Commit graph

20 commits

Author SHA1 Message Date
5a29d4bc19
Added optional HIBP database check
Even though the generated passwords are generated in a secure
way, there is a minimal chance, that the same password was used
by someone before and this password was part of a leak.

If you want to be on the safe side, you can now use the "-p"
parameter, to have your newly generated password against the
HIBP (https://haveibeenpwned.com) database. This feature is
disabled by default, since it requires internet access and also
the API call might take ~500ms to 1sec.
2021-04-29 12:22:10 +02:00
98e81e4857
Bumping to v0.3.2 2021-04-29 11:52:35 +02:00
Romain Tartière
bea26f11a4 Fix usage output
Special characters in passwords are disabled by default.  Fix the usage
output to match this.
2021-04-28 21:40:53 -10:00
eaf4a4c57d
v0.3.1: New password length behaviour
To address issue #13, the password length behaviour of the
original APG has been reproduced. Previously, when a minLength
of 5 and a maxLength of 10 was given, apg-go se the pwLength to
the preferred maxLength.

With v0.3.1 it will choose a random length between minLength and
maxLength instead, same as the original C-lang apg did. For this
the minLength has been defaulted to a sane value of 12 (instead
of the 8 of the original apg). The default for maxLength stayed
at 20.

Also the default number of generated passwords has been changed
from 1 to 6, to replicate the behaviour of the original apg.
2021-04-17 11:11:54 +02:00
8a7c00a522
v0.3.0: Unified the naming convention 2021-04-01 10:53:51 +02:00
0c371569c0
v0.2.9: Replaced standard go-help with custom usage text 2021-03-28 11:51:26 +02:00
d3648d18a9
New DEV branch 2021-03-27 17:17:41 +01:00
1130a698f6
v0.2.8: De-cluttered the config flags stuff 2021-03-27 17:03:19 +01:00
637ee8359a
v0.2.7: Switched global config to it's own package 2021-03-26 14:27:54 +01:00
327dc6459a
v0.2.6 - converted to go module structure
- Better logging
- Better error handling
- Removed Makefile since github takes care of building/releasing
2021-03-22 17:53:36 +01:00
9707c875b4
Break the switch/case 2021-03-21 19:25:54 +01:00
ab2a083524
Added sane defaults 2021-03-21 17:27:25 +01:00
8b9269b1b9
Added spelling of pws. Ready for v0.2.4 2021-03-21 15:28:23 +01:00
eb221ccc69
Split up functions into seperate files 2021-03-21 14:05:14 +01:00
46e47348e2
v0.2.3: More chars, cleanup and better test coverage
- Added more special characters
- Fixed issue with ` character
- Added lots of tests
- Moved character range generation into it's own function
- Better error handling
- A bit of code cleanup
2021-03-21 13:25:52 +01:00
19ed4da161
Minor changes 2021-03-20 22:18:16 +01:00
2a970b9bce
v0.2.2: Minor fixes and testing
- Replaced log.Fatal() with log.Fatalf() since we provide %v
- Added proper testing and benchmarking
2021-03-20 18:31:32 +01:00
14f26c4816
v0.2.1: Support for more platforms added 2021-03-19 08:40:48 +01:00
37e73c8c7a
v0.2.0: Added open items
- Added generation of multiple passwords
- Added "exclude chars" feature
2021-03-18 23:40:18 +01:00
5d743f70ae
v0.1.0: Initial check-in 2021-03-18 23:26:41 +01:00