| Index: chrome/browser/safe_browsing/safe_browsing_database_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc b/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc
|
| index 70d2b019dceb9a39589e4ed38430fcb456eada17..0c1e302bec68741f77f9186ec2accaa4814f1d39 100644
|
| --- a/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/safe_browsing_database_unittest.cc
|
| @@ -4,13 +4,14 @@
|
| //
|
| // Unit tests for the SafeBrowsing storage system.
|
|
|
| +#include "chrome/browser/safe_browsing/safe_browsing_database.h"
|
| +
|
| #include "base/file_util.h"
|
| #include "base/files/scoped_temp_dir.h"
|
| #include "base/logging.h"
|
| #include "base/message_loop/message_loop.h"
|
| #include "base/sha1.h"
|
| #include "base/time/time.h"
|
| -#include "chrome/browser/safe_browsing/safe_browsing_database.h"
|
| #include "chrome/browser/safe_browsing/safe_browsing_store_file.h"
|
| #include "content/public/test/test_browser_thread_bundle.h"
|
| #include "crypto/sha2.h"
|
| @@ -29,6 +30,15 @@ SBPrefix SBPrefixForString(const std::string& str) {
|
| return SBFullHashForString(str).prefix;
|
| }
|
|
|
| +SBFullHash SBFullHashForPrefixAndSuffix(SBPrefix prefix, std::string suffix) {
|
| + SBFullHash full_hash;
|
| + memset(&full_hash, 0, sizeof(SBFullHash));
|
| + full_hash.prefix = prefix;
|
| + CHECK_LE(suffix.size() + sizeof(SBPrefix), sizeof(SBFullHash));
|
| + memcpy(full_hash.full_hash + sizeof(SBPrefix), suffix.data(), suffix.size());
|
| + return full_hash;
|
| +}
|
| +
|
| std::string HashedIpPrefix(const std::string& ip_prefix, size_t prefix_size) {
|
| net::IPAddressNumber ip_number;
|
| EXPECT_TRUE(net::ParseIPLiteralToNumber(ip_prefix, &ip_number));
|
| @@ -68,21 +78,33 @@ void InsertAddChunkHostPrefixUrl(SBChunk* chunk,
|
| SBPrefixForString(url));
|
| }
|
|
|
| -// Same as InsertAddChunkHostPrefixUrl, but with full hashes.
|
| -void InsertAddChunkHostFullHashes(SBChunk* chunk,
|
| - int chunk_number,
|
| - const std::string& host_name,
|
| - const std::string& url) {
|
| +// Same as InsertAddChunkHostFullHashes, but with pre-computed
|
| +// prefix and fullhash values.
|
| +void InsertAddChunkHostFullHashValue(SBChunk* chunk,
|
| + int chunk_number,
|
| + const SBPrefix& host_prefix,
|
| + const SBFullHash& url_fullhash) {
|
| chunk->chunk_number = chunk_number;
|
| chunk->is_add = true;
|
| SBChunkHost host;
|
| - host.host = SBPrefixForString(host_name);
|
| + host.host = host_prefix;
|
| host.entry = SBEntry::Create(SBEntry::ADD_FULL_HASH, 1);
|
| host.entry->set_chunk_id(chunk->chunk_number);
|
| - host.entry->SetFullHashAt(0, SBFullHashForString(url));
|
| + host.entry->SetFullHashAt(0, url_fullhash);
|
| chunk->hosts.push_back(host);
|
| }
|
|
|
| +// Same as InsertAddChunkHostPrefixUrl, but with full hashes.
|
| +void InsertAddChunkHostFullHashes(SBChunk* chunk,
|
| + int chunk_number,
|
| + const std::string& host_name,
|
| + const std::string& url) {
|
| + InsertAddChunkHostFullHashValue(chunk,
|
| + chunk_number,
|
| + SBPrefixForString(host_name),
|
| + SBFullHashForString(url));
|
| +}
|
| +
|
| void InsertAddChunkFullHash(SBChunk* chunk,
|
| int chunk_number,
|
| const std::string& ip_str,
|
| @@ -285,6 +307,14 @@ class SafeBrowsingDatabaseTest : public PlatformTest {
|
| DelChunk(list, chunk_id, true);
|
| }
|
|
|
| + bool ContainsBrowseUrlHashes(std::vector<SBFullHash>* full_hashes,
|
| + std::vector<SBPrefix>* prefix_hits,
|
| + std::vector<SBFullHashResult>* cache_hits) {
|
| + std::sort(full_hashes->begin(), full_hashes->end(), SBFullHashLess);
|
| + return database_->ContainsBrowseUrlHashes(
|
| + *full_hashes, prefix_hits, cache_hits);
|
| + }
|
| +
|
| // Utility function for setting up the database for the caching test.
|
| void PopulateDatabaseForCacheTest();
|
|
|
| @@ -528,57 +558,39 @@ TEST_F(SafeBrowsingDatabaseTest, BrowseDatabase) {
|
| EXPECT_EQ(lists[0].adds, "1-3");
|
| EXPECT_TRUE(lists[0].subs.empty());
|
|
|
| - const Time now = Time::Now();
|
| - std::vector<SBFullHashResult> full_hashes;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| std::vector<SBPrefix> prefix_hits;
|
| - std::string matching_list;
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits));
|
| EXPECT_EQ(prefix_hits[0], SBPrefixForString("www.evil.com/phishing.html"));
|
| EXPECT_EQ(prefix_hits.size(), 1U);
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/notevil1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/notevil1.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/notevil2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/notevil2.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good1.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good2.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://192.168.0.1/malware.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://192.168.0.1/malware.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/"), &prefix_hits, &cache_hits));
|
| EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/robots.txt"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/robots.txt"), &prefix_hits, &cache_hits));
|
|
|
| // Attempt to re-add the first chunk (should be a no-op).
|
| // see bug: http://code.google.com/p/chromium/issues/detail?id=4522
|
| @@ -609,32 +621,24 @@ TEST_F(SafeBrowsingDatabaseTest, BrowseDatabase) {
|
| database_->UpdateFinished(true);
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing.html"), &prefix_hits, &cache_hits));
|
| EXPECT_EQ(prefix_hits[0], SBPrefixForString("www.evil.com/phishing.html"));
|
| EXPECT_EQ(prefix_hits.size(), 1U);
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/notevil1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/notevil1.html"), &prefix_hits, &cache_hits));
|
| EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/notevil2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/notevil2.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good1.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good2.html"), &prefix_hits, &cache_hits));
|
|
|
| GetListsInfo(&lists);
|
| EXPECT_TRUE(lists[0].name == safe_browsing_util::kMalwareList);
|
| @@ -662,19 +666,13 @@ TEST_F(SafeBrowsingDatabaseTest, BrowseDatabase) {
|
| database_->UpdateFinished(true);
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/notevil2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.evil.com/notevil2.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good1.html"), &prefix_hits, &cache_hits));
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/good2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.good.com/good2.html"), &prefix_hits, &cache_hits));
|
|
|
| GetListsInfo(&lists);
|
| EXPECT_TRUE(lists[0].name == safe_browsing_util::kMalwareList);
|
| @@ -719,7 +717,8 @@ TEST_F(SafeBrowsingDatabaseTest, BrowseDatabase) {
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| GURL("http://www.notevilanymore.com/index.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + &prefix_hits,
|
| + &cache_hits));
|
|
|
| // Now insert the tardy add chunk and we don't expect them to appear
|
| // in database because of the previous sub chunk.
|
| @@ -735,11 +734,13 @@ TEST_F(SafeBrowsingDatabaseTest, BrowseDatabase) {
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| GURL("http://www.notevilanymore.com/index.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + &prefix_hits,
|
| + &cache_hits));
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| GURL("http://www.notevilanymore.com/good.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + &prefix_hits,
|
| + &cache_hits));
|
| }
|
|
|
|
|
| @@ -810,18 +811,12 @@ TEST_F(SafeBrowsingDatabaseTest, ZeroSizeChunk) {
|
| database_->InsertChunks(safe_browsing_util::kMalwareList, chunks);
|
| database_->UpdateFinished(true);
|
|
|
| - const Time now = Time::Now();
|
| - std::vector<SBFullHashResult> full_hashes;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| std::vector<SBPrefix> prefix_hits;
|
| - std::string matching_list;
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.notempty.com/full1.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.notempty.com/full1.html"), &prefix_hits, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.notempty.com/full2.html"),
|
| - &matching_list, &prefix_hits,
|
| - &full_hashes, now));
|
| + GURL("http://www.notempty.com/full2.html"), &prefix_hits, &cache_hits));
|
|
|
| GetListsInfo(&lists);
|
| EXPECT_EQ(lists[0].adds, "1,10,19-22");
|
| @@ -864,50 +859,53 @@ void SafeBrowsingDatabaseTest::PopulateDatabaseForCacheTest() {
|
| SBFullHashResult full_hash;
|
| full_hash.hash = SBFullHashForString("www.evil.com/phishing.html");
|
| full_hash.list_name = safe_browsing_util::kMalwareList;
|
| - full_hash.add_chunk_id = 1;
|
|
|
| std::vector<SBFullHashResult> results;
|
| + std::vector<SBPrefix> prefixes;
|
| results.push_back(full_hash);
|
| + prefixes.push_back(full_hash.hash.prefix);
|
| + database_->CacheHashResults(
|
| + prefixes, results, base::TimeDelta::FromMinutes(45));
|
|
|
| full_hash.hash = SBFullHashForString("www.evil.com/malware.html");
|
| + results.clear();
|
| + prefixes.clear();
|
| results.push_back(full_hash);
|
| -
|
| - std::vector<SBPrefix> prefixes;
|
| - database_->CacheHashResults(prefixes, results);
|
| + prefixes.push_back(full_hash.hash.prefix);
|
| + database_->CacheHashResults(
|
| + prefixes, results, base::TimeDelta::FromMinutes(45));
|
| }
|
|
|
| TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| PopulateDatabaseForCacheTest();
|
|
|
| // We should have both full hashes in the cache.
|
| - EXPECT_EQ(database_->pending_browse_hashes_.size(), 2U);
|
| + EXPECT_EQ(database_->browse_gethash_cache_.size(), 2U);
|
|
|
| // Test the cache lookup for the first prefix.
|
| std::string listname;
|
| std::vector<SBPrefix> prefixes;
|
| - std::vector<SBFullHashResult> full_hashes;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &listname, &prefixes, &full_hashes, Time::Now());
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.evil.com/phishing.html")));
|
| + GURL("http://www.evil.com/phishing.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_EQ(cache_hits.size(), 1U);
|
| + EXPECT_TRUE(SBFullHashEqual(
|
| + cache_hits[0].hash, SBFullHashForString("www.evil.com/phishing.html")));
|
|
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Test the cache lookup for the second prefix.
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &listname, &prefixes, &full_hashes, Time::Now());
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.evil.com/malware.html")));
|
| + GURL("http://www.evil.com/malware.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_EQ(cache_hits.size(), 1U);
|
| + EXPECT_TRUE(SBFullHashEqual(
|
| + cache_hits[0].hash, SBFullHashForString("www.evil.com/malware.html")));
|
|
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Test removing a prefix via a sub chunk.
|
| SBChunk chunk;
|
| @@ -921,71 +919,66 @@ TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| database_->InsertChunks(safe_browsing_util::kMalwareList, chunks);
|
| database_->UpdateFinished(true);
|
|
|
| - // This prefix should still be there.
|
| + // This prefix should still be there, but cached fullhash should be gone.
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &listname, &prefixes, &full_hashes, Time::Now());
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.evil.com/malware.html")));
|
| + GURL("http://www.evil.com/malware.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + EXPECT_EQ(prefixes.size(), 1U);
|
| + EXPECT_EQ(prefixes[0], SBPrefixForString("www.evil.com/malware.html"));
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // This prefix should be gone.
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &listname, &prefixes, &full_hashes, Time::Now());
|
| - EXPECT_TRUE(full_hashes.empty());
|
| + GURL("http://www.evil.com/phishing.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| - // Test that an AddDel for the original chunk removes the last cached entry.
|
| + // Test that an AddDel for the original chunk removes the last entry.
|
| EXPECT_TRUE(database_->UpdateStarted(&lists));
|
| AddDelChunk(safe_browsing_util::kMalwareList, 1);
|
| database_->UpdateFinished(true);
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &listname, &prefixes, &full_hashes, Time::Now());
|
| - EXPECT_TRUE(full_hashes.empty());
|
| + GURL("http://www.evil.com/malware.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| EXPECT_TRUE(database_->full_browse_hashes_.empty());
|
| - EXPECT_TRUE(database_->pending_browse_hashes_.empty());
|
| + EXPECT_TRUE(database_->browse_gethash_cache_.empty());
|
|
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Test that the cache won't return expired values. First we have to adjust
|
| // the cached entries' received time to make them older, since the database
|
| // cache insert uses Time::Now(). First, store some entries.
|
| PopulateDatabaseForCacheTest();
|
|
|
| - std::vector<SBAddFullHash>* hash_cache = &database_->pending_browse_hashes_;
|
| + std::map<SBPrefix, SBCachedFullHashResult>* hash_cache =
|
| + &database_->browse_gethash_cache_;
|
| EXPECT_EQ(hash_cache->size(), 2U);
|
|
|
| // Now adjust one of the entries times to be in the past.
|
| - base::Time expired = base::Time::Now() - base::TimeDelta::FromMinutes(60);
|
| const SBPrefix key = SBPrefixForString("www.evil.com/malware.html");
|
| - std::vector<SBAddFullHash>::iterator iter;
|
| - for (iter = hash_cache->begin(); iter != hash_cache->end(); ++iter) {
|
| - if (iter->full_hash.prefix == key) {
|
| - iter->received = static_cast<int32>(expired.ToTimeT());
|
| - break;
|
| - }
|
| - }
|
| - EXPECT_TRUE(iter != hash_cache->end());
|
| + std::map<SBPrefix, SBCachedFullHashResult>::iterator iter =
|
| + hash_cache->find(key);
|
| + ASSERT_TRUE(iter != hash_cache->end());
|
| + iter->second.expire_after =
|
| + base::Time::Now() - base::TimeDelta::FromMinutes(1);
|
|
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &listname, &prefixes, &full_hashes, expired);
|
| - EXPECT_TRUE(full_hashes.empty());
|
| + GURL("http://www.evil.com/malware.html"), &prefixes, &cache_hits);
|
| + EXPECT_EQ(prefixes.size(), 1U);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + // Expired entry should have been removed from cache.
|
| + EXPECT_EQ(hash_cache->size(), 1U);
|
|
|
| // This entry should still exist.
|
| database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &listname, &prefixes, &full_hashes, expired);
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| -
|
| + GURL("http://www.evil.com/phishing.html"), &prefixes, &cache_hits);
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_EQ(cache_hits.size(), 1U);
|
|
|
| // Testing prefix miss caching. First, we clear out the existing database,
|
| // Since PopulateDatabaseForCacheTest() doesn't handle adding duplicate
|
| @@ -999,33 +992,44 @@ TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| prefix_misses.push_back(SBPrefixForString("http://www.bad.com/malware.html"));
|
| prefix_misses.push_back(
|
| SBPrefixForString("http://www.bad.com/phishing.html"));
|
| - database_->CacheHashResults(prefix_misses, empty_full_hash);
|
| + database_->CacheHashResults(
|
| + prefix_misses, empty_full_hash, base::TimeDelta::FromMinutes(45));
|
|
|
| // Prefixes with no full results are misses.
|
| - EXPECT_EQ(database_->prefix_miss_cache_.size(), 2U);
|
| + EXPECT_EQ(hash_cache->size(), 2U);
|
| + EXPECT_NE(
|
| + hash_cache->find(SBPrefixForString("http://www.bad.com/malware.html")),
|
| + hash_cache->end());
|
| + EXPECT_TRUE(
|
| + hash_cache->find(SBPrefixForString("http://www.bad.com/malware.html"))
|
| + ->second.full_hashes.empty());
|
| + EXPECT_NE(
|
| + hash_cache->find(SBPrefixForString("http://www.bad.com/phishing.html")),
|
| + hash_cache->end());
|
| + EXPECT_TRUE(
|
| + hash_cache->find(SBPrefixForString("http://www.bad.com/phishing.html"))
|
| + ->second.full_hashes.empty());
|
|
|
| // Update the database.
|
| PopulateDatabaseForCacheTest();
|
|
|
| - // Prefix miss cache should be cleared.
|
| - EXPECT_TRUE(database_->prefix_miss_cache_.empty());
|
| -
|
| // Cache a GetHash miss for a particular prefix, and even though the prefix is
|
| // in the database, it is flagged as a miss so looking up the associated URL
|
| // will not succeed.
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
| prefix_misses.clear();
|
| empty_full_hash.clear();
|
| prefix_misses.push_back(SBPrefixForString("www.evil.com/phishing.html"));
|
| - database_->CacheHashResults(prefix_misses, empty_full_hash);
|
| + database_->CacheHashResults(
|
| + prefix_misses, empty_full_hash, base::TimeDelta::FromMinutes(45));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing.html"),
|
| - &listname, &prefixes,
|
| - &full_hashes, Time::Now()));
|
| + GURL("http://www.evil.com/phishing.html"), &prefixes, &cache_hits));
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Test receiving a full add chunk.
|
| chunk.hosts.clear();
|
| @@ -1039,26 +1043,20 @@ TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| database_->UpdateFinished(true);
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad1.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.fullevil.com/bad1.html")));
|
| + GURL("http://www.fullevil.com/bad1.html"), &prefixes, &cache_hits));
|
| + EXPECT_EQ(prefixes.size(), 1U);
|
| + EXPECT_EQ(prefixes[0], SBPrefixForString("www.fullevil.com/bad1.html"));
|
| + EXPECT_TRUE(cache_hits.empty());
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad2.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.fullevil.com/bad2.html")));
|
| + GURL("http://www.fullevil.com/bad2.html"), &prefixes, &cache_hits));
|
| + EXPECT_EQ(prefixes.size(), 1U);
|
| + EXPECT_EQ(prefixes[0], SBPrefixForString("www.fullevil.com/bad2.html"));
|
| + EXPECT_TRUE(cache_hits.empty());
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Test receiving a full sub chunk, which will remove one of the full adds.
|
| chunk.hosts.clear();
|
| @@ -1072,22 +1070,18 @@ TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| database_->UpdateFinished(true);
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad1.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| - EXPECT_TRUE(full_hashes.empty());
|
| + GURL("http://www.fullevil.com/bad1.html"), &prefixes, &cache_hits));
|
| + EXPECT_TRUE(prefixes.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
|
|
| // There should be one remaining full add.
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad2.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| - EXPECT_EQ(full_hashes.size(), 1U);
|
| - EXPECT_TRUE(
|
| - SBFullHashEqual(full_hashes[0].hash,
|
| - SBFullHashForString("www.fullevil.com/bad2.html")));
|
| + GURL("http://www.fullevil.com/bad2.html"), &prefixes, &cache_hits));
|
| + EXPECT_EQ(prefixes.size(), 1U);
|
| + EXPECT_EQ(prefixes[0], SBPrefixForString("www.fullevil.com/bad2.html"));
|
| + EXPECT_TRUE(cache_hits.empty());
|
| prefixes.clear();
|
| - full_hashes.clear();
|
| + cache_hits.clear();
|
|
|
| // Now test an AddDel for the remaining full add.
|
| EXPECT_TRUE(database_->UpdateStarted(&lists));
|
| @@ -1095,13 +1089,9 @@ TEST_F(SafeBrowsingDatabaseTest, HashCaching) {
|
| database_->UpdateFinished(true);
|
|
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad1.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| + GURL("http://www.fullevil.com/bad1.html"), &prefixes, &cache_hits));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.fullevil.com/bad2.html"),
|
| - &listname, &prefixes, &full_hashes,
|
| - Time::Now()));
|
| + GURL("http://www.fullevil.com/bad2.html"), &prefixes, &cache_hits));
|
| }
|
|
|
| // Test that corrupt databases are appropriately handled, even if the
|
| @@ -1547,25 +1537,18 @@ TEST_F(SafeBrowsingDatabaseTest, SameHostEntriesOkay) {
|
| EXPECT_EQ(std::string(safe_browsing_util::kPhishingList), lists[1].name);
|
| EXPECT_EQ("47", lists[1].adds);
|
|
|
| - const Time now = Time::Now();
|
| std::vector<SBPrefix> prefixes;
|
| - std::vector<SBFullHashResult> full_hashes;
|
| - std::vector<SBPrefix> prefix_hits;
|
| - std::string matching_list;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| std::string listname;
|
|
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware1.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware1.html"), &prefixes, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware2.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware2.html"), &prefixes, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing1.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing1.html"), &prefixes, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing2.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing2.html"), &prefixes, &cache_hits));
|
|
|
| // Test removing a single prefix from the add chunk.
|
| // Remove the prefix that added first.
|
| @@ -1590,17 +1573,13 @@ TEST_F(SafeBrowsingDatabaseTest, SameHostEntriesOkay) {
|
|
|
| // Verify that the database contains urls expected.
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware1.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware1.html"), &prefixes, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware2.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware2.html"), &prefixes, &cache_hits));
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing1.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing1.html"), &prefixes, &cache_hits));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/phishing2.html"),
|
| - &listname, &prefixes, &full_hashes, now));
|
| + GURL("http://www.evil.com/phishing2.html"), &prefixes, &cache_hits));
|
| }
|
|
|
| // Test that an empty update doesn't actually update the database.
|
| @@ -1686,16 +1665,12 @@ TEST_F(SafeBrowsingDatabaseTest, FilterFile) {
|
| }
|
|
|
| // Find the malware url in the database, don't find a good url.
|
| - const Time now = Time::Now();
|
| - std::vector<SBFullHashResult> full_hashes;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| std::vector<SBPrefix> prefix_hits;
|
| - std::string matching_list;
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/goodware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.good.com/goodware.html"), &prefix_hits, &cache_hits));
|
|
|
| base::FilePath filter_file = database_->PrefixSetForFilename(
|
| database_->BrowseDBFilename(database_filename_));
|
| @@ -1706,11 +1681,9 @@ TEST_F(SafeBrowsingDatabaseTest, FilterFile) {
|
| database_.reset(new SafeBrowsingDatabaseNew);
|
| database_->Init(database_filename_);
|
| EXPECT_TRUE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/goodware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.good.com/goodware.html"), &prefix_hits, &cache_hits));
|
|
|
| // If there is no filter file, the database cannot find malware urls.
|
| base::DeleteFile(filter_file, false);
|
| @@ -1718,11 +1691,344 @@ TEST_F(SafeBrowsingDatabaseTest, FilterFile) {
|
| database_.reset(new SafeBrowsingDatabaseNew);
|
| database_->Init(database_filename_);
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.evil.com/malware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.evil.com/malware.html"), &prefix_hits, &cache_hits));
|
| EXPECT_FALSE(database_->ContainsBrowseUrl(
|
| - GURL("http://www.good.com/goodware.html"),
|
| - &matching_list, &prefix_hits, &full_hashes, now));
|
| + GURL("http://www.good.com/goodware.html"), &prefix_hits, &cache_hits));
|
| +}
|
| +
|
| +TEST_F(SafeBrowsingDatabaseTest, TestCachedFullMiss) {
|
| + std::vector<SBListChunkRanges> lists;
|
| + EXPECT_TRUE(database_->UpdateStarted(&lists));
|
| +
|
| + SBChunkList chunks;
|
| + {
|
| + // Insert prefix 1001 into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostPrefixValue(&chunk, 1, SBPrefix(100), SBPrefix(1001));
|
| + chunks.push_back(chunk);
|
| + }
|
| + {
|
| + // Insert prefix 1002 into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostPrefixValue(&chunk, 2, SBPrefix(101), SBPrefix(1002));
|
| + chunks.push_back(chunk);
|
| + }
|
| +
|
| + database_->InsertChunks(safe_browsing_util::kMalwareList, chunks);
|
| + database_->UpdateFinished(true);
|
| +
|
| + {
|
| + // Cache a full miss result for 1001.
|
| + std::vector<SBPrefix> prefixes;
|
| + prefixes.push_back(SBPrefix(1001));
|
| + std::vector<SBFullHashResult> cache_results;
|
| + database_->CacheHashResults(
|
| + prefixes, cache_results, base::TimeDelta::FromMinutes(60));
|
| + }
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 01). Should return false, since
|
| + // we have a cached miss for that prefix.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_FALSE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1002,01) to search. Should return a prefix hit for 1002 only.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1002, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1002U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + }
|
| +}
|
| +
|
| +TEST_F(SafeBrowsingDatabaseTest, TestCachedPrefixHitFullMiss) {
|
| + std::vector<SBListChunkRanges> lists;
|
| + EXPECT_TRUE(database_->UpdateStarted(&lists));
|
| +
|
| + SBChunkList chunks;
|
| + {
|
| + // Insert prefix 1001 into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostPrefixValue(&chunk, 1, SBPrefix(100), SBPrefix(1001));
|
| + chunks.push_back(chunk);
|
| + }
|
| + {
|
| + // Insert prefix 1002 into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostPrefixValue(&chunk, 2, SBPrefix(101), SBPrefix(1002));
|
| + chunks.push_back(chunk);
|
| + }
|
| +
|
| + database_->InsertChunks(safe_browsing_util::kMalwareList, chunks);
|
| + database_->UpdateFinished(true);
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 01). Should return a prefix
|
| + // hit.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1002,01) to search. Should return a prefix hit for both 1001 and
|
| + // 1002.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1002, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(2U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_EQ(1002U, prefix_hits[1]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1003,01) to search. Should still return a prefix hit for both 1001
|
| + // and 1002.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1003, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(2U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_EQ(1002U, prefix_hits[1]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + }
|
| +
|
| + {
|
| + // Cache a fullhash result for (1001,01) and (1001,03).
|
| + std::vector<SBPrefix> prefixes;
|
| + prefixes.push_back(SBPrefix(1001));
|
| + std::vector<SBFullHashResult> cache_results;
|
| +
|
| + SBFullHashResult full_hash_result;
|
| + full_hash_result.hash = SBFullHashForPrefixAndSuffix(1001, "\x01");
|
| + full_hash_result.list_name = safe_browsing_util::kMalwareList;
|
| + cache_results.push_back(full_hash_result);
|
| +
|
| + full_hash_result.hash = SBFullHashForPrefixAndSuffix(1001, "\x03");
|
| + cache_results.push_back(full_hash_result);
|
| +
|
| + database_->CacheHashResults(
|
| + prefixes, cache_results, base::TimeDelta::FromMinutes(60));
|
| + }
|
| +
|
| + {
|
| + // Check again if DB contains (prefix 1001, suffix 01). Should return a
|
| + // cache hit now.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + ASSERT_EQ(1U, cache_hits.size());
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x01"),
|
| + cache_hits[0].hash));
|
| +
|
| + // Add (1002,01) to search. Should return a cache hit for 1001 and prefix
|
| + // hit for 1002.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1002, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1002U, prefix_hits[0]);
|
| + ASSERT_EQ(1U, cache_hits.size());
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x01"),
|
| + cache_hits[0].hash));
|
| +
|
| + // Add (1001,03) to search. Should return 2 cache hits for 1001 and a prefix
|
| + // hit for 1002.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x03"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1002U, prefix_hits[0]);
|
| + ASSERT_EQ(2U, cache_hits.size());
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x01"),
|
| + cache_hits[0].hash));
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x03"),
|
| + cache_hits[1].hash));
|
| + }
|
| +
|
| + {
|
| + // Check if DB contains only (prefix 1001, suffix 03). Should return a cache
|
| + // hit.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x03"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + ASSERT_EQ(1U, cache_hits.size());
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x03"),
|
| + cache_hits[0].hash));
|
| + }
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 02). Should return false, since
|
| + // we have a cached fullhash for that prefix but which does not match the
|
| + // fullhash.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x02"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_FALSE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1002,01) to search. Should return a prefix hit for 1002.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1002, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1002U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + }
|
| +}
|
| +
|
| +TEST_F(SafeBrowsingDatabaseTest, TestBrowseFullHashMatching) {
|
| + std::vector<SBListChunkRanges> lists;
|
| + EXPECT_TRUE(database_->UpdateStarted(&lists));
|
| +
|
| + SBChunkList chunks;
|
| + {
|
| + // Insert fullhash (1001,1) into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostFullHashValue(
|
| + &chunk, 1, SBPrefix(100), SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + chunks.push_back(chunk);
|
| + }
|
| + {
|
| + // Insert fullhash (1001,2) into database.
|
| + SBChunk chunk;
|
| + InsertAddChunkHostFullHashValue(
|
| + &chunk, 2, SBPrefix(100), SBFullHashForPrefixAndSuffix(1001, "\x02"));
|
| + chunks.push_back(chunk);
|
| + }
|
| +
|
| + database_->InsertChunks(safe_browsing_util::kMalwareList, chunks);
|
| + database_->UpdateFinished(true);
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 03). Should return false,
|
| + // since the DB contains a matching prefix but the full hashes do not match.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x03"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_FALSE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1001,1). Should now return a prefix hit.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1001,2). Should still return a single prefix hit.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x02"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + }
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 02) alone. Should return a
|
| + // prefix hit.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x02"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + ASSERT_EQ(1U, prefix_hits.size());
|
| + EXPECT_EQ(1001U, prefix_hits[0]);
|
| + EXPECT_TRUE(cache_hits.empty());
|
| + }
|
| +
|
| + {
|
| + // Cache a fullhash result for (prefix 1001, suffix 02).
|
| + std::vector<SBPrefix> prefixes;
|
| + prefixes.push_back(SBPrefix(1001));
|
| + std::vector<SBFullHashResult> cache_results;
|
| +
|
| + SBFullHashResult full_hash_result;
|
| + full_hash_result.hash = SBFullHashForPrefixAndSuffix(1001, "\x02");
|
| + full_hash_result.list_name = safe_browsing_util::kMalwareList;
|
| +
|
| + cache_results.push_back(full_hash_result);
|
| +
|
| + database_->CacheHashResults(
|
| + prefixes, cache_results, base::TimeDelta::FromMinutes(60));
|
| + }
|
| +
|
| + {
|
| + // Check if DB contains (prefix 1001, suffix 03). Should return false,
|
| + // since the DB containts a cached hit with matching prefix but not
|
| + // matching the fullhash.
|
| + std::vector<SBFullHash> full_hashes;
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x03"));
|
| + std::vector<SBPrefix> prefix_hits;
|
| + std::vector<SBFullHashResult> cache_hits;
|
| + EXPECT_FALSE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1001,1). Should still return false.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x01"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_FALSE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + EXPECT_TRUE(cache_hits.empty());
|
| +
|
| + // Add (1001,2). Should now return a cache hit.
|
| + full_hashes.push_back(SBFullHashForPrefixAndSuffix(1001, "\x02"));
|
| + prefix_hits.clear();
|
| + cache_hits.clear();
|
| + EXPECT_TRUE(
|
| + ContainsBrowseUrlHashes(&full_hashes, &prefix_hits, &cache_hits));
|
| + EXPECT_TRUE(prefix_hits.empty());
|
| + ASSERT_EQ(1U, cache_hits.size());
|
| + EXPECT_TRUE(SBFullHashEqual(SBFullHashForPrefixAndSuffix(1001, "\x02"),
|
| + cache_hits[0].hash));
|
| + }
|
| }
|
|
|
| TEST_F(SafeBrowsingDatabaseTest, MalwareIpBlacklist) {
|
|
|