| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // This file is automatically generated by transport_security_state_static_gener
ate.go. | 5 // This file is automatically generated by transport_security_state_static_gener
ate.go. |
| 6 // You can find it at https://github.com/agl/transport-security-state-generate. | 6 // You can find it at https://github.com/agl/transport-security-state-generate. |
| 7 | 7 |
| 8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 8 #ifndef NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
| 9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 9 #define NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
| 10 | 10 |
| (...skipping 499 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 510 "\x79\x1b\x99\xfb\x9f\x28\x81\x2a\x60\xe0"; | 510 "\x79\x1b\x99\xfb\x9f\x28\x81\x2a\x60\xe0"; |
| 511 | 511 |
| 512 static const char kSPKIHash_DigiCertECCSecureServerCA[] = | 512 static const char kSPKIHash_DigiCertECCSecureServerCA[] = |
| 513 "\xc3\x02\xb1\x73\x62\x0b\x47\x78\x5d\x21" | 513 "\xc3\x02\xb1\x73\x62\x0b\x47\x78\x5d\x21" |
| 514 "\xe2\x4d\xb3\xac\x46\xb1\xfc\xb8\xc5\xa9"; | 514 "\xe2\x4d\xb3\xac\x46\xb1\xfc\xb8\xc5\xa9"; |
| 515 | 515 |
| 516 static const char kSPKIHash_FacebookBackup[] = | 516 static const char kSPKIHash_FacebookBackup[] = |
| 517 "\xd7\x0c\x3c\x13\x40\x18\xb1\x1d\xa8\x5f" | 517 "\xd7\x0c\x3c\x13\x40\x18\xb1\x1d\xa8\x5f" |
| 518 "\x99\x67\x76\x4d\xa1\xc2\x9d\x94\xa2\xc9"; | 518 "\x99\x67\x76\x4d\xa1\xc2\x9d\x94\xa2\xc9"; |
| 519 | 519 |
| 520 static const char kSPKIHash_SpiderOak1[] = | |
| 521 "\x50\xfa\xef\x15\x44\xab\xa7\xd6\x9a\x97" | |
| 522 "\x9b\xfa\x46\x7d\x09\xbf\x76\x09\xff\x05"; | |
| 523 | |
| 524 static const char kSPKIHash_SpiderOak2[] = | 520 static const char kSPKIHash_SpiderOak2[] = |
| 525 "\x0f\x47\xd2\xfe\x1a\xae\x03\xa4\x29\xae" | 521 "\x0f\x47\xd2\xfe\x1a\xae\x03\xa4\x29\xae" |
| 526 "\x5b\x9c\x8b\x23\xb5\x86\x51\x54\x03\x18"; | 522 "\x5b\x9c\x8b\x23\xb5\x86\x51\x54\x03\x18"; |
| 527 | 523 |
| 524 static const char kSPKIHash_SpiderOak3[] = |
| 525 "\x97\x92\x68\x21\x7b\xf8\x97\x3b\x59\xf8" |
| 526 "\x2e\x93\x25\x68\x31\x64\x21\xd0\xcd\x2e"; |
| 527 |
| 528 // The following is static data describing the hosts that are hardcoded with | 528 // The following is static data describing the hosts that are hardcoded with |
| 529 // certificate pins or HSTS information. | 529 // certificate pins or HSTS information. |
| 530 | 530 |
| 531 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. | 531 // kNoRejectedPublicKeys is a placeholder for when no public keys are rejected. |
| 532 static const char* const kNoRejectedPublicKeys[] = { | 532 static const char* const kNoRejectedPublicKeys[] = { |
| 533 NULL, | 533 NULL, |
| 534 }; | 534 }; |
| 535 | 535 |
| 536 static const char* const kTestAcceptableCerts[] = { | 536 static const char* const kTestAcceptableCerts[] = { |
| 537 kSPKIHash_TestSPKI, | 537 kSPKIHash_TestSPKI, |
| (...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 643 NULL, | 643 NULL, |
| 644 }; | 644 }; |
| 645 static const char* const kFacebookAcceptableCerts[] = { | 645 static const char* const kFacebookAcceptableCerts[] = { |
| 646 kSPKIHash_SymantecClass3EVG3, | 646 kSPKIHash_SymantecClass3EVG3, |
| 647 kSPKIHash_DigiCertECCSecureServerCA, | 647 kSPKIHash_DigiCertECCSecureServerCA, |
| 648 kSPKIHash_DigiCertEVRoot, | 648 kSPKIHash_DigiCertEVRoot, |
| 649 kSPKIHash_FacebookBackup, | 649 kSPKIHash_FacebookBackup, |
| 650 NULL, | 650 NULL, |
| 651 }; | 651 }; |
| 652 static const char* const kSpideroakAcceptableCerts[] = { | 652 static const char* const kSpideroakAcceptableCerts[] = { |
| 653 kSPKIHash_RapidSSL, | 653 kSPKIHash_GeoTrustGlobal, |
| 654 kSPKIHash_SpiderOak1, | 654 kSPKIHash_DigiCertEVRoot, |
| 655 kSPKIHash_SpiderOak2, | 655 kSPKIHash_SpiderOak2, |
| 656 kSPKIHash_SpiderOak3, |
| 656 NULL, | 657 NULL, |
| 657 }; | 658 }; |
| 658 | 659 |
| 659 struct Pinset { | 660 struct Pinset { |
| 660 const char *const *const accepted_pins; | 661 const char *const *const accepted_pins; |
| 661 const char *const *const rejected_pins; | 662 const char *const *const rejected_pins; |
| 662 }; | 663 }; |
| 663 | 664 |
| 664 static const struct Pinset kPinsets[] = { | 665 static const struct Pinset kPinsets[] = { |
| 665 {kTestAcceptableCerts, kNoRejectedPublicKeys}, | 666 {kTestAcceptableCerts, kNoRejectedPublicKeys}, |
| (...skipping 1551 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2217 0x9c, 0xcd, 0x53, 0x09, 0xbd, 0x6a, 0x8a, 0x7e, 0xad, 0x9c, 0x5d, 0xd2, | 2218 0x9c, 0xcd, 0x53, 0x09, 0xbd, 0x6a, 0x8a, 0x7e, 0xad, 0x9c, 0x5d, 0xd2, |
| 2218 0x2a, 0x6d, 0x97, 0x3f, 0xbd, 0x28, 0x98, 0x29, 0xe6, 0x77, 0x4a, 0x64, | 2219 0x2a, 0x6d, 0x97, 0x3f, 0xbd, 0x28, 0x98, 0x29, 0xe6, 0x77, 0x4a, 0x64, |
| 2219 0xf4, 0x00, | 2220 0xf4, 0x00, |
| 2220 }; | 2221 }; |
| 2221 | 2222 |
| 2222 static const unsigned kPreloadedHSTSBits = 146696; | 2223 static const unsigned kPreloadedHSTSBits = 146696; |
| 2223 | 2224 |
| 2224 static const unsigned kHSTSRootPosition = 146102; | 2225 static const unsigned kHSTSRootPosition = 146102; |
| 2225 | 2226 |
| 2226 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ | 2227 #endif // NET_HTTP_TRANSPORT_SECURITY_STATE_STATIC_H_ |
| OLD | NEW |