Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(795)

Side by Side Diff: net/base/transport_security_state_static.h

Issue 11274032: Separate http_security_headers from transport_security_state (Closed) Base URL: https://src.chromium.org/chrome/trunk/src/
Patch Set: Created 7 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/base/transport_security_state.cc ('k') | net/base/transport_security_state_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file is automatically generated by transport_security_state_static_gener ate.go 5 // This file is automatically generated by transport_security_state_static_gener ate.go
6 6
7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
9 9
10 // These are SubjectPublicKeyInfo hashes for public key pinning. The 10 // These are SubjectPublicKeyInfo hashes for public key pinning. The
11 // hashes are base64 encoded, SHA1 digests. 11 // hashes are SHA1 digests.
12 12
13 static const char kSPKIHash_TestSPKI[] = 13 static const char kSPKIHash_TestSPKI[] =
14 "sha1/AAAAAAAAAAAAAAAAAAAAAAAAAAA="; 14 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
15 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
15 16
16 static const char kSPKIHash_VeriSignClass3[] = 17 static const char kSPKIHash_VeriSignClass3[] =
17 "sha1/4n972HfV354KP560yw4uqe/baXc="; 18 "\xe2\x7f\x7b\xd8\x77\xd5\xdf\x9e\x0a\x3f"
19 "\x9e\xb4\xcb\x0e\x2e\xa9\xef\xdb\x69\x77";
18 20
19 static const char kSPKIHash_VeriSignClass3_G3[] = 21 static const char kSPKIHash_VeriSignClass3_G3[] =
20 "sha1/IvGeLsbqzPxdI0b0wuj2xVTdXgc="; 22 "\x22\xf1\x9e\x2e\xc6\xea\xcc\xfc\x5d\x23"
23 "\x46\xf4\xc2\xe8\xf6\xc5\x54\xdd\x5e\x07";
21 24
22 static const char kSPKIHash_Google1024[] = 25 static const char kSPKIHash_Google1024[] =
23 "sha1/QMVAHW+MuvCLAO3vse6H0AWzuc0="; 26 "\x40\xc5\x40\x1d\x6f\x8c\xba\xf0\x8b\x00"
27 "\xed\xef\xb1\xee\x87\xd0\x05\xb3\xb9\xcd";
24 28
25 static const char kSPKIHash_Google2048[] = 29 static const char kSPKIHash_Google2048[] =
26 "sha1/AbkhxY0L343gKf+cki7NVWp+ozk="; 30 "\x01\xb9\x21\xc5\x8d\x0b\xdf\x8d\xe0\x29"
31 "\xff\x9c\x92\x2e\xcd\x55\x6a\x7e\xa3\x39";
27 32
28 static const char kSPKIHash_EquifaxSecureCA[] = 33 static const char kSPKIHash_EquifaxSecureCA[] =
29 "sha1/SOZo+SvSspXXR9gjIBBPM5iQn9Q="; 34 "\x48\xe6\x68\xf9\x2b\xd2\xb2\x95\xd7\x47"
35 "\xd8\x23\x20\x10\x4f\x33\x98\x90\x9f\xd4";
30 36
31 static const char kSPKIHash_Aetna[] = 37 static const char kSPKIHash_Aetna[] =
32 "sha1/klKqFN6/gK4wqtlOYDhwJKVDLxo="; 38 "\x92\x52\xaa\x14\xde\xbf\x80\xae\x30\xaa"
39 "\xd9\x4e\x60\x38\x70\x24\xa5\x43\x2f\x1a";
33 40
34 static const char kSPKIHash_GeoTrustGlobal[] = 41 static const char kSPKIHash_GeoTrustGlobal[] =
35 "sha1/wHqYaI2J+6sFZAwRfap9ZbjKzE4="; 42 "\xc0\x7a\x98\x68\x8d\x89\xfb\xab\x05\x64"
43 "\x0c\x11\x7d\xaa\x7d\x65\xb8\xca\xcc\x4e";
36 44
37 static const char kSPKIHash_GeoTrustPrimary[] = 45 static const char kSPKIHash_GeoTrustPrimary[] =
38 "sha1/sBmJ5+/7Sq/LFI9YRjl2IkFQ4bo="; 46 "\xb0\x19\x89\xe7\xef\xfb\x4a\xaf\xcb\x14"
47 "\x8f\x58\x46\x39\x76\x22\x41\x50\xe1\xba";
39 48
40 static const char kSPKIHash_Intel[] = 49 static const char kSPKIHash_Intel[] =
41 "sha1/DsYq91myCBCQJW/D3f2KZjEwK8U="; 50 "\x0e\xc6\x2a\xf7\x59\xb2\x08\x10\x90\x25"
51 "\x6f\xc3\xdd\xfd\x8a\x66\x31\x30\x2b\xc5";
42 52
43 static const char kSPKIHash_TCTrustCenter[] = 53 static const char kSPKIHash_TCTrustCenter[] =
44 "sha1/gzuEEAB/bkqdQS3EIjk2by7lW+k="; 54 "\x83\x3b\x84\x10\x00\x7f\x6e\x4a\x9d\x41"
55 "\x2d\xc4\x22\x39\x36\x6f\x2e\xe5\x5b\xe9";
45 56
46 static const char kSPKIHash_Vodafone[] = 57 static const char kSPKIHash_Vodafone[] =
47 "sha1/DX/hXFUUNmiZ/EDWIgjvIuvRFRw="; 58 "\x0d\x7f\xe1\x5c\x55\x14\x36\x68\x99\xfc"
59 "\x40\xd6\x22\x08\xef\x22\xeb\xd1\x15\x1c";
48 60
49 static const char kSPKIHash_RapidSSL[] = 61 static const char kSPKIHash_RapidSSL[] =
50 "sha1/o5OZxATDsgmwgcIfIWIneMJ0jkw="; 62 "\xa3\x93\x99\xc4\x04\xc3\xb2\x09\xb0\x81"
63 "\xc2\x1f\x21\x62\x27\x78\xc2\x74\x8e\x4c";
51 64
52 static const char kSPKIHash_DigiCertEVRoot[] = 65 static const char kSPKIHash_DigiCertEVRoot[] =
53 "sha1/gzF+YoVCU9bXeDGQ7JGQVumRueM="; 66 "\x83\x31\x7e\x62\x85\x42\x53\xd6\xd7\x78"
67 "\x31\x90\xec\x91\x90\x56\xe9\x91\xb9\xe3";
54 68
55 static const char kSPKIHash_Tor1[] = 69 static const char kSPKIHash_Tor1[] =
56 "sha1/juNxSTv9UANmpC9kF5GKpmWNx3Y="; 70 "\x8e\xe3\x71\x49\x3b\xfd\x50\x03\x66\xa4"
71 "\x2f\x64\x17\x91\x8a\xa6\x65\x8d\xc7\x76";
57 72
58 static const char kSPKIHash_Tor2[] = 73 static const char kSPKIHash_Tor2[] =
59 "sha1/lia43lPolzSPVIq34Dw57uYcLD8="; 74 "\x96\x26\xb8\xde\x53\xe8\x97\x34\x8f\x54"
75 "\x8a\xb7\xe0\x3c\x39\xee\xe6\x1c\x2c\x3f";
60 76
61 static const char kSPKIHash_Tor3[] = 77 static const char kSPKIHash_Tor3[] =
62 "sha1/rzEyQIKOh77j87n5bjWUNguXF8Y="; 78 "\xaf\x31\x32\x40\x82\x8e\x87\xbe\xe3\xf3"
79 "\xb9\xf9\x6e\x35\x94\x36\x0b\x97\x17\xc6";
63 80
64 static const char kSPKIHash_VeriSignClass1[] = 81 static const char kSPKIHash_VeriSignClass1[] =
65 "sha1/I0PRSKJViZuUfUYaeX7ATP7RcLc="; 82 "\x23\x43\xd1\x48\xa2\x55\x89\x9b\x94\x7d"
83 "\x46\x1a\x79\x7e\xc0\x4c\xfe\xd1\x70\xb7";
66 84
67 static const char kSPKIHash_VeriSignClass3_G4[] = 85 static const char kSPKIHash_VeriSignClass3_G4[] =
68 "sha1/7WYxNdMb1OymFMQp4xkGn5TBJlA="; 86 "\xed\x66\x31\x35\xd3\x1b\xd4\xec\xa6\x14"
87 "\xc4\x29\xe3\x19\x06\x9f\x94\xc1\x26\x50";
69 88
70 static const char kSPKIHash_VeriSignClass4_G3[] = 89 static const char kSPKIHash_VeriSignClass4_G3[] =
71 "sha1/PANDaGiVHPNpKri0Jtq6j+ki5b0="; 90 "\x3c\x03\x43\x68\x68\x95\x1c\xf3\x69\x2a"
91 "\xb8\xb4\x26\xda\xba\x8f\xe9\x22\xe5\xbd";
72 92
73 static const char kSPKIHash_VeriSignClass1_G3[] = 93 static const char kSPKIHash_VeriSignClass1_G3[] =
74 "sha1/VRmyeKyygdftp6vBg5nDu2kEJLU="; 94 "\x55\x19\xb2\x78\xac\xb2\x81\xd7\xed\xa7"
95 "\xab\xc1\x83\x99\xc3\xbb\x69\x04\x24\xb5";
75 96
76 static const char kSPKIHash_VeriSignClass2_G3[] = 97 static const char kSPKIHash_VeriSignClass2_G3[] =
77 "sha1/Wr7Fddyu87COJxlD/H8lDD32YeM="; 98 "\x5a\xbe\xc5\x75\xdc\xae\xf3\xb0\x8e\x27"
99 "\x19\x43\xfc\x7f\x25\x0c\x3d\xf6\x61\xe3";
78 100
79 static const char kSPKIHash_VeriSignClass3_G2[] = 101 static const char kSPKIHash_VeriSignClass3_G2[] =
80 "sha1/GiG0lStik84Ys2XsnA6TTLOB5tQ="; 102 "\x1a\x21\xb4\x95\x2b\x62\x93\xce\x18\xb3"
103 "\x65\xec\x9c\x0e\x93\x4c\xb3\x81\xe6\xd4";
81 104
82 static const char kSPKIHash_VeriSignClass2_G2[] = 105 static const char kSPKIHash_VeriSignClass2_G2[] =
83 "sha1/Eje6RRfurSkm/cHN/r7t8t7ZFFw="; 106 "\x12\x37\xba\x45\x17\xee\xad\x29\x26\xfd"
107 "\xc1\xcd\xfe\xbe\xed\xf2\xde\xd9\x14\x5c";
84 108
85 static const char kSPKIHash_VeriSignClass3_G5[] = 109 static const char kSPKIHash_VeriSignClass3_G5[] =
86 "sha1/sYEIGhmkwJQf+uiVKMEkyZs0rMc="; 110 "\xb1\x81\x08\x1a\x19\xa4\xc0\x94\x1f\xfa"
111 "\xe8\x95\x28\xc1\x24\xc9\x9b\x34\xac\xc7";
87 112
88 static const char kSPKIHash_VeriSignUniversal[] = 113 static const char kSPKIHash_VeriSignUniversal[] =
89 "sha1/u8I+KQuzKHcdrT6iTb30I70GsD0="; 114 "\xbb\xc2\x3e\x29\x0b\xb3\x28\x77\x1d\xad"
115 "\x3e\xa2\x4d\xbd\xf4\x23\xbd\x06\xb0\x3d";
90 116
91 static const char kSPKIHash_Twitter1[] = 117 static const char kSPKIHash_Twitter1[] =
92 "sha1/Vv7zwhR9TtOIN/29MFI4cgHld40="; 118 "\x56\xfe\xf3\xc2\x14\x7d\x4e\xd3\x88\x37"
119 "\xfd\xbd\x30\x52\x38\x72\x01\xe5\x77\x8d";
93 120
94 static const char kSPKIHash_GeoTrustGlobal2[] = 121 static const char kSPKIHash_GeoTrustGlobal2[] =
95 "sha1/cTg28gIxU0crbrplRqkQFVggBQk="; 122 "\x71\x38\x36\xf2\x02\x31\x53\x47\x2b\x6e"
123 "\xba\x65\x46\xa9\x10\x15\x58\x20\x05\x09";
96 124
97 static const char kSPKIHash_GeoTrustUniversal[] = 125 static const char kSPKIHash_GeoTrustUniversal[] =
98 "sha1/h+hbY1PGI6MSjLD/u/VR/lmADiI="; 126 "\x87\xe8\x5b\x63\x53\xc6\x23\xa3\x12\x8c"
127 "\xb0\xff\xbb\xf5\x51\xfe\x59\x80\x0e\x22";
99 128
100 static const char kSPKIHash_GeoTrustUniversal2[] = 129 static const char kSPKIHash_GeoTrustUniversal2[] =
101 "sha1/Xk9ThoXdT57KX9wNRW99UbHcm3s="; 130 "\x5e\x4f\x53\x86\x85\xdd\x4f\x9e\xca\x5f"
131 "\xdc\x0d\x45\x6f\x7d\x51\xb1\xdc\x9b\x7b";
102 132
103 static const char kSPKIHash_GeoTrustPrimary_G2[] = 133 static const char kSPKIHash_GeoTrustPrimary_G2[] =
104 "sha1/vb6nG6txV/nkddlU0rcngBqCJoI="; 134 "\xbd\xbe\xa7\x1b\xab\x71\x57\xf9\xe4\x75"
135 "\xd9\x54\xd2\xb7\x27\x80\x1a\x82\x26\x82";
105 136
106 static const char kSPKIHash_GeoTrustPrimary_G3[] = 137 static const char kSPKIHash_GeoTrustPrimary_G3[] =
107 "sha1/nKmNAK90Dd2BgNITRaWLjy6UONY="; 138 "\x9c\xa9\x8d\x00\xaf\x74\x0d\xdd\x81\x80"
139 "\xd2\x13\x45\xa5\x8b\x8f\x2e\x94\x38\xd6";
108 140
109 static const char kSPKIHash_Entrust_2048[] = 141 static const char kSPKIHash_Entrust_2048[] =
110 "sha1/VeSB0RGAvtiJuQijMfmhJAkWuXA="; 142 "\x55\xe4\x81\xd1\x11\x80\xbe\xd8\x89\xb9"
143 "\x08\xa3\x31\xf9\xa1\x24\x09\x16\xb9\x70";
111 144
112 static const char kSPKIHash_Entrust_EV[] = 145 static const char kSPKIHash_Entrust_EV[] =
113 "sha1/ukKwgYhTiB2GY71MwF4I/upuu3c="; 146 "\xba\x42\xb0\x81\x88\x53\x88\x1d\x86\x63"
147 "\xbd\x4c\xc0\x5e\x08\xfe\xea\x6e\xbb\x77";
114 148
115 static const char kSPKIHash_Entrust_G2[] = 149 static const char kSPKIHash_Entrust_G2[] =
116 "sha1/qzDTr0vY8WtYae5FaSnahLhzlIg="; 150 "\xab\x30\xd3\xaf\x4b\xd8\xf1\x6b\x58\x69"
151 "\xee\x45\x69\x29\xda\x84\xb8\x73\x94\x88";
117 152
118 static const char kSPKIHash_Entrust_SSL[] = 153 static const char kSPKIHash_Entrust_SSL[] =
119 "sha1/8BdiE1U9s/8KAGv7UISX8+1i0Bo="; 154 "\xf0\x17\x62\x13\x55\x3d\xb3\xff\x0a\x00"
155 "\x6b\xfb\x50\x84\x97\xf3\xed\x62\xd0\x1a";
120 156
121 static const char kSPKIHash_AAACertificateServices[] = 157 static const char kSPKIHash_AAACertificateServices[] =
122 "sha1/xDAoxdPjCAwQRIssd7okU5dgu/k="; 158 "\xc4\x30\x28\xc5\xd3\xe3\x08\x0c\x10\x44"
159 "\x8b\x2c\x77\xba\x24\x53\x97\x60\xbb\xf9";
123 160
124 static const char kSPKIHash_AddTrustClass1CARoot[] = 161 static const char kSPKIHash_AddTrustClass1CARoot[] =
125 "sha1/i9vXzKBoU0IW9MErJUT8Apyli0c="; 162 "\x8b\xdb\xd7\xcc\xa0\x68\x53\x42\x16\xf4"
163 "\xc1\x2b\x25\x44\xfc\x02\x9c\xa5\x8b\x47";
126 164
127 static const char kSPKIHash_AddTrustExternalCARoot[] = 165 static const char kSPKIHash_AddTrustExternalCARoot[] =
128 "sha1/T5x9IXmcrQ7YuQxXnxoCmeeQ84c="; 166 "\x4f\x9c\x7d\x21\x79\x9c\xad\x0e\xd8\xb9"
167 "\x0c\x57\x9f\x1a\x02\x99\xe7\x90\xf3\x87";
129 168
130 static const char kSPKIHash_AddTrustPublicCARoot[] = 169 static const char kSPKIHash_AddTrustPublicCARoot[] =
131 "sha1/qFdl1ugyyMUZY3Namhd0OoHf7i4="; 170 "\xa8\x57\x65\xd6\xe8\x32\xc8\xc5\x19\x63"
171 "\x73\x5a\x9a\x17\x74\x3a\x81\xdf\xee\x2e";
132 172
133 static const char kSPKIHash_AddTrustQualifiedCARoot[] = 173 static const char kSPKIHash_AddTrustQualifiedCARoot[] =
134 "sha1/vOS3IxJVmOVjQRkcUOS2R8J2Bdc="; 174 "\xbc\xe4\xb7\x23\x12\x55\x98\xe5\x63\x41"
175 "\x19\x1c\x50\xe4\xb6\x47\xc2\x76\x05\xd7";
135 176
136 static const char kSPKIHash_COMODOCertificationAuthority[] = 177 static const char kSPKIHash_COMODOCertificationAuthority[] =
137 "sha1/EeSR0cnkwOuazs9zVF3h8agwPsM="; 178 "\x11\xe4\x91\xd1\xc9\xe4\xc0\xeb\x9a\xce"
179 "\xcf\x73\x54\x5d\xe1\xf1\xa8\x30\x3e\xc3";
138 180
139 static const char kSPKIHash_SecureCertificateServices[] = 181 static const char kSPKIHash_SecureCertificateServices[] =
140 "sha1/PLQahC71XPIaPaVKyNG+OQh2N7w="; 182 "\x3c\xb4\x1a\x84\x2e\xf5\x5c\xf2\x1a\x3d"
183 "\xa5\x4a\xc8\xd1\xbe\x39\x08\x76\x37\xbc";
141 184
142 static const char kSPKIHash_TrustedCertificateServices[] = 185 static const char kSPKIHash_TrustedCertificateServices[] =
143 "sha1//nLI678ML7sOJhOTkzwsqY3cJJQ="; 186 "\xfe\x72\xc8\xeb\xbf\x0c\x2f\xbb\x0e\x26"
187 "\x13\x93\x93\x3c\x2c\xa9\x8d\xdc\x24\x94";
144 188
145 static const char kSPKIHash_UTNDATACorpSGC[] = 189 static const char kSPKIHash_UTNDATACorpSGC[] =
146 "sha1/UzLRs89/+uDxoF2FTpLSnkUdtE8="; 190 "\x53\x32\xd1\xb3\xcf\x7f\xfa\xe0\xf1\xa0"
191 "\x5d\x85\x4e\x92\xd2\x9e\x45\x1d\xb4\x4f";
147 192
148 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] = 193 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] =
149 "sha1/iYJnfcSdJnAAS7RQSHzePa4Ebn0="; 194 "\x89\x82\x67\x7d\xc4\x9d\x26\x70\x00\x4b"
195 "\xb4\x50\x48\x7c\xde\x3d\xae\x04\x6e\x7d";
150 196
151 static const char kSPKIHash_UTNUSERFirstHardware[] = 197 static const char kSPKIHash_UTNUSERFirstHardware[] =
152 "sha1/oXJfJhsomEOVXQc31YWWnUvSw0U="; 198 "\xa1\x72\x5f\x26\x1b\x28\x98\x43\x95\x5d"
199 "\x07\x37\xd5\x85\x96\x9d\x4b\xd2\xc3\x45";
153 200
154 static const char kSPKIHash_UTNUSERFirstObject[] = 201 static const char kSPKIHash_UTNUSERFirstObject[] =
155 "sha1/2u1kdBScFDyr3ZmpvVsoTYs8ydg="; 202 "\xda\xed\x64\x74\x14\x9c\x14\x3c\xab\xdd"
203 "\x99\xa9\xbd\x5b\x28\x4d\x8b\x3c\xc9\xd8";
156 204
157 static const char kSPKIHash_GTECyberTrustGlobalRoot[] = 205 static const char kSPKIHash_GTECyberTrustGlobalRoot[] =
158 "sha1/WXkS3mF11m/EI7d3E3THlt5viHI="; 206 "\x59\x79\x12\xde\x61\x75\xd6\x6f\xc4\x23"
207 "\xb7\x77\x13\x74\xc7\x96\xde\x6f\x88\x72";
159 208
160 static const char kSPKIHash_Tor2web[] = 209 static const char kSPKIHash_Tor2web[] =
161 "sha1/GeW1hxvUgy7I9ZSX/sZe+0jjM7E="; 210 "\x19\xe5\xb5\x87\x1b\xd4\x83\x2e\xc8\xf5"
211 "\x94\x97\xfe\xc6\x5e\xfb\x48\xe3\x33\xb1";
162 212
163 static const char kSPKIHash_AlphaSSL_G2[] = 213 static const char kSPKIHash_AlphaSSL_G2[] =
164 "sha1/5STpjjF9yPytkFN8kecNpHCTkF8="; 214 "\xe5\x24\xe9\x8e\x31\x7d\xc8\xfc\xad\x90"
215 "\x53\x7c\x91\xe7\x0d\xa4\x70\x93\x90\x5f";
165 216
166 static const char kSPKIHash_CryptoCat1[] = 217 static const char kSPKIHash_CryptoCat1[] =
167 "sha1/TIfOhSz0wE1nqeDsUQx/OxSz6ck="; 218 "\x4c\x87\xce\x85\x2c\xf4\xc0\x4d\x67\xa9"
219 "\xe0\xec\x51\x0c\x7f\x3b\x14\xb3\xe9\xc9";
168 220
169 // The following is static data describing the hosts that are hardcoded with 221 // The following is static data describing the hosts that are hardcoded with
170 // certificate pins or HSTS information. 222 // certificate pins or HSTS information.
171 223
172 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. 224 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected.
173 static const char* const kNoRejectedPublicKeys[] = { 225 static const char* const kNoRejectedPublicKeys[] = {
174 NULL, 226 NULL,
175 }; 227 };
176 228
177 static const char* const kTestAcceptableCerts[] = { 229 static const char* const kTestAcceptableCerts[] = {
(...skipping 540 matching lines...) Expand 10 before | Expand all | Expand 10 after
718 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 770 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
719 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM }, 771 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM },
720 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 772 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
721 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM }, 773 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM },
722 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM }, 774 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM },
723 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM }, 775 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM },
724 }; 776 };
725 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS); 777 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS);
726 778
727 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 779 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
OLDNEW
« no previous file with comments | « net/base/transport_security_state.cc ('k') | net/base/transport_security_state_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698