Lists the keys in the PKCS #11 token.
evactl list-keys [-p <pin>] [-t <token>] [-v <vendor>]For example:
$ sudo evactl list-keysStarting PKCS #11 Manager... DoneUsing token with label pking203Public Key Object; RSA 2048 bits Label: 305ecd78340acc3d906be370a01e7884 ID: 03b1dac1e383b8d3adea5a6a2c6200bde58ffb40 Usage: verifyPrivate Key Object; RSA 2048 bits Label: F ID: 0f Usage: sign, unwrapPublic Key Object; RSA 2048 bits Label: F ID: 0f Usage: verify, wrapPrivate Key Object; RSA 2048 bits Label: webserver-root1 ID: 103d6c94ea10b98ab37186cc1c4977eb Usage: signSee below for a description of each option.
-p <pin>
Authenticate in the HSM with the <pin> PIN.
Mandatory: No. When omitting this option, the command looks for the PIN in the application secrets. If not found, prompts the user for the PIN.
-t <token>
Select the HSM token with the <token> label.
Mandatory: No. When omitting this option, the command uses the value of the Token label configuration parameter.
The command will raise an error if you omit this option and the configuration is not loaded.
-v <vendor>
Use the <vendor> security module. See the following table for the supported values.
Vendor | Security module |
|---|---|
none | Built-in software PKCS #11 module. |
nshield | nShield HSM. See HSM requirements for the supported models. |
thales | Thales HSM. See HSM requirements for the supported models. |
It is recommended to select a Hardware Security Module (HSM).
Mandatory: No. When omitting this option, the command assumes the value of the Vendor configuration parameter.
The command will raise an error if you omit this option and the configuration is not loaded.