Ok. Bad joke. Apologies OpenSSL 3.1.4 24 Oct 2023 (Library: OpenSSL 3.1.4 24 Oct 2023)
On Tue, Dec 5, 2023 at 10:33 AM Randy DuCharme <[email protected]> wrote: > Color me stupid, but..... > > > > Standard commands > asn1parse ca ciphers cmp > cms crl crl2pkcs7 dgst > dhparam dsa dsaparam ec > ecparam enc engine errstr > fipsinstall gendsa genpkey genrsa > help info kdf list > mac nseq ocsp passwd > pkcs12 pkcs7 pkcs8 pkey > pkeyparam pkeyutl prime rand > rehash req rsa rsautl > s_client s_server s_time sess_id > smime speed spkac srp > > storeutl ts verify version > > x509 > > > > Message Digest commands (see the `dgst' command for more details) > > blake2b512 blake2s256 md4 md5 > > mdc2 rmd160 sha1 sha224 > > sha256 sha3-224 sha3-256 sha3-384 > > sha3-512 sha384 sha512 sha512-224 > > sha512-256 shake128 shake256 sm3 > > > > Cipher commands (see the `enc' command for more details) > > aes-128-cbc aes-128-ecb aes-192-cbc aes-192-ecb > > aes-256-cbc aes-256-ecb aria-128-cbc aria-128-cfb > > aria-128-cfb1 aria-128-cfb8 aria-128-ctr aria-128-ecb > > aria-128-ofb aria-192-cbc aria-192-cfb aria-192-cfb1 > > aria-192-cfb8 aria-192-ctr aria-192-ecb aria-192-ofb > > aria-256-cbc aria-256-cfb aria-256-cfb1 aria-256-cfb8 > > aria-256-ctr aria-256-ecb aria-256-ofb base64 > > bf bf-cbc bf-cfb bf-ecb > > bf-ofb camellia-128-cbc camellia-128-ecb camellia-192-cbc > > camellia-192-ecb camellia-256-cbc camellia-256-ecb cast > > cast-cbc cast5-cbc cast5-cfb cast5-ecb > > cast5-ofb des des-cbc des-cfb > > des-ecb des-ede des-ede-cbc des-ede-cfb > > des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb > > des-ede3-ofb des-ofb des3 desx > > idea idea-cbc idea-cfb idea-ecb > > idea-ofb rc2 rc2-40-cbc rc2-64-cbc > > rc2-cbc rc2-cfb rc2-ecb rc2-ofb > > rc4 rc4-40 seed seed-cbc > > seed-cfb seed-ecb seed-ofb sm4-cbc > > sm4-cfb sm4-ctr sm4-ecb sm4-ofb > > It's v.3 > > On Tue, Dec 5, 2023 at 10:07 AM Bryan Call <[email protected]> wrote: > >> +1 >> >> -Bryan >> >> >> >> On Nov 14, 2023, at 12:24 PM, Masakazu Kitajo <[email protected]> wrote: >> >> Hi all, >> >> At the weekly ATS 10 meeting, the participants agreed to bump the minimum >> OpenSSL version we support on ATS 10, and it's going to be 1.1.1. I'm >> sending this email to make that an official decision. >> >> The version bump is only for ATS 10 and later. There is no change for ATS >> 8 >> and 9. >> >> I'm going to make a lazy consensus here. If we don't see any objections >> within a week or so, this will be a decision as the community and the >> minimum version will be bumped. >> >> If you have questions, concerns, or objections, please reply to this email >> (comments on Slack does not count). >> >> Thanks, >> Masakazu >> >> >> > > -- > Randall DuCharme (Radio *AD5GB*) > Powered by Open Source software. > > -- Randall DuCharme (Radio *AD5GB*) Powered by Open Source software.
