| Index: remoting/protocol/v2_authenticator.cc
|
| diff --git a/remoting/protocol/v2_authenticator.cc b/remoting/protocol/v2_authenticator.cc
|
| index ee5c9d12ad3c55a02674d61aa03b1297aa4fa60f..1b13c7ce83be7ba0a97025602f3ba1bdc15b6268 100644
|
| --- a/remoting/protocol/v2_authenticator.cc
|
| +++ b/remoting/protocol/v2_authenticator.cc
|
| @@ -62,6 +62,7 @@ V2Authenticator::V2Authenticator(
|
| : certificate_sent_(false),
|
| key_exchange_impl_(type, shared_secret),
|
| state_(initial_state),
|
| + started_(false),
|
| rejection_reason_(INVALID_CREDENTIALS) {
|
| pending_messages_.push(key_exchange_impl_.GetMessage());
|
| }
|
| @@ -75,6 +76,10 @@ Authenticator::State V2Authenticator::state() const {
|
| return state_;
|
| }
|
|
|
| +bool V2Authenticator::started() const {
|
| + return started_;
|
| +}
|
| +
|
| Authenticator::RejectionReason V2Authenticator::rejection_reason() const {
|
| DCHECK_EQ(state(), REJECTED);
|
| return rejection_reason_;
|
| @@ -127,6 +132,7 @@ void V2Authenticator::ProcessMessageInternal(const buzz::XmlElement* message) {
|
|
|
| P224EncryptedKeyExchange::Result result =
|
| key_exchange_impl_.ProcessMessage(spake_message);
|
| + started_ = true;
|
| switch (result) {
|
| case P224EncryptedKeyExchange::kResultPending:
|
| pending_messages_.push(key_exchange_impl_.GetMessage());
|
| @@ -143,7 +149,6 @@ void V2Authenticator::ProcessMessageInternal(const buzz::XmlElement* message) {
|
| return;
|
| }
|
| }
|
| -
|
| state_ = MESSAGE_READY;
|
| }
|
|
|
|
|