Index: net/quic/core/quic_session.cc |
diff --git a/net/quic/core/quic_session.cc b/net/quic/core/quic_session.cc |
index 94be95128dfeb13d7b982e08533d644102420543..047e5287d7744ae0efb2d26f341cb1681da32055 100644 |
--- a/net/quic/core/quic_session.cc |
+++ b/net/quic/core/quic_session.cc |
@@ -283,7 +283,8 @@ QuicConsumedData QuicSession::WritevData( |
QuicIOVector iov, |
QuicStreamOffset offset, |
bool fin, |
- scoped_refptr<QuicAckListenerInterface> ack_notifier_delegate) { |
+ QuicReferenceCountedPointer<QuicAckListenerInterface> |
+ ack_notifier_delegate) { |
// This check is an attempt to deal with potential memory corruption |
// in which |id| ends up set to 1 (the crypto stream id). If this happen |
// it might end up resulting in unencrypted stream data being sent. |