summaryrefslogtreecommitdiffstats
path: root/Bugzilla/Auth
diff options
context:
space:
mode:
authordkl%redhat.com <>2008-10-23 04:54:56 +0200
committerdkl%redhat.com <>2008-10-23 04:54:56 +0200
commite0da20baba17b7f068946c8647fb6d67e77c39b7 (patch)
tree48eb0a0ffc3e35093fdc201f8044dadb1a9d0078 /Bugzilla/Auth
parent55e5f706991e787a1e8682f3daa31ed47ea11be6 (diff)
downloadbugzilla-e0da20baba17b7f068946c8647fb6d67e77c39b7.tar.gz
bugzilla-e0da20baba17b7f068946c8647fb6d67e77c39b7.tar.xz
Bug 455584 - Use bz_crypt everywhere instead of the crypt() function
Patch by David Lawrence <dkl@redhat.com> = r/a=LpSolit
Diffstat (limited to 'Bugzilla/Auth')
-rw-r--r--Bugzilla/Auth/Verify/DB.pm7
1 files changed, 1 insertions, 6 deletions
diff --git a/Bugzilla/Auth/Verify/DB.pm b/Bugzilla/Auth/Verify/DB.pm
index f2c008dbf..0f73063d2 100644
--- a/Bugzilla/Auth/Verify/DB.pm
+++ b/Bugzilla/Auth/Verify/DB.pm
@@ -53,14 +53,9 @@ sub check_credentials {
"SELECT cryptpassword FROM profiles WHERE userid = ?",
undef, $user_id);
- # Wide characters cause crypt to die
- if (Bugzilla->params->{'utf8'}) {
- utf8::encode($password) if utf8::is_utf8($password);
- }
-
# Using the internal crypted password as the salt,
# crypt the password the user entered.
- my $entered_password_crypted = crypt($password, $real_password_crypted);
+ my $entered_password_crypted = bz_crypt($password, $real_password_crypted);
return { failure => AUTH_LOGINFAILED }
if $entered_password_crypted ne $real_password_crypted;