Resolves: tdf#84121 wrong password passed to xpdfimport

regression from...

commit eb276d11a652601f743d69ada7a38016bd97d73e
Author: Fridrich Štrba <fridrich.strba@bluewin.ch>
Date:   Mon Jul 8 14:01:17 2013 +0200

    fdo#38878: Upgrading internal xpdf -> poppler

before this the hashed _OOO_pdfi_Credentials_ was used
in the removed OOoImportSecurityhandler::authorize

but after this the hashed password continued to be
passed through stdin, while the unhashed password
was the required data.

Change-Id: Iadc8a372abcfab514f724dd95f05776e5153d007
This commit is contained in:
Caolán McNamara 2016-07-29 09:57:19 +01:00
parent 9da4c9bc71
commit 2a66c02553

View File

@ -961,13 +961,6 @@ static bool checkEncryption( const OUString& i_rPa
OSL_TRACE( "password: %s", bAuthenticated ? "matches" : "does not match" ); OSL_TRACE( "password: %s", bAuthenticated ? "matches" : "does not match" );
bSuccess = bAuthenticated; bSuccess = bAuthenticated;
} }
if( bAuthenticated )
{
OUStringBuffer aBuf( 128 );
aBuf.append( "_OOO_pdfi_Credentials_" );
aBuf.append( pPDFFile->getDecryptionKey() );
io_rPwd = aBuf.makeStringAndClear();
}
} }
else if( i_xIHdl.is() ) else if( i_xIHdl.is() )
{ {