OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/cert_verify_proc.h" | 5 #include "net/cert/cert_verify_proc.h" |
6 | 6 |
7 #include "base/metrics/histogram.h" | 7 #include "base/metrics/histogram.h" |
8 #include "base/sha1.h" | 8 #include "base/sha1.h" |
9 #include "base/strings/stringprintf.h" | 9 #include "base/strings/stringprintf.h" |
10 #include "build/build_config.h" | 10 #include "build/build_config.h" |
(...skipping 356 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
367 // Issuer: CN=Trustwave Organization Issuing CA, Level 2 | 367 // Issuer: CN=Trustwave Organization Issuing CA, Level 2 |
368 // Covers two certificates, the latter of which expires Apr 15 21:09:30 | 368 // Covers two certificates, the latter of which expires Apr 15 21:09:30 |
369 // 2021 GMT. | 369 // 2021 GMT. |
370 {0xe1, 0x2d, 0x89, 0xf5, 0x6d, 0x22, 0x76, 0xf8, 0x30, 0xe6, | 370 {0xe1, 0x2d, 0x89, 0xf5, 0x6d, 0x22, 0x76, 0xf8, 0x30, 0xe6, |
371 0xce, 0xaf, 0xa6, 0x6c, 0x72, 0x5c, 0x0b, 0x41, 0xa9, 0x32}, | 371 0xce, 0xaf, 0xa6, 0x6c, 0x72, 0x5c, 0x0b, 0x41, 0xa9, 0x32}, |
372 // Cyberoam CA certificate. Private key leaked, but this certificate would | 372 // Cyberoam CA certificate. Private key leaked, but this certificate would |
373 // only have been installed by Cyberoam customers. The certificate expires | 373 // only have been installed by Cyberoam customers. The certificate expires |
374 // in 2036, but we can probably remove in a couple of years (2014). | 374 // in 2036, but we can probably remove in a couple of years (2014). |
375 {0xd9, 0xf5, 0xc6, 0xce, 0x57, 0xff, 0xaa, 0x39, 0xcc, 0x7e, | 375 {0xd9, 0xf5, 0xc6, 0xce, 0x57, 0xff, 0xaa, 0x39, 0xcc, 0x7e, |
376 0xd1, 0x72, 0xbd, 0x53, 0xe0, 0xd3, 0x07, 0x83, 0x4b, 0xd1}, | 376 0xd1, 0x72, 0xbd, 0x53, 0xe0, 0xd3, 0x07, 0x83, 0x4b, 0xd1}, |
377 // Win32/Sirefef.gen!C generates fake certifciates with this public key. | 377 // Win32/Sirefef.gen!C generates fake certificates with this public key. |
378 {0xa4, 0xf5, 0x6e, 0x9e, 0x1d, 0x9a, 0x3b, 0x7b, 0x1a, 0xc3, | 378 {0xa4, 0xf5, 0x6e, 0x9e, 0x1d, 0x9a, 0x3b, 0x7b, 0x1a, 0xc3, |
379 0x31, 0xcf, 0x64, 0xfc, 0x76, 0x2c, 0xd0, 0x51, 0xfb, 0xa4}, | 379 0x31, 0xcf, 0x64, 0xfc, 0x76, 0x2c, 0xd0, 0x51, 0xfb, 0xa4}, |
380 }; | 380 }; |
381 | 381 |
382 for (unsigned i = 0; i < kNumHashes; i++) { | 382 for (unsigned i = 0; i < kNumHashes; i++) { |
383 for (HashValueVector::const_iterator j = public_key_hashes.begin(); | 383 for (HashValueVector::const_iterator j = public_key_hashes.begin(); |
384 j != public_key_hashes.end(); ++j) { | 384 j != public_key_hashes.end(); ++j) { |
385 if (j->tag == HASH_VALUE_SHA1 && | 385 if (j->tag == HASH_VALUE_SHA1 && |
386 memcmp(j->data(), kHashes[i], base::kSHA1Length) == 0) { | 386 memcmp(j->data(), kHashes[i], base::kSHA1Length) == 0) { |
387 return true; | 387 return true; |
388 } | 388 } |
389 } | 389 } |
390 } | 390 } |
391 | 391 |
392 return false; | 392 return false; |
393 } | 393 } |
394 | 394 |
395 } // namespace net | 395 } // namespace net |
OLD | NEW |