Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(201)

Unified Diff: chrome/browser/safe_browsing/protocol_parser_unittest.cc

Issue 1420053005: Move code in components/safe_browsing_db and chrome/browser/s_b/ under the safe_browsing namespace. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@02_components_move
Patch Set: Remove '// namespace safe_browsing' for a small fwd decl block. Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/protocol_parser_unittest.cc
diff --git a/chrome/browser/safe_browsing/protocol_parser_unittest.cc b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
index d145b8105c640a98acf3e81917b6da227cb834a7..5d4993f9ae3b8f90235f22071c9592c21120f580 100644
--- a/chrome/browser/safe_browsing/protocol_parser_unittest.cc
+++ b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
@@ -10,11 +10,15 @@
#include "chrome/browser/safe_browsing/safe_browsing_util.h"
#include "testing/gtest/include/gtest/gtest.h"
+namespace safe_browsing {
+
namespace {
const char kDefaultPhishList[] = "goog-phish-shavar";
const char kDefaultMalwareList[] = "goog-malware-shavar";
+} // namespace
+
// Test parsing one add chunk.
TEST(SafeBrowsingProtocolParsingTest, TestAddChunk) {
const char kRawAddChunk[] = {
@@ -32,8 +36,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(1, chunks[0]->ChunkNumber());
EXPECT_TRUE(chunks[0]->IsAdd());
@@ -78,8 +81,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddFullChunk) {
}
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(1, chunks[0]->ChunkNumber());
EXPECT_TRUE(chunks[0]->IsAdd());
@@ -88,10 +90,8 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddFullChunk) {
EXPECT_TRUE(chunks[0]->IsFullHash());
ASSERT_EQ(2U, chunks[0]->FullHashCount());
- EXPECT_TRUE(
- safe_browsing::SBFullHashEqual(chunks[0]->FullHashAt(0), full_hash1));
- EXPECT_TRUE(
- safe_browsing::SBFullHashEqual(chunks[0]->FullHashAt(1), full_hash2));
+ EXPECT_TRUE(SBFullHashEqual(chunks[0]->FullHashAt(0), full_hash1));
+ EXPECT_TRUE(SBFullHashEqual(chunks[0]->FullHashAt(1), full_hash2));
}
// Test parsing multiple add chunks. We'll use the same chunk as above, and add
@@ -121,8 +121,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddChunks) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
ASSERT_EQ(2U, chunks.size());
EXPECT_EQ(1, chunks[0]->ChunkNumber());
@@ -162,8 +161,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestTruncatedPrefixChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_FALSE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_FALSE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
}
TEST(SafeBrowsingProtocolParsingTest, TestTruncatedFullHashChunk) {
@@ -184,8 +182,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestTruncatedFullHashChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_FALSE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_FALSE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
}
TEST(SafeBrowsingProtocolParsingTest, TestHugeChunk) {
@@ -202,8 +199,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestHugeChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_FALSE(safe_browsing::ParseChunk(kRawAddChunk, sizeof(kRawAddChunk),
- &chunks));
+ EXPECT_FALSE(ParseChunk(kRawAddChunk, sizeof(kRawAddChunk), &chunks));
}
// Test parsing one sub chunk.
@@ -224,8 +220,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestSubChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kRawSubChunk, sizeof(kRawSubChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kRawSubChunk, sizeof(kRawSubChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(3, chunks[0]->ChunkNumber());
EXPECT_FALSE(chunks[0]->IsAdd());
@@ -274,8 +269,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestSubFullChunk) {
}
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kRawSubChunk, sizeof(kRawSubChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kRawSubChunk, sizeof(kRawSubChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(2, chunks[0]->ChunkNumber());
EXPECT_FALSE(chunks[0]->IsAdd());
@@ -284,11 +278,9 @@ TEST(SafeBrowsingProtocolParsingTest, TestSubFullChunk) {
EXPECT_TRUE(chunks[0]->IsFullHash());
ASSERT_EQ(2U, chunks[0]->FullHashCount());
- EXPECT_TRUE(
- safe_browsing::SBFullHashEqual(chunks[0]->FullHashAt(0), full_hash1));
+ EXPECT_TRUE(SBFullHashEqual(chunks[0]->FullHashAt(0), full_hash1));
EXPECT_EQ(7, chunks[0]->AddChunkNumberAt(0));
- EXPECT_TRUE(
- safe_browsing::SBFullHashEqual(chunks[0]->FullHashAt(1), full_hash2));
+ EXPECT_TRUE(SBFullHashEqual(chunks[0]->FullHashAt(1), full_hash2));
EXPECT_EQ(9, chunks[0]->AddChunkNumberAt(1));
}
@@ -301,7 +293,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestChunkDelete) {
bool reset = false;
std::vector<SBChunkDelete> deletes;
std::vector<ChunkUrl> urls;
- EXPECT_TRUE(safe_browsing::ParseUpdate(add_del.data(), add_del.length(),
+ EXPECT_TRUE(ParseUpdate(add_del.data(), add_del.length(),
&next_query_sec, &reset,
&deletes, &urls));
@@ -326,7 +318,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestChunkDelete) {
deletes.clear();
urls.clear();
add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
- EXPECT_FALSE(safe_browsing::ParseUpdate(add_del.data(), add_del.length(),
+ EXPECT_FALSE(ParseUpdate(add_del.data(), add_del.length(),
&next_query_sec, &reset,
&deletes, &urls));
}
@@ -346,7 +338,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestRedirects) {
bool reset = false;
std::vector<SBChunkDelete> deletes;
std::vector<ChunkUrl> urls;
- EXPECT_TRUE(safe_browsing::ParseUpdate(redirects.data(), redirects.length(),
+ EXPECT_TRUE(ParseUpdate(redirects.data(), redirects.length(),
&next_query_sec, &reset,
&deletes, &urls));
EXPECT_FALSE(reset);
@@ -372,7 +364,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestNextQueryTime) {
bool reset = false;
std::vector<SBChunkDelete> deletes;
std::vector<ChunkUrl> urls;
- EXPECT_TRUE(safe_browsing::ParseUpdate(headers.data(), headers.length(),
+ EXPECT_TRUE(ParseUpdate(headers.data(), headers.length(),
&next_query_sec, &reset,
&deletes, &urls));
@@ -393,22 +385,22 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
kDefaultPhishList));
std::vector<SBFullHashResult> full_hashes;
base::TimeDelta cache_lifetime;
- EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash.data(), get_hash.length(),
- &cache_lifetime, &full_hashes));
+ EXPECT_TRUE(ParseGetHash(get_hash.data(), get_hash.length(), &cache_lifetime,
+ &full_hashes));
ASSERT_EQ(3U, full_hashes.size());
EXPECT_EQ(memcmp(&full_hashes[0].hash,
"00112233445566778899aabbccddeeff",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[0].list_id);
+ EXPECT_EQ(PHISH, full_hashes[0].list_id);
EXPECT_EQ(memcmp(&full_hashes[1].hash,
"00001111222233334444555566667777",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[1].list_id);
+ EXPECT_EQ(PHISH, full_hashes[1].list_id);
EXPECT_EQ(memcmp(&full_hashes[2].hash,
"ffffeeeeddddccccbbbbaaaa99998888",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[2].list_id);
+ EXPECT_EQ(PHISH, full_hashes[2].list_id);
// Test multiple lists in the GetHash results.
const std::string get_hash2(base::StringPrintf(
@@ -420,22 +412,22 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
"zzzzyyyyxxxxwwwwvvvvuuuuttttssss",
kDefaultPhishList,
kDefaultMalwareList));
- EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash2.data(), get_hash2.length(),
- &cache_lifetime, &full_hashes));
+ EXPECT_TRUE(ParseGetHash(get_hash2.data(), get_hash2.length(),
+ &cache_lifetime, &full_hashes));
ASSERT_EQ(3U, full_hashes.size());
EXPECT_EQ(memcmp(&full_hashes[0].hash,
"00112233445566778899aabbccddeeff",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[0].list_id);
+ EXPECT_EQ(PHISH, full_hashes[0].list_id);
EXPECT_EQ(memcmp(&full_hashes[1].hash,
"cafebeefcafebeefdeaddeaddeaddead",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[1].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[1].list_id);
EXPECT_EQ(memcmp(&full_hashes[2].hash,
"zzzzyyyyxxxxwwwwvvvvuuuuttttssss",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[2].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[2].list_id);
// Test metadata parsing.
const std::string get_hash3(base::StringPrintf(
@@ -448,24 +440,24 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
"cafebeefcafebeefdeaddeaddeaddead",
kDefaultMalwareList,
kDefaultPhishList));
- EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash3.data(), get_hash3.length(),
- &cache_lifetime, &full_hashes));
+ EXPECT_TRUE(ParseGetHash(get_hash3.data(), get_hash3.length(),
+ &cache_lifetime, &full_hashes));
ASSERT_EQ(3U, full_hashes.size());
EXPECT_EQ(memcmp(&full_hashes[0].hash,
"zzzzyyyyxxxxwwwwvvvvuuuuttttssss",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[0].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[0].list_id);
EXPECT_EQ(std::string("ab"), full_hashes[0].metadata);
EXPECT_EQ(memcmp(&full_hashes[1].hash,
"00112233445566778899aabbccddeeff",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[1].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[1].list_id);
EXPECT_EQ(std::string("xy"), full_hashes[1].metadata);
EXPECT_EQ(memcmp(&full_hashes[2].hash,
"cafebeefcafebeefdeaddeaddeaddead",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[2].list_id);
+ EXPECT_EQ(PHISH, full_hashes[2].list_id);
EXPECT_EQ(std::string(), full_hashes[2].metadata);
}
@@ -479,33 +471,29 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHashWithUnknownList) {
kDefaultPhishList));
std::vector<SBFullHashResult> full_hashes;
base::TimeDelta cache_lifetime;
- EXPECT_TRUE(safe_browsing::ParseGetHash(hash_response.data(),
- hash_response.size(),
- &cache_lifetime,
- &full_hashes));
+ EXPECT_TRUE(ParseGetHash(hash_response.data(), hash_response.size(),
+ &cache_lifetime, &full_hashes));
ASSERT_EQ(1U, full_hashes.size());
EXPECT_EQ(memcmp("12345678901234567890123456789012",
&full_hashes[0].hash, sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[0].list_id);
+ EXPECT_EQ(PHISH, full_hashes[0].list_id);
hash_response += base::StringPrintf(
"%s:32:1\n"
"abcdefghijklmnopqrstuvwxyz123457",
kDefaultMalwareList);
full_hashes.clear();
- EXPECT_TRUE(safe_browsing::ParseGetHash(hash_response.data(),
- hash_response.size(),
- &cache_lifetime,
- &full_hashes));
+ EXPECT_TRUE(ParseGetHash(hash_response.data(), hash_response.size(),
+ &cache_lifetime, &full_hashes));
EXPECT_EQ(2U, full_hashes.size());
EXPECT_EQ(memcmp("12345678901234567890123456789012",
&full_hashes[0].hash, sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::PHISH, full_hashes[0].list_id);
+ EXPECT_EQ(PHISH, full_hashes[0].list_id);
EXPECT_EQ(memcmp("abcdefghijklmnopqrstuvwxyz123457",
&full_hashes[1].hash, sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[1].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[1].list_id);
}
TEST(SafeBrowsingProtocolParsingTest, TestGetHashWithUnknownListAndMetadata) {
@@ -521,13 +509,13 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHashWithUnknownListAndMetadata) {
"%s:32:1\n"
"0123456789hashhashhashhashhashha",
kDefaultMalwareList));
- EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash3.data(), get_hash3.length(),
- &cache_lifetime, &full_hashes));
+ EXPECT_TRUE(ParseGetHash(get_hash3.data(), get_hash3.length(),
+ &cache_lifetime, &full_hashes));
ASSERT_EQ(1U, full_hashes.size());
EXPECT_EQ(memcmp(&full_hashes[0].hash,
"0123456789hashhashhashhashhashha",
sizeof(SBFullHash)), 0);
- EXPECT_EQ(safe_browsing::MALWARE, full_hashes[0].list_id);
+ EXPECT_EQ(MALWARE, full_hashes[0].list_id);
EXPECT_EQ(std::string(), full_hashes[0].metadata);
}
@@ -537,7 +525,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestFormatHash) {
prefixes.push_back(0x64636261);
prefixes.push_back(0x73727170);
- EXPECT_EQ("4:12\n1234abcdpqrs", safe_browsing::FormatGetHash(prefixes));
+ EXPECT_EQ("4:12\n1234abcdpqrs", FormatGetHash(prefixes));
}
TEST(SafeBrowsingProtocolParsingTest, TestReset) {
@@ -547,7 +535,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestReset) {
size_t next_update = 0;
std::vector<SBChunkDelete> deletes;
std::vector<ChunkUrl> urls;
- EXPECT_TRUE(safe_browsing::ParseUpdate(update.data(), update.size(),
+ EXPECT_TRUE(ParseUpdate(update.data(), update.size(),
&next_update, &reset,
&deletes, &urls));
EXPECT_TRUE(reset);
@@ -564,8 +552,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeAddChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kEmptyAddChunk, sizeof(kEmptyAddChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kEmptyAddChunk, sizeof(kEmptyAddChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(2, chunks[0]->ChunkNumber());
EXPECT_TRUE(chunks[0]->IsAdd());
@@ -597,8 +584,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeAddChunk) {
'\x04', // varint length 8
'p', 'p', 'p', 'p', // 4-byte prefixes
};
- EXPECT_TRUE(safe_browsing::ParseChunk(kAddChunks, sizeof(kAddChunks),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kAddChunks, sizeof(kAddChunks), &chunks));
ASSERT_EQ(3U, chunks.size());
EXPECT_EQ(1, chunks[0]->ChunkNumber());
@@ -637,8 +623,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeSubChunk) {
};
ScopedVector<SBChunkData> chunks;
- EXPECT_TRUE(safe_browsing::ParseChunk(kEmptySubChunk, sizeof(kEmptySubChunk),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kEmptySubChunk, sizeof(kEmptySubChunk), &chunks));
ASSERT_EQ(1U, chunks.size());
EXPECT_EQ(2, chunks[0]->ChunkNumber());
EXPECT_FALSE(chunks[0]->IsAdd());
@@ -682,8 +667,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeSubChunk) {
'\x0B', // varint 11
};
- EXPECT_TRUE(safe_browsing::ParseChunk(kSubChunks, sizeof(kSubChunks),
- &chunks));
+ EXPECT_TRUE(ParseChunk(kSubChunks, sizeof(kSubChunks), &chunks));
ASSERT_EQ(3U, chunks.size());
EXPECT_EQ(1, chunks[0]->ChunkNumber());
@@ -714,4 +698,4 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeSubChunk) {
EXPECT_EQ(11, chunks[2]->AddChunkNumberAt(0));
}
-} // namespace
+} // namespace safe_browsing
« no previous file with comments | « chrome/browser/safe_browsing/protocol_parser.cc ('k') | chrome/browser/safe_browsing/remote_database_manager.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698