Code

Fix first part of Password handling security issue2550688 (thanks
authorschlatterbeck <schlatterbeck@57a73879-2fb5-44c3-a270-3262357dd7e2>
Thu, 14 Apr 2011 12:24:59 +0000 (12:24 +0000)
committerschlatterbeck <schlatterbeck@57a73879-2fb5-44c3-a270-3262357dd7e2>
Thu, 14 Apr 2011 12:24:59 +0000 (12:24 +0000)
commitdbc35d39450d413b1eb0aa2f9d4580dd0e34b2ac
treeeae15a0d87b71a45b8713524e48220ceb3afdb26
parentfb10034059c18670cc3ef68113ff1cac553139cb
Fix first part of Password handling security issue2550688 (thanks
Joseph Myers for reporting and Eli Collins for fixing)

Small change against original patch: We still accept plaintext passwords
(in known_schemes) when parsing encrypted password (e.g. from database).
This way existing databases with plaintext passwords continue to work (I
don't know of any, this would need patching on the users side) and all
regression tests pass.

git-svn-id: http://svn.roundup-tracker.org/svnroot/roundup/roundup/trunk@4589 57a73879-2fb5-44c3-a270-3262357dd7e2
CHANGES.txt
doc/acknowledgements.txt
roundup/backends/back_anydbm.py
roundup/backends/rdbms_common.py
roundup/hyperdb.py
roundup/password.py
roundup/roundupdb.py
test/db_test_base.py
test/test_security.py