Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(177)

Side by Side Diff: net/base/net_error_list.h

Issue 6804032: Add TLS-SRP (RFC 5054) support Base URL: http://git.chromium.org/git/chromium.git@trunk
Patch Set: remove "httpsv" scheme, minor NSS/OpenSSL changes Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/base/cookie_monster.cc ('k') | net/base/ssl_config_service.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file intentionally does not have header guards, it's included 5 // This file intentionally does not have header guards, it's included
6 // inside a macro to generate enum. 6 // inside a macro to generate enum.
7 7
8 // This file contains the list of network errors. 8 // This file contains the list of network errors.
9 9
10 // 10 //
(...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after
222 222
223 // We were unable to sign the CertificateVerify data of an SSL client auth 223 // We were unable to sign the CertificateVerify data of an SSL client auth
224 // handshake with the client certificate's private key. 224 // handshake with the client certificate's private key.
225 // 225 //
226 // Possible causes for this include the user implicitly or explicitly 226 // Possible causes for this include the user implicitly or explicitly
227 // denying access to the private key, the private key may not be valid for 227 // denying access to the private key, the private key may not be valid for
228 // signing, the key may be relying on a cached handle which is no longer 228 // signing, the key may be relying on a cached handle which is no longer
229 // valid, or the CSP won't allow arbitrary data to be signed. 229 // valid, or the CSP won't allow arbitrary data to be signed.
230 NET_ERROR(SSL_CLIENT_AUTH_SIGNATURE_FAILED, -141) 230 NET_ERROR(SSL_CLIENT_AUTH_SIGNATURE_FAILED, -141)
231 231
232 // The server requested TLS client authentication using a username and password.
233 NET_ERROR(TLS_CLIENT_LOGIN_NEEDED, -142)
234
235 // The server indicated that the client's TLS login failed.
236 NET_ERROR(TLS_CLIENT_LOGIN_FAILED, -143)
237
238 // The server indicated that the pre-shared key or SRP identity is unknown.
239 NET_ERROR(SSL_UNKNOWN_PSK_IDENTITY_ALERT, -144)
240
232 // Certificate error codes 241 // Certificate error codes
233 // 242 //
234 // The values of certificate error codes must be consecutive. 243 // The values of certificate error codes must be consecutive.
235 244
236 // The server responded with a certificate whose common name did not match 245 // The server responded with a certificate whose common name did not match
237 // the host name. This could mean: 246 // the host name. This could mean:
238 // 247 //
239 // 1. An attacker has redirected our traffic to his server and is 248 // 1. An attacker has redirected our traffic to his server and is
240 // presenting a certificate for which he knows the private key. 249 // presenting a certificate for which he knows the private key.
241 // 250 //
(...skipping 280 matching lines...) Expand 10 before | Expand all | Expand 10 after
522 // Import failed - certificate already exists in database. 531 // Import failed - certificate already exists in database.
523 // Note it's a little weird this is an error but reimporting a PKCS12 is ok 532 // Note it's a little weird this is an error but reimporting a PKCS12 is ok
524 // (no-op). That's how Mozilla does it, though. 533 // (no-op). That's how Mozilla does it, though.
525 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704) 534 NET_ERROR(IMPORT_CERT_ALREADY_EXISTS, -704)
526 535
527 // CA import failed due to some other error. 536 // CA import failed due to some other error.
528 NET_ERROR(IMPORT_CA_CERT_FAILED, -705) 537 NET_ERROR(IMPORT_CA_CERT_FAILED, -705)
529 538
530 // Server certificate import failed due to some internal error. 539 // Server certificate import failed due to some internal error.
531 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706) 540 NET_ERROR(IMPORT_SERVER_CERT_FAILED, -706)
OLDNEW
« no previous file with comments | « net/base/cookie_monster.cc ('k') | net/base/ssl_config_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698