Upstream version 10.39.225.0
[platform/framework/web/crosswalk.git] / src / net / cert / ct_log_verifier_unittest.cc
index 9b3211d..23cbf51 100644 (file)
@@ -36,7 +36,7 @@ TEST_F(CTLogVerifierTest, VerifiesCertSCT) {
   scoped_refptr<ct::SignedCertificateTimestamp> cert_sct;
   ct::GetX509CertSCT(&cert_sct);
 
-  EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct));
+  EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct.get()));
 }
 
 TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) {
@@ -46,7 +46,7 @@ TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) {
   scoped_refptr<ct::SignedCertificateTimestamp> precert_sct;
   ct::GetPrecertSCT(&precert_sct);
 
-  EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct));
+  EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct.get()));
 }
 
 TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) {
@@ -59,7 +59,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) {
   // Mangle the timestamp, so that it should fail signature validation.
   cert_sct->timestamp = base::Time::Now();
 
-  EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
+  EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
 }
 
 TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
@@ -73,7 +73,7 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) {
   // attempting signature validation.
   cert_sct->log_id.assign(cert_sct->log_id.size(), '\0');
 
-  EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct));
+  EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get()));
 }
 
 TEST_F(CTLogVerifierTest, SetsValidSTH) {