Index: net/cert/ct_serialization_unittest.cc |
diff --git a/net/cert/ct_serialization_unittest.cc b/net/cert/ct_serialization_unittest.cc |
index 9692fb95fb4ecb9c36a0f2c704fc1438abca845e..caf789a5a8dfd727127bb773854b025cdfcf2a14 100644 |
--- a/net/cert/ct_serialization_unittest.cc |
+++ b/net/cert/ct_serialization_unittest.cc |
@@ -135,27 +135,27 @@ TEST_F(CtSerializationTest, DecodesSignedCertificateTimestamp) { |
std::string encoded_test_sct(ct::GetTestSignedCertificateTimestamp()); |
base::StringPiece encoded_sct(encoded_test_sct); |
- ct::SignedCertificateTimestamp sct; |
+ scoped_refptr<ct::SignedCertificateTimestamp> sct; |
ASSERT_TRUE(ct::DecodeSignedCertificateTimestamp(&encoded_sct, &sct)); |
- EXPECT_EQ(0, sct.version); |
+ EXPECT_EQ(0, sct->version); |
std::string expected_log_key( |
"\xdf\x1c\x2e\xc1\x15\x00\x94\x52\x47\xa9\x61\x68\x32\x5d\xdc\x5c\x79\x59" |
"\xe8\xf7\xc6\xd3\x88\xfc\x00\x2e\x0b\xbd\x3f\x74\xd7\x64", |
32); |
- EXPECT_EQ(expected_log_key, sct.log_id); |
+ EXPECT_EQ(expected_log_key, sct->log_id); |
base::Time expected_time = base::Time::UnixEpoch() + |
base::TimeDelta::FromMilliseconds(1365181456089); |
- EXPECT_EQ(expected_time, sct.timestamp); |
+ EXPECT_EQ(expected_time, sct->timestamp); |
// Subtracting 4 bytes for signature data (hash & sig algs), |
// actual signature data should be 71 bytes. |
- EXPECT_EQ((size_t) 71, sct.signature.signature_data.size()); |
- EXPECT_EQ(std::string(""), sct.extensions); |
+ EXPECT_EQ((size_t) 71, sct->signature.signature_data.size()); |
+ EXPECT_EQ(std::string(""), sct->extensions); |
} |
TEST_F(CtSerializationTest, FailsDecodingInvalidSignedCertificateTimestamp) { |
// Invalid version |
base::StringPiece invalid_version_sct("\x2\x0", 2); |
- ct::SignedCertificateTimestamp sct; |
+ scoped_refptr<ct::SignedCertificateTimestamp> sct; |
ASSERT_FALSE( |
ct::DecodeSignedCertificateTimestamp(&invalid_version_sct, &sct)); |