On Aug 3 21:52, Yaakov Selkowitz wrote: > This didn't work properly when tested, and is not found in glibc. > > --- > crypt_r.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/crypt_r.c b/crypt_r.c > index 75ba60b..f30d41d 100644 > --- a/crypt_r.c > +++ b/crypt_r.c > @@ -18,8 +18,10 @@ char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) > if (salt[0] == '$' && salt[1] && salt[2]) { > if (salt[1] == '1' && salt[2] == '$') > return __crypt_md5(key, salt, output); > +#if 0 /* doesn't work, not found in glibc */ > if (salt[1] == '2' && salt[3] == '$') > return __crypt_blowfish(key, salt, output); > +#endif > if (salt[1] == '5' && salt[2] == '$') > return __crypt_sha256(key, salt, output); > if (salt[1] == '6' && salt[2] == '$') > -- > 2.13.2 Any details? I don't see anything target dependent in the blowfish code. Corinna -- Corinna Vinschen Please, send mails regarding Cygwin to Cygwin Maintainer cygwin AT cygwin DOT com Red Hat