+2006-03-16 Sebastien Pouliot <sebastien@ximian.com>
+
+ * TlsClientHello.cs: Check to see if we already have a known session
+ (past or concurrent) with the same target host. If so the use this
+ session id to try to resume (i.e. abbreviated handshake).
+ * TlsServerFinished.cs: Don't reset the hasndshake stream here. The
+ stream must be resetted once BOTH the client and the server are done.
+ The order of message can be different if we use an abbreviated
+ handshake sequence which leads to an invalid handshake.
+ * TlsServerHello.cs: Add this session info to the client cache. If the
+ server sends the same session id (as we supplied) then we MUST do an
+ abbreviated handshake.
+
+2005-11-23 Sebastien Pouliot <sebastien@ximian.com>
+
+ * TlsServerCertificate.cs: Add support for Netscape Server Gated
+ Crypto (2.16.840.1.113730.4) as a valid server-side EKU OID. Fix bug
+ #76804.
+
+2005-06-14 Sebastien Pouliot <sebastien@ximian.com>
+
+ * TlsClientCertificate.cs: Add support for _optional_ mutual
+ authentication. SSL3 and TLS1 deals differently with this. SSL3 tested
+ with OpenSSL, TSL1 tested with OpenSSL and LDAPS/AD.
+
+2005-04-12 Sebastien Pouliot <sebastien@ximian.com>
+
+ * TlsClientCertificateVerify.cs: Add missing data length (16 bits -
+ not to be confused with the record 24 bits length) before the RSA
+ signature of the MD5SHA1 hash. Fix #71696.
+
2004-05-11 Carlos Guzman Alvarez <carlosga@telefonica.net>\r
\r
* Mono.Security.Protocol.Tls.Handshake.Client/TlsServerCertificate.cs:\r