Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by [EMAIL PROTECTED]

http://bugzilla.ximian.com/show_bug.cgi?id=79499

--- shadow/79499        2006-09-26 14:32:35.000000000 -0400
+++ shadow/79499.tmp.29362      2006-10-13 12:37:13.000000000 -0400
@@ -1,15 +1,15 @@
 Bug#: 79499
 Product: Mono: Class Libraries
 Version: 1.1
 OS: other
 OS Details: Gentoo 32bit
-Status: NEW   
-Resolution: 
+Status: RESOLVED   
+Resolution: WONTFIX
 Severity: Unknown
-Priority: Minor
+Priority: Wishlist
 Component: CORLIB
 AssignedTo: [EMAIL PROTECTED]                            
 ReportedBy: [EMAIL PROTECTED]               
 QAContact: [EMAIL PROTECTED]
 TargetMilestone: ---
 URL: 
@@ -132,6 +132,15 @@
 Of course doing this doesn't solve any of the issues I mentionned ;-)
 
 A safer variation would be to change the default SHA1 hash algorithm
 (HashName property) to SHA384 or SHA512. This will produce 48 to 64
 "quality" derived bytes (solving one of the issues you currently have
 in your sample).
+
+------- Additional Comments From [EMAIL PROTECTED]  2006-10-13 12:37 -------
+I had a look and it won't be easy as this is totally undocumented
+(i.e. means a LOT of hours for something that will remain problematic
+forever). IMO key derivation is too important to depend on something
+undocumented.
+
+I updated monodoc to warn about interoperability problems.
+Closing as WONTFIX.
_______________________________________________
mono-bugs maillist  -  [email protected]
http://lists.ximian.com/mailman/listinfo/mono-bugs

Reply via email to