This is the SNAC sent by the server in reply to BUCP__CHALLENGE_REQUEST. After this is sent, the client should send a BUCP__LOGIN_REQUEST packet, where the challenge it recieves here is used when hashing the password.
00 17 |
|
word |
|
SNAC foodgroup |
00 07 |
|
word |
|
SNAC subgroup |
00 00 |
|
word |
|
SNAC flags |
00 00 00 00 |
|
dword |
|
SNAC request ID |
|
SNAC DataThe SNAC data is as follows, in this order:
- Challenge length (uint16/word)
- Challenge (bytes)
SNAC DumpExample dump (from NINA's servers - with a FLAP header):
0000 2a 02 00 01 00 16 00 17 00 07 00 00 00 00 00 00 *...............
0010 00 0a 36 30 30 35 38 35 35 39 34 36 ..6005855946
Note for server developers: I'm not quite sure if there is anything fancy going on in the challenge generation in NINA, but judging by the packet dumps above, I simply just made a string with 10 random numbers, as seen in my server
| |