summaryrefslogtreecommitdiffstats
path: root/net/ssl
Commit message (Expand)AuthorAgeFilesLines
* Remove unnecessary ifdefs for maximum SSL version.davidben2014-10-011-16/+1
* Roll BoringSSL.davidben2014-10-011-3/+3
* Remove the "snionly" concept from the HSTS preload.Adam Langley2014-09-252-13/+0
* Map SSL errors to SSL_PROTOCOL_ERROR, others to FAILED.davidben2014-09-251-3/+3
* Remove implicit conversions from scoped_refptr to T* in netdcheng2014-09-151-9/+9
* Change base/file_utils.h includes to base/files/file_utils.h in net/thestig2014-09-041-1/+1
* Remove implicit conversions from scoped_refptr to T* in net/dcheng2014-08-271-3/+3
* Fix overzealous CHECK in custom EC_KEYs.davidben2014-08-271-1/+1
* Include better OpenSSL error information in NetLog.davidben2014-08-272-6/+82
* Roll BoringSSL.davidben@chromium.org2014-08-221-0/+1
* Fix mapping of weak DH key and remove unused error codes.haavardm@opera.com2014-08-211-12/+1
* Remove manual CRYPTO_add calls.davidben@chromium.org2014-08-142-29/+18
* Test NSSCertDatabaseChromeOS in the presence of the system slot.pneubeck@chromium.org2014-08-021-49/+6
* Enable system NSS key slot.pneubeck@chromium.org2014-08-023-42/+193
* Implement TLS client auth in the OS X OpenSSL port.davidben@chromium.org2014-07-298-25/+768
* Extract ScopedTestNSSDB from nss_util.pneubeck@chromium.org2014-07-281-0/+1
* Rename ServerBoundCert => ChannelID to reflect the current namerch@chromium.org2014-07-2511-1486/+1482
* Remove NSSCertDatabase from ClientCertStoreChromeOS unittest.pneubeck@chromium.org2014-07-183-121/+175
* Add GetSystemNSSKeySlot, merge GetPrivateNSSKeySlot/GetPublicNSSKeySlot to Ge...mattm@chromium.org2014-07-131-21/+0
* Switch OpenSSLClientKeyStore::ScopedEVP_PKEY to crypto::ScopedEVP_PKEY.davidben@chromium.org2014-07-113-27/+17
* Fix SSLClientSocketOpenSSL error-handling for Channel ID.davidben@chromium.org2014-06-211-3/+4
* Fail the SPDY transaction if it does not meet TLS base requirements.willchan@chromium.org2014-05-235-0/+134
* net: yet more pinning debugging.agl@chromium.org2014-04-092-0/+7
* Update QuicClientSession::GetSSLInfo to report QUIC as the protocolwtc@chromium.org2014-04-042-0/+5
* Introduce USE_OPENSSL_CERTS for certificate handling.haavardm@opera.com2014-03-281-8/+0
* Move SSLConfig class from ssl_config_service.h to ssl_config.hsergeyu@chromium.org2014-03-244-216/+226
* Remove --enable-unrestricted-ssl3-fallback.pkasting@chromium.org2014-03-223-16/+1
* When clearing the session cache, also flush OpenSSLClientKeyStore.yfriedman@chromium.org2014-02-171-1/+1
* NSS Cros multiprofile: trust roots added by a profile shouldn't apply to othe...mattm@chromium.org2014-02-081-4/+0
* Flag TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 as using ECDHE_ECDSA key exchangersleevi@chromium.org2014-01-211-1/+1
* Remove vestigal traces of the TLS Cached Info Extension supportrsleevi@chromium.org2014-01-113-27/+0
* Cleanup: Correct the names of the struct fields.eranm@google.com2014-01-082-3/+3
* Certificate Transparency: Export a missing symbol.eranm@google.com2014-01-071-5/+3
* Change SSLCertRequestInfo.host_and_port from string to HostPortPair.mattm@chromium.org2013-12-177-20/+21
* Add ClientCertStoreChromeOS which only returns the certs for a given user.mattm@chromium.org2013-12-176-42/+421
* Update keygen to use correct NSS slot on ChromeOS multiprofile.mattm@chromium.org2013-12-161-1/+1
* Split net::ClientCertStoreImpl into actual platform-specific classes.mattm@chromium.org2013-12-1112-274/+451
* SignedCertificateTimestamp storing & serialization code.alcutter@google.com2013-11-294-1/+66
* Add support for fetching Certificate Transparency SCTs over a TLS extensionekasper@google.com2013-11-282-0/+4
* NSS: Handle unfriendly tokens in client auth.mattm@chromium.org2013-11-274-12/+77
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+15
* mac: Prepare most test code for -Wunused-functions too.thakis@chromium.org2013-11-081-4/+0
* Avoid creating keys and self-signed certs separately.bemasc@chromium.org2013-11-011-9/+7
* net: require forward security for Chromoting SSL/TLS server connections.agl@chromium.org2013-10-312-0/+9
* Get ClientCertStore through ResourceContext.mattm@chromium.org2013-10-305-39/+61
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-091-1/+1
* Fix some WeakPtrFactory members that aren't lastdmichael@chromium.org2013-10-082-3/+4
* Clean up a few unused globals.thakis@chromium.org2013-09-251-1/+0
* net: disable TLS False Start.agl@chromium.org2013-09-241-1/+1
* net: add ChaCha20+Poly1305 support to libssl.agl@chromium.org2013-09-171-2/+5