Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3736)

Unified Diff: chrome/browser/safe_browsing/protocol_parser_unittest.cc

Issue 392373002: [safe browsing] Mobile requests different malware and phishing lists. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Change hard-coded default lists for Android tests. Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/protocol_parser_unittest.cc
diff --git a/chrome/browser/safe_browsing/protocol_parser_unittest.cc b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
index 99709f7d829fa97597153f3849aa75ff1178da29..f67bd3828fa06bb843ddf0c3d1cdf8ed356f879a 100644
--- a/chrome/browser/safe_browsing/protocol_parser_unittest.cc
+++ b/chrome/browser/safe_browsing/protocol_parser_unittest.cc
@@ -4,11 +4,22 @@
#include <string>
+#include "base/strings/stringprintf.h"
#include "base/time/time.h"
#include "chrome/browser/safe_browsing/protocol_parser.h"
#include "chrome/browser/safe_browsing/safe_browsing_util.h"
#include "testing/gtest/include/gtest/gtest.h"
+namespace {
+
+#if defined(OS_ANDROID)
+const char kDefaultPhishList[] = "goog-mobilephish-shavar";
+const char kDefaultMalwareList[] = "goog-mobilemalware-shavar";
+#else
+const char kDefaultPhishList[] = "goog-phish-shavar";
+const char kDefaultMalwareList[] = "goog-malware-shavar";
+#endif
+
// Test parsing one add chunk.
TEST(SafeBrowsingProtocolParsingTest, TestAddChunk) {
const char kRawAddChunk[] = {
@@ -323,12 +334,14 @@ TEST(SafeBrowsingProtocolParsingTest, TestChunkDelete) {
// Test parsing the SafeBrowsing update response.
TEST(SafeBrowsingProtocolParsingTest, TestRedirects) {
- std::string redirects("i:goog-malware-shavar\n"
- "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
- "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
- "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
- "u:s.ytimg.com/safebrowsing/rd/goog-phish-shavar_a_8641-8800:8641-8689,"
- "8691-8731,8733-8786\n");
+ const std::string redirects(base::StringPrintf(
+ "i:%s\n"
+ "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
+ "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
+ "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
+ "u:s.ytimg.com/safebrowsing/rd/goog-phish-shavar_a_8641-8800:8641-8689,"
+ "8691-8731,8733-8786\n",
+ kDefaultMalwareList));
size_t next_query_sec = 0;
bool reset = false;
@@ -372,11 +385,13 @@ TEST(SafeBrowsingProtocolParsingTest, TestNextQueryTime) {
// Test parsing data from a GetHashRequest
TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
- std::string get_hash("45\n"
- "goog-phish-shavar:32:3\n"
- "00112233445566778899aabbccddeeff"
- "00001111222233334444555566667777"
- "ffffeeeeddddccccbbbbaaaa99998888");
+ const std::string get_hash(base::StringPrintf(
+ "45\n"
+ "%s:32:3\n"
+ "00112233445566778899aabbccddeeff"
+ "00001111222233334444555566667777"
+ "ffffeeeeddddccccbbbbaaaa99998888",
+ kDefaultPhishList));
std::vector<SBFullHashResult> full_hashes;
base::TimeDelta cache_lifetime;
EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash.data(), get_hash.length(),
@@ -397,12 +412,15 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
EXPECT_EQ(safe_browsing_util::PHISH, full_hashes[2].list_id);
// Test multiple lists in the GetHash results.
- std::string get_hash2("45\n"
- "goog-phish-shavar:32:1\n"
- "00112233445566778899aabbccddeeff"
- "goog-malware-shavar:32:2\n"
- "cafebeefcafebeefdeaddeaddeaddead"
- "zzzzyyyyxxxxwwwwvvvvuuuuttttssss");
+ const std::string get_hash2(base::StringPrintf(
+ "45\n"
+ "%s:32:1\n"
+ "00112233445566778899aabbccddeeff"
+ "%s:32:2\n"
+ "cafebeefcafebeefdeaddeaddeaddead"
+ "zzzzyyyyxxxxwwwwvvvvuuuuttttssss",
+ kDefaultPhishList,
+ kDefaultMalwareList));
EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash2.data(), get_hash2.length(),
&cache_lifetime, &full_hashes));
@@ -423,13 +441,16 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
// Test metadata parsing.
// TODO(shess): Currently the code doesn't actually put the metadata anywhere,
// this is just testing that metadata doesn't break parsing.
- std::string get_hash3("45\n"
- "goog-malware-shavar:32:2:m\n"
- "zzzzyyyyxxxxwwwwvvvvuuuuttttssss"
- "00112233445566778899aabbccddeeff"
- "2\nab2\nxy"
- "goog-phish-shavar:32:1\n"
- "cafebeefcafebeefdeaddeaddeaddead");
+ const std::string get_hash3(base::StringPrintf(
+ "45\n"
+ "%s:32:2:m\n"
+ "zzzzyyyyxxxxwwwwvvvvuuuuttttssss"
+ "00112233445566778899aabbccddeeff"
+ "2\nab2\nxy"
+ "%s:32:1\n"
+ "cafebeefcafebeefdeaddeaddeaddead",
+ kDefaultMalwareList,
+ kDefaultPhishList));
EXPECT_TRUE(safe_browsing::ParseGetHash(get_hash3.data(), get_hash3.length(),
&cache_lifetime, &full_hashes));
@@ -449,11 +470,13 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHash) {
}
TEST(SafeBrowsingProtocolParsingTest, TestGetHashWithUnknownList) {
- std::string hash_response = "45\n"
- "goog-phish-shavar:32:1\n"
- "12345678901234567890123456789012"
- "googpub-phish-shavar:32:1\n"
- "09876543210987654321098765432109";
+ std::string hash_response(base::StringPrintf(
+ "45\n"
+ "%s:32:1\n"
+ "12345678901234567890123456789012"
+ "googpub-phish-shavar:32:1\n"
+ "09876543210987654321098765432109",
+ kDefaultPhishList));
std::vector<SBFullHashResult> full_hashes;
base::TimeDelta cache_lifetime;
EXPECT_TRUE(safe_browsing::ParseGetHash(hash_response.data(),
@@ -466,8 +489,10 @@ TEST(SafeBrowsingProtocolParsingTest, TestGetHashWithUnknownList) {
&full_hashes[0].hash, sizeof(SBFullHash)), 0);
EXPECT_EQ(safe_browsing_util::PHISH, full_hashes[0].list_id);
- hash_response += "goog-malware-shavar:32:1\n"
- "abcdefghijklmnopqrstuvwxyz123457";
+ hash_response += base::StringPrintf(
+ "%s:32:1\n"
+ "abcdefghijklmnopqrstuvwxyz123457",
+ kDefaultMalwareList);
full_hashes.clear();
EXPECT_TRUE(safe_browsing::ParseGetHash(hash_response.data(),
hash_response.size(),
@@ -665,3 +690,5 @@ TEST(SafeBrowsingProtocolParsingTest, TestZeroSizeSubChunk) {
EXPECT_EQ(0x70707070U, chunks[2]->PrefixAt(0)); // pppp
EXPECT_EQ(11, chunks[2]->AddChunkNumberAt(0));
}
+
+} // namespace
« no previous file with comments | « chrome/browser/safe_browsing/protocol_manager_unittest.cc ('k') | chrome/browser/safe_browsing/safe_browsing_database.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698