botp
v2.3.2
Published
Browser One Time Password library, supports HOTP, TOTP and works with Google Authenticator
Downloads
116
Readme
Browser One Time Password library
Fork from notp for support browser.
Installation
npm install botp
Usage
var botp = require('botp');
//.... some initial login code, that receives the user details and TOTP / HOTP token
var key = 'secret key for user... could be stored in DB';
var token = 'user supplied one time use token';
// Check TOTP is correct (HOTP if hotp pass type)
var login = botp.totp.verify(token, key);
// invalid token if login is null
if (!login) {
return console.log('Token invalid');
}
// valid token
console.log('Token valid, sync value is %s', login.delta);
Google Authenticator
Google authenticator requires that keys be base32 encoded before being used. This includes manual entry into the app as well as preparing a QR code URI.
var base32 = require('botp/base32');
var key = 'secret key for the user';
// encoded will be the secret key, base32 encoded
var encoded = base32.encode(key);
// Google authenticator doesn't like equal signs
var encodedForGoogle = encoded.toString().replace(/=/g,'');
// to create a URI for a qr code (change totp to hotp if using hotp)
var uri = 'otpauth://totp/somelabel?secret=' + encodedForGoogle;
Note: If your label has spaces or other invalid uri characters you will need to encode it accordingly using encodeURIComponent
More details about the uri key format can be found on the google auth wiki
API
hotp.verify(token, key, opt)
Check a counter based one time password for validity.
Returns null if token is not valid for given key and options.
Returns an object {delta: #}
if the token is valid. delta
is the count skew between client and server.
opt
window
The allowable margin for the counter. The function will check
window
codes in the future against the provided token. i.e. ifwindow = 100
andcounter = 5
all tokens between 5 and 105 will be checked against the supplied token Default - 50
counter
Counter value. This should be stored by the application on a per user basis. It is up to the application to track and increment this value as needed. It is also up to the application to increment this value if there is a skew between the client and server (
delta
)
totp.verify(token, key, opt)
Check a time based one time password for validity
Returns null if token is not valid for given key and options.
Returns an object {delta: #}
if the token is valid. delta
is the count skew between client and server.
opt
window
The allowable margin for the counter. The function will check
window
codes in the future against the provided token. i.e. ifwindow = 5
andcounter = 1000
all tokens between 995 and 1005 will be checked against the supplied token Default - 6
time
The time step of the counter. This must be the same for every request and is used to calculate C. Default - 30
hotp.gen(key, opt)
Return a counter based one time password
opt
counter
Counter value. This should be stored by the application, must be user specific, and be incremented for each request.
totp.gen(key, opt)
Return a time based one time password
opt
time
The time step of the counter. This must be the same for every request and is used to calculate C. Default - 30