129 lines
3.3 KiB
Markdown
129 lines
3.3 KiB
Markdown
```shell
|
|
$ pkcs15-tool --list-applications
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --list-pins
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
PIN [PIN]
|
|
Object Flags : [0x01], private
|
|
Auth ID : 02
|
|
ID : 01
|
|
Flags : [0x32], local, initialized, needs-padding
|
|
Length : min_len:4, max_len:8, stored_len:8
|
|
Pad char : 0xFF
|
|
Reference : 128 (0x80)
|
|
Type : ascii-numeric
|
|
Tries left : 3
|
|
|
|
PIN [PIV PUK]
|
|
Object Flags : [0x01], private
|
|
ID : 02
|
|
Flags : [0xF2], local, initialized, needs-padding, unblockingPin, soPin
|
|
Length : min_len:4, max_len:8, stored_len:8
|
|
Pad char : 0xFF
|
|
Reference : 129 (0x81)
|
|
Type : ascii-numeric
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --list-keys
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
Private EC Key [PIV AUTH key]
|
|
Object Flags : [0x01], private
|
|
Usage : [0x04], sign
|
|
Access Flags : [0x1D], sensitive, alwaysSensitive, neverExtract, local
|
|
Algo_refs : 0
|
|
FieldLength : 384
|
|
Key ref : 154 (0x9A)
|
|
Native : yes
|
|
Auth ID : 01
|
|
ID : 01
|
|
MD:guid : 0x'30313631313834316666383035356163336461353461636261393937356365650000000000000000'
|
|
|
|
Private EC Key [SIGN key]
|
|
Object Flags : [0x01], private
|
|
Usage : [0x04], sign
|
|
Access Flags : [0x1D], sensitive, alwaysSensitive, neverExtract, local
|
|
Algo_refs : 0
|
|
FieldLength : 256
|
|
Key ref : 156 (0x9C)
|
|
Native : yes
|
|
Auth ID : 01
|
|
ID : 02
|
|
MD:guid : 0x'30323631313834316666383035356163336461353461636261393937356365650000000000000000'
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --list-info
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
PKCS#15 Card [hatterjiang]:
|
|
Version : 0
|
|
Serial number : f8611841ff8055ac3da54acba9975cee
|
|
Manufacturer ID: piv_II
|
|
Flags :
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --list-certificates
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
X.509 Certificate [Certificate for Card Authentication]
|
|
Object Flags : [0x00]
|
|
Authority : no
|
|
Path :
|
|
ID : 04
|
|
Encoded serial : 02 09 0088891A87487694BA
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --list-public-keys
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
Public EC Key [PIV AUTH pubkey]
|
|
Object Flags : [0x00]
|
|
Usage : [0x40], verify
|
|
Access Flags : [0x02], extract
|
|
FieldLength : 384
|
|
Key ref : 154 (0x9A)
|
|
Native : yes
|
|
ID : 01
|
|
DirectValue : <absent>
|
|
|
|
Public EC Key [SIGN pubkey]
|
|
Object Flags : [0x00]
|
|
Usage : [0x40], verify
|
|
Access Flags : [0x02], extract
|
|
FieldLength : 256
|
|
Key ref : 156 (0x9C)
|
|
Native : yes
|
|
ID : 02
|
|
DirectValue : <absent>
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --read-ssh-key 01
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
ecdsa-sha2-nistp384 AAAAE2Vj.... PIV AUTH pubkey
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --read-certificate 01
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
-----BEGIN CERTIFICATE-----
|
|
....
|
|
-----END CERTIFICATE-----
|
|
```
|
|
|
|
```shell
|
|
$ pkcs15-tool --read-public-key 01
|
|
Using reader with a card: Yubico YubiKey OTP+FIDO+CCID
|
|
-----BEGIN PUBLIC KEY-----
|
|
....
|
|
-----END PUBLIC KEY-----
|
|
```
|
|
|
|
<br>
|
|
|
|
# Reference
|
|
1. https://ubuntu.com/server/docs/smart-card-authentication
|