Aaron Bieber
|
bbc82ff8de
|
Pad non-padded secrets. This lets us continue building on <= go1.8.
- Add tests for secrets using various padding methods.
- Add a new method/test to append padding to non-padded secrets.
|
2018-04-18 13:39:21 -07:00 |
|
Aaron Bieber
|
5fd928f69a
|
Decode using WithPadding as pointed out by @gl-sergei.
This makes us print the same 6 digits as oathtool for non-padded
secrets like "a6mryljlbufszudtjdt42nh5by".
|
2018-04-18 13:39:21 -07:00 |
|
Aaron Bieber
|
acefe4a3b9
|
Don't assume our secret is base32 encoded.
According to https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm
secrets are only base32 encoded in gauthenticator and gauth friendly providers.
|
2018-04-16 13:14:03 -07:00 |
|
Aaron Bieber
|
eaad1884d4
|
Make sure our secret is always uppercase
Non-uppercase secrets that are base32 encoded will fial to decode
unless we upper them.
|
2017-09-17 18:19:23 -07:00 |
|
Kyle
|
84250b0501
|
More documentation.
|
2014-04-24 20:37:00 -06:00 |
|
Kyle Isom
|
0982f47ce3
|
Add last night's progress.
Basic functionality for HOTP, TOTP, and YubiKey OTP. Still need YubiKey
HMAC, serialisation, check, and scan.
|
2013-12-20 17:00:01 -07:00 |
|
Kyle Isom
|
dc04475120
|
HOTP and TOTP-SHA-1 working.
why the frak aren't the SHA-256 and SHA-512 variants working
|
2013-12-19 00:04:26 -07:00 |
|
Kyle Isom
|
dbbd5116b5
|
Initial import.
Basic HOTP functionality.
|
2013-12-18 21:48:14 -07:00 |
|