Index: net/socket/ssl_client_socket_unittest.cc |
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc |
index d54f0035cfbdd0dc592e45aae9abe756bba6ba6f..ba92459763e5bd7483d319e36d3aca76b708bc13 100644 |
--- a/net/socket/ssl_client_socket_unittest.cc |
+++ b/net/socket/ssl_client_socket_unittest.cc |
@@ -699,6 +699,10 @@ class MockCTVerifier : public CTVerifier { |
// A mock CTPolicyEnforcer that returns a custom verification result. |
class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
public: |
+ MOCK_METHOD3(DoesConformToCertPolicy, |
+ ct::CertPolicyCompliance(X509Certificate* cert, |
+ const ct::SCTList&, |
+ const BoundNetLog&)); |
MOCK_METHOD4(DoesConformToCTEVPolicy, |
ct::EVPolicyCompliance(X509Certificate* cert, |
const ct::EVCertsWhitelist*, |
@@ -2349,6 +2353,9 @@ TEST_F(SSLClientSocketTest, EVCertStatusMaintainedForCompliantCert) { |
// Emulate compliance of the certificate to the policy. |
MockCTPolicyEnforcer policy_enforcer; |
SetCTPolicyEnforcer(&policy_enforcer); |
+ EXPECT_CALL(policy_enforcer, DoesConformToCertPolicy(_, _, _)) |
+ .WillRepeatedly( |
+ Return(ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS)); |
EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _)) |
.WillRepeatedly( |
Return(ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS)); |
@@ -2382,6 +2389,9 @@ TEST_F(SSLClientSocketTest, EVCertStatusRemovedForNonCompliantCert) { |
// Emulate non-compliance of the certificate to the policy. |
MockCTPolicyEnforcer policy_enforcer; |
SetCTPolicyEnforcer(&policy_enforcer); |
+ EXPECT_CALL(policy_enforcer, DoesConformToCertPolicy(_, _, _)) |
+ .WillRepeatedly( |
+ Return(ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS)); |
EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _)) |
.WillRepeatedly( |
Return(ct::EVPolicyCompliance::EV_POLICY_NOT_ENOUGH_SCTS)); |