| Index: net/quic/crypto/proof_verifier_chromium_test.cc
|
| diff --git a/net/quic/crypto/proof_verifier_chromium_test.cc b/net/quic/crypto/proof_verifier_chromium_test.cc
|
| index ddd4c94b9e6b548a8e9871e2a76be1102cb0a55b..fd427648f4f5306527a6c28142fc8c4ef6db4475 100644
|
| --- a/net/quic/crypto/proof_verifier_chromium_test.cc
|
| +++ b/net/quic/crypto/proof_verifier_chromium_test.cc
|
| @@ -56,13 +56,14 @@ class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer {
|
| FailsTestCTPolicyEnforcer() {}
|
| ~FailsTestCTPolicyEnforcer() override {}
|
|
|
| - bool DoesConformToCTEVPolicy(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist* ev_whitelist,
|
| - const ct::CTVerifyResult& ct_result,
|
| - const BoundNetLog& net_log) override {
|
| + ct::EVPolicyCompliance DoesConformToCTEVPolicy(
|
| + X509Certificate* cert,
|
| + const ct::EVCertsWhitelist* ev_whitelist,
|
| + const ct::SCTList& verified_scts,
|
| + const BoundNetLog& net_log) override {
|
| ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should "
|
| << "not be called";
|
| - return false;
|
| + return ct::EV_POLICY_DOES_NOT_APPLY;
|
| }
|
| };
|
|
|
| @@ -73,11 +74,13 @@ class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {}
|
| ~MockCTPolicyEnforcer() override {}
|
|
|
| - bool DoesConformToCTEVPolicy(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist* ev_whitelist,
|
| - const ct::CTVerifyResult& ct_result,
|
| - const BoundNetLog& net_log) override {
|
| - return is_ev_;
|
| + ct::EVPolicyCompliance DoesConformToCTEVPolicy(
|
| + X509Certificate* cert,
|
| + const ct::EVCertsWhitelist* ev_whitelist,
|
| + const ct::SCTList& verified_scts,
|
| + const BoundNetLog& net_log) override {
|
| + return is_ev_ ? ct::EV_POLICY_COMPLIES_VIA_SCTS
|
| + : ct::EV_POLICY_NOT_ENOUGH_SCTS;
|
| }
|
|
|
| private:
|
|
|