... |
... |
@@ -451,6 +451,14 @@ static const StaticFingerprints kPinset_tor = { |
451
|
451
|
kPinset_tor_Data
|
452
|
452
|
};
|
453
|
453
|
|
|
454
|
+static const char* const kPinset_tor_browser_Data[] = {
|
|
455
|
+ kISRG_Root_X1Fingerprint,
|
|
456
|
+};
|
|
457
|
+static const StaticFingerprints kPinset_tor_browser = {
|
|
458
|
+ sizeof(kPinset_tor_browser_Data) / sizeof(const char*),
|
|
459
|
+ kPinset_tor_browser_Data
|
|
460
|
+};
|
|
461
|
+
|
454
|
462
|
static const char* const kPinset_twitterCom_Data[] = {
|
455
|
463
|
kGOOGLE_PIN_VeriSignClass2_G2Fingerprint,
|
456
|
464
|
kGOOGLE_PIN_VeriSignClass3_G2Fingerprint,
|
... |
... |
@@ -619,6 +627,7 @@ static const TransportSecurityPreload kPublicKeyPinningPreloadList[] = { |
619
|
627
|
{ "blogger.com", true, false, false, -1, &kPinset_google_root_pems },
|
620
|
628
|
{ "blogspot.com", true, false, false, -1, &kPinset_google_root_pems },
|
621
|
629
|
{ "br.search.yahoo.com", false, true, false, -1, &kPinset_yahoo },
|
|
630
|
+ { "bridges.torproject.org", false, false, false, -1, &kPinset_tor_browser },
|
622
|
631
|
{ "bugs.chromium.org", true, false, false, -1, &kPinset_google_root_pems },
|
623
|
632
|
{ "build.chromium.org", true, false, false, -1, &kPinset_google_root_pems },
|
624
|
633
|
{ "business.facebook.com", true, false, false, -1, &kPinset_facebook },
|