JacoFourie
JacoFourie
Here is the Python code to use AES and not Blowfish. #!/usr/bin/python from Crypto.Cipher import AES import base64 blocksize = 16 keystr = b'mysimplekey ' iv = b'123456 ' data_string...
Hi. I saw that and I did update to the latest yesterday but I still have this issue. I will wait to see if it gets fixed. Thanks a lot.
@ioolkos thanks for the reply. I don't understand what the metric means. I do not have any clients that should have messages queued or saved to disk. If that is...
@ioolkos why would that number not be 0. How does VenMQ decide to add to that counter?
@ioolkos ok so I can ignore it then?
OK so I seem to have found where it is coming from. Why is there a while loop here ? ```` if (payload.containsKey("text")) { while (millis() < sttime+8000) { //...
OK it seems that if the network or something is busy that code will fire in a loop and create duplicate messages. I managed to get it firing 3 times...
I have commented out the while loop and will let it run now to see if I still get the duplicates. I guess the loop is there to make sure...
OK so the code has been running 9.5 hours. It will send a message every 2 minutes to test. I did not get any duplicates. But I did loose one...
OK I see what is going on here. The response while loop will return sometimes with no response and then the send loop will send again. So this loop needs...