Provided by: yubihsm-shell_2.6.0-5_amd64 

NAME
yubihsm-shell - manual page for yubihsm-shell 2.6.0
SYNOPSIS
yubihsm-shell [OPTION]...
DESCRIPTION
-h, --help
Print help and exit
-V, --version
Print version and exit
-a, --action=ENUM
Action to perform (possible values="benchmark", "blink-device", "create-otp-aead",
"decrypt-aesccm", "decrypt-aescbc", "decrypt-aesecb", "decrypt-oaep", "decrypt-otp",
"decrypt-pkcs1v15", "delete-object", "derive-ecdh", "encrypt-aesccm", "encrypt-aescbc",
"encrypt-aesecb", "generate-asymmetric-key", "generate-hmac-key", "generate-otp-aead-key",
"generate-wrap-key", "generate-symmetric-key", "get-device-info", "get-logs", "get-object-info",
"get-opaque", "get-option", "get-pseudo-random", "get-public-key", "get-storage-info",
"get-template", "get-wrapped", "get-rsa-wrapped", "get-rsa-wrapped-key", "get-device-pubkey",
"list-objects", "put-asymmetric-key", "put-authentication-key", "put-hmac-key", "put-opaque",
"put-option", "put-otp-aead-key", "put-symmetric-key", "put-template", "put-wrap-key",
"put-rsa-wrapkey", "put-public-wrapkey", "put-wrapped", "put-rsa-wrapped", "put-rsa-wrapped-key",
"randomize-otp-aead", "reset", "set-log-index", "sign-attestation-certificate", "sign-ecdsa",
"sign-eddsa", "sign-hmac", "sign-pkcs1v15", "sign-pss", "sign-ssh-certificate")
-p, --password=STRING
Authentication password
--authkey=INT
Authentication key (default=`1')
-i, --object-id=SHORT
Object ID (default=`0')
-l, --label=STRING
Object label (default=`')
-d, --domains=STRING
Object domains (default=`1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16')
-c, --capabilities=STRING
Capabilities for an object (default=`0')
-t, --object-type=STRING
Object type (default=`any')
-y, --ykhsmauth-label=STRING
Credential label on YubiKey (implicitly enables ykhsmauth)
-r, --ykhsmauth-reader=STRING Only use a matching YubiKey reader name
(default=`')
--delegated=STRING
Delegated capabilities (default=`0')
--new-password=STRING
New authentication password
-A, --algorithm=STRING
Operation algorithm (default=`any')
--oaep=STRING
OAEP algorithm. Used primarily with asymmetric wrap (default=`rsa-oaep-sha256')
--mgf1=STRING
MGF1 algorithm. Used primarily with asymmetric wrap (default=`mgf1-sha256')
--nonce=INT
OTP nonce
--iv=STRING
An initialization vector as a hexadecimal string
--count=INT
Number of bytes to request (default=`256')
--duration=INT
Blink duration in seconds (default=`10')
--wrap-id=INT
Wrap key ID
--include-seed
Include seed when exporting an ED25519 key under wrap (default=off)
--template-id=INT
Template ID
--attestation-id=INT
Attestation ID
--log-index=INT
Log index
--opt-name=STRING
Device option name
--opt-value=STRING
Device option value
--in=STRING
Input data (filename) (default=`-')
--out=STRING
Output data (filename) (default=`-')
--informat=ENUM
Input format (possible values="default", "base64", "binary", "PEM", "password", "hex", "ASCII"
default=`default')
--outformat=ENUM
Input and output format (possible values="default", "base64", "binary", "PEM", "hex", "ASCII"
default=`default')
-f, --config-file=STRING
Configuration file to read (default=`')
-C, --connector=STRING
List of connectors to use
--cacert=STRING
HTTPS cacert for connector
--cert=STRING
HTTPS client certificate to authenticate with
--key=STRING
HTTPS client certificate key
--proxy=STRING
Proxy server to use for connector
--noproxy=STRING
Comma separated list of hosts ignore proxy for
-v, --verbose=INT
Print more information (default=`0')
-P, --pre-connect
Connect immediately in interactive mode (default=off)
--device-pubkey=STRING
List of device public keys allowed for asymmetric authentication
yubihsm-shell 2.6.0 March 2025 YUBIHSM-SHELL(1)