digest.time_hmac_sha512
Available inall subroutines.
Returns a time-based, one-time password. The password is a SHA-512 hash based
upon the current time. The key
parameter is a Base64-encoded key. The
interval
parameter specifies the lifetime of the token and must be
non-negative. The offset
parameter provides a means for mitigating clock skew.
Base64 decoding behaves as if by a call to
digest.base64_decode
.
See that function for handling invalid characters and the behavior of padding.
Unlike digest.base64_decode
, the decoded output is used directly
(rather than constructing a VCL STRING type), and so binary content
is permitted, including possible NUL bytes.
Example
set req.http.otp-sha-512 = digest.time_hmac_sha512(digest.base64("secret"), 60, 10);
User contributed notes
BETADo you see an error in this page? Do have an interesting use case, example or edge case people should know about? Share your knowledge and help people who are reading this page! (Comments are moderated; for support, please contact support@fastly.com)