summaryrefslogtreecommitdiffstats
path: root/toolchain/musl/patches/901-crypt_size_hack.patch
blob: 8cd7b1989ca6e9f7b890f9a81fbfe33227d1dd12 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
--- a/src/crypt/crypt_r.c
+++ b/src/crypt/crypt_r.c
@@ -19,12 +19,6 @@ char *__crypt_r(const char *key, const c
 	if (salt[0] == '$' && salt[1] && salt[2]) {
 		if (salt[1] == '1' && salt[2] == '$')
 			return __crypt_md5(key, salt, output);
-		if (salt[1] == '2' && salt[3] == '$')
-			return __crypt_blowfish(key, salt, output);
-		if (salt[1] == '5' && salt[2] == '$')
-			return __crypt_sha256(key, salt, output);
-		if (salt[1] == '6' && salt[2] == '$')
-			return __crypt_sha512(key, salt, output);
 	}
 	return __crypt_des(key, salt, output);
 }
--- a/src/crypt/crypt_sha512.c
+++ b/src/crypt/crypt_sha512.c
@@ -12,6 +12,7 @@
 #include <stdio.h>
 #include <string.h>
 #include <stdint.h>
+#if 0
 
 /* public domain sha512 implementation based on fips180-3 */
 /* >=2^64 bits messages are not supported (about 2000 peta bytes) */
@@ -369,3 +370,4 @@ char *__crypt_sha512(const char *key, co
 		return "*";
 	return p;
 }
+#endif
--- a/src/crypt/crypt_blowfish.c
+++ b/src/crypt/crypt_blowfish.c
@@ -50,6 +50,7 @@
 #include <string.h>
 #include <stdint.h>
 
+#if 0
 typedef uint32_t BF_word;
 typedef int32_t BF_word_signed;
 
@@ -796,3 +797,4 @@ char *__crypt_blowfish(const char *key,
 
 	return "*";
 }
+#endif
--- a/src/crypt/crypt_sha256.c
+++ b/src/crypt/crypt_sha256.c
@@ -13,6 +13,7 @@
 #include <string.h>
 #include <stdint.h>
 
+#if 0
 /* public domain sha256 implementation based on fips180-3 */
 
 struct sha256 {
@@ -320,3 +321,4 @@ char *__crypt_sha256(const char *key, co
 		return "*";
 	return p;
 }
+#endif