Chromium Code Reviews| Index: chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
| diff --git a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
| index 740b19b2d518715b1b4165316719452551e4cc67..db5743882a3439119ee9566076160c821b584727 100644 |
| --- a/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
| +++ b/chrome/browser/extensions/api/enterprise_platform_keys_private/enterprise_platform_keys_private_api.cc |
| @@ -70,7 +70,8 @@ void EPKPChallengeKeyBase::GetDeviceAttestationEnabled( |
| break; |
| } |
| - MessageLoop::current()->PostTask(FROM_HERE, base::Bind(callback, value)); |
| + base::MessageLoop::current()->PostTask(FROM_HERE, |
| + base::Bind(callback, value)); |
| } |
| bool EPKPChallengeKeyBase::IsEnterpriseDevice() const { |
| @@ -237,10 +238,14 @@ void EPKPChallengeUserKey::GetDeviceAttestationEnabledCallback( |
| // If remote attestation is enabled at the device level, we don't need to |
| // ask for user consent. |
| - MessageLoop::current()->PostTask( |
| + base::MessageLoop::current()->PostTask( |
| FROM_HERE, |
| - base::Bind(&EPKPChallengeUserKey::UserConsentCallback, this, |
| - challenge, register_key, domain, true)); |
| + base::Bind(&EPKPChallengeUserKey::UserConsentCallback, |
|
brettw
2013/04/28 04:26:27
Old wrapping was fine.
|
| + this, |
| + challenge, |
| + register_key, |
| + domain, |
| + true)); |
| } |
| void EPKPChallengeUserKey::UserConsentCallback(const std::string& challenge, |
| @@ -281,10 +286,13 @@ void EPKPChallengeUserKey::SignChallengeCallback(bool register_key, |
| kKeyName, |
| base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, this, response)); |
| } else { |
| - MessageLoop::current()->PostTask( |
| + base::MessageLoop::current()->PostTask( |
| FROM_HERE, |
| - base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, this, |
| - response, true, cryptohome::MOUNT_ERROR_NONE)); |
| + base::Bind(&EPKPChallengeUserKey::RegisterKeyCallback, |
| + this, |
|
brettw
2013/04/28 04:26:27
Ditto
|
| + response, |
| + true, |
| + cryptohome::MOUNT_ERROR_NONE)); |
| } |
| } |
| @@ -313,7 +321,8 @@ void EPKPChallengeUserKey::AskForUserConsent( |
| const base::Callback<void(bool)>& callback) { |
| // TODO(davidyu): right now we just simply reject the request before we have |
| // a way to ask for user consent. |
| - MessageLoop::current()->PostTask(FROM_HERE, base::Bind(callback, false)); |
| + base::MessageLoop::current()->PostTask(FROM_HERE, |
| + base::Bind(callback, false)); |
| } |
| bool EPKPChallengeUserKey::IsExtensionWhitelisted() const { |