Index: chrome/common/net/x509_certificate_model_unittest.cc |
diff --git a/chrome/common/net/x509_certificate_model_unittest.cc b/chrome/common/net/x509_certificate_model_unittest.cc |
index cd305a39bdeb2bcd2302e4b214de50e0b7744839..40e2834bb9ae59b7cf377ea53ba6cb32d21944d6 100644 |
--- a/chrome/common/net/x509_certificate_model_unittest.cc |
+++ b/chrome/common/net/x509_certificate_model_unittest.cc |
@@ -28,7 +28,7 @@ TEST(X509CertificateModelTest, GetTypeCA) { |
// Test that explicitly distrusted CA certs are still returned as CA_CERT |
// type. See http://crbug.com/96654. |
EXPECT_TRUE(net::NSSCertDatabase::GetInstance()->SetCertTrust( |
- cert, net::CA_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); |
+ cert.get(), net::CA_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); |
EXPECT_EQ(net::CA_CERT, |
x509_certificate_model::GetType(cert->os_cert_handle())); |
@@ -56,14 +56,14 @@ TEST(X509CertificateModelTest, GetTypeServer) { |
net::NSSCertDatabase* cert_db = net::NSSCertDatabase::GetInstance(); |
// Test GetCertType with server certs and explicit trust. |
EXPECT_TRUE(cert_db->SetCertTrust( |
- cert, net::SERVER_CERT, net::NSSCertDatabase::TRUSTED_SSL)); |
+ cert.get(), net::SERVER_CERT, net::NSSCertDatabase::TRUSTED_SSL)); |
EXPECT_EQ(net::SERVER_CERT, |
x509_certificate_model::GetType(cert->os_cert_handle())); |
// Test GetCertType with server certs and explicit distrust. |
EXPECT_TRUE(cert_db->SetCertTrust( |
- cert, net::SERVER_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); |
+ cert.get(), net::SERVER_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); |
EXPECT_EQ(net::SERVER_CERT, |
x509_certificate_model::GetType(cert->os_cert_handle())); |