You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/users-manual/application-otp/challenge-response.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,8 +59,7 @@ bytes of additional data are not important—they are merely added as padding so
59
59
with a 16-byte key using the AES encryption algorithm (AES requires that data be encrypted in blocks of the same size as
60
60
the encryption key). The resulting Yubico OTP (as a byte array) becomes the response.
61
61
62
-
For HMAC-SHA1 challenge-response, an application will send the YubiKey a challenge of up to 64 bytes in size, which will be digested (
63
-
hashed) with a 20-byte secret key, resulting in a 20-byte response (the HMAC-SHA1 hash value). Responses can be received
62
+
For HMAC-SHA1 challenge-response, an application will send the YubiKey a challenge of up to 64 bytes in size, which will be digested (hashed) with a 20-byte secret key, resulting in a 20-byte response (the HMAC-SHA1 hash value). Responses can be received
64
63
by an application as a byte array or a 6-10 digit numeric code. With HMAC-SHA1, the challenge can be either an
65
64
application-specified byte array or the current Unix time.
66
65
@@ -109,7 +108,7 @@ The SDK’s challenge-response functionality centers around the following two me
109
108
110
109
``ConfigureChallengeResponse()`` allows you to configure an OTP application slot on a YubiKey to receive a challenge
111
110
from a host and process it based on a specific algorithm and secret key. ``CalculateChallengeResponse()`` allows a host
112
-
to send a challenge to a YubiKey and then receive the response from the YubiKey.
111
+
to send a challenge to a YubiKey and then receive its response.
113
112
114
113
### ConfigureChallengeResponse()
115
114
@@ -176,10 +175,10 @@ The SDK will throw an exception if you call both ``UseTotp()`` and ``UseChalleng
176
175
> slot is configured to perform Yubico OTP, the challenge must
177
176
> be [6 bytes](xref:Yubico.YubiKey.Otp.Operations.CalculateChallengeResponse.YubicoOtpChallengeSize) long. If the slot
178
177
> is
179
-
> configured for HMAC-SHA1, the HOTP challenge must
178
+
> configured for HMAC-SHA1, the challenge must
180
179
> be [64 bytes](xref:Yubico.YubiKey.Otp.Operations.CalculateChallengeResponse.MaxHmacChallengeSize) long. However, if
181
180
> the
182
-
> slot has been configured with ``UseSmallChallenge()``, an HOTP challenge smaller than 64 bytes is acceptable. The
181
+
> slot has been configured with ``UseSmallChallenge()``, a challenge smaller than 64 bytes is acceptable. The
183
182
> SDK will throw an exception if the challenge size does not match the YubiKey slot's configuration.
184
183
185
184
For a full list of the methods in the ``CalculateChallengeResponse`` class, see
0 commit comments