Index: net/cert/multi_log_ct_verifier.cc |
diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc |
index 6b12eff9442be7b23714f0f76b38b7b6fa8fd960..eb42c3590f5e4867ee6306e4bc544c2b5382e09b 100644 |
--- a/net/cert/multi_log_ct_verifier.cc |
+++ b/net/cert/multi_log_ct_verifier.cc |
@@ -61,7 +61,7 @@ int MultiLogCTVerifier::Verify( |
ct::LogEntry x509_entry; |
if (!ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry)) |
- return has_verified_scts ? OK : ERR_FAILED; |
+ return has_verified_scts ? OK : ERR_CT_LOG_ENTRY_CREATION_FAILED; |
has_verified_scts |= VerifySCTs( |
sct_list_from_ocsp, |
@@ -78,7 +78,7 @@ int MultiLogCTVerifier::Verify( |
if (has_verified_scts) |
return OK; |
- return ERR_FAILED; |
+ return ERR_NO_SCTS_VERIFIED_OK; |
} |
bool MultiLogCTVerifier::VerifySCTs( |
@@ -119,7 +119,6 @@ bool MultiLogCTVerifier::VerifySingleSCT( |
ct::CTVerifyResult* result) { |
// Assume this SCT is untrusted until proven otherwise. |
- |
IDToLogMap::iterator it = logs_.find(sct->log_id); |
if (it == logs_.end()) { |
DVLOG(1) << "SCT does not match any known log."; |