summaryrefslogtreecommitdiffstats
path: root/net/data
Commit message (Expand)AuthorAgeFilesLines
* Add GetWebSocketTestDataDirectory() to test_data_directorytoyoshim@chromium.org2012-11-064-20/+38
* Process only the first Strict-Transport-Security header.palmer@chromium.org2012-10-304-0/+15
* websocket_client_cert.p12 was broken after r11192028toyoshim@chromium.org2012-10-171-0/+0
* WebSocket test server migration on PPAPI teststoyoshim@chromium.org2012-10-175-1/+93
* Replace WorkerWebSocketHttpLayoutTest with WorkerTest.WebSocketSharedWorker.toyoshim@chromium.org2012-10-172-0/+77
* Replace WebSocket client certificate resources into net/data/ssl/certificatestoyoshim@chromium.org2012-10-173-0/+9
* Replace testing resources for WebSocket to net/data/websockettoyoshim@chromium.org2012-10-164-0/+99
* WebSocket test server migration on ExtensionApiTest.WebSocket (fourth trial)toyoshim@chromium.org2012-10-131-0/+18
* Revert 161572 - WebSocket test server migration on ExtensionApiTest.WebSocket...mrossetti@chromium.org2012-10-121-18/+0
* WebSocket test server migration on ExtensionApiTest.WebSocket (third trial)toyoshim@chromium.org2012-10-121-0/+18
* Revert 161542 - WebSocket test server migration on ExtensionApiTest.WebSocket...kochi@chromium.org2012-10-121-18/+0
* WebSocket test server migration on ExtensionApiTest.WebSocket (retry)toyoshim@chromium.org2012-10-121-0/+18
* Revert 161304 - WebSocket test server migration on ExtensionApiTest.WebSockettoyoshim@chromium.org2012-10-111-18/+0
* WebSocket test server migration on ExtensionApiTest.WebSockettoyoshim@chromium.org2012-10-111-0/+18
* * Change logic of SpdySession::VerifyDomainAuthentication to rch@chromium.org2012-09-133-0/+67
* net: fix a couple of broken certificate tests.agl@chromium.org2012-07-242-0/+315
* If the version field is omitted from the certificate, the defaultwtc@chromium.org2012-05-192-0/+39
* FTP: make the code handling server messages in directory listings more general.phajdan.jr@chromium.org2012-04-142-0/+71
* Properly parse IPv6 subjectAltNames when USE_OPENSSL is setrsleevi@chromium.org2012-04-043-0/+75
* Fix some grammar in comments, error messages and documentation.gavinp@chromium.org2012-04-031-2/+2
* Revert 127988 - net: update certificates for TestKnownRoot and PublicKeyHashes.wez@chromium.org2012-03-212-0/+0
* net: update certificates for TestKnownRoot and PublicKeyHashes.agl@chromium.org2012-03-212-0/+0
* Revert "Revert "net: fallback to online revocation checks for EV status when ...agl@chromium.org2012-03-201-0/+3
* Revert 127757 - net: fallback to online revocation checks for EV status when ...dgrogan@chromium.org2012-03-201-3/+0
* net: fallback to online revocation checks for EV status when CRLSet has expired.agl@chromium.org2012-03-201-0/+3
* Revert "Revert "Revert "Revert "net: add OCSP tests.""""agl@chromium.org2012-03-202-0/+54
* Revert "Revert "Revert "net: add OCSP tests."""agl@chromium.org2012-03-192-54/+0
* Revert "Revert "net: add OCSP tests.""agl@chromium.org2012-03-192-0/+54
* Revert "net: add OCSP tests."agl@chromium.org2012-03-192-54/+0
* net: add OCSP tests.agl@chromium.org2012-03-192-0/+54
* net: allow EV indication on Windows when the local OCSP/CRL cache is stale.agl@chromium.org2012-03-071-0/+312
* Provide the certificate chain as validated to SSLInfo.palmer@chromium.org2012-03-036-0/+762
* iCleanup: Delete a bunch of empty directories, part 4.thestig@chromium.org2012-02-231-4/+0
* Strip brackets from IPv6 host literals before passing down to PAC script.eroman@chromium.org2012-02-111-0/+9
* Check cert->isRoot to skip extraneous root certificates in certificatewtc@chromium.org2012-01-284-0/+273
* net: add a test for X509Certificate integration with CRLSet.agl@chromium.org2012-01-112-0/+41
* Really add test Origin Bound Certificate data for http://codereview.chromium....mattm@chromium.org2011-12-162-0/+0
* Reject certificate chains containing small RSA and DSA keys.palmer@chromium.org2011-12-1528-0/+1510
* Add test Origin Bound Certificate data for http://codereview.chromium.org/889...mattm@chromium.org2011-12-143-1/+5
* Parse individual X.509 name components on Windows, rather than parsing the st...rsleevi@chromium.org2011-12-023-0/+129
* Disk cache: Add a hash to the entry's internal data.rvargas@google.com2011-11-3012-134/+0
* Disk cache: Update the remove/insert data files.rvargas@google.com2011-11-2966-0/+0
* Add unittests for the detection of md[2,4,5] when verifying certificatesrsleevi@chromium.org2011-11-0112-0/+528
* Fix the "certificate is not yet valid" error for server certificateswtc@chromium.org2011-10-294-0/+231
* Preserve non-POST methods on 301/302 requests.mmenke@chromium.org2011-10-266-0/+9
* Recommit fraudulent certificate reporting infrastructure.palmer@chromium.org2011-10-152-0/+31
* Revert 105624 - Revert 105614.palmer@chromium.org2011-10-152-31/+0
* Revert 105614.palmer@chromium.org2011-10-152-0/+31
* Revert 105595 - Initial infrastructure for the fraudulent certificate chain r...apatrick@chromium.org2011-10-142-31/+0
* Initial infrastructure for the fraudulent certificate chain reportingpalmer@chromium.org2011-10-142-0/+31