| Index: remoting/host/token_validator_base.cc
|
| diff --git a/remoting/host/token_validator_base.cc b/remoting/host/token_validator_base.cc
|
| index d1a8ee7a0304cbcb3895f895c844910d1524164e..573bb406f35c2cbfd059585489204f87f352c868 100644
|
| --- a/remoting/host/token_validator_base.cc
|
| +++ b/remoting/host/token_validator_base.cc
|
| @@ -27,6 +27,8 @@
|
| #include "net/ssl/client_cert_store_mac.h"
|
| #endif
|
| #include "net/ssl/ssl_cert_request_info.h"
|
| +#include "net/ssl/ssl_platform_key.h"
|
| +#include "net/ssl/ssl_private_key.h"
|
| #include "net/url_request/url_request.h"
|
| #include "net/url_request/url_request_context.h"
|
| #include "net/url_request/url_request_status.h"
|
| @@ -146,11 +148,14 @@ void TokenValidatorBase::OnCertificatesSelected(
|
| for (size_t i = 0; i < selected_certs->size(); ++i) {
|
| if (issuer == kCertIssuerWildCard ||
|
| issuer == (*selected_certs)[i]->issuer().common_name) {
|
| - request_->ContinueWithCertificate((*selected_certs)[i].get());
|
| + scoped_refptr<net::SSLPrivateKey> pkey =
|
| + net::FetchClientCertPrivateKey((*selected_certs)[i].get());
|
| + request_->ContinueWithCertificate((*selected_certs)[i].get(),
|
| + pkey.get());
|
| return;
|
| }
|
| }
|
| - request_->ContinueWithCertificate(nullptr);
|
| + request_->ContinueWithCertificate(nullptr, nullptr);
|
| }
|
| }
|
|
|
|
|