-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ian jonhson schrieb:
|> Besides certificate verification and session reconnect I don't
|> know any details what you have to retest.
|>
|
| You imply that the mechanism of X509-based certificate verification
| has been embedded in openssh mainstream, right?

I wanted to imply nothing.

I just seem to remember that there were some extensions in the
certificate handling (and verification) functions.

Like Larry wrote: implement tests, if they fail with the new
openssl version, look at what happens, if they won't,
you will be happy when you need them...

Goetz

- --
DMCA: The greed of the few outweights the freedom of the many
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFH0Zmu2iGqZUF3qPYRAkH6AJsG6V9secMKMMq1pUT//UJ8fBKs+QCfVnrj
9+lt8fVYr+V+FJ6x2bPQJK0=
=LJuP
-----END PGP SIGNATURE-----
__________________________________________________ ____________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majordomo@openssl.org