Replies: 2 comments 1 reply
-
I'd suggest keeping support for 1.1.1 as long as OpenSSL does (September 2023, per their webpage). Until then, we don't need to have a feature match with the active provider project, but should aim to provide "best effort" to maintain interop within the feature intersection (perhaps manual testing everytime we release a snapshot is sufficient?). Downstream projects can switch to 3.0. |
Beta Was this translation helpful? Give feedback.
1 reply
-
Not entirely surprising but informative: https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/ |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Functionally, oqs-openssl111 by now is significantly behind the capabilities of oqs-provider (pretty much all open issues in the project are to add features already available in oqs-provider).
It also is based on an old OpenSSL code base that only receives security updates but no other upgrades. All security updates must be manually applied (oqs-provider receives all upstream --incl. security-- updates automatically).
Thus: Maintaining oqs-openssl111 costs effort within this project and across subprojects, incl. downstream consumers/integrations (profiling, curl, etc.).
This issue therefore is to get input/opinions to finally jointly agree how to carry on with this subproject:
As usual, all input welcome.
Beta Was this translation helpful? Give feedback.
All reactions