Provided by: yhsm-validation-server_1.0.4f-1_all
NAME
yhsm-init-oath-token ‐ Tool to add an OATH token to the yhsm-validation-server(1) database.
SYNOPSIS
yhsm-init-oath-token --key-handle kh --uid name [options]
DESCRIPTION
Use this tool to add OATH token entrys to the yhsm-validation-server(1) database.
OPTIONS
-D, --device device file name (default: /dev/ttyACM0) -v, --verbose enable verbose operation --debug enable debug printout, including all data sent to/from YubiHSM --force overwrite any present entry --key-handle kh key handle to create AEAD. Examples : "1", "0xabcd". --uid name user id (lookup key in token database) --oath-c num initial OATH counter value (integer) --test-oath-window num number of codes to search with --test-code --test-code digits optional OTP from token for verification --oath-k str secret HMAC-SHA-1 key of the token, hex encoded --db-file fn db file for storing AEADs for later use by the yhsm-validation-server(1) (default: /var/yubico/yhsm-validation-server.db)
EXIT STATUS
0 YubiHSM keystore successfully unlocked 1 Failed to unlock keystore 255 Client ID not found in internal database
BUGS
Report python-pyhsm/yhsm-init-oath-token bugs in the issue tracker ⟨https://github.com/ Yubico/python-pyhsm/issues/⟩
SEE ALSO
The python-yubico home page ⟨https://github.com/Yubico/python-pyhsm/⟩ YubiHSMs can be obtained from Yubico ⟨http://www.yubico.com/⟩.