- Cryptographic functions
- digest
.awsv4_hmac() - digest
.base64_decode() - digest
.base64() - digest
.base64url_decode() - digest
.base64url_nopad_decode() - digest
.base64url_nopad() - digest
.base64url() - digest
.hash_crc32() - digest
.hash_crc32b() - digest
.hash_md5() - digest
.hash_sha1() - digest
.hash_sha224() - digest
.hash_sha256() - digest
.hash_sha384() - digest
.hash_sha512() - digest
.hmac_md5_base64() - digest
.hmac_md5() - digest
.hmac_sha1_base64() - digest
.hmac_sha1() - digest
.hmac_sha256_base64() - digest
.hmac_sha256() - digest
.hmac_sha512_base64() - digest
.hmac_sha512() - digest
.rsa_verify() - digest
.secure_is_equal() - digest
.time_hmac_md5() - digest
.time_hmac_sha1() - digest
.time_hmac_sha256() - digest
.time_hmac_sha512()
digest.time_hmac_sha1()
Returns a time-based one-time password using SHA-1 based upon the current time. The key
parameter is a Base64-encoded key. The interval
parameter specifies the lifetime of the token in seconds and must be non-negative. The offset
parameter provides a means for mitigating clock skew.
Format
STRING
digest.time_hmac_sha1(STRING key, INTEGER interval, INTEGER offset)
Examples
1
set req.http.otp-sha-1 = digest.time_hmac_sha1(digest.base64("secret"), 60, 10);