OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 // This file intentionally does not have header guards, it's included | |
6 // inside a macro to generate enum values. | |
7 | |
8 // This file contains the list of certificate verification results returned | |
9 // from Java side to the C++ side. | |
10 | |
11 // Certificate is trusted. | |
12 CERT_VERIFY_STATUS_ANDROID(OK, 0) | |
13 | |
14 // Certificate verification could not be conducted. | |
15 CERT_VERIFY_STATUS_ANDROID(FAILED, -1) | |
16 | |
17 // Certificate is not trusted due to non-trusted root of the certificate chain. | |
18 CERT_VERIFY_STATUS_ANDROID(NO_TRUSTED_ROOT, -2) | |
19 | |
20 // Certificate is not trusted because it has expired. | |
21 CERT_VERIFY_STATUS_ANDROID(EXPIRED, -3) | |
22 | |
23 // Certificate is not trusted because it is not valid yet. | |
24 CERT_VERIFY_STATUS_ANDROID(NOT_YET_VALID, -4) | |
25 | |
26 // Certificate is not trusted because it could not be parsed. | |
27 CERT_VERIFY_STATUS_ANDROID(UNABLE_TO_PARSE, -5) | |
28 | |
29 // Certificate is not trusted because it has an extendedKeyUsage field, but | |
30 // its value is not correct for a web server. | |
31 CERT_VERIFY_STATUS_ANDROID(INCORRECT_KEY_USAGE, -6) | |
OLD | NEW |