This repository has been archived by the owner on Jul 5, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 59
Decryption failed #30
Comments
Authy now dynamically increases the amount of rounds of password-based key derivation function for encrypting seeds. Mine is set Run Check what Then modify crypto.go kdfRounds to match yours and rebuild for example I set: |
Thank you! That worked perfectly. Maybe this could be mentioned somewhere in the Readme or automatically be set when the api response comes back. |
tried to modify kdfRounds to match key_derivation_iterations but still got 'Decryption failed' |
The master branch still couldn't decrypt keys, can you check and reopen this issue? edit: as of commit 6124871 |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
On 2024-06-11 I could successfully run the program and decrypt all my tokens with the backup password. After that i removed the new device from the account.
However I tried this again today (registering as a new device) and after entering the same backup password as last time it failed.
2024/06/18 15:38:13 Failed to decrypt token XXX:xxx: decryption failed
I have tried to disable the backup password and enable it again, but to no avail.
The text was updated successfully, but these errors were encountered: