| Index: chrome/browser/chromeos/cros/onc_network_parser.cc
|
| diff --git a/chrome/browser/chromeos/cros/onc_network_parser.cc b/chrome/browser/chromeos/cros/onc_network_parser.cc
|
| index 814756ef7abafb9dd4a9b87c8c54a5585a04b853..d1245a97324757416f771fe08e528239d95a49b1 100644
|
| --- a/chrome/browser/chromeos/cros/onc_network_parser.cc
|
| +++ b/chrome/browser/chromeos/cros/onc_network_parser.cc
|
| @@ -9,7 +9,6 @@
|
|
|
| #include "base/base64.h"
|
| #include "base/json/json_string_value_serializer.h"
|
| -#include "chrome/browser/chromeos/login/user_manager.h"
|
| #include "base/json/json_writer.h" // for debug output only.
|
| #include "base/stringprintf.h"
|
| #include "base/values.h"
|
| @@ -18,13 +17,14 @@
|
| #include "chrome/browser/chromeos/cros/native_network_constants.h"
|
| #include "chrome/browser/chromeos/cros/native_network_parser.h"
|
| #include "chrome/browser/chromeos/cros/network_library.h"
|
| -#include "chrome/browser/chromeos/cros/onc_constants.h"
|
| -#include "chrome/browser/chromeos/network_settings/onc_certificate_importer.h"
|
| -#include "chrome/browser/chromeos/network_settings/onc_signature.h"
|
| -#include "chrome/browser/chromeos/network_settings/onc_validator.h"
|
| +#include "chrome/browser/chromeos/login/user_manager.h"
|
| #include "chrome/browser/chromeos/proxy_config_service_impl.h"
|
| #include "chrome/browser/prefs/proxy_config_dictionary.h"
|
| #include "chrome/common/net/x509_certificate_model.h"
|
| +#include "chromeos/network/onc/onc_certificate_importer.h"
|
| +#include "chromeos/network/onc/onc_constants.h"
|
| +#include "chromeos/network/onc/onc_signature.h"
|
| +#include "chromeos/network/onc/onc_validator.h"
|
| #include "content/public/browser/browser_thread.h"
|
| #include "crypto/encryptor.h"
|
| #include "crypto/hmac.h"
|
| @@ -281,7 +281,7 @@ bool GetAsListOfStrings(const base::Value& value,
|
| // -------------------- OncNetworkParser --------------------
|
|
|
| OncNetworkParser::OncNetworkParser(const base::ListValue& network_configs,
|
| - NetworkUIData::ONCSource onc_source)
|
| + onc::ONCSource onc_source)
|
| : NetworkParser(get_onc_mapper()),
|
| onc_source_(onc_source),
|
| network_configs_(network_configs.DeepCopy()) {
|
| @@ -458,7 +458,7 @@ bool OncNetworkParser::ParseNestedObject(Network* network,
|
| // static
|
| std::string OncNetworkParser::GetUserExpandedValue(
|
| const base::Value& value,
|
| - NetworkUIData::ONCSource source) {
|
| + onc::ONCSource source) {
|
| std::string string_value;
|
| if (!value.GetAsString(&string_value))
|
| return string_value;
|
| @@ -467,8 +467,8 @@ std::string OncNetworkParser::GetUserExpandedValue(
|
| if (!content::BrowserThread::IsMessageLoopValid(content::BrowserThread::UI))
|
| return string_value;
|
|
|
| - if (source != NetworkUIData::ONC_SOURCE_USER_POLICY &&
|
| - source != NetworkUIData::ONC_SOURCE_USER_IMPORT) {
|
| + if (source != onc::ONC_SOURCE_USER_POLICY &&
|
| + source != onc::ONC_SOURCE_USER_IMPORT) {
|
| return string_value;
|
| }
|
|
|
| @@ -857,7 +857,7 @@ bool OncNetworkParser::ParseClientCertPattern(OncNetworkParser* parser,
|
| Network* network) {
|
| // Ignore certificate patterns for device policy ONC so that an unmanaged user
|
| // won't have a certificate presented for them involuntarily.
|
| - if (parser->onc_source() == NetworkUIData::ONC_SOURCE_DEVICE_POLICY)
|
| + if (parser->onc_source() == onc::ONC_SOURCE_DEVICE_POLICY)
|
| return false;
|
|
|
| // Only WiFi and VPN have this type.
|
|
|