Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(77)

Side by Side Diff: chrome/browser/safe_browsing/safe_browsing_database_unittest.cc

Issue 172393005: [safe browsing] Remove stale BINHASH code. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Update histogram info in comment. Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // Unit tests for the SafeBrowsing storage system. 5 // Unit tests for the SafeBrowsing storage system.
6 6
7 #include "base/file_util.h" 7 #include "base/file_util.h"
8 #include "base/files/scoped_temp_dir.h" 8 #include "base/files/scoped_temp_dir.h"
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "base/message_loop/message_loop.h" 10 #include "base/message_loop/message_loop.h"
(...skipping 420 matching lines...) Expand 10 before | Expand all | Expand 10 after
431 database_->InsertChunks(safe_browsing_util::kPhishingList, chunks); 431 database_->InsertChunks(safe_browsing_util::kPhishingList, chunks);
432 432
433 chunk.hosts.clear(); 433 chunk.hosts.clear();
434 InsertAddChunkHostPrefixUrl(&chunk, 3, "www.whatever.com/", 434 InsertAddChunkHostPrefixUrl(&chunk, 3, "www.whatever.com/",
435 "www.whatever.com/download.html"); 435 "www.whatever.com/download.html");
436 chunks.clear(); 436 chunks.clear();
437 chunks.push_back(chunk); 437 chunks.push_back(chunk);
438 database_->InsertChunks(safe_browsing_util::kBinUrlList, chunks); 438 database_->InsertChunks(safe_browsing_util::kBinUrlList, chunks);
439 439
440 chunk.hosts.clear(); 440 chunk.hosts.clear();
441 InsertAddChunkHostPrefixUrl(&chunk, 4, "www.forhash.com/",
442 "www.forhash.com/download.html");
443 chunks.clear();
444 chunks.push_back(chunk);
445 database_->InsertChunks(safe_browsing_util::kBinHashList, chunks);
446
447 chunk.hosts.clear();
448 InsertAddChunkHostFullHashes(&chunk, 5, "www.forwhitelist.com/", 441 InsertAddChunkHostFullHashes(&chunk, 5, "www.forwhitelist.com/",
449 "www.forwhitelist.com/a.html"); 442 "www.forwhitelist.com/a.html");
450 chunks.clear(); 443 chunks.clear();
451 chunks.push_back(chunk); 444 chunks.push_back(chunk);
452 database_->InsertChunks(safe_browsing_util::kCsdWhiteList, chunks); 445 database_->InsertChunks(safe_browsing_util::kCsdWhiteList, chunks);
453 446
454 chunk.hosts.clear(); 447 chunk.hosts.clear();
455 InsertAddChunkHostFullHashes(&chunk, 6, "www.download.com/", 448 InsertAddChunkHostFullHashes(&chunk, 6, "www.download.com/",
456 "www.download.com/"); 449 "www.download.com/");
457 450
(...skipping 23 matching lines...) Expand all
481 ASSERT_EQ(7U, lists.size()); 474 ASSERT_EQ(7U, lists.size());
482 EXPECT_TRUE(lists[0].name == safe_browsing_util::kMalwareList); 475 EXPECT_TRUE(lists[0].name == safe_browsing_util::kMalwareList);
483 EXPECT_EQ(lists[0].adds, "1"); 476 EXPECT_EQ(lists[0].adds, "1");
484 EXPECT_TRUE(lists[0].subs.empty()); 477 EXPECT_TRUE(lists[0].subs.empty());
485 EXPECT_TRUE(lists[1].name == safe_browsing_util::kPhishingList); 478 EXPECT_TRUE(lists[1].name == safe_browsing_util::kPhishingList);
486 EXPECT_EQ(lists[1].adds, "2"); 479 EXPECT_EQ(lists[1].adds, "2");
487 EXPECT_TRUE(lists[1].subs.empty()); 480 EXPECT_TRUE(lists[1].subs.empty());
488 EXPECT_TRUE(lists[2].name == safe_browsing_util::kBinUrlList); 481 EXPECT_TRUE(lists[2].name == safe_browsing_util::kBinUrlList);
489 EXPECT_EQ(lists[2].adds, "3"); 482 EXPECT_EQ(lists[2].adds, "3");
490 EXPECT_TRUE(lists[2].subs.empty()); 483 EXPECT_TRUE(lists[2].subs.empty());
491 // kBinHashList is ignored. (http://crbug.com/108130)
492 EXPECT_TRUE(lists[3].name == safe_browsing_util::kCsdWhiteList); 484 EXPECT_TRUE(lists[3].name == safe_browsing_util::kCsdWhiteList);
493 EXPECT_EQ(lists[3].adds, "5"); 485 EXPECT_EQ(lists[3].adds, "5");
494 EXPECT_TRUE(lists[3].subs.empty()); 486 EXPECT_TRUE(lists[3].subs.empty());
495 EXPECT_TRUE(lists[4].name == safe_browsing_util::kDownloadWhiteList); 487 EXPECT_TRUE(lists[4].name == safe_browsing_util::kDownloadWhiteList);
496 EXPECT_EQ(lists[4].adds, "6"); 488 EXPECT_EQ(lists[4].adds, "6");
497 EXPECT_TRUE(lists[4].subs.empty()); 489 EXPECT_TRUE(lists[4].subs.empty());
498 EXPECT_TRUE(lists[5].name == safe_browsing_util::kExtensionBlacklist); 490 EXPECT_TRUE(lists[5].name == safe_browsing_util::kExtensionBlacklist);
499 EXPECT_EQ(lists[5].adds, "8"); 491 EXPECT_EQ(lists[5].adds, "8");
500 EXPECT_TRUE(lists[5].subs.empty()); 492 EXPECT_TRUE(lists[5].subs.empty());
501 EXPECT_TRUE(lists[6].name == safe_browsing_util::kIPBlacklist); 493 EXPECT_TRUE(lists[6].name == safe_browsing_util::kIPBlacklist);
(...skipping 1323 matching lines...) Expand 10 before | Expand all | Expand 10 after
1825 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.124.0")); 1817 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.124.0"));
1826 1818
1827 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.127.255")); 1819 EXPECT_FALSE(database_->ContainsMalwareIP("192.1.127.255"));
1828 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.128.0")); 1820 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.128.0"));
1829 EXPECT_TRUE(database_->ContainsMalwareIP("::ffff:192.1.128.1")); 1821 EXPECT_TRUE(database_->ContainsMalwareIP("::ffff:192.1.128.1"));
1830 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.128.255")); 1822 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.128.255"));
1831 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.255.0")); 1823 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.255.0"));
1832 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.255.255")); 1824 EXPECT_TRUE(database_->ContainsMalwareIP("192.1.255.255"));
1833 EXPECT_FALSE(database_->ContainsMalwareIP("192.2.0.0")); 1825 EXPECT_FALSE(database_->ContainsMalwareIP("192.2.0.0"));
1834 } 1826 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698