Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

yubikey-totp(1) [debian man page]

yubikey-totp(1) 					      General Commands Manual						   yubikey-totp(1)

NAME
yubikey-totp - Produce an OATH TOTP code using a YubiKey SYNOPSIS
yubikey-totp [-v] [-h] [--time | --step] [--digits] [--slot] [--debug] DESCRIPTION
OATH codes are one time passwords (OTP) calculated in a standardized way. While the YubiKey is primarily used with Yubico OTP's, the YubiKey is also capable of producing OATH codes. OATH generally comes in two flavors -- event based (called HOTP) and time based (called TOTP). Since the YubiKey does not contain a bat- tery, it cannot keep track of the current time itself and therefor a helper application such as yubikey-totp is required to effectively send the current time to the YubiKey, which can then perform the cryptographic calculation needed to produce the OATH code. Through the use of a helper application, such as yubikey-totp, the YubiKey can be used with sites offering OATH TOTP authentication, such as Google GMail. OPTIONS
-v enable verbose mode. -h show help --time specify the time value to use (in seconds since epoch) --step how frequent codes change in your system - typically 30 or 60 seconds --digits digits in OATH code - typically 6 --slot YubiKey slot to use - default 2 --debug enable debug output EXAMPLE
The YubiKey OATH TOTP operation can be demonstrated using the RFC 6238 test key "12345678901234567890" (ASCII). First, program a YubiKey for HMAC-SHA1 Challenge-Response operation with the test vector HMAC key : $ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -o serial-api-visible -a 3132333435363738393031323334353637383930 Now, send the NIST test challenge to the YubiKey and verify the result matches the expected : $ yubikey-totp --step 30 --digits 8 --time 1111111109 07081804 $ BUGS
Report yubikey-totp bugs in the issue tracker <https://github.com/Yubico/python-yubico/issues/>. SEE ALSO
YubiKeys can be obtained from Yubico <http://www.yubico.com/>. python-yubico June 2012 yubikey-totp(1)

Check Out this Related Man Page

Authen::OATH(3pm)					User Contributed Perl Documentation					 Authen::OATH(3pm)

NAME
Authen::OATH - OATH One Time Passwords VERSION
Version 1.0.0 SYNOPSIS
Implementation of the HOTP and TOTP One Time Password algorithms as defined by OATH (http://www.openauthentication.org) All necessary parameters are set by default, though these can be overridden. Both totp() and htop() have passed all of the test vectors defined in the RFC documents for TOTP and HOTP. totp() and hotp() both default to returning 6 digits and using SHA1. As such, both can be called by passing only the secret key and a valid OTP will be returned. use Authen::OATH; my $oath = Authen::OATH->new(); my $totp = $oath->totp( "MySecretPassword" ); my $hotp = $oath->hotp( "MyOtherSecretPassword" ); Parameters may be overridden when creating the new object: my $oath = Authen::OATH->new( 'digits' => 8 ); The three parameters are "digits", "digest", and "timestep." Timestep only applies to the totp() function. While strictly speaking this is outside the specifications of HOTP and TOTP, you can specify digests other than SHA1. For example: my $oath = Authen::OATH->new( "digits" => 10, "digest" => "Digest::MD6" ); SUBROUTINES
/METHODS totp my $otp = $oath->totp( $secret [, $manual_time ] ); Manual time is an optional parameter. If it is not passed, the current time is used. This is useful for testing purposes. hotp my $opt = $oath->hotp( $secret, $counter ); Both parameters are required. _process This is an internal routine and is never called directly. AUTHOR
Kurt Kincaid, "<kurt.kincaid at gmail.com>" BUGS
Please report any bugs or feature requests to "bug-authen-totp at rt.cpan.org", or through the web interface at http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Authen-OATH <http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Authen-OATH>. I will be notified, and then you'll automatically be notified of progress on your bug as I make changes. SUPPORT
You can find documentation for this module with the perldoc command. perldoc Authen::OATH You can also look for information at: o RT: CPAN's request tracker http://rt.cpan.org/NoAuth/Bugs.html?Dist=Authen-OATH <http://rt.cpan.org/NoAuth/Bugs.html?Dist=Authen-OATH> o AnnoCPAN: Annotated CPAN documentation http://annocpan.org/dist/Authen-OATH <http://annocpan.org/dist/Authen-OATH> o CPAN Ratings http://cpanratings.perl.org/d/Authen-OATH <http://cpanratings.perl.org/d/Authen-OATH> o Search CPAN http://search.cpan.org/dist/Authen-OATH/ <http://search.cpan.org/dist/Authen-OATH/> ACKNOWLEDGEMENTS
LICENSE AND COPYRIGHT
Copyright 2010 Kurt Kincaid. This program is free software; you can redistribute it and/or modify it under the terms of either: the GNU General Public License as published by the Free Software Foundation; or the Artistic License. See http://dev.perl.org/licenses/ for more information. perl v5.14.2 2012-03-31 Authen::OATH(3pm)
Man Page