| Index: chromeos/network/onc/onc_utils.cc | 
| diff --git a/chrome/browser/chromeos/network_settings/onc_utils.cc b/chromeos/network/onc/onc_utils.cc | 
| similarity index 64% | 
| rename from chrome/browser/chromeos/network_settings/onc_utils.cc | 
| rename to chromeos/network/onc/onc_utils.cc | 
| index 9b57cbe97dafd4aeaff16cd65906b443781dba6d..62e0d4682ace119565c61e0be4b9eba297f7a1ec 100644 | 
| --- a/chrome/browser/chromeos/network_settings/onc_utils.cc | 
| +++ b/chromeos/network/onc/onc_utils.cc | 
| @@ -2,33 +2,40 @@ | 
| // Use of this source code is governed by a BSD-style license that can be | 
| // found in the LICENSE file. | 
|  | 
| -#include "chrome/browser/chromeos/network_settings/onc_utils.h" | 
| +#include "chromeos/network/onc/onc_utils.h" | 
|  | 
| #include "base/base64.h" | 
| #include "base/json/json_reader.h" | 
| +#include "base/logging.h" | 
| #include "base/values.h" | 
| -#include "chrome/browser/chromeos/cros/onc_constants.h" | 
| +#include "chromeos/network/network_event_log.h" | 
| +#include "chromeos/network/onc/onc_constants.h" | 
| #include "crypto/encryptor.h" | 
| #include "crypto/hmac.h" | 
| #include "crypto/symmetric_key.h" | 
| -#include "grit/generated_resources.h" | 
| -#include "ui/base/l10n/l10n_util.h" | 
| + | 
| +#define ONC_LOG_WARNING(message) NET_LOG_WARNING("ONC", message) | 
| +#define ONC_LOG_ERROR(message) NET_LOG_ERROR("ONC", message) | 
|  | 
| namespace chromeos { | 
| namespace onc { | 
|  | 
| +namespace { | 
| + | 
| +const char kUnableToDecrypt[] = "Unable to decrypt encrypted ONC"; | 
| +const char kUnableToDecode[] = "Unable to decode encrypted ONC"; | 
| + | 
| +}  // namespace | 
| + | 
| scoped_ptr<base::DictionaryValue> ReadDictionaryFromJson( | 
| -    const std::string& json, | 
| -    std::string* error) { | 
| +    const std::string& json) { | 
| +  std::string error; | 
| base::Value* root = base::JSONReader::ReadAndReturnError( | 
| -      json, base::JSON_ALLOW_TRAILING_COMMAS, NULL, error); | 
| +      json, base::JSON_ALLOW_TRAILING_COMMAS, NULL, &error); | 
|  | 
| base::DictionaryValue* dict_ptr = NULL; | 
| -  if (root != NULL && !root->GetAsDictionary(&dict_ptr)) { | 
| -    if (error) { | 
| -      *error = l10n_util::GetStringUTF8( | 
| -          IDS_NETWORK_CONFIG_ERROR_NETWORK_NOT_A_JSON_DICTIONARY); | 
| -    } | 
| +  if (!root || !root->GetAsDictionary(&dict_ptr)) { | 
| +    ONC_LOG_ERROR("Invalid JSON Dictionary: " + error); | 
| delete root; | 
| } | 
|  | 
| @@ -36,8 +43,7 @@ scoped_ptr<base::DictionaryValue> ReadDictionaryFromJson( | 
| } | 
|  | 
| scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, | 
| -                                          const base::DictionaryValue& root, | 
| -                                          std::string* error) { | 
| +                                          const base::DictionaryValue& root) { | 
| const int kKeySizeInBits = 256; | 
| const int kMaxIterationCount = 500000; | 
| std::string onc_type; | 
| @@ -60,37 +66,33 @@ scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, | 
| !root.GetString(encrypted::kStretch, &stretch_method) || | 
| !root.GetString(encrypted::kType, &onc_type) || | 
| onc_type != kEncryptedConfiguration) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_MALFORMED); | 
| + | 
| +    ONC_LOG_ERROR("Encrypted ONC malformed."); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| if (hmac_method != encrypted::kSHA1 || | 
| cipher != encrypted::kAES256 || | 
| stretch_method != encrypted::kPBKDF2) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNSUPPORTED_ENCRYPTION); | 
| +    ONC_LOG_ERROR("Encrypted ONC unsupported encryption scheme."); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| // Make sure iterations != 0, since that's not valid. | 
| if (iterations == 0) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | 
| +    ONC_LOG_ERROR(kUnableToDecrypt); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| // Simply a sanity check to make sure we can't lock up the machine | 
| // for too long with a huge number (or a negative number). | 
| if (iterations < 0 || iterations > kMaxIterationCount) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_TOO_MANY_ITERATIONS); | 
| +    ONC_LOG_ERROR("Too many iterations in encrypted ONC"); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| if (!base::Base64Decode(salt, &salt)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | 
| +    ONC_LOG_ERROR(kUnableToDecode); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| @@ -102,51 +104,61 @@ scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, | 
| kKeySizeInBits)); | 
|  | 
| if (!base::Base64Decode(initial_vector, &initial_vector)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | 
| +    ONC_LOG_ERROR(kUnableToDecode); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
| if (!base::Base64Decode(ciphertext, &ciphertext)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | 
| +    ONC_LOG_ERROR(kUnableToDecode); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
| if (!base::Base64Decode(hmac, &hmac)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECODE); | 
| +    ONC_LOG_ERROR(kUnableToDecode); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| crypto::HMAC hmac_verifier(crypto::HMAC::SHA1); | 
| if (!hmac_verifier.Init(key.get()) || | 
| !hmac_verifier.Verify(ciphertext, hmac)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | 
| +    ONC_LOG_ERROR(kUnableToDecrypt); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| crypto::Encryptor decryptor; | 
| if (!decryptor.Init(key.get(), crypto::Encryptor::CBC, initial_vector))  { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | 
| +    ONC_LOG_ERROR(kUnableToDecrypt); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| std::string plaintext; | 
| if (!decryptor.Decrypt(ciphertext, &plaintext)) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_ENCRYPTED_ONC_UNABLE_TO_DECRYPT); | 
| +    ONC_LOG_ERROR(kUnableToDecrypt); | 
| return scoped_ptr<base::DictionaryValue>(); | 
| } | 
|  | 
| scoped_ptr<base::DictionaryValue> new_root = | 
| -      ReadDictionaryFromJson(plaintext, error); | 
| -  if (new_root.get() == NULL && error->empty()) { | 
| -    *error = l10n_util::GetStringUTF8( | 
| -        IDS_NETWORK_CONFIG_ERROR_NETWORK_PROP_DICT_MALFORMED); | 
| +      ReadDictionaryFromJson(plaintext); | 
| +  if (new_root.get() == NULL) { | 
| +    ONC_LOG_ERROR("Property dictionary malformed."); | 
| +    return scoped_ptr<base::DictionaryValue>(); | 
| } | 
| + | 
| return new_root.Pass(); | 
| } | 
|  | 
| +std::string GetSourceAsString(ONCSource source) { | 
| +  switch (source) { | 
| +    case ONC_SOURCE_DEVICE_POLICY: | 
| +      return "device policy"; | 
| +    case ONC_SOURCE_USER_POLICY: | 
| +      return "user policy"; | 
| +    case ONC_SOURCE_NONE: | 
| +      return "none"; | 
| +    case ONC_SOURCE_USER_IMPORT: | 
| +      return "user import"; | 
| +  } | 
| +  NOTREACHED() << "unknown ONC source " << source; | 
| +  return "unknown"; | 
| +} | 
| + | 
| }  // chromeos | 
| }  // onc | 
|  |