| Index: chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/protocol_parser_unittest.cc b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| index 77b6e2292d282022e3f47578fc7b20c597fc60b4..4b44c559ed37a8ec3cc7a21eea9e2e3dcbfa1f8e 100644
|
| --- a/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
|
| @@ -180,13 +180,13 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddBigChunk) {
|
| EXPECT_EQ(host1.entry->prefix_count(), 5);
|
| }
|
|
|
| -// Test to make sure we could deal with truncated bin hash chunk.
|
| -TEST(SafeBrowsingProtocolParsingTest, TestTruncatedBinHashChunk) {
|
| +// Test to make sure we could deal with truncated goog-*-digestvar chunk.
|
| +TEST(SafeBrowsingProtocolParsingTest, TestTruncatedHashChunk) {
|
| // This chunk delares there are 4 prefixes but actually only contains 2.
|
| const char add_chunk[] = "a:1:4:16\n11112222";
|
| SafeBrowsingProtocolParser parser;
|
| SBChunkList chunks;
|
| - bool result = parser.ParseChunk(safe_browsing_util::kBinHashList,
|
| + bool result = parser.ParseChunk(safe_browsing_util::kExtensionBlacklist,
|
| add_chunk,
|
| static_cast<int>(sizeof(add_chunk)),
|
| &chunks);
|
| @@ -641,7 +641,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddBinHashChunks) {
|
| SafeBrowsingProtocolParser parser;
|
| SBChunkList chunks;
|
| bool result = parser.ParseChunk(
|
| - safe_browsing_util::kBinHashList,
|
| + safe_browsing_util::kExtensionBlacklist,
|
| add_chunk.data(),
|
| static_cast<int>(add_chunk.length()),
|
| &chunks);
|
| @@ -677,7 +677,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestAddBigBinHashChunk) {
|
| SafeBrowsingProtocolParser parser;
|
| SBChunkList chunks;
|
| bool result = parser.ParseChunk(
|
| - safe_browsing_util::kBinHashList,
|
| + safe_browsing_util::kExtensionBlacklist,
|
| add_chunk.data(),
|
| static_cast<int>(add_chunk.length()),
|
| &chunks);
|
| @@ -700,7 +700,7 @@ TEST(SafeBrowsingProtocolParsingTest, TestSubBinHashChunk) {
|
| SafeBrowsingProtocolParser parser;
|
| SBChunkList chunks;
|
| bool result = parser.ParseChunk(
|
| - safe_browsing_util::kBinHashList,
|
| + safe_browsing_util::kExtensionBlacklist,
|
| sub_chunk.data(),
|
| static_cast<int>(sub_chunk.length()),
|
| &chunks);
|
| @@ -803,8 +803,6 @@ TEST(SafeBrowsingProtocolParsingTest, TestAllLists) {
|
| add_testdata[safe_browsing_util::kSideEffectFreeWhitelist] = std::string(
|
| "a:1818:4:9\n\x85\xd0\xfe""i\x01""}\x98\xb1\xe5", 20);
|
| // goog-*-digestvar lists have no host-key data.
|
| - add_testdata[safe_browsing_util::kBinHashList] = std::string(
|
| - "a:5:4:4\nBBBB", 12);
|
| add_testdata[safe_browsing_util::kExtensionBlacklist] = std::string(
|
| "a:81:4:8\nhleedfcc", 17);
|
| // goog-*-sha256 lists have host-keys but they only contains
|
| @@ -833,8 +831,6 @@ TEST(SafeBrowsingProtocolParsingTest, TestAllLists) {
|
| sub_testdata[safe_browsing_util::kSideEffectFreeWhitelist] = std::string(
|
| "s:4:4:9\nHOST\x00""####", 17);
|
| // goog-*-digestvar lists have no host-key data.
|
| - sub_testdata[safe_browsing_util::kBinHashList] = std::string(
|
| - "s:5:4:8\n####BBBB", 16);
|
| sub_testdata[safe_browsing_util::kExtensionBlacklist] = std::string(
|
| "s:3:4:8\n\x00\x00\x00""%pgkc", 16);
|
| // goog-*-sha256 lists have host-keys but they only contains
|
|
|