Index: net/cert/ct_log_verifier_unittest.cc |
diff --git a/net/cert/ct_log_verifier_unittest.cc b/net/cert/ct_log_verifier_unittest.cc |
index ac542072e41c6b29428b9e1639873dec75c33a02..89820b962b5aba5e59c5f21aeb315aa99e361a44 100644 |
--- a/net/cert/ct_log_verifier_unittest.cc |
+++ b/net/cert/ct_log_verifier_unittest.cc |
@@ -80,14 +80,14 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) { |
TEST_F(CTLogVerifierTest, SetsValidSTH) { |
scoped_ptr<ct::SignedTreeHead> sth(new ct::SignedTreeHead()); |
ct::GetSignedTreeHead(sth.get()); |
- ASSERT_TRUE(log_->SetSignedTreeHead(sth.Pass())); |
+ ASSERT_TRUE(log_->VerifySignedTreeHead(sth.get())); |
} |
TEST_F(CTLogVerifierTest, DoesNotSetInvalidSTH) { |
scoped_ptr<ct::SignedTreeHead> sth(new ct::SignedTreeHead()); |
ct::GetSignedTreeHead(sth.get()); |
sth->sha256_root_hash[0] = '\x0'; |
- ASSERT_FALSE(log_->SetSignedTreeHead(sth.Pass())); |
+ ASSERT_FALSE(log_->VerifySignedTreeHead(sth.get())); |
} |
// Test that excess data after the public key is rejected. |