Index: net/cert/internal/verify_certificate_chain.cc |
diff --git a/net/cert/internal/verify_certificate_chain.cc b/net/cert/internal/verify_certificate_chain.cc |
index 956c1736cbadcbb45f222e177ab1927a253e7515..df0c11e72d1ddb2fc1218cf73c8b886869e21405 100644 |
--- a/net/cert/internal/verify_certificate_chain.cc |
+++ b/net/cert/internal/verify_certificate_chain.cc |
@@ -160,9 +160,9 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing( |
} |
if (!VerifySignedData(cert.signature_algorithm(), cert.tbs_certificate_tlv(), |
- cert.signature_value(), working_spki, |
- signature_policy)) { |
- errors->Add(kSignatureVerificationFailed); |
+ cert.signature_value(), working_spki, signature_policy, |
+ errors)) { |
+ errors->Add(kVerifySignedDataFailed); |
return false; |
} |
@@ -584,8 +584,7 @@ DEFINE_CERT_ERROR_TYPE(kNotPermittedByNameConstraints, |
"Not permitted by name constraints"); |
DEFINE_CERT_ERROR_TYPE(kSubjectDoesNotMatchIssuer, |
"subject does not match issuer"); |
-DEFINE_CERT_ERROR_TYPE(kSignatureVerificationFailed, |
- "Signature verification failed"); |
+DEFINE_CERT_ERROR_TYPE(kVerifySignedDataFailed, "VerifySignedData failed"); |
DEFINE_CERT_ERROR_TYPE(kValidityFailedNotAfter, "Time is after notAfter"); |
DEFINE_CERT_ERROR_TYPE(kValidityFailedNotBefore, "Time is before notBefore"); |
DEFINE_CERT_ERROR_TYPE(kSignatureAlgorithmsDifferentEncoding, |