OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // This test uses the safebrowsing test server published at | 5 // This test uses the safebrowsing test server published at |
6 // http://code.google.com/p/google-safe-browsing/ to test the safebrowsing | 6 // http://code.google.com/p/google-safe-browsing/ to test the safebrowsing |
7 // protocol implemetation. Details of the safebrowsing testing flow is | 7 // protocol implemetation. Details of the safebrowsing testing flow is |
8 // documented at | 8 // documented at |
9 // http://code.google.com/p/google-safe-browsing/wiki/ProtocolTesting | 9 // http://code.google.com/p/google-safe-browsing/wiki/ProtocolTesting |
10 // | 10 // |
(...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
84 if (urls[i].empty()) | 84 if (urls[i].empty()) |
85 continue; | 85 continue; |
86 PhishingUrl phishing_url; | 86 PhishingUrl phishing_url; |
87 std::vector<std::string> record_parts; | 87 std::vector<std::string> record_parts; |
88 base::SplitString(urls[i], '\t', &record_parts); | 88 base::SplitString(urls[i], '\t', &record_parts); |
89 if (record_parts.size() != 3) { | 89 if (record_parts.size() != 3) { |
90 LOG(ERROR) << "Unexpected URL format in phishing URL list: " | 90 LOG(ERROR) << "Unexpected URL format in phishing URL list: " |
91 << urls[i]; | 91 << urls[i]; |
92 return false; | 92 return false; |
93 } | 93 } |
94 phishing_url.url = std::string(chrome::kHttpScheme) + | 94 phishing_url.url = std::string(content::kHttpScheme) + |
95 "://" + record_parts[0]; | 95 "://" + record_parts[0]; |
96 phishing_url.list_name = record_parts[1]; | 96 phishing_url.list_name = record_parts[1]; |
97 if (record_parts[2] == "yes") { | 97 if (record_parts[2] == "yes") { |
98 phishing_url.is_phishing = true; | 98 phishing_url.is_phishing = true; |
99 } else if (record_parts[2] == "no") { | 99 } else if (record_parts[2] == "no") { |
100 phishing_url.is_phishing = false; | 100 phishing_url.is_phishing = false; |
101 } else { | 101 } else { |
102 LOG(ERROR) << "Unrecognized expectation in " << urls[i] | 102 LOG(ERROR) << "Unrecognized expectation in " << urls[i] |
103 << ": " << record_parts[2]; | 103 << ": " << record_parts[2]; |
104 return false; | 104 return false; |
(...skipping 418 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
523 safe_browsing_helper->FetchDBToVerify(test_server(), step)); | 523 safe_browsing_helper->FetchDBToVerify(test_server(), step)); |
524 EXPECT_GT(safe_browsing_helper->response_data().size(), 0U); | 524 EXPECT_GT(safe_browsing_helper->response_data().size(), 0U); |
525 last_step = step; | 525 last_step = step; |
526 } | 526 } |
527 | 527 |
528 // Verifies with server if test is done and waits till server responses. | 528 // Verifies with server if test is done and waits till server responses. |
529 EXPECT_EQ(net::URLRequestStatus::SUCCESS, | 529 EXPECT_EQ(net::URLRequestStatus::SUCCESS, |
530 safe_browsing_helper->VerifyTestComplete(test_server(), last_step)); | 530 safe_browsing_helper->VerifyTestComplete(test_server(), last_step)); |
531 EXPECT_EQ("yes", safe_browsing_helper->response_data()); | 531 EXPECT_EQ("yes", safe_browsing_helper->response_data()); |
532 } | 532 } |
OLD | NEW |