Index: chrome/browser/profiles/profile_io_data.cc |
diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc |
index 6e00398f8c9c295b45af38a05a01f6373cf3cc84..b0efb648e1b64ad4db9dc5c7346c5165f63df50c 100644 |
--- a/chrome/browser/profiles/profile_io_data.cc |
+++ b/chrome/browser/profiles/profile_io_data.cc |
@@ -103,6 +103,8 @@ |
#include "chromeos/settings/cros_settings_names.h" |
#include "crypto/nss_util.h" |
#include "crypto/nss_util_internal.h" |
+#include "net/cert/cert_verify_proc_chromeos.h" |
+#include "net/cert/multi_threaded_cert_verifier.h" |
#include "net/ssl/client_cert_store_chromeos.h" |
#endif // defined(OS_CHROMEOS) |
@@ -960,14 +962,21 @@ void ProfileIOData::Init(content::ProtocolHandlerMap* protocol_handlers) const { |
#endif |
#if defined(OS_CHROMEOS) |
+ username_hash_ = profile_params_->username_hash; |
+ crypto::ScopedPK11Slot public_slot = |
+ crypto::GetPublicSlotForChromeOSUser(username_hash_); |
+ // Private slot won't be ready by this point, just pass NULL. It shouldn't be |
+ // necessary for cert trust purposes anyway. |
+ scoped_refptr<net::CertVerifyProc> verify_proc = |
+ new net::CertVerifyProcChromeOS(public_slot.Pass(), |
+ crypto::ScopedPK11Slot()); |
if (cert_verifier_) { |
- cert_verifier_->InitializeOnIOThread(); |
+ cert_verifier_->InitializeOnIOThread(verify_proc.get()); |
main_request_context_->set_cert_verifier(cert_verifier_.get()); |
} else { |
main_request_context_->set_cert_verifier( |
- io_thread_globals->cert_verifier.get()); |
+ new net::MultiThreadedCertVerifier(verify_proc.get())); |
} |
- username_hash_ = profile_params_->username_hash; |
#else |
main_request_context_->set_cert_verifier( |
io_thread_globals->cert_verifier.get()); |