| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/options/vpn_config_view.h" | 5 #include "chrome/browser/chromeos/options/vpn_config_view.h" |
| 6 | 6 |
| 7 #include "ash/system/chromeos/network/network_connect.h" | 7 #include "ash/system/chromeos/network/network_connect.h" |
| 8 #include "base/bind.h" | 8 #include "base/bind.h" |
| 9 #include "base/strings/string_util.h" | 9 #include "base/strings/string_util.h" |
| 10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
| (...skipping 819 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 830 shill::kL2tpIpsecUserProperty, user_name); | 830 shill::kL2tpIpsecUserProperty, user_name); |
| 831 } | 831 } |
| 832 if (!user_passphrase.empty()) { | 832 if (!user_passphrase.empty()) { |
| 833 properties->SetStringWithoutPathExpansion( | 833 properties->SetStringWithoutPathExpansion( |
| 834 shill::kL2tpIpsecPasswordProperty, user_passphrase); | 834 shill::kL2tpIpsecPasswordProperty, user_passphrase); |
| 835 } | 835 } |
| 836 break; | 836 break; |
| 837 } | 837 } |
| 838 case PROVIDER_TYPE_INDEX_L2TP_IPSEC_USER_CERT: { | 838 case PROVIDER_TYPE_INDEX_L2TP_IPSEC_USER_CERT: { |
| 839 std::string ca_cert_pem = GetServerCACertPEM(); | 839 std::string ca_cert_pem = GetServerCACertPEM(); |
| 840 if (!ca_cert_pem.empty()) { | 840 base::ListValue* pem_list = new base::ListValue; |
| 841 base::ListValue* pem_list = new base::ListValue; | 841 if (!ca_cert_pem.empty()) |
| 842 pem_list->AppendString(ca_cert_pem); | 842 pem_list->AppendString(ca_cert_pem); |
| 843 properties->SetWithoutPathExpansion( | 843 properties->SetWithoutPathExpansion(shill::kL2tpIpsecCaCertPemProperty, |
| 844 shill::kL2tpIpsecCaCertPemProperty, pem_list); | 844 pem_list); |
| 845 } | |
| 846 SetUserCertProperties(client_cert::CONFIG_TYPE_IPSEC, properties); | 845 SetUserCertProperties(client_cert::CONFIG_TYPE_IPSEC, properties); |
| 847 if (!group_name.empty()) { | 846 if (!group_name.empty()) { |
| 848 properties->SetStringWithoutPathExpansion( | 847 properties->SetStringWithoutPathExpansion( |
| 849 shill::kL2tpIpsecTunnelGroupProperty, GetGroupName()); | 848 shill::kL2tpIpsecTunnelGroupProperty, GetGroupName()); |
| 850 } | 849 } |
| 851 if (!user_name.empty()) { | 850 if (!user_name.empty()) { |
| 852 properties->SetStringWithoutPathExpansion( | 851 properties->SetStringWithoutPathExpansion( |
| 853 shill::kL2tpIpsecUserProperty, user_name); | 852 shill::kL2tpIpsecUserProperty, user_name); |
| 854 } | 853 } |
| 855 if (!user_passphrase.empty()) { | 854 if (!user_passphrase.empty()) { |
| 856 properties->SetStringWithoutPathExpansion( | 855 properties->SetStringWithoutPathExpansion( |
| 857 shill::kL2tpIpsecPasswordProperty, user_passphrase); | 856 shill::kL2tpIpsecPasswordProperty, user_passphrase); |
| 858 } | 857 } |
| 859 break; | 858 break; |
| 860 } | 859 } |
| 861 case PROVIDER_TYPE_INDEX_OPEN_VPN: { | 860 case PROVIDER_TYPE_INDEX_OPEN_VPN: { |
| 862 std::string ca_cert_pem = GetServerCACertPEM(); | 861 std::string ca_cert_pem = GetServerCACertPEM(); |
| 863 if (!ca_cert_pem.empty()) { | 862 base::ListValue* pem_list = new base::ListValue; |
| 864 base::ListValue* pem_list = new base::ListValue; | 863 if (!ca_cert_pem.empty()) |
| 865 pem_list->AppendString(ca_cert_pem); | 864 pem_list->AppendString(ca_cert_pem); |
| 866 properties->SetWithoutPathExpansion( | 865 properties->SetWithoutPathExpansion(shill::kOpenVPNCaCertPemProperty, |
| 867 shill::kOpenVPNCaCertPemProperty, pem_list); | 866 pem_list); |
| 868 } | |
| 869 SetUserCertProperties(client_cert::CONFIG_TYPE_OPENVPN, properties); | 867 SetUserCertProperties(client_cert::CONFIG_TYPE_OPENVPN, properties); |
| 870 properties->SetStringWithoutPathExpansion( | 868 properties->SetStringWithoutPathExpansion( |
| 871 shill::kOpenVPNUserProperty, GetUsername()); | 869 shill::kOpenVPNUserProperty, GetUsername()); |
| 872 if (!user_passphrase.empty()) { | 870 if (!user_passphrase.empty()) { |
| 873 properties->SetStringWithoutPathExpansion( | 871 properties->SetStringWithoutPathExpansion( |
| 874 shill::kOpenVPNPasswordProperty, user_passphrase); | 872 shill::kOpenVPNPasswordProperty, user_passphrase); |
| 875 } | 873 } |
| 876 std::string otp = GetOTP(); | 874 std::string otp = GetOTP(); |
| 877 if (!otp.empty()) { | 875 if (!otp.empty()) { |
| 878 properties->SetStringWithoutPathExpansion( | 876 properties->SetStringWithoutPathExpansion( |
| (...skipping 185 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1064 property_ui_data->ParseOncProperty( | 1062 property_ui_data->ParseOncProperty( |
| 1065 onc_source, | 1063 onc_source, |
| 1066 onc, | 1064 onc, |
| 1067 base::StringPrintf("%s.%s.%s", | 1065 base::StringPrintf("%s.%s.%s", |
| 1068 ::onc::network_config::kVPN, | 1066 ::onc::network_config::kVPN, |
| 1069 dict_key.c_str(), | 1067 dict_key.c_str(), |
| 1070 key.c_str())); | 1068 key.c_str())); |
| 1071 } | 1069 } |
| 1072 | 1070 |
| 1073 } // namespace chromeos | 1071 } // namespace chromeos |
| OLD | NEW |