summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_mac.cc
Commit message (Expand)AuthorAgeFilesLines
* OSSTATUS_LOG: Address review comments following r119511.mark@chromium.org2012-01-301-1/+1
* Add OSSTATUS_LOG API.mark@chromium.org2012-01-271-21/+14
* Implement CRLSet checking on Mac.agl@chromium.org2012-01-111-1/+61
* Stop leaking a SecKeyRef on OS X when verifying certificatesrsleevi@chromium.org2011-12-211-1/+1
* On OS X, when parsing certificates, properly handle non-ASCII/UTF-8 string ty...rsleevi@chromium.org2011-12-211-9/+15
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-1/+46
* mac: s/UINT32_MAX/kuint32max/thakis@chromium.org2011-12-071-2/+2
* On OS X, when accessing a certificate field (subject, issuer, extension, etc)...rsleevi@chromium.org2011-12-021-154/+231
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-8/+6
* Log more descriptive certificate error messages on Mac.rsleevi@chromium.org2011-11-041-3/+12
* Record when certificates signed with md[2,4,5] are encountered on OS X.rsleevi@chromium.org2011-11-021-16/+72
* Make X509Certificate::GetDEREncoded a static function taking an OSCertHandlersleevi@chromium.org2011-11-011-8/+8
* Ensure X509Certificate::OSCertHandles are safe to be used on both UI, IO, and...rsleevi@chromium.org2011-11-011-8/+15
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-4/+0
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-0/+25
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-0/+1
* Use NSS to generate Origin-Bound Certs on Win and Mac.mattm@chromium.org2011-10-181-19/+0
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-231-1/+1
* Revert 102322 - For the SSL cert status, convert anonymous enum that gives bi...pkasting@chromium.org2011-09-221-1/+1
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-221-1/+1
* Resubmission of r98288: Added CreateOriginBound method to x509_certificate.hmdietz@google.com2011-09-081-0/+19
* Force certificate trust preferences checking on OS X.rsleevi@chromium.org2011-09-011-1/+2
* Revert 98288 - Added CreateOriginBound method to x509_certificate.h.jbates@chromium.org2011-08-251-19/+0
* Added CreateOriginBound method to x509_certificate.h.mdietz@google.com2011-08-251-0/+19
* On Mac, respect certificate user trust settings created by Safari.rsleevi@chromium.org2011-08-231-12/+20
* Return the constructed certificate chain in X509Certificate::Verify()rsleevi@chromium.org2011-07-301-0/+17
* On Mac, compare certificate host names according to RFC6125.rsleevi@chromium.org2011-07-301-84/+27
* Revert the following change in r93346:wtc@chromium.org2011-07-261-3/+2
* Adjust a LOG(WARNING) message to be less verbose, so that onlywtc@chromium.org2011-07-211-3/+5
* Implement GetSubjectAltName on all platformsjoth@chromium.org2011-07-191-52/+43
* Cache the underlying OS certificate handle within the X509CertificateCache, r...rsleevi@chromium.org2011-07-191-8/+3
* Don't block the UI thread for OCSP/CRLs when viewing a cert on Mac.rsleevi@chromium.org2011-06-231-70/+98
* Factor out Verify into x509 base classjoth@chromium.org2011-06-211-17/+3
* Map some CRL and OCSP errors to CERT_STATUS_UNABLE_TO_CHECK_REVOCATION.wtc@chromium.org2011-06-161-6/+19
* Add LOG(WARNING) messages to track down where we set CERT_STATUS_INVALID.wtc@chromium.org2011-06-111-1/+11
* Address post-review feedback for r82214. In addition, no longer attempt to gr...rsleevi@chromium.org2011-04-221-4/+4
* Address post-review feedback for r81702.rsleevi@chromium.org2011-04-221-40/+50
* Change the HTTP cache to cache the entire certificate chain for SSL sitesrsleevi@chromium.org2011-04-201-22/+24
* Allow certificate revocation checking to be enabled/disabled independent of t...rsleevi@chromium.org2011-04-151-39/+124
* Move crypto files out of base, to a top level directory.rvargas@google.com2011-04-141-12/+12
* net: add support for checking if a known public key is in a chain.agl@chromium.org2011-04-121-0/+24
* net: add ability to distinguish user-added root CAs.agl@chromium.org2011-04-071-1/+19
* Move some files from base to base/memory.levin@chromium.org2011-03-281-1/+1
* Remove most unnecessary uses of "net::" in net/base/.adamk@chromium.org2011-03-251-2/+2
* Blacklist certain leaf certificates.agl@chromium.org2011-03-171-0/+31
* Change other usages of .size() to .empty() when applicable.erg@google.com2011-03-041-1/+1
* Pure pedantry: Replace all ".size() == 0" with ".empty()".erg@google.com2011-03-021-1/+1
* Add ability to create self signed certs to mac.dmaclach@chromium.org2011-02-081-3/+232
* Remove obsolete base/lock.h and fix up callers to use the new header file andbrettw@chromium.org2011-01-211-1/+1
* Defines SSLServerSocket and implements SSLServerSocketNSShclam@chromium.org2010-12-231-0/+11