summaryrefslogtreecommitdiffstats
path: root/net/third_party
Commit message (Expand)AuthorAgeFilesLines
* net: expose some more classes as APIevan@chromium.org2011-07-111-1/+3
* Remove the comments setting emands and vim tab width and expansion variables.tony@chromium.org2011-07-112-12/+0
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-07-074-2/+106
* net: measure the latency difference of resume handshakes.agl@chromium.org2011-06-295-0/+82
* For PKCS12 private keys imported into a hardware backed token, mark them as u...gauravsh@chromium.org2011-06-292-37/+75
* Use crnss.dll and crnspr.dll with the component build.rvargas@google.com2011-06-281-0/+1
* Revert "net: Precede each CBC encrypted application data record with an empty...agl@chromium.org2011-06-274-106/+2
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-06-274-2/+106
* net: mention upstream Mozilla bug for cachedinfo.agl@chromium.org2011-06-241-0/+1
* net: include patch for cached info and fix whitespace.agl@chromium.org2011-06-248-103/+775
* Added client-side support for the TLS cached inforkn@chromium.org2011-06-229-66/+416
* net: rebase NSS patches. No code change.agl@chromium.org2011-06-219-659/+660
* Remove rendundant use of product_name in gyp files.evan@chromium.org2011-06-091-1/+0
* Remove the TLS Snap Start code from NSS.wtc@chromium.org2011-06-0914-3769/+146
* Final gyp patch to make use of the new cross-platform POSIX defines toolkit_u...tony@chromium.org2011-05-231-2/+2
* Globally replace <(library) with static_libraryevan@chromium.org2011-05-191-1/+1
* Increase warning level to 4 on Visual Studiomaruel@chromium.org2011-05-031-1/+2
* Move crypto files out of base, to a top level directory.rvargas@google.com2011-04-143-11/+10
* This change loads opencryptoki and uses the TPM for keygen tags.gspencer@chromium.org2011-04-071-2/+2
* Move some files from base to base/memory.levin@chromium.org2011-03-282-2/+2
* Remove UDT.mbelshe@chromium.org2011-03-23101-19652/+0
* Pure pedantry: Replace all ".size() == 0" with ".empty()".erg@google.com2011-03-021-1/+1
* UDT: UDP Data Transfer Protocolmbelshe@chromium.org2011-02-19101-0/+19652
* Update to NSS 3.12.9. falsestart.patch, falsestart2.patch, andwtc@chromium.org2011-02-1816-593/+21
* Update the NSS patches. Add snapstart2.patch and peercertchain.patch.wtc@chromium.org2011-02-176-32/+243
* Add the NSS patch for SSL client auth with native crypto APIs on Macwtc@chromium.org2011-02-163-99/+708
* Remove whitespace at the end of lines.wtc@chromium.org2011-02-161-4/+4
* Remove the unused PlatformAuthInfo structure definition.wtc@chromium.org2011-02-161-13/+0
* The current implementation of client authentication for Windows and Mac match...rsleevi@chromium.org2011-02-125-214/+1
* Do not pass CRYPT_NOHASHOID to CryptSignHash with CALG_SSL3_SHAMD5.rsleevi@chromium.org2011-02-091-2/+2
* When performing SSL client authentication on Windows via NSS, change the retu...rsleevi@chromium.org2011-02-053-20/+28
* Return more specific error messages when performing a SSL client auth handsha...rsleevi@chromium.org2011-02-051-15/+21
* NSS: PKCS 11 password prompt.mattm@chromium.org2011-01-134-35/+12
* Make members of Singleton<T> private and only visible to the singleton type. ...satish@chromium.org2010-12-141-2/+5
* Revert 68932 - Make members of Singleton<T> private and only visible to the s...satish@chromium.org2010-12-111-5/+2
* Make members of Singleton<T> private and only visible to the singleton type. ...satish@chromium.org2010-12-111-2/+5
* When performing a SSL renegotiation handshake, do not send Certificate/Certif...rsleevi@chromium.org2010-12-103-31/+134
* nss: add support for OCSP stapling.agl@chromium.org2010-11-2211-1/+778
* Clean-up style issues in net:: related to X.509 data-types, eliminating unnec...rsleevi@chromium.org2010-11-221-0/+1
* ssl3_PlatformSignHashes should set buf->len to thewtc@chromium.org2010-11-121-3/+3
* NSS: always record the ServerHello data.agl@chromium.org2010-11-121-14/+14
* Fix inconsistent line ending style. Set svn:eol-style to LF.wtc@chromium.org2010-11-041-2/+2
* Support for using OS-native certificates for SSL clientwtc@chromium.org2010-11-0410-1/+834
* net: Make Snap Start check cert verification and add metricsagl@chromium.org2010-11-031-0/+2
* Don't resend payload after Snap Start misprediction.agl@chromium.org2010-11-032-18/+1
* DOMUI Cert Manager: merge email certs into other certs tab.mattm@chromium.org2010-11-031-8/+1
* net: add SSL_PeerCertificatesChain function to NSS.agl@chromium.org2010-10-253-0/+48
* Add certificates to the ss->ssl3.peerCertChain linked listwtc@chromium.org2010-10-213-25/+78
* net: add patch file for Snap Start support in NSSagl@chromium.org2010-10-202-0/+2135
* Convert LOG(INFO) to VLOG(1) - net/.pkasting@chromium.org2010-10-163-9/+9