ELF>@`@HQ@8 @@@@hUhU```vv|Y|Y>NN8I8Y8Y888PPDDStd888PPPtd828282QtdRtd>NNpp/lib64/ld-linux-x86-64.so.2@GNU GNU zQ V2NbGNU,JGSq: 5 DM')p c7; 3 rhL |i J    v oz 22 " | M@a C~ o |P _n, p U^e\].z N I4 N 9" .BW+$3a5\ P __cxa_finalize__libc_start_mainremoveexitstderr__fprintf_chkfputsmemcmpmemcpyfwrite__stack_chk_failstrlenfputcstrrchrstrcpystrcatlocaltime_rstrftime__snprintf_chk__vfprintf_chkstdoutstdinfgets__errno_locationstrtolstrspnoptarg__getdelimgetpassfopenfilenofstatreallocfreadferrorfcloseftelloftellfseeksnprintfstrcmpstrcasecmpgetopt_longoptindpipeforkdup2__printf_chkstrtoksecure_getenvexecvpsleep__gmon_start___ITM_deregisterTMCloneTable_ITM_registerTMCloneTablegnutls_pkcs11_initgnutls_pubkey_deinitgnutls_pkcs11_copy_secret_keygnutls_x509_ext_deinitgnutls_pkcs11_obj_get_typegnutls_pkcs11_token_set_pingnutls_pkcs11_add_providergnutls_pubkey_import_urlgnutls_x509_privkey_initgnutls_freegnutls_privkey_deinitgnutls_pkcs11_privkey_export_pubkeygnutls_x509_crt_get_pk_ecc_rawgnutls_privkey_export_ecc_rawgnutls_pkcs11_obj_get_extsgnutls_pkcs11_obj_set_infognutls_x509_ext_printgnutls_x509_privkey_import2gnutls_ecc_curve_get_namegnutls_pkcs11_obj_export2gnutls_pkcs11_obj_export3gnutls_pkcs11_get_raw_issuergnutls_pkcs11_token_get_mechanismgnutls_pubkey_initgnutls_pkcs11_token_initgnutls_pubkey_importgnutls_ecc_curve_listgnutls_digest_get_namegnutls_pkcs11_obj_initgnutls_url_is_supportedgnutls_pkcs11_token_get_randomgnutls_mallocgnutls_x509_crt_import_urlgnutls_privkey_import_urlgnutls_pubkey_export2gnutls_pkcs11_copy_x509_crt2gnutls_global_deinitgnutls_privkey_sign_data2gnutls_pkcs11_type_get_namegnutls_pkcs11_obj_list_import_url4gnutls_pubkey_import_privkeygnutls_pkcs11_obj_import_urlgnutls_sign_get_namegnutls_global_initgnutls_pkcs11_privkey_deinitgnutls_hex_decodegnutls_x509_crt_initgnutls_hex_encode2gnutls_pkcs11_token_get_urlgnutls_hex2bingnutls_privkey_get_pk_algorithmgnutls_pk_to_signgnutls_x509_privkey_deinitgnutls_pubkey_get_pk_algorithmgnutls_x509_crt_get_expiration_timegnutls_x509_crt_list_import2gnutls_pkcs11_obj_flags_get_strgnutls_x509_crt_deinitgnutls_global_set_log_levelgnutls_privkey_initgnutls_pkcs11_copy_x509_privkey2gnutls_global_set_log_functiongnutls_pkcs11_privkey_generate3gnutls_strerrorgnutls_pkcs11_deinitgnutls_pkcs11_token_check_mechanismgnutls_x509_crt_get_key_usagegnutls_pkcs11_set_token_functiongnutls_pkcs11_privkey_initgnutls_pubkey_import_x509gnutls_pkcs11_privkey_import_urlgnutls_pkcs11_token_get_infognutls_pkcs11_set_pin_functiongnutls_pkcs11_obj_export_urlgnutls_pkcs11_delete_urlgnutls_pubkey_import_x509_rawgnutls_x509_crt_import_pkcs11gnutls_x509_crt_check_issuergnutls_digest_get_idgnutls_x509_privkey_import_pkcs8gnutls_pkcs11_copy_pubkeygnutls_pk_get_namegnutls_pubkey_export_ecc_rawgnutls_pkcs11_obj_get_infognutls_memsetgnutls_pkcs11_obj_deinitgnutls_x509_crt_get_pk_algorithmgnutls_x509_crt_importgnutls_pkcs11_token_get_flagsgnutls_sec_param_to_pk_bitsgnutls_pkcs11_obj_get_flagsgnutls_pubkey_verify_data2gnutls_strduplibgnutls.so.30libc.so.6GLIBC_2.14GLIBC_2.34GLIBC_2.4GLIBC_2.17GLIBC_2.33GLIBC_2.3.4GLIBC_2.2.5GNUTLS_3_6_0GNUTLS_3_4     ii    ti  ui  w 0    N0aN`NHNTNdOt O@O`OOOOOP P@P`PPPPPQ Q@Q'`Q4QAQNQQSR0 R7@R*`R]R;R4RgRdSt Sy@Sq`SeSjSSST T@T`TTTTTU U@U`UUUuU UV V*@V`V'V3V=VIVNW^ Wm@Wd`WjW}WsWzWX X@X`XXXXX Y(Y0Y8Y@YHY PY1XYC`YZhYqpYxYYYYYYYYYY.Y= ZL(ZeZxZZZ [([0[8[@[*H[BP[ZX[n`[h[p[x[[[[["[@[M[_[y a(a0a8a@aHaaa b(b0b!8b-@b9HbMb]bnbbbbbbb c(c0c8c@c(Hc=cNc\cicw i(i0iiii j(j0jjjj) kD(kR0kekkkkkk l(l0lll$l4 mL0m`mlm} n(n q(q0q8q@qHqqqqq,q:qP rb(rt0r8r@rHrrrrrrr s(s/0s<8sI@sVHsks| t0t8t@tHttt;tVtrttttt u (uu,uCuZuruuu v(v0v8v@v-HvCPvZXvo`vhvpvxvv www0w,wKw,w,wXwmww x(x0x -8x@xHx y (y 2>MZf{ȃЃ؃ )(:0G8T@aHvPXȋЋ؋3 M(b0u8@HPX`hp&; New (08 @H.P?Pa{ (08@+H?P ](m0y8@HPX`hpx,9N_s (08@H+ D(_0m8@ (08 @ Y6(YL0Yf8Y@-@Yh-@aHaPaXa`ahapa(Y0Y``[[ [([0[8[@[H[P[ X[ `[ h[ p[ x[[[[[[[[[[[[[[[[[\\ \!\" \#(\$0\%8\&@\'H\(P\)X\*`\+h\,p\-x\.\/\0\1\2\3\4\5\6\7\8\9\:\;\<\=\>]?]@]A]B ]C(]D0]E8]F@]GH]HP]IX]J`]Kh]Lp]Mx]N]O]P]Q]R]S]T]U]V]W]X]Y]Z][]\]]]^^_^`^a^b ^c(^d0^e8^f@^gH^hP^iX^j`^kh^lp^mx^n^o^p^q^r^s^t^u^v^w^x^y^z^{^|^}^~____ _(_0_8_@_H_P_X_`_h_p_x______________HHHtHHI1Hf.f1I^HHPTE11H=f.H=HH9tH6Ht H=iH5bH)HH?HHHtHEHtfD=5u3UH=JHt H=8c ]f.ff.@gStH=Htff.@HIH}~H81%!fSHH $H dH%(H$1HHH5EHHHff.AWAVAUIATIUHSHdH%(H$1H|$ D$ HD$@D$HHD$0D$8,1H|$ H H|$ 1HT$@H|$ =Ht$ H|$(Lq|$ /1Ll$Lt$0L=t6fHD$(H<H-H|$UHD$;\$ DHD$HD$(H<2uHD$(1LH<HD$(LH<GT$H9T$8iHt$@H|$09QHD$(H\$PHL$HD$HھH<HH|$HT$I$HAT$HHfDH$dH+%(H[]A\A]A^A_ÉALHwIHH81UH|$(U1H=GHD$(U1H6yH1H=qHH|$ HHiHL$HȶH81HA H=PHGDH H=zHH*HHH81PAH IHH#H81ff.USHHHNHtHHH=v H[]Hs'u[tUtۉDfDHUH{HHHHLHLH) H)މHH[]ËU‹DDzff.SHHH=5\HH=[%Cff.SH dH%(HD$1HD$HD$11HT$mxPHT$1WHD$uHT$dH+%(u&H [HvH|$1H|$HD$1AWE1AVIHAUATUSHt$L$ dH%(H$1HD$8H$Ld$0H\$@DLHex11H|$8LHD$0HpRL1HH4xH|$8Ht$,l$,LH= xAA@GE~L H=wL AcLAH=w%D$@D$ D$D$@EPD\$EDD$EL$D$KL-DwLH=w'LLL H=wwt`LLLH=PwLLL H=5w7 t0LLYL H=w?L H|$8LHھHD$0HHvL1XH|$8LHHD$0HHvL1H|$8LHHD$09HHvvL1H|$8LHHD$0OxHHFvL1LH=/vH`H|$8AHD$8H$t$D*K\$ LD$8LHzL1DAeH IHdH{H81<DLH=~tNEt7L-EtLL,LH=FtDT$E L-tLLL H=tDL$Eu7L-sLLL H=st$t7L-sLLgLH=sMT$aL-1sLLLH=sL-r L-rXLH=rEL-rLLL H=rrf}bL-PreLL*LH=r ,|$)[L-qLL}fDH$dH+%(H[]A\A]A^A_ÉAJIHWH HxH81??AI뾉,A~I뫉AqI똉A\It L-p lL H=pgfDAWIAVAUATUSHH<$LHt$ L$8L$HD$xHD$HHHH81.HH=eHHdRH=HjH<$HT$t$0S9fAUAATIHUHSHH8dH%(HD$(1BHH|$7H|$DH u H|$HT$ T$H|$LHH|$} HD$tZH|$CH=HHD$(dH+%(uGH8[]A\A]HHHH+LH=2dA=IHH ;HWjH81DA5I뾉A.IHRH= HLH1y_ff.@AWAVAAUEATMUSHH(H|$LL|$`dH%(HD$1RHLd$@ tLH|$H+LH|$ALHDH|$rHD$dH+%(H([]A\A]A^A_LH+xD$u&HQNH=HWDH++H=/H.LHHtxHAvIHH HRhH81?AI뾉A}IHzRH=HH|$LDkQHHT$0HL$8LD$@LL$Ht7)D$P)L$`)T$p)$)$)$)$)$dH%(HD$1H$HHHD$HD$ $D$0HD$HT$dH+%(uHDH8dH%(HD$(1udHt uUHHH5ܛH81HSH HHtE1HT$(dH+%(uVH8fDHHH`H81gHH=`Hff.@ATUSHHdH%(HD$1H$w;0Hui{xucHH{uIąHH1aHD$dH+%(HL[]A\f;0u(HH5`IHqH8I9t;H HJIċutH$Ht8y]DHH{Iff.ATUSH L%adH%(HD$1HD$HD$I4$Ht$H|$HD H.HHPHl$HHH HHhHHt HCH: t`HHD8 tNfDHg H vHT$dH+%(u+H []A\HHu1HtH=LI $B`DAWAVAUMATMUHSHH$L$ L$LdH%(H$1D$(HD$ (H $ nL=MtHHD$LsHT$@HL$LHT$HHT$@HD$HT$ D$(IH9HH9(M4D,$DI?Hu]H1HLD$ AH߃PAPHD$HPT$$LD$@>H <T$8HH|$0H,H|$0H=>HD$0H(H$dH+%(H[]A\A]A^A_ú\H=xHt$0H xD$0uHL=3NH=jI9ZAH=IL=+$H=I L H= GHD*,AwH IAHKH#JIHH81ZAH ˗IHKH8HK(HKIH H=ZIHppHHRYH:HH1H;A3A)H HH= HRH=HHGHAH IH HH}HmH=*HHsYDXHKHID=AH 0IRHKH UHHSHHHHHH=wvHHrEHH}HHEHtHtH)HH)HHH1[]%u;tEtӉD fD fD1HEH[]fɉED D ff.@AWfEAVAUIATIUHSLH8dH%(H$(1A)D$ )D$0)D$@)D$P)D$`)D$p)$)$)$)$)$)$)$)$)$)$Ht#HHtH|$ HIHFHD$HFHD$EDA A6E5H=HML;L5LH;$pHtLHfDH$(dH+%(4H81[]A\A]A^A_DHt%HHtH|$ HH1HEHD$HEHD$|$ Dl$ EA uHl$ HH$pIHVH9$pD@LLAAEt D+BL5LrHމHH1t t  f HtCH=SMtHL7H8ƒ-t D+NBAVHHL=H51T$ I?T$ ukEI?1H5?b|$ tfMA}HH=H :L=I?H571fDE1H|$IHtHH==D$ H=uCIHtLHH=vD$ _HH|$ rLHI1t At AfHtA|$ HttL}pMou]L$H=HH|$ 1Ҩ|$ Mt A}0H|$ H5FAf.HH|$ rLHI1Ҩt At A f HtA|$ tE^fDHL$ H{HH Ht Ht HHH)H)H5HL$ H{HHH JLJLHH)H)DH\@`HqH8L5ML1HBAI>$I>HL$1H=AH|$ H57AoUf.Ao)L$ AoW)T$0Ao_ )\$@Aog0)d$PAoo@)l$`AowP)t$pAo`)$AoOp)$Ao)$Ao)$Ao)$Ao)$Ao)$Ao)$Ao)$Ao$Ƅ$RfDA?A f H"fDALHIDHLH"~H81HHffDL$ t t T$ BTBTt ft BTfBTHH=>?H Ht u oH ^H=}MH$H=>H*H;LMH>1jHL$H;1H>NAAUfATAUHSHHHdH%(H$1)$)D$)D$ )D$0)D$@)D$P)D$`)D$p)$)$)$)$)$)$)$)$tHL-IMEtkIH==H5=Lr$!H==IMθ贺@H==HHtfIH?1L$t< t1LHH$dH+%(H[]A\A]IH5<L蕾$u'H5$=L$zH5{L$< QI}AH *IH@1yH\)H=3{HbHUSHQHH5g<HH5S<H׳H5B<HH51<HH5 <HH5 <HwtqH5;Hc2t3HkHپHzH81ٲWþX[]%H;#۾-Ծ(ff.AWAVL5eAUL-;ATIUSH<HdH%(H$1fE1LLLt=HcH>=F@=,= =`=tN=Hy==ܺtTL:11H :Hdy.=t'= ==[= =}p =o =hbt=[tDEA'h=F =: =+ H H9Ņ~IĀ=H=L1>87=Ϲ1=tH-a11DžH=>H]=zH9HH'Ld$`16=UL=B_=,t HHD$`=t HHD$h=tD$x=tDŽ$=t DŽ$ ȹD$|=$tHH$=btHH$=mtHH$=Tt H¸HD$pJ1ɀ=*HL$$t H|HD$1Ҁ= HT$t HhHD$E1=tD-=طE1=ɷtL5=Ʒr==t=2=wt̀=mt=Yt=Xt=Mt=$====N=׶=˶===X=2=%=$=#=!=P=D=8=B=+=!S=====QA50T$MHH=XZ~HH8E~L}511H Y5H t֯=UD=G=<=0HsH25fL5H11{kXEӴȵ2 shrg^SK@6+1& taٳδN;ݳҴ(H^~HHncZOHE:HHH HHXH̫H8H=3TҲdzA.HQqfHHH-LAHHu.#tޱӲaʱNHHH*ϱIJH`H8H=Qy{p7,LA:/*v cHHH?Hװ̱HHhH>ujHHΰHPEHH2'HШHHPcHޯӰHH$?,H<H8H=m1H WLHHݯH2'HH| iHHHrEHѮƯHH>!HjHHHF|HHH"bWHHD91&|L/.11H %.HlP=ۭl=ϭJ=RL-11H -H;l)H$8Z   $8$<$<ڣH1H8ѩHHH5)HH5-HoH5Y(Hi H$@H5osHH,11L,HH4k=}5g11L,H ,HjȦ=SHj11H7,H$L,H= H$==211L+H +C=ëH 7,11Hjv11Lk+H n+H!j=i211LK+H 8+Hi=3 L+11H @+Hi|11L*H +HiV=֪11L*H *HVi =11Lj*H *H i=kHi11L*H .H=C=5L*H11H *wH$@H5cp(HHĤH$@H01à-H=6(H53*111H )H=hߣ={D=%-=SH|$hH|$p {1H$@d1#Dž;L5H)H1I>XH=fIH L-%HLaHHt;L5)fLH DŽ$(L1&HHuL=$H-H56)HQH5")H9H5)H!{H5(H H5(HH5(HٞH5(H3H5(H H5(HH5(Hy+H5(HaHHHr($HHH81>L-1D8HD$IE 1fE~IED۟LHuAEH=%H5g'ȝH HV'H;HCHHt4$H=1L苨H=&ʝH$dH+%(|H[]A\A]A^A_LL-jHHD$@1Ld$0H$L=%L5-'LHݜrHL$0MH@wHLMHLL1-E1H$HHt$0LD$HMHD$PkD @ĀX/b>L gHp11tool H$@H 3.7.7 H$GfL5PH=cIDŽ$RH$01t4$H=ͣL@H^$017$<Z1$8$8>H=$$HHt8uH=7#1H$@H$HH$@MJH5%1NH5Y%15HD$PH5,%1HD$PWH5%1HD$P.H5$1ۙHD$PH5$1HD$PH5$1HD$PH5e$1HD$PH5=$1cHD$PaH5$1EHD$P:H5#1'HD$PH5#1 HD$PH5E$1HD$PH5y#1͘HD$PH5R#1HD$PwH5+#1HD$PPH5 #1sHD$P)HL$@L1H"L H=`11L-L-٠脢HAL/HHHLHDžHLLHmD$H=mMH;KDŽ$=DŽ$-LHHH KDŽ$ D$H=MHɪD$H=ٟMH觪DŽ$DŽ$D$H=MHeuD$H=uMHCSDŽ$ EDŽ$ 5DŽ$ %LHHH]DŽ$DŽ$ HG H=HM3H H=!H" H_HHܘRH=cUHLL1Р趚H=?LHr"D$H="MHL5d1LH@^I>ҔtaHr"/I>HھH1HD$HD$8uӿL5L1H]I>mH= x됉H_HpɖH HSHHX]DH4H8AV5eLL-讞HE@ L5DII9HٗL;(H|$0DžH|$01HۖDžH|$0HT$@ DžH|$0T$HLH|$@֖HH|$@1H|$@H=*E1LLDIH=HAQATUD$PLL$0LD$(H LDH=ϛHARATUD$PLL$0LD$(ܺH LDH=HASATUD$PLL$0LD$(虺H UL=H5L H5LyH5ALaH51LIH5L1H5 LmH5LKH5L)H5LёH5LH5LH5LLH5q LH|#DL|$3AUH=HATUD$PLL$0LD$(T$8 H CAII>H gH1AuI̿ rh^T J@ 6,"AnITRH=['Ht$@H xD$@uBL5/NH=fPI5L舚HHt5HL5+H=OIHĒRH=KOHʒ4$LL跚蝔LL-#Ι$MAHLL$@͢L=VZL5?'$@< < I $E1E1H=]HH|$@H|$(Lt$@H|$ ČH=L=HHLbHHH_]HL$HT$MAH=SH;;LL-<HH|$(DžjH|$(HDž5Ld$0LDžH|$0Ht$(oDžLt$@H|$(LuDžL=6T$HH|$@L LLH-@H|$@U1H|$(HD$@T$HH|$@LLLH|$0ыLDžH|$0LÇDžxyH|$@UH|$01HD$@Hu$HHt$0E1L{ǃOH=U1H}}H=LHހ@豧aމAH I]IÉAH .]IAH ]IA{H \IrAtH \IWAlH \I<AdH \Iz!A]H \I_LlHHHiFAH q\I$ˈAH V\I HOH:I<$HQPH1MMjI<$AH [IH102I<$HOH1lj$I<$H8H1WD$ANJDH;LIؾHHN1茊HH|<%d>| %smemory error Token %d: URL: %s Label: %s Type: Hardware token, Trust moduleGeneric token Flags: RNGRequires loginExternal PINUninitializeduPIN low countFinal uPIN attemptuPIN lockedSO-PIN low countFinal SO-PIN attemptSO-PIN lockeduPIN uninitializedError state Manufacturer: %s Model: %s Serial: %s Module: %s ,No matching objects found Object %d: URL: %s %s-%d%s-%s Type: %s (%s) Type: %s %c Expires: %s Flags: %s ID: (too long) ID: %s Attached extensions: Attached extensions:%s%sCould not find token %s error reading input 012345678Error converting hex: %s Generating an %s key... Enter password: rbeLoading secret key... hex_decode: %s Loading certificate list... Could not open %s Error reading file size memory errorLoaded %d certificates. privkey_init: %s Error in %s:%d: %s: %s importing public key: %s: %s GNUTLS_SO_PINsecurity officerGNUTLS_PINuserToo long PIN given Token '%s' with URL '%s' requires %s PIN Enter PIN: No PIN given. Setting admin's PIN... GNUTLS_NEW_SO_PINSetting user's PIN... No PIN was given to change Enter User's new PIN: HIGHlowlegacynormalmediumhighultrafuturemorepkcs11:UNKNOWN!8d:hv:export_stapledexportexport_chainexport_pubkeyexport-stapledexport-chainexport-pubkeywriteset-idset-labelset_idmark_distrustedmark_trustedmark-distrusteddebugpipeforkPAGERvSetting log level to %d global_init: %s pkcs11_init: %s pkcs11_add_provider: %s wbcannot open %s md5sha1sha256sha224sha384sha512sha3-256sha3-224sha3-384sha3-512rmd160invalid hash: %s rsa-pssnone - %s [0x%.4lx] %s keysize range (%ld, %ld) hw encrypt decrypt digest sign_recover verify verify_recover generate generate_key_pair wrap unwrap derive ec_f_p ec_namedcurve ec_uncompress ec_compressMemory error Test data to signCannot import public key: %s Signing using %s... Cannot sign data: %s ok Initializing token... Error in %s:%d: %s done %d objects deleted ed25519eddsaed448x25519x448ecdsagost01gost12-256gost12-512unknown key type: %s list-tokenslist-token-urlslist-mechanismsinitializeinitialize-pininitialize-so-pinset-pinset-so-pinlist-alllist-all-certslist-certslist-all-privkeyslist-privkeyslist-keyslist-all-trustedinfogenerate-privkeygenerate-rsagenerate-dsagenerate-eccbitssec-paramdeleteno-mark-wrapno-mark-trustedno-mark-decryptno-mark-signno-mark-cano-mark-privateno-mark-always-authenticatesecret-keyload-privkeyload-pubkeyload-certificateoutfileno-loginadmin-loginno-so-logintest-signsign-paramshashgenerate-randompkcs8inrawno-inderoutrawno-outderproviderprovider-optsno-detailed-urlonly-urlsbatchversionmore-helpCKM_RSA_PKCS_KEY_PAIR_GENCKM_RSA_PKCSCKM_RSA_9796CKM_RSA_X_509CKM_MD2_RSA_PKCSCKM_MD5_RSA_PKCSCKM_SHA1_RSA_PKCSCKM_RIPEMD128_RSA_PKCSCKM_RIPEMD160_RSA_PKCSCKM_RSA_PKCS_OAEPCKM_RSA_X9_31_KEY_PAIR_GENCKM_RSA_X9_31CKM_SHA1_RSA_X9_31CKM_RSA_PKCS_PSSCKM_SHA1_RSA_PKCS_PSSCKM_DSA_KEY_PAIR_GENCKM_DSACKM_DSA_SHA1CKM_DSA_SHA224CKM_DSA_SHA256CKM_DSA_SHA384CKM_DSA_SHA512CKM_DH_PKCS_KEY_PAIR_GENCKM_DH_PKCS_DERIVECKM_X9_42_DH_KEY_PAIR_GENCKM_X9_42_DH_DERIVECKM_X9_42_DH_HYBRID_DERIVECKM_X9_42_MQV_DERIVECKM_SHA256_RSA_PKCSCKM_SHA384_RSA_PKCSCKM_SHA512_RSA_PKCSCKM_SHA256_RSA_PKCS_PSSCKM_SHA384_RSA_PKCS_PSSCKM_SHA512_RSA_PKCS_PSSCKM_SHA224_RSA_PKCSCKM_SHA224_RSA_PKCS_PSSCKM_SHA512_224CKM_SHA512_224_HMACCKM_SHA512_224_HMAC_GENERALCKM_SHA512_224_KEY_DERIVATIONCKM_SHA512_256CKM_SHA512_256_HMACCKM_SHA512_256_HMAC_GENERALCKM_SHA512_256_KEY_DERIVATIONCKM_SHA512_TCKM_SHA512_T_HMACCKM_SHA512_T_HMAC_GENERALCKM_SHA512_T_KEY_DERIVATIONCKM_RC2_KEY_GENCKM_RC2_ECBCKM_RC2_CBCCKM_RC2_MACCKM_RC2_MAC_GENERALCKM_RC2_CBC_PADCKM_RC4_KEY_GENCKM_RC4CKM_DES_KEY_GENCKM_DES_ECBCKM_DES_CBCCKM_DES_MACCKM_DES_MAC_GENERALCKM_DES_CBC_PADCKM_DES2_KEY_GENCKM_DES3_KEY_GENCKM_DES3_ECBCKM_DES3_CBCCKM_DES3_MACCKM_DES3_MAC_GENERALCKM_DES3_CBC_PADCKM_DES3_CMAC_GENERALCKM_DES3_CMACCKM_CDMF_KEY_GENCKM_CDMF_ECBCKM_CDMF_CBCCKM_CDMF_MACCKM_CDMF_MAC_GENERALCKM_CDMF_CBC_PADCKM_DES_OFB64CKM_DES_OFB8CKM_DES_CFB64CKM_DES_CFB8CKM_MD2CKM_MD2_HMACCKM_MD2_HMAC_GENERALCKM_MD5CKM_MD5_HMACCKM_MD5_HMAC_GENERALCKM_SHA_1CKM_SHA_1_HMACCKM_SHA_1_HMAC_GENERALCKM_RIPEMD128CKM_RIPEMD128_HMACCKM_RIPEMD128_HMAC_GENERALCKM_RIPEMD160CKM_RIPEMD160_HMACCKM_RIPEMD160_HMAC_GENERALCKM_SHA256CKM_SHA256_HMACCKM_SHA256_HMAC_GENERALCKM_SHA224CKM_SHA224_HMACCKM_SHA224_HMAC_GENERALCKM_SHA384CKM_SHA384_HMACCKM_SHA384_HMAC_GENERALCKM_SHA512CKM_SHA512_HMACCKM_SHA512_HMAC_GENERALCKM_SECURID_KEY_GENCKM_SECURIDCKM_HOTP_KEY_GENCKM_HOTPCKM_ACTICKM_ACTI_KEY_GENCKM_CAST_KEY_GENCKM_CAST_ECBCKM_CAST_CBCCKM_CAST_MACCKM_CAST_MAC_GENERALCKM_CAST_CBC_PADCKM_CAST3_KEY_GENCKM_CAST3_ECBCKM_CAST3_CBCCKM_CAST3_MACCKM_CAST3_MAC_GENERALCKM_CAST3_CBC_PADCKM_CAST5_KEY_GENCKM_CAST5_ECBCKM_CAST5_CBCCKM_CAST5_MACCKM_CAST5_MAC_GENERALCKM_CAST5_CBC_PADCKM_RC5_KEY_GENCKM_RC5_ECBCKM_RC5_CBCCKM_RC5_MACCKM_RC5_MAC_GENERALCKM_RC5_CBC_PADCKM_IDEA_KEY_GENCKM_IDEA_ECBCKM_IDEA_CBCCKM_IDEA_MACCKM_IDEA_MAC_GENERALCKM_IDEA_CBC_PADCKM_GENERIC_SECRET_KEY_GENCKM_CONCATENATE_BASE_AND_KEYCKM_CONCATENATE_BASE_AND_DATACKM_CONCATENATE_DATA_AND_BASECKM_XOR_BASE_AND_DATACKM_EXTRACT_KEY_FROM_KEYCKM_SSL3_PRE_MASTER_KEY_GENCKM_SSL3_MASTER_KEY_DERIVECKM_SSL3_KEY_AND_MAC_DERIVECKM_SSL3_MASTER_KEY_DERIVE_DHCKM_TLS_PRE_MASTER_KEY_GENCKM_TLS_MASTER_KEY_DERIVECKM_TLS_KEY_AND_MAC_DERIVECKM_TLS_MASTER_KEY_DERIVE_DHCKM_TLS_PRFCKM_SSL3_MD5_MACCKM_SSL3_SHA1_MACCKM_MD5_KEY_DERIVATIONCKM_MD2_KEY_DERIVATIONCKM_SHA1_KEY_DERIVATIONCKM_SHA256_KEY_DERIVATIONCKM_SHA384_KEY_DERIVATIONCKM_SHA512_KEY_DERIVATIONCKM_SHA224_KEY_DERIVATIONCKM_PBE_MD2_DES_CBCCKM_PBE_MD5_DES_CBCCKM_PBE_MD5_CAST_CBCCKM_PBE_MD5_CAST3_CBCCKM_PBE_MD5_CAST5_CBCCKM_PBE_SHA1_CAST5_CBCCKM_PBE_SHA1_RC4_128CKM_PBE_SHA1_RC4_40CKM_PBE_SHA1_DES3_EDE_CBCCKM_PBE_SHA1_DES2_EDE_CBCCKM_PBE_SHA1_RC2_128_CBCCKM_PBE_SHA1_RC2_40_CBCCKM_PKCS5_PBKD2CKM_PBA_SHA1_WITH_SHA1_HMACCKM_WTLS_PRE_MASTER_KEY_GENCKM_WTLS_MASTER_KEY_DERIVECKM_WTLS_PRFCKM_TLS10_MAC_SERVERCKM_TLS10_MAC_CLIENTCKM_TLS12_MACCKM_TLS12_KDFCKM_TLS12_MASTER_KEY_DERIVECKM_TLS12_KEY_AND_MAC_DERIVECKM_TLS12_KEY_SAFE_DERIVECKM_TLS_MACCKM_TLS_KDFCKM_KEY_WRAP_LYNKSCKM_KEY_WRAP_SET_OAEPCKM_CMS_SIGCKM_KIP_DERIVECKM_KIP_WRAPCKM_KIP_MACCKM_CAMELLIA_KEY_GENCKM_CAMELLIA_ECBCKM_CAMELLIA_CBCCKM_CAMELLIA_MACCKM_CAMELLIA_MAC_GENERALCKM_CAMELLIA_CBC_PADCKM_CAMELLIA_ECB_ENCRYPT_DATACKM_CAMELLIA_CBC_ENCRYPT_DATACKM_CAMELLIA_CTRCKM_ARIA_KEY_GENCKM_ARIA_ECBCKM_ARIA_CBCCKM_ARIA_MACCKM_ARIA_MAC_GENERALCKM_ARIA_CBC_PADCKM_ARIA_ECB_ENCRYPT_DATACKM_ARIA_CBC_ENCRYPT_DATACKM_SEED_KEY_GENCKM_SEED_ECBCKM_SEED_CBCCKM_SEED_MACCKM_SEED_MAC_GENERALCKM_SEED_CBC_PADCKM_SEED_ECB_ENCRYPT_DATACKM_SEED_CBC_ENCRYPT_DATACKM_SKIPJACK_KEY_GENCKM_SKIPJACK_ECB64CKM_SKIPJACK_CBC64CKM_SKIPJACK_OFB64CKM_SKIPJACK_CFB64CKM_SKIPJACK_CFB32CKM_SKIPJACK_CFB16CKM_SKIPJACK_CFB8CKM_SKIPJACK_WRAPCKM_SKIPJACK_PRIVATE_WRAPCKM_SKIPJACK_RELAYXCKM_KEA_KEY_PAIR_GENCKM_KEA_KEY_DERIVECKM_FORTEZZA_TIMESTAMPCKM_BATON_KEY_GENCKM_BATON_ECB128CKM_BATON_ECB96CKM_BATON_CBC128CKM_BATON_COUNTERCKM_BATON_SHUFFLECKM_BATON_WRAPCKM_ECDSA_KEY_PAIR_GENCKM_ECDSACKM_ECDSA_SHA1CKM_ECDSA_SHA224CKM_ECDSA_SHA256CKM_ECDSA_SHA384CKM_ECDSA_SHA512CKM_ECDH1_DERIVECKM_ECDH1_COFACTOR_DERIVECKM_ECMQV_DERIVECKM_ECDH_AES_KEY_WRAPCKM_RSA_AES_KEY_WRAPCKM_EC_EDWARDS_KEY_PAIR_GENCKM_EDDSACKM_JUNIPER_KEY_GENCKM_JUNIPER_ECB128CKM_JUNIPER_CBC128CKM_JUNIPER_COUNTERCKM_JUNIPER_SHUFFLECKM_JUNIPER_WRAPCKM_FASTHASHCKM_AES_KEY_GENCKM_AES_ECBCKM_AES_CBCCKM_AES_MACCKM_AES_MAC_GENERALCKM_AES_CBC_PADCKM_AES_CTRCKM_AES_GCMCKM_AES_CCMCKM_AES_CTSCKM_AES_CMACCKM_AES_CMAC_GENERALCKM_AES_XCBC_MACCKM_AES_XCBC_MAC_96CKM_AES_GMACCKM_BLOWFISH_KEY_GENCKM_BLOWFISH_CBCCKM_TWOFISH_KEY_GENCKM_TWOFISH_CBCCKM_BLOWFISH_CBC_PADCKM_TWOFISH_CBC_PADCKM_DES_ECB_ENCRYPT_DATACKM_DES_CBC_ENCRYPT_DATACKM_DES3_ECB_ENCRYPT_DATACKM_DES3_CBC_ENCRYPT_DATACKM_AES_ECB_ENCRYPT_DATACKM_AES_CBC_ENCRYPT_DATACKM_GOSTR3410_KEY_PAIR_GENCKM_GOSTR3410CKM_GOSTR3410_WITH_GOSTR3411CKM_GOSTR3410_KEY_WRAPCKM_GOSTR3410_DERIVECKM_GOSTR3411CKM_GOSTR3411_HMACCKM_GOST28147_KEY_GENCKM_GOST28147_ECBCKM_GOST28147CKM_GOST28147_MACCKM_GOST28147_KEY_WRAPCKM_DSA_PARAMETER_GENCKM_DH_PKCS_PARAMETER_GENCKM_X9_42_DH_PARAMETER_GENCKM_AES_OFBCKM_AES_CFB64CKM_AES_CFB8CKM_AES_CFB128CKM_AES_CFB1CKM_AES_KEY_WRAPCKM_AES_KEY_WRAP_PADCKM_RSA_PKCS_TPM_1_1CKM_RSA_PKCS_OAEP_TPM_1_1p11tool - GnuTLS PKCS #11 tool Usage: p11tool [ - [] | --[{=| }] ]... [url] None: Tokens: --list-tokens List all available tokens --list-token-urls List the URLs available tokens --list-mechanisms List all available mechanisms in a token --initialize Initializes a PKCS #11 token --initialize-pin Initializes/Resets a PKCS #11 token user PIN --initialize-so-pin Initializes/Resets a PKCS #11 token security officer PIN --set-pin=str Specify the PIN to use on token operations --set-so-pin=str Specify the Security Officer's PIN to use on token initialization Object listing: --list-all List all available objects in a token --list-all-certs List all available certificates in a token --list-certs List all certificates that have an associated private key --list-all-privkeys List all available private keys in a token --list-privkeys an alias for the 'list-all-privkeys' option --list-keys an alias for the 'list-all-privkeys' option --list-all-trusted List all available certificates marked as trusted --export Export the object specified by the URL - prohibits these options: export-stapled export-chain export-pubkey --export-stapled Export the certificate object specified by the URL - prohibits these options: export export-chain export-pubkey --export-chain Export the certificate specified by the URL and its chain of trust - prohibits these options: export-stapled export export-pubkey --export-pubkey Export the public key for a private key - prohibits these options: export-stapled export export-chain --info List information on an available object in a token --trusted an alias for the 'mark-trusted' option --distrusted an alias for the 'mark-distrusted' option Key generation: --generate-privkey=str Generate private-public key pair of given type --bits=num Specify the number of bits for the key generate --curve=str Specify the curve used for EC key generation --sec-param=str Specify the security level Writing objects: --set-id=str Set the CKA_ID (in hex) for the specified by the URL object - prohibits the option 'write' --set-label=str Set the CKA_LABEL for the specified by the URL object - prohibits these options: write set-id --write Writes the loaded objects to a PKCS #11 token --delete Deletes the objects matching the given PKCS #11 URL --label=str Sets a label for the write operation --id=str Sets an ID for the write operation --mark-wrap Marks the generated key to be a wrapping key --mark-trusted Marks the object to be written as trusted - prohibits the option 'mark-distrusted' --mark-distrusted When retrieving objects, it requires the objects to be distrusted (blacklisted) - prohibits the option 'mark-trusted' --mark-decrypt Marks the object to be written for decryption --mark-sign Marks the object to be written for signature generation --mark-ca Marks the object to be written as a CA --mark-private Marks the object to be written as private --ca an alias for the 'mark-ca' option --private an alias for the 'mark-private' option --mark-always-authenticate Marks the object to be written as always authenticate --secret-key=str Provide a hex encoded secret key --load-privkey=file Private key file to use - file must pre-exist --load-pubkey=file Public key file to use - file must pre-exist --load-certificate=file Certificate file to use - file must pre-exist Other options: -d, --debug=num Enable debugging - it must be in the range: 0 to 9999 --outfile=str Output file --login Force (user) login to token --so-login Force security officer login to token --admin-login an alias for the 'so-login' option --test-sign Tests the signature operation of the provided object --sign-params=str Sign with a specific signature algorithm --hash=str Hash algorithm to use for signing --generate-random=num Generate random data -8, --pkcs8 Use PKCS #8 format for private keys --inder Use DER/RAW format for input --inraw an alias for the 'inder' option --outder Use DER format for output certificates, private keys, and DH parameters --outraw an alias for the 'outder' option --provider=file Specify the PKCS #11 provider library --detailed-url Print detailed URLs --only-urls Print a compact listing using only the URLs --batch Disable all interaction with the tool Version, usage and configuration options: -v, --version[=arg] output version information and exit -h, --help display extended usage information and exit -!, --more-help extended usage information passed thru pager Options are specified by doubled hyphens and their name or by a single hyphen and the flag character. Operands and options may be intermixed. They will be reordered. Program that allows operations on PKCS #11 smart cards and security modules. To use PKCS #11 tokens with GnuTLS the p11-kit configuration files need to be setup. That is create a .module file in /etc/pkcs11/modules with the contents 'module: /path/to/pkcs11.so'. Alternatively the configuration file /etc/gnutls/pkcs11.conf has to exist and contain a number of lines of the form 'load=/usr/lib/opensc-pkcs11.so'. You can provide the PIN to be used for the PKCS #11 operations with the environment variables GNUTLS_PIN and GNUTLS_SO_PIN. Please send bug reports to: error: cannot import public key from certificate error: cannot export public key Error in obj_list_import (1): %s error: cannot export object: %s warning: no token URL was provided for this operation; the available tokens are: Error in crt_list_import (1): %s note: assuming --login for this operation. warning: --login was not specified and it may be required for this operation. Please insert token '%s' in slot and press enter '%s' is not a recognizable number.Too long line to parse in interactive mode; please use templates. warning: no --outfile was specified and the generated public key will be printed on screen. warning: Label was not specified. Label: note: several smart cards do not support arbitrary size keys; try --bits 1024 or 2048. warning: The object's label was not specified. Label: Error loading certificates: %s note: will re-use ID %s from corresponding public key error: cannot import key: %s: %s error: cannot import key parameters for '%s': %s error: cannot export pubkey '%s': %s note: will re-use ID %s from corresponding private key Error writing certificate: %s note: some tokens may require security officer login for this operation error reading file at --load-privkey: %s import error: could not find a valid PEM header; check if your key is PEM encoded error importing private key: %s: %s error reading file at --load-pubkey: %s import error: could not find a valid PEM header; check if your key has the PUBLIC KEY header You must use --load-privkey, --load-certificate, --load-pubkey or --secret-key to load the file to be copied *** Wrong PIN has been provided! *** This is the final try before locking! *** Only few tries left before locking! Re-using cached PIN for token '%s' Cannot continue with a wrong password in the environment. note: when operating in batch mode, set the GNUTLS_PIN or GNUTLS_SO_PIN environment variables error: no token URL given to initialize! Enter Administrators's new PIN: Unknown security parameter string: %s the '%s' and '%s' options conflict%s option value %d is out of range.%s option value %d is out of rangeversion option argument 'a' invalid. Use: 'v' - version only 'c' - version and copyright 'n' - version and full copyright noticeWarning: MD5 is broken, and should not be used any more for digital signatures. Unknown signature parameter: %s Unsupported curve: %s Available curves: gnutls_pkcs11_token_get_random: %s Cannot import private key: %s No supported signature algorithm for %s and %s Verifying against private key parameters... Cannot verify signed data: %s Cannot find a corresponding public key object in token: %s Verifying against public key in the token... error: no label provided for token initialization! Enter Security Officer's PIN: Token was successfully initialized; use --initialize-pin and --initialize-so-pin to set or reset PINs Are you sure you want to delete those objects? (y/N): warning: no --outfile was specified and the public key will be printed on screen. p11tool 3.7.7 Copyright (C) 2000-2021 Free Software Foundation, and others This is free software. It is licensed for use, modification and redistribution under the terms of the GNU General Public License, version 3 or later gnutls is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. gnutls is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Please send bug reports to: p11tool 3.7.7 Copyright (C) 2000-2021 Free Software Foundation, and others This is free software. It is licensed for use, modification and redistribution under the terms of the GNU General Public License, version 3 or later Please send bug reports to: CKM_WTLS_MASTER_KEY_DERIVE_DH_ECCCKM_WTLS_SERVER_KEY_AND_MAC_DERIVECKM_WTLS_CLIENT_KEY_AND_MAC_DERIVECKM_TLS12_MASTER_KEY_DERIVE_DHCKM_DSA_PROBABLISTIC_PARAMETER_GENCKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN{ ɅlYF3 ؄ńˁˁˁlԂ˃]9}YF3؆ņԂ3 YQ>+wڇLJFd@u1ubDb}jWpkcs11_set_token_pinpkcs11_set_valpkcs11_generatefind_same_privkey_with_id_load_url_pubkeypkcs11_writefind_same_pubkey_with_idpkcs11_token_listpkcs11_exportpkcs11_listpkcs11_export_chainpkcs11_test_signpkcs11_initpkcs11_deletepkcs11_export_pubkey;-(./8/(h/</\3H4x45$x=tIKTMxNXOP Q@8UXUWhdi8su,vhzRx -&D4-!AL.'`$.RAG L2Ld.BBB E(D0D8I  8A0A(B BBBA 41AAJ f AAD e AAA \2%A^ $p2AD0l AA LH2ZBEH B(A0A8GL 8A0A(B BBBA :W BEB B(A0A8I 8A0A(B BBBH `KfBSK_BZK`B DE q AE t AE 8<FBEG D(G` (A ABBA Hx\HBBE E(D0C8G` 8A0A(B BBBA JG A JH@q G 0xK%BAA G0  DABJ 00tL;BAA D@  AABA `dMcBBB E(D0D8JZHFSh 8A0A(B BBBA PLP,BBB B(A0A8GS 8D0A(B BBBA X,xRpBHE B(D0D8J 8A0A(B BBBA b OU 4cAGD _ FAN { AAC L4d_ FIB E(D0D8J~ 8C0A(B BBBF <DmBFD D(M (A ABBA 8Po$ICD C F CAF p-BBI I(D0C8N  L Y A  8A0A(B BBBA   F E  D A E S f D A E S f D A E S d L C E W L&HK0a`HTdt'4ANS07*];4gdtyqejud *'3=IN^8mdj}szvh! 1CZq.=Lex*BZn"@M_y!-9M]n(=N\iw)DRe$4L`l},:Pbt/<IVk|;Vr ,CZr-CZo0,K,,Xm - 2>MZf{):GTav3Mbu&;New .?Pa{+?P]my,9N_s+D_m 6Lf@-h-w  ` NNo p 4 ooooo8Y`GCC: (GNU) 12.1.0p11tool.debug.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.comment.gnu_debuglink 88P&$9 GoQ Y ao8no}p p 4`` ` `v 5R828233dN>N>N>  8Y8IZJ`P `P 0P$P8P