diff options
author | Harsh Shandilya <msfjarvis@gmail.com> | 2020-09-05 20:12:19 +0530 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-09-05 20:12:19 +0530 |
commit | 6713d489746830d83437e6a8f6eb88624070b7c5 (patch) | |
tree | ab8b13554daca7e0297e55af6af73e7391851330 /scripts/hash_browser_app.sh | |
parent | 0b85779eec8cb889bd1fc025bec8425b9386200d (diff) |
DecryptActivity: properly calculate remaining OTP time on first pass (#1080)
* DecryptActivity: properly calculate remaining OTP time on first pass
We default to 30 seconds for each recalculation but the first run might not have 30 seconds left in its period, making the value stale much earlier. While most websites offer another 30 seconds of validity for TOTP codes, many do not, thus making it hard to enter a correct OTP
Signed-off-by: Harsh Shandilya <me@msfjarvis.dev>
* Update changelog
Signed-off-by: Harsh Shandilya <me@msfjarvis.dev>
Diffstat (limited to 'scripts/hash_browser_app.sh')
0 files changed, 0 insertions, 0 deletions