| Index: net/quic/chromium/crypto/proof_verifier_chromium_test.cc
|
| diff --git a/net/quic/chromium/crypto/proof_verifier_chromium_test.cc b/net/quic/chromium/crypto/proof_verifier_chromium_test.cc
|
| index f6cf67f702923e1173223ca0d6df9630c98963af..1488f02cacd3687912ff9cdc39731421c5c915cb 100644
|
| --- a/net/quic/chromium/crypto/proof_verifier_chromium_test.cc
|
| +++ b/net/quic/chromium/crypto/proof_verifier_chromium_test.cc
|
| @@ -42,7 +42,7 @@ class FailsTestCertVerifier : public CertVerifier {
|
| CertVerifyResult* verify_result,
|
| const CompletionCallback& callback,
|
| std::unique_ptr<Request>* out_req,
|
| - const BoundNetLog& net_log) override {
|
| + const NetLogWithSource& net_log) override {
|
| ADD_FAILURE() << "CertVerifier::Verify() should not be called";
|
| return ERR_FAILED;
|
| }
|
| @@ -58,7 +58,7 @@ class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer {
|
| X509Certificate* cert,
|
| const ct::EVCertsWhitelist* ev_whitelist,
|
| const ct::SCTList& verified_scts,
|
| - const BoundNetLog& net_log) override {
|
| + const NetLogWithSource& net_log) override {
|
| ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should "
|
| << "not be called";
|
| return ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
|
| @@ -71,12 +71,12 @@ class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| MOCK_METHOD3(DoesConformToCertPolicy,
|
| ct::CertPolicyCompliance(X509Certificate* cert,
|
| const ct::SCTList&,
|
| - const BoundNetLog&));
|
| + const NetLogWithSource&));
|
| MOCK_METHOD4(DoesConformToCTEVPolicy,
|
| ct::EVPolicyCompliance(X509Certificate* cert,
|
| const ct::EVCertsWhitelist*,
|
| const ct::SCTList&,
|
| - const BoundNetLog&));
|
| + const NetLogWithSource&));
|
| };
|
|
|
| class MockRequireCTDelegate : public TransportSecurityState::RequireCTDelegate {
|
| @@ -108,7 +108,7 @@ class ProofVerifierChromiumTest : public ::testing::Test {
|
| public:
|
| ProofVerifierChromiumTest()
|
| : verify_context_(new ProofVerifyContextChromium(0 /*cert_verify_flags*/,
|
| - BoundNetLog())) {}
|
| + NetLogWithSource())) {}
|
|
|
| void SetUp() override {
|
| EXPECT_CALL(ct_policy_enforcer_, DoesConformToCertPolicy(_, _, _))
|
|
|