Since we were not allowed to have MFA together with the same application we are using, I got an idea from my leader to just have a generated OTPs.
import time import hmac import base64 import struct import hashlib def generate_otp(secret, interval=30, digits=6): # Decode the base32 encoded secret key = base64.b32decode(secret) # Calculate the number of time intervals since the Unix epoch counter = int(time.time()) // interval # Convert the counter to bytes msg= struct.pack(">Q", counter) # Create the HMAC hash using SHA-1 hmac_hash = hmac.new(key, msg, hashlib.sha1).digest() # Get the dynamic offset from the last nibble of the hash offset = hmac_hash[-1] & 0x0F # Extract a 4-byte dynamic binary code form the hash using the offset code = struct.unpack(">I", hmac_hash[offset:offset + 4]) [0] & 0x7FFFFFFF # Modulus operation to get the final OTP otp = code % (10 ** digits) return str(otp).zfill(digits) # Lists for secret keys and remarks secret_keys_with_titles = { "[name]": "[secret_key]", "VAR": "ABDCDEFGHIJKLMNO", "VER": "PQRSTUVWXYZ12345", "VIR": "6789101112131415" } # ANSI escape codes for different color colors = [ "\033[91m", # Red "\033[92m", # Green "\033[94m", # Blue "\033[93m", # Yellow "\033[96m", # Cyan ] print() # Generate the OTPs for all secret keys otps = {title: generate_otp(secret) for title, secret in secret_keys_with_titles.items()} # Output the OTPs in horizontal way output = [] for i, (title, otp) in enumerate(otps.items()): color = colors[i % len(colors)] # Rotate through colors output.append(f"{color}{title}: {otp}\033[0m") #\033[0m resets the color print(" | ".join(output)) print()
So, this is how it look on your terminal:
위 내용은 Python3을 사용하여 OTP 생성의 상세 내용입니다. 자세한 내용은 PHP 중국어 웹사이트의 기타 관련 기사를 참조하세요!