Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Log output compatible with PKCS#11 Spy #392

Open
ueno opened this issue Nov 13, 2021 · 1 comment
Open

Log output compatible with PKCS#11 Spy #392

ueno opened this issue Nov 13, 2021 · 1 comment

Comments

@ueno
Copy link
Member

ueno commented Nov 13, 2021

As p11-kit already proxies module access, it would be possible to fully emulate PKCS #11 Spy. This might require addition of a new configuration option or envvar.

@ueno
Copy link
Member Author

ueno commented Jul 29, 2022

From my experience, I think it would be useful if the output is machine readable and includes identifiers to diversify the context (process ID and thread ID) as well as event timestamp, something like:

$ P11_KIT_TRACE_TOKEN=pkcs11: P11_KIT_TRACE_OUTPUT=trace application
...
$ cat trace
[
  {
    "function": "C_Initialize",
    "input-arguments": [{
      "type": "...",
      "name": "init_args",
      "value": "..."
    }],
    "output-arguments": [],
    "rv": "CKR_OK",
    "timestamp": {
      "enter": "...",
      "leave": "..."
    },
    "process": "...",
    "thread": "...
  },
  ...
]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant