You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have read the issue 27 and successfully add the Message-Authenticator field to request. But I cannot understand why rfc2869.MessageAuthenticator_Set() has to be called twice.
It seems the second set action should completely overwrite the previous data.
But when I coment out the first MessageAuthenticator_Set, the request sent to freeradius server was dropped with error log like:
Info: Dropping packet without response because of error: Received packet from xxx with invalid Message-Authenticator! (shared secret isincorrect,)
It turns out that the first MessageAuthenticator_Set() is necessary.
So what is the difference it actually made?
The text was updated successfully, but these errors were encountered:
When the checksum is calculated the signature string should be considered to be sixteen octets of zero.
The first call to rfc2869.MessageAuthenticator_Set inserts the attribute in the packet. The second call updates the attribute value to the hash you calculated.
I have read the issue 27 and successfully add the Message-Authenticator field to request. But I cannot understand why rfc2869.MessageAuthenticator_Set() has to be called twice.
In my own code:
It seems the second set action should completely overwrite the previous data.
But when I coment out the first MessageAuthenticator_Set, the request sent to freeradius server was dropped with error log like:
It turns out that the first MessageAuthenticator_Set() is necessary.
So what is the difference it actually made?
The text was updated successfully, but these errors were encountered: