| Index: net/quic/crypto/proof_verifier_chromium_test.cc
|
| diff --git a/net/quic/crypto/proof_verifier_chromium_test.cc b/net/quic/crypto/proof_verifier_chromium_test.cc
|
| index ddd4c94b9e6b548a8e9871e2a76be1102cb0a55b..e245666e2fbbc2d4e3a225de603cea7dcc7e39a1 100644
|
| --- a/net/quic/crypto/proof_verifier_chromium_test.cc
|
| +++ b/net/quic/crypto/proof_verifier_chromium_test.cc
|
| @@ -56,13 +56,14 @@ class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer {
|
| FailsTestCTPolicyEnforcer() {}
|
| ~FailsTestCTPolicyEnforcer() override {}
|
|
|
| - bool DoesConformToCTEVPolicy(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist* ev_whitelist,
|
| - const ct::CTVerifyResult& ct_result,
|
| - const BoundNetLog& net_log) override {
|
| + EVPolicyCompliance DoesConformToCTEVPolicy(
|
| + X509Certificate* cert,
|
| + const ct::EVCertsWhitelist* ev_whitelist,
|
| + const ct::SCTList& verified_scts,
|
| + const BoundNetLog& net_log) override {
|
| ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should "
|
| << "not be called";
|
| - return false;
|
| + return EV_POLICY_DOES_NOT_APPLY;
|
| }
|
| };
|
|
|
| @@ -73,11 +74,12 @@ class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {}
|
| ~MockCTPolicyEnforcer() override {}
|
|
|
| - bool DoesConformToCTEVPolicy(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist* ev_whitelist,
|
| - const ct::CTVerifyResult& ct_result,
|
| - const BoundNetLog& net_log) override {
|
| - return is_ev_;
|
| + EVPolicyCompliance DoesConformToCTEVPolicy(
|
| + X509Certificate* cert,
|
| + const ct::EVCertsWhitelist* ev_whitelist,
|
| + const ct::SCTList& verified_scts,
|
| + const BoundNetLog& net_log) override {
|
| + return is_ev_ ? EV_POLICY_COMPLIES_VIA_SCTS : EV_POLICY_DOES_NOT_APPLY;
|
| }
|
|
|
| private:
|
|
|