| Index: chrome/browser/profiles/profile_io_data.cc
|
| diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc
|
| index 69f51a77bb036f5b2a9b57452f3c1c25925a689a..0ef0cbff42d1d9e4cec15966fda1fe4e2a010a22 100644
|
| --- a/chrome/browser/profiles/profile_io_data.cc
|
| +++ b/chrome/browser/profiles/profile_io_data.cc
|
| @@ -124,6 +124,7 @@
|
| #include "components/user_manager/user_manager.h"
|
| #include "crypto/nss_util.h"
|
| #include "crypto/nss_util_internal.h"
|
| +#include "net/cert/cert_verifier.h"
|
| #include "net/cert/multi_threaded_cert_verifier.h"
|
| #include "net/ssl/client_cert_store_chromeos.h"
|
| #endif // defined(OS_CHROMEOS)
|
| @@ -475,7 +476,10 @@ void ProfileIOData::InitializeOnUIThread(Profile* profile) {
|
| network_prediction_options_.MoveToThread(io_message_loop_proxy);
|
|
|
| #if defined(OS_CHROMEOS)
|
| - cert_verifier_ = policy::PolicyCertServiceFactory::CreateForProfile(profile);
|
| + scoped_ptr<policy::PolicyCertVerifier> verifier =
|
| + policy::PolicyCertServiceFactory::CreateForProfile(profile);
|
| + policy_cert_verifier_ = verifier.get();
|
| + cert_verifier_ = verifier.Pass();
|
| #endif
|
| // The URLBlacklistManager has to be created on the UI thread to register
|
| // observers of |pref_service|, and it also has to clean up on
|
| @@ -571,6 +575,7 @@ ProfileIOData::ProfileParams::~ProfileParams() {}
|
| ProfileIOData::ProfileIOData(Profile::ProfileType profile_type)
|
| : initialized_(false),
|
| #if defined(OS_CHROMEOS)
|
| + policy_cert_verifier_(NULL),
|
| use_system_key_slot_(false),
|
| #endif
|
| resource_context_(new ResourceContext(this)),
|
| @@ -1081,19 +1086,19 @@ void ProfileIOData::Init(
|
| if (use_system_key_slot_)
|
| EnableNSSSystemKeySlotForResourceContext(resource_context_.get());
|
|
|
| - scoped_refptr<net::CertVerifyProc> verify_proc;
|
| crypto::ScopedPK11Slot public_slot =
|
| crypto::GetPublicSlotForChromeOSUser(username_hash_);
|
| // The private slot won't be ready by this point. It shouldn't be necessary
|
| // for cert trust purposes anyway.
|
| - verify_proc = new chromeos::CertVerifyProcChromeOS(public_slot.Pass());
|
| - if (cert_verifier_) {
|
| - cert_verifier_->InitializeOnIOThread(verify_proc);
|
| - main_request_context_->set_cert_verifier(cert_verifier_.get());
|
| + scoped_refptr<net::CertVerifyProc> verify_proc(
|
| + new chromeos::CertVerifyProcChromeOS(public_slot.Pass()));
|
| + if (policy_cert_verifier_) {
|
| + DCHECK_EQ(policy_cert_verifier_, cert_verifier_.get());
|
| + policy_cert_verifier_->InitializeOnIOThread(verify_proc);
|
| } else {
|
| - main_request_context_->set_cert_verifier(
|
| - new net::MultiThreadedCertVerifier(verify_proc.get()));
|
| + cert_verifier_.reset(new net::MultiThreadedCertVerifier(verify_proc.get()));
|
| }
|
| + main_request_context_->set_cert_verifier(cert_verifier_.get());
|
| #else
|
| main_request_context_->set_cert_verifier(
|
| io_thread_globals->cert_verifier.get());
|
|
|