summaryrefslogtreecommitdiffstats
path: root/toolchain/musl/patches/901-crypt_size_hack.patch
blob: 75f196abca5f44c3d17400d83f9eef30057bdff7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
--- a/src/crypt/crypt_sha512.c
+++ b/src/crypt/crypt_sha512.c
@@ -13,6 +13,17 @@
 #include <string.h>
 #include <stdint.h>
 
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_sha512(const char *key, const char *setting, char *output)
+{
+	errno = ENOSYS;
+	return NULL;
+}
+
+#else
+
 /* public domain sha512 implementation based on fips180-3 */
 /* >=2^64 bits messages are not supported (about 2000 peta bytes) */
 
@@ -369,3 +380,4 @@ char *__crypt_sha512(const char *key, co
 		return "*";
 	return p;
 }
+#endif
--- a/src/crypt/crypt_blowfish.c
+++ b/src/crypt/crypt_blowfish.c
@@ -50,6 +50,17 @@
 #include <string.h>
 #include <stdint.h>
 
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_blowfish(const char *key, const char *setting, char *output)
+{
+	errno = ENOSYS;
+	return NULL;
+}
+
+#else
+
 typedef uint32_t BF_word;
 typedef int32_t BF_word_signed;
 
@@ -796,3 +807,4 @@ char *__crypt_blowfish(const char *key,
 
 	return "*";
 }
+#endif
--- a/src/crypt/crypt_sha256.c
+++ b/src/crypt/crypt_sha256.c
@@ -13,6 +13,17 @@
 #include <string.h>
 #include <stdint.h>
 
+#ifdef CRYPT_SIZE_HACK
+#include <errno.h>
+
+char *__crypt_sha256(const char *key, const char *setting, char *output)
+{
+	errno = ENOSYS;
+	return NULL;
+}
+
+#else
+
 /* public domain sha256 implementation based on fips180-3 */
 
 struct sha256 {
@@ -320,3 +331,4 @@ char *__crypt_sha256(const char *key, co
 		return "*";
 	return p;
 }
+#endif