Return-Path: X-Original-To: apmail-httpd-dev-archive@www.apache.org Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 37E1910B6F for ; Wed, 25 Sep 2013 07:42:57 +0000 (UTC) Received: (qmail 57094 invoked by uid 500); 25 Sep 2013 07:42:48 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 56933 invoked by uid 500); 25 Sep 2013 07:42:45 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 56913 invoked by uid 99); 25 Sep 2013 07:42:42 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 25 Sep 2013 07:42:42 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [195.232.224.77] (HELO mailout08.vodafone.com) (195.232.224.77) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 25 Sep 2013 07:42:33 +0000 Received: from mailint08.vodafone.com (localhost [127.0.0.1]) by mailout08.vodafone.com (Postfix) with ESMTP id 46D0622209D for ; Wed, 25 Sep 2013 09:42:12 +0200 (CEST) Received: from VOEXC03W.internal.vodafone.com (voexc03w.dc-ratingen.de [145.230.101.23]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint08.vodafone.com (Postfix) with ESMTPS id 331B022192B for ; Wed, 25 Sep 2013 09:42:12 +0200 (CEST) Received: from AVOEXH04W.internal.vodafone.com (145.230.15.136) by VOEXC03W.internal.vodafone.com (145.230.101.23) with Microsoft SMTP Server (TLS) id 14.3.146.2; Wed, 25 Sep 2013 09:42:09 +0200 Received: from VOEXM10W.internal.vodafone.com ([169.254.2.11]) by AVOEXH04W.internal.vodafone.com ([145.230.15.136]) with mapi id 14.03.0146.002; Wed, 25 Sep 2013 09:42:08 +0200 From: =?utf-8?B?UGzDvG0sIFLDvGRpZ2VyLCBWb2RhZm9uZSBHcm91cA==?= To: "dev@httpd.apache.org" Subject: RE: Increasing mod_ssl's minimum required OpenSSL version for trunk/2.4.x to 0.9.8a Thread-Topic: Increasing mod_ssl's minimum required OpenSSL version for trunk/2.4.x to 0.9.8a Thread-Index: AQHOubDsngPjHLoMa0Srxi3s6lNsjJnWEadA Date: Wed, 25 Sep 2013 07:42:08 +0000 Message-ID: References: <524275C7.9060408@velox.ch> In-Reply-To: <524275C7.9060408@velox.ch> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-Virus-Checked: Checked by ClamAV on apache.org DQoNCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gRnJvbTogS2FzcGFyIEJyYW5kID4g U2VudDogTWl0dHdvY2gsIDI1LiBTZXB0ZW1iZXIgMjAxMyAwNzozNA0KPiBUbzogZGV2QGh0dHBk LmFwYWNoZS5vcmcNCj4gU3ViamVjdDogSW5jcmVhc2luZyBtb2Rfc3NsJ3MgbWluaW11bSByZXF1 aXJlZCBPcGVuU1NMIHZlcnNpb24gZm9yDQo+IHRydW5rLzIuNC54IHRvIDAuOS44YQ0KPiANCj4g DQo+IFNwZWFraW5nIG9mIG1vZF9zc2wgaW4gMi40LngsIEkgY2FuIGhhcmRseSBpbWFnaW5lIHRo YXQgT1MgdmVuZG9ycyB3aGljaA0KPiBjb25zaWRlciBzaGlwcGluZyAyLjQgKGFzIG9wcG9zZWQg dG8gMi4yKSB3b3VsZCBzdGlsbCB3YW50IHRvIGNvbXBpbGUNCj4gdGhpcyBhZ2FpbnN0IE9wZW5T U0wgMC45LjcgKGV2ZW4gU29sYXJpcyBpcyBub3cgYXQgMS4wLjAsIEZZSSkuDQo+IA0KPiBTbywg UVVFU1RJT046IGlzIHRoZXJlIGFueW9uZSB3aG8gc3RpbGwgdGhpbmtzIHRoYXQgZ29pbmcgdG8g T3BlblNTTA0KPiAwLjkuOGEgZm9yIHRydW5rIChhbmQgdmVyeSBsaWtlbHkgZm9yIDIuNC54LCB3 aGVuIGJhY2twb3J0aW5nKSBpcyBhIGJhZA0KPiBpZGVhPyBJZiBzbywgcGxlYXNlIHJhaXNlIHlv dXIgdm9pY2UuDQo+IA0KPiBLYXNwYXINCg0KSU1ITyAwLjkuOCBzZWVtcyByZWFzb25hYmxlIGZv ciB0cnVuayBhbmQgMi40Lg0KTW9yZSBmb3JtYWwgcXVlc3Rpb246IENhbiB3ZSBkbyB0aGlzIGZv ciAyLjQgd2l0aG91dCBicmVha2luZyBhbnkgcHJvbWlzZT8NCg0KUmVnYXJkcw0KDQpSw7xkaWdl cg0K