Index: chrome/browser/safe_browsing/protocol_parser_unittest.cc |
diff --git a/chrome/browser/safe_browsing/protocol_parser_unittest.cc b/chrome/browser/safe_browsing/protocol_parser_unittest.cc |
index 8b7abe32528a6343c44abd8ded9b2916b6aa2e5c..ca53694af3ca23e63bbaf5c9dc475df53d708823 100644 |
--- a/chrome/browser/safe_browsing/protocol_parser_unittest.cc |
+++ b/chrome/browser/safe_browsing/protocol_parser_unittest.cc |
@@ -223,6 +223,21 @@ TEST(SafeBrowsingProtocolParsingTest, TestTruncatedUrlHashChunk) { |
EXPECT_EQ(chunks.size(), 0U); |
} |
+// Test to verify handling of a truncated chunk header. |
+TEST(SafeBrowsingProtocolParsingTest, TestTruncatedHeader) { |
+ std::string truncated_chunks("a:1:4:0\na:"); |
+ |
+ // Run the parser. |
+ SafeBrowsingProtocolParser parser; |
+ SBChunkList chunks; |
+ bool result = parser.ParseChunk( |
+ safe_browsing_util::kMalwareList, |
+ truncated_chunks.data(), |
+ static_cast<int>(truncated_chunks.length()), |
+ &chunks); |
+ EXPECT_FALSE(result); |
+} |
+ |
// Test parsing one sub chunk. |
TEST(SafeBrowsingProtocolParsingTest, TestSubChunk) { |
std::string sub_chunk("s:9:4:59\naaaaxkkkk1111\003" |