lede/toolchain/musl/patches/901-crypt_size_hack.patch

76 lines
1.4 KiB
Diff
Raw Normal View History

2017-09-06 19:19:45 +08:00
--- a/src/crypt/crypt_sha512.c
+++ b/src/crypt/crypt_sha512.c
2019-12-02 21:13:18 -08:00
@@ -13,6 +13,17 @@
2017-09-06 19:19:45 +08:00
#include <string.h>
#include <stdint.h>
2019-12-02 21:13:18 -08:00
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_sha512(const char *key, const char *setting, char *output)
+{
+ errno = ENOSYS;
+ return NULL;
+}
+
+#else
+
2017-09-06 19:19:45 +08:00
/* public domain sha512 implementation based on fips180-3 */
/* >=2^64 bits messages are not supported (about 2000 peta bytes) */
2019-12-02 21:13:18 -08:00
@@ -369,3 +380,4 @@ char *__crypt_sha512(const char *key, co
2017-09-06 19:19:45 +08:00
return "*";
return p;
}
+#endif
--- a/src/crypt/crypt_blowfish.c
+++ b/src/crypt/crypt_blowfish.c
2019-12-02 21:13:18 -08:00
@@ -50,6 +50,17 @@
2017-09-06 19:19:45 +08:00
#include <string.h>
#include <stdint.h>
2019-12-02 21:13:18 -08:00
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_blowfish(const char *key, const char *setting, char *output)
+{
+ errno = ENOSYS;
+ return NULL;
+}
+
+#else
+
2017-09-06 19:19:45 +08:00
typedef uint32_t BF_word;
typedef int32_t BF_word_signed;
@@ -804,3 +815,4 @@ char *__crypt_blowfish(const char *key,
2017-09-06 19:19:45 +08:00
return "*";
}
+#endif
--- a/src/crypt/crypt_sha256.c
+++ b/src/crypt/crypt_sha256.c
2019-12-02 21:13:18 -08:00
@@ -13,6 +13,17 @@
2017-09-06 19:19:45 +08:00
#include <string.h>
#include <stdint.h>
2019-12-02 21:13:18 -08:00
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_sha256(const char *key, const char *setting, char *output)
+{
+ errno = ENOSYS;
+ return NULL;
+}
+
+#else
+
2017-09-06 19:19:45 +08:00
/* public domain sha256 implementation based on fips180-3 */
struct sha256 {
2019-12-02 21:13:18 -08:00
@@ -320,3 +331,4 @@ char *__crypt_sha256(const char *key, co
2017-09-06 19:19:45 +08:00
return "*";
return p;
}
+#endif