-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ian jonhson schrieb:
|>  Besides certificate verification and session reconnect I don't
|>  know any details what you have to retest.
|>
|
| You imply  that the mechanism of X509-based certificate verification
| has been embedded in openssh mainstream, right?

I wanted to imply nothing.

I just seem to remember that there were some extensions in the
certificate handling (and verification) functions.

Like Larry wrote: implement tests, if they fail with the new
openssl version, look at what happens, if they won't,
you will be happy when you need them...

Goetz

- --
DMCA: The greed of the few outweights the freedom of the many
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFH0Zmu2iGqZUF3qPYRAkH6AJsG6V9secMKMMq1pUT//UJ8fBKs+QCfVnrj
9+lt8fVYr+V+FJ6x2bPQJK0=
=LJuP
-----END PGP SIGNATURE-----
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to