Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(184)

Side by Side Diff: net/base/transport_security_state_static.h

Issue 11274032: Separate http_security_headers from transport_security_state (Closed) Base URL: https://src.chromium.org/chrome/trunk/src/
Patch Set: Created 8 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file is automatically generated by transport_security_state_static_gener ate.go 5 // This file is automatically generated by transport_security_state_static_gener ate.go
6 6
7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 7 #ifndef NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 8 #define NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
9 9
10 // These are SubjectPublicKeyInfo hashes for public key pinning. The 10 // These are SubjectPublicKeyInfo hashes for public key pinning. The
11 // hashes are base64 encoded, SHA1 digests. 11 // hashes are base64 encoded, SHA1 digests.
12 12
13 static const char kSPKIHash_TestSPKI[] = 13 static const char kSPKIHash_TestSPKI[] =
14 "sha1/AAAAAAAAAAAAAAAAAAAAAAAAAAA="; 14 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00";
15 15
16 static const char kSPKIHash_VeriSignClass3[] = 16 static const char kSPKIHash_VeriSignClass3[] =
17 "sha1/4n972HfV354KP560yw4uqe/baXc="; 17 "\xe2\x7f\x7b\xd8\x77\xd5\xdf\x9e\x0a\x3f\x9e\xb4\xcb\x0e\x2e\xa9\xef\xdb\x6 9\x77";
18 18
19 static const char kSPKIHash_VeriSignClass3_G3[] = 19 static const char kSPKIHash_VeriSignClass3_G3[] =
20 "sha1/IvGeLsbqzPxdI0b0wuj2xVTdXgc="; 20 "\x22\xf1\x9e\x2e\xc6\xea\xcc\xfc\x5d\x23\x46\xf4\xc2\xe8\xf6\xc5\x54\xdd\x5 e\x07";
21 21
22 static const char kSPKIHash_Google1024[] = 22 static const char kSPKIHash_Google1024[] =
23 "sha1/QMVAHW+MuvCLAO3vse6H0AWzuc0="; 23 "\x40\xc5\x40\x1d\x6f\x8c\xba\xf0\x8b\x00\xed\xef\xb1\xee\x87\xd0\x05\xb3\xb 9\xcd";
24 24
25 static const char kSPKIHash_Google2048[] = 25 static const char kSPKIHash_Google2048[] =
26 "sha1/AbkhxY0L343gKf+cki7NVWp+ozk="; 26 "\x01\xb9\x21\xc5\x8d\x0b\xdf\x8d\xe0\x29\xff\x9c\x92\x2e\xcd\x55\x6a\x7e\xa 3\x39";
27 27
28 static const char kSPKIHash_EquifaxSecureCA[] = 28 static const char kSPKIHash_EquifaxSecureCA[] =
29 "sha1/SOZo+SvSspXXR9gjIBBPM5iQn9Q="; 29 "\x48\xe6\x68\xf9\x2b\xd2\xb2\x95\xd7\x47\xd8\x23\x20\x10\x4f\x33\x98\x90\x9 f\xd4";
30 30
31 static const char kSPKIHash_Aetna[] = 31 static const char kSPKIHash_Aetna[] =
32 "sha1/klKqFN6/gK4wqtlOYDhwJKVDLxo="; 32 "\x92\x52\xaa\x14\xde\xbf\x80\xae\x30\xaa\xd9\x4e\x60\x38\x70\x24\xa5\x43\x2 f\x1a";
33 33
34 static const char kSPKIHash_GeoTrustGlobal[] = 34 static const char kSPKIHash_GeoTrustGlobal[] =
35 "sha1/wHqYaI2J+6sFZAwRfap9ZbjKzE4="; 35 "\xc0\x7a\x98\x68\x8d\x89\xfb\xab\x05\x64\x0c\x11\x7d\xaa\x7d\x65\xb8\xca\xc c\x4e";
36 36
37 static const char kSPKIHash_GeoTrustPrimary[] = 37 static const char kSPKIHash_GeoTrustPrimary[] =
38 "sha1/sBmJ5+/7Sq/LFI9YRjl2IkFQ4bo="; 38 "\xb0\x19\x89\xe7\xef\xfb\x4a\xaf\xcb\x14\x8f\x58\x46\x39\x76\x22\x41\x50\xe 1\xba";
39 39
40 static const char kSPKIHash_Intel[] = 40 static const char kSPKIHash_Intel[] =
41 "sha1/DsYq91myCBCQJW/D3f2KZjEwK8U="; 41 "\x0e\xc6\x2a\xf7\x59\xb2\x08\x10\x90\x25\x6f\xc3\xdd\xfd\x8a\x66\x31\x30\x2 b\xc5";
42 42
43 static const char kSPKIHash_TCTrustCenter[] = 43 static const char kSPKIHash_TCTrustCenter[] =
44 "sha1/gzuEEAB/bkqdQS3EIjk2by7lW+k="; 44 "\x83\x3b\x84\x10\x00\x7f\x6e\x4a\x9d\x41\x2d\xc4\x22\x39\x36\x6f\x2e\xe5\x5 b\xe9";
45 45
46 static const char kSPKIHash_Vodafone[] = 46 static const char kSPKIHash_Vodafone[] =
47 "sha1/DX/hXFUUNmiZ/EDWIgjvIuvRFRw="; 47 "\x0d\x7f\xe1\x5c\x55\x14\x36\x68\x99\xfc\x40\xd6\x22\x08\xef\x22\xeb\xd1\x1 5\x1c";
48 48
49 static const char kSPKIHash_RapidSSL[] = 49 static const char kSPKIHash_RapidSSL[] =
50 "sha1/o5OZxATDsgmwgcIfIWIneMJ0jkw="; 50 "\xa3\x93\x99\xc4\x04\xc3\xb2\x09\xb0\x81\xc2\x1f\x21\x62\x27\x78\xc2\x74\x8 e\x4c";
51 51
52 static const char kSPKIHash_DigiCertEVRoot[] = 52 static const char kSPKIHash_DigiCertEVRoot[] =
53 "sha1/gzF+YoVCU9bXeDGQ7JGQVumRueM="; 53 "\x83\x31\x7e\x62\x85\x42\x53\xd6\xd7\x78\x31\x90\xec\x91\x90\x56\xe9\x91\xb 9\xe3";
54 54
55 static const char kSPKIHash_Tor1[] = 55 static const char kSPKIHash_Tor1[] =
56 "sha1/juNxSTv9UANmpC9kF5GKpmWNx3Y="; 56 "\x8e\xe3\x71\x49\x3b\xfd\x50\x03\x66\xa4\x2f\x64\x17\x91\x8a\xa6\x65\x8d\xc 7\x76";
57 57
58 static const char kSPKIHash_Tor2[] = 58 static const char kSPKIHash_Tor2[] =
59 "sha1/lia43lPolzSPVIq34Dw57uYcLD8="; 59 "\x96\x26\xb8\xde\x53\xe8\x97\x34\x8f\x54\x8a\xb7\xe0\x3c\x39\xee\xe6\x1c\x2 c\x3f";
60 60
61 static const char kSPKIHash_Tor3[] = 61 static const char kSPKIHash_Tor3[] =
62 "sha1/rzEyQIKOh77j87n5bjWUNguXF8Y="; 62 "\xaf\x31\x32\x40\x82\x8e\x87\xbe\xe3\xf3\xb9\xf9\x6e\x35\x94\x36\x0b\x97\x1 7\xc6";
63 63
64 static const char kSPKIHash_VeriSignClass1[] = 64 static const char kSPKIHash_VeriSignClass1[] =
65 "sha1/I0PRSKJViZuUfUYaeX7ATP7RcLc="; 65 "\x23\x43\xd1\x48\xa2\x55\x89\x9b\x94\x7d\x46\x1a\x79\x7e\xc0\x4c\xfe\xd1\x7 0\xb7";
66 66
67 static const char kSPKIHash_VeriSignClass3_G4[] = 67 static const char kSPKIHash_VeriSignClass3_G4[] =
68 "sha1/7WYxNdMb1OymFMQp4xkGn5TBJlA="; 68 "\xed\x66\x31\x35\xd3\x1b\xd4\xec\xa6\x14\xc4\x29\xe3\x19\x06\x9f\x94\xc1\x2 6\x50";
69 69
70 static const char kSPKIHash_VeriSignClass4_G3[] = 70 static const char kSPKIHash_VeriSignClass4_G3[] =
71 "sha1/PANDaGiVHPNpKri0Jtq6j+ki5b0="; 71 "\x3c\x03\x43\x68\x68\x95\x1c\xf3\x69\x2a\xb8\xb4\x26\xda\xba\x8f\xe9\x22\xe 5\xbd";
72 72
73 static const char kSPKIHash_VeriSignClass1_G3[] = 73 static const char kSPKIHash_VeriSignClass1_G3[] =
74 "sha1/VRmyeKyygdftp6vBg5nDu2kEJLU="; 74 "\x55\x19\xb2\x78\xac\xb2\x81\xd7\xed\xa7\xab\xc1\x83\x99\xc3\xbb\x69\x04\x2 4\xb5";
75 75
76 static const char kSPKIHash_VeriSignClass2_G3[] = 76 static const char kSPKIHash_VeriSignClass2_G3[] =
77 "sha1/Wr7Fddyu87COJxlD/H8lDD32YeM="; 77 "\x5a\xbe\xc5\x75\xdc\xae\xf3\xb0\x8e\x27\x19\x43\xfc\x7f\x25\x0c\x3d\xf6\x6 1\xe3";
78 78
79 static const char kSPKIHash_VeriSignClass3_G2[] = 79 static const char kSPKIHash_VeriSignClass3_G2[] =
80 "sha1/GiG0lStik84Ys2XsnA6TTLOB5tQ="; 80 "\x1a\x21\xb4\x95\x2b\x62\x93\xce\x18\xb3\x65\xec\x9c\x0e\x93\x4c\xb3\x81\xe 6\xd4";
81 81
82 static const char kSPKIHash_VeriSignClass2_G2[] = 82 static const char kSPKIHash_VeriSignClass2_G2[] =
83 "sha1/Eje6RRfurSkm/cHN/r7t8t7ZFFw="; 83 "\x12\x37\xba\x45\x17\xee\xad\x29\x26\xfd\xc1\xcd\xfe\xbe\xed\xf2\xde\xd9\x1 4\x5c";
84 84
85 static const char kSPKIHash_VeriSignClass3_G5[] = 85 static const char kSPKIHash_VeriSignClass3_G5[] =
86 "sha1/sYEIGhmkwJQf+uiVKMEkyZs0rMc="; 86 "\xb1\x81\x08\x1a\x19\xa4\xc0\x94\x1f\xfa\xe8\x95\x28\xc1\x24\xc9\x9b\x34\xa c\xc7";
87 87
88 static const char kSPKIHash_VeriSignUniversal[] = 88 static const char kSPKIHash_VeriSignUniversal[] =
89 "sha1/u8I+KQuzKHcdrT6iTb30I70GsD0="; 89 "\xbb\xc2\x3e\x29\x0b\xb3\x28\x77\x1d\xad\x3e\xa2\x4d\xbd\xf4\x23\xbd\x06\xb 0\x3d";
90 90
91 static const char kSPKIHash_Twitter1[] = 91 static const char kSPKIHash_Twitter1[] =
92 "sha1/Vv7zwhR9TtOIN/29MFI4cgHld40="; 92 "\x56\xfe\xf3\xc2\x14\x7d\x4e\xd3\x88\x37\xfd\xbd\x30\x52\x38\x72\x01\xe5\x7 7\x8d";
93 93
94 static const char kSPKIHash_GeoTrustGlobal2[] = 94 static const char kSPKIHash_GeoTrustGlobal2[] =
95 "sha1/cTg28gIxU0crbrplRqkQFVggBQk="; 95 "\x71\x38\x36\xf2\x02\x31\x53\x47\x2b\x6e\xba\x65\x46\xa9\x10\x15\x58\x20\x0 5\x09";
96 96
97 static const char kSPKIHash_GeoTrustUniversal[] = 97 static const char kSPKIHash_GeoTrustUniversal[] =
98 "sha1/h+hbY1PGI6MSjLD/u/VR/lmADiI="; 98 "\x87\xe8\x5b\x63\x53\xc6\x23\xa3\x12\x8c\xb0\xff\xbb\xf5\x51\xfe\x59\x80\x0 e\x22";
99 99
100 static const char kSPKIHash_GeoTrustUniversal2[] = 100 static const char kSPKIHash_GeoTrustUniversal2[] =
101 "sha1/Xk9ThoXdT57KX9wNRW99UbHcm3s="; 101 "\x5e\x4f\x53\x86\x85\xdd\x4f\x9e\xca\x5f\xdc\x0d\x45\x6f\x7d\x51\xb1\xdc\x9 b\x7b";
102 102
103 static const char kSPKIHash_GeoTrustPrimary_G2[] = 103 static const char kSPKIHash_GeoTrustPrimary_G2[] =
104 "sha1/vb6nG6txV/nkddlU0rcngBqCJoI="; 104 "\xbd\xbe\xa7\x1b\xab\x71\x57\xf9\xe4\x75\xd9\x54\xd2\xb7\x27\x80\x1a\x82\x2 6\x82";
105 105
106 static const char kSPKIHash_GeoTrustPrimary_G3[] = 106 static const char kSPKIHash_GeoTrustPrimary_G3[] =
107 "sha1/nKmNAK90Dd2BgNITRaWLjy6UONY="; 107 "\x9c\xa9\x8d\x00\xaf\x74\x0d\xdd\x81\x80\xd2\x13\x45\xa5\x8b\x8f\x2e\x94\x3 8\xd6";
108 108
109 static const char kSPKIHash_Entrust_2048[] = 109 static const char kSPKIHash_Entrust_2048[] =
110 "sha1/VeSB0RGAvtiJuQijMfmhJAkWuXA="; 110 "\x55\xe4\x81\xd1\x11\x80\xbe\xd8\x89\xb9\x08\xa3\x31\xf9\xa1\x24\x09\x16\xb 9\x70";
111 111
112 static const char kSPKIHash_Entrust_EV[] = 112 static const char kSPKIHash_Entrust_EV[] =
113 "sha1/ukKwgYhTiB2GY71MwF4I/upuu3c="; 113 "\xba\x42\xb0\x81\x88\x53\x88\x1d\x86\x63\xbd\x4c\xc0\x5e\x08\xfe\xea\x6e\xb b\x77";
114 114
115 static const char kSPKIHash_Entrust_G2[] = 115 static const char kSPKIHash_Entrust_G2[] =
116 "sha1/qzDTr0vY8WtYae5FaSnahLhzlIg="; 116 "\xab\x30\xd3\xaf\x4b\xd8\xf1\x6b\x58\x69\xee\x45\x69\x29\xda\x84\xb8\x73\x9 4\x88";
117 117
118 static const char kSPKIHash_Entrust_SSL[] = 118 static const char kSPKIHash_Entrust_SSL[] =
119 "sha1/8BdiE1U9s/8KAGv7UISX8+1i0Bo="; 119 "\xf0\x17\x62\x13\x55\x3d\xb3\xff\x0a\x00\x6b\xfb\x50\x84\x97\xf3\xed\x62\xd 0\x1a";
120 120
121 static const char kSPKIHash_AAACertificateServices[] = 121 static const char kSPKIHash_AAACertificateServices[] =
122 "sha1/xDAoxdPjCAwQRIssd7okU5dgu/k="; 122 "\xc4\x30\x28\xc5\xd3\xe3\x08\x0c\x10\x44\x8b\x2c\x77\xba\x24\x53\x97\x60\xb b\xf9";
123 123
124 static const char kSPKIHash_AddTrustClass1CARoot[] = 124 static const char kSPKIHash_AddTrustClass1CARoot[] =
125 "sha1/i9vXzKBoU0IW9MErJUT8Apyli0c="; 125 "\x8b\xdb\xd7\xcc\xa0\x68\x53\x42\x16\xf4\xc1\x2b\x25\x44\xfc\x02\x9c\xa5\x8 b\x47";
126 126
127 static const char kSPKIHash_AddTrustExternalCARoot[] = 127 static const char kSPKIHash_AddTrustExternalCARoot[] =
128 "sha1/T5x9IXmcrQ7YuQxXnxoCmeeQ84c="; 128 "\x4f\x9c\x7d\x21\x79\x9c\xad\x0e\xd8\xb9\x0c\x57\x9f\x1a\x02\x99\xe7\x90\xf 3\x87";
129 129
130 static const char kSPKIHash_AddTrustPublicCARoot[] = 130 static const char kSPKIHash_AddTrustPublicCARoot[] =
131 "sha1/qFdl1ugyyMUZY3Namhd0OoHf7i4="; 131 "\xa8\x57\x65\xd6\xe8\x32\xc8\xc5\x19\x63\x73\x5a\x9a\x17\x74\x3a\x81\xdf\xe e\x2e";
132 132
133 static const char kSPKIHash_AddTrustQualifiedCARoot[] = 133 static const char kSPKIHash_AddTrustQualifiedCARoot[] =
134 "sha1/vOS3IxJVmOVjQRkcUOS2R8J2Bdc="; 134 "\xbc\xe4\xb7\x23\x12\x55\x98\xe5\x63\x41\x19\x1c\x50\xe4\xb6\x47\xc2\x76\x0 5\xd7";
135 135
136 static const char kSPKIHash_COMODOCertificationAuthority[] = 136 static const char kSPKIHash_COMODOCertificationAuthority[] =
137 "sha1/EeSR0cnkwOuazs9zVF3h8agwPsM="; 137 "\x11\xe4\x91\xd1\xc9\xe4\xc0\xeb\x9a\xce\xcf\x73\x54\x5d\xe1\xf1\xa8\x30\x3 e\xc3";
138 138
139 static const char kSPKIHash_SecureCertificateServices[] = 139 static const char kSPKIHash_SecureCertificateServices[] =
140 "sha1/PLQahC71XPIaPaVKyNG+OQh2N7w="; 140 "\x3c\xb4\x1a\x84\x2e\xf5\x5c\xf2\x1a\x3d\xa5\x4a\xc8\xd1\xbe\x39\x08\x76\x3 7\xbc";
141 141
142 static const char kSPKIHash_TrustedCertificateServices[] = 142 static const char kSPKIHash_TrustedCertificateServices[] =
143 "sha1//nLI678ML7sOJhOTkzwsqY3cJJQ="; 143 "\xfe\x72\xc8\xeb\xbf\x0c\x2f\xbb\x0e\x26\x13\x93\x93\x3c\x2c\xa9\x8d\xdc\x2 4\x94";
144 144
145 static const char kSPKIHash_UTNDATACorpSGC[] = 145 static const char kSPKIHash_UTNDATACorpSGC[] =
146 "sha1/UzLRs89/+uDxoF2FTpLSnkUdtE8="; 146 "\x53\x32\xd1\xb3\xcf\x7f\xfa\xe0\xf1\xa0\x5d\x85\x4e\x92\xd2\x9e\x45\x1d\xb 4\x4f";
147 147
148 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] = 148 static const char kSPKIHash_UTNUSERFirstClientAuthenticationandEmail[] =
149 "sha1/iYJnfcSdJnAAS7RQSHzePa4Ebn0="; 149 "\x89\x82\x67\x7d\xc4\x9d\x26\x70\x00\x4b\xb4\x50\x48\x7c\xde\x3d\xae\x04\x6 e\x7d";
150 150
151 static const char kSPKIHash_UTNUSERFirstHardware[] = 151 static const char kSPKIHash_UTNUSERFirstHardware[] =
152 "sha1/oXJfJhsomEOVXQc31YWWnUvSw0U="; 152 "\xa1\x72\x5f\x26\x1b\x28\x98\x43\x95\x5d\x07\x37\xd5\x85\x96\x9d\x4b\xd2\xc 3\x45";
153 153
154 static const char kSPKIHash_UTNUSERFirstObject[] = 154 static const char kSPKIHash_UTNUSERFirstObject[] =
155 "sha1/2u1kdBScFDyr3ZmpvVsoTYs8ydg="; 155 "\xda\xed\x64\x74\x14\x9c\x14\x3c\xab\xdd\x99\xa9\xbd\x5b\x28\x4d\x8b\x3c\xc 9\xd8";
156 156
157 static const char kSPKIHash_GTECyberTrustGlobalRoot[] = 157 static const char kSPKIHash_GTECyberTrustGlobalRoot[] =
158 "sha1/WXkS3mF11m/EI7d3E3THlt5viHI="; 158 "\x59\x79\x12\xde\x61\x75\xd6\x6f\xc4\x23\xb7\x77\x13\x74\xc7\x96\xde\x6f\x8 8\x72";
159 159
160 static const char kSPKIHash_Tor2web[] = 160 static const char kSPKIHash_Tor2web[] =
161 "sha1/GeW1hxvUgy7I9ZSX/sZe+0jjM7E="; 161 "\x19\xe5\xb5\x87\x1b\xd4\x83\x2e\xc8\xf5\x94\x97\xfe\xc6\x5e\xfb\x48\xe3\x3 3\xb1";
162 162
163 static const char kSPKIHash_AlphaSSL_G2[] = 163 static const char kSPKIHash_AlphaSSL_G2[] =
164 "sha1/5STpjjF9yPytkFN8kecNpHCTkF8="; 164 "\xe5\x24\xe9\x8e\x31\x7d\xc8\xfc\xad\x90\x53\x7c\x91\xe7\x0d\xa4\x70\x93\x9 0\x5f";
165 165
166 // The following is static data describing the hosts that are hardcoded with 166 // The following is static data describing the hosts that are hardcoded with
167 // certificate pins or HSTS information. 167 // certificate pins or HSTS information.
168 168
169 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. 169 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected.
170 static const char* const kNoRejectedPublicKeys[] = { 170 static const char* const kNoRejectedPublicKeys[] = {
171 NULL, 171 NULL,
172 }; 172 };
173 173
174 static const char* const kTestAcceptableCerts[] = { 174 static const char* const kTestAcceptableCerts[] = {
(...skipping 514 matching lines...) Expand 10 before | Expand all | Expand 10 after
689 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 689 {11, false, "\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
690 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM }, 690 {16, false, "\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMAIL_COM },
691 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM }, 691 {15, false, "\003www\005gmail\003com", true, kGooglePins, DOMAIN_GMAIL_COM },
692 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM }, 692 {20, false, "\003www\012googlemail\003com", true, kGooglePins, DOMAIN_GOOGLEMA IL_COM },
693 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM }, 693 {22, true, "\020google-analytics\003com", false, kGooglePins, DOMAIN_GOOGLE_AN ALYTICS_COM },
694 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM }, 694 {18, true, "\014googlegroups\003com", false, kGooglePins, DOMAIN_GOOGLEGROUPS_ COM },
695 }; 695 };
696 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS); 696 static const size_t kNumPreloadedSNISTS = ARRAYSIZE_UNSAFE(kPreloadedSNISTS);
697 697
698 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_ 698 #endif // NET_BASE_TRANSPORT_SECURITY_STATE_STATIC_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698