EnglishFrenchSpanish

OnWorks favicon

yubico-piv-tool - Online in the Cloud

Run yubico-piv-tool in OnWorks free hosting provider over Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

This is the command yubico-piv-tool that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

PROGRAM:

NAME


yubico-piv-tool - Yubico PIV tool

SYNOPSIS


yubico-piv-tool [OPTIONS]...

DESCRIPTION


yubico-piv-tool 1.0.3

-h, --help
Print help and exit

--full-help
Print help, including hidden options, and exit

-V, --version
Print version and exit

-v, --verbose[=INT]
Print more information (default=`0')

-r, --reader=STRING
Only use a matching reader (default=`Yubikey')

-k, --key=STRING
Authentication key to use
(default=`010203040506070801020304050607080102030405060708')

-a, --action=ENUM
Action to take (possible values="version", "generate", "set-mgm-key", "reset",
"pin-retries", "import-key", "import-certificate", "set-chuid",
"request-certificate", "verify-pin", "change-pin", "change-puk", "unblock-pin",
"selfsign-certificate", "delete-certificate", "read-certificate", "status",
"test-signature", "test-decipher")

Multiple actions may be given at once and will be executed in order for example
--action=verify-pin --action=request-certificate

-s, --slot=ENUM
What key slot to operate on (possible values="9a", "9c", "9d", "9e")

9a is for PIV Authentication 9c is for Digital Signature (PIN always checked) 9d is
for Key Management 9e is for Card Authentication (PIN never checked)

-A, --algorithm=ENUM
What algorithm to use (possible values="RSA1024", "RSA2048", "ECCP256"
default=`RSA2048')

-H, --hash=ENUM
Hash to use for signatures (possible values="SHA1", "SHA256", "SHA512"
default=`SHA256')

-n, --new-key=STRING
New authentication key to use

--pin-retries=INT
Number of retries before the pin code is blocked

--puk-retries=INT
Number of retries before the puk code is blocked

-i, --input=STRING
Filename to use as input, - for stdin (default=`-')

-o, --output=STRING
Filename to use as output, - for stdout (default=`-')

-K, --key-format=ENUM
Format of the key being read/written (possible values="PEM", "PKCS12", "GZIP",
"DER" default=`PEM')

-p, --password=STRING
Password for decryption of private key file

-S, --subject=STRING
The subject to use for certificate request

The subject must be written as: /CN=host.example.com/OU=test/O=example.com/

-P, --pin=STRING
Pin/puk code for verification

-N, --new-pin=STRING
New pin/puk code for changing

EXAMPLES


For more information about what's happening --verbose can be added to any command. For
much more information --verbose=2 may be used.

Display what version of the applet is running on the YubiKey Neo:

yubico-piv-tool -a version

Generate a new ECC-P256 key on device in slot 9a, will print the public key on stdout:

yubico-piv-tool -s 9a -A ECCP256 -a generate

Generate a certificate request with public key from stdin, will print the resulting
request on stdout:

yubico-piv-tool -s 9a -S '/CN=foo/OU=test/O=example.com/' -P 123456 \
-a verify -a request

Generate a self-signed certificate with public key from stdin, will print the certificate,
for later import, on stdout:

yubico-piv-tool -s 9a -S '/CN=bar/OU=test/O=example.com/' -P 123456 \
-a verify -a selfsign

Import a certificate from stdin:

yubico-piv-tool -s 9a -a import-certificate

Set a random chuid, import a key and import a certificate from a PKCS12 file with password
test, into slot 9c:

yubico-piv-tool -s 9c -i test.pfx -K PKCS12 -p test -a set-chuid \
-a import-key -a import-cert

Import a certificate which is larger than 2048 bytes and thus requires compression in
order to fit:

openssl x509 -in cert.pem -outform DER | gzip -9 > der.gz
yubico-piv-tool -s 9c -i der.gz -K GZIP -a import-cert

Change the management key used for administrative authentication:

yubico-piv-tool -n 0807605403020108070605040302010807060504030201 \
-a set-mgm-key

Delete a certificate in slot 9a:

yubico-piv-tool -a delete-certificate -s 9a

Show some information on certificates and other data:

yubico-piv-tool -a status

Read out the certificate from a slot and then run a signature test:

yubico-piv-tool -a read-cert -s 9a
yubico-piv-tool -a verify-pin -P 123456 -a test-signature -s 9a

Use yubico-piv-tool online using onworks.net services


Free Servers & Workstations

Download Windows & Linux apps

  • 1
    KompoZer
    KompoZer
    KompoZer is a wysiwyg HTML editor using
    the Mozilla Composer codebase. As
    Nvu's development has been stopped
    in 2005, KompoZer fixes many bugs and
    adds a f...
    Download KompoZer
  • 2
    Free Manga Downloader
    Free Manga Downloader
    The Free Manga Downloader (FMD) is an
    open source application written in
    Object-Pascal for managing and
    downloading manga from various websites.
    This is a mirr...
    Download Free Manga Downloader
  • 3
    UNetbootin
    UNetbootin
    UNetbootin allows you to create bootable
    Live USB drives for Ubuntu, Fedora, and
    other Linux distributions without
    burning a CD. It runs on Windows, Linux,
    and ...
    Download UNetbootin
  • 4
    Dolibarr ERP - CRM
    Dolibarr ERP - CRM
    Dolibarr ERP - CRM is an easy to use
    ERP and CRM open source software package
    (run with a web php server or as
    standalone software) for businesses,
    foundations...
    Download Dolibarr ERP - CRM
  • 5
    SQuirreL SQL Client
    SQuirreL SQL Client
    SQuirreL SQL Client is a graphical SQL
    client written in Java that will allow
    you to view the structure of a JDBC
    compliant database, browse the data in
    tables...
    Download SQuirreL SQL Client
  • 6
    Brackets
    Brackets
    Brackets is a free, modern open-source
    text editor made especially for Web
    Development. Written in HTML, CSS, and
    JavaScript with focused visual tools and
    prepr...
    Download Brackets
  • More »

Linux commands

Ad