Index: chrome/browser/safe_browsing/client_side_detection_service.cc |
diff --git a/chrome/browser/safe_browsing/client_side_detection_service.cc b/chrome/browser/safe_browsing/client_side_detection_service.cc |
index 46d01450641e7a0e5a3843b5e48a465714007469..d63e45cbfd931b57fd880f4d48c40c168454bbbe 100644 |
--- a/chrome/browser/safe_browsing/client_side_detection_service.cc |
+++ b/chrome/browser/safe_browsing/client_side_detection_service.cc |
@@ -206,35 +206,6 @@ bool ClientSideDetectionService::IsPrivateIPAddress( |
return false; |
} |
-bool ClientSideDetectionService::IsBadIpAddress( |
- const std::string& ip_address) const { |
- net::IPAddressNumber ip_number; |
- if (!net::ParseIPLiteralToNumber(ip_address, &ip_number)) { |
- VLOG(2) << "Unable to parse IP address: '" << ip_address << "'"; |
- return false; |
- } |
- if (ip_number.size() == net::kIPv4AddressSize) { |
- ip_number = net::ConvertIPv4NumberToIPv6Number(ip_number); |
- } |
- if (ip_number.size() != net::kIPv6AddressSize) { |
- VLOG(2) << "Unable to convert IPv4 address to IPv6: '" << ip_address << "'"; |
- return false; // better safe than sorry. |
- } |
- for (BadSubnetMap::const_iterator it = bad_subnets_.begin(); |
- it != bad_subnets_.end(); ++it) { |
- const std::string& mask = it->first; |
- DCHECK_EQ(mask.size(), ip_number.size()); |
- std::string subnet(net::kIPv6AddressSize, '.'); |
- for (size_t i = 0; i < net::kIPv6AddressSize; ++i) { |
- subnet[i] = ip_number[i] & mask[i]; |
- } |
- if (it->second.count(crypto::SHA256HashString(subnet)) > 0) { |
- return true; |
- } |
- } |
- return false; |
-} |
- |
void ClientSideDetectionService::OnURLFetchComplete( |
const net::URLFetcher* source) { |
std::string data; |