You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now that OpenSSL 1.1.1 is scarce in the wild, we should start updating the wrappers and stdlib to OpenSSL 3.0 at minimum to make sure tooling using std/net runs without additional packages on most *nix.
It should be safe to drop OpenSSL <1.1.1 support, as those are no longer widely used and does not support the latest TLSv1.3 standard.
We should drop LibreSSL support for now as well, as we don't have the resource to test against that library, and platforms that use LibreSSL also supports OpenSSL.
This is more or less a short term goal to get existing tools running well.
Useful References
PEP 644: Python decision to only support 1.1.1 and above.
The text was updated successfully, but these errors were encountered:
## Summary
The only ABI change between version 1.1.1 and 3.0 for our usage is
`SSL_get_peer_certificate` being splitted into
`SSL_get1_peer_certificate` (which is compatible with the prior symbol)
and `SSL_get0_peer_certificate` .
This PR modifies `SSL_get_peer_certificate` in the wrapper to use the
new symbol if available. No changes in other programs are required.
## Details
* `SSL_get_peer_certificate` will now select either
`SSL_get1_peer_certificate` or `SSL_get_peer_certificate` depending
on which symbols are available.
* DLL names for OpenSSL 3.x has been added for macOS, Windows and
Linux.
* The symbols used for certificate verification are no longer
unconditionally hidden on Windows. They were hidden previously as Nim
ships old OpenSSL 1.0 which did not have these symbols.
Fixes#1160
Now that OpenSSL 1.1.1 is scarce in the wild, we should start updating the wrappers and stdlib to OpenSSL 3.0 at minimum to make sure tooling using
std/net
runs without additional packages on most *nix.It should be safe to drop OpenSSL <1.1.1 support, as those are no longer widely used and does not support the latest TLSv1.3 standard.
We should drop LibreSSL support for now as well, as we don't have the resource to test against that library, and platforms that use LibreSSL also supports OpenSSL.
This is more or less a short term goal to get existing tools running well.
Useful References
The text was updated successfully, but these errors were encountered: