@otplib/v12-adapter 13.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js ADDED
@@ -0,0 +1,509 @@
1
+ // src/hotp.ts
2
+ import { stringToBytes, hexToBytes, dynamicTruncate, truncateDigits } from "@otplib/core";
3
+ import { generateSync as hotpGenerateSync, verifySync as hotpVerifySync } from "@otplib/hotp";
4
+ import { ScureBase32Plugin } from "@otplib/plugin-base32-scure";
5
+ import { NobleCryptoPlugin } from "@otplib/plugin-crypto-noble";
6
+ import { generateHOTP as generateHOTPURI } from "@otplib/uri";
7
+
8
+ // src/types.ts
9
+ var HashAlgorithms = {
10
+ SHA1: "sha1",
11
+ SHA256: "sha256",
12
+ SHA512: "sha512"
13
+ };
14
+ var KeyEncodings = {
15
+ ASCII: "ascii",
16
+ HEX: "hex",
17
+ BASE32: "base32",
18
+ BASE64: "base64",
19
+ LATIN1: "latin1",
20
+ UTF8: "utf8"
21
+ };
22
+
23
+ // src/hotp.ts
24
+ var defaultCrypto = new NobleCryptoPlugin();
25
+ var defaultBase32 = new ScureBase32Plugin();
26
+ function secretToBytes(secret, encoding) {
27
+ if (encoding === KeyEncodings.BASE32 || encoding === "base32") {
28
+ return defaultBase32.decode(secret);
29
+ }
30
+ if (encoding === KeyEncodings.HEX || encoding === "hex") {
31
+ return hexToBytes(secret.replace(/\s/g, ""));
32
+ }
33
+ return stringToBytes(secret);
34
+ }
35
+ function hotpDigestToToken(hexDigest, digits) {
36
+ const digestBytes = hexToBytes(hexDigest);
37
+ const truncated = dynamicTruncate(digestBytes);
38
+ return truncateDigits(truncated, digits);
39
+ }
40
+ var HOTP = class _HOTP {
41
+ /**
42
+ * Stored options that can be modified
43
+ */
44
+ _options = {};
45
+ /**
46
+ * Default options applied to all operations
47
+ */
48
+ _defaultOptions = {};
49
+ constructor(defaultOptions = {}) {
50
+ this._defaultOptions = { ...defaultOptions };
51
+ this._options = {};
52
+ }
53
+ /**
54
+ * Get current options (merged with defaults)
55
+ */
56
+ get options() {
57
+ return { ...this._defaultOptions, ...this._options };
58
+ }
59
+ /**
60
+ * Set options (replaces current options)
61
+ */
62
+ set options(value) {
63
+ this._options = { ...value };
64
+ }
65
+ /**
66
+ * Creates a new instance with the specified default options
67
+ */
68
+ create(defaultOptions = {}) {
69
+ return new _HOTP(defaultOptions);
70
+ }
71
+ /**
72
+ * Returns class options polyfilled with default values
73
+ */
74
+ allOptions() {
75
+ const merged = {
76
+ algorithm: HashAlgorithms.SHA1,
77
+ digits: 6,
78
+ encoding: KeyEncodings.ASCII,
79
+ crypto: defaultCrypto,
80
+ base32: defaultBase32,
81
+ ...this._defaultOptions,
82
+ ...this._options
83
+ };
84
+ return Object.freeze(merged);
85
+ }
86
+ /**
87
+ * Reset options to defaults
88
+ */
89
+ resetOptions() {
90
+ this._options = {};
91
+ return this;
92
+ }
93
+ /**
94
+ * Generate an HOTP token
95
+ */
96
+ generate(secret, counter) {
97
+ const opts = this.allOptions();
98
+ const secretBytes = secretToBytes(secret, opts.encoding);
99
+ return hotpGenerateSync({
100
+ secret: secretBytes,
101
+ counter,
102
+ algorithm: opts.algorithm,
103
+ digits: opts.digits,
104
+ crypto: opts.crypto
105
+ });
106
+ }
107
+ /**
108
+ * Check if a token is valid for the given secret and counter
109
+ */
110
+ check(token, secret, counter) {
111
+ const opts = this.allOptions();
112
+ const secretBytes = secretToBytes(secret, opts.encoding);
113
+ try {
114
+ const result = hotpVerifySync({
115
+ secret: secretBytes,
116
+ token,
117
+ counter,
118
+ algorithm: opts.algorithm,
119
+ digits: opts.digits,
120
+ counterTolerance: 0,
121
+ crypto: opts.crypto
122
+ });
123
+ return result.valid;
124
+ } catch {
125
+ return false;
126
+ }
127
+ }
128
+ /**
129
+ * Verify a token (object-based API)
130
+ */
131
+ verify(opts) {
132
+ if (typeof opts !== "object") {
133
+ throw new Error("Expecting argument 0 of verify to be an object");
134
+ }
135
+ return this.check(opts.token, opts.secret, opts.counter);
136
+ }
137
+ /**
138
+ * Generate an otpauth:// URI for HOTP
139
+ */
140
+ keyuri(accountName, issuer, secret, counter) {
141
+ const opts = this.allOptions();
142
+ return generateHOTPURI({
143
+ label: accountName,
144
+ issuer,
145
+ secret,
146
+ algorithm: opts.algorithm,
147
+ digits: opts.digits,
148
+ counter
149
+ });
150
+ }
151
+ };
152
+
153
+ // src/totp.ts
154
+ import { ScureBase32Plugin as ScureBase32Plugin2 } from "@otplib/plugin-base32-scure";
155
+ import { NobleCryptoPlugin as NobleCryptoPlugin2 } from "@otplib/plugin-crypto-noble";
156
+ import {
157
+ generateSync as totpGenerateSync,
158
+ verifySync as totpVerifySync,
159
+ getRemainingTime
160
+ } from "@otplib/totp";
161
+ import { generateTOTP as generateTOTPURI } from "@otplib/uri";
162
+ var defaultCrypto2 = new NobleCryptoPlugin2();
163
+ var defaultBase322 = new ScureBase32Plugin2();
164
+ function parseWindow(window, step) {
165
+ if (window === void 0 || window === 0) {
166
+ return 0;
167
+ }
168
+ if (typeof window === "number") {
169
+ return window * step;
170
+ }
171
+ return [window[0] * step, window[1] * step];
172
+ }
173
+ var TOTP = class _TOTP extends HOTP {
174
+ constructor(defaultOptions = {}) {
175
+ super(defaultOptions);
176
+ }
177
+ /**
178
+ * Creates a new TOTP instance with the specified default options
179
+ */
180
+ create(defaultOptions = {}) {
181
+ return new _TOTP(defaultOptions);
182
+ }
183
+ /**
184
+ * Returns class options polyfilled with TOTP default values
185
+ */
186
+ allOptions() {
187
+ const merged = {
188
+ algorithm: HashAlgorithms.SHA1,
189
+ digits: 6,
190
+ encoding: KeyEncodings.ASCII,
191
+ epoch: Date.now(),
192
+ step: 30,
193
+ window: 0,
194
+ crypto: defaultCrypto2,
195
+ base32: defaultBase322,
196
+ ...this._defaultOptions,
197
+ ...this._options
198
+ };
199
+ return Object.freeze(merged);
200
+ }
201
+ /**
202
+ * Generate a TOTP token
203
+ *
204
+ * @param secret - The secret key
205
+ * @returns The OTP token
206
+ */
207
+ generate(secret) {
208
+ const opts = this.allOptions();
209
+ const secretBytes = secretToBytes(secret, opts.encoding);
210
+ const epochSeconds = Math.floor(opts.epoch / 1e3);
211
+ return totpGenerateSync({
212
+ secret: secretBytes,
213
+ algorithm: opts.algorithm,
214
+ digits: opts.digits,
215
+ period: opts.step,
216
+ epoch: epochSeconds,
217
+ t0: 0,
218
+ crypto: opts.crypto
219
+ });
220
+ }
221
+ /**
222
+ * Check if a token is valid for the given secret
223
+ *
224
+ * @param token - The token to verify
225
+ * @param secret - The secret key
226
+ * @returns true if valid
227
+ */
228
+ check(token, secret) {
229
+ const delta = this.checkDelta(token, secret);
230
+ return typeof delta === "number";
231
+ }
232
+ /**
233
+ * Check token and return the time window delta
234
+ *
235
+ * @param token - The token to verify
236
+ * @param secret - The secret key
237
+ * @returns Window delta (0 = current, positive = future, negative = past), null if invalid
238
+ */
239
+ checkDelta(token, secret) {
240
+ const opts = this.allOptions();
241
+ const secretBytes = secretToBytes(secret, opts.encoding);
242
+ const epochSeconds = Math.floor(opts.epoch / 1e3);
243
+ const step = opts.step;
244
+ const window = opts.window;
245
+ const epochTolerance = parseWindow(window, step);
246
+ try {
247
+ const result = totpVerifySync({
248
+ secret: secretBytes,
249
+ token,
250
+ algorithm: opts.algorithm,
251
+ digits: opts.digits,
252
+ period: step,
253
+ epoch: epochSeconds,
254
+ t0: 0,
255
+ epochTolerance,
256
+ crypto: opts.crypto
257
+ });
258
+ if (!result.valid) {
259
+ return null;
260
+ }
261
+ return result.delta;
262
+ } catch {
263
+ return null;
264
+ }
265
+ }
266
+ /**
267
+ * Verify a token (object-based API)
268
+ *
269
+ * @param opts - Verification options
270
+ * @returns true if valid
271
+ */
272
+ verify(opts) {
273
+ if (typeof opts !== "object") {
274
+ throw new Error("Expecting argument 0 of verify to be an object");
275
+ }
276
+ return this.check(opts.token, opts.secret);
277
+ }
278
+ /**
279
+ * Generate an otpauth:// URI for TOTP
280
+ *
281
+ * @param accountName - Account name for the URI
282
+ * @param issuer - Issuer name
283
+ * @param secret - The secret key (should be Base32 for QR codes)
284
+ * @returns The otpauth:// URI
285
+ */
286
+ keyuri(accountName, issuer, secret) {
287
+ const opts = this.allOptions();
288
+ return generateTOTPURI({
289
+ label: accountName,
290
+ issuer,
291
+ secret,
292
+ algorithm: opts.algorithm,
293
+ digits: opts.digits,
294
+ period: opts.step
295
+ });
296
+ }
297
+ /**
298
+ * Get time used in current step (seconds elapsed in current window)
299
+ *
300
+ * @returns Seconds used in current step
301
+ */
302
+ timeUsed() {
303
+ const opts = this.allOptions();
304
+ const epochSeconds = Math.floor(opts.epoch / 1e3);
305
+ return epochSeconds % opts.step;
306
+ }
307
+ /**
308
+ * Get time remaining until next token
309
+ *
310
+ * @returns Seconds remaining in current step
311
+ */
312
+ timeRemaining() {
313
+ const opts = this.allOptions();
314
+ const epochSeconds = Math.floor(opts.epoch / 1e3);
315
+ return getRemainingTime(epochSeconds, opts.step, 0);
316
+ }
317
+ };
318
+
319
+ // src/authenticator.ts
320
+ import { generateSecret as generateSecretCore } from "@otplib/core";
321
+ import { ScureBase32Plugin as ScureBase32Plugin3 } from "@otplib/plugin-base32-scure";
322
+ import { NobleCryptoPlugin as NobleCryptoPlugin3 } from "@otplib/plugin-crypto-noble";
323
+ import { generateSync as totpGenerateSync2, verifySync as totpVerifySync2 } from "@otplib/totp";
324
+ var defaultCrypto3 = new NobleCryptoPlugin3();
325
+ var defaultBase323 = new ScureBase32Plugin3();
326
+ function defaultKeyEncoder(secret, _encoding) {
327
+ const bytes = new TextEncoder().encode(secret);
328
+ return defaultBase323.encode(bytes);
329
+ }
330
+ function defaultKeyDecoder(encodedSecret, _encoding) {
331
+ const bytes = defaultBase323.decode(encodedSecret);
332
+ return new TextDecoder().decode(bytes);
333
+ }
334
+ var Authenticator = class _Authenticator extends TOTP {
335
+ constructor(defaultOptions = {}) {
336
+ super(defaultOptions);
337
+ }
338
+ /**
339
+ * Creates a new Authenticator instance with the specified default options
340
+ */
341
+ create(defaultOptions = {}) {
342
+ return new _Authenticator(defaultOptions);
343
+ }
344
+ /**
345
+ * Returns class options polyfilled with Authenticator default values
346
+ */
347
+ allOptions() {
348
+ const merged = {
349
+ algorithm: HashAlgorithms.SHA1,
350
+ digits: 6,
351
+ encoding: KeyEncodings.HEX,
352
+ epoch: Date.now(),
353
+ step: 30,
354
+ window: 0,
355
+ keyEncoder: defaultKeyEncoder,
356
+ keyDecoder: defaultKeyDecoder,
357
+ crypto: defaultCrypto3,
358
+ base32: defaultBase323,
359
+ ...this._defaultOptions,
360
+ ...this._options
361
+ };
362
+ return Object.freeze(merged);
363
+ }
364
+ /**
365
+ * Generate an OTP token from a Base32 secret
366
+ *
367
+ * @param secret - Base32-encoded secret
368
+ * @returns The OTP token
369
+ */
370
+ generate(secret) {
371
+ const opts = this.allOptions();
372
+ const secretBytes = defaultBase323.decode(secret);
373
+ const epoch = opts.epoch;
374
+ const epochSeconds = epoch >= 1e12 ? Math.floor(epoch / 1e3) : epoch;
375
+ return totpGenerateSync2({
376
+ secret: secretBytes,
377
+ algorithm: opts.algorithm,
378
+ digits: opts.digits,
379
+ period: opts.step,
380
+ epoch: epochSeconds,
381
+ t0: 0,
382
+ crypto: opts.crypto
383
+ });
384
+ }
385
+ /**
386
+ * Check if a token is valid for the given Base32 secret
387
+ *
388
+ * @param token - The token to verify
389
+ * @param secret - Base32-encoded secret
390
+ * @returns true if valid
391
+ */
392
+ check(token, secret) {
393
+ const delta = this.checkDelta(token, secret);
394
+ return typeof delta === "number";
395
+ }
396
+ /**
397
+ * Check token and return the time window delta
398
+ *
399
+ * @param token - The token to verify
400
+ * @param secret - Base32-encoded secret
401
+ * @returns Window delta (0 = current, positive = future, negative = past), null if invalid
402
+ */
403
+ checkDelta(token, secret) {
404
+ const opts = this.allOptions();
405
+ const secretBytes = defaultBase323.decode(secret);
406
+ const epoch = opts.epoch;
407
+ const epochSeconds = epoch >= 1e12 ? Math.floor(epoch / 1e3) : epoch;
408
+ const step = opts.step;
409
+ const window = opts.window;
410
+ let epochTolerance = 0;
411
+ if (typeof window === "number") {
412
+ epochTolerance = window * step;
413
+ } else if (Array.isArray(window)) {
414
+ epochTolerance = [window[0] * step, window[1] * step];
415
+ }
416
+ try {
417
+ const result = totpVerifySync2({
418
+ secret: secretBytes,
419
+ token,
420
+ algorithm: opts.algorithm,
421
+ digits: opts.digits,
422
+ period: step,
423
+ epoch: epochSeconds,
424
+ t0: 0,
425
+ epochTolerance,
426
+ crypto: opts.crypto
427
+ });
428
+ if (!result.valid) {
429
+ return null;
430
+ }
431
+ return result.delta;
432
+ } catch {
433
+ return null;
434
+ }
435
+ }
436
+ /**
437
+ * Verify a token (object-based API)
438
+ *
439
+ * @param opts - Verification options
440
+ * @returns true if valid
441
+ */
442
+ verify(opts) {
443
+ if (typeof opts !== "object") {
444
+ throw new Error("Expecting argument 0 of verify to be an object");
445
+ }
446
+ return this.check(opts.token, opts.secret);
447
+ }
448
+ /**
449
+ * Encode a raw secret to Base32
450
+ *
451
+ * @param secret - Raw secret string
452
+ * @returns Base32-encoded secret
453
+ */
454
+ encode(secret) {
455
+ const opts = this.allOptions();
456
+ if (opts.keyEncoder) {
457
+ return opts.keyEncoder(secret, opts.encoding);
458
+ }
459
+ return defaultKeyEncoder(secret, opts.encoding);
460
+ }
461
+ /**
462
+ * Decode a Base32 secret to raw string
463
+ *
464
+ * @param secret - Base32-encoded secret
465
+ * @returns Raw secret string
466
+ */
467
+ decode(secret) {
468
+ const opts = this.allOptions();
469
+ if (opts.keyDecoder) {
470
+ return opts.keyDecoder(secret, opts.encoding);
471
+ }
472
+ return defaultKeyDecoder(secret, opts.encoding);
473
+ }
474
+ /**
475
+ * Generate a random Base32-encoded secret
476
+ *
477
+ * @param numberOfBytes - Number of bytes for the secret (default: 20)
478
+ * @returns Base32-encoded secret
479
+ */
480
+ generateSecret(numberOfBytes = 20) {
481
+ const opts = this.allOptions();
482
+ return generateSecretCore({
483
+ crypto: opts.crypto,
484
+ base32: opts.base32,
485
+ length: numberOfBytes
486
+ });
487
+ }
488
+ };
489
+
490
+ // src/index.ts
491
+ import { NobleCryptoPlugin as NobleCryptoPlugin4 } from "@otplib/plugin-crypto-noble";
492
+ import { ScureBase32Plugin as ScureBase32Plugin4 } from "@otplib/plugin-base32-scure";
493
+ var hotp = new HOTP();
494
+ var totp = new TOTP();
495
+ var authenticator = new Authenticator();
496
+ export {
497
+ Authenticator,
498
+ HOTP,
499
+ HashAlgorithms,
500
+ KeyEncodings,
501
+ NobleCryptoPlugin4 as NobleCryptoPlugin,
502
+ ScureBase32Plugin4 as ScureBase32Plugin,
503
+ TOTP,
504
+ authenticator,
505
+ hotp,
506
+ hotpDigestToToken,
507
+ totp
508
+ };
509
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/hotp.ts","../src/types.ts","../src/totp.ts","../src/authenticator.ts","../src/index.ts"],"sourcesContent":["/**\n * @otplib/v12-adapter\n *\n * v12-compatible HOTP class implementation.\n * Provides synchronous API wrapper around v13's HOTP implementation.\n */\n\nimport { stringToBytes, hexToBytes, dynamicTruncate, truncateDigits } from \"@otplib/core\";\nimport { generateSync as hotpGenerateSync, verifySync as hotpVerifySync } from \"@otplib/hotp\";\nimport { ScureBase32Plugin } from \"@otplib/plugin-base32-scure\";\nimport { NobleCryptoPlugin } from \"@otplib/plugin-crypto-noble\";\nimport { generateHOTP as generateHOTPURI } from \"@otplib/uri\";\n\nimport { HashAlgorithms, KeyEncodings as KeyEncodingsConst } from \"./types\";\n\nimport type { HOTPOptions, SecretKey, ResolvedHOTPOptions } from \"./types\";\nimport type { Digits } from \"@otplib/core\";\n\n/**\n * Default crypto plugin instance\n */\nconst defaultCrypto = new NobleCryptoPlugin();\n\n/**\n * Default base32 plugin instance\n */\nconst defaultBase32 = new ScureBase32Plugin();\n\n/**\n * Convert a string secret to bytes based on encoding\n * @internal\n */\nexport function secretToBytes(secret: SecretKey, encoding?: string): Uint8Array {\n if (encoding === KeyEncodingsConst.BASE32 || encoding === \"base32\") {\n return defaultBase32.decode(secret);\n }\n if (encoding === KeyEncodingsConst.HEX || encoding === \"hex\") {\n return hexToBytes(secret.replace(/\\s/g, \"\"));\n }\n // Default: treat as ASCII/UTF-8\n return stringToBytes(secret);\n}\n\n/**\n * Converts a digest to a token of a specified length.\n * Uses dynamicTruncate and truncateDigits from core.\n */\nexport function hotpDigestToToken(hexDigest: string, digits: number): string {\n const digestBytes = hexToBytes(hexDigest);\n const truncated = dynamicTruncate(digestBytes);\n return truncateDigits(truncated, digits);\n}\n\n/**\n * v12-compatible HOTP class\n *\n * Provides the same API as otplib v12 HOTP class while using v13's\n * implementation internally.\n *\n * @example\n * ```typescript\n * import { HOTP } from '@otplib/v12-adapter';\n *\n * const hotp = new HOTP();\n * const secret = 'JBSWY3DPEHPK3PXP';\n * const token = hotp.generate(secret, 0);\n * const isValid = hotp.check(token, secret, 0);\n * ```\n */\nexport class HOTP<T extends HOTPOptions = HOTPOptions> {\n /**\n * Stored options that can be modified\n */\n protected _options: Partial<T> = {};\n\n /**\n * Default options applied to all operations\n */\n protected _defaultOptions: Partial<T> = {};\n\n constructor(defaultOptions: Partial<T> = {}) {\n this._defaultOptions = { ...defaultOptions };\n this._options = {};\n }\n\n /**\n * Get current options (merged with defaults)\n */\n get options(): Partial<T> {\n return { ...this._defaultOptions, ...this._options };\n }\n\n /**\n * Set options (replaces current options)\n */\n set options(value: Partial<T>) {\n this._options = { ...value };\n }\n\n /**\n * Creates a new instance with the specified default options\n */\n create(defaultOptions: Partial<T> = {}): HOTP<T> {\n return new HOTP<T>(defaultOptions);\n }\n\n /**\n * Returns class options polyfilled with default values\n */\n allOptions(): Readonly<ResolvedHOTPOptions> {\n const merged = {\n algorithm: HashAlgorithms.SHA1,\n digits: 6,\n encoding: KeyEncodingsConst.ASCII,\n crypto: defaultCrypto,\n base32: defaultBase32,\n ...this._defaultOptions,\n ...this._options,\n };\n return Object.freeze(merged) as Readonly<ResolvedHOTPOptions>;\n }\n\n /**\n * Reset options to defaults\n */\n resetOptions(): this {\n this._options = {};\n return this;\n }\n\n /**\n * Generate an HOTP token\n */\n generate(secret: SecretKey, counter: number): string {\n const opts = this.allOptions();\n const secretBytes = secretToBytes(secret, opts.encoding);\n\n return hotpGenerateSync({\n secret: secretBytes,\n counter,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n crypto: opts.crypto,\n });\n }\n\n /**\n * Check if a token is valid for the given secret and counter\n */\n check(token: string, secret: SecretKey, counter: number): boolean {\n const opts = this.allOptions();\n const secretBytes = secretToBytes(secret, opts.encoding);\n\n try {\n const result = hotpVerifySync({\n secret: secretBytes,\n token,\n counter,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n counterTolerance: 0,\n crypto: opts.crypto,\n });\n\n return result.valid;\n } catch {\n return false;\n }\n }\n\n /**\n * Verify a token (object-based API)\n */\n verify(opts: { token: string; secret: SecretKey; counter: number }): boolean {\n if (typeof opts !== \"object\") {\n throw new Error(\"Expecting argument 0 of verify to be an object\");\n }\n return this.check(opts.token, opts.secret, opts.counter);\n }\n\n /**\n * Generate an otpauth:// URI for HOTP\n */\n keyuri(accountName: string, issuer: string, secret: SecretKey, counter: number): string {\n const opts = this.allOptions();\n\n return generateHOTPURI({\n label: accountName,\n issuer,\n secret,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n counter,\n });\n }\n}\n","/**\n * @otplib/v12-adapter\n *\n * v12-compatible type definitions for migration adapter.\n * These types mirror the v12 API to provide drop-in compatibility.\n */\n\nimport type { CryptoPlugin, Base32Plugin, HashAlgorithm } from \"@otplib/core\";\n\n/**\n * v12-style hash algorithms constant\n */\nexport const HashAlgorithms = {\n SHA1: \"sha1\",\n SHA256: \"sha256\",\n SHA512: \"sha512\",\n} as const;\n\nexport type HashAlgorithms = (typeof HashAlgorithms)[keyof typeof HashAlgorithms];\n\n/**\n * v12-style key encodings constant\n */\nexport const KeyEncodings = {\n ASCII: \"ascii\",\n HEX: \"hex\",\n BASE32: \"base32\",\n BASE64: \"base64\",\n LATIN1: \"latin1\",\n UTF8: \"utf8\",\n} as const;\n\nexport type KeyEncodings = (typeof KeyEncodings)[keyof typeof KeyEncodings];\n\n/**\n * v12-style secret key type (string-based)\n */\nexport type SecretKey = string;\n\n/**\n * Base32 encoded secret key\n */\nexport type Base32SecretKey = string;\n\n/**\n * v12-style createDigest function signature\n */\nexport type CreateDigest<T = string> = (algorithm: HashAlgorithm, hmacKey: T, counter: T) => T;\n\n/**\n * v12-style createHmacKey function signature\n */\nexport type CreateHmacKey<T = string> = (\n algorithm: HashAlgorithm,\n secret: SecretKey,\n encoding: KeyEncodings,\n) => T;\n\n/**\n * v12-style createRandomBytes function signature\n */\nexport type CreateRandomBytes<T = string> = (size: number, encoding: KeyEncodings) => T;\n\n/**\n * v12-style keyEncoder function signature\n */\nexport type KeyEncoder<T = Base32SecretKey> = (secret: SecretKey, encoding: KeyEncodings) => T;\n\n/**\n * v12-style keyDecoder function signature\n */\nexport type KeyDecoder<T = SecretKey> = (\n encodedSecret: Base32SecretKey,\n encoding: KeyEncodings,\n) => T;\n\n/**\n * v12-compatible HOTP options\n */\nexport type HOTPOptions<T = string> = {\n /** Algorithm for HMAC (default: sha1) */\n algorithm?: HashAlgorithm;\n /** Creates the digest for token generation */\n createDigest?: CreateDigest<T>;\n /** Formats the secret into HMAC key */\n createHmacKey?: CreateHmacKey<T>;\n /** Number of digits in token (default: 6) */\n digits?: number;\n /** Secret encoding (default: ascii) */\n encoding?: KeyEncodings;\n /** Pre-computed digest (use with caution) */\n digest?: string;\n /** v13 crypto plugin (internal use) */\n crypto?: CryptoPlugin;\n /** v13 base32 plugin (internal use) */\n base32?: Base32Plugin;\n};\n\n/**\n * v12-compatible TOTP options\n */\nexport type TOTPOptions<T = string> = HOTPOptions<T> & {\n /** Starting epoch in milliseconds (default: Date.now()) */\n epoch?: number;\n /** Time step in seconds (default: 30) */\n step?: number;\n /** Verification window - number of steps or [past, future] */\n window?: number | [number, number];\n};\n\n/**\n * v12-compatible Authenticator options\n */\nexport type AuthenticatorOptions<T = string> = TOTPOptions<T> & {\n /** Encodes secret to Base32 */\n keyEncoder?: KeyEncoder<T>;\n /** Decodes Base32 secret */\n keyDecoder?: KeyDecoder<T>;\n /** Creates random bytes for secret generation */\n createRandomBytes?: CreateRandomBytes<T>;\n};\n\n/**\n * Resolved HOTP options with guaranteed defaults\n */\nexport type ResolvedHOTPOptions = {\n algorithm: HashAlgorithm;\n digits: number;\n encoding: KeyEncodings;\n crypto: CryptoPlugin;\n base32: Base32Plugin;\n};\n\n/**\n * Resolved TOTP options with guaranteed defaults\n */\nexport type ResolvedTOTPOptions = ResolvedHOTPOptions & {\n epoch: number;\n step: number;\n window: number | [number, number];\n};\n\n/**\n * Resolved Authenticator options with guaranteed defaults\n */\nexport type ResolvedAuthenticatorOptions = ResolvedTOTPOptions & {\n keyEncoder?: KeyEncoder;\n keyDecoder?: KeyDecoder;\n};\n","/**\n * @otplib/v12-adapter\n *\n * v12-compatible TOTP class implementation.\n * Provides synchronous API wrapper around v13's TOTP implementation.\n */\n\nimport { ScureBase32Plugin } from \"@otplib/plugin-base32-scure\";\nimport { NobleCryptoPlugin } from \"@otplib/plugin-crypto-noble\";\nimport {\n generateSync as totpGenerateSync,\n verifySync as totpVerifySync,\n getRemainingTime,\n} from \"@otplib/totp\";\nimport { generateTOTP as generateTOTPURI } from \"@otplib/uri\";\n\nimport { HOTP, secretToBytes } from \"./hotp\";\nimport { HashAlgorithms, KeyEncodings as KeyEncodingsConst } from \"./types\";\n\nimport type { TOTPOptions, SecretKey, ResolvedTOTPOptions } from \"./types\";\nimport type { Digits } from \"@otplib/core\";\n\n/**\n * Default crypto plugin instance\n */\nconst defaultCrypto = new NobleCryptoPlugin();\n\n/**\n * Default base32 plugin instance\n */\nconst defaultBase32 = new ScureBase32Plugin();\n\n/**\n * Parse window option into epochTolerance\n * v12 uses \"window\" as number of steps, v13 uses epochTolerance in seconds\n */\nfunction parseWindow(\n window: number | [number, number] | undefined,\n step: number,\n): number | [number, number] {\n if (window === undefined || window === 0) {\n return 0;\n }\n if (typeof window === \"number\") {\n return window * step;\n }\n // [past, future] steps → [past, future] seconds\n return [window[0] * step, window[1] * step];\n}\n\n/**\n * v12-compatible TOTP class\n *\n * Provides the same API as otplib v12 TOTP class while using v13's\n * implementation internally.\n *\n * @example\n * ```typescript\n * import { TOTP } from '@otplib/v12-adapter';\n *\n * const totp = new TOTP();\n * const secret = 'JBSWY3DPEHPK3PXP';\n * const token = totp.generate(secret);\n * const isValid = totp.check(token, secret);\n * ```\n */\nexport class TOTP<T extends TOTPOptions = TOTPOptions> extends HOTP<T> {\n constructor(defaultOptions: Partial<T> = {}) {\n super(defaultOptions);\n }\n\n /**\n * Creates a new TOTP instance with the specified default options\n */\n override create(defaultOptions: Partial<T> = {}): TOTP<T> {\n return new TOTP<T>(defaultOptions);\n }\n\n /**\n * Returns class options polyfilled with TOTP default values\n */\n override allOptions(): Readonly<ResolvedTOTPOptions> {\n const merged = {\n algorithm: HashAlgorithms.SHA1,\n digits: 6,\n encoding: KeyEncodingsConst.ASCII,\n epoch: Date.now(),\n step: 30,\n window: 0 as number | [number, number],\n crypto: defaultCrypto,\n base32: defaultBase32,\n ...this._defaultOptions,\n ...this._options,\n };\n return Object.freeze(merged) as Readonly<ResolvedTOTPOptions>;\n }\n\n /**\n * Generate a TOTP token\n *\n * @param secret - The secret key\n * @returns The OTP token\n */\n generate(secret: SecretKey): string {\n const opts = this.allOptions();\n const secretBytes = secretToBytes(secret, opts.encoding);\n // v12 uses epoch in milliseconds, always convert to seconds\n const epochSeconds = Math.floor(opts.epoch / 1000);\n\n return totpGenerateSync({\n secret: secretBytes,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n period: opts.step,\n epoch: epochSeconds,\n t0: 0,\n crypto: opts.crypto,\n });\n }\n\n /**\n * Check if a token is valid for the given secret\n *\n * @param token - The token to verify\n * @param secret - The secret key\n * @returns true if valid\n */\n check(token: string, secret: SecretKey): boolean {\n const delta = this.checkDelta(token, secret);\n return typeof delta === \"number\";\n }\n\n /**\n * Check token and return the time window delta\n *\n * @param token - The token to verify\n * @param secret - The secret key\n * @returns Window delta (0 = current, positive = future, negative = past), null if invalid\n */\n checkDelta(token: string, secret: SecretKey): number | null {\n const opts = this.allOptions();\n const secretBytes = secretToBytes(secret, opts.encoding);\n // v12 uses epoch in milliseconds, always convert to seconds\n const epochSeconds = Math.floor(opts.epoch / 1000);\n const step = opts.step;\n const window = opts.window;\n\n const epochTolerance = parseWindow(window, step);\n\n try {\n const result = totpVerifySync({\n secret: secretBytes,\n token,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n period: step,\n epoch: epochSeconds,\n t0: 0,\n epochTolerance,\n crypto: opts.crypto,\n });\n\n if (!result.valid) {\n return null;\n }\n\n // v13 returns delta directly as time step offset\n return result.delta;\n } catch {\n return null;\n }\n }\n\n /**\n * Verify a token (object-based API)\n *\n * @param opts - Verification options\n * @returns true if valid\n */\n verify(opts: { token: string; secret: SecretKey }): boolean {\n if (typeof opts !== \"object\") {\n throw new Error(\"Expecting argument 0 of verify to be an object\");\n }\n return this.check(opts.token, opts.secret);\n }\n\n /**\n * Generate an otpauth:// URI for TOTP\n *\n * @param accountName - Account name for the URI\n * @param issuer - Issuer name\n * @param secret - The secret key (should be Base32 for QR codes)\n * @returns The otpauth:// URI\n */\n keyuri(accountName: string, issuer: string, secret: SecretKey): string {\n const opts = this.allOptions();\n\n return generateTOTPURI({\n label: accountName,\n issuer,\n secret,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n period: opts.step,\n });\n }\n\n /**\n * Get time used in current step (seconds elapsed in current window)\n *\n * @returns Seconds used in current step\n */\n timeUsed(): number {\n const opts = this.allOptions();\n // v12 uses epoch in milliseconds, convert to seconds\n const epochSeconds = Math.floor(opts.epoch / 1000);\n return epochSeconds % opts.step;\n }\n\n /**\n * Get time remaining until next token\n *\n * @returns Seconds remaining in current step\n */\n timeRemaining(): number {\n const opts = this.allOptions();\n // v12 uses epoch in milliseconds, convert to seconds\n const epochSeconds = Math.floor(opts.epoch / 1000);\n return getRemainingTime(epochSeconds, opts.step, 0);\n }\n}\n","/**\n * @otplib/v12-adapter\n *\n * v12-compatible Authenticator class implementation.\n * Provides same API as v12 with Base32 encoding support.\n */\n\nimport { generateSecret as generateSecretCore } from \"@otplib/core\";\nimport { ScureBase32Plugin } from \"@otplib/plugin-base32-scure\";\nimport { NobleCryptoPlugin } from \"@otplib/plugin-crypto-noble\";\nimport { generateSync as totpGenerateSync, verifySync as totpVerifySync } from \"@otplib/totp\";\n\nimport { TOTP } from \"./totp\";\nimport { HashAlgorithms, KeyEncodings as KeyEncodingsConst } from \"./types\";\n\nimport type {\n AuthenticatorOptions,\n Base32SecretKey,\n SecretKey,\n KeyEncodings,\n ResolvedAuthenticatorOptions,\n} from \"./types\";\nimport type { Digits } from \"@otplib/core\";\n\n/**\n * Default crypto plugin instance\n */\nconst defaultCrypto = new NobleCryptoPlugin();\n\n/**\n * Default base32 plugin instance\n */\nconst defaultBase32 = new ScureBase32Plugin();\n\n/**\n * Default key encoder - encodes raw bytes to Base32\n */\nfunction defaultKeyEncoder(secret: SecretKey, _encoding: KeyEncodings): Base32SecretKey {\n const bytes = new TextEncoder().encode(secret);\n return defaultBase32.encode(bytes);\n}\n\n/**\n * Default key decoder - decodes Base32 to string\n */\nfunction defaultKeyDecoder(encodedSecret: Base32SecretKey, _encoding: KeyEncodings): SecretKey {\n const bytes = defaultBase32.decode(encodedSecret);\n return new TextDecoder().decode(bytes);\n}\n\n/**\n * v12-compatible Authenticator class\n *\n * The Authenticator class is a TOTP variant that uses Base32-encoded secrets\n * by default, making it compatible with Google Authenticator and similar apps.\n *\n * @example\n * ```typescript\n * import { Authenticator } from '@otplib/v12-adapter';\n *\n * const authenticator = new Authenticator();\n * const secret = authenticator.generateSecret();\n * const token = authenticator.generate(secret);\n * const isValid = authenticator.check(token, secret);\n * const uri = authenticator.keyuri('user@example.com', 'MyApp', secret);\n * ```\n */\nexport class Authenticator<T extends AuthenticatorOptions = AuthenticatorOptions> extends TOTP<T> {\n constructor(defaultOptions: Partial<T> = {}) {\n super(defaultOptions);\n }\n\n /**\n * Creates a new Authenticator instance with the specified default options\n */\n override create(defaultOptions: Partial<T> = {}): Authenticator<T> {\n return new Authenticator<T>(defaultOptions);\n }\n\n /**\n * Returns class options polyfilled with Authenticator default values\n */\n override allOptions(): Readonly<ResolvedAuthenticatorOptions> {\n const merged = {\n algorithm: HashAlgorithms.SHA1,\n digits: 6,\n encoding: KeyEncodingsConst.HEX,\n epoch: Date.now(),\n step: 30,\n window: 0 as number | [number, number],\n keyEncoder: defaultKeyEncoder,\n keyDecoder: defaultKeyDecoder,\n crypto: defaultCrypto,\n base32: defaultBase32,\n ...this._defaultOptions,\n ...this._options,\n };\n return Object.freeze(merged) as Readonly<ResolvedAuthenticatorOptions>;\n }\n\n /**\n * Generate an OTP token from a Base32 secret\n *\n * @param secret - Base32-encoded secret\n * @returns The OTP token\n */\n override generate(secret: Base32SecretKey): string {\n const opts = this.allOptions();\n\n // Generate using decoded secret (as raw bytes)\n const secretBytes = defaultBase32.decode(secret);\n const epoch = opts.epoch;\n const epochSeconds = epoch >= 1e12 ? Math.floor(epoch / 1000) : epoch;\n\n return totpGenerateSync({\n secret: secretBytes,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n period: opts.step,\n epoch: epochSeconds,\n t0: 0,\n crypto: opts.crypto,\n });\n }\n\n /**\n * Check if a token is valid for the given Base32 secret\n *\n * @param token - The token to verify\n * @param secret - Base32-encoded secret\n * @returns true if valid\n */\n override check(token: string, secret: Base32SecretKey): boolean {\n const delta = this.checkDelta(token, secret);\n return typeof delta === \"number\";\n }\n\n /**\n * Check token and return the time window delta\n *\n * @param token - The token to verify\n * @param secret - Base32-encoded secret\n * @returns Window delta (0 = current, positive = future, negative = past), null if invalid\n */\n override checkDelta(token: string, secret: Base32SecretKey): number | null {\n const opts = this.allOptions();\n const secretBytes = defaultBase32.decode(secret);\n const epoch = opts.epoch;\n const epochSeconds = epoch >= 1e12 ? Math.floor(epoch / 1000) : epoch;\n const step = opts.step;\n const window = opts.window;\n\n // Convert window (steps) to epochTolerance (seconds)\n let epochTolerance: number | [number, number] = 0;\n if (typeof window === \"number\") {\n epochTolerance = window * step;\n } else if (Array.isArray(window)) {\n epochTolerance = [window[0] * step, window[1] * step];\n }\n\n try {\n const result = totpVerifySync({\n secret: secretBytes,\n token,\n algorithm: opts.algorithm,\n digits: opts.digits as Digits,\n period: step,\n epoch: epochSeconds,\n t0: 0,\n epochTolerance,\n crypto: opts.crypto,\n });\n\n if (!result.valid) {\n return null;\n }\n\n return result.delta;\n } catch {\n return null;\n }\n }\n\n /**\n * Verify a token (object-based API)\n *\n * @param opts - Verification options\n * @returns true if valid\n */\n override verify(opts: { token: string; secret: Base32SecretKey }): boolean {\n if (typeof opts !== \"object\") {\n throw new Error(\"Expecting argument 0 of verify to be an object\");\n }\n return this.check(opts.token, opts.secret);\n }\n\n /**\n * Encode a raw secret to Base32\n *\n * @param secret - Raw secret string\n * @returns Base32-encoded secret\n */\n encode(secret: SecretKey): Base32SecretKey {\n const opts = this.allOptions();\n if (opts.keyEncoder) {\n return opts.keyEncoder(secret, opts.encoding);\n }\n return defaultKeyEncoder(secret, opts.encoding);\n }\n\n /**\n * Decode a Base32 secret to raw string\n *\n * @param secret - Base32-encoded secret\n * @returns Raw secret string\n */\n decode(secret: Base32SecretKey): SecretKey {\n const opts = this.allOptions();\n if (opts.keyDecoder) {\n return opts.keyDecoder(secret, opts.encoding);\n }\n return defaultKeyDecoder(secret, opts.encoding);\n }\n\n /**\n * Generate a random Base32-encoded secret\n *\n * @param numberOfBytes - Number of bytes for the secret (default: 20)\n * @returns Base32-encoded secret\n */\n generateSecret(numberOfBytes: number = 20): Base32SecretKey {\n const opts = this.allOptions();\n return generateSecretCore({\n crypto: opts.crypto,\n base32: opts.base32,\n length: numberOfBytes,\n });\n }\n}\n","/**\n * @otplib/v12-adapter\n *\n * Drop-in replacement adapter for migrating from otplib v12 to v13.\n *\n * This package provides the same API as otplib v12, making it easy\n * to migrate existing codebases to v13 without breaking changes.\n *\n * @example Using pre-configured instances (v12 style)\n * ```typescript\n * import { authenticator } from '@otplib/v12-adapter';\n *\n * const secret = authenticator.generateSecret();\n * const token = authenticator.generate(secret);\n * const isValid = authenticator.check(token, secret);\n * const uri = authenticator.keyuri('user@example.com', 'MyApp', secret);\n * ```\n *\n * @example Using class instances\n * ```typescript\n * import { Authenticator } from '@otplib/v12-adapter';\n *\n * const authenticator = new Authenticator({ step: 60 });\n * const secret = authenticator.generateSecret();\n * const token = authenticator.generate(secret);\n * ```\n */\n\n// Classes\nexport { HOTP } from \"./hotp\";\nexport { TOTP } from \"./totp\";\nexport { Authenticator } from \"./authenticator\";\n\n// Functional exports (v12-style)\nexport { hotpDigestToToken } from \"./hotp\";\n\n// Constants (v12-style)\nexport { HashAlgorithms, KeyEncodings } from \"./types\";\n\n// Types\nexport type {\n HOTPOptions,\n TOTPOptions,\n AuthenticatorOptions,\n SecretKey,\n Base32SecretKey,\n CreateDigest,\n CreateHmacKey,\n CreateRandomBytes,\n KeyEncoder,\n KeyDecoder,\n} from \"./types\";\n\n// Pre-configured instances (v12 style)\nimport { Authenticator } from \"./authenticator\";\nimport { HOTP } from \"./hotp\";\nimport { TOTP } from \"./totp\";\n\n/**\n * Pre-configured HOTP instance\n *\n * @example\n * ```typescript\n * import { hotp } from '@otplib/v12-adapter';\n *\n * const token = hotp.generate('JBSWY3DPEHPK3PXP', 0);\n * const isValid = hotp.check(token, 'JBSWY3DPEHPK3PXP', 0);\n * ```\n */\nexport const hotp = new HOTP();\n\n/**\n * Pre-configured TOTP instance\n *\n * @example\n * ```typescript\n * import { totp } from '@otplib/v12-adapter';\n *\n * const token = totp.generate('JBSWY3DPEHPK3PXP');\n * const isValid = totp.check(token, 'JBSWY3DPEHPK3PXP');\n * ```\n */\nexport const totp = new TOTP();\n\n/**\n * Pre-configured Authenticator instance\n *\n * @example\n * ```typescript\n * import { authenticator } from '@otplib/v12-adapter';\n *\n * const secret = authenticator.generateSecret();\n * const token = authenticator.generate(secret);\n * const isValid = authenticator.check(token, secret);\n * ```\n */\nexport const authenticator = new Authenticator();\n\n// Re-export v13 plugins for advanced usage\nexport { NobleCryptoPlugin } from \"@otplib/plugin-crypto-noble\";\nexport { ScureBase32Plugin } from \"@otplib/plugin-base32-scure\";\n"],"mappings":";AAOA,SAAS,eAAe,YAAY,iBAAiB,sBAAsB;AAC3E,SAAS,gBAAgB,kBAAkB,cAAc,sBAAsB;AAC/E,SAAS,yBAAyB;AAClC,SAAS,yBAAyB;AAClC,SAAS,gBAAgB,uBAAuB;;;ACCzC,IAAM,iBAAiB;AAAA,EAC5B,MAAM;AAAA,EACN,QAAQ;AAAA,EACR,QAAQ;AACV;AAOO,IAAM,eAAe;AAAA,EAC1B,OAAO;AAAA,EACP,KAAK;AAAA,EACL,QAAQ;AAAA,EACR,QAAQ;AAAA,EACR,QAAQ;AAAA,EACR,MAAM;AACR;;;ADTA,IAAM,gBAAgB,IAAI,kBAAkB;AAK5C,IAAM,gBAAgB,IAAI,kBAAkB;AAMrC,SAAS,cAAc,QAAmB,UAA+B;AAC9E,MAAI,aAAa,aAAkB,UAAU,aAAa,UAAU;AAClE,WAAO,cAAc,OAAO,MAAM;AAAA,EACpC;AACA,MAAI,aAAa,aAAkB,OAAO,aAAa,OAAO;AAC5D,WAAO,WAAW,OAAO,QAAQ,OAAO,EAAE,CAAC;AAAA,EAC7C;AAEA,SAAO,cAAc,MAAM;AAC7B;AAMO,SAAS,kBAAkB,WAAmB,QAAwB;AAC3E,QAAM,cAAc,WAAW,SAAS;AACxC,QAAM,YAAY,gBAAgB,WAAW;AAC7C,SAAO,eAAe,WAAW,MAAM;AACzC;AAkBO,IAAM,OAAN,MAAM,MAA0C;AAAA;AAAA;AAAA;AAAA,EAI3C,WAAuB,CAAC;AAAA;AAAA;AAAA;AAAA,EAKxB,kBAA8B,CAAC;AAAA,EAEzC,YAAY,iBAA6B,CAAC,GAAG;AAC3C,SAAK,kBAAkB,EAAE,GAAG,eAAe;AAC3C,SAAK,WAAW,CAAC;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA,EAKA,IAAI,UAAsB;AACxB,WAAO,EAAE,GAAG,KAAK,iBAAiB,GAAG,KAAK,SAAS;AAAA,EACrD;AAAA;AAAA;AAAA;AAAA,EAKA,IAAI,QAAQ,OAAmB;AAC7B,SAAK,WAAW,EAAE,GAAG,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA,EAKA,OAAO,iBAA6B,CAAC,GAAY;AAC/C,WAAO,IAAI,MAAQ,cAAc;AAAA,EACnC;AAAA;AAAA;AAAA;AAAA,EAKA,aAA4C;AAC1C,UAAM,SAAS;AAAA,MACb,WAAW,eAAe;AAAA,MAC1B,QAAQ;AAAA,MACR,UAAU,aAAkB;AAAA,MAC5B,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR,GAAG,KAAK;AAAA,MACR,GAAG,KAAK;AAAA,IACV;AACA,WAAO,OAAO,OAAO,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA,EAKA,eAAqB;AACnB,SAAK,WAAW,CAAC;AACjB,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,SAAS,QAAmB,SAAyB;AACnD,UAAM,OAAO,KAAK,WAAW;AAC7B,UAAM,cAAc,cAAc,QAAQ,KAAK,QAAQ;AAEvD,WAAO,iBAAiB;AAAA,MACtB,QAAQ;AAAA,MACR;AAAA,MACA,WAAW,KAAK;AAAA,MAChB,QAAQ,KAAK;AAAA,MACb,QAAQ,KAAK;AAAA,IACf,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAe,QAAmB,SAA0B;AAChE,UAAM,OAAO,KAAK,WAAW;AAC7B,UAAM,cAAc,cAAc,QAAQ,KAAK,QAAQ;AAEvD,QAAI;AACF,YAAM,SAAS,eAAe;AAAA,QAC5B,QAAQ;AAAA,QACR;AAAA,QACA;AAAA,QACA,WAAW,KAAK;AAAA,QAChB,QAAQ,KAAK;AAAA,QACb,kBAAkB;AAAA,QAClB,QAAQ,KAAK;AAAA,MACf,CAAC;AAED,aAAO,OAAO;AAAA,IAChB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAO,MAAsE;AAC3E,QAAI,OAAO,SAAS,UAAU;AAC5B,YAAM,IAAI,MAAM,gDAAgD;AAAA,IAClE;AACA,WAAO,KAAK,MAAM,KAAK,OAAO,KAAK,QAAQ,KAAK,OAAO;AAAA,EACzD;AAAA;AAAA;AAAA;AAAA,EAKA,OAAO,aAAqB,QAAgB,QAAmB,SAAyB;AACtF,UAAM,OAAO,KAAK,WAAW;AAE7B,WAAO,gBAAgB;AAAA,MACrB,OAAO;AAAA,MACP;AAAA,MACA;AAAA,MACA,WAAW,KAAK;AAAA,MAChB,QAAQ,KAAK;AAAA,MACb;AAAA,IACF,CAAC;AAAA,EACH;AACF;;;AE5LA,SAAS,qBAAAA,0BAAyB;AAClC,SAAS,qBAAAC,0BAAyB;AAClC;AAAA,EACE,gBAAgB;AAAA,EAChB,cAAc;AAAA,EACd;AAAA,OACK;AACP,SAAS,gBAAgB,uBAAuB;AAWhD,IAAMC,iBAAgB,IAAIC,mBAAkB;AAK5C,IAAMC,iBAAgB,IAAIC,mBAAkB;AAM5C,SAAS,YACP,QACA,MAC2B;AAC3B,MAAI,WAAW,UAAa,WAAW,GAAG;AACxC,WAAO;AAAA,EACT;AACA,MAAI,OAAO,WAAW,UAAU;AAC9B,WAAO,SAAS;AAAA,EAClB;AAEA,SAAO,CAAC,OAAO,CAAC,IAAI,MAAM,OAAO,CAAC,IAAI,IAAI;AAC5C;AAkBO,IAAM,OAAN,MAAM,cAAkD,KAAQ;AAAA,EACrE,YAAY,iBAA6B,CAAC,GAAG;AAC3C,UAAM,cAAc;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA,EAKS,OAAO,iBAA6B,CAAC,GAAY;AACxD,WAAO,IAAI,MAAQ,cAAc;AAAA,EACnC;AAAA;AAAA;AAAA;AAAA,EAKS,aAA4C;AACnD,UAAM,SAAS;AAAA,MACb,WAAW,eAAe;AAAA,MAC1B,QAAQ;AAAA,MACR,UAAU,aAAkB;AAAA,MAC5B,OAAO,KAAK,IAAI;AAAA,MAChB,MAAM;AAAA,MACN,QAAQ;AAAA,MACR,QAAQH;AAAA,MACR,QAAQE;AAAA,MACR,GAAG,KAAK;AAAA,MACR,GAAG,KAAK;AAAA,IACV;AACA,WAAO,OAAO,OAAO,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,SAAS,QAA2B;AAClC,UAAM,OAAO,KAAK,WAAW;AAC7B,UAAM,cAAc,cAAc,QAAQ,KAAK,QAAQ;AAEvD,UAAM,eAAe,KAAK,MAAM,KAAK,QAAQ,GAAI;AAEjD,WAAO,iBAAiB;AAAA,MACtB,QAAQ;AAAA,MACR,WAAW,KAAK;AAAA,MAChB,QAAQ,KAAK;AAAA,MACb,QAAQ,KAAK;AAAA,MACb,OAAO;AAAA,MACP,IAAI;AAAA,MACJ,QAAQ,KAAK;AAAA,IACf,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,OAAe,QAA4B;AAC/C,UAAM,QAAQ,KAAK,WAAW,OAAO,MAAM;AAC3C,WAAO,OAAO,UAAU;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,WAAW,OAAe,QAAkC;AAC1D,UAAM,OAAO,KAAK,WAAW;AAC7B,UAAM,cAAc,cAAc,QAAQ,KAAK,QAAQ;AAEvD,UAAM,eAAe,KAAK,MAAM,KAAK,QAAQ,GAAI;AACjD,UAAM,OAAO,KAAK;AAClB,UAAM,SAAS,KAAK;AAEpB,UAAM,iBAAiB,YAAY,QAAQ,IAAI;AAE/C,QAAI;AACF,YAAM,SAAS,eAAe;AAAA,QAC5B,QAAQ;AAAA,QACR;AAAA,QACA,WAAW,KAAK;AAAA,QAChB,QAAQ,KAAK;AAAA,QACb,QAAQ;AAAA,QACR,OAAO;AAAA,QACP,IAAI;AAAA,QACJ;AAAA,QACA,QAAQ,KAAK;AAAA,MACf,CAAC;AAED,UAAI,CAAC,OAAO,OAAO;AACjB,eAAO;AAAA,MACT;AAGA,aAAO,OAAO;AAAA,IAChB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAO,MAAqD;AAC1D,QAAI,OAAO,SAAS,UAAU;AAC5B,YAAM,IAAI,MAAM,gDAAgD;AAAA,IAClE;AACA,WAAO,KAAK,MAAM,KAAK,OAAO,KAAK,MAAM;AAAA,EAC3C;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,OAAO,aAAqB,QAAgB,QAA2B;AACrE,UAAM,OAAO,KAAK,WAAW;AAE7B,WAAO,gBAAgB;AAAA,MACrB,OAAO;AAAA,MACP;AAAA,MACA;AAAA,MACA,WAAW,KAAK;AAAA,MAChB,QAAQ,KAAK;AAAA,MACb,QAAQ,KAAK;AAAA,IACf,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,WAAmB;AACjB,UAAM,OAAO,KAAK,WAAW;AAE7B,UAAM,eAAe,KAAK,MAAM,KAAK,QAAQ,GAAI;AACjD,WAAO,eAAe,KAAK;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,gBAAwB;AACtB,UAAM,OAAO,KAAK,WAAW;AAE7B,UAAM,eAAe,KAAK,MAAM,KAAK,QAAQ,GAAI;AACjD,WAAO,iBAAiB,cAAc,KAAK,MAAM,CAAC;AAAA,EACpD;AACF;;;AC/NA,SAAS,kBAAkB,0BAA0B;AACrD,SAAS,qBAAAE,0BAAyB;AAClC,SAAS,qBAAAC,0BAAyB;AAClC,SAAS,gBAAgBC,mBAAkB,cAAcC,uBAAsB;AAiB/E,IAAMC,iBAAgB,IAAIC,mBAAkB;AAK5C,IAAMC,iBAAgB,IAAIC,mBAAkB;AAK5C,SAAS,kBAAkB,QAAmB,WAA0C;AACtF,QAAM,QAAQ,IAAI,YAAY,EAAE,OAAO,MAAM;AAC7C,SAAOD,eAAc,OAAO,KAAK;AACnC;AAKA,SAAS,kBAAkB,eAAgC,WAAoC;AAC7F,QAAM,QAAQA,eAAc,OAAO,aAAa;AAChD,SAAO,IAAI,YAAY,EAAE,OAAO,KAAK;AACvC;AAmBO,IAAM,gBAAN,MAAM,uBAA6E,KAAQ;AAAA,EAChG,YAAY,iBAA6B,CAAC,GAAG;AAC3C,UAAM,cAAc;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA,EAKS,OAAO,iBAA6B,CAAC,GAAqB;AACjE,WAAO,IAAI,eAAiB,cAAc;AAAA,EAC5C;AAAA;AAAA;AAAA;AAAA,EAKS,aAAqD;AAC5D,UAAM,SAAS;AAAA,MACb,WAAW,eAAe;AAAA,MAC1B,QAAQ;AAAA,MACR,UAAU,aAAkB;AAAA,MAC5B,OAAO,KAAK,IAAI;AAAA,MAChB,MAAM;AAAA,MACN,QAAQ;AAAA,MACR,YAAY;AAAA,MACZ,YAAY;AAAA,MACZ,QAAQF;AAAA,MACR,QAAQE;AAAA,MACR,GAAG,KAAK;AAAA,MACR,GAAG,KAAK;AAAA,IACV;AACA,WAAO,OAAO,OAAO,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQS,SAAS,QAAiC;AACjD,UAAM,OAAO,KAAK,WAAW;AAG7B,UAAM,cAAcA,eAAc,OAAO,MAAM;AAC/C,UAAM,QAAQ,KAAK;AACnB,UAAM,eAAe,SAAS,OAAO,KAAK,MAAM,QAAQ,GAAI,IAAI;AAEhE,WAAOE,kBAAiB;AAAA,MACtB,QAAQ;AAAA,MACR,WAAW,KAAK;AAAA,MAChB,QAAQ,KAAK;AAAA,MACb,QAAQ,KAAK;AAAA,MACb,OAAO;AAAA,MACP,IAAI;AAAA,MACJ,QAAQ,KAAK;AAAA,IACf,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASS,MAAM,OAAe,QAAkC;AAC9D,UAAM,QAAQ,KAAK,WAAW,OAAO,MAAM;AAC3C,WAAO,OAAO,UAAU;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASS,WAAW,OAAe,QAAwC;AACzE,UAAM,OAAO,KAAK,WAAW;AAC7B,UAAM,cAAcF,eAAc,OAAO,MAAM;AAC/C,UAAM,QAAQ,KAAK;AACnB,UAAM,eAAe,SAAS,OAAO,KAAK,MAAM,QAAQ,GAAI,IAAI;AAChE,UAAM,OAAO,KAAK;AAClB,UAAM,SAAS,KAAK;AAGpB,QAAI,iBAA4C;AAChD,QAAI,OAAO,WAAW,UAAU;AAC9B,uBAAiB,SAAS;AAAA,IAC5B,WAAW,MAAM,QAAQ,MAAM,GAAG;AAChC,uBAAiB,CAAC,OAAO,CAAC,IAAI,MAAM,OAAO,CAAC,IAAI,IAAI;AAAA,IACtD;AAEA,QAAI;AACF,YAAM,SAASG,gBAAe;AAAA,QAC5B,QAAQ;AAAA,QACR;AAAA,QACA,WAAW,KAAK;AAAA,QAChB,QAAQ,KAAK;AAAA,QACb,QAAQ;AAAA,QACR,OAAO;AAAA,QACP,IAAI;AAAA,QACJ;AAAA,QACA,QAAQ,KAAK;AAAA,MACf,CAAC;AAED,UAAI,CAAC,OAAO,OAAO;AACjB,eAAO;AAAA,MACT;AAEA,aAAO,OAAO;AAAA,IAChB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQS,OAAO,MAA2D;AACzE,QAAI,OAAO,SAAS,UAAU;AAC5B,YAAM,IAAI,MAAM,gDAAgD;AAAA,IAClE;AACA,WAAO,KAAK,MAAM,KAAK,OAAO,KAAK,MAAM;AAAA,EAC3C;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAO,QAAoC;AACzC,UAAM,OAAO,KAAK,WAAW;AAC7B,QAAI,KAAK,YAAY;AACnB,aAAO,KAAK,WAAW,QAAQ,KAAK,QAAQ;AAAA,IAC9C;AACA,WAAO,kBAAkB,QAAQ,KAAK,QAAQ;AAAA,EAChD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAO,QAAoC;AACzC,UAAM,OAAO,KAAK,WAAW;AAC7B,QAAI,KAAK,YAAY;AACnB,aAAO,KAAK,WAAW,QAAQ,KAAK,QAAQ;AAAA,IAC9C;AACA,WAAO,kBAAkB,QAAQ,KAAK,QAAQ;AAAA,EAChD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,eAAe,gBAAwB,IAAqB;AAC1D,UAAM,OAAO,KAAK,WAAW;AAC7B,WAAO,mBAAmB;AAAA,MACxB,QAAQ,KAAK;AAAA,MACb,QAAQ,KAAK;AAAA,MACb,QAAQ;AAAA,IACV,CAAC;AAAA,EACH;AACF;;;AC3IA,SAAS,qBAAAC,0BAAyB;AAClC,SAAS,qBAAAC,0BAAyB;AA/B3B,IAAM,OAAO,IAAI,KAAK;AAatB,IAAM,OAAO,IAAI,KAAK;AActB,IAAM,gBAAgB,IAAI,cAAc;","names":["ScureBase32Plugin","NobleCryptoPlugin","defaultCrypto","NobleCryptoPlugin","defaultBase32","ScureBase32Plugin","ScureBase32Plugin","NobleCryptoPlugin","totpGenerateSync","totpVerifySync","defaultCrypto","NobleCryptoPlugin","defaultBase32","ScureBase32Plugin","totpGenerateSync","totpVerifySync","NobleCryptoPlugin","ScureBase32Plugin"]}
package/package.json ADDED
@@ -0,0 +1,75 @@
1
+ {
2
+ "name": "@otplib/v12-adapter",
3
+ "version": "13.0.0",
4
+ "description": "Drop-in replacement adapter for migrating from otplib v12 to v13",
5
+ "license": "MIT",
6
+ "author": "Gerald Yeo <support@yeojz.dev>",
7
+ "homepage": "https://otplib.yeojz.dev",
8
+ "repository": {
9
+ "type": "git",
10
+ "url": "git+https://github.com/yeojz/otplib.git",
11
+ "directory": "packages/v12-adapter"
12
+ },
13
+ "bugs": {
14
+ "url": "https://github.com/yeojz/otplib/issues"
15
+ },
16
+ "keywords": [
17
+ "otp",
18
+ "hotp",
19
+ "totp",
20
+ "2fa",
21
+ "mfa",
22
+ "authenticator",
23
+ "migration",
24
+ "v12",
25
+ "adapter"
26
+ ],
27
+ "sideEffects": false,
28
+ "type": "module",
29
+ "main": "./dist/index.cjs",
30
+ "module": "./dist/index.js",
31
+ "types": "./dist/index.d.ts",
32
+ "exports": {
33
+ ".": {
34
+ "import": {
35
+ "types": "./dist/index.d.ts",
36
+ "default": "./dist/index.js"
37
+ },
38
+ "require": {
39
+ "types": "./dist/index.d.cts",
40
+ "default": "./dist/index.cjs"
41
+ }
42
+ }
43
+ },
44
+ "files": [
45
+ "dist",
46
+ "README.md",
47
+ "LICENSE"
48
+ ],
49
+ "dependencies": {
50
+ "@otplib/core": "13.0.0",
51
+ "@otplib/hotp": "13.0.0",
52
+ "@otplib/totp": "13.0.0",
53
+ "@otplib/uri": "13.0.0",
54
+ "@otplib/plugin-crypto-noble": "13.0.0",
55
+ "@otplib/plugin-base32-scure": "13.0.0"
56
+ },
57
+ "devDependencies": {
58
+ "tsup": "^8.0.1",
59
+ "typescript": "^5.3.3",
60
+ "vitest": "^4.0.16",
61
+ "@repo/testing": "13.0.0"
62
+ },
63
+ "publishConfig": {
64
+ "access": "public"
65
+ },
66
+ "scripts": {
67
+ "build": "tsup",
68
+ "dev": "tsup --watch",
69
+ "test": "vitest",
70
+ "test:ci": "vitest run --coverage",
71
+ "typecheck": "tsc --noEmit",
72
+ "lint": "eslint src/",
73
+ "clean": "rm -rf dist .tsbuildinfo"
74
+ }
75
+ }