summaryrefslogtreecommitdiffstats
path: root/net/http/http_security_headers_unittest.cc
Commit message (Expand)AuthorAgeFilesLines
* Limit Public-Key-Pins max-age to 60 dayselawrence2016-02-291-4/+4
* Switch to standard integer types in net/.Avi Drissman2015-12-201-13/+13
* Removing pin-sha1 from HPKP to match RFCsvaldez2015-08-241-22/+10
* Add parsing for Public-Key-Pins-Report-Only headerestark2015-07-311-121/+163
* Build and send HPKP violation reportsestark2015-07-281-18/+23
* Parse HPKP report-uri and persist in TransportSecurityPersisterestark2015-07-271-77/+179
* Revert of Parse HPKP report-uri and persist in TransportSecurityPersister (pa...rsleevi2015-07-211-179/+77
* Parse HPKP report-uri and persist in TransportSecurityPersisterestark2015-07-211-77/+179
* Split TransportSecurityState::DomainState into STSState and PKPStatemartijn2015-06-301-71/+73
* net: Remove the remaining use of GG_(U)INTn_C macros.tfarina2015-06-031-9/+10
* net: move Google pins up the chain.agl2015-05-071-0/+1
* Move NetLog code from src/net/base to src/net/log.eroman2015-04-021-1/+1
* Re-enable HttpSecurityHeadersTest.UpdateDynamicPKPMaxAge0hichris1232015-02-261-8/+1
* Treat HSTS and HPKP state independently.davidben2015-01-151-5/+41
* Require HPKP pins to be quoted.davidben2015-01-141-3/+24
* Remove the "snionly" concept from the HSTS preload.Adam Langley2014-09-251-20/+14
* Centralize the logic for checking public key pins from ClientSocketNSSrch@chromium.org2014-08-081-8/+24
* Revert of Reenable UpdateDynamicPKPMaxAge0 test. (https://codereview.chromium...jam@chromium.org2014-07-251-1/+8
* Reenable UpdateDynamicPKPMaxAge0 test.palmer@chromium.org2014-07-081-8/+1
* Disabled failing HttpSecurityHeadersTest.UpdateDynamicPKPMaxAge0 on Windows.kbr@chromium.org2014-05-211-1/+8
* Handle max-age in HPKP.palmer@chromium.org2014-05-151-0/+75
* Make HSTS headers not clobber preloaded pins.palmer@chromium.org2014-05-071-34/+90
* Tolerate trailing semicolons in HSTS headers.palmer@chromium.org2014-04-211-2/+53
* net: don't duplicate HPKP hashes when parsing the header.agl@chromium.org2013-11-251-0/+14
* Revert 224269 "Don't persist HPKP if PrivacyMode is enabled."tkent@chromium.org2013-09-201-2/+2
* Don't persist HPKP if PrivacyMode is enabled.mef@chromium.org2013-09-201-2/+2
* More tests for handling HSTS and HPKP headers.palmer@chromium.org2013-06-291-46/+148
* Have HttpSecurityHeaders return the 'raw' max_age for HPKP/HSTS headers, rath...unsafe@trevp.net2013-05-251-197/+174
* net: Update the include paths of base/string_piece.h to its new location.tfarina@chromium.org2013-04-131-1/+1
* Don't set MODE_DEFAULT when adding HPKP header.palmer@chromium.org2013-04-101-1/+1
* Rewrite std::string("") to std::string(), Linux edition.dcheng@chromium.org2013-04-091-2/+4
* Revert "Rewrite std::string("") to std::string(), Linux edition."dcheng@chromium.org2013-04-091-4/+2
* Rewrite std::string("") to std::string(), Linux edition.dcheng@chromium.org2013-04-091-2/+4
* This is the first in an intended sequence of CLs to refactorunsafe@trevp.net2013-01-081-0/+424