NTLM: recent boringssl brought DES_set_odd_parity back
... so improve the #ifdefs for using our local implementation.
This commit is contained in:
@@ -22,7 +22,7 @@
|
|||||||
|
|
||||||
#include "curl_setup.h"
|
#include "curl_setup.h"
|
||||||
|
|
||||||
#if defined(USE_NTLM) && (!defined(USE_OPENSSL) || defined(HAVE_BORINGSSL))
|
#if defined(USE_NTLM) && !defined(HAVE_DES_SET_ODD_PARITY)
|
||||||
|
|
||||||
#include "curl_des.h"
|
#include "curl_des.h"
|
||||||
|
|
||||||
|
@@ -146,7 +146,7 @@ static void setup_des_key(const unsigned char *key_56,
|
|||||||
extend_key_56_to_64(key_56, (char *) key);
|
extend_key_56_to_64(key_56, (char *) key);
|
||||||
|
|
||||||
/* Set the key parity to odd */
|
/* Set the key parity to odd */
|
||||||
#if defined(HAVE_BORINGSSL)
|
#ifndef HAVE_DES_SET_ODD_PARITY /* older boringssl */
|
||||||
Curl_des_set_odd_parity((unsigned char *) &key, sizeof(key));
|
Curl_des_set_odd_parity((unsigned char *) &key, sizeof(key));
|
||||||
#else
|
#else
|
||||||
DES_set_odd_parity(&key);
|
DES_set_odd_parity(&key);
|
||||||
|
Reference in New Issue
Block a user