summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_unittest.cc
Commit message (Expand)AuthorAgeFilesLines
* Properly parse IPv6 subjectAltNames when USE_OPENSSL is setrsleevi@chromium.org2012-04-041-10/+50
* Fix a variable naming style nit post-refactoringrsleevi@chromium.org2012-04-031-1/+1
* Cache certificates as DER on all platforms.rsleevi@chromium.org2012-03-291-1/+1
* Move X509Certificate::Verify into CertVerifyProc rsleevi@chromium.org2012-03-221-35/+0
* Introduce a CertVerifierProc to handle system cert validation.rsleevi@chromium.org2012-03-221-902/+1
* Revert 127988 - net: update certificates for TestKnownRoot and PublicKeyHashes.wez@chromium.org2012-03-211-32/+74
* net: update certificates for TestKnownRoot and PublicKeyHashes.agl@chromium.org2012-03-211-74/+32
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-1/+2
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-2/+1
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-1/+2
* Disable X509Certificate.EVValidation for Android / USE_OPENSSL buildsrsleevi@chromium.org2012-03-091-1/+7
* net: allow EV indication on Windows when the local OCSP/CRL cache is stale.agl@chromium.org2012-03-071-42/+21
* Refactor Pickle Read methods to use higher performance PickleIterator.jbates@chromium.org2012-03-071-1/+1
* Use a scoped class for managing test root certs in unit testsrsleevi@chromium.org2012-03-071-23/+11
* Provide the certificate chain as validated to SSLInfo.palmer@chromium.org2012-03-031-13/+1
* net: check cached revocations on Windows when online checks are disabled.agl@chromium.org2012-02-161-0/+19
* Disable X509CertificateTest.TestKnownRoot and X509CertificateTest.PublicKeyHa...hbono@chromium.org2012-01-301-2/+4
* Check cert->isRoot to skip extraneous root certificates in certificatewtc@chromium.org2012-01-281-0/+37
* Allow X509CertificateTest.IntermediateCARequireExplicitPolicy to passwtc@chromium.org2012-01-281-3/+9
* Cleanup after debugging with the XP builder.agl@chromium.org2012-01-121-9/+3
* Continuing to debug via the builders since there's no XP trybot.agl@chromium.org2012-01-111-1/+5
* Add debugging to trace down a problem on WinXP/Vista.agl@chromium.org2012-01-111-4/+10
* Implement CRLSet checking on Mac.agl@chromium.org2012-01-111-2/+2
* Revert 117225 - Implement CRLSet checking on Windows.flackr@chromium.org2012-01-111-2/+2
* Implement CRLSet checking on Windows.agl@chromium.org2012-01-111-2/+2
* net: add a test for X509Certificate integration with CRLSet.agl@chromium.org2012-01-111-0/+101
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-151-3/+93
* When encountering certificates signed with md2/md4, make it a fatal error.rsleevi@chromium.org2011-12-141-1/+30
* Parse individual X.509 name components on Windows, rather than parsing the st...rsleevi@chromium.org2011-12-021-0/+50
* Do not hash the certificate twice.wtc@chromium.org2011-11-051-11/+24
* Record when certificates signed with md[2,4,5] are encountered when using Ope...rsleevi@chromium.org2011-11-031-5/+0
* Remove some dead code from X509Certificatersleevi@chromium.org2011-11-031-16/+17
* Record when certificates signed with md[2,4,5] are encountered on OS X.rsleevi@chromium.org2011-11-021-8/+18
* Revert 107679 - Broke https for appspot.com - http://crbug.com/102507rsleevi@chromium.org2011-11-021-15/+4
* Consider the signature algorithms of incomplete chains on Windowsrsleevi@chromium.org2011-11-011-3/+1
* Add unittests for the detection of md[2,4,5] when verifying certificatesrsleevi@chromium.org2011-11-011-9/+205
* Make X509Certificate::GetDEREncoded a static function taking an OSCertHandlersleevi@chromium.org2011-11-011-4/+8
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-311-1/+1
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-291-0/+41
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-281-4/+15
* net: enable CRL sets behind a command line flag.agl@chromium.org2011-10-251-15/+22
* Revert 107075 - Disallow wildcards from matching top-level registry controlle...achuith@chromium.org2011-10-251-15/+4
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-251-4/+15
* Use NSS to generate Origin-Bound Certs on Win and Mac.mattm@chromium.org2011-10-181-79/+0
* Certificate host matching rules should accept both absolute and relative DNS ...rsleevi@chromium.org2011-10-111-8/+26
* Update SHA1_LENGTH -> kSHA1Length to match previous change to SHA256_LENGTH.pkasting@chromium.org2011-09-281-5/+4
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-231-12/+12
* Revert 102322 - For the SSL cert status, convert anonymous enum that gives bi...pkasting@chromium.org2011-09-221-9/+9
* For the SSL cert status, convert anonymous enum that gives bit values into a ...pkasting@chromium.org2011-09-221-9/+9
* net: update public key block for the correct Cyber CA certs.agl@chromium.org2011-09-131-0/+34