[PATCH crypt 5/8] Disable blowfish cipher

Corinna Vinschen corinna-cygwin@cygwin.com
Fri Aug 4 07:46:00 GMT 2017


On Aug  3 21:52, Yaakov Selkowitz wrote:
> This didn't work properly when tested, and is not found in glibc.
> 
> ---
>  crypt_r.c | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/crypt_r.c b/crypt_r.c
> index 75ba60b..f30d41d 100644
> --- a/crypt_r.c
> +++ b/crypt_r.c
> @@ -18,8 +18,10 @@ char *__crypt_r(const char *key, const char *salt, struct crypt_data *data)
>  	if (salt[0] == '$' && salt[1] && salt[2]) {
>  		if (salt[1] == '1' && salt[2] == '$')
>  			return __crypt_md5(key, salt, output);
> +#if 0 /* doesn't work, not found in glibc */
>  		if (salt[1] == '2' && salt[3] == '$')
>  			return __crypt_blowfish(key, salt, output);
> +#endif
>  		if (salt[1] == '5' && salt[2] == '$')
>  			return __crypt_sha256(key, salt, output);
>  		if (salt[1] == '6' && salt[2] == '$')
> -- 
> 2.13.2

Any details?  I don't see anything target dependent in the blowfish
code.


Corinna

-- 
Corinna Vinschen                  Please, send mails regarding Cygwin to
Cygwin Maintainer                 cygwin AT cygwin DOT com
Red Hat
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://cygwin.com/pipermail/cygwin-apps/attachments/20170804/819f93d0/attachment.sig>


More information about the Cygwin-apps mailing list