| Index: chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/protocol_parser_unittest.cc b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| index 8b7abe32528a6343c44abd8ded9b2916b6aa2e5c..ca53694af3ca23e63bbaf5c9dc475df53d708823 100644
|
| --- a/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| @@ -223,6 +223,21 @@ TEST(SafeBrowsingProtocolParsingTest, TestTruncatedUrlHashChunk) {
|
| EXPECT_EQ(chunks.size(), 0U);
|
| }
|
|
|
| +// Test to verify handling of a truncated chunk header.
|
| +TEST(SafeBrowsingProtocolParsingTest, TestTruncatedHeader) {
|
| + std::string truncated_chunks("a:1:4:0\na:");
|
| +
|
| + // Run the parser.
|
| + SafeBrowsingProtocolParser parser;
|
| + SBChunkList chunks;
|
| + bool result = parser.ParseChunk(
|
| + safe_browsing_util::kMalwareList,
|
| + truncated_chunks.data(),
|
| + static_cast<int>(truncated_chunks.length()),
|
| + &chunks);
|
| + EXPECT_FALSE(result);
|
| +}
|
| +
|
| // Test parsing one sub chunk.
|
| TEST(SafeBrowsingProtocolParsingTest, TestSubChunk) {
|
| std::string sub_chunk("s:9:4:59\naaaaxkkkk1111\003"
|
|
|