forked from Openwrt/openwrt
aaec2ad13b
This release introduces 64-bit time_t, which is needed to avoid the year 2038 problem. Remove upstream patches. Refreshed others. Rebased features.h file based on latest musl. Signed-off-by: Rosen Penev <rosenp@gmail.com>
76 lines
1.4 KiB
Diff
76 lines
1.4 KiB
Diff
--- a/src/crypt/crypt_sha512.c
|
|
+++ b/src/crypt/crypt_sha512.c
|
|
@@ -13,6 +13,17 @@
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
|
|
+#ifdef CRYPT_SIZE_HACK
|
|
+#include <errno.h>
|
|
+
|
|
+char *__crypt_sha512(const char *key, const char *setting, char *output)
|
|
+{
|
|
+ errno = ENOSYS;
|
|
+ return NULL;
|
|
+}
|
|
+
|
|
+#else
|
|
+
|
|
/* public domain sha512 implementation based on fips180-3 */
|
|
/* >=2^64 bits messages are not supported (about 2000 peta bytes) */
|
|
|
|
@@ -369,3 +380,4 @@ char *__crypt_sha512(const char *key, co
|
|
return "*";
|
|
return p;
|
|
}
|
|
+#endif
|
|
--- a/src/crypt/crypt_blowfish.c
|
|
+++ b/src/crypt/crypt_blowfish.c
|
|
@@ -50,6 +50,17 @@
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
|
|
+#ifdef CRYPT_SIZE_HACK
|
|
+#include <errno.h>
|
|
+
|
|
+char *__crypt_blowfish(const char *key, const char *setting, char *output)
|
|
+{
|
|
+ errno = ENOSYS;
|
|
+ return NULL;
|
|
+}
|
|
+
|
|
+#else
|
|
+
|
|
typedef uint32_t BF_word;
|
|
typedef int32_t BF_word_signed;
|
|
|
|
@@ -804,3 +815,4 @@ char *__crypt_blowfish(const char *key,
|
|
|
|
return "*";
|
|
}
|
|
+#endif
|
|
--- a/src/crypt/crypt_sha256.c
|
|
+++ b/src/crypt/crypt_sha256.c
|
|
@@ -13,6 +13,17 @@
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
|
|
+#ifdef CRYPT_SIZE_HACK
|
|
+#include <errno.h>
|
|
+
|
|
+char *__crypt_sha256(const char *key, const char *setting, char *output)
|
|
+{
|
|
+ errno = ENOSYS;
|
|
+ return NULL;
|
|
+}
|
|
+
|
|
+#else
|
|
+
|
|
/* public domain sha256 implementation based on fips180-3 */
|
|
|
|
struct sha256 {
|
|
@@ -320,3 +331,4 @@ char *__crypt_sha256(const char *key, co
|
|
return "*";
|
|
return p;
|
|
}
|
|
+#endif
|