Public/Utility/TOTP.ps1
<# .SYNOPSIS Time-Based One-Time Password (TOTP) Generator .DESCRIPTION Generates TOTP codes according to RFC 6238 (TOTP) and RFC 4226 (HOTP) for use with OATH hardware tokens, authenticator apps, and more. .PARAMETER Secret The secret key used to generate the TOTP code .PARAMETER Digits The number of digits in the generated TOTP code. Defaults to 6. .PARAMETER TimeStep The time step in seconds. Defaults to 30. .PARAMETER UnixTime Unix timestamp to use for TOTP generation. If not specified, current time is used. .PARAMETER Window Time window for which the code is valid (in steps). Defaults to 1. .PARAMETER InputFormat Format of the input secret key. Can be Base32, Hex, or Text. Defaults to Base32. .EXAMPLE Get-TOTP -Secret "JBSWY3DPEB3W64TMMQ======" Generates a TOTP code using a Base32-encoded secret key .EXAMPLE Get-TOTP -Secret "3a085cfcd4618c61dc235c300d7a70c4" -InputFormat Hex Generates a TOTP code using a hexadecimal secret key .EXAMPLE Get-TOTP -Secret "MySecretKey" -InputFormat Text -Digits 8 -TimeStep 60 Generates an 8-digit TOTP code with a 60-second validity using a text secret .NOTES This implementation follows the RFC specifications for TOTP and works with common authenticator apps and hardware tokens. #> function Get-TOTP { [CmdletBinding()] [OutputType([string])] param( [Parameter(Mandatory = $true, Position = 0)] [string]$Secret, [Parameter()] [ValidateRange(6, 10)] [int]$Digits = 6, [Parameter()] [ValidateRange(10, 300)] [int]$TimeStep = 30, [Parameter()] [int64]$UnixTime = -1, [Parameter()] [ValidateRange(1, 10)] [int]$Window = 1, [Parameter()] [ValidateSet('Base32', 'Hex', 'Text')] [string]$InputFormat = 'Base32', [Parameter()] [ValidateSet('SHA1', 'SHA256', 'SHA512')] [string]$Algorithm = 'SHA1' ) begin { # Convert Base32 to bytes function ConvertFrom-Base32 { param([string]$Base32) # Remove any padding and spaces $Base32 = $Base32.ToUpper() -replace '=+$' -replace '\s', '' $Alphabet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567" $bitsBuffer = "" foreach ($char in $Base32.ToCharArray()) { $index = $Alphabet.IndexOf($char) if ($index -lt 0) { throw "Invalid Base32 character: $char" } $bitsBuffer += [Convert]::ToString($index, 2).PadLeft(5, '0') } # Group bits into 8-bit chunks for bytes $bytes = [System.Collections.Generic.List[byte]]::new() for ($i = 0; $i -lt $bitsBuffer.Length; $i += 8) { # If we don't have 8 bits left, we've reached partial padding that should be ignored if ($i + 8 -gt $bitsBuffer.Length) { break } $byteValue = [Convert]::ToByte($bitsBuffer.Substring($i, 8), 2) $bytes.Add($byteValue) } return $bytes.ToArray() } # Convert hex to bytes function ConvertFrom-Hex { param([string]$HexString) # Clean up the hex string (remove spaces, dashes, etc.) $HexString = $HexString -replace '[-: ]', '' # Ensure it's even length if ($HexString.Length % 2 -ne 0) { throw "Hexadecimal string must have an even number of characters" } # Convert to bytes $bytes = [byte[]]::new($HexString.Length / 2) for ($i = 0; $i -lt $HexString.Length; $i += 2) { $bytes[$i/2] = [Convert]::ToByte($HexString.Substring($i, 2), 16) } return $bytes } } process { try { # Remove spaces from secret $Secret = $Secret -replace "\s", "" # Convert secret to bytes based on input format $secretBytes = $null switch ($InputFormat) { 'Base32' { $secretBytes = ConvertFrom-Base32 -Base32 $Secret } 'Hex' { $secretBytes = ConvertFrom-Hex -HexString $Secret } 'Text' { $secretBytes = [System.Text.Encoding]::UTF8.GetBytes($Secret) } default { throw "Invalid input format: $InputFormat" } } # Verify we have valid secret bytes if ($null -eq $secretBytes -or $secretBytes.Length -eq 0) { throw "Failed to convert secret to byte array" } # Use current Unix time if not specified if ($UnixTime -lt 0) { $UnixTime = [DateTimeOffset]::UtcNow.ToUnixTimeSeconds() } # Calculate counter value (time steps from Unix epoch) $counter = [Math]::Floor($UnixTime / $TimeStep) # Initialize result array with the current time's TOTP $results = @() # Calculate TOTP for the current counter and adjacent windows if requested for ($i = -($Window - 1); $i -lt $Window; $i++) { $currentCounter = $counter + $i # Convert counter to bytes (big-endian) $counterBytes = [BitConverter]::GetBytes([int64]$currentCounter) if ([BitConverter]::IsLittleEndian) { [Array]::Reverse($counterBytes) } # Create the HMAC object $hmac = switch ($Algorithm) { 'SHA1' { New-Object System.Security.Cryptography.HMACSHA1 } 'SHA256' { New-Object System.Security.Cryptography.HMACSHA256 } 'SHA512' { New-Object System.Security.Cryptography.HMACSHA512 } } $hmac.Key = $secretBytes # Compute the HMAC $hash = $hmac.ComputeHash($counterBytes) # Get the offset $offset = $hash[$hash.Length - 1] -band 0x0F # Get the 4 bytes at the offset $binary = (($hash[$offset] -band 0x7F) -shl 24) -bor (($hash[$offset + 1] -band 0xFF) -shl 16) -bor (($hash[$offset + 2] -band 0xFF) -shl 8) -bor ($hash[$offset + 3] -band 0xFF) # Calculate the OTP code $otp = $binary % [Math]::Pow(10, $Digits) # Format the OTP code with leading zeros # Fix: Use explicit int cast before ToString to avoid floating point issues $otpInt = [int]$otp $otpString = $otpInt.ToString("D$Digits") # Create a result object $result = [PSCustomObject]@{ OTP = $otpString Counter = $currentCounter Time = [DateTimeOffset]::FromUnixTimeSeconds($currentCounter * $TimeStep) IsCurrentWindow = ($i -eq 0) } $results += $result } # Return the single result for the current time or an array if multiple windows if ($Window -eq 1) { return $results[0].OTP } else { return $results } } catch { Write-Error "Error generating TOTP: $_" return $null } } } # Helper function to check if a given TOTP code is valid for a secret function Test-TOTP { [CmdletBinding()] [OutputType([bool])] param( [Parameter(Mandatory = $true, Position = 0)] [string]$Secret, [Parameter(Mandatory = $true, Position = 1)] [string]$Code, [Parameter()] [int]$Digits = 6, [Parameter()] [int]$TimeStep = 30, [Parameter()] [int]$Window = 1, [Parameter()] [ValidateSet('Base32', 'Hex', 'Text')] [string]$InputFormat = 'Base32', [Parameter()] [ValidateSet('SHA1', 'SHA256', 'SHA512')] [string]$Algorithm = 'SHA1' ) try { # Ensure code is the expected length if ($Code.Length -ne $Digits) { Write-Warning "Code length mismatch: expected $Digits digits, got $($Code.Length)" return $false } # Get valid TOTPs for the current time window $validTotps = Get-TOTP -Secret $Secret -Digits $Digits -TimeStep $TimeStep -Window $Window -InputFormat $InputFormat -Algorithm $Algorithm # Handle single vs. multiple results if ($Window -eq 1) { return $validTotps -eq $Code } else { return $validTotps.OTP -contains $Code } } catch { Write-Error "Error validating TOTP: $_" return $false } } # Better export logic that works in both module and script contexts if ($MyInvocation.MyCommand.ScriptBlock.Module) { # Module context - use standard PowerShell module export Export-ModuleMember -Function Get-TOTP, Test-TOTP } else { # Script context (e.g., dot-sourced) - define in global scope Write-Verbose "Not in module context, making functions available in global scope" # Create function in global scope if they don't exist if (-not (Get-Command -Name 'Get-TOTP' -ErrorAction SilentlyContinue)) { Set-Item -Path function:global:Get-TOTP -Value ${function:Get-TOTP} } if (-not (Get-Command -Name 'Test-TOTP' -ErrorAction SilentlyContinue)) { Set-Item -Path function:global:Test-TOTP -Value ${function:Test-TOTP} } } |