This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/18588] New: crypt "leaks" ENOENT
- From: "akshay.moghe at gmail dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Wed, 24 Jun 2015 06:57:49 +0000
- Subject: [Bug libc/18588] New: crypt "leaks" ENOENT
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=18588
Bug ID: 18588
Summary: crypt "leaks" ENOENT
Product: glibc
Version: 2.21
Status: NEW
Severity: normal
Priority: P2
Component: libc
Assignee: unassigned at sourceware dot org
Reporter: akshay.moghe at gmail dot com
CC: drepper.fsp at gmail dot com
Target Milestone: ---
Running:
--------
Linux 3.13.0-55-generic on Fedora release 22 (Twenty Two)
GNU C Library (GNU libc) stable release version 2.21
Compiled by GNU CC version 5.0.0 20150217 (Red Hat 5.0.0-0.15).
Issue
-----
On a successful call to crypt_r using a salt that employs the use of SHA512
("$6$saltedsalted6464$") even when the function returns a valid hash, the errno
is set to ENOENT. Presumably this is due to the fips check (failing because of
missing proc entry).
One can make a case for this errno to be cleared on successful execution of the
function.
--
You are receiving this mail because:
You are on the CC list for the bug.