| Index: net/cert/internal/verify_signed_data.cc
|
| diff --git a/net/cert/internal/verify_signed_data.cc b/net/cert/internal/verify_signed_data.cc
|
| index eab84e379d3dff048d9c8635a127cb899c1102fe..bd0ee60f5ea645f88f8a70c232ed20ee7c6e8a2b 100644
|
| --- a/net/cert/internal/verify_signed_data.cc
|
| +++ b/net/cert/internal/verify_signed_data.cc
|
| @@ -167,7 +167,7 @@ WARN_UNUSED_RESULT bool ParseRsaKeyFromSpki(const der::Input& public_key_spki,
|
| unsigned int modulus_length_bits = BN_num_bits(rsa->n);
|
|
|
| if (!policy->IsAcceptableModulusLengthForRsa(modulus_length_bits, errors)) {
|
| - errors->Add(kUnacceptableRsaModulusLength);
|
| + errors->AddError(kUnacceptableRsaModulusLength);
|
| return false;
|
| }
|
|
|
| @@ -276,7 +276,7 @@ WARN_UNUSED_RESULT bool ParseEcKeyFromSpki(const der::Input& public_key_spki,
|
| int curve_nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec.get()));
|
|
|
| if (!policy->IsAcceptableCurveForEcdsa(curve_nid, errors)) {
|
| - errors->Add(kUnacceptableEcdsaCurve);
|
| + errors->AddError(kUnacceptableEcdsaCurve);
|
| return false;
|
| }
|
|
|
| @@ -292,7 +292,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
|
| const SignaturePolicy* policy,
|
| CertErrors* errors) {
|
| if (!policy->IsAcceptableSignatureAlgorithm(signature_algorithm, errors)) {
|
| - errors->Add(kUnacceptableSignatureAlgorithm);
|
| + errors->AddError(kUnacceptableSignatureAlgorithm);
|
| return false;
|
| }
|
|
|
| @@ -313,7 +313,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
|
|
|
| if (!DoVerify(signature_algorithm, signed_data, signature_value,
|
| public_key.get())) {
|
| - errors->Add(kSignatureVerificationFailed);
|
| + errors->AddError(kSignatureVerificationFailed);
|
| return false;
|
| }
|
|
|
|
|