| Index: net/socket/ssl_client_socket_openssl_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl_unittest.cc b/net/socket/ssl_client_socket_openssl_unittest.cc
|
| index 52758e393c13f90454dcabbbb1c05eb5197a03d5..f89bae99a0b2f98948de1fa1594221067f85cba3 100644
|
| --- a/net/socket/ssl_client_socket_openssl_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_openssl_unittest.cc
|
| @@ -58,7 +58,7 @@ const SSLConfig kDefaultSSLConfig;
|
| // Returns true on success, false on failure.
|
| bool LoadPrivateKeyOpenSSL(
|
| const base::FilePath& filepath,
|
| - OpenSSLClientKeyStore::ScopedEVP_PKEY* pkey) {
|
| + crypto::ScopedEVP_PKEY* pkey) {
|
| std::string data;
|
| if (!base::ReadFileToString(filepath, &data)) {
|
| LOG(ERROR) << "Could not read private key file: "
|
| @@ -250,7 +250,7 @@ TEST_F(SSLClientSocketOpenSSLClientAuthTest, SendGoodCert) {
|
|
|
| // This is required to ensure that signing works with the client
|
| // certificate's private key.
|
| - OpenSSLClientKeyStore::ScopedEVP_PKEY client_private_key;
|
| + crypto::ScopedEVP_PKEY client_private_key;
|
| ASSERT_TRUE(LoadPrivateKeyOpenSSL(certs_dir.AppendASCII("client_1.key"),
|
| &client_private_key));
|
| EXPECT_TRUE(RecordPrivateKey(ssl_config, client_private_key.get()));
|
|
|