08-21-2024, 09:44 PM
OK to break this down, as I am not having luck, cannot use the above SHA** as they do not interchange
Here is what I need to do to make this work. I pulled this from the python script above
[*]Handle Base32 Decoding: Convert the secret key from base32. (qb64 working)
[*]Time Calculation: Calculate the current Unix timestamp and divide it by the time step (e.g., 30 seconds). (qb64 mostly working)
[*]HMAC-SHA1 Implementation: Implement or use a library for HMAC-SHA1. (qb64 stuck)
[*]Truncate the Result: Truncate the HMAC result to produce the 6-digit OTP.( cant test til the above work)
[*]
[*]So trying to make the HMAC-SHA1 to work, but the above doesn't seem to be working right,.
Here is what I need to do to make this work. I pulled this from the python script above
[*]Handle Base32 Decoding: Convert the secret key from base32. (qb64 working)
[*]Time Calculation: Calculate the current Unix timestamp and divide it by the time step (e.g., 30 seconds). (qb64 mostly working)
[*]HMAC-SHA1 Implementation: Implement or use a library for HMAC-SHA1. (qb64 stuck)
[*]Truncate the Result: Truncate the HMAC result to produce the 6-digit OTP.( cant test til the above work)
[*]
[*]So trying to make the HMAC-SHA1 to work, but the above doesn't seem to be working right,.
3 out of 2 people have trouble with fractions