OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file is automatically generated by transport_security_state_static_gener
ate.go. | 5 // This file is automatically generated by transport_security_state_static_gener
ate.go. |
6 // You can find it at https://github.com/agl/transport-security-state-generate. | 6 // You can find it at https://github.com/agl/transport-security-state-generate. |
7 | 7 |
8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
10 | 10 |
(...skipping 520 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
531 "\x2e\x93\x25\x68\x31\x64\x21\xd0\xcd\x2e"; | 531 "\x2e\x93\x25\x68\x31\x64\x21\xd0\xcd\x2e"; |
532 | 532 |
533 // The following is static data describing the hosts that are hardcoded with | 533 // The following is static data describing the hosts that are hardcoded with |
534 // certificate pins or HSTS information. | 534 // certificate pins or HSTS information. |
535 | 535 |
536 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. | 536 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. |
537 static const char* const kNoRejectedPublicKeys[] = { | 537 static const char* const kNoRejectedPublicKeys[] = { |
538 NULL, | 538 NULL, |
539 }; | 539 }; |
540 | 540 |
| 541 // kNoReportUri is a placeholder for when a pinset does not have a report URI. |
| 542 static const char kNoReportUri[] = ""; |
| 543 |
541 static const char* const kTestAcceptableCerts[] = { | 544 static const char* const kTestAcceptableCerts[] = { |
542 kSPKIHash_TestSPKI, | 545 kSPKIHash_TestSPKI, |
543 NULL, | 546 NULL, |
544 }; | 547 }; |
545 static const char* const kGoogleAcceptableCerts[] = { | 548 static const char* const kGoogleAcceptableCerts[] = { |
546 kSPKIHash_GoogleBackup2048, | 549 kSPKIHash_GoogleBackup2048, |
547 kSPKIHash_GoogleG2, | 550 kSPKIHash_GoogleG2, |
548 kSPKIHash_GeoTrustGlobal, | 551 kSPKIHash_GeoTrustGlobal, |
549 NULL, | 552 NULL, |
550 }; | 553 }; |
| 554 static const char kGoogleReportUri[] = |
| 555 "http://clients3.google.com/cert_upload_json"; |
551 static const char* const kTorAcceptableCerts[] = { | 556 static const char* const kTorAcceptableCerts[] = { |
552 kSPKIHash_RapidSSL, | 557 kSPKIHash_RapidSSL, |
553 kSPKIHash_DigiCertEVRoot, | 558 kSPKIHash_DigiCertEVRoot, |
554 kSPKIHash_Tor1, | 559 kSPKIHash_Tor1, |
555 kSPKIHash_Tor2, | 560 kSPKIHash_Tor2, |
556 kSPKIHash_Tor3, | 561 kSPKIHash_Tor3, |
557 NULL, | 562 NULL, |
558 }; | 563 }; |
559 static const char* const kTwitterComAcceptableCerts[] = { | 564 static const char* const kTwitterComAcceptableCerts[] = { |
560 kSPKIHash_VeriSignClass1, | 565 kSPKIHash_VeriSignClass1, |
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
659 kSPKIHash_GeoTrustGlobal, | 664 kSPKIHash_GeoTrustGlobal, |
660 kSPKIHash_DigiCertEVRoot, | 665 kSPKIHash_DigiCertEVRoot, |
661 kSPKIHash_SpiderOak2, | 666 kSPKIHash_SpiderOak2, |
662 kSPKIHash_SpiderOak3, | 667 kSPKIHash_SpiderOak3, |
663 NULL, | 668 NULL, |
664 }; | 669 }; |
665 | 670 |
666 struct Pinset { | 671 struct Pinset { |
667 const char *const *const accepted_pins; | 672 const char *const *const accepted_pins; |
668 const char *const *const rejected_pins; | 673 const char *const *const rejected_pins; |
| 674 const char* const report_uri; |
669 }; | 675 }; |
670 | 676 |
671 static const struct Pinset kPinsets[] = { | 677 static const struct Pinset kPinsets[] = { |
672 {kTestAcceptableCerts, kNoRejectedPublicKeys}, | 678 {kTestAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
673 {kGoogleAcceptableCerts, kNoRejectedPublicKeys}, | 679 {kGoogleAcceptableCerts, kNoRejectedPublicKeys, kGoogleReportUri}, |
674 {kTorAcceptableCerts, kNoRejectedPublicKeys}, | 680 {kTorAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
675 {kTwitterComAcceptableCerts, kNoRejectedPublicKeys}, | 681 {kTwitterComAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
676 {kTwitterCDNAcceptableCerts, kNoRejectedPublicKeys}, | 682 {kTwitterCDNAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
677 {kDropboxAcceptableCerts, kNoRejectedPublicKeys}, | 683 {kDropboxAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
678 {kFacebookAcceptableCerts, kNoRejectedPublicKeys}, | 684 {kFacebookAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
679 {kSpideroakAcceptableCerts, kNoRejectedPublicKeys}, | 685 {kSpideroakAcceptableCerts, kNoRejectedPublicKeys, kNoReportUri}, |
680 }; | 686 }; |
681 | 687 |
682 // kHSTSHuffmanTree describes a Huffman tree. The nodes of the tree are pairs | 688 // kHSTSHuffmanTree describes a Huffman tree. The nodes of the tree are pairs |
683 // of uint8s. The last node in the array is the root of the tree. Each pair is | 689 // of uint8s. The last node in the array is the root of the tree. Each pair is |
684 // two uint8 values, the first is "left" and the second is "right". If a uint8 | 690 // two uint8 values, the first is "left" and the second is "right". If a uint8 |
685 // value has the MSB set then it represents a literal leaf value. Otherwise | 691 // value has the MSB set then it represents a literal leaf value. Otherwise |
686 // it's a pointer to the n'th element of the array. | 692 // it's a pointer to the n'th element of the array. |
687 static const uint8 kHSTSHuffmanTree[] = { | 693 static const uint8 kHSTSHuffmanTree[] = { |
688 0xe4, 0xf5, 0x00, 0xf2, 0x01, 0x80, 0xb7, 0xb6, 0xb5, 0x03, 0x04, 0xb2, | 694 0xe4, 0xf5, 0x00, 0xf2, 0x01, 0x80, 0xb7, 0xb6, 0xb5, 0x03, 0x04, 0xb2, |
689 0xb4, 0xf1, 0x05, 0x06, 0xb9, 0xb8, 0x08, 0xb1, 0xb0, 0xb3, 0x09, 0x0a, | 695 0xb4, 0xf1, 0x05, 0x06, 0xb9, 0xb8, 0x08, 0xb1, 0xb0, 0xb3, 0x09, 0x0a, |
(...skipping 2441 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3131 0x43, 0x4e, 0xd2, 0xd5, 0x68, 0x0b, 0xeb, 0xc9, 0x3f, 0x0d, 0xaa, 0xbd, | 3137 0x43, 0x4e, 0xd2, 0xd5, 0x68, 0x0b, 0xeb, 0xc9, 0x3f, 0x0d, 0xaa, 0xbd, |
3132 0xd9, 0x4a, 0xc8, 0x62, 0x5f, 0xe6, 0xdc, 0xb8, 0x4f, 0xb4, 0x82, 0x8d, | 3138 0xd9, 0x4a, 0xc8, 0x62, 0x5f, 0xe6, 0xdc, 0xb8, 0x4f, 0xb4, 0x82, 0x8d, |
3133 0xaa, 0xda, 0xaa, 0x80, | 3139 0xaa, 0xda, 0xaa, 0x80, |
3134 }; | 3140 }; |
3135 | 3141 |
3136 static const unsigned kPreloadedHSTSBits = 233785; | 3142 static const unsigned kPreloadedHSTSBits = 233785; |
3137 | 3143 |
3138 static const unsigned kHSTSRootPosition = 233177; | 3144 static const unsigned kHSTSRootPosition = 233177; |
3139 | 3145 |
3140 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 3146 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
OLD | NEW |