| Index: net/cert/multi_log_ct_verifier.cc
|
| diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc
|
| index 8cba5b043ee64176926e4ebb4d04682996909233..1f51419b7a69adbb5d983e38c62c1271573addd4 100644
|
| --- a/net/cert/multi_log_ct_verifier.cc
|
| +++ b/net/cert/multi_log_ct_verifier.cc
|
| @@ -199,14 +199,14 @@ bool MultiLogCTVerifier::VerifySingleSCT(
|
|
|
| if (!it->second->Verify(expected_entry, *sct.get())) {
|
| DVLOG(1) << "Unable to verify SCT signature.";
|
| - AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID, &(result->scts));
|
| + AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID_SIGNATURE, &(result->scts));
|
| return false;
|
| }
|
|
|
| // SCT verified ok, just make sure the timestamp is legitimate.
|
| if (sct->timestamp > base::Time::Now()) {
|
| DVLOG(1) << "SCT is from the future!";
|
| - AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID, &(result->scts));
|
| + AddSCTAndLogStatus(sct, ct::SCT_STATUS_INVALID_TIMESTAMP, &(result->scts));
|
| return false;
|
| }
|
|
|
|
|