Hi Thijs

Yes, this indeed helps: i got it working:

key = OpenSSL::PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, 20).unpack('H*')[0]
=> "a71aacc618c164ccf3efd2ae23b0061919844909" 

Gives me the correct saltedpass.

Got some help from an old bugreport x) 

somehow the numbers on the way to stored_key still dont add up

[46] pry(main)> server_key = OpenSSL::HMAC.hexdigest('sha1', key, 'Server 
> Key')
> => "0307f1e5263b4181aed2aeb22a0a6dd1993dac6c"
> [47] pry(main)> client_key = OpenSSL::HMAC.hexdigest('sha1', key, 'Client 
> Key')
> => "c31fb5d01a1fac55a065fe6b05c133ca5e8d721f"
> [48] pry(main)> stored_key = Digest::SHA1.hexdigest client_key
> => "a71bc7e7d66b312db49557873b9248e9fb27633f"

Could you also give me your values for this?

thanks a lot

cheers patrick

You received this message because you are subscribed to the Google Groups 
"prosody-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to prosody-dev+unsubscr...@googlegroups.com.
To post to this group, send email to prosody-dev@googlegroups.com.
Visit this group at http://groups.google.com/group/prosody-dev.
For more options, visit https://groups.google.com/d/optout.

Reply via email to