Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/safe_browsing_db/util.h" | 5 #include "components/safe_browsing_db/util.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include "base/macros.h" | 9 #include "base/macros.h" |
| 10 #include "base/strings/string_util.h" | 10 #include "base/strings/string_util.h" |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 46 const char kMalwareList[] = "goog-malware-shavar"; | 46 const char kMalwareList[] = "goog-malware-shavar"; |
| 47 const char kPhishingList[] = "goog-phish-shavar"; | 47 const char kPhishingList[] = "goog-phish-shavar"; |
| 48 const char kBinUrlList[] = "goog-badbinurl-shavar"; | 48 const char kBinUrlList[] = "goog-badbinurl-shavar"; |
| 49 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; | 49 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; |
| 50 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; | 50 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; |
| 51 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; | 51 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; |
| 52 const char kIPBlacklist[] = "goog-badip-digest256"; | 52 const char kIPBlacklist[] = "goog-badip-digest256"; |
| 53 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; | 53 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; |
| 54 const char kInclusionWhitelist[] = "goog-csdinclusionwhite-sha256"; | 54 const char kInclusionWhitelist[] = "goog-csdinclusionwhite-sha256"; |
| 55 const char kModuleWhitelist[] = "goog-whitemodule-digest256"; | 55 const char kModuleWhitelist[] = "goog-whitemodule-digest256"; |
| 56 const char kResourceBlacklist[] = "goog-badresource-shavar"; | |
| 56 | 57 |
| 57 const char* kAllLists[10] = { | 58 const char* kAllLists[11] = { |
| 58 kMalwareList, kPhishingList, kBinUrlList, kCsdWhiteList, | 59 kMalwareList, kPhishingList, kBinUrlList, kCsdWhiteList, |
| 59 kDownloadWhiteList, kExtensionBlacklist, kIPBlacklist, kUnwantedUrlList, | 60 kDownloadWhiteList, kExtensionBlacklist, kIPBlacklist, kUnwantedUrlList, |
| 60 kInclusionWhitelist, kModuleWhitelist, | 61 kInclusionWhitelist, kModuleWhitelist, kResourceBlacklist, |
| 61 }; | 62 }; |
| 62 | 63 |
| 63 ListType GetListId(const base::StringPiece& name) { | 64 ListType GetListId(const base::StringPiece& name) { |
| 64 ListType id; | 65 ListType id; |
| 65 if (name == kMalwareList) { | 66 if (name == kMalwareList) { |
| 66 id = MALWARE; | 67 id = MALWARE; |
| 67 } else if (name == kPhishingList) { | 68 } else if (name == kPhishingList) { |
| 68 id = PHISH; | 69 id = PHISH; |
| 69 } else if (name == kBinUrlList) { | 70 } else if (name == kBinUrlList) { |
| 70 id = BINURL; | 71 id = BINURL; |
| 71 } else if (name == kCsdWhiteList) { | 72 } else if (name == kCsdWhiteList) { |
| 72 id = CSDWHITELIST; | 73 id = CSDWHITELIST; |
| 73 } else if (name == kDownloadWhiteList) { | 74 } else if (name == kDownloadWhiteList) { |
| 74 id = DOWNLOADWHITELIST; | 75 id = DOWNLOADWHITELIST; |
| 75 } else if (name == kExtensionBlacklist) { | 76 } else if (name == kExtensionBlacklist) { |
| 76 id = EXTENSIONBLACKLIST; | 77 id = EXTENSIONBLACKLIST; |
| 77 } else if (name == kIPBlacklist) { | 78 } else if (name == kIPBlacklist) { |
| 78 id = IPBLACKLIST; | 79 id = IPBLACKLIST; |
| 79 } else if (name == kUnwantedUrlList) { | 80 } else if (name == kUnwantedUrlList) { |
| 80 id = UNWANTEDURL; | 81 id = UNWANTEDURL; |
| 81 } else if (name == kInclusionWhitelist) { | 82 } else if (name == kInclusionWhitelist) { |
| 82 id = INCLUSIONWHITELIST; | 83 id = INCLUSIONWHITELIST; |
| 83 } else if (name == kModuleWhitelist) { | 84 } else if (name == kModuleWhitelist) { |
| 84 id = MODULEWHITELIST; | 85 id = MODULEWHITELIST; |
| 86 } else if (name == kResourceBlacklist) { | |
| 87 id = RESOURCEBLACKLIST; | |
| 85 } else { | 88 } else { |
| 86 id = INVALID; | 89 id = INVALID; |
| 87 } | 90 } |
| 88 return id; | 91 return id; |
| 89 } | 92 } |
| 90 | 93 |
| 91 bool GetListName(ListType list_id, std::string* list) { | 94 bool GetListName(ListType list_id, std::string* list) { |
| 92 switch (list_id) { | 95 switch (list_id) { |
| 93 case MALWARE: | 96 case MALWARE: |
| 94 *list = kMalwareList; | 97 *list = kMalwareList; |
| (...skipping 17 matching lines...) Expand all Loading... | |
| 112 *list = kIPBlacklist; | 115 *list = kIPBlacklist; |
| 113 break; | 116 break; |
| 114 case UNWANTEDURL: | 117 case UNWANTEDURL: |
| 115 *list = kUnwantedUrlList; | 118 *list = kUnwantedUrlList; |
| 116 break; | 119 break; |
| 117 case INCLUSIONWHITELIST: | 120 case INCLUSIONWHITELIST: |
| 118 *list = kInclusionWhitelist; | 121 *list = kInclusionWhitelist; |
| 119 break; | 122 break; |
| 120 case MODULEWHITELIST: | 123 case MODULEWHITELIST: |
| 121 *list = kModuleWhitelist; | 124 *list = kModuleWhitelist; |
| 125 case RESOURCEBLACKLIST: | |
| 126 *list = kResourceBlacklist; | |
|
igorcov
2016/10/26 11:37:34
The break statement was stolen from above and now
grt (UTC plus 2)
2016/10/26 11:44:49
fix out for review in https://codereview.chromium.
| |
| 122 break; | 127 break; |
| 123 default: | 128 default: |
| 124 return false; | 129 return false; |
| 125 } | 130 } |
| 126 DCHECK(IsKnownList(*list)); | 131 DCHECK(IsKnownList(*list)); |
| 127 return true; | 132 return true; |
| 128 } | 133 } |
| 129 | 134 |
| 130 | 135 |
| 131 SBFullHash SBFullHashForString(const base::StringPiece& str) { | 136 SBFullHash SBFullHashForString(const base::StringPiece& str) { |
| (...skipping 277 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 409 GenerateHostsToCheck(url, &hosts); | 414 GenerateHostsToCheck(url, &hosts); |
| 410 GeneratePathsToCheck(url, &paths); | 415 GeneratePathsToCheck(url, &paths); |
| 411 for (size_t h = 0; h < hosts.size(); ++h) { | 416 for (size_t h = 0; h < hosts.size(); ++h) { |
| 412 for (size_t p = 0; p < paths.size(); ++p) { | 417 for (size_t p = 0; p < paths.size(); ++p) { |
| 413 urls->push_back(hosts[h] + paths[p]); | 418 urls->push_back(hosts[h] + paths[p]); |
| 414 } | 419 } |
| 415 } | 420 } |
| 416 } | 421 } |
| 417 | 422 |
| 418 } // namespace safe_browsing | 423 } // namespace safe_browsing |
| OLD | NEW |