On Thu, Sep 18, 2008 at 10:11 AM, Norman Rasmussen
<[EMAIL PROTECTED]> wrote:
> cnonce should be an opaque blob as far as clients are concerned, (my guess
> is psi is pulling random bytes and base64 encoding them)
> Any chance we can get a log with a known (to us), password?

I found my problem. As I figured, it was my fault. I hadn't counted on
cnonce being base64-encoded, and in my code that forms the `response`
hash I use, I split the string into key=>value by splitting on the '='
sign. The cnonce had an '=' on the end of it, which was just getting
lopped off. I've fixed this with:

    resp = Base64.decode64(elem.text)
    resp = resp.split(',')

    response = {}
    resp.each do |kv|
        k, v = kv.split('=')
        v += '=' if kv[-2].chr == '=' # Some clients base64-encode
'cnonce' (ahem, Psi)
        v.gsub!(/^"/, '')
        v.gsub!(/"$/, '')

        response[k] = v

    end

And it now works successfully. Sorry to bother you with my screw ups.
Thanks for the help

--
Eric Will
_______________________________________________
JDev mailing list
FAQ: http://www.jabber.org/discussion-lists/jdev-faq
Forum: http://www.jabberforum.org/forumdisplay.php?f=20
Info: http://mail.jabber.org/mailman/listinfo/jdev
Unsubscribe: [EMAIL PROTECTED]
_______________________________________________

Reply via email to