Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by [EMAIL PROTECTED]

http://bugzilla.ximian.com/show_bug.cgi?id=78075

--- shadow/78075        2006-05-04 14:12:20.000000000 -0400
+++ shadow/78075.tmp.5905       2006-09-13 12:45:26.000000000 -0400
@@ -1,12 +1,12 @@
 Bug#: 78075
 Product: Mono: Class Libraries
 Version: 1.1
 OS: unknown
 OS Details: 
-Status: REOPENED   
+Status: NEEDINFO   
 Resolution: 
 Severity: Unknown
 Priority: Normal
 Component: Mono.Security
 AssignedTo: [EMAIL PROTECTED]                            
 ReportedBy: [EMAIL PROTECTED]               
@@ -662,6 +662,14 @@
 
 ------- Additional Comments From [EMAIL PROTECTED]  2006-05-04 14:12 -------
 Darn #%^$~ Bugzilla clipped my comment. Yes, the default negotiated by
 openssl client is *not* the same, me bad. I need to sniff this one up,
 the constrained connection I used to verify the others is not a valid
 assumption in this case.
+
+------- Additional Comments From [EMAIL PROTECTED]  2006-09-13 12:45 -------
+Recent changes in the SSL code base (r65259) have reduced it's memory
+requirements by about two-thirds. This should have some beneficial
+effects on performance.
+
+An updated version of mget is now available in Mono SVN.
+http://svn.myrealbox.com/viewcvs/trunk/mcs/class/Mono.Security/Test/tools/mget/mget.cs?rev=65120&view=markup
_______________________________________________
mono-bugs maillist  -  [email protected]
http://lists.ximian.com/mailman/listinfo/mono-bugs

Reply via email to