[Pkg-cups-devel] Bug#344898: Bug#344898: [Debian QA] please review your old bug reports against CUPS
Kenshi Muto
kmuto at debian.org
Mon Jul 16 07:37:54 UTC 2007
severity 344898 wishlist
tags 344898 + wontfix
thanks
At Sun, 15 Jul 2007 17:16:48 +0200,
Jean-Philippe Guérard wrote:
> Password read from the browser are truncated to 32 caracters, so will
> only be able to match a 32 caracters or less password.
You're right. CUPS authentication limits up to 32 characters
for its password.
#if HAVE_LIBPAM
typedef struct cupsd_authdata_s /**** Authentication data ****/
{
char username[33], /* Username string */
password[33]; /* Password string */
} cupsd_authdata_t;
#endif /* HAVE_LIBPAM */
...
void
cupsdAuthorize(cupsd_client_t *con) /* I - Client connection */
{
int type; /* Authentication type */
char *authorization, /* Pointer into Authorization string */
*ptr, /* Pointer into string */
username[65], /* Username string */
password[33]; /* Password string */
const char *localuser; /* Certificate username */
char nonce[HTTP_MAX_VALUE], /* Nonce value from client */
md5[33], /* MD5 password */
basicmd5[33]; /* MD5 of Basic password */
This seems a design rather than a bug.
I'm sorry but I'd like to tag wontfix to #344898.
Thanks,
--
Kenshi Muto
kmuto at debian.org
More information about the Pkg-cups-devel
mailing list