Index: chrome/browser/profiles/profile_io_data.cc |
diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc |
index f8a5dc80c24ce43d9d5d8aeacf1832f0195a4f10..a9775e0aa3bbc57d30846013fda6fa361448a245 100644 |
--- a/chrome/browser/profiles/profile_io_data.cc |
+++ b/chrome/browser/profiles/profile_io_data.cc |
@@ -970,12 +970,16 @@ void ProfileIOData::Init(content::ProtocolHandlerMap* protocol_handlers) const { |
#if defined(OS_CHROMEOS) |
username_hash_ = profile_params_->username_hash; |
- crypto::ScopedPK11Slot public_slot = |
- crypto::GetPublicSlotForChromeOSUser(username_hash_); |
- // The private slot won't be ready by this point. It shouldn't be necessary |
- // for cert trust purposes anyway. |
- scoped_refptr<net::CertVerifyProc> verify_proc = |
- new chromeos::CertVerifyProcChromeOS(public_slot.Pass()); |
+ scoped_refptr<net::CertVerifyProc> verify_proc; |
+ if (chromeos::UserManager::IsMultipleProfilesAllowed()) { |
+ crypto::ScopedPK11Slot public_slot = |
+ crypto::GetPublicSlotForChromeOSUser(username_hash_); |
+ // The private slot won't be ready by this point. It shouldn't be necessary |
+ // for cert trust purposes anyway. |
+ verify_proc = new chromeos::CertVerifyProcChromeOS(public_slot.Pass()); |
+ } else { |
+ verify_proc = net::CertVerifyProc::CreateDefault(); |
+ } |
if (cert_verifier_) { |
cert_verifier_->InitializeOnIOThread(verify_proc); |
main_request_context_->set_cert_verifier(cert_verifier_.get()); |