File: verifiedaccess_v1.challenge.html

package info (click to toggle)
python-googleapi 2.180.0-1
  • links: PTS
  • area: main
  • in suites: forky, sid
  • size: 527,124 kB
  • sloc: python: 11,076; javascript: 249; sh: 114; makefile: 59
file content (156 lines) | stat: -rw-r--r-- 5,192 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
<html><body>
<style>

body, h1, h2, h3, div, span, p, pre, a {
  margin: 0;
  padding: 0;
  border: 0;
  font-weight: inherit;
  font-style: inherit;
  font-size: 100%;
  font-family: inherit;
  vertical-align: baseline;
}

body {
  font-size: 13px;
  padding: 1em;
}

h1 {
  font-size: 26px;
  margin-bottom: 1em;
}

h2 {
  font-size: 24px;
  margin-bottom: 1em;
}

h3 {
  font-size: 20px;
  margin-bottom: 1em;
  margin-top: 1em;
}

pre, code {
  line-height: 1.5;
  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}

pre {
  margin-top: 0.5em;
}

h1, h2, h3, p {
  font-family: Arial, sans serif;
}

h1, h2, h3 {
  border-bottom: solid #CCC 1px;
}

.toc_element {
  margin-top: 0.5em;
}

.firstline {
  margin-left: 2 em;
}

.method  {
  margin-top: 1em;
  border: solid 1px #CCC;
  padding: 1em;
  background: #EEE;
}

.details {
  font-weight: bold;
  font-size: 14px;
}

</style>

<h1><a href="verifiedaccess_v1.html">Chrome Verified Access API</a> . <a href="verifiedaccess_v1.challenge.html">challenge</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
  <code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<p class="toc_element">
  <code><a href="#create">create(body=None, x__xgafv=None)</a></code></p>
<p class="firstline">CreateChallenge API</p>
<p class="toc_element">
  <code><a href="#verify">verify(body=None, x__xgafv=None)</a></code></p>
<p class="firstline">VerifyChallengeResponse API</p>
<h3>Method Details</h3>
<div class="method">
    <code class="details" id="close">close()</code>
  <pre>Close httplib2 connections.</pre>
</div>

<div class="method">
    <code class="details" id="create">create(body=None, x__xgafv=None)</code>
  <pre>CreateChallenge API

Args:
  body: object, The request body.
    The object takes the form of:

{ # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # Result message for VerifiedAccess.CreateChallenge.
  &quot;alternativeChallenge&quot;: { # The wrapper message of any data and its signature. # Challenge generated with the old signing key (this will only be present during key rotation)
    &quot;data&quot;: &quot;A String&quot;, # The data to be signed.
    &quot;signature&quot;: &quot;A String&quot;, # The signature of the data field.
  },
  &quot;challenge&quot;: { # The wrapper message of any data and its signature. # Generated challenge
    &quot;data&quot;: &quot;A String&quot;, # The data to be signed.
    &quot;signature&quot;: &quot;A String&quot;, # The signature of the data field.
  },
}</pre>
</div>

<div class="method">
    <code class="details" id="verify">verify(body=None, x__xgafv=None)</code>
  <pre>VerifyChallengeResponse API

Args:
  body: object, The request body.
    The object takes the form of:

{ # signed ChallengeResponse
  &quot;challengeResponse&quot;: { # The wrapper message of any data and its signature. # The generated response to the challenge
    &quot;data&quot;: &quot;A String&quot;, # The data to be signed.
    &quot;signature&quot;: &quot;A String&quot;, # The signature of the data field.
  },
  &quot;expectedIdentity&quot;: &quot;A String&quot;, # Service can optionally provide identity information about the device or user associated with the key. For an EMK, this value is the enrolled domain. For an EUK, this value is the user&#x27;s email address. If present, this value will be checked against contents of the response, and verification will fail if there is no match.
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # Result message for VerifiedAccess.VerifyChallengeResponse.
  &quot;attestedDeviceId&quot;: &quot;A String&quot;, # Attested device id (ADID) of the device, read from the verified data.
  &quot;deviceEnrollmentId&quot;: &quot;A String&quot;, # Device enrollment id is returned in this field (for the machine response only).
  &quot;devicePermanentId&quot;: &quot;A String&quot;, # Device permanent id is returned in this field (for the machine response only).
  &quot;signedPublicKeyAndChallenge&quot;: &quot;A String&quot;, # Certificate Signing Request (in the SPKAC format, base64 encoded) is returned in this field. This field will be set only if device has included CSR in its challenge response. (the option to include CSR is now available for both user and machine responses)
  &quot;verificationOutput&quot;: &quot;A String&quot;, # For EMCert check, device permanent id is returned here. For EUCert check, signed_public_key_and_challenge [base64 encoded] is returned if present, otherwise empty string is returned. This field is deprecated, please use device_permanent_id or signed_public_key_and_challenge fields.
}</pre>
</div>

</body></html>