| Index: chromeos/network/onc/onc_validator.cc
|
| diff --git a/chromeos/network/onc/onc_validator.cc b/chromeos/network/onc/onc_validator.cc
|
| index 5f7aa9663d6034d85047b5d212279a3763b263ae..d02f8e04c78bb4756301eee883e6a22f71439be3 100644
|
| --- a/chromeos/network/onc/onc_validator.cc
|
| +++ b/chromeos/network/onc/onc_validator.cc
|
| @@ -103,34 +103,37 @@ scoped_ptr<base::DictionaryValue> Validator::MapObject(
|
|
|
| bool valid = ValidateObjectDefault(signature, onc_object, repaired.get());
|
| if (valid) {
|
| - if (&signature == &kToplevelConfigurationSignature)
|
| + if (&signature == &kToplevelConfigurationSignature) {
|
| valid = ValidateToplevelConfiguration(repaired.get());
|
| - else if (&signature == &kNetworkConfigurationSignature)
|
| + } else if (&signature == &kNetworkConfigurationSignature) {
|
| valid = ValidateNetworkConfiguration(repaired.get());
|
| - else if (&signature == &kEthernetSignature)
|
| + } else if (&signature == &kEthernetSignature) {
|
| valid = ValidateEthernet(repaired.get());
|
| - else if (&signature == &kIPConfigSignature)
|
| + } else if (&signature == &kIPConfigSignature ||
|
| + &signature == &kSavedIPConfigSignature ||
|
| + &signature == &kStaticIPConfigSignature) {
|
| valid = ValidateIPConfig(repaired.get());
|
| - else if (&signature == &kWiFiSignature)
|
| + } else if (&signature == &kWiFiSignature) {
|
| valid = ValidateWiFi(repaired.get());
|
| - else if (&signature == &kVPNSignature)
|
| + } else if (&signature == &kVPNSignature) {
|
| valid = ValidateVPN(repaired.get());
|
| - else if (&signature == &kIPsecSignature)
|
| + } else if (&signature == &kIPsecSignature) {
|
| valid = ValidateIPsec(repaired.get());
|
| - else if (&signature == &kOpenVPNSignature)
|
| + } else if (&signature == &kOpenVPNSignature) {
|
| valid = ValidateOpenVPN(repaired.get());
|
| - else if (&signature == &kVerifyX509Signature)
|
| + } else if (&signature == &kVerifyX509Signature) {
|
| valid = ValidateVerifyX509(repaired.get());
|
| - else if (&signature == &kCertificatePatternSignature)
|
| + } else if (&signature == &kCertificatePatternSignature) {
|
| valid = ValidateCertificatePattern(repaired.get());
|
| - else if (&signature == &kProxySettingsSignature)
|
| + } else if (&signature == &kProxySettingsSignature) {
|
| valid = ValidateProxySettings(repaired.get());
|
| - else if (&signature == &kProxyLocationSignature)
|
| + } else if (&signature == &kProxyLocationSignature) {
|
| valid = ValidateProxyLocation(repaired.get());
|
| - else if (&signature == &kEAPSignature)
|
| + } else if (&signature == &kEAPSignature) {
|
| valid = ValidateEAP(repaired.get());
|
| - else if (&signature == &kCertificateSignature)
|
| + } else if (&signature == &kCertificateSignature) {
|
| valid = ValidateCertificate(repaired.get());
|
| + }
|
| }
|
|
|
| if (valid) {
|
|
|