>>> import onetimepass
>>> onetimepass.get_totp('7uzthj2u3te6dopflwqbwa5n6u', as_string=True, token_length=6)
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/usr/lib/python3.6/site-packages/onetimepass/__init__.py", line 169, in get_totp
token_length=token_length,
File "/usr/lib/python3.6/site-packages/onetimepass/__init__.py", line 113, in get_hotp
key = base64.b32decode(secret, casefold=casefold)
File "/usr/lib/python3.6/base64.py", line 205, in b32decode
raise binascii.Error('Incorrect padding')
binascii.Error: Incorrect padding
The one included in the above example is safe to share since I never added confirmed adding that one to my account. :)
All secrets generated by fastmail see to make the library crash. I can't find any common pattern for them:
The one included in the above example is safe to share since I never added confirmed adding that one to my account. :)