Hi,
I don’t think we have constraints on secrets. We use scrypt on the secret to generate an encrypted secret to the appropriate byte size. This encrypted secret will be used as a key for a symmetric encryption (OTP secret in database).
Hi,
I don’t think we have constraints on secrets. We use scrypt on the secret to generate an encrypted secret to the appropriate byte size. This encrypted secret will be used as a key for a symmetric encryption (OTP secret in database).