summaryrefslogtreecommitdiffstats
path: root/net/cert
Commit message (Expand)AuthorAgeFilesLines
* Follow-up changes to Android certificate verification logic.davidben@chromium.org2014-02-032-5/+13
* net: block three, retired, Symantec intermediates.agl@chromium.org2014-02-031-1/+10
* Cleanup: Remove std::string("") usage and fix lint errors.thestig@chromium.org2014-01-301-3/+3
* Certificate Transparency: Add UMA for SCT presence, type.eranm@google.com2014-01-225-20/+176
* Removes MessageLoop::Type checks in favor of IsCurrent on MessageLoops.sky@chromium.org2014-01-201-1/+1
* Export verified_cert and public_key_hashes on Android.davidben@chromium.org2014-01-173-35/+132
* Remove obsolete NSS version checks.mattm@chromium.org2014-01-172-39/+2
* ChromeOS: Fix crash if login profile triggers client auth.mattm@chromium.org2014-01-142-2/+185
* Delete char32 from base/basictypes.h.viettrungluu@chromium.org2014-01-061-4/+6
* On OSX 10.9, treat MD2/MD5 intermediate/leafs as "weak", rather than invalidrsleevi@chromium.org2014-01-041-6/+23
* NSS: Fix places leaking internal slot referencesmattm@chromium.org2014-01-031-1/+1
* Update uses of UTF conversions in courgette/, device/, extensions/, google_ap...avi@chromium.org2013-12-254-5/+7
* Certificate Transparency: More unit tests for netlog logging.eranm@google.com2013-12-251-4/+29
* Add NSSCertDatabaseChromeOS which uses the correct slots for each user.mattm@chromium.org2013-12-207-24/+386
* Make net::CertDatabase and PKCS12InitSingleton singletons Leaky.mattm@chromium.org2013-12-201-1/+3
* Fix leak in net::NSSProfileFilterChromeOS::IsCertAllowed.mattm@chromium.org2013-12-191-0/+1
* Add comments to explain the current handling of CERT_STATUS_NON_UNIQUE_NAME.wtc@chromium.org2013-12-182-0/+6
* Set verify_result->is_issued_by_known_root correctly inwtc@chromium.org2013-12-183-17/+39
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-178-20/+453
* Add ClientCertStoreChromeOS which only returns the certs for a given user.mattm@chromium.org2013-12-172-0/+166
* net: disable name constraints test on Android.agl@chromium.org2013-12-161-1/+7
* net: add name constraints for ANSSI root.agl@chromium.org2013-12-166-1/+209
* Revert of https://codereview.chromium.org/92443002/szym@chromium.org2013-12-138-445/+20
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-138-20/+445
* Revert 239921 "Revert 239759 "The comment in base64.h implies th..."vadimt@chromium.org2013-12-111-2/+1
* NSS: Make cert import helper functions take the slot as an argument.mattm@chromium.org2013-12-112-17/+30
* Revert 239759 "The comment in base64.h implies that base::Base64..."vadimt@chromium.org2013-12-111-1/+2
* Certificate Transparency: Saving log description in SCT.eranm@google.com2013-12-105-3/+74
* The comment in base64.h implies that base::Base64Encode() can return false, butricea@chromium.org2013-12-101-2/+1
* Fix coding style nits.wtc@chromium.org2013-12-091-2/+2
* net: block an ANSSI intermediate CA.agl@chromium.org2013-12-071-1/+5
* Certificate Transparency: Logging SCTs to the NetLog.eranm@google.com2013-11-296-8/+254
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-296-6/+86
* Certificate Transparency: Threading the CT verifier into the SSL client socket.eranm@google.com2013-11-283-16/+124
* QUIC: Update RSA keys to 2048-bit.wtc@chromium.org2013-11-271-4/+4
* Certificate Transparency: Address review comments from issue 67513008eranm@google.com2013-11-262-3/+2
* net: fix CRLSet tests.agl@chromium.org2013-11-251-56/+90
* Revert 237095 "LOG(INFO) tidying in net/"scottmg@chromium.org2013-11-251-0/+2
* LOG(INFO) tidying in net/scottmg@chromium.org2013-11-251-2/+0
* Add the high-level interface for verifying SCTs over multiple logseranm@google.com2013-11-249-1/+458
* Add an SignedCertificateTimetampStore, making SignedCertificateTimestamp be r...alcutter@google.com2013-11-227-37/+72
* Don't use nss_util in CertificateManagerModel::IsHardwareBacked.mattm@chromium.org2013-11-202-0/+8
* Certificate Transparency: Address review comments from issue 65863002.eranm@google.com2013-11-202-17/+33
* CT: Adding SCT and PreCertificates extractor. This code creates theeranm@google.com2013-11-195-5/+495
* Certificate Transparency: Style fixes following review of issue 55953002.eranm@google.com2013-11-182-10/+10
* CT: Adding SCT verification functionality: A CTLogVerifier instance can verif...eranm@google.com2013-11-135-0/+474
* Update JWK output to match latest draftjuanlang@google.com2013-11-093-4/+4
* mac: Prepare for -Wunused-functions.thakis@chromium.org2013-11-072-70/+0
* Avoid creating keys and self-signed certs separately.bemasc@chromium.org2013-11-017-33/+166
* CT: First step towards supporting Certificate Transparency in Chrome.eranm@google.com2013-11-015-0/+750