Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(516)

Side by Side Diff: chromeos/network/onc/onc_validator_unittest.cc

Issue 1431563005: Handle prohibited technologies in device policy ONC (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chromeos/network/onc/onc_validator.h" 5 #include "chromeos/network/onc/onc_validator.h"
6 6
7 #include <string> 7 #include <string>
8 #include <utility> 8 #include <utility>
9 9
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after
146 // Check that at least one configuration is accepted for 146 // Check that at least one configuration is accepted for
147 // device policies. 147 // device policies.
148 OncParams("managed_toplevel_wifi_peap.onc", 148 OncParams("managed_toplevel_wifi_peap.onc",
149 &kToplevelConfigurationSignature, 149 &kToplevelConfigurationSignature,
150 true, 150 true,
151 ::onc::ONC_SOURCE_DEVICE_POLICY), 151 ::onc::ONC_SOURCE_DEVICE_POLICY),
152 // Disabled technologies are only allowed for user policies. 152 // Disabled technologies are only allowed for user policies.
153 OncParams("managed_toplevel_with_disabled_technologies.onc", 153 OncParams("managed_toplevel_with_disabled_technologies.onc",
154 &kToplevelConfigurationSignature, 154 &kToplevelConfigurationSignature,
155 true, 155 true,
156 ::onc::ONC_SOURCE_USER_POLICY), 156 ::onc::ONC_SOURCE_DEVICE_POLICY),
157 OncParams("managed_toplevel_l2tpipsec.onc", 157 OncParams("managed_toplevel_l2tpipsec.onc",
158 &kToplevelConfigurationSignature, 158 &kToplevelConfigurationSignature,
159 true), 159 true),
160 OncParams("toplevel_wifi_hexssid.onc", 160 OncParams("toplevel_wifi_hexssid.onc",
161 &kToplevelConfigurationSignature, 161 &kToplevelConfigurationSignature,
162 false), 162 false),
163 OncParams("toplevel_wifi_ssid_and_hexssid.onc", 163 OncParams("toplevel_wifi_ssid_and_hexssid.onc",
164 &kToplevelConfigurationSignature, 164 &kToplevelConfigurationSignature,
165 false), 165 false),
166 OncParams("toplevel_wifi_wpa_psk.onc", 166 OncParams("toplevel_wifi_wpa_psk.onc",
(...skipping 375 matching lines...) Expand 10 before | Expand all | Expand 10 after
542 true, 542 true,
543 ::onc::ONC_SOURCE_DEVICE_POLICY), 543 ::onc::ONC_SOURCE_DEVICE_POLICY),
544 ExpectBothNotValid("", "")), 544 ExpectBothNotValid("", "")),
545 std::make_pair(OncParams("openvpn-invalid-verify-x509-type", 545 std::make_pair(OncParams("openvpn-invalid-verify-x509-type",
546 &kNetworkConfigurationSignature, 546 &kNetworkConfigurationSignature,
547 false), 547 false),
548 ExpectBothNotValid("", "")))); 548 ExpectBothNotValid("", ""))));
549 549
550 } // namespace onc 550 } // namespace onc
551 } // namespace chromeos 551 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698