OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file intentionally does not have header guards, it's included | 5 // This file intentionally does not have header guards, it's included |
6 // inside a macro to generate enum. | 6 // inside a macro to generate enum. |
7 | 7 |
8 // This file contains the list of network errors. | 8 // This file contains the list of network errors. |
9 | 9 |
10 // | 10 // |
(...skipping 173 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
184 // NPN protocol support. However, after doing the actual handshake, our | 184 // NPN protocol support. However, after doing the actual handshake, our |
185 // prediction turned out to be incorrect so we sent a request in the wrong | 185 // prediction turned out to be incorrect so we sent a request in the wrong |
186 // protocol. | 186 // protocol. |
187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131) | 187 NET_ERROR(SSL_SNAP_START_NPN_MISPREDICTION, -131) |
188 | 188 |
189 // We detected an ESET product intercepting our HTTPS connections. Since these | 189 // We detected an ESET product intercepting our HTTPS connections. Since these |
190 // products are False Start intolerant, we return this error so that we can | 190 // products are False Start intolerant, we return this error so that we can |
191 // give the user a helpful error message rather than have the connection hang. | 191 // give the user a helpful error message rather than have the connection hang. |
192 NET_ERROR(ESET_ANTI_VIRUS_SSL_INTERCEPTION, -132) | 192 NET_ERROR(ESET_ANTI_VIRUS_SSL_INTERCEPTION, -132) |
193 | 193 |
194 // Missing -133. Feel free to reuse in the future. | 194 // We've hit the max socket limit for the socket pool while preconnecting. We |
| 195 // don't bother trying to preconnect more sockets. |
| 196 NET_ERROR(PRECONNECT_MAX_SOCKET_LIMIT, -133) |
195 | 197 |
196 // The permission to use the SSL client certificate's private key was denied. | 198 // The permission to use the SSL client certificate's private key was denied. |
197 NET_ERROR(SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED, -134) | 199 NET_ERROR(SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED, -134) |
198 | 200 |
199 // The SSL client certificate has no private key. | 201 // The SSL client certificate has no private key. |
200 NET_ERROR(SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY, -135) | 202 NET_ERROR(SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY, -135) |
201 | 203 |
202 // The certificate presented by the HTTPS Proxy was invalid. | 204 // The certificate presented by the HTTPS Proxy was invalid. |
203 NET_ERROR(PROXY_CERTIFICATE_INVALID, -136) | 205 NET_ERROR(PROXY_CERTIFICATE_INVALID, -136) |
204 | 206 |
(...skipping 297 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
502 // Import failed - certificate already exists in database. | 504 // Import failed - certificate already exists in database. |
503 // Note it's a little weird this is an error but reimporting a PKCS12 is ok | 505 // Note it's a little weird this is an error but reimporting a PKCS12 is ok |
504 // (no-op). That's how Mozilla does it, though. | 506 // (no-op). That's how Mozilla does it, though. |
505 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704) | 507 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704) |
506 | 508 |
507 // CA import failed due to some other error. | 509 // CA import failed due to some other error. |
508 NET_ERROR(IMPORT_CA_CERT_FAILED, -705) | 510 NET_ERROR(IMPORT_CA_CERT_FAILED, -705) |
509 | 511 |
510 // Server certificate import failed due to some internal error. | 512 // Server certificate import failed due to some internal error. |
511 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706) | 513 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706) |
OLD | NEW |