Index: net/cert/multi_log_ct_verifier.cc |
diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc |
index 8cba5b043ee64176926e4ebb4d04682996909233..1f51419b7a69adbb5d983e38c62c1271573addd4 100644 |
--- a/net/cert/multi_log_ct_verifier.cc |
+++ b/net/cert/multi_log_ct_verifier.cc |
@@ -199,14 +199,14 @@ bool MultiLogCTVerifier::VerifySingleSCT( |
if (!it->second->Verify(expected_entry, *sct.get())) { |
DVLOG(1) << "Unable to verify SCT signature."; |
- AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID, &(result->scts)); |
+ AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID_SIGNATURE, &(result->scts)); |
return false; |
} |
// SCT verified ok, just make sure the timestamp is legitimate. |
if (sct->timestamp > base::Time::Now()) { |
DVLOG(1) << "SCT is from the future!"; |
- AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID, &(result->scts)); |
+ AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID_TIMESTAMP, &(result->scts)); |
return false; |
} |