mirror of
				git://git.openwrt.org/openwrt/openwrt.git
				synced 2025-11-04 06:54:27 -05:00 
			
		
		
		
	Instead of silently downgrading any non-MD5 crypt() request to DES, cleanly fail with return NULL and errno = ENOSYS. This allows callers to notice the missing support instead of the unwanted silent fallback to DES. Also add a menuconfig toolchain option to optionally disable the crypt size hack completely. This can be probably made dependant on SMALL_FLASH or a similar feature indicator in a future commit. Ref: https://github.com/openwrt/openwrt/pull/1331 Signed-off-by: Jo-Philipp Wich <jo@mein.io>
		
			
				
	
	
		
			13 lines
		
	
	
		
			609 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			13 lines
		
	
	
		
			609 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
# Password crypt stubbing
 | 
						|
 | 
						|
config MUSL_DISABLE_CRYPT_SIZE_HACK
 | 
						|
	bool "Include crypt() support for SHA256, SHA512 and Blowfish ciphers"
 | 
						|
	depends on TOOLCHAINOPTS && USE_MUSL && !EXTERNAL_TOOLCHAIN
 | 
						|
	default n
 | 
						|
	help
 | 
						|
	  Enable this option to re-include crypt() support for the SHA256, SHA512 and
 | 
						|
	  Blowfish ciphers. Without this option, attempting to hash a string with a salt
 | 
						|
	  requesting one of these ciphers will cause the crypt() function to call stub
 | 
						|
	  implementations which will always fail with errno ENOSYS. Including the ciphers
 | 
						|
	  will increase the library size by about 14KB after LZMA compression.
 |