002E0 A9 40 1D A7 .@..
    Returned: 0 CKR_OK

    32: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_TRUSTED 00000000 / 0
    [out] pTemplate[1]:
    CKA_TRUSTED 00000000 / 1
    Returned: 0 CKR_OK

    33: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_TRUSTED 1913c820 / 1
    [out] pTemplate[1]:
    CKA_TRUSTED 1913c820 / 1
    00000000 00 .
    Returned: 0 CKR_OK

    34: C_FindObjectsInit
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_SECRET_KEY
    Returned: 0 CKR_OK

    35: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    36: C_FindObjectsFinal
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    37: C_OpenSession
    2013-08-27 14:33:57.910
    [in] slotID = 0x3
    [in] flags = 0x6
    pApplication=00000000
    Notify=00000000
    [out] *phSession = 0xe150006
    Returned: 0 CKR_OK

    38: C_GetSessionInfo
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    39: C_FindObjectsInit
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_PRIVATE_KEY
    Returned: 0 CKR_OK

    40: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x1
    Object 0x9850004 matches
    Returned: 0 CKR_OK

    41: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    42: C_FindObjectsFinal
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    43: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_ID 00000000 / 0
    [out] pTemplate[1]:
    CKA_ID 00000000 / 20
    Returned: 0 CKR_OK

    44: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_ID 191320d0 / 20
    [out] pTemplate[1]:
    CKA_ID 191320d0 / 20
    00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    00000010 00 00 00 01 ....
    Returned: 0 CKR_OK

    45: C_FindObjectsInit
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_CERTIFICATE
    Returned: 0 CKR_OK

    46: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x1
    Object 0x2970005 matches
    Returned: 0 CKR_OK

    47: C_FindObjects
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    48: C_FindObjectsFinal
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    49: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_LABEL 00000000 / 0
    [out] pTemplate[1]:
    CKA_LABEL 00000000 / 10
    Returned: 0 CKR_OK

    50: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_LABEL 1913d880 / 10
    [out] pTemplate[1]:
    CKA_LABEL 1913d880 / 10
    6B657974 65737469 6E67
    k e y t e s t i n g
    Returned: 0 CKR_OK

    51: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_ID 00000000 / 0
    [out] pTemplate[1]:
    CKA_ID 00000000 / 20
    Returned: 0 CKR_OK

    52: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_ID 191320d0 / 20
    [out] pTemplate[1]:
    CKA_ID 191320d0 / 20
    00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    00000010 00 00 00 01 ....
    Returned: 0 CKR_OK

    53: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_VALUE 00000000 / 0
    [out] pTemplate[1]:
    CKA_VALUE 00000000 / 740
    Returned: 0 CKR_OK

    54: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_VALUE 1913c9d8 / 740
    [out] pTemplate[1]:
    CKA_VALUE 1913c9d8 / 740
    00000000 30 82 02 E0 30 82 01 C8 A0 03 02 01 02 02 06 01 0...0...........
    00000010 40 B9 29 D7 73 30 0D 06 09 2A 86 48 86 F7 0D 01 @.).s0....H....
    00000020 01 05 05 00 30 31 31 0B 30 09 06 03 55 04 06 13 ....011.0...U...
    00000030 02 55 53 31 0F 30 0D 06 03 55 04 07 13 06 61 72 .US1.0...U....ar
    00000040 6F 75 6E 64 31 11 30 0F 06 03 55 04 03 13 08 73 ound1.0...U....s
    00000050 6F 6D 65 20 67 75 79 30 1E 17 0D 31 33 30 38 32 ome guy0...13082
    00000060 36 30 35 34 37 34 31 5A 17 0D 34 33 30 38 32 30 6054741Z..430820
    00000070 30 35 34 37 34 31 5A 30 31 31 0B 30 09 06 03 55 054741Z011.0...U
    00000080 04 06 13 02 55 53 31 0F 30 0D 06 03 55 04 07 13 ....US1.0...U...
    00000090 06 61 72 6F 75 6E 64 31 11 30 0F 06 03 55 04 03 .around1.0...U..
    000000A0 13 08 73 6F 6D 65 20 67 75 79 30 82 01 22 30 0D ..some guy0.."0.
    000000B0 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 ..
    .H...........
    000000C0 0F 00 30 82 01 0A 02 82 01 01 00 C5 DC C4 E7 79 ..0............y
    000000D0 73 1C 6E 15 1E 0C F6 1D 10 60 20 24 A3 1B 96 39 s.n......$...9 000000E0 30 1E DD CF D6 A5 A2 63 4A B7 A0 E3 A2 67 40 04 0......cJ....g@. 000000F0 00 49 91 B5 9D 4A CD 40 E4 78 A0 89 91 0F 4E 76 .I...J.@.x....Nv 00000100 21 7B BA 4D 6D AE B9 FF 9D 52 81 8F C9 16 C0 CB !{.Mm....R...... 00000110 C6 A0 B6 3B 90 73 C4 6C 0F BD 9B 9A BC 8F 38 E6 ...;.s.l......8. 00000120 51 DE ED 07 86 13 D0 90 B9 4F 8D 9D 5F 5C 32 05 Q........O.._\2. 00000130 6E FA D7 C5 F3 5F 5E 68 7A C7 8E 09 F9 90 E2 93 n...._^hz....... 00000140 65 37 8B EC F0 73 C9 FB EA BB 6C DC 0C CE 27 CB e7...s....l...'. 00000150 04 87 D2 60 56 0B 48 B5 44 AE 65 F7 E9 69 93 CF ...V.H.D.e..i..
    00000160 4F 0D 9D FB 3E 6B 4B 14 20 25 A1 53 4A 0B D0 5B O...>kK. %.SJ..Q).t. 00000200 F9 9D 3A 9E 19 3D B1 05 8B 60 9D 74 2B 19 97 D9 ..:..=...`.t+... 00000210 E9 4D A1 68 83 72 A5 FE 75 1B B2 63 6A C9 23 41 .M.h.r..u..cj.#A 00000220 4D CD AC 3C 00 5A 1D 18 FA 8F FF 6B E3 27 D1 B6 M..<.Z.....k.'.. 00000230 ED EC 77 BD 94 71 FD D3 B1 E8 B0 26 74 85 9B 67 ..w..q.....&t..g 00000240 5D AB 63 BB AF 54 25 13 BD 12 2C D6 B4 1C 00 B9">
    00000170 4E 17 C7 27 BF EA EC 90 C5 E5 67 6C 30 50 A5 9C N..'......gl0P..
    00000180 3A 6B AE EC AC 81 6A 95 E1 A4 E6 EA 8B 1B B1 74 :k....j........t
    00000190 4F D7 56 54 F1 A2 BB F1 C0 EF 06 AC 3D 28 A7 26 O.VT........=(.&
    000001A0 EE CC 67 4D 72 7C 62 E4 3B 47 B6 6D CD 36 91 A3 ..gMr|b.;G.m.6..
    000001B0 E7 09 57 1A 97 02 9A 06 2A C1 05 20 63 58 07 0F ..W....... cX..
    000001C0 EF B9 C1 87 51 05 F7 BF A2 E7 D9 02 03 01 00 01 ....Q...........
    000001D0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 0...
    .H.........
    000001E0 82 01 01 00 50 47 73 C1 FD 7A D3 3F AE 99 40 12 ....PGs..z.?..@.
    000001F0 2B A8 8F FA BE 6A 47 97 C0 4D 3E 51 29 18 74 C4 +....jG..M>Q).t.
    00000200 F9 9D 3A 9E 19 3D B1 05 8B 60 9D 74 2B 19 97 D9 ..:..=...`.t+...
    00000210 E9 4D A1 68 83 72 A5 FE 75 1B B2 63 6A C9 23 41 .M.h.r..u..cj.#A
    00000220 4D CD AC 3C 00 5A 1D 18 FA 8F FF 6B E3 27 D1 B6 M..<.Z.....k.'..
    00000230 ED EC 77 BD 94 71 FD D3 B1 E8 B0 26 74 85 9B 67 ..w..q.....&t..g
    00000240 5D AB 63 BB AF 54 25 13 BD 12 2C D6 B4 1C 00 B9
    .c..T%...,.....
    00000250 7C E9 C3 D8 F0 16 AF C0 ED 81 72 D7 31 E2 0A C3 |.........r.1...
    00000260 6A 45 36 85 E3 5C 27 9B 85 80 D2 E6 B1 89 ED E6 jE6..\'.........
    00000270 9E C8 C1 51 FA E0 6F 16 D2 A8 C4 B9 B7 E8 40 58 ...Q..o.......@X
    00000280 BE 78 33 3A F8 19 71 5B 14 78 14 B8 81 F3 92 C6 .x3:..q[.x......
    00000290 7B 1E EF 4F 8D E3 17 8A BE 7E 80 EE 12 09 A7 7B {..O.....~.....{
    000002A0 3A 1B 5C 99 19 87 36 28 34 89 93 14 5A 6A 52 C5 :....6(4...ZjR.
    000002B0 47 82 7E 84 5F 20 01 DD 25 2E C6 68 43 33 40 83 G.~._ ..%..hC3@.
    000002C0 E8 26 A5 09 DB 91 34 A7 C2 A8 4B F5 8D 89 4F 18 .&....4...K...O.
    000002D0 82 2E 85 8B 1B C1 A1 A8 B2 9A B0 D4 14 2D 6D AC .............-m.
    000002E0 A9 40 1D A7 .@..
    Returned: 0 CKR_OK

    55: C_GetAttributeValue
    2013-08-27 14:33:57.910
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_TRUSTED 00000000 / 0
    [out] pTemplate[1]:
    CKA_TRUSTED 00000000 / 1
    Returned: 0 CKR_OK

    56: C_GetAttributeValue
    2013-08-27 14:33:57.926
    [in] hSession = 0x2f60003
    [in] hObject = 0x2970005
    [in] pTemplate[1]:
    CKA_TRUSTED 1913c850 / 1
    [out] pTemplate[1]:
    CKA_TRUSTED 1913c850 / 1
    00000000 00 .
    Returned: 0 CKR_OK

    57: C_FindObjectsInit
    2013-08-27 14:33:57.926
    [in] hSession = 0x2f60003
    [in] pTemplate[2]:
    CKA_TOKEN True
    CKA_CLASS CKO_SECRET_KEY
    Returned: 0 CKR_OK

    58: C_FindObjects
    2013-08-27 14:33:57.926
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    59: C_FindObjectsFinal
    2013-08-27 14:33:57.926
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    60: C_GetSlotInfo
    2013-08-27 14:33:58.394
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    61: C_GetSessionInfo
    2013-08-27 14:33:58.394
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    62: C_FindObjectsInit
    2013-08-27 14:33:58.394
    [in] hSession = 0x2f60003
    [in] pTemplate[3]:
    CKA_TOKEN True
    CKA_ID 19131fd0 / 20
    00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    00000010 00 00 00 01 ....
    CKA_CLASS CKO_PRIVATE_KEY
    Returned: 0 CKR_OK

    63: C_GetSlotInfo
    2013-08-27 14:34:00.359
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    64: C_GetSessionInfo
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    65: C_FindObjects
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x1
    Object 0x9850004 matches
    Returned: 0 CKR_OK

    66: C_FindObjects
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] ulMaxObjectCount = 0x64
    [out] ulObjectCount = 0x0
    Returned: 0 CKR_OK

    67: C_FindObjectsFinal
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    Returned: 0 CKR_OK

    68: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_KEY_TYPE 00000000 / 0
    [out] pTemplate[1]:
    CKA_KEY_TYPE 00000000 / 4
    Returned: 0 CKR_OK

    69: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_KEY_TYPE 1913c880 / 4
    [out] pTemplate[1]:
    CKA_KEY_TYPE CKK_RSA
    Returned: 0 CKR_OK

    70: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_MODULUS 00000000 / 0
    [out] pTemplate[1]:
    CKA_MODULUS 00000000 / 256
    Returned: 0 CKR_OK

    71: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[1]:
    CKA_MODULUS 02358f88 / 256
    [out] pTemplate[1]:
    CKA_MODULUS 02358f88 / 256
    00000000 C5 DC C4 E7 79 73 1C 6E 15 1E 0C F6 1D 10 60 20 ....ys.n......00000010 24 A3 1B 96 39 30 1E DD CF D6 A5 A2 63 4A B7 A0 $...90......cJ.. 00000020 E3 A2 67 40 04 00 49 91 B5 9D 4A CD 40 E4 78 A0 ..g@..I...J.@.x. 00000030 89 91 0F 4E 76 21 7B BA 4D 6D AE B9 FF 9D 52 81 ...Nv!{.Mm....R. 00000040 8F C9 16 C0 CB C6 A0 B6 3B 90 73 C4 6C 0F BD 9B ........;.s.l... 00000050 9A BC 8F 38 E6 51 DE ED 07 86 13 D0 90 B9 4F 8D ...8.Q........O. 00000060 9D 5F 5C 32 05 6E FA D7 C5 F3 5F 5E 68 7A C7 8E ._\2.n...._^hz.. 00000070 09 F9 90 E2 93 65 37 8B EC F0 73 C9 FB EA BB 6C .....e7...s....l 00000080 DC 0C CE 27 CB 04 87 D2 60 56 0B 48 B5 44 AE 65 ...'....V.H.D.e
    00000090 F7 E9 69 93 CF 4F 0D 9D FB 3E 6B 4B 14 20 25 A1 ..i..O...>kK. %.
    000000A0 53 4A 0B D0 5B 4E 17 C7 27 BF EA EC 90 C5 E5 67 SJ..[N..'......g
    000000B0 6C 30 50 A5 9C 3A 6B AE EC AC 81 6A 95 E1 A4 E6 l0P..:k....j....
    000000C0 EA 8B 1B B1 74 4F D7 56 54 F1 A2 BB F1 C0 EF 06 ....tO.VT.......
    000000D0 AC 3D 28 A7 26 EE CC 67 4D 72 7C 62 E4 3B 47 B6 .=(.&..gMr|b.;G.
    000000E0 6D CD 36 91 A3 E7 09 57 1A 97 02 9A 06 2A C1 05 m.6....W.....*..
    000000F0 20 63 58 07 0F EF B9 C1 87 51 05 F7 BF A2 E7 D9 cX......Q......
    Returned: 0 CKR_OK

    72: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[3]:
    CKA_TOKEN 00000000 / 0
    CKA_SENSITIVE 00000000 / 0
    CKA_EXTRACTABLE 00000000 / 0
    [out] pTemplate[3]:
    CKA_TOKEN 00000000 / 1
    CKA_SENSITIVE 00000000 / 1
    CKA_EXTRACTABLE 00000000 / 1
    Returned: 0 CKR_OK

    73: C_GetAttributeValue
    2013-08-27 14:34:00.359
    [in] hSession = 0x2f60003
    [in] hObject = 0x9850004
    [in] pTemplate[3]:
    CKA_TOKEN 1913c890 / 1
    CKA_SENSITIVE 1913c850 / 1
    CKA_EXTRACTABLE 1913c8b0 / 1
    [out] pTemplate[3]:
    CKA_TOKEN True
    CKA_SENSITIVE True
    CKA_EXTRACTABLE False
    Returned: 0 CKR_OK

    74: C_GetSlotInfo
    2013-08-27 14:34:01.108
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    75: C_GetSessionInfo
    2013-08-27 14:34:01.108
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    76: C_DecryptInit
    2013-08-27 14:34:01.124
    [in] hSession = 0x2f60003
    pMechanism->type=CKM_RSA_PKCS
    [in] hKey = 0x9850004
    Returned: 0 CKR_OK

    77: C_GetSlotInfo
    2013-08-27 14:34:03.494
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    78: C_GetSessionInfo
    2013-08-27 14:34:03.494
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    79: C_Decrypt
    2013-08-27 14:34:03.510
    [in] hSession = 0x2f60003
    [in] pEncryptedData[ulEncryptedDataLen] 022be978 / 256
    00000000 5F A2 4B B8 0F 96 39 04 4D 92 50 14 FD FF C0 AE _.K...9.M.P.....
    00000010 AB 37 21 B1 A3 79 A4 36 4E 3A 2B 04 CE 8F 3F 61 .7!..y.6N:+...?a
    00000020 6C EB 01 05 98 98 B7 B9 DB 1E 53 12 BF CF CE 25 l.........S....%
    00000030 86 3E 30 E6 A4 40 92 C8 FC BC 87 D4 55 4A FE 93 .>0..@......UJ..
    00000040 30 3E C9 E2 68 BC 74 4B 25 9B 85 54 A5 2C 42 20 0>..h.tK%..T.,B
    00000050 59 2F EB 52 F9 7F 43 61 19 C9 12 B3 39 B9 EE 1F Y/.R.Ca....9...
    00000060 9E 66 B7 CD 46 18 85 ED DC 4C CF 66 B7 8D 3F DE .f..F....L.f..?.
    00000070 4D 83 24 3C 42 61 E0 81 66 44 29 50 D6 BE C2 C7 M.$<Ba..fD)P.... 00000080="" F6="" 92="" 6D="" F9="" 84="" 20="" 13="" D2="" B7="" D7="" 7A="" BE="" E0="" D1="" EE="" 76="" ..m..="" ....z....v="" 00000090="" BC="" 2C="" EF="" 82="" 5E="" B9="" 25="" B5="" 77="" B0="" D3="" 1E="" 6F="" DA="" 8C="" 96="" .,..^.%.w...o...="" 000000A0="" 10="" 06="" DA="" 01="" 42="" 08="" EF="" 37="" B5="" 08="" DD="" 3B="" 43="" A5="" E9="" 35="" ....B..7...;C..5="" 000000B0="" 71="" F0="" 4E="" 1B="" E4="" 21="" 45="" 16="" E9="" 8D="" FE="" 89="" 61="" C3="" FA="" 84="" q.N..!E.....a...="" 000000C0="" 09="" 97="" 93="" 26="" 7C="" D8="" 2B="" 63="" 52="" F6="" 74="" F5="" EE="" A2="" 5D="" 8F="" ...&|.+cR.t...].="" 000000D0="" 49="" 65="" C3="" 65="" 2C="" 0A="" 60="" 76="" CD="" A2="" E0="" 56="" 11="" 60="" D8="" 31="" Ie.e,.<code="">v...V..1 000000E0 D6 A3 73 51 FE EB 45 9B A8 B7 C3 7D 84 6E DA A2 ..sQ..E....}.n.. 000000F0 B8 9A A3 CB 83 15 81 75 66 59 EB C7 3E F1 22 A8 .......ufY..>.".
    Returned: 6 CKR_FUNCTION_FAILED

    80: C_GetSlotInfo
    2013-08-27 14:34:06.583
    [in] slotID = 0x3
    [out] pInfo:
    slotDescription: 'Rainbow Technologies iKeyVirtual'
    'Reader 0 '
    manufacturerID: 'SafeNet, Inc. '
    hardwareVersion: 1.0
    firmwareVersion: 0.0
    flags: 7
    CKF_TOKEN_PRESENT
    CKF_REMOVABLE_DEVICE
    CKF_HW_SLOT
    Returned: 0 CKR_OK

    81: C_GetSessionInfo
    2013-08-27 14:34:06.583
    [in] hSession = 0x2f60003
    [out] pInfo:
    slotID: 3
    state: ' CKS_RW_USER_FUNCTIONS'
    flags: 6
    CKF_RW_SESSION
    CKF_SERIAL_SESSION
    ulDeviceError: 0
    Returned: 0 CKR_OK

    82: C_SignInit
    2013-08-27 14:34:06.583
    [in] hSession = 0x2f60003
    pMechanism->type=CKM_SHA1_RSA_PKCS
    [in] hKey = 0x9850004
    Returned: 0 CKR_OK

    83: C_SignUpdate
    2013-08-27 14:34:06.583
    [in] hSession = 0x2f60003
    [in] pPart[ulPartLen] 022be958 / 29
    00000000 4C 69 6C 6C 61 6E 20 67 69 63 6B 20 6F 6E 20 74 Lillan gick on t
    00000010 68 65 20 72 6F 61 64 65 6E 20 75 74 2E he roaden ut.
    Returned: 0 CKR_OK

    84: C_SignFinal
    2013-08-27 14:34:06.583
    [in] hSession = 0x2f60003
    [out] pSignature[*pulSignatureLen] 022be9c0 / 256
    00000000 81 49 6F B5 4E EA D8 0B EF 82 9C E0 02 A2 1F B8 .Io.N...........
    00000010 EA 43 C5 63 2E D1 70 7A E8 02 64 44 D7 8B B2 69 .C.c..pz..dD...i
    00000020 BB E1 A6 BA 6B 24 54 96 63 3F 87 B3 D0 A3 21 C6 ....k$T.c?....!.
    00000030 B1 76 99 93 C3 BF 06 C3 79 AA 36 F4 19 94 9C 28 .v......y.6....(
    00000040 47 99 42 C0 DB AB 61 1A 2D A6 DE E8 02 29 FF 8B G.B...a.-....)..
    00000050 7C BF 55 72 76 CD 57 A1 7B 09 79 89 B5 B0 12 5E |.Urv.W.{.y....^
    00000060 0E 1B 71 2A E5 D1 01 7B 87 F1 05 55 61 7E 00 8A ..q*...{...Ua~..
    00000070 53 77 77 7B 66 B9 1F 8F BA B0 71 B0 C7 BA 4B 82 Sww{f.....q...K.
    00000080 BC 47 33 78 91 BE 58 54 E6 EA 0B 0E 2B B3 17 DF .G3x..XT....+...
    00000090 B5 66 CF 0D 3E 68 F8 30 4E CA 0F 97 78 08 35 69 .f..>h.0N...x.5i
    000000A0 F3 F6 A4 84 40 26 60 FF BD 30 67 FF DE 13 9A 21 ....@&`..0g....!
    000000B0 70 8F C8 51 4A 5D 0C 11 2F FB 7F C4 3E 2F 19 8D p..QJ]../..>/..
    000000C0 FE 50 4F 36 96 CF E7 C1 91 05 6F 7F CB 7C 27 ED .PO6......o.|'.
    000000D0 8B 88 07 FF 2F 40 98 23 2C 4A FC 80 F9 8A 9D 98 ..../@.#,J......
    000000E0 51 3F D3 23 AD 4B 08 48 8E 4C C4 29 D8 BA 7C 28 Q?.#.K.H.L.)..|(
    000000F0 62 BF E7 76 A3 C8 A2 74 5B 7F A4 EE 9C 6B 4E E2 b..v...t[...kN.
    Returned: 0 CKR_OK