[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1b0e22f0-1639-40d7-e860-0d6f2c97d341@fortanix.com>
Date: Wed, 31 Mar 2021 14:51:18 +0200
From: Raoul Strackx <raoul.strackx@...tanix.com>
To: Jarkko Sakkinen <jarkko@...nel.org>,
Dave Hansen <dave.hansen@...ux.intel.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
x86@...nel.org, "H. Peter Anvin" <hpa@...or.com>,
linux-sgx@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH RESEND 2/3] x86/sgx: Fix compatibility issue with OPENSSL <
1.1.0
The `RSA_get0_key` function only got introduced in OpenSSL 1.1.0. This makes compilation fail with older versions.
Signed-off-by: Raoul Strackx <raoul.strackx@...tanix.com>
---
tools/testing/selftests/sgx/sigstruct.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/tools/testing/selftests/sgx/sigstruct.c b/tools/testing/selftests/sgx/sigstruct.c
index dee7a3d..aac9cbc 100644
--- a/tools/testing/selftests/sgx/sigstruct.c
+++ b/tools/testing/selftests/sgx/sigstruct.c
@@ -128,8 +128,11 @@ static bool check_crypto_errors(void)
static inline const BIGNUM *get_modulus(RSA *key)
{
const BIGNUM *n;
-
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
RSA_get0_key(key, &n, NULL, NULL);
+#else
+ n = key->n;
+#endif
return n;
}
--
2.7.4
Powered by blists - more mailing lists