Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(44)

Side by Side Diff: chrome/browser/safe_browsing/protocol_manager_unittest.cc

Issue 10069031: Replace SafeBrowsing MAC with downloads over SSL. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 8 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 5
6 #include "base/logging.h" 6 #include "base/logging.h"
7 #include "base/time.h" 7 #include "base/time.h"
8 #include "testing/gtest/include/gtest/gtest.h" 8 #include "testing/gtest/include/gtest/gtest.h"
9 #include "chrome/browser/safe_browsing/protocol_manager.h" 9 #include "chrome/browser/safe_browsing/protocol_manager.h"
10 10
11 using base::Time; 11 using base::Time;
12 using base::TimeDelta; 12 using base::TimeDelta;
13 13
14 static const char kInfoUrlPrefix[] = "http://info.prefix.com/foo"; 14 static const char kUrlPrefix[] = "https://prefix.com/foo";
15 static const char kMacKeyUrlPrefix[] = "https://key.prefix.com/bar";
16 static const char kClient[] = "unittest"; 15 static const char kClient[] = "unittest";
17 static const char kAppVer[] = "1.0"; 16 static const char kAppVer[] = "1.0";
18 static const char kClientKey[] = "SCg9lcLHd0dfksXgYsacwQ==";
19 static const char kWrappedKey[] =
20 "AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8nNaYH47tiQ7pDe9cEErjVHGZaPPUau5h61tbXSDqA"
21 "BiJZnDFByc_g8B5vTwxkhBf9g==";
22 static const char kAdditionalQuery[] = "additional_query"; 17 static const char kAdditionalQuery[] = "additional_query";
23 18
24 class SafeBrowsingProtocolManagerTest : public testing::Test { 19 class SafeBrowsingProtocolManagerTest : public testing::Test {
25 }; 20 };
26 21
27 // Ensure that we respect section 5 of the SafeBrowsing protocol specification. 22 // Ensure that we respect section 5 of the SafeBrowsing protocol specification.
28 TEST_F(SafeBrowsingProtocolManagerTest, TestBackOffTimes) { 23 TEST_F(SafeBrowsingProtocolManagerTest, TestBackOffTimes) {
29 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 24 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
30 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
31 pm.next_update_sec_ = 1800; 25 pm.next_update_sec_ = 1800;
32 DCHECK(pm.back_off_fuzz_ >= 0.0 && pm.back_off_fuzz_ <= 1.0); 26 DCHECK(pm.back_off_fuzz_ >= 0.0 && pm.back_off_fuzz_ <= 1.0);
33 27
34 // No errors received so far. 28 // No errors received so far.
35 EXPECT_EQ(pm.GetNextUpdateTime(false), 1800 * 1000); 29 EXPECT_EQ(pm.GetNextUpdateTime(false), 1800 * 1000);
36 30
37 // 1 error. 31 // 1 error.
38 EXPECT_EQ(pm.GetNextUpdateTime(true), 60 * 1000); 32 EXPECT_EQ(pm.GetNextUpdateTime(true), 60 * 1000);
39 33
40 // 2 errors. 34 // 2 errors.
(...skipping 15 matching lines...) Expand all
56 // 6 errors, reached max backoff. 50 // 6 errors, reached max backoff.
57 EXPECT_EQ(pm.GetNextUpdateTime(true), 480 * 60 * 1000); 51 EXPECT_EQ(pm.GetNextUpdateTime(true), 480 * 60 * 1000);
58 52
59 // 7 errors. 53 // 7 errors.
60 EXPECT_EQ(pm.GetNextUpdateTime(true), 480 * 60 * 1000); 54 EXPECT_EQ(pm.GetNextUpdateTime(true), 480 * 60 * 1000);
61 55
62 // Received a successful response. 56 // Received a successful response.
63 EXPECT_EQ(pm.GetNextUpdateTime(false), 1800 * 1000); 57 EXPECT_EQ(pm.GetNextUpdateTime(false), 1800 * 1000);
64 } 58 }
65 59
66 // Test string combinations with and without MAC.
67 TEST_F(SafeBrowsingProtocolManagerTest, TestChunkStrings) { 60 TEST_F(SafeBrowsingProtocolManagerTest, TestChunkStrings) {
68 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 61 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
69 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
70 62
71 // Add and Sub chunks. 63 // Add and Sub chunks.
72 SBListChunkRanges phish("goog-phish-shavar"); 64 SBListChunkRanges phish("goog-phish-shavar");
73 phish.adds = "1,4,6,8-20,99"; 65 phish.adds = "1,4,6,8-20,99";
74 phish.subs = "16,32,64-96"; 66 phish.subs = "16,32,64-96";
75 EXPECT_EQ(pm.FormatList(phish, false), 67 EXPECT_EQ(pm.FormatList(phish),
76 "goog-phish-shavar;a:1,4,6,8-20,99:s:16,32,64-96\n"); 68 "goog-phish-shavar;a:1,4,6,8-20,99:s:16,32,64-96\n");
77 EXPECT_EQ(pm.FormatList(phish, true),
78 "goog-phish-shavar;a:1,4,6,8-20,99:s:16,32,64-96:mac\n");
79 69
80 // Add chunks only. 70 // Add chunks only.
81 phish.subs = ""; 71 phish.subs = "";
82 EXPECT_EQ(pm.FormatList(phish, false), 72 EXPECT_EQ(pm.FormatList(phish), "goog-phish-shavar;a:1,4,6,8-20,99\n");
83 "goog-phish-shavar;a:1,4,6,8-20,99\n");
84 EXPECT_EQ(pm.FormatList(phish, true),
85 "goog-phish-shavar;a:1,4,6,8-20,99:mac\n");
86 73
87 // Sub chunks only. 74 // Sub chunks only.
88 phish.adds = ""; 75 phish.adds = "";
89 phish.subs = "16,32,64-96"; 76 phish.subs = "16,32,64-96";
90 EXPECT_EQ(pm.FormatList(phish, false), "goog-phish-shavar;s:16,32,64-96\n"); 77 EXPECT_EQ(pm.FormatList(phish), "goog-phish-shavar;s:16,32,64-96\n");
91 EXPECT_EQ(pm.FormatList(phish, true),
92 "goog-phish-shavar;s:16,32,64-96:mac\n");
93 78
94 // No chunks of either type. 79 // No chunks of either type.
95 phish.adds = ""; 80 phish.adds = "";
96 phish.subs = ""; 81 phish.subs = "";
97 EXPECT_EQ(pm.FormatList(phish, false), "goog-phish-shavar;\n"); 82 EXPECT_EQ(pm.FormatList(phish), "goog-phish-shavar;\n");
98 EXPECT_EQ(pm.FormatList(phish, true), "goog-phish-shavar;mac\n");
99 } 83 }
100 84
101 TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashBackOffTimes) { 85 TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashBackOffTimes) {
102 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 86 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
103 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
104 87
105 // No errors or back off time yet. 88 // No errors or back off time yet.
106 EXPECT_EQ(pm.gethash_error_count_, 0); 89 EXPECT_EQ(pm.gethash_error_count_, 0);
107 EXPECT_TRUE(pm.next_gethash_time_.is_null()); 90 EXPECT_TRUE(pm.next_gethash_time_.is_null());
108 91
109 Time now = Time::Now(); 92 Time now = Time::Now();
110 93
111 // 1 error. 94 // 1 error.
112 pm.HandleGetHashError(now); 95 pm.HandleGetHashError(now);
113 EXPECT_EQ(pm.gethash_error_count_, 1); 96 EXPECT_EQ(pm.gethash_error_count_, 1);
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
145 EXPECT_EQ(pm.gethash_error_count_, 6); 128 EXPECT_EQ(pm.gethash_error_count_, 6);
146 EXPECT_TRUE(pm.next_gethash_time_ == now + TimeDelta::FromMinutes(480)); 129 EXPECT_TRUE(pm.next_gethash_time_ == now + TimeDelta::FromMinutes(480));
147 130
148 // 7 errors. 131 // 7 errors.
149 pm.HandleGetHashError(now); 132 pm.HandleGetHashError(now);
150 EXPECT_EQ(pm.gethash_error_count_, 7); 133 EXPECT_EQ(pm.gethash_error_count_, 7);
151 EXPECT_TRUE(pm.next_gethash_time_== now + TimeDelta::FromMinutes(480)); 134 EXPECT_TRUE(pm.next_gethash_time_== now + TimeDelta::FromMinutes(480));
152 } 135 }
153 136
154 TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashUrl) { 137 TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashUrl) {
155 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 138 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
156 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
157 pm.version_ = kAppVer; 139 pm.version_ = kAppVer;
158 EXPECT_EQ("http://info.prefix.com/foo/gethash?client=unittest&appver=1.0&" 140 EXPECT_EQ("https://prefix.com/foo/gethash?client=unittest&appver=1.0&"
159 "pver=2.2", pm.GetHashUrl(false).spec()); 141 "pver=2.2", pm.GetHashUrl().spec());
160 EXPECT_EQ("http://info.prefix.com/foo/gethash?client=unittest&appver=1.0&"
161 "pver=2.2&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8nNaYH47tiQ7pDe9cE"
162 "ErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf9g==",
163 pm.GetHashUrl(true).spec());
164 142
165 pm.set_additional_query(kAdditionalQuery); 143 pm.set_additional_query(kAdditionalQuery);
166 EXPECT_EQ("http://info.prefix.com/foo/gethash?client=unittest&appver=1.0&" 144 EXPECT_EQ("https://prefix.com/foo/gethash?client=unittest&appver=1.0&"
167 "pver=2.2&additional_query", 145 "pver=2.2&additional_query",
168 pm.GetHashUrl(false).spec()); 146 pm.GetHashUrl().spec());
169 EXPECT_EQ("http://info.prefix.com/foo/gethash?client=unittest&appver=1.0&"
170 "pver=2.2&additional_query&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8"
171 "nNaYH47tiQ7pDe9cEErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf"
172 "9g==", pm.GetHashUrl(true).spec());
173 } 147 }
174 148
175 TEST_F(SafeBrowsingProtocolManagerTest, TestUpdateUrl) { 149 TEST_F(SafeBrowsingProtocolManagerTest, TestUpdateUrl) {
176 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 150 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
177 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
178 pm.version_ = kAppVer; 151 pm.version_ = kAppVer;
179 152
180 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" 153 EXPECT_EQ("https://prefix.com/foo/downloads?client=unittest&appver=1.0&"
181 "pver=2.2", pm.UpdateUrl(false).spec()); 154 "pver=2.2", pm.UpdateUrl().spec());
182 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&"
183 "pver=2.2&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8nNaYH47tiQ7pDe9cE"
184 "ErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf9g==",
185 pm.UpdateUrl(true).spec());
186 155
187 pm.set_additional_query(kAdditionalQuery); 156 pm.set_additional_query(kAdditionalQuery);
188 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" 157 EXPECT_EQ("https://prefix.com/foo/downloads?client=unittest&appver=1.0&"
189 "pver=2.2&additional_query", pm.UpdateUrl(false).spec()); 158 "pver=2.2&additional_query", pm.UpdateUrl().spec());
190 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&"
191 "pver=2.2&additional_query&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8"
192 "nNaYH47tiQ7pDe9cEErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf"
193 "9g==", pm.UpdateUrl(true).spec());
194 } 159 }
195 160
196 TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingHitUrl) { 161 TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingHitUrl) {
197 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 162 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
198 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
199 pm.version_ = kAppVer; 163 pm.version_ = kAppVer;
200 164
201 GURL malicious_url("http://malicious.url.com"); 165 GURL malicious_url("http://malicious.url.com");
202 GURL page_url("http://page.url.com"); 166 GURL page_url("http://page.url.com");
203 GURL referrer_url("http://referrer.url.com"); 167 GURL referrer_url("http://referrer.url.com");
204 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" 168 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
205 "pver=2.2&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&" 169 "pver=2.2&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&"
206 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 170 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
207 "url.com%2F&evtb=1", 171 "url.com%2F&evtb=1",
208 pm.SafeBrowsingHitUrl( 172 pm.SafeBrowsingHitUrl(
209 malicious_url, page_url, referrer_url, 173 malicious_url, page_url, referrer_url,
210 true, SafeBrowsingService::URL_MALWARE).spec()); 174 true, SafeBrowsingService::URL_MALWARE).spec());
211 175
212 pm.set_additional_query(kAdditionalQuery); 176 pm.set_additional_query(kAdditionalQuery);
213 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" 177 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
214 "pver=2.2&additional_query&evts=phishblhit&" 178 "pver=2.2&additional_query&evts=phishblhit&"
215 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 179 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
216 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 180 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
217 "url.com%2F&evtb=0", 181 "url.com%2F&evtb=0",
218 pm.SafeBrowsingHitUrl( 182 pm.SafeBrowsingHitUrl(
219 malicious_url, page_url, referrer_url, 183 malicious_url, page_url, referrer_url,
220 false, SafeBrowsingService::URL_PHISHING).spec()); 184 false, SafeBrowsingService::URL_PHISHING).spec());
221 185
222 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" 186 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
223 "pver=2.2&additional_query&evts=binurlhit&" 187 "pver=2.2&additional_query&evts=binurlhit&"
224 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 188 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
225 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 189 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
226 "url.com%2F&evtb=0", 190 "url.com%2F&evtb=0",
227 pm.SafeBrowsingHitUrl( 191 pm.SafeBrowsingHitUrl(
228 malicious_url, page_url, referrer_url, 192 malicious_url, page_url, referrer_url,
229 false, SafeBrowsingService::BINARY_MALWARE_URL).spec()); 193 false, SafeBrowsingService::BINARY_MALWARE_URL).spec());
230 194
231 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" 195 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
232 "pver=2.2&additional_query&evts=binhashhit&" 196 "pver=2.2&additional_query&evts=binhashhit&"
233 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 197 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
234 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 198 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
235 "url.com%2F&evtb=0", 199 "url.com%2F&evtb=0",
236 pm.SafeBrowsingHitUrl( 200 pm.SafeBrowsingHitUrl(
237 malicious_url, page_url, referrer_url, 201 malicious_url, page_url, referrer_url,
238 false, SafeBrowsingService::BINARY_MALWARE_HASH).spec()); 202 false, SafeBrowsingService::BINARY_MALWARE_HASH).spec());
239 203
240 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" 204 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
241 "pver=2.2&additional_query&evts=phishcsdhit&" 205 "pver=2.2&additional_query&evts=phishcsdhit&"
242 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 206 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
243 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 207 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
244 "url.com%2F&evtb=0", 208 "url.com%2F&evtb=0",
245 pm.SafeBrowsingHitUrl( 209 pm.SafeBrowsingHitUrl(
246 malicious_url, page_url, referrer_url, 210 malicious_url, page_url, referrer_url,
247 false, SafeBrowsingService::CLIENT_SIDE_PHISHING_URL).spec()); 211 false, SafeBrowsingService::CLIENT_SIDE_PHISHING_URL).spec());
248 } 212 }
249 213
250 TEST_F(SafeBrowsingProtocolManagerTest, TestMalwareDetailsUrl) { 214 TEST_F(SafeBrowsingProtocolManagerTest, TestMalwareDetailsUrl) {
251 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 215 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
252 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
253 216
254 pm.version_ = kAppVer; 217 pm.version_ = kAppVer;
255 pm.set_additional_query(kAdditionalQuery); // AdditionalQuery is not used. 218 pm.set_additional_query(kAdditionalQuery); // AdditionalQuery is not used.
256 EXPECT_EQ("https://key.prefix.com/bar/clientreport/malware?" 219 EXPECT_EQ("https://prefix.com/foo/clientreport/malware?"
257 "client=unittest&appver=1.0&pver=1.0", 220 "client=unittest&appver=1.0&pver=1.0",
258 pm.MalwareDetailsUrl().spec()); 221 pm.MalwareDetailsUrl().spec());
259 } 222 }
260 223
261 TEST_F(SafeBrowsingProtocolManagerTest, TestMacKeyUrl) {
262 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL,
263 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
264 pm.version_ = kAppVer;
265
266 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&"
267 "pver=2.2", pm.MacKeyUrl().spec());
268
269 pm.set_additional_query(kAdditionalQuery);
270 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&"
271 "pver=2.2&additional_query", pm.MacKeyUrl().spec());
272 }
273
274 TEST_F(SafeBrowsingProtocolManagerTest, TestNextChunkUrl) { 224 TEST_F(SafeBrowsingProtocolManagerTest, TestNextChunkUrl) {
275 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, 225 SafeBrowsingProtocolManager pm(NULL, kClient, NULL, kUrlPrefix, false);
276 kInfoUrlPrefix, kMacKeyUrlPrefix, false);
277 pm.version_ = kAppVer; 226 pm.version_ = kAppVer;
278 227
279 std::string url_partial = "localhost:1234/foo/bar?foo"; 228 std::string url_partial = "localhost:1234/foo/bar?foo";
280 std::string url_http_full = "http://localhost:1234/foo/bar?foo"; 229 std::string url_http_full = "http://localhost:1234/foo/bar?foo";
281 std::string url_https_full = "https://localhost:1234/foo/bar?foo"; 230 std::string url_https_full = "https://localhost:1234/foo/bar?foo";
282 std::string url_https_no_query = "https://localhost:1234/foo/bar"; 231 std::string url_https_no_query = "https://localhost:1234/foo/bar";
283 232
284 EXPECT_EQ("http://localhost:1234/foo/bar?foo", 233 EXPECT_EQ("https://localhost:1234/foo/bar?foo",
285 pm.NextChunkUrl(url_partial).spec()); 234 pm.NextChunkUrl(url_partial).spec());
286 EXPECT_EQ("http://localhost:1234/foo/bar?foo", 235 EXPECT_EQ("http://localhost:1234/foo/bar?foo",
287 pm.NextChunkUrl(url_http_full).spec()); 236 pm.NextChunkUrl(url_http_full).spec());
288 EXPECT_EQ("https://localhost:1234/foo/bar?foo", 237 EXPECT_EQ("https://localhost:1234/foo/bar?foo",
289 pm.NextChunkUrl(url_https_full).spec()); 238 pm.NextChunkUrl(url_https_full).spec());
290 EXPECT_EQ("https://localhost:1234/foo/bar", 239 EXPECT_EQ("https://localhost:1234/foo/bar",
291 pm.NextChunkUrl(url_https_no_query).spec()); 240 pm.NextChunkUrl(url_https_no_query).spec());
292 241
293 pm.set_additional_query(kAdditionalQuery); 242 pm.set_additional_query(kAdditionalQuery);
294 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", 243 EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query",
295 pm.NextChunkUrl(url_partial).spec()); 244 pm.NextChunkUrl(url_partial).spec());
296 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", 245 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query",
297 pm.NextChunkUrl(url_http_full).spec()); 246 pm.NextChunkUrl(url_http_full).spec());
298 EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query", 247 EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query",
299 pm.NextChunkUrl(url_https_full).spec()); 248 pm.NextChunkUrl(url_https_full).spec());
300 EXPECT_EQ("https://localhost:1234/foo/bar?additional_query", 249 EXPECT_EQ("https://localhost:1234/foo/bar?additional_query",
301 pm.NextChunkUrl(url_https_no_query).spec()); 250 pm.NextChunkUrl(url_https_no_query).spec());
302 } 251 }
OLDNEW
« no previous file with comments | « chrome/browser/safe_browsing/protocol_manager.cc ('k') | chrome/browser/safe_browsing/protocol_parser.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698