summaryrefslogtreecommitdiffstats
path: root/net/socket
Commit message (Expand)AuthorAgeFilesLines
...
* Certificate Transparency: Use SCTs obtained from tls extension.eranm@google.com2013-12-061-1/+1
* net: Implement new SSL session cache for OpenSSL sockets.digit@chromium.org2013-12-034-137/+971
* Don't HANDLE_EINTR(close). Either IGNORE_EINTR(close) or just close.mark@chromium.org2013-12-034-6/+6
* net: enable ChaCha20 based cipher suites.agl@chromium.org2013-12-021-5/+0
* Move some more file utils to the base namespace.brettw@chromium.org2013-12-021-1/+1
* net: boost AES-GCM ciphers if the machine has AES-NI.agl@chromium.org2013-12-023-1/+126
* Certificate Transparency: Logging SCTs to the NetLog.eranm@google.com2013-11-291-1/+2
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-292-1/+35
* Certificate Transparency: Threading the CT verifier into the SSL client socket.eranm@google.com2013-11-288-4/+58
* Add support for fetching Certificate Transparency SCTs over a TLS extensionekasper@google.com2013-11-284-1/+150
* Allow close_notify during the SSL handshake to trigger TLS fallback on Androidmckev@amazon.com2013-11-281-0/+3
* Handle an aborted connection before accept is called.wtc@chromium.org2013-11-271-1/+15
* Close accept_event_ only after stopping accept_watcher_.wtc@chromium.org2013-11-221-5/+5
* net: Add missing Autolock call to openssl SSLSessionCache::Flush()digit@chromium.org2013-11-211-0/+1
* [windows] Close the socket event only after stopping its ObjectWatcher.kkania@chromium.org2013-11-211-1/+1
* Certificate Transparency: Address review comments from issue 65863002.eranm@google.com2013-11-201-9/+1
* Update to the latest False Start code from NSS upstream.wtc@chromium.org2013-11-191-72/+98
* Added three histograms to track the following TCP connection latencyrtenneti@chromium.org2013-11-182-22/+46
* Only use ECDHE when requiring forward secrecy.agl@chromium.org2013-11-151-3/+2
* [Net] Assert that URLRequests with LOAD_IGNORE_LIMITS have MAXIMUM_PRIORITYakalin@chromium.org2013-11-142-277/+181
* NSS: {EC,RSA}PrivateKey shouldn't call crypto::GetPublicNSSKeySlot or GetPriv...mattm@chromium.org2013-11-131-0/+2
* Fix WeakPtrFactory member order in net/socket/.wez@chromium.org2013-11-107-19/+55
* Style: Clean-up SSLClientSocketOpenSSL to match header declarationrsleevi@chromium.org2013-11-091-589/+584
* Stop leaking a CERTCertificate* during SSL renegotiationrsleevi@chromium.org2013-11-081-1/+1
* Move internal SSLClientSocketOpenSSL methods to be privatersleevi@chromium.org2013-11-082-29/+34
* net: disable ChaCha20 based cipher suites.agl@chromium.org2013-11-071-0/+5
* Revert 232802 "[Net] Assert that URLRequests with LOAD_IGNORE_LI..."scherkus@chromium.org2013-11-042-181/+277
* [Net] Assert that URLRequests with LOAD_IGNORE_LIMITS have MAXIMUM_PRIORITYakalin@chromium.org2013-11-042-277/+181
* net: require forward security for Chromoting SSL/TLS server connections.agl@chromium.org2013-10-311-0/+18
* The SSLServerSocket constructor should use the supplied SSLConfig as is.wtc@chromium.org2013-10-312-6/+0
* chromeos: Reload certificates when CA certificate is addedspang@chromium.org2013-10-313-7/+7
* [SPDY] Remove most code dealing with credential framesakalin@chromium.org2013-10-291-1/+3
* [Net] Make ClientSocketPoolBaseHelper::Group use a timerakalin@chromium.org2013-10-292-37/+37
* Enable TLS Channel ID for the openssl implementation of SSLClientSocket.qsr@chromium.org2013-10-256-42/+258
* [Net] Make ClientSocketPoolBaseHelper::Group use PriorityQueueakalin@chromium.org2013-10-242-51/+40
* [GCM] Unrevert initial GCM patchzea@chromium.org2013-10-222-5/+5
* Do not allow the server certificate to change in a renegotiation.wtc@chromium.org2013-10-192-0/+17
* Revert r229533 "[GCM] Initial work to set up directory structure and introduc...pfeldman@chromium.org2013-10-192-5/+5
* [GCM] Initial work to set up directory structure and introduce socket integra...zea@chromium.org2013-10-192-5/+5
* [Net] Separate out NUM_PRIORITIES from RequestPriority enumakalin@chromium.org2013-10-193-4/+4
* [Net] Log RequestPriority instances as strings instead of integersakalin@chromium.org2013-10-161-2/+3
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-091-1/+2
* Enable IPv4 address mapped to IPv6.halyavin@google.com2013-10-071-1/+14
* Added histograms to see if the interval between consecutive connects hasrtenneti@chromium.org2013-10-072-1/+46
* Revert 227233 "Added histograms to see if the interval between c..."mtomasz@chromium.org2013-10-072-45/+1
* Added histograms to see if the interval between consecutive connects hasrtenneti@chromium.org2013-10-062-1/+45
* [SPDY] Do not advertise SPDY/2 by defaultakalin@chromium.org2013-10-063-5/+6
* [SPDY] Remove references to obsolete SPDY versions SPDY/1 and SPDY/2.1akalin@chromium.org2013-10-042-17/+8
* Fix bug 170595rpaquay@chromium.org2013-10-031-0/+8
* Change SSL_PeerCertificateChain to return a CERTCertList.wtc@chromium.org2013-10-011-11/+7