This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/18588] New: crypt "leaks" ENOENT


https://sourceware.org/bugzilla/show_bug.cgi?id=18588

            Bug ID: 18588
           Summary: crypt "leaks" ENOENT
           Product: glibc
           Version: 2.21
            Status: NEW
          Severity: normal
          Priority: P2
         Component: libc
          Assignee: unassigned at sourceware dot org
          Reporter: akshay.moghe at gmail dot com
                CC: drepper.fsp at gmail dot com
  Target Milestone: ---

Running:
--------

Linux 3.13.0-55-generic on Fedora release 22 (Twenty Two)

GNU C Library (GNU libc) stable release version 2.21
Compiled by GNU CC version 5.0.0 20150217 (Red Hat 5.0.0-0.15).


Issue
-----

On a successful call to crypt_r using a salt that employs the use of SHA512
("$6$saltedsalted6464$") even when the function returns a valid hash, the errno
is set to ENOENT. Presumably this is due to the fips check (failing because of
missing proc entry).

One can make a case for this errno to be cleared on successful execution of the
function.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]