summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_mac.cc
Commit message (Expand)AuthorAgeFilesLines
* Cache certificates as DER on all platforms.rsleevi@chromium.org2012-03-291-3/+2
* Move X509Certificate::Verify into CertVerifyProc rsleevi@chromium.org2012-03-221-776/+17
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-1/+0
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-0/+1
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-1/+0
* When detecting client certs on OS X, ensure all certs match the server's Cert...rsleevi@chromium.org2012-03-151-4/+1
* net: add a NotAfter field to CRLSets.agl@chromium.org2012-03-071-0/+1
* Refactor Pickle Read methods to use higher performance PickleIterator.jbates@chromium.org2012-03-071-1/+1
* net: permit EV without online revocation checking.agl@chromium.org2012-02-161-8/+6
* Fixes for review comments following r120599.mark@chromium.org2012-02-061-2/+2
* Always check the dictionary returned by SecTrustCopyExtendedResult formark@chromium.org2012-02-061-11/+26
* OSSTATUS_LOG: Address review comments following r119511.mark@chromium.org2012-01-301-1/+1
* Add OSSTATUS_LOG API.mark@chromium.org2012-01-271-21/+14
* Implement CRLSet checking on Mac.agl@chromium.org2012-01-111-1/+61
* Stop leaking a SecKeyRef on OS X when verifying certificatesrsleevi@chromium.org2011-12-211-1/+1
* On OS X, when parsing certificates, properly handle non-ASCII/UTF-8 string ty...rsleevi@chromium.org2011-12-211-9/+15
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-1/+46
* mac: s/UINT32_MAX/kuint32max/thakis@chromium.org2011-12-071-2/+2
* On OS X, when accessing a certificate field (subject, issuer, extension, etc)...rsleevi@chromium.org2011-12-021-154/+231
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-8/+6
* Log more descriptive certificate error messages on Mac.rsleevi@chromium.org2011-11-041-3/+12
* Record when certificates signed with md[2,4,5] are encountered on OS X.rsleevi@chromium.org2011-11-021-16/+72
* Make X509Certificate::GetDEREncoded a static function taking an OSCertHandlersleevi@chromium.org2011-11-011-8/+8
* Ensure X509Certificate::OSCertHandles are safe to be used on both UI, IO, and...rsleevi@chromium.org2011-11-011-8/+15
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-4/+0
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-0/+25
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-0/+1
* Use NSS to generate Origin-Bound Certs on Win and Mac.mattm@chromium.org2011-10-181-19/+0
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-231-1/+1
* Revert 102322 - For the SSL cert status, convert anonymous enum that gives bi...pkasting@chromium.org2011-09-221-1/+1
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-221-1/+1
* Resubmission of r98288: Added CreateOriginBound method to x509_certificate.hmdietz@google.com2011-09-081-0/+19
* Force certificate trust preferences checking on OS X.rsleevi@chromium.org2011-09-011-1/+2
* Revert 98288 - Added CreateOriginBound method to x509_certificate.h.jbates@chromium.org2011-08-251-19/+0
* Added CreateOriginBound method to x509_certificate.h.mdietz@google.com2011-08-251-0/+19
* On Mac, respect certificate user trust settings created by Safari.rsleevi@chromium.org2011-08-231-12/+20
* Return the constructed certificate chain in X509Certificate::Verify()rsleevi@chromium.org2011-07-301-0/+17
* On Mac, compare certificate host names according to RFC6125.rsleevi@chromium.org2011-07-301-84/+27
* Revert the following change in r93346:wtc@chromium.org2011-07-261-3/+2
* Adjust a LOG(WARNING) message to be less verbose, so that onlywtc@chromium.org2011-07-211-3/+5
* Implement GetSubjectAltName on all platformsjoth@chromium.org2011-07-191-52/+43
* Cache the underlying OS certificate handle within the X509CertificateCache, r...rsleevi@chromium.org2011-07-191-8/+3
* Don't block the UI thread for OCSP/CRLs when viewing a cert on Mac.rsleevi@chromium.org2011-06-231-70/+98
* Factor out Verify into x509 base classjoth@chromium.org2011-06-211-17/+3
* Map some CRL and OCSP errors to CERT_STATUS_UNABLE_TO_CHECK_REVOCATION.wtc@chromium.org2011-06-161-6/+19
* Add LOG(WARNING) messages to track down where we set CERT_STATUS_INVALID.wtc@chromium.org2011-06-111-1/+11
* Address post-review feedback for r82214. In addition, no longer attempt to gr...rsleevi@chromium.org2011-04-221-4/+4
* Address post-review feedback for r81702.rsleevi@chromium.org2011-04-221-40/+50
* Change the HTTP cache to cache the entire certificate chain for SSL sitesrsleevi@chromium.org2011-04-201-22/+24
* Allow certificate revocation checking to be enabled/disabled independent of t...rsleevi@chromium.org2011-04-151-39/+124