summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_unittest.cc
Commit message (Expand)AuthorAgeFilesLines
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-1170/+0
* src/: Update the remaining include paths of string_split.h to its new location.tfarina@chromium.org2013-03-061-1/+1
* Move file_path.h to base/files.brettw@chromium.org2013-02-241-1/+1
* Replace FilePath with base::FilePath in net.brettw@chromium.org2013-02-081-9/+9
* Move client certificates retrieval logic out of the SSL sockets.ppi@chromium.org2013-02-071-50/+0
* Add X509Certificate::IsIssuedByEncoded()digit@chromium.org2013-01-111-0/+100
* Add net/base/test_data_directory.htoyoshim@chromium.org2012-11-011-0/+1
* Support x509 certificate on iOS.droger@chromium.org2012-09-181-0/+5
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-09-071-4/+4
* Revert 150375 - Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-081-4/+4
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-071-4/+4
* Revert 150124 - Implement SHA-256 fingerprint support.dimich@chromium.org2012-08-061-4/+4
* Implement SHA-256 fingerprint support.palmer@chromium.org2012-08-061-4/+4
* Revert 149261 - Support SHA-256 in public key pins for HTTPS.vandebo@chromium.org2012-07-311-4/+4
* Support SHA-256 in public key pins for HTTPS.palmer@chromium.org2012-07-311-4/+4
* Properly parse IPv6 subjectAltNames when USE_OPENSSL is setrsleevi@chromium.org2012-04-041-10/+50
* Fix a variable naming style nit post-refactoringrsleevi@chromium.org2012-04-031-1/+1
* Cache certificates as DER on all platforms.rsleevi@chromium.org2012-03-291-1/+1
* Move X509Certificate::Verify into CertVerifyProc rsleevi@chromium.org2012-03-221-35/+0
* Introduce a CertVerifierProc to handle system cert validation.rsleevi@chromium.org2012-03-221-902/+1
* Revert 127988 - net: update certificates for TestKnownRoot and PublicKeyHashes.wez@chromium.org2012-03-211-32/+74
* net: update certificates for TestKnownRoot and PublicKeyHashes.agl@chromium.org2012-03-211-74/+32
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-1/+2
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-2/+1
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-1/+2
* Disable X509Certificate.EVValidation for Android / USE_OPENSSL buildsrsleevi@chromium.org2012-03-091-1/+7
* net: allow EV indication on Windows when the local OCSP/CRL cache is stale.agl@chromium.org2012-03-071-42/+21
* Refactor Pickle Read methods to use higher performance PickleIterator.jbates@chromium.org2012-03-071-1/+1
* Use a scoped class for managing test root certs in unit testsrsleevi@chromium.org2012-03-071-23/+11
* Provide the certificate chain as validated to SSLInfo.palmer@chromium.org2012-03-031-13/+1
* net: check cached revocations on Windows when online checks are disabled.agl@chromium.org2012-02-161-0/+19
* Disable X509CertificateTest.TestKnownRoot and X509CertificateTest.PublicKeyHa...hbono@chromium.org2012-01-301-2/+4
* Check cert->isRoot to skip extraneous root certificates in certificatewtc@chromium.org2012-01-281-0/+37
* Allow X509CertificateTest.IntermediateCARequireExplicitPolicy to passwtc@chromium.org2012-01-281-3/+9
* Cleanup after debugging with the XP builder.agl@chromium.org2012-01-121-9/+3
* Continuing to debug via the builders since there's no XP trybot.agl@chromium.org2012-01-111-1/+5
* Add debugging to trace down a problem on WinXP/Vista.agl@chromium.org2012-01-111-4/+10
* Implement CRLSet checking on Mac.agl@chromium.org2012-01-111-2/+2
* Revert 117225 - Implement CRLSet checking on Windows.flackr@chromium.org2012-01-111-2/+2
* Implement CRLSet checking on Windows.agl@chromium.org2012-01-111-2/+2
* net: add a test for X509Certificate integration with CRLSet.agl@chromium.org2012-01-111-0/+101
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-3/+93
* When encountering certificates signed with md2/md4, make it a fatal error.rsleevi@chromium.org2011-12-141-1/+30
* Parse individual X.509 name components on Windows, rather than parsing the st...rsleevi@chromium.org2011-12-021-0/+50
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-11/+24
* Record when certificates signed with md[2,4,5] are encountered when using Ope...rsleevi@chromium.org2011-11-031-5/+0
* Remove some dead code from X509Certificatersleevi@chromium.org2011-11-031-16/+17
* Record when certificates signed with md[2,4,5] are encountered on OS X.rsleevi@chromium.org2011-11-021-8/+18
* Revert 107679 - Broke https for appspot.com - http://crbug.com/102507rsleevi@chromium.org2011-11-021-15/+4
* Consider the signature algorithms of incomplete chains on Windowsrsleevi@chromium.org2011-11-011-3/+1