@@ -261,19 +261,35 @@ ngx_http_akamai_token_validate(ngx_http_request_t *r, ngx_str_t* token, ngx_str_
261
261
u_char hash_hex [EVP_MAX_MD_SIZE * 2 ];
262
262
size_t hash_hex_len ;
263
263
ngx_int_t value ;
264
- HMAC_CTX hmac ;
264
+ #if (OPENSSL_VERSION_NUMBER < 0x10100000L )
265
+ HMAC_CTX hmac_buf ;
266
+ #endif
267
+ HMAC_CTX * hmac ;
265
268
266
269
if (!ngx_http_akamai_token_validate_parse (token , & parsed_token ))
267
270
{
268
271
return 0 ;
269
272
}
270
273
271
274
// validate the signature
272
- HMAC_CTX_init (& hmac );
273
- HMAC_Init (& hmac , key -> data , key -> len , EVP_sha256 ());
274
- HMAC_Update (& hmac , parsed_token .signed_part .data , parsed_token .signed_part .len );
275
- HMAC_Final (& hmac , hash , & hash_len );
276
- HMAC_CTX_cleanup (& hmac );
275
+ #if (OPENSSL_VERSION_NUMBER >= 0x10100000L )
276
+ hmac = HMAC_CTX_new ();
277
+ if (hmac == NULL )
278
+ {
279
+ return 0 ;
280
+ }
281
+ #else
282
+ hmac = & hmac_buf ;
283
+ HMAC_CTX_init (hmac );
284
+ #endif
285
+ HMAC_Init_ex (hmac , key -> data , key -> len , EVP_sha256 (), NULL );
286
+ HMAC_Update (hmac , parsed_token .signed_part .data , parsed_token .signed_part .len );
287
+ HMAC_Final (hmac , hash , & hash_len );
288
+ #if (OPENSSL_VERSION_NUMBER >= 0x10100000L )
289
+ HMAC_CTX_free (hmac );
290
+ #else
291
+ HMAC_CTX_cleanup (hmac );
292
+ #endif
277
293
hash_hex_len = ngx_hex_dump (hash_hex , hash , hash_len ) - hash_hex ;
278
294
279
295
if (hash_hex_len != parsed_token .hmac .len ||
0 commit comments