summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_client_socket_nss.h
Commit message (Expand)AuthorAgeFilesLines
* Remove experimental code to pick the "warmest" socketmmenke@chromium.org2013-03-301-2/+0
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-2/+2
* net: split net/ssl out of net/basephajdan.jr@chromium.org2013-03-141-2/+2
* Remove support for DNSSEC stapled certificates.agl@chromium.org2012-11-161-2/+0
* Enable TLS channeld id by default.mattm@chromium.org2012-09-151-1/+1
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-09-071-1/+1
* Revert 150375 - Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-081-1/+1
* Implement SHA-256 fingerprint supportpalmer@chromium.org2012-08-071-1/+1
* Revert 150124 - Implement SHA-256 fingerprint support.dimich@chromium.org2012-08-061-1/+1
* Implement SHA-256 fingerprint support.palmer@chromium.org2012-08-061-1/+1
* Revert 149261 - Support SHA-256 in public key pins for HTTPS.vandebo@chromium.org2012-07-311-1/+1
* Support SHA-256 in public key pins for HTTPS.palmer@chromium.org2012-07-311-1/+1
* Add a new GetTlsUniqueChannelBinding method to SSLSocket, and implement nss v...rch@chromium.org2012-07-311-2/+5
* Change SpdySession::GetSSLInfo to get the SSLInfo from the underlying socketrch@chromium.org2012-07-191-1/+1
* Remove the rest of #pragma once in one big CL.ajwong@chromium.org2012-07-111-1/+0
* Switch the NSS thread from being a base::Thread to a base::SequencedWorkerPoo...rsleevi@chromium.org2012-07-101-3/+3
* Remove SSLHostInfo.agl@chromium.org2012-06-271-14/+1
* fixed issue 128383 - replace GetPeerAddress(AddressList* address) with GetPee...zhaoqin@chromium.org2012-06-081-1/+1
* Revert 140846 - (relanding r140697)rsleevi@chromium.org2012-06-061-134/+32
* Revert 140697 - Maybe caused sizes regression (which would be acceptablersleevi@chromium.org2012-06-061-32/+134
* Move the core state machine of SSLClientSocketNSS into a thread-safe Corersleevi@chromium.org2012-06-061-134/+32
* Removed unreached code related to ESET MITM detection.rsleevi@chromium.org2012-05-191-4/+0
* Prevent the infinite loop inside SSLClientSocketNSS::OnSendComplete.wtc@chromium.org2012-05-161-2/+3
* Replace DBC.Advertised with DomainBoundCerts.Support histogram.mattm@chromium.org2012-05-091-0/+4
* net: False Start only for NPN capable servers.agl@google.com2012-04-101-7/+0
* Rename origin_bound_cert files to server_bound_cert.mattm@chromium.org2012-03-221-1/+1
* Change Origin bound certs -> Domain bound certs.mattm@chromium.org2012-03-201-20/+20
* Add a boolean |has_context| argument to the TLS ExportKeyingMaterialwtc@chromium.org2012-03-151-1/+2
* Update net/third_party/nss to NSS 3.13.3.wtc@chromium.org2012-03-031-1/+2
* net: remove special case for Kaspersky HTTPSagl@chromium.org2012-02-211-3/+0
* Pull out debug instrumentation.mattm@chromium.org2012-02-171-1/+0
* Add some instrumentation to track down a crash.eroman@chromium.org2012-02-141-0/+1
* Adds support for the credentials frame.rch@chromium.org2012-02-081-1/+2
* Revert: Revert "net: remove DNS certificate checking code."agl@chromium.org2011-12-151-3/+0
* Revert "net: remove DNS certificate checking code."agl@chromium.org2011-12-151-0/+3
* net: remove DNS certificate checking code.agl@chromium.org2011-12-151-3/+0
* net: split the SSL session cache between incognito and normal.agl@chromium.org2011-12-121-2/+5
* Reland: net: move pinning checks into the SSL socket.agl@chromium.org2011-12-121-2/+3
* Revert 113823 - net: move pinning checks into the SSL socket.ajwong@chromium.org2011-12-091-3/+2
* Migrate net/socket/socket.h, net/socket/stream_socket.h to base::Bind().ajwong@chromium.org2011-12-091-11/+2
* net: move pinning checks into the SSL socket.agl@chromium.org2011-12-091-2/+3
* Revert 113699 - base::Bind: Convert Socket::Write.jhawkins@chromium.org2011-12-091-5/+1
* base::Bind: Convert Socket::Write.jhawkins@chromium.org2011-12-081-1/+5
* base::Bind: Convert Socket::Read.jhawkins@chromium.org2011-12-071-1/+5
* base::Bind: Convert StreamSocket::Connect.jhawkins@chromium.org2011-12-061-4/+6
* Honor server requested origin bound client cert types.mattm@chromium.org2011-12-061-1/+1
* SSLClientSocketNSS::ClearSessionCache should initializewtc@chromium.org2011-12-061-2/+2
* Support EC certs in OriginBoundCertService and OriginBoundCertStore.mattm@chromium.org2011-12-061-2/+5
* Log server advertised protos and the selectedrtenneti@google.com2011-12-051-1/+4
* base::Bind: Convert SSLHostInfo::WaitForDataReady.jhawkins@chromium.org2011-12-031-1/+1