| Index: net/android/java/src/org/chromium/net/X509Util.java
|
| diff --git a/net/android/java/src/org/chromium/net/X509Util.java b/net/android/java/src/org/chromium/net/X509Util.java
|
| index 00a24e41016466418e13d21607923aa716826754..35ebdb7e983a08b463bd520c2e239857f90a6083 100644
|
| --- a/net/android/java/src/org/chromium/net/X509Util.java
|
| +++ b/net/android/java/src/org/chromium/net/X509Util.java
|
| @@ -433,7 +433,7 @@ public class X509Util {
|
| try {
|
| ensureInitialized();
|
| } catch (CertificateException e) {
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_FAILED);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.FAILED);
|
| }
|
|
|
| X509Certificate[] serverCertificates = new X509Certificate[certChain.length];
|
| @@ -442,7 +442,7 @@ public class X509Util {
|
| serverCertificates[i] = createCertificateFromBytes(certChain[i]);
|
| }
|
| } catch (CertificateException e) {
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_UNABLE_TO_PARSE);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.UNABLE_TO_PARSE);
|
| }
|
|
|
| // Expired and not yet valid certificates would be rejected by the trust managers, but the
|
| @@ -453,20 +453,20 @@ public class X509Util {
|
| serverCertificates[0].checkValidity();
|
| if (!verifyKeyUsage(serverCertificates[0])) {
|
| return new AndroidCertVerifyResult(
|
| - CertVerifyStatusAndroid.VERIFY_INCORRECT_KEY_USAGE);
|
| + CertVerifyStatusAndroid.INCORRECT_KEY_USAGE);
|
| }
|
| } catch (CertificateExpiredException e) {
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_EXPIRED);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.EXPIRED);
|
| } catch (CertificateNotYetValidException e) {
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_NOT_YET_VALID);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.NOT_YET_VALID);
|
| } catch (CertificateException e) {
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_FAILED);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.FAILED);
|
| }
|
|
|
| synchronized (sLock) {
|
| // If no trust manager was found, fail without crashing on the null pointer.
|
| if (sDefaultTrustManager == null)
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_FAILED);
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.FAILED);
|
|
|
| List<X509Certificate> verifiedChain;
|
| try {
|
| @@ -482,7 +482,7 @@ public class X509Util {
|
| Log.i(TAG, "Failed to validate the certificate chain, error: " +
|
| eDefaultManager.getMessage());
|
| return new AndroidCertVerifyResult(
|
| - CertVerifyStatusAndroid.VERIFY_NO_TRUSTED_ROOT);
|
| + CertVerifyStatusAndroid.NO_TRUSTED_ROOT);
|
| }
|
| }
|
|
|
| @@ -492,7 +492,7 @@ public class X509Util {
|
| isIssuedByKnownRoot = isKnownRoot(root);
|
| }
|
|
|
| - return new AndroidCertVerifyResult(CertVerifyStatusAndroid.VERIFY_OK,
|
| + return new AndroidCertVerifyResult(CertVerifyStatusAndroid.OK,
|
| isIssuedByKnownRoot, verifiedChain);
|
| }
|
| }
|
|
|