OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file contains the list of network errors. | 5 // This file contains the list of network errors. |
6 | 6 |
7 // | 7 // |
8 // Ranges: | 8 // Ranges: |
9 // 0- 99 System related errors | 9 // 0- 99 System related errors |
10 // 100-199 Connection related errors | 10 // 100-199 Connection related errors |
(...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
149 | 149 |
150 // An SSL peer sent us a fatal decompression_failure alert. This typically | 150 // An SSL peer sent us a fatal decompression_failure alert. This typically |
151 // occurs when a peer selects DEFLATE compression in the mismaken belief that | 151 // occurs when a peer selects DEFLATE compression in the mismaken belief that |
152 // it supports it. | 152 // it supports it. |
153 NET_ERROR(SSL_DECOMPRESSION_FAILURE_ALERT, -125) | 153 NET_ERROR(SSL_DECOMPRESSION_FAILURE_ALERT, -125) |
154 | 154 |
155 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed | 155 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed |
156 // from servers with buggy DEFLATE support. | 156 // from servers with buggy DEFLATE support. |
157 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) | 157 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) |
158 | 158 |
159 // The HTTP auth handler requires a DNS lookup to find the canonical name. | |
160 NET_ERROR(AUTH_NEEDS_CANONICAL_NAME, -127) | |
161 | |
162 // Certificate error codes | 159 // Certificate error codes |
163 // | 160 // |
164 // The values of certificate error codes must be consecutive. | 161 // The values of certificate error codes must be consecutive. |
165 | 162 |
166 // The server responded with a certificate whose common name did not match | 163 // The server responded with a certificate whose common name did not match |
167 // the host name. This could mean: | 164 // the host name. This could mean: |
168 // | 165 // |
169 // 1. An attacker has redirected our traffic to his server and is | 166 // 1. An attacker has redirected our traffic to his server and is |
170 // presenting a certificate for which he knows the private key. | 167 // presenting a certificate for which he knows the private key. |
171 // | 168 // |
(...skipping 200 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
372 | 369 |
373 // The server responded to a <keygen> with a generated client cert that we | 370 // The server responded to a <keygen> with a generated client cert that we |
374 // don't have the matching private key for. | 371 // don't have the matching private key for. |
375 NET_ERROR(NO_PRIVATE_KEY_FOR_CERT, -502) | 372 NET_ERROR(NO_PRIVATE_KEY_FOR_CERT, -502) |
376 | 373 |
377 // An error adding to the OS certificate database (e.g. OS X Keychain). | 374 // An error adding to the OS certificate database (e.g. OS X Keychain). |
378 NET_ERROR(ADD_USER_CERT_FAILED, -503) | 375 NET_ERROR(ADD_USER_CERT_FAILED, -503) |
379 | 376 |
380 // The FTP PASV command failed. | 377 // The FTP PASV command failed. |
381 NET_ERROR(FTP_PASV_COMMAND_FAILED, -600) | 378 NET_ERROR(FTP_PASV_COMMAND_FAILED, -600) |
OLD | NEW |