-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtotp.go
95 lines (72 loc) · 1.78 KB
/
totp.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
package main
import (
"crypto/hmac"
"crypto/sha512"
"encoding/hex"
"fmt"
"hash"
"math"
"time"
)
// hmac_sha provides the crypto algorithm.
// it computes a Hashed Message Authentication Code with the
// crypto hash algorithm as a parameter
func hmacSha(h func() hash.Hash, key []byte, text []byte) []byte {
mac := hmac.New(h, key)
mac.Write(text)
return mac.Sum(nil)
}
// hexStr2Bytes converts a HEX string to []byte
func hexStr2Bytes(s string) []byte {
data, err := hex.DecodeString(s)
if err != nil {
panic(err)
}
return data
}
// generateTOTP generates a TOTP value for the given set of
// parameters.
func generateTOTP(key string, timeStr string, returnDigits int, crypto func() hash.Hash) string {
var result string
//using the counter. First 8 bytes are for the moving factor
//complaint with base RFC 4226 (HOTP)
for len(timeStr) < 16 {
timeStr = "0" + timeStr
}
// Get the HEX in a byte
msg := hexStr2Bytes(timeStr)
k := hexStr2Bytes(key)
h := hmacSha(crypto, k, msg)
//put selected bytes into result int
offset := h[len(h)-1] & 0xf
b := (uint64(h[offset])&0x7f)<<24 |
(uint64(h[offset+1])&0xff)<<16 |
(uint64(h[offset+2])&0xff)<<8 |
(uint64(h[offset+3]) & 0xff)
otp := int64(b) % int64(math.Pow10(returnDigits))
fmt.Sprintf("%d", otp)
result = fmt.Sprintf("%d", otp)
for len(result) < returnDigits {
result = "0" + result
}
return result
}
func secret(key string) string {
return hex.EncodeToString([]byte(key))
}
func main() {
var t0 int64 = 0
var x int64 = 30
steps := "0"
var te int64 = time.Now().Unix()
t := (te - t0) / x
fmt.Println(t)
steps = fmt.Sprintf("%X", t)
fmt.Println(steps)
for len(steps) < 16 {
steps = "0" + steps
}
seed := secret("your_secret")
s := generateTOTP(seed, steps, 10, sha512.New)
fmt.Println(s)
}