Index: net/cert/internal/signature_policy.cc |
diff --git a/net/cert/internal/signature_policy.cc b/net/cert/internal/signature_policy.cc |
index 6a1c2a9936d86b5dba97145c367b84d9a2e782e7..c8aae9aed26bf90c7fff257f980c412c2bf2aa0b 100644 |
--- a/net/cert/internal/signature_policy.cc |
+++ b/net/cert/internal/signature_policy.cc |
@@ -36,7 +36,7 @@ bool SignaturePolicy::IsAcceptableCurveForEcdsa(int curve_nid, |
return true; |
} |
- errors->Add(kUnacceptableCurveForEcdsa); |
+ errors->AddError(kUnacceptableCurveForEcdsa); |
return false; |
} |
@@ -45,7 +45,7 @@ bool SignaturePolicy::IsAcceptableModulusLengthForRsa( |
CertErrors* errors) const { |
if (modulus_length_bits < 2048) { |
// TODO(crbug.com/634443): Add a parameter for actual modulus size. |
- errors->Add(kRsaModulusLessThan2048); |
+ errors->AddError(kRsaModulusLessThan2048); |
return false; |
} |
@@ -61,7 +61,7 @@ bool SimpleSignaturePolicy::IsAcceptableModulusLengthForRsa( |
if (modulus_length_bits < min_rsa_modulus_length_bits_) { |
// TODO(crbug.com/634443): Add parameters for actual and expected modulus |
// size. |
- errors->Add(kRsaModulusTooSmall); |
+ errors->AddError(kRsaModulusTooSmall); |
return false; |
} |