| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // This file contains the list of network errors. | 5 // This file contains the list of network errors. |
| 6 | 6 |
| 7 // | 7 // |
| 8 // Ranges: | 8 // Ranges: |
| 9 // 0- 99 System related errors | 9 // 0- 99 System related errors |
| 10 // 100-199 Connection related errors | 10 // 100-199 Connection related errors |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 149 | 149 |
| 150 // An SSL peer sent us a fatal decompression_failure alert. This typically | 150 // An SSL peer sent us a fatal decompression_failure alert. This typically |
| 151 // occurs when a peer selects DEFLATE compression in the mismaken belief that | 151 // occurs when a peer selects DEFLATE compression in the mismaken belief that |
| 152 // it supports it. | 152 // it supports it. |
| 153 NET_ERROR(SSL_DECOMPRESSION_FAILURE_ALERT, -125) | 153 NET_ERROR(SSL_DECOMPRESSION_FAILURE_ALERT, -125) |
| 154 | 154 |
| 155 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed | 155 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed |
| 156 // from servers with buggy DEFLATE support. | 156 // from servers with buggy DEFLATE support. |
| 157 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) | 157 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) |
| 158 | 158 |
| 159 // The HTTP auth handler requires a DNS lookup to find the canonical name. |
| 160 NET_ERROR(AUTH_NEEDS_CANONICAL_NAME, -127) |
| 161 |
| 159 // Certificate error codes | 162 // Certificate error codes |
| 160 // | 163 // |
| 161 // The values of certificate error codes must be consecutive. | 164 // The values of certificate error codes must be consecutive. |
| 162 | 165 |
| 163 // The server responded with a certificate whose common name did not match | 166 // The server responded with a certificate whose common name did not match |
| 164 // the host name. This could mean: | 167 // the host name. This could mean: |
| 165 // | 168 // |
| 166 // 1. An attacker has redirected our traffic to his server and is | 169 // 1. An attacker has redirected our traffic to his server and is |
| 167 // presenting a certificate for which he knows the private key. | 170 // presenting a certificate for which he knows the private key. |
| 168 // | 171 // |
| (...skipping 200 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 369 | 372 |
| 370 // The server responded to a <keygen> with a generated client cert that we | 373 // The server responded to a <keygen> with a generated client cert that we |
| 371 // don't have the matching private key for. | 374 // don't have the matching private key for. |
| 372 NET_ERROR(NO_PRIVATE_KEY_FOR_CERT, -502) | 375 NET_ERROR(NO_PRIVATE_KEY_FOR_CERT, -502) |
| 373 | 376 |
| 374 // An error adding to the OS certificate database (e.g. OS X Keychain). | 377 // An error adding to the OS certificate database (e.g. OS X Keychain). |
| 375 NET_ERROR(ADD_USER_CERT_FAILED, -503) | 378 NET_ERROR(ADD_USER_CERT_FAILED, -503) |
| 376 | 379 |
| 377 // The FTP PASV command failed. | 380 // The FTP PASV command failed. |
| 378 NET_ERROR(FTP_PASV_COMMAND_FAILED, -600) | 381 NET_ERROR(FTP_PASV_COMMAND_FAILED, -600) |
| OLD | NEW |