| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
| ===================================================================
|
| --- chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (revision 10828)
|
| +++ chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (working copy)
|
| @@ -103,11 +103,14 @@
|
| const std::wstring& description1,
|
| const std::wstring& description2,
|
| const std::wstring& description3) {
|
| - strings->SetString(L"title", title);
|
| - strings->SetString(L"headLine", headline);
|
| - strings->SetString(L"description1", description1);
|
| - strings->SetString(L"description2", description2);
|
| - strings->SetString(L"description3", description3);
|
| + strings->SetString(ASCIIToUTF16("title"), WideToUTF16Hack(title));
|
| + strings->SetString(ASCIIToUTF16("headLine"), WideToUTF16Hack(headline));
|
| + strings->SetString(ASCIIToUTF16("description1"),
|
| + WideToUTF16Hack(description1));
|
| + strings->SetString(ASCIIToUTF16("description2"),
|
| + WideToUTF16Hack(description2));
|
| + strings->SetString(ASCIIToUTF16("description3"),
|
| + WideToUTF16Hack(description3));
|
| }
|
|
|
| void SafeBrowsingBlockingPage::PopulateMultipleThreatStringDictionary(
|
| @@ -115,14 +118,17 @@
|
| bool malware = false;
|
| bool phishing = false;
|
|
|
| - std::wstring phishing_label =
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_LABEL);
|
| - std::wstring phishing_link =
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR);
|
| - std::wstring malware_label =
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_LABEL);
|
| - std::wstring malware_link =
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE);
|
| + string16 phishing_label =
|
| + WideToUTF16Hack(l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_LABEL));
|
| + string16 phishing_link =
|
| + WideToUTF16Hack(
|
| + l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR));
|
| + string16 malware_label =
|
| + WideToUTF16Hack(
|
| + l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_LABEL));
|
| + string16 malware_link =
|
| + WideToUTF16Hack(
|
| + l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE));
|
|
|
| ListValue* error_strings = new ListValue;
|
| for (UnsafeResourceList::const_iterator iter = unsafe_resources_.begin();
|
| @@ -131,20 +137,26 @@
|
| DictionaryValue* current_error_strings = new DictionaryValue;
|
| if (resource.threat_type == SafeBrowsingService::URL_MALWARE) {
|
| malware = true;
|
| - current_error_strings->SetString(L"type", L"malware");
|
| - current_error_strings->SetString(L"typeLabel", malware_label);
|
| - current_error_strings->SetString(L"errorLink", malware_link);
|
| + current_error_strings->SetString(ASCIIToUTF16("type"),
|
| + ASCIIToUTF16("malware"));
|
| + current_error_strings->SetString(ASCIIToUTF16("typeLabel"),
|
| + malware_label);
|
| + current_error_strings->SetString(ASCIIToUTF16("errorLink"), malware_link);
|
| } else {
|
| DCHECK(resource.threat_type == SafeBrowsingService::URL_PHISHING);
|
| phishing = true;
|
| - current_error_strings->SetString(L"type", L"phishing");
|
| - current_error_strings->SetString(L"typeLabel", phishing_label);
|
| - current_error_strings->SetString(L"errorLink", phishing_link);
|
| + current_error_strings->SetString(ASCIIToUTF16("type"),
|
| + ASCIIToUTF16("phishing"));
|
| + current_error_strings->SetString(ASCIIToUTF16("typeLabel"),
|
| + phishing_label);
|
| + current_error_strings->SetString(ASCIIToUTF16("errorLink"),
|
| + phishing_link);
|
| }
|
| - current_error_strings->SetString(L"url", UTF8ToWide(resource.url.spec()));
|
| + current_error_strings->SetString(ASCIIToUTF16("url"),
|
| + UTF8ToUTF16(resource.url.spec()));
|
| error_strings->Append(current_error_strings);
|
| }
|
| - strings->Set(L"errors", error_strings);
|
| + strings->Set(ASCIIToUTF16("errors"), error_strings);
|
| DCHECK(phishing || malware);
|
|
|
| if (malware && phishing) {
|
| @@ -178,15 +190,18 @@
|
| L"", L"");
|
| }
|
|
|
| - strings->SetString(L"confirm_text",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE));
|
| - strings->SetString(L"continue_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON));
|
| - strings->SetString(L"back_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON));
|
| - strings->SetString(L"textdirection",
|
| + strings->SetString(ASCIIToUTF16("confirm_text"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)));
|
| + strings->SetString(ASCIIToUTF16("continue_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("back_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("textdirection"),
|
| (l10n_util::GetTextDirection() == l10n_util::RIGHT_TO_LEFT) ?
|
| - L"rtl" : L"ltr");
|
| + ASCIIToUTF16("rtl") : ASCIIToUTF16("ltr"));
|
| }
|
|
|
| void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary(
|
| @@ -194,7 +209,7 @@
|
| std::wstring link = StringPrintf(kSbDiagnosticHtml,
|
| l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE).c_str());
|
|
|
| - strings->SetString(L"badURL", UTF8ToWide(url().host()));
|
| + strings->SetString(ASCIIToUTF16("badURL"), UTF8ToUTF16(url().host()));
|
| // Check to see if we're blocking the main page, or a sub-resource on the
|
| // main page.
|
| std::wstring description1, description2;
|
| @@ -220,15 +235,18 @@
|
| description1, description2,
|
| l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3));
|
|
|
| - strings->SetString(L"confirm_text",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE));
|
| - strings->SetString(L"continue_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON));
|
| - strings->SetString(L"back_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON));
|
| - strings->SetString(L"textdirection",
|
| + strings->SetString(ASCIIToUTF16("confirm_text"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)));
|
| + strings->SetString(ASCIIToUTF16("continue_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("back_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("textdirection"),
|
| (l10n_util::GetTextDirection() == l10n_util::RIGHT_TO_LEFT) ?
|
| - L"rtl" : L"ltr");
|
| + ASCIIToUTF16("rtl") : ASCIIToUTF16("ltr"));
|
| }
|
|
|
| void SafeBrowsingBlockingPage::PopulatePhishingStringDictionary(
|
| @@ -243,15 +261,18 @@
|
| UTF8ToWide(url().host())),
|
| L"");
|
|
|
| - strings->SetString(L"continue_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_PROCEED_BUTTON));
|
| - strings->SetString(L"back_button",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_BACK_BUTTON));
|
| - strings->SetString(L"report_error",
|
| - l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR));
|
| - strings->SetString(L"textdirection",
|
| + strings->SetString(ASCIIToUTF16("continue_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_PHISHING_PROCEED_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("back_button"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_PHISHING_BACK_BUTTON)));
|
| + strings->SetString(ASCIIToUTF16("report_error"),
|
| + WideToUTF16Hack(l10n_util::GetString(
|
| + IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR)));
|
| + strings->SetString(ASCIIToUTF16("textdirection"),
|
| (l10n_util::GetTextDirection() == l10n_util::RIGHT_TO_LEFT) ?
|
| - L"rtl" : L"ltr");
|
| + ASCIIToUTF16("rtl") : ASCIIToUTF16("ltr"));
|
| }
|
|
|
| void SafeBrowsingBlockingPage::CommandReceived(const std::string& cmd) {
|
| @@ -435,4 +456,3 @@
|
| return unsafe_resources.size() == 1 &&
|
| unsafe_resources[0].resource_type == ResourceType::MAIN_FRAME;
|
| }
|
| -
|
|
|