Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(289)

Side by Side Diff: net/http/transport_security_state_static.h

Issue 22865046: net: add DigiCert to Twitter pins. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase patch. Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/http/transport_security_state_static.certs » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file is automatically generated by transport_security_state_static_gener ate.go 5 // This file is automatically generated by transport_security_state_static_gener ate.go
6 6
7 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ 7 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_
8 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ 8 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_
9 9
10 // These are SubjectPublicKeyInfo hashes for public key pinning. The 10 // These are SubjectPublicKeyInfo hashes for public key pinning. The
(...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after
75 "\x40\xd6\x22\x08\xef\x22\xeb\xd1\x15\x1c"; 75 "\x40\xd6\x22\x08\xef\x22\xeb\xd1\x15\x1c";
76 76
77 static const char kSPKIHash_RapidSSL[] = 77 static const char kSPKIHash_RapidSSL[] =
78 "\xa3\x93\x99\xc4\x04\xc3\xb2\x09\xb0\x81" 78 "\xa3\x93\x99\xc4\x04\xc3\xb2\x09\xb0\x81"
79 "\xc2\x1f\x21\x62\x27\x78\xc2\x74\x8e\x4c"; 79 "\xc2\x1f\x21\x62\x27\x78\xc2\x74\x8e\x4c";
80 80
81 static const char kSPKIHash_DigiCertEVRoot[] = 81 static const char kSPKIHash_DigiCertEVRoot[] =
82 "\x83\x31\x7e\x62\x85\x42\x53\xd6\xd7\x78" 82 "\x83\x31\x7e\x62\x85\x42\x53\xd6\xd7\x78"
83 "\x31\x90\xec\x91\x90\x56\xe9\x91\xb9\xe3"; 83 "\x31\x90\xec\x91\x90\x56\xe9\x91\xb9\xe3";
84 84
85 static const char kSPKIHash_DigiCertAssuredIDRoot[] =
86 "\x68\x33\x0e\x61\x35\x85\x21\x59\x29\x83"
87 "\xa3\xc8\xd2\xd2\xe1\x40\x6e\x7a\xb3\xc1";
88
89 static const char kSPKIHash_DigiCertGlobalRoot[] =
90 "\xd5\x2e\x13\xc1\xab\xe3\x49\xda\xe8\xb4"
91 "\x95\x94\xef\x7c\x38\x43\x60\x64\x66\xbd";
92
85 static const char kSPKIHash_Tor1[] = 93 static const char kSPKIHash_Tor1[] =
86 "\x8e\xe3\x71\x49\x3b\xfd\x50\x03\x66\xa4" 94 "\x8e\xe3\x71\x49\x3b\xfd\x50\x03\x66\xa4"
87 "\x2f\x64\x17\x91\x8a\xa6\x65\x8d\xc7\x76"; 95 "\x2f\x64\x17\x91\x8a\xa6\x65\x8d\xc7\x76";
88 96
89 static const char kSPKIHash_Tor2[] = 97 static const char kSPKIHash_Tor2[] =
90 "\x96\x26\xb8\xde\x53\xe8\x97\x34\x8f\x54" 98 "\x96\x26\xb8\xde\x53\xe8\x97\x34\x8f\x54"
91 "\x8a\xb7\xe0\x3c\x39\xee\xe6\x1c\x2c\x3f"; 99 "\x8a\xb7\xe0\x3c\x39\xee\xe6\x1c\x2c\x3f";
92 100
93 static const char kSPKIHash_Tor3[] = 101 static const char kSPKIHash_Tor3[] =
94 "\xaf\x31\x32\x40\x82\x8e\x87\xbe\xe3\xf3" 102 "\xaf\x31\x32\x40\x82\x8e\x87\xbe\xe3\xf3"
(...skipping 206 matching lines...) Expand 10 before | Expand all | Expand 10 after
301 kSPKIHash_VeriSignClass2_G2, 309 kSPKIHash_VeriSignClass2_G2,
302 kSPKIHash_VeriSignClass3_G5, 310 kSPKIHash_VeriSignClass3_G5,
303 kSPKIHash_VeriSignUniversal, 311 kSPKIHash_VeriSignUniversal,
304 kSPKIHash_GeoTrustGlobal, 312 kSPKIHash_GeoTrustGlobal,
305 kSPKIHash_GeoTrustGlobal2, 313 kSPKIHash_GeoTrustGlobal2,
306 kSPKIHash_GeoTrustUniversal, 314 kSPKIHash_GeoTrustUniversal,
307 kSPKIHash_GeoTrustUniversal2, 315 kSPKIHash_GeoTrustUniversal2,
308 kSPKIHash_GeoTrustPrimary, 316 kSPKIHash_GeoTrustPrimary,
309 kSPKIHash_GeoTrustPrimary_G2, 317 kSPKIHash_GeoTrustPrimary_G2,
310 kSPKIHash_GeoTrustPrimary_G3, 318 kSPKIHash_GeoTrustPrimary_G3,
319 kSPKIHash_DigiCertGlobalRoot,
320 kSPKIHash_DigiCertEVRoot,
321 kSPKIHash_DigiCertAssuredIDRoot,
311 kSPKIHash_Twitter1, 322 kSPKIHash_Twitter1,
312 NULL, 323 NULL,
313 }; 324 };
314 #define kTwitterComPins { \ 325 #define kTwitterComPins { \
315 kTwitterComAcceptableCerts, \ 326 kTwitterComAcceptableCerts, \
316 kNoRejectedPublicKeys, \ 327 kNoRejectedPublicKeys, \
317 } 328 }
318 329
319 static const char* const kTwitterCDNAcceptableCerts[] = { 330 static const char* const kTwitterCDNAcceptableCerts[] = {
320 kSPKIHash_VeriSignClass1, 331 kSPKIHash_VeriSignClass1,
321 kSPKIHash_VeriSignClass3, 332 kSPKIHash_VeriSignClass3,
322 kSPKIHash_VeriSignClass3_G4, 333 kSPKIHash_VeriSignClass3_G4,
323 kSPKIHash_VeriSignClass4_G3, 334 kSPKIHash_VeriSignClass4_G3,
324 kSPKIHash_VeriSignClass3_G3, 335 kSPKIHash_VeriSignClass3_G3,
325 kSPKIHash_VeriSignClass1_G3, 336 kSPKIHash_VeriSignClass1_G3,
326 kSPKIHash_VeriSignClass2_G3, 337 kSPKIHash_VeriSignClass2_G3,
327 kSPKIHash_VeriSignClass3_G2, 338 kSPKIHash_VeriSignClass3_G2,
328 kSPKIHash_VeriSignClass2_G2, 339 kSPKIHash_VeriSignClass2_G2,
329 kSPKIHash_VeriSignClass3_G5, 340 kSPKIHash_VeriSignClass3_G5,
330 kSPKIHash_VeriSignUniversal, 341 kSPKIHash_VeriSignUniversal,
331 kSPKIHash_GeoTrustGlobal, 342 kSPKIHash_GeoTrustGlobal,
332 kSPKIHash_GeoTrustGlobal2, 343 kSPKIHash_GeoTrustGlobal2,
333 kSPKIHash_GeoTrustUniversal, 344 kSPKIHash_GeoTrustUniversal,
334 kSPKIHash_GeoTrustUniversal2, 345 kSPKIHash_GeoTrustUniversal2,
335 kSPKIHash_GeoTrustPrimary, 346 kSPKIHash_GeoTrustPrimary,
336 kSPKIHash_GeoTrustPrimary_G2, 347 kSPKIHash_GeoTrustPrimary_G2,
337 kSPKIHash_GeoTrustPrimary_G3, 348 kSPKIHash_GeoTrustPrimary_G3,
349 kSPKIHash_DigiCertGlobalRoot,
350 kSPKIHash_DigiCertEVRoot,
351 kSPKIHash_DigiCertAssuredIDRoot,
338 kSPKIHash_Twitter1, 352 kSPKIHash_Twitter1,
339 kSPKIHash_Entrust_2048, 353 kSPKIHash_Entrust_2048,
340 kSPKIHash_Entrust_EV, 354 kSPKIHash_Entrust_EV,
341 kSPKIHash_Entrust_G2, 355 kSPKIHash_Entrust_G2,
342 kSPKIHash_Entrust_SSL, 356 kSPKIHash_Entrust_SSL,
343 kSPKIHash_AAACertificateServices, 357 kSPKIHash_AAACertificateServices,
344 kSPKIHash_AddTrustClass1CARoot, 358 kSPKIHash_AddTrustClass1CARoot,
345 kSPKIHash_AddTrustExternalCARoot, 359 kSPKIHash_AddTrustExternalCARoot,
346 kSPKIHash_AddTrustPublicCARoot, 360 kSPKIHash_AddTrustPublicCARoot,
347 kSPKIHash_AddTrustQualifiedCARoot, 361 kSPKIHash_AddTrustQualifiedCARoot,
(...skipping 504 matching lines...) Expand 10 before | Expand all | Expand 10 after
852 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 866 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
853 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM }, 867 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM },
854 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 868 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
855 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM }, 869 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM },
856 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM }, 870 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM },
857 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM }, 871 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM },
858 }; 872 };
859 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS); 873 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS);
860 874
861 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ 875 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_
OLDNEW
« no previous file with comments | « no previous file | net/http/transport_security_state_static.certs » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698