OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/safe_browsing/download_protection_service.h" | 5 #include "chrome/browser/safe_browsing/download_protection_service.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/compiler_specific.h" | 8 #include "base/compiler_specific.h" |
9 #include "base/format_macros.h" | 9 #include "base/format_macros.h" |
10 #include "base/memory/scoped_ptr.h" | 10 #include "base/memory/scoped_ptr.h" |
(...skipping 13 matching lines...) Expand all Loading... |
24 #include "chrome/browser/history/history_service_factory.h" | 24 #include "chrome/browser/history/history_service_factory.h" |
25 #include "chrome/browser/profiles/profile.h" | 25 #include "chrome/browser/profiles/profile.h" |
26 #include "chrome/browser/safe_browsing/download_feedback_service.h" | 26 #include "chrome/browser/safe_browsing/download_feedback_service.h" |
27 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | 27 #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
28 #include "chrome/browser/safe_browsing/sandboxed_zip_analyzer.h" | 28 #include "chrome/browser/safe_browsing/sandboxed_zip_analyzer.h" |
29 #include "chrome/browser/ui/browser.h" | 29 #include "chrome/browser/ui/browser.h" |
30 #include "chrome/browser/ui/browser_list.h" | 30 #include "chrome/browser/ui/browser_list.h" |
31 #include "chrome/common/safe_browsing/binary_feature_extractor.h" | 31 #include "chrome/common/safe_browsing/binary_feature_extractor.h" |
32 #include "chrome/common/safe_browsing/csd.pb.h" | 32 #include "chrome/common/safe_browsing/csd.pb.h" |
33 #include "chrome/common/safe_browsing/download_protection_util.h" | 33 #include "chrome/common/safe_browsing/download_protection_util.h" |
34 #include "chrome/common/safe_browsing/zip_analyzer.h" | 34 #include "chrome/common/safe_browsing/zip_analyzer_results.h" |
35 #include "chrome/common/url_constants.h" | 35 #include "chrome/common/url_constants.h" |
36 #include "components/google/core/browser/google_util.h" | 36 #include "components/google/core/browser/google_util.h" |
37 #include "components/history/core/browser/history_service.h" | 37 #include "components/history/core/browser/history_service.h" |
38 #include "content/public/browser/browser_thread.h" | 38 #include "content/public/browser/browser_thread.h" |
39 #include "content/public/browser/download_item.h" | 39 #include "content/public/browser/download_item.h" |
40 #include "content/public/browser/page_navigator.h" | 40 #include "content/public/browser/page_navigator.h" |
41 #include "crypto/sha2.h" | 41 #include "crypto/sha2.h" |
42 #include "google_apis/google_api_keys.h" | 42 #include "google_apis/google_api_keys.h" |
43 #include "net/base/escape.h" | 43 #include "net/base/escape.h" |
44 #include "net/base/load_flags.h" | 44 #include "net/base/load_flags.h" |
(...skipping 535 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
580 weakptr_factory_.GetWeakPtr())); | 580 weakptr_factory_.GetWeakPtr())); |
581 analyzer_->Start(); | 581 analyzer_->Start(); |
582 } | 582 } |
583 | 583 |
584 void OnZipAnalysisFinished(const zip_analyzer::Results& results) { | 584 void OnZipAnalysisFinished(const zip_analyzer::Results& results) { |
585 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 585 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
586 if (!service_) | 586 if (!service_) |
587 return; | 587 return; |
588 if (results.success) { | 588 if (results.success) { |
589 zipped_executable_ = results.has_executable; | 589 zipped_executable_ = results.has_executable; |
| 590 archived_binary_.CopyFrom(results.archived_binary); |
590 DVLOG(1) << "Zip analysis finished for " << item_->GetFullPath().value() | 591 DVLOG(1) << "Zip analysis finished for " << item_->GetFullPath().value() |
591 << ", has_executable=" << results.has_executable | 592 << ", has_executable=" << results.has_executable |
592 << " has_archive=" << results.has_archive; | 593 << " has_archive=" << results.has_archive; |
593 } else { | 594 } else { |
594 DVLOG(1) << "Zip analysis failed for " << item_->GetFullPath().value(); | 595 DVLOG(1) << "Zip analysis failed for " << item_->GetFullPath().value(); |
595 } | 596 } |
596 UMA_HISTOGRAM_BOOLEAN("SBClientDownload.ZipFileHasExecutable", | 597 UMA_HISTOGRAM_BOOLEAN("SBClientDownload.ZipFileHasExecutable", |
597 zipped_executable_); | 598 zipped_executable_); |
598 UMA_HISTOGRAM_BOOLEAN("SBClientDownload.ZipFileHasArchiveButNoExecutable", | 599 UMA_HISTOGRAM_BOOLEAN("SBClientDownload.ZipFileHasArchiveButNoExecutable", |
599 results.has_archive && !zipped_executable_); | 600 results.has_archive && !zipped_executable_); |
(...skipping 166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
766 request.set_file_basename( | 767 request.set_file_basename( |
767 item_->GetTargetFilePath().BaseName().AsUTF8Unsafe()); | 768 item_->GetTargetFilePath().BaseName().AsUTF8Unsafe()); |
768 request.set_download_type(type_); | 769 request.set_download_type(type_); |
769 request.mutable_signature()->CopyFrom(signature_info_); | 770 request.mutable_signature()->CopyFrom(signature_info_); |
770 if (image_headers_) | 771 if (image_headers_) |
771 request.set_allocated_image_headers(image_headers_.release()); | 772 request.set_allocated_image_headers(image_headers_.release()); |
772 if (!request.SerializeToString(&client_download_request_data_)) { | 773 if (!request.SerializeToString(&client_download_request_data_)) { |
773 FinishRequest(UNKNOWN, REASON_INVALID_REQUEST_PROTO); | 774 FinishRequest(UNKNOWN, REASON_INVALID_REQUEST_PROTO); |
774 return; | 775 return; |
775 } | 776 } |
776 | 777 if (zipped_executable_) |
| 778 request.mutable_archived_binary()->Swap(&archived_binary_); |
777 service_->client_download_request_callbacks_.Notify(item_, &request); | 779 service_->client_download_request_callbacks_.Notify(item_, &request); |
778 | 780 |
779 DVLOG(2) << "Sending a request for URL: " | 781 DVLOG(2) << "Sending a request for URL: " |
780 << item_->GetUrlChain().back(); | 782 << item_->GetUrlChain().back(); |
781 fetcher_.reset(net::URLFetcher::Create(0 /* ID used for testing */, | 783 fetcher_.reset(net::URLFetcher::Create(0 /* ID used for testing */, |
782 GetDownloadRequestUrl(), | 784 GetDownloadRequestUrl(), |
783 net::URLFetcher::POST, | 785 net::URLFetcher::POST, |
784 this)); | 786 this)); |
785 fetcher_->SetLoadFlags(net::LOAD_DISABLE_CACHE); | 787 fetcher_->SetLoadFlags(net::LOAD_DISABLE_CACHE); |
786 fetcher_->SetAutomaticallyRetryOn5xx(false); // Don't retry on error. | 788 fetcher_->SetAutomaticallyRetryOn5xx(false); // Don't retry on error. |
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
911 GURL referrer_url_; | 913 GURL referrer_url_; |
912 // URL chain of redirects leading to (but not including) |tab_url|. | 914 // URL chain of redirects leading to (but not including) |tab_url|. |
913 std::vector<GURL> tab_redirects_; | 915 std::vector<GURL> tab_redirects_; |
914 // URL and referrer of the window the download was started from. | 916 // URL and referrer of the window the download was started from. |
915 GURL tab_url_; | 917 GURL tab_url_; |
916 GURL tab_referrer_url_; | 918 GURL tab_referrer_url_; |
917 | 919 |
918 bool zipped_executable_; | 920 bool zipped_executable_; |
919 ClientDownloadRequest_SignatureInfo signature_info_; | 921 ClientDownloadRequest_SignatureInfo signature_info_; |
920 scoped_ptr<ClientDownloadRequest_ImageHeaders> image_headers_; | 922 scoped_ptr<ClientDownloadRequest_ImageHeaders> image_headers_; |
| 923 google::protobuf::RepeatedPtrField<ClientDownloadRequest_ArchivedBinary> |
| 924 archived_binary_; |
921 CheckDownloadCallback callback_; | 925 CheckDownloadCallback callback_; |
922 // Will be NULL if the request has been canceled. | 926 // Will be NULL if the request has been canceled. |
923 DownloadProtectionService* service_; | 927 DownloadProtectionService* service_; |
924 scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor_; | 928 scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor_; |
925 scoped_refptr<SafeBrowsingDatabaseManager> database_manager_; | 929 scoped_refptr<SafeBrowsingDatabaseManager> database_manager_; |
926 const bool pingback_enabled_; | 930 const bool pingback_enabled_; |
927 scoped_ptr<net::URLFetcher> fetcher_; | 931 scoped_ptr<net::URLFetcher> fetcher_; |
928 scoped_refptr<SandboxedZipAnalyzer> analyzer_; | 932 scoped_refptr<SandboxedZipAnalyzer> analyzer_; |
929 base::TimeTicks zip_analysis_start_time_; | 933 base::TimeTicks zip_analysis_start_time_; |
930 bool finished_; | 934 bool finished_; |
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1136 GURL DownloadProtectionService::GetDownloadRequestUrl() { | 1140 GURL DownloadProtectionService::GetDownloadRequestUrl() { |
1137 GURL url(kDownloadRequestUrl); | 1141 GURL url(kDownloadRequestUrl); |
1138 std::string api_key = google_apis::GetAPIKey(); | 1142 std::string api_key = google_apis::GetAPIKey(); |
1139 if (!api_key.empty()) | 1143 if (!api_key.empty()) |
1140 url = url.Resolve("?key=" + net::EscapeQueryParamValue(api_key, true)); | 1144 url = url.Resolve("?key=" + net::EscapeQueryParamValue(api_key, true)); |
1141 | 1145 |
1142 return url; | 1146 return url; |
1143 } | 1147 } |
1144 | 1148 |
1145 } // namespace safe_browsing | 1149 } // namespace safe_browsing |
OLD | NEW |