scoped_refptr<ct::SignedCertificateTimestamp> cert_sct;
ct::GetX509CertSCT(&cert_sct);
- EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct));
+ EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct.get()));
}
TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) {
scoped_refptr<ct::SignedCertificateTimestamp> precert_sct;
ct::GetPrecertSCT(&precert_sct);
- EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct));
+ EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct.get()));
}
TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) {
// Mangle the timestamp, so that it should fail signature validation.
cert_sct->timestamp = base::Time::Now();
- EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
+ EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
}
TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
// attempting signature validation.
cert_sct->log_id.assign(cert_sct->log_id.size(), '\0');
- EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
+ EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
}
TEST_F(CTLogVerifierTest, SetsValidSTH) {