OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file intentionally does not have header guards, it's included | 5 // This file intentionally does not have header guards, it's included |
6 // inside a macro to generate enum values. | 6 // inside a macro to generate enum values. |
7 | 7 |
8 // This file contains the list of network errors. | 8 // This file contains the list of network errors. |
9 | 9 |
10 // | 10 // |
(...skipping 274 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
285 | 285 |
286 // Server requested one type of cert, then requested a different type while the | 286 // Server requested one type of cert, then requested a different type while the |
287 // first was still being generated. | 287 // first was still being generated. |
288 NET_ERROR(ORIGIN_BOUND_CERT_GENERATION_TYPE_MISMATCH, -152) | 288 NET_ERROR(ORIGIN_BOUND_CERT_GENERATION_TYPE_MISMATCH, -152) |
289 | 289 |
290 // An SSL peer sent us a fatal decrypt_error alert. This typically occurs when | 290 // An SSL peer sent us a fatal decrypt_error alert. This typically occurs when |
291 // a peer could not correctly verify a signature (in CertificateVerify or | 291 // a peer could not correctly verify a signature (in CertificateVerify or |
292 // ServerKeyExchange) or validate a Finished message. | 292 // ServerKeyExchange) or validate a Finished message. |
293 NET_ERROR(SSL_DECRYPT_ERROR_ALERT, -153) | 293 NET_ERROR(SSL_DECRYPT_ERROR_ALERT, -153) |
294 | 294 |
| 295 // There are too many pending WebSocketJob instances, so the new job was not |
| 296 // pushed to the queue. |
| 297 NET_ERROR(WS_THROTTLE_QUEUE_TOO_LARGE, -154) |
| 298 |
| 299 // There are too many active SocketStream instances, so the new connect request |
| 300 // was rejected. |
| 301 NET_ERROR(TOO_MANY_SOCKET_STREAMS, -155) |
| 302 |
295 // Certificate error codes | 303 // Certificate error codes |
296 // | 304 // |
297 // The values of certificate error codes must be consecutive. | 305 // The values of certificate error codes must be consecutive. |
298 | 306 |
299 // The server responded with a certificate whose common name did not match | 307 // The server responded with a certificate whose common name did not match |
300 // the host name. This could mean: | 308 // the host name. This could mean: |
301 // | 309 // |
302 // 1. An attacker has redirected our traffic to his server and is | 310 // 1. An attacker has redirected our traffic to his server and is |
303 // presenting a certificate for which he knows the private key. | 311 // presenting a certificate for which he knows the private key. |
304 // | 312 // |
(...skipping 381 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
686 NET_ERROR(DNS_TIMED_OUT, -803) | 694 NET_ERROR(DNS_TIMED_OUT, -803) |
687 | 695 |
688 // The entry was not found in cache, for cache-only lookups. | 696 // The entry was not found in cache, for cache-only lookups. |
689 NET_ERROR(DNS_CACHE_MISS, -804) | 697 NET_ERROR(DNS_CACHE_MISS, -804) |
690 | 698 |
691 // Suffix search list rules prevent resolution of the given host name. | 699 // Suffix search list rules prevent resolution of the given host name. |
692 NET_ERROR(DNS_SEARCH_EMPTY, -805) | 700 NET_ERROR(DNS_SEARCH_EMPTY, -805) |
693 | 701 |
694 // Failed to sort addresses according to RFC3484. | 702 // Failed to sort addresses according to RFC3484. |
695 NET_ERROR(DNS_SORT_ERROR, -806) | 703 NET_ERROR(DNS_SORT_ERROR, -806) |
OLD | NEW |