summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_client_socket_nss.cc
Commit message (Expand)AuthorAgeFilesLines
* Revert "Certificate Transparency: Code for unpacking EV cert hashes whitelist"Dmitry Lomov2014-09-041-12/+0
* Certificate Transparency: Code for unpacking EV cert hashes whitelisteranm2014-09-041-0/+12
* Include better OpenSSL error information in NetLog.davidben2014-08-271-1/+0
* Remove implicit conversions from scoped_refptr to T* in net/socket/dcheng2014-08-251-1/+1
* Align SSLClientSocketOpenSSL and SSLClientSocketNSS histograms.davidben2014-08-251-20/+0
* Change the lifespan of SSlConnectJobMessengers so that they are createdwtc@chromium.org2014-08-211-0/+5
* Centralize the logic for checking public key pins from ClientSocketNSSrch@chromium.org2014-08-081-42/+9
* This CL corrects a bug in which the OnHandshakeComplete callback for an ssl s...mshelley@chromium.org2014-08-071-0/+1
* This CL is a better implementation of https://codereview.chromium.org/3289030...mshelley@chromium.org2014-08-051-0/+9
* Implement ALPN for SSLClientSocketOpenSSL.davidben@chromium.org2014-07-301-30/+6
* Rename ServerBoundCert => ChannelID to reflect the current namerch@chromium.org2014-07-251-24/+24
* Fix a few stray net::'s in net/socket/davidben@chromium.org2014-07-171-1/+1
* Move SSLClientSocketNSS fallback logic to HttpNetworkTransaction.davidben@chromium.org2014-07-021-37/+6
* Don't leave a dangling nss_bufs_ pointer after freeing the NSS memiowtc@chromium.org2014-06-251-1/+2
* Stop attempting to write to transport sockets in NSS on failure.davidben@chromium.org2014-06-181-1/+6
* Make HSTS headers not clobber preloaded pins.palmer@chromium.org2014-05-071-5/+4
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-091-2/+2
* net: yet more pinning debugging.agl@chromium.org2014-04-091-1/+4
* Revert 261966 "make SetReceiveBufferSize and SetSendBufferSize r..."jschuh@chromium.org2014-04-051-2/+2
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-051-2/+2
* Delete some dead code.thakis@chromium.org2014-03-271-1/+0
* Standardize error reporting of IPEndPoint::ToSockAddr andwtc@chromium.org2014-03-261-1/+1
* Use sockets with unread data if they've never been used before.davidben@chromium.org2014-03-261-15/+36
* Make OpenSSL UpdateServerCert() OS independent.haavardm@opera.com2014-03-171-0/+5
* Add a histogram to measure the frequency of OCSP stapling support by serversrsleevi@chromium.org2014-02-221-1/+6
* Update net/third_party/nss to NSS 3.15.5 Beta 2.wtc@chromium.org2014-01-211-1/+7
* Remove vestigal traces of the TLS Cached Info Extension supportrsleevi@chromium.org2014-01-111-71/+0
* Remove vestigal traces of side-pinning introduced in r101993 and removed in r...rsleevi@chromium.org2014-01-021-4/+0
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-271-1/+46
* Revert 242219 "Defer TLS session caching until after certificate..."rsleevi@chromium.org2013-12-211-54/+1
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-211-1/+54
* Change SSLCertRequestInfo.host_and_port from string to HostPortPair.mattm@chromium.org2013-12-171-2/+1
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-171-47/+64
* Revert of https://codereview.chromium.org/92443002/szym@chromium.org2013-12-131-64/+47
* Extract Certificate Transparency SCTs from stapled OCSP responsesekasper@google.com2013-12-131-47/+64
* net: use model NSS socket to save setting the cipher order every time.agl@chromium.org2013-12-071-10/+3
* net: implement TLS_FALLBACK_SCSV.agl@chromium.org2013-12-071-0/+8
* Certificate Transparency: Use SCTs obtained from tls extension.eranm@google.com2013-12-061-1/+1
* net: boost AES-GCM ciphers if the machine has AES-NI.agl@chromium.org2013-12-021-0/+8
* Certificate Transparency: Logging SCTs to the NetLog.eranm@google.com2013-11-291-1/+2
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-291-1/+28
* Certificate Transparency: Threading the CT verifier into the SSL client socket.eranm@google.com2013-11-281-3/+30
* Add support for fetching Certificate Transparency SCTs over a TLS extensionekasper@google.com2013-11-281-0/+29
* Certificate Transparency: Address review comments from issue 65863002.eranm@google.com2013-11-201-9/+1
* Update to the latest False Start code from NSS upstream.wtc@chromium.org2013-11-191-72/+98
* NSS: {EC,RSA}PrivateKey shouldn't call crypto::GetPublicNSSKeySlot or GetPriv...mattm@chromium.org2013-11-131-0/+2
* Stop leaking a CERTCertificate* during SSL renegotiationrsleevi@chromium.org2013-11-081-1/+1
* Enable TLS Channel ID for the openssl implementation of SSLClientSocket.qsr@chromium.org2013-10-251-40/+13
* Do not allow the server certificate to change in a renegotiation.wtc@chromium.org2013-10-191-0/+13
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-091-1/+2