| Index: net/cert/internal/verify_certificate_chain_unittest.cc
|
| diff --git a/net/cert/internal/verify_certificate_chain_unittest.cc b/net/cert/internal/verify_certificate_chain_unittest.cc
|
| index 0b178e9069aa1b1be8ec41e68844377fb3518a26..c997f5386ef87cb3d04df5d0089a622a67e60351 100644
|
| --- a/net/cert/internal/verify_certificate_chain_unittest.cc
|
| +++ b/net/cert/internal/verify_certificate_chain_unittest.cc
|
| @@ -47,7 +47,7 @@ std::string ReadTestFileToString(const std::string& file_name) {
|
| void AddCertificateToTrustStore(const std::string& cert_der,
|
| TrustStore* trust_store) {
|
| ParsedCertificate cert;
|
| - ASSERT_TRUE(ParseCertificate(InputFromString(&cert_der), &cert));
|
| + ASSERT_TRUE(ParseCertificate(der::Input(&cert_der), &cert));
|
|
|
| ParsedTbsCertificate tbs;
|
| ASSERT_TRUE(ParseTbsCertificate(cert.tbs_certificate_tlv, &tbs));
|
| @@ -95,7 +95,7 @@ void ReadTestFromFile(const std::string& file_name,
|
| } else if (block_type == kTimeHeader) {
|
| ASSERT_FALSE(has_time) << "Duplicate " << kTimeHeader;
|
| has_time = true;
|
| - ASSERT_TRUE(der::ParseUTCTime(InputFromString(&block_data), time));
|
| + ASSERT_TRUE(der::ParseUTCTime(der::Input(&block_data), time));
|
| } else if (block_type == kResultHeader) {
|
| ASSERT_FALSE(has_result) << "Duplicate " << kResultHeader;
|
| ASSERT_TRUE(block_data == "SUCCESS" || block_data == "FAIL")
|
| @@ -119,7 +119,7 @@ void RunTest(const char* file_name) {
|
|
|
| std::vector<der::Input> input_chain;
|
| for (const auto& cert_str : chain)
|
| - input_chain.push_back(InputFromString(&cert_str));
|
| + input_chain.push_back(der::Input(&cert_str));
|
|
|
| SimpleSignaturePolicy signature_policy(1024);
|
|
|
|
|