| Index: net/cert/ct_serialization_unittest.cc
|
| diff --git a/net/cert/ct_serialization_unittest.cc b/net/cert/ct_serialization_unittest.cc
|
| index 03fc03471213b3080c2b66fe606718932c83f023..d832c1d8ef1bda30ff3e24b24c8f1c7a6f9a3f1a 100644
|
| --- a/net/cert/ct_serialization_unittest.cc
|
| +++ b/net/cert/ct_serialization_unittest.cc
|
| @@ -135,23 +135,23 @@ TEST_F(CtSerializationTest, DecodesSignedCertificateTimestamp) {
|
| std::string encoded_test_sct(ct::GetTestSignedCertificateTimestamp());
|
| base::StringPiece encoded_sct(encoded_test_sct);
|
|
|
| - ct::SignedCertificateTimestamp sct;
|
| + scoped_refptr<ct::SignedCertificateTimestamp> sct;
|
| ASSERT_TRUE(ct::DecodeSignedCertificateTimestamp(&encoded_sct, &sct));
|
| - EXPECT_EQ(0, sct.version);
|
| - EXPECT_EQ(ct::GetTestPublicKeyId(), sct.log_id);
|
| + EXPECT_EQ(0, sct->version);
|
| + EXPECT_EQ(ct::GetTestPublicKeyId(), sct->log_id);
|
| base::Time expected_time = base::Time::UnixEpoch() +
|
| base::TimeDelta::FromMilliseconds(1365181456089);
|
| - EXPECT_EQ(expected_time, sct.timestamp);
|
| + EXPECT_EQ(expected_time, sct->timestamp);
|
| // Subtracting 4 bytes for signature data (hash & sig algs),
|
| // actual signature data should be 71 bytes.
|
| - EXPECT_EQ((size_t) 71, sct.signature.signature_data.size());
|
| - EXPECT_EQ(std::string(""), sct.extensions);
|
| + EXPECT_EQ((size_t) 71, sct->signature.signature_data.size());
|
| + EXPECT_EQ(std::string(""), sct->extensions);
|
| }
|
|
|
| TEST_F(CtSerializationTest, FailsDecodingInvalidSignedCertificateTimestamp) {
|
| // Invalid version
|
| base::StringPiece invalid_version_sct("\x2\x0", 2);
|
| - ct::SignedCertificateTimestamp sct;
|
| + scoped_refptr<ct::SignedCertificateTimestamp> sct;
|
|
|
| ASSERT_FALSE(
|
| ct::DecodeSignedCertificateTimestamp(&invalid_version_sct, &sct));
|
|
|