| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 6a9d4654bdf5c0cf3923e6b41898f74cd4dbb3a1..01b65a3dd7840869136730197d1dab85154537c7 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -685,10 +685,10 @@ class MockCTVerifier : public CTVerifier {
|
| class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| public:
|
| MOCK_METHOD4(DoesConformToCTEVPolicy,
|
| - bool(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist*,
|
| - const ct::CTVerifyResult&,
|
| - const BoundNetLog&));
|
| + ct::EVPolicyCompliance(X509Certificate* cert,
|
| + const ct::EVCertsWhitelist*,
|
| + const ct::SCTList&,
|
| + const BoundNetLog&));
|
| };
|
|
|
| class SSLClientSocketTest : public PlatformTest {
|
| @@ -2335,7 +2335,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusMaintainedForCompliantCert) {
|
| MockCTPolicyEnforcer policy_enforcer;
|
| SetCTPolicyEnforcer(&policy_enforcer);
|
| EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _))
|
| - .WillRepeatedly(Return(true));
|
| + .WillRepeatedly(Return(ct::EV_POLICY_COMPLIES_VIA_SCTS));
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| @@ -2367,7 +2367,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusRemovedForNonCompliantCert) {
|
| MockCTPolicyEnforcer policy_enforcer;
|
| SetCTPolicyEnforcer(&policy_enforcer);
|
| EXPECT_CALL(policy_enforcer, DoesConformToCTEVPolicy(_, _, _, _))
|
| - .WillRepeatedly(Return(false));
|
| + .WillRepeatedly(Return(ct::EV_POLICY_NOT_ENOUGH_SCTS));
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|