On Tue, 24 Mar 2020, Kamil Dudka wrote:
A) Live with (and work around) the compiler warnings as long as we can link
fine. (We don't know for how long that'll work.)
B) Disable NTLM when OpenSSL version 3 or later is used
C) Import DES code (as we have done for MD4 and MD5) and build with that
code when OpenSSLv3 is used.
D) Use another 3rd party DES lib (which?) when OpenSSLv3 is used.
E) Other: ________
I think I personally am in the C or D camp for the moment.
Thoughts?
Option C is going to cause a disaster while importing such code to enterprise
OS distributions because of export control and FIPS-like certifications. Let
me first ask internally what a preferred choice for Red Hat would be...
Thanks. That's useful feedback.
I'm right now experimenting with option (A) and adding
-Wno-deprecated-declarations to the compiler options to avoid the deprecation
warnings with OpenSSL v3. It might be worth it as a first shot...
I forgot to mention it before, but my current PR for these OpenSSLv3
adjustments are here: https://github.com/curl/curl/pull/5139
--
/ daniel.haxx.se | Commercial curl support up to 24x7 is available!
| Private help, bug fixes, support, ports, new features
| https://www.wolfssl.com/contact/
-------------------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-library
Etiquette: https://curl.haxx.se/mail/etiquette.html