summaryrefslogtreecommitdiffstats
path: root/net/cert
Commit message (Expand)AuthorAgeFilesLines
* Add Net.CertVerifier_First_Job_Latency metric.davidben@chromium.org2014-04-092-3/+25
* Remove known root detection logic on Android.davidben@chromium.org2014-04-081-4/+2
* Introduce USE_OPENSSL_CERTS for certificate handling.haavardm@opera.com2014-03-285-19/+19
* Delete some dead code.thakis@chromium.org2014-03-271-27/+0
* Add missing calls to TestRootCerts::Clear() after usage.haavardm@opera.com2014-03-261-0/+5
* Move UTF16ToASCII, remove WideToASCII.brettw@chromium.org2014-03-141-2/+2
* Remove ContainsOnlyWhitespace from string_util and CollapseWhitespace into to...brettw@chromium.org2014-03-111-2/+2
* Remove CERT_STATUS_WEAK_DH_KEY. A weak DH key is not a certificate error.wtc@chromium.org2014-03-062-5/+1
* Remove unused NSS dependencies in mac certificate handling code. haavardm@opera.com2014-03-032-16/+0
* Convert scoped_ptr_malloc -> scoped_ptr, part 2.viettrungluu@chromium.org2014-02-267-22/+21
* Fix invalid scoped_ptr_malloc assignment if NSSProfileFilterChromeOS::Init is...mattm@chromium.org2014-02-251-2/+9
* Partial revert of "Add function to support clearing SSL/certificate store."yfriedman@chromium.org2014-02-251-4/+0
* Add function to support clearing SSL/certificate store.yfriedman@chromium.org2014-02-133-1/+15
* NSS Cros multiprofile: trust roots added by a profile shouldn't apply to othe...mattm@chromium.org2014-02-0810-48/+181
* Make NSSCertDatabase::ListCerts async and use the worker pool for actual cert...tbarzic@chromium.org2014-02-069-44/+254
* Follow-up changes to Android certificate verification logic.davidben@chromium.org2014-02-032-5/+13
* net: block three, retired, Symantec intermediates.agl@chromium.org2014-02-031-1/+10
* Cleanup: Remove std::string("") usage and fix lint errors.thestig@chromium.org2014-01-301-3/+3
* Certificate Transparency: Add UMA for SCT presence, type.eranm@google.com2014-01-225-20/+176
* Removes MessageLoop::Type checks in favor of IsCurrent on MessageLoops.sky@chromium.org2014-01-201-1/+1
* Export verified_cert and public_key_hashes on Android.davidben@chromium.org2014-01-173-35/+132
* Remove obsolete NSS version checks.mattm@chromium.org2014-01-172-39/+2
* ChromeOS: Fix crash if login profile triggers client auth.mattm@chromium.org2014-01-142-2/+185
* Delete char32 from base/basictypes.h.viettrungluu@chromium.org2014-01-061-4/+6
* On OSX 10.9, treat MD2/MD5 intermediate/leafs as "weak", rather than invalidrsleevi@chromium.org2014-01-041-6/+23
* NSS: Fix places leaking internal slot referencesmattm@chromium.org2014-01-031-1/+1
* Update uses of UTF conversions in courgette/, device/, extensions/, google_ap...avi@chromium.org2013-12-254-5/+7
* Certificate Transparency: More unit tests for netlog logging.eranm@google.com2013-12-251-4/+29
* Add NSSCertDatabaseChromeOS which uses the correct slots for each user.mattm@chromium.org2013-12-207-24/+386
* Make net::CertDatabase and PKCS12InitSingleton singletons Leaky.mattm@chromium.org2013-12-201-1/+3
* Fix leak in net::NSSProfileFilterChromeOS::IsCertAllowed.mattm@chromium.org2013-12-191-0/+1
* Add comments to explain the current handling of CERT_STATUS_NON_UNIQUE_NAME.wtc@chromium.org2013-12-182-0/+6
* Set verify_result->is_issued_by_known_root correctly inwtc@chromium.org2013-12-183-17/+39
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-178-20/+453
* Add ClientCertStoreChromeOS which only returns the certs for a given user.mattm@chromium.org2013-12-172-0/+166
* net: disable name constraints test on Android.agl@chromium.org2013-12-161-1/+7
* net: add name constraints for ANSSI root.agl@chromium.org2013-12-166-1/+209
* Revert of https://codereview.chromium.org/92443002/szym@chromium.org2013-12-138-445/+20
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-138-20/+445
* Revert 239921 "Revert 239759 "The comment in base64.h implies th..."vadimt@chromium.org2013-12-111-2/+1
* NSS: Make cert import helper functions take the slot as an argument.mattm@chromium.org2013-12-112-17/+30
* Revert 239759 "The comment in base64.h implies that base::Base64..."vadimt@chromium.org2013-12-111-1/+2
* Certificate Transparency: Saving log description in SCT.eranm@google.com2013-12-105-3/+74
* The comment in base64.h implies that base::Base64Encode() can return false, butricea@chromium.org2013-12-101-2/+1
* Fix coding style nits.wtc@chromium.org2013-12-091-2/+2
* net: block an ANSSI intermediate CA.agl@chromium.org2013-12-071-1/+5
* Certificate Transparency: Logging SCTs to the NetLog.eranm@google.com2013-11-296-8/+254
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-296-6/+86
* Certificate Transparency: Threading the CT verifier into the SSL client socket.eranm@google.com2013-11-283-16/+124
* QUIC: Update RSA keys to 2048-bit.wtc@chromium.org2013-11-271-4/+4