+2009-05-22 Sebastien Pouliot <sebastien@ximian.com>
+
+ * Socket_2_1.cs: Do not throw a SecurityException if the security
+ policy check fails in NET_2_1 but set the SocketError to AccessDenied
+ ensure the EndPoint has a valid policy before connecting.
+ * SocketAsyncEventArgs.cs: Don't recurse endlessly in SendCallback
+ and ReceiveCallback if the socket is not connected. Check for
+ AccessDenied in ConnectCallback (needed for the security policy
+ check in NET_2_1).
+
+2009-05-14 Sebastien Pouliot <sebastien@ximian.com>
+
+ * Socket_2_1.cs: Add ConnectAsync support for NET_2_1 which will
+ ensure the EndPoint has a valid policy before connecting.
+ * SocketAsyncEventArgs.cs: Add support for IList<ArraySegment<byte>>
+ when sending. Add ConnectSocket for NET_2_1
+
+2009-05-11 Gonzalo Paniagua Javier <gonzalo@novell.com>
+
+ * TcpClient.cs:
+ * Socket.cs:
+ * UdpClient.cs: use GetHostAddresses() instead of Resolve or
+ GetHostEntry.
+
+2009-05-11 Gonzalo Paniagua Javier <gonzalo@novell.com>
+
+ * UdpClient.cs: if possible, avoid DNS lookups when the host name is
+ an IP address. Related to bug #502866.
+
+2009-04-30 Gonzalo Paniagua Javier <gonzalo@novell.com>
+
+ * Socket.cs: return the last error if a connect to multiple addresses
+ fails.
+
+2009-04-22 Sebastien Pouliot <sebastien@ximian.com>
+
+ * Socket_2_1.cs: Use old-n-simple CheckProtocolSupport to implement
+ OSSupportsIP[v4|v6] for Moonlight (NET_2_1 only) so we can avoid
+ including a bunch of types (22) from System.Net.NetworkInformation
+ and drop the number of [SecuritySafeCritical] methods to audit (the
+ same 22) and [SecurityCritical] (8) beside getting a smaller
+ System.Net.dll assembly :)
+
2009-04-21 Gonzalo Paniagua Javier <gonzalo@novell.com>
* Socket.cs: End* methods can only be called once per IAsyncResult.