Package: bitlbee
Version: 0.92-1

Authorization failure happens, if trying to use a jabber account with a
password longer than 31 characters.

Applied is a patch against some version that made jabber work for me.
It fixes the problem by changing two structs, allowing 127 chars long
passwords instead.

A more correct fix would probably be to fail or warn the user when a to
long password is added. Or maybe even allocate memory dynamically, but
that might be overkill.
--
/Martin
diff -ur bitlbee-20050825/protocols/nogaim.h 
bitlbee-20050825-patched/protocols/nogaim.h
--- bitlbee-20050825/protocols/nogaim.h Sat Oct 30 01:42:07 2004
+++ bitlbee-20050825-patched/protocols/nogaim.h Thu Aug 25 16:53:21 2005
@@ -94,7 +94,7 @@
        
        char username[64];
        char displayname[128];
-       char password[32];
+       char password[128];
        guint keepalive;
        /* stuff needed for per-connection idle times */
        guint idle_timer;
@@ -148,7 +148,7 @@
 struct aim_user {
        char username[64];
        char alias[SELF_ALIAS_LEN]; 
-       char password[32];
+       char password[128];
        char user_info[2048];
        int options;
        int protocol;

Reply via email to