Return specific cert verification errors on Android

To implement CertVerifyProc on Android we refer to the Java 
side to query the platform trust managers. Currently the 
information we get from the platform is binary - each 
certificate chain is either identified as trusted or not, in 
which case we assume that this is due to not-trusted root.

This patch provides better granularity distinguishing the 
following cases: expired, not yet valid, incorrect (could not 
be parsed), not trusted root.

This allowed to reenable two net unittests:
- CertVerifyProcTest.ExtraneousMD5RootCert
- CertVerifyProcTest.IntermediateCARequireExplicitPolicy

The following net unittest had to be disabled as it joins 
the club of CertVerifyProc tests failing on bots with 
incorrect time/date settings:
- CertVerifyProcTest.InvalidKeyUsage

BUG=169762

Review URL: https://chromiumcodereview.appspot.com/12212135

git-svn-id: http://src.chromium.org/svn/trunk/src/build@182280 4ff67af0-8c30-449e-8e8b-ad334ec8d88c
This commit is contained in:
ppi@chromium.org 2013-02-13 19:13:49 +00:00
Родитель b9d5f9dc17
Коммит 7c23b4f433
1 изменённых файлов: 1 добавлений и 2 удалений

Просмотреть файл

@ -1,6 +1,4 @@
# List of suppressions.
CertVerifyProcTest.ExtraneousMD5RootCert
CertVerifyProcTest.IntermediateCARequireExplicitPolicy
CertVerifyProcTest.PublicKeyHashes
CertVerifyProcTest.RejectWeakKeys
CertVerifyProcTest.VerifyReturnChainBasic
@ -40,6 +38,7 @@ VerifyRoot/CertVerifyProcWeakDigestTest.Verify/2
# Fail only on bots.
CertVerifyProcTest.TestKnownRoot
CertVerifyProcTest.WithoutRevocationChecking
CertVerifyProcTest.InvalidKeyUsage
HttpCache.RangeGET_Cancel
HttpCache.RangeGET_Cancel2
HttpCache.RangeGET_OK