Home | History | Annotate | Download | only in onc

Lines Matching defs:onc

5 #include "chromeos/network/onc/onc_validator.h"
13 #include "chromeos/network/onc/onc_signature.h"
14 #include "chromeos/network/onc/onc_test_utils.h"
15 #include "chromeos/network/onc/onc_utils.h"
16 #include "components/onc/onc_constants.h"
20 namespace onc {
33 ::onc::ONCSource onc_source) {
80 ::onc::ONCSource onc_source = ::onc::ONC_SOURCE_NONE)
90 ::onc::ONCSource onc_source;
93 ::std::ostream& operator<<(::std::ostream& os, const OncParams& onc) {
94 return os << "(" << onc.location << ", " << onc.signature << ", "
95 << (onc.is_managed ? "managed" : "unmanaged") << ", "
96 << GetSourceAsString(onc.onc_source) << ")";
102 // ONC toplevel object.
105 &kToplevelConfigurationSignature, false, ::onc::ONC_SOURCE_NONE);
109 // This test case is about validating valid ONC objects without any errors. Both
116 OncParams onc = GetParam();
117 Validate(true, test_utils::ReadTestDictionary(onc.location), onc.signature,
118 onc.is_managed, onc.onc_source);
123 OncParams onc = GetParam();
124 Validate(false, test_utils::ReadTestDictionary(onc.location), onc.signature,
125 onc.is_managed, onc.onc_source);
130 // OncParams(string: Filename of a ONC file that is to be validated,
131 // OncValueSignature: signature of that ONC,
132 // bool: true if the ONC is managed).
137 OncParams("managed_toplevel1.onc",
140 OncParams("managed_toplevel2.onc",
143 OncParams("managed_toplevel_with_global_config.onc",
148 OncParams("managed_toplevel_wifi_peap.onc",
151 ::onc::ONC_SOURCE_DEVICE_POLICY),
152 OncParams("managed_toplevel_l2tpipsec.onc",
155 OncParams("toplevel_wifi_wpa_psk.onc",
158 OncParams("toplevel_wifi_wep_proxy.onc",
161 OncParams("toplevel_wifi_leap.onc",
164 OncParams("toplevel_wifi_eap_clientcert_with_cert_pems.onc",
167 OncParams("toplevel_wifi_remove.onc",
170 OncParams("toplevel_wifi_open.onc",
173 OncParams("toplevel_openvpn_clientcert_with_cert_pems.onc",
176 OncParams("toplevel_empty.onc",
179 OncParams("toplevel_only_global_config.onc",
182 OncParams("encrypted.onc", &kToplevelConfigurationSignature, true),
183 OncParams("managed_vpn.onc", &kNetworkConfigurationSignature, true),
184 OncParams("ethernet.onc", &kNetworkConfigurationSignature, true),
185 OncParams("ethernet_with_eap.onc",
188 OncParams("translation_of_shill_ethernet_with_ipconfig.onc",
191 OncParams("translation_of_shill_wifi_with_state.onc",
194 OncParams("valid_openvpn_with_cert_pems.onc",
221 // This test case is about validating ONC objects that contain errors which can
245 OncParams onc = GetParam().first;
246 Validate(true, GetDictionaryFromTestFile(onc.location), onc.signature,
247 onc.is_managed, onc.onc_source);
257 OncParams onc = GetParam().first;
258 Validate(false, GetDictionaryFromTestFile(onc.location), onc.signature,
259 onc.is_managed, onc.onc_source);
272 // OncValueSignature: signature of that ONC,
273 // bool: true if the ONC is managed).
337 ::onc::ONC_SOURCE_DEVICE_POLICY),
365 // Ignore recommended arrays in unmanaged ONC.
373 ::onc
378 ::onc::ONC_SOURCE_DEVICE_POLICY),
432 ::onc::ONC_SOURCE_DEVICE_POLICY),
439 } // namespace onc