| Index: chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| diff --git a/chrome/browser/ui/webui/options/certificate_manager_handler.cc b/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| index 7aedca7792cdca948063a4511067e2fcf4b223b5..3cdde307d124b9460ded0b9a6f517816b73b694f 100644
|
| --- a/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| +++ b/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| @@ -602,7 +602,8 @@ void CertificateManagerHandler::View(const base::ListValue* args) {
|
| void CertificateManagerHandler::GetCATrust(const base::ListValue* args) {
|
| net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args);
|
| if (!cert) {
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.dismiss");
|
| return;
|
| }
|
|
|
| @@ -614,9 +615,9 @@ void CertificateManagerHandler::GetCATrust(const base::ListValue* args) {
|
| static_cast<bool>(trust_bits & net::NSSCertDatabase::TRUSTED_EMAIL));
|
| base::FundamentalValue obj_sign_value(
|
| static_cast<bool>(trust_bits & net::NSSCertDatabase::TRUSTED_OBJ_SIGN));
|
| - web_ui()->CallJavascriptFunction(
|
| - "CertificateEditCaTrustOverlay.populateTrust",
|
| - ssl_value, email_value, obj_sign_value);
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.populateTrust", ssl_value, email_value,
|
| + obj_sign_value);
|
| }
|
|
|
| void CertificateManagerHandler::EditCATrust(const base::ListValue* args) {
|
| @@ -630,7 +631,8 @@ void CertificateManagerHandler::EditCATrust(const base::ListValue* args) {
|
| fail |= !CallbackArgsToBool(args, 3, &trust_obj_sign);
|
| if (fail) {
|
| LOG(ERROR) << "EditCATrust args fail";
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.dismiss");
|
| return;
|
| }
|
|
|
| @@ -640,7 +642,8 @@ void CertificateManagerHandler::EditCATrust(const base::ListValue* args) {
|
| trust_ssl * net::NSSCertDatabase::TRUSTED_SSL +
|
| trust_email * net::NSSCertDatabase::TRUSTED_EMAIL +
|
| trust_obj_sign * net::NSSCertDatabase::TRUSTED_OBJ_SIGN);
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.dismiss");
|
| if (!result) {
|
| // TODO(mattm): better error messages?
|
| ShowError(
|
| @@ -682,14 +685,14 @@ void CertificateManagerHandler::ExportAllPersonal(const base::ListValue* args) {
|
| void CertificateManagerHandler::ExportPersonalFileSelected(
|
| const base::FilePath& path) {
|
| file_path_ = path;
|
| - web_ui()->CallJavascriptFunction(
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| "CertificateManager.exportPersonalAskPassword");
|
| }
|
|
|
| void CertificateManagerHandler::ExportPersonalPasswordSelected(
|
| const base::ListValue* args) {
|
| if (!args->GetString(0, &password_)) {
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ImportExportCleanup();
|
| return;
|
| }
|
| @@ -716,7 +719,7 @@ void CertificateManagerHandler::ExportPersonalSlotsUnlocked() {
|
| password_,
|
| &output);
|
| if (!num_exported) {
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ShowError(
|
| l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE),
|
| l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
|
| @@ -733,7 +736,7 @@ void CertificateManagerHandler::ExportPersonalSlotsUnlocked() {
|
|
|
| void CertificateManagerHandler::ExportPersonalFileWritten(
|
| const int* write_errno, const int* bytes_written) {
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ImportExportCleanup();
|
| if (*write_errno) {
|
| ShowError(
|
| @@ -750,7 +753,7 @@ void CertificateManagerHandler::StartImportPersonal(
|
| if (!args->GetBoolean(0, &use_hardware_backed_)) {
|
| // Unable to retrieve the hardware backed attribute from the args,
|
| // so bail.
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ImportExportCleanup();
|
| return;
|
| }
|
| @@ -782,7 +785,7 @@ void CertificateManagerHandler::ImportPersonalFileRead(
|
| const int* read_errno, const std::string* data) {
|
| if (*read_errno) {
|
| ImportExportCleanup();
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ShowError(
|
| l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_ERROR_TITLE),
|
| l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT,
|
| @@ -794,7 +797,7 @@ void CertificateManagerHandler::ImportPersonalFileRead(
|
| file_data_ = *data;
|
|
|
| if (CouldBePFX(file_data_)) {
|
| - web_ui()->CallJavascriptFunction(
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| "CertificateManager.importPersonalAskPassword");
|
| return;
|
| }
|
| @@ -805,7 +808,7 @@ void CertificateManagerHandler::ImportPersonalFileRead(
|
| // certificates.
|
| int result = certificate_manager_model_->ImportUserCert(file_data_);
|
| ImportExportCleanup();
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| int string_id;
|
| switch (result) {
|
| case net::OK:
|
| @@ -828,7 +831,7 @@ void CertificateManagerHandler::ImportPersonalFileRead(
|
| void CertificateManagerHandler::ImportPersonalPasswordSelected(
|
| const base::ListValue* args) {
|
| if (!args->GetString(0, &password_)) {
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| ImportExportCleanup();
|
| return;
|
| }
|
| @@ -859,7 +862,7 @@ void CertificateManagerHandler::ImportPersonalSlotUnlocked() {
|
| int result = certificate_manager_model_->ImportFromPKCS12(
|
| module_.get(), file_data_, password_, is_extractable);
|
| ImportExportCleanup();
|
| - web_ui()->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateRestoreOverlay.dismiss");
|
| int string_id;
|
| switch (result) {
|
| case net::OK:
|
| @@ -1014,8 +1017,8 @@ void CertificateManagerHandler::ImportCAFileRead(const int* read_errno,
|
| // TODO(mattm): check here if root_cert is not a CA cert and show error.
|
|
|
| base::StringValue cert_name(root_cert->subject().GetDisplayName());
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.showImport",
|
| - cert_name);
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.showImport", cert_name);
|
| }
|
|
|
| void CertificateManagerHandler::ImportCATrustSelected(
|
| @@ -1030,7 +1033,8 @@ void CertificateManagerHandler::ImportCATrustSelected(
|
| if (fail) {
|
| LOG(ERROR) << "ImportCATrustSelected args fail";
|
| ImportExportCleanup();
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.dismiss");
|
| return;
|
| }
|
|
|
| @@ -1043,7 +1047,8 @@ void CertificateManagerHandler::ImportCATrustSelected(
|
| trust_email * net::NSSCertDatabase::TRUSTED_EMAIL +
|
| trust_obj_sign * net::NSSCertDatabase::TRUSTED_OBJ_SIGN,
|
| ¬_imported);
|
| - web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| + web_ui()->CallJavascriptFunctionUnsafe(
|
| + "CertificateEditCaTrustOverlay.dismiss");
|
| if (!result) {
|
| ShowError(
|
| l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE),
|
| @@ -1087,9 +1092,9 @@ void CertificateManagerHandler::CertificateManagerModelReady() {
|
| certificate_manager_model_->is_user_db_available());
|
| base::FundamentalValue tpm_available_value(
|
| certificate_manager_model_->is_tpm_available());
|
| - web_ui()->CallJavascriptFunction("CertificateManager.onModelReady",
|
| - user_db_available_value,
|
| - tpm_available_value);
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateManager.onModelReady",
|
| + user_db_available_value,
|
| + tpm_available_value);
|
| certificate_manager_model_->Refresh();
|
| }
|
|
|
| @@ -1183,7 +1188,8 @@ void CertificateManagerHandler::PopulateTree(
|
| base::ListValue args;
|
| args.AppendString(tree_name);
|
| args.Append(nodes);
|
| - web_ui()->CallJavascriptFunction("CertificateManager.onPopulateTree", args);
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateManager.onPopulateTree",
|
| + args);
|
| }
|
| }
|
|
|
| @@ -1196,7 +1202,7 @@ void CertificateManagerHandler::ShowError(const std::string& title,
|
| args.push_back(base::Value::CreateNullValue().release()); // cancelTitle
|
| args.push_back(base::Value::CreateNullValue().release()); // okCallback
|
| args.push_back(base::Value::CreateNullValue().release()); // cancelCallback
|
| - web_ui()->CallJavascriptFunction("AlertOverlay.show", args.get());
|
| + web_ui()->CallJavascriptFunctionUnsafe("AlertOverlay.show", args.get());
|
| }
|
|
|
| void CertificateManagerHandler::ShowImportErrors(
|
| @@ -1222,10 +1228,9 @@ void CertificateManagerHandler::ShowImportErrors(
|
|
|
| base::StringValue title_value(title);
|
| base::StringValue error_value(error);
|
| - web_ui()->CallJavascriptFunction("CertificateImportErrorOverlay.show",
|
| - title_value,
|
| - error_value,
|
| - cert_error_list);
|
| + web_ui()->CallJavascriptFunctionUnsafe("CertificateImportErrorOverlay.show",
|
| + title_value, error_value,
|
| + cert_error_list);
|
| }
|
|
|
| gfx::NativeWindow CertificateManagerHandler::GetParentWindow() const {
|
|
|