| Index: net/cert/multi_log_ct_verifier.cc
|
| diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc
|
| index 6b12eff9442be7b23714f0f76b38b7b6fa8fd960..61010977199de59cc8d3e63decd54ba565d74326 100644
|
| --- a/net/cert/multi_log_ct_verifier.cc
|
| +++ b/net/cert/multi_log_ct_verifier.cc
|
| @@ -60,25 +60,24 @@ int MultiLogCTVerifier::Verify(
|
| }
|
|
|
| ct::LogEntry x509_entry;
|
| - if (!ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry))
|
| - return has_verified_scts ? OK : ERR_FAILED;
|
| -
|
| - has_verified_scts |= VerifySCTs(
|
| - sct_list_from_ocsp,
|
| - x509_entry,
|
| - ct::SignedCertificateTimestamp::SCT_FROM_OCSP_RESPONSE,
|
| - result);
|
| -
|
| - has_verified_scts |= VerifySCTs(
|
| - sct_list_from_tls_extension,
|
| - x509_entry,
|
| - ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION,
|
| - result);
|
| + if (ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry)) {
|
| + has_verified_scts |= VerifySCTs(
|
| + sct_list_from_ocsp,
|
| + x509_entry,
|
| + ct::SignedCertificateTimestamp::SCT_FROM_OCSP_RESPONSE,
|
| + result);
|
| +
|
| + has_verified_scts |= VerifySCTs(
|
| + sct_list_from_tls_extension,
|
| + x509_entry,
|
| + ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION,
|
| + result);
|
| + }
|
|
|
| if (has_verified_scts)
|
| return OK;
|
|
|
| - return ERR_FAILED;
|
| + return ERR_CT_NO_SCTS_VERIFIED_OK;
|
| }
|
|
|
| bool MultiLogCTVerifier::VerifySCTs(
|
| @@ -119,7 +118,6 @@ bool MultiLogCTVerifier::VerifySingleSCT(
|
| ct::CTVerifyResult* result) {
|
|
|
| // Assume this SCT is untrusted until proven otherwise.
|
| -
|
| IDToLogMap::iterator it = logs_.find(sct->log_id);
|
| if (it == logs_.end()) {
|
| DVLOG(1) << "SCT does not match any known log.";
|
|
|