| Index: net/cert/single_log_ct_verifier.cc
|
| diff --git a/net/cert/single_log_ct_verifier.cc b/net/cert/single_log_ct_verifier.cc
|
| index c6e7e6f9924cb673abf0d3aa26eb1176f0b6afcb..15913d9cee7c1ac345e73558d930579062ea630c 100644
|
| --- a/net/cert/single_log_ct_verifier.cc
|
| +++ b/net/cert/single_log_ct_verifier.cc
|
| @@ -70,7 +70,7 @@ bool SingleLogCTVerifier::VerifySCTs(const std::string& encoded_sct_list,
|
| for (std::vector<base::StringPiece>::const_iterator it = sct_list.begin();
|
| it != sct_list.end(); ++it) {
|
| base::StringPiece temp_sct(*it);
|
| - ct::SignedCertificateTimestamp decoded_sct;
|
| + scoped_refptr<ct::SignedCertificateTimestamp> decoded_sct;
|
| if (!DecodeSignedCertificateTimestamp(&temp_sct, &decoded_sct)) {
|
| // XXX(rsleevi): Should we really just skip over bad SCTs?
|
| continue;
|
| @@ -78,12 +78,12 @@ bool SingleLogCTVerifier::VerifySCTs(const std::string& encoded_sct_list,
|
| // Assume this SCT is untrusted until proven otherwise.
|
| result->unverified_scts.push_back(decoded_sct);
|
|
|
| - if (!log_->Verify(expected_entry, decoded_sct)) {
|
| + if (!log_->Verify(expected_entry, *decoded_sct.get())) {
|
| DVLOG(1) << "Unable to verify SCT signature.";
|
| continue;
|
| }
|
|
|
| - if (decoded_sct.timestamp + base::TimeDelta::FromSeconds(1) >
|
| + if (decoded_sct->timestamp + base::TimeDelta::FromSeconds(1) >
|
| base::Time::Now()) {
|
| DVLOG(1) << "SCT is from the future!";
|
| continue;
|
|
|