/
validator.go
79 lines (64 loc) · 1.49 KB
/
validator.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
package totp
import (
"regexp"
"time"
)
type Validator struct {
Algorithm Algorithm
Digits uint8
Period uint64
Secret string
}
func (v Validator) Validate(code string) (bool, error) {
// validate validator info
err := v.validateData()
if err != nil {
return false, err
}
// generate totp based on current timestamp
generatedCode, err := generateTotp(v.Secret, time.Now().UTC().Unix(), v.Algorithm, v.Digits, v.Period)
if err != nil {
return false, err
}
// check if code is valid
if code == generatedCode {
return true, nil
}
return false, nil
}
func (v Validator) ValidateWithTimestamp(code string, timestamp int64) (bool, error) {
// validate validator info
err := v.validateData()
if err != nil {
return false, err
}
// generate totp based on timestamp parameter
generatedCode, err := generateTotp(v.Secret, timestamp, v.Algorithm, v.Digits, v.Period)
if err != nil {
return false, err
}
// check if code is valid
if code == generatedCode {
return true, nil
}
return false, nil
}
func (v Validator) validateData() error {
// validate algorithm
if v.Algorithm != AlgorithmSHA1 && v.Algorithm != AlgorithmSHA256 && v.Algorithm != AlgorithmSHA512 {
return ErrInvalidAlgorithm
}
// validate digits
if v.Digits == 0 || v.Digits > 10 {
return ErrInvalidDigits
}
// validate period
if v.Period == 0 {
return ErrInvalidPeriod
}
// validate secret
if !regexp.MustCompile("^[A-Z2-7]+$").MatchString(v.Secret) {
return ErrInvalidSecret
}
return nil
}