And/or another solution would be a white-list-db. Once a key has been checked and was not vulnerable then it shouldn't be checked again. You would have a file (white-list-db)and keep then the sha1 hashes of the keys that passed the test and are not vulnerable. Next time a key has to be checked, first you look it up into the white-list-db. If is there skip the check. If is not there then make the check and if the key is good then add it to white-list-db.
-- network-manager-openvpn is incapable of supplying openssl-vulnkey with the X.509 key passphrase it requests https://bugs.launchpad.net/bugs/230197 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs