totp-auth
- Description
- RFC6238 TOTP
- Latest
- totp-auth-1.0.tar (.sig), 2024-Mar-31, 120 KiB
- Maintainer
- Vivek Das Mohapatra <vivek@etla.org>
- Atom feed
- totp-auth.xml
- Website
- https://gitlab.com/fledermaus/totp.el
- Browse ELPA's repository
- CGit or Gitweb
- Badge
To install this package from Emacs, use package-install
or list-packages
.
Full description
totp-auth.el - Time-based One Time Password support for emacs This package generates RFC6238 Time-based One Time Passwords (in other words, what Google Authenticator implements) and displays them (as well as optionally copying them to the clipboard/primary selection), updating them as they expire. It retrieves the shared secrets used to generate TOTP tokens with ‘auth-sources’ and/or the freedesktop secrets API (aka Gnome Keyring or KWallet). You can call it with the command ‘totp-auth’, ie: M-x totp-auth RET You can tab-complete based on the label of the secret. Depending on the setting of ‘totp-auth-display-token-method’ the TOTP token will be displayed (and kept up to date) either in an emacs buffer or a freedesktop notification. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; If you want to import TOTP secrets from other places you can call: M-x totp-auth-import-file RET This supports: - simple base32 encoded TOTP secrets (max 1 per file) - otpauth:// scheme URLs in a text file (any number per file) - otpauth-migration:// scheme URLs in a text file (any number per file) - a mix of the above URL schemes in a text file - QR codes encoding any mix of the URL schemes above QR codes require ‘zbarimg’ to import. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; If you want to export your secrets you can invoke: M-x totp-auth-export-file RET Which will export to either a text file (or a PGP encrypted file if you have ‘epa-file’ set up) or a QR code, in either otpauth:// or otpauth-migration:// format. QR code generation requires ‘qrencode’. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Your secrets can be fetched from any auth-source source. Your secrets will only ever be stored by this package in auth-source backends that are encrypted. You secret(s) are only held in memory while a TOTP is being generated, or while a TOTP display buffer is being updated.