Cannot build
gnupg-pkcs11-scd on Mac, because it needs
pkcs11-helper, which does not exist on Mac, and porting did not work for me.
I needed to modify the ~/.gnupg/scdaemon.conf:
Code:
reader-port "Yubico Yubikey NEO OTP+U2F+CCID 00 00"
reader-port "Yubico Yubikey NEO OTP+U2F+CCID 01 00"
pcsc-driver /System/Library/Frameworks/PCSC.framework/PCSC
disable-ccid
card-timeout 15 #Release the card after 15 seconds
In general, having GPGTools
https://gpgtools.org installed provided with gpg2, gpg-agent, and scdaemon to use with NEO. I was able to secure email in OpenPGP mode using NEO and GPGTools.
Regarding PIV, the story is more difficult. It seems fairly straightforward to access NEO with tools from OpenSC
https://github.com/OpenSC/OpenSC/releases, and using OpenSSL, or Keystore Explorer
http://keystore-explorer.sourceforge.net/ (and of course yubico-piv-tool) one is able to generate keys & certificates, and load them on the NEO. The problem is - I'm not aware of any application that can use those certificates, either for email, or for login, or such.
OpenSC.tokend https://github.com/OpenSC/OpenSC.tokend recognizes NEO but cannot unlock it, or do anything useful with it (in fact it refuses to unlock any smart card, so there must be something wrong with my setup, but I can't figure out what it could be).
PKard does not recognize NEO (because NEO does not return Card Capabilities Container).
UpdateAfter some change (among many - can't tell what exactly it was)
OpenSC.tokend stopped recognizing NEO. But I guess I shouldn't complain because it started unlocking CAC and PIV cards successfully. Though at this time NEO PIV == No-Go.