summaryrefslogtreecommitdiffstats
path: root/crypto
Commit message (Expand)AuthorAgeFilesLines
* Add the QuicRandom interface with a default implementation that is wtc@chromium.org2012-12-081-1/+1
* Use size_t as the type of the key_length and digest_length argumentswtc@chromium.org2012-12-046-16/+13
* Fix nits in SecureHash.wtc@chromium.org2012-11-302-1/+3
* Fix nits in crypto::InitNSSSafely().jorgelo@chromium.org2012-11-292-11/+12
* Update nss_revision to 169146.wtc@chromium.org2012-11-221-2/+0
* Always force a crash with error info on NSS_NoDB_Init failure.wtc@chromium.org2012-11-211-10/+8
* Disable MD5 certificate signatures if NSS is used to verify certificates.wtc@chromium.org2012-11-201-5/+8
* Initialize NSS in the PPAPI process for ClearKey CDM.jorgelo@chromium.org2012-11-172-1/+22
* Move scoped_temp_dir from base to base/filesbrettw@chromium.org2012-11-161-3/+4
* Use LOG(FATAL) instead of CHECK(false) to force a crash on NSS_NoDB_Initwtc@chromium.org2012-11-161-1/+1
* Force a crash with error info on NSS_NoDB_Init failure.wtc@chromium.org2012-11-151-0/+13
* crypto: add GHASH implementation.agl@chromium.org2012-11-094-0/+484
* crypto: Remove forbidden using namespace directive.tfarina@chromium.org2012-11-032-3/+12
* First step towards component build for Android.yfriedman@chromium.org2012-11-011-1/+2
* Enable MD5 certificate signatures until we figure out how to dealwtc@chromium.org2012-10-191-0/+5
* Remove all the "set noparent" directivesdpranke@chromium.org2012-10-191-1/+0
* Reland: Implement ScopedTestNSSDB instead of OpenTestNSSDB()toyoshim@chromium.org2012-10-183-7/+32
* Revert 162327 - Implement ScopedTestNSSDB instead of OpenTestNSSDB()estade@chromium.org2012-10-173-31/+7
* Implement ScopedTestNSSDB instead of OpenTestNSSDB()toyoshim@chromium.org2012-10-173-7/+31
* Use the NSS internal key slot for all temporary key operationsrsleevi@chromium.org2012-10-174-9/+4
* crypto: remove unused Mac SignatureVerifier.agl@chromium.org2012-10-092-227/+0
* Force crypto::AppleKeychain access to be guarded by a Big Global Lockrsleevi@chromium.org2012-10-031-0/+13
* crypto: add DecodeSignature and use SHA-256 with ECDSA.agl@chromium.org2012-09-195-11/+50
* Do not include <Security/cssm.h> on iOS as it does not exist.msarda@chromium.org2012-09-051-2/+2
* Rename MacKeychain to AppleKeychainmsarda@chromium.org2012-08-308-205/+468
* Add RSAPrivateKey stub implementation for iOS.msarda@chromium.org2012-08-202-0/+76
* Upstream minor iOS crypto diffs.msarda@chromium.org2012-08-142-2/+5
* Built crypto and crypto_unittests for iOSmsarda@chromium.org2012-08-093-7/+27
* Added crypto random-number generatormniknami@chromium.org2012-08-026-7/+78
* Add a DCHECK to ECSignatureCreator::SetFactoryForTesting to help avoid use-af...rch@chromium.org2012-08-011-0/+4
* Make 'License' field in third-party metadata requiredsteveblock@chromium.org2012-08-011-0/+1
* src/crypto should build on the x86_64 architecture.mmaerean@adobe.com2012-07-302-42/+81
* crypto: Tag some overridden methods with OVERRIDE.tfarina@chromium.org2012-07-301-4/+5
* crypto: special case ∞+a, a+∞ and a+a in p224.agl@chromium.org2012-07-272-44/+113
* Declare password_data_count_ as int to match the return type of itswtc@chromium.org2012-07-191-1/+1
* Remove #pragma once from cryptoajwong@chromium.org2012-07-1128-42/+14
* NSS Channel ID: don't check ECC support on every socket creation.mattm@chromium.org2012-07-093-4/+46
* Convert SSLClientSocketNSS to use the NSS Channel ID callback.mattm@chromium.org2012-06-261-1/+1
* Use NSS for symmetric key crypto operations on Windows and Mac.ddorwin@chromium.org2012-06-158-501/+58
* Fixing gcc 4.7 building problems.shenhan@google.com2012-06-053-10/+18
* Remove TPMTokenInfoDelegate to make TPM initialization code path simplehashimoto@chromium.org2012-05-172-103/+55
* Upstream: Depend on OpenSSL directly instead of via system.gypjingzhao@chromium.org2012-05-161-1/+1
* Remove crypto::IsTPMTokenAvailblehashimoto@chromium.org2012-05-162-16/+0
* Change the way _EXPORT macros look.thakis@chromium.org2012-05-151-0/+4
* Add a wrong key that should be detected by all implementations.wtc@chromium.org2012-05-111-5/+24
* Don't sign extensions with an unsupported/invalid private keyrsleevi@chromium.org2012-05-041-13/+16
* win: Fix a few minor issues found by clang.thakis@chromium.org2012-05-021-11/+5
* Demonstrate that not all wrong keys can be detected by padding error.wtc@chromium.org2012-04-271-0/+14
* Add a warning about Decrypt() being used as a padding oracle.wtc@chromium.org2012-04-251-1/+9
* Add a wrong key test into EncryptorTest.xhwang@chromium.org2012-04-231-1/+45