Index: net/socket/ssl_client_socket_unittest.cc |
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc |
index 6a9d4654bdf5c0cf3923e6b41898f74cd4dbb3a1..01b65a3dd7840869136730197d1dab85154537c7 100644 |
--- a/net/socket/ssl_client_socket_unittest.cc |
+++ b/net/socket/ssl_client_socket_unittest.cc |
@@ -685,10 +685,10 @@ class MockCTVerifier : public CTVerifier { |
class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
public: |
MOCK_METHOD4(DoesConformToCTEVPolicy, |
- bool(X509Certificate* cert, |
- const ct::EVCertsWhitelist*, |
- const ct::CTVerifyResult&, |
- const BoundNetLog&)); |
+ ct::EVPolicyCompliance(X509Certificate* cert, |
+ const ct::EVCertsWhitelist*, |
+ const ct::SCTList&, |
+ const BoundNetLog&)); |
}; |
class SSLClientSocketTest : public PlatformTest { |
@@ -2335,7 +2335,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusMaintainedForCompliantCert) { |
MockCTPolicyEnforcer policy_enforcer; |
SetCTPolicyEnforcer(&policy_enforcer); |
EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _)) |
- .WillRepeatedly(Return(true)); |
+ .WillRepeatedly(Return(ct::EV_POLICY_COMPLIES_VIA_SCTS)); |
int rv; |
ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv)); |
@@ -2367,7 +2367,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusRemovedForNonCompliantCert) { |
MockCTPolicyEnforcer policy_enforcer; |
SetCTPolicyEnforcer(&policy_enforcer); |
EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _)) |
- .WillRepeatedly(Return(false)); |
+ .WillRepeatedly(Return(ct::EV_POLICY_NOT_ENOUGH_SCTS)); |
int rv; |
ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv)); |