[Differential] [Commented On] D4335: Fix endianness issues once and for all in Blowfish algorithm
Michael Pyne
noreply at phabricator.kde.org
Tue Jan 31 02:33:01 UTC 2017
mpyne added a comment.
When reviewing this, please see also the review chain at https://git.reviewboard.kde.org/r/127833/#review95717 , which had proposed removing the then-needless KWallet includes.
In essence the sticking point we have currently is that fixing the Blowfish implementation on big-endian machines will break the ability of users to open their wallets if their wallet was generated by the broken Blowfish implementation. That is the only reason the broken code remains -- the testcase was added so that we would catch breakages going into the future and prevent that bug from being introduced.
The best fix is to find a way to read files generated with the proper cipher and, on big-endian only, also if encoded with the broken cipher.
Poking around through the code this seems like it might be most easily possible in src/runtime/kwalletd/backend/backendpersisthandler.cpp, where it might be possible to retry the decryption with a byte-order-reversed key and see if it then succeeds (again, only on big-endian).
REPOSITORY
R311 KWallet
REVISION DETAIL
https://phabricator.kde.org/D4335
EMAIL PREFERENCES
https://phabricator.kde.org/settings/panel/emailpreferences/
To: awilcox
Cc: mpyne, #frameworks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kde.org/pipermail/kde-frameworks-devel/attachments/20170131/0ddd86d6/attachment-0001.html>
More information about the Kde-frameworks-devel
mailing list