| Index: remoting/protocol/v2_authenticator.cc
|
| diff --git a/remoting/protocol/v2_authenticator.cc b/remoting/protocol/v2_authenticator.cc
|
| index a17fb466c116f9adc1ae7517b503652ba681d47d..bbb8919b0d6b4fe72ce0fc0d5c355aad1aa59953 100644
|
| --- a/remoting/protocol/v2_authenticator.cc
|
| +++ b/remoting/protocol/v2_authenticator.cc
|
| @@ -92,23 +92,6 @@ void V2Authenticator::ProcessMessage(const buzz::XmlElement* message,
|
| void V2Authenticator::ProcessMessageInternal(const buzz::XmlElement* message) {
|
| DCHECK_EQ(state(), WAITING_MESSAGE);
|
|
|
| - // Parse the certificate.
|
| - std::string base64_cert = message->TextNamed(kCertificateTag);
|
| - if (!base64_cert.empty()) {
|
| - if (!base::Base64Decode(base64_cert, &remote_cert_)) {
|
| - LOG(WARNING) << "Failed to decode certificate received from the peer.";
|
| - remote_cert_.clear();
|
| - }
|
| - }
|
| -
|
| - // Client always expect certificate in the first message.
|
| - if (!is_host_side() && remote_cert_.empty()) {
|
| - LOG(WARNING) << "No valid host certificate.";
|
| - state_ = REJECTED;
|
| - rejection_reason_ = PROTOCOL_ERROR;
|
| - return;
|
| - }
|
| -
|
| const buzz::XmlElement* eke_element = message->FirstNamed(kEkeTag);
|
| if (!eke_element) {
|
| LOG(WARNING) << "No eke-message found.";
|
| @@ -196,8 +179,7 @@ V2Authenticator::CreateChannelAuthenticator() const {
|
| return SslHmacChannelAuthenticator::CreateForHost(
|
| local_cert_, local_key_pair_, auth_key_);
|
| } else {
|
| - return SslHmacChannelAuthenticator::CreateForClient(
|
| - remote_cert_, auth_key_);
|
| + return SslHmacChannelAuthenticator::CreateForClient(auth_key_);
|
| }
|
| }
|
|
|
|
|