We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ask .<1> finished with error [-1202] Error Domain=NSURLErrorDomain Code=-1202 "此服务器的证书无效。你可能正在连接到一个伪装成“q.jspatch.com”的服务器,这会威胁到你的机密信息的安全。" UserInfo={NSLocalizedRecoverySuggestion=你仍要连接此服务器吗?, _kCFStreamErrorDomainKey=3, NSErrorPeerCertificateChainKey=( "<cert(0x10d89b600) s: q.jspatch.com i: TrustAsia TLS RSA CA>", ), NSErrorClientCertificateStateKey=0, NSErrorFailingURLKey=https://q.jspatch.com/5de1e4f8460606f7/2.15.28?d=64773A76-B2FB-4A85-8A99-22E62FAB71BF&sv=1.8.0&v=1690362574.129268, NSErrorFailingURLStringKey=https://q.jspatch.com/5de1e4f8460606f7/2.15.28?d=64773A76-B2FB-4A85-8A99-22E62FAB71BF&sv=1.8.0&v=1690362574.129268, NSUnderlyingError=0x281e6cbd0 {Error Domain=kCFErrorDomainCFNetwork Code=-1202 "(null)" UserInfo={_kCFStreamPropertySSLClientCertificateState=0, kCFStreamPropertySSLPeerTrust=<SecTrustRef: 0x2820ce440>, _kCFNetworkCFStreamSSLErrorOriginalValue=-9814, _kCFStreamErrorDomainKey=3, _kCFStreamErrorCodeKey=-9814, kCFStreamPropertySSLPeerCertificates=( "<cert(0x10d89b600) s: q.jspatch.com i: TrustAsia TLS RSA CA>", ), _kCFStreamErrorCodeKey=-9814, _NSURLErrorFailingURLSessionTaskErrorKey=LocalDataTask .<1>, NSURLErrorFailingURLPeerTrustErrorKey=<SecTrustRef: 0x2820ce440>, NSLocalizedDescription=此服务器的证书无效。你可能正在连接到一个伪装成“q.jspatch.com”的服务器,这会威胁到你的机密信息的安全。}
The text was updated successfully, but these errors were encountered:
No branches or pull requests
ask .<1> finished with error [-1202] Error Domain=NSURLErrorDomain Code=-1202 "此服务器的证书无效。你可能正在连接到一个伪装成“q.jspatch.com”的服务器,这会威胁到你的机密信息的安全。" UserInfo={NSLocalizedRecoverySuggestion=你仍要连接此服务器吗?, _kCFStreamErrorDomainKey=3, NSErrorPeerCertificateChainKey=(
"<cert(0x10d89b600) s: q.jspatch.com i: TrustAsia TLS RSA CA>",
), NSErrorClientCertificateStateKey=0, NSErrorFailingURLKey=https://q.jspatch.com/5de1e4f8460606f7/2.15.28?d=64773A76-B2FB-4A85-8A99-22E62FAB71BF&sv=1.8.0&v=1690362574.129268, NSErrorFailingURLStringKey=https://q.jspatch.com/5de1e4f8460606f7/2.15.28?d=64773A76-B2FB-4A85-8A99-22E62FAB71BF&sv=1.8.0&v=1690362574.129268, NSUnderlyingError=0x281e6cbd0 {Error Domain=kCFErrorDomainCFNetwork Code=-1202 "(null)" UserInfo={_kCFStreamPropertySSLClientCertificateState=0, kCFStreamPropertySSLPeerTrust=<SecTrustRef: 0x2820ce440>, _kCFNetworkCFStreamSSLErrorOriginalValue=-9814, _kCFStreamErrorDomainKey=3, _kCFStreamErrorCodeKey=-9814, kCFStreamPropertySSLPeerCertificates=(
"<cert(0x10d89b600) s: q.jspatch.com i: TrustAsia TLS RSA CA>",
), _kCFStreamErrorCodeKey=-9814, _NSURLErrorFailingURLSessionTaskErrorKey=LocalDataTask .<1>, NSURLErrorFailingURLPeerTrustErrorKey=<SecTrustRef: 0x2820ce440>, NSLocalizedDescription=此服务器的证书无效。你可能正在连接到一个伪装成“q.jspatch.com”的服务器,这会威胁到你的机密信息的安全。}
The text was updated successfully, but these errors were encountered: