1 2007-05-22 Sebastien Pouliot <sebastien@ximian.com>
3 * TlsClientCertificate.cs: Add chain support for x.509 client
4 certificates. Based on Roy Versteeg patch to fix #80557.
6 2007-05-07 Sebastien Pouliot <sebastien@ximian.com>
8 * TlsClientCertificate.cs: A client certficate with a RSA public key
9 can only be used, protocol wise, to sign. Which means we should always
10 be checking it's keyUsage for digitalSignature. Fix for bug #81511
12 2006-09-11 Sebastien Pouliot <sebastien@ximian.com>
14 * TlsClientCertificate.cs: Use Negotiating.Cipher instead of Cipher.
15 Fix reading the message length if it's zero (in that case it's not
17 * TlsClientFinished.cs: Use Current.Cipher instead of Cipher. Use
18 Compare to test client and server digests equality.
19 * TlsClientHello.cs: Use Negotiating.Cipher instead of Cipher.
20 * TlsClientKeyExchange.cs: Use Negotiating.Cipher instead of Cipher.
21 * TlsServerFinished.cs: Use Current.Cipher instead of Cipher.
22 * TlsServerHello.cs: Use Negotiating.Cipher instead of Cipher.
24 2005-07-01 Sebastien Pouliot <sebastien@ximian.com>
26 * TlsClientCertificate.cs: Fix decoding (extra length) and for null
27 (no certificates). Add basic client certificate validations before
28 calling the callback (which can override the default decision).
29 * TlsClientCertificateVerify.cs: Fix signature verification (the first
30 two bytes are the length of the signature).
31 * TlsServerCertificateRequest.cs: Sent the list of trusted root DNs.
33 2004-11-10 Sebastien Pouliot <sebastien@ximian.com>
35 * TlsClientFinished.cs: ProcessAsTls1 - get out of the loop if PRF are
38 2004-09-23 Sebastien Pouliot <sebastien@ximian.com>
40 * TlsClientKeyExchange.cs: Removed .Clear call on private key as itn't
41 ours (but only a reference). It also requires the callback to recreate
42 a new key object each time (which is worse). This also implies that
43 the caller (implementing the callback) is responsible to clear it.