Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(516)

Side by Side Diff: net/base/net_error_list.h

Issue 3723001: net: detect and error out with ESET/NetNanny HTTPS interception + False Start (Closed)
Patch Set: ... Created 10 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/renderer/localized_error.cc ('k') | net/socket/ssl_client_socket_nss.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file intentionally does not have header guards, it's included 5 // This file intentionally does not have header guards, it's included
6 // inside a macro to generate enum. 6 // inside a macro to generate enum.
7 7
8 // This file contains the list of network errors. 8 // This file contains the list of network errors.
9 9
10 // 10 //
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after
173 173
174 // The SSL server attempted to use a weak ephemeral Diffie-Hellman key. 174 // The SSL server attempted to use a weak ephemeral Diffie-Hellman key.
175 NET_ERROR(SSL_WEAK_SERVER_EPHEMERAL_DH_KEY, -129) 175 NET_ERROR(SSL_WEAK_SERVER_EPHEMERAL_DH_KEY, -129)
176 176
177 // Could not create a TCP connection to the proxy server. An error occurred 177 // Could not create a TCP connection to the proxy server. An error occurred
178 // either in resolving its name, or in connecting a socket to it. 178 // either in resolving its name, or in connecting a socket to it.
179 // Note that this does NOT include failures during the actual "CONNECT" method 179 // Note that this does NOT include failures during the actual "CONNECT" method
180 // of an HTTP proxy. 180 // of an HTTP proxy.
181 NET_ERROR(PROXY_CONNECTION_FAILED, -130) 181 NET_ERROR(PROXY_CONNECTION_FAILED, -130)
182 182
183 // This means that we tried a Snap Start connection and sent a request, 183 // We tried a Snap Start connection and sent a request, predicting the server's
184 // predicting the server's NPN protocol support. However, after doing the 184 // NPN protocol support. However, after doing the actual handshake, our
185 // actual handshake, our prediction turned out to be incorrect so we sent a 185 // prediction turned out to be incorrect so we sent a request in the wrong
186 // request in the wrong protocol. 186 // protocol.
187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131) 187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131)
188 188
189 // We detected an ESET product intercepting our HTTPS connections. Since these
190 // products are False Start intolerant, we return this error so that we can
191 // give the user a helpful error message rather than have the connection hang.
192 NET_ERROR(ESET_ANTI_VIRUS_SSL_INTERCEPTION, -132)
193
194 // We detected NetNanny intercepting our HTTPS connections. Since this product
195 // is False Start intolerant, we return this error so that we can give the user
196 // a helpful error message rather than have the connection hang.
197 NET_ERROR(NETNANNY_SSL_INTERCEPTION, -133)
198
189 // Certificate error codes 199 // Certificate error codes
190 // 200 //
191 // The values of certificate error codes must be consecutive. 201 // The values of certificate error codes must be consecutive.
192 202
193 // The server responded with a certificate whose common name did not match 203 // The server responded with a certificate whose common name did not match
194 // the host name. This could mean: 204 // the host name. This could mean:
195 // 205 //
196 // 1. An attacker has redirected our traffic to his server and is 206 // 1. An attacker has redirected our traffic to his server and is
197 // presenting a certificate for which he knows the private key. 207 // presenting a certificate for which he knows the private key.
198 // 208 //
(...skipping 270 matching lines...) Expand 10 before | Expand all | Expand 10 after
469 // CA import failed - not a CA cert. 479 // CA import failed - not a CA cert.
470 NET_ERROR(IMPORT_CA_CERT_NOT_CA, -703) 480 NET_ERROR(IMPORT_CA_CERT_NOT_CA, -703)
471 481
472 // Import failed - certificate already exists in database. 482 // Import failed - certificate already exists in database.
473 // Note it's a little weird this is an error but reimporting a PKCS12 is ok 483 // Note it's a little weird this is an error but reimporting a PKCS12 is ok
474 // (no-op). That's how mozilla does it, though. 484 // (no-op). That's how mozilla does it, though.
475 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704) 485 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704)
476 486
477 // CA import failed due to some other error. 487 // CA import failed due to some other error.
478 NET_ERROR(IMPORT_CA_CERT_FAILED, -705) 488 NET_ERROR(IMPORT_CA_CERT_FAILED, -705)
OLDNEW
« no previous file with comments | « chrome/renderer/localized_error.cc ('k') | net/socket/ssl_client_socket_nss.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698