Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
branch: master
Commits on Aug 29, 2014
  1. @muirmanders

    Merge pull request #13 from chrisdew/master

    muirmanders authored
    added decode_without_secret functionality
  2. @chrisdew

    responded to suggestions in #12 - preferred nulls to omitting encrypt…

    chrisdew authored
    …ed fields, as it may be useful to know whether a request has a particular field before bothering to find its secret
Commits on Aug 8, 2014
  1. @chrisdew
Commits on Jul 7, 2014
  1. @muirmanders
  2. @muirmanders

    Have this test calculate Message-Authenticator.

    muirmanders authored
    Rather than hard-coding it in the test.
  3. @dorianlu @muirmanders

    Use byte length of User-Password when encrypting.

    dorianlu authored muirmanders committed
Commits on Jun 17, 2014
  1. @muirmanders
  2. @muirmanders

    Add test for non multiple of 1000 ms time for date type.

    Alexander Cho authored muirmanders committed
  3. @muirmanders

    Fix non-integer division bug encoding date objects.

    Alexander Cho authored muirmanders committed
    Fix bug where Event-Timestamp cannot write to buffer because
    date.getTime()/1000 is not an integer.
Commits on Mar 31, 2014
  1. @muirmanders
  2. @muirmanders

    Be sure to quote the nvm versions in travis YAML.

    muirmanders authored
    It happened to work anyway though (nvm use 0.1 chooses 0.10).
  3. @muirmanders

    Change node dependency to >= 0.8

    muirmanders authored
    Had to upgrade nodeunit to fix tests on node 0.11.
Commits on Mar 10, 2014
  1. @muirmanders

    Major version bump for new release.

    muirmanders authored
    Getting rid of the asynchronous interface was a compatibility
    breaking change.
Commits on Feb 24, 2014
  1. @muirmanders

    Get rid of asynchronous interface.

    muirmanders authored
    Made things way more complex, and I don't think it was buying you
    anything.
Commits on Feb 22, 2014
  1. @muirmanders
  2. @muirmanders

    Add suppose for Message-Authenticator attribute.

    muirmanders authored
    Message-Authenticator is an HMAC, improving security over
    the normal authenticator. node-radius will now add it to
    messages while encoding when appropriate, and verify it
    in messages when decoding. I will update README with more
    details.
Commits on Feb 20, 2014
  1. @muirmanders

    Fix attribute names that start with numbers.

    muirmanders authored
    When parsing the dictionary, it was misinterpreting the beginning
    of the attribute name as the vendor id in a VENDORATTR style attribute
    definition.
Commits on Feb 19, 2014
  1. @muirmanders

    Fix authenticator for "Status-Server" packets.

    muirmanders authored
    Per RFC 5997, like Access-Request this type of packet uses
    a random authenticator. There might be other types that also
    use a random authenticator, but I don't know of a good way
    to determine that list.
Commits on Jan 13, 2014
  1. @muirmanders

    Fix travis links.

    muirmanders authored
Commits on Mar 15, 2013
  1. @muirmanders
  2. @muirmanders

    Expand examples/auth_client.js a little.

    muirmanders authored
    Now it uses the new verify_response method to make sure it can
    trust the response it gets from the server.
Commits on Mar 13, 2013
  1. @muirmanders
  2. @muirmanders
  3. @muirmanders
  4. @muirmanders

    Fix async error callbacks.

    muirmanders authored
    Some places weren't returning after issuing an error which caused
    unexpected behavior in the async callback case.
Commits on Mar 12, 2013
  1. @muirmanders

    Add radius.verify_response method.

    muirmanders authored
    You can use this to verify a response packet. For example, if you
    send an Accounting-Request, after receiving the Accounting-Response
    you should use verify_response to make sure the response's
    authenticator is correct (i.e. the other side knows the shared secret).
  2. @muirmanders

    Improve handling of authenticators.

    muirmanders authored
    Now the special case is for Access-Request, and everything else behaves
    as Accounting did previously. Access-Request's authenticator is random,
    and to the best of my knowledge all other Request types just use
    the normal checksum authenticator (since there is no password), so when
    decoded "Request" types (other than "Access-Request") validate the
    authenticator accordingly. Similarly, when encoding packets, only use
    the create the random authenticator for "Access-Requests", and for
    everything else calculate the regular checksum (if you use prepare_response,
    the checksum will properly be over the request packet's authenticator).
Commits on Mar 11, 2013
  1. @muirmanders

    Some meaningless syntax changes.

    muirmanders authored
    Use curlies for one-line "if" blocks.
Commits on Feb 4, 2013
  1. @psanford

    Update version to 0.2.0.

    psanford authored
  2. @psanford

    Accept attributes as hash.

    psanford authored
    For simple packets you can pass the attributes as an array or
    as a hash. This will only work if you do not have vendor specific attributes
    and the order of the attributes does not matter for your packet.
    
    If you have nested attributes this will throw an exception.
    
    It is still recommended that you use the array style as that will work in
    all cases.
  3. @psanford

    Fix async mode for bad acct packets.

    psanford authored
    The code assumed it was running in non-async mode.
  4. @psanford

    Split test_accounting into two tests.

    psanford authored
    Pulled out the test for handling invalid packet authenticators.
Commits on Nov 19, 2012
  1. @natemueller

    Bump version number

    natemueller authored
  2. @natemueller

    Verify shared secret for accounting requests

    natemueller authored
    Raise an error that includes the parsed packet if the exceptions
    don't match.
Commits on Oct 31, 2012
  1. @psanford
Something went wrong with that request. Please try again.