Index: chrome/browser/safe_browsing/safe_browsing_database_unittest.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc b/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc |
index 33328129d7c1fbe1dd5ac64e051feb115b6d6be7..75e4030b0bf32a51bc642901e14b72336802e8ac 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc |
@@ -32,7 +32,7 @@ |
const TimeDelta kCacheLifetime = TimeDelta::FromMinutes(45); |
SBPrefix SBPrefixForString(const std::string& str) { |
- return safe_browsing::SBFullHashForString(str).prefix; |
+ return SBFullHashForString(str).prefix; |
} |
// Construct a full hash which has the given prefix, with the given |
@@ -135,8 +135,7 @@ |
// Generate an add chunk with a full hash generated from |value|. |
SBChunkData* AddChunkFullHashValue(int chunk_number, |
const std::string& value) { |
- return AddChunkFullHash(chunk_number, |
- safe_browsing::SBFullHashForString(value)); |
+ return AddChunkFullHash(chunk_number, SBFullHashForString(value)); |
} |
// Generate an add chunk with two full hashes. |
@@ -144,8 +143,8 @@ |
const std::string& value1, |
const std::string& value2) { |
const SBFullHash full_hashes[2] = { |
- safe_browsing::SBFullHashForString(value1), |
- safe_browsing::SBFullHashForString(value2), |
+ SBFullHashForString(value1), |
+ SBFullHashForString(value2), |
}; |
return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, |
safe_browsing::ChunkData::FULL_32B, |
@@ -198,7 +197,7 @@ |
const std::string& value, |
int add_chunk_number) { |
return SubChunkFullHash(chunk_number, |
- safe_browsing::SBFullHashForString(value), |
+ SBFullHashForString(value), |
add_chunk_number); |
} |
@@ -352,12 +351,12 @@ |
chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/malware.html")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1-3", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
@@ -366,19 +365,19 @@ |
chunks.push_back(SubChunkPrefixValue(7, "www.subbed.com/noteveil1.html", 19)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1-3", lists[0].adds); |
EXPECT_EQ("7", lists[0].subs); |
if (lists.size() == 2) { |
// Old style database won't have the second entry since it creates the lists |
// when it receives an update containing that list. The filter-based |
// database has these values hard coded. |
- EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); |
+ EXPECT_EQ(safe_browsing_util::kPhishingList, lists[1].name); |
EXPECT_TRUE(lists[1].adds.empty()); |
EXPECT_TRUE(lists[1].subs.empty()); |
} |
@@ -392,15 +391,15 @@ |
SubChunkPrefixValue(201, "www.phishy2.com/notevil1.html", 1999)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kPhishingList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(2U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1-3", lists[0].adds); |
EXPECT_EQ("7", lists[0].subs); |
- EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); |
+ EXPECT_EQ(safe_browsing_util::kPhishingList, lists[1].name); |
EXPECT_EQ("47", lists[1].adds); |
EXPECT_EQ("200-201", lists[1].subs); |
} |
@@ -413,73 +412,73 @@ |
// Insert malware, phish, binurl and bindownload add chunks. |
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); |
- database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kPhishingList, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/download.html")); |
- database_->InsertChunks(safe_browsing::kBinUrlList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kBinUrlList, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkFullHashValue(5, "www.forwhitelist.com/a.html")); |
- database_->InsertChunks(safe_browsing::kCsdWhiteList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kCsdWhiteList, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkFullHashValue(6, "www.download.com/")); |
- database_->InsertChunks(safe_browsing::kDownloadWhiteList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kDownloadWhiteList, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkFullHashValue(7, "www.inclusion.com/")); |
- database_->InsertChunks(safe_browsing::kInclusionWhitelist, |
+ database_->InsertChunks(safe_browsing_util::kInclusionWhitelist, |
chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkFullHashValue(8, |
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" |
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")); |
- database_->InsertChunks(safe_browsing::kExtensionBlacklist, |
+ database_->InsertChunks(safe_browsing_util::kExtensionBlacklist, |
chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkHashedIpValue(10, "::ffff:192.168.1.0", 120)); |
- database_->InsertChunks(safe_browsing::kIPBlacklist, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kIPBlacklist, chunks.get()); |
chunks.clear(); |
chunks.push_back(AddChunkPrefixValue(11, "www.unwanted.com/software.html")); |
- database_->InsertChunks(safe_browsing::kUnwantedUrlList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kUnwantedUrlList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_EQ(9U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
- EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); |
+ EXPECT_EQ(safe_browsing_util::kPhishingList, lists[1].name); |
EXPECT_EQ("2", lists[1].adds); |
EXPECT_TRUE(lists[1].subs.empty()); |
- EXPECT_EQ(safe_browsing::kBinUrlList, lists[2].name); |
+ EXPECT_EQ(safe_browsing_util::kBinUrlList, lists[2].name); |
EXPECT_EQ("3", lists[2].adds); |
EXPECT_TRUE(lists[2].subs.empty()); |
- EXPECT_EQ(safe_browsing::kCsdWhiteList, lists[3].name); |
+ EXPECT_EQ(safe_browsing_util::kCsdWhiteList, lists[3].name); |
EXPECT_EQ("5", lists[3].adds); |
EXPECT_TRUE(lists[3].subs.empty()); |
- EXPECT_EQ(safe_browsing::kDownloadWhiteList, lists[4].name); |
+ EXPECT_EQ(safe_browsing_util::kDownloadWhiteList, lists[4].name); |
EXPECT_EQ("6", lists[4].adds); |
EXPECT_TRUE(lists[4].subs.empty()); |
- EXPECT_EQ(safe_browsing::kInclusionWhitelist, lists[5].name); |
+ EXPECT_EQ(safe_browsing_util::kInclusionWhitelist, lists[5].name); |
EXPECT_EQ("7", lists[5].adds); |
EXPECT_TRUE(lists[5].subs.empty()); |
- EXPECT_EQ(safe_browsing::kExtensionBlacklist, lists[6].name); |
+ EXPECT_EQ(safe_browsing_util::kExtensionBlacklist, lists[6].name); |
EXPECT_EQ("8", lists[6].adds); |
EXPECT_TRUE(lists[6].subs.empty()); |
- EXPECT_EQ(safe_browsing::kIPBlacklist, lists[7].name); |
+ EXPECT_EQ(safe_browsing_util::kIPBlacklist, lists[7].name); |
EXPECT_EQ("10", lists[7].adds); |
EXPECT_TRUE(lists[7].subs.empty()); |
- EXPECT_EQ(safe_browsing::kUnwantedUrlList, lists[8].name); |
+ EXPECT_EQ(safe_browsing_util::kUnwantedUrlList, lists[8].name); |
EXPECT_EQ("11", lists[8].adds); |
EXPECT_TRUE(lists[8].subs.empty()); |
@@ -498,11 +497,11 @@ |
size_t expected_list_index; |
TestListContainsBadUrl test_list_contains_bad_url; |
} const kTestCases[] { |
- { safe_browsing::kMalwareList, 0U, |
+ { safe_browsing_util::kMalwareList, 0U, |
&SafeBrowsingDatabase::ContainsBrowseUrl }, |
- { safe_browsing::kPhishingList, 1U, |
+ { safe_browsing_util::kPhishingList, 1U, |
&SafeBrowsingDatabase::ContainsBrowseUrl }, |
- { safe_browsing::kUnwantedUrlList, 8U, |
+ { safe_browsing_util::kUnwantedUrlList, 8U, |
&SafeBrowsingDatabase::ContainsUnwantedSoftwareUrl }, |
}; |
@@ -758,13 +757,13 @@ |
"www.random.com/random2.html")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Add an empty ADD and SUB chunk. |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1,10", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
@@ -777,12 +776,12 @@ |
NULL, 0, std::vector<int>())); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1,10,19", lists[0].adds); |
EXPECT_EQ("7", lists[0].subs); |
@@ -796,7 +795,7 @@ |
chunks.push_back(AddChunkPrefixValue(22, "www.notempty.com/full2.html")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
std::vector<SBPrefix> prefix_hits; |
@@ -808,28 +807,28 @@ |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1,10,19-22", lists[0].adds); |
EXPECT_EQ("7", lists[0].subs); |
// Handle AddDel and SubDel commands for empty chunks. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- AddDelChunk(safe_browsing::kMalwareList, 21); |
+ AddDelChunk(safe_browsing_util::kMalwareList, 21); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1,10,19-20,22", lists[0].adds); |
EXPECT_EQ("7", lists[0].subs); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- SubDelChunk(safe_browsing::kMalwareList, 7); |
+ SubDelChunk(safe_browsing_util::kMalwareList, 7); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1,10,19-20,22", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
} |
@@ -844,7 +843,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Cache should be cleared after updating. |
@@ -852,19 +851,17 @@ |
database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); |
SBFullHashResult full_hash; |
- full_hash.list_id = safe_browsing::MALWARE; |
+ full_hash.list_id = safe_browsing_util::MALWARE; |
std::vector<SBFullHashResult> results; |
std::vector<SBPrefix> prefixes; |
// Add a fullhash result for each prefix. |
- full_hash.hash = |
- safe_browsing::SBFullHashForString("www.evil.com/phishing.html"); |
+ full_hash.hash = SBFullHashForString("www.evil.com/phishing.html"); |
results.push_back(full_hash); |
prefixes.push_back(full_hash.hash.prefix); |
- full_hash.hash = |
- safe_browsing::SBFullHashForString("www.evil.com/malware.html"); |
+ full_hash.hash = SBFullHashForString("www.evil.com/malware.html"); |
results.push_back(full_hash); |
prefixes.push_back(full_hash.hash.prefix); |
@@ -885,9 +882,8 @@ |
GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); |
EXPECT_TRUE(prefix_hits.empty()); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- cache_hits[0].hash, |
- safe_browsing::SBFullHashForString("www.evil.com/phishing.html"))); |
+ EXPECT_TRUE(SBFullHashEqual( |
+ cache_hits[0].hash, SBFullHashForString("www.evil.com/phishing.html"))); |
prefix_hits.clear(); |
cache_hits.clear(); |
@@ -897,9 +893,8 @@ |
GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
EXPECT_TRUE(prefix_hits.empty()); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- cache_hits[0].hash, |
- safe_browsing::SBFullHashForString("www.evil.com/malware.html"))); |
+ EXPECT_TRUE(SBFullHashEqual( |
+ cache_hits[0].hash, SBFullHashForString("www.evil.com/malware.html"))); |
prefix_hits.clear(); |
cache_hits.clear(); |
@@ -910,7 +905,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// This prefix should still be there, but cached fullhash should be gone. |
@@ -930,7 +925,7 @@ |
// Test that an AddDel for the original chunk removes the last cached entry. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- AddDelChunk(safe_browsing::kMalwareList, 1); |
+ AddDelChunk(safe_browsing_util::kMalwareList, 1); |
database_->UpdateFinished(true); |
EXPECT_FALSE(database_->ContainsBrowseUrl( |
GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
@@ -972,7 +967,7 @@ |
// Since PopulateDatabaseForCacheTest() doesn't handle adding duplicate |
// chunks. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- AddDelChunk(safe_browsing::kMalwareList, 1); |
+ AddDelChunk(safe_browsing_util::kMalwareList, 1); |
database_->UpdateFinished(true); |
// Cache should be cleared after updating. |
@@ -1021,7 +1016,7 @@ |
"www.fullevil.com/bad1.html", |
"www.fullevil.com/bad2.html")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
EXPECT_TRUE(database_->ContainsBrowseUrl( |
@@ -1046,7 +1041,7 @@ |
"www.fullevil.com/bad1.html", |
20)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
EXPECT_FALSE(database_->ContainsBrowseUrl( |
@@ -1063,7 +1058,7 @@ |
// Now test an AddDel for the remaining full add. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- AddDelChunk(safe_browsing::kMalwareList, 20); |
+ AddDelChunk(safe_browsing_util::kMalwareList, 20); |
database_->UpdateFinished(true); |
EXPECT_FALSE(database_->ContainsBrowseUrl( |
@@ -1081,7 +1076,7 @@ |
{ |
ScopedVector<SBChunkData> chunks; |
chunks.push_back(AddChunkPrefixValue(21, kExampleCollision)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
} |
database_->UpdateFinished(true); |
@@ -1096,8 +1091,8 @@ |
// Cache gethash response for |kExampleCollision|. |
{ |
SBFullHashResult result; |
- result.hash = safe_browsing::SBFullHashForString(kExampleCollision); |
- result.list_id = safe_browsing::MALWARE; |
+ result.hash = SBFullHashForString(kExampleCollision); |
+ result.list_id = safe_browsing_util::MALWARE; |
database_->CacheHashResults(std::vector<SBPrefix>(1, result.hash.prefix), |
std::vector<SBFullHashResult>(1, result), |
kCacheLifetime); |
@@ -1150,7 +1145,7 @@ |
// Start an update. The insert will fail due to corruption. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Database file still exists until the corruption handler has run. |
@@ -1166,7 +1161,7 @@ |
// Run the update again successfully. |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
EXPECT_TRUE(base::PathExists(database_filename_)); |
@@ -1184,7 +1179,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kBinUrlList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kBinUrlList, chunks.get()); |
database_->UpdateFinished(true); |
std::vector<SBPrefix> prefix_hits; |
@@ -1281,13 +1276,13 @@ |
// for strings. |
TestListContainsWhitelistedString test_list_contains_whitelisted_string; |
} const kTestCases[]{ |
- {safe_browsing::kCsdWhiteList, |
+ {safe_browsing_util::kCsdWhiteList, |
&SafeBrowsingDatabase::ContainsCsdWhitelistedUrl, |
nullptr}, |
- {safe_browsing::kDownloadWhiteList, |
+ {safe_browsing_util::kDownloadWhiteList, |
&SafeBrowsingDatabase::ContainsDownloadWhitelistedUrl, |
&SafeBrowsingDatabase::ContainsDownloadWhitelistedString}, |
- {safe_browsing::kInclusionWhitelist, |
+ {safe_browsing_util::kInclusionWhitelist, |
&SafeBrowsingDatabase::ContainsInclusionWhitelistedUrl, |
nullptr}, |
}; |
@@ -1422,7 +1417,7 @@ |
GURL(std::string("http://www.google.com/")))); |
// The malware kill switch is for the CSD whitelist only. |
- if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { |
+ if (test_case.test_list_name == safe_browsing_util::kCsdWhiteList) { |
// The CSD whitelist killswitch is not present. |
EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); |
@@ -1432,7 +1427,7 @@ |
15, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kCsdWhiteList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kCsdWhiteList, chunks.get()); |
database_->UpdateFinished(true); |
EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); |
@@ -1451,7 +1446,7 @@ |
database_->UpdateFinished(true); |
// Test CSD whitelist specific methods. |
- if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { |
+ if (test_case.test_list_name == safe_browsing_util::kCsdWhiteList) { |
// The CSD whitelist killswitch is present. |
EXPECT_TRUE(database_->IsCsdWhitelistKillSwitchOn()); |
EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); |
@@ -1481,7 +1476,7 @@ |
lists.clear(); |
chunks.push_back(SubChunkFullHashValue( |
1, "sb-ssl.google.com/safebrowsing/csd/killswitch", 5)); |
- if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { |
+ if (test_case.test_list_name == safe_browsing_util::kCsdWhiteList) { |
chunks.push_back(SubChunkFullHashValue( |
10, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware", 15)); |
} |
@@ -1490,7 +1485,7 @@ |
database_->InsertChunks(test_case.test_list_name, chunks.get()); |
database_->UpdateFinished(true); |
- if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { |
+ if (test_case.test_list_name == safe_browsing_util::kCsdWhiteList) { |
EXPECT_FALSE(database_->IsMalwareIPMatchKillSwitchOn()); |
EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); |
} |
@@ -1533,12 +1528,12 @@ |
// Insert the testing chunks into database. |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(1U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
@@ -1549,15 +1544,15 @@ |
"www.evil.com/phishing2.html")); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kPhishingList, chunks.get()); |
database_->UpdateFinished(true); |
GetListsInfo(&lists); |
ASSERT_LE(2U, lists.size()); |
- EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); |
+ EXPECT_EQ(safe_browsing_util::kMalwareList, lists[0].name); |
EXPECT_EQ("1", lists[0].adds); |
EXPECT_TRUE(lists[0].subs.empty()); |
- EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); |
+ EXPECT_EQ(safe_browsing_util::kPhishingList, lists[1].name); |
EXPECT_EQ("47", lists[1].adds); |
EXPECT_TRUE(lists[1].subs.empty()); |
@@ -1578,14 +1573,14 @@ |
chunks.clear(); |
chunks.push_back(SubChunkPrefixValue(4, "www.evil.com/malware1.html", 1)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Remove the prefix that added last. |
chunks.clear(); |
chunks.push_back(SubChunkPrefixValue(5, "www.evil.com/phishing2.html", 47)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kPhishingList, chunks.get()); |
database_->UpdateFinished(true); |
// Verify that the database contains urls expected. |
@@ -1611,7 +1606,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Get an older time to reset the lastmod time for detecting whether |
@@ -1628,7 +1623,7 @@ |
ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); |
EXPECT_LT(before_info.last_modified, after_info.last_modified); |
@@ -1637,7 +1632,7 @@ |
ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); |
ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- AddDelChunk(safe_browsing::kMalwareList, 2); |
+ AddDelChunk(safe_browsing_util::kMalwareList, 2); |
database_->UpdateFinished(true); |
ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); |
EXPECT_LT(before_info.last_modified, after_info.last_modified); |
@@ -1663,7 +1658,7 @@ |
ScopedVector<SBChunkData> chunks; |
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
} |
@@ -1713,7 +1708,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -1768,7 +1763,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -1812,7 +1807,7 @@ |
std::vector<SBFullHashResult> cache_results; |
SBFullHashResult full_hash_result; |
- full_hash_result.list_id = safe_browsing::MALWARE; |
+ full_hash_result.list_id = safe_browsing_util::MALWARE; |
full_hash_result.hash = kFullHash1_1; |
cache_results.push_back(full_hash_result); |
@@ -1832,8 +1827,7 @@ |
full_hashes, &prefix_hits, &cache_hits)); |
EXPECT_TRUE(prefix_hits.empty()); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_1, cache_hits[0].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_1, cache_hits[0].hash)); |
// Adding kFullHash2_1 will see the existing cache hit plus the prefix hit |
// for kPrefix2. |
@@ -1845,8 +1839,7 @@ |
ASSERT_EQ(1U, prefix_hits.size()); |
EXPECT_EQ(kPrefix2, prefix_hits[0]); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_1, cache_hits[0].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_1, cache_hits[0].hash)); |
// kFullHash1_3 also gets a cache hit. |
full_hashes.push_back(kFullHash1_3); |
@@ -1857,10 +1850,8 @@ |
ASSERT_EQ(1U, prefix_hits.size()); |
EXPECT_EQ(kPrefix2, prefix_hits[0]); |
ASSERT_EQ(2U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_1, cache_hits[0].hash)); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_3, cache_hits[1].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_1, cache_hits[0].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_3, cache_hits[1].hash)); |
} |
{ |
@@ -1872,8 +1863,7 @@ |
full_hashes, &prefix_hits, &cache_hits)); |
EXPECT_TRUE(prefix_hits.empty()); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_3, cache_hits[0].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_3, cache_hits[0].hash)); |
} |
{ |
@@ -1913,7 +1903,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -1948,7 +1938,7 @@ |
{ |
// Cache a gethash result for kFullHash1_2. |
SBFullHashResult full_hash_result; |
- full_hash_result.list_id = safe_browsing::MALWARE; |
+ full_hash_result.list_id = safe_browsing_util::MALWARE; |
full_hash_result.hash = kFullHash1_2; |
std::vector<SBPrefix> prefixes(1, kPrefix1); |
@@ -1982,8 +1972,7 @@ |
full_hashes, &prefix_hits, &cache_hits)); |
EXPECT_TRUE(prefix_hits.empty()); |
ASSERT_EQ(1U, cache_hits.size()); |
- EXPECT_TRUE(safe_browsing::SBFullHashEqual( |
- kFullHash1_2, cache_hits[0].hash)); |
+ EXPECT_TRUE(SBFullHashEqual(kFullHash1_2, cache_hits[0].hash)); |
} |
// Remove kFullHash1_1 from the database. |
@@ -1991,7 +1980,7 @@ |
chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Cache should be cleared after updating. |
@@ -2029,7 +2018,7 @@ |
chunks.push_back(SubChunkFullHash(12, kFullHash1_2, 2)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
// Cache should be cleared after updating. |
@@ -2061,7 +2050,7 @@ |
std::vector<SBListChunkRanges> lists; |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -2078,7 +2067,7 @@ |
chunks.push_back(AddChunkPrefix(2, kPrefix1)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -2098,7 +2087,7 @@ |
chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); |
ASSERT_TRUE(database_->UpdateStarted(&lists)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
database_->UpdateFinished(true); |
{ |
@@ -2138,7 +2127,7 @@ |
// IPv4 prefix match for ::ffff:192.1.128.0/113. |
chunks.push_back(AddChunkHashedIpValue(6, "::ffff:192.1.128.0", 113)); |
- database_->InsertChunks(safe_browsing::kIPBlacklist, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kIPBlacklist, chunks.get()); |
database_->UpdateFinished(true); |
EXPECT_FALSE(database_->ContainsMalwareIP("192.168.0.255")); |
@@ -2188,7 +2177,7 @@ |
{ |
ScopedVector<SBChunkData> chunks; |
chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/")); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
} |
// Add a specific fullhash. |
@@ -2196,7 +2185,7 @@ |
{ |
ScopedVector<SBChunkData> chunks; |
chunks.push_back(AddChunkFullHashValue(2, kWhateverMalware)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
} |
// Add a fullhash which has a prefix collision for a known url. |
@@ -2208,7 +2197,7 @@ |
{ |
ScopedVector<SBChunkData> chunks; |
chunks.push_back(AddChunkFullHashValue(3, kExampleCollision)); |
- database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); |
+ database_->InsertChunks(safe_browsing_util::kMalwareList, chunks.get()); |
} |
database_->UpdateFinished(true); |