| Index: net/cert/multi_log_ct_verifier.cc
|
| diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc
|
| index 8a2a823cf88dab7c80fdf61f55afc5c15117b7e6..14b3fbaa4503960fba2d794c69c9d32e3b043f3a 100644
|
| --- a/net/cert/multi_log_ct_verifier.cc
|
| +++ b/net/cert/multi_log_ct_verifier.cc
|
| @@ -35,7 +35,7 @@ int MultiLogCTVerifier::Verify(
|
| DCHECK(result);
|
|
|
| result->verified_scts.clear();
|
| - result->unverified_scts.clear();
|
| + result->invalid_scts.clear();
|
| result->unknown_logs_scts.clear();
|
|
|
| bool has_verified_scts = false;
|
| @@ -128,14 +128,14 @@ bool MultiLogCTVerifier::VerifySingleSCT(
|
|
|
| if (!it->second->Verify(expected_entry, *sct)) {
|
| DVLOG(1) << "Unable to verify SCT signature.";
|
| - result->unverified_scts.push_back(sct);
|
| + result->invalid_scts.push_back(sct);
|
| return false;
|
| }
|
|
|
| // SCT verified ok, just make sure the timestamp is legitimate.
|
| if (sct->timestamp > base::Time::Now()) {
|
| DVLOG(1) << "SCT is from the future!";
|
| - result->unverified_scts.push_back(sct);
|
| + result->invalid_scts.push_back(sct);
|
| return false;
|
| }
|
|
|
|
|