| Index: components/cast_certificate/cast_crl.cc
|
| diff --git a/components/cast_certificate/cast_crl.cc b/components/cast_certificate/cast_crl.cc
|
| index c1b15be848ae19223bd12cad6e2318334132d4f6..600b5efd4aec3998470b4c896dee55ffd18ca6c1 100644
|
| --- a/components/cast_certificate/cast_crl.cc
|
| +++ b/components/cast_certificate/cast_crl.cc
|
| @@ -145,9 +145,9 @@ bool VerifyCRL(const Crl& crl,
|
| &result);
|
| net::CompletionStatus rv = path_builder.Run(base::Closure());
|
| DCHECK_EQ(rv, net::CompletionStatus::SYNC);
|
| - if (!result.is_success() || result.paths.empty() ||
|
| - !result.paths[result.best_result_index]->is_success()) {
|
| + if (!result.HasValidPath()) {
|
| VLOG(2) << "CRL - Issuer certificate verification failed.";
|
| + // TODO(crbug.com/634443): Log the error information.
|
| return false;
|
| }
|
| // There are no requirements placed on the leaf certificate having any
|
| @@ -174,7 +174,7 @@ bool VerifyCRL(const Crl& crl,
|
| // "expiration" of the trust anchor is handled instead by its
|
| // presence in the trust store.
|
| *overall_not_after = not_after;
|
| - for (const auto& cert : result.paths[result.best_result_index]->path.certs) {
|
| + for (const auto& cert : result.GetBestValidPath()->path.certs) {
|
| net::der::GeneralizedTime cert_not_after = cert->tbs().validity_not_after;
|
| if (cert_not_after < *overall_not_after)
|
| *overall_not_after = cert_not_after;
|
|
|