Index: remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
diff --git a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
index 10fdcf74e73b0af7044dec0166844afe4c562e34..9f3db7e171d089bd11a7cad2fcdec800028c4b0d 100644 |
--- a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
+++ b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
@@ -117,10 +117,10 @@ class SslHmacChannelAuthenticatorTest : public testing::Test { |
// Verify that a channel can be connected using a valid shared secret. |
TEST_F(SslHmacChannelAuthenticatorTest, SuccessfulAuth) { |
- client_auth_.reset(SslHmacChannelAuthenticator::CreateForClient( |
- host_cert_, kTestSharedSecret)); |
- host_auth_.reset(SslHmacChannelAuthenticator::CreateForHost( |
- host_cert_, private_key_.get(), kTestSharedSecret)); |
+ client_auth_ = SslHmacChannelAuthenticator::CreateForClient( |
+ host_cert_, kTestSharedSecret); |
+ host_auth_ = SslHmacChannelAuthenticator::CreateForHost( |
+ host_cert_, private_key_.get(), kTestSharedSecret); |
RunChannelAuth(false); |
@@ -137,10 +137,10 @@ TEST_F(SslHmacChannelAuthenticatorTest, SuccessfulAuth) { |
// Verify that channels cannot be using invalid shared secret. |
TEST_F(SslHmacChannelAuthenticatorTest, InvalidChannelSecret) { |
- client_auth_.reset(SslHmacChannelAuthenticator::CreateForClient( |
- host_cert_, kTestSharedSecretBad)); |
- host_auth_.reset(SslHmacChannelAuthenticator::CreateForHost( |
- host_cert_, private_key_.get(), kTestSharedSecret)); |
+ client_auth_ = SslHmacChannelAuthenticator::CreateForClient( |
+ host_cert_, kTestSharedSecretBad); |
+ host_auth_ = SslHmacChannelAuthenticator::CreateForHost( |
+ host_cert_, private_key_.get(), kTestSharedSecret); |
RunChannelAuth(true); |