Index: remoting/host/token_validator_base.cc |
diff --git a/remoting/host/token_validator_base.cc b/remoting/host/token_validator_base.cc |
index d1a8ee7a0304cbcb3895f895c844910d1524164e..1b13dff1563563f97edfcf0dfbea72285f0aea0c 100644 |
--- a/remoting/host/token_validator_base.cc |
+++ b/remoting/host/token_validator_base.cc |
@@ -27,6 +27,8 @@ |
#include "net/ssl/client_cert_store_mac.h" |
#endif |
#include "net/ssl/ssl_cert_request_info.h" |
+#include "net/ssl/ssl_platform_key.h" |
+#include "net/ssl/ssl_private_key.h" |
#include "net/url_request/url_request.h" |
#include "net/url_request/url_request_context.h" |
#include "net/url_request/url_request_status.h" |
@@ -146,11 +148,14 @@ void TokenValidatorBase::OnCertificatesSelected( |
for (size_t i = 0; i < selected_certs->size(); ++i) { |
if (issuer == kCertIssuerWildCard || |
issuer == (*selected_certs)[i]->issuer().common_name) { |
- request_->ContinueWithCertificate((*selected_certs)[i].get()); |
+ scoped_refptr<net::SSLPrivateKey> private_key = |
+ net::FetchClientCertPrivateKey((*selected_certs)[i].get()); |
+ request_->ContinueWithCertificate((*selected_certs)[i].get(), |
+ private_key.get()); |
return; |
} |
} |
- request_->ContinueWithCertificate(nullptr); |
+ request_->ContinueWithCertificate(nullptr, nullptr); |
} |
} |