Commits

Author Commit Message Labels Comments Date
Devin Martin
version 1.1.*
Devin Martin
Added tag 1.0.6 for changeset ada462ee6d57
Devin Martin
Update tests and rename ProtectedKey
Devin Martin
Remove depricated methods. Change the key API to not provide the key but instead obtain the HMAC.
Devin Martin
More test converage. Internal re-factoring and consolidation. Remove depricated APIs
Devin Martin
The computed values are now returned as padded strings (as they should have been all along)
Tags
1.0.6
Devin Martin
Added tag 1.0.5.0 for changeset bab1dc94803d
Devin Martin
Forgot the nuspec file. Increment the version.
Tags
1.0.5.0
Devin Martin
rework the package structure. Version the nuspec. Rename the package from OTP-Sharp to OtpSharp.
Devin Martin
Merge
Devin Martin
Fix the build configurations in the solution
Devin Martin
Add some NTP parseing tests
Devin Martin
add an internal key utilities class for working with plain keys
Devin Martin
comments
Devin Martin
allow the protected key to forgo in-memory protection for those platforms that don't support it.
Devin Martin
Fix the 35Client defined constants
Devin Martin
Change the NO_TPL preprocessor flag to NET35 and add it to another case.
Devin Martin
Fixed some things that were pointed out by FXCop
Devin Martin
Add determanistic key derivation (without tests)
Devin Martin
Change the generate key to GenerateRandomKey
Devin Martin
Break the ProtectedKey out into an abstract class.
Devin Martin
Use UTC when using google's time correction.
Devin Martin
Update the comment warning against potential test breakage.
Devin Martin
Added tag 1.0.4 for changeset 79e6a643f4fd
Devin Martin
Protected key tests for alternate MemoryProtectionScopes. Change the API method name.
Tags
1.0.4
Devin Martin
Add build configurations for all supported frameworks and profiles
Devin Martin
Add logging.
Devin Martin
Add Google as a fast but unauthoritative alternative to NIST. Add pre-processor switch to remove TPL dependencies.
Devin Martin
Add tests.
Devin Martin
Backed out changeset: 5edf9ccc5199. These tests proved to be bad test cases. They were erroniously introduced because the decoding of the keys matched the google authenticator but didn't re-encode to the same value. This was caused by a difference in the lenght of a byte vs an encoded character. The encoding was spilling over a single character and filling the empty bits from in the next character.
  1. Prev
  2. Next