Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(337)

Side by Side Diff: net/base/net_error_list.h

Issue 3417010: Integrate the SpdyProxyClientSocket into the HttpStreamRequest... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Rebasing again Created 10 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file intentionally does not have header guards, it's included 5 // This file intentionally does not have header guards, it's included
6 // inside a macro to generate enum. 6 // inside a macro to generate enum.
7 7
8 // This file contains the list of network errors. 8 // This file contains the list of network errors.
9 9
10 // 10 //
(...skipping 156 matching lines...) Expand 10 before | Expand all | Expand 10 after
167 167
168 // The proxy requested authentication (for tunnel establishment). 168 // The proxy requested authentication (for tunnel establishment).
169 NET_ERROR(PROXY_AUTH_REQUESTED, -127) 169 NET_ERROR(PROXY_AUTH_REQUESTED, -127)
170 170
171 // A known TLS strict server didn't offer the renegotiation extension. 171 // A known TLS strict server didn't offer the renegotiation extension.
172 NET_ERROR(SSL_UNSAFE_NEGOTIATION, -128) 172 NET_ERROR(SSL_UNSAFE_NEGOTIATION, -128)
173 173
174 // The SSL server attempted to use a weak ephemeral Diffie-Hellman key. 174 // The SSL server attempted to use a weak ephemeral Diffie-Hellman key.
175 NET_ERROR(SSL_WEAK_SERVER_EPHEMERAL_DH_KEY, -129) 175 NET_ERROR(SSL_WEAK_SERVER_EPHEMERAL_DH_KEY, -129)
176 176
177 // Could not create a TCP connection to the proxy server. An error occurred 177 // Could not create a connection to the proxy server. An error occurred
178 // either in resolving its name, or in connecting a socket to it. 178 // either in resolving its name, or in connecting a socket to it.
179 // Note that this does NOT include failures during the actual "CONNECT" method 179 // Note that this does NOT include failures during the actual "CONNECT" method
180 // of an HTTP proxy. 180 // of an HTTP proxy.
181 NET_ERROR(PROXY_CONNECTION_FAILED, -130) 181 NET_ERROR(PROXY_CONNECTION_FAILED, -130)
182 182
183 // We tried a Snap Start connection and sent a request, predicting the server's 183 // We tried a Snap Start connection and sent a request, predicting the server's
184 // NPN protocol support. However, after doing the actual handshake, our 184 // NPN protocol support. However, after doing the actual handshake, our
185 // prediction turned out to be incorrect so we sent a request in the wrong 185 // prediction turned out to be incorrect so we sent a request in the wrong
186 // protocol. 186 // protocol.
187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131) 187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131)
188 188
189 // We detected an ESET product intercepting our HTTPS connections. Since these 189 // We detected an ESET product intercepting our HTTPS connections. Since these
190 // products are False Start intolerant, we return this error so that we can 190 // products are False Start intolerant, we return this error so that we can
191 // give the user a helpful error message rather than have the connection hang. 191 // give the user a helpful error message rather than have the connection hang.
192 NET_ERROR(ESET_ANTI_VIRUS_SSL_INTERCEPTION, -132) 192 NET_ERROR(ESET_ANTI_VIRUS_SSL_INTERCEPTION, -132)
193 193
194 // We detected NetNanny intercepting our HTTPS connections. Since this product 194 // We detected NetNanny intercepting our HTTPS connections. Since this product
195 // is False Start intolerant, we return this error so that we can give the user 195 // is False Start intolerant, we return this error so that we can give the user
196 // a helpful error message rather than have the connection hang. 196 // a helpful error message rather than have the connection hang.
197 NET_ERROR(NETNANNY_SSL_INTERCEPTION, -133) 197 NET_ERROR(NETNANNY_SSL_INTERCEPTION, -133)
198 198
199 // The permission to use the SSL client certificate's private key was denied. 199 // The permission to use the SSL client certificate's private key was denied.
200 NET_ERROR(SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED, -134) 200 NET_ERROR(SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED, -134)
201 201
202 // The SSL client certificate has no private key. 202 // The SSL client certificate has no private key.
203 NET_ERROR(SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY, -135) 203 NET_ERROR(SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY, -135)
204 204
205 // The certificate presented by the HTTPS Proxy was invalid.
206 NET_ERROR(PROXY_CERTIFICATE_INVALID, -136)
207
205 // Certificate error codes 208 // Certificate error codes
206 // 209 //
207 // The values of certificate error codes must be consecutive. 210 // The values of certificate error codes must be consecutive.
208 211
209 // The server responded with a certificate whose common name did not match 212 // The server responded with a certificate whose common name did not match
210 // the host name. This could mean: 213 // the host name. This could mean:
211 // 214 //
212 // 1. An attacker has redirected our traffic to his server and is 215 // 1. An attacker has redirected our traffic to his server and is
213 // presenting a certificate for which he knows the private key. 216 // presenting a certificate for which he knows the private key.
214 // 217 //
(...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after
491 // Import failed - certificate already exists in database. 494 // Import failed - certificate already exists in database.
492 // Note it's a little weird this is an error but reimporting a PKCS12 is ok 495 // Note it's a little weird this is an error but reimporting a PKCS12 is ok
493 // (no-op). That's how Mozilla does it, though. 496 // (no-op). That's how Mozilla does it, though.
494 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704) 497 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704)
495 498
496 // CA import failed due to some other error. 499 // CA import failed due to some other error.
497 NET_ERROR(IMPORT_CA_CERT_FAILED, -705) 500 NET_ERROR(IMPORT_CA_CERT_FAILED, -705)
498 501
499 // Server certificate import failed due to some internal error. 502 // Server certificate import failed due to some internal error.
500 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706) 503 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706)
OLDNEW
« no previous file with comments | « no previous file | net/http/http_network_transaction_unittest.cc » ('j') | net/http/http_stream_request.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698