OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_BASE_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 5 #ifndef NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
6 #define NET_BASE_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 6 #define NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
7 | 7 |
8 // This is the set of 318 Microsoft trusted roots from 1st April 2011. | 8 // This is the set of 318 Microsoft trusted roots from 1st April 2011. |
9 // Extracted from | 9 // Extracted from |
10 // http://www.download.windowsupdate.com/msdownload/update/v3/ | 10 // http://www.download.windowsupdate.com/msdownload/update/v3/ |
11 // static/trustedr/en/authrootstl.cab | 11 // static/trustedr/en/authrootstl.cab |
12 // (sha1sum: 62f2d9b91a5a0032be6795bb4b6e2b4bfeb8bbb3) | 12 // (sha1sum: 62f2d9b91a5a0032be6795bb4b6e2b4bfeb8bbb3) |
13 // | 13 // |
14 // Note that these *are not* trust anchors for Chromium. They are only used to | 14 // Note that these *are not* trust anchors for Chromium. They are only used to |
15 // distinguish `real' root CAs from roots that were user-installed. | 15 // distinguish `real' root CAs from roots that were user-installed. |
16 static uint8 kKnownRootCertSHA1Hashes[][20] = { | 16 static uint8 kKnownRootCertSHA1Hashes[][20] = { |
(...skipping 628 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
645 {0xfa, 0xaa, 0x27, 0xb8, 0xca, 0xf5, 0xfd, 0xf5, 0xcd, 0xa9, | 645 {0xfa, 0xaa, 0x27, 0xb8, 0xca, 0xf5, 0xfd, 0xf5, 0xcd, 0xa9, |
646 0x8a, 0xc3, 0x37, 0x85, 0x72, 0xe0, 0x4c, 0xe8, 0xf2, 0xe0}, | 646 0x8a, 0xc3, 0x37, 0x85, 0x72, 0xe0, 0x4c, 0xe8, 0xf2, 0xe0}, |
647 {0xfa, 0xb7, 0xee, 0x36, 0x97, 0x26, 0x62, 0xfb, 0x2d, 0xb0, | 647 {0xfa, 0xb7, 0xee, 0x36, 0x97, 0x26, 0x62, 0xfb, 0x2d, 0xb0, |
648 0x2a, 0xf6, 0xbf, 0x03, 0xfd, 0xe8, 0x7c, 0x4b, 0x2f, 0x9b}, | 648 0x2a, 0xf6, 0xbf, 0x03, 0xfd, 0xe8, 0x7c, 0x4b, 0x2f, 0x9b}, |
649 {0xfd, 0x1e, 0xd1, 0xe2, 0x02, 0x1b, 0x0b, 0x9f, 0x73, 0xe8, | 649 {0xfd, 0x1e, 0xd1, 0xe2, 0x02, 0x1b, 0x0b, 0x9f, 0x73, 0xe8, |
650 0xeb, 0x75, 0xce, 0x23, 0x43, 0x6b, 0xbc, 0xc7, 0x46, 0xeb}, | 650 0xeb, 0x75, 0xce, 0x23, 0x43, 0x6b, 0xbc, 0xc7, 0x46, 0xeb}, |
651 {0xfe, 0xb8, 0xc4, 0x32, 0xdc, 0xf9, 0x76, 0x9a, 0xce, 0xae, | 651 {0xfe, 0xb8, 0xc4, 0x32, 0xdc, 0xf9, 0x76, 0x9a, 0xce, 0xae, |
652 0x3d, 0xd8, 0x90, 0x8f, 0xfd, 0x28, 0x86, 0x65, 0x64, 0x7d}, | 652 0x3d, 0xd8, 0x90, 0x8f, 0xfd, 0x28, 0x86, 0x65, 0x64, 0x7d}, |
653 }; | 653 }; |
654 | 654 |
655 #endif // NET_BASE_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 655 #endif // NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
OLD | NEW |