| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index bf66efc80b4c9e5e57d80fa922b0c1aff11947fc..4c3b143af2f3ea0e9f90955cf6114e65ecf3136d 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -181,8 +181,9 @@ class SSLUITest : public InProcessBrowserTest {
|
| while (base::Time::Now() < timeToQuit) {
|
| bool workerFinished = false;
|
| ASSERT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(IsWorkerFinished());",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(IsWorkerFinished());",
|
| &workerFinished));
|
|
|
| if (workerFinished)
|
| @@ -198,8 +199,9 @@ class SSLUITest : public InProcessBrowserTest {
|
|
|
| bool actuallyLoadedContent = false;
|
| ASSERT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(IsContentLoaded());",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(IsContentLoaded());",
|
| &actuallyLoadedContent));
|
| EXPECT_EQ(expectLoaded, actuallyLoadedContent);
|
| }
|
| @@ -861,8 +863,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
|
|
|
| int img_width;
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractInt(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(ImageWidth());", &img_width));
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(ImageWidth());",
|
| + &img_width));
|
| // In order to check that the image was not loaded, we check its width.
|
| // The actual image (Google logo) is 114 pixels wide, we assume the broken
|
| // image is less than 100.
|
| @@ -870,8 +874,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
|
|
|
| bool js_result = false;
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(IsFooSet());", &js_result));
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(IsFooSet());",
|
| + &js_result));
|
| EXPECT_FALSE(js_result);
|
| }
|
|
|
| @@ -895,7 +901,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) {
|
| // Load the insecure image.
|
| bool js_result = false;
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(), L"loadBadImage();",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "loadBadImage();",
|
| &js_result));
|
| EXPECT_TRUE(js_result);
|
|
|
| @@ -1297,8 +1305,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1313,8 +1322,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1325,11 +1335,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
|
|
| // And the frame should be blocked.
|
| bool is_content_evil = true;
|
| - std::wstring content_frame_xpath(L"html/frameset/frame[2]");
|
| - std::wstring is_evil_js(L"window.domAutomationController.send("
|
| - L"document.getElementById('evilDiv') != null);");
|
| + std::string content_frame_xpath("html/frameset/frame[2]");
|
| + std::string is_evil_js("window.domAutomationController.send("
|
| + "document.getElementById('evilDiv') != null);");
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), content_frame_xpath, is_evil_js,
|
| + tab->GetRenderViewHost(),
|
| + content_frame_xpath,
|
| + is_evil_js,
|
| &is_content_evil));
|
| EXPECT_FALSE(is_content_evil);
|
|
|
| @@ -1349,8 +1361,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('HTTPLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('HTTPLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1396,8 +1409,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1433,8 +1447,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1450,8 +1465,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) {
|
| content::NOTIFICATION_LOAD_STOP,
|
| content::Source<NavigationController>(&tab->GetController()));
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), std::wstring(),
|
| - L"window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| + tab->GetRenderViewHost(),
|
| + "",
|
| + "window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| &success));
|
| ASSERT_TRUE(success);
|
| observer.Wait();
|
| @@ -1462,11 +1478,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) {
|
|
|
| // And the frame should have been blocked (see bug #2316).
|
| bool is_content_evil = true;
|
| - std::wstring content_frame_xpath(L"html/frameset/frame[2]");
|
| - std::wstring is_evil_js(L"window.domAutomationController.send("
|
| - L"document.getElementById('evilDiv') != null);");
|
| + std::string content_frame_xpath("html/frameset/frame[2]");
|
| + std::string is_evil_js("window.domAutomationController.send("
|
| + "document.getElementById('evilDiv') != null);");
|
| EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool(
|
| - tab->GetRenderViewHost(), content_frame_xpath, is_evil_js,
|
| + tab->GetRenderViewHost(),
|
| + content_frame_xpath,
|
| + is_evil_js,
|
| &is_content_evil));
|
| EXPECT_FALSE(is_content_evil);
|
| }
|
|
|