applied

On Wed, Jul 20, 2016 at 01:31:33PM +0200, Dominik Csapak wrote:
> we wrongly assumed the keys to be 32 chars long,
> instead of 16
> 
> Signed-off-by: Dominik Csapak <d.csa...@proxmox.com>
> ---
>  PVE/AccessControl.pm | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/PVE/AccessControl.pm b/PVE/AccessControl.pm
> index 0af92d7..0b64374 100644
> --- a/PVE/AccessControl.pm
> +++ b/PVE/AccessControl.pm
> @@ -1299,7 +1299,7 @@ sub oath_verify_otp {
>      foreach my $k (PVE::Tools::split_list($keys)) {
>       # Note: we generate 3 values to allow small time drift
>       my $binkey;
> -     if ($k =~ /^[A-Z2-7=]{32}$/) {
> +     if ($k =~ /^[A-Z2-7=]{16}$/) {
>           $binkey = MIME::Base32::decode_rfc3548($k);
>       } elsif ($k =~ /^[A-Fa-f0-9]{40}$/) {
>           $binkey = pack('H*', $k);
> -- 
> 2.1.4

_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to