1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
/**
* TODO:
* - Support for multiple codes
*/
#include <stdlib.h>
#include <string.h>
#include "totp_face.h"
#include "watch.h"
#include "watch_utility.h"
#include "TOTP.h"
#include "base32.h"
#include "filesystem.h"
// test key: JBSWY3DPEHPK3PXP
// Use https://cryptii.com/pipes/base32-to-hex to convert base32 to hex
// Use https://totp.danhersam.com/ to generate test codes for verification
static uint8_t last_filename_index = 0;
static const uint32_t TIMESTEP = 30;
static void read_totp_file(totp_state_t *totp_state) {
totp_state->valid = false;
char filename[12];
sprintf(filename, "totp%d.txt", totp_state->my_filename_index);
int32_t size = filesystem_get_file_size(filename);
if (size > 0) {
char *buf = malloc(size + 1);
filesystem_read_file(filename, buf, size);
char *site_name = strtok(buf, " \n");
char *hmac_string = strtok(NULL, " \n");
if (strlen(hmac_string) == 16) {
memcpy(totp_state->site_name, site_name, min(strlen(site_name), 2));
base32_decode(hmac_string, totp_state->hmac_key);
totp_state->valid = true;
}
free(buf);
}
}
void totp_face_setup(movement_settings_t *settings, uint8_t watch_face_index, void ** context_ptr) {
(void) settings;
(void) watch_face_index;
if (*context_ptr == NULL) {
*context_ptr = malloc(sizeof(totp_state_t));
(((totp_state_t *)(*context_ptr))->my_filename_index) = ++last_filename_index;
read_totp_file((totp_state_t *)(*context_ptr));
}
}
void totp_face_activate(movement_settings_t *settings, void *context) {
(void) settings;
totp_state_t *totp_state = (totp_state_t *)context;
if (!totp_state->valid) {
read_totp_file(totp_state);
}
if (totp_state->valid) {
TOTP(totp_state->hmac_key, sizeof(totp_state->hmac_key), TIMESTEP);
totp_state->steps = 0;
totp_state->timestamp = watch_utility_date_time_to_unix_time(watch_rtc_get_date_time(), movement_timezone_offsets[settings->bit.time_zone] * 60);
totp_state->current_code = getCodeFromTimestamp(totp_state->timestamp);
}
}
bool totp_face_loop(movement_event_t event, movement_settings_t *settings, void *context) {
(void) settings;
totp_state_t *totp_state = (totp_state_t *)context;
char buf[14];
uint8_t valid_for;
div_t result;
switch (event.event_type) {
case EVENT_TICK:
totp_state->timestamp++;
// fall through
case EVENT_ACTIVATE:
if (totp_state->valid) {
result = div(totp_state->timestamp, TIMESTEP);
if (result.quot != totp_state->steps) {
totp_state->current_code = getCodeFromTimestamp(totp_state->timestamp);
totp_state->steps = result.quot;
}
valid_for = TIMESTEP - result.rem;
sprintf(buf, "%s%2d%06lu", totp_state->site_name, valid_for, totp_state->current_code);
watch_display_string(buf, 0);
} else {
watch_display_string("2f noCode", 0);
read_totp_file(totp_state);
if (totp_state->valid) {
TOTP(totp_state->hmac_key, sizeof(totp_state->hmac_key), TIMESTEP);
totp_state->steps = 0;
totp_state->timestamp = watch_utility_date_time_to_unix_time(watch_rtc_get_date_time(), movement_timezone_offsets[settings->bit.time_zone] * 60);
totp_state->current_code = getCodeFromTimestamp(totp_state->timestamp);
}
}
break;
case EVENT_MODE_BUTTON_UP:
movement_move_to_next_face();
break;
case EVENT_LIGHT_BUTTON_DOWN:
movement_illuminate_led();
break;
case EVENT_TIMEOUT:
movement_move_to_face(0);
break;
case EVENT_ALARM_BUTTON_DOWN:
case EVENT_ALARM_BUTTON_UP:
case EVENT_ALARM_LONG_PRESS:
default:
break;
}
return true;
}
void totp_face_resign(movement_settings_t *settings, void *context) {
(void) settings;
(void) context;
}
|