Lines 43-48
krb5_salttype_to_string (krb5_context context,
Link Here
|
43 |
struct _krb5_encryption_type *e; |
43 |
struct _krb5_encryption_type *e; |
44 |
struct salt_type *st; |
44 |
struct salt_type *st; |
45 |
|
45 |
|
|
|
46 |
#if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3) |
47 |
if (OSSL_PROVIDER_load(NULL, "legacy") == NULL) |
48 |
return EINVAL; |
49 |
#endif |
50 |
|
46 |
e = _krb5_find_enctype (etype); |
51 |
e = _krb5_find_enctype (etype); |
47 |
if (e == NULL) { |
52 |
if (e == NULL) { |
48 |
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, |
53 |
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, |
Lines 75-80
krb5_string_to_salttype (krb5_context context,
Link Here
|
75 |
struct _krb5_encryption_type *e; |
80 |
struct _krb5_encryption_type *e; |
76 |
struct salt_type *st; |
81 |
struct salt_type *st; |
77 |
|
82 |
|
|
|
83 |
#if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3) |
84 |
if (OSSL_PROVIDER_load(NULL, "legacy") == NULL) |
85 |
return EINVAL; |
86 |
#endif |
87 |
|
78 |
e = _krb5_find_enctype (etype); |
88 |
e = _krb5_find_enctype (etype); |
79 |
if (e == NULL) { |
89 |
if (e == NULL) { |
80 |
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, |
90 |
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, |
Lines 196-201
krb5_string_to_key_data_salt_opaque (krb5_context context,
Link Here
|
196 |
enctype); |
206 |
enctype); |
197 |
return KRB5_PROG_ETYPE_NOSUPP; |
207 |
return KRB5_PROG_ETYPE_NOSUPP; |
198 |
} |
208 |
} |
|
|
209 |
#if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3) |
210 |
if (OSSL_PROVIDER_load(NULL, "legacy") == NULL) |
211 |
return EINVAL; |
212 |
#endif |
199 |
for(st = et->keytype->string_to_key; st && st->type; st++) |
213 |
for(st = et->keytype->string_to_key; st && st->type; st++) |
200 |
if(st->type == salt.salttype) |
214 |
if(st->type == salt.salttype) |
201 |
return (*st->string_to_key)(context, enctype, password, |
215 |
return (*st->string_to_key)(context, enctype, password, |