On Thu, Sep 02, 2021 at 12:48:29PM -0500, Alex G. wrote: > > > On 9/2/21 12:43 PM, Peter Robinson wrote: > > On Thu, Sep 2, 2021 at 3:38 PM Tom Rini <[email protected]> wrote: > > > > > > On Thu, Sep 02, 2021 at 03:36:43PM +0100, Peter Robinson wrote: > > > > On Thu, Sep 2, 2021 at 2:28 PM Tom Rini <[email protected]> wrote: > > > > > > > > > > On Thu, Jul 29, 2021 at 01:31:21PM -0500, Alexandru Gagniuc wrote: > > > > > > > > > > > Older OpenSSL and libressl versions have a slightly different API. > > > > > > This require #ifdefs to support. However, we still can't support it > > > > > > because the ECDSA path does not compile with these older versions. > > > > > > These #ifdefs are truly a vestigial appendage. > > > > > > > > > > > > Alternatively, the ECDSA path could be updated for older libraries, > > > > > > but this requires significant extra code, and #ifdefs. Those > > > > > > libraries > > > > > > are over three years old, and there concerns whether it makes sense > > > > > > to > > > > > > build modern software for real world use against such old libraries. > > > > > > > > > > > > Thusly, remove #ifdefs and code for old OpenSSL and LibreSSL > > > > > > support. > > > > > > > > > > > > Signed-off-by: Alexandru Gagniuc <[email protected]> > > > > > > > > > > Applied to u-boot/next, thanks! > > > > > > > > According to recent CVE announcements 1.1.0 is out of support [1], > > > > does it make sense to just support 1.1.1x and later? > > > > > > > > [1] https://www.openssl.org/news/secadv/20210824.txt > > > > > > Good question. Are there API changes between 1.1.0 and 1.1.1x ? > > > > So outside of the new TLS 1.3 feature the release says "What’s more is > > that OpenSSL 1.1.1 is API and ABI compliant with OpenSSL 1.1.0" and > > depending on how we use openssl it may even be API compatible with 3.0 > > when it comes out any time now. > > > > https://www.openssl.org/blog/blog/2018/09/11/release111/ > > Okay, I don't think it's worth excluding 1.1.0 then. The only way we could > do that is a compile time check against OPENSSL_VERSION. > > That won't prevent someone from compiling with openssl 1.1.1, and then just > replacing libcrypto.so with 1.1.0.
That's what I was figuring. If there was compatibility code we could drop, it would make sense. But since there's not, I don't think we're in a position to really influence things. -- Tom
signature.asc
Description: PGP signature

