| Index: net/cert/ct_log_verifier_unittest.cc
|
| diff --git a/net/cert/ct_log_verifier_unittest.cc b/net/cert/ct_log_verifier_unittest.cc
|
| index ac542072e41c6b29428b9e1639873dec75c33a02..89820b962b5aba5e59c5f21aeb315aa99e361a44 100644
|
| --- a/net/cert/ct_log_verifier_unittest.cc
|
| +++ b/net/cert/ct_log_verifier_unittest.cc
|
| @@ -80,14 +80,14 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
|
| TEST_F(CTLogVerifierTest, SetsValidSTH) {
|
| scoped_ptr<ct::SignedTreeHead> sth(new ct::SignedTreeHead());
|
| ct::GetSignedTreeHead(sth.get());
|
| - ASSERT_TRUE(log_->SetSignedTreeHead(sth.Pass()));
|
| + ASSERT_TRUE(log_->VerifySignedTreeHead(sth.get()));
|
| }
|
|
|
| TEST_F(CTLogVerifierTest, DoesNotSetInvalidSTH) {
|
| scoped_ptr<ct::SignedTreeHead> sth(new ct::SignedTreeHead());
|
| ct::GetSignedTreeHead(sth.get());
|
| sth->sha256_root_hash[0] = '\x0';
|
| - ASSERT_FALSE(log_->SetSignedTreeHead(sth.Pass()));
|
| + ASSERT_FALSE(log_->VerifySignedTreeHead(sth.get()));
|
| }
|
|
|
| // Test that excess data after the public key is rejected.
|
|
|