Chromium Code Reviews| Index: chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
| diff --git a/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h b/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
| index a216297529f180b2b935b0004627442215ff1dd9..94011c95842e1737cd46516152fc563848ce9f18 100644 |
| --- a/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
| +++ b/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
| @@ -115,13 +115,14 @@ class EnrollmentHandlerChromeOS : public CloudPolicyClient::Observer, |
| STEP_VALIDATION = 5, // Policy validation. |
| STEP_ROBOT_AUTH_FETCH = 6, // Fetching device API auth code. |
| STEP_ROBOT_AUTH_REFRESH = 7, // Fetching device API refresh token. |
| - STEP_AD_DOMAIN_JOIN = 8, // Joining Active Directory domain. |
| - STEP_LOCK_DEVICE = 9, // Writing installation-time attributes. |
| - STEP_STORE_TOKEN = 10, // Encrypting and storing DM token. |
| - STEP_STORE_ROBOT_AUTH = 11, // Encrypting & writing robot refresh token. |
| - STEP_STORE_POLICY = 12, // Storing policy and API refresh token. For |
| + STEP_SET_FWMP_DATA = 8, // Setting the firmware management parameters. |
| + STEP_AD_DOMAIN_JOIN = 9, // Joining Active Directory domain. |
| + STEP_LOCK_DEVICE = 10, // Writing installation-time attributes. |
| + STEP_STORE_TOKEN = 11, // Encrypting and storing DM token. |
| + STEP_STORE_ROBOT_AUTH = 12, // Encrypting & writing robot refresh token. |
| + STEP_STORE_POLICY = 13, // Storing policy and API refresh token. For |
| // AD, includes policy fetch via authpolicyd. |
| - STEP_FINISHED = 13, // Enrollment process done, no further action. |
| + STEP_FINISHED = 14, // Enrollment process done, no further action. |
| }; |
| // Handles the response to a request for server-backed state keys. |
| @@ -142,6 +143,19 @@ class EnrollmentHandlerChromeOS : public CloudPolicyClient::Observer, |
| // successful. |
| void HandlePolicyValidationResult(DeviceCloudPolicyValidator* validator); |
| + // Updates the firmware management partition from TPM, setting the data |
| + // according to devmode. |
| + void SetFwmpData(); |
|
Daniel Erat
2017/03/06 21:18:26
nit: mind expanding the acronym in these names too
igorcov
2017/03/09 12:22:57
Done.
|
| + |
| + // Invoked after the firmware management partition in TPM is updated. |
| + void OnFwmpDataSet(chromeos::DBusMethodCallStatus call_status, |
| + bool result, |
| + const cryptohome::BaseReply& reply); |
| + |
| + // Returns whether block_devmode is set. Can be invoked after the policy is |
| + // retrieved. |
| + bool GetBlockDevmode(); |
| + |
| // Start joining the Active Directory domain in case the device is enrolling |
| // into Active Directory management mode. |
| void StartJoinAdDomain(); |