mpyne added a comment.

  When reviewing this, please see also the review chain at 
https://git.reviewboard.kde.org/r/127833/#review95717 , which had proposed 
removing the then-needless KWallet includes.
  
  In essence the sticking point we have currently is that fixing the Blowfish 
implementation on big-endian machines will break the ability of users to open 
their wallets if their wallet was generated by the broken Blowfish 
implementation.  That is the only reason the broken code remains -- the 
testcase was added so that we would catch breakages going into the future and 
prevent that bug from being introduced.
  
  The best fix is to find a way to read files generated with the proper cipher 
and, on big-endian only, also if encoded with the broken cipher.
  
  Poking around through the code this seems like it might be most easily 
possible in src/runtime/kwalletd/backend/backendpersisthandler.cpp, where it 
might be possible to retry the decryption with a byte-order-reversed key and 
see if it then succeeds (again, only on big-endian).

REPOSITORY
  R311 KWallet

REVISION DETAIL
  https://phabricator.kde.org/D4335

EMAIL PREFERENCES
  https://phabricator.kde.org/settings/panel/emailpreferences/

To: awilcox
Cc: mpyne, #frameworks

Reply via email to