Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/safe_browsing_db/util.h" | 5 #include "components/safe_browsing_db/util.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include "base/macros.h" | 9 #include "base/macros.h" |
| 10 #include "base/strings/string_util.h" | 10 #include "base/strings/string_util.h" |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 43 // Listnames that browser can process. | 43 // Listnames that browser can process. |
| 44 const char kMalwareList[] = "goog-malware-shavar"; | 44 const char kMalwareList[] = "goog-malware-shavar"; |
| 45 const char kPhishingList[] = "goog-phish-shavar"; | 45 const char kPhishingList[] = "goog-phish-shavar"; |
| 46 const char kBinUrlList[] = "goog-badbinurl-shavar"; | 46 const char kBinUrlList[] = "goog-badbinurl-shavar"; |
| 47 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; | 47 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; |
| 48 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; | 48 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; |
| 49 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; | 49 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; |
| 50 const char kIPBlacklist[] = "goog-badip-digest256"; | 50 const char kIPBlacklist[] = "goog-badip-digest256"; |
| 51 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; | 51 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; |
| 52 const char kInclusionWhitelist[] = "goog-csdinclusionwhite-sha256"; | 52 const char kInclusionWhitelist[] = "goog-csdinclusionwhite-sha256"; |
| 53 const char kModuleWhitelist[] = "goog-whitemodule-sha256"; | |
| 53 | 54 |
| 54 const char* kAllLists[9] = { | 55 const char* kAllLists[10] = { |
| 55 kMalwareList, | 56 kMalwareList, kPhishingList, kBinUrlList, kCsdWhiteList, |
|
Nathan Parker
2016/02/08 02:47:40
Is this clang-autoformat's work? I think either t
proberge
2016/02/08 16:23:59
Yes, it was autoformat.
| |
| 56 kPhishingList, | 57 kDownloadWhiteList, kExtensionBlacklist, kIPBlacklist, kUnwantedUrlList, |
| 57 kBinUrlList, | 58 kInclusionWhitelist, kModuleWhitelist, |
| 58 kCsdWhiteList, | |
| 59 kDownloadWhiteList, | |
| 60 kExtensionBlacklist, | |
| 61 kIPBlacklist, | |
| 62 kUnwantedUrlList, | |
| 63 kInclusionWhitelist, | |
| 64 }; | 59 }; |
| 65 | 60 |
| 66 ListType GetListId(const base::StringPiece& name) { | 61 ListType GetListId(const base::StringPiece& name) { |
| 67 ListType id; | 62 ListType id; |
| 68 if (name == kMalwareList) { | 63 if (name == kMalwareList) { |
| 69 id = MALWARE; | 64 id = MALWARE; |
| 70 } else if (name == kPhishingList) { | 65 } else if (name == kPhishingList) { |
| 71 id = PHISH; | 66 id = PHISH; |
| 72 } else if (name == kBinUrlList) { | 67 } else if (name == kBinUrlList) { |
| 73 id = BINURL; | 68 id = BINURL; |
| 74 } else if (name == kCsdWhiteList) { | 69 } else if (name == kCsdWhiteList) { |
| 75 id = CSDWHITELIST; | 70 id = CSDWHITELIST; |
| 76 } else if (name == kDownloadWhiteList) { | 71 } else if (name == kDownloadWhiteList) { |
| 77 id = DOWNLOADWHITELIST; | 72 id = DOWNLOADWHITELIST; |
| 78 } else if (name == kExtensionBlacklist) { | 73 } else if (name == kExtensionBlacklist) { |
| 79 id = EXTENSIONBLACKLIST; | 74 id = EXTENSIONBLACKLIST; |
| 80 } else if (name == kIPBlacklist) { | 75 } else if (name == kIPBlacklist) { |
| 81 id = IPBLACKLIST; | 76 id = IPBLACKLIST; |
| 82 } else if (name == kUnwantedUrlList) { | 77 } else if (name == kUnwantedUrlList) { |
| 83 id = UNWANTEDURL; | 78 id = UNWANTEDURL; |
| 84 } else if (name == kInclusionWhitelist) { | 79 } else if (name == kInclusionWhitelist) { |
| 85 id = INCLUSIONWHITELIST; | 80 id = INCLUSIONWHITELIST; |
| 81 } else if (name == kModuleWhitelist) { | |
| 82 id = MODULEWHITELIST; | |
| 86 } else { | 83 } else { |
| 87 id = INVALID; | 84 id = INVALID; |
| 88 } | 85 } |
| 89 return id; | 86 return id; |
| 90 } | 87 } |
| 91 | 88 |
| 92 bool GetListName(ListType list_id, std::string* list) { | 89 bool GetListName(ListType list_id, std::string* list) { |
| 93 switch (list_id) { | 90 switch (list_id) { |
| 94 case MALWARE: | 91 case MALWARE: |
| 95 *list = kMalwareList; | 92 *list = kMalwareList; |
| (...skipping 15 matching lines...) Expand all Loading... | |
| 111 break; | 108 break; |
| 112 case IPBLACKLIST: | 109 case IPBLACKLIST: |
| 113 *list = kIPBlacklist; | 110 *list = kIPBlacklist; |
| 114 break; | 111 break; |
| 115 case UNWANTEDURL: | 112 case UNWANTEDURL: |
| 116 *list = kUnwantedUrlList; | 113 *list = kUnwantedUrlList; |
| 117 break; | 114 break; |
| 118 case INCLUSIONWHITELIST: | 115 case INCLUSIONWHITELIST: |
| 119 *list = kInclusionWhitelist; | 116 *list = kInclusionWhitelist; |
| 120 break; | 117 break; |
| 118 case MODULEWHITELIST: | |
| 119 *list = kModuleWhitelist; | |
| 120 break; | |
| 121 default: | 121 default: |
| 122 return false; | 122 return false; |
| 123 } | 123 } |
| 124 DCHECK(IsKnownList(*list)); | 124 DCHECK(IsKnownList(*list)); |
| 125 return true; | 125 return true; |
| 126 } | 126 } |
| 127 | 127 |
| 128 | 128 |
| 129 SBFullHash SBFullHashForString(const base::StringPiece& str) { | 129 SBFullHash SBFullHashForString(const base::StringPiece& str) { |
| 130 SBFullHash h; | 130 SBFullHash h; |
| (...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 407 GenerateHostsToCheck(url, &hosts); | 407 GenerateHostsToCheck(url, &hosts); |
| 408 GeneratePathsToCheck(url, &paths); | 408 GeneratePathsToCheck(url, &paths); |
| 409 for (size_t h = 0; h < hosts.size(); ++h) { | 409 for (size_t h = 0; h < hosts.size(); ++h) { |
| 410 for (size_t p = 0; p < paths.size(); ++p) { | 410 for (size_t p = 0; p < paths.size(); ++p) { |
| 411 urls->push_back(hosts[h] + paths[p]); | 411 urls->push_back(hosts[h] + paths[p]); |
| 412 } | 412 } |
| 413 } | 413 } |
| 414 } | 414 } |
| 415 | 415 |
| 416 } // namespace safe_browsing | 416 } // namespace safe_browsing |
| OLD | NEW |