OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file intentionally does not have header guards, it's included | 5 // This file intentionally does not have header guards, it's included |
6 // inside a macro to generate enum. | 6 // inside a macro to generate enum. |
7 | 7 |
8 // This file contains the list of network errors. | 8 // This file contains the list of network errors. |
9 | 9 |
10 // | 10 // |
(...skipping 149 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
160 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed | 160 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed |
161 // from servers with buggy DEFLATE support. | 161 // from servers with buggy DEFLATE support. |
162 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) | 162 NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) |
163 | 163 |
164 // The proxy requested authentication (for tunnel establishment). | 164 // The proxy requested authentication (for tunnel establishment). |
165 NET_ERROR(PROXY_AUTH_REQUESTED, -127) | 165 NET_ERROR(PROXY_AUTH_REQUESTED, -127) |
166 | 166 |
167 // A known TLS strict server didn't offer the renegotiation extension. | 167 // A known TLS strict server didn't offer the renegotiation extension. |
168 NET_ERROR(SSL_UNSAFE_NEGOTIATION, -128) | 168 NET_ERROR(SSL_UNSAFE_NEGOTIATION, -128) |
169 | 169 |
170 // The socket is reporting that we tried to provide new credentials after a | |
171 // a failed attempt on a connection without keep alive. We need to | |
172 // reestablish the transport socket in order to retry the authentication. | |
173 NET_ERROR(RETRY_CONNECTION, -129) | |
174 | |
175 // Certificate error codes | 170 // Certificate error codes |
176 // | 171 // |
177 // The values of certificate error codes must be consecutive. | 172 // The values of certificate error codes must be consecutive. |
178 | 173 |
179 // The server responded with a certificate whose common name did not match | 174 // The server responded with a certificate whose common name did not match |
180 // the host name. This could mean: | 175 // the host name. This could mean: |
181 // | 176 // |
182 // 1. An attacker has redirected our traffic to his server and is | 177 // 1. An attacker has redirected our traffic to his server and is |
183 // presenting a certificate for which he knows the private key. | 178 // presenting a certificate for which he knows the private key. |
184 // | 179 // |
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
418 NET_ERROR(FTP_SYNTAX_ERROR, -605) | 413 NET_ERROR(FTP_SYNTAX_ERROR, -605) |
419 | 414 |
420 // Server does not support the command we issued. | 415 // Server does not support the command we issued. |
421 // FTP response codes 502, 504. | 416 // FTP response codes 502, 504. |
422 NET_ERROR(FTP_COMMAND_NOT_SUPPORTED, -606) | 417 NET_ERROR(FTP_COMMAND_NOT_SUPPORTED, -606) |
423 | 418 |
424 // Server rejected our command because we didn't issue the commands in right | 419 // Server rejected our command because we didn't issue the commands in right |
425 // order. | 420 // order. |
426 // FTP response code 503. | 421 // FTP response code 503. |
427 NET_ERROR(FTP_BAD_COMMAND_SEQUENCE, -607) | 422 NET_ERROR(FTP_BAD_COMMAND_SEQUENCE, -607) |
OLD | NEW |