| Index: chrome/browser/profiles/profile_io_data.cc
|
| diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc
|
| index 6e00398f8c9c295b45af38a05a01f6373cf3cc84..b0efb648e1b64ad4db9dc5c7346c5165f63df50c 100644
|
| --- a/chrome/browser/profiles/profile_io_data.cc
|
| +++ b/chrome/browser/profiles/profile_io_data.cc
|
| @@ -103,6 +103,8 @@
|
| #include "chromeos/settings/cros_settings_names.h"
|
| #include "crypto/nss_util.h"
|
| #include "crypto/nss_util_internal.h"
|
| +#include "net/cert/cert_verify_proc_chromeos.h"
|
| +#include "net/cert/multi_threaded_cert_verifier.h"
|
| #include "net/ssl/client_cert_store_chromeos.h"
|
| #endif // defined(OS_CHROMEOS)
|
|
|
| @@ -960,14 +962,21 @@ void ProfileIOData::Init(content::ProtocolHandlerMap* protocol_handlers) const {
|
| #endif
|
|
|
| #if defined(OS_CHROMEOS)
|
| + username_hash_ = profile_params_->username_hash;
|
| + crypto::ScopedPK11Slot public_slot =
|
| + crypto::GetPublicSlotForChromeOSUser(username_hash_);
|
| + // Private slot won't be ready by this point, just pass NULL. It shouldn't be
|
| + // necessary for cert trust purposes anyway.
|
| + scoped_refptr<net::CertVerifyProc> verify_proc =
|
| + new net::CertVerifyProcChromeOS(public_slot.Pass(),
|
| + crypto::ScopedPK11Slot());
|
| if (cert_verifier_) {
|
| - cert_verifier_->InitializeOnIOThread();
|
| + cert_verifier_->InitializeOnIOThread(verify_proc.get());
|
| main_request_context_->set_cert_verifier(cert_verifier_.get());
|
| } else {
|
| main_request_context_->set_cert_verifier(
|
| - io_thread_globals->cert_verifier.get());
|
| + new net::MultiThreadedCertVerifier(verify_proc.get()));
|
| }
|
| - username_hash_ = profile_params_->username_hash;
|
| #else
|
| main_request_context_->set_cert_verifier(
|
| io_thread_globals->cert_verifier.get());
|
|
|