diff options
author | Jo-Philipp Wich <jo@mein.io> | 2019-01-22 09:50:09 +0100 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2019-01-22 12:08:03 +0100 |
commit | ceb625439a84c7ea4ab1e39f126b6baffc48d1cd (patch) | |
tree | 46fd430073a208627f821711bae6e690ddd14bd7 /toolchain/musl/Config.in | |
parent | 1211832977b98c491d1198ab66c4f8ffc0886a87 (diff) | |
download | upstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.tar.gz upstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.tar.bz2 upstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.zip |
musl: improve crypt() size hack
Instead of silently downgrading any non-MD5 crypt() request to DES,
cleanly fail with return NULL and errno = ENOSYS. This allows callers
to notice the missing support instead of the unwanted silent fallback
to DES.
Also add a menuconfig toolchain option to optionally disable the crypt
size hack completely. This can be probably made dependant on SMALL_FLASH
or a similar feature indicator in a future commit.
Ref: https://github.com/openwrt/openwrt/pull/1331
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Diffstat (limited to 'toolchain/musl/Config.in')
-rw-r--r-- | toolchain/musl/Config.in | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/toolchain/musl/Config.in b/toolchain/musl/Config.in new file mode 100644 index 0000000000..7e83b6fa53 --- /dev/null +++ b/toolchain/musl/Config.in @@ -0,0 +1,12 @@ +# Password crypt stubbing + +config MUSL_DISABLE_CRYPT_SIZE_HACK + bool "Include crypt() support for SHA256, SHA512 and Blowfish ciphers" + depends on TOOLCHAINOPTS && USE_MUSL && !EXTERNAL_TOOLCHAIN + default n + help + Enable this option to re-include crypt() support for the SHA256, SHA512 and + Blowfish ciphers. Without this option, attempting to hash a string with a salt + requesting one of these ciphers will cause the crypt() function to call stub + implementations which will always fail with errno ENOSYS. Including the ciphers + will increase the library size by about 14KB after LZMA compression. |