| Index: chrome/browser/chromeos/cros/onc_network_parser.cc | 
| diff --git a/chrome/browser/chromeos/cros/onc_network_parser.cc b/chrome/browser/chromeos/cros/onc_network_parser.cc | 
| index 814756ef7abafb9dd4a9b87c8c54a5585a04b853..d1245a97324757416f771fe08e528239d95a49b1 100644 | 
| --- a/chrome/browser/chromeos/cros/onc_network_parser.cc | 
| +++ b/chrome/browser/chromeos/cros/onc_network_parser.cc | 
| @@ -9,7 +9,6 @@ | 
|  | 
| #include "base/base64.h" | 
| #include "base/json/json_string_value_serializer.h" | 
| -#include "chrome/browser/chromeos/login/user_manager.h" | 
| #include "base/json/json_writer.h"  // for debug output only. | 
| #include "base/stringprintf.h" | 
| #include "base/values.h" | 
| @@ -18,13 +17,14 @@ | 
| #include "chrome/browser/chromeos/cros/native_network_constants.h" | 
| #include "chrome/browser/chromeos/cros/native_network_parser.h" | 
| #include "chrome/browser/chromeos/cros/network_library.h" | 
| -#include "chrome/browser/chromeos/cros/onc_constants.h" | 
| -#include "chrome/browser/chromeos/network_settings/onc_certificate_importer.h" | 
| -#include "chrome/browser/chromeos/network_settings/onc_signature.h" | 
| -#include "chrome/browser/chromeos/network_settings/onc_validator.h" | 
| +#include "chrome/browser/chromeos/login/user_manager.h" | 
| #include "chrome/browser/chromeos/proxy_config_service_impl.h" | 
| #include "chrome/browser/prefs/proxy_config_dictionary.h" | 
| #include "chrome/common/net/x509_certificate_model.h" | 
| +#include "chromeos/network/onc/onc_certificate_importer.h" | 
| +#include "chromeos/network/onc/onc_constants.h" | 
| +#include "chromeos/network/onc/onc_signature.h" | 
| +#include "chromeos/network/onc/onc_validator.h" | 
| #include "content/public/browser/browser_thread.h" | 
| #include "crypto/encryptor.h" | 
| #include "crypto/hmac.h" | 
| @@ -281,7 +281,7 @@ bool GetAsListOfStrings(const base::Value& value, | 
| // -------------------- OncNetworkParser -------------------- | 
|  | 
| OncNetworkParser::OncNetworkParser(const base::ListValue& network_configs, | 
| -                                   NetworkUIData::ONCSource onc_source) | 
| +                                   onc::ONCSource onc_source) | 
| : NetworkParser(get_onc_mapper()), | 
| onc_source_(onc_source), | 
| network_configs_(network_configs.DeepCopy()) { | 
| @@ -458,7 +458,7 @@ bool OncNetworkParser::ParseNestedObject(Network* network, | 
| // static | 
| std::string OncNetworkParser::GetUserExpandedValue( | 
| const base::Value& value, | 
| -    NetworkUIData::ONCSource source) { | 
| +    onc::ONCSource source) { | 
| std::string string_value; | 
| if (!value.GetAsString(&string_value)) | 
| return string_value; | 
| @@ -467,8 +467,8 @@ std::string OncNetworkParser::GetUserExpandedValue( | 
| if (!content::BrowserThread::IsMessageLoopValid(content::BrowserThread::UI)) | 
| return string_value; | 
|  | 
| -  if (source != NetworkUIData::ONC_SOURCE_USER_POLICY && | 
| -      source != NetworkUIData::ONC_SOURCE_USER_IMPORT) { | 
| +  if (source != onc::ONC_SOURCE_USER_POLICY && | 
| +      source != onc::ONC_SOURCE_USER_IMPORT) { | 
| return string_value; | 
| } | 
|  | 
| @@ -857,7 +857,7 @@ bool OncNetworkParser::ParseClientCertPattern(OncNetworkParser* parser, | 
| Network* network) { | 
| // Ignore certificate patterns for device policy ONC so that an unmanaged user | 
| // won't have a certificate presented for them involuntarily. | 
| -  if (parser->onc_source() == NetworkUIData::ONC_SOURCE_DEVICE_POLICY) | 
| +  if (parser->onc_source() == onc::ONC_SOURCE_DEVICE_POLICY) | 
| return false; | 
|  | 
| // Only WiFi and VPN have this type. | 
|  |