Message245649
| Author | barry |
|---|---|
| Recipients | barry, catalin.iacob, jesstess, python-dev, r.david.murray, sandro.tosi, zvyn |
| Date | 2015-06-22.21:14:32 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1435007672.95.0.82828932857.issue15014@psf.upfronthosting.co.za> |
| In-reply-to |
| Content | |
|---|---|
Here's a rough thought for a fix. Some auth_*() methods require a challenge, but some don't, e.g. auth_plain(). Let's allow authobject() to be called with challenge=None. If they allow an initial-response, then they can just return the response bytes. If they return None, then they don't allow an initial-response and so must wait for the challenge (i.e. 334 response code). I think that would at least restore backward compatibility for AUTH PLAIN. |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2015-06-22 21:14:32 | barry | set | recipients: + barry, r.david.murray, jesstess, sandro.tosi, catalin.iacob, python-dev, zvyn |
| 2015-06-22 21:14:32 | barry | set | messageid: <1435007672.95.0.82828932857.issue15014@psf.upfronthosting.co.za> |
| 2015-06-22 21:14:32 | barry | link | issue15014 messages |
| 2015-06-22 21:14:32 | barry | create | |