Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 May 1995 00:08:53 -0700 (PDT)
From:      "Rodney W. Grimes" <rgrimes@gndrsh.aac.dev.com>
To:        asami@freefall.cdrom.com (Satoshi Asami)
Cc:        CVS-commiters@freefall.cdrom.com, cvs-ports@freefall.cdrom.com
Subject:   Re: cvs commit: ports/mail/popper/patches patch-ac
Message-ID:  <199505240708.AAA08617@gndrsh.aac.dev.com>
In-Reply-To: <199505240535.WAA29518@freefall.cdrom.com> from "Satoshi Asami" at May 23, 95 10:35:49 pm

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> asami       95/05/23 22:35:48
> 
>   Added:       mail/popper/patches  patch-ac
>   Log:
>   Make popper work for both DES and MD4 passwords.  Basically, just
>   change one of the error checks from "strlen(.) != 13" to "strlen(.) !=
>   13 && strlen(.) != 34".
>   
>   Submitted by:	Martin Renters <martin@victor.innovus.com>

Code that knows about the length of the password entry in a system
should be considered extremly non portable at best, and a violation
of data abstraction at worst.

The man page for getpwent says:
                   char    *pw_passwd;     /* encrypted password */

No place in any of the manual pages will you find that the string
length of the password string is either 13 or 34 bytes, Poul and I
dug all over for this very thing when he wanted to do the MD5 password
before it was ever done to make sure we would not be breaking a
documented interface.

Popper should treat this as a null terminated string of unknown length!


-- 
Rod Grimes                                      rgrimes@gndrsh.aac.dev.com
Accurate Automation Company                   Custom computers for FreeBSD



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199505240708.AAA08617>