| Index: remoting/protocol/v2_authenticator.cc | 
| diff --git a/remoting/protocol/v2_authenticator.cc b/remoting/protocol/v2_authenticator.cc | 
| index ee5c9d12ad3c55a02674d61aa03b1297aa4fa60f..1b13c7ce83be7ba0a97025602f3ba1bdc15b6268 100644 | 
| --- a/remoting/protocol/v2_authenticator.cc | 
| +++ b/remoting/protocol/v2_authenticator.cc | 
| @@ -62,6 +62,7 @@ V2Authenticator::V2Authenticator( | 
| : certificate_sent_(false), | 
| key_exchange_impl_(type, shared_secret), | 
| state_(initial_state), | 
| +      started_(false), | 
| rejection_reason_(INVALID_CREDENTIALS) { | 
| pending_messages_.push(key_exchange_impl_.GetMessage()); | 
| } | 
| @@ -75,6 +76,10 @@ Authenticator::State V2Authenticator::state() const { | 
| return state_; | 
| } | 
|  | 
| +bool V2Authenticator::started() const { | 
| +  return started_; | 
| +} | 
| + | 
| Authenticator::RejectionReason V2Authenticator::rejection_reason() const { | 
| DCHECK_EQ(state(), REJECTED); | 
| return rejection_reason_; | 
| @@ -127,6 +132,7 @@ void V2Authenticator::ProcessMessageInternal(const buzz::XmlElement* message) { | 
|  | 
| P224EncryptedKeyExchange::Result result = | 
| key_exchange_impl_.ProcessMessage(spake_message); | 
| +    started_ = true; | 
| switch (result) { | 
| case P224EncryptedKeyExchange::kResultPending: | 
| pending_messages_.push(key_exchange_impl_.GetMessage()); | 
| @@ -143,7 +149,6 @@ void V2Authenticator::ProcessMessageInternal(const buzz::XmlElement* message) { | 
| return; | 
| } | 
| } | 
| - | 
| state_ = MESSAGE_READY; | 
| } | 
|  | 
|  |