Index: net/cert/multi_log_ct_verifier.cc |
diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc |
index 61010977199de59cc8d3e63decd54ba565d74326..6c81da23f46462b66c45fdf1cc4928b0839d50d4 100644 |
--- a/net/cert/multi_log_ct_verifier.cc |
+++ b/net/cert/multi_log_ct_verifier.cc |
@@ -35,7 +35,7 @@ int MultiLogCTVerifier::Verify( |
DCHECK(result); |
result->verified_scts.clear(); |
- result->unverified_scts.clear(); |
+ result->invalid_scts.clear(); |
result->unknown_logs_scts.clear(); |
bool has_verified_scts = false; |
@@ -127,14 +127,14 @@ bool MultiLogCTVerifier::VerifySingleSCT( |
if (!it->second->Verify(expected_entry, *sct)) { |
DVLOG(1) << "Unable to verify SCT signature."; |
- result->unverified_scts.push_back(sct); |
+ result->invalid_scts.push_back(sct); |
return false; |
} |
// SCT verified ok, just make sure the timestamp is legitimate. |
if (sct->timestamp > base::Time::Now()) { |
DVLOG(1) << "SCT is from the future!"; |
- result->unverified_scts.push_back(sct); |
+ result->invalid_scts.push_back(sct); |
return false; |
} |