| OLD | NEW |
| 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/safe_browsing_db/util.h" | 5 #include "components/safe_browsing_db/util.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include "base/macros.h" | 9 #include "base/macros.h" |
| 10 #include "base/strings/string_util.h" | 10 #include "base/strings/string_util.h" |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 52 | 52 |
| 53 // Listnames that browser can process. | 53 // Listnames that browser can process. |
| 54 const char kMalwareList[] = "goog-malware-shavar"; | 54 const char kMalwareList[] = "goog-malware-shavar"; |
| 55 const char kPhishingList[] = "goog-phish-shavar"; | 55 const char kPhishingList[] = "goog-phish-shavar"; |
| 56 const char kBinUrlList[] = "goog-badbinurl-shavar"; | 56 const char kBinUrlList[] = "goog-badbinurl-shavar"; |
| 57 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; | 57 const char kCsdWhiteList[] = "goog-csdwhite-sha256"; |
| 58 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; | 58 const char kDownloadWhiteList[] = "goog-downloadwhite-digest256"; |
| 59 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; | 59 const char kExtensionBlacklist[] = "goog-badcrxids-digestvar"; |
| 60 const char kIPBlacklist[] = "goog-badip-digest256"; | 60 const char kIPBlacklist[] = "goog-badip-digest256"; |
| 61 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; | 61 const char kUnwantedUrlList[] = "goog-unwanted-shavar"; |
| 62 const char kInclusionWhitelist[] = "goog-csdinclusionwhite-sha256"; | |
| 63 const char kModuleWhitelist[] = "goog-whitemodule-digest256"; | 62 const char kModuleWhitelist[] = "goog-whitemodule-digest256"; |
| 64 const char kResourceBlacklist[] = "goog-badresource-shavar"; | 63 const char kResourceBlacklist[] = "goog-badresource-shavar"; |
| 65 | 64 |
| 66 const char* kAllLists[11] = { | 65 const char* kAllLists[10] = { |
| 67 kMalwareList, kPhishingList, kBinUrlList, kCsdWhiteList, | 66 kMalwareList, kPhishingList, kBinUrlList, kCsdWhiteList, |
| 68 kDownloadWhiteList, kExtensionBlacklist, kIPBlacklist, kUnwantedUrlList, | 67 kDownloadWhiteList, kExtensionBlacklist, kIPBlacklist, kUnwantedUrlList, |
| 69 kInclusionWhitelist, kModuleWhitelist, kResourceBlacklist, | 68 kModuleWhitelist, kResourceBlacklist, |
| 70 }; | 69 }; |
| 71 | 70 |
| 72 ListType GetListId(const base::StringPiece& name) { | 71 ListType GetListId(const base::StringPiece& name) { |
| 73 ListType id; | 72 ListType id; |
| 74 if (name == kMalwareList) { | 73 if (name == kMalwareList) { |
| 75 id = MALWARE; | 74 id = MALWARE; |
| 76 } else if (name == kPhishingList) { | 75 } else if (name == kPhishingList) { |
| 77 id = PHISH; | 76 id = PHISH; |
| 78 } else if (name == kBinUrlList) { | 77 } else if (name == kBinUrlList) { |
| 79 id = BINURL; | 78 id = BINURL; |
| 80 } else if (name == kCsdWhiteList) { | 79 } else if (name == kCsdWhiteList) { |
| 81 id = CSDWHITELIST; | 80 id = CSDWHITELIST; |
| 82 } else if (name == kDownloadWhiteList) { | 81 } else if (name == kDownloadWhiteList) { |
| 83 id = DOWNLOADWHITELIST; | 82 id = DOWNLOADWHITELIST; |
| 84 } else if (name == kExtensionBlacklist) { | 83 } else if (name == kExtensionBlacklist) { |
| 85 id = EXTENSIONBLACKLIST; | 84 id = EXTENSIONBLACKLIST; |
| 86 } else if (name == kIPBlacklist) { | 85 } else if (name == kIPBlacklist) { |
| 87 id = IPBLACKLIST; | 86 id = IPBLACKLIST; |
| 88 } else if (name == kUnwantedUrlList) { | 87 } else if (name == kUnwantedUrlList) { |
| 89 id = UNWANTEDURL; | 88 id = UNWANTEDURL; |
| 90 } else if (name == kInclusionWhitelist) { | |
| 91 id = INCLUSIONWHITELIST; | |
| 92 } else if (name == kModuleWhitelist) { | 89 } else if (name == kModuleWhitelist) { |
| 93 id = MODULEWHITELIST; | 90 id = MODULEWHITELIST; |
| 94 } else if (name == kResourceBlacklist) { | 91 } else if (name == kResourceBlacklist) { |
| 95 id = RESOURCEBLACKLIST; | 92 id = RESOURCEBLACKLIST; |
| 96 } else { | 93 } else { |
| 97 id = INVALID; | 94 id = INVALID; |
| 98 } | 95 } |
| 99 return id; | 96 return id; |
| 100 } | 97 } |
| 101 | 98 |
| (...skipping 16 matching lines...) Expand all Loading... |
| 118 break; | 115 break; |
| 119 case EXTENSIONBLACKLIST: | 116 case EXTENSIONBLACKLIST: |
| 120 *list = kExtensionBlacklist; | 117 *list = kExtensionBlacklist; |
| 121 break; | 118 break; |
| 122 case IPBLACKLIST: | 119 case IPBLACKLIST: |
| 123 *list = kIPBlacklist; | 120 *list = kIPBlacklist; |
| 124 break; | 121 break; |
| 125 case UNWANTEDURL: | 122 case UNWANTEDURL: |
| 126 *list = kUnwantedUrlList; | 123 *list = kUnwantedUrlList; |
| 127 break; | 124 break; |
| 128 case INCLUSIONWHITELIST: | |
| 129 *list = kInclusionWhitelist; | |
| 130 break; | |
| 131 case MODULEWHITELIST: | 125 case MODULEWHITELIST: |
| 132 *list = kModuleWhitelist; | 126 *list = kModuleWhitelist; |
| 133 case RESOURCEBLACKLIST: | 127 case RESOURCEBLACKLIST: |
| 134 *list = kResourceBlacklist; | 128 *list = kResourceBlacklist; |
| 135 break; | 129 break; |
| 136 default: | 130 default: |
| 137 return false; | 131 return false; |
| 138 } | 132 } |
| 139 DCHECK(IsKnownList(*list)); | 133 DCHECK(IsKnownList(*list)); |
| 140 return true; | 134 return true; |
| (...skipping 282 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 423 GenerateHostsToCheck(url, &hosts); | 417 GenerateHostsToCheck(url, &hosts); |
| 424 GeneratePathsToCheck(url, &paths); | 418 GeneratePathsToCheck(url, &paths); |
| 425 for (size_t h = 0; h < hosts.size(); ++h) { | 419 for (size_t h = 0; h < hosts.size(); ++h) { |
| 426 for (size_t p = 0; p < paths.size(); ++p) { | 420 for (size_t p = 0; p < paths.size(); ++p) { |
| 427 urls->push_back(hosts[h] + paths[p]); | 421 urls->push_back(hosts[h] + paths[p]); |
| 428 } | 422 } |
| 429 } | 423 } |
| 430 } | 424 } |
| 431 | 425 |
| 432 } // namespace safe_browsing | 426 } // namespace safe_browsing |
| OLD | NEW |