This repository was archived by the owner on Jan 8, 2025. It is now read-only.
Replies: 2 comments 1 reply
-
I'd suggest keeping support for 1.1.1 as long as OpenSSL does (September 2023, per their webpage). Until then, we don't need to have a feature match with the active provider project, but should aim to provide "best effort" to maintain interop within the feature intersection (perhaps manual testing everytime we release a snapshot is sufficient?). Downstream projects can switch to 3.0. |
Beta Was this translation helpful? Give feedback.
1 reply
-
Not entirely surprising but informative: https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/ |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Functionally, oqs-openssl111 by now is significantly behind the capabilities of oqs-provider (pretty much all open issues in the project are to add features already available in oqs-provider).
It also is based on an old OpenSSL code base that only receives security updates but no other upgrades. All security updates must be manually applied (oqs-provider receives all upstream --incl. security-- updates automatically).
Thus: Maintaining oqs-openssl111 costs effort within this project and across subprojects, incl. downstream consumers/integrations (profiling, curl, etc.).
This issue therefore is to get input/opinions to finally jointly agree how to carry on with this subproject:
As usual, all input welcome.
Beta Was this translation helpful? Give feedback.
All reactions