| Index: net/socket/ssl_server_socket_unittest.cc
|
| diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc
|
| index 47404eaee3964c4a0cde8e4235e2314777c8827e..e3e242f8f0d6d31faa744f4d47677455e7ed4d3e 100644
|
| --- a/net/socket/ssl_server_socket_unittest.cc
|
| +++ b/net/socket/ssl_server_socket_unittest.cc
|
| @@ -97,7 +97,7 @@ class MockCTVerifier : public CTVerifier {
|
| const std::string& stapled_ocsp_response,
|
| const std::string& sct_list_from_tls_extension,
|
| ct::CTVerifyResult* result,
|
| - const BoundNetLog& net_log) override {
|
| + const NetLogWithSource& net_log) override {
|
| return net::OK;
|
| }
|
|
|
| @@ -111,7 +111,7 @@ class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| ct::CertPolicyCompliance DoesConformToCertPolicy(
|
| X509Certificate* cert,
|
| const SCTList& verified_scts,
|
| - const BoundNetLog& net_log) override {
|
| + const NetLogWithSource& net_log) override {
|
| return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS;
|
| }
|
|
|
| @@ -119,7 +119,7 @@ class MockCTPolicyEnforcer : public CTPolicyEnforcer {
|
| X509Certificate* cert,
|
| const ct::EVCertsWhitelist* ev_whitelist,
|
| const SCTList& verified_scts,
|
| - const BoundNetLog& net_log) override {
|
| + const NetLogWithSource& net_log) override {
|
| return ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS;
|
| }
|
| };
|
| @@ -293,7 +293,7 @@ class FakeSocket : public StreamSocket {
|
| return OK;
|
| }
|
|
|
| - const BoundNetLog& NetLog() const override { return net_log_; }
|
| + const NetLogWithSource& NetLog() const override { return net_log_; }
|
|
|
| void SetSubresourceSpeculation() override {}
|
| void SetOmniboxSpeculation() override {}
|
| @@ -320,7 +320,7 @@ class FakeSocket : public StreamSocket {
|
| }
|
|
|
| private:
|
| - BoundNetLog net_log_;
|
| + NetLogWithSource net_log_;
|
| FakeDataChannel* incoming_;
|
| FakeDataChannel* outgoing_;
|
|
|
|
|