summaryrefslogtreecommitdiffstats
path: root/net/net.gyp
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-08 14:07:38 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-08 14:07:38 +0000
commit5bafc4f669ffc8ae187501ad8fec7a36f37abba6 (patch)
tree4c0fbe00ce74ae5af74198cad9c108d86b965bd0 /net/net.gyp
parentad84c8f53a2973e4d752de9fe8c52e3268a867e1 (diff)
downloadchromium_src-5bafc4f669ffc8ae187501ad8fec7a36f37abba6.zip
chromium_src-5bafc4f669ffc8ae187501ad8fec7a36f37abba6.tar.gz
chromium_src-5bafc4f669ffc8ae187501ad8fec7a36f37abba6.tar.bz2
net: add prober results to False Start blacklist.
Since the blacklist has gotten rather larger, it's now precompiled into a hash table in the binary. See also: http://www.imperialviolet.org/2010/09/05/blacklisting.html (Originally landed in r58712. Reverted in r58726 because it broke the ARM builders. The processing binary was being built for the target, not the host.) TEST=net_unittests BUG=none http://codereview.chromium.org/3303008/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58824 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/net.gyp')
-rw-r--r--net/net.gyp33
1 files changed, 33 insertions, 0 deletions
diff --git a/net/net.gyp b/net/net.gyp
index 1814d59..33e45ff 100644
--- a/net/net.gyp
+++ b/net/net.gyp
@@ -19,6 +19,7 @@
'../third_party/icu/icu.gyp:icuuc',
'../third_party/zlib/zlib.gyp:zlib',
'net_resources',
+ 'ssl_false_start_blacklist_process#host',
],
'sources': [
'base/address_family.h',
@@ -165,6 +166,7 @@
'base/ssl_config_service_mac.h',
'base/ssl_config_service_win.cc',
'base/ssl_config_service_win.h',
+ 'base/ssl_false_start_blacklist.cc',
'base/ssl_info.cc',
'base/ssl_info.h',
'base/static_cookie_policy.cc',
@@ -199,6 +201,25 @@
'export_dependent_settings': [
'../base/base.gyp:base',
],
+ 'actions': [
+ {
+ 'action_name': 'ssl_false_start_blacklist',
+ 'inputs': [
+ '<(PRODUCT_DIR)/<(EXECUTABLE_PREFIX)ssl_false_start_blacklist_process<(EXECUTABLE_SUFFIX)',
+ 'base/ssl_false_start_blacklist.txt',
+ ],
+ 'outputs': [
+ '<(SHARED_INTERMEDIATE_DIR)/net/base/ssl_false_start_blacklist_data.cc',
+ ],
+ 'action':
+ ['<(PRODUCT_DIR)/<(EXECUTABLE_PREFIX)ssl_false_start_blacklist_process<(EXECUTABLE_SUFFIX)',
+ 'base/ssl_false_start_blacklist.txt',
+ '<(SHARED_INTERMEDIATE_DIR)/net/base/ssl_false_start_blacklist_data.cc',
+ ],
+ 'message': 'Generating SSL False Start blacklist',
+ 'process_outputs_as_sources': 1,
+ },
+ ],
'conditions': [
[ 'OS == "linux" or OS == "freebsd" or OS == "openbsd"', {
'dependencies': [
@@ -732,6 +753,7 @@
'base/ssl_config_service_mac_unittest.cc',
'base/ssl_config_service_unittest.cc',
'base/ssl_config_service_win_unittest.cc',
+ 'base/ssl_false_start_blacklist_unittest.cc',
'base/static_cookie_policy_unittest.cc',
'base/transport_security_state_unittest.cc',
'base/test_certificate_data.h',
@@ -1112,6 +1134,17 @@
'tools/hresolv/hresolv.cc',
],
},
+ {
+ 'target_name': 'ssl_false_start_blacklist_process',
+ 'type': 'executable',
+ 'toolsets': ['host'],
+ 'include_dirs': [
+ '..',
+ ],
+ 'sources': [
+ 'base/ssl_false_start_blacklist_process.cc',
+ ],
+ },
],
'conditions': [
# ['OS=="linux"', {