| Index: net/quic/test_tools/crypto_test_utils_openssl.cc
 | 
| diff --git a/net/quic/test_tools/crypto_test_utils_openssl.cc b/net/quic/test_tools/crypto_test_utils_openssl.cc
 | 
| index 388d257001f478c187cbfb928ae0d3284da5455d..a6a164b0155e3ed947c4be6af48d6c5e455abf99 100644
 | 
| --- a/net/quic/test_tools/crypto_test_utils_openssl.cc
 | 
| +++ b/net/quic/test_tools/crypto_test_utils_openssl.cc
 | 
| @@ -12,20 +12,13 @@
 | 
|  #include <openssl/sha.h>
 | 
|  
 | 
|  #include "crypto/openssl_util.h"
 | 
| +#include "crypto/scoped_openssl_types.h"
 | 
|  #include "crypto/secure_hash.h"
 | 
|  #include "net/quic/crypto/channel_id.h"
 | 
|  
 | 
|  using base::StringPiece;
 | 
|  using std::string;
 | 
|  
 | 
| -namespace {
 | 
| -
 | 
| -void EvpMdCtxCleanUp(EVP_MD_CTX* ctx) {
 | 
| -  (void)EVP_MD_CTX_cleanup(ctx);
 | 
| -}
 | 
| -
 | 
| -} // namespace anonymous
 | 
| -
 | 
|  namespace net {
 | 
|  
 | 
|  namespace test {
 | 
| @@ -41,8 +34,7 @@ class TestChannelIDKey : public ChannelIDKey {
 | 
|                      string* out_signature) const OVERRIDE {
 | 
|      EVP_MD_CTX md_ctx;
 | 
|      EVP_MD_CTX_init(&md_ctx);
 | 
| -    crypto::ScopedOpenSSL<EVP_MD_CTX, EvpMdCtxCleanUp>
 | 
| -        md_ctx_cleanup(&md_ctx);
 | 
| +    crypto::ScopedEVP_MD_CTX md_ctx_cleanup(&md_ctx);
 | 
|  
 | 
|      if (EVP_DigestSignInit(&md_ctx, NULL, EVP_sha256(), NULL,
 | 
|                             ecdsa_key_.get()) != 1) {
 | 
| @@ -66,7 +58,7 @@ class TestChannelIDKey : public ChannelIDKey {
 | 
|      }
 | 
|  
 | 
|      uint8* derp = der_sig.get();
 | 
| -    crypto::ScopedOpenSSL<ECDSA_SIG, ECDSA_SIG_free> sig(
 | 
| +    crypto::ScopedECDSA_SIG sig(
 | 
|          d2i_ECDSA_SIG(NULL, const_cast<const uint8**>(&derp), sig_len));
 | 
|      if (sig.get() == NULL) {
 | 
|        return false;
 | 
| @@ -104,7 +96,7 @@ class TestChannelIDKey : public ChannelIDKey {
 | 
|    }
 | 
|  
 | 
|   private:
 | 
| -  crypto::ScopedOpenSSL<EVP_PKEY, EVP_PKEY_free> ecdsa_key_;
 | 
| +  crypto::ScopedEVP_PKEY ecdsa_key_;
 | 
|  };
 | 
|  
 | 
|  class TestChannelIDSource : public ChannelIDSource {
 | 
| @@ -140,25 +132,25 @@ class TestChannelIDSource : public ChannelIDSource {
 | 
|      // clearing the most-significant bit.
 | 
|      digest[0] &= 0x7f;
 | 
|  
 | 
| -    crypto::ScopedOpenSSL<BIGNUM, BN_free> k(BN_new());
 | 
| +    crypto::ScopedBIGNUM k(BN_new());
 | 
|      CHECK(BN_bin2bn(digest, sizeof(digest), k.get()) != NULL);
 | 
|  
 | 
| -    crypto::ScopedOpenSSL<EC_GROUP, EC_GROUP_free> p256(
 | 
| +    crypto::ScopedOpenSSL<EC_GROUP, EC_GROUP_free>::Type p256(
 | 
|          EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1));
 | 
|      CHECK(p256.get());
 | 
|  
 | 
| -    crypto::ScopedOpenSSL<EC_KEY, EC_KEY_free> ecdsa_key(EC_KEY_new());
 | 
| +    crypto::ScopedEC_KEY ecdsa_key(EC_KEY_new());
 | 
|      CHECK(ecdsa_key.get() != NULL &&
 | 
|            EC_KEY_set_group(ecdsa_key.get(), p256.get()));
 | 
|  
 | 
| -    crypto::ScopedOpenSSL<EC_POINT, EC_POINT_free> point(
 | 
| +    crypto::ScopedOpenSSL<EC_POINT, EC_POINT_free>::Type point(
 | 
|          EC_POINT_new(p256.get()));
 | 
|      CHECK(EC_POINT_mul(p256.get(), point.get(), k.get(), NULL, NULL, NULL));
 | 
|  
 | 
|      EC_KEY_set_private_key(ecdsa_key.get(), k.get());
 | 
|      EC_KEY_set_public_key(ecdsa_key.get(), point.get());
 | 
|  
 | 
| -    crypto::ScopedOpenSSL<EVP_PKEY, EVP_PKEY_free> pkey(EVP_PKEY_new());
 | 
| +    crypto::ScopedEVP_PKEY pkey(EVP_PKEY_new());
 | 
|      // EVP_PKEY_set1_EC_KEY takes a reference so no |release| here.
 | 
|      EVP_PKEY_set1_EC_KEY(pkey.get(), ecdsa_key.get());
 | 
|  
 | 
| 
 |