| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromeos/network/network_connection_handler.h" | 5 #include "chromeos/network/network_connection_handler.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/json/json_reader.h" | 9 #include "base/json/json_reader.h" |
| 10 #include "base/strings/string_number_conversions.h" |
| 10 #include "chromeos/chromeos_switches.h" | 11 #include "chromeos/chromeos_switches.h" |
| 11 #include "chromeos/dbus/dbus_thread_manager.h" | 12 #include "chromeos/dbus/dbus_thread_manager.h" |
| 12 #include "chromeos/dbus/shill_manager_client.h" | 13 #include "chromeos/dbus/shill_manager_client.h" |
| 13 #include "chromeos/dbus/shill_service_client.h" | 14 #include "chromeos/dbus/shill_service_client.h" |
| 14 #include "chromeos/network/client_cert_util.h" | 15 #include "chromeos/network/client_cert_util.h" |
| 15 #include "chromeos/network/network_configuration_handler.h" | 16 #include "chromeos/network/network_configuration_handler.h" |
| 16 #include "chromeos/network/network_event_log.h" | 17 #include "chromeos/network/network_event_log.h" |
| 17 #include "chromeos/network/network_handler_callbacks.h" | 18 #include "chromeos/network/network_handler_callbacks.h" |
| 18 #include "chromeos/network/network_profile_handler.h" | 19 #include "chromeos/network/network_profile_handler.h" |
| 19 #include "chromeos/network/network_state.h" | 20 #include "chromeos/network/network_state.h" |
| (...skipping 417 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 437 // Network may not be configured. | 438 // Network may not be configured. |
| 438 ErrorCallbackForPendingRequest(service_path, kErrorConfigurationRequired); | 439 ErrorCallbackForPendingRequest(service_path, kErrorConfigurationRequired); |
| 439 return; | 440 return; |
| 440 } | 441 } |
| 441 | 442 |
| 442 // The network may not be 'Connectable' because the TPM properties are not | 443 // The network may not be 'Connectable' because the TPM properties are not |
| 443 // set up, so configure tpm slot/pin before connecting. | 444 // set up, so configure tpm slot/pin before connecting. |
| 444 if (cert_loader_ && cert_loader_->IsHardwareBacked()) { | 445 if (cert_loader_ && cert_loader_->IsHardwareBacked()) { |
| 445 // Pass NULL if pkcs11_id is empty, so that it doesn't clear any | 446 // Pass NULL if pkcs11_id is empty, so that it doesn't clear any |
| 446 // previously configured client cert. | 447 // previously configured client cert. |
| 447 client_cert::SetShillProperties(client_cert_type, | 448 client_cert::SetShillProperties( |
| 448 cert_loader_->tpm_token_slot(), | 449 client_cert_type, |
| 449 cert_loader_->tpm_user_pin(), | 450 base::IntToString(cert_loader_->tpm_token_slot()), |
| 450 pkcs11_id.empty() ? NULL : &pkcs11_id, | 451 cert_loader_->tpm_user_pin(), |
| 451 &config_properties); | 452 pkcs11_id.empty() ? NULL : &pkcs11_id, |
| 453 &config_properties); |
| 452 } | 454 } |
| 453 } | 455 } |
| 454 | 456 |
| 455 if (type == shill::kTypeVPN) { | 457 if (type == shill::kTypeVPN) { |
| 456 // VPN may require a username, and/or passphrase to be set. (Check after | 458 // VPN may require a username, and/or passphrase to be set. (Check after |
| 457 // ensuring that any required certificates are configured). | 459 // ensuring that any required certificates are configured). |
| 458 DCHECK(provider_properties); | 460 DCHECK(provider_properties); |
| 459 if (VPNRequiresCredentials( | 461 if (VPNRequiresCredentials( |
| 460 service_path, vpn_provider_type, *provider_properties)) { | 462 service_path, vpn_provider_type, *provider_properties)) { |
| 461 NET_LOG_USER("VPN Requires Credentials", service_path); | 463 NET_LOG_USER("VPN Requires Credentials", service_path); |
| (...skipping 203 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 665 | 667 |
| 666 void NetworkConnectionHandler::HandleShillDisconnectSuccess( | 668 void NetworkConnectionHandler::HandleShillDisconnectSuccess( |
| 667 const std::string& service_path, | 669 const std::string& service_path, |
| 668 const base::Closure& success_callback) { | 670 const base::Closure& success_callback) { |
| 669 NET_LOG_EVENT("Disconnect Request Sent", service_path); | 671 NET_LOG_EVENT("Disconnect Request Sent", service_path); |
| 670 if (!success_callback.is_null()) | 672 if (!success_callback.is_null()) |
| 671 success_callback.Run(); | 673 success_callback.Run(); |
| 672 } | 674 } |
| 673 | 675 |
| 674 } // namespace chromeos | 676 } // namespace chromeos |
| OLD | NEW |