Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(104)

Side by Side Diff: net/http/transport_security_state_static.json

Issue 22865046: net: add DigiCert to Twitter pins. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase patch. Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/http/transport_security_state_static.certs ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file contains the HSTS preloaded list in a machine readable format. 5 // This file contains the HSTS preloaded list in a machine readable format.
6 6
7 // The top-level element is a dictionary with two keys: "pinsets" maps details 7 // The top-level element is a dictionary with two keys: "pinsets" maps details
8 // of certificate pinning to a name and "entries" contains the HSTS details for 8 // of certificate pinning to a name and "entries" contains the HSTS details for
9 // each host. 9 // each host.
10 // 10 //
(...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after
84 "VeriSignClass2_G2", 84 "VeriSignClass2_G2",
85 "VeriSignClass3_G5", 85 "VeriSignClass3_G5",
86 "VeriSignUniversal", 86 "VeriSignUniversal",
87 "GeoTrustGlobal", 87 "GeoTrustGlobal",
88 "GeoTrustGlobal2", 88 "GeoTrustGlobal2",
89 "GeoTrustUniversal", 89 "GeoTrustUniversal",
90 "GeoTrustUniversal2", 90 "GeoTrustUniversal2",
91 "GeoTrustPrimary", 91 "GeoTrustPrimary",
92 "GeoTrustPrimary_G2", 92 "GeoTrustPrimary_G2",
93 "GeoTrustPrimary_G3", 93 "GeoTrustPrimary_G3",
94 "DigiCertGlobalRoot",
95 "DigiCertEVRoot",
96 "DigiCertAssuredIDRoot",
94 "Twitter1" 97 "Twitter1"
95 ] 98 ]
96 }, 99 },
97 { 100 {
98 "name": "twitterCDN", 101 "name": "twitterCDN",
99 "static_spki_hashes": [ 102 "static_spki_hashes": [
100 "VeriSignClass1", 103 "VeriSignClass1",
101 "VeriSignClass3", 104 "VeriSignClass3",
102 "VeriSignClass3_G4", 105 "VeriSignClass3_G4",
103 "VeriSignClass4_G3", 106 "VeriSignClass4_G3",
104 "VeriSignClass3_G3", 107 "VeriSignClass3_G3",
105 "VeriSignClass1_G3", 108 "VeriSignClass1_G3",
106 "VeriSignClass2_G3", 109 "VeriSignClass2_G3",
107 "VeriSignClass3_G2", 110 "VeriSignClass3_G2",
108 "VeriSignClass2_G2", 111 "VeriSignClass2_G2",
109 "VeriSignClass3_G5", 112 "VeriSignClass3_G5",
110 "VeriSignUniversal", 113 "VeriSignUniversal",
111 "GeoTrustGlobal", 114 "GeoTrustGlobal",
112 "GeoTrustGlobal2", 115 "GeoTrustGlobal2",
113 "GeoTrustUniversal", 116 "GeoTrustUniversal",
114 "GeoTrustUniversal2", 117 "GeoTrustUniversal2",
115 "GeoTrustPrimary", 118 "GeoTrustPrimary",
116 "GeoTrustPrimary_G2", 119 "GeoTrustPrimary_G2",
117 "GeoTrustPrimary_G3", 120 "GeoTrustPrimary_G3",
121 "DigiCertGlobalRoot",
122 "DigiCertEVRoot",
123 "DigiCertAssuredIDRoot",
118 "Twitter1", 124 "Twitter1",
119 125
120 "Entrust_2048", 126 "Entrust_2048",
121 "Entrust_EV", 127 "Entrust_EV",
122 "Entrust_G2", 128 "Entrust_G2",
123 "Entrust_SSL", 129 "Entrust_SSL",
124 "AAACertificateServices", 130 "AAACertificateServices",
125 "AddTrustClass1CARoot", 131 "AddTrustClass1CARoot",
126 "AddTrustExternalCARoot", 132 "AddTrustExternalCARoot",
127 "AddTrustPublicCARoot", 133 "AddTrustPublicCARoot",
(...skipping 506 matching lines...) Expand 10 before | Expand all | Expand 10 after
634 640
635 // Entries that are only valid if the client supports SNI. 641 // Entries that are only valid if the client supports SNI.
636 { "name": "gmail.com", "mode": "force-https", "pins": "google", "snionly": t rue }, 642 { "name": "gmail.com", "mode": "force-https", "pins": "google", "snionly": t rue },
637 { "name": "googlemail.com", "mode": "force-https", "pins": "google", "snionl y": true }, 643 { "name": "googlemail.com", "mode": "force-https", "pins": "google", "snionl y": true },
638 { "name": "www.gmail.com", "mode": "force-https", "pins": "google", "snionly ": true }, 644 { "name": "www.gmail.com", "mode": "force-https", "pins": "google", "snionly ": true },
639 { "name": "www.googlemail.com", "mode": "force-https", "pins": "google", "sn ionly": true }, 645 { "name": "www.googlemail.com", "mode": "force-https", "pins": "google", "sn ionly": true },
640 { "name": "google-analytics.com", "include_subdomains": true, "pins": "googl e", "snionly": true }, 646 { "name": "google-analytics.com", "include_subdomains": true, "pins": "googl e", "snionly": true },
641 { "name": "googlegroups.com", "include_subdomains": true, "pins": "google", "snionly": true } 647 { "name": "googlegroups.com", "include_subdomains": true, "pins": "google", "snionly": true }
642 ] 648 ]
643 } 649 }
OLDNEW
« no previous file with comments | « net/http/transport_security_state_static.certs ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698