summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_client_socket_openssl.cc
Commit message (Expand)AuthorAgeFilesLines
* Use X509_STORE_CTX::untrusted, not X509_STORE_CTX::chain in CertVerifyCallback.davidben@chromium.org2014-05-271-1/+1
* Populate cert_key_types on OpenSSL.davidben@chromium.org2014-05-201-4/+15
* Implement SSL server socket over OpenSSL.byungchul@chromium.org2014-05-171-163/+17
* Enable False Start for OpenSSL.davidben@chromium.org2014-04-231-0/+3
* Remove OpenSSL #ifdefs.davidben@chromium.org2014-04-181-16/+0
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-091-2/+2
* Revert 261966 "make SetReceiveBufferSize and SetSendBufferSize r..."jschuh@chromium.org2014-04-051-2/+2
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-051-2/+2
* Introduce USE_OPENSSL_CERTS for certificate handling.haavardm@opera.com2014-03-281-4/+10
* Use sockets with unread data if they've never been used before.davidben@chromium.org2014-03-261-5/+10
* Do not assume OSCertHandle is OpenSSL's X509 structure.haavardm@opera.com2014-03-201-21/+26
* Make OpenSSL UpdateServerCert() OS independent.haavardm@opera.com2014-03-171-22/+143
* OpenSSL: don't allow the server certificate to change during renegotiation.agl@chromium.org2014-02-281-8/+31
* When clearing the session cache, also flush OpenSSLClientKeyStore.yfriedman@chromium.org2014-02-171-0/+1
* Close the correct end of the BIO pair on transport send failures in openssl.davidben@chromium.org2014-02-061-5/+24
* Add ERR_SSL_UNRECOGNIZED_NAME_ALERT for the TLS unrecognized_name alert.wtc@chromium.org2014-02-051-0/+2
* Handle crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo failure.wtc@chromium.org2014-01-251-0/+2
* Add BIO_write return value to crash dumps.davidben@chromium.org2014-01-231-0/+4
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-271-0/+1
* Change SSLCertRequestInfo.host_and_port from string to HostPortPair.mattm@chromium.org2013-12-171-1/+1
* net: Implement new SSL session cache for OpenSSL sockets.digit@chromium.org2013-12-031-137/+31
* Allow close_notify during the SSL handshake to trigger TLS fallback on Androidmckev@amazon.com2013-11-281-0/+3
* net: Add missing Autolock call to openssl SSLSessionCache::Flush()digit@chromium.org2013-11-211-0/+1
* Style: Clean-up SSLClientSocketOpenSSL to match header declarationrsleevi@chromium.org2013-11-091-589/+584
* Move internal SSLClientSocketOpenSSL methods to be privatersleevi@chromium.org2013-11-081-17/+18
* Enable TLS Channel ID for the openssl implementation of SSLClientSocket.qsr@chromium.org2013-10-251-2/+69
* Disable the HMAC-SHA256 and AES_256_GCM cipher suites forwtc@chromium.org2013-08-201-3/+5
* [net] Use scoped_ptr<> consistently in ClientSocketFactory and related codeakalin@chromium.org2013-08-151-3/+3
* Add a CertVerifier flag to enable hard fail for local (non-public) trust anch...rsleevi@chromium.org2013-07-301-0/+2
* Disable SRP, HMAC-SHA384, and ECDH (but not ECDHE) cipher suites, towtc@chromium.org2013-06-201-3/+6
* Report the new error ERR_SSL_DECRYPT_ERROR_ALERT when we receive thewtc@chromium.org2013-06-141-1/+2
* Update Android to use scoped_refptr<T>::get() rather than implicit "operator T*"rsleevi@chromium.org2013-06-131-34/+35
* Don't call SSL read/write callbacks after an SSL socket is deletedrsleevi@chromium.org2013-05-131-0/+10
* SSLClientSocketNSS should expect and properly handle when thersleevi@chromium.org2013-05-091-16/+19
* net: move openssl_client_key_store from net/base to net/sslphajdan.jr@chromium.org2013-04-021-1/+1
* Remove experimental code to pick the "warmest" socketmmenke@chromium.org2013-03-301-16/+0
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-3/+3
* net: split net/ssl out of net/basephajdan.jr@chromium.org2013-03-141-4/+4
* Wire up SSL client authentication for OpenSSL/Android through the net/ stackdigit@chromium.org2013-03-021-6/+9
* Report SSL session resumption state for OpenSSLrsleevi@chromium.org2013-03-021-0/+3
* net: remove compression reporting util functions.agl@chromium.org2013-02-201-2/+0
* When reading from an SSL socket, attempt to fully fill the caller's bufferrsleevi@chromium.org2013-02-161-9/+63
* Move client certificates retrieval logic out of the SSL sockets.ppi@chromium.org2013-02-071-2/+0
* SSLClientSocket::IsConnected should care for internal buffers (OpenSSL)toyoshim@chromium.org2013-02-041-10/+25
* Add server certificate request parameters to be stored in SSLCertRequestInfo.ppi@chromium.org2013-01-091-0/+15
* On OpenSSL/Android, only schedule transport socket reads when the transport s...rsleevi@chromium.org2012-12-191-0/+18
* Do not artificially limit SSLClientSocketOpenSSL to reading 4K at a time.rsleevi@chromium.org2012-12-191-4/+0
* DEPS roll openssl to 1.0.1cdigit@chromium.org2012-12-101-0/+1
* Prepare for OpenSSL 1.0.1c update.digit@chromium.org2012-09-071-1/+4
* Rename X509Certificate::VerifyFlags to CertVerifier::VerifyFlagsrsleevi@chromium.org2012-08-231-3/+3