summaryrefslogtreecommitdiffstats
path: root/net/http/transport_security_state_unittest.cc
Commit message (Expand)AuthorAgeFilesLines
* Implement a skeleton version of Expect CT reportsestark2016-03-101-7/+180
* Change expect-ct test URLs to be more future-compatible.lgarron2015-12-171-2/+2
* Add Expect CT report URIs to HSTS preload listestark2015-12-151-0/+18
* Rate limit HPKP reportsestark2015-11-101-17/+90
* Remove TransportSecurityState::IsGooglePinnedProperty.davidben2015-11-061-65/+1
* Throw out same-host HTTPS HPKP report URIsestark2015-09-011-3/+64
* Removing pin-sha1 from HPKP to match RFCsvaldez2015-08-241-18/+28
* Allow preloaded pins to contain report URIs; remove special-case reportingestark2015-08-121-0/+53
* Process Public-Key-Pin-Report-Only headersestark2015-08-031-42/+165
* Build and send HPKP violation reportsestark2015-07-281-2/+181
* Parse HPKP report-uri and persist in TransportSecurityPersisterestark2015-07-271-19/+49
* Revert of Parse HPKP report-uri and persist in TransportSecurityPersister (pa...rsleevi2015-07-211-49/+19
* Parse HPKP report-uri and persist in TransportSecurityPersisterestark2015-07-211-19/+49
* Split TransportSecurityState::DomainState into STSState and PKPStatemartijn2015-06-301-118/+159
* net: add “google” TLD to HSTS preloaded list.Adam Langley2015-06-221-0/+6
* Use RFC 2606 reserved domains in TransportSecurityState unittestnharper2015-06-021-100/+100
* Normalize hostnames before searching for HSTS/HPKP preloadsrsleevi2015-05-201-0/+63
* More specific HSTS rules override less specific regardless of includeSubDomains.davidben2015-04-031-0/+45
* Move NetLog code from src/net/base to src/net/log.eroman2015-04-021-1/+1
* Cleanup: Better constify some strings in net/.thestig2015-01-241-2/+2
* Treat HSTS and HPKP state independently.davidben2015-01-151-46/+204
* net: remove pinning for crypto.cat.Adam Langley2015-01-051-3/+0
* net: disable subdomain pinning for Facebook.agl2014-11-181-3/+1
* net: support a pinning-only, include-subdomains flag in static HSTS.agl2014-11-121-1/+18
* Standardize usage of virtual/override/final specifiers.dcheng2014-10-271-1/+1
* net: fix bug in compact HSTS representation.agl2014-10-201-0/+23
* Remove the "snionly" concept from the HSTS preload.Adam Langley2014-09-251-79/+61
* Centralize the logic for checking public key pins from ClientSocketNSSrch@chromium.org2014-08-081-36/+87
* Make HSTS headers not clobber preloaded pins.palmer@chromium.org2014-05-071-303/+313
* net: yet more pinning debugging.agl@chromium.org2014-04-091-3/+5
* net: pin (*.)gstatic.com, not just ssl.gstatic.comagl@chromium.org2014-01-221-1/+2
* net: add GlobalSign to Twitter CDN pins.agl@chromium.org2014-01-071-1/+0
* net: trim allowed Google pins now that we have switched to GIAG2.agl@chromium.org2013-11-051-131/+0
* net: allow invalid TransportSecurityState to process invalid DNS names.agl@chromium.org2013-11-011-0/+13
* Clean up a few unused globals.thakis@chromium.org2013-09-251-32/+0
* Revert 224269 "Don't persist HPKP if PrivacyMode is enabled."tkent@chromium.org2013-09-201-60/+47
* Don't persist HPKP if PrivacyMode is enabled.mef@chromium.org2013-09-201-47/+60
* Add wallet to the Google HSTS list (replacing defunct health).cevans@chromium.org2013-09-031-2/+2
* Revert 219811 "Opt *.corp.google.com into HSTS."cevans@chromium.org2013-08-281-2/+0
* Opt *.corp.google.com into HSTS.cevans@chromium.org2013-08-271-0/+2
* Handle includeSubdomains for public key pinning.palmer@chromium.org2013-06-121-3/+4
* Preload HSTS for paypal.com.palmer@chromium.org2013-06-061-2/+4
* net: Update the include paths of base/string_piece.h to its new location.tfarina@chromium.org2013-04-131-1/+1
* Don't set MODE_DEFAULT when adding HPKP header.palmer@chromium.org2013-04-101-12/+6
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-7/+7
* net: remove kyps.net from HSTS preloaded.agl@chromium.org2013-03-181-4/+0
* net: split net/ssl out of net/basephajdan.jr@chromium.org2013-03-141-0/+849