diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:32:53 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-28 20:32:53 +0000 |
commit | e393b9fc0267deaf55f3624aa7b0bfb08707dfda (patch) | |
tree | 3c0d760af8d79d0fd82dae7de28a461cb897ccbe /net/socket | |
parent | 2cc98c885571e7ef17222d6fda02f9500c94fc76 (diff) | |
download | chromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.zip chromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.tar.gz chromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.tar.bz2 |
Add more LOG(ERROR) messages to track down bug 55678,
identifying the SChannel function that fails with
SEC_E_INVALID_HANDLE.
R=eroman
BUG=55678
TEST=none
Review URL: http://codereview.chromium.org/3418036
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60841 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket')
-rw-r--r-- | net/socket/ssl_client_socket_win.cc | 12 |
1 files changed, 8 insertions, 4 deletions
diff --git a/net/socket/ssl_client_socket_win.cc b/net/socket/ssl_client_socket_win.cc index b930e8f..1146fdf 100644 --- a/net/socket/ssl_client_socket_win.cc +++ b/net/socket/ssl_client_socket_win.cc @@ -572,7 +572,7 @@ int SSLClientSocketWin::InitializeSSLContext() { &out_flags, &expiry); if (status != SEC_I_CONTINUE_NEEDED) { - DLOG(ERROR) << "InitializeSecurityContext failed: " << status; + LOG(ERROR) << "InitializeSecurityContext failed: " << status; return MapSecurityError(status); } @@ -950,6 +950,7 @@ int SSLClientSocketWin::DidCallInitializeSecurityContext() { } if (FAILED(isc_status_)) { + LOG(ERROR) << "InitializeSecurityContext failed: " << isc_status_; int result = MapSecurityError(isc_status_); // We told Schannel to not verify the server certificate // (SCH_CRED_MANUAL_CRED_VALIDATION), so any certificate error returned by @@ -1188,6 +1189,7 @@ int SSLClientSocketWin::DoPayloadDecrypt() { if (status != SEC_E_OK && status != SEC_I_RENEGOTIATE) { DCHECK(status != SEC_E_MESSAGE_ALTERED); + LOG(ERROR) << "DecryptMessage failed: " << status; return MapSecurityError(status); } @@ -1315,8 +1317,10 @@ int SSLClientSocketWin::DoPayloadEncrypt() { SECURITY_STATUS status = EncryptMessage(&ctxt_, 0, &buffer_desc, 0); - if (FAILED(status)) + if (FAILED(status)) { + LOG(ERROR) << "EncryptMessage failed: " << status; return MapSecurityError(status); + } payload_send_buffer_len_ = buffers[0].cbBuffer + buffers[1].cbBuffer + @@ -1386,7 +1390,7 @@ int SSLClientSocketWin::DidCompleteHandshake() { SECURITY_STATUS status = QueryContextAttributes( &ctxt_, SECPKG_ATTR_STREAM_SIZES, &stream_sizes_); if (status != SEC_E_OK) { - DLOG(ERROR) << "QueryContextAttributes (stream sizes) failed: " << status; + LOG(ERROR) << "QueryContextAttributes (stream sizes) failed: " << status; return MapSecurityError(status); } DCHECK(!server_cert_ || renegotiating_); @@ -1394,7 +1398,7 @@ int SSLClientSocketWin::DidCompleteHandshake() { status = QueryContextAttributes( &ctxt_, SECPKG_ATTR_REMOTE_CERT_CONTEXT, &server_cert_handle); if (status != SEC_E_OK) { - DLOG(ERROR) << "QueryContextAttributes (remote cert) failed: " << status; + LOG(ERROR) << "QueryContextAttributes (remote cert) failed: " << status; return MapSecurityError(status); } if (renegotiating_ && |