[Pkg-cups-devel] Bug#344898: Bug#344898: [Debian QA] please review your old bug reports against CUPS

Kenshi Muto kmuto at debian.org
Mon Jul 16 07:37:54 UTC 2007


severity 344898 wishlist
tags 344898 + wontfix
thanks

At Sun, 15 Jul 2007 17:16:48 +0200,
Jean-Philippe Guérard wrote:
> Password read from the browser are truncated to 32 caracters, so will 
> only be able to match a 32 caracters or less password.

You're right. CUPS authentication limits up to 32 characters
for its password.

#if HAVE_LIBPAM
typedef struct cupsd_authdata_s         /**** Authentication data ****/
{
  char  username[33],                   /* Username string */
        password[33];                   /* Password string */
} cupsd_authdata_t;
#endif /* HAVE_LIBPAM */
 ...
void
cupsdAuthorize(cupsd_client_t *con)     /* I - Client connection */
{
  int           type;                   /* Authentication type */
  char          *authorization,         /* Pointer into Authorization string */
                *ptr,                   /* Pointer into string */
                username[65],           /* Username string */
                password[33];           /* Password string */
  const char    *localuser;             /* Certificate username */
  char          nonce[HTTP_MAX_VALUE],  /* Nonce value from client */
                md5[33],                /* MD5 password */
                basicmd5[33];           /* MD5 of Basic password */

This seems a design rather than a bug.
I'm sorry but I'd like to tag wontfix to #344898.

Thanks,
-- 
Kenshi Muto
kmuto at debian.org




More information about the Pkg-cups-devel mailing list