| Index: net/cert/internal/verify_signed_data_unittest.cc
|
| diff --git a/net/cert/internal/verify_signed_data_unittest.cc b/net/cert/internal/verify_signed_data_unittest.cc
|
| index a718c779a51dcd736fe7821556ad685f187c52b9..d7e822869cd7de9f418b5c9964b688d0152ddc59 100644
|
| --- a/net/cert/internal/verify_signed_data_unittest.cc
|
| +++ b/net/cert/internal/verify_signed_data_unittest.cc
|
| @@ -61,21 +61,20 @@ void RunTestCaseUsingPolicy(VerifyResult expected_result,
|
| ASSERT_TRUE(ReadTestDataFromPemFile(path, mappings));
|
|
|
| scoped_ptr<SignatureAlgorithm> signature_algorithm =
|
| - SignatureAlgorithm::CreateFromDer(InputFromString(&algorithm));
|
| + SignatureAlgorithm::CreateFromDer(der::Input(&algorithm));
|
| ASSERT_TRUE(signature_algorithm);
|
|
|
| der::BitString signature_value_bit_string;
|
| - der::Parser signature_value_parser(InputFromString(&signature_value));
|
| + der::Parser signature_value_parser((der::Input(&signature_value)));
|
| ASSERT_TRUE(signature_value_parser.ReadBitString(&signature_value_bit_string))
|
| << "The signature value is not a valid BIT STRING";
|
|
|
| bool expected_result_bool = expected_result == SUCCESS;
|
|
|
| - EXPECT_EQ(
|
| - expected_result_bool,
|
| - VerifySignedData(*signature_algorithm, InputFromString(&signed_data),
|
| - signature_value_bit_string, InputFromString(&public_key),
|
| - policy));
|
| + EXPECT_EQ(expected_result_bool,
|
| + VerifySignedData(*signature_algorithm, der::Input(&signed_data),
|
| + signature_value_bit_string,
|
| + der::Input(&public_key), policy));
|
| }
|
|
|
| // RunTestCase() is the same as RunTestCaseUsingPolicy(), only it uses a
|
|
|