aboutsummaryrefslogtreecommitdiffstats
path: root/toolchain/musl/Config.in
diff options
context:
space:
mode:
authorJo-Philipp Wich <jo@mein.io>2019-01-22 09:50:09 +0100
committerJo-Philipp Wich <jo@mein.io>2019-01-22 12:08:03 +0100
commitceb625439a84c7ea4ab1e39f126b6baffc48d1cd (patch)
tree46fd430073a208627f821711bae6e690ddd14bd7 /toolchain/musl/Config.in
parent1211832977b98c491d1198ab66c4f8ffc0886a87 (diff)
downloadupstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.tar.gz
upstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.tar.bz2
upstream-ceb625439a84c7ea4ab1e39f126b6baffc48d1cd.zip
musl: improve crypt() size hack
Instead of silently downgrading any non-MD5 crypt() request to DES, cleanly fail with return NULL and errno = ENOSYS. This allows callers to notice the missing support instead of the unwanted silent fallback to DES. Also add a menuconfig toolchain option to optionally disable the crypt size hack completely. This can be probably made dependant on SMALL_FLASH or a similar feature indicator in a future commit. Ref: https://github.com/openwrt/openwrt/pull/1331 Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Diffstat (limited to 'toolchain/musl/Config.in')
-rw-r--r--toolchain/musl/Config.in12
1 files changed, 12 insertions, 0 deletions
diff --git a/toolchain/musl/Config.in b/toolchain/musl/Config.in
new file mode 100644
index 0000000000..7e83b6fa53
--- /dev/null
+++ b/toolchain/musl/Config.in
@@ -0,0 +1,12 @@
+# Password crypt stubbing
+
+config MUSL_DISABLE_CRYPT_SIZE_HACK
+ bool "Include crypt() support for SHA256, SHA512 and Blowfish ciphers"
+ depends on TOOLCHAINOPTS && USE_MUSL && !EXTERNAL_TOOLCHAIN
+ default n
+ help
+ Enable this option to re-include crypt() support for the SHA256, SHA512 and
+ Blowfish ciphers. Without this option, attempting to hash a string with a salt
+ requesting one of these ciphers will cause the crypt() function to call stub
+ implementations which will always fail with errno ENOSYS. Including the ciphers
+ will increase the library size by about 14KB after LZMA compression.