Files
server/src/Core/Identity/AuthenticatorTokenProvider.cs

49 lines
1.7 KiB
C#
Raw Normal View History

2015-12-08 22:57:38 -05:00
using System;
using System.Threading.Tasks;
2016-05-19 19:10:24 -04:00
using Microsoft.AspNetCore.Identity;
2017-03-08 21:45:08 -05:00
using Bit.Core.Models.Table;
2015-12-08 22:57:38 -05:00
using Bit.Core.Enums;
using OtpNet;
using Bit.Core.Services;
using Microsoft.Extensions.DependencyInjection;
2015-12-08 22:57:38 -05:00
namespace Bit.Core.Identity
{
2016-05-19 19:10:24 -04:00
public class AuthenticatorTokenProvider : IUserTwoFactorTokenProvider<User>
2015-12-08 22:57:38 -05:00
{
private readonly IServiceProvider _serviceProvider;
public AuthenticatorTokenProvider(IServiceProvider serviceProvider)
2015-12-08 22:57:38 -05:00
{
_serviceProvider = serviceProvider;
}
public async Task<bool> CanGenerateTwoFactorTokenAsync(UserManager<User> manager, User user)
{
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Authenticator);
if(string.IsNullOrWhiteSpace((string)provider?.MetaData["Key"]))
{
return false;
}
return await user.TwoFactorProviderIsEnabledAsync(TwoFactorProviderType.Authenticator,
_serviceProvider.GetRequiredService<IUserService>());
2015-12-08 22:57:38 -05:00
}
public Task<string> GenerateAsync(string purpose, UserManager<User> manager, User user)
{
return Task.FromResult<string>(null);
}
public Task<bool> ValidateAsync(string purpose, string token, UserManager<User> manager, User user)
{
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Authenticator);
2017-06-21 21:46:52 -04:00
var otp = new Totp(Base32Encoding.ToBytes((string)provider.MetaData["Key"]));
2015-12-08 22:57:38 -05:00
long timeStepMatched;
var valid = otp.VerifyTotp(token, out timeStepMatched, new VerificationWindow(1, 1));
2015-12-08 22:57:38 -05:00
return Task.FromResult(valid);
}
}
}