| Index: chrome/browser/safe_browsing/protocol_manager_unittest.cc
|
| ===================================================================
|
| --- chrome/browser/safe_browsing/protocol_manager_unittest.cc (revision 68800)
|
| +++ chrome/browser/safe_browsing/protocol_manager_unittest.cc (working copy)
|
| @@ -193,7 +193,7 @@
|
| "9g==", pm.UpdateUrl(true).spec());
|
| }
|
|
|
| -TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingReportUrl) {
|
| +TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingHitUrl) {
|
| SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL,
|
| kInfoUrlPrefix, kMacKeyUrlPrefix, false);
|
| pm.version_ = kAppVer;
|
| @@ -205,7 +205,7 @@
|
| "pver=2.2&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&"
|
| "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
|
| "url.com%2F&evtb=1",
|
| - pm.SafeBrowsingReportUrl(
|
| + pm.SafeBrowsingHitUrl(
|
| malicious_url, page_url, referrer_url,
|
| true, SafeBrowsingService::URL_MALWARE).spec());
|
|
|
| @@ -215,11 +215,22 @@
|
| "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
|
| "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
|
| "url.com%2F&evtb=0",
|
| - pm.SafeBrowsingReportUrl(
|
| + pm.SafeBrowsingHitUrl(
|
| malicious_url, page_url, referrer_url,
|
| false, SafeBrowsingService::URL_PHISHING).spec());
|
| }
|
|
|
| +TEST_F(SafeBrowsingProtocolManagerTest, TestMalwareDetailsUrl) {
|
| + SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL,
|
| + kInfoUrlPrefix, kMacKeyUrlPrefix, false);
|
| +
|
| + pm.version_ = kAppVer;
|
| + pm.set_additional_query(kAdditionalQuery); // AdditionalQuery is not used.
|
| + EXPECT_EQ("https://key.prefix.com/bar/clientreport/malware?"
|
| + "client=unittest&appver=1.0&pver=1.0",
|
| + pm.MalwareDetailsUrl().spec());
|
| +}
|
| +
|
| TEST_F(SafeBrowsingProtocolManagerTest, TestMacKeyUrl) {
|
| SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL,
|
| kInfoUrlPrefix, kMacKeyUrlPrefix, false);
|
|
|