Commit Graph

12 Commits

Author SHA1 Message Date
46acdedb8b
Add OTP#getNextPin(), clean up code 2024-09-07 19:48:16 +02:00
1896eef707 Incremented Version Count. Basically the issue was, that the standard
for HOTP only specified the use of SHA-1 as an algorithm for the OTP and
HOTP added the use of SHA-256 and SHA-512, which had a longer and
different output length. MD5 on the other hand only uses 128 bytes of
output, which could sometimes cause an IndexOutOfBounds Exception, when
trying to read the last 4 bytes starting at byte 15. (Byte 16, 17 and 18
are outside the array bounds). Since the standard does not specify how
to implement the algorithm using MD5, the best solution was to change
the size of the array, instead of looping while fetching the values at
the indices. This is because the specification is very clear about how
to fetch the values: The Indices shall not loop, but rather just
increment. Since this is not standard conforming, we can only hope, that
this is compatible with other implementations, that feature MD5.
2023-09-24 14:55:52 +02:00
55cdd506fb updated version 2023-07-17 15:32:36 +02:00
7fb6795d8c ⚠️⚠️ WARNING ⚠️⚠️ API CHANGE: Incremented Version Counter by 0.1 2023-06-30 23:10:28 +02:00
6f3e7f1f5f incremented the version counter by 0.1 2023-06-30 22:43:20 +02:00
291ecd6c7a update pom.xml yay 2023-06-25 23:17:21 +02:00
19de03f0f4 Update pom.xml and fixed a fatal bug with big token lenghts 2023-06-25 23:15:01 +02:00
ffd5350cb6 beautify the pom.xml 2023-06-22 21:26:09 +02:00
8ec7992f97 Added sauce code to build or sth like that 2023-06-22 21:16:18 +02:00
3542c7aed3 beautified HOTP tests; added maven surefire plugin for tests 2023-06-18 22:29:48 +02:00
66e8b9b2ab added JUnit Tests to the project. 2023-06-18 22:09:56 +02:00
f4a28966d3 Initial Upload 2023-06-16 22:02:09 +02:00