OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file is automatically generated by transport_security_state_static_gener
ate.go. | 5 // This file is automatically generated by transport_security_state_static_gener
ate.go. |
6 // You can find it at https://github.com/agl/transport-security-state-generate. | 6 // You can find it at https://github.com/agl/transport-security-state-generate. |
7 | 7 |
8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
10 | 10 |
(...skipping 499 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
510 "\x79\x1b\x99\xfb\x9f\x28\x81\x2a\x60\xe0"; | 510 "\x79\x1b\x99\xfb\x9f\x28\x81\x2a\x60\xe0"; |
511 | 511 |
512 static const char kSPKIHash_DigiCertECCSecureServerCA[] = | 512 static const char kSPKIHash_DigiCertECCSecureServerCA[] = |
513 "\xc3\x02\xb1\x73\x62\x0b\x47\x78\x5d\x21" | 513 "\xc3\x02\xb1\x73\x62\x0b\x47\x78\x5d\x21" |
514 "\xe2\x4d\xb3\xac\x46\xb1\xfc\xb8\xc5\xa9"; | 514 "\xe2\x4d\xb3\xac\x46\xb1\xfc\xb8\xc5\xa9"; |
515 | 515 |
516 static const char kSPKIHash_FacebookBackup[] = | 516 static const char kSPKIHash_FacebookBackup[] = |
517 "\xd7\x0c\x3c\x13\x40\x18\xb1\x1d\xa8\x5f" | 517 "\xd7\x0c\x3c\x13\x40\x18\xb1\x1d\xa8\x5f" |
518 "\x99\x67\x76\x4d\xa1\xc2\x9d\x94\xa2\xc9"; | 518 "\x99\x67\x76\x4d\xa1\xc2\x9d\x94\xa2\xc9"; |
519 | 519 |
520 static const char kSPKIHash_SpiderOak1[] = | |
521 "\x50\xfa\xef\x15\x44\xab\xa7\xd6\x9a\x97" | |
522 "\x9b\xfa\x46\x7d\x09\xbf\x76\x09\xff\x05"; | |
523 | |
524 static const char kSPKIHash_SpiderOak2[] = | 520 static const char kSPKIHash_SpiderOak2[] = |
525 "\x0f\x47\xd2\xfe\x1a\xae\x03\xa4\x29\xae" | 521 "\x0f\x47\xd2\xfe\x1a\xae\x03\xa4\x29\xae" |
526 "\x5b\x9c\x8b\x23\xb5\x86\x51\x54\x03\x18"; | 522 "\x5b\x9c\x8b\x23\xb5\x86\x51\x54\x03\x18"; |
527 | 523 |
| 524 static const char kSPKIHash_SpiderOak3[] = |
| 525 "\x97\x92\x68\x21\x7b\xf8\x97\x3b\x59\xf8" |
| 526 "\x2e\x93\x25\x68\x31\x64\x21\xd0\xcd\x2e"; |
| 527 |
528 // The following is static data describing the hosts that are hardcoded with | 528 // The following is static data describing the hosts that are hardcoded with |
529 // certificate pins or HSTS information. | 529 // certificate pins or HSTS information. |
530 | 530 |
531 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. | 531 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. |
532 static const char* const kNoRejectedPublicKeys[] = { | 532 static const char* const kNoRejectedPublicKeys[] = { |
533 NULL, | 533 NULL, |
534 }; | 534 }; |
535 | 535 |
536 static const char* const kTestAcceptableCerts[] = { | 536 static const char* const kTestAcceptableCerts[] = { |
537 kSPKIHash_TestSPKI, | 537 kSPKIHash_TestSPKI, |
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
643 NULL, | 643 NULL, |
644 }; | 644 }; |
645 static const char* const kFacebookAcceptableCerts[] = { | 645 static const char* const kFacebookAcceptableCerts[] = { |
646 kSPKIHash_SymantecClass3EVG3, | 646 kSPKIHash_SymantecClass3EVG3, |
647 kSPKIHash_DigiCertECCSecureServerCA, | 647 kSPKIHash_DigiCertECCSecureServerCA, |
648 kSPKIHash_DigiCertEVRoot, | 648 kSPKIHash_DigiCertEVRoot, |
649 kSPKIHash_FacebookBackup, | 649 kSPKIHash_FacebookBackup, |
650 NULL, | 650 NULL, |
651 }; | 651 }; |
652 static const char* const kSpideroakAcceptableCerts[] = { | 652 static const char* const kSpideroakAcceptableCerts[] = { |
653 kSPKIHash_RapidSSL, | 653 kSPKIHash_GeoTrustGlobal, |
654 kSPKIHash_SpiderOak1, | 654 kSPKIHash_DigiCertEVRoot, |
655 kSPKIHash_SpiderOak2, | 655 kSPKIHash_SpiderOak2, |
| 656 kSPKIHash_SpiderOak3, |
656 NULL, | 657 NULL, |
657 }; | 658 }; |
658 | 659 |
659 struct Pinset { | 660 struct Pinset { |
660 const char *const *const accepted_pins; | 661 const char *const *const accepted_pins; |
661 const char *const *const rejected_pins; | 662 const char *const *const rejected_pins; |
662 }; | 663 }; |
663 | 664 |
664 static const struct Pinset kPinsets[] = { | 665 static const struct Pinset kPinsets[] = { |
665 {kTestAcceptableCerts, kNoRejectedPublicKeys}, | 666 {kTestAcceptableCerts, kNoRejectedPublicKeys}, |
(...skipping 1551 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2217 0x9c, 0xcd, 0x53, 0x09, 0xbd, 0x6a, 0x8a, 0x7e, 0xad, 0x9c, 0x5d, 0xd2, | 2218 0x9c, 0xcd, 0x53, 0x09, 0xbd, 0x6a, 0x8a, 0x7e, 0xad, 0x9c, 0x5d, 0xd2, |
2218 0x2a, 0x6d, 0x97, 0x3f, 0xbd, 0x28, 0x98, 0x29, 0xe6, 0x77, 0x4a, 0x64, | 2219 0x2a, 0x6d, 0x97, 0x3f, 0xbd, 0x28, 0x98, 0x29, 0xe6, 0x77, 0x4a, 0x64, |
2219 0xf4, 0x00, | 2220 0xf4, 0x00, |
2220 }; | 2221 }; |
2221 | 2222 |
2222 static const unsigned kPreloadedHSTSBits = 146696; | 2223 static const unsigned kPreloadedHSTSBits = 146696; |
2223 | 2224 |
2224 static const unsigned kHSTSRootPosition = 146102; | 2225 static const unsigned kHSTSRootPosition = 146102; |
2225 | 2226 |
2226 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 2227 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
OLD | NEW |