Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) TOTP Algorithm: Time-Based One-Time Password AlgorithmDemonstrates how to generate an time-based one-time password (TOTP) as specified in RFC 6238. This is the algorithm used by Google Authenticator. Note: This example requires Chilkat v9.5.0.77 or greater.
#include <C_CkCrypt2W.h> void ChilkatSample(void) { HCkCrypt2W crypt; const wchar_t *seed; const wchar_t *seed32; const wchar_t *seed64; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. crypt = CkCrypt2W_Create(); // Duplicate the following results from RFC 6238 // TOTP Algorithm: Test Values // // +-------------+--------------+------------------+----------+--------+ // | Time (sec) | UTC Time | Value of T (hex) | TOTP | Mode | // +-------------+--------------+------------------+----------+--------+ // | 59 | 1970-01-01 | 0000000000000001 | 94287082 | SHA1 | // | | 00:00:59 | | | | // | 59 | 1970-01-01 | 0000000000000001 | 46119246 | SHA256 | // | | 00:00:59 | | | | // | 59 | 1970-01-01 | 0000000000000001 | 90693936 | SHA512 | // | | 00:00:59 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 07081804 | SHA1 | // | | 01:58:29 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 68084774 | SHA256 | // | | 01:58:29 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 25091201 | SHA512 | // | | 01:58:29 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 14050471 | SHA1 | // | | 01:58:31 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 67062674 | SHA256 | // | | 01:58:31 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 99943326 | SHA512 | // | | 01:58:31 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 89005924 | SHA1 | // | | 23:31:30 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 91819424 | SHA256 | // | | 23:31:30 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 93441116 | SHA512 | // | | 23:31:30 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 69279037 | SHA1 | // | | 03:33:20 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 90698825 | SHA256 | // | | 03:33:20 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 38618901 | SHA512 | // | | 03:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 65353130 | SHA1 | // | | 11:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 77737706 | SHA256 | // | | 11:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 47863826 | SHA512 | // | | 11:33:20 | | | | // +-------------+--------------+------------------+----------+--------+ // Seed for HMAC-SHA1 seed = L"3132333435363738393031323334353637383930"; // Seed for HMAC-SHA256 - 32 bytes seed32 = L"3132333435363738393031323334353637383930313233343536373839303132"; // Seed for HMAC-SHA512 - 64 bytes seed64 = L"31323334353637383930313233343536373839303132333435363738393031323334353637383930313233343536373839303132333435363738393031323334"; // See the online reference documentation for an explanation of arguments. wprintf(L"TOTP(59,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"59",30,8,-1,L"sha1")); wprintf(L"TOTP(59,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"59",30,8,-1,L"sha256")); wprintf(L"TOTP(59,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"59",30,8,-1,L"sha512")); wprintf(L"TOTP(1111111109,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"1111111109",30,8,-1,L"sha1")); wprintf(L"TOTP(1111111109,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"1111111109",30,8,-1,L"sha256")); wprintf(L"TOTP(1111111109,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"1111111109",30,8,-1,L"sha512")); wprintf(L"TOTP(1111111111,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"1111111111",30,8,-1,L"sha1")); wprintf(L"TOTP(1111111111,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"1111111111",30,8,-1,L"sha256")); wprintf(L"TOTP(1111111111,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"1111111111",30,8,-1,L"sha512")); wprintf(L"TOTP(1234567890,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"1234567890",30,8,-1,L"sha1")); wprintf(L"TOTP(1234567890,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"1234567890",30,8,-1,L"sha256")); wprintf(L"TOTP(1234567890,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"1234567890",30,8,-1,L"sha512")); wprintf(L"TOTP(2000000000,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"2000000000",30,8,-1,L"sha1")); wprintf(L"TOTP(2000000000,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"2000000000",30,8,-1,L"sha256")); wprintf(L"TOTP(2000000000,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"2000000000",30,8,-1,L"sha512")); wprintf(L"TOTP(20000000000,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"20000000000",30,8,-1,L"sha1")); wprintf(L"TOTP(20000000000,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"20000000000",30,8,-1,L"sha256")); wprintf(L"TOTP(20000000000,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"20000000000",30,8,-1,L"sha512")); // Note: To compute the TOTP using the current system date/time, pass an empty string instead of an explicit time. // For example: wprintf(L"TOTP(CurrentSystemTime,sha1) %s\n",CkCrypt2W_totp(crypt,seed,L"hex",L"0",L"",30,8,-1,L"sha1")); wprintf(L"TOTP(CurrentSystemTime,sha256) %s\n",CkCrypt2W_totp(crypt,seed32,L"hex",L"0",L"",30,8,-1,L"sha256")); wprintf(L"TOTP(CurrentSystemTime,sha512) %s\n",CkCrypt2W_totp(crypt,seed64,L"hex",L"0",L"",30,8,-1,L"sha512")); CkCrypt2W_Dispose(crypt); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.