PHPackages                             iescarro/otphp - PHPackages - PHPackages  [Skip to content](#main-content)[PHPackages](/)[Directory](/)[Categories](/categories)[Trending](/trending)[Leaderboard](/leaderboard)[Changelog](/changelog)[Analyze](/analyze)[Collections](/collections)[Log in](/login)[Sign up](/register)

1. [Directory](/)
2. /
3. [Authentication &amp; Authorization](/categories/authentication)
4. /
5. iescarro/otphp

ActiveLibrary[Authentication &amp; Authorization](/categories/authentication)

iescarro/otphp
==============

v1.0.0(7mo ago)01MITPHP

Since Oct 16Pushed 7mo agoCompare

[ Source](https://github.com/iescarro/otphp)[ Packagist](https://packagist.org/packages/iescarro/otphp)[ RSS](/packages/iescarro-otphp/feed)WikiDiscussions master Synced 1mo ago

READMEChangelog (1)Dependencies (1)Versions (2)Used By (0)

OTPHP - A PHP One Time Password Library
=======================================

[](#otphp---a-php-one-time-password-library)

A php library for generating one time passwords according to [ RFC 4226 ](http://tools.ietf.org/html/rfc4226) and the [ HOTP RFC ](http://tools.ietf.org/html/draft-mraihi-totp-timebased-00)

This is compatible with Google Authenticator apps available for Android and iPhone, and now in use on GMail

This is a port of the rotp ruby library available at

Note : This project has not been updated since it was created. If you need a PHP OTP library, you should check out the great fork by Spomky-Labs at  which has been improved and is currently maintained.

Quick overview of using One Time Passwords on your phone
--------------------------------------------------------

[](#quick-overview-of-using-one-time-passwords-on-your-phone)

- OTP's involve a shared secret, stored both on the phone and the server
- OTP's can be generated on a phone without internet connectivity(AT&amp;T mode)
- OTP's should always be used as a second factor of authentication(if your phone is lost, you account is still secured with a password)
- Google Authenticator allows you to store multiple OTP secrets and provision those using a QR Code(no more typing in the secret)

Installation
------------

[](#installation)

```
composer require iescarro/otphp
```

Use
---

[](#use)

### Time based OTP's

[](#time-based-otps)

```
require __DIR__ . '/vendor/autoload.php';
$totp = new \OTPHP\TOTP("base32secret3232");
$totp->now(); // => 492039

// OTP verified for current time
$totp->verify(492039); // => true
//30s later
$totp->verify(492039); // => false
```

### Counter based OTP's

[](#counter-based-otps)

```
require __DIR__ . '/vendor/autoload.php';
$hotp = new \OTPHP\HOTP("base32secretkey3232");
$hotp->at(0); // => 260182
$hotp->at(1); // => 55283
$hotp->at(1401); // => 316439

// OTP verified with a counter
$totp->verify(316439, 1401); // => true
$totp->verify(316439, 1402); // => false
```

### Google Authenticator Compatible

[](#google-authenticator-compatible)

The library works with the Google Authenticator iPhone and Android app, and also includes the ability to generate provisioning URI's for use with the QR Code scanner built into the app.

```
$totp->provisioning_uri(); // => 'otpauth://totp/alice@google.com?secret=JBSWY3DPEHPK3PXP'
$hotp->provisioning_uri(); // => 'otpauth://hotp/alice@google.com?secret=JBSWY3DPEHPK3PXP&counter=0'
```

This can then be rendered as a QR Code which can then be scanned and added to the users list of OTP credentials.

#### Working example

[](#working-example)

Scan the following barcode with your phone, using Google Authenticator

[![QR Code for OTP](https://camo.githubusercontent.com/002fd0948c058681cc0d04bec2c5e16fc4746227921d2b58f8905f35d75ef8e0/68747470733a2f2f6170692e71727365727665722e636f6d2f76312f6372656174652d71722d636f64652f3f73697a653d3235307832353026646174613d6f7470617574683a2f2f746f74702f616c69636540676f6f676c652e636f6d3f7365637265743d4a425357593344504548504b33505850)](https://camo.githubusercontent.com/002fd0948c058681cc0d04bec2c5e16fc4746227921d2b58f8905f35d75ef8e0/68747470733a2f2f6170692e71727365727665722e636f6d2f76312f6372656174652d71722d636f64652f3f73697a653d3235307832353026646174613d6f7470617574683a2f2f746f74702f616c69636540676f6f676c652e636f6d3f7365637265743d4a425357593344504548504b33505850)

Now run the following and compare the output

```
