Index: chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
diff --git a/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h b/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
index a216297529f180b2b935b0004627442215ff1dd9..94011c95842e1737cd46516152fc563848ce9f18 100644 |
--- a/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
+++ b/chrome/browser/chromeos/policy/enrollment_handler_chromeos.h |
@@ -115,13 +115,14 @@ class EnrollmentHandlerChromeOS : public CloudPolicyClient::Observer, |
STEP_VALIDATION = 5, // Policy validation. |
STEP_ROBOT_AUTH_FETCH = 6, // Fetching device API auth code. |
STEP_ROBOT_AUTH_REFRESH = 7, // Fetching device API refresh token. |
- STEP_AD_DOMAIN_JOIN = 8, // Joining Active Directory domain. |
- STEP_LOCK_DEVICE = 9, // Writing installation-time attributes. |
- STEP_STORE_TOKEN = 10, // Encrypting and storing DM token. |
- STEP_STORE_ROBOT_AUTH = 11, // Encrypting & writing robot refresh token. |
- STEP_STORE_POLICY = 12, // Storing policy and API refresh token. For |
+ STEP_SET_FWMP_DATA = 8, // Setting the firmware management parameters. |
+ STEP_AD_DOMAIN_JOIN = 9, // Joining Active Directory domain. |
+ STEP_LOCK_DEVICE = 10, // Writing installation-time attributes. |
+ STEP_STORE_TOKEN = 11, // Encrypting and storing DM token. |
+ STEP_STORE_ROBOT_AUTH = 12, // Encrypting & writing robot refresh token. |
+ STEP_STORE_POLICY = 13, // Storing policy and API refresh token. For |
// AD, includes policy fetch via authpolicyd. |
- STEP_FINISHED = 13, // Enrollment process done, no further action. |
+ STEP_FINISHED = 14, // Enrollment process done, no further action. |
}; |
// Handles the response to a request for server-backed state keys. |
@@ -142,6 +143,19 @@ class EnrollmentHandlerChromeOS : public CloudPolicyClient::Observer, |
// successful. |
void HandlePolicyValidationResult(DeviceCloudPolicyValidator* validator); |
+ // Updates the firmware management partition from TPM, setting the data |
+ // according to devmode. |
+ void SetFwmpData(); |
Daniel Erat
2017/03/06 21:18:26
nit: mind expanding the acronym in these names too
igorcov
2017/03/09 12:22:57
Done.
|
+ |
+ // Invoked after the firmware management partition in TPM is updated. |
+ void OnFwmpDataSet(chromeos::DBusMethodCallStatus call_status, |
+ bool result, |
+ const cryptohome::BaseReply& reply); |
+ |
+ // Returns whether block_devmode is set. Can be invoked after the policy is |
+ // retrieved. |
+ bool GetBlockDevmode(); |
+ |
// Start joining the Active Directory domain in case the device is enrolling |
// into Active Directory management mode. |
void StartJoinAdDomain(); |