sipplugins/sippwlanplugin/inc/wlanerrorcodes.h
author Petteri Saari <petteri.saari@digia.com>
Thu, 25 Nov 2010 13:59:42 +0200
branchMSRP_FrameWork
changeset 58 cdb720e67852
parent 0 307788aac0a8
permissions -rw-r--r--
This release addresses the following issues: 1. The crash bug fix when receiving file 2. Now the sending is based on MSRP messages, there is no longer file receiving or sending. Client sends data as MSRP was designed. 3. Soma MSRP stack was created so that the client told the correct session-id, Symbian stack generated it by itself. This is not allowed, it was changed so that clients tell the session-id (same as used in SIP INVITE). 4. Unnecessary division of data to chunks removed when there is no need to interrupt sending. The message is sent in as few chunks as possible. 5. Stack can now receive files and chunks with ?unlimited? size. Old stack wrote the incoming data to memory and did not utilize disk space until the end of chunk was reached (large chunks from another client crashed it). 6. Now when writing the incoming data to file, it will take into account the byte-range header values. So, this complies with the RFC4975 requirements that stack must be able to handle chunks that come in any sequence. 7. Some buffering changes to outgoing/incoming data. 8. The outgoing data is now checked that it does not contain the created transaction-id before sending the data. 9. MSRP success reports are now implemented and tested against servers. 10. Progress report system fixed so progress is now visible on client (all the way to 100%). 11. Message Cancel receiving / Cancel sending now corrected and made to work as rfc4975 requires. (termination from sender and error code from receiver when cancelling). 12. Bug correction related to messages received not belonging to any session, old stack implementation did send error response, but after response was written it did give the buffer to client anyway. Now corrected.

/*
* Copyright (c) 2006-2007 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of "Eclipse Public License v1.0"
* which accompanies this distribution, and is available
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
*
* Initial Contributors:
* Nokia Corporation - initial contribution.
*
* Contributors:
*
* Description:  WLAN-specific error code definitions.
*
*/


// TODO: When this header file is released in SDK, delete this local copy of
// wlanerrorcodes.h from sip_wlanplugin's own inc-directory.


#ifndef WLANERRORCODES_H
#define WLANERRORCODES_H

/**
 * @defgroup rconn Error codes returned via RConnection API
 * @{
 */

/**
 * @defgroup rconn_cfg Errors due to mismatching configuration
 * @defgroup rconn_other Errors due to other failures
 */

/**
 * A failure inside WLAN subsystem has occurred. Typically caused by an
 * unexpected WLAN HW event.
 * @ingroup rconn_other
 */
const TInt KErrWlanInternalError                           = -30171;
/**
 * WLAN AP has refused 802.11 open system authentication.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanOpenAuthFailed                          = -30172;
/**
 * WLAN AP requires 802.11 shared key authentication.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanSharedKeyAuthRequired                   = -30173;
/**
 * 802.11 shared key authentication has failed.
 * @ingroup rconn_cfg
 * @details Most likely caused by misconfigured WEP keys either in
 *          the IAP settings or the WLAN AP. 
 */
const TInt KErrWlanSharedKeyAuthFailed                     = -30174;
/**
 * WLAN AP requires Wi-Fi Protected Access security but
 * the IAP doesn't have matching settings.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanWpaAuthRequired                         = -30175;
/**
 * Wi-Fi Protected Access authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanWpaAuthFailed                           = -30176;
/**
 * Legacy 802.1x authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlan802dot1xAuthFailed                      = -30177;
/**
 * Wi-Fi Protected Access authentication w/ a preshared key
 * has failed.
 * @ingroup rconn_cfg
 * @details Most likely caused by a misconfigured preshared key
 *          either in the IAP settings or the WLAN AP.
 */
const TInt KErrWlanIllegalWpaPskKey                        = -30178;
/**
 * Wi-Fi Protected Access connections are not allowed as
 * countermeasures are active due to MIC failures.
 * @ingroup rconn_other
 * @details The countermeasures are active for 60 seconds after
 *          having been started.
 */
const TInt KErrWlanWpaCounterMeasuresActive                = -30179;
/**
 * No WLAN APs matching the IAP settings have been found.
 * @ingroup rconn_other
 */
const TInt KErrWlanNetworkNotFound                         = -30180;
/**
 * The IAP has an illegal key WEP key configuration.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanIllegalEncryptionKeys                   = -30181;
/**
 * Roaming between WLAN APs has failed irreversibly.
 * @ingroup rconn_other
 */
const TInt KErrWlanRoamingFailed                           = -30182;
/**
 * Connection to the WLAN network has unexpectedly been lost.
 * @ingroup rconn_other
 */
const TInt KErrWlanNetworkLost                             = -30183;
/**
 * WLAN AP requires Wi-Fi Protected Access authentication w/ a preshared key.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanPskModeRequired                         = -30184;
/**
 * WLAN AP requires Wi-Fi Protected Access authentication w/ EAP.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapModeRequired                         = -30185;
/**
 * EAP-SIM authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapSimFailed                            = -30186;
/**
 * EAP-TLS authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapTlsFailed                            = -30187;
/**
 * EAP-PEAP authentication has failed.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanEapPeapFailed                           = -30188;
/** 
 * EAP-MSCHAPv2 authentication has failed.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanEapMsChapv2                             = -30189;
/**
 * EAP-AKA authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapAkaFailed                            = -30190;
/**
 * EAP-TTLS authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapTtlsFailed                           = -30191;
/** 
 * EAP-LEAP authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanLeapFailed                              = -30192;
/**
 * EAP-GTC authentication has failed.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanEapGtcFailed                            = -30193;
/**
 * EAP-SIM/EAP-AKA authentication has failed due to a missing
 * SIM card.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanSimNotInstalled                         = -30194;
/**
 * EAP-SIM/EAP-AKA authentication has failed due to missing
 * service subscription.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanNotSubscribed                           = -30195;
/**
 * EAP-SIM/EAP-AKA authentication has failed due to user being
 * barred from the service.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanAccessBarred                            = -30196;
/**
 * EAP-MSCHAPv2 authentication has failed due to expired password.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanPasswordExpired                         = -30197;
/**
 * EAP-MSCHAPv2 authentication has failed due to permissions.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanNoDialinPermissions                     = -30198;
/**
 * EAP-MSCHAPv2 authentication has failed due to disabled account.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanAccountDisabled                         = -30199;
/**
 * EAP-MSCHAPv2 authentication has failed due to restricted logon hours.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanRestrictedLogonHours                    = -30200;
/**
 * EAP authentication using certificates failed due to an
 * expired certificate.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanServerCertificateExpired                = -30201;
/**
 * EAP authentication using certificates failed due to a
 * certificate that couldn't be verified.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanCerficateVerifyFailed                   = -30202;
/**
 * EAP authentication using certificates failed due to a
 * missing user certificate.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanNoUserCertificate                       = -30203;
/**
 * EAP authentication using certificates failed due to a
 * mismatching certificate configuration.
 * @ingroup rconn_cfg
 */ 
const TInt KErrWlanNoCipherSuite                           = -30204;
/**
 * EAP authentication using certificates failed due to the server
 * not accepting the user certificate.
 * @ingroup rconn_cfg
 */
const TInt KErrWlanUserRejected                            = -30205;
/**
 * EAP authentication using certificates failed due to an
 * expired user certificate.
 * @ingroup rconn_cfg 
 */
const TInt KErrWlanUserCertificateExpired                  = -30206;
/**
 * WLAN connection could not be started because one is already active.
 * @ingroup rconn_other
 */
const TInt KErrWlanConnAlreadyActive                       = -30207;

/**
 * @} 
 */

#endif // WLANERRORCODES_H