Index: net/cert/ct_log_verifier_unittest.cc |
diff --git a/net/cert/ct_log_verifier_unittest.cc b/net/cert/ct_log_verifier_unittest.cc |
index 9b3211df2e04400449bbd12f38e1e5999b5e0826..23cbf5166ce1ee98917386bab0189f74d5d7e262 100644 |
--- a/net/cert/ct_log_verifier_unittest.cc |
+++ b/net/cert/ct_log_verifier_unittest.cc |
@@ -36,7 +36,7 @@ TEST_F(CTLogVerifierTest, VerifiesCertSCT) { |
scoped_refptr<ct::SignedCertificateTimestamp> cert_sct; |
ct::GetX509CertSCT(&cert_sct); |
- EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct)); |
+ EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct.get())); |
} |
TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) { |
@@ -46,7 +46,7 @@ TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) { |
scoped_refptr<ct::SignedCertificateTimestamp> precert_sct; |
ct::GetPrecertSCT(&precert_sct); |
- EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct)); |
+ EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct.get())); |
} |
TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) { |
@@ -59,7 +59,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) { |
// Mangle the timestamp, so that it should fail signature validation. |
cert_sct->timestamp = base::Time::Now(); |
- EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct)); |
+ EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get())); |
} |
TEST_F(CTLogVerifierTest, FailsInvalidLogID) { |
@@ -73,7 +73,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) { |
// attempting signature validation. |
cert_sct->log_id.assign(cert_sct->log_id.size(), '\0'); |
- EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct)); |
+ EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get())); |
} |
TEST_F(CTLogVerifierTest, SetsValidSTH) { |