Fix incorrect error codes. 9999 is not a valid network error
code (always a negative number). The most likely reason for
memio_CreateIOLayer or SSL_ImportFD to fail is that we ran
out of memory, so just return ERR_OUT_OF_MEMORY.
R=dank
BUG=none
TEST=no compilation errors.
Review URL: http://codereview.chromium.org/464024
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@33754 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
index 19832ad..cc3200c 100644
--- a/net/socket/ssl_client_socket_nss.cc
+++ b/net/socket/ssl_client_socket_nss.cc
@@ -246,7 +246,7 @@
// TODO(port): specify rx and tx buffer sizes separately
nss_fd_ = memio_CreateIOLayer(kRecvBufferSize);
if (nss_fd_ == NULL) {
- return 9999; // TODO(port): real error
+ return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR error code.
}
// Tell NSS who we're connected to
@@ -255,7 +255,8 @@
int err = transport_->GetPeerName((struct sockaddr *)&peername, &len);
if (err) {
DLOG(ERROR) << "GetPeerName failed";
- return 9999; // TODO(port): real error
+ // TODO(wtc): Change GetPeerName to return a network error code.
+ return ERR_UNEXPECTED;
}
memio_SetPeerName(nss_fd_, &peername);
@@ -266,7 +267,7 @@
/* Push SSL onto our fake I/O socket */
nss_fd_ = SSL_ImportFD(NULL, nss_fd_);
if (nss_fd_ == NULL) {
- return ERR_SSL_PROTOCOL_ERROR; // TODO(port): real error
+ return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR/NSS error code.
}
// TODO(port): set more ssl options! Check errors!