summaryrefslogtreecommitdiffstats
path: root/net/base/net_error_list.h
Commit message (Expand)AuthorAgeFilesLines
* Implement URLRequestBackoffManager for managing Backoff headersxunjieli2015-07-221-0/+4
* Excise gendered pronouns from /netellyjones2015-06-261-4/+4
* Remove certificates from Channel IDnharper2015-06-011-2/+1
* Remove ERR_SSL_UNSAFE_NEGOTIATION error code.davidben2015-05-301-3/+0
* Prevent unlimited re-sends of failed partial requests.liberato2015-05-291-0/+4
* Allow fetchers to watch URLRequestContextGetters for context shutdown.mmenke2015-05-091-0/+4
* Verify alternative server certificate validity for origin.bnc2015-04-281-0/+5
* Fail DNS resolution if the result contains 127.0.53.53.eroman2015-03-261-0/+6
* Implementation of ProxyResolver that uses a Mojo service.amistry2015-03-101-0/+3
* Reject certificates that are valid for too long.palmer2015-01-281-1/+4
* Act upon HTTP_1_1_REQUIRED.bnc2015-01-091-0/+6
* Revert "Reject certificates that are valid for too long."palmer2014-11-111-4/+1
* Revert "Revert "Reject certificates that are valid for too long.""Carlos Pizano2014-11-101-1/+4
* Revert "Reject certificates that are valid for too long."Chris Palmer2014-11-101-4/+1
* Delete the old WebSocket implementation from net/ricea2014-11-081-6/+2
* Reject certificates that are valid for too long.palmer2014-11-071-1/+4
* Fix a pair of Cronet upload bugs and add tests.mmenke2014-10-201-0/+4
* net: disable SSLv3 fallback.Adam Langley2014-10-141-0/+4
* Pass the client certificate into OpenSSL in common code.davidben@chromium.org2014-07-121-0/+4
* Don't abbreviate the pathname of policy_helpers.cc.wtc@chromium.org2014-06-251-1/+1
* Http cache: Implement a timeout for the cache lock.rvargas@chromium.org2014-06-241-0/+3
* Fix SSLClientSocketOpenSSL error-handling for Channel ID.davidben@chromium.org2014-06-211-0/+3
* Return ERR_PROXY_AUTH_REQUESTED_WITH_NO_CONNECTION instead of crashingrch@chromium.org2014-06-111-0/+3
* SpdySession sends GOAWAY frame when closing on an error.jgraettinger@chromium.org2014-06-101-0/+9
* Remove HTTP pipelining support.mmenke@chromium.org2014-05-271-2/+3
* Fail the SPDY transaction if it does not meet TLS base requirements.willchan@chromium.org2014-05-231-0/+3
* Add proper error messaging for blocking net requests on the OOBE screens.pastarmovj@chromium.org2014-04-161-0/+5
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-091-2/+10
* Revert 261966 "make SetReceiveBufferSize and SetSendBufferSize r..."jschuh@chromium.org2014-04-051-10/+2
* make SetReceiveBufferSize and SetSendBufferSize return net error codes (inste...jar@chromium.org2014-04-051-2/+10
* r=rchjar@chromium.org2014-03-251-2/+2
* Check return results for setting socket buffer sizes in QUICjar@chromium.org2014-03-241-0/+6
* Fail QUIC requests for secure resources over insecure connections.rch@chromium.org2014-03-091-0/+3
* Add ERR_SSL_UNRECOGNIZED_NAME_ALERT for the TLS unrecognized_name alert.wtc@chromium.org2014-02-051-0/+3
* Certificate Transparency: If an EV cert has SCTs, those must not be invalideranm@google.com2013-12-181-4/+3
* net: add name constraints for ANSSI root.agl@chromium.org2013-12-161-1/+4
* net: implement TLS_FALLBACK_SCSV.agl@chromium.org2013-12-071-0/+4
* Certificate Transparency: Threading the CT verifier into the SSL client socket.eranm@google.com2013-11-281-0/+4
* Close QUIC session when the cert database changesrch@chromium.org2013-11-251-0/+3
* Do not allow the server certificate to change in a renegotiation.wtc@chromium.org2013-10-191-0/+3
* When a request fails because the QUIC handshake failed, retry the requestrch@chromium.org2013-10-171-0/+4
* Reduce the complexity of WebSocketThrottle's wakeup codetyoshino@chromium.org2013-07-181-0/+8
* Generates the DTLS identity in browser process and returns it to the renderer...jiayl@chromium.org2013-07-011-0/+3
* Report the new error ERR_SSL_DECRYPT_ERROR_ALERT when we receive thewtc@chromium.org2013-06-141-0/+5
* Fix grammar in recurring macro commentjanx@chromium.org2013-06-141-1/+1
* net: use IsSecureScheme rather than matching "https".agl@chromium.org2013-06-121-1/+1
* net: don't process truncated headers on HTTPS connections.agl@chromium.org2013-05-291-0/+3
* Add HttpCache.ReadError* histograms.gavinp@chromium.org2013-05-151-0/+11
* Adding ERR_SOCKET_IS_CONNECTED.ikarienator@chromium.org2013-05-011-0/+3
* [SPDY] Close SPDY sessions on session flow control errorsakalin@chromium.org2013-04-191-1/+1