| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/files/file_path.h" | 5 #include "base/files/file_path.h" |
| 6 #include "base/memory/ref_counted.h" | 6 #include "base/memory/ref_counted.h" |
| 7 #include "base/memory/scoped_ptr.h" | 7 #include "base/memory/scoped_ptr.h" |
| 8 #include "base/stringprintf.h" | 8 #include "base/stringprintf.h" |
| 9 #include "base/synchronization/waitable_event.h" | 9 #include "base/synchronization/waitable_event.h" |
| 10 #include "chrome/browser/safe_browsing/browser_feature_extractor.h" | 10 #include "chrome/browser/safe_browsing/browser_feature_extractor.h" |
| (...skipping 617 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 628 SetRedirectChain(redirect_chain); | 628 SetRedirectChain(redirect_chain); |
| 629 OnPhishingDetectionDone(verdict.SerializeAsString()); | 629 OnPhishingDetectionDone(verdict.SerializeAsString()); |
| 630 MessageLoop::current()->Run(); | 630 MessageLoop::current()->Run(); |
| 631 EXPECT_TRUE(Mock::VerifyAndClear(csd_service_.get())); | 631 EXPECT_TRUE(Mock::VerifyAndClear(csd_service_.get())); |
| 632 } | 632 } |
| 633 | 633 |
| 634 TEST_F(ClientSideDetectionHostTest, UpdateIPHostMap) { | 634 TEST_F(ClientSideDetectionHostTest, UpdateIPHostMap) { |
| 635 BrowseInfo* browse_info = GetBrowseInfo(); | 635 BrowseInfo* browse_info = GetBrowseInfo(); |
| 636 | 636 |
| 637 // Empty IP or host are skipped | 637 // Empty IP or host are skipped |
| 638 UpdateIPHostMap("250.10.10.10", ""); | 638 UpdateIPHostMap("250.10.10.10", std::string()); |
| 639 ASSERT_EQ(0U, browse_info->ips.size()); | 639 ASSERT_EQ(0U, browse_info->ips.size()); |
| 640 UpdateIPHostMap("", "google.com/"); | 640 UpdateIPHostMap(std::string(), "google.com/"); |
| 641 ASSERT_EQ(0U, browse_info->ips.size()); | 641 ASSERT_EQ(0U, browse_info->ips.size()); |
| 642 UpdateIPHostMap("", ""); | 642 UpdateIPHostMap(std::string(), std::string()); |
| 643 ASSERT_EQ(0U, browse_info->ips.size()); | 643 ASSERT_EQ(0U, browse_info->ips.size()); |
| 644 | 644 |
| 645 std::set<std::string> expected_hosts; | 645 std::set<std::string> expected_hosts; |
| 646 for (int i = 0; i < 20; i++) { | 646 for (int i = 0; i < 20; i++) { |
| 647 std::string host = base::StringPrintf("%d.com/", i); | 647 std::string host = base::StringPrintf("%d.com/", i); |
| 648 expected_hosts.insert(host); | 648 expected_hosts.insert(host); |
| 649 UpdateIPHostMap("250.10.10.10", host); | 649 UpdateIPHostMap("250.10.10.10", host); |
| 650 } | 650 } |
| 651 ASSERT_EQ(1U, browse_info->ips.size()); | 651 ASSERT_EQ(1U, browse_info->ips.size()); |
| 652 ASSERT_EQ(20U, browse_info->ips["250.10.10.10"].size()); | 652 ASSERT_EQ(20U, browse_info->ips["250.10.10.10"].size()); |
| (...skipping 308 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 961 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); | 961 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); |
| 962 EXPECT_EQ(url, resource.url); | 962 EXPECT_EQ(url, resource.url); |
| 963 EXPECT_EQ(url, resource.original_url); | 963 EXPECT_EQ(url, resource.original_url); |
| 964 resource.callback.Reset(); | 964 resource.callback.Reset(); |
| 965 msg = process()->sink().GetFirstMessageMatching( | 965 msg = process()->sink().GetFirstMessageMatching( |
| 966 SafeBrowsingMsg_StartPhishingDetection::ID); | 966 SafeBrowsingMsg_StartPhishingDetection::ID); |
| 967 ASSERT_FALSE(msg); | 967 ASSERT_FALSE(msg); |
| 968 } | 968 } |
| 969 | 969 |
| 970 } // namespace safe_browsing | 970 } // namespace safe_browsing |
| OLD | NEW |