Index: net/socket/ssl_client_socket_nss.cc |
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
index 6ed21cece431b55d0f9199bef2dda34d869b932e..3e5bde05fa7ce8a8619b29dae69c7181192147df 100644 |
--- a/net/socket/ssl_client_socket_nss.cc |
+++ b/net/socket/ssl_client_socket_nss.cc |
@@ -1290,7 +1290,7 @@ SECStatus SSLClientSocketNSS::Core::PlatformClientAuthHandler( |
core->client_auth_cert_needed_ = !core->ssl_config_.send_client_cert; |
#if defined(OS_WIN) |
if (core->ssl_config_.send_client_cert) { |
- if (core->ssl_config_.client_cert) { |
+ if (core->ssl_config_.client_cert.get()) { |
PCCERT_CONTEXT cert_context = |
core->ssl_config_.client_cert->os_cert_handle(); |
@@ -1685,7 +1685,7 @@ int SSLClientSocketNSS::Core::HandleNSSError(PRErrorCode nss_error) { |
// re-insert the smart card if not. |
if ((net_error == ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY || |
net_error == ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED) && |
- ssl_config_.send_client_cert && ssl_config_.client_cert) { |
+ ssl_config_.send_client_cert && ssl_config_.client_cert.get()) { |
CertSetCertificateContextProperty( |
ssl_config_.client_cert->os_cert_handle(), |
CERT_KEY_PROV_HANDLE_PROP_ID, 0, NULL); |
@@ -2436,7 +2436,7 @@ void SSLClientSocketNSS::Core::UpdateStapledOCSPResponse() { |
if (IsOCSPStaplingSupported()) { |
#if defined(OS_WIN) |
- if (nss_handshake_state_.server_cert) { |
+ if (nss_handshake_state_.server_cert.get()) { |
CRYPT_DATA_BLOB ocsp_response_blob; |
ocsp_response_blob.cbData = ocsp_responses->items[0].len; |
ocsp_response_blob.pbData = ocsp_responses->items[0].data; |