Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=79499 --- shadow/79499 2006-09-26 14:32:35.000000000 -0400 +++ shadow/79499.tmp.29362 2006-10-13 12:37:13.000000000 -0400 @@ -1,15 +1,15 @@ Bug#: 79499 Product: Mono: Class Libraries Version: 1.1 OS: other OS Details: Gentoo 32bit -Status: NEW -Resolution: +Status: RESOLVED +Resolution: WONTFIX Severity: Unknown -Priority: Minor +Priority: Wishlist Component: CORLIB AssignedTo: [EMAIL PROTECTED] ReportedBy: [EMAIL PROTECTED] QAContact: [EMAIL PROTECTED] TargetMilestone: --- URL: @@ -132,6 +132,15 @@ Of course doing this doesn't solve any of the issues I mentionned ;-) A safer variation would be to change the default SHA1 hash algorithm (HashName property) to SHA384 or SHA512. This will produce 48 to 64 "quality" derived bytes (solving one of the issues you currently have in your sample). + +------- Additional Comments From [EMAIL PROTECTED] 2006-10-13 12:37 ------- +I had a look and it won't be easy as this is totally undocumented +(i.e. means a LOT of hours for something that will remain problematic +forever). IMO key derivation is too important to depend on something +undocumented. + +I updated monodoc to warn about interoperability problems. +Closing as WONTFIX. _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
