Index: chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.cc |
diff --git a/chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.cc b/chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.cc |
index 94a5e8957b10df57231bcdc59fea14c2f896dc16..d6479a613938f5deed7c0287b4f248b1d68b18ad 100644 |
--- a/chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.cc |
+++ b/chrome/browser/chromeos/login/easy_unlock/easy_unlock_key_manager.cc |
@@ -65,6 +65,7 @@ void EasyUnlockKeyManager::RefreshKeys(const UserContext& user_context, |
if (remote_devices.empty() || |
tpm_key_manager->PrepareTpmKey(false /* check_private_key */, |
do_refresh_keys)) { |
+ PA_LOG(WARNING) << "Refreshing keys..."; |
do_refresh_keys.Run(); |
} else { |
// In case Chrome is supposed to restart to apply user session flags, the |
@@ -73,6 +74,7 @@ void EasyUnlockKeyManager::RefreshKeys(const UserContext& user_context, |
// loading takes too much time. Note that in normal circumstances the |
// chances that TPM slot cannot be loaded should be extremely low. |
// TODO(tbarzic): Add some metrics to measure if the timeout even gets hit. |
+ PA_LOG(WARNING) << "Refresh keys after loading TPM..."; |
tpm_key_manager->StartGetSystemSlotTimeoutMs(2000); |
} |
} |
@@ -87,9 +89,13 @@ void EasyUnlockKeyManager::RefreshKeysWithTpmKeyPresent( |
const std::string tpm_public_key = |
tpm_key_manager->GetPublicTpmKey(user_context.GetAccountId()); |
+ PA_LOG(WARNING) << "Refreshing keys: " << remote_devices; |
+ |
EasyUnlockDeviceKeyDataList devices; |
- if (!RemoteDeviceListToDeviceDataList(*remote_devices, &devices)) |
+ if (!RemoteDeviceListToDeviceDataList(*remote_devices, &devices)) { |
+ PA_LOG(ERROR) << "ERROR Coverting remote devices"; |
devices.clear(); |
+ } |
write_operation_queue_.push_back( |
base::MakeUnique<EasyUnlockRefreshKeysOperation>( |