Index: net/tools/quic/quic_client_bin.cc |
diff --git a/net/tools/quic/quic_client_bin.cc b/net/tools/quic/quic_client_bin.cc |
index ead19bae0208c50093c73017538ae94d12c78dc2..7a61c0af8cd66fe728fbdb58f71b4a910f07adc2 100644 |
--- a/net/tools/quic/quic_client_bin.cc |
+++ b/net/tools/quic/quic_client_bin.cc |
@@ -114,7 +114,7 @@ class FakeCertVerifier : public net::CertVerifier { |
net::CRLSet* crl_set, |
net::CertVerifyResult* verify_result, |
const net::CompletionCallback& callback, |
- scoped_ptr<net::CertVerifier::Request>* out_req, |
+ std::unique_ptr<net::CertVerifier::Request>* out_req, |
const net::BoundNetLog& net_log) override { |
return net::OK; |
} |
@@ -275,14 +275,14 @@ int main(int argc, char* argv[]) { |
versions.push_back(static_cast<net::QuicVersion>(FLAGS_quic_version)); |
} |
// For secure QUIC we need to verify the cert chain. |
- scoped_ptr<CertVerifier> cert_verifier(CertVerifier::CreateDefault()); |
+ std::unique_ptr<CertVerifier> cert_verifier(CertVerifier::CreateDefault()); |
if (line->HasSwitch("disable-certificate-verification")) { |
cert_verifier.reset(new FakeCertVerifier()); |
} |
- scoped_ptr<TransportSecurityState> transport_security_state( |
+ std::unique_ptr<TransportSecurityState> transport_security_state( |
new TransportSecurityState); |
transport_security_state.reset(new TransportSecurityState); |
- scoped_ptr<CTVerifier> ct_verifier(new MultiLogCTVerifier()); |
+ std::unique_ptr<CTVerifier> ct_verifier(new MultiLogCTVerifier()); |
ProofVerifierChromium* proof_verifier = new ProofVerifierChromium( |
cert_verifier.get(), nullptr, transport_security_state.get(), |
ct_verifier.get()); |