Hi,
I am working on Authentication module in NSIS protocol suite (
http://user.informatik.uni-goettingen.de/~nsis/).
The scenario is as follows:
User A NSIS server-Radius server
User A sends the NSIS request with its keyed hash (generated using User A's
key) appended to it to
Hi,
On Thu, Apr 12, 2007 at 11:45:37AM +0530, Prateek Gupta wrote:
Hi,
I am working on Authentication module in NSIS protocol suite (
http://user.informatik.uni-goettingen.de/~nsis/).
The scenario is as follows:
User A NSIS server-Radius server
User A sends the NSIS
Prateek Gupta wrote:
User A sends the NSIS request with its keyed hash (generated using User
A's key) appended to it to the NSIS server. Now the NSIS server needs to
authenticate that request with a Radius server.
Can you point to a specification saying how this hashing works?
Is there a
3 matches
Mail list logo