Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
index be75c6d609d35c8b87eb32ee2f95b0991090381f..72532af1ec3c0f29bbb04d7d85216efbff86240c 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
@@ -146,11 +146,11 @@ void SafeBrowsingBlockingPage::PopulateStringDictionary( |
const std::wstring& description1, |
const std::wstring& description2, |
const std::wstring& description3) { |
- strings->SetString(L"title", title); |
- strings->SetString(L"headLine", headline); |
- strings->SetString(L"description1", description1); |
- strings->SetString(L"description2", description2); |
- strings->SetString(L"description3", description3); |
+ strings->SetString("title", WideToUTF16Hack(title)); |
+ strings->SetString("headLine", WideToUTF16Hack(headline)); |
+ strings->SetString("description1", WideToUTF16Hack(description1)); |
+ strings->SetString("description2", WideToUTF16Hack(description2)); |
+ strings->SetString("description3", WideToUTF16Hack(description3)); |
} |
void SafeBrowsingBlockingPage::PopulateMultipleThreatStringDictionary( |
@@ -158,14 +158,14 @@ void SafeBrowsingBlockingPage::PopulateMultipleThreatStringDictionary( |
bool malware = false; |
bool phishing = false; |
- std::wstring phishing_label = |
- l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_LABEL); |
- std::wstring phishing_link = |
- l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR); |
- std::wstring malware_label = |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_LABEL); |
- std::wstring malware_link = |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE); |
+ string16 malware_label = |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_LABEL); |
+ string16 malware_link = |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE); |
+ string16 phishing_label = |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_LABEL); |
+ string16 phishing_link = |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR); |
ListValue* error_strings = new ListValue; |
for (UnsafeResourceList::const_iterator iter = unsafe_resources_.begin(); |
@@ -174,20 +174,20 @@ void SafeBrowsingBlockingPage::PopulateMultipleThreatStringDictionary( |
DictionaryValue* current_error_strings = new DictionaryValue; |
if (resource.threat_type == SafeBrowsingService::URL_MALWARE) { |
malware = true; |
- current_error_strings->SetString(L"type", L"malware"); |
- current_error_strings->SetString(L"typeLabel", malware_label); |
- current_error_strings->SetString(L"errorLink", malware_link); |
+ current_error_strings->SetString("type", "malware"); |
+ current_error_strings->SetString("typeLabel", malware_label); |
+ current_error_strings->SetString("errorLink", malware_link); |
} else { |
DCHECK(resource.threat_type == SafeBrowsingService::URL_PHISHING); |
phishing = true; |
- current_error_strings->SetString(L"type", L"phishing"); |
- current_error_strings->SetString(L"typeLabel", phishing_label); |
- current_error_strings->SetString(L"errorLink", phishing_link); |
+ current_error_strings->SetString("type", "phishing"); |
+ current_error_strings->SetString("typeLabel", phishing_label); |
+ current_error_strings->SetString("errorLink", phishing_link); |
} |
- current_error_strings->SetString(L"url", UTF8ToWide(resource.url.spec())); |
+ current_error_strings->SetString("url", resource.url.spec()); |
error_strings->Append(current_error_strings); |
} |
- strings->Set(L"errors", error_strings); |
+ strings->Set("errors", error_strings); |
DCHECK(phishing || malware); |
if (malware && phishing) { |
@@ -221,13 +221,13 @@ void SafeBrowsingBlockingPage::PopulateMultipleThreatStringDictionary( |
L"", L""); |
} |
- strings->SetString(L"confirm_text", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
- strings->SetString(L"continue_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
- strings->SetString(L"back_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
- strings->SetString(L"textdirection", base::i18n::IsRTL() ? L"rtl" : L"ltr"); |
+ strings->SetString("confirm_text", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
+ strings->SetString("continue_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
+ strings->SetString("back_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
+ strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr"); |
} |
void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary( |
@@ -235,7 +235,7 @@ void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary( |
std::wstring link = StringPrintf(kSbDiagnosticHtml, |
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE).c_str()); |
- strings->SetString(L"badURL", UTF8ToWide(url().host())); |
+ strings->SetString("badURL", url().host()); |
// Check to see if we're blocking the main page, or a sub-resource on the |
// main page. |
std::wstring description1, description2; |
@@ -261,13 +261,13 @@ void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary( |
description1, description2, |
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3)); |
- strings->SetString(L"confirm_text", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
- strings->SetString(L"continue_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
- strings->SetString(L"back_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
- strings->SetString(L"textdirection", base::i18n::IsRTL() ? L"rtl" : L"ltr"); |
+ strings->SetString("confirm_text", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
+ strings->SetString("continue_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
+ strings->SetString("back_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
+ strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr"); |
} |
void SafeBrowsingBlockingPage::PopulatePhishingStringDictionary( |
@@ -282,13 +282,13 @@ void SafeBrowsingBlockingPage::PopulatePhishingStringDictionary( |
UTF8ToWide(url().host())), |
L""); |
- strings->SetString(L"continue_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_PROCEED_BUTTON)); |
- strings->SetString(L"back_button", |
- l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_BACK_BUTTON)); |
- strings->SetString(L"report_error", |
- l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR)); |
- strings->SetString(L"textdirection", base::i18n::IsRTL() ? L"rtl" : L"ltr"); |
+ strings->SetString("continue_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_PROCEED_BUTTON)); |
+ strings->SetString("back_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_BACK_BUTTON)); |
+ strings->SetString("report_error", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_REPORT_ERROR)); |
+ strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr"); |
} |
void SafeBrowsingBlockingPage::CommandReceived(const std::string& cmd) { |
@@ -443,16 +443,19 @@ void SafeBrowsingBlockingPage::RecordUserAction(BlockingPageEvent event) { |
DictionaryValue strings; |
PopulateMultipleThreatStringDictionary(&strings); |
- std::wstring title; |
- DCHECK(strings.GetString(L"title", &title)); |
+ string16 title; |
+ DCHECK(strings.GetString("title", &title)); |
std::string action = "SBInterstitial"; |
- if (title == l10n_util::GetString(IDS_SAFE_BROWSING_MULTI_THREAT_TITLE)) { |
+ if (title == |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MULTI_THREAT_TITLE)) { |
action.append("Multiple"); |
- } else if (title == l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_TITLE)) { |
+ } else if (title == |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_TITLE)) { |
action.append("Malware"); |
} else { |
- DCHECK_EQ(title, l10n_util::GetString(IDS_SAFE_BROWSING_PHISHING_TITLE)); |
+ DCHECK_EQ(title, |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_PHISHING_TITLE)); |
action.append("Phishing"); |
} |