summaryrefslogtreecommitdiffstats
path: root/net/base
Commit message (Expand)AuthorAgeFilesLines
* Linux: Move base/mime_util* to base/nix. It's not used on any other platform.thestig@chromium.org2011-11-111-2/+2
* Cleanup: Remove unneeded forward declararations in net.thestig@chromium.org2011-11-112-2/+0
* aura: Make the Linux version of IconLoader not require GTK+.derat@chromium.org2011-11-101-6/+0
* CookieMonster: Store expiration time also for session cookies.marja@chromium.org2011-11-104-34/+65
* net: Remove 3 exit time destructors and 3 static initializers.thakis@chromium.org2011-11-093-15/+24
* net: Move the last two Escape() functions into the net namespace.tfarina@chromium.org2011-11-092-15/+15
* net: remove public key pins for Twitter.agl@chromium.org2011-11-092-4/+7
* net: switch to blocking DigiCert Sdn Bhd by public key.agl@chromium.org2011-11-091-38/+6
* Increase the limit on number of NotifyAddrChange failuresmmenke@chromium.org2011-11-091-6/+6
* Remove HostResolverImpl from Mock*HostResolver. szym@chromium.org2011-11-086-146/+287
* Add new text for indicating we are resolving hosts during proxy resolution.willchan@chromium.org2011-11-081-3/+6
* Revert 108910 - Remove HostResolverImpl from Mock*HostResolver.szym@chromium.org2011-11-076-287/+146
* Add NET_EXPORT to CreateAddressListUsingPort to fix treeszym@chromium.org2011-11-071-1/+2
* Remove HostResolverImpl from Mock*HostResolver.szym@chromium.org2011-11-076-146/+287
* net: clean up public key pinsagl@chromium.org2011-11-073-105/+1000
* Remove 13 exit time constructors and 3 static initializersthakis@chromium.org2011-11-071-1/+2
* net: Move more three Escape() functions into net namespace.tfarina@chromium.org2011-11-062-31/+30
* Do not hash the certificate twice.wtc@chromium.org2011-11-059-56/+92
* net: replace an explicit array length with arraysizeagl@chromium.org2011-11-041-11/+9
* Log more descriptive certificate error messages on Mac.rsleevi@chromium.org2011-11-041-3/+12
* Add expiration date to blocked Digicert Sdn. Bhd. intermediate public key.agl@chromium.org2011-11-041-0/+1
* Log the (server, to-be-verified) certificate chains to the NetLog when loggin...rsleevi@chromium.org2011-11-046-1/+141
* Add a LoadState for the AppCachervargas@chromium.org2011-11-041-0/+6
* Fix a couple minor net issuesjoth@chromium.org2011-11-031-1/+2
* This change implements certificate import from ONC file.gspencer@chromium.org2011-11-034-3/+23
* This fixes some minor issues in this test that were found because Igspencer@chromium.org2011-11-031-73/+73
* net: expand upon the comment for IsChainOfPublicKeysPermittedagl@chromium.org2011-11-031-4/+10
* net: block an intermediate CA certificate issued by CyberTrust and a number o...agl@chromium.org2011-11-031-2/+45
* Update effective-TLD data files using the latest data from Mozilla.pam@chromium.org2011-11-031-10411/+10757
* Record when certificates signed with md[2,4,5] are encountered when using Ope...rsleevi@chromium.org2011-11-032-37/+63
* Remove some dead code from X509Certificatersleevi@chromium.org2011-11-033-38/+17
* Automatically send try jobs in linux_redux if NSS files are touchedjoth@chromium.org2011-11-021-2/+1
* net: fix pinning of blog.torproject.orgagl@chromium.org2011-11-021-1/+1
* Record when certificates signed with md[2,4,5] are encountered on OS X.rsleevi@chromium.org2011-11-023-27/+93
* Update effective-TLD data files using the latest data from Mozilla.pam@chromium.org2011-11-022-44/+311
* Thread::Stop() must be called before any subclass's destructor completes.joi@chromium.org2011-11-021-3/+5
* net: reject other intermediates from Equifaxagl@chromium.org2011-11-023-119/+289
* Revert 107679 - Broke https for appspot.com - http://crbug.com/102507rsleevi@chromium.org2011-11-022-41/+10
* A quick fix for Mac GCC.hbono@chromium.org2011-11-012-2/+2
* Fix X509CertificateTest.SerialNumbers on OpenSSL builds after http://crrev.co...joth@chromium.org2011-11-011-5/+14
* Consider the signature algorithms of incomplete chains on Windowsrsleevi@chromium.org2011-11-012-9/+18
* Add unittests for the detection of md[2,4,5] when verifying certificatesrsleevi@chromium.org2011-11-011-9/+205
* Make X509Certificate::GetDEREncoded a static function taking an OSCertHandlersleevi@chromium.org2011-11-017-30/+38
* Ensure X509Certificate::OSCertHandles are safe to be used on both UI, IO, and...rsleevi@chromium.org2011-11-014-54/+147
* Report second-level domains for UMA on pin failure.palmer@chromium.org2011-10-312-127/+242
* net: retain leading zero bytes in X.509 serial numbers.agl@chromium.org2011-10-318-284/+30
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-299-3/+220
* Use AuthCredentials throughout the network stack instead of username/password.cbentzel@chromium.org2011-10-284-2/+95
* Use text/plain as a test MIME type instead of application/pdf for NetUtilTest...asanka@chromium.org2011-10-281-3/+3
* Disallow wildcards from matching top-level registry controlled domains during...rsleevi@chromium.org2011-10-282-10/+41