From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 18654 invoked from network); 24 Oct 2021 16:12:12 -0000 Received: from 4ess.inri.net (216.126.196.42) by inbox.vuxu.org with ESMTPUTF8; 24 Oct 2021 16:12:12 -0000 Received: from duke.felloff.net ([216.126.196.34]) by 4ess; Sun Oct 24 12:06:19 -0400 2021 Message-ID: <1A335E6B808816ED8E5B210E24A1ABC8@felloff.net> Date: Sun, 24 Oct 2021 18:06:09 +0200 From: cinap_lenrek@felloff.net To: 9front@9front.org In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: cloud browser Subject: Re: [9front] intent to delete: devssl, cpu, oexportfs, import Reply-To: 9front@9front.org Precedence: bulk thanks! looks good to me, but we need a regression test for this as manual review turns out not to be good enougth as last time, your refactoring added an assert which broke all of tls 1.0 prf and nobody noticed for months. do you have some openssl scripts handy to run ssl3 and tls1.0 and tls1.1 servers and clients against these changes? can anyone help you with this? -- cinap