Index: net/cert/ct_policy_enforcer.cc |
diff --git a/net/cert/ct_policy_enforcer.cc b/net/cert/ct_policy_enforcer.cc |
index cfc662fac28f6cab766106a31e67dd9f6495bc6b..7d9fb97cdb81f78dbf2c64146e579482b98e5ea7 100644 |
--- a/net/cert/ct_policy_enforcer.cc |
+++ b/net/cert/ct_policy_enforcer.cc |
@@ -381,7 +381,7 @@ ct::EVPolicyCompliance CertPolicyComplianceToEVPolicyCompliance( |
void CheckCTEVPolicyCompliance(X509Certificate* cert, |
const ct::EVCertsWhitelist* ev_whitelist, |
const ct::SCTList& verified_scts, |
- const BoundNetLog& net_log, |
+ const NetLogWithSource& net_log, |
EVComplianceDetails* result) { |
result->status = CertPolicyComplianceToEVPolicyCompliance( |
CheckCertPolicyCompliance(*cert, verified_scts)); |
@@ -399,7 +399,7 @@ void CheckCTEVPolicyCompliance(X509Certificate* cert, |
ct::CertPolicyCompliance CTPolicyEnforcer::DoesConformToCertPolicy( |
X509Certificate* cert, |
const ct::SCTList& verified_scts, |
- const BoundNetLog& net_log) { |
+ const NetLogWithSource& net_log) { |
// If the build is not timely, no certificate is considered compliant |
// with CT policy. The reasoning is that, for example, a log might |
// have been pulled and is no longer considered valid; thus, a client |
@@ -427,7 +427,7 @@ ct::EVPolicyCompliance CTPolicyEnforcer::DoesConformToCTEVPolicy( |
X509Certificate* cert, |
const ct::EVCertsWhitelist* ev_whitelist, |
const ct::SCTList& verified_scts, |
- const BoundNetLog& net_log) { |
+ const NetLogWithSource& net_log) { |
EVComplianceDetails details; |
// If the build is not timely, no certificate is considered compliant |
// with EV policy. The reasoning is that, for example, a log might |