summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_nss.cc
Commit message (Expand)AuthorAgeFilesLines
* Add X509Certificate::IsIssuedByEncoded()digit@chromium.org2013-01-111-0/+21
* Support x509 certificate on iOS.droger@chromium.org2012-09-181-200/+9
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-09-071-4/+4
* Revert 150375 - Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-081-4/+4
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-071-4/+4
* Revert 150124 - Implement SHA-256 fingerprint support.dimich@chromium.org2012-08-061-4/+4
* Implement SHA-256 fingerprint support.palmer@chromium.org2012-08-061-4/+4
* Revert 149261 - Support SHA-256 in public key pins for HTTPS.vandebo@chromium.org2012-07-311-4/+4
* Support SHA-256 in public key pins for HTTPS.palmer@chromium.org2012-07-311-4/+4
* Cache certificates as DER on all platforms.rsleevi@chromium.org2012-03-291-3/+2
* Move X509Certificate::Verify into CertVerifyProc rsleevi@chromium.org2012-03-221-749/+0
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-1/+0
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-0/+1
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-1/+0
* net: also check the EV certificate path against any CRLSet.agl@chromium.org2012-03-191-2/+19
* Add an SSLConfig option to explicit disable NSSHttpIO.agl@chromium.org2012-03-151-7/+15
* Change the old type name PRArenaPool to PLArenaPool.wtc@chromium.org2012-03-091-1/+1
* Handle a NULL trust anchor cert (cert_po_trustAnchor) returned bywtc@chromium.org2012-03-081-2/+3
* net: add a NotAfter field to CRLSets.agl@chromium.org2012-03-071-0/+1
* Refactor Pickle Read methods to use higher performance PickleIterator.jbates@chromium.org2012-03-071-1/+1
* net: permit EV without online revocation checking.agl@chromium.org2012-02-161-7/+5
* Check cert->isRoot to skip extraneous root certificates in certificatewtc@chromium.org2012-01-281-0/+24
* net: allow CRLSets to block specific SPKIs.agl@chromium.org2012-01-101-11/+16
* net: change how CRL sets interact with online revocation checking.agl@chromium.org2012-01-061-30/+20
* Try#2: Handle Origin Bound Certificate expiration.mattm@chromium.org2011-12-221-1/+4
* Revert 115219 - Handle Origin Bound Certificate expiration.mattm@chromium.org2011-12-211-4/+1
* Handle Origin Bound Certificate expiration.mattm@chromium.org2011-12-201-1/+4
* Fix a leak of a SECKEYPublicKey following r114709rsleevi@chromium.org2011-12-161-3/+4
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-0/+34
* This fixes a bug I introduced last night withgspencer@chromium.org2011-12-131-1/+1
* This applies GUIDs to certificate and key nicknames whengspencer@chromium.org2011-12-121-2/+99
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-5/+6
* Make X509Certificate::GetDEREncoded a static function taking an OSCertHandlersleevi@chromium.org2011-11-011-5/+6
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-3/+0
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-0/+21
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-1/+92
* Fix leaking CERTCertificate in NSS X509Certificate::CreateSelfSigned.mattm@chromium.org2011-10-201-2/+4
* Use NSS to generate Origin-Bound Certs on Win and Mac.mattm@chromium.org2011-10-181-231/+8
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-231-3/+3
* Revert 102322 - For the SSL cert status, convert anonymous enum that gives bi...pkasting@chromium.org2011-09-221-3/+3
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-221-3/+3
* Resubmission of r98288: Added CreateOriginBound method to x509_certificate.hmdietz@google.com2011-09-081-10/+150
* Revert 98288 - Added CreateOriginBound method to x509_certificate.h.jbates@chromium.org2011-08-251-150/+10
* Added CreateOriginBound method to x509_certificate.h.mdietz@google.com2011-08-251-10/+150
* Return the constructed certificate chain in X509Certificate::Verify()rsleevi@chromium.org2011-07-301-3/+17
* Implement GetSubjectAltName on all platformsjoth@chromium.org2011-07-191-47/+39
* Cache the underlying OS certificate handle within the X509CertificateCache, r...rsleevi@chromium.org2011-07-191-2/+1
* Also ignore SEC_ERROR_BAD_INFO_ACCESS_LOCATION when we try AIAwtc@chromium.org2011-07-181-0/+1
* net: add additional EV policy OID for Valicertagl@chromium.org2011-06-301-1/+0
* net: allow multiple EV OIDsagl@chromium.org2011-06-291-6/+9