OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file is automatically generated by transport_security_state_static_gener
ate.go | 5 // This file is automatically generated by transport_security_state_static_gener
ate.go |
6 | 6 |
7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ | 7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ |
8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ | 8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ |
9 | 9 |
10 // These are SubjectPublicKeyInfo hashes for public key pinning. The | 10 // These are SubjectPublicKeyInfo hashes for public key pinning. The |
11 // hashes are base64 encoded, SHA1 digests. | 11 // hashes are base64 encoded, SHA1 digests. |
12 | 12 |
13 static const char kSPKIHash_TestSPKI[] = | 13 static const char kSPKIHash_TestSPKI[] = |
14 "sha1/AAAAAAAAAAAAAAAAAAAAAAAAAAA="; | 14 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0
0\x00"; |
15 | 15 |
16 static const char kSPKIHash_VeriSignClass3[] = | 16 static const char kSPKIHash_VeriSignClass3[] = |
17 "sha1/4n972HfV354KP560yw4uqe/baXc="; | 17 "\xe2\x7f\x7b\xd8\x77\xd5\xdf\x9e\x0a\x3f\x9e\xb4\xcb\x0e\x2e\xa9\xef\xdb\x6
9\x77"; |
18 | 18 |
19 static const char kSPKIHash_VeriSignClass3_G3[] = | 19 static const char kSPKIHash_VeriSignClass3_G3[] = |
20 "sha1/IvGeLsbqzPxdI0b0wuj2xVTdXgc="; | 20 "\x22\xf1\x9e\x2e\xc6\xea\xcc\xfc\x5d\x23\x46\xf4\xc2\xe8\xf6\xc5\x54\xdd\x5
e\x07"; |
21 | 21 |
22 static const char kSPKIHash_Google1024[] = | 22 static const char kSPKIHash_Google1024[] = |
23 "sha1/QMVAHW+MuvCLAO3vse6H0AWzuc0="; | 23 "\x40\xc5\x40\x1d\x6f\x8c\xba\xf0\x8b\x00\xed\xef\xb1\xee\x87\xd0\x05\xb3\xb
9\xcd"; |
24 | 24 |
25 static const char kSPKIHash_Google2048[] = | 25 static const char kSPKIHash_Google2048[] = |
26 "sha1/AbkhxY0L343gKf+cki7NVWp+ozk="; | 26 "\x01\xb9\x21\xc5\x8d\x0b\xdf\x8d\xe0\x29\xff\x9c\x92\x2e\xcd\x55\x6a\x7e\xa
3\x39"; |
27 | 27 |
28 static const char kSPKIHash_EquifaxSecureCA[] = | 28 static const char kSPKIHash_EquifaxSecureCA[] = |
29 "sha1/SOZo+SvSspXXR9gjIBBPM5iQn9Q="; | 29 "\x48\xe6\x68\xf9\x2b\xd2\xb2\x95\xd7\x47\xd8\x23\x20\x10\x4f\x33\x98\x90\x9
f\xd4"; |
30 | 30 |
31 static const char kSPKIHash_Aetna[] = | 31 static const char kSPKIHash_Aetna[] = |
32 "sha1/klKqFN6/gK4wqtlOYDhwJKVDLxo="; | 32 "\x92\x52\xaa\x14\xde\xbf\x80\xae\x30\xaa\xd9\x4e\x60\x38\x70\x24\xa5\x43\x2
f\x1a"; |
33 | 33 |
34 static const char kSPKIHash_GeoTrustGlobal[] = | 34 static const char kSPKIHash_GeoTrustGlobal[] = |
35 "sha1/wHqYaI2J+6sFZAwRfap9ZbjKzE4="; | 35 "\xc0\x7a\x98\x68\x8d\x89\xfb\xab\x05\x64\x0c\x11\x7d\xaa\x7d\x65\xb8\xca\xc
c\x4e"; |
36 | 36 |
37 static const char kSPKIHash_GeoTrustPrimary[] = | 37 static const char kSPKIHash_GeoTrustPrimary[] = |
38 "sha1/sBmJ5+/7Sq/LFI9YRjl2IkFQ4bo="; | 38 "\xb0\x19\x89\xe7\xef\xfb\x4a\xaf\xcb\x14\x8f\x58\x46\x39\x76\x22\x41\x50\xe
1\xba"; |
39 | 39 |
40 static const char kSPKIHash_Intel[] = | 40 static const char kSPKIHash_Intel[] = |
41 "sha1/DsYq91myCBCQJW/D3f2KZjEwK8U="; | 41 "\x0e\xc6\x2a\xf7\x59\xb2\x08\x10\x90\x25\x6f\xc3\xdd\xfd\x8a\x66\x31\x30\x2
b\xc5"; |
42 | 42 |
43 static const char kSPKIHash_TCTrustCenter[] = | 43 static const char kSPKIHash_TCTrustCenter[] = |
44 "sha1/gzuEEAB/bkqdQS3EIjk2by7lW+k="; | 44 "\x83\x3b\x84\x10\x00\x7f\x6e\x4a\x9d\x41\x2d\xc4\x22\x39\x36\x6f\x2e\xe5\x5
b\xe9"; |
45 | 45 |
46 static const char kSPKIHash_Vodafone[] = | 46 static const char kSPKIHash_Vodafone[] = |
47 "sha1/DX/hXFUUNmiZ/EDWIgjvIuvRFRw="; | 47 "\x0d\x7f\xe1\x5c\x55\x14\x36\x68\x99\xfc\x40\xd6\x22\x08\xef\x22\xeb\xd1\x1
5\x1c"; |
48 | 48 |
49 static const char kSPKIHash_RapidSSL[] = | 49 static const char kSPKIHash_RapidSSL[] = |
50 "sha1/o5OZxATDsgmwgcIfIWIneMJ0jkw="; | 50 "\xa3\x93\x99\xc4\x04\xc3\xb2\x09\xb0\x81\xc2\x1f\x21\x62\x27\x78\xc2\x74\x8
e\x4c"; |
51 | 51 |
52 static const char kSPKIHash_DigiCertEVRoot[] = | 52 static const char kSPKIHash_DigiCertEVRoot[] = |
53 "sha1/gzF+YoVCU9bXeDGQ7JGQVumRueM="; | 53 "\x83\x31\x7e\x62\x85\x42\x53\xd6\xd7\x78\x31\x90\xec\x91\x90\x56\xe9\x91\xb
9\xe3"; |
54 | 54 |
55 static const char kSPKIHash_Tor1[] = | 55 static const char kSPKIHash_Tor1[] = |
56 "sha1/juNxSTv9UANmpC9kF5GKpmWNx3Y="; | 56 "\x8e\xe3\x71\x49\x3b\xfd\x50\x03\x66\xa4\x2f\x64\x17\x91\x8a\xa6\x65\x8d\xc
7\x76"; |
57 | 57 |
58 static const char kSPKIHash_Tor2[] = | 58 static const char kSPKIHash_Tor2[] = |
59 "sha1/lia43lPolzSPVIq34Dw57uYcLD8="; | 59 "\x96\x26\xb8\xde\x53\xe8\x97\x34\x8f\x54\x8a\xb7\xe0\x3c\x39\xee\xe6\x1c\x2
c\x3f"; |
60 | 60 |
61 static const char kSPKIHash_Tor3[] = | 61 static const char kSPKIHash_Tor3[] = |
62 "sha1/rzEyQIKOh77j87n5bjWUNguXF8Y="; | 62 "\xaf\x31\x32\x40\x82\x8e\x87\xbe\xe3\xf3\xb9\xf9\x6e\x35\x94\x36\x0b\x97\x1
7\xc6"; |
63 | 63 |
64 static const char kSPKIHash_VeriSignClass1[] = | 64 static const char kSPKIHash_VeriSignClass1[] = |
65 "sha1/I0PRSKJViZuUfUYaeX7ATP7RcLc="; | 65 "\x23\x43\xd1\x48\xa2\x55\x89\x9b\x94\x7d\x46\x1a\x79\x7e\xc0\x4c\xfe\xd1\x7
0\xb7"; |
66 | 66 |
67 static const char kSPKIHash_VeriSignClass3_G4[] = | 67 static const char kSPKIHash_VeriSignClass3_G4[] = |
68 "sha1/7WYxNdMb1OymFMQp4xkGn5TBJlA="; | 68 "\xed\x66\x31\x35\xd3\x1b\xd4\xec\xa6\x14\xc4\x29\xe3\x19\x06\x9f\x94\xc1\x2
6\x50"; |
69 | 69 |
70 static const char kSPKIHash_VeriSignClass4_G3[] = | 70 static const char kSPKIHash_VeriSignClass4_G3[] = |
71 "sha1/PANDaGiVHPNpKri0Jtq6j+ki5b0="; | 71 "\x3c\x03\x43\x68\x68\x95\x1c\xf3\x69\x2a\xb8\xb4\x26\xda\xba\x8f\xe9\x22\xe
5\xbd"; |
72 | 72 |
73 static const char kSPKIHash_VeriSignClass1_G3[] = | 73 static const char kSPKIHash_VeriSignClass1_G3[] = |
74 "sha1/VRmyeKyygdftp6vBg5nDu2kEJLU="; | 74 "\x55\x19\xb2\x78\xac\xb2\x81\xd7\xed\xa7\xab\xc1\x83\x99\xc3\xbb\x69\x04\x2
4\xb5"; |
75 | 75 |
76 static const char kSPKIHash_VeriSignClass2_G3[] = | 76 static const char kSPKIHash_VeriSignClass2_G3[] = |
77 "sha1/Wr7Fddyu87COJxlD/H8lDD32YeM="; | 77 "\x5a\xbe\xc5\x75\xdc\xae\xf3\xb0\x8e\x27\x19\x43\xfc\x7f\x25\x0c\x3d\xf6\x6
1\xe3"; |
78 | 78 |
79 static const char kSPKIHash_VeriSignClass3_G2[] = | 79 static const char kSPKIHash_VeriSignClass3_G2[] = |
80 "sha1/GiG0lStik84Ys2XsnA6TTLOB5tQ="; | 80 "\x1a\x21\xb4\x95\x2b\x62\x93\xce\x18\xb3\x65\xec\x9c\x0e\x93\x4c\xb3\x81\xe
6\xd4"; |
81 | 81 |
82 static const char kSPKIHash_VeriSignClass2_G2[] = | 82 static const char kSPKIHash_VeriSignClass2_G2[] = |
83 "sha1/Eje6RRfurSkm/cHN/r7t8t7ZFFw="; | 83 "\x12\x37\xba\x45\x17\xee\xad\x29\x26\xfd\xc1\xcd\xfe\xbe\xed\xf2\xde\xd9\x1
4\x5c"; |
84 | 84 |
85 static const char kSPKIHash_VeriSignClass3_G5[] = | 85 static const char kSPKIHash_VeriSignClass3_G5[] = |
86 "sha1/sYEIGhmkwJQf+uiVKMEkyZs0rMc="; | 86 "\xb1\x81\x08\x1a\x19\xa4\xc0\x94\x1f\xfa\xe8\x95\x28\xc1\x24\xc9\x9b\x34\xa
c\xc7"; |
87 | 87 |
88 static const char kSPKIHash_VeriSignUniversal[] = | 88 static const char kSPKIHash_VeriSignUniversal[] = |
89 "sha1/u8I+KQuzKHcdrT6iTb30I70GsD0="; | 89 "\xbb\xc2\x3e\x29\x0b\xb3\x28\x77\x1d\xad\x3e\xa2\x4d\xbd\xf4\x23\xbd\x06\xb
0\x3d"; |
90 | 90 |
91 static const char kSPKIHash_Twitter1[] = | 91 static const char kSPKIHash_Twitter1[] = |
92 "sha1/Vv7zwhR9TtOIN/29MFI4cgHld40="; | 92 "\x56\xfe\xf3\xc2\x14\x7d\x4e\xd3\x88\x37\xfd\xbd\x30\x52\x38\x72\x01\xe5\x7
7\x8d"; |
93 | 93 |
94 static const char kSPKIHash_GeoTrustGlobal2[] = | 94 static const char kSPKIHash_GeoTrustGlobal2[] = |
95 "sha1/cTg28gIxU0crbrplRqkQFVggBQk="; | 95 "\x71\x38\x36\xf2\x02\x31\x53\x47\x2b\x6e\xba\x65\x46\xa9\x10\x15\x58\x20\x0
5\x09"; |
96 | 96 |
97 static const char kSPKIHash_GeoTrustUniversal[] = | 97 static const char kSPKIHash_GeoTrustUniversal[] = |
98 "sha1/h+hbY1PGI6MSjLD/u/VR/lmADiI="; | 98 "\x87\xe8\x5b\x63\x53\xc6\x23\xa3\x12\x8c\xb0\xff\xbb\xf5\x51\xfe\x59\x80\x0
e\x22"; |
99 | 99 |
100 static const char kSPKIHash_GeoTrustUniversal2[] = | 100 static const char kSPKIHash_GeoTrustUniversal2[] = |
101 "sha1/Xk9ThoXdT57KX9wNRW99UbHcm3s="; | 101 "\x5e\x4f\x53\x86\x85\xdd\x4f\x9e\xca\x5f\xdc\x0d\x45\x6f\x7d\x51\xb1\xdc\x9
b\x7b"; |
102 | 102 |
103 static const char kSPKIHash_GeoTrustPrimary_G2[] = | 103 static const char kSPKIHash_GeoTrustPrimary_G2[] = |
104 "sha1/vb6nG6txV/nkddlU0rcngBqCJoI="; | 104 "\xbd\xbe\xa7\x1b\xab\x71\x57\xf9\xe4\x75\xd9\x54\xd2\xb7\x27\x80\x1a\x82\x2
6\x82"; |
105 | 105 |
106 static const char kSPKIHash_GeoTrustPrimary_G3[] = | 106 static const char kSPKIHash_GeoTrustPrimary_G3[] = |
107 "sha1/nKmNAK90Dd2BgNITRaWLjy6UONY="; | 107 "\x9c\xa9\x8d\x00\xaf\x74\x0d\xdd\x81\x80\xd2\x13\x45\xa5\x8b\x8f\x2e\x94\x3
8\xd6"; |
108 | 108 |
109 static const char kSPKIHash_Entrust_2048[] = | 109 static const char kSPKIHash_Entrust_2048[] = |
110 "sha1/VeSB0RGAvtiJuQijMfmhJAkWuXA="; | 110 "\x55\xe4\x81\xd1\x11\x80\xbe\xd8\x89\xb9\x08\xa3\x31\xf9\xa1\x24\x09\x16\xb
9\x70"; |
111 | 111 |
112 static const char kSPKIHash_Entrust_EV[] = | 112 static const char kSPKIHash_Entrust_EV[] = |
113 "sha1/ukKwgYhTiB2GY71MwF4I/upuu3c="; | 113 "\xba\x42\xb0\x81\x88\x53\x88\x1d\x86\x63\xbd\x4c\xc0\x5e\x08\xfe\xea\x6e\xb
b\x77"; |
114 | 114 |
115 static const char kSPKIHash_Entrust_G2[] = | 115 static const char kSPKIHash_Entrust_G2[] = |
116 "sha1/qzDTr0vY8WtYae5FaSnahLhzlIg="; | 116 "\xab\x30\xd3\xaf\x4b\xd8\xf1\x6b\x58\x69\xee\x45\x69\x29\xda\x84\xb8\x73\x9
4\x88"; |
117 | 117 |
118 static const char kSPKIHash_Entrust_SSL[] = | 118 static const char kSPKIHash_Entrust_SSL[] = |
119 "sha1/8BdiE1U9s/8KAGv7UISX8+1i0Bo="; | 119 "\xf0\x17\x62\x13\x55\x3d\xb3\xff\x0a\x00\x6b\xfb\x50\x84\x97\xf3\xed\x62\xd
0\x1a"; |
120 | 120 |
121 static const char kSPKIHash_AAACertificateServices[] = | 121 static const char kSPKIHash_AAACertificateServices[] = |
122 "sha1/xDAoxdPjCAwQRIssd7okU5dgu/k="; | 122 "\xc4\x30\x28\xc5\xd3\xe3\x08\x0c\x10\x44\x8b\x2c\x77\xba\x24\x53\x97\x60\xb
b\xf9"; |
123 | 123 |
124 static const char kSPKIHash_AddTrustClass1CARoot[] = | 124 static const char kSPKIHash_AddTrustClass1CARoot[] = |
125 "sha1/i9vXzKBoU0IW9MErJUT8Apyli0c="; | 125 "\x8b\xdb\xd7\xcc\xa0\x68\x53\x42\x16\xf4\xc1\x2b\x25\x44\xfc\x02\x9c\xa5\x8
b\x47"; |
126 | 126 |
127 static const char kSPKIHash_AddTrustExternalCARoot[] = | 127 static const char kSPKIHash_AddTrustExternalCARoot[] = |
128 "sha1/T5x9IXmcrQ7YuQxXnxoCmeeQ84c="; | 128 "\x4f\x9c\x7d\x21\x79\x9c\xad\x0e\xd8\xb9\x0c\x57\x9f\x1a\x02\x99\xe7\x90\xf
3\x87"; |
129 | 129 |
130 static const char kSPKIHash_AddTrustPublicCARoot[] = | 130 static const char kSPKIHash_AddTrustPublicCARoot[] = |
131 "sha1/qFdl1ugyyMUZY3Namhd0OoHf7i4="; | 131 "\xa8\x57\x65\xd6\xe8\x32\xc8\xc5\x19\x63\x73\x5a\x9a\x17\x74\x3a\x81\xdf\xe
e\x2e"; |
132 | 132 |
133 static const char kSPKIHash_AddTrustQualifiedCARoot[] = | 133 static const char kSPKIHash_AddTrustQualifiedCARoot[] = |
134 "sha1/vOS3IxJVmOVjQRkcUOS2R8J2Bdc="; | 134 "\xbc\xe4\xb7\x23\x12\x55\x98\xe5\x63\x41\x19\x1c\x50\xe4\xb6\x47\xc2\x76\x0
5\xd7"; |
135 | 135 |
136 static const char kSPKIHash_COMODOCertificationAuthority[] = | 136 static const char kSPKIHash_COMODOCertificationAuthority[] = |
137 "sha1/EeSR0cnkwOuazs9zVF3h8agwPsM="; | 137 "\x11\xe4\x91\xd1\xc9\xe4\xc0\xeb\x9a\xce\xcf\x73\x54\x5d\xe1\xf1\xa8\x30\x3
e\xc3"; |
138 | 138 |
139 static const char kSPKIHash_SecureCertificateServices[] = | 139 static const char kSPKIHash_SecureCertificateServices[] = |
140 "sha1/PLQahC71XPIaPaVKyNG+OQh2N7w="; | 140 "\x3c\xb4\x1a\x84\x2e\xf5\x5c\xf2\x1a\x3d\xa5\x4a\xc8\xd1\xbe\x39\x08\x76\x3
7\xbc"; |
141 | 141 |
142 static const char kSPKIHash_TrustedCertificateServices[] = | 142 static const char kSPKIHash_TrustedCertificateServices[] = |
143 "sha1//nLI678ML7sOJhOTkzwsqY3cJJQ="; | 143 "\xfe\x72\xc8\xeb\xbf\x0c\x2f\xbb\x0e\x26\x13\x93\x93\x3c\x2c\xa9\x8d\xdc\x2
4\x94"; |
144 | 144 |
145 static const char kSPKIHash_UTNDATACorpSGC[] = | 145 static const char kSPKIHash_UTNDATACorpSGC[] = |
146 "sha1/UzLRs89/+uDxoF2FTpLSnkUdtE8="; | 146 "\x53\x32\xd1\xb3\xcf\x7f\xfa\xe0\xf1\xa0\x5d\x85\x4e\x92\xd2\x9e\x45\x1d\xb
4\x4f"; |
147 | 147 |
148 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] = | 148 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] = |
149 "sha1/iYJnfcSdJnAAS7RQSHzePa4Ebn0="; | 149 "\x89\x82\x67\x7d\xc4\x9d\x26\x70\x00\x4b\xb4\x50\x48\x7c\xde\x3d\xae\x04\x6
e\x7d"; |
150 | 150 |
151 static const char kSPKIHash_UTNUSERFirstHardware[] = | 151 static const char kSPKIHash_UTNUSERFirstHardware[] = |
152 "sha1/oXJfJhsomEOVXQc31YWWnUvSw0U="; | 152 "\xa1\x72\x5f\x26\x1b\x28\x98\x43\x95\x5d\x07\x37\xd5\x85\x96\x9d\x4b\xd2\xc
3\x45"; |
153 | 153 |
154 static const char kSPKIHash_UTNUSERFirstObject[] = | 154 static const char kSPKIHash_UTNUSERFirstObject[] = |
155 "sha1/2u1kdBScFDyr3ZmpvVsoTYs8ydg="; | 155 "\xda\xed\x64\x74\x14\x9c\x14\x3c\xab\xdd\x99\xa9\xbd\x5b\x28\x4d\x8b\x3c\xc
9\xd8"; |
156 | 156 |
157 static const char kSPKIHash_GTECyberTrustGlobalRoot[] = | 157 static const char kSPKIHash_GTECyberTrustGlobalRoot[] = |
158 "sha1/WXkS3mF11m/EI7d3E3THlt5viHI="; | 158 "\x59\x79\x12\xde\x61\x75\xd6\x6f\xc4\x23\xb7\x77\x13\x74\xc7\x96\xde\x6f\x8
8\x72"; |
159 | 159 |
160 static const char kSPKIHash_Tor2web[] = | 160 static const char kSPKIHash_Tor2web[] = |
161 "sha1/GeW1hxvUgy7I9ZSX/sZe+0jjM7E="; | 161 "\x19\xe5\xb5\x87\x1b\xd4\x83\x2e\xc8\xf5\x94\x97\xfe\xc6\x5e\xfb\x48\xe3\x3
3\xb1"; |
162 | 162 |
163 static const char kSPKIHash_AlphaSSL_G2[] = | 163 static const char kSPKIHash_AlphaSSL_G2[] = |
164 "sha1/5STpjjF9yPytkFN8kecNpHCTkF8="; | 164 "\xe5\x24\xe9\x8e\x31\x7d\xc8\xfc\xad\x90\x53\x7c\x91\xe7\x0d\xa4\x70\x93\x9
0\x5f"; |
165 | 165 |
166 // The following is static data describing the hosts that are hardcoded with | 166 // The following is static data describing the hosts that are hardcoded with |
167 // certificate pins or HSTS information. | 167 // certificate pins or HSTS information. |
168 | 168 |
169 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. | 169 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. |
170 static const char* const kNoRejectedPublicKeys[] = { | 170 static const char* const kNoRejectedPublicKeys[] = { |
171 NULL, | 171 NULL, |
172 }; | 172 }; |
173 | 173 |
174 static const char* const kTestAcceptableCerts[] = { | 174 static const char* const kTestAcceptableCerts[] = { |
(...skipping 514 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
689 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, | 689 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, |
690 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM
}, | 690 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM
}, |
691 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, | 691 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, |
692 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA
IL_COM }, | 692 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA
IL_COM }, |
693 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN
ALYTICS_COM }, | 693 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN
ALYTICS_COM }, |
694 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_
COM }, | 694 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_
COM }, |
695 }; | 695 }; |
696 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS); | 696 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS); |
697 | 697 |
698 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ | 698 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ |
OLD | NEW |