diff options
author | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-05-26 22:20:27 +0000 |
---|---|---|
committer | bryner@chromium.org <bryner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-05-26 22:20:27 +0000 |
commit | 9bfaa007dfa9e3551bc1a357e4d14a60df4fa34f (patch) | |
tree | 15867101df05e4a60899f70d731f7da470077433 /chrome/browser/safe_browsing/protocol_manager_unittest.cc | |
parent | b3d7b1d8e2d35d13b19ae7294271fe470bbbb730 (diff) | |
download | chromium_src-9bfaa007dfa9e3551bc1a357e4d14a60df4fa34f.zip chromium_src-9bfaa007dfa9e3551bc1a357e4d14a60df4fa34f.tar.gz chromium_src-9bfaa007dfa9e3551bc1a357e4d14a60df4fa34f.tar.bz2 |
Use a different tpl= parameter when reporting an error from client-side phishing detection.
This extends SafeBrowsingService::UrlCheckResult to add a new type for client-side phishing urls.
BUG=83436
TEST=ClientSideDetectionHostTest
Review URL: http://codereview.chromium.org/7076009
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@86915 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/safe_browsing/protocol_manager_unittest.cc')
-rw-r--r-- | chrome/browser/safe_browsing/protocol_manager_unittest.cc | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/chrome/browser/safe_browsing/protocol_manager_unittest.cc b/chrome/browser/safe_browsing/protocol_manager_unittest.cc index 69bff62..c621879 100644 --- a/chrome/browser/safe_browsing/protocol_manager_unittest.cc +++ b/chrome/browser/safe_browsing/protocol_manager_unittest.cc @@ -236,6 +236,15 @@ TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingHitUrl) { pm.SafeBrowsingHitUrl( malicious_url, page_url, referrer_url, false, SafeBrowsingService::BINARY_MALWARE_HASH).spec()); + + EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" + "pver=2.2&additional_query&evts=phishcsdhit&" + "evtd=http%3A%2F%2Fmalicious.url.com%2F&" + "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." + "url.com%2F&evtb=0", + pm.SafeBrowsingHitUrl( + malicious_url, page_url, referrer_url, + false, SafeBrowsingService::CLIENT_SIDE_PHISHING_URL).spec()); } TEST_F(SafeBrowsingProtocolManagerTest, TestMalwareDetailsUrl) { |