Index: chrome/browser/ssl/ssl_browser_tests.cc |
=================================================================== |
--- chrome/browser/ssl/ssl_browser_tests.cc (revision 174946) |
+++ chrome/browser/ssl/ssl_browser_tests.cc (working copy) |
@@ -181,9 +181,8 @@ |
while (base::Time::Now() < timeToQuit) { |
bool workerFinished = false; |
ASSERT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(IsWorkerFinished());", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(IsWorkerFinished());", |
&workerFinished)); |
if (workerFinished) |
@@ -199,9 +198,8 @@ |
bool actuallyLoadedContent = false; |
ASSERT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(IsContentLoaded());", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(IsContentLoaded());", |
&actuallyLoadedContent)); |
EXPECT_EQ(expectLoaded, actuallyLoadedContent); |
} |
@@ -863,10 +861,8 @@ |
int img_width; |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractInt( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(ImageWidth());", |
- &img_width)); |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(ImageWidth());", &img_width)); |
// In order to check that the image was not loaded, we check its width. |
// The actual image (Google logo) is 114 pixels wide, we assume the broken |
// image is less than 100. |
@@ -874,10 +870,8 @@ |
bool js_result = false; |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(IsFooSet());", |
- &js_result)); |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(IsFooSet());", &js_result)); |
EXPECT_FALSE(js_result); |
} |
@@ -901,9 +895,7 @@ |
// Load the insecure image. |
bool js_result = false; |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "loadBadImage();", |
+ tab->GetRenderViewHost(), std::wstring(), L"loadBadImage();", |
&js_result)); |
EXPECT_TRUE(js_result); |
@@ -1305,9 +1297,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1322,9 +1313,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('badHTTPSLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('badHTTPSLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1335,13 +1325,11 @@ |
// And the frame should be blocked. |
bool is_content_evil = true; |
- std::string content_frame_xpath("html/frameset/frame[2]"); |
- std::string is_evil_js("window.domAutomationController.send(" |
- "document.getElementById('evilDiv') != null);"); |
+ std::wstring content_frame_xpath(L"html/frameset/frame[2]"); |
+ std::wstring is_evil_js(L"window.domAutomationController.send(" |
+ L"document.getElementById('evilDiv') != null);"); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- content_frame_xpath, |
- is_evil_js, |
+ tab->GetRenderViewHost(), content_frame_xpath, is_evil_js, |
&is_content_evil)); |
EXPECT_FALSE(is_content_evil); |
@@ -1361,9 +1349,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('HTTPLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('HTTPLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1409,9 +1396,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1447,9 +1433,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1465,9 +1450,8 @@ |
content::NOTIFICATION_LOAD_STOP, |
content::Source<NavigationController>(&tab->GetController())); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- "", |
- "window.domAutomationController.send(clickLink('badHTTPSLink'));", |
+ tab->GetRenderViewHost(), std::wstring(), |
+ L"window.domAutomationController.send(clickLink('badHTTPSLink'));", |
&success)); |
ASSERT_TRUE(success); |
observer.Wait(); |
@@ -1478,13 +1462,11 @@ |
// And the frame should have been blocked (see bug #2316). |
bool is_content_evil = true; |
- std::string content_frame_xpath("html/frameset/frame[2]"); |
- std::string is_evil_js("window.domAutomationController.send(" |
- "document.getElementById('evilDiv') != null);"); |
+ std::wstring content_frame_xpath(L"html/frameset/frame[2]"); |
+ std::wstring is_evil_js(L"window.domAutomationController.send(" |
+ L"document.getElementById('evilDiv') != null);"); |
EXPECT_TRUE(content::ExecuteJavaScriptAndExtractBool( |
- tab->GetRenderViewHost(), |
- content_frame_xpath, |
- is_evil_js, |
+ tab->GetRenderViewHost(), content_frame_xpath, is_evil_js, |
&is_content_evil)); |
EXPECT_FALSE(is_content_evil); |
} |