> Subject: Re: [Openvpn-devel] the XOR obfuscation > From: dw...@infradead.org > To: lxr1...@hotmail.com > CC: openvpn-devel@lists.sourceforge.net > Date: Tue, 3 Feb 2015 20:48:33 +0000 > > On Wed, 2015-02-04 at 04:41 +0800, Ayaka wrote: > > + size_t keylen = sizeof(key); > I have fixed this place, thank you, but I doesn't work. Also I have tried the signal character. As the C standard, I thought the char is always 8-bits. > Perhaps you meant that to be strlen(key), and the problem isn't really > that one peer is big-endian, but that sizeof(char *) is different > between the two. I may should check the assembly code as dazo said in irc, but it is too hard for me :)
Authenticate/Decrypt packet error: packet HMAC authentication failed really is awful. Thank you > > -- > dwmw2