OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // Unit tests for the SafeBrowsing storage system. | 5 // Unit tests for the SafeBrowsing storage system. |
6 | 6 |
7 #include "chrome/browser/safe_browsing/safe_browsing_database.h" | 7 #include "chrome/browser/safe_browsing/safe_browsing_database.h" |
8 | 8 |
9 #include "base/files/file_util.h" | 9 #include "base/files/file_util.h" |
10 #include "base/files/scoped_temp_dir.h" | 10 #include "base/files/scoped_temp_dir.h" |
11 #include "base/logging.h" | 11 #include "base/logging.h" |
12 #include "base/memory/scoped_vector.h" | 12 #include "base/memory/scoped_vector.h" |
13 #include "base/message_loop/message_loop.h" | 13 #include "base/message_loop/message_loop.h" |
14 #include "base/sha1.h" | 14 #include "base/sha1.h" |
15 #include "base/strings/string_number_conversions.h" | 15 #include "base/strings/string_number_conversions.h" |
16 #include "base/strings/string_split.h" | 16 #include "base/strings/string_split.h" |
17 #include "base/test/test_simple_task_runner.h" | 17 #include "base/test/test_simple_task_runner.h" |
18 #include "base/time/time.h" | 18 #include "base/time/time.h" |
19 #include "chrome/browser/safe_browsing/chunk.pb.h" | 19 #include "chrome/browser/safe_browsing/chunk.pb.h" |
20 #include "chrome/browser/safe_browsing/safe_browsing_store_file.h" | 20 #include "chrome/browser/safe_browsing/safe_browsing_store_file.h" |
21 #include "crypto/sha2.h" | 21 #include "crypto/sha2.h" |
22 #include "net/base/ip_address_number.h" | 22 #include "net/base/ip_address_number.h" |
23 #include "testing/gtest/include/gtest/gtest.h" | 23 #include "testing/gtest/include/gtest/gtest.h" |
24 #include "testing/platform_test.h" | 24 #include "testing/platform_test.h" |
25 #include "url/gurl.h" | 25 #include "url/gurl.h" |
26 | 26 |
27 using base::Time; | 27 using base::Time; |
28 using base::TimeDelta; | 28 using base::TimeDelta; |
29 | 29 |
| 30 namespace safe_browsing { |
| 31 |
30 namespace { | 32 namespace { |
31 | 33 |
32 const TimeDelta kCacheLifetime = TimeDelta::FromMinutes(45); | 34 const TimeDelta kCacheLifetime = TimeDelta::FromMinutes(45); |
33 | 35 |
34 SBPrefix SBPrefixForString(const std::string& str) { | 36 SBPrefix SBPrefixForString(const std::string& str) { |
35 return safe_browsing::SBFullHashForString(str).prefix; | 37 return SBFullHashForString(str).prefix; |
36 } | 38 } |
37 | 39 |
38 // Construct a full hash which has the given prefix, with the given | 40 // Construct a full hash which has the given prefix, with the given |
39 // suffix data coming after the prefix. | 41 // suffix data coming after the prefix. |
40 SBFullHash SBFullHashForPrefixAndSuffix(SBPrefix prefix, | 42 SBFullHash SBFullHashForPrefixAndSuffix(SBPrefix prefix, |
41 const base::StringPiece& suffix) { | 43 const base::StringPiece& suffix) { |
42 SBFullHash full_hash; | 44 SBFullHash full_hash; |
43 memset(&full_hash, 0, sizeof(SBFullHash)); | 45 memset(&full_hash, 0, sizeof(SBFullHash)); |
44 full_hash.prefix = prefix; | 46 full_hash.prefix = prefix; |
45 CHECK_LE(suffix.size() + sizeof(SBPrefix), sizeof(SBFullHash)); | 47 CHECK_LE(suffix.size() + sizeof(SBPrefix), sizeof(SBFullHash)); |
46 memcpy(full_hash.full_hash + sizeof(SBPrefix), suffix.data(), suffix.size()); | 48 memcpy(full_hash.full_hash + sizeof(SBPrefix), suffix.data(), suffix.size()); |
47 return full_hash; | 49 return full_hash; |
48 } | 50 } |
49 | 51 |
50 std::string HashedIpPrefix(const std::string& ip_prefix, size_t prefix_size) { | 52 std::string HashedIpPrefix(const std::string& ip_prefix, size_t prefix_size) { |
51 net::IPAddressNumber ip_number; | 53 net::IPAddressNumber ip_number; |
52 EXPECT_TRUE(net::ParseIPLiteralToNumber(ip_prefix, &ip_number)); | 54 EXPECT_TRUE(net::ParseIPLiteralToNumber(ip_prefix, &ip_number)); |
53 EXPECT_EQ(net::kIPv6AddressSize, ip_number.size()); | 55 EXPECT_EQ(net::kIPv6AddressSize, ip_number.size()); |
54 const std::string hashed_ip_prefix = base::SHA1HashString( | 56 const std::string hashed_ip_prefix = base::SHA1HashString( |
55 net::IPAddressToPackedString(ip_number)); | 57 net::IPAddressToPackedString(ip_number)); |
56 std::string hash(crypto::kSHA256Length, '\0'); | 58 std::string hash(crypto::kSHA256Length, '\0'); |
57 hash.replace(0, hashed_ip_prefix.size(), hashed_ip_prefix); | 59 hash.replace(0, hashed_ip_prefix.size(), hashed_ip_prefix); |
58 hash[base::kSHA1Length] = static_cast<char>(prefix_size); | 60 hash[base::kSHA1Length] = static_cast<char>(prefix_size); |
59 return hash; | 61 return hash; |
60 } | 62 } |
61 | 63 |
62 // Helper to build a chunk. Caller takes ownership. | 64 // Helper to build a chunk. Caller takes ownership. |
63 SBChunkData* BuildChunk(int chunk_number, | 65 SBChunkData* BuildChunk(int chunk_number, |
64 safe_browsing::ChunkData::ChunkType chunk_type, | 66 ChunkData::ChunkType chunk_type, |
65 safe_browsing::ChunkData::PrefixType prefix_type, | 67 ChunkData::PrefixType prefix_type, |
66 const void* data, size_t data_size, | 68 const void* data, |
| 69 size_t data_size, |
67 const std::vector<int>& add_chunk_numbers) { | 70 const std::vector<int>& add_chunk_numbers) { |
68 scoped_ptr<safe_browsing::ChunkData> raw_data(new safe_browsing::ChunkData); | 71 scoped_ptr<ChunkData> raw_data(new ChunkData); |
69 raw_data->set_chunk_number(chunk_number); | 72 raw_data->set_chunk_number(chunk_number); |
70 raw_data->set_chunk_type(chunk_type); | 73 raw_data->set_chunk_type(chunk_type); |
71 raw_data->set_prefix_type(prefix_type); | 74 raw_data->set_prefix_type(prefix_type); |
72 raw_data->set_hashes(data, data_size); | 75 raw_data->set_hashes(data, data_size); |
73 raw_data->clear_add_numbers(); | 76 raw_data->clear_add_numbers(); |
74 for (size_t i = 0; i < add_chunk_numbers.size(); ++i) { | 77 for (size_t i = 0; i < add_chunk_numbers.size(); ++i) { |
75 raw_data->add_add_numbers(add_chunk_numbers[i]); | 78 raw_data->add_add_numbers(add_chunk_numbers[i]); |
76 } | 79 } |
77 | 80 |
78 return new SBChunkData(raw_data.release()); | 81 return new SBChunkData(raw_data.release()); |
79 } | 82 } |
80 | 83 |
81 // Create add chunk with a single prefix. | 84 // Create add chunk with a single prefix. |
82 SBChunkData* AddChunkPrefix(int chunk_number, SBPrefix prefix) { | 85 SBChunkData* AddChunkPrefix(int chunk_number, SBPrefix prefix) { |
83 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 86 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::PREFIX_4B, &prefix, |
84 safe_browsing::ChunkData::PREFIX_4B, | 87 sizeof(prefix), std::vector<int>()); |
85 &prefix, sizeof(prefix), | |
86 std::vector<int>()); | |
87 } | 88 } |
88 | 89 |
89 // Create add chunk with a single prefix generated from |value|. | 90 // Create add chunk with a single prefix generated from |value|. |
90 SBChunkData* AddChunkPrefixValue(int chunk_number, | 91 SBChunkData* AddChunkPrefixValue(int chunk_number, |
91 const std::string& value) { | 92 const std::string& value) { |
92 return AddChunkPrefix(chunk_number, SBPrefixForString(value)); | 93 return AddChunkPrefix(chunk_number, SBPrefixForString(value)); |
93 } | 94 } |
94 | 95 |
95 // Generate an add chunk with two prefixes. | 96 // Generate an add chunk with two prefixes. |
96 SBChunkData* AddChunkPrefix2Value(int chunk_number, | 97 SBChunkData* AddChunkPrefix2Value(int chunk_number, |
97 const std::string& value1, | 98 const std::string& value1, |
98 const std::string& value2) { | 99 const std::string& value2) { |
99 const SBPrefix prefixes[2] = { | 100 const SBPrefix prefixes[2] = { |
100 SBPrefixForString(value1), | 101 SBPrefixForString(value1), |
101 SBPrefixForString(value2), | 102 SBPrefixForString(value2), |
102 }; | 103 }; |
103 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 104 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::PREFIX_4B, |
104 safe_browsing::ChunkData::PREFIX_4B, | 105 &prefixes[0], sizeof(prefixes), std::vector<int>()); |
105 &prefixes[0], sizeof(prefixes), | |
106 std::vector<int>()); | |
107 } | 106 } |
108 | 107 |
109 // Generate an add chunk with four prefixes. | 108 // Generate an add chunk with four prefixes. |
110 SBChunkData* AddChunkPrefix4Value(int chunk_number, | 109 SBChunkData* AddChunkPrefix4Value(int chunk_number, |
111 const std::string& value1, | 110 const std::string& value1, |
112 const std::string& value2, | 111 const std::string& value2, |
113 const std::string& value3, | 112 const std::string& value3, |
114 const std::string& value4) { | 113 const std::string& value4) { |
115 const SBPrefix prefixes[4] = { | 114 const SBPrefix prefixes[4] = { |
116 SBPrefixForString(value1), | 115 SBPrefixForString(value1), |
117 SBPrefixForString(value2), | 116 SBPrefixForString(value2), |
118 SBPrefixForString(value3), | 117 SBPrefixForString(value3), |
119 SBPrefixForString(value4), | 118 SBPrefixForString(value4), |
120 }; | 119 }; |
121 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 120 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::PREFIX_4B, |
122 safe_browsing::ChunkData::PREFIX_4B, | 121 &prefixes[0], sizeof(prefixes), std::vector<int>()); |
123 &prefixes[0], sizeof(prefixes), | |
124 std::vector<int>()); | |
125 } | 122 } |
126 | 123 |
127 // Generate an add chunk with a full hash. | 124 // Generate an add chunk with a full hash. |
128 SBChunkData* AddChunkFullHash(int chunk_number, SBFullHash full_hash) { | 125 SBChunkData* AddChunkFullHash(int chunk_number, SBFullHash full_hash) { |
129 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 126 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::FULL_32B, |
130 safe_browsing::ChunkData::FULL_32B, | 127 &full_hash, sizeof(full_hash), std::vector<int>()); |
131 &full_hash, sizeof(full_hash), | |
132 std::vector<int>()); | |
133 } | 128 } |
134 | 129 |
135 // Generate an add chunk with a full hash generated from |value|. | 130 // Generate an add chunk with a full hash generated from |value|. |
136 SBChunkData* AddChunkFullHashValue(int chunk_number, | 131 SBChunkData* AddChunkFullHashValue(int chunk_number, |
137 const std::string& value) { | 132 const std::string& value) { |
138 return AddChunkFullHash(chunk_number, | 133 return AddChunkFullHash(chunk_number, |
139 safe_browsing::SBFullHashForString(value)); | 134 SBFullHashForString(value)); |
140 } | 135 } |
141 | 136 |
142 // Generate an add chunk with two full hashes. | 137 // Generate an add chunk with two full hashes. |
143 SBChunkData* AddChunkFullHash2Value(int chunk_number, | 138 SBChunkData* AddChunkFullHash2Value(int chunk_number, |
144 const std::string& value1, | 139 const std::string& value1, |
145 const std::string& value2) { | 140 const std::string& value2) { |
146 const SBFullHash full_hashes[2] = { | 141 const SBFullHash full_hashes[2] = { |
147 safe_browsing::SBFullHashForString(value1), | 142 SBFullHashForString(value1), |
148 safe_browsing::SBFullHashForString(value2), | 143 SBFullHashForString(value2), |
149 }; | 144 }; |
150 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 145 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::FULL_32B, |
151 safe_browsing::ChunkData::FULL_32B, | 146 &full_hashes[0], sizeof(full_hashes), std::vector<int>()); |
152 &full_hashes[0], sizeof(full_hashes), | |
153 std::vector<int>()); | |
154 } | 147 } |
155 | 148 |
156 // Generate a sub chunk with a prefix generated from |value|. | 149 // Generate a sub chunk with a prefix generated from |value|. |
157 SBChunkData* SubChunkPrefixValue(int chunk_number, | 150 SBChunkData* SubChunkPrefixValue(int chunk_number, |
158 const std::string& value, | 151 const std::string& value, |
159 int add_chunk_number) { | 152 int add_chunk_number) { |
160 const SBPrefix prefix = SBPrefixForString(value); | 153 const SBPrefix prefix = SBPrefixForString(value); |
161 return BuildChunk(chunk_number, safe_browsing::ChunkData::SUB, | 154 return BuildChunk(chunk_number, ChunkData::SUB, ChunkData::PREFIX_4B, &prefix, |
162 safe_browsing::ChunkData::PREFIX_4B, | 155 sizeof(prefix), std::vector<int>(1, add_chunk_number)); |
163 &prefix, sizeof(prefix), | |
164 std::vector<int>(1, add_chunk_number)); | |
165 } | 156 } |
166 | 157 |
167 // Generate a sub chunk with two prefixes. | 158 // Generate a sub chunk with two prefixes. |
168 SBChunkData* SubChunkPrefix2Value(int chunk_number, | 159 SBChunkData* SubChunkPrefix2Value(int chunk_number, |
169 const std::string& value1, | 160 const std::string& value1, |
170 int add_chunk_number1, | 161 int add_chunk_number1, |
171 const std::string& value2, | 162 const std::string& value2, |
172 int add_chunk_number2) { | 163 int add_chunk_number2) { |
173 const SBPrefix prefixes[2] = { | 164 const SBPrefix prefixes[2] = { |
174 SBPrefixForString(value1), | 165 SBPrefixForString(value1), |
175 SBPrefixForString(value2), | 166 SBPrefixForString(value2), |
176 }; | 167 }; |
177 std::vector<int> add_chunk_numbers; | 168 std::vector<int> add_chunk_numbers; |
178 add_chunk_numbers.push_back(add_chunk_number1); | 169 add_chunk_numbers.push_back(add_chunk_number1); |
179 add_chunk_numbers.push_back(add_chunk_number2); | 170 add_chunk_numbers.push_back(add_chunk_number2); |
180 return BuildChunk(chunk_number, safe_browsing::ChunkData::SUB, | 171 return BuildChunk(chunk_number, ChunkData::SUB, ChunkData::PREFIX_4B, |
181 safe_browsing::ChunkData::PREFIX_4B, | 172 &prefixes[0], sizeof(prefixes), add_chunk_numbers); |
182 &prefixes[0], sizeof(prefixes), | |
183 add_chunk_numbers); | |
184 } | 173 } |
185 | 174 |
186 // Generate a sub chunk with a full hash. | 175 // Generate a sub chunk with a full hash. |
187 SBChunkData* SubChunkFullHash(int chunk_number, | 176 SBChunkData* SubChunkFullHash(int chunk_number, |
188 SBFullHash full_hash, | 177 SBFullHash full_hash, |
189 int add_chunk_number) { | 178 int add_chunk_number) { |
190 return BuildChunk(chunk_number, safe_browsing::ChunkData::SUB, | 179 return BuildChunk(chunk_number, ChunkData::SUB, ChunkData::FULL_32B, |
191 safe_browsing::ChunkData::FULL_32B, | |
192 &full_hash, sizeof(full_hash), | 180 &full_hash, sizeof(full_hash), |
193 std::vector<int>(1, add_chunk_number)); | 181 std::vector<int>(1, add_chunk_number)); |
194 } | 182 } |
195 | 183 |
196 // Generate a sub chunk with a full hash generated from |value|. | 184 // Generate a sub chunk with a full hash generated from |value|. |
197 SBChunkData* SubChunkFullHashValue(int chunk_number, | 185 SBChunkData* SubChunkFullHashValue(int chunk_number, |
198 const std::string& value, | 186 const std::string& value, |
199 int add_chunk_number) { | 187 int add_chunk_number) { |
200 return SubChunkFullHash(chunk_number, | 188 return SubChunkFullHash(chunk_number, |
201 safe_browsing::SBFullHashForString(value), | 189 SBFullHashForString(value), |
202 add_chunk_number); | 190 add_chunk_number); |
203 } | 191 } |
204 | 192 |
205 // Generate an add chunk with a single full hash for the ip blacklist. | 193 // Generate an add chunk with a single full hash for the ip blacklist. |
206 SBChunkData* AddChunkHashedIpValue(int chunk_number, | 194 SBChunkData* AddChunkHashedIpValue(int chunk_number, |
207 const std::string& ip_str, | 195 const std::string& ip_str, |
208 size_t prefix_size) { | 196 size_t prefix_size) { |
209 const std::string full_hash_str = HashedIpPrefix(ip_str, prefix_size); | 197 const std::string full_hash_str = HashedIpPrefix(ip_str, prefix_size); |
210 EXPECT_EQ(sizeof(SBFullHash), full_hash_str.size()); | 198 EXPECT_EQ(sizeof(SBFullHash), full_hash_str.size()); |
211 SBFullHash full_hash; | 199 SBFullHash full_hash; |
212 std::memcpy(&(full_hash.full_hash), full_hash_str.data(), sizeof(SBFullHash)); | 200 std::memcpy(&(full_hash.full_hash), full_hash_str.data(), sizeof(SBFullHash)); |
213 return BuildChunk(chunk_number, safe_browsing::ChunkData::ADD, | 201 return BuildChunk(chunk_number, ChunkData::ADD, ChunkData::FULL_32B, |
214 safe_browsing::ChunkData::FULL_32B, | 202 &full_hash, sizeof(full_hash), std::vector<int>()); |
215 &full_hash, sizeof(full_hash), | |
216 std::vector<int>()); | |
217 } | 203 } |
218 | 204 |
219 // Prevent DCHECK from killing tests. | 205 // Prevent DCHECK from killing tests. |
220 // TODO(shess): Pawel disputes the use of this, so the test which uses | 206 // TODO(shess): Pawel disputes the use of this, so the test which uses |
221 // it is DISABLED. http://crbug.com/56448 | 207 // it is DISABLED. http://crbug.com/56448 |
222 class ScopedLogMessageIgnorer { | 208 class ScopedLogMessageIgnorer { |
223 public: | 209 public: |
224 ScopedLogMessageIgnorer() { | 210 ScopedLogMessageIgnorer() { |
225 logging::SetLogMessageHandler(&LogMessageIgnorer); | 211 logging::SetLogMessageHandler(&LogMessageIgnorer); |
226 } | 212 } |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
345 // Tests retrieving list name information. | 331 // Tests retrieving list name information. |
346 TEST_F(SafeBrowsingDatabaseTest, BrowseListsInfo) { | 332 TEST_F(SafeBrowsingDatabaseTest, BrowseListsInfo) { |
347 std::vector<SBListChunkRanges> lists; | 333 std::vector<SBListChunkRanges> lists; |
348 ScopedVector<SBChunkData> chunks; | 334 ScopedVector<SBChunkData> chunks; |
349 | 335 |
350 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); | 336 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
351 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); | 337 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); |
352 chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/malware.html")); | 338 chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/malware.html")); |
353 | 339 |
354 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 340 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
355 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 341 database_->InsertChunks(kMalwareList, chunks.get()); |
356 database_->UpdateFinished(true); | 342 database_->UpdateFinished(true); |
357 | 343 |
358 GetListsInfo(&lists); | 344 GetListsInfo(&lists); |
359 ASSERT_LE(1U, lists.size()); | 345 ASSERT_LE(1U, lists.size()); |
360 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 346 EXPECT_EQ(kMalwareList, lists[0].name); |
361 EXPECT_EQ("1-3", lists[0].adds); | 347 EXPECT_EQ("1-3", lists[0].adds); |
362 EXPECT_TRUE(lists[0].subs.empty()); | 348 EXPECT_TRUE(lists[0].subs.empty()); |
363 | 349 |
364 // Insert a malware sub chunk. | 350 // Insert a malware sub chunk. |
365 chunks.clear(); | 351 chunks.clear(); |
366 chunks.push_back(SubChunkPrefixValue(7, "www.subbed.com/noteveil1.html", 19)); | 352 chunks.push_back(SubChunkPrefixValue(7, "www.subbed.com/noteveil1.html", 19)); |
367 | 353 |
368 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 354 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
369 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 355 database_->InsertChunks(kMalwareList, chunks.get()); |
370 database_->UpdateFinished(true); | 356 database_->UpdateFinished(true); |
371 | 357 |
372 GetListsInfo(&lists); | 358 GetListsInfo(&lists); |
373 ASSERT_LE(1U, lists.size()); | 359 ASSERT_LE(1U, lists.size()); |
374 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 360 EXPECT_EQ(kMalwareList, lists[0].name); |
375 EXPECT_EQ("1-3", lists[0].adds); | 361 EXPECT_EQ("1-3", lists[0].adds); |
376 EXPECT_EQ("7", lists[0].subs); | 362 EXPECT_EQ("7", lists[0].subs); |
377 if (lists.size() == 2) { | 363 if (lists.size() == 2) { |
378 // Old style database won't have the second entry since it creates the lists | 364 // Old style database won't have the second entry since it creates the lists |
379 // when it receives an update containing that list. The filter-based | 365 // when it receives an update containing that list. The filter-based |
380 // database has these values hard coded. | 366 // database has these values hard coded. |
381 EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); | 367 EXPECT_EQ(kPhishingList, lists[1].name); |
382 EXPECT_TRUE(lists[1].adds.empty()); | 368 EXPECT_TRUE(lists[1].adds.empty()); |
383 EXPECT_TRUE(lists[1].subs.empty()); | 369 EXPECT_TRUE(lists[1].subs.empty()); |
384 } | 370 } |
385 | 371 |
386 // Add phishing chunks. | 372 // Add phishing chunks. |
387 chunks.clear(); | 373 chunks.clear(); |
388 chunks.push_back(AddChunkPrefixValue(47, "www.evil.com/phishing.html")); | 374 chunks.push_back(AddChunkPrefixValue(47, "www.evil.com/phishing.html")); |
389 chunks.push_back( | 375 chunks.push_back( |
390 SubChunkPrefixValue(200, "www.phishy.com/notevil1.html", 1999)); | 376 SubChunkPrefixValue(200, "www.phishy.com/notevil1.html", 1999)); |
391 chunks.push_back( | 377 chunks.push_back( |
392 SubChunkPrefixValue(201, "www.phishy2.com/notevil1.html", 1999)); | 378 SubChunkPrefixValue(201, "www.phishy2.com/notevil1.html", 1999)); |
393 | 379 |
394 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 380 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
395 database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); | 381 database_->InsertChunks(kPhishingList, chunks.get()); |
396 database_->UpdateFinished(true); | 382 database_->UpdateFinished(true); |
397 | 383 |
398 GetListsInfo(&lists); | 384 GetListsInfo(&lists); |
399 ASSERT_LE(2U, lists.size()); | 385 ASSERT_LE(2U, lists.size()); |
400 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 386 EXPECT_EQ(kMalwareList, lists[0].name); |
401 EXPECT_EQ("1-3", lists[0].adds); | 387 EXPECT_EQ("1-3", lists[0].adds); |
402 EXPECT_EQ("7", lists[0].subs); | 388 EXPECT_EQ("7", lists[0].subs); |
403 EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); | 389 EXPECT_EQ(kPhishingList, lists[1].name); |
404 EXPECT_EQ("47", lists[1].adds); | 390 EXPECT_EQ("47", lists[1].adds); |
405 EXPECT_EQ("200-201", lists[1].subs); | 391 EXPECT_EQ("200-201", lists[1].subs); |
406 } | 392 } |
407 | 393 |
408 TEST_F(SafeBrowsingDatabaseTest, ListNames) { | 394 TEST_F(SafeBrowsingDatabaseTest, ListNames) { |
409 ScopedVector<SBChunkData> chunks; | 395 ScopedVector<SBChunkData> chunks; |
410 | 396 |
411 std::vector<SBListChunkRanges> lists; | 397 std::vector<SBListChunkRanges> lists; |
412 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 398 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
413 | 399 |
414 // Insert malware, phish, binurl and bindownload add chunks. | 400 // Insert malware, phish, binurl and bindownload add chunks. |
415 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); | 401 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
416 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 402 database_->InsertChunks(kMalwareList, chunks.get()); |
417 | 403 |
418 chunks.clear(); | 404 chunks.clear(); |
419 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); | 405 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); |
420 database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); | 406 database_->InsertChunks(kPhishingList, chunks.get()); |
421 | 407 |
422 chunks.clear(); | 408 chunks.clear(); |
423 chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/download.html")); | 409 chunks.push_back(AddChunkPrefixValue(3, "www.whatever.com/download.html")); |
424 database_->InsertChunks(safe_browsing::kBinUrlList, chunks.get()); | 410 database_->InsertChunks(kBinUrlList, chunks.get()); |
425 | 411 |
426 chunks.clear(); | 412 chunks.clear(); |
427 chunks.push_back(AddChunkFullHashValue(5, "www.forwhitelist.com/a.html")); | 413 chunks.push_back(AddChunkFullHashValue(5, "www.forwhitelist.com/a.html")); |
428 database_->InsertChunks(safe_browsing::kCsdWhiteList, chunks.get()); | 414 database_->InsertChunks(kCsdWhiteList, chunks.get()); |
429 | 415 |
430 chunks.clear(); | 416 chunks.clear(); |
431 chunks.push_back(AddChunkFullHashValue(6, "www.download.com/")); | 417 chunks.push_back(AddChunkFullHashValue(6, "www.download.com/")); |
432 database_->InsertChunks(safe_browsing::kDownloadWhiteList, chunks.get()); | 418 database_->InsertChunks(kDownloadWhiteList, chunks.get()); |
433 | 419 |
434 chunks.clear(); | 420 chunks.clear(); |
435 chunks.push_back(AddChunkFullHashValue(7, "www.inclusion.com/")); | 421 chunks.push_back(AddChunkFullHashValue(7, "www.inclusion.com/")); |
436 database_->InsertChunks(safe_browsing::kInclusionWhitelist, | 422 database_->InsertChunks(kInclusionWhitelist, |
437 chunks.get()); | 423 chunks.get()); |
438 | 424 |
439 chunks.clear(); | 425 chunks.clear(); |
440 chunks.push_back(AddChunkFullHashValue(8, | 426 chunks.push_back(AddChunkFullHashValue(8, |
441 "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" | 427 "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" |
442 "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")); | 428 "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")); |
443 database_->InsertChunks(safe_browsing::kExtensionBlacklist, | 429 database_->InsertChunks(kExtensionBlacklist, |
444 chunks.get()); | 430 chunks.get()); |
445 | 431 |
446 chunks.clear(); | 432 chunks.clear(); |
447 chunks.push_back(AddChunkHashedIpValue(10, "::ffff:192.168.1.0", 120)); | 433 chunks.push_back(AddChunkHashedIpValue(10, "::ffff:192.168.1.0", 120)); |
448 database_->InsertChunks(safe_browsing::kIPBlacklist, chunks.get()); | 434 database_->InsertChunks(kIPBlacklist, chunks.get()); |
449 | 435 |
450 chunks.clear(); | 436 chunks.clear(); |
451 chunks.push_back(AddChunkPrefixValue(11, "www.unwanted.com/software.html")); | 437 chunks.push_back(AddChunkPrefixValue(11, "www.unwanted.com/software.html")); |
452 database_->InsertChunks(safe_browsing::kUnwantedUrlList, chunks.get()); | 438 database_->InsertChunks(kUnwantedUrlList, chunks.get()); |
453 | 439 |
454 database_->UpdateFinished(true); | 440 database_->UpdateFinished(true); |
455 | 441 |
456 GetListsInfo(&lists); | 442 GetListsInfo(&lists); |
457 ASSERT_EQ(9U, lists.size()); | 443 ASSERT_EQ(9U, lists.size()); |
458 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 444 EXPECT_EQ(kMalwareList, lists[0].name); |
459 EXPECT_EQ("1", lists[0].adds); | 445 EXPECT_EQ("1", lists[0].adds); |
460 EXPECT_TRUE(lists[0].subs.empty()); | 446 EXPECT_TRUE(lists[0].subs.empty()); |
461 EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); | 447 EXPECT_EQ(kPhishingList, lists[1].name); |
462 EXPECT_EQ("2", lists[1].adds); | 448 EXPECT_EQ("2", lists[1].adds); |
463 EXPECT_TRUE(lists[1].subs.empty()); | 449 EXPECT_TRUE(lists[1].subs.empty()); |
464 EXPECT_EQ(safe_browsing::kBinUrlList, lists[2].name); | 450 EXPECT_EQ(kBinUrlList, lists[2].name); |
465 EXPECT_EQ("3", lists[2].adds); | 451 EXPECT_EQ("3", lists[2].adds); |
466 EXPECT_TRUE(lists[2].subs.empty()); | 452 EXPECT_TRUE(lists[2].subs.empty()); |
467 EXPECT_EQ(safe_browsing::kCsdWhiteList, lists[3].name); | 453 EXPECT_EQ(kCsdWhiteList, lists[3].name); |
468 EXPECT_EQ("5", lists[3].adds); | 454 EXPECT_EQ("5", lists[3].adds); |
469 EXPECT_TRUE(lists[3].subs.empty()); | 455 EXPECT_TRUE(lists[3].subs.empty()); |
470 EXPECT_EQ(safe_browsing::kDownloadWhiteList, lists[4].name); | 456 EXPECT_EQ(kDownloadWhiteList, lists[4].name); |
471 EXPECT_EQ("6", lists[4].adds); | 457 EXPECT_EQ("6", lists[4].adds); |
472 EXPECT_TRUE(lists[4].subs.empty()); | 458 EXPECT_TRUE(lists[4].subs.empty()); |
473 EXPECT_EQ(safe_browsing::kInclusionWhitelist, lists[5].name); | 459 EXPECT_EQ(kInclusionWhitelist, lists[5].name); |
474 EXPECT_EQ("7", lists[5].adds); | 460 EXPECT_EQ("7", lists[5].adds); |
475 EXPECT_TRUE(lists[5].subs.empty()); | 461 EXPECT_TRUE(lists[5].subs.empty()); |
476 EXPECT_EQ(safe_browsing::kExtensionBlacklist, lists[6].name); | 462 EXPECT_EQ(kExtensionBlacklist, lists[6].name); |
477 EXPECT_EQ("8", lists[6].adds); | 463 EXPECT_EQ("8", lists[6].adds); |
478 EXPECT_TRUE(lists[6].subs.empty()); | 464 EXPECT_TRUE(lists[6].subs.empty()); |
479 EXPECT_EQ(safe_browsing::kIPBlacklist, lists[7].name); | 465 EXPECT_EQ(kIPBlacklist, lists[7].name); |
480 EXPECT_EQ("10", lists[7].adds); | 466 EXPECT_EQ("10", lists[7].adds); |
481 EXPECT_TRUE(lists[7].subs.empty()); | 467 EXPECT_TRUE(lists[7].subs.empty()); |
482 EXPECT_EQ(safe_browsing::kUnwantedUrlList, lists[8].name); | 468 EXPECT_EQ(kUnwantedUrlList, lists[8].name); |
483 EXPECT_EQ("11", lists[8].adds); | 469 EXPECT_EQ("11", lists[8].adds); |
484 EXPECT_TRUE(lists[8].subs.empty()); | 470 EXPECT_TRUE(lists[8].subs.empty()); |
485 | 471 |
486 database_.reset(); | 472 database_.reset(); |
487 } | 473 } |
488 | 474 |
489 // Checks database reading and writing for browse and unwanted PrefixSets. | 475 // Checks database reading and writing for browse and unwanted PrefixSets. |
490 TEST_F(SafeBrowsingDatabaseTest, BrowseAndUnwantedDatabasesAndPrefixSets) { | 476 TEST_F(SafeBrowsingDatabaseTest, BrowseAndUnwantedDatabasesAndPrefixSets) { |
491 struct TestCase { | 477 struct TestCase { |
492 using TestListContainsBadUrl = bool (SafeBrowsingDatabase::*)( | 478 using TestListContainsBadUrl = bool (SafeBrowsingDatabase::*)( |
493 const GURL& url, | 479 const GURL& url, |
494 std::vector<SBPrefix>* prefix_hits, | 480 std::vector<SBPrefix>* prefix_hits, |
495 std::vector<SBFullHashResult>* cache_hits); | 481 std::vector<SBFullHashResult>* cache_hits); |
496 | 482 |
497 const char* test_list_name; | 483 const char* test_list_name; |
498 size_t expected_list_index; | 484 size_t expected_list_index; |
499 TestListContainsBadUrl test_list_contains_bad_url; | 485 TestListContainsBadUrl test_list_contains_bad_url; |
500 } const kTestCases[] { | 486 } const kTestCases[]{ |
501 { safe_browsing::kMalwareList, 0U, | 487 {kMalwareList, 0U, &SafeBrowsingDatabase::ContainsBrowseUrl}, |
502 &SafeBrowsingDatabase::ContainsBrowseUrl }, | 488 {kPhishingList, 1U, &SafeBrowsingDatabase::ContainsBrowseUrl}, |
503 { safe_browsing::kPhishingList, 1U, | 489 {kUnwantedUrlList, 8U, |
504 &SafeBrowsingDatabase::ContainsBrowseUrl }, | 490 &SafeBrowsingDatabase::ContainsUnwantedSoftwareUrl}, |
505 { safe_browsing::kUnwantedUrlList, 8U, | |
506 &SafeBrowsingDatabase::ContainsUnwantedSoftwareUrl }, | |
507 }; | 491 }; |
508 | 492 |
509 for (const auto& test_case : kTestCases) { | 493 for (const auto& test_case : kTestCases) { |
510 SCOPED_TRACE(std::string("Tested list at fault => ") + | 494 SCOPED_TRACE(std::string("Tested list at fault => ") + |
511 test_case.test_list_name); | 495 test_case.test_list_name); |
512 | 496 |
513 std::vector<SBListChunkRanges> lists; | 497 std::vector<SBListChunkRanges> lists; |
514 ScopedVector<SBChunkData> chunks; | 498 ScopedVector<SBChunkData> chunks; |
515 | 499 |
516 chunks.push_back(AddChunkPrefix2Value(1, | 500 chunks.push_back(AddChunkPrefix2Value(1, |
(...skipping 234 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
751 | 735 |
752 // Populate with a couple of normal chunks. | 736 // Populate with a couple of normal chunks. |
753 chunks.push_back(AddChunkPrefix2Value(1, | 737 chunks.push_back(AddChunkPrefix2Value(1, |
754 "www.test.com/test1.html", | 738 "www.test.com/test1.html", |
755 "www.test.com/test2.html")); | 739 "www.test.com/test2.html")); |
756 chunks.push_back(AddChunkPrefix2Value(10, | 740 chunks.push_back(AddChunkPrefix2Value(10, |
757 "www.random.com/random1.html", | 741 "www.random.com/random1.html", |
758 "www.random.com/random2.html")); | 742 "www.random.com/random2.html")); |
759 | 743 |
760 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 744 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
761 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 745 database_->InsertChunks(kMalwareList, chunks.get()); |
762 database_->UpdateFinished(true); | 746 database_->UpdateFinished(true); |
763 | 747 |
764 // Add an empty ADD and SUB chunk. | 748 // Add an empty ADD and SUB chunk. |
765 GetListsInfo(&lists); | 749 GetListsInfo(&lists); |
766 ASSERT_LE(1U, lists.size()); | 750 ASSERT_LE(1U, lists.size()); |
767 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 751 EXPECT_EQ(kMalwareList, lists[0].name); |
768 EXPECT_EQ("1,10", lists[0].adds); | 752 EXPECT_EQ("1,10", lists[0].adds); |
769 EXPECT_TRUE(lists[0].subs.empty()); | 753 EXPECT_TRUE(lists[0].subs.empty()); |
770 | 754 |
771 chunks.clear(); | 755 chunks.clear(); |
772 chunks.push_back(BuildChunk(19, safe_browsing::ChunkData::ADD, | 756 chunks.push_back(BuildChunk(19, ChunkData::ADD, ChunkData::PREFIX_4B, NULL, 0, |
773 safe_browsing::ChunkData::PREFIX_4B, | 757 std::vector<int>())); |
774 NULL, 0, std::vector<int>())); | 758 chunks.push_back(BuildChunk(7, ChunkData::SUB, ChunkData::PREFIX_4B, NULL, 0, |
775 chunks.push_back(BuildChunk(7, safe_browsing::ChunkData::SUB, | 759 std::vector<int>())); |
776 safe_browsing::ChunkData::PREFIX_4B, | |
777 NULL, 0, std::vector<int>())); | |
778 | 760 |
779 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 761 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
780 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 762 database_->InsertChunks(kMalwareList, chunks.get()); |
781 database_->UpdateFinished(true); | 763 database_->UpdateFinished(true); |
782 | 764 |
783 GetListsInfo(&lists); | 765 GetListsInfo(&lists); |
784 ASSERT_LE(1U, lists.size()); | 766 ASSERT_LE(1U, lists.size()); |
785 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 767 EXPECT_EQ(kMalwareList, lists[0].name); |
786 EXPECT_EQ("1,10,19", lists[0].adds); | 768 EXPECT_EQ("1,10,19", lists[0].adds); |
787 EXPECT_EQ("7", lists[0].subs); | 769 EXPECT_EQ("7", lists[0].subs); |
788 | 770 |
789 // Add an empty chunk along with a couple that contain data. This should | 771 // Add an empty chunk along with a couple that contain data. This should |
790 // result in the chunk range being reduced in size. | 772 // result in the chunk range being reduced in size. |
791 chunks.clear(); | 773 chunks.clear(); |
792 chunks.push_back(AddChunkPrefixValue(20, "www.notempty.com/full1.html")); | 774 chunks.push_back(AddChunkPrefixValue(20, "www.notempty.com/full1.html")); |
793 chunks.push_back(BuildChunk(21, safe_browsing::ChunkData::ADD, | 775 chunks.push_back(BuildChunk(21, ChunkData::ADD, ChunkData::PREFIX_4B, NULL, 0, |
794 safe_browsing::ChunkData::PREFIX_4B, | 776 std::vector<int>())); |
795 NULL, 0, std::vector<int>())); | |
796 chunks.push_back(AddChunkPrefixValue(22, "www.notempty.com/full2.html")); | 777 chunks.push_back(AddChunkPrefixValue(22, "www.notempty.com/full2.html")); |
797 | 778 |
798 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 779 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
799 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 780 database_->InsertChunks(kMalwareList, chunks.get()); |
800 database_->UpdateFinished(true); | 781 database_->UpdateFinished(true); |
801 | 782 |
802 std::vector<SBPrefix> prefix_hits; | 783 std::vector<SBPrefix> prefix_hits; |
803 std::vector<SBFullHashResult> cache_hits; | 784 std::vector<SBFullHashResult> cache_hits; |
804 EXPECT_TRUE(database_->ContainsBrowseUrl( | 785 EXPECT_TRUE(database_->ContainsBrowseUrl( |
805 GURL("http://www.notempty.com/full1.html"), &prefix_hits, &cache_hits)); | 786 GURL("http://www.notempty.com/full1.html"), &prefix_hits, &cache_hits)); |
806 EXPECT_TRUE(database_->ContainsBrowseUrl( | 787 EXPECT_TRUE(database_->ContainsBrowseUrl( |
807 GURL("http://www.notempty.com/full2.html"), &prefix_hits, &cache_hits)); | 788 GURL("http://www.notempty.com/full2.html"), &prefix_hits, &cache_hits)); |
808 | 789 |
809 GetListsInfo(&lists); | 790 GetListsInfo(&lists); |
810 ASSERT_LE(1U, lists.size()); | 791 ASSERT_LE(1U, lists.size()); |
811 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 792 EXPECT_EQ(kMalwareList, lists[0].name); |
812 EXPECT_EQ("1,10,19-22", lists[0].adds); | 793 EXPECT_EQ("1,10,19-22", lists[0].adds); |
813 EXPECT_EQ("7", lists[0].subs); | 794 EXPECT_EQ("7", lists[0].subs); |
814 | 795 |
815 // Handle AddDel and SubDel commands for empty chunks. | 796 // Handle AddDel and SubDel commands for empty chunks. |
816 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 797 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
817 AddDelChunk(safe_browsing::kMalwareList, 21); | 798 AddDelChunk(kMalwareList, 21); |
818 database_->UpdateFinished(true); | 799 database_->UpdateFinished(true); |
819 | 800 |
820 GetListsInfo(&lists); | 801 GetListsInfo(&lists); |
821 ASSERT_LE(1U, lists.size()); | 802 ASSERT_LE(1U, lists.size()); |
822 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 803 EXPECT_EQ(kMalwareList, lists[0].name); |
823 EXPECT_EQ("1,10,19-20,22", lists[0].adds); | 804 EXPECT_EQ("1,10,19-20,22", lists[0].adds); |
824 EXPECT_EQ("7", lists[0].subs); | 805 EXPECT_EQ("7", lists[0].subs); |
825 | 806 |
826 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 807 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
827 SubDelChunk(safe_browsing::kMalwareList, 7); | 808 SubDelChunk(kMalwareList, 7); |
828 database_->UpdateFinished(true); | 809 database_->UpdateFinished(true); |
829 | 810 |
830 GetListsInfo(&lists); | 811 GetListsInfo(&lists); |
831 ASSERT_LE(1U, lists.size()); | 812 ASSERT_LE(1U, lists.size()); |
832 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 813 EXPECT_EQ(kMalwareList, lists[0].name); |
833 EXPECT_EQ("1,10,19-20,22", lists[0].adds); | 814 EXPECT_EQ("1,10,19-20,22", lists[0].adds); |
834 EXPECT_TRUE(lists[0].subs.empty()); | 815 EXPECT_TRUE(lists[0].subs.empty()); |
835 } | 816 } |
836 | 817 |
837 // Utility function for setting up the database for the caching test. | 818 // Utility function for setting up the database for the caching test. |
838 void SafeBrowsingDatabaseTest::PopulateDatabaseForCacheTest() { | 819 void SafeBrowsingDatabaseTest::PopulateDatabaseForCacheTest() { |
839 // Add a couple prefixes. | 820 // Add a couple prefixes. |
840 ScopedVector<SBChunkData> chunks; | 821 ScopedVector<SBChunkData> chunks; |
841 chunks.push_back(AddChunkPrefix2Value(1, | 822 chunks.push_back(AddChunkPrefix2Value(1, |
842 "www.evil.com/phishing.html", | 823 "www.evil.com/phishing.html", |
843 "www.evil.com/malware.html")); | 824 "www.evil.com/malware.html")); |
844 | 825 |
845 std::vector<SBListChunkRanges> lists; | 826 std::vector<SBListChunkRanges> lists; |
846 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 827 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
847 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 828 database_->InsertChunks(kMalwareList, chunks.get()); |
848 database_->UpdateFinished(true); | 829 database_->UpdateFinished(true); |
849 | 830 |
850 // Cache should be cleared after updating. | 831 // Cache should be cleared after updating. |
851 EXPECT_TRUE( | 832 EXPECT_TRUE( |
852 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); | 833 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); |
853 | 834 |
854 SBFullHashResult full_hash; | 835 SBFullHashResult full_hash; |
855 full_hash.list_id = safe_browsing::MALWARE; | 836 full_hash.list_id = MALWARE; |
856 | 837 |
857 std::vector<SBFullHashResult> results; | 838 std::vector<SBFullHashResult> results; |
858 std::vector<SBPrefix> prefixes; | 839 std::vector<SBPrefix> prefixes; |
859 | 840 |
860 // Add a fullhash result for each prefix. | 841 // Add a fullhash result for each prefix. |
861 full_hash.hash = | 842 full_hash.hash = |
862 safe_browsing::SBFullHashForString("www.evil.com/phishing.html"); | 843 SBFullHashForString("www.evil.com/phishing.html"); |
863 results.push_back(full_hash); | 844 results.push_back(full_hash); |
864 prefixes.push_back(full_hash.hash.prefix); | 845 prefixes.push_back(full_hash.hash.prefix); |
865 | 846 |
866 full_hash.hash = | 847 full_hash.hash = |
867 safe_browsing::SBFullHashForString("www.evil.com/malware.html"); | 848 SBFullHashForString("www.evil.com/malware.html"); |
868 results.push_back(full_hash); | 849 results.push_back(full_hash); |
869 prefixes.push_back(full_hash.hash.prefix); | 850 prefixes.push_back(full_hash.hash.prefix); |
870 | 851 |
871 database_->CacheHashResults(prefixes, results, kCacheLifetime); | 852 database_->CacheHashResults(prefixes, results, kCacheLifetime); |
872 } | 853 } |
873 | 854 |
874 TEST_F(SafeBrowsingDatabaseTest, HashCaching) { | 855 TEST_F(SafeBrowsingDatabaseTest, HashCaching) { |
875 PopulateDatabaseForCacheTest(); | 856 PopulateDatabaseForCacheTest(); |
876 | 857 |
877 // We should have both full hashes in the cache. | 858 // We should have both full hashes in the cache. |
878 EXPECT_EQ(2U, | 859 EXPECT_EQ(2U, |
879 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->size()); | 860 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->size()); |
880 | 861 |
881 // Test the cache lookup for the first prefix. | 862 // Test the cache lookup for the first prefix. |
882 std::vector<SBPrefix> prefix_hits; | 863 std::vector<SBPrefix> prefix_hits; |
883 std::vector<SBFullHashResult> cache_hits; | 864 std::vector<SBFullHashResult> cache_hits; |
884 EXPECT_TRUE(database_->ContainsBrowseUrl( | 865 EXPECT_TRUE(database_->ContainsBrowseUrl( |
885 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); | 866 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); |
886 EXPECT_TRUE(prefix_hits.empty()); | 867 EXPECT_TRUE(prefix_hits.empty()); |
887 ASSERT_EQ(1U, cache_hits.size()); | 868 ASSERT_EQ(1U, cache_hits.size()); |
888 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 869 EXPECT_TRUE(SBFullHashEqual( |
889 cache_hits[0].hash, | 870 cache_hits[0].hash, |
890 safe_browsing::SBFullHashForString("www.evil.com/phishing.html"))); | 871 SBFullHashForString("www.evil.com/phishing.html"))); |
891 | 872 |
892 prefix_hits.clear(); | 873 prefix_hits.clear(); |
893 cache_hits.clear(); | 874 cache_hits.clear(); |
894 | 875 |
895 // Test the cache lookup for the second prefix. | 876 // Test the cache lookup for the second prefix. |
896 EXPECT_TRUE(database_->ContainsBrowseUrl( | 877 EXPECT_TRUE(database_->ContainsBrowseUrl( |
897 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); | 878 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
898 EXPECT_TRUE(prefix_hits.empty()); | 879 EXPECT_TRUE(prefix_hits.empty()); |
899 ASSERT_EQ(1U, cache_hits.size()); | 880 ASSERT_EQ(1U, cache_hits.size()); |
900 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 881 EXPECT_TRUE(SBFullHashEqual( |
901 cache_hits[0].hash, | 882 cache_hits[0].hash, |
902 safe_browsing::SBFullHashForString("www.evil.com/malware.html"))); | 883 SBFullHashForString("www.evil.com/malware.html"))); |
903 | 884 |
904 prefix_hits.clear(); | 885 prefix_hits.clear(); |
905 cache_hits.clear(); | 886 cache_hits.clear(); |
906 | 887 |
907 // Test removing a prefix via a sub chunk. | 888 // Test removing a prefix via a sub chunk. |
908 ScopedVector<SBChunkData> chunks; | 889 ScopedVector<SBChunkData> chunks; |
909 chunks.push_back(SubChunkPrefixValue(2, "www.evil.com/phishing.html", 1)); | 890 chunks.push_back(SubChunkPrefixValue(2, "www.evil.com/phishing.html", 1)); |
910 | 891 |
911 std::vector<SBListChunkRanges> lists; | 892 std::vector<SBListChunkRanges> lists; |
912 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 893 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
913 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 894 database_->InsertChunks(kMalwareList, chunks.get()); |
914 database_->UpdateFinished(true); | 895 database_->UpdateFinished(true); |
915 | 896 |
916 // This prefix should still be there, but cached fullhash should be gone. | 897 // This prefix should still be there, but cached fullhash should be gone. |
917 EXPECT_TRUE(database_->ContainsBrowseUrl( | 898 EXPECT_TRUE(database_->ContainsBrowseUrl( |
918 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); | 899 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
919 ASSERT_EQ(1U, prefix_hits.size()); | 900 ASSERT_EQ(1U, prefix_hits.size()); |
920 EXPECT_EQ(SBPrefixForString("www.evil.com/malware.html"), prefix_hits[0]); | 901 EXPECT_EQ(SBPrefixForString("www.evil.com/malware.html"), prefix_hits[0]); |
921 EXPECT_TRUE(cache_hits.empty()); | 902 EXPECT_TRUE(cache_hits.empty()); |
922 prefix_hits.clear(); | 903 prefix_hits.clear(); |
923 cache_hits.clear(); | 904 cache_hits.clear(); |
924 | 905 |
925 // This prefix should be gone. | 906 // This prefix should be gone. |
926 EXPECT_FALSE(database_->ContainsBrowseUrl( | 907 EXPECT_FALSE(database_->ContainsBrowseUrl( |
927 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); | 908 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); |
928 prefix_hits.clear(); | 909 prefix_hits.clear(); |
929 cache_hits.clear(); | 910 cache_hits.clear(); |
930 | 911 |
931 // Test that an AddDel for the original chunk removes the last cached entry. | 912 // Test that an AddDel for the original chunk removes the last cached entry. |
932 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 913 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
933 AddDelChunk(safe_browsing::kMalwareList, 1); | 914 AddDelChunk(kMalwareList, 1); |
934 database_->UpdateFinished(true); | 915 database_->UpdateFinished(true); |
935 EXPECT_FALSE(database_->ContainsBrowseUrl( | 916 EXPECT_FALSE(database_->ContainsBrowseUrl( |
936 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); | 917 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
937 EXPECT_TRUE( | 918 EXPECT_TRUE( |
938 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); | 919 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); |
939 prefix_hits.clear(); | 920 prefix_hits.clear(); |
940 cache_hits.clear(); | 921 cache_hits.clear(); |
941 | 922 |
942 // Test that the cache won't return expired values. First we have to adjust | 923 // Test that the cache won't return expired values. First we have to adjust |
943 // the cached entries' received time to make them older, since the database | 924 // the cached entries' received time to make them older, since the database |
(...skipping 21 matching lines...) Expand all Loading... |
965 // This entry should still exist. | 946 // This entry should still exist. |
966 EXPECT_TRUE(database_->ContainsBrowseUrl( | 947 EXPECT_TRUE(database_->ContainsBrowseUrl( |
967 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); | 948 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); |
968 EXPECT_TRUE(prefix_hits.empty()); | 949 EXPECT_TRUE(prefix_hits.empty()); |
969 EXPECT_EQ(1U, cache_hits.size()); | 950 EXPECT_EQ(1U, cache_hits.size()); |
970 | 951 |
971 // Testing prefix miss caching. First, we clear out the existing database, | 952 // Testing prefix miss caching. First, we clear out the existing database, |
972 // Since PopulateDatabaseForCacheTest() doesn't handle adding duplicate | 953 // Since PopulateDatabaseForCacheTest() doesn't handle adding duplicate |
973 // chunks. | 954 // chunks. |
974 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 955 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
975 AddDelChunk(safe_browsing::kMalwareList, 1); | 956 AddDelChunk(kMalwareList, 1); |
976 database_->UpdateFinished(true); | 957 database_->UpdateFinished(true); |
977 | 958 |
978 // Cache should be cleared after updating. | 959 // Cache should be cleared after updating. |
979 EXPECT_TRUE(hash_cache->empty()); | 960 EXPECT_TRUE(hash_cache->empty()); |
980 | 961 |
981 std::vector<SBPrefix> prefix_misses; | 962 std::vector<SBPrefix> prefix_misses; |
982 std::vector<SBFullHashResult> empty_full_hash; | 963 std::vector<SBFullHashResult> empty_full_hash; |
983 prefix_misses.push_back(SBPrefixForString("http://www.bad.com/malware.html")); | 964 prefix_misses.push_back(SBPrefixForString("http://www.bad.com/malware.html")); |
984 prefix_misses.push_back( | 965 prefix_misses.push_back( |
985 SBPrefixForString("http://www.bad.com/phishing.html")); | 966 SBPrefixForString("http://www.bad.com/phishing.html")); |
(...skipping 28 matching lines...) Expand all Loading... |
1014 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); | 995 GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits)); |
1015 prefix_hits.clear(); | 996 prefix_hits.clear(); |
1016 cache_hits.clear(); | 997 cache_hits.clear(); |
1017 | 998 |
1018 // Test receiving a full add chunk. | 999 // Test receiving a full add chunk. |
1019 chunks.clear(); | 1000 chunks.clear(); |
1020 chunks.push_back(AddChunkFullHash2Value(20, | 1001 chunks.push_back(AddChunkFullHash2Value(20, |
1021 "www.fullevil.com/bad1.html", | 1002 "www.fullevil.com/bad1.html", |
1022 "www.fullevil.com/bad2.html")); | 1003 "www.fullevil.com/bad2.html")); |
1023 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1004 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1024 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1005 database_->InsertChunks(kMalwareList, chunks.get()); |
1025 database_->UpdateFinished(true); | 1006 database_->UpdateFinished(true); |
1026 | 1007 |
1027 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1008 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1028 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); | 1009 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); |
1029 ASSERT_EQ(1U, prefix_hits.size()); | 1010 ASSERT_EQ(1U, prefix_hits.size()); |
1030 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad1.html"), prefix_hits[0]); | 1011 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad1.html"), prefix_hits[0]); |
1031 EXPECT_TRUE(cache_hits.empty()); | 1012 EXPECT_TRUE(cache_hits.empty()); |
1032 prefix_hits.clear(); | 1013 prefix_hits.clear(); |
1033 cache_hits.clear(); | 1014 cache_hits.clear(); |
1034 | 1015 |
1035 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1016 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1036 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); | 1017 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); |
1037 ASSERT_EQ(1U, prefix_hits.size()); | 1018 ASSERT_EQ(1U, prefix_hits.size()); |
1038 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad2.html"), prefix_hits[0]); | 1019 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad2.html"), prefix_hits[0]); |
1039 EXPECT_TRUE(cache_hits.empty()); | 1020 EXPECT_TRUE(cache_hits.empty()); |
1040 prefix_hits.clear(); | 1021 prefix_hits.clear(); |
1041 cache_hits.clear(); | 1022 cache_hits.clear(); |
1042 | 1023 |
1043 // Test receiving a full sub chunk, which will remove one of the full adds. | 1024 // Test receiving a full sub chunk, which will remove one of the full adds. |
1044 chunks.clear(); | 1025 chunks.clear(); |
1045 chunks.push_back(SubChunkFullHashValue(200, | 1026 chunks.push_back(SubChunkFullHashValue(200, |
1046 "www.fullevil.com/bad1.html", | 1027 "www.fullevil.com/bad1.html", |
1047 20)); | 1028 20)); |
1048 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1029 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1049 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1030 database_->InsertChunks(kMalwareList, chunks.get()); |
1050 database_->UpdateFinished(true); | 1031 database_->UpdateFinished(true); |
1051 | 1032 |
1052 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1033 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1053 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); | 1034 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); |
1054 | 1035 |
1055 // There should be one remaining full add. | 1036 // There should be one remaining full add. |
1056 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1037 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1057 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); | 1038 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); |
1058 ASSERT_EQ(1U, prefix_hits.size()); | 1039 ASSERT_EQ(1U, prefix_hits.size()); |
1059 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad2.html"), prefix_hits[0]); | 1040 EXPECT_EQ(SBPrefixForString("www.fullevil.com/bad2.html"), prefix_hits[0]); |
1060 EXPECT_TRUE(cache_hits.empty()); | 1041 EXPECT_TRUE(cache_hits.empty()); |
1061 prefix_hits.clear(); | 1042 prefix_hits.clear(); |
1062 cache_hits.clear(); | 1043 cache_hits.clear(); |
1063 | 1044 |
1064 // Now test an AddDel for the remaining full add. | 1045 // Now test an AddDel for the remaining full add. |
1065 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1046 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1066 AddDelChunk(safe_browsing::kMalwareList, 20); | 1047 AddDelChunk(kMalwareList, 20); |
1067 database_->UpdateFinished(true); | 1048 database_->UpdateFinished(true); |
1068 | 1049 |
1069 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1050 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1070 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); | 1051 GURL("http://www.fullevil.com/bad1.html"), &prefix_hits, &cache_hits)); |
1071 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1052 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1072 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); | 1053 GURL("http://www.fullevil.com/bad2.html"), &prefix_hits, &cache_hits)); |
1073 | 1054 |
1074 // Add a fullhash which has a prefix collision for a known url. | 1055 // Add a fullhash which has a prefix collision for a known url. |
1075 static const char kExampleFine[] = "www.example.com/fine.html"; | 1056 static const char kExampleFine[] = "www.example.com/fine.html"; |
1076 static const char kExampleCollision[] = | 1057 static const char kExampleCollision[] = |
1077 "www.example.com/3123364814/malware.htm"; | 1058 "www.example.com/3123364814/malware.htm"; |
1078 ASSERT_EQ(SBPrefixForString(kExampleFine), | 1059 ASSERT_EQ(SBPrefixForString(kExampleFine), |
1079 SBPrefixForString(kExampleCollision)); | 1060 SBPrefixForString(kExampleCollision)); |
1080 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1061 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1081 { | 1062 { |
1082 ScopedVector<SBChunkData> chunks; | 1063 ScopedVector<SBChunkData> chunks; |
1083 chunks.push_back(AddChunkPrefixValue(21, kExampleCollision)); | 1064 chunks.push_back(AddChunkPrefixValue(21, kExampleCollision)); |
1084 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1065 database_->InsertChunks(kMalwareList, chunks.get()); |
1085 } | 1066 } |
1086 database_->UpdateFinished(true); | 1067 database_->UpdateFinished(true); |
1087 | 1068 |
1088 // Expect a prefix hit due to the collision between |kExampleFine| and | 1069 // Expect a prefix hit due to the collision between |kExampleFine| and |
1089 // |kExampleCollision|. | 1070 // |kExampleCollision|. |
1090 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1071 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1091 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); | 1072 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); |
1092 ASSERT_EQ(1U, prefix_hits.size()); | 1073 ASSERT_EQ(1U, prefix_hits.size()); |
1093 EXPECT_EQ(SBPrefixForString(kExampleFine), prefix_hits[0]); | 1074 EXPECT_EQ(SBPrefixForString(kExampleFine), prefix_hits[0]); |
1094 EXPECT_TRUE(cache_hits.empty()); | 1075 EXPECT_TRUE(cache_hits.empty()); |
1095 | 1076 |
1096 // Cache gethash response for |kExampleCollision|. | 1077 // Cache gethash response for |kExampleCollision|. |
1097 { | 1078 { |
1098 SBFullHashResult result; | 1079 SBFullHashResult result; |
1099 result.hash = safe_browsing::SBFullHashForString(kExampleCollision); | 1080 result.hash = SBFullHashForString(kExampleCollision); |
1100 result.list_id = safe_browsing::MALWARE; | 1081 result.list_id = MALWARE; |
1101 database_->CacheHashResults(std::vector<SBPrefix>(1, result.hash.prefix), | 1082 database_->CacheHashResults(std::vector<SBPrefix>(1, result.hash.prefix), |
1102 std::vector<SBFullHashResult>(1, result), | 1083 std::vector<SBFullHashResult>(1, result), |
1103 kCacheLifetime); | 1084 kCacheLifetime); |
1104 } | 1085 } |
1105 | 1086 |
1106 // The cached response means the collision no longer causes a hit. | 1087 // The cached response means the collision no longer causes a hit. |
1107 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1088 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1108 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); | 1089 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); |
1109 } | 1090 } |
1110 | 1091 |
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1143 fputc('!', fp); | 1124 fputc('!', fp); |
1144 } | 1125 } |
1145 fclose(fp); | 1126 fclose(fp); |
1146 | 1127 |
1147 { | 1128 { |
1148 // The following code will cause DCHECKs, so suppress the crashes. | 1129 // The following code will cause DCHECKs, so suppress the crashes. |
1149 ScopedLogMessageIgnorer ignorer; | 1130 ScopedLogMessageIgnorer ignorer; |
1150 | 1131 |
1151 // Start an update. The insert will fail due to corruption. | 1132 // Start an update. The insert will fail due to corruption. |
1152 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1133 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1153 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1134 database_->InsertChunks(kMalwareList, chunks.get()); |
1154 database_->UpdateFinished(true); | 1135 database_->UpdateFinished(true); |
1155 | 1136 |
1156 // Database file still exists until the corruption handler has run. | 1137 // Database file still exists until the corruption handler has run. |
1157 EXPECT_TRUE(base::PathExists(database_filename_)); | 1138 EXPECT_TRUE(base::PathExists(database_filename_)); |
1158 | 1139 |
1159 // Flush through the corruption-handler task. | 1140 // Flush through the corruption-handler task. |
1160 DVLOG(1) << "Expect failed check on: SafeBrowsing database reset"; | 1141 DVLOG(1) << "Expect failed check on: SafeBrowsing database reset"; |
1161 base::MessageLoop::current()->RunUntilIdle(); | 1142 base::MessageLoop::current()->RunUntilIdle(); |
1162 } | 1143 } |
1163 | 1144 |
1164 // Database file should not exist. | 1145 // Database file should not exist. |
1165 EXPECT_FALSE(base::PathExists(database_filename_)); | 1146 EXPECT_FALSE(base::PathExists(database_filename_)); |
1166 | 1147 |
1167 // Run the update again successfully. | 1148 // Run the update again successfully. |
1168 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1149 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1169 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1150 database_->InsertChunks(kMalwareList, chunks.get()); |
1170 database_->UpdateFinished(true); | 1151 database_->UpdateFinished(true); |
1171 EXPECT_TRUE(base::PathExists(database_filename_)); | 1152 EXPECT_TRUE(base::PathExists(database_filename_)); |
1172 | 1153 |
1173 database_.reset(); | 1154 database_.reset(); |
1174 } | 1155 } |
1175 | 1156 |
1176 // Checks database reading and writing. | 1157 // Checks database reading and writing. |
1177 TEST_F(SafeBrowsingDatabaseTest, ContainsDownloadUrlPrefixes) { | 1158 TEST_F(SafeBrowsingDatabaseTest, ContainsDownloadUrlPrefixes) { |
1178 const char kEvil1Url1[] = "www.evil1.com/download1/"; | 1159 const char kEvil1Url1[] = "www.evil1.com/download1/"; |
1179 const char kEvil1Url2[] = "www.evil1.com/download2.html"; | 1160 const char kEvil1Url2[] = "www.evil1.com/download2.html"; |
1180 | 1161 |
1181 // Add a simple chunk with one hostkey for download url list. | 1162 // Add a simple chunk with one hostkey for download url list. |
1182 ScopedVector<SBChunkData> chunks; | 1163 ScopedVector<SBChunkData> chunks; |
1183 chunks.push_back(AddChunkPrefix2Value(1, kEvil1Url1, kEvil1Url2)); | 1164 chunks.push_back(AddChunkPrefix2Value(1, kEvil1Url1, kEvil1Url2)); |
1184 | 1165 |
1185 std::vector<SBListChunkRanges> lists; | 1166 std::vector<SBListChunkRanges> lists; |
1186 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1167 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1187 database_->InsertChunks(safe_browsing::kBinUrlList, chunks.get()); | 1168 database_->InsertChunks(kBinUrlList, chunks.get()); |
1188 database_->UpdateFinished(true); | 1169 database_->UpdateFinished(true); |
1189 | 1170 |
1190 std::vector<SBPrefix> prefix_hits; | 1171 std::vector<SBPrefix> prefix_hits; |
1191 std::vector<GURL> urls(1); | 1172 std::vector<GURL> urls(1); |
1192 | 1173 |
1193 urls[0] = GURL(std::string("http://") + kEvil1Url1); | 1174 urls[0] = GURL(std::string("http://") + kEvil1Url1); |
1194 EXPECT_TRUE(ContainsDownloadUrl(urls, &prefix_hits)); | 1175 EXPECT_TRUE(ContainsDownloadUrl(urls, &prefix_hits)); |
1195 ASSERT_EQ(1U, prefix_hits.size()); | 1176 ASSERT_EQ(1U, prefix_hits.size()); |
1196 EXPECT_EQ(SBPrefixForString(kEvil1Url1), prefix_hits[0]); | 1177 EXPECT_EQ(SBPrefixForString(kEvil1Url1), prefix_hits[0]); |
1197 | 1178 |
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1274 bool TestStrings() const { | 1255 bool TestStrings() const { |
1275 return test_list_contains_whitelisted_string != nullptr; | 1256 return test_list_contains_whitelisted_string != nullptr; |
1276 } | 1257 } |
1277 | 1258 |
1278 const char* test_list_name; | 1259 const char* test_list_name; |
1279 TestListContainsWhitelistedUrl test_list_contains_whitelisted_url; | 1260 TestListContainsWhitelistedUrl test_list_contains_whitelisted_url; |
1280 // Optional test case field, if set the tested whitelist will also be tested | 1261 // Optional test case field, if set the tested whitelist will also be tested |
1281 // for strings. | 1262 // for strings. |
1282 TestListContainsWhitelistedString test_list_contains_whitelisted_string; | 1263 TestListContainsWhitelistedString test_list_contains_whitelisted_string; |
1283 } const kTestCases[]{ | 1264 } const kTestCases[]{ |
1284 {safe_browsing::kCsdWhiteList, | 1265 {kCsdWhiteList, |
1285 &SafeBrowsingDatabase::ContainsCsdWhitelistedUrl, | 1266 &SafeBrowsingDatabase::ContainsCsdWhitelistedUrl, |
1286 nullptr}, | 1267 nullptr}, |
1287 {safe_browsing::kDownloadWhiteList, | 1268 {kDownloadWhiteList, |
1288 &SafeBrowsingDatabase::ContainsDownloadWhitelistedUrl, | 1269 &SafeBrowsingDatabase::ContainsDownloadWhitelistedUrl, |
1289 &SafeBrowsingDatabase::ContainsDownloadWhitelistedString}, | 1270 &SafeBrowsingDatabase::ContainsDownloadWhitelistedString}, |
1290 {safe_browsing::kInclusionWhitelist, | 1271 {kInclusionWhitelist, |
1291 &SafeBrowsingDatabase::ContainsInclusionWhitelistedUrl, | 1272 &SafeBrowsingDatabase::ContainsInclusionWhitelistedUrl, |
1292 nullptr}, | 1273 nullptr}, |
1293 }; | 1274 }; |
1294 | 1275 |
1295 // If the whitelist is disabled everything should match the whitelist. | 1276 // If the whitelist is disabled everything should match the whitelist. |
1296 database_.reset(new SafeBrowsingDatabaseNew( | 1277 database_.reset(new SafeBrowsingDatabaseNew( |
1297 task_runner_, new SafeBrowsingStoreFile(task_runner_), NULL, NULL, NULL, | 1278 task_runner_, new SafeBrowsingStoreFile(task_runner_), NULL, NULL, NULL, |
1298 NULL, NULL, NULL, NULL)); | 1279 NULL, NULL, NULL, NULL)); |
1299 database_->Init(database_filename_); | 1280 database_->Init(database_filename_); |
1300 for (const auto& test_case : kTestCases) { | 1281 for (const auto& test_case : kTestCases) { |
(...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1415 EXPECT_TRUE( | 1396 EXPECT_TRUE( |
1416 (database_.get()->*test_case.test_list_contains_whitelisted_string)( | 1397 (database_.get()->*test_case.test_list_contains_whitelisted_string)( |
1417 kGoodString)); | 1398 kGoodString)); |
1418 } | 1399 } |
1419 | 1400 |
1420 EXPECT_FALSE( | 1401 EXPECT_FALSE( |
1421 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1402 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1422 GURL(std::string("http://www.google.com/")))); | 1403 GURL(std::string("http://www.google.com/")))); |
1423 | 1404 |
1424 // The malware kill switch is for the CSD whitelist only. | 1405 // The malware kill switch is for the CSD whitelist only. |
1425 if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { | 1406 if (test_case.test_list_name == kCsdWhiteList) { |
1426 // The CSD whitelist killswitch is not present. | 1407 // The CSD whitelist killswitch is not present. |
1427 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); | 1408 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); |
1428 | 1409 |
1429 // Test only add the malware IP killswitch | 1410 // Test only add the malware IP killswitch |
1430 chunks.clear(); | 1411 chunks.clear(); |
1431 chunks.push_back(AddChunkFullHashValue( | 1412 chunks.push_back(AddChunkFullHashValue( |
1432 15, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware")); | 1413 15, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware")); |
1433 | 1414 |
1434 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1415 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1435 database_->InsertChunks(safe_browsing::kCsdWhiteList, chunks.get()); | 1416 database_->InsertChunks(kCsdWhiteList, chunks.get()); |
1436 database_->UpdateFinished(true); | 1417 database_->UpdateFinished(true); |
1437 | 1418 |
1438 EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); | 1419 EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); |
1439 // The CSD whitelist killswitch is not present. | 1420 // The CSD whitelist killswitch is not present. |
1440 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); | 1421 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); |
1441 } | 1422 } |
1442 | 1423 |
1443 // Test that the generic whitelist kill-switch works as intended. | 1424 // Test that the generic whitelist kill-switch works as intended. |
1444 chunks.clear(); | 1425 chunks.clear(); |
1445 lists.clear(); | 1426 lists.clear(); |
1446 chunks.push_back(AddChunkFullHashValue( | 1427 chunks.push_back(AddChunkFullHashValue( |
1447 5, "sb-ssl.google.com/safebrowsing/csd/killswitch")); | 1428 5, "sb-ssl.google.com/safebrowsing/csd/killswitch")); |
1448 | 1429 |
1449 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1430 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1450 database_->InsertChunks(test_case.test_list_name, chunks.get()); | 1431 database_->InsertChunks(test_case.test_list_name, chunks.get()); |
1451 database_->UpdateFinished(true); | 1432 database_->UpdateFinished(true); |
1452 | 1433 |
1453 // Test CSD whitelist specific methods. | 1434 // Test CSD whitelist specific methods. |
1454 if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { | 1435 if (test_case.test_list_name == kCsdWhiteList) { |
1455 // The CSD whitelist killswitch is present. | 1436 // The CSD whitelist killswitch is present. |
1456 EXPECT_TRUE(database_->IsCsdWhitelistKillSwitchOn()); | 1437 EXPECT_TRUE(database_->IsCsdWhitelistKillSwitchOn()); |
1457 EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); | 1438 EXPECT_TRUE(database_->IsMalwareIPMatchKillSwitchOn()); |
1458 } | 1439 } |
1459 | 1440 |
1460 EXPECT_TRUE( | 1441 EXPECT_TRUE( |
1461 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1442 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1462 GURL(std::string("https://") + kGood1Url2 + "/c.html"))); | 1443 GURL(std::string("https://") + kGood1Url2 + "/c.html"))); |
1463 EXPECT_TRUE( | 1444 EXPECT_TRUE( |
1464 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1445 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1465 GURL(std::string("http://www.google.com/")))); | 1446 GURL(std::string("http://www.google.com/")))); |
1466 EXPECT_TRUE( | 1447 EXPECT_TRUE( |
1467 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1448 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1468 GURL(std::string("http://www.phishing_url.com/")))); | 1449 GURL(std::string("http://www.phishing_url.com/")))); |
1469 | 1450 |
1470 if (test_case.TestStrings()) { | 1451 if (test_case.TestStrings()) { |
1471 EXPECT_TRUE( | 1452 EXPECT_TRUE( |
1472 (database_.get()->*test_case.test_list_contains_whitelisted_string)( | 1453 (database_.get()->*test_case.test_list_contains_whitelisted_string)( |
1473 "asdf")); | 1454 "asdf")); |
1474 EXPECT_TRUE( | 1455 EXPECT_TRUE( |
1475 (database_.get()->*test_case.test_list_contains_whitelisted_string)( | 1456 (database_.get()->*test_case.test_list_contains_whitelisted_string)( |
1476 kGoodString)); | 1457 kGoodString)); |
1477 } | 1458 } |
1478 | 1459 |
1479 // Remove the kill-switch and verify that we can recover. | 1460 // Remove the kill-switch and verify that we can recover. |
1480 chunks.clear(); | 1461 chunks.clear(); |
1481 lists.clear(); | 1462 lists.clear(); |
1482 chunks.push_back(SubChunkFullHashValue( | 1463 chunks.push_back(SubChunkFullHashValue( |
1483 1, "sb-ssl.google.com/safebrowsing/csd/killswitch", 5)); | 1464 1, "sb-ssl.google.com/safebrowsing/csd/killswitch", 5)); |
1484 if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { | 1465 if (test_case.test_list_name == kCsdWhiteList) { |
1485 chunks.push_back(SubChunkFullHashValue( | 1466 chunks.push_back(SubChunkFullHashValue( |
1486 10, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware", 15)); | 1467 10, "sb-ssl.google.com/safebrowsing/csd/killswitch_malware", 15)); |
1487 } | 1468 } |
1488 | 1469 |
1489 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1470 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1490 database_->InsertChunks(test_case.test_list_name, chunks.get()); | 1471 database_->InsertChunks(test_case.test_list_name, chunks.get()); |
1491 database_->UpdateFinished(true); | 1472 database_->UpdateFinished(true); |
1492 | 1473 |
1493 if (test_case.test_list_name == safe_browsing::kCsdWhiteList) { | 1474 if (test_case.test_list_name == kCsdWhiteList) { |
1494 EXPECT_FALSE(database_->IsMalwareIPMatchKillSwitchOn()); | 1475 EXPECT_FALSE(database_->IsMalwareIPMatchKillSwitchOn()); |
1495 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); | 1476 EXPECT_FALSE(database_->IsCsdWhitelistKillSwitchOn()); |
1496 } | 1477 } |
1497 EXPECT_TRUE( | 1478 EXPECT_TRUE( |
1498 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1479 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1499 GURL(std::string("https://") + kGood1Url2 + "/c.html"))); | 1480 GURL(std::string("https://") + kGood1Url2 + "/c.html"))); |
1500 EXPECT_TRUE( | 1481 EXPECT_TRUE( |
1501 (database_.get()->*test_case.test_list_contains_whitelisted_url)( | 1482 (database_.get()->*test_case.test_list_contains_whitelisted_url)( |
1502 GURL(std::string("https://") + kGood2Url1 + "/c/bla"))); | 1483 GURL(std::string("https://") + kGood2Url1 + "/c/bla"))); |
1503 EXPECT_TRUE( | 1484 EXPECT_TRUE( |
(...skipping 22 matching lines...) Expand all Loading... |
1526 ScopedVector<SBChunkData> chunks; | 1507 ScopedVector<SBChunkData> chunks; |
1527 | 1508 |
1528 // Add a malware add chunk with two entries of the same host. | 1509 // Add a malware add chunk with two entries of the same host. |
1529 chunks.push_back(AddChunkPrefix2Value(1, | 1510 chunks.push_back(AddChunkPrefix2Value(1, |
1530 "www.evil.com/malware1.html", | 1511 "www.evil.com/malware1.html", |
1531 "www.evil.com/malware2.html")); | 1512 "www.evil.com/malware2.html")); |
1532 | 1513 |
1533 // Insert the testing chunks into database. | 1514 // Insert the testing chunks into database. |
1534 std::vector<SBListChunkRanges> lists; | 1515 std::vector<SBListChunkRanges> lists; |
1535 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1516 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1536 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1517 database_->InsertChunks(kMalwareList, chunks.get()); |
1537 database_->UpdateFinished(true); | 1518 database_->UpdateFinished(true); |
1538 | 1519 |
1539 GetListsInfo(&lists); | 1520 GetListsInfo(&lists); |
1540 ASSERT_LE(1U, lists.size()); | 1521 ASSERT_LE(1U, lists.size()); |
1541 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 1522 EXPECT_EQ(kMalwareList, lists[0].name); |
1542 EXPECT_EQ("1", lists[0].adds); | 1523 EXPECT_EQ("1", lists[0].adds); |
1543 EXPECT_TRUE(lists[0].subs.empty()); | 1524 EXPECT_TRUE(lists[0].subs.empty()); |
1544 | 1525 |
1545 // Add a phishing add chunk with two entries of the same host. | 1526 // Add a phishing add chunk with two entries of the same host. |
1546 chunks.clear(); | 1527 chunks.clear(); |
1547 chunks.push_back(AddChunkPrefix2Value(47, | 1528 chunks.push_back(AddChunkPrefix2Value(47, |
1548 "www.evil.com/phishing1.html", | 1529 "www.evil.com/phishing1.html", |
1549 "www.evil.com/phishing2.html")); | 1530 "www.evil.com/phishing2.html")); |
1550 | 1531 |
1551 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1532 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1552 database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); | 1533 database_->InsertChunks(kPhishingList, chunks.get()); |
1553 database_->UpdateFinished(true); | 1534 database_->UpdateFinished(true); |
1554 | 1535 |
1555 GetListsInfo(&lists); | 1536 GetListsInfo(&lists); |
1556 ASSERT_LE(2U, lists.size()); | 1537 ASSERT_LE(2U, lists.size()); |
1557 EXPECT_EQ(safe_browsing::kMalwareList, lists[0].name); | 1538 EXPECT_EQ(kMalwareList, lists[0].name); |
1558 EXPECT_EQ("1", lists[0].adds); | 1539 EXPECT_EQ("1", lists[0].adds); |
1559 EXPECT_TRUE(lists[0].subs.empty()); | 1540 EXPECT_TRUE(lists[0].subs.empty()); |
1560 EXPECT_EQ(safe_browsing::kPhishingList, lists[1].name); | 1541 EXPECT_EQ(kPhishingList, lists[1].name); |
1561 EXPECT_EQ("47", lists[1].adds); | 1542 EXPECT_EQ("47", lists[1].adds); |
1562 EXPECT_TRUE(lists[1].subs.empty()); | 1543 EXPECT_TRUE(lists[1].subs.empty()); |
1563 | 1544 |
1564 std::vector<SBPrefix> prefix_hits; | 1545 std::vector<SBPrefix> prefix_hits; |
1565 std::vector<SBFullHashResult> cache_hits; | 1546 std::vector<SBFullHashResult> cache_hits; |
1566 | 1547 |
1567 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1548 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1568 GURL("http://www.evil.com/malware1.html"), &prefix_hits, &cache_hits)); | 1549 GURL("http://www.evil.com/malware1.html"), &prefix_hits, &cache_hits)); |
1569 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1550 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1570 GURL("http://www.evil.com/malware2.html"), &prefix_hits, &cache_hits)); | 1551 GURL("http://www.evil.com/malware2.html"), &prefix_hits, &cache_hits)); |
1571 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1552 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1572 GURL("http://www.evil.com/phishing1.html"), &prefix_hits, &cache_hits)); | 1553 GURL("http://www.evil.com/phishing1.html"), &prefix_hits, &cache_hits)); |
1573 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1554 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1574 GURL("http://www.evil.com/phishing2.html"), &prefix_hits, &cache_hits)); | 1555 GURL("http://www.evil.com/phishing2.html"), &prefix_hits, &cache_hits)); |
1575 | 1556 |
1576 // Test removing a single prefix from the add chunk. | 1557 // Test removing a single prefix from the add chunk. |
1577 // Remove the prefix that added first. | 1558 // Remove the prefix that added first. |
1578 chunks.clear(); | 1559 chunks.clear(); |
1579 chunks.push_back(SubChunkPrefixValue(4, "www.evil.com/malware1.html", 1)); | 1560 chunks.push_back(SubChunkPrefixValue(4, "www.evil.com/malware1.html", 1)); |
1580 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1561 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1581 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1562 database_->InsertChunks(kMalwareList, chunks.get()); |
1582 database_->UpdateFinished(true); | 1563 database_->UpdateFinished(true); |
1583 | 1564 |
1584 // Remove the prefix that added last. | 1565 // Remove the prefix that added last. |
1585 chunks.clear(); | 1566 chunks.clear(); |
1586 chunks.push_back(SubChunkPrefixValue(5, "www.evil.com/phishing2.html", 47)); | 1567 chunks.push_back(SubChunkPrefixValue(5, "www.evil.com/phishing2.html", 47)); |
1587 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1568 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1588 database_->InsertChunks(safe_browsing::kPhishingList, chunks.get()); | 1569 database_->InsertChunks(kPhishingList, chunks.get()); |
1589 database_->UpdateFinished(true); | 1570 database_->UpdateFinished(true); |
1590 | 1571 |
1591 // Verify that the database contains urls expected. | 1572 // Verify that the database contains urls expected. |
1592 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1573 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1593 GURL("http://www.evil.com/malware1.html"), &prefix_hits, &cache_hits)); | 1574 GURL("http://www.evil.com/malware1.html"), &prefix_hits, &cache_hits)); |
1594 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1575 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1595 GURL("http://www.evil.com/malware2.html"), &prefix_hits, &cache_hits)); | 1576 GURL("http://www.evil.com/malware2.html"), &prefix_hits, &cache_hits)); |
1596 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1577 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1597 GURL("http://www.evil.com/phishing1.html"), &prefix_hits, &cache_hits)); | 1578 GURL("http://www.evil.com/phishing1.html"), &prefix_hits, &cache_hits)); |
1598 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1579 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1599 GURL("http://www.evil.com/phishing2.html"), &prefix_hits, &cache_hits)); | 1580 GURL("http://www.evil.com/phishing2.html"), &prefix_hits, &cache_hits)); |
1600 } | 1581 } |
1601 | 1582 |
1602 // Test that an empty update doesn't actually update the database. | 1583 // Test that an empty update doesn't actually update the database. |
1603 // This isn't a functionality requirement, but it is a useful | 1584 // This isn't a functionality requirement, but it is a useful |
1604 // optimization. | 1585 // optimization. |
1605 TEST_F(SafeBrowsingDatabaseTest, EmptyUpdate) { | 1586 TEST_F(SafeBrowsingDatabaseTest, EmptyUpdate) { |
1606 ScopedVector<SBChunkData> chunks; | 1587 ScopedVector<SBChunkData> chunks; |
1607 | 1588 |
1608 base::FilePath filename = database_->BrowseDBFilename(database_filename_); | 1589 base::FilePath filename = database_->BrowseDBFilename(database_filename_); |
1609 | 1590 |
1610 // Prime the database. | 1591 // Prime the database. |
1611 std::vector<SBListChunkRanges> lists; | 1592 std::vector<SBListChunkRanges> lists; |
1612 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1593 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1613 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); | 1594 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
1614 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1595 database_->InsertChunks(kMalwareList, chunks.get()); |
1615 database_->UpdateFinished(true); | 1596 database_->UpdateFinished(true); |
1616 | 1597 |
1617 // Get an older time to reset the lastmod time for detecting whether | 1598 // Get an older time to reset the lastmod time for detecting whether |
1618 // the file has been updated. | 1599 // the file has been updated. |
1619 base::File::Info before_info, after_info; | 1600 base::File::Info before_info, after_info; |
1620 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); | 1601 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
1621 const Time old_last_modified = | 1602 const Time old_last_modified = |
1622 before_info.last_modified - TimeDelta::FromSeconds(10); | 1603 before_info.last_modified - TimeDelta::FromSeconds(10); |
1623 | 1604 |
1624 // Inserting another chunk updates the database file. The sleep is | 1605 // Inserting another chunk updates the database file. The sleep is |
1625 // needed because otherwise the entire test can finish w/in the | 1606 // needed because otherwise the entire test can finish w/in the |
1626 // resolution of the lastmod time. | 1607 // resolution of the lastmod time. |
1627 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); | 1608 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); |
1628 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); | 1609 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
1629 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1610 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1630 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); | 1611 chunks.push_back(AddChunkPrefixValue(2, "www.foo.com/malware.html")); |
1631 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1612 database_->InsertChunks(kMalwareList, chunks.get()); |
1632 database_->UpdateFinished(true); | 1613 database_->UpdateFinished(true); |
1633 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); | 1614 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); |
1634 EXPECT_LT(before_info.last_modified, after_info.last_modified); | 1615 EXPECT_LT(before_info.last_modified, after_info.last_modified); |
1635 | 1616 |
1636 // Deleting a chunk updates the database file. | 1617 // Deleting a chunk updates the database file. |
1637 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); | 1618 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); |
1638 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); | 1619 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
1639 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1620 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1640 AddDelChunk(safe_browsing::kMalwareList, 2); | 1621 AddDelChunk(kMalwareList, 2); |
1641 database_->UpdateFinished(true); | 1622 database_->UpdateFinished(true); |
1642 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); | 1623 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); |
1643 EXPECT_LT(before_info.last_modified, after_info.last_modified); | 1624 EXPECT_LT(before_info.last_modified, after_info.last_modified); |
1644 | 1625 |
1645 // Simply calling |UpdateStarted()| then |UpdateFinished()| does not | 1626 // Simply calling |UpdateStarted()| then |UpdateFinished()| does not |
1646 // update the database file. | 1627 // update the database file. |
1647 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); | 1628 ASSERT_TRUE(base::TouchFile(filename, old_last_modified, old_last_modified)); |
1648 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); | 1629 ASSERT_TRUE(base::GetFileInfo(filename, &before_info)); |
1649 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1630 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1650 database_->UpdateFinished(true); | 1631 database_->UpdateFinished(true); |
1651 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); | 1632 ASSERT_TRUE(base::GetFileInfo(filename, &after_info)); |
1652 EXPECT_EQ(before_info.last_modified, after_info.last_modified); | 1633 EXPECT_EQ(before_info.last_modified, after_info.last_modified); |
1653 } | 1634 } |
1654 | 1635 |
1655 // Test that a filter file is written out during update and read back | 1636 // Test that a filter file is written out during update and read back |
1656 // in during setup. | 1637 // in during setup. |
1657 TEST_F(SafeBrowsingDatabaseTest, FilterFile) { | 1638 TEST_F(SafeBrowsingDatabaseTest, FilterFile) { |
1658 // Create a database with trivial example data and write it out. | 1639 // Create a database with trivial example data and write it out. |
1659 { | 1640 { |
1660 // Prime the database. | 1641 // Prime the database. |
1661 std::vector<SBListChunkRanges> lists; | 1642 std::vector<SBListChunkRanges> lists; |
1662 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1643 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1663 | 1644 |
1664 ScopedVector<SBChunkData> chunks; | 1645 ScopedVector<SBChunkData> chunks; |
1665 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); | 1646 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/malware.html")); |
1666 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1647 database_->InsertChunks(kMalwareList, chunks.get()); |
1667 database_->UpdateFinished(true); | 1648 database_->UpdateFinished(true); |
1668 } | 1649 } |
1669 | 1650 |
1670 // Find the malware url in the database, don't find a good url. | 1651 // Find the malware url in the database, don't find a good url. |
1671 std::vector<SBPrefix> prefix_hits; | 1652 std::vector<SBPrefix> prefix_hits; |
1672 std::vector<SBFullHashResult> cache_hits; | 1653 std::vector<SBFullHashResult> cache_hits; |
1673 EXPECT_TRUE(database_->ContainsBrowseUrl( | 1654 EXPECT_TRUE(database_->ContainsBrowseUrl( |
1674 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); | 1655 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
1675 EXPECT_FALSE(database_->ContainsBrowseUrl( | 1656 EXPECT_FALSE(database_->ContainsBrowseUrl( |
1676 GURL("http://www.good.com/goodware.html"), &prefix_hits, &cache_hits)); | 1657 GURL("http://www.good.com/goodware.html"), &prefix_hits, &cache_hits)); |
(...skipping 29 matching lines...) Expand all Loading... |
1706 const SBFullHash kFullHash2_1 = | 1687 const SBFullHash kFullHash2_1 = |
1707 SBFullHashForPrefixAndSuffix(kPrefix2, "\x01"); | 1688 SBFullHashForPrefixAndSuffix(kPrefix2, "\x01"); |
1708 | 1689 |
1709 // Insert prefix kPrefix1 and kPrefix2 into database. | 1690 // Insert prefix kPrefix1 and kPrefix2 into database. |
1710 ScopedVector<SBChunkData> chunks; | 1691 ScopedVector<SBChunkData> chunks; |
1711 chunks.push_back(AddChunkPrefix(1, kPrefix1)); | 1692 chunks.push_back(AddChunkPrefix(1, kPrefix1)); |
1712 chunks.push_back(AddChunkPrefix(2, kPrefix2)); | 1693 chunks.push_back(AddChunkPrefix(2, kPrefix2)); |
1713 | 1694 |
1714 std::vector<SBListChunkRanges> lists; | 1695 std::vector<SBListChunkRanges> lists; |
1715 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1696 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1716 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1697 database_->InsertChunks(kMalwareList, chunks.get()); |
1717 database_->UpdateFinished(true); | 1698 database_->UpdateFinished(true); |
1718 | 1699 |
1719 { | 1700 { |
1720 // Cache a full miss result for kPrefix1. | 1701 // Cache a full miss result for kPrefix1. |
1721 std::vector<SBPrefix> prefixes(1, kPrefix1); | 1702 std::vector<SBPrefix> prefixes(1, kPrefix1); |
1722 std::vector<SBFullHashResult> cache_results; | 1703 std::vector<SBFullHashResult> cache_results; |
1723 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); | 1704 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); |
1724 } | 1705 } |
1725 | 1706 |
1726 { | 1707 { |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1761 const SBFullHash kFullHash3_1 = | 1742 const SBFullHash kFullHash3_1 = |
1762 SBFullHashForPrefixAndSuffix(kPrefix3, "\x01"); | 1743 SBFullHashForPrefixAndSuffix(kPrefix3, "\x01"); |
1763 | 1744 |
1764 // Insert prefix kPrefix1 and kPrefix2 into database. | 1745 // Insert prefix kPrefix1 and kPrefix2 into database. |
1765 ScopedVector<SBChunkData> chunks; | 1746 ScopedVector<SBChunkData> chunks; |
1766 chunks.push_back(AddChunkPrefix(1, kPrefix1)); | 1747 chunks.push_back(AddChunkPrefix(1, kPrefix1)); |
1767 chunks.push_back(AddChunkPrefix(2, kPrefix2)); | 1748 chunks.push_back(AddChunkPrefix(2, kPrefix2)); |
1768 | 1749 |
1769 std::vector<SBListChunkRanges> lists; | 1750 std::vector<SBListChunkRanges> lists; |
1770 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1751 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1771 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1752 database_->InsertChunks(kMalwareList, chunks.get()); |
1772 database_->UpdateFinished(true); | 1753 database_->UpdateFinished(true); |
1773 | 1754 |
1774 { | 1755 { |
1775 // kFullHash1_1 has a prefix hit of kPrefix1. | 1756 // kFullHash1_1 has a prefix hit of kPrefix1. |
1776 std::vector<SBFullHash> full_hashes; | 1757 std::vector<SBFullHash> full_hashes; |
1777 full_hashes.push_back(kFullHash1_1); | 1758 full_hashes.push_back(kFullHash1_1); |
1778 std::vector<SBPrefix> prefix_hits; | 1759 std::vector<SBPrefix> prefix_hits; |
1779 std::vector<SBFullHashResult> cache_hits; | 1760 std::vector<SBFullHashResult> cache_hits; |
1780 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1761 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1781 full_hashes, &prefix_hits, &cache_hits)); | 1762 full_hashes, &prefix_hits, &cache_hits)); |
(...skipping 23 matching lines...) Expand all Loading... |
1805 EXPECT_EQ(kPrefix2, prefix_hits[1]); | 1786 EXPECT_EQ(kPrefix2, prefix_hits[1]); |
1806 EXPECT_TRUE(cache_hits.empty()); | 1787 EXPECT_TRUE(cache_hits.empty()); |
1807 } | 1788 } |
1808 | 1789 |
1809 { | 1790 { |
1810 // Cache a fullhash result for two kPrefix1 full hashes. | 1791 // Cache a fullhash result for two kPrefix1 full hashes. |
1811 std::vector<SBPrefix> prefixes(1, kPrefix1); | 1792 std::vector<SBPrefix> prefixes(1, kPrefix1); |
1812 std::vector<SBFullHashResult> cache_results; | 1793 std::vector<SBFullHashResult> cache_results; |
1813 | 1794 |
1814 SBFullHashResult full_hash_result; | 1795 SBFullHashResult full_hash_result; |
1815 full_hash_result.list_id = safe_browsing::MALWARE; | 1796 full_hash_result.list_id = MALWARE; |
1816 | 1797 |
1817 full_hash_result.hash = kFullHash1_1; | 1798 full_hash_result.hash = kFullHash1_1; |
1818 cache_results.push_back(full_hash_result); | 1799 cache_results.push_back(full_hash_result); |
1819 | 1800 |
1820 full_hash_result.hash = kFullHash1_3; | 1801 full_hash_result.hash = kFullHash1_3; |
1821 cache_results.push_back(full_hash_result); | 1802 cache_results.push_back(full_hash_result); |
1822 | 1803 |
1823 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); | 1804 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); |
1824 } | 1805 } |
1825 | 1806 |
1826 { | 1807 { |
1827 // kFullHash1_1 should now see a cache hit. | 1808 // kFullHash1_1 should now see a cache hit. |
1828 std::vector<SBFullHash> full_hashes(1, kFullHash1_1); | 1809 std::vector<SBFullHash> full_hashes(1, kFullHash1_1); |
1829 std::vector<SBPrefix> prefix_hits; | 1810 std::vector<SBPrefix> prefix_hits; |
1830 std::vector<SBFullHashResult> cache_hits; | 1811 std::vector<SBFullHashResult> cache_hits; |
1831 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1812 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1832 full_hashes, &prefix_hits, &cache_hits)); | 1813 full_hashes, &prefix_hits, &cache_hits)); |
1833 EXPECT_TRUE(prefix_hits.empty()); | 1814 EXPECT_TRUE(prefix_hits.empty()); |
1834 ASSERT_EQ(1U, cache_hits.size()); | 1815 ASSERT_EQ(1U, cache_hits.size()); |
1835 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1816 EXPECT_TRUE(SBFullHashEqual( |
1836 kFullHash1_1, cache_hits[0].hash)); | 1817 kFullHash1_1, cache_hits[0].hash)); |
1837 | 1818 |
1838 // Adding kFullHash2_1 will see the existing cache hit plus the prefix hit | 1819 // Adding kFullHash2_1 will see the existing cache hit plus the prefix hit |
1839 // for kPrefix2. | 1820 // for kPrefix2. |
1840 full_hashes.push_back(kFullHash2_1); | 1821 full_hashes.push_back(kFullHash2_1); |
1841 prefix_hits.clear(); | 1822 prefix_hits.clear(); |
1842 cache_hits.clear(); | 1823 cache_hits.clear(); |
1843 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1824 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1844 full_hashes, &prefix_hits, &cache_hits)); | 1825 full_hashes, &prefix_hits, &cache_hits)); |
1845 ASSERT_EQ(1U, prefix_hits.size()); | 1826 ASSERT_EQ(1U, prefix_hits.size()); |
1846 EXPECT_EQ(kPrefix2, prefix_hits[0]); | 1827 EXPECT_EQ(kPrefix2, prefix_hits[0]); |
1847 ASSERT_EQ(1U, cache_hits.size()); | 1828 ASSERT_EQ(1U, cache_hits.size()); |
1848 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1829 EXPECT_TRUE(SBFullHashEqual( |
1849 kFullHash1_1, cache_hits[0].hash)); | 1830 kFullHash1_1, cache_hits[0].hash)); |
1850 | 1831 |
1851 // kFullHash1_3 also gets a cache hit. | 1832 // kFullHash1_3 also gets a cache hit. |
1852 full_hashes.push_back(kFullHash1_3); | 1833 full_hashes.push_back(kFullHash1_3); |
1853 prefix_hits.clear(); | 1834 prefix_hits.clear(); |
1854 cache_hits.clear(); | 1835 cache_hits.clear(); |
1855 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1836 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1856 full_hashes, &prefix_hits, &cache_hits)); | 1837 full_hashes, &prefix_hits, &cache_hits)); |
1857 ASSERT_EQ(1U, prefix_hits.size()); | 1838 ASSERT_EQ(1U, prefix_hits.size()); |
1858 EXPECT_EQ(kPrefix2, prefix_hits[0]); | 1839 EXPECT_EQ(kPrefix2, prefix_hits[0]); |
1859 ASSERT_EQ(2U, cache_hits.size()); | 1840 ASSERT_EQ(2U, cache_hits.size()); |
1860 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1841 EXPECT_TRUE(SBFullHashEqual( |
1861 kFullHash1_1, cache_hits[0].hash)); | 1842 kFullHash1_1, cache_hits[0].hash)); |
1862 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1843 EXPECT_TRUE(SBFullHashEqual( |
1863 kFullHash1_3, cache_hits[1].hash)); | 1844 kFullHash1_3, cache_hits[1].hash)); |
1864 } | 1845 } |
1865 | 1846 |
1866 { | 1847 { |
1867 // Check if DB contains only kFullHash1_3. Should return a cache hit. | 1848 // Check if DB contains only kFullHash1_3. Should return a cache hit. |
1868 std::vector<SBFullHash> full_hashes(1, kFullHash1_3); | 1849 std::vector<SBFullHash> full_hashes(1, kFullHash1_3); |
1869 std::vector<SBPrefix> prefix_hits; | 1850 std::vector<SBPrefix> prefix_hits; |
1870 std::vector<SBFullHashResult> cache_hits; | 1851 std::vector<SBFullHashResult> cache_hits; |
1871 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1852 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1872 full_hashes, &prefix_hits, &cache_hits)); | 1853 full_hashes, &prefix_hits, &cache_hits)); |
1873 EXPECT_TRUE(prefix_hits.empty()); | 1854 EXPECT_TRUE(prefix_hits.empty()); |
1874 ASSERT_EQ(1U, cache_hits.size()); | 1855 ASSERT_EQ(1U, cache_hits.size()); |
1875 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1856 EXPECT_TRUE(SBFullHashEqual( |
1876 kFullHash1_3, cache_hits[0].hash)); | 1857 kFullHash1_3, cache_hits[0].hash)); |
1877 } | 1858 } |
1878 | 1859 |
1879 { | 1860 { |
1880 // kFullHash1_2 has no cache hit, and no prefix hit because of the cache for | 1861 // kFullHash1_2 has no cache hit, and no prefix hit because of the cache for |
1881 // kPrefix1. | 1862 // kPrefix1. |
1882 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); | 1863 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); |
1883 std::vector<SBPrefix> prefix_hits; | 1864 std::vector<SBPrefix> prefix_hits; |
1884 std::vector<SBFullHashResult> cache_hits; | 1865 std::vector<SBFullHashResult> cache_hits; |
1885 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( | 1866 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( |
(...skipping 20 matching lines...) Expand all Loading... |
1906 const SBFullHash kFullHash1_3 = | 1887 const SBFullHash kFullHash1_3 = |
1907 SBFullHashForPrefixAndSuffix(kPrefix1, "\x03"); | 1888 SBFullHashForPrefixAndSuffix(kPrefix1, "\x03"); |
1908 | 1889 |
1909 // Insert two full hashes with a shared prefix. | 1890 // Insert two full hashes with a shared prefix. |
1910 ScopedVector<SBChunkData> chunks; | 1891 ScopedVector<SBChunkData> chunks; |
1911 chunks.push_back(AddChunkFullHash(1, kFullHash1_1)); | 1892 chunks.push_back(AddChunkFullHash(1, kFullHash1_1)); |
1912 chunks.push_back(AddChunkFullHash(2, kFullHash1_2)); | 1893 chunks.push_back(AddChunkFullHash(2, kFullHash1_2)); |
1913 | 1894 |
1914 std::vector<SBListChunkRanges> lists; | 1895 std::vector<SBListChunkRanges> lists; |
1915 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1896 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1916 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1897 database_->InsertChunks(kMalwareList, chunks.get()); |
1917 database_->UpdateFinished(true); | 1898 database_->UpdateFinished(true); |
1918 | 1899 |
1919 { | 1900 { |
1920 // Check a full hash which isn't present. | 1901 // Check a full hash which isn't present. |
1921 std::vector<SBFullHash> full_hashes(1, kFullHash1_3); | 1902 std::vector<SBFullHash> full_hashes(1, kFullHash1_3); |
1922 std::vector<SBPrefix> prefix_hits; | 1903 std::vector<SBPrefix> prefix_hits; |
1923 std::vector<SBFullHashResult> cache_hits; | 1904 std::vector<SBFullHashResult> cache_hits; |
1924 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( | 1905 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( |
1925 full_hashes, &prefix_hits, &cache_hits)); | 1906 full_hashes, &prefix_hits, &cache_hits)); |
1926 | 1907 |
(...skipping 14 matching lines...) Expand all Loading... |
1941 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1922 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1942 full_hashes, &prefix_hits, &cache_hits)); | 1923 full_hashes, &prefix_hits, &cache_hits)); |
1943 ASSERT_EQ(1U, prefix_hits.size()); | 1924 ASSERT_EQ(1U, prefix_hits.size()); |
1944 EXPECT_EQ(kPrefix1, prefix_hits[0]); | 1925 EXPECT_EQ(kPrefix1, prefix_hits[0]); |
1945 EXPECT_TRUE(cache_hits.empty()); | 1926 EXPECT_TRUE(cache_hits.empty()); |
1946 } | 1927 } |
1947 | 1928 |
1948 { | 1929 { |
1949 // Cache a gethash result for kFullHash1_2. | 1930 // Cache a gethash result for kFullHash1_2. |
1950 SBFullHashResult full_hash_result; | 1931 SBFullHashResult full_hash_result; |
1951 full_hash_result.list_id = safe_browsing::MALWARE; | 1932 full_hash_result.list_id = MALWARE; |
1952 full_hash_result.hash = kFullHash1_2; | 1933 full_hash_result.hash = kFullHash1_2; |
1953 | 1934 |
1954 std::vector<SBPrefix> prefixes(1, kPrefix1); | 1935 std::vector<SBPrefix> prefixes(1, kPrefix1); |
1955 std::vector<SBFullHashResult> cache_results(1, full_hash_result); | 1936 std::vector<SBFullHashResult> cache_results(1, full_hash_result); |
1956 | 1937 |
1957 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); | 1938 database_->CacheHashResults(prefixes, cache_results, kCacheLifetime); |
1958 } | 1939 } |
1959 | 1940 |
1960 { | 1941 { |
1961 // kFullHash1_3 should still return false, because the cached | 1942 // kFullHash1_3 should still return false, because the cached |
(...skipping 13 matching lines...) Expand all Loading... |
1975 full_hashes, &prefix_hits, &cache_hits)); | 1956 full_hashes, &prefix_hits, &cache_hits)); |
1976 | 1957 |
1977 // kFullHash1_2 is in the cached result. | 1958 // kFullHash1_2 is in the cached result. |
1978 full_hashes.push_back(kFullHash1_2); | 1959 full_hashes.push_back(kFullHash1_2); |
1979 prefix_hits.clear(); | 1960 prefix_hits.clear(); |
1980 cache_hits.clear(); | 1961 cache_hits.clear(); |
1981 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 1962 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
1982 full_hashes, &prefix_hits, &cache_hits)); | 1963 full_hashes, &prefix_hits, &cache_hits)); |
1983 EXPECT_TRUE(prefix_hits.empty()); | 1964 EXPECT_TRUE(prefix_hits.empty()); |
1984 ASSERT_EQ(1U, cache_hits.size()); | 1965 ASSERT_EQ(1U, cache_hits.size()); |
1985 EXPECT_TRUE(safe_browsing::SBFullHashEqual( | 1966 EXPECT_TRUE(SBFullHashEqual( |
1986 kFullHash1_2, cache_hits[0].hash)); | 1967 kFullHash1_2, cache_hits[0].hash)); |
1987 } | 1968 } |
1988 | 1969 |
1989 // Remove kFullHash1_1 from the database. | 1970 // Remove kFullHash1_1 from the database. |
1990 chunks.clear(); | 1971 chunks.clear(); |
1991 chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); | 1972 chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); |
1992 | 1973 |
1993 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 1974 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
1994 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 1975 database_->InsertChunks(kMalwareList, chunks.get()); |
1995 database_->UpdateFinished(true); | 1976 database_->UpdateFinished(true); |
1996 | 1977 |
1997 // Cache should be cleared after updating. | 1978 // Cache should be cleared after updating. |
1998 EXPECT_TRUE( | 1979 EXPECT_TRUE( |
1999 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); | 1980 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); |
2000 | 1981 |
2001 { | 1982 { |
2002 // Now the database doesn't contain kFullHash1_1. | 1983 // Now the database doesn't contain kFullHash1_1. |
2003 std::vector<SBFullHash> full_hashes(1, kFullHash1_1); | 1984 std::vector<SBFullHash> full_hashes(1, kFullHash1_1); |
2004 std::vector<SBPrefix> prefix_hits; | 1985 std::vector<SBPrefix> prefix_hits; |
(...skipping 17 matching lines...) Expand all Loading... |
2022 ASSERT_EQ(1U, prefix_hits.size()); | 2003 ASSERT_EQ(1U, prefix_hits.size()); |
2023 EXPECT_EQ(kPrefix1, prefix_hits[0]); | 2004 EXPECT_EQ(kPrefix1, prefix_hits[0]); |
2024 EXPECT_TRUE(cache_hits.empty()); | 2005 EXPECT_TRUE(cache_hits.empty()); |
2025 } | 2006 } |
2026 | 2007 |
2027 // Remove kFullHash1_2 from the database. | 2008 // Remove kFullHash1_2 from the database. |
2028 chunks.clear(); | 2009 chunks.clear(); |
2029 chunks.push_back(SubChunkFullHash(12, kFullHash1_2, 2)); | 2010 chunks.push_back(SubChunkFullHash(12, kFullHash1_2, 2)); |
2030 | 2011 |
2031 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 2012 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
2032 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2013 database_->InsertChunks(kMalwareList, chunks.get()); |
2033 database_->UpdateFinished(true); | 2014 database_->UpdateFinished(true); |
2034 | 2015 |
2035 // Cache should be cleared after updating. | 2016 // Cache should be cleared after updating. |
2036 EXPECT_TRUE( | 2017 EXPECT_TRUE( |
2037 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); | 2018 database_->GetUnsynchronizedPrefixGetHashCacheForTesting()->empty()); |
2038 | 2019 |
2039 { | 2020 { |
2040 // None are present. | 2021 // None are present. |
2041 std::vector<SBFullHash> full_hashes; | 2022 std::vector<SBFullHash> full_hashes; |
2042 std::vector<SBPrefix> prefix_hits; | 2023 std::vector<SBPrefix> prefix_hits; |
(...skipping 11 matching lines...) Expand all Loading... |
2054 const SBFullHash kFullHash1_1 = | 2035 const SBFullHash kFullHash1_1 = |
2055 SBFullHashForPrefixAndSuffix(kPrefix1, "\x01"); | 2036 SBFullHashForPrefixAndSuffix(kPrefix1, "\x01"); |
2056 const SBFullHash kFullHash1_2 = | 2037 const SBFullHash kFullHash1_2 = |
2057 SBFullHashForPrefixAndSuffix(kPrefix1, "\x02"); | 2038 SBFullHashForPrefixAndSuffix(kPrefix1, "\x02"); |
2058 | 2039 |
2059 ScopedVector<SBChunkData> chunks; | 2040 ScopedVector<SBChunkData> chunks; |
2060 chunks.push_back(AddChunkFullHash(1, kFullHash1_1)); | 2041 chunks.push_back(AddChunkFullHash(1, kFullHash1_1)); |
2061 | 2042 |
2062 std::vector<SBListChunkRanges> lists; | 2043 std::vector<SBListChunkRanges> lists; |
2063 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 2044 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
2064 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2045 database_->InsertChunks(kMalwareList, chunks.get()); |
2065 database_->UpdateFinished(true); | 2046 database_->UpdateFinished(true); |
2066 | 2047 |
2067 { | 2048 { |
2068 // kFullHash1_2 does not match kFullHash1_1. | 2049 // kFullHash1_2 does not match kFullHash1_1. |
2069 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); | 2050 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); |
2070 std::vector<SBPrefix> prefix_hits; | 2051 std::vector<SBPrefix> prefix_hits; |
2071 std::vector<SBFullHashResult> cache_hits; | 2052 std::vector<SBFullHashResult> cache_hits; |
2072 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( | 2053 EXPECT_FALSE(database_->ContainsBrowseUrlHashesForTesting( |
2073 full_hashes, &prefix_hits, &cache_hits)); | 2054 full_hashes, &prefix_hits, &cache_hits)); |
2074 } | 2055 } |
2075 | 2056 |
2076 // Add a prefix match. | 2057 // Add a prefix match. |
2077 chunks.clear(); | 2058 chunks.clear(); |
2078 chunks.push_back(AddChunkPrefix(2, kPrefix1)); | 2059 chunks.push_back(AddChunkPrefix(2, kPrefix1)); |
2079 | 2060 |
2080 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 2061 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
2081 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2062 database_->InsertChunks(kMalwareList, chunks.get()); |
2082 database_->UpdateFinished(true); | 2063 database_->UpdateFinished(true); |
2083 | 2064 |
2084 { | 2065 { |
2085 // kFullHash1_2 does match kPrefix1. | 2066 // kFullHash1_2 does match kPrefix1. |
2086 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); | 2067 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); |
2087 std::vector<SBPrefix> prefix_hits; | 2068 std::vector<SBPrefix> prefix_hits; |
2088 std::vector<SBFullHashResult> cache_hits; | 2069 std::vector<SBFullHashResult> cache_hits; |
2089 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 2070 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
2090 full_hashes, &prefix_hits, &cache_hits)); | 2071 full_hashes, &prefix_hits, &cache_hits)); |
2091 ASSERT_EQ(1U, prefix_hits.size()); | 2072 ASSERT_EQ(1U, prefix_hits.size()); |
2092 EXPECT_EQ(kPrefix1, prefix_hits[0]); | 2073 EXPECT_EQ(kPrefix1, prefix_hits[0]); |
2093 EXPECT_TRUE(cache_hits.empty()); | 2074 EXPECT_TRUE(cache_hits.empty()); |
2094 } | 2075 } |
2095 | 2076 |
2096 // Remove the full hash. | 2077 // Remove the full hash. |
2097 chunks.clear(); | 2078 chunks.clear(); |
2098 chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); | 2079 chunks.push_back(SubChunkFullHash(11, kFullHash1_1, 1)); |
2099 | 2080 |
2100 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 2081 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
2101 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2082 database_->InsertChunks(kMalwareList, chunks.get()); |
2102 database_->UpdateFinished(true); | 2083 database_->UpdateFinished(true); |
2103 | 2084 |
2104 { | 2085 { |
2105 // kFullHash1_2 still returns true due to the prefix hit. | 2086 // kFullHash1_2 still returns true due to the prefix hit. |
2106 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); | 2087 std::vector<SBFullHash> full_hashes(1, kFullHash1_2); |
2107 std::vector<SBPrefix> prefix_hits; | 2088 std::vector<SBPrefix> prefix_hits; |
2108 std::vector<SBFullHashResult> cache_hits; | 2089 std::vector<SBFullHashResult> cache_hits; |
2109 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( | 2090 EXPECT_TRUE(database_->ContainsBrowseUrlHashesForTesting( |
2110 full_hashes, &prefix_hits, &cache_hits)); | 2091 full_hashes, &prefix_hits, &cache_hits)); |
2111 ASSERT_EQ(1U, prefix_hits.size()); | 2092 ASSERT_EQ(1U, prefix_hits.size()); |
(...skipping 19 matching lines...) Expand all Loading... |
2131 | 2112 |
2132 // IPv6 prefix match for: 2620:0:1000:3103::/64. | 2113 // IPv6 prefix match for: 2620:0:1000:3103::/64. |
2133 chunks.push_back(AddChunkHashedIpValue(4, "2620:0:1000:3103::", 64)); | 2114 chunks.push_back(AddChunkHashedIpValue(4, "2620:0:1000:3103::", 64)); |
2134 | 2115 |
2135 // IPv4 prefix match for ::ffff:192.1.122.0/119. | 2116 // IPv4 prefix match for ::ffff:192.1.122.0/119. |
2136 chunks.push_back(AddChunkHashedIpValue(5, "::ffff:192.1.122.0", 119)); | 2117 chunks.push_back(AddChunkHashedIpValue(5, "::ffff:192.1.122.0", 119)); |
2137 | 2118 |
2138 // IPv4 prefix match for ::ffff:192.1.128.0/113. | 2119 // IPv4 prefix match for ::ffff:192.1.128.0/113. |
2139 chunks.push_back(AddChunkHashedIpValue(6, "::ffff:192.1.128.0", 113)); | 2120 chunks.push_back(AddChunkHashedIpValue(6, "::ffff:192.1.128.0", 113)); |
2140 | 2121 |
2141 database_->InsertChunks(safe_browsing::kIPBlacklist, chunks.get()); | 2122 database_->InsertChunks(kIPBlacklist, chunks.get()); |
2142 database_->UpdateFinished(true); | 2123 database_->UpdateFinished(true); |
2143 | 2124 |
2144 EXPECT_FALSE(database_->ContainsMalwareIP("192.168.0.255")); | 2125 EXPECT_FALSE(database_->ContainsMalwareIP("192.168.0.255")); |
2145 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.0")); | 2126 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.0")); |
2146 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.255")); | 2127 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.255")); |
2147 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.10")); | 2128 EXPECT_TRUE(database_->ContainsMalwareIP("192.168.1.10")); |
2148 EXPECT_TRUE(database_->ContainsMalwareIP("::ffff:192.168.1.2")); | 2129 EXPECT_TRUE(database_->ContainsMalwareIP("::ffff:192.168.1.2")); |
2149 EXPECT_FALSE(database_->ContainsMalwareIP("192.168.2.0")); | 2130 EXPECT_FALSE(database_->ContainsMalwareIP("192.168.2.0")); |
2150 | 2131 |
2151 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.1.0")); | 2132 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.1.0")); |
(...skipping 29 matching lines...) Expand all Loading... |
2181 } | 2162 } |
2182 | 2163 |
2183 TEST_F(SafeBrowsingDatabaseTest, ContainsBrowseURL) { | 2164 TEST_F(SafeBrowsingDatabaseTest, ContainsBrowseURL) { |
2184 std::vector<SBListChunkRanges> lists; | 2165 std::vector<SBListChunkRanges> lists; |
2185 ASSERT_TRUE(database_->UpdateStarted(&lists)); | 2166 ASSERT_TRUE(database_->UpdateStarted(&lists)); |
2186 | 2167 |
2187 // Add a host-level hit. | 2168 // Add a host-level hit. |
2188 { | 2169 { |
2189 ScopedVector<SBChunkData> chunks; | 2170 ScopedVector<SBChunkData> chunks; |
2190 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/")); | 2171 chunks.push_back(AddChunkPrefixValue(1, "www.evil.com/")); |
2191 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2172 database_->InsertChunks(kMalwareList, chunks.get()); |
2192 } | 2173 } |
2193 | 2174 |
2194 // Add a specific fullhash. | 2175 // Add a specific fullhash. |
2195 static const char kWhateverMalware[] = "www.whatever.com/malware.html"; | 2176 static const char kWhateverMalware[] = "www.whatever.com/malware.html"; |
2196 { | 2177 { |
2197 ScopedVector<SBChunkData> chunks; | 2178 ScopedVector<SBChunkData> chunks; |
2198 chunks.push_back(AddChunkFullHashValue(2, kWhateverMalware)); | 2179 chunks.push_back(AddChunkFullHashValue(2, kWhateverMalware)); |
2199 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2180 database_->InsertChunks(kMalwareList, chunks.get()); |
2200 } | 2181 } |
2201 | 2182 |
2202 // Add a fullhash which has a prefix collision for a known url. | 2183 // Add a fullhash which has a prefix collision for a known url. |
2203 static const char kExampleFine[] = "www.example.com/fine.html"; | 2184 static const char kExampleFine[] = "www.example.com/fine.html"; |
2204 static const char kExampleCollision[] = | 2185 static const char kExampleCollision[] = |
2205 "www.example.com/3123364814/malware.htm"; | 2186 "www.example.com/3123364814/malware.htm"; |
2206 ASSERT_EQ(SBPrefixForString(kExampleFine), | 2187 ASSERT_EQ(SBPrefixForString(kExampleFine), |
2207 SBPrefixForString(kExampleCollision)); | 2188 SBPrefixForString(kExampleCollision)); |
2208 { | 2189 { |
2209 ScopedVector<SBChunkData> chunks; | 2190 ScopedVector<SBChunkData> chunks; |
2210 chunks.push_back(AddChunkFullHashValue(3, kExampleCollision)); | 2191 chunks.push_back(AddChunkFullHashValue(3, kExampleCollision)); |
2211 database_->InsertChunks(safe_browsing::kMalwareList, chunks.get()); | 2192 database_->InsertChunks(kMalwareList, chunks.get()); |
2212 } | 2193 } |
2213 | 2194 |
2214 database_->UpdateFinished(true); | 2195 database_->UpdateFinished(true); |
2215 | 2196 |
2216 std::vector<SBPrefix> prefix_hits; | 2197 std::vector<SBPrefix> prefix_hits; |
2217 std::vector<SBFullHashResult> cache_hits; | 2198 std::vector<SBFullHashResult> cache_hits; |
2218 | 2199 |
2219 // Anything will hit the host prefix. | 2200 // Anything will hit the host prefix. |
2220 EXPECT_TRUE(database_->ContainsBrowseUrl( | 2201 EXPECT_TRUE(database_->ContainsBrowseUrl( |
2221 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); | 2202 GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits)); |
(...skipping 20 matching lines...) Expand all Loading... |
2242 GURL(std::string("http://") + kExampleCollision), | 2223 GURL(std::string("http://") + kExampleCollision), |
2243 &prefix_hits, &cache_hits)); | 2224 &prefix_hits, &cache_hits)); |
2244 ASSERT_EQ(1U, prefix_hits.size()); | 2225 ASSERT_EQ(1U, prefix_hits.size()); |
2245 EXPECT_EQ(SBPrefixForString(kExampleCollision), prefix_hits[0]); | 2226 EXPECT_EQ(SBPrefixForString(kExampleCollision), prefix_hits[0]); |
2246 EXPECT_TRUE(cache_hits.empty()); | 2227 EXPECT_TRUE(cache_hits.empty()); |
2247 | 2228 |
2248 // This prefix collides, but no full hash match. | 2229 // This prefix collides, but no full hash match. |
2249 EXPECT_FALSE(database_->ContainsBrowseUrl( | 2230 EXPECT_FALSE(database_->ContainsBrowseUrl( |
2250 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); | 2231 GURL(std::string("http://") + kExampleFine), &prefix_hits, &cache_hits)); |
2251 } | 2232 } |
| 2233 |
| 2234 } // namespace safe_browsing |
OLD | NEW |