Chromium Code Reviews| Index: net/ssl/ssl_platform_key_mac.cc |
| diff --git a/net/ssl/ssl_platform_key_mac.cc b/net/ssl/ssl_platform_key_mac.cc |
| index 2f2974c47582208b96caf0e4c1554165268dc19b..7da9a7749f2df67f5083f5b5359841bc39000510 100644 |
| --- a/net/ssl/ssl_platform_key_mac.cc |
| +++ b/net/ssl/ssl_platform_key_mac.cc |
| @@ -36,6 +36,9 @@ namespace net { |
| namespace { |
| +base::LazyInstance<SSLPlatformKeyTaskRunner>::Leaky g_platform_key_task_runner = |
| + LAZY_INSTANCE_INITIALIZER; |
| + |
| class ScopedCSSM_CC_HANDLE { |
| public: |
| ScopedCSSM_CC_HANDLE() : handle_(0) {} |
| @@ -212,9 +215,12 @@ class SSLPlatformKeyMac : public ThreadedSSLPrivateKey::Delegate { |
| } // namespace |
| -scoped_ptr<SSLPrivateKey> FetchClientCertPrivateKey( |
| - X509Certificate* certificate, |
| - scoped_refptr<base::SequencedTaskRunner> task_runner) { |
| +scoped_refptr<SSLPrivateKey> FetchClientCertPrivateKey( |
| + X509Certificate* certificate) { |
| + if (!certificate) { |
|
davidben
2015/09/25 20:10:12
Any reason not to have the caller handle null? Thi
svaldez
2015/09/28 16:54:53
Then we'd have to check both at the caller that th
davidben
2015/10/13 20:32:15
In general, APIs shouldn't silently try to handle
svaldez
2015/10/14 15:06:18
Done.
|
| + return nullptr; |
| + } |
| + |
| // Look up the private key. |
| base::ScopedCFTypeRef<SecKeyRef> private_key( |
| FetchSecKeyRefForCertificate(certificate)); |
| @@ -231,9 +237,9 @@ scoped_ptr<SSLPrivateKey> FetchClientCertPrivateKey( |
| LOG(ERROR) << "Unknown key type: " << cssm_key->KeyHeader.AlgorithmId; |
| return nullptr; |
| } |
| - return make_scoped_ptr(new ThreadedSSLPrivateKey( |
| + return make_scoped_refptr(new ThreadedSSLPrivateKey( |
| make_scoped_ptr(new SSLPlatformKeyMac(private_key.get(), cssm_key)), |
| - task_runner.Pass())); |
| + g_platform_key_task_runner.Get().task_runner().Pass())); |
| } |
| } // namespace net |