Good question.  I've asked it myself.  I've been planning on doing an
upgrade to support OpenSSL 3.X.+ that maintains support for 1.1.X.  That
said, it's been at least a year and I haven't gotten around to it, and I'm
not firmly committed to the idea of maintaining backwards compatibility.  I
think that if we're going to break backwards compatibility with older
versions, the upgrade to 3.X would probably be a good time to do it.  From
what little I've read on the subject, the move from 1.1.1 to 3.X is a
significant change.  In short, I would be in favor of dropping legacy
OpenSSL support in the next commons crypto release.

Alex

On Sun, Oct 29, 2023 at 9:15 AM sebb <seb...@gmail.com> wrote:

> There is quite a lot of Crypto code that depends on the check:
>
> if (dlsym_OpenSSL_version_num() < VERSION_1_1_X)
> where
> VERSION_1_1_X = 0x10100000;
>
> Dropping such support would simplify the code.
>
> Is there any need to continue to support such old versions?
>
> Sebb
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> For additional commands, e-mail: dev-h...@commons.apache.org
>
>

Reply via email to