summaryrefslogtreecommitdiffstats
path: root/net/ssl
Commit message (Expand)AuthorAgeFilesLines
* Fail the SPDY transaction if it does not meet TLS base requirements.willchan@chromium.org2014-05-235-0/+134
* net: yet more pinning debugging.agl@chromium.org2014-04-092-0/+7
* Update QuicClientSession::GetSSLInfo to report QUIC as the protocolwtc@chromium.org2014-04-042-0/+5
* Introduce USE_OPENSSL_CERTS for certificate handling.haavardm@opera.com2014-03-281-8/+0
* Move SSLConfig class from ssl_config_service.h to ssl_config.hsergeyu@chromium.org2014-03-244-216/+226
* Remove --enable-unrestricted-ssl3-fallback.pkasting@chromium.org2014-03-223-16/+1
* When clearing the session cache, also flush OpenSSLClientKeyStore.yfriedman@chromium.org2014-02-171-1/+1
* NSS Cros multiprofile: trust roots added by a profile shouldn't apply to othe...mattm@chromium.org2014-02-081-4/+0
* Flag TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 as using ECDHE_ECDSA key exchangersleevi@chromium.org2014-01-211-1/+1
* Remove vestigal traces of the TLS Cached Info Extension supportrsleevi@chromium.org2014-01-113-27/+0
* Cleanup: Correct the names of the struct fields.eranm@google.com2014-01-082-3/+3
* Certificate Transparency: Export a missing symbol.eranm@google.com2014-01-071-5/+3
* Change SSLCertRequestInfo.host_and_port from string to HostPortPair.mattm@chromium.org2013-12-177-20/+21
* Add ClientCertStoreChromeOS which only returns the certs for a given user.mattm@chromium.org2013-12-176-42/+421
* Update keygen to use correct NSS slot on ChromeOS multiprofile.mattm@chromium.org2013-12-161-1/+1
* Split net::ClientCertStoreImpl into actual platform-specific classes.mattm@chromium.org2013-12-1112-274/+451
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-294-1/+66
* Add support for fetching Certificate Transparency SCTs over a TLS extensionekasper@google.com2013-11-282-0/+4
* NSS: Handle unfriendly tokens in client auth.mattm@chromium.org2013-11-274-12/+77
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+15
* mac: Prepare most test code for -Wunused-functions too.thakis@chromium.org2013-11-081-4/+0
* Avoid creating keys and self-signed certs separately.bemasc@chromium.org2013-11-011-9/+7
* net: require forward security for Chromoting SSL/TLS server connections.agl@chromium.org2013-10-312-0/+9
* Get ClientCertStore through ResourceContext.mattm@chromium.org2013-10-305-39/+61
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-091-1/+1
* Fix some WeakPtrFactory members that aren't lastdmichael@chromium.org2013-10-082-3/+4
* Clean up a few unused globals.thakis@chromium.org2013-09-251-1/+0
* net: disable TLS False Start.agl@chromium.org2013-09-241-1/+1
* net: add ChaCha20+Poly1305 support to libssl.agl@chromium.org2013-09-171-2/+5
* Revert 219882 "Turn off TLS 1.2 to work around the TLS 1.2 clien..."wtc@chromium.org2013-08-291-2/+4
* Turn off TLS 1.2 to work around the TLS 1.2 client authenticationwtc@chromium.org2013-08-281-4/+2
* Stop using SequencedWorkerPool in tests in net/rsleevi@chromium.org2013-08-221-34/+39
* Add a method to get, but not create, the domain bound cert for a given domain.juanlang@google.com2013-08-143-105/+433
* Fix leak of sequenced worker pool in unit tests when service_ is replaced.juanlang@google.com2013-08-121-1/+7
* Properly handle asynchronous lookups from the ServerBoundCertStore.juanlang@google.com2013-08-083-15/+22
* Remove requested types from the server bound cert service: it onlyjuanlang@google.com2013-08-078-458/+309
* Add a CertVerifier flag to enable hard fail for local (non-public) trust anch...rsleevi@chromium.org2013-07-302-3/+15
* Use a direct include of the message_loop header in net/, part 3.avi@chromium.org2013-07-183-3/+3
* net: Migrate from googleurl/ includes to url/ ones.tfarina@chromium.org2013-07-121-1/+1
* Use a direct include of time headers in net/, part 3.avi@chromium.org2013-06-283-3/+3
* mac: Replace base::mac::ScopedCFTypeRef with base::ScopedCFTypeRef.thakis@chromium.org2013-06-241-1/+1
* Revert 207759 "Disable TLS 1.2 if USE_OPENSSL is defined (such a..."wtc@chromium.org2013-06-241-3/+3
* Revert "Revert 207759 "Disable TLS 1.2 if USE_OPENSSL is defined (such a...""...senorblanco@chromium.org2013-06-231-3/+3
* Revert 207759 "Disable TLS 1.2 if USE_OPENSSL is defined (such a..."wtc@chromium.org2013-06-221-3/+3
* Disable TLS 1.2 if USE_OPENSSL is defined (such as on Android) towtc@chromium.org2013-06-211-3/+3
* Update OS X to use scoped_refptr<T>::get() rather than implicit "operator T*"rsleevi@chromium.org2013-06-132-15/+14
* Update Android to use scoped_refptr<T>::get() rather than implicit "operator T*"rsleevi@chromium.org2013-06-131-5/+5
* net: add a new message for AEAD ciphers.agl@chromium.org2013-06-123-63/+80
* Use a direct include of strings headers in net/ocsp/, net/proxy/, net/quic/, ...avi@chromium.org2013-06-111-2/+2
* Update includes of message_loop_proxy.brettw@chromium.org2013-06-101-1/+1