summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate.cc
Commit message (Expand)AuthorAgeFilesLines
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-09-071-3/+3
* Revert 150375 - Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-081-3/+3
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-071-3/+3
* Revert 150124 - Implement SHA-256 fingerprint support.dimich@chromium.org2012-08-061-3/+3
* Implement SHA-256 fingerprint support.palmer@chromium.org2012-08-061-3/+3
* Revert 149261 - Support SHA-256 in public key pins for HTTPS.vandebo@chromium.org2012-07-311-3/+3
* Support SHA-256 in public key pins for HTTPS.palmer@chromium.org2012-07-311-3/+3
* Cache certificates as DER on all platforms.rsleevi@chromium.org2012-03-291-31/+41
* Move X509Certificate::Verify into CertVerifyProc rsleevi@chromium.org2012-03-221-233/+0
* Avoid using Pickle::WriteSize(), which writes an architecture-dependent amountmdm@chromium.org2012-03-211-5/+47
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-0/+11
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-11/+0
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-0/+11
* Unreviewed fix for typo in commentagl@chromium.org2012-03-131-1/+1
* net: block two MITM proxy certificates issued by Trustwave Organization Issui...agl@chromium.org2012-03-131-1/+6
* Refactor Pickle Read methods to use higher performance PickleIterator.jbates@chromium.org2012-03-071-1/+1
* Disable certificate cache for NSS.mnissler@chromium.org2012-02-221-7/+21
* Remove the global HCERTSTORE from Windows in favour of using the NULL HCERTST...rsleevi@chromium.org2012-02-151-19/+6
* Add a convenience typedef LazyInstance<T>::Leaky to avoid repeating T.fischman@chromium.org2012-01-231-2/+1
* When rejecting weak keys, do not mask more serious X509 errors.palmer@chromium.org2012-01-051-2/+6
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-0/+39
* When encountering certificates signed with md2/md4, make it a fatal error.rsleevi@chromium.org2011-12-141-0/+16
* Allow linker initialization of lazy instancejoth@chromium.org2011-11-151-1/+1
* net: switch to blocking DigiCert Sdn Bhd by public key.agl@chromium.org2011-11-091-38/+6
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-3/+9
* net: replace an explicit array length with arraysizeagl@chromium.org2011-11-041-11/+9
* Add expiration date to blocked Digicert Sdn. Bhd. intermediate public key.agl@chromium.org2011-11-041-0/+1
* Log the (server, to-be-verified) certificate chains to the NetLog when loggin...rsleevi@chromium.org2011-11-041-0/+41
* net: block an intermediate CA certificate issued by CyberTrust and a number o...agl@chromium.org2011-11-031-2/+45
* Remove some dead code from X509Certificatersleevi@chromium.org2011-11-031-16/+0
* Revert 107679 - Broke https for appspot.com - http://crbug.com/102507rsleevi@chromium.org2011-11-021-26/+6
* A quick fix for Mac GCC.hbono@chromium.org2011-11-011-1/+1
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-263/+15
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-1/+2
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-281-6/+26
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-2/+4
* Revert 107075 - Disallow wildcards from matching top-level registry controlle...achuith@chromium.org2011-10-251-26/+6
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-251-6/+26
* Certificate host matching rules should accept both absolute and relative DNS ...rsleevi@chromium.org2011-10-111-1/+6
* Update SHA1_LENGTH -> kSHA1Length to match previous change to SHA256_LENGTH.pkasting@chromium.org2011-09-281-6/+6
* net: update public key block for the correct Cyber CA certs.agl@chromium.org2011-09-131-2/+2
* Landing some further tweaks for Adam.cevans@chromium.org2011-09-031-1/+9
* Fix a benign off-by-one error of kNumSerials in IsBlacklisted.wtc@chromium.org2011-09-031-3/+4
* net: block bad DigiNotar serial numbers and several intermediates.agl@chromium.org2011-08-311-4/+273
* Mark DigiNotar as untrustedagl@chromium.org2011-08-301-1/+28
* Remove a few unused functions.thakis@chromium.org2011-08-021-10/+0
* Return the constructed certificate chain in X509Certificate::Verify()rsleevi@chromium.org2011-07-301-0/+1
* Revert r92977 partially to fix a certificate verification regressionwtc@chromium.org2011-07-211-5/+16
* Don't use X509Certificate in SSLConfig.sergeyu@chromium.org2011-07-201-5/+13
* Implement GetSubjectAltName on all platformsjoth@chromium.org2011-07-191-11/+19