summaryrefslogtreecommitdiffstats
path: root/net/base
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-21 19:27:36 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-21 19:27:36 +0000
commit52f3fad3ed3ad8ccca2026dc253474bb531737d7 (patch)
treec6c8e917a16396e1f88628b4caf08e34f3f9619f /net/base
parent01fd08314ba10fc4c79666d2c2b66dcba51d15ee (diff)
downloadchromium_src-52f3fad3ed3ad8ccca2026dc253474bb531737d7.zip
chromium_src-52f3fad3ed3ad8ccca2026dc253474bb531737d7.tar.gz
chromium_src-52f3fad3ed3ad8ccca2026dc253474bb531737d7.tar.bz2
Don't use NSS databases for non-essential purposes, such as remembering
the intermediate CA certificates we see, because NSS's connections to the SQLite databases go bad if the file system where the databases reside is gone, even just transiently. Add the hostname to the error log message for CERT_PKIXVerifyCert failure. R=eroman,ukai BUG=15630 TEST=existing unit tests should pass. Review URL: http://codereview.chromium.org/214028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@26714 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base')
-rw-r--r--net/base/x509_certificate_nss.cc3
1 files changed, 2 insertions, 1 deletions
diff --git a/net/base/x509_certificate_nss.cc b/net/base/x509_certificate_nss.cc
index a018dc0..9b63b1e 100644
--- a/net/base/x509_certificate_nss.cc
+++ b/net/base/x509_certificate_nss.cc
@@ -543,7 +543,8 @@ int X509Certificate::Verify(const std::string& hostname,
status = PKIXVerifyCert(cert_handle_, NULL, 0, cvout);
if (status != SECSuccess) {
int err = PORT_GetError();
- LOG(ERROR) << "CERT_PKIXVerifyCert failed err=" << err;
+ LOG(ERROR) << "CERT_PKIXVerifyCert for " << hostname
+ << " failed err=" << err;
// CERT_PKIXVerifyCert rerports the wrong error code for
// expired certificates (NSS bug 491174)
if (err == SEC_ERROR_CERT_NOT_VALID &&