| Index: chrome/browser/chromeos/options/vpn_config_view.cc
|
| diff --git a/chrome/browser/chromeos/options/vpn_config_view.cc b/chrome/browser/chromeos/options/vpn_config_view.cc
|
| index 089474995a7e6fe85b99f78ac6c909136273a4f9..f35536ed4e560e9fed7d279a8ee3b826def8f1c0 100644
|
| --- a/chrome/browser/chromeos/options/vpn_config_view.cc
|
| +++ b/chrome/browser/chromeos/options/vpn_config_view.cc
|
| @@ -313,7 +313,7 @@ bool VPNConfigView::Login() {
|
| config_data.group_name = GetGroupName();
|
| break;
|
| case PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: {
|
| - config_data.server_ca_cert_nss_nickname = GetServerCACertNssNickname();
|
| + config_data.server_ca_cert_pem = GetServerCACertPEM();
|
| config_data.client_cert_pkcs11_id = GetUserCertID();
|
| config_data.username = GetUsername();
|
| config_data.user_passphrase = GetUserPassphrase();
|
| @@ -321,7 +321,7 @@ bool VPNConfigView::Login() {
|
| break;
|
| }
|
| case PROVIDER_TYPE_OPEN_VPN:
|
| - config_data.server_ca_cert_nss_nickname = GetServerCACertNssNickname();
|
| + config_data.server_ca_cert_pem = GetServerCACertPEM();
|
| config_data.client_cert_pkcs11_id = GetUserCertID();
|
| config_data.username = GetUsername();
|
| config_data.user_passphrase = GetUserPassphrase();
|
| @@ -421,7 +421,7 @@ const std::string VPNConfigView::GetOTP() const {
|
| return GetTextFromField(otp_textfield_, true);
|
| }
|
|
|
| -const std::string VPNConfigView::GetServerCACertNssNickname() const {
|
| +const std::string VPNConfigView::GetServerCACertPEM() const {
|
| int index = server_ca_cert_combobox_ ?
|
| server_ca_cert_combobox_->selected_index() : 0;
|
| if (index == 0) {
|
| @@ -429,7 +429,7 @@ const std::string VPNConfigView::GetServerCACertNssNickname() const {
|
| return std::string();
|
| } else {
|
| int cert_index = index - 1;
|
| - return CertLibrary::Get()->GetCertNicknameAt(
|
| + return CertLibrary::Get()->GetCertPEMAt(
|
| CertLibrary::CERT_TYPE_SERVER_CA, cert_index);
|
| }
|
| }
|
| @@ -453,14 +453,20 @@ void VPNConfigView::Init(VirtualNetwork* vpn) {
|
| if (vpn) {
|
| ProviderType type = vpn->provider_type();
|
| std::string type_dict_name = ProviderTypeToONCDictKey(type);
|
| - ParseVPNUIProperty(&ca_cert_ui_data_, vpn, type_dict_name,
|
| - onc::vpn::kServerCARef);
|
| - ParseVPNUIProperty(&psk_passphrase_ui_data_, vpn, type_dict_name,
|
| - onc::vpn::kPSK);
|
| +
|
| + if (type == PROVIDER_TYPE_L2TP_IPSEC_PSK) {
|
| + ParseVPNUIProperty(&ca_cert_ui_data_, vpn, type_dict_name,
|
| + onc::ipsec::kServerCARef);
|
| + ParseVPNUIProperty(&psk_passphrase_ui_data_, vpn, type_dict_name,
|
| + onc::ipsec::kPSK);
|
| + ParseVPNUIProperty(&group_name_ui_data_, vpn, type_dict_name,
|
| + onc::ipsec::kGroup);
|
| + } else { // OpenVPN
|
| + ParseVPNUIProperty(&ca_cert_ui_data_, vpn, type_dict_name,
|
| + onc::openvpn::kServerCARef);
|
| + }
|
| ParseVPNUIProperty(&user_cert_ui_data_, vpn, type_dict_name,
|
| onc::vpn::kClientCertRef);
|
| - ParseVPNUIProperty(&group_name_ui_data_, vpn, type_dict_name,
|
| - onc::vpn::kGroup);
|
|
|
| const std::string credentials_dict_name(
|
| type == PROVIDER_TYPE_L2TP_IPSEC_PSK ?
|
| @@ -718,10 +724,10 @@ void VPNConfigView::Refresh() {
|
| if (server_ca_cert_combobox_) {
|
| server_ca_cert_combobox_->ModelChanged();
|
| if (enable_server_ca_cert_ &&
|
| - (vpn && !vpn->ca_cert_nss().empty())) {
|
| + (vpn && !vpn->ca_cert_pem().empty())) {
|
| // Select the current server CA certificate in the combobox.
|
| - int cert_index = CertLibrary::Get()->GetCertIndexByNickname(
|
| - CertLibrary::CERT_TYPE_SERVER_CA, vpn->ca_cert_nss());
|
| + int cert_index = CertLibrary::Get()->GetCertIndexByPEM(
|
| + CertLibrary::CERT_TYPE_SERVER_CA, vpn->ca_cert_pem());
|
| if (cert_index >= 0) {
|
| // Skip item for "Default"
|
| server_ca_cert_combobox_->SetSelectedIndex(1 + cert_index);
|
|
|