OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/safe_browsing/download_protection_service.h" | 5 #include "chrome/browser/safe_browsing/download_protection_service.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/base_paths.h" | 10 #include "base/base_paths.h" |
(...skipping 692 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
703 EXPECT_CALL(item, GetHash()).WillRepeatedly(ReturnRef(hash)); | 703 EXPECT_CALL(item, GetHash()).WillRepeatedly(ReturnRef(hash)); |
704 EXPECT_CALL(item, GetReceivedBytes()).WillRepeatedly(Return(100)); | 704 EXPECT_CALL(item, GetReceivedBytes()).WillRepeatedly(Return(100)); |
705 EXPECT_CALL(item, HasUserGesture()).WillRepeatedly(Return(true)); | 705 EXPECT_CALL(item, HasUserGesture()).WillRepeatedly(Return(true)); |
706 EXPECT_CALL(item, GetRemoteAddress()).WillRepeatedly(Return("")); | 706 EXPECT_CALL(item, GetRemoteAddress()).WillRepeatedly(Return("")); |
707 | 707 |
708 // Write out a zip archive to the temporary file. In this case, it | 708 // Write out a zip archive to the temporary file. In this case, it |
709 // only contains a text file. | 709 // only contains a text file. |
710 base::ScopedTempDir zip_source_dir; | 710 base::ScopedTempDir zip_source_dir; |
711 ASSERT_TRUE(zip_source_dir.CreateUniqueTempDir()); | 711 ASSERT_TRUE(zip_source_dir.CreateUniqueTempDir()); |
712 std::string file_contents = "dummy file"; | 712 std::string file_contents = "dummy file"; |
713 ASSERT_EQ(static_cast<int>(file_contents.size()), file_util::WriteFile( | 713 ASSERT_EQ(static_cast<int>(file_contents.size()), base::WriteFile( |
714 zip_source_dir.path().Append(FILE_PATH_LITERAL("file.txt")), | 714 zip_source_dir.path().Append(FILE_PATH_LITERAL("file.txt")), |
715 file_contents.data(), file_contents.size())); | 715 file_contents.data(), file_contents.size())); |
716 ASSERT_TRUE(zip::Zip(zip_source_dir.path(), a_tmp, false)); | 716 ASSERT_TRUE(zip::Zip(zip_source_dir.path(), a_tmp, false)); |
717 | 717 |
718 download_service_->CheckClientDownload( | 718 download_service_->CheckClientDownload( |
719 &item, | 719 &item, |
720 base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, | 720 base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
721 base::Unretained(this))); | 721 base::Unretained(this))); |
722 MessageLoop::current()->Run(); | 722 MessageLoop::current()->Run(); |
723 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); | 723 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); |
724 Mock::VerifyAndClearExpectations(sb_service_.get()); | 724 Mock::VerifyAndClearExpectations(sb_service_.get()); |
725 Mock::VerifyAndClearExpectations(signature_util_.get()); | 725 Mock::VerifyAndClearExpectations(signature_util_.get()); |
726 | 726 |
727 // Now check with an executable in the zip file as well. | 727 // Now check with an executable in the zip file as well. |
728 ASSERT_EQ(static_cast<int>(file_contents.size()), file_util::WriteFile( | 728 ASSERT_EQ(static_cast<int>(file_contents.size()), base::WriteFile( |
729 zip_source_dir.path().Append(FILE_PATH_LITERAL("file.exe")), | 729 zip_source_dir.path().Append(FILE_PATH_LITERAL("file.exe")), |
730 file_contents.data(), file_contents.size())); | 730 file_contents.data(), file_contents.size())); |
731 ASSERT_TRUE(zip::Zip(zip_source_dir.path(), a_tmp, false)); | 731 ASSERT_TRUE(zip::Zip(zip_source_dir.path(), a_tmp, false)); |
732 | 732 |
733 EXPECT_CALL(*sb_service_->mock_database_manager(), | 733 EXPECT_CALL(*sb_service_->mock_database_manager(), |
734 MatchDownloadWhitelistUrl(_)) | 734 MatchDownloadWhitelistUrl(_)) |
735 .WillRepeatedly(Return(false)); | 735 .WillRepeatedly(Return(false)); |
736 | 736 |
737 download_service_->CheckClientDownload( | 737 download_service_->CheckClientDownload( |
738 &item, | 738 &item, |
(...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
780 EXPECT_CALL(item, GetFullPath()).WillRepeatedly(ReturnRef(a_tmp)); | 780 EXPECT_CALL(item, GetFullPath()).WillRepeatedly(ReturnRef(a_tmp)); |
781 EXPECT_CALL(item, GetTargetFilePath()).WillRepeatedly(ReturnRef(a_zip)); | 781 EXPECT_CALL(item, GetTargetFilePath()).WillRepeatedly(ReturnRef(a_zip)); |
782 EXPECT_CALL(item, GetUrlChain()).WillRepeatedly(ReturnRef(url_chain)); | 782 EXPECT_CALL(item, GetUrlChain()).WillRepeatedly(ReturnRef(url_chain)); |
783 EXPECT_CALL(item, GetReferrerUrl()).WillRepeatedly(ReturnRef(referrer)); | 783 EXPECT_CALL(item, GetReferrerUrl()).WillRepeatedly(ReturnRef(referrer)); |
784 EXPECT_CALL(item, GetHash()).WillRepeatedly(ReturnRef(hash)); | 784 EXPECT_CALL(item, GetHash()).WillRepeatedly(ReturnRef(hash)); |
785 EXPECT_CALL(item, GetReceivedBytes()).WillRepeatedly(Return(100)); | 785 EXPECT_CALL(item, GetReceivedBytes()).WillRepeatedly(Return(100)); |
786 EXPECT_CALL(item, HasUserGesture()).WillRepeatedly(Return(true)); | 786 EXPECT_CALL(item, HasUserGesture()).WillRepeatedly(Return(true)); |
787 EXPECT_CALL(item, GetRemoteAddress()).WillRepeatedly(Return("")); | 787 EXPECT_CALL(item, GetRemoteAddress()).WillRepeatedly(Return("")); |
788 | 788 |
789 std::string file_contents = "corrupt zip file"; | 789 std::string file_contents = "corrupt zip file"; |
790 ASSERT_EQ(static_cast<int>(file_contents.size()), file_util::WriteFile( | 790 ASSERT_EQ(static_cast<int>(file_contents.size()), base::WriteFile( |
791 a_tmp, file_contents.data(), file_contents.size())); | 791 a_tmp, file_contents.data(), file_contents.size())); |
792 | 792 |
793 download_service_->CheckClientDownload( | 793 download_service_->CheckClientDownload( |
794 &item, | 794 &item, |
795 base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, | 795 base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
796 base::Unretained(this))); | 796 base::Unretained(this))); |
797 MessageLoop::current()->Run(); | 797 MessageLoop::current()->Run(); |
798 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); | 798 EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); |
799 Mock::VerifyAndClearExpectations(sb_service_.get()); | 799 Mock::VerifyAndClearExpectations(sb_service_.get()); |
800 Mock::VerifyAndClearExpectations(signature_util_.get()); | 800 Mock::VerifyAndClearExpectations(signature_util_.get()); |
(...skipping 415 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1216 EXPECT_THAT(whitelist_strings, ElementsAre(cert_base + "/OU=unit")); | 1216 EXPECT_THAT(whitelist_strings, ElementsAre(cert_base + "/OU=unit")); |
1217 | 1217 |
1218 cert = ReadTestCertificate("test_c.pem"); | 1218 cert = ReadTestCertificate("test_c.pem"); |
1219 ASSERT_TRUE(cert.get()); | 1219 ASSERT_TRUE(cert.get()); |
1220 whitelist_strings.clear(); | 1220 whitelist_strings.clear(); |
1221 GetCertificateWhitelistStrings( | 1221 GetCertificateWhitelistStrings( |
1222 *cert.get(), *issuer_cert.get(), &whitelist_strings); | 1222 *cert.get(), *issuer_cert.get(), &whitelist_strings); |
1223 EXPECT_THAT(whitelist_strings, ElementsAre()); | 1223 EXPECT_THAT(whitelist_strings, ElementsAre()); |
1224 } | 1224 } |
1225 } // namespace safe_browsing | 1225 } // namespace safe_browsing |
OLD | NEW |