Running RecoverUser
This RecoverUser sample application recovers an Entrust digital identity on a PKCS #11 device.
To run this sample application, execute the following command line in the etjava/examples directory.
java -classpath classes;../lib/enttoolkit.jar com.entrust.toolkit.examples.pkcs11.RecoverUser <ca_ip> <ca_port> <dir_ip> <dir_port> <ref> <code> <slot> <p11> <card_pwd> <apf_file> <apf_name>|
Parameter |
Value |
|
<ca_ip> |
The hostname or IP address of an Entrust Certification Authority. |
|
<ca_port> |
The port for accessing the Entrust Certification Authority. |
|
<dir_ip> |
The hostname or IP address of the Entrust Certificate Authority directory. |
|
<dir_port> |
The port for accessing the Entrust Certificate Authority directory. |
|
<ref> |
The reference number of the Entrust user for which the certificate is requested. |
|
<code> |
The authorization code of the Entrust user for which the certificate is requested. |
|
<slot> |
The identifier of the smart card slot. |
|
<p11> |
The path of the PKCS #11 library provided by the smart card vendor. |
|
<card_pwd> |
The password for accessing the smart card. |
|
<apf_file> |
The file path of the auxiliary profile, without the .aux extension, |
|
<apf_name> |
The name of the Auxiliary Profile, |
For example:
C:\etjava\examples>java -classpath classes;../lib/enttoolkit.jar com.entrust.toolkit.examples.pkcs11.RecoverUser myECA.domain.com 829 myDirectory.domain.com 389 51721588 GKTK-7VTI-HPC6 11 p11.dll Passw0rd ./MyUserUser Recovery on a Token------------------------Attempting to recover a user on the token...SUCCESS: user recovery completeSign/Verify Test----------------Attempt sign operation using the user's signing key...data to sign: 54:65:73:74:20:44:61:74:61signature: 6F:96:30:36:45:14:78:97:CA:9C:08:F6:8B:8B:DE:7B:0E:03:22:43:54:5C:67:A3:EF:92:FD:1D:00:C4:F6:DD:64:70:44:AB:A2:DB:2E:4F:A7:02:0B:CD:31:2C:C7:A9:5B:59:1A:C5:EB:7C:B6:1C:59:FB:9A:11:10:01:D8:CD:93:4A:BF:17:FD:AF:BA:30:4E:49:43:1E:23:6C:8D:9B:DE:BA:4B:D3:7C:24:42:ED:DE:75:22:8D:81:1B:D8:AF:6B:F4:C1:B0:79:A3:01:57:B9:49:C4:47:D0:F6:5A:A8:EF:01:6D:F1:09:6E:7E:59:72:36:FD:69:33:3F:01:8BAttempt verify operation using the user's verification certificate with serial number '1051721589'...data that was signed: 54:65:73:74:20:44:61:74:61signatrue verified: trueEncryption/Decryption Test--------------------------Attempt encrypt operation using the user's encryption certificate with serial number '1051721586'...plaintext: 54:65:73:74:20:44:61:74:61ciphertext: 5E:02:BB:BD:77:64:33:DF:8E:34:F9:5A:1D:B7:5C:16:C0:F5:52:38:EF:4D:AF:0C:F0:EB:7B:36:1A:C0:D0:A9:B2:92:CD:8B:7A:92:60:CA:82:31:A4:3F:92:E5:01:45:5A:A0:88:D1:73:7F:F7:93:A9:93:5B:57:1C:AC:08:7F:38:6C:47:E2:84:E0:AD:71:DB:48:18:E6:07:78:18:34:AB:98:A3:53:3B:BA:E1:C4:60:B8:5C:D0:75:9C:51:12:96:B4:C9:6B:77:85:DF:74:3F:F7:77:68:20:2D:70:CD:1E:E7:A1:37:38:EA:E3:C7:87:3F:BD:DC:5B:DF:F9:CCAttempt decrypt operation using the user's corresponding decryption private key...ciphertext: 5E:02:BB:BD:77:64:33:DF:8E:34:F9:5A:1D:B7:5C:16:C0:F5:52:38:EF:4D:AF:0C:F0:EB:7B:36:1A:C0:D0:A9:B2:92:CD:8B:7A:92:60:CA:82:31:A4:3F:92:E5:01:45:5A:A0:88:D1:73:7F:F7:93:A9:93:5B:57:1C:AC:08:7F:38:6C:47:E2:84:E0:AD:71:DB:48:18:E6:07:78:18:34:AB:98:A3:53:3B:BA:E1:C4:60:B8:5C:D0:75:9C:51:12:96:B4:C9:6B:77:85:DF:74:3F:F7:77:68:20:2D:70:CD:1E:E7:A1:37:38:EA:E3:C7:87:3F:BD:DC:5B:DF:F9:CCplaintext: 54:65:73:74:20:44:61:74:61DONE