NonGNU ELPA - totp-auth

totp-auth

Description
RFC6238 TOTP
Latest
totp-auth-1.0.tar (.sig), 2024-Feb-10, 120 KiB
Maintainer
Vivek Das Mohapatra <vivek@etla.org>
Website
https://gitlab.com/fledermaus/totp.el
Browse ELPA's repository
CGit or Gitweb
Badge

To install this package from Emacs, use package-install or list-packages.

Full description

totp-auth.el - Time-based One Time Password support for emacs

This package generates RFC6238 Time-based One Time Passwords
(in other words, what Google Authenticator implements)
and displays them (as well as optionally copying them to
the clipboard/primary selection), updating them as they expire.

It retrieves the shared secrets used to generate TOTP tokens
with ‘auth-sources’ and/or the freedesktop secrets API (aka
Gnome Keyring or KWallet).

You can call it with the command ‘totp-auth’, ie:

   M-x totp-auth RET

You can tab-complete based on the label of the secret.
Depending on the setting of ‘totp-auth-display-token-method’ the
TOTP token will be displayed (and kept up to date) either in
an emacs buffer or a freedesktop notification.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

If you want to import TOTP secrets from other places you can call:

  M-x totp-auth-import-file RET

This supports:

  - simple base32 encoded TOTP secrets (max 1 per file)
  - otpauth:// scheme URLs in a text file (any number per file)
  - otpauth-migration:// scheme URLs in a text file (any number per file)
  - a mix of the above URL schemes in a text file
  - QR codes encoding any mix of the URL schemes above

QR codes require ‘zbarimg’ to import.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

If you want to export your secrets you can invoke:

  M-x totp-auth-export-file RET 

Which will export to either a text file (or a PGP encrypted file
if you have ‘epa-file’ set up) or a QR code, in either otpauth://
or otpauth-migration:// format.

QR code generation requires ‘qrencode’.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
Your secrets can be fetched from any auth-source source.

Your secrets will only ever be stored by this package in
auth-source backends that are encrypted.

You secret(s) are only held in memory while a TOTP is being
generated, or while a TOTP display buffer is being updated.