<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2813" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2018-01-03T16:35:27+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2813</id>
<entry>
<author><name><![CDATA[yze]]></name></author>
<updated>2018-01-03T16:35:27+01:00</updated>
<published>2018-01-03T16:35:27+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10083#p10083</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10083#p10083"/>
<title type="html"><![CDATA[Re: Strange issues with libykcs11 under macOS]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10083#p10083"><![CDATA[
Found a solution myself. Since my primary goal was to use all PIV slots, I found a solution from opensc to get the &quot;retired&quot; slots working. The current 2017 version is already ready for this. What was missing is to describe with a Key History object how to use those slots for opensc. For the yubikey 4: To make the certificates appear in keychain. In short:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">echo -n C10114C20100FE00 | yubico-piv-tool -k -a write-object --id 0x5FC10C -i -<br /></div><br /><br />will activate all 20 slots as purpose for X509 certificate + key. With that said, ykcs11 is no longer needed.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3600">yze</a> — Wed Jan 03, 2018 4:35 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[yze]]></name></author>
<updated>2018-01-03T00:04:27+01:00</updated>
<published>2018-01-03T00:04:27+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10080#p10080</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10080#p10080"/>
<title type="html"><![CDATA[Strange issues with libykcs11 under macOS]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2813&amp;p=10080#p10080"><![CDATA[
I have installed yubikey-piv-tools via brew.<br /><br />using my Yubikey 4 works for e.g. SSH login but get before being prompted for PIN for each installed PIV certificate a:<br /><br />C_GetAttributeValue failed: 6<br /><br />e.g. example:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">% ssh-keygen -D /usr/local/lib/libykcs11.dylib -e<br />C_GetAttributeValue failed: 6<br />&#91;...&#93;</div><br /><br />using opensc-pkcs11.so doesn't show the error and works similar, however can't use the extra slots.<br /><br />what struggles me, however is that openvpn doesn't show any certs (while opensc does):<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">% openvpn --show-pkcs11-ids /usr/local/lib/libykcs11.dylib<br /><br />The following objects are available for use.<br />Each object shown below may be used as parameter to<br />--pkcs11-id option please remember to use single quote mark.<br />%</div><br /><br />It is a little suprising that opensc works while Yubikey's own implementation with its own device fails... I would have expected the opposite way.<br />The reasons why I wanted to use ykcs11 rather opensc one is the fact I can use the &quot;retired&quot; slots for openvpn and I do not consume the rare NIST Slots (9x) for that. Did anyone get openvpn going on macOS with ykcs11. Anything to debug that? Buggy code?<br /><br />Cheers,<br />Yze<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3600">yze</a> — Wed Jan 03, 2018 12:04 am</p><hr />
]]></content>
</entry>
</feed>