summaryrefslogtreecommitdiffstats
path: root/net/third_party
Commit message (Expand)AuthorAgeFilesLines
* Change the default of the SSL_ENABLE_OB_CERTS option to PR_FALSE.wtc@chromium.org2011-10-132-2/+2
* net: disable 1/n-1 record splitting when False Start is disabled.agl@chromium.org2011-10-052-13/+15
* Fix libssl to build properly with use_system_zlib==0.bradchen@google.com2011-10-041-1/+3
* net: update NSS patches.agl@chromium.org2011-10-0316-341/+322
* Update cbcrandomiv.patch to the currently proposed patch (v10) for thewtc@chromium.org2011-09-302-106/+286
* Fallback from platform client auth to NSS client auth.mattm@chromium.org2011-09-275-225/+247
* Add a license header to net/third_party/nss/patches/applypatches.sh.wtc@chromium.org2011-09-271-0/+4
* Introduce a typedef for users of the SSL cert trust bits. This allows lots of...pkasting@chromium.org2011-09-202-8/+8
* Allow SSL_HandshakeNegotiatedExtension to be called before the handshakewtc@chromium.org2011-08-254-8/+53
* Updated ob_cert extension number to match with the change in opensslmdietz@google.com2011-08-252-2/+2
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-244-896/+0
* Fix revert 98028: add file that drover --revert forgot to adddpolukhin@chromium.org2011-08-244-0/+896
* Always transfer ownership of inputs to SSL_RestartHandshakeAfterCertReq,wtc@chromium.org2011-08-243-68/+132
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-234-896/+0
* Send only one byte of data in the first CBC encrypted aplication datawtc@chromium.org2011-08-184-1/+97
* Add an NSS function to restart the handshake after a client certificatewtc@chromium.org2011-08-177-19/+202
* Rename NET_API to NET_EXPORT, and rename NET_TEST to NET_EXPORT_PRIVATE.darin@chromium.org2011-08-121-2/+2
* Revert "net: Precede each CBC encrypted application data record with an empty...agl@chromium.org2011-08-094-106/+2
* SSL_ForceHandshake should send the saved write data in the SSL socket.wtc@chromium.org2011-08-054-2/+74
* For PKCS#12 imports, only mark key as unextractable if the PKCS#12 file inclu...gauravsh@chromium.org2011-08-041-11/+28
* net: fix caching of peer's cert chain in session objects.agl@chromium.org2011-08-022-3/+12
* Change a VLOG(1) message to LOG(ERROR) because it is truly an errorwtc@chromium.org2011-07-301-1/+1
* net: allow SSL secrets to be exported sooner.agl@chromium.org2011-07-264-48/+56
* net: add NSS support for RFC 5705agl@chromium.org2011-07-227-22/+361
* net: update NSS patches to reflect recent changes.agl@chromium.org2011-07-226-30/+573
* Added client hello handler for the TLS origin bound cert extensionrkn@chromium.org2011-07-221-0/+1
* Merge upstream NSS changes from the cached info extension.rkn@chromium.org2011-07-196-11/+220
* Add client-side support for the origin bound certificate TLS extension.rkn@chromium.org2011-07-145-4/+103
* Linux Cert manager: improve PKCS #12 import error messages.mattm@chromium.org2011-07-131-7/+24
* net: expose some more classes as APIevan@chromium.org2011-07-111-1/+3
* Remove the comments setting emands and vim tab width and expansion variables.tony@chromium.org2011-07-112-12/+0
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-07-074-2/+106
* net: measure the latency difference of resume handshakes.agl@chromium.org2011-06-295-0/+82
* For PKCS12 private keys imported into a hardware backed token, mark them as u...gauravsh@chromium.org2011-06-292-37/+75
* Use crnss.dll and crnspr.dll with the component build.rvargas@google.com2011-06-281-0/+1
* Revert "net: Precede each CBC encrypted application data record with an empty...agl@chromium.org2011-06-274-106/+2
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-06-274-2/+106
* net: mention upstream Mozilla bug for cachedinfo.agl@chromium.org2011-06-241-0/+1
* net: include patch for cached info and fix whitespace.agl@chromium.org2011-06-248-103/+775
* Added client-side support for the TLS cached inforkn@chromium.org2011-06-229-66/+416
* net: rebase NSS patches. No code change.agl@chromium.org2011-06-219-659/+660
* Remove rendundant use of product_name in gyp files.evan@chromium.org2011-06-091-1/+0
* Remove the TLS Snap Start code from NSS.wtc@chromium.org2011-06-0914-3769/+146
* Final gyp patch to make use of the new cross-platform POSIX defines toolkit_u...tony@chromium.org2011-05-231-2/+2
* Globally replace <(library) with static_libraryevan@chromium.org2011-05-191-1/+1
* Increase warning level to 4 on Visual Studiomaruel@chromium.org2011-05-031-1/+2
* Move crypto files out of base, to a top level directory.rvargas@google.com2011-04-143-11/+10
* This change loads opencryptoki and uses the TPM for keygen tags.gspencer@chromium.org2011-04-071-2/+2
* Move some files from base to base/memory.levin@chromium.org2011-03-282-2/+2
* Remove UDT.mbelshe@chromium.org2011-03-23101-19652/+0