-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Ian jonhson schrieb: |> Besides certificate verification and session reconnect I don't |> know any details what you have to retest. |> | | You imply that the mechanism of X509-based certificate verification | has been embedded in openssh mainstream, right?
I wanted to imply nothing. I just seem to remember that there were some extensions in the certificate handling (and verification) functions. Like Larry wrote: implement tests, if they fail with the new openssl version, look at what happens, if they won't, you will be happy when you need them... Goetz - -- DMCA: The greed of the few outweights the freedom of the many -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4-svn0 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFH0Zmu2iGqZUF3qPYRAkH6AJsG6V9secMKMMq1pUT//UJ8fBKs+QCfVnrj 9+lt8fVYr+V+FJ6x2bPQJK0= =LJuP -----END PGP SIGNATURE----- ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]