diff src/scanner.h @ 270:f92f24950bd3 stable-6-0-35

Use mozilla prefix list for tld checking, Enable surbl/uribl/dbl rhs lists
author Carl Byington <carl@five-ten-sg.com>
date Mon, 09 Sep 2013 15:15:53 -0700
parents c0d2e99c0a1d
children f9165d9aa689
line wrap: on
line diff
--- a/src/scanner.h	Wed May 22 11:34:37 2013 -0700
+++ b/src/scanner.h	Mon Sep 09 15:15:53 2013 -0700
@@ -19,13 +19,14 @@
     mlfiPriv    *priv;      // needed for syslog
     string_set  *html_tags; // valid tags
     string_set  *tlds;      // valid tlds
-    string_set  *cctlds;    // valid cctlds
+    string_set  *tldwilds;  // valid wildcard tlds
+    string_set  *tldnots;   // invalid tlds
     string_set  hosts;
     size_t      bad_html_tags;
     size_t      binary_tags;
 
 public:
-    recorder(mlfiPriv *priv_, string_set &html_tags_, string_set &tlds_, string_set &cctlds_);
+    recorder(mlfiPriv *priv_, string_set &html_tags_, string_set &tlds_, string_set &tldwilds_, string_set &tldnots_);
     ~recorder()                                 { empty(); };
     void empty();
     void new_url(const char *host);
@@ -33,8 +34,9 @@
     void binary();
     void syslog(const char *buf)                { my_syslog(priv, buf);                                                             };
     mlfiPriv   *get_priv()                      { return priv;                                                                      };
-    string_set *get_cctlds()                    { return cctlds;                                                                    };
     string_set *get_tlds()                      { return tlds;                                                                      };
+    string_set *get_tldwilds()                  { return tldwilds;                                                                      };
+    string_set *get_tldnots()                   { return tldnots;                                                                      };
     string_set &get_hosts()                     { return hosts;                                                                     };
     bool        excessive_bad_tags(size_t limit){ return (limit > 0) && (bad_html_tags > limit) && (bad_html_tags > 3*binary_tags); };
     bool        excessive_hosts(size_t limit)   { return (limit > 0) && (hosts.size() > limit);                                     };