-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TOTP: implement other RFC6238 HMAC algorithms #1566
Comments
BryanJacobs
added a commit
to BryanJacobs/keepassxc
that referenced
this issue
Apr 10, 2019
…ot#1566 This implements support for SHA-256 and SHA-512 hash algorithms when generating TOTP codes. These algorithms are specified by RFC6238. The implementation is compatible with Google's OTP URL format, as well as with the KeeOTP plugin for KeePass. The implementation is not wired into the GUI, as the main project developer expressed strong negative sentiment about adding more options there. It is possible to configure codes by putting the appropriate string into the entry's otp property, or using another program with a less opinionated UI and a compatible on-disk format.
droidmonkey
pushed a commit
that referenced
this issue
Apr 15, 2019
This implements support for SHA-256 and SHA-512 hash algorithms when generating TOTP codes. These algorithms are specified by RFC6238. The implementation is compatible with Google's OTP URL format, as well as with the KeeOTP plugin for KeePass. The implementation is not wired into the GUI, as the main project developer expressed strong negative sentiment about adding more options there. It is possible to configure codes by putting the appropriate string into the entry's otp property, or using another program with a less opinionated UI and a compatible on-disk format.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Currently KeePassXC only supports the SHA-1 HMAC algorithm for TOTP codes. This is fine for 99.9% of use cases, but there -are- some services out there that use SHA-256 or even SHA-512 for HMAC. Would be nice to have those as a selectable option.
The text was updated successfully, but these errors were encountered: