On 12/14/2009 05:17 PM, Daniel P. Berrange wrote:

Yes - need to pass the encryption state.  Hopefully the crypto stacks
support this.
There's no mechanism for this in the SASL libraries. With GNUTLS there is
the ability to preserve negotiated session state from one TLS conenection
and used it upon opening the next connection to fast-track the handshake
phase. This doesn't allow you to pass the state for an existing connection
to a new process though and have it carry on

This sucks.  But we can ask the client to reauthenticate.

--
error compiling committee.c: too many arguments to function



Reply via email to