summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate.cc
Commit message (Expand)AuthorAgeFilesLines
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-3/+9
* net: replace an explicit array length with arraysizeagl@chromium.org2011-11-041-11/+9
* Add expiration date to blocked Digicert Sdn. Bhd. intermediate public key.agl@chromium.org2011-11-041-0/+1
* Log the (server, to-be-verified) certificate chains to the NetLog when loggin...rsleevi@chromium.org2011-11-041-0/+41
* net: block an intermediate CA certificate issued by CyberTrust and a number o...agl@chromium.org2011-11-031-2/+45
* Remove some dead code from X509Certificatersleevi@chromium.org2011-11-031-16/+0
* Revert 107679 - Broke https for appspot.com - http://crbug.com/102507rsleevi@chromium.org2011-11-021-26/+6
* A quick fix for Mac GCC.hbono@chromium.org2011-11-011-1/+1
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-263/+15
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-1/+2
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-281-6/+26
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-2/+4
* Revert 107075 - Disallow wildcards from matching top-level registry controlle...achuith@chromium.org2011-10-251-26/+6
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-251-6/+26
* Certificate host matching rules should accept both absolute and relative DNS ...rsleevi@chromium.org2011-10-111-1/+6
* Update SHA1_LENGTH -> kSHA1Length to match previous change to SHA256_LENGTH.pkasting@chromium.org2011-09-281-6/+6
* net: update public key block for the correct Cyber CA certs.agl@chromium.org2011-09-131-2/+2
* Landing some further tweaks for Adam.cevans@chromium.org2011-09-031-1/+9
* Fix a benign off-by-one error of kNumSerials in IsBlacklisted.wtc@chromium.org2011-09-031-3/+4
* net: block bad DigiNotar serial numbers and several intermediates.agl@chromium.org2011-08-311-4/+273
* Mark DigiNotar as untrustedagl@chromium.org2011-08-301-1/+28
* Remove a few unused functions.thakis@chromium.org2011-08-021-10/+0
* Return the constructed certificate chain in X509Certificate::Verify()rsleevi@chromium.org2011-07-301-0/+1
* Revert r92977 partially to fix a certificate verification regressionwtc@chromium.org2011-07-211-5/+16
* Don't use X509Certificate in SSLConfig.sergeyu@chromium.org2011-07-201-5/+13
* Implement GetSubjectAltName on all platformsjoth@chromium.org2011-07-191-11/+19
* Cache the underlying OS certificate handle within the X509CertificateCache, r...rsleevi@chromium.org2011-07-191-95/+137
* Rewrite the name verifier using CanonicalizeHostjoth@chromium.org2011-07-131-65/+35
* Make the host name verification conform to rfc6125joth@chromium.org2011-07-121-68/+121
* Revert 92006 - Make the host name verification conform to rfc6125joth@chromium.org2011-07-111-124/+66
* Make the host name verification conform to rfc6125joth@chromium.org2011-07-111-66/+124
* GCC 4.6 -Wunused-but-set-variable cleanup.pph34r@gmail.com2011-07-021-4/+1
* Factor out Verify into x509 base classjoth@chromium.org2011-06-211-0/+18
* Using DCHECK_NE/EQ/LE/GE/GT/LT() where possible. Updating logging in src/net/...kushi.p@gmail.com2011-05-051-2/+2
* Address post-review feedback for r82214. In addition, no longer attempt to gr...rsleevi@chromium.org2011-04-221-25/+15
* Change the HTTP cache to cache the entire certificate chain for SSL sitesrsleevi@chromium.org2011-04-201-4/+67
* net: add ability to distinguish user-added root CAs.agl@chromium.org2011-04-071-0/+19
* Move some files from base to base/memory.levin@chromium.org2011-03-281-1/+1
* Clean up the IsBlacklisted function.wtc@chromium.org2011-03-241-4/+26
* net: fix blacklisted serial number.agl@chromium.org2011-03-181-1/+1
* net: Add two more blacklisted certificates.agl@chromium.org2011-03-181-1/+3
* Blacklist certain leaf certificates.agl@chromium.org2011-03-171-0/+30
* Add X509Certificate::VerifyCertName(string) API. This will be usedmbelshe@chromium.org2011-03-031-0/+129
* Pure pedantry: Replace all ".size() == 0" with ".empty()".erg@google.com2011-03-021-1/+1
* More net/ method ordering.erg@google.com2011-01-261-34/+34
* Remove obsolete base/lock.h and fix up callers to use the new header file andbrettw@chromium.org2011-01-211-4/+4
* Clean-up style issues in net:: related to X.509 data-types, eliminating unnec...rsleevi@chromium.org2010-11-221-0/+1
* Reland 66791 (change was innocent)willchan@chromium.org2010-11-191-28/+26
* Revert 66719 - Reland r65996. Disallows Singletons on non-joinable thread.willchan@chromium.org2010-11-191-26/+28
* Reland r65996. Disallows Singletons on non-joinable thread.willchan@chromium.org2010-11-191-28/+26