1 2006-03-02 Sebastien Pouliot <sebastien@ximian.com>
3 * RecordProtocol.cs: Fix possible endless loop (#77663). Remove hack
4 for an old, fixed, MCS bug (#67711).
6 2005-10-06 Sebastien Pouliot <sebastien@ximian.com>
8 * ClientRecordProtocol.cs: Update HandshakeMessages after each
9 message. Fix bug #76258.
10 * RecordProtocol.cs: Remove writing into the HandshakeMessages stream
11 at this stage. We may need the data before that. Fix bug #76258.
12 * ServerRecordProtocol.cs: Update HandshakeMessages after each
13 message. Fix bug #76258.
14 * SslServerStream.cs: Changed check for the presence of client
15 certificates during handshake.
17 2005-09-02 Sebastien Pouliot <sebastien@ximian.com>
19 * SslStreamBase.cs, ServerRecordProtocol.cs, SslClientStream.cs,
20 ClientRecordProtocol.cs, RecordProtocol.cs, SslServerStream.cs:
21 Re-written async support for Ssl[Client|Server]Stream from JD Conley
22 <jd.conley@coversant.net> with minor changes. Fix bug #75687 (and a
23 lot of other known problems).
25 2005-07-01 Sebastien Pouliot <sebastien@ximian.com>
27 * ServerContext.cs: Build the list of trusted certificates from all
28 the trusted root for the current user and the local machine.
29 * SslServerStream.cs: Add support for client certificate (and the
30 callback for optional mutual authentication with SSL3).
32 2005-06-22 Sebastien Pouliot <sebastien@ximian.com>
34 * SslClientStream.cs: Removed failsafe timeout of 5 minutes as some
35 protocols can go idle for longer than this.
37 2005-06-14 Sebastien Pouliot <sebastien@ximian.com>
39 * SslClientStream.cs: Add support for _optional_ mutual authentication.
40 SSL3 and TLS1 deals differently with this. SSL3 tested with OpenSSL,
41 TSL1 tested with OpenSSL and LDAPS/AD.
43 2005-06-06 Sebastien Pouliot <sebastien@ximian.com>
45 * Alert.cs: Add NoCertificate (41) which _should_ be used in SSL3
46 if we don't want to send a certificate when requested by a server
47 (e.g. in the case the mutual authentication is optional).
48 * CipherSuite.cs: Fixed recursive property. Changed type to short so
49 it can hold 256 bits (valid value). Fixed ctor so it doesn't assign
52 2005-05-13 Sebastien Pouliot <sebastien@ximian.com>
54 * SslClientStream.cs: Forgot to set the event in the previous fix.
56 2005-05-10 Gonzalo Paniagua Javier <gonzalo@ximian.com>
58 * SslClientStream.cs: check for the dispose in NetworkReadCallback.
59 Patch by Sebastien "Cryptoman" Pouliot.
61 2005-04-14 Gonzalo Paniagua Javier <gonzalo@ximian.com>
63 * SslClientStream.cs: gotta call EndInvoke, not EndRead.
65 2005-04-14 Gonzalo Paniagua Javier <gonzalo@ximian.com>
67 * SslClientStream.cs: MemoryStream does not implement proper Begin*
68 methods, so we need this to prevent infinite recursion if we have a
69 callback that calls BeginRead.
71 2005-04-13 Sebastien Pouliot <sebastien@ximian.com>
73 * RecordProtocol.cs: Some API changes so a record can be decoded from
74 any supplied stream (not just the inner network stream).
75 * SslClientStream.cs: BeginRead is now truly async if the Negotiate is
76 called from BeginWrite (where it should be in most case).
77 * SslServerStream.cs: Adapted to API changes in RecordProtocol.cs.
79 2005-04-12 Sebastien Pouliot <sebastien@ximian.com>
81 * SslHandshakeHash.cs: Changed "SslHash" to "MD5SHA1". Fix #71696.
83 2005-04-10 Sebastien Pouliot <sebastien@ximian.com>
85 * HttpsClientStream.cs: Added a TrustFailure property so a
86 WebException can now report TrustFailure correctly. Fix bug 74286.
88 2005-04-07 Sebastien Pouliot <sebastien@ximian.com>
90 * SslCipherSuite.cs: Fix calculation (sequence number) for the server
91 side stream. Patch by Brian Ritchie.
93 2005-02-04 Sebastien Pouliot <sebastien@ximian.com>
95 * Reverting last changes in SslClientStream and RecordProtocol. This
96 break when sending large files back and forth (echo test).
98 2005-02-02 Sebastien Pouliot <sebastien@ximian.com>
100 * SslClientStream.cs: Throw exception when we receive a null record.
101 * RecordProtocol.cs: Added code to avoid blocking and endless loops
102 if the data is incomplete or missing - even in the case the server
103 side doesn't close the connection (see new cutcli tool).
105 2004-12-15 Sebastien Pouliot <sebastien@ximian.com>
107 * CipherSuite.cs: Removed unused MD5 and SHA1 instances created in
108 PRF method (fix compilation warnings).
110 2004-12-13 Sebastien Pouliot <sebastien@ximian.com>
112 * SslClientStream.cs: New internal property, ServerCertificates, to
113 "easily" retreive the server's certificate chain using reflection.
115 2004-11-23 Sebastien Pouliot <sebastien@ximian.com>
117 * RecordProtocol.cs: Fixed ClientHelloV2 support.
119 2004-11-10 Sebastien Pouliot <sebastien@ximian.com>
121 * CipherSuiteFactory.cs: Activated RSA_WITH_AES_256_CBC_SHA as it is
122 supported by some browsers.
123 * ContentType.cs: Removed ClientHelloV2 from the enum as it is not a
124 "true" content type (it just looks so where we're processing it).
125 * Context.cs: Added support to switch protocol (e.g. SSL2->SSL3 or
126 SSL2->TLS1). Contributed by Carlos Guzman Alvarez.
127 * RecordProtocol.cs: Added support for ClientHelloV2 message
128 (contributed by Carlos Guzman Alvarez). This is a Handshake message
129 so it must be MACed. Also fixed the challenge length because some
130 browsers implementation don't interpret "This value must be 32." as
133 2004-10-05 Sebastien Pouliot <sebastien@ximian.com>
135 * SslClientStream.cs: Changed InputBuffer to internal (was protected).
137 2004-10-04 Gonzalo Paniagua Javier <gonzalo@ximian.com>
139 * HttpsClientStream.cs: the .ctor receives a pre-read buffer now.
140 * SslClientStream.cs: added InputBuffer property.
142 2004-09-23 Sebastien Pouliot <sebastien@ximian.com>
144 * RecordProtocol.cs: Fix alert data that could leak into appplication
145 data (e.g. when closing the SSL session).
147 2004-07-14 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
149 * Removed duplicate license header file from
\r
152 2004-07-14 Sebastien Pouliot <sebastien@ximian.com>
\r
154 * SslClientStream.cs: Changed lock to "new object()" and not
\r
155 String.Empty (as the read/write locks points becomes the same).
\r
156 * SslServerStream.cs: Changed lock to "new object()" and not
\r
157 String.Empty (as the read/write locks points becomes the same).
\r
159 2004-07-14 Gonzalo Paniagua Javier <gonzalo@ximian.com>
\r
161 * HttpsClientStream.cs: get an HttpWebRequest so that we can use the
\r
162 ServicePoint it has. No need to get the host now.
\r
164 2004-05-09 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
166 * Mono.Security.Protocol.Tls/Alert.cs:
\r
167 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
168 * Mono.Security.Protocol.Tls/CipherSuiteCollection.cs:
\r
169 * Mono.Security.Protocol.Tls/ClientRecordProtocol.cs:
\r
170 * Mono.Security.Protocol.Tls/Context.cs:
\r
171 * Mono.Security.Protocol.Tls/RecordProtocol.cs:
\r
172 * Mono.Security.Protocol.Tls/SecurityCompressionType.cs:
\r
173 * Mono.Security.Protocol.Tls/ServerRecordProtocol.cs:
\r
174 * Mono.Security.Protocol.Tls/SslServerStream.cs:
\r
175 * Mono.Security.Protocol.Tls/TlsClientSettings.cs:
\r
177 - Changes for fix FxCop Rules.
\r
179 - Reworked CipherSuiteCollection class.
\r
182 2004-04-21 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
184 * Mono.Security.Protocol.Tls/DebugHelper.cs:
\r
188 * Mono.Security.Protocol.Tls/ClientRecordProtocol.cs:
\r
189 * Mono.Security.Protocol.Tls/RecordProtocol.cs:
\r
190 * Mono.Security.Protocol.Tls/Context.cs:
\r
191 * Mono.Security.Protocol.Tls/Context.cs:
\r
192 * Mono.Security.Protocol.Tls/SslCipherSuite.cs:
\r
193 * Mono.Security.Protocol.Tls/TlsCipherSuite.cs:
\r
194 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
196 - Added debug capabilities.
\r
198 * Mono.Security.Protocol.Tls/ServerContext.cs:
\r
200 - Added initialization of requested CertificateTypes and CA's
\r
202 2004-04-16 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
204 * Mono.Security.Protocol.Tls/TlsException.cs:
\r
206 - Make it public until npgsql people can fix their sources.
\r
208 2004-03-19 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
210 * Mono.Security.Protocol.Tls/TlsServerSettings.cs:
\r
212 - Added new CertificateRSA property.
\r
214 - Added new UpdateCertfificateRSA method.
\r
216 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
218 - Removed CertificateRSA() method.
\r
220 2004-03-19 Sebastien Pouliot <sebastien@ximian.com>
\r
222 * CipherSuite.cs: Fixed PRF generation when secret is an odd number of
\r
223 bytes (section 5 in RFC2246).
\r
224 * CipherSuiteFactory.cs: Added algorithms RSA_EXPORT_WITH_RC4_40_MD5,
\r
225 RSA_EXPORT_WITH_RC2_CBC_40_MD5, RSA_EXPORT_WITH_DES40_CBC_SHA,
\r
226 RSA_EXPORT_WITH_RC4_56_MD5, RSA_EXPORT_WITH_RC2_CBC_56_MD5,
\r
227 RSA_EXPORT_WITH_DES_CBC_56_SHA and RSA_EXPORT_WITH_RC4_56_SHA to both
\r
228 SSL3 and TLS1 protocols.
\r
229 * SslCipherSuite.cs: Fixed key generation for exportable ciphers.
\r
230 * TlsCipherSuite.cs: Fixed key generation for exportable ciphers.
\r
232 2004-03-16 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
234 * Mono.Security.Protocol.Tls/SslCipherSuite.cs:
\r
236 - Added changes for allow it to work as server or client.
\r
238 2004-03-15 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
240 * Mono.Security.Protocol.Tls/TlsStream.cs:
\r
241 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
242 * Mono.Security.Protocol.Tls/TlsCipherSuite.cs:
\r
243 * Mono.Security.Protocol.Tls/SslHandshakeHash.cs:
\r
244 * Mono.Security.Protocol.Tls/RecordProtocol.cs:
\r
246 - Use Buffer.BlockCopy instead of System.Array.Copy
\r
248 2004-03-10 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
250 * Mono.Security.Protocol.Tls/Ciphersuite.cs:
\r
252 - Added generation of the Server encryption algorithms.
\r
254 - Modified encryption/decription methods for work
\r
255 as client or server as needed.
\r
257 * Mono.Security.Protocol.Tls/RecordProtocol.cs:
\r
258 * Mono.Security.Protocol.Tls/ClientRecordProtocol.cs:
\r
259 * Mono.Security.Protocol.Tls/ServerRecordProtocol.cs:
\r
261 - Added new ProcessChangeCipherSpec method.
\r
263 * Mono.Security.Protocol.Tls/Context.cs:
\r
265 - Added new PrintBuffer method ( for debug ).
\r
267 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
268 * Mono.Security.Protocol.Tls/SslServerStream.cs:
\r
270 - Callback cleanup.
\r
272 2004-03-06 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
274 * Mono.Security.Protocol.Tls/SslServerStream.cs:
\r
276 - Initial implementation of the doHandshake method.
\r
278 - Added initial events implementation.
\r
280 * Mono.Security.Protocol.Tls/Ciphersuite.cs:
\r
281 * Mono.Security.Protocol.Tls/TlsCiphersuite.cs:
\r
282 * Mono.Security.Protocol.Tls/ClientRecordProtocol.cs:
\r
283 * Mono.Security.Protocol.Tls/ServerRecordProtocol.cs:
\r
284 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
285 * Mono.Security.Protocol.Tls/TlsServerSettings.cs:
\r
286 * Mono.Security.Protocol.Tls/TlsClientSettings.cs:
\r
287 * Mono.Security.Protocol.Tls/ClientContext.cs:
\r
289 - Changes for make use of the renamed classes and enums.
\r
291 * Mono.Security.Protocol.Tls/TlsContentType.cs:
\r
293 - Renamed to ContentType.cs ( Enum and file )
\r
295 * Mono.Security.Protocol.Tls/TlsCiphersuiteCollection.cs:
\r
297 - Renamed to CiphersuiteCollection.cs ( Class and file )
\r
299 * Mono.Security.Protocol.Tls/TlsCiphersuiteFactory.cs:
\r
301 - Renamed to CiphersuiteCollection.cs ( Class and file )
\r
303 * Mono.Security.Protocol.Tls/TlsSslHandshakeHash.cs:
\r
305 - Renamed to SslHandshakeHash.cs ( Class and file )
\r
307 * Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
\r
309 - Renamed to SslCipherSuite.cs ( Class and file )
\r
311 2004-02-26 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
313 * Mono.Security.Protocol.Tls/HandshakeState.cs:
\r
317 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
318 * Mono.Security.Protocol.Tls/SslServerStream.cs:
\r
319 * Mono.Security.Protocol.Tls/Context.cs:
\r
320 * Mono.Security.Protocol.Tls/ClientContext.cs:
\r
321 * Mono.Security.Protocol.Tls/ClientRecordProtocol.cs:
\r
323 - Added changes for better handling of ClientHelloRequest messages.
\r
325 2004-02-25 Sebastien Pouliot <sebastien@ximian.com>
\r
327 * HttpsClientStream.cs: New. Internal glue class between System.dll
\r
328 WebConnection and SslClientStream to reduce reflection.
\r
329 * SslClientStream.cs: RaiseServerCertificateValidation is now virtual
\r
330 to allow HttpsClientStream to override it.
\r
332 2004-02-24 Carlos Guzman Alvarez <carlosga@telefonica.net>
\r
334 * Mono.Security.Protocol.Tls/RecordProtocol.cs:
\r
335 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
336 * Mono.Security.Protocol.Tls/SslServerStream.cs:
\r
338 - Reimplementation of TLS/SSL Alert Protocol.
\r
340 2004-02-20 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
342 * Mono.Security.Protocol.Tls.Handshake.Client/SslClientCertificate.cs:
\r
344 - Improved exception handling.
\r
346 2004-02-18 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
348 * Mono.Security.Protocol.Tls/CipherAlgorithmType.cs:
\r
349 * Mono.Security.Protocol.Tls/HashAlgorithmType.cs:
\r
350 * Mono.Security.Protocol.Tls/ExchangeAlgorithmType.cs:
\r
352 - Added Serializable attribute.
\r
354 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
355 * Mono.Security.Protocol.Tls/TlsCipherSuite.cs:
\r
356 * Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
\r
357 * Mono.Security.Protocol.Tls/TlsContext.cs:
\r
359 - Added some optimizations proposed by Sebastien Pouliot.
\r
361 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerCertificate.cs:
\r
363 - Changes on Common Name detection and certificate error handling ( Thanks to Sebastien Pouliot for his feedback ).
\r
365 2004-02-18 Sebastien Pouliot <sebastien@ximian.com>
\r
367 * SslClientStream.cs: Fixed (inverted) condition for ServerCertificate.
\r
368 * SecurityProtocolType.cs: Added [Serializable] to enum to match MS
\r
371 2004-02-17 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
373 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
375 - Added changes to security properties for check that the handshake is finished.
\r
377 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
379 - Added changes for bring async methods to work ( Thanks to Sebastien Pouliot )
\r
381 - Reworked the record fragmentation.
\r
383 - Fix for send the close notify alert in the Close method
\r
384 only if the Handshake is fully negotiated.
\r
387 2004-02-16 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
389 * Mono.Security.Protocol.Tls/TlsCipherSuiteFactory.cs:
\r
391 - Changed ciphersuites order of preference ( Thanks to Sebastien Pouliot for his feedback ).
\r
393 2004-02-15 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
395 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
397 - Added specific control od available data for Network Streams
\r
398 on Read ( Thanks to Francisco Figueiredo Jr. for his feedback ).
\r
400 - Removed test code.
\r
402 2004-02-14 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
404 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
406 - Removed test code.
\r
408 2003-11-17 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
410 * Mono.Security.Protocol.Tls/SslClientStream.cs:
\r
412 Removed ReadByte method, use innerStream.ReadByte() method instead.
\r
414 2003-11-13 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
416 * Added implementation of an SslClientStream class similar to the MS .NET Framework 1.2 documentation.
\r
418 The next files are no more needed:
\r
422 - TlsNetworkStream.cs
\r
426 - TlsSessionState.cs
\r
428 The next files are renamed:
\r
430 - TlsSessionSettings.cs -> TlsClientSettings.cs
\r
432 - TlsSessionContext.cs -> TlsContext.cs
\r
434 The next files are new:
\r
436 - SslClientStream.cs ( the name is non definitive yet )
\r
438 The next files where changed to reflect the new canges:
\r
440 - TlsHandshakeMessage.cs
\r
442 - TlsClientCertificate.cs
\r
444 - TlsClientCertificateVerify.cs
\r
446 - TlsClientFinished.cs
\r
448 - TlsClientHello.cs
\r
450 - TlsClientKeyExchange.cs
\r
452 - TlsServerCertificate.cs
\r
454 - TlsServerCertificateRequest.cs
\r
456 - TlsServerFinished.cs
\r
458 - TlsServerHello.cs
\r
460 - TlsServerHelloDone.cs
\r
462 - TlsServerKeyExchange.cs
\r
466 - TlsCloseNotifyAlert.cs
\r
469 2003-11-12 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
471 * Mono.Security.Protocol.Tls.Alerts/TlsAlert.cs:
\r
473 - Changes for give full error message only in debug mode ( Thanks to Sebastién Pouliot. )
\r
475 * Mono.Security.Protocol.Tls/TlsProtocol.cs:
\r
477 - Renamed to SecurityProtocolType.cs ( for match .NET 1.2 )
\r
479 * Mono.Security.Cryptography/MD5SHA1CryptoServiceProvider.cs:
\r
481 - Renamed to MD5SHA1.cs ( Thanks to Sebastién Pouliot. )
\r
483 * Mono.Security.Cryptography/TlsCompressionMethod.cs:
\r
485 - Renamed to SecurityCompressionType.
\r
487 * Mono.Security.Protocol.Tls/CipherAlgorithmType.cs:
\r
488 * Mono.Security.Protocol.Tls/HashAlgorithmType.cs:
\r
489 * Mono.Security.Protocol.Tls/ExchangeAlgorithmType.cs:
\r
491 - New enumerations that matches .NET 1.2 definitions with some minor differences.
\r
493 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
494 * Mono.Security.Protocol.Tls/TlsCipherSuite.cs:
\r
495 * Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
\r
496 * Mono.Security.Protocol.Tls/TlsSessionContext.cs:
\r
498 - Added changes for make use of new enumerations.
\r
500 * Mono.Security.Protocol.Tls/TlsClientStream.cs:
\r
502 - Added new informative properties that matches .NET 1.2 SslClientStream
\r
503 ( Not all the properties are implemented yet ).
\r
506 2003-11-10 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
508 * Mono.Security.Protocol.Tls.Alerts/TlsAlert.cs:
\r
510 - Fixed invalid alert message.
\r
512 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
513 * Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
\r
514 * Mono.Security.Cryptography/HMAC.cs:
\r
515 * Mono.Security.Cryptography/MD5SHA1CryptoServiceProvider.cs:
\r
516 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientCertificateVerify.cs:
\r
518 - Changed ( Thanks to Sebastién Pouliot for his feedback )
\r
520 SHA1CryptoServiceProvider sha = new SHA1CryptoServiceProvider();
\r
521 MD5CryptoServiceProvider sha = new MD5CryptoServiceProvider();
\r
525 HashAlgorithm sha = SHA1.Create();
\r
526 HashAlgorithm md5 = MD5.Create();
\r
528 2003-11-04 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
530 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
532 - Added custom padding for record encryption.
\r
535 2003-11-03 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
537 * Mono.Security.Protocol.Tls.Handshake/TlsHandshakeMessages.cs:
\r
541 * Mono.Security.Protocol.Tls/TlsSslHandshakeHash.cs:
\r
543 - New class for handshake hashes calculation on SSL3 protocol.
\r
545 * Mono.Security.Protocol.Tls/TlsSessionContext.cs:
\r
547 - Fixed mac keys clearing for SSL3 protocol.
\r
549 * Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
\r
550 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientFinished.cs:
\r
552 - Added changes for make use of new TlsSslHandshakeHash class.
\r
554 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerFinished.cs:
\r
556 - Added initial implementation for SSL3 protocol.
\r
558 * Mono.Security.Cryptography/MD5SHA1CryptoServiceProvider.cs:
\r
560 - New class for md5-sha hash calculation.
\r
562 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientFinished.cs:
\r
563 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerFinished.cs:
\r
564 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerKeyExchange.cs:
\r
565 * Mono.Security.Protocol.Tls.Handshake.Client/TlsHandshakeMessage.cs:
\r
567 - Make use of new MD5SHA1CryptoServiceProvider class.
\r
569 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientCertificateVerify.cs:
\r
571 - Added initial implementation (not finished).
\r
573 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerKeyExchange.cs:
\r
575 - Minor change to message processing.
\r
577 - Changed verify method name to verifySignature.
\r
579 * Mono.Security.Protocol.Tls/TlsSessionContext.cs:
\r
581 - Changed handshakeHashes member to be an TlsStream.
\r
583 2003-10-28 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
585 * Mono.Security.Protocol.Tls/CipherSuite.cs:
\r
586 * Mono.Security.Protocol.Tls/TlsSessionSettings.cs:
\r
587 * Mono.Security.Protocol.Tls/TlsServerSettings.cs:
\r
588 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientCertificateVerify.cs:
\r
589 * Mono.Security.Protocol.Tls.Handshake.Client/TlsClientKeyExchange.cs:
\r
590 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerCertificate.cs:
\r
591 * Mono.Security.Protocol.Tls.Handshake.Client/TlsServerKeyExchange.cs:
\r
593 - Added changes for make use of X509 classes from mono.
\r
595 2003-10-23 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
597 * Added partial implementation of SSL3 protocol ( not finished yet ).
\r
599 * TlsAbstractCipherSuite.cs: Renamed to CipherSuite.cs.
\r
601 * Removed AssemblyInfo.cs file.
\r
603 2003-10-21 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
605 TlsCipherSuiteFactory.cs: Changed names of private methods.
\r
607 TlsSslCipherSuite.cs: Replaced implementations of key generation methods with a throw new NotSupportedException().
\r
610 2003-10-20 Carlos Guzmán Álvarez <carlosga@telefonica.net>
\r
612 TlsCupherSuite.cs: Fixed padding length calculation on record encryption.
\r
614 TlsSessionContext.cs: Added new CompressionMethod property.
\r
615 Added new MAX_FRAGMENT_SIZE constant.
\r
617 TlsSession.cs: Removed MaxFragmentSize property.
\r
619 TlsSocket.cs: Replaced use of TlsSesison.MaxFragmentSize by TlsSessionContext.MAX_FAGMENT_SIZE
\r
621 TlsSessionSettings.cs: Added new CompressionMethod property.
\r
623 * Abstracted CipherSuite classes for allow work with other protocol versions.
\r
625 * Added new files :
\r
627 TlsAbstractCipherSuite.cs
\r
629 TlsSslCipherSuite.cs
\r
631 TlsCipherSuiteFactory.cs
\r
633 TlsCompressionMethod.cs
\r
635 * Added new cipher suites definitions based on RFC3268 - (http://www.ietf.org/rfc/rfc3268.txt)
\r
637 * Added two new supported ciphersuites for TLS protocol:
\r
639 TLS_RSA_WITH_AES_256_CBC_SHA
\r
641 TLS_RSA_WITH_AES_128_CBC_SHA
\r
643 * Moved key generation stuff to specific cipher suite classes.
\r
645 2003-10-20 Pedro Martínez Juliá <yoros@wanadoo.es>
\r
647 * AssemblyInfo.cs: commented out KeyFile reference.
\r
649 * TlsSession.cs: changed Math.Pow for System.Math.Pow because of MCS
\r
650 bug with namespace resolving.
\r