line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Auth::GoogleAuth; |
2
|
|
|
|
|
|
|
# ABSTRACT: Google Authenticator TBOT Abstraction |
3
|
|
|
|
|
|
|
|
4
|
1
|
|
|
1
|
|
173278
|
use 5.008; |
|
1
|
|
|
|
|
7
|
|
5
|
1
|
|
|
1
|
|
4
|
use strict; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
14
|
|
6
|
1
|
|
|
1
|
|
3
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
19
|
|
7
|
|
|
|
|
|
|
|
8
|
1
|
|
|
1
|
|
3
|
use base 'Class::Accessor'; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
375
|
|
9
|
|
|
|
|
|
|
|
10
|
1
|
|
|
1
|
|
1692
|
use Digest::HMAC_SHA1 'hmac_sha1_hex'; |
|
1
|
|
|
|
|
3781
|
|
|
1
|
|
|
|
|
42
|
|
11
|
1
|
|
|
1
|
|
332
|
use Math::Random::MT 'rand'; |
|
1
|
|
|
|
|
729
|
|
|
1
|
|
|
|
|
4
|
|
12
|
1
|
|
|
1
|
|
340
|
use URI::Escape 'uri_escape'; |
|
1
|
|
|
|
|
1130
|
|
|
1
|
|
|
|
|
45
|
|
13
|
1
|
|
|
1
|
|
312
|
use Convert::Base32 qw( encode_base32 decode_base32 ); |
|
1
|
|
|
|
|
1057
|
|
|
1
|
|
|
|
|
46
|
|
14
|
1
|
|
|
1
|
|
5
|
use Carp 'croak'; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
637
|
|
15
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
our $VERSION = '1.04'; # VERSION |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
my @accessors = qw( secret secret32 issuer key_id otpauth ); |
19
|
|
|
|
|
|
|
__PACKAGE__->mk_accessors(@accessors); |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
sub generate_secret32 { |
22
|
2
|
|
|
2
|
1
|
12731
|
my ($self) = @_; |
23
|
2
|
|
|
|
|
28
|
my @chars = ( 'a' .. 'z', 2 .. 7 ); |
24
|
2
|
|
|
|
|
7
|
return $self->secret32( join( '', @chars[ map { rand( scalar(@chars) ) } 1 .. 16 ] ) ); |
|
32
|
|
|
|
|
268
|
|
25
|
|
|
|
|
|
|
} |
26
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
sub clear { |
28
|
1
|
|
|
1
|
1
|
2215
|
my ($self) = @_; |
29
|
1
|
|
|
|
|
8
|
$self->$_(undef) for (@accessors); |
30
|
1
|
|
|
|
|
50
|
return; |
31
|
|
|
|
|
|
|
} |
32
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
sub qr_code { |
34
|
3
|
|
|
3
|
1
|
1826
|
my ( $self, $secret32, $key_id, $issuer, $return_otpauth ) = @_; |
35
|
3
|
|
|
|
|
9
|
$self->_secret_check($secret32); |
36
|
|
|
|
|
|
|
|
37
|
3
|
100
|
|
|
|
7
|
$self->key_id($key_id) if ($key_id); |
38
|
3
|
100
|
|
|
|
19
|
$self->issuer($issuer) if ($issuer); |
39
|
|
|
|
|
|
|
|
40
|
3
|
100
|
|
|
|
15
|
$self->key_id('Undefined') unless ( $self->key_id ); |
41
|
3
|
100
|
|
|
|
35
|
$self->issuer('Undefined') unless ( $self->issuer ); |
42
|
|
|
|
|
|
|
|
43
|
3
|
|
|
|
|
31
|
$self->otpauth( |
44
|
|
|
|
|
|
|
'otpauth://totp/' . |
45
|
|
|
|
|
|
|
uri_escape( $self->issuer ) . ':' . uri_escape( $self->key_id ) . |
46
|
|
|
|
|
|
|
'?secret=' . $self->secret32 . '&issuer=' . uri_escape( $self->issuer ) |
47
|
|
|
|
|
|
|
); |
48
|
|
|
|
|
|
|
|
49
|
3
|
100
|
|
|
|
252
|
return ($return_otpauth) |
50
|
|
|
|
|
|
|
? $self->otpauth |
51
|
|
|
|
|
|
|
: 'https://chart.googleapis.com/chart?chs=200x200&cht=qr&chl=' . uri_escape( $self->otpauth ); |
52
|
|
|
|
|
|
|
} |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
sub code { |
55
|
25
|
|
|
25
|
1
|
236
|
my ( $self, $secret32, $timestamp, $interval ) = @_; |
56
|
25
|
|
|
|
|
37
|
$self->_secret_check($secret32); |
57
|
|
|
|
|
|
|
|
58
|
25
|
|
33
|
|
|
32
|
$timestamp ||= time; |
59
|
25
|
|
100
|
|
|
42
|
$interval ||= 30; |
60
|
|
|
|
|
|
|
|
61
|
25
|
|
|
|
|
90
|
my $hmac = hmac_sha1_hex( |
62
|
|
|
|
|
|
|
pack( 'H*', sprintf( '%016x', int( $timestamp / $interval ) ) ), |
63
|
|
|
|
|
|
|
_decode_base32( $self->secret32 ), |
64
|
|
|
|
|
|
|
); |
65
|
|
|
|
|
|
|
|
66
|
25
|
|
|
|
|
491
|
return sprintf( |
67
|
|
|
|
|
|
|
'%06d', |
68
|
|
|
|
|
|
|
( hex( substr( $hmac, hex( substr( $hmac, -1 ) ) * 2, 8 ) ) & 0x7fffffff ) % 1000000 |
69
|
|
|
|
|
|
|
); |
70
|
|
|
|
|
|
|
} |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
sub verify { |
73
|
5
|
|
|
5
|
1
|
13
|
my ( $self, $code, $range, $secret32, $timestamp, $interval ) = @_; |
74
|
5
|
|
|
|
|
10
|
$self->_secret_check($secret32); |
75
|
|
|
|
|
|
|
|
76
|
5
|
|
50
|
|
|
11
|
$code ||= ''; |
77
|
5
|
|
100
|
|
|
14
|
$range ||= 0; |
78
|
5
|
|
33
|
|
|
6
|
$timestamp ||= time; |
79
|
5
|
|
50
|
|
|
17
|
$interval ||= 30; |
80
|
|
|
|
|
|
|
|
81
|
5
|
50
|
33
|
|
|
30
|
croak('Range value not zero or a positive number') unless ( $range =~ /^\d+$/ and $range >= 0 ); |
82
|
|
|
|
|
|
|
|
83
|
5
|
|
|
|
|
10
|
for ( 0 .. $range ) { |
84
|
9
|
100
|
100
|
|
|
24
|
return 1 if ( |
|
|
|
66
|
|
|
|
|
|
|
|
100
|
|
|
|
|
85
|
|
|
|
|
|
|
not $_ and $code eq $self->code( $secret32, $timestamp, $interval ) |
86
|
|
|
|
|
|
|
or |
87
|
|
|
|
|
|
|
$code eq $self->code( $secret32, $timestamp + $interval * $_, $interval ) |
88
|
|
|
|
|
|
|
or |
89
|
|
|
|
|
|
|
$code eq $self->code( $secret32, $timestamp - $interval * $_, $interval ) |
90
|
|
|
|
|
|
|
); |
91
|
|
|
|
|
|
|
} |
92
|
|
|
|
|
|
|
|
93
|
2
|
|
|
|
|
8
|
return 0; |
94
|
|
|
|
|
|
|
} |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
sub _secret_check { |
97
|
33
|
|
|
33
|
|
39
|
my ( $self, $secret32 ) = @_; |
98
|
|
|
|
|
|
|
|
99
|
33
|
100
|
|
|
|
108
|
if ($secret32) { |
100
|
30
|
|
|
|
|
57
|
$self->secret32($secret32); |
101
|
30
|
|
|
|
|
239
|
$self->secret( _decode_base32($secret32) ); |
102
|
|
|
|
|
|
|
} |
103
|
|
|
|
|
|
|
|
104
|
33
|
100
|
|
|
|
239
|
if ( not $self->secret32 ) { |
105
|
1
|
50
|
|
|
|
22
|
if ( not $self->secret ) { |
106
|
1
|
|
|
|
|
12
|
$self->secret( _decode_base32( $self->generate_secret32 ) ); |
107
|
|
|
|
|
|
|
} |
108
|
|
|
|
|
|
|
else { |
109
|
0
|
|
|
|
|
0
|
$self->secret32( encode_base32( $self->secret ) ); |
110
|
|
|
|
|
|
|
} |
111
|
|
|
|
|
|
|
} |
112
|
|
|
|
|
|
|
|
113
|
33
|
|
|
|
|
242
|
return; |
114
|
|
|
|
|
|
|
} |
115
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
sub _decode_base32 { |
117
|
56
|
|
|
56
|
|
233
|
my ($data) = @_; |
118
|
56
|
|
|
|
|
53
|
my $rv; |
119
|
56
|
|
|
|
|
54
|
eval{ $rv = decode_base32($data) }; |
|
56
|
|
|
|
|
76
|
|
120
|
56
|
50
|
|
|
|
2289
|
croak("Error decoding what should be base32 data: $data") |
121
|
|
|
|
|
|
|
if ( $@ =~ /Data contains non-base32 characters/ ); |
122
|
56
|
|
|
|
|
112
|
return $rv; |
123
|
|
|
|
|
|
|
} |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
1; |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
__END__ |