aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/hack-5.10/911-kobject_add_broadcast_uevent.patch
diff options
context:
space:
mode:
authorPetr Štetiar <ynezz@true.cz>2021-12-14 12:12:18 +0100
committerPetr Štetiar <ynezz@true.cz>2021-12-27 11:26:32 +0100
commit66768755791286fc02a38d1b437a9da74290041d (patch)
tree52bb5c12ea1b0275b5312f3c1f8b2b527059262f /target/linux/generic/hack-5.10/911-kobject_add_broadcast_uevent.patch
parente1780de5ceba07c40b05834f2ca65654fc48da80 (diff)
downloadupstream-66768755791286fc02a38d1b437a9da74290041d.tar.gz
upstream-66768755791286fc02a38d1b437a9da74290041d.tar.bz2
upstream-66768755791286fc02a38d1b437a9da74290041d.zip
toolchain: musl: disable crypt size hack by default
Enable this option and thus re-include crypt() support for the SHA256, SHA512 and Blowfish ciphers on all devices. According to commit 9365745f8e7b ("musl: add a hack to remove unused crypt() algorithms, saves ~14k after lzma") it should add about ~14k to the resulting image, which seems to be a reasonable size increase for consistent crypt() support. Decided to not remove this hack completely as it might be still useful for people trying to fit custom images onto smaller devices and the patch is rather simple so we can afford to keep it for now. References: https://github.com/openwrt/openwrt/pull/1331 Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'target/linux/generic/hack-5.10/911-kobject_add_broadcast_uevent.patch')
0 files changed, 0 insertions, 0 deletions