| Index: chrome/browser/chromeos/login/existing_user_controller.cc
|
| diff --git a/chrome/browser/chromeos/login/existing_user_controller.cc b/chrome/browser/chromeos/login/existing_user_controller.cc
|
| index 616c1955c78af4c87ffd0edf59914181c1831fad..60d2ea1d0dcc26c1965d6d08193a5e818f77f587 100644
|
| --- a/chrome/browser/chromeos/login/existing_user_controller.cc
|
| +++ b/chrome/browser/chromeos/login/existing_user_controller.cc
|
| @@ -290,7 +290,7 @@ void ExistingUserController::OnLoginFailure(const LoginFailure& failure) {
|
| bool is_known_user =
|
| UserManager::Get()->IsKnownUser(last_login_attempt_username_);
|
| NetworkLibrary* network = CrosLibrary::Get()->GetNetworkLibrary();
|
| - if (!network || !CrosLibrary::Get()->EnsureLoaded()) {
|
| + if (!network) {
|
| ShowError(IDS_LOGIN_ERROR_NO_NETWORK_LIBRARY, error);
|
| } else if (!network->Connected()) {
|
| if (is_known_user)
|
| @@ -586,15 +586,13 @@ void ExistingUserController::SetOwnerUserInCryptohome() {
|
| // Another attempt will be invoked after verification completion.
|
| return;
|
| }
|
| - if (CrosLibrary::Get()->EnsureLoaded()) {
|
| - CryptohomeLibrary* cryptohomed = CrosLibrary::Get()->GetCryptohomeLibrary();
|
| - cryptohomed->AsyncSetOwnerUser(
|
| - UserCrosSettingsProvider::cached_owner(), NULL);
|
| -
|
| - // Do not invoke AsyncDoAutomaticFreeDiskSpaceControl(NULL) here
|
| - // so it does not delay the following mount. Cleanup will be
|
| - // started in Cryptohomed by timer.
|
| - }
|
| + CryptohomeLibrary* cryptohomed = CrosLibrary::Get()->GetCryptohomeLibrary();
|
| + cryptohomed->AsyncSetOwnerUser(
|
| + UserCrosSettingsProvider::cached_owner(), NULL);
|
| +
|
| + // Do not invoke AsyncDoAutomaticFreeDiskSpaceControl(NULL) here
|
| + // so it does not delay the following mount. Cleanup will be
|
| + // started in Cryptohomed by timer.
|
| }
|
|
|
| } // namespace chromeos
|
|
|