summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_nss.cc
Commit message (Expand)AuthorAgeFilesLines
* Move crypto files out of base, to a top level directory.rvargas@google.com2011-04-141-6/+6
* net: add support for checking if a known public key is in a chain.agl@chromium.org2011-04-121-0/+23
* net: add ability to distinguish user-added root CAs.agl@chromium.org2011-04-071-1/+19
* Move some files from base to base/memory.levin@chromium.org2011-03-281-1/+1
* Remove most unnecessary uses of "net::" in net/base/.adamk@chromium.org2011-03-251-1/+1
* SEC_ERROR_UNTRUSTED_CERT means the user has marked the (leaf) certificatewtc@chromium.org2011-03-231-3/+3
* Blacklist certain leaf certificates.agl@chromium.org2011-03-171-0/+12
* An RSA SSL server certificate whose Key Usage extension wtc@chromium.org2011-03-101-0/+15
* Add X509Certificate::VerifyCertName(string) API. This will be usedmbelshe@chromium.org2011-03-031-0/+4
* Defines SSLServerSocket and implements SSLServerSocketNSShclam@chromium.org2010-12-231-0/+9
* Create self signed X509 certificatehclam@chromium.org2010-12-171-0/+105
* Adds X509 certificates for OpenSSL.bulach@chromium.org2010-10-081-0/+10
* Turn off CRL checking for CAs that have multiple keys to work aroundwtc@chromium.org2010-09-251-0/+25
* Remove an obsolete TODO comment. Support for the Netscape SSLwtc@chromium.org2010-08-271-4/+0
* x509_certificate_nss: remove unused ScopedCERTCertificate and ScopedCERTCertListmattm@chromium.org2010-08-211-32/+0
* Add support for parsing certificate formats other than raw, DER-encoded certi...rsleevi@chromium.org2010-07-221-8/+63
* Revert 52799 - Add support for parsing certificate formats other than raw, DE...rsleevi@chromium.org2010-07-171-63/+8
* Add support for parsing certificate formats other than raw, DER-encoded certi...rsleevi@chromium.org2010-07-171-8/+63
* Minor clean-up tasks that were TODO(snej)rsleevi@chromium.org2010-07-171-4/+4
* Do not call NSS functions if NSS initialization failed.wtc@chromium.org2010-04-161-0/+4
* Our HTTP client callback functions for NSS must set an NSS/NSPR errorwtc@chromium.org2010-04-051-0/+2
* Do not use cert_pi_useAIACertFetch by default. Use it onlywtc@chromium.org2010-03-191-35/+141
* Thread-safety for X509Certificate's intermediate-certs list.snej@chromium.org2010-03-051-3/+6
* Revert my last commit 'cause it breaks net unit tests on OS X 10.6 :(snej@chromium.org2010-03-051-6/+3
* Thread-safety for X509Certificate's intermediate-certs list.snej@chromium.org2010-03-051-3/+6
* Mac: implement <keygen> support, including adding generated cert to the Keych...snej@chromium.org2010-03-021-5/+10
* Add a context-sensitive error mapping function specific to SSLwtc@chromium.org2010-01-151-0/+2
* Linux: Add Certificate Info dialog (part 1)mattm@chromium.org2010-01-141-20/+2
* Don't assert what the certificate's subjectAltName extensionwtc@chromium.org2009-12-071-5/+9
* Work around the NSS bugs in the AIA certificate fetch code by retryingwtc@chromium.org2009-11-201-9/+26
* X509Certificate::Verify should honor thewtc@chromium.org2009-10-301-8/+25
* Second try. r27819 was missing a null pointer check forwtc@chromium.org2009-10-021-38/+22
* Revert r27819 because it causes net_unittests to crash in thewtc@chromium.org2009-10-021-20/+38
* Map SEC_ERROR_OCSP_BAD_HTTP_RESPONSE (-8073) towtc@chromium.org2009-10-021-38/+20
* Don't use NSS databases for non-essential purposes, such as rememberingwtc@chromium.org2009-09-211-1/+2
* Add a NOTREACHED() to catch users of pre-release NSS.chase@chromium.org2009-09-111-0/+5
* Add code for enabling or disabling CRLs and OCSP correctly.wtc@chromium.org2009-08-241-2/+18
* Improve certificate error mapping.wtc@chromium.org2009-08-211-2/+9
* Try to fix crash in OCSP handlers.ukai@chromium.org2009-08-191-16/+3
* Disable OCSP until we have fixed the crash in OCSP code. As a result ourwtc@chromium.org2009-08-171-3/+16
* Address Alexei Volkov's comments on http://codereview.chromium.org/119026.wtc@chromium.org2009-08-131-7/+20
* typedef PolicyOID to support Linux-only SECOidTag in EVRootCAMetadata methods.ukai@chromium.org2009-08-121-61/+4
* Use strict revocation flags only for EV verification.wtc@chromium.org2009-08-081-3/+14
* Fix build break with uninitialized variable 'ev_policy_tag'.ukai@chromium.org2009-08-071-10/+9
* Implement X509Certificate::IsEV for NSS.ukai@chromium.org2009-08-071-82/+202
* Use LOAD_VERIFY_EV_CERT to verify EV-ness in Verify().ukai@chromium.org2009-06-231-2/+7
* Don't consider a certificate revoked if we don't havewtc@chromium.org2009-06-051-2/+5
* Move X509Certificate::HasExpired to x509_certificate.cc.ukai@chromium.org2009-06-011-5/+0
* Implement X509Certificate::Verify for Linux.ukai@chromium.org2009-05-281-7/+270
* Remove another NOTIMPLEMENTEDkuchhal@chromium.org2009-05-201-1/+1