Your message dated Mon, 14 Oct 2019 14:02:07 +0000
with message-id <20191014140207.GB1470@debian>
and subject line 
has caused the Debian Bug report #707816,
regarding liboath0: SHA2 support for TOTP
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
707816: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707816
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: liboath0
Version: 2.0.2-2
Severity: wishlist

Hi,

according to RFC6238 section 1.2 [0], "TOTP implementations MAY use HMAC-SHA-256
or HMAC-SHA-512 functions, based on SHA-256 or SHA-512 [SHA2] hash functions".

It would be nice if liboath (and pam_oath) supported this.

Thanks

[0] http://tools.ietf.org/html/rfc6238#section-1.2

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (600, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages liboath0 depends on:
ii  libc6  2.17-1

liboath0 recommends no packages.

liboath0 suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---

--- End Message ---

Reply via email to