OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 5 #ifndef NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
6 #define NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 6 #define NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
7 | 7 |
| 8 #include <stdint.h> |
| 9 |
8 // This is a union of Microsoft trust roots over time, from 29 April | 10 // This is a union of Microsoft trust roots over time, from 29 April |
9 // 2013 through 15 May 2015. | 11 // 2013 through 15 May 2015. |
10 // | 12 // |
11 // Extracted from | 13 // Extracted from |
12 // http://www.download.windowsupdate.com/msdownload/update/v3/ | 14 // http://www.download.windowsupdate.com/msdownload/update/v3/ |
13 // static/trustedr/en/authrootstl.cab | 15 // static/trustedr/en/authrootstl.cab |
14 // | 16 // |
15 // Note that these *are not* trust anchors for Chromium. They are only used to | 17 // Note that these *are not* trust anchors for Chromium. They are only used to |
16 // distinguish `real' root CAs from roots that were user-installed. | 18 // distinguish `real' root CAs from roots that were user-installed. |
17 static uint8_t kKnownRootCertSHA1Hashes[][20] = { | 19 static uint8_t kKnownRootCertSHA1Hashes[][20] = { |
(...skipping 815 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
833 0xeb, 0x75, 0xce, 0x23, 0x43, 0x6b, 0xbc, 0xc7, 0x46, 0xeb}, | 835 0xeb, 0x75, 0xce, 0x23, 0x43, 0x6b, 0xbc, 0xc7, 0x46, 0xeb}, |
834 {0xfe, 0x45, 0x65, 0x9b, 0x79, 0x03, 0x5b, 0x98, 0xa1, 0x61, | 836 {0xfe, 0x45, 0x65, 0x9b, 0x79, 0x03, 0x5b, 0x98, 0xa1, 0x61, |
835 0xb5, 0x51, 0x2e, 0xac, 0xda, 0x58, 0x09, 0x48, 0x22, 0x4d}, | 837 0xb5, 0x51, 0x2e, 0xac, 0xda, 0x58, 0x09, 0x48, 0x22, 0x4d}, |
836 {0xfe, 0xb8, 0xc4, 0x32, 0xdc, 0xf9, 0x76, 0x9a, 0xce, 0xae, | 838 {0xfe, 0xb8, 0xc4, 0x32, 0xdc, 0xf9, 0x76, 0x9a, 0xce, 0xae, |
837 0x3d, 0xd8, 0x90, 0x8f, 0xfd, 0x28, 0x86, 0x65, 0x64, 0x7d}, | 839 0x3d, 0xd8, 0x90, 0x8f, 0xfd, 0x28, 0x86, 0x65, 0x64, 0x7d}, |
838 {0xff, 0xb7, 0xe0, 0x8f, 0x66, 0xe1, 0xd0, 0xc2, 0x58, 0x2f, | 840 {0xff, 0xb7, 0xe0, 0x8f, 0x66, 0xe1, 0xd0, 0xc2, 0x58, 0x2f, |
839 0x02, 0x45, 0xc4, 0x97, 0x02, 0x92, 0xa4, 0x6e, 0x88, 0x03}, | 841 0x02, 0x45, 0xc4, 0x97, 0x02, 0x92, 0xa4, 0x6e, 0x88, 0x03}, |
840 }; | 842 }; |
841 | 843 |
842 #endif // NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ | 844 #endif // NET_CERT_X509_CERTIFICATE_KNOWN_ROOTS_WIN_H_ |
OLD | NEW |