Index: chrome/browser/chromeos/options/vpn_config_view.cc |
diff --git a/chrome/browser/chromeos/options/vpn_config_view.cc b/chrome/browser/chromeos/options/vpn_config_view.cc |
index 19f49c9a7cbd81efd5a1127c1594f27c0fa9dd07..1ab3b651dfd72f64b59a8c5b816321b01bfc765f 100644 |
--- a/chrome/browser/chromeos/options/vpn_config_view.cc |
+++ b/chrome/browser/chromeos/options/vpn_config_view.cc |
@@ -28,18 +28,18 @@ namespace { |
// Root CA certificates that are built into Chrome use this token name. |
const char* const kRootCertificateTokenName = "Builtin Object Token"; |
-string16 ProviderTypeToString(chromeos::VirtualNetwork::ProviderType type) { |
+string16 ProviderTypeToString(chromeos::ProviderType type) { |
switch (type) { |
- case chromeos::VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_PSK: |
+ case chromeos::PROVIDER_TYPE_L2TP_IPSEC_PSK: |
return l10n_util::GetStringUTF16( |
IDS_OPTIONS_SETTINGS_INTERNET_OPTIONS_L2TP_IPSEC_PSK); |
- case chromeos::VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: |
+ case chromeos::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: |
return l10n_util::GetStringUTF16( |
IDS_OPTIONS_SETTINGS_INTERNET_OPTIONS_L2TP_IPSEC_USER_CERT); |
- case chromeos::VirtualNetwork::PROVIDER_TYPE_OPEN_VPN: |
+ case chromeos::PROVIDER_TYPE_OPEN_VPN: |
return l10n_util::GetStringUTF16( |
IDS_OPTIONS_SETTINGS_INTERNET_OPTIONS_OPEN_VPN); |
- case chromeos::VirtualNetwork::PROVIDER_TYPE_MAX: |
+ case chromeos::PROVIDER_TYPE_MAX: |
break; |
} |
NOTREACHED(); |
@@ -56,12 +56,11 @@ class ProviderTypeComboboxModel : public ui::ComboboxModel { |
virtual ~ProviderTypeComboboxModel() {} |
virtual int GetItemCount() { |
// TODO(stevenjb): Include OpenVPN option once enabled. |
- return VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT + 1; |
+ return PROVIDER_TYPE_L2TP_IPSEC_USER_CERT + 1; |
// return VirtualNetwork::PROVIDER_TYPE_MAX; |
} |
virtual string16 GetItemAt(int index) { |
- VirtualNetwork::ProviderType type = |
- static_cast<VirtualNetwork::ProviderType>(index); |
+ ProviderType type = static_cast<ProviderType>(index); |
return ProviderTypeToString(type); |
} |
private: |
@@ -199,10 +198,11 @@ void VPNConfigView::ItemChanged(views::Combobox* combo_box, |
if (prev_index == new_index) |
return; |
if (combo_box == provider_type_combobox_) { |
- provider_type_ = static_cast<VirtualNetwork::ProviderType>(new_index); |
+ provider_type_ = static_cast<ProviderType>(new_index); |
UpdateControls(); |
- } else if (combo_box == user_cert_combobox_) { |
- } else if (combo_box == server_ca_cert_combobox_) { |
+ } else if (combo_box == user_cert_combobox_ || |
+ combo_box == server_ca_cert_combobox_) { |
+ // Do nothing. |
} else { |
NOTREACHED(); |
} |
@@ -218,14 +218,14 @@ bool VPNConfigView::Login() { |
NetworkLibrary* cros = CrosLibrary::Get()->GetNetworkLibrary(); |
if (service_path_.empty()) { |
switch (provider_type_) { |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_PSK: |
+ case PROVIDER_TYPE_L2TP_IPSEC_PSK: |
cros->ConnectToVirtualNetworkPSK(GetService(), |
GetServer(), |
GetPSKPassphrase(), |
GetUsername(), |
GetUserPassphrase()); |
break; |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: { |
+ case PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: { |
cros->ConnectToVirtualNetworkCert(GetService(), |
GetServer(), |
GetServerCACertNssNickname(), |
@@ -234,11 +234,11 @@ bool VPNConfigView::Login() { |
GetUserPassphrase()); |
break; |
} |
- case VirtualNetwork::PROVIDER_TYPE_OPEN_VPN: |
+ case PROVIDER_TYPE_OPEN_VPN: |
// TODO(stevenjb): Add support for OpenVPN. |
LOG(WARNING) << "Unsupported provider type: " << provider_type_; |
break; |
- case VirtualNetwork::PROVIDER_TYPE_MAX: |
+ case PROVIDER_TYPE_MAX: |
break; |
} |
} else { |
@@ -249,18 +249,18 @@ bool VPNConfigView::Login() { |
return true; // Close dialog. |
} |
switch (provider_type_) { |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_PSK: |
+ case PROVIDER_TYPE_L2TP_IPSEC_PSK: |
vpn->SetPSKPassphrase(GetPSKPassphrase()); |
break; |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: { |
+ case PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: { |
vpn->SetClientCertID(GetUserCertID()); |
break; |
} |
- case VirtualNetwork::PROVIDER_TYPE_OPEN_VPN: { |
+ case PROVIDER_TYPE_OPEN_VPN: { |
LOG(WARNING) << "OpenVPN not yet supported."; |
break; |
} |
- case VirtualNetwork::PROVIDER_TYPE_MAX: |
+ case PROVIDER_TYPE_MAX: |
break; |
} |
vpn->SetUsername(GetUsername()); |
@@ -371,7 +371,7 @@ void VPNConfigView::Init(VirtualNetwork* vpn) { |
service_text_modified_ = false; |
provider_type_ = vpn ? |
vpn->provider_type() : |
- chromeos::VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_PSK; |
+ chromeos::PROVIDER_TYPE_L2TP_IPSEC_PSK; |
// Server label and input. |
layout->StartRow(0, column_view_set_id); |
@@ -542,7 +542,7 @@ void VPNConfigView::Refresh() { |
void VPNConfigView::UpdateControls() { |
// Enable controls. |
switch (provider_type_) { |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_PSK: |
+ case PROVIDER_TYPE_L2TP_IPSEC_PSK: |
psk_passphrase_label_->SetEnabled(true); |
psk_passphrase_textfield_->SetEnabled(true); |
server_ca_cert_label_->SetEnabled(false); |
@@ -550,7 +550,7 @@ void VPNConfigView::UpdateControls() { |
user_cert_label_->SetEnabled(false); |
user_cert_combobox_->SetEnabled(false); |
break; |
- case VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: |
+ case PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: |
psk_passphrase_label_->SetEnabled(false); |
psk_passphrase_textfield_->SetEnabled(false); |
server_ca_cert_label_->SetEnabled(true); |
@@ -559,7 +559,7 @@ void VPNConfigView::UpdateControls() { |
// Only enable the combobox if the user actually has a cert to select. |
user_cert_combobox_->SetEnabled(HaveUserCerts()); |
break; |
- case VirtualNetwork::PROVIDER_TYPE_OPEN_VPN: |
+ case PROVIDER_TYPE_OPEN_VPN: |
psk_passphrase_label_->SetEnabled(false); |
psk_passphrase_textfield_->SetEnabled(false); |
server_ca_cert_label_->SetEnabled(false); |
@@ -613,8 +613,8 @@ void VPNConfigView::UpdateCanLogin() { |
} |
bool VPNConfigView::UserCertRequired() const { |
- return provider_type_ == VirtualNetwork::PROVIDER_TYPE_L2TP_IPSEC_USER_CERT |
- || provider_type_ == VirtualNetwork::PROVIDER_TYPE_OPEN_VPN; |
+ return provider_type_ == PROVIDER_TYPE_L2TP_IPSEC_USER_CERT |
+ || provider_type_ == PROVIDER_TYPE_OPEN_VPN; |
} |
bool VPNConfigView::HaveUserCerts() const { |