Index: chromeos/cert_loader.cc |
diff --git a/chromeos/cert_loader.cc b/chromeos/cert_loader.cc |
index ff57d36c1c2ec8a0a4e161d39bbbba38afd69091..776e95ea9a77f6264c384b31b06813705fd8417c 100644 |
--- a/chromeos/cert_loader.cc |
+++ b/chromeos/cert_loader.cc |
@@ -44,8 +44,7 @@ base::TimeDelta GetNextRequestDelayMs(base::TimeDelta last_delay) { |
} |
void LoadNSSCertificates(net::CertificateList* cert_list) { |
- if (base::chromeos::IsRunningOnChromeOS()) |
- net::NSSCertDatabase::GetInstance()->ListCerts(cert_list); |
+ net::NSSCertDatabase::GetInstance()->ListCerts(cert_list); |
} |
void CallOpenPersistentNSSDB() { |
@@ -54,8 +53,7 @@ void CallOpenPersistentNSSDB() { |
// Ensure we've opened the user's key/certificate database. |
crypto::OpenPersistentNSSDB(); |
- if (base::chromeos::IsRunningOnChromeOS()) |
- crypto::EnableTPMTokenForNSS(); |
+ crypto::EnableTPMTokenForNSS(); |
} |
} // namespace |
@@ -77,8 +75,7 @@ void CertLoader::Shutdown() { |
// static |
CertLoader* CertLoader::Get() { |
- CHECK(g_cert_loader) |
- << "CertLoader::Get() called before Initialize()"; |
+ CHECK(g_cert_loader) << "CertLoader::Get() called before Initialize()"; |
return g_cert_loader; |
} |
@@ -151,6 +148,9 @@ void CertLoader::MaybeRequestCertificates() { |
// Ensure we only initialize the TPM token once. |
DCHECK_EQ(tpm_token_state_, TPM_STATE_UNKNOWN); |
+ if (!base::chromeos::IsRunningOnChromeOS()) |
+ tpm_token_state_ = TPM_DISABLED; |
+ |
InitializeTokenAndLoadCertificates(); |
} |
@@ -193,16 +193,14 @@ void CertLoader::InitializeTokenAndLoadCertificates() { |
return; |
} |
case TPM_TOKEN_INFO_RECEIVED: { |
- if (base::chromeos::IsRunningOnChromeOS()) { |
- base::PostTaskAndReplyWithResult( |
- crypto_task_runner_.get(), |
- FROM_HERE, |
- base::Bind(&crypto::InitializeTPMToken, |
- tpm_token_name_, tpm_user_pin_), |
- base::Bind(&CertLoader::OnTPMTokenInitialized, |
- initialize_token_factory_.GetWeakPtr())); |
- return; |
- } |
+ base::PostTaskAndReplyWithResult( |
+ crypto_task_runner_.get(), |
+ FROM_HERE, |
+ base::Bind( |
+ &crypto::InitializeTPMToken, tpm_token_name_, tpm_user_pin_), |
+ base::Bind(&CertLoader::OnTPMTokenInitialized, |
+ initialize_token_factory_.GetWeakPtr())); |
+ return; |
tpm_token_state_ = TPM_TOKEN_INITIALIZED; |
// FALL_THROUGH_INTENDED |
} |
@@ -345,8 +343,9 @@ void CertLoader::UpdateCertificates(net::CertificateList* cert_list) { |
// Ignore any existing certificates. |
cert_list_.swap(*cert_list); |
- NotifyCertificatesLoaded(!certificates_loaded_); |
+ bool initial_load = !certificates_loaded_; |
certificates_loaded_ = true; |
+ NotifyCertificatesLoaded(initial_load); |
certificates_update_running_ = false; |
if (certificates_update_required_) |