| Index: net/base/ssl_false_start_blacklist.h
|
| diff --git a/net/base/ssl_false_start_blacklist.h b/net/base/ssl_false_start_blacklist.h
|
| deleted file mode 100644
|
| index ad7a007e7562d5abe302b73b22637e4b7f4df9b0..0000000000000000000000000000000000000000
|
| --- a/net/base/ssl_false_start_blacklist.h
|
| +++ /dev/null
|
| @@ -1,79 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef NET_BASE_SSL_FALSE_START_BLACKLIST_H_
|
| -#define NET_BASE_SSL_FALSE_START_BLACKLIST_H_
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/logging.h"
|
| -#include "net/base/net_export.h"
|
| -
|
| -namespace net {
|
| -
|
| -// SSLFalseStartBlacklist is a set of domains which we believe to be intolerant
|
| -// to TLS False Start. Because this set is several hundred long, it's
|
| -// precompiled by the code in ssl_false_start_blacklist_process.cc into a hash
|
| -// table for fast lookups.
|
| -class SSLFalseStartBlacklist {
|
| - public:
|
| - // Returns true if |host| (a DNS name in dotted form, e.g. "www.example.com")
|
| - // is in the blacklist.
|
| - NET_EXPORT_PRIVATE static bool IsMember(const std::string& host);
|
| -
|
| - // Returns the modified djb2 hash of |host|.
|
| - // NOTE: This is inline because the code which generates the hash table needs
|
| - // to use it. However, the generating code cannot link against
|
| - // ssl_false_start_blacklist.cc because that needs the tables which it
|
| - // generates.
|
| - static uint32 Hash(const std::string& host) {
|
| - uint32 hash = 5381;
|
| - for (const uint8* in = reinterpret_cast<const uint8*>(host.c_str());
|
| - *in != 0; ++in)
|
| - hash = ((hash << 5) + hash) ^ *in;
|
| - return hash;
|
| - }
|
| -
|
| - // Returns the last two dot-separated components of |host|, ignoring any
|
| - // trailing dots. For example, returns "c.d" for "a.b.c.d.". Returns an
|
| - // empty string if |host| does not have two dot-separated components.
|
| - // NOTE: Inline for the same reason as Hash().
|
| - static std::string LastTwoComponents(const std::string& host) {
|
| - size_t last_nondot = host.find_last_not_of('.');
|
| - if (last_nondot == std::string::npos)
|
| - return std::string();
|
| - size_t last_dot = host.find_last_of('.', last_nondot);
|
| - if ((last_dot == 0) || (last_dot == std::string::npos))
|
| - return std::string();
|
| - // NOTE: This next line works correctly even when the call returns npos.
|
| - size_t components_begin = host.find_last_of('.', last_dot - 1) + 1;
|
| - return host.substr(components_begin, last_nondot - components_begin + 1);
|
| - }
|
| -
|
| - // This is the number of buckets in the blacklist hash table. (Must be a
|
| - // power of two).
|
| - static const size_t kBuckets = 128;
|
| -
|
| - private:
|
| - // The following two members are defined in
|
| - // ssl_false_start_blacklist_data.cc, which is generated by
|
| - // ssl_false_start_blacklist_process.cc
|
| -
|
| - // kHashTable contains an offset into |kHashData| for each bucket. The
|
| - // additional element at the end contains the length of |kHashData|.
|
| - static const uint32 kHashTable[kBuckets + 1];
|
| - // kHashData contains the contents of the hash table. |kHashTable| indexes
|
| - // into this array. Each bucket consists of zero or more, 8-bit length
|
| - // prefixed strings. Each string is a DNS name in dotted form. For a given
|
| - // string x, x and *.x are considered to be in the blacklist. In order to
|
| - // assign a string to a hash bucket, the last two labels (not including the
|
| - // root label) are hashed. Thus, the bucket for "www.example.com" is
|
| - // Hash("example.com"). No names that are less than two labels long are
|
| - // included in the blacklist.
|
| - static const char kHashData[];
|
| -};
|
| -
|
| -} // namespace net
|
| -
|
| -#endif // NET_BASE_SSL_FALSE_START_BLACKLIST_H_
|
|
|