yubico-piv-tool-1.4.2-18.1.i586.rpm


Advertisement

Description

yubico-piv-tool - Yubico YubiKey NEO CCID Manager

Distribution: openSUSE 13.2
Repository: openSUSE Security all
Package name: yubico-piv-tool
Package version: 1.4.2
Package release: 18.1
Package architecture: i586
Package type: rpm
Installed size: 180.51 KB
Download size: 56.86 KB
Official Mirror: ftp.gwdg.de
This is a command line tool to interact with the PIV applet on a YubiKey NEO. Among other functions it supports, generating keys on device, importing keys and certificates and creating certificate requests.

Alternatives

Provides

  • yubico-piv-tool = 1.4.2-18.1
  • yubico-piv-tool(x86-32) = 1.4.2-18.1

    Install Howto

    1. Add the openSUSE Security repository:
      # zypper addrepo http://ftp.gwdg.de/pub/opensuse/repositories/security/openSUSE_13.2/ opensuse-security
    2. Install yubico-piv-tool rpm package:
      # zypper install yubico-piv-tool

    Files

    • /usr/bin/yubico-piv-tool
    • /usr/share/doc/packages/yubico-piv-tool/COPYING
    • /usr/share/doc/packages/yubico-piv-tool/ChangeLog
    • /usr/share/doc/packages/yubico-piv-tool/NEWS
    • /usr/share/doc/packages/yubico-piv-tool/README
    • /usr/share/man/man1/yubico-piv-tool.1.gz

    Changelog

    2016-08-17 - t.gruner@katodev.de - Version 1.4.2 (released 2016-08-12) - Clarify license headers and clean up YKCS11 licensing. Now uses pkcs11.h from the Scute project. - Don?t install ykcs11-version.h. - No cflags in ykcs11.pc. - Unimplemented YKCS11 functions now return CKR_FUNCTION_FAILED. - Version 1.4.1 (released 2016-08-11) - Documentation updates - Add possibility to export certificates in SSH format. - Make certificate serial number random by default.

    2016-05-17 - t.gruner@katodev.de - Version 1.4.0 (released 2016-05-03) - Add attest action When used on a slot with a generated key, outputs a signed x509 certificate for that slot showing that the key was generated in hardware. Available in firmware 4.3.0 and newer. - Add cached parameter for touch-policy With cached, the touch is valid for an additional 15s. Available in firmware 4.3.0 and newer. - Enforce a minimum PIN length of 6 characters. - Fix a bug with list-readers action where it fell through processing into write-object.

    2016-04-25 - t.gruner@katodev.de - Version 1.3.1 (released 2016-04-19) - Fix a bug where unblock pin would instead change puk, introduced in 1.3.0. - Clarifications with help texts. - Version 1.3.0 (released 2016-02-19) - Fixed extraction of RSA modulus and exponent for pkcs11. - Implemented C_SetPIN for pkcs11. - Add generic write and read object actions for the tool. Supports hex/binary/base64 formats - Add ykpiv_change_pin(), ykpiv_change_puk() and ykpiv_unblock_pin() - Print CCC with status action. - Address bugs with pkcs11 on windows. - Add --valid-days and --serial to tool for selfsign-certificate action. - Ask for password for pkcs12 if none is given.

    2015-12-11 - t.gruner@katodev.de - Version 1.2.2 (released 2015-12-08) - Fix old buffer overflow in change-pin functionality. - Version 1.2.1 (released 2015-12-08) - Fix issue with big certificates and status. - Version 1.2.0 (released 2015-12-07) - On OSX use @loader_path instead of @executable_path for ykcs11. - Add ykpiv_import_private_key to libykpiv. - Raise buffer sizes to support bigger objects. - Change behavior of action status, only list populated slots. - Add retired keys to ykcs11. - In ykcs11 support login with non null terminated pin. - Add a new action set-ccc to yubico-piv-tool to set the CCC.

    2015-11-18 - t.gruner@katodev.de - Version 1.1.2 (released 2015-11-13) - Properly handle DER encoding in ECDSA signatures.

    2015-11-12 - t.gruner@katodev.de - Version 1.1.1 (released 2015-11-11) - Make sure SCardContext is properly acquired and released.

    2015-11-06 - t.gruner@katodev.de - Version 1.1.0 (released 2015-11-06) - Add support for new YubiKey 4. - Add ykcs11.

    2015-10-13 - t.gruner@katodev.de - Add dependencive in .spec file

    2015-10-01 - t.gruner@katodev.de - Version 1.0.3 (released 2015-10-01) - Correct wording on unblock-pin action. - Show pin retries correctly. - Use a bigger buffer for receiving data.

    2015-09-15 - t.gruner@katodev.de - Version 1.0.2 (released 2015-09-04) - Query for different passwords/pins on stdin if they?re not supplied. - If a reader fails continue trying matching readers. - Authentication failed is supposed to be 0x63cX not 0x630X.

    Advertisement
    Advertisement