Index: chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
diff --git a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
index 740b19b2d518715b1b4165316719452551e4cc67..db5743882a3439119ee9566076160c821b584727 100644 |
--- a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
+++ b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
@@ -70,7 +70,8 @@ void EPKPChallengeKeyBase::GetDeviceAttestationEnabled( |
break; |
} |
- MessageLoop::current()->PostTask(FROM_HERE, base::Bind(callback, value)); |
+ base::MessageLoop::current()->PostTask(FROM_HERE, |
+ base::Bind(callback, value)); |
} |
bool EPKPChallengeKeyBase::IsEnterpriseDevice() const { |
@@ -237,10 +238,14 @@ void EPKPChallengeUserKey::GetDeviceAttestationEnabledCallback( |
// If remote attestation is enabled at the device level, we don't need to |
// ask for user consent. |
- MessageLoop::current()->PostTask( |
+ base::MessageLoop::current()->PostTask( |
FROM_HERE, |
- base::Bind(&EPKPChallengeUserKey::UserConsentCallback, this, |
- challenge, register_key, domain, true)); |
+ base::Bind(&EPKPChallengeUserKey::UserConsentCallback, |
brettw
2013/04/28 04:26:27
Old wrapping was fine.
|
+ this, |
+ challenge, |
+ register_key, |
+ domain, |
+ true)); |
} |
void EPKPChallengeUserKey::UserConsentCallback(const std::string& challenge, |
@@ -281,10 +286,13 @@ void EPKPChallengeUserKey::SignChallengeCallback(bool register_key, |
kKeyName, |
base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, this, response)); |
} else { |
- MessageLoop::current()->PostTask( |
+ base::MessageLoop::current()->PostTask( |
FROM_HERE, |
- base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, this, |
- response, true, cryptohome::MOUNT_ERROR_NONE)); |
+ base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, |
+ this, |
brettw
2013/04/28 04:26:27
Ditto
|
+ response, |
+ true, |
+ cryptohome::MOUNT_ERROR_NONE)); |
} |
} |
@@ -313,7 +321,8 @@ void EPKPChallengeUserKey::AskForUserConsent( |
const base::Callback<void(bool)>& callback) { |
// TODO(davidyu): right now we just simply reject the request before we have |
// a way to ask for user consent. |
- MessageLoop::current()->PostTask(FROM_HERE, base::Bind(callback, false)); |
+ base::MessageLoop::current()->PostTask(FROM_HERE, |
+ base::Bind(callback, false)); |
} |
bool EPKPChallengeUserKey::IsExtensionWhitelisted() const { |