summaryrefslogtreecommitdiffstats
path: root/net/base/transport_security_state.cc
Commit message (Expand)AuthorAgeFilesLines
* net: move HSTS preloaded and pinning info out of code.agl@chromium.org2012-04-131-344/+1
* Revert 132012 - net: move HSTS preloaded and pinning info out of code.tim@chromium.org2012-04-121-1/+344
* net: move HSTS preloaded and pinning info out of code.agl@chromium.org2012-04-121-344/+1
* Modify the base::JSONReader interface to take a set of options rather than a ...rsesek@chromium.org2012-04-111-2/+1
* JSONWriter cleanup: integrate pretty print into write options.ericdingle@chromium.org2012-03-161-1/+3
* net: add (*.)crate.io to HSTS preloaded list.agl@chromium.org2012-03-121-0/+1
* net: add bigshinylock.minazo.net to HSTS preloaded.agl@chromium.org2012-03-091-0/+2
* net: add a batch of HSTS preloaded additions to the table.agl@chromium.org2012-03-061-0/+12
* net: don't set HSTS for chart.apis.google.comagl@chromium.org2012-03-051-0/+6
* net: add (*.)grepular.com to HSTS preloaded.agl@chromium.org2012-02-241-0/+1
* Add apis.google.com upon explicit request.cevans@chromium.org2012-02-221-0/+2
* Fix bug in HasMetadata: Updates argument even if it fails.palmer@chromium.org2012-02-151-10/+14
* Re-enable full HSTS for groups for M19.cevans@chromium.org2012-02-101-1/+1
* Revert 121525 - M18 branched so put groups back on full HSTS as agreed for M19.cevans@chromium.org2012-02-101-1/+1
* Remove (now) incorrect comment that got missed.agl@chromium.org2012-02-101-1/+0
* M18 branched so put groups back on full HSTS as agreed for M19.cevans@chromium.org2012-02-101-1/+1
* Don't force groups.google.com to HTTPS.agl@chromium.org2012-01-261-1/+1
* net: all GeoTrust to sign Google certs.agl@chromium.org2012-01-091-2/+0
* Implement HTTP header-based public key pinning.palmer@chromium.org2012-01-051-81/+322
* net: add (*.)pixi.me to HSTS preloaded.agl@chromium.org2011-12-281-0/+1
* Simple change to simplify TransportSecurityState.palmer@chromium.org2011-12-271-10/+0
* Revert "Revert "net: reenable Twitter's public key pins with api.twitter.com ...agl@chromium.org2011-12-071-3/+48
* Revert "net: reenable Twitter's public key pins with api.twitter.com using th...agl@chromium.org2011-12-061-48/+3
* net: reenable Twitter's public key pins with api.twitter.com using the CDN pins.agl@chromium.org2011-12-061-3/+48
* Remove all 192 static initializers from transport_security_state.ccthakis@chromium.org2011-12-011-19/+19
* net: make interstitials fatal for pinned sitesagl@chromium.org2011-11-291-9/+25
* net: remove public key pins for Twitter.agl@chromium.org2011-11-091-2/+2
* net: clean up public key pinsagl@chromium.org2011-11-071-105/+37
* net: fix pinning of blog.torproject.orgagl@chromium.org2011-11-021-1/+1
* net: reject other intermediates from Equifaxagl@chromium.org2011-11-021-116/+188
* Report second-level domains for UMA on pin failure.palmer@chromium.org2011-10-311-127/+237
* Add groups.google.com to HSTS list.cevans@chromium.org2011-10-191-0/+1
* Recommit fraudulent certificate reporting infrastructure.palmer@chromium.org2011-10-151-219/+269
* Revert 105624 - Revert 105614.palmer@chromium.org2011-10-151-269/+219
* Revert 105614.palmer@chromium.org2011-10-151-219/+269
* Revert 105595 - Initial infrastructure for the fraudulent certificate chain r...apatrick@chromium.org2011-10-141-269/+219
* Initial infrastructure for the fraudulent certificate chain reportingpalmer@chromium.org2011-10-141-219/+269
* Add *.googleplex.com to HSTS list.cevans@chromium.org2011-10-141-0/+1
* net: narrow HSTS for (*.)dropcam.com to (www.)dropcam.comagl@chromium.org2011-10-121-1/+2
* net: disable Twitter's CDN pins for debugging.agl@chromium.org2011-10-121-80/+3
* net: another HSTS preloaded addition.agl@chromium.org2011-10-121-0/+2
* Fixes a few nits following http://codereview.chromium.org/8050021/bulach@chromium.org2011-10-061-2/+2
* net: add certificate pins for Twitter.agl@chromium.org2011-10-041-13/+167
* net: add (*.)luneta.nearbuysystems.com to HSTS preloaded.agl@chromium.org2011-09-291-0/+1
* Decouples TransportSecurityState from NSS.bulach@chromium.org2011-09-291-27/+96
* Update SHA1_LENGTH -> kSHA1Length to match previous change to SHA256_LENGTH.pkasting@chromium.org2011-09-281-6/+1
* Make TransportSecurityState not ref-counted for simplicity.phajdan.jr@chromium.org2011-09-271-5/+27
* Try to fix compile break.pkasting@chromium.org2011-09-221-4/+1
* Convert SHA256_LENGTH from a constant-in-anonymous-enum to a static const. T...pkasting@chromium.org2011-09-221-2/+2
* net: support side-pinning of public keys.agl@chromium.org2011-09-201-0/+229