| Index: extensions/common/api/networking_private.idl
|
| diff --git a/extensions/common/api/networking_private.idl b/extensions/common/api/networking_private.idl
|
| index a6a35571024797fc5a05334dc20f3da0fec32628..b63f3671de6b76a422d33672f7c199c87c3b3ea7 100644
|
| --- a/extensions/common/api/networking_private.idl
|
| +++ b/extensions/common/api/networking_private.idl
|
| @@ -229,6 +229,7 @@ namespace networkingPrivate {
|
| dictionary EAPProperties {
|
| DOMString? AnonymousIdentity;
|
| CertificatePattern? ClientCertPattern;
|
| + DOMString? ClientCertPKCS11Id;
|
| DOMString? ClientCertRef;
|
| DOMString? ClientCertType;
|
| DOMString? Identity;
|
| @@ -248,6 +249,7 @@ namespace networkingPrivate {
|
| dictionary ManagedEAPProperties {
|
| ManagedDOMString? AnonymousIdentity;
|
| ManagedCertificatePattern? ClientCertPattern;
|
| + ManagedDOMString? ClientCertPKCS11Id;
|
| ManagedDOMString? ClientCertRef;
|
| ManagedDOMString? ClientCertType;
|
| ManagedDOMString? Identity;
|
| @@ -833,6 +835,34 @@ namespace networkingPrivate {
|
| boolean? AllowOnlyPolicyNetworksToConnect;
|
| };
|
|
|
| + dictionary Certificate {
|
| + // Unique hash for the certificate.
|
| + DOMString hash;
|
| +
|
| + // Certificate issuer common name.
|
| + DOMString issuedBy;
|
| +
|
| + // Certificate name or nickname.
|
| + DOMString issuedTo;
|
| +
|
| + // PEM for server ca certificatess.
|
| + DOMString? pem;
|
| +
|
| + // PKCS#11 id for user certificates.
|
| + DOMString? PKCS11Id;
|
| +
|
| + // Whether or not the certificate is hardware backed.
|
| + boolean hardwareBacked;
|
| + };
|
| +
|
| + dictionary CertificateLists {
|
| + // Certificates available for the ServerCA property.
|
| + Certificate[] server_ca_certificates;
|
| +
|
| + // Certificates available for the UserCert property.
|
| + Certificate[] user_certificates;
|
| + };
|
| +
|
| callback VoidCallback = void();
|
| callback BooleanCallback = void(boolean result);
|
| callback StringCallback = void(DOMString result);
|
| @@ -846,6 +876,7 @@ namespace networkingPrivate {
|
| callback GetEnabledNetworkTypesCallback = void(NetworkType[] result);
|
| callback CaptivePortalStatusCallback = void(CaptivePortalStatus result);
|
| callback GetGlobalPolicyCallback = void(GlobalPolicy result);
|
| + callback GetCertificateListsCallback = void(CertificateLists result);
|
|
|
| // These functions all report failures via chrome.runtime.lastError.
|
| interface Functions {
|
| @@ -1071,6 +1102,9 @@ namespace networkingPrivate {
|
| // Gets the global policy properties. These properties are not expected to
|
| // change during a session.
|
| static void getGlobalPolicy(GetGlobalPolicyCallback callback);
|
| +
|
| + // Gets the lists of certificates available for network configuration.
|
| + static void getCertificateLists(GetCertificateListsCallback callback);
|
| };
|
|
|
| interface Events {
|
| @@ -1090,5 +1124,8 @@ namespace networkingPrivate {
|
| // the network and the corresponding captive portal status.
|
| static void onPortalDetectionCompleted(DOMString networkGuid,
|
| CaptivePortalStatus status);
|
| +
|
| + // Fired when any certificate list has changed.
|
| + static void onCertificateListsChanged();
|
| };
|
| };
|
|
|