| Index: net/cert/multi_log_ct_verifier.cc
 | 
| diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc
 | 
| index 6b12eff9442be7b23714f0f76b38b7b6fa8fd960..61010977199de59cc8d3e63decd54ba565d74326 100644
 | 
| --- a/net/cert/multi_log_ct_verifier.cc
 | 
| +++ b/net/cert/multi_log_ct_verifier.cc
 | 
| @@ -60,25 +60,24 @@ int MultiLogCTVerifier::Verify(
 | 
|    }
 | 
|  
 | 
|    ct::LogEntry x509_entry;
 | 
| -  if (!ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry))
 | 
| -    return has_verified_scts ? OK : ERR_FAILED;
 | 
| -
 | 
| -  has_verified_scts |= VerifySCTs(
 | 
| -      sct_list_from_ocsp,
 | 
| -      x509_entry,
 | 
| -      ct::SignedCertificateTimestamp::SCT_FROM_OCSP_RESPONSE,
 | 
| -      result);
 | 
| -
 | 
| -  has_verified_scts |= VerifySCTs(
 | 
| -      sct_list_from_tls_extension,
 | 
| -      x509_entry,
 | 
| -      ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION,
 | 
| -      result);
 | 
| +  if (ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry)) {
 | 
| +    has_verified_scts |= VerifySCTs(
 | 
| +        sct_list_from_ocsp,
 | 
| +        x509_entry,
 | 
| +        ct::SignedCertificateTimestamp::SCT_FROM_OCSP_RESPONSE,
 | 
| +        result);
 | 
| +
 | 
| +    has_verified_scts |= VerifySCTs(
 | 
| +        sct_list_from_tls_extension,
 | 
| +        x509_entry,
 | 
| +        ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION,
 | 
| +        result);
 | 
| +  }
 | 
|  
 | 
|    if (has_verified_scts)
 | 
|      return OK;
 | 
|  
 | 
| -  return ERR_FAILED;
 | 
| +  return ERR_CT_NO_SCTS_VERIFIED_OK;
 | 
|  }
 | 
|  
 | 
|  bool MultiLogCTVerifier::VerifySCTs(
 | 
| @@ -119,7 +118,6 @@ bool MultiLogCTVerifier::VerifySingleSCT(
 | 
|      ct::CTVerifyResult* result) {
 | 
|  
 | 
|    // Assume this SCT is untrusted until proven otherwise.
 | 
| -
 | 
|    IDToLogMap::iterator it = logs_.find(sct->log_id);
 | 
|    if (it == logs_.end()) {
 | 
|      DVLOG(1) << "SCT does not match any known log.";
 | 
| 
 |