mirror of
https://github.com/postgres/postgres.git
synced 2025-07-28 23:42:10 +03:00
Define OPENSSL_API_COMPAT
This avoids deprecation warnings from newer OpenSSL versions (3.0.0 in particular). This has been originally applied as 4d3db13 for v14 and newer versions, but not on the older branches out of caution, and this commit closes the gap to remove all these deprecation warnings in all the branches still supported. OPENSSL_API_COMPAT's value is set based on the oldest version of OpenSSL supported on a branch: 1.0.1 for Postgres 13 and 0.9.8 for Postgres 11 and 12. Reviewed-by: Daniel Gustafsson Discussion: https://postgr.es/m/FEF81714-D479-4512-839B-C769D2605F8A@yesql.se Discussion: https://postgr.es/m/ZJJmOH+hIOSoesux@paquier.xyz Backpatch-through: 11
This commit is contained in:
committed by
Michael Paquier
parent
4f8f0f8c39
commit
265c9138da
6
configure
vendored
6
configure
vendored
@ -12405,7 +12405,11 @@ fi
|
||||
fi
|
||||
|
||||
if test "$with_openssl" = yes ; then
|
||||
if test "$PORTNAME" != "win32"; then
|
||||
# Minimum required OpenSSL version is 0.9.8
|
||||
|
||||
$as_echo "#define OPENSSL_API_COMPAT 0x00908000L" >>confdefs.h
|
||||
|
||||
if test "$PORTNAME" != "win32"; then
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for CRYPTO_new_ex_data in -lcrypto" >&5
|
||||
$as_echo_n "checking for CRYPTO_new_ex_data in -lcrypto... " >&6; }
|
||||
if ${ac_cv_lib_crypto_CRYPTO_new_ex_data+:} false; then :
|
||||
|
Reference in New Issue
Block a user