Index: webrtc/p2p/base/transportdescriptionfactory.cc |
diff --git a/webrtc/p2p/base/transportdescriptionfactory.cc b/webrtc/p2p/base/transportdescriptionfactory.cc |
index 7654fdfcf504a1abd5f4e97ed8db4c75eee8548f..4c701df0dde5c5b4457dafbcb1958d91bbb2a067 100644 |
--- a/webrtc/p2p/base/transportdescriptionfactory.cc |
+++ b/webrtc/p2p/base/transportdescriptionfactory.cc |
@@ -20,8 +20,7 @@ |
namespace cricket { |
TransportDescriptionFactory::TransportDescriptionFactory() |
- : secure_(SEC_DISABLED), |
- identity_(NULL) { |
+ : secure_(SEC_DISABLED) { |
} |
TransportDescription* TransportDescriptionFactory::CreateOffer( |
@@ -97,8 +96,8 @@ TransportDescription* TransportDescriptionFactory::CreateAnswer( |
bool TransportDescriptionFactory::SetSecurityInfo( |
TransportDescription* desc, ConnectionRole role) const { |
- if (!identity_) { |
- LOG(LS_ERROR) << "Cannot create identity digest with no identity"; |
+ if (!certificate_) { |
+ LOG(LS_ERROR) << "Cannot create identity digest with no certificate"; |
return false; |
} |
@@ -106,13 +105,14 @@ bool TransportDescriptionFactory::SetSecurityInfo( |
// RFC 4572 Section 5 requires that those lines use the same hash function as |
// the certificate's signature. |
std::string digest_alg; |
- if (!identity_->certificate().GetSignatureDigestAlgorithm(&digest_alg)) { |
+ if (!certificate_->ssl_certificate().GetSignatureDigestAlgorithm( |
+ &digest_alg)) { |
LOG(LS_ERROR) << "Failed to retrieve the certificate's digest algorithm"; |
return false; |
} |
desc->identity_fingerprint.reset( |
- rtc::SSLFingerprint::Create(digest_alg, identity_)); |
+ rtc::SSLFingerprint::Create(digest_alg, certificate_->identity())); |
if (!desc->identity_fingerprint.get()) { |
LOG(LS_ERROR) << "Failed to create identity fingerprint, alg=" |
<< digest_alg; |