Index: chrome/browser/safe_browsing/protocol_parser.cc |
diff --git a/chrome/browser/safe_browsing/protocol_parser.cc b/chrome/browser/safe_browsing/protocol_parser.cc |
index 035de5cd4837bb41c7e52c53772d0b5f9e9ab1f4..1fb64ef7521eb8ac9a62748d8eec75e055ad4eab 100644 |
--- a/chrome/browser/safe_browsing/protocol_parser.cc |
+++ b/chrome/browser/safe_browsing/protocol_parser.cc |
@@ -263,8 +263,7 @@ bool SafeBrowsingProtocolParser::ParseAddChunk(const std::string& list_name, |
SBEntry::Type type = hash_len == sizeof(SBPrefix) ? |
SBEntry::ADD_PREFIX : SBEntry::ADD_FULL_HASH; |
- if (list_name == safe_browsing_util::kBinHashList || |
- list_name == safe_browsing_util::kDownloadWhiteList || |
+ if (list_name == safe_browsing_util::kDownloadWhiteList || |
list_name == safe_browsing_util::kExtensionBlacklist || |
list_name == safe_browsing_util::kIPBlacklist) { |
// These lists only contain prefixes, no HOSTKEY and COUNT. |
@@ -313,14 +312,13 @@ bool SafeBrowsingProtocolParser::ParseSubChunk(const std::string& list_name, |
SBEntry::Type type = hash_len == sizeof(SBPrefix) ? |
SBEntry::SUB_PREFIX : SBEntry::SUB_FULL_HASH; |
- if (list_name == safe_browsing_util::kBinHashList || |
- list_name == safe_browsing_util::kDownloadWhiteList || |
+ if (list_name == safe_browsing_util::kDownloadWhiteList || |
list_name == safe_browsing_util::kExtensionBlacklist || |
list_name == safe_browsing_util::kIPBlacklist) { |
SBChunkHost chunk_host; |
- // Set host to 0 and it won't be used for kBinHashList. |
+ // Set host to 0 and it won't be used. |
chunk_host.host = 0; |
- // kBinHashList only contains (add_chunk_number, prefix) pairs, no HOSTKEY |
+ // lists only contain (add_chunk_number, prefix) pairs, no HOSTKEY |
// and COUNT. |add_chunk_number| is int32. |
prefix_count = remaining / (sizeof(int32) + hash_len); |
chunk_host.entry = SBEntry::Create(type, prefix_count); |