Index: chrome/browser/profiles/profile_io_data.cc |
diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc |
index 5c854107903727ee32bf221053364e4ab5c3be17..20d93b9a2c49d8247c1d0c1e70ce7f27e9f92ba4 100644 |
--- a/chrome/browser/profiles/profile_io_data.cc |
+++ b/chrome/browser/profiles/profile_io_data.cc |
@@ -513,7 +513,7 @@ void ProfileIOData::InitializeOnUIThread(Profile* profile) { |
scoped_ptr<policy::PolicyCertVerifier> verifier = |
policy::PolicyCertServiceFactory::CreateForProfile(profile); |
policy_cert_verifier_ = verifier.get(); |
- cert_verifier_ = verifier.Pass(); |
+ cert_verifier_ = std::move(verifier); |
#endif |
// The URLBlacklistManager has to be created on the UI thread to register |
// observers of |pref_service|, and it also has to clean up on |
@@ -1097,7 +1097,7 @@ void ProfileIOData::Init( |
if (use_system_key_slot_) |
EnableNSSSystemKeySlotForResourceContext(resource_context_.get()); |
- certificate_provider_ = profile_params_->certificate_provider.Pass(); |
+ certificate_provider_ = std::move(profile_params_->certificate_provider); |
#endif |
if (g_cert_verifier_for_testing) { |
@@ -1109,7 +1109,7 @@ void ProfileIOData::Init( |
// The private slot won't be ready by this point. It shouldn't be necessary |
// for cert trust purposes anyway. |
scoped_refptr<net::CertVerifyProc> verify_proc( |
- new chromeos::CertVerifyProcChromeOS(public_slot.Pass())); |
+ new chromeos::CertVerifyProcChromeOS(std::move(public_slot))); |
if (policy_cert_verifier_) { |
DCHECK_EQ(policy_cert_verifier_, cert_verifier_.get()); |
policy_cert_verifier_->InitializeOnIOThread(verify_proc); |