summaryrefslogtreecommitdiffstats
path: root/net/cert/cert_verify_proc_openssl.cc
Commit message (Expand)AuthorAgeFilesLines
* Don't trust SHA-1 from publicly trusted CAs on/after 2016-1-1rsleevi2015-11-131-0/+2
* Use the exact-width integer types defined in <stdint.h> rather thanwtc2015-06-041-1/+1
* Route OCSP stapling through CertVerifier.davidben2015-04-271-0/+5
* Convert crypto::ScopedOpenSSL to type aliases.davidben2015-02-211-2/+2
* Detect SHA-1 when it appears in certificate chainsrsleevi2014-09-291-1/+7
* Switch to BoringSSL.davidben@chromium.org2014-07-221-3/+3
* Revert "Switch to BoringSSL."agl@chromium.org2014-07-181-3/+3
* Switch to BoringSSL.agl@chromium.org2014-07-181-3/+3
* Revert 283813 "Switch to BoringSSL."vitalybuka@chromium.org2014-07-171-3/+3
* Switch to BoringSSL.agl@chromium.org2014-07-171-3/+3
* Revert "Switch to BoringSSL."agl@chromium.org2014-07-171-3/+3
* Switch to BoringSSL.agl@chromium.org2014-07-161-3/+3
* Eliminate ScopedOpenSSL in favour of scoped_ptr<> specializations.rsleevi@chromium.org2014-07-101-2/+3
* NSS Cros multiprofile: trust roots added by a profile shouldn't apply to othe...mattm@chromium.org2014-02-081-8/+2
* Set verify_result->is_issued_by_known_root correctly inwtc@chromium.org2013-12-181-8/+26
* Add a histogram for measuring the number of times we fall back to common name...rsleevi@chromium.org2013-10-241-1/+3
* No longer record whether an MD2/MD5 CA was seenrsleevi@chromium.org2013-06-281-4/+0
* net: also fix crbug.com/226067 for OpenSSL.agl@chromium.org2013-04-051-1/+1
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-0/+230