Index: chromeos/network/client_cert_util.h |
diff --git a/chromeos/network/client_cert_util.h b/chromeos/network/client_cert_util.h |
index e687e060a1c6b0bc496f20e65eafb94a5c335504..c8e9779becc0e1cc3d2c14c8d0388918bfce15d0 100644 |
--- a/chromeos/network/client_cert_util.h |
+++ b/chromeos/network/client_cert_util.h |
@@ -11,6 +11,7 @@ |
#include "base/memory/ref_counted.h" |
#include "chromeos/chromeos_export.h" |
#include "chromeos/network/certificate_pattern.h" |
+#include "components/onc/onc_constants.h" |
namespace base { |
class DictionaryValue; |
@@ -50,6 +51,9 @@ struct CHROMEOS_EXPORT ClientCertConfig { |
// The value of kIdentity, to enable substitutions. |
std::string policy_identity; |
+ |
+ // true if the source of this ClientCertConfig is device ONC. |
+ bool source_is_device_policy_; |
emaxx
2017/04/20 20:10:39
Maybe just including ONCSource here would be bette
emaxx
2017/04/20 20:10:39
nit: The trailing underscore is extra.
pmarko
2017/04/24 14:49:56
Done. (both - renamed to onc_source)
|
}; |
// Returns true only if any fields set in this pattern match exactly with |
@@ -99,6 +103,7 @@ bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, |
// Determines the type of the CertificatePattern configuration, i.e. is it a |
// pattern within an EAP, IPsec or OpenVPN configuration. |
CHROMEOS_EXPORT void OncToClientCertConfig( |
+ ::onc::ONCSource onc_source, |
const base::DictionaryValue& network_config, |
ClientCertConfig* cert_config); |