| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
So far only a single CA certificate was supported for EAP/IPsec/OpenVPN. Instead, we now support multiple CA certs. These are provided as a list of GUID references to CA certificates in the toplevel "Certificates" section.
BUG=276291
R=armansito@chromium.org, davidroche@chromium.org
Review URL: https://codereview.chromium.org/68343010
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240874 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Looking at IpsecManager::Initialize in platform/vpn-manager/ipsec_manager.cc, then a CA certificate for server verification is rejected if a PSK is set.
However, in ONC, the ServerCARef was silently ignored if PSK was used. This might unintentionally reduce security.
Note: ServerCARef from ONC maps to server_ca_file in IpsecManager::Initialize.
PSK from ONC maps to psk_file in IpsecManager::Initialize.
BUG=276291
R=bartfab@chromium.org
Review URL: https://codereview.chromium.org/62173002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240865 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
connection to hidden WiFi networks.
Defaults to TKIP encryption for WAPPSK and AES encryption for WAP2PSK. Exact encryption to use will have to be determined during Connect.
TBR=cpu@chromium.org for +third_party/libxml to DEPS.
BUG=267667
Review URL: https://codereview.chromium.org/105153002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240703 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Support the --verify-hash and --verify-x509-name options of OpenVPN via ONC.
Note that the ONC validator restricts the possible types passable to --verify-x509-name to "name", "name-prefix" and "subject". See also https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage .
BUG=276291
R=armansito@chromium.org, bartfab@chromium.org, pstew@chromium.org
Review URL: https://codereview.chromium.org/61903002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@234495 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This adds an autoconnect policy that disables autoconnect of unmanaged networks. As a device policy this applies to all shared networks. As a user policy it applies to all networks of this user.
With this commit the policy is applied on each restart and login. UI lockdown is still missing.
Configurations affecting several networks were not supported previously by ONC. Therefore, this commit adds the new toplevel section "GlobalNetworkConfiguration" to ONC.
BUG=280146
For API change:
R=bartfab@chromium.org
TBR=eroman@chromium.org
Review URL: https://codereview.chromium.org/23526016
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@229910 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds code to onc_translator_shill_to_onc.cc that handles a list of
nested objects and uses it to translate the Cellular.APNList property.
BUG=280359
Review URL: https://codereview.chromium.org/24248005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@228602 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
The code used to be clean, but new violations snuck in.
webrtc is still not clean, so we still can't turn on the warning.
BUG=none
NOTRY=true
Review URL: https://codereview.chromium.org/26286003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@228404 0039d316-1c4b-4281-b951-d872f2087c98
|
|
BUG=267667
Review URL: https://codereview.chromium.org/24600003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@227495 0039d316-1c4b-4281-b951-d872f2087c98
|