Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=78075 --- shadow/78075 2006-05-04 14:12:20.000000000 -0400 +++ shadow/78075.tmp.5905 2006-09-13 12:45:26.000000000 -0400 @@ -1,12 +1,12 @@ Bug#: 78075 Product: Mono: Class Libraries Version: 1.1 OS: unknown OS Details: -Status: REOPENED +Status: NEEDINFO Resolution: Severity: Unknown Priority: Normal Component: Mono.Security AssignedTo: [EMAIL PROTECTED] ReportedBy: [EMAIL PROTECTED] @@ -662,6 +662,14 @@ ------- Additional Comments From [EMAIL PROTECTED] 2006-05-04 14:12 ------- Darn #%^$~ Bugzilla clipped my comment. Yes, the default negotiated by openssl client is *not* the same, me bad. I need to sniff this one up, the constrained connection I used to verify the others is not a valid assumption in this case. + +------- Additional Comments From [EMAIL PROTECTED] 2006-09-13 12:45 ------- +Recent changes in the SSL code base (r65259) have reduced it's memory +requirements by about two-thirds. This should have some beneficial +effects on performance. + +An updated version of mget is now available in Mono SVN. +http://svn.myrealbox.com/viewcvs/trunk/mcs/class/Mono.Security/Test/tools/mget/mget.cs?rev=65120&view=markup _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
