• ppi@chromium.org's avatar
    Return specific cert verification errors on Android · 71f4b278
    ppi@chromium.org authored
    To implement CertVerifyProc on Android we refer to the Java 
    side to query the platform trust managers. Currently the 
    information we get from the platform is binary - each 
    certificate chain is either identified as trusted or not, in 
    which case we assume that this is due to not-trusted root.
    
    This patch provides better granularity distinguishing the 
    following cases: expired, not yet valid, incorrect (could not 
    be parsed), not trusted root.
    
    This allowed to reenable two net unittests:
    - CertVerifyProcTest.ExtraneousMD5RootCert
    - CertVerifyProcTest.IntermediateCARequireExplicitPolicy
    
    The following net unittest had to be disabled as it joins 
    the club of CertVerifyProc tests failing on bots with 
    incorrect time/date settings:
    - CertVerifyProcTest.InvalidKeyUsage
    
    BUG=169762
    
    Review URL: https://chromiumcodereview.appspot.com/12212135
    
    git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182280 0039d316-1c4b-4281-b951-d872f2087c98
    71f4b278
cert_verify_result_android.h 704 Bytes