| Index: net/cert/ct_log_verifier_unittest.cc
|
| diff --git a/net/cert/ct_log_verifier_unittest.cc b/net/cert/ct_log_verifier_unittest.cc
|
| index 9b3211df2e04400449bbd12f38e1e5999b5e0826..23cbf5166ce1ee98917386bab0189f74d5d7e262 100644
|
| --- a/net/cert/ct_log_verifier_unittest.cc
|
| +++ b/net/cert/ct_log_verifier_unittest.cc
|
| @@ -36,7 +36,7 @@ TEST_F(CTLogVerifierTest, VerifiesCertSCT) {
|
| scoped_refptr<ct::SignedCertificateTimestamp> cert_sct;
|
| ct::GetX509CertSCT(&cert_sct);
|
|
|
| - EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct));
|
| + EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct.get()));
|
| }
|
|
|
| TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) {
|
| @@ -46,7 +46,7 @@ TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) {
|
| scoped_refptr<ct::SignedCertificateTimestamp> precert_sct;
|
| ct::GetPrecertSCT(&precert_sct);
|
|
|
| - EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct));
|
| + EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct.get()));
|
| }
|
|
|
| TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) {
|
| @@ -59,7 +59,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) {
|
| // Mangle the timestamp, so that it should fail signature validation.
|
| cert_sct->timestamp = base::Time::Now();
|
|
|
| - EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
|
| + EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
|
| }
|
|
|
| TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
|
| @@ -73,7 +73,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
|
| // attempting signature validation.
|
| cert_sct->log_id.assign(cert_sct->log_id.size(), '\0');
|
|
|
| - EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
|
| + EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
|
| }
|
|
|
| TEST_F(CTLogVerifierTest, SetsValidSTH) {
|
|
|