diff --git a/Makefile b/Makefile index a53861b..3247e5b 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 2.5 PACKAGE = yubikey-val -CODE = COPYING Makefile NEWS ykval-api.html ykval-checksum-clients.php \ +CODE = COPYING Makefile NEWS ykval-checksum-clients.php \ ykval-common.php ykval-config.php ykval-db.php ykval-db.sql \ ykval-export.php ykval-import.php ykval-log.php ykval-ping.php \ ykval-queue.php ykval-revoke.php ykval-synclib.php \ diff --git a/ykval-api.html b/ykval-api.html deleted file mode 100644 index a4638a0..0000000 --- a/ykval-api.html +++ /dev/null @@ -1,226 +0,0 @@ -
All requests are HTTP GETs. As such, all parameters must be -properly URL encoded. In particular, some base64 characters (such as -"+") in the value fields needs to be escaped.
- -Each response sent by Yubico is signed. To make sure the response -has not been tampered with, you should verify the signature.
- -To verify a signature on a response message, follow -the same procedure that was used to sign the -response message and compare the signature in the response to the signature -you generated. If the signature values are equal, the -signature is correct.
- -Make sure you remove the signature itself from the values you generate -the signature over for verification. If the incoming message is --b=1&a=2&c=3&h=V5FkMYr9GCG9tQA9ihuuybWl99U= -- -make sure to remove
h
before verifying:
-b=1&a=2&c=3-
Generate the signature over the parameters in the message. Each -message contains a set of key/value pairs, and the signature is always -over the entire set (excluding the signature itself), sorted in -alphabetical order of the keys. - -To generate a message signature: -
a=2&b=1&c=3
.t2ZMtKeValdA+H0jVpj3LIichn4=
.h
to the message.
-verify
.
-verify
call lets you check whether an OTP is valid. Since the
-OTP itself contains identification information, all you have to do
-is to send the OTP.
-http://api.yubico.com/wsapi/verify-with the following parameters (note that this request need not be signed): -
parameter | type | required | purpose | -
---|---|---|---|
id |
- string | - -Yes | -Specifies the requestor so that the end-point can retrieve - correct shared secret for signing the response. | -
otp |
- string | -Yes | - -The OTP from the YubiKey. | -
timestamp |
- string | -No | -Timestamp=1 requests timestamp and session counter information the response | - -
h |
- string | -No | - -The optional HMAC-SHA1 signature for the request. | -
-http://api.yubico.com/wsapi/verify?otp=vvvvvvcucrlcietctc\ -kflvnncdgckubflugerlnr&id=87-
-http://api.yubico.com/wsapi/verify?otp=vvvvvvcucrlcietctc\ -kflvnncdgckubflugerlnr&id=87×tamp=1-
parameter | type | purpose | - -
---|---|---|
h |
- string (base64) | - -Signature as described above. | -
t |
- time stamp | -Timestamp in UTC. | -
status |
- string | -The status of the operation. The status are described - in return codes. | -
timestamp |
- string | -YubiKey internal timestamp value when key was pressed | -
sessioncounter |
- string | -YubiKey internal usage counter when key was pressed | -
sessionuse |
- string | -YubiKey internal session usage counter when key was pressed | -
status
values in a verify
-response:
-name | meaning | -
---|---|
OK |
- The OTP is valid. | -
BAD_OTP |
- The OTP is invalid format. | -
REPLAYED_OTP |
- The OTP has already been seen by the service. | -
BAD_SIGNATURE |
- The HMAC signature verification failed. | -
MISSING_PARAMETER |
- The request lacks a parameter. | - -
NO_SUCH_CLIENT |
- The request id does not exist. |
-
OPERATION_NOT_ALLOWED |
- The request id is not allowed to verify OTPs. |
-
BACKEND_ERROR |
- Unexpected error in our server. Please contact us if you see this - error. | -