summaryrefslogtreecommitdiffstats
path: root/net/third_party
Commit message (Expand)AuthorAgeFilesLines
* Revert r242742. The Clang codegen bug has been fixed.wtc@chromium.org2014-02-274-23/+2
* net: don't always add TLS padding.agl@chromium.org2014-02-204-36/+2
* Make net_unittests_run work with component=shared_library.maruel@chromium.org2014-02-052-2/+28
* Add support for component=shared_library for base_unittests_run.maruel@chromium.org2014-01-221-0/+14
* Update net/third_party/nss to NSS 3.15.5 Beta 2.wtc@chromium.org2014-01-2130-868/+467
* Use NSSRWLock instead of PRRWLock in sslSessionID. This avoids the bugswtc@chromium.org2014-01-096-26/+268
* Update net/third_party/nss to NSS 3.15.4.wtc@chromium.org2014-01-0754-4506/+1180
* Hack for Mac 10.9 hang when the Keychain is modified with Chrome running.rsesek@chromium.org2013-12-304-2/+24
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-277-1/+165
* Revert 242219 "Defer TLS session caching until after certificate..."rsleevi@chromium.org2013-12-217-165/+1
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-217-1/+165
* Make net::CertDatabase and PKCS12InitSingleton singletons Leaky.mattm@chromium.org2013-12-201-1/+3
* Disable session ticket renewal.wtc@chromium.org2013-12-134-0/+29
* Revert 239921 "Revert 239759 "The comment in base64.h implies th..."vadimt@chromium.org2013-12-111-7/+3
* NSS: Make cert import helper functions take the slot as an argument.mattm@chromium.org2013-12-112-24/+15
* Revert 239759 "The comment in base64.h implies that base::Base64..."vadimt@chromium.org2013-12-111-3/+7
* The comment in base64.h implies that base::Base64Encode() can return false, butricea@chromium.org2013-12-101-7/+3
* net: use model NSS socket to save setting the cipher order every time.agl@chromium.org2013-12-072-28/+32
* net: implement TLS_FALLBACK_SCSV.agl@chromium.org2013-12-0711-3/+274
* Use SHA-1 in TLS 1.2 client auth if the server requests it.davidben@chromium.org2013-12-044-27/+196
* Fill the TLS padding extension with zero bytes instead of spaces.wtc@chromium.org2013-12-032-2/+2
* nss: fix order of parenthesis.agl@chromium.org2013-12-032-2/+2
* net: boost AES-GCM ciphers if the machine has AES-NI.agl@chromium.org2013-12-028-0/+170
* Add support for fetching Certificate Transparency SCTs over a TLS extensionekasper@google.com2013-11-281-0/+1
* net: fix PORT_Assert crash when renegotiating.agl@chromium.org2013-11-262-5/+3
* Certificate Transparency TLS extension patch for NSSekasper@google.com2013-11-2110-37/+631
* Update to the latest False Start code from NSS upstream.wtc@chromium.org2013-11-198-528/+791
* Support new ChannelID extension.agl@chromium.org2013-11-188-7/+233
* net: add padding extension to all handshakes.agl@chromium.org2013-11-134-2/+35
* net: don't add padding extension for SSLv3.agl@chromium.org2013-11-124-11/+11
* NSS: add `padding' extension when we might hit the F5 bug.agl@chromium.org2013-11-087-1/+233
* Include a fix for NSS bug 934016rsleevi@chromium.org2013-11-024-0/+27
* Update chacha20poly1305.patch for the changes made in r230713wtc@chromium.org2013-10-281-11/+11
* Update to the new definitions of CKM_NSS_CHACHA20_POLY1305 andwtc@chromium.org2013-10-241-11/+11
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-0911-91/+931
* net: don't send resumption ClientHello records with versions > 0x0301.agl@chromium.org2013-10-073-4/+43
* Change SSL_PeerCertificateChain to return a CERTCertList.wtc@chromium.org2013-10-015-32/+144
* NSS: don't advertise TLS 1.2-only ciphersuites in a TLS 1.1 ClientHello.agl@chromium.org2013-09-264-25/+213
* NSS: fix session cache lock initialisation.agl@chromium.org2013-09-207-99/+296
* net: add ChaCha20+Poly1305 support to libssl.agl@chromium.org2013-09-1711-4/+372
* The NSS client auth (as opposed to NSS_PLATFORM_CLIENT_AUTH) also needswtc@chromium.org2013-09-122-100/+154
* Fix some shared_library link_settings propagation issuesthakis@chromium.org2013-09-111-0/+7
* Prefer to generate SHA-1 signatures for TLS 1.2 client authentication ifwtc@chromium.org2013-09-064-27/+74
* On Windows, prefer to generate SHA-1 signatures for TLS 1.2 clientwtc@chromium.org2013-08-305-6/+262
* Make the AES-GCM cipher suites work in DTLS, by moving thewtc@chromium.org2013-08-217-264/+409
* Implement the AES GCM cipher suites for TLS.wtc@chromium.org2013-08-1513-230/+1925
* Fix a crash in SSL under memory pressurersleevi@chromium.org2013-08-124-1/+27
* NSS: move the first protocol to the end of the ALPN extension.agl@chromium.org2013-08-093-47/+96
* Reland http://crrev.com/209278rsleevi@chromium.org2013-08-076-86/+0
* NSS: rename ALPN extension to have _xtn suffix.agl@chromium.org2013-08-023-20/+20