Please sign in to comment.
musl: improve crypt() size hack
Instead of silently downgrading any non-MD5 crypt() request to DES, cleanly fail with return NULL and errno = ENOSYS. This allows callers to notice the missing support instead of the unwanted silent fallback to DES. Also add a menuconfig toolchain option to optionally disable the crypt size hack completely. This can be probably made dependant on SMALL_FLASH or a similar feature indicator in a future commit. Ref: openwrt#1331 Signed-off-by: Jo-Philipp Wich <email@example.com>
- Loading branch information...
Showing with 54 additions and 25 deletions.
|@@ -0,0 +1,12 @@|
|# Password crypt stubbing|
|bool "Include crypt() support for SHA256, SHA512 and Blowfish ciphers"|
|depends on TOOLCHAINOPTS && USE_MUSL && !EXTERNAL_TOOLCHAIN|
|Enable this option to re-include crypt() support for the SHA256, SHA512 and|
|Blowfish ciphers. Without this option, attempting to hash a string with a salt|
|requesting one of these ciphers will cause the crypt() function to call stub|
|implementations which will always fail with errno ENOSYS. Including the ciphers|
|will increase the library size by about 14KB after LZMA compression.|