> Subject: Re: [Openvpn-devel] the XOR obfuscation
> From: dw...@infradead.org
> To: lxr1...@hotmail.com
> CC: openvpn-devel@lists.sourceforge.net
> Date: Tue, 3 Feb 2015 20:48:33 +0000
> 
> On Wed, 2015-02-04 at 04:41 +0800,  Ayaka wrote:
> > +  size_t keylen = sizeof(key);
> 
I have fixed this place, thank you, but I doesn't work.
Also I have tried the signal character. As the C standard, I thought the char 
is always 8-bits.
> Perhaps you meant that to be strlen(key), and the problem isn't really
> that one peer is big-endian, but that sizeof(char *) is different
> between the two.
I may should check the assembly code as dazo said in irc, but it is too hard 
for me :)

Authenticate/Decrypt packet error: packet HMAC authentication failed really is 
awful.
Thank you
> 
> -- 
> dwmw2
                                          

Reply via email to